Author
Listed:
- Pete Lentini
- Muhammad Bakashmar
Abstract
Although contemporary jihadist terrorists are most well known for perpetrating operations that generate mass casualties, they also conduct violent acts that yield fewer victims, such as beheading hostages. Examining the religious and cultural contexts that surround jihadist beheadings, developments in new media, and drawing on examples from the Chechen Wars and the Iraq War, this article argues that jihadists have employed this tactic for a range of reasons, including obtaining ransom payments, hampering foreign investment, discrediting transitional states, and recruiting supporters. It also suggests that jihadists' beheading of their captives corresponds with aspects of cosmic war, particularly on how religious terrorists' desires to please a deity and secure a place of honor in the hereafter has devalued the lives of both captor and prisoner. Consequently, contemporary jihadist beheading is an outgrowth of the practice of terrorist hostage taking. As this article goes to press (February 2007) UK authorities disrupted a terrorist cell allegedly plotting to behead British Muslim soldiers who served in Afghanistan and Iraq, and to broadcast the filmed executions through jihadist websites. Journalists have described the intended beheadings and their dissemination as “Iraq-style.” There is no doubt that jihadist beheading became more widely known as a result of the Iraq conflict. However, the beheadings in Iraq were largely used to recruit future jihadists and to demonstrate jihadists' strength to their potential support base, the global Muslim community. In contrast, the alleged UK beheading plot was aimed at striking terror into Muslims living in the UK so that they would not support or serve their government. Indeed the Iraq beheadings were intended to persuade, and the UK plot was intended to dissuade. These alleged activities suggest that contemporary jihadist beheading is not only an extension of hostage-taking, it is also an independently evolving terrorist tactic.
Suggested Citation
Handle:
RePEc:taf:uterxx:v:30:y:2007:i:4:p:303-325
DOI: 10.1080/10576100701200140
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:taf:uterxx:v:30:y:2007:i:4:p:303-325. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Longhurst (email available below). General contact details of provider: http://www.tandfonline.com/uter20 .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.