Classifying the Methods of Middle Eastern Terrorist Recruitment

Total Page:16

File Type:pdf, Size:1020Kb

Classifying the Methods of Middle Eastern Terrorist Recruitment INEGMA Special Report No. 11 Conduits to Terror - Classifying the Methods of Middle Eastern Terrorist Recruitment Amira Choueiki, Intern, Georgia Institute of Technology Dr. Theodore Karasik, Director of R&D, INEGMA November 2010 Copyright © INEGMA 2010 Any party interested in quoting this study or reproducing it in any form or by any electronic or mechanical means (including photocopying, recording, information storage and retrieval) may do so on the condition of providing full attribution to the author and to INEGMA. Reprints are available on request. The views expressed in this Special Report are solely those of the authors and do not reflect the official views of any government. Established in 2001, the Institute for Near East & Gulf Military Analysis (INEGMA) was set up as a Middle East think-tank focusing on military and strategic affairs of the wider region. INEGMA also provides a range of specialist services to clients in government, military, and commercial companies operating in Middle East defense and security, including; Strategy and Risk Management, PR and Marketing Consultancy, and Events Organization. INEGMA is a Free Zone Limited Liability Company based in Dubai, United Arab Emirates, and Beirut, Lebanon. Institute for Near East & Gulf Military Analysis Special Report No. 11 Introduction Over the past decade, world security forces have faced a phenomenon of the “KKK-gone-global”: religious extremist organizations that not only act domestically, but around the world. Knowing that it is too difficult to defeat the United States and other world powers militarily, al-Qaeda and its supporting organizations and franchises have pledged to fight their opponents in two ways: by draining them economically and keeping them distracted, and spread thin by creating threats around the globe. Critics argue that Western powers have succumbed to these tactics, by focusing and committing resources and intelligence on a specific arena such as Iraq or Afghanistan. In doing this, they are “forgetting that al-Qaeda has always been a networked transnational movement with an existent central leadership along with affiliates and associates and assorted hangers-on scattered across multiple operational environments.”1 Backing local causes and also acquiring these activists for their own greater agenda, it is significant to note that with the Christmas Day Bomber in 2009, Al- Qaeda Arabian Peninsula (AQAP) retaliated against the U.S presence in Yemen not on local soil, but internationally. The Tehrik-e-Taliban Pakistan (TTP) claims support of the Time Square bomber, and encourages the targeting of nations with troops in Afghanistan and Pakistan.2 Today, government officials and experts in defense and terrorism are debating whether terrorist organizations in the Middle East, North Africa and Central Asian regions are growing “stronger” or “weaker.” Objectively speaking, it is extremely difficult to define the meaning of what makes a terrorist organization “strong” and “weak.” To quote the Irish Republican Army (IRA) after a failed 1984 assassination attack on then Prime Minister Margaret Thatcher in Brighton, England: “Today we were unlucky, but remember we only have to be lucky once. You will have to be lucky always.” As long as allied forces are committed to the region in conflict with troop casualties almost daily, radicalized western citizens and immigrants are being discovered crossing borders into Afghanistan and Pakistan to join these groups, events such as the 2009 Fort Hood shooting and 2007 London Bombings, and even failed attempts such as the Times Square bomber of May 2010 or the Belgian case in December 2008, they are strong enough. While we are able to understand some of the mindsets and characteristics of organizations like these from past examples, many of their operations have truly developed with new technologies and access to communication channels. Today, we find a more decentralized, flatter web structure – inside Afghanistan alone, there are more than 150 distinct groups connected to the Taliban and/or Al Qaeda.3 This is in addition to other affiliates and terrorist organizations around the region, some of which are noted in Table 1. While deferring