US TERRORIST BORDER CROSSING DATA COLLECTION BORDER-CROSSING EVENT CODEBOOK Version

Total Page:16

File Type:pdf, Size:1020Kb

US TERRORIST BORDER CROSSING DATA COLLECTION BORDER-CROSSING EVENT CODEBOOK Version U.S. TERRORIST BORDER CROSSING DATA COLLECTION BORDER-CROSSING EVENT CODEBOOK Version: October 20, 2010 Methodology for identifying border crossing events During preliminary research, court records from cases found in the ATS dataset were reviewed for potential border crossing events. Each court case’s documents were searched to determine whether or not one of the defendants or accomplices crossed a U.S. border in the events documented in the records. These court cases involve either a completed terrorism incident, a thwarted or planned terrorism incident, material support for terrorism, general terrorism conspiracy, and in some cases immigration fraud. A list of terrorism related court cases that involved at least one successful, thwarted, or planned border crossing was then generated for further study. Coding of border crossing events The potential border crossing events were originally found through searching court case documents and then identifying court cases to include in the project. Now that a list has been generated the coding of the border crossing events will start with the identification of an “incident.” Using a combination of the ATS dataset and the previously funded START project- MISTA, the court cases will be linked to either a completed terrorism incident, a thwarted or planned terrorism attack, material support of terrorism case, or a general terrorism conspiracy when no incident or planned incident can be identified. There can be many incidents per court case and/or many court cases per incident. This will result in a list of “incidents” with linked court cases for which the documents can be further studied for border crossing events. In addition, open source media searches will be used to augment the data collection and coding. Once an “incident” has been identified then related court case records will be mined for border crossing events. When an event is found all persons that were involved with trying to cross the border will be coded. Terminology The terms incident, terrorism incident, or terrorism-related incident are used in the codebook to refer to several types of events, as included in ATS: successful completed incident (also included in GTD), a thwarted attack, a planned incident that never occurred, and in some cases a general terrorism or material support of terrorism conspiracy. A single “border crossing event” is defined as when one or more persons successfully cross or unsuccessfully attempt to cross over the border of the U.S at a specific place, date, and time. This is also to include a planned crossing of the border that was never carried out as long as a date or place was specified in the source data about the planned crossing. What distinguishes one “border crossing event” from another is determined by the proximity of persons crossings and the date/time of the crossing. For multiple persons crossing the border to be coded as a single “border crossing event” then those persons would have to be traveling as a group on the transportation that takes them to the border. Ex. three persons riding in a single car, traveling on the same flight or ship, or walking across the border. If there is a temporal difference in the crossing (time to be determined- maybe an hour) or a proximity difference (like different ports or different flights to an airport) then these would be coded as separate “border crossing events”. Incident Identification Variables 1. Unique id for the incident for the BORDERS dataset INC_ID (NUMERIC) Assigns a unique id for each incident. An incident can be a successful completed incident, a thwarted attack, a planned incident that never occurred, and in some cases a general terrorism or material support of terrorism conspiracy or immigration related case. 2. Link to incident in TEVUS dataset INC_TEVUS_ID (NUMERIC) If the border crossing is linked to a terrorist attack, record here the TEVUS.EVENTS_KEY for that incident. 3. Link to incident in ATS dataset INC_ATS_ID (NUMERIC) If the border crossing is linked to a terrorist attack, record here the ATS ID for that incident. Copy exactly from the online ATS Terrorism Database or use the TEVUS.EVENTS.ATS_E_EVENTS_ID value. 4. Link to incident in GTD dataset INC_GTD_ID (NUMERIC) If the border crossing is linked to a terrorist attack, record here the GTD ID for that incident. Copy exactly from www.start.umd.edu/gtd or use the TEVUS.EVENTS.GTD_EVENTID value. 2 5. Incident name INC_NAME (TEXT) Designates a name to the terrorism incident for recognition during coding. 6. Incident description INC_DESC (TEXT) Designates a short description for the terrorism incident for recognition during coding. This variable is coded from the ATS dataset. 