JTF-GTMO Detainee Assessment

Total Page:16

File Type:pdf, Size:1020Kb

JTF-GTMO Detainee Assessment S E C R E T //NOFORN I I 20320619 DEPARTMENTOF DEFENSE HEADQUARTERS,JOINT TASK FORCEGUANTANAMO U.S. NAVAL STATION,GUANTANAMO BAY, CUBA APO AE 09350 JTF-GTMO-CDR 19June 2007 MEMORANDUM FOR Commander,United StatesSouthem Command. 3511 NW 9lst Avenue. Miami,FL33172. SUBJECT: Recommendationfor ContinuedDetention Under DoD Control (CD) for GuantanamoDetainee, ISN: US9SA-000079DP(S) JTF-GTMO DetaineeAssessment 1. (S//NF) Personal Information: o JDIMSAIDRC ReferenceName: FahedA al-Harasi o Aliases and Current/True Name: Fahd Atiyah Hamza Hamid al-Harazi" Hassanal-Makki. FahedFahad" Khalid. Abu Hassan. al-Sharif. Abu Barak o Placeof Birth: Mecca. SaudiArabia (SA) o Date of Birth: 18 November 1978 o Citizenship: SaudiArabia o InternmentSerial Number (ISN): US9SA-000079DP 2. (U//T'OUO) Health: Detaineeis in good health. 3. (S//NF) JTF-GTMO Assessment: a. (S) Recommendation: JTF-GTMO recommendsthis detaineefor ContinuedDetention Under DoD Control (CD). JTF-GTMO previouslyassessed detainee for Continued Detentionwith TransferLanguage on 26May 2006. b. (S//NF) Executive Summary: Detaineeis reportedto be a memberof al-Qaida. He was identified as having attendedmilitant training and was an instructor at the al-Qaida al- Faruq Training Camp. Detaineewas in Afghanistan (AF) since 1999 during which he is assessedto have participated in hostilities againstUS and Coalition forces as a member of Classifiedby: MultipleSources REASON:E.O. 12958, AS AMENDED,Section 1.4(C) Declassi$on:20320619 S E C R E T //NOFORN I I 20320619 S E C R E T // NOFORN I I 20320619 JTF-GTMO.CDR SUBJECT: Recommendationfor ContinuedDetention Under DoD Control (CD) for GuantanamoDetainee, ISN: US9SA-000079DP(S) UsamaBin Laden's (UBL) 55th Arab Brigade.l Detainee'sname and aliaswere listed in recovereddocuments associated with al-Qaida, and the Saudi Ministry of Interior General Directorate of Investigations(Mabahith) identified him as a high priority detainee. JTF- GTMO determinedthis detaineeto be: o A HIGH risk, as he is likely to posea threatto the US, its interestsand allies o A HIGH threat from a detention perspective o Of MEDIUM intelligencevalue c. (S//NF) Summary of Changes: The following outline changesto detainee'sassessment since the last JTF-GTMO recommendation. (Changesin this assessmentwill be annotated by F next to the footnote.) o Identified detaineeas being a trainer in a camp in Kabul and possibly a poisons trainer o Identified detaineein additional al-Qaida affiliated guesthouses o Added aliasesfor detainee 4. (S//NF) Detainee'sAccount of Events: The following sectionis based,unless otherwise indicated, on detainee'sown account. Thesestatements are included without consideration of veracity, accuracy, or reliability. ^. (S/A[F) Prior History: Detaineecompleted at least 15 yearsof school. During that time, he attendeda mosquenext door to his residencein Mecca. Detaineeheld no jobs after "non-religious" graduation,but spenthis time with friends.2 b. (S//NF) Recruitment and Travel: While attendingthe mosque,detainee met a Pakistani named Abdul Jalil who told detaineehe neededto go and fight in jihad. An individual namedMajid told detaineethat they both could go to Afghanistan and then retum to Saudi Arabia after only a short time. Majid ananged their travel, obtained Pakistani visas, and paid for all travel expenses. In March 2001, detaineeand Majid traveled to Karachi, Pakistan(PK), via Damascus,Syria. In Karachi, they were met by an unidentified Pakistani, t AnalystNote: The 55thArab Brigadeserved as UBL's primarybattle formation supporting Taliban objectives, with UBL participatingclosely in the commandand control of the brigade.Nashwan Abd al-PrazzaqAbd al-Baqi aka(Abd al-Hadi al-Iraqi), US9IZ-O10026DP (12-10026), had primary operational command of the55th Arab Brigade,serving as UBL's military commanderin the field. ' 000079302 t7 - APR-2002 .