Working closely with the Departments of Justice and Defense, the State Department also mobilized the international community to more effectively use battlefield evidence in criminal investigations and prosecutions, including training partner countries on how to collect, store, and transfer battlefield evidence. This has enabled the United States to more readily share battlefield evidence with our foreign partners.
Our goal was to enable governments on the front lines to address the terrorist threats they face on their own, without needing to rely on the United States in the future.
The United States also leveraged multilateral organizations to advance key U. In September, the member Global Counterterrorism Forum GCTF adopted a new series of good practices to assist countries in meeting their watchlisting and screening obligations under UN Security Council Resolution , a landmark resolution spearheaded by the United States in The GCTF developed and adopted new guiding principles — and accompanying policy, legal, and technical tools — to counter terrorist use of unmanned aerial systems against civilian targets.
The United States engaged a host of international partners — from governments to local religious leaders to tech companies — to counter terrorist radicalization and recruitment, both online and offline, and to help develop messaging strategies and counter disinformation and propaganda. We supported international initiatives, including the Strong Cities Network, which trained more than municipal leaders from dozens of cities through multiple workshops and exchanges.
Approximately 20 cities adopted new policies and practices to counter terrorist radicalization, including the forming of the Task Force Against Hate, to specifically counter REMT. These efforts are only a snapshot of our ongoing work to protect the United States and our allies from the scourge of terrorism.
As we look to and beyond, the United States and our partners remain deeply committed to the global counterterrorism fight. In the countries listed below, significant human rights issues influenced the state of terrorist activity in the country and may have impeded effective counterterrorism policies and programs or supported causes and conditions for further violence. Such human rights issues included, among others: unlawful and arbitrary killings, including extrajudicial killings, forced disappearances, torture, and arbitrary detention all of the preceding by both government and nonstate actors ; harsh and life-threatening prison conditions; violence against and unjustified arrests of journalists; substantial interference with the rights of peaceful assembly and freedom of association; widespread and pervasive corruption; repression of religious freedom ad violence against religious minorities; and forced and bonded labor.
Please see the U. African countries and regional organizations sustained ongoing counterterrorism efforts against threats in East Africa, the Sahel, and the Lake Chad region while increasing emphasis on preventing the expansion of terrorist groups, affiliates, and associated organizations into new operating areas in West Africa and Southern Africa.
In East Africa, al-Shabaab retained safe haven, access to recruits and resources, and de facto control over large parts of Somalia through which it moves freely and launched external operations attacks in neighboring Kenya. The United States continued to support East African partners across the Horn of Africa in their efforts to build CT capacity, including in aviation and border security, advisory assistance for regional security forces, training and mentoring of law enforcement to manage crisis response and conduct investigations, and advancing criminal justice sector reforms.
East African partners undertook efforts to develop and expand regional cooperation mechanisms to interdict terrorist travel and other terrorism-related activities. The United States continued to provide advisors, intelligence, training, logistical support, and equipment to Lake Chad region countries and supported a wide range of stabilization efforts, such as defection, demobilization, disengagement, de-radicalization, and reintegration programming.
Continued attacks by BH and ISIS-WA have taken a heavy toll on the civilian population, especially in northeast Nigeria where attacks have displaced more than two million people and left roughly 10 million in need of humanitarian assistance.
The number of attacks in the Western Sahel region increased percent since Partner countries remain strong willed against terrorism but lack the means to contain or degrade the threat on a sustained basis. The G5 Sahel is not yet capable of disrupting the growing terrorist footprint across the Sahel but has potential as a coordination mechanism.
Terrorists routinely manipulated local communal conflicts and their leaders to support terrorist operations by assisting with long-standing claims against other groups. For example, in Nigeria, terrorists exploited the fighting between the Peuhl and Fulani ethnic groups, as well as the perennial farmer-herder violence over water and grazing areas, to recruit supporters and advance their political and operational interests.
Terrorists continued to carry out attacks on military outposts, kidnap western private citizens and humanitarian workers, attack churches, mosques and schools teaching western curricula, and assassinate civil servants and politicians. In Mali, the government has been unable to regain control of northern and central parts of the country.
