Isaacpowerpointprintversion.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Isaacpowerpointprintversion.Pdf 1 2 NC ISAAC opened in 2006 as a clearinghouse for information related to terrorism and crime. ISAAC is staffed by members of local, state, and federal law enforcement agencies in NC, including non‐sworn intelligence analysts and sworn agents and officers. 3 ISAAC receives, investigates, and disseminates information concerning homeland security. 4 Mission: To serve as the focal point for the collection, assessment, analysis, investigation, and dissemination of terrorism and criminal information relating to threats and attacks within North Carolina. ISAAC has a “primary responsibility of developing and evaluating information about persons and/or organizations engaged in criminal activity.” Responsibilities can be categorized as follows: 1. The collection, analysis, and sharing of criminal information 2. Terrorist threat assessment and monitoring 3. Terrorist incident response 4. Development and implementation of special projects, strategies, and initiatives 5. Gang‐related activity 6. Selected organized crime drug cases 5 Law enforcement can submit and receive homeland security and criminal information related to: Homeland security Gangs High intensity drug related cases 6 Handout 1: Fusion Centers Following the terrorist attacks of September 11, 2001, our country was forced to take a critical look at the established methods of intelligence and information sharing. It was at this time that fusion centers began to emerge. The emergence of fusion centers was a direct result of our government’s recommending new and more effective sharing plans to increase awareness of potential threats in our communities and to break down barriers to information sharing. There are currently 78 primary and recognized fusion centers in the United States, Puerto Rico, and the US Virgin Islands. Several states have at least 5 regional fusion centers. 7 8 Community brochures, law enforcement brochures, Anti‐Terrorism Quick Reference Guides and homeland security posters are items distributed to assist in the marketing of the center and its services. A monthly law enforcement sensitive and private sector bulletin is distributed to our law enforcement and non‐traditional partners. 9 An inquiry for information is available through ISAAC. The requester must be a valid law enforcement officer or infrastructure partner and must provide a reason for the query that meets with ISAAC mission criteria. 10 Need to Know –Any ISAAC Participant or member of an ISAAC Participating Agency has a need to know when information requested will aid in the assessment of criminal information. 11 Right to Know –Any ISAAC Participant or member of an ISAAC Participating Agency; as well as government officials whose agencies may be involved in incident response and/or consequence management; and managers of businesses and organizations, when their business or organization is specifically identified as a target of criminal activity has a right to know when information received will aid in the assessment of criminal threat information. Lowe’s Bombing 1999 Example: One late September afternoon pipe bombs blew up at Lowe’s home improvement stores in Salisbury and Asheboro. The two explosions wrecked shopping areas and badly injured a customer. A third unexploded pipe bomb turned up a week later at a store in Concord. The media horde descended. Investigators swarmed. It became the FBI’s number one investigation in the nation. Lowe’s managers worried how to protect customers, employees, and the corporate reputation. “Is it safe to shop at Lowe’s?” Fortunately, it ended within weeks. Authorities arrested and imprisoned George Rocha of Greensboro who confessed to the crime. He had claimed he was angry about people being killed and injured in a fatal crash at a Lowe’s Motor Speedway race. He demanded $250,000 in extortion money. Ultimately he admitted his real motive was simple retribution for being caught shoplifting at Lowe’s. 12 Reasonable Suspicion of Criminal Activity –A set of circumstances that establishes sufficient facts to give a trained law‐enforcement or criminal investigative agency, officer, investigator, or employee a basis to believe that there is reasonable possibility that an individual or organization is involved in criminal activities. 