9 + 11 Franck Leibovici
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Study Area Profile
7 percent of the population. The City of Pueblo is the county seat and most populous city in Pueblo El Paso County encompasses more than 2,158 County, serving as the economic hub of square miles – slightly more than twice the area southeastern Colorado. As one of the largest of the state of Rhode Island – and is the most steel-producing cities in the United States, Pueblo populous county in the State of Colorado. The is sometimes referred to as the “Steel City.” western portion of El Paso County is extremely Pueblo’s economy is bolstered by education, mountainous while the eastern part is prairie land healthcare services, and high-profile employers where dairy cows and beef cattle are the main such as Colorado State University (CSU) Pueblo, source of ranchers’ income. The altitude ranges Vestas Wind Systems, Mission Foods, and from about 5,095 feet on the southern border at Professional Bull Riders, Inc. Military convoys and Black Squirrel Creek to 14,115 feet on the summit transportation of supplies and equipment travel of Pikes Peak. Primary communities and their throughout the region as well. Active and retired year of incorporation in this county include: military personnel live in Pueblo County and ◼ City of Colorado Springs (1871) commute to the Colorado Springs area to access ◼ City of Fountain (1900) the installations and services there, and they have ◼ City of Manitou Springs (1888) a shared interest in maintenance of Interstate 25. ◼ Town of Calhan (1919) Primary communities and their year of ◼ Town of Ellicott (1897) incorporation -
HOMETOWN HEROES HOMETOWN HEROES Heroic Stories from Brave Men and Women by Greg Mclntyre
HOMETOWN HEROES HOMETOWN HEROES Heroic Stories From Brave Men and Women by Greg Mclntyre www.mcelderlaw.com Copyright © 2018 by Greg Mclntyre All Rights Reserved No part of this publication may be reproduced or transmitted in any form or by any means, mechanical or electronic, including photocopying and recording, or by any information storage or retrieval system, without permission in writing from the copyright holder. Published by Shelby House Publishing Web: www.mcelderlaw.com FRONT COVER IMAGE BIO he image on the front cover of this book is my Tgrandfather, J.C. Horne, in all his military splendor. Even today, reading the interview I did with him gives me chills. I loved that man with all my heart, he was my buddy. It’s hard for me to accept that the gentle man I knew and loved as my grandfather experienced the atrocities mentioned in his story. I can only imagine what four days R&R in Paris was like when you’d been fighting on the front lines during World War Two in Europe. You can read the interview with him in this book. Without veterans like my grandfather, we may not have a great country to call home. We owe Veterans our freedom. The world would be a much different place than it is today without their sacrifice. It is our duty to take care of them. PREFACE ’m Elder Law Attorney Greg McIntyre of McIntyre Elder Law. My passion is helping seniors protect their assets and legacies. II am also a veteran of the US Navy. I served on the USS Constellation and the USS Nimitz. -
Staff Statement No
Outline of the 9/11 Plot Staff Statement No. 16 Members of the Commission, your staff is prepared to report its preliminary findings regarding the conspiracy that produced the September 11 terrorist attacks against the United States. We remain ready to revise our understanding of this subject as our work continues. Dietrich Snell, Rajesh De, Hyon Kim, Michael Jacobson, John Tamm, Marco Cordero, John Roth, Douglas Greenburg, and Serena Wille did most of the investigative work reflected in this statement. We are fortunate to have had access to the fruits of a massive investigative effort by the Federal Bureau of Investigation and other law enforcement agencies, as well intelligence collection and analysis from the Central Intelligence Agency, the National Security Agency, the State Department, and the Department of Defense. Much of the account in this statement reflects assertions reportedly made by various 9/11 conspirators and captured al Qaeda members while under interrogation. We have sought to corroborate this material as much as possible. Some of this material has been inconsistent. We have had to make judgment calls based on the weight and credibility of the evidence. Our information on statements attributed to such individuals comes from written reporting; we have not had direct access to any of them. Plot Overview Origins of the 9/11 Attacks The idea for the September 11 attacks appears to have originated with a veteran jihadist named Khalid Sheikh Mohammed (KSM). A Kuwaiti from the Baluchistan region of Pakistan, KSM grew up in a religious family and claims to have joined the Muslim Brotherhood at the age of 16. -
