Executive Summary Analysis

Total Page:16

File Type:pdf, Size:1020Kb

Executive Summary Analysis Class Exercise Simulated Report NSA 2 Final Report Executive Summary NSA, CIA, FBI, and State Department intelligence indicate a large-scale attack will take place against the United States of America. The plan of attack is in its final stages and will take place on an upcoming Tuesday, most likely to take place on November 18, 2014. The primary plan of attack is believed to be a brute-force attack on an airplane. A group of 20 Middle Eastern men trained in martial arts plan to hijack an airplane departing from Harrisburg, PA bound to Florida. The group of men plans to take over the plane using martial arts skills and have a back up supply of binary explosives in soda bottles in case the primary plan fails. The final destination of the hijacked airplane is to crash into the United States Capitol Building in Washington D.C. in order to “finish the leg that was aborted in melee of 2001”. The attack will put thousands of American lives at risk, especially those with government power, and has potential to create nationwide panic. Ayman Al-Zawahiri, the current leader of al Qaeda, is the leader of the planned terrorist plot. Abu Laith al-Libi is the gatekeeper for Ayman and Thirwat Shehata is the playmaker for the operation. Mahmoud Es Sayyid Jaballah is the operational and organizational lead. Ramadan Abdullah Mohammad Shallah is the financer of the operation and Ahmed Ressam is in charge of recruitment and weapon procurement. Attila Selek provided logistical support and Sharif Mobley was tasked with recruiting and training martyrs. A strike team consisting of 20 martyrs is tasked with carrying out the attack and hijack. All of those included in the plot were under direct orders from Ayman Al-Zawahiri but were given the orders through multiple leaders to conceal the identity of the ultimate “ustaz”. Analysis The leaders and those recruited for the attack were assigned specific task in order to create a successful operation. Ayman Al-Zawahiri is the “ustaz” of the planned terrorist operation. Al-Zawahiri is the current known leader of al Qaeda. Collected intelligence provides reliable information indicating the actors carrying out the terror plot are members of Islamist Extremist groups, including al Qaeda. Analysis of the CIA report of an email sent from an “amin”, which is believed to be a mistranslation and is actually supposed to be Ayman, supports the conclusion that Al-Zwahiri is the leader of the terror attack. 1 Abu Laith al-Libi is the gatekeeper for the terror plot. Al-Libi is the main actor that relays information to and from Al-Zawahiri in order to protect his identity for the greater good of the plot. The October 20 State Department report indicated Al-Libi was sen alive when it was believed that he was killed by a drone attack in early 2008. This information supports the notion that he would make a successful gatekeeper for he was not originally suspected to have not participated in the plot what so ever considering he was believed to be dead for six years. Thirwat Salah Shehata is believed to be the playmaker in the terrorist plot. Thirwat, or sometimes referred to as Tarwat Salah Abdallah, is in charge of recruiting main players for fulfilling the plot. He recruited Mahmoud Es Sayyid Jaballah and continued to advise him. Thirwat is one of the main roles in the terror plot because of his connections. Mahmoud Es Sayyid Jaballah, also believed to have the alias of “Khalil”, is the operational lead in the plot. Although he has been under house arrest for several years, he has recently been in contact with other known Islamic radicalists through the use of satellite phones. Mahmoud is the brother-in-law to Thirwat, which connects to Thirwat referring to recruiting his “brother”, Khalil. Mahmoud is literally Thirwat’s brother by marriage, not just his brother religiously, and Khalil is one of Mahmoud’s many aliases that he is known to have. Ramadan Abdullah Mohammad Shallah is the financer of the plot. He has a PHD in banking and economics. He was contacted by Thirwat and Jaballah and requested to lend financial assistance. He is known as another “ustaz” which in this case means teacher for he was a professor at the University of Southern Florida before returning to Syria where he is now believed to be in hiding. Ahmed Ressam is tasked with weaponry procurement. He has great skills in weapons, explosives, and poisons which can be explained by his training in Afghanistan where he was under the alias Benni Norris. Ressam contacts Sharif Mobley to assist weaponry procurement for he is an expert in hand-to-hand combat. Together, Ressam and Mobley, because of their respective expertise, are tasked with recruiting martyrs and obtaining necessary weaponry to