Revisiting Al-Qa`Ida's Anthrax Program
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Butcher, W. Scott
The Association for Diplomatic Studies and Training Foreign Affairs Oral History Project WILLIAM SCOTT BUTCHER Interviewed by: David Reuther Initial interview date: December 23, 2010 Copyright 2015 ADST TABLE OF CONTENTS Background Born in Dayton, Ohio, December 12, 1942 Stamp collecting and reading Inspiring high school teacher Cincinnati World Affairs Council BA in Government-Foreign Affairs Oxford, Ohio, Miami University 1960–1964 Participated in student government Modest awareness of Vietnam Beginning of civil rights awareness MA in International Affairs John Hopkins School of Advanced International Studies 1964–1966 Entered the Foreign Service May 1965 Took the written exam Cincinnati, September 1963 Took the oral examination Columbus, November 1963 Took leave of absence to finish Johns Hopkins program Entered 73rd A-100 Class June 1966 Rangoon, Burma, Country—Rotational Officer 1967-1969 Burmese language training Traveling to Burma, being introduced to Asian sights and sounds Duties as General Services Officer Duties as Consular Officer Burmese anti-Indian immigration policies Anti-Chinese riots Ambassador Henry Byroade Comment on condition of embassy building Staff recreation Benefits of a small embassy 1 Major Japanese presence Comparing ambassadors Byroade and Hummel Dhaka, Pakistan—Political Officer 1969-1971 Traveling to Consulate General Dhaka Political duties and mission staff Comment on condition of embassy building USG focus was humanitarian and economic development Official and unofficial travels and colleagues November -
IIIS Discussion Paper No. 211 the British Joint Intelligence Committee
Institute for International Integration Studies IIIS Discussion Paper No.211 / March 2007 The British Joint Intelligence Committee and Ireland, 1965-1972 Eunan O’Halpin Centre for Contemporary Irish History Trinity College Dublin IIIS Discussion Paper No. 211 The British Joint Intelligence Committee and Ireland, 1965-1972 Eunan O’Halpin Disclaimer Any opinions expressed here are those of the author(s) and not those of the IIIS. All works posted here are owned and copyrighted by the author(s). Papers may only be downloaded for personal use only. IIIS Discussion Paper No. 211 The British Joint Intelligence Committee and Ireland, 1965-1972 Eunan O’Halpin Disclaimer Any opinions expressed here are those of the author(s) and not those of the IIIS. All works posted here are owned and copyrighted by the author(s). Papers may only be downloaded for personal use only. The British Joint Intelligence Committee and Ireland, 1965-1972 Eunan O’Halpin Centre for Contemporary Irish History Trinity College Dublin 3/8/2007\\Iiissan\iiismanagement\Discussion Paper Series B\Eunan O' Halpin\211\JICpaperIIIS.doc10:36 AM 2 This paper discusses the performance of the British Joint Intelligence Committee (JIC) in anticipating and assessing the dangers posed to British interests by instability in Ireland between 1965 and 1972, and in setting the parameters within which intelligence operations to counter terrorism were mounted. It concentrates on the performance of the central intelligence assessment machinery of British government, not on the politics of Anglo-Irish relations.1 It explores the performance of the JIC, at least as revealed by the redacted material available in the public archives, in terms of intelligence organization and intelligence failure. -
Jihadism: Online Discourses and Representations
