Capstone – Inss 5390 Dr

Total Page:16

File Type:pdf, Size:1020Kb

Capstone – Inss 5390 Dr PAIGE COSTANZI CAPSTONE – INSS 5390 DR. VALERO 10 DECEMBER 2016 The Islamic State’s Information Warfare: Social Media and Propaganda Engineering For decades, the United States has faced a growing threat of Islamist terrorism towards the homeland. The rise of the self-identified Islamic State, commonly known as ISIL or ISIS1, has been effectively utilizing social media outlets as an informational instrument to promote its cause, recruit more members, and cause havoc amongst the globe. Through various social media platforms, movies (i.e. The Flames of War), YouTube videos, and their very own online multi- language magazine Dabiq, which has recently been replaced with their new online multi- language magazine Rumiyah, the Islamic State has become adept at manipulating media to gain support and create an ideological movement. “The analysis of the digital audiovisual campaigns released by ISIS since January 2014 suggests that ISIS has established a new kind of terrorism, using marketing and digital communication tools not only for “socializing terror” through public opinion as previous terrorist groups did, but also for making terror popular, desirable, and imitable.”2 The Islamic State is well funded, organized, and grounded in the authority of religious texts and words of Islamic scholars. It now controls multiple border crossings along with various weapons and infrastructures throughout their controlled territory in Syria and Iraq. Their extreme violence and use of various media outlets for recruitment and scare tactics is a growing concern in this fight. The Islamic State has developed new tactics, to include a multi-million dollar media campaign, to create a unified worldwide Islamic State with Sharia Law as the basis. The phenomenon of the rise of the Islamic State correlates with the rise of technology and social media, compared to al-Qaeda which did not have a very good media campaign to spread their message. “Between March 2014 and November 2016, 124 individuals in the U.S. affiliating with ISIS have been interdicted by law enforcement, whether traveling to fight, recruiting, fundraising, planning to travel, promoting ISIS, or initiating or carrying out attacks which averages about 5.1 ISIL arrests per month on American soil. In comparison, in the ten years following 9/11, an estimated 176 Americans were indicted, arrested or identified as terrorists/terrorist supporters affiliated with al-Qaeda.”3 The Islamic States success stems from the creation of the new Caliphate in July of 2014 in Syria and Iraq, after nearly 90 years of the fall of the Ottoman Empire. Abu Bark al-Baghdadi was declared the new Caliph of Caliphate and The Islamic State now controls territory in both Syria 1 The Islamic State will be referred to as either The Islamic State, ISIL, or ISIS throughout the paper depending on the source of information. 2 Lesaca, Jessica. “On Social Media, ISIS uses modern cultural images to spread anti-modern values,” Brookings Institute, 2015. http://www.brookings.edu/blogs/techtank/posts/2015/09/24-isis-social-media-engagement 3 Gorka, Sebastian and Katharine Gorka. “ISIS: The Threat to the United States,” Threat Knowledge Group, 2015. http://threatknowledge.org/isis-threat-to-usa-report/ and Iraq, with affiliate branches in Libya, Saudi Arabia, Sinai, West Africa, Yemen, Khorasan, and the North Caucasus regions.4 Additionally, the Islamic State has a robust supply stream of resources, money, and fighters which continues to support its overall mission of global jihad expansion. Although coalition forces are hoping the Islamic State falls in Syria and Iraq, their ideology and mass expansion both physically and virtually is a force to be reckoned with for many more years to come. America’s response to this threat has been solely based around a battle of arms, rather than a battle of ideas. The United States must recognize that the foundation of this war of ideas is built upon theological Islamic ideology and therefore must render information as its most influential instrument of national power to counter their messages in cyberspace. Information as an instrument of power has been poorly wielded by the U.S. government to defeat the Islamic State; ignorance of the fact that terrorism is being carried out in the name of Islam to wage jihad against America makes it harder for U.S. policy-makers to defeat this ongoing threat. These extremists are now taking their ideological movement to the internet in order to recruit, radicalize, and attack their enemies both physically and virtually. Whether dead or captured, the internet provides jihadists with a virtual immortality. Indoctrination, recruitment, financing, training, and ideological messages continue 24 hours a day, 7 days a week in the cyberspace battlefield. Globalization has given rise to a ‘skill revolution’5 that enhances the capabilities of groups to carry out their agenda more effectively than ever before. Social media outlets and virtual