Jihadist Terrorism and Other Unconventional Threats
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Page 01 May 16.Indd
www.thepeninsulaqatar.com BUSINESS | 21 SPORT | 34 300 Chinese firms to Al Hamad completeses take part in Made in 12-hour endurancee China expo challenge MONDAY 16 MAY 2016 • 9 SHA’BAAN 1437 • Volume 21 • Number 6798 thepeninsulaqatar @peninsulaqatar @peninsula_qatar OPINION Quality certificate Emir meets Eni CEO must for importing building materials Dr. Khalid Al-Shafi Editor-in-Chief materials entering the country,” said Al QU President... Kuwari, addressing a press conference The Ministry will yesterday. a job well-done soon start issuing “We are monitoring the entry points specification certificates and taking samples from imported con- atar University is the struction materials,” he added. sole national university for gabbro and The Qatar General Organisation for Qto which every Qatari limestone in line with Standardization (QS) at the ministry has (leadership and people) attribute asked producers of gabbro, limestone being great appreciation and respect. the Qatar Construction exported to Qatar to provide their prod- Emir H H Sheikh Tamim bin Hamad Al Thani with Eni CEO Claudio Descalzi at Al Bahr Palace There is no doubt that the uni- Specifications (QCS). uct profile to check compliance with the yesterday. They reviewed cooperation in the field of energy. versity has faced, during the specifications. recent period a time of admin- Dr Al Kuwari said that at the beginning istrative sluggishness which has of the implementation of QCS, some con- led to delays in effecting impor- By Mohammed Osman sidered it as an obstacle causing delays but Emir’s message to tant decisions which might have The Peninsula now it is being appreciated by everyone. -
BOKO HARAM Emerging Threat to the U.S
112TH CONGRESS COMMITTEE " COMMITTEE PRINT ! 1st Session PRINT 112–B BOKO HARAM Emerging Threat to the U.S. Homeland SUBCOMMITTEE ON COUNTERTERRORISM AND INTELLIGENCE COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES December 2011 FIRST SESSION U.S. GOVERNMENT PRINTING OFFICE 71–725 PDF WASHINGTON : 2011 COMMITTEE ON HOMELAND SECURITY PETER T. KING, New York, Chairman LAMAR SMITH, Texas BENNIE G. THOMPSON, Mississippi DANIEL E. LUNGREN, California LORETTA SANCHEZ, California MIKE ROGERS, Alabama SHEILA JACKSON LEE, Texas MICHAEL T. MCCAUL, Texas HENRY CUELLAR, Texas GUS M. BILIRAKIS, Florida YVETTE D. CLARKE, New York PAUL C. BROUN, Georgia LAURA RICHARDSON, California CANDICE S. MILLER, Michigan DANNY K. DAVIS, Illinois TIM WALBERG, Michigan BRIAN HIGGINS, New York CHIP CRAVAACK, Minnesota JACKIE SPEIER, California JOE WALSH, Illinois CEDRIC L. RICHMOND, Louisiana PATRICK MEEHAN, Pennsylvania HANSEN CLARKE, Michigan BEN QUAYLE, Arizona WILLIAM R. KEATING, Massachusetts SCOTT RIGELL, Virginia KATHLEEN C. HOCHUL, New York BILLY LONG, Missouri VACANCY JEFF DUNCAN, South Carolina TOM MARINO, Pennsylvania BLAKE FARENTHOLD, Texas MO BROOKS, Alabama MICHAEL J. RUSSELL, Staff Director & Chief Counsel KERRY ANN WATKINS, Senior Policy Director MICHAEL S. TWINCHEK, Chief Clerk I. LANIER AVANT, Minority Staff Director (II) C O N T E N T S BOKO HARAM EMERGING THREAT TO THE U.S. HOMELAND I. Introduction .......................................................................................................... 1 II. Findings .............................................................................................................. -
The Nairobi Attack and Al-Shabab's Media Strategy
OCTOBER 2013 . VOL 6 . ISSUE 10 Contents The Nairobi Attack and FEATURE ARTICLE 1 The Nairobi Attack and Al-Shabab’s Al-Shabab’s Media Strategy Media Strategy By Christopher Anzalone By Christopher Anzalone REPORTS 6 The Dutch Foreign Fighter Contingent in Syria By Samar Batrawi 10 Jordanian Jihadists Active in Syria By Suha Philip Ma’ayeh 13 The Islamic Movement and Iranian Intelligence Activities in Nigeria By Jacob Zenn 19 Kirkuk’s Multidimensional Security Crisis By Derek Henry Flood 22 The Battle for Syria’s Al-Hasakah Province By Nicholas A. Heras 25 Recent Highlights in Terrorist Activity 28 CTC Sentinel Staff & Contacts Kenyan soldiers take positions outside the Westgate Mall in Nairobi on September 21, 2013. - Photo by Jeff Angote/Getty Images fter carrying out a bold Godane. The attack also followed a attack inside the upscale year in which al-Shabab