Download the PDF File

Total Page:16

File Type:pdf, Size:1020Kb

Download the PDF File S E C RE T //NOFORN I I 20310825 DEPARTMENT OF DEFENSE JOINT TASK FORCE GUANTANAMO GUANTANAMO BAY, CI,IBA APO AE 09360 JTF-GTMO-CC 25 August2006 MEMORANDUM FOR Commander,United StatesSouthern Command, 3511 NW 9lst Avenue. Miami. FL33172 SUBJECT: Recommendationfor Continued Detention Under DoD Control (CD) for GuantanamoDetainee, ISN: US9SA-000230DP(S) JTF-GTMODetainee Assessment 1. (S/NF) PersonalInformation: o JDIMSAIDRC ReferenceName: Hamud Dakhil Hamud o Aliases and Current/True Name: Talut al-Jeddawi. Humud Dakhil Humud Said al-Jadani.Hamud Sultan.Nag Mohammad. Safwan the Afghan o Placeof Birth: Jeddah.Saudi Arabia (SA) o Dateof Birth: 22May 1973 o Citizenship: SaudiArabia o InternmentSerial Number (ISN): US9SA-000230DP 2. (FOUO) Health: Detaineeis in goodhealth. 3. (S//NF) JTF-GTMOAssessment: a. (S) Recommendation: JTF-GTMOrecommends this detaineefor Continued DetentionUnder DoD Control(CD). JTF-GTMOpreviously assessed detainee as Continued DetentionUnder DoD Control(CD) on 5 September2005. b. (S/NF) Executive Summary: Detaineeis assessedto be a memberof al-Qaidawith an extensivehistory of militantjihad. Detaineeis an admittedleader of armedfighters in ToraBora duringhostilities against US forcesand associated with severalsenior al-Qaida members.He receivedbasic and advanced training in Chechnyaand Afghanistan (AF) CLASSIFIEDBY: MULTIPLESOURCES REASON:E.O. 12958 SECTION 1.5(C) DECLASSIFYON: 203108 1 I S E C RE T // NOFORNI I 20310825 S E C R E T // NOFORNI I 20310825 JTF-GTMO-CC SUBJECT:Recommendation for ContinuedDetention Under DoD Control(CD) for GuantanamoDetainee, ISN: US9SA-000230DP (S) includingtraining on smallarns, explosives,mortars, and anti-aircraft weaponry. JTF- GTMO determinedthis detaineeto be: o A HIGH risk, as he is likely to posea threatto the US, its interestsand allies. o A MEDIUM threatfrom a detentionperspective. o Of HIGH intellisencevalue. 4. (S//NF)Detainee's Account of Events: Thefollowing section is based,unless othenruise indicated, on detainee'sown account.These statements are includedwithout consideration of veracity, accuracy,or reliability. a. (S/NF) Prior History: Detaineeis a Sunni Muslim who left schoolafter the tenth grade. From approximately1997 to 1999,detainee was employedas a flight attendantfor SaudiArabian Airlines. Prior to 1999, detaineefrequently used illegal drugs. Turning to religion, detaineefreed himself from the influenceof drugsand felt financially secureenough to participatein his first militant jihad.' After detainee'sbrother, Ismat Hammud al- Juddawi,"returned from the fighting in Ethiopia,he showeddetainee videotapes depicting attacksagainst Muslim women,,children,and the elderly in Bosniaand Herzegovina(BK) and Chechnya. Ismat convinceddetainee to accompanyhim to Chechnya.' In Septemberor October1999, detaineeand his brothertraveled from SaudiArabia, to SerzhenYurt, Chechnyavia Istanbul,Turkey (TU) and T'bilisi, Georgia(GG).4 When detaineeand his brother arrived in Chechnya,they both attendedan unidentihed camp in SerzhenYurt for training in physicalfitness, weapons and guenilla operations.5Detainee left the campin June2000, after nine monthsin the Chechenregion and returnedto SaudiArabia via an unknown route.6 ' IIR 6 03+0160 05 2 Analyst Note: Ismat Hammud al-Juddawivariant Esmath Hamud al-Jedaniaka (Abu Yasir variant Abu Zasser), Ismat Hammud al-Juddawivariant. Ismat is a jihad fighter, and as of May 2006 was in Chechnya,was not married and was 27 yearsold. (NFI) '_ IIR 6 034 I I I I 04, IIR 6 0340222 05 o IIR 6 034 144503, IIR 6 034 0222 05, TD-3 14127540-02,Analyst Note: According to the SaudiMinistry of Interior,General Directorate of Investigations(Mabahith), the SaudiGovernment issued detainee a passporton l4 September1999. This confirms the detainee'sclaimed travel periodto Chechnya,indicating detainee probably _obtainedhis passportspecifically to undertakethis travel. 