Volume XV, Issue 1 February 2021 PERSPECTIVES on TERRORISM Volume 15, Issue 1

Total Page:16

File Type:pdf, Size:1020Kb

Volume XV, Issue 1 February 2021 PERSPECTIVES on TERRORISM Volume 15, Issue 1 ISSN 2334-3745 Volume XV, Issue 1 February 2021 PERSPECTIVES ON TERRORISM Volume 15, Issue 1 Table of Content Welcome from the Editors...............................................................................................................................1 Articles Bringing Religiosity Back In: Critical Reflection on the Explanation of Western Homegrown Religious Terrorism (Part I)............................................................................................................................................2 by Lorne L. Dawson Dying to Live: The “Love to Death” Narrative Driving the Taliban’s Suicide Bombings............................17 by Atal Ahmadzai The Use of Bay’ah by the Main Salafi-Jihadist Groups..................................................................................39 by Carlos Igualada and Javier Yagüe Counter-Terrorism in the Philippines: Review of Key Issues.......................................................................49 by Ronald U. Mendoza, Rommel Jude G. Ong and Dion Lorenz L. Romano Variations on a Theme? Comparing 4chan, 8kun, and other chans’ Far-right “/pol” Boards....................65 by Stephane J. Baele, Lewys Brace, and Travis G. Coan Research Notes Climate Change—Terrorism Nexus? A Preliminary Review/Analysis of the Literature...................................81 by Jeremiah O. Asaka Inventory of 200+ Institutions and Centres in the Field of Terrorism and Counter-Terrorism Research.....93 by Reinier Bergema and Olivia Kearney Resources Counterterrorism Bookshelf: Eight Books on Terrorism & Counter-Terrorism-Related Subjects..........151 Reviewed by Joshua Sinai Bibliography: Terrorism by Region – Southeast Asia................................................................................155 Compiled and selected by Judith Tinnes Bibliography: Civilian Casualties of Terrorism and Counter-Terrorism..................................................202 Compiled and selected by David Teiner Preparedness for, and Resilience to, Terrorism: Bibliography of Theses...................................................228 (60+ Full-Text Academic Theses (Ph. D. and M.A.) written in English between 2000 and 2020) Compiled and selected by Brody McDonald Recent Online Resources for the Analysis of Terrorism and Related Subjects..........................................233 Compiled and selected by Berto Jongman Announcements Conference Monitor/Calendar of Events.....................................................................................................265 Complied by Olivia Kearney ISSN 2334-3745 I February 2021 PERSPECTIVES ON TERRORISM Volume 15, Issue 1 Words of Appreciation for Reviewers and Members of the Editorial Board.............................................269 by Alex P. Schmid and James J.F. Forest TRI Best Thesis Award 2019 & 2020...........................................................................................................271 by Alex P. Schmid About Perspectives on Terrorism...................................................................................................................272 ISSN 2334-3745 II February 2021 PERSPECTIVES ON TERRORISM Volume 15, Issue 1 Welcome from the Editors Dear Reader, We are pleased to announce the release of Volume XV, Issue 1 (February 2021) of Perspectives on Terrorism (ISSN 2334-3745). Our independent online journal is an Open Access publication of the Terrorism Research Initiative (TRI), Vienna, and the Institute of Security and Global Affairs (ISGA) of Leiden University’s Campus in The Hague. All past and recent issues are freely available online at URL: https://www.universiteitleiden.nl/ perspectives-on-terrorism. Perspectives on Terrorism (PoT) is indexed by JSTOR, SCOPUS, and Google Scholar. Now in its fourteenth year, it has nearly 9,400 registered subscribers and many more occasional readers and website visitors in ac- ademia, government and civil society. TheArticles of its six annual issues are fully peer-reviewed by external referees while its Research Notes and other content are subject to internal editorial quality control. The current issue features fiveArticles . The opening article by Lorne Dawson critically examines whether religious motivations have been misrepresented in relation to religious terrorism. The second article by Atal Ahmadzai examines the written and audio-visual materials used by the Taliban to motivate and operationalize suicide bombings in spite of social and