Terrorism and Cyber Attacks As Hybrid Threats: Defining a Comprehensive 21St Century Approach to Global Security by Sascha-Dominik Bachmann & Håkan Gunneriusson

Total Page:16

File Type:pdf, Size:1020Kb

Terrorism and Cyber Attacks As Hybrid Threats: Defining a Comprehensive 21St Century Approach to Global Security by Sascha-Dominik Bachmann & Håkan Gunneriusson SPRING 2014 9th EDITION The Journal on Terrorism and Security Analysis JTSA China 2020: How the People’s Liberation Army Navy Will Affect the U.S. Pivot to Asia By Alexander J. Paul Following the Pivot: Does NATO Have a Role in Southeast Asia? By Paulina Iżewicz A Case Study in Security Affairs: Israel and Sub-Saharan Africa By Gregory Flatow Terrorism and Cyber Attacks as Hybrid Threats: Defining a Comprehensive 21st Century Approach to Global Security By Sascha-Dominik Bachmann & Håkan Gunneriusson The Caucasus Emirate: Russia’s Homegrown Terrorists By Andrew S. Bowen Published by: Contents 2 Acknowledgments 402 MacNaughton Hall Syracuse University Syracuse, NY 13244 3 Contributors E-mail: [email protected] Web: http://satsa.us Journal on Terrorism & Security 4 China 2020: How the People's Liberation Analysis Editorial Board 2013—2014 Army Navy Will Affect the U.S. Pivot to Asia Editor in Chief By Alexander J. Paul David Culley Managing Editors Mary Capparuccini 9 Following the Pivot: Does NATO Have a Tara Pistorese Role in Southeast Asia? Assistant Editors By Paulina Iżewicz Cameron Reed Chris Thompson Chris Moritt Justin Burgess 17 A Case Study in Security Affairs: Israel and Associate Editors Sub-Saharan Africa Matthew Briand By Gregory Flatow Caroline Corcos Jesse Campion Daniel Haverty Jeffrey Howell 26 Terrorism and Cyber Attacks as Hybrid Ben Kopp Peter Levrant Threats: Defining a Comprehensive 21st Kyle Lundin Anne Rakoczy-Kostrycky-Zwil Century Approach to Global Security Jason Stanley By Sascha-Dominik Bachmann & Production and Design Håkan Gunneriusson Syracuse University, Office of Publications 37 The Caucasus Emirate: Russia's Homegrown Terrorists By Andrew S. Bowen SPRING 2014 9TH EDITION 1 JTSA The Journal Now in its 9th edition, JTSA continues to provide students and practitioners with the opportunity to publish in a recognized national security journal. This edition is the combined effort of a diverse staff, including students from the law, public administration, and international relations departments of Syracuse University. Please browse our new and improved website: http://jtsa.syr.edu/ JTSA also continues to attract scholarly attention from established and aspiring scholars. With newly implemented protocols in place to ensure institutional memory, JTSA hopes to build on past achievements to ensure continued future advancement toward scholarly excellence. Acknowledgments The staff would first and foremost like to thank the faculty and staff of the Institute for National Security and Counterterrorism (“INSCT”). The INSCT staff, without whom this journal and the annual conference would not be possible. We would especially like to thank William C. Banks, Robert B. Murrett, David M. Crane, Keli Perrin, William Snyder, Tara Helfman, Isaac Kfir, and Lisa Pritchard for their continued support and guidance. The inspirational depth of scholarship and personal generosity of the INSCT faculty to their students adds greatly to our experience here. The staff would also like to thank Dean James B. Steinberg for his leadership at the Maxwell School. A special thank you must finally go to Mr. Lawrence A. Raab and the Student Association on Terrorism and Security Analysis (“SATSA”). We hope you enjoy this year’s journal. Thank you for your support. 2 THE JOURNAL ON TERRORISM AND SECURITY ANALYSIS Contributors Alex Paul is a Master’s degree in International Relations International Law (AP) at the University of Lincoln. Sascha candidate at the Maxwell School of Citizenship and Public was educated in Germany (Ludwig-Maximilians-Universität Affairs at Syracuse University, and is attending as part of (LMU) München), South Africa (Stellenbosch University the Atlantis Transatlantic Degree Program in International and University of Johannesburg,) and the United Kingdom Security and Development. His academic interests include (University of Portsmouth). He is a Lieutenant Colonel in proliferation, post-conflict security provision, and East Asia. the German Army Reserve and served as a peacekeeper in Mr. Paul graduated with a Masters degree in International the Balkans (Kosovo) on three occasions while completing Relations from the University of Edinburgh (Scotland) in his LL.D with the University of Johannesburg, South Africa. 2013. He is also a member of the Royal Naval Reserve as a Logistics specialist. His e-mail address is [email protected] Trained as a Mountain Warfare Officer, he also had the privilege to be seconded to the U.S. 23rd Marine Regiment as an exchange officer as part of the official U.S.