Understanding the Causes and Drivers of Violent Extremism in the Sahel – Angela Martin

Africa Center for Strategic Studies
21 Aug 201920:43

Summary

TLDRAngela Martin from USAID discusses her extensive experience in development, starting with managing agricultural projects in Africa 30 years ago. She highlights the evolution of counter-extremism, initially focusing on development drivers such as corruption, lack of social services, and broken families, and later incorporating insights into terrorist group activities. Emphasizing an integrated approach, she explores four key aspects: motivation, membership, means, and methods of extremist groups. Angela stresses the importance of understanding both the community vulnerabilities and the actions of terrorist organizations for a comprehensive response to extremism.

Takeaways

  • 🌍 Angela Martin from USAID shares her background, noting 30 years of experience in development, including agricultural projects in Africa.
  • 🛡️ Martin emphasizes that she is not a security specialist but views issues from a development perspective.
  • 📅 She started working on counter-extremism in 2005, focusing on the drivers of radicalization and vulnerabilities in communities.
  • 💡 Key factors contributing to extremism include corruption, lack of social services, and broken social safety nets.
  • 🔍 Martin notes the importance of understanding both the drivers of radicalization and the actions of terrorist groups.
  • ⚔️ She categorizes terrorist groups into those with global aspirations, like Al-Qaeda, and those with more local insurgent goals.
  • 👥 The role of women in extremist groups is highlighted as often more ideologically committed than male fighters.
  • 💬 Martin points out the importance of addressing both the developmental and security aspects of countering extremism.
  • 🌐 The distinction between global jihadist groups and local insurgencies has blurred over time, complicating counter-extremism efforts.
  • 📊 She concludes by stressing the need for an integrated approach that includes both security and development responses to effectively counter extremism.

Q & A

  • Who is Angela Martin and what is her background?

    -Angela Martin is a development practitioner with 30 years of experience managing agricultural extension projects for Peace Corps in Africa. She has worked for 15 years on Countering Violent Extremism (CVE).

  • What perspective does Angela Martin bring to the discussion on CVE?

    -Angela Martin brings a development perspective to the discussion on CVE, focusing on understanding the role of development assistance in addressing extremism.

  • What were the early focuses of CVE efforts according to Angela Martin?

    -Early CVE efforts focused on understanding the drivers, motivating factors, and risk factors that made individuals vulnerable to recruitment, such as corruption, lack of social services, and broken social safety networks.

  • What are the two sides of the coin in understanding violent extremist organizations?

    -The two sides of the coin are understanding the drivers and vulnerabilities of individuals and communities on one side, and understanding the actions and operations of the violent extremist organizations on the other.

  • What are the four aspects Angela Martin uses to analyze violent extremist groups?

    -The four aspects are motivation, membership, means, and methods.

  • How has the distinction between different types of terrorist groups changed over time?

    -The distinction has blurred, with groups shifting from territorial insurgencies to global jihad affiliations, making it harder to differentiate between their motivations and operations.

  • What role do women play in violent extremist organizations according to Angela Martin?

    -Women play a significant role as facilitators within violent extremist organizations, often being more ideologically committed than some male members and involved in activities like running safe houses and advance surveillance.

  • What has been the trend in recruitment within the Sahel region?

    -Recruitment in the Sahel has shifted from individual recruitment to groups joining en masse, often due to clan or family ties, leading to a vast expansion of membership.

  • How do criminal networks and illicit trade impact violent extremist groups?

    -Criminal networks and illicit trade provide resources and facilitate the movement of people and equipment, complicating the operating environment but not necessarily driving the groups' operations.

  • What is Angela Martin's view on the importance of understanding both sides of violent extremism?

    -Angela Martin emphasizes that understanding both the drivers of extremism and the actions of extremist groups is crucial for an integrated approach to effectively address and respond to violent extremism.

Outlines

00:00

👩‍🏫 Introduction and Background

Angela Martin from USAID introduces herself and discusses her extensive background in development, highlighting her work on agricultural extension projects for the Peace Corps in Africa and her 15 years of experience working on Counter Violent Extremism (CVE). She emphasizes her development perspective, not as a security specialist, and discusses the drivers of extremism, such as corruption, lack of social services, and broken families, primarily focusing on young men and the role of radicalization.

