The Neo-Caliphate of the “Islamic State”

Total Page:16

File Type:pdf, Size:1020Kb

The Neo-Caliphate of the “Islamic State” CSS Analyses in Security Policy CSS ETH Zurich N0. 166, December 2014, Editor: Christian Nünlist The Neo-Caliphate of the “Islamic State” The so-called “Islamic State” represents a new phase in global jihad, wherein efforts will be made to seize and retain territorial control in the face of overwhelming Western military superiority. While this potentially makes jihadist groups vulnerable to destruction, it also increases the risk of home-grown radicalization as foreign fighters flock to join the new “Caliphate”. By Prem Mahadevan The jihadist takeover of Iraq’s second-larg- est city Mosul in June 2014 sharply focused international attention on the country. Coming at a time when Western policy concerns were oriented towards Ukraine, the South China Sea, Gaza, and Afghani- stan, the takeover’s abruptness came as a surprise. Shortly thereafter, the responsible jihadist group named itself the “Islamic State” (IS) and declared the formation of a new Caliphate, signaling that its ideologi- cal agenda was not confined to distinct po- litical or geographic boundaries. The IS has been since projecting itself as a rival to al- Qaida, by competing for credibility and le- gitimacy among the global jihadist com- munity. The IS is unusual in that, until very recent- ly, it had a record of impressive operational A militant Islamist fighter celebrates the declaration of an Islamic “caliphate” in Syria’s northern success, combined with a slick propaganda Raqqa province in June 2014. Reuters machinery to showcase this success. In contrast, al-Qaida remains weakened as a result of counterterrorism efforts in the Af- ghanistan-Pakistan region. Leaders of the What now confronts Western policymak- cohesiveness of government forces and older group are being upstaged by a new ers is the possibility of a strategic rivalry paralyze its opponents while it occupies generation of jihadists with a more sectar- between two jihadist movements with al- fresh territory. However, after being target- ian agenda that fits well with the political most identical aims, but divided by person- ed by US-led airstrikes since August 2014, climate of some Arab countries reeling ality clashes and divergent priorities. Al- its rhetoric has started to emulate that of from the revolts of 2011. Al-Qaida now Qaida remains focused on attacking al-Qaida, in calling for attacks on Western has competition from the IS in Libya and Western targets in order to isolate “apos- homelands. Given the attractiveness of the Syria, with possibly another front opening tate regimes” in the Arab world, while the IS to Western jihadists, this is a worrying up in Algeria. Meanwhile, jihadist factions IS is keen to overthrow these regimes by development. The group potentially could in Nigeria and Egypt have claimed align- military force. By playing upon sectarian develop a long-distance strike capability ment with the IS. tensions, the latter seeks to undermine the that would operate directly or indirectly, © 2014 Center for Security Studies (CSS), ETH Zurich 1 CSS Analyses in Security Policy No. 166, December 2014 depending on whether its leadership orders Salafists brought a degree of ideological tioned in the area. Sectarian rifts between specific attacks or sanctions them post hoc. fervor that few other insurgent groups pos- Shi’ites and Sunnis were exploited to dis- sessed. integrate military units, whose command- Origins of the “Islamic State” ers were in any case fleeing upon hearing of The IS is descended from a group set up by The appointment of Abu Bakr al-Baghdadi the IS’ brutality towards government loyal- Jordanian jihadist Abu Musab al-Zarqawi. as leader of the IS in 2010 was a turning ists. IS columns, mostly composed of thin- Following the 2003 US invasion of Iraq, point. Al-Baghdadi had the support of a skinned SUVs with heavy machine guns, Zarqawi and his followers joined the former Iraqi colonel, who helped him for- used the extensive road network to outma- Ba’athist-led insurgency against the occu- mulate a long-term plan for territorial ex- neuver scattered and ill-coordinated secu- pation forces. In 2004, he formally aligned pansion. The outbreak of civil war in neigh- rity detachments. For shock effect, the with Osama bin Laden, with whom he boring Syria, although initially perceived as group employed suicide bombers as a form previously had had differences, and named a distraction, was later appreciated for the of cheap artillery, softening up military tar- his group “al-Qaida in Iraq”. After Zarqawi strategic depth it provided the jihadist gets before engulfing them in well-coordi- was killed by the US in 2006, the group movement in Iraq. With the al-Assad re- nated light infantry assaults. This was an adopted the name “Islamic