Dismissal of Military Commission Charges 5.12.2008.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Dismissal of Military Commission Charges 5.12.2008.Pdf CHARGE SHEET I. pERSONAL DATA 1. NAME OF ACCUSED: Khalid Sheikh Mohammed Walid Muhammad Salih Mubarak Bin 'Attash Ramzi Binalshibh Ali Abdul Aziz Ali Mustafa Ahmed Adamal Hawsawi ~ ,,'.. ,~~ .... V.l " ~, !, , / 2. ALIASES OF ACCUSED: Khalid Sheikh Mohammed (aliases Mukhtar al Baluchi; Hafiz; Meer Akram; Abdul Rahman Abdullah AI Gha i) W.alid Muhammad Salih Mubarek Bin 'Attash (aliases Khallad; Salah Saeed Mohammed Bin Yousaf; Silve , Tawfiq) I Ramzi Binalshibh (aliases Abu Ubaydah; Ahad Abdollahi Sabet; Abu Ubaydah al Hadrami) Ali Abdul Aziz Ali (aliases Ammar al Baluchi; Isam Mansur; Isam Mansar; Isam Mansour; Ali; Hani) I Mustafa Ahmed Adam al Hawsawi (aliases Zahir; Hashem Abdollahi; Muhammad Ahanad; Abdera an Mustafa) Mohamed alKahtani (aliases Ahmed al Qahtani; Mohamed al Qahtani; Abdul Rahman al Janoo . 3. ISN NUMBER OF ACCUSED (LAST FOUR): Khalid Sheikh Mohammed (10024) Walid Muhammad Salih Mubarek Bin 'Attash (10014) Ramzi Binalshibh (10013) Ali Abdul Aziz Ali (10018) ~t/ ~dQ Mustafa Ahmed Adam al Hawsawi (10011) Mohamed al Kahtani (0063) S~ ~ II. CHARGES AND SPECIFICA}I'6NS 4. CHARGE, VlOLAllON OF SECllON AND llTLE OF CRI.E7F •.•.C. SPECIFICATION: See Attached Charges and Specifications. , , III. SWI;A"RING OF CHARGES ' 5a. NAME OF ACCUSER (LAST, FIRST, MI) 5b.GRADE 5c. ORGANIZATION OF ACCUSER Dejong, Laura, S / 0-3 Criminal Investigation Task Force (CITF) 5d. S~URE OF ACCUSER JH~ 5e. DATE (YYYYMMDD) ttu/liX r. -0 Y- ' 20080415 AFFIDAVIT: Before me, the underSigne~horit'ed by law to administer oath in cases of this character, personally appeared the above named accuser the 15th day of April . 2008. and signed the foregoing charges and specifications under oath that he/she is a person "bJ,a '" th' "o'''m J~';" "d 'ho' h,/'h, ho' ".0"" '0"""'" of ~ h" ;~"tI,,',d 'ho =.,,, "t tooth 'h,..,o ,,' that the same are true toCOL the best 0 is/her knowledge and belief. K In M. Chenail Office of Military Commissions LdN.m.ofO- Organization of Officer LieL nant Colonel, U.S. Marine Corps judge Advocate. Grade Official Capacity to Administer Oath (See R.M. C. 307(b) must be commissioned officer) ~ ~ ~ / Sianature / MC FORM 458 JAN 2007 IV. NOTICE TO THE .ACCUSED . ...r.. ' 'L -. , "I'""n if", DUro "lnA\ Clayton G. Trivett, Jr. GS-14 Office of Military Commissions / Typed Name aM Grade ofPerson Who Caused organlrarJon or rne I"'erson wno (;ausea Accused to Be Notified of Charges Accused to B,e Notified ofCharges Signature V. RECEIPT OF CHARGES BY CONVENING AUTHORITY / 1. The sworn charges were received at 1151 hours, on 15 April 2008 ,at Arl i L Virnini.::l / Location For the Convening Authority: Donna L. wiL ./Typed Name of Officer GS-15 Grade Af~ / Signature \'fl~~RRAL 8a. DESIGNATION OF CONVENING AUTHORITY LACE 80. DATE (YYYVMMDD) .~ ~:tt -".10, ''''' ~",. ("'")00""" m"'~ ","""""'r,"!d:»m,..