Security Council Distr.: General 8 March 2007
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Al-Qaeda: the Many Faces of an Islamist Extremist Threat
a al-Qaeda: The Many Faces of an Islamist Extremist Threat REPORT OF THE HOUSE PERMANENT SELECT COMMITTEE ON INTELLIGENCE ISBN 0-16-076897-7 90000 9 780160 768972 al-QaedaTh e Many Faces of an Islamist Extremist Th reat REPORT OF THE HOUSE PERMANENT SELECT COMMITTEE ON INTELLIGENCE JUNE 2006 109th Congress Union Calendar No. 355 2d Session Report 109-615 al-Qaeda: The Many Faces of an Islamist Extremist Threat ___________________ REPORT OF THE U.S. HOUSE PERMANENT SELECT COMMITTEE ON INTELLIGENCE APPROVED: JUNE 2006 TOGETHER WITH ADDITIONAL AND MINORITY VIEWS SUBMITTED: SEPTEMBER 2006 Available via the World Wide Web: http://www.gpo.gov/congress/house http://intelligence.house.gov/ September 6, 2006.—Committed to the Committee of the Whole House on the State of the Union and ordered to be printed U.S. GOVERNMENT PRINTING OFFICE Keeping America Informed I www.gpo.gov WASHINGTON : 2006 For sale by the Superintendent of Documents, U.S. Government Printing Offi ce Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC area (202) 512-1800 Fax: (202) 512-2250 Mail: Stop SSOP, Washington, DC 20402-0001 ISBN 0-16-076897-7 i PERMANENT SELECT COMMITTEE ON INTELLIGENCE OF THE HOUSE OF REPRESENTATIVES PETER HOEKSTRA, MICHIGAN, CHAIRMAN RAY LAHOOD, ILLINOIS JANE HARMAN, CALIFORNIA TERRY EVERETT, ALABAMA ALCEE L. HASTINGS, FLORIDA ELTON GALLEGLY, CALIFORNIA SILVESTRE REYES, TEXAS HEATHER WILSON, NEW MEXICO LEONARD L. BOSWELL, IOWA JO ANN DAVIS, VIRGINIA ROBERT E. (BUD) CRAMER, JR., ALABAMA MAC THORNBERRY, TEXAS ANNA G. ESHOO, CALIFORNIA JOHN M. MCHUGH, NEW YORK RUSH D. HOLT, NEW JERSEY TODD TIAHRT, KANSAS C. -
Counter-Insurgency Vs. Counter-Terrorism in Mindanao
THE PHILIPPINES: COUNTER-INSURGENCY VS. COUNTER-TERRORISM IN MINDANAO Asia Report N°152 – 14 May 2008 TABLE OF CONTENTS EXECUTIVE SUMMARY AND RECOMMENDATIONS................................................. i I. INTRODUCTION .......................................................................................................... 1 II. ISLANDS, FACTIONS AND ALLIANCES ................................................................ 3 III. AHJAG: A MECHANISM THAT WORKED .......................................................... 10 IV. BALIKATAN AND OPLAN ULTIMATUM............................................................. 12 A. EARLY SUCCESSES..............................................................................................................12 B. BREAKDOWN ......................................................................................................................14 C. THE APRIL WAR .................................................................................................................15 V. COLLUSION AND COOPERATION ....................................................................... 16 A. THE AL-BARKA INCIDENT: JUNE 2007................................................................................17 B. THE IPIL INCIDENT: FEBRUARY 2008 ..................................................................................18 C. THE MANY DEATHS OF DULMATIN......................................................................................18 D. THE GEOGRAPHICAL REACH OF TERRORISM IN MINDANAO ................................................19 -
Commission Regulation (Ec)
L 126/38EN Official Journal of the European Union 19.5.2005 COMMISSION REGULATION (EC) No 757/2005 of 18 May 2005 amending for the 46th time Council Regulation (EC) No 881/2002 imposing certain specific restrictive measures directed against certain persons and entities associated with Usama bin Laden, the Al-Qaida network and the Taliban, and repealing Council Regulation (EC) No 467/2001 THE COMMISSION OF THE EUROPEAN COMMUNITIES, (2) On 16 May 2005, the Sanctions Committee of the United Nations Security Council decided to amend the list of persons, groups and entities to whom the freezing Having regard to the Treaty establishing the European of funds and economic resources should apply. Annex I Community, should