Semi-Proxy Wars and U.S. Counterterrorism Strategy

Total Page:16

File Type:pdf, Size:1020Kb

Semi-Proxy Wars and U.S. Counterterrorism Strategy Studies in Conflict & Terrorism ISSN: 1057-610X (Print) 1521-0731 (Online) Journal homepage: https://www.tandfonline.com/loi/uter20 Semi-Proxy Wars and U.S. Counterterrorism Strategy R. Kim Cragin To cite this article: R. Kim Cragin (2015) Semi-Proxy Wars and U.S. Counterterrorism Strategy, Studies in Conflict & Terrorism, 38:5, 311-327, DOI: 10.1080/1057610X.2015.1018024 To link to this article: https://doi.org/10.1080/1057610X.2015.1018024 Published online: 25 Mar 2015. Submit your article to this journal Article views: 1990 View Crossmark data Citing articles: 1 View citing articles Full Terms & Conditions of access and use can be found at https://www.tandfonline.com/action/journalInformation?journalCode=uter20 Studies in Conflict & Terrorism, 38:311–327, 2015 Copyright Ó Taylor & Francis Group, LLC ISSN: 1057-610X print / 1521-0731 online DOI: 10.1080/1057610X.2015.1018024 Semi-Proxy Wars and U.S. Counterterrorism Strategy R. KIM CRAGIN RAND Corporation Arlington, VA, USA On 4 February 2014, Al Qaeda leaders in Pakistan (aka Al Qaeda Central) repudiated Abu Bakr al-Baghdadi, the leader of Al Qaeda in Iraq. Ayman al-Zawahiri declared that al-Baghdadi and his newly formed Islamic State in Iraq and the Levant (ISIL) were no longer part of Al Qaeda’s organization and Al Qaeda Central could not be held responsible for ISIL’s behavior. It represents the first time that Al Qaeda Central has renounced an affiliate publicly. The announcement was driven by months of fighting between ISIL and Jabhat al-Nusra, another Al Qaeda affiliate in Syria. In fact, in Syria, Al Qaeda fighters are competing against each other for influence, as well as against other opposition groups, the Syrian regime, the Islamic Revolutionary Guard Corps, Iraqi militiamen, and Lebanese Hezbollah. This chaotic, semi-proxy war is unlike any previous problem encountered, made even more challenging by the limited U.S. presence on-the-ground. More worrisome, this semi-proxy war also has spread beyond Syria. Similar dynamics have emerged in Iraq, Yemen, and Lebanon to a certain extent. This article argues that these dynamics necessitate a twist in U.S. counterterrorism strategy. On 21 August 2013, a series of missiles containing the sarin nerve agent detonated in vil- lages outside of Damascus, Syria. Reports on the number of casualties varied widely. According to the Violations Documentation Centre, the attacks killed 588 civilians, including 135 women and 108 children, while the U.S. government estimated the number of fatalities to be as high as 1,429.1 Either way, this attack represented the most severe use of chemical weapons against civilians since Saddam Hussein killed thousands of Kurdish residents of Halabja in March 1988.2 The attack also magnified concerns in the international community about the possibility of non-state actors, such as Al Qaeda or Lebanese Hezbollah, obtaining chemical weapons from Syria’s arsenal. Likewise, by the time of this sarin attack, significant numbers of Al Qaeda foreign fighters, Hezbollah operatives, and Iraqi Shi’a militiamen had entered Syria. One report estimated that approximately 8,500 foreign fighters had joined Syria’s opposition forces between 2011 and 2013, of which 1,900 came from Western Europe.3 By January 2015, these numbers had increased to an astounding 19,000 foreign fighters from 90 countries.4 To counter these, Hezbollah initially sent 2,000 operatives to support Bashar al-Assad, along with approximately 5,000 Shi’a fighters from Iraq and 4,000 from Iran’s Islamic Revolutionary Guard Corps (IRGC) between 2011 and 2013.5 And, like Al Qaeda’s Received 17 February 2014; accepted 25 April 2014. Address correspondence to R. Kim Cragin, RAND Corporation, 1200 S. Hayes St., Arlington, VA 22202, USA. E-mail: [email protected] 311 312 R. K. Cragin foreign fighters, this Shi’a coalition also has more than doubled its support to Bashar al-Assad since 2013.6 Thus, beyond the threat of non-state actors obtaining chemical weapons, the conflict raised concerns of a spillover beyond Syria and Iraq to other coun- tries in the Middle East, North Africa, Europe, and North America. These combined threats—the potential acquisition of chemical materials by non-state adversaries and an escalating competition between them regionally if not globally— necessitates a twist in U.S. counterterrorism strategy. That is, in Syria, Al Qaeda fighters are competing against each other for influence, as well as against other opposition groups, the Syrian regime, IRGC, Iraqi militiamen, and Hezbollah. This chaotic, semi-proxy war, is unlike any previous problem encountered both in its nature and scale, made even more challenging by the limited U.S. presence on-the-ground. More worrisome, this semi- proxy war has spread beyond Syria. Similar dynamics have emerged in Iraq, Yemen, and Lebanon, requiring the U.S. government to develop a new approach to mitigating the impact of these semi-proxy wars. Why a “semi-proxy” war? Generally speaking, the term “proxy war” refers to a con- flict in which countries oppose each other indirectly, through the use of surrogates, typi- cally in a third country. And, in fact, numerous experts and popular commentators have argued that the conflict in Syria goes beyond a civil war; it has become a proxy war between Iran and Saudi Arabia. 