communications have allowed the Islamic State to grow into a powerful organization that the world has not seen before. SOCIAL ENGINEERING –ISLAMIC STATE PROPAGANDA TOOLS Technology is an enabler; we have to get to the root of the problem which is the ideological goals of the human behind the technology. The single most effective tool for detecting Islamic State supporters has been through their social media activity; in the first 9 months of their existence, the Islamic State recruited an estimated 20,000 foreign fighters and an estimated 4,000 Westerners via social media. However, tracking terrorists on social media is not that simple; for example, the planning for the 2015 Paris attacks went completely undetected by French intelligence.6 4 Leigh, Karen, Jason French and Jovi Juan. “Islamic State and its Affiliates,” Wall Street Journal, 2016. http://graphics.wsj.com/islamic-state-and-its-affiliates/ 5 Cha, Victor, “Globalization and the Study of International Security.” Journal of Peace Research, Vol. 37, No. 3 (May, 2000), p. 391-403 6 Gorka, Sebastian and Katharine Gorka. “ISIS: The Threat to the United States,” Threat Knowledge Group, 2015. http://threatknowledge.org/isis-threat-to-usa-report/ “ISIL is well versed in the power of the media, they have been joined by a new generation of millennial recruits. The average age of foreign fighters who traveled to join ISIL is 24, meaning tools like Facebook, Twitter, and Instagram are what they’ve grown up with.”7 In the context of global jihad, this is a dangerous combination. A study“ISIL done released by the845 Brookings Instituteaudiovisual revealed that ISIL released 845 audiovisual campaigns between January 2014 and Septembercampaigns 2015, between or more than January 2014 and one every day for a year and a half. Qualitative analysis of all 845 campaignsSeptember shows 2015, or that more than 15 percent are directly inspired by real films, videogames and musicmore videothan one clips of contemporary popular culture, such as the films Saw, The Matrix, Americanevery day Sniper, for a year and V for and a half.” Vendetta; or videogames like Call of Duty, Mortal Combat X and Grand Theft Auto. The study further revealed that ISIL supporters control more than 46,000 Twitter- Brookingsaccounts Institute through which 8 they release their messages. Senior Islamic State leaders are calling for ‘all’ individuals to join their cause and attack the kuffar.9 These types of broad orders are given out through social media platforms and propaganda tools such as al-Qaeda’s magazine Inspire and the Islamic State’s magazine Dabiq, and are directed towards anyone who may be reading or listening. There is a shift in the traditional chain-of-command now becoming a virtual chain-of-command, making dismantling or disrupting emerging operations and strategic direction an extraordinarily difficult thing to achieve for the Intelligence Community. Building a Brand Online: The Caliphate The Internet serves as a critical instrument of power for enabling and directing the goals and objectives of many terrorist organizations. The Islamic State’s sophisticated use of the Internet demonstrates their operational effectiveness while simultaneously undermining the goals of the 7 Singer, P.W. and Emerson Brooking. “Terror on Twitter,” Popular Science, 2015. http://www.popsci.com/terror-on-twitter- how-isis-is-taking-war-to-social-media 8 Berger, J.M. “The ISIS Twitter census: Defining and describing the population of ISIS supporters on Twitter.” Brookings Institute, 2015. http://www.brookings.edu/research/papers/2015/03/isis-twitter-census-berger-morgan 9 A person who rejects God and the word of Prophet Mohamed. US government and US interests. The Internet allows the Islamic State to build their brand, sell their image and messages, recruit members and supporters to their organization, build wealth, and virtually spread Islamic State franchises all around the world. As a result, the Islamic State has been more successful in conducting attacks and recruiting members since the declaration of its Caliphate in 2014 than any other terrorist organization in history. Why do terrorist organizations rely on the man-made Internet, a system that should be looked at as haram (Arabic for forbidden) in the Islamic world due to its accessibility and knowledge of Western cultures and traditions? The Islamic State, along with other terrorist organizations, rely on the Internet to serve as its foundation to reach audiences that could otherwise not reach geographically. Rather than attacking the Western man-made Internet in forms of cyber hacks, they are using it to survive and thrive. If the Islamic State does attempt a hacking act, it is usually to continue to spread their message on popular websites, or to steal personally identifiable information to target individuals for future attacks. The Internet has multiple characteristics that make it an ideal tool for terrorist organizations to manipulate, below are the more obvious characteristics that have been utilized by terrorist organizations globally.