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-ND 4.0 1 Studying Jihadism 2 3 4 5 6 Volume 2 7 8 9 10 11 Edited by Rüdiger Lohlker 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 The volumes of this series are peer-reviewed. 37 38 Editorial Board: Farhad Khosrokhavar (Paris), Hans Kippenberg 39 (Erfurt), Alex P. Schmid (Vienna), Roberto Tottoli (Naples) 40 41 Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-ND 4.0 1 Rüdiger Lohlker (ed.) 2 3 4 5 6 7 Jihadism: Online Discourses and 8 9 Representations 10 11 12 13 14 15 16 17 With many figures 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 & 37 V R unipress 38 39 Vienna University Press 40 41 Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-ND 4.0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 Bibliographic information published by the Deutsche Nationalbibliothek The Deutsche Nationalbibliothek lists this publication in the Deutsche Nationalbibliografie; 24 detailed bibliographic data are available online: http://dnb.d-nb.de. -
Counter Terrorist Trends and Analysis Volume 6, Issue 1 Jan/Feb 2014
Counter Terrorist Trends and Analysis Volume 6, Issue 1 Jan/Feb 2014 Annual Threat Assessment SOUTHEAST ASIA Myanmar, Thailand, Indonesia, Philippines, Malaysia and Singapore SOUTH ASIA Afghanistan, Pakistan, India, Bangladesh and Sri Lanka EAST AND CENTRAL ASIA China and Central Asia MIDDLE EAST AND AFRICA Syria, Iraq, Yemen, Egypt, Libya and Somalia INTERNATIONAL CENTER FOR POLITICAL VIOLENCE AND TERRORISM RESEARCH S. RAJARATNAM SCHOOL OF INTERNATIONAL STUDIES NANYANG TECHNOLOGICAL UNIVERSITY 2 ANNUAL THREAT ASSESSMENT Terrorism and Political Violence in 2013 Southeast Asia peace talks were held in January 2014. Iraq, too, remains besieged by sectarian violence and constant attacks. In Yemen, Southeast Asia has seen some of its insurgencies and conflicts multiple insurgencies and a robust threat from Al Qaeda in the diminish while others have continued unabated. In Thailand, the Arabian Peninsula have hampered an already difficult political restive south continued to see violence in 2013 while Bangkok transition. In Egypt, Morsi’s ouster has seen protests continuing witnessed a political crisis with protests against the government to plague the country while the military attempts another turning violent. In Myanmar, reforms have moved forward but political transition. Libya, meanwhile, faces a persistent security communal violence continues to plague the country and has challenge in its southern border region and the success of its evolved from targeting Rohingyas towards Muslim minority transition after Gaddafi will depend on the militias which communities in general. Indonesia continues to face a potent deposed the former dictator giving up their arms. In Somalia, threat from radicalization and concern has emerged over the al-Shabaab has intensified its campaign against the role its “hard” counterterrorist approach is playing in fueling government in the wake of a hardline faction emerging further extremism. -
Terror-Financing in Pakistan
1/2016 SOCIETY FOR POLICY STUDIES www.spsindia.in SPS Insight Terror-Financing in Pakistan Dr. Sanchita Bhattacharya Society for Policy Studies (SPS) J-1824, Chittaranjan Park, New Delhi E: [email protected] W: www.spsindia.in [TERROR-FINANCING IN PAKISTAN] February 2016 Terror-Financing in Pakistan The Indian sub-continent has been plagued by various terror and extremist outfits, tracing their route to Af-Pak region and the Mujahideen cause, which further escalated into the Kashmir dispute. It is interesting to note that while Pakistan is actively financing terror activities in other countries of the sub-continent, the State Bank of Pakistan (SBP) has been devising policies to curb the menace of fake currency in its own country. As part of its campaign “Rupay ko Pehchano,” the SBP is trying to curb fake currency circulation in Pakistan. In addition, the SBP has launched a mobile application to inspect and identify counterfeit currency. Earlier, on October 6, 2015, SBP had stated that the presence of counterfeit currency notes was an undeniable fact and primary responsibility to check their influx lies with law enforcement agencies. The SBP said it had adopted a three-pronged strategy: ensuring state-of-the-art security features in banknotes that are difficult to imitate; developing necessary capacity and infrastructure with banks to ensure that genuine and authenticated bank notes issue are issued to the public; and creating awareness among the general public. The problem of terror funding is not only crippling the economy of the sub-continent but financial fraud has become an important constituent of terrorism. -
