Al-Qaeda Since the Death of Bin Laden
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Nairobi Attack and Al-Shabab's Media Strategy
OCTOBER 2013 . VOL 6 . ISSUE 10 Contents The Nairobi Attack and FEATURE ARTICLE 1 The Nairobi Attack and Al-Shabab’s Al-Shabab’s Media Strategy Media Strategy By Christopher Anzalone By Christopher Anzalone REPORTS 6 The Dutch Foreign Fighter Contingent in Syria By Samar Batrawi 10 Jordanian Jihadists Active in Syria By Suha Philip Ma’ayeh 13 The Islamic Movement and Iranian Intelligence Activities in Nigeria By Jacob Zenn 19 Kirkuk’s Multidimensional Security Crisis By Derek Henry Flood 22 The Battle for Syria’s Al-Hasakah Province By Nicholas A. Heras 25 Recent Highlights in Terrorist Activity 28 CTC Sentinel Staff & Contacts Kenyan soldiers take positions outside the Westgate Mall in Nairobi on September 21, 2013. - Photo by Jeff Angote/Getty Images fter carrying out a bold Godane. The attack also followed a attack inside the upscale year in which al-Shabab lost control Westgate Mall in Nairobi in of significant amounts of territory in September 2013, the Somali Somalia, most importantly major urban Amilitant group al-Shabab succeeded in and economic centers such as the cities recapturing the media spotlight. This of Baidoa and Kismayo. was in large part due to the nature of the attack, its duration, the difficulty This article examines al-Shabab’s About the CTC Sentinel in resecuring the mall, the number of media strategy during and immediately The Combating Terrorism Center is an casualties, and al-Shabab’s aggressive after the Westgate Mall attack, both independent educational and research media campaign during and immediately via micro-blogging on Twitter through institution based in the Department of Social after the attack.1 its various accounts as well as more Sciences at the United States Military Academy, traditional media formats such as West Point. -
The Military Coup in Mali, 22 March 2012. Reflections on the Demise of Democracy and the Importance of Civil – Military Relations
THE MILITARY COUP IN MALI, 22 MARCH 2012. REFLECTIONS ON THE DEMISE OF DEMOCRACY AND THE IMPORTANCE OF CIVIL – MILITARY RELATIONS Thomas C. BRUNEAU, Distinguished Professor Emeritus of National Security Affairs Florina Cristiana (Cris) MATEI, Lecturer Center for Civil – Military Relations, Naval Postgraduate School, Monterey, California, USA The coup in Bamako, on 22 March 2012 both gave lie to the apparent stability of Mali as a democratic country and resulted in the taking of power of an assortment of armed combatants in the North of the country, which resulted in armed intervention by France. This article is about the coup itself that created the power vacuum allowing the insurrection to grow and ultimately take power in the North. The authors have developed a framework for analyzing civil – military relations they believe is more useful than other available frameworks in understanding the role of the military in politics. Key words: Coup in Mali, Civil - Military Relations, Al-Qa'ida in the Islamic Maghreb (AQIM). 1. INTRODUCTION the case of Mali may be particularly dramatic given the long history of In this article we build on the insurgents in the North of the country conceptual framework of Samuel E. and the fact that the demands on the Finer in The Man on Horseback: The armed forces for fighting insurgents Role of the Military in Politics, and seriously increased after the collapse use the case study of the North West of the Muammar el-Qaddafi regime African country of Mali. We believe in Libya in August 2011 [2]. Even so, that any analysis of democratic civil we believe that sooner or later most – military relations must be attuned, armed forces will be required to do as Finer’s book so convincingly something concrete by the civilian demonstrates, to the potential for leaders and, if the requirements we a military coup to overthrow a posit for control and effectiveness are democratic regime [1]. -
The Jihadi Industry: Assessing the Organizational, Leadership And
