CTC Sentinel Objective

Total Page:16

File Type:pdf, Size:1020Kb

CTC Sentinel Objective JULY 2009 . VOL 2 . ISSUE 7 COMBATING TERRORISM CENTER AT WEST POINT CTC Sentinel OBJECTIVE . RELEVANT . RIGOROUS Contents The Terrorist Threat to FEATURE ARTICLE Pakistan’s Nuclear Weapons 1 The Terrorist Threat to Pakistan’s By Shaun Gregory Nuclear Weapons By Shaun Gregory REPORTS 4 The Significance of Qari Zain’s Assassination in Pakistan By Rahimullah Yusufzai 7 Pakistan’s New Offensive in South Waziristan By Samir Syed 9 A Diagnosis of Somalia’s Failing Transitional Government By Anonymous 12 The Status of Conflict in the Southern and Central Regions of Somalia By Michael A. Weinstein 15 A New Phase of Resistance and Insurgency in Iranian Baluchistan By Chris Zambelis 18 Incorporating Law Enforcement Interrogation Techniques on the Battlefield Pakistani Army soldiers guarding nuclear-capable missiles. - Photo by Rizwan Tabassum/AFP/Getty Images By Gretchen Peters l-qa`ida has made numerous will first outline Pakistan’s current 21 Recent Highlights in Terrorist Activity statements about a desire nuclear safeguards, and then identify 24 CTC Sentinel Staff & Contacts to obtain nuclear weapons a series of weaknesses in the country’s for use against the United nuclear security that could result in AStates and Western interests.1 While terrorist groups such as al-Qa`ida or many of these statements are rhetorical the Pakistani Taliban gaining access to hyperbole, the scale of the potential sensitive nuclear material. destructiveness of nuclear weapons, the instability and “nuclear porosity” Pakistan’s Nuclear Safeguards of the context in Pakistan, and the Pakistan has established a robust set About the CTC Sentinel vulnerabilities within Pakistan’s nuclear of measures to assure the security of its The Combating Terrorism Center is an safety and security arrangements nuclear weapons. These have been based independent educational and research mean that the risks of terrorist groups on copying U.S. practices, procedures and institution based in the Department of Social gaining access to nuclear materials are technologies, and comprise: a) physical Sciences at the United States Military Academy, real. Moreover, militants have recently security; b) personnel reliability West Point. The CTC Sentinel harnesses attacked a number of Pakistan’s nuclear programs; c) technical and procedural the Center’s global network of scholars and facilities, including an August 21, 2008 safeguards; and d) deception and practitioners to understand and confront incident at the Wah cantonment, widely secrecy. These measures provide the contemporary threats posed by terrorism and understood to be one of Pakistan’s main Pakistan Army’s Strategic Plans Division other forms of political violence. nuclear weapons assembly sites. (SPD)—which oversees nuclear weapons operations—a high degree of confidence In an effort to provide insight on in the safety and security of the country’s The views expressed in this report are those of the scale of the threat, this article nuclear weapons.2 the authors and not of the U.S. Military Academy, the Department of the Army, or any other agency 1 “Bin Laden has Nuclear Weapons,” BBC, November of the U.S. Government. 2 Lt. Col. Zafar Ali (SPD), Pakistan’s Nuclear Assets and 10, 2001; “Al Qa’ida Threaten to Use Pakistani Nukes,” Threats of Terrorism: How Grave is the Danger? (Washing- Independent, June 22, 2009. ton, D.C.: Henry L. Stimson Center, 2007). 1 JULY 2009 . VOL 2 . ISSUE 7 In terms of physical security, Pakistan intended to ensure that only authorized against its main adversary India, and operates a layered concept of concentric nuclear weapons activities and against the suggestion that its nuclear tiers of armed forces personnel to guard operations occur. It operates a tightly weapons could be either spirited out of nuclear weapons facilities, the use of controlled identification system to the country by a third party (posited to physical barriers and intrusion detectors assure the identity of those involved in be the United States) or destroyed in to secure nuclear weapons facilities, the the nuclear chain of command, and it also the event of a deteriorating situation or physical separation of warhead cores uses a rudimentary Permissive