Homeland Threat Assessment October 2020

Total Page:16

File Type:pdf, Size:1020Kb

Homeland Threat Assessment October 2020 Homeland Threat Assessment U.S. Department of Homeland Security Homeland Threat Assessment October 2020 With honor and integrity, we will safeguard the American people, our homeland, and our values 2 U.S. Department of Homeland Security Contents Foreword 3 Structure of the HTA 6 Threats: Cyber 8 Foreign Influence Activity 10 Economic Security 14 Terrorism 17 Transnational Criminal Organization 21 Illegal Immigration 23 Natural Disasters 25 Secretary Chad Wolf, State of the Homeland, September 9, 2020 Homeland Threat Assessment U.S. Department of Homeland Security 3 Foreword In my role as Acting Secretary, I receive intelligence, operational, law enforcement, and other information on a daily basis. This Homeland Threat Assessment (HTA), the first of its kind for the U.S. Department of Homeland Security (DHS), draws upon all sources of information and expertise available to the Department, including from intelligence, law enforcement, and our operational Components. The result is a “Whole-of-DHS” report on the threats to the Homeland. This HTA is as close as the American people will get to seeing and understanding the information that I see as Secretary and that our employees see in their national security missions. As you read country. Our ability to mitigate these threats is through the HTA you should have faith in predicated on our ability to understand them knowing that these threats were identified and to inform the American people. I hope using the best intelligence, operational all Americans take a moment to review this information, and employee knowledge HTA and visit DHS.gov to learn how they can available to the Department. protect themselves from these threats. Identifying Threats using a Whole-of-DHS Today’s Threat Environment Approach Combatting terrorism will always be a priority The men and women serving in our to the Department of Homeland Security. operational Components are the experts Foreign terrorist organizations (FTO) still have in their national security and homeland the intent to attack the Homeland within security missions, making their insights and from beyond our borders. In the 19 years critical in threat identification and since September 11th, 2001, the United States prevention. Our operational Components Government (USG), DHS, and our foreign provided information about the threats partners have taken the fight directly to those they see and combat in performance of responsible for the attacks on that day, and to their mission. DHS is the first and last line other FTOs who seek to destroy our country of defense against many threats facing our based on an ill-informed and twisted ideology. We have enhanced our ability to identify “DHS has a vital mission: to secure the nation from the many and prevent individuals affiliated with these organizations from traveling or immigrating to threats we face. This requires the dedication of more than the United States. We have enhanced security and processes at our airports, ports of entry, 240,000 employees in positions that range from aviation and and beyond our borders. We have built the world’s greatest counterterrorism ecosystem border security to emergency response, from cybersecurity to keep Americans safe. More specifically, DHS has partnered with other USG agencies and analyst to chemical facility inspector. Our duties are foreign governments to raise the baseline for screening and vetting in the United States. In wide-ranging, and our goal is clear — keeping America safe.” the last few years we have enhanced existing vetting programs, created the National Secretary Chad Wolf, State of the Homeland, September 9, 2020 Vetting Center (NVC), expanded biographic 4 Homeland Threat Assessment U.S. Department of Homeland Security and biometric information sharing Exploitation of Lawful and Protected programs, and enacted national-level Speech and Protests. During the course policies requiring foreign governments of developing the HTA we began to see to share essential information for a new, alarming trend of exploitation vetting purposes or face potential travel of lawful protests causing violence, restrictions. death, and destruction in American communities. This anti-government, Trade and economic security is anti-authority and anarchist violent Homeland Security. We are increasingly extremism was identified by DHS in concerned about the threat posed September 2019 when we published by nation state actors in an emerging our Strategic Framework for Countering era of great power competition. DHS Terrorism and Targeted Violence. As is specifically concerned with the the date of publication of this HTA, we direct and indirect threat posed to the have seen over 100 days of violence and Homeland by the People’s Republic of destruction in our cities. The co-opting China (PRC). The Chinese Communist of lawful protests led to destruction of Party (CCP)-led PRC is challenging government property and have turned America’s place as the world’s global deadly. and economic leader. Threats emanating from China include damaging the U.S. Indeed, DHS law enforcement officers economy through intellectual property suffered over 300 separate injuries and theft, production and distribution of were assaulted with sledgehammers, counterfeit goods, and unfair trade commercial grade fireworks, rocks, metal practices. DHS has a mandate to mitigate pipes, improvised explosive devices, these threats and we will do so with a and more. This violence, perpetrated clear-eyed view that China is a long-term by anarchist extremists and detailed strategic competitor to the U.S. in numerous public statements that remain