Boko Haram and Nigerian Instability

Since November, over 60,000 refugees have fled from Nigeria in fear of Boko Haram.   Image Source: IRIN

Boko Haram, or the Islamic State in West Africa, is a formally nonviolent militant organization based in Nigeria, Chad, Niger, and Cameroon. The group aims to “purify” Nigeria and other territories based on their own Salafist ideals. Clashes with the Nigerian government in 2009 over an investigation into the organization sparked a violent uprising, which has escalated in years since.

Decade Long Crisis

Boko Haram’s persistent insurgency in Nigeria has claimed tens of thousands of lives, and displaced millions since it began in 2009. It is estimated that about 35,000 individuals have been killed in the insurgency, making this conflict the region’s deadliest of all time.  The United Nations Refugee Agency claims that attacks across the Lake Chad Region have left over 2.5 million individuals displaced, including 250,000 individuals from Nigeria alone.

On February 5th, President Muhammadu Buhari declared that Boko Haram had been “decimated.”  He stated that his government had achieved enormous feats in the campaign against Boko Haram, and had reduced their criminal activity to a minimum.  While major military operations by the Nigerian military have been able to contain and significantly degrade the organizations territory, Boko Haram remains a major threat which has continued to devastate northeastern Nigeria. The continued attacks have limited Nigeria’s economic development, disrupted community life, destroyed infrastructure, and now pose a threat to the upcoming general elections.

Increased Severity of Attacks

Since November, a wave of renewed attacks has forced over 60,000 Nigerians to flee their homes and marked the highest level of disruption in over two years.  Attacks in recent months by Boko Haram have also become increasingly deadly. On November 18th of last year, Boko Haram infiltrated a military base in Metele of northeast Nigeria. They were able to overpower Nigerian troops, loot valuable military equipment, and allegedly kill over one hundred soldiers- essentially destroying the base.

Earlier this year, Boko Haram attacked the city of Rann in northeast Nigeria after the withdrawal of troops left the town vulnerable to attack. The town had been set up as a shelter area for the millions of individuals displaced in the conflict.  Around 9:00 am on January 28th, a group of Boko Haram fighters arrived to the town of Rann and set fire to the structures of the town in order to kill any displaced individuals still hiding.  According to Amnesty International, the attack killed 60 individuals, making it the deadliest confirmed Boko Haram attack to date.

Satellite image of Rann, Nigeria after the January 28th Boko Haram attacks.  The red coloring shows healthy vegetation, while the dark brown and black coloring shows areas heavily burned from the attack.  Image Source: CNES/Airbus and Amnesty International

Is Military Inadequacy is Causing Vulnerability?

In recent months, Boko Haram has been escalating attacks, building their arsenal, and shifting tactics in order to remain a threat to the Nigerian military.  As Boko Haram’s tactics have shifted away from conventional strategies- including increasingly sophisticated tactics such as the use of drones to track the military’s positions, the adaptation of foreign fighters, hiding within the local population, and the use of guerilla warfare tactics and infrastructural buildings- Nigerian forces have struggled to adequately adapt to new threats.

Nigeria’s defense strategy has left them increasingly vulnerable to attack. While Boko Haram’s attacks have been escalating, security in northern Nigeria has been deteriorating, and troops have been provided with inadequate weaponry and equipment.  Despite Nigeria’s large military defense budget, it appears as though troops have been pulled out of high-risk regions and left without sufficient weapons. Even further, according to Lieutenant-Colonel Sean McClure, the Nigerian military has not been able to adjust to the advancing threat of Boko Haram, and continues to rely on conventional warfare tactics.  Without a change in their military strategy, the Nigerian Army may not be able to defeat Boko Haram in the near future- and with elections soon approaching, many question how the next government can regain control of the country.

Strategies for Countering Neo-Nazi Radicalization

American members of the National Socialist Movement. Source: Southern Poverty Law Center.

Decades after the end of World War II, Nazism continues to incite hatred and divide the globe. Thousands have been radicalized into what is now deemed neo-Nazi ideology from dozens of countries across the world. Although the phenomenon of neo-Nazism is well documented, research has yet to establish a common profile of those deemed vulnerable to its recruitment. Several have attempted to establish a potential profile; however, the American cases that have been studied stem from vastly different backgrounds, and their diversity is too difficult to account for with any one theory.

