Blog

  • Jihad on the Information Superhighway

    The Internet has become a major arena for modern jihadis. Understanding how militant Islamist groups operate online can help security services devise appropriate methods to forestall jihadist activities. 

    Modern terrorism relies heavily on modern technology. Indeed, modern technology is a defining characteristic of today’s terrorism. Both modern terror and modern technology are diffusive, decentralised, universal, interactive, low cost and chaotic in their respective structures (or lack of structures).

    The Internet has enabled a global jihad based on a loose network of Mujahedeen (people who fight for jihad) transcending the limitations of face-to-face interaction. Jihadis are making the most of the vast information available on the Internet to coordinate, to communicate, and to find essential data in order to wage anti-social, violent operations.

    How jihadis use the internet

    Propaganda, Indoctrination and Recruitment – Most radical and terrorist organizations use the Internet as a vehicle for ideological indoctrination. There are numerous cases of normal, often non-religious citizens becoming radicalized by jihadist websites, leaving them vulnerable to terrorist recruitment. The content of such propaganda usually consists of enemy demonization, justification of violence, and a general background of the jihadi group, its platform and objectives. The sites try to be effective as they compete with each other on the attention of potential followers. Interactive technology is used to connect with those who seem receptive to the jihadi messages and ideology. Recruiters use messaging apps like Kik to communicate with those who seek advice on how to cross into Syria. Terrorists proactively troll social media sites for individuals they believe may be susceptible and sympathetic to their violent messages. Indeed, Internet recruitment by ISIS is a major concern for European countries. Social media it utilised for the most anti-social activities.

    Hizb ut-Tahir, an Islamist extremist group, offers music and computer games to introduce their ideology and to attract young supporters. They depict Islam as under attack, and claim Muslims have a personal duty to fight attackers. Officially, the group distances itself from violence. At the same time, Hizb ut-Tahir, in Danish propaganda leflets, urged Muslims to kill Jews wherever they are. It also supports offensive jihad against Israel.  People affiliated with Hizb ut-Tahir have been linked to violent acts in multiple countries, including coup attempts in the Middle East, the murder of a pro-secularist blogger in Bangladesh, and spreading anti-Western and Muslim-separatist propaganda in the West.

    Al-Qaeda in the Arabian Peninsula (AQAP) publishes its English language jihadist magazine Inspire. The magazine, known for its high production standards, is designed to radicalize English-speaking Muslims, and encourages them to engage in militant activity. Inspire calls upon jihadists to mount attacks in the countries where they live. In December 2015, the Islamic State launched a cyber war magazine for jihadists called Kybernetiq that instructs militants about technology. The Islamic State is exploiting the Internet to the fullest, using social networks such as Facebook and Twitter to communicate with its audiences, and diversifying its reach by also using peer-to-peer apps like Telegram (fast, simple and free messaging service with enhanced security measures), Surespot (a secure mobile messaging app that uses end-to-end encryption for every text, image and voice message) and content sharing such as JustPaste.

    Anwar al-Awlaki was one of the iconic figures of modern terrorism. The American-Yemeni cleric was the leading English-speaking propagandist for al-Qaeda who was embraced also by the Islamic State. He was described by the FBI as the “senior recruiter for al Qaeda”. For his operational and leadership roles with al-Qaeda and for plotting attacks intended to kill Americans, al-Awlaki was killed by an American drone in 2011. But his influence endures beyond the grave.

    al-Awlaki’s propaganda helped radicalize several jihadists, including the terrorist Nidal Hasan from Fort Hood, Texas who murdered 13 people and wounding 32 others in a 2009 shooting rampage; Roshonara Choudhry, a 21-year-old student who stabbed in May 2010 MP Stephen Timms because of his 2003 vote in British parliament in support of the Iraq war; Dzhokhar Tsarnaev and his brother Tamerlan Tsarnaev, the Boston Marathon bombers (April 2013) who murdered three spectators and wounded more than 260 other people; Syed Rizwan Farook and Tashfeen Malik, the San Bernardino terrorists who murdered 14 people and injured 22 others in December 2015; Elton Simpson and Nadir Soofi who aimed to kill people who attended the “Draw Muhammad” cartoon contest in Garland, Texas in May 2015; Mohammad Youssef Abdulazeez who in July 2015 murdered four US marines in attacks on two facilities in Tennessee, and Omar Mateen, who murdered 49 people and wounded 53 others in a June 2016 mass shooting at Pulse nightclub in Orlando.

    Elsewhere, Hamas uses a network of websites targeting many populations. Its Website, the Palestinian Information Center, appears in eight languages. It provides propaganda and updates the Palestinian take on the news.

    The military wing of Hamas, the Ezzedin al Qassam Brigades, has its own website. It provides reports on current affairs, glorifies martyrs, offers interviews with Palestinians and intellectuals who support the armed struggle against Israel, provides information about their prisoners, and offers a comprehensive photo gallery. One of Hamas’s Websites was designed to target children: the site presented, in comic-book style, stories that encouraged children to engage in jihad and to become “martyrs”.

