CTC Sentinel 7:3 Najaf, Etc.)

CTC Sentinel 7:3 Najaf, Etc.)

JUNE 2014 . VOL 7 . ISSUE 6 Contents The Islamic State in Iraq and FEATURE ARTICLE 1 The Islamic State in Iraq and the the Levant: More than Just a Levant: More than Just a June Surprise By Daniel Milton, Bryan Price and Muhammad al-`Ubaydi June Surprise By Daniel Milton, Bryan Price and Muhammad al-`Ubaydi REPORTS 5 A Glimpse into the Minds of Four Foreign Fighters in Syria By Vera Mironova and Sam Whitt 8 Foreign Fighters from the Western Balkans in Syria By Timothy Holman 13 Three Hurdles to Peace: Negotiations with the FARC in Colombia By Abigail Jeffers and Daniel Milton 17 The Radicalization of Tunisia’s Mosques By Anne Wolf 20 A Profile of Syria’s Strategic Dar`a Province By Nicholas A. Heras 24 Recent Highlights in Political Violence 28 CTC Sentinel Staff & Contacts A spokesman for Baghdad Operations Command discusses the state of Iraqi security forces on June 22, 2014. - Washington Post/Getty n june 29, 2014, the Islamic roots in Iraq, going back as early as 2002, State in Iraq and the Levant when the leader of the ISIL’s predecessor (ISIL) declared a caliphate group, Abu Mus`ab al-Zarqawi, set up in territories it holds in Iraq operations in Baghdad.2 In 2004, al- Oand Syria. 1 In the past few weeks, the Zarqawi pledged bay`a to Usama bin world has watched as the rapid advance Ladin and his group became known as of the ISIL has offered a serious and al-Qa`ida in Iraq (AQI).3 During its significant challenge to the stability of existence, AQI conducted numerous About the CTC Sentinel Iraq. Combined with the announcement attacks against coalition forces, but it The Combating Terrorism Center is an from President Barack Obama about the was Iraqis who bore the brunt of the independent educational and research deployment of 300 U.S. military advisers campaign.4 institution based in the Department of Social to help combat the threat posed by the Sciences at the United States Military Academy, ISIL, the quickly evolving nature of the West Point. The CTC Sentinel harnesses crisis has focused public attention more 2 U.S. Intelligence Community’s Prewar Intelligence Assess- the Center’s global network of scholars and on recent developments. ments on Iraq S 108-301, U.S. Senate Select Committee on practitioners to understand and confront Intelligence, 2004, pp. 337-338. contemporary threats posed by terrorism and While the importance of understanding 3 “Al-Qaeda in Iraq,” U.S. National Counterterrorism other forms of political violence. the ISIL’s current actions is clear, it is Center, available at www.nctc.gov/site/groups/aqi.html. also critical to understand the group’s 4 Scott Helfstein, Nassir Abdullah, and Muhammad al- past actions. Indeed, the ISIL has deep Obaidi, Deadly Vanguards: A Study of al-Qa’ida’s Violence The views expressed in this report are those of Against Muslims (West Point, NY: Combating Terrorism the authors and not of the U.S. Military Academy, Center, 2009). Separately, while AQI is the commonly- the Department of the Army, or any other agency of the U.S. Government. 1 Together with the declaration of a caliphate, the ISIL also used name for al-Zarqawi’s organization after it joined shortened its name to the “Islamic State.” al-Qa`ida, the group refers to itself as al-Qa`ida in Meso- 1 JUNE 2014 . VOL 7. ISSUE 6 Since al-Zarqawi’s death from a U.S. The ISIL in its Own Words of the ISIL’s attacks (those which airstrike in Iraq on June 7, 2006, AQI One interesting characteristic of the occurred in Baghdad) and attempted to has undergone several changes. In late ISIL is that it has placed a large amount find corroborating evidence in various 2006, al-Zarqawi’s successor declared of information in the public sphere to media reports. One of the challenges the Islamic State of Iraq (ISI) and AQI further its goals. This section presents highlighted in the previous section came to be known by that name from some of that information in an effort is that international media attention that time forward. Finally, in April to contextualize the ISIL’s success and on this group and its activities in Iraq 2013, the leader of the ISI, Abu Bakr illustrate its actions in the year leading was at a low-point during this period al-Baghdadi, announced in an audio up to June 2014. of time. This forced a reliance on local message that his group was merging Iraqi media sources, where questions with Jabhat al-Nusra (JN) in Syria to In early April 2014, the ISIL posted a of accuracy and the government’s own form the “Islamic State in Iraq and 410-page document through the Twitter incentives come into play. al-Sham.”5 This merger triggered a account of its media arm—al-I`tisam public rift between JN and Ayman al- Establishment for Media Production— Of the 345 attacks that the ISIL Zawahiri on one side and the ISIL on that listed each of