H /C-F2-.. 04Rj/7~Oa ,',-:,

Total Page:16

File Type:pdf, Size:1020Kb

H /C-F2-.. 04Rj/7~Oa ,',-:, 9/11 Working-level Employee \:::':";;;;::::: . COMMISSION SENSITIVE H /C-f2-.. 04rJ/7~oa ,',-:, -. UNCLASSIFIED '; ...\.....•\........... <:" •• MEMORANDUM FOR THE RECORD • ' -, , ' :- . , ',", ~ . ~··E~~~t:I~~~~~~~~~~~~~~~~~~~~~~tDulles -. Intel71ati.~n~.1Ai~ort Type: Interview. pre;;~t~dbY:'!prn;R~ldt SpecialAccess Is~(Ie~ :N,,~e> Teams: 7 "..\ Dat·~.:January 1"9, 2004 and Pt¢ruary"lQ, '2'004 \. -. ',',', participts (nont~QmmiSSiOn): ·Phone Interview'[ .. ~~ ....I~~d..~~~ ...ITrip to Dulles. and' '.. ' ..... Participants (Commission): Lisa Sullivan.John RaidL ... Location: The interview was conducted by co~fe.rence call'>Ms. Sullivan and Mr. Raidt hosted the cal1 from the commission's GSA office'.,1 la~'~ ~a1led from their office at Dulles International Airport. '\ The interview was followed by a 2-10-04 site visit to the Dulles west checkpoint to show • Dpictures of the hijackers and to get a visual impression of the door where the confrontation occurred. John Raidt and Lisa Sullivan were joined by Commission staff members John Tamm and Marco Cordero for the trip to Dulles. Background • COMMISSION SENSITIVE UNCLASSIFIED COMMISSION SENSITIVE UNCLASSIFIED • Reason for Interview [U] Commission staff contacte4 Ifor an interview based on information he had provided to law enforcement r~garding an incident he witnessed on the evening of 9/1 0/2001 at Dulles. " Incident [U1 lindicated that around 8 p.m. on September 10, he was supervising the west checkpoint in the main terminal of Dulles when he saw four Middle Eastern men trying to enter a side door at the west checkpoint. Use of the door was restricted to Law Enforcement Officers ~LEO's) and government officials. nJ]The uniformed nr~n were wearing green Dulles Airport 10 badges imprinted with an '1A" that designatedpeople who work on the ramps. One of the men swiped his ID card 'and punched in a code to enter the door, which gained him and the other three people /entrance to the "s~¢rile area" (bypassing the security check point). ![Unsaid that/two of the men were dressed like "ramp rats" - in blue pants with !sw~rts and.headphones around their necks. They appeared to be escorting two other ! plain clothed men, also Middle Eastern in appearance. The men weren't carrying : anything with/them. He did not recognize them. He noticed them because ramp rats weren 't allowed to enter through that door~,Dtressed that ramp employees "never" used that d9,or.,D also noted that MW ijA had restricted access to the door to fewer • ~mp]oyee~;J~r' security reasons only a:!-rionthprior to 9-11. !(U] : ~~ressed that the do~,d is talking about is on the west wall of the west , !ch,¢ckp~inr The door requires-that you swipe a card and punch in the cod,~1 ~aid ! ./ t~~t vefy.few employees haveaccess to the door. He didn't have such access on 9·11 and ! ./ he was amanager of the checkpoint security.operation.l Isa~,d,-tfiatyou could use the , : ?oor/t~/by-pass the ma~~r~.t6meter. .' • ' / [uDaid that th~e'e'ofthemen were confused andditl~;t seem to know wherethey ! ./ ./ w¢.r<i going. These-observations and the fact that ramp rats never used that door made ! / /:~(t1{suspicious. .Hestopped them'. lie·told themthat they weren't allowed through the i ,'" ,:' 46:or and that t,h~y had to go throughthe security checkpoint if they wanted to access the i .... / /~4tea.The men-carrying IDs showed themto him. Their behavior was rude and abusive to :' ,::>:,him. ,<.... .,' : .' "'.' . /! / / ...('::::/ [Ul~ade them Y6r;;'~"ba:c(~ut and told them to go through the checkpoint. The men /!,///:,'d~.d~xplain ~hy theywanted access to the door. Even though they had IDs, they : : .' ::: /PI,~,9'itseem to.knowwhere they were going, t!l;;«~~F~~~n~~~~~::~~;e~h:od:airt~.p?h~~Dsa~h~:e~e::~;~;~s~~~sU!