7. Type of Incident. INC_TYPE (NUMERIC) Type of terrorist-related incident related to this border-crossing event. Values: 1= Assassination 2= Armed assault 3= Bombing/Explosion 4= Hijacking 5= Hostage taking (Barricade incident) 6= Hostage taking (Kidnapping) 7= Facility/Infrastructure attack 8= Unarmed assault 9= Material support 10= Financial support 11= Immigration 12= Other 8. Sub-Type of terrorism incident INC_SUBTYPE (NUMERIC) Sub-type of terrorist-related incident related to this border-crossing event. 3 Values: 0= No explicit link to terrorism found 1= Terrorist attack 2= Terrorist attack prevented 3= Other terrorism related 9. Extent to which the attack/conspiracy was carried out. INC_OCCUR (TEXT) Values: 0= Planning 1= Preparation 2= Attempt 3= Carried Out 10. Incident name INC_SUCCESS (TEXT) Was the goal of the conspiracy/attack successful. Values: 0= No (No evidence of a successful goal completed) 1= Yes (Evidence of a successful goal completed) 11. Date of the terrorism incident INC_DATE (DATE) Values: 12/JUN/99 DD/MMM/YY If unknown or NA, leave blank Note: If “incident” does not have a specific date then use the indictment date for the first defendant from the earliest court case that can be linked to the incident. 4 12. Day of the terrorism incident INC_DAY (NUMERIC) The day of the month on which the terrorist-related incident took place. This variable is coded from the ATS dataset. Values: 01-31 DD If unknown or NA, leave blank. Note: If “incident” does not have a specific date then use the indictment date for the first defendant from the earliest court case that can be linked to the incident. 13. Month of Terrorism Incident/ Planned Incident INC_MONTH (TEXT) The month in which the terrorist-related incident took place. This variable is coded from the ATS dataset. Values: 01-12 MM If unknown or NA, leave blank Note: If “incident” does not have a specific date then use the indictment date for the first defendant from the earliest court case that can be linked to the incident. 14. Year of Terrorism Incident/ Planned Incident INC_YEAR (NUMERIC) 5 The year in which the terrorist-related incident took place. This variable is coded from the ATS dataset. Values: (four-digit value) YYYY If unknown or NA, leave blank 15. Number of border crossings related to incident INC_CROSSINGS (NUMERIC) Codes the number of border crossings related to a single incident. Each time a crossing happens it is counted (even if it is the same person - count each crossing.) Values: 1=One crossing 2=Two crossings, etc. -9=Unknown Note: Coding multiple individuals depends on whether they crossed separately or together. If there were 3 people related to one incident, and the 3 people were always together (same place, same date, same time) and they always crossed the border together 4 times, then this variable would equal 4. If the 3 people crossed the same border at different times of day, or different places then the number would change. It could potentially be 12 crossings if each of the 3 individuals crossed separately (not as a group) 4 separate times. Another example: 3 people flying on the same plane and going through customs would count as 1 “border crossing event” 16. Number of border crossers related to incident INC_CROSSERS (NUMERIC) Codes the number of border crossers related to a single incident. A crosser crossing multiple times counts as only one. Values: 1= One crosser 2= Two crossers, etc. -9= Unknown 6 17. Was incident domestic or international? INC_DOM_INT (NUMERIC) Codes whether or not the incident was domestic or international using the FBI’s methodology. This variable is coded from the ATS dataset. Possible re-coding after definition of variable has been more clearly determined. See Paxton. Values: 0= Domestic 1= International -9= Unknown Note: Domestic terrorism: Unlawful use, or threatened use, of force or violence by a group or individual based and operating entirely within the United States or Puerto Rico without foreign direction committed against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof in furtherance of political or social objectives. International terrorism: Involves violent acts or acts dangerous to human life that are a violation of the criminal laws of the United States or any state, or that would be a criminal violation if committed within the jurisdiction of the United States or any state. These acts appear to be intended to intimidate or coerce a civilian population, influence the policy of a government by intimidation or coercion, or affect the conduct of a government by assassination or kidnapping. International terrorist acts occur outside the United States or transcend national boundaries in terms of the means by which they are accomplished, the persons they appear intended to coerce or intimidate, or the locale in which their perpetrators operate or seek asylum. 18. Category of Incident INC_CATEGORY (NUMERIC) Codes category of terrorism the incident falls under Values: 1= Left Wing 2= Right Wing 3= International 4= Single Issue- Environmental 5= Single Issue- Abortion 6= Single Issue- Anti-Islamic 7= Single Issue- Other 8= Non-Terrorist 9= Other 7 -9= Unknown -8= NA Note: Left-wing Terrorists have a revolutionary socialist agenda and see themselves as protectors of the populace.