State of Iraq”. gime being excoriated for its repression of operational-level innovation unseen previ- This was changed once again in April 2013, Sunnis, Syria was a cause célèbre among ously in other theaters of war, where sui- as the group established a direct presence jihadists worldwide. The IS established a cide bombers have mainly been used either in Syria, to the “Islamic State of Iraq and presence in the country through a subsidi- for tactical purposes and occasionally or for the Levant” and finally in June 2014, to ary organization known as Jabhat al-Nusra. strategic effect. “The Islamic State”. Over time, the latter began to carve out an independent identity for itself and made Planning for the June offensive had been From an early stage, the group embarked direct overtures to the core al-Qaida lead- conducted by a former Iraqi army captain. on a sectarian agenda, much to the discom- ership in Pakistan. Seeking to regain con- Like many of the IS’ key operatives, he used fort of al-Qaida’s core leadership in Paki- trol of its proxy, the Islamic State of Iraq professional knowledge of small-unit tac- included the “Levant” in its tics to develop an intricate battle plan, Mosul was the focus of a targeted own name. This worsened ten- which was then implemented with preci- sion between Jabhat al-Nusra sion. However, this also heralded a weak- killing program in which several and al-Qaida on the one hand, ness in the group, which might come into hundred government employees and the IS on the other. A for- effect during 2015: the IS is good on hu- mal split was announced in man and physical terrain that it knows, but were assassinated. February 2014, but the subse- has shown itself to be relatively brittle at quent battlefield successes of strategic adaptation. The battle for Kobane stan, which advocated Shi’ite-Sunni unity the IS through the remainder of the year in Syria is an example of such brittleness – against the West. Between 2003 and 2007, substantially weakened its opponents. despite coming under withering attack the IS attacked Shi’ites despite advice from from Western air power, the IS continued the core leadership to concentrate on for- The fall of Mosul was a key event. In hind- to dispatch fighters to the combat zone, eign soldiers. By 2007, resentment against sight, it appears as though the IS had oper- thereby refusing to cap its losses. Across the group had permeated even the Sunni ated according to a long-term plan to iso- Syria and Iraq, its advances have been community of Iraq, resulting in a popular late the city and build up pockets of support greatly aided by intelligence networks cre- tribal uprising against the group. Since the among its Sunni community. Between No- ated over a period of time among the local IS drew heavily on foreign jihadists for its vember 2012 and November 2013, 57 per Sunni population. When confronting or- operations, it lacked a strong local network cent of IS operations were concentrated in ganized forces in areas where it has no local and suffered very severe losses of personnel. just two of Iraq’s 18 provinces – Nineweh support, the IS has been unable to replicate The underlying alliance of Sunni tribal and Salah ad-Din. Mosul as the capital of its successes in the Sunni heartland. leaders and US forces constituted one of Nineweh was the focus of a targeted killing the pillars of the successful US “surge” in program in which several hundred govern- The group has shown a relatively sophisti- 2006 – 7, pulling Iraq back from the brink ment employees were assassinated, crip- cated command and control model, where- of sectarian civil war. pling the city’s administrative machinery. in the top leadership issues operational ob- Salah ad-Din, meanwhile, served as a cor- jectives to be met by local commanders Between 2008 and 2010, however, the ridor to Baghdad, which was rocked by ve- who rely on their own discretion as to the group developed an indigenous cadre of hicle bombs on a daily basis. This pincer means employed. This does have the nega- leaders who were intimately familiar with movement – simultaneous attacks in the tive effect of dissipating some of the group’s Iraqi demographics and were capable of north and the south – became a staple tac- offensive power in subsidiary operations, long-term planning. This cadre was a com- tic of the IS and an effective means of dis- but overall it still serves to confuse adver- bination of Ba’athists and Salafists, who persing Iraqi government forces over a sary forces as to the chosen axis of an IS had been incarcerated together in US-run wide area. advance. Combined with night-fighting prisons. The most famous of these was skills and the determination to follow Camp Bucca, in which at least nine top Leadership and Characteristics through with an attack once launched, the members of the IS were detained.