    Online jihadi propaganda can also be a potent form of psychological warfare. ISIS and Al-Qaida regularly publish videos that are designed to evoke fear. Violence plays a key role in the psyche of jihadists. The majority of videos distributed on jihadi forums feature explicit violence. On 19 April 2017 I wrote the words “ISIS violence” on YouTube search engine. The search yielded 706,000 results. The top results warned the viewers of graphic violence and of horrific ISIS executions.

    Networking – The Internet can help bridge the gap from the isolated potential mujahid to the global jihad. Connection between people may start on social networking sites such as Facebook, Twitter, Telegram and Vibe and then may continue on more obscure forums. The anonymity which individuals and groups may enjoy on the Internet, the encrypted capabilities and the international character of the Internet provide terrorists with an easy and effective arena for their destructive interests.

    The dark Internet is a home to illicit jihadi information and communication. Jihadi websites allow isolated young Muslims to engage with a worldwide network of like-minded people striving against what they perceive as a common enemy and with a singular unity of purpose. The forums, where people seem to care for each other, provide them with friends and support. The forums prove the existence of the ummah, or transnational Muslim community.

     Fundraising – Follow the money is a good advice for those who wish to understand the world of terrorism. Terrorist groups raise funds via the Internet by five primary methods:

    1.  Making appeals via e-mail or directly through their websites. Hamas has circulated appeal letters to various newsgroups. Hezbollah supplied bank account information to those who solicit the group by e-mail and it posted its bank account information directly on several of its websites. The Ibn Taymiyya Media Center (ITMC), an online jihadist propaganda unit located in the Gaza Strip, has been using social media to run a fundraising campaign. It is one of the first terrorist groups to publicly use the digital currency bitcoin.
    2. Selling goods. Many sites offer online “gift shops”: visitors can purchase or download free posters, books, videos, pictures, audiocassettes and discs, stickers, badges, symbols, and calendars.
    3. Through side businesses that are not identified as group-owned but are nevertheless associated. There are links between terrorism and organized crime, especially in spheres concerning illegal migration, corruption, economic crime, illicit drugs, arms trafficking and money laundering. The Hezbollah had coordinated the transportation, distribution, and sale of multi-ton bulk shipments of cocaine from South America. Large cash money was smuggled to Lebanon, and several Lebanese exchange houses utilized accounts at the Beirut-based Lebanese Canadian Bank (LCB). The proceeds were laundered through various methods which included the sale of used cars in the United States to African nations, mixing legitimate business with drug money which eventually found its way to the Hezbollah.
    4. Via online organizations that resemble humanitarian charity groups. Some charity organizations in the USA were in the service of Hamas and the Hezbollah until they were closed down. Charities are legitimate front organizations which enable to raise money from across the globe. In 2013, the UK Charity Commission warned of a risk that funds raised in the name of ‘charity’ generally or under the name of a specific charity are misused to support terrorist activities, with or without the charity’s knowledge. In 2017, the Charity Commission reported that alleged links between charities and terrorism or extremism have surged to a record high.
    5. Through fraud, gambling, or online brokering. According to the United Kingdom’s Financial Services Authority (FSA), terrorist groups launder their money through online firms. Online brokerage and spread-betting firms are particularly vulnerable to exploitation by terrorist groups because they are under-regulated and do not perform thorough checks on their investors. Younes Tsouli, Waseem Mughal and Tariq Al-Daour, based in London, worked for al-Qaida in Iraq. They stole money through online gambling sites. With different Trojan viruses, the three terrorists managed to raise more than 3.5 million dollars to buy web hosting services in order to show more influential videos of al-Qaida.

    Spreading tactics, planning of attacks and coordination of activities – Information technology has enabled terrorist organizations to receive and share knowledge globally. Terrorists can easily obtain information on sensitive targets and their potential weaknesses; public transport timetables; building sites, their opening times and their layout. Terrorist organisations maintain extensive databases that contain information about potential American targets.

    Multiple password-protected forums refer to extensive literature on explosives. Terrorists disseminate detailed manuals how to terrorise, kill and create mayhem. There is an immense amount of how-to material: cell phone detonators, how to make flamethrowers and napalm bombs together with violent and terrorist propaganda. There are detailed tutorials in viruses, hacking stratagems, the use of secret codes, encryption methods, Tor and other anonymity tools. Bomb-making knowledge is available on jihadi websites in the form of very detailed step-by-step video instructions showing how to build improvised explosive devices.

    There is strong evidence that such online instructions played a critical role in the March 2004 Madrid bombings, the April 2005 Khan al-Khalili bombings in Cairo, the July 2006 failed attempt to bomb trains in Germany, and the June 2007 plot to bomb London’s West End and Glasgow. The information help radical so-called “lone-wolfs” (who, thanks to the Internet, are never alone) to plan their actions.