Action a state collapse in Pakistan.9 The fact from their detonation components, Link (PAL) type system to electronically that Pakistan has been willing to fire on and the storage of the components in lock its nuclear weapons. This system U.S. soldiers during the latter’s ground protected underground sites. uses technology similar to the banking incursion into Pakistan’s tribal areas industry’s “chip and pin” to ensure that on September 12, 200810 removes any With respect to personnel reliability, even if weapons fall into terrorist hands debate about whether Pakistan would the Pakistan Army conducts a tight they cannot be detonated.6 use force to resist attempts by the United selection process drawing almost States to secure Pakistan’s nuclear exclusively on officers from Punjab Finally, Pakistan makes extensive use assets without its consent. Similarly, Province who are considered to have of secrecy and deception. Significant the use of U.S. precision strikes to fewer links with religious extremism or elements of Pakistan’s nuclear destroy the weapons would need to with the Pashtun areas of Pakistan from weapons infrastructure are kept a rely on perfect intelligence and would which groups such as the Pakistani closely guarded secret. This includes risk not only significant radiological Taliban mainly garner their support. the precise location of some of the hazards at strike targets, but also the Pakistan operates an analog to the U.S. storage facilities for nuclear core and ire of the Pakistan Army and the wider Personnel Reliability Program (PRP) detonation components, the location of Islamic world. that screens individuals for Islamist preconfigured nuclear weapons crisis sympathies, personality problems, drug Despite these elaborate safeguards, use, inappropriate external affiliations, “The concern, however, empirical evidence points to a clear set and sexual deviancy.3 The army uses of weaknesses and vulnerabilities in staff rotation and also operates a “two- is that most of Pakistan’s Pakistan’s nuclear safety and security person” rule under which no action, nuclear sites are close arrangements. decision, or activity involving a nuclear weapon can be undertaken by fewer to or even within areas Pakistan’s Nuclear Security Weaknesses than two persons.4 The purpose of this dominated by Pakistani When Pakistan was developing its policy is to reduce the risk of collusion nuclear weapons infrastructure in the with terrorists and to prevent nuclear Taliban militants and home 1970s and 1980s, its principal concern weapons technology getting transferred to al-Qa`ida.” was the risk that India would overrun to the black market. In total, between its nuclear weapons facilities in an 8,000 and 10,000 individuals from armored offensive if the facilities were the SPD’s security division and from placed close to the long Pakistan-India Pakistan’s Inter-Services Intelligence deployment sites, aspects of the nuclear border. As a result, Pakistan, with a Directorate (ISI), Military Intelligence command and control arrangements,7 few exceptions, chose to locate much and Intelligence Bureau agencies are and many aspects of the arrangements of its nuclear weapons infrastructure involved in the security clearance for nuclear safety and security (such as to the north and west of the country and monitoring of those with nuclear the numbers of those removed under and to the region around Islamabad weapons duties.5 personnel reliability programs, the and Rawalpindi—sites such as Wah, reasons for their removal, and how Fatehjang, Golra Sharif, Kahuta, Despite formal command authority often authenticating and enabling Sihala, Isa Khel Charma, Tarwanah, structures that cede a role to Pakistan’s (PAL-type) codes are changed). In and Taxila.11 The concern, however, is civilian leadership, in practice the addition, Pakistan uses deception— that most of Pakistan’s nuclear sites are Pakistan Army has complete control such as dummy missiles—to complicate close to or even within areas dominated over the country’s nuclear weapons. the calculus of adversaries and is likely by Pakistani Taliban militants and home It imposes its executive authority to have extended this practice to its to al-Qa`ida. over the weapons through the use of nuclear weapons infrastructure. an