What Happens After the Islamic State of Caliphate Is Destroyed? Current State and Trends in Global Terrorism Threats
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Country Reports on Terrorism 2016
Country Reports on Terrorism 2016 July 2017 ________________________________ United States Department of State Publication Bureau of Counterterrorism Released July 2017 Country Reports on Terrorism 2016 is submitted in compliance with Title 22 of the United States Code, Section 2656f (the “Act”), which requires the Department of State to provide to Congress a full and complete annual report on terrorism for those countries and groups meeting the criteria of the Act. COUNTRY REPORTS ON TERRORISM 2016 Table of Contents Chapter 1. Strategic Assessment Chapter 2. Country Reports Africa Overview Trans-Sahara Counterterrorism Partnership Partnership for Regional East Africa Counterterrorism Burkina Faso Burundi Cameroon Chad Djibouti Eritrea Ethiopia Kenya Mali Mauritania Niger Nigeria Senegal Somalia South Africa Tanzania Uganda East Asia and the Pacific Overview Australia China (Hong Kong and Macau) Indonesia Democratic People’s Republic of Korea Malaysia Philippines Singapore Thailand Europe Overview Albania Austria Azerbaijan Belgium Bosnia and Herzegovina Bulgaria Cyprus Denmark France Georgia Germany Greece Ireland Italy Kosovo Macedonia The Netherlands Norway Russia Serbia Spain Sweden Turkey United Kingdom Middle East and North Africa Overview Algeria Bahrain Egypt Iraq Israel, the West Bank, Gaza, and Jerusalem Jordan Kuwait Lebanon Libya Morocco Oman Qatar Saudi Arabia Tunisia United Arab Emirates Yemen South and Central Asia Overview Afghanistan Bangladesh India Kazakhstan Kyrgyz Republic Maldives Nepal Pakistan Sri Lanka Tajikistan -
The Terrorism Trap: the Hidden Impact of America's War on Terror
University of Tennessee, Knoxville TRACE: Tennessee Research and Creative Exchange Doctoral Dissertations Graduate School 8-2019 The Terrorism Trap: The Hidden Impact of America's War on Terror John Akins University of Tennessee, [email protected] Follow this and additional works at: https://trace.tennessee.edu/utk_graddiss Recommended Citation Akins, John, "The Terrorism Trap: The Hidden Impact of America's War on Terror. " PhD diss., University of Tennessee, 2019. https://trace.tennessee.edu/utk_graddiss/5624 This Dissertation is brought to you for free and open access by the Graduate School at TRACE: Tennessee Research and Creative Exchange. It has been accepted for inclusion in Doctoral Dissertations by an authorized administrator of TRACE: Tennessee Research and Creative Exchange. For more information, please contact [email protected]. To the Graduate Council: I am submitting herewith a dissertation written by John Akins entitled "The Terrorism Trap: The Hidden Impact of America's War on Terror." I have examined the final electronic copy of this dissertation for form and content and recommend that it be accepted in partial fulfillment of the requirements for the degree of Doctor of Philosophy, with a major in Political Science. Krista Wiegand, Major Professor We have read this dissertation and recommend its acceptance: Brandon Prins, Gary Uzonyi, Candace White Accepted for the Council: Dixie L. Thompson Vice Provost and Dean of the Graduate School (Original signatures are on file with official studentecor r ds.) The Terrorism Trap: The Hidden Impact of America’s War on Terror A Dissertation Presented for the Doctor of Philosophy Degree The University of Tennessee, Knoxville John Harrison Akins August 2019 Copyright © 2019 by John Harrison Akins All rights reserved. -
Jihadism in Africa Local Causes, Regional Expansion, International Alliances
