01 Burton Text:Layout 1 11/3/10 2:03 PM Page I
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
JTF-GTMO Detainee Assessment
S E C R E T //NOFORN I I 20320619 DEPARTMENTOF DEFENSE HEADQUARTERS,JOINT TASK FORCEGUANTANAMO U.S. NAVAL STATION,GUANTANAMO BAY, CUBA APO AE 09350 JTF-GTMO-CDR 19June 2007 MEMORANDUM FOR Commander,United StatesSouthem Command. 3511 NW 9lst Avenue. Miami,FL33172. SUBJECT: Recommendationfor ContinuedDetention Under DoD Control (CD) for GuantanamoDetainee, ISN: US9SA-000079DP(S) JTF-GTMO DetaineeAssessment 1. (S//NF) Personal Information: o JDIMSAIDRC ReferenceName: FahedA al-Harasi o Aliases and Current/True Name: Fahd Atiyah Hamza Hamid al-Harazi" Hassanal-Makki. FahedFahad" Khalid. Abu Hassan. al-Sharif. Abu Barak o Placeof Birth: Mecca. SaudiArabia (SA) o Date of Birth: 18 November 1978 o Citizenship: SaudiArabia o InternmentSerial Number (ISN): US9SA-000079DP 2. (U//T'OUO) Health: Detaineeis in good health. 3. (S//NF) JTF-GTMO Assessment: a. (S) Recommendation: JTF-GTMO recommendsthis detaineefor ContinuedDetention Under DoD Control (CD). JTF-GTMO previouslyassessed detainee for Continued Detentionwith TransferLanguage on 26May 2006. b. (S//NF) Executive Summary: Detaineeis reportedto be a memberof al-Qaida. He was identified as having attendedmilitant training and was an instructor at the al-Qaida al- Faruq Training Camp. Detaineewas in Afghanistan (AF) since 1999 during which he is assessedto have participated in hostilities againstUS and Coalition forces as a member of Classifiedby: MultipleSources REASON:E.O. 12958, AS AMENDED,Section 1.4(C) Declassi$on:20320619 S E C R E T //NOFORN I I 20320619 S E C R E T // NOFORN I I 20320619 JTF-GTMO.CDR SUBJECT: Recommendationfor ContinuedDetention Under DoD Control (CD) for GuantanamoDetainee, ISN: US9SA-000079DP(S) UsamaBin Laden's (UBL) 55th Arab Brigade.l Detainee'sname and aliaswere listed in recovereddocuments associated with al-Qaida, and the Saudi Ministry of Interior General Directorate of Investigations(Mabahith) identified him as a high priority detainee. -
Inside Russia's Intelligence Agencies
EUROPEAN COUNCIL ON FOREIGN BRIEF POLICY RELATIONS ecfr.eu PUTIN’S HYDRA: INSIDE RUSSIA’S INTELLIGENCE SERVICES Mark Galeotti For his birthday in 2014, Russian President Vladimir Putin was treated to an exhibition of faux Greek friezes showing SUMMARY him in the guise of Hercules. In one, he was slaying the • Russia’s intelligence agencies are engaged in an “hydra of sanctions”.1 active and aggressive campaign in support of the Kremlin’s wider geopolitical agenda. The image of the hydra – a voracious and vicious multi- headed beast, guided by a single mind, and which grows • As well as espionage, Moscow’s “special services” new heads as soon as one is lopped off – crops up frequently conduct active measures aimed at subverting in discussions of Russia’s intelligence and security services. and destabilising European governments, Murdered dissident Alexander Litvinenko and his co-author operations in support of Russian economic Yuri Felshtinsky wrote of the way “the old KGB, like some interests, and attacks on political enemies. multi-headed hydra, split into four new structures” after 1991.2 More recently, a British counterintelligence officer • Moscow has developed an array of overlapping described Russia’s Foreign Intelligence Service (SVR) as and competitive security and spy services. The a hydra because of the way that, for every plot foiled or aim is to encourage risk-taking and multiple operative expelled, more quickly appear. sources, but it also leads to turf wars and a tendency to play to Kremlin prejudices. The West finds itself in a new “hot peace” in which many consider Russia not just as an irritant or challenge, but • While much useful intelligence is collected, as an outright threat. -
CIA Best Practices in Counterinsurgency
