November 2020 MLM
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
CTC Sentinel Objective
NOVEMBER 2010 . VOL 3 . ISSUE 11-12 COMBATING TERRORISM CENTER AT WEST POINT CTC Sentinel OBJECTIVE . RELEVANT . RIGOROUS Contents AQAP’s Soft Power Strategy FEATURE ARTICLE 1 AQAP’s Soft Power Strategy in Yemen in Yemen By Barak Barfi By Barak Barfi REPORTS 5 Developing Policy Options for the AQAP Threat in Yemen By Gabriel Koehler-Derrick 9 The Role of Non-Violent Islamists in Europe By Lorenzo Vidino 12 The Evolution of Iran’s Special Groups in Iraq By Michael Knights 16 Fragmentation in the North Caucasus Insurgency By Christopher Swift 19 Assessing the Success of Leadership Targeting By Austin Long 21 Revolution Muslim: Downfall or Respite? By Aaron Y. Zelin 24 Recent Highlights in Terrorist Activity 28 CTC Sentinel Staff & Contacts l-qa`ida in the arabian AQAP has avoided many of the domestic Peninsula (AQAP) is currently battles that weakened other al-Qa`ida the most successful of the affiliates by pursuing a shrewd strategy at three al-Qa`ida affiliates home in Yemen.3 The group has sought to Aoperating in the Arab world.1 Unlike its focus its efforts on its primary enemies— sibling partners, AQAP has neither been the Yemeni and Saudi governments, as plagued by internecine conflicts nor has well as the United States—rather than it clashed with its tribal hosts. It has also distracting itself by combating minor launched two major terrorist attacks domestic adversaries that would only About the CTC Sentinel against the U.S. homeland that were only complicate its grand strategy. Some The Combating Terrorism Center is an foiled by a combination of luck and the analysts have argued that this stems independent educational and research help of foreign intelligence agencies.2 from the lessons the group learned from institution based in the Department of Social al-Qa`ida’s failed campaigns in countries Sciences at the United States Military Academy, such as Saudi Arabia and Iraq. -
Banlaoi Paper Addressing Maritime Security Threats In
Draft for Conference Purposes Only ADDRESSING CURRRENT AND EVOLVING MARITIME SECURITY THREATS IN TRI-BORDER SOUTHEAST ASIA: FROM MARITIME DOMAIN AWARENESS TO CAPACITY BUILDING Rommel C. Banlaoi Presented at the international conference, “Maritime Security in Southeast Asia: Maritime Domain Awareness” co-organized by the Pacific Forum CSIS and the National Defense College of the Philippines (NDCP) held at the Diamond Hotel, Manila, Philippines on 29-31 January 2012 In this presentation, I will briefly describe the current and evolving threats of piracy, terrorism and other organized crimes activities in the tri-border sea area of Southeast Asia. I will also describe the extent of our awareness of these threats and explain why capacity building is essential to address these current and evolving threats. The tri-border sea area of Southeast Asia covering the Philippines, Malaysia and Indonesia has been described as a “danger zone” because of many illicit maritime activities in the form of smuggling and trafficking (arms, drugs, and people) as well as acts of terrorism, piracy and armed robberies against ships.1 Like the tri-border area of South America, the tri-border area of the Philippines, Malaysia and Indonesia is considered to be a “criminal haven”.2 Unfortunately, it is utterly difficult to get accurate data on these illicit maritime activities because some incidents are not detected or even reported. If incidents are detected, there is a perennial problem of under-reporting. Thus, there is a tendency for these three littoral states to rely on usual general estimates provided by organizations like the International Organization for Migration (IOM) for human trafficking and smuggling; the United Nations Office on Drugs and Crime (UNODC) for drug trafficking and smuggling; and, the International Action Network on Small Arms (IANSA) for trafficking and smuggling of small arms and light weapons. -
The Terrorism Trap: the Hidden Impact of America's War on Terror