CTC Sentinel 2(5)
MAY 2009 . VOL 2 . ISSUE 5 COMBATING TERRORISM CENTER AT WEST POINT CTC SENTINel OBJECTIVE . RELEVANT . RIGOROUS Contents Comparing the U.S. and Soviet FEATURE ARTICLE Experiences in Afghanistan 1 Comparing the U.S. and Soviet By Bruce Riedel Experiences in Afghanistan By Bruce Riedel REPORTS 4 Quetta: The Headquarters of the Afghan Taliban By Mukhtar A. Khan 7 Examining Saudi Arabia’s 85 Most Wanted List By Christopher Boucek 10 Revisiting Al-Qa`ida’s Anthrax Program By René Pita and Rohan Gunaratna 14 The Limits of Iranian Influence Among Gulf Shi`a By Laurence Louër 17 The Funding Methods of Bangladeshi Terrorist Groups By Paul Cochrane 20 Avoiding Suicide Terrorism in Bangladesh By Ryan Clarke and Shafqat Munir Soldiers with the 101st Division Special Troops Battalion, 101st Airborne. - Photo Courtesy of the U.S. Army 23 Recent Highlights in Terrorist Activity 28 CTC Sentinel Staff & Contacts country rarely fights the United States is fighting a Taliban- the same war twice in one led insurgency in Afghanistan that generation, especially from operates from a safe haven in Pakistan. opposite sides. Yet that Many suggest that the outcome will be Ain many ways describes the U.S. role the same for the United States as it was in Afghanistan today. In the 1980s, for the Soviet Union—ultimate defeat at the Central Intelligence Agency, the hands of the insurgency. Pakistan’s working from a safe haven in Pakistan, role as a safe haven is remarkably engineered the largest covert operation consistent in both conflicts, but focusing About the CTC Sentinel in its history to help defeat the Soviet exclusively on that similarity misses th 1 The Combating Terrorism Center is an 40 Red Army in Afghanistan. -
9/11 Report”), July 2, 2004, Pp
Final FM.1pp 7/17/04 5:25 PM Page i THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page v CONTENTS List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— ...in the Law Enforcement Community 73 3.3 . and in the Federal Aviation Administration 82 3.4 . and in the Intelligence Community 86 v Final FM.1pp 7/17/04 5:25 PM Page vi 3.5 . and in the State Department and the Defense Department 93 3.6 . and in the White House 98 3.7 . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis:August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5. -
Historical Dictionary of Air Intelligence
Historical Dictionaries of Intelligence and Counterintelligence Jon Woronoff, Series Editor 1. British Intelligence, by Nigel West, 2005. 2. United States Intelligence, by Michael A. Turner, 2006. 3. Israeli Intelligence, by Ephraim Kahana, 2006. 4. International Intelligence, by Nigel West, 2006. 5. Russian and Soviet Intelligence, by Robert W. Pringle, 2006. 6. Cold War Counterintelligence, by Nigel West, 2007. 7. World War II Intelligence, by Nigel West, 2008. 8. Sexspionage, by Nigel West, 2009. 9. Air Intelligence, by Glenmore S. Trenear-Harvey, 2009. Historical Dictionary of Air Intelligence Glenmore S. Trenear-Harvey Historical Dictionaries of Intelligence and Counterintelligence, No. 9 The Scarecrow Press, Inc. Lanham, Maryland • Toronto • Plymouth, UK 2009 SCARECROW PRESS, INC. Published in the United States of America by Scarecrow Press, Inc. A wholly owned subsidiary of The Rowman & Littlefield Publishing Group, Inc. 4501 Forbes Boulevard, Suite 200, Lanham, Maryland 20706 www.scarecrowpress.com Estover Road Plymouth PL6 7PY United Kingdom Copyright © 2009 by Glenmore S. Trenear-Harvey All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior permission of the publisher. British Library Cataloguing in Publication Information Available Library of Congress Cataloging-in-Publication Data Trenear-Harvey, Glenmore S., 1940– Historical dictionary of air intelligence / Glenmore S. Trenear-Harvey. p. cm. — (Historical dictionaries of intelligence and counterintelligence ; no. 9) Includes bibliographical references. ISBN-13: 978-0-8108-5982-1 (cloth : alk. paper) ISBN-10: 0-8108-5982-3 (cloth : alk. paper) ISBN-13: 978-0-8108-6294-4 (eBook) ISBN-10: 0-8108-6294-8 (eBook) 1. -