CIA Best Practices in Counterinsurgency WikiLeaks release: December 18, 2014 Keywords: CIA, counterinsurgency, HVT, HVD, Afghanistan, Algeria, Colombia, Iraq, Israel, Peru, Northern Ireland, Sri Lanka, Chechnya, Libya, Pakistan, Thailand,HAMAS, FARC, PULO, AQI, FLN, IRA, PLO, LTTE, al-Qa‘ida, Taliban, drone, assassination Restraint: SECRET//NOFORN (no foreign nationals) Title: Best Practices in Counterinsurgency: Making High-Value Targeting Operations an Effective Counterinsurgency Tool Date: July 07, 2009 Organisation: Central Intelligence Agency (CIA) Author: CIA Office of Transnational Issues; Conflict, Governance, and Society Group Link: http://wikileaks.org/cia-hvt-counterinsurgency Pages: 21 Description This is a secret CIA document assessing high-value targeting (HVT) programs world-wide for their impact on insurgencies. The document is classified SECRET//NOFORN (no foreign nationals) and is for internal use to review the positive and negative implications of targeted assassinations on these groups for the strength of the group post the attack. The document assesses attacks on insurgent groups by the United States and other countries within Afghanistan, Algeria, Colombia, Iraq, Israel, Peru, Northern Ireland, Sri Lanka, Chechnya, Libya, Pakistan and Thailand. The document, which is "pro-assassination", was completed in July 2009 and coincides with the first year of the Obama administration and Leon Panetta's directorship of the CIA during which the United States very significantly increased its CIA assassination program at the -
Wikileaks and the Institutional Framework for National Security Disclosures
THE YALE LAW JOURNAL PATRICIA L. BELLIA WikiLeaks and the Institutional Framework for National Security Disclosures ABSTRACT. WikiLeaks' successive disclosures of classified U.S. documents throughout 2010 and 2011 invite comparison to publishers' decisions forty years ago to release portions of the Pentagon Papers, the classified analytic history of U.S. policy in Vietnam. The analogy is a powerful weapon for WikiLeaks' defenders. The Supreme Court's decision in the Pentagon Papers case signaled that the task of weighing whether to publicly disclose leaked national security information would fall to publishers, not the executive or the courts, at least in the absence of an exceedingly grave threat of harm. The lessons of the PentagonPapers case for WikiLeaks, however, are more complicated than they may first appear. The Court's per curiam opinion masks areas of substantial disagreement as well as a number of shared assumptions among the Court's members. Specifically, the Pentagon Papers case reflects an institutional framework for downstream disclosure of leaked national security information, under which publishers within the reach of U.S. law would weigh the potential harms and benefits of disclosure against the backdrop of potential criminal penalties and recognized journalistic norms. The WikiLeaks disclosures show the instability of this framework by revealing new challenges for controlling the downstream disclosure of leaked information and the corresponding likelihood of "unintermediated" disclosure by an insider; the risks of non-media intermediaries attempting to curtail such disclosures, in response to government pressure or otherwise; and the pressing need to prevent and respond to leaks at the source. AUTHOR. -
ASD-Covert-Foreign-Money.Pdf
overt C Foreign Covert Money Financial loopholes exploited by AUGUST 2020 authoritarians to fund political interference in democracies AUTHORS: Josh Rudolph and Thomas Morley © 2020 The Alliance for Securing Democracy Please direct inquiries to The Alliance for Securing Democracy at The German Marshall Fund of the United States 1700 18th Street, NW Washington, DC 20009 T 1 202 683 2650 E [email protected] This publication can be downloaded for free at https://securingdemocracy.gmfus.org/covert-foreign-money/. The views expressed in GMF publications and commentary are the views of the authors alone. Cover and map design: Kenny Nguyen Formatting design: Rachael Worthington Alliance for Securing Democracy The Alliance for Securing Democracy (ASD), a bipartisan initiative housed at the German Marshall Fund of the United States, develops comprehensive strategies to deter, defend against, and raise the costs on authoritarian efforts to undermine and interfere in democratic institutions. ASD brings together experts on disinformation, malign finance, emerging technologies, elections integrity, economic coercion, and cybersecurity, as well as regional experts, to collaborate across traditional stovepipes and develop cross-cutting frame- works. Authors Josh Rudolph Fellow for Malign Finance Thomas Morley Research Assistant Contents Executive Summary �������������������������������������������������������������������������������������������������������������������� 1 Introduction and Methodology �������������������������������������������������������������������������������������������������� -
