1,087
Views
17
CrossRef citations to date
0
Altmetric
Articles

“Make a Bomb in the Kitchen of Your Mom”: Jihadist Tactical Technical Communication and the Everyday Practice of Cooking

References

  • Ahmad, I. (2009). Islamism and democracy in India: The transformation of Jamaat-e-Islami. Princeton, NJ: Princeton University Press.
  • AQ Chef. (2010a). Make a bomb in the kitchen of your mom. Inspire Magazine, 1, 33–40. Retrieved from https://azelin.files.wordpress.com/2010/06/aqap-inspire-magazine-volume-1-uncorrupted.pdf
  • AQ Chef. (2010b). Destroying buildings. Inspire Magazine, 4, 39–41. Retrieved from https://azelin.files.wordpress.com/2011/01/inspire-magazine-4.pdf
  • AQ Chef. (2012). It is of your freedom to ignite a firebomb. Inspire Magazine, 9, 30–36. Retrieved from https://azelin.files.wordpress.com/2012/05/inspire-magazine-9.pdf
  • AQ Chef. (2013). Causing road accidents. Inspire Magazine, 10, 52–55. Retrieved from https://azelin.files.wordpress.com/2013/03/inspire-magazine-issue-10.pdf
  • AQ Chef. (2014a). Car bombs: Field data. Inspire Magazine, 12, 70–71. Retrieved from https://azelin.files.wordpress.com/2014/04/inspire-magazine-issue-12.pdf
  • AQ Chef. (2014b). Car bombs inside America. Inspire Magazine, 12, 62–69. Retrieved from https://azelin.files.wordpress.com/2014/04/inspire-magazine-issue-12.pdf
  • AQ Chef. (2015). Designing a timed hand grenade. Inspire Magazine, 14, 72–81. Retrieved from https://azelin.files.wordpress.com/2015/09/inspire-magazine-14.pdf
  • Ashour, O. (2011). Post-Jihadism: Libya and the global transformations of armed Islamist movements. Terrorism and Political Violence, 23(3), 377–397. doi:10.1080/09546553.2011.560218
  • Bellwoar, H. (2012). Everyday matters: Reception and use as productive design of health-related texts. Technical Communication Quarterly, 21(4), 325–345. doi:10.1080/10572252.2012.702533
  • Berger, J. M. (2015). The metronome of apocalyptic time: Social media as carrier wave for millenarian contagion. Perspectives on Terrorism, 9(4), 61–71. Retrieved from http://www.terrorismanalysts.com/pt/index.php/pot/article/view/444/html
  • Berger, J. M., & Morgan, J. (2015). The ISIS Twitter census: Defining and describing the population of ISIS supporters on Twitter (Analysis Paper no. 20). The Brookings Project on U.S. Relations with the Islamic World. Retrieved from https://www.brookings.edu/wp-content/uploads/2016/06/isis_twitter_census_berger_morgan.pdf
  • Bjørgo, T. (2013). Strategies for preventing terrorism. New York, NY: Palgrave Macmillan.
  • Brachman, J. (2008). Global Jihadism: Theory and practice. New York, NY: Routledge.
  • Burke, K. (1937). Attitudes toward history (3rd ed.). Berkeley, CA: University of California Press.
  • Burke, K. (1954). Fact, inference, and proof in the analysis of literary symbolism. In L. Bryson (Ed.), Symbols and values: An initial study (Thirteenth Symposium of the Conference on Science, Philosophy, and Religion) (pp. 283–306). New York, NY: Harper.
  • Burke, K. (1957). Philosophy of literary form: Studies in symbolic action. New York, NY: Vintage Books.
  • Burke, K. (1959). A rhetoric of motives. Englewood Cliffs, NJ: Prentice Hall.
  • Burke, K. (1966). Language as symbolic action. Berkeley, CA: University of California Press.
  • Calamur, K. (2016, February 5). Twitter’s new ISIS policy. The Atlantic. Retrieved from http://www.theatlantic.com/international/archive/2016/02/twitter-isis/460269/
  • Dauber, C. E. (2014). The branding of violent Jihadism. Visual propaganda and extremism in the online environment. The United States Army War College. Retrieved from https://www.ciaonet.org/attachments/26508/uploads
  • de Certeau, M. (1988). The practice of everyday life. Berkeley, CA: University of California Press.
  • de Certeau, M. (1998). The practice of everyday life: Living and cooking (Vol. 2). Minneapolis, MN: University of Minnesota Press.
