Survey of Terrorist Groups and Their Means of Financing

Total Page:16

File Type:pdf, Size:1020Kb

Survey of Terrorist Groups and Their Means of Financing SURVEY OF TERRORIST GROUPS AND THEIR MEANS OF FINANCING HEARING BEFORE THE SUBCOMMITTEE ON TERRORISM AND ILLICIT FINANCE OF THE COMMITTEE ON FINANCIAL SERVICES U.S. HOUSE OF REPRESENTATIVES ONE HUNDRED FIFTEENTH CONGRESS SECOND SESSION SEPTEMBER 7, 2018 Printed for the use of the Committee on Financial Services Serial No. 115–116 ( U.S. GOVERNMENT PUBLISHING OFFICE 31–576 PDF WASHINGTON : 2018 VerDate Mar 15 2010 14:03 Dec 06, 2018 Jkt 000000 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 G:\GPO PRINTING\DOCS\115TH HEARINGS - 2ND SESSION 2018\2018-09-07 TIF TERRO mcarroll on FSR431 with DISTILLER HOUSE COMMITTEE ON FINANCIAL SERVICES JEB HENSARLING, Texas, Chairman PATRICK T. MCHENRY, North Carolina, MAXINE WATERS, California, Ranking Vice Chairman Member PETER T. KING, New York CAROLYN B. MALONEY, New York EDWARD R. ROYCE, California NYDIA M. VELA´ ZQUEZ, New York FRANK D. LUCAS, Oklahoma BRAD SHERMAN, California STEVAN PEARCE, New Mexico GREGORY W. MEEKS, New York BILL POSEY, Florida MICHAEL E. CAPUANO, Massachusetts BLAINE LUETKEMEYER, Missouri WM. LACY CLAY, Missouri BILL HUIZENGA, Michigan STEPHEN F. LYNCH, Massachusetts SEAN P. DUFFY, Wisconsin DAVID SCOTT, Georgia STEVE STIVERS, Ohio AL GREEN, Texas RANDY HULTGREN, Illinois EMANUEL CLEAVER, Missouri DENNIS A. ROSS, Florida GWEN MOORE, Wisconsin ROBERT PITTENGER, North Carolina KEITH ELLISON, Minnesota ANN WAGNER, Missouri ED PERLMUTTER, Colorado ANDY BARR, Kentucky JAMES A. HIMES, Connecticut KEITH J. ROTHFUS, Pennsylvania BILL FOSTER, Illinois LUKE MESSER, Indiana DANIEL T. KILDEE, Michigan SCOTT TIPTON, Colorado JOHN K. DELANEY, Maryland ROGER WILLIAMS, Texas KYRSTEN SINEMA, Arizona BRUCE POLIQUIN, Maine JOYCE BEATTY, Ohio MIA LOVE, Utah DENNY HECK, Washington FRENCH HILL, Arkansas JUAN VARGAS, California TOM EMMER, Minnesota JOSH GOTTHEIMER, New Jersey LEE M. ZELDIN, New York VICENTE GONZALEZ, Texas DAVID A. TROTT, Michigan CHARLIE CRIST, Florida BARRY LOUDERMILK, Georgia RUBEN KIHUEN, Nevada ALEXANDER X. MOONEY, West Virginia THOMAS MACARTHUR, New Jersey WARREN DAVIDSON, Ohio TED BUDD, North Carolina DAVID KUSTOFF, Tennessee CLAUDIA TENNEY, New York TREY HOLLINGSWORTH, Indiana SHANNON MCGAHN, Staff Director (II) VerDate Mar 15 2010 14:03 Dec 06, 2018 Jkt 000000 PO 00000 Frm 00002 Fmt 5904 Sfmt 5904 G:\GPO PRINTING\DOCS\115TH HEARINGS - 2ND SESSION 2018\2018-09-07 TIF TERRO mcarroll on FSR431 with DISTILLER SUBCOMMITTEE ON TERRORISM AND ILLICIT FINANCE STEVAN PEARCE, New Mexico, Chairman ROBERT PITTENGER, North Carolina, Vice ED PERLMUTTER, Colorado, Ranking Chairman Member KEITH J. ROTHFUS, Pennsylvania CAROLYN B. MALONEY, New York LUKE MESSER, Indiana JAMES A. HIMES, Connecticut SCOTT TIPTON, Colorado BILL FOSTER, Illinois ROGER WILLIAMS, Texas DANIEL T. KILDEE, Michigan BRUCE POLIQUIN, Maine JOHN K. DELANEY, Maryland MIA LOVE, Utah KYRSTEN SINEMA, Arizona FRENCH HILL, Arkansas JUAN VARGAS, California TOM EMMER, Minnesota JOSH GOTTHEIMER, New Jersey LEE M. ZELDIN, New York RUBEN KIHUEN, Nevada WARREN DAVIDSON, Ohio STEPHEN F. LYNCH, Massachusetts TED BUDD, North Carolina DAVID KUSTOFF, Tennessee (III) VerDate Mar 15 2010 14:03 Dec 06, 2018 Jkt 000000 PO 00000 Frm 00003 Fmt 5904 Sfmt 5904 G:\GPO PRINTING\DOCS\115TH HEARINGS - 2ND SESSION 2018\2018-09-07 TIF TERRO mcarroll on FSR431 with DISTILLER VerDate Mar 15 2010 14:03 Dec 06, 2018 Jkt 000000 PO 00000 Frm 00004 Fmt 5904 Sfmt 5904 G:\GPO PRINTING\DOCS\115TH HEARINGS - 2ND SESSION 2018\2018-09-07 TIF TERRO mcarroll on FSR431 with DISTILLER C O N T E N T S Page Hearing held on: September 7, 2018 ............................................................................................ 