SWP Research Paper Stiftung Wissenschaft und Politik German Institute for International and Security Affairs Guido Steinberg and Annette Weber (Eds.) Jihadism in Africa Local Causes, Regional Expansion, International Alliances RP 5 June 2015 Berlin All rights reserved. © Stiftung Wissenschaft und Politik, 2015 SWP Research Papers are peer reviewed by senior researchers and the execu- tive board of the Institute. They express exclusively the personal views of the authors. SWP Stiftung Wissenschaft und Politik German Institute for International and Security Affairs Ludwigkirchplatz 34 10719 Berlin Germany Phone +49 30 880 07-0 Fax +49 30 880 07-100 www.swp-berlin.org [email protected] ISSN 1863-1053 Translation by Meredith Dale (Updated English version of SWP-Studie 7/2015) Table of Contents 5 Problems and Recommendations 7 Jihadism in Africa: An Introduction Guido Steinberg and Annette Weber 13 Al-Shabaab: Youth without God Annette Weber 31 Libya: A Jihadist Growth Market Wolfram Lacher 51 Going “Glocal”: Jihadism in Algeria and Tunisia Isabelle Werenfels 69 Spreading Local Roots: AQIM and Its Offshoots in the Sahara Wolfram Lacher and Guido Steinberg 85 Boko Haram: Threat to Nigeria and Its Northern Neighbours Moritz Hütte, Guido Steinberg and Annette Weber 99 Conclusions and Recommendations Guido Steinberg and Annette Weber 103 Appendix 103 Abbreviations 104 The Authors Problems and Recommendations Jihadism in Africa: Local Causes, Regional Expansion, International Alliances The transnational terrorism of the twenty-first century feeds on local and regional conflicts, without which most terrorist groups would never have appeared in the first place. That is the case in Afghanistan and Pakistan, Syria and Iraq, as well as in North and West Africa and the Horn of Africa. -
The Jihadi Industry: Assessing the Organizational, Leadership And
The Jihadi Industry: Assessing the Organizational, Leadership, and Cyber Profiles Report to the Office of University Programs, Science and Technology Directorate, U.S. Department of Homeland Security July 2017 National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence Led by the University of Maryland 8400 Baltimore Ave., Suite 250 • College Park, MD 20742 • 301.405.6600 www.start.umd.edu National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence About This Report The authors of this report are Gina Ligon, Michael Logan, Margeret Hall, Douglas C. Derrick, Julia Fuller, and Sam Church at the University of Nebraska, Omaha. Questions about this report should be directed to Dr. Gina Ligon at [email protected]. This report is part of the National Consortium for the Study of Terrorism and Responses to Terrorism (START) project, “The Jihadi Industry: Assessing the Organizational, Leadership, and Cyber Profiles” led by Principal Investigator Gina Ligon. This research was supported by the Department of Homeland Security Science and Technology Directorate’s Office of University Programs through Award Number #2012-ST-061-CS0001, Center for the Study of Terrorism and Behavior (CSTAB 1.12) made to START to investigate the role of social, behavioral, cultural, and economic factors on radicalization and violent extremism. The views and conclusions contained in this document are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied, of the U.S. -
ICC-01/12-01/18 Date: 21 November 2019 Date of Submission: 6 February 2020
ICC-01/12-01/18-505-Red2 06-02-2020 1/30 RH T Original: English No.: ICC-01/12-01/18 Date: 21 November 2019 Date of submission: 6 February 2020 TRIAL CHAMBER X Before: Judge Antoine Kesia-Mbe Mindua, Presiding Judge Judge Tomoko Akane Judge Kimberly Prost SITUATION IN THE REPUBLIC OF MALI IN THE CASE OF THE PROSECUTOR v. AL HASSAN AG ABDOUL AZIZ AG MOHAMED AG MAHMOUD URGENT PUBLIC With confidential, EX PARTE, Annexes A and B Only available to the Prosecution, VWU and the Detention Section Public redacted version of “the Prosecution’s urgent application to maintain restrictions on Mr AL HASSAN’s contacts and access to others whilst in detention”, 22 November 2019, ICC-01/12-01/18-505-Conf-Exp Source: Office of the Prosecutor ICC-01/12-01/18 1/30 21 November 2019 ICC-01/12-01/18-505-Red2 06-02-2020 2/30 RH T Document to be notified in accordance with regulation 31 of the Regulations of the Court to: The Office of the Prosecutor Counsel for the Defence Fatou Bensouda Melinda Taylor James Stewart Marie-Hélène Proulx Sarah Bafadhel Legal Representatives of the Victims Legal Representatives of the Applicants Seydou Doumbia Mayombo Kassongo Fidel Luvengika Nsita Unrepresented Victims Unrepresented Applicants (Participation/Reparation) The Office of Public Counsel for Victims The Office of Public Counsel for the Defence States’ Representatives Amicus Curiae REGISTRY Registrar Counsel Support Section Peter Lewis Victims and Witnesses Unit Detention Section Nigel Verrill Mr Paddy Craig Victims Participation and Reparations Other Section ICC-01/12-01/18 2/30 21 November 2019 ICC-01/12-01/18-505-Red2 06-02-2020 3/30 RH T Introduction 1. -