  • Department of Homeland Security. (n.d.). If you see something, say something. U.S. Department of Homeland Security. Retrieved from https://www.dhs.gov/see-something-say-something
  • Ding, D. D. (2010). Introducing China’s first comprehensive technical writing book: On technological subjects by Song Yingxing. Journal of Technical Writing and Communication, 40(2), 161–177. doi:10.2190/TW.40.2.d
  • Ding, H. (2009). Rhetorics of alternative media in an emerging epidemic: SARS, censorship, and extra-institutional risk communication. Technical Communication Quarterly, 18(4), 327–350. doi:10.1080/10572250903149548
  • Dobrin, D. (1985). Do not grind armadillo armor in this mill. IEEE Transactions on Professional Communication, 28(4), 30–37. doi:10.1109/TPC.1985.6448846
  • Durack, K. T. (1997). Gender, technology, and the history of technical communication. Technical Communication Quarterly, 6(3), 249–260. doi:10.1207/s15427625tcq0603_2
  • Ellis, R., Karimi, F., & McLauchlin, E. C. (2016, June 13). Orlando shooting: 49 killed, shooter pledged ISIS allegiance. CNN. Retrieved from http://www.cnn.com/2016/06/12/us/orlando-nightclub-shooting/
  • Forest, J. J. F. (2006). Teaching terror: Strategic and tactical learning in the terrorist world. Lanham, MD: Rowman & Littlefield.
  • Foss, S. K. (2004). Rhetorical criticism: Explorations and practice (4th ed.). Long Grove, IL: Waveland.
  • Gaibulloev, K., Sandler, T., & Santifort, C. (2012). Assessing the evolving threat of terrorism. Global Policy, 3(2), 135–144. doi:10.1111/gpol.2012.3.issue-2
  • Goodwin, D. (1991). Emplotting the reader: Motivation and technical documentation. Journal of Technical Writing and Communication, 21(2), 99–115. doi:10.2190/1TLD-2JBL-DD7X-PXK3
  • Guitiérrez, J. A., Jordan, J., & Trujillo, H. (2008). Prevention of Jihadist radicalization in Spanish prisons. Current situation, challenges and dysfunctions of the penitentiary system. Athena Intelligence Journal, 3(1), 1–9.
  • Hallenbeck, S. (2012). User agency, technical communication, and the 19th-century woman bicyclist. Technical Communication Quarterly, 21(4), 290–306. doi:10.1080/10572252.2012.686846
  • Harris, E. (1983). A theoretical perspective on “how to” discourse. In P. V. Anderson, R. J. Brockmann, & C. R. Miller (Eds.), New essays on technical and scientific communication: Research, theory, practice (pp. 139–156)). Farmingdale, NY: Baywood Publishing Company.
  • Hasan, N. (2002). Faith and politics: The rise of the Laskar Jihad in the era of transition in Indonesia. Indonesia, 73, 145–169. doi:10.2307/3351472
  • Hegghammer, T. (2006). Terrorist recruitment and radicalization in Saudi Arabia. Middle East Policy, 13(4), 39–60. doi:10.1111/mepo.2006.13.issue-4
  • Helfstein, S. (2012). Edges of radicalization: Ideas, individuals and networks in violent extremism. Combating Terrorism Center at West Point. Retrieved from https://www.ctc.usma.edu/posts/edges-of-radicalization-ideas-individuals-and-networks-in-violent-extremism
  • Hoffman, B. (2007a). Countering terrorist use of the web as a weapon. Combatting Terrorism Center at West Point. Retrieved from https://www.ctc.usma.edu/posts/countering-terrorist-use-of-the-web-as-a-weapon
  • Hoffman, B. (2007b). The global terrorist threat: Is Al-Qaeda on the run or on the march? Middle East Policy, 14(2), 44–58. doi:10.1111/j.1475-4967.2007.00296.x
  • Jarvis, L., & Lister, M. (2014). State terrorism research and critical terrorism studies: An assessment. Critical Studies on Terrorism, 7(1), 43–61. doi:10.1080/17539153.2013.877669
  • Jenkins, B. M. (2010). Would-be warriors: Incidents of Jihadist terrorist radicalization in the United States since September 11, 2001. Santa Monica, CA: RAND.
  • Johnson, R. R. (1998). User-centered technology. Albany, NY: State University of New York Press.