University of Tennessee, Knoxville TRACE: Tennessee Research and Creative Exchange Doctoral Dissertations Graduate School 8-2019 The Terrorism Trap: The Hidden Impact of America's War on Terror John Akins University of Tennessee, [email protected] Follow this and additional works at: https://trace.tennessee.edu/utk_graddiss Recommended Citation Akins, John, "The Terrorism Trap: The Hidden Impact of America's War on Terror. " PhD diss., University of Tennessee, 2019. https://trace.tennessee.edu/utk_graddiss/5624 This Dissertation is brought to you for free and open access by the Graduate School at TRACE: Tennessee Research and Creative Exchange. It has been accepted for inclusion in Doctoral Dissertations by an authorized administrator of TRACE: Tennessee Research and Creative Exchange. For more information, please contact [email protected]. To the Graduate Council: I am submitting herewith a dissertation written by John Akins entitled "The Terrorism Trap: The Hidden Impact of America's War on Terror." I have examined the final electronic copy of this dissertation for form and content and recommend that it be accepted in partial fulfillment of the requirements for the degree of Doctor of Philosophy, with a major in Political Science. Krista Wiegand, Major Professor We have read this dissertation and recommend its acceptance: Brandon Prins, Gary Uzonyi, Candace White Accepted for the Council: Dixie L. Thompson Vice Provost and Dean of the Graduate School (Original signatures are on file with official studentecor r ds.) The Terrorism Trap: The Hidden Impact of America’s War on Terror A Dissertation Presented for the Doctor of Philosophy Degree The University of Tennessee, Knoxville John Harrison Akins August 2019 Copyright © 2019 by John Harrison Akins All rights reserved. -
Volume XV, Issue 1 February 2021 PERSPECTIVES on TERRORISM Volume 15, Issue 1
ISSN 2334-3745 Volume XV, Issue 1 February 2021 PERSPECTIVES ON TERRORISM Volume 15, Issue 1 Table of Content Welcome from the Editors...............................................................................................................................1 Articles Bringing Religiosity Back In: Critical Reflection on the Explanation of Western Homegrown Religious Terrorism (Part I)............................................................................................................................................2 by Lorne L. Dawson Dying to Live: The “Love to Death” Narrative Driving the Taliban’s Suicide Bombings............................17 by Atal Ahmadzai The Use of Bay’ah by the Main Salafi-Jihadist Groups..................................................................................39 by Carlos Igualada and Javier Yagüe Counter-Terrorism in the Philippines: Review of Key Issues.......................................................................49 by Ronald U. Mendoza, Rommel Jude G. Ong and Dion Lorenz L. Romano Variations on a Theme? Comparing 4chan, 8kun, and other chans’ Far-right “/pol” Boards....................65 by Stephane J. Baele, Lewys Brace, and Travis G. Coan Research Notes Climate Change—Terrorism Nexus? A Preliminary Review/Analysis of the Literature...................................81 by Jeremiah O. Asaka Inventory of 200+ Institutions and Centres in the Field of Terrorism and Counter-Terrorism Research.....93 by Reinier Bergema and Olivia Kearney Resources Counterterrorism Bookshelf: Eight Books -
The Jihadi Industry: Assessing the Organizational, Leadership And
The Jihadi Industry: Assessing the Organizational, Leadership, and Cyber Profiles Report to the Office of University Programs, Science and Technology Directorate, U.S. Department of Homeland Security July 2017 National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence Led by the University of Maryland 8400 Baltimore Ave., Suite 250 • College Park, MD 20742 • 301.405.6600 www.start.umd.edu National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence About This Report The authors of this report are Gina Ligon, Michael Logan, Margeret Hall, Douglas C. Derrick, Julia Fuller, and Sam Church at the University of Nebraska, Omaha. Questions about this report should be directed to Dr. Gina Ligon at [email protected]. This report is part of the National Consortium for the Study of Terrorism and Responses to Terrorism (START) project, “The Jihadi Industry: Assessing the Organizational, Leadership, and Cyber Profiles” led by Principal Investigator Gina Ligon. This research was supported by the Department of Homeland Security Science and Technology Directorate’s Office of University Programs through Award Number #2012-ST-061-CS0001, Center for the Study of Terrorism and Behavior (CSTAB 1.12) made to START to investigate the role of social, behavioral, cultural, and economic factors on radicalization and violent extremism. The views and conclusions contained in this document are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied, of the U.S. -