~~: 2 ~ '.; <-:" COM~~{~~S~~~TIVE 9/11 Working-level Employee .» <~~~9/11 Working-level Employee cOMMrSS1()l-J:.~~~~~IVE .' ....··UNS.~~S:f..t7'1~O::::'\\'.....,-::,':-:,,\ , e~calators. He doesn't-know wh~.\,~:t~i;',~:6nJf'fr~tn ih~r~"mork~~fut1~,il 11 p.m. and • did not see them.again after th.~.:9,o~fron~,~tl~,fl.if: ':: \\ \.>.. """ [UlDdidnot report th~inci4e'1i~'untilth/nexthay wh~n he came into work arm) d 1 p.m. After hearing abqu~·th¥.:.tiijacki'ng)h¢:re oneQ th~ ~qcident to a' :;~dOn 9illJ,/lE6Id th~F!31 abou iieportj \\FaS interviewed by the FBI, ~t~e~~r[::]{~({ report~:d the sto:~~tJrli;~is interview was.the ..first L....Jhad heard the story;' ::tdid get to/see ~:~)f. suspected hij ackers that was taken o.n''9-1 1. .:' / !!: :,\" \, -. " [u]D~idtha~ ,/ , . witnessed the incidel)t'J ! the 0 Terminal and...is accessible to the Cominjs~io,,). In a fOllQW UinteriewP with Commission staffat Dullesl / . ! Idld not corroborat ' 4 ccount. He concurred he wasworking the evening of the 1o" between the E,as~and the West checkpoints, buthe had no recollection of ~ confrontation betwe~aand four middle easterners trying to by-pass the magnetometer. He Said it may h~ve happened, but he had no recollection of it and might have been preoccupied with other passengers or in a different area at the time/ !' \, [UJDaid that sometime later (not on 9-11), he thinks a few days later, the FBI came • to his home around 9 p.m. and showed him approximately five pictures, He did not remember the agent'S' name. She was a young blonde female agent.c::::Jiid not recognize the individuals in the pictures as any of the men he saw on September loth. Having read the agent's report on the interview withDCommission staff think the pictures shown to him were of employees with access, to the door at Dulles or video stills th of individuals recovered from the ADT security camera used at the terminal on the 10 - NOT photos of,~.hesuspected hijackers. ! [U] A couple of weeks later, he saw color pictures of the hijackers in a news magazine "The National Enquirer" and recognized two of them as the people he saw on the 10th dressed as ramp rats. He said the "Enquirer" story had pictures of all the hijackers but did not associate them by fli ght. He said he did not have time to read the article that accompanied the pictures. One of the rnen was tall with curly hair and the other one was very shory;'balding, and had a large f~irehead. He thought both men looked young. [U]D~aid that none of the picturesithe FBI showed him resembled the pictures of the hijackers he saw in the newspaQer ora magazine. He did not recall any names associated with the pictures he recognized[:Jsaid that if someone showed him the pictures again, he could pick them out. He did not contact the FBI again to inform them of the fact that he recognized a couple of the hijackers . • COMMISSION SENSITIVE 3 UNCLASSIFIED .. 9/11 Personal Privacy ........ COMMISSION SENSITIVE UNCLASSIFIED [U] D'~:ahg:J~e fol1ow-up~i~'it'TcEJ1!Y Commission staff, John T~m showedDa number of pictures, including photos ofthe·AA -,#.77 hijacker~·Ddid not identify any of the pictures as individuals he .had seen on 9/10. ". ..,:.:' ..- • .~'. ' .. ," ..[_u...l__ ...I~ca;:.;n_b;.;.ereache~:'~~'L:r-'_"'~"~ __ ...I!:'I=====!k:.:··~~· .::.;be·r~~·~~ed:~4 ,...1 ....~an bereached a~ 1 " 1..-------1 / ~OTE: After the int~iew, John Raidt cont.~d~dl lofthe FBI to relay the i information thaDow claims h~:fecog~iied two ofthe hijackers as people he had seen on 9/10),;...... : ' ,// . ",,/ . ,,"" ;' following the site visit; Commission staff plan to review surveillance footage of the.west checkpoint-from the evening of the 10th to look for images of the confrontation in question; ", ' _ Contact EdCo;x:at f\1W AA to-find out who on 9-10 had ID badges and the code to .enter the doorin qu·estion,.''''' ./ _ :/ oet a list ofthose personnel with the aforementioned credentials was on duty on .....' .