study guide - BISMUN Conference 2016
Transcription
study guide - BISMUN Conference 2016
BISMUN 2016 The Counter-Terrorism Committee Study Guide 1. 2. 3. 4. 5. 6. Welcoming Message Introduction to the Committee Introduction to the Topic Basic Definitions Historical Background Aspects of the Issue 6a. Funding i. Oil ii. Drugs iii. Taxation- Extortion and Bank robberies iv. Kidnapping- Human Trafficking 6b. Military and Recruitment i. Military Equipment ii. Recruitment - Use of Cyber Means 7. Actions and measures taken by United Nations and Counter-Terrorism Committee 8. Conclusion 9. Points to be addressed 10. Bibliography - Further Sources 1. Welcoming Message Dear Delegates, We officially welcome you as Members of one of the most challenging and complicated Committees that could be simulated, the Counter- Terrorism Committee. Our goal is to discuss as experts and find concrete solutions, suggest effective, well-rounded and up-to-date proposals for a resolution on the issue of the expansion of the Islamic State (also known as the Islamic State of Iraq and the Levant, Islamic State of Iraq and Syria, Daesh and Islamic State of Iraq and ashSham). As the Presidency, we have three goals. First of all, we shall provide you all the necessary information and data, which will assist you in your difficult task; thus, the following study guide, which you have on your hands, is a useful document with all the main points, arguments and information you may need to analyze, conceptualize and understand the topic. Secondly, we are engaged to create a friendly, warm, academic environment for our debate, which will be the cornerstone for a productive and effective dialogue between you, with our assistance, whenever it is needed. Last, but not least, we shall ensure that everything will go as planned, inspire spontaneous inspirations that lead to innovative ideas, as a means of creativity combined with entertainment. To sum up, we wholeheartedly welcome you to Bucharest International Student Model United Nations 2016 (BISMUN) and to the Counter- Terrorism Committee. We promise you a unique, once- in-a-lifetime experience and we wish you are prepared for the time of your life. We advise you to be well-prepared, to have researched thoroughly on our Topic of discussion and... Brace yourselves, BISMUN is coming. Amicably, Christoforos-Dimitrios Zafeiris Evdoxia Papastefanidi 2. Introduction to the Committee The Counter-Terrorism Committee was established by the Security Council Resolution 1373, which was adopted by the Security Council in September 28th 2001. The establishment of such a Committee crystalized the efforts of the United Nations to set a general framework for tackling terrorism and international terrorist acts and attacks, following the events of 11th September 2001 in New York. The CTC was adopted under Chapter VII of the UN Chapter and declares that terrorism is a threat to international peace and security. With the UN Security Council Resolution 1535 (2004), the Counter-Terrorism Committee Executive Directorate was established to assist the Committee. The CTC Executive Directorate has as its main scope to assist the Committee in its policymaking decisions, when the Committee was primarily called to criminalize financing of terrorism, tackle safe havens and freeze any funds related to terrorist organizations, promote cooperation with governments and organizations, criminalize active and passive assistance and implement effective border policy decisions. The CTC Executive Directorate is divided into two branches: the Assessment and Technical Assistance Office (ATAO) and the Administrative and Information Office (AIO).1 3. Introduction to the Topic Today the fight against ISIS has been prioritized as the most crucial and, at the same time, controversial issue to the global political agenda. Representing the “new age” of terrorism, ISIS has managed to achieve the main ideal target pursued by a plethora of terrorist organizations: the establishment of an Islamic State, governed by the Sharia law, based on the principles of Islamic fundamentalism and inspired by Sunni-Wahhabism ideology. Although the group has adopted tactics of indiscriminate violence, it has accomplished to function positively and effectively as regards to governance. ISIS has a well-organized state apparatus, it acquires military equipment, 1 Counter-Terrorism Committee Ex ecutive Directorate, The Role of the Counter -Terrorism Committee and its Executive Directorate in the International Counter-Terrorism Effort, www.un.org/en/sc/ctc/ it controls territories, it recruits and trains fighters as they are soldiers more than they are terrorists and, in some cases, it enjoys the support of the Sunni community. In order for the global community to disrupt the extremists’ vision and prevent their further expansion, plenty of counter- terrorism measures must be taken into consideration. The suppression of the financing of terrorism, actions to combat human, oil and drug trafficking and the advocacy of human rights and human dignity, have to be the key negotiation elements for an effective framework to fight ISIS. As the Secretary- General Ban Ki- moon at the Leader’s Summit on Counter Violent extremism stated a coordinated and unified response is needed to eliminate terrorism, to deny “safe haven” and to restore peace and security in the broaden region. 4. Definitions There is no consensus within the international community on the definition of terrorism. Due to the lack of a unified understanding of the term and the deadlocked long negotiations of how to define the threat, there is an ambiguity which makes UN efforts to combat terrorism highly unlike. However, we can come across with some common characteristics in the International law and in several Security Council Resolutions. For instance, par. 3 of the Security Council Resolution 1566 explains terrorist acts as those (1) “committed with the intent to cause death or serious bodily injury, or taking of hostages”. (2) “with the purpose to provoke a state of terror in the general public or in a group of persons or particular persons, intimidate a population or compel a government or an international organization to do or to abstain from doing any act, which (3) constitute offences within the scope of an as defined in the international conventions and protocols relating to terrorism”. 2 In an attempt to unite all member states to combat terrorism under a common definition of the term, former Secretary General Kofi Annan proposed a definition: “Any action constitutes terrorism if it is intended to cause death or serious bodily harm to civilians or non- combatants with the purpose of intimidating a population or compelling a government or an international organization to do or abstain from doing any act”. 3 He further explained his “principled, comprehensive strategy”, which has to be the State’s common approach on the issue, based on 2 UNSC. 2004. Security Council A cts Unanimously to Adopt Resolution Strongly Condemning Terrorism as one of most Serious Threats to Peace. United Nations: Press Release. [Online]. 8 October 2004. [Accessed 30 January 2016]. Available from: http://www.un.org/press/en/2004/sc8214.doc.htm 3 Kofi Annan. 2005. Secretary- General Kofi Annan Launches Global Strategy Against Terro rism in Madrid . United Nations: Press Release. [Online]. 10 March 2005. [Accessed 30 January 2016]. Available from: http://www.un.org/pr ess/en/2005/sg2095.doc.htm the “five Ds”; “Dissuade disaffected groups from choosing terrorism as a tactic to achieve their goals; Deny terrorists the means to carry out their attacks; Deter States from supporting terrorists; Develop State capacity to prevent terrorism; Defend human rights in the struggle against terrorism”. However, all these approaches are based more on general characteristics and personal beliefs rather than comprehensive and unanimously accepted legal frameworks. Most of the UNSC Resolutions are referring to such common characteristics on their perambulatory clauses. Still though, the lack of definition ultimately leaves it up to each UN member to decide whether or not an organization is a terrorist one. The main reason for s uch an ambiguity, when it comes to explicitly defining terrorism, is the inclusion/exclusion of armed struggle for liberation and as a means of enjoyment of their right of self-determination4 . With the General Assembly Resolution A/RES/49/60, the United Nations reached a consensus on measures to eliminate terrorism, described in a general matter some elements of terrorism: it is unjustifiable and criminal, a possible jeopardy of friendly relations between States, a grave violation of UN Charter principles, a threat to international peace and security, it is intended or calculated to provoke a state of terror in the general public. 5 4 Humanri ghts voices .org,. "UN 101 - There Is No UN Defini tion Of Terrorism". N.p., 2016. Web. 3 Jan. 2016. 5 United Nations General Assembly, Resolution 49/60 Meas ures to eliminate international terrorism, A/RES/49/60. Threat/Breach of Peace, Acts of Aggression, International Peace and Security: After the adoption of the UN Charter, there have been many discussions on the ways we can define and interpret Article 39 6 . Discussions have started from the classic notion of inter-state threat of threat to national security, with the threat or use of force. With Resolutions 1373 and 1540, the Security Council has made clear that international terrorism is also a phenomenon, which could be a threat to international peace and security. Another connection made was with the notion of human security, which is defined in the 1994 UN Development Programme, where seven elements were included: economic, health, environmental, food, community, political and physical harm. 7 To sum up, we argue that these terms must be strictly defined, as this will cause difficulties on the work of the related UN Bodies. These terms must be translated and interpreted in a case by basis 8 , even though there are risks of exploitation for (geo) political purposes. 5. Historical Background It could be argued that ISIS was founded in 1991 by Abu Musab Al Zarqawi. Al Zarqa wi started to be radicalized as a prisoner accused for drug possession and sexual assault and released in 1991 in an amnesty arrangement having, already, espoused the Salafi ideology. 