05:01

🌍 Evolution of Terrorist Threats

The script discusses the changing landscape of terrorist threats, contrasting the early focus on global jihadists seeking to establish a global Caliphate with more recent insurgencies that have political and territorial objectives. It highlights the blurred lines between these groups, using examples like AQIM in the Sahel, which shifted from a territorial insurgency to aligning with global jihadist aspirations.

10:03

👥 Recruitment and Membership

This section examines the changing dynamics of recruitment and membership in terrorist organizations. Initially, groups like AQIM were composed mainly of non-sub-Saharan Africans, but this shifted post-2011 with entire militias joining. The role of women, particularly through strategic intermarriage, is highlighted as a significant factor in embedding terrorist ideologies within communities. The Sahel's unique position as neither a significant exporter nor importer of jihadists is also discussed.

15:03

🔫 Means and Methods of Terrorist Groups

The means and methods employed by terrorist groups in the Sahel have evolved, with early activities focused on kidnapping for ransom and small-scale skirmishes. The influx of weapons in 2012 changed the dynamics, leading to more conventional insurgency tactics. The role of criminal networks and illicit trade, such as cigarette smuggling, in facilitating terrorist operations is also examined.

20:04

🤝 Strategic and Collaborative Approaches

The final paragraph emphasizes the need for an integrated approach combining development and security responses to effectively address terrorism. Understanding motivations and facilitating negotiated settlements are key to preventing the spread of violence, especially to littoral states like Côte d'Ivoire and Togo. The importance of a balanced response that minimizes the security footprint is stressed to avoid exacerbating the situation.

Mindmap

Keywords

💡CVE (Countering Violent Extremism)

CVE refers to strategies and actions aimed at preventing the spread of extremist ideologies and recruitment into violent extremist groups. In the video, Angela mentions her early work on counter extremism before the term CVE became common, highlighting its importance in development assistance.

💡Development Perspective

This refers to the viewpoint of addressing issues through economic, social, and institutional development rather than solely through security measures. Angela emphasizes her focus on understanding how development assistance can mitigate the factors that make individuals vulnerable to extremist recruitment.

💡Drivers of Extremism

Factors that make individuals or communities susceptible to extremist ideologies and recruitment. Angela discusses how her team looked at corruption, lack of social services, broken families, and more to understand the vulnerabilities in the Sahel region.

💡Integrated Approach

A strategy that combines both security and development responses to address the complex issues related to violent extremism. Angela stresses the necessity of collaboration between security specialists and development practitioners to create effective solutions.

💡Global Caliphate

An ideological goal of some extremist groups to establish a unified Islamic state under Sharia law. Angela references this as one of the two primary motivations for transnational terrorist organizations, contrasting it with territorial insurgencies.

💡Insurgency

A rebellion or uprising against a recognized authority, often using guerrilla tactics and terrorism. Angela explains that some terrorist groups, like the IRA or FARC, have political and territorial objectives, differentiating them from groups with global jihadist aims.

💡Membership

The composition and origins of individuals within extremist groups. Angela notes changes in recruitment patterns, such as entire militias joining extremist groups, and the role of local ties and intermarriage in expanding group membership.

💡Methods and Means

The tactics and resources used by extremist groups to carry out their activities. Angela describes how groups in the Sahel have evolved from small-scale kidnappings and skirmishes to more significant attacks and how illicit trade supports their operations.

💡Illicit Trade

Illegal trading activities that can fund and facilitate the operations of extremist groups. Angela discusses the impact of criminal networks and corruption on the security environment in the Sahel, including the role of cigarette smuggling.

💡Geographic Targeting

The strategic focus on specific areas for development or security interventions based on the presence and activities of extremist groups. Angela mentions how understanding the locations of attacks helps in targeting development assistance and security measures effectively.

Highlights

Angela Martin from US Aid shares her extensive experience managing agricultural extension projects for Peace Corps in Africa, starting 30 years ago.

Angela discusses her transition from development practitioner to working on Countering Violent Extremism (CVE) since 2005, before it was termed CVE.

The role of development assistance in addressing the drivers and motivating factors of violent extremism is emphasized.

Key factors making individuals vulnerable to recruitment include corruption, lack of social services, and broken families, especially in the Sahel.

Angela highlights the importance of understanding both the vulnerabilities and the actions of terrorist groups for an integrated response.