£>:-10 :,,',., , .:, .: /_ /:'Look fo'~thecopyof the National Enquirer with the pictures of the hijackers that ,..,::/ ca~.e"~~lt'ln theweeks following 9-11. 9/11 Law Enforcement Privacy • ,/' .,' ,:',:' ...: J/i.:· 9/11 Working-level Employee • COMMISSION SENSITIVE 4 UNCLASSIFIED "\. , 9/11 Working-level" Employee MEMORANDUM FOR THE RECORD " '\\,Event: Intervie\~/of1... ___ Jja.~,~:·February 10, 2004 ""specilt¢ccess Issues: none p~~paredb~:, Quinn John Tamm, Jr. TeamNumbe~LIA and 7 (jO,catio,~,: DullesInternational Airport, Herndon, VA '. Par.~icipa"h:ts from theCommission. Lisa Sullivan, John Raidt, Marco A. Cordero, \"Quinn JohnTamm, Jr. \::,\ ... ... \, \, -. \'" '''r--\ldate ofbi~~>""-',---------------., Dulles I~tema~ advised of the 'identities of the professional staffers and the nature of the inv~stigation 'being condu~e? 'b)i the Natio:al Co~ission on ~errori.st Attacks Upon '. the.United States, (the Comnllsslon)~1 Ihad previously been interviewed by \ Special Agents of the Federal Bureau of Investigation (FBI) and the Drug Enforcement \ Administration DEA:.. concemin his duties on 09/10/2001. At that tim ~~~~~~~~~~~~~~~~~~~~~~~~~ullesAi~ort. • I Ireported"t9 the FBI and DEA agents that on 09/10/2001 he was assigned to work at the west security.gate in the main terminal of Dulles Airport. Between 8: 10 pm . and 8:45 pm on that date, heobserved five males pass through the "security entrance," contrary to airport procedure.vf'he males were mid-eastern in appearance. On this date, 02110/2004~r-lwas shown and allowed to review a photographic line-up consisting o~raphs of the following individuals: Hani Hanjour Said Bahaji Mounir E-Motassadeq Zakariya Essabar Saud al-Rasheed Majed Moqed Jasim Obaid Mohamed Obaid al-Naqbi Ramzi bin al-Shibbh Khalid Sheikh Mohammed Hazma al-Ghamdi Nawaf al-Hazmi • Salem al-Hazmi Ali Abdul Aziz Ali Mohand al-Shehri AbdeIghani Mzoudi • Abderraouf Jdey , Iwas asked if any of the individuals depicted in the above list, were the mid~.¢astem males who attempted to pass thrysh:he srurity entrance of the West Gate, main terminal, Dulles Airport on 09/10/200~..
Recommended publications
  • PENTTBOM CASE SUMMARY As of 1/11/2002
    Law Enforcement Sensitive PENTTBOM CASE SUMMARY as of 1/11/2002 (LES) The following is a "Law Enforcement Sensitive" version of materials relevant to the Penttbom investigation. It includes an Executive Summary; a Summary of Known Associates; a Financial Summary; Flight Team Biographies and Timelines. Recipients are encouraged to forward pertinent information to the Penttbom Investigative Team at FBI Headquarters (Room 1B999) (202-324-9041), or the New York Office, (212-384-1000). Law Enforcement Sensitive 1 JICI 04/19/02 FBI02SG4 Law Enforcement Sensitive EXECUTIVE SUMMARY (LES) Captioned matter is a culmination of over a decade of rhetoric, planning, coordination and terrorist action by USAMA BIN LADEN (UBL) and the AL-QAEDA organization against the United States and its allies. UBL and AL-QAEDA consider themselves involved in a "Holy War" against the United States. The Bureau, with its domestic and international counterterrorism partners, has conducted international terrorism investigations targeting UBL, AL-QAEDA and associated terrorist groups and individuals for several years. (LES) In August 1996, USAMA BIN LADEN issued the first of a series of fatwas that declared jihad on the United States. Each successive fatwa escalated, in tone and scale, the holy war to be made against the United States. The last fatwa, issued in February 1998, demanded that Muslims all over the world kill Americans, military or civilian, wherever they could be found. Three months later, in May 1998, he reiterated this edict at a press conference. The United States Embassies in Nairobi, Kenya, and Dar es Salaam, Tanzania, were bombed on August 7, 1998, a little more than two months after that May 1998 press conference.
