IRREGULAR FORCES FINANCING HANDBOOK (Continued) of “Western Influence”; AQ’S Goals Have Now Evolved to Groups Is the Communist Party of India-Maoist (CPI-M)

Total Page:16

File Type:pdf, Size:1020Kb

IRREGULAR FORCES FINANCING HANDBOOK (Continued) of “Western Influence”; AQ’S Goals Have Now Evolved to Groups Is the Communist Party of India-Maoist (CPI-M) Fort Leavenworth, Kansas Volume 3, Issue 3 March 2012 RREGULAR ORCES INANCING ANDBOOK I F F H INSIDE THIS ISSUE By H. David Pendleton and Angela Wilkins, OEA Team How do irregular forces finance their operations? TRISA’s OEA Team took a Irregular Forces Financing ......... 1 critical look at this topic culminating in its most recent handbook, “Irregular Boko Haram ................................. 3 Forces Financing.” The handbook covers a variety of threat actors, explaining the Irregular OPFOR TC .................... 5 legal and illegal methods they use to finance their operations and activities. Political Soccer in Egypt............. 6 After the consideration of many different groups, the TRISA OEA Team selected Attacks on Nuke Program ........... 7 eight groups, or threat actors, to profile. The OEA Team based its selection on the objective to cover many dissimilar groups with different motivations, diverse Attacks on Israelis ..................... 10 funding methods, and various sizes. The eight threat actors range from a single China’s Stealth Fighter Jet ....... 13 person or “lone wolf” that operated primarily in one country to an organized crime syndicate that operates worldwide. The groups profiled by the OEA Team Objectives for Training ............. 14 are the Sinaloa Drug Cartel, Albanian Organized Crime, al Shabaab, Cyber Threat Tier System ......... 16 Hezbollah, the Lord’s Resistance Army (LRA), the Naxalites, al-Qaeda, and WEG: French Armored Carriers18 the Lone Wolf Anders Behring Breivik. Monthly wrap-up of CTID daily Each threat actor received similar treatment, but not necessarily the same updates .................................. 19 coverage, based on a variety of factors such as information availability, size, and breadth of the group’s activity. Each section of the report provides general information about the group’s purpose(s) and goal(s); leadership, structure, and location of its activities; common tactics, techniques, and procedures (TTP); and its major actions. Following that is an in-depth section about the group’s financing methods. Red Diamond is produced monthly by the Threat Al Shabaab is an insurgent group that seeks to create an Islamic state in Somalia Integration Directorate of the and whose activities have spread to Kenya and Uganda. Al Shabaab funds its TRADOC G2 Intelligence jihad through extortion, illegal taxes, aid from the global diaspora, covert aid Support Activity (TRISA). from Eritrea, and smuggling. Al Shabaab TTP include armed attacks with small Send suggestions and arms, beheadings, IEDs, suicide bombings, assassinations, kidnappings, and feedback to Ms. Penny Mellies ([email protected]). visits to local areas to offer assistance in return for support. Al Shabaab confines much of its activity to the three African countries mentioned above. While al-Qaeda (AQ) maintains a presence in many countries around the world, the majority of its activity occurs in the Middle East. Abdullah Azzam and Osama bin Laden founded AQ in the late 1980s to rid Muslim countries NEWSLETTER DISTRIBUTION UNLIMITED IRREGULAR FORCES FINANCING HANDBOOK (continued) of “Western influence”; AQ’s goals have now evolved to groups is the Communist Party of India-Maoist (CPI-M). replace governments in Muslim-dominated countries with Over the last two decades, for various reasons, many of more fundamentalist regimes. While reported by many these communist groups have merged together. The sources, AQ did not fund its operations from bin Laden’s Naxalite groups’ TTP include direct combat with any of personal wealth, bin Laden’s Sudanese businesses, the Indian government forces that oppose them and conflict diamonds, drug trafficking, state support, or from damaging any symbols of the legitimate Indian support from American Muslims. Instead, AQ received government. To fund their cause, the Naxalites resort to most of its support from either individual donations in the robbery, extortion, illegal mining and woodcutting form of zakat, one of the five pillars of the Islamic faith, operations, and limited drug smuggling. Some rich or from money siphoned off from legitimate