available on the DHS website, Domestic violent extremism is a threat significantly threatens the Homeland by to the Homeland. As Americans, we all undermining officer and public safety— have the right to believe whatever we as well as our values and way of life. want, but we don’t have a right to carry While the HTA touches on these issues, out acts of violence to further those we are still in the nascent stages of beliefs. The Department works with understanding the threat this situation other Government, non-Government, poses to Americans, the Homeland, and and private sector partners to prevent the American way of life. individuals from making this transition from protected speech to domestic Cyber security threats from nation-states terrorism reflected by violence. As and non-state actors present Secretary, I am concerned about any challenging threats to our Homeland form of violent extremism. That is and critical infrastructure. DHS has a why we design our programs to be critical mission to protect America’s threat agnostic – ensuring that we can infrastructure, which includes our cyber- “ With honor and combat a broad range of domestic infrastructure. We are concerned with threats. However, I am particularly the intents, capabilities, and actions of integrity, we will concerned about white supremacist nation-states such as China, Russia, Iran, violent extremists who have been and North Korea. Nation-state targeting safeguard the exceptionally lethal in their abhorrent, of our assets seeks to disrupt the targeted attacks in recent years. I am infrastructure that keeps the American American people, our proud of our work to prevent terrorizing economy moving forward and poses tactics by domestic terrorists and violent a threat to national security. On top Homeland, and our extremists who seek to force ideological of the threats to critical infrastructure, change in the United States through cybercriminals also target our networks values.” violence, death, and destruction. to steal information, hold organizations Homeland Threat Assessment U.S. Department of Homeland Security 5 hostage, and harm American companies for their transit, to U.S. border communities, and to our own gain. officers and agents who encounter migrants when they enter the United States. To mitigation Nation-states will continue to try to undermine this threat we instituted enhanced restrictions American elections. Threats to our election have at our borders, limited travel to only essential been another rapidly evolving issue. Nation-states travelers and implemented a Center for Disease like China, Russia, and Iran will try to use cyber Control (CDC) order that protects Americans from capabilities or foreign influence to compromise COVID-19. or disrupt infrastructure related to the 2020 U.S. Presidential election, aggravate social and racial Natural occurrences continue to harm the life and tensions, undermine trust in U.S. authorities, property of Americans. In 2020 alone we have and criticize our elected officials. Perhaps most seen an unprecedented storm season that has alarming is that our adversaries are seeking to taken the livelihoods of many Americans in our sway the preferences and perceptions of U.S. Gulf states and a historic wildfire season that has voters using influence operations. Americans need caused devastation on the West Coast. Americans to understand this threat and arm themselves with in-between our coasts also face the threat of all information available to avoid falling prey to natural disasters from a variety of causes. On these tactics. top of the threat to life and safety, these events have devastating impacts on local and national While Russia has been a persistent threat by economies. The Department is at the forefront of attempting to harm our democratic and election providing information to help Americans prepare, systems, it is clear China and Iran also pose threats
Recommended publications
  • Oktoberfest’ Comes Across the Pond
    Friday, October 5, 2012 | he Torch [culture] 13 ‘Oktoberfest’ comes across the pond Kaesespaetzle and Brezeln as they Traditional German listened to traditional German celebration attended music. A presentation with a slideshow was also given presenting by international, facts about German history and culture. American students One of the facts mentioned in the presentation was that Germans Thomas Dixon who are learning English read Torch Staff Writer Shakespeare because Shakespearian English is very close to German. On Friday, Sept. 28, Valparaiso Sophomore David Rojas Martinez University students enjoyed expressed incredulity at this an American edition of a famous particular fact, adding that this was German festival when the Valparaiso something he hadn’t known before. International Student Association “I learned new things I didn’t and the German know about Club put on German and Oktoberfest. I thought it was English,” Rojas he event great. Good food, Martinez said. was based on the good people, great “And I enjoyed annual German German culture. the food – the c e l e b r a t i o n food was great.” O k t o b e r f e s t , Other facts Ian Roseen Matthew Libersky / The Torch the largest beer about Germany Students from the VU German Club present a slideshow at Friday’s Oktoberfest celebration in the Gandhi-King Center. festival in the Senior mentioned in world. he largest the presentation event, which takes place in included the existence of the Munich, Germany, coincided with Weisswurstaequator, a line dividing to get into the German culture. We c u ltu re .” to have that mix and actual cultural VU’s own festival and will Germany into separate linguistic try to do things that have to do with Finegan also expressed exchange,” Finegan said.