    The Internet has proven to be an excellent vehicle by which information about travel, training, targets, tactics and a host of other useful organization details is displayed. Data, instructions, maps, diagrams, photographs, tactical and technical details are often sent in this exchange, often in encrypted format, using onion routers such as Tor that hide the Internet Protocol (IP) address. Gilles de Kerchove, EU Counter-terrorism Coordinator, said: “We have to be vigilant, since the threat posed by the so-called Islamic State (IS) and returning foreign fighters is likely to persist in the coming years”. 

    Al-Qaida members used the Internet in planning and coordinating the attacks of September 11, 2001. Mary E. Galligan, FBI Chief Inspector who supervised PENTTBOM, the FBI’s investigation of the attacks, studied closely the incident that brought about the global war on terror. She said that clearly the Internet was a vital channel for coordination of those attacks. Galligan asserted that al-Qaida terrorists learned the methods used by the US to combat terrorism; they studied the American soft spots and targets.

    Al-Qaida activists refrained from using cell phones, as they knew cell phones could be traced. Instead, they used the Internet, prepaid phone cards, and face-to-face meetings in Spain. Email was used to transmit messages between the terrorists. Al-Qaida activists were looking for American flight schools on the Internet, while they were in Germany.

    The terrorists used public libraries terminals for communications and data. At many public libraries, people can simply walk up to a terminal and access the Internet without presenting any form of identification. Within two weeks of the 9/11 attacks, the US had located hundreds of e-mails linked to the hijackers, in English and Arabic, sent before September 11, some of which included operational details of the planned terrorist assault.

    In 2015, Sid Ahmed Ghlam tried to open fire on a church in Paris. When the police searched his car, they found in his laptop a series of messages showing how he had been guided by a pair of handlers who provided both the weapons and the getaway car. Ghalem was remote-controlled by his handlers with the help of technology.

    The Telegram platform which enables end-to-end encryption was used by terrorists before the attacks on Nice in July 2016 and Berlin in December 2016. It is believed that videos of high profile attacks were posted on Telegram by jihadists to inspire and motivate each other, including the murder of soldier Lee Rigby in Woolwich and the 7/7 London bombings.

    In March 2017, Khalid Masood launched a terror attack near the British Houses of Parliament in which four people died and more than 35 others were injured. Minutes before the attack, Masood communicated with other people via the WhatsApp platform. WhatsApp, owned by Facebook, uses end-to-end encryption which prevents even its own technicians from reading people’s messages. This makes the work of law enforcement agencies particularly difficult.

    Responding to the cyber-jihad

    Law-enforcement agencies throughout the world can learn from each other and cooperate in the fight against illicit and anti-social activities online. Indeed, there are many similarities between counter-online terrorism activities, counter-online child-pornography activities and counter-online racism activities. To have effective results in fighting down terrorism, cooperation is vital. Failure to do so is inexcusable.

    Without responsible cooperation, Internet abusers will prevail, and our children will suffer. Nations, Internet intermediaries and responsible Netcitizens are obliged to ensure that future generations will be able to develop their autonomy, their individuality and their capabilities in a secure environment, both offline and online.

    Raphael Cohen-Almagor received his DPhil in political theory from Oxford University. He is Professor/Chair in Politics, and Founder and Director of the Middle East Study Group, University of Hull, UK. He is the author of hundreds of publications in politics, law, media and ethics, including most recently Confronting the Internet’s Dark Side (NY and Washington DC.: Woodrow Wilson Center Press and Cambridge University Press, 2015), the first comprehensive book on social responsibility on the Internet. https://www.wilsoncenter.org/book/confronting-the-internets-dark-side-moral-and-social-responsibility-the-free-highway.  Website: http://www.hull.ac.uk/rca. Blog: http://almagor.blogspot.com Twitter: @almagor35

  • Rwanda’s Gacaca Courts: Vengeance Through Law

    The Gacaca courts were set up in the aftermath of the Rwandan genocide to try and help Rwandans live together in peace. But research suggests that this system has been used as a tool for vengeance, and political and economic gain. 

    In the aftermath of the 1994 Rwandan genocide, the Rwandan Patriotic Front (RPF) government was faced with the task of bringing justice and reconciliation to a divided and devastated country. Gacaca, meaning “justice amongst the grass”, a traditional justice system once used to try local disputes between neighbours, was restored to relieve the overwhelmed prison system.

    Initially, it was well received. For those accused of genocide crimes, it was a long awaited step towards justice, an opportunity for the truth to be heard and them to be judged (see Tertsakian 2008: 376).  For the survivors, it meant that they would be able to tell their story and have justice for their loved ones.

    Between 2001 and 2012, gacaca processed nearly two million cases.  Most, if not all have involved Hutu as defendants. Gacaca was set up to try only genocide crimes. Crimes committed by RPF and out of revenge were excluded from the mandate. Waldorf notes that:

    Early on Penal Reform International warned that the implementation of gacaca was emphasizing legalistic retribution over socio-political reconciliation.  Since then, gacaca has become increasingly retributive, both in design and practice

    As a result, the legal system is perceived as being used against Hutu to not only criminalize them, but to obtain their wealth and resources. This paper examines the ways in which gacaca has been used as a tool for vengeance and to serve political or economic interests.

