National Counterterrorism Center
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Resurgence of Asa'ib Ahl Al-Haq
December 2012 Sam Wyer MIDDLE EAST SECURITY REPORT 7 THE RESURGENCE OF ASA’IB AHL AL-HAQ Photo Credit: Asa’ib Ahl al-Haq protest in Kadhimiya, Baghdad, September 2012. Photo posted on Twitter by Asa’ib Ahl al-Haq. All rights reserved. Printed in the United States of America. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage or retrieval system, without permission in writing from the publisher. ©2012 by the Institute for the Study of War. Published in 2012 in the United States of America by the Institute for the Study of War. 1400 16th Street NW, Suite 515 Washington, DC 20036. http://www.understandingwar.org Sam Wyer MIDDLE EAST SECURITY REPORT 7 THE RESURGENCE OF ASA’IB AHL AL-HAQ ABOUT THE AUTHOR Sam Wyer is a Research Analyst at the Institute for the Study of War, where he focuses on Iraqi security and political matters. Prior to joining ISW, he worked as a Research Intern at AEI’s Critical Threats Project where he researched Iraqi Shi’a militia groups and Iranian proxy strategy. He holds a Bachelor’s Degree in Political Science from Middlebury College in Vermont and studied Arabic at Middlebury’s school in Alexandria, Egypt. ABOUT THE INSTITUTE The Institute for the Study of War (ISW) is a non-partisan, non-profit, public policy research organization. ISW advances an informed understanding of military affairs through reliable research, trusted analysis, and innovative education. ISW is committed to improving the nation’s ability to execute military operations and respond to emerging threats in order to achieve U.S. -
Counter-Insurgency, Human Rights, and the Law of Armed Conflict Federico Sperotto
Human Rights Brief Volume 17 | Issue 1 Article 3 2009 Counter-Insurgency, Human Rights, and the Law of Armed Conflict Federico Sperotto Follow this and additional works at: http://digitalcommons.wcl.american.edu/hrbrief Part of the Human Rights Law Commons, and the International Law Commons Recommended Citation Sperotto, Federico. "Counter-Insurgency, Human Rights, and the Law of Armed Conflict." Human Rights Brief 17, no. 1 (2009): 19-23. This Article is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in Human Rights Brief by an authorized administrator of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. Sperotto: Counter-Insurgency, Human Rights, and the Law of Armed Conflict Counter-Insurgency, Human Rights, and the Law of Armed Conflict by Federico Sperotto* introduCtion ounter-insurgency is the dominant aspect in the United States-led Operation Enduring Freedom (OEF) in CAfghanistan, and, since the NATO-led International Security Assistance Force (ISAF) has assumed growing respon- sibility throughout insurgents’ sanctuaries, also a mission for Europeans. According to the U.S. military, insurgency represents an intermediate step in the spectrum of conflict, which ranges from stable peace to general war.1 The frame in which military opera- tions are conducted is known as irregular warfare, a violent struggle among state and non-state actors for legitimacy and influence over a population.2 This form of conflict is charac- terized by three principle activities: insurgency, counter-insur- gency, and unconventional warfare, referring to the avoidance of Association of the Courtesy of the Revolutionary Afghanistan. -
Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type. -
Overall Security in Iraq
HOW DOES THIS END? Strategic Failures Overshadow Tactical Gains in Iraq Lawrence Korb, Brian Katulis, Sean Duggan, and Peter Juul Center for American Progress April 2008 “Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat.” Sun Tzu, The Art of War “No one” in the U.S. and Iraqi governments “feels that there has been sufficient progress by any means in the area of national reconciliation.” General David Petraeus, March 13, 2008.1 www.americanprogress.org Center for American Progress Introduction and Summary .S. Army General David Petraeus understood the situation perfectly five years ago. As an indigenous insurgency began to form in the weeks following the U.S. Uinvasion of Iraq in 2003, then-Major Gen. Petraeus asked Washington Post report- er Rick Atkinson the fundamental question of the war: “Tell me, how does this end?” After spending nearly three-quarters of a trillion dollars, after more than 4,000 lost American lives alongside hundreds of thousands of Iraqis, this remains the central question of this war. Yet the answer to Gen. Petraeus’ question—a unified, independent, and stable Iraq that is an ally in the global war on terrorism—is more elusive today than it was when President Bush’s military escalation began in early 2007. Since the administration’s escalation began 15 months ago, the president and his con- servative allies in Congress have entangled the United States ever more deeply in Iraq’s multiple ethnic and sectarian conflicts. Some short-term security progress has been achieved in certain areas of Iraq. -
