CRO Feb08.Qxp

Total Page:16

File Type:pdf, Size:1020Kb

CRO Feb08.Qxp February 2008 ARE SANCTIONS LISTS ENOUGH? Are Compliance Professionals Developing a False Sense of Security? John Solomon and Jay Jhaveri The international financial (OFAC), the UK’s HM Treasury keeping their institutions safe community now stands on the (formerly the Bank of England from terrorist financing when, in frontlines in the war against issued sanctions), and the fact, they are nearly flying blind. terrorists and their supporters. European Union (EU) are the four Too often, the official sanctions Efforts to counter the financing of most authoritative sanctions only identify a sole terrorist leader terrorism centres on an issuing bodies. Taken together, or only a terrorist movement’s international regulatory the four most authoritative paramilitary apparatus when these framework have grown to reflect terrorism sanctions bodies list organisations actually comprise the intensified terrorist threat in 845 unique terrorism related vast global networks of people, the post-9/11 era. Compliance entries. World-Check, a political organisations, and with official blacklists of comprehensive ‘know your charitable and business fronts. designated terrorist individuals customer’ (KYC) database that and entities has become the monitors terrorist networks For a more detailed illustration, principal mechanism used to globally, by contrast, contains this report will drill down into only safeguard the global financial over 25,200 unique terrorism eight of the most dangerous system from the risks of terrorist related entries. In other words, terrorist organisations and financing. there are at least 25 times fewer contrast the relatively few terrorist related individuals and terrorists identified by official lists While compliance with terrorism entities identified by the four with the extraordinarily higher sanctions lists is undoubtedly most authoritative sanctioning estimates that experts and essential for effective counter bodies combined than are reasonable observers of terrorism financing of terrorism (CFT), identified by a leading monitoring could conclude are active abiding by official sanctions lists group. currently. alone is not precaution enough for preventing terrorists and their This degree of difference Liberation Tigers of Tamil supporters from exploiting the translates into 25 times more Eelam (LTTE) world’s financial institutions. actionable risk intelligence that is Merely complying with sanctions available but not identified by the Founded in 1976, the Liberation lists is by itself an inadequate official lists. Compliance Tigers of Tamil Eelam (LTTE) is the measure for any financial professionals relying on official only known insurgent organisation institution that is truly serious lists alone may develop a false with its own army, navy and now about countering the financing of sense of security that they are even a rudimentary air force. LTTE terrorism. To expose the mistaken belief that ‘following the official lists is good enough CFT,’ this article illustrates the discrepancy between the number of terrorists blacklisted by the four most authoritative official lists and the exponentially greater number of associated terrorist groups and affiliated cells that a reasonable observer of these issues would conclude operate around the world. The United Nations (UN), the US Office of Foreign Assets Control 14 COMPLIANCE, RISK & OPPORTUNITY February 2008 continues to carry out brutal Lashkar e-Taiba and other Jihadist terrorist violence against civilians, groups targeting India. political assassinations in India and Sri Lanka in addition to illicit The official sanctioning bodies fundraising and arms identify three total D-Company- procurement activities on a global related records. Yet D-Company scale. operates in at least 14 countries with a functioning business The total number of LTTE-related empire of shopping malls, luxury sanctions in the four most real estate and shipping and authoritative lists amounts to 22 trucking lines used for legal and records. On the other hand, the illegal businesses. It would seem World-Check database identifies implausible that there are only over 25 times more entries and three people or entities involved thus 