    [Show full text]
  • The Need to Implement Whti to Protect Us
    THE NEED TO IMPLEMENT WHTI TO PROTECT U.S. HOMELAND SECURITY HEARING BEFORE THE SUBCOMMITTEE ON IMMIGRATION, BORDER SECURITY, AND CLAIMS OF THE COMMITTEE ON THE JUDICIARY HOUSE OF REPRESENTATIVES ONE HUNDRED NINTH CONGRESS SECOND SESSION JUNE 8, 2006 Serial No. 109–117 Printed for the use of the Committee on the Judiciary ( Available via the World Wide Web: http://judiciary.house.gov U.S. GOVERNMENT PRINTING OFFICE 27–987 PDF WASHINGTON : 2006 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2250 Mail: Stop SSOP, Washington, DC 20402–0001 VerDate 0ct 09 2002 11:50 Aug 15, 2006 Jkt 000000 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 G:\WORK\IMMIG\060806\27987.000 HJUD1 PsN: 27987 COMMITTEE ON THE JUDICIARY F. JAMES SENSENBRENNER, JR., Wisconsin, Chairman HENRY J. HYDE, Illinois JOHN CONYERS, JR., Michigan HOWARD COBLE, North Carolina HOWARD L. BERMAN, California LAMAR SMITH, Texas RICK BOUCHER, Virginia ELTON GALLEGLY, California JERROLD NADLER, New York BOB GOODLATTE, Virginia ROBERT C. SCOTT, Virginia STEVE CHABOT, Ohio MELVIN L. WATT, North Carolina DANIEL E. LUNGREN, California ZOE LOFGREN, California WILLIAM L. JENKINS, Tennessee SHEILA JACKSON LEE, Texas CHRIS CANNON, Utah MAXINE WATERS, California SPENCER BACHUS, Alabama MARTIN T. MEEHAN, Massachusetts BOB INGLIS, South Carolina WILLIAM D. DELAHUNT, Massachusetts JOHN N. HOSTETTLER, Indiana ROBERT WEXLER, Florida MARK GREEN, Wisconsin ANTHONY D. WEINER, New York RIC KELLER, Florida ADAM B. SCHIFF, California DARRELL ISSA, California LINDA T. SA´ NCHEZ, California JEFF FLAKE, Arizona CHRIS VAN HOLLEN, Maryland MIKE PENCE, Indiana DEBBIE WASSERMAN SCHULTZ, Florida J.
