Fighting the Islamic State in the Fifth Domain

Page 1

Running head: FIGHTING THE ISLAMIC STATE IN THE FIFTH DOMAIN

Fighting the Islamic State in the Fifth Domain:

The Reemergence of Transnational Terrorism in the Indo-Pacific

Zachary J. Adams

Norwich University

1


FIGHTING THE ISLAMIC STATE IN THE FIFTH DOMAIN ACRONYMS

4GW

Fourth Generation Warfare

AQI

al-Qaeda in Iraq

ASG

Abu Sayyaf Group

FMSO

US Army Foreign Military Studies Office

ICT

Information and Communications Technology

ISI

Islamic State in Iraq

ISIS

Islamic State and al-Sham

JI

Jemaah Islamiyah

MSC

Mujahedeen Shura Council

2


FIGHTING THE ISLAMIC STATE IN THE FIFTH DOMAIN The presence of the Islamic State of Iraq and al-Sham (ISIS) continues to have a turbulent effect on Middle Eastern stability and security affairs. As a result of the conflict, Southeast Asia is experiencing a return of extremists from the battlegrounds of Syria and Iraq. Due to the group’s formidable endurance, ISIS has taken the advantage to expand its mission into a sympathetic region. In particular, Indonesia and Malaysia are primary target states due to their majority and large-scale Muslim population, as well as southern parts of the Philippines and Singapore. The implication of the Islamic State’s emergence in Southeast Asia has had an immediate and tumultuous effect on regional security especially with the transition from the battlefield to the battlespace.

Extremist groups have begun harnessing the influence of technological capabilities by engaging and exploiting vulnerabilities in any capacity to achieve intended objectives. Furthermore, the former portion of this essay provides analysis on three areas: it explains the political divide between al-Qaeda and ISIS, how the so-called “state” has exploited alQaeda’s decline, and how the Islamic State’s expansion into Southeast Asia is becoming a greater threat to regional security. By identifying the Islamic State’s primary communication methods and tactics used to establish a growing Indo-Pacific presence, the latter portion will provide a fundamental framework on how regional actors can expectantly mitigate and reduce the threat to security and stability through the fifth domain.

The Rise of the Islamic State

The structure of the Islamic State known today generated out of the former Islamic State of Iraq (ISI) which existed from October 2006 to April 2013. ISI was essentially a byproduct of al-Qaeda in Iraq [AQI] and the Mujahedeen Shura Council (MSC) which

3


FIGHTING THE ISLAMIC STATE IN THE FIFTH DOMAIN transpired in January of 2006. With the death of its leader, Abu Musab al-Zarqawi, the MSC initially became part of al-Qaeda but soon evolved into ISI. According to a 2008 report published by the RAND Corporation, ISI’s creation had several putative motivations. It was an attempt to trigger splintering and encourage other Sunni insurgent groups to pledge alliance to ISI, and…by claiming to be a state, ISI apparently sought to gain legitimacy. It was seen as attempting to take the military and political initiative from the other Sunni terrorist groups. (Jones & Libicki, p. 89)

As a supplemental measure ISI instituted brutal and inhumane tactics, such as public executions and suicide bombings, to gain greater attention particularly as a means to further condense the group’s international image. ISI formally transformed into ISIS and gained regional traction in the Middle East after ISI’s greater mission expanded into Syria under the leadership of newly appointed Caliph Abu Bakr al-Baghdadi, against al-Qaeda demands. Days before the fourteenth anniversary of 9/11, (Mills, 2015) the leader of al-Qaeda Ayman al-Zawahiri accused al-Baghdadi of sedition (para. 4) for not addressing the concerns of all Muslims, and declared war on ISIS for the group’s continued attacks on Jabhat al-Nusra Front, al-Qaeda’s affiliate in Syria (para. 7). Moreover, the differences between the organizations have become irreconcilable and ISIS has taken this indifference as an opportunity to evolve and continue expansion outside the Middle East.

