American Jihadist Terrorism: Combating a Complex Threat

Total Page:16

File Type:pdf, Size:1020Kb

American Jihadist Terrorism: Combating a Complex Threat American Jihadist Terrorism: Combating a Complex Threat Jerome P. Bjelopera Specialist in Organized Crime and Terrorism January 23, 2013 Congressional Research Service 7-5700 www.crs.gov R41416 CRS Report for Congress Prepared for Members and Committees of Congress American Jihadist Terrorism: Combating a Complex Threat Summary This report describes homegrown violent jihadists and the plots and attacks that have occurred since 9/11. For this report, “homegrown” describes terrorist activity or plots perpetrated within the United States or abroad by American citizens, legal permanent residents, or visitors radicalized largely within the United States. The term “jihadist” describes radicalized individuals using Islam as an ideological and/or religious justification for their belief in the establishment of a global caliphate, or jurisdiction governed by a Muslim civil and religious leader known as a caliph. The term “violent jihadist” characterizes jihadists who have made the jump to illegally supporting, plotting, or directly engaging in violent terrorist activity. The report also discusses the radicalization process and the forces driving violent extremist activity. It analyzes post-9/11 domestic jihadist terrorism and describes law enforcement and intelligence efforts to combat terrorism and the challenges associated with those efforts. Appendix A provides details about each of the post-9/11 homegrown jihadist terrorist plots and attacks. There is an “executive summary” at the beginning that summarizes the report’s findings. Congressional Research Service American Jihadist Terrorism: Combating a Complex Threat Contents Executive Summary ......................................................................................................................... 1 Homegrown Jihadist Terrorists: The Problem ........................................................................... 1 How Do People Become Violent Jihadists? ........................................................................ 2 Analysis of Homegrown Jihadist Plots ............................................................................... 2 Combating Homegrown Violent Jihadists ................................................................................. 3 Preventive Policing ............................................................................................................. 3 State and Local Authorities ................................................................................................. 4 Investigative Approaches .................................................................................................... 4 Trust and Partnership ........................................................................................................... 4 Balancing Security and Liberty ........................................................................................... 4 Introduction ...................................................................................................................................... 5 Homegrown Violent Jihadists .......................................................................................................... 7 Shortcomings and Strengths ...................................................................................................... 7 Radicalization and Violent Extremism .......................................................................................... 11 From Radicalization to Violent Extremism ............................................................................. 12 Forces and Factors in the Forging of Terrorists ....................................................................... 13 Intermediaries .................................................................................................................... 14 Social Networks ................................................................................................................ 19 The Internet ....................................................................................................................... 20 Jailhouse Jihadism ............................................................................................................. 23 Overview of Post-9/11 Homegrown Jihadist Terrorism Plots and Attacks .................................... 25 Overarching Themes................................................................................................................ 26 A Variety of Endgames ...................................................................................................... 26 Little Stomach for Suicide or Martyrdom ......................................................................... 34 The Success of Lone Wolves ............................................................................................. 35 Varied Capabilities ............................................................................................................ 35 Combating Homegrown Terrorism: Enforcement Activities ......................................................... 37 Intelligence Approaches .......................................................................................................... 39 Preventive Policing ........................................................................................................... 40 The Role of State and Local Law Enforcement ....................................................................... 45 Investigative Approaches ......................................................................................................... 