The Accomplishments of the Department of Justice 2001-2009

Total Page:16

File Type:pdf, Size:1020Kb

The Accomplishments of the Department of Justice 2001-2009 U.S. Department of Jusice Office of the Attorney General The Accomplishments of the U.s. Department of Justice 2001-2009 The Accomplishments of the U.s. De pa rtment of Justic e 2001-2009 I. Executive Summary he mission of the Department of Justice is to enforce the law and defend the interests of the United States according to the law; to ensure public safety against threats foreign and domestic; to provide Tfederal leadership in preventing and controlling crime; to seek just punishment for those guilty of unlawful behavior; and to ensure fair and impartial administration of justice for all Americans. From 2001 to 2009, the Department has fulfilled that mission and advanced the interests of justice and the rights of the American people. Following the attacks of September 11, 2001, the Department made combating terrorism its top priority. This shift required a significant revision to the Department’s structures, polices and procedures and a sub­ stantial investment of resources. Most significant were the creation of a separate National Security Division and the FBI’s efforts to transform itself from primarily a law enforcement agency into a law enforcement and domestic intelligence agency. In 2006 the Department set up the National Security Division, a new com­ ponent tasked with leading the Department’s efforts to combat terrorism. As part of that reorganization, the Department launched an extensive effort to prosecute threats to national security as soon as the law, evidence and circumstances permitted. In addition, between Fiscal Year 2001 and FY 2008, the FBI’s budget roughly doubled, allowing for large increases in the number of intelligence analysts and language analysts, and increasing the use of special initiatives such as Joint Terrorism Task Forces. As a result of these efforts, numer­ ous domestic and international terrorist plots were disrupted and many of the people involved were prose­ cuted and sent to prison, including Richard Reid (the “shoe bomber”), Zacarias Moussaoui and Jose Padilla. Another top priority of the Department over the past eight years was combating violent crime. This priori­ ty included targeting gun crimes, dismantling gangs, disrupting drug trafficking and protecting children from sexual exploitation. The Department made strides in each of these areas. For example, since the inception of the Project Safe Neighborhoods initiative approximately eight years ago, the Department has more than doubled the number of gun crime prosecutions when compared to the previous eight years. Recognizing that our nation faced an epidemic of technology-assisted exploitation crimes targeting children, the Department launched Project Safe Childhood in 2006. As a result, federal child sexual exploitation charges increased by 33 percent between FY 2006 and FY 2008. The Department also maintained its overall drug prosecution rate, successfully targeting and prosecuting the manufacturing and distribution of drugs such as metham­ phetamine. These measures and others, all of which have emphasized cooperation with the Department's state and local law enforcement partners, contributed to violent crime rates near a 30-year low. The Department has made a significant effort to investigate and prosecute financial crimes. Working with other agencies in the executive branch, the Department has obtained approximately 1,300 convictions, including more than 200 corporate chief executives or presidents, more than 120 vice presidents and more ACCOMPLISHMENTS OF THE U.S. DEPARTMENT OF JUSTICE i 2001-2009 I. Executive Summary than 50 chief financial officers, at corporations including WorldCom, Adelphia and Enron. The Department also focused on investigating and prosecuting fraud associated with the dispersion of federal money. In par­ ticular, the Department established a National Procurement Fraud task force and focused its efforts on areas such as Medicare spending, defense procurement connected to the wars in Iraq and Afghanistan, and gov­ ernment aid following hurricanes and other natural disasters. Since 2001, the Department’s suits against vio­ lators of the nation's antitrust, tax and environmental laws have resulted in record fines. The Department launched new enforcement initiatives to enforce civil rights laws, including investigations into housing discrimination and human trafficking, and a concerted effort to combat a backlash against Arab, Muslim, Sikh and South-Asian Americans following 9/11. Substantial efforts were made to protect religious liberties and the rights of America's service members, the disabled, women and other protected groups. With respect to elections and the voting process, the Civil Rights Division brought record numbers of cases under the language minority provisions of the Voting Rights Act of 1965, and expanded the use of federal moni­ tors and observers to ensure ballot access and integrity. Over the past eight years, the Department has amassed a strong record of accomplishment. The work of law enforcement touches all aspects of American life, and the dedicated men and women of the Department work hard on behalf of the American people. The appendices that follow lay out in greater detail those accom­ plishments and the results, and extent, of that hard work. Taken together, the Department’s record is one of which all Americans can and should be proud. ACCOMPLISHMENTS OF THE U.S. DEPARTMENT OF JUSTICE ii 2001-2009 II. Table of Contents I. Executive summary......................................................................................................................................i