Sayyaf Complaint
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Policy Notes for the Trump Notes Administration the Washington Institute for Near East Policy ■ 2018 ■ Pn55
TRANSITION 2017 POLICYPOLICY NOTES FOR THE TRUMP NOTES ADMINISTRATION THE WASHINGTON INSTITUTE FOR NEAR EAST POLICY ■ 2018 ■ PN55 TUNISIAN FOREIGN FIGHTERS IN IRAQ AND SYRIA AARON Y. ZELIN Tunisia should really open its embassy in Raqqa, not Damascus. That’s where its people are. —ABU KHALED, AN ISLAMIC STATE SPY1 THE PAST FEW YEARS have seen rising interest in foreign fighting as a general phenomenon and in fighters joining jihadist groups in particular. Tunisians figure disproportionately among the foreign jihadist cohort, yet their ubiquity is somewhat confounding. Why Tunisians? This study aims to bring clarity to this question by examining Tunisia’s foreign fighter networks mobilized to Syria and Iraq since 2011, when insurgencies shook those two countries amid the broader Arab Spring uprisings. ©2018 THE WASHINGTON INSTITUTE FOR NEAR EAST POLICY. ALL RIGHTS RESERVED. THE WASHINGTON INSTITUTE FOR NEAR EAST POLICY ■ NO. 30 ■ JANUARY 2017 AARON Y. ZELIN Along with seeking to determine what motivated Evolution of Tunisian Participation these individuals, it endeavors to reconcile estimated in the Iraq Jihad numbers of Tunisians who actually traveled, who were killed in theater, and who returned home. The find- Although the involvement of Tunisians in foreign jihad ings are based on a wide range of sources in multiple campaigns predates the 2003 Iraq war, that conflict languages as well as data sets created by the author inspired a new generation of recruits whose effects since 2011. Another way of framing the discussion will lasted into the aftermath of the Tunisian revolution. center on Tunisians who participated in the jihad fol- These individuals fought in groups such as Abu Musab lowing the 2003 U.S. -
Foreign Terrorist Organizations
Order Code RL32223 CRS Report for Congress Received through the CRS Web Foreign Terrorist Organizations February 6, 2004 Audrey Kurth Cronin Specialist in Terrorism Foreign Affairs, Defense, and Trade Division Huda Aden, Adam Frost, and Benjamin Jones Research Associates Foreign Affairs, Defense, and Trade Division Congressional Research Service ˜ The Library of Congress Foreign Terrorist Organizations Summary This report analyzes the status of many of the major foreign terrorist organizations that are a threat to the United States, placing special emphasis on issues of potential concern to Congress. The terrorist organizations included are those designated and listed by the Secretary of State as “Foreign Terrorist Organizations.” (For analysis of the operation and effectiveness of this list overall, see also The ‘FTO List’ and Congress: Sanctioning Designated Foreign Terrorist Organizations, CRS Report RL32120.) The designated terrorist groups described in this report are: Abu Nidal Organization (ANO) Abu Sayyaf Group (ASG) Al-Aqsa Martyrs Brigade Armed Islamic Group (GIA) ‘Asbat al-Ansar Aum Supreme Truth (Aum) Aum Shinrikyo, Aleph Basque Fatherland and Liberty (ETA) Communist Party of Philippines/New People’s Army (CPP/NPA) Al-Gama’a al-Islamiyya (Islamic Group, IG) HAMAS (Islamic Resistance Movement) Harakat ul-Mujahidin (HUM) Hizballah (Party of God) Islamic Movement of Uzbekistan (IMU) Jaish-e-Mohammed (JEM) Jemaah Islamiya (JI) Al-Jihad (Egyptian Islamic Jihad) Kahane Chai (Kach) Kurdistan Workers’ Party (PKK, KADEK) Lashkar-e-Tayyiba -
Mcallister Bradley J 201105 P
REVOLUTIONARY NETWORKS? AN ANALYSIS OF ORGANIZATIONAL DESIGN IN TERRORIST GROUPS by Bradley J. McAllister (Under the Direction of Sherry Lowrance) ABSTRACT This dissertation is simultaneously an exercise in theory testing and theory generation. Firstly, it is an empirical test of the means-oriented netwar theory, which asserts that distributed networks represent superior organizational designs for violent activists than do classic hierarchies. Secondly, this piece uses the ends-oriented theory of revolutionary terror to generate an alternative means-oriented theory of terrorist organization, which emphasizes the need of terrorist groups to centralize their operations. By focusing on the ends of terrorism, this study is able to generate a series of metrics of organizational performance against which the competing