-German Reserve Officers Foreign Exchange Officer Program. His Paulina Iżewicz is an analyst at the Institute for Science particular research interests are in the fields of human rights and International Security, where she focuses on the Iranian litigation, historical justice litigation, the Holocaust/Shoa, nuclear program, illicit nuclear trade and global stockpiles terrorism, the law of armed conflict, hybrid threats and of fissile materials. Reuters and the Los Angeles Times have holistic responses to new 21st century security threats. referenced her work in these fields. She has also written Dr. Bachmann can be contacted at: saschadominikbach- about the United States “rebalance” to Asia and the Law [email protected]. of the Sea arbitration in the South China Sea disputes. She holds a Master of Arts in International Relations from Syracuse University’s Maxwell School, where she studied under a Fulbright scholarship, and a Masters of Law from Dr. Håkan Gunneriusson is the head of research for the University of Wroclaw, Poland. ground operations and tactics at the Swedish National Defence College (SNDC). Dr. Gunneriusson received his PhD in History from Uppsala University 2002, and received multiple grants for his dissertation. His most recent research Gregory Flatow received a Bachelor of Arts and a Master involves hybrid threats, including cyber security. Gunnerius- of Arts in International Relations from the Maxwell School son is head of the introductory course of the Military Of- of Citizenship and Public Affairs at Syracuse University. He ficer’s Program, the COIN course on the Officer’s Program, also received a Certificate of Advanced Study in Security and the final exam paper course for Sweden’s collected Studies from the Institute for National Security and Coun- military cadets. He can be reached at: Hakan.Gunnerius- terterrorism. Mr. Flatow previously completed the Execu- [email protected] tive Certificate Program in Counter-Terrorism Studies at the International Institute for Counter-Terrorism in Herzliyya, Israel, and conducted volunteer research at the Institute for National Security and Counterterrorism at Syracuse Univer- Andrew S. Bowen is a Master’s candidate in Global Affairs sity. He may be contacted at [email protected]. at New York University and is a researcher at the geopo- litical consultancy group Wikistrat. He holds a Bachelor’s degree in Political Science and International Relations from the University of California Davis. He is also a columnist for Dr. Sascha-Dominik Bachmann joined the University The Interpreter, a Russian language translation and analysis of Bournemouth, UK, as an associate professor in August journal. Mr. Bowen is a widely published author, writ- 2013. His teaching and research focuses on international ing for such outlets as The Atlantic, The Daily Beast, The legal subjects and he works on research projects involv- National Interest and The Diplomat. He may be reached at ing colleagues from the UK, South Africa, Israel, Sweden, [email protected] and he Tweets at @Andrew_S_Bowen. the USA and Australia. Prior to joining Bournemouth, he worked as a Senior Lecturer in International and European Law at the University of Portsmouth and as a Reader in SPRING 2014 9TH EDITION 3 JTSA comply with the terms of the Chinese declaration to patrol China 2020: How the over the islands on a training mission. Furthermore, in early People’s Liberation Army December, there was a reported near-miss incident at sea Navy Will Affect the U.S. between the USS Cowpens (CG-63) and an unidentified Chinese warship. The Chinese subsequently claimed that Pivot to Asia the USS Cowpens had intentionally “triggered the confron- By Alexander J. Paul tation” whilst the U.S. claimed its ship had been forced to Introduction take defensive action.2 With a crew of over 6000, the USS George Washing- However, perhaps the incident with the most important ton (CVN 73) is less like a ship and more like a small town long-term implications for the success of the pivot to Asia afloat on the high seas. One of ten nuclear-powered aircraft went the least reported, particularly by Western media. Im- carriers in the United States Navy’s fleet, she is one of the mediately following the Chinese declaration of its ADIZ, its largest warships in the world today and serves as potent first aircraft carrier, the Liaoning,3quietly slipped its moorings symbol to all who see her of U.S. military power and reach. in its homeport of Qingdao and set out for the South China Home-ported in Yokosuka, Japan, the USS George Wash- Sea for the first time to “conduct scientific experiments and ington represents a potent representation of the U.S.’s military training.”4 For the first time, China has a ship with long-standing maritime presence in the East Asian region. It the potential to project power over the entirety of the near is a key part of the so-called ‘pivot to Asia’ that is currently seas area and could, in time, come to significantly alter the reshaping the U.S.’s national security and defense policies. regional balance of maritime power. In the last quarter of 2013, the George Washington These events demonstrate that it will most likely be in sailed into the South China Sea at the head of the Navy’s the seas off of East Asia where the geopolitical ambitions of Carrier Strike Group 5, a task force, which also includes two both China and the U.S.
