Intelligence Failures in Countering Islamic Terrorism: a Comparative Analysis on the Strategic Surprises of the 9/11 and the Pa

Total Page:16

File Type:pdf, Size:1020Kb

Intelligence Failures in Countering Islamic Terrorism: a Comparative Analysis on the Strategic Surprises of the 9/11 and the Pa Department of Political Science Master’s Degree in International Relations - Global Studies Chair of Geopolitical Scenarios and Political Risk Intelligence Failures in Countering Islamic Terrorism: A Comparative Analysis on the Strategic Surprises of the 9/11 and the Paris Attacks and the Exceptionality of the Italian Case SUPERVISOR CANDIDATE Prof. Giuseppe Scognamiglio Antonella Camerino Student ID: 639472 CO-SUPERVISOR Prof. Lorenzo Castellani ACCADEMIC YEAR 2019-2020 TABLE OF CONTENTS ABSTRACT…………………………………………………………………………………………5 INTRODUCTION…………………………………………………………………………………..6 CHAPTER 1: Intelligence: A Theoretical Framework 1.1 – The Intelligence Cycle………………………………………………………………….11 1.2 – Intelligence Failures…………………………………………………………………….19 1.3 – The Strategic Surprises and Surprises Attacks………………………………………….24 1.4 – The Black Swan Theory………………………………………………………………...30 CHAPTER 2: The Case of USA: The Attacks of the 9/11 2.1 – The US Intelligence Community……………………………………………………….35 2.2 – Analysis of a Terrorist Organization: Al-Qaeda………………………………………..43 2.3 – The 9/11 Attacks: Facts, Causes and Consequences……………………………………52 2.4 – The US Involvement in the Middle East: The War on Terror………………………….61 CHAPTER 3: The Case of France: The Paris Attacks of November 13 3.1 – The French Intelligence Community…………………………………………………...73 3.2 – Analysis of a Terrorist Organization: The Islamic State………………………………..80 3.3 – The Paris Attacks of November 13: Facts, Causes and Consequences………………...90 3.4 – The French Involvement in the Middle East: Opération Chammal…………………….98 CHAPTER 4: The Case of Italy: An Exception in the Western Jihadist Panorama 4.1 - The Information System for the Security of the Republic……………………………..106 2 4.2 - Islam in Italy and the Trends of Radicalization………………………………………..116 4.3 - Why no Jihadist Attacks occurred in Italy?....................................................................125 4.4 - The Italian Involvement in the Middle East: The Unknown of Libya………………...135 CONCLUSIONS………………………………………………………………………………….147 BIBLIOGRAPHY………………………………………………………………………………...153 SITOGRAPHY…………………………………………………………………………………...174 EXECUTIVE SUMMARY………………………………………………………………………177 3 «No religion is responsible for terrorism. People are responsible for violence and terrorism.» Barack Obama 4 ABSTRACT The goal of this thesis is to explain why intelligence systems sometimes fail. The attacks of September 11, 2001 against the World Trade Center in New York and the Pentagon in Washington and the attacks in Paris on the evening of November 13, 2015 demonstrated the limitations and weaknesses of intelligence agencies and of both the United States and France. The intelligence process is not a perfect process and is very often subject to malfunctions that expose the systems within which they operate to risks, such as failures and strategic surprises. Faced with a new threat such as international Islamic terrorism, Western national security systems have found themselves unprepared to fight a new type of war against some non-state actors such as Al-Qaeda and the Islamic State. This asymmetric war, which uses new strategies and tactics, also depends on the degree of involvement of the affected countries in conflicts in the Middle East and on internal social causes due to phenomena of radicalization. Italy proves to be an exception in the Western jihadist landscape, due to some internal and external characteristics, not being hit by any attack of Islamic origin so far. 5 INTRODUCTION The protection of national security is one of the most important prerogatives of a democratic state, which is committed to protecting the integrity of its territory, the safety of its population and the maintenance of its civil and political institutions. In this sense, the concept of national security also coincides with the concept of defense and is aimed at protecting the institutions and the founding principles of democracy, without which there could not even be freedom. Security and freedom are therefore the cornerstones on which the rule of law finds its foundation. National security is thus a precious asset for the State, which is concerned with preserving it through the intelligence activity carried out by its own security apparatuses and agencies. They deal with the collection, maintenance, analysis, processing of data and dissemination of news aimed at preventing internal and external threats to the State and destabilizing activities of any kind. Intelligence agencies, better known as Secret Services, are organizations headed by a State whose work is covered by secrecy, and which operate to pursue the safeguarding of the national interest and the maintenance of national security. These are both civil and military entities that report directly to the government of a State to which they belong. These agencies operate secretly both abroad (espionage activities), and within the territory of the State to which they belong (in this case we are talking about counter-espionage activities). A peculiar role assumed by intelligence agencies in recent years is that of counter-terrorism, that is, the set of strategies, tactics and techniques aimed at fighting and preventing terrorism understood as subversive activities that make use of violence for political or religious purposes.1 The counter-terrorism strategy is therefore a government plan that uses resources and instruments of national power to neutralize terrorists, their organizations, their networks in such a way as to make them unable to use violence