carryout the plot. Finally, Attila Selek is a necessary actor in the plot for creating the passports, which are vital to a successful operation. Jaballah contacted Attila for creating the 20 passports necessary for the strike team. The strike team, consisting of 20 martyrs, plans to use the passports in order to purchase flight tickets to carry out the attack on the flight from Harrisburg to Florida. Refer to the Social Network Map on page 7 for a visual representation of the major actors involved in the terrorist attack and their position relative to the others involved. The Network Map provided was created with the help of the FBI in order to promote interagency collaboration. The target of the planned attack is believed by to be the State Capitol in Washington D.C. by means of a hijacked flight departing from HarrisBurg International Airport to some unspecified airport in Florida. 2 Although no specific target was outright stated in the collected intelligence, our analysis allowed us to narrow down the suspected target to being the Washington D.C. area, more specifically the Capitol Building. As specified in the email from “Amin” to Ressam, the flight is bound to Florida from KHIA. Upon further analysis we believe that KHIA is a mistranslation, which is actually meant to be Harrisburg International Airport, which is one of the northeastern airports that has reported suspicious activity. As well as reports of suspicious activity, Harrisburg International Airport was included in the fight data printouts found when the FBI searched Sharif Mobley’s residence. Upon inquiring more information of the flight path from Harrisburg to Florida we determined that the path does not fly to far from the Washington D.C. area which makes it an ideal flight to hijack and crash into the Capitol Building. As stated on November 6 NSA intelligence the main goal of the terrorist attack is to finish the final leg of the journey that was aborted in melee of 2001. The aborted attack in 2001 was set to crash into the Capitol Building. Based on the NSA intelligence there is further evidence that supports the intended target that is believed to be the Capitol Building, Washington D.C. The attack will take place on NovemBer 18, 2014 mostly to occur in the morning during the Congress Session in the Cannon Building . CIA intelligence collection intercepted an email between Islamic terrorists involving an aircraft flight. The email is from “Amin”, which is believed to be Ayman Al-Zawahiri, to Ahmed Ressam finalizing plans for a flight from KHIA to Florida on a Tuesday. The intelligence indicates the plans are in the final stage indicating the attack will be on October 18, 2014. On October 18 Congress will be in session at 10 AM, coincidentally assessing interoperability communications progress after 9/11. The meeting is to be held in the Cannon Office, which is 0.3 miles from the Capitol Building. With important members of Congress present at the meeting, there will be high security focused on the Cannon building rather than on the Capitol. The more security on the Cannon Building means there is likely to be less security on the Capitol Building making it an ideal target for an attack. An attack on the Capitol Building is close enough to the meeting to cause a major disturbance, as well as widespread panic, and potential for massive amounts of casualties. Weapons to Be used for the attack are the Bodies of martyrs and Binary explosives. The bodies of martyrs as weapons indicate it will be a suicide mission. The primary means of attack for the operation is a brute-force attack. The 15-20 recruited and trained martyrs from the Toronto area have been training for months in a Tai Chi training facility. Early September CIA intelligence indicates the specific Tai Chi program the martyrs are enrolled in has the motto “turn your body into the ultimate weapon” which supports the conclusion that the primary attack will be brute-force. The 15-20 martyrs will take over the flight from Harrisburg to Florida by sheer combat and redirect it’s path to the capitol building. If the brute-force attack fails, the binary explosives will be used as the secondary plan in order to assist a successful takeover of the flight. An early report from the State Department provided information of stolen military equipment and explosives from Canadian forces ammunition depot. The stolen goods included long-range sniper rifles, 200 rounds of ammunition, 600 grams of RDX, and various protective clothing and gear. It is believed the powder from the ammunition can be used as a detonator for the binary explosives if necessary. Based on the report October 12 FBI report of sounds of fireworks and 3 remnants of bottles and components of binary explosives, the binary explosives are successful and can be used if at all necessary.
