The Jihadi Industry: Assessing the Organizational, Leadership And

Total Page:16

File Type:pdf, Size:1020Kb

The Jihadi Industry: Assessing the Organizational, Leadership And The Jihadi Industry: Assessing the Organizational, Leadership, and Cyber Profiles Report to the Office of University Programs, Science and Technology Directorate, U.S. Department of Homeland Security July 2017 National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence Led by the University of Maryland 8400 Baltimore Ave., Suite 250 • College Park, MD 20742 • 301.405.6600 www.start.umd.edu National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence About This Report The authors of this report are Gina Ligon, Michael Logan, Margeret Hall, Douglas C. Derrick, Julia Fuller, and Sam Church at the University of Nebraska, Omaha. Questions about this report should be directed to Dr. Gina Ligon at [email protected]. This report is part of the National Consortium for the Study of Terrorism and Responses to Terrorism (START) project, “The Jihadi Industry: Assessing the Organizational, Leadership, and Cyber Profiles” led by Principal Investigator Gina Ligon. This research was supported by the Department of Homeland Security Science and Technology Directorate’s Office of University Programs through Award Number #2012-ST-061-CS0001, Center for the Study of Terrorism and Behavior (CSTAB 1.12) made to START to investigate the role of social, behavioral, cultural, and economic factors on radicalization and violent extremism. The views and conclusions contained in this document are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied, of the U.S. Department of Homeland Security or START. About START The National Consortium for the Study of Terrorism and Responses to Terrorism (START) is supported in part by the Science and Technology Directorate of the U.S. Department of Homeland Security through a Center of Excellence program led by the University of Maryland. START uses state‐of‐the‐art theories, methods and data from the social and behavioral sciences to improve understanding of the origins, dynamics and social and psychological impacts of terrorism. For more information, contact START at [email protected] or visit www.start.umd.edu. Citations To cite this report, please use this format: Ligon, G.S., Logan, M.K., Hall, M., Derrick, D.C., Fuller, J., & Church, S. (2017). “The Jihadi Industry: Assessing the Organizational, Leadership, and Cyber Profiles,” Final report prepared for the Department of Homeland Science and Technology Directorate’s Office of University Programs. College Park, MD: START, 2017. The Jihadi Industry: Assessing the Organizational, Leadership, and Cyber Profiles National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence Contents Executive Summary .......................................................................................................................................................................... 1 Contributions ................................................................................................................................................................................. 2 Recommendations for Policy ................................................................................................................................................... 2 Introduction ........................................................................................................................................................................................ 3 Methodology........................................................................................................................................................................................ 4 Overview .......................................................................................................................................................................................... 4 Sample Definition ......................................................................................................................................................................... 4 Data Gathering ............................................................................................................................................................................... 5 Coding and Analysis..................................................................................................................................................................... 6 Coder Training ............................................................................................................................................................................... 6 Analyses ........................................................................................................................................................................................... 6 Research Objective One: Assessment of the Organization and Leadership Profiles ............................................... 7 Da’esh ................................................................................................................................................................................................ 7 Overview ..................................................................................................................................................................................... 7 Organizational Structure ...................................................................................................................................................... 7 Two Organizational Nodes of Vulnerability .................................................................................................................. 8 Leadership .................................................................................................................................................................................. 9 Recruitment and Fundraising ........................................................................................................................................... 11 Attack Profile ........................................................................................................................................................................... 11 Al-Qa’ida in the Islamic Maghreb ......................................................................................................................................... 12 Overview ................................................................................................................................................................................... 12 Organizational Structure .................................................................................................................................................... 12 Leadership ................................................................................................................................................................................ 13 Recruitment and Fundraising ........................................................................................................................................... 13 Attack Profile ........................................................................................................................................................................... 14 Afghan Taliban ............................................................................................................................................................................. 14 Overview ................................................................................................................................................................................... 14 Organizational Structure and Leadership .................................................................................................................... 14 Recruitment and Fundraising ........................................................................................................................................... 15 Attack Profile ........................................................................................................................................................................... 16 Lashkar-e-Taiba .......................................................................................................................................................................... 16 The Jihadi Industry: Assessing the Organizational, Leadership, and Cyber Profiles National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence Overview ................................................................................................................................................................................... 16 Organizational Structure and Leadership .................................................................................................................... 16 Recruitment and Fundraising ........................................................................................................................................... 17 Attack Profile ..........................................................................................................................................................................
