Diccionario A

Total Page:16

File Type:pdf, Size:1020Kb

Diccionario A Medellín - Colombia Presentación Edición Especial No. 7 15 de enero de 2018 Esta es la segunda versión del Diccionario sobre Terrorismo Islámico, concretamente esta es una obra del Doctor Carlos Editor Alfredo de Jorge, académico argentino que ha dedicado la mayor Douglas Hernández parte de su vida al estudio de fenómenos políticos y sociales de importancia mundial, y que ahora es un asiduo colaborador de Autor de esta obra TRIARIUS. Carlos Alfredo de Jorge Este documento, como todas nuestras publicaciones, está Argentina. destinado a convertirse en fuente permanente de consulta para los profesionales del sector de la seguridad, la inteligencia, la defensa, Carlos Alfredo de Jorge es Doctor el cuerpo diplomático, y de todos los funcionarios encargados de en Ciencias Políticas por la prevenir la radicalización, y luchar contra el terrorismo en todas Pontificia Universidad Católica Argentina “Santa María de los sus manifestaciones. Buenos Aires”, Instituto de Ciencias Al igual que el Boletín de Prevención y Seguridad ante el Políticas y Relaciones Terorrismo y las Nuevas Amenazas que publicamos de manera Internacionales. Durante más de 20 quincenal, este Diccionario también está abierto a recibir años ejerció como profesor titular en la Cátedra de Geografía Física contribuciones de nuestros lectores. Creemos firmemente que Argentina y en la Cátedra de compartir información y conocimiento es una forma efectiva de Geografía Regional de la República contribuir en la lucha para reducir a aquellos que atentan contra la Argentina, en el Consejo Superior de Educación Católica sociedad y la convivencia pacífica. (CONSUDEC). También ejerció En relación con la primea versión, esta viene ampliada con nuevas como docente en otros prestigiosos entradas, que incluyen eventos, grupos y personas de interés. centros de educación superior, Esperamos que este material sea de utilidad para nuestros incluyendo el Colegio Militar de la Nación y la Escuela Superior de amables lectores, en los distintos países del mundo. Gendarmería Nacional “Gral Brig Don Manuel María Calderón”. Posee diversas publicaciones. ¡Conocer para vencer! Información de Contacto: Douglas Hernández Medellín, Colombia Douglas Hernández Movil: (+57) 321-6435103 Editor [email protected] [email protected] 2 BREVE DICCIONARIO REFERIDO AL TERRORISMO ISLÁMICO OBJETIVOS DE LA LABOR La tarea emprendida es una guía ordenada alfabéticamente para aquellos que necesitan información actualizada acerca del terrorismo islámico. La lista está acompañada de las correspondientes fuentes bibliográficas que se han utilizado para su preparación, en caso de que alguien quiera profundizar en algún tema en particular, y un párrafo final que puede orientar la búsqueda hacia el futuro inmediato. Aunque, como dicen los historiadores, el pasado no es un evento específico que nos permite asegurar los acontecimientos futuros. Palabras clave: Islam, terrorismo, yihadismo, organizaciones y grupos, diccionario. OBJETIVES OF THE WORK The task undertaken is an ordered alphabetically guide for those who need updated information about Islamic terrorism. The list is accompanied by the corresponding bibliographical sources that have been used for their preparation, if someone wants to deepen any particular topic, and a final paragraph that can guide the search towards the immediate future. Even though, as historians say, the past is not a specific event that enables us to ensure future events. Keywords: Islam, terrorism, jihadist, organizations and groups, dictionary. OBJECTIFS DU TRAVAIL L’ache enterprise est un guide par ordre alphabétique pour ceux qui ont besoin d'informations à jour sur le terrorisme islamique. La liste est accompagnée par les sources bibliographiques correspondantes qui ont été utilisées pour leur préparation, si quelqu'un veut approfondir un sujet particulier, et un paragraphe final qui peut guider la recherche vers l'avenir immédiat. Bien que, comme disent les historiens, le passé est pas un événement spécifique qui nous permet d'assurer des événements futurs. Mots-clés: Islam, le terrorisme, le djihadisme, les organisations et les groupes, dictionnaire. 