Al-Qaeda Since the Death of Bin Laden

Total Page:16

File Type:pdf, Size:1020Kb

Al-Qaeda Since the Death of Bin Laden Security Al-Qaeda since the Death of Bin Laden Jean-Pierre Filiu a Problematic Succession for Central Professor al-Qaeda Panorama Sciences Po (Paris Institute of Political Studies), Paris The (primarily digital) documents seized in Abbot- tabad prove that bin Laden, far from being a sym- bolic figure, continued to supervise the planning of al-Qaeda terrorism until his death. The rigorous 2012 On 21 January 2011, Osama bin Laden aired a security mechanism that had protected him for so particularly threatening message directed against long entailed that Ayman al-Zawahiri, though his Med. France, demanding it immediately withdraw its tried deputy, was not involved in all of “Emir” bin troops from Afghanistan. The aggressiveness of Laden’s decisions (“emir” in this case meaning this message is all the more remarkable, consider- “commander”). Moreover, the founder of al-Qaeda ing that the leader of al-Qaeda generally reserved remained the undisputed leader, since any mem- such violence for a demonised “America” accused bership, whether individual or collective, involved 124 of all the ills of Islam. In any case, bin Laden did not an unconditional oath of allegiance to “Sheikh have a word to say on the fall of President Ben Ali, Osama.” overthrown in Tunisia a week earlier by a popular To facilitate this transition, central al-Qaeda creat- uprising in which Islamists played no role. There ed an unprecedented structure, the General Com- was a staggering discrepancy between the al-Qae- mand, which made bin Laden’s death official and da leader’s discourse, hammering home demands validated its own existence through this proclama- regarding the Indian subcontinent, and the reality of tion (before this, there was only the Consultative the Arab world, which had entered a revolutionary Council at the summit of al-Qaeda, a poorly named phase of historical significance. institution since it functioned as the organisation’s No-one knew at the time that this speech was to be executive body). Despite this clever manoeuvre, it bin Laden’s last. On the night of the 1st to the 2nd was not until 16 June 2011 that the General Com- May 2011, the leader of al-Qaeda was killed by an mand announced that Ayman al-Zawahiri was in- American commando unit after storming his hide- deed the new leader of al-Qaeda. Even taking into out in Abbottabad, northern Pakistan. The disap- account the heavy constraints of being a clandes- pearance of the most wanted person on the planet tine organisation, this month-and-a-half-long delay long mobilised the Western media, whereas it was demonstrates that the promotion of al-Qaeda’s quickly displaced in the Arab media by other, more second-in-line to the position of leader raised many pressing developments. As a young Tunisian stated issues. at the time: “Ben Ali, bin Laden, they’re history.” In fact, only the Yemeni branch of al-Qaeda has And the very survival of the organisation founded by pledged allegiance to al-Zawahiri, and this via the bin Laden in 1988 now emerges as an acute issue voice of its own “emir,” Nasser al-Wuhayshi, on 26 to his successor at the head of central al-Qaeda. July 2011. Al-Qaeda in Iraq (AQI) and al-Qaeda in The situation of the three branches of al-Qaeda, in the Islamic Maghreb (AQIM) have limited themselves Iraq, Yemen and the “Islamic Maghreb,” is, howev- to singing the praises of al-Zawahiri through the in- er, quite varied. tervention of intermediate officers. These statements of deference are a far cry from the formal oaths re- Saleh and his regime. It accused the regime of con- quired by Jihadi protocol. Al-Zawahiri has thus lost niving laxness towards AQAP’s takeover of cities in the direct authority exercised by bin Laden over AQI the southern province of Abyan. This process of du- since 2004 and over AQIM since 2007. This con- plicity was accentuated with AQAP’s occupation of traction of al-Qaeda around its first circle and its the town of Radda, 170 km south of Sana’a, on 14 Yemeni branch is not compensated by the ostenta- January 2012. Shortly before this, Saleh had signed tious rallying of the Pakistani Talibans (Tehrik e-Tali- an agreement to step down, and protesters de- ban Pakistan/TTP) around al-Zawahiri, nor by that of nounced him for postponing its application in the the Somali al-Shabaab, for these two movements are name of the struggle against AQAP. However, the too anchored in their respective arenas to fully inte- Yemeni President eventually did agree to step down, grate global Jihad. The same can be said of the group leaving his allies at the head of the intelligence ser- recently emerging in Egypt’s Sinai Peninsula, Ansar vices. The