Terrorist Financing
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Wilson Doctrine Pat Strickland
BRIEFING PAPER Number 4258, 19 June 2015 By Cheryl Pilbeam The Wilson Doctrine Pat Strickland Inside: 1. Introduction 2. Historical background 3. The Wilson doctrine 4. Prison surveillance 5. Damian Green 6. The NSA files and metadata 7. Labour MPs: police monitoring www.parliament.uk/commons-library | intranet.parliament.uk/commons-library | [email protected] | @commonslibrary Number 4258, 19 June 2015 2 Contents Summary 3 1. Introduction 4 2. Historical background 4 3. The Wilson doctrine 5 3.1 Criticism of the Wilson doctrine 6 4. Prison surveillance 9 4.1 Alleged events at Woodhill prison 9 4.2 Recording of prisoner’s telephone calls – 2006-2012 10 5. Damian Green 12 6. The NSA files and metadata 13 6.1 Prism 13 6.2 Tempora and metadata 14 Legal challenges 14 7. Labour MPs: police monitoring 15 Cover page image copyright: Chamber-070 by UK Parliament image. Licensed under CC BY 2.0 / image cropped 3 The Wilson Doctrine Summary The convention that MPs’ communications should not be intercepted by police or security services is known as the ‘Wilson Doctrine’. It is named after the former Prime Minister Harold Wilson who established the rule in 1966. According to the Times on 18 November 1966, some MPs were concerned that the security services were tapping their telephones. In November 1966, in response to a number of parliamentary questions, Harold Wilson made a statement in the House of Commons saying that MPs phones would not be tapped. More recently, successive Interception of Communications Commissioners have recommended that the forty year convention which has banned the interception of MPs’ communications should be lifted, on the grounds that legislation governing interception has been introduced since 1966. -
High Court Judgment Template
Case No: CO/5160/2014 Neutral Citation Number: [2015] EWHC 2354 (Admin) IN THE HIGH COURT OF JUSTICE QUEEN'S BENCH DIVISION ADMINISTRATIVE COURT Royal Courts of Justice Strand, London, WC2A 2LL Date: 07/08/2015 Before: THE HONOURABLE MR JUSTICE CRANSTON - - - - - - - - - - - - - - - - - - - - - Between: THE COMMISSIONER OF THE POLICE OF THE Claimant METROPOLIS - and - SYED TALHA AHSAN Defendant - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Mr Tom Little (instructed by the Metropolitan Police Legal Service) for the Claimant Mr Daniel Squires (instructed by Birnberg Peirce & Partners) for the Defendant Hearing dates: 24/07/2015 - - - - - - - - - - - - - - - - - - - - - Judgmen tMr Justice Cranston: Introduction: 1. This is an application by the Commissioner of Police of the Metropolis (“the Commissioner”) for an order to impose notification requirements for a period of 15 years on Syed Talha Ahsan (“Mr Ahsan”) under the Counter-Terrorism Act 2008 (“the 2008 Act”). In 2013, he was convicted in the United States of conspiracy to provide material assistance for terrorism through his involvement in a website. He has now returned to the United Kingdom. The notification order will require him for that period to attend police stations to provide, and update, information about his living arrangements and to provide details about his travel plans, for which permission can be refused. Breach of the requirements is punishable with imprisonment of up to 5 years. 2. Notification requirements have been imposed in many cases when persons have been convicted in the UK of terrorist-related offences. This is the first case in which a notification order has been contested in respect of a person convicted outside the UK of a corresponding foreign offence. -
The Ethics of Intelligence Collection Ross W. Bellaby
