Congressional Record—Senate S10425

Total Page:16

File Type:pdf, Size:1020Kb

Congressional Record—Senate S10425 October 15, 2002 CONGRESSIONAL RECORD — SENATE S10425 Let us mark this anniversary—and ernment or an international terrorist fact that our law enforcement agencies all the sad anniversaries since Sep- organization, then you can involve the did not act quickly enough in order to tember 11—with a renewed sense of FISA Court, the special court, to ask obtain a FISA warrant against him. community, a renewed determination that court for a warrant to do a wire- The reason they did not is precisely be- to protect each other, and a renewed tap or to search a home or to search a cause of the difficulty of connecting resolve to preserve America’s strength computer, or whatever the case might him to a foreign country or a par- and spirit. be. ticular international terrorist organi- I yield the floor. I suggest the ab- Back in the 1970s, when this was first zation, which is what the FISA statute sence of a quorum. started, it was a fairly straightforward requires. The PRESIDING OFFICER. The proposition. If you thought, for exam- Now, bear in mind one of the ration- clerk will call the roll. ple, you might be dealing with a for- ales for being able to accelerate and The assistant legislative clerk pro- eign spy, somebody working for the short circuit the procedures here with ceeded to call the roll. then-Soviet Union, you could go to the a FISA warrant, as opposed to a reg- Mr. KYL. Mr. President, I ask unani- FISA Court and get a warrant for the ular title III type warrant, is you are mous consent that the order for the information you were seeking, and it dealing with a foreign country. You are quorum call be rescinded. was a little easier to obtain than not dealing with an American citizen. The PRESIDING OFFICER (Mr. JEF- through a regular court. You are dealing with a threat from FORDS). Without objection, it is so or- Secondly, the information was all without or an international terrorist dered. classified, secret; it did not have to be organization. So that is the theory. But in the case of someone such as f shared with anyone else, and these judges were cleared to receive that in- Zacarias Moussaoui, even though he AMENDING THE FISA LAW formation. So we were able to keep was a foreign person—not a United Mr. KYL. Mr. President, I would like these kinds of investigations classified, States citizen—we could not connect to speak in morning business for as and obviously that was a key element him with Algeria or France or any of long as I might consume to discuss to be able to prosecute these the other countries of the world. We some legislation Senator SCHUMER and counterterrorism types of cases. But thought his activities looked very sus- I have introduced and to discuss my in- back then the classical FISA target picious and that they could be ter- tention to seek to have that legislation would be either a Soviet agent or per- rorist-type planning, but not connected added to the conference of the intel- haps one of the sort of hierarchical ter- to a particular country. Nor was it pos- ligence authorization bill which, hope- rorist organizations such as the Bader- sible to connect him to al-Qaida. We fully, will come before this body for Meinhof gang in West Germany or the did not have information connecting our deliberation and acceptance by the Red Army faction or a group of that him to al-Qaida. We had some informa- tion that in an around-about way con- end of this week—again, hopefully. sort. Today, as you know, the situation nected him to terrorists in a particular This legislation not only will reau- is very different. thorize the intelligence community ac- We have in the world today amor- place but not an international terrorist tivities that are funded by the Con- phous terrorist groups that have spread organization. So here you had a situation where he gress, but also, perhaps, will include an throughout the entire world that are was talking to some terrorists, he agreement on an outside commission very loosely affiliated, sometimes not looked to be interested in engaging in that will later be established to look affiliated at all. It is not even clear fre- activity that could result in terrorism into the events prior to September 11. quently whether individual people are here in the United States, but the two So there are some important ele- directly connected to the terrorist requirements to get a warrant—either ments to this bill. One of the items I group or