Ctc Sentinel 082020

Total Page:16

File Type:pdf, Size:1020Kb

Ctc Sentinel 082020 OBJECTIVE ·· RELEVANT ·· RIGOROUS || JUNE/JULYAUGUST 2020 2018 · VOLUME · VOLUME 13, 11, ISSUE ISSUE 8 6 FEATURE ARTICLE A VIEW FROM THE CT FOXHOLE TheThe Future Jihadi Threat Threat of Gilles de LTC(R) Bryan Price Syntheticto Indonesia Biology Kerchove J. Kenneth Wickiser, Kevin J. O’Donovan, Michael EU Counter-TerrorismFormer Director, Washington, StephenKirsten Hummel, E. Schulze and F. John Burpo CombatingCoordinator Terrorism Center FEATURE ARTICLE Editor in Chief 1 Engineered Pathogens and Unnatural Biological Weapons: The Future Threat of Synthetic Biology Paul Cruickshank J. Kenneth Wickiser, Kevin J. O'Donovan, Michael Washington, Stephen Hummel, and F. John Burpo Managing Editor Kristina Hummel INTERVIEW EDITORIAL BOARD 8 A View from the CT Foxhole: Gilles de Kerchove, European Union (EU) Counter-Terrorism Coordinator Colonel Suzanne Nielsen, Ph.D. Raffaello Pantucci Department Head Dept. of Social Sciences (West Point) ANALYSIS Brian Dodwell 18 Inside the Foreign Fighter Pipeline to Syria: A Case Study of a Portuguese Islamic State Network Director, CTC Nuno Tiago Pinto Don Rassler 31 The Islamic State's Strategic Trajectory in Africa: Key Takeaways from its Director of Strategic Initiatives, CTC Attack Claims Tomasz Rolbiecki, Pieter Van Ostaeyen, and Charlie Winter CONTACT The COVID-19 pandemic has renewed concerns over bioterror threats, Combating Terrorism Center with Microsoft founder Bill Gates recently warning that a bioterror attack U.S. Military Academy involving a pathogen with a high death rate “is kind of the nightmare sce- nario” facing the planet. In this month’s feature article, J. Kenneth Wickiser, Kevin J. O’Donovan, 607 Cullum Road, Lincoln Hall Lieutenant Colonel Michael Washington, Major Stephen Hummel, and Colonel F. John Burpo assess West Point, NY 10996 the potential future threat posed by the malevolent use of synthetic biology. They write that synthet- ic biology “is a rapidly developing and diffusing technology. The wide availability of the protocols, Phone: (845) 938-8495 procedures, and techniques necessary to produce and modify living organisms combined with an Email: [email protected] exponential increase in the availability of genetic data is leading to a revolution in science affecting Web: www.ctc.usma.edu/sentinel/ the threat landscape that can be rivaled only by the development of the atomic bomb.” The authors, who all serve at, or are affiliated with, the Department of Chemistry and Life Science at the United States Military Academy, note that synthetic biology has “placed the ability to recreate SUBMISSIONS some of the deadliest infectious diseases known well within the grasp of the state-sponsored terrorist and the talented non-state actor” and that “the techniques used to propagate bacteria and viruses and The CTC Sentinel welcomes submissions. to cut and paste genetic sequences from one organism to another are approaching the level of skill Contact us at [email protected]. required to use a cookbook or a home computer.” They argue that “an effective response to the threats posed by those using synthetic biology for nefarious purpose will require vigilance on the part of mili- tary planners, the development of effective medical countermeasures by the research community, and The views expressed in this report are the development of diagnostic and characterization technologies capable of discriminating between those of the authors and not of the U.S. natural and engineered pathogens.” Military Academy, the Department of the In our interview, Gilles de Kerchove, the European Union’s longtime Counter-Terrorism Coordi- nator, speaks to Raffaello Pantucci. Nuno Pinto presents a detailed case study of an alleged Portu- Army, or any other agency of the U.S. guese Islamic State network with strong connections to the United Kingdom that sheds significant Government. light on the foreign fighter recruitment pipeline between Europe and Syria in the last decade. Tomasz Rolbiecki, Pieter Van Ostaeyen, and Charlie Winter examine the threat posed by the Islamic State across Africa based on a study of its attack claims. They write: “As the second half of 2020 unfolds, it Cover: A picture taken in a laboratory shows is critical that military and counterterrorism policymakers recognize what is at stake in Africa. The a