Though the threat of large-scale terrorist attacks stemming solely from neo-Nazi groups is relatively low, such groups present a unique threat. Neo-Nazi groups tend to be embedded with other racist extremist groups, such as the Ku Klux Klan, and other anti-Semitic groups. Fringe members of these groups present an often-undetectable lone wolf threat which is extremely difficult for law enforcement to counter. Neo-Nazi groups are also often associated with the trafficking of narcotics and prostitution, potentially leading to a large indirect cost on society.

In discussing neo-Nazi radicalization, former neo-Nazi Christian Picciolini has a unique take on the process. Picciolini, who become radicalized into neo-Nazi ideology after attending a gathering of a skinhead group at 14 years old, has since deradicalized and now works to help others do the same. But Picciolini does not attribute neo-Nazi radicalization to an ideology at all. In an informative interview, Picciolini stated that “I can tell you that every single person that I recruited or that was recruited around the same time that I did, up to now, up to what we’re seeing today, is recruited through vulnerabilities and not through ideology”. The vulnerabilities mentioned in the interview stem from both real and perceived grievances, felt by some youths as they grow and learn about the world and their place in it. Like so many youths searching for answers to their anger and frustrations, Picciolini found answers amongst neo-Nazi propaganda. Unfortunately there was not a counter narrative strategy in place to address the statements presented to him.

Exploiting vulnerabilities is a normal gang recruitment strategy. Many neo-Nazis are recruited while in prison, and the process is similar to other gang recruitment methodologies. However, neo-Nazi gangs are distinct in their provision of a more thorough ideological base for those who they radicalize. Further, the agenda of neo-Nazism is the creation of a Fourth Reich, which obviously goes far beyond the belief system associated with a typical street gang. Because of the hybrid nature of the radicalization process between extremist group and street gang that is observed within neo-Nazism, a hybrid approach to deradicalization and a hybrid counter-narrative strategy is needed.

Law enforcement’s response to neo-Nazi groups has begun to change in recent years. Whereas for a long time neo-Nazi groups and skin heads were often associated with the punk rock scene and were considered kids acting out their frustrations, now they are being considered legitimate concerns for homeland security.

Though they may pose a significant security concern, simply addressing neo-Nazi radicalization as a law enforcement matter does not properly address the underlying issues that cause some to become radicalized. In discussion about freedom of speech when it comes to hate speech and propaganda, experts suggest that education is the likely best route for countering extremism. An effective solution will couple education with a strategy in which local governments and communities adapt partnerships with organizations who have experience in deradicalization. One such organization and program is the Anti-Defamation League’s “A World of Difference” campaign, which uses mass media and education in schools to address bias, racism, anti-Semitism, and a variety of radicalization and extremist behaviors. Policy encouraging local communities to embrace programs mentioned above could potentially hold the key to severely disrupting recruitment efforts of the dozens of neo-Nazi groups operating in the United States.

 

John Patrick Wilson is an Law Enforcement Professional and Research Fellow at Rise to Peace.

China’s Perspective on Ethnic Detention: The Ends Justifies the Means

Source: BBC (Dabancheng, April 2018)

While not broadly reported, the detention of Uighur Muslims in China has developed into what BBC reporter John Sudworth Calls “one of the most pressing human rights concerns of our age”. Reports emerged in 2017 that China was operating a system of internment camps for Muslims in Xinjiang. This began after the adoption of “Regulations on De-extremification”, which banned the following: growing an “abnormal” beard, wearing a veil or headscarf, regular prayer, fasting or avoidance of alcohol, or possessing books or articles about Islam or Uighur culture. Since then it has been estimated that at least one million Uighurs (as well as some other foreign citizens) into what China has labelled as “vocational education” camps, where they are forced to learn Mandarin Chinese and Communist party rhetoric. Those sent to the camps have no legal right; they have no access to lawyers are not subject to a trial.

After growing criticism of these detention camps, China is presenting the detention of Muslim citizens as a contribution in the fight against terrorism internationally. The topic came up recently when Chinese President Xi Jinping visited Saudi Crown Prince Mohammed bin Salman on Friday. The Chinese foreign ministry published the following in part of its account of the meeting: “China has the right to take antiterrorism and de-extremisation measures for safeguarding national security. The Saudi side respects and supports that and is willing to strengthen cooperation with China.”