to instill fear among the civilian population and force governments to act according to the demands and objectives of the terrorists.2 However, intelligence work and security services are not infallible systems: despite the high professionalism and competence of its agents and the resources that a country possesses, the information produced is not always useful or sufficient to predict and prevent an attack. The United States of America is an example of this vulnerability, despite the fact it is an economic, political and military superpower in the world, the winner of two World Wars and the only winning power of the Cold War, after the collapse of the Berlin Wall and the implosion of the Soviet Union. Twice, in fact, the United States has suffered heavy attacks from an external enemy, which have deeply shocked public opinion due to their gravity, spectacularity, but above all due to the fact of having been 1 Virginia P. Fortna, Do Terrorists Win? Rebels’ Use of Terrorism and Civil War Outcomes, Cambridge University Press, 2015, pp. 519-556. 2 Dan E. Stigall, Chris Miller, Lauren Donnatucci, The 2018 U.S. National Strategy for Counterterrorism: A Synoptic Overview, American University National Security Law Brief, 2019. 6 conducted on US soil without being somehow intercepted by the own security agencies: the attack on Pearl Harbor, conducted by the Japanese Military Air Force on December 7, 1941, and the tragedy of September 11, 2001, of an Islamic origin, have shown that it is not entirely impossible to circumvent American intelligence and Security Services. In particular, these two events are known to be the greatest intelligence failures in history, destined to set a trend for state intelligence agencies around the world and for those who want to approach to the field of security studies in the context of international relations. It should be noted that at the international level there is no universally valid definition of “terrorism”, since States and other actors of the international community are at odds in recognizing what terrorism is and what characteristics it has. In fact, the term could be used biased by States and non-state groups to accuse or denounce political opponents of subversive actions to public order or a threat to collective security.3 A definition of “terrorism” officially recognized by the States of the international community would lead to legal repercussions that could be controversial from a formal and substantive point of view. However, in the academic field, several scholars have tried to give a definition of “terrorism” to facilitate the research methodology. The American professor Bruce Hoffman, lecturer at Georgetown University in Washington D.C. and one of the world’s leading experts in the studies of terrorism, argues that terrorism is distinguishable from other crimes when the actions perpetrated4: • have mainly political aims and motives; • are violent or threaten to use violence; • are designed to have far-reaching psychological repercussions beyond the victim or the immediate target; • are led by an organization with an identifiable chain of command or by a conspiratorial cell (whose members do not wear uniforms or identifying insignia) and are perpetrated by a subnational group or non-state entity. Given that there are different forms of terrorism, and that political violence is used to achieve the most disparate objectives, this thesis analyzes the failures of intelligence in countering Islamic terrorism, and therefore a religious type of terrorism. After the end of the Cold War, a geopolitical scenario had emerged in which the United States remained the sole hegemonic power of the international order, and liberal democracy and the values of the West seemed to be the only ideological alternative left for the nations of the world that emerged 3 Bruce Hoffman, Inside Terrorism, Columbia University Press, New York, 1998, p.23. 4 Bruce Hoffman, Inside Terrorism, 2 ed., Columbia University Press, New York, 2006, p. 40. 7 from the yoke
Recommended publications
  • Summary from the Jihadi Forums
    ICT Jihadi Monitoring Group PERIODIC REVIEW Bimonthly Report Summary of Information on Jihadist Websites The Second Half of July 2015 International Institute for Counter Terrorism (ICT) Additional resources are available on the ICT Website: www.ict.org.il This report summarizes notable events discussed on jihadist Web forums during the second half of July 2015. Following are the main points covered in the report: The Islamic Emirate of Afghanistan (Taliban in Afghanistan) officially announces the death of Mullah Omar, the leader of the Emirate, from an illness. Following his death, many jihadist leaders and organization eulogize him. In addition, the Emirate announces the appointment of his deputy, Mullah Akhtar Mohammad Mansoor, as the new leader of the Emirate. Islamic State fighters from Turkestan call on Muslim residents of Turkestan to emigrate from their homeland and join the Islamic Caliphate under the leadership of Sheikh Abu Bakr al- Baghdadi. The organization also calls on Turkestani Al-Nusra Front fighters in Syria to defect and join the Islamic State. Sheikh Abu ‘Ubatdha Ahmad ‘Umar, the leader of Al-Shabab Al-Mujahideen, releases his first message since being appointed to the role, regarding his organization’s resolve in the fight against the Crusader conspiracy to weaken Islam and to steal the natural treasures of Muslim lands. In light of this, he calls on tribes in Somalia to help wage jihad against the enemies of Islam and he calls on Muslims in Kenya to join jihad as well. According to him, his organization is ready and willing to absorb into its ranks Muslims from East Africa, including Ethiopia, Djibouti, Uganda and Central Africa, due to their persecution at the hands of the local regimes.
