US Government Protection of Al-Qaeda Terrorists and the US- Saudi Black Hole 米政府によるアルカイダ擁護と米・サウジアラビ アのブラックホール

Total Page:16

File Type:pdf, Size:1020Kb

US Government Protection of Al-Qaeda Terrorists and the US- Saudi Black Hole 米政府によるアルカイダ擁護と米・サウジアラビ アのブラックホール Volume 11 | Issue 29 | Number 1 | Article ID 3971 | Jul 28, 2013 The Asia-Pacific Journal | Japan Focus US Government Protection of Al-Qaeda Terrorists and the US- Saudi Black Hole 米政府によるアルカイダ擁護と米・サウジアラビ アのブラックホール Peter Dale Scott and suspected Islamic terrorists, to any incipient protest movement that might challenge the policies of the American war For almost two centuries American machine. government, though always imperfect, was also a model for the world of limited government, Americans have by and large not questioned having evolved a system of restraints on this parallel government, accepting that executive power through its constitutional sacrifices of traditional rights and traditional arrangement of checks and balances. transparency are necessary to keep us safe from al-Qaeda attacks. However secret power Since 9/11 however, constitutional practices is unchecked power, and experience of the last have been overshadowed by a series of century has only reinforced the truth of Lord emergency measures to fight terrorism. The latter have mushroomed in size, reach and Acton’s famous dictum that unchecked power budget, while traditional government has always corrupts. It is time to consider the shrunk. As a result we have today what the extent to which American secret agencies have journalist Dana Priest has called twodeveloped a symbiotic relationship with the governments: the one its citizens were familiar forces they are supposed to be fighting – and with, operated more or less in the open: the have even on occasion intervened to let al- other a parallel top secret government whose Qaeda terrorists proceed with their plots. parts had mushroomed in less than a decade into a gigantic, sprawling universe of its own, “Intervened to let al-Qaeda terrorists proceed visible to only a carefully vetted cadre – and its with their plots”? These words as I write them entirety…visible only to God.1 make me wonder yet again, as I so often do, if I am not losing my marbles, and proving myself More and more, it is becoming common to say to be no more than a zany “conspiracy that America, like Turkey before it, now has theorist.” Yet I have to remind myself that my what Marc Ambinder and John Tirman have claim is not one coming from theory, but rests called a deep state behind the public one.2 And on certain undisputed facts about incidents that this parallel government is guided inare true even though they have been surveillance matters by its own Foreignsystematically suppressed or under-reported in Intelligence Surveillance Court, known as the the American mainstream media. FISA court, which according to the New York Times, “has quietly become almost a parallel More telling, I am describing a phenomenon Supreme Court.”3 Thanks largely to Edward that occurred not just once, but consistently, Snowden, it is now clear that the FISA Court almost predictably. We shall see that, among has permitted this deep state to expand the al-Qaeda terrorists who were first protected surveillance beyond the tiny number of known and then continued their activities were 1 11 | 29 | 1 APJ | JF 1) Ali Mohamed, identified in the Gorelick), one staff member 9/11 Commission Report (p. 68) as (Dietrich Snell) and one important the leader of the 1998 Nairobi witness (Patrick Fitzgerald) who Embassy bombing; earlier had figured among the terrorists’ protectors. 2) Mohammed Jamal Khalifa, Osama bin Laden’s close friend and financier, while in the In the course of writing this essay, I came to Philippines, of Ramzi Yousef another disturbing conclusion I had not (principal architect of the first anticipated. This is that a central feature of the WTC attack) and his uncle Khalid protection has been to defend the 9/11 Sheikh Mohammed; Commission’s false picture of al-Qaeda as an example of non-state terrorism, at odds with 3) Khalid Sheikh Mohammed, not just the CIA but also the royal families of identified in the 9/11 Commission Saudi Arabia and Qatar. In reality, as I shall Report (p. 145) as “the principal show, royal family protection from Qatar and architect of the 9/11 attacks.” Saudi Arabia (concealed by the 9/11 Commission) was repeatedly given to key 4) Khalid al-Mihdhar and Nawaf al- figures like Khalid Sheikh Mohammed, the Hazmi, two of the alleged 9/11 alleged “principal architect of the 9/11 hijackers, whose presence in the attacks.” United States was concealed from the FBI by CIA officers for months This finding totally undermines the claim that 4 the wars fought by America in Asia since 9/11 before 9/11. have been part of a global “war on terror.” On the contrary, the result of the wars has been to It might sound from these three citations as