Mcallister Bradley J 201105 P

Total Page:16

File Type:pdf, Size:1020Kb

Mcallister Bradley J 201105 P REVOLUTIONARY NETWORKS? AN ANALYSIS OF ORGANIZATIONAL DESIGN IN TERRORIST GROUPS by Bradley J. McAllister (Under the Direction of Sherry Lowrance) ABSTRACT This dissertation is simultaneously an exercise in theory testing and theory generation. Firstly, it is an empirical test of the means-oriented netwar theory, which asserts that distributed networks represent superior organizational designs for violent activists than do classic hierarchies. Secondly, this piece uses the ends-oriented theory of revolutionary terror to generate an alternative means-oriented theory of terrorist organization, which emphasizes the need of terrorist groups to centralize their operations. By focusing on the ends of terrorism, this study is able to generate a series of metrics of organizational performance against which the competing theories of organizational design can be measured. The findings show that terrorist groups that decentralize their operations continually lose ground, not only to government counter-terror and counter-insurgent campaigns, but also to rival organizations that are better able to take advantage of their respective operational environments. However, evidence also suggests that groups facing decline due to decentralization can offset their inability to perform complex tasks by emphasizing the material benefits of radical activism. INDEX WORDS: Terrorism, Organized Crime, Counter-Terrorism, Counter-Insurgency, Networks, Netwar, Revolution, al-Qaeda in Iraq, Mahdi Army, Abu Sayyaf, Iraq, Philippines REVOLUTIONARY NETWORK0S? AN ANALYSIS OF ORGANIZATIONAL DESIGN IN TERRORIST GROUPS by BRADLEY J MCALLISTER B.A., Southwestern University, 1999 M.A., The University of Leeds, United Kingdom, 2003 A Dissertation Submitted to the Graduate Faculty of the University of Georgia in Partial Fulfillment of the Requirements for the Degree DOCTOR OF PHILOSPHY ATHENS, GA 2011 2011 Bradley J. McAllister All Rights Reserved REVOLUTIONARY NETWORKS? AN ANALYSIS OF ORGANIZATIONAL DESIGN IN TERRORIST GROUPS by Bradley J. McAllister Major Professor: Sherry Lowrance Committee: Howard Wiarda Jeffrey Berejikian Michael Boyle Electronic Version Approved: Maureen Grasso Dean of the Graduate School The University of Georgia May 2011 DEDICATION To my beloved wife, Carrell Weeks McAllister, whose emotional support struck the perfect balance between productive encouragement and thinly veiled impatience, and whose material support made possible this whole process. Above all, you make me want to achieve. I love you. iv ACKNOWLEDGEMENTS Above all I would like to thank the faculty members who agreed to guide this project: Dr. Sherry Lowrance, Dr. Michael Boyle, Dr. Jeffrey Berejikian, and Professor Howard Wiarda. In addition, I would like to thank all my wonderful colleagues at the University of St Andrews: Dr. Peter Lehr, Dr. Rashmi Singh, Professor Paul Wilkinson, Orla Lynch, and Gillian Duncan. I would like to especially thank Professor Alex Schmid for giving me the opportunity to work with such excellent colleagues. Finally, I would like to thank my parents, Lee and Sharon Schilling whose support over the years has meant the world. v TABLE OF CONTENTS Page ACKNOWLEDGMENTS ........................................................................................................v LIST OF TABLES ...................................................................................................................ix LIST OF FIGURES ..................................................................................................................x CHAPTER 1 INTRODUCTION...........................................................................................1 1.1 Research Question..........................................................................................................2 1.2 Problems with the Literature...........................................................................................3 1.3 Expected Findings..........................................................................................................3 1.4 Theories of Terrorism and Political Violence..................................................................5 1.5 Theoretical Argument...................................................................................................11 1.6 Research Design...........................................................................................................12 1.7 Chapter Plan.................................................................................................................14 CHAPTER 2 LITERATURE REVIEW .............................................................................15 2.1 Theoretical Arguments.................................................................................................15 2.2 Chapter Outline............................................................................................................19 2.3 Theories of Terrorism and Political Violence................................................................19 2.4 Core Assumptions of Netwar........................................................................................50 2.5 Core Assumptions of the New Terrorism......................................................................52 2.6 Arguments to be Tested................................................................................................54 2.7 Literature Critique........................................................................................................55 vi 2.8 Theoretical Arguments.................................................................................................63 