1 Appendix: September 7, 2018 ............................................................................................ 33 WITNESSES FRIDAY, SEPTEMBER 7, 2018 Bauer, Katherine, Blumenstein-Katz Family Fellow, Washington Institute for Near East Policy ............................................................................................. 4 Clarke, Colin P., Senior Political Scientist, RAND Corporation .......................... 10 Fanusie, Yaya J., Director of Analysis, Center on Sanctions and Illicit Finance, Foundation for Defense of Democracies .............................................. 6 Segal, Oren, Director, Center on Extremism, Anti-Defamation League ............. 7 Soufan, Ali H., Chairman and Chief Executive Officer, The Soufan Center ...... 9 APPENDIX Prepared statements: Bauer, Katherine .............................................................................................. 34 Clarke, Colin P. ................................................................................................ 57 Fanusie, Yaya J. ............................................................................................... 66 Segal, Oren ........................................................................................................ 77 Soufan, Ali H. ................................................................................................... 118 (V) VerDate Mar 15 2010 14:03 Dec 06, 2018 Jkt 000000 PO 00000 Frm 00005 Fmt 5904 Sfmt 5904 G:\GPO PRINTING\DOCS\115TH HEARINGS - 2ND SESSION 2018\2018-09-07 TIF TERRO mcarroll on FSR431 with DISTILLER VerDate Mar 15 2010 14:03 Dec 06, 2018 Jkt 000000 PO 00000 Frm 00006 Fmt 5904 Sfmt 5904 G:\GPO PRINTING\DOCS\115TH HEARINGS - 2ND SESSION 2018\2018-09-07 TIF TERRO mcarroll on FSR431 with DISTILLER SURVEY OF TERRORIST GROUPS AND THEIR MEANS OF FINANCING Friday, September 7, 2018 U.S. HOUSE OF REPRESENTATIVES, SUBCOMMITTEE ON TERRORISM AND ILLICIT FINANCE, COMMITTEE ON FINANCIAL SERVICES, Washington, D.C. The subcommittee met, pursuant to notice, at 9:22 a.m., in room 2128, Rayburn House Office Building, Hon. Stevan Pearce [chair- man of the subcommittee] presiding. Present: Representatives Pearce, Pittenger, Rothfus, Tipton, Hill, Emmer, Zeldin, Davidson, Budd, Kustoff, Perlmutter, Maloney, Himes, Foster, Sinema, Vargas, Gottheimer, Kihuen, Lynch, and Waters. Chairman PEARCE. The subcommittee will come to order. Without objection, the Chair is authorized to declare a recess of the subcommittee at any time. Members of the committee who are not members of the Subcommittee on Terrorism and Illicit Finance may participate in today’s hearing. All members will have 5 legisla- tive days within which to submit extraneous materials to the Chair for inclusion in the record. This hearing is entitled, ‘‘Survey of Terrorist Groups and Their Means of Financing.’’ I will now recognize myself for 2 minutes to give an opening statement. I want to thank everyone for joining us today. Today’s hearing will examine the current landscape of terrorism around the world and the ways that these groups are financing their operations. Terrorist organizations cannot function without financial re- sources to organize and carry out violent actions. Congress must understand the full nature of the current threats facing our Nation and the globe. We must remain vigilant in identifying and cutting off the funding mechanism of these organizations that pose a threat to global safety. This vital piece of our Nation’s antiterrorist strategy cannot be overlooked. On April 22, 2015, the Terrorism Financial Task Force of the 114th Congress held a similar hearing to examine which terrorist groups posed the greatest threats to global stability. In the 3 years since that initial hearing, terrorist organizations have adapted and changed their ways of managing their operations. I would like to bring up the example of the