East Asia Overview
East Asia Overview The capture by Thai authorities in August of top Jemaah Islamiya (JI) leader and al-Qaida’s representative in Southeast Asia, Nurjaman Riduan bin Isomuddin (a.k.a. Hambali) was a signifi cant victory in the global war on terrorism. Hambali, an Indonesian, was captured at an apartment complex in Ayutthaya, Thailand, and is suspected of masterminding numerous terrorist attacks in Southeast Asia, including the Christmas Eve church bombings in 2000 in Indonesia (19 dead, 47 wounded); the bombings on 30 December 2000 in metro Manila, Philippines (22 dead); the Bali © AFP attacks on 12 October 2002 (202 dead, more than US Coordinator for Counterterrorism Cofer Black speaks 330 wounded); and possibly the J.W. Marriott Hotel with reporters in Hanoi. Ambassador Black was in Hanoi bombing on 5 August 2003 in Jakarta (12 dead, to participate in an ASEAN meeting on counterterrorism over 150 wounded). Furthermore, Hambali was key measures, 13 June 2003. in planning terrorist attacks with multiple targets in Singapore, disrupted in December 2001, and in Although most indigenous terrorist and Muslim planning Thailand attacks that were disrupted in separatist groups in Indonesia, Malaysia, the May 2003. Hambali’s capture and detention serves southern Philippines, and Thailand share an as a major blow to both JI and al-Qaida. ideology and general rejection of Western infl uence held by international Islamic terrorists, they are In 2003, as Hambali’s capture illustrates, it focused primarily on effecting change within became clearer that the Asia-Pacifi c region, their home countries. Many leaders of Southeast primarily Southeast Asia, is an attractive theater Asian groups fought or claim to have fought in of support and logistics for al-Qaida and a theater Afghanistan in the “Jihad” and brought back of operations for the regional terrorist group critical skills and contacts—along with burnished Jemaah Islamiya, acting alone or in collaboration extremist credentials. -
US Authorities Claim
SE C RE T // NOFORNI I 2O3II2O8 DEPARTMENTOF DEFENSE HEADQUARTERS,JOINT TASK FORCEGUANTANAMO U.S. NAVAL STATION,GUANTANAMO BAY, CUBA APO AE 09360 JTF-GTMO-CDR 8 December 2006 MEMORANDUM FOR Commander,United StatesSouthern Command, 3511 NW glst Avenue. Miami,FL33172 SUBJECT: CombatantStatus Review Tribunal Input and Recommendationfor Continued DetentionUnder DoD Control (CD) for GuantanamoDetainee, ISN: US9KU-010024DP(S) JTF-GTMO DetaineeAssessment 1. (S/NF) PersonalInformation: o JDIMSA{DRC ReferenceName: Khalid Shaykh Muhammad o Aliases and Current/True Name: Mukhtar al-Baluchi" The Brain. Ashraf Refaat Nabith Hen. Khalid Abdul Wadud. Salim Ali. FahdBin Abdallah Bin Khalid. Abdul Rahman Abdullah Faqasial-Ghamdi o Placeof Birth: Baluchistan"Pakistan (PK) o Date of Birth: 14 April 1965 . Citizenship: Pakistan o InternmentSerial Number (ISN): US9KU-010024DP 2. (U//FOUO) Health: Detaineeis in good health. 3. (S/NF) JTF-GTMO Assessment: a. (S) Recommendation: JTF-GTMO recommendsthis detaineefor ContinuedDetention Under DoD Control (CD). b. (S//NF) Executive Summary: Detaineeis assessedto be a senioral-Qaida recruiter, financier, and operationalplanner for al-Qaida's global terrorist network. Detaineewas the mastermindof the 11 September200I terrorist attackson the World Trade Center,the Pentagon,and the hijacking of United Airlines flight 93 that crashedin Pennsylvania. CLASSIFIEDBY: MULTIPLESOURCES REASON: E.O.12958, AS AMENDED,SECTION 1.4(C) DECLASSIFYON: 20311208 S E C RE T // NOFORNI I 2O3II2O8 Downloaded from The Rendition Project www.therenditionproject.org.uk S E C R E T // NOFORN I I 2O3II2O8 JTF-GTMO-CDR SUBJECT: CombatantStatus Review Tribunal Input and Recommendationfor Continued DetentionUnder DoD Control (CD) for GuantanamoDetainee, ISN: US9KU-010024DP(S) Detaineedescribed himself as the headof al-Qaida'smilitary committee.' Jtp-GtVtO has determinedthis detaineeto be: o A HIGH risk, as he is likely to posea threatto the US, its interestsand allies. -
