The evolution



Download 0.63 Mb.
Page1/15
Date19.10.2016
Size0.63 Mb.
#4442
  1   2   3   4   5   6   7   8   9   ...   15


THE EVOLUTION

OF JIHADISM
From Al Qaeda to Wider Movement

[Blurbs for back cover]
A STRATFOR BOOK
[TK: 65-word summary of book]
STRATFOR is a world leader in private global intelligence: political, economic, military and security. Utilizing a Web-based publishing platform, STRATFOR provides its members with in-depth analysis of important issues and events worldwide as well as rapid updates on developing events.
www.STRATFOR.com

STRATFOR


700 Lavaca Street, Suite 900

Austin, Texas 78701

Copyright © 2010 by STRATFOR

All rights reserved, including the right of reproduction

in whole or in part
Printed in the United States of America
The contents of this book originally appeared as analyses

on STRATFOR’s subscription Web site.

.

ISBN: [?]

EAN-13: [?]
Publisher: Grant Perry

Editor: Michael McCullar

Project Coordinator: Robert Inks

Designer: TJ Lensing

CONTENTS


Introduction x

A Note on Content x


CHAPTER 1: THE UNITED STATES
Geopolitical Diary: Fallon and Two Persistent Stalemates x

INTRODUCTION

Following the Sept. 11, 2001, attacks, the United States launched what it initially termed the “Global War on Terror” (GWOT). This offensive sought to apply the full force of all five of the levers of counterterrorism power (intelligence, military might, diplomacy, law enforcement and financial sanctions) against the global jihadist movement and its vanguard group, al Qaeda. While the GWOT has been renamed [what?] under the Obama administration, the offensive efforts that comprised it continue. For all practical purposes, the counterterrorism campaign of the Obama administration is the campaign begun by the Bush administration.

Over time, all military organizations adapt as they adopt new technologies, change organizational doctrines and employ new tactics on the battlefield. Experience, battlefield losses and successes — and the use of new technologies and tactics by the enemy — combine to help drive these changes. Clearly, there is a big difference between the U.S. military of today and the military that fought in Vietnam. Indeed, there is even a substantial difference between how the U.S. military is equipped and operates today and how it was equipped and operated when it invaded Iraq in March 2003. 

It should come as no surprise, then, that in the almost nine years that the United States and its allies have focused their counterterrorism efforts against the jihadist movement, the movement has changed and adapted in response to the pressure applied against it. This pressure has caused the al Qaeda organization — the military and ideological vanguard of the jihadist movement — to lose its sanctuary and infrastructure in Afghanistan, many of its operational leaders and a great deal of its financial support. Indeed, as an organization, al Qaeda today is a mere shell of what it was before the 9/11 attacks.

As pressure was being applied to the main al Qaeda group, regional or national militant groups in places like Iraq, the Sinai, Indonesia, Algeria and Somalia embraced the ideology of jihadism and sought to use al Qaeda’s brand name as a way to attract recruits and funding to their organizations. Because of this, as the core al Qaeda group (what we refer to as al Qaeda prime) was suffering losses, these regional affiliates, or franchises, came to eclipse al Qaeda prime as the primary military threat emanating from the global jihadist movement. These franchises have generally followed a pattern where they rise up, conduct some spectacular attacks, and then get struck down. We have seen this pattern replicated in Saudi Arabia, Indonesia and the Sinai, and now it is seemingly being replicated in Iraq and Algeria, where the al Qaeda franchises the Islamic State of Iraq and al Qaeda in the Islamic Maghreb appear to be on the ropes.

This trend toward the decentralization of jihadist military activity has continued as the leader of the al Qaeda franchise in Yemen, Nasir al-Wahayshi, has called for individual Muslims to embrace the ideology of jihadism and conduct simple attacks wherever they are. In essence, al-Wahayshi was encouraging such individuals to embrace the concept of leaderless resistance due to the heavy pressure being brought against al Qaeda prime and the franchises that has limited their ability to get jihadists to training camps in Pakistan and Yemen and has hampered their ability to conduct terrorist strikes in the West.  This call for leaderless resistance was echoed by al Qaeda prime in March 2010, when Adam Gadahn, an American-born spokesman for the group, praised Ft. Hood shooter Nidal Hassan and urged his audience to follow the example of Hassan and attack targets that are close and familiar. 

