The Internet and Homegrown Jihadist Terrorism Assessing U.S. Detection Techniques

Total Page:16

File Type:pdf, Size:1020Kb

The Internet and Homegrown Jihadist Terrorism Assessing U.S. Detection Techniques Calhoun: The NPS Institutional Archive DSpace Repository Theses and Dissertations 1. Thesis and Dissertation Collection, all items 2010-12 The internet and homegrown jihadist terrorism assessing U.S. detection techniques Banez, Justin D. Monterey, California. Naval Postgraduate School http://hdl.handle.net/10945/5027 Downloaded from NPS Archive: Calhoun NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS THE INTERNET AND HOMEGROWN JIHADIST TERRORISM: ASSESSING U.S. DETECTION TECHNIQUES by Justin D. Bañez December 2010 Thesis Advisor: Erik J. Dahl Second Reader: Sean F. Everton Approved for public release; distribution is unlimited THIS PAGE INTENTIONALLY LEFT BLANK REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED December 2010 Master’s Thesis 4. TITLE AND SUBTITLE The Internet and Homegrown Jihadist Terrorism: 5. FUNDING NUMBERS Assessing U.S. Detection Techniques 6. AUTHOR(S) Justin D. Bañez 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION Naval Postgraduate School REPORT NUMBER Monterey, CA 93943-5000 9. SPONSORING /MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSORING/MONITORING N/A AGENCY REPORT NUMBER 11. SUPPLEMENTARY NOTES The views expressed in this thesis are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. Government. 12a. DISTRIBUTION / AVAILABILITY STATEMENT 12b. DISTRIBUTION CODE Approved for public release; distribution is unlimited 13. ABSTRACT (maximum 200 words) The idea of homegrown terrorism is not a new concept, especially considering the history of challenges faced by the United States and other Western countries. However, the current violent jihadist problem has overshadowed those past misfortunes in terms of its objective and volatility. What is emergent is the means by which the individuals involved in this movement reinforce or possibly operationalize their radicalized behavior. The Internet is often that vehicle. Efforts to reform U.S. intelligence have placed increasing value on open source information for threat assessments. Consequently, the open Internet has been targeted in search of radical actors, both foreign and homegrown. Some analysts contend that the availability of radical discourse on the Internet presents an opportunity for early identification by authorities. This thesis analyzes the value of open source exploitation of the Internet in the domestic counterterrorism role in relation to other detection techniques in order to extract best practices and lessons learned for improved intelligence and law enforcement activities. 14. SUBJECT TERMS 15. NUMBER OF PAGES Homegrown Terrorism; Jihad; Internet; Open Source 141 16. PRICE CODE 17. SECURITY 18. SECURITY 19. SECURITY 20. LIMITATION OF CLASSIFICATION OF CLASSIFICATION OF THIS CLASSIFICATION OF ABSTRACT REPORT PAGE ABSTRACT Unclassified Unclassified Unclassified UU NSN 7540-01-280-5500 Standard Form 298 (Rev. 2-89) Prescribed by ANSI Std. 239-18 i THIS PAGE INTENTIONALLY LEFT BLANK ii Approved for public release; distribution is unlimited THE INTERNET AND HOMEGROWN JIHADIST TERRORISM: ASSESSING U.S. DETECTION TECHNIQUES Justin D. Bañez Captain, United States Air Force B.S., United States Air Force Academy, 2004 Submitted in partial fulfillment of the requirements for the degree of MASTER OF ARTS IN SECURITY STUDIES (HOMELAND SECURITY AND DEFENSE) from the NAVAL POSTGRADUATE SCHOOL December 2010 Author: Justin D. Bañez Approved by: Erik J. Dahl Thesis Advisor Sean F. Everton Second Reader Harold A. Trinkunas, PhD Chairman, Department of National Security Affairs iii THIS PAGE INTENTIONALLY LEFT BLANK iv ABSTRACT The idea of homegrown terrorism is not a new concept, especially considering the history of challenges faced by the United States and other Western countries. However, the current violent jihadist problem has overshadowed those past misfortunes in terms of its objective and volatility. What is emergent is the means by which the individuals involved in this movement reinforce or possibly operationalize their radicalized behavior. The Internet is often that vehicle. Efforts to reform U.S. intelligence have placed increasing value on open source information for threat assessments. Consequently, the open Internet has been targeted in search of radical actors, both foreign and homegrown. Some analysts contend that the availability of radical discourse on the Internet presents an opportunity for early identification by authorities. This thesis analyzes the value of open source exploitation of the Internet in the domestic counterterrorism role in relation to other detection techniques in