Exploiting al-Qaeda’s Decline

4


FIGHTING THE ISLAMIC STATE IN THE FIFTH DOMAIN Demonstrating the evolution and longevity of transnational terrorist organizations, Professor Audrey K. Cronin (2006) asserts that “…splinter groups are often more violent than the “mother” organization, and…can be seen as engaging in a new “layer” of terrorism…” (p. 515). By using religion as a principle motivator (Bunzel, 2015), “the Islamic State, like al-Qaeda, identifies with a movement in Islamic political thought known as Jihadi-Salafism, or jihadism for short” (p. 7). But the significant difference between the two groups has been through interpretation which ISIS has taken to an unprecedented level. Simply speaking, (Bunzel, 2015), “if jihadism were to be placed on a political spectrum, alQaeda would be its left and the Islamic State its right” (p. 9). Henceforth, ideology has become the primary mechanism driving Islamic-oriented groups to proliferate and radicalize. Through this ideological approach, ISIS has begun instituting a channel of communicative influence in Southeast Asia. Although the slow decline of al-Qaeda has hindered the group’s long-term strategy, ISIS is attempting to overhaul it with their expansive ambitions and formidable presence except to an even greater magnitude. Almost a decade ago Cronin proposed in 2006 that al-Qaeda had “…transitioned beyond its original structure and now represented a multigenerational threat with staying power comparable to the ethno-nationalist groups of the twentieth century” (p. 524). While this postulation is credible, it could not be more appropriately fitting than by describing ISIS’s current condition. ISIS renders its influence through distinct and drastic political and ideological means, whereas (Cronin, 2006) “al-Qaeda is closer to a social movement than a terrorist group” (p. 520). Moreover, ISIS has taken al-Qaeda’s communications strategy and amplified its platform to include all sources of media. For example, the Islamic State’s English magazine, Dabiq, is a glossy anti-Western print with very graphic and Hollywood-

5


FIGHTING THE ISLAMIC STATE IN THE FIFTH DOMAIN esque depictions that glorify the battleground. The Islamic State public relations strategy has also drawn many al-Qaeda defectors with its revamped oration and objective. According to Cronin (2006), in general, “the impulse to join the movement arises from a desire to belong to a group in a context where the operative is excluded from, repulsed by, or incapable of successful integration into a Western community” (p. 521), or much less any community for that matter. As Syria’s and other areas intra-state conflicts continue to affect regional stability, these vulnerable environments continue to attract recruits and sympathizers.

The Islamic State, or arguably al-Qaeda 2.0, aspires to replace the outdated jihadist militant group through both enhanced tactics and overall social and political stratagem. AlQaeda may still be existent, but the organization lacks the condition and capacity it obtained once before. This is due primarily to the group’s inconsistency of acquiring greater attraction through political and ideological means, recruitment methods, and their technological knowhow and cyber capabilities. For instance, ISIS has taken full advantage of recruitment via the internet and has launched an online platform. The Soufan Group (2015) states that “…when Abu Bakr al-Baghdadi declared his caliphate, the extremist community began recruiting in earnest, transforming support for local jihadi struggles into support for Islamic State…” (p. 19), and implementing an information and communication technology (ICT) approach has a large segment of their successful campaign thus far.

Concerning the longevity of transnational terrorist organizations, (Cronin, 2006) “failure to pass the legacy to a new generation is a common historical explanation for a terrorist group’s decline or end” (p. 514). Extremist movements in the twenty-first century have been exceptionally more about social rather than purely terrorist motives. According to

6


FIGHTING THE ISLAMIC STATE IN THE FIFTH DOMAIN US Department of the Air Force (Emery et al., 2005), “Terrorists act in the physical environment not to make tactical gains in the physical environment, but to wage strategic battle in the information environment” (p. 10). By adapting to the transformative landscape of conflict and transitioning from the battlefield to the battlespace, which is a direct result of the information age, the Islamic State has been able to gain regional traction across the globe with its ICT campaign. A report by the Soufan Group (2015) expects that:

As the Islamic State changes its focus from consolidating control of territory to attacking its foreign enemies in their own homelands, or their interests elsewhere, the profile of its foreign recruits will also change. The Islamic State has seen success beyond the dreams of other terrorist groups that now appear conventional and even old-fashioned, such as al-Qaeda. (p. 20-1)

Terrorist-aligned undertones such as the full use of irregular warfare tactics may continue to be wielded unanimously as a means to gain acknowledgment and international precedence because transitioning from conventional to irregular forms of warfare is the Islamic State’s, and other affiliates, greatest advantage. In particular, the Islamic State is willing to employ drastic measures to achieve objectives in unison with propagandist efforts. But beyond violent extremism is the necessity of drawing attention and attraction to their cause as it is the primary instrument for preservation; this particular tactic aligns with ISIS’s current agenda.