STRATFOR began to chronicle the decentralization of the jihadist movement in 2004, and this book is a collection of our best and most representative analyses of the topic since that time. Our forecasting and analysis has not always been well-received, however, especially when our take has not aligned with public opinion or government assessments. For example, our assessment of the jihadist movement directly contradicted the U.S. National Intelligence Estimate published on July 17, 2007 (see page XX), and we took a great deal of heat over that fact. Time, however, has vindicated us, and our assessment of al Qaeda in 2007 was shown to be the correct one.

While such a shift toward decentralization has presented problems for counterterrorism forces, it has also proved problematic for the jihadists. For one thing, decentralized “leaderless” operatives typically lack the degree of terrorist tradecraft associated with trained terrorist operatives. This means that their plots are frequently discovered before they can be launched, or the attacks are poorly planned and executed, resulting in failed attempts.

In the final analysis, the threat posed by jihadists has been mitigated by the efforts taken against al Qaeda prime and the al Qaeda franchises. However, as long as the ideology of jihadism survives, these organizations will be able to recruit new operatives and continue their struggle. This means that these organizations could regenerate if the pressure is taken off of them and they are given the opportunity to regroup and reorganize.  Indeed, for the United States and its allies, the risks are many if they shift their focus away from jihadists, as they have done before. 


STRATFOR

Austin, Texas

Aug. [?], 2010

A NOTE ON CONTENT

STRATFOR presents the following articles as they originally appeared on our subscription Web site, www.STRATFOR.com. These pieces represent some of our best analyses of the Islamist militant group al Qaeda since June 2004, organized under chapter headings and presented in the order in which they were published. Since most of the articles were written as individual analyses, there may be overlap from piece to piece and chapter to chapter, and some of the information may seem dated. Naturally, some of the observations herein are linked to a specific time or event that may be years removed from al Qaeda’s situation today. However, STRATFOR believes bringing these pieces together provides valuable insight and perspective on a significant and historic global phenomenon.

CHAPTER 1: [?]

Al Qaeda’s Western Recruits

June 24, 2004
Al Qaeda remains a dynamic organization that leverages local expertise and resources in surveilling, planning and carrying out operations. To that end, the group seeks indigenous operatives to carry out pre-strike surveillance and attacks in several nations. An examination of some of these Western recruits provides insights into al Qaeda’s methods of recruiting, coordinating, planning and deploying resources.

There are many suspected American and other Western al Qaeda facilitators, operatives and sympathizers. High-profile cases that prove especially insightful include those of:




  • Jose Padilla, an American known as the “Dirty Bomber.”




  • Richard Reid, a Briton known as the “Shoe Bomber.”



  • Jack Roche, Australia’s “Reluctant Militant,” who reportedly has ties to al Qaeda and Jemaah Islamiyah.

Drawing from the statements given to investigators, each of these cases has similarities and differences from the others — the most striking similarity being that they were all caught. Though a look at these three offers some insights into al Qaeda’s Western recruitment, it should not be assumed that these assessments include all of the group’s recruiting and training techniques. The very fact that these men were caught raises questions — and even suggests al Qaeda was fully cognizant of the potential for detection. The stories of those not yet caught could prove much more interesting and insightful.


Jose Padilla, the Dirty Bomber
Born in 1970 in New York, Padilla had a troubled childhood that led to gang involvement and run-ins with police in Chicago and Florida. In 1992, he was introduced to Islam — reportedly by his manager at a fast food restaurant in Florida — though some stories suggest that the introduction occurred while he was serving jail time. By 1993, Padilla had changed his name to Ibrahim and become involved with radical Islamists in the Ft. Lauderdale area.

In 1996, Padilla married and acquired a U.S. passport. Reports indicate that he and his wife lived in a gated community, despite neither having a job — suggesting that Padilla already was receiving some kind of stipend from the Islamic community. In 1998, he left his wife and traveled to Egypt. He stayed there for just more than a year, marrying an Egyptian woman before heading to Pakistan. Once again, he took a new name — Abdullah al-Muhajir (Abdullah the Immigrant).

While in Pakistan, Padilla met a Yemeni who introduced him to another al Qaeda recruiter. This acquaintance sponsored Padilla’s trip to Afghanistan for weapons training at a camp overseen by Abu Zubaida. There, he was given on-the-job training as a Taliban guard near Kabul — apparently a test of his loyalty. Afterward, Padilla was approached by Mohammed Atef, who began determining the Westerner’s commitment and possible use as an operative.

