The Dangerous Landscape: International Perspectives On

Total Page:16

File Type:pdf, Size:1020Kb

The Dangerous Landscape: International Perspectives On THE DANGEROUS LANDSCAPE International Perspectives on Twenty-First Century Terrorism; Transnational Challenge, International Responses Edited by John J. Le Beau Chairman Emeritus, CTWG The Partnership for Peace Consortium’s Combating Terrorism Working Group (CTWG) THE DANGEROUS LANDSCAPE International Perspectives on Twenty-First Century Terrorism; Transnational Challenge, International Responses Analysis and commentary from the Partnership for Peace Consortium’s Combating Terrorism Working Group (CTWG) Edited by John J. Le Beau Chairman Emeritus, CTWG 2013 John J. Le Beau, ed., The Dangerous Landscape: International Perspectives on Twenty-First Century Terrorism; Transnational Challenge, Interna- tional Responses (The Partnership for Peace Consortium’s Combating Terrorism Working Group, 2013). Original version: English, 2013 © The Partnership for Peace Consortium’s Combating Terrorism Working Group (CTWG), 2013 Executive publisher: Procon Ltd., www.procon.bg ISBN 978-954-92521-6-3 FOREWORD 1 A long and ever expanding list of the dead and wounded from Pakistan to Yemen to Libya and Germany suggests that we all live on a dangerous landscape, and occupy an international terrain subject to violent threat. It is an obscure landscape without borders, as the threat is transnational. The armed and dangerous force that counts so many as its enemies, and seeks to include them among its victims, is international terrorism, a long-existing force that explosively made its presence felt internationally in the final decades of the twentieth century and which remains both elusive and active in the twenty-first. Terrorists have extracted their wages in blood from Mumbai, India, to Bali, Indonesia, to Madrid, Spain, to Beslan, Russia and onward to London and New York. Transnational terrorists have taken victims individually (as in the case of movie pro- ducer Theo van Gogh in Holland), by the dozens, by the hundreds, and, in the attacks of 9/11, by the thousands, a butcher’s bill that the terrorists, by their own admission, hope to repeat. Indisputably, most of the victims have been civilians. And predictably, the death of iconic terror leader Osama bin Laden—in Pakistan in 2011—has not lead to the vanquishing of global terrorism as a security threat. Much has been written since 2001 on various aspects of terrorism as well as on the responses of governments around the world to the secu- rity challenge posed by terrorist groups with an international reach and a supra-national agenda. Al Qaeda and its brand-name franchises (such as al Qaeda in the Islamic Maghreb and al Qaeda in the Arabian Penin- sula) undoubtedly represents the most relentlessly publicized and visi- ble example of contemporary international terrorism, but terrorist ac- tivity is carried out by other organizations as well, many (but not all) of which share a largely common political agenda or ideology based on a violent interpretation of Islam. Although the profile of terrorism in the public eye understandably advances and recedes according to the fre- quency and scale of terrorist attacks, the phenomenon of transnational terrorism displays no signs of disappearing in the foreseeable future and, accordingly, merits continued attention, research, analysis and commen- 1 All statements of fact, opinion, or analysis expressed are those of the author and do not reflect the official positions or views of the CIA or any other U.S. Government agency. Nothing in the contents should be construed as asserting or implying U.S. Government authentication of information or Agency endorsement of the author’s views. This material has been reviewed by the CIA to prevent the disclosure of classi- fied information. v vi John J. Le Beau tary, all of which should serve to inform an effective counter-strategy. This book is intended to add a special perspective to the considerable body of literature available. It is a work presenting studies and view- points by authors from several different countries, and the contributors represent a mix of experienced counterterrorism practitioners on the one hand, and recognized academic scholars on the other. This volume developed as a direct result of several meetings of the Partnership for Peace Consortium’s Combating Terrorism Working Group (CTWG) during 2007, 2008 and 2009. The CTWG brings together counterterrorist thinkers from politically, geographically and culturally diverse countries including Afghanistan, Azerbaijan, Georgia, Germany, Pakistan, Croatia, the United States, the United Kingdom, Moldova, Greece, and Bosnia-Herzegovina, among others. As well, the CTWG has hosted and worked together closely with representatives of other inter- national organizations, NATO and the Organization