Intelligence Tradecraft Lessons from Finding Bin Laden
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
(FATA) of Pakistan: Conflict Management at State Level
TIGAH,,, A JOURNAL OF PEACE AND DEVELOPMENT Volume: II, December 2012, FATA Research Centre, Islamabad Peacebuilding in FATA: Conflict Management at State Level Peacebuilding in Federally Administered Tribal Areas (FATA) of Pakistan: Conflict Management at State Level Sharafat Ali Chaudhry ∗ & Mehran Ali Khan Wazir ! Abstract Studies focusing on violence in Federally Administered Tribal Areas (FATA) conclude that the Russian aggression in 1979 towards Afghanistan, anarchy in post-soviet era, and US invasion of Afghanistan in 2001 are the key reasons of spreading of violence in FATA. However, there is a controversy in views about the nature of violence in the bordering areas of Pakistan and Afghanistan. This paper empirically analyzes three dimensions of wide spread violence in the area. First, it maps the current research and views on the nature of violence in FATA. Second, it examines meta-theories of peacemaking and their relevance to the cultural, social and historical context of the tribal belt. Finally, this paper proposes the policy options for conflict management at the state level in Pakistan. Introduction The conflict in Federally Administered Tribal Areas (FATA) has been explored to greater extent and the majority of studies conclude that the current violence in FATA has its roots within the Union of Soviet Socialist Republics (USSR) invasion of Afghanistan which ended up in the Afghan civil war. Soviet invasion pulled the United States of America (USA) into this region. The US won the proxy war in Afghanistan against USSR ∗ Sharafat Ali Chaudhry, a development professional-turned-Lawyer, has been visiting faculty member at Department of P&IR at IIU, Islamabad. -
The Haqqani Network in Kurram the Regional Implications of a Growing Insurgency
May 2011 The haQQani NetworK in KURR AM THE REGIONAL IMPLICATIONS OF A GROWING INSURGENCY Jeffrey Dressler & Reza Jan All rights reserved. Printed in the United States of America. ©2011 by the Institute for the Study of War and AEI’s Critical Threats Project Cover image courtesy of Dr. Mohammad Taqi. the haqqani network in kurram The Regional Implications of a Growing Insurgency Jeffrey Dressler & Reza Jan A Report by the Institute for the Study of War and AEI’s Critical Threats Project ACKNOWLEDGEMENts This report would not have been possible without the help and hard work of numerous individuals. The authors would like to thank Alex Della Rocchetta and David Witter for their diligent research and critical support in the production of the report, Maggie Rackl for her patience and technical skill with graphics and design, and Marisa Sullivan and Maseh Zarif for their keen insight and editorial assistance. The authors would also like to thank Kim and Fred Kagan for their necessary inspiration and guidance. As always, credit belongs to many, but the contents of this report represent the views of the authors alone. taBLE OF CONTENts Introduction.....................................................................................1 Brief History of Kurram Agency............................................................1 The Mujahideen Years & Operation Enduring Freedom .............................. 2 Surge of Sectarianism in Kurram ...........................................................4 North Waziristan & The Search for New Sanctuary.....................................7 -
Cyber Threats to Mobile Phones Paul Ruggiero and Jon Foote
Cyber Threats to Mobile Phones Paul Ruggiero and Jon Foote Mobile Threats Are Increasing Smartphones, or mobile phones with advanced capabilities like those of personal computers (PCs), are appearing in more people’s pockets, purses, and briefcases. Smartphones’ popularity and relatively lax security have made them attractive targets for attackers. According to a report published earlier this year, smartphones recently outsold PCs for the first time, and attackers have been exploiting this expanding market by using old techniques along with new ones.1 One example is this year’s Valentine’s Day attack, in which attackers distributed a mobile picture- sharing application that secretly sent premium-rate text messages from the user’s mobile phone. One study found that, from 2009 to 2010, the number of new vulnerabilities in mobile operating systems jumped 42 percent.2 The number and sophistication of attacks on mobile phones is increasing, and countermeasures are slow to catch up. Smartphones and personal digital assistants (PDAs) give users mobile access to email, the internet, GPS navigation, and many other applications. However, smartphone security has not kept pace with traditional computer security. Technical security measures, such as firewalls, antivirus, and encryption, are uncommon on mobile phones, and mobile phone operating systems are not updated as frequently as those on personal computers.3 Mobile social networking applications sometimes lack the detailed privacy controls of their PC counterparts. Unfortunately, many smartphone users do not recognize these security shortcomings. Many users fail to enable the security software that comes with their phones, and they believe that surfing the internet on their phones is as safe as or safer than surfing on their computers.4 Meanwhile, mobile phones are becoming more and more valuable as targets for attack. -