3 ACLARACIÓN INTRODUCTORIA El presente trabajo ha sido pensado en función de las continuas escaladas terroristas que han ocurrido en todos los ámbitos del mundo, algunos de gran resonancia como el del World Trade Center, en la ciudad de Nueva York, o los más recientes sucedidos en España (en diversos convoyes que convergían, entre otras, a la estación Atocha, del 11 de marzo de 2004, con un saldo de 177 decesos y 1857 heridos); en Londres, (el 7 de julio del año 2005, con un saldo de 56 muertos y 700 heridos); en Francia (París, Charlie Hebdo, del 7 de enero de 2015; Niza el 14 de Julio de 2016, entre otros tantos); en Bélgica, Turquía, Bangladesh, India, Egipto, Filipinas, Indonesia, Yemen, Kuwait, Arabia Saudita, Irak, Siria, Rusia, Pakistán, Afganistán, Argelia, Túnez, Mali, Uzbekistán, Turkmenistán, etc. La República Argentina -desgraciadamente- ha sufrido dos de ellos que han marcado a fuego a nuestra sociedad. El atentado perpetrado en la embajada de Israel el día 27 de marzo de 1982 (que dejara el trágico saldo de 22 muertos y 242 heridos) y el atentado a la AMIA (Asociación Mutual Israelita Argentina), acaecido el 18 de julio de 1994, con 85 personas muertas y 300 heridas de distinta consideración, ambos casos aún sin resolverse. PROEMIO El esquema fenomenológico, geográfico, temporal y político ✓ Para comprender este fenómeno y coincidiendo con las ideas del pensador y sociólogo noruego Johan Galtung (especialista en el estudio de los conflictos sociales y un avanzado en las investigaciones sobre los procesos de paz) podemos afirmar que el terrorismo se basa en una acción de violencia que genera efectos psíquicos desproporcionados respecto a sus consecuencias materiales y adquiriendo peculiaridades propias. En concreto: la intención de suscitar reacciones emocionales tales como ansiedad, incertidumbre, pánico o amedrentamiento entre quienes forman parte de un determinado agregado de la población, de manera que resulte factible condicionar sus actitudes y dirigir sus comportamientos en una dirección determinada hacia sus propios objetivos más que el deseo de causar daños tangibles a personas o cosas. Lo cual ayuda a distinguir a dicha violencia de tantas otras, habitualmente de mayor alcance y magnitud, extendidas sobre todo por su destructividad potencial y/o efectiva. Johan Galtung, distingue tres tipos de violencia, a saber: ➢ La directa ➢ La estructural y ➢ La cultural. 4 La violencia directa es la física, la que tiene como objeto “herir o matar” a otra persona o a varias de ellas, mientras que la violencia estructural es más sutil, pero no menos grave: consiste en agredir desde la esfera política o económica, causando hambre, miseria, enfermedad o la muerte de la población; no hay aquí un hombre que ataca a otro directamente sino toda una estructura que “aporta en contra de las necesidades básicas de una población”. A su vez sostiene que una -la estructural- sirve de soporte a la otra -la directa- ya que la violencia directa, física y/o verbal, se hace visible a través del comportamiento. Pero la acción humana no surge de la nada: tiene sus raíces. Dos de ellas son indicativas: la cultura de la violencia (heroica, patriótica, patriarcal, sectaria, etc.) y la estructura violenta en sí misma por ser demasiado represiva, explotadora o alienante; demasiado estricta o permisiva para la comodidad del pueblo. En las obras en cuestión la violencia se presenta en sucesivas etapas, si se quiere, cronológica. Dependiendo del caso la violencia puede comenzar por un desafío verbal, desembocar luego en una agresión de un cuerpo hacia otro, que logra, incluso, finalizar en la muerte de uno de los combatientes. Pero la realidad puede superar a la ficción. Toda violencia es una violación y cae de maduro que no es necesario recurrir a actos de violencia física para violar la humanidad de otra persona. Basta con hacer, por ejemplo, de la lengua un arma. Los recursos para tal propósito ya han sido sistematizados: nombrar con distorsión, corregir el vocablo con el que el supuesto enemigo se nombra a sí mismo, deformar los nombres propios, provocar la risa, advertir o amenazar con cada palabra. O lo que es igual, efectuar un trasbordo ideológico inadvertido, algo usual en los grupos terroristas que utilizan sistemáticamente a esta metodología de infiltración subrepticia sobre las mentes desprevenidas. Y es oportuno recordar que la violencia verbal, tan utilizada en los discursos políticos, suele normalmente preanunciar la violencia física. Se