USSS) Director's Monthly Briefings 2006 - 2007
Description of document: United States Secret Service (USSS) Director's Monthly Briefings 2006 - 2007 Requested date: 15-October-2007 Appealed date: 29-January-2010 Released date: 23-January-2010 Appeal response: 12-April-2010 Posted date: 19-March-2010 Update posted: 19-April-2010 Date/date range of document: January 2006 – December 2007 Source of document: United States Secret Service Communications Center (FOI/PA) 245 Murray Lane Building T-5 Washington, D.C. 20223 Note: Appeal response letter and additional material released under appeal appended to end of this file. The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. -
Al-Qaeda: the Many Faces of an Islamist Extremist Threat
a al-Qaeda: The Many Faces of an Islamist Extremist Threat REPORT OF THE HOUSE PERMANENT SELECT COMMITTEE ON INTELLIGENCE ISBN 0-16-076897-7 90000 9 780160 768972 al-QaedaTh e Many Faces of an Islamist Extremist Th reat REPORT OF THE HOUSE PERMANENT SELECT COMMITTEE ON INTELLIGENCE JUNE 2006 109th Congress Union Calendar No. 355 2d Session Report 109-615 al-Qaeda: The Many Faces of an Islamist Extremist Threat ___________________ REPORT OF THE U.S. HOUSE PERMANENT SELECT COMMITTEE ON INTELLIGENCE APPROVED: JUNE 2006 TOGETHER WITH ADDITIONAL AND MINORITY VIEWS SUBMITTED: SEPTEMBER 2006 Available via the World Wide Web: http://www.gpo.gov/congress/house http://intelligence.house.gov/ September 6, 2006.—Committed to the Committee of the Whole House on the State of the Union and ordered to be printed U.S. GOVERNMENT PRINTING OFFICE Keeping America Informed I www.gpo.gov WASHINGTON : 2006 For sale by the Superintendent of Documents, U.S. Government Printing Offi ce Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC area (202) 512-1800 Fax: (202) 512-2250 Mail: Stop SSOP, Washington, DC 20402-0001 ISBN 0-16-076897-7 i PERMANENT SELECT COMMITTEE ON INTELLIGENCE OF THE HOUSE OF REPRESENTATIVES PETER HOEKSTRA, MICHIGAN, CHAIRMAN RAY LAHOOD, ILLINOIS JANE HARMAN, CALIFORNIA TERRY EVERETT, ALABAMA ALCEE L. HASTINGS, FLORIDA ELTON GALLEGLY, CALIFORNIA SILVESTRE REYES, TEXAS HEATHER WILSON, NEW MEXICO LEONARD L. BOSWELL, IOWA JO ANN DAVIS, VIRGINIA ROBERT E. (BUD) CRAMER, JR., ALABAMA MAC THORNBERRY, TEXAS ANNA G. ESHOO, CALIFORNIA JOHN M. MCHUGH, NEW YORK RUSH D. HOLT, NEW JERSEY TODD TIAHRT, KANSAS C. -
65 Question History Test. See If You Can Get 100%
65 QUESTION HISTORY TEST. SEE IF YOU CAN GET 100%. HERE’S THE TEST: 1. 1968 Bobby Kennedy was shot and killed by: a. Superman b. Jay Leno c. Long-haired pot head d. A Muslim male extremist between the ages of 17 and 40 suffering from pre-traumatic stress disorder. This murderer was a twenty-four year old Palestinian immigrant named Sirhan Sirhan. 2. In 1972 at the Munich Olympics, Israeli athletes were kidnapped and massacred by : a. Olga Corbett b. Sitting Bull c. Arnold Schwarzenegger d. Muslim male extremists between the ages of 17 and 40 unable to cope with the strain of competition between nation states in which they saw medals as signs of warlike domination 3. In November 1979, the US embassy in Tehran Iran was seized and taken over and 66 hostages are taken. This seizure was an outright attack on American Soil. The hostages were held for 444 days and were released on the day of President Reagan’s inauguration. The embassy was taken over by: a. Lost Norwegians interviewing candidates for kinetic Nobel Prizes, for potential future acts of valor they might commit b. Elvis c. A tour bus full of 80-year-old women d. Muslim male extremists between the ages of 17 and 40 strained by the invasion of infidels on their soil and unable to attend US universities on scholarship. One of the participants in the seizure of the embassy may have been Mahmoud Ahmadinejad, the current President of Iran who holds a Ph.D. in traffic and transport engineering from Tehran University of Science and Technology and was a 23-year old student at the time. -
The Search for Continental Security