9 By sending hatred messages from inside jail and being well-known for his extremist ideology, Zarqawi caught the attention of Osama Bin Laden. After two attempts by Bin Laden to recruit Zarqawi to join Al Qaeda and despite the ideological differences between the two men, Bin Laden provided Zarqawi approximately 3000 Salafi terrorists to train them in Tawhid Wal’ Jihad camp 6 The Securi ty Council s hall determine the exis tence of any threa t to the pea ce, brea ch of the pea ce, or a ct of aggression and shall ma ke recommendations, or decide wha t measures shall be taken in a ccorda nce wi th Arti cles 41 and 42, to maintain or res tore interna tional peace and securi ty. 7 Human Development Report, 1994, pp. 24-25, http://hdr.undp.org/si tes/defaul t/files/reports/255/hdr_1994_en_complete_nos tats .pdf 8 For example, if a stri ct defini tion of sta te -to-s tate threat was adopted, how would i t be possible to a ct on internal ci vil conflicts , or a ct to maintain and elimina te epidemi c diseases, such as HIV/AIDS or Ebola? 9 Mapping Mili tant Organi za tions , The Islamic State. [Online]. 2002. [Accessed 24 November 2015]. Available from: http://web.s tanford.edu/group/mappingmili tants/cgi-bin/groups/view/1 (Monotheism in Jihad) in Herat, Afghanistan. 10 For the next five years, Zarqawi plots and conducts terrorist attacks with the support of Al Qaeda and Osama Bin Laden as well as the Taliban and Mullah Omar, even though his group Jama’ at al- Tawhid wa’ al- jihad was not an Al Qaeda affiliated terrorist organization. 11 He spent time in Syria, Iran and Lebanon trying to recruit new fighters and to create an efficient network equal to Al Qaeda’s. He fought aside Al Qaeda and Taliban men in Afghanistan against the American forces after 9/11 invasion but he wounded and fled to Iran to join Anshar al- Sharia 12 . His membership to the Kurdish jihadist group caught the attention of the US and he was accused of acting as a mediator between Al Qaeda and Santam Hussein. Despite the differences between Zarqawi and Bin Laden, in 2004, Zarqawi declared bayah 13 to Bin Laden and a new terrorist organization was created, named Tanzim Qaedat al Jihad fi Bilad al Rafidayn, or Al Qaeda in Tigris and Euphrates, or as it is known in the West, Al Qaeda in Iraq (AQI). 14 The AQI (and ISIS afterwords) pursues a “Grand Strategy” 15 : the establishment of an Islamic state which would be governed under the Sharia Law, based on the Prophet’s word and without any western, or any other external, influence. A state ruled by the Islamic law, supporting the principles of Islamic fundamentalism, are inspired by Sunni Wahhabism, since those characteristics are considered the only functional for a well- governed Islamic state to be based on. This aim is very common within terrorist organizations despite their possible differences, as far as the means or the violence they use are concerned. 10 ibid. 11 Stern, J. & Berger, J.M. ISIS: The State of Terror. London: William Collins, 2015. 12 ibid. 13 An oa th of allegiance from a leader to leader instead of an organiza tion to orga niza tion level . see Ba ya h. The Oxford Dictionary of Islam. [Online di ctiona ry]. Oxford Uni versi ty Press. 2004. 14 15 Stern, J. & Berger, J.M. ISIS: The State of Terror. London: William Collins, 2015. The term was introduced by: Habeck, M.R. Jihadis t Stra tegies in the Wa r on Terrorism. In: Pery, M., Negrin, H.E. ed. The Theory a nd Pra cti ce of Islami c Terrorism. New York: Palgra ve ma cmillan, 2008 pp. 69-79. It is worth noting that the main difference between the two leaders can be explained by the “Method of Mohhamad” in which there is a distinction between the potential enemies: “near- far” enemy, “greater- lesser” unbeliever and “apostates- unbelievers”16 . Zarqawi’s ideological approach has been categorized in the last group of enemies-targets by considering as apostates the Shii Muslims whereas Bin Laden’s approach has been categorized in the second group of enemies- targets by considering as greater unbelievers the West and its allies. Since the beginning of the affiliation the different strategy was pursued by each leader created an adverse coexistence between the two sides. On the one hand, Osama Bin Landen shared a vision for a “Pan- Islamic” and not for a “Pan- Arabic” State, a state based on the common religion, supporting a multinational entity, without national or sectarian discrimination 17 .On the other hand, Zarqawi espoused a “genocidal rhetoric followed by genocidal behavior” by considering Shi’ism “the looming danger, the lurking snake, the crafty and malicious scorpion” 18 .The latter tactic was condemned by Al Qaeda and, albeit Zarqawi reaffirmed his bayah to Bin Laden and obeyed to change some of his tactics, the impact of a possible Zarqawi resignation of the AQI leadership was unpredictable 19 . In June 2006, a US air strike north of Baghdad, backed by Iraqi intelligence, killed Al Zarqawi and other insurgent leaders 20 . However, the Bush administration correctly predicts that the sectarian extremism violence will continue to flourish in Iraq because of the strong ideological impact Zarqawi left behind 21 . Indeed, before his death, Zarqawi had made some structural changes within his organization by recruiting and incorporating other jihadi groups 22 . Soon after his death, the Mujahidin Shura Council (MSC) declared the formation of the Islamic State of Iraq 16 ibid. 17 Guna ra tna , R. Inside Al Qaeda: the Global Network of Terror. New York: Columbia Uni versi ty Press. 2003. 18 Weiss, M. & Hassan, H. ISIS: Inside the Army of Terror. New York: Regan Arts , 2015. pp.28-29. 19 Uni ted Sta tes . Congress . House. Permanent Select Commi ttee on Intelligence. Al Qaeda : the many fa ces of an Islamic extremist threat: report of the U.S. House Permanent Commi ttee on Intelligence, approved June 2006, together with additi onal and minori ty views , submi tted September, 2006. United Sta tes : 2006. 20 Kni ckmeyer, E. & Finer, J., Insurgent Leader Al- Zarqawi killed in Iraq, The Washington Pos t, [Online]. 2006. [Accessed 26 November 2015]. Available from: http://www.washingtonpos t.com/wpdyn/content/a rti cle/2006/06/08/AR2006060800114.html 21 Bush, G. Statement on the Death of Abu Musab al-Zarqawi, [Online]. 2006. [Accessed 26 November 2015]. Available from: http://www.presidential rhetori c.com/speeches /06.08.06.html 22 Hosken, A. Empire of Fear: Inside the Islamic State, London: Oneworld, 2015: p.83. (ISI) while the Zarqawi’s successor as leader of AQI, Abu Hamza al Mujahir, pledged bayah to ISI leader, Abu Omar al Baghdadi 23 . The ISI head remained in charge for the next four years and despite the fact that his profile information is limited, he is well known due to the massacres committed in his name: the use of women with Down’s syndrome as suicide bombers and the second- deadliest terrorist attack in history, the Yazidi bombing in 2007 24 - killing 500 and injured 350 25 . The “Prince of the Faithful” structured ISIS as it is today by establishing an effective domestic administration introducing ministries and the Sharia court and instead of pledging bayah to Bin Laden, as Zarqawi did in the past, he demanded baya h from others to indicate the uniqueness and complexity of his organization 26 . On 18 April 2010, during an Iraqi and US operation, Abu Omar Al Bagdadi surrounded by special forces and having realized that he lost the fight, decided to detonate his suicide belt and commit suicide in a safe house near to Tikrit, Saddam Houssein’s hometown 27 . The American authorities believed at that time that they achieved to demoralize, weaken and disrupt the organization’s plots and structure by assassinating main leaders hip figures 28 . However, soon after the death of the ISI leader, in May 2010, the most enigmatic and determined figure was declared as the new leader of the group: Abu Bakr al- Qurayshi al- Husseini al- Baghdadi who managed to take his group from the point o f extinction to “becoming the deadliest terrorist organization of the twenty- first century”29 . In 2003, the group became known as the Islamic State of Iraq and Syria (ISIS) due to its leader’s attempt to merge his group with Al- Nousra Front, the Al- Qaeda’s offshoot in Syria 30 . Zawahiri, who had succeeded the slain Osama bin Laden to the leadership of Al- Qaeda, acted as a mediator between the two organizations by 23 Stern, J. & Berger, J.M. ISIS: The State of Terror. London: William Collins, 2015: p.26. 24 Hosken, A. Empire of Fear: Inside the Islamic State, London: Oneworld, 2015: p.85. 25 The Sydney Morning Herald. Yazidi Bombing is Iraq’s deadliest. [Online]. 2007. [Accessed 26 November 2015]. Available from: http://www.smh.com.au/news/world/ya zidi -bombing-is -i raqs-deadliest/2007/08/16/1186857683441.html 26 Hosken, A. Empire of Fear: Inside the Islamic State, London: Oneworl d, 2015: p.91. 27 BBC, Senior Iraqi Al-Qaeda leaders ‘killed’. [Online].2010. [Accessed 28 November 2015]. Available from: http://news .bbc.co.uk/1/hi /world/middle_eas t/8630213.s tm 28 Hosken, A. Empire of Fear: Inside the Islamic State, London: Oneworld, 2015: p.118. 29 ibid. p.120 30 BBC, Profile: Abu Bakr al- Baghdadi. [Online]. 2015. [Accessed 7 December 2015]. Available from: http://www.bbc.co.uk/news /world-middle-east-27801676 supporting and protecting his affiliation and both by condemning the Abu Bakr’s initiative to claim territories in Syria and abolishing the Abu Bakr’s shiny new ISIS 31 . The “Invisible sheikh”32 is said to keep a low profile even among his own armed supporters, who amount to an estimated 7,000 fighters 33 according to the Guardian while the CIA reports more than 31,000 fighters 34 . However he is very well- known for his tactician and military leadership skills as it can be explained due to his territorial victories in Iraq and Syria. Under his leadership, ISIS has managed to conquer the city of Faluja in January 2014 and six months later they took also Mosul, the second biggest city in Iraq, and Tikrit under their control. By seizing such strategically important cities, ISIS’s territorial claims vary from the one third of Syria and one third of Iraq, “a land mass that is the size of Britain”35 , to thirty- five thousand square miles of land which is an area the size of Jordan 36 . Both territorial examples were given in 2014 before the US response to the crisis by assembling a coalition of countries to fight the group by launching air strikes on ISIS targets in Iraq and Syria. In December 2015, the Obama administration announces that “So far, ISIL has lost 40 percent of the populated areas it once controlled in Iraq (...) and has lost thousands of square miles of territory it once controlled in Syria”37 . Regardless, though, the size of the so-called Caliphate, IS have achieved two goals which make the West efforts to eliminate the extremist group even harder. On the one hand, a well- structured 31 Hosken, A. Empire of Fear: Inside the Islamic State, London: Oneworl d, 2015: p.165. 