What’s the Harm? The Ethics of Intelligence Collection Ross W. Bellaby Thesis submitted in fulfilment of the requirements for the degree of PhD Department of International Politics Aberystwyth University June 13th, 2011 DECLARATION This work has not previously been accepted in substance for any degree and is not being concurrently submitted in candidature for any degree. Signed ...................................................................... (Ross W. Bellaby) Date ........................................................................ STATEMENT 1 This thesis is the result of my own investigations, except where otherwise stated. Where *correction services have been used, the extent and nature of the correction is clearly marked in a footnote(s). Other sources are acknowledged by footnotes giving explicit references. A bibliography is appended. Signed ..................................................................... (Ross W. Bellaby) Date ........................................................................ [*this refers to the extent to which the text has been corrected by others] STATEMENT 2 I hereby give consent for my thesis, if accepted, to be available for photocopying and for inter- library loan, and for the title and summary to be made available to outside organisations. Signed ..................................................................... (Ross W. Bellaby) Date ........................................................................ I hereby give consent for my thesis, if accepted, to be available for photocopying -
Counterterror Initiatives in the Terror Finance Program
S. HRG. 108–802 COUNTERTERROR INITIATIVES IN THE TERROR FINANCE PROGRAM HEARINGS BEFORE THE COMMITTEE ON BANKING, HOUSING, AND URBAN AFFAIRS UNITED STATES SENATE ONE HUNDRED EIGHTH CONGRESS FIRST AND SECOND SESSIONS ON COUNTERTERROR INITIATIVES IN THE TERROR FINANCE PROGRAM, FO- CUSING ON THE ROLE OF THE ANTI-MONEY LAUNDERING REGU- LATORY REGIME IN THE FINANCIAL WAR ON TERRORISM, BETTER UTILIZATION OF TECHNOLOGY, INCREASED INFORMATION SHARING, DEVELOPING SIMILAR INTERNATIONAL STANDARDS, AND THE FOR- MATION OF THE TERRORIST FINANCING OPERATIONS SECTION (TFOS) SEPTEMBER 25, OCTOBER 22, 2003, APRIL 29, AND SEPTEMBER 29, 2004 Printed for the use of the Committee on Banking, Housing, and Urban Affairs ( Available at: http://www.access.gpo.gov/senate/senate05sh.html U.S. GOVERNMENT PRINTING OFFICE 20–396 PDF WASHINGTON : 2005 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2250 Mail: Stop SSOP, Washington, DC 20402–0001 VerDate 0ct 09 2002 14:21 May 03, 2005 Jkt 020396 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 S:\DOCS\20396.TXT BANK1 PsN: JIM COMMITTEE ON BANKING, HOUSING, AND URBAN AFFAIRS RICHARD C. SHELBY, Alabama, Chairman ROBERT F. BENNETT, Utah PAUL S. SARBANES, Maryland WAYNE ALLARD, Colorado CHRISTOPHER J. DODD, Connecticut MICHAEL B. ENZI, Wyoming TIM JOHNSON, South Dakota CHUCK HAGEL, Nebraska JACK REED, Rhode Island RICK SANTORUM, Pennsylvania CHARLES E. SCHUMER, New York JIM BUNNING, Kentucky EVAN BAYH, Indiana MIKE CRAPO, Idaho ZELL MILLER, Georgia JOHN E. SUNUNU, New Hampshire THOMAS R. CARPER, Delaware ELIZABETH DOLE, North Carolina DEBBIE STABENOW, Michigan LINCOLN D. -
Union Will Campaign to Free Former Student Imprisoned Under Terror
The ye ar of physics Going underground New year nightlife Flying daggers Celebrating science in 2005, The Caving Club’s ex pedition Ringing in 2005 with some Felix Film takes in a page 7 to Slovenia, page 11 psy-trance, page 14 beautiful movie, page 16 The student newspaper of Imperial College ● Established 1949 ● Issue 1310 ● Thursday 6 January 2005 ● www.felixonline.co.uk The tsunami On Boxing Day, countries sur- rounding the Indian Ocean Union will campaign to free former were struck by one of the worst natural disasters in history. student imprisoned under terror laws There are six articles on the tragedy, including details of Imperial College’s response By Dave Edwards and how an early warning Editor system could have saved thousands of lives. Imperial College Union has uNEWS page 2 resolved to actively support u SCIENCE page 7 the ‘Free Babar Ahmad’ cam- paign. Library loss? Mr Ahmad, a former stu- The popular mechanical engi- dent and staff member at neering department library Imperial College, was arrest- and reading room may close ed in December 2003 under in the near future. The area the Terrorism Act [see Felix is seen as “a potential solu- issue 1279] and subsequently tion to a series of conflicting released without charge. He demands for space”. was rearrested in August this uNEWS page 4 year on allegations of involve- ment in acts of terrorism and Accountability is currently awaiting extradi- The Imperial College Union tion to the United States. His President and other offic- case is due to be reviewed in ers have been criticised for the near future. -