Recommended publications
  • Chapter 7 War on Terror
    Chapter 7 War on Terror Thou shall not kill – But we will. In July 2005, Ahmed Ressam was sentenced to 22 years of impris- onment after a jury convicted him of an attempt to bomb Los Angeles International Airport on the eve of the millennium. Emphasizing the rule of law in punishing terrorists, US District Judge John C. Coughenour made the following comments during the sentencing hearing: I would like to convey the message that our system works. We did not need to use a secret military tribunal, or detain the defendant indefinitely as an enemy combatant, or deny him the right to coun- sel, or invoke any proceedings beyond those guaranteed by or con- trary to the US Constitution...Despite the fact that Mr. Ressam is not an American citizen and despite the fact that he entered this country intent upon killing American citizens, he received an effec- tive, vigorous defense, and the opportunity to have his guilt or inno- cence determined by a jury of 12 ordinary citizens. Most importantly, all of this occurred in the sunlight of a public trial. There were no secret proceedings, no indefinite detention, no denial of counsel. The tragedy of September 11th shook our sense of security and made us realize that we, too, are vulnerable to acts of terrorism. Unfortunately, some believe that this threat renders our Constitution obsolete. The war on terror is the antithesis of the criminal justice system that Judge Coughenour describes above. The criminal justice sys- tem is the peacetime legal infrastructure to arrest, indict, prose- War on Terror 249 cute, and punish persons accused of committing terrorists acts.
    [Show full text]
  • Consolidated UN Security Council Sanctions List Last Updated on 14 October 2015
    The Consolidated UN Security Council Sanctions List Last updated on 14 October 2015 Consolidated United Nations Security Council Sanctions List Generated on: 14 October 2015 Composition of the List The list consists of the two sections specified below: A. Individuals B. Entities and other groups Information about de-listing may be found on the Committee's website at: http://www.un.org/sc/committees /dfp.shtml and http://www.un.org/sc/committees/1267/delisting.shtml . A. Individuals TAi.155 Name: 1: ABDUL AZIZ 2: ABBASIN 3: na 4: na 56 ا:Name (original script): 123456 879 Title: na Designation: na DOB: 1969 POB: Sheykhan Village, Pirkowti Area, Orgun District, Paktika Arovince, Afghanistan Good quality a.k.a.: Abdul ABiB Mahsud Low quality a.k.a.: na Nationality: na Passport no.: na National identification no.: na Address: na Listed on: 4 Oct. 2011 (amended on 22 Apr. 2013 ) Other information: Fey commander in the Haqqani Net ork (TAe.012) under SiraIuddin Jallaloudine Haqqani (TAi.144). Taliban Shadow Governor for Orgun District, Paktika Province as of early 2010. Operated a training camp for non-Afghan fighters in Paktika Province. Has been involved in the transport of weapons to Afghanistan. QDi.012 Name: 1: NASHWAN 2: A-. AL-RA//AM 3: A-. AL--AMI 4: na TUVاﻥ 56 ا:Rﺯاق 56 ا:Name (original script): NO45 Title: na Designation: na DOB: 1961 POB: Cosul, IraH Good quality a.k.a.: a) Abdal Al-Hadi Al-Iraqi b) Abd Al-Hadi Al-Iraqi Low quality a.k.a.: Abu Abdallah Nationality: Iraqi Passport no.: na National identification no.: na Address: na Listed on: 6 Oct.