ICC-01/12-01/18 Date: 21 November 2019 Date of Submission: 6 February 2020
ICC-01/12-01/18-505-Red2 06-02-2020 1/30 RH T Original: English No.: ICC-01/12-01/18 Date: 21 November 2019 Date of submission: 6 February 2020 TRIAL CHAMBER X Before: Judge Antoine Kesia-Mbe Mindua, Presiding Judge Judge Tomoko Akane Judge Kimberly Prost SITUATION IN THE REPUBLIC OF MALI IN THE CASE OF THE PROSECUTOR v. AL HASSAN AG ABDOUL AZIZ AG MOHAMED AG MAHMOUD URGENT PUBLIC With confidential, EX PARTE, Annexes A and B Only available to the Prosecution, VWU and the Detention Section Public redacted version of “the Prosecution’s urgent application to maintain restrictions on Mr AL HASSAN’s contacts and access to others whilst in detention”, 22 November 2019, ICC-01/12-01/18-505-Conf-Exp Source: Office of the Prosecutor ICC-01/12-01/18 1/30 21 November 2019 ICC-01/12-01/18-505-Red2 06-02-2020 2/30 RH T Document to be notified in accordance with regulation 31 of the Regulations of the Court to: The Office of the Prosecutor Counsel for the Defence Fatou Bensouda Melinda Taylor James Stewart Marie-Hélène Proulx Sarah Bafadhel Legal Representatives of the Victims Legal Representatives of the Applicants Seydou Doumbia Mayombo Kassongo Fidel Luvengika Nsita Unrepresented Victims Unrepresented Applicants (Participation/Reparation) The Office of Public Counsel for Victims The Office of Public Counsel for the Defence States’ Representatives Amicus Curiae REGISTRY Registrar Counsel Support Section Peter Lewis Victims and Witnesses Unit Detention Section Nigel Verrill Mr Paddy Craig Victims Participation and Reparations Other Section ICC-01/12-01/18 2/30 21 November 2019 ICC-01/12-01/18-505-Red2 06-02-2020 3/30 RH T Introduction 1. -
Counter-Insurgency Vs. Counter-Terrorism in Mindanao
THE PHILIPPINES: COUNTER-INSURGENCY VS. COUNTER-TERRORISM IN MINDANAO Asia Report N°152 – 14 May 2008 TABLE OF CONTENTS EXECUTIVE SUMMARY AND RECOMMENDATIONS................................................. i I. INTRODUCTION .......................................................................................................... 1 II. ISLANDS, FACTIONS AND ALLIANCES ................................................................ 3 III. AHJAG: A MECHANISM THAT WORKED .......................................................... 10 IV. BALIKATAN AND OPLAN ULTIMATUM............................................................. 12 A. EARLY SUCCESSES..............................................................................................................12 B. BREAKDOWN ......................................................................................................................14 C. THE APRIL WAR .................................................................................................................15 V. COLLUSION AND COOPERATION ....................................................................... 16 A. THE AL-BARKA INCIDENT: JUNE 2007................................................................................17 B. THE IPIL INCIDENT: FEBRUARY 2008 ..................................................................................18 C. THE MANY DEATHS OF DULMATIN......................................................................................18 D. THE GEOGRAPHICAL REACH OF TERRORISM IN MINDANAO ................................................19 -
Operation Pacific Eagle–Philippines Lead Inspector General Report to the United States Congress