biohazard sticker on the entrance of a Islamic State is not just fighting a low-grade insurgency on the continent; in at least two countries, it has been able to seize and hold territory and subsequently engage in pseudo-state activities.” room. (Thomas Samson/AFP via Getty Paul Cruickshank, Editor in Chief Images) AUGUST 2020 CTC SENTINEL 1 Engineered Pathogens and Unnatural Biological Weapons: The Future Threat of Synthetic Biology By J. Kenneth Wickiser, Kevin J. O’Donovan, Michael Washington, Stephen Hummel, and F. John Burpo the Japanese army against China during the Second World War.4 Recent developments in biochemistry, genetics, and mo- Recently, the convergence of advances in computer science, lecular biology have made it possible to engineer living or- engineering, biological science, and chemistry have made it pos- ganisms. Although these developments offer effective and efficient means with which to cure disease, increase food production, and improve quality of life for many people, Dr. J. Kenneth Wickiser is a Professor of Biochemistry and the As- they can also be used by state and non-state actors to devel- sociate Dean for Research at the United States Military Academy (USMA) and has extensive experience working on engineered and op engineered biological weapons. The virtuous circle of natural genetic switches in bacteria and biomarkers in human bioinformatics, engineering principles, and fundamental clinical studies. He earned his PhD in Molecular Biophysics and biological science also serves as a vicious cycle by lowering Biochemistry from Yale University and completed his postdoctor- the skill-level necessary to produce weapons. The threat of al research training at Rockefeller University in the Laboratory of bioengineered agents is all the more clear as the COVID-19 Molecular Neuro-oncology. pandemic has demonstrated the enormous impact that a single biological agent, even a naturally occurring one, can Dr. Kevin J. O’Donovan is an Associate Professor in the Depart- have on society. It is likely that terrorist organizations are ment of Chemistry and Life Science at USMA with expertise in monitoring these developments closely and that the prob- neural development and axon regeneration. He earned his PhD in ability of a biological attack with an engineered agent is Neuroscience from the Johns Hopkins University, did his postdoc- steadily increasing. toral work at Rockefeller University, and was faculty at the Burke Neurological Institute before moving to USMA. he COVID-19 pandemic has demonstrated that sig- LTC Michael Washington currently serves as an Assistant Pro- nificant biological threats can and will emerge from fessor in the Department of Chemistry and Life Science at USMA. nature without warning, demonstrating that a single He has a PhD in Emerging Infectious Disease with an emphasis viral strain can have a profound impact on modern so- in Immunology from the Uniformed Services University of the ciety. It has also demonstrated that infectious diseases Health Sciences. Tcan rapidly spread throughout a population without human engi- neering making them the ideal substrates from which to develop en- MAJ Stephen Hummel is currently a PhD student in the Biology gineered weapons. Viruses and bacteria have been used as weapons Department at Boston College. Previously, he served in both Iraq for millennia.1 Historically, biological weapons were derived from and Afghanistan and as a USAREUR CBRN Plans Officer, an As- natural sources, such as anthrax from herbivores and domesticated sistant Professor in the Department of Chemistry and Life Science animals, and smallpox from rodents. Those pathogenic organisms at USMA, a Nuclear Operations Officer on a Nuclear Disablement that were found to be suitable for weaponization were cultured Team, and most recently as the Deputy, Commander’s Initiatives directly from the environment; they were then isolated, purified, Group at 20th CBRNE Command. stored, propagated,a and used to fill biological munitions.2 The most recent of example of this was the production and stockpiling of nu- COL F. John Burpo currently serves as the Head of the Department merous agents by the biological weapons program of the former of Chemistry and Life Science at USMA. As an artillery officer, he Soviet Union. In this program pathogens were selected for specific served in airborne, armor, and Stryker