48 The Capone Approach ....................................................................................................... 48 Agent Provocateur Cases .................................................................................................. 50 Combating Homegrown Terrorism: Building Trust and Partnership ............................................. 55 Engagement and Community Policing .................................................................................... 55 The Tension Between Enforcement and Engagement Activities ............................................. 56 Figures Figure 1. Counterterrorism Context ............................................................................................... 39 Congressional Research Service American Jihadist Terrorism: Combating a Complex Threat Tables Table B-1. Homegrown Violent Jihadist Attacks and Plots Since 9/11: Terrorist Profile and Training ................................................................................................... 134 Table B-2. Homegrown Violent Jihadist Attacks and Plots since 9/11: Targets, Endgames, and Investigative Tools ............................................................................................................. 136 Appendixes Appendix A. Summary of Post-9/11 Homegrown Violent Jihadist Terrorist Plots ........................ 62 Appendix B. Tables ...................................................................................................................... 134 Contacts Author Contact Information......................................................................................................... 137 Acknowledgments ....................................................................................................................... 137 Congressional Research Service American Jihadist Terrorism: Combating a Complex Threat Executive Summary This report describes homegrown violent jihadists and the plots and attacks that have occurred since 9/11. It discusses the radicalization process and the forces driving violent extremist activity. It analyzes post-9/11 domestic jihadist terrorist activity and describes law enforcement and intelligence efforts to combat terrorism and the challenges associated with those efforts. It also briefly discusses efforts to build trust and partnership between community groups and government agencies and the tensions that may occur between law enforcement and engagement activities. The report does not address terrorist activity against the United States conducted by foreigners largely radicalized abroad such as Quazi Mohammad Rezwanul Ahsan Nafis’s attempt to blow up the Federal Reserve Bank of New York (2012), the Printer Cartridge plot (2010), the attempted airline bombing by Farouk Abdulmutallab (Christmas Day 2009), the Transatlantic Airliners plot (August 2006), or the “shoe bomber” Richard Reid (December 2001). Nor does the report address domestic terrorism attributed to violent extremists inspired by non-jihadist causes such as radical environmentalism, animal rights, or anti-abortion causes. Specific plots and attacks are described throughout the report to support analytical findings. A full description of each of the post-9/11 cases is provided in Appendix A of the report. Homegrown Jihadist Terrorists: The Problem “Homegrown” is the term that describes terrorist activity or plots perpetrated within the United States or abroad by American citizens, legal permanent residents, or visitors radicalized largely within the United States. The term “jihadist” describes radicalized individuals using Islam as an ideological and/or religious justification for their belief in the establishment of a global caliphate, or jurisdiction governed by a Muslim civil and religious leader known as a caliph. The Congressional Research Service (CRS) estimates that there have been 63 homegrown violent jihadist plots or attacks in the United States since September 11, 2001
Recommended publications
  • Agent Provocateur: Secrets - a Collection of Erotic Fiction Pdf
    FREE AGENT PROVOCATEUR: SECRETS - A COLLECTION OF EROTIC FICTION PDF Agent Provocateur | 144 pages | 10 Jan 2006 | PAVILION BOOKS | 9781862057203 | English | London, United Kingdom Agent Provocateur: Secrets | Pavilion Books The founder of ultra-sexy Agent Provocateur: Secrets - A Collection of Erotic Fiction sometimes racy lingerie brand Agent Provocateur is moving on to something less kinky and more progressive: a gender-fluid underwear line. Serena Rees, who established Provocateur in and eventually sold it off a decade agois launching Les Girls Les Boys—a lingerie label featuring intimates, underwear, and streetwear that isn't confined to one gender. The brand launches on September 1 with a Agent Provocateur: Secrets - A Collection of Erotic Fiction collection of pieces. The aesthetic is much more toned down than Agent Provocateur's, ditching pasties, lace bodices, and BDSM-esque straps for minimalist designs inspired by streetwear hence, an appeal to millennials. There are graphic tees, comfy-looking sports bras and bodysuits, and sweats. Rees started working on Les Girls Les Boys about 18 months ago after noticing the "disconnect" between oversexualized concepts of lingerie and how young people now view sex and sexuality. In a weird way, I feel a little responsible for it. Les Girls Les Boys pieces will be available to shop lesgirlslesboys. Bazaar Bride. United States. Type keyword s to search. Today's Top Stories. The Staying Power of Liya Kebede. The Bind of Being First. Protecting Yourself Against Chemicals in Clothing. Brett Lloyd. This content is created and maintained by a third party, and imported onto this page to help users provide their email addresses.
