Skip to main content Accessibility help
×
Hostname: page-component-77c89778f8-9q27g Total loading time: 0 Render date: 2024-07-17T23:18:53.949Z Has data issue: false hasContentIssue false

Introduction

Published online by Cambridge University Press:  05 August 2014

Louise I. Shelley
Affiliation:
George Mason University, Virginia
Get access

Summary

In mid-January 2013, a coalition of diverse jihadi groups seized control of the In Amenas gas field in Eastern Algeria, close to the Libyan border. The field provides 5 percent of the gas produced in Algeria. The attack, blessed by al-Qaeda in the Mahgreb (AQIM), a powerful al-Qaeda affiliate, revealed the power of the radical Islamists to take control of a large and economically important site with more than eight hundred employees. The attack is believed to have been planned by Mokhtar Belmokhtar, who started a splinter group from AQIM not long before the attack.

Operating under a policy that prohibited negotiation with terrorists, the Algerian state launched a military siege against the gas facility that resulted in high numbers of casualties. More than thirty attackers died, and at least three dozen hostages from eight countries also perished. The well-armed assailants had terrorized the hostages before their rescue or death.

These are the simple facts of the case. Yet this single act of terrorism epitomizes the main principles of this book, that the interaction of crime, corruption, and terrorism is having a tremendous impact on both security and the global economy. This attack – designed to command international attention – was characteristic of contemporary security threats, where the challenge comes from nonstate actors rather than governments. This attack was a strike at the core of the Algerian economy yet caused numerous foreign casualties. It reveals the consequences of globalization, where foreign investment and workers from diverse countries are placed in ever more remote locales and unstable regions, especially as the world seeks to tap ever more distant sources of oil and gas. Carried out in a lightly guarded desert locale, it reveals the strategic thinking of the terrorists. They were willing to carry out what was almost certainly a suicide mission to advance their goals by attacking an oil facility employing citizens from many different countries. Yet they did this with advanced weaponry that they had acquired and knew how to deploy.

Type
Chapter
Information
Dirty Entanglements
Corruption, Crime, and Terrorism
, pp. 1 - 26
Publisher: Cambridge University Press
Print publication year: 2014