~ """".."'" "'''''''''''' "dO, ''''7'''' ~""g ,,,,,,,,,,,,,.' By / of Command. Oreler, or70n Type7e end GraCIe of ufficer OmCiet CepactrY of Om.cer ::itgmng /: ;:iJgnatul'e / ,,' VII. SERvICt: uF CI"\ARGES ·S.On / , I (caused to be) served a copy these'charges on the above named accused. / .. V Typed Name ofTr/sl Counsel .Grade of rri.l Counsel Slgn.tUre oftiM Counsel FOOTNOTES lSee R.M.C. 601 con99rning instructlons. If none, so state. Me FORM 458 JAN 2007 Specification: In that Khalid Sheikh Mohammed, Walid Muhammad Salih Mubar Bin 'Attash, Ramzi Binalshibh, Ali Abdul Aziz Ali, Mustafa Ahmed Adam al Hawsawi and Mohamed al Kahtani, persons subject to trial by military commiss' n as alien unlawful enemy combatants, did, at various locations, from in or about 199 to in or about May 2003, conspire and agree with Usama bin Laden, Ayman al Zawahi , Mohammed Atef(a/k/a Abu Hafs al Masri), 19 individuals who hijacked fo commercial airliners on September 11, 2001: (American Airlines Flight 11, hereinafter A #11) Mohamed Atta, Satam al Suqami, Waleed al Shehri, Wail al Shehri, Ab I Aziz al Omari; (United Airlines Flight 175, hereinafter UA #175) Marwan al Shehhi, amza al Ghamdi, Ahmed al Ghamdi, Mohand al Shehri, Fayez Rashid Ahmed Hassan . I Qadi Banihammad (hereinafter Fayez Banihammad); (United Airlines Flight 93, here.' after UA #93) Ziad Samir Jarrah, Ahmad Ibrahim A. al Haznawi, Ahmed al Nami, eed al Ghamdi; (American Airlines Flight 77, hereinafter AA #77) Hani Hanj r, Khalid al Mihdhar, Nawaf al Hazmi, Majed Moqed, Salem al Hazmi; and vario s other members and associates of the al Qaeda organization, known and unkn n, and willfully join an enterprise ofpersons with the intent to further the unla ul purpose ofthe enterprise; to commit the following offenses triable by milit c ion: attacking civilians, attacking civilian objects, intentionally causi~ ~ ily injury, murder in violation of the law of war, destruction of property in ViOl~ q:i~ e law of war, and terrorism, said agreement and enterprise sharing a common cr .n~l ~ rpose, known to the six accused, to attack the United States, its people, and their ro , said conspiracy resulting in the deaths of2,973 persons. (See Charge She Appendix A for a list of victims killed in the attacks). nt and enterprise, and in order to accomplish some objective or purpose of the agree nt and enterprise, the above six accused and their co­ conspirators knowingly commit d an overt act or acts, including, but not limited to, the following: 1. In August 1996, sarna bin Laden issued a public "Declaration of Jihad Against the Americans," in whi he called for the murder of U.S. military personnel serving on the Arabian Peninsula. 2. In 1996 balid Sheikh Mohammed met with Usarna bin Laden in Afghanistan and discussed t e operational concept of hijacking commercial airliners and crashing them into building III the United States and elsewhere. This plan was ultimately approved by Usarna bin aden. 3. Between 1996 and 2001, Khalid Sheikh Mohammed, Usama bin Laden, and Mo mmed Atef (a/k/a Abu Hafs al Masri, the military commander of al Qaeda), proposed a discussed potential targets for attack by hijacked commercial airliners and decided to Page 1 of90 4. In Febl nary 1998, Usama bin Laden, A:yman al Zawahiti, and others, mtdel the banner of "International Islamic Front for Fighting Jews and Crusaders," issued a fatwa (purported religious ruling) requiring all Muslims able to do so to kill Americans - whe civilian or military - anywhere they can be found and to "plunder their money." 