| S E C R E T //NOFORN I / 20320619 S E C R E T // NOFORN I I 20320619 JTF-GTMO-CDR SUBJECT: Recommendationfor Continued Detention Under DoD Control (CD) for GuantanamoDetainee, ISN: US9SA-000079DP(S) and then traveled to Quetta, PK. In Quetta,an Afghan named Muhammad met detaineeand Majid and took them to Kandahar,AF.i c. (S//NF) Training and Activities: In Kandahar,they were met by Muthanna and taken to Kabul, AF. In Kabul, detaineeand Majid attendedtwo weeks of military training, which consistedof instruction on small arms and grenades. Upon completion of the training, Nassir, who was in chargeof the camp>told detainee,Muthanna and Majid to go to Kunduz, AF. They anived at a Taliban guesthousein Kunduz the first week in May 2001. Between five and 20 Taliban soldiers were resting at this guesthouseat various times. After one week at the guesthouse,detainee and his two associatestraveled to the secondline, about three miles to the rear of the Taliban front lines. Detaineeclaimed he went to the front lines on five or six occasionswith his AK-47 but never fired his weapon nor did he seeany fighting. Detaineeremained on the lines until late August200l. In late August 2001, detaineewas instructedto retreat to Kunduz. After approximately I or 2 days, detaineearrived back at the guesthousein Kunduz. He remainedthere for two weeks until the Taliban surrenderedto the Northem Alliance. Detaineewas told they.could surrenderand were guaranteedsafe travel through Mazar-e-Sharif,AF, to Herat, AF.* 5. (S//NF) Capture Information: a. (S/AIF) Northem Alliance forces captureddetainee along with other Taliban and al- Qaidafighters approximately 24 November2001. Dostum's forcestook the prisonersto the Qala-i-Jangiprison located outside Mazar-e-Sharif. After one night in captivity, the prisonersrevolted leading to tle deathsof membersof the Northern Alliance forces and CIA "Mike" officer Johnny Spann.' Detaineewas shot in the arm during the uprising. Detainee and severalother JTF-GTMO detaineesthat survived the assaultshid in the basementuntil they were re-capturedabout a week later.6 Detaineewas turned over to US control on approximately28 December2001. b. (S) Property Held: o Miscellaneouspills c. (S) Transferred to JTF-GTMO: 7 February2002 ' OO00Z9302 l7-APR-2002, Analyst Note: It ispossible that Majid is Majid al-Barayan, ISN US9SA-00051DP (sA-051). ooooo79 302 17-APR-2002 t VariousISNs OPERATION ENDUzuNG FREEDOM - Part 3 - November2001, Analyst Note: Multiple detaineesdiscussed the uprising that occurred at the Qala-i-Jangi Prison. " Deceptionat Qala-i-JangiPrison - USSOC- May 2005, 00007930217-APR-2002 3 S E C R E T i / NOFORN I I 20320619 S E C RE T //NOFORN I I 20320619 JTF-GTMO-CDR SUBJECT: Recommendationfor ContinuedDetention Under DoD Control (CD) for GuantanamoDetainee, ISN: US9SA-000079DP(S) d. (S//NF) Reasonsfor Transfer to JTF-GTMO: To provide informationon the following: o Taliban training capabilities o Training Course for Trainers at al-Faruq Training Camp o Routesof ingressand egressfrom Afghanistan 6. (S//NF) Evaluation of Detainee'sAccount: Detainee'stimeline and accountare inconsistentwith historical events,information provided by other detainees,and recovered documents. For instance,detainee stated he traveled to Afghanistan in March 2001, but he is reportedin an al-Qaidadocument as travelingin 1999. Also, detaineeclaimed he was orderedto refeat from the front lines in August 2007, but the Taliban and 55th Arab Brigade retreat occurredin November2001. He has omitted information abouthis timeline, including training, travel, activitiesand associatesin order to limit his involvementand protectothers. For the majority of his detention at JTF-GTMO, detaineehas not been forthcoming with interrogators and typically refusesto answer any questionspertaining to his activities. 