    [Show full text]
  • Event. Location
    12th Annual A remarkable CHAMBER EVENT. MUSIC FESTIVAL A remarkable of the LOCATION. BLUEGRASS 2018 Overview Festival Program Now in its 12th year, the FRIDAY, MAY 25, 2018 Chamber Music Festival of the Bluegrass is a premier The Meeting House Central Kentucky cultural destination. Join CMS Artistic Directors David Haydn Finckel and Wu Han for Trio in C major for Piano, Violin, and Cello, Hob. XV:27 (1797) special performances in the Allegro 1820 Meeting House and the Wu Han, Huang, Finckel Meadow View Barn. Chamber music enthusiasts will also Schumann enjoy two educational lectures, Quartet in E-flat major for Piano, Violin, Viola, and Cello, Op. 47 (1842) led by Patrick Castillo, Andante cantabile exploring the history of each Wu Han, Keefe, Lipman, Atapine featured piece of music. Waxman 2018 ARTISTS Carmen Fantasie for Viola and Piano (1947) Lipman, Pohjonen JUHO POHJONEN, Piano WU HAN, Piano Brahms Trio in E-flat major for Horn, Violin, and Piano, Op. 40 (1865) PAUL HUANG, Violin Finale: Allegro con brio ERIN KEEFE, Violin Vlatkovic, Pohjonen MATTHEW LIPMAN, Viola DMITRI ATAPINE, Cello DAVID FINCKEL, Cello RADOVAN VLATKOVIC´ , Horn Friday, May 25 at 6:30pm: Patrons’ Gala and Dinner 12th Annual CHAMBER MUSIC FESTIVAL of the BLUEGRASS SATURDAY, MAY 26, 2018 AT 11:00 AM Dvorák, 14’ SUNDAY, MAY 27, 2018 AT 5:00 PM THE MEETING HOUSE Drobnosti (Miniatures) for Two Violins and Viola, MEADOW VIEW BARN Op. 75a (1887) Haydn, 16’ Cavatina: Moderato Mozart, 26’ Trio in C major for Piano, Violin, and Cello, Capriccio: Poco allegro Quartet in G minor for Piano, Violin, Viola, and Hob.
    [Show full text]
  • The Arctic Is... a Homeland Page 1 Cycles As They Follow the Animals with Which Their Lives Are Closely Involved
    A HOMELAND landscape and people It is late winter and the temperature is minus 40 degrees Celsius. The sea is frozen over for a mile from the shore. Far out on the ice a solitary hunter inches forwards towards a seal which has come up for air through a hole in the ice and is resting on the surface. In front of him he pushes a rifle hidden behind a white screen of canvas. There is no sign that there is anyone hidden behind the screen, except for a small cloud of condensation above him as he breathes. If he is skilful and lucky, the seal will not notice him until it is too late. Meanwhile, thousands of miles away inland, three reindeer herders wait on a windswept hilltop, scanning the surrounding mountains with binoculars. In the distance, they see two other herders riding reindeer and weaving their way through the thin larch trees which seem drawn with black ink against the snow on the ground. They have found part of the herd and are driving it toward the waiting men. At last, the sound of men whistling and deer grunting can be heard. The first reindeer filter through the Figure 1 Kyrnysh-Di forest island near surrounding trees, the camouflage of their fur blending closely with the Kolva-Vis river, Nenets Autonomous snow and the tress’ rough, grey-brown bark. Suddenly, the waiting men District.Photo taken by Joachim Otto Habeck, May 1999 burst into action with their lassos, separating some deer and bunching others in order to drive them off later to different pastures.