The concept of motivation, membership, means, and methods is introduced as a framework to analyze terrorist groups.

Early on, the primary focus was on transnational terrorist organizations like al-Qaeda aiming to set up a global Caliphate.

The distinction between global jihadist groups and insurgencies with political or territorial goals is discussed.

Membership dynamics have shifted, with entire groups joining terrorist organizations, changing recruitment patterns.

The role of women in terrorist groups is explored, noting their often more committed ideological stance.

The Sahel has not been a significant exporter of fighters to global jihadist hotspots like Iraq and Syria.

The integration of criminal networks and illicit trade with terrorist activities complicates the operating environment.

The geographical spread of terrorist activities in the Sahel is mapped, showing the progression from 2010 to 2018.

The need for a nuanced understanding of local grievances and motivations to prevent the spread of violence is stressed.

An integrated approach combining development and security responses is essential to address violent extremism effectively.

Transcripts

play00:03

so good morning everyone and I'm Angela

play00:06

Martin from US aid and well thank you

play00:09

for reading my bio I'm going to add a

play00:11

few more points because I'm always

play00:13

struck by why when they posed the

play00:15

question of what I was going to discuss

play00:16

with you today I was a little curious

play00:19

because besides my background and being

play00:21

a development practitioner I started

play00:23

doing this 30 years ago managing

play00:26

agricultural extension projects for

play00:28

Peace Corps in Africa so how I ended up

play00:30

here is a bit curious right don't worry

play00:34

I did have about 15 years of working on

play00:37

CBE so some of the security side has

play00:40

sort of worn off on me I have a little

play00:41

bit of orientation but I wanted to to

play00:45

just highlight this because I'm looking

play00:47

at this from a development perspective

play00:48

I'm not a security specialist at all

play00:52

all of you are so I just want to remind

play00:54

you when I'm looking at this because it

play00:59

early on and I've been working on this

play01:01

since I think I started in the fall of

play01:03

2005 before we even called things CVE we

play01:07

called it counter extremism not CVE I we

play01:12

really focused on trying to understand

play01:13

what is the role of development

play01:14

assistance so we looked at the drivers

play01:17

you've probably heard of this the

play01:19

motivating factors the risk factors I'm

play01:21

sure you'll have other conversations

play01:22

you've probably heard this discussed in

play01:25

your countries because over the years

play01:26

this has become accepted terminology and

play01:29

approach so what we would do is look at

play01:31

what was discussed what are the factors

play01:33

that make people particularly

play01:34

individuals vulnerable to recruitment

play01:36

and in the Sahel we looked at the things

play01:39

that were just discussed we talked we

play01:41

looked at corruption we looked at lack

play01:43

of social services we even started

play01:45

looking at the psychology of you know

play01:48

sort of broken families social the

play01:50

social safety network all those sorts of

play01:52

things right and we looked at only young

play01:56

men particularly we did look at religion

play01:58

we looked at radicalization these points

play02:01

of the scholarships and people going to

play02:04

study in Saudi or in Sudan I mean this

play02:07

came up when I was doing an assessment

play02:09

in nija in Nigeria in 2008 so or Nisha

play02:13

are talking about as well so this has

play02:15

been known for a while

play02:17

and and you know the other side so when

play02:20

we looked at sort of the ideas that

play02:22

you're looking at all these drivers to

play02:24

see what could be manipulated to have

play02:27

make someone - so they're vulnerable for

play02:28

recruitment it's not that we didn't look

play02:31

at what the terrorist groups were doing

play02:33

themselves and their actions but it was

play02:36

looked at probably from our perspective

play02:39

again for us to understand what we would

play02:40

do more in like what areas are they

play02:43

operating in right so where was the

play02:45

attacks where were things occurring and

play02:47

so it helped us with geographic

play02:49

targeting but we didn't really pay that

play02:52

much more attention beyond that mm-hmm

play02:55

and you know but over the years and it

play02:58

continues to become even more apparent

play02:59

that without a good understanding as

play03:02

much as we can of what the terrorist

play03:04

groups or the violent extremist

play03:06

organizations themselves are doing we're

play03:09

missing we're missing a big part of the

play03:10

picture you know and in part you know

play03:13

there's an expression two sides of the

