Jihad in Saudi Arabia: Violence and Pan-Islamism Since 1979 Thomas Hegghammer Index More Information

Total Page:16

File Type:pdf, Size:1020Kb

Jihad in Saudi Arabia: Violence and Pan-Islamism Since 1979 Thomas Hegghammer Index More Information Cambridge University Press 978-0-521-51858-1 - Jihad in Saudi Arabia: Violence and Pan-Islamism since 1979 Thomas Hegghammer Index More information Index Page numbers in bold refer to appendices and tables ABB head office 208 al-Anbari, Talal 139, 141, 176, 178 ABC News 168 al-Ansar (discussion forum) 123, 172 Abd al-Aziz, King 106 al-Ansari, Ayman 192 Abdallah, Crown Prince 76, 150, 195 al-Ansari, Mustafa 192 Abqaiq oil refinery operation 215–16 al-Ansari, Sami 192 Abu Ayub see al-Dukhayyil, Faysal al-Ansari, Samir 192 Abu Bakr mujahidin camp 27 al-Anzi, Abd al-Aziz 123, 172, 191, 213 Abu Ghraib prison 145 al-Aqsa intifada 80, 94, 111, 145 Abu Hajir see al-Muqrin, Abd al-Aziz fund 80 Abu Mus‘ab (aka Nasir bin Hamad al- al-Asra (website) 145 Fahd al-Humayyin) see al-Fahd, al-Awaji, Muhsin 218 Nasir al-Awda, Salman 4, 29, 121, 125, 146, Abu Sayyaf (aka Sheikh Fathi Muham- 148, 150 mad Habib) 55 global jihad and 71, 76, 83, 86, 87, 88, Abu Subay‘i (aka Walid al-Sinani) 88 90, 95, 97 Aden 100 al-Awfi, Salih 214 adventure 64, 137, 194 killing of 215 Afghanistan 16 al-Azhar University (Cairo) 39 al-Juhani and 227–8 al-Baghdadi, Khalid 190, 195 alumni networks 175 al-Bahr, Yasin (aka Suhayl al-Sahli) 55 cradle of jihadist movement 38–48 al-Bahri, Nasir 52, 55, 59, 61, 64 QAP recruitment and 189–93 al-Qaida and 107, 113, 117 as safe haven 108 global jihad and 72, 75 Saudi funding and 21–3, 24 al-Barrak, Abd al-Rahman 151–2 Saudi state and 24–30 al-Barrak, Nasir 71–2 US invasion 14, 110, 143–4, 161–6 al-Batin, Hafar 139 see also al-Qaida, recruitment to; al-battar (‘Sabre’) 170 training camps see also al-Uyayri, Yusuf afterlife, recruitment and 60–5 al-Dandani, Turki 160, 188, 192, 202 Ahl al-Hadith 46 Arabian Peninsula and 165, 174 –5, Airport camp 109 181, 185 Al al-Shaykh, Abd al-Aziz (Grand Mufti) killing of 203 158 al-Dawsary, Abd al-Rahman (aka Abu Al al-Shaykh, Sheikh Abd al-Latif 84, 87 Abd al-Aziz, aka Barbaros) 48–9, Al al-Shaykh family 2 50–1, 66, 74, 138 Al Awshan, Isa 124–5, 126, 127, 128, al-Din, Nur 66 172, 190, 191, 192, 221 al-Dukhayyil, Ahmad 134, 141, 157–8, Al Sa‘ud family 2, 65, 105, 201, 231 175, 202 al-Ablaj, Abu Muhammad 184 killing of 203 al-Adl, Sayf 165, 181, 182 QAP recruitment and 191, 192, 195, al-Adnani, Tamim 45 197 al-Albani, Sheikh Nasir al-Din 51, 83 al-Dukhayyil, Bandar 158, 192, 196 277 © in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-0-521-51858-1 - Jihad in Saudi Arabia: Violence and Pan-Islamism since 1979 Thomas Hegghammer Index More information Index278 al-Dukhayyil, Faysal (aka Abu Ayub) al-Janubi, Abu Hammam 67 134, 142, 158, 174 –5, 176, 192 al-Jarbu‘, Abd al-Aziz bin Salih bin al-Duwaysh, Abdallah 89 Sulayman 84, 87, 89, 90–1, 97, al-Fadl, Jamal 49 148 al-Fahd, Nasir 197, 220 al-Jaza’iri, Sheikh Abu Bakr 66 global jihad and 84, 86, 87–9, 90, 92, al-Jaza’iri, Nur al-Din 66 95, 97 al-Jazeera 79, 173, 209 post 9/11 and 148, 149–50, 151–5 Chechnya and 79 al-Faisal, Prince Turki 27, 29, 114, 115 effect 76–7 al-Faisal, Saud 25 al-Jihad (magazine) 46 