    [Show full text]
  • Extremists on the Left and Right Use Angry, Negative Language
    PSPXXX10.1177/0146167218809705Personality and Social Psychology BulletinFrimer et al. 809705research-article2018 Empirical Research Paper Personality and Social Psychology Bulletin Extremists on the Left and Right 1 –16 © 2018 by the Society for Personality and Social Psychology, Inc Use Angry, Negative Language Article reuse guidelines: sagepub.com/journals-permissions DOI:https://doi.org/10.1177/0146167218809705 10.1177/0146167218809705 journals.sagepub.com/home/pspb Jeremy A. Frimer1 , Mark J. Brandt2 , Zachary Melton3, and Matt Motyl3 Abstract We propose that political extremists use more negative language than moderates. Previous research found that conservatives report feeling happier than liberals and yet liberals “display greater happiness” in their language than do conservatives. However, some of the previous studies relied on questionable measures of political orientation and affective language, and no studies have examined whether political orientation and affective language are nonlinearly related. Revisiting the same contexts (Twitter, U.S. Congress), and adding three new ones (political organizations, news media, crowdsourced Americans), we found that the language of liberal and conservative extremists was more negative and angry in its emotional tone than that of moderates. Contrary to previous research, we found that liberal extremists’ language was more negative than that of conservative extremists. Additional analyses supported the explanation that extremists feel threatened by the activities of political rivals, and their angry, negative language represents efforts to communicate as much to others. Keywords language, anger, extremism, liberals and conservatives, threat, happiness Received February 27, 2018; revision accepted October 1, 2018 For too many of our citizens, a different reality exists: extremists—on both the political left and right—use more Mothers and children trapped in poverty in our inner cities; negative language than moderates.
    [Show full text]
  • Key Factors That Enable the Pandemic Potential of RNA Viruses and Inter-Species Transmission: a Systematic Review
    viruses Review Key Factors That Enable the Pandemic Potential of RNA Viruses and Inter-Species Transmission: A Systematic Review Santiago Alvarez-Munoz , Nicolas Upegui-Porras , Arlen P. Gomez and Gloria Ramirez-Nieto * Microbiology and Epidemiology Research Group, Facultad de Medicina Veterinaria y de Zootecnia, Universidad Nacional de Colombia, Bogotá 111321, Colombia; [email protected] (S.A.-M.); [email protected] (N.U.-P.); [email protected] (A.P.G.) * Correspondence: [email protected]; Tel.: +57-1-3-16-56-93 Abstract: Viruses play a primary role as etiological agents of pandemics worldwide. Although there has been progress in identifying the molecular features of both viruses and hosts, the extent of the impact these and other factors have that contribute to interspecies transmission and their relationship with the emergence of diseases are poorly understood. The objective of this review was to analyze the factors related to the characteristics inherent to RNA viruses accountable for pandemics in the last 20 years which facilitate infection, promote interspecies jump, and assist in the generation of zoonotic infections with pandemic potential. The search resulted in 48 research articles that met the inclusion criteria. Changes adopted by RNA viruses are influenced by environmental and host-related factors, which define their ability to adapt. Population density, host distribution, migration patterns, and the loss of natural habitats, among others, have been associated as factors in the virus–host interaction. This review also included a critical analysis of the Latin American context, considering its diverse and unique social, cultural, and biodiversity characteristics. The scarcity of scientific information is Citation: Alvarez-Munoz, S.; striking, thus, a call to local institutions and governments to invest more resources and efforts to the Upegui-Porras, N.; Gomez, A.P.; study of these factors in the region is key.
    [Show full text]
  • Defining Homeland Security: Analysis and Congressional Considerations
    Defining Homeland Security: Analysis and Congressional Considerations Updated January 8, 2013 Congressional Research Service https://crsreports.congress.gov R42462 Defining Homeland Security: Analysis and Congressional Considerations Summary Ten years after the September 11, 2001, terrorist attacks, the U.S. government does not have a single definition for “homeland security.” Currently, different strategic documents and mission statements offer varying missions that are derived from different homeland security definitions. Historically, the strategic documents framing national homeland security policy have included national strategies produced by the White House and documents developed by the Department of Homeland Security (DHS). Prior to the 2010 National Security Strategy, the 2002 and 2007 National Strategies for Homeland Security were the guiding documents produced by the White House. In 2011, the White House issued the National Strategy for Counterterrorism. In conjunction with these White House strategies, DHS has developed a series of evolving strategic documents that are based on the two national homeland security strategies and include the 2008 Strategic Plan—One Team, One Mission, Securing the Homeland; the 2010 Quadrennial Homeland Security Review and Bottom-Up Review; and the 2012 Department of Homeland Security Strategic Plan. The 2012 DHS strategic plan is the latest evolution in DHS’s process of defining its mission, goals, and responsibilities. This plan, however, only addresses the department’s homeland security purview and is not a document that addresses homeland security missions and responsibilities that are shared across the federal government. Currently, the Department of Homeland Security is developing the 2014 Quadrennial Homeland Security Review, which is due late 2013 or early 2014.