5. On or about May 29, 1998, Usama bin Laden issued a statement entitle 'The Nuclear Bomb of Islam," under the banner of the "International Islamic Front Dr Fighting Jews and Crusaders," in which he stated that "it is the duty ofthe Muslims to repare as much force as possible to terrorize the enemies of God." 6. In early 1999, Usama bin Laden directed Walid Muhamm Salih Mubarak Bin 'Attash (a/k/a Khallad, hereinafter Khallad Bin 'Attash) to 0 tain a United States visa so that he could travel to the United States and obtain pilot tra' ing in order to participate in what Bin 'Attash termed the "Planes Operation." 7. On or about April 3, 1999, Khallad Bin 'Attash aveled to San'a, Yemen and applied for a visa to travel to the United States using the a . s "Salah Saeed Mohammed Bin Yousaf." This application was denied. ~ 8. On or about April 3, 1999, and April ~ ,~~pectively, Nawaf al Hazmi (AA #77) and Khalid al Mihdhar (AA #77) recei~i ~\eddah, Saudia Arabia, in order to travel to the United States. ?::>~) S 9. In or about September 1999, Khal d Bin 'Attash administered a forty-five day special course in hand-to-hand combat tra' ing at an al Qaeda camp in Logar, Afghanistan, in order to help select trainees for the" anes Operation." Khalid al Mihdhar (AA #77) and Nawaf al Hazmi (AA #77) attend athis course. Following their participation in the course, al Mihdhar (AA #77) and a azmi (AA #77) were selected to be part of the "Planes Operation." 10. In or about Novemb r 1999, Khallad Bin 'Attash and Nawafal Hazmi (AA #77) traveled from Qandahar, A hanistan, to Karachi, Pakistan, where they moved in with Khalid Sheikh Moham ed. With the assistance of Khalid Sheikh Mohammed, Khallad Bin 'Attash d Nawafal Hazmi (AA #77) began using CDs, books, and other materials to learn ab t flying airplanes. 11. While y ing in Karachi, Khallad Bin'Attash, and Nawafal Hazmi (AA #77) used compute~lmulators to learn how to fly planes, and studied and researched flight timetables fo United States air carriers with Khalid Sheikh Mohammed, in order to coordinate e simultaneous hijacking ofmultiple aircraft. 12. Khalid Sheikh Mohammed, who was educated in the United States, taught Kha ad Bin 'Attash and Nawaf al Hazmi (AA #77) various English phrases needed for hi' cking planes, including "get down," "don't move," "stay in your seat," and "if~yone , . Page 2 of 90 , his idea of hijacking planes and crashing them into buildings from Usama bin Laden (hereinafter the "Planes Operation"). ;, .c, 14. In or about November 1999, Khalid Sheikh Mohammed provided Nawaf Hazmi (AA #77) and Khalid al Mihdhar (AA #77) with funds in order to travel to e United States to train and prepare for the "Planes Operation." 15. In or about December 1999, Khallad Bin 'Attash traveled to Ku a Lumpur, Malaysia, in order to assess airline security,collect information regardin air carriers for flights in Southeast Asia, and facilitate onward travel for Nawaf al Ha i (AA #77) and Khalid al Mihdhar (AA #77) from Kuala Lumpur to the United State . 16. In or about December 1999, before Khallad Bin 'Atta departed from Pakistan on his casing trip to Kuala Lumpur, Khalid Sheikh Moham d gave him a razor knife to st:;crete on his person while traveling in order to assess airli security measures.
