Mapping Networks of Terrorist Cellscells

Total Page:16

File Type:pdf, Size:1020Kb

Mapping Networks of Terrorist Cellscells CONNECTIONS 24(3): 43-52 ©20021NSNA© 2002 INSNA Mapping Networks of Terrorist CellsCells Valdis E. Krebs orgnet.cornorgnet.com This paper looks atat thethe difficultydifficulty inin mappingmapping covertcovert networks. networks. AnalyzingAnalyzing networks after an event isis fairly easy for prosecution purposes.purposes. Mapping covertcovert networks to prevent criminal activity is much more difficult.difficult. We examine the network surrounding thethe tragic events of September 11th,11 th, 2001. ThroughThrough public datadata wewe areare able to map a portionportion of the network centeredcentered around thethe 1919 dead hijackers. ThisThis mapmap givesgives us some insight into the terrorist organization, yet itit isis incomplete. SuggestionsSuggestions for further work andand researchresearch are offered. INTRODUCTIONINTRODUCTION AND BACKGROUND We were all shockedshocked by the tragictragic eventsevents ofof SeptemberSeptember 11,11, 200 2001. 1. InIn thethe nonnon-stop-stop stream ofof news and analysis oneone phrase waswas constantlyconstantly repeated repeated and and usedused inin many contexts - "terrorist"terrorist network."network." Everyone talked about this concept, and described it as amorphous, invisible,invisible, resilient, dispersed and other termsterms thatthat made made it it difficultdifficult toto visualizevisualize what this structure reallyreally looks like. I set outout to map this network of of terrorist cells cells thatthat had had so so affectedaffected allall of our lives. I would be mapping a 'project team' -- muchmuch like like thethe legal,legal, overt groups I had mapped inin countlesscountless consulting assignments. BothBoth overtovert andand covertcovert projectproject teamsteams have tasks to complete, informationinformation to share,share, funding to obtainobtain andand administer,administer, schedulesschedules to meet,meet, workwork toto coordinate,coordinate, andand objectivesobjectives to accomplish.accomplish. HowHow a a normalnonnal project project team team does does all all of of that that is is easyeasy to mapmap andand measure measure using using several several setset of ties - task, resource, strategystrategy andand expertise expertise links.links. II was was surprised atat thethe difficultydifficulty of this particular effort - bothboth in in datadata definitiondefinition andand discovery.discovery. MyMydata data sources were publiclypublicly releasedreleased informationinformation reported in in major major newspapers newspapers such such as as the New York Times, the Wall Street Journal, the Washington Post, andand thethe LosLos AngelesAngeles Times. AsAs I monitored thethe investigation,investigation, itit waswas apparentapparent thatthat thethe investigators investigators wouldwould notnot bebe releasingreleasing allall ACLURM002810 4444 MappingMapping Networks of Terrorist CellsCells // Krebs pertinent network/relationship network/relationship information information and and actually actually may may be be releasingreleasing misinformation to fool thethe enemy. II soonsoon realizedrealized that the data was not going to be as complete and accurate as I had grown accustomed toto inin mappingmapping andand measuringmeasuring organizationalorganizational networks.networks. For guidance I turnedturned to previous work by social networknetwork theoriststheorists who had studied covert, secret, oror illegalillegal networks.networks. II found found threethree excellentexcellent papers papers that that formedformed aa working working foundationfoundation for the knowledge I wouldwould use toto pursuepursue this project. Malcolm Sparrow (Sparrow (Sparrow 1991) 1991) has has an an excellentexcellent overview of thethe application of social network analysis toto criminalcriminal activity.activity. Sparrow describes three problems of criminal network analysis that that II soon soon encountered. encountered. 1. Incompleteness - thethe inevitabilityinevitability of missing nodes and linkslinks thatthat thethe investigatorsinvestigators will not uncover. 2. Fuzzy boundariesboundaries - the difficulty in deciding whowho toto includeinclude andand whowho not to include. 