Commission Regulation (Ec)

Total Page:16

File Type:pdf, Size:1020Kb

Commission Regulation (Ec) L 126/38EN Official Journal of the European Union 19.5.2005 COMMISSION REGULATION (EC) No 757/2005 of 18 May 2005 amending for the 46th time Council Regulation (EC) No 881/2002 imposing certain specific restrictive measures directed against certain persons and entities associated with Usama bin Laden, the Al-Qaida network and the Taliban, and repealing Council Regulation (EC) No 467/2001 THE COMMISSION OF THE EUROPEAN COMMUNITIES, (2) On 16 May 2005, the Sanctions Committee of the United Nations Security Council decided to amend the list of persons, groups and entities to whom the freezing Having regard to the Treaty establishing the European of funds and economic resources should apply. Annex I Community, should therefore be amended accordingly. Having regard to Council Regulation (EC) No 881/2002 of 27 May 2002 imposing certain specific restrictive measures (3) In order to ensure that the measures provided for in this directed against certain persons and entities associated with Regulation are effective, this Regulation must enter into Usama bin Laden, the Al-Qaida network and the Taliban, and force immediately, repealing Council Regulation (EC) No 467/2001 prohibiting the export of certain goods and services to Afghanistan, strengthening the flight ban and extending the freezing of HAS ADOPTED THIS REGULATION: funds and other financial resources in respect of the Taliban 1 of Afghanistan ( ), and in particular Article 7(1), first indent, Article 1 thereof, Annex I to Regulation (EC) No 881/2002 is amended as set out Whereas: in the Annex to this Regulation. (1) Annex I to Regulation (EC) No 881/2002 lists the Article 2 persons, groups and entities covered by the freezing of funds and economic resources pursuant to that Regu- This Regulation shall enter into force on the day of its publi- lation. cation in the Official Journal of the European Union. This Regulation shall be binding in its entirety and directly applicable in all Member States. Done at Brussels, 18 May 2005. For the Commission Eneko LANDÁBURU Director-General for External Relations (1) OJ L 139, 29.5.2002, p. 9. Regulation as last amended by Commission Regulation (EC) No 717/2005 (OJ L 121, 13.5.2005, p. 62). 19.5.2005EN Official Journal of the European Union L 126/39 ANNEX Annex I to Regulation (EC) No 881/2002 is amended as follows: The following entries shall be added under the heading ‘Natural persons’: 1. Joko Pitono (alias (a) Joko Pitoyo, (b) Joko Pintono, (c) Dulmatin, (d) Dul Matin, (e) Abdul Martin, (f) Abdul Matin, (g) Amar Umar, (h) Amar Usman, (i) Anar Usman, (j) Djoko Supriyanto, (k) Jak Imron, (l) Muktamar, (m) Novarianto, (n) Topel). Date of birth: (a) 16.6.1970, (b) 6.6.1970. Place of birth: Petarukan village, Pemalang, Central Java, Indonesia. Nationality: Indonesian. 2. Abu Rusdan (alias (a) Abu Thoriq, (b) Rusdjan, (c) Rusjan, (d) Rusydan, (e) Thoriquddin, (f) Thoriquiddin, (g) Thoriquidin, (h) Toriquddin). Date of birth: 16.8.1960. Place of birth: Kudus, Central Java, Indonesia. 3. Zulkarnaen (alias (a) Zulkarnan, (b) Zulkarnain, (c) Zulkarnin, (d) Arif Sunarso, (e) Aris Sumarsono, (f) Aris Sunarso, (g) Ustad Daud Zulkarnaen, (h) Murshid). Date of birth: 1963. Place of birth: Gebang village, Masaran, Sragen, Central Java, Indonesia. Nationality: Indonesian..
