The Role of Women in Violent Extremism

Total Page:16

File Type:pdf, Size:1020Kb

The Role of Women in Violent Extremism THE ROLE OF WOMEN IN VIOLENT EXTREMISM A CASE STUDY OF THE PHILIPPINES AND INDONESIA AUTHORS: DAVID H. JIANG KEVIN LIN SANA MOJARRADI JOSHUA RACINE PETER ROTHPLETZ HARRY SEAVEY ALISSA WANG PROJECT ADVISOR: R EAR A DMIRAL J OHN F. W EIGOLD, IV. ( RET) SENIOR CAPSTONE PROJECT FOR THE JACKSON INSITUTE FOR GLOBAL AFFAIRS AND UNITED STATES INDO-PACIFIC COMMAND 1 TABLE OF CONTENTS Executive Summary 4 Introduction 5 UN Security Council Resolution 1325 5 The United States Executive Order 13595 6 The United States National Action Plan on Women, Peace, and Security 6 Congressional Legislative History 8 Women, Peace, and Security Act of 2017 11 Congressional Intent 12 Assumptions 15 Push & Pull Factors 16 Examining the Causes of Radicalization 16 Moving Past “Push” & “Pull” 18 Case Studies 20 Philippines 20 Landscape of Violent Extremism 20 A Closer Look 27 Education and Activism 27 Government and Security 29 Indonesia 31 History of Violent Extremism in Indonesia 31 Women, Peace, Security, and CVE Approaches 33 I. Military, National Police, and Government Efforts 33 II. Civil Society Organizations and Education 36 III. Female Migrant Workers and Jihadist Prisoners 39 The Interagency 43 The United States Department of State 43 United States Agency for International Development 50 Department of State and USAID Joint Strategy on Countering Violent Extremism 56 2 Recommendations 60 1. Prioritizing Women’s Agency vs. Women’s Rights 60 2. Improving U.S. Engagement with Women through Islam 62 3. Leverage influence to promote gendered perspectives of partners 63 4. Interagency Alliances 64 5. Further Areas of Research 65 Case-Study Takeaways: 67 Philippines Takeaways 67 1. Female Perspectives in Peacemaking 67 2. Hijab Trooper Program 67 3. Women-led NGOs 68 4. Community Workshops 68 Indonesia Takeaways 68 1. Research needs 68 2. Issue prioritization 69 3. Political sensitivity 70 4. Technical assistance 70 5. Selective partnership with Indonesian government institutions 71 6. Men’s role in gender-based CVE 72 7. Engaging with non-violent extremists 74 Conclusions 76 Acknowledgements 79 Bibliography 80 3 EXECUTIVE SUMMARY Nation-states throughout the Indo-Pacific region face a myriad of challenges in formulating and executing effective policies to counter the growth of violent extremist groups. This mission is further complicated by the fact many governments have historically ignored the experiences, narratives, and influences of women when crafting said policies. In this brief, one will find an extensive review of past and present efforts to include the voices of women in the CVE process – both within individual countries and international coalitions. In addition, the brief assesses the extant literature relating to the host of cultural, psychological, social, economic, and societal drivers that can push women down the path of radicalization. It goes on to examine specific case studies that contain notable intersections of women’s issues and violent extremism– namely, Indonesia and the Philippines. Finally, after considering dozens of interviews from policy experts and an extensive literature review, this paper recommends the formulation of a new framework that will optimize outcomes and minimize risks for women involved in every capacity of the CVE process. This new framework will predominantly center on the needs and wants of women, so INDOPACOM can be more efficient in building resilient communities throughout the Indo- Pacific region. 4 INTRODUCTION UN SECURITY COUNCIL RESOLUTION 1325 In 2000, the United Nations Security Council passed Resolution 1325 on Women, Peace, and Security (WPS), a landmark resolution recognizing the unique and important role of women in the promotion of peace and resolution of conflict. UNSCR 1325 broadly calls on member states to ensure the participation of women in peace processes, the protection of women and prevention of gender-based violence in conflict, and the mainstreaming of gender-based approaches in UN policy-making and programming. The first National Action Plan (NAP) adopted by a member state in response to UNSCR 1325 was implemented by Denmark in 2005, with mostly European and African nations following suit with their own NAPs in the subsequent few years. The first country in the Asia-Pacific to develop an NAP was the Philippines in 2010, followed by