2.9 Conclusion ...................................................................................................................66 CHAPTER 3 METHODOLOGY........................................................................................69 3.1 Hypotheses...................................................................................................................69 3.2 Methodology................................................................................................................76 3.3 Case Study Choices......................................................................................................76 3.4 Institutional Mechanisms for Managing Successful Revolutionary Organizations.........78 3.5 Dependent Variables: Metrics of Organizational Success .............................................80 3.6 Case Study Organization ..............................................................................................83 CHAPTER 4 JAIYSH AL-MAHDI ....................................................................................85 4.1 Organizational Background..........................................................................................86 4.2 Constituencies..............................................................................................................99 4.3 Government Counter Terror Operations .....................................................................105 4.4 Rival Organizations....................................................................................................113 4.5 Operational History....................................................................................................126 4.6 Analysis of Shifts in Organizational Design ...............................................................162 CHAPTER 5 AL-QAEDA IN IRAQ.................................................................................176 5.1 Organizational Background........................................................................................178 5.2 Constituencies............................................................................................................205 5.3 Government Counter Terror Operations .....................................................................209 5.4 Rival Organizations....................................................................................................217 5.5 Operational History....................................................................................................231 5.6 Analysis of Organizational Design .............................................................................258 vii CHAPTER 6 THE ABU SAYYAF GROUP.....................................................................263 6.1 Organizational Background........................................................................................264 6.2 Constituencies............................................................................................................293 6.3 Government Counter-Terror Operations.....................................................................295 6.4 Rival Organizations....................................................................................................301 6.5 Operational History....................................................................................................308 6.6 Analysis of Organizational Design .............................................................................324 CHAPTER 7 ANALYSIS AND CONCLUSION..............................................................326 7.1 Institutional Mechanisms for Managing Successful Terrorist Organizations ...............326 7.2 Comparative Analysis of Organizational Performance................................................340 7.3 Conclusion .................................................................................................................365
Recommended publications
  • Summary from the Jihadi Forums
    ICT Jihadi Monitoring Group PERIODIC REVIEW Bimonthly Report Summary of Information on Jihadist Websites The Second Half of July 2015 International Institute for Counter Terrorism (ICT) Additional resources are available on the ICT Website: www.ict.org.il This report summarizes notable events discussed on jihadist Web forums during the second half of July 2015. Following are the main points covered in the report: The Islamic Emirate of Afghanistan (Taliban in Afghanistan) officially announces the death of Mullah Omar, the leader of the Emirate, from an illness. Following his death, many jihadist leaders and organization eulogize him. In addition, the Emirate announces the appointment of his deputy, Mullah Akhtar Mohammad Mansoor, as the new leader of the Emirate. Islamic State fighters from Turkestan call on Muslim residents of Turkestan to emigrate from their homeland and join the Islamic Caliphate under the leadership of Sheikh Abu Bakr al- Baghdadi. The organization also calls on Turkestani Al-Nusra Front fighters in Syria to defect and join the Islamic State. Sheikh Abu ‘Ubatdha Ahmad ‘Umar, the leader of Al-Shabab Al-Mujahideen, releases his first message since being appointed to the role, regarding his organization’s resolve in the fight against the Crusader conspiracy to weaken Islam and to steal the natural treasures of Muslim lands. In light of this, he calls on tribes in Somalia to help wage jihad against the enemies of Islam and he calls on Muslims in Kenya to join jihad as well. According to him, his organization is ready and willing to absorb into its ranks Muslims from East Africa, including Ethiopia, Djibouti, Uganda and Central Africa, due to their persecution at the hands of the local regimes.