32 Sabin, L. Abu Bakr Al- Ba ghdadi profile: The mys teri ous leader of ISIS- and why he is called the “invisible Sheikh”. INDEPENDENT. [Online]. 10 November 2014. [Accessed 8 December 2015]. Available from: http://www.independent.co.uk/news /worl d/middle-east/abu-bakr-al-baghdadi-profile-the-mys terious-leader-of-isis-and-whyhe-is-called-the-invisible-sheikh-9849413.html 33 Beaumont, P. Abu Ba kr al - Baghdadi : the ISIS Chief wi th the Ambi tion to Overtake al- Qaida. The Guardian. [Online]. 12 June 2014. [Accessed 8 December 2015]. Available from: http://www.thegua rdian.com/world/2014/jun/12/baghdadi-abuba kr-i raq-isis-mosul-jihad 34 BBC, Islamic State fighter estimate triples- CIA. [Online]. 2014. [Accessed 14 December 2015]. Available from : http://www.bbc.co.uk/news /world-middle-east-29169914 35 Al Ara bi ya News, ISIS Controls an area the size of Britain: Syria Expert. [Online]. 28 November 2014. [Accessed 14 December 2015]. Available from: http://english.ala rabi ya .net/en/News/middle-east/2014/11/28/ISIS-controls -an-a rea -the-sizeof-Bri tain-Syria-expert.html 36 Pa cker, G., The Common Enemy. The New Yorker. [Online]. 25 Augus t 2014. [Accessed 14 December 2015]. Available from: http://www.newyorker.com/ma gazine/2014/08/25/the-common-enemy 37 Pa rkinson, J., US-Led Coalition Hitting ISIS ‘Ha rder tha n Ever’, Obama sa ys . ABC News. [Online]. 14 December 2015. [Accessed 15 December 2015]. Available from: http://abcnews .go.com/Politi cs /us-led-coali tion-hi tting-isis-ha rderobama/s tory?i d=35753628 administration has been established, transforming the terrorist group into an actual “state” 38 . This governance structure has raised questions about the short and long- term viability of IS and the appropriate response of the global community. On the other hand, and most importantly, is the public acceptance and support that IS enjoys by the Sunni community. A very indicative example is the Mosul siege when Iraqi forces of approximately 1 million men, including 15 military divisions, lost the city by 6.000 IS fighters 39 . The ultimate precondition for IS success was the support of the Sunni community after realizing that IS domination would be the solution to the Iraqi- sectarian policy they deal with for years 40 . The most crucial political change took place in Iraq after the US invasion in 2003, the Debaathification procedure, transformed the domestic situation and lead to the destabilization of the country. Under the Coalition Provisional Authority, approximately 40,000 public sector employees and military officials affiliated with Saddam Hussein’s political party, removed from their positions 41 .Because of this policy, the one third of the Iraqi population had, directly or indirectly, been affected 42 . This lead to the radicalization of many of them by joining extremist groups or by joining the ranks of the Iraqi resistance movement 43 . Considering the impact of this policy and also the fact that the former prime minister of the state, Nouri Al Maliki failed to strike a balance between the different sects and minorities and he continued to discriminate against the Sunni population, it could be argued that the latter preferred to be governed by IS even though they do not all agree with the use of violence 44 . 38 For a detailed anal ysis see: Al - Ta mimi , A.,The Evolution in Islamic State Administra ti on: The Documenta ry Evidence. Terrorism Research Initiative. [Online]. 2015. 9(4). [Accessed 15 De cember 2015]. Available from: http://www.terrorismanal ys ts.com/pt/index.php/pot/a rti cle/view/447/html 39 Cockburn, P., The Jihadis Return, ISIS and the New Sunni Uprising. New York:OR Books LLC, 2014. 40 ibid. 41 Za fi rov, M., The Crisis in Iraq: Was the rise of ISIL a surprise?. AlJazeera. [Online]. 25 December 2014. [Accessed 16 December 2015]. Available from: http://www.alja zeera.com/indepth/opini on/2014/12/crisis-i raq-was-rise-isil-surp2014122592114375688.html 42 i bid. 43 ibid. 44 Cockburn, P., The Jihadis Return, ISIS and the New Sunni Uprising. New York:OR Books LLC, 2014. 6. Aspects of the Issue The terrorist organization under analysis, ISIS, is said that it follows the ‘Three Stages of Revolutionary Warfare’ as stated by Mao. More specifically, the first stage is the “Strategic Defense” where space is given for time, the second stage is the “Strategic Stalemate”, where the movement gains military, political and social power, and the third stage, the “Strategic Offense”, where the movement implements transformative actions to establish its conventional power (which can be compared to the power of the enemy). 6.a. Funding Compared to other terrorist organizations ISIS poses a different financial challenge. Al Qaeda, for instance, was economically depended on “deep- pocket” donations 45 while Hezbollah is a paradigm of state sponsored terrorism as it can be seen due to its close relation with Iran 46 . The group has managed to be the richest terrorist organization globally when in late 2008 and early 2009 its budget rose approximately from $1 million per month to $3 million per day in 2014 47 . A striking fact about ISIS is that is “heavily diversified” which means that in case of shutting down one of the funding resources, the group can alternate the resource and still generate revenue 48 . Thus, it is easily understood that ISIS funding resources vary: selling of oil, drugs, electricity, antiquities, establishing a taxation system, perpetrating extortion or kidnapping for ransom, human trafficking, receiving donations, selling of looted property, robbery of banks, are some of the group’s funding resources. 45 Burke J. 2014. Al-Qaeda: the true story of radical Islam. New York; London: I.B. Tauris. p.89. 46 For an anal ysis on the crea tion of Hezbollah see: Dash, A., Hezbollah - Who created it, why it was created, how it was created_ 1-3. [Online]. 2012. [Accessed 17 December 2015]. Available from: https ://www.youtube.com/watch?v=MdPM5jhdIuo 47 Swa nson, A. 12 Wa ys ISIS gets funding. World Economi c Forum. [Online]. 23 November 2015. [Accessed 17 December 2015]. Available from: https ://agenda.weforum.org/2015/11/12-wa ys -isis-getsfunding/?utm_content=buffer3bd14&utm_medium=social &utm_source=facebook.com&utm_campaign=buffer 48 ibid. 6.a.i. Oil Iraq’s oil reserves are believed to be the world’s fifth largest proven oil reserves, estimated approximately 140 billion barrels 49 consisting the 42.9% of the country’s GDP in 2003 50 . ISIS has managed to siege oil fields and oil refineries in Iraq and Syria generating vast amount of money every day. Indicatively, ISIS possess two main oil operations: the one is located in Deir Ezzor in Syria, where they produce around 40,000 barrels per day 51 and the second one is the Ajil and Allas fields in Iraq from where they earned around $450 million in 10 months they controlled the fields 52 . The Financial Action Task Force reports that even though ISIS lacks of expertise and equipment in oil extraction, they manage to produce 50.000 barrels of petroleum per day53 . The product is being allocated in three different uses: a. for export, b. for selling to the local population, c. to fulfill its own needs 54 . As regards to export, the group uses smugglers and middlemen to sale the illicit oil to nearby areas including other neighboring countries, Syria’s rebel- held north and the Syrian regime 55 . There is also evidence that the group provides to the Assad regime other services such as electricity due to the ISIS control to the key dams and gas fields 56 . Exploiting the regime’s inability to import oil, the approximately 10 million people living in ISIS territories and need oil for everyday use and by illegally selling the product for 42% to 74% below the market value in countries with high demand, their profit reaches the 1$ to 49 US Energy Informa tion Administra tion. [no da te]. International Energy Statistics. [Online]. [Accessed 20 December 2015]. Available from: http://www.eia .gov/cfapps /ipdbproject/IEDIndex3.cfm?tid=5&pid=57&ai d=6 50 The World Bank. [no da te]. Data: Oil rents (% of GDP). [Online]. [Accessed 20 December 2015]. Available from: http://da ta .worldba nk.org/indi ca tor/NY.GDP.PETR.RT.ZS 51 Masi, A. Turkey, Russia,Iraq and Syria : The Bla ck Ma rket Oil Tra de that’s Fueling ISIS and Di viding the Terroris t Group’s Opponents. International Business Times. [Online]. 12 September 2015. [Accessed 22 December 2015]. Available from: http://www.ibtimes .com/turkey-russia-i raq-s yria-bla ck-ma rket-oil-trade-tha ts -fueling-isis-di viding-terroris t-2217476 52 Solomon, E., Cha zan, G., Jones , S. ISIS Inc: how oil fuels the jihadi terrorists . Financial Times [Online]. 14 October 2015. [Accessed 22 December 2015]. Available from: http://www.ft.com/cms/s/2/b8234932-719b-11e5-ad6df4ed76f0900a .html #a xzz3v5trCIM9 53 FATF. Financing of the Terrorist Organization Islamiq State of Iraq and the Levant (ISIL). [Online]. 2015. [Accessed 20 December 2015]. Available from: http://www.fa tf-ga fi.org/media/fa tf/documents/reports/Financing-of-the-terroris torganisati on-ISIL.pdf 54 ibid. 55 i bid. 56 Malm, S.,. How ISIS is funded by bla ck- market oil trading, illegal drugs and internet ca fes. The Daily Mail. [Online]. 