25 times the risk coverage in such a network that has existed for financial institutions to identify for more than a quarter century. their exposure to the LTTE. Lashkar e-Taiba It would seem implausible that an organisation established in 1976 Lashkar e-Taiba (LeT), is a has only 22 individuals or entities Pakistan-based Sunni Jihadist designated as high risk by the terrorist organisation. Founded in four most authoritative 1989, it is allegedly supported by sanctioning authorities. Its force Pakistani intelligence elements Biography strength in the LTTE-controlled despite being banned in Pakistan regions of Sri Lanka alone in 2002. LeT aims to impose an John Solomon is global head of numbers approximately 10,000 Islamic caliphate over all parts of terrorism research at World-Check. people. LTTE’s global network of India; especially Jammu and Before joining World-Check, Solomon charitable and business fronts, Kashmir. The network expands its served as a congressional aide on irrespective of its vast network of presence and fundraising activities Capitol Hill in Washington, DC, and underworld crime groups, alone through Jamaat-ud-Dawa, its profiled terrorist movements for the amounts to at least five times the political/charitable front, and Centre for the Study of Terrorism and total number indicated by the Idara Khidmat-e-Khalq, another Political Violence at the University of official lists. associated humanitarian front. St Andrews in Scotland. Dawood Ibrahim organisation LeT reportedly executed the A Boren US National Security Scholar, (or D-Company) August 2003 Mumbai attack he holds a diploma in Arabic which killed 55 and injured 180 in language from the American Emerging as Mumbai’s most addition to the October 2005 University in Cairo and degrees from powerful narcotics cartel in the Diwali attack in Delhi and the July the University of St Andrews and the early 1980s, the Dawood Ibrahim 2006 attack on the ‘Friendship University of Oklahoma. Organisation is a South Asia and Express’ in which over 180 people Middle Eastern network engaged were killed. The group also His work on terrorism has appeared in crime and terrorism. The allegedly was involved in the in the book ‘Unmasking Terror: A organisation provided financial thwarted Trans Atlantic Airline Global Review of Terrorist Activities’, resources for the 1993 Bombay (TAA) plot in August 2006 in the Jane’s Intelligence Review and the Exchange bombings in India. UK. Washington DC-based Jamestown Foundation’s Terrorism Monitor and The US government and UN have The organisation is believed to Terrorism Focus. He has been invited identified the syndicate’s have over 2,000 offices in to speak at security and counter- principal, Dawood Ibrahim, as a Pakistan alone. The four major terrorism conferences around the global terrorist for providing sanctioning authorities list 11 LeT- world. material support for Al-Qaeda, related people and entities. COMPLIANCE, RISK & OPPORTUNITY 15 February 2008 Harakat-Ul-Jihad-Ul-Islami Jemaah Islamiyah (JI) Euskadi Ta Askatasuna (ETA) (HUJI) The Al-Qaeda-funded Jemaah Since its founding in 1959, the An Islamic terrorist group active in Islamiyah (JI) has arguably been Basque ethnic-separatist group, Jammu and Kashmir, India, the Southeast Asian region’s most Euskadi Ta Askatasuna (ETA), has Pakistan and Bangladesh, Harakat- serious terrorist threat. Despite undertaken a terrorist campaign Ul-Jihad-Ul-Islami emerged from being weakened by the killings to realise an independent Basque two Deobandi religious bodies and arrests of its leadership and state in what is currently northern called the Jamiat Ulema-i-Islam operatives, the group retains the Spain and southwestern France. and the Tablighi Jamaat as part of capability to carry out attacks ETA has undertaken a campaign the anti-Soviet Jihad in the 1980s. against US, Australian and other of terrorism in recent years Engaged in terrorist activities in western interests throughout the including the Madrid airport Jammu and Kashmir for many region. With presence in bombing in December 2006, in years, the group allegedly carried Indonesia, the Philippines, which 2 were killed, attempted out the August 2007 serial blasts Malaysia, Thailand and Singapore, political assassinations and the