Cyberspace and National Security

Total Page:16

File Type:pdf, Size:1020Kb

Cyberspace and National Security Cyberspace and National Security Selected Articles III Edited by Gabi Siboni המכון למחקרי ביטחון לאומי THE INSTITUTE FOR NATIONAL SECURITYc STUDIES INCORPORATING THE JAFFEE b d CENTER FOR STRATEGIC STUDIES Cyberspace and National Security Selected Articles III Edited by Gabi Siboni THE INSTITUTE FOR NATIONAL SECURcITY STUDIES INCORPORATING THE JAFFEE b d CENTER FOR STRATEGIC STUDIES Institute for National Security Studies THE INSTITUTE FOR NATIONAL SECURcITY STUDIES INCORPORATING THE JAFFEE b d CENTER FOR STRATEGIC STUDIES Graphic design: Michal Semo-Kovetz The Institute for National Security Studies (INSS), incorporating Printing: Elinir the Jaffee Center for Strategic Studies, was founded in 2006. The purpose of the Institute for National Security Studies Institute for National Security Studies is first, to conduct basic research that meets the highest (a public benefit company) academic standards on matters related to Israel’s national 40 Haim Levanon Street security as well as Middle East regional and international POB 39950 security affairs. Second, the Institute aims to contribute to Ramat Aviv the public debate and governmental deliberation of issues Tel Aviv 6997556 that are – or should be – at the top of Israel’s national security agenda. Tel. +972-3-640-0400 INSS seeks to address Israeli decision makers and Fax. +972-3-744-7590 policymakers, the defense establishment, public opinion makers, the academic community in Israel and abroad, and E-mail: [email protected] the general public. http://www.inss.org.il INSS publishes research that it deems worthy of public attention, while it maintains a strict policy of non-partisanship. © All rights reserved. The opinions expressed in this publication are the authors’ April 2015 alone, and do not necessarily reflect the views of the Institute, its trustees, boards, research staff, or the organization and ISBN: 978-965-7425-76-3 individuals that support its research. Contents Foreword | 5 The Islamic State’s Strategy in Cyberspace | 7 Gabi Siboni, Daniel Cohen, Tal Koren Commercial and Industrial Cyber Espionage in Israel | 25 Shahar Argaman and Gabi Siboni A Multidisciplinary Analysis of Cyber Information Sharing | 41 Aviram Zrahia Developments in Iranian Cyber Warfare 2013-2014 | 61 Gabi Siboni and Sami Kronenfeld Are Cyber Weapons Effective Military Tools? |83 Emilio Iasiello The Effect of Cyberwar Technologies on Force Buildup: The Israeli Case | 101 Gil Baram Cyber Weapons and International Stability: New Destabilization Threats Require New Security Doctrines | 123 Guy-Philippe Goldstein Cyber Defense from “Reduction in Asymmetrical Information” Strategies | 143 Guy-Philippe Goldstein Foreword Israel’s rapid development as a leader in cyberspace places it in a unique position to advance cyberspace research in Israel in general and at the Institute for National Security Studies in particular. In order to expand research and the scope of cyberspace activity, and given the fact that cyberspace does not recognize national or institutional boundaries and borders, we at the INSS have decided to extend the program and hold the annual cyberspace security conference in the United States. The Defensive Cyberspace Operations & Intelligence (DCOI) conference highlights core issues of security and defense in cyberspace and its related intelligence aspects. The conference, held this year in Washington D.C., is the product of collaboration between several institutions in Israel, the United States, and other countries. The conference’s focus on defensive operations and intelligence allows the INSS to showcase its own activity in this field and complement the range of operations carried out in Israel and around the world. The objectives of this year’s conference are manifold: developing the discourse of defense in cyberspace, the corporate and financial fields as well as in the field of critical infrastructures; enhancing cooperation among government bodies and institutions working in the field of cyberspace in Israel and the United States; exposing the Israeli cyberspace and technology market to foreign technological companies seeking to develop