denomina fundamentalismo a distintas corrientes religiosas que promueven la interpretación literal de un texto «fundamental» ante el cual ninguna otra autoridad puede invocarse y que debería imponerse sobre las leyes de las sociedades democráticas. Esta definición pasa ya a ser clásica para situar al fenómeno terrorista del fundamentalismo islamista (o islámico) yihadista, muy cercano al wahabismo y al salafismo, que tratan de basar y justificar sus amenazas a través de la interpretación del Corán. En un sentido amplio también se lo identifica con el fanatismo o extremismo, aunque este último término se suele reservar para actitudes específicamente políticas. El caso que estamos analizando se aproxima más a esta última acepción, dadas las actitudes de intransigencia de los grupos fundamentalistas involucrados. Debe tenerse en cuenta que esta posición pierde cualquier sustento desde
Recommended publications
  • The Jihadi Threat: ISIS, Al-Qaeda, and Beyond
    THE JIHADI THREAT ISIS, AL QAEDA, AND BEYOND The Jihadi Threat ISIS, al- Qaeda, and Beyond Robin Wright William McCants United States Institute of Peace Brookings Institution Woodrow Wilson Center Garrett Nada J. M. Berger United States Institute of Peace International Centre for Counter- Terrorism Jacob Olidort The Hague Washington Institute for Near East Policy William Braniff Alexander Thurston START Consortium, University of Mary land Georgetown University Cole Bunzel Clinton Watts Prince ton University Foreign Policy Research Institute Daniel Byman Frederic Wehrey Brookings Institution and Georgetown University Car ne gie Endowment for International Peace Jennifer Cafarella Craig Whiteside Institute for the Study of War Naval War College Harleen Gambhir Graeme Wood Institute for the Study of War Yale University Daveed Gartenstein- Ross Aaron Y. Zelin Foundation for the Defense of Democracies Washington Institute for Near East Policy Hassan Hassan Katherine Zimmerman Tahrir Institute for Middle East Policy American Enterprise Institute Charles Lister Middle East Institute Making Peace Possible December 2016/January 2017 CONTENTS Source: Image by Peter Hermes Furian, www . iStockphoto. com. The West failed to predict the emergence of al- Qaeda in new forms across the Middle East and North Africa. It was blindsided by the ISIS sweep across Syria and Iraq, which at least temporarily changed the map of the Middle East. Both movements have skillfully continued to evolve and proliferate— and surprise. What’s next? Twenty experts from think tanks and universities across the United States explore the world’s deadliest movements, their strate- gies, the future scenarios, and policy considerations. This report reflects their analy sis and diverse views.
    [Show full text]
  • Anti-Semitism: a Pillar of Islamic Extremist Ideology
    Anti-Semitism: A Pillar of Islamic Extremist Ideology In a video message in August 2015, Osama bin Laden’s son, Hamza bin Laden, utilized a range of anti-Semitic and anti-Israel narratives in his effort to rally Al Qaeda supporters and incite violence against Americans and Jews. Bin Laden described Jews and Israel as having a disproportionate role in world events and the oppression of Muslims. He compared the “Zio- Crusader alliance led by America” to a bird: “Its head is America, one wing is NATO and the other is the State of the Jews in occupied Palestine, and the legs are the tyrant rulers that sit on the chests of the peoples of the Muslim Ummah [global community].” An undated image of al-Qaeda terrorist Osama bin Laden and his son, Hamza Bin Laden then called for attacks worldwide and demanded that Muslims “support their brothers in Palestine by fighting the Jews and the Americans... not in America and occupied Palestine and Afghanistan alone, but all over the world…. take it to all the American, Jewish, and Western interests in the world.” Such violent expressions of anti-Semitism have been at the core of Al Qaeda’s ideology for decades. Even the 9/11 terrorist attacks were motivated, in part, by anti-Semitism. Mohamed Atta, a key member of the Al Qaeda Hamburg cell responsible for the attacks, reportedly considered New York City to be the center of a global Jewish conspiracy, and Khalid Sheik Mohammed, who masterminded the attack, had allegedly previously developed several plans to attack Israeli and Jewish targets.