    [Show full text]
  • Page 01 May 16.Indd
    www.thepeninsulaqatar.com BUSINESS | 21 SPORT | 34 300 Chinese firms to Al Hamad completeses take part in Made in 12-hour endurancee China expo challenge MONDAY 16 MAY 2016 • 9 SHA’BAAN 1437 • Volume 21 • Number 6798 thepeninsulaqatar @peninsulaqatar @peninsula_qatar OPINION Quality certificate Emir meets Eni CEO must for importing building materials Dr. Khalid Al-Shafi Editor-in-Chief materials entering the country,” said Al QU President... Kuwari, addressing a press conference The Ministry will yesterday. a job well-done soon start issuing “We are monitoring the entry points specification certificates and taking samples from imported con- atar University is the struction materials,” he added. sole national university for gabbro and The Qatar General Organisation for Qto which every Qatari limestone in line with Standardization (QS) at the ministry has (leadership and people) attribute asked producers of gabbro, limestone being great appreciation and respect. the Qatar Construction exported to Qatar to provide their prod- Emir H H Sheikh Tamim bin Hamad Al Thani with Eni CEO Claudio Descalzi at Al Bahr Palace There is no doubt that the uni- Specifications (QCS). uct profile to check compliance with the yesterday. They reviewed cooperation in the field of energy. versity has faced, during the specifications. recent period a time of admin- Dr Al Kuwari said that at the beginning istrative sluggishness which has of the implementation of QCS, some con- led to delays in effecting impor- By Mohammed Osman sidered it as an obstacle causing delays but Emir’s message to tant decisions which might have The Peninsula now it is being appreciated by everyone.
    [Show full text]
  • L'espansionismo Jihadista Dell'is (“Stato Islamico”) Nell'area
    CENTRO ALTI STUDI CENTRO MILITARE PER LA DIFESA DI STUDI STRATEGICI Dr. Marco COCHI L’espansionismo jihadista dell’IS (“Stato Islamico”) nell’area sub- sahariana e del sud-est pacifico (codice AI-SA-16) ∞ Il Centro Militare di Studi Strategici (CeMiSS) è un organismo istituito nel 1987 che gestisce, nell’ambito e per conto della Difesa, la ricerca su temi di carattere strategico. Tale attività permette di accedere, valorizzandoli, a strumenti di conoscenza ed a metodologie di analisi indispensabili per dominare la complessità degli attuali scenari e necessari per il raggiungimento degli obiettivi che le Forze Armate, e più in generale la collettività nazionale, si pongono in tema di sicurezza e difesa. La mission del Centro, infatti, nasce dalla ineludibile necessità del Ministero della Difesa di svolgere un ruolo di soggetto attivo all’interno del mondo della cultura e della conoscenza scientifica interagendo efficacemente con tale realtà, contribuendo quindi a plasmare un contesto culturale favorevole, agevolando la conoscenza e la comprensione delle problematiche di difesa e sicurezza, sia presso il vasto pubblico che verso opinion leader di riferimento. Più in dettaglio, il Centro: effettua studi e ricerche di carattere strategico politico-militare; sviluppa la collaborazione tra le Forze Armate e le Università, centri di ricerca italiani, stranieri ed Amministrazioni Pubbliche; forma ricercatori scientifici militari; promuove la specializzazione dei giovani nel settore della ricerca; pubblica e diffonde gli studi di maggiore interesse. Le attività di studio e di ricerca sono prioritariamente orientate al soddisfacimento delle esigenze conoscitive e decisionali dei Vertici istituzionali della Difesa, riferendosi principalmente a situazioni il cui sviluppo può determinare significative conseguenze anche nella sfera della sicurezza e difesa.