Islamic state, better known as ISIS, to highlight how the global landscape has changed since that hearing. At their peak in 2014, ISIS was generating around $81 million a month through taxes, oil sales, smuggling, (1) VerDate Mar 15 2010 14:03 Dec 06, 2018 Jkt 000000 PO 00000 Frm 00007 Fmt 6633 Sfmt 6633 G:\GPO PRINTING\DOCS\115TH HEARINGS - 2ND SESSION 2018\2018-09-07 TIF TERRO mcarroll on FSR431 with DISTILLER 2 and extortion. Additionally, during this time, the group controlled 41,000 square miles of territory in Iraq and Syria and ruled over 8 million people. Currently, ISIS has lost 98 percent of their territory in these two countries, and more than 7.7 million people have been liberated from ISIS’ oppression. While the loss of this territory has caused their revenues to plummet greatly, the group still is able to pay terrorist cells and spread violence globally. While ISIS may be one of the most glaring examples of a ter- rorist organization being forced to change their operations as a re- sult of global intervention, there are many more throughout the world, from al-Qaida running fundraising operations and cam- paigns with cryptocurrencies to Hezbollah operating drug traf- ficking rings in South America. We must ensure that Congress un- derstands the full nature of the threats that we are currently fac- ing. This hearing will provide up-to-date information about which ter- rorist groups represent the highest threat and the new ways that they are financing their operations and infrastructure. I would like to thank our witnesses for being here today, and look forward to their expert testimony on these important issues. I now would recognize the gentleman from Colorado for 2 min- utes for an opening statement. Mr. PERLMUTTER. Thank you, Mr. Chairman. I will keep my remarks brief because we are going to have votes on the floor pretty early this morning. Thank you, Mr. Chairman. And thank you to all the panelists for being here to share your insight on major terrorist groups and how they finance their
Recommended publications
  • The Changing Forms of Incitement to Terror and Violence
    THE CHANGING FORMS OF INCITEMENT TO TERROR AND VIOLENCE: TERROR AND TO THE CHANGING FORMS OF INCITEMENT The most neglected yet critical component of international terror is the element of incitement. Incitement is the medium through which the ideology of terror actually materializes into the act of terror itself. But if indeed incitement is so obviously and clearly a central component of terrorism, the question remains: why does the international community in general, and international law in particular, not posit a crime of incitement to terror? Is there no clear dividing line between incitement to terror and the fundamental right to freedom of speech? With such questions in mind, the Jerusalem Center for Public Affairs and the Konrad Adenauer Stiftung held an international conference on incitement. This volume presents the insights of the experts who took part, along with a Draft International Convention to Combat Incitement to Terror and Violence that is intended for presentation to the Secretary-General of the United Nations. The Need for a New International Response International a New for Need The THE CHANGING FORMS OF INCITEMENT TO TERROR AND VIOLENCE: The Need for a New International Response Jerusalem Center for Public Affairs המרכז הירושלמי לענייני ציבור ומדינה )ע"ר( THE CHANGING FORMS OF INCITEMENT TO TERROR AND VIOLENCE: The Need for a New International Response Jerusalem Center for Public Affairs המרכז הירושלמי לענייני ציבור ומדינה )ע"ר( This volume is based on a conference on “Incitement to Terror and Violence: New Challenges, New Responses” under the auspices of the Jerusalem Center for Public Affairs and the Konrad-Adenauer-Stiftung, held on November 8, 2011, at the David Citadel Hotel, Jerusalem.