business with Israel and/or seeking to expose Israeli capabilities and technologies abroad; enhancing international cyberspace cooperation with friendly nations, etc. As is our custom every year, we offer those interested in cyberspace this unique publication, which brings together some of the products of cyberspace research and essays published by the INSS Cyber Security Program. The essays in this journal have been published in Military and Strategic Affairs and represent the efforts of INSS researchers and outside researchers working in tandem with its cyberspace program. Gabi Siboni Editor 5 The Islamic State’s Strategy in Cyberspace Gabi Siboni, Daniel Cohen, Tal Koren The success of the Islamic State (henceforth: ISIS) includes the integration of interrelated elements in a way that helps the organization consolidate its control of extensive regions, serve as the current spearhead in the global Jihad effort, and threaten the world with terrorist attacks carried out by its agents holding citizenship in a Western country. These agents are liable to return to their homeland and along with “lone wolves” they are liable to carry out terrorist attacks against targets in the West. The aim of this article is to examine ISIS’s model, as it is an organization that has successfully conquered many geographic areas while attracting public attention on an unprecedented global scale. The article will attempt to assess the organization’s unique strategy, which combines two key interrelated elements: extensive use of the social media on the one hand and extreme and savage cruelty on the other. Keywords: Islamic state, ISIS, social media, Iraq, Syria, terrorism Introduction In May 2004, an Islamic website published a video clip showing the execution of Nick Berg, a U.S. citizen, in Baghdad. The clip showed Berg in an orange prisoner’s uniform (the same worn by prisoners at Guantanamo Prison), beheaded by Abu Musab al-Zarqawi, the leader of al-Qaeda in Iraq. Ten years later, this video assumed horrifying historical significance with the publication of a video clip showing the beheading of American James Foley by agents of ISIS, carrying on the actions of Abu Musab al-Zarqawi. Dr. Gabi Siboni is a senior research fellow and the head of the INSS Cyber Security Program. Dr. Tal Korn is a research fellow in the Cyber Security Program. Daniel Cohen is a Research Fellow and coordinator of the Cyber Security Program. This article was first published in Military and Strategic Affairs 7, no. 1 (2015). 7 GABI SIBONI, DANIEL COHEN, TAL KOREN | THE ISLAMIC State’S STRategY IN CYBERspace The main difference between the two video clips is that the man who beheaded Foley spoke fluent English, and the professionally edited clip was spread virally throughout the entire world. Viewers in Western countries experienced a feeling of horror at the sight of a prisoner being led to the slaughter, not only because the victim seemed like their next-door neighbor, but because the slaughterer also represented the image of a neighbor. ISIS uses the global village of the information era, in which the boundaries between reality and imagination have been blurred using technological means available to everyone, in its call to its supporters in the West to make the hegira (immigration to the Islamic state) or join the jihad - “pack your suitcases or prepare explosive devices.” Psychological warfare in the service of terrorist organizations is not a new phenomenon. Carlos Marighella, one of the fathers of modern revolutionary terrorism, published The Mini-Manual of the Urban Guerilla in the 1960s, in which he referred to a war of “nerves” and psychological warfare. He asserted that governments will always be in a position of inferiority in combating psychological warfare used by a terrorist organization, as a result of the many resources used in counter efforts and censorship. According to Marighella, this investment is doomed to fail. In the digital and new media era, the challenges and threats have changed as a result of the new spheres in which a terrorist organization can operate to promote its political objectives. ISIS operates on a large scale in virtual space by using new media platforms that make censorship difficult. The position