7 Yet this description is somewhat deceiving. It presents the conflict in a traditional Cold War framework, with external state actors influencing the behavior of internal state or non-state actors. While this certainly exists in Syria, this more traditional understanding of a proxy war minimizes the role of external non-state actors.8 In Syria, external non-state actors—particularly Al Qaeda and Hezbollah—have changed the nature of the conflict.9 They also represent the primary threat to U.S. national security interests in the region and beyond. So this article utilizes the term, “semi-proxy war,” to underscore the importance of external non-state actors on this and other conflicts. Specifically, this article addresses the ongoing competition for influence between Al Qaeda, Lebanese Hezbollah, and its allies. By “its allies,” this article mostly refers to Iran, because it is difficult to examine Hezbollah’s external operations without discussing Iran. And, while this article focuses primarily on the conflict in Syria, similar patterns undeniably exist elsewhere. Moreover, while some might articulate that it is in the best interest of the United States for its adversaries to fight, this present article argues other- wise. The competition is at best destabilizing and, at worst, threatens U.S. national secu- rity. The U.S. government, therefore, cannot merely observe this escalating competition, but instead must find a way to mitigate its effects. This article is organized into three sections. The first section provides further discus- sion on the historical context of the competition between Al Qaeda’s network, Hezbollah, and its allies. Next, the article examines the ongoing conflict in Syria, including the nature of the competition between these actors, and its relevance to U.S. national security. The final section proposes a way forward for the U.S. national security community. Historical Context Much has been written about the divide between Sunni and Shi’a communities in the Mus- lim World.10 This historical enmity has its origins in a struggle for succession to the Prophet Mohammad: a portion of his followers, now referred to as Shi’a, believed that the Prophet’s successor should come from his family, while others, referred to as Sunnis, wanted their leader to be selected by an inner circle of senior advisors. Religious zealots in both Semi-Proxy Wars and U.S. Counterterrorism Strategy 313 communities believe the others to be apostates.11 These ideological tensions have erupted periodically in the political realm and upset regional stability, especially in the Arab world. Most recently, the “Arab Spring” re-exposed some of these underlying tensions. For example, in Bahrain, Shi’a citizens and residents marched against their Sunni-led monar- chy. In response to these protests, King Hamad al-Khalifa accused the Iranian govern- ment of fomenting unrest and the Kingdom of Saudi Arabia sent soldiers to his aid.12 Further, in November 2013, a bomb exploded outside the Iranian embassy in Beirut; the attack was claimed by Al Qaeda, causing concern among experts that the conflict in Syria would spark sectarian tensions in Lebanon.13 More recently, Huthi militias converged on the Presidential compound in Sanaa, Yemen, in January 2015.14 In most of these uprisings, Al Qaeda has represented a small and insignificant actor. But, increasingly, Al Qaeda fighters have found themselves in direct opposition to Leba- nese Hezbollah, Shi’a militias, and, equally important, Iranian interests. This opposition has not always been the case in past conflicts. During the 1980s, for example, Al Qaeda’s precursor, Maktab al-Khidamat (MAK), maintained offices in Iran in support of the first Afghan war. The presence of these offices suggests that Iran’s regime at the very least believed that MAK activities did not undermine its interests. MAK’s publication, al- Jihad, subsequently reported in August 1985 that it was forced to close offices in twelve provinces because the Iranian government had become more “obstructionist.”15 This on-again-off-again relationship between Al Qaeda and Iran continued through- out the 1990s and extended past the September 2001 attacks in the United States. Iran reportedly provided training to Al Qaeda fighters in Lebanon in the mid-1990s.16 And, after U.S. forces invaded Afghanistan in 2001, Iran gave refuge to numerous fleeing Al Qaeda fighters. This refuge soon thereafter turned into a house arrest: Al Qaeda members could remain in Iran, away from family, or risk death by U.S.