    [Show full text]
  • The Internet and the Radicalization of Muslim Women
    The Internet and the Radicalization of Muslim Women Sergio E. Sanchez California State University, Chico Department of Political Science Chico, CA 95929 [email protected] “to kill one and frighten 10,000 others” - Chinese Proverb Paper prepared for Presentation at the annual meeting of the Western Political Science Association, Seattle, WA, April 2014. Abstract The Internet, with its built in anonymity and continuous availability – 24 hours a day, seven days a week- is for some the perfect venue for chatting, meeting new people, learning about topics of interest, and a source for countless hours of entertainment. Moreover, the Internet allows individuals from all over the country, or the world, who are from different socioeconomic backgrounds but who share similar interests and ideologies to interact and communicate privately. However, the Internet is also a readymade platform for the spread of hate, terror, and other radical ideas and messages, all of which can be transmitted at the speed of light, anonymously, and available on demand. The Internet is, therefore, an ideal venue for women to interact with likeminded individuals or organizations without having to sacrifice or tarnish their standing in the community or among their families. Women from repressive countries such as Saudi Arabia, Egypt, and Palestine can participate in jihad without leaving their homes and without having to meet strange men face-to-face and, consequently, bring shame to their families or themselves – as per traditional Islamic practices. Likewise, women involved or interested in radical environmentalism can meet online, share ideas, and continue their struggle against governments and corporations. Similarly, women involved, or fascinated with, right-wing religious movements or hate groups such as the KKK or neo-Nazis can likewise meet in a private setting, virtually, with little concern that their reputations or image within the community will be tarnished by their surreptitious activities online.
    [Show full text]
  • Framing 'Jihadjane'
    What’s Love Got To Do With It? Framing ‘JihadJane’ in the US Press Maura Conway Dublin City University, Ireland Lisa McInerney University of Limerick, Ireland Abstract The purpose of this article is to compare and contrast the US press coverage accorded to female terrorist plotter, Colleen LaRose, with that of two male terrorist plotters in order to test whether assertions in the academic literature regarding media treatment of women terrorists stand up to empirical scrutiny. The authors employed TextSTAT software to generate frequency counts of all words contained in 150 newspaper reports on their three subjects and then slotted relevant terms into categories fitting the commonest female terrorist frames, as identified by Nacos’s article in Studies in Conflict and Terrorism (2005). The authors’ findings confirm that women involved in terrorism receive significantly more press coverage and are framed vastly differently in the US press than their male counterparts. Keywords: female, framing, gender, jihadi, Colleen LaRose, newspapers, press, terrorism, women __________________________________________________________________________________ Introduction This article analyses US press reports on a woman and two men arrested in the US in 2009 and 2010 for their parts in three separate jihadi terrorist plots. The female plotter is widely known as ‘JihadJane’, which was an online pseudonym for Colleen LaRose, an American woman charged with four terrorism-related offences and taken into custody by US law enforcement at Philadelphia International Airport on her return from Europe in October 2009 (Shiffman, 2011).[1] LaRose is accused of using the internet to recruit individuals for the purpose of engaging in violent jihad, to include the murder of Swedish cartoonist Lars Vilks.
    [Show full text]
  • Filling Terrorism Gaps: Veos, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan
    PNNL-25727 Filling Terrorism Gaps: VEOs, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan August 2016 PNNL-25727 Filling Terrorism Gaps: VEOs, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan August 2016 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Pacific Northwest National Laboratory Richland, Washington 99352 PNNL-25727 Abstract This paper aims to address three issues: the lack of literature differentiating terrorism and violent extremist organizations (VEOs), terrorism incident databases, and the applicability of Risk Terrain Modeling (RTM) to terrorism. Current open source literature and publicly available government sources do not differentiate between terrorism and VEOs; furthermore, they fail to define them. Addressing the lack of a comprehensive comparison of existing terrorism data sources, a matrix comparing a dozen terrorism databases is constructed, providing insight toward the array of data available. RTM, a method for spatial risk analysis at a micro level, has some applicability to terrorism research, particularly for studies looking at risk indicators of terrorism. Leveraging attack data from multiple databases, combined with RTM, offers one avenue for closing existing research gaps in terrorism literature. iii Acknowledgments The author would like to sincerely thank several individuals for their contributions to this research. My mentor, Chrissie Noonan, for her guidance and support throughout this process, Carolyn Cramer for her operational support and insight, Alex Stephan, Lead for the Special Programs and Scientific Studies Team at PNNL, George Muller for his support and direction, Hannah Trump for her substantial help with the appendices, and Dan Fortin, Sam Chatterjee, and Thomas Johansen for the constant discussions.