theories of organizational design can be measured. The findings show that terrorist groups that decentralize their operations continually lose ground, not only to government counter-terror and counter-insurgent campaigns, but also to rival organizations that are better able to take advantage of their respective operational environments. However, evidence also suggests that groups facing decline due to decentralization can offset their inability to perform complex tasks by emphasizing the material benefits of radical activism. INDEX WORDS: Terrorism, Organized Crime, Counter-Terrorism, Counter-Insurgency, Networks, Netwar, Revolution, al-Qaeda in Iraq, Mahdi Army, Abu Sayyaf, Iraq, Philippines REVOLUTIONARY NETWORK0S? AN ANALYSIS OF ORGANIZATIONAL DESIGN IN TERRORIST GROUPS by BRADLEY J MCALLISTER B.A., Southwestern University, 1999 M.A., The University of Leeds, United Kingdom, 2003 A Dissertation Submitted to the Graduate Faculty of the University of Georgia in Partial Fulfillment of the Requirements for the Degree DOCTOR OF PHILOSPHY ATHENS, GA 2011 2011 Bradley J. -
The Jihadi Industry: Assessing the Organizational, Leadership And
The Jihadi Industry: Assessing the Organizational, Leadership, and Cyber Profiles Report to the Office of University Programs, Science and Technology Directorate, U.S. Department of Homeland Security July 2017 National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence Led by the University of Maryland 8400 Baltimore Ave., Suite 250 • College Park, MD 20742 • 301.405.6600 www.start.umd.edu National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence About This Report The authors of this report are Gina Ligon, Michael Logan, Margeret Hall, Douglas C. Derrick, Julia Fuller, and Sam Church at the University of Nebraska, Omaha. Questions about this report should be directed to Dr. Gina Ligon at [email protected]. This report is part of the National Consortium for the Study of Terrorism and Responses to Terrorism (START) project, “The Jihadi Industry: Assessing the Organizational, Leadership, and Cyber Profiles” led by Principal Investigator Gina Ligon. This research was supported by the Department of Homeland Security Science and Technology Directorate’s Office of University Programs through Award Number #2012-ST-061-CS0001, Center for the Study of Terrorism and Behavior (CSTAB 1.12) made to START to investigate the role of social, behavioral, cultural, and economic factors on radicalization and violent extremism. The views and conclusions contained in this document are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied, of the U.S. -
Islamic State of Iraq and the Levant (ISIL), Or Simply the Islamic State, Has Carried out Deadly Terrorist Attacks
BACKGROUND REPORT Patterns of Islamic State-Related Terrorism, 2002--2015 For more than a decade, the organization now known as the Islamic State of Iraq and the Levant (ISIL), or simply the Islamic State, has carried out deadly terrorist attacks. Beginning as a small network led by Jordanian Abu Musab al-Zarqawi, the first terrorist attack attributed to this group was the assassination of American diplomat Laurence Foley in Amman, Jordan in October 2002. Since then, the group initially known as Tawhid and Jihad (Jama’at al-Tawhid w’al-Jihad (the Party of Monotheism and Jihad)) has undergone a complex evolution, including name changes, leadership changes, and shifts in allegiance to other Salafi-jihadist organizations, most notably al-Qaida. In addition, the reach of ISIL’s violence surpasses its own membership, to include attacks carried out by other groups and individuals who have pledged allegiance to ISIL regardless of whether or not formal ties exist. This complexity makes it difficult to comprehensively and systematically place into context the violence of one of the most active and deadly terrorist organizations in recent history. For the purpose of this report, we have classified the terrorist attacks in the Global Terrorism Database (GTD) into four ISIL-related perpetrator categories: ISIL Predecessor: attacks by organizations that were part of the ISIL lineage prior to adoption of the ISIL name in 2013 ISIL: attacks by operatives of the “core” of the organization, based in and primarily active in Iraq and Syria ISIL Affiliate: attacks by organizations that have declared allegiance to ISIL1 ISIL-Inspired: attacks by individuals who have indicated that they were motivated by allegiance to ISIL ISIL-Related: any of the above This report presents data that illustrate the dynamics of ISIL-related terrorism over time and place, from 2002 to 2015. -