  • Joscelyn, T. (2015, December 17). San Bernardino terrorists allegedly studied AQAP’s Inspire magazine, pledged allegiance to Baghdadi. The Long War Journal. Retrieved from http://www.longwarjournal.org/archives/2015/12/san-bernardino-terrorists-allegedly-studied-aqaps-inspire-magazine-pledged-allegiance-to-baghdadi.php
  • Kabbani, S. M. H., & Hendricks, S. S. (n.d.). Jihad: A misunderstood concept from Islam—what Jihad is, and is not. This Islamic Supreme Council of America. Retrieved from http://islamicsupremecouncil.org/understanding-islam/legal-rulings/5-jihad-a-misunderstood-concept-from-islam.html?start=9
  • Karreman, J., Ummelen, N., & Steehouder, M. (2005). Procedural and declarative information in user instructions: What we do and don’t know about these information types. 2005 IEEE International Professional Communication Conference Proceedings (Institute of Electrical and Electronics Engineers [IEEE], pp. 328–333). Retrieved from http://ieeexplore.ieee.org.proxy.lib.wayne.edu/stamp/stamp.jsp?arnumber=1494193
  • Katz, S. B. (1992). The ethic of expediency: Classical rhetoric, technology, and the Holocaust. College English, 54(3), 255–275. doi:10.2307/378062
  • Khosrokhavar, F. (2013). Inside Jihadism: Understanding Jihadi movements worldwide. New York, NY: Routledge.
  • Kimball, M. A. (2006). Cars, culture, and tactical technical communication. Technical Communication Quarterly, 15(1), 67–86. doi:10.1207/s15427625tcq1501_6
  • Koerber, A. (2006). Rhetorical agency, resistance, and the disciplinary rhetorics of breastfeeding. Technical Communication Quarterly, 15(1), 87–101. doi:10.1207/s15427625tcq1501_7
  • Lemieux, A. F., Brachman, J., Levitt, J., & Wood, J. (2014). Inspire magazine: A critical analysis of its significance and potential impact through the lens of the information, motivation, and behavioral skills model. Terrorism and Political Violence, 26(2), 354–371. doi:10.1080/09546553.2013.828604
  • Leuprecht, C., Hataley, T., Moskalenko, S., & McCauley, C. (2010). Containing the narrative: Strategy and tactics in countering the storyline of global Jihad. Journal of Policing, Intelligence and Counter Terrorism, 5(1), 42–57. doi:10.1080/18335300.2010.9686940
  • Lipus, T. (2006). International consumer protection: Writing adequate instructions for global audiences. Journal of Technical Writing & Communication, 36(1), 75–91. doi:10.2190/88T5-8MFH-8MA6-QVAL
  • Loorbach, N., Steehouder, M., & Taal, E. (2006). The effects of motivational elements in user instructions. Journal of Business and Technical Communication, 20(2), 177–199. doi:10.1177/1050651905284404
  • Mackiewicz, J. (2010). The co-construction of credibility in online product reviews. Technical Communication Quarterly, 19(4), 403–426. doi:10.1080/10572252.2010.502091
  • Magdy, W., Darwish, K., & Weber, I. (2016). #FailedRevolutions: Using Twitter to study the antecedents of ISIS support. First Monday, 21(2). doi:10.5210/fm.v21i2.6372
  • Mamdani, M. (2002). Good Muslim, bad Muslim: A political perspective on culture and terrorism. American Anthropologist, 104(3), 766–775. doi:10.1525/aa.2002.104.3.766
  • Miles, K. S., & Cottle, J. L. (2010). Beyond plain language: A learner-centered approach to pattern jury instructions. Technical Communication Quarterly, 20(1), 92–112. doi:10.1080/10572252.2011.528345
  • Miller, C. R. (1979). A humanistic rationale for technical writing. College English, 40(6), 610–617. doi:10.2307/375964
  • Morain, M., & Swarts, J. (2012). YouTutorial: A framework for assessing instructional online video. Technical Communication Quarterly, 21(1), 6–24. doi:10.1080/10572252.2012.626690
  • MTAInfo. (2016, March 21). If you see something, say something—2016. YouTube. Retrieved from https://www.youtube.com/watch?v=7sxiateCgrI
  • Novenario, C. M. I. (2016). Differentiating Al Qaeda and the Islamic State through strategies publicized in Jihadist magazines. Studies in Conflict & Terrorism, 39(11), 953–967. doi:10.1080/1057610X.2016.1151679
  • Paradis, J. (1991). Text and action: The operator’s manual in context and court. In C. Bazerman & J. G. Paradis (Eds.), Textual dynamics of the professions: Historical and contemporary studies of writing in professional communities (pp. 256–278). Madison, WI: University of Wisconsin Press.
  • Potts, L. (2013). Social media in disaster response: How experience architects can build for participation. New York, NY: Routledge.
  • Reder, L. M., Charney, D. H., & Morgan, K. I. (1986). The role of elaborations in learning a skill from an instructional text. Memory & Cognition, 14(1), 64–78. doi:10.3758/BF03209230
  • Riaz, A., & Fair, C. C. (2010). Political Islam and governance in Bangladesh. London, England: Routledge.
