Revisiting Al-Qa`Ida's Anthrax Program

Total Page:16

File Type:pdf, Size:1020Kb

Revisiting Al-Qa`Ida's Anthrax Program MAY 2009 . VOL 2 . ISSUE 5 Revisiting Al-Qa`ida’s This article outlines al-Qa`ida’s known as “al-Zabadi” (“Yogurt”), with justifications for using weapons of a budget of only $2,000 to $4,000. Anthrax Program mass destruction (WMD), provides `Atif and Ayman al-Zawahiri started background information on the first and the program in May 1999 after studying By René Pita and Rohan Gunaratna second phases of al-Qa`ida’s anthrax- different Western biomedical books based BW program, and then assesses and publications on the weapons.8 An since november 2008, a number whether it could begin a third phase. electronic message sent by al-Zawahiri of developments have occurred to `Atif dated April 15, 1999 stated: concerning al-Qa`ida’s biological WMD Justifications weapons (BW) program. On November Since Usama bin Ladin declared in I have read the majority of the 24, the Malaysian government released 1998 that the acquisition of WMD was book…[It] is undoubtedly useful. It from jail Yazid Sufaat, previously a “religious duty,” there have been emphasizes a number of important responsible for al-Qa`ida’s anthrax numerous statements indicating that facts, such as: program in Afghanistan. On February 2, jihadists are not restricted from using 2009, Abdallah al-Nafisi, identified as these weapons.5 In fact, they have a) The enemy started thinking a Kuwaiti “professor,” appeared on al- argued that it is justified as retaliation about these weapons before Jazira television promoting an anthrax for what they consider use of WMD WWI. Despite their extreme attack against the United States. “There by the United States and its allies danger, we only became aware of is no need for airplanes, conspiracies, in Afghanistan.6 Moreover, the al- them when the enemy drew our timings, and so on,” al-Nafisi reportedly Qa`ida structure that was formalized attention to them by repeatedly said. “One person, with the courage to in the early 1990s included a WMD expressing concerns that they can carry four pounds of anthrax, will go to Committee, a subcommittee under its be produced simply with easily the White House lawn, and will spread Military Committee, led by Ali Sayyid available materials… this ‘confetti’ all over them, and then Muhammad Mustafa al-Bakri (also will do these cries of joy. It will turn known as Abdul Aziz al-Masri). b) The destructive power of these 1 into a real ‘celebration.’” Compounding weapons is no less than that of matters, the police chief of Pakistan’s First Phase nuclear weapons. North-West Frontier Province (NWFP) After the beginning of U.S.-led military stated that some al-Qa`ida and Taliban operations in Afghanistan, one of c) A germ attack is often detected militants had “expertise in making the main discoveries that provided days after it occurs, which raises 2 biochemical weapons,” and in April information on al-Qa`ida’s BW program the number of victims. 2009 the Islamic State of Iraq said that was made by journalist Alan Cullison the mujahidin are “in great need” of of the Wall Street Journal.7 He purchased d) Defense against such weapons 3 chemical and biological warfare agents. two computers in Kabul that the seller is very difficult, particularly if These developments have raised claimed had been stolen from the office large quantities are used… concern about a possible reactivation of Muhammad `Atif (also known as Abu of al-Qa`ida’s anthrax program Hafs al-Masri), the head of al-Qa`ida’s I would like to emphasize what and demonstrate the importance of Military Committee. `Atif was killed by we previously discussed—that understanding the terrorist group’s prior a U.S. Predator airstrike in November looking for a specialist is the 4 attempts to obtain a BW capability. 2001 in Afghanistan. The computer fastest, safest, and cheapest contained documents that described al- way. Simultaneously, we should 1 Al-Nafisi said that “four pounds of anthrax—in a suit- Qa`ida’s attempts at starting a chemical conduct a search on our own… case this big—carried by a fighter through tunnels from and biological weapons program, Along these lines, the book guided Mexico into the U.S., are guaranteed to kill 330,000 me to a number of references that Americans within a single hour, if it is properly spread in 5 For an analysis of these statements, see René Pita, I am attaching [articles published population centers there.” The transcript can be read at “Assessing al-Qaeda’s Chemical Threat,” Athena Intelli- in Science, The Journal of Immunology www.memritv.org/clip_transcript/en/2027.htm. gence Journal 2:2 (2007): pp. 34-45; Sammy Salama and and The New England Journal of Medicine, 2 Muhammad Bilal, “Qaeda, Taliban Planning 9/11-like Edith Bursac, “Jihadist Capabilities and the Diffusion as well as the books Tomorrow’s Attacks in US, Europe: NWFP IG,” Daily Times, March of Knowledge,” in Gary Ackerman and Jeremy Tamsett Weapons, Peace or Pestilence and 31, 2009. eds., Jihadists and Weapons of Mass Destruction (Boca Ra- Chemical Warfare]. Perhaps you can 9 3 The transcript can be read at www.memri.org/bin/ar- ton, FL: CRC Press, 2009), pp. 101-128. find someone to obtain them… ticles.cgi?Page=archives&Area=sd&ID=SP232009. 