if establish a permanent U.S. military presence in the 9/11 Commission marked a new stage in the oil- and gas-rich regions of Central Asia, in the U.S. treatment of these terrorists, and that alliance with Saudi Arabia, Qatar, and Pakistan the Report now exposed those terrorists who in – the principal backers of the jihadi terrorist the past had been protected. On the contrary, a networks the U.S. has been supposedly principal purpose of my essay is to show that fighting. Meanwhile the most authentic opponents in the region of these Sunni jihadi terrorists – the governments of Iraq, Libya, 1) one purpose of protecting these Syria, and Iran – have been overthrown by U.S. individuals had been to protect a invasion or military support (in the case of Iraq valued intelligence connection (the and Libya) subverted with U.S. support (in the “Al-Qaeda connection” if you will); case of Syria), or sanctioned and threatened as part of an “axis of evil” (in the case of Iran). 2) one major intention of the 9/11 Commission Report was to The protection to terrorists described in this continue protecting this essay, in other words, has been sustained connection; partly in order to support the false premises that have underlain U.S. Asian wars for more 3) those on the 9/11 Commission than a decade. And the blame cannot be staff who were charged with this assigned all to the Saudis. Two months before protection included at least one 9/11, FBI counterterrorism expert John O’Neill commission member (Jamie described to the French journalist Jean-Charles 2 11 | 29 | 1 APJ | JF Brisard America’s “impotence” in getting help from Saudi Arabia concerning terrorist networks. The reason? In Brisard’s paraphrase, “Just one: the petroleum interests.”5 Former CIA officer Robert Baer voiced a similar complaint about the lobbying influence of “the Foreign Oil Companies Group, a cover for a cartel of major petroleum companies doing business in the Caspian. The deeper I got, the more Caspian oil money I found sloshing around Washington.”6 The decade of protection for terrorists demonstrates the power of this secretive dimension of the American deep state: the dark Ali Mohamed forces in our society responsible for protecting terrorists, over and above the parallelIn early 1993 a wanted Egyptian terrorist 7 government institutionalized on and after 9/11. named Essam Hafez Marzouk, a close ally of Although I cannot securely define these dark Osama bin Laden and Ayman al-Zawahiri, forces, I hope to demonstrate that they are arrived at Canada’s Vancouver Airport and was related to the black hole at the heart of the promptly detained by the Royal Canadian complex U.S-Saudi connection, a complex that Mounted Police (RCMP). A second terrorist involves oil majors like Exxon, the military named Mohamed Ali, “the primary U.S. coordination of oil and gas movements from the intelligence agent for Ayman al-Zawahiri and Persian Gulf and Central Asia, offsetting arms Osama bin Laden,” came from California to the sales, Saudi investments in major U.S.airport to meet him; and, not finding him, made corporations like Citibank and the Carlyle the mistake of asking about his friend at the Group, and above all the ultimate United States Vancouver airport customs office. As a result dependency on Saudi Arabia, Qatar, and OPEC, the RCMP interrogated Mohamed Ali for two 8 days, but finally released him, even though Ali for the defense of the petrodollar. had clearly come in order to smuggle a wanted 9 This deeper dimension of the deep state, terrorist into the United States. behind its institutional manifestation in our If the RCMP had detained Mohamed Ali, who parallel government, is a far greater threat was much bigger game than the first terrorist, than foreign terrorism to the preservation of hundreds of lives might have been saved. After U.S. democracy. being released, Ali went on to Nairobi, Kenya. There in December 1993 he and his team The FBI’s Intervention with the RCMP to photographed the U.S. Embassy, and then Release Ali Mohamed, 1993 delivered the photos to Osama bin Laden in Khartoum, leading to the Embassy bombing of Consider the FBI’s instruction in 1993 to the 1998.10 Ali later told an FBI agent that at some Canadian RCMP to release the al-Qaeda point he also trained al-Qaeda terrorists in how organizer Mohamed Ali, who then proceeded to to hijack airplanes using box cutters.11 Nairobi in the same year to begin planning the U.S. Embassy bombing of 1998. The RCMP release of Ali Mohamed was 3 11 | 29 | 1 APJ | JF unjustified, clearly had historic consequences, Nexis) the Vancouver release incident, well and may have contributed to 9/11. Yet the covered in Canada’s leading newspaperThe release was done for a bureaucratic reason: Ali Toronto Globe and Mail (December 22, 2001), Mohamed gave the RCMP the phone number of has never been mentioned inany major an FBI agent, John Zent, in the San Francisco American newspaper.
