Interview of Patrick J. Fitzgerald, January 28, 2004
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Foreign Terrorist Organizations
Order Code RL32223 CRS Report for Congress Received through the CRS Web Foreign Terrorist Organizations February 6, 2004 Audrey Kurth Cronin Specialist in Terrorism Foreign Affairs, Defense, and Trade Division Huda Aden, Adam Frost, and Benjamin Jones Research Associates Foreign Affairs, Defense, and Trade Division Congressional Research Service ˜ The Library of Congress Foreign Terrorist Organizations Summary This report analyzes the status of many of the major foreign terrorist organizations that are a threat to the United States, placing special emphasis on issues of potential concern to Congress. The terrorist organizations included are those designated and listed by the Secretary of State as “Foreign Terrorist Organizations.” (For analysis of the operation and effectiveness of this list overall, see also The ‘FTO List’ and Congress: Sanctioning Designated Foreign Terrorist Organizations, CRS Report RL32120.) The designated terrorist groups described in this report are: Abu Nidal Organization (ANO) Abu Sayyaf Group (ASG) Al-Aqsa Martyrs Brigade Armed Islamic Group (GIA) ‘Asbat al-Ansar Aum Supreme Truth (Aum) Aum Shinrikyo, Aleph Basque Fatherland and Liberty (ETA) Communist Party of Philippines/New People’s Army (CPP/NPA) Al-Gama’a al-Islamiyya (Islamic Group, IG) HAMAS (Islamic Resistance Movement) Harakat ul-Mujahidin (HUM) Hizballah (Party of God) Islamic Movement of Uzbekistan (IMU) Jaish-e-Mohammed (JEM) Jemaah Islamiya (JI) Al-Jihad (Egyptian Islamic Jihad) Kahane Chai (Kach) Kurdistan Workers’ Party (PKK, KADEK) Lashkar-e-Tayyiba -
CARLOS ACOSTA, Et Al., ) ) Plaintiffs, ) ) V
Case 1:06-cv-00745-RCL Document 33 Filed 08/26/08 Page 1 of 27 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA ____________________________________ ) CARLOS ACOSTA, et al., ) ) Plaintiffs, ) ) v. ) ) Civil Action No. 06-745 (RCL) THE ISLAMIC REPUBLIC ) OF IRAN, et al., ) ) Defendants. ) ____________________________________) FINDINGS OF FACT AND CONCLUSIONS OF LAW This action arises from the assassination of Rabbi Meir Kahane and the shooting of Irving Franklin and U.S. Postal Police Officer Carlos Acosta on November 5, 1990, in New York. Plaintiffs are Carlos Acosta and his wife, Maria Acosta, Irving Franklin (on his own behalf and as administrator of his wife Irma Franklin’s estate), and the surviving spouse, mother, children, and sibling of Rabbi Meir Kahane. Rabbi Meir Kahane was killed and Irving Franklin and Carlos Acosta were seriously wounded by El Sayyid Nosair. Nosair was and is a member of Al- Gam’aa Islamiyah (or, the “Islamic Group”), a terrorist organization headed by Sheik Omar Ahmad Ali Abdel Rahman (“Sheik Abdel Rahman”). Plaintiffs allege that the Islamic Republic of Iran (“Iran”), and the Iranian Ministry of Information and Security (“MOIS”), are liable for damages from the shooting because they provided material support and assistance to the Islamic Group. As such, defendants are subject to suit under the recently revised terrorist exception to Case 1:06-cv-00745-RCL Document 33 Filed 08/26/08 Page 2 of 27 the Foreign Sovereign Immunities Act (“FSIA”), 28 U.S.C. § 1605A.1 This matter is a re-filing of the same claims that previously were the subject matter of Acosta v. -
Brother Saul Text: Acts 9:1-19A Date: July 16, 2017 Context: WWPC By: Rev
Sermon: Brother Saul Text: Acts 9:1-19a Date: July 16, 2017 Context: WWPC By: Rev. Dr. Steve Runholt He fell to the ground and heard a voice saying to him, ‘Saul, Saul, why do you persecute me?’ Acts 9:4 Like the story I just read, the story I’m about to tell you is a little hard to hear. And because I’ve never had the experience of watching people get up as a group and walk out on me while I’m preaching, I want to assure you from the start that it’s a good story, and a hopeful one. It’s also an important and timely story, which is why I want to start with it this morning. It’s about a young man named Zak Ebrahim. Zak is an American-born peace activist from Pennsylvania. He’s the son of an American mother, and an Egyptian father. He recently gave a talk about how he came to find his vocation as a peace activist. He stared the talk this way: On November 5th, 1990, a man named El-Sayyid Nosair walked into a hotel in Manhattan and assassinated Rabbi Meir Kahane, the leader of the Jewish Defense League. Nosair was initially found not guilty of the murder, but while serving time on lesser charges, he and other men began planning attacks on a dozen New York City landmarks, including tunnels, synagogues and the United Nations headquarters.1 1 Zak’s full talk, which has been viewed more than four million times, can be found here: https://www.ted.com/talks/zak_ebrahim_i_am_the_son_of_a_terrorist_here_s_how_i_chose_peace 1 Pause right there. -
Routledge Handbook of U.S. Counterterrorism and Irregular