    [Show full text]
  • Trying Terrorists Brian S
    William Mitchell Law Review Volume 34 Article 6 Issue 5 Journal of the National Security Forum 2008 Trying Terrorists Brian S. Carter-Stiglitz Follow this and additional works at: http://open.mitchellhamline.edu/wmlr Part of the Military, War, and Peace Commons, and the National Security Law Commons Recommended Citation Carter-Stiglitz, Brian S. (2008) "Trying Terrorists," William Mitchell Law Review: Vol. 34: Iss. 5, Article 6. Available at: http://open.mitchellhamline.edu/wmlr/vol34/iss5/6 This Article is brought to you for free and open access by the Law Reviews and Journals at Mitchell Hamline Open Access. It has been accepted for inclusion in William Mitchell Law Review by an authorized administrator of Mitchell Hamline Open Access. For more information, please contact [email protected]. © Mitchell Hamline School of Law Carter-Stiglitz: Trying Terrorists TRYING TERRORISTS Brian S. Carter-Stiglitz Trying terrorists in Article III courts presents a host of complications and problems. As terrorism cases come before civilian courts, prosecutors have had to wrestle with these challenges. The most significant challenge may be the tension between protecting national-security secrets and prosecuting those who threaten national security in open court. The Classified Information Procedures Act (CIPA) is the main litigation tool for dealing with these challenges. Two cases, both with Minnesota roots, demonstrate the challenges that face civil prosecution in terrorism cases. Mohammed Abdullah Warsame, a largely unknown name, is being tried in the District of Minnesota on material support charges. Michael Ward, a former assistant U.S. Attorney (AUSA) for the District of Minnesota, initially led Warsame's prosecution.' The complications caused by CIPA have already prolonged Warsame's prosecution for four years-with no end currently in sight.
    [Show full text]
  • Staff Statement No
    Outline of the 9/11 Plot Staff Statement No. 16 Members of the Commission, your staff is prepared to report its preliminary findings regarding the conspiracy that produced the September 11 terrorist attacks against the United States. We remain ready to revise our understanding of this subject as our work continues. Dietrich Snell, Rajesh De, Hyon Kim, Michael Jacobson, John Tamm, Marco Cordero, John Roth, Douglas Greenburg, and Serena Wille did most of the investigative work reflected in this statement. We are fortunate to have had access to the fruits of a massive investigative effort by the Federal Bureau of Investigation and other law enforcement agencies, as well intelligence collection and analysis from the Central Intelligence Agency, the National Security Agency, the State Department, and the Department of Defense. Much of the account in this statement reflects assertions reportedly made by various 9/11 conspirators and captured al Qaeda members while under interrogation. We have sought to corroborate this material as much as possible. Some of this material has been inconsistent. We have had to make judgment calls based on the weight and credibility of the evidence. Our information on statements attributed to such individuals comes from written reporting; we have not had direct access to any of them. Plot Overview Origins of the 9/11 Attacks The idea for the September 11 attacks appears to have originated with a veteran jihadist named Khalid Sheikh Mohammed (KSM). A Kuwaiti from the Baluchistan region of Pakistan, KSM grew up in a religious family and claims to have joined the Muslim Brotherhood at the age of 16.