for Security and Co- Operation in Europe (OSCE) figuring prominently in these ranks. Over the past few years, CTWG participants and guests have included repre- sentatives or alumni of the Central Intelligence Agency (CIA), the U.S. Department of State, the Albanian Federal Intelligence Service (SHISH), the German Office for the Protection of the Constitution (BLFV), the Azerbaijan Defense Ministry and the U.S. Naval War College, among other institutions. In short, the body of experience and knowledge represented is impressive by any measure. The present volume attempts to capture some of their thoughts, projections on how terrorism will likely mutate in the future and some proposed countermeasures in the long-term struggle against terrorism. The various authors from this broad variety of backgrounds will not always agree in their assessments of the threat represented by terrorism, or in identifying appropriate tools to mitigate the challenge. But precisely this multiplicity of perspectives should pro- vide the discerning reader with valuable grist for reflection. This book examines a number of important aspects of the terrorism contest, separate but linked. First, we examine the vital issue of jihadist terrorist motivation and recruitment – how an organization such as al Qaeda attracts, radicalizes and screens new members to replace losses in its ranks with an eye to extending its operational and geographic reach. Second, we explore how various countries have employed their respec- tive intelligence (and to some degree, law enforcement) agencies to un- cover terrorist groups and adherents, and how government authorities attempt to disrupt and prevent terrorist activity—including the emerg- ing new challenge of cyber threats—before it takes place. Accordingly, this volume is looking at two sides of the coin: how terrorists organize to Foreword vii promote their cause and fulfill their operational mission, and how vari- ous states organize to prevent these plans and activities from bearing deadly fruit. As noted above, the voices heard in this volume are internationally polyphonous, and represent a broad variety of perspectives. This is en- tirely appropriate when dealing with a threat that is transnational in na- ture, affects numerous geographical regions, and recognizes no man- made frontiers. The jihadist terrorism of the 21st century (which is our primary area of inquiry) is factually a global phenomenon, as a cursory look at the location of successful attacks reveals: Spain, Great Britain, Tunisia, the United States, Indonesia, Turkey, India, Algeria, Pakistan, Thailand, Egypt and Morocco have all suffered significant casualties from terrorist attacks. It is a sad fact that terrorism is not easily defeated and that the list of attacked locations cited above will, doubtless, continue to grow in the future. At the same time, it is to be hoped that the instances of terrorist attacks disrupted and frustrated by counterterrorism forces will grow as well, perhaps even exponentially. It is hoped that this volume can serve as a textbook aid and point of departure for defense academies and institutions interested in including a consideration of terrorism as a contemporary security challenge in their academic programs. With that backdrop, the PfPC Combating Ter- rorism Working Group is pleased to offer the present volume to the in- terested reader. John J. Le Beau, Chairman Emeritus, Combating Terrorism Working Group, Partnership for Peace Consortium CONTENTS Chapter 1 New Blood: The Recruitment of Terrorists...........................................1 Chapter 2 Disrupting Plots and Countering Ideology: Successes, Obstacles and Future Challenges for Intelligence Sharing in the United Kingdom ...............................................................................19 Chapter 3 Internet Forensics and Combating Terrorism..................................37 Chapter 4 A Comprehensive Approach to Cyber Security –Trends, Challenges and the Way Forward..........................................................47 Chapter 5 After Bin Laden: Jihadist Terrorist Use of Strategic Communication to Enlarge the Community of Believers..............63 Chapter 6 Terrorist Innovation: Homegrown Terrorism and the Internet.....................................................................................................79 Chapter 7 Islamic Extremism – Analyzing the Risks ...........................................87 Chapter 8 Violent Converts to Islam: Growing Cluster and Rising Trend...99 Chapter 9 Challenges of Intelligence Sharing in Combating Terrorism: An Academic Point of View.................................................................... 123 Chapter 10 International Intelligence Cooperation against Terrorist Targets – Phase II.....................................................................................