Between Islamization and Secession: the Contest for Northern Mali
JULY 2012 . VOL 5 . ISSUE 7 Contents Between Islamization and FEATURE ARTICLE 1 Between Islamization and Secession: Secession: The Contest for The Contest for Northern Mali By Derek Henry Flood Northern Mali REPORTS By Derek Henry Flood 6 A Profile of AQAP’s Upper Echelon By Gregory D. Johnsen 9 Taliban Recruiting and Fundraising in Karachi By Zia Ur Rehman 12 A Biography of Rashid Rauf: Al-Qa`ida’s British Operative By Raffaello Pantucci 16 Mexican DTO Influence Extends Deep into United States By Sylvia Longmire 19 Information Wars: Assessing the Social Media Battlefield in Syria By Chris Zambelis 22 Recent Highlights in Terrorist Activity 24 CTC Sentinel Staff & Contacts An Islamist fighter from the Movement for Unity and Jihad in West Africa in the city of Gao on July 16, 2012. - AFP/Getty Images n january 17, 2012, a rebellion 22, disgruntled Malian soldiers upset began in Mali when ethnic about their lack of support staged a coup Tuareg fighters attacked a d’état, overthrowing the democratically Malian army garrison in the elected government of President Amadou Oeastern town of Menaka near the border Toumani Touré. with Niger.1 In the conflict’s early weeks, the ethno-nationalist rebels of the By April 1, all Malian security forces had National Movement for the Liberation evacuated the three northern regions of of Azawad (MNLA)2 cooperated and Kidal, Gao and Timbuktu. They relocated About the CTC Sentinel sometimes collaborated with Islamist to the garrisons of Sévaré, Ségou, and The Combating Terrorism Center is an fighters of Ansar Eddine for as long as as far south as Bamako.4 In response, independent educational and research the divergent movements had a common Ansar Eddine began to aggressively institution based in the Department of Social enemy in the Malian state.3 On March assert itself and allow jihadists from Sciences at the United States Military Academy, regional Islamist organizations to West Point. -
Global Extremism Monitor
Global Extremism Monitor Violent Islamist Extremism in 2017 WITH A FOREWORD BY TONY BLAIR SEPTEMBER 2018 1 2 Contents Foreword 7 Executive Summary 9 Key Findings About the Global Extremism Monitor The Way Forward Introduction 13 A Unifying Ideology Global Extremism Today The Long War Against Extremism A Plethora of Insurgencies Before 9/11 A Proliferation of Terrorism Since 9/11 The Scale of the Problem The Ten Deadliest Countries 23 Syria Iraq Afghanistan Somalia Nigeria Yemen Egypt Pakistan Libya Mali Civilians as Intended Targets 45 Extremist Groups and the Public Space Prominent Victims Breakdown of Public Targets Suicide Bombings 59 Use of Suicide Attacks by Group Female Suicide Bombers Executions 71 Deadliest Groups Accusations Appendices 83 Methodology Glossary About Us Notes 3 Countries Affected by Violent Islamist Extremism, 2017 4 5 6 Foreword Tony Blair One of the core objectives of the Institute is the promotion of co-existence across the boundaries of religious faith and the combating of extremism based on an abuse of faith. Part of this work is research into the phenomenon of extremism derived particularly from the abuse of Islam. This publication is the most comprehensive analysis of such extremism to date and utilises data on terrorism in a new way to show: 1. Violent extremism connected with the perversion of Islam today is global, affecting over 60 countries. 2. Now more than 120 different groups worldwide are actively engaged in this violence. 3. These groups are united by an ideology that shares certain traits and beliefs. 4. The ideology and the violence associated with it have been growing over a period of decades stretching back to the 1980s or further, closely correlated with the development of the Muslim Brotherhood into a global movement, the Iranian Revolution in 1979 and—in the same year—the storming by extremist insurgents of Islam’s holy city of Mecca. -
The Al Qaeda Network a New Framework for Defining the Enemy