THE SEARCH FOR CONTINENTAL SECURITY: The Development of the North American Air Defence System, 1949 to 1956 By MATTHEW PAUL TRUDGEN A thesis submitted to the Department of History in conformity with the requirements for the degree of Doctor of Philosophy Queen’s University Kingston, Ontario, Canada September 12, 2011 Copyright © Matthew Paul Trudgen, 2011 Abstract This dissertation examines the development of the North American air defence system from the beginning of the Cold War until 1956. It focuses on the political and diplomatic dynamics behind the emergence of these defences, which included several radar lines such as the Distant Early Warning (DEW) Line as well as a number of initiatives to enhance co-operation between the United States Air Force (USAF) and the Royal Canadian Air Force (RCAF). This thesis argues that these measures were shaped by two historical factors. The first was several different conceptions of what policy on air defence best served the Canadian national interest held by the Cabinet, the Department of External Affairs, the RCAF and the Other Government Departments (OGDs), namely Transport, Defence Production and Northern Affairs. For the Cabinet and External Affairs, their approach to air defence was motivated by the need to balance working with the Americans to defend the continent with the avoidance of any political fallout that would endanger the government‘s chance of reelection. Nationalist sentiments and the desire to ensure that Canada both benefited from these projects and that its sovereignty in the Arctic was protected further influenced these two groups. On the other hand, the RCAF was driven by a more functional approach to this issue, as they sought to work with the USAF to develop the best air defence system possible. -
Debunking 911 Myths.Pdf
PRAISE FOR DEBUNKING 9111 MYTHS "Debunking 9111 Myths is a reliable and rational answer to the many fanciful conspiracy theories about 9/11. Despite the fact that the myths are fictitious, many have caught on with those who do not trust their government to tell the truth anymore. Fortunately, the govern ment is not sufficiently competent to pull off such conspiracies and too leaky to keep them secret. What happened on 9/11 has been well established by the 9/11 Commission. What did not happen has now been clearly explained by Popular Mechanics." -R 1 cHARD A. cLARKE, former national security advisor, author of Against All Enemies: Inside America's War on Terror "This book is a victory for common sense; 9/11 conspiracy theorists beware: Popular Mechanics has popped your paranoid bubble world, using pointed facts and razor-sharp analysis." -Au s T 1 N BAY, national security columnist (Creators Syndicate), author (with James F. Dunnigan) of From Shield to Storm: High-Tech Weapons, Military Strategyand Coalition Warfare in the Persian Gulf "Even though I study weird beliefs for a living, I never imagined that the 9/11 conspiracy theories that cropped up shortly after that tragic event would ever get cultural traction in America, but here we are with a plethora of conspiracies and no end in sight. What we need is a solid work of straightforward debunking, and now we have it in Debunking 9111 Myths. The Popular Mechanics article upon which the book is based was one of the finest works of investigative journalism and skep tical analysis that I have ever encountered, and the book-length treat ment of this codswallop will stop the conspiracy theorists in their fantasy-prone tracks. -
9/11 Report”), July 2, 2004, Pp
Final FM.1pp 7/17/04 5:25 PM Page i THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page v CONTENTS List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— ...in the Law Enforcement Community 73 3.3 . and in the Federal Aviation Administration 82 3.4 . and in the Intelligence Community 86 v Final FM.1pp 7/17/04 5:25 PM Page vi 3.5 . and in the State Department and the Defense Department 93 3.6 . and in the White House 98 3.7 . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis:August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5. -
We Are Looking to Cast 9 Main Roles and 15 Supporting/Ensemble/Choir Roles