Padilla was chosen as a potential operative only after he had completed basic training in Afghanistan. This trend seems to follow that of most Western al Qaeda recruits. As will be seen with the case of Jack Roche, the direct recruitment of operatives in Western nations is difficult; waiting for disaffected or otherwise exploitable Westerners to make their way to al Qaeda is preferable.

What came next for Padilla appears to be another common trend in al Qaeda’s recruitment. He was sent to Pakistan, where he reported a lost passport and was issued a new one without stamps that tracked his previous travels. Padilla then went on an expense-paid trip back to Egypt to visit his wife — an obvious perk and attempt on al Qaeda’s part to continue the bond with the American al Qaeda recruit. Two months later, Padilla was back in Afghanistan to receive his first assignment: blowing up U.S. apartment buildings with a combination of natural gas leaks and detonators.

At this point, Padilla’s potential as an operative began to slip. He had a falling out with his assigned partner, Jafar al-Tayer. (Padilla later said that Jafar was probably an American.) After training for the operation, the two argued. Padilla then told his handlers that the operation was off, since he could not carry it out alone. This training occurred just before the Sept. 11 attacks in the United States. It is unclear whether the attacks affected the men’s decision to call off the gas explosion attacks.

Later in the year, as U.S. air strikes in Afghanistan began, Padilla fled to Pakistan. There, he and another militant attempted to sell the idea of detonating a nuclear bomb in America. The two told Abu Zubaida about instructions for building a nuclear device they had seen on the Internet. Abu Zubaida had doubts about this idea and assigned them to carry out the long-overdue apartment bombings instead. But by this time, it appears Padilla was no longer willing to listen.

The idea of detonating a nuclear weapon — or at least a radiological device — was presented to Khalid Sheikh Mohammed by Padilla in March 2002. Again, it was rejected in favor of the apartment attacks. After several rounds of discussion, al Qaeda gave Padilla and an associate each $20,000 and sent them on their way. Two months later, Padilla was arrested while entering the United States; Abu Zubaida — by then in custody — had informed investigators of his activities.

After turning down the more easily carried out apartment attacks, Padilla became useless as an al Qaeda operative. But as a red herring for U.S. security forces to spend resources and time on, he served a purpose. He also represented a worst-case scenario — a converted Muslim militant who did not fit the racial profiling designed to weed out possible al Qaeda operatives.
Richard Reid, the Shoe Bomber
The son of a Jamaican father and an English mother, Richard Reid was born and raised in a London suburb. Reid’s father — reportedly also a convert to Islam — spent much of his time in jail. By the mid 1990s, Reid had also embarked on a life of crime and was incarcerated for a series of muggings. While serving time in the Feltham young offenders’ institute, he was introduced to, and embraced Islam.

Like Padilla, Reid came from an essentially fatherless home, became a juvenile petty criminal and turned to Islam while serving time. Islam provided a sense of belonging and purpose for both men; however, their apparent lack of self-discipline also opened them up to the influence of radicals.

Reid — who changed his name to Abdel Rahim — joined the Brixton Mosque, which helped to rehabilitate former criminals. His devotion to studying drew him to more radical members of the Islamic community. Reid began accusing mosque members and leaders of deviating from the truth and accepting Western influences. Before being expelled from the mosque, he met up with fellow disaffected worshiper Zacarias Moussaoui.

In late 1998, Reid stopped attending Brixton and moved to Pakistan. He then began training in Afghanistan and traveled to several countries — including Egypt, Israel, Turkey, Belgium, the Netherlands and France. During these flights, Reid was allegedly scouting the security procedures of American airlines; he also visited radical and militant Islamist communities. While in Afghanistan, Reid trained in a special camp for solo martyrs, learning bomb making and methods of avoiding detection. One of his supervisors was Khalid Sheikh Mohammed.

Before departing from Paris in December 2001, Reid acquired a new passport free of stamps from his previous travels. Like Padilla, he claimed to have lost his original passport. Reid was detained briefly for questioning at the Paris airport Dec. 21 — the original date of his planned attack — but was allowed to fly the next day. He reportedly was unsuccessful in his attack only because the required fuses got wet in the rain.