    [Show full text]
  • Foreign Terrorist Organizations
    Order Code RL32223 CRS Report for Congress Received through the CRS Web Foreign Terrorist Organizations February 6, 2004 Audrey Kurth Cronin Specialist in Terrorism Foreign Affairs, Defense, and Trade Division Huda Aden, Adam Frost, and Benjamin Jones Research Associates Foreign Affairs, Defense, and Trade Division Congressional Research Service ˜ The Library of Congress Foreign Terrorist Organizations Summary This report analyzes the status of many of the major foreign terrorist organizations that are a threat to the United States, placing special emphasis on issues of potential concern to Congress. The terrorist organizations included are those designated and listed by the Secretary of State as “Foreign Terrorist Organizations.” (For analysis of the operation and effectiveness of this list overall, see also The ‘FTO List’ and Congress: Sanctioning Designated Foreign Terrorist Organizations, CRS Report RL32120.) The designated terrorist groups described in this report are: Abu Nidal Organization (ANO) Abu Sayyaf Group (ASG) Al-Aqsa Martyrs Brigade Armed Islamic Group (GIA) ‘Asbat al-Ansar Aum Supreme Truth (Aum) Aum Shinrikyo, Aleph Basque Fatherland and Liberty (ETA) Communist Party of Philippines/New People’s Army (CPP/NPA) Al-Gama’a al-Islamiyya (Islamic Group, IG) HAMAS (Islamic Resistance Movement) Harakat ul-Mujahidin (HUM) Hizballah (Party of God) Islamic Movement of Uzbekistan (IMU) Jaish-e-Mohammed (JEM) Jemaah Islamiya (JI) Al-Jihad (Egyptian Islamic Jihad) Kahane Chai (Kach) Kurdistan Workers’ Party (PKK, KADEK) Lashkar-e-Tayyiba
    [Show full text]
  • Proquest Dissertations
    NOTE TO USERS Page(s) missing in number only; text follows. The manuscript was microfilmed as received. 27 This reproduction is the best copy available. UMI~ COUNTERFEIT AND CONTRABAND CIGARETTE SMUGGLING: OPPORTUNITIES, ACTORS, AND GUARDIANSHIP By Sharon Anne Melzer Submitted to the F acuity of the School of Public Affairs of American University in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy In Justice, Law and Society Chair:~~ Louise I. Shelley, PhD ~~~ Dean of the School of Public Affairs Date 2010 American University Washington, D.C. 20016 AMERICAN U.WVERStrt LIBAARY ct 5Cf I UMI Number: 3417880 All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent upon the quality of the copy submitted. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. Also, if material had to be removed, a note will indicate the deletion. UMI ___...Dissertation Publishing...___ UMI 3417880 Copyright 201 O by ProQuest LLC. All rights reserved. This edition of the work is protected against unauthorized copying under Title 17, United States Code. Pro uesr ProQuest LLC 789 East Eisenhower Parkway P.O. Box 1346 Ann Arbor, Ml 48106-1346 ©COPYRIGHT by Sharon Anne Melzer 2010 ALL RIGHTS RESERVED COUNTERFEIT AND CONTRABAND CIGARETTE SMUGGLING: OPPORTUNITIES, ACTORS, AND GUARDIANSHIP By Sharon Anne Melzer ABSTRACT Contraband and counterfeit cigarette smuggling provides organized crime and terrorist organizations with a sizable revenue stream that does not come with the risks and punishments that are associated with other illicit commodities, such as drugs and weapons.
    [Show full text]
  • SJR 21: Illegal Cigarette Trafficking
    SJR 21: Illegal Cigarette Trafficking September 5, 2012 Overview • Study Authorization • Methodology • Why Does Trafficking Occur? • Methods Used by Traffickers • Financial Impact of Trafficking • Beneficiaries of Trafficking • November Meeting VIRGINIA STATE CRIME COMMISSION 2 Study Authorization • Senate Joint Resolution 21 (Illegal Cigarette Trafficking) was introduced by Senator Howell during the Regular Session of the 2012 General Assembly. • The resolution specifically directs focus upon a number of issues related to illegal cigarette trafficking: – (i) determine why illegal cigarette trafficking occurs; – (ii) identify the methods of illegal cigarette trafficking and the strategies used by smugglers; VIRGINIA STATE CRIME COMMISSION 3 Study Authorization • The resolution directs focus upon (continued): – (iii) document the effects and financial impact of illegal cigarette trafficking on State and local governments; – (iv) identify the methods used to counterfeit cigarettes and cigarette tax stamps and the prevalence of these methods in the Commonwealth on the availability of counterfeit cigarettes and cigarette tax stamps; – (v) determine the beneficiaries of illegal cigarette trafficking; – (vi) review statutory options to combat illegal cigarette trafficking; VIRGINIA STATE CRIME COMMISSION 4 Study Authorization • The resolution directs focus upon (continued): – (vii) identify potential uses of information technology to prevent illegal cigarette trafficking and assess the costs and benefits of using such technology; – (viii) develop
    [Show full text]
  • Islamist and Middle Eastern Terrorism: a Threat to Europe?