The Reemergence of Transnational Terrorism in Southeast Asia

Greater Southeast Asia has experienced the return of many fighters from the regions of Afghanistan, Iraq and the Levant, and the issue is becoming a greater cause for concern.

7


FIGHTING THE ISLAMIC STATE IN THE FIFTH DOMAIN According to the 2015 US Army Foreign Military Studies Office (FMSO), “at least 300-500 Indonesians have been in Syria training for battle, and there has been at least one case of a mall bombing in Jakarta that has ISIS trademarks associated with it” (p. 32). This demonstrates that there is a considerable sympathetic following in Southeast Asia and that the Islamic State’s presence in Indonesia is likely to grow if not timely and adequately addressed.

Uncertainty has risen over why such a formidable presence of extremism has reemerged in the Indo-Pacific; that explanation is discovered from prior Middle Eastern wars. According to the Strategic Studies Institute (Abuza, 2015), “between 120 and 150 Malaysians, Indonesians, southern Philippine Muslims, and Southern Thai Pattani went to Pakistan and Afghanistan to join the mujahideen in the 1990s” (para. 17), and several of the extremist groups in the Indo-Pacific known today were established by these fighters. The influence of these mujahideen veterans cannot be overemphasized as many returned to their homelands in Southeast Asia where some established madrassahs, Islamic religious schools, and began indoctrinating the next generation of Salafi jihadists.

Current estimates project that there are up to 900 Southeast Asian foreign fighters abroad, but the Soufan Group claims that “it may be more accurate to say that there are at least 600 Southeast Asians fighting in Syria…and the vast majority of fighters are from Indonesia, with Malaysians a distant second with many more stopped before they could leave the country” (p. The Soufan Group. (Dec. 2015).

8


FIGHTING THE ISLAMIC STATE IN THE FIFTH DOMAIN 18). Though the number of fighters may be lower than other hotbed ISIS recruitment nations, the Soufan Group (2015) asserts that “…there are now enough Indonesian and Malay-speaking foreign fighters with the Islamic State to form a unit by themselves—the Katibah Nusantara (Malay Archipelago Combat Unit)” (p. 18). This militant group not only includes individuals from Indonesia and Malaysia, but the Philippines and Singapore as well. A January 2016 publication by Management Systems International [MSI] discovered that …Katibah Nusantara was established in September 2014…and its aim is to acclimatize and train Southeast Asian recruits to conditions in the Middle East” (Fealy & Funston, p. 7). Trainees are supplied with Arabic-language tuition as well as undergo combat training and ideological indoctrination all in preparation to enter military service with the Islamic State. Although the origins of Southeast Asia’s Salafi-jihadism was established decades ago (Hanson, 2016), “communications technology and low cost travel have created the potential for wider and deeper regional connections than those formed by militants fighting in Afghanistan in the 80s” (p. 1). For example, Jemmaah Islamiyah (JI), a Southeast Asian affiliate of ISIS seeking to establish a regional Indo-Pacific caliphate, and the Abu Sayyaf Group (ASG), a Philippine affiliate of ISIS, have forged a long-lasting link while fighting the Soviets in Afghanistan. JI and ASG coexist and operate as the Islamic State’s greatest IndoPacific network, and will continue to leverage the region through the dissemination of their ideology and agenda.

Furthermore, with an extremist foundation once established, terrorism has reemerged in Southeast Asia through the revitalization of Salafi-jihadism. The Islamic State has discovered Southeast Asia’s greatest weakness, its population. Through the use of ICT

9


FIGHTING THE ISLAMIC STATE IN THE FIFTH DOMAIN capabilities, the Islamic State continues to exploit Southeast Asian Muslims for recruitment purposes and to further divide the populace between moderate and extremist ideology. Indonesia, the world’s largest Muslim population at more than 205 million may draw less international scrutiny as does other nations producing extremist group sympathizers, yet Southeast Asia can now be represented as a “blind spot” breeding ground for future ISIS recruitment.

Transnational Terrorism and Fourth Generation Warfare

Transnational terrorism poses a dire and direct threat to the future of regional security and stability, yet many methods exist to deliberately mitigate unintended consequences. The greatest powers inherent of counterterrorist technique are through detection and diagnosis in the fifth domain. Not only is mitigating and diminishing extremist group-ideology and posed threats pivotal for stability, but identifying and exploiting the rationale behind the emergence of such groups is of even greater concern. A perfect scenario would entail subduing a volatile situation before it became an actualized threat. If the sources of extremism can be diagnosed before becoming refractory, the degree of threats to security will decrease and become more preventable as cyber-counterterrorism competency increases.