WALTER CRONKITE – IMAGE #28 the 20Th Summer Olympic Games
WALTER CRONKITE – IMAGE #28 The 20th Summer Olympic Games were held in Munich, Germany, in 1972. Tensions ran high at these Olympics, because they were the first Olympic games held in Germany since the Nazis hosted them in 1936. The Israeli athletes and their trainers were especially nervous. Many had family members who had been murdered during the Holocaust or were themselves Holocaust survivors. The first few days of the Olympic Games went smoothly. On September 4th the Israeli team spent the evening out, seeing the play, Fiddler on the Roof. Then they went back to the Olympic Village to sleep. A little after 4 a.m. on September 5th, as the Israeli athletes slept, eight members of the Palestinian Liberation Organization terrorist group, Black September, jumped over the six-foot high fence that encircled the Olympic Village. The terrorists headed straight for 31 Connollystrasse, the building where the Israeli contingent was staying. Around 4:30 a.m. the terrorists entered the building. They rounded up the occupants of apartment 1 and, then, apartment 3. Several of the Israelis fought back. Two of them were killed. A couple of others were able to escape out windows. Nine were taken hostage. By 5:10 a.m. the police had been alerted, and news of the attack had spread around the world. The terrorists then dropped a list of their demands out the window. They wanted 234 prisoners released from Israeli prisons and two from German prisons by 9 a.m. Negotiators were able to extend the deadline to noon, then to 1 p.m., then to 3 p.m., then to 5 p.m. -
Trend Analysis the Israeli Unit 8200 an OSINT-Based Study CSS
CSS CYBER DEFENSE PROJECT Trend Analysis The Israeli Unit 8200 An OSINT-based study Zürich, December 2019 Risk and Resilience Team Center for Security Studies (CSS), ETH Zürich Trend analysis: The Israeli Unit 8200 – An OSINT-based study Author: Sean Cordey © 2019 Center for Security Studies (CSS), ETH Zurich Contact: Center for Security Studies Haldeneggsteig 4 ETH Zurich CH-8092 Zurich Switzerland Tel.: +41-44-632 40 25 [email protected] www.css.ethz.ch Analysis prepared by: Center for Security Studies (CSS), ETH Zurich ETH-CSS project management: Tim Prior, Head of the Risk and Resilience Research Group, Myriam Dunn Cavelty, Deputy Head for Research and Teaching; Andreas Wenger, Director of the CSS Disclaimer: The opinions presented in this study exclusively reflect the authors’ views. Please cite as: Cordey, S. (2019). Trend Analysis: The Israeli Unit 8200 – An OSINT-based study. Center for Security Studies (CSS), ETH Zürich. 1 Trend analysis: The Israeli Unit 8200 – An OSINT-based study . Table of Contents 1 Introduction 4 2 Historical Background 5 2.1 Pre-independence intelligence units 5 2.2 Post-independence unit: former capabilities, missions, mandate and techniques 5 2.3 The Yom Kippur War and its consequences 6 3 Operational Background 8 3.1 Unit mandate, activities and capabilities 8 3.2 Attributed and alleged operations 8 3.3 International efforts and cooperation 9 4 Organizational and Cultural Background 10 4.1 Organizational structure 10 Structure and sub-units 10 Infrastructure 11 4.2 Selection and training process 12 Attractiveness and motivation 12 Screening process 12 Selection process 13 Training process 13 Service, reserve and alumni 14 4.3 Internal culture 14 5 Discussion and Analysis 16 5.1 Strengths 16 5.2 Weaknesses 17 6 Conclusion and Recommendations 18 7 Glossary 20 8 Abbreviations 20 9 Bibliography 21 2 Trend analysis: The Israeli Unit 8200 – An OSINT-based study selection tests comprise a psychometric test, rigorous Executive Summary interviews, and an education/skills test. -
The Munich Massacre: a New History