Recommended publications
  • Vision Performance Institute
    Vision Performance Institute Technical Report Individual character legibility James E. Sheedy, OD, PhD Yu-Chi Tai, PhD John Hayes, PhD The purpose of this study was to investigate the factors that influence the legibility of individual characters. Previous work in our lab [2], including the first study in this sequence, has studied the relative legibility of fonts with different anti- aliasing techniques or other presentation medias, such as paper. These studies have tested the relative legibility of a set of characters configured with the tested conditions. However the relative legibility of individual characters within the character set has not been studied. While many factors seem to affect the legibility of a character (e.g., character typeface, character size, image contrast, character rendering, the type of presentation media, the amount of text presented, viewing distance, etc.), it is not clear what makes a character more legible when presenting in one way than in another. In addition, the importance of those different factors to the legibility of one character may not be held when the same set of factors was presented in another character. Some characters may be more legible in one typeface and others more legible in another typeface. What are the character features that affect legibility? For example, some characters have wider openings (e.g., the opening of “c” in Calibri is wider than the character “c” in Helvetica); some letter g’s have double bowls while some have single (e.g., “g” in Batang vs. “g” in Verdana); some have longer ascenders or descenders (e.g., “b” in Constantia vs.
    [Show full text]
  • The Yubikey Manual
    The YubiKey Manual Usage, configuration and introduction of basic concepts Version: 3.4 Date: 27 March, 2015 The YubiKey Manual Disclaimer The contents of this document are subject to revision without notice due to continued progress in methodology, design, and manufacturing. Yubico shall have no liability for any error or damages of any kind resulting from the use of this document. The Yubico Software referenced in this document is licensed to you under the terms and conditions accompanying the software or as otherwise agreed between you or the company that you are representing. Trademarks Yubico and YubiKey are trademarks of Yubico AB. Contact Information Yubico AB Kungsgatan 37, 8 floor 111 56 Stockholm Sweden [email protected] © Yubico, 2015 Page 2 of 40 Version: Yubikey Manual 3.4 The YubiKey Manual Contents 1 Document Information 1.1 Purpose 1.2 Audience 1.3 Related documentation 1.4 Document History 1.5 Definitions 2 Introduction and basic concepts 2.1 Basic concepts and terms 2.2 Functional blocks 2.3 Security rationale 2.4 OATH-HOTP mode 2.5 Challenge-response mode 2.6 YubiKey NEO 2.7 YubiKey versions and parametric data 2.8 YubiKey Nano 3 Installing the YubiKey 3.1 Inserting the YubiKey for the first time (Windows XP) 3.2 Verifying the installation (Windows XP) 3.3 Installing the key under Mac OS X 3.4 Installing the YubiKey on other platforms 3.5 Understanding the LED indicator 3.6 Testing the installation 3.7 Installation troubleshooting 4 Using the YubiKey 4.1 Using multiple configurations (from version 2.0) 4.2 Updating a
    [Show full text]
  • Exploring the Interconnectedness of Cryptocurrencies Using Correlation Networks
    Exploring the Interconnectedness of Cryptocurrencies using Correlation Networks Andrew Burnie UCL Computer Science Doctoral Student at The Alan Turing Institute [email protected] Conference Paper presented at The Cryptocurrency Research Conference 2018, 24 May 2018, Anglia Ruskin University Lord Ashcroft International Business School Centre for Financial Research, Cambridge, UK. Abstract Correlation networks were used to detect characteristics which, although fixed over time, have an important influence on the evolution of prices over time. Potentially important features were identified using the websites and whitepapers of cryptocurrencies with the largest userbases. These were assessed using two datasets to enhance robustness: one with fourteen cryptocurrencies beginning from 9 November 2017, and a subset with nine cryptocurrencies starting 9 September 2016, both ending 6 March 2018. Separately analysing the subset of cryptocurrencies raised the number of data points from 115 to 537, and improved robustness to changes in relationships over time. Excluding USD Tether, the results showed a positive association between different cryptocurrencies that was statistically significant. Robust, strong positive associations were observed for six cryptocurrencies where one was a fork of the other; Bitcoin / Bitcoin Cash was an exception. There was evidence for the existence of a group of cryptocurrencies particularly associated with Cardano, and a separate group correlated with Ethereum. The data was not consistent with a token’s functionality or creation mechanism being the dominant determinants of the evolution of prices over time but did suggest that factors other than speculation contributed to the price. Keywords: Correlation Networks; Interconnectedness; Contagion; Speculation 1 1. Introduction The year 2017 saw the start of a rapid diversification in cryptocurrencies.