6 This allegation is based on coalition forces using 4 See, for example, Mark Hosenball and Michael Isikoff, conventional weapons (e.g., missiles) that cause a large According to former CIA Director George “A Germ Warfare Guru Goes Free: Why did Malaysia number of casualties and destruction. For this reason, Tenet, al-Qa`ida became interested Release Al Qaeda’s Bioweapons Expert?” Newsweek, De- some jihadists argue that these weapons could be con- in WMD after Aum Shinrikyo’s 1995 10 cember 17, 2008. Also, members of the al-Wafa “charity” sidered WMD. See Pita, “Assessing al-Qaeda’s Chemical sarin attack on the Tokyo subway. organization linked to the anthrax program have been re- Threat.” Al-Zawahiri’s e-mail, however, stated leased recently from Guantanamo Bay. See Thomas Jos- 7 Alan Cullison and Andrew Higgins, “Files Found: A celyn, “Al-Qaeda’s Anthrax Scientist,” Weekly Standard, Computer in Kabul Yields a Chilling Array of al Qaeda 8 Ibid. December 12, 2008; William Glaberson, “U.S. Decides Memos,” Wall Street Journal, December 31, 2001; Alan 9 Quoted in Cullison, “Inside al-Qaeda’s Hard Drive.” to Release Detainee at Guantánamo,” New York Times, Cullison, “Inside al-Qaeda’s Hard Drive,” Atlantic Month- 10 George Tenet, At the Center of the Storm: My Years at the March 31, 2009. ly, September 2004. CIA (New York: HarperCollins, 2007), p. 260. MAY 2009 . VOL 2 . ISSUE 5 that it was “the enemy” who brought training camp.16 These documents Second Phase BW to his attention, possibly by U.S. included letters addressed to al-Zawahiri Rauf’s letters indicate that he was Secretary of Defense William Cohen.11 from a person who was later identified incapable of obtaining the pathogenic In November 1997, Cohen appeared on as a Pakistani doctor in microbiology, strain of B. anthracis or the anthrax television showing a five pound sugar Abdur Rauf Ahmed. Rauf worked in vaccines, and that he did not have package and saying that if it were to the Pakistan Council of Scientific and adequate financial resources. In contain spores of Bacillus anthracis—the Industrial Research (PCSIR).17 The first 2000, al-Zawahiri, unhappy with etiological agent of anthrax—and letter was written in Europe in 1999. Rauf’s results and attitude, dispensed spread over Washington, D.C., half its In it, Rauf claimed to have attended or with his services,21 thereby initiating population would die.12 A photograph obtained information on a conference the second stage of al-Qa`ida’s BW of Cohen holding the five pound sugar on biological agents that took place in program. As part of this stage, al- package was allegedly also found in Europe and to have visited a biosafety Qa`ida attempted to benefit from its Afghanistan.13 level three laboratory (apparently in the relationship with Jemaah Islamiya (JI), United Kingdom) where efforts were a terrorist organization in Southeast A subsequent message dated June 1999 being made to obtain a pathogenic strain Asia with which al-Qa`ida’s leaders in insisted on the need to find qualified of B. anthracis and anthrax vaccines.18 Afghanistan stayed in contact by means personnel for the BW program in Finally, he assessed the expenditure of Khalid Shaykh Muhammad (KSM), educational institutions. This seems required to purchase the material for the mastermind of the 9/11 attacks.22 to be the strategy followed with the a laboratory and complained about the KSM declared before a military court collaboration of Saud Memon (allegedly scarce financial resources available to at Guantanamo Bay on March 10, 2007 involved in Daniel Pearl’s assassination him. that he was involved in al-Qa`ida’s and who died in May 2007 in BW program after Muhammad `Atif’s Pakistan) whose search for qualified In a second letter (whose pages have death.23 KSM was arrested on March microbiologists focused on Pakistani the Society for Applied Microbiology 1, 2003 in Rawalpindi at the house of scientists. Documents retrieved letterhead), Rauf explained his scant Pakistani microbiologist Abdul Quddoos from the Kabul house of a Pakistani achievements in the start-up of the Khan, and in subsequent interrogation nuclear scientist, Sultan Bashiruddin program with B. anthracis. He claimed sessions explained that there was a B. Mahmood, included diagrams of what to have been unable to obtain neither anthracis program for which Yazid Sufaat, seemed to be a plan to disseminate B.
