DHS Privacy Office FOIA

Total Page:16

File Type:pdf, Size:1020Kb

DHS Privacy Office FOIA Disposition (All Why (All internal internal processing/ disposition tracking notes tracking notes Id Date Received Date Closed Organization Sender Subject Fee Category have been have been redacted redacted pursuant to pursuant to (b)(2)) (b)(2)) 05-1 10/01/2004 04/07/2005 Federal Sources, Inc. Steponkus, Elizabeth Contract #HSSCHQ-04-D- Commercial Use 00096 05-2 10/01/2004 Federal Sources, Inc. Steponkus, Elizabeth Contract Commercial Use #HSHQPA04Q00004 05-3 10/01/2004 10/19/2004 individual Moore, Charles Documents regarding Private Citizen specified Job Announcement 05-4 10/01/2004 11/03/2004 Wilmer Cutler, Pickering, Hale and Oleskey, Stephen H. Documents regarding Private Citizen Dorr, LLP detainees 05-5 10/01/2004 10/18/2004 A.J. Bros., LLC Sifers, Monique List of Purchase Card Commercial Use Holders 05-6 10/01/2004 12/07/2004 Southern Microwave, Inc. Romeskie, Julian List of POC's for Port Commercial Use Security Grantees 05-7 10/04/2004 10/14/2004 Washington Post O'Harrow, Robert Copy of US-VISIT PIA Media Representative 05-8 10/04/2004 05/16/2005 Michaelson, Lori Grant awards made by DHS Commercial Use 05-9 10/04/2004 10/19/2004 Clausen Miller, PC Sullivan, Danielle Records pertaining to Private Citizen explosion at CTA facility in Corbin, Kentucky 05-11 10/06/2004 eCivis Isip, Rosario Homeland Security Commercial Use Preparedness Training Program 05-15 10/06/2004 10/18/2004 StarProse Corp. Copy of DHS Budget for Commercial Use 2004 05-17 10/07/2004 WMG-TV 5 Green, Lauren Copies of 2002-2005 State Media Cooperative Agreements Representative and/or Homeland Security Strategies for TN 05-21 10/08/2004 eCivis Isip, Rosario Z. Port Security Grant Program Commercial Use 05-62 10/11/2004 10/18/2005 Attorney Ginsburg, Gilbert Contract under RFP 549-70- Commercial Use 01 05-23 10/13/2004 10/26/2004 INPUT Ferris, Corey Contract for FIPS Commercial Use 05-27 10/14/2004 Federal Sources, Inc. Steponkus, Elizabeth Copies of OMB 300's for Commercial Use FY04-05, Business Architecture, Technical Architecture, etc. 05-32 10/18/2004 07/08/2005 John Kerry for President David Schnitzer Correspondance between Non-Commercial DOJ and Senator John Kerry, Scientific General Wesley Clarke, Gov. Institution Howard Dean, and Rep. Richard Gephardt 05-34 10/19/2004 11/05/2004 Federation of American Scientists Aftergood, Steven DHS Form 11000-6 Media Representative 05-35 10/19/2004 10/25/2004 individual Pineda, Suan US Border Patrol Budget Private Citizen Disposition (All Why (All internal internal processing/ disposition tracking notes tracking notes Id Date Received Date Closed Organization Sender Subject Fee Category have been have been redacted redacted pursuant to pursuant to (b)(2)) (b)(2)) 05-36 10/19/2004 Attorney-at-Law Fair, David Winning proposal for Commercial Use eMerge2 BPA 05-37 10/20/2004 U.S. House of Representatives Evans, Lane List of positions filled Other through OPM's direct hire authority 05-39 10/20/2004 10/26/2004 Project on Government Oversight Brand, Peter 2004 IG Report on TSA's Media First Annual Awards Representative Program 05-44 10/21/2004 eCivis Isip, Rosario Z. Homeland Security Commercial Use Information Technology and /evaluation Program 05-45 10/22/2004 04/07/2005 Kelly, Anderson & Assoc. Inc. Robinson, Michele S. US Visit contract Commercial Use 05-46 10/22/2004 