3. Dynamic - these networks are not static, they are always changing. changing. Instead ofoflooking looking at the presence or absence of a tie betweenbetween twotwo individuals,individuals, Sparrow suggests looking at the waxing and waning strength of a tietie dependingdepending uponupon the time and the task at hand.hand. Wayne Baker and Robert Faulkner (Baker(Baker and Faulkner 1993) 1993}suggestlookin suggest lookinggatarchival at archival data to derive relationship data. TheThe data data they they used used to to analyze analyze illegal price-fixingprice-fixing networksnetworks were mostlymostly courtcourt docu­docu- ments and sworn testimony. This data inclincluded uded accoaccounts unts ofobserved observed interpersonalinterpersonal relationships from various witnesses. The hijackers of September 11th 11 th were not directly observed by others in great detail. Bonnie Erickson (Erickson 1981) revealsreveals thethe importanceimportance of trusted priorprior contactscontacts forfor thethe effective effective functioning of a secret society.society. The 1919 hijackers appeared to have come from a network that had formed while they were completingcompleting terroristterrorist trainingtraining in Afghanistan. Many were school chums from many years ago, somesome had lived togethertogether forfor years,years, andand othersothers were relatedrelated byby kinshipkinship ties.ties. Deep trusted ties, ties, thatthat were not easilyeasily visible toto outsiders,outsiders, wovewove this this terror terror networknetwork together.together. Data Gathering Within oneone week of the the attack,attack, infonnationinformation from the investigation started to become public. We soon knew there were 19 hijackers,hijackers, whichwhich planes theythey werewere on, on, and and whichwhich nation'snation's passports they had used toto get intointo thethe country.country. As more informationinformation about about the the hijackers' hijackers' past past was was uncovered II decided to map linkslinks of three strengths (and corresponding thicknesses). thicknesses). TheThe tie tie strength strength would would largely largely bebe governed by the amount ofof time together by a pair of terrorists. ThoseThose living living togethertogether oror attendingattending thethe samesame schoolschool or the same classes/training would have the strongest ties. Those travellingtravelling togethertogether andand partici­partici- patinginpatinginmeetings meetings togetherwould togetherwould have haveties ties ofofmoderatemoderate strength strength and and medium medium thickness. thickness. Finally,Finally, those who were recorded asas having a financialfinancial transactiontransaction together, or an occasional meeting, and no other ties,ties, I sortedsorted intointo thethe dormantdormant tie category-category- theytheywould would rarelyrarelyinteract. interact. TheseThese relationships relationships were were shown with the thinnest links in the network. II started my mapping project project upon upon seeing seeing the the matrix matrix in in Figure Figure 1 1 on on the the web web sitesite of the Sydney MorningMorning Herald (AU) (AU) (Sydney(Sydney Morning Morning Herald, Herald, 2001). 2001). This This was was the the first first attempt attempt I Ihad hadseentovisuallyorganize seen to visually organize thethe datadata thatthat was was graduallygradually becomingbecoming available available twotwo weeks after the tragedy. SoonSoon after the matrix in Figure 1 waswas published,published, the WashingtonWashington Post releasedreleased a more detailed matrix ofof how the hijackers had spent their time inin thethe USAUSA andand with with whom whom (Washington(Washington Post,Post, 2001).2001). The mostmost detaileddetailed documentdocument of of the the hijackers hijackers relationships relationships and and activity activity was was released released in in DecemberDecember 2001 2001 inin thethe IndictmentIndictment of of Zacarias Zacarias Moussaoui (Department ofJustice,ofJustice, 2001).2001). ACLURM002811 Mapping Networks of Terrorist Cells // Krebs 45 THE HIJACKERS .... AND HOW THEY WEREWERE CONNECTED Am1!riclll1 Afrfllles 1I UnitedAir#nll$175Unitednirlines 175 AttendedAttended same I Known to be U$t boo Crashed !oto wre: (nmth) I KOOYmi!) " i Last known t«lImeal(flf~technical college I together in weekwetll lIdll"$$addreSS •MoI1am~Atta~.; ... before attatksattacks M1Imiwrq,Harithout GtrmaJl¥Germany n~I!YWll!i!1, florida ..... t~~~}(~~~: MobilmetlAtiatoned Atte i !