Recommended publications
  • Terrorism As a Global Peril: a Kenyan Scenario Tactic
    International Journal of Social Science and Technology Vol. 3 No. 5 August 2018 Terrorism as a Global Peril: A Kenyan Scenario Tactic Mongare A. B. LLB, MBA, LLM University of Nairobi The Catholic University of Eastern Africa, The Faculty of Law/Advocates Training Programme KSL, Nairobi, Kenya [email protected] Abstract There is a global concern over terrorism threats due to its very nature of causing physical destruction of human and infrastructure. Resultantly, anguish is experienced through economic loss, insecurity and generally to social disorder to the polity whose effects cannot be accentuated. The paper interests itself with the Kenyan techniques on counter-terrorism. The status quo is worsened by a dearth of a universal definition of terrorism. Most countries in Sub-Saharan Africa are roiled in civil clashes and there has been a polemic on how to deal with the perpetrators of this conflicts; Kenya has remained relatively peaceful for decades and played host to countless evacuees fleeing neighbouring countries. Nevertheless, since 1998, terrorism-related activities have been on the upsurge in the country posing a major threat to national security and development. The scenery of terrorist activities in Kenya has been varying and growing in monstrousness, leaving numerous innocent citizens as victims, while in some incidences, the country has continuously been held at ransom by the terror groups. Though Kenya has put up a concerted fight to prize fight terror it has turned out to be an easy target for terror groups for close to twenty years. Kenya’s counter-terrorism exertions, nonetheless, cannot be undervalued but they have faced a lot of criticism.
    [Show full text]
  • Somalia Terror Threat
    THECHRISTOPHER TERROR February 12, THREAT FROM THE TERROR THREAT FROM SOMALIA THE INTERNATIONALIZATION OF AL SHABAAB CHRISTOPHER HARNISCH APPENDICES AND MAPS BY KATHERINE ZIMMERMAN FEBRUARY 12, 2010 A REPORT BY THE CRITICAL THREATS PROJECT OF THE AMERICAN ENTERPRISE INSTITUTE THE TERROR THREAT FROM SOMALIA CHRISTOPHER HARNISCH February 12, 2010 Contents EXECUTIVE SUMMARY 1 IMPORTANT GROUPS AND ORGANIZATIONS IN SOMALIA 3 NOTABLE INDIVIDUALS 4 INTRODUCTION 8 ORIGINS OF AL SHABAAB 10 GAINING CONTROL, GOVERNING, AND MAINTAINING CONTROL 14 AL SHABAAB’S RELATIONSHIP WITH AL QAEDA, THE GLOBAL JIHAD MOVEMENT, AND ITS GLOBAL IDEOLOGY 19 INTERNATIONAL RECRUITING AND ITS IMPACT 29 AL SHABAAB’S INTERNATIONAL THREATS 33 THREAT ASSESSMENT AND CONCLUSION 35 APPENDIX A: TIMELINE OF MAJOR SECURITY EVENTS IN SOMALIA 37 APPENDIX B: MAJOR SUICIDE ATTACKS AND ASSASSINATIONS CLAIMED BY OR ATTRIBUTED TO AL SHABAAB 47 NOTES 51 Maps MAP OF THE HORN OF AFRICA AND MIDDLE EAST 5 POLITICAL MAP OF SOMALIA 6 MAP OF ISLAMIST-CONTROLLED AND INFLUENCED AREAS IN SOMALIA 7 www.criticalthreats.org THE TERROR THREAT FROM SOMALIA CHRISTOPHER HARNISCH February 12, 2010 Executive Summary hree hundred people nearly died in the skies of and assassinations. Al Shabaab’s primary objectives at TMichigan on Christmas Day, 2009 when a Niger- the time of the Ethiopian invasion appeared to be ian terrorist attempted to blow up a plane destined geographically limited to Somalia, and perhaps the for Detroit. The terrorist was an operative of an al Horn of Africa. The group’s rhetoric and behavior, Qaeda franchise based in Yemen called al Qaeda in however, have shifted over the past two years reflect- the Arabian Peninsula (AQAP).