of inferiority in defending against this phenomenon is therefore significant, and requires observation and a solution to this threat that makes use of up-to-date tools. The wave of spontaneous terrorist attacks (“lone wolves”) in the U.S., Canada, Australia, Europe, and Israel highlights the emerging symbiotic connection between ISIS’s recruitment calls, propaganda, and terrorism against Western civilians and the various communications platforms made possible by virtual space. It incorporates terrorism executed by veterans who fought within ISIS ranks in Syria and Iraq and returned to the west, such as the murder of Israeli couple Mira and Emanuel Riva at the Jewish Museum in Brussels in May 2014 by Mehdi Nemmouche, a French citizen of Algerian origin who returned to Europe after fighting with jihad forces in Syria. These local unorganized terrorist actions, carried out “under the influence of ISIS” and inspired by it, include attacks by shooting 8 GABI SIBONI, DANIEL COHEN, TAL KOREN | THE ISLAMIC State’S STRategY IN CYBERspace and running over pedestrians in Canada, and attempted beheadings in Australia and the U.S. ISIS employs public relations, recruitment,
Recommended publications
  • A Counterintelligence Reader, Volume 2 Chapter 1, CI in World
    CI in World War II 113 CHAPTER 1 Counterintelligence In World War II Introduction President Franklin Roosevelts confidential directive, issued on 26 June 1939, established lines of responsibility for domestic counterintelligence, but failed to clearly define areas of accountability for overseas counterintelligence operations" The pressing need for a decision in this field grew more evident in the early months of 1940" This resulted in consultations between the President, FBI Director J" Edgar Hoover, Director of Army Intelligence Sherman Miles, Director of Naval Intelligence Rear Admiral W"S" Anderson, and Assistant Secretary of State Adolf A" Berle" Following these discussions, Berle issued a report, which expressed the Presidents wish that the FBI assume the responsibility for foreign intelligence matters in the Western Hemisphere, with the existing military and naval intelligence branches covering the rest of the world as the necessity arose" With this decision of authority, the three agencies worked out the details of an agreement, which, roughly, charged the Navy with the responsibility for intelligence coverage in the Pacific" The Army was entrusted with the coverage in Europe, Africa, and the Canal Zone" The FBI was given the responsibility for the Western Hemisphere, including Canada and Central and South America, except Panama" The meetings in this formative period led to a proposal for the organization within the FBI of a Special Intelligence Service (SIS) for overseas operations" Agreement was reached that the SIS would act
    [Show full text]
  • The Glamorization of Espionage in the International Spy Museum
    W&M ScholarWorks Undergraduate Honors Theses Theses, Dissertations, & Master Projects 5-2015 Counter to Intelligence: The Glamorization of Espionage in the International Spy Museum Melanie R. Wiggins College of William and Mary Follow this and additional works at: https://scholarworks.wm.edu/honorstheses Part of the American Film Studies Commons, American Material Culture Commons, American Popular Culture Commons, Other American Studies Commons, and the Sociology of Culture Commons Recommended Citation Wiggins, Melanie R., "Counter to Intelligence: The Glamorization of Espionage in the International Spy Museum" (2015). Undergraduate Honors Theses. Paper 133. https://scholarworks.wm.edu/honorstheses/133 This Honors Thesis is brought to you for free and open access by the Theses, Dissertations, & Master Projects at W&M ScholarWorks. It has been accepted for inclusion in Undergraduate Honors Theses by an authorized administrator of W&M ScholarWorks. For more information, please contact [email protected]. Counter to Intelligence: The Glamorization of Espionage in the International Spy Museum A thesis submitted in partial fulfillment of the requirement for the degree of Bachelor of Arts in American Studies from The College of William and Mary by Melanie Rose Wiggins Accepted for____________________________________________________ (Honors, High Honors, Highest Honors) _________________________________________________________ Alan Braddock, Director _________________________________________________________ Charlie McGovern _________________________________________________________