  • Rosemont, H. (2014). Private sector engagement in the UK’s counter-terrorism strategy: A new agenda. Behavioral Sciences of Terrorism and Political Aggression, 6(2), 147–161. doi:10.1080/19434472.2013.860184
  • Rudner, M. (2016). “Electronic Jihad”: The Internet as Al Qaeda’s catalyst for global terror. Studies in Conflict & Terrorism, 1–14. doi:10.1080/1057610X.2016.1157403
  • Sageman, M. (2008). Leaderless Jihad: Terror networks in the twenty-first century. Philadelphia, PA: University of Pennsylvania Press.
  • Sageman, M. (2014). The stagnation in terrorism research. Terrorism and Political Violence, 26(4), 565–580. doi:10.1080/09546553.2014.895649
  • Sedgwick, M. (2015). Jihadism, narrow and wide: The dangers of loose use of an important term. Perspectives on Terrorism, 9(2), 34–41. Retrieved from http://www.terrorismanalysts.com/pt/index.php/pot/article/view/417
  • Selber, S. A. (2010). A rhetoric of electronic instruction sets. Technical Communication Quarterly, 19(2), 95–117. doi:10.1080/10572250903559340
  • Sivek, S. C. (2013). Packaging inspiration: Al Qaeda’s digital magazine Inspire in the self-radicalization process. International Journal of Communication, 7, 584–606.
  • Sparago, M. (2007). Terrorist recruitment: The crucial case of Al Queda’s global Jihad terror network. New York, NY: New York University, Center for Global Affairs. Retrieved from http://www.scps.nyu.edu/export/sites/scps/pdf/global-affairs/marta-sparago.pdf
  • Speckhard, A. (2013). The Boston Marathon bombers: The lethal cocktail that turned troubled youth to terrorism. Perspectives on Terrorism, 7(3), 64–78. Retrieved from http://www.terrorismanalysts.com/pt/index.php/pot/article/view/268
  • Stern, J. (2014). Response to Marc Sageman’s “The Stagnation in Terrorism Research.” Terrorism and Political Violence, 26(4), 607–613. doi:10.1080/09546553.2014.895654
  • Tebeaux, E. (1999). The emergence of women technical writers in the 17th century: Changing voices within a changing milieu. In T. Kynell & M. G. Moran (Eds.), Three keys to the past: The history of technical communication (Vol. 7, pp. 105–122). Stamford, CT: Ablex.
  • Tebeaux, E. (2010). English agriculture and estate management instructions, 1200–1700: From orality to textuality to modern instructions. Technical Communication Quarterly, 19(4), 352–378. doi:10.1080/10572252.2010.502512
  • Todd, J. (2014). Avoiding litigation for product instructions and warnings. Journal of Technical Writing & Communication, 44(4), 401–421. doi:10.2190/TW.44.4.d
  • van der Meij, H., & van der Meij, J. (2013). Eight guidelines for the design of instructional videos for software training. Technical Communication, 60(3), 205–228.
  • Van Ittersum, D. (2014). Craft and narrative in DIY instructions. Technical Communication Quarterly, 23(3), 227–246. doi:10.1080/10572252.2013.798466
  • Veilleux-Lepage, Y. (2014, December 4–7). Retweeting the caliphate: The role of soft-sympathizers in the Islamic State’s social media strategy. Paper presented at the 6th International Symposium on Terrorism and Transnational Crime, Antalya, Turkey. Retrieved from https://www.researchgate.net/publication/273896091_Retweeting_the_Caliphate_The_Role_of_Soft-Sympathizers_in_the_Islamic_State%27s_Social_Media_Strategy
  • Venkatraman, A. (2007). Religious basis for Islamic terrorism: The Quran and its interpretations. Studies in Conflict & Terrorism, 30(3), 229–248. doi:10.1080/10576100600781612
  • Watts, C. (2015, January 12). Inspired, networked & directed—The muddled Jihad of ISIS & Al Qaeda post Hebdo. War on the Rocks. Retrieved from http://warontherocks.com/2015/01/inspired-networked-directed-the-muddled-jihad-of-isis-al-qaeda-post-hebdo/
  • Weimann, G. (2012). Lone wolves in cyberspace. Journal of Terrorism Research, 3(2), 76–90. doi:10.15664/jtr.405
  • Wright, P. (1981). “The instructions clearly state” can’t people read? Applied Ergonomics, 12(3), 131–141. doi:10.1016/0003-6870(81)90002-8
  • Zelin, A. Y. (2014). The war between ISIS and Al-Qaeda for supremacy of the global Jihadist movement. Research Notes—The Washington Institute for Near East Policy, 20, 2–11.
  • Zhang, J. (2007). Beyond anti-terrorism: Metaphors as message strategy of post-September-11 U.S. public diplomacy. Public Relations Review, 33(1), 31–39. doi:10.1016/j.pubrev.2006.11.006

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.