    The misuse of gacaca

    Beginning in March 2008, I carried out ethnographic research in Gisenyi and Cyangugu Rwanda as well as Goma and Bukavu Democratic Republic of the Congo (DRC). My research has emphasised that Hutu participants did not outright reject gacaca, rather they rejected how the system was being misused, as Zach, a Hutu participant, argued

    Gacaca is good idea, but those who work in the government are bad. The rules are written in a book but they are not obeyed. …Gacaca would be very good, if the government didn’t influence the decisions.  But this is not the case; judges are influenced by soldiers, genocide survivors and others.

    According to another Hutu participant, Huey:

    Some Hutu begin a business and the government will stop them.  There are many example of this.  One man had a very successful business of selling materials for repairing cars.  However, people took him to gacaca because he had lots of money.  He gave them money even though he wasn’t guilty.  He gave them lots of money.  Now he had to change the way he conducts business.  He doesn’t like to show the materials he has, because he’s scared that he will get dragged back to gacaca.

    Alphonse, another Hutu participant, agreed “They (the government) like to charge rich Hutu. When they don’t find anything, they take that Hutu to a different district and charge him with the same crimes there.” Robert was a Hutu participant arrested for genocide crimes in 1997 and for ‘genocide ideology’ in 2008. He believes the underlining cause for both arrests centred on property disputes:

    I was accused of killing my neighbour by his brother.  During the genocide, my neighbour was caught at a roadblock.  I explained to the men there that this man was my brother, but he didn’t have his identity card to prove it.  They told me they wouldn’t kill him, but to find some way to prove his identity.  I went to the District Office and paid for an identity card that said my neighbour was Hutu and my brother.  It was a lot of money. They released my neighbour, who fled to Congo.  When he arrived at the border, the Interahamwe killed him.  I fled with my family to Congo after the genocide.  When I returned, I was arrested on genocide crimes for this man’s death.  I had spent years in prison when the formal courts found me innocent.  I told them everything and they found that my neighbour’s brother had lied. Next the brother brought me in front of gacaca for the same crimes [killing his brother]. The gacaca judges were confused as to why this case was in front of them.  They agreed with the previous ruling and I was released.  [Why was your neighbour’s brother going to all these lengths to charge you?] Because, while I was in Congo, my neighbours had moved into my house and did not want to give it back.  When I returned, I reclaimed my house, but it was stripped of all windows and doors.  Two days later I was arrested for the death of his brother.

    Robert was in fact lucky. According to Human Rights Watch (HRW), Rwandan law protects an individual from double jeopardy. However, the practice has been allowed due to a loophole in the 2004 Gacaca law. HRW reported a case that was nearly identical to Robert’s, where a man was cleared by the formal courts and then given a thirty-year sentence in gacaca. He was released upon a successful appeal. In another case, in the district of Huye, a gacaca judge told how there were two cases where the men were acquitted in conventional courts, but convicted with lengthy prison sentences through gacaca (ibid).

    Coercion within gacaca

    gacaca

    Image credit: Elisa Finocchiaro/Flickr.

    According to Douglas, a Hutu participant, who was also a RPF member and gacaca official, guilt and innocence are often determined by the government. He told me “For those Hutu who are rich, the decision is always made before he is charged, before the judges reach a decision.” The involvement of the government became evident when I was allowed to attend a gacaca proceeding in Douglas’s jurisdiction.

    The accused was a former leader, who had been convicted by the formal courts of killing someone during the genocide. Upon appeal to the Supreme Court, the man’s conviction was overturned. He was finally released from prison and freed for only one night, when the police arrested him again. People from surrounding areas had accused him of killing and stealing a motorcycle during the genocide. However, some of those murder charges were the same accusations that the Supreme Court had previously overturned.

    Douglas explained that a genocide survivors’ organisation had initiated a campaign to mobilise survivors to accuse those who were ‘guilty’ of genocide crimes. However, the organisation and gacaca officials were unable to find anyone to accuse this particular man. As a result, the trial was cancelled and the case was postponed for a month. I asked Douglas if this was a form of coercion:

    Oh for sure, I’ve already been contacted. …I was told that I have to convince the judges and that we must charge this former leader and find him guilty.  We have to do this.  This is a heavy burden… As a team, we say that he is guilty. But in private we know this prisoner is innocent, we have no choice.  That prisoner was my neighbour.  I had seen everything that happened.  A former local leader took him to the market, where those Tutsi were.  He did nothing! He didn’t kill or hurt anybody!

    Genocide ideology, a tool for vengeance

    In all likelihood the ending of gacaca will not offset the misuse of the legal system as a tool for vengeance. In 2008, the Rwandan government passed Law No. 18/2008 that defined genocide ideology as:

    an aggregate of thoughts characterized by conduct, speeches, document and other acts aiming at exterminating or inciting others to exterminate people basing on ethnic group, origin, nationality, region, colour, physical appearance, sex, language, religion or political opinion, committed in normal periods or during war.