7. (S//NF) DetaineeThreat: a. (S) Assessment: Detaineeis assessedto be a HIGH risk, as he is likely to posea threat to the US, its interestsand allies. b. (S//Nf) Reasonsfor Continued Detention: Detaineeis reportedto be a memberof al- Qaida. Detaineeserved as an instructor at al-Qaida's al-Faruq Training Camp. He attended militant training and is assessedto have fought on the front lines near Kunduz with the 55th Arab Brigadeagainst US and Coalition forces. Detainee'sname and aliaswere listed in recovereddocuments associated with al-Qaida. Detaineewas listed by Mabahith as a high priority detainee. o (S/AIF) Detaineeis a reported al-Qaida trainer. o (S/AIF) Senior al-Qaida facilitator Abdu Ali al-Haji Sharqawi,aka ("Riyadh the Facilitator"),ISN PK9YM-0001457DP(YM-1457), identified detaineeas Hassanal- Makki, who attendedthe class at al-Faruq Training Camp to becomean instructor.T . (S/AIF) YM-1457's statementis corroboratedby a recoveredal-Qaida document. Detainee's alias, Hassanal-Makki, was found on a list of participants for a course entitled "Training Coursefor Trainers," held at al-Faruq from Septemberto December2000. This listing statesdetainee traveled to Afghanistan t IIR 6 034oo59 05 + s E c R E T //NOFORN I I 20320619 s E c R E T // NOFORN I I 20320619 JTF-GTMO-CDR SUBJECT:Recommendation for ContinuedDetention Under DoD Control(CD) for GuantanamoDetainee, ISN: US9SA-000079DP(S) in 1999,attended the trainer's course,and worked as a trainer at al-Faruq. He then traveledto Mazar-e-Sharifbefore the I 1 September2001 attacks.UThe list indicated detaineewas residing in the airport complex for the duration of training.e (Analyst Note: The airport complex probably refers to the al-Qaida guesthouselocated at Kandahar airport.) o (S/AID David Michael Hicks, ISN US9AS-000002DP(AS-002, transferred), stateddetainee went by the name Khalid and
Recommended publications
  • Inside Russia's Intelligence Agencies
    EUROPEAN COUNCIL ON FOREIGN BRIEF POLICY RELATIONS ecfr.eu PUTIN’S HYDRA: INSIDE RUSSIA’S INTELLIGENCE SERVICES Mark Galeotti For his birthday in 2014, Russian President Vladimir Putin was treated to an exhibition of faux Greek friezes showing SUMMARY him in the guise of Hercules. In one, he was slaying the • Russia’s intelligence agencies are engaged in an “hydra of sanctions”.1 active and aggressive campaign in support of the Kremlin’s wider geopolitical agenda. The image of the hydra – a voracious and vicious multi- headed beast, guided by a single mind, and which grows • As well as espionage, Moscow’s “special services” new heads as soon as one is lopped off – crops up frequently conduct active measures aimed at subverting in discussions of Russia’s intelligence and security services. and destabilising European governments, Murdered dissident Alexander Litvinenko and his co-author operations in support of Russian economic Yuri Felshtinsky wrote of the way “the old KGB, like some interests, and attacks on political enemies. multi-headed hydra, split into four new structures” after 1991.2 More recently, a British counterintelligence officer • Moscow has developed an array of overlapping described Russia’s Foreign Intelligence Service (SVR) as and competitive security and spy services. The a hydra because of the way that, for every plot foiled or aim is to encourage risk-taking and multiple operative expelled, more quickly appear. sources, but it also leads to turf wars and a tendency to play to Kremlin prejudices. The West finds itself in a new “hot peace” in which many consider Russia not just as an irritant or challenge, but • While much useful intelligence is collected, as an outright threat.