11/24/2004 individual Saunders-Mitchell, Kathleen Position Description of GS- Private Citizen 14 FOIA position in the Office of the Chief Privacy Office 05-51 10/25/2004 Jasper County Emergency Services Malphrus, Steven Assistance to Firefighters Commercial Use Grant Program 05-42 10/26/2004 11/05/2004 DOD Talbott, C.Y. Guantanamo Bay visitor log Other 05-53 10/26/2004 11/16/2004 LexisNexis Paul Doles DHS contract and Commercial Use correspondence with the West Group 05-54 10/26/2004 05/18/2005 York Daily Record Clarke, Caryl Specific information Media regarding XXXXXXXX Representative (b)(6) and (b)(7)(c) asylum hearing 05-55 10/26/2004 11/24/2004 USA Impact Maisano, Kim DHS Purchase Card Holder Commercial Use List 05-64 10/29/2004 10/18/2005 Centurion Research Corp. Elrod, Christine Kaye Contract awarded to Commercial Use DigitalNet for Biometrics 05-65 10/29/2004 04/07/2005 Freedom InfoSource, Inc. Penland, Jason US Visit Contract Commercial Use 05-66 11/01/2004 individual Mesina, Roman C. All documents relating to Private Citizen oath of office affidavits 05-68 11/01/2004 02/22/2005 individual Almerido, Abigale Documents concerning Private Citizen XXXXXXXX (b)(6) 05-69 11/01/2004 11/24/2004 EUMOTIF INC Jones, Marvin List of Purchase Card Commercial Use Holders 05-651 11/03/2004 individual Collier, Eugene Incident Report Private Citizen 05-71 11/04/2004 11/16/2004 individual Collier, Eugene Incident Report Private Citizen 05-72 11/05/2004 11/24/2004 Utopia Management Services Roth, Nancy C. Contract COW1A1027 Commercial Use 05-75 11/05/2004 EPIC Hoffman, Marcia Records on CAPPS II and Media Secure Flight Representative Disposition (All Why (All internal internal processing/ disposition tracking notes tracking notes Id Date Received Date Closed Organization Sender Subject Fee Category have been have been redacted redacted pursuant to pursuant to (b)(2)) (b)(2)) 05-76 11/08/2004 11/07/2005 INPUT Groff, Alex Contracts that were awarded Commercial Use under Solicitation #EMW2003TAC 05-77 11/08/2004 03/01/2005 USA Impact DePasquale, Dave List of Procurement Card Commercial Use Holders 05-78 11/09/2004 08/12/2005 Gulf Coast Mariners Assoc. Block, Richard Proposed legislation from Non-Commercial Sec. Ridge to Congress Scientific regarding American Institution Waterways 05-82 11/10/2004 02/10/2005 Blank Rome LLP Higgins, Brian Any documentation Non-Commercial pertaining to the DHS desire Scientific to review U.S. patent Institution application pursuant to the Invention Secrecy Act and the criteria used to determine this classification 05-83 11/10/2004 individual Raney, James L. Copy of e-mail to DHS Private Citizen employees, including policies and guidance, pertaining to Working in Polling Places on Election Day 05-89 11/15/2004 DNR Avechuco, Melinda Copy of recently awarded Commercial Use proposal for the "One Time Projects" Program 05-90 11/16/2004 Center for Public Integrity Knott, Alex Any duocumentation Media detailing coordination for the Representative Republican National Convention 05-96 11/17/2004 Boeing Harper, Veronica A copy of the TSA computer Commercial Use security policy 05-100 11/23/2004 03/31/2005 Alliance Capital Dupree, Nathan US-VISIT Fingerprint Commercial Use Recognition Contract 05-102 11/23/2004 01/05/2005 LexisNexis Kowalski, Daniel Cuban Review Plan - 1984 Repatriation List - Criteria 05-103 11/24/2004 12/01/2005 WTAE-TV Pittsburg Van