>tllv~d tG~et1m' Marwan IIHllehll1al•Shehhi MilManNoreen al-Shehhial'Slwhlli I l~ II f1l1rldi! W<llttll M.I. A!:shear!Alshehri Wa!ee1:! M:Alsll~M;:. li/KIziad Jarrllhjarrah ! mll~ Wait Aishatuihri ···~=~C~JJ)ilo;;,>/ i !.ll)llamedAUaMohamed Atta li/KI Jarrah Marna al-SlIehhi Hani MaOjOiif TilOliTook ftiiJlltflight (lasses classes IMilrwan ilrslwllhi .•. willI AISliahri ; >1 t0gelhertogether lmMfl@GAttended 11a gymlJV1II U11l®r cill~1i .··~~~&in<ltl~al~~i····· Pi!otPilot Sdtimlsschools 1 inin lIIarylam!Maryland In Fl<frlda inif, t!;;rridaFlorida I (Sept(S;ejlt Z·¢H.2-6). MoflairiiidAU.atried Atta MoflamedAttaMohamed Atte 1I alsoail4 seenSll1m. diningdill/iiI} fayezAbl'lledayez Ahmed MarnanMarkvan al'Sbehnial-Shehhi ti)lI~tll~ttogether Ahmedhated AlghanoliAkjflal!l1ii KOOlfi1d ahl«io:lhilfal-idharM Moflaldbald AJsbehrlAlshehri Pilot tcl!oo!sschools I I Miljedt.lO~Waled Mooed lIbalidalid
Recommended publications
  • PENTTBOM CASE SUMMARY As of 1/11/2002
    Law Enforcement Sensitive PENTTBOM CASE SUMMARY as of 1/11/2002 (LES) The following is a "Law Enforcement Sensitive" version of materials relevant to the Penttbom investigation. It includes an Executive Summary; a Summary of Known Associates; a Financial Summary; Flight Team Biographies and Timelines. Recipients are encouraged to forward pertinent information to the Penttbom Investigative Team at FBI Headquarters (Room 1B999) (202-324-9041), or the New York Office, (212-384-1000). Law Enforcement Sensitive 1 JICI 04/19/02 FBI02SG4 Law Enforcement Sensitive EXECUTIVE SUMMARY (LES) Captioned matter is a culmination of over a decade of rhetoric, planning, coordination and terrorist action by USAMA BIN LADEN (UBL) and the AL-QAEDA organization against the United States and its allies. UBL and AL-QAEDA consider themselves involved in a "Holy War" against the United States. The Bureau, with its domestic and international counterterrorism partners, has conducted international terrorism investigations targeting UBL, AL-QAEDA and associated terrorist groups and individuals for several years. (LES) In August 1996, USAMA BIN LADEN issued the first of a series of fatwas that declared jihad on the United States. Each successive fatwa escalated, in tone and scale, the holy war to be made against the United States. The last fatwa, issued in February 1998, demanded that Muslims all over the world kill Americans, military or civilian, wherever they could be found. Three months later, in May 1998, he reiterated this edict at a press conference. The United States Embassies in Nairobi, Kenya, and Dar es Salaam, Tanzania, were bombed on August 7, 1998, a little more than two months after that May 1998 press conference.
    [Show full text]
  • The Jihadi Threat: ISIS, Al-Qaeda, and Beyond
    THE JIHADI THREAT ISIS, AL QAEDA, AND BEYOND The Jihadi Threat ISIS, al- Qaeda, and Beyond Robin Wright William McCants United States Institute of Peace Brookings Institution Woodrow Wilson Center Garrett Nada J. M. Berger United States Institute of Peace International Centre for Counter- Terrorism Jacob Olidort The Hague Washington Institute for Near East Policy William Braniff Alexander Thurston START Consortium, University of Mary land Georgetown University Cole Bunzel Clinton Watts Prince ton University Foreign Policy Research Institute Daniel Byman Frederic Wehrey Brookings Institution and Georgetown University Car ne gie Endowment for International Peace Jennifer Cafarella Craig Whiteside Institute for the Study of War Naval War College Harleen Gambhir Graeme Wood Institute for the Study of War Yale University Daveed Gartenstein- Ross Aaron Y. Zelin Foundation for the Defense of Democracies Washington Institute for Near East Policy Hassan Hassan Katherine Zimmerman Tahrir Institute for Middle East Policy American Enterprise Institute Charles Lister Middle East Institute Making Peace Possible December 2016/January 2017 CONTENTS Source: Image by Peter Hermes Furian, www . iStockphoto. com. The West failed to predict the emergence of al- Qaeda in new forms across the Middle East and North Africa. It was blindsided by the ISIS sweep across Syria and Iraq, which at least temporarily changed the map of the Middle East. Both movements have skillfully continued to evolve and proliferate— and surprise. What’s next? Twenty experts from think tanks and universities across the United States explore the world’s deadliest movements, their strate- gies, the future scenarios, and policy considerations. This report reflects their analy sis and diverse views.