    [Show full text]
  • CIA Best Practices in Counterinsurgency
    CIA Best Practices in Counterinsurgency WikiLeaks release: December 18, 2014 Keywords: CIA, counterinsurgency, HVT, HVD, Afghanistan, Algeria, Colombia, Iraq, Israel, Peru, Northern Ireland, Sri Lanka, Chechnya, Libya, Pakistan, Thailand,HAMAS, FARC, PULO, AQI, FLN, IRA, PLO, LTTE, al-Qa‘ida, Taliban, drone, assassination Restraint: SECRET//NOFORN (no foreign nationals) Title: Best Practices in Counterinsurgency: Making High-Value Targeting Operations an Effective Counterinsurgency Tool Date: July 07, 2009 Organisation: Central Intelligence Agency (CIA) Author: CIA Office of Transnational Issues; Conflict, Governance, and Society Group Link: http://wikileaks.org/cia-hvt-counterinsurgency Pages: 21 Description This is a secret CIA document assessing high-value targeting (HVT) programs world-wide for their impact on insurgencies. The document is classified SECRET//NOFORN (no foreign nationals) and is for internal use to review the positive and negative implications of targeted assassinations on these groups for the strength of the group post the attack. The document assesses attacks on insurgent groups by the United States and other countries within Afghanistan, Algeria, Colombia, Iraq, Israel, Peru, Northern Ireland, Sri Lanka, Chechnya, Libya, Pakistan and Thailand. The document, which is "pro-assassination", was completed in July 2009 and coincides with the first year of the Obama administration and Leon Panetta's directorship of the CIA during which the United States very significantly increased its CIA assassination program at the
    [Show full text]
  • Downloaded from the Internet and Distributed Inflammatory Speeches and Images Including Beheadings Carried out by Iraqi Insurgents
    HUMAN RIGHTS WATCH WORLD REPORT 2006 EVENTS OF 2005 Copyright © 2006 Human Rights Watch All rights reserved. Co-published by Human Rights Watch and Seven Stories Press Printed in the United States of America ISBN-10: 1-58322-715-6 · ISBN-13: 978-1-58322-715-2 Front cover photo: Oiparcha Mirzamatova and her daughter-in-law hold photographs of family members imprisoned on religion-related charges. Fergana Valley, Uzbekistan. © 2003 Jason Eskenazi Back cover photo: A child soldier rides back to his base in Ituri Province, northeastern Congo. © 2003 Marcus Bleasdale Cover design by Rafael Jiménez Human Rights Watch 350 Fifth Avenue, 34th floor New York, NY 10118-3299 USA Tel: +1 212 290 4700, Fax: +1 212 736 1300 [email protected] 1630 Connecticut Avenue, N.W., Suite 500 Washington, DC 20009 USA Tel: +1 202 612 4321, Fax: +1 202 612 4333 [email protected] 2-12 Pentonville Road, 2nd Floor London N1 9HF, UK Tel: +44 20 7713 1995, Fax: +44 20 7713 1800 [email protected] Rue Van Campenhout 15, 1000 Brussels, Belgium Tel: +32 2 732 2009, Fax: +32 2 732 0471 [email protected] 9 rue Cornavin 1201 Geneva Tel: +41 22 738 0481, Fax: +41 22 738 1791 [email protected] Markgrafenstrasse 15 D-10969 Berlin, Germany Tel.:+49 30 259 3060, Fax: +49 30 259 30629 [email protected] www.hrw.org Human Rights Watch is dedicated to protecting the human rights of people around the world. We stand with victims and activists to prevent discrimination, to uphold political freedom, to protect people from inhumane conduct in wartime, and to bring offenders to justice.