    [Show full text]
  • Virtual Currencies and Terrorist Financing : Assessing the Risks And
    DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT FOR CITIZENS' RIGHTS AND CONSTITUTIONAL AFFAIRS COUNTER-TERRORISM Virtual currencies and terrorist financing: assessing the risks and evaluating responses STUDY Abstract This study, commissioned by the European Parliament’s Policy Department for Citizens’ Rights and Constitutional Affairs at the request of the TERR Committee, explores the terrorist financing (TF) risks of virtual currencies (VCs), including cryptocurrencies such as Bitcoin. It describes the features of VCs that present TF risks, and reviews the open source literature on terrorist use of virtual currencies to understand the current state and likely future manifestation of the risk. It then reviews the regulatory and law enforcement response in the EU and beyond, assessing the effectiveness of measures taken to date. Finally, it provides recommendations for EU policymakers and other relevant stakeholders for ensuring the TF risks of VCs are adequately mitigated. PE 604.970 EN ABOUT THE PUBLICATION This research paper was requested by the European Parliament's Special Committee on Terrorism and was commissioned, overseen and published by the Policy Department for Citizens’ Rights and Constitutional Affairs. Policy Departments provide independent expertise, both in-house and externally, to support European Parliament committees and other parliamentary bodies in shaping legislation and exercising democratic scrutiny over EU external and internal policies. To contact the Policy Department for Citizens’ Rights and Constitutional Affairs or to subscribe to its newsletter please write to: [email protected] RESPONSIBLE RESEARCH ADMINISTRATOR Kristiina MILT Policy Department for Citizens' Rights and Constitutional Affairs European Parliament B-1047 Brussels E-mail: [email protected] AUTHORS Tom KEATINGE, Director of the Centre for Financial Crime and Security Studies, Royal United Services Institute (coordinator) David CARLISLE, Centre for Financial Crime and Security Studies, Royal United Services Institute, etc.
    [Show full text]
  • Beauty Is Not in the Eye of the Beholder
    Insight Consumer and Wealth Management Digital Assets: Beauty Is Not in the Eye of the Beholder Parsing the Beauty from the Beast. Investment Strategy Group | June 2021 Sharmin Mossavar-Rahmani Chief Investment Officer Investment Strategy Group Goldman Sachs The co-authors give special thanks to: Farshid Asl Managing Director Matheus Dibo Shahz Khatri Vice President Vice President Brett Nelson Managing Director Michael Murdoch Vice President Jakub Duda Shep Moore-Berg Harm Zebregs Vice President Vice President Vice President Shivani Gupta Analyst Oussama Fatri Yousra Zerouali Vice President Analyst ISG material represents the views of ISG in Consumer and Wealth Management (“CWM”) of GS. It is not financial research or a product of GS Global Investment Research (“GIR”) and may vary significantly from those expressed by individual portfolio management teams within CWM, or other groups at Goldman Sachs. 2021 INSIGHT Dear Clients, There has been enormous change in the world of cryptocurrencies and blockchain technology since we first wrote about it in 2017. The number of cryptocurrencies has increased from about 2,000, with a market capitalization of over $200 billion in late 2017, to over 8,000, with a market capitalization of about $1.6 trillion. For context, the market capitalization of global equities is about $110 trillion, that of the S&P 500 stocks is $35 trillion and that of US Treasuries is $22 trillion. Reported trading volume in cryptocurrencies, as represented by the two largest cryptocurrencies by market capitalization, has increased sixfold, from an estimated $6.8 billion per day in late 2017 to $48.6 billion per day in May 2021.1 This data is based on what is called “clean data” from Coin Metrics; the total reported trading volume is significantly higher, but much of it is artificially inflated.2,3 For context, trading volume on US equity exchanges doubled over the same period.
