- The Strategist - https://www.aspistrategist.org.au -

The post-caliphate Salafi-jihadi environment

Posted By on July 10, 2019 @ 06:00

My latest Strategic Insights paper [1] provides an overview of the post-caliphate Salafi-jihadi environment, focusing on the franchising strategy of al-Qaeda and Islamic State. It finds that the threat is now less ‘top-down’ than ‘bottom-up’ and provides three sets of recommendations on how Australia should adjust its counterterrorism strategy in the face of a changing environment.

To understand the current Salafi-jihadi environment we need to acknowledge [2] that despite years of combat and engagement with violent extremists there are over 60 Salafi-jihadi groups around the world, the same number as in 2016 and three times as many as there were in 2001. In 2018, estimates of the number of Salafi-jihadis and allied fighters [3] around the world ranged as high as 230,000.

I suspect that these numbers are likely to increase because al-Qaeda will continue with its franchising policy and IS is likely to develop its own franchising strategy as its fighters find new safe havens.

In June, the Islamic State’s Khorasan province, just like the Islamic State’s West Africa province [4], Islamic State’s Sinai province [5], Islamic State Caucasus [6] and Islamic State East Asia (Philippines), released a 12-minute video reaffirming its fealty to Abu Bakr al-Baghdadi. These messages are a constant reminder that IS remains engaged with the ‘provinces’, flipping its strategy from establishing a ‘state’ to one in which it tries to control areas from East Asia to West Africa.

The franchising strategy has two key pillars. First, it emphasises that local issues will dominate [7] the transnational Salafi-jihadi agenda for the immediate future. The intention is to promote an overarching ideology, managed by a top-down command-and-control structure while at the same time allowing the franchisees to have more operational freedom.

What al-Qaeda and IS want is an oath of allegiance and a commitment by these local actors to generate widespread insecurity and consequent overreaction by governments in order to attract more followers. This was something that IS attempted [8] to do when it fed on Sunni opposition to the Shia-led Iraqi government of Nouri al-Maliki. The tactic was also used [9] by the Pakistani Taliban and by [10] al-Shabaab in Somalia.

The second pillar of the strategy is to focus on the non-Western world, ideally on Muslim-majority fragile and weak states where there is plenty of opposition to government, which is also why analysts such as former CIA deputy director Michael Morell have come to argue [11] that the ‘Arab Spring was really a spring for al-Qaeda’. Moreover, al-Qaeda and IS recognise that through money and marriage they can cement [12] appropriate ties with local communities in parts of the Muslim world.

The strategy that al-Qaeda and IS are pursuing isn’t new and builds on the ideas of early jihadi theorists such as Abdullah Azzam [13], Abu Musab al-Suri [14] and Muhammad Abd al-Salam Faraj [15]. Azzam argued for the need to focus resources to ‘free’ Muslim lands first, whereas al-Suri advocated for individual jihad, or lone-actor attacks. Faraj argued that jihad forms the sixth pillar of Islam (there are only five pillars: the profession of faith; prayer; the giving of alms; fasting during Ramadan; and making pilgrimage to Mecca).

Al-Qaeda and IS recognise that taking their jihad to the West has been counterproductive as they can’t compete with the firepower or resources that the West can devote. However, they can establish safe havens in fragile and weak states from which they can undermine local, regional and international peace and security while continuing to disseminate their global ideology.

The implications of this new strategic focus are threefold. First, we must recognise that the counterterrorism regime that we have crafted so carefully over the last decade is out of step with the new Salafi-jihadi architecture. We are likely to see more activity in places like the southern Philippines, Tajikistan, the Sahel and southern and western Africa, as opposed to attacks in Europe, the US or Australia. Consequently, our counterterrorism approach must be outward looking and aimed at addressing local conditions that Salafi-jihadis exploit, and include a more robust discussion about foreign aid.

Second, al-Qaeda and IS are likely to double their investment in the online space. Whereas in the past they utilised mainstream platforms including YouTube, Twitter and Facebook, actions by states and the Global Internet Forum to Counter Terrorism [16] to disrupt and remove violent extremist content have driven them away. They are now moving towards more niche platforms such as GoLike, Baaz, Viber, Kik, Ask.fm and Discord.