Recommended publications
  • New Data Unfolds in `Who Killed JFK?'
    New Data Unfolds in `Who Killed JFK?' he obvious problem with so Of course, for those more prone T many films, movies and docu- to tune in CBS than PBS, some mentary investigations of the Ken- this will be startling. Oswald's nedy assassination coming at us mother, Marguerite, is filmed lying that son Lee wasn't found to be this week is that the valuable stuff emotionally disturbed. Rether's gets lost in the avalanche. And the claim that CBS has proceeded with problem with missing the good its own investigation since i9Ki is work is that it is only in the past supported with fascinating tests. year that a truly meaningful inves- including showing marksmen hit- tigation of the epochal crime has ting a target simulation of the been possible. moving limo. Like "Frontline's" eventful re- CBS' report shows some class 1):) port Tuesday, "Who Was Lee Har- not mentioning that its weekend- vey Oswald?," CBS' "Who Killed long, commercial-free broadcast of JFK? The Final Chapter" (at 9 Kennedy's state funeral and burial tonight on Channels 2 and 8) marked a historic turning point in benefits from new access to KGB TV news journalism and for CBS in files and authorities, recently re. particular. It will come in for leased documents and a variety of strong criticism, howevel • in offer- articulate viewpoints--dominated ing the impression that all of the by Gerald Posner, whose new book key assassination conspiracy theo- debunking all conspiracy theories ries—was it the Mafia? the CIA? "Case Closed," is all the rage.
    [Show full text]
  • Sophistic Synthesis in JFK Assassination Rhetoric. 24P
    DOCUMENT RESUME ED 400 532 CS 215 483 AUTHOR Gilles, Roger TITLE Sophistic Synthesis in JFK Assassination Rhetoric. PUB DATE Apr 93 NOTE 24p.; Paper presented at the Annual Meeting of the Conference on College Composition and Communication (44th, San Diego, CA, April 1-3, 1993). PUB TYPE Reports Evaluative/Feasibility (142) Speeches /Conference Papers (150) Historical Materials (060) EDRS PRICE MF01/PC01 Plus Postage. DESCRIPTORS Higher Education; Historiography; Popular Culture; *Presidents of the United States; *Rhetorical Criticism; *Rhetorical Theory; *United States History IDENTIFIERS 1960s; *Assassinations; Classical Rhetoric; Garrison (Jim); *Kennedy (John F); Rhetorical Stance; Social Needs ABSTRACT The rhetoric surrounding the assassination of John F. Kennedy offers a unique testing ground for theories about the construction of knowledge in society. One dilemma, however, is the lack of academic theorizing about the assassination. The Kennedy assassination has been left almost exclusively in the hands of "nonhistorians," i.e., politicians, filmmakers, and novelists. Their struggle to reach consensus is an opportunity to consider recent issues in rhetorical theory, issues of knowledge and belief, argument and narrative, history and myth. In "Rereading the Sophists: Classical Rhetoric Refigured," Susan C. Jarratt uses the sophists and their focus on "nomos" to propose "an alternative analytic to the mythos/logos antithesis" characteristic of more Aristotelian forms of rhetorical analysis. Two basic features of sophistic historiography interest Jarratt: (1) the use of narrative structures along with or opposed to argumentative structures; and (2) the rhetorical focus on history to creative broad cultural meaning in the present rather than irrefutable fact,about the past. Jarratt's book lends itself to a 2-part reading of Jim Garrison's "On the Trail of the Assassins"--a rational or Aristotelian reading and a nomos-driven or myth-making reading.