    [Show full text]
  • On the Norms of Charitable Giving in Islam: a Field Experiment
    A Service of Leibniz-Informationszentrum econstor Wirtschaft Leibniz Information Centre Make Your Publications Visible. zbw for Economics Lambarraa, Fatima; Riener, Gerhard Working Paper On the norms of charitable giving in Islam: A field experiment DICE Discussion Paper, No. 59 Provided in Cooperation with: Düsseldorf Institute for Competition Economics (DICE) Suggested Citation: Lambarraa, Fatima; Riener, Gerhard (2012) : On the norms of charitable giving in Islam: A field experiment, DICE Discussion Paper, No. 59, ISBN 978-3-86304-058-1, Heinrich Heine University Düsseldorf, Düsseldorf Institute for Competition Economics (DICE), Düsseldorf This Version is available at: http://hdl.handle.net/10419/59571 Standard-Nutzungsbedingungen: Terms of use: Die Dokumente auf EconStor dürfen zu eigenen wissenschaftlichen Documents in EconStor may be saved and copied for your Zwecken und zum Privatgebrauch gespeichert und kopiert werden. personal and scholarly purposes. Sie dürfen die Dokumente nicht für öffentliche oder kommerzielle You are not to copy documents for public or commercial Zwecke vervielfältigen, öffentlich ausstellen, öffentlich zugänglich purposes, to exhibit the documents publicly, to make them machen, vertreiben oder anderweitig nutzen. publicly available on the internet, or to distribute or otherwise use the documents in public. Sofern die Verfasser die Dokumente unter Open-Content-Lizenzen (insbesondere CC-Lizenzen) zur Verfügung gestellt haben sollten, If the documents have been made available under an Open gelten abweichend
    [Show full text]
  • Blockchain & Cryptocurrency Regulation
    Blockchain & Cryptocurrency Regulation Third Edition Contributing Editor: Josias N. Dewey Global Legal Insights Blockchain & Cryptocurrency Regulation 2021, Third Edition Contributing Editor: Josias N. Dewey Published by Global Legal Group GLOBAL LEGAL INSIGHTS – BLOCKCHAIN & CRYPTOCURRENCY REGULATION 2021, THIRD EDITION Contributing Editor Josias N. Dewey, Holland & Knight LLP Head of Production Suzie Levy Senior Editor Sam Friend Sub Editor Megan Hylton Consulting Group Publisher Rory Smith Chief Media Officer Fraser Allan We are extremely grateful for all contributions to this edition. Special thanks are reserved for Josias N. Dewey of Holland & Knight LLP for all of his assistance. Published by Global Legal Group Ltd. 59 Tanner Street, London SE1 3PL, United Kingdom Tel: +44 207 367 0720 / URL: www.glgroup.co.uk Copyright © 2020 Global Legal Group Ltd. All rights reserved No photocopying ISBN 978-1-83918-077-4 ISSN 2631-2999 This publication is for general information purposes only. It does not purport to provide comprehensive full legal or other advice. Global Legal Group Ltd. and the contributors accept no responsibility for losses that may arise from reliance upon information contained in this publication. This publication is intended to give an indication of legal issues upon which you may need advice. Full legal advice should be taken from a qualified professional when dealing with specific situations. The information contained herein is accurate as of the date of publication. Printed and bound by TJ International, Trecerus Industrial Estate, Padstow, Cornwall, PL28 8RW October 2020 PREFACE nother year has passed and virtual currency and other blockchain-based digital assets continue to attract the attention of policymakers across the globe.