Recommended publications
  • The Limits of Punishment Transitional Justice and Violent Extremism
    i n s t i t u t e f o r i n t e g r at e d t r a n s i t i o n s The Limits of Punishment Transitional Justice and Violent Extremism May, 2018 United Nations University – Centre for Policy Research The UNU Centre for Policy Research (UNU-CPR) is a UN-focused think tank based at UNU Centre in Tokyo. UNU-CPR’s mission is to generate policy research that informs major UN policy processes in the fields of peace and security, humanitarian affairs, and global development. i n s t i t u t e f o r i n t e g r at e d t r a n s i t i o n s Institute for Integrated Transitions IFIT’s aim is to help fragile and conflict-affected states achieve more sustainable transitions out of war or authoritarianism by serving as an independent expert resource for locally-led efforts to improve political, economic, social and security conditions. IFIT seeks to transform current practice away from fragmented interventions and toward more integrated solutions that strengthen peace, democracy and human rights in countries attempting to break cycles of conflict or repression. Cover image nigeria. 2017. Maiduguri. After being screened for association with Boko Haram and held in military custody, this child was released into a transit center and the care of the government and Unicef. © Paolo Pellegrin/Magnum Photos. This material has been supported by UK aid from the UK government; the views expressed are those of the authors.
    [Show full text]
  • Summary from the Jihadi Forums
    ICT Jihadi Monitoring Group PERIODIC REVIEW Bimonthly Report Summary of Information on Jihadist Websites The Second Half of July 2015 International Institute for Counter Terrorism (ICT) Additional resources are available on the ICT Website: www.ict.org.il This report summarizes notable events discussed on jihadist Web forums during the second half of July 2015. Following are the main points covered in the report: The Islamic Emirate of Afghanistan (Taliban in Afghanistan) officially announces the death of Mullah Omar, the leader of the Emirate, from an illness. Following his death, many jihadist leaders and organization eulogize him. In addition, the Emirate announces the appointment of his deputy, Mullah Akhtar Mohammad Mansoor, as the new leader of the Emirate. Islamic State fighters from Turkestan call on Muslim residents of Turkestan to emigrate from their homeland and join the Islamic Caliphate under the leadership of Sheikh Abu Bakr al- Baghdadi. The organization also calls on Turkestani Al-Nusra Front fighters in Syria to defect and join the Islamic State. Sheikh Abu ‘Ubatdha Ahmad ‘Umar, the leader of Al-Shabab Al-Mujahideen, releases his first message since being appointed to the role, regarding his organization’s resolve in the fight against the Crusader conspiracy to weaken Islam and to steal the natural treasures of Muslim lands. In light of this, he calls on tribes in Somalia to help wage jihad against the enemies of Islam and he calls on Muslims in Kenya to join jihad as well. According to him, his organization is ready and willing to absorb into its ranks Muslims from East Africa, including Ethiopia, Djibouti, Uganda and Central Africa, due to their persecution at the hands of the local regimes.
    [Show full text]
  • Al Shabaab's American Recruits
    Al Shabaab’s American Recruits Updated: February, 2015 A wave of Americans traveling to Somalia to fight with Al Shabaab, an Al Qaeda-linked terrorist group, was described by the FBI as one of the "highest priorities in anti-terrorism." Americans began traveling to Somalia to join Al Shabaab in 2007, around the time the group stepped up its insurgency against Somalia's transitional government and its Ethiopian supporters, who have since withdrawn. At least 50 U.S. citizens and permanent residents are believed to have joined or attempted to join or aid the group since that time. The number of Americans joining Al Shabaab began to decline in 2012, and by 2014, the Islamic State of Iraq and Syria (ISIS) replaced Al Shabaab as the terrorist group of choice for U.S. recruits. However, there continue to be new cases of Americans attempting to join or aid Al Shabaab. These Americans have received weapons training alongside recruits from other countries, including Britain, Australia, Sweden and Canada, and have used the training to fight against Ethiopian forces, African Union troops and the internationally-supported Transitional Federal Government in Somalia, according to court documents. Most of the American men training with Al Shabaab are believed to have been radicalized in the U.S., especially in Minneapolis, according to U.S. officials. The FBI alleges that these young men have been recruited by Al Shabaab both on the Internet and in person. One such recruit from Minneapolis, 22-year-old Abidsalan Hussein Ali, was one of two suicide bombers who attacked African Union troops on October 29, 2011.