in Hyderabad that killed at least JI has executed extraordinarily murder of two Spanish civil 42 people. deadly attacks on innocent guards in December 2007. civilians. Attacks include the fist Having been active for nearly Bali bombing in October 2002, the The sanctions bodies list a total of three decades, the four major JW Marriott Hotel attack in August 37 ETA-related profiles while the sanctioning authorities list only 2003 and the attack on the Spanish High Court in December seven related entries. Australian embassy in September 2007 convicted 47 individuals 2004, and the second Bali responsible for fundraising and United Liberation Front of bombing in October 2005. other terrorist support activities. Assam (ULFA) In light of the ruling, and with an Established in Malaysia in 1993, estimated annual budget of over Ostensibly aimed at creating an only 35 persons have been €10 million in 2002, it could independent Assamese state in designated high risk by the four certainly be reasonably concluded northeastern India, the United Liberation Front of Assam (ULFA)
Recommended publications
  • In Their Own Words: Voices of Jihad
    THE ARTS This PDF document was made available from www.rand.org as CHILD POLICY a public service of the RAND Corporation. CIVIL JUSTICE EDUCATION Jump down to document ENERGY AND ENVIRONMENT 6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit research NATIONAL SECURITY POPULATION AND AGING organization providing objective analysis and PUBLIC SAFETY effective solutions that address the challenges facing SCIENCE AND TECHNOLOGY the public and private sectors around the world. SUBSTANCE ABUSE TERRORISM AND HOMELAND SECURITY Support RAND TRANSPORTATION AND INFRASTRUCTURE Purchase this document WORKFORCE AND WORKPLACE Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Learn more about the RAND Corporation View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND monographs undergo rigorous peer review to ensure high standards for research quality and objectivity. in their own words Voices of Jihad compilation and commentary David Aaron Approved for public release; distribution unlimited C O R P O R A T I O N This book results from the RAND Corporation's continuing program of self-initiated research.
    [Show full text]
  • TO: Usama Bin Ladin FROM: Abu Musab Al-Suri [Mustafa Setmariam
    TO: Usama bin Ladin FROM: Abu Musab al-Suri [Mustafa Setmariam Nasar] and Abu Khalid al-Suri [Muhammad al-Bahaya] VIA: Ayman al-Zawahiri FOLDER: Incoming Mail—From Afghanistan DATE: July 19, 1999 Noble brother Abu Abdullah [Bin Ladin], Peace upon you, and God’s mercy and blessings. This message [concerns] the problem between you and al-Amir al-Mu’mineen [the Commander of the Faithful, i.e. Taliban leader Muhammad Umar] … The results of this crisis can be felt even here in Kabul and other places. Talk about closing down the camps has spread. Discontent with the Arabs has become clear. Whispers between the Taliban with some of our non-Arab brothers has become customary. In short, our brother Abu Abdullah’s latest troublemaking with the Taliban and the Commander of the Faithful jeopardizes the Arabs, and the Arab presence, today in all of Afghanistan, for no good reason. It provides a ripe opportunity for all adversaries, including America, the West, the Jews, Saudi Arabia, Pakistan, the Mas’ud-Dostum [Northern] Alliance, etc., to serve the Arabs a blow that could end up causing their most faithful allies to kick them out … Our brother [Bin Ladin] will help our enemies reach their goal free of charge! … The strangest thing I have heard so far is Abu Abdullah’s saying that he wouldn’t listen to the Commander of the Faithful when he asked him to stop giving interviews … I think our brother [Bin Ladin] has caught the disease of screens, flashes, fans, and applause … The only solution out of this dilemma is what a number of knowledgeable and experienced people have agreed upon … Abu Abdullah should go to the Commander of the Faithful with some of his brothers and tell them that … the Commander of the Faithful was right when he asked you to refrain from interviews, announcements, and media encounters, and that you will help the Taliban as much as you can in their battle, until they achieve control over Afghanistan.