Recommended publications
  • Butcher, W. Scott
    The Association for Diplomatic Studies and Training Foreign Affairs Oral History Project WILLIAM SCOTT BUTCHER Interviewed by: David Reuther Initial interview date: December 23, 2010 Copyright 2015 ADST TABLE OF CONTENTS Background Born in Dayton, Ohio, December 12, 1942 Stamp collecting and reading Inspiring high school teacher Cincinnati World Affairs Council BA in Government-Foreign Affairs Oxford, Ohio, Miami University 1960–1964 Participated in student government Modest awareness of Vietnam Beginning of civil rights awareness MA in International Affairs John Hopkins School of Advanced International Studies 1964–1966 Entered the Foreign Service May 1965 Took the written exam Cincinnati, September 1963 Took the oral examination Columbus, November 1963 Took leave of absence to finish Johns Hopkins program Entered 73rd A-100 Class June 1966 Rangoon, Burma, Country—Rotational Officer 1967-1969 Burmese language training Traveling to Burma, being introduced to Asian sights and sounds Duties as General Services Officer Duties as Consular Officer Burmese anti-Indian immigration policies Anti-Chinese riots Ambassador Henry Byroade Comment on condition of embassy building Staff recreation Benefits of a small embassy 1 Major Japanese presence Comparing ambassadors Byroade and Hummel Dhaka, Pakistan—Political Officer 1969-1971 Traveling to Consulate General Dhaka Political duties and mission staff Comment on condition of embassy building USG focus was humanitarian and economic development Official and unofficial travels and colleagues November
    [Show full text]
  • IIIS Discussion Paper No. 211 the British Joint Intelligence Committee
    Institute for International Integration Studies IIIS Discussion Paper No.211 / March 2007 The British Joint Intelligence Committee and Ireland, 1965-1972 Eunan O’Halpin Centre for Contemporary Irish History Trinity College Dublin IIIS Discussion Paper No. 211 The British Joint Intelligence Committee and Ireland, 1965-1972 Eunan O’Halpin Disclaimer Any opinions expressed here are those of the author(s) and not those of the IIIS. All works posted here are owned and copyrighted by the author(s). Papers may only be downloaded for personal use only. IIIS Discussion Paper No. 211 The British Joint Intelligence Committee and Ireland, 1965-1972 Eunan O’Halpin Disclaimer Any opinions expressed here are those of the author(s) and not those of the IIIS. All works posted here are owned and copyrighted by the author(s). Papers may only be downloaded for personal use only. The British Joint Intelligence Committee and Ireland, 1965-1972 Eunan O’Halpin Centre for Contemporary Irish History Trinity College Dublin 3/8/2007\\Iiissan\iiismanagement\Discussion Paper Series B\Eunan O' Halpin\211\JICpaperIIIS.doc10:36 AM 2 This paper discusses the performance of the British Joint Intelligence Committee (JIC) in anticipating and assessing the dangers posed to British interests by instability in Ireland between 1965 and 1972, and in setting the parameters within which intelligence operations to counter terrorism were mounted. It concentrates on the performance of the central intelligence assessment machinery of British government, not on the politics of Anglo-Irish relations.1 It explores the performance of the JIC, at least as revealed by the redacted material available in the public archives, in terms of intelligence organization and intelligence failure.