cultural resistance in Afghan society. Next Carlos Igualada and Javier Yagüe explain how the practice of declaring bay’ah (taking an oath of allegiance) has helped al-Qaeda and Is- lamic State pursue global expansion by establishing allegiance relationships with dozens of groups around the world. In the fourth article, Ronald Mendoza, Rommel Jude Ong and Dion Lorenz Romano review some key legal issues regarding counterterrorism efforts in the Philippines. And in the final article of this issue, Stephane Baele, Lewys Brace, and Travis Coan compare the content and discussion of six different /pol boards of “chan” forums, identifying how popularity and extreme content can distinguish one from another amid a fragmented subculture. These articles are followed by two Research Notes. In the first, Jeremiah Asaka examines relationships and patterns of interaction between climate change and terrorism. And the second is an extensive inventory of institutions and centers in the field of terrorism research, compiled by Reinier Bergema and Editorial Assistant Olivia Kearney, Our Resources section open with the CT-Bookshelf wherein our Book Reviews Editor Joshua Sinai provides abbreviated reviews of 8 new publications. This is followed by an extensive bibliography on terrorism in South- east Asia by Information Resources Editor Judith Tinnes, and an equally extensive bibliography on civilian casualties of terrorism and counterterrorism, by Assistant Information Resources Editor David Teiner. Then Assistant Editor Brody McDonald provides a bibliography of academic theses on preparedness for, and resil- ience to, terrorism. The reader will also find in this issue a list of new web-based resources on terrorism and related subjects by Associate Editor Berto Jongman and a Conference Calendar compiled by Olivia Kearney. Finally, the February issue concludes with some words of appreciation to all the peer reviewers and members of the Editorial Board who have contributed their time and effort towards the continued success of this open source journal, and a reminder that submissions for the TRI Best Thesis Award competition for the Best Doc- toral Dissertation on Terrorism and Counter-Terrorism must be received by 31 March, 2021. The articles and other texts of the current issue of Perspectives on Terrorism have been edited by Alex Schmid and James Forest, the journal’s principal editors. Editorial Assistant Jodi Moore handled proof-reading, while the technical on- line launch of the February 2021 issue of our journal has been in the hands of Associate Editor for IT Christine Boelema Robertus. ISSN 2334-3745 1 February 2021 PERSPECTIVES ON TERRORISM Volume 15, Issue 1 Bringing Religiosity Back In: Critical Reflection on the Explanation of Western Homegrown Religious Terrorism (Part I) by Lorne L. Dawson Abstract An unusual feature of the social scientific study of religious terrorism is the erasure of religiosity as a significant motivational factor. This article systematically delineates and criticizes the presence of this peculiar interpretive preference, demonstrating that it is methodologically suspect and theoretically and empirically unhelpful. There are two parts to the critique. Part I (this article), discusses three foundational aspects of the argument: (1) it delineates ten conditions of the critique, to avoid predictable misunderstandings; (2) it specifies three methodological reasons for considering the motivational claims of religious terrorists as potentially important and valid data; and (3) it surveys the history of the study of religious terrorism to identify some extra-methodological influences that may have truncated the analysis of the religious motivations for religious terrorism. Part II (the next article), examines three types of arguments commonly used to minimize the role of religiosity in motivating religious terrorism. Identifying the arguments by the primary interpretive errors they rely on, some arguments (1) mistakenly treat the religious background and knowledge of homegrown jihadists as a sound indicator of their religiosity; others (2) inappropriately apply a modern Western normative conception of religion to homegrown jihadists; and some arguments (3) rely on an overly dichotomized conception of the relationship of social processes and ideology in the process of radicalization. The critique ends with consideration of alternative perspectives, offering a more refined conception of the role of ideology, and more specifically religiosity, in the determination of the actions of religious terrorists. Keywords: Al-Qaeda, extremism, ideology, jihadism, radicalization, religion, terrorism, Islamic State (IS) Introduction The title of this article may appear ironic. Yet it alludes to a very real problem.[1] Surely religious terrorism is about religion in some significant way. This is the assumption underlying much public discourse since 9/11. In many social scientific analyses of religious terrorism, however, researchers discount the significance of religion as a motivator for religious terrorism. In most