    Human rights organisations have been concerned with the imprisonment of Rwandans on vague accusations of ‘genocide ideology.’ Amnesty International argues that ‘genocide ideology’ legislation, like gacaca, ‘is compounded by the reality and perception that most accused come from one ethnic group.’  Furthermore, it is not uncommon for individuals to use ‘genocide ideology’ laws for personal gain.

    In fact, Amnesty was only able to find one case where a Hutu attempted to bring ‘genocide ideology’ charges against a Tutsi. The individual was offended after a Tutsi neighbour had called him a Hutu. The case was dropped by the prosecution. Robert believed that in connection with gacaca, ‘genocide ideology’ becomes a weapon that is used to discriminate and imprison innocent Hutu:

    Gacaca is used for stopping those Hutu who are rising up in society.  It allows Tutsi to take their property.  It helps to promote young Tutsi to occupy jobs.  A Tutsi can claim genocide ideology as a way of forcing a Hutu out of their post. It is like a business, anyone who gets into an argument at work can be accused of genocide ideology. Then they get put into prison.  Just ask why charges of genocide ideology only exist against Hutu, but Tutsi have genocide ideology as well.

    In 2008, Robert was arrested on allegations of ‘genocide ideology’ made by the same man who accused him of murder. Robert felt that having failed to obtain his property through accusations of genocide crimes, the man now turned to ‘genocide ideology.’

    I decided to rebuild a granary, after a few days the community leader came to me and told me that I must destroy the granary, because it was in the road.  I told him he didn’t have the authority… My neighbours sent that official, the same ones who had me arrested before, those that accused me before. They called the police and told them I had insulted them [a way of saying that a racial/ethnic epithet was used].  It was planned! The leader had told them that I had beaten him.  I am an old man; the leader is a young man. I cannot beat him!  When I got to prison, they charged me with crimes of genocide ideology and opposition to the government’s programmes. My wife’s brother came to intervene on my behalf.  He told me that I must be quiet; because they have many things they could charge me with.  The Police Commissioner also told me to go home and keep quiet.  Now I’m quiet.

    The other man involved was a neighbour, with whom Robert was having a boundary dispute with.  According to Robert, the men believe that if Robert returned to prison, he wouldn’t be able to pay back a bank loan and his house would be repossessed, solving both problems. Robert’s testimony highlights how the misuse of the legal system through gacaca and genocide ideology presents challenges to reconciliation. While, at the same time, demonstrating that there is a desire and a demand for it, he states,

    Those Tutsi were looking for any reason to condemn me to prison.  I didn’t do anything.  If I say anything, they will get me again and put me in prison. Everyday they accuse me.  Their (genocide survivors) agenda is like revenge there was no reason for them to do what they did.   They see me and their hearts accuse themselves.  When I was released (the first time) they were not happy to see me…In 2002, after I was released, I had electricity and water and my neighbours didn’t.  They came to me asking me for water.  They say, “This Hutu has TV, water, we have nothing”.  They think of me as being rich.  They say, “this Hutu, who has all these things, how can he get these things”? It’s a major reason why they want to punish me.  I put myself in Allah’s hands. …The best thing for all Rwandans would be to share power and forget.  To work for the nation, forget about the divisions or favouritism and use the same Arusha Accords as a power sharing agreement.  Only then can Rwanda be one house with one parent, to care for all children.

    Conclusion

    Much has been written and debated about whether or not gacaca has achieved reconciliation in Rwanda. While most would agree and recognize that gacaca was “one of the most ambitious transitional justice experiments in history”, it was also developed and carried out within the context of “deep political and ethnic division, fear, suspicion, intimidation and corruption” (see Tertsakian 2008: 362). The consequences of this is that gacaca was never going to be able to bring about reconciliation for all Rwandan, but rather contributed further wounds of mistrust and division.

    Larissa R. Begley received her PhD in Social Anthropology from the University of Sussex. She is currently a lecturer in African and African American Studies at Iowa State University. Her research focuses on understanding the implication of genocide ideology laws as a form of state violence in Rwanda.

  • El Salvador’s gang truce: a lost opportunity?

    Belize: challenges and contradictions in gang policy

    Like its neighbours in the northern triangle (El Salvador, Honduras and Guatemala), Belize has a high murder rate that is closely connected to the strong presence of gangs. But the character of gang activity in Belize is quite different from its Central American neighbours. Belize has pioneered some innovative solutions to the problem it is facing. But it will need to overcome the challenges of internal resistance and an acute lack of resources in order to address the political, economic and social issues that marginalise Belize’s large youth population.

    Read Article →

    The Costs of Security Sector Reform: Questions of Affordability and Purpose

    In considering security sector reform, questions of affordability have often been subordinated to questions of effectiveness and expediency. A recent series of reviews of security expenditures by the World Bank and other actors in Liberia, Mali, Niger and Somalia has highlighted several emerging issues around the (re)construction of security institutions in fragile and conflict-affected states.