They are also experimenting with developing their own messaging systems. The Amaq News Agency, which is one of IS’s media platforms, has provided guidance on how the ‘faithful’ can protect against distributed denial-of-service attacks, engage in end-to-end encryption, and use services like Cloudflare. They have also shown themselves to be attuned to new developments in software and hardware, as seen in 2018 with their use of [17] Rocket.Chat, an open-source messaging application designed for businesses. IS even published [18] a technical manual on how to use it.

We now need to assess whether our approach of blocking or demanding the removal of content is cost-effective and useful. There is some evidence to suggest that such actions may actually help [19] violent extremists. Put simply, our digital counterterrorism strategy must change.

It is increasingly likely that there will be more lone-actor attacks by homegrown radicals with no background in fighting or formal ties to either organisation. This is because al-Qaeda and IS will focus more on inspiring and inciting attacks, and target more vulnerable recruits, including people with mental health issues, through tailored, as opposed to off-the-shelf, recruitment strategies.

The ancient Chinese strategist Sun Tzu noted that military tactics are like water in that they are shaped by topography. As the environment changes so should the tactics. Al-Qaeda and IS are doing this; the question is, can we?



Article printed from The Strategist: https://www.aspistrategist.org.au

URL to article: https://www.aspistrategist.org.au/the-post-caliphate-salafi-jihadi-environment/

URLs in this post:

[1] paper: https://www.aspi.org.au/report/post-caliphate-salafi-jihadi-environment

[2] acknowledge: https://csis-prod.s3.amazonaws.com/s3fs-public/publication/180726_Jones_AmericasCounterterrorism_layout_FINAL.pdf?4td7e22JyfBrrRKbiRJy0dnCCzSKSBYW

[3] estimates of the number of Salafi-jihadis and allied fighters: https://csis-prod.s3.amazonaws.com/s3fs-public/publication/Jones_EvolvingTerroristThreat_FULL_WEB.pdf

[4] Islamic State’s West Africa province: https://www.longwarjournal.org/archives/2019/06/jihadists-in-west-africa-renew-allegiance-to-abu-bakr-al-baghdadi.php

[5] Islamic State’s Sinai province: https://www.longwarjournal.org/archives/2019/06/islamic-states-sinai-province-renews-allegiance-to-abu-bakr-al-baghdadi.php

[6] Islamic State Caucasus: https://www.longwarjournal.org/archives/2019/06/jihadists-in-caucasus-philippines-renew-allegiance-to-baghdadi.php

[7] local issues will dominate: https://s3-ap-southeast-2.amazonaws.com/ad-aspi/2018-05/SR%20119%20Terrorism%20in%20the%20Indo-Pacific.pdf?pjvDAkq9HFIV13KNpGJND3V1gsG2xpCi

[8] attempted: https://www.tandfonline.com/doi/abs/10.1080/1057610X.2014.997510

[9] used: https://www.tandfonline.com/doi/abs/10.1080/1057610X.2014.903374

[10] and by: https://www.tandfonline.com/doi/abs/10.1080/1057610X.2016.1236569

[11] argue: https://www.aljazeera.com/indepth/opinion/2015/05/cia-arab-spring-al-qaeda-150517075517498.html

[12] can cement: https://www.nytimes.com/2009/12/13/opinion/13atran.html

[13] Abdullah Azzam: http://johnclamoreaux.org/smu/islam-west/s/azzam-def.pdf

[14] Abu Musab al-Suri: https://www.newyorker.com/magazine/2006/09/11/the-master-plan

[15] Muhammad Abd al-Salam Faraj: https://ebooks.worldofislam.info/ebooks/Jihad/The%20Absent%20Obligation.pdf

[16] Global Internet Forum to Counter Terrorism: https://www.gifct.org/

[17] use of: https://www.wired.com/story/terrorist-groups-prey-on-unsuspecting-chat-apps/

[18] published: https://ent.siteintelgroup.com/Dark-Web-and-Cyber-Security/is-linked-tech-group-publishes-technical-manual-about-rocketchat.html

[19] help: https://www.lawfareblog.com/how-content-removal-might-help-terrorists

Copyright © 2016 The Strategist. All rights reserved.