al-Faqih, Hassan 195 al-Jubara, Abd al-Rahman 188, 192 al-Faqih, Mansur 195 al-Jubara, Muhammad 192 al-Farraj, Khalid 164, 192 al-Juhani, Fayiz 192 al-Farraj, Muhammad 88, 89 al-Juhani, Id 192 al-Faruq, Umar 55 al-Juhani, Khalid 168–70, 185, 227 al-Faruq camp 109, 119, 135, 164 al-Juwayr, Fahd 177, 192, 196, 214 al-Ghamidi, Abd al-Aziz (aka Abu Walid al-Kashmiri, Hazim 185 al-Ghamidi) 55 al-Kawhaji, Sheikh Usama Uqayl 159 al-Ghamidi, Ahmad 134 al-Khalidi, Ahmad 152–3, 159, 220 al-Ghamidi, Ali 188, 202 al-Khansa (magazine) 187 al-Ghamidi, Hamza 55 al-Kharrashi, Sulayman 89 al-Ghamidi, Sa’id 134 al-Khudayr, Ali 197, 220 al-Habashi, Muhammad 67 global jihad and 84, 86–7, 88–9, 90, al-Ha’ili, Abu al-Zubayr 50–1 91, 92, 97 al-Hajj, Khalid (aka Abu Hazim post-9/11 and 148, 150–5, 159 al-Sha‘ir) 168–9, 181, 183, 186, al-Khudayri, Abd al-Latif 191, 196 204, 206 al-Luhaybi, Sami 196 killing of 205 al-Madani, Abu Zubayr 50 al-Hajiri, Riyadh 71, 72 al-Madani, Sawad 64, 67 al-Hamad, Turki 92 al-Madar, Tawfiq 27 al-Harbi, Abd al-Rahman 197 al-Majalla (magazine) 184 al-Harbi, Ali 75, 136, 190, 192, 195, 196 al-Majati, Abd al-Karim 182, 186 al-Harbi, Ghanim 141 al-Makki, Abu Fadl (aka Madani al-Harbi, Ibrahim 67 al-Tayyib) 124 al-Harbi, Khalid (aka Abu Sulayman al-Makki, Abu Khalil 67 al-Makki) 51 al-Makki, Abu Sulayman (aka Khalid al-Harbi, Salih 138 al-Harbi) 51 al-Hawali, Safar 4, 29, 31–2, 53, 148, 150 al-Maliki, Hasan 91, 92 global jihad and 76, 83, 97 al-Maqdisi, Abu Muhammad 47, 72, 97, QAP failure and 218, 222 132 al-Hayyari, Yunus 186 al-Mas‘ari, Muhammad 85, 86 killing of 215 al-Masri, Abu Hafs 53 al-Hazmi, Nawaf 114 al-Mihdhar, Khalid 114 al-Hudhayf, Abdallah 71–2 al-Mi‘thim, Abd al-Aziz 71, 72 al-Humaydi, Sheikh Hamad 159, 191, al-Muhayyani, Mit‘ib 164, 174, 178, 192 195 al-Mujahid (magazine) 46 al-Humayyin, Fahd 87 al-Mujtama‘ (journal) 41 al-Humayyin, Nasir bin Hamad al-Fahd al-Munajjid, Muhammad 29 (aka Abu Mus‘ab) see al-Fahd, al-Munay‘, Abd al-Majid 191 Nasir al-Muqrin, Abd al-Aziz (aka Abu Hajir) al-Huzaymi, Turki 192 53, 54, 67, 71, 73 al-Islah (newsletter) 157 Arabian Peninsula and 175, 176, 177, al-Jama‘a al-Islamiyya 220 181, 185 al-Jama‘a al-Salafiyya al-Muhtasiba QAP failure and 206, 207, 208, 209, (JSM) 3 210, 224 © in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-0-521-51858-1 - Jihad in Saudi Arabia: Violence and Pan-Islamism since 1979 Thomas Hegghammer Index More information Index 279 QAP recruitment and 190, 191, 221 al-Rashudi, Muhammad 89 ‘al-Muqrin Squadron’ 211 al-Rass gunbattle 210, 213 al-Mutayri, Turki 164, 174, 175 al-Rayis, Ibrahim 71, 192, 197 al-Nahda party (Tajikistan) 54 killing of 205 al-Najdi, Abu Abdallah 213 al-Ruways prison 74, 75–6, 136, 195 al-Nashiri, Abd al-Rahim 55, 114, 116, al-Ruwayshid, Abdallah 93 121, 166–70 al-Sadat, President Anwar 39, 78 attacks in Saudi Arabia and 171, 183 al-Sahat (discussion forum) 172 network 228 al-Sahim, Muhammad 158 al-Nida (‘the call’) (website) 123, 146, al-Sahli, Suhayl (aka Yasin al-Bahr) 55 154, 171–2 al-Sa‘id, Khalid 71, 72 al-Nuqaydan, Mansur 91, 92 al-Sa‘idi, Fahd 128, 159, 164, 182 al-Qablan, Khalid 68 al-Salafyoon (website) 121, 123 al-Qahtani, Fahd 63 al-Sananiri, Kamal 39–40 al-Qahtani, Mish’al 67, 68 al-Sawat, Mubarak 76, 214 al-Qaida 99–128 al-Sayf, Abu