II. Table of contents ....................................................................................................................................iii III. Litigating Division Accomplishments ....................................................................................................1 Antitrust Division................................................................................................................................1 Civil Division ....................................................................................................................................11 Civil Rights Division ........................................................................................................................21 Criminal Division..............................................................................................................................28 Environment and Natural Resources Division ..................................................................................43 National Security Division ................................................................................................................53 Office of the Solicitor General ..........................................................................................................63 Tax Division ......................................................................................................................................65 IV. Law Enforcement Component Accomplishments..................................................................................71 Bureau of Alcohol, Tobacco, Firearms and Explosives - ATF ............................................................71 Drug Enforcement Administration - DEA ........................................................................................77 Federal Bureau of Investigation - FBI ................................................................................................88 Federal Bureau of Prisons - BOP ....................................................................................................101 U.S. Marshals Service -USMS ........................................................................................................107 ACCOMPLISHMENTS OF THE U.S. DEPARTMENT OF JUSTICE iii 2001-2009 II. Table of Contents V. Special Initiatives ..................................................................................................................................119 Intellectual Property Task Force ......................................................................................................119 President’s Corporate Fraud Task Force ..........................................................................................123 Project Safe Childhood....................................................................................................................128 Project Safe Neighborhoods ............................................................................................................131 Rule of Law (Operation Iraqi Freedom) ..........................................................................................134 VI. Administrative, Policy and Other Accomplishments ..........................................................................143 Community Oriented Policing Services - COPS ............................................................................143 Community Relations Service ........................................................................................................149 Executive Office for Immigration Review........................................................................................150 Justice Management Division ..........................................................................................................150 National Drug Intelligence Center ..................................................................................................152 Office of Federal
Recommended publications
  • IYIR for HTML
    INFOSEC UPDATE 2006 Student Workbook Norwich University June 19-20, 2006 M. E. Kabay, PhD, CISSP-ISSMP Assoc. Prof. Information Assurance Program Director, MSIA BSIA Division of Business Management Norwich University [email protected] Copyright © 2006 M. E. Kabay. All rights reserved. Page 1 INFOSEC UPDATE 2006 -- June 19-20, 2006 01 Introduction Category 01 Introduction 2006-06-12 Introduction M. E. Kabay, PhD, CISSP WELCOME Welcome to the 2005 edition of the Information Security Year in Review (IYIR) project. In 1993 and 1994, I was an adjunct professor in the Institute for Government Informatics Professionals in Ottawa, Canada under the aegis of the University of Ottawa. I taught a one-semester course introducting information security to government personnel and enjoyed the experience immensely. Many of the chapters of my 1996 textbook, _The NCSA Guide to Enterprise Security_ published by McGraw-Hill were field-tested by my students. In 1995, I was asked if I could run a seminar for graduates of my courses to bring them up to date on developments across the entire field of information security. Our course had twenty students and I so enjoyed it that I continued to develop the material and teach the course with the NCSA (National Computer Security Association; later called ICSA and then eventually renamed TruSecure Corporation and finally CyberTrust, its current name) all over the United States, Canada, Europe, Asia and the Caribbean. After a few years of working on this project, it became obvious that saving abstracts in a WordPerfect file was not going to cut it as an orderly method for organizing the increasing mass of information that I was encountering in my research.