Nepal, Australia, and Indonesia. To date, South Korea, New Zealand, Japan, Timor-Leste, and the Solomon Islands are the only other countries in the region to have promulgated their own NAPs. While it is promising that countries dealing firsthand with conflict and violent extremism have adopted a legal framework for incorporating women into peacemaking and conflict resolution, the mere adoption of an NAP does not necessarily imply effective policy-making or implementation and is too often seen as an end in itself. All countries must commit to investing in a multifaceted, collaborative approach among government agencies, security forces, and civil society to take action while staying responsive to local needs and dynamics.1 1 Barbara Miller, Milad Pournik, & Aisling Swaine. Women in Peace and Security through United Nations Security Resolution 1325: Literature Review, Content Analysis of National Action Plans, and Implementation. Report. George Washington University. 5 THE UNITED STATES EXECUTIVE ORDER 13595 Although the UN Security Council passed UNSCR 1325 in 2000, the United States did not join the international community in publishing an NAP until 2011. President Barack Obama signed Executive Order 13595, which mandated the United States Government publish an NAP on WPS.2 The Executive Order recognized several key factors between women’s involvement and the security process. First, the promotion of women’s participation in conflict prevention, resolution, and future post-conflict and relief advances peace, security, development, and international cooperation.3 Second, the Executive Order recognized that every nation has the responsibility to protect populations from genocide, war crimes, sexual violence, and other crimes against humanity. 4 The U.S. especially recognized that sexual violence against civilians could exacerbate armed conflict and delay the implementation of peace and security.5 The Executive Order also mandated that it is the responsibility of the executive departments and agencies to maintain an awareness of and implement U.S. policy regarding WPS.6 THE UNITED STATES NATIONAL ACTION PLAN ON WOMEN, PEACE, AND SECURITY As directed, the United States published its NAP on WPS in 2011. The NAP is guided by five principles. First, the engagement and protection of women as agents of peace and stability is key to preventing, responding to, and resolving conflicts and rebuilding societies.7 Second, the NAP seeks to complement and enhance existing U.S. initiatives to advance gender 2 Exec. Order. No. 13595, 76 Fed. Reg. 80205, (December 23, 2011) 3 Ibid. 4 Ibid. 5 Ibid. 6 Ibid. 7 The White House. The United States National Action Plan on Women Peace and Security. December 2011. 6 equality, human rights, and the needs of vulnerable populations in crisis areas.8 Third, the United States shall be guided by the principle of inclusion, and actively seek out the views and participation of various stakeholders, including marginalized groups, such as ethnic, racial, or religious minorities, persons with disabilities, displaced and indigenous persons, and lesbian, gay, bisexual, and transgender individuals.9 Fourth, all departments and agencies of the U.S. government should be coordinated on all activities regarding WPS to maximize the impact of the NAP.10 And lastly, U.S. government agencies will be held accountable for the implementation of these policies.11 The NAP is both an inward-facing and outward-facing policy. The five principles guarantee that not only will the United States strive for gender equality internally, but it will also seek to follow these principles on a global stage. In 2016, the White House published a comprehensive review and identified positive progress across all five of the principles. Since the Plan has been adopted, the United States military has opened all occupations and positions previously closed to female service members. The United States has also advanced the participation of more than 60,000 women in the peacebuilding process and has helped more than 4 million survivors of gender-based violence to provide services in more than 40 countries.12 The government has helped build grassroots networks to lessen the effects of conflict and launched new programs addressing the vulnerability of women and girls in humanitarian emergencies. 