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Bonner, Michael, Jihad in Islamic History: Doctrines and Practices (Princeton, NJ: Princeton University Press, 2006)CrossRefGoogle Scholar
Bonney, Richard, Jihād: from Qurơān to Bin Laden (New York: Palgrave Macmillan, 2004)CrossRefGoogle Scholar
Lewis, Bernard, The Crisis of Islam: Holy War and Unholy Terror (New York: Random House, 2003)Google Scholar
Le Monde, January 20, 2013
Sadek, Mouna, “Algeria Hostage Crisis Over,” January 20, 2013,
Krauss, Clifford and Kulish, Nicholas, “Algerian Facility Lacked Armed Guards,” January 23, 2013,
Chikhi, Lamine, “Two Canadians among Dead Islamist Militants at Algeria Gas Plant: Report,” Toronto Star, January 21, 2013
Moghadda, Fathali M., How Globalization Spurs Terrorism: The Lopsided Benefits of “One World” and Why That Fuels Violence (Westport, CT: Praeger Security International, 2008)Google Scholar
Schendel, Willem van and Abraham, Itty, Illicit Flows and Criminal Things: States, Border, and the Other Side of Globalization (Bloomington: Indiana University Press, 2005)Google Scholar
Strange, Susan, Retreat of the State: The Diffusion of Power in the World Economy (New York: Cambridge University Press, 1996)CrossRefGoogle Scholar
Nordstrom, Carolynn, Global Outlaws: Crime, Money, and Power in the Contemporary World (Berkeley: University of California Press, 2007)Google Scholar
Ferran, Lee, “Algeria Hostage Crisis: The Libya Connection,” January 22, 2013,
Whitlock, Craig, “Algerian Stance Spoils U.S. Regional Strategy,” Washington Post, January 19, 2013
Lacher, Wolfram, “Organized Crime and Conflict in Conflict in the Sahel-Sahara Region,” September 13, 2012,
Weddady, Nasser, “How Europe Bankrolls Terror,” New York Times, February 16, 2013
Filiu, Jean-Pierre, presentation at African Center for Strategic Studies, January 2011,
Doward, Jamie. “How Cigarette Smuggling Fuels Islamist Violence,” Guardian, January 26, 2013,
Lacher, , “Organized Crime,”
The Transatlantic Cocaine Market: A Research Paper, April 2011
Crenshaw, Martha, “The Effectiveness of Terrorism in the Algerian War,” in Terrorism in Context (University Park: Pennsylvania State University, 1995), 484Google Scholar
Cormaic, Ruadhán Mac, “Algeria’s Oil and Gas Industry: Pillars of Its Economy,” Irish Times, January 19, 2013
Sanders, Laura, “Everyday Entanglement: Physicists Take Quantum Weirdness Out of the Lab,” Science News 178, no. 11 (2010): 22CrossRefGoogle Scholar
Comstock, Paul, “The Strange World of Quantum Entanglement,” March 30, 2007,
Krueger, Alan B. and Laitin, David, “Kto Kogo? A Cross-Country Study of the Origins and Targets of Terrorism,” in Terrorism and Economic Development, and Political Development, ed. Keefer, Philip and Loayza, Norman (New York: Cambridge University Press, 2008), 148–73Google Scholar
Luneev, Viktor, “Organized Crime and Terrorism,” in High Impact Terrorism: Proceedings of a Russian American Workshop, ed. Schwitzer, Glenn E. (Washington, DC: National Academies Press, 2002), 37–52Google Scholar
Collier, Paul and Hoeffler, Anke, “Greed and Grievance in Civil War,” World Bank Policy Research Working Paper 2355, May 2000,
Berdal, Mats and Malone, David M., Greed and Grievance: Economic Agendas in Civil Wars (Boulder, CO: Lynne Rienner, 2000)Google Scholar
Levi, Miriam R., “Algeria, 1991–2002: Anatomy of a Civil War,” in Understanding Civil War: Evidence and Analysis, ed. Collier, Paul and Sambanis, Nicholas (Washington, DC: World Bank, 2005), 221–46Google Scholar
Filiu, Jean-Pierre, “Could Al-Qaeda Turn African in the Sahel?,” June 2010, Carnegie Middle East Center,
Pécaut, Daniel, Les Farc, une guérilla sans fin? (Paris: Lignes de Repères, 2008)Google Scholar
Ungar, Elizabeth, “La Lucha por la transparencia,” El Expectador, September 5, 2013, 6