22 Februa ry 2015. [Accessed 20 December 2015]. Available from: http://www.dail ymail.co.uk/news/a rti cle-2964028/oil-drugsinternet-ISIS-funded.html 2$ million per day57 . Fortunately, they do not control any modern operating oil refinery, albeit they attempted in the past, instead they owned small, mobile refineries of less than 500 barrels per day of petroleum products 58 . Moreover, due to the lack of infrastructure, personnel and secure oil supply the group cannot produce to the 100% of their existing capacity 59 . The need for skilled personnel is such that al Bagdadi announced in a recording that the Islamic State needs to recruit trained people such as engineers, experienced workers, managers and trainers to provide their expertise 60 . The coalitions on the battlefield are dealing with two paramount challenges: firstly, how to counter the illegal oil trafficking- and therefore the main financing route of the terrorist groupwithout destabilizing, at the same time, the life of innocent people living in these territories. Secondly how to disrupt the illegal export to neighboring countries without risking their in between alliances. The second challenge applies to the Turkish case: When Adam Szubin, a U.S. Treasury Department official, announces that “Some is coming across the border into Turkey”61 and Jonathan Schanzer, VP of research at the Foundation for Defense of Democracies, argues “When oil is being bought on the Turkish border it’s highly unlike ly that it will be sold anywhere else but Turkey”62 . 57 Sa tti . B., Funding Terroris ts , the Rise of ISIS. Security Intelligence. [Online]. 10 Octomber 2014. [Accessed 20 December 2015]. Available from: https ://securi tyintelligence.com/funding-terrorists -the-rise-of-isis/ 58 Humud, E.C., Pi rog, R.,Rosen, L., Islamic State Financing and US Policy Approaches. Congressional Resea rch Servi ce. [Online]. 10 April 2015. [Accessed 20 December 2015]. Available from: https ://www.fas.org/s gp/crs /terror/R43980.pdf 59 i bid. 60 Swanson, A., 12 Wa ys ISIS gets funding. World Economic Forum. [Online]. 23 November 2015. [Accessed 20 December 2015]. Available from: https ://a genda .weforum.org/2015/11/12-wa ys-isis-getsfunding/?utm_content=buffer3bd14&utm_medium=social &utm_source=facebook.com&utm_campaign=buffer 61 Fa ulconbri dge, G. & Saul , J. Islamic State oil is going to Assad, some to Turkey, U.S. Offi cial sa ys. Reuters. [Online]. 10 December 2015. [Accessed 23 December 2015]. Available from: http://www.reuters .com/a rti cle/us -mideas t-crisis-s yria-usa-oilidUSKBN0TT2O120151210 62 Masi, A. Turkey, Russia,Iraq and Syria : The Bla ck Ma rket Oil Tra de that’s Fueling ISIS and Di viding the Terroris t Group’s Opponents. International Business Times. [Online]. 12 September 2015. [Accessed 22 December 2015]. Available from: http://www.ibtimes .com/turkey-russia-i raq-s yria-bla ck-ma rket-oil-trade-tha ts -fueling-isis-di viding-terroris t-2217476 6.a.ii Drugs Antonio Costa, former head of the UN Office on Drugs and Crime, argues that financing of Terrorism and business of drug trafficking are commonly interrelated terms since almost every terrorist group generates revenue by selling or producing drugs or by providing security to smugglers 63 . According to the Russian Federal Drug Control Service (FSKN) it is estimated that ISIS generates more than $1 billion annually from drug sales within its ter ritory and abroad 64 . By selling heroin and opium in Europe, the estimated amount of money reaches the $50 billion in total for the terrorists, making drug money one of the most essential profit generators for the group 65 . There is also evidence that organizations in North Africa, affiliated with ISIS, provide security to smugglers to cross former caravan routes by gaining millions in return 66 . What is also widely known about drugs production and trafficking perpetrated by ISIS is Captagon- an amphetamine mostly consumed in the region which generates millions of dollars for the group 67 . In October 2015, Lebanese airport authorities found two tons of these pills loaded to a Saudi’s royal family member’s private plane 68 ; an incident which creates a state of uncertainty among those fighting ISIS. 63 Cos ta , A., Terroris ts to be judged by the Internati onal Cri minal La w?. European Union Delegation to the United Nations. [Online]. 17 Ma rch 2005. [Accessed 19 December 2015]. Available from: http://euun.europa .eu/a rti cles/en/a rti cle_4504_en.htm 64 RT. High Finance: ISIS generates up to $1 bn annually from trafficking Afghan heroin. [Online]. 6 Ma rch 2015. [Accessed 19 December 2015]. Available from: https ://www.rt.com/news/238369-isis-drug-money-traffi cking/ 65 i bid. 66 Porter, T., Cocaine Fundind ISIS: Drug Smuggling Profits Islamic State - Linked Jihadis ts in North Afri ca . International Bussiness Times. [Online]. 20 November 2014. [Accessed 19 December 2015]. Available from: http://www.ibtimes .co.uk/cocaine-funding-isis-drug-smuggling-profi ts-islami c-s ta te-linked-jihadists-north-a fri ca-1475824 67 Henley J., Ca ptagon: the amphetamine fuelling Syria’s ci vil wa r. The Guardian. [Online]. 13 Janua ry 2014. [Accessed 19 December 2015]. Available from: http://www.thegua rdian.com/worl d/shortcuts /2014/jan/13/capta gon-amphetamines yria-wa r-middle-east 68 Sa via no, R., The Role of Drug Traffi cking and Money Laundering in Fi ghting ISIS. The New York Times . [Online]. 23 November 2015. [Accessed 19 December 2015]. Available from: http://www.nyti mes .com/roomfordebate/2015/11/20/draining-isis-coffers/the-role-of-drug-traffi cking-and-money-launderingin-fi ghting-isis 6.a. iii. Taxation- Extortion and Bank robberies As it has already been mentioned, ISIS has been transformed from a militia- terrorist group to a proto- state, a Caliphate which intend to function as a welfare state. To achieve that, the group has “laid down a blueprint for a viable self- funding Islamic state” by establishing a sophisticated taxation system equal to those of states 69 . The spectrum of tax payers varies: from telecommunication companies which owned towers in ISIS territory, to local businessmen and Christians. In detail, Raqqa’s Credit Bank is authorized to collect the taxes. The shop owners must pay $20 every two months for services such as electricity, security guarantee and water 70 . Some locals claim that they receive a receipt with the official logo stamped and also that the money they pay is less than they used to pay under Assad’s governance 71 . Moreover, there is a 10% income tax, the “cleaning tax” of approximately 5,000 Syrian pounds ($228) paid by each merchant entering their territories and there are fines and fees for those do not obey the Sharia rules such as alcohol consumption, possession of college textbooks and traffic violations 72 . The Christian minority is also forced to pay the Jizya tax in return for protection and as far as they pay the tax they will be allowed to maintain their customs including drinking alcohol or eating pork without, however, doing so in public 73 . An also profitable tax is zakat, which has its roots in Prophet’s days: the wealthier Muslims has to give away the 2.5% of their income for a holy cause 74 . The US- based Rand Corporation think-tank estimates that from extorted money 69 Thorndi ke, J., How ISIS is using Ta xes to Build a Terroris t Sta te. Forbes. [Online]. 18 August 2014. [Accessed 23 December 2015]. Available from: http://www.forbes .com/sites/ta xanal ys ts/2014/08/18/how-isis-is-using-ta xes-to-build-a terrorist-s ta te/ 70 Hubba rd, B., Li fe i n a jihadist Capi tal : Order wi th the Da rker Si de. The New York Times. [Online]. 23 Jul y 2014. [Accessed 23 December 2015]. Available from: http://www.nyti mes .com/2014/07/24/world/middleeast/islami c-s ta te-controlsraqqa-s yria .html?hp&a ction=cli ck&pgtype=Homepage&version=LedeSum&module=fi rst-column-region®ion=topnews &WT.na v=top-news &_r=1 71 ibid. 72 Engel, P., ISIS has found a huge moneyma king method that’s impervious to sanctions and air raids . Business Insider. [Online]. 2 December 2015. [Accessed 23 December 2015]. Available from: http://www.businessinsider.de/isis-ta xa tionextortion-s ys tem-2015-12?r=US&IR=T 73 Spencer, R., Mili tant Islamist group in Syria orders Chris tians to pa y protecti on ta x. The Telegraph. [Online]. 27 Februa ry 2014. [Accessed 23 December 2015]. Available from: http://www.telegra ph.co.uk/news/worldnews/middleeast/s yria /10666257/Militant-Islamist-group-in-Syria -orders -Christians to-pa y-protection-ta x.html 74 Solomon, E. & Jones , S., ISIS Inc: Loot and ta xes keep jihadi economy churning. The Financial Times. [Online]. 14 December 2015. [Accessed 23 December 2015]. Available from: http://www.ft.com/intl /cms /s/2/aee89a 00-9ff1-11e5-beba5e33e2b79e46.html #a xzz3v5trCIM9 ISIS earned $875 million before June 2014 75 . It is fact that the more territory they conquer, the more money they accumulate by pursuing taxation and extortion tactics. Except the fact that the group demands 10% of each cash withdrawal from banks within their territory76 they are the perpetrators of the Mosul’s Central bank robbery with an estimated profit of $400 million in cash and a large amount of gold bullion 77 . The Financial Action Task Force has warned that some branches in ISIS region “may maintain links to the international financial system” since there are 20 financial institutions still operating within ISIS borders 78 . 6.a. iv. Kidnapping- Human Trafficking The method of kidnapping for ransom and the organized crime in general are traditional useful tools for terrorist organizations to generate revenue. As regards to kidnapping, ISIS is known to take hostages and ask for ransom in return and despite the fact that many states has refused to pay the ransom, some others does, generating for the group approximately $35 to $45 million profit 79 . Specifically the US while follows a non-payment strategy allows to the families of the victims to pay the ransom without prosecuting them and at the same time the US authorities will play a mediator role to secure the safe return of the hostages 80 . This approach is similar to the 75 ibid. 76 Cohen, S.D. Rema rks of Under Secreta ry for Terrorism and Financial Intelligence Da vid S. Cohen a t The Ca rnegie Endowment For International Pea ce, “Attacking ISIL’s Financial Founda tion. U.S Department of the Treasury. [Online]. 23 December 2014. [Accessed 23 December 2015]. Available from: https ://www.treasury.gov/press-center/press releases/Pages /jl 2672.aspx 77 Da ra gahi , B. Bigges t bank robbery tha t ‘never happened ‘- $400m ISIS heist. Financial Times. [Online]. 17 Jul y 2014. [Accessed 23 December 2015]. Available from: http://www.ft.com/intl /cms /s/0/0378d4f4-0c28-11e4-908000144feabdc0.html#a xzz3v5trCIM9 78 Levi tt, M. Sophis tica ted Finances Tha t Could Trip Up ISIS. The Washington Institute. [Online]. 