Moroccan Islamic Combatant Group and Homeland Security Policy Report

Exclusively available on Available only on IvyPanda® Made by Human No AI

Introduction

Foreign groups and organizations that are determined by the Secretary of State in the USA (in accordance with section 219 of the Immigration and Nationality Act (INA) as amended), are termed Foreign Terrorist Organizations. Labeling and analyzing identified FTOs is crucial to anticipating, managing, and resolving terrorist activities. Designation of a group as an FTO can curb their ability to function effectively, a form of national “peer pressure”. One such FTO is the

Moroccan Islamic Combatant Group (GICM), or as pronounced in Moroccan, Groupe Islamique Combattant Morrocain (GICM).

Group ideology

The founding philosophy appears to have a two-pronged approach; commitment to the creation of an Islamic State in Morocco; and subjugating the west. This Moroccan organization emerged in the 1990s from the split of another domestic FTO: Shabiba Islamiya. The exact date of establishment of the organization is unknown. Most members appear to be mujahadin who had fought in the Soviet-Afghan war.

Targeting

Members tend to target Moroccan and Spanish citizens. Dense, urban, central areas, such as Madrid (2007 attack) and Casablanca (2003 attack), are target characteristics. Hence, public places and public transport are primary target locations.

Tactics

Suicide bombing appears to be the preferred modus operandi. Working with other extremist groups in North Africa, GICM also traffic in weapons and trafficking of falsified documents.

Capability

Claims have been made of GICM sleeper cells in Britain, Belgium, France, Italy, and Canada (Keating, 2004). Ultimately, their strength is unknown (Federation of American Scientists [FAS], 2007). Bases of operation in Afghanistan; Belgium; Denmark; Egypt; France; Morocco; Spain; Turkey; and the United Kingdom are linked to al-Qaeda as allies and the two groups share members (MIPT Terrorism Knowledge Base, 2007).

Overall goals

GCIM aims to create Islamic State in Morocco and supports al Qaeda’s war against the West. Actively a jihadi movement, it is evident that the group has international goals. Consequently, the U.S. has frozen the organization’s assets under EO 13224 (as determined by the USA.

Profile of the organization

Overall the group remains a mystery to investigators. Emerging in the early 1990s, no definitive leader; although recently Mohamed Guerbouzi was considered to be the leader. He is being extradited from the UK to Morocco to serve a 20-year jail sentence.

Analysis of attacks

On March 11, 2004, 200 people were killed and 1 500 injured when 10 suicide bombers triggered explosions in the metro trains during Madrid’s peak hour.

Statements or propaganda released by the group

Communiqués criticizing the Moroccan government have been given. Active support of al-Qaeda’s terrorist aims against the west implicitly indicates their intentions as they rarely actually release statements or propaganda.

Analysis

Following World War II it was clear to the USA government that military and public code breakers and code makers needed to be integrated in order to maintain the nation’s security in a coordinated manner (National Security Agency [NSA], 2007). Foreign Intelligence Surveillance Act, 1978 (FISA), ensured a court order was needed to eavesdrop on USA citizens. In 2006, a former NSA director, Bobby Ray Inman, criticized the Bush administration for continuing to plant domestic wiretaps without warrants (Berkowitz & Goodman, 1991). Inman emphasized that he would have ignored this Act for an emergency short-term crisis, such as 9/11. However, the five-year continuing practice by the NSA was questionable.

Although no bases or sleeper cells appear to be in the USA, given the connections with al-Qaida there should be a concern as to how to monitor terrorist activity domestically with minimal infringement of citizen rights, needs, and expectations. Ongoing public debate and discourse drawing on the practices and insights of other nations are necessary.

References

Berkowitz, F. & Goodman, D. (1991)/ Impediments to effective counterintelligence and counterterrorism. Conference on Counterintelligence: Reform for a Critical National Capability, McCormick Tribune Foundation and Institute of World Politics, Wheaton, Illinois.

Federal American Scientists [FAS] (2007) Moroccan Islamic Combatant Group (GICM). Web.

Keating, B. (2004) In the Spotlight: Moroccan Combatant Group (GICM). Web.

MIPT Terrorism Knowledge Base (2007) Moroccan Islamic Combatant Group. Web.

National Security Agency (NSA) (2007). Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2021, September 3). Moroccan Islamic Combatant Group and Homeland Security Policy. https://ivypanda.com/essays/moroccan-islamic-combatant-group-and-homeland-security-policy/

Work Cited

"Moroccan Islamic Combatant Group and Homeland Security Policy." IvyPanda, 3 Sept. 2021, ivypanda.com/essays/moroccan-islamic-combatant-group-and-homeland-security-policy/.

References

IvyPanda. (2021) 'Moroccan Islamic Combatant Group and Homeland Security Policy'. 3 September.

References

IvyPanda. 2021. "Moroccan Islamic Combatant Group and Homeland Security Policy." September 3, 2021. https://ivypanda.com/essays/moroccan-islamic-combatant-group-and-homeland-security-policy/.

1. IvyPanda. "Moroccan Islamic Combatant Group and Homeland Security Policy." September 3, 2021. https://ivypanda.com/essays/moroccan-islamic-combatant-group-and-homeland-security-policy/.


Bibliography


IvyPanda. "Moroccan Islamic Combatant Group and Homeland Security Policy." September 3, 2021. https://ivypanda.com/essays/moroccan-islamic-combatant-group-and-homeland-security-policy/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1