Umar (aka Muhammad Afghan camps and 58 al-Tamimi) 55, 57, 68, 224 in Afghanistan 227–30 al-Sayyari, Nasir 158 al-Shu‘aybi school and 95 al-Shabanat, Abd al-Muhsin 176, 193 central, growth of 108–12 al-Shabanat, Badr 193 Chechnya and 57 al-Sha‘ir, Abu Hazim (aka Khalid al- decentralisation 161–6 Hajj) 168–9, 181, 183, 186, 204, failed 2002 offensives 166–70 206 global jihadists 99–108 killing of 205 growth of 234–7 al-Shammari, Nayif 139 in Iraq 224 al-Shamrani, Muslih 71, 72 jihad, launching 180–5 al-Shanqiti, Muhammad al-Amin 84 leaders 2, 9 al-Sharq al-Awsat 226 legitimacy, lack of 97 al-Sharqi, Abu Shahid 68 Riyadh bombing and 72 al-Shaybani, Abu Muhjin 114 in Saudi Arabia 10, 14, 98, 112–29, 156 al-Shibrin, Saud 71 scholars 147–55 al-Shifa incident 158, 197 security establishment sympathies 77 al-Shihri, Amir 190, 193 Tajikistan and 55 al-Shihri, Muhammad 140, 161, 185 targets 8 al-Shihri, Wa’il 140 see also QAP (al-Qaida on the Arabian al-Shihri, Walid 140 Peninsula) al-Shihri, Zaydan 193 al-Qaida, recruitment to 59, 130–42 al-Shishani, Murad 56 classical jihad, exploited 133–8 al-Shu‘aybi, Hamud al-Uqla 126, gatekeepers 138–42 148–50 unemployment and ‘Najdification’ global jihad and 84, 87, 88, 91, 92, 93, 130–3 94–6, 97 al-Qaradawi, Sheikh Yusuf 41 al-Shu‘aybi school 140, 148–55, 188 al-Qar‘awi, Abdallah 89 Internet and 172 al-Qarni, Musa 44 rise of 83–98 al-Qasim, Samih 92 al-Shurfa, Ahmad 138 al-Quds al-Arabi (newspaper) 61, 107, 183 al-Sinani, Walid (aka Abu Subay’i) 88 al-Rahman, Jamil (aka Maulavi Hussain) al-Subay‘i, Abdallah 197 29, 46 al-Subay‘i, Musa’id 197 al-Rahman, Sheikh Umar Abd 101, 113 al-Subayt, Khalid 80, 126–7, 128, 178, al-Rasheed, Madawi 5, 10, 231, 232 192, 195 al-Rashid, Abd al-Rahman 226 al-Sudayri, Maha 88 al-Rashid, Nasir 27 al-Surayhi, Abd al-Rahman 45 al-Rashud, Abdallah 155, 157–8, 191, al-Surayhi, Abd al-Rahman (Hasan) 67 195, 222 al-Suri, Abu Mus‘ab 110 © in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-0-521-51858-1 - Jihad in Saudi Arabia: Violence and Pan-Islamism since 1979 Thomas Hegghammer Index More information 280 Index al-Suwaylim, Muhammad 195 Arab nationalism 23 al-Suwaylim, Samir see Ibn Khattab Arabian Peninsula 112, 116 –17, 193 al-Suwaylimi, Ahmad 192 launch of jihad in 128, 186 al-Suwaylimi, Muhammad 192 sacred status of 30, 104–5 al-Tabuki, Abu Ahmad 113 see also ‘mujahidin on the Arabian al-Tamimi, Muhammad (aka Abu Umar Peninsula’ al-Sayf) 55, 57, 68, 224 Aramco 168 al-Tayyib, Madani (aka Abu Fadl al- Arnaout, Enaam 49 Makki) 124 arrests of sheikhs 203 al-Turabi, Hasan 33, 41, 87 Asfan training camp 176 al-Tuwayjiri, Sheikh Abdallah 90 assassinations 82 al-Ukaz (newspaper) 127 Ahmad Shah Mas‘ud 161–2 al-Ulwan, Sheikh Sulayman 121, 122, attempts 9, 101 125, 140, 159 QAP and 211 global jihad and 84, 89–90, 97 Riyadh 209 al-Umar, Nasir 76, 150 Westerners 209 al-Umari, Abd al-Aziz 122, 140 Atif, Muhammad 165 al-Utaybi, Sultan 191 Atta, Muhammad 130, 134 al-Utaybi, Abd al-Ilah 197 attacks, in USA 128 al-Utaybi, Juhayman 3–4, 38 Awda, Muhammad 53 al-Utaybi, Sa‘ud 71, 191, 192, 210, 213 Azzam, Abdallah 7, 14, 69, 94, al-Uyayri,
Recommended publications
  • Day Two of Military Judge Questioning 9/11 Accused About Self-Representation