13 However, despite all the achievements, the NAP has several shortfalls. In the 2016 updated NAP, the government itself identified several points that need improvement. First, the 8 Ibid. 9 Ibid. 10 Ibid. 11 Ibid. 12 The White House. The United States National Action Plan on Women, Peace, and Security. June 2016 13 Ibid. 7 government must implement monitoring and evaluation plans that can help identify the best practices and assess the impact of WPS programs. 14 Second, the government must also develop programs to empower women to prevent and respond to specific challenges associated with violent extremism. 15 Lastly, the government will further seek strengthened coordination between all the departments with regard to gender policies.16 The NAP has also been criticized by peace advocates and journalists. American political advocate Jodie Evans and Washington Post journalist Amie Ferris-Rotman
Recommended publications
  • 'Battle of Marawi': Death and Destruction in the Philippines
    ‘THE BATTLE OF MARAWI’ DEATH AND DESTRUCTION IN THE PHILIPPINES Amnesty International is a global movement of more than 7 million people who campaign for a world where human rights are enjoyed by all. Our vision is for every person to enjoy all the rights enshrined in the Universal Declaration of Human Rights and other international human rights standards. We are independent of any government, political ideology, economic interest or religion and are funded mainly by our membership and public donations. © Amnesty International 2017 Except where otherwise noted, content in this document is licensed under a Creative Commons Cover photo: Military trucks drive past destroyed buildings and a mosque in what was the main battle (attribution, non-commercial, no derivatives, international 4.0) licence. area in Marawi, 25 October 2017, days after the government declared fighting over. https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode © Ted Aljibe/AFP/Getty Images For more information please visit the permissions page on our website: www.amnesty.org Where material is attributed to a copyright owner other than Amnesty International this material is not subject to the Creative Commons licence. First published in 2017 by Amnesty International Ltd Peter Benenson House, 1 Easton Street London WC1X 0DW, UK Index: ASA 35/7427/2017 Original language: English amnesty.org CONTENTS MAP 4 1. INTRODUCTION 5 2. METHODOLOGY 10 3. BACKGROUND 11 4. UNLAWFUL KILLINGS BY MILITANTS 13 5. HOSTAGE-TAKING BY MILITANTS 16 6. ILL-TREATMENT BY GOVERNMENT FORCES 18 7. ‘TRAPPED’ CIVILIANS 21 8. LOOTING BY ALL PARTIES TO THE CONFLICT 23 9.
    [Show full text]
  • IRAN-RUSSIA Relations SPECIAL ESSAY:See Pg
    fmso.leavenworth.army.mil Foreign Military Studies Office Volume 6 Issue #7 OEWATCH July 2016 FOREIGN NEWS & PERSPECTIVES OF THE OPERATIONAL ENVIRONMENT IRAN-RUSSIA Relations SPECIAL ESSAY:see pg. 62-68 TURKEY INDO-PACIFIC ASIA RUSSIA, UKRAINE 3 The PKK and MANPADs: A Game Changer 22 India’s NAVIC Constellation Is Underway 38 Fleshing Out the Details of Reintroducing Divisions 4 ISIS Targeting Turkey with Katyusha Rockets 24 Space Age Clothing for Indian Soldiers at High 40 Innovation, Cost, and Compromise Regarding the 5 Turkey Opens Military Base in Qatar Altitudes “God of War” 25 Fighting Piracy in the Sulu Sea Through a Subregional 42 Russia Successfully Tests Hypersonic Glide Vehicle for MIDDLE EAST/NORTH AFRICA Agreement ICBMs 6 Iran: Chinese Eye Port of Chabahar 26 Terrorism Expert: Jemaah Islamiya Poses a Greater Threat 44 Russia’s Near-Term Asymmetric Response to the 7 Iran: Kurdish Insurgents on the Upsurge than ISIS to Southeast Asia BMD- the Iskander 8 Iran: IRGC Debuts New Explosives Plant 27 President-Elect Duterte’s Approach to Peace in 46 Russian Electronic Warfare Equipment and Personnel 9 Water Scarcity and Conflict: Yemen, Egypt, and Saudi Mindanao Developments Arabia 28 Can Indonesia Spread its Version of Moderate Islam 48 Tank Combat Support Vehicle “Terminator-3” on an 10 Turkistan Islamic Party Makes its Mark on the Syrian Internationally? Armata Chassis? Rebellion 29 Indonesian Official: Southeast Asia is Becoming the New 49 Georgian Perspectives on Armenia-Azerbaijan 11 Tunnels and Refugees: Can ISIS Breach Jordan’s Somalia for Piracy Conflict and Russia’s Position Borders? 30 Southern Thailand Peace Talk Hit Another Bump in the 50 Armenian Officials Reassure the Public about Military Road Effectiveness AFRICA 52 Armenian Views on Russia’s Peacemaking Efforts in 12 New Insurgent Group Emerges in Niger Delta CHINA, KOREA, JAPAN Karabakh 13 New Nigerian Insecurity: Nomads v.