in their missions and visions, these groups come together under an age-old unifier – a common enemy. So many groups working both in tandem and individually creates a two sided conundrum for the forces working to combat them. Scattered around a country like Afghanistan or a region as large and diverse as the Middle East, North Africa, and Central Asia, leadership hierarchies can become less concrete, orders more likely to be diffused, internal competition strong, alliance loyalty shifty, and operations often barely structured. While this can result in failed mission attempts due to internal organizational chaos, it also creates a “leaderless resistance”4 providing flexibility and vitality when being chased by counterterrorist efforts.5 This also quickens the “operational tempo”6 at which 1 Hoffman, Bruce, “American Jihad,” The National Interest, No. 107, May/June 2010, pp. 17-24 2 Byman, Daniel L. “Coming to America: The Rise of Al Qaeda Affiliate Groups.” Brookings Saban Center for Middle East Policy. September 19, 2010. 3 Frontline. “Behind Taliban Lines.” Public Broadcasting Service. February, 2010. 4 Joyce-Hasham, M. “Emerging Threats on the Internet.” The Royal Institute of International Affairs. Briefing Paper: New Series No. 15. 2000. 5 Weimann, G. “Terror on the Internet: The New Arena, the New Challenges.” Washington D.C.: United States Institute of Peace Press, 2006. 1 Institute for Near East & Gulf Military Analysis Special Report No. 11 these groups function. Bringing in recruits, Name Location Affiliate training them and deploying for an attack Al-Qaida Central Afghanistan/ Al-Qaida (Osama faster than in the past creates a situation in (AQC) Pakistan Bin Laden, which the event has a higher probability of Ayman al- occurrence because of fewer pre-operational Zawahiri) steps and opportunities to be discovered. At Al-Qaida Arabian Yemen Al-Qaida Peninsula (AQAP) the same time, this is not a careful plan with highly-skilled operators, resulting in botched Al-Qaida in the Land Iraq Al-Qaida of Two Rivers (AQI) attacks that occur on a much smaller scale. Al-Qaida in the Algeria, Nigeria, Al-Qaida (Abu From the perspective that people are the core Islamic Maghreb Mali, Niger Musab Abdel (AQIM) Wadoud) of any organizations’ sustainable Harakat Al-Shabab Somalia Al-Qaida achievement, and that manpower is a critical success factor for terrorists, this report will Brigade 313 Waziristan, Pakistan Al-Qaida investigate the recruiting and training methods and trends in terrorist organizations Taliban in Afghanistan Taliban (Mullah of the Middle East and Central Asia. The Afghanistan Omar) source of much disagreement today is whether recruitment is driven by a central Tehrik-I-Taliban Waziristan/Orakzai Taliban, Haqqani Pakistan (TTP) Pakistan (Baitullah leadership structure or more “bottom-up” in Mehsud) that actors self-radicalize and carry out an Haqqani Network Waziristan, Pakistan Taliban, Al-Qaida attack.7 The first camp, led by Marc (Jalaluddin Sageman8, feels that top Al-Qaida leadership Haqqani) Hezb-I-Islami Afghanistan, Al-Qaida, Taliban has been contained adequately and the focus Refugee camps in (Gulbuddin must shift to addressing self radicalization in Pakistan Hekmatyar) communities abroad, acting independently of Lashkar-E-Taiba Pakistan, but known Al-Qaida, TTP an international organization. The other, (LET) for attacks in 9 Mumbai defended by Bruce Hoffman, describes the Sipah-E-Sahaba Punjab, India and Al-Qaida, TTP very existence of Al-Qaeda and its affiliate Pakistan, Lashkjar-E- FATA, Pakistan organizations spreading across the globe as Jhangvi (LEJ), Jaish- E-Mohammed (JEM) proof that its ideology and centralized core Egyptian Islamic Egypt Al-Qaida are driving formal recruitment and allowing it Jihad/Qaida al-Jihad to thrive. The first step to defeating these Libyan Islamic Libya Al-Qaida organizations as this side believes is to Fighting Group eliminate the top leaders. Table 1: Some of the main terrorist organizations in the Obviously, understanding the origin of Central Asian/Middle East/North Africa region10 radicalization enables nations and communities to choose how best to invest resources and the insight required to build effective and appropriate counterterrorist programs to prevent this radicalization. Using a one-size fits all approach may not only result in ineffectiveness, but can also be counterproductive. But describing this as an either/or dichotomy is overly simplistic and inaccurate if we hope to understand a more complex reality. This report argues that strong evidence suggests that both streams, in addition to others, act simultaneously in less black and white 6 Hoffman, Bruce. “Internet Terror Recruitment and Tradecraft: How Can We Address an Evolving Tool While Protecting Free Speech?” Written Testimony to House Committee on Homeland Security, Subcommittee on Intelligence Information Sharing and Terrorism Risk Assessment. May 26, 2010. 