    [Show full text]
  • The Hidden Cost of September 11 Liz Fekete
    Racism: the hidden cost of September 11 Liz Fekete Racism: the hidden cost of September 11 Liz Fekete A special issue of the European Race Bulletin Globalisation has set up a monolithic economic system; September 11 threatens to engender a monolithic political culture. Together, they spell the end of civil society. – A. Sivanandan, Director, Institute of Race Relations Institute of Race Relations 2-6 Leeke Street, London WC1X 9HS Tel: 020 7837 0041 Fax: 020 7278 0623 Web: www.irr.org.uk Email: [email protected] Liz Fekete is head of European research at the Insitute of Race Relations where she edits the European Race Bulletin. It is published quarterly and available on subscription from the IRR (£10 for individuals, £25 for institutions). •••••• This report was compiled with the help of Saba Bahar, Jenny Bourne, Norberto Laguia Casaus, Barry Croft, Rhona Desmond, Imogen Forster, Haifa Hammami, Lotta Holmberg, Vincent Homolka, Mieke Hoppe, Fida Jeries, Simon Katzenellenbogen, Virginia MacFadyen, Nitole Rahman, Hazel Waters, and Chris Woodall. Special thanks to Tony Bunyan, Frances Webber and Statewatch. © Institute of Race Relations 2002 ISBN 085001 0632 Cover Image by David Drew Designed by Harmit Athwal Printed by Russell Press Ltd European Race Bulletin No. 40 Contents Introduction 1 1. The EU approach to combating terrorism 2 2. Removing refugee protection 6 3. Racism and the security state 10 4. Popular racism: one culture, one civilisation 16 References 22 European Race Bulletin No. 40 Introduction ollowing the events of September 11, it became commonplace to say that the world would Fnever be the same again.
    [Show full text]
  • Trying Terrorists Brian S
    William Mitchell Law Review Volume 34 Article 6 Issue 5 Journal of the National Security Forum 2008 Trying Terrorists Brian S. Carter-Stiglitz Follow this and additional works at: http://open.mitchellhamline.edu/wmlr Part of the Military, War, and Peace Commons, and the National Security Law Commons Recommended Citation Carter-Stiglitz, Brian S. (2008) "Trying Terrorists," William Mitchell Law Review: Vol. 34: Iss. 5, Article 6. Available at: http://open.mitchellhamline.edu/wmlr/vol34/iss5/6 This Article is brought to you for free and open access by the Law Reviews and Journals at Mitchell Hamline Open Access. It has been accepted for inclusion in William Mitchell Law Review by an authorized administrator of Mitchell Hamline Open Access. For more information, please contact [email protected]. © Mitchell Hamline School of Law Carter-Stiglitz: Trying Terrorists TRYING TERRORISTS Brian S. Carter-Stiglitz Trying terrorists in Article III courts presents a host of complications and problems. As terrorism cases come before civilian courts, prosecutors have had to wrestle with these challenges. The most significant challenge may be the tension between protecting national-security secrets and prosecuting those who threaten national security in open court. The Classified Information Procedures Act (CIPA) is the main litigation tool for dealing with these challenges. Two cases, both with Minnesota roots, demonstrate the challenges that face civil prosecution in terrorism cases. Mohammed Abdullah Warsame, a largely unknown name, is being tried in the District of Minnesota on material support charges. Michael Ward, a former assistant U.S. Attorney (AUSA) for the District of Minnesota, initially led Warsame's prosecution.' The complications caused by CIPA have already prolonged Warsame's prosecution for four years-with no end currently in sight.