The Jihadi Industry: Assessing the Organizational, Leadership, and Cyber Profiles Report to the Office of University Programs, Science and Technology Directorate, U.S. Department of Homeland Security July 2017 National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence Led by the University of Maryland 8400 Baltimore Ave., Suite 250 • College Park, MD 20742 • 301.405.6600 www.start.umd.edu National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence About This Report The authors of this report are Gina Ligon, Michael Logan, Margeret Hall, Douglas C. Derrick, Julia Fuller, and Sam Church at the University of Nebraska, Omaha. Questions about this report should be directed to Dr. Gina Ligon at [email protected]. This report is part of the National Consortium for the Study of Terrorism and Responses to Terrorism (START) project, “The Jihadi Industry: Assessing the Organizational, Leadership, and Cyber Profiles” led by Principal Investigator Gina Ligon. This research was supported by the Department of Homeland Security Science and Technology Directorate’s Office of University Programs through Award Number #2012-ST-061-CS0001, Center for the Study of Terrorism and Behavior (CSTAB 1.12) made to START to investigate the role of social, behavioral, cultural, and economic factors on radicalization and violent extremism. The views and conclusions contained in this document are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied, of the U.S. -
The Al Qaeda Network a New Framework for Defining the Enemy
THE AL QAEDA NETWORK A NEW FRAMEWORK FOR DEFINING THE ENEMY KATHERINE ZIMMERMAN SEPTEMBER 2013 THE AL QAEDA NETWORK A NEW FRAMEWORK FOR DEFINING THE ENEMY KATHERINE ZIMMERMAN SEPTEMBER 2013 A REPORT BY AEI’S CRITICAL THREATS PROJECT ABOUT US About the Author Katherine Zimmerman is a senior analyst and the al Qaeda and Associated Movements Team Lead for the Ameri- can Enterprise Institute’s Critical Threats Project. Her work has focused on al Qaeda’s affiliates in the Gulf of Aden region and associated movements in western and northern Africa. She specializes in the Yemen-based group, al Qaeda in the Arabian Peninsula, and al Qaeda’s affiliate in Somalia, al Shabaab. Zimmerman has testified in front of Congress and briefed Members and congressional staff, as well as members of the defense community. She has written analyses of U.S. national security interests related to the threat from the al Qaeda network for the Weekly Standard, National Review Online, and the Huffington Post, among others. Acknowledgments The ideas presented in this paper have been developed and refined over the course of many conversations with the research teams at the Institute for the Study of War and the American Enterprise Institute’s Critical Threats Project. The valuable insights and understandings of regional groups provided by these teams directly contributed to the final product, and I am very grateful to them for sharing their expertise with me. I would also like to express my deep gratitude to Dr. Kimberly Kagan and Jessica Lewis for dedicating their time to helping refine my intellectual under- standing of networks and to Danielle Pletka, whose full support and effort helped shape the final product. -
Al-Qaeda in Libya: a Profile
AL-QAEDA IN LIBYA: A PROFILE A Report Prepared by the Federal Research Division, Library of Congress under an Interagency Agreement with the Combating Terrorism Technical Support Office’s Irregular Warfare Support Program August 2012 Federal Research Division Library of Congress Washington, D.C. 205404840 Tel: 2027073900 Fax: 2027073920 E-Mail: [email protected] Homepage: http://www.loc.gov/rr/frd/ 64 Years of Service to the Federal Government 1948 – 2012 Library of Congress – Federal Research Division Al-Qaeda in Libya: A Profile PREFACE This report attempts to assess al-Qaeda’s presence in Libya. Al-Qaeda Senior Leadership (AQSL) and al-Qaeda in the Islamic Maghreb (AQIM) have sought to take advantage of the Libyan Revolution to recruit militants and to reinforce their operational capabilities in an attempt to create a safe haven and possibly to extend their area of operations to Libya. Reports have indicated that AQSL is seeking to create an al-Qaeda clandestine network in Libya that could be activated in the future to destabilize the government and/or to offer logistical support to al- Qaeda’s activities in North Africa and the Sahel. AQIM has reportedly formed sleeper cells that are probably connected to an al-Qaeda underground network in Libya, likely as a way, primarily, to secure the supply of arms for its ongoing jihadist operations in Algeria and the Sahel. This report discusses how al-Qaeda and its North African affiliate are using communications media and face-to-face contacts to shift the still-evolving post-revolutionary political and social dynamic in Libya in a direction that is conducive to jihad and hateful of the West. -
