An Exploration of the EU's Counterterrorism Measures And

Total Page:16

File Type:pdf, Size:1020Kb

An Exploration of the EU's Counterterrorism Measures And An Exploration of the EU’s Counterterrorism Measures: Can the EU Learn from its Member States? A Case Study Examining Italy By Lana Perić A thesis submitted to the Faculty of Graduate and Postdoctoral Affairs in partial fulfillment of the requirements for the degree of Master of Arts in European, Russian, and Eurasian Studies Carleton University Ottawa, Ontario © 2018 Lana Perić Perić 2017 2 TABLE OF CONTENTS Table of Contents .......................................................................................................................... 2 List of Figures ................................................................................................................................ 4 List of Abbreviations .................................................................................................................... 5 Abstract .......................................................................................................................................... 7 Chapter I: Introduction ................................................................................................................ 8 A. Introduction to the Research Issue and the Research Question .................................................... 8 B. Research Outline .............................................................................................................................. 16 c. Scope of the Project .......................................................................................................................... 17 (i) Time Period: .................................................................................................................................. 18 (ii). Geographic Scope: Applying Italy as a Case Study .................................................................... 19 D. Conclusion ........................................................................................................................................ 20 Chapter II: Methodology ........................................................................................................... 23 A. Theoretical Frameworks ................................................................................................................. 23 Policy Harmonization ......................................................................................................................... 24 Deterrence Theory and Reintegrative Shaming Theory: Crossing International Relations with Criminology ....................................................................................................................................... 25 B. Methodology: Single Case Study .................................................................................................... 28 C. Methodology: Policy Analysis ......................................................................................................... 30 D. Application of Quantitative Data ................................................................................................... 35 Chapter III: Literature Review ................................................................................................. 36 A. The Emergence of Terrorist Groups .............................................................................................. 38 Motivations ........................................................................................................................................ 39 Objectives ........................................................................................................................................... 43 Organizational and Bureaucratic Characteristics ............................................................................... 45 B. “How Terrorist Groups End” ......................................................................................................... 47 C. Evaluation of the Effectiveness of Counterterrorism Policies and Strategies ............................ 50 Chapter IV: The EU and Counterterrorism ............................................................................ 55 A. Issue ................................................................................................................................................... 55 B. Background on Terrorism and Jihadist Extremism in Western Europe/the EU....................... 57 First Wave: Anarchist Terrorism ........................................................................................................ 59 Second and Third Waves: Anti-Colonialist and New Left Terrorism ................................................ 61 Fourth Wave: Religious Wave and the Spread of Jihadist Extremists in Europe .............................. 64 C. Europeanization: A Single European Intelligence Agency .......................................................... 74 Internal security: Partial Intelligence Sharing within the EU? ........................................................... 76 Background on Intelligence Cooperation in the EU........................................................................... 77 Europeanization of Intelligence in the Future .................................................................................... 80 D. Policy Analysis: Findings and Discussion ...................................................................................... 83 EU Counterterrorism Strategy (2005) ................................................................................................ 83 General Trends Derived from the Policy Analysis of the EU’s Counterterrorism Measures Introduced Between 2001 and 2016 ................................................................................................... 91 E. Conclusions ..................................................................................................................................... 103 Perić 2017 3 Chapter V: Italy’s Counterterrorism Measures .................................................................... 105 A. Issue ................................................................................................................................................. 105 B. Background on Terrorism and Jihadist Extremism in Italy ..................................................... 105 The Years of Lead: Political terrorism in Italy from 1969-1989 ...................................................... 106 Italy’s Complicated Relationship with its Muslim Community ....................................................... 