Recommended publications
  • Terrorism and Information Operations
    Information Operations and Terrorism Dorothy E. Denning August 18, 2005 INTRODUCTION The term “terrorism” generally refers to physical acts of violence intended to inculcate fear. It conjures up images of bombs exploding, bodies mutilated, and innocent lives lost. Behind the physical assaults, however, is another dimension of terrorism. It is the information dimension, and terrorists exploit it every bit as much as the physical. Their ultimate goal goes beyond the death and destruction they leave behind. It is power and influence. Terrorists seek a change, and their objective is to influence populations in ways that support that change. To do that, they engage in both physical and information operations, and they integrate those operations together. The objective of this paper is to explore how terrorists use information operations (IO) to support their physical attacks and broader goals. The paper uses as a framework the components of IO promulgated in U.S. Department of Defense doctrine. While there is no reason to believe that terrorists follow U.S. military doctrine or even anything similar, the doctrine provides a conceptual basis for organizing the discussion. Most of the discussion focuses on al-Qa’ida and the transnational jihadist movement comprising individuals and groups loosely bound by al-Qa’ida’s radical Islamic ideology, but operating independently. The movement is said to consist of dozens of radical Islamic groups, who have been trained and financed by al-Qa’ida or who collaborate with al-Qa’ida. It includes thousands of Muslim militants who have trained together in Afghanistan and elsewhere (now Iraq), and an untold number who have been caught up by bin Laden’s worldview.1 Two principle types of sources are used.
    [Show full text]
  • Al-Qaeda's Terrorist Threat to UNIFIL
    Al-Qaeda’s Terrorist Threat to UNIFIL June 2007 Bilal Y. Saab – The Saban Center for Middle East Policy at The Brookings Institution Magnus Ranstorp – The Center for Asymmetric Threat Studies (CATS) at the Swedish National Defence College On August 11, 2006, in response to the 34-day summer war between Israel and Hizb’allah, the United Nations Security Council passed resolution 1701, which called for a more robust international military presence along the United Nations-drawn Blue Line dividing Israel and southern Lebanon. But the strengthened United Nations Interim Force in Lebanon (UNIFIL) is likely to face a range of security threats that could undermine its peacekeeping duties and endanger its personnel. Among the more serious threats, underscored by intelligence reports over the past few years that indicate a growing al-Qaeda presence in Lebanon, is a catastrophic terrorist attack against UNIFIL by local salafist jihadist entities. UNIFIL IS WORRIED Since its deployment, UNIFIL has publicly voiced concerns about a terrorist attack by al- Qaeda, not Hizb’allah, against its troops.1 These legitimate concerns have been reinforced by stern (yet unsubstantiated) warnings issued by Lebanese, Israeli and Western officials about al-Qaeda’s growing presence in Lebanon.2 For UNIFIL, the ongoing violent clashes between al-Qaeda inspired Islamic militants and the Lebanese Army, which erupted May 20 in northern Lebanon, have only heightened its sense of insecurity. Concerned about the safety of their troops, UNIFIL commanders do not have the
    [Show full text]
  • Sayyid Qutb's Ties to Extremists
    Sayyid Qutb’s Ties to Extremists www.counterextremism.com | @FightExtremism Sayyid Qutb’s Ties to Extremists Key Points Qutb was a chief ideologue of the Muslim Brotherhood in Egypt who was also widely popular on the Egyptian street. The Egyptian government executed him in 1966 for promoting the overthrow of the state. Qutb popularized the concepts of takfir— excommunication of Muslim apostates—and jahiliyya— the deplorable state of ignorance prior to the revelation of the Quran that has enveloped the secular Muslim community as well as non-Muslims. Qutb wrote that only the creation of an Islamic state ruled by sharia (Islamic law) could end the state of jahiliyya. Qutb is widely considered the progenitor of the modern jihadist movement as his writings directly inspired the Muslim Brotherhood and notorious extremists who passed through the organization, including Osama bin Laden of al-Qaeda, Abu Bakr al- Baghdadi of ISIS, and the founders of Palestinian Islamic Jihad. 