    [Show full text]
  • Caucasian Review of International Affairs (CRIA) Is a Quarterly Peer-Reviewed, Non- Profit and Only-Online Academic Journal Based in Germany
    CCCAUCASIAN REVIEW OF IIINTERNATIONAL AAAFFAIRS Vol. 4 (((3(333)))) sssummersummer 2020201020 101010 EU DEMOCRACY PROMOTION THROUGH CONDITIONALITY IN ITS NEIGHBOURHOOD JANINE REINHARD EU ENGAGEMENT IN CONFLICT RESOLUTION IN GEORGIA : TOWARDS A MORE PROACTIVE ROLE MEHMET BARDAKÇI RELIGION AND ITS IMPORTANCE IN INTERNATIONAL POLITICS : A CASE STUDY OF 2008 RUSSIAN -GEORGIAN WAR INES -JACQUELINE WERKNER FROM RACKETEER TO EMIR : A POLITICAL PORTRAIT OF DOKU UMAROV , RUSSIA ’S MOST WANTED MAN KEVIN DANIEL LEAHY THE CRISIS OF GAZPROM AS THE CRISIS OF RUSSIA ’S “E NERGY SUPER -STATE ” POLICY TOWARDS EUROPE AND THE FORMER SOVIET UNION ANDREY KAZANTSEV EURASIAN BARGAINING , AGRICULTURE , AND THE DOHA ROUND SARITA D. JACKSON WAS KOSOVO ’S SPLIT -OFF LEGITIMATE ? BACKGROUND , MEANING AND IMPLICATIONS OF THE ICJ’ S ADVISORY OPINION HEIKO KRUEGER UKRAINE : A CHALLENGE FOR U.S., EU & NATO REGIONAL POLICY TAMERLAN VAHABOV ISSN: 1865-6773 www.cria -online.org EDITORIAL BOARD: Dr. Tracey German (King’s College Dr. Robin van der Hout (Europa-Institute, London, United Kingdom) University of Saarland, Germany) Dr. Andrew Liaropoulos (Institute for Dr. Jason Strakes (Analyst, Research European and American Studies, Greece) Reachback Center East, U.S.) Dr. Martin Malek (National Defence Dr. Cory Welt (George Washington Academy, Austria) University, U.S.) INTERNATIONAL ADVISORY BOARD: Prof. Hüseyin Bagci , Middle East Prof. Werner Münch , former Prime Technical University, Ankara, Turkey Minister of Saxony-Anhalt, former Member of the European Parliament, Germany Prof. Hans-Georg Heinrich, University of Vienna, Austria Prof. Elkhan Nuriyev , Director of the Centre for Strategic Studies under the Prof. Edmund Herzig , Oxford University, President of the Republic of Azerbaijan UK Dr.
    [Show full text]
  • Assessing the Vulnerability of Kenyan Youths to Radicalisation and Extremism
    Institute for Security Studies PAPER Assessing the vulnerability of Kenyan youths to radicalisation and extremism INTRODUCTION country is also central to the region and thus deserves That there is an emerging trend of religious radicalisation in closer scrutiny. Although Kenya’s intervention in Somalia East Africa is not in doubt. Somalia, which has experienced served to incite a terrorist response, the experience of various forms of conflict since 1991, has often been seen Uganda, Ethiopia and Burundi, all of which have had troops as the source of extremism in the region, especially in Somalia since 2006, showed different trends. Only the following the attacks on the United States (US) embassies attacks in Uganda and Kenya were attributed to those in Dar es Salaam and Nairobi on 7 August 1998. Yet closer countries’ interventions in Somalia. And, despite the fact investigation reveals that Somali nationals were not behind that those directly involved in these attacks were Ugandan most of the incidents outside Somalia’s borders. Somalia nationals, Kenyans and Tanzanians helped plan and provides a safe haven, training camps and opportunities for execute the attacks, not members of traditional extremists to fight the ‘enemies of Islam’, but al-Qaeda and Somali communities. later al-Shabaab have executed attacks in the region by This is not to say that individuals within the traditional relying on local assistance and support. At the same time, Muslim community have not used frustrations and al-Shabaab managed to recruit Kenyan, Ugandan and vulnerabilities among the youth – Muslim and non-Muslim Tanzanian nationals to its ranks in Somalia.