Recommended publications
  • Al-Qaeda: the Many Faces of an Islamist Extremist Threat
    a al-Qaeda: The Many Faces of an Islamist Extremist Threat REPORT OF THE HOUSE PERMANENT SELECT COMMITTEE ON INTELLIGENCE ISBN 0-16-076897-7 90000 9 780160 768972 al-QaedaTh e Many Faces of an Islamist Extremist Th reat REPORT OF THE HOUSE PERMANENT SELECT COMMITTEE ON INTELLIGENCE JUNE 2006 109th Congress Union Calendar No. 355 2d Session Report 109-615 al-Qaeda: The Many Faces of an Islamist Extremist Threat ___________________ REPORT OF THE U.S. HOUSE PERMANENT SELECT COMMITTEE ON INTELLIGENCE APPROVED: JUNE 2006 TOGETHER WITH ADDITIONAL AND MINORITY VIEWS SUBMITTED: SEPTEMBER 2006 Available via the World Wide Web: http://www.gpo.gov/congress/house http://intelligence.house.gov/ September 6, 2006.—Committed to the Committee of the Whole House on the State of the Union and ordered to be printed U.S. GOVERNMENT PRINTING OFFICE Keeping America Informed I www.gpo.gov WASHINGTON : 2006 For sale by the Superintendent of Documents, U.S. Government Printing Offi ce Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC area (202) 512-1800 Fax: (202) 512-2250 Mail: Stop SSOP, Washington, DC 20402-0001 ISBN 0-16-076897-7 i PERMANENT SELECT COMMITTEE ON INTELLIGENCE OF THE HOUSE OF REPRESENTATIVES PETER HOEKSTRA, MICHIGAN, CHAIRMAN RAY LAHOOD, ILLINOIS JANE HARMAN, CALIFORNIA TERRY EVERETT, ALABAMA ALCEE L. HASTINGS, FLORIDA ELTON GALLEGLY, CALIFORNIA SILVESTRE REYES, TEXAS HEATHER WILSON, NEW MEXICO LEONARD L. BOSWELL, IOWA JO ANN DAVIS, VIRGINIA ROBERT E. (BUD) CRAMER, JR., ALABAMA MAC THORNBERRY, TEXAS ANNA G. ESHOO, CALIFORNIA JOHN M. MCHUGH, NEW YORK RUSH D. HOLT, NEW JERSEY TODD TIAHRT, KANSAS C.
    [Show full text]
  • Counter-Insurgency Vs. Counter-Terrorism in Mindanao
    THE PHILIPPINES: COUNTER-INSURGENCY VS. COUNTER-TERRORISM IN MINDANAO Asia Report N°152 – 14 May 2008 TABLE OF CONTENTS EXECUTIVE SUMMARY AND RECOMMENDATIONS................................................. i I. INTRODUCTION .......................................................................................................... 1 II. ISLANDS, FACTIONS AND ALLIANCES ................................................................ 3 III. AHJAG: A MECHANISM THAT WORKED .......................................................... 10 IV. BALIKATAN AND OPLAN ULTIMATUM............................................................. 12 A. EARLY SUCCESSES..............................................................................................................12 B. BREAKDOWN ......................................................................................................................14 C. THE APRIL WAR .................................................................................................................15 V. COLLUSION AND COOPERATION ....................................................................... 16 A. THE AL-BARKA INCIDENT: JUNE 2007................................................................................17 B. THE IPIL INCIDENT: FEBRUARY 2008 ..................................................................................18 C. THE MANY DEATHS OF DULMATIN......................................................................................18 D. THE GEOGRAPHICAL REACH OF TERRORISM IN MINDANAO ................................................19
    [Show full text]
  • Counter Terrorist Trends and Analysis ISSN 2382-6444 | Volume 7, Issue 4 | May 2015
    Counter Terrorist Trends and Analysis www.rsis.edu.sg ISSN 2382-6444 | Volume 7, Issue 4 | May 2015 A JOURNAL OF THE INTERNATIONAL CENTRE FOR POLITICAL VIOLENCE AND TERRORISM RESEARCH The Call of ISIS: The Medium and the Message Attracting Southeast Asians ANTON CHAN Myanmar at The Crossroads: The Shadow of Jihadist Extremism LAURA STECKMAN The Road to ISIS: How Indonesian Jihadists Travel to Syria and Iraq MUH TAUFIQURROHMAN Impact of ISIS’ Online Campaign in Southeast Asia NUR AZLIN MOHAMED YASIN Counter Terrorist Trends and Analysis Volume 7, Issue 4 | May 2015 1 Building a Global Network for Security Editorial Note Southeast Asia Focus e are pleased to release Volume 7, Issue 4 (May 2015) of the Counter Terrorist Trends and Analysis (CTTA) at www.rsis.edu.sg/research/icpvtr/ctta (ISSN 2382-6444) by the International Centre for Political Violence and Terrorism Research at the S. Rajaratnam School of International Studies, Nanyang Technological University, Singapore. W TheW threat of the Islamic State of Iraq and Greater Syria (ISIS) has reverberated in Southeast Asia, from where individuals, including young women and individuals with families, have travelled to conflict zones in Syria and Iraq. The seriousness of the threat of ISIS however, comes from Southeast Asian fighters who will return home from battle with fresh combat skills, radical ideologies and extensive networks. The potential for these Southeast Asian terrorist returnees to mount attacks and to further radicalise and recruit other individuals, is therefore, of notable concern to governments in this region. In this issue, Anton Chan discusses the medium and the message used by ISIS that has appealed to its legions of supporters in Southeast Asia.