    [Show full text]
  • Al-Qaeda: the Many Faces of an Islamist Extremist Threat
    a al-Qaeda: The Many Faces of an Islamist Extremist Threat REPORT OF THE HOUSE PERMANENT SELECT COMMITTEE ON INTELLIGENCE ISBN 0-16-076897-7 90000 9 780160 768972 al-QaedaTh e Many Faces of an Islamist Extremist Th reat REPORT OF THE HOUSE PERMANENT SELECT COMMITTEE ON INTELLIGENCE JUNE 2006 109th Congress Union Calendar No. 355 2d Session Report 109-615 al-Qaeda: The Many Faces of an Islamist Extremist Threat ___________________ REPORT OF THE U.S. HOUSE PERMANENT SELECT COMMITTEE ON INTELLIGENCE APPROVED: JUNE 2006 TOGETHER WITH ADDITIONAL AND MINORITY VIEWS SUBMITTED: SEPTEMBER 2006 Available via the World Wide Web: http://www.gpo.gov/congress/house http://intelligence.house.gov/ September 6, 2006.—Committed to the Committee of the Whole House on the State of the Union and ordered to be printed U.S. GOVERNMENT PRINTING OFFICE Keeping America Informed I www.gpo.gov WASHINGTON : 2006 For sale by the Superintendent of Documents, U.S. Government Printing Offi ce Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC area (202) 512-1800 Fax: (202) 512-2250 Mail: Stop SSOP, Washington, DC 20402-0001 ISBN 0-16-076897-7 i PERMANENT SELECT COMMITTEE ON INTELLIGENCE OF THE HOUSE OF REPRESENTATIVES PETER HOEKSTRA, MICHIGAN, CHAIRMAN RAY LAHOOD, ILLINOIS JANE HARMAN, CALIFORNIA TERRY EVERETT, ALABAMA ALCEE L. HASTINGS, FLORIDA ELTON GALLEGLY, CALIFORNIA SILVESTRE REYES, TEXAS HEATHER WILSON, NEW MEXICO LEONARD L. BOSWELL, IOWA JO ANN DAVIS, VIRGINIA ROBERT E. (BUD) CRAMER, JR., ALABAMA MAC THORNBERRY, TEXAS ANNA G. ESHOO, CALIFORNIA JOHN M. MCHUGH, NEW YORK RUSH D. HOLT, NEW JERSEY TODD TIAHRT, KANSAS C.
    [Show full text]
  • Read the Full PDF
    Safety, Liberty, and Islamist Terrorism American and European Approaches to Domestic Counterterrorism Gary J. Schmitt, Editor The AEI Press Publisher for the American Enterprise Institute WASHINGTON, D.C. Distributed to the Trade by National Book Network, 15200 NBN Way, Blue Ridge Summit, PA 17214. To order call toll free 1-800-462-6420 or 1-717-794-3800. For all other inquiries please contact the AEI Press, 1150 Seventeenth Street, N.W., Washington, D.C. 20036 or call 1-800-862-5801. Library of Congress Cataloging-in-Publication Data Schmitt, Gary James, 1952– Safety, liberty, and Islamist terrorism : American and European approaches to domestic counterterrorism / Gary J. Schmitt. p. cm. Includes bibliographical references and index. ISBN-13: 978-0-8447-4333-2 (cloth) ISBN-10: 0-8447-4333-X (cloth) ISBN-13: 978-0-8447-4349-3 (pbk.) ISBN-10: 0-8447-4349-6 (pbk.) [etc.] 1. United States—Foreign relations—Europe. 2. Europe—Foreign relations— United States. 3. National security—International cooperation. 4. Security, International. I. Title. JZ1480.A54S38 2010 363.325'16094—dc22 2010018324 13 12 11 10 09 1 2 3 4 5 6 7 Cover photographs: Double Decker Bus © Stockbyte/Getty Images; Freight Yard © Chris Jongkind/ Getty Images; Manhattan Skyline © Alessandro Busà/ Flickr/Getty Images; and New York, NY, September 13, 2001—The sun streams through the dust cloud over the wreckage of the World Trade Center. Photo © Andrea Booher/ FEMA Photo News © 2010 by the American Enterprise Institute for Public Policy Research, Wash- ington, D.C. All rights reserved. No part of this publication may be used or repro- duced in any manner whatsoever without permission in writing from the American Enterprise Institute except in the case of brief quotations embodied in news articles, critical articles, or reviews.