    [Show full text]
  • From Criminals to Terrorists and Back?
    FROM CRIMINALS TO TERRORISTS AND BACK? KICK-OFF REPORT www.globsec.org AUTHORS Kacper Rekawek, Head of Defence and Security Programme, GLOBSEC Policy Institute Stanislav Matejka, Junior Research Fellow, Defence and Security Programme, GLOBSEC Policy Institute Martina Babikova, GLOBSEC Policy Institute Tomas Nagy, Research Fellow, Defence and Security Programme, GLOBSEC Policy Institute Jakub Rafay, GLOBSEC Policy Institute Design by Peter Verček, GLOBSEC The following distinguished partners were consulted in the process of preparation of this report. The sole responsibility for the content of this publication lies with the authors. • Austria - Daniela Pisoiu • Bulgaria - Rositsa Dzhekova, Nadya Stoynova • France - Olivier de France, Damien Saverot, Pierre Colomina • Germany - Matenia Sirseloudi • Greece - Eleni Fotou • Ireland - Orla Lynch • Italy - Marco Lombardi, Giovanni Giacalone, Nicolò Spagna • Netherlands - Jessica Sciarone, Bart Schuurman • Spain - Fernando Reinares, Carola García Calvo, Álvaro Vicente • United Kingdom - John Morrison, Aleksandra Łojek The project is funded under PMI IMPACT, a global grant initiative of Philip Morris International to support projects against illegal trade. GLOBSEC is fully independent in implementing the project and has editorial responsibility for all views and opinions expressed herein. CONTENTS PROJECT SUMMARY 6 EXECUTIVE SUMMARY 7 FROM CRIMINALS TO TERRORISTS AND BACK? 10 INTRODUCING CRIME-TERROR NEXUS 10 RESEARCHING THE CRIME-TERROR NEXUS: CHALLENGES 12 RESEARCHING THE NEXUS: WHAT IS NEXT?
    [Show full text]
  • 0714685003.Pdf
    CONTENTS Foreword xi Acknowledgements xiv Acronyms xviii Introduction 1 1 A terrorist attack in Italy 3 2 A scandal shocks Western Europe 15 3 The silence of NATO, CIA and MI6 25 4 The secret war in Great Britain 38 5 The secret war in the United States 51 6 The secret war in Italy 63 7 The secret war in France 84 8 The secret war in Spain 103 9 The secret war in Portugal 114 10 The secret war in Belgium 125 11 The secret war in the Netherlands 148 12 The secret war in Luxemburg 165 ix 13 The secret war in Denmark 168 14 The secret war in Norway 176 15 The secret war in Germany 189 16 The secret war in Greece 212 17 The secret war in Turkey 224 Conclusion 245 Chronology 250 Notes 259 Select bibliography 301 Index 303 x FOREWORD At the height of the Cold War there was effectively a front line in Europe. Winston Churchill once called it the Iron Curtain and said it ran from Szczecin on the Baltic Sea to Trieste on the Adriatic Sea. Both sides deployed military power along this line in the expectation of a major combat. The Western European powers created the North Atlantic Treaty Organization (NATO) precisely to fight that expected war but the strength they could marshal remained limited. The Soviet Union, and after the mid-1950s the Soviet Bloc, consistently had greater numbers of troops, tanks, planes, guns, and other equipment. This is not the place to pull apart analyses of the military balance, to dissect issues of quantitative versus qualitative, or rigid versus flexible tactics.