Burkina Faso also experienced increased terrorism in its northern and eastern provinces and in the southern and western parts of the country.
There was also a notable uptick in violence in the tri-border region shared by Mali, Niger, and Burkina Faso, which affected all three countries. Terrorist activities increased in central and southern Africa in The group reportedly killed more civilians in Beni Territory as of December 13, with press reporting at least 32 additional deaths as of December The ISIS affiliate in Mozambique carried out numerous attacks in northern Mozambique, resulting in the deaths of an estimated civilians and the internal displacement of 60, people.
South Africa, however, saw a decrease in suspected terrorism-related incidents in , following an unusually high number of incidents in ISIS facilitation networks and cells that were first publicly acknowledged by the South African government in remained a threat. In , governments in East Asia and the Pacific continued working to strengthen legal frameworks, investigate and prosecute terrorism cases, increase regional cooperation and information sharing, and address critical border and aviation security gaps.
Regional cooperation between domestic law enforcement and judicial authorities among countries throughout Southeast Asia resulted in high numbers of terrorism-related arrests and, in many cases, successful prosecutions. On March 15, , a gunman carried out and live-streamed a terrorist attack on two mosques in Christchurch, New Zealand. Fifty-one people were killed, 50 more were injured, and the livestream was viewed around 4, times before being removed by technology companies.
Two months later, a group of government leaders and major online service providers adopted a non-binding pledge — the Christchurch Call to Action to Eliminate Terrorist and Violent Extremist Content Online Christchurch Call — to prevent terrorist use of the internet. The United States did not endorse the Christchurch Call due to policy and legal concerns, but it supports the overall goals and continues to work with international partners to counter the use of the internet for terrorist purposes.
This was illustrated by U. Multiple suicide bombings in the Philippines were a new phenomenon for the region. They included a complex attack against a military unit in Sulu, which involved the first Filipino suicide bomber, as well as a suicide attack at the Jolo Cathedral in Sulu, carried out by an Indonesian couple. Southeast Asian governments remained concerned about foreign terrorist fighters FTFs returning from Iraq or Syria and using their operational skills, connections, and experience to launch domestic attacks.
Authorities in East Asia and the Pacific actively participated in regional and international efforts to counter terrorism. Civil society organizations expressed concern that some governments in the region used terrorism as a pretext to target religious minorities and human rights activists.
The Chinese government has detained more than one million Uyghurs, ethnic Kazakhs, and other members of Muslim minority groups in internment camps in the Xinjiang Uyghur Autonomous Region, using counterterrorism as a pretext. Europe continued to face many ongoing terrorist threats and concerns in , including from U. Despite the total loss of its geographic territory, ISIS continued to project its influence by fomenting attacks against symbolic European targets and public spaces, and recruiting from European countries.
Most of these incidents occurred in Western Europe and Russia and involved simple plots with easily executable tactics, such as the use of common tools and vehicles to injure or kill pedestrians.
The United States urged European and other countries to bring back their citizens and prosecute, rehabilitate, and reintegrate them as appropriate, as the United States has done. However, with the notable exceptions of Ireland and Italy, Western European governments generally refused to repatriate and prosecute their citizens, despite having extensive resources and well developed judicial systems.
Many European countries also saw a rise in racially or ethnically motivated terrorist REMT activity and plotting, including against religious and other minorities. Several European countries took concrete steps to combat Iranian regime-backed terrorism in Albania, Denmark, and France all reduced diplomatic relations in response to Iran-backed plots to conduct assassinations or bombings in those countries.
Numerous European nations also continued to participate in the U. The LECG met twice in A deadly October attempted attack targeting a synagogue in Halle, Germany, demonstrated the continued danger posed by REMT actors who exploit the internet and social media to spread violent propaganda. A number of European governments expanded law enforcement and other government efforts to combat the threat posed by REMT individuals and groups.