actually members of the ter- that he was involved in state-sponsored would like to add to it also deals with rorist group. And when we speak of terror with a particular country or a the subject of terrorism, the Schumer- ‘‘members of,’’ I am not even sure any- particular international terror organi- Kyl bill—that I will describe in just a body can define a member of a terrorist zation—could not be proved. And as a moment—which is a very small provi- organization. You do not pay dues and result, either legitimately or not le- sion in the so-called FISA law that have a card that identifies you as a gitimately, the FBI did not authorize a would be appropriately added in this member of al-Qaida or Hamas or warrant to search his computer, not- conference as an additional way we can Hezbollah or the Islamic Jihad or any withstanding the fact there were some help win the war on terror. of these other organizations. in our law enforcement community Let me begin by discussing just a lit- Now, it is true within the group who wished to do that. And, of course, tle bit what this legislation is and why there, you would have to be accepted as his computer was not searched until it is necessary, and then I will discuss someone they could trust, but I do not after September 11. a little bit further how we would like necessarily think they look at the peo- What the Schumer-Kyl bill does is to to have it considered. ple with whom they work as members correct this one little deficiency in the The bill number is S. 2568, called the of the organization. statute to bring it up to date, literally Schumer-Kyl bill. It would add three So we wrote a statute back in the from the time it was created back in words to the FISA legislation under 1970s for a different type of enemy than the cold war days, to today’s environ- which we are now able to gather infor- the enemy we face today. What we are ment in which you have amorphous mation that is useful in conducting our finding is sometimes it is very difficult terrorist groups floating around with war on terror. to connect up a particular terrorist ei- individuals freely associating amongst The Foreign Intelligence Surveil- ther with a foreign country or with a them, or perhaps even not at all with lance Act, or FISA, is a law which pro- particular terrorist organization. We them but engaged in terror. vides a special way of gathering this know there are state sponsors of ter- What it does is to correct this prob- evidence against terrorists, and its ori- rorism, and I suppose if we had evi- lem with the statute by adding just gins are back in the 1970s. But it deals dence somebody here in the United three words—‘‘or foreign person’’—to with a different situation today in ter- States was planning to commit an act the targets of the warrant. So an indi- rorism than it did back then. of terror, and they were employed by vidual would be the subject of a war- Let me just go back in time. The idea the Government of, let’s say, Iran, we rant if you could show you had prob- was if you were working for a foreign could probably get a FISA warrant be- able cause to believe the individual was government, we ought to have a little cause we could connect them pretty engaged in or planning to engage in an better ability to investigate you than easily to a foreign country that has act of terrorism and either was doing through the probable cause require- been known to conduct state terrorism. so on behalf of another country, an ments of the 4th amendment that we But it is a lot more difficult when you international terrorist organization, or would ordinarily apply in a title III have somebody such as Zacarias the person himself is a foreign person. court situation. So the FISA law was Moussaoui, for example, the alleged So you have the connection of two established to say if you have evidence 20th hijacker. His is an actual case in things. You have a potential act of ter- someone is working for a foreign gov- point used by many to demonstrate the ror and a foreign person. And that is VerDate 0ct 09 2002 02:37 Oct 16, 2002 Jkt 019060 PO 00000 Frm 00025 Fmt 4624 Sfmt 0634 E:\CR\FM\A15OC6.021 S15PT1 S10426 CONGRESSIONAL RECORD — SENATE October 15, 2002 basically the same rationale that ex- the foreign persons provision we are Washington Post originally suggested, ists with respect to the rationale for adding, and you then could connect the that ultimately prevented the issuance the original FISA law and warrants au- individual to an international terrorist of a warrant.