    [Show full text]
  • Anuario IILA 2019
    ORGANIZZAZIONE INTERNAZIONALE ITALOLATINO AMERICANA Annuario Istituzionale ANUARIO INSTITUCIONAL 2019 ARGENTINA | BOLIVIA | BRASILE | CILE | COLOMBIA | COSTA RICA | CUBA | ECUADOR EL SALVADOR | GUATEMALA | HAITI | HONDURAS | ITALIA | MESSICO | NICARAGUA PANAMA | PARAGUAY | PERÙ | REPUBBLICA DOMINICANA | URUGUAY | VENEZUELA ORGANIZZAZIONE INTERNAZIONALE ITALOLATINO AMERICANA Annuario Istituzionale ANUARIO INSTITUCIONAL 2019 ARGENTINA | BOLIVIA | BRASIL | CHILE | COLOMBIA | COSTA RICA | CUBA | ECUADOR ARGENTINA | BOLIVIA | BRASILE | CILE | COLOMBIA | COSTA RICA | CUBA | ECUADOR EL SALVADOR | GUATEMALA | HAITÍ | HONDURAS | ITALIA | MÉXICO | NICARAGUA EL SALVADOR | GUATEMALA | HAITI | HONDURAS | ITALIA | MESSICO | NICARAGUA PANAMÁ | PARAGUAY | PERÚ | REPÚBLICA DOMINICANA | URUGUAY | VENEZUELA PANAMA | PARAGUAY | PERÙ | REPUBBLICA DOMINICANA | URUGUAY | VENEZUELA INDICE ÍNDICE LA III FESTA DELL’IILA | LA III FIESTA DE LA IILA 4 UN ANNO DI INTENSA ATTIVITÀ ITALO-LATINOAMERICANA | 73 UN AÑO DE INTENSA ACTIVIDAD ÍTALO-LATINOAMERICANA Il Presidente del Consiglio dei Ministri Giuseppe Conte, alla III Festa dell’IILA, 11 dicembre 2019 Discorso di Roberto Melgarejo Le attività istituzionali dell’IILA Presidente dell’IILA e Ambasciatore del Paraguay 8 I La Segreteria Generale 74 Discorso di Donato Di Santo Donato Di Santo, Segretario Generale Segretario Generale dell’IILA 13 I Le Segreterie Tematiche Discorso di Giuseppe Conte Rosa Jijón, Segretaria Culturale 82 Presidente del Consiglio 22 Florencia Paoloni, Segretaria Tecnico-Scientifica 88 Sarah Cordero Pinchansky, Segretaria Socio-Economica 94 La Direzione Esecutiva 97 INTRODUZIONE | INTRODUCCIÓN 31 I Gianandrea Rossi, Direttore Esecutivo L’IILA E LA FARNESINA | LA IILA Y LA FARNESINA 33 Le attività di Cooperazione (progetti italiani ed europei), la Biblioteca e l’Archivio storico I Foro italo-latinoamericano delle PMI, José Luis Rhi-Sausi 103 Interventi istituzionali per l’Annuario 2019 I Il Programma EL PAcCTO (progetto europeo), Giovanni Tartaglia Polcini 107 On.
    [Show full text]
  • Intelligence Legalism and the National Security Agency's Civil Liberties
    112 Harvard National Security Journal / Vol. 6 ARTICLE Intelligence Legalism and the National Security Agency’s Civil Liberties Gap __________________________ Margo Schlanger* * Henry M. Butzel Professor of Law, University of Michigan. I have greatly benefited from conversations with John DeLong, Mort Halperin, Alex Joel, David Kris, Marty Lederman, Nancy Libin, Rick Perlstein, Becky Richards, and several officials who prefer not to be named, all of whom generously spent time with me, discussing the issues in this article, and many of whom also helped again after reading the piece in draft. I would also like to extend thanks to Sam Bagenstos, Rick Lempert, Daphna Renan, Alex Rossmiller, Adrian Vermeule, Steve Vladeck, Marcy Wheeler, Shirin Sinnar and other participants in the 7th Annual National Security Law Workshop, participants at the University of Iowa law faculty workshop, and my colleagues at the University of Michigan Legal Theory Workshop and governance group lunch, who offered me extremely helpful feedback. Jennifer Gitter and Lauren Dayton provided able research assistance. All errors are, of course, my responsibility. Copyright © 2015 by the Presidents and Fellows of Harvard College and Margo Schlanger. 2015 / Intelligence Legalism and the NSA’s Civil Liberties Gaps 113 Abstract Since June 2013, we have seen unprecedented security breaches and disclosures relating to American electronic surveillance. The nearly daily drip, and occasional gush, of once-secret policy and operational information makes it possible to analyze and understand National Security Agency activities, including the organizations and processes inside and outside the NSA that are supposed to safeguard American’s civil liberties as the agency goes about its intelligence gathering business.