Recommended publications
  • Duckduckgo Search Engines Android
    Duckduckgo search engines android Continue 1 5.65.0 10.8MB DuckduckGo Privacy Browser 1 5.64.0 10.8MB DuckduckGo Privacy Browser 1 5.63.1 10.78MB DuckduckGo Privacy Browser 1 5.62.0 10.36MB DuckduckGo Privacy Browser 1 5.61.2 10.36MB DuckduckGo Privacy Browser 1 5.60.0 10.35MB DuckduckGo Privacy Browser 1 5.59.1 10.35MB DuckduckGo Privacy Browser 1 5.58.1 10.33MB DuckduckGo Privacy Browser 1 5.57.1 10.31MB DuckduckGo Privacy browser © DuckduckGo. Privacy, simplified. This article is about the search engine. For children's play, see duck, duck, goose. Internet search engine DuckDuckGoScreenshot home page DuckDuckGo on 2018Type search engine siteWeb Unavailable inMultilingualHeadquarters20 Paoli PikePaoli, Pennsylvania, USA Area servedWorldwideOwnerDuck Duck Go, Inc., createdGabriel WeinbergURLduckduckgo.comAlexa rank 158 (October 2020 update) CommercialRegregedSeptember 25, 2008; 12 years ago (2008-09-25) was an Internet search engine that emphasized the privacy of search engines and avoided the filter bubble of personalized search results. DuckDuckGo differs from other search engines by not profiling its users and showing all users the same search results for this search term. The company is based in Paoli, Pennsylvania, in Greater Philadelphia and has 111 employees since October 2020. The name of the company is a reference to the children's game duck, duck, goose. The results of the DuckDuckGo Survey are a compilation of more than 400 sources, including Yahoo! Search BOSS, Wolfram Alpha, Bing, Yandex, own web scanner (DuckDuckBot) and others. It also uses data from crowdsourcing sites, including Wikipedia, to fill in the knowledge panel boxes to the right of the results.
    [Show full text]
  • How Law Made Silicon Valley
    Emory Law Journal Volume 63 Issue 3 2014 How Law Made Silicon Valley Anupam Chander Follow this and additional works at: https://scholarlycommons.law.emory.edu/elj Recommended Citation Anupam Chander, How Law Made Silicon Valley, 63 Emory L. J. 639 (2014). Available at: https://scholarlycommons.law.emory.edu/elj/vol63/iss3/3 This Article is brought to you for free and open access by the Journals at Emory Law Scholarly Commons. It has been accepted for inclusion in Emory Law Journal by an authorized editor of Emory Law Scholarly Commons. For more information, please contact [email protected]. CHANDER GALLEYSPROOFS2 2/17/2014 9:02 AM HOW LAW MADE SILICON VALLEY Anupam Chander* ABSTRACT Explanations for the success of Silicon Valley focus on the confluence of capital and education. In this Article, I put forward a new explanation, one that better elucidates the rise of Silicon Valley as a global trader. Just as nineteenth-century American judges altered the common law in order to subsidize industrial development, American judges and legislators altered the law at the turn of the Millennium to promote the development of Internet enterprise. Europe and Asia, by contrast, imposed strict intermediary liability regimes, inflexible intellectual property rules, and strong privacy constraints, impeding local Internet entrepreneurs. This study challenges the conventional wisdom that holds that strong intellectual property rights undergird innovation. While American law favored both commerce and speech enabled by this new medium, European and Asian jurisdictions attended more to the risks to intellectual property rights holders and, to a lesser extent, ordinary individuals.
    [Show full text]
  • Vol. Xcvi1 No. 3 September 2012
    VOL. XCVI1 NO. 3 SEPTEMBER 2012 THE DIOCESAN COLLEGE, RONDEBOSCH College Address: Campground Road, Rondebosch, 7700, Tel 021 659 1000, Fax 021 659 1013 Prep Address: Fir Road, Rondebosch, 7700; Tel 021 659 7220 Pre-Prep Address: Sandown Road, Rondebosch, 7700; Tel 021 659 1037/47 Editor: Mr CW Tucker [email protected] OD Union E-mail: [email protected] Museum and Archives: Mr B Bey [email protected] website: www.bishops.org.za FOUNDED IN 1849 BY THE BISHOP OF CAPE TOWN, AS A CHRISTIAN FOUNDATION INCORPORATED BY ACT OF PARLIAMENT, 1891 Visitor HIS GRACE THE ARCHBISHOP OF CAPE TOWN THABO CECIL MAKGOBA Members of the College Council Chairman Mr MJ Bosman Bishop GQ Counsell, Dr R Nassen, Mrs M Isaacs, Prof HI