US TERRORIST BORDER CROSSING DATA COLLECTION BORDER-CROSSING EVENT CODEBOOK Version
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Chapter 7 War on Terror
Chapter 7 War on Terror Thou shall not kill – But we will. In July 2005, Ahmed Ressam was sentenced to 22 years of impris- onment after a jury convicted him of an attempt to bomb Los Angeles International Airport on the eve of the millennium. Emphasizing the rule of law in punishing terrorists, US District Judge John C. Coughenour made the following comments during the sentencing hearing: I would like to convey the message that our system works. We did not need to use a secret military tribunal, or detain the defendant indefinitely as an enemy combatant, or deny him the right to coun- sel, or invoke any proceedings beyond those guaranteed by or con- trary to the US Constitution...Despite the fact that Mr. Ressam is not an American citizen and despite the fact that he entered this country intent upon killing American citizens, he received an effec- tive, vigorous defense, and the opportunity to have his guilt or inno- cence determined by a jury of 12 ordinary citizens. Most importantly, all of this occurred in the sunlight of a public trial. There were no secret proceedings, no indefinite detention, no denial of counsel. The tragedy of September 11th shook our sense of security and made us realize that we, too, are vulnerable to acts of terrorism. Unfortunately, some believe that this threat renders our Constitution obsolete. The war on terror is the antithesis of the criminal justice system that Judge Coughenour describes above. The criminal justice sys- tem is the peacetime legal infrastructure to arrest, indict, prose- War on Terror 249 cute, and punish persons accused of committing terrorists acts. -
Consolidated UN Security Council Sanctions List Last Updated on 14 October 2015
The Consolidated UN Security Council Sanctions List Last updated on 14 October 2015 Consolidated United Nations Security Council Sanctions List Generated on: 14 October 2015 Composition of the List The list consists of the two sections specified below: A. Individuals B. Entities and other groups Information about de-listing may be found on the Committee's website at: http://www.un.org/sc/committees /dfp.shtml and http://www.un.org/sc/committees/1267/delisting.shtml . A. Individuals TAi.155 Name: 1: ABDUL AZIZ 2: ABBASIN 3: na 4: na 56 ا:Name (original script): 123456 879 Title: na Designation: na DOB: 1969 POB: Sheykhan Village, Pirkowti Area, Orgun District, Paktika Arovince, Afghanistan Good quality a.k.a.: Abdul ABiB Mahsud Low quality a.k.a.: na Nationality: na Passport no.: na National identification no.: na Address: na Listed on: 4 Oct. 2011 (amended on 22 Apr. 2013 ) Other information: Fey commander in the Haqqani Net ork (TAe.012) under SiraIuddin Jallaloudine Haqqani (TAi.144). Taliban Shadow Governor for Orgun District, Paktika Province as of early 2010. Operated a training camp for non-Afghan fighters in Paktika Province. Has been involved in the transport of weapons to Afghanistan. QDi.012 Name: 1: NASHWAN 2: A-. AL-RA//AM 3: A-. AL--AMI 4: na TUVاﻥ 56 ا:Rﺯاق 56 ا:Name (original script): NO45 Title: na Designation: na DOB: 1961 POB: Cosul, IraH Good quality a.k.a.: a) Abdal Al-Hadi Al-Iraqi b) Abd Al-Hadi Al-Iraqi Low quality a.k.a.: Abu Abdallah Nationality: Iraqi Passport no.: na National identification no.: na Address: na Listed on: 6 Oct. -
Foreign Terrorist Organizations
Order Code RL32223 CRS Report for Congress Received through the CRS Web Foreign Terrorist Organizations February 6, 2004 Audrey Kurth Cronin Specialist in Terrorism Foreign Affairs, Defense, and Trade Division Huda Aden, Adam Frost, and Benjamin Jones Research Associates Foreign Affairs, Defense, and Trade Division Congressional Research Service ˜ The Library of Congress Foreign Terrorist Organizations Summary This report analyzes the status of many of the major foreign terrorist organizations that are a threat to the United States, placing special emphasis on issues of potential concern to Congress. The terrorist organizations included are those designated and listed