Recommended publications
  • TASK FORCE the Donald C
    HENRY M. JACKSON SCHOOL OF INTERNATIONAL STUDIES UNIVERSITY of WASHINGTON TASK FORCE The Donald C. Hellmann Task Force Program Preventing ISIL’S Rebirth Through a Greater Understanding of Radicalization: A Case Study of ISIL Foreign Fighters 2020 Preventing ISIL’s Rebirth Through A Greater Understanding of Radicalization: A Case Study of ISIL Foreign Fighters Evaluator Corinne Graff, Ph.D. Senior Advisor, Conflict Prevention and Fragility United States Institute of Peace (USIP) Faculty Advisor Denis Bašić, Ph.D. ~ Coordinator Orla Casey Editor Audrey Conrad Authors Orla Casey Audrey Conrad Devon Fleming Olympia Hunt Manisha Jha Fenyun Li Hannah Reilly Haley Rogers Aliye Volkan Jaya Wegner Our Task Force would like to express our gratitude towards Professor Denis Bašić, without whom this Task Force would not have been possible. Thank you for your guidance, expertise, and abundance of knowledge. We appreciate you always pushing us further towards a deeper understanding. TABLE OF CONTENTS Executive Summary……………………………………………………………………………….2 The Rise of ISIL and Foreign Fighters…………………………………………………………....3 Section I: Middle Eastern and North African ISIL Recruitment Saudi Arabia…………………………………………………………...………………………….7 Tunisia………………………………………………………………………………………...…13 Morocco………………………………………………………………………………………….15 Libya……………………………………………………………………………………………..17 Egypt……………………………………………………………………………………………..21 Jordan……………………………………………………………………………………………25 Lebanon………………………………………………………………………………………….30 Turkey……………………………………………………………………………………………34 Section II: South
    [Show full text]
  • Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
    Order Code RL32114 Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Updated January 29, 2008 Clay Wilson Specialist in Technology and National Security Foreign Affairs, Defense, and Trade Division Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Summary Cybercrime is becoming more organized and established as a transnational business. High technology online skills are now available for rent to a variety of customers, possibly including nation states, or individuals and groups that could secretly represent terrorist groups. The increased use of automated attack tools by cybercriminals has overwhelmed some current methodologies used for tracking Internet cyberattacks, and vulnerabilities of the U.S. critical infrastructure, which are acknowledged openly in publications, could possibly attract cyberattacks to extort money, or damage the U.S. economy to affect national security. In April and May 2007, NATO and the United States sent computer security experts to Estonia to help that nation recover from cyberattacks directed against government computer systems, and to analyze the methods used and determine the source of the attacks.1 Some security experts suspect that political protestors may have rented the services of cybercriminals, possibly a large network of infected PCs, called a “botnet,” to help disrupt the computer systems of the Estonian government. DOD officials have also indicated that similar cyberattacks from individuals and countries targeting economic,
    [Show full text]
  • Turkey 2020 Website.Indd
    TURKEY Quick Facts Population: 82,017,514 (July 2020 est.) Area: 783,562 sq km Ethnic Groups: Turkish 70-75%, Kurdish 19%, other minorities 7-12% (2016 est.) Government Type: Presidential republic GDP (official exchange rate): $851.5 billion (2017 est.) Source: CIA World FactBook (Last Updated August 2020) INTRODUCTION While Turkey remains a nominally secular republic, political Islam has been ascendant in the country since the military coup of 1980. The consolidation of power by Recep Tayyip Erdogan’s Justice and Development Party in the past 15 years, however, has led to the gradual weakening of secularism and the promotion of political Islam in Turkish public life. Political Islam has become increasingly visible at the grassroots level, as pious Turks enjoy growing representation in the political process. In parallel, the mounting authoritarian tendencies of the Turkish government have stifled political opposition. The transformation of Turkey from a parliamentary to a presidential system of government in a 2017 referendum has ensured, for the time being, that Erdogan’s political agenda faces no serious domestic challenges. That said, following the fallout with the Gülen Movement with whose support Erdoğan came to power, he has been forced into an uneasy alliance with domestic ultra-nationalists. This has not diminished Erdoğan’s Islamism, however, but rather injected it with greater doses of Turkish nationalism. Turkey’s foreign policy has been transformed accordingly. Following the 2011 Arab Spring uprisings, Turkey actively intervened to secure the victory of political Islam across the Middle East and North Africa, lending support especially to the Muslim Brotherhood and affiliated organizations.