    [Show full text]
  • 11 July 2006 Mumbai Train Bombings
    11 July 2006 Mumbai train bombings July 2006 Mumbai train bombings One of the bomb-damaged coaches Location Mumbai, India Target(s) Mumbai Suburban Railway Date 11 July 2006 18:24 – 18:35 (UTC+5.5) Attack Type Bombings Fatalities 209 Injuries 714 Perpetrator(s) Terrorist outfits—Student Islamic Movement of India (SIMI), Lashkar-e-Toiba (LeT; These are alleged perperators as legal proceedings have not yet taken place.) Map showing the 'Western line' and blast locations. The 11 July 2006 Mumbai train bombings were a series of seven bomb blasts that took place over a period of 11 minutes on the Suburban Railway in Mumbai (formerly known as Bombay), capital city of the Indian state of Maharashtra and India's financial capital. 209 people lost their lives and over 700 were injured in the attacks. Details The bombs were placed on trains plying on the western line of the suburban ("local") train network, which forms the backbone of the city's transport network. The first blast reportedly took place at 18:24 IST (12:54 UTC), and the explosions continued for approximately eleven minutes, until 18:35, during the after-work rush hour. All the bombs had been placed in the first-class "general" compartments (some compartments are reserved for women, called "ladies" compartments) of several trains running from Churchgate, the city-centre end of the western railway line, to the western suburbs of the city. They exploded at or in the near vicinity of the suburban railway stations of Matunga Road, Mahim, Bandra, Khar Road, Jogeshwari, Bhayandar and Borivali.
    [Show full text]
  • Russia's Looming Crisis
    FOREIGN POLICY RESEARCH INSTITUTE Russia’s Looming Crisis By David Satter Russia’s Looming Crisis By David Satter March 2012 About FPRI - - - Founded in 1955 by Ambassador Robert Strausz Hupé, FPRI is a non partisan,- non profit organization devoted to bringing the insights of scholarship to bear on the development of policies that advance U.S. national interests. In the tradition of Strausz Hupé, FPRI embraces history and geography to illuminate foreign policy challenges facing the United States. In 1990, FPRI established the Wachman Center to foster civic and international literacy in the community and in the classroom. FOREIGN POLICY RESEARCH INSTITUTE 19102-3684 Tel. 215-732- -732-4401 1528 Walnut Street, Suite 610 • Philadelphia, PA 3774 • Fax 215 Email [email protected] • Website: www.fpri.org Table of Contents Introduction ............................................................................................................................... 1 1. The Political Situation ........................................................................................................ 3 The Control of the Election Process ............................................................................................ 4 The Economic Key to Putin’s Political Success ....................................................................... 5 A Political Charade ............................................................................................................................ 6 An Election Fraud .............................................................................................................................
    [Show full text]
  • Dokumentvorlage Für Risdokumente
    26.01.2012 Gericht Asylgerichtshof Entscheidungsdatum 26.01.2012 Geschäftszahl D14 302667-1/2008 Spruch D14 302667-1/2008/27E IM NAMEN DER REPUBLIK! Der Asylgerichtshof hat durch den Richter Mag. Windhager als Vorsitzenden und durch die Richterin Mag. Riepl als Beisitzer über die Beschwerde des XXXX auch XXXX, StA. Russische Föderation, gegen den Bescheid des Bundesasylamtes vom 26.05.2006, FZ. 05 17.994-BAG, nach Durchführung einer mündlichen Verhandlung am 20.09.2011 zu Recht erkannt: I. Die Beschwerde wird gemäß § 7 AsylG 1997 idF BGBl. I Nr. 101/2003 (AsylG 1997) hinsichtlich Spruchpunkt I des angefochtenen Bescheides als unbegründet abgewiesen. II. Gemäß §§ 8 Abs. 1 iVm. 10 Abs. 3 AsylG 1997 wird festgestellt, dass die Zurückweisung, Zurückschiebung oder Abschiebung von XXXX in die Russische Föderation nicht zulässig ist. III. Gemäß §§ 8 Abs. 3 iVm. 15 Abs. 2 AsylG 1997 wird XXXX eine befristete Aufenthaltsberechtigung als subsidiär Schutzberechtigte in der Dauer von einem Jahr erteilt. IV. In Erledigung der Beschwerde wird Spruchpunkt III des angefochtenen Bescheides ersatzlos behoben. Text Entscheidungsgründe: I. Verfahrensgang und Sachverhalt I.1. Der Beschwerdeführer, ein Staatsangehöriger der Russischen Föderation und der tschetschenischen Volksgruppe zugehörig, reiste gemeinsam mit seiner Ehefrau, XXXX und den drei gemeinsamen minderjährigen Kindern XXXX (Beschwerdeführer zu den Zlen. D14 302668-1/2008, D14 302669-1/2008, D14 302670-1/2008 und D14 302671-1/2008) am 25.10.2005 illegal in das Bundesgebiet ein und stellten sie gemeinsam am selben Tag Anträge auf Gewährung von Asyl. Am XXXX wurde im Bundesgebiet die minderjährige Tochter XXXX (Beschwerdeführerin zu D14 313331- 1/2008) geboren und wurde für diese am 27.02.2007 ein Antrag auf internationalen Schutz gestellt.