7 Picarelli, John T. “The Future of Terrorism.” National Institute of Justice Journal. Issue 264. November 2009. 8 Sageman, Marc. “Leaderless Jihad: Terror Networks in the Twenty-First Century.” University of Pennsylvania Press, 2008. 9 Hoffman, Bruce. “The Myth of Grass-Roots Terrorism.” Foreign Affairs, May/June 2008. 10 For more on groups within Afghanistan/Pakistan, see “Inside Talibanistan”
Recommended publications
  • The Social Roots of Islamist Militancy in the West
    Valdai Papers #21 | July 2015 The Social Roots of Islamist Militancy in the West Emmanuel Karagiannis The Social Roots of Islamist Militancy in the West Introduction The phenomenon of Islamist militancy in the West has preoccupied the public, media and governments. The September 11 events aggravated the already strained relations between the West and the Muslim world. The fact that the perpetrators of the terrorist attacks were Muslims, who had travelled to the United States from European cities, brought the Old Continent’s Islamic communities to the spotlight. The homegrown Madrid and London bombings on March 11, 2004 and July 7, 2005, respectively, only confirmed in the eyes of some people the untrustworthiness of European Muslims. In the United States, there have also been some high-profile cases of jihadi attacks or plots in the post-9/11 period (e.g. the 2003 Brooklyn Bridge plot, 2009 Fort Hood shooting). While these attacks and plots were different from each other, they can be classified as cases of Islamist militancy. For the purpose of this study, Islamist militancy will be defined as the aggressive and often violent pursuit of a cause associated with Islam. Although it is very difficult to know precisely the number of Western Muslims who have been recruited by jihadi groups, a survey conducted by the Nixon Center revealed that there were 212 suspected and convicted terrorists implicated in North American and Western Europe between 1993 and 2003.1 In addition, Edwin Bakker’s study identified 242 individual cases of jihadi terrorists in Europe during 2001-2006.2 Most recently, there has been a resurgence of Islamist violence in Europe, Australia, Canada and the United States.
    [Show full text]
  • Hood Shooting Survivors to Face Gunman at Trial
    • DOAAarmyaaN'T MISS: • ArmArmy • • Army Times August 5, 2013 • Photo gallery: Hood shooting survivors to face gunman at trial Aug. 5, 2013 - 06:00AM | 2 Comments Unknown Formatted: Font:(Default) Helvetica, 12 pt, Font color: Custom Color(RGB(44,44,44)) Retired Staff Sgt. Alonzo Lunsford holds one of the bullets removed from his body after he was wounded in the 2009 Fort Hood shooting rampage. Unknown Formatted: Font:(Default) Helvetica, 12 0 pt, Font color: Custom Color(RGB(44,44,44)), Hidden By Ramit Plushnick-Masti and Allen G. Breed The Associated Press Unknown Formatted: Font:(Default) Helvetica, 12 pt, Font color: Custom Color(RGB(44,44,44)) Zoom In a June 4 photo at his home in Lillington, N.C., retired Staff Sgt. Alonzo Lunsford describes his wounds from the 2009 Fort Hood shooting rampage. (Chuck Burton/AP) Key questions about Fort Hood shooting trial DALLAS – Maj. Nidal Hasan will stand trial in a court-martial that starts Tuesday for the shooting rampage at Fort Hood that left 13 people dead and more than 30 people wounded at the Texas Army post on Nov. 5, 2009. Here are some details about the case so far and what to expect from the trial: What charges does Hasan face? Hasan faces 13 specifications of premeditated murder and 32 specifications of attempted premeditated murder under the Uniform Code of Military Justice. If convicted, he would face the death penalty. Why has the case taken so long to prosecute? Judges in the case have granted a series of delays for preparation or other issues, often at the request of Hasan or his attorneys.