THE AL QAEDA NETWORK A NEW FRAMEWORK FOR DEFINING THE ENEMY KATHERINE ZIMMERMAN SEPTEMBER 2013 THE AL QAEDA NETWORK A NEW FRAMEWORK FOR DEFINING THE ENEMY KATHERINE ZIMMERMAN SEPTEMBER 2013 A REPORT BY AEI’S CRITICAL THREATS PROJECT ABOUT US About the Author Katherine Zimmerman is a senior analyst and the al Qaeda and Associated Movements Team Lead for the Ameri- can Enterprise Institute’s Critical Threats Project. Her work has focused on al Qaeda’s affiliates in the Gulf of Aden region and associated movements in western and northern Africa. She specializes in the Yemen-based group, al Qaeda in the Arabian Peninsula, and al Qaeda’s affiliate in Somalia, al Shabaab. Zimmerman has testified in front of Congress and briefed Members and congressional staff, as well as members of the defense community. She has written analyses of U.S. national security interests related to the threat from the al Qaeda network for the Weekly Standard, National Review Online, and the Huffington Post, among others. Acknowledgments The ideas presented in this paper have been developed and refined over the course of many conversations with the research teams at the Institute for the Study of War and the American Enterprise Institute’s Critical Threats Project. The valuable insights and understandings of regional groups provided by these teams directly contributed to the final product, and I am very grateful to them for sharing their expertise with me. I would also like to express my deep gratitude to Dr. Kimberly Kagan and Jessica Lewis for dedicating their time to helping refine my intellectual under- standing of networks and to Danielle Pletka, whose full support and effort helped shape the final product. -
Somalia's Al-Shabaab and the Global Jihad Network
Terrorism without Borders: Somalia’s Al-Shabaab and the global jihad network by Daniel E. Agbiboa This work is licensed under a Creative Commons Attribution 3.0 License. Abstract This article sets out to explore the evolution, operational strategy and transnational dimensions of Harakat Al-Shabab al-Mujahedeen (aka Al-Shabab), the Somali-based Islamist terrorist group. The article argues that Al-Shabab’s latest Westgate attack in Kenya should be understood in the light of the group’s deepening ties with Al-Qaeda and its global jihad, especially since 2009 when Al-Shabab formally pledged allegiance to Osama bin Laden’s Al-Qaeda and welcomed the organisation’s core members into its leadership. Key words: Al-Shabab, Westgate Attack; Al-Qaeda; Global Jihad; Kenya; Somalia. Introduction n 21 September 2013, the world watched with horror as a group of Islamist gunmen stormed Kenya’s high-end Westgate Mall in Nairobi and fired at weekend shoppers, killing over 80 people. The gunmen reportedly shouted in Swahili that Muslims would be allowed to leave while all others Owere subjected to their bloodletting (Agbiboa, 2013a). Countries like France, Canada, the United States, the United Kingdom, Australia, New Zealand, and Ghana, among others, all confirmed that their citizens were among those affected. The renowned Ghanaian Poet, Kofi Awoonor, was also confirmed dead in the attack (Mamdani, 2013). The Somali-based and Al-Qaeda-affiliated Islamist terrorist group, Harakat Al-Shabab al-Mujahideen or, more commonly, Al-Shabab – “the youth” in Arabic – have since claimed responsibility for the horrific attack through its Twitter account. -
Social Media in Africa
Social media in Africa A double-edged sword for security and development Technical annex Kate Cox, William Marcellino, Jacopo Bellasio, Antonia Ward, Katerina Galai, Sofia Meranto, Giacomo Persi Paoli Table of contents Table of contents ...................................................................................................................................... iii List of figures ........................................................................................................................................... iv List of tables .............................................................................................................................................. v Abbreviations .......................................................................................................................................... vii Annex A: Overview of Technical Annex .................................................................................................... 