    [Show full text]
  • Filing # 105742773 E-Filed 04/01/2020 03:21:58 PM
    Filing # 105742773 E-Filed 04/01/2020 03:21:58 PM IN THE CIRCUIT COURT OF THE 15TH JUDICIAL CIRCUIT IN AND FOR PALM BEACH COUNTY, FLORIDA CASE NO.: Division: BRADLEY C. BIRKENFELD, Plaintiff, v. LEONARD A. LAUDER; and, KEVIN M. COSTNER, Defendants. ________________________________ / COMPLAINT Comes now Plaintiff, Bradley C. Birkenfeld (”BIRKENFELD”), through his undersigned attorneys, and hereby files this Complaint against Defendants Leonard A. Lauder (“LAUDER”) and Kevin M. Costner (“COSTNER”) for fraud, negligent misrepresentation and intentional interference with advantageous or business relationship, all arising from publication of Plaintiff’s book, Lucifer’s Banker: The Untold Story of How I Destroyed Swiss Bank Secrecy (“Lucifer’s Banker”), published by Greenleaf Book Group Press (“Greenleaf”). Plaintiff alleges as follows: I. PARTIES 1. Plaintiff BIRKENFELD is a native-born United States citizen currently residing in Malta. BIRKENFELD is not a citizen of Malta and has no residence in the United States. 2. Defendant LAUDER resides in Palm Beach, Florida at his oceanfront mansion located at 26 South Ocean Boulevard, Palm Beach, Florida and at his New York City apartment. Defendant LAUDER is chairman emeritus of Estée Lauder, the world’s third-largest maker of cosmetics and fragrances. Defendant LAUDER stepped down as CEO of Estée Lauder in 1999. According to public reports, Defendant LAUDER’s net worth exceeds $15.9 billion. Defendant LAUDER’s Page 1 of 31 private banker at UBS bank (f/k/a Union Bank of Switzerland) was Christian Bovay in Geneva, Switzerland. Defendant LAUDER is a marquee name. 3. Defendant COSTNER resides in Santa Barbara, California. Defendant COSTNER is an American actor, director, producer, and musician.
    [Show full text]
  • Building a Secure Workforce
    Federal Government Services Building a Secure Workforce Guard against insider threat Michael G. Gelles David L. Brant Brian Geffert Building a Secure Workforce Guard Against Insider Threat Table of Contents Introduction 1 Asset Loss and Insider Threat Defined 2 Other Potential Results of Asset Loss Caused by Insider Threats 3 Understanding the Insider Threat 4 Summary of Findings: Insider Threat 4 Risk Indicators and Characteristics 5 Competing Loyalties 5 Risk of Increased Computing and Networking 6 Risk of Public Information in Private Hands 6 Mitigating Asset Loss: A Series of Interventions and Action Plans 7 Establishing a Workforce Culture to Mitigate Risk 7 The Employee Assistance Program (EAP) a Tactical Mitigation Strategy 8 The Workforce as a Monitor: “Operationalizing” Security Awareness Training 8 Leveraging Human Resources as a Risk Mitigator 9 Risk Management Through Information Access Management 9 Case Reviews 10 Project Initiation 10 Establish a Baseline: The “As-Is State” 10 Case Sampling and Methodology for Review 10 Conduct a Gap Analysis and Profile the “To-Be State” 10 Recommendations for Future Study and Change 11 Appendix A 12 Enterprise Risk Framework and the Insider Threat 12 Risk Equation 13 Appendix B 14 Information Management Framework and the Insider Threat 14 References 16 Contacts 17 i Building a Secure Workforce Guard Against Insider Threat Introduction In today’s evolving and changing global environment, business in the public sector is increasingly more challenging. There is an ongoing need to adapt a more balanced and integrated approach to protecting information and other assets. As the world becomes a virtual community of competitors and predators, an organization’s assets are at greater risk than in the past, when the world was more localized, compartmentalized, and siloed.
    [Show full text]
  • (2008): Perspectives on Terrorism
    Table of Contents: Accounting For the Waves of International Terrorism ………….…...3 By Dipak K. Gupta Interpreting the PKK’s Signals in Europe…………………………...10 By Vera Eccarius-Kelly Review Essay: Top 50 Books on Terrorism and Counterterrorism…15 By Joshua Sinai PERSPECTIVES ON TERRORISM Volume II, Issue 11 Accounting For the Waves of International Terrorism By Dipak K. Gupta “Without the pen of Pain, the swords of Washington would have been wielded in vain.” - John Adams dvancements in sciences come through painstaking observations. Scientists’ astute observations of the seemingly chaotic world pave the way for what is known as “knowledge creep.” Terrorism research is certainly no exception to this rule. One of David Rapoport’s singular contributions to A our advancement of knowledge has been his articulation of the four waves of international terror- ism. Rapoport (2006:10) defines waves with three characteristics: a) a cycle of activities characterized by ex- pansion and contraction phases, b) covering multiple nations, and c) “driven by a common predominant energy that shapes the participating groups’ characteristics and mutual relationships.” By studying the history of ter- rorism since the 1880s, Professor Rapoport identifies four distinct waves fueled by common ideological fervor emanating from anarchism, anti-colonialism, socialism, and religious fundamentalism, respectively, with the first three waves lasting roughly 40 years each. Although the “wave” theory has gained a firm footing in the extant literature on terrorism (Sageman 2008a), to my knowledge, not much effort has gone into the examination of the causes of, and the process by which mega ideas saturate nearly every corner of the earth.