13 1. Telephone – Telephone submissions of information may be made by the public and law enforcement. Phone calls into ISAAC will be answered by the Administrative Assistant, who in turn will route them to the appropriate personnel. 2. Electronically – Submissions may be made by e‐mail or into the OMNIXX system. 3. OMNIXX – Information may be submitted through the Criminal Justice Network on an ISAAC submission form and transmitted directly to ISAAC. This is accomplished by opening Omnixx Force (DCI)>Forms>Persons>ISAAC>and complete the NC Information Sharing And Analysis Center (ISAAC) transaction. 4. SBI Web Page – Information may be submitted through the SBI Terrorism Lead Submission form located on the SBI web site. This submission is transmitted directly to ISAAC. Processing Intelligence Information – Once information has been obtained and appropriate follow up has been handled, it will be evaluated and combined with other relevant information. After the proper analysis, it may be determined appropriate to document into SBI Intelligence Files. 14 Handout 2: Terrorism Tip Submission Form Handout 3: ISACC Information Sheet 15 16 1. ISAAC can assist any law enforcement agency that needs help. Above are just some of the resources ISAAC analysts and investigators have available to assist LE. 2. Accurint is a program made by LexisNexis that allows a connection to current public records that can be used in fraud detection and identity verification. The database currently holds over 37 billion records. 3. Omnixx is a platform which allows data access and information sharing between law enforcement agencies. 4. CJLEADS, or Criminal Justice Law Enforcement Automated Data Services, is a “program designed to integrate data found within the state’s various criminal justice applications.” 5. LInX, or Law Enforcement Information Exchange, is an advanced information sharing system conceived and built (but not owned or controlled) by the US Naval Criminal Investigative Service. 6. NCAWARE is the North Carolina Automated Warrant Repository that helps to maintain and track criminal processes and offender information. 17 Criminal Threat Assessment – A secondary, but critical role of ISAAC that is inter‐related with the criminal information collection and analysis process is its terrorist threat assessment function. Occasionally, information reported to ISAAC, or information developed through subsequent investigations and analysis, will indicate that a criminal event may be underway, or imminent. On those occasions, ISAAC personnel use all available resources in an effort to quickly and effectively evaluate the credibility of the information, develop additional relevant information, and notify response agencies and other appropriate entities in hopes of preventing or disrupting the event or, at least, mitigating its consequences. A Three Component Process Identify – identification of persons, groups, or organizations that have the interest, motive, and capability to perpetrate criminal activity. Investigate / Evaluate – assessment of persons, groups, or organizations who are identified as potential criminal threats. Through investigation and research, develop knowledge of relevant issues. 18 Manage – implement an appropriate response to the threat or event (i.e. refer to JTTF, continue to investigate or monitor, disseminate warnings or alerts, etc.). 19 20 Domestic Terrorism is the unlawful use, or threatened use, of force or violence by a group or individual based and operating entirely within the United States or its territories without foreign direction committed against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives. 21 International Terrorism involves violent acts or acts dangerous to human life that are a violation of the criminal laws of the United States or any state, or that would be a criminal violation if committed within the jurisdiction of the United States or any state. 