    [Show full text]
  • Threnody Amy Fitzgerald Macalester College, [email protected]
    Macalester College DigitalCommons@Macalester College English Honors Projects English Department 2012 Threnody Amy Fitzgerald Macalester College, [email protected] Follow this and additional works at: http://digitalcommons.macalester.edu/english_honors Part of the English Language and Literature Commons Recommended Citation Fitzgerald, Amy, "Threnody" (2012). English Honors Projects. Paper 21. http://digitalcommons.macalester.edu/english_honors/21 This Honors Project - Open Access is brought to you for free and open access by the English Department at DigitalCommons@Macalester College. It has been accepted for inclusion in English Honors Projects by an authorized administrator of DigitalCommons@Macalester College. For more information, please contact [email protected]. Threnody By Amy Fitzgerald English Department Honors Project, May 2012 Advisor: Peter Bognanni 1 Glossary of Words, Terms, and Institutions Commissie voor Oorlogspleegkinderen : Commission for War Foster Children; formed after World War II to relocate war orphans in the Netherlands, most of whom were Jewish (Dutch) Crèche : nursery (French origin) Fraulein : Miss (German) Hervormde Kweekschool : Reformed (religion) teacher’s training college Hollandsche Shouwberg : Dutch Theater Huppah : Jewish wedding canopy Kaddish : multipurpose Jewish prayer with several versions, including the Mourners’ Kaddish KP (full name Knokploeg): Assault Group, a Dutch resistance organization LO (full name Landelijke Organasatie voor Hulp aan Onderduikers): National Organization
    [Show full text]
  • Facebook and Violent Extremism Awareness Brief
    Facebook and Violent Extremism Understanding Facebook legitimate reasons, violent extremists, gangs, and terrorist groups also have a significant With more than 1 billion users, Facebook is presence and following on Facebook.1 The one of the most popular social networking following identifies the ways domestic and sites. After users create a personal profile or international extremists of all persuasions use organization page and add photos, contact Facebook to promote violence: information, and additional information, they can search for people with similar interests, Recruitment create networks of “friends,” communicate by sending private messages or posting Facebook provides violent extremists with a comments on another user’s wall, “like” pages vast recruiting ground. In the United States of organizations and join “groups” with other alone, 67 percent of all Internet users have a users who share similar interests, and post and Facebook profile, and the percentages are even share content created on Facebook or linked to higher for youth and young adults. Moreover, another website. Facebook is one of the top three websites visited by people under the age of 18.2 How Extremists Use Facebook Extremists take advantage of the fact that parents and law enforcement often are not Although individuals and organizations aware of the dangers that could be present worldwide use Facebook for a variety of when a young person spends large amounts AWARENESS BRIEF 2 AWARENESS BRIEF of time on Facebook. Extremist individuals bring propaganda to a wider audience and and organizations use this viewing potential to serve as a gateway to other extremist websites create lines of communication, enabling them where more radical content is available.
