Strongmen and State Authority: a State- In- Society Approach to Understanding the Presence of Terrorist Sanctuaries

Total Page:16

File Type:pdf, Size:1020Kb

Strongmen and State Authority: a State- In- Society Approach to Understanding the Presence of Terrorist Sanctuaries STRONGMEN AND STATE AUTHORITY: A STATE- IN- SOCIETY APPROACH TO UNDERSTANDING THE PRESENCE OF TERRORIST SANCTUARIES by MELIA T. PFANNENSTIEL B.S., Central Methodist University, 2006 M.A., Kansas State University, 2008 AN ABSTRACT OF A DISSERTATION submitted in partial fulfillment of the requirements for the degree DOCTOR OF PHILOSOPHY Department of Security Studies College of Arts and Sciences KANSAS STATE UNIVERSITY Manhattan, Kansas 2015 Abstract The goal of this dissertation is two-fold. First, is to investigate the relationship between the consequences of state failure and terrorist sanctuaries, which is the prevailing explanation in extant literature. Post 9/11 United States counterterrorism policy has focused on the role of the state in providing safe haven or sanctuary to transnational terrorist organizations. However, anecdotal evidence suggests that both weak and strong states host terrorist sanctuaries. Thus, no clear explanation for why transnational terrorist sanctuaries are in some weak and strong states but not present in others currently exists. Second, this dissertation seeks to fill this gap by adopting Migdal’s (1988) state-society interaction approach to explain the presence of terrorist sanctuaries. This dissertation hypothesizes that the role of society’s structure and societal strongmen’s interactions with the state are an important determinant in whether or not transnational terrorist organizations will seek to establish safe haven within a given territory. Sageman’s (2008) hub and node approach on the operational capacities of transnational terrorist sanctuary networks helps to explain differences in types of sanctuaries. Using a newly constructed dataset on terrorist sanctuaries for quantitative analysis and qualitative analysis through case studies, this dissertation intends to show that the presence of terrorist sanctuaries in both weak and strong states can be understood through four state-society interaction typologies. The implications of this study are relevant for policymakers seeking to understand and counter the enduring threat of transnational terrorism across the globe. STRONGMEN AND STATE AUTHORITY: A STATE- IN- SOCIETY APPROACH TO UNDERSTANDING THE PRESENCE OF TERRORIST SANCTUARIES by MELIA T. PFANNENSTIEL B.S., Central Methodist University, 2006 M.A., Kansas State University, 2008 A DISSERTATION submitted in partial fulfillment of the requirements for the degree DOCTOR OF PHILOSOPHY Department of Security Studies College of Arts and Sciences KANSAS STATE UNIVERSITY Manhattan, Kansas 2015 Approved by: Major Professor Emizet Kisangani, PhD Copyright MELIA T. PFANNENSTIEL 2015 Abstract The goal of this dissertation is two-fold. First, is to investigate the relationship between the consequences of state failure and terrorist sanctuaries, which is the prevailing explanation in extant literature. Post 9/11 United States counterterrorism policy has focused on the role of the state in providing safe haven or sanctuary to transnational terrorist organizations. However, anecdotal evidence suggests that both weak and strong states host terrorist sanctuaries. Thus, no clear explanation for why transnational terrorist sanctuaries are in some weak and strong states but not present in others currently exists. Second, this dissertation seeks to fill this gap by adopting Migdal’s (1988) state-society interaction approach to explain the presence of terrorist sanctuaries. This dissertation hypothesizes that the role of society’s structure and societal strongmen’s interactions with the state are an important determinant in whether or not transnational terrorist organizations will seek to establish safe haven within a given territory. Sageman’s (2008) hub and node approach on the operational capacities of transnational terrorist sanctuary networks helps to explain differences in types of sanctuaries. Using a newly constructed dataset on terrorist sanctuaries for quantitative analysis and qualitative analysis through case studies, this dissertation intends to show that the presence of terrorist sanctuaries in both weak and strong states can be understood through four state-society interaction typologies. The implications of this study are relevant for policymakers seeking to understand and counter the enduring threat of transnational terrorism across the globe. Table of Contents List of Figures ................................................................................................................................ ix List of Tables .................................................................................................................................. x Acknowledgements ........................................................................................................................ xi Dedication ..................................................................................................................................... xii Chapter 1 - Introduction .................................................................................................................. 