    Public amnesty international USA Guantánamo: Day two of military judge questioning 9/11 accused about self-representation 11 July 2008 AI Index: AMR 51/077/2008 On 10 July 2008, military commission judge US Marine Colonel Ralph Kohlmann held further proceedings to question the men accused of orchestrating the attacks of 11 September 2001 about their decision to represent themselves at their forthcoming death penalty trial in the US Naval Base in Guantánamo Bay, Cuba. Amnesty International had an observer at the proceedings. The primary purpose of the hearings was to inquire of each of the accused individually about whether they had been intimidated before or during their arraignment on 5 June 2008 into making a choice to represent themselves, or whether this decision had been made knowingly and voluntarily. Judge Kohlmann had questioned two of the accused, ‘Ali ‘Abd al-‘Aziz ‘Ali (‘Ammar al Baluchi) and Mustafa al Hawsawi at individual sessions held on 9 July (see http://www.amnesty.org/en/library/info/AMR51/076/2008/en). He had scheduled sessions for the other three men, Khalid Sheikh Mohammed, Walid bin Attash and Ramzi bin al-Shibh on 10 July. In the event, Ramzi bin al-Shibh refused to come to his session. It seems unlikely that the military judge will question him again on the matter of legal representation until the issue of Ramzi bin al-Shibh’s mental competency is addressed at a hearing scheduled to take place next month (see http://www.amnesty.org/en/library/info/AMR51/074/2008/en). Both Khalid Sheikh Mohammed and Walid bin Attash denied that they had been intimidated or that any intimidation had taken place.
    [Show full text]
  • Observer Dispatch by Mary Ann Walker
    Interrogating the Interrogator at Guantánamo Bay GTMO OBSERVER PROGRAM FEBRUARY 5, 2020 By: Mary Ann Walker As part of the Pacific Council’s Guantánamo Bay Observer Program, I traveled to Guantánamo Bay, Cuba, in January 2020 to attend the 9/11 military pre-trial hearing of alleged plotter and mastermind Khalid Sheik Mohammad and four others charged with assisting in the 9/11 attacks: Walid bin Attash, Ramzi bin al-Shibh, Ali Abdul Aziz Ali, and Mustafa al-Hawsawi. Pretrial hearings have been ongoing in Guantánamo Bay since 2008. The trial itself is scheduled to begin in January 2021, nearly 20 years after the 9/11 attacks. I was among 13 NGO observers from numerous organizations. Media outlets including Al Jazeera, The Guardian, the Los Angeles Times, and The New York Times were also present in order to cover this historic hearing along with many family members of the 9/11 victims. It was an eye-opening experience to be an observer. Defense attorney for Ali Abdul Aziz Ali, James Connell, met with the NGOs and media the evening we arrived on January 18. He explained the current status of pretrial hearings and what we could expect in the days to come. Chief Defense Counsel General John Baker met with the NGOs on Martin Luther King, Jr., Day to give background on the upcoming trial and military commissions. At the start of the meeting, Baker commended Pacific Council on International Policy for its excellent work on the three amendments to the FY2018 defense bill allowing for transparent and fair military commission trials in Guantánamo Bay, which includes the broadcast of the trials via the internet.