European countries were integral to worldwide counterterrorism efforts in Despite setbacks, AQ remained resilient and actively sought to reconstitute its capabilities and maintain safe havens amid fragile political and security climates, particularly in Egypt, Libya, Syria, and Yemen. Additionally, the IRGC-QF and Hizballah continued to take advantage of the conflict to destabilize the region, including by providing weapons and training to Houthi militants who committed attacks against neighboring states.
Iran continued to use its IRGC-QF to advance its interests abroad, providing cover for intelligence operations, creating instability, and fomenting violence in the Middle East.
In April, the U. This was the first time the United States ever designated part of another government as an FTO, reflecting that the Iranian regime is unique in using terrorism as a basic tool of its statecraft. Iran also provided weapons and support to Shia militant groups in Iraq, to the Houthis in Yemen, and to the Taliban in Afghanistan. In an immediate response to that attack, the United States carried out precision strikes against five targets associated with KH in Iraq and Syria.
On December 31, Iran instigated an attack by demonstrators, including Iran-backed terrorists and militia members, on the U. Embassy in Baghdad, which resulted in damage to embassy property. Countries in the Gulf region continued to take important steps to combat terrorism.
Following the third U. The ongoing rift between Qatar on one side and Saudi Arabia, the United Arab Emirates, Bahrain, and Egypt on the other continued to strain regional cooperation and unity of effort, particularly on countering Iranian threats. Several terrorist groups, most notably Hizballah, continued to operate in Lebanon throughout the year. While Hizballah said it possessed enough PGMs for a confrontation with Israel, it denied missiles were being developed in Lebanon.
Israel also uncovered and destroyed multiple tunnels dug by Hizballah under the border into Israel that could have been used for terrorist attacks between December and January Although Palestinian terrorist groups in Gaza and the West Bank continued to threaten Israel, Israeli and Palestinian Authority security forces continued their coordination in the West Bank in an effort to mitigate violence.
In addition to continued terrorist activity in Afghanistan and Pakistan, South Asia in saw a volatile mix of insurgent attacks punctuated by major incidents of terrorism in the Indian state of Jammu and Kashmir now known as the Union Territory of Jammu and Kashmir and in Sri Lanka. A February 14 suicide bombing attack against an Indian paramilitary convoy in the Indian state of Jammu and Kashmir led to military hostilities and heightened tensions between India and Pakistan. While Pakistan continued to experience terrorist attacks, there were fewer attacks and casualties than in , continuing an overall decline.
Pakistan took modest steps in to counter terror financing and restrain India-focused militant groups from conducting large-scale attacks following the February attack on a security convoy in the Indian state of Jammu and Kashmir linked to Pakistan-based Jaish-e-Mohammed JeM.
Pakistan took action against some externally focused groups, including indicting Lashkar e-Tayyiba LeT founder Hafiz Saeed and associates in three separate terrorism financing cases.
However, Pakistan remained a safe harbor for other regionally focused terrorist groups. It allowed groups targeting Afghanistan, including the Afghan Taliban and affiliated HQN, as well as groups targeting India, including LeT and its affiliated front organizations, and Jaish-e-Mohammed JeM , to operate from its territory. Pakistan, however, did make some positive contributions to the Afghanistan peace process, such as encouraging Taliban reductions in violence.
Pakistan made some progress toward meeting the Action Plan requirements for the FATF, allowing it to avoid being blacklisted, but did not complete all Action Plan items in In August, India amended the Unlawful Activities Prevention Act of to authorize the designation of individuals as terrorists — which it did a month later by designating four terrorists, including the leaders of LeT and JeM.
In April, ISIS-inspired terrorists conducted sophisticated suicide bombing attacks against churches and hotels across Sri Lanka on Easter Sunday, resulting in hundreds of deaths. In Maldives, the Solih administration continues to make progress bolstering its CT efforts.
The Maldivian government also passed an amendment strengthening its Anti-Terrorism Act and designated 17 terrorist organizations in September. Central Asian countries remained concerned about the potential spillover of terrorism from Afghanistan, as well as the potential threat posed by the return of their citizens who traveled to Iraq or Syria to fight with terrorist groups, including ISIS.