Recommended publications
  • Perfect Enemy the Law Enforcement Manual of Islamist Terrorism
    Perfect Enemy ABOUT THE AUTHOR Captain Dean T. Olson formerly commanded the Criminal Investiga- tion Bureau of the Douglas County Sheriff’s Department in Omaha, NE, including the department’s participation in the regional Joint Terrorism Task Force. He retired in 2008 after 30 years of law enforcement service. He earned a BS in Criminal Justice and a Masters Degree in Public Ad- ministration from the University of Nebraska at Omaha. He also earned a Master of Arts Degree in National Security Affairs, Homeland Defense and Security from the Naval Postgraduate School, Center for Home- land Defense and Security, in Monterey, CA. He is a graduate of the 193rd Session of the FBI National Academy and is adjunct professor of Criminal Justice for several Midwestern universities. He has traveled extensively in the Middle East and Muslim lands. His areas of expertise include terrorism financing, risk management in suicide/homicide ter- rorism prevention, agroterrorism, threat assessment of domestic radical groups at risk of escalation to terrorism and Islamist terrorism. Perfect Enemy The Law Enforcement Manual of Islamist Terrorism By Captain Dean T. Olson, MPA, MA CHARLESC THOMAS • PUBLISHER, LTD. Springfield • Illinois • U.S.A. Published and Distributed Throughout the World by CHARLES C THOMAS • PUBLISHER, LTD. 2600 South First Street Springfield, Illinois 62704 This book is protected by copyright. No part of it may be reproduced in any manner without written permission from the publisher. All rights reserved. © 2009 by CHARLES C THOMAS • PUBLISHER, LTD. ISBN 978-0-398-07885-0 (hard) ISBN 978-0-398-07886-7 (paper) Library of Congress Catalog Card Number: 2009012250 With THOMAS BOOKS careful attention is given to all details of manufacturing and design.
    [Show full text]
  • A Theory of ISIS
    A Theory of ISIS A Theory of ISIS Political Violence and the Transformation of the Global Order Mohammad-Mahmoud Ould Mohamedou First published 2018 by Pluto Press 345 Archway Road, London N6 5AA www.plutobooks.com Copyright © Mohammad-Mahmoud Ould Mohamedou 2018 The right of Mohammad-Mahmoud Ould Mohamedou to be identified as the author of this work has been asserted by him in accordance with the Copyright, Designs and Patents Act 1988. British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library ISBN 978 0 7453 9911 9 Hardback ISBN 978 0 7453 9909 6 Paperback ISBN 978 1 7868 0169 2 PDF eBook ISBN 978 1 7868 0171 5 Kindle eBook ISBN 978 1 7868 0170 8 EPUB eBook This book is printed on paper suitable for recycling and made from fully managed and sustained forest sources. Logging, pulping and manufacturing processes are expected to conform to the environmental standards of the country of origin. Typeset by Stanford DTP Services, Northampton, England Simultaneously printed in the United Kingdom and United States of America Contents List of Figures vii List of Tables viii List of Abbreviations ix Acknowledgements x Introduction: The Islamic State and Political Violence in the Early Twenty-First Century 1 Misunderstanding IS 6 Genealogies of New Violence 22 Theorising IS 28 1. Al Qaeda’s Matrix 31 Unleashing Transnational Violence 32 Revenge of the ‘Agitated Muslims’ 49 The McDonaldisation of Terrorism 57 2. Apocalypse Iraq 65 Colonialism Redesigned 66 Monstering in American Iraq 74 ‘I will see you in New York’ 83 3.
    [Show full text]
  • How Al-Qaeda Survived Drones, Uprisings,And the Islamic State
    How al-Qaeda Survived Drones, Uprisings,and the Islamic State THE NATURE OF THE CURRENT THREAT Aaron Y. Zelin, Editor “Al-Qaeda and its affiliate organizations never stopped being a primary terrorism concern for me, for the U.S. intelligence community, and for the broader counterter- rorism community. Not a day has gone by in my entire tenure at NCTC where our emphasis on al-Qaeda has been anything less than a top priority. That’s the beauty of working on terrorism issues. You get the privilege of having multiple top priorities.” —Nicholas Rasmussen Director, National Counterterrorism Center, comments at The Washington Institute March 1, 2017 How al-Qaeda Survived Drones, Uprisings,and the Islamic State THE NATURE OF THE CURRENT THREAT Aaron Y. Zelin EDITOR THE WASHINGTON INSTITUTE FOR NEAR EAST POLICY www.washingtoninstitute.org The opinions expressed in this Policy Focus are those of the authors and not necessarily those of The Washington Institute, its Board of Trustees, or its Board of Advisors. Policy Focus 153 First publication June 2017 All rights reserved. Printed in the United States of America. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. © 2017 by The Washington Institute for Near East Policy The Washington Institute for Near East Policy 11111 19th Street NW, Suite 500 Washington, DC 20036 www.washingtoninstitute.org Design: 1000colors Contents ACKNOWLEDGMENTS | v ABOUT THE WORKSHOP | vi CONTRIBUTORS | viii KEY AL-QAEDA-RELATED EVENTS, 2009–17 | xii ■ OVERALL THREAT Introduction AARON Y.