    [Show full text]
  • Surprise, Intelligence Failure, and Mass Casualty Terrorism
    SURPRISE, INTELLIGENCE FAILURE, AND MASS CASUALTY TERRORISM by Thomas E. Copeland B.A. Political Science, Geneva College, 1991 M.P.I.A., University of Pittsburgh, 1992 Submitted to the Graduate Faculty of The Graduate School of Public and International Affairs in partial fulfillment of the requirements for the degree of Doctor of Philosophy University of Pittsburgh 2006 UNIVERSITY OF PITTSBURGH FACULTY OF ARTS AND SCIENCES This dissertation was presented by Thomas E. Copeland It was defended on April 12, 2006 and approved by Davis Bobrow, Ph.D. Donald Goldstein, Ph.D. Dennis Gormley Phil Williams, Ph.D. Dissertation Director ii © 2006 Thomas E. Copeland iii SURPRISE, INTELLIGENCE FAILURE, AND MASS CASUALTY TERRORISM Thomas E. Copeland, PhD University of Pittsburgh, 2006 This study aims to evaluate whether surprise and intelligence failure leading to mass casualty terrorism are inevitable. It explores the extent to which four factors – failures of public policy leadership, analytical challenges, organizational obstacles, and the inherent problems of warning information – contribute to intelligence failure. This study applies existing theories of surprise and intelligence failure to case studies of five mass casualty terrorism incidents: World Trade Center 1993; Oklahoma City 1995; Khobar Towers 1996; East African Embassies 1998; and September 11, 2001. A structured, focused comparison of the cases is made using a set of thirteen probing questions based on the factors above. The study concludes that while all four factors were influential, failures of public policy leadership contributed directly to surprise. Psychological bias and poor threat assessments prohibited policy makers from anticipating or preventing attacks. Policy makers mistakenly continued to use a law enforcement approach to handling terrorism, and failed to provide adequate funding, guidance, and oversight of the intelligence community.
    [Show full text]
  • Central Intelligence Agency (CIA) Freedom of Information Act (FOIA) Case Log October 2000 - April 2002
    Description of document: Central Intelligence Agency (CIA) Freedom of Information Act (FOIA) Case Log October 2000 - April 2002 Requested date: 2002 Release date: 2003 Posted date: 08-February-2021 Source of document: Information and Privacy Coordinator Central Intelligence Agency Washington, DC 20505 Fax: 703-613-3007 Filing a FOIA Records Request Online The governmentattic.org web site (“the site”) is a First Amendment free speech web site and is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. 1 O ct 2000_30 April 2002 Creation Date Requester Last Name Case Subject 36802.28679 STRANEY TECHNOLOGICAL GROWTH OF INDIA; HONG KONG; CHINA AND WTO 36802.2992 CRAWFORD EIGHT DIFFERENT REQUESTS FOR REPORTS REGARDING CIA EMPLOYEES OR AGENTS 36802.43927 MONTAN EDWARD GRADY PARTIN 36802.44378 TAVAKOLI-NOURI STEPHEN FLACK GUNTHER 36810.54721 BISHOP SCIENCE OF IDENTITY FOUNDATION 36810.55028 KHEMANEY TI LEAF PRODUCTIONS, LTD.
