Terrorism 2000 2001 Fbi Publication #0308 TerrRism 2000/2001
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Radical Environmentalism: the New Civil Disobedience?
Seattle Journal for Social Justice Volume 6 Issue 1 Fall/Winter 2007 Article 35 November 2007 Radical Environmentalism: The New Civil Disobedience? Cesar Cuauhtemoc Garcia Hernandez Follow this and additional works at: https://digitalcommons.law.seattleu.edu/sjsj Recommended Citation Hernandez, Cesar Cuauhtemoc Garcia (2007) "Radical Environmentalism: The New Civil Disobedience?," Seattle Journal for Social Justice: Vol. 6 : Iss. 1 , Article 35. Available at: https://digitalcommons.law.seattleu.edu/sjsj/vol6/iss1/35 This Article is brought to you for free and open access by the Student Publications and Programs at Seattle University School of Law Digital Commons. It has been accepted for inclusion in Seattle Journal for Social Justice by an authorized editor of Seattle University School of Law Digital Commons. For more information, please contact [email protected]. 289 Radical Environmentalism: The New Civil Disobedience? César Cuauhtémoc García Hernández1 God said, “I have given you every seed-bearing plant which is on the face of all the earth, and every tree that bears fruit with seed. It will be for your food. To every wild animal, to every bird of the sky, to everything that creeps along the ground, to everything that has the breath of life, I give every green plant for food.” So it was. God saw all that he had made, and it was very good. Book of Genesis2 We know that the white man does not understand our ways. One portion of land is the same to him as the next, for he is a stranger who comes in the night and takes from the land whatever he needs. -
Chapter 7 War on Terror
Chapter 7 War on Terror Thou shall not kill – But we will. In July 2005, Ahmed Ressam was sentenced to 22 years of impris- onment after a jury convicted him of an attempt to bomb Los Angeles International Airport on the eve of the millennium. Emphasizing the rule of law in punishing terrorists, US District Judge John C. Coughenour made the following comments during the sentencing hearing: I would like to convey the message that our system works. We did not need to use a secret military tribunal, or detain the defendant indefinitely as an enemy combatant, or deny him the right to coun- sel, or invoke any proceedings beyond those guaranteed by or con- trary to the US Constitution...Despite the fact that Mr. Ressam is not an American citizen and despite the fact that he entered this country intent upon killing American citizens, he received an effec- tive, vigorous defense, and the opportunity to have his guilt or inno- cence determined by a jury of 12 ordinary citizens. Most importantly, all of this occurred in the sunlight of a public trial. There were no secret proceedings, no indefinite detention, no denial of counsel. The tragedy of September 11th shook our sense of security and made us realize that we, too, are vulnerable to acts of terrorism. Unfortunately, some believe that this threat renders our Constitution obsolete. The war on terror is the antithesis of the criminal justice system that Judge Coughenour describes above. The criminal justice sys- tem is the peacetime legal infrastructure to arrest, indict, prose- War on Terror 249 cute, and punish persons accused of committing terrorists acts. -
Jones (Stephen) Oklahoma City Bombing Archive, 1798 – 2003 (Bulk 1995 – 1997)
JONES (STEPHEN) OKLAHOMA CITY BOMBING ARCHIVE, 1798 ± 2003 (BULK 1995 ± 1997). See TARO record at http://www.lib.utexas.edu/taro/utcah/03493/cah-03493.html (Approximately 620 linear feet) This collection is open for research use. Portions are restricted due to privacy concerns. See Archivist's Note for more details. Use of DAT and Beta tapes by appointment only; please contact repository for more information. This collection is stored remotely. Advance notice required for retrieval. Contact repository for retrieval. Cite as: Stephen Jones Oklahoma City Bombing Archive, 1798 ± 2003 (Bulk 1995 ± 1997), Dolph Briscoe Center for American History, University of Texas at Austin. [AR 98-395; 2003-055; 2005-161] ______________________________________________________________________________ BIOGRAPHICAL NOTE: Stephen Jones (born 1940) was appointed in May 1995 by the United States District Court in Oklahoma City to serve as the lead defense attorney for Timothy McVeigh in the criminal court case of United States of America v. Timothy James McVeigh and Terry Lynn Nichols. On April 19, 1995, two years to the day after the infamous Federal Bureau of Investigation and Bureau of Alcohol, Tobacco, and Firearms raid on the Branch Davidians at Waco, Texas, a homemade bomb delivered inside of a Ryder rental truck was detonated in front of the Alfred P. Murrah Federal Building in Oklahoma City, Oklahoma. Timothy McVeigh, as well as his accomplice Terry Nichols, were accused of and, in 1997, found guilty of the crime, and McVeigh was executed in 2001. Terry Nichols is still serving his sentence of 161 consecutive life terms without the possibility of parole in the ADX Florence super maximum-security prison in Florence, Colorado. -