1 2 Often referred to as the father of modern Islamism, Egyptian author Sayyid Qutb was a lead theologian of the Muslim Brotherhood in the mid-20th century. Qutb’s hardline interpretations of the Quran and his excoriation of the failures of Western society inspired the modern jihadist movement and led the Egyptian government to execute him in 1966. His influence can be seen in violent groups such as al-Qaeda, ISIS, and the Taliban, and among such notable extremists such as Osama bin Laden, Abu Bakr al- Baghdadi, and Khalid Sheikh Mohammed. Terrorism expert Paul Berman at one point dubbed Qutb “the intellectual hero of every one of the groups that eventually went into Al Qaeda, their Karl Marx (to put it that way), their guide.”1 Qutb’s writings helped inform the Islamist ideology known as Qutbism, which advocates violent jihad—including the killing of secular Muslims—in order to implement sharia (Islamic law).
    [Show full text]
  • Terrorism, Crime, and Public Policy
    This page intentionally left blank Terrorism, Crime, and Public Policy Terrorism, Crime, and Public Policy describes the problem of terrorism; compares it to other forms of aggression, particularly crime and war; and discusses policy options for dealing with the problem. It focuses on the causes of terrorism with the aim of understanding its roots and providing insights toward policies that will serve to prevent it. The book serves as a single-source reference on terrorism and as a platform for more in-depth study, with a set of discussion questions at the end of each chapter. Individual chapters focus on the nature of terrorism, theories of aggression and terrorism, the history of terrorism, globalization vs. clash, the role of religion, nonreligious extrem- ism and terrorism, the role of technology, terrorism throughout the modern world, responses to terrorism, fear of terrorism, short-term approaches and long-term strategies for preventing terrorism, balancing security and rights to liberty and privacy, and pathways to a safer and saner twenty-first century. Brian Forst joined the American University faculty after twenty years in nonprofit research, including positions as research director at the Institute for Law and Social Research and the Police Foundation. He is the author most recently of After Terror (with Akbar Ahmed, 2005); Errors of Justice: Nature, Sources, and Remedies (Cambridge University Press, 2004); and The Privatization of Policing: Two Views (with Peter Manning, 1999). He is a member of the American University Senate and chairs the Department of Justice, Law, and Society’s doctoral program. He is also a voting member of the Sentencing Commission for the District of Columbia.
    [Show full text]
  • Center on Terrorism, Extremism, and Counterterrorism
    Center on Terrorism, Extremism, and Counterterrorism www.middlebury.edu/institute/academics/centers-initiatives/ctec The Center on Terrorism, Extremism, and Counterterrorism (CTEC) conducts in- depth research on terrorism and other forms of extremism. Formerly known as the Monterey Terrorism Research and Education Program, CTEC collaborates with world-renowned faculty and their graduate students in the Middlebury Institute’s Nonproliferation and Terrorism Studies degree program. CTEC’s research informs private, government, and multilateral institutional understanding of and responses to terrorism threats. Middlebury Institute for International Studies at Monterey www.miis.edu The Middlebury Institute for International Studies at Monterey provides international professional education in areas of critical importance to a rapidly changing global community, including international policy and management, translation and interpretation, language teaching, sustainable development, and nonproliferation. We prepare students from all over the world to make a meaningful impact in their chosen fields through degree programs characterized by immersive and collaborative learning, and opportunities to acquire and apply practical professional skills. Our students are emerging leaders capable of bridging cultural, organizational, and language divides to produce sustainable, equitable solutions to a variety of global challenges. Center on Terrorism, Extremism, and Counterterrorism Middlebury Institute of International Studies 460 Pierce Street Monterey, CA 93940, USA Tel: +1 (831) 647-4634 The views, judgments, and conclusions in this report are the sole representations of the authors and do not necessarily represent either the official position or policy or bear the endorsement of CTEC or the Middlebury Institute of International Studies at Monterey. © The President and Trustees of Middlebury College, 2019 ASSESSING THE RISK OF ISLAMIST TERRORISTS USING HUMAN VECTORS TO DEPLOY CONTAGIOUS PATHOGENS Jeffrey M.