Bhorat, AVR Taylor, P Anderson, M Bourne, J Gardener, S Utete Principal: Mr G nupen, B. Com, HED Deputy Principal: Mr Ma King, MA, MA, BA (Hons), NHED, B Ed (St Andrews Rhodes Scholar) COLLEGE STAFF Headmaster: Mr v Wood, B Ed, BA, HDE Deputy Headmasters Mr aD Mallett, BA, HDE Mr MS Bizony, B.Sc (Hons) Mr D abrey, B.Sc, PGCE Mr pG Westwood, B.Sc (Hons) Mr R Drury, BA, HDE Mr a Jacobs, PTD, HDE Mr W Wallace, BA (Hons), HDE Assistant Deputy Headmasters Mr S Henchie, MA (Economics) Mr M Mitchell, MBA, M Mus, HDE, LTCL, FTCL, UPLM, UTLM Ms B Kemball, BA, HDE, FDE (I SEN) Mr p Mayers, B Music Education Mr K Kruger; B Sc (Erg), HDE Mr D Russell, B Com, HDE Academic Staff Mr R Jacobs, B.Sc(Ed) Mr RpO Hyslop, BA (FA), HDE Mr J nolte, B.Soc.Sci (Hons); B Psych, PGCE Mr pL Court, BA (Hons), BA, HDE Mr R Smith, BA (Hons) SportsSci (Biokmetics),
    [Show full text]
  • Libya's Fight for Survival
    LIBYA’S FIGHT FOR SURVIVAL DEFEATING JIHADIST NETWORKS September 2015 ! ! ! TABLE OF CONTENTS FOREWORD 3 ESSAY ONE COMPETING JIHADIST ORGANISATIONS AND NETWORKS 6 Islamic State, Al-Qaeda, Al-Qaeda in the Islamic Maghreb and Ansar al-Sharia in Libya Stefano Torelli and Arturo Varvelli ESSAY TWO POLITICAL PARTY OR ARMED FACTION? 31 The Future of the Libyan Muslim Brotherhood Valentina Colombo, Giuseppe Dentice and Arturo Varvelli ESSAY THREE MAPPING RADICAL ISLAMIST MILITIAS IN LIBYA 53 Wolfgang Pusztai and Arturo Varvelli ESSAY FOUR THE EXPLOITATION OF MIGRATION ROUTES TO EUROPE 73 Human Trafficking Through Areas of Libya Affected by Fundamentalism Nancy Porsia ABOUT THE AUTHORS 87 BIBLIOGRAPHY 89 2 LIBYA’S FIGHT FOR SURVIVAL DEFEATING JIHADIST NETWORKS LIBYA’S FIGHT FOR SURVIVAL 3 DEFEATING JIHADIST NETWORKS FOREWORD ! ! This publication is a compilation of four different essays, edited by Dr. Arturo Varvelli PhD, which from part of a series of studies undertaken by EFD to analyse the nature and spread of the phenomenon of radicalisation in the European Eastern and Southern neighbourhoods. It focuses on Libya and assesses the current situation on the ground through a number of diverse and varied prisms. It identifies patterns and trends as well as specific local and regional developments in order to provide a comprehensive overview of the situation of radicalisation in post-Ghadaffi Libya and the extent to which this may be contributing to regional as well as international instability Months of acute political turmoil in Libya following the fall of the Qaddafi regime, compounded by a weak national identity as well as legacies from the civil war in 2011 which ended Qaddafi’s 42-year rule, have resulted in Libya becoming a failed state with a strong radical Islamist presence.
    [Show full text]
  • The Otaku Phenomenon : Pop Culture, Fandom, and Religiosity in Contemporary Japan
    University of Louisville ThinkIR: The University of Louisville's Institutional Repository Electronic Theses and Dissertations 12-2017 The otaku phenomenon : pop culture, fandom, and religiosity in contemporary Japan. Kendra Nicole Sheehan University of Louisville Follow this and additional works at: https://ir.library.louisville.edu/etd Part of the Comparative Methodologies and Theories Commons, Japanese Studies Commons, and the Other Religion Commons Recommended Citation Sheehan, Kendra Nicole, "The otaku phenomenon : pop culture, fandom, and religiosity in contemporary Japan." (2017). Electronic Theses and Dissertations. Paper 2850. https://doi.org/10.18297/etd/2850 This Doctoral Dissertation is brought to you for free and open access by ThinkIR: The University of Louisville's Institutional Repository. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of ThinkIR: The University of Louisville's Institutional Repository. This title appears here courtesy of the author, who has retained all other copyrights. For more information, please contact [email protected]. THE OTAKU PHENOMENON: POP CULTURE, FANDOM, AND RELIGIOSITY IN CONTEMPORARY JAPAN By Kendra Nicole Sheehan B.A., University of Louisville, 2010 M.A., University of Louisville, 2012 A Dissertation Submitted to the Faculty of the College of Arts and Sciences of the University of Louisville in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in Humanities Department of Humanities University of Louisville Louisville, Kentucky December 2017 Copyright 2017 by Kendra Nicole Sheehan All rights reserved THE OTAKU PHENOMENON: POP CULTURE, FANDOM, AND RELIGIOSITY IN CONTEMPORARY JAPAN By Kendra Nicole Sheehan B.A., University of Louisville, 2010 M.A., University of Louisville, 2012 A Dissertation Approved on November 17, 2017 by the following Dissertation Committee: __________________________________ Dr.