The Transmutation of Jihadi Organizations in the Sahel and the Regional Security Architecture
No. 10, April 2018 FUTURE NOTES THE TRANSMUTATION OF JIHADI ORGANIZATIONS IN THE SAHEL AND THE REGIONAL SECURITY ARCHITECTURE Djallil Lounnas This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No 693244 Middle East and North Africa Regional Architecture: Mapping Geopolitical Shifts, regional Order and Domestic Transformations FUTURE NOTES No. 10, April 2018 THE TRANSMUTATION OF JIHADI ORGANIZATIONS IN THE SAHEL AND THE REGIONAL SECURITY ARCHITECTURE Djallil Lounnas1 In March 2017, the four most powerful jihadi organizations in the Sahel, Al-Qaeda in the Islamic Maghreb (AQIM), Ansar al-Din, Al-Mourabitoun and Katibat Macina – the latter three linked directly or indirectly to Al-Qaeda – announced their unification and the creation of the Jama’a Nusrat al-Islam wa al-Muslimin’ (JNIM) also known as Group in Support of Islam and Muslims (GSIM), under the leadership of Iyad Ag Ghali. This unification ended the factionalism that had long characterized jihadi organizations in the region and gave birth to what can be considered as one of the most powerful Al-Qaeda affiliates. The creation of the GSIM is especially dangerous in view of the fact that the Sahelian sub-regional system is composed of weak states unable to quell the jihadi threat and geographically linked to Libya, a collapsed state and considered a safe haven for jihadi organizations, in spite of the presence of the international community, especially the French military operation Barkhane. Even more dangerous is the presence of an affiliate of the Islamic State, the Islamic State in the Greater Sahara (ISGS) led by Abu Walid al-Sahrawi, an organization which, although on the surface appearing to be the main rival of the GSIM, has been following a strategy of rapprochement with Iyad Ag Ghali. -
Government Gazette Republic of Namibia
GOVERNMENT GAZETTE OF THE REPUBLIC OF NAMIBIA N$21.60 WINDHOEK - 15 January 2016 No. 5929 CONTENTS Page GOVERNMENT NOTICE No. 13 Publication of sanction list; issuing of freezing order and issuing of arms embargo: Prevention and Combating of Terrorist and Proliferation Activities Act, 2014 .............................................................. 1 ________________ Government Notice MINISTRY OF SAFETY AND SECURITY No. 13 2015 PUBLICATION OF SANCTION LIST; ISSUING OF FREEZING ORDER AND ISSUING OF ARMS EMBARGO: PREVENTION AND COMBATING OF TERRORIST AND PROLIFERATION ACTIVITIES ACT, 2014 In terms of – (a) Section 23(1)(a) of the Prevention and Combating of Terrorist and Proliferation Activities Act, 2014 (Act No. 4 of 2014), I publish, as Annexure, the sanction list issued by the United Nations Security Council pursuant to - (i) Security Council Resolutions 1267(1990) and 1989(2011) and its successor resolutions, as updated on 17 December 2015; (b) Section 23(1)(b) of the Act referred to in paragraph (a) I issue a freezing order in respect of - (i) any funds, assets or economic resources that are owned or controlled directly or indirectly by the designated persons or organizations, without such funds or assets necessarily tied to a particular terrorist act, plot or threat; (ii) all funds, assets or economic resources that are wholly or jointly owned or controlled, directly or indirectly by the designated persons or organisations; 2 Government Gazette 15 January 2016 5929 (iii) funds, assets or economic resources derived or generated from funds or other assets; owned or controlled, directly or indirectly by the designated persons or organizations, including interests that may accrue to such funds or other assets; (iv) funds, other assets or economic resources of persons or organisations acting on behalf of or at the direction of the designated persons or organisations; or (v) any funds or assets held in a bank account as well as any additions that may come into such account after the initial or successive freezing. -