    [Show full text]
  • Security Council Distr.: General 8 March 2007
    United Nations S/2007/132 Security Council Distr.: General 8 March 2007 Original: English Letter dated 7 March 2007 from the Chairman of the Security Council Committee established pursuant to resolution 1267 (1999) concerning Al-Qaida and the Taliban and associated individuals and entities addressed to the President of the Security Council I have the honour to transmit herewith the sixth report of the Analytical Support and Sanctions Monitoring Team established pursuant to resolution 1526 (2004) and extended by resolutions 1617 (2005) and 1735 (2006). This report was submitted to the Security Council Committee established pursuant to resolution 1267 (1999) concerning Al-Qaida and the Taliban and associated individuals and entities on 7 November 2006. The report was discussed by the Committee, and clarifications were made by the Monitoring Team. The recommendations in the report are currently being considered by the Committee. I should be grateful if the attached report could be brought to the attention of the Council members and issued as a document of the Security Council. (Signed) Johan Verbeke Chairman Security Council Committee established pursuant to resolution 1267 (1999) concerning Al-Qaida and the Taliban and associated individuals and entities 06-62270 (E) 140307 *0662270* S/2007/132 Enclosure Letter dated 7 November 2006 from the Coordinator of the Analytical Support and Sanctions Monitoring Team established pursuant to resolution 1526 (2004) addressed to the Chairman of the Security Council Committee established pursuant to resolution 1267 (1999) concerning Al-Qaida and the Taliban and associated individuals and entities The Analytical Support and Sanctions Monitoring Team established pursuant to Security Council resolution 1526 (2004) and extended by Council resolution 1617 (2005) concerning Al-Qaida and the Taliban and associated individuals and entities has the honour to transmit to you its sixth report, in accordance with annex I to resolution 1617 (2005).
    [Show full text]
  • Estimated Age
    The US National Counterterrorism Center is pleased to present the 2016 edition of the Counterterrorism (CT) Calendar. Since 2003, we have published the calendar in a daily planner format that provides our consumers with a variety of information related to international terrorism, including wanted terrorists; terrorist group fact sheets; technical issue related to terrorist tactics, techniques, and procedures; and potential dates of importance that terrorists might consider when planning attacks. The cover of this year’s CT Calendar highlights terrorists’ growing use of social media and other emerging online technologies to recruit, radicalize, and encourage adherents to carry out attacks. This year will be the last hardcopy publication of the calendar, as growing production costs necessitate our transition to more cost- effective dissemination methods. In the coming years, NCTC will use a variety of online and other media platforms to continue to share the valuable information found in the CT Calendar with a broad customer set, including our Federal, State, Local, and Tribal law enforcement partners; agencies across the Intelligence Community; private sector partners; and the US public. On behalf of NCTC, I want to thank all the consumers of the CT Calendar during the past 12 years. We hope you continue to find the CT Calendar beneficial to your daily efforts. Sincerely, Nicholas J. Rasmussen Director The US National Counterterrorism Center is pleased to present the 2016 edition of the Counterterrorism (CT) Calendar. This edition, like others since the Calendar was first published in daily planner format in 2003, contains many features across the full range of issues pertaining to international terrorism: terrorist groups, wanted terrorists, and technical pages on various threat-related topics.