Between January and June, the Kazakhstan government led the world in FTF repatriations by bringing back Kazakhstani fighters and family members from Syria, prosecuting those suspected of participating in terrorist activity abroad, and providing rehabilitation and reintegration services to the remainder.
Also in , the Uzbekistan government repatriated FTF family members from Iraq and Syria, mostly women and children, while the Tajikistan government repatriated In Colombia, an estimated 2, Revolutionary Armed Forces of Colombia FARC dissidents who never demobilized, left the peace process, or are new recruits, continued violent attacks, primarily to enable narcotics trafficking and other criminal activities.
While travel of FTFs from the Western Hemisphere to conflict zones was limited in , the potential return of these battle-tested terrorists remained a concern. Many Latin American countries have porous borders, limited law enforcement capabilities, and established smuggling routes. Commercial hubs in the TBA and Panama remained regional nodes for money laundering and vulnerable to terrorist financing.
Corruption, weak government institutions, insufficient interagency cooperation, weak or non-existent legislation, and a general lack of resources likewise remained obstacles to improving security. Nevertheless, some Western Hemisphere countries made significant progress in their counterterrorism efforts in and strengthened regional cooperation against terrorism. Cuba and Venezuela continued to provide permissive environments for terrorists.
In Venezuela, individuals linked to FARC dissidents who remain committed to terrorism notwithstanding the peace accord and the ELN, as well as Hizballah sympathizers, were present in the country. Nicolas Maduro has openly welcomed former FARC leaders who announced a return to terrorist activities. Members of the ELN who were in Havana to conduct peace talks with the Colombian government since also remained in Cuba.
Multiple fugitives who committed or supported acts of terrorism in the United States also continued to live freely in Cuba. Several countries in the region took steps in to designate Hizballah as a terrorist organization.
Argentina developed a new sanctions regime and used it to designate the entirety of Hizballah and individuals specifically connected to the and bombings of the Israeli Embassy and Argentine Israelite Mutual Association Jewish community center in Buenos Aires. Paraguay designated terrorist organizations and individuals, in particular targeting Hizballah, and is identifying possible sanctions against designated entities.
In Peru, the government continued efforts to retry Hizballah operative Muhammad Ghaleb Hamdar after a Peruvian court previously acquitted him of terrorism charges in Argentina hosted the Second Western Hemisphere Counterterrorism Ministerial in July, which included 18 participating countries.
In November , the RSM held its first experts meeting in Asuncion, Paraguay, bringing together officials from intelligence, law enforcement, border security, financial intelligence, financial regulatory, and foreign affairs agencies from the four member countries. By facilitating communication among points of contact designated by each member state, countries of the Western Hemisphere will be able to respond more effectively to terrorist threats.
This report provides a snapshot of events during relevant to countries designated as State Sponsors of Terrorism. It does not constitute a new announcement regarding such designations. To designate a country as a State Sponsor of Terrorism, the Secretary of State must determine that the government of such country has repeatedly provided support for acts of international terrorism. Once a country is designated, it remains a State Sponsor of Terrorism until the designation is rescinded in accordance with statutory criteria.
A wide range of sanctions is imposed as a result of a State Sponsor of Terrorism designation, including:. The use of chemical, biological, radiological, and nuclear CBRN materials and expertise remained a terrorist threat in The international community has established numerous international partnerships to counter the CBRN threat from terrorists and other nonstate actors.
The United States routinely provides technical and financial assistance and training to partner nations and international organizations to help strengthen their abilities to adequately protect and secure CBRN—applicable expertise, technologies, and material.
Today, the GP has expanded its membership to 30 countries and the European Union and remains a vital forum for countries to exchange information on national priorities for CBRN programmatic efforts worldwide and coordinate assistance for these efforts.