charities. AQ supporters, primarily educated elites in Indian cities activities range from suicide bombers to the 9/11 attacks sympathetic to the Naxalites’ cause, also provide some in the U.S. financial support. The group Hezbollah is The purpose of Albanian a Lebanese-based Organized Crime is terrorist organization simply to make money to that wants to establish an support its member’s Islamic state lifestyles. While the encompassing both organized crime Lebanon and Israel, with syndicate began in most of its activity Albania, it has now directed against the spread to most of Europe, Israelis. Hezbollah Canada, and even the operates in Lebanon, United States. Albanian Israel, the West Bank, Organized Crime makes Gaza, and Syria. most of its money from Hezbollah TTP includes the drug trade and human suicide bombings, rocket trafficking. Among other attacks, kidnappings, criminal organizations, conventional and the Albanian group is irregular military tactics, feared owing to a and the operation of charities. Major funding sources for reputation of extreme violence. They have recently Hezbollah include state support, charities, Hezbollah- formed alliances with South American drug cartels to owned businesses, and criminal activity such as drug expand their European operations to the United States. trafficking, money laundering, illegal arms trading, cigarette smuggling, and counterfeiting. A group called the Sinaloa Cartel is a loosely-aligned confederation of drug trafficking organizations (DTOs) The Lord’s Resistance Army’s (LRA’s) original that operates out of Mexico to push drugs into the United purpose was to establish a government in Uganda based States. The Sinaloa Cartel, however, has now branched on the biblical Ten Commandments, but the LRA now into operations in Europe, Asia, and Australia. The DTOs has abandoned most of its earlier principles. The LRA smuggle cocaine, heroin, and marijuana through a variety operates throughout central Africa as nomads that pass of sources that include cargo planes, submarines, through Uganda, South Sudan, the Democratic Republic container ships, fishing vessels, buses, automobiles, rail of the Congo (DRC), and the Central African Republic cars, tractor trailers, and tunnels. Besides drug sales, (CAR). The LRA forages and plunders for survival since money laundering is a major source of revenue for the the Sudanese government ceased its support in 2005. An cartel. Due to the competition with other cartels, much extremely violent group, LRA TTP includes kidnapping, violent crime occurs throughout Mexico associated with abduction, enslavement, forced recruitment of children, the drug trade. rape, torture, and massacres. While Anders Behring Breivik is only a single person, A loosely connected group of 27 communist-influenced he provides an excellent example of what a “Lone Wolf” organizations that wish to establish a Maoist-type threat actor can accomplish through legitimate government in India based on the Chinese model fundraising methods. Breivik held a grudge against what comprise what the Indian government calls the Naxalite he felt were Norway’s lax immigration policies, hated movement. The largest and most organized of these “multiculturalism,” detested “political correctness,” and Red Diamond Page 2 RREGULAR ORCES INANCING ANDBOOK (continued) I F F H feared an eventual Muslim majority in Oslo. This created actors at the far ends of the spectrum. One vignette is a need in him to maximize the number of casualties in his about the Norwegian Lone Wolf Bomber that covers planned attack in order to create the greatest loss possible Breivik’s timeline from his birth to the attacks. Also to Norway’s governing Labor Party. Breivik raised the included in the vignette is a detailed breakdown of money necessary for his July 2011 shooting spree by Breivik’s financial activities that he used to support his working for a legitimate company, attack. The second vignette is one of establishing his own computer the Sinaloa drug cartel’s money- company, moving back into his Irregular force threat actors use laundering schemes that involved mother’s house to save money, and tried and true methods to Vikram Datta. The Sinaloa Cartel dabbling in the stock market. Even used Datta, and possible conspired though Breivik lost money in the finance their operations. Most with him, to launder drug money stock market and his computer of them have a global network through his four perfume stores company went bankrupt, he