    [Show full text]
  • Space Security Index 2013
    SPACE SECURITY INDEX 2013 www.spacesecurity.org 10th Edition SPACE SECURITY INDEX 2013 SPACESECURITY.ORG iii Library and Archives Canada Cataloguing in Publications Data Space Security Index 2013 ISBN: 978-1-927802-05-2 FOR PDF version use this © 2013 SPACESECURITY.ORG ISBN: 978-1-927802-05-2 Edited by Cesar Jaramillo Design and layout by Creative Services, University of Waterloo, Waterloo, Ontario, Canada Cover image: Soyuz TMA-07M Spacecraft ISS034-E-010181 (21 Dec. 2012) As the International Space Station and Soyuz TMA-07M spacecraft were making their relative approaches on Dec. 21, one of the Expedition 34 crew members on the orbital outpost captured this photo of the Soyuz. Credit: NASA. Printed in Canada Printer: Pandora Print Shop, Kitchener, Ontario First published October 2013 Please direct enquiries to: Cesar Jaramillo Project Ploughshares 57 Erb Street West Waterloo, Ontario N2L 6C2 Canada Telephone: 519-888-6541, ext. 7708 Fax: 519-888-0018 Email: [email protected] Governance Group Julie Crôteau Foreign Aairs and International Trade Canada Peter Hays Eisenhower Center for Space and Defense Studies Ram Jakhu Institute of Air and Space Law, McGill University Ajey Lele Institute for Defence Studies and Analyses Paul Meyer The Simons Foundation John Siebert Project Ploughshares Ray Williamson Secure World Foundation Advisory Board Richard DalBello Intelsat General Corporation Theresa Hitchens United Nations Institute for Disarmament Research John Logsdon The George Washington University Lucy Stojak HEC Montréal Project Manager Cesar Jaramillo Project Ploughshares Table of Contents TABLE OF CONTENTS TABLE PAGE 1 Acronyms and Abbreviations PAGE 5 Introduction PAGE 9 Acknowledgements PAGE 10 Executive Summary PAGE 23 Theme 1: Condition of the space environment: This theme examines the security and sustainability of the space environment, with an emphasis on space debris; the potential threats posed by near-Earth objects; the allocation of scarce space resources; and the ability to detect, track, identify, and catalog objects in outer space.
    [Show full text]
  • Military and Strategic Affairs
    Military and Strategic Affairs Military and Strategic Military and Strategic Affairs Volume 6 | No. 1 | March 2014 In Retrospect: The Second Lebanon War Ehud Olmert Nuclear Weapons in Asia: Perils and Prospects Stephen J. Cimbala Commercial and Industrial Cyber Espionage in Israel Shahar Argaman and Gabi Siboni Blood and Treasure: On Military and Economic Thinking Saul Bronfeld Iron Dome’s Impact on the Military and Political Arena: Moral Justications for Israel to Launch a Military Operation against Terrorist and Guerrilla Organizations Liram Stenzler-Koblentz Russia’s Security Intentions in a Melting Arctic Lincoln Edson Flake המכון למחקרי ביטחון לאומי THE INSTITUTE FOR NATIONAL SECURITYc STUDIES INCORPORATING THE JAFFEE bd CENTER FOR STRATEGIC STUDIES ISSN 2307-193X (print) • E-ISSN 2307-8634 (online) Military and Strategic Affairs Volume 6 | No. 1 | March 2014 CONTENTS In Retrospect: The Second Lebanon War | 3 Ehud Olmert Nuclear Weapons in Asia: Perils and Prospects | 19 Stephen J. Cimbala Commercial and Industrial Cyber Espionage in Israel | 43 Shahar Argaman and Gabi Siboni Blood and Treasure: On Military and Economic Thinking | 59 Saul Bronfeld Iron Dome’s Impact on the Military and Political Arena: Moral Justifications for Israel to Launch a Military Operation against Terrorist and Guerrilla Organizations | 79 Liram Stenzler-Koblentz Russia’s Security Intentions in a Melting Arctic | 99 Lincoln Edson Flake The purpose of Military and Strategic Affairs is to stimulate Military and and enrich the public debate on military issues relating to Strategic Affairs Israel’s national security. Military and Strategic Affairs is a refereed journal published three times a year within the framework of the Military and Strategic Affairs Program at the Institute for National Security Studies.