Recommended publications
  • Day Two of Military Judge Questioning 9/11 Accused About Self-Representation
    Public amnesty international USA Guantánamo: Day two of military judge questioning 9/11 accused about self-representation 11 July 2008 AI Index: AMR 51/077/2008 On 10 July 2008, military commission judge US Marine Colonel Ralph Kohlmann held further proceedings to question the men accused of orchestrating the attacks of 11 September 2001 about their decision to represent themselves at their forthcoming death penalty trial in the US Naval Base in Guantánamo Bay, Cuba. Amnesty International had an observer at the proceedings. The primary purpose of the hearings was to inquire of each of the accused individually about whether they had been intimidated before or during their arraignment on 5 June 2008 into making a choice to represent themselves, or whether this decision had been made knowingly and voluntarily. Judge Kohlmann had questioned two of the accused, ‘Ali ‘Abd al-‘Aziz ‘Ali (‘Ammar al Baluchi) and Mustafa al Hawsawi at individual sessions held on 9 July (see http://www.amnesty.org/en/library/info/AMR51/076/2008/en). He had scheduled sessions for the other three men, Khalid Sheikh Mohammed, Walid bin Attash and Ramzi bin al-Shibh on 10 July. In the event, Ramzi bin al-Shibh refused to come to his session. It seems unlikely that the military judge will question him again on the matter of legal representation until the issue of Ramzi bin al-Shibh’s mental competency is addressed at a hearing scheduled to take place next month (see http://www.amnesty.org/en/library/info/AMR51/074/2008/en). Both Khalid Sheikh Mohammed and Walid bin Attash denied that they had been intimidated or that any intimidation had taken place.
    [Show full text]
  • PENTTBOM CASE SUMMARY As of 1/11/2002
    Law Enforcement Sensitive PENTTBOM CASE SUMMARY as of 1/11/2002 (LES) The following is a "Law Enforcement Sensitive" version of materials relevant to the Penttbom investigation. It includes an Executive Summary; a Summary of Known Associates; a Financial Summary; Flight Team Biographies and Timelines. Recipients are encouraged to forward pertinent information to the Penttbom Investigative Team at FBI Headquarters (Room 1B999) (202-324-9041), or the New York Office, (212-384-1000). Law Enforcement Sensitive 1 JICI 04/19/02 FBI02SG4 Law Enforcement Sensitive EXECUTIVE SUMMARY (LES) Captioned matter is a culmination of over a decade of rhetoric, planning, coordination and terrorist action by USAMA BIN LADEN (UBL) and the AL-QAEDA organization against the United States and its allies. UBL and AL-QAEDA consider themselves involved in a "Holy War" against the United States. The Bureau, with its domestic and international counterterrorism partners, has conducted international terrorism investigations targeting UBL, AL-QAEDA and associated terrorist groups and individuals for several years. (LES) In August 1996, USAMA BIN LADEN issued the first of a series of fatwas that declared jihad on the United States. Each successive fatwa escalated, in tone and scale, the holy war to be made against the United States. The last fatwa, issued in February 1998, demanded that Muslims all over the world kill Americans, military or civilian, wherever they could be found. Three months later, in May 1998, he reiterated this edict at a press conference. The United States Embassies in Nairobi, Kenya, and Dar es Salaam, Tanzania, were bombed on August 7, 1998, a little more than two months after that May 1998 press conference.
    [Show full text]
  • Articles Al-Qaida and the Pakistani Harakat Movement: Reflections and Questions About the Pre-2001 Period by Don Rassler
    PERSPECTIVES ON TERRORISM Volume 11, Issue 6 Articles Al-Qaida and the Pakistani Harakat Movement: Reflections and Questions about the pre-2001 Period by Don Rassler Abstract There has been a modest amount of progress made over the last two decades in piecing together the developments that led to creation of al-Qaida and how the group has evolved over the last 30 years. Yet, there are still many dimensions of al-Qaida that remain understudied, and likely as a result, poorly understood. One major gap are the dynamics and relationships that have underpinned al-Qaida’s multi-decade presence in Pakistan. The lack of developed and foundational work done on the al-Qaida-Pakistan linkage is quite surprising given how long al- Qaida has been active in the country, the mix of geographic areas - from Pakistan’s tribal areas to its main cities - in which it has operated and found shelter, and the key roles Pakistani al-Qaida operatives have played in the group over the last two decades. To push the ball forward and advance understanding of this critical issue, this article examines what is known, and has been suggested, about al-Qaida’s relations with a cluster of Deobandi militant groups consisting of Harakat ul-Mujahidin, Harakat ul-Jihad Islami, Harakat ul-Ansar, and Jaish-e-Muhammad, which have been collectively described as Pakistan’s Harakat movement, prior to 9/11. It finds that each of these groups and their leaders provided key elements of support to al-Qaida in a number of direct and indirect ways.