'IIR6o340222os u rrR6 0340604 02, , IrR6 0340878 03, nR 6 0341445 03, rrR 6 034022205 1 L S E C R E T //NOFORN//20310825 S E C RE T //NOFORN I I 20310825 JTF-GTMO-CC SUBJECT: Recommendationfor Continued Detention Under DoD Control (CD) for GuantanamoDetainee, ISN: US9SA-000230DP(S) b. (S/NF) Recruitment and Travel: Detaineelistened to SheikhHamad al-Aqla speak at the al-Aqla Mosquein Riyadh, SA.7 Al-Aqla issueda fatwa (religiousruling) encouraging young men to travel to Afghanistan and fight againstMassoud (the Northern Alliance commander),who al-Aqla claimedwas killing Muslims. Al-Aqla told his audiencethat if they did not follow this fatwa, they would go to hell.8 Around July 2000,edetainee traveled from Jeddahto Kandahar,AF via Damascus,Syria (SY) and Tehran, Iran (IR).10 c. (S/NF) Tra.ining and Activities: Detaineetraveled from Kandaharto the al-Faruq Training Camp." At the camp, detaineereceived two weeks of small arms training; one week of explosive training; ten days of camouflage,movement and tactics; eight to nine days of topography,map and compasstraining; and physical fitness training.12 After an unspecifiedperiod of time, detaineedeparted Afghanistan and returned to Saudi Arabia. On 28 March 200I, detaineeagain left Jeddahand returned to Kandaharvia Kuwait (KU), Lahore,Pakistan (PK); Quetta,PK; and Spin Buldak, AI1.r3 In approximatelyJune 2001, he traveled to the M.alik Training Camp where he received three weeks of anti-aircraft and mortar training.ra Detaineethen went to the secondfighting line near Bagram, AF and remainedthere until the month of Ramadan2001.'' Detaineethen traveledto Jalalabad,AF, and then to Tora Bora, AF wherehe held a position as a cook.l6 Detaineeadmitted that after the deathof his Tora Bora camp leader,Abu Mahjin, detaineeassumed the leadership position.lT ' Analyst note: SeeReasons for Continued Detention for additional information on Shaykh al-Aqla. o IIR 6 034 026802, 000230302 31-MAy-02. ' IIR 6 034 0160 05, IIR 6 034 0250 05, Analyst Note: Detainee also statedthat he went in either Septemberor October 2000. The conflict in time frames could be due to confusion between the Gregorian and Islamic Hijri calendars. 'o IIR 6 034 026802, IIR 6 034 ooo5 06 " IIR 6 034 0268 02, IIR 6 034 t0t7 03, IIR 6 034 0160 05 " IIR 6 034 026902, IIR 6 034 101703 13 IIR 6 034 0160 05, IIR 6 034 0005 O6,TD-31412754}-O2,AnalystNote: In TD-314127540-02,the Mabahith statesthat detaineeleft Saudi Arabia on 28 March 2001. A variant of Spin Buldak is Spin Boldak. toIIR2 340623102,IIR6034016005,IIR 6034026902,AnalystNote: AvariantofMalikisMalek. TheMalik Training Camp is aka (Malik Military Center) aka (Sabr/Sabir Camp). '' IIR 6 034 0160 05. Analyst Note: Ramadan200I occurredfrom l7 November2001 to 16 December2001. 'o IrR 6 0340160 05 17 IIR 6 034 0564 03, Analyst Note: Variants of Mahjin include Mehjin, Mahgen, and Mehjen. Abu Mahjin, is assessedto be Abu Mahjin al-Taifi aka (Salih Husayn Ali Ahmad) aka (Marwan Muhammad Naman Mujahid). Abu Mahjin was a known al-Qaida leader who died during hostilities in Tora Bora as reported in TD-314/33185-03, and possibly the individual identified as a close associateand bodyguard for UBL as reported in IIR 6 034 0412 04 and CIR 316107159-04.Abu Mahjin probably died prior to the attack on the 65 which occurred on approximately 15 December2001. 