lost control Westgate Mall in Nairobi in of significant amounts of territory in September 2013, the Somali Somalia, most importantly major urban Amilitant group al-Shabab succeeded in and economic centers such as the cities recapturing the media spotlight. This of Baidoa and Kismayo. was in large part due to the nature of the attack, its duration, the difficulty This article examines al-Shabab’s About the CTC Sentinel in resecuring the mall, the number of media strategy during and immediately The Combating Terrorism Center is an casualties, and al-Shabab’s aggressive after the Westgate Mall attack, both independent educational and research media campaign during and immediately via micro-blogging on Twitter through institution based in the Department of Social after the attack.1 its various accounts as well as more Sciences at the United States Military Academy, traditional media formats such as West Point. -
L'espansionismo Jihadista Dell'is (“Stato Islamico”) Nell'area
CENTRO ALTI STUDI CENTRO MILITARE PER LA DIFESA DI STUDI STRATEGICI Dr. Marco COCHI L’espansionismo jihadista dell’IS (“Stato Islamico”) nell’area sub- sahariana e del sud-est pacifico (codice AI-SA-16) ∞ Il Centro Militare di Studi Strategici (CeMiSS) è un organismo istituito nel 1987 che gestisce, nell’ambito e per conto della Difesa, la ricerca su temi di carattere strategico. Tale attività permette di accedere, valorizzandoli, a strumenti di conoscenza ed a metodologie di analisi indispensabili per dominare la complessità degli attuali scenari e necessari per il raggiungimento degli obiettivi che le Forze Armate, e più in generale la collettività nazionale, si pongono in tema di sicurezza e difesa. La mission del Centro, infatti, nasce dalla ineludibile necessità del Ministero della Difesa di svolgere un ruolo di soggetto attivo all’interno del mondo della cultura e della conoscenza scientifica interagendo efficacemente con tale realtà, contribuendo quindi a plasmare un contesto culturale favorevole, agevolando la conoscenza e la comprensione delle problematiche di difesa e sicurezza, sia presso il vasto pubblico che verso opinion leader di riferimento. Più in dettaglio, il Centro: effettua studi e ricerche di carattere strategico politico-militare; sviluppa la collaborazione tra le Forze Armate e le Università, centri di ricerca italiani, stranieri ed Amministrazioni Pubbliche; forma ricercatori scientifici militari; promuove la specializzazione dei giovani nel settore della ricerca; pubblica e diffonde gli studi di maggiore interesse. Le attività di studio e di ricerca sono prioritariamente orientate al soddisfacimento delle esigenze conoscitive e decisionali dei Vertici istituzionali della Difesa, riferendosi principalmente a situazioni il cui sviluppo può determinare significative conseguenze anche nella sfera della sicurezza e difesa. -
NSA's Efforts to Secure Private-Sector Telecommunications Infrastructure
Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure Susan Landau* INTRODUCTION When Google discovered that intruders were accessing certain Gmail ac- counts and stealing intellectual property,1 the company turned to the National Security Agency (NSA) for help in securing its systems. For a company that had faced accusations of violating user privacy, to ask for help from the agency that had been wiretapping Americans without warrants appeared decidedly odd, and Google came under a great deal of criticism. Google had approached a number of federal agencies for help on its problem; press reports focused on the company’s approach to the NSA. Google’s was the sensible approach. Not only was NSA the sole government agency with the necessary expertise to aid the company after its systems had been exploited, it was also the right agency to be doing so. That seems especially ironic in light of the recent revelations by Edward Snowden over the extent of NSA surveillance, including, apparently, Google inter-data-center communications.2 The NSA has always had two functions: the well-known one of signals intelligence, known in the trade as SIGINT, and the lesser known one of communications security or COMSEC. The former became the subject of novels, histories of the agency, and legend. The latter has garnered much less attention. One example of the myriad one could pick is David Kahn’s seminal book on cryptography, The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet.3 It devotes fifty pages to NSA and SIGINT and only ten pages to NSA and COMSEC. -