    [Show full text]
  • The Jihadi Threat: ISIS, Al-Qaeda, and Beyond
    THE JIHADI THREAT ISIS, AL QAEDA, AND BEYOND The Jihadi Threat ISIS, al- Qaeda, and Beyond Robin Wright William McCants United States Institute of Peace Brookings Institution Woodrow Wilson Center Garrett Nada J. M. Berger United States Institute of Peace International Centre for Counter- Terrorism Jacob Olidort The Hague Washington Institute for Near East Policy William Braniff Alexander Thurston START Consortium, University of Mary land Georgetown University Cole Bunzel Clinton Watts Prince ton University Foreign Policy Research Institute Daniel Byman Frederic Wehrey Brookings Institution and Georgetown University Car ne gie Endowment for International Peace Jennifer Cafarella Craig Whiteside Institute for the Study of War Naval War College Harleen Gambhir Graeme Wood Institute for the Study of War Yale University Daveed Gartenstein- Ross Aaron Y. Zelin Foundation for the Defense of Democracies Washington Institute for Near East Policy Hassan Hassan Katherine Zimmerman Tahrir Institute for Middle East Policy American Enterprise Institute Charles Lister Middle East Institute Making Peace Possible December 2016/January 2017 CONTENTS Source: Image by Peter Hermes Furian, www . iStockphoto. com. The West failed to predict the emergence of al- Qaeda in new forms across the Middle East and North Africa. It was blindsided by the ISIS sweep across Syria and Iraq, which at least temporarily changed the map of the Middle East. Both movements have skillfully continued to evolve and proliferate— and surprise. What’s next? Twenty experts from think tanks and universities across the United States explore the world’s deadliest movements, their strate- gies, the future scenarios, and policy considerations. This report reflects their analy sis and diverse views.
    [Show full text]
  • Anti-Semitism: a Pillar of Islamic Extremist Ideology
    Anti-Semitism: A Pillar of Islamic Extremist Ideology In a video message in August 2015, Osama bin Laden’s son, Hamza bin Laden, utilized a range of anti-Semitic and anti-Israel narratives in his effort to rally Al Qaeda supporters and incite violence against Americans and Jews. Bin Laden described Jews and Israel as having a disproportionate role in world events and the oppression of Muslims. He compared the “Zio- Crusader alliance led by America” to a bird: “Its head is America, one wing is NATO and the other is the State of the Jews in occupied Palestine, and the legs are the tyrant rulers that sit on the chests of the peoples of the Muslim Ummah [global community].” An undated image of al-Qaeda terrorist Osama bin Laden and his son, Hamza Bin Laden then called for attacks worldwide and demanded that Muslims “support their brothers in Palestine by fighting the Jews and the Americans... not in America and occupied Palestine and Afghanistan alone, but all over the world…. take it to all the American, Jewish, and Western interests in the world.” Such violent expressions of anti-Semitism have been at the core of Al Qaeda’s ideology for decades. Even the 9/11 terrorist attacks were motivated, in part, by anti-Semitism. Mohamed Atta, a key member of the Al Qaeda Hamburg cell responsible for the attacks, reportedly considered New York City to be the center of a global Jewish conspiracy, and Khalid Sheik Mohammed, who masterminded the attack, had allegedly previously developed several plans to attack Israeli and Jewish targets.