paradox is that AQAP, aggrandised al-Jihad (Partisans of Jihad), whose emphatic decla- through its media-hyped confrontation with the ration of allegiance to al-Zawahiri on 23 January Saleh regime, ranks in reality as but a second-rate 2012 is part of an active media campaign. militia in revolutionary Yemen. Panorama al-Qaeda in the arabian Peninsula and the the anti-Shiite obsession of al-Qaeda Yemeni Formula in Iraq 2012 Since 2009, the Yemeni branch of al-Qaeda amal- In June 2006, bin Laden and al-Zawahiri had ap- Med. gamates the Saudi networks that have chosen to pointed an Egyptian jihadi, Abu Hamza al-Muhajer, retire towards the South to escape the repression of as the head of al-Qaeda in Iraq (AQI), but he was the Arabian kingdom. Called al-Qaeda in the Arabi- killed in April 2010 by the Iraqi army. The proclaimed an Peninsula (AQAP), it embraced a revolutionary “caliph” of the “Islamic State of Iraq,” Abu Omar al- discourse against President Ali Abdullah Saleh, who Baghdadi, of Iraqi nationality, was killed in the same had been in power in Sana’a since 1978 and at the raid. Since then, AQI has distanced itself from cen- 125 head of a unified Yemen since 1990. Confronted tral al-Qaeda to return to local issues: for it, the con- with unprecedented protest beginning in February flict with the Administration of Shiite Prime Minister 2011, the Yemeni dictator did not cease to raise the Nouri al-Maliki, as well as with the so-called “Awak- spectre of al-Qaeda to justify his remaining in power. ening” (Sahwa) Sunni militias, who are United States allies, is implacable. This purely Iraqi orientation of AQI is assumed by its “emir,” Ibrahim Awwad Ibra- The disappearance him Ali (also known as Abu Doha or Abu Bakr al- of the most wanted person Husseini al-Baghdadi). on the planet long mobilised the Western media, whereas it was The succession of quickly displaced in the Arab bin Laden thus requires a media by other, more pressing delicate process of renewal of developments allegiance, which is proving uneven and complex Thus, on 30 September 2011, he facilitated a fatal American raid against Anwar al-Awlaki, an Ameri- can-Yemeni imam highly active in AQAP propagan- The AQI terror, far from subsiding with the per- da. Washington appreciated this move all the more spective of American retreat, intensified as of Au- since al-Awlaki had been suspected of carrying out gust 2011, with two waves of particularly bloody or planning different attacks on US territory. attacks: on 22 December 2011 (63 dead) and 5 The Yemeni opposition, on the other hand, de- January 2012 (73 dead). The departure of the US nounced the manipulation of the Jihad menace by contingent, taking place as planned at the end of 2011, leaves the question of Sunni participation in nals then sold by various traffickers throughout Iraqi power open, with an increasingly confessional the region. The exact nature of the surface-to-air approach by Prime Minister Maliki to the benefit of missiles smuggled to the Saharan katibas is still his own Shiite party. It is in this context of commu- the object of debate by specialised analysts, but it nity polarisation that AQI aims to become the armed has been confirmed that a new generation explo- branch of Sunni dissent. Although the AQI Emir sive device reached the north Algerian jihadi cells. may pay tribute to bin Laden or al-Zawahiri, he can This explosive was used on 26 August 2011 in the now only do so as the independent head of the spectacular suicide bombing against the Cherchell most dreaded militia in Iraq. Military Academy (at least 11 dead). The Algerian army, thus challenged, takes up the offensive again (namely, with the death by ambush of the the divisions of the “Islamic Maghreb” AQIM treasurer, Adel Bourai, on 28 September 2011), whereas the jihadi chiefs were tried in ab- Al-Qaeda in the Islamic Maghreb (AQIM) was sentia one after another in Algeria. Panorama constituted when Abdelmalek Droukdal’s Salafist Group for Preaching and Combat (GSPC) be- came part of al-Qaeda in 2007. In early 2011, its The competition between the members numbered some five hundred jihadis, kidnappers increased in autumn half of whom are part of the guerrilla of Kabylia 2011, reaching areas previously 2012 led by Droukdal, while the rest live as nomads in the Sahara region, in the katiba (battalion) led by untouched by this scourge Med. Mokhtar Belmokhtar (in the west) or the one headed by Abdelhamid Abou Zeid (in the east), It is in the Sahel that the AQIM threat seems most both officially subordinate to Droukdal. Despite worrisome, for the flight of Gaddafi’s African aux- its grandiloquent statements, AQIM remained iliary forces has attracted a certain number of entirely passive during the Tunisian revolution.