units with humanitari- characteristics directly from the natural environment, propagat- an, peacekeeping, and combat operational deployments. He also ed, and stored for later use.3 While these pathogens have evolved served as the Deputy Commander-Transformation for the 20th in nature for the purpose of persisting, they are not optimized for CBRNE Command. He has a Sc.D. in Bioengineering from the maintenance, storage, and deployment in a military setting. Con- Massachusetts Institute of Technology. sequently, while biological agents have not been widely employed as strategic or tactical weapons by state or non-state actors, there The views expressed in this article are those of the authors and do are some examples of their use in conflicts. The most significant of not necessarily reflect those of the Combating Terrorism Center, these
Recommended publications
  • “State of Civil Society Report: 2015
    the year in review State of Civil Society report 2015: THE YEAR IN REVIEW ...these stories tell us that only civil introduction society, in its broadest sense, is taking a It has been another year of hard work and high achievement for civil society. The story of the year since the stance against the 2014 State of Civil Society Report was published has partly been one of a continuing series of attacks on civil concentration of society in the many countries where, when civil society asks difficult questions about power, the powerful seek to silence it. But is has also been a story of impressive and sustained civil society response, in a world that has power in the hands of become more turbulent and contested. a tiny, global, super- rich elite, and against As we show below, civil society faces challenges - of lack of space, under-resourcing and limited access to the attempts of many decision-makers. Civil society also needs continually to prove its connection with and relevance to citizens, political leaders and and it needs to demonstrate its ability to stay ahead of trends and innovate. When civil society groups do not corporate interests do these, they fail. But so often, we see civil society leading the response to crisis, taking on difficult issues, contributing to change, and winning arguments for social justice. to undermine human rights and This year in review section of the 2015 CIVICUS State of Civil Society Report is complemented by our report’s the value of people’s special thematic section on the resourcing for civil society, and the 27 guest contributions, from civil society participation.
    [Show full text]
  • Policy Notes for the Trump Notes Administration the Washington Institute for Near East Policy ■ 2018 ■ Pn55
    TRANSITION 2017 POLICYPOLICY NOTES FOR THE TRUMP NOTES ADMINISTRATION THE WASHINGTON INSTITUTE FOR NEAR EAST POLICY ■ 2018 ■ PN55 TUNISIAN FOREIGN FIGHTERS IN IRAQ AND SYRIA AARON Y. ZELIN Tunisia should really open its embassy in Raqqa, not Damascus. That’s where its people are. —ABU KHALED, AN ISLAMIC STATE SPY1 THE PAST FEW YEARS have seen rising interest in foreign fighting as a general phenomenon and in fighters joining jihadist groups in particular. Tunisians figure disproportionately among the foreign jihadist cohort, yet their ubiquity is somewhat confounding. Why Tunisians? This study aims to bring clarity to this question by examining Tunisia’s foreign fighter networks mobilized to Syria and Iraq since 2011, when insurgencies shook those two countries amid the broader Arab Spring uprisings. ©2018 THE WASHINGTON INSTITUTE FOR NEAR EAST POLICY. ALL RIGHTS RESERVED. THE WASHINGTON INSTITUTE FOR NEAR EAST POLICY ■ NO. 30 ■ JANUARY 2017 AARON Y. ZELIN Along with seeking to determine what motivated Evolution of Tunisian Participation these individuals, it endeavors to reconcile estimated in the Iraq Jihad numbers of Tunisians who actually traveled, who were killed in theater, and who returned home. The find- Although the involvement of Tunisians in foreign jihad ings are based on a wide range of sources in multiple campaigns predates the 2003 Iraq war, that conflict languages as well as data sets created by the author inspired a new generation of recruits whose effects since 2011. Another way of framing the discussion will lasted into the aftermath of the Tunisian revolution. center on Tunisians who participated in the jihad fol- These individuals fought in groups such as Abu Musab lowing the 2003 U.S.