    [Show full text]
  • Muslim-American Terrorism in the Decade Since 9/11
    Muslim-American Terrorism in the Decade Since 9/11 CHARLES KURZMAN DEPARTMENT OF SOCIOLOGY UNIVERSITY OF NORTH CAROLINA, CHAPEL HILL FEBRUARY 8, 2012 Muslim-American Terrorism Down in 2011 This is the third annual report on Muslim‐American terrorism suspects and perpetrators published by the Twenty Muslim-Americans were indicted for Triangle Center on Terrorism and Homeland Security. violent terrorist plots in 2011, down from 26 the year before, bringing the total since 9/11 The first report, co‐authored by David Schanzer, to 193, or just under 20 per year (see Figure Charles Kurzman, and Ebrahim Moosa in early 2010, 1). This number is not negligible -- small also examined efforts by Muslim‐Americans to prevent numbers of Muslim-Americans continue to radicalization. The second report, authored by Charles radicalize each year and plot violence. Kurzman and issued in early 2011, also examined the However, the rate of radicalization is far less source of the initial tips that brought these cases to the than many feared in the aftermath of 9/11. In attention of law‐enforcement authorities. This third early 2003, for example, Robert Mueller, director of the Federal Bureau of Investigation, report, authored by Charles Kurzman and issued in told Congress that “FBI investigations have early 2012, focuses on cases of support for terrorism, revealed militant Islamics [sic] in the US. We in addition to violent plots. These reports, and the data strongly suspect that several hundred of these on which they are based, are available at 1 extremists are linked to al-Qaeda.” http://kurzman.unc.edu/muslim‐american‐terrorism.
    [Show full text]
  • History – 2000 Thru 2014
    This Time in History NOTABLE EVENTS IN WORLD/U.S. HISTORY - CONTINUED 2000 - 2014 2008 Oil prices in the U.S. hit a record $147 per barrel IMMANUEL MILESTONES Global financial crisis - stock market crashed 2006 Pre-school added to school 2009 Fort Hood shooting - 12 servicemen killed, 31 injured An association formed with Grace Church in Hutchinson, thus Immanuel H1N1 (swine flu) global pandemic Lutheran School and Children of Grace Pre-School 2010 Deepwater Horizon oil spill - 4.9 million barrels of oil spilt into the Gulf of Mexico Pastors 2011 Gabrielle Giffords, U.S. Representative, shot & critically injured in Tucson, Ronald Siemers (1995-2001) Daniel Reich (2001-present) AZX, 6 others killed Principals/Teachers Osama bin Laden, U.S. most wanted terrorist, killed by U.S. Navy Seals in Timothy Schuh (1997-2006) Cheryl Schuh (1997-2006) Pakistan Koreen Koehler (2000-2002) Leanne Reich (2002-2004) A nuclear catastrophe in Tokyo resulted from a 9.0 earthquake in Japan Justin Groth (2006-2010) Heidi Groth (2006-2010) One of the deadliest tornado season known in U.S. history - amongst the most Kristin (Slovik) Utsch (2008-present) Alex Vandenberg (2010-present) devastating was in Joplin, MO Stephanie Vandenberg (2010-present) 2012 Hurricane Sandy caused devastation along the east coast - 132 deaths; $82 billion in damages WELS/LUTHERAN KEYPOINTS Sandy Hook Elementary School shooting in Newtown, CT - killed 26 people 2001 Time of Grace began airing on TV of which 20 were children between the ages of 6 and 7 2008 Christian Worship Supplement published 2013 Boston Marathon Bombings - two pressure cookers used in explosions; killed U.S.
    [Show full text]
  • COMBAT STRESS Harnessing Post-Traumatic Stress for Service Members, Veterans, and First Responders
    The American Institute of Stress COMBAT STRESS Harnessing Post-Traumatic Stress for Service Members, Veterans, and First Responders Volume 8 Number 3 Fall 2019 Fort Hood Massacre Tenth Anniversary Nothing has changed: Still Workplace Violence AND the Escalating Epidemic of Veteran Suicides. The mission of AIS is to improve the health of the The mission of AIS is to improve the health of the community and the world by setting the standard of community and the world by setting the standard of excellence of stress management in education, research, excellence of stress management in education, research, clinical care and the workplace. Diverse and inclusive, clinical care and the workplace. Diverse and inclusive, The American Institute of Stress educates medical The American Institute of Stress educates medical practitioners, scientists, health care professionals and practitioners, scientists, health care professionals and the public; conducts research; and provides information, the public; conducts research; and provides information, training and techniques to prevent human illness related training and techniques to prevent human illness related to stress. to stress. AIS provides a diverse and inclusive environment that AIS provides a diverse and inclusive environment that fosters intellectual discovery, creates and transmits fosters intellectual discovery, creates and transmits innovative knowledge, improves human health, and innovative knowledge, improves human health, and provides leadership to the world on stress related topics. provides leadership to the world on stress related topics. Harnessing Post-Traumatic Stress for Service Members, Veterans, and First Responders COMBAT STRESS We value opinions of our readers. Please feel free to contact us with any comments, suggestions or inquiries.