    [Show full text]
  • Lone Wolf Terrorism and Open Source Jihad: an Explanation and Assessment
    1 LONE WOLF TERRORISM AND OPEN SOURCE JIHAD: AN EXPLANATION AND ASSESSMENT Claire Wiskind, (Research Assistant, ICT) Summer 2016 ABSTRACT Al Qaeda and Daesh publish English language magazines to appeal to Western supporters and encourage them to join their cause as a fighter or as a lone wolf terrorist. A key feature of Al Qaeda’s magazine, Inspire, is a section titled Open Source Jihad, which provides aspiring jihadists with step-by-step instructions to carry out lone terror attacks in the West. By examining ten attack types that have been published over the past six years, this paper explains Open Source Jihad, presents cases where these types of attacks have been carried out, and assesses the threat presented by the easy access to Open Source Jihad. * The views expressed in this publication are solely those of the author(s) and do not necessarily reflect the views of the International Institute for Counter-Terrorism (ICT). 2 Table of Contents INTRODUCTION ................................................................................................ 3 Lone Wolf Terrorism ......................................................................................... 3 English Language Literature: Dabiq and Inspire .............................................. 7 Open Source Jihad .......................................................................................... 9 OPEN SOURCE JIHAD ATTACK INSTRUCTIONS ..................................... 12 Attacks carried out ..........................................................................................
    [Show full text]
  • The Insurgency in the North Caucasus
    RUSSIAN ANALYTICAL DIGEST No. 131, 8 July 2013 5 Table 2: Ideological Division in the North Caucasus in 2000s East West Geographical division Chechnya Adygea Dagestan Kabardino-Balkaria Ingushetia Karachaevo-Cherkessia North Ossetia Major ideological trends Radical Islam Nationalism Moderate Islam Radical Islam Moderate Islam Traditionalistic Islam Historical differences in the Islamic Imamate (1829–1859) Islamic-nationalistic Circassian state approach to Islam (1861–1864) Practical differences in the approach Shaafi school Hanafi school to Islam Religion Islam Christianity and Islam External influence No diasporas Large diasporas ANALYSIS The Insurgency in the North Caucasus: Putting Religious Claims into Context Jean-François Ratelle, Washington Abstract After the Boston bombings, the media has portrayed the insurgency in the North Caucasus as being part of the global Salafi jihad fighting against the West. This statement was quickly refuted by the leader of the Caucasus Emirate (CE) and the Dagestani insurgency. This report discusses the nature of the insurgent and terrorist groups in the North Caucasus in order to understand their links with global Salafi jihad, and the rationale behind their violent actions against the Russian state. It argues that the link between the CE and international jihadists has been overblown and that the insurgency is mainly driven by recurrent structural problems reinforced by a growing resurgence of radical Islam in the North Caucasus. In terms of interna- tional security, the conflict in the region remains mainly an internal Russian problem and the emphasis should not be put on the link between the Emirate and al-Qaeda, rather it should focus on events such as the upcoming Sochi Olympics.