    [Show full text]
  • Terrorism in the MENA Region and the West/ Mohammad Suleiman Abu Rumman Et Al.; Translated by Banan Fathi Malkawi.– Amman: Friedrich-Ebert-Stiftung, 2016
    1 The Hashemite Kingdom of Jordan The Deposit Number at the National Library (2016/11/5076) 320 Abu Rumman, Mohammad Suliman et al. Methods of Preventing and Combatting Terrorism in the MENA Region and the West/ Mohammad Suleiman Abu Rumman et al.; translated by Banan Fathi Malkawi.– Amman: Friedrich-Ebert-Stiftung, 2016 (207) p. Deposit No.: 2016/11/5076 Descriptors: / Terrorism// Arab Countries/ ﯾﺘﺤﻤﻞ اﻟﻤﺆﻟﻒ ﻛﺎﻣﻞ اﻟﻤﺴﺆوﻟﯿﺔ اﻟﻘﺎﻧﻮﻧﯿﺔ ﻋﻦ ﻣﺤﺘﻮى ﻣﺼﻨﻔﮫ وﻻ ﯾﻌﺒّﺮ ھﺬا اﻟﻤﺼﻨﻒ ﻋﻦ رأي داﺋﺮة اﻟﻤﻜﺘﺒﺔ اﻟﻮطﻨﯿﺔ أو أي ﺟﮭﺔ ﺣﻜﻮﻣﯿﺔ أﺧﺮى. Published in 2016 by Friedrich-Ebert-Stiftung Jordan and Iraq FES Jordan & Iraq P.O. Box 941876 11194 Amman Jordan Email: [email protected] Website: www.fes-jordan.org © FES Jordan & Iraq All rights reserved. No part of this publication may be reprinted, reproduced, or utilized in any form or by any means without prior written permission from the publishers. The views and opinions expressed in this publication are solely those of the original authors. They do not necessarily represent those of the Friedrich- Ebert-Stiftung or the editors. Translation: Banan Malkawi, Samira Kawar Editing: Banan Malkawi, EVS Translations, Anja Wehler-Schoeck Cover: Mu'ath Iseid Printing: Economic Press ISBN: 978-9957-484-71-2 2 Methods of Preventing and Combatting Terrorism in the MENA Region and in the West 3 4 Table of Contents Anja Wehler-Schoeck Foreword: Agree to Disagree? International Efforts in Preventing and Combatting Terrorism .................................................................................................................... 7 Mohammad Abu Rumman Counter-Terrorism Efforts: The Dialectic of Inputs and Outputs ................................ 9 Hassan Abu Hanieh Approaches to the War on Terrorism: Examples of Efforts to Eradicate Extremism ........................................................................................................................................