    [Show full text]
  • Fort Leavenworth, KS Volume 8, Issue 08 August 2017 INSIDE THIS ISSUE
    Fort Leavenworth, KS Volume 8, Issue 08 August 2017 INSIDE THIS ISSUE Snow Dome Pt 2 ................... 3 Integrated Attack ................ 10 Mirawi Attack ...................... 23 DATE 3.0 Revisions ............ 35 ACE-TI POCs ....................... 39 by LTC Bryce Frederickson, TRADOC G-2 ACE Threats Integration TRADOC G-2 ACE Threats Integration has been actively teaching functional analysis as a method for planning and developing opposing force (OPFOR) courses of action. The core concept is that, while every battle is unique, certain functions continue to be performed by the enemy to reach mission accomplishment. Functional analysis determines threat objectives, the battlefield functions required, and the OEE Red Diamond published capabilities available for performing each function. There are four main functions by TRADOC G-2 OEE the OPFOR will use to complete its goals and objectives: action, enabling, fixing, ACE Threats Integration and security. For e-subscription, contact: There are several advantages to using this methodology: 1) it forces the staff to Nicole Bier (DAC), learn and understand tactics, 2) it reduces the ability of the enemy to deceive Intel OPS Coordinator, analysts, and 3) it works across the range of military operations. G-2 ACE-TI Functional analysis and functional tactics are currently discussed in depth in ATP 2- Topic inquiries: 01.3, Intelligence Preparation of the Battlefield, Appendix B. However, in the Jon H. Moilanen (DAC), current update to ATP 2-01.3, there is a potential that functional analysis will move G-2 ACE-TI from an appendix to the main body. This analysis methodology also continues to or be taught during the Threat Tactics Course, in both the resident and mobile training Angela Williams (DAC), Deputy Director, G-2 ACE-TI team courses.
    [Show full text]
  • The War Report 2017.Pdf
    THE WAR REPORT ARMED CONFLICTS IN 2017 ANNYSSA BELLAL THE ACADEMY A JOINT CENTER OF THE WAR REPORT ARMED CONFLICTS IN 2017 ACKNOWLEDGEMENTS The War Report 2017 was supervised and edited by Dr Annyssa Bellal, Strategic Ad- viser on IHL and Senior Research Fellow at the Geneva Academy of International Humanitarian Law and Human Rights (Geneva Academy). The different sections on selected armed conflicts were written by individual authors and copy-edited by Munizha Ahmad-Cooke. The War Report 2017 also builds on past editions since 2012. The Geneva Academy would like to thank the Swiss Federal Department of Foreign Affairs (DFAE) for its support to the Geneva Academy’s research on this issue. DISCLAIMERS This report is the work of the editor and authors. The views expressed in it do not necessarily reflect those of the Geneva Academy. The qualification of any situation of armed violence as an armed conflict under international law should not be read such as to trigger war clauses in insurance contracts and does not in any way affect the need for due diligence by any natural or legal person in their work in any of the situations referred to. Furthermore, facts, matters or opinions contained in the report are provided by the Geneva Academy without assuming responsibility to any user of the report who may rely on its contents in whole or in part. The designation of armed non-state actors, states or territories does not imply any judgement by the Geneva Academy regarding the legal status of such actors, states or territories, or their authorities and institutions, or the delimitation of their boundaries, or the status of any states or territories that border them.
    [Show full text]
  • (2016-2018) Rizky Anugerah Putra 016201300130 a Thesi
    The Role of President of Philippines in Combating ISIS: The Case of Marawi (2016-2018) Rizky Anugerah Putra 016201300130 A thesis presented to the Faculty of Humanities President University in partial fulfillment of the requirements for Bachelor Degree in International Relations Specialization in Diplomacy 2018 THESIS ADVISOR RECOMMENDATION LETTER This thesis entitled “The Role of President of Philippines Rodrigo Duterte in Combating ISIS: The Case of Marawi (2016-2018)” prepared and submitted by Rizky Anugerah Putra in partial fulfillment of the requirements for the degree of Bachelor of Arts in International Relations in the Faculty of Humanities has been reviewed and found to have satisfied the requirement for a thesis fit to be examined. I therefore recommend this thesis for Oral Defence. Cikarang, Indonesia, May 2018 Recommended and Acknowledged by, Isyana Adriani, BA.,M.Si Thesis Adviser i DECLARATION OF ORIGINALITY I declare that this thesis, entitled “The Role of President of Philippines Rodrigo Duterte in Combating ISIS: The Case of Marawi (2016-2018)” is, to the best of my knowledge and belief, an original piece of work that has not been submitted, either in whole or in part, to another university to obtain a degree. Cikarang, Indonesia, May 2018 Rizky Anugerah Putra ii PANEL OF EXAMINERS APPROVAL SHEET Panel of examiners stated that the thesis entitled “The Role of President of Philippines in Combating ISIS: The Case of Marawi (2016-2018)” that was submitted by Rizky Anugerah Putra majoring in International Relations from the Faculty of Humanities was assessed and approved to have passed the Oral Examinations on May 16th, 2018 Bustanul Arifin, BA.IR., MA.