    [Show full text]
  • Wikileaks and the Institutional Framework for National Security Disclosures
    THE YALE LAW JOURNAL PATRICIA L. BELLIA WikiLeaks and the Institutional Framework for National Security Disclosures ABSTRACT. WikiLeaks' successive disclosures of classified U.S. documents throughout 2010 and 2011 invite comparison to publishers' decisions forty years ago to release portions of the Pentagon Papers, the classified analytic history of U.S. policy in Vietnam. The analogy is a powerful weapon for WikiLeaks' defenders. The Supreme Court's decision in the Pentagon Papers case signaled that the task of weighing whether to publicly disclose leaked national security information would fall to publishers, not the executive or the courts, at least in the absence of an exceedingly grave threat of harm. The lessons of the PentagonPapers case for WikiLeaks, however, are more complicated than they may first appear. The Court's per curiam opinion masks areas of substantial disagreement as well as a number of shared assumptions among the Court's members. Specifically, the Pentagon Papers case reflects an institutional framework for downstream disclosure of leaked national security information, under which publishers within the reach of U.S. law would weigh the potential harms and benefits of disclosure against the backdrop of potential criminal penalties and recognized journalistic norms. The WikiLeaks disclosures show the instability of this framework by revealing new challenges for controlling the downstream disclosure of leaked information and the corresponding likelihood of "unintermediated" disclosure by an insider; the risks of non-media intermediaries attempting to curtail such disclosures, in response to government pressure or otherwise; and the pressing need to prevent and respond to leaks at the source. AUTHOR.
    [Show full text]
  • Offensive Capabilities
    GCHQ and UK Mass Surveillance Chapter 5 5 Beyond signals intelligence: Offensive capabilities 5.1 Introduction Documents released by German magazine Der Spiegel provide a much richer picture of the offensive activities of the NSA and its allies, including the UK’s GCHQ.i The global surveillance infrastructure and hacking tools described in the previous chapters are not only used for obtaining information to be fed into intelligence reports and tracking terrorists. The agencies are also developing cyber-warfare capabilities, with the NSA taking the lead within the US armed forces. This militarisation of the internet saw U.S. intelligence services carried out 231 offensive cyber-operations in 2011ii. The UK's National Strategic Defence and Security Review from 2010 made hostile attacks upon UK cyberspace a major priorityiii. It is fair to assume that many countries are following suit and building cyber-warfare capabilities. Der Spiegel terms the development of these aggressive hacking tools as Digital Weapons. In their view D weapons which should join the ABC (Atomic, Biological and Chemical) weapons of the 20th century because of their indiscriminate nature. Here lies a fundamental problem. The modern world with connected global communications networks means that non-state actors such as civilians and businesses are now affected by the agencies’ activities much more frequently than before. The internet is used by everyone – cyberspace is mainly a civilian space – and the opportunity for collateral damage is huge. The papers leaked to Der Spiegel appear to show that signal agencies have little regard for the security and wellbeing of anyone who gets caught in the path of their operations.
    [Show full text]
  • Works’ (Just Not in Moderation)
    Repression ‘Works’ (just not in moderation) Yuri M. Zhukov University of Michigan Abstract Why does government violence deter political challengers in one con- text, but inflame them in the next? This paper argues that repression increases opposition activity at low and moderate levels, but decreases it in the extreme. There is a threshold level of violence, where the op- position becomes unable to recruit new members, and the rebellion unravels – even if the government kills more innocents. We show this result logically, with a mathematical model of coercion, and empir- ically, with micro-level data from Chechnya and a meta-analysis of sub-national conflict dynamics in 156 countries. The data suggest that a threshold exists, but the level of violence needed to reach it varies. Many governments, thankfully, are unable or unwilling to go that far. We explore conditions under which this threshold may be higher or lower, and highlight a fundamental trade-off between reducing gov- ernment violence and preserving civil liberties. Keywords: repression, political violence, mass killing, conflict, meta-analysis, threshold effect Word count: 11,869 DRAFT This version: November, 2018 1 Repression is violence that governments use to stay in power. When confronting behavioral challenges to their authority, governments often respond by threatening, detaining and killing suspected dissidents and rebels. The coercive purpose of these actions is to compel challengers to stop their fight, and to deter others from joining it. The intensity of repres- sion can vary greatly. To reestablish control in Chechnya after 1999, for example, the Russian government used a range of methods, from targeted killings to shelling and indiscriminate sweeps.