Osdol, Paul Copies of contracts, grants, or Media agreements between the DHS Representative and Capital International Protection services or Criminal Justice International Assoc. or Gerald R. Brewer Disposition (All Why (All internal internal processing/ disposition tracking notes tracking notes Id Date Received Date Closed Organization Sender Subject Fee Category have been have been redacted redacted pursuant to pursuant to (b)(2)) (b)(2)) 05-106 11/26/2004 The Seattle Times O'Hagan, Maureen Contracts with or payments Media to the SITE Institute, specific Representative individuals within SITE, and Tift 05-107 11/26/2004 12/10/2004 INPUT Ferris, Corey List of contracts for the Commercial Use Infrastructure Coordination Division 05-109 12/01/2004 12/21/2004 individiual Gillespie, Maria Job announcements for ICE, Private Citizen Supervisory Criminal Investigator 05-111 12/01/2004 ACLU Steinhardt, Barry Any possible documentation Media relating to the DHS' Ready Representative Program and collection of information from school children 05-113 12/01/2004 Project on Government Oversight Schwellenbach, Nick List of FOIA requests from Media 1999 through Nov. 14, 2004 Representative 05-116 12/01/2004 individual Stedman, Tiffany All documents regarding Non-commercial DHS' decision to outsource Educational FOIA functions Institution 05-117 12/01/2004 11/09/2005 Associated Press Theimer, Sharon Any ethic waiver requests Media by/or issued to Office of the Representative Secretary of Homeland Security personnel between Jan. 2004 and the present 05-118 12/01/2004 01/04/2005 Border Action Network Allen, Jennifer Any and all documents Non-Commercial regarding complaints filed be Scientific specified members of the Institution Border Action Network 05-115 12/01/2004 ARINC Murray, Pamela Urban Area Security Commercial Use Initiative (UASI) grants for 2004 submission from Miami, Boston, & San Diego 05-110 12/01/2004 11/09/2005 Bioweapons & Biodefense Freedom of Hammond, Edward Final Report of the NBACC Non-Commercial Information Fund Threat Assessment Scientific Workshop Institution 05-119 12/02/2004 12/10/2004 OSHA DATA Carmel, Matthew M. POC's for NCS Government Commercial Use Emergency Telecommunications Service 05-120 12/03/2004 10/25/2005 Center for Public Integrity Elspeth Wiengarten All records involving ethic Media waiver granted to DHS Representative officials and employees Disposition (All Why (All internal internal processing/ disposition tracking notes tracking notes Id Date Received Date Closed Organization Sender Subject Fee Category have been have been redacted redacted pursuant to pursuant to (b)(2)) (b)(2)) 05-122 12/07/2004 09/14/2005 Nixon Peabody LLP Garrett, Kelly E. Documents pertaining to Commercial Use SAFETY ACT Application Evaluators Confidentiality Agreements 05-124 12/08/2004 12/13/2004 eCivis Isip, Rosario Homeland Defense Commercial Use Equipment Reuse 05-128 12/08/2004 10/25/2005 Center for Public Integrity Weingarten, Elspeth Semiannual Reports of Media Payments accepted from Non-Representative federal sources 05-127 12/08/2004 Fugate, Randy Copy of the Assistance to Commercial Use Firefighters Grant application submitted by Lake Logan- Cecil Volunteer Fire Department 05-125 12/08/2004 01/04/2005 INPUT Ferris, Corey Contract awarded for Commercial Use Computer Equipment Preventive & Remedial Maintanence Services 05-131 12/09/2004 20/20 GeneSystems, Inc.