    [Show full text]
  • Jihadism: Online Discourses and Representations
    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-ND 4.0 1 Studying Jihadism 2 3 4 5 6 Volume 2 7 8 9 10 11 Edited by Rüdiger Lohlker 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 The volumes of this series are peer-reviewed. 37 38 Editorial Board: Farhad Khosrokhavar (Paris), Hans Kippenberg 39 (Erfurt), Alex P. Schmid (Vienna), Roberto Tottoli (Naples) 40 41 Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-ND 4.0 1 Rüdiger Lohlker (ed.) 2 3 4 5 6 7 Jihadism: Online Discourses and 8 9 Representations 10 11 12 13 14 15 16 17 With many figures 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 & 37 V R unipress 38 39 Vienna University Press 40 41 Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-ND 4.0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 Bibliographic information published by the Deutsche Nationalbibliothek The Deutsche Nationalbibliothek lists this publication in the Deutsche Nationalbibliografie; 24 detailed bibliographic data are available online: http://dnb.d-nb.de.
    [Show full text]
  • Counter Terrorist Trends and Analysis Volume 6, Issue 1 Jan/Feb 2014
    Counter Terrorist Trends and Analysis Volume 6, Issue 1 Jan/Feb 2014 Annual Threat Assessment SOUTHEAST ASIA Myanmar, Thailand, Indonesia, Philippines, Malaysia and Singapore SOUTH ASIA Afghanistan, Pakistan, India, Bangladesh and Sri Lanka EAST AND CENTRAL ASIA China and Central Asia MIDDLE EAST AND AFRICA Syria, Iraq, Yemen, Egypt, Libya and Somalia INTERNATIONAL CENTER FOR POLITICAL VIOLENCE AND TERRORISM RESEARCH S. RAJARATNAM SCHOOL OF INTERNATIONAL STUDIES NANYANG TECHNOLOGICAL UNIVERSITY 2 ANNUAL THREAT ASSESSMENT Terrorism and Political Violence in 2013 Southeast Asia peace talks were held in January 2014. Iraq, too, remains besieged by sectarian violence and constant attacks. In Yemen, Southeast Asia has seen some of its insurgencies and conflicts multiple insurgencies and a robust threat from Al Qaeda in the diminish while others have continued unabated. In Thailand, the Arabian Peninsula have hampered an already difficult political restive south continued to see violence in 2013 while Bangkok transition. In Egypt, Morsi’s ouster has seen protests continuing witnessed a political crisis with protests against the government to plague the country while the military attempts another turning violent. In Myanmar, reforms have moved forward but political transition. Libya, meanwhile, faces a persistent security communal violence continues to plague the country and has challenge in its southern border region and the success of its evolved from targeting Rohingyas towards Muslim minority transition after Gaddafi will depend on the militias which communities in general. Indonesia continues to face a potent deposed the former dictator giving up their arms. In Somalia, threat from radicalization and concern has emerged over the al-Shabaab has intensified its campaign against the role its “hard” counterterrorist approach is playing in fueling government in the wake of a hardline faction emerging further extremism.
    [Show full text]
  • Terror-Financing in Pakistan
    1/2016 SOCIETY FOR POLICY STUDIES www.spsindia.in SPS Insight Terror-Financing in Pakistan Dr. Sanchita Bhattacharya Society for Policy Studies (SPS) J-1824, Chittaranjan Park, New Delhi E: [email protected] W: www.spsindia.in [TERROR-FINANCING IN PAKISTAN] February 2016 Terror-Financing in Pakistan The Indian sub-continent has been plagued by various terror and extremist outfits, tracing their route to Af-Pak region and the Mujahideen cause, which further escalated into the Kashmir dispute. It is interesting to note that while Pakistan is actively financing terror activities in other countries of the sub-continent, the State Bank of Pakistan (SBP) has been devising policies to curb the menace of fake currency in its own country. As part of its campaign “Rupay ko Pehchano,” the SBP is trying to curb fake currency circulation in Pakistan. In addition, the SBP has launched a mobile application to inspect and identify counterfeit currency. Earlier, on October 6, 2015, SBP had stated that the presence of counterfeit currency notes was an undeniable fact and primary responsibility to check their influx lies with law enforcement agencies. The SBP said it had adopted a three-pronged strategy: ensuring state-of-the-art security features in banknotes that are difficult to imitate; developing necessary capacity and infrastructure with banks to ensure that genuine and authenticated bank notes issue are issued to the public; and creating awareness among the general public. The problem of terror funding is not only crippling the economy of the sub-continent but financial fraud has become an important constituent of terrorism.