    [Show full text]
  • Islamic State Vs. Al-Qaeda
    NEW INTERNATIONAL AMERICA SECURITY DAVEED GARTENSTEIN-ROSS, JASON FRITZ, BRIDGET MORENG AND NATHANIEL BARR ISLAMIC STATE VS. AL-QAEDA STRATEGIC DIMENSIONS OF A PATRICIDAL CONFLICT DECEMBER 2015 About the Authors Daveed Gartenstein-Ross’s academic Nathaniel Barr is an analyst at Valens and professional work has focused on Global whose work focuses on violent non- understanding the evolving role of violent state actors in North Africa, the Sahel, and non-state actors in the world, with a the Horn of Africa. Barr has co-authored concentration in al-Qaeda and the Islamic four monographs, including a report State. He is a senior fellow at the Foundation for Defense examining the Islamic State’s propaganda strategy, and of Democracies and the chief executive officer of the has been published in Foreign Affairs, Foreign Policy, and consulting firm Valens Global. An adjunct professor Jamestown Foundation’s Militant Leadership Monitor. at Georgetown University and lecturer at the Catholic Before coming to Valens Global, Barr worked as a research University of America, Gartenstein-Ross is the author assistant with the Western Jihadism Project, a research or volume editor of nineteen books and monographs, project funded by the National Institute of Justice that including Bin Laden’s Legacy, which Georgetown explores radicalization and salafi jihadist networks in the University terrorism scholar Bruce Hoffman described West. Barr received his bachelor’s degree from Brandeis as “one of the few books to probe systematically [al- University. Qaeda’s] strategy and its effect on the U.S. and its allies.” Gartenstein-Ross has also been published widely in the academic and popular press, including in The New Jason Fritz is a senior researcher at York Times, The Washington Post, The Atlantic, Foreign Valens Global and a doctoral student in the Policy, and the peer-reviewed journals Studies in Conflict Department of Justice, Law and Criminology and Terrorism and Terrorism and Political Violence.
    [Show full text]
  • Estimated Age
    The US National Counterterrorism Center is pleased to present the 2016 edition of the Counterterrorism (CT) Calendar. Since 2003, we have published the calendar in a daily planner format that provides our consumers with a variety of information related to international terrorism, including wanted terrorists; terrorist group fact sheets; technical issue related to terrorist tactics, techniques, and procedures; and potential dates of importance that terrorists might consider when planning attacks. The cover of this year’s CT Calendar highlights terrorists’ growing use of social media and other emerging online technologies to recruit, radicalize, and encourage adherents to carry out attacks. This year will be the last hardcopy publication of the calendar, as growing production costs necessitate our transition to more cost- effective dissemination methods. In the coming years, NCTC will use a variety of online and other media platforms to continue to share the valuable information found in the CT Calendar with a broad customer set, including our Federal, State, Local, and Tribal law enforcement partners; agencies across the Intelligence Community; private sector partners; and the US public. On behalf of NCTC, I want to thank all the consumers of the CT Calendar during the past 12 years. We hope you continue to find the CT Calendar beneficial to your daily efforts. Sincerely, Nicholas J. Rasmussen Director The US National Counterterrorism Center is pleased to present the 2016 edition of the Counterterrorism (CT) Calendar. This edition, like others since the Calendar was first published in daily planner format in 2003, contains many features across the full range of issues pertaining to international terrorism: terrorist groups, wanted terrorists, and technical pages on various threat-related topics.
    [Show full text]
  • Exhibits Attached to Arguments on Admissibility, Declaration of Mohammed Abdullah Saleh Al-Asad, and Declaration of Zahra Ahmed Mohamed
    BEFORE THE AFRICAN COMMISSION FOR HUMAN & PEOPLES’ RIGHTS 49th ORDINARY SESSION: APRIL-MAY 2011 COMMUNICATION NO. 383/2010 In the matter between: MOHAMMED ABDULLAH SALEH AL-ASAD and DJIBOUTI EXHIBITS ATTACHED TO ARGUMENTS ON ADMISSIBILITY, DECLARATION OF MOHAMMED ABDULLAH SALEH AL-ASAD, AND DECLARATION OF ZAHRA AHMED MOHAMED EXHIBITS The United Republic of Tanzania Departure Declaration Card, 27 December 2003…….A Center for Human Rights and Global Justice, On the Record: U.S. Disclosures on Rendition, Secret Detention, and Coercive Interrogation (New York: NYU School of Law, 2008)………………………………………………………………………………..B Letter to the Attorney General of Djibouti, 31 March 2009…….….…..…….…….….…C United Nations Human Rights Council, 13th Session, Joint Study on Global Practices in Relation to Secret Detention in the Context of Countering Terrorism, U.N. Doc. A/HRC/13/42 (19 February 2010)………………………………………………………. D Republic v. Director of Immigration Services, ex parte Mohammed al-Asad (Habeas Corpus petition), High Court of Tanzania, 17 June 2004………………………………...E Amnesty International, United States of America: Below the radar- Secret flights to torture and ‘disappearance,’ 5 April 2006……………………………………………….F Prepared Remarks of Treasury Secretary John Snow to Announce Joint U.S. and Saudi Action Against Four Branches of Al-Haramain in the Financial War on Terror, JS-1107, 22 January 2004…………………………………………………………………………..G Henry Lyimo, Guardian (Dar es Salaam), Yemenis, Italians Expelled, 30 December 2003…………………………………………………………………………………...….H Roderick Ndomba, Daily News (Dar es Salaam), Dar Deports 2,367 Aliens, 30 December 2003……...……………………………..………………………………………………….I International Committee of the Red Cross, ICRC Report on the Treatment of Fourteen “High Value Detainees” in CIA Custody, 2007…………………………..……….……...J International Seismological Centre Earthquake Data…………………………………….K U.S.