Recommended publications
  • The Nairobi Attack and Al-Shabab's Media Strategy
    OCTOBER 2013 . VOL 6 . ISSUE 10 Contents The Nairobi Attack and FEATURE ARTICLE 1 The Nairobi Attack and Al-Shabab’s Al-Shabab’s Media Strategy Media Strategy By Christopher Anzalone By Christopher Anzalone REPORTS 6 The Dutch Foreign Fighter Contingent in Syria By Samar Batrawi 10 Jordanian Jihadists Active in Syria By Suha Philip Ma’ayeh 13 The Islamic Movement and Iranian Intelligence Activities in Nigeria By Jacob Zenn 19 Kirkuk’s Multidimensional Security Crisis By Derek Henry Flood 22 The Battle for Syria’s Al-Hasakah Province By Nicholas A. Heras 25 Recent Highlights in Terrorist Activity 28 CTC Sentinel Staff & Contacts Kenyan soldiers take positions outside the Westgate Mall in Nairobi on September 21, 2013. - Photo by Jeff Angote/Getty Images fter carrying out a bold Godane. The attack also followed a attack inside the upscale year in which al-Shabab lost control Westgate Mall in Nairobi in of significant amounts of territory in September 2013, the Somali Somalia, most importantly major urban Amilitant group al-Shabab succeeded in and economic centers such as the cities recapturing the media spotlight. This of Baidoa and Kismayo. was in large part due to the nature of the attack, its duration, the difficulty This article examines al-Shabab’s About the CTC Sentinel in resecuring the mall, the number of media strategy during and immediately The Combating Terrorism Center is an casualties, and al-Shabab’s aggressive after the Westgate Mall attack, both independent educational and research media campaign during and immediately via micro-blogging on Twitter through institution based in the Department of Social after the attack.1 its various accounts as well as more Sciences at the United States Military Academy, traditional media formats such as West Point.
    [Show full text]
  • The Military Coup in Mali, 22 March 2012. Reflections on the Demise of Democracy and the Importance of Civil – Military Relations
    THE MILITARY COUP IN MALI, 22 MARCH 2012. REFLECTIONS ON THE DEMISE OF DEMOCRACY AND THE IMPORTANCE OF CIVIL – MILITARY RELATIONS Thomas C. BRUNEAU, Distinguished Professor Emeritus of National Security Affairs Florina Cristiana (Cris) MATEI, Lecturer Center for Civil – Military Relations, Naval Postgraduate School, Monterey, California, USA The coup in Bamako, on 22 March 2012 both gave lie to the apparent stability of Mali as a democratic country and resulted in the taking of power of an assortment of armed combatants in the North of the country, which resulted in armed intervention by France. This article is about the coup itself that created the power vacuum allowing the insurrection to grow and ultimately take power in the North. The authors have developed a framework for analyzing civil – military relations they believe is more useful than other available frameworks in understanding the role of the military in politics. Key words: Coup in Mali, Civil - Military Relations, Al-Qa'ida in the Islamic Maghreb (AQIM). 1. INTRODUCTION the case of Mali may be particularly dramatic given the long history of In this article we build on the insurgents in the North of the country conceptual framework of Samuel E. and the fact that the demands on the Finer in The Man on Horseback: The armed forces for fighting insurgents Role of the Military in Politics, and seriously increased after the collapse use the case study of the North West of the Muammar el-Qaddafi regime African country of Mali. We believe in Libya in August 2011 [2]. Even so, that any analysis of democratic civil we believe that sooner or later most – military relations must be attuned, armed forces will be required to do as Finer’s book so convincingly something concrete by the civilian demonstrates, to the potential for leaders and, if the requirements we a military coup to overthrow a posit for control and effectiveness are democratic regime [1].