    [Show full text]
  • From Function to Flourishing: Neo-Aristotelian Ethics and the Science of Life
    From Function to Flourishing: Neo-Aristotelian Ethics and the Science of Life by Seyedeh Parisa Moosavi Tabatabaei A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Department of Philosophy University of Toronto © Copyright 2019 by Seyedeh Parisa Moosavi Tabatabaei From Function to Flourishing: Neo-Aristotelian Ethics and the Science of Life Parisa Moosavi Doctor of Philosophy Department of Philosophy University of Toronto 2019 Abstract Neo-Aristotelian ethical naturalism purports to place moral virtue in the natural world by showing that it is an instance of natural goodness—a kind of goodness supposedly also found in the biological realm of plants and non-human animals. One of the central issues facing this metaethical view concerns its commitment to a teleological conception of the nature of life that seems radically out of touch with the understanding of life in modern biology. In this dissertation, I aim to mend the relationship between neo-Aristotelian ethics and the science of biology by way of three contributions: First, I argue that contrary to what many contemporary neo-Aristotelians have claimed, the science of biology is relevant to assessing central commitments of neo-Aristotelian naturalism regarding the domain of life. Second, I provide new foundations for neo-Aristotelian naturalism by engaging recent and unexplored work in philosophy of biology on theories of function and the nature of living organisms. Lastly, I develop and defend a novel account of the neo-Aristotelian concept of natural goodness that is distinctive for incorporating our scientific understanding of the nature of life. ii Acknowledgments I owe the deepest debt of gratitude to Sergio Tenenbaum and Denis Walsh, whose supervision and support was crucial for the completion of this dissertation.
    [Show full text]
  • P2P Electricity Transaction Between Ders by Blockchain Technology
    DEGREE PROJECT IN COMPUTER SCIENCE AND ENGINEERING, SECOND CYCLE, 30 CREDITS STOCKHOLM, SWEDEN 2018 P2P Electricity transaction between DERs by Blockchain Technology RUOGU LI KTH ROYAL INSTITUTE OF TECHNOLOGY SCHOOL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCE KTH Royal Institute of Technology School of Electrical Engineering and Computer Science Master’s Thesis in Computer Science and Computer Engineering P2P Electricity transaction between DERs by Blockchain Technology Author: Ruogu Liu Supervisors: Anne Håkansson Xue Wang Examiner: Prof.Mihhail Matskin, KTH, Sweden ii Abstract The popularity of blockchain technologies increases with a significant rise in the price of cryptocurrency in 2017, which drew much attention in the academia and industry to research and implement new application or new blockchain technology. Many new blockchains have emerged over the last year in a broad spectrum of sectors and use cases including IOT, Energy, Finance, Real estate, Entertainment, etc. Despite many exciting research and applications have been done, there are still many areas worth investigating, and implementation of the blockchain based distributed application are still facing much uncertainty and challenging since blockchain is still an emerging technology. Meanwhile, the energy sector is under a transition to be digitalized and more distributed. A global technology revolution has disrupted the conventional centralized power system with distributed resources and technologies, like photovoltaic units (PV), batteries, electric mobilities, etc. The citizens then have control of their generation and consumption profiles. The purpose of this master thesis is to explore existing blockchain technology, and smart contracts such as IOTA, NEO, Ethereum Tobalaba, which can be adapted in the energy sector. Within this thesis, blockchain and the smart contract is proposed as a way of building distributed applications for a p2p transaction use case in the energy asset management platform.