1 1.1 The Question ......................................................................................................................... 1 1.2 The Argument ....................................................................................................................... 3 1.3 Scope and Significance of the Study .................................................................................... 5 1.4 Plan for the Dissertation ....................................................................................................... 9 Chapter 2 - Literature Review ....................................................................................................... 11 2.1 Conceptual Issues: Terrorism and Terrorist Sanctuaries .................................................... 11 2.2 Literature Review: Terrorist Sanctuaries ............................................................................ 15 2.2.1 State Failure and Terrorism ......................................................................................... 16 2.2.2 Strong States and Terrorism ......................................................................................... 23 2.2.3 Capacities of Terrorist Sanctuaries .............................................................................. 25 2.2.4 A Critical Overview of Extant Literature .................................................................... 27 Chapter 3 - Theoretical Development ........................................................................................... 31 3.1 State-Society Interactions and Sanctuaries ......................................................................... 31 3.1.1 Strong State, Strong Society: Polyarchical Polity ........................................................ 38 3.1.2 Strong State, Weak Society: Pyramidal Polity ............................................................ 41 3.1.3 Weak State, Strong Society: Diffused Polity ............................................................... 47 3.1.4 Weak State, Weak Society: Anarchical Polity ............................................................. 50 Chapter 4 - Quantitative Methods ................................................................................................. 54 4.1 Research Design and Methodology .................................................................................... 54 4.1.1 Operational definitions ................................................................................................. 54 a. Dependent variable........................................................................................................ 55 b. Independent variables. .................................................................................................. 58 c. Control variables ........................................................................................................... 62 4.2 Analysis of the Statistical Results ....................................................................................... 65 vi 4.3 Discussion of Findings ........................................................................................................ 71 Chapter 5 - Qualitative Methods ................................................................................................... 75 5.1 Qualitative Research Design ............................................................................................... 78 5.1.1 Structured, Focused Comparison ................................................................................. 78 5.1.2 Process Tracing ............................................................................................................ 81 5.2 Case Selection ................................................................................................................. 84 5.2.1 United States ............................................................................................................ 86 5.2.2 Germany ................................................................................................................... 87 5.2.3 Iraq ........................................................................................................................... 88 5.2.4 Democratic Republic of Congo ............................................................................... 88 Chapter 6 - The United States ......................................................................................................