Thank you for joining us today for auditions for Assassins. Before we get started today please read the following: About the Show: Assassins lays bare the lives of nine individuals who assassinated or tried to assassinate the President of the United States, in a historical "revusical" that explores the dark side of the American experience. From John Wilkes Booth to Lee Harvey Os- wald, writers, Stephen Sondheim and John Weidman, bend the rules of time and space, taking us on a nightmarish roller coaster ride in which assassins and would-be assassins from different historical periods meet, interact and inspire each other to harrowing acts in the name of the American Dream. We are looking to cast 9 main roles and 15 supporting/ensemble/choir roles. The main roles are as follows: John Wilkes Booth (Vocal Range: F2-G4) Charles Guiteau (Vocal Range: A2-Ab4) Leon Czologosz (Vocal Range: G#2-G4) Giuseppe Zangara (Vocal Range: B2-A4) Samuel Byck (Vocal Range: D3-G4) Lynette “Squeaky” Fromme (Vocal Range: A3-B5) John Hinckley (Vocal Range: A2-G4) Sara Jane Moore (Vocal Range: F3-Eb5) Lee Harvey Oswald (Vocal Range: A2-G4) Balladeer (Vocal Range: C3-G4) The Proprietor (Vocal Range: Gb2-F4) Ensemble/ Choir: Emma Goldman David Herold Billy Moore No vocal range required No vocal range required No vocal range required Choir members will have a chance to play the roles of the presidents, tourists, news reporters, bystanders, or photographers. There are also some solo parts for the choir. Just a few more things… Auditions will consist of your prepared song. -
Phan Rang AB, RVN ...Keeping the Memories Alive Phan Rang AB News No
“Happy Valley” Phan Rang AB, RVN ...keeping the memories alive Phan Rang AB News No. 151 “Stories worth telling” In this issue: Phan Rang Member Profiles Christopher Boles John T. Claybaugh Steve Phillips Steve Curry Charles Edward Meyer Richard Oelker John Walters Thomas Petersen Michaelangelo Rodriguez John Deegan Robert Agrifoglio James Wesley Etichson Jim Rabourn The Art of Ronald Dreher Doug’s Comments Phan Rang Member Profiles Christopher Boles I came into this world on May 12, 1948, Santa Paula California. My mom gave me a Kodak Brownie camera for Christmas at age 7 (still have it). I can recall the first time I used it was to take b/w photographs at Disneyland on the Jungle Ride. It was in high school I signed up for photography classes and found the love of photography. It was that ability to take a photo, process the film, and make prints. The photography class was part of the yearbook staff and I was out for every game of football, basketball and school activity. What photography afforded me in high school, being a shy kid, was a chance to be close to the cheerleaders who in my opinion were the prettiest girls at school. It was through photography I found out that photographers had access to places that the public doesn’t normally get to go. Page 1 The Phan Rang AB News No. 151 “Happy Valley” Phan Rang AB, RVN ...keeping the memories alive Phan Rang AB News No. 151 “Stories worth telling” My mom gave me her Argus A7 (35mm) and that changed my life, as I could get 36 shots on a roll instead of 12 on the Brownie. -
Tracking Terrorist Financing by Michael E Gray
Ch F-X ang PD e w Click to buy NOW! w m o w c .d k. ocu-trac Tracking Terrorist Financing By Michael E Gray 1 Ch F-X ang PD e w Click to buy NOW! w m o w c .d k. ocu-trac Introduction As the war on terror has entered it seventh year, efforts to dismantle terrorist financial networks remains an essential part of the strategy. More than 140 millions dollars in terrorist assets have been frozen. Some 1,600 bank accounts have been seized world wide. Terrorist groups have become increasingly adapted to eluding detection through the use of cash, shell companies and money laundering operations. Charities donations and informal money transfer centers (hawals) are strongly embedded in the Islamic culture have made it extremely difficult in tracking down terrorist financial links. Another fact to be considered by law enforcement is that terrorist operations can be accomplished at a relatively low cost. A good example of this is the 2005 London train bombing cost $2,000, the 2004 Madrid mass transit bombing was $10,000-$15,000, the 2002 Bali nigh club bombing was $50,0001 and the 9/11 World Trade Center attack was $400,000-$500,0002 What methods are used to fiancé these operations? Charities. At once time they were the main source of operating capital along with donations from wealthy individuals according to the CFR 2002 Task Force Report. The 2004 report does state that Saudi Arabia has taken some steps to rectify this. In the Islamic culture there are numerous charities out there and we can not monitor all of them3.