The State Department Warns of an 'Evolved,' Decentralized Al Qaeda

Anti-government gunmen hold their weapons as they patrol in Fallujah last month. Anti-government gunmen hold their weapons as they patrol in Fallujah last month. AP file photo

In its annual terrorism report, the State Department warned that the rise of aggressive, decentralized al Qaeda affiliates scattered through the Middle East and North African regions presents "serious threat to the United States, our allies, and our interests." In the report, the department outlines how losses among al Qaeda's leadership in Pakistan and Afghanistan has forced the terrorist organization into an "accelerated" splintering. 

Because of that decentralization, the state department notes, the remaining members of al Qaeda's central leadership are having some trouble issuing orders that the local affiliates actually follow. From the report: 

AQ leadership experienced difficulty in maintaining cohesion within the AQ network and in communicating guidance to its affiliated groups. AQ leader Ayman al-Zawahiri was rebuffed in his attempts to mediate a dispute among AQ affiliates operating in Syria – al-Nusrah Front and al-Qa’ida in Iraq (AQI), now calling itself the Islamic State of Iraq and the Levant (ISIL) – which resulted in the expulsion of ISIL from the AQ network in February 2014. In addition, guidance issued by Zawahiri in 2013 for AQ affiliates to avoid collateral damage was routinely disobeyed, notably in attacks by AQ affiliates against civilian religious pilgrims in Iraq, hospital staff and convalescing patients in Yemen, and families at a shopping mall in Kenya.

That being said, al-Qaeda leader Ayman al-Zawahiri still holds significant ideological sway over affiliated al Qaeda groups working across the regions. Countries seeing increasingly autonomous al-Qaeda splinter groups include Yemen, Syria, Iraq, northwest Africa, and Somalia, the AP notes

The report, unsurprisingly, also focuses on the presence of extremist fighters in Syria: "Iran, Hizballah, and other Shia militias provided a broad range of critical support" to extremist fighters in the country, the report reads, as sectarian violence increased in Syria. 

During the press briefing on the report, CNN asked Ambassador Tina Kaidanow, the State Department’s Coordinator for Counterterrorism, about the effect, if any, of Edward Snowden's NSA whistleblowing activities on the U.S.'s ability to fight terrorism. Kaidanow's answer: "The Snowden revelations were an unauthorized disclosure of classified information," the ambassador said, adding, "It is therefore not surprising if I tell you that it has done damage." She called the leaks "very damaging" to the U.S.'s security efforts. This is something the U.S. has often indicated in response to those leaks — particularly that the terrorists have "changed tactics" since the NSA's bulk surveillance programs became public.

The full report is here

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.