order to extract best practices and lessons learned for improved intelligence and law enforcement activities. v THIS PAGE INTENTIONALLY LEFT BLANK vi TABLE OF CONTENTS I. INTRODUCTION........................................................................................................1 A. RESEARCH QUESTION ...............................................................................1 B. PURPOSE AND IMPORTANCE ..................................................................2 C. LITERATURE REVIEW ...............................................................................3 D. PROBLEMS AND HYPOTHESES ...............................................................9 E. METHODS AND SOURCES........................................................................10 II. THE GROWING CONCERN OVER JIHAD ON THE NET ..............................15 A. INTRODUCTION..........................................................................................15 B. PERSPECTIVES FROM THE TERRORISM RESEARCH COMMUNITY ...............................................................................................16 1. Jihad Goes Online ...............................................................................17 C. THE INTELLIGENCE COMMUNITY CATCHES ON ..........................22 1. Assessments: 1996 to 1999.................................................................23 2. Assessments: 2000 to 2007.................................................................26 D. NOT A TOOL JUST FOR JIHADISTS ......................................................28 III. COLLECTING AND USING INTERNET INFORMATION: CHALLENGES..........................................................................................................31 A. INTRODUCTION..........................................................................................31 B. DEALING WITH INFORMATION VOLUME.........................................33 C. LANGUAGE AND CULTURAL OBSTACLES ........................................35 D. ASSESSING CREDIBILITY........................................................................36 E. ORGANIZATIONS .......................................................................................38 1. National Counterterrorism Center ..................................................39 2. DHS Office of Intelligence and Analysis..........................................41 3. National Open Source Center...........................................................43 4. Federal Bureau of Investigation .......................................................44 5. University of Arizona Dark Web Project ........................................45 F. PRIVACY AND CIVIL LIBERTIES ..........................................................46 IV. CASE STUDIES.........................................................................................................51 A. OVERVIEW...................................................................................................51 B. PORTLAND SEVEN—PORTLAND, OR (2002).......................................53 C. TORRANCE PLOTTERS—TORRANCE, CA (2005)..............................58 D. ADAM GADAHN—RIVERSIDE, CA (2004).............................................62 E. RONALD GRECULA—HOUSTON, TX (2005)........................................68 F. NAJIBULLAH ZAZI—DENVER, CO (2009)............................................72 G. MICHAEL FINTON—DECATUR, IL (2009)............................................79 H. HOSAM SMADI—DALLAS, TX (2009).....................................................84 I. TOLEDO THREE—TOLEDO, OH (2006) ................................................90 J. GEORGIA PLOTTERS—ATLANTA, GA (2006).....................................97 K. COLLEEN LAROSE—PENNSBURG, PA (2009)...................................104 vii L. FINDINGS....................................................................................................109 V. CONCLUSION ........................................................................................................113 A. SUMMARY ..................................................................................................113 B. RECOMMENDATIONS.............................................................................114
Recommended publications
  • Day Two of Military Judge Questioning 9/11 Accused About Self-Representation