    [Show full text]
  • Issue 4, 2019 Special Issue on Prevent
    Issue 4, 2019 Special Issue on Prevent Co-edited by Sukhwant Dhaliwal, Rebecca Durand, Stephen Cowden Inside this issue: Feature Articles Poetry by Dean Atta Artwork on Xenofon Kavvadias Book and Conference Reviews ISSN: 2398-4139 Department of English and Comparative Literary Studies, University of Warwick Image 1: Holocauston, detail © Xenofon Kavvadias. All Rights Reserved. Feminist Dissent Feminist Dissent – Issue 4 Special Issue on Prevent Co-edited by Sukhwant Dhaliwal, Rebecca Durand, Stephen Cowden Table of Contents All artworks are by Xenofon Kavvadias. Cover Image Image 2 Editorial: A Polarised Debate – Stephen Cowden, Sukhwant Dhaliwal, Rebecca Durand (p. 1-15) Image 3 Respecting and Ensuring Rights: Feminist Ethics for a State Response to Fundamentalism Sukhwant Dhaliwal (p. 16-54) Image 4 Prevent: Safeguarding and the Gender Dimension Pragna Patel (p. 55-68) Image 5 Walking the Line: Prevent and the Women’s Voluntary Sector in a Time of Austerity Yasmin Rehman (p. 69-87) Image 6 Poetry – ‘The Black Flamingo’ Dean Atta (p. 88-90) Image 7 Feminist Dissent 2019 (4) i Feminist Dissent Safeguarding or Surveillance? Social Work, Prevent and Fundamentalist Violence Stephen Cowden and Jonathan Picken (p. 91-131) Image 8 Jihadi Brides, Prevent and the Importance of Critical Thinking Skills Tehmina Kazi (p. 132-145) Image 9 Victims, Perpetrators or Protectors: The Role of Women in Countering Terrorism Hifsa Haroon-Iqbal (p. 146-157) Image 10 Poetry – ‘I come from’ Dean Atta (p. 158-159) Image 11 The Prevent Strategy’s impact on social relations: a report on work in two local authorities David Parker, David Chapot and Jonathan Davis (p.
    [Show full text]
  • Remote Warfare Interdisciplinary Perspectives
    Remote Warfare Interdisciplinary Perspectives ALASDAIR MCKAY, ABIGAIL WATSON & MEGAN KARLSHØJ-PEDERSEN This e-book is provided without charge via free download by E-International Relations (www.E-IR.info). It is not permitted to be sold in electronic format under any circumstances. If you enjoy our free e-books, please consider leaving a small donation to allow us to continue investing in open access publications: http://www.e-ir.info/about/donate/ i Remote Warfare Interdisciplinary Perspectives EDITED BY ALASDAIR MCKAY, ABIGAIL WATSON AND MEGAN KARLSHØJ-PEDERSEN ii E-International Relations www.E-IR.info Bristol, England 2021 ISBN 978-1-910814-56-7 This book is published under a Creative Commons CC BY-NC 4.0 license. You are free to: • Share — copy and redistribute the material in any medium or format • Adapt — remix, transform, and build upon the material Under the following terms: • Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. • NonCommercial — You may not use the material for commercial purposes. Any of the above conditions can be waived if you get permission. Please contact [email protected] for any such enquiries, including for licensing and translation requests. Other than the terms noted above, there are no restrictions placed on the use and dissemination of this book for student learning materials/scholarly use. Production: Michael Tang Cover Image: Ruslan Shugushev/Shutterstock A catalogue record for this book is available from the British Library.
    [Show full text]
  • An Examination of British ISIL Recruits
    An Examination of British ISIL Recruits Fraser J Watt S1812017 This dissertation is submitted for the degree: Master of Arts in International Relations July 2017 1! Table of Contents 1.1 - Introduction 3 1.2 - Foreign Fighter Literature Review 4 2.1.1 - Theoretical framework 11 2.1.2 - Resource Mobilisation 14 2.1.3 - Political Opportunity 16 2.1.4 - Framing theory 18 2.1.5 - New social movement theory 20 3.1 - Methods 22 4.1 - The origins of the Islamic State of Iraq and the Levant 25 4.2 - The resurrection of the Caliphate 29 4.3.1 - Geographic Clusters and pre-existing networks 32 4.3.2 - London Network - Ladbroke Grove Holland Park School 34 4.3.3 - The Portsmouth, Cardiff and Manchester Network 40 4.3.4 - al-Muhajiroun network 44 4.4.1 - The non-combative side of Jihad 49 4.4.2 - Teenagers & Students 53 4.4.3 - Mothers with Children 55 5.1 - Conclusions 56 6.1 - Bibliography 59 2! 1.1 - Introduction Terrorism is arguably one of the most complex and multifaceted issues facing the international community to date. Groups such as the Islamic State in Iraq and the Levant (ISIL) perplex many analysts and policy makers. It is estimated that between 3922 and 4294 individuals have travelled from Europe to join the Syrian uprising (ICCT 2016:3). A majority of roughly 2838 European foreign fighters came from just four countries; Belgium, France, Germany and the United Kingdom (ICCT 2016:3). Online radicalisation, returning jihadists, home grown terrorists and lone wolf attacks are high risk threats to European security which analysts must fully understand in order to develop effective counter- radicalisation and counter-terrorism policies.