Breaking Boko Haram and Ramping up Recovery: US-Lake Chad Region 2013-2016
From Pariah to Partner: The US Integrated Reform Mission in Burma, 2009 to 2015 Breaking Boko Haram and Ramping Up Recovery Making Peace Possible US Engagement in the Lake Chad Region 2301 Constitution Avenue NW 2013 to 2016 Washington, DC 20037 202.457.1700 Beth Ellen Cole, Alexa Courtney, www.USIP.org Making Peace Possible Erica Kaster, and Noah Sheinbaum @usip 2 Looking for Justice ACKNOWLEDGMENTS This case study is the product of an extensive nine- month study that included a detailed literature review, stakeholder consultations in and outside of government, workshops, and a senior validation session. The project team is humbled by the commitment and sacrifices made by the men and women who serve the United States and its interests at home and abroad in some of the most challenging environments imaginable, furthering the national security objectives discussed herein. This project owes a significant debt of gratitude to all those who contributed to the case study process by recommending literature, participating in workshops, sharing reflections in interviews, and offering feedback on drafts of this docu- ment. The stories and lessons described in this document are dedicated to them. Thank you to the leadership of the United States Institute of Peace (USIP) and its Center for Applied Conflict Transformation for supporting this study. Special thanks also to the US Agency for International Development (USAID) Office of Transition Initiatives (USAID/OTI) for assisting with the production of various maps and graphics within this report. Any errors or omis- sions are the responsibility of the authors alone. ABOUT THE AUTHORS This case study was produced by a team led by Beth ABOUT THE INSTITUTE Ellen Cole, special adviser for violent extremism, conflict, and fragility at USIP, with Alexa Courtney, Erica Kaster, The United States Institute of Peace is an independent, nonpartisan and Noah Sheinbaum of Frontier Design Group. -
The Afghanistan-Pakistan Wars, 2008–2009: Micro-Geographies, Conflict Diffusion, and Clusters of Violence
The Afghanistan-Pakistan Wars, 2008–2009: Micro-geographies, Conflict Diffusion, and Clusters of Violence John O’Loughlin, Frank D. W. Witmer, and Andrew M. Linke1 Abstract: A team of political geographers analyzes over 5,000 violent events collected from media reports for the Afghanistan and Pakistan conflicts during 2008 and 2009. The violent events are geocoded to precise locations and the authors employ an exploratory spatial data analysis approach to examine the recent dynamics of the wars. By mapping the violence and examining its temporal dimensions, the authors explain its diffusion from traditional foci along the border between the two countries. While violence is still overwhelmingly concentrated in the Pashtun regions in both countries, recent policy shifts by the American and Pakistani gov- ernments in the conduct of the war are reflected in a sizeable increase in overall violence and its geographic spread to key cities. The authors identify and map the clusters (hotspots) of con- flict where the violence is significantly higher than expected and examine their shifts over the two-year period. Special attention is paid to the targeting strategy of drone missile strikes and the increase in their number and geographic extent by the Obama administration. Journal of Economic Literature, Classification Numbers: H560, H770, O180. 15 figures, 1 table, 113 ref- erences. Key words: Afghanistan, Pakistan, Taliban, Al- Qaeda, insurgency, Islamic terrorism, U.S. military, International Security Assistance Forces, Durand Line, Tribal Areas, Northwest Frontier Province, ACLED, NATO. merica’s “longest war” is now (August 2010) nearing its ninth anniversary. It was Alaunched in October 2001 as a “war of necessity” (Barack Obama, August 17, 2009) to remove the Taliban from power in Afghanistan, and thus remove the support of this regime for Al-Qaeda, the terrorist organization that carried out the September 2001 attacks in the United States. -
Testimony of Thomas Joscelyn Senior Fellow, Foundation for Defense Of