    [Show full text]
  • CTC Sentinel Objective
    NOVEMBER 2010 . VOL 3 . ISSUE 11-12 COMBATING TERRORISM CENTER AT WEST POINT CTC Sentinel OBJECTIVE . RELEVANT . RIGOROUS Contents AQAP’s Soft Power Strategy FEATURE ARTICLE 1 AQAP’s Soft Power Strategy in Yemen in Yemen By Barak Barfi By Barak Barfi REPORTS 5 Developing Policy Options for the AQAP Threat in Yemen By Gabriel Koehler-Derrick 9 The Role of Non-Violent Islamists in Europe By Lorenzo Vidino 12 The Evolution of Iran’s Special Groups in Iraq By Michael Knights 16 Fragmentation in the North Caucasus Insurgency By Christopher Swift 19 Assessing the Success of Leadership Targeting By Austin Long 21 Revolution Muslim: Downfall or Respite? By Aaron Y. Zelin 24 Recent Highlights in Terrorist Activity 28 CTC Sentinel Staff & Contacts l-qa`ida in the arabian AQAP has avoided many of the domestic Peninsula (AQAP) is currently battles that weakened other al-Qa`ida the most successful of the affiliates by pursuing a shrewd strategy at three al-Qa`ida affiliates home in Yemen.3 The group has sought to Aoperating in the Arab world.1 Unlike its focus its efforts on its primary enemies— sibling partners, AQAP has neither been the Yemeni and Saudi governments, as plagued by internecine conflicts nor has well as the United States—rather than it clashed with its tribal hosts. It has also distracting itself by combating minor launched two major terrorist attacks domestic adversaries that would only About the CTC Sentinel against the U.S. homeland that were only complicate its grand strategy. Some The Combating Terrorism Center is an foiled by a combination of luck and the analysts have argued that this stems independent educational and research help of foreign intelligence agencies.2 from the lessons the group learned from institution based in the Department of Social al-Qa`ida’s failed campaigns in countries Sciences at the United States Military Academy, such as Saudi Arabia and Iraq.
    [Show full text]
  • Policy Notes for the Trump Notes Administration the Washington Institute for Near East Policy ■ 2018 ■ Pn55
    TRANSITION 2017 POLICYPOLICY NOTES FOR THE TRUMP NOTES ADMINISTRATION THE WASHINGTON INSTITUTE FOR NEAR EAST POLICY ■ 2018 ■ PN55 TUNISIAN FOREIGN FIGHTERS IN IRAQ AND SYRIA AARON Y. ZELIN Tunisia should really open its embassy in Raqqa, not Damascus. That’s where its people are. —ABU KHALED, AN ISLAMIC STATE SPY1 THE PAST FEW YEARS have seen rising interest in foreign fighting as a general phenomenon and in fighters joining jihadist groups in particular. Tunisians figure disproportionately among the foreign jihadist cohort, yet their ubiquity is somewhat confounding. Why Tunisians? This study aims to bring clarity to this question by examining Tunisia’s foreign fighter networks mobilized to Syria and Iraq since 2011, when insurgencies shook those two countries amid the broader Arab Spring uprisings. ©2018 THE WASHINGTON INSTITUTE FOR NEAR EAST POLICY. ALL RIGHTS RESERVED. THE WASHINGTON INSTITUTE FOR NEAR EAST POLICY ■ NO. 30 ■ JANUARY 2017 AARON Y. ZELIN Along with seeking to determine what motivated Evolution of Tunisian Participation these individuals, it endeavors to reconcile estimated in the Iraq Jihad numbers of Tunisians who actually traveled, who were killed in theater, and who returned home. The find- Although the involvement of Tunisians in foreign jihad ings are based on a wide range of sources in multiple campaigns predates the 2003 Iraq war, that conflict languages as well as data sets created by the author inspired a new generation of recruits whose effects since 2011. Another way of framing the discussion will lasted into the aftermath of the Tunisian revolution. center on Tunisians who participated in the jihad fol- These individuals fought in groups such as Abu Musab lowing the 2003 U.S.
    [Show full text]
  • Terrorist Rehabilitation Terrorist
    Terrorism / Political Violence Gunaratna Angell “This is a story of an effort to address the very fundamental challenge in this conflict, deradicalization … both in large mass populations, in small cells, in cliques and ultimately into the individual’s own thought process.” —Maj. Gen. Douglas Stone (retired) (from the Foreword) TERRORIST REHABILITATION Because terrorists are made, not born, it is critically important to world peace that detainees and inmates in uenced by violent ideology are deradicalized and rehabilitated back into society. Exploring the challenges in this formidable endeavor, Terrorist Rehabilitation: The U.S. Experience in Iraq demonstrates through the actual experiences of military personnel, defense contractors, and Iraqi nationals that deradicalization and rehabilitation programs can succeed and have the capability to positively impact thousands of would-be terrorists globally if utilized to their full capacity. Custodial and community rehabilitation of terrorists and extremists is a new frontier in the ght against terrorism. This forward-thinking volume: • Highlights the success of a rehabilitation program curriculum in Iraq • Encourages individuals and governments to embrace rehabilitation as the next most logical step in ghting terrorism • Examines the recent history of threat groups in Iraq • Demonstrates where the U.S. went awry in its war effort, and the steps it took to correct the situation • Describes religious, vocational training, education, creative expression, and Tanweer programs introduced to the detainee population • Provides insight into future steps based on lessons learned from current rehabilitation programs It is essential that we shift the focus from solely detainment and imprisonment to addressing the ideological mindset during prolonged incarceration. It is possible to effect an ideological transformation in detainees that qualies them to be reclassied as no longer posing a security threat.