    [Show full text]
  • CTC Sentinel 2(5)
    MAY 2009 . VOL 2 . ISSUE 5 COMBATING TERRORISM CENTER AT WEST POINT CTC SENTINel OBJECTIVE . RELEVANT . RIGOROUS Contents Comparing the U.S. and Soviet FEATURE ARTICLE Experiences in Afghanistan 1 Comparing the U.S. and Soviet By Bruce Riedel Experiences in Afghanistan By Bruce Riedel REPORTS 4 Quetta: The Headquarters of the Afghan Taliban By Mukhtar A. Khan 7 Examining Saudi Arabia’s 85 Most Wanted List By Christopher Boucek 10 Revisiting Al-Qa`ida’s Anthrax Program By René Pita and Rohan Gunaratna 14 The Limits of Iranian Influence Among Gulf Shi`a By Laurence Louër 17 The Funding Methods of Bangladeshi Terrorist Groups By Paul Cochrane 20 Avoiding Suicide Terrorism in Bangladesh By Ryan Clarke and Shafqat Munir Soldiers with the 101st Division Special Troops Battalion, 101st Airborne. - Photo Courtesy of the U.S. Army 23 Recent Highlights in Terrorist Activity 28 CTC Sentinel Staff & Contacts country rarely fights the United States is fighting a Taliban- the same war twice in one led insurgency in Afghanistan that generation, especially from operates from a safe haven in Pakistan. opposite sides. Yet that Many suggest that the outcome will be Ain many ways describes the U.S. role the same for the United States as it was in Afghanistan today. In the 1980s, for the Soviet Union—ultimate defeat at the Central Intelligence Agency, the hands of the insurgency. Pakistan’s working from a safe haven in Pakistan, role as a safe haven is remarkably engineered the largest covert operation consistent in both conflicts, but focusing About the CTC Sentinel in its history to help defeat the Soviet exclusively on that similarity misses th 1 The Combating Terrorism Center is an 40 Red Army in Afghanistan.
    [Show full text]
  • 9/11 Report”), July 2, 2004, Pp
    Final FM.1pp 7/17/04 5:25 PM Page i THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page v CONTENTS List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— ...in the Law Enforcement Community 73 3.3 . and in the Federal Aviation Administration 82 3.4 . and in the Intelligence Community 86 v Final FM.1pp 7/17/04 5:25 PM Page vi 3.5 . and in the State Department and the Defense Department 93 3.6 . and in the White House 98 3.7 . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis:August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5.
    [Show full text]
  • Historical Dictionary of Air Intelligence
    Historical Dictionaries of Intelligence and Counterintelligence Jon Woronoff, Series Editor 1. British Intelligence, by Nigel West, 2005. 2. United States Intelligence, by Michael A. Turner, 2006. 3. Israeli Intelligence, by Ephraim Kahana, 2006. 4. International Intelligence, by Nigel West, 2006. 5. Russian and Soviet Intelligence, by Robert W. Pringle, 2006. 6. Cold War Counterintelligence, by Nigel West, 2007. 7. World War II Intelligence, by Nigel West, 2008. 8. Sexspionage, by Nigel West, 2009. 9. Air Intelligence, by Glenmore S. Trenear-Harvey, 2009. Historical Dictionary of Air Intelligence Glenmore S. Trenear-Harvey Historical Dictionaries of Intelligence and Counterintelligence, No. 9 The Scarecrow Press, Inc. Lanham, Maryland • Toronto • Plymouth, UK 2009 SCARECROW PRESS, INC. Published in the United States of America by Scarecrow Press, Inc. A wholly owned subsidiary of The Rowman & Littlefield Publishing Group, Inc. 4501 Forbes Boulevard, Suite 200, Lanham, Maryland 20706 www.scarecrowpress.com Estover Road Plymouth PL6 7PY United Kingdom Copyright © 2009 by Glenmore S. Trenear-Harvey All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior permission of the publisher. British Library Cataloguing in Publication Information Available Library of Congress Cataloging-in-Publication Data Trenear-Harvey, Glenmore S., 1940– Historical dictionary of air intelligence / Glenmore S. Trenear-Harvey. p. cm. — (Historical dictionaries of intelligence and counterintelligence ; no. 9) Includes bibliographical references. ISBN-13: 978-0-8108-5982-1 (cloth : alk. paper) ISBN-10: 0-8108-5982-3 (cloth : alk. paper) ISBN-13: 978-0-8108-6294-4 (eBook) ISBN-10: 0-8108-6294-8 (eBook) 1.