    [Show full text]
  • The Azef Affair and Late Imperial Russian Modernity
    Chto Takoe Azefshchina?: The Azef Affair and Late Imperial Russian Modernity By Jason Morton Summer 2011 Jason Morton is a Ph.D. student in the Department of History at the University of California, Berkeley. “Petersburg streets possess one indubitable quality: they transform passersby into shadows.” -Andrei Bely “Now when even was come, he sat down with the twelve. And as they did eat, he said, Verily I say unto you, that one of you shall betray me. And they were exceedingly sorrowful, and began every one of them to say unto him, Lord, is it I? And he answered and said, He that dippeth his hand with me in the dish, the same shall betray me.” -Matthew 26: 20-23 Introduction: Azefshchina- What’s in a name? On January 18, 1909 (O.S.) the former Russian chief of police, A.A. Lopukhin, was arrested and his house was searched. Eleven packages containing letters and documents were sealed up and taken away. 1 Lopukhin stood accused of confirming to representatives of the Socialist Revolutionary Party that one of their oldest and most respected leaders, Evno Azef, had been a government agent working for the secret police (Okhrana) since 1893. The Socialist Revolutionaries (or SRs) were a notorious radical party that advocated the overthrow of the Russian autocracy by any means necessary.2 The Combat Organization (Boevaia Organizatsiia or B.O.) of the SR Party was specifically tasked with conducting acts of revolutionary terror against the government and, since January of 1904, Evno Azef had been the head of this Combat Organization.3 This made him the government’s most highly placed secret agent in a revolutionary organization.
    [Show full text]
  • Identifying Enemies Among Us: Evolving Terrorist Threats and the Continuing Challenges of Domestic Intelligence Collection and Information Sharing
    CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that helps improve policy and EDUCATION AND THE ARTS decisionmaking through research and analysis. ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE This electronic document was made available from www.rand.org as a public service INFRASTRUCTURE AND of the RAND Corporation. TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS Skip all front matter: Jump to Page 16 NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY Support RAND SCIENCE AND TECHNOLOGY Purchase this document TERRORISM AND Browse Reports & Bookstore HOMELAND SECURITY Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND Corporation View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non- commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation conference proceedings series. RAND conference proceedings present a collection of papers delivered at a conference or a summary of the conference. The material herein has been vetted by the conference attendees and both the introduction and the post-conference material have been re- viewed and approved for publication by the sponsoring research unit at RAND.
    [Show full text]
  • TERRORIST TRIALS: a Report Card
    A P U B L I C A T I O N O F T H E C E N T E R O N L A W A N D S E C U R I T Y A T N Y U S C H O O L O F L A W | F E B R U A R Y 2 0 0 5 110 W E S T T H I R D S T R E E T , N E W Y O R K , N Y 10 0 12 | W W W . L A W . N Y U . E D U / C E N T E R S / L A W S E C U R I T Y TERRORIST TRIALS: A Report Card hen he announced his resignation in November 2004, Attorney General John Ashcroft declared, “The objective of securing the safety of Americans W from crime and terror has been achieved.” He was referring to that part of the war for which he was largely respo n s i b l e : the legal and judicial record. Ei g h t e e n months prior to that, in testimony before Congress, Ashcroft summed up the pretrial, interim results of his war on terror. Ashcroft cited 18,000 subpoenas, 211 criminal charges, 47 8 [As a preliminary note to the findings, it is important to point deportations and $124 million in frozen assets. Looking to out that accurate and comprehensive information was almost document the results of these efforts, represented in the prose- impossible to obtain.
    [Show full text]
  • The Suffocation of Free Speech Under the Gravity of Danger of Terrorism
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by bepress Legal Repository First Amendment Tim Davis Prof. Raskin The Suffocation of Free Speech under the Gravity of Danger of Terrorism I. Introduction Ali al -Timimi (“al- Timimi”) is an outspoken Muslim scholar who is well respected in the worldwide Muslim community. In his fervent support of Muslims everywhere, he has openly proclaimed that America is one of the chief enemies of the Muslim populace. 1 He has proclaimed that the explosion of the space shuttle Columbia was a sign for Muslims to take action.2 He has urged young Muslim men to jihad, to wage armed conflict with the enemies of Islam. 3 It is safe to say that al -Timimi has made numerous speeches that most Americans would find highly objectionable. On September 23, 2004, the Federal government charged al -Timimi with a six -co unt indictment4, which was later superceded by the present ten -count indictment. 5 During the trial in April 2005, the prosecution introduced over 250 evidentiary exhibits 6, testimony from several expert witnesses on radical Islamism 7, and testimony from various government agents. In 1 Presentencing Report for Muhammed Aatique at 17, United States v. Khan, (No. 03 -296 -A). 2 Presentencing Report for Muhammed Aatique at 17, United States v. Khan, (No. 03 -296 -A). 3 Transcripts, Rebuttal Argument by Mr. Kromberg, Pleading 123 at 14, United States v. Al -Timimi, (No. 1:04cr385). 4 Indictment, United States v. Al -Timimi, (No. 1:04cr385), available at http://www.altimimi.org.
