Dod IG Projects by Category

Total Page:16

File Type:pdf, Size:1020Kb

Dod IG Projects by Category is report, as well as audit reports and testimony text, are available on the Internet at: www.dodig.mil Additional information and/or copies of this report may be obtained by contacting: Department of Defense Inspector General Office of Communications and Congressional Liaison 4800 Mark Center Drive Alexandria, VA 22350-1500 Mr. John R. Crane 703-604-8324; DSN 664-8324 Department of Defense Department of Defense Inspector General Inspector General 4800 Mark Center Drive 4800 Mark Center Drive Alexandria, VA 22350-1500 Alexandria, VA 22350-1500 www.dodig.mil www.dodig.mil Defense Hotline 1.800.424.9098 Defense Hotline 1.800.424.9098 INSPECTOR GENERAL DEPARTMENT OF DEFENSE 4800 MARK CENTER DRIVE ALEXANDRIA, VIRGINIA 22350-1500 I am pleased to present the Department of Defense Inspector General Semiannual Report to the Congress for the reporting period October 1, 2011 through March 31, 2012. We are dedicated to keeping the Secretary of Defense and Congress fully and currently informed about problems and defi ciencies within DoD in order to improve programs and operations. To this end, we detect and prevent fraud, waste, and abuse and promote economy, effi ciency, and eff ectiveness to help ensure the warfi ghter and DoD personnel are best equipped to achieve the critical mission of defending our country. Driven by our core values of integrity, effi ciency, accountability, and excellence, we conduct oversight which, in this reporting period, identifi ed defi ciencies in the areas of contract management, fi nancial reporting, and acquisition; information assurance, security and privacy; public corruption; health care fraud; whistleblower reprisal; senior offi cial misconduct; procurement fraud; and other issues aff ecting the Department. We issued 69 reports that identifi ed $90 million in potential monetary benefi ts during this reporting period. Investigations conducted by the Defense Criminal Investigative Service resulted in 61 arrests, 155 criminal charges, 87 criminal convictions, 103 suspensions, and 78 debarments, generating a return of $304 million to the U.S. government. Th e Defense Hotline handled 8,985 contacts. Acting Inspector General Lynne Halbrooks testifi es Th is issue highlights support we provide to the Department to include the Defense Hotline, before Congress. Contractor Disclosure Program, and Whistleblower Protection. Other agencies within the Defense oversight community also contributed to this report, and we thank our counterpart agencies, which include the Army Audit Agency, Naval Audit Service, Air Force Audit Agency, Army Criminal Investigation Command, Naval Criminal Investigative Service, Air Force Offi ce of Special Investigations, and the Defense Contract Audit Agency. We thank the soldiers, sailors, airmen, and Marines whose sacrifi ces for our Nation continue to motivate us to fulfi ll our mission. Finally, we thank Congress and the Department for their valuable and continued support in improving DoD operations and programs. Lynne M. Halbrooks Acting Inspector General STATISTICAL HIGHLIGHTS SUMMARY OF AUDIT ACTIVITIES Reports Issued 48 Monetary Benefits Recommendations Made on Funds Put to Better Use $90.2 million SUMMARY OF DEFENSE CRIMINAL INVESTIGATIVE SERVICE ACTIVITIES Total Returned to the U.S. Government1 $290.1 million Recovered Government Property $1.6 million Civil Judgments/Settlements $127.3 million Criminal Fines, Penalties, Restitution and Forfeitures $159.4 million Administrative Recoveries2 $1.7 million Investigative Cases Arrests 61 Charges 155 Convictions 87 Suspensions 103 Debarments 78 SUMMARY OF ADMINISTRATIVE INVESTIGATIONS Complaints Received 711 Complaints Closed 601 Senior Official 316 Whistleblower Reprisal 285 SUMMARY OF POLICY AND OVERSIGHT ACTIVITIES Existing and Proposed Regulations Reviewed 185 Evaluation Reports Issued 9 Inspector General Subpoenas Issued 280 SUMMARY OF INTELLIGENCE ACTIVITIES Intelligence and Special Program Assessment Reports Issued 4 SUMMARY OF SPECIAL PLANS AND OPERATIONS ACTIVITIES Assessment Reports Issued 6 SUMMARY OF DEFENSE HOTLINE ACTIVITIES Contacts 8,985 Cases Opened 1,398 Cases Closed 1,269 1 Includes investigations conducted jointly with other law enforcement organizations. 2 Includes contractual agreements and military non-judicial punishment. ii SEMIANNUAL REPORT TO THE CONGRESS CONTENTS 1. OVERVIEW MISSION & ORGANIZATION ............................................................................................................................................2 MISSION ...............................................................................................................................................................2 ORGANIZATION .................................................................................................................................................3 EXECUTIVE SUMMARY ........................................................................................................................................................4 OVERVIEW ...........................................................................................................................................................4 PRIORITIES ...........................................................................................................................................................4 CORE MISSION AREAS .....................................................................................................................................5 ENABLING MISSION AREAS ..........................................................................................................................6 OVERSEAS CONTINGENCY OPERATIONS .....................................................................................................................7 IG HIGHLIGHTS ......................................................................................................................................................................9 DEFENSE HOTLINE ............................................................................................................................................9 CONTRACTOR DISCLOSURE PROGRAM .................................................................................................10 DEPARTMENT OF DEFENSE WHISTLEBLOWER PROGRAM .............................................................12 2. CORE MISSION AREAS AUDITS .................................................................................................................................................................................. 16 ACQUISITION PROCESSES AND CONTRACT MANAGEMENT ..........................................................16 FINANCIAL MANAGEMENT .........................................................................................................................23 INFORMATION ASSURANCE, SECURITY AND PRIVACY .....................................................................28 JOINT WARFIGHTING AND READINESS ..................................................................................................29 NUCLEAR ENTERPRISE..................................................................................................................................31 INVESTIGATIONS ................................................................................................................................................................ 32 PROCUREMENT FRAUD ...............................................................................................................................32 PRODUCT SUBSTITUTION ...........................................................................................................................34 PUBLIC CORRUPTION ...................................................................................................................................34 HEALTH CARE FRAUD ...................................................................................................................................36 TECHNOLOGY PROTECTION ......................................................................................................................38 COMPUTER CRIME .........................................................................................................................................39 INSPECTIONS ...................................................................................................................................................................... 40 HEALTH AND SAFETY...................................................................................................................................... 40 JOINT WARFIGHTING AND READINESS.................................................................................................. 42 3. ENABLING MISSION AREAS DEFENSE HOTLINE ............................................................................................................................................................ 46 SENIOR OFFICIALS AND WHISTLEBLOWER PROTECTION ................................................................................... 48 CONGRESSIONAL TESTIMONY AND BRIEFINGS ..................................................................................................... 51 OUTREACH ACTIVITIES .................................................................................................................................................... 52 4. SERVICES ARMY ....................................................................................................................................................................................
Recommended publications
  • Framing 'Jihadjane'
    What’s Love Got To Do With It? Framing ‘JihadJane’ in the US Press Maura Conway Dublin City University, Ireland Lisa McInerney University of Limerick, Ireland Abstract The purpose of this article is to compare and contrast the US press coverage accorded to female terrorist plotter, Colleen LaRose, with that of two male terrorist plotters in order to test whether assertions in the academic literature regarding media treatment of women terrorists stand up to empirical scrutiny. The authors employed TextSTAT software to generate frequency counts of all words contained in 150 newspaper reports on their three subjects and then slotted relevant terms into categories fitting the commonest female terrorist frames, as identified by Nacos’s article in Studies in Conflict and Terrorism (2005). The authors’ findings confirm that women involved in terrorism receive significantly more press coverage and are framed vastly differently in the US press than their male counterparts. Keywords: female, framing, gender, jihadi, Colleen LaRose, newspapers, press, terrorism, women __________________________________________________________________________________ Introduction This article analyses US press reports on a woman and two men arrested in the US in 2009 and 2010 for their parts in three separate jihadi terrorist plots. The female plotter is widely known as ‘JihadJane’, which was an online pseudonym for Colleen LaRose, an American woman charged with four terrorism-related offences and taken into custody by US law enforcement at Philadelphia International Airport on her return from Europe in October 2009 (Shiffman, 2011).[1] LaRose is accused of using the internet to recruit individuals for the purpose of engaging in violent jihad, to include the murder of Swedish cartoonist Lars Vilks.