    [Show full text]
  • The Indonesia– Philippines–Malaysia Border Region
    5. Rice & ransoms: the Indonesia– Philippines–Malaysia border region ‘So long as the seas have no fence, it will not stop’, an interviewee prophesised, referring to smuggling in the border region of Indonesia, Malaysia and the Philippines, where all the borders are in the sea. The area is large and includes many small islands, which makes it difficult to patrol. The region also has its share of non-state armed actors. In Mindanao, in the south of the Philippines, organised non-state armed groups fight for more regional autonomy for the Moro people. In Indonesia, more extremist networks, some linked to the Islamic State, conduct attacks that are often directed against civilians. The region also has groups like the Abu Sayyaf Group (ASG) that are nominally political but, as Gutierrez writes, ‘better understood as a network of dangerous criminal entrepreneurs, similar to an armed mob’ (2016, p.184) than a non-state armed group with political motives. As the border region is large, this chapter uses two case studies (Figure 5.1): in the east, the route connecting Mindanao in the Philippines, Sabah in Malaysia and North Kalimantan in Indonesia; in the west, the route connecting Mindanao in the Philippines and North Sulawesi in Indonesia. I conducted research in Indonesia’s North Kalimantan (Nunukan) and North Sulawesi (Manado, Tahuna, Bitung) and in Mindanao (Davao, Zamboanga, Cotabato) in the Philippines, in April 2018 and in May–June 2018. In the east, between Mindanao and North Sulawesi, local people from the Philippines and Indonesia cross the border on a regular basis, particularly for fishing.
    [Show full text]
  • Counter Terrorist Trends and Analyses ISSN 2382-6444 | Volume 9, Issue 10 | October 2017
    Counter Terrorist Trends and Analyses www.rsis.edu.sg ISSN 2382-6444 | Volume 9, Issue 10 | October 2017 A JOURNAL OF THE INTERNATIONAL CENTRE FOR POLITICAL VIOLENCE AND TERRORISM RESEARCH (CTR) Ending the Fight in Marawi Rohan Gunaratna The Significance of Megat Shahdan as a Singaporean IS Foreign Fighter Jasminder Singh and Muhammad Haziq Bin Jani Extremism beyond Nusa Kambangan Prisons Muh Taufiqurrohman, Muhammad Ali Usman and Ardi Putra Prasetya Radicalisation: Examining a Concept, its Use and Abuse Paul Hedges Counter Terrorist Trends and Analyses Volume 9, Issue 4 | April 2017 1 Building a Global Network for Security Editorial Note The Defeat of IS & the Southeast Asian Terrorist Threat October 2017 has been a fateful month for the Philippines, security forces have successfully Islamic State (IS) terrorist group. In Syria, its managed to contain, isolate and eliminate the de facto ‘capital’ Raqqa has fallen to an IS threat in Marawi. Although the battle is alliance of Kurdish and Arab fighters backed almost over with the deaths of IS Philippines by the US-led coalition. Earlier in Hawija, the leaders Isnilon Hapilon and Omar Maute, the last remaining IS stronghold in northern Iraq, threat of terrorism in the region is far from about 1,000 IS fighters surrendered to Iraqi over. Rohan Gunaratna discusses the forces rather than fighting for ‘martyrdom’. situation in Marawi, the activities of the Over in Southeast Asia, the Philippines militants, the government’s response and authorities announced the liberation of Marawi future trends. Despite the elimination of top Wafter a five -month battle and the killing of IS leaders and fighters in Marawi, IS will prevail in top leaders, Isnilon Hapilon and Omar Maute.