Recommended publications
  • Chapter 7 War on Terror
    Chapter 7 War on Terror Thou shall not kill – But we will. In July 2005, Ahmed Ressam was sentenced to 22 years of impris- onment after a jury convicted him of an attempt to bomb Los Angeles International Airport on the eve of the millennium. Emphasizing the rule of law in punishing terrorists, US District Judge John C. Coughenour made the following comments during the sentencing hearing: I would like to convey the message that our system works. We did not need to use a secret military tribunal, or detain the defendant indefinitely as an enemy combatant, or deny him the right to coun- sel, or invoke any proceedings beyond those guaranteed by or con- trary to the US Constitution...Despite the fact that Mr. Ressam is not an American citizen and despite the fact that he entered this country intent upon killing American citizens, he received an effec- tive, vigorous defense, and the opportunity to have his guilt or inno- cence determined by a jury of 12 ordinary citizens. Most importantly, all of this occurred in the sunlight of a public trial. There were no secret proceedings, no indefinite detention, no denial of counsel. The tragedy of September 11th shook our sense of security and made us realize that we, too, are vulnerable to acts of terrorism. Unfortunately, some believe that this threat renders our Constitution obsolete. The war on terror is the antithesis of the criminal justice system that Judge Coughenour describes above. The criminal justice sys- tem is the peacetime legal infrastructure to arrest, indict, prose- War on Terror 249 cute, and punish persons accused of committing terrorists acts.
    [Show full text]
  • Foreign Terrorist Organizations
    Order Code RL32223 CRS Report for Congress Received through the CRS Web Foreign Terrorist Organizations February 6, 2004 Audrey Kurth Cronin Specialist in Terrorism Foreign Affairs, Defense, and Trade Division Huda Aden, Adam Frost, and Benjamin Jones Research Associates Foreign Affairs, Defense, and Trade Division Congressional Research Service ˜ The Library of Congress Foreign Terrorist Organizations Summary This report analyzes the status of many of the major foreign terrorist organizations that are a threat to the United States, placing special emphasis on issues of potential concern to Congress. The terrorist organizations included are those designated and listed by the Secretary of State as “Foreign Terrorist Organizations.” (For analysis of the operation and effectiveness of this list overall, see also The ‘FTO List’ and Congress: Sanctioning Designated Foreign Terrorist Organizations, CRS Report RL32120.) The designated terrorist groups described in this report are: Abu Nidal Organization (ANO) Abu Sayyaf Group (ASG) Al-Aqsa Martyrs Brigade Armed Islamic Group (GIA) ‘Asbat al-Ansar Aum Supreme Truth (Aum) Aum Shinrikyo, Aleph Basque Fatherland and Liberty (ETA) Communist Party of Philippines/New People’s Army (CPP/NPA) Al-Gama’a al-Islamiyya (Islamic Group, IG) HAMAS (Islamic Resistance Movement) Harakat ul-Mujahidin (HUM) Hizballah (Party of God) Islamic Movement of Uzbekistan (IMU) Jaish-e-Mohammed (JEM) Jemaah Islamiya (JI) Al-Jihad (Egyptian Islamic Jihad) Kahane Chai (Kach) Kurdistan Workers’ Party (PKK, KADEK) Lashkar-e-Tayyiba
    [Show full text]
  • Islamist and Middle Eastern Terrorism: a Threat to Europe?