Reid appeared to have better training than Padilla, who basically became a “blown agent” left on his own by al Qaeda. (If he had managed to pull off an attack, however, al Qaeda would not have complained.) Perhaps more importantly, Reid was more willing to die.

Despite these differences, Padilla and Reid followed a similar path to al Qaeda. Impressionable young men, they flirted with Islam in prison and gravitated toward those with the strongest convictions in their respective Islamic communities. Al Qaeda did not need to seek out these Western members. The group simply moved them in a natural progression through the training camps in Afghanistan to selection as operatives.
Jack Roche, Australia’s Reluctant Militant
Born in 1953 as Paul George Holland, Jack Roche’s case bears similarities and differences to those of Padilla and Reid. For one, he was much older upon his introduction to Islam. A native of Britain, Roche drifted to Germany and eventually to Australia, where he obtained citizenship in 1978. Though he had few if any problems with the law, Roche was a heavy drinker. He converted to Islam in 1993 as part of an effort to tackle his drinking problem.

As was the case with Padilla and Reid, Roche turned to Islam to fill a void and get on a more “correct” path. All three men proved susceptible to external influences in their newfound religion and lifestyle.

From 1993 to 1995, Roche lived in Indonesia, studying Islam and teaching English as a second language. He met Abdullah Sungkar — co-founder of Jemaah Islamiyah (JI) — while the latter was visiting a Sydney mosque in 1996. Roche then began to affiliate with the more radical Islamists and JI. In early 2000, he traveled to Afghanistan and joined the Taliban. Mohammad Atef and other senior al Qaeda members asked him to establish an al Qaeda cell in Australia, where he could stake out the Israeli Embassy and other potential targets.

The use and deployment of Roche then fell apart, apparently because of splits between and within JI and al Qaeda. Roche was sent to Malaysia in February 2000 to meet with Hambali, an operative for both al Qaeda and JI. Hambali told Roche to prepare for a trip to Afghanistan where he would meet a “sheikh.” Roche returned to Australia, flew back to Malaysia a month later, and then went on to Pakistan, where he was met by Khalid Sheikh Mohammed. In April, Roche went to Afghanistan, where he met Osama bin Laden and undertook a two-week course in explosives.

Roche’s relationship with JI seems to have accelerated al Qaeda’s decision to take him in as a potential operative and cell leader. He discussed possible targets inside Australia with al Qaeda leaders, including Mohammed Atef and Khalid Sheikh Mohammed. Roche was given more than $8,000 and was told to begin surveillance on the Israeli Embassy and other key Israeli diplomatic and economic targets. However, reports indicate his JI handlers were actually more interested in the Sydney Olympics.

After embarking on the surveillance work in June 2000, Roche became apprehensive about carrying out an actual operation; he was also experiencing little luck in recruiting new cell members. On July 14, Roche phoned the Australian Security Intelligence Organization (ASIO). He explained his connection with bin Laden and warned that a JI and al Qaeda cell existed in Australia. Roche called again five days later, after receiving no response to his first call.

Recognizing Roche’s growing reluctance, JI urged him Aug. 8 to carry on with the operation. Two days later, Roche again called the ASIO. Again, he received no response. A few days later, JI called off the attack plans. Roche was left on his own until his arrest more than two years later.

Though Roche’s mission was eventually called off, neither JI nor al Qaeda did anything — aside from issuing minor threats — to ensure he never talked. For an organization as security conscious as al Qaeda, this seems an anomaly. Perhaps the group wanted Roche to be caught as a means of spreading fear in Australia. On the other hand, al Qaeda might have had little concern over his capture; after all, ASIO failed to respond to his phone calls.


Common Denominators
The common denominators in these three cases are not socioeconomic conditions or age. Rather, they are a perceived need for belonging to something, a vulnerability and naivete that left the three men susceptible to radical teachings. Radical white hate groups and other cults also recruit members by tapping into these kinds of vulnerabilities.

Though many Westerners convert to Islam, only a small number of them are enticed by its radical teachings. A still smaller number actually act on these teachings, receiving training in places such as Pakistan, Afghanistan or Indonesia and transitioning from radicalism to militantism. Still fewer become al Qaeda operatives — a step that requires denouncing one’s own nation in favor of a broader ideology.

Al Qaeda's Communications Network

Aug. 11, 2004
The arrests of several suspected al Qaeda members and supporters in Pakistan, the United Kingdom, the United Arab Emirates and the southern United States offer a snapshot of a sliver of al Qaeda’s command, control and communications network.