110 Jihadist Extremists in Italy ............................................................................................................... 113 C. General Overview of Qualitative Analysis of Italy’s Counterterrorism Measures (2001-2016) .............................................................................................................................................................. 117 General trends and an overview of the policy analysis .................................................................... 119 D. Findings and Discussion ................................................................................................................ 127 Options for Those Convicted of Terrorism Offences – Deportation or Collaboration .................... 127 Merging Anti-Mafia Measures with Anti-Terrorism: Preventative and Deterrent Measures .......... 134 Holistic Deterrent Approaches: Collaboration, Reintegration, and Prison Reforms ........................ 138 E. Conclusions ..................................................................................................................................... 144 Chapter VI: Conclusion ........................................................................................................... 148 Limitations .......................................................................................................................................... 153 Bibliography .............................................................................................................................. 158 Annex A: List of Measures Examined .................................................................................... 175 EU Measures ....................................................................................................................................... 175 Italian Measures ................................................................................................................................. 188 Annex B: Pillars of the EU Counterterrorism Strategy 2005 ............................................... 198 Annex C: Council Framework Decision 2002/475/JHA On Combatting Terrorism ......... 199 Perić 2017 4 LIST OF FIGURES Figure 4.1 Total Attacks in the EU between 1970 and 2000 72 Figure 4.2 Total Attacks in the EU between 2001 and 2015 73 Figure 4.3 EU Counterterrorism Competencies 75 Figure 4.4 Pillars of the EU Counterterrorism Strategy (2005) 84 Figure 4.5 Number of Counterterrorism Measures Passed by EU Institutions between 92 2001 and 2016 Figure 4.6 Total Number of Terrorist Attacks in the EU between 2001 and 2015 92 Figure 4.7 Total Number of Successful Terrorist Attacks in the EU between 2001 and 93 2015 Figure 4.8 Evaluated Counterterrorism Measures Categorized Under the EU 96 Counterterrorism Strategy’s Pillars Figure 4.9 Themes of the EU’s Counterterrorism Measures 102 Figure 5.1 Counterterrorism Strategy Pillars applicable to Italian counterterrorism 119 measures Figure 5.2 Application of the EU definition
Recommended publications
  • Teritoriální Uspořádání Policejních Složek V Zemích Evropské Unie: Inspirace Nejen Pro Českou Republiku II – Belgie, Dánsko, Finsko, Francie, Irsko, Itálie1 Mgr
    Teritoriální uspořádání policejních složek v zemích Evropské unie: Inspirace nejen pro Českou republiku II – Belgie, Dánsko, Finsko, Francie, Irsko, Itálie1 Mgr. Oldřich Krulík, Ph.D. Abstrakt Po teoretickém „úvodním díle“ se ke čtenářům dostává pokračování volného seriálu o teritoriálním uspořádání policejních sborů ve členských státech Evropské unie. Kryjí nebo nekryjí se „policejní“ (případně i „hasičské“, justiční či dokonce „zpravodajské“) regiony s regiony, vytýčenými v rámci státní správy a samosprávy? Je soulad těchto územních prvků možné považovat za výjimku nebo za pravidlo? Jsou členské státy Unie zmítány neustálými reformami horizontálního uspořádání policejních složek, nebo si tyto systémy udržují dlouhodobou stabilitu? Text se nejprve věnuje „starým členským zemím“ Unie, a to pěkně podle abecedy. Řeč tedy bude o Belgii, Dánsku, Finsku, Francii, Irsku a Itálii. Klíčová slova Policejní síly, územní správa, územní reforma, administrativní mezičlánky Summary After the theoretical “introduction” can the readers to continue with the series describing the territorial organisation of the police force in the Member States of the European Union. Does the “police” regions coincide or not-coincide with the regions outlined in the state administration and local governments? Can the compliance of these local elements to be considered as an exception or the rule? Are the European Union Member States tossed about by constant reforms of the horizontal arrangement of police, or these systems maintain long-term stability? The text deals firstly
    [Show full text]
  • Policy Notes for the Trump Notes Administration the Washington Institute for Near East Policy ■ 2018 ■ Pn55
    TRANSITION 2017 POLICYPOLICY NOTES FOR THE TRUMP NOTES ADMINISTRATION THE WASHINGTON INSTITUTE FOR NEAR EAST POLICY ■ 2018 ■ PN55 TUNISIAN FOREIGN FIGHTERS IN IRAQ AND SYRIA AARON Y. ZELIN Tunisia should really open its embassy in Raqqa, not Damascus. That’s where its people are. —ABU KHALED, AN ISLAMIC STATE SPY1 THE PAST FEW YEARS have seen rising interest in foreign fighting as a general phenomenon and in fighters joining jihadist groups in particular. Tunisians figure disproportionately among the foreign jihadist cohort, yet their ubiquity is somewhat confounding. Why Tunisians? This study aims to bring clarity to this question by examining Tunisia’s foreign fighter networks mobilized to Syria and Iraq since 2011, when insurgencies shook those two countries amid the broader Arab Spring uprisings. ©2018 THE WASHINGTON INSTITUTE FOR NEAR EAST POLICY. ALL RIGHTS RESERVED. THE WASHINGTON INSTITUTE FOR NEAR EAST POLICY ■ NO. 30 ■ JANUARY 2017 AARON Y. ZELIN Along with seeking to determine what motivated Evolution of Tunisian Participation these individuals, it endeavors to reconcile estimated in the Iraq Jihad numbers of Tunisians who actually traveled, who were killed in theater, and who returned home. The find- Although the involvement of Tunisians in foreign jihad ings are based on a wide range of sources in multiple campaigns predates the 2003 Iraq war, that conflict languages as well as data sets created by the author inspired a new generation of recruits whose effects since 2011. Another way of framing the discussion will lasted into the aftermath of the Tunisian revolution. center on Tunisians who participated in the jihad fol- These individuals fought in groups such as Abu Musab lowing the 2003 U.S.
