Joint Inquiry
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Table of Contents
Chapter 4 Building International Will and Capacity to Counter Terrorism The Department of State engages diplomatically with for- eign governments and in international and regional fora to accomplish the US Government’s first priority — protect- ing Americans at home and abroad. The Department of State’s diplomatic efforts help build the political will and operational skills of foreign governments to combat terror. Many countries are committed allies in the global war on terrorism. Some, however, need train- ing and resources to develop stronger institutions and capabilities. The Department of State’s counterterrorism efforts are an essential component in the success of US military, law enforcement, intelligence, and financial ac- tivities in the global fight against terrorism. Multilateral and regional organizations are also a key plat- form for developing broad international support for the adoption and implementation of policies, strategies, and “best practices” in combating terrorism and financing of terrorist activities. The Department of State works actively with foreign governments to urge adoption of all 12 inter- national counterterrorism conventions, as well as adherence to and implementation of UNSCR 1373, which imposes binding obligations on all states to suppress and prevent terrorist financing, improve their border controls, enhance information sharing and law enforcement coop- eration, suppress terrorist recruitment, and deny terrorists safe haven. Antiterrorism Assistance Program Ambassador J. Cofer Black, former US State Department Coordinator Congress authorized the Antiterrorism Assistance (ATA) Pro- for Counterterrorism, during a news conference at the IV Regular gram in 1983 as part of a major initiative against international Session of the Organization of American States Inter-American terrorism. -
Indien – China – USA: Das Neue Mächtedreieck Asiens
Indien – China – USA: Das neue Mächtedreieck Asiens Heinrich Kreft1 1 Die Entstehung eines neuen Mächtedreiecks in Asien seit Ende des Kalten Krieges Das Ende des Kalten Krieges führte nicht nur in Europa zu erheblichen politischen Veränderungen und Machtverschiebungen, sondern auch in Asien. Hinzu kam, dass zeitgleich mehrere Länder und Regionen Asiens einen beispiellosen wirtschaftlichen Boom erlebten. 1.1 Der Untergang der Sowjetunion Der wichtigste Einzelfaktor für die Veränderung der politischen Landschaft in Asien war der Zusammenbruch der Sowjetunion und das sich daran anschließende Schwin- den des russischen Einflusses in Südasien. Die UdSSR war lange Zeit der wichtigste Verbündete Indiens gewesen, festgeschrieben im indisch-sowjetischen Vertrag von 1971, in dem Moskau Indiens Schutz garantierte. Allerdings wurde dieses Abkom- men bereits Ende der 1980er-Jahre durch die Bemühungen Gorbatschows unter- höhlt, die sowjetischen Beziehungen zu China zu verbessern. Die Russische Förde- ration als Rechtsnachfolger der Sowjetunion war Anfang der 1990er-Jahre kaum noch in der Lage, den sowjetischen Einfluss in Südasien aufrecht zu erhalten. Der ökonomische Niedergang Moskaus ging auch nach dem Zusammenbruch der UdSSR weiter, die russische Marine war nie in der Lage, die Rolle ihrer sowjeti- schen Vorgängerin im Indischen Ozean zu übernehmen. Die indisch-russischen Beziehungen laborieren auch heute noch an den Folgen der Auflösung der Sowjetunion, mit der Indien seinen bis dahin wichtigsten politi- schen und auch ökonomischen Partner verloren -
9/11 Report”), July 2, 2004, Pp
Final FM.1pp 7/17/04 5:25 PM Page i THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page v CONTENTS List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— ...in the Law Enforcement Community 73 3.3 . and in the Federal Aviation Administration 82 3.4 . and in the Intelligence Community 86 v Final FM.1pp 7/17/04 5:25 PM Page vi 3.5 . and in the State Department and the Defense Department 93 3.6 . and in the White House 98 3.7 . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis:August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5. -
Thesis Edit Final
ABSTRACT You are Who You Fight: The CIA, Covert Action, and National Security Charissa Huntzinger Director: Peter Campbell Ph.D. Hollywood thrillers, conspiracy theories and political discourse, often depict the Central Intelligence Agency (CIA) as an uncontrollable, enigmatic organization populat- ed by James Bonds. The agency’s mandate, set out in the National Security Act of 1947, tells a different story that is often overlooked. In essence, the US government designed the CIA as a center of intelligence analysis and not a cloak and dagger outfit. Neverthe- less, the CIA did develop a covert action branch and from the Cold War to the War on Terror, the CIA has increasingly relied on this operational component. But where did this branch come from and how and why has it adapted or failed to adapt