    [Show full text]
  • Journal of Threat Assessment and Management Postdicting Violence with Sovereign Citizen Actors: an Exploratory Test of the TRAP-18 Darin J
    Journal of Threat Assessment and Management Postdicting Violence With Sovereign Citizen Actors: An Exploratory Test of the TRAP-18 Darin J. Challacombe and Paul A. Lucas Online First Publication, October 1, 2018. http://dx.doi.org/10.1037/tam0000105 CITATION Challacombe, D. J., & Lucas, P. A. (2018, October 1). Postdicting Violence With Sovereign Citizen Actors: An Exploratory Test of the TRAP-18. Journal of Threat Assessment and Management. Advance online publication. http://dx.doi.org/10.1037/tam0000105 Journal of Threat Assessment and Management © 2018 American Psychological Association 2018, Vol. 1, No. 999, 000 2169-4842/18/$12.00 http://dx.doi.org/10.1037/tam0000105 Postdicting Violence With Sovereign Citizen Actors: An Exploratory Test of the TRAP-18 Darin J. Challacombe Paul A. Lucas Fort Hays State University Appalachian State University The sovereign citizen movement is one of the largest antigovernment nationalism or domestic terrorist collectives in the United States. In the last decade, over a dozen public officials were injured or killed by individuals adhering to sovereign citizen ideology. The Terrorist Radicalization Assessment Protocol (TRAP-18; Meloy & Gill, 2016; Meloy, Habermeyer, & Guldimann, 2015) is a collection of 18 behavior-based warning signs for terror incidents which has been used to assess primarily international terrorism samples. In this study, the researchers applied the TRAP-18 to both violent and nonviolent incidents involving sovereign citizen members. Using chi-square tests for independence and a logistic regression analysis, the researchers found support for the TRAP-18. The sum of the TRAP-18 scores was able to postdict violent outcomes within the events included within the study.
    [Show full text]
  • Moral Aspect of Qard
    International Journal of Islamic and Middle Eastern Finance and Management Analysing the moral aspect of qard: a shariah perspective Mohammad Abdullah Article information: To cite this document: Mohammad Abdullah , (2015),"Analysing the moral aspect of qard: a shariah perspective", International Journal of Islamic and Middle Eastern Finance and Management, Vol. 8 Iss 2 pp. 171 - 184 Permanent link to this document: http://dx.doi.org/10.1108/IMEFM-11-2013-0116 Downloaded on: 10 June 2015, At: 04:29 (PT) References: this document contains references to 40 other documents. To copy this document: [email protected] The fulltext of this document has been downloaded 17 times since 2015* Users who downloaded this article also downloaded: Ak Md Hasnol Alwee Pg Md Salleh, (2015),"Integrating financial inclusion and saving motives into institutional zakat practices: A case study on Brunei", International Journal of Islamic and Middle Eastern Finance and Management, Vol. 8 Iss 2 pp. 150-170 http://dx.doi.org/10.1108/ IMEFM-12-2013-0126 Catherine S F Ho, (2015),"International comparison of Shari’ah compliance screening standards", International Journal of Islamic and Middle Eastern Finance and Management, Vol. 8 Iss 2 pp. 222-245 http://dx.doi.org/10.1108/IMEFM-07-2014-0065 Bassam Mohammad Maali, Muhannad Ahmad Atmeh, (2015),"Using social welfare concepts to guarantee Islamic banks’ deposits", International Journal of Islamic and Middle Eastern Finance and Management, Vol. 8 Iss 2 pp. 134-149 http://dx.doi.org/10.1108/IMEFM-12-2013-0125 Access to this document was granted through an Emerald subscription provided by Downloaded by Mr Mohammad Abdullah At 04:29 10 June 2015 (PT) Token:JournalAuthor:A812B4BB-195C-4D2C-8A6D-BDAE44C3DDDE: For Authors If you would like to write for this, or any other Emerald publication, then please use our Emerald for Authors service information about how to choose which publication to write for and submission guidelines are available for all.