    [Show full text]
  • ASD-Covert-Foreign-Money.Pdf
    overt C Foreign Covert Money Financial loopholes exploited by AUGUST 2020 authoritarians to fund political interference in democracies AUTHORS: Josh Rudolph and Thomas Morley © 2020 The Alliance for Securing Democracy Please direct inquiries to The Alliance for Securing Democracy at The German Marshall Fund of the United States 1700 18th Street, NW Washington, DC 20009 T 1 202 683 2650 E [email protected] This publication can be downloaded for free at https://securingdemocracy.gmfus.org/covert-foreign-money/. The views expressed in GMF publications and commentary are the views of the authors alone. Cover and map design: Kenny Nguyen Formatting design: Rachael Worthington Alliance for Securing Democracy The Alliance for Securing Democracy (ASD), a bipartisan initiative housed at the German Marshall Fund of the United States, develops comprehensive strategies to deter, defend against, and raise the costs on authoritarian efforts to undermine and interfere in democratic institutions. ASD brings together experts on disinformation, malign finance, emerging technologies, elections integrity, economic coercion, and cybersecurity, as well as regional experts, to collaborate across traditional stovepipes and develop cross-cutting frame- works. Authors Josh Rudolph Fellow for Malign Finance Thomas Morley Research Assistant Contents Executive Summary �������������������������������������������������������������������������������������������������������������������� 1 Introduction and Methodology ��������������������������������������������������������������������������������������������������
    [Show full text]
  • Trend Analysis the Israeli Unit 8200 an OSINT-Based Study CSS
    CSS CYBER DEFENSE PROJECT Trend Analysis The Israeli Unit 8200 An OSINT-based study Zürich, December 2019 Risk and Resilience Team Center for Security Studies (CSS), ETH Zürich Trend analysis: The Israeli Unit 8200 – An OSINT-based study Author: Sean Cordey © 2019 Center for Security Studies (CSS), ETH Zurich Contact: Center for Security Studies Haldeneggsteig 4 ETH Zurich CH-8092 Zurich Switzerland Tel.: +41-44-632 40 25 [email protected] www.css.ethz.ch Analysis prepared by: Center for Security Studies (CSS), ETH Zurich ETH-CSS project management: Tim Prior, Head of the Risk and Resilience Research Group, Myriam Dunn Cavelty, Deputy Head for Research and Teaching; Andreas Wenger, Director of the CSS Disclaimer: The opinions presented in this study exclusively reflect the authors’ views. Please cite as: Cordey, S. (2019). Trend Analysis: The Israeli Unit 8200 – An OSINT-based study. Center for Security Studies (CSS), ETH Zürich. 1 Trend analysis: The Israeli Unit 8200 – An OSINT-based study . Table of Contents 1 Introduction 4 2 Historical Background 5 2.1 Pre-independence intelligence units 5 2.2 Post-independence unit: former capabilities, missions, mandate and techniques 5 2.3 The Yom Kippur War and its consequences 6 3 Operational Background 8 3.1 Unit mandate, activities and capabilities 8 3.2 Attributed and alleged operations 8 3.3 International efforts and cooperation 9 4 Organizational and Cultural Background 10 4.1 Organizational structure 10 Structure and sub-units 10 Infrastructure 11 4.2 Selection and training process 12 Attractiveness and motivation 12 Screening process 12 Selection process 13 Training process 13 Service, reserve and alumni 14 4.3 Internal culture 14 5 Discussion and Analysis 16 5.1 Strengths 16 5.2 Weaknesses 17 6 Conclusion and Recommendations 18 7 Glossary 20 8 Abbreviations 20 9 Bibliography 21 2 Trend analysis: The Israeli Unit 8200 – An OSINT-based study selection tests comprise a psychometric test, rigorous Executive Summary interviews, and an education/skills test.
    [Show full text]
  • The Truth of the Capture of Adolf Eichmann (Pdf)
    6/28/2020 The Truth of the Capture of Adolf Eichmann » Mosaic THE TRUTH OF THE CAPTURE OF ADOLF EICHMANN https://mosaicmagazine.com/essay/history-ideas/2020/06/the-truth-of-the-capture-of-adolf-eichmann/ Sixty years ago, the infamous Nazi official was abducted in Argentina and brought to Israel. What really happened, what did Hollywood make up, and why? June 1, 2020 | Martin Kramer About the author: Martin Kramer teaches Middle Eastern history and served as founding president at Shalem College in Jerusalem, and is the Koret distinguished fellow at the Washington Institute for Near East Policy. Listen to this essay: Adolf Eichmann’s Argentinian ID, under the alias Ricardo Klement, found on him the night of his abduction. Yad Vashem. THE MOSAIC MONTHLY ESSAY • EPISODE 2 June: The Truth of the Capture of Adolf Eichmann 1x 00:00|60:58 Sixty years ago last month, on the evening of May 23, 1960, the Israeli prime minister David Ben-Gurion made a brief but dramatic announcement to a hastily-summoned session of the Knesset in Jerusalem: A short time ago, Israeli security services found one of the greatest of the Nazi war criminals, Adolf Eichmann, who was responsible, together with the Nazi leaders, for what they called “the final solution” of the Jewish question, that is, the extermination of six million of the Jews of Europe. Eichmann is already under arrest in Israel and will shortly be placed on trial in Israel under the terms of the law for the trial of Nazis and their collaborators. In the cabinet meeting immediately preceding this announcement, Ben-Gurion’s ministers had expressed their astonishment and curiosity.