Coupled with previous information gleaned from arrests, threats and successful attacks, it reveals an organization with both a highly controlling centralized core and a level of operational freedom for its regional and local commanders. Central to its effectiveness in turning deep strategic thinking at the core into tactical operations on the ground is a series of communication nodes — people prized not so much for their ability to plan, but for their skill with computers.

The communications nodes are reservoirs of information collected from far-flung operatives via e-mail or hand-delivered messages. The information is processed, stored and disseminated to other operatives or to the core al Qaeda leadership. Messages are delivered from the al Qaeda core down the chain of command to the regional and local field commanders. While there often are several intermediary couriers, the communications nodes are the central link between a strategic vision and a tactical reality.

Pakistan’s arrest of key communications node Mohammad Naeem Noor Khan on July 13 offered intelligence agencies a treasure-trove of insight not only into al Qaeda’s potential plans and surveillance methods, but also into the structure of at least part of its network. Khan’s computer carried al Qaeda surveillance reports and contact information for commanders — which Pakistani and U.S. intelligence agencies exploited by engaging Khan in an operation to flush out these disparate commanders.

Khan sent messages to locations around the world, saying he had new information from al Qaeda central and was waiting for replies. These probes into the system, monitored closely by Inter-Services Intelligence (ISI) and the CIA, led to the detentions of both Ahmed Khalfan Ghailani, a Tanzanian linked to the U.S. Embassy bombings in Africa, and to Abu Eisa al-Hindi, a regional militant commander in the United Kingdom and probably the United States. Further probes likely revealed clues about the communications paths and perhaps pointed to other regional or local commanders. However, the revelation of Khan’s arrest by U.S. politicians a day after the heightened terrorist alerts were issued for New York, New Jersey and Washington, D.C., quickly dried up the flow of information, frustrating the ISI, the Pakistani government and the CIA.

Khan provides an example of the kind of communications network al Qaeda has established — and, undoubtedly, several other Khans are out there. They do not necessarily know the names or whereabouts of the commanders, or of Osama bin Laden or other top al Qaeda officials, but are aware of the plans and orders being passed back and forth.

Given al Qaeda’s penchant for security and for redundancy of operations, there likely is overlap in the field commanders on the contact list of each of these communications nodes, which allows a steady flow of directions from the top and information and intelligence from the field even if one node is compromised. As a built-in security feature, al Qaeda field commanders and tactical operatives flee or go underground when their line of communication seems suspect or dries up. They do not strike with whatever plan they might have been plotting.

This reveals a certain level of central control and a lack of clarity by the tactical operatives about the exact nature of al Qaeda’s plans; they train for a certain type of operation, they survey certain areas, but the exact timing, location and coordination of several cells is done by a regional or local field commander. This is done is such a way that even if one militant or cell were broken, it would not necessarily jeopardize the entire operation.

This security feature also means that each person in the communications and command chain might know only the true identity of two or 10 other operatives. If one operative is interrogated, rather than giving up the whole network, he can provide only an e-mail address or the names of a few others — thus delaying the unraveling of a broader swath of the network. If these communications lines jump across continents while arrests take place, other links in that chain will be broken and new communications paths will be established.

Once a key arrest has been made public, or a series of arrests takes place, all other al Qaeda operatives with connections to that link in the network go underground, leaving investigators only a short time to round up a few others. That partly explains the sudden drop in detentions following the rapid roundup of operational cells in Pakistan and the United Kingdom.

The Pakistani cell broken by the information from Khan was nominally directed by Ahmed Khalfan Ghailani. Ghailani was one of the FBI’s most-wanted al Qaeda operatives, accused of being a key planner and facilitator in the 1998 U.S. Embassy attacks in Kenya and Tanzania. His high profile, however, left him out of the al Qaeda inner circle for planning — though he remains one of the most loyal to bin Laden. Instead, after a stint raising funds in Africa, Ghailani had lain low, taking advantage of the broad Islamist support network to move about and avoid capture.

Ghailani apparently had two more recent roles in Pakistan. First, he was senior adviser to local al Qaeda militants and operational commanders in the campaign against Pakistani President Gen. Pervez Musharraf and his regime. He also was as a key recruiter for al Qaeda members from Africa.