    © Rubbettino Centro Militare di Studi Strategici - Roma © Rubbettino Islamist and Middle Eastern Terrorism: A threat to Europe? Maria do Céu Pinto (University of Minho Portugal) Rubbettino © Rubbettino Copyright © by CeMiSS Centro Militare di Studi Strategici Piazza della Rovere, 83 - 00165 Roma (RM) e-mail: [email protected] © 2004 - Rubbettino Editore 88049 Soveria Mannelli - Viale Rosario Rubbettino, 10 -Tel. (0968) 662034 www.rubbettino.it © Rubbettino Index Abstract: 7 Introduction 9 I Islamist and Middle Eastern Terrorism in Europe: The Background 11 I.1. Palestinian Terrorism 11 I.2. Iranian Terrorism 17 II New Patterns of Islamist Terrorism in the 1990s 21 II.1. A New Age of Terrorism 21 II.2. Religious Terrorism 22 III The Web of Terror in Europe 31 III.1. Interlocking Terror Plots 31 III.2. Al-Qaeda: an Umbrella Network 32 III.3. Mosques: Recruitment and Indoctrination 36 IV Groups and Activities of Islamic Terrorists in Europe 41 IV.1. England 41 IV.2. France And Belgium 49 IV.3. Italy 53 IV.4. Germany 62 IV.5. Spain 65 IV.6. The Netherlands 71 V Evaluating the Terrorist Threat to Europe’s Security 75 V.1. Al-Qaeda’s European Infrastructure after 11th September 75 V.2. Islamic Communities in Europe: A Breeding Ground of Terrorists? 76 Conclusion 77 Bibliography 79 © Rubbettino 5 © Rubbettino Abstract During three decades Middle Eastern terrorism in Europe was largely a spillover from problems in the Middle East. Europe was a preferential oper- ational area for Arab, Palestinian and Iranian terrorists fighting each other. In the 1990s, a new Islamic threat emerged as a result of the activities of “ad hoc” terrorist groups, which lack a well-established organisational identity and tend to decentralise and compartmentalise their activities.
    [Show full text]
  • Islamist Terrorism in Northwestern Africa a ‘Thorn in the Neck’ of the United States?
    Islamist Terrorism in Northwestern Africa A ‘Thorn in the Neck’ of the United States? Emily Hunt Policy Focus #65 | February 2007 All rights reserved. Printed in the United States of America. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any infor- mation storage and retrieval system, without permission in writing from the publisher. © 2007 by the Washington Institute for Near East Policy Published in 2007 in the United States of America by the Washington Institute for Near East Policy, 1828 L Street NW, Suite 1050, Washington, DC 20036. Design by Daniel Kohan, Sensical Design and Communication Front cover: A Nigerian girl walks past a wall displaying graffiti and political posters on the eve of presidential elections, April 18, 2003. Copyright AP Wide World Photos/Schalk van Zuydam. About the Author Emily Hunt is a former Soref fellow at The Washington Institute, where she studied North African terrorist net- works. Prior to joining the Institute, she worked as a terrorism consultant for the London security firm Aegis Defence Services. Ms. Hunt is currently a research fellow with the International Assessment and Strategy Center. She holds a master’s degree in war studies from King’s College, London, and a bachelor’s degree from the Univer- sity of St Andrews, Scotland. n n n The opinions expressed in this Policy Focus are those of the author and not necessarily those of the Washington Institute for Near East Policy, its Board of Trustees, or its Board of Advisors.