    [Show full text]
  • Secrecy and Human Capital Management in US NSA and Israel Unit 8200
    LOOSE LIPS BUILD SHIPS? Secrecy and Human Capital Management in US NSA and Israel Unit 8200 A THESIS SUBMITTED TO THE INTERSCHOOL HONORS PROGRAM IN INTERNATIONAL SECURITY STUDIES CENTER FOR INTERNATIONAL SECURITY AND COOPERATION FREEMAN SPOGLI INSTITUTE FOR INTERNATIONAL STUDIES STANFORD UNIVERSITY By: Lisa Catherine Wallace June 2014 Advisors: Mariano-Florentino Cuéllar Colonel Joseph Felter Abstract ! How do intelligence organizations attract and make use of top talent? This paper approaches this question through a comparative case study of the labor ecosystems surrounding both the US’ National Security Agency and IDF’s signals intelligence branch, Unit 8200. As the cyber realm continues to assume a growing role in modern national security threat environments, intelligence organizations must grow and adapt to accommodate these new objectives. This inevitably involves the question of how to attract and make use of top talent in order to solve difficult and highly technical national security problems. Israel and the United States share similar national security interests, and both possess burgeoning and impressive high-technology clusters. This paper claims that a growing, public network of Unit 8200 and other Intelligence Corps alumni is extant in Israel’s high-technology sector. Furthermore, affiliation with Unit 8200 has a positive signaling and social capital value. By contrast, this paper argues that alumni from the NSA do not possess as strong of a signaling or social capital value in the US. This paper argues that the NSA is hindered by the ontology, secrecy, and culture of the organization itself, as well as US public understanding of national security organizations and cyber threats.
    [Show full text]
  • We Only Spy on Foreigners": the Myth of a Universal Right to Privacy and the Practice of Foreign Mass Surveillance
    Chicago Journal of International Law Volume 18 Number 2 Article 3 1-1-2018 "We Only Spy on Foreigners": The Myth of a Universal Right to Privacy and the Practice of Foreign Mass Surveillance Asaf Lubin Follow this and additional works at: https://chicagounbound.uchicago.edu/cjil Recommended Citation Lubin, Asaf (2018) ""We Only Spy on Foreigners": The Myth of a Universal Right to Privacy and the Practice of Foreign Mass Surveillance," Chicago Journal of International Law: Vol. 18: No. 2, Article 3. Available at: https://chicagounbound.uchicago.edu/cjil/vol18/iss2/3 This Article is brought to you for free and open access by Chicago Unbound. It has been accepted for inclusion in Chicago Journal of International Law by an authorized editor of Chicago Unbound. For more information, please contact [email protected]. “We Only Spy on Foreigners”: The Myth of a Universal Right to Privacy and the Practice of Foreign Mass Surveillance Asaf Lubin Abstract The digital age brought with it a new epoch in global political life, one neatly coined by Professor Philip Howard as the “pax technica.” In this new world order, government and industry are “tightly bound” in technological and security arrangements that serve to push forward an information and cyber revolution of unparalleled magnitude. While the rise of information technologies tells a miraculous story of triumph over the physical constraints that once shackled mankind, these very technologies are also the cause of grave concern. Intelligence agencies have been recently involved in the exercise of global indiscriminate surveillance, which purports to go beyond their limited territorial jurisdiction and sweep in “the telephone, internet, and location records of whole populations.” Today’s political leaders and corporate elites are increasingly engaged in these kinds of programs of bulk interception, collection, mining, analysis, dissemination, and exploitation of foreign communications data that are easily susceptible to gross abuse and impropriety.