    [Show full text]
  • Al-Qaeda: the Many Faces of an Islamist Extremist Threat
    a al-Qaeda: The Many Faces of an Islamist Extremist Threat REPORT OF THE HOUSE PERMANENT SELECT COMMITTEE ON INTELLIGENCE ISBN 0-16-076897-7 90000 9 780160 768972 al-QaedaTh e Many Faces of an Islamist Extremist Th reat REPORT OF THE HOUSE PERMANENT SELECT COMMITTEE ON INTELLIGENCE JUNE 2006 109th Congress Union Calendar No. 355 2d Session Report 109-615 al-Qaeda: The Many Faces of an Islamist Extremist Threat ___________________ REPORT OF THE U.S. HOUSE PERMANENT SELECT COMMITTEE ON INTELLIGENCE APPROVED: JUNE 2006 TOGETHER WITH ADDITIONAL AND MINORITY VIEWS SUBMITTED: SEPTEMBER 2006 Available via the World Wide Web: http://www.gpo.gov/congress/house http://intelligence.house.gov/ September 6, 2006.—Committed to the Committee of the Whole House on the State of the Union and ordered to be printed U.S. GOVERNMENT PRINTING OFFICE Keeping America Informed I www.gpo.gov WASHINGTON : 2006 For sale by the Superintendent of Documents, U.S. Government Printing Offi ce Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC area (202) 512-1800 Fax: (202) 512-2250 Mail: Stop SSOP, Washington, DC 20402-0001 ISBN 0-16-076897-7 i PERMANENT SELECT COMMITTEE ON INTELLIGENCE OF THE HOUSE OF REPRESENTATIVES PETER HOEKSTRA, MICHIGAN, CHAIRMAN RAY LAHOOD, ILLINOIS JANE HARMAN, CALIFORNIA TERRY EVERETT, ALABAMA ALCEE L. HASTINGS, FLORIDA ELTON GALLEGLY, CALIFORNIA SILVESTRE REYES, TEXAS HEATHER WILSON, NEW MEXICO LEONARD L. BOSWELL, IOWA JO ANN DAVIS, VIRGINIA ROBERT E. (BUD) CRAMER, JR., ALABAMA MAC THORNBERRY, TEXAS ANNA G. ESHOO, CALIFORNIA JOHN M. MCHUGH, NEW YORK RUSH D. HOLT, NEW JERSEY TODD TIAHRT, KANSAS C.
    [Show full text]
  • 65 Question History Test. See If You Can Get 100%
    65 QUESTION HISTORY TEST. SEE IF YOU CAN GET 100%. HERE’S THE TEST: 1. 1968 Bobby Kennedy was shot and killed by: a. Superman b. Jay Leno c. Long-haired pot head d. A Muslim male extremist between the ages of 17 and 40 suffering from pre-traumatic stress disorder. This murderer was a twenty-four year old Palestinian immigrant named Sirhan Sirhan. 2. In 1972 at the Munich Olympics, Israeli athletes were kidnapped and massacred by : a. Olga Corbett b. Sitting Bull c. Arnold Schwarzenegger d. Muslim male extremists between the ages of 17 and 40 unable to cope with the strain of competition between nation states in which they saw medals as signs of warlike domination 3. In November 1979, the US embassy in Tehran Iran was seized and taken over and 66 hostages are taken. This seizure was an outright attack on American Soil. The hostages were held for 444 days and were released on the day of President Reagan’s inauguration. The embassy was taken over by: a. Lost Norwegians interviewing candidates for kinetic Nobel Prizes, for potential future acts of valor they might commit b. Elvis c. A tour bus full of 80-year-old women d. Muslim male extremists between the ages of 17 and 40 strained by the invasion of infidels on their soil and unable to attend US universities on scholarship. One of the participants in the seizure of the embassy may have been Mahmoud Ahmadinejad, the current President of Iran who holds a Ph.D. in traffic and transport engineering from Tehran University of Science and Technology and was a 23-year old student at the time.
    [Show full text]
  • 9/11 Report”), July 2, 2004, Pp
    Final FM.1pp 7/17/04 5:25 PM Page i THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page v CONTENTS List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— ...in the Law Enforcement Community 73 3.3 . and in the Federal Aviation Administration 82 3.4 . and in the Intelligence Community 86 v Final FM.1pp 7/17/04 5:25 PM Page vi 3.5 . and in the State Department and the Defense Department 93 3.6 . and in the White House 98 3.7 . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis:August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5.