In Defense of Cyberterrorism: an Argument for Anticipating Cyber-Attacks
IN DEFENSE OF CYBERTERRORISM: AN ARGUMENT FOR ANTICIPATING CYBER-ATTACKS Susan W. Brenner Marc D. Goodman The September 11, 2001, terrorist attacks on the United States brought the notion of terrorism as a clear and present danger into the consciousness of the American people. In order to predict what might follow these shocking attacks, it is necessary to examine the ideologies and motives of their perpetrators, and the methodologies that terrorists utilize. The focus of this article is on how Al-Qa'ida and other Islamic fundamentalist groups can use cyberspace and technology to continue to wage war againstthe United States, its allies and its foreign interests. Contending that cyberspace will become an increasingly essential terrorist tool, the author examines four key issues surrounding cyberterrorism. The first is a survey of conventional methods of "physical" terrorism, and their inherent shortcomings. Next, a discussion of cyberspace reveals its potential advantages as a secure, borderless, anonymous, and structured delivery method for terrorism. Third, the author offers several cyberterrorism scenarios. Relating several examples of both actual and potential syntactic and semantic attacks, instigated individually or in combination, the author conveys their damagingpolitical and economic impact. Finally, the author addresses the inevitable inquiry into why cyberspace has not been used to its full potential by would-be terrorists. Separately considering foreign and domestic terrorists, it becomes evident that the aims of terrorists must shift from the gross infliction of panic, death and destruction to the crippling of key information systems before cyberattacks will take precedence over physical attacks. However, given that terrorist groups such as Al Qa'ida are highly intelligent, well-funded, and globally coordinated, the possibility of attacks via cyberspace should make America increasingly vigilant. -
Meserole Brookings CV 2021
CHRISTOPHER O. MESEROLE 1775 Massachusetts Ave NW, Washington DC 20036 (202) 797-6180 | [email protected] POSITIONS Director of Research and Policy, Brookings AI & Emerging Tech Initiative (2020-) Deputy Director, Brookings AI & Emerging Tech Initiative (2019-2020) Fellow, Foreign Policy, Brookings Institution (2017-) Post-Doctoral Fellow in Foreign Policy, Brookings Institution (2016-2017) Pre-Doctoral Fellow in Foreign Policy, Brookings Institution (2015-2016) AFFILIATIONS Co-Facilitator, GIFCT CAPPI Working Group (2020-) Co-PI, Brookings High-Level Working Group on Disinformation (2019-2020) Member, Christchurch Call Advisory Network (2019-) Adjunct Professor, Georgetown University (2019-) Member, Research Advisory Council, RESOLVE Network (2019-) Member, Digital Freedom Forum, CNAS (2019-) EDUCATION A.B., highest honors in field, Harvard University, Cambridge, MA, 2002 M.Div., S.T.M, Yale University, NeW Haven, CT, 2009, 2010 Ph.D., University of Maryland, College Park, MD, 2017 RESEARCH Artificial intelligence, emerging technology, international security; digital INTERESTS authoritarianism; counterterrorism and countering violent extremism; nonparametric machine learning, interpretable machine learning, differential privacy and homomorphic encryption, decentralized ledger technology WRITING “Exporting Digital Authoritarianism,” Brookings Institution, September 2019. (With Alina Polyakova.) “HoW Big Tech Can Fight White Supremacist Terrorism,” Foreign Affairs, August 2019. (With Daniel Byman.) “Terrorist Definitions and Designation -
Full Complaint
Case 1:18-cv-01612-CKK Document 11 Filed 11/17/18 Page 1 of 602 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA ESTATE OF ROBERT P. HARTWICK, § HALEY RUSSELL, HANNAH § HARTWICK, LINDA K. HARTWICK, § ROBERT A. HARTWICK, SHARON § SCHINETHA STALLWORTH, § ANDREW JOHN LENZ, ARAGORN § THOR WOLD, CATHERINE S. WOLD, § CORY ROBERT HOWARD, DALE M. § HINKLEY, MARK HOWARD BEYERS, § DENISE BEYERS, EARL ANTHONY § MCCRACKEN, JASON THOMAS § WOODLIFF, JIMMY OWEKA OCHAN, § JOHN WILLIAM FUHRMAN, JOSHUA § CRUTCHER, LARRY CRUTCHER, § JOSHUA MITCHELL ROUNTREE, § LEIGH ROUNTREE, KADE L. § PLAINTIFFS’ HINKHOUSE, RICHARD HINKHOUSE, § SECOND AMENDED SUSAN HINKHOUSE, BRANDON § COMPLAINT HINKHOUSE, CHAD HINKHOUSE, § LISA HILL BAZAN, LATHAN HILL, § LAURENCE HILL, CATHLEEN HOLY, § Case No.: 1:18-cv-01612-CKK EDWARD PULIDO, KAREN PULIDO, § K.P., A MINOR CHILD, MANUEL § Hon. Colleen Kollar-Kotelly