Recommended publications
  • Terrorism and Information Operations
    Information Operations and Terrorism Dorothy E. Denning August 18, 2005 INTRODUCTION The term “terrorism” generally refers to physical acts of violence intended to inculcate fear. It conjures up images of bombs exploding, bodies mutilated, and innocent lives lost. Behind the physical assaults, however, is another dimension of terrorism. It is the information dimension, and terrorists exploit it every bit as much as the physical. Their ultimate goal goes beyond the death and destruction they leave behind. It is power and influence. Terrorists seek a change, and their objective is to influence populations in ways that support that change. To do that, they engage in both physical and information operations, and they integrate those operations together. The objective of this paper is to explore how terrorists use information operations (IO) to support their physical attacks and broader goals. The paper uses as a framework the components of IO promulgated in U.S. Department of Defense doctrine. While there is no reason to believe that terrorists follow U.S. military doctrine or even anything similar, the doctrine provides a conceptual basis for organizing the discussion. Most of the discussion focuses on al-Qa’ida and the transnational jihadist movement comprising individuals and groups loosely bound by al-Qa’ida’s radical Islamic ideology, but operating independently. The movement is said to consist of dozens of radical Islamic groups, who have been trained and financed by al-Qa’ida or who collaborate with al-Qa’ida. It includes thousands of Muslim militants who have trained together in Afghanistan and elsewhere (now Iraq), and an untold number who have been caught up by bin Laden’s worldview.1 Two principle types of sources are used.
    [Show full text]
  • Al-Qaeda's Terrorist Threat to UNIFIL
    Al-Qaeda’s Terrorist Threat to UNIFIL June 2007 Bilal Y. Saab – The Saban Center for Middle East Policy at The Brookings Institution Magnus Ranstorp – The Center for Asymmetric Threat Studies (CATS) at the Swedish National Defence College On August 11, 2006, in response to the 34-day summer war between Israel and Hizb’allah, the United Nations Security Council passed resolution 1701, which called for a more robust international military presence along the United Nations-drawn Blue Line dividing Israel and southern Lebanon. But the strengthened United Nations Interim Force in Lebanon (UNIFIL) is likely to face a range of security threats that could undermine its peacekeeping duties and endanger its personnel. Among the more serious threats, underscored by intelligence reports over the past few years that indicate a growing al-Qaeda presence in Lebanon, is a catastrophic terrorist attack against UNIFIL by local salafist jihadist entities. UNIFIL IS WORRIED Since its deployment, UNIFIL has publicly voiced concerns about a terrorist attack by al- Qaeda, not Hizb’allah, against its troops.1 These legitimate concerns have been reinforced by stern (yet unsubstantiated) warnings issued by Lebanese, Israeli and Western officials about al-Qaeda’s growing presence in Lebanon.2 For UNIFIL, the ongoing violent clashes between al-Qaeda inspired Islamic militants and the Lebanese Army, which erupted May 20 in northern Lebanon, have only heightened its sense of insecurity. Concerned about the safety of their troops, UNIFIL commanders do not have the
    [Show full text]
  • Capstone – Inss 5390 Dr
    PAIGE COSTANZI CAPSTONE – INSS 5390 DR. VALERO 10 DECEMBER 2016 The Islamic State’s Information Warfare: Social Media and Propaganda Engineering For decades, the United States has faced a growing threat of Islamist terrorism towards the homeland. The rise of the self-identified Islamic State, commonly known as ISIL or ISIS1, has been effectively utilizing social media outlets as an informational instrument to promote its cause, recruit more members, and cause havoc amongst the globe. Through various social media platforms, movies (i.e. The Flames of War), YouTube videos, and their very own online multi- language magazine Dabiq, which has recently been replaced with their new online multi- language magazine Rumiyah, the Islamic State has become adept at manipulating media to gain support and create an ideological movement. “The analysis of the digital audiovisual campaigns released by ISIS since January 2014 suggests that ISIS has established a new kind of terrorism, using marketing and digital communication tools not only for “socializing terror” through public opinion as previous terrorist groups did, but also for making terror popular, desirable, and imitable.”2 The Islamic State is well funded, organized, and grounded in the authority of religious texts and words of Islamic scholars. It now controls multiple border crossings along with various weapons and infrastructures throughout their controlled territory in Syria and Iraq. Their extreme violence and use of various media outlets for recruitment and scare tactics is a growing concern in this fight. The Islamic State has developed new tactics, to include a multi-million dollar media campaign, to create a unified worldwide Islamic State with Sharia Law as the basis.