In Defense of Cyberterrorism: an Argument for Anticipating Cyber-Attacks
IN DEFENSE OF CYBERTERRORISM: AN ARGUMENT FOR ANTICIPATING CYBER-ATTACKS Susan W. Brenner Marc D. Goodman The September 11, 2001, terrorist attacks on the United States brought the notion of terrorism as a clear and present danger into the consciousness of the American people. In order to predict what might follow these shocking attacks, it is necessary to examine the ideologies and motives of their perpetrators, and the methodologies that terrorists utilize. The focus of this article is on how Al-Qa'ida and other Islamic fundamentalist groups can use cyberspace and technology to continue to wage war againstthe United States, its allies and its foreign interests. Contending that cyberspace will become an increasingly essential terrorist tool, the author examines four key issues surrounding cyberterrorism. The first is a survey of conventional methods of "physical" terrorism, and their inherent shortcomings. Next, a discussion of cyberspace reveals its potential advantages as a secure, borderless, anonymous, and structured delivery method for terrorism. Third, the author offers several cyberterrorism scenarios. Relating several examples of both actual and potential syntactic and semantic attacks, instigated individually or in combination, the author conveys their damagingpolitical and economic impact. Finally, the author addresses the inevitable inquiry into why cyberspace has not been used to its full potential by would-be terrorists. Separately considering foreign and domestic terrorists, it becomes evident that the aims of terrorists must shift from the gross infliction of panic, death and destruction to the crippling of key information systems before cyberattacks will take precedence over physical attacks. However, given that terrorist groups such as Al Qa'ida are highly intelligent, well-funded, and globally coordinated, the possibility of attacks via cyberspace should make America increasingly vigilant. -
Disaggregating the Scare from the Greens
DISAGGREGATING THE SCARE FROM THE GREENS Lee Hall*† INTRODUCTION When the Vermont Law Review graciously asked me to contribute to this Symposium focusing on the tension between national security and fundamental values, specifically for a segment on ecological and animal- related activism as “the threat of unpopular ideas,” it seemed apt to ask a basic question about the title: Why should we come to think of reverence for life or serious concern for the Earth that sustains us as “unpopular ideas”? What we really appear to be saying is that the methods used, condoned, or promoted by certain people are unpopular. So before we proceed further, intimidation should be disaggregated from respect for the environment and its living inhabitants. Two recent and high-profile law-enforcement initiatives have viewed environmental and animal-advocacy groups as threats in the United States. These initiatives are the Stop Huntingdon Animal Cruelty (SHAC) prosecution and Operation Backfire. The former prosecution targeted SHAC—a campaign to close one animal-testing firm—and referred also to the underground Animal Liberation Front (ALF).1 The latter prosecution *. Legal director of Friends of Animals, an international animal-rights organization founded in 1957. †. Lee Hall, who can be reached at [email protected], thanks Lydia Fiedler, the Vermont Law School, and Friends of Animals for making it possible to participate in the 2008 Symposium and prepare this Article for publication. 1. See Indictment at 14–16, United States v. Stop Huntingdon Animal Cruelty USA, Inc., No. 3:04-cr-00373-AET-2 (D.N.J. May 27, 2004), available at http://www.usdoj.gov/usao/nj/press/files/ pdffiles/shacind.pdf (last visited Apr. -
Al Qaeda's Struggling Campaign in Syria: Past, Present, and Future
COVER PHOTO FADI AL-HALABI/AFP/GETTY IMAGES APRIL 2018 1616 Rhode Island Avenue NW Al Qaeda’s Struggling Washington, DC 20036 202 887 0200 | www.csis.org Campaign in Syria Past, Present, and Future AUTHORS Seth G. Jones Charles Vallee Maxwell B. Markusen A Report of the CSIS TRANSNATIONAL THREATS PROJECT Blank APRIL 2018 Al Qaeda’s Struggling Campaign in Syria Past, Present, and Future AUTHORS Seth G. Jones Charles Vallee Maxwell B. Markusen A Report of the CSIS TRANSNATIONAL THREATS PROJECT About CSIS For over 50 years, the Center for Strategic and International Studies (CSIS) has worked to develop solutions to the world’s greatest policy challenges. Today, CSIS scholars are providing strategic insights and bipartisan policy solutions to help decisionmakers chart a course toward a better world. CSIS is a nonprofit organization headquartered in Washington, D.C. The Center’s 220 full-time staff and large network of affiliated scholars conduct research and analysis and develop policy initiatives that look into the future and anticipate change. Founded at the height of the Cold War by David M. Abshire and Admiral Arleigh Burke, CSIS was dedicated to finding ways to sustain American prominence and prosperity as a force for good in the world. Since 1962, CSIS has become one of the world’s preeminent international institutions focused on defense and security; regional stability; and transnational challenges ranging from energy and climate to global health and economic integration. Thomas J. Pritzker was named chairman of the CSIS Board of Trustees in November 2015. Former U.S. deputy secretary of defense John J. -