    [Show full text]
  • Assessing the Threat to the Homeland from Al-Qaeda Operations in Iran and Syria Hearing Subcommittee on Counterterrorism And
    ASSESSING THE THREAT TO THE HOMELAND FROM AL-QAEDA OPERATIONS IN IRAN AND SYRIA HEARING BEFORE THE SUBCOMMITTEE ON COUNTERTERRORISM AND INTELLIGENCE OF THE COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED THIRTEENTH CONGRESS FIRST SESSION MAY 22, 2013 Serial No. 113–19 Printed for the use of the Committee on Homeland Security Available via the World Wide Web: http://www.gpo.gov/fdsys/ U.S. GOVERNMENT PRINTING OFFICE 85–684 PDF WASHINGTON : 2013 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2250 Mail: Stop SSOP, Washington, DC 20402–0001 COMMITTEE ON HOMELAND SECURITY MICHAEL T. MCCAUL, Texas, Chairman LAMAR SMITH, Texas BENNIE G. THOMPSON, Mississippi PETER T. KING, New York LORETTA SANCHEZ, California MIKE ROGERS, Alabama SHEILA JACKSON LEE, Texas PAUL C. BROUN, Georgia YVETTE D. CLARKE, New York CANDICE S. MILLER, Michigan, Vice Chair BRIAN HIGGINS, New York PATRICK MEEHAN, Pennsylvania CEDRIC L. RICHMOND, Louisiana JEFF DUNCAN, South Carolina WILLIAM R. KEATING, Massachusetts TOM MARINO, Pennsylvania RON BARBER, Arizona JASON CHAFFETZ, Utah DONDALD M. PAYNE, JR., New Jersey STEVEN M. PALAZZO, Mississippi BETO O’ROURKE, Texas LOU BARLETTA, Pennsylvania TULSI GABBARD, Hawaii CHRIS STEWART, Utah FILEMON VELA, Texas RICHARD HUDSON, North Carolina STEVEN A. HORSFORD, Nevada STEVE DAINES, Montana ERIC SWALWELL, California SUSAN W. BROOKS, Indiana SCOTT PERRY, Pennsylvania VACANCY GREG HILL, Chief of Staff MICHAEL GEFFROY, Deputy Chief of Staff/Chief Counsel MICHAEL S. TWINCHEK, Chief Clerk I. LANIER AVANT, Minority Staff Director SUBCOMMITTEE ON COUNTERTERRORISM AND INTELLIGENCE PETER T.