    Read Article →

    Militarised Public Security in Latin America in Venezuela

    Across Latin America, governments are sending their militaries into the streets to act as de facto police forces in the face of disproportionally high crime and violence rates. This trend has been going on for several years, but has accelerated in 2013. With the move to deploy over 40,000 troops for citizen security in Venezuela, President Nicolás Maduro joined a growing list of leaders throughout the region that have relied on their militaries to carry out police duties. In the first of our two-part discussion ‘Countering Militarisation of Public Security in Latin America’, Sarah Kinosian discusses the conditions that are causing the trend to thrive.

    Read Article →

    Countering Militarised Public Security in Latin America: Lessons from Nicaragua

    Facing a myriad of public security challenges that have provoked some of the highest indices of crime and violence in the world, authorities in Central America have followed a variety of different responses, ranging from repressive and reactive policies to grass roots prevention. Of these approaches, the Nicaraguan National Police’s Proactive Community Policing model stands out due to the results it has achieved. In the second of our two-part discussion, ‘Countering Militarisation of Public Security in Latin America’, Matt Budd explores the lessons that Latin American countries can extract from Nicaragua’s unique approach to public security.

    Read Article →

  • ‘Petropolitics’ and the price of freedom

    ‘Petropolitics’ and the price of freedom

    “As the price of oil goes down, the pace of freedom goes up… As the price of oil goes up, the pace of freedom goes down…” So says New York Times columnist Thomas Friedman, who argues that the first law of ‘petropolitics’ is that the price of oil and the pace of freedom are inversely correlated in countries “totally dependent on oil” for economic growth. However, the correlation between recent oil price spikes and anti-authoritarian action – particularly in the Arab Spring – challenges this assessment. But if this pattern of change is to continue, Western states must curb their hypocritical dependence on authoritarian oil-exporting governments by developing more sustainable sources of energy.

    Read Article →

  • The Resilience of the Lord’s Resistance Army

    The Lord’s Resistance Army is seriously depleted as a fighting force, but it still continues to exist as an armed group. This resilience is driven by several key factors.  

    The Lord’s Resistance Army (LRA) has carved a path of violence and disorder throughout East and Central Africa for nearly three decades. Led by Joseph Kony, the rebel group has directly and indirectly killed more than 100,000 civilians, has abducted upwards of 66,000 children, and has displaced hundreds of thousands more across five countries. While formidable in the past, the LRA is now a threadbare non-threat from a conventional military standpoint. With the group’s numbers at less than 200 (down from at least 5,000 active fighters in the 1990s), attacks and abductions are steadily trending downwards.

    Yet the LRA has also proven to be distinctly resilient, surviving as a collection of semi-autonomous units in sparsely populated peripheries that put up no resistance. Nevertheless, LRA fighters still pose a tangible threat as they loot and harass civilians, while Kony evades detection in Sudan’s Kafia Kinji region. While many observers describe the group’s current behavior as “survival mode,” its complex history shows this to be its modal pattern of organization and behavior based on an on-going ability of the group to adapt to shifts in its politico-military environment through distinct organizational endowments and resource acquisition strategies.

    Understanding LRA Resilience

    Most of the prevailing literature on the LRA has provided key insights into its history, organization, and behavior. However, the research that has focused on the group’s motives and the drivers of its violence has not addressed the distinct question of its resilience. The LRA’s resilience comes down to its organizational structure and shrewd resource strategies that have developed within autonomous bush sanctuaries and vis-à-vis the group’s wider political environment.

    Its organizational structure is based on a distinct combination of two factors. First, LRA recruitment and retention strategies relied on Acholi beliefs in spiritual and cultural symbols, such as viewing Kony as a medium for the “holy spirit,” and the common use of rituals. Such beliefs and practices, undergirded by violence, helped socialize Acholi youths familiar with them into fighters. Second, a more traditional military hierarchy was built around an initial committed core, which formed the basis for a flexible, decentralized structure that, while slowly degrading over time, has remained remarkably sturdy. In addition, the group’s resource acquisition strategies have adapted to periods of both abundance and scarcity. This configuration of factors has remained more-or-less intact for more than three decades as the LRA has interacted with regional geopolitical shifts and in the face of multiple challenges of maintaining an insurgency.

    LRA Resilience Over Three Phases

    Uganda soldiers part of the 2008–09 Garamba offensive against LRA. Image credit: Sgt. Jeremy T. Lock/Wikimedia.

    The LRA grew directly from a homegrown Ugandan People’s Democratic Army (UPDA), made up from the dominant Acholi faction of the national army overthrown by the National Resistance Army (NRA) in 1986. Led by Bazilio Olara-Okello and other military strongmen, the UPDA rebellion ended with the Pece Peace Accord of 1988. Yet senior officer Odong Latek and intransigent junior officers from the former military remained in the bush fearing criminal punishment. While this rump of the UPDA retained a military structure, it began to rely on alternative strategies for mobilization. During the UPDA’s war, head of the Holy Spirit Movement Alice Lakwena and Joseph Kony developed factions that attracted fighters with an appeal to the salvation for the Acholi people through military victory, using unorthodox military practices (e.g. believing shea butter would make fighters bullet-proof and that rocks would explode as hand grenades). Following the 1987 defeat of Lakwena’s Holy Spirit Mobile Forces (HSMF), Kony’s faction became dominant. By late 1988, Latek’s more conventional force merged with the sizable “cosmological” faction controlled by Kony, signaling the rise of his absolutist vision of Acholi society that sought to purify through violence anyone deemed government loyalists. This vision, which drew heavily on elements of elements of Acholi spiritual identity, quickly became an organizing principle and a source of resilience.