1 Annex B: Background to al-Shabaab, Boko Haram and ISIL ..................................................................... 3 Annex C: Timeline of significant dates ...................................................................................................... 9 Annex D: Country profiles ...................................................................................................................... 25 Annex E: Social media and communications platforms ............................................................................ 31 Annex F: Twitter data -
Al-Qaeda in Libya: a Profile
AL-QAEDA IN LIBYA: A PROFILE A Report Prepared by the Federal Research Division, Library of Congress under an Interagency Agreement with the Combating Terrorism Technical Support Office’s Irregular Warfare Support Program August 2012 Federal Research Division Library of Congress Washington, D.C. 205404840 Tel: 2027073900 Fax: 2027073920 E-Mail: [email protected] Homepage: http://www.loc.gov/rr/frd/ 64 Years of Service to the Federal Government 1948 – 2012 Library of Congress – Federal Research Division Al-Qaeda in Libya: A Profile PREFACE This report attempts to assess al-Qaeda’s presence in Libya. Al-Qaeda Senior Leadership (AQSL) and al-Qaeda in the Islamic Maghreb (AQIM) have sought to take advantage of the Libyan Revolution to recruit militants and to reinforce their operational capabilities in an attempt to create a safe haven and possibly to extend their area of operations to Libya. Reports have indicated that AQSL is seeking to create an al-Qaeda clandestine network in Libya that could be activated in the future to destabilize the government and/or to offer logistical support to al- Qaeda’s activities in North Africa and the Sahel. AQIM has reportedly formed sleeper cells that are probably connected to an al-Qaeda underground network in Libya, likely as a way, primarily, to secure the supply of arms for its ongoing jihadist operations in Algeria and the Sahel. This report discusses how al-Qaeda and its North African affiliate are using communications media and face-to-face contacts to shift the still-evolving post-revolutionary political and social dynamic in Libya in a direction that is conducive to jihad and hateful of the West. -
The Transmutation of Jihadi Organizations in the Sahel and the Regional Security Architecture
No. 10, April 2018 FUTURE NOTES THE TRANSMUTATION OF JIHADI ORGANIZATIONS IN THE SAHEL AND THE REGIONAL SECURITY ARCHITECTURE Djallil Lounnas This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No 693244 Middle East and North Africa Regional Architecture: Mapping Geopolitical Shifts, regional Order and Domestic Transformations FUTURE NOTES No. 10, April 2018 THE TRANSMUTATION OF JIHADI ORGANIZATIONS IN THE SAHEL AND THE REGIONAL SECURITY ARCHITECTURE Djallil Lounnas1 In March 2017, the four most powerful jihadi organizations in the Sahel, Al-Qaeda in the Islamic Maghreb (AQIM), Ansar al-Din, Al-Mourabitoun and Katibat Macina – the latter three linked directly or indirectly to Al-Qaeda – announced their unification and the creation of the Jama’a Nusrat al-Islam wa al-Muslimin’ (JNIM) also known as Group in Support of Islam and Muslims (GSIM), under the leadership of Iyad Ag Ghali. This unification ended the factionalism that had long characterized jihadi organizations in the region and gave birth to what can be considered as one of the most powerful Al-Qaeda affiliates. The creation of the GSIM is especially dangerous in view of the fact that the Sahelian sub-regional system is composed of weak states unable to quell the jihadi threat and geographically linked to Libya, a collapsed state and considered a safe haven for jihadi organizations, in spite of the presence of the international community, especially the French military operation Barkhane. Even more dangerous is the presence of an affiliate of the Islamic State, the Islamic State in the Greater Sahara (ISGS) led by Abu Walid al-Sahrawi, an organization which, although on the surface appearing to be the main rival of the GSIM, has been following a strategy of rapprochement with Iyad Ag Ghali.