to changes in the international environment? Through two case studies, this thesis evaluates the efficacy of bureaucratic, organizational cultural, and realist theories for explaining the evolution of covert action within the CIA. APPROVED BY DIRECTOR OF HONORS THESIS: ________________________________________________ Dr. Peter Campbell, Political Science APPROVED BY THE HONORS PROGRAM: ________________________________________________ Dr. Elizabeth Corey, Director. DATE: ________________________ YOU ARE WHO YOU FIGHT: THE CIA, COVERT ACTION, AND NATIONAL SECURITY A Thesis Submitted to the Faculty of Baylor University In Partial Fulfillment of the Requirements for the Honors Program By Charissa Huntzinger Waco, TX May 2017 TABLE OF CONTENTS Chapter 1: Introduction . 1 Chapter 2: Theoretical Framework . 6 Chapter 3: The Early Cold War . 15 Chapter 4: The War on Terror . 38 Chapter 5: Conclusion . 54 Bibliography . 65 ii CHAPTER ONE Introduction The Central Intelligence Agency (CIA) is a generally misunderstood arm of the American national security Apparatus. -
Cultural Intelligence in Covert Operatives
OVERT ACCEPTANCE: CULTURAL INTELLIGENCE IN COVERT OPERATIVES CHIP MICHAEL BUCKLEY A Thesis Submitted to the Faculty of Mercyhurst University In Partial Fulfillment of the Requirements for The Degree of MASTER OF SCIENCE IN APPLIED INTELLIGENCE RIDGE SCHOOL FOR INTELLIGENCE STUDIES AND INFORMATION SCIENCE MERCYHURST UNIVERSITY ERIE, PENNSYLVANIA JANUARY 2015 RIDGE SCHOOL FOR INTELLIGENCE STUDIES AND INFORMATION SCIENCE MERCYHURST UNIVERSITY ERIE, PENNSYLVANIA OVERT ACCEPTANCE: CULTURAL INTELLIGENCE IN COVERT OPERATIVES A Thesis Submitted to the Faculty of Mercyhurst University In Partial Fulfillment of the Requirements for The Degree of MASTER OF SCIENCE IN APPLIED INTELLIGENCE Submitted By: CHIP MICHAEL BUCKLEY Certificate of Approval: ___________________________________ Stephen Zidek, M.A. Assistant Professor The Ridge School of Intelligence Studies and Information Science ___________________________________ James G. Breckenridge, Ph.D. Associate Professor The Ridge School of Intelligence Studies and Information Science ___________________________________ Phillip J. Belfiore, Ph.D. Vice President Office of Academic Affairs January 2015 Copyright © 2015 by Chip Michael Buckley All rights reserved. iii DEDICATION To my father. iv ACKNOWLEDGEMENTS I would like to acknowledge a number of important individuals who have provided an extraordinary amount of support throughout this process. The faculty at Mercyhurst University, particularly Professor Stephen Zidek, provided invaluable guidance when researching and developing this thesis. My friends and classmates also volunteered important ideas and guidance throughout this time. Lastly, my family’s support, patience, and persistent inquiries regarding my progress cannot be overlooked. v ABSTRACT OF THE THESIS Overt Acceptance: Cultural Intelligence in Covert Operatives A Critical Examination By Chip Michael Buckley Master of Science in Applied Intelligence Mercyhurst University, 2014 Professor S. -
The Search for the "Manchurian Candidate" the Cia and Mind Control
THE SEARCH FOR THE "MANCHURIAN CANDIDATE" THE CIA AND MIND CONTROL John Marks Allen Lane Allen Lane Penguin Books Ltd 17 Grosvenor Gardens London SW1 OBD First published in the U.S.A. by Times Books, a division of Quadrangle/The New York Times Book Co., Inc., and simultaneously in Canada by Fitzhenry & Whiteside Ltd, 1979 First published in Great Britain by Allen Lane 1979 Copyright <£> John Marks, 1979 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of the copyright owner ISBN 07139 12790 jj Printed in Great Britain by f Thomson Litho Ltd, East Kilbride, Scotland J For Barbara and Daniel AUTHOR'S NOTE This book has grown out of the 16,000 pages of documents that the CIA released to me under the Freedom of Information Act. Without these documents, the best investigative reporting in the world could not have produced a book, and the secrets of CIA mind-control work would have remained buried forever, as the men who knew them had always intended. From the documentary base, I was able to expand my knowledge through interviews and readings in the behavioral sciences. Neverthe- less, the final result is not the whole story of the CIA's attack on the mind. Only a few insiders could have written that, and they choose to remain silent. I have done the best I can to make the book as accurate as possible, but I have been hampered by the refusal of most of the principal characters to be interviewed and by the CIA's destruction in 1973 of many of the key docu- ments. -
EUCIC Syllabus