22 November 2015. [Accessed 23 December 2015]. Available from: http://www.washingtoni nsti tute .org/policy-a nalysis/view/sophis ti catedfi nances-that-could-tri p-up-isis 79 Uni ted Nations Securi ty Council . Report S/2014/770: Sixteenth Report of the Analytical Support and Sanctions Monitoring Team submitted pursuant to resolution 2161 (2014) concerning Al- Qaeda and associated individuals and entities (29 October 2014). [Online]. 2014. [Accessed 25 December 2015]. Available from: http://www.un.org/ga/sea rch/view_doc.asp?s ymbol =S/2014/770 80 Dunham, W. & Rampton, R. US will not prosecute fa milies for pa ying hosta ge ransom. Reuters. [Online]. 23 June 2015. [Accessed 25 December 2015]. Available from: http://www.reuters .com/a rti cle/us -usa-securi ty-hos tagesidUSKBN0P31Q720150623 European one and to some wealthy Arab families as well, who do negotiate with terrorists by granted $20 million only in 2014 for ISIS 81 . However, members of ISIS do not discriminate over the hostages; international or local ones. According to Amnesty International, hundreds of Yezidi girls, aged less than 15, become victims of sexual slavery and many of them have been “sold” to the sexual slavery market 82 known as “Sabaya Market”83 . In the same schema of human trafficking, ISIS generates revenue also by exploiting the illegal immigration caused by the humanitarian crisis in the Mediterranean region. According to the Center for Financial Crime and Security Studies, there is evidence that even though ISIS does not perpetrate smuggling itself, it employs a tax to those who do as a boost of their economy84 . The profit by smuggling activity in Libya only had risen from $8 million to $20 million in 2010 to $255 million to $323 million in 2014 strengthening the economies of terrorist organizations including ISIS 85 . 6bi. Military Equipment As it was aforementioned, ISIS was affiliated with Al-Qaeda for a couple of years. During this period, the group gained access to sources and mediators, which provided them with weapons and arms necessary for their operations. At that stage of its existence, the leader has created a network of fighters and members powerful enough to promote car bombings and suicide bombings. Also, since the civil conflict started in Syria (which falls into the same period of the Arab Spring), ISIS has attempted to control this territory as well. ISIS, through organized attacks to places and the headquarters of rebel groups in Syria, steals personal belongings, resources, but 81 CNN Money. How ISIS makes its millions. [Online]. 1 April 2015. [Accessed 25 December 2015]. Available from: https ://www.youtube.com/watch?v=0QVRUxALZIs 82 Amnes ty International. Yezidi women and girls face horrowing sexual violence. [Online]. 23 December 2014. [Accessed 25 December 2015]. Available from: https ://www.a mnes ty.org/en/lates t/news/2014/12/i raq-yezidi-women-andgi rls -fa ce-ha rrowing-sexual-violence/ 83 For a thorough a ccount of Saba ya Ma rket see Callima chi , R. ISIS Enshrines a Theology of Rape. The New York Times . [Online]. 13 Augus t 2015. [Accessed 25 December 2015]. Available from: http://www.nyti mes .com/2015/08/14/world/middleeast/isis-enshri nes-a-theology-of-rape.html 84 Crowcroft, O. ISIS: People tra fi cking, smuggling and puni ti ve ta xes boos t Islami c Sta te economy. International Business Times. [Online]. 16 June 2015. Available from: http://www.ibti mes.co.uk/isis-people-tra fficking-smuggling-puni ti veta xes-boos t-islamic-sta te-economy-1506473 85 Ibid. more importantly arms and weaponry. These attacks may, also, lead to the surrender of rebel, anti-governmental groups, which declare commitment to the work of ISIS. Also, ISIS by taking over large cities in Iraq and Syria (such as Mosul) 86 , and giving control of them to former members of the Iraqi governments has managed to take control of weaponry stations and a significant amount of arms, but also establish a “stable state”, with “ministers” and leaders in each area. The influence it has gained in the area was unpredictable the army that IS has managed to create is similar to a nation state’s army, as its members go through practice, constant training and learn to live with a weapon on their arms. A main threat, which exists and still have not been tackled properly, is the possibility of ISIS’ holding elements and tools which can be used for the creations of weapons of mass destruction. Briefly explaining the historical background, the first use of nuclear power for violent purposes is the bombing of Hiroshima and Nagasaki in 1945, during the Second World War. The development of the nuclear and radioactive technology is mainly based on their use for medical purposes and the advancement of medical treatments. However, as it is profound, every humanmade structure and element can be used positively (medical purposes) and negatively (war, terrorism). On the one hand, it is very easy to track and monitor any use or attempt of using nuclear technology and power. Under the Treaty of Non-Proliferation of Nuclear Weapons, there are five Member-States that are recognized of holding relevant technology: the United States of America, the United Kingdom, France, Russian Federation and People’s Republic of China. Alongside with these five Member-States, Pakistan, India and DPRK have run nuclear tests, but these three countries are not Members of the aforementioned Treaty. 87 Also, it is important to mention that there are five more countries that host nuclear weapons and twenty-three countries that are in alliances with the countries that hold nuclear weapons. 88 Over the last years, there is a fear that terrorist organiza tions will obtain more and more radioactive materials. That is, because in contrast with nuclear power and materials, radioactive materials are poorly guarded and easier to be found and extracted. After the 9/11 incident, there 86 http://eng.medintelligence.org/global-news /isis-takes -over-s yrian-town-in-homs-provi nce/ http://www.thegua rdian.com/world/2014/jun/10/i raq-sunni-insurgents-islamic-militants-seize-control -mosul 87 There is also an interna tional dis cussion for the possibility of nuclea r power exi stence i n Is rael , whi ch is not a Member-Sta te of the NPT, and as such it is not obliged to go through an extensi ve resea rch and conduct. For more i nforma tion, you ma y read: Bell, J. Bowyer. “Israel 's Nuclea r Option”. Middle East Journal 26.4 (1972): 379–388. Web... 88 "ICAN | Interna tional Ca mpaign To Abolish Nuclea r Weapons". N.p., 2016. Web. 3 Jan. 2016. is an escalating interest on the actions of individuals and non-state actors, which attempt to obtain radioactive materials with malicious purposes. 89 One of the main incidents related to the ISIS’ operations took place in 2014. The terrorist organization took control of 40 kilograms of uranium compounds, which were used for research at the University of Mosul. The government of Iraq called for assistance, and since then the government of the USA is in constant cooperation with the Iraqi government to track and recover radioactive materials that could be used harmfully in case they get obtained by ISIS, or any other terrorist organization. 90 Also, a smuggler of radioactive materials was arrested in his efforts to distribute these materials to ISIS’ related members, which raised concerns on the origins of ISIS’ affiliations and assisting regions. 91 Here, we will briefly write the related Treaties and Agreements that exist on the use, proliferation, production, development, threat of use and stockpiling of nuclear, radioactive, chemical, biological weapons, as it is important to realize and conceptualize the existing legal framework. Biological Weapons Treaties: Convention on the Prohibition of the Development, Production and Stockpiling of Bacteriological (Biological) and Toxin Weapons (BTWC) 92 : it forbids the development, production, stockpiling, or acquisition of biological and toxin weapons, and promotes the eliminations of existing weapons, production material and means of stockpiling and delivery. 89 For more informa tion, you ma y resea rch the cases of two Bri tish nati onals: Dhi ren Ba rot and Salahuddin Amin. 90 Reuters,. “Exclusi ve: Iraq Tells U.N. Tha t ‘Terroris t Groups ’ Sei zed Nuclea r Ma terials”. N.p. 2016, Web, 3 Jan, 2016. 91 Gilsinan, Ka thy. "Why Moldova Ma y Be The Sca ries t Country On Ea rth". The Atlantic. N.p., 2015. Web. 3 Jan. 2016. 92 Convention on the Prohibition of the Development, Production and Stockpiling of Bacteriological (Biological) and Toxin Weapons and on Their Destruction. [Online]. 1972, BTWC. Opened for signa ture 10 April 1972. Entered into Force 26 Ma rch 1975. [Accessed 30 Janua ry 2016]. Available from: http://www.opbw.org/convention/documents/btwctext.pdf Protocol for the Prohibition of the use in War of Asphyxiating, Poisonous, or Other Gasses, and of Bacteriological Methods of Warfare 93 , usually referred as Geneva Protocol, which forbids the use of gases, asphyxiating, poisonous or other, during times of war. Che mical Weapons: Convention on the Prohibition of the Development, Production, Stockpiling and Use of Chemical Weapons and on Their Destruction (CWC) 94 . India-Pakistan Agreement on Chemical Weapons 95 , a bilateral agreement which promotes the prohibition of such weapons in the two parties of the Agreement. Conventional Weapons: Arms Trade Treaty (ATT) 96 , which obliges Member-States that are Parties of the Treaty to regulate ammunition or munitions fired, launched or delivered by conventional arms, and regulate the import/export of such parts that may be used to create such conventional arms. Nuclear Weapons and Nuclear Safety: Convention on Nuclear Safety97 , an instrument that obliges Member-States to create and follow a regulatory framework, in case they have nuclear insta llations, such as nuclear power plants. 93 1925 Geneva Protocol. [Online]. 1972. Opened for signature 17 June 1925. Entered into Force 8 Februa ry 1928. [Accessed 30 Janua ry 2016]. Available from: http://www.un.org/disa rma ment/WMD/Bio/1925Geneva Protocol.shtml 94 Convention on the Prohibition of the Development, Production, Stockpiling and Use of Chemical Weapons and on Their Destruction. [Online].1993. CWC. Open for signa ture 13 Janua ry 1993. Entered into Force 29 April 1997. [Accessed 30 Janua ry 2016]. Available from: http://www.s ta te.gov/t/a vc/trty/127917.htm 95 India- Pakistan Agreement on Chemical Weapons. [Online]. 