IRGC

US Deems IRGC “Terrorists”

As part of the Trump Administration campaign to isolate Iran, Secretary Mike Pompeo declared the Iranian Revolutionary Guard Corps (IRGC) as a foreign terrorist group.

The IRCG was created in 1979 to protect the newly established Islamic Republic of Iran. Today it does much more. In Iran, the IRCG is an important actor for business including telecommunications, and energy.

They have close ties with the current Supreme Leader of Iran, Grand Ayatollah Ali Khamenei, which gives them influence beyond the Iranian boarders. For example, their sub-group Quds operates in Syria, Israel, and other Middle Eastern states.

Pompeo cites the 1996 Khobar Towers bombing in Saudi Arabia and the 2011 foiled plot by the Quds to assassinate the Saudi ambassador to the US. It seems as if this move has been a long time coming due to previous attacks relating to the US and its allies.

Trumps use of ‘maximum pressure’ is a part of this move to add IRCG to the list of terrorists and it is used as a way to stabilize the region to create peace.

However, the timing suggests this action may be political to support Benjamin Netanyahu, who was running for Prime Minister of Israel. Trump and Netanyahu have very close relations since the end of the Obama administration, so it would be plausible for Trump to make this move to support his friend in the Middle East, while continuing his campaign to isolate and threaten Iran.

The Islamic Republic of Iran has also responded in word and action with Trumps decision to designate the IRCG as a foreign terrorist group. In return, the Iranians have declared all American forces in the Middle East as terrorists.

This latest development increases the already heightened tension. This could be catastrophic in the Middle East. Since both militaries consider their counterparts terrorists, it could lead to war between the US and Iran.

The US has made many harsh moves to isolate Iran since the election of Trump. Although, it seems that tensions between the US and Iran are at an all-time high. President Trump just might want to reevaluate the way he’s using his power.

 


Nick Webb is the Research Fellow at Rise to Peace.

ISIL: Cathedral Attack in the Sulu Province

Source: Reuters 2019

Abu Sayyaf attacked the Catholic Church, Cathedral of Our Lady of Mount Carmel, during mass on January 27th in the Sulu Province of the Southern Philippines. The Islamic State of the Levant (ISIL) claims the two back-to-back bombings were the work of suicide bombers, which was later confirmed by Interior Secretary Eduardo Ano.

At least 20 people were killed in the attack and more than 100 individuals were injured. In response to this attack, the Filipino Government is on high alert and is conducting military operations to “destroy” Abu Sayyaf. President Duterte also declared martial law until the criminals are found.

Abu Sayyaf is a branch of the ISIL that has been active in the Philippines since 1991. The group is known for bombing a ferry in 2004, killing 116 people, as well as various kidnappings for ransom. The attack in Jolo is one of their largest to date, with 131 total casualties, as calculated by our Active Intelligence Database.

A week prior to the bombing, a referendum was conducted on the Bangsamoro Organic Law, which would allow for expanded autonomy of the Autonomous Region in Muslim Mindanao. While experts don’t believe the two events are related, it’s possible that the attack was meant to further divide the Muslim and Christian communities in the province.

The Philippine government has taken proper steps to reassure the community through security personnel outside places of worship and patrols through large public areas. President Duterte responded with strong and ruthless commentary on the church bombing by declaring the military to take care of the threat posed by Abu Sayyaf by any means necessary.

The military adamantly agreed with Duterte and staged multiple manhunts to find Abu Sayyaf members behind the attack. The Army suffered a few fatalities in the altercations with Abu Sayyaf militants before making a major arrest.

On February 4th, five Abu Sayyaf members believed to have orchestrated the attack surrendered to the Philippine Army. This arrest, coupled with strong words from the President, undoubtedly relieved the fears of citizens in Jolo and throughout the Philippines.

At least 14 main suspects are still at large; however, the Philippine government needs to recognize that these main suspects are only one part of a larger terrorist organization. Abu Sayyaf has at least 400 members and the main suspects that the Army has in custody represent a small subset of the overall group.

The Philippine Government should gather the information they can from the members that surrendered in order to take down Abu Sayyaf. While the attack doesn’t seem related to the Bangsamoro Organic Law, the government needs to keep the referendum in mind as it symbolizes movement towards peace for many in the region.