    [Show full text]
  • Spy Culture and the Making of the Modern Intelligence Agency: from Richard Hannay to James Bond to Drone Warfare By
    Spy Culture and the Making of the Modern Intelligence Agency: From Richard Hannay to James Bond to Drone Warfare by Matthew A. Bellamy A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (English Language and Literature) in the University of Michigan 2018 Dissertation Committee: Associate Professor Susan Najita, Chair Professor Daniel Hack Professor Mika Lavaque-Manty Associate Professor Andrea Zemgulys Matthew A. Bellamy [email protected] ORCID iD: 0000-0001-6914-8116 © Matthew A. Bellamy 2018 DEDICATION This dissertation is dedicated to all my students, from those in Jacksonville, Florida to those in Port-au-Prince, Haiti and Ann Arbor, Michigan. It is also dedicated to the friends and mentors who have been with me over the seven years of my graduate career. Especially to Charity and Charisse. ii TABLE OF CONTENTS Dedication ii List of Figures v Abstract vi Chapter 1 Introduction: Espionage as the Loss of Agency 1 Methodology; or, Why Study Spy Fiction? 3 A Brief Overview of the Entwined Histories of Espionage as a Practice and Espionage as a Cultural Product 20 Chapter Outline: Chapters 2 and 3 31 Chapter Outline: Chapters 4, 5 and 6 40 Chapter 2 The Spy Agency as a Discursive Formation, Part 1: Conspiracy, Bureaucracy and the Espionage Mindset 52 The SPECTRE of the Many-Headed HYDRA: Conspiracy and the Public’s Experience of Spy Agencies 64 Writing in the Machine: Bureaucracy and Espionage 86 Chapter 3: The Spy Agency as a Discursive Formation, Part 2: Cruelty and Technophilia
    [Show full text]
  • H Subject: Fw: Sawers / Telegraph Articles
    UNCLASSIFIED U.S. Department of State Case No. F-2014-20439 Doc No. C05795070 Date: 02/13/2016 RELEASE IN PART B1,1.4(B),1.4(D),B6 From: H <[email protected] > Sent: Friday, July 13, 2012 1:46 AM To: '[email protected]' Subject: Re: Sawers / Telegraph articles Classified by DAS, A/GIS, DoS on 02/13/2016 — Class: Gobsmacking! CONFIDENTIAL — Reason: 1.4(B), 1.4(D) — Declassify on: 07/13/2032 From: Sullivan, Jacob 3 [mailto:[email protected]] Sent: Thursday, July 12, 2012 11:18 PM To: H Subject: Fw: Sawers / Telegraph articles See the article down the string. From: Sherman, Wendy R Sent: Thursday, July 12, 2012 09:25 PM To: Nuland, Victoria 3; Murad, Eshel William; Hammer, Michael A; Ventrell, Patrick H; Sullivan, Jacob 3; Einhorn, Robert 3; 'Benjamin_3._Rhodes <Benjamin_l_Rhodes B6 Cc: Grantham, Chris W; Lakhdhir, Kannala S Subject: Re: Sawers / Telegraph articles Yes, Chris Grantham on my staff sent me an Alert Iran that had this story. Most unfortunate on many levels to say the least. Where to begin... From: Nuland, Victoria J Sent: Thursday, July 12, 2012 09:08 PM To: Murad, Eshel William; Hammer, Michael A; Ventrell, Patrick H• Sullivan Jacob 3; Sherman, Wendy R; Einhorn, Robert 3; 'Benjamin J. Rhodes <Benjamin J._Rhodes B6 Subject: Fw: Sawers / Telegraph articles Fysa - this from my UK embassy contact. Sawers heads MI6. From: James.Barbour [mailto B6 Sent: Thursday, July 12, 2012 06:21 PM To: Nuland, Victoria 3 Cc: Toner, Mark C Subject: FW: Sawers / Telegraph articles Toria, 1.4(B) 1.4(D) B1 UNCLASSIFIED U.S.
    [Show full text]
  • S Black Agents Bang-And-Burner 14 “Bang and Burn” Jobs Involve Sabotage, Usually Through Demolitions Or Arson
    night’'s black agents Bang-and-Burner 14 “Bang and burn” jobs involve sabotage, usually through demolitions or arson. This skill set translates with unnerving ease to EOD (explosive ordnance disposal) and arson investigation. Bang- and-burners set and disarm everything from booby traps to car bombs to ship- scuttling charges. Specific Examples: IRA or ETA bomb- builder, Albanian mafia arsonist, Polish Army combat engineer, Special Branch bomb disposal expert. INVESTIGATIVE ABILITIES: Architecture 2, Chemistry 2, Criminology 1, Intimidation 1 GENERAL ABILITIES: Conceal 4, Explosive Devices 8, Infiltration 2, Mechanics 4 Black Bagger A “black bag job” is FBI slang for a breaking-and-entry intrusion, usually intended to copy (or steal) documents or plant bugs or wiretaps. British spies often call break-in artists “box men,” a term originating in Victorian criminal slang. By any name, it’s burglary. Specific Examples: Cat burglar in Naples, Bulgarian NIS officer INVESTIGATIVE ABILITIES: on the Riviera, Bundespolizei handling “renditions” for the CIA. Bureaucracy 1, Forgery 4, museum security specialist, INVESTIGATIVE ABILITIES: Bureaucracy Photography 1 DGSE or Mossad covert entry 2, Cop Talk 1, Criminology Alternates: Cryptography specialist, NSA contractor. 2, Urban Survival 1 GENERAL ABILITIES: Cover 6, INVESTIGATIVE ABILITIES: Data Alternates: Chemistry, Data Digital Intrusion 4, Disguise 2, Recovery 1, Electronic Surveillance 2, Recovery, Electronic Surveillance, Infiltration 4, Mechanics 2 Photography 2, Streetwise 1 Notice, Streetwise Alternates: Architecture, Notice GENERAL ABILITIES: Conceal 6, Cuckoo GENERAL ABILITIES: Conceal 2, Digital Disguise 2, Driving 4, Explosive The cuckoo lays its eggs in another bird’s Intrusion 2, Filch 6, Infiltration 8 Devices 2, Infiltration 2, Stability 2 nest, convincing the stranger to raise its Alternates: Preparedness Alternates: Digital Intrusion chicks.