    [Show full text]
  • Allison and Barnes
    THE INSTITUTE FOR MIDDLE EAST STUDIES IMES CAPSTONE PAPER SERIES THE ISLAMIC STATE OF IRAQ AND THE LEVANT’S STRATEGIC TREATMENT AND USE OF WOMEN JESSICA ALLISON LOGAN BARNES MAY 2015 THE INSTITUTE FOR MIDDLE EAST STUDIES THE ELLIOTT SCHOOL OF INTERNATIONAL AFFAIRS THE GEORGE WASHINGTON UNIVERSITY © OF JESSICA ALLISON AND LOGAN BARNES, 2015 Table of Contents Introduction ................................................................................................................................... 1 Our Research ................................................................................................................................. 2 Methodology ............................................................................................................................... 4 Complications ............................................................................................................................. 5 Significance ................................................................................................................................. 6 Background: Women and Terrorism ....................................................................................... 11 ISIL’s Historical Use of Women as Suicide Bombers.............................................................. 16 Bureaucratizing Women’s Affairs............................................................................................. 18 Recruitment Policies ................................................................................................................
    [Show full text]
  • Analysis and Evolution of the Global Jihadist Movement Propaganda
    Terrorism and Political Violence, 18:399–421, 2006 Copyright Taylor & Francis Group, LLC ISSN: 0954-6553 print=1556-1836 online DOI: 10.1080/09546550600751990 Analysis and Evolution of the Global Jihadist Movement Propaganda MANUEL R. TORRES Department of Public Law, University Pablo Olavide, Seville, Spain JAVIER JORDA´ N Department of Political Science, University of Granada, Spain NICOLA HORSBURGH International Policy Institute King’s College, London, England The Global Jihadist Movement (GJM) has a series of well-defined objectives, which constitute the central points of their ideology. In the realization of these goals, propaganda and public communication play a central role. This article studies the evolution of the principal characteristics of GJM propaganda, analyzing over 2,000 documents issued by the GJM between 1996 and 2005. Keywords Al Qaeda, communication, Jihad, propaganda, terrorism Introduction Al Qaeda and the various other associated groups that form what we will here label the Global Jihadist Movement (GJM), have, as is true of any terrorist organization, a pronounced need for public communication. Violence in and of itself, despite the magnitude and spectacular levels it can reach, is never sufficient to achieve the ulti- mate aims of terrorists. Violence has as its purpose destroying that which it considers the enemy and spreading fear in the affected population. However, at the same time it is a mechanism that permits transmission of content. On said occasions this mess- age is transmitted via symbols used in communique´s or through the interpretation the population will ‘‘read into’’ the attacks themselves. Nevertheless, on most occasions this act of communication does not occur so subtly, and murder, threats, or kidnappings convert themselves into macabre remin- ders that permit the terrorist group to concentrate public opinion so its message is heard.