    [Show full text]
  • Policy Institute Great American Conservative
    CLARE BOOTHE LUCE POLICY INSTITUTE 2017 CALENDAR GREAT AMERICAN CONSERVATIVE WOMEN Dear Friends, You know how important it is for courageous women to step up and speak out on behalf of your values. Young women need to learn not just conservative philosophy but also the importance of grace, honesty, values, personal and professional integrity, and the extraordinary uniqueness of America. As the upcoming generation matures and realizes that liberal policies - from abortion to out-of-control government - are hurting women, they are seeking out truth and mentorship. They need an alternative place to turn, rather than their radical leftwing campus “Women’s Centers.” This is why I founded the Clare Boothe Luce Policy Institute more than 24 years ago. I sought to create an organization unlike any in the Conservative Movement with its focus to train, support, and build strong conservative women. Today, our Institute educates and inspires tomorrow’s leaders. In a world where radical feminists and other leftists are promoted at every turn, CBLPI’s 2017 “Great American Conservative Women” calendar provides real role models for our young women. I am so grateful to our thousands of supporters who have a heart for young women and help us promote articulate, strong, and gracious conservative ladies in our 2017 calendars. Each of these ladies speaks for CBLPI at our events and on college campuses. If you are interested in hosting a campus speaker, or if you know of a student who may be interested, please contact us at (888) 891-4288. We are eager to
    [Show full text]
  • Exiled Hungarians in Argentina 1948-1968: the Formation of a Community Judith Kesserű Némethy, New York University Abstract
    Page 1 of 20 Némethy, Judith Kesserű. “Exiled Hungarians in Argentina 1948-1968: The Formation of a Community.” AHEA: E-journal of the American Hungarian Educators Association, Volume 5 (2012): http://ahea.net/e-journal/volume-5- 2012 Exiled Hungarians in Argentina 1948-1968: The Formation of a Community Judith Kesserű Némethy, New York University Abstract: This paper presents the cultural activism of a group of Hungarian émigrés who fled their homeland following Soviet occupation at the end of World War II and arrived in Argentina around 1948. It deals with the intellectual activity of these exiles, especially through their cultural and educational institutions. Within five years of their arrival as dispossessed “D.P.’s,” they founded a Hungarian Center (“Centro Húngaro”) that housed, among others, a theater group, a free university, a cultural and scientific academy, a weekend school, and scout troops. At the same time, new periodicals appeared, and a substantive number of books banned in Hungary were published. I argue that it is due to the work of these institutions that the community flourished and is vital to date, in spite of its isolation and lack of reinforcement through new emigrant waves, and in spite of its hostile relationship with the government of the People’s Republic of Hungary and of a series of Argentine economic crises that forced many of its members to re-emigrate. I also discuss the impact the exiles had on their descendants, contending that as a result of the strong cultural foundations laid by them during their first twenty years of emigration, third- and fourth-generation Hungarian-Argentines have maintained to this day a strong cultural and ethnic identity, while fully integrating into Argentine society at large.
    [Show full text]
  • Historical Dictionary of International Intelligence Second Edition
    The historical dictionaries present essential information on a broad range of subjects, including American and world history, art, business, cities, countries, cultures, customs, film, global conflicts, international relations, literature, music, philosophy, religion, sports, and theater. Written by experts, all contain highly informative introductory essays on the topic and detailed chronologies that, in some cases, cover vast historical time periods but still manage to heavily feature more recent events. Brief A–Z entries describe the main people, events, politics, social issues, institutions, and policies that make the topic unique, and entries are cross- referenced for ease of browsing. Extensive bibliographies are divided into several general subject areas, providing excellent access points for students, researchers, and anyone wanting to know more. Additionally, maps, pho- tographs, and appendixes of supplemental information aid high school and college students doing term papers or introductory research projects. In short, the historical dictionaries are the perfect starting point for anyone looking to research in these fields. HISTORICAL DICTIONARIES OF INTELLIGENCE AND COUNTERINTELLIGENCE Jon Woronoff, Series Editor Israeli Intelligence, by Ephraim Kahana, 2006. Russian and Soviet Intelligence, by Robert W. Pringle, 2006. Cold War Counterintelligence, by Nigel West, 2007. World War II Intelligence, by Nigel West, 2008. Sexspionage, by Nigel West, 2009. Air Intelligence, by Glenmore S. Trenear-Harvey, 2009. Middle Eastern Intelligence, by Ephraim Kahana and Muhammad Suwaed, 2009. German Intelligence, by Jefferson Adams, 2009. Ian Fleming’s World of Intelligence: Fact and Fiction, by Nigel West, 2009. Naval Intelligence, by Nigel West, 2010. Atomic Espionage, by Glenmore S. Trenear-Harvey, 2011. Chinese Intelligence, by I. C.