The Munich Massacre: A New History Eppie Briggs (aka Marigold Black) A thesis submitted in partial fulfilment of the requirements of the degree of BA (Hons) in History University of Sydney October 2011 1 Contents Introduction and Historiography Part I – Quiet the Zionist Rage 1. The Burdened Alliance 2. Domestic Unrest Part II – Rouse the Global Wrath 3. International Condemnation 4. The New Terrorism Conclusion 2 Acknowledgments I would like to thank first and foremost Dr Glenda Sluga to whom I am greatly indebted for her guidance, support and encouragement. Without Glenda‟s sage advice, the writing of this thesis would have been an infinitely more difficult and painful experience. I would also like to thank Dr Michael Ondaatje for his excellent counsel, good-humour and friendship throughout the last few years. Heartfelt thanks go to Elise and Dean Briggs for all their love, support and patience and finally, to Angus Harker and Janie Briggs. I cannot adequately convey the thanks I owe Angus and Janie for their encouragement, love, and strength, and for being a constant reminder as to why I was writing this thesis. 3 Abstract This thesis examines the Nixon administration’s response to the Munich Massacre; a terrorist attack which took place at the 1972 Olympic Games in Munich. By examining the contextual considerations influencing the administration’s response in both the domestic and international spheres, this thesis will determine the manner in which diplomatic intricacies impacted on the introduction of precedent setting counterterrorism institutions. Furthermore, it will expound the correlation between the Nixon administration’s response and a developing conceptualisation of acts of modern international terrorism. -
Counterterrorism CHAPTER 13 the Options
Counterterrorism CHAPTER 13 The Options OPENING VIEWPOINT: THE DEATH OF OSAMA BIN LADEN Al-Qa’ida founder Osama bin Laden was killed during a individual. Based on other surveillance and circumstantial intel- raid by United States naval special forces on May 2, 2011, in ligence information, officials surmised that Osama bin Laden Abbottabad, Pakistan. The successful attack by a unit popularly resided at the compound with his couriers and their families. known as SEAL Team Six ended an intensive manhunt for the Options for assaulting thedistribute compound included a surgi- most wanted terrorist leader in the world. cal strike by special forces, deploying strategic bombers to The successful hunt for Osama bin Laden originated from obliterate the compound, or a joint operation with Pakistani fragments of information gleaned during interrogations of pris- security forces. Theor latter two options were rejected because oners over several years beginning in 2002. Believing that bin of the possibility of killing innocent civilians and distrust of Laden retained couriers to communicate with other operatives, Pakistani security agencies. Approximately two dozen SEAL interrogators focused their attention on questioning high-value commandos practiced intensely for the assault, and were targets about the existence and identities of these couriers. temporarily detailed to the CIA for the mission. A nighttime This focus was adopted with an assumption that bin Laden and helicopter-borne attack was commenced on May 2, 2011. other Al-Qa’ida leaders would rarely communicate using cellpost, The courier al-Kuwaiti and several others were killed during phone technology as a precaution against being intercepted by the assault, and women and children found in the compound Western intelligence agencies. -
The Truth of the Capture of Adolf Eichmann (Pdf)
6/28/2020 The Truth of the Capture of Adolf Eichmann » Mosaic THE TRUTH OF THE CAPTURE OF ADOLF EICHMANN https://mosaicmagazine.com/essay/history-ideas/2020/06/the-truth-of-the-capture-of-adolf-eichmann/ Sixty years ago, the infamous Nazi official was abducted in Argentina and brought to Israel. What really happened, what did Hollywood make up, and why? June 1, 2020 | Martin Kramer About the author: Martin Kramer teaches Middle Eastern history and served as founding president at Shalem College in Jerusalem, and is the Koret distinguished fellow at the Washington Institute for Near East Policy. Listen to this essay: Adolf Eichmann’s Argentinian ID, under the alias Ricardo Klement, found on him the night of his abduction. Yad Vashem. THE MOSAIC MONTHLY ESSAY • EPISODE 2 June: The Truth of the Capture of Adolf Eichmann 1x 00:00|60:58 Sixty years ago last month, on the evening of May 23, 1960, the Israeli prime minister David Ben-Gurion made a brief but