    [Show full text]
  • American Jihadist Terrorism: Combating a Complex Threat
    American Jihadist Terrorism: Combating a Complex Threat /name redacted/ Specialist in Organized Crime and Terrorism February 19, 2014 Congressional Research Service 7-.... www.crs.gov R41416 CRS Report for Congress Prepared for Members and Committees of Congress American Jihadist Terrorism: Combating a Complex Threat Summary This report describes homegrown violent jihadists and the plots and attacks that have occurred since 9/11. For this report, “homegrown” describes terrorist activity or plots perpetrated within the United States or abroad by American citizens, lawful permanent residents, or visitors radicalized largely within the United States. The term “jihadist” describes radicalized individuals using Islam as an ideological and/or religious justification for their belief in the establishment of a global caliphate, or jurisdiction governed by a Muslim civil and religious leader known as a caliph. The term “violent jihadist” characterizes jihadists who have made the jump to illegally supporting, plotting, or directly engaging in violent terrorist activity. The report also discusses the radicalization process and the forces driving violent extremist activity. It analyzes post-9/11 domestic jihadist terrorism and describes law enforcement and intelligence efforts to combat terrorism and the challenges associated with those efforts. Appendix A provides details about each of the post-9/11 homegrown jihadist terrorist plots and attacks. There is an “executive summary” at the beginning that summarizes the report’s findings. Congressional
    [Show full text]
  • Terrorist Watch List Screening and Background Checks for Firearms
    Terrorist Watch List Screening and Background Checks for Firearms William J. Krouse Specialist in Domestic Security and Crime Policy May 1, 2013 Congressional Research Service 7-5700 www.crs.gov R42336 CRS Report for Congress Prepared for Members and Committees of Congress Terrorist Watch List Screening and Background Checks for Firearms Summary The November 2009 shooting at Fort Hood, TX, renewed interest in terrorist watchlist screening and background checks for firearms through the National Instant Criminal Background Check System (NICS). Pursuant to the Brady Handgun Violence Prevention Act (P.L. 103-159), in November 1998 the Federal Bureau of Investigation (FBI) activated NICS for the purposes of determining an individual’s firearms transfer and possession eligibility whenever a private person seeks to acquire a firearm from a federally licensed gun dealer. Prior to February 2004, however, the FBI did not conduct terrorist watchlist queries as part of firearms background checks because being a known or suspected terrorist was not a disqualifying factor for firearms transfer and possession eligibility; nor is it today under current law. Similarly, the April 15, 2013, Boston Marathon bombing could generate renewed interest in terrorist watchlist screening, because at least one of the alleged perpetrators was possibly entered into the National Counterterrorism Center’s (NCTC’s) Terrorist Identities Datamart Environment (TIDE). As a consequence, he was possibly watch-listed in the FBI-led Terrorist Screening Center’s Terrorist Screening Database—the U.S. government’s master watchlist of known and suspected terrorists. In addition, on April 18, 2013, both alleged perpetrators—Tamerlan and Dzhokhar Tsarnaev—are further alleged to have shot and killed a police officer, high-jacked an automobile and taken its owner hostage at gunpoint, and engaged in a subsequent shootout with police.
