33.5 F
Washington D.C.
Saturday, January 28, 2023

Children at War: Foreign Child Recruits of the Islamic State

The group known as the Islamic State rose to international infamy on the back of a number of factors: the attraction of thousands (if not tens of thousands) of foreigners to its ranks, a campaign of grotesque violence perpetrated against a diverse array of individuals, military victories against western-trained security forces, and a wide-ranging media effort both on the ground and online. One strategy employed by the group that garnered a significant amount of media attention was its exploitation of children.  

This study is certainly not the first to focus on the Islamic State’s use of children. Indeed, scholars and practitioners have conducted a number of studies on how the Islamic State recruits and uses children for a variety of organizational purposes. These works build on a still larger literature that discusses the role of children in warfare around the world. And even within the Iraq and Syria landscape, the Islamic State is not the only entity that draws in and employs children. The contribution of this article is to add a data-driven picture of a subset of children within the Islamic State organization: those who traveled to the conflict zone either alone, with friends, or with family, to join the Islamic State as fighters. This contribution is enabled by an examination of Islamic State personnel documents for individuals entering the caliphate from 2013-2014.

Read more at the Counter Terrorism Center

Homeland Security Todayhttp://www.hstoday.us
The Government Technology & Services Coalition's Homeland Security Today (HSToday) is the premier news and information resource for the homeland security community, dedicated to elevating the discussions and insights that can support a safe and secure nation. A non-profit magazine and media platform, HSToday provides readers with the whole story, placing facts and comments in context to inform debate and drive realistic solutions to some of the nation’s most vexing security challenges.

Related Articles

- Advertisement -

Latest Articles