    [Show full text]
  • NCTC Annex of the Country Reports on Terrorism 2008
    Country Reports on Terrorism 2008 April 2009 ________________________________ United States Department of State Publication Office of the Coordinator for Counterterrorism Released April 2009 Page | 1 Country Reports on Terrorism 2008 is submitted in compliance with Title 22 of the United States Code, Section 2656f (the ―Act‖), which requires the Department of State to provide to Congress a full and complete annual report on terrorism for those countries and groups meeting the criteria of the Act. COUNTRY REPORTS ON TERRORISM 2008 Table of Contents Chapter 1. Strategic Assessment Chapter 2. Country Reports Africa Overview Trans-Sahara Counterterrorism Partnership The African Union Angola Botswana Burkina Faso Burundi Comoros Democratic Republic of the Congo Cote D‘Ivoire Djibouti Eritrea Ethiopia Ghana Kenya Liberia Madagascar Mali Mauritania Mauritius Namibia Nigeria Rwanda Senegal Somalia South Africa Tanzania Uganda Zambia Zimbabwe Page | 2 East Asia and Pacific Overview Australia Burma Cambodia China o Hong Kong o Macau Indonesia Japan Republic of Korea (South Korea) Democratic People‘s Republic of Korea (North Korea) Laos Malaysia Micronesia, Federated States of Mongolia New Zealand Papua New Guinea, Solomon Islands, or Vanaatu Philippines Singapore Taiwan Thailand Europe Overview Albania Armenia Austria Azerbaijan Belgium Bosnia and Herzegovina Bulgaria Croatia Cyprus Czech Republic Denmark Estonia Finland France Georgia Germany Greece Hungary Iceland Ireland Italy Kosovo Latvia Page | 3 Lithuania Macedonia Malta Moldova Montenegro
    [Show full text]
  • The Sources of the Abu Sayyaf's Resilience in the Southern
    MAY 2010 . VOL 3 . ISSUE 5 A number of conclusions can be drawn The Sources of the Abu the creation of AHAI in 1989 to pursue from this incident. The kidnappings Jihad Fi Sabilillah, defined as “fighting and and Khwaja’s subsequent execution Sayyaf’s Resilience in the dying for the cause of Islam.”2 Yet it show the generational change among Southern Philippines was only in 1993 when AHAI formally militants in Pakistan and the evolving organized with Abdurajak as the amir.3 relationship between the ISI and By Rommel C. Banlaoi Taliban fighters. Khwaja, for example, Since the formal launch of AHAI in was a controversial figure due to his since the launching of the global war 1989, Abdurajak delivered several associations with the ISI and links with on terrorism in the aftermath of the khutbahs or sermons and released several certain militant groups. After he retired September 11, 2001 terrorist attacks on fatawa using the nom-de-guerre “Abu from the military, he worked as a lawyer the United States, the Philippines has Sayyaf,” in honor of Afghan resistance and defended suspected militants been engaged in a prolonged military fighter Abdul Rasul Sayyaf.4 While and Islamist politicians.17 He even campaign against the Abu Sayyaf Group Abdurajak idolized this Afghan leader, reportedly once maintained contacts (ASG). Key ASG leaders have been the suggestion that Abdurajak was an with Usama bin Ladin. It appears that killed in this battle, while others have Afghan war veteran is still a subject the Asian Tigers killed him as revenge been imprisoned for various crimes for verification.5 Some living Filipino against the ISI and against the jihadist associated with terrorism.