    [Show full text]
  • Staff Statement No
    Outline of the 9/11 Plot Staff Statement No. 16 Members of the Commission, your staff is prepared to report its preliminary findings regarding the conspiracy that produced the September 11 terrorist attacks against the United States. We remain ready to revise our understanding of this subject as our work continues. Dietrich Snell, Rajesh De, Hyon Kim, Michael Jacobson, John Tamm, Marco Cordero, John Roth, Douglas Greenburg, and Serena Wille did most of the investigative work reflected in this statement. We are fortunate to have had access to the fruits of a massive investigative effort by the Federal Bureau of Investigation and other law enforcement agencies, as well intelligence collection and analysis from the Central Intelligence Agency, the National Security Agency, the State Department, and the Department of Defense. Much of the account in this statement reflects assertions reportedly made by various 9/11 conspirators and captured al Qaeda members while under interrogation. We have sought to corroborate this material as much as possible. Some of this material has been inconsistent. We have had to make judgment calls based on the weight and credibility of the evidence. Our information on statements attributed to such individuals comes from written reporting; we have not had direct access to any of them. Plot Overview Origins of the 9/11 Attacks The idea for the September 11 attacks appears to have originated with a veteran jihadist named Khalid Sheikh Mohammed (KSM). A Kuwaiti from the Baluchistan region of Pakistan, KSM grew up in a religious family and claims to have joined the Muslim Brotherhood at the age of 16.
    [Show full text]
  • Anti-Semitism: a Pillar of Islamic Extremist Ideology
    Anti-Semitism: A Pillar of Islamic Extremist Ideology In a video message in August 2015, Osama bin Laden’s son, Hamza bin Laden, utilized a range of anti-Semitic and anti-Israel narratives in his effort to rally Al Qaeda supporters and incite violence against Americans and Jews. Bin Laden described Jews and Israel as having a disproportionate role in world events and the oppression of Muslims. He compared the “Zio- Crusader alliance led by America” to a bird: “Its head is America, one wing is NATO and the other is the State of the Jews in occupied Palestine, and the legs are the tyrant rulers that sit on the chests of the peoples of the Muslim Ummah [global community].” An undated image of al-Qaeda terrorist Osama bin Laden and his son, Hamza Bin Laden then called for attacks worldwide and demanded that Muslims “support their brothers in Palestine by fighting the Jews and the Americans... not in America and occupied Palestine and Afghanistan alone, but all over the world…. take it to all the American, Jewish, and Western interests in the world.” Such violent expressions of anti-Semitism have been at the core of Al Qaeda’s ideology for decades. Even the 9/11 terrorist attacks were motivated, in part, by anti-Semitism. Mohamed Atta, a key member of the Al Qaeda Hamburg cell responsible for the attacks, reportedly considered New York City to be the center of a global Jewish conspiracy, and Khalid Sheik Mohammed, who masterminded the attack, had allegedly previously developed several plans to attack Israeli and Jewish targets.
    [Show full text]
  • 9/11 Report”), July 2, 2004, Pp
    Final FM.1pp 7/17/04 5:25 PM Page i THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page v CONTENTS List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— ...in the Law Enforcement Community 73 3.3 . and in the Federal Aviation Administration 82 3.4 . and in the Intelligence Community 86 v Final FM.1pp 7/17/04 5:25 PM Page vi 3.5 . and in the State Department and the Defense Department 93 3.6 . and in the White House 98 3.7 . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis:August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5.