OPERATION PACIFIC EAGLE–PHILIPPINES LEAD INSPECTOR GENERAL REPORT TO THE UNITED STATES CONGRESS JULY 1, 2020–SEPTEMBER 30, 2020 ABOUT THIS REPORT A 2013 amendment to the Inspector General Act established the Lead Inspector General (Lead IG) framework for oversight of overseas contingency operations and requires that the Lead IG submit quarterly reports to Congress on each active operation. The Chair of the Council of Inspectors General for Integrity and Efficiency designated the DoD Inspector General (IG) as the Lead IG for Operation Pacific Eagle–Philippines (OPE-P). The DoS IG is the Associate IG for the operation. The USAID IG participates in oversight of the operation. The Offices of Inspector General (OIG) of the DoD, the DoS, and USAID are referred to in this report as the Lead IG agencies. Other partner agencies also contribute to oversight of OPE-P. The Lead IG agencies collectively carry out the Lead IG statutory responsibilities to: • Develop a joint strategic plan to conduct comprehensive oversight of the operation. • Ensure independent and effective oversight of programs and operations of the U.S. Government in support of the operation through either joint or individual audits, inspections, investigations, and evaluations. • Report quarterly to Congress and the public on the operation and on activities of the Lead IG agencies. METHODOLOGY To produce this quarterly report, the Lead IG agencies submit requests for information to the DoD, the DoS, USAID, and other Federal agencies about OPE-P and related programs. The Lead IG agencies also gather data and information from other sources, including official documents, congressional testimony, policy research organizations, press conferences, think tanks, and media reports. -
Southern Philippines, February 2011
Confirms CORI country of origin research and information CORI Country Report Southern Philippines, February 2011 Commissioned by the United Nations High Commissioner for Refugees, Division of International Protection. Any views expressed in this paper are those of the author and are not necessarily those of UNHCR. Preface Country of Origin Information (COI) is required within Refugee Status Determination (RSD) to provide objective evidence on conditions in refugee producing countries to support decision making. Quality information about human rights, legal provisions, politics, culture, society, religion and healthcare in countries of origin is essential in establishing whether or not a person’s fear of persecution is well founded. CORI Country Reports are designed to aid decision making within RSD. They are not intended to be general reports on human rights conditions. They serve a specific purpose, collating legally relevant information on conditions in countries of origin, pertinent to the assessment of claims for asylum. Categories of COI included within this report are based on the most common issues arising from asylum applications made by nationals from the southern Philippines, specifically Mindanao, Tawi Tawi, Basilan and Sulu. This report covers events up to 28 February 2011. COI is a specific discipline distinct from academic, journalistic or policy writing, with its own conventions and protocols of professional standards as outlined in international guidance such as The Common EU Guidelines on Processing Country of Origin Information, 2008 and UNHCR, Country of Origin Information: Towards Enhanced International Cooperation, 2004. CORI provides information impartially and objectively, the inclusion of source material in this report does not equate to CORI agreeing with its content or reflect CORI’s position on conditions in a country. -
The Al Qaeda Network a New Framework for Defining the Enemy
THE AL QAEDA NETWORK A NEW FRAMEWORK FOR DEFINING THE ENEMY KATHERINE ZIMMERMAN SEPTEMBER 2013 THE AL QAEDA NETWORK A NEW FRAMEWORK FOR DEFINING THE ENEMY KATHERINE ZIMMERMAN SEPTEMBER 2013 A REPORT BY AEI’S CRITICAL THREATS PROJECT ABOUT US About the Author Katherine Zimmerman is a senior analyst and the al Qaeda and Associated Movements Team Lead for the Ameri- can Enterprise Institute’s Critical Threats Project. Her work has focused on al Qaeda’s affiliates in the Gulf of Aden region and associated movements in western and northern Africa. She specializes in the Yemen-based group, al Qaeda in the Arabian Peninsula, and al Qaeda’s affiliate in Somalia, al Shabaab. Zimmerman has testified in front of Congress and briefed Members and congressional staff, as well as members of the defense community. She has written analyses of U.S. national security interests related to the threat from the al Qaeda network