    [Show full text]
  • Identifying Vulnerability to Radicalisation Among Students Emma Webb
    Spotting the Signs: Identifying Vulnerability to Radicalisation Among Students Emma Webb Published in 2017 by The Henry Jackson Society The Henry Jackson Society Millbank Tower 21-24 Millbank London SW1P 4QP Registered charity no. 1140489 Tel: +44 (0)20 7340 4520 www.henryjacksonsociety.org (C) The Henry Jackson Society 2017 All rights reserved The views expressed in this publication are those of the author and are not necessarily indicative of those of The Henry Jackson Society or its Trustees Title: "Spotting the Signs: Identifying Vulnerability to Radicalisation among Students" By: Emma Webb ISBN: 978-1-909035-30-0 £10 where sold All rights reserved Photo Credits Cover Photo: https://upload.wikimedia.org/wikipedia/commons/4/4c/Flag_-_Union_Flag.jpg Spotting The Signs: Identifying Vulnerability To Radicalisation Among Students Emma Webb www.henryjacksonsociety.org 2 Table of Contents Foreword……………………………………………………………………………………………. 4 Executive Summary…………………………………………….…………………………….… 7 Introduction.…………………………………………………………………………………...…. 9 Methodology…………………………………………………………………………………….… 10 Profiles…………………………………………………………………………………………….… 13 Analysis……………………………………………………………………………………………... 62 1. Introduction………………………………………………………………………………….… 62 2. Findings…………………………………………………………………………………………. 68 3. The Importance of Socialisation……………………………………………………..... 70 4. The Online Facilitation of Real-world Relationships………………………….… 79 5. The Role of Behavioural Changes in Identifying Vulnerability……………… 81 6. Policy Recommendations……………………………………………………………….… 87 7. Conclusion……………………………………………………………………………………… 91 3 SPOTTING THE SIGNS: IDENTIFYING VULNERABILITY TO RADICALISATION AMONG STUDENTS Foreword I was in a hurry, rushing to catch the bus that’s perpetually crowded and noisy. As I caught my breath, I looked out of the window and could not help but feel stunned and perplexed as the events from the past weeks replayed in my head. Then my phone rang. It was my son, Rasheed. As he spoke, I detected a rasp in his voice.
    [Show full text]
  • LET4CAP Law Enforcement Training for Capacity Building NIGER
    Co-funded by the Internal Security Fund of the European Union LAW ENFORCEMENT TRAINING FOR CAPACITY BUILDING LET4CAP Law Enforcement Training for Capacity Building NIGER Downloadable Country Booklet DL. 2.5 (Ve 1.2) Dissemination level: PU Let4Cap Grant Contract no.: HOME/ 2015/ISFP/AG/LETX/8753 Start date: 01/11/2016 Duration: 33 months Dissemination Level PU: Public X PP: Restricted to other programme participants (including the Commission) RE: Restricted to a group specified by the consortium (including the Commission) Revision history Rev. Date Author Notes 1.0 20/03/2018 SSSA Overall structure and first draft 1.1 06/05/2018 SSSA Second version after internal feedback among SSSA staff 1.2 09/05/2018 SSSA Final version version before feedback from partners LET4CAP_WorkpackageNumber 2 Deliverable_2.5 VER1.2 WorkpackageNumber 2 Deliverable Deliverable 2.5 Downloadable country booklets VER V. 1 . 2 2 NIGER Country Information Package 3 This Country Information Package has been prepared by Eric REPETTO and Claudia KNERING, under the scientific supervision of Professor Andrea de GUTTRY and Dr. Annalisa CRETA. Scuola Superiore Sant’Anna, Pisa, Italy www.santannapisa.it LET4CAP, co-funded by the Internal Security Fund of the European Union, aims to contribute to more consistent and efficient assistance in law enforcement capacity building to third countries. The Project consists in the design and provision of training interventions drawn on the experience of the partners and fine-tuned after a piloting and consolidation phase. © 2018 by LET4CAP All rights reserved. 4 Table of contents 1. Country Profile 1.1Country in Brief 1.2Modern and Contemporary History of Niger 1.3 Geography 1.4Territorial and Administrative Units 1.5 Population 1.6Ethnic Groups, Languages, Religion 1.7Health 1.8Education and Literacy 1.9Country Economy 2.