1992. Opened for signa ture 19 Augus t 1992. Opened into Force 28 October 1997. [Accessed 30 Janua ry 2016]. Available from: http://www.nti.org/trea ties -and-regi mes/india-pakistanagreement-on-chemi cal-weapons/ 96 Arms Trade Treaty. [Online]. 2013. ATT. Opened for si gna ture 28 Ma rch 2013.Entered into Force 24 December 2014. [Accessed 30 Janua ry 2016]. Available from: http://www.un.org/disarmament/ATT/docs/ATT_text_(As_adopted_by_the_GA) E.pdf Convention on the Physical Protection of Nuclear Material (CPPNM) 98 , which is the only, for the time being, legally binding agreement for the protection of peaceful use of nuclear materials. India-Pakistan Non-Attack Agreement, Joint Declaration of South and North Korea on the Denuclearization of the Korean Peninsula, Lahore Declaration, Strategic Offensive Reductions Treaty (SORT) 99 , Treaty Between the United States of America and the Russian Federation on Measures for the Further Reduction and Limitation of Strategic Offensive Arms (New START) 100 , which are all bilateral agreements regulating the possible use and maintenance of such nuclear weapons, between two Parties. Comprehensive Nuclear- Test-Ban Treaty (CTBT) 101 , which remains to be entered into force since three States haven't signed it and five haven't ratified it. International Convention on the Suppression of Acts of Nuclear Terrorism 102 , Treaty Banning Nuclear Tests in the Atmosphere, in Outer Space and Under Water (Partial Test Ban Treaty – PTBT) 103 , Treaty on the Non-Proliferation of Nuclear Weapons (NPT) 104 , which cover a broad 97 Convention on Nuclear Safety. [Online]. 1994. CNS. Opened for signa ture 20 September 1994. Entered into Force 24 October 1996. [Accessed 30 Janua ry 2016]. Available from: https ://www.iaea.org/publica tions /documents/trea ties/convention-nuclea rsafety 98 Convention on the Physical Protection of Nuclear Material. [Online]. 1979. Opened for signa ture 26 October 1979. Entered into Force 8 Februa ry 1987. [Accessed 30 Janua ry 2016]. Available from: https ://www.iaea.org/Publica tions /Documents/Conventions/cppnm.html 99 Strategic Offensive Reductions Treaty. [Online]. 2002. SORT. Opened for signa ture 24 Ma y 2002. Entry into Force 1 June 2003. [Accessed 30 Janua ry 2016]. Available from: http://www.nti .org/trea ties-and-regimes/s tra tegic-offensi ve-reducti ons-trea tysort/ 100 Strategic Arms Reduction Treaty. [Online]. 2010. New START. Opened for signa ture 8 April 2010. Entered into Force 5 Februa ry 2011. [Accessed 30 Janua ry 2016]. Available from: http://www.s ta te.gov/documents/organi za tion/140035.pdf 101 Comprehensive Nuclear- Test- Ban Treaty. [Online]. 1996. CTBT. Opened for signa ture 24 September 1996. It ha ve not entered i nto force. [Accessed 30 Janua ry 2016]. Available from: http://www.nti .org/trea ties-and-regi mes/comprehensi venuclear-tes t-ban-treaty-ctbt/ 102 International Convention for the Suppression of Acts of Nuclear Terrorism . [Online]. 2005. Opened for signa ture 13 April 2005. Entry i nto force 7 Jul y 2007. [Accessed 30 Ja nua ry 2016]. Available from: http://www.un.org/en/s c/ctc/docs /conventions /Conv13.pdf 103 Treaty Banning Nuclear Tests in the Atmosphere, in Outer Space and Under Water. [Online]. 1963. PTBT. Opened for signa ture 5 Augus t 1963. Entered into Force 10 October 1963. [Accessed 30 Janua ry 2016]. Available from: http://www.un.org/disarmament/WMD/Nuclea r/pdf/Pa rtial _Ban_Trea ty.pdf 104 Non- Proliferation of Nuclear Weapons Treaty. [Online]. 1968. NPT. Opened for signa ture 12 June 1968. Entered i nto Force 5 Ma rch 1970. [Accessed 30 Janua ry 2016]. Available from: http://www.un.org/disarmament/WMD/Nuclea r/NPTtext.s html range of acts, requirements, aims to limit and suppress the proliferation, use, maintenance of nuclear tests. Proposed Nuclear Weapons Convention (NWC) 105 , which was proposed, by France, United Kingdom, United States of America, Russian Federation and China, to prohibit the development of such weapons, the testing and production of nuclear weapons and their transfer, use and/or threat of use by all parties (still under discussion). At the time being, the only intergovernmental organ, with the mandate and jurisdiction to provide suggestions and solutions to nuclear weapons, and WMD generally, is the International Atomic Energy Agency (IAEA) 106 . IAEA is an intergovernmental forum of scientific, technical cooperation, created in 1957, and approved by 81 States in 1956. Over the last years, the main task of the Agency was the cooperation with Member-States to prevent the acquisition and use of such materials by terrorist organizations and address the issue effectively. The Agency has provided a valuable insight with monitored and verified researches in Iran and DPRK and its resolutions are a useful tool for the regulatory frameworks of these issues. Under the NPT, the Agency is authorized to monitor and regulate the use and the transfer of such materials, safeguarding and creating a protection system. It has established international standards and approaches for safety and security, such as the “Basic Safety Standards for Protection Against Ionizing Radiation and for the Safety of Radiation Sources” 107 and the “Code of Conduct on the Safety and Security of Radioactive Sources” 108 . 105 NTI: Building a Safer World. no date . Proposed Nuclear Weapons Convention (NWC). [Online]. [Accessed 30 Ja nua ry 2016]. Available from: http://www.nti .org/trea ties-and-regimes/proposed-nuclea r-weapons-conventi on-nwc/ 106 Iaea .org,. "Interna tional Atomi c Energy Agency | Atoms For Peace". N.p., 2016. Web. 3 Jan. 2016. 107 Ilo.org,. "Internati onal Basic Sa fety Standa rds For Protection Against Ioni zing Radiati on And For The Safety Of Ra diation Sources. IAEA Safety Series No. 115". N.p., 1996. Web. 3 Jan. 2016. 108 Www-ns .iaea.org,. "Code Of Conduct On Safety And Securi ty Of Sources ". N.p., 2016. Web. 3 Jan. 2016. 6bii. Recruitment and Use of Cyber Means An important aspect of the IS’s policy and ways it operates is the effective use of social media and the so-called “dark web”. Dark web, according to Natalia Grivas, is a hidden network of websites and the user needs special “tools” to access it. It is considered as a thriving market, where illegal activities take place from a variety of actors, such as the community of hacking, which assists on hacking services with paid services or instructions. Also, it provides the chance to buy arms, weapons, drugs and crime activities, such as “assassins to hire”. To be able to use the hidden tools of the dark web, users have to download a specific type; that has led to the automatic identification of any users who download it. 109 The main medium that ISIS uses to succeed its main goals, such as recruitment, funding and promotion of its actions, is Twitter. More exactly, ISIS through Twitter accounts, which share the views, ideas and actions of the terrorist organization, has managed to create a hard-to-detect promotion network. The majority of the accounts, enabled to be geographically detected, were found in the area of Syria and Iraq, and countries were ISIS has obtained some sort of support, such as Tunisia, Egypt or Saudi Arabia. 110 Also, the majority of the accounts were in Arabic (almost ¾ of the accounts), 18% were in English and 6% in French; this may lead to accurate results on the locations of fighters and countries of recruitment, but, unfortunately, France is one of the leading countries, in total numbers, which sends foreign fighters to Iraq and Syria. 111 Another use of the Internet and technology is in revenge for actions taken against the spread of ISIS. For instance, few months ago a worrying phenomenon happened, which escalated the war between ISIS and its enemies, namely the USA. A division of ISIS, which is involved in the cyber warfare and events, managed to hack encrypted files and publish names and personal 109 Gri vas N., Da rk Web and ISIS, Mediterranean Center for Strategic Analysis and Intelligence, [Date Accessed 16 December 2015] Available from: http://eng.medintelligence.org/resea rch/da rk -web-and-isis/ 110 Burger J.M. and Morgan J., The ISIS Twi tter Census : Defining and Des cribing the popula tion of ISIS supporters on Twi tter, The Brookings Project on the U.S. Relations with the Islamic World, ANALYSIS PAPER, Ma rch 2015, 20. [Date Accessed 17 December 2015], Available from: http://www.brookings .edu/~/media/research/files/papers /2015/03/isis -twitter-censusberger-morgan/isis_twi tter_census _berger_morgan.pdf 111 Radio Free Europe Radio Liberty, Foreign Fighter in Ira q and Syria : Where do they come from. [Online]. 201. [Accessed 17 December 2015]. Available from: http://www.rferl .org/contentinfographics /foreign-fighters-s yria -i raq-is -isis-isilinfographi c/26584940.html details of CIA, FBI and NSA officials. This event happened after the death of a British extremist and it was an act of revenge. 