    [Show full text]
  • The Alt-Right on Campus: What Students Need to Know
    THE ALT-RIGHT ON CAMPUS: WHAT STUDENTS NEED TO KNOW About the Southern Poverty Law Center The Southern Poverty Law Center is dedicated to fighting hate and bigotry and to seeking justice for the most vulnerable members of our society. Using litigation, education, and other forms of advocacy, the SPLC works toward the day when the ideals of equal justice and equal oportunity will become a reality. • • • For more information about the southern poverty law center or to obtain additional copies of this guidebook, contact [email protected] or visit www.splconcampus.org @splcenter facebook/SPLCenter facebook/SPLConcampus © 2017 Southern Poverty Law Center THE ALT-RIGHT ON CAMPUS: WHAT STUDENTS NEED TO KNOW RICHARD SPENCER IS A LEADING ALT-RIGHT SPEAKER. The Alt-Right and Extremism on Campus ocratic ideals. They claim that “white identity” is under attack by multicultural forces using “politi- An old and familiar poison is being spread on col- cal correctness” and “social justice” to undermine lege campuses these days: the idea that America white people and “their” civilization. Character- should be a country for white people. ized by heavy use of social media and memes, they Under the banner of the Alternative Right – or eschew establishment conservatism and promote “alt-right” – extremist speakers are touring colleges the goal of a white ethnostate, or homeland. and universities across the country to recruit stu- As student activists, you can counter this movement. dents to their brand of bigotry, often igniting pro- In this brochure, the Southern Poverty Law Cen- tests and making national headlines. Their appear- ances have inspired a fierce debate over free speech ter examines the alt-right, profiles its key figures and the direction of the country.
    [Show full text]
  • National Security and Local Police
    BRENNAN CENTER FOR JUSTICE NATIONAL SECURITY AND LOCAL POLICE Michael Price Brennan Center for Justice at New York University School of Law ABOUT THE BRENNAN CENTER FOR JUSTICE The Brennan Center for Justice at NYU School of Law is a nonpartisan law and policy institute that seeks to improve our systems of democracy and justice. We work to hold our political institutions and laws accountable to the twin American ideals of democracy and equal justice for all. The Center’s work ranges from voting rights to campaign finance reform, from racial justice in criminal law to Constitutional protection in the fight against terrorism. A singular institution — part think tank, part public interest law firm, part advocacy group, part communications hub — the Brennan Center seeks meaningful, measurable change in the systems by which our nation is governed. ABOUT THE BRENNAN CENTER’S LIBERTY AND NATIONAL SECURITY PROGRAM The Brennan Center’s Liberty and National Security Program works to advance effective national security policies that respect Constitutional values and the rule of law, using innovative policy recommendations, litigation, and public advocacy. The program focuses on government transparency and accountability; domestic counterterrorism policies and their effects on privacy and First Amendment freedoms; detainee policy, including the detention, interrogation, and trial of terrorist suspects; and the need to safeguard our system of checks and balances. ABOUT THE BRENNAN CENTER’S PUBLICATIONS Red cover | Research reports offer in-depth empirical findings. Blue cover | Policy proposals offer innovative, concrete reform solutions. White cover | White papers offer a compelling analysis of a pressing legal or policy issue.
    [Show full text]
  • Pdf (Accessed: 3 June, 2014) 17
    A University of Sussex DPhil thesis Available online via Sussex Research Online: http://sro.sussex.ac.uk/ This thesis is protected by copyright which belongs to the author. This thesis cannot be reproduced or quoted extensively from without first obtaining permission in writing from the Author The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the Author When referring to this work, full bibliographic details including the author, title, awarding institution and date of the thesis must be given Please visit Sussex Research Online for more information and further details 1 The Production and Reception of gender- based content in Pakistani Television Culture Munira Cheema DPhil Thesis University of Sussex (June 2015) 2 Statement I hereby declare that this thesis has not been submitted, either in the same or in a different form, to this or any other university for a degree. Signature:………………….. 3 Acknowledgements Special thanks to: My supervisors, Dr Kate Lacey and Dr Kate O’Riordan, for their infinite patience as they answered my endless queries in the course of this thesis. Their open-door policy and expert guidance ensured that I always stayed on track. This PhD was funded by the Arts and Humanities Research Council (AHRC), to whom I owe a debt of gratitude. My mother, for providing me with profound counselling, perpetual support and for tirelessly watching over my daughter as I scrambled to meet deadlines. This thesis could not have been completed without her. My husband Nauman, and daughter Zara, who learnt to stay out of the way during my ‘study time’.
    [Show full text]