Sectarian Violence in Pakistan's Kurram Agency
Pakistan Security Research Unit (PSRU) Brief Number 40 Sectarian Violence in Pakistan’s Kurram Agency Suba Chandran 22nd September 2008 About the Pakistan Security Research Unit (PSRU) The Pakistan Security Research Unit (PSRU) was established in the Department of Peace Studies at the University of Bradford, UK, in March 2007. It serves as an independent portal and neutral platform for interdisciplinary research on all aspects of Pakistani security, dealing with Pakistan's impact on regional and global security, internal security issues within Pakistan, and the interplay of the two. PSRU provides information about, and critical analysis of, Pakistani security with particular emphasis on extremism/terrorism, nuclear weapons issues, and the internal stability and cohesion of the state. PSRU is intended as a resource for anyone interested in the security of Pakistan and provides: • Briefing papers; • Reports; • Datasets; • Consultancy; • Academic, institutional and media links; • An open space for those working for positive change in Pakistan and for those currently without a voice. PSRU welcomes collaboration from individuals, groups and organisations, which share our broad objectives. Please contact us at [email protected] We welcome you to look at the website available through: http://spaces.brad.ac.uk:8080/display/ssispsru/Home Other PSRU Publications The following papers are freely available through the Pakistan Security Research Unit (PSRU) • Report Number 1. The Jihadi Terrain in Pakistan: An Introduction to the Sunni Jihadi Groups in Pakistan and Kashmir • Brief number 32: The Political Economy of Sectarianism: Jhang • Brief number 33. Conflict Transformation and Development in Pakistan’s North • Western Territories • Brief number 34. -
Image Steganography Applications for Secure Communication
IMAGE STEGANOGRAPHY APPLICATIONS FOR SECURE COMMUNICATION by Tayana Morkel Submitted in partial fulfillment of the requirements for the degree Master of Science (Computer Science) in the Faculty of Engineering, Built Environment and Information Technology University of Pretoria, Pretoria May 2012 © University of Pretoria Image Steganography Applications for Secure Communication by Tayana Morkel E-mail: [email protected] Abstract To securely communicate information between parties or locations is not an easy task considering the possible attacks or unintentional changes that can occur during communication. Encryption is often used to protect secret information from unauthorised access. Encryption, however, is not inconspicuous and the observable exchange of encrypted information between two parties can provide a potential attacker with information on the sender and receiver(s). The presence of encrypted information can also entice a potential attacker to launch an attack on the secure communication. This dissertation investigates and discusses the use of image steganography, a technology for hiding information in other information, to facilitate secure communication. Secure communication is divided into three categories: self-communication, one-to-one communication and one-to-many communication, depending on the number of receivers. In this dissertation, applications that make use of image steganography are implemented for each of the secure communication categories. For self-communication, image steganography is used to hide one-time passwords (OTPs) in images that are stored on a mobile device. For one-to-one communication, a decryptor program that forms part of an encryption protocol is embedded in an image using image steganography and for one-to-many communication, a secret message is divided into pieces and different pieces are embedded in different images. -
Origination, Organization, and Prevention: Saudi Arabia, Terrorist Financing and the War on Terror”
Testimony of Steven Emerson with Jonathan Levin Before the United States Senate Committee on Governmental Affairs “Terrorism Financing: Origination, Organization, and Prevention: Saudi Arabia, Terrorist Financing and the War on Terror” July 31, 2003 Steven Emerson Executive Director The Investigative Project 5505 Conn. Ave NW #341 Washington DC 20015 Email: [email protected] phone 202-363-8602 fax 202 966 5191 Introduction Terrorism depends upon the presence of three primary ingredients: Indoctrination, recruitment and financing. Take away any one of those three ingredients and the chances for success are geometrically reduced. In the nearly two years since the horrific attacks of 9/11, the war on terrorism has been assiduously fought by the US military, intelligence and law enforcement. Besides destroying the base that Al Qaeda used in Afghanistan, the United States has conducted a comprehensive campaign in the United States to arrest, prosecute, deport or jail those suspected of being connected to terrorist cells. The successful prosecution of terrorist cells in Detroit and Buffalo and the announcement of indictments against suspected terrorist cells in Portland, Seattle, northern Virginia, Chicago, Tampa, Brooklyn, and elsewhere have demonstrated the resolve of those on the front line in the battle against terrorism. Dozens of groups, financial conduits and financiers have seen their assets frozen or have been classified as terrorist by the US Government. One of the most sensitive areas of investigation remains the role played by financial entities and non-governmental organizations (ngo’s) connected to or operating under the aegis of the Kingdom of Saudi Arabia. Since the July 24 release of the “Report of the Joint Inquiry into the Terrorist Attacks of September 11, 2001,” the question of what role Saudi Arabia has played in supporting terrorism, particularly Al Qaeda and the 9/11 attacks, has come under increasing scrutiny. -