    [Show full text]
  • Sayyid Qutb's Ties to Extremists
    Sayyid Qutb’s Ties to Extremists www.counterextremism.com | @FightExtremism Sayyid Qutb’s Ties to Extremists Key Points Qutb was a chief ideologue of the Muslim Brotherhood in Egypt who was also widely popular on the Egyptian street. The Egyptian government executed him in 1966 for promoting the overthrow of the state. Qutb popularized the concepts of takfir— excommunication of Muslim apostates—and jahiliyya— the deplorable state of ignorance prior to the revelation of the Quran that has enveloped the secular Muslim community as well as non-Muslims. Qutb wrote that only the creation of an Islamic state ruled by sharia (Islamic law) could end the state of jahiliyya. Qutb is widely considered the progenitor of the modern jihadist movement as his writings directly inspired the Muslim Brotherhood and notorious extremists who passed through the organization, including Osama bin Laden of al-Qaeda, Abu Bakr al- Baghdadi of ISIS, and the founders of Palestinian Islamic Jihad. 1 2 Often referred to as the father of modern Islamism, Egyptian author Sayyid Qutb was a lead theologian of the Muslim Brotherhood in the mid-20th century. Qutb’s hardline interpretations of the Quran and his excoriation of the failures of Western society inspired the modern jihadist movement and led the Egyptian government to execute him in 1966. His influence can be seen in violent groups such as al-Qaeda, ISIS, and the Taliban, and among such notable extremists such as Osama bin Laden, Abu Bakr al- Baghdadi, and Khalid Sheikh Mohammed. Terrorism expert Paul Berman at one point dubbed Qutb “the intellectual hero of every one of the groups that eventually went into Al Qaeda, their Karl Marx (to put it that way), their guide.”1 Qutb’s writings helped inform the Islamist ideology known as Qutbism, which advocates violent jihad—including the killing of secular Muslims—in order to implement sharia (Islamic law).
    [Show full text]
  • Terrorism, Crime, and Public Policy
    This page intentionally left blank Terrorism, Crime, and Public Policy Terrorism, Crime, and Public Policy describes the problem of terrorism; compares it to other forms of aggression, particularly crime and war; and discusses policy options for dealing with the problem. It focuses on the causes of terrorism with the aim of understanding its roots and providing insights toward policies that will serve to prevent it. The book serves as a single-source reference on terrorism and as a platform for more in-depth study, with a set of discussion questions at the end of each chapter. Individual chapters focus on the nature of terrorism, theories of aggression and terrorism, the history of terrorism, globalization vs. clash, the role of religion, nonreligious extrem- ism and terrorism, the role of technology, terrorism throughout the modern world, responses to terrorism, fear of terrorism, short-term approaches and long-term strategies for preventing terrorism, balancing security and rights to liberty and privacy, and pathways to a safer and saner twenty-first century. Brian Forst joined the American University faculty after twenty years in nonprofit research, including positions as research director at the Institute for Law and Social Research and the Police Foundation. He is the author most recently of After Terror (with Akbar Ahmed, 2005); Errors of Justice: Nature, Sources, and Remedies (Cambridge University Press, 2004); and The Privatization of Policing: Two Views (with Peter Manning, 1999). He is a member of the American University Senate and chairs the Department of Justice, Law, and Society’s doctoral program. He is also a voting member of the Sentencing Commission for the District of Columbia.