Foreign Terrorist Organizations
Order Code RL32223 CRS Report for Congress Received through the CRS Web Foreign Terrorist Organizations February 6, 2004 Audrey Kurth Cronin Specialist in Terrorism Foreign Affairs, Defense, and Trade Division Huda Aden, Adam Frost, and Benjamin Jones Research Associates Foreign Affairs, Defense, and Trade Division Congressional Research Service ˜ The Library of Congress Foreign Terrorist Organizations Summary This report analyzes the status of many of the major foreign terrorist organizations that are a threat to the United States, placing special emphasis on issues of potential concern to Congress. The terrorist organizations included are those designated and listed by the Secretary of State as “Foreign Terrorist Organizations.” (For analysis of the operation and effectiveness of this list overall, see also The ‘FTO List’ and Congress: Sanctioning Designated Foreign Terrorist Organizations, CRS Report RL32120.) The designated terrorist groups described in this report are: Abu Nidal Organization (ANO) Abu Sayyaf Group (ASG) Al-Aqsa Martyrs Brigade Armed Islamic Group (GIA) ‘Asbat al-Ansar Aum Supreme Truth (Aum) Aum Shinrikyo, Aleph Basque Fatherland and Liberty (ETA) Communist Party of Philippines/New People’s Army (CPP/NPA) Al-Gama’a al-Islamiyya (Islamic Group, IG) HAMAS (Islamic Resistance Movement) Harakat ul-Mujahidin (HUM) Hizballah (Party of God) Islamic Movement of Uzbekistan (IMU) Jaish-e-Mohammed (JEM) Jemaah Islamiya (JI) Al-Jihad (Egyptian Islamic Jihad) Kahane Chai (Kach) Kurdistan Workers’ Party (PKK, KADEK) Lashkar-e-Tayyiba -
Central Intelligence Agency (CIA) Freedom of Information Act (FOIA) Case Log October 2000 - April 2002
Description of document: Central Intelligence Agency (CIA) Freedom of Information Act (FOIA) Case Log October 2000 - April 2002 Requested date: 2002 Release date: 2003 Posted date: 08-February-2021 Source of document: Information and Privacy Coordinator Central Intelligence Agency Washington, DC 20505 Fax: 703-613-3007 Filing a FOIA Records Request Online The governmentattic.org web site (“the site”) is a First Amendment free speech web site and is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. 1 O ct 2000_30 April 2002 Creation Date Requester Last Name Case Subject 36802.28679 STRANEY TECHNOLOGICAL GROWTH OF INDIA; HONG KONG; CHINA AND WTO 36802.2992 CRAWFORD EIGHT DIFFERENT REQUESTS FOR REPORTS REGARDING CIA EMPLOYEES OR AGENTS 36802.43927 MONTAN EDWARD GRADY PARTIN 36802.44378 TAVAKOLI-NOURI STEPHEN FLACK GUNTHER 36810.54721 BISHOP SCIENCE OF IDENTITY FOUNDATION 36810.55028 KHEMANEY TI LEAF PRODUCTIONS, LTD. -
Filling Terrorism Gaps: Veos, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan
PNNL-25727 Filling Terrorism Gaps: VEOs, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan August 2016 PNNL-25727 Filling Terrorism Gaps: VEOs, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan August 2016 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Pacific Northwest National Laboratory Richland, Washington 99352 PNNL-25727 Abstract This paper aims to address three issues: the lack of literature differentiating terrorism and violent extremist organizations (VEOs), terrorism incident databases, and the applicability of Risk Terrain Modeling (RTM) to terrorism. Current open source literature and publicly available government sources do not differentiate between terrorism and VEOs; furthermore, they fail to define them. Addressing the lack of a comprehensive comparison of existing terrorism data sources, a matrix comparing a dozen terrorism databases is constructed, providing insight toward the array of data available. RTM, a method for spatial risk analysis at a micro level, has some applicability to terrorism research, particularly for studies looking at risk indicators of terrorism. Leveraging attack data from multiple databases, combined with RTM, offers one avenue for closing existing research gaps in terrorism literature. iii Acknowledgments The author would like to sincerely thank several individuals for their contributions to this research. My mentor, Chrissie Noonan, for her guidance and support throughout this process, Carolyn Cramer for her operational support and insight, Alex Stephan, Lead for the Special Programs and Scientific Studies Team at PNNL, George Muller for his support and direction, Hannah Trump for her substantial help with the appendices, and Dan Fortin, Sam Chatterjee, and Thomas Johansen for the constant discussions. -