play03:14

coin well if one side of the coin is

play03:16

what are the drivers what are the

play03:18

vulnerabilities what are the risk

play03:19

factors in the community level or at the

play03:23

individual level or even at the societal

play03:26

level the other side is what are the

play03:28

groups doing why are there operating how

play03:30

are they doing they're what's what's

play03:31

going on with them we need to understand

play03:33

both sides because our you know one of

play03:36

the things and this is logical to me are

play03:38

one of the core principles from the very

play03:41

beginning is an integrated approach it's

play03:43

not just Security Response and obviously

play03:46

it's not just a development response to

play03:48

deal with this we need to work together

play03:49

and if we're only each of us are only

play03:52

looking at one side it makes it even

play03:54

harder for us to work together and

play03:55

collaborate and design it and you know a

play03:58

full response and so for me I sort of

play04:03

came up on my you know this is my own

play04:04

way of trying to organize my thoughts is

play04:07

looking at these groups what are some of

play04:09

the things I can look at and how can i

play04:11

how can I think about it so I came up

play04:13

with four aspects and I call it the

play04:15

motivation the membership the means and

play04:19

the methods and you know what I'm trying

play04:22

to sort of again go out of my comfort

play04:24

zone and look at what are these groups

play04:26

doing trying to analyze the the actual

play04:28

actions and

play04:29

they operate and so motivation going

play04:33

back was frankly one of the primary

play04:35

aspects from the very beginning of how

play04:37

we understood these groups and and how

play04:40

we decided what was in our national

play04:42

security interests what are the threats

play04:44

to the US and our interests and and and

play04:47

also to help us think through what our

play04:49

options for the response and why that

play04:51

means is because at the beginning we had

play04:53

two categories right

play04:55

one was the transnational terrorist

play04:58

organization that was trying to set up a

play05:00

global Caliphate I mean I remember back

play05:02

in 2005 2006 we had these maps that the

play05:05

military showed up with the Caliphate

play05:07

all over North Africa into sub-saharan

play05:09

Africa and here's what they're trying to

play05:10

do and but part of it was that if you're

play05:14

trying to set up a global Caliphate

play05:16

they're not there's no negotiation

play05:18

there's no settlement there's no

play05:20

grievances to address

play05:22

there's no territories to hold except

play05:24

for this broad aspiration it's to

play05:28

disrupt Western influence Western

play05:29

society Western norms so so there was

play05:33

that sort of there's no there's no

play05:34

talking to them because there's nothing

play05:36

they want to talk about them being these

play05:38

terrorist groups the global jihad in the

play05:41

second category is the one that is it's

play05:43

more what we would understand is an

play05:44

insurgency it's a rebellion that maybe

play05:48

that have resorted to tear us to tactics

play05:50

as part of their overall achieved for

play05:53

political or territorial gains and so

play05:56

there are examples of that you know the

play06:00

IRA right so that was you know we have

play06:03

you have the Shining Path you in Peru

play06:07

you have the FARC in Colombia so these

play06:10

are groups that are terrorist groups

play06:11

they tear they use terrorism tactics and

play06:14

tools but there is somewhere in there

play06:17

they started or there remains a

play06:18

political and even military objectives

play06:21

and so this was a nice neat division

play06:24

right global terrorists a global jihad

play06:26

that's who we're worried about aq right

play06:29

and it seemed to work right you had so

play06:33

thinking about in the Sahel you had the

play06:35

GSPC came from Algeria they were

play06:39

basically a territorial insurgency woman

play06:41

are you who were terror

play06:44

but then they became branded they

play06:45

shifted to being a qim they signed

play06:48

allegiance they've moved over to they

play06:51

moved down into Mali whether they were

play06:54

pushed or or you know whatever the

play06:56

reason is and they started having

play06:58

aspirations that were not territorial

play07:00

anymore so it seemed to fit and and that

play07:05

seemed to work for quite some time but

play07:07

as was noted you know and just in the

play07:09

previous speaker that this line has

play07:12

blurred right considerably so now the

play07:14

motivation goes back and forth the

play07:16

groups sign allegiance but they're

play07:17

maintaining their territorial ambitions

play07:20

they're you know they're they're the

play07:24

role of where they are in in a global

play07:26

jihad particularly with Isis the ability