therefore be amended accordingly. Having regard to Council Regulation (EC) No 881/2002 of 27 May 2002 imposing certain specific restrictive measures (3) In order to ensure that the measures provided for in this directed against certain persons and entities associated with Regulation are effective, this Regulation must enter into Usama bin Laden, the Al-Qaida network and the Taliban, and force immediately, repealing Council Regulation (EC) No 467/2001 prohibiting the export of certain goods and services to Afghanistan, strengthening the flight ban and extending the freezing of HAS ADOPTED THIS REGULATION: funds and other financial resources in respect of the Taliban 1 of Afghanistan ( ), and in particular Article 7(1), first indent, Article 1 thereof, Annex I to Regulation (EC) No 881/2002 is amended as set out Whereas: in the Annex to this Regulation. (1) Annex I to Regulation (EC) No 881/2002 lists the Article 2 persons, groups and entities covered by the freezing of funds and economic resources pursuant to that Regu- This Regulation shall enter into force on the day of its publi- lation. -
Secure Passports from De La Rue
SECURE PASSPORTS FROM DE LA RUE DE LA RUE IDENTITY SYSTEMS Complete solutions to design, produce, personalise and program passports, conforming to all the recommendations of ICAO, the European Union and the US visa waiver programme. If you would like to receive a copy of our ‘Secure Passports’ brochure then please call +44 (0)1256 605259, or send an email to [email protected] A trusted partner in major projects worldwide ICAO MRTD REPORT • 1 ICAO MRTD Report Vol. 1, No. 1, 2006 Table of contents Editor: Mary McMunn Content Coordinator: Mauricio Siciliano Graphic Art Design: Sylvie Schoufs, Editor’s welcome . .2 FCM Communications Inc. Published by: Message from the President of the Council, International Civil Aviation Organization (ICAO) Dr. Assad Kotaite . .5 999 University Street Montréal, Québec Canada H3C 5H7 Message from the Secretary Telephone: +1 (514) 954-8219 ext. 7068 General, Dr.Taïeb Chérif . .7 E-mail: [email protected] Web: www.icao.int/mrtd ICAO Hosts Symposium on The objective of the ICAO MRTD Report is to pro- MRTDs and Biometrics . .8 vide a comprehensive account of new develop- ments, trends, innovations and applications in the field of MRTDs to the Contracting States of ICAO ICAO Doctrine on Travel and the international aeronautical and security Documents . worlds. 12 Copyright © 2006 International Civil Aviation TAG-MRTD 16th Meeting . .16 Organization. Unsigned material may be repro- duced in full or in part provided that it is accom- panied by reference to the ICAO MRTD Report; for Machine Readable Travel Documents rights to reproduced signed articles, please write to the editor. -
9-11 and Terrorist Travel- Full
AND TERRORIST TRAVEL Staff Report of the National Commission on Terrorist Attacks Upon the United States 9/11 AND TERRORIST TRAVEL Staff Report of the National Commission on Terrorist Attacks Upon the United States By Thomas R. Eldridge Susan Ginsburg Walter T. Hempel II Janice L. Kephart Kelly Moore and Joanne M. Accolla, Staff Assistant Alice Falk, Editor Note from the Executive Director The Commission staff organized its work around specialized studies, or monographs, prepared by each of the teams. We used some of the evolving draft material for these studies in preparing the seventeen staff statements delivered in conjunction with the Commission’s 2004 public hearings. We used more of this material in preparing draft sections of the Commission’s final report. Some of the specialized staff work, while not appropriate for inclusion in the report, nonetheless offered substantial information or analysis that was not well represented in the Commission’s report. In a few cases this supplemental work could be prepared to a publishable standard, either in an unclassified or classified form, before the Commission expired. This study is on immigration, border security and terrorist travel issues. It was prepared principally by Thomas Eldridge, Susan Ginsburg, Walter T. Hempel II, Janice Kephart, and Kelly Moore, with assistance from Joanne Accolla, and editing assistance from Alice Falk. As in all staff studies, they often relied on work done by their colleagues. This is a study by Commission staff. While the Commissioners have been briefed on the work and have had the opportunity to review earlier drafts of some of this work, they have not approved this text and it does not necessarily reflect their views. -