    [Show full text]
  • The Jihadi Industry: Assessing the Organizational, Leadership And
    The Jihadi Industry: Assessing the Organizational, Leadership, and Cyber Profiles Report to the Office of University Programs, Science and Technology Directorate, U.S. Department of Homeland Security July 2017 National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence Led by the University of Maryland 8400 Baltimore Ave., Suite 250 • College Park, MD 20742 • 301.405.6600 www.start.umd.edu National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence About This Report The authors of this report are Gina Ligon, Michael Logan, Margeret Hall, Douglas C. Derrick, Julia Fuller, and Sam Church at the University of Nebraska, Omaha. Questions about this report should be directed to Dr. Gina Ligon at [email protected]. This report is part of the National Consortium for the Study of Terrorism and Responses to Terrorism (START) project, “The Jihadi Industry: Assessing the Organizational, Leadership, and Cyber Profiles” led by Principal Investigator Gina Ligon. This research was supported by the Department of Homeland Security Science and Technology Directorate’s Office of University Programs through Award Number #2012-ST-061-CS0001, Center for the Study of Terrorism and Behavior (CSTAB 1.12) made to START to investigate the role of social, behavioral, cultural, and economic factors on radicalization and violent extremism. The views and conclusions contained in this document are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied, of the U.S.
    [Show full text]
  • The Al Qaeda Network a New Framework for Defining the Enemy
    THE AL QAEDA NETWORK A NEW FRAMEWORK FOR DEFINING THE ENEMY KATHERINE ZIMMERMAN SEPTEMBER 2013 THE AL QAEDA NETWORK A NEW FRAMEWORK FOR DEFINING THE ENEMY KATHERINE ZIMMERMAN SEPTEMBER 2013 A REPORT BY AEI’S CRITICAL THREATS PROJECT ABOUT US About the Author Katherine Zimmerman is a senior analyst and the al Qaeda and Associated Movements Team Lead for the Ameri- can Enterprise Institute’s Critical Threats Project. Her work has focused on al Qaeda’s affiliates in the Gulf of Aden region and associated movements in western and northern Africa. She specializes in the Yemen-based group, al Qaeda in the Arabian Peninsula, and al Qaeda’s affiliate in Somalia, al Shabaab. Zimmerman has testified in front of Congress and briefed Members and congressional staff, as well as members of the defense community. She has written analyses of U.S. national security interests related to the threat from the al Qaeda network for the Weekly Standard, National Review Online, and the Huffington Post, among others. Acknowledgments The ideas presented in this paper have been developed and refined over the course of many conversations with the research teams at the Institute for the Study of War and the American Enterprise Institute’s Critical Threats Project. The valuable insights and understandings of regional groups provided by these teams directly contributed to the final product, and I am very grateful to them for sharing their expertise with me. I would also like to express my deep gratitude to Dr. Kimberly Kagan and Jessica Lewis for dedicating their time to helping refine my intellectual under- standing of networks and to Danielle Pletka, whose full support and effort helped shape the final product.
    [Show full text]
  • Al-Qaeda in Libya: a Profile
    AL-QAEDA IN LIBYA: A PROFILE A Report Prepared by the Federal Research Division, Library of Congress under an Interagency Agreement with the Combating Terrorism Technical Support Office’s Irregular Warfare Support Program August 2012 Federal Research Division Library of Congress Washington, D.C. 205404840 Tel: 2027073900 Fax: 2027073920 E-Mail: [email protected] Homepage: http://www.loc.gov/rr/frd/ 64 Years of Service to the Federal Government 1948 – 2012 Library of Congress – Federal Research Division Al-Qaeda in Libya: A Profile PREFACE This report attempts to assess al-Qaeda’s presence in Libya. Al-Qaeda Senior Leadership (AQSL) and al-Qaeda in the Islamic Maghreb (AQIM) have sought to take advantage of the Libyan Revolution to recruit militants and to reinforce their operational capabilities in an attempt to create a safe haven and possibly to extend their area of operations to Libya. Reports have indicated that AQSL is seeking to create an al-Qaeda clandestine network in Libya that could be activated in the future to destabilize the government and/or to offer logistical support to al- Qaeda’s activities in North Africa and the Sahel. AQIM has reportedly formed sleeper cells that are probably connected to an al-Qaeda underground network in Libya, likely as a way, primarily, to secure the supply of arms for its ongoing jihadist operations in Algeria and the Sahel. This report discusses how al-Qaeda and its North African affiliate are using communications media and face-to-face contacts to shift the still-evolving post-revolutionary political and social dynamic in Libya in a direction that is conducive to jihad and hateful of the West.