    [Show full text]
  • The Growing Role of the Military in Counter-Terrorism in Southeast Asia
    ISSUE: 2018 No. 69 ISSN 2335-6677 RESEARCHERS AT ISEAS – YUSOF ISHAK INSTITUTE ANALYSE CURRENT EVENTS Singapore |2 November 2018 The Growing Role of the Military in Counter-Terrorism in Southeast Asia Olli Suorsa* EXECUTIVE SUMMARY Military forces have gained a more prominent role in countering terrorism in Southeast Asian countries, particularly in the Philippines and Indonesia. Law-enforcement agencies’ perceived unpreparedness and even failure to prevent and effectively deal with the attacks in Marawi City in the Philippines and Surabaya in Indonesia in May 2017 and May 2018 respectively, helped to elevate the role of armed forces. The military’s traditionally strong or embedded role in these countries together with its extensive territorial presence, has provided it with a natural role in countering threats or acts of terrorism. The enhanced role of the military in internal security operations raises concerns about past abuses of human rights by the military, especially in Indonesia. * Olli Suorsa was Associate Fellow at ISEAS – Yusof Ishak Institute from 2 July 2018 to 27 July 2018, and is Ph.D. Candidate at the City University of Hong Kong. 1 ISSUE: 2018 No. 69 ISSN 2335-6677 INTRODUCTION The increasing numbers of attacks by Southeast Asian militant groups and radicalized individuals pledging allegiance to the Islamic State in Iraq and Syria (ISIS), since at least 2014, and in particular the Marawi attack in the Philippines have put new stress on regional governments to effectively address the growing security challenge. Law-enforcement agencies and their special operations units, the principal anti-terrorism actors in most countries in Southeast Asia, suffer from lack of capacity and resources— manpower and finances—as well as often rampant corruption and low levels of public trust to deal with the bigger threat.1 These actual or perceived challenges have rekindled strong voices for greater military involvement in counter-terrorism in Southeast Asia, especially the Philippines and Indonesia.
    [Show full text]
  • Banlaoi Paper Addressing Maritime Security Threats In
    Draft for Conference Purposes Only ADDRESSING CURRRENT AND EVOLVING MARITIME SECURITY THREATS IN TRI-BORDER SOUTHEAST ASIA: FROM MARITIME DOMAIN AWARENESS TO CAPACITY BUILDING Rommel C. Banlaoi Presented at the international conference, “Maritime Security in Southeast Asia: Maritime Domain Awareness” co-organized by the Pacific Forum CSIS and the National Defense College of the Philippines (NDCP) held at the Diamond Hotel, Manila, Philippines on 29-31 January 2012 In this presentation, I will briefly describe the current and evolving threats of piracy, terrorism and other organized crimes activities in the tri-border sea area of Southeast Asia. I will also describe the extent of our awareness of these threats and explain why capacity building is essential to address these current and evolving threats. The tri-border sea area of Southeast Asia covering the Philippines, Malaysia and Indonesia has been described as a “danger zone” because of many illicit maritime activities in the form of smuggling and trafficking (arms, drugs, and people) as well as acts of terrorism, piracy and armed robberies against ships.1 Like the tri-border area of South America, the tri-border area of the Philippines, Malaysia and Indonesia is considered to be a “criminal haven”.2 Unfortunately, it is utterly difficult to get accurate data on these illicit maritime activities because some incidents are not detected or even reported. If incidents are detected, there is a perennial problem of under-reporting. Thus, there is a tendency for these three littoral states to rely on usual general estimates provided by organizations like the International Organization for Migration (IOM) for human trafficking and smuggling; the United Nations Office on Drugs and Crime (UNODC) for drug trafficking and smuggling; and, the International Action Network on Small Arms (IANSA) for trafficking and smuggling of small arms and light weapons.