Estimated Age
The US National Counterterrorism Center is pleased to present the 2016 edition of the Counterterrorism (CT) Calendar. Since 2003, we have published the calendar in a daily planner format that provides our consumers with a variety of information related to international terrorism, including wanted terrorists; terrorist group fact sheets; technical issue related to terrorist tactics, techniques, and procedures; and potential dates of importance that terrorists might consider when planning attacks. The cover of this year’s CT Calendar highlights terrorists’ growing use of social media and other emerging online technologies to recruit, radicalize, and encourage adherents to carry out attacks. This year will be the last hardcopy publication of the calendar, as growing production costs necessitate our transition to more cost- effective dissemination methods. In the coming years, NCTC will use a variety of online and other media platforms to continue to share the valuable information found in the CT Calendar with a broad customer set, including our Federal, State, Local, and Tribal law enforcement partners; agencies across the Intelligence Community; private sector partners; and the US public. On behalf of NCTC, I want to thank all the consumers of the CT Calendar during the past 12 years. We hope you continue to find the CT Calendar beneficial to your daily efforts. Sincerely, Nicholas J. Rasmussen Director The US National Counterterrorism Center is pleased to present the 2016 edition of the Counterterrorism (CT) Calendar. This edition, like others since the Calendar was first published in daily planner format in 2003, contains many features across the full range of issues pertaining to international terrorism: terrorist groups, wanted terrorists, and technical pages on various threat-related topics. -
Routledge Handbook of U.S. Counterterrorism and Irregular
‘A unique, exceptional volume of compelling, thoughtful, and informative essays on the subjects of irregular warfare, counter-insurgency, and counter-terrorism – endeavors that will, unfortunately, continue to be unavoidable and necessary, even as the U.S. and our allies and partners shift our focus to Asia and the Pacific in an era of renewed great power rivalries. The co-editors – the late Michael Sheehan, a brilliant comrade in uniform and beyond, Liam Collins, one of America’s most talented and accomplished special operators and scholars on these subjects, and Erich Marquardt, the founding editor of the CTC Sentinel – have done a masterful job of assembling the works of the best and brightest on these subjects – subjects that will continue to demand our attention, resources, and commitment.’ General (ret.) David Petraeus, former Commander of the Surge in Afghanistan, U.S. Central Command, and Coalition Forces in Afghanistan and former Director of the CIA ‘Terrorism will continue to be a featured security challenge for the foreseeable future. We need to be careful about losing the intellectual and practical expertise hard-won over the last twenty years. This handbook, the brainchild of my late friend and longtime counter-terrorism expert Michael Sheehan, is an extraordinary resource for future policymakers and CT practitioners who will grapple with the evolving terrorism threat.’ General (ret.) Joseph Votel, former commander of US Special Operations Command and US Central Command ‘This volume will be essential reading for a new generation of practitioners and scholars. Providing vibrant first-hand accounts from experts in counterterrorism and irregular warfare, from 9/11 until the present, this book presents a blueprint of recent efforts and impending challenges. -
The Roots of Mali's Conflict