    Public amnesty international USA Guantánamo: Day two of military judge questioning 9/11 accused about self-representation 11 July 2008 AI Index: AMR 51/077/2008 On 10 July 2008, military commission judge US Marine Colonel Ralph Kohlmann held further proceedings to question the men accused of orchestrating the attacks of 11 September 2001 about their decision to represent themselves at their forthcoming death penalty trial in the US Naval Base in Guantánamo Bay, Cuba. Amnesty International had an observer at the proceedings. The primary purpose of the hearings was to inquire of each of the accused individually about whether they had been intimidated before or during their arraignment on 5 June 2008 into making a choice to represent themselves, or whether this decision had been made knowingly and voluntarily. Judge Kohlmann had questioned two of the accused, ‘Ali ‘Abd al-‘Aziz ‘Ali (‘Ammar al Baluchi) and Mustafa al Hawsawi at individual sessions held on 9 July (see http://www.amnesty.org/en/library/info/AMR51/076/2008/en). He had scheduled sessions for the other three men, Khalid Sheikh Mohammed, Walid bin Attash and Ramzi bin al-Shibh on 10 July. In the event, Ramzi bin al-Shibh refused to come to his session. It seems unlikely that the military judge will question him again on the matter of legal representation until the issue of Ramzi bin al-Shibh’s mental competency is addressed at a hearing scheduled to take place next month (see http://www.amnesty.org/en/library/info/AMR51/074/2008/en). Both Khalid Sheikh Mohammed and Walid bin Attash denied that they had been intimidated or that any intimidation had taken place.
    [Show full text]
  • Articles Al-Qaida and the Pakistani Harakat Movement: Reflections and Questions About the Pre-2001 Period by Don Rassler
    PERSPECTIVES ON TERRORISM Volume 11, Issue 6 Articles Al-Qaida and the Pakistani Harakat Movement: Reflections and Questions about the pre-2001 Period by Don Rassler Abstract There has been a modest amount of progress made over the last two decades in piecing together the developments that led to creation of al-Qaida and how the group has evolved over the last 30 years. Yet, there are still many dimensions of al-Qaida that remain understudied, and likely as a result, poorly understood. One major gap are the dynamics and relationships that have underpinned al-Qaida’s multi-decade presence in Pakistan. The lack of developed and foundational work done on the al-Qaida-Pakistan linkage is quite surprising given how long al- Qaida has been active in the country, the mix of geographic areas - from Pakistan’s tribal areas to its main cities - in which it has operated and found shelter, and the key roles Pakistani al-Qaida operatives have played in the group over the last two decades. To push the ball forward and advance understanding of this critical issue, this article examines what is known, and has been suggested, about al-Qaida’s relations with a cluster of Deobandi militant groups consisting of Harakat ul-Mujahidin, Harakat ul-Jihad Islami, Harakat ul-Ansar, and Jaish-e-Muhammad, which have been collectively described as Pakistan’s Harakat movement, prior to 9/11. It finds that each of these groups and their leaders provided key elements of support to al-Qaida in a number of direct and indirect ways.
    [Show full text]
  • View Annual Report
    2008 Annual Report ABOUT A. H. BELO CORPORATION A. H. Belo Corporation (NYSE: AHC) headquartered in Dallas, Texas, is a distinguished newspaper publishing and local news and information company that owns and operates four daily newspapers and a diverse group of Web sites. A. H. Belo publishes The Dallas Morning News, Texas’ leading newspaper and winner of eight Pulitzer Prizes since 1986; The Providence Journal, the oldest continuously-published daily newspaper in the U.S. and winner of four Pulitzer Prizes; The Press-Enterprise (Riverside, CA), serving southern California’s Inland Empire region and winner of one Pulitzer Prize; and the Denton Record-Chronicle. The Company publishes various specialty publications targeting niche audiences, and its partnerships and/or investments include the Yahoo! Newspaper Consortium and Classified Ventures, owner of cars.com. A. H. Belo also owns direct mail and commercial printing businesses. Dear Fellow Shareholders: A. H. Belo Corporation’s first year as a stand-alone publicly-held company was most notable for the dramatic differences in economic conditions versus what we anticipated when the Company was spun off from Belo Corp. on February 8, 2008. Planning for the spin-off, which began in May 2007, did not contemplate any scenario even remotely similar to what A. H. Belo and every other advertising-based company encountered as 2008 unfolded. I am proud of the ways in which the Company’s management and employees responded to these very difficult, unpredictable changes as we aggressively implemented strategies developed along with the Board of Directors. A. H. Belo’s strategy and the initiatives referenced above are detailed in a series of letters I have sent to shareholders and the Company’s employees since the spin-off, most recently prior to the release of the Company’s year-end financial results on February 17.