    [Show full text]
  • PERSPECTIVES on TERRORISM Volume 11, Issue 5
    ISSN 2334-3745 Volume V, Issue 5 October 2017 PERSPECTIVES ON TERRORISM Volume 11, Issue 5 Table of Contents Welcome from the Editors......................................................................................................1 Articles Countering Violent Extremism in Prisons: A Review of Key Recent Research and Critical Research Gaps.........................................................................................................................2 by Andrew Silke and Tinka Veldhuis The New Crusaders: Contemporary Extreme Right Symbolism and Rhetoric..................12 by Ariel Koch Exploring the Continuum of Lethality: Militant Islamists’ Targeting Preferences in Europe....................................................................................................................................24 by Cato Hemmingby Research Notes On and Off the Radar: Tactical and Strategic Responses to Screening Known Potential Terrorist Attackers................................................................................................................41 by Thomas Quiggin Resources Terrorism Bookshelf.............................................................................................................50 Capsule Reviews by Joshua Sinai Bibliography: Terrorist Organizations: Cells, Networks, Affiliations, Splits......................67 Compiled and selected by Judith Tinnes Bibliography: Life Cycles of Terrorism..............................................................................107 Compiled and selected by Judith
    [Show full text]
  • From Criminals to Terrorists and Back?
    FROM CRIMINALS TO TERRORISTS AND BACK? KICK-OFF REPORT www.globsec.org AUTHORS Kacper Rekawek, Head of Defence and Security Programme, GLOBSEC Policy Institute Stanislav Matejka, Junior Research Fellow, Defence and Security Programme, GLOBSEC Policy Institute Martina Babikova, GLOBSEC Policy Institute Tomas Nagy, Research Fellow, Defence and Security Programme, GLOBSEC Policy Institute Jakub Rafay, GLOBSEC Policy Institute Design by Peter Verček, GLOBSEC The following distinguished partners were consulted in the process of preparation of this report. The sole responsibility for the content of this publication lies with the authors. • Austria - Daniela Pisoiu • Bulgaria - Rositsa Dzhekova, Nadya Stoynova • France - Olivier de France, Damien Saverot, Pierre Colomina • Germany - Matenia Sirseloudi • Greece - Eleni Fotou • Ireland - Orla Lynch • Italy - Marco Lombardi, Giovanni Giacalone, Nicolò Spagna • Netherlands - Jessica Sciarone, Bart Schuurman • Spain - Fernando Reinares, Carola García Calvo, Álvaro Vicente • United Kingdom - John Morrison, Aleksandra Łojek The project is funded under PMI IMPACT, a global grant initiative of Philip Morris International to support projects against illegal trade. GLOBSEC is fully independent in implementing the project and has editorial responsibility for all views and opinions expressed herein. CONTENTS PROJECT SUMMARY 6 EXECUTIVE SUMMARY 7 FROM CRIMINALS TO TERRORISTS AND BACK? 10 INTRODUCING CRIME-TERROR NEXUS 10 RESEARCHING THE CRIME-TERROR NEXUS: CHALLENGES 12 RESEARCHING THE NEXUS: WHAT IS NEXT?