    [Show full text]
  • The JFK Assassination and the Politics and Culture of Conspiracy Theory
    A Paranoid Style? : The JFK Assassination and the Politics and Culture of Conspiracy Theory Joseph Broadbent Degree of Masters of Arts by Research University of East Anglia School of American Studies January 2014 This copy of the thesis has been supplied on condition that anyone who consults it is understood to recognise that its copyright rests with the author and that use of any information derived there from must be in accordance with current UK Copyright Law. In addition, any quotation or extract must include full attribution. 2 Abstract This thesis analyses the phenomenon of conspiracy theory, using the assassination of President John F. Kennedy as a case study. Doubt is the root cause of conspiracy theory, stemming from both the innate biases all humans exhibit, and a traumatic experience – in this case the assassination of JFK. This thesis argues that conspiracy theories are created and take hold because of a predisposition toward conspiracy theory, a misinterpretation of a central piece of evidence, such as the Zapruder film, and agency panic, where dispossession causes one to feel as if their agency is under threat. Conspiracy theory can provide believers with many emotions which appear to the individual to not be available elsewhere, namely closure, comfort, control, and a sense of leisure. Using the assassination of JFK, this thesis examines the role of conspiracy theory in modern American society. It weighs up the benefits of conspiracy theory, such as it is an example of free speech and it can aid transparency, with the negatives: that it can possibly cause harm to its adherents and their dependants because of a belief in ends justifying the means.
    [Show full text]
  • 1/ 6 --12/ 2A3 M O B T O W N BEAT and a Teenage Oswald Together at A
    which drew heavily from Posner's work), and Texas School Book Depository. Previously, Case Closing? their conclusion, as Newsweek declared confi- only a palm print on the barrel of the rifle was dently, was that 'the Warren Commission was identified positively as Oswald's; conspiracy probably right.' In other words--go home, thinkers maintained that Dallas police could As Media Rush to Final folks, there's nothing to see here. have planted the print. Faint fingerprints on The eagerness to line up behind case closers the rifle's trigger guard could not be seen dear- Judgment on JFK such as Posner may be in part a backlash to the ly enough to use for identification purposes, Assassinologists Brace conspiracy frenzy that followed the release of until a former Dallas police officer named .* Oliver Stone's 1991 film, JFK But there seems Rusty Livingstone recently remembered that he Last Stand to be a very real need in the media to use the had a set of original photographs of the trigger- 30th anniversary to put the story to rest once guard prints in his closet—they'd been there In the midst of all the television hoopla sur- and for all. An air of finality pervaded all the for 30 years. rounding the 30th anniversary of the JFK assas- TV movies and special reports that littered the Vincent Scalice, former head of the New sination last week, the PBS series Frontline network schedules last week. York City Police Department's latent finger- aired an exhaustive three-hour documentary (9 Even Gerald Posner himself is a little sur- print unit, reexamined the photos (in 1978, p.m., November 16) dissecting the life and prised by all the attention he's getting.
    [Show full text]
  • Al Qaeda Finances and Funding to Affiliated Groups
    Al Qaeda Finances and Funding to Affiliated Groups Strategic Insights, Volume IV, Issue 1 (January 2005) by Victor Comras Strategic Insights is a monthly electronic journal produced by the Center for Contemporary Conflict at the Naval Postgraduate School in Monterey, California. The views expressed here are those of the author(s) and do not necessarily represent the views of NPS, the Department of Defense, or the U.S. Government. For a PDF version of this article, click here. This paper provides a case study of al Qaeda finances and funding to affiliated groups. It is based in large part on my observations and experience as one of five international monitors charged by the UN Security Council to oversee the effectiveness of the measures adopted by the Security Council against al Qaeda and the Taliban. Some of the material in this paper is drawn directly from the five reports our monitoring group made to the Security Council during my tenure.. Considerable mystery and intrigue still surrounds the al Qaeda terrorist network and its sources of funding. We know more today than we did three years ago about its financial tools and structure, but we still have not identified much of its sources of supply and funding. And much of what we know may only be conjecture. The CIA has estimated, for example, that it cost Al Qaeda’ some $30 million a year to sustain itself during the period preceding 9/11, but the agency is still not sure what al Qaeda needs or expends today. And we still do not know with any precision just how much, and from whom, al Qaeda raises its money, or how it allocates it.[1] The roots of al Qaeda’s financial network, we believe, trace back directly to the extensive recruitment and financing networks established to support anti-Soviet jihad activities in Afghanistan.