by the Secretary of State as “Foreign Terrorist Organizations.” (For analysis of the operation and effectiveness of this list overall, see also The ‘FTO List’ and Congress: Sanctioning Designated Foreign Terrorist Organizations, CRS Report RL32120.) The designated terrorist groups described in this report are: Abu Nidal Organization (ANO) Abu Sayyaf Group (ASG) Al-Aqsa Martyrs Brigade Armed Islamic Group (GIA) ‘Asbat al-Ansar Aum Supreme Truth (Aum) Aum Shinrikyo, Aleph Basque Fatherland and Liberty (ETA) Communist Party of Philippines/New People’s Army (CPP/NPA) Al-Gama’a al-Islamiyya (Islamic Group, IG) HAMAS (Islamic Resistance Movement) Harakat ul-Mujahidin (HUM) Hizballah (Party of God) Islamic Movement of Uzbekistan (IMU) Jaish-e-Mohammed (JEM) Jemaah Islamiya (JI) Al-Jihad (Egyptian Islamic Jihad) Kahane Chai (Kach) Kurdistan Workers’ Party (PKK, KADEK) Lashkar-e-Tayyiba -
Proquest Dissertations
NOTE TO USERS Page(s) missing in number only; text follows. The manuscript was microfilmed as received. 27 This reproduction is the best copy available. UMI~ COUNTERFEIT AND CONTRABAND CIGARETTE SMUGGLING: OPPORTUNITIES, ACTORS, AND GUARDIANSHIP By Sharon Anne Melzer Submitted to the F acuity of the School of Public Affairs of American University in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy In Justice, Law and Society Chair:~~ Louise I. Shelley, PhD ~~~ Dean of the School of Public Affairs Date 2010 American University Washington, D.C. 20016 AMERICAN U.WVERStrt LIBAARY ct 5Cf I UMI Number: 3417880 All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent upon the quality of the copy submitted. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. Also, if material had to be removed, a note will indicate the deletion. UMI ___...Dissertation Publishing...___ UMI 3417880 Copyright 201 O by ProQuest LLC. All rights reserved. This edition of the work is protected against unauthorized copying under Title 17, United States Code. Pro uesr ProQuest LLC 789 East Eisenhower Parkway P.O. Box 1346 Ann Arbor, Ml 48106-1346 ©COPYRIGHT by Sharon Anne Melzer 2010 ALL RIGHTS RESERVED COUNTERFEIT AND CONTRABAND CIGARETTE SMUGGLING: OPPORTUNITIES, ACTORS, AND GUARDIANSHIP By Sharon Anne Melzer ABSTRACT Contraband and counterfeit cigarette smuggling provides organized crime and terrorist organizations with a sizable revenue stream that does not come with the risks and punishments that are associated with other illicit commodities, such as drugs and weapons. -
SJR 21: Illegal Cigarette Trafficking
SJR 21: Illegal Cigarette Trafficking September 5, 2012 Overview • Study Authorization • Methodology • Why Does Trafficking Occur? • Methods Used by Traffickers • Financial Impact of Trafficking • Beneficiaries of Trafficking • November Meeting VIRGINIA STATE CRIME COMMISSION 2 Study Authorization • Senate Joint Resolution 21 (Illegal Cigarette Trafficking) was introduced by Senator Howell during the Regular Session of the 2012 General Assembly. • The resolution specifically directs focus upon a number of issues related to illegal cigarette trafficking: – (i) determine why illegal cigarette trafficking occurs; – (ii) identify the methods of illegal cigarette trafficking and the strategies used by smugglers; VIRGINIA STATE CRIME COMMISSION 3 Study Authorization • The resolution directs focus upon (continued): – (iii) document the effects and financial impact of illegal cigarette trafficking on State and local governments; – (iv) identify the methods used to counterfeit cigarettes and cigarette tax stamps and the prevalence of these methods in the Commonwealth on the availability of counterfeit cigarettes and cigarette tax stamps; – (v) determine the beneficiaries of illegal cigarette trafficking; – (vi) review statutory options to combat illegal cigarette trafficking; VIRGINIA STATE CRIME COMMISSION 4 Study Authorization • The resolution directs focus upon (continued): – (vii) identify potential uses of information technology to prevent illegal cigarette trafficking and assess the costs and benefits of using such technology; – (viii) develop -
Islamist and Middle Eastern Terrorism: a Threat to Europe?