    [Show full text]
  • Rudolf Slansky: His Trials and Trial
    COLD WAR INTERNATIONAL HISTORY PROJECT WORKING PAPER #50 Rudolf Slansky: His Trials and Trial By Igor Lukes THE COLD WAR INTERNATIONAL HISTORY PROJECT WORKING PAPER SERIES CHRISTIAN F. OSTERMANN, Series Editor This paper is one of a series of Working Papers published by the Cold War International History Project of the Woodrow Wilson International Center for Scholars in Washington, D.C. Established in 1991 by a grant from the John D. and Catherine T. MacArthur Foundation, the Cold War International History Project (CWIHP) disseminates new information and perspectives on the history of the Cold War as it emerges from previously inaccessible sources on “the other side” of the post-World War II superpower rivalry. The project supports the full and prompt release of historical materials by governments on all sides of the Cold War, and seeks to accelerate the process of integrating new sources, materials and perspectives from the former “Communist bloc” with the historiography of the Cold War which has been written over the past few decades largely by Western scholars reliant on Western archival sources. It also seeks to transcend barriers of language, geography, and regional specialization to create new links among scholars interested in Cold War history. Among the activities undertaken by the project to promote this aim are a periodic BULLETIN to disseminate new findings, views, and activities pertaining to Cold War history; a fellowship program for young historians from the former Communist bloc to conduct archival research and study Cold War history in the United States; international scholarly meetings, conferences, and seminars; and publications. The CWIHP Working Paper Series is designed to provide a speedy publications outlet for historians associated with the project who have gained access to newly-available archives and sources and would like to share their results.
    [Show full text]
  • Cryptologic Aspects of German Intelligence Activities in South America During World War II
    Series IV World War II Volume 11 Cryptologic Aspects of German Intelligence Activities in South America during World War II n52268 This publication is distributed FREE by the National This publication is dedicated to the memory of Security Agency. If you would like additional copies, David P. Mowry, one of NSA’s longest serving employees. please submit your request to: Center for Cryptologic History Dave also researched and wrote numerous his- National Security Agency tories, including the booklets German Cipher 9800 Savage Road, Suite 6886 Machines of World War II and Listening to the Fort George G. Meade, MD 20755-6886 Rumrunners (two of the pamphlets most in demand at the National Cryptologic Museum). An expert cryptanalyst, he studied under the legendary Lambros Callimahos and served many years as a senior linguist in operations. His assignments included a variety of NSA locations in the United States and overseas. Late in life he learned how to work magic on comput- ers, and his initiatives made the first CCH webpage on NSAnet a truly user-friendly site. He also displayed historical crypto- This publication presents a historical perspective logic equipment (such as the Enigma machine) to both the NSA workforce and the general public at numerous Agency-spon- for informational and educational purposes, is sored events. Finally, one of his last contributions to the CCH the result of independent research, and does not was as co-author of the history on SIGINT controversies relat- necessarily reflect a position of NSA/CSS or any ed to the Pearl Harbor attack–a monograph that will become required reading for all future historians writing about the other U.S.