‘A unique, exceptional volume of compelling, thoughtful, and informative essays on the subjects of irregular warfare, counter-insurgency, and counter-terrorism – endeavors that will, unfortunately, continue to be unavoidable and necessary, even as the U.S. and our allies and partners shift our focus to Asia and the Pacific in an era of renewed great power rivalries. The co-editors – the late Michael Sheehan, a brilliant comrade in uniform and beyond, Liam Collins, one of America’s most talented and accomplished special operators and scholars on these subjects, and Erich Marquardt, the founding editor of the CTC Sentinel – have done a masterful job of assembling the works of the best and brightest on these subjects – subjects that will continue to demand our attention, resources, and commitment.’ General (ret.) David Petraeus, former Commander of the Surge in Afghanistan, U.S. Central Command, and Coalition Forces in Afghanistan and former Director of the CIA ‘Terrorism will continue to be a featured security challenge for the foreseeable future. We need to be careful about losing the intellectual and practical expertise hard-won over the last twenty years. This handbook, the brainchild of my late friend and longtime counter-terrorism expert Michael Sheehan, is an extraordinary resource for future policymakers and CT practitioners who will grapple with the evolving terrorism threat.’ General (ret.) Joseph Votel, former commander of US Special Operations Command and US Central Command ‘This volume will be essential reading for a new generation of practitioners and scholars. Providing vibrant first-hand accounts from experts in counterterrorism and irregular warfare, from 9/11 until the present, this book presents a blueprint of recent efforts and impending challenges. -
Hamas, Islamic Jihad the Muslim Brotherhood
ADL Special Background Report: Hamas, Islamic Jihad and The Muslim Brotherhood: Islamic Extremists and the Terrorist Threat to America 1913·1993 ' .' From: December 21, 1994 Michael Winograd FOR YOUR INFORMATION To: Dr. Samuel Portnoy As per your request. Sincerely, ANTI-DEFAMATION l"EAGUE OF B'NAI B•RITH FLORIDA RE.GIONAL OFFICE 373-6306 SUITE 800- lSO S.E. 2nd AVE. MIAMI9 FLORIDA 33131 Melvin Salberg, National Chairman Abraham H. Foxman, National Director David H. Strassler, Chair, National Executive Commirtee Peter T. Willner, Associate National Direct.or Meyer Eisenberg, Chair, Civil Rights Comn1ittee Jeffrey P. Sinensky, Director, Civil Rights Division Gary Zaslav, Chair, Fact Finding and Research Committee This publication was made possible by the Marilyn and Leon Klinghoffer Memorial Foundation. ADL Special Background Report is a publication of the Civil Rights Division Research and Evaluation Department. This issue prepared by Yehudit Barsky, Research Analyst. Edited by Alan M. Schwartz, Director, Research and Evaluation Department © 1993 The Anti,Defamation League 823 United Nations Plaza, New York, NY 10017 TABLE OF CONTENTS . Holy War: Now or Later? ........................................................................................ 5 Refuge in Mosques ................................................................................................... 5 Support From Abroad: Money No Object ............................................................. 6 Haven in the Land of the Free ............................................................................... -
Crimes Committed by Terrorist Groups: Theory, Research and Prevention
The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Crimes Committed by Terrorist Groups: Theory, Research and Prevention Author(s): Mark S. Hamm Document No.: 211203 Date Received: September 2005 Award Number: 2003-DT-CX-0002 This report has not been published by the U.S. Department of Justice. To provide better customer service, NCJRS has made this Federally- funded grant final report available electronically in addition to traditional paper copies. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. Crimes Committed by Terrorist Groups: Theory, Research, and Prevention Award #2003 DT CX 0002 Mark S. Hamm Criminology Department Indiana State University Terre Haute, IN 47809 Final Final Report Submitted: June 1, 2005 This project was supported by Grant No. 2003-DT-CX-0002 awarded by the National Institute of Justice, Office of Justice Programs, U.S. Department of Justice. Points of view in this document are those of the author and do not necessarily represent the official position or policies of the U.S. Department of Justice. This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. TABLE OF CONTENTS Abstract .............................................................. iv Executive Summary.................................................... -
The Falsified War on Terror: How the US Has Protected Some of Its Enemies