EU COUNTERINTELLIGENCE COURSE (EUCIC) SYLLABUS & CURRICULUM Head of Training & Directing Staff Institute for European Intelligence & Security Training & Directing Staff Vienna AUSTRIA CONTACT DETAILS: The head of training and directing staff can be reached over the intelligence network at H/TDS, by e-mail at [email protected] with further details being disseminated over the public website at www.ieis.eu. Candidates are reminded not to send sensitive information by e-mail. DISTRIBUTION RESTRICTION: This document is classified UNCLASSIFIED (with distribution restriction) covering a CONFIDENTIAL annex. Distribution is authorised to agents and contractors of the Institute for European Intelligence and Security and potential registrants. Distribution was restricted on grounds of intellectual property and operational effectiveness from 11 August 2015. Requests for this document must be referred to H/TDS. HANDLING INSTRUCTIONS: This document must be destroyed after use by any method that would prevent unauthorised disclosure or reconstruction. UNCLASSIFIED EU COUNTERINTELLIGENCE COURSE (EUCIC) 1. This document outlines the core content and scope of training offered by the Institute for European Intelligence and Security on the aforementioned course, together with any other relevant information not included elsewhere. Aim 2. This handbook aims to provide the following types of information: a. Specific Institute education and training doctrine relating to the course. b. Training and readiness exercises associated with the course. c. Supplementary and -
Prepared Statement of Secretary of State Colin L. Powell
Secretary of State Colin L. Powell Written Remarks Submitted to: The National Commission on Terrorist Attacks Upon the United States 23 March 2004 Mr. Chairman, Mr. Vice Chairman, Members of the Commission, thank you for the opportunity to appear before you regarding the events leading up to and following the murderous terrorist attacks of September 11, 2001. It is my hope, as I know it is yours, that through the hard work of this Commission, and other bodies like it, our country can improve the way we wage the war on terror and, in particular, better protect our homeland and the American people. I am pleased to have with me today Deputy Secretary Richard Armitage. Secretary Armitage was sworn in on March 26, two months into the Administration and he has been intimately involved in the interagency deliberations on our counterterrorism policies. He also participated in National Security Council meetings whenever I was on travel. Mr. Chairman, I leave Washington this evening to represent President Bush and the American people at the memorial service in Madrid, Spain honoring the over 200 victims of the terrorists attacks of March 11, 2004. With deep sympathy and solidarity, our heart goes out to their loved ones and to the people of Spain. And just last Thursday, in the garden of our embassy in Islamabad, Pakistan, I presided at a memorial service in honor of two State Department family members, Barbara Green and her daughter Kristen Wormsley, who were killed two years ago by terrorists while they worshipped in church on a bright, beautiful spring morning. -
Human Rights Treaties and Foreign Surveillance: Privacy in the Digital Age
\\jciprod01\productn\H\HLI\56-1\HLI103.txt unknown Seq: 1 27-APR-15 10:31 Volume 56, Number 1, Winter 2015 Human Rights Treaties and Foreign Surveillance: Privacy in the Digital Age Marko Milanovic* Introduction The 2013 revelations by Edward Snowden of the scope and magnitude of electronic surveillance programs run by the U.S. National Security Agency (NSA) and some of its partners, chief among them the UK Government Communications Headquarters (GCHQ), have provoked intense public de- bate regarding the proper limits of such intelligence activities. Privacy ac- tivists decry such programs, especially those involving the mass collection of the data or communications of ordinary individuals across the globe, argu- ing that they create an inhibiting surveillance climate that diminishes basic freedoms, while government officials justify them as necessary to prevent terrorism. Snowden’s disclosures proved especially damaging for U.S. for- eign policy interests when it was revealed that the United States and some of its “Five Eyes” partners1 spied on the leaders of allied governments, includ- ing Germany, Mexico, Brazil, and Indonesia.2 * Associate Professor, University of Nottingham School of Law; Visiting Professor, University of Michigan Law School, Fall 2013; Secretary-General, European Society of International Law. E-mail: [email protected]. I am grateful for their most helpful comments to Gerry Neuman, Peter Margulies, the participants of the Roundtable on Protecting Human Rights in the Age of Surveil- lance, organized by the Center for Democracy and Technology and the American University Washington College of Law in January 2014, and the participants of the seminar on the Right to Privacy in the Digital Age organized at the United Nations headquarters in Geneva in February 2014. -
The 9/11 Commission Report