    [Show full text]
  • Center on Terrorism, Extremism, and Counterterrorism
    Center on Terrorism, Extremism, and Counterterrorism www.middlebury.edu/institute/academics/centers-initiatives/ctec The Center on Terrorism, Extremism, and Counterterrorism (CTEC) conducts in- depth research on terrorism and other forms of extremism. Formerly known as the Monterey Terrorism Research and Education Program, CTEC collaborates with world-renowned faculty and their graduate students in the Middlebury Institute’s Nonproliferation and Terrorism Studies degree program. CTEC’s research informs private, government, and multilateral institutional understanding of and responses to terrorism threats. Middlebury Institute for International Studies at Monterey www.miis.edu The Middlebury Institute for International Studies at Monterey provides international professional education in areas of critical importance to a rapidly changing global community, including international policy and management, translation and interpretation, language teaching, sustainable development, and nonproliferation. We prepare students from all over the world to make a meaningful impact in their chosen fields through degree programs characterized by immersive and collaborative learning, and opportunities to acquire and apply practical professional skills. Our students are emerging leaders capable of bridging cultural, organizational, and language divides to produce sustainable, equitable solutions to a variety of global challenges. Center on Terrorism, Extremism, and Counterterrorism Middlebury Institute of International Studies 460 Pierce Street Monterey, CA 93940, USA Tel: +1 (831) 647-4634 The views, judgments, and conclusions in this report are the sole representations of the authors and do not necessarily represent either the official position or policy or bear the endorsement of CTEC or the Middlebury Institute of International Studies at Monterey. © The President and Trustees of Middlebury College, 2019 ASSESSING THE RISK OF ISLAMIST TERRORISTS USING HUMAN VECTORS TO DEPLOY CONTAGIOUS PATHOGENS Jeffrey M.
    [Show full text]
  • Allison and Barnes
    THE INSTITUTE FOR MIDDLE EAST STUDIES IMES CAPSTONE PAPER SERIES THE ISLAMIC STATE OF IRAQ AND THE LEVANT’S STRATEGIC TREATMENT AND USE OF WOMEN JESSICA ALLISON LOGAN BARNES MAY 2015 THE INSTITUTE FOR MIDDLE EAST STUDIES THE ELLIOTT SCHOOL OF INTERNATIONAL AFFAIRS THE GEORGE WASHINGTON UNIVERSITY © OF JESSICA ALLISON AND LOGAN BARNES, 2015 Table of Contents Introduction ................................................................................................................................... 1 Our Research ................................................................................................................................. 2 Methodology ............................................................................................................................... 4 Complications ............................................................................................................................. 5 Significance ................................................................................................................................. 6 Background: Women and Terrorism ....................................................................................... 11 ISIL’s Historical Use of Women as Suicide Bombers.............................................................. 16 Bureaucratizing Women’s Affairs............................................................................................. 18 Recruitment Policies ................................................................................................................
    [Show full text]
  • Analysis and Evolution of the Global Jihadist Movement Propaganda
    Terrorism and Political Violence, 18:399–421, 2006 Copyright Taylor & Francis Group, LLC ISSN: 0954-6553 print=1556-1836 online DOI: 10.1080/09546550600751990 Analysis and Evolution of the Global Jihadist Movement Propaganda MANUEL R. TORRES Department of Public Law, University Pablo Olavide, Seville, Spain JAVIER JORDA´ N Department of Political Science, University of Granada, Spain NICOLA HORSBURGH International Policy Institute King’s College, London, England The Global Jihadist Movement (GJM) has a series of well-defined objectives, which constitute the central points of their ideology. In the realization of these goals, propaganda and public communication play a central role. This article studies the evolution of the principal characteristics of GJM propaganda, analyzing over 2,000 documents issued by the GJM between 1996 and 2005. Keywords Al Qaeda, communication, Jihad, propaganda, terrorism Introduction Al Qaeda and the various other associated groups that form what we will here label the Global Jihadist Movement (GJM), have, as is true of any terrorist organization, a pronounced need for public communication. Violence in and of itself, despite the magnitude and spectacular levels it can reach, is never sufficient to achieve the ulti- mate aims of terrorists. Violence has as its purpose destroying that which it considers the enemy and spreading fear in the affected population. However, at the same time it is a mechanism that permits transmission of content. On said occasions this mess- age is transmitted via symbols used in communique´s or through the interpretation the population will ‘‘read into’’ the attacks themselves. Nevertheless, on most occasions this act of communication does not occur so subtly, and murder, threats, or kidnappings convert themselves into macabre remin- ders that permit the terrorist group to concentrate public opinion so its message is heard.