10


FIGHTING THE ISLAMIC STATE IN THE FIFTH DOMAIN The current transformative landscape of global affairs and conflict is depicted by fourth generation warfare (4GW) where nation-states enter engagement with non-state actors across the entire spectrum of the operational environment. As witnessed in Syria, extremist groups employ decisive tactics with the ability to refine or redefine state-military doctrines across the globe. Assisting these groups is their inherent ability to adapt, evolve and outlast countermeasures exerted by nation-states. The natural tendency with which extremist groups can adjust to the changing conditions of global affairs makes their existence and associated danger much more difficult to mitigate and even contain. Although al-Qaeda is still present today, the Islamic State has taken the center stage as a much greater force and will continue to demonstrate all variants of irregular warfare as a means to retain its international presence and organizational condition. Furthermore, 4GW tactics demonstrate that the sophisticated use of technology such as social media and mass ICT efforts are of incremental importance to modern extremist groups. Vulnerable and affected states should take heed of these methods and utilize their potential to diametrically counter future extremist activity. Finding Balance between Uses of “Force”

Although state militaries can easily engage extremist groups through sheer use of force, determining the degree of what military force can actually achieve is quite uncertain. Concerning the current international counterterrorist consensus, a report by the Institute for National Strategic Studies (Marks et al., 2010) argues that: Despite efforts to push forward in our “full spectrum” capabilities, we remain hampered by legacy attitudes of compartmentalization and linear thinking. Even

11


FIGHTING THE ISLAMIC STATE IN THE FIFTH DOMAIN more problematic and disturbing is our willingness to engage in operations and deploy forces without fully grappling with the implications of the shift to populationcentric warfare. (p. 79-80)

The problem with this approach is that militarily-capable nations typically overuse force, and in the process make the situation worse. Although military force alone can easily reduce posed or perceived threats, force alone cannot exterminate the threat entirely. Military intervention and repression is what ISIS and other extremist groups desire and even encourage. Continuing and even intensifying conflict is exactly what is necessary for many of extremist groups to retain relevancy and to gain attraction on a regional and international scale. Unless military force can exterminate each and every member without breeding more sympathizers, the use of force seems to ultimately embolden the will to fight, or keep fighting for that matter.

The issue with terrorism in the twenty-first century is that it is resilient, and constant to some degree, and is able to overcome adversity. Terrorist-group division, as observed between al-Qaeda and ISIS, has assisted in escalating both tensions and radical behavior especially by the Islamic State. These scenarios remain prevalent stimulators for future tensions because splintering becomes a basis to persevere.

The most effective method to restrain or interdict the growth of extremist groups is a simultaneous process: to control the dissemination of their communication platforms, and to identify insurgencies that lead to greater accumulation of sympathizers. The ideologies driving terrorism today are essentially components of a larger-scale social movement that has entered the fifth domain of cyberspace. As sects become institutionalized they then become

12


FIGHTING THE ISLAMIC STATE IN THE FIFTH DOMAIN cults or cult-like, and after gaining attraction and acceptance they become integrated ideologies. Through these movements, reinterpretations of scripture, history, law and principles can intensify the mechanisms driving the cause of extremism. Concerning modern extremist movements, Marks et al. (2010) assert that the ““propagandistic effect” is the single greatest weapon available to “the revolutionaries” in their position of asymmetry” (p. 86). To inhibit this from occurring, governments must identify and confront the antagonisms that are instigating such behavior before they become unmanageable. In the case the Islamic State’s movement, engaging cyber combatants in the fifth domain continues to display an effective opportunity to deter and contain the group’s expansion. To address this head on, the fifth domain is a primary starting point for mitigating extremist inclinations. An ICT umbrella approach has vital influence on the direction of future tensions as such efforts can detect and diminish online propagandist movements and “hacktivist” activity. Nation-states affected by terrorism must learn to think like the enemy to defeat the enemy. A more balanced approach between use of force and alternative or unorthodox counterterrorism methods will become necessary and a more influential aspect of many nation-state security postures as the fifth domain continues to be exploited by extremist groups.