    [Show full text]
  • Federal Register/Vol. 68, No. 164/Monday, August 25, 2003
    51048 Federal Register / Vol. 68, No. 164 / Monday, August 25, 2003 / Notices Clearance Officer, Jacqueline White, Dated: August 19, 2003. SUPPLEMENTARY INFORMATION: UN Small Business Administration, 409 3rd Herbert L. Mitchell, Security Council Resolutions 1390 Street, SW., 5th Floor, Washington, DC Associate Administrator for Disaster (2002) and 1455 (2003) require UN 20416; and OMB Reviewer, Office of Assistance. Member States to implement an arms Information and Regulatory Affairs, [FR Doc. 03–21673 Filed 8–22–03; 8:45 am] embargo (and other sanctions) against Office of Management and Budget, New BILLING CODE 8025–01–P those individuals, groups, undertakings Executive Office Building, Washington, and entities listed in the consolidated DC 20503. list created in accordance with UN FOR FURTHER INFORMATION CONTACT: SMALL BUSINESS ADMINISTRATION Security Council Resolutions 1267 Jacqueline White, Agency Clearance (1999) and 1333 (2000) and maintained Officer, (202) 205–7044. Delegation of Authority as to Denial of by the UN 1267 Sanctions Committee. Liability on 7(a) Loans Specifically, the resolutions require that SUPPLEMENTARY INFORMATION: Member States prevent the direct or The Administrator of the U.S. Small Title: Reports to SBA, Provisions of 13 indirect supply, sale and transfer, to Business Administration (SBA), Hector CFR 120.472. those on the 1267 Sanctions Committee V. Barreto, pursuant to the authority No: N/A. list, from their territories or by their Frequency: On Occasion. vested in him by the Small Business nationals outside their territories, or Description of Respondents: Small Act, 72 Stat. 384, as amended, hereby using their flag vessels or aircraft, of Business Lending Companies. delegates to the Associate Deputy arms and related material of all types Responses: 14.
    [Show full text]
  • The European Angle to the U.S. Terror Threat Robin Simcox | Emily Dyer
    AL-QAEDA IN THE UNITED STATES THE EUROPEAN ANGLE TO THE U.S. TERROR THREAT Robin Simcox | Emily Dyer THE EUROPEAN ANGLE TO THE U.S. TERROR THREAT EXECUTIVE SUMMARY • Nineteen individuals (11% of the overall total) who committed al-Qaeda related offenses (AQROs) in the U.S. between 1997 and 2011 were either European citizens or had previously lived in Europe. • The threat to America from those linked to Europe has remained reasonably constant – with European- linked individuals committing AQROs in ten of the fifteen years studied. • The majority (63%) of the nineteen European-linked individuals were unemployed, including all individuals who committed AQROs between 1998 and 2001, and from 2007 onwards. • 42% of individuals had some level of college education. Half of these individuals committed an AQRO between 1998 and 2001, while the remaining two individuals committed offenses in 2009. • 16% of offenders with European links were converts to Islam. Between 1998 and 2001, and between 2003 and 2009, there were no offenses committed by European-linked converts. • Over two thirds (68%) of European-linked offenders had received terrorist training, primarily in Afghanistan. However, nine of the ten individuals who had received training in Afghanistan committed their AQRO before 2002. Only one individual committed an AQRO afterwards (Oussama Kassir, whose charges were filed in 2006). • Among all trained individuals, 92% committed an AQRO between 1998 and 2006. • 16% of individuals had combat experience. However, there were no European-linked individuals with combat experience who committed an AQRO after 2005. • Active Participants – individuals who committed or were imminently about to commit acts of terrorism, or were formal members of al-Qaeda – committed thirteen AQROs (62%).
    [Show full text]
  • The Jihadist Threat in France CLARA BEYLER
    The Jihadist Threat in France CLARA BEYLER INCE THE MADRID AND LONDON BOMBINGS, Europeans elsewhere— fearful that they may become the next targets of Islamist terrorism— are finally beginning to face the consequences of the long, unchecked Sgrowth of radical Islam on their continent. The July bombings in London, while having the distinction of being the first suicide attacks in Western Eu- rope, were not the first time terrorists targeted a major European subway system. Ten years ago, a group linked to the Algerian Armed Islamic Group (Groupe Islamique Armé—GIA) unleashed a series of bombings on the Paris metro system. Since 1996, however, France has successfully avoided any ma- jor attack on its soil by an extremist Muslim group. This is due not to any lack of terrorist attempts—(only last September, France arrested nine members of a radical Islamist cell planning to attack the metro system)—but rather to the efficiency of the French counterterrorist services.1 France is now home to between five to six million Muslims—the sec- ond largest religious group in France, and the largest Muslim population in any Western European country.2 The majority of this very diverse population practices and believes in an apolitical, nonviolent Islam.3 A minority of them, however, are extremists. Islamist groups are actively operating in France to- day, spreading radical ideology and recruiting for future terrorist attacks on French soil and abroad. The purpose of this paper is to provide an overview of France’s Islamist groups, the evolving threats they have posed and continue to pose to French society, and the response of the French authorities to these threats.