    [Show full text]
  • Intelligence Services in the National Security System: the Case Of
    ELIAMEP Occasional Papers OP07.03 INTELLIGENCE SERVICES IN THE NATIONAL SECURITY SYSTEM : THE CASE OF EYP OP07.03 by Pavlos Apostolidis1 1 Ambassador (ret.), former Director of the National Intelligence Service (1999-2004) & Special Advisor of ELIAMEP - 1 - ELIAMEP Occasional Papers OP07.03 Copyright © 2007 HELLENIC FOUNDATION FOR EUROPEAN AND FOREIGN POLICY (ELIAMEP) All rights reserved ISBN 978-960-8356-22-1 INTELLIGENCE SERVICES IN THE NATIONAL SECURITY SYSTEM : THE CASE OF EYP by Pavlos Apostolidis Ambassador (ret.), former Director of the National Intelligence Service (1999-2004) Special Advisor of ELIAMEP OP07.03 HELLENIC FOUNDATION FOR EUROPEAN & FOREIGN POLICY (ELIAMEP) 49 Vas. Sofias Av. 106 76 Athens, Greece Τel: (+30) 210 7257110 Fax: (+30) 210 7257114 e-mail: [email protected] url: http://www.eliamep.gr _______________________________________________________________ The Hellenic Foundation for European and Foreign Policy (ELIAMEP) was founded in 1988 and operates as an independent, non- profit, policy- oriented research and training institute. It functions as a forum of debate on international issues, as an information centre, as well as a point of contact for experts and policymakers. Over the years, ELIAMEP has developed into and influential think-tank on foreign policy and international relations issues. ELIAMEP neither expresses, nor represents, any specific political party view. It is only devoted to the right of free and well- documented discourse. 2 ELIAMEP Occasional Papers OP07.03 INTRODUCTION In February 2006, the Greek Government divulged at a press conference that a large number of Vodafone mobile telephones belonging to members of the Government, the Security Services and others, had been illegally tapped.
    [Show full text]
  • Jihadism: Online Discourses and Representations
    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-ND 4.0 1 Studying Jihadism 2 3 4 5 6 Volume 2 7 8 9 10 11 Edited by Rüdiger Lohlker 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 The volumes of this series are peer-reviewed. 37 38 Editorial Board: Farhad Khosrokhavar (Paris), Hans Kippenberg 39 (Erfurt), Alex P. Schmid (Vienna), Roberto Tottoli (Naples) 40 41 Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-ND 4.0 1 Rüdiger Lohlker (ed.) 2 3 4 5 6 7 Jihadism: Online Discourses and 8 9 Representations 10 11 12 13 14 15 16 17 With many figures 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 & 37 V R unipress 38 39 Vienna University Press 40 41 Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-ND 4.0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 Bibliographic information published by the Deutsche Nationalbibliothek The Deutsche Nationalbibliothek lists this publication in the Deutsche Nationalbibliografie; 24 detailed bibliographic data are available online: http://dnb.d-nb.de.