still located in various parts of the U.S. managed to save enough money to of associates that participate in Datta was arrested in 2011 and conduct the attack that he began sentenced to 20 years in prison in the money stream. planning in 2002. Breivik’s IED January 2012. attack and subsequent shooting of teenagers on Utoeya Island was the greatest loss of life in Analysis of these irregular force threat actors and their Norway since World War II. financial activities reveals that, with the exception of the Lone Wolf, these actors use reliable methods that they Included with each irregular force groups section is a have counted on for years or even decades. Some of the world map that clearly delineates the group’s AO, areas larger groups, such as Hezbollah, Albanian Organized of financial activities, and any State support the group Crime, and al Shabaab for instance, have a global receives. These
Recommended publications
  • Iran and Israel's National Security in the Aftermath of 2003 Regime Change in Iraq
    Durham E-Theses IRAN AND ISRAEL'S NATIONAL SECURITY IN THE AFTERMATH OF 2003 REGIME CHANGE IN IRAQ ALOTHAIMIN, IBRAHIM,ABDULRAHMAN,I How to cite: ALOTHAIMIN, IBRAHIM,ABDULRAHMAN,I (2012) IRAN AND ISRAEL'S NATIONAL SECURITY IN THE AFTERMATH OF 2003 REGIME CHANGE IN IRAQ , Durham theses, Durham University. Available at Durham E-Theses Online: http://etheses.dur.ac.uk/4445/ Use policy The full-text may be used and/or reproduced, and given to third parties in any format or medium, without prior permission or charge, for personal research or study, educational, or not-for-prot purposes provided that: • a full bibliographic reference is made to the original source • a link is made to the metadata record in Durham E-Theses • the full-text is not changed in any way The full-text must not be sold in any format or medium without the formal permission of the copyright holders. Please consult the full Durham E-Theses policy for further details. Academic Support Oce, Durham University, University Oce, Old Elvet, Durham DH1 3HP e-mail: [email protected] Tel: +44 0191 334 6107 http://etheses.dur.ac.uk 2 . IRAN AND ISRAEL’S NATIONAL SECURITY IN THE AFTERMATH OF 2003 REGIME CHANGE IN IRAQ BY: IBRAHIM A. ALOTHAIMIN A thesis submitted to Durham University in fulfilment of the requirements for the degree of Doctor of Philosophy DURHAM UNIVERSITY GOVERNMENT AND INTERNATIONAL AFFAIRS March 2012 1 2 Abstract Following the US-led invasion of Iraq in 2003, Iran has continued to pose a serious security threat to Israel.
    [Show full text]
  • Iran's Nuclear Ambitions From
    IDENTITY AND LEGITIMACY: IRAN’S NUCLEAR AMBITIONS FROM NON- TRADITIONAL PERSPECTIVES Pupak Mohebali Doctor of Philosophy University of York Politics June 2017 Abstract This thesis examines the impact of Iranian elites’ conceptions of national identity on decisions affecting Iran's nuclear programme and the P5+1 nuclear negotiations. “Why has the development of an indigenous nuclear fuel cycle been portrayed as a unifying symbol of national identity in Iran, especially since 2002 following the revelation of clandestine nuclear activities”? This is the key research question that explores the Iranian political elites’ perspectives on nuclear policy actions. My main empirical data is elite interviews. Another valuable source of empirical data is a discourse analysis of Iranian leaders’ statements on various aspects of the nuclear programme. The major focus of the thesis is how the discourses of Iranian national identity have been influential in nuclear decision-making among the national elites. In this thesis, I examine Iranian national identity components, including Persian nationalism, Shia Islamic identity, Islamic Revolutionary ideology, and modernity and technological advancement. Traditional rationalist IR approaches, such as realism fail to explain how effective national identity is in the context of foreign policy decision-making. I thus discuss the connection between national identity, prestige and bargaining leverage using a social constructivist approach. According to constructivism, states’ cultures and identities are not established realities, but the outcomes of historical and social processes. The Iranian nuclear programme has a symbolic nature that mingles with socially constructed values. There is the need to look at Iran’s nuclear intentions not necessarily through the lens of a nuclear weapons programme, but rather through the regime’s overall nuclear aspirations.