    [Show full text]
  • SPECIAL REPORT ESPIONAGE November 12Th 2016 Shaken and Stirred
    SPECIAL REPORT ESPIONAGE November 12th 2016 Shaken and stirred 20161012_SR_ESPIONAGE_001.indd 1 27/10/2016 13:41 SPECIAL REPORT ESPIONAGE Shaken and stirred Intelligence services on both sides of the Atlantic have struggled to come to terms with new technology and a new mission. They are not done yet, writes Edward Carr IN THE SPRING thaw of 1992 a KGB archivist called Vasili Mitrokhin CONTENTS walked into the British embassy in Riga. Stashed at the bottom ofhis bag, beneath some sausages, were copies of Soviet intelligence files that he 5 Technology had smuggled out of Russia. Before the year was out MI6, Britain’s for- Tinker, tailor, hacker, spy eign-intelligence service, had spirited away Mitrokhin, his family and six large cases packed with KGB records which he had kept hidden in a milk 7 Governance Standard operating churn and some old trunks under the floor ofhis dacha. procedure The pages of “The Mitrokhin Archive”, eventually published in 1999, are steeped in vodka and betrayal. They tell the stories of notorious 8 Edward Snowden spies like Kim Philby, a British intelligence officer who defected to Russia You’re US government in 1963. And they exposed agents like Melita Norwood, who had quietly property worked for the KGB for 40 years from her home in south-east London, then shot to fame as a great-gran- 10 China and Russia Happenstance and enemy ny. Her unrelenting Marxist refus- action al to shop at Britain’s capitalist su- permarkets earned her the 12 How to do better headline: “The Spy Who Came in The solace of the law from the Co-op”.
    [Show full text]
  • This Tribunal Is Being Conducted at One One Two Local, Date Is 12 March 2007 on Board U.S
    UNCLASSIFIED Verbatim TranscriptofOpen Session CombatantStatusReview TribunalHearingfor ISN 10014 OPENING REPORTER: We are on the record . PRESIDENT: Remain seated and come to order. ProceedRecorder. RECORDER : This Tribunal is being conducted at one one two local, date is 12 March 2007 on board U.S. Naval Base Guantanamo Bay, Cuba . The following personnel are present: Captain [REDACTED] , United States Navy, President Lieutenant Colonel [REDACTED ), United States Marine Corps, Member Lieutenant Colonel [ REDACTED ], United States Air Force, Member Major [REDACTED ], United States Air Force, Personal Representative Mister [REDACTED ], Translator, Sergeant First Class [REDACTED ], United States Army, Reporter, Lieutenant [ REDACTED , States Navy, Recorder Captain REDACTED ]is the Judge Advocate member of the Tribunal. OATH SESSION 1 RECORDER : All Rise. PRESIDENT: The Recorder will be sworn . Do you, Lieutenant [ REDACTED] solemnly swear that you will faithfully perform the duties as Recorder assigned inthis Tribunal so help you God? RECORDER I do. PRESIDENT The Reporter will now be sworn . The Recorder will administer the oath . RECORDER: Do you Sergeant First Class [REDACTED swear or affirm that you will faithfully discharge your duties as Reporter assigned in this Tribunal so help youGod? REPORTER I do PRESIDENT: Translatorwill now be sworn. RECORDER: Do you swear or affirm that you will faithfully perform the duties of Translator in the case now in hearing so help you God? ISN # 10014 Enclosure (3) Page 1 of 10 UNCLASSIFIED UNCLASSIFIED TRANSLATOR: I do PRESIDENT: Take a briefrecessnowwhile the detaineeis broughtinto the room. RECORDER : The time is one one three local, the date is 12 March 2007 , the Tribunal is now in recess .
    [Show full text]