3 S E C RE T //NOFORN I I 20310825 S E C R E T // NOFORN I I 20310825 JTF-GTMO-CC SUBJECT: Recommendationfor Continued Detention Under DoD Control (CD) for GuantanamoDetainee, ISN: US9SA-000230DP(S) 5. (S//NF) Gapture lnformation: a. (S/A{F) In an attempt to escapeTora Bora, detaineeclaimed he paid an unknown Afghan guide to take him to Pakistan. Detainee statedhe arrived in Pakistan,after severaldays, where Pakistani authorities arrestedhim.18 While basically accurate,the detaineeomitted key details of his capture. Detainee's departurefrom Afghanistan was, in fact, orchestrated by UsamaBin Laden (UBl)-appointed commanderIbn al-Shaykhal-Libi. During a cease fire, al-Libi directed a group of approximately 65 fighters to depart Tora Bora. US military helicoptersare believed to have attackedthe group killing many of them. Ibn al-Shaykh al- Libi then led the remainder of the group and the other fighters in Tora Bora,.numbering about 150,to Pakistanwhere they were subsequentlyarrested by Pakistaniforces.'' Lists of those capturedwith Ibn al-Shaykhal-Libi includethe detainee'sname or alias.2oPakistani authoritiestransferred detainee to US custodv on 2 Januarv 2002.21 b. (S) PropertyHeld: o F-91W Casiowatch o Money: o 59,500Afghanis o 12,200Pakistani Rupees o 1,000Saudi Riyals O S21USD . Other personalitems including a piece of paper with Arabic writing, a Saudi Arabian driver's license,and a set of Toyota vehiclekeys22 c. (S) Transferredto JTF-GTMO:11 February 2002. d. (S/NF) Reasonsfor Transferto JTF-GTMO:To provide information on the following: o Terrorism related facilities, training conducted,methods of training and trainers 18IIR 6 034o27o 02 tn Withdra*al from Tora BoraAnalysis (DAB analysispaper), IIR 2 340 624402,TD-314114605-04, IIR 6 0340l 1804 20 AnalystNote: Detaineeis identifiedas Talout in IIR 7 739 339602. Detaineeis identifiedas Mehmood Bin Dakhilin TD-3l4150490-01. 21tn-3 t+/oo845-oz 22 IIR 6 034 125504, AnalystNote: Referencedocument notes thatMO-244 was in chargeof five to six pickup trucksfull of weaponsand people who wereretreating. It is possiblethat sincedetainee was directly subordinate toMO-244 thatthe setof Toyotakeys were to oneof thesevehicles. 4 S E C R E T // NOFORN I I 20310825 s E c R E T // NOFORN I I 20310825 JTF-GTMO-CC SIIBJECT: Recommendationfor Continued Detention
Recommended publications
  • BA Oppgave.Pages
    ! ! ! ! ! ! ! ! ! «…It’s nothing but torture» It’s time for a serious reaction to music torture ! Inger-Maren Helliksen Fjeldheim May 18th! 2018 ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! "1 av "17 !Abstract For years music has been used as a method of torture in American run prisons such as Bagram and Guantanamo. The American government calls it harsh interrogation and claim the music torture is kinder and less severe as it does not inflict physical damage on the prisoner. ! It is not within our power to know whether death is worse a fate for humans than a life of trauma. !Before we know this for certain, we cannot to claim that one fate is better or worse than the other. Musicians have known for a long time that their music is used for torture, and yet there as been little to no reaction. As musicians and music lovers we cannot sit idly by while what is supposed to be a source of comfort and happiness, is used for such deplorable purpose. It is time for a serious reaction to music torture. ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! "2 av "17 Index ! Abstract 2 ! I Introduction 3 ! II Music and Torture- What it is and where it comes from 4 ! III The Use of a Song- Drowning Pool and their song Bodies 5 ! IV What happens in Guantanamo 8 ! V Discussion- Time to react 8 ! VII Bibliography 11 ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! "3 av "17 Introduction Music as a phenomenon is universal to all humans and can be found in every human culture past and present.1 It has been used through history for pleasure, and for sorrow, in religion and everyday life alike.