Final1-4.4pp 7/17/04 9:12 AM Page 108 4 RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 4.1 BEFORE THE BOMBINGS IN KENYA AND TANZANIA Although the 1995 National Intelligence Estimate had warned of a new type of terrorism, many officials continued to think of terrorists as agents of states (Saudi Hezbollah acting for Iran against Khobar Towers) or as domestic crim- inals (Timothy McVeigh in Oklahoma City).As we pointed out in chapter 3, the White House is not a natural locus for program management. Hence, gov- ernment efforts to cope with terrorism were essentially the work of individ- ual agencies. President Bill Clinton’s counterterrorism Presidential Decision Directives in 1995 (no. 39) and May 1998 (no. 62) reiterated that terrorism was a national security problem,not just a law enforcement issue.They reinforced the author- ity of the National Security Council (NSC) to coordinate domestic as well as foreign counterterrorism efforts, through Richard Clarke and his interagency Counterterrorism Security Group (CSG). Spotlighting new concerns about unconventional attacks, these directives assigned tasks to lead agencies but did not differentiate types of terrorist threats.Thus,while Clarke might prod or push agencies to act, what actually happened was usually decided at the State Depart- ment, the Pentagon, the CIA, or the Justice Department.The efforts of these agencies were sometimes energetic and sometimes effective.Terrorist plots were disrupted and individual terrorists were captured.But the United States did not, before 9/11, adopt as a clear strategic objective the elimination of al Qaeda. Early Efforts against Bin Ladin Until 1996, hardly anyone in the U.S.government understood that Usama Bin Ladin was an inspirer and organizer of the new terrorism. -
The Effects of the Madrid Terrorist At- Tacks on U.S.-European Cooperation in the War on Terrorism
S. HRG. 108-634 THE EFFECTS OF THE MADRID TERRORIST AT- TACKS ON U.S.-EUROPEAN COOPERATION IN THE WAR ON TERRORISM HEARING BEFORE THE SUBCOMMITTEE ON EUROPEAN AFFAIRS OF THE COMMITTEE ON FOREIGN RELATIONS UNITED STATES SENATE ONE HUNDRED EIGHTH CONGRESS SECOND SESSION MARCH 31, 2004 Printed for the use of the Committee on Foreign Relations ( Available via the World Wide Web: http://www.access.gpo.gov/congress/senate U.S. GOVERNMENT PRINTING OFFICE 95-699 PDF WASHINGTON : 2004 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2250 Mail: Stop SSOP, Washington, DC 20402–0001 VerDate 11-MAY-2000 09:48 Oct 13, 2004 Jkt 000000 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 95699 SFORELA1 PsN: SFORELA1 COMMITTEE ON FOREIGN RELATIONS RICHARD G. LUGAR, Indiana, Chairman CHUCK HAGEL, Nebraska JOSEPH R. BIDEN, JR., Delaware LINCOLN CHAFEE, Rhode Island PAUL S. SARBANES, Maryland GEORGE ALLEN, Virginia CHRISTOPHER J. DODD, Connecticut SAM BROWNBACK, Kansas JOHN F. KERRY, Massachusetts MICHAEL B. ENZI, Wyoming RUSSELL D. FEINGOLD, Wisconsin GEORGE V. VOINOVICH, Ohio BARBARA BOXER, California LAMAR ALEXANDER, Tennessee BILL NELSON, Florida NORM COLEMAN, Minnesota JOHN D. ROCKEFELLER IV, West Virginia JOHN E. SUNUNU, New Hampshire JON S. CORZINE, New Jersey KENNETH A. MYERS, JR., Staff Director ANTONY J. BLINKEN, Democratic Staff Director SUBCOMMITTEE ON EUROPEAN AFFAIRS GEORGE ALLEN, Virginia, Chairman GEORGE V. VOINOVICH, Ohio JOSEPH R. BIDEN, JR., Delaware CHUCK HAGEL, Nebraska PAUL S. SARBANES, Maryland JOHN E. SUNUNU, New Hampshire CHRISTOPHER J. -
Doc 7094 290 En.Pdf
Introduction By Ambassador Cofer Black Coordinator for Counterterrorism We’ve come to this moment through patience and resolve and focused action. And that is our strategy moving forward. The war on terror is a different kind of war, waged capture by capture, cell by cell, and victory by victory. Our security is assured by our perseverance and by our sure belief in the success of liberty. And the United States of America will not relent until this war is won. President George W. Bush on 14 December 2003 following the capture of Saddam Hussein In 2003, terrorists struck at targets around the world, even as Iraq became a central front in the global war against terrorism and the locus of so many deadly attacks against civilians. Al-Qaida and other terrorist groups made clear once again their relentless pursuit of evil in defi ance of any law—human or divine. The year saw heinous crimes against the international community, humanitarian organizations, and people dedicated to helping mankind: • A bomb in a cement truck exploded at the United Nations headquarters in Baghdad in August, killing special UN representative Sergio Vieira de Mello and 22 other persons. • The Baghdad International Committee for the Red Cross was bombed in October. • The Catholic Relief Services headquarters in Nassiryah was destroyed in a bombing on 12 November. • An explosion occurred near Save the Children USA’s offi ces in Kabul in November; the agency has been providing education, health, and economic assistance to children and families in Afghanistan for more than 20 years. Churches, synagogues, and mosques were all targeted by terrorists in 2003.