    [Show full text]
  • Rising in the East a Regional Overview of the Islamic State’S Operations in Southeast Asia
    RISING IN THE EAST A REGIONAL OVERVIEW OF THE ISLAMIC STATE’S OPERATIONS IN SOUTHEAST ASIA Amira Jadoon, Nakissa Jahanbani, and Charmaine Willis | July 2020 Rising in the East: A Regional Overview of the Islamic State’s Operations in Southeast Asia Amira Jadoon Nakissa Jahanbani Charmaine Willis Combating Terrorism Center at West Point United States Military Academy www.ctc.usma.edu The views expressed in this report are the authors’ and do not necessarily reflect those of the Combating Terrorism Center, United States Military Academy, Department of Defense, or U.S. Government. July 2020 Updated version released December 2020, incorporating a small number of minor corrections Cover Photo: A still image from an unofficial Islamic State video released in early 2016 entitled “Bay`ah of a group of mujahidin in the Philippines to the Caliph of Muslims.” COMBATING TERRORISM CENTER acknowledgments We are deeply grateful to various individuals whose assistance and dedication Director were critical to the completion of this project. Brian Dodwell Research Director We are thankful to all members of the research team whose efforts contributed to the compilation of the data that underpins this report and helped push this Dr. Daniel Milton project to completion. Zachary Abuza and a second anonymous external reviewer provided invaluable feedback that strengthened this report’s overall contribu- Distinguished Chair tion. We would like to thank CTC Director Brian Dodwell and CTC Director of LTG(R) Dell Dailey Research Daniel Milton for their support for this project, and CTC Director of Strategic Initiatives Don Rassler and CTC Associate Seth Loertscher for their George H.
    [Show full text]
  • Marawi: a Game Changer in Terrorism in Asia Rohan Gunaratna
    Counter Terrorist Trends and Analyses www.rsis.edu.sg ISSN 2382-6444 | Volume 9, Issue 7 | July 2017 A JOURNAL OF THE INTERNATIONAL CENTRE FOR POLITICAL VIOLENCE AND TERRORISM RESEARCH Marawi: A Game Changer in Terrorism in Asia Rohan Gunaratna The Evolution of Online Extremism in Malaysia Nur Azlin Mohamed Yasin A Rebuttal of Al-Qaeda and IS’ Theological Justification of Suicide Bombing Muhammad Haniff Hassan Abrogation and the Verse of the Sword: Addressing Sunni Extremists’ Misappropriation of Concept and Verse Mahfuh Halimi Counter Terrorist Trends and Analyses Volume 9, Issue 4 | April 2017 1 Building a Global Network for Security Editorial Note IS Ingress in Southeast Asia As the Islamic State (IS) terrorist group evolves keep the security challenge posed by IS in into the next phase of its life cycle, it is check, more needs to be done in places like the operationalising its so-called wilayats Philippines and Thailand with coordinated (governorates) in different parts of the world. In operational efforts and timely intelligence June, with the loss of ground in Iraq and Syria, sharing. IS has made significant territorial gains in the Philippines along with carrying out a high profile Third, IS online followers, supporters and terrorist attack in Indonesia. The operational sympathisers are now moving from open social strength and sophistication exhibited in these media platforms to encrypted ones such as latest developments in Southeast Asia is Telegram, Whatsapp and WeChat. This adds a concerning for three particular reasons. new layer of complexity to keep track of vulnerable segments of youth susceptible to First,W IS will stay alive and relevant through its radicalism and disrupt any terrorist plots that wilayats notwithstanding its defeat in the Middle may be planned and executed through East.