    [Show full text]
  • The Transmutation of Jihadi Organizations in the Sahel and the Regional Security Architecture
    No. 10, April 2018 FUTURE NOTES THE TRANSMUTATION OF JIHADI ORGANIZATIONS IN THE SAHEL AND THE REGIONAL SECURITY ARCHITECTURE Djallil Lounnas This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No 693244 Middle East and North Africa Regional Architecture: Mapping Geopolitical Shifts, regional Order and Domestic Transformations FUTURE NOTES No. 10, April 2018 THE TRANSMUTATION OF JIHADI ORGANIZATIONS IN THE SAHEL AND THE REGIONAL SECURITY ARCHITECTURE Djallil Lounnas1 In March 2017, the four most powerful jihadi organizations in the Sahel, Al-Qaeda in the Islamic Maghreb (AQIM), Ansar al-Din, Al-Mourabitoun and Katibat Macina – the latter three linked directly or indirectly to Al-Qaeda – announced their unification and the creation of the Jama’a Nusrat al-Islam wa al-Muslimin’ (JNIM) also known as Group in Support of Islam and Muslims (GSIM), under the leadership of Iyad Ag Ghali. This unification ended the factionalism that had long characterized jihadi organizations in the region and gave birth to what can be considered as one of the most powerful Al-Qaeda affiliates. The creation of the GSIM is especially dangerous in view of the fact that the Sahelian sub-regional system is composed of weak states unable to quell the jihadi threat and geographically linked to Libya, a collapsed state and considered a safe haven for jihadi organizations, in spite of the presence of the international community, especially the French military operation Barkhane. Even more dangerous is the presence of an affiliate of the Islamic State, the Islamic State in the Greater Sahara (ISGS) led by Abu Walid al-Sahrawi, an organization which, although on the surface appearing to be the main rival of the GSIM, has been following a strategy of rapprochement with Iyad Ag Ghali.
    [Show full text]
  • Government Gazette Republic of Namibia
    GOVERNMENT GAZETTE OF THE REPUBLIC OF NAMIBIA N$21.60 WINDHOEK - 15 January 2016 No. 5929 CONTENTS Page GOVERNMENT NOTICE No. 13 Publication of sanction list; issuing of freezing order and issuing of arms embargo: Prevention and Combating of Terrorist and Proliferation Activities Act, 2014 .............................................................. 1 ________________ Government Notice MINISTRY OF SAFETY AND SECURITY No. 13 2015 PUBLICATION OF SANCTION LIST; ISSUING OF FREEZING ORDER AND ISSUING OF ARMS EMBARGO: PREVENTION AND COMBATING OF TERRORIST AND PROLIFERATION ACTIVITIES ACT, 2014 In terms of – (a) Section 23(1)(a) of the Prevention and Combating of Terrorist and Proliferation Activities Act, 2014 (Act No. 4 of 2014), I publish, as Annexure, the sanction list issued by the United Nations Security Council pursuant to - (i) Security Council Resolutions 1267(1990) and 1989(2011) and its successor resolutions, as updated on 17 December 2015; (b) Section 23(1)(b) of the Act referred to in paragraph (a) I issue a freezing order in respect of - (i) any funds, assets or economic resources that are owned or controlled directly or indirectly by the designated persons or organizations, without such funds or assets necessarily tied to a particular terrorist act, plot or threat; (ii) all funds, assets or economic resources that are wholly or jointly owned or controlled, directly or indirectly by the designated persons or organisations; 2 Government Gazette 15 January 2016 5929 (iii) funds, assets or economic resources derived or generated from funds or other assets; owned or controlled, directly or indirectly by the designated persons or organizations, including interests that may accrue to such funds or other assets; (iv) funds, other assets or economic resources of persons or organisations acting on behalf of or at the direction of the designated persons or organisations; or (v) any funds or assets held in a bank account as well as any additions that may come into such account after the initial or successive freezing.