    [Show full text]
  • Volume XI, Issue 6 December 2017 PERSPECTIVES on TERRORISM Volume 11, Issue 6
    ISSN 2334-3745 Volume XI, Issue 6 December 2017 PERSPECTIVES ON TERRORISM Volume 11, Issue 6 Table of Contents Welcome from the Editors..................................................................................................................................3 Articles Thirty Years after its Foundation - Where is al-Qaida Going?.............................................5 by Anne Stenersen Revisiting al-Qaida’s Foundation and Early History.............................................................17 by Leah Farrall Al-Qaida and the Pakistani Harakat Movement: Reflections and Questions about the Pre-2001 Period............................................................................................................38 by Don Rassler The Jihadi Social Movement (JSM): Between Factional Hegemonic Drive, National Realities, and Transnational Ambitions................................................................55 by Jerome Drevon Jihadi Competition and Political Preferences........................................................................63 by Tore Hammin The Spread of its Message: Studying the Prominence of al-Qaida Materials in UK Terrorism Investigations..................................................................................................89 by Donald Holbrook Islamic State and Technology – a Literature Review...........................................................101 by Truls Tønnessen Islamic State and Al-Nusra: Exploring Determinants of Chemical Weapons Usage Patterns............................................................................................................................................112
    [Show full text]
  • Terrorist Use of the Internet: Information Operations in Cyberspace
    Terrorist Use of the Internet: Information Operations in Cyberspace Catherine A. Theohary Analyst in National Security Policy and Information Operations John Rollins Specialist in Terrorism and National Security March 8, 2011 Congressional Research Service 7-5700 www.crs.gov R41674 CRS Report for Congress Prepared for Members and Committees of Congress Terrorist Use of the Internet: Information Operations in Cyberspace Summary The Internet is used by international insurgents, jihadists, and terrorist organizations as a tool for radicalization and recruitment, a method of propaganda distribution, a means of communication, and ground for training. Although there are no known reported incidents of cyberattacks on critical infrastructure as acts of terror, this could potentially become a tactic in the future. There are several methods for countering terrorist and insurgent information operations on the Internet. The federal government has organizations that conduct strategic communications, counterpropaganda, and public diplomacy activities. The National Framework for Strategic Communication guides how interagency components are to integrate their activities. However, these organizations may be stovepiped within agencies, and competing agendas may be at stake. This report does not discuss technical and Internet architecture design solutions. Some may interpret the law to prevent federal agencies from conducting “propaganda” activities that may potentially reach domestic audiences. Others may wish to dismantle all websites that are seen to have malicious content or to facilitate acts of terror, while some may have a competing interest in keeping a site running and monitoring it for intelligence value. Key issues for Congress: • Although the Comprehensive National Cybersecurity Initiative addresses a federal cybersecurity strategy and departmental roles and responsibilities, overclassification, competing equities, and poor information sharing between agencies hinder implementation of a national cybersecurity strategy.
    [Show full text]
  • The Muslim Brotherhood's Ties to Extremists
    THE MUSLIM BROTHERHOOD’S TIES TO EXTREMISTS THE MUSLIM BROTHERHOOD’S TIES TO EXTREMISTS Key Facts: • CEP has recorded 48 individuals and groups tied to the Muslim Brotherhood, including terrorist groups, foreign fighters, extremist propagandists, and political leaders. • The writings of Muslim Brotherhood founder Hassan al-Banna and early Brotherhood ideologue Sayyid Qutb have helped mold the ideologies of violent terror groups like al- Qaeda, ISIS, and Hamas. • Al-Qaeda co-founders Osama bin Laden and Ayman al-Zawahiri, proclaimed 9/11 mastermind Khalid Sheikh Mohammed, and ISIS leader Abu Bakr al-Baghdadi all belonged to the Muslim Brotherhood before assuming roles in their respective terror networks. • The Brotherhood politically supported the goals of the Iranian Revolution early on. Qutb was an influence on Iranian extremist Navvab Safavi, who in turn influenced current Supreme Leader Ali Khamenei to enter politics and introduced Ruhollah Khomeini to the Brotherhood. • Internationally designated terror group Hamas is a direct offshoot of the Brotherhood, created as the organization’s Palestinian wing. The Muslim Brotherhood is a transnational Sunni Islamist movement that seeks to implement sharia (Islamic law) under a global caliphate. Founded in Egypt in 1928, the Brotherhood is that country’s oldest Islamist organization and has branches throughout the world. A 2015 U.K. government investigation concluded that the Brotherhood has “promoted a radical, transformative politics, at odds with a millennium of Islamic jurisprudence and statecraft….”1 In line with the British assessment, and despite the Brotherhood’s official commitment to non- violence, CEP has documented ideological and operational links between the Brotherhood’s ideology and violent terrorist groups like al-Qaeda and ISIS.