    [Show full text]
  • Explaining the Lack of an American Domestic Counter-Radicalization Strategy
    Explaining the Lack of an American Domestic Counter-radicalization Strategy Lorenzo Vidino Over the last ten years, many countries throughout the world have sharpened their approaches to countering extremism and terrorism. Basing their judgment on direct experience and academic studies, many governments have come to reject the more simplistic assumptions about radicalization. Few believe that terrorists are innately deviant, born destined to become terrorists or that once a terrorist, always a terrorist. On the contrary, it is widely believed that, in at least some cases, the radicalization process that leads people to carry out acts of politically motivated violence can be prevented or even reversed. Working from these revised assumptions, several countries have created counter-radicalization programs that differ markedly in their extents and aims. Counter-radicalization commonly includes three types of programs, each with a distinctive objective: deradicalization, disengagement, and radicalization prevention.1 Deradicalization measures seek to lead an already radicalized individual to abandon his or her militant views. Disengagement entails a less dramatic shift whereby an individual abandons involvement in a terrorist group or activities while perhaps retaining a radical worldview. Radicalization prevention measures seek to prevent the radicalization process from taking hold in the first place and generally target a segment of society rather than a specific individual. Certain Muslim-majority countries, having been the first targets of al Qaeda or al Qaeda– inspired attacks, have been among the first to engineer counter-radicalization programs, focusing mostly on deradicalization and disengagement. The programs implemented in Saudi Arabia and Indonesia, for example, have attracted the attention of experts and policymakers for their innovative approaches.
    [Show full text]
  • 13Mar Mbunn Keynote.Pdf
    KEYNOTE MATTHEW BUNN Professor of Practice, Harvard University's John F. Kennedy School of Government UNITED STATES OF AMERICA A Worst Practices Guide to Preventing Leaks, Attacks, Theft, and Sabotage Matthew Bunn (with Scott D. Sagan) Insider Threat Mitigation Brussels, Belgium March 12-14, 2019 Insider Threats are the Most Dangerous Nuclear Security Problem • The known HEU and Pu thefts, and most sabotages, involved insiders • More real incidents than people often recognize • Insiders have authorization to go through many layers of the security system • Insiders are known colleagues • Insiders may understand key aspects of facility operations and the facility’s security system • Can learn from both nuclear and high-security non-nuclear cases 4 Recent U.S. Examples: Insiders Charged with Spying, Preparing to Kill • February 2019: Monica Witt (Fatemah Zarah), indicted for spying for Iran • 10-yr Air Force intelligence veteran (and later contractor) • Allegedly helped target U.S. agents, revealed a SIGINT program • Defected to Iran in 2013 • February 2019: Lt. Christopher Hasson, arrested, charged with plotting domestic terrorism • >20 yrs in Coast Guard • Allegedly lanned to kill leading left- leaning political, media figures • 2017 letter: “dreaming of a way to kill almost every last person” Monica Witt, Christopher Hasson 5 • Insider position apparently not used Source: U.S. Justice Department A Recent Example: Insider Sabotage and a Cleared Terrorist at Doel-4 • August 2014: An insider at Doel-4 reactor in Belgium drains lubricant,
    [Show full text]
  • SIGINT for Anyone
    THE ORIGINS OF AMERICA’S JIHADISTS THE ORIGINS OF AMERICA’S About This Perspective The U.S. homeland faces a multilayered threat from terrorist organizations. Homegrown jihadists account for most of the terrorist activity in the United States since 9/11. Efforts by jihadist terrorist organizations to inspire terrorist attacks in the United States have thus far yielded meager results. No American jihadist group has emerged to sustain a terrorist campaign, and there is no evidence of an active jihadist underground to support a continuing terrorist holy war. The United States has invested significant resources in THE ORIGINS OF preventing terrorist attacks, and authorities have been able to uncover and thwart most of the terrorist plots. This Perspective identifies 86 plots to carry out terrorist attacks and 22 actual attacks since 9/11 involving 178 planners and perpetrators. Eighty-seven percent of those planners and perpetrators had long residencies in the United States. Only four of them had come to the United States illegally, all as minors. Nationality is a poor predictor of later terrorist activity, and vetting people coming to the United States, no matter how rigorous, cannot identify those who radicalize here. Determining whether a young teenager might, more than 12 years later, turn out to be a jihadist AMERICA’S terrorist would require the bureaucratic equivalent of divine foresight. Jenkins JIHADISTS Brian Michael Jenkins $21.00 ISBN-10 0-8330-9949-3 ISBN-13 978-0-8330-9949-5 52100 C O R P O R A T I O N www.rand.org Perspective EXPERT INSIGHTS ON A TIMELY POLICY ISSUE C O R P O R A T I O N 9 780833 099495 R PE-251-RC (2017) barcode_template_CC15.indd 1 10/17/17 12:00 PM Contents Summary of Key Judgments ..................................................................................1 The Origins of America’s Jihadists .........................................................................3 Appendix .............................................................................................................