    [Show full text]
  • Estimated Age
    The US National Counterterrorism Center is pleased to present the 2016 edition of the Counterterrorism (CT) Calendar. Since 2003, we have published the calendar in a daily planner format that provides our consumers with a variety of information related to international terrorism, including wanted terrorists; terrorist group fact sheets; technical issue related to terrorist tactics, techniques, and procedures; and potential dates of importance that terrorists might consider when planning attacks. The cover of this year’s CT Calendar highlights terrorists’ growing use of social media and other emerging online technologies to recruit, radicalize, and encourage adherents to carry out attacks. This year will be the last hardcopy publication of the calendar, as growing production costs necessitate our transition to more cost- effective dissemination methods. In the coming years, NCTC will use a variety of online and other media platforms to continue to share the valuable information found in the CT Calendar with a broad customer set, including our Federal, State, Local, and Tribal law enforcement partners; agencies across the Intelligence Community; private sector partners; and the US public. On behalf of NCTC, I want to thank all the consumers of the CT Calendar during the past 12 years. We hope you continue to find the CT Calendar beneficial to your daily efforts. Sincerely, Nicholas J. Rasmussen Director The US National Counterterrorism Center is pleased to present the 2016 edition of the Counterterrorism (CT) Calendar. This edition, like others since the Calendar was first published in daily planner format in 2003, contains many features across the full range of issues pertaining to international terrorism: terrorist groups, wanted terrorists, and technical pages on various threat-related topics.
    [Show full text]
  • Routledge Handbook of U.S. Counterterrorism and Irregular
    ‘A unique, exceptional volume of compelling, thoughtful, and informative essays on the subjects of irregular warfare, counter-insurgency, and counter-terrorism – endeavors that will, unfortunately, continue to be unavoidable and necessary, even as the U.S. and our allies and partners shift our focus to Asia and the Pacific in an era of renewed great power rivalries. The co-editors – the late Michael Sheehan, a brilliant comrade in uniform and beyond, Liam Collins, one of America’s most talented and accomplished special operators and scholars on these subjects, and Erich Marquardt, the founding editor of the CTC Sentinel – have done a masterful job of assembling the works of the best and brightest on these subjects – subjects that will continue to demand our attention, resources, and commitment.’ General (ret.) David Petraeus, former Commander of the Surge in Afghanistan, U.S. Central Command, and Coalition Forces in Afghanistan and former Director of the CIA ‘Terrorism will continue to be a featured security challenge for the foreseeable future. We need to be careful about losing the intellectual and practical expertise hard-won over the last twenty years. This handbook, the brainchild of my late friend and longtime counter-terrorism expert Michael Sheehan, is an extraordinary resource for future policymakers and CT practitioners who will grapple with the evolving terrorism threat.’ General (ret.) Joseph Votel, former commander of US Special Operations Command and US Central Command ‘This volume will be essential reading for a new generation of practitioners and scholars. Providing vibrant first-hand accounts from experts in counterterrorism and irregular warfare, from 9/11 until the present, this book presents a blueprint of recent efforts and impending challenges.