    [Show full text]
  • East Asia Overview
    East Asia Overview The capture by Thai authorities in August of top Jemaah Islamiya (JI) leader and al-Qaida’s representative in Southeast Asia, Nurjaman Riduan bin Isomuddin (a.k.a. Hambali) was a signifi cant victory in the global war on terrorism. Hambali, an Indonesian, was captured at an apartment complex in Ayutthaya, Thailand, and is suspected of masterminding numerous terrorist attacks in Southeast Asia, including the Christmas Eve church bombings in 2000 in Indonesia (19 dead, 47 wounded); the bombings on 30 December 2000 in metro Manila, Philippines (22 dead); the Bali © AFP attacks on 12 October 2002 (202 dead, more than US Coordinator for Counterterrorism Cofer Black speaks 330 wounded); and possibly the J.W. Marriott Hotel with reporters in Hanoi. Ambassador Black was in Hanoi bombing on 5 August 2003 in Jakarta (12 dead, to participate in an ASEAN meeting on counterterrorism over 150 wounded). Furthermore, Hambali was key measures, 13 June 2003. in planning terrorist attacks with multiple targets in Singapore, disrupted in December 2001, and in Although most indigenous terrorist and Muslim planning Thailand attacks that were disrupted in separatist groups in Indonesia, Malaysia, the May 2003. Hambali’s capture and detention serves southern Philippines, and Thailand share an as a major blow to both JI and al-Qaida. ideology and general rejection of Western infl uence held by international Islamic terrorists, they are In 2003, as Hambali’s capture illustrates, it focused primarily on effecting change within became clearer that the Asia-Pacifi c region, their home countries. Many leaders of Southeast primarily Southeast Asia, is an attractive theater Asian groups fought or claim to have fought in of support and logistics for al-Qaida and a theater Afghanistan in the “Jihad” and brought back of operations for the regional terrorist group critical skills and contacts—along with burnished Jemaah Islamiya, acting alone or in collaboration extremist credentials.
    [Show full text]
  • US Authorities Claim
    SE C RE T // NOFORNI I 2O3II2O8 DEPARTMENTOF DEFENSE HEADQUARTERS,JOINT TASK FORCEGUANTANAMO U.S. NAVAL STATION,GUANTANAMO BAY, CUBA APO AE 09360 JTF-GTMO-CDR 8 December 2006 MEMORANDUM FOR Commander,United StatesSouthern Command, 3511 NW glst Avenue. Miami,FL33172 SUBJECT: CombatantStatus Review Tribunal Input and Recommendationfor Continued DetentionUnder DoD Control (CD) for GuantanamoDetainee, ISN: US9KU-010024DP(S) JTF-GTMO DetaineeAssessment 1. (S/NF) PersonalInformation: o JDIMSA{DRC ReferenceName: Khalid Shaykh Muhammad o Aliases and Current/True Name: Mukhtar al-Baluchi" The Brain. Ashraf Refaat Nabith Hen. Khalid Abdul Wadud. Salim Ali. FahdBin Abdallah Bin Khalid. Abdul Rahman Abdullah Faqasial-Ghamdi o Placeof Birth: Baluchistan"Pakistan (PK) o Date of Birth: 14 April 1965 . Citizenship: Pakistan o InternmentSerial Number (ISN): US9KU-010024DP 2. (U//FOUO) Health: Detaineeis in good health. 3. (S/NF) JTF-GTMO Assessment: a. (S) Recommendation: JTF-GTMO recommendsthis detaineefor ContinuedDetention Under DoD Control (CD). b. (S//NF) Executive Summary: Detaineeis assessedto be a senioral-Qaida recruiter, financier, and operationalplanner for al-Qaida's global terrorist network. Detaineewas the mastermindof the 11 September200I terrorist attackson the World Trade Center,the Pentagon,and the hijacking of United Airlines flight 93 that crashedin Pennsylvania. CLASSIFIEDBY: MULTIPLESOURCES REASON: E.O.12958, AS AMENDED,SECTION 1.4(C) DECLASSIFYON: 20311208 S E C RE T // NOFORNI I 2O3II2O8 Downloaded from The Rendition Project www.therenditionproject.org.uk S E C R E T // NOFORN I I 2O3II2O8 JTF-GTMO-CDR SUBJECT: CombatantStatus Review Tribunal Input and Recommendationfor Continued DetentionUnder DoD Control (CD) for GuantanamoDetainee, ISN: US9KU-010024DP(S) Detaineedescribed himself as the headof al-Qaida'smilitary committee.' Jtp-GtVtO has determinedthis detaineeto be: o A HIGH risk, as he is likely to posea threatto the US, its interestsand allies.