authenticating code system down The Pakistani Taliban and al-Qa`ida are through the command chains that is Taken together, these measures provide more than capable of launching terrorist confidence that the Pakistan Army attacks in these areas, including within 3 Shaun Gregory, “Nuclear Command and Control in can fully protect its nuclear weapons Islamabad and Rawalpindi. They 8 Pakistan,” Defense and Security Analysis 23:3 (2007). against the internal terrorist threat, 4 Cotta-Ramusino and Maurizio Martelline, Nuclear 9 “US Has Plans to Secure Pakistan’s Nuclear Weap- Safety, Nuclear Stability and Nuclear Strategy in Pakistan 6 David Blair, “Code Changes ‘Secure’ Pakistan War- ons,” Daily Times, May 16, 2009. (Como, Italy: Landau Network, 2002). heads,” Daily Telegraph, February 9, 2004. 10 “Shots Fired in US-Pakistan Clash,” BBC, September 5 Personal interview, General Kidwai, Director General 7 This includes the issue of pre-delegation during crises. 25, 2008. of the SPD, Islamabad, March 2005; Personal interview, 8 “Zardari Says Pakistan’s
Recommended publications
  • Understanding African Armies
    REPORT Nº 27 — April 2016 Understanding African armies RAPPORTEURS David Chuter Florence Gaub WITH CONTRIBUTIONS FROM Taynja Abdel Baghy, Aline Leboeuf, José Luengo-Cabrera, Jérôme Spinoza Reports European Union Institute for Security Studies EU Institute for Security Studies 100, avenue de Suffren 75015 Paris http://www.iss.europa.eu Director: Antonio Missiroli © EU Institute for Security Studies, 2016. Reproduction is authorised, provided the source is acknowledged, save where otherwise stated. Print ISBN 978-92-9198-482-4 ISSN 1830-9747 doi:10.2815/97283 QN-AF-16-003-EN-C PDF ISBN 978-92-9198-483-1 ISSN 2363-264X doi:10.2815/088701 QN-AF-16-003-EN-N Published by the EU Institute for Security Studies and printed in France by Jouve. Graphic design by Metropolis, Lisbon. Maps: Léonie Schlosser; António Dias (Metropolis). Cover photograph: Kenyan army soldier Nicholas Munyanya. Credit: Ben Curtis/AP/SIPA CONTENTS Foreword 5 Antonio Missiroli I. Introduction: history and origins 9 II. The business of war: capacities and conflicts 15 III. The business of politics: coups and people 25 IV. Current and future challenges 37 V. Food for thought 41 Annexes 45 Tables 46 List of references 65 Abbreviations 69 Notes on the contributors 71 ISSReportNo.27 List of maps Figure 1: Peace missions in Africa 8 Figure 2: Independence of African States 11 Figure 3: Overview of countries and their armed forces 14 Figure 4: A history of external influences in Africa 17 Figure 5: Armed conflicts involving African armies 20 Figure 6: Global peace index 22 Figure
    [Show full text]
  • An Analysis of Violent Nonstate Actor Organizational Lethality and Network Co-Evolution in the Middle East and North Africa
    An Analysis of Violent Nonstate Actor Organizational Lethality and Network Co-Evolution in the Middle East and North Africa Multi-Agency, Multi-Method Assessment to Counter-ISIL Messaging by Means of Maneuver and Engagement in Narrative Space February 10, 2016 National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence Led by the University of Maryland 8400 Baltimore Ave., Suite 250 • College Park, MD 20742 • 301.405.6600 www.start.umd.edu National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence About This Report The authors of this report are Victor Asal, University at Albany, R. Karl Rethemeyer, University at Albany and Joseph Young, American University. Questions about this report should be directed to Victor Asal at [email protected] This research was supported by the Department of Homeland Security Science and Technology Directorate’s Office of University Programs through Award Number 2012-ST-061-CS0001. The views and conclusions contained in this document are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied, of the Department of Homeland Security Science and Technology Directorate’s Office of University Programs, U.S. Department of Homeland Security or START. About START The National Consortium for the Study of Terrorism and Responses to Terrorism (START) is supported in part by the Science and Technology Directorate of the U.S. Department of Homeland Security through a Center of Excellence program led by the University of Maryland.