Read an Excerpt
268 KENNETH R. TIMMERMAN +++ The fact the meeting took place at all was unusual. Somehow, the event had slipped beneath the radar screen of the “mainstream” organizations, who claimed to represent the U.S. Muslim population. These groups worked very hard to monitor U.S. government activities, and had a “war room” style operation to counter remarks about radical Islam wherever they appeared. They regularly smeared journalists and terrorism experts such as Steve Emerson as “anti-Muslim bigots” and “racists.” But Sheikh Mohammad Hisham Kabbani was a fellow Muslim, leader of the Islamic Supreme Council of America. Since 1992, just one year after he arrived in America from his native Lebanon, Sheikh Kabbani had crossed swords with these groups. Until now, however, the blows had fallen within the closeted confines of mosques and Arabic-language media. The State Department invited Sheikh Kabbani to the Jan. 9, 1999 open forum on Islamic extremism precisely because they had learned he did not fear exposing the Saudi-backed Wahhabi lobby and their ties to terrorist groups that were killing Americans and Jews around the world. In his energetic presentation, wearing a scholarly robes, the white turbaned Kabbani warned U.S. officials that an organized effort was underway to hijack the Muslim community in America. It had been launched by Islamic extremists whose goals were totally incompatible with American values, and whose methods in many instances violated American law. These Saudi-backed Muslim organizations “are declaring war against anyone who will not go with them,” and had taken over “more than 80% of the mosques that have been established in the U.S.,” he said. -
Homeland Security Implications of Radicalization
THE HOMELAND SECURITY IMPLICATIONS OF RADICALIZATION HEARING BEFORE THE SUBCOMMITTEE ON INTELLIGENCE, INFORMATION SHARING, AND TERRORISM RISK ASSESSMENT OF THE COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED NINTH CONGRESS SECOND SESSION SEPTEMBER 20, 2006 Serial No. 109–104 Printed for the use of the Committee on Homeland Security Available via the World Wide Web: http://www.gpoaccess.gov/congress/index.html U.S. GOVERNMENT PRINTING OFFICE 35–626 PDF WASHINGTON : 2008 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 COMMITTEE ON HOMELAND SECURITY PETER T. KING, New York, Chairman DON YOUNG, Alaska BENNIE G. THOMPSON, Mississippi LAMAR S. SMITH, Texas LORETTA SANCHEZ, California CURT WELDON, Pennsylvania EDWARD J. MARKEY, Massachusetts CHRISTOPHER SHAYS, Connecticut NORMAN D. DICKS, Washington JOHN LINDER, Georgia JANE HARMAN, California MARK E. SOUDER, Indiana PETER A. DEFAZIO, Oregon TOM DAVIS, Virginia NITA M. LOWEY, New York DANIEL E. LUNGREN, California ELEANOR HOLMES NORTON, District of JIM GIBBONS, Nevada Columbia ROB SIMMONS, Connecticut ZOE LOFGREN, California MIKE ROGERS, Alabama SHEILA JACKSON-LEE, Texas STEVAN PEARCE, New Mexico BILL PASCRELL, JR., New Jersey KATHERINE HARRIS, Florida DONNA M. CHRISTENSEN, U.S. Virgin Islands BOBBY JINDAL, Louisiana BOB ETHERIDGE, North Carolina DAVE G. REICHERT, Washington JAMES R. LANGEVIN, Rhode Island MICHAEL MCCAUL, Texas KENDRICK B. MEEK, Florida CHARLIE DENT, Pennsylvania GINNY BROWN-WAITE, Florida SUBCOMMITTEE ON INTELLIGENCE, INFORMATION SHARING, AND TERRORISM RISK ASSESSMENT ROB SIMMONS, Connecticut, Chairman CURT WELDON, Pennsylvania ZOE LOFGREN, California MARK E. -
Inventing Terrorists: the Nexus of Intelligence and Islamophobia
This is a repository copy of Inventing terrorists: the nexus of intelligence and Islamophobia. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/146149/ Version: Accepted Version Article: Marusek, S orcid.org/0000-0002-2234-1506 (2018) Inventing terrorists: the nexus of intelligence and Islamophobia. Critical Studies on Terrorism, 11 (1). pp. 65-87. ISSN 1753-9153 https://doi.org/10.1080/17539153.2017.1351597 © 2017 Informa UK Limited, Trading as Taylor & Francis Group. This is an author produced version of a paper published in Critical Studies on Terrorism. Uploaded in accordance with the publisher's self-archiving policy. Reuse Items deposited in White Rose Research Online are protected by copyright, with all rights reserved unless indicated otherwise. They may be downloaded and/or printed for private study, or other acts as permitted by national copyright laws. The publisher or other rights holders may allow further reproduction and re-use of the full text version. This is indicated by the licence information on the White Rose Research Online record for the item. Takedown If you consider content in White Rose Research Online to be in breach of UK law, please notify us by emailing [email protected] including the URL of the record and the reason for the withdrawal request. [email protected] https://eprints.whiterose.ac.uk/ Inventing Terrorists: The nexus of intelligence and Islamophobia Abstract: The transatlantic Islamophobia industry, emboldened by US intelligence efforts to entrap Muslims, appears to have helped to increase permissible levels of Islamophobia across the US, as illustrated by the fiery anti-Muslim rhetoric during the 2016 presidential campaign. -
CTC Sentinel Welcomes Submissions
OBJECTIVE ·· RELEVANT ·· RIGOROUS || JUNE/JULYMARCH 2019 2018 · VOLUME · VOLUME 12, 11,ISSUE ISSUE 3 6 FEATURE ARTICLE A VIEW FROM THE CT FOXHOLE A VIEW FROM THE CT FOXHOLE TheHezbollah's Jihadi Threat Procurement Channels LTC(R)Vayl S. Bryan Oxford Price toHow theIndonesia group leverages criminal networks and partners with Iran Director, Former Defense Director, Threat KirstenMatthew E. SchulzeLevitt CombatingReduction Terrorism Agency Center FEATURE ARTICLE 1 Hezbollah's Procurement Channels: Leveraging Criminal Networks and Editor in Chief Partnering with Iran Paul Cruickshank Matthew Levitt Managing Editor INTERVIEW Kristina Hummel 10 A View from the CT Foxhole: Vayl S. Oxford, Director, Defense Threat Reduction Agency EDITORIAL BOARD Kristina Hummel Colonel Suzanne Nielsen, Ph.D. ANALYSIS Department Head Dept. of Social Sciences (West Point) 15 Military Interventions, Jihadi Networks, and Terrorist Entrepreneurs: How the Islamic State Terror Wave Rose So High in Europe Brian Dodwell Petter Nesser Director, CTC 22 The Islamic State's Revitalization in Libya and its Post-2016 War of Attrition Lachlan Wilson and Jason Pack Don Rassler Director of Strategic Initiatives, CTC 32 AQIM Pleads for Relevance in Algeria Geoff D. Porter CONTACT Combating Terrorism Center In our cover article, Matthew Levitt examines Hezbollah’s procurement channels, documenting how the group has been leveraging an internation- U.S. Military Academy al network of companies and brokers, including Hezbollah operatives and 607 Cullum Road, Lincoln Hall criminal -
Terrorist-Funds-Banks-Etc.Pdf
Testimony of Steven Emerson Before the House Committee on Financial Services Subcommittee on Oversight and Investigations "PATRIOT Act Oversight: Investigating Patterns of Terrorist Fundraising“ Fund-Raising Methods and Procedures for International Terrorist Organizations February 12, 2002 Steven Emerson Executive Director The Investigative Project [email protected] Washington, DC STEVEN EMERSON A Biographical Sketch 5505 Connecticut Avenue, NW, #341, Washington DC 20015-2601 Phone: (202) 363-8602 Fax: (202) 966-5191 E-Mail: [email protected] Steven Emerson is an internationally recognized expert on terrorism and national security, a correspondent, and an author who also serves as the Executive Director of The Investigative Project. His current book, American Jihad: The Terrorists Living Among Us, published by The Free Press, details the rise of the militant Islamic infrastructure in the United States and provides the most comprehensive account of the major fundamentalist Islamic cells on American soil to date. Mr. Emerson started The Investigative Project in late 1995 following the broadcast of his documentary film, "Jihad in America," on public television. The film exposed video of clandestine operations of militant Islamic terrorist groups on American soil. For the film, Mr. Emerson received numerous awards including the George Polk Award for best television documentary, one of the most prestigious awards in journalism. He also received the top prize from the Investigative Reporters and Editors Organization (IRE) for best investigative report in both print and television for the documentary. The award from the IRE was the fourth such award he had received from that group. Since 1996, Mr. Emerson has testified more than a dozen times before Congress on such topics as the terrorist infrastructure in the US, Palestinian violations of the Oslo accords, the protection of America's national infrastructure, and the threat of Islamic fundamentalism against the United States and the West. -