    [Show full text]
  • Civil War in the North Caucasus
    oswCommentary issue 50 | 15.03.2011 | Centre for eastern studies ‘Creeping’ civil war in the North Caucasus schodnich schodnich Wojciech Górecki w tudiów Over the last year, the situation in Russia’s North Caucasus has become s further destabilised. Attacks and armed clashes happen daily, and destabi- lisation is spreading to an increasingly large area. The extent of violence in środek o the region is so great that it can already be stated that a de facto civil war is taking place, the warring parties being the Islamic armed underground osw movement which operates under the banner of the so-called Emirate of the e North Caucasus, and the secular governments of the individual republics, Z who are supported by local and federal branches of the Russian Federatio- n’s Interior Ministry and Federal Security Service. OMENTAR K Moscow has no idea how to successfully tackle the Caucasus rebellion. Force has proved to be costly and unproductive, while the attempts made since early 2010 to integrate the region with the rest of Russia by imple- tudies s menting development programmes have not brought the desired results, because of widespread corruption and faint interest from businessmen astern who are afraid to invest in such an unsafe region. A growing problem for e Moscow, particularly for the prestige of the state, is attacks by militants on areas near Sochi, where the 2014 Winter Olympics is to take place. It must be assumed that over the next 3 years before the Olympics, Centre for Moscow’s priority in the region will be to ensure the safety of Olympic preparations, and then the games themselves.
    [Show full text]
  • Estimated Age
    The US National Counterterrorism Center is pleased to present the 2016 edition of the Counterterrorism (CT) Calendar. Since 2003, we have published the calendar in a daily planner format that provides our consumers with a variety of information related to international terrorism, including wanted terrorists; terrorist group fact sheets; technical issue related to terrorist tactics, techniques, and procedures; and potential dates of importance that terrorists might consider when planning attacks. The cover of this year’s CT Calendar highlights terrorists’ growing use of social media and other emerging online technologies to recruit, radicalize, and encourage adherents to carry out attacks. This year will be the last hardcopy publication of the calendar, as growing production costs necessitate our transition to more cost- effective dissemination methods. In the coming years, NCTC will use a variety of online and other media platforms to continue to share the valuable information found in the CT Calendar with a broad customer set, including our Federal, State, Local, and Tribal law enforcement partners; agencies across the Intelligence Community; private sector partners; and the US public. On behalf of NCTC, I want to thank all the consumers of the CT Calendar during the past 12 years. We hope you continue to find the CT Calendar beneficial to your daily efforts. Sincerely, Nicholas J. Rasmussen Director The US National Counterterrorism Center is pleased to present the 2016 edition of the Counterterrorism (CT) Calendar. This edition, like others since the Calendar was first published in daily planner format in 2003, contains many features across the full range of issues pertaining to international terrorism: terrorist groups, wanted terrorists, and technical pages on various threat-related topics.
    [Show full text]
  • NCTC Annex of the Country Reports on Terrorism 2008
    Country Reports on Terrorism 2008 April 2009 ________________________________ United States Department of State Publication Office of the Coordinator for Counterterrorism Released April 2009 Page | 1 Country Reports on Terrorism 2008 is submitted in compliance with Title 22 of the United States Code, Section 2656f (the ―Act‖), which requires the Department of State to provide to Congress a full and complete annual report on terrorism for those countries and groups meeting the criteria of the Act. COUNTRY REPORTS ON TERRORISM 2008 Table of Contents Chapter 1. Strategic Assessment Chapter 2. Country Reports Africa Overview Trans-Sahara Counterterrorism Partnership The African Union Angola Botswana Burkina Faso Burundi Comoros Democratic Republic of the Congo Cote D‘Ivoire Djibouti Eritrea Ethiopia Ghana Kenya Liberia Madagascar Mali Mauritania Mauritius Namibia Nigeria Rwanda Senegal Somalia South Africa Tanzania Uganda Zambia Zimbabwe Page | 2 East Asia and Pacific Overview Australia Burma Cambodia China o Hong Kong o Macau Indonesia Japan Republic of Korea (South Korea) Democratic People‘s Republic of Korea (North Korea) Laos Malaysia Micronesia, Federated States of Mongolia New Zealand Papua New Guinea, Solomon Islands, or Vanaatu Philippines Singapore Taiwan Thailand Europe Overview Albania Armenia Austria Azerbaijan Belgium Bosnia and Herzegovina Bulgaria Croatia Cyprus Czech Republic Denmark Estonia Finland France Georgia Germany Greece Hungary Iceland Ireland Italy Kosovo Latvia Page | 3 Lithuania Macedonia Malta Moldova Montenegro
    [Show full text]