    [Show full text]
  • Global War on Terrorism and Prosecution of Terror Suspects: Select Cases and Implications for International Law, Politics, and Security
    GLOBAL WAR ON TERRORISM AND PROSECUTION OF TERROR SUSPECTS: SELECT CASES AND IMPLICATIONS FOR INTERNATIONAL LAW, POLITICS, AND SECURITY Srini Sitaraman Introduction The global war on terrorism has opened up new frontiers of transnational legal challenge for international criminal law and counterterrorism strategies. How do we convict terrorists who transcend multiple national boundaries for committing and plotting mass atrocities; what are the hurdles in extraditing terrorism suspects; what are the consequences of holding detainees in black sites or secret prisons; what interrogation techniques are legal and appropriate when questioning terror suspects? This article seeks to examine some of these questions by focusing on the Global War on Terrorism (GWOT), particularly in the context of counterterrorism strategies that the United States have pursued towards Afghanistan-Pakistan (Af-Pak) since the September 2001 terror attacks on New York and Washington D.C. The focus of this article is on the methods employed to confront terror suspects and terror facilitators and not on the politics of cooperation between the United States and Pakistan on the Global War on Terrorism or on the larger military operation being conducted in Afghanistan and in the border regions of Pakistan. This article is not positioned to offer definitive answers or comprehensive analyses of all pertinent issues associated with counterterrorism strategies and its effectiveness, which would be beyond the scope of this effort. The objective is to raise questions about the policies that the United States have adopted in conducting the war on terrorism and study its implications for international law and security. It is to examine whether the overzealousness in the execution of this war on terror has generated some unintended consequences for international law and complicated the global judicial architecture in ways that are not conducive to the democratic propagation of human rights.
    [Show full text]
  • 9/11 Report”), July 2, 2004, Pp
    Final FM.1pp 7/17/04 5:25 PM Page i THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page v CONTENTS List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— ...in the Law Enforcement Community 73 3.3 . and in the Federal Aviation Administration 82 3.4 . and in the Intelligence Community 86 v Final FM.1pp 7/17/04 5:25 PM Page vi 3.5 . and in the State Department and the Defense Department 93 3.6 . and in the White House 98 3.7 . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis:August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5.
    [Show full text]
  • Al Qaeda in the Indian Subcontinent: a New Frontline in the Global Jihadist Movement?” the International Centre for Counter- Ter Rorism – the Hague 8, No
    AL-QAEDA IN THE INDIAN SUBCONTINENT: The Nucleus of Jihad in South Asia THE SOUFAN CENTER JANUARY 2019 AL-QAEDA IN THE INDIAN SUBCONTINENT: THE NUCLEUS OF JIHAD IN SOUTH ASIA !1 AL-QAEDA IN THE INDIAN SUBCONTINENT: THE NUCLEUS OF JIHAD IN SOUTH ASIA AL-QAEDA IN THE INDIAN SUBCONTINENT (AQIS): The Nucleus of Jihad in South Asia THE SOUFAN CENTER JANUARY 2019 !2 AL-QAEDA IN THE INDIAN SUBCONTINENT: THE NUCLEUS OF JIHAD IN SOUTH ASIA CONTENTS List of Abbreviations 4 List of Figures & Graphs 5 Key Findings 6 Executive Summary 7 AQIS Formation: An Affiliate with Strong Alliances 11 AQIS Leadership 19 AQIS Funding & Finances 24 Wahhabization of South Asia 27 A Region Primed: Changing Dynamics in the Subcontinent 31 Global Threats Posed by AQIS 40 Conclusion 44 Contributors 46 About The Soufan Center (TSC) 48 Endnotes 49 !3 AL-QAEDA IN THE INDIAN SUBCONTINENT: THE NUCLEUS OF JIHAD IN SOUTH ASIA LIST OF ABBREVIATIONS AAI Ansar ul Islam Bangladesh ABT Ansar ul Bangla Team AFPAK Afghanistan and Pakistan Region AQC Al-Qaeda Central AQI Al-Qaeda in Iraq AQIS Al-Qaeda in the Indian Subcontinent FATA Federally Administered Tribal Areas HUJI Harkat ul Jihad e Islami HUJI-B Harkat ul Jihad e Islami Bangladesh ISI Pakistan’s Inter-Services Intelligence ISKP Islamic State Khorasan Province JMB Jamaat-ul-Mujahideen Bangladesh KFR Kidnap for Randsom LeJ Lashkar e Jhangvi LeT Lashkar e Toiba TTP Tehrik-e Taliban Pakistan !4 AL-QAEDA IN THE INDIAN SUBCONTINENT: THE NUCLEUS OF JIHAD IN SOUTH ASIA LIST OF FIGURES & GRAPHS Figure 1: Map of South Asia 9 Figure 2:
    [Show full text]
  • The Al Qaeda Network a New Framework for Defining the Enemy