    [Show full text]
  • Mass Surveillance
    Mass Surveillance Mass Surveillance What are the risks for the citizens and the opportunities for the European Information Society? What are the possible mitigation strategies? Part 1 - Risks and opportunities raised by the current generation of network services and applications Study IP/G/STOA/FWC-2013-1/LOT 9/C5/SC1 January 2015 PE 527.409 STOA - Science and Technology Options Assessment The STOA project “Mass Surveillance Part 1 – Risks, Opportunities and Mitigation Strategies” was carried out by TECNALIA Research and Investigation in Spain. AUTHORS Arkaitz Gamino Garcia Concepción Cortes Velasco Eider Iturbe Zamalloa Erkuden Rios Velasco Iñaki Eguía Elejabarrieta Javier Herrera Lotero Jason Mansell (Linguistic Review) José Javier Larrañeta Ibañez Stefan Schuster (Editor) The authors acknowledge and would like to thank the following experts for their contributions to this report: Prof. Nigel Smart, University of Bristol; Matteo E. Bonfanti PhD, Research Fellow in International Law and Security, Scuola Superiore Sant’Anna Pisa; Prof. Fred Piper, University of London; Caspar Bowden, independent privacy researcher; Maria Pilar Torres Bruna, Head of Cybersecurity, Everis Aerospace, Defense and Security; Prof. Kenny Paterson, University of London; Agustín Martin and Luis Hernández Encinas, Tenured Scientists, Department of Information Processing and Cryptography (Cryptology and Information Security Group), CSIC; Alessandro Zanasi, Zanasi & Partners; Fernando Acero, Expert on Open Source Software; Luigi Coppolino,Università degli Studi di Napoli; Marcello Antonucci, EZNESS srl; Rachel Oldroyd, Managing Editor of The Bureau of Investigative Journalism; Peter Kruse, Founder of CSIS Security Group A/S; Ryan Gallagher, investigative Reporter of The Intercept; Capitán Alberto Redondo, Guardia Civil; Prof. Bart Preneel, KU Leuven; Raoul Chiesa, Security Brokers SCpA, CyberDefcon Ltd.; Prof.
    [Show full text]
  • Improving Counterterrorism and Law Enforcement Cooperation Between the United States and the Arab Gulf States
    Improving Counterterrorism and Law Enforcement Cooperation between the United States and the Arab Gulf States Thomas Warrick and Joze Pelayo Scowcroft Middle East Security Initiative The Atlantic Council’s Scowcroft Middle East Security Initiative honors the legacy of Brent Scowcroft and his tireless efforts to build a new security architecture for the region. Our work in this area addresses the full range of security threats and challenges including the danger of interstate warfare, the role of terrorist groups and other nonstate actors, and the underlying security threats facing countries in the region. Through all of the Council’s Middle East programming, we work with allies and partners in Europe and the wider Middle East to protect US interests, build peace and security, and unlock the human potential of the region. You can read more about our programs at www.atlanticcouncil.org/ programs/middle-east-programs/. Task Force on Mideast Counterterrorism – Law Enforcement Cooperation ■ Javed Ali, Towsley Policymaker in Residence, Gerald R. Ford School of Public Policy, University of Michigan ■ Kirsten Fontenrose, Director, Scowcroft Middle East Security Initiative, Atlantic Council ■ Daniel L. Glaser, Principal, Financial Integrity Network ■ Bernard Hudson, Nonresident Fellow, Belfer Center for Science and International Affairs ■ Michael McGarrity, Vice President Global Risk Services, Global Guardian ■ Pamela G. Quanrud, Former Director, C-ISIL Coalition, US Department of State ■ Todd Rosenblum, Nonresident Senior Fellow, Scowcroft Center
    [Show full text]
  • Download the PDF File