22 NC defines a Terrorist Act as “an act which constitutes a crime against the person or against the residence of an individual (1) which is committed with the specific intent of and may reasonably be expected to instill fear into such person or persons or (2) which is committed for the purpose of restraining that person or those persons from exercising their rights under the Constitution and laws of this state and the United States and (3) any illegal act directed at other persons or their property because of those persons’ beliefs or political affiliations.” 23 1983‐ 9/11 Mastermind Khalid Sheikh Mohammed attended Chowan College and after one year at Chowan transferred to NC A&T and graduated in 1986 with a Bachelors of Science in Mechanical Engineering. Khalid Sheikh Mohammed is known as the mastermind of 9/11. He attended school in NC in the mid 1980s (Chowan college and NC A&T); studied engineering. KSM was arrested in 2006 overseas and confessed to his role in the 9/11 attacks in 2008. KSM also played a role in the murder of American Journalist Daniel Pearl. He is currently being held in Guantanamo awaiting his military trial, which could begin as late as 2016. 24 2000 – Hezbollah Cigarette Smuggling case (Iredell Co) Operation Smokescreen was an American
Recommended publications
  • USA -V- Julian Assange Judgment
    JUDICIARY OF ENGLAND AND WALES District Judge (Magistrates’ Court) Vanessa Baraitser In the Westminster Magistrates’ Court Between: THE GOVERNMENT OF THE UNITED STATES OF AMERICA Requesting State -v- JULIAN PAUL ASSANGE Requested Person INDEX Page A. Introduction 2 a. The Request 2 b. Procedural History (US) 3 c. Procedural History (UK) 4 B. The Conduct 5 a. Second Superseding Indictment 5 b. Alleged Conduct 9 c. The Evidence 15 C. Issues Raised 15 D. The US-UK Treaty 16 E. Initial Stages of the Extradition Hearing 25 a. Section 78(2) 25 b. Section 78(4) 26 I. Section 78(4)(a) 26 II. Section 78(4)(b) 26 i. Section 137(3)(a): The Conduct 27 ii. Section 137(3)(b): Dual Criminality 27 1 The first strand (count 2) 33 The second strand (counts 3-14,1,18) and Article 10 34 The third strand (counts 15-17, 1) and Article 10 43 The right to truth/ Necessity 50 iii. Section 137(3)(c): maximum sentence requirement 53 F. Bars to Extradition 53 a. Section 81 (Extraneous Considerations) 53 I. Section 81(a) 55 II. Section 81(b) 69 b. Section 82 (Passage of Time) 71 G. Human Rights 76 a. Article 6 84 b. Article 7 82 c. Article 10 88 H. Health – Section 91 92 a. Prison Conditions 93 I. Pre-Trial 93 II. Post-Trial 98 b. Psychiatric Evidence 101 I. The defence medical evidence 101 II. The US medical evidence 105 III. Findings on the medical evidence 108 c. The Turner Criteria 111 I.
    [Show full text]
  • Framing 'Jihadjane'
    What’s Love Got To Do With It? Framing ‘JihadJane’ in the US Press Maura Conway Dublin City University, Ireland Lisa McInerney University of Limerick, Ireland Abstract The purpose of this article is to compare and contrast the US press coverage accorded to female terrorist plotter, Colleen LaRose, with that of two male terrorist plotters in order to test whether assertions in the academic literature regarding media treatment of women terrorists stand up to empirical scrutiny. The authors employed TextSTAT software to generate frequency counts of all words contained in 150 newspaper reports on their three subjects and then slotted relevant terms into categories fitting the commonest female terrorist frames, as identified by Nacos’s article in Studies in Conflict and Terrorism (2005). The authors’ findings confirm that women involved in terrorism receive significantly more press coverage and are framed vastly differently in the US press than their male counterparts. Keywords: female, framing, gender, jihadi, Colleen LaRose, newspapers, press, terrorism, women __________________________________________________________________________________ Introduction This article analyses US press reports on a woman and two men arrested in the US in 2009 and 2010 for their parts in three separate jihadi terrorist plots. The female plotter is widely known as ‘JihadJane’, which was an online pseudonym for Colleen LaRose, an American woman charged with four terrorism-related offences and taken into custody by US law enforcement at Philadelphia International Airport on her return from Europe in October 2009 (Shiffman, 2011).[1] LaRose is accused of using the internet to recruit individuals for the purpose of engaging in violent jihad, to include the murder of Swedish cartoonist Lars Vilks.