    [Show full text]
  • Trying Terrorists Brian S
    William Mitchell Law Review Volume 34 Article 6 Issue 5 Journal of the National Security Forum 2008 Trying Terrorists Brian S. Carter-Stiglitz Follow this and additional works at: http://open.mitchellhamline.edu/wmlr Part of the Military, War, and Peace Commons, and the National Security Law Commons Recommended Citation Carter-Stiglitz, Brian S. (2008) "Trying Terrorists," William Mitchell Law Review: Vol. 34: Iss. 5, Article 6. Available at: http://open.mitchellhamline.edu/wmlr/vol34/iss5/6 This Article is brought to you for free and open access by the Law Reviews and Journals at Mitchell Hamline Open Access. It has been accepted for inclusion in William Mitchell Law Review by an authorized administrator of Mitchell Hamline Open Access. For more information, please contact [email protected]. © Mitchell Hamline School of Law Carter-Stiglitz: Trying Terrorists TRYING TERRORISTS Brian S. Carter-Stiglitz Trying terrorists in Article III courts presents a host of complications and problems. As terrorism cases come before civilian courts, prosecutors have had to wrestle with these challenges. The most significant challenge may be the tension between protecting national-security secrets and prosecuting those who threaten national security in open court. The Classified Information Procedures Act (CIPA) is the main litigation tool for dealing with these challenges. Two cases, both with Minnesota roots, demonstrate the challenges that face civil prosecution in terrorism cases. Mohammed Abdullah Warsame, a largely unknown name, is being tried in the District of Minnesota on material support charges. Michael Ward, a former assistant U.S. Attorney (AUSA) for the District of Minnesota, initially led Warsame's prosecution.' The complications caused by CIPA have already prolonged Warsame's prosecution for four years-with no end currently in sight.
    [Show full text]
  • N We I NATIONALCENTER
    WHISTLEBLOWERS N we I NATIONALCENTER February 25, 2014 The Honorable Carl Levin Chairman The Honorable John McCain Ranking Member Homeland Security & Government Affairs Permanent Subcommittee Investigations 340 Dirksen Senate Office Building Washington, D.C. 20510 Dear Senators: The National Whistleblower Center (NWC) thanks you for holding tomorrow's hearing, "Offshore Tax Evasion: The Effort to Collect Unpaid Taxes on Billions in Hidden Offshore Accounts," to focus on the federal government's efforts to address this serious problem. Unfortunately, the federal government has too often forgotten that it was whistleblowers who first gave them the road map on how to pursue illegal offshore accounts. The federal government's success on offshore tax evasion was all started by a single whistleblower - Bradley Birkenfeld. Unfortunately, the federal government has not done nearly enough to take advantage of the information provided by this whistleblower such as encouraging additional whistleblowers to come forward, rewarding whistleblowers who have come forward, protecting whistleblowers, and recognizing those capable Department of Justice (DOJ) and Internal Revenue Service (IRS) employees who have successfully worked with whistleblowers. The failure of the federal government to fully utilize the information provided by whistleblowers, which encourages more whistleblowers and adequately rewards whistleblowers, has cost the American taxpayers bilions of dollars. Sadly, the tragedy of failing to address offshore tax evasion goes beyond just dollars - undermining efforts to stop corruption, bribery, organized crime, and exploitation of women and children. Making full use of whistleblowers is critical in all areas of tax evasion - but especially with respect to ilegal offshore accounts due to significant limitations on the ability to obtain bank information from a bank secrecy jurisdiction.