    [Show full text]
  • Qard-Al-Hassan As a Tool for Poverty Alleviation: a Case Study of the Fael Khair Waqf Program in Bangladesh
    Journal of Islamic Monetary Economics and Finance, Vol. 5, No.4 (2019), pp. 829-848 p-ISSN: 2460-6146, e-ISSN: 2460-6618 QARD-AL-HASSAN AS A TOOL FOR POVERTY ALLEVIATION: A CASE STUDY OF THE FAEL KHAIR WAQF PROGRAM IN BANGLADESH Farah Muneer1 and Foyasal Khan2 1 Institute for Inclusive Finance and Development (InM), Bangladesh, [email protected] 2 Department of Economics, International Islamic University Malaysia (IIUM), Malaysia, [email protected] ABSTRACT The central focus of the Islamic economic system is on socioeconomic justice and the overall welfare of society, especially at the bottom of the pyramid segment. Qard-al- Hassan, alongside zakat and sadaqah, is one of the instruments for the redistribution of income and wealth from the rich to the poor in Islam. In 2007, Bangladesh was struck by super cyclone SIDR, leaving 3,406 people dead. Moreover, SIDR caused unprecedented damage to homes, crops and livelihoods. The Fael Khair Waqf (FKW) Program came as a response to the urgent need to assist the victims of the cyclone and initiated an interest-free micro-loan (Qard-al-Hassan) scheme to restore the livelihoods of a large segment of the victims and to lift them out of poverty. While investigating the effectiveness of Qard-al-Hassan in poverty reduction, this paper also examines the FKW program as a case study. Analysis was conducted of 1600 households using an independent sample t-test and logistic regression to investigate to what extent the program has been effective in reducing poverty. The findings of the logistic analysis are that the probability of being poor for FKW participants is around 1.46 times lower than for non-participants.
    [Show full text]
  • DIY Sovereignty and the Popular Right in Australia
    DIY Sovereignty and the Popular Right in Australia Judy Lattas Macquarie University [email protected] Abstract The concern of this paper is with the form that ‘right wing’ anti-government protest has taken in Australia in recent years. One tactic that is proving popular amongst those who have suffered setbacks in their hold on property, or in their small business ventures, is to declare their secession from Australia, and to establish an alternative jurisdiction and alternative citizenship. The author describes some of these projects, and links the serious political pursuit of this secessionist move to a movement in the USA called Sovereign Citizenship, which is itself linked to recent acts of anti-government sabotage called ‘paper terrorism’. I want to take up the conference theme of ‘Mobile Boundaries/Rigid Worlds’ in relation to the recent popularity in Australia of creating new countries - on a small scale, of course - in ‘do it yourself’ (DIY) projects involving a declaration of sovereignty and autonomy. Sometimes it is an experiment in citizenship or just for fun, but it is often done in protest. What I have in mind are those people, for example, who have declared their legal secession from Australia and formed their own principalities, like His Royal Highness Prince Leonard of the Hutt River Province Principality in Western Australia. While the story of Prince Leonard is legendary, others who are more contemporary are not well known. Commentators call these people micronationalists, which is a term that was coined in the 1990s to describe the activity that was pioneered by Prince Leonard of Hutt.
    [Show full text]
  • Suicide Terrorists in the Current Conflict
    Israeli Security Agency [logo] Suicide Terrorists in the Current Conflict September 2000 - September 2007 L_C089061 Table of Contents: Foreword...........................................................................................................................1 Suicide Terrorists - Personal Characteristics................................................................2 Suicide Terrorists Over 7 Years of Conflict - Geographical Data...............................3 Suicide Attacks since the Beginning of the Conflict.....................................................5 L_C089062 Israeli Security Agency [logo] Suicide Terrorists in the Current Conflict Foreword Since September 2000, the State of Israel has been in a violent and ongoing conflict with the Palestinians, in which the Palestinian side, including its various organizations, has carried out attacks against Israeli citizens and residents. During this period, over 27,000 attacks against Israeli citizens and residents have been recorded, and over 1000 Israeli citizens and residents have lost their lives in these attacks. Out of these, 155 (May 2007) attacks were suicide bombings, carried out against Israeli targets by 178 (August 2007) suicide terrorists (male and female). (It should be noted that from 1993 up to the beginning of the conflict in September 2000, 38 suicide bombings were carried out by 43 suicide terrorists). Despite the fact that suicide bombings constitute 0.6% of all attacks carried out against Israel since the beginning of the conflict, the number of fatalities in these attacks is around half of the total number of fatalities, making suicide bombings the most deadly attacks. From the beginning of the conflict up to August 2007, there have been 549 fatalities and 3717 casualties as a result of 155 suicide bombings. Over the years, suicide bombing terrorism has become the Palestinians’ leading weapon, while initially bearing an ideological nature in claiming legitimate opposition to the occupation.