    [Show full text]
  • Proquest Dissertations
    NOTE TO USERS Page(s) missing in number only; text follows. The manuscript was microfilmed as received. 27 This reproduction is the best copy available. UMI~ COUNTERFEIT AND CONTRABAND CIGARETTE SMUGGLING: OPPORTUNITIES, ACTORS, AND GUARDIANSHIP By Sharon Anne Melzer Submitted to the F acuity of the School of Public Affairs of American University in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy In Justice, Law and Society Chair:~~ Louise I. Shelley, PhD ~~~ Dean of the School of Public Affairs Date 2010 American University Washington, D.C. 20016 AMERICAN U.WVERStrt LIBAARY ct 5Cf I UMI Number: 3417880 All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent upon the quality of the copy submitted. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. Also, if material had to be removed, a note will indicate the deletion. UMI ___...Dissertation Publishing...___ UMI 3417880 Copyright 201 O by ProQuest LLC. All rights reserved. This edition of the work is protected against unauthorized copying under Title 17, United States Code. Pro uesr ProQuest LLC 789 East Eisenhower Parkway P.O. Box 1346 Ann Arbor, Ml 48106-1346 ©COPYRIGHT by Sharon Anne Melzer 2010 ALL RIGHTS RESERVED COUNTERFEIT AND CONTRABAND CIGARETTE SMUGGLING: OPPORTUNITIES, ACTORS, AND GUARDIANSHIP By Sharon Anne Melzer ABSTRACT Contraband and counterfeit cigarette smuggling provides organized crime and terrorist organizations with a sizable revenue stream that does not come with the risks and punishments that are associated with other illicit commodities, such as drugs and weapons.
    [Show full text]
  • SJR 21: Illegal Cigarette Trafficking
    SJR 21: Illegal Cigarette Trafficking September 5, 2012 Overview • Study Authorization • Methodology • Why Does Trafficking Occur? • Methods Used by Traffickers • Financial Impact of Trafficking • Beneficiaries of Trafficking • November Meeting VIRGINIA STATE CRIME COMMISSION 2 Study Authorization • Senate Joint Resolution 21 (Illegal Cigarette Trafficking) was introduced by Senator Howell during the Regular Session of the 2012 General Assembly. • The resolution specifically directs focus upon a number of issues related to illegal cigarette trafficking: – (i) determine why illegal cigarette trafficking occurs; – (ii) identify the methods of illegal cigarette trafficking and the strategies used by smugglers; VIRGINIA STATE CRIME COMMISSION 3 Study Authorization • The resolution directs focus upon (continued): – (iii) document the effects and financial impact of illegal cigarette trafficking on State and local governments; – (iv) identify the methods used to counterfeit cigarettes and cigarette tax stamps and the prevalence of these methods in the Commonwealth on the availability of counterfeit cigarettes and cigarette tax stamps; – (v) determine the beneficiaries of illegal cigarette trafficking; – (vi) review statutory options to combat illegal cigarette trafficking; VIRGINIA STATE CRIME COMMISSION 4 Study Authorization • The resolution directs focus upon (continued): – (vii) identify potential uses of information technology to prevent illegal cigarette trafficking and assess the costs and benefits of using such technology; – (viii) develop
    [Show full text]
  • Julian Assange Judgment
    JUDICIARY OF ENGLAND AND WALES District Judge (Magistrates’ Court) Vanessa Baraitser In the Westminster Magistrates’ Court Between: THE GOVERNMENT OF THE UNITED STATES OF AMERICA Requesting State -v- JULIAN PAUL ASSANGE Requested Person INDEX Page A. Introduction 2 a. The Request 2 b. Procedural History (US) 3 c. Procedural History (UK) 4 B. The Conduct 5 a. Second Superseding Indictment 5 b. Alleged Conduct 9 c. The Evidence 15 C. Issues Raised 15 D. The US-UK Treaty 16 E. Initial Stages of the Extradition Hearing 25 a. Section 78(2) 25 b. Section 78(4) 26 I. Section 78(4)(a) 26 II. Section 78(4)(b) 26 i. Section 137(3)(a): The Conduct 27 ii. Section 137(3)(b): Dual Criminality 27 1 The first strand (count 2) 33 The second strand (counts 3-14,1,18) and Article 10 34 The third strand (counts 15-17, 1) and Article 10 43 The right to truth/ Necessity 50 iii. Section 137(3)(c): maximum sentence requirement 53 F. Bars to Extradition 53 a. Section 81 (Extraneous Considerations) 53 I. Section 81(a) 55 II. Section 81(b) 69 b. Section 82 (Passage of Time) 71 G. Human Rights 76 a. Article 6 84 b. Article 7 82 c. Article 10 88 H. Health – Section 91 92 a. Prison Conditions 93 I. Pre-Trial 93 II. Post-Trial 98 b. Psychiatric Evidence 101 I. The defence medical evidence 101 II. The US medical evidence 105 III. Findings on the medical evidence 108 c. The Turner Criteria 111 I.