its operations in says took place in Baghdad during the other.6 In the end, al-Qa`ida and JN detail from November 2012-November the November 2012-November 2013 broke from the ISIL, leaving the ISIL to 2013.8 It is worth noting that, in addition timeframe, the authors found a operate on its own. to publishing their attack data on an media match in 198 cases (57.39%). annual basis, the ISIL also posts attack Before it can be determined whether This article offers a recent operational information in the hours and days after the ISIL overstated its operations, history of the ISIL. It relies on a an attack to their Twitter feed. Such the possibility that the media new source of data: the words of the a public and real-time accounting by systematically overlooked incidents ISIL itself. The ISIL has published a terrorist organization is rare and and failed to report on many operations an extensive listing of its operations highlights the ISIL’s savvy propaganda must be considered. If underreporting from November 2012-November 2013, campaign as it seeks to spread fear, was a factor, then the media would including where and how each of attract recruits, and raise money. have likely underreported minor its operations were carried out.7 attacks that produced small numbers Reviewing this record, particularly Before presenting some of the of casualties. Indeed, of the ISIL given the ISIL’s recent actions in descriptive statistics from the ISIL’s operations for which no media match Iraq, allows the examination of the annual report, it is important to could be found, 85% produced fewer ISIL from a different perspective. recognize that the report is ISIL than three casualties. Therefore, even Indeed, this brief exploration of the propaganda. Terrorist organizations though the possibility exists that ISIL’s actions demonstrates that the like the ISIL often publicize their the ISIL exaggerated the number of events of the past few weeks are not attacks for their own self-interested operations it conducted, the media has surprising, but consistent with the reasons.9 Whether to gain a competitive also likely underreported the number of ISIL’s activities during the past year. advantage over other organizations or their attacks. The sheer number of successful ISIL simply to spread more fear, terrorist operations between November 2012- groups have powerful incentives to November 2013 suggests that a limited exaggerate their activities and their military solution that rolls the ISIL capabilities. For example, the Afghan back to its pre-May 2014 state will not Taliban claimed to have killed more than eliminate the threat posed by the group 5,000 foreign troops during 2008, a in the future. number 20 times higher than the actual figure.10 potamia. Because of this dynamic, the authors 5 This is the name used by Abu Bakr al-Baghdadi in were understandably skeptical about this statement. This article uses ISIL to refer to the same the validity of the casualty and attack group. See “Iraqi al-Qaeda and Syrian Group ‘Merge,’” numbers in the ISIL report. To offer al-Jazira, April 9, 2013. some assessment of the veracity of the Table 1. Purported ISIL Attacks by Province. 6 Nelly Lahoud and Muhammad al-`Ubaydi, “The War report, the authors took a small sample * This does not refer to the entire southern half of Iraq (Basra, of Jihadists Against Jihadists in Syria,” CTC Sentinel 7:3 Najaf, etc.). Rather, when the ISIL refers to “The South,” they are (2014); “Al-Qaeda’s Zawahiri Disbands Main Faction 8 This time period corresponds with one year in the Hijri referring to an area that includes the very southern neighborhoods Operating in Syria,” al-Arabiya, November 9, 2013. calendar (1434), which started in the middle of November of Baghdad, to include the portions of Babil, Karbala, and Wasit 7 This is not the first article to make use of the ISIL’s 2012. provinces that border Baghdad. “annual report.” See Alex Bilger, “Backgrounder: ISIL 9 For an excellent discussion and analysis on why groups Annual Reports Reveal a Metrics-Driven Military Com- claim credit for attacks, see Aaron M. Hoffman, “Voice By examining the 198 instances in mand,” Institute for the Study of War, May 22, 2014. This and Silence: Why Groups Take Credit for Acts of Terror,” which corroborating media stories article builds on Bilger’s work with the insight of recent Journal of Peace Research 47:5 (2010): pp. 615-626. about the ISIL’s purported attacks events, as well as with a dedicated effort to corroborate 10 Jason Straziuso and Rahim Faiez, “Taliban Whop- were found, it is possible to address what the ISIL puts in its annual report using local media per: 5,220 Foreign Troops Killed,” Army Times, January the question of whether the ISIL sources.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    28 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us