    [Show full text]
  • Marcin Styszyński PRESENT TRENDS AMONG JIHADISTS
    XI: 2014 nr 3 Marcin Styszyński PRESENT TRENDS AMONG JIHADISTS AFTER THE ARAB SPRING Post-revolutionary environment The Arab Spring created three main trends in current political Islam. The fi rst fi eld concerns offi cial Muslim parties declaring implementation of some Islamic values in legal, constitutional and social life. They resign from violence and accept politi- cal dialogue and mechanisms such as free elections, referendum or parliamentary activities. The second factor refl ects Salafi preaching and radical ideas preserving conservative traditions from the period of the Prophet Mohammad. Salafi groups are focused on their theological teaching, charity work and popularization of moral values among societies. The third category concerns jihadist organizations that dec- lare violence and fi ght against authorities and societies. They refer to the concept of takfīr (excommunication), which considers the state and the society as a sinful and atheistic group supporting immoral and corrupted governments. Moreover, the idea of takfīr is close to Al-Qaeda activities regarding violent renaissance of historic caliphate and implementation of strict sharia rules. Al-Qaeda also adapts defensive and off ensive sense of jihad to modern political context related to Western policy in the Muslim world. The victory of the Muslim Brotherhood and Salafi groups in parliamentary elections in Egypt and Tunisia in 2011, the presidency of Mohammad Mursi as 26 MARCIN STYSZYŃSKI well as control of main regions in Libya and Syria by extremist militias increased infl uences of radical Islam in post-revolutionary countries.1 However, after three years of the transition process Arab societies have changed their attitude to the crucial values of the Arab revolution such as democra- cy, freedom, liberalism or fi ght against authoritarianism.
    [Show full text]
  • Prison Radicalization: Are Terrorist Cells Forming in U
    United States Senate Committee on Homeland Security and Governmental Affairs Chairman Joseph I. Lieberman, ID-Conn. FORT HOOD PRESS CONFERENCE STATEMENT Chairman Joe Lieberman February 3, 2011 Good afternoon and thanks to everyone for coming. Today, Senator Collins and I are releasing our report on the Fort Hood terrorist attack that killed 13 people and injured 32 others on November 5, 2009. We‟re very proud of the report and grateful to our bipartisan staff that carried out the report, which we embrace today. The staff led by Committee staff director Mike Alexander and his team Gordon Lederman, Charlie Martel, and Seamus Hughes The minority staff director Brandon Milhorn was a full partner in this endeavor and others Senator Collins will name in her statement. The point is that they all worked very long and hard on this investigation, but the most important point is that the product of their labor, this report, presents the most comprehensive understanding yet of the massacre at Fort Hood and enables us to make recommendations, particularly to the Department of Defense and the FBI, about how they and we can work together to better combat radicalization to violent Islamist extremism among people, like Nidal Hasan, inside America and to prevent anything like the murders at Fort Hood from happening again. Throughout our investigation, the victims of this attack, and their families, have weighed heavily on our minds because our report‟s painful conclusion is that the Fort Hood massacre could have, and should have, been prevented. We have reached that conclusion because our investigation found that employees of the Department of Defense and the FBI had compelling evidence of Nidal Hasan‟s growing embrace of violent Islamist extremism in the years before the attack that should have caused them to discharge him from the U.S.