play07:28

of being a member an adherent is much

play07:32

less strict than it was for aq that had

play07:34

some fairly clear qualifications and

play07:39

rules and criteria for being considered

play07:42

a full member and so so I think that's

play07:45

made that distinction harder for us for

play07:48

the motivation so so it's blurred the

play07:51

next one is is membership so who are the

play07:55

members where do they come from and

play07:58

again you know early on it was much

play08:00

neater you know when we started a qim

play08:03

because again looking mostly at this a

play08:04

hell it came from Algeria most of the

play08:07

leadership most of the membership were

play08:09

not sub-saharan Africans you had a fair

play08:11

number of Mauritania but they tended to

play08:13

be sort of spokesperson and sort of

play08:17

senior leadership but not the top you

play08:20

know and and part of it I lived in

play08:21

Mauritania years ago Mauritania itself

play08:23

identifies as a Maghreb state not

play08:26

sub-saharan and and their historical

play08:29

position as an Islamic Republic and a

play08:32

seat of Islamic learning also lends

play08:34

credence that there's considered more of

play08:36

the Arab states in that sense and so for

play08:40

a long time while there was some concern

play08:42

about recruitment we looked at our

play08:43

programs it really wasn't a big factor

play08:46

to be honest

play08:47

obviously as noted this changed in the

play08:49

end of 2011 into 2012

play08:51

with with the Arab Spring the fall of

play08:55

Qaddafi

play08:56

and but also that there was these now

play08:59

there were groups militias or rebellious

play09:02

groups had joined whole the whole group

play09:04

joined so what does that do so now

play09:07

you're having recruitment that you don't

play09:09

have to recruit as a ma lien or as a

play09:12

Nigerian to join a group that's run by

play09:15

it frankly outsiders right yes it's part

play09:18

of the global Caliphate and global jihad

play09:20

but it's run by outsiders now you could

play09:22

be a member of group with family ties

play09:24

with clan ties that's you're familiar

play09:26

militia or your rebellion that you can

play09:29

join in as a group and so now you can

play09:32

and that has changed there's vast

play09:33

expansion of numbers it's less about

play09:36

individual recruitment although it's

play09:37

happened but more about the group

play09:39

joining and I think that pattern has

play09:41

continued throughout the Sahel we're

play09:44

seeing that with now the Isis the

play09:46

expansion of Burkina and how it's

play09:49

adopting with these groups there I think

play09:51

the other thing that's a challenge is

play09:52

that what's been noted I'll talk about a

play09:54

little more this idea of local militias

play09:56

that are protection / response and how

play10:00

does that factor in trying to predict

play10:02

what's happening coming forward I think

play10:05

the other point is to think about is a

play10:08

role of women now we've talked about and

play10:10

we continue to think about fighters but

play10:12

the membership one of the things that a

play10:14

qim did strategically was intermarry

play10:17

into some of these torrid groups

play10:18

particularly in the north

play10:19

early on this was starting in 2010-2011

play10:22

even when they were just up in the in

play10:24

the mountains because they wanted to

play10:26

have a stronger tie and a stronger base

play10:29

within the community and I think one of

play10:31

the things that's been really not looked

play10:33

at too much was what was the role of the

play10:35

women and part of this is that so the

play10:38

women intermarried they actually were

play10:40

more hardliners and committed into the

play10:43

ideology behind these groups than some

play10:45

of the young men who just joined because

play10:47

it was fighting it was something to do

play10:49

it got get me a gun and gave me some

play10:50

standing and this role of women as

play10:54

facilitators is still very much

play10:57

marginalized as far as what is the

play10:59

importance of them are they running safe

play11:01

houses are they going shopping are they

play11:03

sort of the advance watch

play11:05

we don't really know very well how

play11:07

that's being done what's being noted

play11:09

still is when they

play11:10

become actual suicide bombers or actual

play11:13

combatants and I think that that's a

play11:16

sort of a talking about a better nuanced

play11:18

understanding of how these groups are

play11:20

embedding themselves into these

play11:21

communities that we really don't have a

play11:23

lot of visibility on that I think

play11:26

another point about the Sahel compared

play11:27

to even much of Africa both North Africa

play11:30

and other parts is the role of the Sahel

play11:34

and the membership whether it's a

play11:36

destination or an exporter and it's

play11:39

really been neither there hasn't been a