The fear based tactic of detaining individuals specifically due to ethnicity has led to countless atrocities throughout history. There has been growing international criticism of the camps, specifically from UN panels, Turkish and Malaysian politicians, and Muslim civic groups. Despite this, there is evidence that these camps are steadily growing in population. It is unlikely that this issue will be resolved any time soon.

ISIL: Cathedral Attack in the Sulu Province

Source: Reuters 2019

Abu Sayyaf attacked the Catholic Church, Cathedral of Our Lady of Mount Carmel, during mass on January 27th in the Sulu Province of the Southern Philippines. The Islamic State of the Levant (ISIL) claims the two back-to-back bombings were the work of suicide bombers, which was later confirmed by Interior Secretary Eduardo Ano.

At least 20 people were killed in the attack and more than 100 individuals were injured. In response to this attack, the Filipino Government is on high alert and is conducting military operations to “destroy” Abu Sayyaf. President Duterte also declared martial law until the criminals are found.

Abu Sayyaf is a branch of the ISIL that has been active in the Philippines since 1991. The group is known for bombing a ferry in 2004, killing 116 people, as well as various kidnappings for ransom. The attack in Jolo is one of their largest to date, with 131 total casualties, as calculated by our Active Intelligence Database.

A week prior to the bombing, a referendum was conducted on the Bangsamoro Organic Law, which would allow for expanded autonomy of the Autonomous Region in Muslim Mindanao. While experts don’t believe the two events are related, it’s possible that the attack was meant to further divide the Muslim and Christian communities in the province.

The Philippine government has taken proper steps to reassure the community through security personnel outside places of worship and patrols through large public areas. President Duterte responded with strong and ruthless commentary on the church bombing by declaring the military to take care of the threat posed by Abu Sayyaf by any means necessary.

The military adamantly agreed with Duterte and staged multiple manhunts to find Abu Sayyaf members behind the attack. The Army suffered a few fatalities in the altercations with Abu Sayyaf militants before making a major arrest.

On February 4th, five Abu Sayyaf members believed to have orchestrated the attack surrendered to the Philippine Army. This arrest, coupled with strong words from the President, undoubtedly relieved the fears of citizens in Jolo and throughout the Philippines.

At least 14 main suspects are still at large; however, the Philippine government needs to recognize that these main suspects are only one part of a larger terrorist organization. Abu Sayyaf has at least 400 members and the main suspects that the Army has in custody represent a small subset of the overall group.

The Philippine Government should gather the information they can from the members that surrendered in order to take down Abu Sayyaf. While the attack doesn’t seem related to the Bangsamoro Organic Law, the government needs to keep the referendum in mind as it symbolizes movement towards peace for many in the region.

Terror’s New Form

Source: The East African (2014)

Author: Caleb Septoff

Perhaps one of the greatest scientific achievements in human history is the invention of the internet, which landmarked the beginning of the digital age in the modern era. Its uses span multiple fields and in large part is responsible for the high levels of rapid globalization we have become accustomed to today. Although it has improved humanity in many facets, it has also led to the increase in the susceptibility of nations’ and individuals to cyber-attacks. The internet has evolved over the last decade with the inception of social media and cyber currency, but with this evolution comes a new wave of terrorism in the form of cyber-attacks, propaganda, hacking, and online recruitment. The threat has grown substantially – enough for even university institutions, namely New York University (NYU), to offer cyber security majors and courses solely to deter these types of attacks.

Before venturing into the subject of digital terrorism, it is important to explore something less widely known to the average internet user; this being the deep web and dark net. The internet is composed of two main points of access; the surface web and the dark web. The surface web is most common to everyday users and comprises mainly of search engines, like Google and Bing, and the information found is unrestricted. Comparatively, the deep web differs mainly in size, estimated at four to five hundred times bigger than the surface web, accounting for 90% of the internet. In comparison to the surface web, the wealth of information stored on the deep web is gigantic. Most of the deep web is restricted by applications, which grant access to databases or password protected sites. Anything from social media, such as Facebook or Instagram, to online banking are considered part of the deep web. In addition to its size, the dark web differs  in its accessibility. Despite popular beliefs, the deep web and dark net are not synonymous. Rather, the dark net exists hidden below the surface web. The dark net is almost entirely unregulated and is even harder to access than the deep web. To date, the dark net hosts an unknown number of websites, but the content ranges from people sending messages who wish to maintain anonymity to underground drug dealing, sex trafficking, weapons dealing, and the focus of this article, terrorists and extremists’ sites.