EASO Country of Origin Information Report Pakistan Security Situation
European Asylum Support Office EASO Country of Origin Information Report Pakistan Security Situation October 2018 SUPPORT IS OUR MISSION European Asylum Support Office EASO Country of Origin Information Report Pakistan Security Situation October 2018 More information on the European Union is available on the Internet (http://europa.eu). ISBN: 978-92-9476-319-8 doi: 10.2847/639900 © European Asylum Support Office 2018 Reproduction is authorised, provided the source is acknowledged, unless otherwise stated. For third-party materials reproduced in this publication, reference is made to the copyrights statements of the respective third parties. Cover photo: FATA Faces FATA Voices, © FATA Reforms, url, CC BY-NC-SA 2.0 Neither EASO nor any person acting on its behalf may be held responsible for the use which may be made of the information contained herein. EASO COI REPORT PAKISTAN: SECURITY SITUATION — 3 Acknowledgements EASO would like to acknowledge the Belgian Center for Documentation and Research (Cedoca) in the Office of the Commissioner General for Refugees and Stateless Persons, as the drafter of this report. Furthermore, the following national asylum and migration departments have contributed by reviewing the report: The Netherlands, Immigration and Naturalization Service, Office for Country Information and Language Analysis Hungary, Office of Immigration and Nationality, Immigration and Asylum Office Documentation Centre Slovakia, Migration Office, Department of Documentation and Foreign Cooperation Sweden, Migration Agency, Lifos -
Espionage Against the United States by American Citizens 1947-2001
Technical Report 02-5 July 2002 Espionage Against the United States by American Citizens 1947-2001 Katherine L. Herbig Martin F. Wiskoff TRW Systems Released by James A. Riedel Director Defense Personnel Security Research Center 99 Pacific Street, Building 455-E Monterey, CA 93940-2497 REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704- 0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DDMMYYYY) 2. REPORT TYPE 3. DATES COVERED (From – To) July 2002 Technical 1947 - 2001 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER 5b. GRANT NUMBER Espionage Against the United States by American Citizens 1947-2001 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER Katherine L. Herbig, Ph.D. Martin F. Wiskoff, Ph.D. 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. -
Image Steganography: Protection of Digital Properties Against Eavesdropping
Image Steganography: Protection of Digital Properties against Eavesdropping Ajay Kumar Shrestha Ramita Maharjan Rejina Basnet Computer and Electronics Engineering Computer and Electronics Engineering Computer and Electronics Engineering Kantipur Engineering College, TU Kantipur Engineering College, TU Kantipur Engineering College, TU Lalitpur, Nepal Lalitpur, Nepal Lalitpur, Nepal [email protected] [email protected] [email protected] Abstract—Steganography is the art of hiding the fact that Data encryption is basically a strategy to make the data communication is taking place, by hiding information in other unreadable, invisible or incomprehensible during transmission information. Different types of carrier file formats can be used, by scrambling the content of data. Steganography is the art but digital images are the most popular ones because of their and science of hiding information by embedding messages frequency on the internet. For hiding secret information in within seemingly harmless messages. It also refers to the images, there exists a large variety of steganography techniques. “Invisible” communication. The power of Steganography is in Some are more complex than others and all of them have hiding the secret message by obscurity, hiding its existence in respective strong and weak points. Many applications may a non-secret file. Steganography works by replacing bits of require absolute invisibility of the secret information. This paper useless or unused data in regular computer files. This hidden intends to give an overview of image steganography, it’s uses and information can be plaintext or ciphertext and even images. techniques, basically, to store the confidential information within images such as details of working strategy, secret missions, According to Bhattacharyya et al., “Steganography’s niche in criminal and confidential information in various organizations security is to supplement cryptography, not replace it. -
Check List of Heteroptera of Parachinar (Khyber Pakhtunkhwa), Pakistan