    [Show full text]
  • Italian: Repubblica Italiana),[7][8][9][10] Is a Unitary Parliamentary Republic Insouthern Europe
    Italy ( i/ˈɪtəli/; Italian: Italia [iˈtaːlja]), officially the Italian Republic (Italian: Repubblica italiana),[7][8][9][10] is a unitary parliamentary republic inSouthern Europe. Italy covers an area of 301,338 km2 (116,347 sq mi) and has a largely temperate climate; due to its shape, it is often referred to in Italy as lo Stivale (the Boot).[11][12] With 61 million inhabitants, it is the 5th most populous country in Europe. Italy is a very highly developed country[13]and has the third largest economy in the Eurozone and the eighth-largest in the world.[14] Since ancient times, Etruscan, Magna Graecia and other cultures have flourished in the territory of present-day Italy, being eventually absorbed byRome, that has for centuries remained the leading political and religious centre of Western civilisation, capital of the Roman Empire and Christianity. During the Dark Ages, the Italian Peninsula faced calamitous invasions by barbarian tribes, but beginning around the 11th century, numerous Italian city-states rose to great prosperity through shipping, commerce and banking (indeed, modern capitalism has its roots in Medieval Italy).[15] Especially duringThe Renaissance, Italian culture thrived, producing scholars, artists, and polymaths such as Leonardo da Vinci, Galileo, Michelangelo and Machiavelli. Italian explorers such as Polo, Columbus, Vespucci, and Verrazzano discovered new routes to the Far East and the New World, helping to usher in the European Age of Discovery. Nevertheless, Italy would remain fragmented into many warring states for the rest of the Middle Ages, subsequently falling prey to larger European powers such as France, Spain, and later Austria.
    [Show full text]
  • Bachelor's Thesis
    Bachelor’s thesis Belgium as a victim or a culprit? A comparative analysis of framing the 2016 Brussels bombings in Flemish and Dutch newspapers A thesis presented to The Department of Communication and Information Studies, Radboud University Freya Gommans, Radboud University Nijmegen International Business Communication, Faculty of Arts Supervisors: A. Rafiee and W. Spooren 7th of June, 2019 Bachelor’s thesis, Freya Gommans Table of contents Abstract 3 Introduction 4 Theoretical framework 6 Framing 6 Framing terrorism 7 Flanders and the Netherlands 9 Present study 10 Method 12 Materials 12 Model of analysis 12 Procedure 13 Statistical treatment 14 Results 15 Quantitative analyses 15 Qualitative analyses 16 Conclusion and discussion 20 Bibliography 23 Appendices 25 Appendix A Model of Analysis, based on Semetko and Valkenburg (2000) 25 Appendix B Interrater reliability per item of the model of analysis 27 Appendix C Newspaper article: NRC Handelsblad in Dutch 29 Appendix D Newspaper article NRC Handelsblad in English 31 Appendix E Newspaper article: De Standaard in Dutch 33 Appendix F Newspaper article: De Standaard in English 36 Appendix G Statement of own work 39 2 Bachelor’s thesis, Freya Gommans Abstract In this dissertation, a cross-national analysis of framing the 22nd of March 2016 Brussels bombings in Dutch and Flemish national newspapers is presented. The purpose of the study was to investigate how Dutch and Flemish newspapers framed the bombings and explain how the differences in framing may relate to the different cultural contexts. Analyzing a corpus of 104 articles of Dutch and Flemish quality newspapers, it was found that Flemish newspapers opted for a more personal approach, bringing a human face to the issue and presenting Belgium as a victim.
    [Show full text]
  • Is Perpetrated by Fundamentalist Sunnis, Except Terrorism Against Israel
    All “Islamic Terrorism” Is Perpetrated by Fundamentalist Sunnis, Except Terrorism Against Israel By Eric Zuesse Region: Middle East & North Africa Global Research, June 10, 2017 Theme: Terrorism, US NATO War Agenda In-depth Report: IRAN: THE NEXT WAR?, IRAQ REPORT, SYRIA My examination of 54 prominent international examples of what U.S.President Donald Trump is presumably referring to when he uses his often-repeated but never defined phrase “radical Islamic terrorism” indicates that it is exclusively a phenomenon that is financed by the U.S. government’s Sunni fundamentalist royal Arab ‘allies’ and their subordinates, and not at all by Iran or its allies or any Shiites at all. Each of the perpetrators was either funded by those royals, or else inspired by the organizations, such as Al Qaeda and ISIS, that those royals fund, and which are often also armed by U.S.-made weapons that were funded by those royals. In other words: the U.S. government is allied with the perpetrators. Iran’s President Hassan Rouhani and Syrian counterpart Bashar al-Assad (Source: antiliberalnews.net) See the critique of this article by Kevin Barrett Stop the Smear Campaign (and Genocide) Against Sunni Islam!By Kevin Barrett, June 13, 2017 Though U.S. President Donald Trump blames Shias, such as the leaders of Iran and of Syria, for what he calls “radical Islamic terrorism,” and he favors sanctions etc. against them for that alleged reason, those Shia leaders and their countries are actually constantly being attacked by Islamic terrorists, and this terrorism is frequently perpetrated specifically in order to overthrow them (which the U.S.
