Diccionario A
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Jihadi Threat: ISIS, Al-Qaeda, and Beyond
THE JIHADI THREAT ISIS, AL QAEDA, AND BEYOND The Jihadi Threat ISIS, al- Qaeda, and Beyond Robin Wright William McCants United States Institute of Peace Brookings Institution Woodrow Wilson Center Garrett Nada J. M. Berger United States Institute of Peace International Centre for Counter- Terrorism Jacob Olidort The Hague Washington Institute for Near East Policy William Braniff Alexander Thurston START Consortium, University of Mary land Georgetown University Cole Bunzel Clinton Watts Prince ton University Foreign Policy Research Institute Daniel Byman Frederic Wehrey Brookings Institution and Georgetown University Car ne gie Endowment for International Peace Jennifer Cafarella Craig Whiteside Institute for the Study of War Naval War College Harleen Gambhir Graeme Wood Institute for the Study of War Yale University Daveed Gartenstein- Ross Aaron Y. Zelin Foundation for the Defense of Democracies Washington Institute for Near East Policy Hassan Hassan Katherine Zimmerman Tahrir Institute for Middle East Policy American Enterprise Institute Charles Lister Middle East Institute Making Peace Possible December 2016/January 2017 CONTENTS Source: Image by Peter Hermes Furian, www . iStockphoto. com. The West failed to predict the emergence of al- Qaeda in new forms across the Middle East and North Africa. It was blindsided by the ISIS sweep across Syria and Iraq, which at least temporarily changed the map of the Middle East. Both movements have skillfully continued to evolve and proliferate— and surprise. What’s next? Twenty experts from think tanks and universities across the United States explore the world’s deadliest movements, their strate- gies, the future scenarios, and policy considerations. This report reflects their analy sis and diverse views. -
Anti-Semitism: a Pillar of Islamic Extremist Ideology
Anti-Semitism: A Pillar of Islamic Extremist Ideology In a video message in August 2015, Osama bin Laden’s son, Hamza bin Laden, utilized a range of anti-Semitic and anti-Israel narratives in his effort to rally Al Qaeda supporters and incite violence against Americans and Jews. Bin Laden described Jews and Israel as having a disproportionate role in world events and the oppression of Muslims. He compared the “Zio- Crusader alliance led by America” to a bird: “Its head is America, one wing is NATO and the other is the State of the Jews in occupied Palestine, and the legs are the tyrant rulers that sit on the chests of the peoples of the Muslim Ummah [global community].” An undated image of al-Qaeda terrorist Osama bin Laden and his son, Hamza Bin Laden then called for attacks worldwide and demanded that Muslims “support their brothers in Palestine by fighting the Jews and the Americans... not in America and occupied Palestine and Afghanistan alone, but all over the world…. take it to all the American, Jewish, and Western interests in the world.” Such violent expressions of anti-Semitism have been at the core of Al Qaeda’s ideology for decades. Even the 9/11 terrorist attacks were motivated, in part, by anti-Semitism. Mohamed Atta, a key member of the Al Qaeda Hamburg cell responsible for the attacks, reportedly considered New York City to be the center of a global Jewish conspiracy, and Khalid Sheik Mohammed, who masterminded the attack, had allegedly previously developed several plans to attack Israeli and Jewish targets. -
9/11 Report”), July 2, 2004, Pp
Final FM.1pp 7/17/04 5:25 PM Page i THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page v CONTENTS List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— ...in the Law Enforcement Community 73 3.3 . and in the Federal Aviation Administration 82 3.4 . and in the Intelligence Community 86 v Final FM.1pp 7/17/04 5:25 PM Page vi 3.5 . and in the State Department and the Defense Department 93 3.6 . and in the White House 98 3.7 . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis:August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5. -
The Al Qaeda Network a New Framework for Defining the Enemy
THE AL QAEDA NETWORK A NEW FRAMEWORK FOR DEFINING THE ENEMY KATHERINE ZIMMERMAN SEPTEMBER 2013 THE AL QAEDA NETWORK A NEW FRAMEWORK FOR DEFINING THE ENEMY KATHERINE ZIMMERMAN SEPTEMBER 2013 A REPORT BY AEI’S CRITICAL THREATS PROJECT ABOUT US About the Author Katherine Zimmerman is a senior analyst and the al Qaeda and Associated Movements Team Lead for the Ameri- can Enterprise Institute’s Critical Threats Project. Her work has focused on al Qaeda’s affiliates in the Gulf of Aden region and associated movements in western and northern Africa. She specializes in the Yemen-based group, al Qaeda in the Arabian Peninsula, and al Qaeda’s affiliate in Somalia, al Shabaab. Zimmerman has testified in front of Congress and briefed Members and congressional staff, as well as members of the defense community. She has written