ISIS in Libya: a Major Regional and International Threat
המרכז למורשת המודיעין (מל"מ) מרכז המידע למודיעין ולטרור January 2016 ISIS in Libya: a Major Regional and International Threat ISIS operatives enter the coastal city of Sirte in north-central Libya on February 18, 2015, in a show of strength accompanied by dozens of vehicles (Twitter.com, Nasher.me). Since then ISIS has established itself in Sirte and the surrounding areas, turning the entire region into its Libyan stronghold and a springboard for spreading into other regions. Overview 1. In 2015 ISIS established two strongholds beyond the borders of its power base in Iraq and Syria: the first in the Sinai Peninsula, where it wages determined fighting against the Egyptian security forces. The second is situated in the north- central Libyan city of Sirte and its surroundings, where it has established territorial control and from where it seeks to take over the entire country. It intends to turn Libya into a springboard for terrorism and the subversion of the rest of North Africa, the sub-Saharan countries, and southern Europe. The firm territorial base ISIS constructed in Libya is the only one outside IraQ and Syria, and is potentially a greater regional and international threat. 2. ISIS could establish itself in Libya because of the chaos prevalent after the execution of Muammar Qaddafi. As in Iraq and Syria, the governmental-security vacuum created by the collapse of the central government was filled by nationalist and Islamist organizations, local and regional tribal militias and jihadist organizations. The branch of ISIS in Libya exploited the lack of a functioning government and 209-15 2 the absence of international intervention to establish itself in the region around Sirte and from there to aspire to spread throughout Libya. -
Administration of Barack Obama, 2015 Letter to Congressional Leaders
Administration of Barack Obama, 2015 Letter to Congressional Leaders on the Global Deployment of United States Combat-Equipped Armed Forces June 11, 2015 Dear Mr. Speaker: (Dear Mr. President:) I am providing this supplemental consolidated report, prepared by my Administration and consistent with the War Powers Resolution (Public Law 93–148), as part of my efforts to keep the Congress informed about deployments of U.S. Armed Forces equipped for combat. MILITARY OPERATIONS IN SUPPORT OF U.S. COUNTERTERRORISM OBJECTIVES In furtherance of U.S. counterterrorism efforts, the United States continues to work with partners around the globe, with a particular focus on the U.S. Central Command's and U.S. Africa Command's areas of responsibility. In this context, the United States has deployed U.S. combat-equipped forces to enhance the counterterrorism capabilities and support the counterterrorism operations of our friends and allies. Specific information about counterterrorism deployments to select countries is provided below, and a classified annex to this report provides further information. Military Operations Against al-Qa'ida, the Taliban, and Associated Forces and in Support of Related U.S. Counterterrorism Objectives Since October 7, 2001, U.S. Armed Forces, including special operations forces, have conducted counterterrorism combat operations in Afghanistan against al-Qa'ida, the Taliban, and associated forces. In support of these and other overseas operations, the United States has deployed combat-equipped forces to a number of locations in the U.S. Central, Pacific, European, Southern, and Africa Command areas of operation. Such operations and deployments have been reported previously, consistent with Public Law 107–40 and the War Powers Resolution, and operations and deployments remain ongoing. -
Countering Looting of Antiquities in Syria and Iraq