    [Show full text]
  • Countering Violent Extremism the Counter Narrative Study
    ! COUNTERING VIOLENT EXTREMISM THE COUNTER NARRATIVE STUDY “Countering the Narratives of Violent Extremism FOREWORD The Achilles’ heel of our strategy against terrorism and violent extremism has been the failure to counter the narratives that groups use to recruit. As long as groups attract a steady stream of new members, the terrorism and violence will continue. This is why the strategy known as Countering Violent Extremism (CVE) is so important, and must be used as a counterterrorism tool alongside military, intelligence, and law enforcement operations. Through our partnership with the Qatar International Academy for Security Studies (QIASS), we offer critical guidance to those wishing to counter the narratives of violence and extremism. “Countering Violent Extremism: The Counter-Narrative Study” is the result of a year- long research project conducted by our team of former top law enforcement, intelligence, and counterterrorism officials. We traveled around the world, from Malaysia to Kenya to Norway to Northern Ireland to the United States, studying extremist and terrorist groups and interviewing their members, as well as those in government and other important stakeholders responsible for tackling the problem. As you will see from our “Findings,” we’ve put together some essential lessons. One of the most important takeaways is understanding the pattern(s) behind group recruitment. Terrorist and extremist groups first prey on local grievances—exploiting feelings of anger, humiliation, resentment, or lack of purpose. They then incorporate, into their violent pronouncements, conspiratorial messages that blame those they are targeting. Self-proclaimed religious groups use distorted religious edicts in their narratives. Recruiters achieve success by providing both answers and a sense of purpose to vulnerable individuals.
    [Show full text]
  • Indo-Pacific
    INDO-PACIFIC Malaysia Weighs Releasing 9/11-Linked Terrorist from Prison OE Watch Commentary: In December 2001, Malaysian militant Yazid Sufaat was arrested for his alleged involvement with al-Qaeda and links to the September 11, 2001 attacks in the United States. A former biochemistry student in the US, he was tasked with developing anthrax as a bio-terror weapon for al-Qaeda and was an explosives expert for Southeast Asia-based Jemaa Islamiya, a group responsible for a series of large attacks in Indonesia. According to the first excerpted article in the Malaysian Berita Haria [Daily News], Malaysia is now facing the prospect of Sufaat being released from prison. However, the government is examining whether his detention should be extended and whether his release will foment terrorism in the country. According to the article, Malaysia has a Terrorism Prevention Board, which will be reviewing Sufaat’s case and deciding whether he may be released. It will need to determine whether he is fully recovered and deradicalized. Given the difficulty of this type of examination, the article notes the Board recognizes the evaluation will need to be thorough. If Sufaat no longer holds his previous views and is no longer a threat to the public, according to Malaysia’s former chief of police, “there is nothing immoral about releasing Sufaat.” The article also demonstrates that this case is unique insofar as the Terrorism Prevention Act under which Sufaat has been detained was previously used to detain Communists in the country, but only until even Communists recanted their ideology. Now the same Act is being used in a new era and the Sufaat case is the first major test.
    [Show full text]