    [Show full text]
  • Attacks Against the Iranian Nuclear Program
    OEA Team Threat Report G-2 G-2 Title Attacks Against the Iranian Date Nuclear Program 15 February 2012 US Army TRADOC G2 TRADOC Intelligence Support Activity (TRISA) – Threats Dr. Majid Shahriari’s car after the attack1 Publication Date: 15 February 2012 US Army TRADOC G2 Information Cut-Off Date: 25 January 2012 TRADOC Intelligence Support Activity (TRISA) – Threats 1 U.S. UNCLASSIFIED U.S. UNCLASSIFIED OEA Team Threat Report G-2 Purpose To inform readers of the locations of Iran’s six major nuclear sites To inform deploying units, trainers, and scenario writers of the attacks and accidents that have plagued the Iranian nuclear program over the past 12 years To identify the various tactics, techniques, and procedures (TTP) used to assassinate scientists associated with the Iranian nuclear program To identify other methods used to damage the Iranian nuclear program over the past 12 years Product Caveat: This presentation has been developed from multiple unclassified sources and is primarily intended for use as a training product for the Department of Army. This briefing should not be considered a finished intelligence product, nor used in such a manner. 2 U.S. UNCLASSIFIED OEA Team Threat Report G-2 Executive Summary Provides a map of the location of Iran’s 6 major nuclear sites Presents a timeline of the accidents, attacks, and assassinations associated with the Iranian nuclear programs since 2001 Provides information on the assassination or the attempts on the lives of scientists and other negative incidents associated with the Iranian nuclear program Includes civilian experts’ speculation about the actor or actors involved with the attempts to derail the Iranian nuclear program Provides additional negative events in Iran that may or may not be associated with its nuclear program 3 U.S.
    [Show full text]
  • Highlights of Iran's Perilous Pursuit of Nuclear Weapons
    INSTITUTE FOR SCIENCE AND INTERNATIONAL SECURITY REPORT Highlights of Iran’s Perilous Pursuit of Nuclear Weapons By David Albright with Sarah Burkhard and the Good ISIS Team August 25, 2021 Iran’s Perilous Pursuit of Nuclear Weapons chronicles the Islamic Republic of Iran’s effort to acquire nuclear weapons. It started slowly, building to a crash nuclear weapons program in the early 2000s to create five nuclear weapons and an industrial complex to produce many more. Under international pressure, fearful of military attack, the program was driven to downsize and deeper secrecy. Nonetheless, Iran remains on the brink of becoming a nuclear weapons power; its nuclear material production capabilities stronger than ever, its weaponization capabilities lurking under the surface. But just how close did Iran get to nuclear weapons during its crash program and how close is it today? Up until the events of a cold, clear night in January 2018, the world could only guess. In a dramatic nighttime raid, the Israeli Foreign Intelligence Service Mossad broke into a warehouse in Tehran and seized a large cache of documents detailing Iran’s darkest and long- denied secret. The Amad Plan, the codename for its crash nuclear weapons program, was far larger and made much more progress than previously known. Containing many top secret details, the seized documents offer unprecedented insights into Iran’s progress—and the hurdles it faced in building nuclear weapons. With what Iran learned about building nuclear weapons during the Amad Plan, combined with its subsequent accomplishments, the Islamic Republic has developed a sophisticated capability to make nuclear weapons.
    [Show full text]
  • Operation “Olympic Games” Securing Memory Sharing
    OPERATION “OLYMPIC GAMES” SECURING MEMORY SHARING FOR CLOUD TENANTS Kshitij Yadav Associate Sales Engineer Analyst Dell EMC [email protected] Abhiram T.S. Associate Sales Engineer Analyst Dell EMC [email protected] Knowledge Sharing Article © 2020 Dell Inc. or its subsidiaries. The Dell Technologies Proven Professional Certification program validates a wide range of skills and competencies across multiple technologies and products. From Associate, entry-level courses to Expert-level, experience-based exams, all professionals in or looking to begin a career in IT benefit from industry-leading training and certification paths from one of the world’s most trusted technology partners. Proven Professional certifications include: • Cloud • Converged/Hyperconverged Infrastructure • Data Protection • Data Science • Networking • Security • Servers • Storage • Enterprise Architect Courses are offered to meet different learning styles and schedules, including self-paced On Demand, remote-based Virtual Instructor-Led and in-person Classrooms. Whether you are an experienced IT professional or just getting started, Dell Technologies Proven Professional certifications are designed to clearly signal proficiency to colleagues and employers. Learn more at www.dell.com/certification 2020 Dell Technologies Proven Professional Knowledge Sharing 2 Table of Contents Introduction .................................................................................................................................................. 4 Stuxnet .....................................................................................................................................................