    [Show full text]
  • Global War on Terrorism and Prosecution of Terror Suspects: Select Cases and Implications for International Law, Politics, and Security
    GLOBAL WAR ON TERRORISM AND PROSECUTION OF TERROR SUSPECTS: SELECT CASES AND IMPLICATIONS FOR INTERNATIONAL LAW, POLITICS, AND SECURITY Srini Sitaraman Introduction The global war on terrorism has opened up new frontiers of transnational legal challenge for international criminal law and counterterrorism strategies. How do we convict terrorists who transcend multiple national boundaries for committing and plotting mass atrocities; what are the hurdles in extraditing terrorism suspects; what are the consequences of holding detainees in black sites or secret prisons; what interrogation techniques are legal and appropriate when questioning terror suspects? This article seeks to examine some of these questions by focusing on the Global War on Terrorism (GWOT), particularly in the context of counterterrorism strategies that the United States have pursued towards Afghanistan-Pakistan (Af-Pak) since the September 2001 terror attacks on New York and Washington D.C. The focus of this article is on the methods employed to confront terror suspects and terror facilitators and not on the politics of cooperation between the United States and Pakistan on the Global War on Terrorism or on the larger military operation being conducted in Afghanistan and in the border regions of Pakistan. This article is not positioned to offer definitive answers or comprehensive analyses of all pertinent issues associated with counterterrorism strategies and its effectiveness, which would be beyond the scope of this effort. The objective is to raise questions about the policies that the United States have adopted in conducting the war on terrorism and study its implications for international law and security. It is to examine whether the overzealousness in the execution of this war on terror has generated some unintended consequences for international law and complicated the global judicial architecture in ways that are not conducive to the democratic propagation of human rights.
    [Show full text]
  • Congressional Record—House H454
    H454 CONGRESSIONAL RECORD — HOUSE February 2, 2010 HONORING THE U.S. COAST GUARD women of the Coast Guard Sector telligence officials? No. Did Attorney CUTTER ‘‘MOHAWK’’ Miami, as well as the Sector Key West, General Holder declare this terrorist The SPEAKER pro tempore. Under a truly lived their motto, ‘‘Always an enemy combatant and turn him previous order of the House, the gentle- ready.’’ over to the military for further ques- woman from Florida (Ms. ROS- We as a nation can never repay those tioning? No. Did Attorney General LEHTINEN) is recognized for 5 minutes. who serve, but we can take pride in Holder have the FBI continue the ques- Ms. ROS-LEHTINEN. Mr. Speaker, I knowing that those men and women tioning in order to obtain more action- rise tonight to honor the brave work have served not just our community able intelligence? No. and the supreme dedication of the com- but our neighbors in need as well. So what did Attorney General Holder mand and crew of the U.S. Coast Guard Their humanitarian mission reminds have the FBI do? He instructed them to Cutter Mohawk. us all of what it means to be an Amer- give full Miranda rights to this ter- The Mohawk has just returned from a ican and why we should be so proud to rorist, including the right to remain si- 2-month deployment and is now home say, every day, ‘‘I am an American.’’ lent, and gave him not one, not two, at Coast Guard Sector Key West. Dur- The commitment of the U.S.
    [Show full text]
  • 9/11 Report”), July 2, 2004, Pp
    Final FM.1pp 7/17/04 5:25 PM Page i THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page v CONTENTS List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— ...in the Law Enforcement Community 73 3.3 . and in the Federal Aviation Administration 82 3.4 . and in the Intelligence Community 86 v Final FM.1pp 7/17/04 5:25 PM Page vi 3.5 . and in the State Department and the Defense Department 93 3.6 . and in the White House 98 3.7 . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis:August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5.
    [Show full text]
  • Fort Hood Rampage: ‘The Most Destructive Terrorist Act Committed on the American Soil Since 09.11" ?