    [Show full text]
  • Volume XI, Issue 6 December 2017 PERSPECTIVES on TERRORISM Volume 11, Issue 6
    ISSN 2334-3745 Volume XI, Issue 6 December 2017 PERSPECTIVES ON TERRORISM Volume 11, Issue 6 Table of Contents Welcome from the Editors..................................................................................................................................3 Articles Thirty Years after its Foundation - Where is al-Qaida Going?.............................................5 by Anne Stenersen Revisiting al-Qaida’s Foundation and Early History.............................................................17 by Leah Farrall Al-Qaida and the Pakistani Harakat Movement: Reflections and Questions about the Pre-2001 Period............................................................................................................38 by Don Rassler The Jihadi Social Movement (JSM): Between Factional Hegemonic Drive, National Realities, and Transnational Ambitions................................................................55 by Jerome Drevon Jihadi Competition and Political Preferences........................................................................63 by Tore Hammin The Spread of its Message: Studying the Prominence of al-Qaida Materials in UK Terrorism Investigations..................................................................................................89 by Donald Holbrook Islamic State and Technology – a Literature Review...........................................................101 by Truls Tønnessen Islamic State and Al-Nusra: Exploring Determinants of Chemical Weapons Usage Patterns............................................................................................................................................112
    [Show full text]
  • Terrorist Use of the Internet: Information Operations in Cyberspace
    Terrorist Use of the Internet: Information Operations in Cyberspace Catherine A. Theohary Analyst in National Security Policy and Information Operations John Rollins Specialist in Terrorism and National Security March 8, 2011 Congressional Research Service 7-5700 www.crs.gov R41674 CRS Report for Congress Prepared for Members and Committees of Congress Terrorist Use of the Internet: Information Operations in Cyberspace Summary The Internet is used by international insurgents, jihadists, and terrorist organizations as a tool for radicalization and recruitment, a method of propaganda distribution, a means of communication, and ground for training. Although there are no known reported incidents of cyberattacks on critical infrastructure as acts of terror, this could potentially become a tactic in the future. There are several methods for countering terrorist and insurgent information operations on the Internet. The federal government has organizations that conduct strategic communications, counterpropaganda, and public diplomacy activities. The National Framework for Strategic Communication guides how interagency components are to integrate their activities. However, these organizations may be stovepiped within agencies, and competing agendas may be at stake. This report does not discuss technical and Internet architecture design solutions. Some may interpret the law to prevent federal agencies from conducting “propaganda” activities that may potentially reach domestic audiences. Others may wish to dismantle all websites that are seen to have malicious content or to facilitate acts of terror, while some may have a competing interest in keeping a site running and monitoring it for intelligence value. Key issues for Congress: • Although the Comprehensive National Cybersecurity Initiative addresses a federal cybersecurity strategy and departmental roles and responsibilities, overclassification, competing equities, and poor information sharing between agencies hinder implementation of a national cybersecurity strategy.