play11:42

significant flow of the Sahel ian is

play11:45

from the Sahel out to Somalia people

play11:49

joining going out to go al-shabaab and

play11:51

certainly not to Iraq and Syria it's the

play11:54

same thing that concern while you do

play11:56

have return fighters there is probably

play11:58

less of a concern of Isis coming back to

play12:00

the Sahel I'm not talking North Africa

play12:02

then there is even for the DRC or in

play12:06

other parts of East Africa and so this

play12:07

movement into the global sort of jihad

play12:10

or global fight to use that and not yet

play12:12

that other term is is is different in

play12:15

the Sahel and I think somewhat unique so

play12:19

so going on to the to the next one which

play12:22

is the means and methods so I think that

play12:26

can be in intertwined a little bit and

play12:28

again we thought it was talked about in

play12:29

the previous speaker is the idea of akom

play12:33

was relatively well armed but it was a

play12:35

small group right and this was just they

play12:37

had arms they were fighting and there

play12:39

and there their methods were mostly

play12:41

frankly kidnapping for ransom was their

play12:44

big big attack assassinations and and

play12:48

frankly sort of conventional assaults

play12:51

against small military outposts to sort

play12:54

of maintain an operating environment

play12:56

rather than controlling territory and

play13:00

there may have been some opportunistic

play13:02

gita' assaults to get some some

play13:05

visibility I would say but for the most

play13:08

part in the early years it really was a

play13:12

smaller scale community level sort of

play13:15

skirmishes military skirmishes and

play13:17

kidnapping for ransom again and then the

play13:21

flow of weapons that came in 2012 sort

play13:23

of

play13:24

dynamic entirely and the scale and

play13:27

persistence of the tax increased

play13:29

although one would argue it still

play13:31

remained for the most part what I would

play13:34

call sort of conventional conflict and

play13:36

less about sort of large-scale civilian

play13:41

casualty attacks obviously that changed

play13:44

there are a few spectacular events that

play13:47

were done for different reasons in 2015

play13:49

with the attacks on the hotels and

play13:50

they've been drifting south into the

play13:52

attack in cote ivoire but it really was

play13:57

mostly one would say a more conventional

play14:02

insurgency I think one of the other

play14:04

things about the methods and means to

play14:06

talk about is is the role of the

play14:08

criminal networks in illicit trade there

play14:11

have been conversations back and forth

play14:13

about this particularly in Mali since

play14:14

2012 I think we still don't have a

play14:17

handle on it but I for in most cases

play14:20

criminal networks are sort of a marriage

play14:22

of convenience it's a way to move people

play14:27

and equipment it can be a way of sort of

play14:31

providing some resources but whether

play14:34

significant is is unclear it's it's not

play14:39

a cause and effect it's not something

play14:41

that's driving the way the terrorist

play14:42

groups are operating but it's certainly

play14:45

making the operating environment easier

play14:47

I think one of the arguments is the

play14:49

overlap with corruption how is this

play14:52

affecting the ability of security

play14:54

services to operate

play14:55

what is the corrupting influence of the

play14:58

illicit trade to motivate or demotivate

play15:02

security services to contain the

play15:04

terrorist groups or to maintain the

play15:05

instability it also complicates the idea

play15:08

of closing borders you want to manage a

play15:11

border you don't want to close it the

play15:13

the role of illicit licit trade sort of

play15:18

the the gray economy is also becoming

play15:20

perhaps more important I I think one of

play15:23

the things the issues and we've heard

play15:24

this anecdotally I was in Mali in May

play15:27

was the issue of cigarette trafficking

play15:30

now you know in Europe and just like in

play15:33

the US a pack of cigarettes can now be

play15:35

upwards of almost $10

play15:37

if you think about the potential for

play15:40

making money in smuggling cigarettes

play15:43

it's probably more important than drugs

play15:46

again and certainly easier and going

play15:48

back to the traditional start of motel

play15:51

Belmokhtar who was a cigarette smuggler

play15:53

so so the the illicit trade and how

play15:56

that's manages also makes it very

play15:57

complicated so its role is not very well

play16:00

understood the last thing I think and

play16:03

then I'm just going to go through a

play16:04

little bit of how this is played out on

play16:06

on the maps that we have of the

play16:09

historical maps of the terrorist attacks

play16:12

over the last five or six years is the

play16:14

role of connections between these groups

play16:16