PULIDO, ANGELITA PULIDO § RIVERA, MANUEL “MANNIE” § PULIDO, YADIRA HOLMES, § MATTHEW WALKER GOWIN, § AMANDA LYNN GOWIN, SHAUN D. § GARRY, S.D., A MINOR CHILD, SUSAN § GARRY, ROBERT GARRY, PATRICK § GARRY, MEGHAN GARRY, BRIDGET § GARRY, GILBERT MATTHEW § BOYNTON, SOFIA T. BOYNTON, § BRIAN MICHAEL YORK, JESSE D. § CORTRIGHT, JOSEPH CORTRIGHT, § DIANA HOTALING, HANNA § CORTRIGHT, MICHAELA § CORTRIGHT, LEONDRAE DEMORRIS § RICE, ESTATE OF NICHOLAS § WILLIAM BAART BLOEM, ALCIDES § ALEXANDER BLOEM, DEBRA LEIGH § BLOEM, ALCIDES NICHOLAS § BLOEM, JR., VICTORIA LETHA § Case 1:18-cv-01612-CKK Document 11 Filed 11/17/18 Page 2 of 602 BLOEM, FLORENCE ELIZABETH § BLOEM, CATHERINE GRACE § BLOEM, SARA ANTONIA BLOEM, § RACHEL GABRIELA BLOEM, S.R.B., A § MINOR CHILD, CHRISTINA JEWEL § CHARLSON, JULIANA JOY SMITH, § RANDALL JOSEPH BENNETT, II, § STACEY DARRELL RICE, BRENT § JASON WALKER, LELAND WALKER, § SUSAN WALKER, BENJAMIN § WALKER, KYLE WALKER, GARY § WHITE, VANESSA WHITE, ROYETTA § WHITE, A.W., A MINOR CHILD, § CHRISTOPHER F. -
Health Sector
Electricity Sector Project's name Location Capacity Province 1 Al-Yusfiya Gas Al-Yusfiya 1500 Mega Baghdad Station Project Watt (Combined Cycle) - Communication Sector None Health Sector No Project’s Name Type of Province Investment Opportunities 1. General hospital, capacity: (400) beds- New Baghdad/ Al-Rusafa/ 15 buildings ( 12 main healthcare construction Bismayah New City centers / (1) typical healthcare center, specialized medical center). 2. Specialized cancer treatment center New Baghdad, Al Karkh and Al- construction Rusafa 3. Arabic Child Hospital in Al-Karkh (50 New Baghdad/ Al-Karkh beds) construction 4. 3-4 Drugs and medical appliances New Baghdad, Al Karkh and Al- factory. construction Rusafa 5. 1 Sterility and fertility hospital, New Baghdad in Al Karkh and Capacity: (50 beds) construction Al-Rusafa 6. 1 Specialized ophthalmology hospital New Baghdad , Al Karkh and Al- Capacity : ( 50 beds ) construction Rusafa 7. 1 Specialized cardiac surgery hospital New Baghdad, Al Karkh and Al- capacity : (100 beds) construction Rusafa 8. Specialized Plastic surgery hospital New Baghdad, Al Karkh and Al- (50 beds) construction Rusafa 9. 2-3 hydrogen peroxide (pure New Baghdad, Al Karkh and Al- O2)Plant Construction Rusafa 10. Complete medical city New Baghdad , Al Karkh and Al- construction Rusafa 11. 4 General hospitals , capacity: 100 bed New Baghdad, Al-Karkh and Al- each construction Rusafa 12. 4 Specialized medical centers, New Baghdad , Al-Karkh and Al- capacity : (50 bed) construction Rusafa Housing and Infrastructure sector No. Project name Location allocatd Province area 1. Establishment of Housing Complex (According Al-Tarimiyah 5609 Baghdad to investor’s economic visibility). District/Abo-Serioel Dunam and Quarter. -
Weekly Explosive Incidents Flash News ( 12 Dec - 18 Dec 2019)
iMMAP - IHF Humanitarian Access Response Weekly Explosive Incidents Flash News ( 12 Dec - 18 Dec 2019) 107 59 48 9 1 INCIDENTS PEOPLE KILLED PEOPLE INJURED EXPLOSIONS AIRSTRIKE An Armed Group 17/DEC/2019 NINEWA GOVERNORATE A member of the Popular Mobilization Group killed by an armed attack within the Al-Naftia village of the Jisr Diyala area southeast of Baghdad. ISIS 14/DEC/2019 The security forces repelled an attack by ISIS on the outskirts of Qayyarah ISIS 17/DEC/2019 district and were able to kill an ISIS member and arrest another afterward they Launched an attack on the Iraqi Army Forces in Al-Nada region east of Diyala, surrounded them immediately. injuring three members and killing four others, among them an Army commander. ISIS 15/DEC/2019 An IED explosion of ISIS killed two civilians in Al-Ayadiyah district west of the Security Forces 18/DEC/2019 city. Seized and Cleared six IEDs and four caches in the Al-Nada subdistrict belonged to ISIS. ISIS 16/DEC/2019 Launched an attack on the Popular Mobilization Forces south of the city. ISIS 18/DEC/2019 KIRKUK GOVERNORATE Attacked Al-Bishmana village in the Al-Shawra subdistrict and killed a resident Security Forces 12/DEC/2019 of the village. In cooperation with the Federal Police Forces and Intelligence Department An Armed Group 18/DEC/2019 conducted a search operation to purify the villages in the Al-Rashad district, Assassinated the Mukhtar of Al-Jarn village in the Al-Shawra subdistrict. and found five dens, six IEDs and a motorcycle. Military Intelligence 14/DEC/2019 Raided a hideout and seized 30 mortar shells of various calibers, 17 hand SALAH AL-DIN GOVERNORATE grenades and a homemade explosive device in Zab district. -
UN Assistance Mission for Iraq ﺑﻌﺜﺔ اﻷﻣﻢ اﻟﻤﺘﺤﺪة (UNAMI) ﻟﺘﻘﺪﻳﻢ اﻟﻤﺴﺎﻋﺪة