    [Show full text]
  • Military and Strategic Affairs
    Military and Strategic Affairs Military and Strategic Military and Strategic Affairs Volume 6 | No. 2 | August 2014 UN Peacekeeping Forces: Preventive Diplomacy and Its Limitations Avi Beker Changing Trends in Unmanned Aerial Vehicles: New Challenges for States, Armies and Security Industries Liran Antebi Inter-Organizational Training for the Emergency Management System Alex Altshuler and Meir Elran Protecting Foreign Manpower in the Israeli Gas Industry: Lessons from Nigeria Elai Rettig Sri Lanka and the Tamil Tigers: Conict and Legitimacy Shlomi Yass Developments in Iranian Cyber Warfare 2013-2014 Gabi Siboni and Sami Kronenfeld המכון למחקרי ביטחון לאומי THE INSTITUTE FOR NATIONAL SECURITYc STUDIES INCORPORATING THE JAFFEE bd CENTER FOR STRATEGIC STUDIES ISSN 2307-193X (print) • E-ISSN 2307-8634 (online) Military and Strategic Affairs Volume 6 | No. 2 | August 2014 CONTENTS UN Peacekeeping Forces: Preventive Diplomacy and Its Limitations | 3 Avi Beker Changing Trends in Unmanned Aerial Vehicles: New Challenges for States, Armies and Security Industries | 21 Liran Antebi Inter-Organizational Training for the Emergency Management System | 37 Alex Altshuler and Meir Elran Protecting Foreign Manpower in the Israeli Gas Industry: Lessons from Nigeria | 49 Elai Rettig Sri Lanka and the Tamil Tigers: Conflict and Legitimacy | 65 Shlomi Yass Developments in Iranian Cyber Warfare 2013-2014 | 83 Gabi Siboni and Sami Kronenfeld The purpose of Military and Strategic Affairs is to stimulate Military and and enrich the public debate on military issues relating to Strategic Affairs Israel’s national security. Military and Strategic Affairs is a refereed journal published three times a year within the framework of the Military and Strategic Affairs Program at the Institute for National Security Studies.
    [Show full text]
  • The Al-Qaeda Training Manual
    Military Studies in the Jihad Against the Tyrants: The Al-Qaeda Training Manual Jerrold M. Post, ed. US Air Force Counterproliferation Center Maxwell Air Force Base, Alabama Military Studies in the Jihad against the Tyrants: THE AL-QAEDA TRAINING MANUAL by Jerrold M. Post, M.D. (Editor) USAF Counterproliferation Center 325 Chennault Circle Maxwell Air Force Base, Alabama 36112-6427 August 2004 Disclaimer The views expressed in this publication are those of the author and do not reflect the official policy or position of the U.S. Government, Department of Defense, or the USAF Counterproliferation Center. ii Contents Page Disclaimer ................................................................................................... ii The Editor ....................................................................................................v Preface....................................................................................................... vii Editor’s Preface.......................................................................................... ix Introduction................................................................................................. 1 Al-Qaeda Handbook ................................................................................. 11 Notes ....................................................................................................... 173 iii The Editor Dr. Jerrold Post is Professor of Psychiatry, Political Psychology and International Affairs and Director of the Political Psychology Program
    [Show full text]
  • The Secret War in the Far East: American Espionage in China and the Establishment of AGFRTS by David A. Scherer, B.A. a Thesis I
    The Secret War in the Far East: American Espionage in China and the Establishment of AGFRTS by David A. Scherer, B.A. A Thesis in HISTORY Submitted to the Graduate Faculty of Texas Tech University in Partial Fulfillment of the Requirements for the Degree of MASTERS OF ARTS Approved Dr. Ron Milam Chair of Committee Dr. Justin Hart Dr. Lara Calkins Mark Sheridan Dean of the Graduate School May 2018 Copyright 2018, David Scherer For my dear friend, Mike Hardin Mallard July 7th, 1988 – July 7th 2014 I miss our long midnight talks rest easy my friend… Texas Tech University, David A. Scherer, May 2018 ACKNOWLEDGMENTS Well there are many people that deserve some credit for getting me to this point in my academic study. First and most of all I must thanks my parents Suzi and Richard Scherer they have always supported me finically and more importantly mentally in my academic endeavors. I would also like to thank the many teachers at the Winston School of Dallas (Class of 2007) for helping me figure out how to learn in my formative years. This historian also owes a grate deal of gratitude for the TECHniques Center at Texas Tech. I would not be where I am today without the help of the center. The service they offer to students with disabilities was fundamental to my success. Finally, I would like to thank the Texas Tech history department for providing me a friendly and accepting academic environment to explore my passion for History. Lubbock Texas will always hold a special place in the hart of this Red Raider! iv Texas Tech University, David A.
    [Show full text]