    [Show full text]
  • University of Groningen Jihadism and Suicide Attacks Nanninga
    University of Groningen Jihadism and Suicide Attacks Nanninga, Pieter IMPORTANT NOTE: You are advised to consult the publisher's version (publisher's PDF) if you wish to cite from it. Please check the document version below. Document Version Publisher's PDF, also known as Version of record Publication date: 2014 Link to publication in University of Groningen/UMCG research database Citation for published version (APA): Nanninga, P. (2014). Jihadism and Suicide Attacks: al-Qaeda, al-Sahab and the Meanings of Martyrdom. s.n. Copyright Other than for strictly personal use, it is not permitted to download or to forward/distribute the text or part of it without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license (like Creative Commons). The publication may also be distributed here under the terms of Article 25fa of the Dutch Copyright Act, indicated by the “Taverne” license. More information can be found on the University of Groningen website: https://www.rug.nl/library/open-access/self-archiving-pure/taverne- amendment. Take-down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Downloaded from the University of Groningen/UMCG research database (Pure): http://www.rug.nl/research/portal. For technical reasons the number of authors shown on this cover page is limited to 10 maximum. Download date: 29-09-2021 Jihadism and Suicide Attacks al-Qaeda, al-Sahab and the Meanings of Martyrdom Pieter Nanninga Cover design: Anna Woldring Cover photograph: still from al-Sahab, Winds of Paradise: Part 1, 20" Printing: CPI Koninklijke Wöhrmann ISBN 978-90-367-7040-8 (printed version) ISBN 978-90-367-7045-3 (electronic version) © Copyright 2014 Pieter Gerhardus Theodorus Nanninga Jihadism and Suicide Attacks al-Qaeda, al-Sahab and the Meanings of Martyrdom PhD thesis to obtain the degree of PhD at the University of Groningen on the authority of the Rector Magnificus Prof.
    [Show full text]
  • Congressional Record—Senate S4732
    S4732 CONGRESSIONAL RECORD — SENATE April 27, 2009 lights to go on when we flip a switch, and we plant was being closed, more than 130 ‘‘Hopefully, when we obtain the power con- do not expect our computers to shut down as ALCOA employees accepted the company’s tract, it will just be a matter of waiting for nature dictates. severance package. Others were laid off—245 the market to pick up again. The good thing Solar and wind electricity are available hourly workers and 80 of the salaried work- about aluminum is that it is used in more only part of the time that consumers de- force. and more applications. It’s going to be mand power. Solar cells produce no electric The London Metal Exchange price for alu- around for a long time.’’ power at night, and clouds greatly reduce minum is half what it was one year ago, so their output. The wind doesn’t blow at a con- prospects for any immediate change is nil. f stant rate, and sometimes it does not blow The demand for the 1.3 million pounds of GUANTANAMO BAY at all. molten metal that the smelting plant can If large-scale electric energy storage were produce does not exist in the current mar- Mr. JOHANNS. Mr. President, I rise viable, solar and wind intermittency would ketplace. to speak about the detainment facili- be less of a problem. However, large-scale Still, leadership at the company is hopeful ties at Guantanamo Bay Naval Base. electric energy storage is possible only in that when the economy rebounds, Tennessee At the end of January of this year, the few locations where there are hydro- Smelting Operations will be in a position to be restarted.