    [Show full text]
  • Rebooting U.S. Security Cooperation in Iraq
    Rebooting U.S. Security Cooperation in Iraq MICHAEL KNIGHTS POLICY FOCUS 137 Rebooting U.S. Security Cooperation in Iraq MICHAEL KNIGHTS THE WASHINGTON INSTITUTE FOR NEAR EAST POLICY www.washingtoninstitute.org The opinions expressed in this Policy Focus are those of the author and not necessarily those of The Washington Institute, its Board of Trustees, or its Board of Advisors. All rights reserved. Printed in the United States of America. No part of this publica- tion may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. © 2015 by The Washington Institute for Near East Policy The Washington Institute for Near East Policy 1828 L Street NW, Suite 1050 Washington, DC 20036 Design: 1000colors Photo: A Kurdish fighter keeps guard while overlooking positions of Islamic State mili- tants near Mosul, northern Iraq, August 2014. (REUTERS/Youssef Boudlal) CONTENTS Acknowledgments | v Acronyms | vi Executive Summary | viii 1 Introduction | 1 2 Federal Government Security Forces in Iraq | 6 3 Security Forces in Iraqi Kurdistan | 26 4 Optimizing U.S. Security Cooperation in Iraq | 39 5 Issues and Options for U.S. Policymakers | 48 About the Author | 74 TABLES 1 Effective Combat Manpower of Iraq Security Forces | 8 2 Assessment of ISF and Kurdish Forces as Security Cooperation Partners | 43 FIGURES 1 ISF Brigade Order of Battle, January 2015 | 10 2 Kurdish Brigade Order of Battle, January 2015 | 28 ACKNOWLEDGMENTS My thanks to a range of colleagues for their encouragement and assistance in the writing of this study.
    [Show full text]
  • Iranian Strategy in Syria
    *SBOJBO4USBUFHZJO4ZSJB #:8JMM'VMUPO KPTFQIIPMMJEBZ 4BN8ZFS BKPJOUSFQPSUCZ"&*ŦT$SJUJDBM5ISFBUT1SPKFDUJ/45*565&'035)&456%:0'8"3 .BZ All rights reserved. Printed in the United States of America. ©2013 by Institute for the Study of War and AEI’s Critical Threats Project Cover Image: Iranian President Mahmoud Ahmadinejad, Syrian President Bashar Al-Assad, and Hezbollah’s Sheikh Hassan Nasrallah appear together on a poster in Damascus, Syria. Credit: Inter Press Service News Agency Iranian strategy in syria Will Fulton, Joseph Holliday, & Sam wyer May 2013 A joint Report by AEI’s critical threats project & Institute for the Study of War ABOUT US About the Authors Will Fulton is an Analyst and the IRGC Project Team Lead at the Critical Threats Project at the American Enterprise Institute. Joseph Holliday is a Fellow at the Institute for the Study of War. Sam Wyer served as an Iraq Analyst at ISW from September 2012 until February 2013. The authors would like to thank Kim and Fred Kagan, Jessica Lewis, and Aaron Reese for their useful insights throughout the writing and editorial process, and Maggie Rackl for her expert work on formatting and producing this report. We would also like to thank our technology partners Praescient Analytics and Palantir Technologies for providing us with the means and support to do much of the research and analysis used in our work. About the Institute for the Study of War The Institute for the Study of War (ISW) is a non-partisan, non-profit, public policy research organization. ISW advances an informed understanding of military affairs through reliable research, trusted analysis, and innovative education.