    [Show full text]
  • Military Law Review, Volume 223, Issue 3, 2015
    Volume 223 Issue 3 2015 U.S. DEP’T OF ARMY PAMPHLET 27-100-223-3 PAMPHLET ARMY OF DEP’T MILITARY LAW REVIEW ARTICLES OUT OF FOCUS: EXPANDING THE DEFINITION OF CHILD PORNOGRAPHY IN THE MILITARY Major Kenneth W. Borgnino MILITARY LAW REVIEW LAW MILITARY THE SEARCH FOR STATUS: CHARTING THE CONTOURS OF COMBATANT STATUS IN THE AGE OF ISIS Lieutentant Colonel R. Aubrey Davis III HUMANITARIAN INTERVENTION IN SYRIA: IS CRISIS RESPONSE AND LIMITED CONTINGENCY OPERATIONS THE SOLUTION? Major William D. Hood THE CODE INDICTED: WHY THE TIME IS RIGHT TO IMPLEMENT A GRAND JURY PROCEEDING IN THE MILITARY Major John G. Doyle JUS IN BELLO FUTURA IGNOTUS: THE UNITED STATES, THE INTERNATIONAL CRIMINAL COURT, AND THE UNCERTAIN FUTURE OF THE LAW OF ARMED CONFLICT Lieutenant Colonel James T. Hill BECOMING A HARDER TARGET: UPDATING MILITARY FIREARMS POLICIES TO COMBAT ACTIVE SHOOTERS Major Anthony M. Osborne VOLUME 223 • 2015 Department of the Army Pamphlet 27-100-223-3 Military Law Review Volume 223 Issue 3 2015 CONTENTS Articles Out of Focus: Expanding the Definition of Child Pornography in the Military Major Kenneth W. Borgnino 499 The Search for Status: Charting the Contours of Combatant Status in the Age of ISIS Lieutenant Colonel R. Aubrey Davis III 556 Humanitarian Intervention in Syria: Is Crisis Response and Limited Contingency Operations the Solution? Major William D. Hood 610 The Code Indicted: Why the Time is Right to Implement a Grand Jury Proceeding in the Military Major John G. Doyle 629 Jus in Bello Futura Ignotus: The United States, the International Criminal Court, and the Uncertain Future of the Law of Armed Conflict Lieutenant Colonel James T.
    [Show full text]
  • Intelligence Issues for Congress
    Intelligence Issues for Congress Marshall Curtis Erwin Analyst in Intelligence and National Security April 23, 2013 Congressional Research Service 7-5700 www.crs.gov RL33539 CRS Report for Congress Prepared for Members and Committees of Congress Intelligence Issues for Congress Summary To address the challenges facing the U.S. intelligence community in the 21st century, congressional and executive branch initiatives have sought to improve coordination among the different agencies and to encourage better analysis. In December 2004, the Intelligence Reform and Terrorism Prevention Act (P.L. 108-458) was signed, providing for a Director of National Intelligence (DNI) with authorities to manage the national intelligence effort. The legislation also established a Director of the Central Intelligence Agency (CIA). Making cooperation effective presents substantial leadership and managerial challenges. The needs of diverse intelligence “consumers” must all be met, using many of the same systems and personnel. The DNI has substantial statutory authorities to address these issues, but the organizational relationships remain complex, especially for intelligence agencies that are part of the Defense Department. Members of Congress in their oversight role may seek to observe the extent to which effective coordination is accomplished. The intelligence community, which comprises 17 agencies, has experienced a decade of budgetary growth. That era was typified by (1) institution building with embryonic organization such as the Office of the DNI and other new or evolving intelligence components, (2) information sharing and collaboration across those institutions, and (3) a focus on counterterrorism. While those issues will remain areas of congressional interest, Members will likely confronted by a new set of intelligence challenges resulting from budgetary realities and from second-order effects stemming from post-9/11 changes.
    [Show full text]