    [Show full text]
  • PAYING the PRICE for SOLITARY CONFINEMENT
    PAYING the PRICE for SOLITARY CONFINEMENT Over the past few decades, United States corrections How Much More Does It Cost? systems have increasingly relied on the use of solitary The high costs of solitary confinement have been confinement as a tool to manage certain incarcerated documented by many states as well as the federal populations. Prisoners in solitary confinement remain government. Below are some examples: alone in their cells for 22-24 hours per day – for months, years, and even decades at a time. This practice, which States: has been shown to be inhumane and ineffective, is also • Arizona: A 2007 estimate from Arizona put the extremely costly. Though limited nationwide data exists, annual cost of holding a prisoner in solitary state data suggests that the cost of housing a prisoner in confinement at approximately $50,000, compared solitary confinement is 2-3 times that of housing a to about $20,000 for the average prisoner.5 1 prisoner in general population. • California: For 2010-2011, inmates in isolation at Pelican Bay State Prison’s Administrative Why is Solitary More Expensive? Segregation Unit cost $77,740 annually, while inmates in general population cost $58,324.6 Holding prisoners in solitary confinement is resource- Statewide, taxpayers pay an additional $175 intensive from start to finish. Below are two of the biggest million annually to keep prisoners in solitary costs associated with the use of solitary confinement. confinement.7 Construction: To accommodate the vast numbers of • Connecticut: In Connecticut, housing a prisoner in prisoners kept in solitary confinement, a new kind of solitary confinement costs an average of twice as prison has emerged.
    [Show full text]
  • United States District Court for the District of Columbia
    Case 1:12-cv-01872-RC Document 259 Filed 01/04/16 Page 1 of 64 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA JEREMY PINSON : : Plaintiff, : : Civil Action No.: 12-1872 (RC) v. : : Re Document No.: 147 U.S. DEPARTMENT OF JUSTICE, et al., : : Defendants. : MEMORANDUM OPINION GRANTING IN PART AND DENYING IN PART DEFENDANTS’ MOTION FOR PARTIAL SUMMARY JUDGMENT I. INTRODUCTION Pro se Plaintiff Jeremy Pinson is currently an inmate at ADX Florence, a federal prison located in Colorado. While in prison, Mr. Pinson has filed multiple Freedom of Information Act (“FOIA”), 5 U.S.C. § 552, requests with different components of the U.S. Department of Justice (“DOJ”). On several occasions, the DOJ has asked Mr. Pinson to clarify his records requests, told him that it could not find records that are responsive to his requests, or informed him that the records he sought were exempt from disclosure by law. Mr. Pinson took issue with some of these determinations, so he filed a complaint claiming that the DOJ improperly withheld numerous records from him in violation of FOIA. In response, the DOJ filed several pre-answer motions, each asking the Court to dismiss or grant summary judgment in its favor on different portions of Mr. Pinson’s complaint. Now before the Court is the DOJ’s motion for summary judgment as to Mr. Pinson’s numerous FOIA requests submitted to the Federal Bureau of Prisons (“BOP”) and several claims Case 1:12-cv-01872-RC Document 259 Filed 01/04/16 Page 2 of 64 brought against BOP employees pursuant to Bivens v.
    [Show full text]
  • CTX Vol 2 No 4
    Vol. 2, No. 4 | CTX EDITORIAL STAFF From the Editor MICHAEL FREEMAN Executive Editor Welcome to our first special issue of CTX, “Social Media in Jihad and ANNA SIMONS Executive Editor Counterterrorism,” which is devoted to a wide-ranging exploration of social ELIZABETH SKINNER Managing Editor media and counterterrorism. Social media have become valuable tools for RYAN STUART Design & Layout combating crime and terrorism. According to LexisNexis® Risk Solutions, four out of five respondents to their survey of law enforcement professionals EDITORIAL REVIEW BOARD reported using social media, particularly Facebook and YouTube, to aid VICTOR ASAL investigations. One officer said he believed his department’s use of social University at Albany SUNY media allowed personnel to defuse a terrorist threat involving students at a ALEJANDRA BOLANOS local high school. Two-thirds said they thought access to social media helps National Defense University solve crimes more quickly. LAWRENCE CLINE Naval Postgraduate School To better understand the role of social media in combating terrorism, the Naval Postgraduate School (NPS) in Monterey, California held a small STEPHEN DI RIENZO workshop on Social Media and Counterterrorism this past June. Sponsored National Intelligence University by the Combating Terrorism Fellowship Program, the workshop brought SAJJAN GOHEL together a diverse group of people, including researchers, law enforcement Asia Pacific Foundation and military officers, and media experts from the United States, Ireland, and SEBASTIAN GORKA the Philippines. Participants were invited to submit papers for inclusion in National Defense University this special issue of CTX. JAKUB GRYGIEL School of Advanced International We are delighted to present here six papers that we received from partici- Studies pants of the workshop.