Recommended publications
  • Terrorism and Information Operations
    Information Operations and Terrorism Dorothy E. Denning August 18, 2005 INTRODUCTION The term “terrorism” generally refers to physical acts of violence intended to inculcate fear. It conjures up images of bombs exploding, bodies mutilated, and innocent lives lost. Behind the physical assaults, however, is another dimension of terrorism. It is the information dimension, and terrorists exploit it every bit as much as the physical. Their ultimate goal goes beyond the death and destruction they leave behind. It is power and influence. Terrorists seek a change, and their objective is to influence populations in ways that support that change. To do that, they engage in both physical and information operations, and they integrate those operations together. The objective of this paper is to explore how terrorists use information operations (IO) to support their physical attacks and broader goals. The paper uses as a framework the components of IO promulgated in U.S. Department of Defense doctrine. While there is no reason to believe that terrorists follow U.S. military doctrine or even anything similar, the doctrine provides a conceptual basis for organizing the discussion. Most of the discussion focuses on al-Qa’ida and the transnational jihadist movement comprising individuals and groups loosely bound by al-Qa’ida’s radical Islamic ideology, but operating independently. The movement is said to consist of dozens of radical Islamic groups, who have been trained and financed by al-Qa’ida or who collaborate with al-Qa’ida. It includes thousands of Muslim militants who have trained together in Afghanistan and elsewhere (now Iraq), and an untold number who have been caught up by bin Laden’s worldview.1 Two principle types of sources are used.
    [Show full text]
  • Al-Qaeda's Terrorist Threat to UNIFIL
    Al-Qaeda’s Terrorist Threat to UNIFIL June 2007 Bilal Y. Saab – The Saban Center for Middle East Policy at The Brookings Institution Magnus Ranstorp – The Center for Asymmetric Threat Studies (CATS) at the Swedish National Defence College On August 11, 2006, in response to the 34-day summer war between Israel and Hizb’allah, the United Nations Security Council passed resolution 1701, which called for a more robust international military presence along the United Nations-drawn Blue Line dividing Israel and southern Lebanon. But the strengthened United Nations Interim Force in Lebanon (UNIFIL) is likely to face a range of security threats that could undermine its peacekeeping duties and endanger its personnel. Among the more serious threats, underscored by intelligence reports over the past few years that indicate a growing al-Qaeda presence in Lebanon, is a catastrophic terrorist attack against UNIFIL by local salafist jihadist entities. UNIFIL IS WORRIED Since its deployment, UNIFIL has publicly voiced concerns about a terrorist attack by al- Qaeda, not Hizb’allah, against its troops.1 These legitimate concerns have been reinforced by stern (yet unsubstantiated) warnings issued by Lebanese, Israeli and Western officials about al-Qaeda’s growing presence in Lebanon.2 For UNIFIL, the ongoing violent clashes between al-Qaeda inspired Islamic militants and the Lebanese Army, which erupted May 20 in northern Lebanon, have only heightened its sense of insecurity. Concerned about the safety of their troops, UNIFIL commanders do not have the
    [Show full text]
  • Capstone – Inss 5390 Dr