    [Show full text]
  • The Future of Al-Qaeda After the Death of Bin Laden
    THE FUTURE OF AL-QAEDA AFTER THE DEATH OF BIN LADEN: FIGHTING TERRORISM By Roman Kalina Submitted to Central European University Department of Public Policy in partial fulfilment of the requirements for the degree of Master of Arts in Public Policy Supervisor: Professor Evelyne Patrizia Hübscher CEU eTD Collection Budapest, Hungary 2012 Abstract Death of the leader of terrorist group al-Qaeda Osama bin Laden on May 2, 2011, was celebrated by the Americans as a final defeat of the terrorism and al-Qaeda. In fact al-Qaeda is a group with the flexible structure, where the core leadership nowadays has only a symbolic value, and therefore death of bin Laden will not cause the damage to the group. More dangerous are the second and third elements of al-Qaeda hierarchy, which act upon the ideology, which was set by Osama bin Laden and his close associates. The main aim for the United States’ counterterrorist strategy therefore would be to not target the leader of the group, but to target the ideology of al-Qaeda as a whole. By discrediting the ideology of the group, al-Qaeda will lose the support of the public, which is the core strength of the group. The loss of support will lead to the defeat of al-Qaeda. CEU eTD Collection i Acknowledgments I am thankful to my supervisor Professor Evelyne Patrizia Hübscher, who had given me valuable advices on how to structure my paper and which direction should my project go. I would also like to thank Professor Nikolai Sitter for inspiration, providing sources, and for introducing me to the interesting subject of terrorism.
    [Show full text]
  • Profiles of Islamic State Leaders” By: Kyle Orton ISBN 978-1-909035-25-6!
    Profles of Islamic State Leaders Kyle Orton Published in 2016 by The Henry Jackson Society The Henry Jackson Society Millbank Tower 21-24 Millbank London SW1P 4QP Registered charity no. 1140489 Tel: +44 (0)20 7340 4520 www.henryjacksonsociety.org © The Henry Jackson Society 2016 The Henry Jackson Society All rights reserved The views expressed in this publication are those of the author and are not necessarily indicative of those of The Henry Jackson Society or its Trustees Title: “Governing the Caliphate: Profiles of Islamic State Leaders” By: Kyle Orton ISBN 978-1-909035-25-6! £10.00 where sold All rights reserved Photo Credits Cover Photo: Islamic State Flag http://batya-1431.deviantart.com/art/Islamic-state-flag-488615075 Governing the Caliphate: Profiles of Islamic State Leaders ! ! ! Kyle Orton www.henryjacksonsociety.org Table of Contents Introduction …………………………………………………………………………………………… 2 Background……………………………………………………………………………………………. 11 1.! The Caliph………………………………………………………………………………………… 16 2.! The Shura Council……………………………………………………………………………… 24 3.! The Military Council…………………………………………………………………………… 37 4.! The Security and Intelligence Council…………………………………………………… 52 5.! The Shari’a Council……………………………………………………………………………. 54 6.! The Media Council…………………………………………………………………………….. 58 7.! The Cabinet………………………………………………………………………………………. 62 ! ! GOVERNING THE CALIPHATE: PROFILES OF ISLAMIC STATE LEADERS ! Introduction This paper is a comprehensive compilation of the leadership of the Islamic State (IS), the personnel and the structures by which they relate to one another within the territory governed by IS, and in its external wing that launches terrorist attacks around the world. Two years on from its declaration of a caliphate in June 2014, IS has lost 45% of its territory in Iraq and between 16% and 20% of its territory in Syria.1 But the foreign attacks continue to increase in scale and frequency.