    [Show full text]
  • 9/11 Report”), July 2, 2004, Pp
    Final FM.1pp 7/17/04 5:25 PM Page i THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page v CONTENTS List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— ...in the Law Enforcement Community 73 3.3 . and in the Federal Aviation Administration 82 3.4 . and in the Intelligence Community 86 v Final FM.1pp 7/17/04 5:25 PM Page vi 3.5 . and in the State Department and the Defense Department 93 3.6 . and in the White House 98 3.7 . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis:August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5.
    [Show full text]
  • The Al Qaeda Network a New Framework for Defining the Enemy
    THE AL QAEDA NETWORK A NEW FRAMEWORK FOR DEFINING THE ENEMY KATHERINE ZIMMERMAN SEPTEMBER 2013 THE AL QAEDA NETWORK A NEW FRAMEWORK FOR DEFINING THE ENEMY KATHERINE ZIMMERMAN SEPTEMBER 2013 A REPORT BY AEI’S CRITICAL THREATS PROJECT ABOUT US About the Author Katherine Zimmerman is a senior analyst and the al Qaeda and Associated Movements Team Lead for the Ameri- can Enterprise Institute’s Critical Threats Project. Her work has focused on al Qaeda’s affiliates in the Gulf of Aden region and associated movements in western and northern Africa. She specializes in the Yemen-based group, al Qaeda in the Arabian Peninsula, and al Qaeda’s affiliate in Somalia, al Shabaab. Zimmerman has testified in front of Congress and briefed Members and congressional staff, as well as members of the defense community. She has written analyses of U.S. national security interests related to the threat from the al Qaeda network for the Weekly Standard, National Review Online, and the Huffington Post, among others. Acknowledgments The ideas presented in this paper have been developed and refined over the course of many conversations with the research teams at the Institute for the Study of War and the American Enterprise Institute’s Critical Threats Project. The valuable insights and understandings of regional groups provided by these teams directly contributed to the final product, and I am very grateful to them for sharing their expertise with me. I would also like to express my deep gratitude to Dr. Kimberly Kagan and Jessica Lewis for dedicating their time to helping refine my intellectual under- standing of networks and to Danielle Pletka, whose full support and effort helped shape the final product.
    [Show full text]
  • Radical Islamist Groups in Germany: a Lesson in Prosecuting Terror in Court by Matthew Levitt
    MENU Policy Analysis / PolicyWatch 834 Radical Islamist Groups in Germany: A Lesson in Prosecuting Terror in Court by Matthew Levitt Feb 19, 2004 ABOUT THE AUTHORS Matthew Levitt Matthew Levitt is the Fromer-Wexler Fellow and director of the Reinhard Program on Counterterrorism and Intelligence at The Washington Institute. Brief Analysis n February 5, 2004, a German court acquitted Abdelghani Mzoudi, a thirty-one-year-old native Moroccan, of O 3,066 counts of accessory to murder and membership in a terrorist organization (al-Qaeda). Mzoudi is suspected of having provided material and financial support to the Hamburg cell that helped organize and perpetrate the terrorist attacks of September 11, 2001. According to the presiding judge, Mzoudi was acquitted for lack of evidence, not out of a belief in the defendant's innocence. The acquittal was the most recent example of a growing dilemma faced by the United States and other countries in their efforts to prosecute suspected terrorists: how to gain access to intelligence for criminal proceedings without compromising the sources of that information. Indeed, Mzoudi's acquittal comes at a time when, despite nearly three years of fighting the war on terror, German intelligence claims that the presence of militant Islamist groups on German soil has reached new heights. U.S. officials face similar circumstances. Al-Qaeda in Germany Within days of the September 11 attacks, al-Qaeda activities in Germany quickly emerged as a key focus of the investigation. Three of the four suicide pilots -- Mohammed Atta, Marwan al-Shehi, and Ziad Jarrah -- were members of the Hamburg cell.