    [Show full text]
  • The Al Qaeda Network a New Framework for Defining the Enemy
    THE AL QAEDA NETWORK A NEW FRAMEWORK FOR DEFINING THE ENEMY KATHERINE ZIMMERMAN SEPTEMBER 2013 THE AL QAEDA NETWORK A NEW FRAMEWORK FOR DEFINING THE ENEMY KATHERINE ZIMMERMAN SEPTEMBER 2013 A REPORT BY AEI’S CRITICAL THREATS PROJECT ABOUT US About the Author Katherine Zimmerman is a senior analyst and the al Qaeda and Associated Movements Team Lead for the Ameri- can Enterprise Institute’s Critical Threats Project. Her work has focused on al Qaeda’s affiliates in the Gulf of Aden region and associated movements in western and northern Africa. She specializes in the Yemen-based group, al Qaeda in the Arabian Peninsula, and al Qaeda’s affiliate in Somalia, al Shabaab. Zimmerman has testified in front of Congress and briefed Members and congressional staff, as well as members of the defense community. She has written analyses of U.S. national security interests related to the threat from the al Qaeda network for the Weekly Standard, National Review Online, and the Huffington Post, among others. Acknowledgments The ideas presented in this paper have been developed and refined over the course of many conversations with the research teams at the Institute for the Study of War and the American Enterprise Institute’s Critical Threats Project. The valuable insights and understandings of regional groups provided by these teams directly contributed to the final product, and I am very grateful to them for sharing their expertise with me. I would also like to express my deep gratitude to Dr. Kimberly Kagan and Jessica Lewis for dedicating their time to helping refine my intellectual under- standing of networks and to Danielle Pletka, whose full support and effort helped shape the final product.
    [Show full text]
  • In This Issue
    VOLUME VIII, ISSUE 5 u FEBRUARY 4, 2010 IN THIS ISSUE: BRIEFS...................................................................................................................................1 TAKING AL-QAEDA’s jIHAD TO FACEBOOK By Murad Batal al-Shishani..................................................................................................3 TURKISH JIHADIS RESPOND TO ANKARA’s antI-AL-QAEDA OPERATIONS A By Brian Glyn Williams and Bilun Erim................................................................................4 Anti-al-Qaeda Raids, Turkey PAKISTan’s MILITARY EXAMINES ITS OPTIONS IN NORTH WAZIRISTAN By Lieutenant General Talat Masood..................................................................................6 Terrorism Monitor is a publication of The Jamestown Foundation. A GUIDE TO MILITANT GROUPS IN KASHMIR The Terrorism Monitor is By Arif Jamal.........................................................................................................................8 designed to be read by policy- makers and other specialists yet be accessible to the general public. The opinions expressed within are solely those of the authors and do not necessarily MAURITANIA’S IMPRISONED ISLAMISTS DEBATE JIHAD WITH reflect those of The Jamestown RELIGIOUS SCHOLARS ON PUBLIC TELEVISION Foundation. Buoyed by the successful transition of power after recent elections and the reconciliation of the government and opposition, Mauritania is now taking the Unauthorized reproduction or redistribution of this or any unprecedented step
    [Show full text]
  • An Analysis of Kenya and Ethiopia's Interest in Somalia
    UNIVERSITY OF NAIROBI INSTITUTE OF DIPLOMACY AND INTERNATIONAL STUDIES (IDIS) REGIONAL POWERS AND CONFLICT MANAGEMENT: AN ANALYSIS OF KENYA AND ETHIOPIA’S INTEREST IN SOMALIA YUSSUF ABDILLE ABDI R52/81437/2015 A Research Project submitted in partial fulfilment for the award of the Degree in Masters of Arts in International Conflict Management, Institute of Diplomacy and International Studies, University of Nairobi. 2017 i DECLARATION This project is my original work and has not been submitted for another Degree in any other University Signature ……………………………..…Date……………………………………. Yussuf Abdille Abdi R52/81437/2015 This project has been submitted for examination with my permission as the University supervisor Signature………………………………...Date…………………………………… P. Maluki ii ACKNOWLEDGEMENT My special thanks to God for giving me good health, provision and strength throughout the entire course. I also wish to acknowledge the efforts of my family members especially my dad, mum brothers and sisters for their moral support and encouragement throughout the entire research period. I also take this opportunity to acknowledge the professional and intellectual support and advice of my supervisor Dr. Patrick Maluki who guided me in writing this project proposal. Finally, I owe very special thanks to all my M.A. classmates for their encouragement and unfailing support. iii DEDICATION To my wife, Halima Ibrahim for her encouragement and financial support iv ABSTRACT This study explored regional powers and conflict management with a special focus to the interest of Kenya and Ethiopia’s in Somalia and how the interest has affected the Somalia situations. The main objective of this Research Paper was to establish the factors that have hampered resolution of Somalia conflict; to establish the effect of the interest of Kenya and Ethiopia in the Somalia conflict; and to identify strategies that can lead to peace in Somalia considering the interest of Kenya and Ethiopia.