Terror’s New Form

Source: The East African (2014)

Author: Caleb Septoff

Perhaps one of the greatest scientific achievements in human history is the invention of the internet, which landmarked the beginning of the digital age in the modern era. Its uses span multiple fields and in large part is responsible for the high levels of rapid globalization we have become accustomed to today. Although it has improved humanity in many facets, it has also led to the increase in the susceptibility of nations’ and individuals to cyber-attacks. The internet has evolved over the last decade with the inception of social media and cyber currency, but with this evolution comes a new wave of terrorism in the form of cyber-attacks, propaganda, hacking, and online recruitment. The threat has grown substantially – enough for even university institutions, namely New York University (NYU), to offer cyber security majors and courses solely to deter these types of attacks.

Before venturing into the subject of digital terrorism, it is important to explore something less widely known to the average internet user; this being the deep web and dark net. The internet is composed of two main points of access; the surface web and the dark web. The surface web is most common to everyday users and comprises mainly of search engines, like Google and Bing, and the information found is unrestricted. Comparatively, the deep web differs mainly in size, estimated at four to five hundred times bigger than the surface web, accounting for 90% of the internet. In comparison to the surface web, the wealth of information stored on the deep web is gigantic. Most of the deep web is restricted by applications, which grant access to databases or password protected sites. Anything from social media, such as Facebook or Instagram, to online banking are considered part of the deep web. In addition to its size, the dark web differs  in its accessibility. Despite popular beliefs, the deep web and dark net are not synonymous. Rather, the dark net exists hidden below the surface web. The dark net is almost entirely unregulated and is even harder to access than the deep web. To date, the dark net hosts an unknown number of websites, but the content ranges from people sending messages who wish to maintain anonymity to underground drug dealing, sex trafficking, weapons dealing, and the focus of this article, terrorists and extremists’ sites.

The Islamic State of Iraq and the Levant (ISIL) or Daesh, was the first terrorist organization to truly maximize their outreach using the internet. When Abu Bakar al-Baghdadi declared the caliphate, a wave of propaganda and recruitment media took social media by storm. While destructive, authorities and the companies themselves were able to mitigate much of the content since it took place on the more accessible surface web. However, the organization consistently found new ways to respond to authorities’ crackdowns. First, they began attracting people through social media and other corners of the surface web and then slowly moved them towards more difficult protected places like domains and chat rooms on the dark net. In addition, the use of messaging applications that offered heavy encryption, like Telegram, were core ways for them to communicate. The use of these cyber tools aided in attracting over 20,000 foreign fighters from more than 10 different countries to flock to Syria to fight on ISIL’s behalf, and even more followers aided the organization from remote positions around the globe. In early 2018, New York Times’ reporter, Rukimini Callimachi, released a podcast by the name of “Caliphate.” The podcast goes into detail about one Canadian man’s experience of being recruited through multiple steps, starting on social media and eventually moving into private chat rooms. Callimachi’s reporting highlights how effective ISIL’s extensive reach was, not only technologically, but by simply creating effective connections with people, especially the youth.

Thus far, terrorists’ groups have not been able to do much more than the defacement of webpages and execution of minor cases of hacking. For example, a series of attacks in 2015, all claiming ties to Daesh, were executed in various countries. Most notably, a self-titled group called Cyber Caliphate managed to hack Malaysia Airlines’ main website, deface the French TV5 broadcast station, and hack the US military Central Command’s YouTube and Twitter accounts. Technology is continuously growing and it gets more sophisticated every year. As greater attention turns to digital recruitment and terrorism, these “small” attacks will grow larger in scope and harm. The possibility of cutting electric to hospitals or inciting mass riots through the spread of false media is very real and dangerous. The need to find adequate responses to the rising dangers of cyber terrorism is crucial to the future of counter terrorism. Perhaps most conspicuously, the important question becomes how to best be proactive in thwarting attacks and rather than simply being reactive.

The international community has a plethora of different third-party watch dogs when it comes to war and terrorism, whether they come in the form of global entities like the United Nations (UN) or International Non-Profit Organizations (INGO). In addition, a multitude of international treaties and agreements exist to set standards for war and outline what is not acceptable. The Geneva Convention, one of the most important and widely known, is comprised of four treaties and three protocols that establish standards for humanitarian rights and treatment during times of war. Yet, something these organizations don’t cover adequately is how to respond to cyber warfare and digital terrorism. One of the greatest challenges in dealing with these online threats is attribution, or ascribing blame to those who have committed the crime and proving it. According to a RAND Corporation video on the subject, they identify three main types of attribution: political (dealing with diplomatic knowledge and political actors’ objectives), technical (IP addresses, log file analysis, etc.), and clandestine (classified information and political insights).