    [Show full text]
  • Banco Central De La República Argentina
    BANCO CENTRAL DE LA REPÚBLICA ARGENTINA COMUNICACIÓN “ B “ 7701 28/01/2003 A LAS ENTIDADES FINANCIERAS: Ref.: Información cursada por el Banco de la Reserva Federal de Nueva York, relacionada con perso- nas vinculadas con actividades terroristas _______________________________________________________________ Nos dirigimos a Uds. con relación al requerimiento efectuado por el Banco de la Reserva Fede- ral de Nueva York, vinculado con la investigación penal que esta llevando a cabo sobre el terrorismo. Al respecto les señalamos, que deberán verificar si de sus registros surge que realizan operacio- nes con particulares y entidades incluidas en la denominada “Lista de Control”, que se adjunta en Anexo. En el caso en que la entidad financiera local sea controlada por una entidad financiera sujeta a la supervisión consolidada del Banco de la Reserva Federal de N.Y., deberá informar las operaciones detecta- das en forma directa al mencionado organismo de supervisión, proporcionando todos los datos que al respec- to se posean, debiendo a la vez notificar de ello a la Superintendencia de Entidades Financieras y Cambiarias, mediante nota dirigida al Gerente responsable de la supervisión de la entidad. A su vez llevamos a su conocimiento que el presente requerimiento, así como las futuras actuali- zaciones que se efectúen, deberá considerarse como si fueran formuladas por el BCRA. Respecto de las entidades financieras cuyo controlante no esté sujeto a la supervisión consolida- da del Banco de la Reserva Federal de N.Y, en el caso de detectar operaciones de alguna de las personas u entidades incluidas en la “Lista de Control”, éstas deberán enviar una notificación al Banco de la Reserva Fe- deral de N.Y a la dirección [email protected] Dicha notificación deberá ser genérica sin identificar, por ejemplo, las personas o montos involu- crados a los fines de respetar el secreto bancario.
    [Show full text]
  • 9-11 and Terrorist Travel- Full
    AND TERRORIST TRAVEL Staff Report of the National Commission on Terrorist Attacks Upon the United States 9/11 AND TERRORIST TRAVEL Staff Report of the National Commission on Terrorist Attacks Upon the United States By Thomas R. Eldridge Susan Ginsburg Walter T. Hempel II Janice L. Kephart Kelly Moore and Joanne M. Accolla, Staff Assistant Alice Falk, Editor Note from the Executive Director The Commission staff organized its work around specialized studies, or monographs, prepared by each of the teams. We used some of the evolving draft material for these studies in preparing the seventeen staff statements delivered in conjunction with the Commission’s 2004 public hearings. We used more of this material in preparing draft sections of the Commission’s final report. Some of the specialized staff work, while not appropriate for inclusion in the report, nonetheless offered substantial information or analysis that was not well represented in the Commission’s report. In a few cases this supplemental work could be prepared to a publishable standard, either in an unclassified or classified form, before the Commission expired. This study is on immigration, border security and terrorist travel issues. It was prepared principally by Thomas Eldridge, Susan Ginsburg, Walter T. Hempel II, Janice Kephart, and Kelly Moore, with assistance from Joanne Accolla, and editing assistance from Alice Falk. As in all staff studies, they often relied on work done by their colleagues. This is a study by Commission staff. While the Commissioners have been briefed on the work and have had the opportunity to review earlier drafts of some of this work, they have not approved this text and it does not necessarily reflect their views.