    With Latek killed in 1989, Kony asserted authority, rebranding the rebellion several times until it became the LRA in September 1993. Here the group established its organizational structure, with “Control Altar” directing its operational brigades – named Gilva, Sinia, Trinkle, and Stockree – which remained intact for years and adapted to changes in manpower and resource availability. Yet the decline of the LRA’s first phase began as the Ugandan state expanded into northern Uganda. The counterinsurgency campaign Operation North weakened the LRA while militarizing Acholiland. The government also expanded the Resistance Council (RC) administrative system while recruiting Local Defence Units (LDUs) as the RC’s coercive arm. However, when military action failed to eliminate the group, peace talks began in late 1993. These talks broke down in early 1994 amidst boycotts and accusations of dishonesty. Tired of the LRA’s mounting demands, President Museveni gave the group seven days to surrender or face a military solution. Meanwhile, Kony had used the talks to conceal clandestine negotiations with Sudanese intelligence. Following Museveni’s ultimatum, the LRA withdrew into southern Sudanese garrison towns for reorganization and training. By February 18th 1994, the group re-emerged heavily armed and newly equipped.

    Thus began the LRA’s second phase in the mid-1990s when it became part of a proxy war as the Sudanese government provided it with weapons and military training to fight the Sudan People’s Liberation Army and territorial sanctuaries from which to attack Uganda. The LRA’s experience in southern Sudan consolidated the group’s structure, hardened its fighters (largely abducted Acholi youth as young as 12), and taught them how to survive in borderlands for years of operations that kept northern Uganda in almost permanent humanitarian crisis. Yet, while Sudanese support was a decisive factor in the LRA’s military strength and the intensification of the conflict, it was not always seamless. Kony’s priorities in Uganda often put him at odds with Khartoum and this led to periodic ruptures in the LRA’s resource pipeline, and the group was often expected to fend for itself in terms of day-to-day survival. As such, the LRA developed a diversified strategy of resource acquisition – maintaining military stockpiles while creating self-sustaining agrarian communities. These experiences with intermittent access to resources promoted the LRA’s self-sufficiency and resilience.

    The decline of this period began with the December 1999 Nairobi Agreement, which committed Sudan and Uganda to end their proxy war. Attacks in northern Uganda declined, but the LRA remained in southern Sudan. At times, the group received Sudanese support. But Khartoum signaled its commitment to push the LRA from its territory in early 2002 when it authorized the UPDF to launch Operation Iron Fist, designed to dislodge the LRA from its Sudanese bush camps. While Iron Fist delivered some tactical successes, it did not deliver the desired knockout blow to the LRA. Instead, in 2003 the group re-entered Uganda and started a fresh conflict characterized by high profile violence and a humanitarian crisis that the Ugandan government largely outsourced to international aid agencies. The 2005 Comprehensive Peace Agreement (CPA) ended the civil war in Sudan and ejected the LRA while a revitalized UPDF blocked the group’s re-entry into Uganda.

    From 2005, the LRA shifted into its third phase, best described as roving banditry. Facing military threats and the geopolitical closure of northern Uganda and southern Sudan, the group shifted to DRC’s Garamba National Park. For the following two years, the Juba peace process allowed the LRA to regroup while coalescing more tightly around Kony’s security. During this period, there was a relative lull in LRA violence, limited abductions, and the suspension in abductee training. Yet while support from Khartoum had ended, the LRA’s military capacity remained intact. Juba ultimately collapsed in 2008 due to ceasefire violations, walkouts, the LRA’s refusal to gather in the assembly areas, and Kony’s repeated failure to sign the accord’s final documents of the accord. The LRA soon resumed violence in DRC as the UPDF led Operation Lightening Thunder against Kony’s Garamba hideout. Intelligence failures led to an unsuccessful operation, and UPDF ground troops arrived at an empty camp. Shortly thereafter, the LRA unleashed a series of reprisal killings against civilians.

    The LRA’s sanctuaries in DRC, CAR, and Sudan have provided permissive conditions for survival – few state institutions and a new set of resources. As such, the group has since engaged its resilience strategies in two key ways. First, the LRA has managed to maintain its hierarchy despite the outflow senior commanders, extended periods of geographical separation, and sporadic communication between units, which are expected to act independently and fend for themselves. Although this organizational structure is decentralized, core members still carry out Kony’s long-term strategic orders while maintaining an explicit LRA identity. Second, while looting remains a way of obtaining resources, the LRA has become a small player in regional illicit networks in natural resources, particularly ivory, diamonds, and gold. The group’s renewed informal relationship with Sudanese officials in the Kafia Kinji border region shelters Kony and his inner retinue and provides markets for looted items and commodities.