    PAIGE COSTANZI CAPSTONE – INSS 5390 DR. VALERO 10 DECEMBER 2016 The Islamic State’s Information Warfare: Social Media and Propaganda Engineering For decades, the United States has faced a growing threat of Islamist terrorism towards the homeland. The rise of the self-identified Islamic State, commonly known as ISIL or ISIS1, has been effectively utilizing social media outlets as an informational instrument to promote its cause, recruit more members, and cause havoc amongst the globe. Through various social media platforms, movies (i.e. The Flames of War), YouTube videos, and their very own online multi- language magazine Dabiq, which has recently been replaced with their new online multi- language magazine Rumiyah, the Islamic State has become adept at manipulating media to gain support and create an ideological movement. “The analysis of the digital audiovisual campaigns released by ISIS since January 2014 suggests that ISIS has established a new kind of terrorism, using marketing and digital communication tools not only for “socializing terror” through public opinion as previous terrorist groups did, but also for making terror popular, desirable, and imitable.”2 The Islamic State is well funded, organized, and grounded in the authority of religious texts and words of Islamic scholars. It now controls multiple border crossings along with various weapons and infrastructures throughout their controlled territory in Syria and Iraq. Their extreme violence and use of various media outlets for recruitment and scare tactics is a growing concern in this fight. The Islamic State has developed new tactics, to include a multi-million dollar media campaign, to create a unified worldwide Islamic State with Sharia Law as the basis.
    [Show full text]
  • Sayyid Qutb's Ties to Extremists
    Sayyid Qutb’s Ties to Extremists www.counterextremism.com | @FightExtremism Sayyid Qutb’s Ties to Extremists Key Points Qutb was a chief ideologue of the Muslim Brotherhood in Egypt who was also widely popular on the Egyptian street. The Egyptian government executed him in 1966 for promoting the overthrow of the state. Qutb popularized the concepts of takfir— excommunication of Muslim apostates—and jahiliyya— the deplorable state of ignorance prior to the revelation of the Quran that has enveloped the secular Muslim community as well as non-Muslims. Qutb wrote that only the creation of an Islamic state ruled by sharia (Islamic law) could end the state of jahiliyya. Qutb is widely considered the progenitor of the modern jihadist movement as his writings directly inspired the Muslim Brotherhood and notorious extremists who passed through the organization, including Osama bin Laden of al-Qaeda, Abu Bakr al- Baghdadi of ISIS, and the founders of Palestinian Islamic Jihad. 1 2 Often referred to as the father of modern Islamism, Egyptian author Sayyid Qutb was a lead theologian of the Muslim Brotherhood in the mid-20th century. Qutb’s hardline interpretations of the Quran and his excoriation of the failures of Western society inspired the modern jihadist movement and led the Egyptian government to execute him in 1966. His influence can be seen in violent groups such as al-Qaeda, ISIS, and the Taliban, and among such notable extremists such as Osama bin Laden, Abu Bakr al- Baghdadi, and Khalid Sheikh Mohammed. Terrorism expert Paul Berman at one point dubbed Qutb “the intellectual hero of every one of the groups that eventually went into Al Qaeda, their Karl Marx (to put it that way), their guide.”1 Qutb’s writings helped inform the Islamist ideology known as Qutbism, which advocates violent jihad—including the killing of secular Muslims—in order to implement sharia (Islamic law).