    [Show full text]
  • How Anwar Al-Awlaki Became the Face of Western Jihad
    As American as Apple Pie: How Anwar al-Awlaki Became the Face of Western Jihad Alexander Meleagrou-Hitchens Foreword by Lord Carlile of Berriew QC A policy report published by the International Centre for the Study of Radicalisation and Political Violence (ICSR) ABOUT ICSR The International Centre for the Study of Radicalisation and Political Violence (ICSR) is a unique partnership in which King’s College London, the University of Pennsylvania, the Interdisciplinary Center Herzliya (Israel), the Regional Center for Conflict Prevention Amman (Jordan) and Georgetown University are equal stakeholders. The aim and mission of ICSR is to bring together knowledge and leadership to counter the growth of radicalisation and political violence. For more information, please visit www.icsr.info. CONTACT DETAILS For questions, queries and additional copies of this report, please contact: ICSR King’s College London 138 –142 Strand London WC2R 1HH United Kingdom T. +44 (0)20 7848 2065 F. +44 (0)20 7848 2748 E. [email protected] Like all other ICSR publications, this report can be downloaded free of charge from the ICSR website at www.icsr.info. © ICSR 2011 AUTHOR’S NOTE This report contains many quotes from audio lectures as well as online forums and emails. All of these have been reproduced in their original syntax, including all spelling and grammatical errors. Contents Foreword 2 Letter of Support from START 3 Glossary of Terms 4 Executive Summary 6 Chapter 1 Introduction 9 Chapter 2 Methodology and Key Concepts 13 Social Movement Theory 13 Framing and
    [Show full text]
  • Download Legal Document
    Case 1:13-cv-03448-PKC-JMA Document 18 Filed 09/19/13 Page 1 of 4 PageID #: 103 THE CITY OF NEW YORK Peter G. Farrell MICHAEL A. CARDOZO LAW DEPARTMENT Senior Counsel Corporation Counsel I 00 CHURCH STREET Tel: (212) 356-3532 NEW YORK, NY I 0007 Fax: (212) 788-9776 September 19,2013 BYECF Honorable Pamela K. Chen United States District Judge United States District Court Eastern District ofNew York 225 Cadman Plaza East Brooklyn, New York 11201 Re: Raza et al v. City of New York et al, 13 Civ. 3448 (PKC)(JMA) Dear Judge Chen: I am a Senior Counsel in the office of Michael A. Cardozo, Corporation Counsel of the City of New York and submit this letter on behalf of defendants in response to plaintiffs' September 1ih letter. Plaintiffs request a pre-motion conference at which they intend to seek "expedited discovery" to support a future motion for a preliminary injunction. For the following reasons, plaintiffs' request should be denied. Plaintiffs' Late Request Belies Their Need for Expedited Discovery On September 10, 2013 (the day after filing their Answer), defendants wrote Magistrate Judge Joan M. Azrack to request that discovery be bifurcated to focus first on plaintiffs' individual claims before turning to the potentially massive and contentious Monell-related discovery. See attached letter dated September 10, 2013 (D.E. 11). Defendants advised the Court that at the conclusion of the first stage of discovery they intend to move for summary judgment. Magistrate Judge Azrack held a conference on September 12, 2013 and stated a decision would be forthcoming on defendants' request for bifurcated discovery.