Countering Violent Extremism the Counter Narrative Study
! COUNTERING VIOLENT EXTREMISM THE COUNTER NARRATIVE STUDY “Countering the Narratives of Violent Extremism FOREWORD The Achilles’ heel of our strategy against terrorism and violent extremism has been the failure to counter the narratives that groups use to recruit. As long as groups attract a steady stream of new members, the terrorism and violence will continue. This is why the strategy known as Countering Violent Extremism (CVE) is so important, and must be used as a counterterrorism tool alongside military, intelligence, and law enforcement operations. Through our partnership with the Qatar International Academy for Security Studies (QIASS), we offer critical guidance to those wishing to counter the narratives of violence and extremism. “Countering Violent Extremism: The Counter-Narrative Study” is the result of a year- long research project conducted by our team of former top law enforcement, intelligence, and counterterrorism officials. We traveled around the world, from Malaysia to Kenya to Norway to Northern Ireland to the United States, studying extremist and terrorist groups and interviewing their members, as well as those in government and other important stakeholders responsible for tackling the problem. As you will see from our “Findings,” we’ve put together some essential lessons. One of the most important takeaways is understanding the pattern(s) behind group recruitment. Terrorist and extremist groups first prey on local grievances—exploiting feelings of anger, humiliation, resentment, or lack of purpose. They then incorporate, into their violent pronouncements, conspiratorial messages that blame those they are targeting. Self-proclaimed religious groups use distorted religious edicts in their narratives. Recruiters achieve success by providing both answers and a sense of purpose to vulnerable individuals. -
Indo-Pacific
INDO-PACIFIC Malaysia Weighs Releasing 9/11-Linked Terrorist from Prison OE Watch Commentary: In December 2001, Malaysian militant Yazid Sufaat was arrested for his alleged involvement with al-Qaeda and links to the September 11, 2001 attacks in the United States. A former biochemistry student in the US, he was tasked with developing anthrax as a bio-terror weapon for al-Qaeda and was an explosives expert for Southeast Asia-based Jemaa Islamiya, a group responsible for a series of large attacks in Indonesia. According to the first excerpted article in the Malaysian Berita Haria [Daily News], Malaysia is now facing the prospect of Sufaat being released from prison. However, the government is examining whether his detention should be extended and whether his release will foment terrorism in the country. According to the article, Malaysia has a Terrorism Prevention Board, which will be reviewing Sufaat’s case and deciding whether he may be released. It will need to determine whether he is fully recovered and deradicalized. Given the difficulty of this type of examination, the article notes the Board recognizes the evaluation will need to be thorough. If Sufaat no longer holds his previous views and is no longer a threat to the public, according to Malaysia’s former chief of police, “there is nothing immoral about releasing Sufaat.” The article also demonstrates that this case is unique insofar as the Terrorism Prevention Act under which Sufaat has been detained was previously used to detain Communists in the country, but only until even Communists recanted their ideology. Now the same Act is being used in a new era and the Sufaat case is the first major test.