    [Show full text]
  • Terrorism, Crime, and Public Policy
    This page intentionally left blank Terrorism, Crime, and Public Policy Terrorism, Crime, and Public Policy describes the problem of terrorism; compares it to other forms of aggression, particularly crime and war; and discusses policy options for dealing with the problem. It focuses on the causes of terrorism with the aim of understanding its roots and providing insights toward policies that will serve to prevent it. The book serves as a single-source reference on terrorism and as a platform for more in-depth study, with a set of discussion questions at the end of each chapter. Individual chapters focus on the nature of terrorism, theories of aggression and terrorism, the history of terrorism, globalization vs. clash, the role of religion, nonreligious extrem- ism and terrorism, the role of technology, terrorism throughout the modern world, responses to terrorism, fear of terrorism, short-term approaches and long-term strategies for preventing terrorism, balancing security and rights to liberty and privacy, and pathways to a safer and saner twenty-first century. Brian Forst joined the American University faculty after twenty years in nonprofit research, including positions as research director at the Institute for Law and Social Research and the Police Foundation. He is the author most recently of After Terror (with Akbar Ahmed, 2005); Errors of Justice: Nature, Sources, and Remedies (Cambridge University Press, 2004); and The Privatization of Policing: Two Views (with Peter Manning, 1999). He is a member of the American University Senate and chairs the Department of Justice, Law, and Society’s doctoral program. He is also a voting member of the Sentencing Commission for the District of Columbia.
    [Show full text]
  • Center on Terrorism, Extremism, and Counterterrorism
    Center on Terrorism, Extremism, and Counterterrorism www.middlebury.edu/institute/academics/centers-initiatives/ctec The Center on Terrorism, Extremism, and Counterterrorism (CTEC) conducts in- depth research on terrorism and other forms of extremism. Formerly known as the Monterey Terrorism Research and Education Program, CTEC collaborates with world-renowned faculty and their graduate students in the Middlebury Institute’s Nonproliferation and Terrorism Studies degree program. CTEC’s research informs private, government, and multilateral institutional understanding of and responses to terrorism threats. Middlebury Institute for International Studies at Monterey www.miis.edu The Middlebury Institute for International Studies at Monterey provides international professional education in areas of critical importance to a rapidly changing global community, including international policy and management, translation and interpretation, language teaching, sustainable development, and nonproliferation. We prepare students from all over the world to make a meaningful impact in their chosen fields through degree programs characterized by immersive and collaborative learning, and opportunities to acquire and apply practical professional skills. Our students are emerging leaders capable of bridging cultural, organizational, and language divides to produce sustainable, equitable solutions to a variety of global challenges. Center on Terrorism, Extremism, and Counterterrorism Middlebury Institute of International Studies 460 Pierce Street Monterey, CA 93940, USA Tel: +1 (831) 647-4634 The views, judgments, and conclusions in this report are the sole representations of the authors and do not necessarily represent either the official position or policy or bear the endorsement of CTEC or the Middlebury Institute of International Studies at Monterey. © The President and Trustees of Middlebury College, 2019 ASSESSING THE RISK OF ISLAMIST TERRORISTS USING HUMAN VECTORS TO DEPLOY CONTAGIOUS PATHOGENS Jeffrey M.
    [Show full text]
  • Allison and Barnes
    THE INSTITUTE FOR MIDDLE EAST STUDIES IMES CAPSTONE PAPER SERIES THE ISLAMIC STATE OF IRAQ AND THE LEVANT’S STRATEGIC TREATMENT AND USE OF WOMEN JESSICA ALLISON LOGAN BARNES MAY 2015 THE INSTITUTE FOR MIDDLE EAST STUDIES THE ELLIOTT SCHOOL OF INTERNATIONAL AFFAIRS THE GEORGE WASHINGTON UNIVERSITY © OF JESSICA ALLISON AND LOGAN BARNES, 2015 Table of Contents Introduction ................................................................................................................................... 1 Our Research ................................................................................................................................. 2 Methodology ............................................................................................................................... 4 Complications ............................................................................................................................. 5 Significance ................................................................................................................................. 6 Background: Women and Terrorism ....................................................................................... 11 ISIL’s Historical Use of Women as Suicide Bombers.............................................................. 16 Bureaucratizing Women’s Affairs............................................................................................. 18 Recruitment Policies ................................................................................................................