    [Show full text]
  • Obstructing Justice: the Rise and Fall of the AEDPA*
    AGARWAL.DOC 9/17/2019 11:04 AM Obstructing Justice: The Rise and Fall of the AEDPA* TABLE OF CONTENTS I. INTRODUCTION .................................................................................................. 840 II. THE CURRENT POLITICAL LANDSCAPE: PUSHING FORWARD DESPITE PUBLIC DISSENT ................................................... 843 III. THE AEDPA OF 1996 ........................................................................................ 850 A. At Issue: Prohibiting Material Support to Designated Foreign Terrorist Organizations .......................................... 850 B. Major Constitutional Victories: The Rise of the AEDPA ........................................................................................... 857 1. Under the First Amendment: Guilt by Association ........................... 858 2. Under the First Amendment: Political Advocacy and the Question of Scrutiny ............................................................. 863 3. Under the First Amendment: Vagueness ........................................... 866 IV. HITTING A BRICK WALL: THE FALL OF THE AEDPA .......................................... 871 A. National Security: Abridging Procedural Due Process to Foreign Terrorist Organizations .................................... 878 B. Crisis Legislation: The Age-Old Conflict Between Civil Liberties and National Security ....................................................... 882 1. Distinguishing the Alien and Sedition Acts ....................................... 886 2. Distinguishing Japanese
    [Show full text]
  • JIHAD Pag 1-10 Revazut.Qxd
    JIHADUL ISLAMIC DE LA "|NFRÂNGEREA TERORII" {I "R+ZBOIUL SFÂNT" LA "SPERAN}A LIBERT+}II" JIHADUL ISLAMIC 1 Foto coperta I • SHEIKH MAWLANA MUHAMMAD HISHAM COD CNCSIS 270 ANDREESCU, ANGHEL Jihadul Islamic de la ''|nfrângerea terorii'' [i ''R=zboiul Sfânt''ANDREESCU, la ''speran]a ANGHEL libert=]ii'' / Anghel Andreescu, NicolaeJihadul Radu. Islamic - Bucure[ti: de la ''|nfrângerea Editura Ministerului terorii'' [i ''R=zboiulInternelor [iSfânt'' Reformei la Administrative,''speran]a libert=]ii'' 2008 / Anghel Andreescu, Bibliogr.Nicolae Radu. - Bucure[ti: Editura Ministerului Internelor ISBN[i Reformei 978-973-745-011-1 Administrative, 2008 Bibliogr. I.ISBN Radu, 978-973-745-011-1 Nicolae 329.7(¡411.21)I. Radu, Nicolae Jihad 329.7(¡411.21) Jihad Opera]ii editoriale: colectiv Editura MIRA Tip=rit: Tipografia Codex Anghel ANDREESCU, Nicolae RADU 2 Chestor general de poli]ie Comisar [ef prof. univ. dr. Anghel ANDREESCU conf. univ. dr. Nicolae RADU JIHADULJIHADUL ISLAMICISLAMIC DE LA "|NFRÂNGEREA TERORII" {I "R+ZBOIUL SFÂNT" LA "SPERAN}A LIBERT+}II" BUCURE{TI – 2008 – JIHADUL ISLAMIC 3 Cuprins Gând pentru toleran]= . 9 Prefa]= . 11 Introducere . 15 Introduction . 29 Introduction . 43 Lista abrevieri . 59 Capitolul 1 De la Islam la cunoa[terea Jihadului . 65 Cât de bine cunoa[tem Islamul? . 65 Unicitatea lui Allah . 79 |n numele credin]ei . 96 Calea spre Mecca . 98 Ebraismul confirmat . 103 Moartea Profetului . .104 Urma[ii lui Mahomed . 106 Dinastia Abbasida [i civiliza]ia islamic= . 109 |n=l]are [i dec=dere . 110 {ii]i [i suni]i . 111 Religia \ntre [ii]i [i suni]i . 113 Cartea Sfânt= a Islamului . 115 Nemurirea sufletului .