    © Rubbettino Centro Militare di Studi Strategici - Roma © Rubbettino Islamist and Middle Eastern Terrorism: A threat to Europe? Maria do Céu Pinto (University of Minho Portugal) Rubbettino © Rubbettino Copyright © by CeMiSS Centro Militare di Studi Strategici Piazza della Rovere, 83 - 00165 Roma (RM) e-mail: [email protected] © 2004 - Rubbettino Editore 88049 Soveria Mannelli - Viale Rosario Rubbettino, 10 -Tel. (0968) 662034 www.rubbettino.it © Rubbettino Index Abstract: 7 Introduction 9 I Islamist and Middle Eastern Terrorism in Europe: The Background 11 I.1. Palestinian Terrorism 11 I.2. Iranian Terrorism 17 II New Patterns of Islamist Terrorism in the 1990s 21 II.1. A New Age of Terrorism 21 II.2. Religious Terrorism 22 III The Web of Terror in Europe 31 III.1. Interlocking Terror Plots 31 III.2. Al-Qaeda: an Umbrella Network 32 III.3. Mosques: Recruitment and Indoctrination 36 IV Groups and Activities of Islamic Terrorists in Europe 41 IV.1. England 41 IV.2. France And Belgium 49 IV.3. Italy 53 IV.4. Germany 62 IV.5. Spain 65 IV.6. The Netherlands 71 V Evaluating the Terrorist Threat to Europe’s Security 75 V.1. Al-Qaeda’s European Infrastructure after 11th September 75 V.2. Islamic Communities in Europe: A Breeding Ground of Terrorists? 76 Conclusion 77 Bibliography 79 © Rubbettino 5 © Rubbettino Abstract During three decades Middle Eastern terrorism in Europe was largely a spillover from problems in the Middle East. Europe was a preferential oper- ational area for Arab, Palestinian and Iranian terrorists fighting each other. In the 1990s, a new Islamic threat emerged as a result of the activities of “ad hoc” terrorist groups, which lack a well-established organisational identity and tend to decentralise and compartmentalise their activities.
    [Show full text]
  • Islamist Terrorism in Northwestern Africa a ‘Thorn in the Neck’ of the United States?
    Islamist Terrorism in Northwestern Africa A ‘Thorn in the Neck’ of the United States? Emily Hunt Policy Focus #65 | February 2007 All rights reserved. Printed in the United States of America. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any infor- mation storage and retrieval system, without permission in writing from the publisher. © 2007 by the Washington Institute for Near East Policy Published in 2007 in the United States of America by the Washington Institute for Near East Policy, 1828 L Street NW, Suite 1050, Washington, DC 20036. Design by Daniel Kohan, Sensical Design and Communication Front cover: A Nigerian girl walks past a wall displaying graffiti and political posters on the eve of presidential elections, April 18, 2003. Copyright AP Wide World Photos/Schalk van Zuydam. About the Author Emily Hunt is a former Soref fellow at The Washington Institute, where she studied North African terrorist net- works. Prior to joining the Institute, she worked as a terrorism consultant for the London security firm Aegis Defence Services. Ms. Hunt is currently a research fellow with the International Assessment and Strategy Center. She holds a master’s degree in war studies from King’s College, London, and a bachelor’s degree from the Univer- sity of St Andrews, Scotland. n n n The opinions expressed in this Policy Focus are those of the author and not necessarily those of the Washington Institute for Near East Policy, its Board of Trustees, or its Board of Advisors.