Recommended publications
  • Ambtsbericht Veiligheidssituatie in Irak
    Ambtsbericht Veiligheidssituatie in Irak Datum September 2014 Pagina 1 van 61 Ambtsbericht Veiligheidssituatie in Irak | september 2014 Colofon Plaats Den Haag Opgesteld door Cluster Ambtsberichten en Terugkeer Redacteur(en): CAT Pagina 2 van 61 Ambtsbericht Veiligheidssituatie in Irak | september 2014 Inhoudsopgave Colofon ......................................................................................................2 Inhoudsopgave ............................................................................................3 Inleiding .....................................................................................................4 1 Politieke context ...................................................................................... 7 2 Veiligheidssituatie...................................................................................14 2.1 Algemeen .................................................................................................14 2.2 Bagdad..................................................................................................... 18 2.2.1 Bagdad (stad) ...........................................................................................18 2.2.2 Bagdad (provincie).....................................................................................19 2.3 Anbar.......................................................................................................20 2.4 Ninewa.....................................................................................................22 2.5 Salaheddin................................................................................................25
    [Show full text]
  • The Hidden Cost of September 11 Liz Fekete
    Racism: the hidden cost of September 11 Liz Fekete Racism: the hidden cost of September 11 Liz Fekete A special issue of the European Race Bulletin Globalisation has set up a monolithic economic system; September 11 threatens to engender a monolithic political culture. Together, they spell the end of civil society. – A. Sivanandan, Director, Institute of Race Relations Institute of Race Relations 2-6 Leeke Street, London WC1X 9HS Tel: 020 7837 0041 Fax: 020 7278 0623 Web: www.irr.org.uk Email: [email protected] Liz Fekete is head of European research at the Insitute of Race Relations where she edits the European Race Bulletin. It is published quarterly and available on subscription from the IRR (£10 for individuals, £25 for institutions). •••••• This report was compiled with the help of Saba Bahar, Jenny Bourne, Norberto Laguia Casaus, Barry Croft, Rhona Desmond, Imogen Forster, Haifa Hammami, Lotta Holmberg, Vincent Homolka, Mieke Hoppe, Fida Jeries, Simon Katzenellenbogen, Virginia MacFadyen, Nitole Rahman, Hazel Waters, and Chris Woodall. Special thanks to Tony Bunyan, Frances Webber and Statewatch. © Institute of Race Relations 2002 ISBN 085001 0632 Cover Image by David Drew Designed by Harmit Athwal Printed by Russell Press Ltd European Race Bulletin No. 40 Contents Introduction 1 1. The EU approach to combating terrorism 2 2. Removing refugee protection 6 3. Racism and the security state 10 4. Popular racism: one culture, one civilisation 16 References 22 European Race Bulletin No. 40 Introduction ollowing the events of September 11, it became commonplace to say that the world would Fnever be the same again.
    [Show full text]
  • Surprise, Intelligence Failure, and Mass Casualty Terrorism
    SURPRISE, INTELLIGENCE FAILURE, AND MASS CASUALTY TERRORISM by Thomas E. Copeland B.A. Political Science, Geneva College, 1991 M.P.I.A., University of Pittsburgh, 1992 Submitted to the Graduate Faculty of The Graduate School of Public and International Affairs in partial fulfillment of the requirements for the degree of Doctor of Philosophy University of Pittsburgh 2006 UNIVERSITY OF PITTSBURGH FACULTY OF ARTS AND SCIENCES This dissertation was presented by Thomas E. Copeland It was defended on April 12, 2006 and approved by Davis Bobrow, Ph.D. Donald Goldstein, Ph.D. Dennis Gormley Phil Williams, Ph.D. Dissertation Director ii © 2006 Thomas E. Copeland iii SURPRISE, INTELLIGENCE FAILURE, AND MASS CASUALTY TERRORISM Thomas E. Copeland, PhD University of Pittsburgh, 2006 This study aims to evaluate whether surprise and intelligence failure leading to mass casualty terrorism are inevitable. It explores the extent to which four factors – failures of public policy leadership, analytical challenges, organizational obstacles, and the inherent problems of warning information – contribute to intelligence failure. This study applies existing theories of surprise and intelligence failure to case studies of five mass casualty terrorism incidents: World Trade Center 1993; Oklahoma City 1995; Khobar Towers 1996; East African Embassies 1998; and September 11, 2001. A structured, focused comparison of the cases is made using a set of thirteen probing questions based on the factors above. The study concludes that while all four factors were influential, failures of public policy leadership contributed directly to surprise. Psychological bias and poor threat assessments prohibited policy makers from anticipating or preventing attacks. Policy makers mistakenly continued to use a law enforcement approach to handling terrorism, and failed to provide adequate funding, guidance, and oversight of the intelligence community.