    [Show full text]
  • Osama Bin Laden
    OSAMA BIN LADEN Recent Titles in Greenwood Biographies Beyonce Knowles: A Biography Janice Arenofsky Jerry Garcia: A Biography Jacqueline Edmondson Coretta Scott King: A Biography Laura T. McCarty Kanye West: A Biography Bob Schaller Peyton Manning: A Biography Lew Freedman Miley Cyrus: A Biography Kimberly Dillon Summers Ted Turner: A Biography Michael O’Connor W.E.B. Du Bois: A Biography Gerald Horne George Clooney: A Biography Joni Hirsch Blackman Will Smith: A Biography Lisa M. Iannucci Toni Morrison: A Biography Stephanie S. Li Halle Berry: A Biography Melissa Ewey Johnson OSAMA BIN LADEN A Biography Thomas R. Mockaitis GREENWOOD BIOGRAPHIES Copyright © 2010 by Thomas R. Mockaitis All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, except for the inclusion of brief quotations in a review, without prior permission in writing from the publisher. Library of Congress Cataloging-in-Publication Data Mockaitis, Thomas R., 1955– Osama bin Laden : a biography / Thomas R. Mockaitis. p. cm. — (Greenwood biographies) Includes bibliographical references and index. ISBN 978-0-313-35374-1 (print : alk. paper)—ISBN 978-0-313-35375-8 (ebook) 1. Bin Laden, Osama, 1957—Juvenile literature. 2. Terrorists — Saudi Arabia—Biography—Juvenile literature. I. Title. HV6430.B55M63 2010 958.104'6092—dc22 2009043355 [B] ISBN: 978-0-313-35374-1 EISBN: 978-0-313-35375-8 14 13 12 11 10 1 2 3 4 5 This book is also available on the World Wide Web as an eBook.
    [Show full text]
  • Some-Time, Part-Time and One-Time Terrorism
    3 Reprinted from INTELLIGENCER: continue to be tracked down one-by-one. Usama bin Journal of U.S. Intelligence Studies. Laden (UBL) is not ten feet tall, he’s a mere mortal Winter/Spring 2003, Vol. 13, no. 2, pp. 13-18. —and al Qaeda members are relatively few in number. Copyright (c) 2003 Still, the Western world should take care not to think Association ofFormer Intelligence Officers. that the disruption, or even the demise of al Qaeda will eliminate the terrorist threat that al Qaeda brought to American shores. It won’t, and the reasons are vexingly simple. Since the 9/11 attacks it has become increas- ingly evident that many are willing to commit acts of Some-Time, Part-Time anti-Western terrorism whether sponsored by a terrorist and One-time Terrorism group or acting alone. The world today hosts a very large number of mal- contents who dislike the West in general and the United by M.E. Bowman States in particular. Radical Muslims have taken great care to de-legitimize the West, portraying Westerners Mr. Bowman currently serves in the Senior as infidels who corrupt their culture and invade their Executive Service of the Federal Bureau of lands. By portraying the United States and western- Investigation. The thoughts expressed here ers in general as illegitimate interlopers and infidels, do not necessarily represent those of the FBI. they assume the role of the down-trodden and imbue However, some of the matters discussed herein themselves with a righteousness that legitimizes their are grafted from public testimony of the author violent behavior.4 Of course, enmity of an underclass presented on behalf of the FBI on July 31, 2002 toward a powerful elite is a repetitive fact of history, before the Senate Select Committee on Intel- ligence.