    [Show full text]
  • The European Angle to the U.S. Terror Threat Robin Simcox | Emily Dyer
    AL-QAEDA IN THE UNITED STATES THE EUROPEAN ANGLE TO THE U.S. TERROR THREAT Robin Simcox | Emily Dyer THE EUROPEAN ANGLE TO THE U.S. TERROR THREAT EXECUTIVE SUMMARY • Nineteen individuals (11% of the overall total) who committed al-Qaeda related offenses (AQROs) in the U.S. between 1997 and 2011 were either European citizens or had previously lived in Europe. • The threat to America from those linked to Europe has remained reasonably constant – with European- linked individuals committing AQROs in ten of the fifteen years studied. • The majority (63%) of the nineteen European-linked individuals were unemployed, including all individuals who committed AQROs between 1998 and 2001, and from 2007 onwards. • 42% of individuals had some level of college education. Half of these individuals committed an AQRO between 1998 and 2001, while the remaining two individuals committed offenses in 2009. • 16% of offenders with European links were converts to Islam. Between 1998 and 2001, and between 2003 and 2009, there were no offenses committed by European-linked converts. • Over two thirds (68%) of European-linked offenders had received terrorist training, primarily in Afghanistan. However, nine of the ten individuals who had received training in Afghanistan committed their AQRO before 2002. Only one individual committed an AQRO afterwards (Oussama Kassir, whose charges were filed in 2006). • Among all trained individuals, 92% committed an AQRO between 1998 and 2006. • 16% of individuals had combat experience. However, there were no European-linked individuals with combat experience who committed an AQRO after 2005. • Active Participants – individuals who committed or were imminently about to commit acts of terrorism, or were formal members of al-Qaeda – committed thirteen AQROs (62%).
    [Show full text]
  • The Jihadist Threat in France CLARA BEYLER
    The Jihadist Threat in France CLARA BEYLER INCE THE MADRID AND LONDON BOMBINGS, Europeans elsewhere— fearful that they may become the next targets of Islamist terrorism— are finally beginning to face the consequences of the long, unchecked Sgrowth of radical Islam on their continent. The July bombings in London, while having the distinction of being the first suicide attacks in Western Eu- rope, were not the first time terrorists targeted a major European subway system. Ten years ago, a group linked to the Algerian Armed Islamic Group (Groupe Islamique Armé—GIA) unleashed a series of bombings on the Paris metro system. Since 1996, however, France has successfully avoided any ma- jor attack on its soil by an extremist Muslim group. This is due not to any lack of terrorist attempts—(only last September, France arrested nine members of a radical Islamist cell planning to attack the metro system)—but rather to the efficiency of the French counterterrorist services.1 France is now home to between five to six million Muslims—the sec- ond largest religious group in France, and the largest Muslim population in any Western European country.2 The majority of this very diverse population practices and believes in an apolitical, nonviolent Islam.3 A minority of them, however, are extremists. Islamist groups are actively operating in France to- day, spreading radical ideology and recruiting for future terrorist attacks on French soil and abroad. The purpose of this paper is to provide an overview of France’s Islamist groups, the evolving threats they have posed and continue to pose to French society, and the response of the French authorities to these threats.
    [Show full text]
  • Al Qaeda’S Command- And-Control Structure
    Testimony of Steven Emerson Before the United States House of Representatives Permanent Select Committee on Intelligence April 9, 2008 Steven Emerson Executive Director Investigative Project on Terrorism www.investigativeproject.org email:[email protected] Introduction: The 2001 invasion of Afghanistan was successful in obliterating much of al Qaeda’s command- and-control structure. Due to a robust and successful counter-terrorist policy made up of good intelligence gathered by the FBI, asset forfeitures and designations by the Department of the Treasury, and other good work by the Department of Homeland Security and other agencies within the intelligence community, the U,S. has fortunately not been hit with another attack since 9-11. Moreover, in the six and a half years since the those horrible, al Qaeda’s direct orchestration of acts of terrorism on the operational level has been somewhat constrained. This is not to say that al Qaeda has not been involved in terrorist attacks and plots since 2001 (training and guidance provided by al Qaeda in the 2005 London transit bombings and foiled 2006 Heathrow plot prove otherwise), but the group’s leaders have relied largely on the power of self- anointed franchises and recognized the power of spreading its message and ideology via the Internet. Extremist Muslims throughout the world have responded to this message and have sought to execute a number of attacks. While most have been stopped, some have been successful, killing hundreds and injuring thousands more, resulting in propaganda coups for al Qaeda and its leadership. Parallel to franchising the al Qaeda ideology, the group has successfully regenerated its operational capabilities in the sanctuary of the Federally Administered Tribal Areas (FATA) in Pakistan.