Counter Terrorist Trends and Analysis ISSN 2382-6444 | Volume 7, Issue 4 | May 2015
Counter Terrorist Trends and Analysis www.rsis.edu.sg ISSN 2382-6444 | Volume 7, Issue 4 | May 2015 A JOURNAL OF THE INTERNATIONAL CENTRE FOR POLITICAL VIOLENCE AND TERRORISM RESEARCH The Call of ISIS: The Medium and the Message Attracting Southeast Asians ANTON CHAN Myanmar at The Crossroads: The Shadow of Jihadist Extremism LAURA STECKMAN The Road to ISIS: How Indonesian Jihadists Travel to Syria and Iraq MUH TAUFIQURROHMAN Impact of ISIS’ Online Campaign in Southeast Asia NUR AZLIN MOHAMED YASIN Counter Terrorist Trends and Analysis Volume 7, Issue 4 | May 2015 1 Building a Global Network for Security Editorial Note Southeast Asia Focus e are pleased to release Volume 7, Issue 4 (May 2015) of the Counter Terrorist Trends and Analysis (CTTA) at www.rsis.edu.sg/research/icpvtr/ctta (ISSN 2382-6444) by the International Centre for Political Violence and Terrorism Research at the S. Rajaratnam School of International Studies, Nanyang Technological University, Singapore. W TheW threat of the Islamic State of Iraq and Greater Syria (ISIS) has reverberated in Southeast Asia, from where individuals, including young women and individuals with families, have travelled to conflict zones in Syria and Iraq. The seriousness of the threat of ISIS however, comes from Southeast Asian fighters who will return home from battle with fresh combat skills, radical ideologies and extensive networks. The potential for these Southeast Asian terrorist returnees to mount attacks and to further radicalise and recruit other individuals, is therefore, of notable concern to governments in this region. In this issue, Anton Chan discusses the medium and the message used by ISIS that has appealed to its legions of supporters in Southeast Asia. -
MAHMOUD KESHAVARZ DESIGN-POLITICS an Inquiry Into Passports, Camps and Borders
DISSERTATION: NEW MEDIA,DISSERTATION: SPHERES,PUBLIC AND FORMS EXPRESSION OF MAHMOUD KESHAVARZ DESIGN-POLITICS An Inquiry into Passports, Camps and Borders DESIGN-POLITICS Doctoral Dissertation in Interaction Design Dissertation Series: New Media, Public Spheres and Forms of Expression Faculty: Culture and Society Department: School of Arts and Communication, K3 Malmö University Information about time and place of public defence, and electronic version of dissertation: http://hdl.handle.net/2043/20605 © Copyright Mahmoud Keshavarz, 2016 Designed by Maryam Fanni Copy editors: Edanur Yazici and James McIntyre Printed by Service Point Holmbergs, Malmö 2016 Supported by grants from The National Dissertation Council and The Doctoral Foundation. ISBN 978-91-7104-682-6 (print) ISSN 978-91-7104-683-3 (pdf) MAHMOUD KESHAVARZ DESIGN-POLITICS An Inquiry into Passports, Camps and Borders Malmö University 2016 The tradition of the oppressed teaches us that the ‘state of emergency’ in which we live is not the exception but the rule. We must attain to a conception of history that is in keeping with this insight. Then we shall clearly realize that it is our task to bring about a real state of emergency, and this will improve our position in the struggle against Fascism. Walter Benjamin, Theses on the Philosophy of History, 1969 [1940] CONTENTS ACKNOWLEDGEMENTS ................................................. 9 PREFACE ..................................................................... 13 PART I 1. INTRODUCTION: SETTING THE CONTEXT ................... -
Estimated Age