    [Show full text]
  • 254 the Social Roots of Jihadist Violence in Burkina Fasos North
    The Social Roots of Jihadist Violence in Burkina Faso’s North Africa Report N°254 | 12 October 2017 Translation from French Headquarters International Crisis Group Avenue Louise 149 • 1050 Brussels, Belgium Tel: +32 2 502 90 38 • Fax: +32 2 502 50 38 [email protected] Preventing War. Shaping Peace. Table of Contents Executive Summary ................................................................................................................... i Introduction ..................................................................................................................... 1 The Social Roots of the Crisis ........................................................................................... 3 A. Malam Ibrahim Dicko, from the Radio to Jihad ....................................................... 3 B. The Challenge to an Ossified and Unequal Social Order .......................................... 4 C. A Distant Relationship with the Government ........................................................... 7 D. An Especially Vulnerable Province on the Border with Mali .................................... 9 A Considerable Military Effort ......................................................................................... 11 A. The Sahel Region under Threat ................................................................................. 11 B. A Security Apparatus under Reconstruction ............................................................. 13 C. Regional and International Cooperation ..................................................................
    [Show full text]
  • A New Framework for US Policy in the Sahel
    Marcellus POLICY ANALYSIS Spring 2021 - Marcellus Policy Analysis No. 1 A New Framework for U.S. Policy in the Sahel by John Ramming Chappell EXECUTIVE SUMMARY merican foreign policy in the Sahel has not worked. Counterterrorism has pre- dominated in the U.S. approach to the region since 2001, resulting in a policy focused on security assistance and military cooperation. However, the influ- ence of Salafi-jihadist groups in the region has markedly increased, civilian Afatalities have skyrocketed, and a militarized approach has undermined security sector governance. U.S. strategy has not adequately addressed the root causes of conflict—po- litical marginalization, poverty, and environmental pressures—that have contributed to a vicious cycle of conflict and fragility. The challenges facing the Sahel call for a new ap- proach. To effect lasting change in the Sahel, the United States needs to replace the overmilita- rized status quo with an affirmative strategy of diplomatic engagement.The United States should reduce military engagement in the Sahel, which is disproportionate to relatively limited interests. However, withdrawal alone would be insufficient to shift regional -dy namics because other stakeholders would continue counterterrorism campaigns based on the American model. Therefore, the Biden administration should implement the Global Fragility Strategy in the Sahel and phase out the Trans-Sahara Counterterrorism Partnership to right the bal- ance between diplomatic and military tools. The United States should work with regional stakeholders to coordinate a broader shift in its Sahel policy. 1 The Status Quo Approach to the Initiatives Such as the TSCTP and Sahel Has Failed AFRICOM Have Failed to Curb Militancy The Sahel is a semi-arid strip of grassland stretching The U.S.
    [Show full text]
  • Sahel Blog Translation Projects, Number 1 October 2020 An
    Sahel Blog Translation Projects, Number 1 October 2020 An Annotated Translation of the Islamic State’s “Liptako: Graveyard of Crusaders and Apostates” Alex Thurston Translator’s Introduction The Islamic State in the Greater Sahara (ISGS) is a key armed actor in the tri-border zone between Mali, Niger, and Burkina Faso.1 ISGS is the central counterterrorism target for those governments and especially for France, and the tri-border zone has become the key priority for France’s Sahel-focused counterterrorism mission, Operation Barkhane. That zone is also the priority for the French-backed G5 Sahel Joint Force, which draws soldiers from Mauritania and Chad in addition to the three countries that make up the tri-border zone.2 The Joint Force was created in 2017.3 ISGS emerged out of a May 2015 rupture within al-Murabitun, itself a breakaway faction of al-Qaida in the Islamic Maghreb (AQIM).4 ISGS’ leader, Adnan Abu Walid al-Sahrawi, pledged allegiance to the Islamic State. Over time, his unit has gained more recognition from the Islamic State central leadership, which labels ISGS a part of the “Islamic State West Africa Province (ISWAP).” At the international level, ISGS is most famous for its October 2017 ambush on a joint American-Nigerien patrol outside the Nigerien village of Tongo- Tongo.5 1 For background on the violence in the tri-border zone, see William Assanvo, Baba Dakono, Lori-Anne Théroux- Bénoni and Ibrahim Maïga, “Violent extremism, Organised Crime and Local Conflicts in Liptako-Gourma,” Institute for Security Studies, December 2019, https://issafrica.s3.amazonaws.com/site/uploads/war-26-eng.pdf.