    [Show full text]
  • American Exceptionalism, the War on Terror, and the Rule of Law in the Islamic World
    AMERICAN EXCEPTIONALISM, THE WAR ON TERROR, AND THE RULE OF LAW IN THE ISLAMIC WORLD NADINE STROSSEN* When some New York Law School students first decided to organize a Federalist Society chapter many years ago, they ac‐ tually asked me to be their faculty advisor. Some will say that this shows how hard it is to find a conservative law professor. But what it really shows is that these New York Law School students were honoring this organization’s libertarian found‐ ing principles. Those principles are reflected in the opening words of the Federalist Society’s mission statement: “The Fed‐ eralist Society . is founded on the principle[] that the state exists to preserve freedom . The Society seeks . [to reor‐ der] priorities within the legal system to place a premium on individual liberty . .”1 Also relevant to this Essay’s topic, the mission statement declares that “the separation of governmen‐ tal powers is central to our Constitution.”2 Unfortunately, the “War on Terror”3 has violated these fundamental precepts of the Federalist Society in numerous ways, with devastating con‐ sequences for liberty, democracy, and national security alike. For details, refer to the website of a certain organization that has been promoting the libertarian aspect of the Federalist So‐ * Professor of Law, New York Law School; President, American Civil Liberties Union, 1991–2008. Most of the footnotes were prepared by Professor Strossen’s Chief Aide, Steven Cunningham (NYLS ‘99), based on her guidance and with the assistance of her Research Assistants John Bilancini (NYLS ‘10) and Nicole Tesoriero (NYLS ‘11). Accordingly, Steven Cunningham bears both the responsibility and the credit for the footnotes.
    [Show full text]
  • Algeria: Current Issues
    Algeria: Current Issues Carol Migdalovitz Specialist in Middle Eastern Affairs November 22, 2010 Congressional Research Service 7-5700 www.crs.gov RS21532 CRS Report for Congress Prepared for Members and Committees of Congress Algeria: Current Issues Summary The focus of this report is Algeria, a country in North Africa that is increasingly important for U.S. efforts to counter international terrorism as a key partner in the fight against Al Qaeda linked groups. As an energy producer, it also is a significant source of natural gas for the United States and not a major recipient of U.S. aid. The overall domestic situation in Algeria remains relatively stable. An elected president dominates the political system, but the military, the most significant political force since independence in 1962, still is viewed as the ultimate arbiter of who fills the office. It backed Abdelaziz Bouteflika for the presidency in 1999. He was reelected for a third term in April 2009 and has no clear successor. The voice of the military has been muted publicly since Bouteflika was first selected, but may be heard during presidential succession. Low voter turnout in the May 2007 parliamentary election may have reflected general lack of public faith in the political system as well as common knowledge that the legislature is weak. Authorities specifically boasted of a higher turnout in the 2009 presidential election. The major domestic problem is terrorism, which has spread beyond Algeria’s borders. It persists at home while Algerian terrorists operate across the southern border in the Sahel and are linked to terrorism abroad.