    [Show full text]
  • 39 Terror Plots Foiled Since 9/11: Examining Counterterrorism's
    No. 2556 May 20, 2011 39 Terror Plots Foiled Since 9/11: Examining Counterterrorism’s Success Stories Jena Baker McNeill, James Jay Carafano, Ph.D., and Jessica Zuckerman Abstract: The Heritage Foundation began tracking foiled terror plots against the U.S. in 2007—counting at least 19 foiled plots since 9/11. Today, that count stands at 39 Talking Points plots against the U.S. foiled—thanks overwhelmingly to • Since the terrorist attacks of September 11, the Bush-era policies of enhanced information sharing 2001, at least 39 terror plots against the Unit- and intelligence gathering. Three Heritage national secu- ed States have been foiled. rity experts summarize the data, explain the lessons that • These successes, coupled with the death of Americans should learn from the anti-terror successes, and Osama bin Laden, serve as a reminder that delineate essential principles that American policymakers the war on terrorism is not over, and as a call should follow to continue to protect this country and its to focus on strategies that have made the citizens. nation a harder target for terrorism, while examining which reforms are still necessary. • Several lessons on how to stop terror plots Since the terrorist attacks of September 11, 2001, in their earliest stages can be extrapolated at least 39 terror plots against the United States have from the data. been foiled thanks to domestic and international coop- • Continuing America’s success in fighting ter- eration, as well as efforts to track down terror leads in rorism while preserving national prosperity local communities. Such a successful track record of and individual freedoms requires a dedica- preventing terror attacks should garner the attention tion by Congress and the executive branch of policymakers around the country as both Congress to risk-based security focused on informa- and the Administration wrestle with the difficult deci- tion sharing and intelligence gathering.
    [Show full text]
  • Carnage Interrupted: an Analysis of Fifteen Terrorist Plots Against Public Surface Transportation
    MTI Carnage Interrupted: Plots An Analysis Against Fifteen of Public Surface Terrorist Transportation Carnage Interrupted: An Analysis of Fifteen Terrorist Plots Against Funded by U.S. Department of Transportation and California Department of Transportation Public Surface Transportation MTI ReportMTI 11-20 MTI Report 11-20 April 2012 MINETA TRANSPORTATION INSTITUTE MTI FOUNDER Hon. Norman Y. Mineta The Norman Y. Mineta International Institute for Surface Transportation Policy Studies was established by Congress in the MTI BOARD OF TRUSTEES Intermodal Surface Transportation Efficiency Act of 1991 (ISTEA). The Institute’s Board of Trustees revised the name to Mineta Transportation Institute (MTI) in 1996. Reauthorized in 1998, MTI was selected by the U.S. Department of Transportation Honorary Chairman Joseph Boardman (Ex-Officio) John Horsley Michael S. Townes (TE 2011) through a competitive process in 2002 as a national “Center of Excellence.” The Institute is funded by Congress through the John L. Mica (Ex-Officio) Chief Executive Officer (Ex-Officio)* President/CEO (ret.) Amtrak Transportation District Commision of United States Department of Transportation’s Research and Innovative Technology Administration, the California Legislature Chair Executive Director House Transportation and American Association of State Hampton Roads through the Department of Transportation (Caltrans), and by private grants and donations. Infrastructure Committee Donald H. Camph (TE 2012) Highway and Transportation Officials House of Representatives President (AASHTO) David L. Turney* (TE 2012) California Institute for Technology Chairman, President & CEO The Institute receives oversight from an internationally respected Board of Trustees whose members represent all major surface Honorary Co-Chair, Honorable Exchange Will Kempton (TE 2012) Digital Recorders, Inc.