    [Show full text]
  • Libya Conflict Insight | Feb 2018 | Vol
    ABOUT THE REPORT The purpose of this report is to provide analysis and Libya Conflict recommendations to assist the African Union (AU), Regional Economic Communities (RECs), Member States and Development Partners in decision making and in the implementation of peace and security- related instruments. Insight CONTRIBUTORS Dr. Mesfin Gebremichael (Editor in Chief) Mr. Alagaw Ababu Kifle Ms. Alem Kidane Mr. Hervé Wendyam Ms. Mahlet Fitiwi Ms. Zaharau S. Shariff Situation analysis EDITING, DESIGN & LAYOUT Libya achieved independence from United Nations (UN) trusteeship in 1951 Michelle Mendi Muita (Editor) as an amalgamation of three former Ottoman provinces, Tripolitania, Mikias Yitbarek (Design & Layout) Cyrenaica and Fezzan under the rule of King Mohammed Idris. In 1969, King Idris was deposed in a coup staged by Colonel Muammar Gaddafi. He promptly abolished the monarchy, revoked the constitution, and © 2018 Institute for Peace and Security Studies, established the Libya Arab Republic. By 1977, the Republic was transformed Addis Ababa University. All rights reserved. into the leftist-leaning Great Socialist People's Libyan Arab Jamahiriya. In the 1970s and 1980s, Libya pursued a “deviant foreign policy”, epitomized February 2018 | Vol. 1 by its radical belligerence towards the West and its endorsement of anti- imperialism. In the late 1990s, Libya began to re-normalize its relations with the West, a development that gradually led to its rehabilitation from the CONTENTS status of a pariah, or a “rogue state.” As part of its rapprochement with the Situation analysis 1 West, Libya abandoned its nuclear weapons programme in 2003, resulting Causes of the conflict 2 in the lifting of UN sanctions.
    [Show full text]
  • UNIVERSITY of CALIFORNIA, IRVINE the Arab Spring Abroad
    UNIVERSITY OF CALIFORNIA, IRVINE The Arab Spring Abroad: Mobilization among Syrian, Libyan, and Yemeni Diasporas in the U.S. and Great Britain DISSERTATION Submitted in partial satisfaction of the requirements for the degree of DOCTOR OF PHILOSOPHY in Sociology by Dana M. Moss Dissertation Committee: Distinguished Professor David A. Snow, Chair Chancellor’s Professor Charles Ragin Professor Judith Stepan-Norris Professor David S. Meyer Associate Professor Yang Su 2016 © 2016 Dana M. Moss DEDICATION To my husband William Picard, an exceptional partner and a true activist; and to my wonderfully supportive and loving parents, Nancy Watts and John Moss. Thank you for everything, always. ii TABLE OF CONTENTS Page LIST OF ACRONYMS iv LIST OF FIGURES v LIST OF TABLES vi ACKNOWLEDGMENTS vii CURRICULUM VITAE viii ABSTRACT OF THE DISSERTATION xiv INTRODUCTION 1 PART I: THE DYNAMICS OF DIASPORA MOVEMENT EMERGENCE CHAPTER 1: Diaspora Activism before the Arab Spring 30 CHAPTER 2: The Resurgence and Emergence of Transnational Diaspora Mobilization during the Arab Spring 70 PART II: THE ROLES OF THE DIASPORAS IN THE REVOLUTIONS 126 CHAPTER 3: The Libyan Case 132 CHAPTER 4: The Syrian Case 169 CHAPTER 5: The Yemeni Case 219 PART III: SHORT-TERM OUTCOMES OF THE ARAB SPRING CHAPTER 6: The Effects of Episodic Transnational Mobilization on Diaspora Politics 247 CHAPTER 7: Conclusion and Implications 270 REFERENCES 283 ENDNOTES 292 iii LIST OF ACRONYMS FSA Free Syria Army ISIS The Islamic State of Iraq and Al-Sham, or Daesh NFSL National Front for the Salvation
    [Show full text]
  • A Typology of Conflict Dyads and Instruments of Power in Libya, 2014‐Present
    Demystifying Gray Zone Conflict: A Typology of Conflict Dyads and Instruments of Power in Libya, 2014‐Present Report to DHS S&T Office of University Programs and DoD Strategic Multilayer Assessment Branch November 2016 National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence Led by the University of Maryland 8400 Baltimore Ave., Suite 250 • College Park, MD 20742 • 301.405.6600 www.start.umd.edu National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence About This Report The authors of this report are Rachel A. Gabriel, Researcher, and Mila A. Johns, Researcher, at the National Consortium for the Study of Terrorism and Responses to Terrorism (START). Questions about this report should be directed to Barnett S. Koven at [email protected]. This report is part of START project, “Shadows of Violence: Empirical Assessments of Treats, Coercion and Gray Zones,” led by Amy Pate. This research was supported by a Centers of Excellence Supplemental award from the Department of Homeland Security’s Science and Technology Directorate’s Office of University Programs, with funding provided by the Strategic Multilayer Assessment (SMA) Branch of the Department of Defense through grand award number 2012ST061CS0001‐05 made to the National Consortium for the Study of Terrorism and Responses to Terrorism (START). The views and conclusions contained in this document are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied, of the U.S.