    [Show full text]
  • JTF-GTMO Detainee Assessment
    S E C R E T //NOFORN I I 20320619 DEPARTMENTOF DEFENSE HEADQUARTERS,JOINT TASK FORCEGUANTANAMO U.S. NAVAL STATION,GUANTANAMO BAY, CUBA APO AE 09350 JTF-GTMO-CDR 19June 2007 MEMORANDUM FOR Commander,United StatesSouthem Command. 3511 NW 9lst Avenue. Miami,FL33172. SUBJECT: Recommendationfor ContinuedDetention Under DoD Control (CD) for GuantanamoDetainee, ISN: US9SA-000079DP(S) JTF-GTMO DetaineeAssessment 1. (S//NF) Personal Information: o JDIMSAIDRC ReferenceName: FahedA al-Harasi o Aliases and Current/True Name: Fahd Atiyah Hamza Hamid al-Harazi" Hassanal-Makki. FahedFahad" Khalid. Abu Hassan. al-Sharif. Abu Barak o Placeof Birth: Mecca. SaudiArabia (SA) o Date of Birth: 18 November 1978 o Citizenship: SaudiArabia o InternmentSerial Number (ISN): US9SA-000079DP 2. (U//T'OUO) Health: Detaineeis in good health. 3. (S//NF) JTF-GTMO Assessment: a. (S) Recommendation: JTF-GTMO recommendsthis detaineefor ContinuedDetention Under DoD Control (CD). JTF-GTMO previouslyassessed detainee for Continued Detentionwith TransferLanguage on 26May 2006. b. (S//NF) Executive Summary: Detaineeis reportedto be a memberof al-Qaida. He was identified as having attendedmilitant training and was an instructor at the al-Qaida al- Faruq Training Camp. Detaineewas in Afghanistan (AF) since 1999 during which he is assessedto have participated in hostilities againstUS and Coalition forces as a member of Classifiedby: MultipleSources REASON:E.O. 12958, AS AMENDED,Section 1.4(C) Declassi$on:20320619 S E C R E T //NOFORN I I 20320619 S E C R E T // NOFORN I I 20320619 JTF-GTMO.CDR SUBJECT: Recommendationfor ContinuedDetention Under DoD Control (CD) for GuantanamoDetainee, ISN: US9SA-000079DP(S) UsamaBin Laden's (UBL) 55th Arab Brigade.l Detainee'sname and aliaswere listed in recovereddocuments associated with al-Qaida, and the Saudi Ministry of Interior General Directorate of Investigations(Mabahith) identified him as a high priority detainee.
    [Show full text]
  • Inside Russia's Intelligence Agencies
    EUROPEAN COUNCIL ON FOREIGN BRIEF POLICY RELATIONS ecfr.eu PUTIN’S HYDRA: INSIDE RUSSIA’S INTELLIGENCE SERVICES Mark Galeotti For his birthday in 2014, Russian President Vladimir Putin was treated to an exhibition of faux Greek friezes showing SUMMARY him in the guise of Hercules. In one, he was slaying the • Russia’s intelligence agencies are engaged in an “hydra of sanctions”.1 active and aggressive campaign in support of the Kremlin’s wider geopolitical agenda. The image of the hydra – a voracious and vicious multi- headed beast, guided by a single mind, and which grows • As well as espionage, Moscow’s “special services” new heads as soon as one is lopped off – crops up frequently conduct active measures aimed at subverting in discussions of Russia’s intelligence and security services. and destabilising European governments, Murdered dissident Alexander Litvinenko and his co-author operations in support of Russian economic Yuri Felshtinsky wrote of the way “the old KGB, like some interests, and attacks on political enemies. multi-headed hydra, split into four new structures” after 1991.2 More recently, a British counterintelligence officer • Moscow has developed an array of overlapping described Russia’s Foreign Intelligence Service (SVR) as and competitive security and spy services. The a hydra because of the way that, for every plot foiled or aim is to encourage risk-taking and multiple operative expelled, more quickly appear. sources, but it also leads to turf wars and a tendency to play to Kremlin prejudices. The West finds itself in a new “hot peace” in which many consider Russia not just as an irritant or challenge, but • While much useful intelligence is collected, as an outright threat.