    [Show full text]
  • Radical Milieus and Salafis Movements in France: Ideologies, Practices, Relationships with Society and Political Visions
    MWP 2014 /13 Max Weber Programme Radical Milieus and Salafis Movements in France: Ideologies, Practices, Relationships with Society and Political Visions AuthorMohamed-Ali Author Adraouiand Author Author European University Institute Max Weber Programme Radical Milieus and Salafis Movements in France: Ideologies, Practices, Relationships with Society and Political Visions Mohamed-Ali Adraoui EUI Working Paper MWP 2014/13 This text may be downloaded for personal research purposes only. Any additional reproduction for other purposes, whether in hard copy or electronically, requires the consent of the author(s), editor(s). If cited or quoted, reference should be made to the full name of the author(s), editor(s), the title, the working paper or other series, the year, and the publisher. ISSN 1830-7728 © Mohamed-Ali Adraoui, 2014 Printed in Italy European University Institute Badia Fiesolana I – 50014 San Domenico di Fiesole (FI) Italy www.eui.eu cadmus.eui.eu Abstract This paper deals mainly with the issue of radical Islam within French society over recent decades. More particularly, this study illustrates evolutions and the radicalization processes among some militant Islamic groups in this country since the end of the 1970s. Focusing on connections between geopolitical issues born in the Arab world and their implications within a predominantly non Muslim society, enables highlighting the centrality of some actors and currents that have been the impulse for the emergence of a radical and militant activism in France. Some specific attention is paid to Salafist movements, whether they are primarily interested in political protest or whether they desire first to break with the rest of society in order to purify their beliefs and social relations.This paper has to do with the political vision, strategies, history and sociology of Islamic radical militancy in France.
    [Show full text]
  • The Al Qaeda Network a New Framework for Defining the Enemy
    THE AL QAEDA NETWORK A NEW FRAMEWORK FOR DEFINING THE ENEMY KATHERINE ZIMMERMAN SEPTEMBER 2013 THE AL QAEDA NETWORK A NEW FRAMEWORK FOR DEFINING THE ENEMY KATHERINE ZIMMERMAN SEPTEMBER 2013 A REPORT BY AEI’S CRITICAL THREATS PROJECT ABOUT US About the Author Katherine Zimmerman is a senior analyst and the al Qaeda and Associated Movements Team Lead for the Ameri- can Enterprise Institute’s Critical Threats Project. Her work has focused on al Qaeda’s affiliates in the Gulf of Aden region and associated movements in western and northern Africa. She specializes in the Yemen-based group, al Qaeda in the Arabian Peninsula, and al Qaeda’s affiliate in Somalia, al Shabaab. Zimmerman has testified in front of Congress and briefed Members and congressional staff, as well as members of the defense community. She has written analyses of U.S. national security interests related to the threat from the al Qaeda network for the Weekly Standard, National Review Online, and the Huffington Post, among others. Acknowledgments The ideas presented in this paper have been developed and refined over the course of many conversations with the research teams at the Institute for the Study of War and the American Enterprise Institute’s Critical Threats Project. The valuable insights and understandings of regional groups provided by these teams directly contributed to the final product, and I am very grateful to them for sharing their expertise with me. I would also like to express my deep gratitude to Dr. Kimberly Kagan and Jessica Lewis for dedicating their time to helping refine my intellectual under- standing of networks and to Danielle Pletka, whose full support and effort helped shape the final product.
    [Show full text]
  • Radical Islamist Groups in Germany: a Lesson in Prosecuting Terror in Court by Matthew Levitt
    MENU Policy Analysis / PolicyWatch 834 Radical Islamist Groups in Germany: A Lesson in Prosecuting Terror in Court by Matthew Levitt Feb 19, 2004 ABOUT THE AUTHORS Matthew Levitt Matthew Levitt is the Fromer-Wexler Fellow and director of the Reinhard Program on Counterterrorism and Intelligence at The Washington Institute. Brief Analysis n February 5, 2004, a German court acquitted Abdelghani Mzoudi, a thirty-one-year-old native Moroccan, of O 3,066 counts of accessory to murder and membership in a terrorist organization (al-Qaeda). Mzoudi is suspected of having provided material and financial support to the Hamburg cell that helped organize and perpetrate the terrorist attacks of September 11, 2001. According to the presiding judge, Mzoudi was acquitted for lack of evidence, not out of a belief in the defendant's innocence. The acquittal was the most recent example of a growing dilemma faced by the United States and other countries in their efforts to prosecute suspected terrorists: how to gain access to intelligence for criminal proceedings without compromising the sources of that information. Indeed, Mzoudi's acquittal comes at a time when, despite nearly three years of fighting the war on terror, German intelligence claims that the presence of militant Islamist groups on German soil has reached new heights. U.S. officials face similar circumstances. Al-Qaeda in Germany Within days of the September 11 attacks, al-Qaeda activities in Germany quickly emerged as a key focus of the investigation. Three of the four suicide pilots -- Mohammed Atta, Marwan al-Shehi, and Ziad Jarrah -- were members of the Hamburg cell.