    [Show full text]
  • Qualitative Comparative Analysis
    The current issue and full text archive of this journal is available on Emerald Insight at: www.emeraldinsight.com/2531-0488.htm Qualitative Qualitative comparative analysis: comparative justifying a neo-configurational analysis approach in management research Tobias Coutinho Parente 399 Universidade de São Paulo, São Paulo, Brazil and Instituto Brasileiro de Governança Corporativa – IBGC, São Paulo, Brazil, and Received 10 May 2019 Revised 22 July 2019 Ryan Federo Accepted 7 August 2019 ESADE Business School, Barcelona, Spain Abstract Purpose – The purpose of this paper is to critically reflect and offer insights on how to justify the use of qualitative comparative analysis (QCA) as a research method for understanding the complexity of organizational phenomena, by applying the principles of the neo-configurational approach. Design/methodology/approach – We present and critically examine three arguments regarding the use of QCA for management research. First, they discuss the need to assume configurational theories to build and empirically test a causal model of interest. Second, we explain how the three principles of causal complexity are assumed during the process of conducting QCA-based studies. Third, we elaborate on the importance of case knowledge when selecting the data for the analysis and when interpreting the results. Findings – We argue that it is important to reflect on these arguments to have an appropriate research design. In the true spirit of the configurational approach, we contend that the three arguments presented are necessary; however, each argument is insufficient to warrant a QCA research design. Originality/value – This paper contributes to management research by offering key arguments on how to justify the use of QCA-based studies in future research endeavors.
    [Show full text]
  • Uncorrected Proof
    AUTHOR'S PROOF JrnlID 13423_ArtID 229_Proof# 1 - 11/02/2012 Psychon Bull Rev DOI 10.3758/s13423-012-0229-7 1 3 BRIEF REPORT 2 4 The QWERTY Effect: How typing shapes the meanings 5 of words. 6 Kyle Jasmin & Daniel Casasanto 7 8 # The Author(s) 2012. This article is published with open access at Springerlink.com 9 10 Abstract The QWERTY keyboard mediates communication in valence, on average, than words with more left-side letters: 22 11 for millions of language users. Here, we investigated whether the QWERTY effect. This effect was strongest in new words 23 12 differences in the way words are typed correspond to differ- coined after QWERTY was invented and was also found in 24 13 ences in their meanings. Some words are spelled with more pseudowords. Although these data are correlational, the dis- 25 14 letters on the right side of the keyboard and others with more covery of a similar pattern across languages, which was stron- 26 15 letters on the left. In three experiments, we tested whether gest in neologisms, suggests that the QWERTY keyboard is 27 16 asymmetries in the way people interact with keys on the right shaping the meanings of words as people filter language 28 17 and left of the keyboard influence their evaluations of the through their fingers. Widespread typing introduces a new 29 18 emotional valence of the words. We found the predicted mechanism by which semantic changes in language can arise. 30 19 relationship between emotional valence and QWERTY key 20 position across three languages (English, Spanish, and Dutch).