    [Show full text]
  • 2. (U//FOUO) Health: Detainee Is in Good Health
    SECRET // 20330311 DEPARTMENT OF DEFENSE STATES COMMAND HEADQUARTERS , JOINT TASK FORCE GUANTANAMO U.S. NAVAL STATION , GUANTANAMO BAY , CUBA APOAE09360 JTF- GTMO- CDR 11 March 2008 MEMORANDUMFORCommander, UnitedStates SouthernCommand, 3511NW Avenue, Miami, FL 33172 SUBJECT : Recommendation for Continued Detention Under Control (CD) for Guantanamo Detainee, ISN -000048DP (S ) JTF - GTMO Detainee Assessment 1. (S) PersonalInformation: JDIMS/ NDRC ReferenceName: Abdullah K al-Hamairi Current/ True Name andAliases: Abdullah al-Hamiri, Abdallah Khalaf Atiq al-Hamayri, Abu Khalid, Abu Khalid al-Emirati Abdallah al-Emirati Place of Birth: Al- Ayn , United Arab Emirates (AE, UAE) Date ofBirth: 25 October 1979 Citizenship: United Arab Emirates InternmentSerial Number (ISN) : - 000048DP 2. (U// FOUO) Health: Detainee is in good health . 3. ( U ) JTF- GTMO Assessment : a. (S) Recommendation : JTF -GTMO recommends this detainee for Continued Detention Under DoD Control (CD) . JTF -GTMO previously recommended detainee for Continued Detention Under DoD Control (CD) on 20 March 2007 . b . (S ) Executive Summary: Detainee was a fighter in Usama BinLaden's (UBL) 55th Arab Brigade supporting the Taliban. Under the guise of pursuing an education, detainee traveled to Portland, Oregon ( OR ), in 1997. Detainee spent almost three years in the Portland area attending the al- Sabr Mosque that was reported to have provided fundraising, recruitment, and indoctrination services for al-Qaida. Many of the detainee's associates during his stay in the US consisted
    [Show full text]
  • Current and Projected National Security Threats to the United States
    S. HRG. 111–557 CURRENT AND PROJECTED NATIONAL SECURITY THREATS TO THE UNITED STATES HEARING BEFORE THE SELECT COMMITTEE ON INTELLIGENCE OF THE UNITED STATES SENATE ONE HUNDRED ELEVENTH CONGRESS SECOND SESSION FEBRUARY 2, 2010 Printed for the use of the Select Committee on Intelligence ( Available via the World Wide Web: http://www.access.gpo.gov/congress/senate U.S. GOVERNMENT PRINTING OFFICE 56–434 PDF WASHINGTON : 2010 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate Nov 24 2008 14:49 Aug 02, 2010 Jkt 055045 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 C:\DOCS\56434.TXT SHAUN PsN: DPROCT SELECT COMMITTEE ON INTELLIGENCE [Established by S. Res. 400, 94th Cong., 2d Sess.] DIANNE FEINSTEIN, California, Chairman CHRISTOPHER S. BOND, Missouri, Vice Chairman JOHN D. ROCKEFELLER IV, West Virginia ORRIN G. HATCH, Utah RON WYDEN, Oregon OLYMPIA J. SNOWE, Maine EVAN BAYH, Indiana SAXBY CHAMBLISS, Georgia BARBARA A. MIKULSKI, Maryland RICHARD BURR, North Carolina RUSSELL D. FEINGOLD, Wisconsin TOM COBURN, Oklahoma BILL NELSON, Florida JAMES E. RISCH, Idaho SHELDON WHITEHOUSE, Rhode Island HARRY REID, Nevada, Ex Officio MITCH MCCONNELL, Kentucky, Ex Officio CARL LEVIN, Michigan, Ex Officio JOHN MCCAIN, Arizona, Ex Officio DAVID GRANNIS, Staff Director LOUIS B. TUCKER, Minority Staff Director KATHLEEN P. MCGHEE, Chief Clerk (II) VerDate Nov 24 2008 14:49 Aug 02, 2010 Jkt 055045 PO 00000 Frm 00002 Fmt 5904 Sfmt 5904 C:\DOCS\56434.TXT SHAUN PsN: DPROCT CONTENTS FEBRUARY 2, 2010 OPENING STATEMENTS Feinstein, Hon.
    [Show full text]