    [Show full text]
  • Mateen in Orlando That Killed 49 Reminds Us That Despite All These FBI Investigations, Sometimes America’S Homegrown Terrorists Will Still Slip Through the Net
    The Future of Counterterrorism: Addressing the Evolving Threat to Domestic Security. House Committee on Homeland Security Committee, Counterterrorism and Intelligence Subcommittee February 28, 2017 Peter Bergen , Vice President, Director of International Security and Fellows Programs, New America; Professor of Practice, Arizona State University; CNN National Security Analyst. This testimony is organized into 8 sections 1. What is the terrorism threat to the U.S.? 2. What is the terrorism threat posed by citizens of proposed travel-ban countries? 3. An examination of attacks in the U.S. that are inspired or enabled by ISIS. 4. An assessment of who ISIS’ American recruits are and why they sign up; 5. An assessment of how ISIS is doing; 6. An examination of what the big drivers of jihadist terrorism are; 7. A discussion of some future trends in terrorism; 8. Finally, what can be done to reduce the threat from jihadist terrorists? 1. What is the terrorism threat to the United States? The ISIS attacks in Brussels last year and in Paris in 2015 underlined the threat posed by returning Western “foreign fighters” from the conflicts in Syria and Iraq who have been trained by ISIS or other jihadist groups there. Six of the attackers in Paris were European nationals who had trained with ISIS in Syria. Yet in the United States, the threat from returning foreign fighters is quite limited. According to FBI Director James Comey, 250 Americans have gone or attempted to go to Syria. This figure is far fewer than the estimated 6,900 who have traveled to Syria from Western nations as a whole — the vast majority from Europe.
    [Show full text]
  • 65 Question History Test. See If You Can Get 100%
    65 QUESTION HISTORY TEST. SEE IF YOU CAN GET 100%. HERE’S THE TEST: 1. 1968 Bobby Kennedy was shot and killed by: a. Superman b. Jay Leno c. Long-haired pot head d. A Muslim male extremist between the ages of 17 and 40 suffering from pre-traumatic stress disorder. This murderer was a twenty-four year old Palestinian immigrant named Sirhan Sirhan. 2. In 1972 at the Munich Olympics, Israeli athletes were kidnapped and massacred by : a. Olga Corbett b. Sitting Bull c. Arnold Schwarzenegger d. Muslim male extremists between the ages of 17 and 40 unable to cope with the strain of competition between nation states in which they saw medals as signs of warlike domination 3. In November 1979, the US embassy in Tehran Iran was seized and taken over and 66 hostages are taken. This seizure was an outright attack on American Soil. The hostages were held for 444 days and were released on the day of President Reagan’s inauguration. The embassy was taken over by: a. Lost Norwegians interviewing candidates for kinetic Nobel Prizes, for potential future acts of valor they might commit b. Elvis c. A tour bus full of 80-year-old women d. Muslim male extremists between the ages of 17 and 40 strained by the invasion of infidels on their soil and unable to attend US universities on scholarship. One of the participants in the seizure of the embassy may have been Mahmoud Ahmadinejad, the current President of Iran who holds a Ph.D. in traffic and transport engineering from Tehran University of Science and Technology and was a 23-year old student at the time.
    [Show full text]
  • U.S. Customs and Border Protection * Volume 4, Issue 3
    U.S. Customs and Border Protection H Volume 4, Issue 3 SPECIAL 9 / 11 EDITION In Memoriam H H H In honor of CBP employees who have died in the line of duty 2011 Hector R. Clark Eduardo Rojas Jr. 2010 Charles F. Collins II Michael V. Gallagher Brian A. Terry Mark F. Van Doren John R. Zykas 2009 Nathaniel A. Afolayan Cruz C. McGuire Trena R. McLaughlin Robert W. Rosas Jr. 2008 Luis A. Aguilar Jarod Dittman 2007 Julio E. Baray Eric Cabral Richard Goldstein Ramon Nevarez Jr. Robert Smith Clinton B. Thrasher David J. Tourscher 2006 Nicholas D. Greenig David N. Webb 2004 Travis Attaway George DeBates Jeremy Wilson 2003 James P. Epling H H H For a historic listing honoring federal personnel who gave their lives while securing U.S. borders, please visit CBP.gov Vol 4, Issue 3 CONTENTS H FEATURES VOL 4, ISSUE 3 4 A Day Like No Other SEPTEMBER 11, 2011 In the difficult hours and days after the SECRETARY OF HOMELAND SECURITY Sept. 11 attacks, confusion and fear Janet Napolitano turned to commitment and resolve as COMMISSIONER, the agencies that eventually would form 4 U.S. CUSTOMS AND BORDER PROTECTION CBP responded to protect America. Alan D. Bersin ASSISTANT COMMISSIONER, 16 Collective Memory OFFICE OF PUBLIC AFFAIRS Melanie Roe CBP employees look back on the day that united an agency… and a nation. EDITOR Laurel Smith 16 CONTRIBUTING EDITORS 41 Attacks Redefine Eric Blum Border Security Susan Holliday Marcy Mason CBP responds to challenge by coming Jay Mayfield together to build layers of security Jason McCammack extending around the globe, upgrading its ability to keep dangerous people PRODUCTION MANAGER Tracie Parker and things out of the homeland.