    [Show full text]
  • The Internal Dynamics of Terrorist Cells: a Social Network
    THE INTERNAL DYNAMICS OF TERRORIST CELLS: A SOCIAL NETWORK ANALYSIS OF TERRORIST CELLS IN AN AUSTRALIAN CONTEXT STUART KOSCHADE Bachelor of Arts (First Class Honours) Centre for Social Change Research Queensland University of Technology Thesis submitted for the Doctor of Philosophy qualification 2007 i KEYWORDS: terrorism, terrorist cells, terrorism studies, social network analysis, Croatian Revolutionary Brotherhood, Ustashi, Ustasha, Aum Shinrikyo, Lashkar-e- Taiba, Jemaah Islamiyah, history of terrorism, Australia, destabilisation techniques, betweenness, critical node, counter-terrorism, Willie Brigitte, Faheem Khalid Lodhi, Shoko Asahara, Imam Samudra, Muklas, Bali bombing, Islamic extremism. ABSTRACT: The rise of the 21st Century Islamic extremist movement, which was mobilised by the al-Qaeda attacks of and responses to September 11, 2001, heralds a new period in the history of terrorism. The increased frequency and intensity of this type of terrorism affects every nation in the world, not least Australia. Rising to meet the challenges posed by terrorism is the field of terrorism studies, the field which aims at understanding, explaining, and countering terrorism. Despite the importance of the field, it has been beleaguered with criticisms since its inception as a response to the rise of international terrorism. These criticisms specifically aim at the field’s lack of objectivity, abstraction, levels of research, and levels of analysis. These criticisms were the impetus behind the adoption of the methodology of this thesis, which offers the distinct ability to understand, explain, and forecast the way in which terrorists interact within covert cells. Through social network analysis, this thesis examines four terrorist cells that have operated in or against Australia.
    [Show full text]
  • Information on Abu Sayyaf Group (ASG), Jamiat Ul-Ansar (Jua)
    ABU SAYYAF GROUP (ASG) Also known as: Al-Harakat Al-Islamiyya; Al-Harakat-ul Al-Islamiyya; Al- Harakatul-Islamia; Al-Harakat Al-Aslamiya; Abou Sayaf Armed Band; Abu Sayaff Group; Abou Sayyef Group and Mujahideen Commando Freedom Fighters The following information is based on publicly available details about Abu Sayyaf Group (ASG). ASG is listed in the United Nation’s 1267 Committee’s Consolidated List as an entity associated with al-Qa’ida and as a proscribed organisation by the governments of Canada, New Zealand, the United Kingdom and the United States of America. Current status of the ASG The Abu Sayyaf Group (ASG) was founded in 1991 as a militant Islamic movement by Abdurajak Janjalani (a.k.a. Abdulrajik Janjalani), who deployed to Afghanistan in the late 1980’s as a mujahid, where he was influenced by radical Wahhabi thought. His original intent was to fuse Salafi Wahhabist thought with a southern Philippines separatist agenda. Following the death of Abdurajak Janjalani in a shootout with police in Basilan, December 1998, his brother Khadaffy Janjalani became titular head or ‘emir’ until the latter’s death in 2006. It is currently unclear whether a single leader has emerged to lead the ASG since Khaddaffy Janjalani’s death. In mid-2007 the Philippines military announced that Middle Eastern trained religious scholar, Yasir Igasan, had taken command of the group, although there is information that ASG elder statesman, Commander Radullan Sahiron, may be the group’s nominal leader. The current primary linkage of the ASG to anti-Western terrorism is its provision of assistance to Jemaah Islamiyah (JI) fugitives.
    [Show full text]
  • Abu Sayyaf Group (ASG): an Al- Qaeda Associate Case Study P
    Abu Sayyaf Group (ASG): An Al- Qaeda Associate Case Study P. Kathleen Hammerberg and Pamela G. Faber With contributions from Alexander Powell October 2017 DISTRIBUTION STATEMENT A. Approved for public release: distribution unlimited. This document contains the best opinion of CNA at the time of issue. It does not necessarily represent the opinion of the sponsor. Distribution DISTRIBUTION STATEMENT A. Approved for public release: distribution unlimited. SPECIFIC AUTHORITY: N00014-16-D-5003 10/27/2017 Photography Credit: Michael Markowitz, CNA. Approved by: October 2017 Dr. Jonathan Schroden, Director Center for Stability and Development Center for Strategic Studies This work was performed under Federal Government Contract No. N00014-16-D-5003. Copyright © 2017 CNA Abstract Section 1228 of the 2015 National Defense Authorization Act (NDAA) states: “The Secretary of Defense, in coordination with the Secretary of State and the Director of National Intelligence, shall provide for the conduct of an independent assessment of the effectiveness of the United States’ efforts to disrupt, dismantle, and defeat Al- Qaeda, including its affiliated groups, associated groups, and adherents since September 11, 2001.” The Assistant Secretary of Defense for Special Operations/Low Intensity Conflict (ASD (SO/LIC)) asked CNA to conduct this independent assessment, which was completed in August 2017. In order to conduct this assessment, CNA used a comparative methodology that included eight case studies on groups affiliated or associated with Al-Qaeda. These case studies were then used as a dataset for cross-case comparison. This document is a stand-alone version of the Abu Sayyaf Group (ASG) case study used in the Independent Assessment.