Rose-Ackerman, Susan published her seminal work on corruption titled Corruption: A Study of Political Economy (New York: Academic Press, 1978)Google Scholar
Andreas, Peter, “Transnational Crime and Economic Globalization,” in Transnational Organized Crime and International Security, ed. Berdal, M. and Serrano, M. (Boulder, CO: Lynne Rienner, 2002), 37–52Google Scholar
Mittelman, James and Johnston, Robert, “The Globalization of Organized Crime, the Courtesan State, and the Corruption of Civil Society,” Global Governance 5, no. 2 (1999): 103–26Google Scholar
Andreas, Peter, Smuggler Nation: How Illicit Trade Made America (Oxford: Oxford University Press, 2013), 330–52Google Scholar
Raufer, Xavier, “New World Disorder, New Terrorisms: New Threats for Europe and the Western World,” Terrorism and Political Violence 11, no. 4 (1999): 35CrossRefGoogle Scholar
Shanker, Thom, “Lessons of Iraq Help the US Fight a Drug War in Honduras,” New York Times, May 5, 2012
Laqueur, Walter, The New Terrorism: Fanaticism and the Arms of Mass Destruction (Oxford: Oxford University Press, 1999)Google Scholar
Horgan, John, The Psychology of Terrorism (London: Routledge, 2005), 19CrossRefGoogle Scholar
Arreguin-Toft, Ivan, How the Weak Win Wars: A Theory of Asymmetric Conflict (Cambridge: Cambridge University Press, 2005)CrossRefGoogle Scholar
UNODC, A Transnational Organized Crime Threat Assessment, 2010
Wedel, Janine R., Collision and Collusion: The Strange Case of Western Aid to Eastern Europe, 1989–1998 (New York: St. Martin’s Press, 1998)Google Scholar
Hindess, Barry, “Introduction: How Should We Think about Corruption?,” in Corruption: Expanding the Focus, ed. Barcham, Manuhuia, Hindess, Barry, and Larmour, Peter (Canberra: Australian National University, 2012), 1Google Scholar
Biersteker, Thomas J. and Eckert, Sue E., eds., Countering the Financing of Terrorism (London: Routledge, 2008)
Giraldo, Jeanne K. and Trinkunas, Harold A., eds., Terrorism Financing and State Responses: A Comparative Perspective (Stanford, CA: Stanford University Press, 2007)
Ehrenfeld, Rachel, Funding Evil, Updated: How Terrorism Is Financed and How to Stop It (Chicago: Bonus Books, 2005)Google Scholar
Napoleoni, Loretta, Terror Incorporated: Tracing the Dollars behind the Terror Network (New York: Seven Stories Press, 2005)Google Scholar
Patrick, Stewart, Weak States: Fragile States, Global Threats, and International Security (Oxford: Oxford University Press, 2011)Google Scholar
Kaldor, Mary, New and Old Wars: Organized Violence in a Global Era (Palo Alto, CA: Stanford University Press, 2007)Google Scholar
Naím, Moisés, Illicit: How Smugglers, Traffickers and Copycats Are Hijacking the Global Economy (New York: Doubleday, 2005)Google Scholar
Storti, Cláudia Costa and de Grauwe, Paul, Illicit Trade and the Global Economy (Cambridge, MA: MIT Press, 2012)Google Scholar
Bauer, Alain and Raufer, Xavier, The Dark Side of Globalization (Paris: CNRS, 2009)Google Scholar
Bayley, David and Perito, Robert, The Police in War: Fighting Insurgency, Terrorism, and Violent Crime (Boulder, CO: Lynne Rienner, 2010).Google Scholar
Stiglitz, Joseph E., Globalization and Its Discontents (New York: W. W. Norton, 2002)Google Scholar
Vogl, Frank, Waging War on Corruption: Inside the Movement Fighting the Abuse of Power (Lanham, MD: Rowman and Littlefield, 2012)Google Scholar
Cockcroft, Laurence, Global Corruption: Money, Power and Ethics in the Modern World (Philadelphia: University of Pennsylvania Press, 2012)Google Scholar
Friman, R. Richard and Andreas, Peter, eds., The Illicit Global Economy and State Power (Lanham, MD: Rowman and Littlefield, 1999)
Grabosky, Peter and Stohl, Michael, Crime and Terrorism (Compact Criminology) (London: Sage, 2010)Google Scholar
Thompson, Edwina A., Trust Is the Coin of the Realm Lessons from the Money Men in Afghanistan (Karachi: Oxford University Press, 2011)Google Scholar