analyses of U.S. national security interests related to the threat from the al Qaeda network for the Weekly Standard, National Review Online, and the Huffington Post, among others. Acknowledgments The ideas presented in this paper have been developed and refined over the course of many conversations with the research teams at the Institute for the Study of War and the American Enterprise Institute’s Critical Threats Project. The valuable insights and understandings of regional groups provided by these teams directly contributed to the final product, and I am very grateful to them for sharing their expertise with me. I would also like to express my deep gratitude to Dr. Kimberly Kagan and Jessica Lewis for dedicating their time to helping refine my intellectual under- standing of networks and to Danielle Pletka, whose full support and effort helped shape the final product. -
Radical Islamist Groups in Germany: a Lesson in Prosecuting Terror in Court by Matthew Levitt
MENU Policy Analysis / PolicyWatch 834 Radical Islamist Groups in Germany: A Lesson in Prosecuting Terror in Court by Matthew Levitt Feb 19, 2004 ABOUT THE AUTHORS Matthew Levitt Matthew Levitt is the Fromer-Wexler Fellow and director of the Reinhard Program on Counterterrorism and Intelligence at The Washington Institute. Brief Analysis n February 5, 2004, a German court acquitted Abdelghani Mzoudi, a thirty-one-year-old native Moroccan, of O 3,066 counts of accessory to murder and membership in a terrorist organization (al-Qaeda). Mzoudi is suspected of having provided material and financial support to the Hamburg cell that helped organize and perpetrate the terrorist attacks of September 11, 2001. According to the presiding judge, Mzoudi was acquitted for lack of evidence, not out of a belief in the defendant's innocence. The acquittal was the most recent example of a growing dilemma faced by the United States and other countries in their efforts to prosecute suspected terrorists: how to gain access to intelligence for criminal proceedings without compromising the sources of that information. Indeed, Mzoudi's acquittal comes at a time when, despite nearly three years of fighting the war on terror, German intelligence claims that the presence of militant Islamist groups on German soil has reached new heights. U.S. officials face similar circumstances. Al-Qaeda in Germany Within days of the September 11 attacks, al-Qaeda activities in Germany quickly emerged as a key focus of the investigation. Three of the four suicide pilots -- Mohammed Atta, Marwan al-Shehi, and Ziad Jarrah -- were members of the Hamburg cell. -
Banco Central De La República Argentina
BANCO CENTRAL DE LA REPÚBLICA ARGENTINA COMUNICACIÓN “ B “ 7701 28/01/2003 A LAS ENTIDADES FINANCIERAS: Ref.: Información cursada por el Banco de la Reserva Federal de Nueva York, relacionada con perso- nas vinculadas con actividades terroristas _______________________________________________________________ Nos dirigimos a Uds. con relación al requerimiento efectuado por el Banco de la Reserva Fede- ral de Nueva York, vinculado con la investigación penal que esta llevando a cabo sobre el terrorismo. Al respecto les señalamos, que deberán verificar si de sus registros surge que realizan operacio- nes con particulares y entidades incluidas en la denominada “Lista de Control”, que se adjunta en Anexo. En el caso en que la entidad financiera local sea controlada por una entidad financiera sujeta a la supervisión consolidada del Banco de la Reserva Federal de N.Y., deberá informar las operaciones detecta- das en forma directa al mencionado organismo de supervisión, proporcionando todos los datos que al respec- to se posean, debiendo a la vez notificar de ello a la Superintendencia de Entidades Financieras y Cambiarias, mediante nota dirigida al Gerente responsable de la supervisión de la entidad. A su vez llevamos a su conocimiento que el presente requerimiento, así como las futuras actuali- zaciones que se efectúen, deberá considerarse como si fueran formuladas por el BCRA. Respecto de las entidades financieras cuyo controlante no esté sujeto a la supervisión consolida- da del Banco de la Reserva Federal de N.Y, en el caso de detectar operaciones de alguna de las personas u entidades incluidas en la “Lista de Control”, éstas deberán enviar una notificación al Banco de la Reserva Fe- deral de N.Y a la dirección [email protected] Dicha notificación deberá ser genérica sin identificar, por ejemplo, las personas o montos involu- crados a los fines de respetar el secreto bancario. -
9-11 and Terrorist Travel- Full