    [Show full text]
  • European Union Training Mission Somalia
    European Union Training Mission Somalia PRESS SUMMARY 22nd November 2018 “In ‘Media’ stat virtus” EUTM - SOMALIA 22/11/2018 SUMMARY TITLE PAGE US airstrike in Somalia against al-Shabab kills 7 extremists 2 Somali military says 13 militants killed in Marka fighting 3 Regional Economic Integration Not Good For Somalia, Claims 4 Former President BRA lacks budget plan, can’t account for $16.6m-parliamentary 5 report ICRC Staff, German Citizen Abducted In Somalia Rescued Last Night 7 Two employees of Somali telecom giant killed in Somali capital 8 Somali' gunmen abduct Italian aid worker during shootout in Kenya 9 Leadership Crisis Caused Freeze of Statebuilding Efforts in Somalia 10 We Can’t Talk Unity Till Mogadishu Changes Cause, President Bihi 14 UN police officer recognized for protecting vulnerable Somali 15 women from abuse Terrorism in East Africa 17 Siyaad Barre was a Nationalist, regardless of his shortcomings 25 Djibouti’s Mysterious Absence from Horn of Africa Reintegration: 29 Who is to blame? EUTM - SOMALIA 1 EUTM - SOMALIA 22/11/2018 US airstrike in Somalia against al-Shabab kills 7 extremists 21 November 2018 The U.S. military says it has carried out an airstrike in central Somalia targeting al-Shabab that killed seven extremists. The U.S. Africa Command statement says Tuesday's airstrike occurred in Quy Cad in the Mudug region. The strike was carried out a day after two other U.S. airstrikes killed 37 extremists with the al-Qaida-linked al-Shabab. Like the previous statement, this one says it believes no civilians were killed or injured.
    [Show full text]
  • State Collapse, Insurgency and Counterinsurgency
    Visit our website for other free publication downloads http://www.StrategicStudiesInstitute.army.mil/ To rate this publication click here. The United States Army War College The United States Army War College educates and develops leaders for service at the strategic level while advancing knowledge in the global application of Landpower. The purpose of the United States Army War College is to produce graduates who are skilled critical thinkers and complex problem solvers. Concurrently, it is our duty to the U.S. Army to also act as a “think factory” for commanders and civilian leaders at the strategic level worldwide and routinely engage in discourse and debate concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and strategic research and analysis to influence policy debate and bridge the gap between military and academia. The Center for Strategic Leadership and Development CENTER for contributes to the education of world class senior STRATEGIC LEADERSHIP and DEVELOPMENT leaders, develops expert knowledge, and provides U.S. ARMY WAR COLLEGE solutions to strategic Army issues affecting the national security community. The Peacekeeping and Stability Operations Institute provides subject matter expertise, technical review, and writing expertise to agencies that develop stability operations concepts and doctrines. U.S. Army War College The Senior Leader Development and Resiliency program supports the United States Army War College’s lines of SLDR effort
    [Show full text]
  • Proxy Wars: the Intrigues Leading to Kenya's Invasion of Somalia,Trust
    The Invisible Clan: Is Somalia Ready for a Women’s Revolution? By Rasna Warah To my daughter I will say, ‘When the men come, set yourself on fire’. –Warsan Shire The gang rape and murder of 12-year-old Aisha Ilyas Adan, whose body was found outside her family’s house in the town of Galkayo in central Somalia last month, has galvanised Somali women to fight against a vice that has often been described as a “normalised” epidemic. Under the hashtag #WeAreNotSafe, Somali activists are demanding that the authorities take rape cases more seriously. Rape is one of the unspoken taboos in war-torn Somali society that few in the international development community, and Somalis themselves, have been reluctant to confront – even though it has become a constant feature