© Rubbettino Centro Militare di Studi Strategici - Roma © Rubbettino Islamist and Middle Eastern Terrorism: A threat to Europe? Maria do Céu Pinto (University of Minho Portugal) Rubbettino © Rubbettino Copyright © by CeMiSS Centro Militare di Studi Strategici Piazza della Rovere, 83 - 00165 Roma (RM) e-mail: [email protected] © 2004 - Rubbettino Editore 88049 Soveria Mannelli - Viale Rosario Rubbettino, 10 -Tel. (0968) 662034 www.rubbettino.it © Rubbettino Index Abstract: 7 Introduction 9 I Islamist and Middle Eastern Terrorism in Europe: The Background 11 I.1. Palestinian Terrorism 11 I.2. Iranian Terrorism 17 II New Patterns of Islamist Terrorism in the 1990s 21 II.1. A New Age of Terrorism 21 II.2. Religious Terrorism 22 III The Web of Terror in Europe 31 III.1. Interlocking Terror Plots 31 III.2. Al-Qaeda: an Umbrella Network 32 III.3. Mosques: Recruitment and Indoctrination 36 IV Groups and Activities of Islamic Terrorists in Europe 41 IV.1. England 41 IV.2. France And Belgium 49 IV.3. Italy 53 IV.4. Germany 62 IV.5. Spain 65 IV.6. The Netherlands 71 V Evaluating the Terrorist Threat to Europe’s Security 75 V.1. Al-Qaeda’s European Infrastructure after 11th September 75 V.2. Islamic Communities in Europe: A Breeding Ground of Terrorists? 76 Conclusion 77 Bibliography 79 © Rubbettino 5 © Rubbettino Abstract During three decades Middle Eastern terrorism in Europe was largely a spillover from problems in the Middle East. Europe was a preferential oper- ational area for Arab, Palestinian and Iranian terrorists fighting each other. In the 1990s, a new Islamic threat emerged as a result of the activities of “ad hoc” terrorist groups, which lack a well-established organisational identity and tend to decentralise and compartmentalise their activities. -
Islamist Terrorism in Northwestern Africa a ‘Thorn in the Neck’ of the United States?
Islamist Terrorism in Northwestern Africa A ‘Thorn in the Neck’ of the United States? Emily Hunt Policy Focus #65 | February 2007 All rights reserved. Printed in the United States of America. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any infor- mation storage and retrieval system, without permission in writing from the publisher. © 2007 by the Washington Institute for Near East Policy Published in 2007 in the United States of America by the Washington Institute for Near East Policy, 1828 L Street NW, Suite 1050, Washington, DC 20036. Design by Daniel Kohan, Sensical Design and Communication Front cover: A Nigerian girl walks past a wall displaying graffiti and political posters on the eve of presidential elections, April 18, 2003. Copyright AP Wide World Photos/Schalk van Zuydam. About the Author Emily Hunt is a former Soref fellow at The Washington Institute, where she studied North African terrorist net- works. Prior to joining the Institute, she worked as a terrorism consultant for the London security firm Aegis Defence Services. Ms. Hunt is currently a research fellow with the International Assessment and Strategy Center. She holds a master’s degree in war studies from King’s College, London, and a bachelor’s degree from the Univer- sity of St Andrews, Scotland. n n n The opinions expressed in this Policy Focus are those of the author and not necessarily those of the Washington Institute for Near East Policy, its Board of Trustees, or its Board of Advisors. -
Federal Register/Vol. 68, No. 164/Monday, August 25, 2003
51048 Federal Register / Vol. 68, No. 164 / Monday, August 25, 2003 / Notices Clearance Officer, Jacqueline White, Dated: August 19, 2003. SUPPLEMENTARY INFORMATION: UN Small Business Administration, 409 3rd Herbert L. Mitchell, Security Council Resolutions 1390 Street, SW., 5th Floor, Washington, DC Associate Administrator for Disaster (2002) and 1455 (2003) require UN 20416; and OMB Reviewer, Office of Assistance. Member States to implement an arms Information and Regulatory Affairs, [FR Doc. 03–21673 Filed 8–22–03; 8:45 am] embargo (and other sanctions) against Office of Management and Budget, New BILLING CODE 8025–01–P those