    [Show full text]
  • I TABLE of CONTENTS Page TABLE OF
    TABLE OF CONTENTS Page TABLE OF AUTHORITIES……………………………………………………….v JURISDICTIONAL STATEMENT………………………………………………..1 ISSUES PRESENTED……………………………………………………………..2 PRELIMINARY STATEMENT…………………………………………………...4 STATEMENT OP FACTS…………………………………………………………4 PRE-TRIAL PROCEEDINGS………………………………………………6 The CIPA Motions……………………………………………………6 The Rule 15 Deposition………………………………………………6 Motions In Limine…………………………………………………….7 THE TRIAL…………………………………………………………………7 The Government’s Case………………………………………………7 Appellant as a Student at the University of Manitoba…………7 Cooperating Witnesses………………………………………..13 The FOB Chapman Incident and Forensic Evidence……….....20 The Handwritten Letters………………………………………25 Opinion Evidence……………………………………………..26 Lorenzo Vidino………………………………………...26 Evan Kohlmann………………………………………..29 i The Defense Case……………………………………………………32 Jury Deliberations and Motion for Mistrial…………………………..32 The Verdict…………………………………………………………..33 POST-TRIAL PROCEEDINGS The Presentence Report……………………………………………...33 Defense Sentencing Submission……………………………………..34 THE SENTENCING……..………………………………………………...34 SUMMARY OF ARGUMENT…………………………………………………..35 ARGUMENT POINT I: REVERSIBLE ERROR WAS COMMITTED WHEN THE LOWER COURT ADJUDICATED THE GOVERNMENT’S CIPA MOTIONS EX PARTE…………………………………………………………..36 POINT II: THE PHOTO IDENTIFICATION OF APPELLANT BY THE WITNESS SHOULD HAVE BEEN SUPPRESSED AS THE PRODUCT OF A SUGGESTIVE PROCEDURE……………………………………40 POINT III: REVERSIBLE ERROR WAS COMMITTED WHEN THE LOWER COURT ADMITTED, OVER APPELLANT’S RELEVANCE AND HEARSAY OBJECTIONS, THE OUT OF COURT STATEMENTS
    [Show full text]
  • Women with and Against the Mafia. a Case Study of Sicily SIAK-Journal − Zeitschrift Für Polizeiwissenschaft Und Polizeiliche Praxis (2), 48-59
    .SIAK-Journal – Zeitschrift für Polizeiwissenschaft und polizeiliche Praxis Martellozzo, Elena (2005): Women With and Against the Mafia. A Case Study of Sicily SIAK-Journal − Zeitschrift für Polizeiwissenschaft und polizeiliche Praxis (2), 48-59. doi: 10.7396/2005_2_D Um auf diesen Artikel als Quelle zu verweisen, verwenden Sie bitte folgende Angaben: Martellozzo, Elena (2005). Women With and Against the Mafia. A Case Study of Sicily SIAK- Journal − Zeitschrift für Polizeiwissenschaft und polizeiliche Praxis (2), 48-59, Online: http://dx.doi.org/10.7396/2005_2_D. © Bundesministerium für Inneres – Sicherheitsakademie / Verlag NWV, 2005 Hinweis: Die gedruckte Ausgabe des Artikels ist in der Print-Version des SIAK-Journals im Verlag NWV (http://nwv.at) erschienen. Online publiziert: 4/2014 AUSGABE 2/2005 .SIAK - JOURNAL A Case Study of Sicily: Elena Martellozzo Women With and Against the Mafia. The business of the Mafia is largely conspiracy of silence is particularly essen- by definition the preserve of men; men tial for Cosa Nostra's endurance it is ratio- who have displayed a remarkable talent nal to think that it should be applied mainly for cunning, cruelty, murder and may- towards women. Repentant Calderone hem. For the most part, women have support this contention and underlines, remained silent and unseen, or, as most "(…) if women know something, they will scholars would say, they have remained talk. Sooner or later they will talk (…)" "invisible". The fact that the Mafia is a (Repentant Antonino Calderone 1996, 9). secret, criminal monosex male organi- Mafia men, in their rare conversations on zation is of particular importance when women, described them as totally dedicat- starting from a viewpoint of subjectivity ed to their families.