Testimony of Thomas Joscelyn Senior Fellow, Foundation for Defense of Democracies Senior Editor, The Long War Journal Before the House Committee on Foreign Affairs Subcommittee on Terrorism, Nonproliferation, and Trade United States Congress “Global al-Qaeda: Affiliates, Objectives, and Future Challenges” July 18, 2013 1 Chairman Poe, Ranking Member Sherman and members of the Committee, thank you for inviting me here today to discuss the threat posed by al Qaeda. We have been asked to “examine the nature of global al Qaeda today.” In particular, you asked us to answer the following questions: “What is [al Qaeda’s] makeup? Is there a useful delineation between al Qaeda’s core and its affiliates? If so, what is the relationship? Most importantly, what is the threat of al Qaeda to the United States today?” I provide my answers to each of these questions in the following sections. But first, I will summarize my conclusions: • More than a decade after the September 11, 2001, terrorist attacks there is no commonly accepted definition of al Qaeda. There is, in fact, widespread disagreement over what exactly al Qaeda is. • In my view, al Qaeda is best defined as a global international terrorist network, with a general command in Afghanistan and Pakistan and affiliates in several countries. Together, they form a robust network that, despite setbacks, contests for territory abroad and still poses a threat to U.S. interests both overseas and at home. • It does not make sense to draw a firm line between al Qaeda’s “core,” which is imprecisely defined, and the affiliates. -
The Jihadi Industry: Assessing the Organizational, Leadership And
The Jihadi Industry: Assessing the Organizational, Leadership, and Cyber Profiles Report to the Office of University Programs, Science and Technology Directorate, U.S. Department of Homeland Security July 2017 National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence Led by the University of Maryland 8400 Baltimore Ave., Suite 250 • College Park, MD 20742 • 301.405.6600 www.start.umd.edu National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence About This Report The authors of this report are Gina Ligon, Michael Logan, Margeret Hall, Douglas C. Derrick, Julia Fuller, and Sam Church at the University of Nebraska, Omaha. Questions about this report should be directed to Dr. Gina Ligon at [email protected]. This report is part of the National Consortium for the Study of Terrorism and Responses to Terrorism (START) project, “The Jihadi Industry: Assessing the Organizational, Leadership, and Cyber Profiles” led by Principal Investigator Gina Ligon. This research was supported by the Department of Homeland Security Science and Technology Directorate’s Office of University Programs through Award Number #2012-ST-061-CS0001, Center for the Study of Terrorism and Behavior (CSTAB 1.12) made to START to investigate the role of social, behavioral, cultural, and economic factors on radicalization and violent extremism. The views and conclusions contained in this document are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied, of the U.S. -
Preventing Violent Extremism in Kyrgyzstan
UNITED STATES INSTITUTE OF PEACE www.usip.org SPECIAL REPORT 2301 Constitution Ave., NW • Washington, DC 20037 • 202.457.1700 • fax 202.429.6063 ABOUT THE REPORT Jacob Zenn and Kathleen Kuehnast This report offers perspectives on the national and regional dynamics of violent extremism with respect to Kyrgyzstan. Derived from a study supported by the United States Institute of Peace (USIP) to explore the potential for violent extremism in Central Asia, it is based on extensive interviews and a Preventing Violent countrywide Peace Game with university students at Kyrgyz National University in June 2014. Extremism in Kyrgyzstan ABOUT THE AUTHORS Jacob Zenn is an analyst on Eurasian and African affairs, a legal adviser on international law and best practices related to civil society and freedom of association, and a nonresident research Summary fellow at the Center of Shanghai Cooperation Organization Studies in China, the Center of Security Programs in Kazakhstan, • Kyrgyzstan, having twice overthrown autocratic leaders in violent uprisings, in 2005 and again and The Jamestown Foundation in Washington, DC. Dr. Kathleen in 2010, is the most politically open and democratic country in Central Asia. Kuehnast is a sociocultural anthropologist and an expert on • Many Kyrgyz observers remain concerned about the country’s future. They fear that underlying Kyrgyzstan, where she conducted field work in the early 1990s. An adviser on the Central Asia Fellows Program at the socioeconomic conditions and lack of public services—combined with other factors, such as Elliott School of International Affairs at George Washington drug trafficking from Afghanistan, political manipulation, regional instability in former Soviet University, she is a member of the Council on Foreign Union countries and Afghanistan, and foreign-imported religious ideologies—create an envi- Relations and has directed the Center for Gender and ronment in which violent extremism can flourish. -