    [Show full text]
  • Radical Milieus and Salafis Movements in France: Ideologies, Practices, Relationships with Society and Political Visions
    MWP 2014 /13 Max Weber Programme Radical Milieus and Salafis Movements in France: Ideologies, Practices, Relationships with Society and Political Visions AuthorMohamed-Ali Author Adraouiand Author Author European University Institute Max Weber Programme Radical Milieus and Salafis Movements in France: Ideologies, Practices, Relationships with Society and Political Visions Mohamed-Ali Adraoui EUI Working Paper MWP 2014/13 This text may be downloaded for personal research purposes only. Any additional reproduction for other purposes, whether in hard copy or electronically, requires the consent of the author(s), editor(s). If cited or quoted, reference should be made to the full name of the author(s), editor(s), the title, the working paper or other series, the year, and the publisher. ISSN 1830-7728 © Mohamed-Ali Adraoui, 2014 Printed in Italy European University Institute Badia Fiesolana I – 50014 San Domenico di Fiesole (FI) Italy www.eui.eu cadmus.eui.eu Abstract This paper deals mainly with the issue of radical Islam within French society over recent decades. More particularly, this study illustrates evolutions and the radicalization processes among some militant Islamic groups in this country since the end of the 1970s. Focusing on connections between geopolitical issues born in the Arab world and their implications within a predominantly non Muslim society, enables highlighting the centrality of some actors and currents that have been the impulse for the emergence of a radical and militant activism in France. Some specific attention is paid to Salafist movements, whether they are primarily interested in political protest or whether they desire first to break with the rest of society in order to purify their beliefs and social relations.This paper has to do with the political vision, strategies, history and sociology of Islamic radical militancy in France.
    [Show full text]
  • True and False Confessions: the Efficacy of Torture and Brutal
    Chapter 7 True and False Confessions The Efficacy of Torture and Brutal Interrogations Central to the debate on the use of “enhanced” interrogation techniques is the question of whether those techniques are effective in gaining intelligence. If the techniques are the only way to get actionable intelligence that prevents terrorist attacks, their use presents a moral dilemma for some. On the other hand, if brutality does not produce useful intelligence — that is, it is not better at getting information than other methods — the debate is moot. This chapter focuses on the effectiveness of the CIA’s enhanced interrogation technique program. There are far fewer people who defend brutal interrogations by the military. Most of the military’s mistreatment of captives was not authorized in detail at high levels, and some was entirely unauthorized. Many military captives were either foot soldiers or were entirely innocent, and had no valuable intelligence to reveal. Many of the perpetrators of abuse in the military were young interrogators with limited training and experience, or were not interrogators at all. The officials who authorized the CIA’s interrogation program have consistently maintained that it produced useful intelligence, led to the capture of terrorist suspects, disrupted terrorist attacks, and saved American lives. Vice President Dick Cheney, in a 2009 speech, stated that the enhanced interrogation of captives “prevented the violent death of thousands, if not hundreds of thousands, of innocent people.” President George W. Bush similarly stated in his memoirs that “[t]he CIA interrogation program saved lives,” and “helped break up plots to attack military and diplomatic facilities abroad, Heathrow Airport and Canary Wharf in London, and multiple targets in the United States.” John Brennan, President Obama’s recent nominee for CIA director, said, of the CIA’s program in a televised interview in 2007, “[t]here [has] been a lot of information that has come out from these interrogation procedures.
    [Show full text]
  • 9-11 and Terrorist Travel- Full
    AND TERRORIST TRAVEL Staff Report of the National Commission on Terrorist Attacks Upon the United States 9/11 AND TERRORIST TRAVEL Staff Report of the National Commission on Terrorist Attacks Upon the United States By Thomas R. Eldridge Susan Ginsburg Walter T. Hempel II Janice L. Kephart Kelly Moore and Joanne M. Accolla, Staff Assistant Alice Falk, Editor Note from the Executive Director The Commission staff organized its work around specialized studies, or monographs, prepared by each of the teams. We used some of the evolving draft material for these studies in preparing the seventeen staff statements delivered in conjunction with the Commission’s 2004 public hearings. We used more of this material in preparing draft sections of the Commission’s final report. Some of the specialized staff work, while not appropriate for inclusion in the report, nonetheless offered substantial information or analysis that was not well represented in the Commission’s report. In a few cases this supplemental work could be prepared to a publishable standard, either in an unclassified or classified form, before the Commission expired. This study is on immigration, border security and terrorist travel issues. It was prepared principally by Thomas Eldridge, Susan Ginsburg, Walter T. Hempel II, Janice Kephart, and Kelly Moore, with assistance from Joanne Accolla, and editing assistance from Alice Falk. As in all staff studies, they often relied on work done by their colleagues. This is a study by Commission staff. While the Commissioners have been briefed on the work and have had the opportunity to review earlier drafts of some of this work, they have not approved this text and it does not necessarily reflect their views.