    [Show full text]
  • 9-11 and Terrorist Travel- Full
    AND TERRORIST TRAVEL Staff Report of the National Commission on Terrorist Attacks Upon the United States 9/11 AND TERRORIST TRAVEL Staff Report of the National Commission on Terrorist Attacks Upon the United States By Thomas R. Eldridge Susan Ginsburg Walter T. Hempel II Janice L. Kephart Kelly Moore and Joanne M. Accolla, Staff Assistant Alice Falk, Editor Note from the Executive Director The Commission staff organized its work around specialized studies, or monographs, prepared by each of the teams. We used some of the evolving draft material for these studies in preparing the seventeen staff statements delivered in conjunction with the Commission’s 2004 public hearings. We used more of this material in preparing draft sections of the Commission’s final report. Some of the specialized staff work, while not appropriate for inclusion in the report, nonetheless offered substantial information or analysis that was not well represented in the Commission’s report. In a few cases this supplemental work could be prepared to a publishable standard, either in an unclassified or classified form, before the Commission expired. This study is on immigration, border security and terrorist travel issues. It was prepared principally by Thomas Eldridge, Susan Ginsburg, Walter T. Hempel II, Janice Kephart, and Kelly Moore, with assistance from Joanne Accolla, and editing assistance from Alice Falk. As in all staff studies, they often relied on work done by their colleagues. This is a study by Commission staff. While the Commissioners have been briefed on the work and have had the opportunity to review earlier drafts of some of this work, they have not approved this text and it does not necessarily reflect their views.
    [Show full text]
  • The Inventory of the Gerald Posner Collection #1684
    The Inventory of the Gerald Posner Collection #1684 Howard Gotlieb Archival Research Center Posner, Gerald #1684 3/29/05 Preliminary Listing I. Research Materials. Box 1 A. Re: HITLER=S CHILDREN: SONS AND DAUGHTERS OF LEADERS OF THE THIRD REICH TALK ABOUT THEMSELVES AND THEIR FATHERS; files may include printed material, manuscripts, photographs, notes, proofs, interview transcripts. 1. AAssorted Kids,@ includes printed material and manuscript notes. [F. 1] 2. ADagmar Complaint.@ 3. ADanitz.@ 4. ADrexel.@ 5. AGeneral.@ [F. 2] 6. AGoring.@ 7. ALarry=s Draft.@ 8. ANazi Letters Received.@ [F. 3] 9. ANazi Letters Sent.@ 10. ANiklas Frank.@ [F. 4] 11. APhotos.@ 12. ARolf Mengele.@ 13. ASaur.@ 14. ASaur@ (continued). [F. 5] 15. ASchacht.@ 16. AScheer.@ 17. AStauffenberg.@ 18. ATax Forms.@ 19. ATranslators.@ [F. 6] 20. AWolf.@ 21. AWolf Hen.@ 22. Untitled, re: Random House and Nazis; includes photographs. [F. 7] 23. Untitled, re: corrections for manuscript. [F. 8] 24. Untitled, re: photographs. [F. 9, E. 1] 25. Transcript of interview with unidentified Nazi prisoner. [F. 10] 26. Photocopies of personal records of Karl Haushofer, and Albrecht Haushofer; includes letter to GP, 7/12/90. 27. Miscellaneous articles re: Nazis. B. Re: KILLING THE DREAM: JAMES EARL RAY AND THE ASSASSINATION OF MARTIN LUTHER KING JR.; files may include printed material, correspondence, photographs, interview Posner, Gerald (3/29/05) transcripts.[Note: JER = James Earl Ray; MPD = Memphis Police Department; NYT = New York Times] Box 2 1. AAcknowledgments.@ [F. 1] 2. AAds.@ 3. AAG Report Post-Pub. News,@ includes sub-file: AAG Report.@ 4. AAG Talk With Huie.@ 5. AAliases,@ includes sub-files: a.