of Somali women’s lives since the collapse of the Somali state in 1991. Anarchy and lawlessness have embedded a culture of violence that allow men to rape with impunity. Women paid a double price during Somalia’s civil war: not only were they expected to become breadwinners, they also became casualties of conflicts as clans fought each other for supremacy and as the country’s institutions collapsed. Rape was often used as a weapon of war. A survey by Trust Law, a project of the Thomson Reuters Foundation, has stated that Somalia is one of the worst places in the world to be a woman. Most rapes in Somalia go unreported and unpunished. The few women who dare to report their cases to the authorities face a hostile audience.
    [Show full text]
  • Volume VIII, Issue 10 March 11, 2010
    VOLUME VIII, ISSUE 10 u MARCH 11, 2010 IN THIS ISSUE: BRIEFS...................................................................................................................................1 DRONE ATTACKS: PAKISTan’s POLICY AND THE TRIBESMEn’s PERSPECTIVE By Farhat Taj..........................................................................................................................3 KURDISH COUNTERTERRORISM GROUP WORKS TO PREVENT TERRORISM IN KURDISTAN AND IRAQ A By Wladimir van Wilgenburg................................................................................................4 Lahur Talabani KASHMIR’s mILITANTS MAY DERAIL INDIA-PAKISTAN NEGOTIATIONS By Arif Jamal.........................................................................................................................6 Terrorism Monitor is a publication of The Jamestown Foundation. The Terrorism Monitor is WILL XINJIang’s tuRKISTANI ISLAMIC PARTY SURVIVE THE DRONE MISSILE designed to be read by policy- DEATH OF ITS LEADER? makers and other specialists By Andrew McGregor...........................................................................................................7 yet be accessible to the general public. The opinions expressed within are solely those of the authors and do not necessarily SOMALIA’S HIZB AL-ISLAM PLEDGES TO RETAKE TERRITORY LOST reflect those of The Jamestown TO AL-SHABAAB RIVALS Foundation. Senior Hizb al-Islam commander Shaykh Ahmad Madobe has declared that Hizb al-Islam is preparing plans to expel rival Islamist militia al-Shabaab
    [Show full text]
  • Changing Gulf Dynamics in Somalia's Upcoming Elections,The 'Othering
    Somalia: Let My People Vote - Part I By The Elephant The leadership of Somalia have in recent years juggled different electoral postures that accounts for its ethnic, clan and geopolitical issues. In the end, though each of these political set-ups fray just before or soon after the election as is currently being witnessed through the 2020/2021 electoral cycle. As Pauline Otieno-Skaper, moderator Mr Peter Chonka, Mahad Wasuge of Somali Public Agenda, and Islamic Finance Expert Dr Issa elaborate, this may just prove to be the country’s eternal posture of agility, dynamism, and deal-making. Published by the good folks at The Elephant. The Elephant is a platform for engaging citizens to reflect, re-member and re-envision their society by interrogating the past, the present, to fashion a future. Follow us on Twitter. Somalia: Let My People Vote - Part I By The Elephant When former prime minister Mohamed Abdullahi Farmaajo was elected president of the Federal Government of Somalia in 2017, many lauded his victory. Unlike his predecessors, Farmaajo was viewed as a leader who would unite the country because he had a nationalistic mindset and was someone who was not influenced by clan interests. Many believed that, unlike his predecessor, Hassan Sheikh, whose tenure was marred by corruption allegations and in-fighting, he would bring together a country that has remained fragmented along clan lines and endured internal conflicts for decades. He was also perceived to be someone who would address corruption that has been endemic in every Somali government since the days of President Siad Barre.