    [Show full text]
  • In This Interview: Adam Tells Resurgence Azzam Al-Amriki June 25, 2015
    In this interview: Adam tells Resurgence Azzam al-Amriki June 25, 2015 [Please note: Images may have been removed from this document. Page numbers may have been added.] Targeting India will remain one of the Mujahideen’s priorities as long as it pursues its antagonistic policies and continues to engage in and condone the persecution, murder and rape of Muslims and occupation of their land The way forward for our persecuted brothers in Bangladesh is Da’wah and Jihad The Pakistani regime bears responsibility for the toppling of the Islamic Emirate and the occupation of Afghanistan, and its crimes are continuing unabated While in Pakistan, I and my brothers were blessed with numerous supporters who sheltered and took care of us despite the risk The Americans and their Pakistani agents almost captured me in Karachi on at least two occasions Shaykh Abu Mus’ab al-Zarqawi had the qualities of a great leader and a smile which could illuminate a city The Americans came close to martyring Shaykh Abu Mus’ab (may Allah have mercy on him) in Afghanistan, but Allah preserved him until he became America’s number one enemy in Iraq Shaykh Abu Mus’ab was a champion of unity who fought for the Ummah, and he should not be held responsible for the deviation today of some people who falsely claim to follow him and his methodology A Muslim’s blood is sacred, more sacred even than the Ka’aba, and spilling it without right is not only an act of oppression, it is the greatest sin after Kufr and Shirk The blessed raids of September 11th rubbed America’s nose in
    [Show full text]
  • Federal Register/Vol. 68, No. 164/Monday, August 25, 2003
    51048 Federal Register / Vol. 68, No. 164 / Monday, August 25, 2003 / Notices Clearance Officer, Jacqueline White, Dated: August 19, 2003. SUPPLEMENTARY INFORMATION: UN Small Business Administration, 409 3rd Herbert L. Mitchell, Security Council Resolutions 1390 Street, SW., 5th Floor, Washington, DC Associate Administrator for Disaster (2002) and 1455 (2003) require UN 20416; and OMB Reviewer, Office of Assistance. Member States to implement an arms Information and Regulatory Affairs, [FR Doc. 03–21673 Filed 8–22–03; 8:45 am] embargo (and other sanctions) against Office of Management and Budget, New BILLING CODE 8025–01–P those individuals, groups, undertakings Executive Office Building, Washington, and entities listed in the consolidated DC 20503. list created in accordance with UN FOR FURTHER INFORMATION CONTACT: SMALL BUSINESS ADMINISTRATION Security Council Resolutions 1267 Jacqueline White, Agency Clearance (1999) and 1333 (2000) and maintained Officer, (202) 205–7044. Delegation of Authority as to Denial of by the UN 1267 Sanctions Committee. Liability on 7(a) Loans Specifically, the resolutions require that SUPPLEMENTARY INFORMATION: Member States prevent the direct or The Administrator of the U.S. Small Title: Reports to SBA, Provisions of 13 indirect supply, sale and transfer, to Business Administration (SBA), Hector CFR 120.472. those on the 1267 Sanctions Committee V. Barreto, pursuant to the authority No: N/A. list, from their territories or by their Frequency: On Occasion. vested in him by the Small Business nationals outside their territories, or Description of Respondents: Small Act, 72 Stat. 384, as amended, hereby using their flag vessels or aircraft, of Business Lending Companies. delegates to the Associate Deputy arms and related material of all types Responses: 14.
    [Show full text]
  • The Militant Pipeline Between the Afghanistan-Pakistan Border Region and the West
    New America Foundation National Security Studies Program Policy Paper The Militant Pipeline Between the Afghanistan-Pakistan Border Region and the West Paul Cruickshank Second Edition July 2011; First Edition February 2010 Of the 32 “serious” jihadist terrorist plots against the West between 2004 and 2011, 53 percent had operational or training links to established jihadist groups in Pakistan and just 6 percent to Yemen. A decade after 9/11, despite growing concerns over Yemen, entry to join the fighting in Afghanistan, the presence of al Pakistan’s Federally Administered Tribal Areas (FATA) and Qaeda, and its sustained ability to train recruits and swaths of the country’s northwest arguably remain al Qaeda persuade them to launch attacks in the West, continue to ’s main safe haven, and the area from which it can hatch its make the FATA what President Obama called in 2009 “the most dangerous plots against the West. 1 Al Qaeda’s most dangerous place in the world.” 4 presence in these areas has long threatened international security. It was in Peshawar in Pakistan’s northwest that al U.S. officials have recently suggested that when it comes to Qaeda was founded in 1988, and ever since Pakistan’s the U.S. homeland, al Qaeda’s affiliate in Yemen – al Qaeda border region with Afghanistan has been a gateway for in the Arabian Peninsula (AQAP) – could now pose a recruits joining the terrorist network and its affiliates, and greater threat than “al Qaeda Central” in the tribal areas of an area in which its senior figures have felt comfortable Pakistan.