The US National Counterterrorism Center is pleased to present the 2016 edition of the Counterterrorism (CT) Calendar. Since 2003, we have published the calendar in a daily planner format that provides our consumers with a variety of information related to international terrorism, including wanted terrorists; terrorist group fact sheets; technical issue related to terrorist tactics, techniques, and procedures; and potential dates of importance that terrorists might consider when planning attacks. The cover of this year’s CT Calendar highlights terrorists’ growing use of social media and other emerging online technologies to recruit, radicalize, and encourage adherents to carry out attacks. This year will be the last hardcopy publication of the calendar, as growing production costs necessitate our transition to more cost- effective dissemination methods. In the coming years, NCTC will use a variety of online and other media platforms to continue to share the valuable information found in the CT Calendar with a broad customer set, including our Federal, State, Local, and Tribal law enforcement partners; agencies across the Intelligence Community; private sector partners; and the US public. On behalf of NCTC, I want to thank all the consumers of the CT Calendar during the past 12 years. We hope you continue to find the CT Calendar beneficial to your daily efforts. Sincerely, Nicholas J. Rasmussen Director The US National Counterterrorism Center is pleased to present the 2016 edition of the Counterterrorism (CT) Calendar. This edition, like others since the Calendar was first published in daily planner format in 2003, contains many features across the full range of issues pertaining to international terrorism: terrorist groups, wanted terrorists, and technical pages on various threat-related topics. -
NCTC Annex of the Country Reports on Terrorism 2008
Country Reports on Terrorism 2008 April 2009 ________________________________ United States Department of State Publication Office of the Coordinator for Counterterrorism Released April 2009 Page | 1 Country Reports on Terrorism 2008 is submitted in compliance with Title 22 of the United States Code, Section 2656f (the ―Act‖), which requires the Department of State to provide to Congress a full and complete annual report on terrorism for those countries and groups meeting the criteria of the Act. COUNTRY REPORTS ON TERRORISM 2008 Table of Contents Chapter 1. Strategic Assessment Chapter 2. Country Reports Africa Overview Trans-Sahara Counterterrorism Partnership The African Union Angola Botswana Burkina Faso Burundi Comoros Democratic Republic of the Congo Cote D‘Ivoire Djibouti Eritrea Ethiopia Ghana Kenya Liberia Madagascar Mali Mauritania Mauritius Namibia Nigeria Rwanda Senegal Somalia South Africa Tanzania Uganda Zambia Zimbabwe Page | 2 East Asia and Pacific Overview Australia Burma Cambodia China o Hong Kong o Macau Indonesia Japan Republic of Korea (South Korea) Democratic People‘s Republic of Korea (North Korea) Laos Malaysia Micronesia, Federated States of Mongolia New Zealand Papua New Guinea, Solomon Islands, or Vanaatu Philippines Singapore Taiwan Thailand Europe Overview Albania Armenia Austria Azerbaijan Belgium Bosnia and Herzegovina Bulgaria Croatia Cyprus Czech Republic Denmark Estonia Finland France Georgia Germany Greece Hungary Iceland Ireland Italy Kosovo Latvia Page | 3 Lithuania Macedonia Malta Moldova Montenegro -
The Sources of the Abu Sayyaf's Resilience in the Southern
MAY 2010 . VOL 3 . ISSUE 5 A number of conclusions can be drawn The Sources of the Abu the creation of AHAI in 1989 to pursue from this incident. The kidnappings Jihad Fi Sabilillah, defined as “fighting and and Khwaja’s subsequent execution Sayyaf’s Resilience in the dying for the cause of Islam.”2 Yet it show the generational change among Southern Philippines was only in 1993 when AHAI formally militants in Pakistan and the evolving organized with Abdurajak as the amir.3 relationship between the ISI and By Rommel C. Banlaoi Taliban fighters. Khwaja, for example, Since the formal launch of AHAI in was a controversial figure due to his since the launching of the global war 1989, Abdurajak delivered several associations with the ISI and links with on terrorism in the aftermath of the khutbahs or sermons and released several certain militant groups. After he retired September 11, 2001 terrorist attacks on fatawa using the nom-de-guerre “Abu from the military, he