    [Show full text]
  • The European Angle to the U.S. Terror Threat Robin Simcox | Emily Dyer
    AL-QAEDA IN THE UNITED STATES THE EUROPEAN ANGLE TO THE U.S. TERROR THREAT Robin Simcox | Emily Dyer THE EUROPEAN ANGLE TO THE U.S. TERROR THREAT EXECUTIVE SUMMARY • Nineteen individuals (11% of the overall total) who committed al-Qaeda related offenses (AQROs) in the U.S. between 1997 and 2011 were either European citizens or had previously lived in Europe. • The threat to America from those linked to Europe has remained reasonably constant – with European- linked individuals committing AQROs in ten of the fifteen years studied. • The majority (63%) of the nineteen European-linked individuals were unemployed, including all individuals who committed AQROs between 1998 and 2001, and from 2007 onwards. • 42% of individuals had some level of college education. Half of these individuals committed an AQRO between 1998 and 2001, while the remaining two individuals committed offenses in 2009. • 16% of offenders with European links were converts to Islam. Between 1998 and 2001, and between 2003 and 2009, there were no offenses committed by European-linked converts. • Over two thirds (68%) of European-linked offenders had received terrorist training, primarily in Afghanistan. However, nine of the ten individuals who had received training in Afghanistan committed their AQRO before 2002. Only one individual committed an AQRO afterwards (Oussama Kassir, whose charges were filed in 2006). • Among all trained individuals, 92% committed an AQRO between 1998 and 2006. • 16% of individuals had combat experience. However, there were no European-linked individuals with combat experience who committed an AQRO after 2005. • Active Participants – individuals who committed or were imminently about to commit acts of terrorism, or were formal members of al-Qaeda – committed thirteen AQROs (62%).
    [Show full text]
  • Drones, Balance of Power, and “Just War”: Assassination and Warfare in a New Century
    Social Education 82(1), pp. 53–58 Boys inspect the wreckage of a car hit by a drone air strike near the ©2018 National Council for the Social Studies northern city of Marib, Yemen, November 3, 2017. Reuters/Ali Owidha Reuters/Ali Drones, Balance of Power, and “Just War”: Assassination and Warfare in a New Century Mark Pearcy On September 30, 2011, in Yemen, Shaykh Anwar al-Aulaqi, an American-born mon good.”3 Teachers can prepare stu- Islamic cleric, was struck by missiles fired from an American drone. Al-Aulaqi—who dents for this responsibility by explor- frequently delivered radical speeches in colloquial English—had been designated an ing the use of weaponized drones within “operational [terrorist] leader”1 by the U.S. government. Also in the car was another a pedagogical framework called “just U.S. citizen, Samir Khan.2 These were the first American citizens to be killed by a U.S. war” theory. drone strike, though apparently no one connected to the operation knew that Khan, the editor of al-Qaeda propaganda magazine Inspire, was with al-Aulaqi that day. PPG: New Policy for a New Khan was not an intentional target. Less than three weeks later, al-Aulaqi’s 16-year- Weapon old son, Abdulrahman al-Aulaqi (also a U.S. citizen), was also killed in Yemen by a While the president of the United States U.S. drone strike that was targeting someone else. is the commander-in-chief of the armed forces, the power to actually declare war The issues that arise surrounding ing in the world.
    [Show full text]