    [Show full text]
  • A Trial in Absentia Resulting in a Decision” Within the European Arrest Warrant Framework
    The concept of “a trial in absentia resulting in a decision” within the European Arrest Warrant framework. TEAM POLAND NATIONAL SCHOOL OF JUDICIARY AND PUBLIC PROSECUTION JOANNA GADOMSKA MONIKA STĘPKOWSKA JAKUB GŁUSZYK (prosecutor trainees - participants) BARBARA AUGUSTYNIAK (Judge - tutor) THEMIS COMPETITION SEMI FINAL - A - 2 0 1 8 BARCELONA The concept of “a trial in absentia resulting in a decision” within the European Arrest Warrant framework. TABLE OF CONTENTS OVERVIEW 1. INTRODUCTION p. 2-7 1.1. Brief historical insight p. 2 - 3 1.2. Notion of a trial “in absentia” p. 3-4 1.3. Polish perspective p. 4-5 1.4. European Arrest Warrant Framework Decision p. 5-7 2. “TRIAL RESULTING IN A DECISION” – A CASE STUDY p. 7-15 2.1. Case C-399/11 Melloni p. 7-8 2.2. Case C-270/17 PPU Tupikas p. 9 - 10 2.3. Case C-271/17 PPU Zdziaszek p. 11-13 2.4. Case C-571/17 PPU Samet Ardic p. 13-15 3. CONCLUSIONS p.16-19 3.1. Findings p.16-17 3.2. Recommendations p.17-19 BIBLIOGRAPHY AN OVERVIEW This paper addresses selected issues related to the European Arrest Warrant framework that appear when executing a judgment that has been delivered in another Member State as a result of trial in the absence of the defendant. The main focus is placed on answering the question which procedural scenarios could be counted as “an absence of the defendant”, and which legal proceedings fall into the category of “trial resulting in a decision”. This goal is achieved through the examination of the origins of “in absentia” procedures, the European Arrest Warrant framework decision itself, and viewpoints expressed by the Court of Justice of the European Union (hereinafter “the CJEU”) in selected landmark cases.
    [Show full text]
  • Syria-Rising-Child-Abandonment
    Syria: Rising Child Abandonment, Poverty is the Leading Cause www.stj-sy.org Syria: Rising Child Abandonment, Poverty is the Leading Cause 43 infants were reportedly found abandoned between the beginning of 2019’s second half and the end of the 2020’s first half Page | 2 Syria: Rising Child Abandonment, Poverty is the Leading Cause www.stj-sy.org Executive summary Child abandonment has risen in several areas of the province of Idlib and northern rural Aleppo, which are controlled by armed opposition groups. From the beginning of the second half of 2019 until 20 July 2020, STJ field researchers documented 43 child abandonment cases.1 The children, who were mostly newborns, were found dumped on street sides or near mosques or hospitals or in garbage dumps. Child abandonment became one of the phenomena that those areas are beset with. Never a month or two passes without a report of two or three cases of this kind. Worse still, the death of some of those children as a result of being found late or owing to extreme weather conditions. Poverty is the main reason which leads many Syrians to abandon their children, especially those in displacement camps, for not being able to meet expenses of supporting them. Marriage of minors is another reason for the spread of this phenomenon (STJ is preparing a detailed report on this issue). In Idlib, which is mainly controlled by Hayat Tahrir al-Sham (HTS), most of the abandoned children were fostered by families from the city, since adoption is abandoned in Islam. Accordingly, it is not allowed to register those children on the names of the families fostered them, in the civil records of Idlib, which adhere to the Islamic law.
    [Show full text]