    [Show full text]
  • The Roots of Mali's Conflict
    The roots of Mali’s conflict The roots Mali’s of The roots of Mali’s conflict Moving beyond the 2012 crisis CRU Report Grégory Chauzal Thibault van Damme The roots of Mali’s conflict Moving beyond the 2012 crisis Grégory Chauzal Thibault van Damme CRU report March 2015 The Sahel Programme is supported by March 2015 © Netherlands Institute of International Relations Clingendael. All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the copyright holders. About the authors Grégory Chauzal is a senior research fellow at Clingendael’s Conflict Research Unit. He specialises in Mali/Sahel issues and develops the Maghreb-Sahel Programme for the Institute. Thibault Van Damme works for Clingendael’s Conflict Research Unit as a project assistant for the Maghreb-Sahel Programme. About CRU The Netherlands Institute of International Relations ‘Clingendael’ is a think tank and diplomatic academy on international affairs. The Conflict Research Unit (CRU) is a specialized team within the Institute, conducting applied, policy-oriented research and developing practical tools that assist national and multilateral governmental and non-governmental organizations in their engagement in fragile and conflict-affected situations. Clingendael Institute P.O. Box 93080 2509 AB The Hague The Netherlands Email: [email protected] Website: http://www.clingendael.nl/ Table of Contents Acknowledgements 6 Executive summary 8 Introduction 10 1. The 2012 crisis: the fissures of a united insurrection 10 2. A coup in the south 12 3.
    [Show full text]
  • COUNCIL REGULATION (EC) No 881/2002 of 27
    02002R0881 — EN — 14.04.2021 — 123.001 — 1 This text is meant purely as a documentation tool and has no legal effect. The Union's institutions do not assume any liability for its contents. The authentic versions of the relevant acts, including their preambles, are those published in the Official Journal of the European Union and available in EUR-Lex. Those official texts are directly accessible through the links embedded in this document ►B ►M246 COUNCIL REGULATION (EC) No 881/2002 of 27 May 2002 imposing certain specific restrictive measures directed against certain persons and entities associated with the ISIL (Da'esh) and Al-Qaida organisations ◄ (OJ L 139, 29.5.2002, p. 9) Amended by: Official Journal No page date ►M1 Commission Regulation (EC) No 951/2002 of 3 June 2002 L 145 14 4.6.2002 ►M2 Commission Regulation (EC) No 1580/2002 of 4 September 2002 L 237 3 5.9.2002 ►M3 Commission Regulation (EC) No 1644/2002 of 13 September 2002 L 247 25 14.9.2002 ►M4 Commission Regulation (EC) No 1754/2002 of 1 October 2002 L 264 23 2.10.2002 ►M5 Commission Regulation (EC) No 1823/2002 of 11 October 2002 L 276 26 12.10.2002 ►M6 Commission Regulation (EC) No 1893/2002 of 23 October 2002 L 286 19 24.10.2002 ►M7 Commission Regulation (EC) No 1935/2002 of 29 October 2002 L 295 11 30.10.2002 ►M8 Commission Regulation (EC) No 2083/2002 of 22 November 2002 L 319 22 23.11.2002 ►M9 Commission Regulation (EC) No 145/2003 of 27 January 2003 L 23 22 28.1.2003 ►M10 Commission Regulation (EC) No 215/2003 of 3 February 2003 L 28 41 4.2.2003 ►M11 Commission Regulation
    [Show full text]
  • Jihadi Rivalry: E Islamic State Challenges Al-Qaida
    B D C A P Number 16, January 2016 Jihadi Rivalry: e Islamic State Challenges al-Qaida Charles Lister JIHADI RIVALRY: The Islamic State Challenges al-Qaida Charles Lister The Brookings Institution is a nonprofit organization devoted to independent research and policy solutions. Its mission is to conduct high-quality, independent research and, based on that research, to provide innovative, practical recommendations for policymakers and the public. The conclusions and recommendations of any Brookings publication are solely those of its author(s), and do not reflect the views of the Institution, its management, or its other scholars. Brookings recognizes that the value it provides to any supporter is in its absolute commitment to quality, independence and impact. Activities supported by its donors reflect this commitment and the analysis and recommendations are not determined by any donation. Copyright © 2016 Brookings Institution THE BROOKINGS INSTITUTION 1775 Massachusetts Avenue, N.W. Washington, D.C. 20036 U.S.A. www.brookings.edu BROOKINGS DOHA CENTER Saha 43, Building 63, West Bay, Doha, Qatar www.brookings.edu/doha Table of Contents I. Executive Summary ...............................................................................................1 II. A Revolution from Within ...................................................................................3 III. Al-Qaida: Localism with an Eye Toward the West ................................................7 IV. Islamic State: Ink Spot Expansionism ................................................................15
    [Show full text]