    [Show full text]
  • BOKO HARAM Emerging Threat to the U.S
    112TH CONGRESS COMMITTEE " COMMITTEE PRINT ! 1st Session PRINT 112–B BOKO HARAM Emerging Threat to the U.S. Homeland SUBCOMMITTEE ON COUNTERTERRORISM AND INTELLIGENCE COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES December 2011 FIRST SESSION U.S. GOVERNMENT PRINTING OFFICE 71–725 PDF WASHINGTON : 2011 COMMITTEE ON HOMELAND SECURITY PETER T. KING, New York, Chairman LAMAR SMITH, Texas BENNIE G. THOMPSON, Mississippi DANIEL E. LUNGREN, California LORETTA SANCHEZ, California MIKE ROGERS, Alabama SHEILA JACKSON LEE, Texas MICHAEL T. MCCAUL, Texas HENRY CUELLAR, Texas GUS M. BILIRAKIS, Florida YVETTE D. CLARKE, New York PAUL C. BROUN, Georgia LAURA RICHARDSON, California CANDICE S. MILLER, Michigan DANNY K. DAVIS, Illinois TIM WALBERG, Michigan BRIAN HIGGINS, New York CHIP CRAVAACK, Minnesota JACKIE SPEIER, California JOE WALSH, Illinois CEDRIC L. RICHMOND, Louisiana PATRICK MEEHAN, Pennsylvania HANSEN CLARKE, Michigan BEN QUAYLE, Arizona WILLIAM R. KEATING, Massachusetts SCOTT RIGELL, Virginia KATHLEEN C. HOCHUL, New York BILLY LONG, Missouri VACANCY JEFF DUNCAN, South Carolina TOM MARINO, Pennsylvania BLAKE FARENTHOLD, Texas MO BROOKS, Alabama MICHAEL J. RUSSELL, Staff Director & Chief Counsel KERRY ANN WATKINS, Senior Policy Director MICHAEL S. TWINCHEK, Chief Clerk I. LANIER AVANT, Minority Staff Director (II) C O N T E N T S BOKO HARAM EMERGING THREAT TO THE U.S. HOMELAND I. Introduction .......................................................................................................... 1 II. Findings ..............................................................................................................
    [Show full text]
  • Policy Notes for the Trump Notes Administration the Washington Institute for Near East Policy ■ 2018 ■ Pn55
    TRANSITION 2017 POLICYPOLICY NOTES FOR THE TRUMP NOTES ADMINISTRATION THE WASHINGTON INSTITUTE FOR NEAR EAST POLICY ■ 2018 ■ PN55 TUNISIAN FOREIGN FIGHTERS IN IRAQ AND SYRIA AARON Y. ZELIN Tunisia should really open its embassy in Raqqa, not Damascus. That’s where its people are. —ABU KHALED, AN ISLAMIC STATE SPY1 THE PAST FEW YEARS have seen rising interest in foreign fighting as a general phenomenon and in fighters joining jihadist groups in particular. Tunisians figure disproportionately among the foreign jihadist cohort, yet their ubiquity is somewhat confounding. Why Tunisians? This study aims to bring clarity to this question by examining Tunisia’s foreign fighter networks mobilized to Syria and Iraq since 2011, when insurgencies shook those two countries amid the broader Arab Spring uprisings. ©2018 THE WASHINGTON INSTITUTE FOR NEAR EAST POLICY. ALL RIGHTS RESERVED. THE WASHINGTON INSTITUTE FOR NEAR EAST POLICY ■ NO. 30 ■ JANUARY 2017 AARON Y. ZELIN Along with seeking to determine what motivated Evolution of Tunisian Participation these individuals, it endeavors to reconcile estimated in the Iraq Jihad numbers of Tunisians who actually traveled, who were killed in theater, and who returned home. The find- Although the involvement of Tunisians in foreign jihad ings are based on a wide range of sources in multiple campaigns predates the 2003 Iraq war, that conflict languages as well as data sets created by the author inspired a new generation of recruits whose effects since 2011. Another way of framing the discussion will lasted into the aftermath of the Tunisian revolution. center on Tunisians who participated in the jihad fol- These individuals fought in groups such as Abu Musab lowing the 2003 U.S.