    [Show full text]
  • SIGINT for Anyone
    THE ORIGINS OF AMERICA’S JIHADISTS THE ORIGINS OF AMERICA’S About This Perspective The U.S. homeland faces a multilayered threat from terrorist organizations. Homegrown jihadists account for most of the terrorist activity in the United States since 9/11. Efforts by jihadist terrorist organizations to inspire terrorist attacks in the United States have thus far yielded meager results. No American jihadist group has emerged to sustain a terrorist campaign, and there is no evidence of an active jihadist underground to support a continuing terrorist holy war. The United States has invested significant resources in THE ORIGINS OF preventing terrorist attacks, and authorities have been able to uncover and thwart most of the terrorist plots. This Perspective identifies 86 plots to carry out terrorist attacks and 22 actual attacks since 9/11 involving 178 planners and perpetrators. Eighty-seven percent of those planners and perpetrators had long residencies in the United States. Only four of them had come to the United States illegally, all as minors. Nationality is a poor predictor of later terrorist activity, and vetting people coming to the United States, no matter how rigorous, cannot identify those who radicalize here. Determining whether a young teenager might, more than 12 years later, turn out to be a jihadist AMERICA’S terrorist would require the bureaucratic equivalent of divine foresight. Jenkins JIHADISTS Brian Michael Jenkins $21.00 ISBN-10 0-8330-9949-3 ISBN-13 978-0-8330-9949-5 52100 C O R P O R A T I O N www.rand.org Perspective EXPERT INSIGHTS ON A TIMELY POLICY ISSUE C O R P O R A T I O N 9 780833 099495 R PE-251-RC (2017) barcode_template_CC15.indd 1 10/17/17 12:00 PM Contents Summary of Key Judgments ..................................................................................1 The Origins of America’s Jihadists .........................................................................3 Appendix .............................................................................................................
    [Show full text]
  • Finding a Balance U.S
    Finding a Balance U.S. Security Interests and the Arab Awakening Matthew Levitt, Editor Policy Focus 119 | May 2012 Counterterrorism Lectures Volume 5 Finding a Balance U.S. Security Interests and the Arab Awakening Matthew Levitt, Editor Policy Focus 119 | May 2012 All rights reserved. Printed in the United States of America. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. © 2012 by The Washington Institute for Near East Policy Published in 2012 in the United States of America by the Washington Institute for Near East Policy, 1828 L Street NW, Suite 1050, Washington, DC 20036. Front cover: Relatives and supporters of Egyptian cleric Sheikh Omar Abdel-Rahman shout slogans and call for his release in front of the U.S. embassy in Cairo. (Reuters/Amr Dalsh) Contents Contributors v Acknowledgments vii Introduction 1 Matthew Levitt Director, Stein Program on Counterterrorism and Intelligence, The Washington Institute Treasury’s Response to the Arab Spring: The Role of Financial Tools in International Security Policy 8 Daniel L. Glaser Assistant Secretary for Terrorist Financing, Treasury Department Office of Terrorism and Financial Intelligence The State Department’s Role in Countering Violent Extremism 15 Richard LeBaron Coordinator of the Center for Strategic Counterterrorism Communications, State Department Intelligence Reform and Integration since 2011 19 David Shedd Deputy Director, Defense Intelligence Agency Ten Years after 9/11: Where We Were Then, Where We Are Now 26 Ali Soufan CEO, Soufan Group LLC Counterterrorism Operations in FBI Los Angeles: Collaboration and Teamwork 34 Steven L.