    [Show full text]
  • Protect Education from Attack GCPEA
    Global Coalition to Protect Education from Attack GCPEA EDUCATION UNDER ATTACK Global Coalition to Protect GCPEA Education from Attack This study is published by the Global Coalition to Protect Education from Attack (GCPEA), an inter-agency coalition formed in 2010 by organizations working in the fields of education in emergencies and conflict-affected contexts, higher education, protection, international human rights and humanitarian law who were concerned about ongoing attacks on educational institutions, their students and staff in countries affected by conflict and insecurity. GCPEA is a coalition of organizations that includes: the Council for Assisting Refugee Academics (CARA), Human Rights Watch, the Institute of International Education, the Office of the United Nations High Commissioner for Refugees (UNHCR), Protect Education in Insecurity and Conflict (PEIC, a programme of Education Above All), Save the Children, the Scholars at Risk Network, the United Nations Children’s Fund (UNICEF) and the United Nations Educational, Scientific and Cultural Organization (UNESCO). GCPEA is a project of the Tides Center, a non-profit 501(c)(3) organization. This study is the result of independent external research commissioned by GCPEA. It is independent of the individual member organizations of the Steering Committee of GCPEA and does not necessarily reflect the views of the Steering Committee member organizations. CONTRIBUTORS Project team leader/Chief editor: Mark Richmond GCPEA would like to thank Julia Freedson, Vernor Muñoz and Lead researcher:
    [Show full text]
  • The Confrontation with Iran: a Covert War
    The Confrontation with Iran: A Covert War By Akbar E. Torbat January 20, 2012 "Information Clearing House" --- The Control over the oil-rich regions of the Middle East and North Africa is strategically very important for the US and its Western allies. To expand their domination over the oil-rich regions, the US and its allies are trying to destabilize the countries that are not under their control so that they can install new client regimes in their place. After the US - NATO success to control the oil-rich Libya, it appears that the next would be the oil-rich Iran. In recent years, Iran has significantly progressed in science and technology. The US and its allies are concerned that Iran’s progress will deter their imperial hegemony in the Persian Gulf region. To contain Iran, the US & its allies have used the Iranian nuclear program as a pretext to weaken Iran by imposing sanctions against it. In addition to the economic sanctions that have been in effect for some time, the US and its allies have recently confronted Iran in several other fronts, including covert operations, freezing assets, cutting ties with Iran’s Central Bank, threatening to attack Iran’s nuclear installations, trying to overthrow Iran’s ally President Bashar al-Assad in Syria, and media campaigns to foment a soft- coup. Here is how these actions have increased tensions between Iran and the West. Fomenting a Velvet Revolution Iran’s relations with the West improved during 1990s and early 2000s through a faction of Islamic clerics, the so-called “moderate clerics”, affiliated with the Iranian affluent and merchant class.
    [Show full text]
  • Iran: Limited Retaliation for Assassination of Nuclear Scientist Likely
    The Cambridge Security Initiative IRAN: LIMITED RETALIATION FOR ASSASSINATION OF NUCLEAR SCIENTIST LIKELY DECEMBER 2020 Richard C. Baffa Iran almost certainly will retaliate for the assassination of its top nuclear scientist, Mohsen Fakhrizadeh; however, Tehran’s response probably will be limited, proportional, and in kind, calculated to avoid a broader regional conflict and keep the door open for negotiations and sanctions relief with the incoming Biden administration. Iranian leaders rapidly condemned the assassination and blamed Israel; some also implicated the US in the attack. Iran’s top nuclear scientist was assassinated near Tehran on 27 November, prompting the Supreme National Security Council to convene an emergency meeting. Fakhrizadeh was considered the father of Iran’s clandestine nuclear weapons program known as the “Amad project”, according to US and Israeli intelligence. A 2011 International Atomic Energy Agency report indicated he was a central figure in suspected Iranian work to develop technology and skills needed for nuclear weapons, including designing a warhead small enough to fit atop a missile and survive re-entry into the atmosphere. Iran repeatedly refused to allow IAEA inspectors access to Fakhrizadeh and has consistently denied it has or has had a nuclear weapons program. Fakhrizadeh would have played a vital role in the event Tehran decided to jump start its weapons program. Senior Iranian officials began making statements within a few hours of his death, condemning the assassination, blaming Israel and the U.S. and vowing to retaliate. Their response, however, tempered expectations for a rapid, military response. Supreme Leader Ayatollah Ali Khamenei said Iran’s first priority was “definitive punishment of the perpetrators and those who ordered it,” but he added, “The Iranian nation is smarter than falling into the trap of the Zionist.