    [Show full text]
  • Mcallister Bradley J 201105 P
    REVOLUTIONARY NETWORKS? AN ANALYSIS OF ORGANIZATIONAL DESIGN IN TERRORIST GROUPS by Bradley J. McAllister (Under the Direction of Sherry Lowrance) ABSTRACT This dissertation is simultaneously an exercise in theory testing and theory generation. Firstly, it is an empirical test of the means-oriented netwar theory, which asserts that distributed networks represent superior organizational designs for violent activists than do classic hierarchies. Secondly, this piece uses the ends-oriented theory of revolutionary terror to generate an alternative means-oriented theory of terrorist organization, which emphasizes the need of terrorist groups to centralize their operations. By focusing on the ends of terrorism, this study is able to generate a series of metrics of organizational performance against which the competing theories of organizational design can be measured. The findings show that terrorist groups that decentralize their operations continually lose ground, not only to government counter-terror and counter-insurgent campaigns, but also to rival organizations that are better able to take advantage of their respective operational environments. However, evidence also suggests that groups facing decline due to decentralization can offset their inability to perform complex tasks by emphasizing the material benefits of radical activism. INDEX WORDS: Terrorism, Organized Crime, Counter-Terrorism, Counter-Insurgency, Networks, Netwar, Revolution, al-Qaeda in Iraq, Mahdi Army, Abu Sayyaf, Iraq, Philippines REVOLUTIONARY NETWORK0S? AN ANALYSIS OF ORGANIZATIONAL DESIGN IN TERRORIST GROUPS by BRADLEY J MCALLISTER B.A., Southwestern University, 1999 M.A., The University of Leeds, United Kingdom, 2003 A Dissertation Submitted to the Graduate Faculty of the University of Georgia in Partial Fulfillment of the Requirements for the Degree DOCTOR OF PHILOSPHY ATHENS, GA 2011 2011 Bradley J.
    [Show full text]
  • “Empty Promises:” Diplomatic Assurances No Safeguard Against Torture
    Human Rights Watch April 2004 Vol.16 No.4 (D) “Empty Promises:” Diplomatic Assurances No Safeguard against Torture TABLE OF CASES...................................................................................................................... 2 INTRODUCTION ...................................................................................................................... 3 DIPLOMATIC ASSURANCES AND THE UNITED NATIONS SYSTEM ................ 7 U.N. Special Rapporteur on Torture ..................................................................................... 7 U.N. Human Rights Committee...........................................................................................10 U.N. Committee against Torture..........................................................................................12 U.N. High Commissioner for Refugees ..............................................................................14 DIPLOMATIC ASSURANCES AND THEIR USE IN NORTH AMERICA .............15 United States............................................................................................................................15 Federal Law .........................................................................................................................15 The Case of Maher Arar....................................................................................................16 Canada ......................................................................................................................................18 The Case
    [Show full text]
  • A Neighbors Network Publication Acknowledgements
    A Neighbors Network Publication Acknowledgements Neighbors Network would like to thank the following organizations for their help in the production of this chronology: Etcetera Cobb Citizens Coalition John Williams Kelly, W B. Reeves, Eva Sears, nd Steve Ada ms. For ad itional copies, send $5,00 per copy to: : ' Neighbors Network 1544 Piedmont Avenue, #73 Atlanta, Goergia...0324 (404) 816-8348 ©1994 by Neighbors NetworksM " eople have to be taught to hate. Likewise, people can be taught to accept and understand differences in others and to have the courage to speak out against those who would deny others the right to be different." Benjamin Hirsch, President of Eternal Light Hemshech Holocaust Survivors Group The International Connections of Edward Fields - Marietta, Georgia The chart below illustrates the growing levels of cooperation amongst hate groups on an international level, using the international connections of local nazi Edward Fields as an example of this trend. Gary Lauck, NSDAP·AO British National Party (BNP) Lauck's propaganda appears in Fields' literature Fields' propaganda has appeared in BNP literature. Lauck is the main contact to the international 1991 - Fields went on a USA speaking tour with movement for US neo-Nazis, and publishes a BNP leader John Tyndall substantial proportion of all neo-Nazi literature 1993 - Fields attended Holocaust denier David circulated in Germany. Irving's Atlanta speech. france Michel Faci and Guillaume Fabien of the Euronationalist Party spoke at the founding of the America First Party. Edward Fields, Marietta Georgia 1980-84 Organized the New Order Knights Publisher of the Truth at Last (formerly the Thunderbolt) 1993 Cofounder of the America First Party.