    [Show full text]
  • A Respite to from Fatwas
    C. M. Naim A Respite to and from Fatwas, please. A messenger brought me some news. It began: Darul Uloom Deoband, the self-appointed guardian for Indian Muslims, in a Talibanesque fatwa that reeked of tribal patriarchy, has decreed that it is “haram” and illegal according to the Sharia for a family to accept a woman's earnings. Clerics at the largest Sunni Muslim seminary after Cairo's Al-Azhar said the decree flowed from the fact that the Sharia prohibited proximity of men and women in the workplace. “It is unlawful (under the Sharia law) for Muslim women to work in the government or private sector where men and women work together and women have to talk with men frankly and without a veil,” said the fatwa issued by a bench of three clerics. The decree was issued over the weekend, but became public late on Monday, seminary sources said.1 One should not shoot the messenger if one does not like the message. True. But, allow me at least to discover what was being “messaged.” Strictly speaking, it was the following exchange on the website of the Darul Ifta (‘fatwa office’) of the Deoband seminary. (http://darulifta-deoband.org/. No changes in language and punctuation have been made in all the quotations below.) From the section on women’s issues. [1] Question: 21031, India. “Asalamu-Alikum: Can muslim women in india do Govt. or Pvt. Jobs? Shall their salary be Halal or Haram or Prohibited?” [2] Answer: 21031. 04 Apr, 2010 (Fatwa: 577/381/L=1431). “It is unlawful for Muslim women to do job in government or private institutions where men and women work together and women have to talk with men frankly and without veil.
    [Show full text]
  • Breaking Boko Haram and Ramping up Recovery: US-Lake Chad Region 2013-2016
    From Pariah to Partner: The US Integrated Reform Mission in Burma, 2009 to 2015 Breaking Boko Haram and Ramping Up Recovery Making Peace Possible US Engagement in the Lake Chad Region 2301 Constitution Avenue NW 2013 to 2016 Washington, DC 20037 202.457.1700 Beth Ellen Cole, Alexa Courtney, www.USIP.org Making Peace Possible Erica Kaster, and Noah Sheinbaum @usip 2 Looking for Justice ACKNOWLEDGMENTS This case study is the product of an extensive nine- month study that included a detailed literature review, stakeholder consultations in and outside of government, workshops, and a senior validation session. The project team is humbled by the commitment and sacrifices made by the men and women who serve the United States and its interests at home and abroad in some of the most challenging environments imaginable, furthering the national security objectives discussed herein. This project owes a significant debt of gratitude to all those who contributed to the case study process by recommending literature, participating in workshops, sharing reflections in interviews, and offering feedback on drafts of this docu- ment. The stories and lessons described in this document are dedicated to them. Thank you to the leadership of the United States Institute of Peace (USIP) and its Center for Applied Conflict Transformation for supporting this study. Special thanks also to the US Agency for International Development (USAID) Office of Transition Initiatives (USAID/OTI) for assisting with the production of various maps and graphics within this report. Any errors or omis- sions are the responsibility of the authors alone. ABOUT THE AUTHORS This case study was produced by a team led by Beth ABOUT THE INSTITUTE Ellen Cole, special adviser for violent extremism, conflict, and fragility at USIP, with Alexa Courtney, Erica Kaster, The United States Institute of Peace is an independent, nonpartisan and Noah Sheinbaum of Frontier Design Group.