    [Show full text]
  • Analysis and Evolution of the Global Jihadist Movement Propaganda
    Terrorism and Political Violence, 18:399–421, 2006 Copyright Taylor & Francis Group, LLC ISSN: 0954-6553 print=1556-1836 online DOI: 10.1080/09546550600751990 Analysis and Evolution of the Global Jihadist Movement Propaganda MANUEL R. TORRES Department of Public Law, University Pablo Olavide, Seville, Spain JAVIER JORDA´ N Department of Political Science, University of Granada, Spain NICOLA HORSBURGH International Policy Institute King’s College, London, England The Global Jihadist Movement (GJM) has a series of well-defined objectives, which constitute the central points of their ideology. In the realization of these goals, propaganda and public communication play a central role. This article studies the evolution of the principal characteristics of GJM propaganda, analyzing over 2,000 documents issued by the GJM between 1996 and 2005. Keywords Al Qaeda, communication, Jihad, propaganda, terrorism Introduction Al Qaeda and the various other associated groups that form what we will here label the Global Jihadist Movement (GJM), have, as is true of any terrorist organization, a pronounced need for public communication. Violence in and of itself, despite the magnitude and spectacular levels it can reach, is never sufficient to achieve the ulti- mate aims of terrorists. Violence has as its purpose destroying that which it considers the enemy and spreading fear in the affected population. However, at the same time it is a mechanism that permits transmission of content. On said occasions this mess- age is transmitted via symbols used in communique´s or through the interpretation the population will ‘‘read into’’ the attacks themselves. Nevertheless, on most occasions this act of communication does not occur so subtly, and murder, threats, or kidnappings convert themselves into macabre remin- ders that permit the terrorist group to concentrate public opinion so its message is heard.
    [Show full text]
  • Volume XI, Issue 6 December 2017 PERSPECTIVES on TERRORISM Volume 11, Issue 6
    ISSN 2334-3745 Volume XI, Issue 6 December 2017 PERSPECTIVES ON TERRORISM Volume 11, Issue 6 Table of Contents Welcome from the Editors..................................................................................................................................3 Articles Thirty Years after its Foundation - Where is al-Qaida Going?.............................................5 by Anne Stenersen Revisiting al-Qaida’s Foundation and Early History.............................................................17 by Leah Farrall Al-Qaida and the Pakistani Harakat Movement: Reflections and Questions about the Pre-2001 Period............................................................................................................38 by Don Rassler The Jihadi Social Movement (JSM): Between Factional Hegemonic Drive, National Realities, and Transnational Ambitions................................................................55 by Jerome Drevon Jihadi Competition and Political Preferences........................................................................63 by Tore Hammin The Spread of its Message: Studying the Prominence of al-Qaida Materials in UK Terrorism Investigations..................................................................................................89 by Donald Holbrook Islamic State and Technology – a Literature Review...........................................................101 by Truls Tønnessen Islamic State and Al-Nusra: Exploring Determinants of Chemical Weapons Usage Patterns............................................................................................................................................112
    [Show full text]
  • Terrorist Use of the Internet: Information Operations in Cyberspace
    Terrorist Use of the Internet: Information Operations in Cyberspace Catherine A. Theohary Analyst in National Security Policy and Information Operations John Rollins Specialist in Terrorism and National Security March 8, 2011 Congressional Research Service 7-5700 www.crs.gov R41674 CRS Report for Congress Prepared for Members and Committees of Congress Terrorist Use of the Internet: Information Operations in Cyberspace Summary The Internet is used by international insurgents, jihadists, and terrorist organizations as a tool for radicalization and recruitment, a method of propaganda distribution, a means of communication, and ground for training. Although there are no known reported incidents of cyberattacks on critical infrastructure as acts of terror, this could potentially become a tactic in the future. There are several methods for countering terrorist and insurgent information operations on the Internet. The federal government has organizations that conduct strategic communications, counterpropaganda, and public diplomacy activities. The National Framework for Strategic Communication guides how interagency components are to integrate their activities. However, these organizations may be stovepiped within agencies, and competing agendas may be at stake. This report does not discuss technical and Internet architecture design solutions. Some may interpret the law to prevent federal agencies from conducting “propaganda” activities that may potentially reach domestic audiences. Others may wish to dismantle all websites that are seen to have malicious content or to facilitate acts of terror, while some may have a competing interest in keeping a site running and monitoring it for intelligence value. Key issues for Congress: • Although the Comprehensive National Cybersecurity Initiative addresses a federal cybersecurity strategy and departmental roles and responsibilities, overclassification, competing equities, and poor information sharing between agencies hinder implementation of a national cybersecurity strategy.