    [Show full text]
  • Travelling Law
    Draft: cite only with authors permission Craig Jones1 Department of Geography, University of British Columbia, Vancouver. Travelling Law Targeted Killing, Lawfare and the Deconstruction of the Battlefield Striking Origins Above the Palestinian village of Beit Sahour on the morning of November 9th 2000 an Israeli Air Force (IAF) helicopter could be heard. Then, an explosion. The Jeep of Hussein Abiyat went up in flames, and with it the senior member of Fatah. The anti-tank missile killed Abiyat and two innocent elderly women. Collateral damage. Later that day, two months after the outbreak of the second Intifada, the Israeli military publically assumed responsibility for the strike: “During an operation initiated by the IDF, in the area of the village of Beit Sahour, missiles were launched from Air Force helicopters towards the vehicle of a senior activist of the Fatah Tanzim. The pilots reported the target was accurately hit. The activist was killed and his deputy, who was with him, was injured."1 The announcement marked the beginning of Israel’s official assassination policy. The justification and legal contention was that Israel had entered what IDF lawyers called “an armed conflict short of war”2 and Israel was thus entitled to target and kill enemy individuals as permitted by the rules of war. Though it might now seem difficult to believe, the European Union and the U.S. condemned the attacks and rejected the Israeli legal justification. British Foreign Secretary Jack Straw claimed that the assassinations were "unlawful, unjustified and self-defeating"3. The E.U. said the policy amounted to "extrajudicial killings", while U.S.
    [Show full text]
  • “A Licenced Troubleshooter” James Bond As Assassin
    “A Licenced Troubleshooter” James Bond as Assassin ROGER PAULY If a pollster were to ask the average person on the street “What does James Bond do?” the response would almost certainly be that he is a spy. his is the most ba! sic defnition of the dashing British literary and "lm hero. But is it accurate? #o Bond$s activities represent spying or something else? %ecent studies have borne fruit by looking at the character of Bond outside of the basic parameters of the “spy” persona. &or example, )atharina *agen +,-./0 analysed Bond as a pirate; while #avid 2egram +,-./0 viewed him through the lens of an extreme athlete. 3f particular interest to this essay is Mathew edesco$s observation5 “6t7here$s no getting around it 8 James Bond is an assassin” +,--9( .,-0. edesco does not e'! plore this point in depth however( since his study is primarily devoted to the moral ethics of killing and torture. &urthermore, his characterisation of James Bond as an assassin is a decided anomaly in Bond scholarship and the spy classi! "cation remains predominant. &or example, Liisa &unnell and )laus #odds refer to Bond as a “British super spy” in a recent work +,-.;( ,.<0. his article will de! velop more fully edesco$s brief identi"cation by directly exploring the historical roots of Bond as an assassin. argeting key individuals for murder is an ancient and well-established el! ement of political and military history( and the Second World War was no e'cep! tion. In his capacity as an intelligence ofcer( Ian &leming had knowledge of ?l! Roger Pauly is /n Asso0i/*e Pro1essor o1 2is*or3 /* *he Uni5ersi*3 o1 ,en*r/l Ar6/ns/s% 2e is mos*ly 6nown 1or his 7or6 on *he his*or3 o1 1ire/rms bu* 4/s /lso wri**en on su('ec*s /s di5erse /s 8/r0us G/r5e39 8/u 8/u9 /n+ Mi- ami Vice% Volume 4 · Issue 1 · Spring 2021 ISSN 2514 21!" DOI$ 10%24"!!&'bs%)" Dis*ribu*ed under ,, -Y 4%0 U.