    [Show full text]
  • CIA Best Practices in Counterinsurgency
    CIA Best Practices in Counterinsurgency WikiLeaks release: December 18, 2014 Keywords: CIA, counterinsurgency, HVT, HVD, Afghanistan, Algeria, Colombia, Iraq, Israel, Peru, Northern Ireland, Sri Lanka, Chechnya, Libya, Pakistan, Thailand,HAMAS, FARC, PULO, AQI, FLN, IRA, PLO, LTTE, al-Qa‘ida, Taliban, drone, assassination Restraint: SECRET//NOFORN (no foreign nationals) Title: Best Practices in Counterinsurgency: Making High-Value Targeting Operations an Effective Counterinsurgency Tool Date: July 07, 2009 Organisation: Central Intelligence Agency (CIA) Author: CIA Office of Transnational Issues; Conflict, Governance, and Society Group Link: http://wikileaks.org/cia-hvt-counterinsurgency Pages: 21 Description This is a secret CIA document assessing high-value targeting (HVT) programs world-wide for their impact on insurgencies. The document is classified SECRET//NOFORN (no foreign nationals) and is for internal use to review the positive and negative implications of targeted assassinations on these groups for the strength of the group post the attack. The document assesses attacks on insurgent groups by the United States and other countries within Afghanistan, Algeria, Colombia, Iraq, Israel, Peru, Northern Ireland, Sri Lanka, Chechnya, Libya, Pakistan and Thailand. The document, which is "pro-assassination", was completed in July 2009 and coincides with the first year of the Obama administration and Leon Panetta's directorship of the CIA during which the United States very significantly increased its CIA assassination program at the
    [Show full text]
  • Downloaded from the Internet and Distributed Inflammatory Speeches and Images Including Beheadings Carried out by Iraqi Insurgents
    HUMAN RIGHTS WATCH WORLD REPORT 2006 EVENTS OF 2005 Copyright © 2006 Human Rights Watch All rights reserved. Co-published by Human Rights Watch and Seven Stories Press Printed in the United States of America ISBN-10: 1-58322-715-6 · ISBN-13: 978-1-58322-715-2 Front cover photo: Oiparcha Mirzamatova and her daughter-in-law hold photographs of family members imprisoned on religion-related charges. Fergana Valley, Uzbekistan. © 2003 Jason Eskenazi Back cover photo: A child soldier rides back to his base in Ituri Province, northeastern Congo. © 2003 Marcus Bleasdale Cover design by Rafael Jiménez Human Rights Watch 350 Fifth Avenue, 34th floor New York, NY 10118-3299 USA Tel: +1 212 290 4700, Fax: +1 212 736 1300 [email protected] 1630 Connecticut Avenue, N.W., Suite 500 Washington, DC 20009 USA Tel: +1 202 612 4321, Fax: +1 202 612 4333 [email protected] 2-12 Pentonville Road, 2nd Floor London N1 9HF, UK Tel: +44 20 7713 1995, Fax: +44 20 7713 1800 [email protected] Rue Van Campenhout 15, 1000 Brussels, Belgium Tel: +32 2 732 2009, Fax: +32 2 732 0471 [email protected] 9 rue Cornavin 1201 Geneva Tel: +41 22 738 0481, Fax: +41 22 738 1791 [email protected] Markgrafenstrasse 15 D-10969 Berlin, Germany Tel.:+49 30 259 3060, Fax: +49 30 259 30629 [email protected] www.hrw.org Human Rights Watch is dedicated to protecting the human rights of people around the world. We stand with victims and activists to prevent discrimination, to uphold political freedom, to protect people from inhumane conduct in wartime, and to bring offenders to justice.