On Security and Privacy for Networked Information Society
Antti Hakkala On Security and Privacy for Networked Information Society Observations and Solutions for Security Engineering and Trust Building in Advanced Societal Processes Turku Centre for Computer Science TUCS Dissertations No 225, November 2017 ON SECURITY AND PRIVACY FOR NETWORKED INFORMATIONSOCIETY Observations and Solutions for Security Engineering and Trust Building in Advanced Societal Processes antti hakkala To be presented, with the permission of the Faculty of Mathematics and Natural Sciences of the University of Turku, for public criticism in Auditorium XXII on November 18th, 2017, at 12 noon. University of Turku Department of Future Technologies FI-20014 Turun yliopisto 2017 supervisors Adjunct professor Seppo Virtanen, D. Sc. (Tech.) Department of Future Technologies University of Turku Turku, Finland Professor Jouni Isoaho, D. Sc. (Tech.) Department of Future Technologies University of Turku Turku, Finland reviewers Professor Tuomas Aura Department of Computer Science Aalto University Espoo, Finland Professor Olaf Maennel Department of Computer Science Tallinn University of Technology Tallinn, Estonia opponent Professor Jarno Limnéll Department of Communications and Networking Aalto University Espoo, Finland The originality of this thesis has been checked in accordance with the University of Turku quality assurance system using the Turnitin OriginalityCheck service ISBN 978-952-12-3607-5 (Online) ISSN 1239-1883 To my wife Maria, I am forever grateful for everything. Thank you. ABSTRACT Our society has developed into a networked information soci- ety, in which all aspects of human life are interconnected via the Internet — the backbone through which a significant part of communications traffic is routed. This makes the Internet ar- guably the most important piece of critical infrastructure in the world. -
Strategic Panorama 2003-2004
MINISTERIO DE DEFENSA 2003/2004 STRATEGIC PANORAMA INSTITUTO ESPAÑOL DE ESTUDIOS ESTRATÉGICOS REAL INSTITUTO ELCANO GENERAL SECRETARIAT Directorate General for OF DEFENCE POLICY Institutional Defence Relations Spanish Institute for Strategic Studies Working Group no. 1/03 2003/2004 STRATEGIC PANORAMA The ideas contained herein are the responsibility of the authors and do not necessarily reflect the opinion of the IEEE, which has sponsored this publication. LETTER FROM THE DIRECTOR It was one year in ago in November that I was appointed Director of the Spanish Institute of Strategic Studies (IEEE). The Institute is attached to the Secretariat-General for Defence Policy which, owing to its functions and nature, stamps its personality on the organisations under its authority. Over the past fourteen months in my post at the IEEE I have endeavoured to promote a fresh approach to the various publications in our Strategy series, including the Panorama. No contributor has been ruled out on the grounds of degree of social or political prestige; indeed, when choosing our contributors priority is given solely and exclusively to their knowledge and specialisation in the particular subject. Accordingly, during 2003, as proposed, we have worked in conjunction with the Elcano Royal Institute of International and Strategic Studies to produce this edition of the Panorama, as well as with other institutes and research centres we believed could make an interesting contribution. We are now collaborating with institutions as important as the Instituto Universitario Gutiérrez Mellado, the National Intelligence Centre and the CESEDEN. We are already feeling the effects of the new life which these contributions are instilling into the IEEE and which will shortly be reflected in the publications that the Institute makes available to the various sectors of society interested in our area of strategic thought.