    [Show full text]
  • Has Adam Gadahn Forsaken the Lawful Jihad for Anti-Americanism? a Case Study of Ideological Contradictions by Paul Kamolnick
    PERSPECTIVES ON TERRORISM Volume 8, Issue 6 Has Adam Gadahn Forsaken the Lawful Jihad for Anti-Americanism? A Case Study of Ideological Contradictions by Paul Kamolnick And if you say that this barbaric style is known in your tribal traditions, or your people’s traditions, or tolerated by your Shaykh or Emir, we would say: It is not allowed in our Islam . A fight that is not guided by the Shari’ah rules is not honored.[1] We denounce any operation carried out by a Jihadi group that does not consider the sanctity of Mus- lims and their blood and money. We refuse to attribute these crimes to Qa’ida al-Jihad Organization. .This position and the judgment is not to be changed if the act is carried out in the name of Jihad or under the banner of establishing Shari’ah and the legal measures, or under the name of promot- ing virtue and preventing vice. As long as it is forbidden in God’s religion, we are disassociated from it.[2] I have no doubt that what is happening to the Jihadi movement in these countries is not misfortune, but punishment by God on us because of our sins and injustices, or because of the sins of some of us and the silence of the rest of us.[3] Abstract Despite his importance as a senior Al-Qaeda spokesman, no detailed examination exists of Adam Yahiye Gadahn’s employment of fiqh al-jihad—that branch of Islamic jurisprudence regulating the lawful waging of jihad—to condemn or condone violence committed in the name of Al-Qaeda.
    [Show full text]
  • 9/11 Report”), July 2, 2004, Pp
    Final FM.1pp 7/17/04 5:25 PM Page i THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page v CONTENTS List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— ...in the Law Enforcement Community 73 3.3 . and in the Federal Aviation Administration 82 3.4 . and in the Intelligence Community 86 v Final FM.1pp 7/17/04 5:25 PM Page vi 3.5 . and in the State Department and the Defense Department 93 3.6 . and in the White House 98 3.7 . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis:August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5.
    [Show full text]
  • The Al Qaeda Network a New Framework for Defining the Enemy
    THE AL QAEDA NETWORK A NEW FRAMEWORK FOR DEFINING THE ENEMY KATHERINE ZIMMERMAN SEPTEMBER 2013 THE AL QAEDA NETWORK A NEW FRAMEWORK FOR DEFINING THE ENEMY KATHERINE ZIMMERMAN SEPTEMBER 2013 A REPORT BY AEI’S CRITICAL THREATS PROJECT ABOUT US About the Author Katherine Zimmerman is a senior analyst and the al Qaeda and Associated Movements Team Lead for the Ameri- can Enterprise Institute’s Critical Threats Project. Her work has focused on al Qaeda’s affiliates in the Gulf of Aden region and associated movements in western and northern Africa. She specializes in the Yemen-based group, al Qaeda in the Arabian Peninsula, and al Qaeda’s affiliate in Somalia, al Shabaab. Zimmerman has testified in front of Congress and briefed Members and congressional staff, as well as members of the defense community. She has written analyses of U.S. national security interests related to the threat from the al Qaeda network for the Weekly Standard, National Review Online, and the Huffington Post, among others. Acknowledgments The ideas presented in this paper have been developed and refined over the course of many conversations with the research teams at the Institute for the Study of War and the American Enterprise Institute’s Critical Threats Project. The valuable insights and understandings of regional groups provided by these teams directly contributed to the final product, and I am very grateful to them for sharing their expertise with me. I would also like to express my deep gratitude to Dr. Kimberly Kagan and Jessica Lewis for dedicating their time to helping refine my intellectual under- standing of networks and to Danielle Pletka, whose full support and effort helped shape the final product.
    [Show full text]