    [Show full text]
  • New Terrorism and New Media
    research series vol 2 New Terrorism and New Media by Gabriel Weimann About the Author Gabriel Weimann is a Full Professor of Communication at the Department of Communication at Haifa University, Israel. His research interests include the study of media effects, political campaigns, new media technologies and their social impact, persuasion and influence, media and public opinion, modern terrorism and the mass media. He published eight books: Communicating Unreality (Los Angeles: Sage Publications, 2000); The Influentials: People Who Influence People (State University of New York Press, 1995); The Theater of Terror (New York: Longman, 1994); Hate on Trial (Toronto: Mosaic, 1986); The Singaporean Enigma (Jerusalem: Tzivonim, 2001); Terror on the Internet (Washington, DC: USIP Press, 2006); Freedom and Terror (London: Routledge, 2011); and Social Research in Israel (Jerusalem: Tzivonim). His papers and research reports (7 monographs and more than 160 publications), have been published in scientific journals and books. He received numerous grants and awards from international foundations and was a Visiting Professor at various universities including University of Pennsylvania, Stanford University, Hofstra University, American University DC, University of Maryland, Lehigh University (USA), University of Mainz (Germany), Carleton University (Canada) and the National University of Singapore. http://www.wilsoncenter.org/staff/gabriel-weimann. © 2014 Gabriel Weimann The report content may be reproduced in whole, or in part, for educational and non- commercial uses, pursuant to the Creative Commons Attribution-NonCommercial- ShareAlike 3.0 Unported License found at http://creativecommons.org/licenses/by-nc- sa/3.0/deed.en_US and provided this copyright notice and the following attribution is given: Weimann, Gabriel.
    [Show full text]
  • How Anwar Al-Awlaki Became the Face of Western Jihad
    As American as Apple Pie: How Anwar al-Awlaki Became the Face of Western Jihad Alexander Meleagrou-Hitchens Foreword by Lord Carlile of Berriew QC A policy report published by the International Centre for the Study of Radicalisation and Political Violence (ICSR) ABOUT ICSR The International Centre for the Study of Radicalisation and Political Violence (ICSR) is a unique partnership in which King’s College London, the University of Pennsylvania, the Interdisciplinary Center Herzliya (Israel), the Regional Center for Conflict Prevention Amman (Jordan) and Georgetown University are equal stakeholders. The aim and mission of ICSR is to bring together knowledge and leadership to counter the growth of radicalisation and political violence. For more information, please visit www.icsr.info. CONTACT DETAILS For questions, queries and additional copies of this report, please contact: ICSR King’s College London 138 –142 Strand London WC2R 1HH United Kingdom T. +44 (0)20 7848 2065 F. +44 (0)20 7848 2748 E. [email protected] Like all other ICSR publications, this report can be downloaded free of charge from the ICSR website at www.icsr.info. © ICSR 2011 AUTHOR’S NOTE This report contains many quotes from audio lectures as well as online forums and emails. All of these have been reproduced in their original syntax, including all spelling and grammatical errors. Contents Foreword 2 Letter of Support from START 3 Glossary of Terms 4 Executive Summary 6 Chapter 1 Introduction 9 Chapter 2 Methodology and Key Concepts 13 Social Movement Theory 13 Framing and
    [Show full text]
  • The Militant Pipeline Between the Afghanistan-Pakistan Border Region and the West
    New America Foundation National Security Studies Program Policy Paper The Militant Pipeline Between the Afghanistan-Pakistan Border Region and the West Paul Cruickshank Second Edition July 2011; First Edition February 2010 Of the 32 “serious” jihadist terrorist plots against the West between 2004 and 2011, 53 percent had operational or training links to established jihadist groups in Pakistan and just 6 percent to Yemen. A decade after 9/11, despite growing concerns over Yemen, entry to join the fighting in Afghanistan, the presence of al Pakistan’s Federally Administered Tribal Areas (FATA) and Qaeda, and its sustained ability to train recruits and swaths of the country’s northwest arguably remain al Qaeda persuade them to launch attacks in the West, continue to ’s main safe haven, and the area from which it can hatch its make the FATA what President Obama called in 2009 “the most dangerous plots against the West. 1 Al Qaeda’s most dangerous place in the world.” 4 presence in these areas has long threatened international security. It was in Peshawar in Pakistan’s northwest that al U.S. officials have recently suggested that when it comes to Qaeda was founded in 1988, and ever since Pakistan’s the U.S. homeland, al Qaeda’s affiliate in Yemen – al Qaeda border region with Afghanistan has been a gateway for in the Arabian Peninsula (AQAP) – could now pose a recruits joining the terrorist network and its affiliates, and greater threat than “al Qaeda Central” in the tribal areas of an area in which its senior figures have felt comfortable Pakistan.
    [Show full text]