for the Weekly Standard, National Review Online, and the Huffington Post, among others. Acknowledgments The ideas presented in this paper have been developed and refined over the course of many conversations with the research teams at the Institute for the Study of War and the American Enterprise Institute’s Critical Threats Project. The valuable insights and understandings of regional groups provided by these teams directly contributed to the final product, and I am very grateful to them for sharing their expertise with me. I would also like to express my deep gratitude to Dr. Kimberly Kagan and Jessica Lewis for dedicating their time to helping refine my intellectual under- standing of networks and to Danielle Pletka, whose full support and effort helped shape the final product. -
“New Type of Major-Country Relationship” with the United States
U.S.-China Economic and Security Review Commission Staff Research Backgrounder June 25, 2013 China Seeks a “New Type of Major-Country Relationship” with the United States by Caitlin Campbell Research Director and Policy Analyst, Foreign Affairs and Energy and Craig Murray Senior Policy Analyst, Military and Security Affairs Disclaimer: This paper is the product of professional research performed by staff of the U.S.-China Economic and Security Review Commission, and was prepared at the request of the Commission to support its deliberations. Posting of the report to the Commission’s website is intended to promote greater public understanding of the issues addressed by the Commission in its ongoing assessment of U.S.-China economic relations and their implications for U.S. security, as mandated by Public Law 106-398 and Public Law 108-7. However, the public release of this document does not necessarily imply an endorsement by the Commission, any individual Commissioner, or the Commission’s other professional staff, of the views or conclusions expressed in this staff research report. China is seeking a “new type of major-country relationship”* with the United States, according to official statements from Chinese leaders. Beijing has deliberated this concept since at least 2011, and it has been referenced frequently by high-level Chinese officials and widely discussed in Chinese media since February 2012, when then presumptive Chinese president Xi Jinping evoked it during a visit to the United States. 1† This approach likely is intended to create an environment more conducive to China’s rise by promoting more stable relations with the United States and avoid or, if necessary, manage tension that history suggests is inevitable between established and rising powers. -
اﺳم اﻟﻣوﺿوع : a Reversal Will Al-Qaeda's Influence Recede in the ﻋﻧوان اﻟﻣوﺿوع : Coming Period?
A Reversal : ωϭοϭϣϟϡγ Will al-Qaeda¶s Influence Recede in the : ωϭοϭϣϟϥϭϧϋ Coming Period? 21/10/2018 : έηϧϟΦϳέΎΗ ΔϣΩϘΗϣϟΕΎγέΩϟϭΙΎΣΑϸϟϝΑϘΗγϣϟίϛέϣ : ΏΗΎϛϟϡγ : ωϭοϭϣϟ Al-Qaeda has sought to exploit the 17th anniversary of the events of 11 September 2001 to assert its survival and ability to stay at the forefront of terrorist organizations worldwide. In doing so, it seems to be trying to cover up the multiple challenges facing it at the present stage, which may cause its influence to diminish in the medium and long term. Thus, it cannot be ruled out that the fears expressed by many of its leaders over the organization declining influence is the main factor that prompted Ayman al-Zawahiri to increase the media messages he sends to the organization cadres and members along with other organizations, especially its rivals, as well as the international and regional powers concerned with combating terrorism. It is a remarkable shift from what happened in the past years, which witnessed a relatively limited appearance of al-Zawahiri to comment on events with the aim of proving that he is still alive and interacting developments. The new development raises many questions about the significance of the flurry of messages, particularly that they come at a time the region is witnessing numerous important variables with profound impacts, such as the receding influence of the pro-al-Qaeda groups in Syria against the backdrop of the recent security and political arrangements.Significant ImplicationsThe flurry of messages sent by al-Zawahiri