Identifying Enemies Among Us: Evolving Terrorist Threats and the Continuing Challenges of Domestic Intelligence Collection and Information Sharing
CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that helps improve policy and EDUCATION AND THE ARTS decisionmaking through research and analysis. ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE This electronic document was made available from www.rand.org as a public service INFRASTRUCTURE AND of the RAND Corporation. TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS Skip all front matter: Jump to Page 16 NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY Support RAND SCIENCE AND TECHNOLOGY Purchase this document TERRORISM AND Browse Reports & Bookstore HOMELAND SECURITY Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND Corporation View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non- commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation conference proceedings series. RAND conference proceedings present a collection of papers delivered at a conference or a summary of the conference. The material herein has been vetted by the conference attendees and both the introduction and the post-conference material have been re- viewed and approved for publication by the sponsoring research unit at RAND. -
The Al Qaeda Network a New Framework for Defining the Enemy
THE AL QAEDA NETWORK A NEW FRAMEWORK FOR DEFINING THE ENEMY KATHERINE ZIMMERMAN SEPTEMBER 2013 THE AL QAEDA NETWORK A NEW FRAMEWORK FOR DEFINING THE ENEMY KATHERINE ZIMMERMAN SEPTEMBER 2013 A REPORT BY AEI’S CRITICAL THREATS PROJECT ABOUT US About the Author Katherine Zimmerman is a senior analyst and the al Qaeda and Associated Movements Team Lead for the Ameri- can Enterprise Institute’s Critical Threats Project. Her work has focused on al Qaeda’s affiliates in the Gulf of Aden region and associated movements in western and northern Africa. She specializes in the Yemen-based group, al Qaeda in the Arabian Peninsula, and al Qaeda’s affiliate in Somalia, al Shabaab. Zimmerman has testified in front of Congress and briefed Members and congressional staff, as well as members of the defense community. She has written analyses of U.S. national security interests related to the threat from the al Qaeda network for the Weekly Standard, National Review Online, and the Huffington Post, among others. Acknowledgments The ideas presented in this paper have been developed and refined over the course of many conversations with the research teams at the Institute for the Study of War and the American Enterprise Institute’s Critical Threats Project. The valuable insights and understandings of regional groups provided by these teams directly contributed to the final product, and I am very grateful to them for sharing their expertise with me. I would also like to express my deep gratitude to Dr. Kimberly Kagan and Jessica Lewis for dedicating their time to helping refine my intellectual under- standing of networks and to Danielle Pletka, whose full support and effort helped shape the final product. -
White Lies: the Empty Signifier in White Supremacy and the Alt.Right
Chris Knight WHITE LIES: THE EMPTY SIGNIFIER IN WHITE SUPREMACY AND THE ALT.RIGHT The Phenomenology of Whiteness: A Genealogy e begin in darkness. The narrative of whiteness begins in a void, an Wabsence, and myth. In many creation myths, including Genesis and Hesiod’s Theogony, order is wrested from undifferentiated chaos and dark- ness, and order is imposed by a divine enlightenment, a god/monarch who creates light by fiat. “In the beginning . the earth was without form and void and darkness was on the face of the deep.” And by creating light, the god/monarch gives meaning and hierarchy to the world. Whiteness, when it is used to describe skin color, emerges in the language from the Dark Ages and from a multiplicity of ethnicities. A “white race” emerges into a proto- enlightenment and a proto-capitalism and into the uses of pigment. One way to deconstruct the notion of white supremacy is to parse the signification of the word “white.” In order to interrogate the politics of melanin we must confront what James Baldwin called “the lie that is whiteness.” We need to situate this signifier, this whiteness, in myth, ontology, aesthetics, metaphor, and ideology. In a more mundane physical description, white enters the world as light which is parsed by a prism that fractures white light into a spectrum – the colors of the rainbow. Each color of the spectrum vibrates on a different wavelength from infrared to ultraviolet. White and black have no wavelength. White contains and reflects all the colors; black absorbs all light and color.