    [Show full text]
  • HIZBALLAH and the QODS FORCE in IRAN's SHADOW
    BURGAS AIRPORT 18 JULY 2012 HIZBALLAH and the QODS FORCE in IRAN’S SHADOW WAR with the WEST Matthew Levitt Policy Focus 123 | January 2013 HIZBALLAH and the QODS FORCE in IRAN’S SHADOW WAR with the WEST All rights reserved. Printed in the United States of America. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. © 2013 by The Washington Institute for Near East Policy Published in 2013 in the United States of America by The Washington Institute for Near East Policy, 1828 L Street NW, Suite 1050, Washington, DC 20036. Cover photo: CCTV image showing the suspected suicide bomber, center, with long hair and baseball cap, who killed seven people and injured dozens more at the airport in Burgas, Bulgaria, July 18, 2012. Hizballah is believed to be respon- sible. The identity of the suspected bomber is still unknown, but a Michigan drivers license that he carried was a fake. (AP Photo/Bulgarian Interior Ministry) Contents About the Author v Tracking Hizballah’s Militant Trajectory 1 Reassessing Hizballah’s Place in Iran’s Arsenal 2 Iran’s Three-Tiered Terror Campaign 4 “They Want That Guy Done” 5 A “Jumble of Overlapping Plots” 5 Amateur Hour 6 Operation Radwan Continues 9 Conclusion 10 About the Author MATTHEW LEVITT is a senior fellow at The Washington Institute for Near East Policy, where he directs the Insti- tute’s Stein Program on Counterterrorism and Intelligence.
    [Show full text]
  • Israel and Iran's Nuclear Weapon Programme
    Istituto Affari Internazionali IAI WORKING PAPERS 11 | 18 – July 2011 Israel and Iran’s Nuclear Weapon Programme: Roll Back or Containment? Massimiliano Fiore Abstract The latest IAEA Report suggests that Iran is seeking a nuclear weapon capability. Preventing the Islamic Republic from becoming nuclear is the most important issue on Israel’s agenda, and Jerusalem will do everything it can to prevent Tehran from acquiring a nuclear capability. Considering the limited impact of international sanctions and covert operations, it is therefore possible that at some point in the next 12-15 months Israel’s policy-makers and military officials will decide whether or not to act militarily to destroy Iran’s nuclear facilities. Though the probability of successfully destroying all of Iran’s nuclear targets is not very high, Israeli policy-makers and military officials would nevertheless still be extremely satisfied with delaying Iran’s nuclear programme. But would it be worth all the trouble it would inevitably unleash? While Israeli fears are understandable, given the heavy costs and poor chances for success of the military option, containment still represents the most sensible policy for Israel. Keywords : Israel / Israeli foreign policy / Israeli military policy / Iran / Iranian nuclear programme / Nuclear weapons / Arms control / Sanctions / Covert operations © 2011 IAI IAI Working Papers 1118 Israe l and Iran’s Nuclear Weapon Programme: Roll Back or Containment? Israel and Iran’s Nuclear Weapon Programme: Roll Back or Containment? by Massimiliano Fiore ∗ Introduction Iran’s nuclear programme is the most serious challenge to the viability of the Non- Proliferation Treaty (NPT). 1 While the Islamic Republic of Iran claims that its nuclear programme is meant only to generate electricity and provide fuel for medical reactors, American, European and Israeli officials believe that it is intended to produce nuclear weapons.