worked as a lawyer the United States, the Philippines has Sayyaf,” in honor of Afghan resistance and defended suspected militants been engaged in a prolonged military fighter Abdul Rasul Sayyaf.4 While and Islamist politicians.17 He even campaign against the Abu Sayyaf Group Abdurajak idolized this Afghan leader, reportedly once maintained contacts (ASG). Key ASG leaders have been the suggestion that Abdurajak was an with Usama bin Ladin. It appears that killed in this battle, while others have Afghan war veteran is still a subject the Asian Tigers killed him as revenge been imprisoned for various crimes for verification.5 Some living Filipino against the ISI and against the jihadist associated with terrorism. -
State of the Nordic Region Immigration and Integration
STATE OF THE NORDIC REGION 2018 IMMIGRATION AND INTEGRATION EDITION STATE OF THE NORDIC REGION 2018 IMMIGRATION AND INTEGRATION EDITION Anna Karlsdóttir, Gustaf Norlén, Linus Rispling and Linda Randall (Eds). ANP 2018:742 ISBN 978-92-893-5517-9 (PRINT) ISBN 978-92-893-5518-6 (PDF) ISBN 978-92-893-5519-3 (EPUB) http://dx.doi.org/10.6027/ANP2018-742 © Nordic Council of Ministers 2018 Layout: Louise Jeppesen and Gitte Wejnold Cover Photo: unsplash.com Print: Rosendahls Printed in Denmark Nordic co-operation Nordic co-operation is one of the world’s most extensive forms of regional collaboration, involving Denmark, Finland, Iceland, Norway, Sweden, the Faroe Islands, Greenland, and Åland. Nordic co-operation has firm traditions in politics, the economy, and culture. It plays an important role in European and international collaboration, and aims at creating a strong Nordic community in a strong Europe. Nordic co-operation seeks to safeguard Nordic and regional interests and principles in the global community. Shared Nordic values help the region solidify its position as one of the world’s most innovative and competitive. Nordic Council of Ministers Nordens Hus Ved Stranden 18 DK-1061 Copenhagen K www.norden.org Download Nordic publications at www.norden.org/nordpub STATE OF THE NORDIC REGION 2018 IMMIGRATION AND INTEGRATION EDITION Anna Karlsdóttir, Gustaf Norlén, Linus Rispling and Linda Randall (Eds). This report was produced by Nordregio on behalf of Nordic Welfare Centre and the programme Nordic co-operation on integration of refugees and migrants. The report is partly based on State of the Nordic Region 2018. -
COPFS Refugees Policy
CROWN OFFICE & PROCURATOR FISCAL SERVICE POLICY ON Application OF section 31 of IMMIGration anD ASYluM Act 1999 in respect of RefuGees or PresuMptive RefuGees. www.copfs.gov.uk RefuGEE policY CONTENTS INTRODUCTION 01 PRINCIPLES TO BE APPLIED BY PROSECUTORS IN SCOTLAND 03 DEFENCE IN TERMS OF SECTION 31 OF THE IMMIGRATION AND ASYLUM ACT 1999: BACKGROUND TO THE DEFENCE 03 DETAILED CONSIDERATIONS FOR PROSECUTORS 04 DETAILED FACTORS THAT SHOULD BE TAKEN INTO ACCOUNT 06 THE OFFENCES THAT SECTION 31 APPLIES TO 08 PUBLIC INTEREST CONSIDERATIONS WHEN DETERMINING WHETHER TO RAISE PROCEEDINGS 09 REQUIREMENT FOR POLICE OR HOME OFFICE TO PROVIDE ALL RELEVANT INFORMATION TO COPFS RE- A POSSIBLE S.31 DEFENCE 10 APPLICATION OF THE POLICY TO PERSONS OTHER THAN REFUGEES/ ASYLUM SEEKERS 10 REPORTING TO CROWN COUNSEL 10 BURDEN AND STANDARD OF PROOF 11 CASE LAW 11 RefuGEE policY REFUGEE POLICY COPFS GUIDANCE ON THE Application OF THE DEFENCE IN SECTION 31 OF THE IMMIGration ACT 1999 WHICH PROVIDES PROTECTION FOR REFUGEES AND PRESUMPTIVE REFUGEES. Introduction 1 The United Kingdom is a signatory to the 1951 UN Convention Relating to the Status of Refugees and its 1967 Protocol (the Refugee Convention). 2 The Refugee Convention is the key legal document defining who is a refugee, their rights and the legal obligation of states. It is grounded in Article 14 of the Universal Declaration of Human Rights 1948 which recognises the right of persons to seek asylum from persecution in other countries. 3 The Refugee Convention further states that, subject to specific exceptions, refugees should not be penalised for their illegal entry or stay and recognizes that the seeking of asylum can require refugees to breach immigration rules.