Detecting and Diminishing ISIS with Regional Cyber Security Countermeasures

Addressing conflict and transnational terrorism in the fifth domain is entirely dependent upon a strategically-based cyber warfare framework and the advancement of both offensive and defensive cyber capabilities. The ambiguity and vastness of the cyberspace domain is exactly what attracts so many states and aggressors, cyber soldiers and

13


FIGHTING THE ISLAMIC STATE IN THE FIFTH DOMAIN “hacktivists” to engage the fifth domain. In the case of vulnerable regions, a coordinated regional response is necessary to counter further extremist group recruitment and utter expansion.

The Indo-Pacific region is experiencing a great degree of online communication and propagandist efforts from the Islamic State. In the Indo-Pacific (Hanson, 2015) “Facebook is being used in a range of recruitment initiatives and social networking tools are being used by [ISIS] militants to communicate their activities in Iraq and Syria and to issue calls to action” (p. 3). What’s more is that the Islamic State has already established a network spanning across the region making counter-efforts that much harder to achieve.

A national terror network can be difficult enough to combat, but a regionally organized grouping presents even greater challenges…yet the appeal of ISIS across the region coupled with new technology to connect extremists is laying the groundwork for this very network. (Hanson, 2015, p. 3).

The communication connection that the Islamic State has developed between Indonesia, Malaysia, the South Philippines and parts of Singapore with their affiliate groups such as JI and ASG is undoubtedly a real and proliferating threat because the group has already begun efforts to adapt to the transformative landscape by establishing hacktivist and cyber networks. According to the 2015 Global Threat Report, the organization’s published online content indicates that it likely possesses an adequate level of technical ability to successfully carry out offensive [cyber] operations against targeted individuals…and “Most prominent among the newly

14


FIGHTING THE ISLAMIC STATE IN THE FIFTH DOMAIN formed groups is the Islamic State Hacking Division and the currently active Caliphate Cyber Army [CCA]. (Crowdstrike, p. 61-2) The Islamic State’s cyber functions include breaching government privacy firewalls, defaming anti-ISIS political movements, and display efforts of launching online black markets. Indonesia is at risk due to the country’s well-versed veterans and general SalafiJihadist following. “Indonesians arriving from fighting for ISIS abroad present a significant problem for domestic terrorism. Similar to foreigners fighting in Afghanistan, they have received requisite training to conduct domestic terrorist activities when they return home” (FMSO, 2015, p. 32). If this actualized threat is not adequately confronted, large-scale attacks may be attempted or may already have entered the development phase. As a countermeasure, the strategic solution to cyber warfare is facilitated by two components: extending state policy and capabilities into the realm of the fifth domain, and devising a framework that emphasizes the capacity of cyber countermeasures.

The future of subduing extremist movements relies heavily on exploiting communications. Concerning the Islamic State’s ultimate goal of establishing a Caliphate, this goal is more or less a pipe dream yet the inclination to achieve such an end will unlikely dissipate any time soon. Also, undermining total support may be unlikely to change as Salafi-jihadism is the trending brand of Islamic extremism in the Indo-Pacific and elsewhere, but capable nations can cooperate in congruence to monitor communications, online traffic and regional presence ensuring that threats do not proliferate from perceived threats to actualized attacks.

15


FIGHTING THE ISLAMIC STATE IN THE FIFTH DOMAIN The greatest undertaking facing Indo-Pacific governments is the identification and detection process. The vastness and ambiguity of the fifth domain causes aggressors, at least in the short-term, to remain anonymous. And to complicate the scenario further, the predictability and criticality of employing cyber capabilities are usually immeasurable for both the aggressor and the aggressee. “In cyber warfare the boundaries are blurred between the military and the civilian, the physical and the virtual, and power can be exerted by states or non-state actors, or by proxy” (Cornish et al., 2010, p. 10). The implications of cyber capabilities are inconsequential as (Dombrowski & Demchak, 2014) “cybered conflict can occur along a spectrum across all phases of war, and long before any kinetic exchange, adversaries can use precision cyber tools to tilt the conflict in their favor” (p. 86).

As the Islamic State continues to push its agenda throughout the international arena, vulnerable regions must confront these extremists in the battlespace through the fifth domain to control and interdict their mobile media campaigns. Also, governments must invest in the future of cyber countermeasures both politically and tactically because “…it is precisely the absence of a constraining political framework around cyber warfare that makes cyberspace so attractive as a place in which to achieve cultural, religious, strategic, economic, social and even – paradoxically – political goals” (Cornish et al., 2010, p. 32).