The Islamic State of Iraq and the Levant (ISIL) or Daesh, was the first terrorist organization to truly maximize their outreach using the internet. When Abu Bakar al-Baghdadi declared the caliphate, a wave of propaganda and recruitment media took social media by storm. While destructive, authorities and the companies themselves were able to mitigate much of the content since it took place on the more accessible surface web. However, the organization consistently found new ways to respond to authorities’ crackdowns. First, they began attracting people through social media and other corners of the surface web and then slowly moved them towards more difficult protected places like domains and chat rooms on the dark net. In addition, the use of messaging applications that offered heavy encryption, like Telegram, were core ways for them to communicate. The use of these cyber tools aided in attracting over 20,000 foreign fighters from more than 10 different countries to flock to Syria to fight on ISIL’s behalf, and even more followers aided the organization from remote positions around the globe. In early 2018, New York Times’ reporter, Rukimini Callimachi, released a podcast by the name of “Caliphate.” The podcast goes into detail about one Canadian man’s experience of being recruited through multiple steps, starting on social media and eventually moving into private chat rooms. Callimachi’s reporting highlights how effective ISIL’s extensive reach was, not only technologically, but by simply creating effective connections with people, especially the youth.

Thus far, terrorists’ groups have not been able to do much more than the defacement of webpages and execution of minor cases of hacking. For example, a series of attacks in 2015, all claiming ties to Daesh, were executed in various countries. Most notably, a self-titled group called Cyber Caliphate managed to hack Malaysia Airlines’ main website, deface the French TV5 broadcast station, and hack the US military Central Command’s YouTube and Twitter accounts. Technology is continuously growing and it gets more sophisticated every year. As greater attention turns to digital recruitment and terrorism, these “small” attacks will grow larger in scope and harm. The possibility of cutting electric to hospitals or inciting mass riots through the spread of false media is very real and dangerous. The need to find adequate responses to the rising dangers of cyber terrorism is crucial to the future of counter terrorism. Perhaps most conspicuously, the important question becomes how to best be proactive in thwarting attacks and rather than simply being reactive.

The international community has a plethora of different third-party watch dogs when it comes to war and terrorism, whether they come in the form of global entities like the United Nations (UN) or International Non-Profit Organizations (INGO). In addition, a multitude of international treaties and agreements exist to set standards for war and outline what is not acceptable. The Geneva Convention, one of the most important and widely known, is comprised of four treaties and three protocols that establish standards for humanitarian rights and treatment during times of war. Yet, something these organizations don’t cover adequately is how to respond to cyber warfare and digital terrorism. One of the greatest challenges in dealing with these online threats is attribution, or ascribing blame to those who have committed the crime and proving it. According to a RAND Corporation video on the subject, they identify three main types of attribution: political (dealing with diplomatic knowledge and political actors’ objectives), technical (IP addresses, log file analysis, etc.), and clandestine (classified information and political insights).

Categorizing makes it easier to decide how to interpret the crime and, thus, how to assign punishment. However, it is not simple to prove digital crimes without access to data that, for the most part, is private, anonymous and not easily tracked. Citizens’ right to privacy and the level of privacy that is entitled has become a topic of high contention in the debate for higher cyber security. Although these are difficult issues to deal with, the international community needs to step up and begin to take action before cyber warfare reaches a level with much higher stakes. Like the UN, there needs to be a large international organization that can specialize in cyber security and cyber terrorism. It would require the nonexistence of any political affiliation to be effective and act on behalf of any country that requires its services to increase its credibility. Perhaps, most important, would be its role in providing international laws on cyber warfare and attacks to clearly and concisely build a foundation or framework for security agencies to work from. It would also be responsible for developing the mechanisms for freedom of expression and privacy; although this would most likely fall to the specific countries rather than the independent watch dog organization.

Social media platforms have done relatively well at combing through their users and content to locate possible terrorist activities, but this is not enough. Further action needs to be taken regarding regulation. Systems need to be devised to adequately monitor both the surface web content and the deep and dark web to locate, deter and respond to these threats before they can implement harm to critical infrastructures, governments, businesses, and even the psyches of viewers. Creating measures to regulate data and prevent data mining for terrorist activities is crucial to preventing the attacks in the future. There is no easy answer to the rising threat of cyber terrorism and warfare, but it’s imperative that solutions and international cooperation begins sooner than later.