    ANALYSIS 09/11/2009 FORT HOOD RAMPAGE: ‘THE MOST DESTRUCTIVE TERRORIST ACT COMMITTED ON THE AMERICAN SOIL SINCE 09.11" ? By Claude MONIQUET President of ESISC Looking beyond the tragedy, the massacre at Fort Hood appears extremely interesting for any expert in terrorism because it sheds light on the mechanism of individual radicalisation which can affect persons who have no proven ties with a terrorist structure, transforming them into ‘self-recruited Jihadists.’ Unfortunately, the same tragedy also tells us a lot about the systemic dysfunctionalities within the chain of command of the American Armed Forces, the intelligence agencies and the agencies of law enforcement . The slaughter was not fated to be and could very probably have been averted. It would have sufficed if each party had done its job without allowing itself to be led astray by political correctness and a purely ‘utilitarian’ logic. Political correctness has prompted the investigators and the press to deal with this case as an horrible but simple crime news story and not as a terrorist act. President Barack Obama, for example , said in a serious tone that one ‘must not jump to conclusions too quickly.’ He otherwise is symbolically playing down the scope of this carnage: how else can one explain that he did not find time to go to Fort Hood until five days after the drama took place? As for the press, in its great majority it strikes us that for days now there are few proofs given linking this affair to a terrorist plot and one can thus merely wonder about the motivations of the killer… It is obvious that in this affair there remain areas in the shadows, and that is quite normal since the investigation began just a few days ago and the main ‘suspect,’ Major Nidal Malik Hasan was being treated in an artificial respirator until Saturday and has still not testified to the investigators.
    [Show full text]
  • CTC Sentinel Welcomes Submissions
    Combating Terrorism Center at West Point Objective • Relevant • Rigorous | April 2018 • Volume 11, Issue 4 FEATURE ARTICLE A VIEW FROM THE CT FOXHOLE Five Years After the NYPD vs. Revolution Muslim Boston Marathon Bombing The inside story of how the NYPD defeated the radicalization hub Jesse Morton and Mitchell Silber William Weinreb and Harold Shaw FEATURE ARTICLE Editor in Chief 1 NYPD vs. Revolution Muslim: The Inside Story of the Defeat of a Local Radicalization Hub Paul Cruickshank Jesse Morton and Mitchell Silber Managing Editor INTERVIEW Kristina Hummel 8 A View from the CT Foxhole: Five Years After the Boston Marathon Bombing EDITORIAL BOARD Nicholas Tallant Colonel Suzanne Nielsen, Ph.D. ANALYSIS Department Head Dept. of Social Sciences (West Point) 15 The Islamic State's Lingering Legacy among Young Men from the Mosul Area Scott Atran, Hoshang Waziri, Ángel Gómez, Hammad Sheikh, Lucía Lieutenant Colonel Bryan Price, Ph.D. López-Rodríguez, Charles Rogan, and Richard Davis Director, CTC 23 Challenging the ISK Brand in Afghanistan-Pakistan: Rivalries and Divided Loyalties Brian Dodwell Amira Jadoon, Nakissa Jahanbani, and Charmaine Willis Deputy Director, CTC 30 The British Hacker Who Became the Islamic State's Chief Terror Cyber- Coach: A Profile of Junaid Hussain CONTACT Nafees Hamid Combating Terrorism Center U.S. Military Academy Between 2006 and 2012, two men working on opposite sides of the strug- 607 Cullum Road, Lincoln Hall gle between global jihadis and the United States faced of in New York City. Jesse Morton was the founder of Revolution Muslim, a group that prosely- West Point, NY 10996 tized—online and on New York City streets—on behalf of al-Qa`ida.