    [Show full text]
  • The Path to Terrorism: the Islamic State and Its Recruitment Strategies
    University of Connecticut OpenCommons@UConn Honors Scholar Theses Honors Scholar Program Spring 5-1-2018 The aP th to Terrorism: The slI amic State and Its Recruitment Strategies Laura Turner [email protected] Follow this and additional works at: https://opencommons.uconn.edu/srhonors_theses Part of the International Relations Commons, Near and Middle Eastern Studies Commons, and the Terrorism Studies Commons Recommended Citation Turner, Laura, "The aP th to Terrorism: The slI amic State and Its Recruitment Strategies" (2018). Honors Scholar Theses. 585. https://opencommons.uconn.edu/srhonors_theses/585 1 The University of Connecticut The Path to Terrorism: The Islamic State and Its Recruitment Strategies Laura Turner Honors Senior Thesis Advisor: Professor Jeremy Pressman Individualized & Interdisciplinary Studies Program 19 April 2018 2 Introduction 13,488 terrorist attacks occurred around the world in 2016.i 1,468 of these, or 10.9%, were perpetrated by the Islamic State.1 The Islamic State (IS), also known as the Islamic State in Iraq and Syria (ISIS) or the Islamic State in Iraq and the Levant (ISIL), is an extremely violent Islamist terrorist organization that follows Salafism, a strict interpretation of Sunni Islam. The group’s ultimate goal is to establish a worldwide caliphate, or a state governed by Islamic law. ISIS is rooted in Abu Musad al-Zarqawi’s Al Qaeda in Iraq, a militant organization so extreme and violent that even Al Qaeda’s leadership criticized its methods and eventually renounced connections with the group. When Zarqawi was killed by a U.S. airstrike in 2006, Abu Ayyub al Masri became the leader of the group and renamed it the Islamic State in Iraq (ISI).
    [Show full text]
  • Australian Foreign Fighters: Risks and Responses
    Australian foreign fighters: Andrew Zammit Risks and responses April 2015 AUSTRALIAN FOREIGN FIGHTERS: RISKS AND RESPONSES The Lowy Institute for International Policy is an independent policy think tank. Its mandate ranges across all the dimensions of international policy debate in Australia – economic, political and strategic – and it is not limited to a particular geographic region. Its two core tasks are to: • produce distinctive research and fresh policy options for Australia’s international policy and to contribute to the wider international debate. • promote discussion of Australia’s role in the world by providing an accessible and high-quality forum for discussion of Australian international relations through debates, seminars, lectures, dialogues and conferences. Lowy Institute Analyses are short papers analysing recent international trends and events and their policy implications. The views expressed in this paper are entirely the author’s own and not those of the Lowy Institute for International Policy. AUSTRALIAN FOREIGN FIGHTERS: RISKS AND RESPONSES EXECUTIVE SUMMARY Conflicts in Syria and Iraq have attracted aspiring jihadists from across the world. Australians have joined the flow of foreign fighters to the region, raising concerns that some will carry out terrorist attacks in Australia should they return home. The record of past jihadist foreign fighter mobilisations, including Australia's own history in this regard, demonstrates that there is a potential threat to Australia’s security. However, a range of factors will shape that threat, including how Australia responds to returning foreign fighters. The Government's response has mainly focused on increased resources and powers for police and intelligence agencies, but also includes an important non-coercive element termed Countering Violent Extremism (CVE) that has received less attention.
    [Show full text]
  • CTC Sentinel Objective
    FEBRUARY 2011 . VOL 4 . ISSUE 2 COMBATING TERRORISM CENTER AT WEST POINT CTC SentineL OBJECTIVE . RELEVANT . RIGOROUS Contents The Muslim Brotherhood’s FEATURE ARTICLE 1 The Muslim Brotherhood’s Role in Role in the Egyptian Revolution the Egyptian Revolution By Steven Brooke and Shadi Hamid By Steven Brooke and Shadi Hamid REPORTS 4 Revolution in Tunisia and Egypt: A Blow to the Jihadist Narrative? By Nelly Lahoud 5 AQIM’s Objectives in North Africa By Geoff D. Porter 9 The Tribal Allegiance System Within AQIM By Mathieu Guidere 11 The Violent Shift in Hizb al-Tahrir’s Rhetoric By Madeleine Gruen 14 Baltimore’s Jamaat al-Muslimeen: Promoting a Radical but Disciplined Message on Jihad By J.M. Berger 17 Recent Highlights in Terrorist Activity 20 CTC Sentinel Staff & Contacts An Egyptian anti-government protester celebrates in Cairo’s Tahrir Square on February 12, 2011. - Photo by Patrick Baz/AFP/Getty Images n february 11, 2011, Egypt had Missing from the discussion is an attempt its revolution when President to put the Brotherhood’s actions during Hosni Mubarak finally the protests in historical perspective. stepped down after 18 days Doing so reveals that the Brotherhood’s Oof massive protests. With the military cautious approach to the protests over taking control and promising a transition the last few tumultuous weeks has been to democracy, the question of what in large part an extension of the group’s comes next has acquired a particular strategy of the past decades: a preference urgency. Specifically, Western fears of for incremental rather than revolutionary About the CTC Sentinel the Muslim Brotherhood stepping into change, caution and pragmatism, and The Combating Terrorism Center is an the political vacuum have re-energized close cooperation with other Egyptian independent educational and research a longstanding debate about the role of political actors.