    [Show full text]
  • Compilation of Hearings on Islamist Radicalization—Volume I
    COMPILATION OF HEARINGS ON ISLAMIST RADICALIZATION—VOLUME I HEARINGS BEFORE THE COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED TWELFTH CONGRESS FIRST SESSION MARCH 10, JUNE 15, and JULY 27, 2011 Serial No. 112–9 Printed for the use of the Committee on Homeland Security Available via the World Wide Web: http://www.gpo.gov/fdsys/ COMPILATION OF HEARINGS ON ISLAMIST RADICALIZATION—VOLUME I COMPILATION OF HEARINGS ON ISLAMIST RADICALIZATION—VOLUME I HEARINGS BEFORE THE COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED TWELFTH CONGRESS FIRST SESSION MARCH 10, JUNE 15, and JULY 27, 2011 Serial No. 112–9 Printed for the use of the Committee on Homeland Security Available via the World Wide Web: http://www.gpo.gov/fdsys/ U.S. GOVERNMENT PRINTING OFFICE 72–541 PDF WASHINGTON : 2012 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2250 Mail: Stop SSOP, Washington, DC 20402–0001 COMMITTEE ON HOMELAND SECURITY PETER T. KING, New York, Chairman LAMAR SMITH, Texas BENNIE G. THOMPSON, Mississippi DANIEL E. LUNGREN, California LORETTA SANCHEZ, California MIKE ROGERS, Alabama SHEILA JACKSON LEE, Texas MICHAEL T. MCCAUL, Texas HENRY CUELLAR, Texas GUS M. BILIRAKIS, Florida YVETTE D. CLARKE, New York PAUL C. BROUN, Georgia LAURA RICHARDSON, California CANDICE S. MILLER, Michigan DANNY K. DAVIS, Illinois TIM WALBERG, Michigan BRIAN HIGGINS, New York CHIP CRAVAACK, Minnesota JACKIE SPEIER, California JOE WALSH, Illinois CEDRIC L. RICHMOND, Louisiana PATRICK MEEHAN, Pennsylvania HANSEN CLARKE, Michigan BEN QUAYLE, Arizona WILLIAM R.
    [Show full text]
  • American Jihadist Terrorism: Combating a Complex Threat
    American Jihadist Terrorism: Combating a Complex Threat Jerome P. Bjelopera Specialist in Organized Crime and Terrorism January 23, 2013 Congressional Research Service 7-5700 www.crs.gov R41416 CRS Report for Congress Prepared for Members and Committees of Congress American Jihadist Terrorism: Combating a Complex Threat Summary This report describes homegrown violent jihadists and the plots and attacks that have occurred since 9/11. For this report, “homegrown” describes terrorist activity or plots perpetrated within the United States or abroad by American citizens, legal permanent residents, or visitors radicalized largely within the United States. The term “jihadist” describes radicalized individuals using Islam as an ideological and/or religious justification for their belief in the establishment of a global caliphate, or jurisdiction governed by a Muslim civil and religious leader known as a caliph. The term “violent jihadist” characterizes jihadists who have made the jump to illegally supporting, plotting, or directly engaging in violent terrorist activity. The report also discusses the radicalization process and the forces driving violent extremist activity. It analyzes post-9/11 domestic jihadist terrorism and describes law enforcement and intelligence efforts to combat terrorism and the challenges associated with those efforts. Appendix A provides details about each of the post-9/11 homegrown jihadist terrorist plots and attacks. There is an “executive summary” at the beginning that summarizes the report’s findings. Congressional
    [Show full text]
  • Homegrown Terrorism”—Extremist Violence Perpetrated by U.S
    Homeland Security & Counterterrorism Program Transnational Threats Project AQAM FUTURES PROJECT Case Study Number 7 CaSE STUDY SERIES april 2012 project directors aqam futures project Rick “Ozzie” Nelson HOMEGROWN Thomas M. Sanderson about the authors TERRORISM by Ally Pregulman and Emily Burke ally pregulman was a re- searcher with the CSIS Home- land Security and Counterter- rorism Program. She received Executive Summary a BA in international affairs from the George Washington Incidents of “homegrown terrorism”—extremist violence perpetrated by U.S. University and is currently citizens or legal U.S. residents, and linked to or inspired by al Qaeda’s brand of studying for an MA in secu- radical Sunni Islamism—have increased in the aggregate since 9/11.1 Home- rity studies at Georgetown grown extremists, as defined in the CSIS report A Threat Transformed: Al Qa- University’s School of Foreign eda and Associated Movements in 2011, are “radicalized groups and individuals Service. that are not regularly affiliated with, but draw clear inspiration and occasional emily burke was a researcher guidance from, al Qaeda core or affiliated movements.”2 A growing number with the CSIS Homeland Se- of Muslims—both naturalized citizens and American-born—have communi- curity and Counterterrorism cated with extremists who are linked to al Qaeda and Associated Movements Program. She is a graduate of (AQAM), have sought terrorist training, or have attempted to carry out attacks the University of Maryland and either inside the United States or abroad. While not official members of al Qa- received a BA in government eda or its affiliates, these individuals and small groups have been influenced by and politics, as well as history.