    [Show full text]
  • What the Pen Reveals About the Sword: Rhetoric-Based Mapping of Insurgency Factional Structure in Iraq
    What the Pen Reveals About the Sword: Rhetoric-Based Mapping of Insurgency Factional Structure in Iraq Michael Gabbay Information Systems Laboratories, Inc. 200 W. Mercer St., Ste 410 Seattle, WA 98119 [email protected] Paper presented at the Annual Meeting of the International Studies Association March 28, 2008 Note: A condensed version of this paper appeared as \Mapping the Structure of the Sunni Insurgency in Iraq," CTC Sentinel, 1(4):10{12, March 2008 ISL What the Pen Reveals About the Sword M. Gabbay 1 Introduction The Iraq conflict is a complex fusion of a rebellion against foreign occu- pation and an internal civil war | a conflict that seems intent on explor- ing almost all axes of violence between its participants. Divisions within the Sunni insurgency in Iraq have critically influenced the evolution of the conflict and will no doubt bear critically upon its subsequent course and resolution. Major points of contention between nationalist-leaning insur- gents and caliphate-minded, pan-Islamic jihadists have been, among others, Sunni participation in elections, the indiscriminate targeting of Shiite civil- ians, and the nature of the threat posed by United States-backed Sunni militias, known as \awakening councils." Understanding the divisions be- tween insurgents at the level of speci¯c insurgent groups is key to devising e®ective counterinsurgency and conflict resolution strategies. In Iraq, this task is complicated by the proliferation of insurgent groups, most of whom claim an Islamist mantle, and the murky nature of their origins, composi- tion, and leadership. In this paper, we describe a quantitative methodology for constructing diagrams that characterize and clarify insurgency factional structure using insurgent rhetoric as data.
    [Show full text]
  • Islamic State of Iraq and the Levant (ISIL), Or Simply the Islamic State, Has Carried out Deadly Terrorist Attacks
    BACKGROUND REPORT Patterns of Islamic State-Related Terrorism, 2002--2015 For more than a decade, the organization now known as the Islamic State of Iraq and the Levant (ISIL), or simply the Islamic State, has carried out deadly terrorist attacks. Beginning as a small network led by Jordanian Abu Musab al-Zarqawi, the first terrorist attack attributed to this group was the assassination of American diplomat Laurence Foley in Amman, Jordan in October 2002. Since then, the group initially known as Tawhid and Jihad (Jama’at al-Tawhid w’al-Jihad (the Party of Monotheism and Jihad)) has undergone a complex evolution, including name changes, leadership changes, and shifts in allegiance to other Salafi-jihadist organizations, most notably al-Qaida. In addition, the reach of ISIL’s violence surpasses its own membership, to include attacks carried out by other groups and individuals who have pledged allegiance to ISIL regardless of whether or not formal ties exist. This complexity makes it difficult to comprehensively and systematically place into context the violence of one of the most active and deadly terrorist organizations in recent history. For the purpose of this report, we have classified the terrorist attacks in the Global Terrorism Database (GTD) into four ISIL-related perpetrator categories: ISIL Predecessor: attacks by organizations that were part of the ISIL lineage prior to adoption of the ISIL name in 2013 ISIL: attacks by operatives of the “core” of the organization, based in and primarily active in Iraq and Syria ISIL Affiliate: attacks by organizations that have declared allegiance to ISIL1 ISIL-Inspired: attacks by individuals who have indicated that they were motivated by allegiance to ISIL ISIL-Related: any of the above This report presents data that illustrate the dynamics of ISIL-related terrorism over time and place, from 2002 to 2015.