    [Show full text]
  • 9/11 FBI Report 2004 02(Feb)
    mmmm M a a , aaaaH a aaa iiui H Q x 1 $2 K! F R L 5' ,-1,i-:l}§§1_-"EX-L"?;ZI?£I>i;2;i@a?;-1Y,I=: Law Enfarcament Sensitive Summary of Penttbom Investigation Q , Prepared by Penttbom Team Roam 1B-999 February 29, 2004 Law Enforcement Sansitive H ¢ sauna-3844 ~ MISC1ama;j¥a%%W,aWaaaia{avaa-1? aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa iv Law Enforcement Sensitive PENTTBOM CASE SUMMARY 0212912904 The fulinwingis a "Law En.n'c_en1c11t_Sensitivrz"ofznaicriais versirm relevant E13 thc PEN ITBDMinvestig;ati0n_. Recipientsshould forwardadditional pertinentinflurmatiun the-:ta PENTFBGM InvestigativeTeam at FBI Headquarters {Room{B599} 02~32¢$~9060!. This documentmay begiven toother LawEnfomement Agencieswhu havea legitimate need inmow. The ccmtents 0fthis documsntmay nothe reproducedfor pubiicazionw Fiald Divisicmsshould heaware thatany analyticalproducts created.containizzg information relatingTQ the19 Hijackers,associates, orevents sf9E1 M11must beappreved byshe PENTTBOM InvestigativeTeam. 1 Law Enforcement Sensitive MISC. REQ. #§4& 900003845 v Law Enforcement Sensitive nzmr-1&4 I. In; mducun II. Ea Pt! Wj_g,ned 'in_Yes!iga§ian_T__;1 , , , , , V , _ Diets, , , , , , , , ,Y A. Travei of Non-Pilat Hijackers to Aighanistan B. Training in Afghanistan for tha Pilots i". Hamburg Piints ii. Hanjaur C. Ghtaining US Visas by the Pikrts i. Al~$lmhhi ii. Jarrah iii Atta iv. Binalshihh v. A!-»HZazmi vi. Hanjour D, Flight Training Research and Appiicaons Arrival in the US by the Hijacker Leadership i. Aldviihdhar and Al-H:1zmi ii. Hanjour iii. Atta and Ai»SheI1hi iv. Jarrah 2 vLaw Enfnrcement Sensitive MISC, mg. #4:; 066003846 "yr Law Enforcement Sensitive F. Initial Financing G. Flight Training L Al-Hazmi anti Al-Mihdhar ii.
    [Show full text]
  • Staff Statement No. 1
    Entry of the 9/11 Hijackers into the United States Staff Statement No. 1 Members of the Commission, we have developed initial findings on how the individuals who carried out the 9/11 attacks entered the United States. We have also developed initial findings on terrorists who failed in their efforts to enter the United States. These findings lead us to some tentative judgments on the way the United States targets the travel of international terrorists. This staff statement represents the collective effort of several members of our staff. Susan Ginsburg, Thomas Eldridge, and Janice Kephart-Roberts did most of the investigative work reflected in this statement. The Commission was able to build upon a large and strong body of work carried out by many talented public servants at the Department of State, the Central Intelligence Agency, the former Immigration and Naturalization Service, the Department of Homeland Security, and the Federal Bureau of Investigation. The American people should be proud of the many extraordinary professionals now serving them. To the extent we have criticisms, they are comments less on the talent available and more on how that talent was used. As we know from the sizable illegal traffic across our land borders, a terrorist could attempt to bypass legal procedures and enter the United States surreptitiously. None of the 9/11 attackers entered or tried to enter our country this way. So today we will focus on the hijackers’ exploitation of legal entry systems. We have handed out a list of the names of 9/11 attackers to help you follow our discussion.
    [Show full text]