    [Show full text]
  • The South Asia Press Freedom Report 2019-20
    STATES OF CONTROL: COVID, CUTS AND IMPUNITY SOUTH ASIA PRESS FREEDOM REPORT 2019-2020 18TH ANNUAL SOUTH ASIA PRESS FREEDOM REPORT 2019-2020 2 IFJ PRESS FREEDOM REPORT 2019–2020 3 Cover Photo: AFP photographer Sajjad Hussain works near India Gate during a government-imposed CONTENTS nationwide lockdown as a preventive measure against the spread of the Covid-19 in New Delhi on April 9, This document has been produced 2020. The Indian government’s by the International Federation of response to Covid-19 has led to Journalists (IFJ) on behalf of the controls on media and journalists South Asia Media Solidarity Network being denied access to public interest FOREWORD 4 (SAMSN). information. Afghan Independent Journalists’ Association Contents Photo: Journalists in Kashmir Bangladesh Manobadhikar Sangbadik use a cramped, makeshift media OVERVIEW 5 Forum centre during the internet shutdown to Federation of Nepali Journalists file stories. Free Media Movement, Sri Lanka UNESCO is pleased to support the SPECIAL SECTIONS Indian Journalists’ Union South-Asia Press Freedom Report Journalists Association of Bhutan 2019-20 with limited financial Maldives Journalists’ Association assistance. However, since this report THE PANDEMIC AND 9 Media Development Forum Maldives has been independently developed THE PRESS National Union of Journalists, India by the International Federation of National Union of Journalists, Nepal Journalists, Asia Pacific, therefore, Nepal Press Union UNESCO has no influence over DIGITAL CONTROL 12 Pakistan Federal Union of Journalists the content. The author(s) will be Sri Lanka Working Journalists’ responsible for the choice and the SWITCHED OFF 16 Association presentation of the facts contained in the paper and for the opinions South Asia Media Solidarity Network expressed therein, which will not be (SAMSN) – Defending rights of necessarily those of UNESCO and do COUNTRY CHAPTERS journalists and freedom of expression in not commit the Organisation.
    [Show full text]
  • The American Terrorist
    Terry Oroszi, EdD Boonshoft School of Medicine, WSU Intelligence Analysis Career Training Program, WSARC The Dayton Think Tank, Dayton, OH Briefing: This research identifies the attributes of an American terrorist by studying the patterns within 34 demographic variables and exploring their correlation with the motivation to commit crimes related to terrorism. We believe that such an understanding will help to halt the recruitment of American citizens by instructing concerned parents, coaches, teachers, and family members how to quickly identify a person that is susceptible to radicalization and how to intervene. Studies conducted 20 years ago have identified some markers by examining international terrorists: single, male, early 20’s, university education, and from an affluent middle or upper-class family (Russell, 1977; Jenkins, 1980, Dingley, 1997). This study confirms the previous findings and expands upon them by examining 519 U.S. citizens convicted of crimes related to terrorism. Additional characteristics scrutinized include the location of residence, crime and imprisonment, religion, organizational alliances, race, heritage and path to citizenship, field of study and occupation, social status, military experience, mental health, marriage and family, conviction, punishment, and target. We endeavor to continue identifying the common traits of terrorists and the social circumstances that render a person susceptible to radicalization and prime them to commit acts of terrorism. By creating a well-sourced and researched list of behaviors we offer methods for community-based curbing of radicalization. Briefing: This research identifies the attributes of an American terrorist by studying the patterns within 34 demographic variables and exploring their correlation with the motivation to commit crimes related to terrorism.
    [Show full text]