    [Show full text]
  • Al Qaeda in the Indian Subcontinent: a New Frontline in the Global Jihadist Movement?” the International Centre for Counter- Ter Rorism – the Hague 8, No
    AL-QAEDA IN THE INDIAN SUBCONTINENT: The Nucleus of Jihad in South Asia THE SOUFAN CENTER JANUARY 2019 AL-QAEDA IN THE INDIAN SUBCONTINENT: THE NUCLEUS OF JIHAD IN SOUTH ASIA !1 AL-QAEDA IN THE INDIAN SUBCONTINENT: THE NUCLEUS OF JIHAD IN SOUTH ASIA AL-QAEDA IN THE INDIAN SUBCONTINENT (AQIS): The Nucleus of Jihad in South Asia THE SOUFAN CENTER JANUARY 2019 !2 AL-QAEDA IN THE INDIAN SUBCONTINENT: THE NUCLEUS OF JIHAD IN SOUTH ASIA CONTENTS List of Abbreviations 4 List of Figures & Graphs 5 Key Findings 6 Executive Summary 7 AQIS Formation: An Affiliate with Strong Alliances 11 AQIS Leadership 19 AQIS Funding & Finances 24 Wahhabization of South Asia 27 A Region Primed: Changing Dynamics in the Subcontinent 31 Global Threats Posed by AQIS 40 Conclusion 44 Contributors 46 About The Soufan Center (TSC) 48 Endnotes 49 !3 AL-QAEDA IN THE INDIAN SUBCONTINENT: THE NUCLEUS OF JIHAD IN SOUTH ASIA LIST OF ABBREVIATIONS AAI Ansar ul Islam Bangladesh ABT Ansar ul Bangla Team AFPAK Afghanistan and Pakistan Region AQC Al-Qaeda Central AQI Al-Qaeda in Iraq AQIS Al-Qaeda in the Indian Subcontinent FATA Federally Administered Tribal Areas HUJI Harkat ul Jihad e Islami HUJI-B Harkat ul Jihad e Islami Bangladesh ISI Pakistan’s Inter-Services Intelligence ISKP Islamic State Khorasan Province JMB Jamaat-ul-Mujahideen Bangladesh KFR Kidnap for Randsom LeJ Lashkar e Jhangvi LeT Lashkar e Toiba TTP Tehrik-e Taliban Pakistan !4 AL-QAEDA IN THE INDIAN SUBCONTINENT: THE NUCLEUS OF JIHAD IN SOUTH ASIA LIST OF FIGURES & GRAPHS Figure 1: Map of South Asia 9 Figure 2:
    [Show full text]
  • The Al Qaeda Network a New Framework for Defining the Enemy
    THE AL QAEDA NETWORK A NEW FRAMEWORK FOR DEFINING THE ENEMY KATHERINE ZIMMERMAN SEPTEMBER 2013 THE AL QAEDA NETWORK A NEW FRAMEWORK FOR DEFINING THE ENEMY KATHERINE ZIMMERMAN SEPTEMBER 2013 A REPORT BY AEI’S CRITICAL THREATS PROJECT ABOUT US About the Author Katherine Zimmerman is a senior analyst and the al Qaeda and Associated Movements Team Lead for the Ameri- can Enterprise Institute’s Critical Threats Project. Her work has focused on al Qaeda’s affiliates in the Gulf of Aden region and associated movements in western and northern Africa. She specializes in the Yemen-based group, al Qaeda in the Arabian Peninsula, and al Qaeda’s affiliate in Somalia, al Shabaab. Zimmerman has testified in front of Congress and briefed Members and congressional staff, as well as members of the defense community. She has written analyses of U.S. national security interests related to the threat from the al Qaeda network for the Weekly Standard, National Review Online, and the Huffington Post, among others. Acknowledgments The ideas presented in this paper have been developed and refined over the course of many conversations with the research teams at the Institute for the Study of War and the American Enterprise Institute’s Critical Threats Project. The valuable insights and understandings of regional groups provided by these teams directly contributed to the final product, and I am very grateful to them for sharing their expertise with me. I would also like to express my deep gratitude to Dr. Kimberly Kagan and Jessica Lewis for dedicating their time to helping refine my intellectual under- standing of networks and to Danielle Pletka, whose full support and effort helped shape the final product.
    [Show full text]