    [Show full text]
  • The Muslim Brotherhood's Ties to Extremists
    THE MUSLIM BROTHERHOOD’S TIES TO EXTREMISTS THE MUSLIM BROTHERHOOD’S TIES TO EXTREMISTS Key Facts: • CEP has recorded 48 individuals and groups tied to the Muslim Brotherhood, including terrorist groups, foreign fighters, extremist propagandists, and political leaders. • The writings of Muslim Brotherhood founder Hassan al-Banna and early Brotherhood ideologue Sayyid Qutb have helped mold the ideologies of violent terror groups like al- Qaeda, ISIS, and Hamas. • Al-Qaeda co-founders Osama bin Laden and Ayman al-Zawahiri, proclaimed 9/11 mastermind Khalid Sheikh Mohammed, and ISIS leader Abu Bakr al-Baghdadi all belonged to the Muslim Brotherhood before assuming roles in their respective terror networks. • The Brotherhood politically supported the goals of the Iranian Revolution early on. Qutb was an influence on Iranian extremist Navvab Safavi, who in turn influenced current Supreme Leader Ali Khamenei to enter politics and introduced Ruhollah Khomeini to the Brotherhood. • Internationally designated terror group Hamas is a direct offshoot of the Brotherhood, created as the organization’s Palestinian wing. The Muslim Brotherhood is a transnational Sunni Islamist movement that seeks to implement sharia (Islamic law) under a global caliphate. Founded in Egypt in 1928, the Brotherhood is that country’s oldest Islamist organization and has branches throughout the world. A 2015 U.K. government investigation concluded that the Brotherhood has “promoted a radical, transformative politics, at odds with a millennium of Islamic jurisprudence and statecraft….”1 In line with the British assessment, and despite the Brotherhood’s official commitment to non- violence, CEP has documented ideological and operational links between the Brotherhood’s ideology and violent terrorist groups like al-Qaeda and ISIS.
    [Show full text]
  • DHS Privacy Office FOIA
    Disposition (All Why (All internal internal processing/ disposition tracking notes tracking notes Id Date Received Date Closed Organization Sender Subject Fee Category have been have been redacted redacted pursuant to pursuant to (b)(2)) (b)(2)) 05-1 10/01/2004 04/07/2005 Federal Sources, Inc. Steponkus, Elizabeth Contract #HSSCHQ-04-D- Commercial Use 00096 05-2 10/01/2004 Federal Sources, Inc. Steponkus, Elizabeth Contract Commercial Use #HSHQPA04Q00004 05-3 10/01/2004 10/19/2004 individual Moore, Charles Documents regarding Private Citizen specified Job Announcement 05-4 10/01/2004 11/03/2004 Wilmer Cutler, Pickering, Hale and Oleskey, Stephen H. Documents regarding Private Citizen Dorr, LLP detainees 05-5 10/01/2004 10/18/2004 A.J. Bros., LLC Sifers, Monique List of Purchase Card Commercial Use Holders 05-6 10/01/2004 12/07/2004 Southern Microwave, Inc. Romeskie, Julian List of POC's for Port Commercial Use Security Grantees 05-7 10/04/2004 10/14/2004 Washington Post O'Harrow, Robert Copy of US-VISIT PIA Media Representative 05-8 10/04/2004 05/16/2005 Michaelson, Lori Grant awards made by DHS Commercial Use 05-9 10/04/2004 10/19/2004 Clausen Miller, PC Sullivan, Danielle Records pertaining to Private Citizen explosion at CTA facility in Corbin, Kentucky 05-11 10/06/2004 eCivis Isip, Rosario Homeland Security Commercial Use Preparedness Training Program 05-15 10/06/2004 10/18/2004 StarProse Corp. Copy of DHS Budget for Commercial Use 2004 05-17 10/07/2004 WMG-TV 5 Green, Lauren Copies of 2002-2005 State Media Cooperative Agreements Representative and/or Homeland Security Strategies for TN 05-21 10/08/2004 eCivis Isip, Rosario Z.
    [Show full text]