    [Show full text]
  • The Nutshell Studies of Unexplained Death Stephanie Witt
    School of Graduate and Professional Studies 100 Campus Circle, Owings Mills, Maryland 21117 1-877-468-6852 accelerate.stevenson.edu STEVENSON UNIVERSITY FORENSICS JOURNAL VOLUME 4 EDITORIAL BOARD EDITOR-IN-CHIEF Carolyn Hess Johnson, Esq. PUBLISHER Carolyn Hess Johnson, Esq. EDITORS Abigail Howell Stephanie Witt COVER PHOTO Bruce Goldfarb Assistant to the Chief Medical Examiner, Maryland DESIGN & LAYOUT Chip Burkey Cassandra Bates Stevenson University Marketing and Public Relations Office Copyright © 2013, author(s) and Stevenson University Forensics Journal. No permission is given to copy, distribute or reproduce this article in any format without prior explicit written permission from the article’s author(s) who hold exclusive rights to impose usage fee or royalties. FORENSICS JOURNAL Welcome to our fourth annual Stevenson University Forensics Journal. This year, as always, we bring fresh voices and perspectives from all aspects and areas of the field. I am pleased to note that a new section has been added this year, highlighting the process of library research in the vast field of Forensic Studies. Our Stevenson University librarians bring the research pro- cess into the twenty-first century by showcasing a variety of on-line resources available to researchers. Also of note is the connection between our cover photo and the interview conducted with Dr. David Fowler, Chief Medical Examiner for the State of Maryland. Assistant Editor Stephanie Witt joins the Journal as a contributor to explain the fascinating Nutshell Series of Unexplained Deaths. We are privileged this year to have the Honorable Lynne A. Battaglia providing her insights into the Court’s perspective on the prominent role of forensic evidence in modern litigation.
    [Show full text]
  • 1 Statement Regarding the Succession in the Leadership Of
    Statement Regarding the Succession in the Leadership of Qaida't al-Jihad June 16, 2011 [Please note: Images may have been removed from this document. Page numbers have been added.] On June 16, 2011, Al-Qaida's General Command released a statement announcing "the undertaking of responsibility of Amir of the group by Shaykh Dr. Abu Muhammad Ayman al- Zawahiri." The communication also stated, "We support and back the revolution of our Muslim, oppressed and suppressed peoples that have risen in the face of the unjust, corrupt tyrants, after they tortured our Ummah in Egypt, Tunisia, Libya, Yemen, Ash-Sham, and al- Maghreb. And we encourage them and encourage the rest of the Muslim people to rise and continue resistance, sacrifice and persistence...until...true, full and anticipated change comes, which will not be achieved except by the Islamic Ummah's return to the Sharia of its Lord..." [Shaykh Ayman al-Zawahiri, may Allah protect him] [Verse] [Hadith] "With hearts content with Allah's will and fate, reassured before the promise of Allah, the Most Glorified, and the goodness of his rewards, the Islamic Ummah and the Mujahideen in Qaida't al-Jihad Group and others received the news of the martyrdom of the reviving, Mujahid, migrant, steadfast Imam Shaykh Usama bin Muhammad bin Laden, may Allah have wide mercy on him; asking the Lord, raised and glorified, to raise his degrees and reward him on behalf of us and the Islamic Ummah the best of rewards." "This and since Jihad is ongoing until the Day of Judgment—as mentioned in Hadiths—and in this era has become an individual duty against the disbelievers who invaded the Muslim homelands, and against the apostate rulers who replaced the Sharia of Islam—just as the scholars of Islam have had consensus over.