individuals, groups, undertakings Executive Office Building, Washington, and entities listed in the consolidated DC 20503. list created in accordance with UN FOR FURTHER INFORMATION CONTACT: SMALL BUSINESS ADMINISTRATION Security Council Resolutions 1267 Jacqueline White, Agency Clearance (1999) and 1333 (2000) and maintained Officer, (202) 205–7044. Delegation of Authority as to Denial of by the UN 1267 Sanctions Committee. Liability on 7(a) Loans Specifically, the resolutions require that SUPPLEMENTARY INFORMATION: Member States prevent the direct or The Administrator of the U.S. Small Title: Reports to SBA, Provisions of 13 indirect supply, sale and transfer, to Business Administration (SBA), Hector CFR 120.472. those on the 1267 Sanctions Committee V. Barreto, pursuant to the authority No: N/A. list, from their territories or by their Frequency: On Occasion. vested in him by the Small Business nationals outside their territories, or Description of Respondents: Small Act, 72 Stat. 384, as amended, hereby using their flag vessels or aircraft, of Business Lending Companies. delegates to the Associate Deputy arms and related material of all types Responses: 14. -
The European Angle to the U.S. Terror Threat Robin Simcox | Emily Dyer
AL-QAEDA IN THE UNITED STATES THE EUROPEAN ANGLE TO THE U.S. TERROR THREAT Robin Simcox | Emily Dyer THE EUROPEAN ANGLE TO THE U.S. TERROR THREAT EXECUTIVE SUMMARY • Nineteen individuals (11% of the overall total) who committed al-Qaeda related offenses (AQROs) in the U.S. between 1997 and 2011 were either European citizens or had previously lived in Europe. • The threat to America from those linked to Europe has remained reasonably constant – with European- linked individuals committing AQROs in ten of the fifteen years studied. • The majority (63%) of the nineteen European-linked individuals were unemployed, including all individuals who committed AQROs between 1998 and 2001, and from 2007 onwards. • 42% of individuals had some level of college education. Half of these individuals committed an AQRO between 1998 and 2001, while the remaining two individuals committed offenses in 2009. • 16% of offenders with European links were converts to Islam. Between 1998 and 2001, and between 2003 and 2009, there were no offenses committed by European-linked converts. • Over two thirds (68%) of European-linked offenders had received terrorist training, primarily in Afghanistan. However, nine of the ten individuals who had received training in Afghanistan committed their AQRO before 2002. Only one individual committed an AQRO afterwards (Oussama Kassir, whose charges were filed in 2006). • Among all trained individuals, 92% committed an AQRO between 1998 and 2006. • 16% of individuals had combat experience. However, there were no European-linked individuals with combat experience who committed an AQRO after 2005. • Active Participants – individuals who committed or were imminently about to commit acts of terrorism, or were formal members of al-Qaeda – committed thirteen AQROs (62%). -
The Jihadist Threat in France CLARA BEYLER
The Jihadist Threat in France CLARA BEYLER INCE THE MADRID AND LONDON BOMBINGS, Europeans elsewhere— fearful that they may become the next targets of Islamist terrorism— are finally beginning to face the consequences of the long, unchecked Sgrowth of radical Islam on their continent. The July bombings in London, while having the distinction of being the first suicide attacks in Western Eu- rope, were not the first time terrorists targeted a major European subway system. Ten years ago, a group linked to the Algerian Armed Islamic Group (Groupe Islamique Armé—GIA) unleashed a series of bombings on the Paris metro system. Since 1996, however, France has successfully avoided any ma- jor attack on its soil by an extremist Muslim group. This is due not to any lack of terrorist attempts—(only last September, France arrested nine members of a radical Islamist cell planning to attack the metro system)—but rather to the efficiency of the French counterterrorist services.1 