    [Show full text]
  • Banco Central De La República Argentina
    BANCO CENTRAL DE LA REPÚBLICA ARGENTINA COMUNICACIÓN “ B “ 7701 28/01/2003 A LAS ENTIDADES FINANCIERAS: Ref.: Información cursada por el Banco de la Reserva Federal de Nueva York, relacionada con perso- nas vinculadas con actividades terroristas _______________________________________________________________ Nos dirigimos a Uds. con relación al requerimiento efectuado por el Banco de la Reserva Fede- ral de Nueva York, vinculado con la investigación penal que esta llevando a cabo sobre el terrorismo. Al respecto les señalamos, que deberán verificar si de sus registros surge que realizan operacio- nes con particulares y entidades incluidas en la denominada “Lista de Control”, que se adjunta en Anexo. En el caso en que la entidad financiera local sea controlada por una entidad financiera sujeta a la supervisión consolidada del Banco de la Reserva Federal de N.Y., deberá informar las operaciones detecta- das en forma directa al mencionado organismo de supervisión, proporcionando todos los datos que al respec- to se posean, debiendo a la vez notificar de ello a la Superintendencia de Entidades Financieras y Cambiarias, mediante nota dirigida al Gerente responsable de la supervisión de la entidad. A su vez llevamos a su conocimiento que el presente requerimiento, así como las futuras actuali- zaciones que se efectúen, deberá considerarse como si fueran formuladas por el BCRA. Respecto de las entidades financieras cuyo controlante no esté sujeto a la supervisión consolida- da del Banco de la Reserva Federal de N.Y, en el caso de detectar operaciones de alguna de las personas u entidades incluidas en la “Lista de Control”, éstas deberán enviar una notificación al Banco de la Reserva Fe- deral de N.Y a la dirección [email protected] Dicha notificación deberá ser genérica sin identificar, por ejemplo, las personas o montos involu- crados a los fines de respetar el secreto bancario.
    [Show full text]
  • 9-11 and Terrorist Travel- Full
    AND TERRORIST TRAVEL Staff Report of the National Commission on Terrorist Attacks Upon the United States 9/11 AND TERRORIST TRAVEL Staff Report of the National Commission on Terrorist Attacks Upon the United States By Thomas R. Eldridge Susan Ginsburg Walter T. Hempel II Janice L. Kephart Kelly Moore and Joanne M. Accolla, Staff Assistant Alice Falk, Editor Note from the Executive Director The Commission staff organized its work around specialized studies, or monographs, prepared by each of the teams. We used some of the evolving draft material for these studies in preparing the seventeen staff statements delivered in conjunction with the Commission’s 2004 public hearings. We used more of this material in preparing draft sections of the Commission’s final report. Some of the specialized staff work, while not appropriate for inclusion in the report, nonetheless offered substantial information or analysis that was not well represented in the Commission’s report. In a few cases this supplemental work could be prepared to a publishable standard, either in an unclassified or classified form, before the Commission expired. This study is on immigration, border security and terrorist travel issues. It was prepared principally by Thomas Eldridge, Susan Ginsburg, Walter T. Hempel II, Janice Kephart, and Kelly Moore, with assistance from Joanne Accolla, and editing assistance from Alice Falk. As in all staff studies, they often relied on work done by their colleagues. This is a study by Commission staff. While the Commissioners have been briefed on the work and have had the opportunity to review earlier drafts of some of this work, they have not approved this text and it does not necessarily reflect their views.
    [Show full text]