Volume 11 | Issue 40 | Number 2 | Article ID 4005 | Oct 01, 2013 The Asia-Pacific Journal | Japan Focus The Falsified War on Terror: How the US Has Protected Some of Its Enemies Peter Dale Scott surveillance matters by its own Foreign Intelligence Surveillance Court, known as the German translation available FISA court, which according to the New York Times “has quietly become almost a parallel Before World War Two American government, Supreme Court.”3 Thanks largely to Edward for all of its glaring faults, also served as a Snowden, it is now clear that the FISA Court model for the world of limited government, has permitted this deep state to expand having evolved a system of restraints on surveillance beyond the tiny number of known executive power through its constitutional arrangement of checks and balances. All that and suspected Islamic terrorists, to any changed with America’s emergence as a incipient protest movement that might dominant world power, and further after the challenge the policies of the American war Vietnam War. machine. Since 9/11, above all, constitutional American Most Americans have by and large not government has been overshadowed by a series questioned this parallel government, accepting of emergency measures to fight terrorism. The that sacrifices of traditional rights and latter have mushroomed in size and budget, traditional transparency are necessary to keep while traditional government has been shrunk. us safe from al-Qaeda attacks. However secret As a result we have today what the journalist power is unchecked power, and experience of Dana Priest has called the last century has only reinforced the truth of Lord Acton’s famous dictum that unchecked power always corrupts. -
Ramzi Yousef
45 3 Terrorist Entry and Embedding Tactics, 1993 to 2001 The relative ease with which the hijackers obtained visas and entered the United States underscores the importance of travel to their terrorist operations. In this section we explore the evolution of terrorist travel tactics and organization. We begin with terrorist plots in the 1990s and conclude with the 9/11 attack. 3.1 The Redbook Since the early 1970s numerous terrorist organizations have provided their operatives with a wide variety of spurious documents. After showing their spurious passports and papers at border control, these terrorist operatives have proceeded to hijack airplanes, plant bombs, and carry out assassinations. These terrorist acts, however, can be stopped. If we all screen travelers and check their passports, as past experience proves, terrorist will lose their ability to travel undetected, and international terrorism will come one step closer to being stopped! —The Redbook (1992) By definition, transnational terrorist groups need to travel to commit terrorist acts. Indeed, without freedom of movement terrorists cannot plan, conduct surveillance, hold meetings, train for their mission, or execute an attack. Terrorists rely on forged passports and fake visas to move around the world unimpeded and undetected. This has been known for more than three decades. It is difficult today to judge with certainty what else was known about terrorist travel methods in the 1970s and 1980s. However, the existence of a CIA training video and manual is evidence of an understanding that terrorists relied on certain tactics when they traveled and that they could be stopped by alert individuals who recognized the use of those tactics. -
The Secrecy Problem in Terrorism Trials
THE SECRECY PROBLEM IN TERRORISM TRIALS SERRIN TURNER & STEPHEN J. SCHULHOFER LIBERTY & NATIONAL SECURITY PROJECT BRENNAN CENTER FOR JUSTICE AT NYU SCHOOL OF LAW THE SECRECY PROBLEM IN TERRORISM TRIALS SERRIN TURNER & STEPHEN J. SCHULHOFER LIBERTY & NATIONAL SECURITY PROJECT BRENNAN CENTER FOR JUSTICE AT NYU SCHOOL OF LAW www.brennancenter.org We are on strange ground…. But it is the essence of our tradition for judges, when they stand at the end of the marked way, to go forward with caution keeping sight, so far as they are able, upon the great landmarks left behind and the direction they point ahead. If…we are now to enter upon a new era of law in the world, it becomes more important than ever before for the nations creating that system to observe their greatest traditions of administering justice, including this one, both in their own judging and in their new creation. Justice Wiley B. Rutledge dissenting opinion In re Yamashita, 327 U.S. 1, 43 (1946) The Brennan Center for Justice at NYU School of Law unites thinkers and advocates in pursuit of a vision of inclusive and effective democracy. Our mission is to develop and implement an innovative, nonpartisan agenda of scholarship, public education, and legal action that promotes equality and human dignity, while safeguarding fundamental freedoms. The Brennan Center’s Liberty & National Security Project seeks to promote thoughtful and informed discussion of how to address the threat of terrorism within our constitutional framework. Our efforts are rooted in the belief that accountability, transparency, and checks and balances are vital not only to the protection of civil liberties, but also to developing effective and sustainable strategies for fighting terrorism. -
Credit Card Armies: Firearms and Training