ﺑﻌﺜﺔ اﻷﻣﻢ اﻟﻤﺘﺤﺪة .UN Assistance Mission for Iraq 1 ﻟﺘﻘﺪﻳﻢ اﻟﻤﺴﺎﻋﺪة ﻟﻠﻌﺮاق (UNAMI) Human Rights Report 1 January – 31 March 2007 Table of Contents TABLE OF CONTENTS..............................................................................................................................1 INTRODUCTION.........................................................................................................................................2 SUMMARY ...................................................................................................................................................2 PROTECTION OF HUMAN RIGHTS.......................................................................................................4 EXTRA-JUDICIAL EXECUTIONS AND TARGETED AND INDISCRIMINATE KILLINGS .........................................4 EDUCATION SECTOR AND THE TARGETING OF ACADEMIC PROFESSIONALS ................................................8 FREEDOM OF EXPRESSION .........................................................................................................................10 MINORITIES...............................................................................................................................................13 PALESTINIAN REFUGEES ............................................................................................................................15 WOMEN.....................................................................................................................................................16 DISPLACEMENT -
Weekly Iraq .Xplored Report 13 April 2019
Weekly Iraq .Xplored report 13 April 2019 Prepared by Risk Analysis Team, Iraq garda.com Confidential and proprietary © GardaWorld Weekly Iraq .Xplored Report 13 April 2019 TABLE OF CONTENTS TABLE OF CONTENTS .......................................................................................................................................... 2 ACTIVITY MAP .................................................................................................................................................... 3 OUTLOOK ............................................................................................................................................................. 4 Short term outlook ............................................................................................................................................. 4 Medium to long term outlook ............................................................................................................................ 4 SIGNIFICANT EVENTS ...................................................................................................................................... 5 US labels Iran's Revolutionary Guards as a terrorist group .......................................................................... 5 US will leave if Iraq requests that it withdraw; US diplomat .......................................................................... 5 Syrian Democratic Forces announce deal with Iraq to return IDPs .............................................................. 5 Tehran -
Interview #25
United States Institute of Peace Association for Diplomatic Studies and Training Iraq PRT Experience Project INTERVIEW #25 Interviewed by: Barbara Nielsen Initial Interview May 1, 2008 Copyright 2008 USIP & ADST Executive Summary The interviewee was the PRT team leader in Diyala province from February, 2007 until March, 2008. Diyala province is ethnically mixed, comprised of roughly 20% Shia, 40% Sunni, 9% Kurd, and the remainder other groups. Although intermarriage was frequent (e.g. the governor’s paramount wife was a Shia, but his young wife was a Sunni) and coexistence among the groups had been traditional, after the fall of Saddam Hussein, the sectarian divide was accentuated, along with the manifestation of a complex mosaic of conflicting loyalties and historical grievances. The interviewee’s principal mandate was to develop the capacity of the provincial government to function. However, with the constant combat and frequent ambushes he describes, lasting from February through the late fall of 2007, the PRT’s ability to travel was severely limited. The interviewee describes how, initially, they had to pick up the provincial governor in his own village 20 miles away and bring him to the government center so he could sit in his office. After about three months, the PRT renovated and fortified his office so that he could remain there overnight three to four nights per week. That example led to the assistant governor, deputy governor and other directors resorting to the same governing technique. The interviewee describes how Al-Qaeda was initially invited into the province to protect the Sunni inhabitants from the Shia militia operating at the behest of the Shia police chief.