BIS Annual Report
U.S. Department of Commerce Bureau of Industry and Security Annual Report to the Congress for Fiscal Year 2007 Secretary of Commerce Under Secretary of Commerce Carlos M. Gutierrez Mario Mancuso 2 Bureau of Industry and Security Fiscal Year 2007 Annual Report Table of Contents Page Letter from the Secretary and the Under Secretary 4 Executive Summary 6 Chapter 1: Export Control Policy and Regulations 10 Chapter 2: Export Licensing 16 Chapter 3: Export Enforcement 21 Chapter 4: Industry Outreach Activities 27 Chapter 5: International Regimes and Treaty Compliance 32 Chapter 6: U.S. Defense Industrial and Technological Base Programs and 38 Advocacy Activities Appendices: Appendix A: Administration and Department of Commerce Goals, BIS Mission 42 Statement and Guiding Principles of the Bureau of Industry and Security Appendix B: Fiscal Year 2007 Regulatory Changes 46 Appendix C: Bureau of Industry and Security Organizational Structure and 48 Administrative Information Appendix D: Summaries and Tables of Closed Export Enforcement Cases, 52 Criminal Cases, and Antiboycott Cases Appendix E: Tables of Antiboycott Settlements and Reporting Data 70 Appendix F: Approved Applications for Country Group D:1 and Cuba 78 Appendix G: Report on Domestic Impact of U.S. Exports to Controlled Countries 91 Appendix H: Agricultural Supply Tables and Information 95 3 STATEMENT OF THE SECRETARY AND UNDER SECRETARY We are pleased to present this report of the activities of the Department of Commerce’s Bureau of Industry and Security (BIS) in support of President Bush’s security and economic agenda for the American people in Fiscal Year 2007. Trade is vitally important to our country, and in this time of unprecedented opportunity for the American people, it is a privilege to lead BIS as it works to ensure that we are both facilitating American prosperity and enhancing American national security. -
THE POLITICAL ECONOMY of MIDDLE EAST TERRORISM by Matthew A
THE POLITICAL ECONOMY OF MIDDLE EAST TERRORISM by Matthew A. Levitt* Political terrorism has long been a key feature of Middle Eastern politics given the high degree of conflict, relative ineffectiveness of direct military means, ideological rationalizations, and willingness of states to sponsor such activities. The aftermath of the September 11, 2001 attacks on the United States and the subsequent American war against terrorism have focused attention on the financing of such movements and operations. The lines of political influence follow those of economic assistance. This article analyzes the state of knowledge regarding this issue. Political terrorism, often sponsored by admitted that the terrorists were unable to states, has long been a major factor in purchase sufficient material to build as Middle East politics. Terrorist groups' large a bomb as they had intended because ability to act more frequently and they lacked cash. In fact, the operation effectively is closely linked to financing. itself was rushed and carried out earlier Such patronage today, however, is than planned because the cell simply ran proportionately less in the hands of state out of money. In the end, the terrorists' sponsors. While Iran and Syria continue to attempt to reclaim the deposit fee on the back international terrorism, groups rental truck used to transport the bomb increasingly finance their own activities provided a key break in the case.(3) through a network of charitable and The al-Qa'ida suicide hijackings humanitarian organizations, criminal underscored the post-blast, investigative enterprises, front companies, illicit and utility of tracking the money trail, but they unregulated banking systems, and the also drove home the critical need to personal wealth of individual militant preemptively deny terrorists the funds they Islamists.