Categorizing makes it easier to decide how to interpret the crime and, thus, how to assign punishment. However, it is not simple to prove digital crimes without access to data that, for the most part, is private, anonymous and not easily tracked. Citizens’ right to privacy and the level of privacy that is entitled has become a topic of high contention in the debate for higher cyber security. Although these are difficult issues to deal with, the international community needs to step up and begin to take action before cyber warfare reaches a level with much higher stakes. Like the UN, there needs to be a large international organization that can specialize in cyber security and cyber terrorism. It would require the nonexistence of any political affiliation to be effective and act on behalf of any country that requires its services to increase its credibility. Perhaps, most important, would be its role in providing international laws on cyber warfare and attacks to clearly and concisely build a foundation or framework for security agencies to work from. It would also be responsible for developing the mechanisms for freedom of expression and privacy; although this would most likely fall to the specific countries rather than the independent watch dog organization.

Social media platforms have done relatively well at combing through their users and content to locate possible terrorist activities, but this is not enough. Further action needs to be taken regarding regulation. Systems need to be devised to adequately monitor both the surface web content and the deep and dark web to locate, deter and respond to these threats before they can implement harm to critical infrastructures, governments, businesses, and even the psyches of viewers. Creating measures to regulate data and prevent data mining for terrorist activities is crucial to preventing the attacks in the future. There is no easy answer to the rising threat of cyber terrorism and warfare, but it’s imperative that solutions and international cooperation begins sooner than later.

The Psychological Battle Against Terror

A man prays by a memorial for the dead. Image credit: Christian Hartman, REUTERS.

There is a special aspect to be considered when analyzing the modus operandi and tactics of jihadist movements. As we all know, criminals usually act in secrecy, trying to leave no trace of their underground activities and avoiding capture. However, jihadi attacks and claims of responsibility have largely proven that violent extremisms aim to operate in the open.

In a word where communication is key, contemporary terrorism has become a constant and disruptive daily presence. Because their attacks are in the open, we feel a threat even when terrorists seem inactive.

The reason of this spectacularization can be found in their main purpose: what do terrorist groups want to gain from their attacks?

Behind all criminal activities, there is a certain desire for power. In the specific case of terrorism, it is all about power to influence people’s emotions.

It is plain to see that terrorists want to instill fear. As the German philosopher Hannah Arendt stated, “fear is an emotion indispensable for survival”- but violent extremism has led to a pathological and relentless “state of terror”. The Big Threat of our time has quickly wormed its way into our lives, and now we need to cope with its several consequences.

Terrorists want to develop a general and constant state of insecurity that follows people everywhere, in everything they do. The impact of terrorist attacks on the human psyche ranges from short-term psychological conditions to long-term pathologies: Post-Traumatic Stress Disorder, constant sense of doom, anxiety and anguish about future risks, feelings of terror and helplessness, anger and desire for revenge.

If even a few of these signs sound familiar to you, then their aim has been achieved.

It is not easy to deal with the effects of terrorism on mental health, and it is even harder to put into practice effective strategies to properly counter this insidious violence.

It is clear that we all should play an active role in facing this threat by taking action on a daily basis with a pure “contrasting strategy.” This strategy simply consists of disappointing the terrorists’ expectations: since extremists want to disrupt our sense of safety, we should be even more resilient, take back control of our lives, and resume our daily activities as soon as possible.

The most challenging part of this strategy will be learning to deal with our personal emotions, which is why civil and governmental institutions should try diverse approaches to boost social cohesion and control. This will help people mitigate the sense of loneliness and helplessness that normally occur after shocking events and traumatic times.

Given the amount of power terrorists now wield over everyday life, it is critical that we do not give them any more influence. Ultimately, the power to reduce this influence begins in our own hearts and minds.

U.S. International Terrorism Strategy in 2018: New Battleplan or More of the Same?

© Mandel Ngan/AFP/Getty Images

U.S. International Terrorism Strategy in 2018: New Battleplan or More of the Same?

On January 30, 2018, President Donald Trump presented his State of the Union speech before Congress and the nation.  Since 9/11, presidents’ State of the Union speeches have consistently highlighted the impact of terrorism and the United States’ strategy in combating its global presence. Yet, President Trump’s speech mentioned terrorism a handful of times and often in the context of immigration concerns. Although the United States is not the only power fighting against terrorism and extreme ideologies, as a vital actor, it remains important to understand the United States’ objectives and planned actions moving into 2018.