The Islamic State strives to disperse its ideological message in an ICT fashion with ambitions to attract a larger following that leads to a greater regional and international presence. Countermeasures must be taken to subdue or at least contain the expansion of such extremist propaganda through revamped cyber capabilities since the Islamic State’s current

16


FIGHTING THE ISLAMIC STATE IN THE FIFTH DOMAIN communications stratagem will likely remain constant. Forging a balanced and coordinated approach is pivotal to mitigate the future of extremist-aligned threats.

Conclusion

The multifaceted ability to maneuver the battlespace through a cyber approach opens up an entirely new and unexploited realm of warfare and will likely compel vulnerable regions like the Indo-Pacific to enhance their cyber capabilities to confront future threats. Both the threat of conflict and extremism in the twenty-first century depict that vulnerable nations must cooperate and coordinate to ensure that regional security and stability remains unaffected. The Islamic State has demonstrated the capability and capacity to adapt and evolve to the transformative landscape of global affairs which has yielded a greater international presence.

A regional counter-response will have a great effect against extremism, especially one that inhibits further expansion and presence. Controlling and interdicting communications is imperative because of the role to which indoctrination, fear, and propaganda factor into the modus operandi of extremist groups. The only way to dissolve these movements is to combat them with proportionate and sensible force on every engaged domain of battle. Modern warfare has entered the fifth domain where governments must adapt and evolve or remain susceptible to extremist-aligned antagonisms. Future battlespace demonstrates that nation-states must attain adequate technological capacity across the vast spectrum of capabilities to deter, mitigate, or contain threats in the operational environment. By harnessing the potential of a joint effort and implementing a regional strategy, vulnerable nations with means of combating extremism, especially in the developing fifth domain, may

17


FIGHTING THE ISLAMIC STATE IN THE FIFTH DOMAIN indeed increase their countermeasure abilities and ensure overall security from this point forward.

18


FIGHTING THE ISLAMIC STATE IN THE FIFTH DOMAIN Bibliography:

Abuza, Z. (Jun., 2015). Joining the new caravan: ISIS and the regeneration of terrorism in Southeast Asia. Strategic Studies Institute, para. 1-62.

Bunzel, C. (Mar., 2015). From paper state to caliphate: The ideology of the Islamic state. The Brookings Institution, Project on U.S. Relations with the Islamic World Analysis Paper, pp. 1-11.

Cornish, P., Livingstone, D., Clemente, D., & Yorke C. (Nov., 2010). On cyber warfare: A Chatham house report. The Royal Institute of International Affairs, pp. 1-36.

Cronin, A. K. (summer, 2006). How al-Qaida ends: The decline and demise of terrorist groups. In R. J. Art & K. N. Waltz (7th Ed.). International Security, 31(1), pp. 7-48.

Crowdstrike. (2015). 2015 global threat report. Crowdstrike Intelligence Team, pp. 60-63.

Dombrowski, P., & Demchak, C. (spring, 2014). Cyber war, cybered conflict, and the Maritime domain. Naval War College Review, 67(2), pp. 71-96.

Emery, N., Mowles, D. G., & Werchan, J. (spr., 2005). Information operations doctrine and non-state conflict: Shaping the information environment to fight terrorism and insurgencies. US Department of the Air Force, pp. 7-13.

Fealy, G., & Funston, J. (Jan., 2016). Indonesian and Malaysian support for the Islamic State. Management Systems International, pp. 1-34.

19


FIGHTING THE ISLAMIC STATE IN THE FIFTH DOMAIN Foreign Military Studies Office. (Nov., 2015). OE watch: Foreign news & perspectives of the operational environment, Indo-Pacific Asia. US Army Training and Doctrine Command, 5(11), pp. 30-32.

Hanson, F. (Feb., 2015). Countering ISIS in Southeast Asia: The case for an ICT offensive. Perth USAsia Centre, pp. 1-8.

Jones, S. G., & Libicki, M. C. (2008). How terrorist groups end: Lessons for countering al Qa’ida. The RAND Corporation, pp. 88-94.

Marks, T. A., Gorka, L.v. S., & Sharp, R. (2010). Getting the next war right: Beyond population-centric warfare. Institute for National Strategic Studies, pp. 79-98.

Mills, C. (Sep., 2015). Al Qaeda now at war with ISIS. The Washington Examiner, para 1-7.

Soufan Group. (Dec., 2015). Foreign fighters: an updated assessment of the flow of foreign fighters into Syria and Iraq. The Soufan Group, pp. 18-21.

20


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.