Naylor, R.T., Wages of Crime: Black Markets, Illegal Finance, and the Underworld Economy (Ithaca, NY: Cornell University Press, 2002)Google Scholar
Williams, Phil and Godson, Roy, “Anticipating Organized and Transnational Crime,” Crime, Law, and Social Change 37 (2002): 311–55CrossRefGoogle Scholar
Hoffman’s, BruceInside Terrorism, rev ed. (New York: Columbia University Press, 2006)Google Scholar
Horgan, John, Walking Away from Terrorism: Accounts of Disengagement from Radical and Extremist Movements (London: Routledge 2009)Google Scholar
Holmes, Leslie, ed., Terrorism, Organised Crime and Corruption: Networks and Linkages (Cheltenham, UK: Edward Edgar, 2007)
Arquilla, John and Ronfeldt, David, Networks and Netwars: The Future of Terror, Crime and Militancy (Santa Monica, CA: RAND, 2001)Google Scholar
Forest, James J. F., The Making of a Terrorist Recruitment, Training and Root Causes, 3 vols. (Westport, CT: Praeger Security International, 2006)Google Scholar
Treverton, Gregory F., Matthies, Carl F., Cunningham, Karla J., Goulka, Jeremiah, Ridgeway, Greg, and Wong, Anny, Film Piracy, Organized Crime and Terrorism (Santa Monica, CA: RAND, 2009)Google Scholar
Williams, Phil, Criminals, Militia and Insurgences: Organized Crime in Iraq (Carlisle, PA: Strategic Studies Institution, 2009)CrossRefGoogle Scholar
Peters, Gretchen, Seeds of Terror: How Drugs, Thugs, and Crime Are Reshaping the Afghan War (New York: St. Martin’s Press, 2009)Google Scholar
Felbab-Brown, Vanda, Aspiration and Ambivalence: Strategies and Realities of Counterinsurgency and State-Building in Afghanistan (Washington, DC: Brookings Institution Press, 2012)Google Scholar
Garzón, JuanCarlos, Mafia & Co.: The Criminal Networks in Mexico, Brazil, and Colombia (Bogotá: Editorial Planeta Colombiana, 2008)Google Scholar
Levitt, Matthew, Hamas: Politics, Charity, and Terrorism in the Service of Jihad (New Haven, CT: Yale University Press, 2006)Google Scholar
Gunaratna, Rohan, Inside Al Qaeda (New York: Columbia University Press, 2002)CrossRefGoogle Scholar
Horgan, John and Taylor, Max, “Playing the Green Card: Financing the Provisional IRA, Part 1,” Terrorism and Political Violence 11, no. 2 (1999): 4–5CrossRefGoogle Scholar
Felbab-Brown, Vanda, Shooting Up Counterinsurgency and the War on Drugs (Washington, DC: Brookings Institution Press, 2009)Google Scholar
Lee, Rensselaer W., Smuggling Armageddon: The Nuclear Black Market in the Former Soviet Union and Europe (New York: St. Martin’s Press, 1998)Google Scholar
Tubb, Kathryn Walker, ed., Illicit Antiquities: The Theft of Culture and the Extinction of Archaeology (New York: Routledge, 2002)
Biersteker, Thomas J. and Eckert, Sue E., Countering the Financing of Terrorism (London: Routledge, 2008)Google Scholar
Giraldo, Jeanne K. and Trinkunas, Harold A., Terrorism Financing and State Responses: A Comparative Perspective (Stanford, CA: Stanford University Press, 2007)Google Scholar
Godson, Roy, ed., Menace to Society: Political Criminal Collaboration around the World (New Brunswick, NJ: Transaction, 2003)
Harriot, Anthony, Organized Crime and Politics in Jamaica: Breaking the Nexus (Kingston: Canoe Press, 2008)Google Scholar
Rotberg, Robert, Corruption, Global Security and World Order (Washington, DC: Brookings Institution Press, 2009)Google Scholar
Friman, H. Richard, ed., Crime and the Global Economy (Boulder, CO: Lynne Rienner, 2009)
Glenny, Misha, McMafia (New York: Alfred A. Knopf, 2008)Google Scholar
Albanese, Jay, Transnational Crime and the 21st Century (New York: Oxford University Press, 2011)Google Scholar
Gayraud, Jean-François, Le Monde des mafias Géopolitique du crime organisé (Paris: Odile Jacob, 2008)Google Scholar
Allum, Felia and Gilmour, Stan, eds., Routledge Handbook of Transnational Organized Crime (London: Routledge, 2012)