    [Show full text]
  • True and False Confessions: the Efficacy of Torture and Brutal
    Chapter 7 True and False Confessions The Efficacy of Torture and Brutal Interrogations Central to the debate on the use of “enhanced” interrogation techniques is the question of whether those techniques are effective in gaining intelligence. If the techniques are the only way to get actionable intelligence that prevents terrorist attacks, their use presents a moral dilemma for some. On the other hand, if brutality does not produce useful intelligence — that is, it is not better at getting information than other methods — the debate is moot. This chapter focuses on the effectiveness of the CIA’s enhanced interrogation technique program. There are far fewer people who defend brutal interrogations by the military. Most of the military’s mistreatment of captives was not authorized in detail at high levels, and some was entirely unauthorized. Many military captives were either foot soldiers or were entirely innocent, and had no valuable intelligence to reveal. Many of the perpetrators of abuse in the military were young interrogators with limited training and experience, or were not interrogators at all. The officials who authorized the CIA’s interrogation program have consistently maintained that it produced useful intelligence, led to the capture of terrorist suspects, disrupted terrorist attacks, and saved American lives. Vice President Dick Cheney, in a 2009 speech, stated that the enhanced interrogation of captives “prevented the violent death of thousands, if not hundreds of thousands, of innocent people.” President George W. Bush similarly stated in his memoirs that “[t]he CIA interrogation program saved lives,” and “helped break up plots to attack military and diplomatic facilities abroad, Heathrow Airport and Canary Wharf in London, and multiple targets in the United States.” John Brennan, President Obama’s recent nominee for CIA director, said, of the CIA’s program in a televised interview in 2007, “[t]here [has] been a lot of information that has come out from these interrogation procedures.
    [Show full text]
  • Consensys and Latham & Watkins LLP Announce a Convertible Note
    ConsenSys and Latham & Watkins LLP announce a convertible note generator for startups powered by OpenLaw New York - May 10, 2019 - ConsenSys and global law firm Latham & Watkins LLP are pleased to ​ ​ ​ ​ ​ announce the launch of the Automated Convertible Note, an OpenLaw-based document generator to help ​ ​ startups raise capital with customizable market standard terms and optional digital token provisions. To access the online tool, please visit the website. ​ ​ ConsenSys’ in-house legal team collaborated with Latham & Watkins’ emerging companies, fintech, and finreg practices to develop the Automated Convertible Note. The document generator relies on OpenLaw, a ConsenSys project which is building blockchain-based infrastructure to streamline commercial relationships through a suite of tools for token generation, contract automation, e-signature, and smart contracts components. “Working with Latham & Watkins—a firm with unique and deep insight into the legal and regulatory issues in this space—was very important to us because we wanted to be sure our generator could be used to create a sound convertible note with market standard terms. We are also grateful to 500 Startups for collaborating with us on the use of the form KISS as the basis for our document,” said David Cios, a member of the ConsenSys legal team. Digital token provisions are an important feature of the Automated Convertible Note. “We invest in many startups that leverage blockchain technology to build products and services for the new tokenized economy. If any startup is contemplating distributing digital tokens in the future, we believe our Automated Convertible Note builds in the appropriate guardrails to address potential regulatory issues relating to tokens,” said Wee Ming Choon, also a lawyer at ConsenSys.
    [Show full text]