Abu Eisa al-Hindi, however, is a much more active operational commander, similar in role to Mohammad Atta, who coordinated the final stages of the Sept. 11 attacks. Al-Hindi was most recently based in the United Kingdom, but has traveled to the United States, and like Atta probably had operational control over several cells on both sides of the Atlantic. Al-Hindi coordinated and participated in the surveillance of key U.S. buildings, traveling to the United States at least once in 2001. Once the information was collected, the final surveillance dossiers would have been transmitted, through Khan, back to the core al Qaeda leadership, where a strategic assessment of the possible tactical targets could be conducted. Further surveillance — or attack planning — was then transmitted back through Khan or another communications node to al-Hindi.

Although al-Hindi’s Aug. 4 arrest also nabbed several suspected al Qaeda members in England, it thus far has failed to turn up any major operatives inside the United States. In fact, though he allegedly sent at least six messages to U.S.-based operatives or commanders during the flushing operation, none has led to U.S. arrests, though a few people might now be under surveillance. Once Khan’s arrest became public knowledge, these operatives and commanders undoubtedly dropped off the radar screen, and intelligence officials have said the general background “chatter” of al Qaeda members fell precipitously with word of Khan’s detention.

Given that al Qaeda operatives have entered the United States at least a year in advance of any potential attack, the fact that this particular communications link has been broken does not necessarily preclude an operation already in its final stages. Atta, for example, entered the United States on June 3, 2000, and exited and re-entered the country several times, meeting with other al Qaeda operatives all over the world. Officials know Khan was in contact with several people in the United States and around the world — but their identities and exact locations remain unknown.

Al Qaeda almost definitely has dozens of “sleeper agents” inside the United States — they probably have been in the country for years, waiting to be called up. Only when a cell leader moves into the country and begins contacting these sleepers will they learn of their mission and its details. It might never be known for sure whether al-Hindi’s arrest has thwarted a major operation.

Ultimately, Khan’s detention has offered useful insights into the internal workings of al Qaeda. First, there are innumerable layers of command, control and communication inside al Qaeda, obfuscating the true origin and end-point of messages and concealing the identities of operatives. There are lowest-level, grunt-work operatives, mid-level directors and senior planners. There also are fund-raisers, communications people and deliverymen who only carry messages.

Second, the sender almost never delivers Al Qaeda messages to the end recipient. A piece of paper written in code could travel from Lahore, Pakistan, to UAE to Britain to the United States, carried by a different person on each leg. Surveillance done by an operative at a Las Vegas casino might be e-mailed to an operative in Nigeria, who forwards it to an account based in Yemen, who forwards it to an account in Pakistan. Again, the purpose is to conceal and, in case of detection or penetration, secure the network.

But it also means al Qaeda is rather reliant on its key communications nodes for rapid and efficient dissemination of information and orders. The detection and disabling of these nodes, even without a subsequent operation to flush out their contacts, can cause a serious disruption in al Qaeda’s capabilities. With the current operating paradigm being to go underground if a breach in the network is believed, the capture of communications people might be the most effective way of undermining al Qaeda’s operational capabilities — shy of the capture of bin Laden himself.

Net Assessment: The Jihadism Movement



Nov. 27, 2004
In the course of relatively few years, jihadism has burgeoned from a low-key movement seeking the ouster of corrupt regimes in the Muslim world, into a global phenomenon that seeks to eradicate Western influence from that world. Though the movement is encapsulated in the minds of the public by the person of Osama bin Laden, it is important to understand that the phenomenon is not restricted to a particular group or brand of groups, but rather is a broad ideological movement to which many disparate groups — separated by geography, individual motivations and even immediate political goals — may belong.

For our purposes, jihadism is defined as an ideology espoused by a fringe minority of various extremist Muslim groups, all operating on the periphery of the Islamist political spectrum. The movement has appropriated the notion of jihad (“righteous struggle”) in calling for the use of force — against either military or civilian targets — by non-state actors whose ultimate objective is to establish an Islamic state.

The movement, which has been propelled by a number of events during the course of the past half-century, today is being driven forward chiefly by two factors: the continued decentralization of al Qaeda and the U.S. occupation of Iraq.



Download 0.63 Mb.

Share with your friends:
  1   2   3   4   5   6   7   8   9   ...   15




The database is protected by copyright ©ua.originaldll.com 2024
send message

    Main page