    [Show full text]
  • Al-Qa'ida Affiliates in Asia, the Middle East, and Africa
    NEW JERSEY OFFICE OF HOMELAND SECURITY AND PREPAREDNESS AL-QA’IDA AFFILIATES IN ASIA, THE MIDDLE EAST, AND AFRICA INFORMATION CUTOFF: JULY 13, 2017 Al-Qa’ida (AQ) Remains the head of AQ, but is competing with ISIS for leadership within the global jihadi movement and has been Al-Qa’ida Affiliate releasing propaganda to counter ISIS messaging in Syria since the declaration of its Strives to establish a caliphate in 2014. new affiliate in Syria composed of defectors from the Nusrah Front—a former al- Qa’ida affiliate. Al-Qa’ida in theArabian Peninsula (AQAP) Continues to fight the Yemeni military and the Iranian- backed Shia Huthis in Yemen and has acquired new weaponry and support from sympathetic Sunni tribes across the country. The Ansar al-Sharia branch of AQAP functions as an intermediary between local tribes and Al-Qa’ida in the Indian Subcontinent (AQIS) AQAP. Maintains ties to local extremist groups and conducts small-scale attacks, targeting secular Al-Qa’ida in the Islamic Maghreb (AQIM) activists, bloggers, and writers in Bangladesh. The group continues to expand throughout the Al-Shabaab region and recently swore its allegiance to the Afghan Taliban. Continues to target Western assets in the region and recently merged with four insurgency groups in North Africa—Ansar al-Dine, the Macina Liberation Front, al-Murabitun, and AQIM’s Sahara branch— Targets African to create Jama’at Nusrat al-Islam wal-Muslimin. This merger is an attempt to strengthen local ties and Mission in Somalia foster cooperation in the region. (AMISOM) forces, attacking government bases, as well as soft targets such as hotels and restaurants frequented by foreign diplomats and government officials.
    [Show full text]
  • Foreign Terrorist Organizations
    Order Code RL32223 CRS Report for Congress Received through the CRS Web Foreign Terrorist Organizations February 6, 2004 Audrey Kurth Cronin Specialist in Terrorism Foreign Affairs, Defense, and Trade Division Huda Aden, Adam Frost, and Benjamin Jones Research Associates Foreign Affairs, Defense, and Trade Division Congressional Research Service ˜ The Library of Congress Foreign Terrorist Organizations Summary This report analyzes the status of many of the major foreign terrorist organizations that are a threat to the United States, placing special emphasis on issues of potential concern to Congress. The terrorist organizations included are those designated and listed by the Secretary of State as “Foreign Terrorist Organizations.” (For analysis of the operation and effectiveness of this list overall, see also The ‘FTO List’ and Congress: Sanctioning Designated Foreign Terrorist Organizations, CRS Report RL32120.) The designated terrorist groups described in this report are: Abu Nidal Organization (ANO) Abu Sayyaf Group (ASG) Al-Aqsa Martyrs Brigade Armed Islamic Group (GIA) ‘Asbat al-Ansar Aum Supreme Truth (Aum) Aum Shinrikyo, Aleph Basque Fatherland and Liberty (ETA) Communist Party of Philippines/New People’s Army (CPP/NPA) Al-Gama’a al-Islamiyya (Islamic Group, IG) HAMAS (Islamic Resistance Movement) Harakat ul-Mujahidin (HUM) Hizballah (Party of God) Islamic Movement of Uzbekistan (IMU) Jaish-e-Mohammed (JEM) Jemaah Islamiya (JI) Al-Jihad (Egyptian Islamic Jihad) Kahane Chai (Kach) Kurdistan Workers’ Party (PKK, KADEK) Lashkar-e-Tayyiba
    [Show full text]
  • Army Press January 2017 Blythe
    Pfc. Brandie Leon, 4th Infantry Division, holds security while on patrol in a local neighborhood to help maintain peace after recent attacks on mosques in the area, East Baghdad, Iraq, 3 March 2006. (Photo by Staff Sgt. Jason Ragucci, U.S. Army) III Corps during the Surge: A Study in Operational Art Maj. Wilson C. Blythe Jr., U.S. Army he role of Lt. Gen. Raymond Odierno’s III (MNF–I) while using tactical actions within Iraq in an Corps as Multinational Corps–Iraq (MNC–I) illustrative manner. As a result, the campaign waged by has failed to receive sufficient attention from III Corps, the operational headquarters, is overlooked Tstudies of the 2007 surge in Iraq. By far the most in this key work. comprehensive account of the 2007–2008 campaign The III Corps campaign is also neglected in other is found in Michael Gordon and Lt. Gen. Bernard prominent works on the topic. In The Gamble: General Trainor’s The Endgame: The Inside Story of the Struggle for Petraeus and the American Military Adventure in Iraq, Iraq, from George W. Bush to Barack Obama, which fo- 2006-2008, Thomas Ricks emphasizes the same levels cuses on the formulation and execution of strategy and as Gordon and Trainor. However, while Ricks plac- policy.1 It frequently moves between Washington D.C., es a greater emphasis on the role of III Corps than is U.S Central Command, and Multinational Force–Iraq found in other accounts, he fails to offer a thorough 2 13 January 2017 Army Press Online Journal 17-1 III Corps during the Surge examination of the operational campaign waged by III creating room for political progress such as the February 2 Corps.