    [Show full text]
  • Al-Qa'ida Affiliates in Asia, the Middle East, and Africa
    NEW JERSEY OFFICE OF HOMELAND SECURITY AND PREPAREDNESS AL-QA’IDA AFFILIATES IN ASIA, THE MIDDLE EAST, AND AFRICA INFORMATION CUTOFF: JULY 13, 2017 Al-Qa’ida (AQ) Remains the head of AQ, but is competing with ISIS for leadership within the global jihadi movement and has been Al-Qa’ida Affiliate releasing propaganda to counter ISIS messaging in Syria since the declaration of its Strives to establish a caliphate in 2014. new affiliate in Syria composed of defectors from the Nusrah Front—a former al- Qa’ida affiliate. Al-Qa’ida in theArabian Peninsula (AQAP) Continues to fight the Yemeni military and the Iranian- backed Shia Huthis in Yemen and has acquired new weaponry and support from sympathetic Sunni tribes across the country. The Ansar al-Sharia branch of AQAP functions as an intermediary between local tribes and Al-Qa’ida in the Indian Subcontinent (AQIS) AQAP. Maintains ties to local extremist groups and conducts small-scale attacks, targeting secular Al-Qa’ida in the Islamic Maghreb (AQIM) activists, bloggers, and writers in Bangladesh. The group continues to expand throughout the Al-Shabaab region and recently swore its allegiance to the Afghan Taliban. Continues to target Western assets in the region and recently merged with four insurgency groups in North Africa—Ansar al-Dine, the Macina Liberation Front, al-Murabitun, and AQIM’s Sahara branch— Targets African to create Jama’at Nusrat al-Islam wal-Muslimin. This merger is an attempt to strengthen local ties and Mission in Somalia foster cooperation in the region. (AMISOM) forces, attacking government bases, as well as soft targets such as hotels and restaurants frequented by foreign diplomats and government officials.
    [Show full text]
  • Lessons from Colombia for Curtailing the Boko Haram Insurgency in Nigeria
    Lessons From Colombia For Curtailing The Boko Haram Insurgency In Nigeria BY AFEIKHENA JEROME igeria is a highly complex and ethnically diverse country, with over 400 ethnic groups. This diversity is played out in the way the country is bifurcated along the lines of reli- Ngion, language, culture, ethnicity and regional identity. The population of about 178.5 million people in 2014 is made up of Christians and Muslims in equal measures of about 50 percent each, but including many who embrace traditional religions as well. The country has continued to experience serious and violent ethno-communal conflicts since independence in 1960, including the bloody and deadly thirty month fratricidal Civil War (also known as the Nigerian-Biafran war, 1967-70) when the eastern region of Biafra declared its seces- sion and which claimed more than one million lives. The most prominent of these conflicts recently pitch Muslims against Christians in a dangerous convergence of religion, ethnicity and politics. The first and most dramatic eruption in a series of recent religious disturbances was the Maitatsine uprising in Kano in December 1980, in which about 4,177 died. While the exact number of conflicts in Nigeria is unknown, because of a lack of reliable sta- tistical data, it is estimated that about 40 percent of all conflicts have taken place since the coun- try’s return to civilian rule in 1999.1 The increasing wave of violent conflicts across Nigeria under the current democratic regime is no doubt partly a direct consequence of the activities of ethno- communal groups seeking self-determination in their “homelands,” and of their surrogate ethnic militias that have assumed prominence since the last quarter of 2000.
    [Show full text]
  • Foreign Terrorist Organizations
    Order Code RL32223 CRS Report for Congress Received through the CRS Web Foreign Terrorist Organizations February 6, 2004 Audrey Kurth Cronin Specialist in Terrorism Foreign Affairs, Defense, and Trade Division Huda Aden, Adam Frost, and Benjamin Jones Research Associates Foreign Affairs, Defense, and Trade Division Congressional Research Service ˜ The Library of Congress Foreign Terrorist Organizations Summary This report analyzes the status of many of the major foreign terrorist organizations that are a threat to the United States, placing special emphasis on issues of potential concern to Congress. The terrorist organizations included are those designated and listed by the Secretary of State as “Foreign Terrorist Organizations.” (For analysis of the operation and effectiveness of