    [Show full text]
  • Terrorism 2000 2001 Fbi Publication #0308 TerrRism 2000/2001
    U.S. Department of Justice Federal Bureau of Investigation TERRORISM 2000 2001 FBI PUBLICATION #0308 TERRRISM 2000/2001 FORWARD EXPANDING FOCUS As the events of September 11, 2001, demonstrated with brutal clarity, the terror- ist threats facing the United States are formidable. Between 1991 and 2001, 74 terrorist incidents were recorded in the United States. During this same time frame, an additional 62 terrorist acts being plotted in the United States were pre- vented by U.S. law enforcement. As troubling as these statistics are, they only hint at the full scope of the terrorist threat confronting U.S. interests. For every successful terrorist attack mounted in the United States, nearly 20 (19.83) anti- U.S. attacks are carried out around the world. Between 1996 and 2001, these overseas attacks killed 75 Americans and wounded an additional 606. During the past two decades, the U.S. Government has expanded the FBI’s authority to investigate terrorist activities against U.S. interests overseas. Specifically, the Comprehensive Crime Control Act of 1984, the Omnibus Diplomatic Security and Antiterrorist Act of 1986, the Antiterrorism and Effective Death Penalty Act of 1996, and Presidential Decision Directive 39 have served to extend FBI investigative authority beyond U.S. borders when U.S. interests are harmed or TERRORISM threatened. Since 1984 the FBI has carried out over 300 extraterritorial investigations, in close cooperation with the U.S. Department of State and with the assistance of host 2000 governments. These investigations include some of the FBI’s /2001 most complex and high-profile cases, including investigations into the September 11 attacks, as well as the bombings of Khobar Towers in Saudi Arabia in 1996, two U.S.
    [Show full text]
  • Sheriff - Operation Stonegarden 11068.811
    Sheriff - Operation Stonegarden 11068.811. CLALLAM COUNTY BUDGET DETAIL 2000 Mission Statement Enhance all multi-jurisdictional agency capabilities to prevent, detect, respond, and recover from terrorist attacks along our borders; and to detect, deter, and enforce the smuggling of illicit substances into Clallam County and the United States. Function The Clallam County Sheriff's Office is being provided funds to enhance the capability of state and local law enforcement agencies to prevent, deter, and respond to and recover from catastrophic and/or terrorist events. OPSG supports enhanced cooperation and coordination among Customs and Border Protection (CBP), United States Border Patrol (USBP), and federal, state, local, tribal, and territorial law enforcement agencies. OPSG provides funding to support joint efforts to secure the United States’ border along routes of ingress from our international water border with Canada. Trends/Events On December 14th, 1999, Algerian terrorist Ahmed Ressam was apprehended in Port Angeles after entering the United States of the MV Coho from Canada. Ressam was in possession of highly volatile explosives which were intended to blow up a passenger terminal at the Los Angeles International Airport. On May 11th, 2020, a vessel identified as leaving Canada and crossing the Strait of Juan De Fuca was boarded by law enforcement as it entered John Wayne Marina in Sequim. The vessel contained approximately 496 lbs. of packaged Marijuana. Intelligence suggests the Canadian Marijuana was to be utilized as currency to purchase Fentanyl, Methamphetamine, and Heroin. Grant funded projects pending completion are camera security network expansion in the City of Port Angeles and in Neah Bay jurisdiction.
    [Show full text]
  • Ramzi Yousef
    45 3 Terrorist Entry and Embedding Tactics, 1993 to 2001 The relative ease with which the hijackers obtained visas and entered the United States underscores the importance of travel to their terrorist operations. In this section we explore the evolution of terrorist travel tactics and organization. We begin with terrorist plots in the 1990s and conclude with the 9/11 attack. 3.1 The Redbook Since the early 1970s numerous terrorist organizations have provided their operatives with a wide variety of spurious documents. After showing their spurious passports and papers at border control, these terrorist operatives have proceeded to hijack airplanes, plant bombs, and carry out assassinations. These terrorist acts, however, can be stopped. If we all screen travelers and check their passports, as past experience proves, terrorist will lose their ability to travel undetected, and international terrorism will come one step closer to being stopped! —The Redbook (1992) By definition, transnational terrorist groups need to travel to commit terrorist acts. Indeed, without freedom of movement terrorists cannot plan, conduct surveillance, hold meetings, train for their mission, or execute an attack. Terrorists rely on forged passports and fake visas to move around the world unimpeded and undetected. This has been known for more than three decades. It is difficult today to judge with certainty what else was known about terrorist travel methods in the 1970s and 1980s. However, the existence of a CIA training video and manual is evidence of an understanding that terrorists relied on certain tactics when they traveled and that they could be stopped by alert individuals who recognized the use of those tactics.
    [Show full text]