Makarenko, Tamara, “The Crime-Terror Continuum: Tracing the Interplay between Transnational Organised Crime and Terrorism,” Global Crime 6, no. 1 (2004): 129–45CrossRefGoogle Scholar
Schmid, Alex, such as “The Links between Transnational Organized Crime and Terrorist Crimes,” Transnational Organized Crime 2, no. 4 (1996): 40–48Google Scholar
Rollins, John and Wyler, Liana, International Terrorism and Transnational Crime: Security Threats, U.S. Policy and Considerations for Congress (Washington, DC: Library of Congress, 2010)Google Scholar
Hutchinson, Steven and O’Malley, Pat, “A Crime-Terror Nexus? Thinking on Some of the Links between Terrorism and Criminality,” Studies in Conflict and Terrorism 30, no. 12 (2007): 1095–107CrossRefGoogle Scholar
Dishman, Chris, “The Leaderless Nexus: When Crime and Terror Converge,” Studies in Conflict and Terrorism 28, no. 3 (2008): 237–52CrossRefGoogle Scholar
Clarke, Ryan and Lee, Stuart, “The PIRA, D-Company, and the Crime-Terror Nexus,” Terrorism and Political Violence 20, no. 2 (2008): 376–39CrossRefGoogle Scholar
Fernandez, Luciana, “Organized Crime and Terrorism: From the Cells towards Political Communication, a Case Study,” Terrorism and Political Violence 21, no. 4 (2008): 595–616CrossRefGoogle Scholar
Manwaring, Max, Insurgency, Terrorism, and Crime: Shadows from the Past and Portents for the Future (Norman: University of Oklahoma Press, 2008)Google Scholar
Kenney, Michael, From Pablo to Osama: Trafficking and Terrorist Networks, Government Bureaucracies, and Competitive Adaptation (University Park: Pennsylvania State University Press, 2007)Google Scholar
Scanlan, Gary, “The Enterprise of Crime and Terrorists – The Implication for Good Business,” Journal of Financial Crime 13, no. 2 (2006): 164–76CrossRefGoogle Scholar
Terrorism and Political Violence 24, no. 2 (2012)
Picarelli, John, “Osama bin Corleone? Vito the Jackal? Framing Threat Convergence through an Examination of Transnational Organized Crime and International Terrorism,” Terrorism and Political Violence 24, no. 2 (2012): 180–98CrossRefGoogle Scholar
Smith, K.M., Anthony, S.J., Switzer, W.M., Epstein, J.H., Seimon, T., et al., “Zoonotic Viruses Associated with Illegally Imported Wildlife Products,” PLoS ONE 7, no. 1 (2012)
Cockcroft, Laurence, Global Corruption: Money, Power and Ethics in the Modern World (Philadelphia: University of Pennsylvania Press, 2012), 2Google Scholar
Murphy, Martin N., Boats, Weak States, Dirty Money: The Challenge of Piracy (New York: Columbia University Press, 2008), 5Google Scholar
Efrat, Asif, Governing Guns, Preventing Plunder: International Cooperation against Illicit Trade (New York: Oxford University Press, 2012), 265CrossRefGoogle Scholar
Project on U.S. Middle East Nonproliferation Strategy, US Non-proliferation Strategy for the Changing Middle East, 2013
Jenkins, Brian Michael, Will Terrorists Go Nuclear? (New York: Prometheus Books, 2008)Google Scholar
Picarelli, John T., “The Turbulent Nexus of Transnational Organised Crime and Terrorism: A Theory of Malevolent International Relations,” Global Crime 7, no. 1 (2006): 1–24CrossRefGoogle Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Introduction
  • Louise I. Shelley, George Mason University, Virginia
  • Book: Dirty Entanglements
  • Online publication: 05 August 2014
  • Chapter DOI: https://doi.org/10.1017/CBO9781139059039.001
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Introduction
  • Louise I. Shelley, George Mason University, Virginia
  • Book: Dirty Entanglements
  • Online publication: 05 August 2014
  • Chapter DOI: https://doi.org/10.1017/CBO9781139059039.001
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Introduction
  • Louise I. Shelley, George Mason University, Virginia
  • Book: Dirty Entanglements
  • Online publication: 05 August 2014
  • Chapter DOI: https://doi.org/10.1017/CBO9781139059039.001
Available formats
×