INT. J. BIOL. BIOTECH., 9 (3): 327-330, 2012. CHECK LIST OF HETEROPTERA OF PARACHINAR (KHYBER PAKHTUNKHWA), PAKISTAN Rafiq Hussain and Rukhsana Perveen Department of Zoology University of Karachi, Karachi 75270, Pakistan. E-mail: [email protected] ABSTRACT An investigation was carried out on Heteroptera fauna of Parachinar, located in west of Peshawar (Khyber Pakhtunkhwa, Pakistan).Twenty one species belonging eighteen genera from five different families (Pentatomidae, Lygaeidae, Reduviidae, Pyrrhocoridae and Belostomatidae) were collected from 2007-2010. The specimens were identified through fauna of British India and pertinent literature. Pentatomidae is dominant family having greater number of specimens. The species listed below are new record from the studied area. All the specimens have been deposited in the Zoological Museum University of Karachi. Key Words: Faunistic, Heteroptera, Parachinar, First Record. INTRODUCTION The first mention of the true bugs (Hemiptera : Heteroptera) of Pakistan came with the series of Distant fauna of British India including Ceylon and Burma (1902,1904,1908). Since that time the publication of Ahmad (1979, 1980,1981 ), Ahmad et al ( 1986 ), Ahmad and Kamaluddin (1985, 1989 ), Ahmad and Perveen ( 1983 ), Abbasi (1986), Ahmad and McPherson (1990), Ahmad and Zahid (2004) , Memon, Ahmad and Kamaluddin (2004) has added significant part of Heteroptera species of Pakistan. Parachinar is an agricultural region of Khyber Pakhtunkhwa. The climate of this region is cold and hard with annual rain fall of 245-250mm. Wheat, Rice, Maize, Sun-flower and vegetables e.g. potato, tomato, Pea, turnip, ladyfinger, onion, garlic and fruits such as apple, pear, apricot, walnut are the important crops and fruits of this locality. -
The Fourth Amendment's National Security Exception: Its History and Limits L
Vanderbilt Law Review Volume 66 | Issue 5 Article 1 10-2013 The ourF th Amendment's National Security Exception: Its History and Limits L. Rush Atkinson Follow this and additional works at: https://scholarship.law.vanderbilt.edu/vlr Part of the Fourth Amendment Commons Recommended Citation L. Rush Atkinson, The ourF th Amendment's National Security Exception: Its History and Limits, 66 Vanderbilt Law Review xi (2019) Available at: https://scholarship.law.vanderbilt.edu/vlr/vol66/iss5/1 This Article is brought to you for free and open access by Scholarship@Vanderbilt Law. It has been accepted for inclusion in Vanderbilt Law Review by an authorized editor of Scholarship@Vanderbilt Law. For more information, please contact [email protected]. The Fourth Amendment's National Security Exception: Its History and Limits L. Rush Atkinson 66 Vand. L. Rev. 1343 (2013) Each year, federal agents conduct thousands of "national security investigations" into suspected spies, terrorists, and other foreign threats. The constitutional limits imposed by the Fourth Amendment, however, remain murky, and the extent to which national security justifies deviations from the Amendment's traditional rules is unclear. With little judicial precedent on point, the gloss of past executive practice has become an important means for gauging the boundaries of today's national security practices. Accounts of past executive practice, however, have thus far been historically incomplete, leading to distorted analyses of its precedential significance. Dating back to World War II, national security investigations have involved warrantless surveillance and searches-conduct clearly impermissible in the traditional law-enforcement context- authorized under the theory of a "national security" or "foreign intelligence" exception to the Fourth Amendment. -
MEI Report Sunni Deobandi-Shi`I Sectarian Violence in Pakistan Explaining the Resurgence Since 2007 Arif Ra!Q
MEI Report Sunni Deobandi-Shi`i Sectarian Violence in Pakistan Explaining the Resurgence Since 2007 Arif Ra!q Photo Credit: AP Photo/B.K. Bangash December 2014 ! Sunni Deobandi-Shi‘i Sectarian Violence in Pakistan Explaining the Resurgence since 2007 Arif Rafiq! DECEMBER 2014 1 ! ! Contents ! ! I. Summary ................................................................................. 3! II. Acronyms ............................................................................... 5! III. The Author ............................................................................ 8! IV. Introduction .......................................................................... 9! V. Historic Roots of Sunni Deobandi-Shi‘i Conflict in Pakistan ...... 10! VI. Sectarian Violence Surges since 2007: How and Why? ............ 32! VII. Current Trends: Sectarianism Growing .................................. 91! VIII. Policy Recommendations .................................................. 105! IX. Bibliography ..................................................................... 110! X. Notes ................................................................................ 114! ! 2 I. Summary • Sectarian violence between Sunni Deobandi and Shi‘i Muslims in Pakistan has resurged since 2007, resulting in approximately 2,300 deaths in Pakistan’s four main provinces from 2007 to 2013 and an estimated 1,500 deaths in the Kurram Agency from 2007 to 2011. • Baluchistan and Karachi are now the two most active zones of violence between Sunni Deobandis and Shi‘a,