112 7. Actions/measures taken by the United Nations - Counter-Terrorism Committee Geneva Protocol, 1925 UNSCR 1373 (2001) UNSCR 1377 (2001) UNSC Resolution 1540 (2004) International Convention for the Suppression of the Financing of Terrorism (1999) UN Declaration on Measures to Eliminate International Terrorism (1994) General Assembly resolution 60/288 (2006) Uniting Against Terrorism: Recommendations for a Global Counter- Terrorism Strategy UN Global Counter Terrorism Strategy (2006), (2010), (2014) UNSCR 2161 (2014) Threats to International Peace and Security caused by Terrorist Acts. UNSCR 2170 (2014) Condemning Gross, Wide Spread Abuse of Human Rights by extremist groups in Iraq, Syria UNSCR 2199 (2015) Condemning Trade with Al Qaeda Associated Groups and further Targeted Sanctions UNSCR 2235 (2015) Establishing Mechanisms to Identify Perpetrators Using Chemical Weapons in Syria UNSCR 2249 (2015) Determining ISIS as Unprecedented Threat 112 Mediterra nean Center for Stra tegi c Anal ysis and Intelligence. [Da te Accessed 16 December 2015], Available from :http://eng.medintelligence.org/global -news /isis-cyber-calipha te-ha cks-54000-twi tter-accounts-and-posts -phone-numbers -ofheads -of-the-cia -and-fbi/ UNSCR 2214 (2015) Extending UN presence easing Arms Embargo to Counter- Terrorism Threat UNSCR 2253 (2015) Expanding Sanctions Framework to Include ISIL Global Initiative to Combat Nuclear Terrorism Nuclear Security Summits (2010, 2012, 2014) The 2002 G-8 Global Partnership Against the Spread of Weapons of Mass Destruction The 2003 Proliferation Security Initiative (PSI) The 2004 Global Threat Reduction Initiative (GTRI) 8. Conclusion The so- called Islamic state has been a long term goal for almost every Islamic terrorist organization and the actual establishment of such a state is more plausible than ever. The group poses both a threat to the Middle East and North Africa (MENA) region, always affected of disputes and instability, and a threat to the global community by spreading propaganda as we ll as fear. Being a unique case, ISIS needs to be examined and further treated as a totally different group compared to Al- Qaeda. However, that does not necessarily mean that the existing Counter-Terrorism tools are not efficient enough. Specifically, the Countering the Financing of Terrorism (CFT) initiatives need to be undertaken in combination to a counter global terrorism strategy. The financial aspect is important but intelligence sharing, law enforcement, occasional military actions, in detailed illustration of the consequences of terrorism remain primary means to counter terrorism. To disrupt the group’s plans, both short and long- term strategies are needed. Among them, enhanced international cooperation to avoid state sponsored terrorism phenomenon, information sharing as regards to intelligence, selective efforts to address the real causes of terrorism and so on. 9. Points to be addressed Which should be a long and short term agenda targeting the elimination of ISIS? What are the steps the international community has to take to prevent a possible territorial expansion? Given the analysis, how a comprehensive approach to counter the financing of ISIS should be structured? What conclusions are drawn by the historical background of ISIS’ emerge and what lessons can the international community take from the appearance of such phenomena? Which could be the main measures to create and/or reform the legislative framework on nuclear, radioactive, biological, chemical materials and weapons to eliminate their exploitation by terrorist organizations? Which could be the role of regional organizations, such as the African Union, Arab League, European Union, Shanghai Economic Cooperation, to assist in the prevention of ISIS’ expansion and possible future attacks? 10. Further Sources- Bibliography · Al Arabiya English · Al Jazeera ∙ American Journal of International Law · Amnesty International · BBC News · Brookings Institution- Center for Middle East Policy · CNN · Daily Telegraph ∙ European Journal of International Law · Foreign Policy · Guardian · Hurriyet daily news · Independent · International Crisis Group · Middle East Eye · Middle East Institute · Middle East Monitor · Middle East Online · New York Times · Office of the United Nations Special Coordinator for the Middle East Peace Process · OHCHR- Human Rights Programme for the Middle East and Northern Africa Region · Securitycouncilreport.org · UN News Center ∙ UN Office on Drugs and Crime · United States Institute of Peace · Washington Post 1925 Geneva Protocol. [Online]. 1972. Opened for signature 17 June 1925. Entered into Force 8 February 1928. [Accessed 30 January 2016]. Available from: http://www.un.org/disarmament/WMD/Bio/1925GenevaProtocol.shtml Al Arabiya News, ISIS Controls an area the size of Britain: Syria Expert. [Online]. 28 November 2014. [Accessed 14 December 2015]. Available from: http://english.alarabiya.net/en/News/middleeast/2014/11/28/ISIS-controls-an-area-the-size-of-Britain-Syria-expert.html Al- Tamimi, A., The Evolution in Islamic State Administration: The Documentary Evidence. Terrorism Research Initiative. [Online]. 2015. 9(4). [Accessed 15 December 2015]. Available from: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/447/html Amnesty International. Yezidi women and girls face horrowing sexual violence. [Online]. 23 December 2014. [Accessed 25 December 2015]. Available from: https://www.amnesty.org/en/latest/news/2014/12/iraq-yezidi-women-and-girls-face-harrowing-sexualviolence/ Arms Trade Treaty. [Online]. 2013. ATT. Opened for signature 28 March 2013.Entered into Force 24 December 2014. [Accessed 30 January 2016]. Available from: http://www.un.org/disarmament/ATT/docs/ATT_text_(As_adopted_by_the_GA)-E.pdf Article 1, Montevideo Contention on the Rights and Duties of http://www.cfr.org/sovereignty/montevideo-convention-rights-duties-states/p15897 States, 1933 Bayah. The Oxford Dictionary of Islam. [Online dictionary]. Oxford University Press. 2004. BBC, Islamic State fighter estimate triples- CIA. [Online]. 2014. [Accessed 14 December 2015]. Available from: http://www.bbc.co.uk/news/world-middle-east-29169914 BBC, Profile: Abu Bakr al- Baghdadi. [Online]. 2015. [Accessed 7 December 2015]. Available from: http://www.bbc.co.uk/news/world-middle-east-27801676 BBC, Senior Iraqi Al-Qaeda leaders ‘killed’. [Online].2010. [Accessed 28 November 2015]. Available from: http://news.bbc.co.uk/1/hi/world/middle_east/8630213.stm Beaumont, P. Abu Bakr al- Baghdadi: the ISIS Chief with the Ambition to Overtake al- Qaida. The Guardian. [Online]. 12 June 2014. [Accessed 8 December 2015]. Available from: http://www.theguardian.com/world/2014/jun/12/baghdadi-abu-bakr-iraq-isis-mosul-jihad Burger J.M. and Morgan J., The ISIS Twitter Census: Defining and Describing the population of ISIS supporters on Twitter, The Brookings Project on the U.S. Relations with the Islamic World, ANALYSIS PAPER, March 2015, 20. [Date Accessed 17 December 2015], Available from: http://www.brookings.edu/~/media/research/files/papers/2015/03/isis-twitter-census-bergermorgan/isis_twitter_census_berger_morgan.pdf Burke J. 2014. Al-Qaeda: the true story of radical Islam. New York; London: I.B. Tauris. p.89. Bush, G. Statement on the Death of Abu Musab al-Zarqawi, [Online]. 2006. [Accessed 26 November 2015]. Available from: http://www.presidentialrhetoric.com/speeches/06.08.06.html Callimachi, R. ISIS Enshrines a Theology of Rape. The New York Times. [Online]. 13 August 2015. [Accessed 25 December 2015]. Available from: http://www.nytimes.com/2015/08/14/world/middleeast/isis-enshrines-a-theology-of-rape.html CNN Money. How ISIS makes its millions. [Online]. 1 April 2015. [Accessed 25 December 2015]. Available from: https://www.youtube.com/watch?v=0QVRUxALZIs Cockburn, P., The Jihadis Return, ISIS and the New Sunni Uprising. New York:OR Books LLC, 2014. Cohen, S.D. Remarks of Under Secretary for Terrorism and Financial Intelligence David S. Cohen at The Carnegie Endowment For International Peace, “Attacking ISIL’s Financial Foundation. U.S Department of the Treasury. [Online]. 23 December 2014. [Accessed 23 December 2015]. Available from: https://www.treasury.gov/press-center/press-releases/Pages/jl2672.aspx Comprehensive Nuclear- Test- Ban Treaty. [Online]. 1996. CTBT. Opened for signature 24 September 1996. It have not entered into force. [Accessed 30 January 2016]. Available from: http://www.nti.org/treaties-and-regimes/comprehensive-nuclear-test-ban-treaty-ctbt/ Convention on Nuclear Safety. [Online]. 1994. CNS. Opened for signature 20 September 1994. Entered into Force 24 October 1996. [Accessed 30 January 2016]. Available from: https://www.iaea.org/publications/documents/treaties/convention-nuclear-safety Convention on the Physical Protection of Nuclear Material. [Online]. 1979. Opened for signature 26 October 1979. Entered into Force 8 February 1987. [Accessed 30 January 2016]. Available from: https://www.iaea.org/Publications/Documents/Conventions/cppnm.html Convention on the Prohibition of the Development, Production and Stockpiling of Ba cteriological (Biological) and Toxin Weapons and on Their Destruction. [Online]. 1972, BTWC. Opened for signature 10 April 1972. Entered into Force 26 March 1975. [Accessed 30 January 2016]. Available from: http://www.opbw.org/convention/documents/btwctext.pdf Convention on the Prohibition of the Development, Production, Stockpiling and Use of Chemical Weapons and on Their Destruction. [Online].1993. CWC. Open for signature 13 January 1993. Entered into Force 29 April 1997. [Accessed 30 January 2016]. Available from: http://www.state.gov/t/avc/trty/127917.htm Costa, A., Terrorists to be judged by the International Criminal Law?. European Union Delegation to the United Nations. [Online]. 17 March 2005. [Accessed 19 December 2015]. Available from: http://euun.europa.eu/articles/en/article_4504_en.htm Crowcroft, O. ISIS: People traficking, smuggling and punitive taxes boost Islamic State economy. International Business Times. [Online]. 16 June 2015. Available from: http://www.ibtimes.co.uk/isispeople-trafficking-smuggling-punitive-taxes-boost-islamic-state-economy-1506473 Daragahi, B. Biggest bank robbery that ‘never happened ‘- $400m ISIS heist. Financial Times. [Online]. 17 July 2014. [Accessed 23 December 2015]. Available from: http://www.ft.com/intl/cms/s/0/0378d4f40c28-11e4-9080-00144feabdc0.html#axzz3v5trCIM9 Dash, A., Hezbollah - Who created it, why it was created, how it was created_ 1-3. [Online]. 2012. [Accessed 17 December 2015]. Available from: https://www.youtube.com/watch?v=MdPM5jhdIuo Dunham, W. & Rampton, R. US will not prosecute families for paying hostage ransom. Reuters. [Online]. 23 June 2015. [Accessed 25 December 2015]. Available from: http://www.reuters.com/article/us-usasecurity-hostages-idUSKBN0P31Q720150623 Engel, P., ISIS has found a huge moneymaking method that’s impervious to sanctions and air raids. Business Insider. [Online]. 2 December 2015. [Accessed 23 December 2015]. Available from: http://www.businessinsider.de/isis-taxation-extortion-system-2015-12?r=US&IR=T FATF. Financing of the Terrorist Organization Islamic State of Iraq and the Levant (ISIL). [Online]. 2015. [Accessed 20 December 2015]. Available from: http://www.fatfgafi.org/media/fatf/documents/reports/Financing-of-the-terrorist-organisation-ISIL.pdf Faulconbridge, G. & Saul, J. Islamic State oil is going to Assad, some to Turkey, U.S. Official says. Reuters. [Online]. 