    [Show full text]
  • The Muslim Brotherhood's Ties to Extremists
    THE MUSLIM BROTHERHOOD’S TIES TO EXTREMISTS THE MUSLIM BROTHERHOOD’S TIES TO EXTREMISTS Key Facts: • CEP has recorded 48 individuals and groups tied to the Muslim Brotherhood, including terrorist groups, foreign fighters, extremist propagandists, and political leaders. • The writings of Muslim Brotherhood founder Hassan al-Banna and early Brotherhood ideologue Sayyid Qutb have helped mold the ideologies of violent terror groups like al- Qaeda, ISIS, and Hamas. • Al-Qaeda co-founders Osama bin Laden and Ayman al-Zawahiri, proclaimed 9/11 mastermind Khalid Sheikh Mohammed, and ISIS leader Abu Bakr al-Baghdadi all belonged to the Muslim Brotherhood before assuming roles in their respective terror networks. • The Brotherhood politically supported the goals of the Iranian Revolution early on. Qutb was an influence on Iranian extremist Navvab Safavi, who in turn influenced current Supreme Leader Ali Khamenei to enter politics and introduced Ruhollah Khomeini to the Brotherhood. • Internationally designated terror group Hamas is a direct offshoot of the Brotherhood, created as the organization’s Palestinian wing. The Muslim Brotherhood is a transnational Sunni Islamist movement that seeks to implement sharia (Islamic law) under a global caliphate. Founded in Egypt in 1928, the Brotherhood is that country’s oldest Islamist organization and has branches throughout the world. A 2015 U.K. government investigation concluded that the Brotherhood has “promoted a radical, transformative politics, at odds with a millennium of Islamic jurisprudence and statecraft….”1 In line with the British assessment, and despite the Brotherhood’s official commitment to non- violence, CEP has documented ideological and operational links between the Brotherhood’s ideology and violent terrorist groups like al-Qaeda and ISIS.
    [Show full text]
  • Semi-Proxy Wars and U.S. Counterterrorism Strategy
    Studies in Conflict & Terrorism ISSN: 1057-610X (Print) 1521-0731 (Online) Journal homepage: https://www.tandfonline.com/loi/uter20 Semi-Proxy Wars and U.S. Counterterrorism Strategy R. Kim Cragin To cite this article: R. Kim Cragin (2015) Semi-Proxy Wars and U.S. Counterterrorism Strategy, Studies in Conflict & Terrorism, 38:5, 311-327, DOI: 10.1080/1057610X.2015.1018024 To link to this article: https://doi.org/10.1080/1057610X.2015.1018024 Published online: 25 Mar 2015. Submit your article to this journal Article views: 1990 View Crossmark data Citing articles: 1 View citing articles Full Terms & Conditions of access and use can be found at https://www.tandfonline.com/action/journalInformation?journalCode=uter20 Studies in Conflict & Terrorism, 38:311–327, 2015 Copyright Ó Taylor & Francis Group, LLC ISSN: 1057-610X print / 1521-0731 online DOI: 10.1080/1057610X.2015.1018024 Semi-Proxy Wars and U.S. Counterterrorism Strategy R. KIM CRAGIN RAND Corporation Arlington, VA, USA On 4 February 2014, Al Qaeda leaders in Pakistan (aka Al Qaeda Central) repudiated Abu Bakr al-Baghdadi, the leader of Al Qaeda in Iraq. Ayman al-Zawahiri declared that al-Baghdadi and his newly formed Islamic State in Iraq and the Levant (ISIL) were no longer part of Al Qaeda’s organization and Al Qaeda Central could not be held responsible for ISIL’s behavior. It represents the first time that Al Qaeda Central has renounced an affiliate publicly. The announcement was driven by months of fighting between ISIL and Jabhat al-Nusra, another Al Qaeda affiliate in Syria. In fact, in Syria, Al Qaeda fighters are competing against each other for influence, as well as against other opposition groups, the Syrian regime, the Islamic Revolutionary Guard Corps, Iraqi militiamen, and Lebanese Hezbollah.
    [Show full text]