The United States continues to support the International Atomic Energy Agency IAEA Division of Nuclear Security, which helps member states develop the capacity to prevent, detect, and respond to threats of nuclear terrorism through the development of guidance as well as the provision of training, technical advice, peer reviews, and other advisory services. The Global Initiative to Combat Nuclear Terrorism GICNT is an international partnership of 89 nations and six official observer organizations dedicated to strengthening global capacity to prevent, detect, and respond to a nuclear terrorist incident.
In , partner nations hosted eight multilateral activities that raised awareness of the threat of terrorist use of nuclear and radioactive materials and provided opportunities for countries to share information, expertise, and best practices in a voluntary, nonbinding framework. In response to the threat of transnational terrorists conducting chemical weapons CW attacks using unrestricted, commercially available material, the GTR collaborated with security forces around the world to train law enforcement in partner countries to detect and prevent CW attacks against vulnerable transportation hubs, such as railways and subways.
To help partner countries intercept foreign terrorist fighters FTFs attempting to carry out WMD plots, the GTR continued to partner with international law enforcement organizations to augment an existing FTF law enforcement database with WMD—applicable information, and trained partner countries to help populate the database and use the information to interdict WMD— capable FTFs. The GTR also worked with personnel from Egypt, Jordan, Libya, Nigeria, the Philippines, and other countries to promote the adoption of security measures to prevent individuals or nonstate actors from acquiring potentially weaponizable chemical, biological, and nuclear material and technology.
As part of a core national security strategy to combat ISIS and other terrorist organizations, a key objective of the EXBS Program is to provide substantive knowledge, skills, and tools to prevent state and nonstate actors from acquiring WMD, conventional arms, and explosives or using those materials against U.
To achieve this objective, EXBS continued to train partner governments in the Middle Eastern and North African regions to detect, interdict, and counter the materials, technologies, and tactics that terrorists could use to carry out low-technology attacks on public transportation. Additionally, in , EXBS began development of curriculum for partner nation security forces to address threats posed by improvised threats.
EXBS partnered with CT and the interagency to engage with key partners on aviation security programming. This landmark decision helps guide the work of OPCW in deterring chemical weapons use and responding if they are used. The OPCW is considering options for further assistance to States Parties to help prevent the chemical weapons threat posed by nonstate actors and to aid contingency planning of States Parties in the event of a chemical weapons attack.
As defined by section f d of Title 22 of the U. In , terrorists used under-governed areas throughout Somalia as safe havens to plan, conduct, and facilitate operations within Somalia, including mass-casualty bombings in major urban areas, and attacks in neighboring countries. Somali law enforcement took several actions in that led to prosecutions of individuals suspected of terrorism-related activities.
Despite these critical gaps in its counterterrorism strategy, the Somali government remained a committed partner and vocal advocate for U. With the notable exception of targeted operations carried out by U.
As seen in previous years, al-Shabaab kept some of its safe haven in the Jubba River Valley as a primary base of operations for plotting and launching attacks. The group retained control of several towns throughout the Jubaland region, including Jilib and Kunyo Barow, and maintained operations in the Gedo region to exploit the porous Kenya-Somalia border and attack targets in Kenya.
The Kenyan government maintains a strong presence throughout the border region. In northern Somalia, ISIS-linked fighters used the limited safe haven they established in Puntland to launch small-scale attacks. Somalia remained heavily dependent on regional and international partners to support almost all major security functions throughout the country, making little progress on improving interagency coordination to limit terrorist transit through the country.
According to independent sources and non-governmental organizations engaged in demining activities on the ground, there was little cause for concern regarding the presence of WMD in Somalia. The Lake Chad Region. These safe havens are reduced from the territory BH controlled in Forces from Nigeria and other members of the Multinational Joint Task Force Benin, Cameroon, Chad, and Niger lack the capability to clear these safe havens, and they lack the capacity and resources to secure borders and hold and administer liberated territory.
No government in the Lake Chad Region was known to support or facilitate the proliferation or trafficking of WMD in or through its territory. The Trans-Sahara. In addition to asymmetric attacks, these groups perpetrated a series of large-scale conventional attacks on both patrols and fixed positions of regional Armed Forces.