    [Show full text]
  • CTC Sentinel 3 (10)
    OCTOBER 2010 . VOL 3 . ISSUE 10 COMBATING TERRORISM CENTER AT WEST POINT CTC SENTINEL OBJECTIVE . RELEVANT . RIGOROUS Contents The Strengths and Weaknesses FEATURE ARTICLE 1 The Strengths and Weaknesses of Jihadist Ideology of Jihadist Ideology By Nelly Lahoud By Nelly Lahoud REPORTS 4 The Role of Lashkar-i-Islam in Pakistan’s Khyber Agency By Syed Manzar Abbas Zaidi 6 The Torkham Border Closure and Attacks on NATO Supply Convoys in Pakistan By Tayyab Ali Shah 9 Mitigating the Further Radicalization of India’s Muslim Community By Luv Puri 11 From Iraq to Yemen: Al-Qa`ida’s Shifting Strategies By Ryan Evans 15 Indonesia’s Case Against Abu Bakar Bashir By Arabinda Acharya and Fatima Astuti 18 Recent Highlights in Terrorist Activity 20 CTC Sentinel Staff & Contacts The site of a suicide bomb attack in Quetta on September 3, 2010. - Photo by Banaras Khan/AFP/Getty Images he central argument espoused human rights and liberties as long as such by jihadist ideologues and singing serves and benefits its interests.2 leaders is that the Muslim Jihadists have thus determined that world is plagued by grievances jihad is the only path toward genuine Tand injustices, many of which are caused change in this world and divine reward by the West. According to their logic, the in the hereafter. Their jihad, they claim, United States and corrupt, oppressive is to fight to make God’s Law supreme on Muslim regimes are two sides of the same earth. Only then can all Muslims, rulers coin. Jihadist leaders warn Muslims not and citizenry, be equally accountable to About the CTC Sentinel to fall for Western “deceptive” ideas God’s Law.
    [Show full text]
  • CTC SENTINEL Objective
    OCTOBER 2010 . VOL 3 . ISSUE 10 COMBATING TERRORISM CENTER AT WEST POINT CTC SENTINEL OBJECTIVE . RELEVANT . RIGOROUS Contents The Strengths and Weaknesses FEATURE ARTICLE 1 The Strengths and Weaknesses of Jihadist Ideology of Jihadist Ideology By Nelly Lahoud By Nelly Lahoud REPORTS 4 The Role of Lashkar-i-Islam in Pakistan’s Khyber Agency By Syed Manzar Abbas Zaidi 6 The Torkham Border Closure and Attacks on NATO Supply Convoys in Pakistan By Tayyab Ali Shah 9 Mitigating the Further Radicalization of India’s Muslim Community By Luv Puri 11 From Iraq to Yemen: Al-Qa`ida’s Shifting Strategies By Ryan Evans 15 Indonesia’s Case Against Abu Bakar Bashir By Arabinda Acharya and Fatima Astuti 18 Recent Highlights in Terrorist Activity 20 CTC Sentinel Staff & Contacts The site of a suicide bomb attack in Quetta on September 3, 2010. - Photo by Banaras Khan/AFP/Getty Images he central argument espoused human rights and liberties as long as such by jihadist ideologues and singing serves and benefits its interests.2 leaders is that the Muslim Jihadists have thus determined that world is plagued by grievances jihad is the only path toward genuine Tand injustices, many of which are caused change in this world and divine reward by the West. According to their logic, the in the hereafter. Their jihad, they claim, United States and corrupt, oppressive is to fight to make God’s Law supreme on Muslim regimes are two sides of the same earth. Only then can all Muslims, rulers coin. Jihadist leaders warn Muslims not and citizenry, be equally accountable to About the CTC Sentinel to fall for Western “deceptive” ideas God’s Law.
    [Show full text]