    [Show full text]
  • Counterinsurgency in the Iraq Surge
    A NEW WAY FORWARD OR THE OLD WAY BACK? COUNTERINSURGENCY IN THE IRAQ SURGE. A thesis presented to the faculty of the Graduate School of Western Carolina University in partial fulfillment of the requirements for the degree of Master of Arts in US History. By Matthew T. Buchanan Director: Dr. Richard Starnes Associate Professor of History, Dean of the College of Arts and Sciences. Committee Members: Dr. David Dorondo, History, Dr. Alexander Macaulay, History. April, 2018 TABLE OF CONTENTS List of Abbreviations . iii Abstract . iv Introduction . 1 Chapter One: Perceptions of the Iraq War: Early Origins of the Surge . 17 Chapter Two: Winning the Iraq Home Front: The Political Strategy of the Surge. 38 Chapter Three: A Change in Approach: The Military Strategy of the Surge . 62 Conclusion . 82 Bibliography . 94 ii ABBREVIATIONS ACU - Army Combat Uniform ALICE - All-purpose Lightweight Individual Carrying Equipment BDU - Battle Dress Uniform BFV - Bradley Fighting Vehicle CENTCOM - Central Command COIN - Counterinsurgency COP - Combat Outpost CPA – Coalition Provisional Authority CROWS- Common Remote Operated Weapon System CRS- Congressional Research Service DBDU - Desert Battle Dress Uniform HMMWV - High Mobility Multi-Purpose Wheeled Vehicle ICAF - Industrial College of the Armed Forces IED - Improvised Explosive Device ISG - Iraq Study Group JSS - Joint Security Station MNC-I - Multi-National-Corps-Iraq MNF- I - Multi-National Force – Iraq Commander MOLLE - Modular Lightweight Load-carrying Equipment MRAP - Mine Resistant Ambush Protected (vehicle) QRF - Quick Reaction Forces RPG - Rocket Propelled Grenade SOI - Sons of Iraq UNICEF - United Nations International Children’s Fund VBIED - Vehicle-Borne Improvised Explosive Device iii ABSTRACT A NEW WAY FORWARD OR THE OLD WAY BACK? COUNTERINSURGENCY IN THE IRAQ SURGE.
    [Show full text]
  • Shia Strength - Iraqi Militants Adapt to the US Drawdown
    TERRORISM & INSURGENCY Date Posted: 30-Sep-2011 Jane's Intelligence Review Shia strength - Iraqi militants adapt to the US drawdown Key Points Iranian-backed Shia militants in Iraq are responsible for a disproportionately high number of the US casualties suffered in recent months. Kataib Hizbullah, the most sophisticated group, is considered a direct extension of Iran's Qods Force and could become involved in international operations in support of Iranian goals. Asaib Ahl al-Haq and Promised Day Brigades are Iraqi Shia insurgent groups, whose links to Iran peaked in 2008 and have slowly reduced since then. Iraq's 'special groups', such as Kataib Hizbullah and Promised Day Brigades, have stepped up attacks as US forces look to withdraw. Michael Knights looks at Iran's support for the Shia militants, their operations and their post-US future. The US military suffered its heaviest monthly casualties in Iraq in three years in June, when 14 of its soldiers were killed in action. At least 12 of them were killed by Iranian-backed 'special groups', prompting fresh complaints from the US that Iran was encouraging its Iraqi allies to step up their attacks as the scheduled withdrawal of all US forces from Iraq looms. The surge in attacks highlighted the threat posed by Shia militants, especially if the US and Iraqi governments sign an agreement allowing US forces to stay beyond the 31 December withdrawal deadline. Even if the US leaves as previously agreed, Iran is expected to continue to back Iraqi proxies in order to influence the political situation and retain an ability to strike Western assets in the country and possibly elsewhere.
    [Show full text]
  • 9/11 Report”), July 2, 2004, Pp
    Final FM.1pp 7/17/04 5:25 PM Page i THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page v CONTENTS List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— ...in the Law Enforcement Community 73 3.3 . and in the Federal Aviation Administration 82 3.4 . and in the Intelligence Community 86 v Final FM.1pp 7/17/04 5:25 PM Page vi 3.5 . and in the State Department and the Defense Department 93 3.6 . and in the White House 98 3.7 . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis:August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5.
    [Show full text]