    [Show full text]
  • Operation Pacific Eagle–Philippines Lead Inspector General Report to the United States Congress
    OPERATION PACIFIC EAGLE–PHILIPPINES LEAD INSPECTOR GENERAL REPORT TO THE UNITED STATES CONGRESS JULY 1, 2020–SEPTEMBER 30, 2020 ABOUT THIS REPORT A 2013 amendment to the Inspector General Act established the Lead Inspector General (Lead IG) framework for oversight of overseas contingency operations and requires that the Lead IG submit quarterly reports to Congress on each active operation. The Chair of the Council of Inspectors General for Integrity and Efficiency designated the DoD Inspector General (IG) as the Lead IG for Operation Pacific Eagle–Philippines (OPE-P). The DoS IG is the Associate IG for the operation. The USAID IG participates in oversight of the operation. The Offices of Inspector General (OIG) of the DoD, the DoS, and USAID are referred to in this report as the Lead IG agencies. Other partner agencies also contribute to oversight of OPE-P. The Lead IG agencies collectively carry out the Lead IG statutory responsibilities to: • Develop a joint strategic plan to conduct comprehensive oversight of the operation. • Ensure independent and effective oversight of programs and operations of the U.S. Government in support of the operation through either joint or individual audits, inspections, investigations, and evaluations. • Report quarterly to Congress and the public on the operation and on activities of the Lead IG agencies. METHODOLOGY To produce this quarterly report, the Lead IG agencies submit requests for information to the DoD, the DoS, USAID, and other Federal agencies about OPE-P and related programs. The Lead IG agencies also gather data and information from other sources, including official documents, congressional testimony, policy research organizations, press conferences, think tanks, and media reports.
    [Show full text]
  • Foreign Military Interventions and Suicide Attacks
    Article Journal of Conflict Resolution 2017, Vol. 61(2) 271-297 ª The Author(s) 2015 Foreign Military Reprints and permission: sagepub.com/journalsPermissions.nav DOI: 10.1177/0022002715576575 Interventions journals.sagepub.com/home/jcr and Suicide Attacks Seung-Whan Choi1, and James A. Piazza2 Abstract This study examines the effect of foreign military interventions on the incidence of suicide attacks. It presents three theoretical explanations. Foreign military inter- ventions may boost insurgent use of suicide attacks by (a) fomenting a nationalist backlash that sanctions the use of more extreme and unconventional tactics like suicide attacks, (b) providing more and better targets against which suicide attacks can be launched, or (c) prompting insurgents to use suicide tactics in order to overcome their power asymmetries and to confront better defended targets that are enhanced by interventions. We test these competing explanations using a bat- tery of statistical tests on cross-national, time-series data for 138 countries during the period from 1981 to 2005. We find that only foreign interventions with specific features—pro-government interventions involving larger numbers of ground troops—boost suicide attacks in countries experiencing interventions. This finding suggests that by tipping the balance of power against insurgents and hardening targets in the context of assisting a local government, foreign military interventions are likely to increase the use of suicide attacks by regime challengers. Keywords terrorism, suicide bombings, military intervention, international security 1Department of Political Science (MC 276), University of Illinois at Chicago, Chicago, IL, USA 2Department of Political Science, Pennsylvania State University, University Park, PA, USA Corresponding Author: James A.
    [Show full text]
  • March 2020 MLM
    VOLUME XI, ISSUE 3, MARCH 2020 THE JAMESTOWN FOUNDATION The Past as Escape from The GNA’s Latest Defection: A Precedent: Is Pakistan: TTP Profile of the AQAP’s New the Taliban’s Spokesperson Tripoli Emir: Who is Military Chief Militiaman- Ehsan ullah Khalid Batarfi? Sirajuddin Turned-Diplomat BRIEF Ehsan Fled Mohamed Shaeban Haqqani Ready from Custody ‘al-Mirdas’ for Peace? LUDOVICO SUDHA JOHN FOULKES FARHAN ZAHID DARIO CRISTIANI CARLINO RAMACHANDRAN VOLUME XI, ISSUE 3 | MARCH 2020 Bashir Qorgab—al-Shabaab Veteran al-Shabaab (Radio Muqdisho, March 7; Commander Killed in U.S. Airstrike Jerusalem Post, March 8). John Foulkes Qorgab was born sometime between 1979 and 1982, and was a senior al-Shabaab leader for On February 22, an airstrike carried out by U.S. over a decade, having been one of ten members Africa Command killed a senior al-Shabaab of al-Shabaab’s executive council, as of 2008. leader, Bashir Mohamed Mahamoud (a.k.a. On April 13, 2010, the United States placed Bashir Qorgab) (Radio Muqdisho, March 7). As Qorgab on the list of specially designated global a senior operational commander in the Somali terrorists. The U.S. State Department’s Reward militant group, Qorgab is believed to have been for Justice program offered $5 million for involved in the planning of the attack on the information that led to his arrest in June 2012, military base Camp Simba and its Manda Bay pointing to the fact that he led a mortar attack airstrip used by U.S. and Kenyan forces. The against the then-Transitional Federal attack killed one U.S.
    [Show full text]