    [Show full text]
  • 20202605 ENG Programme for Participants FINAL
    Version – 26 May 2020 INTERNATIONAL DONORS CONFERENCE IN SOLIDARITY WITH VENEZUELAN REFUGEES AND MIGRANTS IN THE COUNTRIES OF THE REGION AMID COVID-19 VIDEOCONFERENCE PROGRAMME 26th MAY 2020 (Subjected to minor changes upon technical issues) Link to streaming in Youtube https://youtu.be/SSzGpNaazoo Contact numbers (+34) 661 664 152 (Spanishl) (+34) 676 181 797 (Spanish and English) (+34) 687 294 878 (Spanish and English) (+34) 657 494 199 (Spanish and English) Contact e-mail To: [email protected] CC: [email protected] Connexion 14:00-15:45 Delegations connect and test their links to the videoconference 15:45 All delegations should be connected to the videoconference room. Welcome 16:00 Minister for Foreign Affairs, European Union and Cooperation of the Kingdom of Spain, Arancha González Laya. (3 mins) 16:03 High Representative and Vice-President of the European Commission, Josep Borrell. (3 mins) 16:06 Welcome by the Secretary-General of the United Nations, António Guterres (video) 16:08 UN High Commissioner for Refugees, Filippo Grandi. 16:11 Director-General of the International Organization for Migration, Antonio Vitorino. 1 Version – 26 May 2020 16:14 Update from the RMRP by Eduardo Stein, Special Joint Representative IOM/UNHCR for the Venezuelan refugees and migrants. HOST COUNTRIES • 3 minutes interventions • Order of intervention: By protocol ranK and if ranK is equal then by number of Venezuelan refugees and migrants hosted in the country. 16:17 Minister for Foreign Affairs of the Republic of Colombia, Claudia Blum. 16:20 Minister for Foreign Affairs of the Republic of Peru, Gustavo Meza-Cuadra.
    [Show full text]
  • ISIS in Libya: a Major Regional and International Threat
    המרכז למורשת המודיעין (מל"מ) מרכז המידע למודיעין ולטרור January 2016 ISIS in Libya: a Major Regional and International Threat ISIS operatives enter the coastal city of Sirte in north-central Libya on February 18, 2015, in a show of strength accompanied by dozens of vehicles (Twitter.com, Nasher.me). Since then ISIS has established itself in Sirte and the surrounding areas, turning the entire region into its Libyan stronghold and a springboard for spreading into other regions. Overview 1. In 2015 ISIS established two strongholds beyond the borders of its power base in Iraq and Syria: the first in the Sinai Peninsula, where it wages determined fighting against the Egyptian security forces. The second is situated in the north- central Libyan city of Sirte and its surroundings, where it has established territorial control and from where it seeks to take over the entire country. It intends to turn Libya into a springboard for terrorism and the subversion of the rest of North Africa, the sub-Saharan countries, and southern Europe. The firm territorial base ISIS constructed in Libya is the only one outside IraQ and Syria, and is potentially a greater regional and international threat. 2. ISIS could establish itself in Libya because of the chaos prevalent after the execution of Muammar Qaddafi. As in Iraq and Syria, the governmental-security vacuum created by the collapse of the central government was filled by nationalist and Islamist organizations, local and regional tribal militias and jihadist organizations. The branch of ISIS in Libya exploited the lack of a functioning government and 209-15 2 the absence of international intervention to establish itself in the region around Sirte and from there to aspire to spread throughout Libya.
    [Show full text]