    [Show full text]
  • How Anwar Al-Awlaki Became the Face of Western Jihad
    As American as Apple Pie: How Anwar al-Awlaki Became the Face of Western Jihad Alexander Meleagrou-Hitchens Foreword by Lord Carlile of Berriew QC A policy report published by the International Centre for the Study of Radicalisation and Political Violence (ICSR) ABOUT ICSR The International Centre for the Study of Radicalisation and Political Violence (ICSR) is a unique partnership in which King’s College London, the University of Pennsylvania, the Interdisciplinary Center Herzliya (Israel), the Regional Center for Conflict Prevention Amman (Jordan) and Georgetown University are equal stakeholders. The aim and mission of ICSR is to bring together knowledge and leadership to counter the growth of radicalisation and political violence. For more information, please visit www.icsr.info. CONTACT DETAILS For questions, queries and additional copies of this report, please contact: ICSR King’s College London 138 –142 Strand London WC2R 1HH United Kingdom T. +44 (0)20 7848 2065 F. +44 (0)20 7848 2748 E. [email protected] Like all other ICSR publications, this report can be downloaded free of charge from the ICSR website at www.icsr.info. © ICSR 2011 AUTHOR’S NOTE This report contains many quotes from audio lectures as well as online forums and emails. All of these have been reproduced in their original syntax, including all spelling and grammatical errors. Contents Foreword 2 Letter of Support from START 3 Glossary of Terms 4 Executive Summary 6 Chapter 1 Introduction 9 Chapter 2 Methodology and Key Concepts 13 Social Movement Theory 13 Framing and
    [Show full text]
  • Tablet Magazine 9/4/10 2:35 PM
    Tablet Magazine 9/4/10 2:35 PM Tablet Magazine is a project of Nextbook Inc. About Us | Contact | Terms of Service | First Blood Was Meir Kahane’s murder al-Qaida’s earliest attack on U.S. soil? BY PETER LANCE | Sep 1, 2010 7:00 AM Last fall I received a cryptic email from Emad Salem, the ex-Egyptian Army major who was the FBI’s first undercover asset in what would become known as the war on terror. I’d told Salem’s remarkable story in my last three books, which were critical of the bureau’s counterterrorism record. Because I had treated him fairly, Salem reached out to me after years in the Federal Witness Protection Program. We made plans to meet in early November, after a lecture I was giving at New York University. But Salem didn’t show. I went back to my hotel that night and had chalked it up as a lost opportunity. The phone rang at 2 in the morning. It was Salem, summoning me to a meeting outside 26 Federal Plaza, the building that houses the FBI’s New York office. Very cloak and dagger, but that’s how this man rolls. You don’t infiltrate the cell responsible for the 1993 World Trade Center bombing without practicing a little Meir Kahane and the web of jihadists. tradecraft. Anyway, when my cab pulled in to Foley Square a few minutes later, Salem was standing in the shadows. CREDIT: Len Small/Tablet Magazine That was the start of a series of interviews that led to some astonishing revelations about two of the most infamous al-Qaida murders since Osama Bin Laden formed his terror network.
    [Show full text]
  • Backgrounder January 2013
    Center for Immigration Studies Backgrounder January 2013 Upholding the Value of Our Citizenship National Security Threats Should Be Denaturalized By W.D. Reasoner Executive Summary This paper examines the surprising number of naturalized citizens who have been charged and convicted of serious national security crimes — including terrorism, espionage, and theft of sensitive information and technology — in the last several years. It compares the relative ease with which aliens naturalize with the extreme difficulty in stripping them of citizenship, even when they prove to be national security threats who have gamed the system. It also discusses the fact that the federal government, and the Department of Homeland Security in particular, have no systematic method of examining such cases to establish a baseline of “lessons learned” to attempt to weed out future threats, nor make any significant effort to denaturalize individuals even after they have committed serious national security offenses of the type described. It recommends that if the government will not or cannot take better care to prevent the admission of individuals who are serious threats to our safety, then it must move more aggressively to reverse its mistakes and strip citizenship from those who commit national security crimes against our nation. Key findings include: • In the past decade, dozens of naturalized U.S. citizens have been arrested and charged with a variety of serious national security-related offenses involving terrorism, spying, and theft of sensitive information and technology. • The federal government almost never revokes the citizenship of these naturalized citizens, even when it is clear that they concealed material facts regarding their extreme ideas or associations with terrorist groups or foreign intelligence organizations at the time they naturalized.
    [Show full text]