    [Show full text]
  • The Prospects of Political Islam in a Troubled Region Islamists and Post-Arab Spring Challenges
    The Prospects of Political Islam in a Troubled Region Islamists and Post-Arab Spring Challenges Editor Dr. Mohammed Abu Rumman The Prospects of Political Islam in a Troubled Region Islamists and Post-Arab Spring Challenges Editor Dr. Mohammed Abu Rumman 1 The Hashemite Kingdom Of Jordan The Deposit Number at The National Library (2018/2/529) 277 AbuRumman, Mohammad Suliman The Prospects Of Political Islam In A Troubled Region / Moham- mad Suliman Abu Rumman; Translated by William Joseph Ward. – Am- man: Friedrich Ebert Stiftung, 2018 (178) p. Deposit No.: 2018/2/529 Descriptors: /Politics//Islam/ يتحمل المؤلف كامل المسؤولية القانونية عن محتوى مصنفه وﻻ ّيعبر هذا المصنف عن رأي دائرة المكتبة الوطنية أو أي جهة حكومية أخرى. Published in 2018 by Friedrich-Ebert-Stiftung Jordan & Iraq FES Jordan & Iraq P.O. Box 941876 Amman 11194 Jordan Email: [email protected] Website:www.fes-jordan.org Not for sale © FES Jordan & Iraq All rights reserved. No part of this publication may be reprinted, reproduced or utilized in any form or by any means without prior written permission from the publishers. The views and opinions expressed in this publication are solely those of the original author. They do not necessarily represent those of the Friedrich-Ebert-Stiftung or the editor. Translation: William Joseph Ward Cover and Lay-out: Mua’th Al Saied Printing: Economic Press ISBN: 978-9957-484-80-4 2 The Prospects of Political Islam in a Troubled Region Islamists and Post-Arab Spring Challenges Contributed Authors Dr. Mohammed Abu Rumman Dr. Khalil Anani Dr. Neven Bondokji Hassan Abu Hanieh Dr.
    [Show full text]
  • Comparative Study of Fascist Groups from Brazil and Argentina on the Internet (1996-2007) Revista Tempo E Argumento, Vol
    Revista Tempo e Argumento E-ISSN: 2175-1803 [email protected] Universidade do Estado de Santa Catarina Brasil Santos Maynard, Dilton Cândido Intolerance South of America: comparative study of fascist groups from Brazil and Argentina on the Internet (1996-2007) Revista Tempo e Argumento, vol. 6, núm. 12, mayo-agosto, 2014, pp. 276-307 Universidade do Estado de Santa Catarina Florianópolis, Brasil Available in: http://www.redalyc.org/articulo.oa?id=338132153015 How to cite Complete issue Scientific Information System More information about this article Network of Scientific Journals from Latin America, the Caribbean, Spain and Portugal Journal's homepage in redalyc.org Non-profit academic project, developed under the open access initiative e ‐ ISSN 2175 ‐ 1803 Intolerance South of America: comparative study of fascist groups from Brazil and Argentina on the Internet (1996‐2007) Abstract This article investigates the uses of the Internet made by Dilton Cândido Santos Maynard fascist groups from Brazil and Argentina. We use as main Universidade Federal de Sergipe ‐ UFS. sources professedly fascist websites created shortly after the Brasil popularization of the Internet. From the perspective offered [email protected] by the comparative methodology advocated by Marc Bloch, the text examines the relation between Brazilian homepages and the best known South American far‐right website, Ciudad Libertad Opinión, created in 1999 with the primary purpose of spreading fascist ideas and providing support to other extremist groups. We point out the strategic role played by the web portal Libre Opinión as articulator between fascist groups in South America, this is a key contributor in the diffusion of Brazilian web pages marked to convey on a regular basis xenophobic, racist, anti‐Semitic, and homophobic messages.