The roots of Mali’s conflict The roots Mali’s of The roots of Mali’s conflict Moving beyond the 2012 crisis CRU Report Grégory Chauzal Thibault van Damme The roots of Mali’s conflict Moving beyond the 2012 crisis Grégory Chauzal Thibault van Damme CRU report March 2015 The Sahel Programme is supported by March 2015 © Netherlands Institute of International Relations Clingendael. All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the copyright holders. About the authors Grégory Chauzal is a senior research fellow at Clingendael’s Conflict Research Unit. He specialises in Mali/Sahel issues and develops the Maghreb-Sahel Programme for the Institute. Thibault Van Damme works for Clingendael’s Conflict Research Unit as a project assistant for the Maghreb-Sahel Programme. About CRU The Netherlands Institute of International Relations ‘Clingendael’ is a think tank and diplomatic academy on international affairs. The Conflict Research Unit (CRU) is a specialized team within the Institute, conducting applied, policy-oriented research and developing practical tools that assist national and multilateral governmental and non-governmental organizations in their engagement in fragile and conflict-affected situations. Clingendael Institute P.O. Box 93080 2509 AB The Hague The Netherlands Email: [email protected] Website: http://www.clingendael.nl/ Table of Contents Acknowledgements 6 Executive summary 8 Introduction 10 1. The 2012 crisis: the fissures of a united insurrection 10 2. A coup in the south 12 3. -
COUNCIL REGULATION (EC) No 881/2002 of 27
02002R0881 — EN — 14.04.2021 — 123.001 — 1 This text is meant purely as a documentation tool and has no legal effect. The Union's institutions do not assume any liability for its contents. The authentic versions of the relevant acts, including their preambles, are those published in the Official Journal of the European Union and available in EUR-Lex. Those official texts are directly accessible through the links embedded in this document ►B ►M246 COUNCIL REGULATION (EC) No 881/2002 of 27 May 2002 imposing certain specific restrictive measures directed against certain persons and entities associated with the ISIL (Da'esh) and Al-Qaida organisations ◄ (OJ L 139, 29.5.2002, p. 9) Amended by: Official Journal No page date ►M1 Commission Regulation (EC) No 951/2002 of 3 June 2002 L 145 14 4.6.2002 ►M2 Commission Regulation (EC) No 1580/2002 of 4 September 2002 L 237 3 5.9.2002 ►M3 Commission Regulation (EC) No 1644/2002 of 13 September 2002 L 247 25 14.9.2002 ►M4 Commission Regulation (EC) No 1754/2002 of 1 October 2002 L 264 23 2.10.2002 ►M5 Commission Regulation (EC) No 1823/2002 of 11 October 2002 L 276 26 12.10.2002 ►M6 Commission Regulation (EC) No 1893/2002 of 23 October 2002 L 286 19 24.10.2002 ►M7 Commission Regulation (EC) No 1935/2002 of 29 October 2002 L 295 11 30.10.2002 ►M8 Commission Regulation (EC) No 2083/2002 of 22 November 2002 L 319 22 23.11.2002 ►M9 Commission Regulation (EC) No 145/2003 of 27 January 2003 L 23 22 28.1.2003 ►M10 Commission Regulation (EC) No 215/2003 of 3 February 2003 L 28 41 4.2.2003 ►M11 Commission Regulation -
Jihadi Rivalry: E Islamic State Challenges Al-Qaida
B D C A P Number 16, January 2016 Jihadi Rivalry: e Islamic State Challenges al-Qaida Charles Lister JIHADI RIVALRY: The Islamic State Challenges al-Qaida Charles Lister The Brookings Institution is a nonprofit organization devoted to independent research and policy solutions. Its mission is to conduct high-quality, independent research and, based on that research, to provide innovative, practical recommendations for policymakers and the public. The conclusions and recommendations of any Brookings publication are solely those of its author(s), and do not reflect the views of the Institution, its management, or its other scholars. Brookings recognizes that the value it provides to any supporter is in its absolute commitment to quality, independence and impact. Activities supported by its donors reflect this commitment and the analysis and recommendations are not determined by any donation. Copyright © 2016 Brookings Institution THE BROOKINGS INSTITUTION 1775 Massachusetts Avenue, N.W. Washington, D.C. 20036 U.S.A. www.brookings.edu BROOKINGS DOHA CENTER Saha 43, Building 63, West Bay, Doha, Qatar www.brookings.edu/doha Table of Contents I. Executive Summary ...............................................................................................1 II. A Revolution from Within ...................................................................................3 III. Al-Qaida: Localism with an Eye Toward the West ................................................7 IV. Islamic State: Ink Spot Expansionism ................................................................15