    [Show full text]
  • The Jihadi Threat to Indonesia
    OBJECTIVE ·· RELEVANT ·· RIGOROUS || JUNE/JULYSEPTEMBER 2018 2019 · VOLUME· VOLUME 11, 12, ISSUE ISSUE 6 8 FEATURE ARTICLE A VIEW FROM THE CT FOXHOLE TheEighteen Jihadi Years Threat On: Joseph The War on Terror LTC(R) Bryan Price toComes Indonesia of Age Maguire Acting Former Director Director, of KirstenDaniel E. Byman Schulze CombatingNational Terrorism Intelligence Center FEATURE ARTICLE Editor in Chief 1 Eighteen Years On: The War on Terror Comes of Age Daniel Byman Paul Cruickshank Managing Editor INTERVIEW Kristina Hummel 8 A View from the CT Foxhole: Joseph Maguire, Acting Director of National Intelligence EDITORIAL BOARD Paul Cruickshank and Brian Dodwell Colonel Suzanne Nielsen, Ph.D. ANALYSIS Department Head Dept. of Social Sciences (West Point) 14 Taking Aim: Islamic State Khorasan's Leadership Losses Amira Jadoon and Andrew Mines Brian Dodwell Director, CTC 23 Relatives, Redemption, and Rice: Motivations for Joining the Maute Group Julie Chernov Hwang Don Rassler 28 The Development of Tunisia's Domestic Counter-Terrorism Finance Director of Strategic Initiatives, CTC Capability Aaron Y. Zelin and Katherine Bauer CONTACT Combating Terrorism Center U.S. Military Academy This September 11th, a new generation is taking up the mantle in the fight against terrorism. “Later this year, a U.S. service member is likely to be 607 Cullum Road, Lincoln Hall deployed to Afghanistan who was not yet born on September 11, 2001,” West Point, NY 10996 Daniel Byman notes in our feature article on the jihadi terror threat facing the United States 18 years Phone: (845) 938-8495 later. He assesses “although the operational freedom of jihadi groups is constricted by U.S.
    [Show full text]
  • Pdf | 294.11 Kb
    United Nations S/2020/777 Security Council Distr.: General 4 August 2020 Original: English Children and armed conflict in the Philippines Report of the Secretary-General Summary The present report is the fifth report on children and armed conflict in the Philippines submitted by the Secretary-General. It contains information on the six grave violations against children and, more broadly, on the situation of children affected by armed conflict during the period from 1 January 2017 to 31 December 2019. Highlighted herein are trends and patterns of grave violations committed against children by all parties to the conflict, and it is shown that conflict continued to have a negative impact on children, in particular in Mindanao. The report also presents the evolution in the situation since the previous report (S/2017/294), including trends and patterns of violations, progress made in ending and preventing violations, and follow-up on the conclusions adopted by the Working Group on Children and Armed Conflict (S/AC.51/2017/4). Lastly, the report contains a series of recommendations to end and prevent grave violations against children in the Philippines and to improve the protection of children. 20-10426 (E) 210820 *2010426* S/2020/777 I. Introduction 1. The present report, prepared pursuant to Security Council resolution 1612 (2005) and subsequent resolutions on children and armed conflict, is the fifth report on the situation of children affected by armed conflict in the Philippines submitted by the Secretary-General to the Security Council. It covers the period from 1 January 2017 to 31 December 2019 and contains information on trends and patterns of grave violations against children since the previous report (S/2017/294).
    [Show full text]
  • Terrorism in the Indo-Pacific Because Until Now Daesh’S Focus Has Been Mainly on the Fight in Syria and Iraq and AQ Has Been Engaged in a Program to Rebuilding
    SPECIAL REPORT Terrorism in the Indo–Pacific: Glocalism comes of age Isaac Kfir May 2018 About the author Dr Isaac Kfir is the Director of the National Security program and Head of the Counter-Terrorism Policy Centre, Australian Strategic Policy Institute. About ASPI ASPI’s aim is to promote Australia’s security by contributing fresh ideas to strategic decision-making, and by helping to inform public discussion of strategic and defence issues. ASPI was established, and is partially funded, by the Australian Government as an independent, non-partisan policy institute. It is incorporated as a company, and is governed by a Council with broad membership. ASPI’s core values are collegiality, originality & innovation, quality & excellence and independence. ASPI’s publications—including this paper—are not intended in any way to express or reflect the views of the Australian Government. The opinions and recommendations in this paper are published by ASPI to promote public debate and understanding of strategic and defence issues. They reflect the personal views of the author(s) and should not be seen as representing the formal position of ASPI on any particular issue. Important disclaimer This publication is designed to provide accurate and authoritative information in relation to the subject matter covered. It is provided with the understanding that the publisher is not engaged in rendering any form of professional or other advice or services. No person should rely on the contents of this publication without first obtaining advice from a qualified professional person. Cover image: Islamic State of Iraq and the Levant propaganda photo showing ISIS militants with weapons on 19 November 2015.
    [Show full text]