    S E C RE T //NOFORN I I 20310825 DEPARTMENT OF DEFENSE JOINT TASK FORCE GUANTANAMO GUANTANAMO BAY, CI,IBA APO AE 09360 JTF-GTMO-CC 25 August2006 MEMORANDUM FOR Commander,United StatesSouthern Command, 3511 NW 9lst Avenue. Miami. FL33172 SUBJECT: Recommendationfor Continued Detention Under DoD Control (CD) for GuantanamoDetainee, ISN: US9SA-000230DP(S) JTF-GTMODetainee Assessment 1. (S/NF) PersonalInformation: o JDIMSAIDRC ReferenceName: Hamud Dakhil Hamud o Aliases and Current/True Name: Talut al-Jeddawi. Humud Dakhil Humud Said al-Jadani.Hamud Sultan.Nag Mohammad. Safwan the Afghan o Placeof Birth: Jeddah.Saudi Arabia (SA) o Dateof Birth: 22May 1973 o Citizenship: SaudiArabia o InternmentSerial Number (ISN): US9SA-000230DP 2. (FOUO) Health: Detaineeis in goodhealth. 3. (S//NF) JTF-GTMOAssessment: a. (S) Recommendation: JTF-GTMOrecommends this detaineefor Continued DetentionUnder DoD Control(CD). JTF-GTMOpreviously assessed detainee as Continued DetentionUnder DoD Control(CD) on 5 September2005. b. (S/NF) Executive Summary: Detaineeis assessedto be a memberof al-Qaidawith an extensivehistory of militantjihad. Detaineeis an admittedleader of armedfighters in ToraBora duringhostilities against US forcesand associated with severalsenior al-Qaida members.He receivedbasic and advanced training in Chechnyaand Afghanistan (AF) CLASSIFIEDBY: MULTIPLESOURCES REASON:E.O. 12958 SECTION 1.5(C) DECLASSIFYON: 203108 1 I S E C RE T // NOFORNI I 20310825 S E C R E T // NOFORNI I 20310825 JTF-GTMO-CC SUBJECT:Recommendation for ContinuedDetention Under DoD Control(CD) for GuantanamoDetainee, ISN: US9SA-000230DP (S) includingtraining on smallarns, explosives,mortars, and anti-aircraft weaponry. JTF- GTMO determinedthis detaineeto be: o A HIGH risk, as he is likely to posea threatto the US, its interestsand allies.
    [Show full text]
  • Wikileaks.Org
    U.S. Intelligence planned to destroy WikiLeaks WikiLeaks release: March 15, 2010 keywords: WikiLeaks, U.S. intelligence, U.S. Army, National Ground Intelligence Center, NGIC, classified, SE- CRET, NOFORN restraint: Classified SECRET/NOFORN (US) title: Wikileaks.org - An Online Reference to Foreign Intelligence Services, Insurgents, Or Terrorist Groups? date: March 18, 2008 group: United States Army Counterintelligence Center, Cyber Counterintelligence Assessments Branch; De- partment of Defence Intelligence Analysis Program author: Michael D. Horvath link: http://wikileaks.org/file/us-intel-wikileaks.pdf pages: 32 Description By Julian Assange ([email protected]) This document is a classifed (SECRET/NOFORN) 32 page U.S. counterintelligence investigation into WikiLeaks. “The possibility that current employees or moles within DoD or elsewhere in the U.S. government are providing sensitive or classified information to Wikileaks.org cannot be ruled out”. It concocts a plan to fatally marginalize the organization. Since WikiLeaks uses “trust as a center of gravity by protecting the anonymity and identity of the insiders, leakers or whisteblowers”, the report recommends “The identification, exposure, termination of employment, criminal prosecution, legal action against current or former insiders, leakers, or whistlblowers could potentially damage or destroy this center of gravity and deter others considering similar actions from using the Wikileaks.org Web site”. [As two years have passed since the date of the report, with no WikiLeaks’ source exposed, it appears that this plan was ineffective]. As an odd justificaton for the plan, the report claims that “Several foreign countries including China, Israel, North Kora, Russia, Vietnam, and Zimbabwe have denounced or blocked access to the Wikileaks.org website”.