Through 2016 and 2017, the world has watched the gradual, ongoing pushback of the Islamic State (ISIS) in Syria and Iraq. The US-led coalition has consistently brought the attack against ISIS terrorists. Kurdish forces and Arab allies reclaimed Mosul and later Raqqa.  Today, the so-called Islamic State retains only a small fraction of the territory it once claimed.

Map of ISIS Territorial Control[1]

The fight is not over though.  ISIS maintains a foothold and their hateful ideology continues to spread online.  Unfortunately, the Trump Administration’s National Security Strategy failed to outline a comprehensive strategy regarding how the factors underlying the conflict will be addressed, the same problem as the past administration. On January 18, 2018, Secretary of State Tillerson outlined five goals for U.S. national security interests in Syria:

  1. Defeat of ISIS, al Qaeda, and terrorist threats to the U.S.;
  2. Resolution of the Syrian conflict through the U.N. political process that assures President Assad’s removal
  3. Diminish Iranian influence;
  4. Safe and voluntary return of refugees and internally displaced peoples; and
  5. Syria remains free of weapons of mass destruction.[2]

While these goals are laudable, they fail to articulate the U.S. strategy in Syria and the deployment of U.S. counterterrorism forces.  Tillerson affirmed that, for the foreseeable future, the U.S. will maintain a military presence in Syria.[3] Just like in Iraq, inadequate management of this victory can lead to the rise of a similar or greater terrorist threat in the region in years to come. The U.S. must remain leery of declaring victory without the assurances of responsible governance and plans to address deep cultural and religious tensions.  As Secretary of Defense Mattis indicated, the U.S. must be mindful what ISIS can morph into following their territorial defeat.[4]

For Afghanistan, the Trump Administration’s goals are more simplistic.  In 2017, President Trump increased the troop levels from 8,500 to 14,000.[5] General Votel, U.S. Central Command, indicated that an increase in American trainers would be vital to expand the fight against insurgents and the Taliban.[6] Under the Trump Administration, the U.S. military was given greater latitude to strike targets and operate within these conflict zones.

Partnerships with Afghanistan and its neighbor, Pakistan, will help in tempering the conflict. A strong U.S. security presence, with a freer reign of tactics, may push back the Taliban and insurgency parties, but only the regional actors may be able to completely resolve the conflict.  President Trump’s determination to withhold aid from Pakistan will not aid that objective or regional stability. U.S. troops may be able to reduce the Taliban and extremist fighters, but terrorism will not end in the area if Afghanistan and Pakistan are not players. One thing is certain, the Trump Administration is focused on the elimination of the Taliban and terrorist fighters in Afghanistan.

Map of South Asia and Conflict Parties, and U.S. Troops in Afghanistan[7]

In conjunction with President Trump’s rhetoric, U.S. actions in the Middle East and South Asia are moving toward greater militarism.  The U.S. military has been able to reduce terrorist organizations’ strength.  This may lead to some positive outcomes, but it rarely has led to complete success against terrorism. Iraqi and Afghans history shows that the military cannot be the sole solution.  President Trump’s State of the Union did not address any methods or plans to counter violent extremist ideology (a root of many of these conflicts) in the region.  A comprehensive terrorist strategy – military and diplomatic – is necessary.

Sources:

————————————————————————————————————–

[1] http://www.bbc.com/news/world-middle-east-27838034

[2] https://www.politico.com/magazine/story/2018/01/30/donald-trump-syria-strategy-216551

[3] https://www.politico.com/magazine/story/2018/01/30/donald-trump-syria-strategy-216551

[4] http://thehill.com/opinion/national-security/370295-the-isis-defeat-myth-no-one-talks-about-isis-sympathizers-and-us

[5] https://www.washingtonpost.com/world/national-security/up-to-1000-more-us-troops-could-be-headed-to-afghanistan-this-spring/2018/01/21/153930b6-fd1b-11e7-a46b-a3614530bd87_story.html?utm_term=.83275c5c3741

[6] http://time.com/5085376/afghanistan-us-military-strategy/

[7] https://www.bloomberg.com/news/articles/2018-01-11/trump-is-playing-a-dangerous-game-with-pakistan

[print-me]