COUNTERING LOOTING OF ANTIQUITIES IN SYRIA AND IRAQ Final Report Research and Training on Illicit Markets for Iraqi and Syrian Art and Antiquities: Understanding networks and markets, and developing tools to interdict and prevent the trafficking of cultural property that could finance terrorism Photo credit: Associated Press/SANA US State Department Bureau of Counterterrorism (CT) Written by Dr. Neil Brodie (EAMENA, School of Archaeology, University of Oxford), with support from the CLASI team: Dr. Mahmut Cengiz, Michael Loughnane, Kasey Kinnard, Abi Waddell, Layla Hashemi, Dr. Patty Gerstenblith, Dr. Ute Wartenberg, Dr. Nathan Elkins, Dr. Ira Spar, Dr. Brian Daniels, Christopher Herndon, Dr. Bilal Wahab, Dr. Antonietta Catanzariti, Barbora Brederova, Gulistan Amin, Kate Kerr, Sayari Analytics, Dr. Corine Wegener Under the general direction of Dr. Louise Shelley and Judy Deane. 1 Table of Contents 1. Executive Summary 3-4 2. Final Report Neil Brodie 5-22 3. Attachments A. Final Monitoring Report Abi Weddell, Layla Hashemi, and Barbora Brederova 23-25 B. Trafficking Route Maps Mahmut Cengiz 26-27 C. Policy Recommendations Patty Gerstenblith 29-31 D. Training Gaps Summary Michael Loughnane 32-33 E. End Notes 33-41 2 Executive Summary The looting of antiquities has been a scourge throughout history, especially in times of war. But over the past decade there have been changes in technology – especially in excavation, transport and marketing via social media and the Internet--that have expanded and globalized the trade and made it easier for non-experts to reap the profits. This report looks at (1) the current state of the trade in looted antiquities from Iraq and Syria, (2) the role of new technologies that make it easier for terrorists and criminal groups to profit and (3) new ways to track terrorist involvement in the trade and try to disrupt it. -
The War Report 2017.Pdf
THE WAR REPORT ARMED CONFLICTS IN 2017 ANNYSSA BELLAL THE ACADEMY A JOINT CENTER OF THE WAR REPORT ARMED CONFLICTS IN 2017 ACKNOWLEDGEMENTS The War Report 2017 was supervised and edited by Dr Annyssa Bellal, Strategic Ad- viser on IHL and Senior Research Fellow at the Geneva Academy of International Humanitarian Law and Human Rights (Geneva Academy). The different sections on selected armed conflicts were written by individual authors and copy-edited by Munizha Ahmad-Cooke. The War Report 2017 also builds on past editions since 2012. The Geneva Academy would like to thank the Swiss Federal Department of Foreign Affairs (DFAE) for its support to the Geneva Academy’s research on this issue. DISCLAIMERS This report is the work of the editor and authors. The views expressed in it do not necessarily reflect those of the Geneva Academy. The qualification of any situation of armed violence as an armed conflict under international law should not be read such as to trigger war clauses in insurance contracts and does not in any way affect the need for due diligence by any natural or legal person in their work in any of the situations referred to. Furthermore, facts, matters or opinions contained in the report are provided by the Geneva Academy without assuming responsibility to any user of the report who may rely on its contents in whole or in part. The designation of armed non-state actors, states or territories does not imply any judgement by the Geneva Academy regarding the legal status of such actors, states or territories, or their authorities and institutions, or the delimitation of their boundaries, or the status of any states or territories that border them. -
Anti-Shia Hostility in Malaysia
ISSUE: 2021 No. 81 ISSN 2335-6677 RESEARCHERS AT ISEAS – YUSOF ISHAK INSTITUTE ANALYSE CURRENT EVENTS Singapore | 16 June 2021 Rethinking Extremism Beyond Physical Violence: Anti-Shia Hostility in Malaysia Norshahril Saat, Nur Syafiqah Mohd Taufek, and Afra Alatas* Malaysia has been referred to as a “moderate” Muslim country for a long time. However, it is now no longer a stranger to religious extremism. In this picture, Muslim devotees exercise social distancing, as a preventive measure to combat the spread of the Covid-19 coronavirus, on the first Friday of the holy month of Ramadan at the Putra Mosque in Putrajaya on April 16, 2021. Photo: Mohd RASFAN / AFP. *Norshahril Saat is Senior Fellow and Coordinator of the Regional Social and Cultural Studies Programme at ISEAS – Yusof Ishak Institute. Nur Syafiqah and Afra Alatas are research officers under the same programme at the Institute. 