    [Show full text]
  • Tablet Magazine 9/4/10 2:35 PM
    Tablet Magazine 9/4/10 2:35 PM Tablet Magazine is a project of Nextbook Inc. About Us | Contact | Terms of Service | First Blood Was Meir Kahane’s murder al-Qaida’s earliest attack on U.S. soil? BY PETER LANCE | Sep 1, 2010 7:00 AM Last fall I received a cryptic email from Emad Salem, the ex-Egyptian Army major who was the FBI’s first undercover asset in what would become known as the war on terror. I’d told Salem’s remarkable story in my last three books, which were critical of the bureau’s counterterrorism record. Because I had treated him fairly, Salem reached out to me after years in the Federal Witness Protection Program. We made plans to meet in early November, after a lecture I was giving at New York University. But Salem didn’t show. I went back to my hotel that night and had chalked it up as a lost opportunity. The phone rang at 2 in the morning. It was Salem, summoning me to a meeting outside 26 Federal Plaza, the building that houses the FBI’s New York office. Very cloak and dagger, but that’s how this man rolls. You don’t infiltrate the cell responsible for the 1993 World Trade Center bombing without practicing a little Meir Kahane and the web of jihadists. tradecraft. Anyway, when my cab pulled in to Foley Square a few minutes later, Salem was standing in the shadows. CREDIT: Len Small/Tablet Magazine That was the start of a series of interviews that led to some astonishing revelations about two of the most infamous al-Qaida murders since Osama Bin Laden formed his terror network.
    [Show full text]
  • Homeland Security Implications of Radicalization
    THE HOMELAND SECURITY IMPLICATIONS OF RADICALIZATION HEARING BEFORE THE SUBCOMMITTEE ON INTELLIGENCE, INFORMATION SHARING, AND TERRORISM RISK ASSESSMENT OF THE COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED NINTH CONGRESS SECOND SESSION SEPTEMBER 20, 2006 Serial No. 109–104 Printed for the use of the Committee on Homeland Security Available via the World Wide Web: http://www.gpoaccess.gov/congress/index.html U.S. GOVERNMENT PRINTING OFFICE 35–626 PDF WASHINGTON : 2008 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 COMMITTEE ON HOMELAND SECURITY PETER T. KING, New York, Chairman DON YOUNG, Alaska BENNIE G. THOMPSON, Mississippi LAMAR S. SMITH, Texas LORETTA SANCHEZ, California CURT WELDON, Pennsylvania EDWARD J. MARKEY, Massachusetts CHRISTOPHER SHAYS, Connecticut NORMAN D. DICKS, Washington JOHN LINDER, Georgia JANE HARMAN, California MARK E. SOUDER, Indiana PETER A. DEFAZIO, Oregon TOM DAVIS, Virginia NITA M. LOWEY, New York DANIEL E. LUNGREN, California ELEANOR HOLMES NORTON, District of JIM GIBBONS, Nevada Columbia ROB SIMMONS, Connecticut ZOE LOFGREN, California MIKE ROGERS, Alabama SHEILA JACKSON-LEE, Texas STEVAN PEARCE, New Mexico BILL PASCRELL, JR., New Jersey KATHERINE HARRIS, Florida DONNA M. CHRISTENSEN, U.S. Virgin Islands BOBBY JINDAL, Louisiana BOB ETHERIDGE, North Carolina DAVE G. REICHERT, Washington JAMES R. LANGEVIN, Rhode Island MICHAEL MCCAUL, Texas KENDRICK B. MEEK, Florida CHARLIE DENT, Pennsylvania GINNY BROWN-WAITE, Florida SUBCOMMITTEE ON INTELLIGENCE, INFORMATION SHARING, AND TERRORISM RISK ASSESSMENT ROB SIMMONS, Connecticut, Chairman CURT WELDON, Pennsylvania ZOE LOFGREN, California MARK E.
    [Show full text]