    [Show full text]
  • S Nuclear Physicists Are Top Targets for Assassins
    Five Scientists in 10 Years: Iran’s Nuclear Physicists Are Top Targets for Assassins Recent assassination of Mohsen Fakhrizadeh, one of Iran's most celebrated physicists, highlights bloody line of Iranian scientists who have been taken out By Sheren Khalel Region: Middle East & North Africa Global Research, November 30, 2020 Theme: History, Law and Justice Middle East Eye 27 November 2020 To be a nuclear scientist in Iran is to be in danger. During the past decade, up to this week, at least four had been killed in vehicle bombings and shootouts, and several others have been targeted but survived. On Friday, the alleged architect of Iran’s military nuclear programme joined the ranks of the slain. Armed assassins gunned down Mohsen Fakhrizadeh in his car in an ambush in Absard city, outside the capital Tehran. Fakhrizadeh, an officer in Iran’s Islamic Revolutionary Guards Corps (IRGC), has been known as one of Iran’s most celebrated physicists because of his work on the country’s nuclear programme, Project 111. When his colleague, Majid Shahriari, was assassinated in 2010, the UNdescribed Fakhrizadeh as a leader in Tehran’s effort to acquire a nuclear warhead. Details of Friday’s attack remain unclear, but Hossein Salami, head of the country’s Republican Guards, has accused those who targeted Fakhrizadeh of working to block Iran “from gaining access to modern science”. There is a long history of world powers killing scientists as a form of warfare; from World War II to the Cold War, physicists and engineers have been known to turn the tide of military capabilities, making them prime targets.
    [Show full text]
  • T.Rkiye B.Y.Yor Mu Jen
    “İnsanın yaşadığı ömür boyunca geride bırakacağı en uzun ömürlü eser kitaptır.” TÜRKİYE BÜYÜYOR MU? BÜLÜNÜYOR MU? AHMET AKGÜL K‹MD‹R?: Araflt›rmac›-Yazar, Düflünür ve Siyaset Bilimci ola- rak tan›nan Ahmet Akgül, Milli Görüfl çizgisinde önemli bir fikir adam›d›r. Olaylara insan eksenli ve ‹slam endeksli yaklaflmaktad›r. 2004 Oca¤›nda, arkadafllar›yla birlikte ‹stanbul’da ayl›k olarak yay›nlanan “Milli Çö- züm” Dergisini ç›karmaya bafllam›flt›r. Uzun süreli, ciddi ve çileli bir mücadele dönemi yaflam›fl ve bu duyarl›, tutarl› ve ka- rarl› tavr›n› hiç b›rakmam›flt›r. Bu yüzden pek çok s›k›nt› ve sald›r›lara u¤ram›fl, defa- larca mahkeme aç›l›p tutuklanm›fl ve hapis yatm›flt›r. ‹nanc›m›z ve ihtiyac›m›z olan evrensel hukuk kurallar›n›n; bütün insanl›¤›n ortak de- ¤eri ve hayat düzeni haline getirilmesi, “Demokrasi, Laiklik ve özgürlükler” gibi ça¤- dafl kurum ve kavramlar›n; ilmi ve insani temellere göre yeniden flekillenmesi… Ve Türkiye’nin yeni bir bar›fl ve bereket medeniyetine öncülük etmesi konular›nda yo- ¤unlaflm›flt›r. Milli siyaset ve sorumluluk düflüncesini farkl› bir boyutta ele alan ve yorumlayan Ho- cam›z; yaklafl›k 40 y›ld›r Türkiye’mizin her yerinde, Avrupa’da ve ‹slam ülkelerinde, önemli seminer ve konferanslara kat›lmaktad›r. O¤uzhan Asiltürk - fievket Kazan ekibinin gizli niyet ve tertiplerini haber vermesi, uzun vadeli hedefler ve stratejik tavizler sonucu Partiye girdiklerini sezmesi ve söyle- mesi nedeniyle, Ahmet Akgül’ün teflkilatlarda ve Milli Görüflçü kurulufllarda hizmet vermesi engellenmeye çal›fl›lm›fl; Erbakan Hoca ise, kendisinin daha ba¤›ms›z davra- nabilmesi ve nifak çark› içinde körletilip kirletilmemesi için bu giriflimlere karfl› ç›k- mam›fl, ama uzaktan destekleyip yönlendirmekten de geri durmam›flt›r.
    [Show full text]