AND TERRORIST TRAVEL Staff Report of the National Commission on Terrorist Attacks Upon the United States 9/11 AND TERRORIST TRAVEL Staff Report of the National Commission on Terrorist Attacks Upon the United States By Thomas R. Eldridge Susan Ginsburg Walter T. Hempel II Janice L. Kephart Kelly Moore and Joanne M. Accolla, Staff Assistant Alice Falk, Editor Note from the Executive Director The Commission staff organized its work around specialized studies, or monographs, prepared by each of the teams. We used some of the evolving draft material for these studies in preparing the seventeen staff statements delivered in conjunction with the Commission’s 2004 public hearings. We used more of this material in preparing draft sections of the Commission’s final report. Some of the specialized staff work, while not appropriate for inclusion in the report, nonetheless offered substantial information or analysis that was not well represented in the Commission’s report. In a few cases this supplemental work could be prepared to a publishable standard, either in an unclassified or classified form, before the Commission expired. This study is on immigration, border security and terrorist travel issues. It was prepared principally by Thomas Eldridge, Susan Ginsburg, Walter T. Hempel II, Janice Kephart, and Kelly Moore, with assistance from Joanne Accolla, and editing assistance from Alice Falk. As in all staff studies, they often relied on work done by their colleagues. This is a study by Commission staff. While the Commissioners have been briefed on the work and have had the opportunity to review earlier drafts of some of this work, they have not approved this text and it does not necessarily reflect their views. -
In This Interview: Adam Tells Resurgence Azzam Al-Amriki June 25, 2015
In this interview: Adam tells Resurgence Azzam al-Amriki June 25, 2015 [Please note: Images may have been removed from this document. Page numbers may have been added.] Targeting India will remain one of the Mujahideen’s priorities as long as it pursues its antagonistic policies and continues to engage in and condone the persecution, murder and rape of Muslims and occupation of their land The way forward for our persecuted brothers in Bangladesh is Da’wah and Jihad The Pakistani regime bears responsibility for the toppling of the Islamic Emirate and the occupation of Afghanistan, and its crimes are continuing unabated While in Pakistan, I and my brothers were blessed with numerous supporters who sheltered and took care of us despite the risk The Americans and their Pakistani agents almost captured me in Karachi on at least two occasions Shaykh Abu Mus’ab al-Zarqawi had the qualities of a great leader and a smile which could illuminate a city The Americans came close to martyring Shaykh Abu Mus’ab (may Allah have mercy on him) in Afghanistan, but Allah preserved him until he became America’s number one enemy in Iraq Shaykh Abu Mus’ab was a champion of unity who fought for the Ummah, and he should not be held responsible for the deviation today of some people who falsely claim to follow him and his methodology A Muslim’s blood is sacred, more sacred even than the Ka’aba, and spilling it without right is not only an act of oppression, it is the greatest sin after Kufr and Shirk The blessed raids of September 11th rubbed America’s nose in -
Federal Register/Vol. 68, No. 164/Monday, August 25, 2003
51048 Federal Register / Vol. 68, No. 164 / Monday, August 25, 2003 / Notices Clearance Officer, Jacqueline White, Dated: August 19, 2003. SUPPLEMENTARY INFORMATION: UN Small Business Administration, 409 3rd Herbert L. Mitchell, Security Council Resolutions 1390 Street, SW., 5th Floor, Washington, DC Associate Administrator for Disaster (2002) and 1455 (2003) require UN 20416; and OMB Reviewer, Office of Assistance. Member States to implement an arms Information and Regulatory Affairs, [FR Doc. 03–21673 Filed 8–22–03; 8:45 am] embargo (and other sanctions) against Office of Management and Budget, New BILLING CODE 8025–01–P those individuals, groups, undertakings Executive Office Building, Washington, and entities listed in the consolidated DC 20503. list created in accordance with UN FOR FURTHER INFORMATION CONTACT: SMALL BUSINESS ADMINISTRATION Security Council Resolutions 1267 Jacqueline White, Agency Clearance (1999) and 1333 (2000) and maintained Officer, (202) 205–7044. Delegation of Authority as to Denial of by the UN 1267 Sanctions Committee. Liability on 7(a) Loans Specifically, the resolutions require that SUPPLEMENTARY INFORMATION: Member States prevent the direct or The Administrator of the U.S. Small Title: Reports to SBA, Provisions of 13 indirect supply, sale and transfer, to Business Administration (SBA), Hector CFR 120.472. those on the 1267 Sanctions Committee V. Barreto, pursuant to the authority No: N/A. list, from their territories or by their Frequency: On Occasion. vested in him by the Small Business nationals outside their territories, or Description of Respondents: Small Act, 72 Stat. 384, as amended, hereby using their flag vessels or aircraft, of Business Lending Companies. delegates to the Associate Deputy arms and related material of all types Responses: 14. -
The Militant Pipeline Between the Afghanistan-Pakistan Border Region and the West