    [Show full text]
  • DHS Privacy Office FOIA
    Disposition (All Why (All internal internal processing/ disposition tracking notes tracking notes Id Date Received Date Closed Organization Sender Subject Fee Category have been have been redacted redacted pursuant to pursuant to (b)(2)) (b)(2)) 05-1 10/01/2004 04/07/2005 Federal Sources, Inc. Steponkus, Elizabeth Contract #HSSCHQ-04-D- Commercial Use 00096 05-2 10/01/2004 Federal Sources, Inc. Steponkus, Elizabeth Contract Commercial Use #HSHQPA04Q00004 05-3 10/01/2004 10/19/2004 individual Moore, Charles Documents regarding Private Citizen specified Job Announcement 05-4 10/01/2004 11/03/2004 Wilmer Cutler, Pickering, Hale and Oleskey, Stephen H. Documents regarding Private Citizen Dorr, LLP detainees 05-5 10/01/2004 10/18/2004 A.J. Bros., LLC Sifers, Monique List of Purchase Card Commercial Use Holders 05-6 10/01/2004 12/07/2004 Southern Microwave, Inc. Romeskie, Julian List of POC's for Port Commercial Use Security Grantees 05-7 10/04/2004 10/14/2004 Washington Post O'Harrow, Robert Copy of US-VISIT PIA Media Representative 05-8 10/04/2004 05/16/2005 Michaelson, Lori Grant awards made by DHS Commercial Use 05-9 10/04/2004 10/19/2004 Clausen Miller, PC Sullivan, Danielle Records pertaining to Private Citizen explosion at CTA facility in Corbin, Kentucky 05-11 10/06/2004 eCivis Isip, Rosario Homeland Security Commercial Use Preparedness Training Program 05-15 10/06/2004 10/18/2004 StarProse Corp. Copy of DHS Budget for Commercial Use 2004 05-17 10/07/2004 WMG-TV 5 Green, Lauren Copies of 2002-2005 State Media Cooperative Agreements Representative and/or Homeland Security Strategies for TN 05-21 10/08/2004 eCivis Isip, Rosario Z.
    [Show full text]
  • Semi-Proxy Wars and U.S. Counterterrorism Strategy
    Studies in Conflict & Terrorism ISSN: 1057-610X (Print) 1521-0731 (Online) Journal homepage: https://www.tandfonline.com/loi/uter20 Semi-Proxy Wars and U.S. Counterterrorism Strategy R. Kim Cragin To cite this article: R. Kim Cragin (2015) Semi-Proxy Wars and U.S. Counterterrorism Strategy, Studies in Conflict & Terrorism, 38:5, 311-327, DOI: 10.1080/1057610X.2015.1018024 To link to this article: https://doi.org/10.1080/1057610X.2015.1018024 Published online: 25 Mar 2015. Submit your article to this journal Article views: 1990 View Crossmark data Citing articles: 1 View citing articles Full Terms & Conditions of access and use can be found at https://www.tandfonline.com/action/journalInformation?journalCode=uter20 Studies in Conflict & Terrorism, 38:311–327, 2015 Copyright Ó Taylor & Francis Group, LLC ISSN: 1057-610X print / 1521-0731 online DOI: 10.1080/1057610X.2015.1018024 Semi-Proxy Wars and U.S. Counterterrorism Strategy R. KIM CRAGIN RAND Corporation Arlington, VA, USA On 4 February 2014, Al Qaeda leaders in Pakistan (aka Al Qaeda Central) repudiated Abu Bakr al-Baghdadi, the leader of Al Qaeda in Iraq. Ayman al-Zawahiri declared that al-Baghdadi and his newly formed Islamic State in Iraq and the Levant (ISIL) were no longer part of Al Qaeda’s organization and Al Qaeda Central could not be held responsible for ISIL’s behavior. It represents the first time that Al Qaeda Central has renounced an affiliate publicly. The announcement was driven by months of fighting between ISIL and Jabhat al-Nusra, another Al Qaeda affiliate in Syria. In fact, in Syria, Al Qaeda fighters are competing against each other for influence, as well as against other opposition groups, the Syrian regime, the Islamic Revolutionary Guard Corps, Iraqi militiamen, and Lebanese Hezbollah.
    [Show full text]