    [Show full text]
  • A Review of the FBI's Involvement in and Observations of Detainee Interrogations in Guantanamo Bay, Mghanistan, and Iraq
    Case 1:04-cv-04151-AKH Document 450-5 Filed 02/15/11 Page 1 of 21 EXHIBIT 4 Case 1:04-cv-04151-AKH Document 450-5 Filed 02/15/11 Page 2 of 21 U.S. Department ofJustice Office of the Inspector General A Review of the FBI's Involvement in and Observations of Detainee Interrogations in Guantanamo Bay, Mghanistan, and Iraq Oversight and Review Division Office of the Inspector General May 2008 UNCLASSIFIED Case 1:04-cv-04151-AKH Document 450-5 Filed 02/15/11 Page 3 of 21 TABLE OF CONTENTS EXECUTIVE SUMMARY .i CHAPTER ONE: INTRODUCTION 1 I. Introduction l II. The OIG Investigation 2 III. Prior Reports Regarding Detainee Mistreatment 3 IV. Methodology of OIG Review of Knowledge of FBI Agents Regarding Detainee Treatment · 5 A. The OIG June 2005 Survey 5 B. OIG Selection of FBI Personnel for.Interviews 7 C. OIG Treatment of Military Conduct 7 V. Organization of the OIG Report 8 CHAPTER TWO: FACTUAL BACKGROUND 11 I. The Changing Role of the FBI After September 11 11 II. FBI Headquarters Organizational Structure for Military Zones 12 A. Counterterrorism Division 13 1. International Terrorism Operations Sections 13 2. Counterterrorism Operations Response Section 14 B. Critical Incident Response Group 15 C. Office of General Counsel. 15 III. Other DOJ Entities Involved in Overseas Detainee Matters 16 IV. Inter-Agency Entities and Agreements Relating to Detainee Matters. 16 A. The Policy Coordinating Committee 16 B. Inter-Agency Memorandums of Understanding 18 V. Background Regarding the FBI's Role in the Military Zones 19 A.
    [Show full text]
  • Wikileaks and the Institutional Framework for National Security Disclosures
    THE YALE LAW JOURNAL PATRICIA L. BELLIA WikiLeaks and the Institutional Framework for National Security Disclosures ABSTRACT. WikiLeaks' successive disclosures of classified U.S. documents throughout 2010 and 2011 invite comparison to publishers' decisions forty years ago to release portions of the Pentagon Papers, the classified analytic history of U.S. policy in Vietnam. The analogy is a powerful weapon for WikiLeaks' defenders. The Supreme Court's decision in the Pentagon Papers case signaled that the task of weighing whether to publicly disclose leaked national security information would fall to publishers, not the executive or the courts, at least in the absence of an exceedingly grave threat of harm. The lessons of the PentagonPapers case for WikiLeaks, however, are more complicated than they may first appear. The Court's per curiam opinion masks areas of substantial disagreement as well as a number of shared assumptions among the Court's members. Specifically, the Pentagon Papers case reflects an institutional framework for downstream disclosure of leaked national security information, under which publishers within the reach of U.S. law would weigh the potential harms and benefits of disclosure against the backdrop of potential criminal penalties and recognized journalistic norms. The WikiLeaks disclosures show the instability of this framework by revealing new challenges for controlling the downstream disclosure of leaked information and the corresponding likelihood of "unintermediated" disclosure by an insider; the risks of non-media intermediaries attempting to curtail such disclosures, in response to government pressure or otherwise; and the pressing need to prevent and respond to leaks at the source. AUTHOR.