Credit Card Armies— Firearms and Training For Terror in the United States Violence Policy Center The Violence Policy Center is a national non-profit educational organization that conducts research and public education on firearms violence and provides information and analysis to policymakers, journalists, grassroots advocates, and the general public. The Center examines the role of firearms in America, analyzes trends and patterns in firearms violence, and works to develop policies to reduce gun-related death and injury. This study was authored by VPC Senior Policy Analyst Tom Diaz and edited by VPC Publications Coordinator Aimée Stenzel. This study was funded with the support of The David Bohnett Foundation, The Center on Crime, Communities & Culture of the Open Society Institute/Funders’ Collaborative for Gun Violence Prevention, The George Gund Foundation, The Joyce Foundation, and The John D. and Catherine T. MacArthur Foundation. Past studies released by the Violence Policy Center include: • Kids in the Line of Fire: Children, Handguns, and Homicide (November 2001) • When Men Murder Women: An Analysis of 1999 Homicide Data (October 2001) • Voting from the Rooftops: How the Gun Industry Armed Osama bin Laden, Other Foreign and Domestic Terrorists, and Common Criminals with 50 Caliber Sniper Rifles (October 2001) • Shot Full of Holes: Deconstructing John Ashcroft’s Second Amendment (July 2001) • Hispanics and Firearms Violence (May 2001) • Poisonous Pastime: The Health Risks of Target Ranges and Lead to Children, Families, and the -
Mining Semantic Relationships Between Concepts Across
MINING SEMANTIC RELATIONSHIPS BETWEEN CONCEPTS ACROSS DOCUMENTS USING WIKIPEDIA KNOWLEDGE A Dissertation Submitted to the Graduate Faculty of the North Dakota State University of Agriculture and Applied Science By Peng Yan In Partial Fulfillment for the Degree of DOCTOR OF PHILOSOPHY Major Department: Computer Science September 2013 Fargo, North Dakota North Dakota State University Graduate School Title Mining Semantic Relationships between Concepts across Documents using Wikipedia Knowledge By Peng Yan The Supervisory Committee certifies that this disquisition complies with North Dakota State University’s regulations and meets the accepted standards for the degree of DOCTOR OF PHILOSOPHY SUPERVISORY COMMITTEE: Wei Jin Chair Brian M. Slator Juan Li Ying Huang Approved: 11/01/2013 Brian M. Slator Date Department Chair ABSTRACT The ongoing astounding growth of text data has created an enormous need for fast and efficient Text Mining algorithms. However, the sparsity and high dimensionality of text data present great challenges for representing the semantics of natural language text. Traditional approaches for document representation are mostly based on the Vector Space (VSM) Model which takes a document as an unordered collection of words and only document-level statistical information is recorded (e.g., document frequency, inverse document frequency). Due to the lack of capturing semantics in texts, for certain tasks, especially fine-grained information discovery applications, such as mining relationships between concepts, VSM demonstrates its inherent limitations because of its rationale for computing relatedness between words only based on the statistical information collected from documents themselves. In this dissertation, we present a new framework that attempts to address the above problems by utilizing background knowledge to provide a better semantic representation of any text. -
Executive Power in Wartime Michael Mukasey Former U.S
A PUblicAtion of HillSdAle ColleGe ImpOVERr 2,000,000imi READERS MOsNTHLY October 2011 • Volume 40, Number 10 Executive Power in Wartime Michael Mukasey Former U.S. Attorney General MICHAEL MUKASEY served as the Attorney General of the United States from 2007-2009, as a U.S. district judge for the Southern District of New York from 1988-2006, and as an assistant U.S. attorney for that same district from 1972-1976. In 1995, he presided over the trial of Sheik Omar Abdel Rahman and others for a plot to blow up New York area landmarks. He received his B.A. from Columbia University and his LL.B. from Yale Law School. The following is adapted from a speech delivered in Washington, D.C., on September 15, 2011, at the Second Annual Constitution Day Celebration sponsored by Hillsdale College’s Allan P. Kirby, Jr. Center for Constitutional Studies and Citizenship. President Obama campaigned for office largely on the claim that his predecessor had shredded the Constitution. By the Constitution, he could not have meant the document signed on September 17, 1787. Article II of that document begins with a simple declaration: “The executive Power shall be vested in a President of the United States of America.” Not “some” or “most” or even “all but a teeny-weeny bit” of the executive power. The President is vested with all of it. This is particularly noteworthy when compared with the enumerated legislative powers vested in Congress: “All legislative Powers herein granted.” The Founders understood, based in part on their unfortunate experience under the Articles of Confederation, that the branch of government most likely to be in need of the ability to act quickly and decisively is the executive.