this list overall, see also The ‘FTO List’ and Congress: Sanctioning Designated Foreign Terrorist Organizations, CRS Report RL32120.) The designated terrorist groups described in this report are: Abu Nidal Organization (ANO) Abu Sayyaf Group (ASG) Al-Aqsa Martyrs Brigade Armed Islamic Group (GIA) ‘Asbat al-Ansar Aum Supreme Truth (Aum) Aum Shinrikyo, Aleph Basque Fatherland and Liberty (ETA) Communist Party of Philippines/New People’s Army (CPP/NPA) Al-Gama’a al-Islamiyya (Islamic Group, IG) HAMAS (Islamic Resistance Movement) Harakat ul-Mujahidin (HUM) Hizballah (Party of God) Islamic Movement of Uzbekistan (IMU) Jaish-e-Mohammed (JEM) Jemaah Islamiya (JI) Al-Jihad (Egyptian Islamic Jihad) Kahane Chai (Kach) Kurdistan Workers’ Party (PKK, KADEK) Lashkar-e-Tayyiba
    [Show full text]
  • Counter Terrorist Trends and Analyses
    Counter Terrorist Trends and Analyses www.rsis.edu.sg ISSN 2382-6444 | Volume 10, Issue 9 | September 2018 A JOURNAL OF THE INTERNATIONAL CENTRE FOR POLITICAL VIOLENCE AND TERRORISM RESEARCH (CTR) The Lamitan Bombing and Terrorist Threat in the Philippines Rommel C. Banlaoi Crime-Terror Nexus in Southeast Asia Bilveer Singh India and the Crime-Terrorism Nexus Ramesh Balakrishnan Crime -Terror Nexus in Pakistan Farhan Zahid Counter Terrorist Trends and Analyses Volume 9, Issue 4 | April 2017 1 Building a Global Network for Security Editorial Note Terrorist Threat in the Philippines and the Crime-Terror Nexus In light of the recent Lamitan bombing in the detailing the Siege of Marawi. The Lamitan Southern Philippines in July 2018, this issue bombing symbolises the continued ideological highlights the changing terrorist threat in the and physical threat of IS to the Philippines, Philippines. This issue then focuses, on the despite the group’s physical defeat in Marawi crime-terror nexus as a key factor facilitating in 2017. The author contends that the counter- and promoting financial sources for terrorist terrorism bodies can defeat IS only through groups, while observing case studies in accepting the group’s presence and hold in the Southeast Asia (Philippines) and South Asia southern region of the country. (India and Pakistan). The symbiotic Wrelationship and cooperation between terrorist Bilveer Singh broadly observes the nature groups and criminal organisations is critical to of the crime-terror nexus in Southeast Asia, the existence and functioning of the former, and analyses the Abu Sayyaf Group’s (ASG) despite different ideological goals and sources of finance in the Philippines.
    [Show full text]
  • Jihadism in Africa Local Causes, Regional Expansion, International Alliances
    SWP Research Paper Stiftung Wissenschaft und Politik German Institute for International and Security Affairs Guido Steinberg and Annette Weber (Eds.) Jihadism in Africa Local Causes, Regional Expansion, International Alliances RP 5 June 2015 Berlin All rights reserved. © Stiftung Wissenschaft und Politik, 2015 SWP Research Papers are peer reviewed by senior researchers and the execu- tive board of the Institute. They express exclusively the personal views of the authors. SWP Stiftung Wissenschaft und Politik German Institute for International and Security Affairs Ludwigkirchplatz 3­4 10719 Berlin Germany Phone +49 30 880 07-0 Fax +49 30 880 07-100 www.swp-berlin.org [email protected] ISSN 1863-1053 Translation by Meredith Dale (Updated English version of SWP-Studie 7/2015) Table of Contents 5 Problems and Recommendations 7 Jihadism in Africa: An Introduction Guido Steinberg and Annette Weber 13 Al-Shabaab: Youth without God Annette Weber 31 Libya: A Jihadist Growth Market Wolfram Lacher 51 Going “Glocal”: Jihadism in Algeria and Tunisia Isabelle Werenfels 69 Spreading Local Roots: AQIM and Its Offshoots in the Sahara Wolfram Lacher and Guido Steinberg 85 Boko Haram: Threat to Nigeria and Its Northern Neighbours Moritz Hütte, Guido Steinberg and Annette Weber 99 Conclusions and Recommendations Guido Steinberg and Annette Weber 103 Appendix 103 Abbreviations 104 The Authors Problems and Recommendations Jihadism in Africa: Local Causes, Regional Expansion, International Alliances The transnational terrorism of the twenty-first century feeds on local and regional conflicts, without which most terrorist groups would never have appeared in the first place. That is the case in Afghanistan and Pakistan, Syria and Iraq, as well as in North and West Africa and the Horn of Africa.
    [Show full text]