    [Show full text]
  • The Terrorist Threat to Pakistan's Nuclear Weapons
    JULY 2009 . VOL 2 . ISSUE 7 COMBATING TERRORISM CENTER AT WEST POINT CTC Sentinel OBJECTIVE . RELEVANT . RIGOROUS Contents The Terrorist Threat to FEATURE ARTICLE Pakistan’s Nuclear Weapons 1 The Terrorist Threat to Pakistan’s By Shaun Gregory Nuclear Weapons By Shaun Gregory REPORTS 4 The Significance of Qari Zain’s Assassination in Pakistan By Rahimullah Yusufzai 7 Pakistan’s New Offensive in South Waziristan By Samir Syed 9 A Diagnosis of Somalia’s Failing Transitional Government By Anonymous 12 The Status of Conflict in the Southern and Central Regions of Somalia By Michael A. Weinstein 15 A New Phase of Resistance and Insurgency in Iranian Baluchistan By Chris Zambelis 18 Incorporating Law Enforcement Interrogation Techniques on the Battlefield Pakistani Army soldiers guarding nuclear-capable missiles. - Photo by Rizwan Tabassum/AFP/Getty Images By Gretchen Peters l-qa`ida has made numerous will first outline Pakistan’s current 21 Recent Highlights in Terrorist Activity statements about a desire nuclear safeguards, and then identify 24 CTC Sentinel Staff & Contacts to obtain nuclear weapons a series of weaknesses in the country’s for use against the United nuclear security that could result in AStates and Western interests.1 While terrorist groups such as al-Qa`ida or many of these statements are rhetorical the Pakistani Taliban gaining access to hyperbole, the scale of the potential sensitive nuclear material. destructiveness of nuclear weapons, the instability and “nuclear porosity” Pakistan’s Nuclear Safeguards of the context in Pakistan, and the Pakistan has established a robust set About the CTC Sentinel vulnerabilities within Pakistan’s nuclear of measures to assure the security of its The Combating Terrorism Center is an safety and security arrangements nuclear weapons.
    [Show full text]
  • The Foreign Fighter Problem: Recent Trends and Case Studies
    Program on National Security at the FOREIGN POLICY RESEARCH INSTITUTE Al-Qaeda al-Shabaab AQIM AQAP Central The Foreign Fighters Problem, Recent Trends and Case Studies: Selected Essays Edited by Michael P. Noonan Managing Director, Program on National Security April 2011 Copyright Foreign Policy Research Institute (www.fpri.org). If you would like to be added to our mailing list, send an email to [email protected], including your name, address, and any affiliation. For further information or to inquire about membership in FPRI, please contact Alan Luxenberg, [email protected] or (215) 732-3774 x105. FPRI 1528 Walnut Street, Suite 610 • Philadelphia, PA 19102-3684 Tel. 215-732-3774 • Fax 215-732-4401 About FPRI Founded in 1955, the Foreign Policy Research Institute is a 501(c)(3) nonprofit organization devoted to bringing the insights of scholarship to bear on the development of policies that advance U.S. national interests. We add perspective to events by fitting them into the larger historical and cultural context of international politics. About FPRI’s Program on National Security The end of the Cold War ushered in neither a period of peace nor prolonged rest for the United States military and other elements of the national security community. The 1990s saw the U.S. engaged in Iraq, Somalia, Haiti, Bosnia-Herzegovina, Kosovo, and numerous other locations. The first decade of the 21st century likewise has witnessed the reemergence of a state of war with the attacks on 9/11 and military responses (in both combat and non-combat roles) globally. While the United States remains engaged against foes such as al-Qa`ida and its affiliated movements, other threats, challengers, and opportunities remain on the horizon.
    [Show full text]