    [Show full text]
  • The Role of Social Networks in the Evolution of Al Qaeda-Inspired Violent Extremism in the United States, 1990-2015
    The author(s) shown below used Federal funding provided by the U.S. Department of Justice to prepare the following resource: Document Title: The Role of Social Networks in the Evolution of Al Qaeda-Inspired Violent Extremism in the United States, 1990-2015 Author(s): Jytte Klausen Document Number: 250416 Date Received: November 2016 Award Number: 2012-ZA-BX-0006 This resource has not been published by the U.S. Department of Justice. This resource is being made publically available through the Office of Justice Programs’ National Criminal Justice Reference Service. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. FINAL REPORT The Role of Social Networks in the Evolution of Al Qaeda-Inspired Violent Extremism in the United States, 1990-2015. Principal Investigator: Jytte Klausen, Brandeis University. June 2016. This project was supported by Award No. 2012-ZA-BX-0006, awarded by the National Institute of Justice, Office of Justice Programs, U.S. Department of Justice. The opinions, findings, and conclusions or recommendations expressed in this report are those of the author and do not necessarily reflect those of the U.S. Department of Justice. This resource was prepared by the author(s) using Federal funds provided by the U.S. Department of Justice. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice Contents EXECUTIVE SUMMARY ........................................................................................................... I 1. INTRODUCTION....................................................................................................................
    [Show full text]
  • Harmony and Disharmony: Exploiting Al-Qa'ida's Organizational
    Harmony and Disharmony Exploiting al-Qa’ida’s Organizational Vulnerabilities February 14, 2006 Combating Terrorism Center Department of Social Sciences United States Military Academy 1 Executive Summary This study, conducted by the faculty and research fellows of the Combating Terrorism Center (CTC) at West Point, serves multiple purposes, the most important of which is contributing to the depth of knowledge about the al-Qa’ida movement. Evidence supporting the conclusions and recommendations provided in this report is drawn from a collection of newly-released al-Qa’ida documents captured during recent operations in support of the Global War on Terror and maintained in the Department of Defense’s Harmony database. In the text of these documents, readers will see how explicit al-Qa’ida has been in its internal discussions covering a range of organizational issues, particularly regarding the internal structure and functioning of the movement as well as with tensions that emerged within the leadership. In the first part of the report, we provide a theoretical framework, drawing on scholarly approaches including organization and agency theory, to predict where we should expect terrorist groups to face their greatest challenges in conducting operations. The framework is informed as much as possible by the captured documents, and provides a foundation upon which scholars can build as more of these documents are declassified and released to the public. Our analysis stresses that, by their nature, terrorist organizations such as al-Qa’ida face difficulties in almost any operational environment, particularly in terms of maintaining situational awareness, controlling the use of violence to achieve specified political ends, and of course, preventing local authorities from degrading the group’s capabilities.
    [Show full text]
  • Pakistan Human Rights Ignored in the "War on Terror"
    Pakistan Human rights ignored in the "war on terror" 1. Introduction "I cannot believe that there can be a trade between the effective fight against terrorism and the protection of civil liberties. If as individuals we are asked to give up our freedom, our liberties, our human rights, as protection against terrorism, do we in the end have protection?" UN Secretary-General Kofi Annan, September 2006.(1) In its pursuit of the US-led "war on terror", the Pakistani government has committed numerous violations of human rights protected in the Constitution of Pakistan and in international human rights law. They include the right to life and the security of the person; to be free from torture and other cruel, inhuman or degrading treatment or punishment (ill-treatment); to be free from enforced disappearance and to challenge the lawfulness of detention. Victims of human rights violations in the "war on terror" include Pakistani and non-Pakistani terror suspects, men and some women, children of terror suspects, sometimes held as hostages, journalists who have reported on the "war on terror" and medical personnel who allegedly treated terror suspects.(2) Irrespective of the "war on terror", the people of Pakistan suffer widespread violations of their civil and political rights. In Pakistan, torture and ill-treatment are endemic; arbitrary and unlawful arrest and detention are a growing problem; extrajudicial executions of criminal suspects are frequent; well over 7,000 people are on death row and there has recently been a wave of executions. Discriminatory laws deny the basic human rights of women and of minority groups.
    [Show full text]