    [Show full text]
  • In This Interview: Adam Tells Resurgence Azzam Al-Amriki June 25, 2015
    In this interview: Adam tells Resurgence Azzam al-Amriki June 25, 2015 [Please note: Images may have been removed from this document. Page numbers may have been added.] Targeting India will remain one of the Mujahideen’s priorities as long as it pursues its antagonistic policies and continues to engage in and condone the persecution, murder and rape of Muslims and occupation of their land The way forward for our persecuted brothers in Bangladesh is Da’wah and Jihad The Pakistani regime bears responsibility for the toppling of the Islamic Emirate and the occupation of Afghanistan, and its crimes are continuing unabated While in Pakistan, I and my brothers were blessed with numerous supporters who sheltered and took care of us despite the risk The Americans and their Pakistani agents almost captured me in Karachi on at least two occasions Shaykh Abu Mus’ab al-Zarqawi had the qualities of a great leader and a smile which could illuminate a city The Americans came close to martyring Shaykh Abu Mus’ab (may Allah have mercy on him) in Afghanistan, but Allah preserved him until he became America’s number one enemy in Iraq Shaykh Abu Mus’ab was a champion of unity who fought for the Ummah, and he should not be held responsible for the deviation today of some people who falsely claim to follow him and his methodology A Muslim’s blood is sacred, more sacred even than the Ka’aba, and spilling it without right is not only an act of oppression, it is the greatest sin after Kufr and Shirk The blessed raids of September 11th rubbed America’s nose in
    [Show full text]
  • Islamist Extremism in Europe
    Order Code RS22211 Updated January 6, 2006 CRS Report for Congress Received through the CRS Web Islamist Extremism in Europe Kristin Archick (Coordinator), John Rollins, and Steven Woehrel Foreign Affairs, Defense, and Trade Division Summary Although the vast majority of Muslims in Europe are not involved in radical activities, Islamist extremists and vocal fringe communities that advocate terrorism exist and reportedly have provided cover for terrorist cells. Germany and Spain were identified as key logistical and planning bases for the September 11, 2001, attacks on the United States. The March 2004 terrorist bombings in Madrid have been attributed to an Al Qaeda-inspired group of North Africans. And UK authorities are investigating suspected Al Qaeda support to the British perpetrators of the July 7, 2005, terrorist attacks on London. This report provides an overview of Islamist extremism in Europe, possible terrorist links, European responses, and implications for the United States. It will be updated as needed. See also CRS Report RL31612, European Counterterrorist Efforts: Political Will and Diverse Responses in the First Year after September 11, and CRS Report RL33166, Muslims in Europe: Integration in Selected Countries, by Paul Gallis. Background: Europe’s Muslim Communities1 Estimates of the number of Muslims in Europe vary widely, depending on the methodology and definitions used, and the geographical limits imposed. Excluding Turkey and the Balkans, researchers estimate that as many as 15 to 20 million Muslims live on the European continent. Muslims are the largest religious minority in Europe, and Islam is the continent’s fastest growing religion. Substantial Muslim populations exist in Western European countries, including France, Germany, the United Kingdom, Spain, Italy, the Netherlands, and Belgium.
    [Show full text]
  • The New Insurgents: a Select Review of Recent Literature on Terrorism and Insurgency
    The New Insurgents: A Select Review of Recent Literature on Terrorism and Insurgency George Michael US Air Force Counterproliferation Center Maxwell Air Force Base, Alabama THE NEW INSURGENTS: A Select Review of Recent Literature on Terrorism and Insurgency by George Michael USAF Counterproliferation Center 325 Chennault Circle Maxwell Air Force Base, Alabama 36112-6427 March 2014 Disclaimer The opinions, conclusions, and recommendations expressed or implied in this publication are those of the author and do not necessarily reflect the views of the Air University, Air Force, or Department of Defense. ii Contents Chapter Page Disclaimer .............................................................................................. ii About the Author..................................................................................... v Introduction ........................................................................................... vii 1 Domestic Extremism and Terrorism in the United States ....................... 1 J.M. Berger, Jihad Joe: Americans Who Go to War in the Name of Islam ................................................................................................ 3 Catherine Herridge, The Next Wave: On the Hunt for Al Qaeda’s American Recruits ........................................................................... 8 Martin Durham, White Rage: The Extreme Right and American Politics ........................................................................................... 11 2 Jihadist Insurgent Strategy ....................................................................
    [Show full text]