    Conclusion

    In sum, the LRA has survived by virtue of its organizational cohesion, resource use, and the ability to read its political terrain in order to exploit regions without state structures. However, such strategies may not be sufficient to sustain the LRA indefinitely. The Ugandan-led Regional Task Force (RTF) has killed and captured senior commanders from the battlefield and increased fighter defections. To be sure, the hunt for the LRA has been hamstrung by logistical and political difficulties. Above all, RTF operations are currently at risk of losing their logistical support from the U.S. Special Forces, which have larger consequences for regional peace and security in central and eastern Africa.

    Christopher Day is an Associate Professor at the College of Charleston. He joined the Department of Political Science in August 2012. His teaching and research interests are in Comparative Politics, with a particular emphasis on African politics, political violence, and civil wars. His research interests extend to international security, counterinsurgency, proxy warfare, and the institutional role of different armed state actors in Africa. A former disaster relief worker with Médécins Sans Frontières, he is also interested in humanitarian affairs. He offers courses on the Politics of Africa, the Model African Union, Global Political Theory, and World Politics.

  • The Environment and Conflict in 2016: A Year in Review

    DU-turn? The changing political environment around toxic munitions

    Is the US backpedalling on its use of depleted uranium (DU) rounds? There are indications that the use of these highly toxic munitions could increasingly be a political liability for the US, with countries affected by DU, like Iraq, other UN Member States, and populations in contaminated areas all expressing concerns over its use and impact. But stigmatisation, although important, is not enough on its own – in order to make sustained progress on accountability and in reducing civilian harm, a broader framework that addresses all toxic remnants of war is needed.

    Read Article →

  • Learning the Lessons: 11 Years of Drones in Pakistan

    Nuclear Weapons: From Comprehensive Test Ban to Disarmament

    Despite not yet entering into force, the 1996 Comprehensive Test Ban Treaty has succeeded in almost eliminating nuclear weapons testing and in establishing a robust international monitoring and verification system. A breakthrough in its ratification by the few hold-out states could have important positive repercussions for the Nuclear Non-Proliferation Treaty or nuclear disarmament in the Middle East.

    Read Article →

    10 years of US Drone Strikes in Pakistan – What Impact Has it Had?

    This week marks 10 years since the first reported US drone strike in Pakistan. It has also seen the resumption of US drone strikes in the country following a five-month pause. Considering the length of time the CIA-led programme has been running, a number of questions deserve consideration: namely, how effective has the decade long covert drone programme been in Pakistan and what impact have drones had on wider Pakistani society? As the military technology for remote-control warfare spreads, there is a need to question whether drones provide significant tactical advantage or whether their proliferation could lead to greater long-term global insecurity.

    Read Article →

    US Drone Strikes in Pakistan: ineffective and illegitimate

    Strikes by unmanned combat air vehicles, or armed drones, have become the tactic of choice in US counterterrorism efforts in Yemen, Somalia and, the topic of current controversy, Pakistan. The lack of transparency, dubious effectiveness, civilian casualties and negative consequences for US national security being highlighted by current debate means that Washington needs to re-evaluate its approach.

    Read Article →

    Can the Nuclear Non-Proliferation Treaty outrun its double standard forever?

    The recent walkout by Egyptian negotiators at UN talks have demonstrated that, like a building with rotten foundations, the nuclear non-proliferation regime is far less stable than many believe it to be. Egypt’s actions make clear that anything less than a regime specifically geared towards addressing the reasons why some states seek nuclear weapons is a regime existing on borrowed time.

    Read Article →

  • Fatal Attraction: The Lure of Islamic State

  • Rising Golden Dawn: Inside Greece’s Neo-Nazi Party

  • Water Security in South Africa: The need to build social and ecological resilience

    Water Security in South Africa: The need to build social and ecological resilience

    Tackling South African water insecurity will require addressing the technical deficiencies, governance gaps and social inequality that are currently having a dangerous and environmentally devastating impact. The links between environmental health and socio-political stability are clear in South Africa, where there has been an exponential increase in violent protests over poor or privatized service delivery, social marginalization, and unequal access to water. South Africa must act to solidify the links between resilient societies and resilient ecosystems.

    Read Article →

    Environmental security in the Arctic: the ‘Great Game’ vs. sustainable security

    Arctic security remains wedded to traditional, state-centric military threats despite the fact that the threat of outright conflict is as remote as the farthest reaches of the Arctic region itself. These approaches are predictable, but they will contribute little to alleviating the complex, interrelated, and underlying drivers of insecurity in the Arctic region. Cameron Harrington argues that if our understanding of both Arctic security and the Arctic environment continues to be reduced to the international scramble for untapped resources and for newly opened “shipping lanes”, it is unlikely that the hugely alarming and damaging environmental effects of climate change will ever be truly overcome.

    Read Article →