JNIM successfully inserted itself into long-standing ethnic conflicts such as the Fulani herder versus Dogon farmer conflict over grazing land and water. In Burkina Faso, the government has failed to stem the tide of violence; attacks increased significantly in compared to The end of in Niger was marked by the largest casualty producing attack on the Nigerien Army to date. There has been a significant influx of Western aid as part of the effort to increase the capacity of the G-5 Sahel Joint Force, of which Burkina Faso is a member.
Niger and Chad continue to combat terrorism on their borders. Mauritania has not experienced a terrorist attack since No government in the region was known to support or facilitate the proliferation or trafficking of WMD in or through its territory, although the region remained prone to arms and munitions smuggling. The Government of Indonesia conducts monitoring and surveillance of suspected terrorist cells in its territory, but acknowledges that a lack of resources hinders its ability to monitor maritime and remote parts of Indonesia, including the Sulu and Sulawesi Seas.
The first trilateral land exercise occurred in North Kalimantan in July The workshop was the first under the auspices of the U. The Royal Malaysian Police special forces unit 69 Komando, which focuses on counterterrorism, search and rescue, and counterinsurgency, participated in a crisis response training exercise in August with U.
Indo-Pacific Command to build capacity on addressing extended hostage rescue scenarios. The Southern Philippines. The Philippine government closely tracked terrorist groups that continue to operate in some areas, particularly in the southern Philippines.
The government sustained aggressive military and law enforcement operations to deny safe haven to such groups and prevent the flow of FTFs through its territory. The government further deepened close counterterrorism cooperation with the United States, enhancing military and law enforcement efforts to address the full spectrum of terrorist threats, including from WMD.
The government welcomed support from the U. Defense Threat Reduction Agency in to help reduce the risk of nonstate actors acquiring or using improvised chemical weapons. International reconstruction assistance focused on Marawi continued, but concerns remained that efforts are not including local stakeholders and adjudicating competing land claims — both factors that terrorists can exploit.
Although the Philippine government possesses the political will to apply security measures against terrorist threats and has consistently partnered with the United States and other nations to build the capacity to do so, it struggles to apply a coordinated whole-of-government approach to prevent terrorism.
DRL, working with other Department offices as necessary, also ensured that all reports followed the same methodology and conformed to standard format and structure. Hoganson, Victor J. Senior Technical Editor : Janine Czarnecki. Share sensitive information only on official, secure websites. Share Share this page on:. Antony J. The report addresses situations and events in calendar year only.
Back to Top. South Africa. Democratic Republic of the Congo. South Sudan. Burkina Faso. Equatorial Guinea. Republic of the Congo. Cabo Verde. Central African Republic. Sierra Leone. Here, you can also download the financial statements of a listed Indian company in the excel sheet.
For downloading the financial statements, simple go to the screener website and search for your interested company in the search bar. Quick Note: You need to create a login account on Screener in order to download the excel report. Money control is probably one of the most popular financial websites in India for researching stocks and other financial instruments. To download the financial statements of the Indian company, go to the company page on the money control website.
A few other websites that you can visit to find the financial statements of Indian companies are Yahoo Finance , Equity Master , Marketsmojo , Marketsmojo etc. The exchanges are continuously working to improve their website and its UI is far better compared to what it used to be a few years ago. To download the financial statements, search for the company name in the top search bar and open the company page. You can find the annual results and reports in the financial section on the company page.
A notable problem with financial websites is that they have to adjust the financial data a little to customize their layout and hence the data shown on their website may not be exactly accurate. Not like the others. One of these things is not like the others. Request your free credit reports. Spot identity theft early.
Your credit reports matter. Credit reports may affect your mortgage rates, credit card approvals, apartment requests, or even your job application. Reviewing credit reports helps you catch signs of identity theft early. Federal law allows you to: Get a free copy of your credit report every 12 months from each credit reporting company. Ensure that the information on all of your credit reports is correct and up to date. Brought to you by. About this site Accessibility U.
0コメント