    [Show full text]
  • A/HRC/WGEID/118/1 Advance Edited Version
    A/HRC/WGEID/118/1 Advance Edited Version Distr.: General 30 July 2019 Original: English Human Rights Council Working Group on Enforced or Involuntary Disappearances Communications transmitted, cases examined, observations made and other activities conducted by the Working Group on Enforced or Involuntary Disappearances* 118th session (13–22 May 2019) I. Communications 1. Between its 117th and 118th sessions, the Working Group transmitted 50 cases under its urgent action procedure, to: Bangladesh (3), Burundi (3), Egypt (19), India (1), Libya (1), Pakistan (11), Russian Federation (1), Saudi Arabia (1), Sudan (1), Syrian Arab Republic (2), Turkey (6) and Venezuela (Bolivarian Republic of) (1). 2. At its 118th session, the Working Group decided to transmit 172 newly reported cases of enforced disappearance to 19 States: Algeria (5), Burundi (31), Cameroon (1), China (20), Democratic People’s Republic of Korea (14), Egypt (2), Eritrea (1), India (17), Iran (Islamic Republic of) (4), Libya (2), Mexico (2), Pakistan (12), Republic of Korea (1), Saudi Arabia (2), Sri Lanka (45), Syrian Arab Republic (10), Tunisia (1) United Arab Emirates (1) and Yemen (1). 3. The Working Group clarified 62 cases, in: Azerbaijan (1), Bangladesh (2), China (1), Egypt (39), Morocco (4), Nigeria (2), Pakistan (3), Saudi Arabia (3), Syrian Arab Republic (1), Thailand (1) Turkey (4) and Ukraine (1). A total of 50 cases were clarified on the basis of information provided by the Governments and 12 on the basis of information provided by sources. 4. Between its 117th
    [Show full text]
  • Counterterror Initiatives in the Terror Finance Program
    S. HRG. 108–802 COUNTERTERROR INITIATIVES IN THE TERROR FINANCE PROGRAM HEARINGS BEFORE THE COMMITTEE ON BANKING, HOUSING, AND URBAN AFFAIRS UNITED STATES SENATE ONE HUNDRED EIGHTH CONGRESS FIRST AND SECOND SESSIONS ON COUNTERTERROR INITIATIVES IN THE TERROR FINANCE PROGRAM, FO- CUSING ON THE ROLE OF THE ANTI-MONEY LAUNDERING REGU- LATORY REGIME IN THE FINANCIAL WAR ON TERRORISM, BETTER UTILIZATION OF TECHNOLOGY, INCREASED INFORMATION SHARING, DEVELOPING SIMILAR INTERNATIONAL STANDARDS, AND THE FOR- MATION OF THE TERRORIST FINANCING OPERATIONS SECTION (TFOS) SEPTEMBER 25, OCTOBER 22, 2003, APRIL 29, AND SEPTEMBER 29, 2004 Printed for the use of the Committee on Banking, Housing, and Urban Affairs ( Available at: http://www.access.gpo.gov/senate/senate05sh.html U.S. GOVERNMENT PRINTING OFFICE 20–396 PDF WASHINGTON : 2005 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2250 Mail: Stop SSOP, Washington, DC 20402–0001 VerDate 0ct 09 2002 14:21 May 03, 2005 Jkt 020396 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 S:\DOCS\20396.TXT BANK1 PsN: JIM COMMITTEE ON BANKING, HOUSING, AND URBAN AFFAIRS RICHARD C. SHELBY, Alabama, Chairman ROBERT F. BENNETT, Utah PAUL S. SARBANES, Maryland WAYNE ALLARD, Colorado CHRISTOPHER J. DODD, Connecticut MICHAEL B. ENZI, Wyoming TIM JOHNSON, South Dakota CHUCK HAGEL, Nebraska JACK REED, Rhode Island RICK SANTORUM, Pennsylvania CHARLES E. SCHUMER, New York JIM BUNNING, Kentucky EVAN BAYH, Indiana MIKE CRAPO, Idaho ZELL MILLER, Georgia JOHN E. SUNUNU, New Hampshire THOMAS R. CARPER, Delaware ELIZABETH DOLE, North Carolina DEBBIE STABENOW, Michigan LINCOLN D.
    [Show full text]