dramatic announcement to a hastily-summoned session of the Knesset in Jerusalem: A short time ago, Israeli security services found one of the greatest of the Nazi war criminals, Adolf Eichmann, who was responsible, together with the Nazi leaders, for what they called “the final solution” of the Jewish question, that is, the extermination of six million of the Jews of Europe. Eichmann is already under arrest in Israel and will shortly be placed on trial in Israel under the terms of the law for the trial of Nazis and their collaborators. In the cabinet meeting immediately preceding this announcement, Ben-Gurion’s ministers had expressed their astonishment and curiosity. -
Targeted Killing: Self-Defense, Preemption, and the War on Terrorism
Journal of Strategic Security Volume 2 Number 2 Volume 2, No. 2: May 2009 Article 1 Targeted Killing: Self-Defense, Preemption, and the War on Terrorism Thomas Byron Hunter Follow this and additional works at: https://scholarcommons.usf.edu/jss Part of the Defense and Security Studies Commons, National Security Law Commons, and the Portfolio and Security Analysis Commons pp. 1-52 Recommended Citation Hunter, Thomas Byron. "Targeted Killing: Self-Defense, Preemption, and the War on Terrorism." Journal of Strategic Security 2, no. 2 (2010) : 1-52. DOI: http://dx.doi.org/10.5038/1944-0472.2.2.1 Available at: https://scholarcommons.usf.edu/jss/vol2/iss2/1 This Article is brought to you for free and open access by the Open Access Journals at Scholar Commons. It has been accepted for inclusion in Journal of Strategic Security by an authorized editor of Scholar Commons. For more information, please contact [email protected]. Targeted Killing: Self-Defense, Preemption, and the War on Terrorism Abstract This paper assesses the parameters and utility of “targeted killing” in combating terrorism and its role within the norm of state self-defense in the international community. The author’s thesis is that, while targeted killing provides states with a method of combating terrorism, and while it is “effective” on a number of levels, it is inherently limited and not a panacea. The adoption and execution of such a program brings with it, among other potential pitfalls, political repercussions. Targeted killing is defined herein as the premeditated, preemptive, and intentional killing of an individual or individuals known or believed to represent a present and/or future threat to the safety and security of a state through affiliation with terrorist groups or individuals. -
Secrecy and Human Capital Management in US NSA and Israel Unit 8200
LOOSE LIPS BUILD SHIPS? Secrecy and Human Capital Management in US NSA and Israel Unit 8200 A THESIS SUBMITTED TO THE INTERSCHOOL HONORS PROGRAM IN INTERNATIONAL SECURITY STUDIES CENTER FOR INTERNATIONAL SECURITY AND COOPERATION FREEMAN SPOGLI INSTITUTE FOR INTERNATIONAL STUDIES STANFORD UNIVERSITY By: Lisa Catherine Wallace June 2014 Advisors: Mariano-Florentino Cuéllar Colonel Joseph Felter Abstract ! How do intelligence organizations attract and make use of top talent? This paper approaches this question through a comparative case study of the labor ecosystems surrounding both the US’ National Security Agency and IDF’s signals intelligence branch, Unit 8200. As the cyber realm continues to assume a growing role in modern national security threat environments, intelligence organizations must grow and adapt to accommodate these new objectives. This inevitably involves the question of how to attract and make use of top talent in order to solve difficult and highly technical national security problems. Israel and the United States share similar national security interests, and both possess burgeoning and impressive high-technology clusters. This paper claims that a growing, public network of Unit 8200 and other Intelligence Corps alumni is extant in Israel’s high-technology sector. Furthermore, affiliation with Unit 8200 has a positive signaling and social capital value. By contrast, this paper argues that alumni from the NSA do not possess as strong of a signaling or social capital value in the US. This paper argues that the NSA is hindered by the ontology, secrecy, and culture of the organization itself, as well as US public understanding of national security organizations and cyber threats.