    [Show full text]
  • Flourishing As the Standard for Evaluating the Social Practice of Competitive Sport
    Flourishing as the Standard Donald B. Thompson Professor Emeritus of Food Science and Senior Fellow at for Evaluating the Social Practice the Rock Ethics Institute, Pennsylvania State University of Competitive Sport* [email protected] Francisco Javier López Frías El florecimiento como criterio Assistant Professor of Kinesiology and Research Associate para evaluar la práctica social in the Rock Ethics Institute, Pennsylvania State University [email protected] del deporte competitivo ISSN 1989-7022 ABSTRACT: Competitive sport in its many specific forms is an important RESUMEN: El deporte competitivo, en sus múltiples formas, es un elemen- aspect of many cultures. Particular sports may be considered as what to importante en muchas culturas. Cada deporte específico puede con- MacIntyre calls “social practices.” We argue that the appropriateness of cebirse como, en términos de MacIntyre, una “práctica social”. En este a competitive sport should be evaluated as a social practice, according artículo se defiende que la adecuación del deporte competitivo, en tan- to its contribution to the human flourishing of those who engage in the to que práctica social, debe ser analizada en función de su contribución practice. We critique mutualism, a popular putatively virtue-based ap- al florecimiento humano de aquellos que participan en ella. Se critica al proach to sport, as a valuable but incomplete position that is inconsistent mutualismo, una posición filosófica del deporte fundada en la virtud y with its Aristotelian roots. We analyze Aristotelian and neo-Aristotelian ampliamente aceptada, porque resulta valiosa pero, a su vez, es incom- understandings of flourishing as consisting in the development, exercise, pleta e inconsistente con sus raíces aristotélicas.
    [Show full text]
  • An Improved Arabic Keyboard Layout
    Sci.Int.(Lahore),33(1),5-15,2021 ISSN 1013-5316; CODEN: SINTE 8 5 AN IMPROVED ARABIC KEYBOARD LAYOUT 1Amjad Qtaish, 2Jalawi Alshudukhi, 3Badiea Alshaibani, 4Yosef Saleh, 5Salam Bazrawi College of Computer Science and Engineering, University of Ha'il, Ha'il, Saudi Arabia. [email protected], [email protected], [email protected], [email protected], [email protected] ABSTRACT: One of the most important human–machine interaction (HMI) systems is the computer keyboard. The keyboard layout (KL) dictates how a person interacts with a physical keyboard through the way in which the letters, numbers, punctuation marks, and symbols are mapped and arranged on the keyboard. Mapping letters onto the keys of a keyboard is complex because many issues need to be taken into considerations, such as the nature of the language, finger fatigue, hand balance, typing speed, and distance traveled by fingers during typing and finger movements. There are two main kinds of KL: English and Arabic. Although numerous research studies have proposed different layouts for the English keyboard, there is a lack of research studies that focus on the Arabic KL. To address this lack, this study analyzed and clarified the limitations of the standard legacy Arabic KL. Then an efficient Arabic KL was proposed to overcome the limitations of the current KL. The frequency of Arabic letters and bi-gram probabilities were measured on a large Arabic corpus in order to assess the current KL and to design the improved Arabic KL. The improved Arabic KL was then evaluated and compared against the current KL in terms of letter frequency, finger-travel distance, hand and finger balance, bi-gram frequency, row distribution, and most frequent words.
    [Show full text]
  • French Foreign Policy in Africa: Between Pré Carré and Multilateralism
    FRENCH FOREIGN POLICY IN AFRICA: BETWEEN PRÉ CARRÉ AND MULTILATERALISM Sylvain Touati An Africa Programme Briefing Note February 2007 Chatham House (The Royal Institute of International Affairs) is an independent body which promotes the rigorous study of international questions and does not express opinions of its own. The opinions expressed in this publication are the responsibility of the author. © The Royal Institute of International Affairs, 2007 All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical including photocopying, recording or any information storage or retrieval system, without the prior written permission of the copyright holder. Please direct all enquiries to the publishers. 2 Contents 1 Introduction 1 2 Historical Context 2 3 Public Aid for Development 5 4 Political Trends 9 5 International Competition 14 6 France in Europe 16 7 2007 Elections 18 8 Conclusions 21 3 1 INTRODUCTION “Africa is a real opportunity for France. It broadens both our horizon and our ambition on the international scene. It is true in the diplomatic, economic and cultural context.” Dominique de Villepin, 18 June 20031 France’s monopoly of Africa is under threat. The last 50 years have seen the French battling to hold on to the ‘privileged relationship’ with their former colonial empire, and a number of factors have forced the once imperial power into redefining its affiliation with ex-colonies, such as new laws on aid distribution, the integration of the EU and modern economic reforms. In the post-Cold War era, ‘multilateralism’ has become the latest political buzzword, and in its wake a notable shift in French policy in Africa has emerged.