    [Show full text]
  • Updated List Is Attached to This Letter
    TERRORISM U.S. Department of the Treasury Office of Foreign Assets Control What WhatYou YouNeed Need To To Know Know AboutAbout U.S. The Sanctions U.S. Embargo Executive Order 13224 blocking Terrorist Property and a summary of the Terrorism Sanctions Regulations (Title 31 Part 595 of the U.S. Code of Federal Regulations), Terrorism List Governments Sanctions Regulations (Title 31 Part 596 of the U.S. Code of Federal Regulations), and Foreign Terrorist Organizations Sanctions Regulations (Title 31 Part 597 of the U.S. Code of Federal Regulations) EXECUTIVE ORDER 13224 - BLOCKING PROPERTY AND PROHIBITING TRANSACTIONS WITH PERSONS WHO COMMIT, THREATEN TO COMMIT, OR SUPPORT TERRORISM By the authority vested in me as President by the Constitution and the laws of the United States of America, including the International Emergency Economic Powers Act (50 U.S.C. 1701 et seq.)(IEEPA), the National Emergencies Act (50 U.S.C. 1601 et seq.), section 5 of the United Nations Participation Act of 1945, as amended (22 U.S.C. 287c) (UNPA), and section 301 of title 3, United States Code, and in view of United Nations Security Council Resolution (UNSCR) 1214 of December 8, 1998, UNSCR 1267 of October 15, 1999, UNSCR 1333 of December 19, 2000, and the multilateral sanctions contained therein, and UNSCR 1363 of July 30, 2001, establishing a mechanism to monitor the implementation of UNSCR 1333, I, GEORGE W. BUSH, President of the United States of America, find that grave acts of terrorism and threats of terrorism committed by foreign terrorists, including
    [Show full text]
  • An Analysis of Hezbollah's Use of Irregular Warfare (2012)
    AN ANALYSIS OF HEZBOLLAH’S USE OF IRREGULAR WARFARE STEPHEN KEITH MULHERN Intelligence and National Security Studies Program APPROVED: Larry A. Valero, Ph.D., Chair Charles R. Boehmer, Ph.D. William T. Dean, III, Ph.D. Benjamin C. Flores, Ph.D. Dean of the Graduate School Copyright © by Stephen Keith Mulhern 2012 Dedication To Mom and Dad, Thank you. AN ANALYSIS OF HEZBOLLAH’S USE OF IRREGULAR WARFARE by STEPHEN KEITH MULHERN, B.A. Political Science THESIS Presented to the Faculty of the Graduate School of The University of Texas at El Paso in Partial Fulfillment of the Requirements for the Degree of MASTER OF SCIENCE Intelligence and National Security Studies Program THE UNIVERSITY OF TEXAS AT EL PASO December 2012 Acknowledgements I would like to thank: Drs. Larry Valero, Charles Boehmer, and William Dean for taking the time to be part of this thesis. Lisa Tomaka, Nicholas Komorowski, and Dr. Dennis Soden for giving me a productive and supportive workplace. And my parents, Michael and Linda Mulhern, for giving me the parental support to finish this work. v Abstract Low-intensity conflicts and insurgencies have been on the rise since the end of World War II. A particularly strong example of these conflicts is the ongoing conflict between the Lebanese Hezbollah and the state of Israel. In the course of the conflict, Hezbollah was able to accomplish what other, more powerful Arab states could not; Hezbollah forced Israel to unilaterally end a conflict. How did Hezbollah accomplish this? This thesis will provide a qualitative analysis of Hezbollah’s use of the instruments of power in their irregular warfare strategy against Israel during the occupation of southern Lebanon.
    [Show full text]