    [Show full text]
  • Who Is Shaker Aamer? Crt Briefing, 9 February 2015
    BRITAIN’S LAST GUANTÁNAMO DETAINEE: WHO IS SHAKER AAMER? CRT BRIEFING, 9 FEBRUARY 2015 INTRODUCTION It is UK government policy that Shaker Aamer, the last remaining British resident detained at Guantánamo Bay, be returned. In December 2014, newspaper stories emerged suggesting that this could soon be the case.1 At a meeting in Washington, DC, a month later, President Obama told Prime Minister David Cameron that the US would “prioritise” the case.2 Aamer, who was born in Saudi Arabia, was captured in Afghanistan in November 2001; he was sent to Guantánamo Bay in February 2002. The US government believes him to be a weapons-trained al- Qaeda fighter; Aamer’s supporters claim that he was in Afghanistan to carry out voluntary work for an Islamic charity.3 Aamer is thought to have been cleared for transfer to Saudi Arabia in June 2007 (although, as late as November 2007, Department of Defense documentation recommended that he continue to be 1 ‘Guantanamo to free last UK inmate’, The Sunday Times, 28 December 2014, available at: http://www.thesundaytimes.co.uk/sto/news/uk_news/National/article1500831.ece?CMP=OTH-gnws-standard-2014_12_27, last visited: 29 January 2015; see also: ‘Last British inmate at Guantanamo set to be freed in the new year in fresh push by Obama to empty prison’, Daily Mail, 28 December 2014, available at: http://www.dailymail.co.uk/news/article-2888964/Last-British- inmate-Guantanamo-set-freed-new-year-fresh-push-Obama-prison.html, last visited: 29 January 2015. 2 ‘Barack Obama to “prioritise” case of Guantánamo detainee Shaker Aamer’, The Guardian, 16 January 2015, available at: http://www.theguardian.com/us-news/2015/jan/16/shaker-aamer-guantanamo-bay-prioritise-obama-case, last visited: 29 January 2015.
    [Show full text]
  • Offensive Capabilities
    GCHQ and UK Mass Surveillance Chapter 5 5 Beyond signals intelligence: Offensive capabilities 5.1 Introduction Documents released by German magazine Der Spiegel provide a much richer picture of the offensive activities of the NSA and its allies, including the UK’s GCHQ.i The global surveillance infrastructure and hacking tools described in the previous chapters are not only used for obtaining information to be fed into intelligence reports and tracking terrorists. The agencies are also developing cyber-warfare capabilities, with the NSA taking the lead within the US armed forces. This militarisation of the internet saw U.S. intelligence services carried out 231 offensive cyber-operations in 2011ii. The UK's National Strategic Defence and Security Review from 2010 made hostile attacks upon UK cyberspace a major priorityiii. It is fair to assume that many countries are following suit and building cyber-warfare capabilities. Der Spiegel terms the development of these aggressive hacking tools as Digital Weapons. In their view D weapons which should join the ABC (Atomic, Biological and Chemical) weapons of the 20th century because of their indiscriminate nature. Here lies a fundamental problem. The modern world with connected global communications networks means that non-state actors such as civilians and businesses are now affected by the agencies’ activities much more frequently than before. The internet is used by everyone – cyberspace is mainly a civilian space – and the opportunity for collateral damage is huge. The papers leaked to Der Spiegel appear to show that signal agencies have little regard for the security and wellbeing of anyone who gets caught in the path of their operations.
    [Show full text]
  • Works’ (Just Not in Moderation)
    Repression ‘Works’ (just not in moderation) Yuri M. Zhukov University of Michigan Abstract Why does government violence deter political challengers in one con- text, but inflame them in the next? This paper argues that repression increases opposition activity at low and moderate levels, but decreases it in the extreme. There is a threshold level of violence, where the op- position becomes unable to recruit new members, and the rebellion unravels – even if the government kills more innocents. We show this result logically, with a mathematical model of coercion, and empir- ically, with micro-level data from Chechnya and a meta-analysis of sub-national conflict dynamics in 156 countries. The data suggest that a threshold exists, but the level of violence needed to reach it varies. Many governments, thankfully, are unable or unwilling to go that far. We explore conditions under which this threshold may be higher or lower, and highlight a fundamental trade-off between reducing gov- ernment violence and preserving civil liberties. Keywords: repression, political violence, mass killing, conflict, meta-analysis, threshold effect Word count: 11,869 DRAFT This version: November, 2018 1 Repression is violence that governments use to stay in power. When confronting behavioral challenges to their authority, governments often respond by threatening, detaining and killing suspected dissidents and rebels. The coercive purpose of these actions is to compel challengers to stop their fight, and to deter others from joining it. The intensity of repres- sion can vary greatly. To reestablish control in Chechnya after 1999, for example, the Russian government used a range of methods, from targeted killings to shelling and indiscriminate sweeps.