    [Show full text]
  • Illicit Financial Flows in Africa
    POLICY BRIEF Illicit financial flows in Africa Drivers, destinations, and policy options Landry Signé, Mariama Sow, and Payce Madden March 2020 Abstract Since 1980, an estimated $1.3 trillion has left sub-Saharan Africa in the form of illicit financial flows (per Global Financial Integrity methodology), posing a central challenge to development financing. In this paper, we provide an up-to-date examination of illicit financial flows from Africa from 1980 to 2018, assess the drivers and destinations of illicit outflows, and examine policy options to reduce them. Using trade misinvoicing and balance-of-payments discrepancies to estimate illicit financial flows, we find higher real GDP is associated with higher illicit financial flows due to the increased opportunities to channel illicit resources abroad generated by higher economic activity, suggesting a need for increased diligence as countries grow. We also find that higher taxes and higher inflation lead to higher illicit financial outflows, suggesting that firms seek out relatively more stable or favorable fiscal environments for their funds. We further find that, over the past decade, there has been an increase in illicit outflows of capital toward emerging and developing economies (e.g., China) as trade between Africa and these countries has increased. We conclude with policy recommendations to address illicit financial flows in order to shift the discussion toward effective policies applicable to all countries. Illicit financial flows in Africa: Drivers, destinations, and policy options AFRICA GROWTH INITIATIVE 1. INTRODUCTION While the international development community often focuses on the amount of aid and investment that enters the African continent, the other part of the balance sheet—the funds exiting the continent—has often been overlooked.
    [Show full text]
  • Dell Latitude 7220 I5
    A quote for your consideration. Based on your business needs, we put the following quote together to help with your purchase decision. Below is a detailed summary of the quote we’ve created to help you with your purchase decision. To proceed with this quote, you may respond to this email, order online through your Premier page, or, if you do not have Premier, use this Quote to Order. Quote No. 3000088785049.1 Sales Rep Daniel Rodriguez Total $1,874.41 Phone (800) 456-3355, 7244648 Customer # 41069979 Email [email protected] Quoted On Jun. 16, 2021 Billing To MICHAEL DEGAN Expires by Jul. 16, 2021 ONONDAGA COUNTY Contract Code C000000005600 650 HIAWATHA BLVD W Customer Agreement # NCPA 01-42 SYRACUSE, NY 13204-1123 Deal ID 22119748 Message from your Sales Rep Please contact your Dell sales representative if you have any questions or when you're ready to place an order. Thank you for shopping with Dell! Regards, Daniel Rodriguez Shipping Group Shipping To Shipping Method ALEX YINGST Standard Delivery ONONDAGA COUNTY 421 MONTHGOMERY ST SUB BASEMENT RM 140 SYRACUSE, NY 13202 (315) 435-7743 Product Unit Price Quantity Subtotal Dell Latitude 7220 $1,874.41 1 $1,874.41 Page 1 Dell Marketing LP. U.S. only. Dell Marketing LP. is located at One Dell Way, Mail Stop 8129, Round Rock, TX 78682 Subtotal: $1,874.41 Shipping: $0.00 Non-Taxable Amount: $1,874.41 Taxable Amount: $0.00 Estimated Tax: $0.00 Total: $1,874.41 Special lease pricing may be available for qualified customers. Please contact your DFS Sales Representative for details.
    [Show full text]