New America Foundation National Security Studies Program Policy Paper The Militant Pipeline Between the Afghanistan-Pakistan Border Region and the West Paul Cruickshank Second Edition July 2011; First Edition February 2010 Of the 32 “serious” jihadist terrorist plots against the West between 2004 and 2011, 53 percent had operational or training links to established jihadist groups in Pakistan and just 6 percent to Yemen. A decade after 9/11, despite growing concerns over Yemen, entry to join the fighting in Afghanistan, the presence of al Pakistan’s Federally Administered Tribal Areas (FATA) and Qaeda, and its sustained ability to train recruits and swaths of the country’s northwest arguably remain al Qaeda persuade them to launch attacks in the West, continue to ’s main safe haven, and the area from which it can hatch its make the FATA what President Obama called in 2009 “the most dangerous plots against the West. 1 Al Qaeda’s most dangerous place in the world.” 4 presence in these areas has long threatened international security. It was in Peshawar in Pakistan’s northwest that al U.S. officials have recently suggested that when it comes to Qaeda was founded in 1988, and ever since Pakistan’s the U.S. homeland, al Qaeda’s affiliate in Yemen – al Qaeda border region with Afghanistan has been a gateway for in the Arabian Peninsula (AQAP) – could now pose a recruits joining the terrorist network and its affiliates, and greater threat than “al Qaeda Central” in the tribal areas of an area in which its senior figures have felt comfortable Pakistan. -
9/11 FBI Report 2004 02(Feb)
mmmm M a a , aaaaH a aaa iiui H Q x 1 $2 K! F R L 5' ,-1,i-:l}§§1_-"EX-L"?;ZI?£I>i;2;i@a?;-1Y,I=: Law Enfarcament Sensitive Summary of Penttbom Investigation Q , Prepared by Penttbom Team Roam 1B-999 February 29, 2004 Law Enforcement Sansitive H ¢ sauna-3844 ~ MISC1ama;j¥a%%W,aWaaaia{avaa-1? aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa iv Law Enforcement Sensitive PENTTBOM CASE SUMMARY 0212912904 The fulinwingis a "Law En.n'c_en1c11t_Sensitivrz"ofznaicriais versirm relevant E13 thc PEN ITBDMinvestig;ati0n_. Recipientsshould forwardadditional pertinentinflurmatiun the-:ta PENTFBGM InvestigativeTeam at FBI Headquarters {Room{B599} 02~32¢$~9060!. This documentmay begiven toother LawEnfomement Agencieswhu havea legitimate need inmow. The ccmtents 0fthis documsntmay nothe reproducedfor pubiicazionw Fiald Divisicmsshould heaware thatany analyticalproducts created.containizzg information relatingTQ the19 Hijackers,associates, orevents sf9E1 M11must beappreved byshe PENTTBOM InvestigativeTeam. 1 Law Enforcement Sensitive MISC. REQ. #§4& 900003845 v Law Enforcement Sensitive nzmr-1&4 I. In; mducun II. Ea Pt! Wj_g,ned 'in_Yes!iga§ian_T__;1 , , , , , V , _ Diets, , , , , , , , ,Y A. Travei of Non-Pilat Hijackers to Aighanistan B. Training in Afghanistan for tha Pilots i". Hamburg Piints ii. Hanjaur C. Ghtaining US Visas by the Pikrts i. Al~$lmhhi ii. Jarrah iii Atta iv. Binalshihh v. A!-»HZazmi vi. Hanjour D, Flight Training Research and Appiicaons Arrival in the US by the Hijacker Leadership i. Aldviihdhar and Al-H:1zmi ii. Hanjour iii. Atta and Ai»SheI1hi iv. Jarrah 2 vLaw Enfnrcement Sensitive MISC, mg. #4:; 066003846 "yr Law Enforcement Sensitive F. Initial Financing G. Flight Training L Al-Hazmi anti Al-Mihdhar ii. -
Staff Statement No. 1
Entry of the 9/11 Hijackers into the United States Staff Statement No. 1 Members of the Commission, we have developed initial findings on how the individuals who carried out the 9/11 attacks entered the United States. We have also developed initial findings on terrorists who failed in their efforts to enter the United States. These findings lead us to some tentative judgments on the way the United States targets the travel of international terrorists. This staff statement represents the collective effort of several members of our staff. Susan Ginsburg, Thomas Eldridge, and Janice Kephart-Roberts did most of the investigative work reflected in this statement. The Commission was able to build upon a large and strong body of work carried out by many talented public servants at the Department of State, the Central Intelligence Agency, the former Immigration and Naturalization Service, the Department of Homeland Security, and the Federal Bureau of Investigation. The American people should be proud of the many extraordinary professionals now serving them. To the extent we have criticisms, they are comments less on the talent available and more on how that talent was used. As we know from the sizable illegal traffic across our land borders, a terrorist could attempt to bypass legal procedures and enter the United States surreptitiously. None of the 9/11 attackers entered or tried to enter our country this way. So today we will focus on the hijackers’ exploitation of legal entry systems. We have handed out a list of the names of 9/11 attackers to help you follow our discussion.