    [Show full text]
  • War and Words
    War and Words War and Words: Representations of Military Conflict in Literature and the Media Edited by Wojciech Drąg, Jakub Krogulec and Mateusz Marecki War and Words: Representations of Military Conflict in Literature and the Media Edited by Wojciech Drąg, Jakub Krogulec and Mateusz Marecki Refereed by Robert Kusek and Tomasz Fisiak This book first published 2016 Cambridge Scholars Publishing Lady Stephenson Library, Newcastle upon Tyne, NE6 2PA, UK British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library Copyright © 2016 by Wojciech Drąg, Jakub Krogulec, Mateusz Marecki and contributors All rights for this book reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of the copyright owner. ISBN (10): 1-4438-8731-5 ISBN (13): 978-1-4438-8731-1 TABLE OF CONTENTS A Word on War and Words ....................................................................... vii Mateusz Marecki Part I: Spreading War Propaganda From “Ladenese Epistle” to “Jihad Cosmo”: The Evolution of Al-Qaeda’s Propaganda Activity ............................................................. 3 Dorota Ściślewska Gaming in Service of Anti-war Sentiment: Spec Ops: The Line as the Critique of Perpetual War Portrayed by the Modern Military Shooter Genre .............................................................................. 19 Jakub Krogulec Part II: Reconstructing War Spaces Walking in Hell: Spatial Inversions in the Poetry of the Great War .......... 31 Aleksandra Kędzierska Outside the World: Vietnam as a Mythic Landscape in Michael Herr’s Dispatches ................................................................................................. 45 Aleksandra Musiał “Absence” of War in World War II Polish Veterans’ Recollections ........
    [Show full text]
  • Recruitment by Terrorist Organizations in Europe’S Muslim Communities Sergei Sarkisyan 1
    Chapter 12 Aspects of Recruitment by Terrorist Organizations in Europe’s Muslim Communities Sergei Sarkisyan 1 The main principles and methods for recruiting by Islamist terrorist organiza- tions in European countries are essentially no different from those used by na- tional security services, by religions, mystical and totalitarian cults, and even certain businesses. The differences are a matter of nuance, emphasis, and the success rate of recruitment by certain patterns and schemes. However, it is specifically the study of these nuances that can help establish why the phenomenon of Islamist terrorism has become quasi-ubiquitous, as well as identifying means and methods for narrowing and reducing the base that advocates and nourishes terrorism, whilst furnishing it with ever more fresh recruits. In order to better understand the powerful dynamics behind the spread of Islamism—the politicized component of Islam—through the Muslim communi- ties of Europe, it is necessary to briefly dwell on the general characteristics of modern Islamic society, as well as the causes and the current degree of radi- calization. The ideological content of Islamism is Islamic fundamentalism, which, on the one hand, is a theological teaching and a movement to restore certain pri- mary values, norms and relations that were canonized in history (these can be religious, ethical, family, domestic, etc.) and on the other hand, as a political teaching and the practice of struggling for power in Muslim states. The political form of Islamic fundamentalism, despite its great diversity, can fairly cleanly be divided into two branches: • Moderate; • Radical & extremist. The quest, within Islam, for simple responses to all questions, including con- temporary political, economic and cultural challenges, first generated isolated hotbeds of extremism, and then led to the spread of extremism, transforming it 1 Sergei Sarkisyan is a longtime member of the CTWG and specializes in Islamist terrorism.
    [Show full text]
  • Defusing Terrorism at Ground Zero: Why a New U.S. Policy Is Needed for Afghanistan
    No. 1383 July 12, 2000 DEFUSING TERRORISM AT GROUND ZERO: WHY A NEW U.S. POLICY IS NEEDED FOR AFGHANISTAN JAMES PHILLIPS The United States scored one of its biggest Cold are spreading to Afghanistan’s neighbors and War victories by helping the Afghan resistance to throughout the region. defeat the Soviet Army. Soon after Soviet troops withdrew from Afghanistan, however, the United The United States Produced by the needs to develop a Kathryn and Shelby Cullom States withdrew from active involvement in Davis Institute for Afghan affairs. Recently, after years of neglect, coherent long-term International Studies Washington has been forced to address a long-sim- policy for building a mering set of national security and foreign policy stable and peaceful Published by problems emerging from a traumatized and radi- Afghanistan that will The Heritage Foundation 214 Massachusetts Ave., N.E. calized Afghanistan. The August 1998 bombings no longer serve as a Washington, D.C. of the U.S. embassies in Kenya and Tanzania by safe haven for inter- 20002–4999 (202) 546-4400 Osama bin Laden’s Afghanistan-based terrorist net- national terrorists, http://www.heritage.org work made it impossible for American foreign pol- drug smugglers, and icy to continue to ignore Afghanistan. Yet as the Islamic revolutionar- world’s leading exporter of terrorism, Islamic revo- ies. This will require lution, and opium, Afghanistan still does not a major shift in U.S. receive the attention it should. policy. Since the This paper, in its entirety, can Soviet withdrawal in be found at: www.heritage.org/ The Clinton Administration has publicized the 1989, the United library/backgrounder/bg1383.html hunt for Osama bin Laden and made his capture a States has all but high priority.