so over the years where does a what how

play16:19

is al-shabaab or Boko Haram helped these

play16:21

helped or hindered what is their support

play16:23

and now we would talk the global Isis

play16:26

core and I would say for the most part

play16:29

it was incidental I mean there was an

play16:31

infamous sort of report of when the fall

play16:36

and when the coup happened in Mali that

play16:38

there was a Boko Haram group of training

play16:42

group in in northern Mali so there are

play16:44

connections but I think it's been more

play16:46

about information perhaps a few

play16:48

individuals but it certainly hasn't been

play16:50

significant and it hasn't been sort of

play16:53

chain of command directions I think

play16:57

that's something that is still being

play16:59

played out with Isis core and what their

play17:01

role is now are they providing ability

play17:06

to how to make a bomb how to conduct an

play17:09

attack but perhaps amplifying messages

play17:12

and their status it's unclear I think

play17:16

some of it might be where there might be

play17:17

attacked so that there is we are here

play17:21

recognition in the global Caliphate to

play17:22

sort of increase the stature but whether

play17:25

it's tactically important in these

play17:26

countries again I think is is probably

play17:29

not as important as its sometimes played

play17:31

out to be so I just wanted to go through

play17:34

really quickly the slides to remind you

play17:38

and I hopefully all of you have looked

play17:40

at which sort of lays out about how the

play17:41

spread has happened so in 2010 again

play17:45

going back this is really just a qim

play17:47

right and there really is a small scale

play17:49

of attacks they

play17:50

up in the mountains and this is where

play17:52

you're having the kidnapping for ransom

play17:54

going through into eleven and twelve now

play17:57

you're starting to see the effect and

play17:59

the spread into the south where we have

play18:00

the increased weapons so again you're

play18:04

spreading throughout Mali into 13 this

play18:06

is where you have basically more of what

play18:09

I call an active conflict

play18:11

it looks like it's contained now in the

play18:13

Sahel 14 15 now we have the spread south

play18:17

again this is where you have a lot of

play18:18

the mixed groups coming in and again

play18:22

this is on the a CSS website this data

play18:24

mostly is from another website called a

play18:27

chlid which i think is very good to look

play18:30

at and and you really have to filter the

play18:32

data I would take some time to look at

play18:34

the discussion because they also talk

play18:36

about political violence they're about

play18:38

protests about riots but I think it's

play18:40

very informative about going back to the

play18:42

point of looking at violence in general

play18:44

and not just terrorist violence and that

play18:46

that mix you know again going forward

play18:51

you see now you see the rapid spread

play18:52

into Burkina Faso and we're at 18 where

play18:55

we really have sort of the unfortunate

play18:58

where you have the sort of the violence

play19:02

as being driven probably from community

play19:04

level issues and grievances and less

play19:08

about and being sort of co-opted and

play19:10

merged with the transnational terrorist

play19:12

I think the the last point and I think

play19:14

cuz you know why talking about this way

play19:16

to understand this I think there was the

play19:18

the excellent sort of point from the

play19:20

previous speaker of you have to try to

play19:23

understand and maybe break it into parts

play19:25

to tease out what can be negotiated now

play19:29

going back to that earlier division

play19:30

between transnational terrorism and sort

play19:32

of insurgency what is there a political

play19:35

settlement what are things that can be

play19:37

handled and managed to try to

play19:39

de-escalate the conflict where are areas

play19:43

to protect to protect it from the spread

play19:45

you know one of the greatest concerns

play19:47

right now is is this going down into

play19:50

what we call the littoral states what's

play19:52

happening in Cote d'Ivoire what's

play19:54

happening in a banana in a Togo and the

play19:57

challenge is you do not want to have an

play19:59

a response that's about terrorism only

play20:01

you do not want to have just a security

play20:03

response

play20:04

because that tends to make it worse and

play20:07

so how can we help understand the

play20:10

motivations and who's joining and how

play20:12

can we get to negotiated settlements and

play20:14

leave the security response for the most

play20:17

narrow possible because I think that is

play20:20

really the way to prevent the spread and

play20:22

the way out of it thank you

Rate This

5.0 / 5 (0 votes)

Related Tags
Development WorkCounter ExtremismUSAIDTerrorist GroupsViolent ExtremismAfrica ProjectsCVE StrategiesSecurity ChallengesRadicalizationCommunity Impact