1 ISSUE: 2021 No. 81 ISSN 2335-6677 EXECUTIVE SUMMARY • Academic studies on extremism have tended to view the issue through a security lens. Recent attacks on churches in Indonesia and Malaysia would have reinforced the popularity of this approach. • However, violent extremism does not exist in a vacuum. Acts of terror are driven by ideas and discourse that motivate and justify terrorist acts. • This article examines the impact of non-physically violent extremism on Muslims. Drawing on the case of the Shi’as in Malaysia, it explores how extreme ideas are espoused by some people in power, including popular preachers, religious elites, and bureaucrats. • It analyses the Malaysian experience and demonstrates how labels such as “deviant” or “liberal” can lead to distress among Muslims advocating different points of view and inhibit their constructive participation in society at large. -
Boko Haram and the Kidnapping of the Chibok Schoolgirls
MAY 2014 . VOL 7 . ISSUE 5 Contents Boko Haram and the FEATURE ARTICLE 1 Boko Haram and the Kidnapping of Kidnapping of the Chibok the Chibok Schoolgirls By Jacob Zenn Schoolgirls REPORTS By Jacob Zenn 8 The ISIL’s Stand in the Ramadi-Falluja Corridor By Michael Knights 12 Kidnappings and Murders Targeting Foreigners in Libya By Alison Pargeter 17 The British Foreign Fighter Contingent in Syria By Raffaello Pantucci 21 A Profile of Ahrar-ul-Hind and Ansar-ul-Mujahidin in Pakistan By Zia Ur Rehman 24 Al-Hijra: Al-Shabab’s Affiliate in Kenya By Fredrick Nzes 26 Recent Highlights in Political Violence 28 CTC Sentinel Staff & Contacts A woman chants slogans during a rally calling for the release of the missing Chibok schoolgirls in Lagos, Nigeria. - Pius Utomi Ekpei/Getty n april 14, 2014, Boko Haram Despite an outcry from the militants kidnapped more international community, social than 250 schoolgirls media and civil society, this operation from Chibok in Nigeria’s was consistent with Boko Haram’s Onortheastern Borno State. Soon after the previous militant activities in the kidnapping, reports surfaced that Boko Nigeria-Cameroon-Chad-Niger border Haram may have transferred many of the region and its founder Muhammad girls from Nigeria to Cameroon, Chad Yusuf’s non-recognition of colonial-era About the CTC Sentinel and as far as Central African Republic’s political boundaries that “cut off Niger The Combating Terrorism Center is an Birao region near Sudan.1 In a video and Chad and amalgamated [Borno] independent educational and research released on May 5, 2014, Boko Haram with infidels.”3 As Shekau, who is institution based in the Department of Social leader Abubakar Shekau announced he Yusuf’s former deputy, said in his May 5 Sciences at the United States Military Academy, would “sell” the schoolgirls as “slaves statement, “we don’t know Cameroon or West Point. -
Daesh Information Campaign and Its Influence
DAESH INFORMATION CAMPAIGN AND ITS INFLUENCE RESULTS OF THE STUDY JANUARY 2016 TABLE OF CONTENTS FOREWORD...................................................................................................................3 EXECUTIVE SUMMARY..................................................................................................4 METHODOLOGY...................................................................................................7 INTRODUCTION..............................................................................................................9 WHY DAESH?.............................................................................................................................................................10 WHAT’S IN A NAME?...................................................................................................................................................11 HISTORY.......................................................................................................................12 ROOTS.........................................................................................................................................................................13 MOSUL BATTLE...........................................................................................................................................................14 THE PROCLAMATION OF THE CALIPHATE..................................................................................................................15 CURRENT SITUATION..................................................................................................................................................16