    [Show full text]
  • FOIA Log - Cases Received Between 1/1/2016 and 12/31/2016 7/26/2018
    FOIA Log - Cases Received Between 1/1/2016 and 12/31/2016 7/26/2018 REQ_REF REQ_NAME SUBJECT RECEIVE_DATE CASE_STATUS (b) (6) F-2016-00039 Daniel L Weiss Visa records regarding 01/04/2016 CLOSED F-2016-00042 Bill Streifer A report of Freedom of Speech vs. Hitler and the extermination of the Jews during World 01/04/2016 OPEN War II; and records regarding General E. Tomlin Bailey's transfer from Consul General, Hamburg to a subsequent post outside of Hamburg F-2016-00044 Jovan Miles Records regarding a data set (csv or excel) of all state registered food establishments in 01/04/2016 CLOSED the U.S. F-2016-00045 Michael P Lare Copy of U.S. Ambassador Christopher Stevens autopsy report involving his death at the 01/04/2016 CLOSED U.S. compound in Libya on Sept. 11, 2012 F-2016-00049 Richard J Hayes Communications initiated and/or received from/to former Secretary of State Hillary 01/04/2016 CLOSED Rodham Clinton (b) (6) B(b) (6) F-2016-00050 Investigations or watch list records regarding6 01/04/2016 CLOSED F-2016-00051 Victoria A Wilson Records regarding writer/physicist Mitchell Albert Wilson from 1940-1973 01/04/2016 CLOSED F-2016-00052 Dannette Turner Police report regarding the circumstances involving a Memphis Police Officer and 01/04/2016 CLOSED Rodney Turner (b) (6) (b) (6) F-2016-00053 Roberta Wilson I-130 immigrant visa petition filed by on behalf of 01/05/2016 OPEN (b) (6) (b) (6) F-2016-00054 Charles H Kuck Immigrant visa petition records regarding 01/05/2016 CLOSED (b) (6) F-2016-00055 Christopher A Gaston Non-immigrant visa records
    [Show full text]
  • Profiling Jabhat Al-Nusra
    The Brookings Project on U.S. Relations with the Islamic World AnaLYSIS PAPER | No. 24, July 2016 Profiling Jabhat al-Nusra BY CHARLES LISTER The Brookings Institution is a nonprofit organization devoted to independent research and policy solutions. Its mission is to conduct high-quality, independent research and, based on that research, to provide innovative, practical recommendations for policymakers and the public. The conclusions and recommendations of any Brookings publication are solely those of its author(s), and do not reflect the views of the Institution, its management, or its other scholars. Brookings recognizes that the value it provides to any supporter is in its absolute commitment to quality, independence and impact. Activities supported by its donors reflect this commitment and the analysis and recommendations are not determined by any donation. Copyright © 2016 Brookings Institution 1775 Massachusetts Avenue, NW Washington, D.C. 20036 U.S.A. www.brookings.edu Table of contents 1 Acknowledgments 3 The author 5 Playing it smart: A long-term threat 8 Part I: History 22 Part II: Jabhat al-Nusra today 38 Part III: Outlook 42 Part IV: Policy recommendations 50 About the Project on U.S. Relations with the Islamic World 51 The Center for Middle East Policy 1 | Profiling Jabhat al-Nusra Acknowledgments would like to thank William McCants of the Brookings Institution for commission- ing this paper, and the many other former IBrookings colleagues whose discussions with me likely helped shape some of this paper’s content. I’d also like to acknowledge and thank the two anonymous reviewers, who offered insightful and constructive comments that ensured the paper’s breadth and wider value.
    [Show full text]