10 December 2015. [Accessed 23 December 2015]. Available from: http://www.reuters.com/article/us-mideast-crisis-syria-usa-oil-idUSKBN0TT2O120151210 Federal Bureau of Investigation, Definitions of Terrorism in the US Code. [Online]. no date. [Accessed 22 November 2015]. Available from: https://www.fbi.gov/about-us/investigate/terrorism/terrorism-definition Grivas N., Dark Web and ISIS, Mediterranean Center for Strategic Analysis and Intelligence, [Date Accessed 16 December 2015] Available from: http://eng.medintelligence.org/research/dark-web-and-isis/ Gunaratna, R. Inside Al Qaeda: the Global Network of Terror. New York: Columbia University Press. 2003. Habeck, M.R. Jihadist Strategies in the War on Terrorism. In: Pery, M., Negrin, H.E. ed. The Theory and Practice of Islamic Terrorism. New York: Palgrave macmillan, 2008 pp. 69-79. Henley J., Captagon: the amphetamine fuelling Syria’s civil war. The Guardian. [Online]. 13 January 2014. [Accessed 19 December 2015]. Available from: http://www.theguardian.com/world/shortcuts/2014/jan/13/captagon-amphetamine-syria-war-middle-east Hosken, A. Empire of Fear: Inside the Islamic State, London: Oneworld, 2015: p.83. Hubbard, B., Life in a jihadist Capital: Order with the Darker Side. The New York Times. [Online]. 23 July 2014. [Accessed 23 December 2015]. Available from: http://www.nytimes.com/2014/07/24/world/middleeast/islamic-state-controls-raqqasyria.html?hp&action=click&pgtype=Homepage&version=LedeSum&module=first-columnregion®ion=top-news&WT.nav=top-news&_r=1 Human Development Report, 1994, pp. http://hdr.undp.org/sites/default/files/reports/255/hdr_1994_en_complete_nostats.pdf 24-25, Humud, E.C., Pirog, R.,Rosen, L., Islamic State Financing and US Policy Approaches. Congressional Research Service. [Online]. 10 April 2015. [Accessed 20 December 2015]. Available from: https://www.fas.org/sgp/crs/terror/R43980.pdf India- Pakistan Agreement on Chemical Weapons. [Online]. 1992. Opened for signature 19 August 1992. Opened into Force 28 October 1997. [Accessed 30 January 2016]. Available from: http://www.nti.org/treaties-and-regimes/india-pakistan-agreement-on-chemical-weapons/ International Convention for the Suppression of Acts of Nuclear Terrorism. [Online]. 2005. Opened for signature 13 April 2005. Entry into force 7 July 2007. [Accessed 30 January 2016]. Available from: http://www.un.org/en/sc/ctc/docs/conventions/Conv13.pdf Knickmeyer, E. & Finer, J., Insurgent Leader Al- Zarqawi killed in Iraq, The Washington Post, [Online]. 2006. [Accessed 26 November 2015]. Available from: http://www.washingtonpost.com/wpdyn/content/article/2006/06/08/AR2006060800114.html Levitt, M. Sophisticated Finances That Could Trip Up ISIS. The Washington Institute. [Online]. 22 November 2015. [Accessed 23 December 2015]. Available from: http://www.washingtoninstitute.org/policy-analysis/view/sophisticated-finances-that-could-trip-up-isis Malm, S.,. How ISIS is funded by black- market oil trading, illegal drugs and internet cafes. The Daily Mail. [Online]. 22 February 2015. [Accessed 20 December 2015]. Available from: http://www.dailymail.co.uk/news/article-2964028/oil-drugs-internet-ISIS-funded.html Mapping Militant Organizations, The Islamic State. [Online]. 2002. [Accessed 24 November 2015]. Available from: http://web.stanford.edu/group/mappingmilitants/cgi-bin/groups/view/1 Masi, A. Turkey, Russia,Iraq and Syria: The Black Market Oil Trade that’s Fueling ISIS and Dividing the Terrorist Group’s Opponents. International Business Times. [Online]. 12 September 2015. [Accessed 22 December 2015]. Available from: http://www.ibtimes.com/turkey-russia-iraq-syria-black-market-oiltrade-thats-fueling-isis-dividing-terrorist-2217476 Mediterranean Center for Strategic Analysis and Intelligence. [Date Accessed 16 December 2015], Available from :http://eng.medintelligence.org/global-news/isis-cyber-caliphate-hacks-54000-twitteraccounts-and-posts-phone-numbers-of-heads-of-the-cia-and-fbi/ Non- Proliferation of Nuclear Weapons Treaty. [Online]. 1968. NPT. Opened for signature 12 June 1968. Entered into Force 5 March 1970. [Accessed 30 January 2016]. Available from: http://www.un.org/disarmament/WMD/Nuclear/NPTtext.shtml NTI: Building a Safer World. no date. Proposed Nuclear Weapons Convention (NWC). [Online]. [Accessed 30 January 2016]. Available from: http://www.nti.org/treaties-and-regimes/proposed-nuclearweapons-convention-nwc/ Packer, G., The Common Enemy. The New Yorker. [Online]. 25 August 2014. [Accessed 14 December 2015]. Available from: http://www.newyorker.com/magazine/2014/08/25/the-common-enemy Parkinson, J., US-Led Coalition Hitting ISIS ‘Harder than Ever’, Obama says. ABC News. [Online]. 14 December 2015. [Accessed 15 December 2015]. Available from: http://abcnews.go.com/Politics/us-ledcoalition-hitting-isis-harder-obama/story?id=35753628 Porter, T., Cocaine Fundind ISIS: Drug Smuggling Profits Islamic State- Linked Jihadists in North Africa. International Bussiness Times. [Online]. 20 November 2014. [Accessed 19 December 2015]. Available from: http://www.ibtimes.co.uk/cocaine-funding-isis-drug-smuggling-profits-islamic-statelinked-jihadists-north-africa-1475824 Radio Free Europe Radio Liberty, Foreign Fighter in Iraq and Syria: Where do they come from. [Online]. 201. [Accessed 17 December 2015]. Available from: http://www.rferl.org/contentinfographics/foreignfighters-syria-iraq-is-isis-isil-infographic/26584940.html RT. High Finance: ISIS generates up to $1 bn annually from trafficking Afghan heroin. [Online]. 6 March 2015. [Accessed 19 December 2015]. Available from: https://www.rt.com/news/238369-isis-drug-moneytrafficking/ Sabin, L. Abu Bakr Al- Baghdadi profile: The mysterious leader of ISIS- and why he is called the “invisible Sheikh”. INDEPENDENT. [Online]. 10 November 2014. [Accessed 8 December 2015]. Available from: http://www.independent.co.uk/news/world/middle-east/abu-bakr-al-baghdadi-profile-themysterious-leader-of-isis-and-why-he-is-called-the-invisible-sheikh-9849413.html Satti. B., Funding Terrorists, the Rise of ISIS. Security Intelligence. [Online]. 10 Octomber 2014. [Accessed 20 December 2015]. Available from: https://securityintelligence.com/funding-terrorists-therise-of-isis/ Saviano, R., The Role of Drug Trafficking and Money Laundering in Fighting ISIS. The New York Times. [Online]. 23 November 2015. [Accessed 19 December 2015]. Available from: http://www.nytimes.com/roomfordebate/2015/11/20/draining-isis-coffers/the-role-of-drug-traffickingand-money-laundering-in-fighting-isis Solomon, E. & Jones, S., ISIS Inc: Loot and taxes keep jihadi economy churning. The Financial Times. [Online]. 14 December 2015. [Accessed 23 December 2015]. Available from: http://www.ft.com/intl/cms/s/2/aee89a00-9ff1-11e5-beba-5e33e2b79e46.html#axzz3v5trCIM9 Solomon, E., Chazan, G., Jones, S. ISIS Inc: how oil fuels the jihadi terrorists. Financial Times [Online]. 14 October 2015. [Accessed 22 December 2015]. Available from: http://www.ft.com/cms/s/2/b8234932719b-11e5-ad6d-f4ed76f0900a.html#axzz3v5trCIM9 Spencer, R., Militant Islamist group in Syria orders Christians to pay protection tax. The Telegraph. [Online]. 27 February 2014. [Accessed 23 December 2015]. Available from: http://www.telegraph.co.uk/news/worldnews/middleeast/syria/10666257/Militant-Islamist-group-inSyria-orders-Christians-to-pay-protection-tax.html Stern, J. & Berger, J.M. ISIS: The State of Terror. London: William Collins, 2015. Strategic Arms Reduction Treaty. [Online]. 2010. New START. Opened for signature 8 April 2010. Entered into Force 5 February 2011. [Accessed 30 January 2016]. Available from: http://www.state.gov/documents/organization/140035.pdf Strategic Offensive Reductions Treaty. [Online]. 2002. SORT. Opened for signature 24 May 2002. Entry into Force 1 June 2003. [Accessed 30 January 2016]. Available from: http://www.nti.org/treaties-andregimes/strategic-offensive-reductions-treaty-sort/ Swanson, A. 12 Ways ISIS gets funding. World Economic Forum. [Online]. 23 November 2015. [Accessed 17 December 2015]. Available from: https://agenda.weforum.org/2015/11/12-ways-isis-getsfunding/?utm_content=buffer3bd14&utm_medium=social&utm_source=facebook.com&utm_campaign= buffer The National Archives, Terrorism Act 2000. [Online]. no date. [Accessed 22 November 2015]. Available from: http://www.legislation.gov.uk/ukpga/2000/11/contents The Sydney Morning Herald. Yazidi Bombing is Iraq’s deadliest. [Online]. 2007. [Accessed 26 November 2015]. Available from: http://www.smh.com.au/news/world/yazidi-bombing-is-iraqsdeadliest/2007/08/16/1186857683441.html The World Bank. [no date]. Data: Oil rents (% of GDP). [Online]. [Accessed 20 December 2015]. Available from: http://data.worldbank.org/indicator/NY.GDP.PETR.RT.ZS Thorndike, J., How ISIS is using Taxes to Build a Terrorist State. Forbes. [Online]. 18 August 2014. [Accessed 23 December 2015]. Available from: http://www.forbes.com/sites/taxanalysts/2014/08/18/how-isis-is-using-taxes-to-build-a-terrorist-state/ Treaty Banning Nuclear Tests in the Atmosphere, in Outer Space and Under Water. [Online]. 1963. PTBT. Opened for signature 5 August 1963. Entered into Force 10 October 1963. [Accessed 30 January 2016]. Available from: http://www.un.org/disarmament/WMD/Nuclear/pdf/Partial_Ban_Treaty.pdf U.S. Department of State, Country Reports on Terrorism. [Online]. no date. [Accessed 22 November 2015]. Available from: http://www.state.gov/j/ct/rls/crt/index.htm United Nations Security Council. Report S/2014/770: Sixteenth Report of the Analytical Support and Sanctions Monitoring Team submitted pursuant to resolution 2161 (2014) concerning Al- Qaeda and associated individuals and entities (29 October 2014). [Online]. 2014. [Accessed 25 December 2015]. Available from: http://www.un.org/ga/search/view_doc.asp?symbol=S/2014/770 United States. Congress. House. Permanent Select Committee on Intelligence. Al Qaeda: the many faces of an Islamic extremist threat: report of the U.S. House Permanent Committee on Intelligence, approved June 2006, together with additional and minority views, submitted September, 2006. United States: 2006. US Energy Information Administration. [no date]. International Energy Statistics. [Online]. [Accessed 20 December 2015]. Available from: http://www.eia.gov/cfapps/ipdbproject/IEDIndex3.cfm?tid=5&pid=57&aid=6 Weiss, M. & Hassan, H. ISIS: Inside the Army of Terror. New York: Regan Arts, 2015. pp.28-29. Zafirov, M., The Crisis in Iraq: Was the rise of ISIL a surprise?. AlJazeera. [Online]. 25 December 2014. [Accessed 16 December 2015]. Available from: http://www.aljazeera.com/indepth/opinion/2014/12/crisis-iraq-was-rise-isil-surp2014122592114375688.html