France is now home to between five to six million Muslims—the sec- ond largest religious group in France, and the largest Muslim population in any Western European country.2 The majority of this very diverse population practices and believes in an apolitical, nonviolent Islam.3 A minority of them, however, are extremists. Islamist groups are actively operating in France to- day, spreading radical ideology and recruiting for future terrorist attacks on French soil and abroad. The purpose of this paper is to provide an overview of France’s Islamist groups, the evolving threats they have posed and continue to pose to French society, and the response of the French authorities to these threats. -
Updated List Is Attached to This Letter
TERRORISM U.S. Department of the Treasury Office of Foreign Assets Control What WhatYou YouNeed Need To To Know Know AboutAbout U.S. The Sanctions U.S. Embargo Executive Order 13224 blocking Terrorist Property and a summary of the Terrorism Sanctions Regulations (Title 31 Part 595 of the U.S. Code of Federal Regulations), Terrorism List Governments Sanctions Regulations (Title 31 Part 596 of the U.S. Code of Federal Regulations), and Foreign Terrorist Organizations Sanctions Regulations (Title 31 Part 597 of the U.S. Code of Federal Regulations) EXECUTIVE ORDER 13224 - BLOCKING PROPERTY AND PROHIBITING TRANSACTIONS WITH PERSONS WHO COMMIT, THREATEN TO COMMIT, OR SUPPORT TERRORISM By the authority vested in me as President by the Constitution and the laws of the United States of America, including the International Emergency Economic Powers Act (50 U.S.C. 1701 et seq.)(IEEPA), the National Emergencies Act (50 U.S.C. 1601 et seq.), section 5 of the United Nations Participation Act of 1945, as amended (22 U.S.C. 287c) (UNPA), and section 301 of title 3, United States Code, and in view of United Nations Security Council Resolution (UNSCR) 1214 of December 8, 1998, UNSCR 1267 of October 15, 1999, UNSCR 1333 of December 19, 2000, and the multilateral sanctions contained therein, and UNSCR 1363 of July 30, 2001, establishing a mechanism to monitor the implementation of UNSCR 1333, I, GEORGE W. BUSH, President of the United States of America, find that grave acts of terrorism and threats of terrorism committed by foreign terrorists, including -
An Analysis of Hezbollah's Use of Irregular Warfare (2012)
AN ANALYSIS OF HEZBOLLAH’S USE OF IRREGULAR WARFARE STEPHEN KEITH MULHERN Intelligence and National Security Studies Program APPROVED: Larry A. Valero, Ph.D., Chair Charles R. Boehmer, Ph.D. William T. Dean, III, Ph.D. Benjamin C. Flores, Ph.D. Dean of the Graduate School Copyright © by Stephen Keith Mulhern 2012 Dedication To Mom and Dad, Thank you. AN ANALYSIS OF HEZBOLLAH’S USE OF IRREGULAR WARFARE by STEPHEN KEITH MULHERN, B.A. Political Science THESIS Presented to the Faculty of the Graduate School of The University of Texas at El Paso in Partial Fulfillment of the Requirements for the Degree of MASTER OF SCIENCE Intelligence and National Security Studies Program THE UNIVERSITY OF TEXAS AT EL PASO December 2012 Acknowledgements I would like to thank: Drs. Larry Valero, Charles Boehmer, and William Dean for taking the time to be part of this thesis. Lisa Tomaka, Nicholas Komorowski, and Dr. Dennis Soden for giving me a productive and supportive workplace. And my parents, Michael and Linda Mulhern, for giving me the parental support to finish this work. v Abstract Low-intensity conflicts and insurgencies have been on the rise since the end of World War II. A particularly strong example of these conflicts is the ongoing conflict between the Lebanese Hezbollah and the state of Israel. In the course of the conflict, Hezbollah was able to accomplish what other, more powerful Arab states could not; Hezbollah forced Israel to unilaterally end a conflict. How did Hezbollah accomplish this? This thesis will provide a qualitative analysis of Hezbollah’s use of the instruments of power in their irregular warfare strategy against Israel during the occupation of southern Lebanon.