    [Show full text]
  • Pakistan. Conference on Disappearances in Pakistan (Web
    WEB UPDATES – TACTICAL CAMPAIGN AGAINST TORTURE Name/Team Edurne Rubio/ TCT ext. 5515 Date 25/09/2006 Section Features AIDOC ASA 33/037/2006 Title Wanted: al-Qa’ida suspects. $5000 reward. Summary for torture homepage More than 85% of detainees at Guantánamo Bay were arrested by the Afghan Northern Alliance and in Pakistan at a time when rewards of up to $5,000 were paid for every “terrorist” handed over to the USA. Family members, lawyers and other activists are gathering in Islamabad, Pakistan (29 to 31 September) to inform and encourage action against Pakistan’s increasing use of arbitrary arrest, secret detention, torture and the failure of Pakistani courts to offer protection.. Feature The road to Guantánamo starts in Pakistan. More than 85 percent of detainees unlawfully held at the US detention centre in Cuba were arrested by the Afghan Northern Alliance and in Pakistan at a time when rewards of up to US$5,000 were paid for every unidentified terror suspect handed over to the USA. Bounty hunters – including police officers and local people – took advantage of this routine practice that facilitated illegal detention and enforced disappearance, almost unheard in Pakistan before the US-led “war on terror”. The Pakistani courts have failed to offer protection. Hundreds of Pakistani and foreign nationals have been picked up in mass arrests in Pakistan since 2001, many have been “sold” to the USA as ‘terrorists’ simply on the word of their captor, and hundreds have been transferred to Guantánamo Bay, Bagram Airbase or secret detention centres run by the USA.
    [Show full text]
  • Mass Surveillance
    Mass Surveillance Mass Surveillance What are the risks for the citizens and the opportunities for the European Information Society? What are the possible mitigation strategies? Part 1 - Risks and opportunities raised by the current generation of network services and applications Study IP/G/STOA/FWC-2013-1/LOT 9/C5/SC1 January 2015 PE 527.409 STOA - Science and Technology Options Assessment The STOA project “Mass Surveillance Part 1 – Risks, Opportunities and Mitigation Strategies” was carried out by TECNALIA Research and Investigation in Spain. AUTHORS Arkaitz Gamino Garcia Concepción Cortes Velasco Eider Iturbe Zamalloa Erkuden Rios Velasco Iñaki Eguía Elejabarrieta Javier Herrera Lotero Jason Mansell (Linguistic Review) José Javier Larrañeta Ibañez Stefan Schuster (Editor) The authors acknowledge and would like to thank the following experts for their contributions to this report: Prof. Nigel Smart, University of Bristol; Matteo E. Bonfanti PhD, Research Fellow in International Law and Security, Scuola Superiore Sant’Anna Pisa; Prof. Fred Piper, University of London; Caspar Bowden, independent privacy researcher; Maria Pilar Torres Bruna, Head of Cybersecurity, Everis Aerospace, Defense and Security; Prof. Kenny Paterson, University of London; Agustín Martin and Luis Hernández Encinas, Tenured Scientists, Department of Information Processing and Cryptography (Cryptology and Information Security Group), CSIC; Alessandro Zanasi, Zanasi & Partners; Fernando Acero, Expert on Open Source Software; Luigi Coppolino,Università degli Studi di Napoli; Marcello Antonucci, EZNESS srl; Rachel Oldroyd, Managing Editor of The Bureau of Investigative Journalism; Peter Kruse, Founder of CSIS Security Group A/S; Ryan Gallagher, investigative Reporter of The Intercept; Capitán Alberto Redondo, Guardia Civil; Prof. Bart Preneel, KU Leuven; Raoul Chiesa, Security Brokers SCpA, CyberDefcon Ltd.; Prof.
    [Show full text]