    [Show full text]
  • Between Islamization and Secession: the Contest for Northern Mali
    JULY 2012 . VOL 5 . ISSUE 7 Contents Between Islamization and FEATURE ARTICLE 1 Between Islamization and Secession: Secession: The Contest for The Contest for Northern Mali By Derek Henry Flood Northern Mali REPORTS By Derek Henry Flood 6 A Profile of AQAP’s Upper Echelon By Gregory D. Johnsen 9 Taliban Recruiting and Fundraising in Karachi By Zia Ur Rehman 12 A Biography of Rashid Rauf: Al-Qa`ida’s British Operative By Raffaello Pantucci 16 Mexican DTO Influence Extends Deep into United States By Sylvia Longmire 19 Information Wars: Assessing the Social Media Battlefield in Syria By Chris Zambelis 22 Recent Highlights in Terrorist Activity 24 CTC Sentinel Staff & Contacts An Islamist fighter from the Movement for Unity and Jihad in West Africa in the city of Gao on July 16, 2012. - AFP/Getty Images n january 17, 2012, a rebellion 22, disgruntled Malian soldiers upset began in Mali when ethnic about their lack of support staged a coup Tuareg fighters attacked a d’état, overthrowing the democratically Malian army garrison in the elected government of President Amadou Oeastern town of Menaka near the border Toumani Touré. with Niger.1 In the conflict’s early weeks, the ethno-nationalist rebels of the By April 1, all Malian security forces had National Movement for the Liberation evacuated the three northern regions of of Azawad (MNLA)2 cooperated and Kidal, Gao and Timbuktu. They relocated About the CTC Sentinel sometimes collaborated with Islamist to the garrisons of Sévaré, Ségou, and The Combating Terrorism Center is an fighters of Ansar Eddine for as long as as far south as Bamako.4 In response, independent educational and research the divergent movements had a common Ansar Eddine began to aggressively institution based in the Department of Social enemy in the Malian state.3 On March assert itself and allow jihadists from Sciences at the United States Military Academy, regional Islamist organizations to West Point.
    [Show full text]
  • Radical Milieus and Salafis Movements in France: Ideologies, Practices, Relationships with Society and Political Visions
    MWP 2014 /13 Max Weber Programme Radical Milieus and Salafis Movements in France: Ideologies, Practices, Relationships with Society and Political Visions AuthorMohamed-Ali Author Adraouiand Author Author European University Institute Max Weber Programme Radical Milieus and Salafis Movements in France: Ideologies, Practices, Relationships with Society and Political Visions Mohamed-Ali Adraoui EUI Working Paper MWP 2014/13 This text may be downloaded for personal research purposes only. Any additional reproduction for other purposes, whether in hard copy or electronically, requires the consent of the author(s), editor(s). If cited or quoted, reference should be made to the full name of the author(s), editor(s), the title, the working paper or other series, the year, and the publisher. ISSN 1830-7728 © Mohamed-Ali Adraoui, 2014 Printed in Italy European University Institute Badia Fiesolana I – 50014 San Domenico di Fiesole (FI) Italy www.eui.eu cadmus.eui.eu Abstract This paper deals mainly with the issue of radical Islam within French society over recent decades. More particularly, this study illustrates evolutions and the radicalization processes among some militant Islamic groups in this country since the end of the 1970s. Focusing on connections between geopolitical issues born in the Arab world and their implications within a predominantly non Muslim society, enables highlighting the centrality of some actors and currents that have been the impulse for the emergence of a radical and militant activism in France. Some specific attention is paid to Salafist movements, whether they are primarily interested in political protest or whether they desire first to break with the rest of society in order to purify their beliefs and social relations.This paper has to do with the political vision, strategies, history and sociology of Islamic radical militancy in France.
    [Show full text]