    THE AL QAEDA NETWORK A NEW FRAMEWORK FOR DEFINING THE ENEMY KATHERINE ZIMMERMAN SEPTEMBER 2013 THE AL QAEDA NETWORK A NEW FRAMEWORK FOR DEFINING THE ENEMY KATHERINE ZIMMERMAN SEPTEMBER 2013 A REPORT BY AEI’S CRITICAL THREATS PROJECT ABOUT US About the Author Katherine Zimmerman is a senior analyst and the al Qaeda and Associated Movements Team Lead for the Ameri- can Enterprise Institute’s Critical Threats Project. Her work has focused on al Qaeda’s affiliates in the Gulf of Aden region and associated movements in western and northern Africa. She specializes in the Yemen-based group, al Qaeda in the Arabian Peninsula, and al Qaeda’s affiliate in Somalia, al Shabaab. Zimmerman has testified in front of Congress and briefed Members and congressional staff, as well as members of the defense community. She has written analyses of U.S. national security interests related to the threat from the al Qaeda network for the Weekly Standard, National Review Online, and the Huffington Post, among others. Acknowledgments The ideas presented in this paper have been developed and refined over the course of many conversations with the research teams at the Institute for the Study of War and the American Enterprise Institute’s Critical Threats Project. The valuable insights and understandings of regional groups provided by these teams directly contributed to the final product, and I am very grateful to them for sharing their expertise with me. I would also like to express my deep gratitude to Dr. Kimberly Kagan and Jessica Lewis for dedicating their time to helping refine my intellectual under- standing of networks and to Danielle Pletka, whose full support and effort helped shape the final product.
    [Show full text]
  • True and False Confessions: the Efficacy of Torture and Brutal
    Chapter 7 True and False Confessions The Efficacy of Torture and Brutal Interrogations Central to the debate on the use of “enhanced” interrogation techniques is the question of whether those techniques are effective in gaining intelligence. If the techniques are the only way to get actionable intelligence that prevents terrorist attacks, their use presents a moral dilemma for some. On the other hand, if brutality does not produce useful intelligence — that is, it is not better at getting information than other methods — the debate is moot. This chapter focuses on the effectiveness of the CIA’s enhanced interrogation technique program. There are far fewer people who defend brutal interrogations by the military. Most of the military’s mistreatment of captives was not authorized in detail at high levels, and some was entirely unauthorized. Many military captives were either foot soldiers or were entirely innocent, and had no valuable intelligence to reveal. Many of the perpetrators of abuse in the military were young interrogators with limited training and experience, or were not interrogators at all. The officials who authorized the CIA’s interrogation program have consistently maintained that it produced useful intelligence, led to the capture of terrorist suspects, disrupted terrorist attacks, and saved American lives. Vice President Dick Cheney, in a 2009 speech, stated that the enhanced interrogation of captives “prevented the violent death of thousands, if not hundreds of thousands, of innocent people.” President George W. Bush similarly stated in his memoirs that “[t]he CIA interrogation program saved lives,” and “helped break up plots to attack military and diplomatic facilities abroad, Heathrow Airport and Canary Wharf in London, and multiple targets in the United States.” John Brennan, President Obama’s recent nominee for CIA director, said, of the CIA’s program in a televised interview in 2007, “[t]here [has] been a lot of information that has come out from these interrogation procedures.
    [Show full text]
  • 9-11 and Terrorist Travel- Full
    AND TERRORIST TRAVEL Staff Report of the National Commission on Terrorist Attacks Upon the United States 9/11 AND TERRORIST TRAVEL Staff Report of the National Commission on Terrorist Attacks Upon the United States By Thomas R. Eldridge Susan Ginsburg Walter T. Hempel II Janice L. Kephart Kelly Moore and Joanne M. Accolla, Staff Assistant Alice Falk, Editor Note from the Executive Director The Commission staff organized its work around specialized studies, or monographs, prepared by each of the teams. We used some of the evolving draft material for these studies in preparing the seventeen staff statements delivered in conjunction with the Commission’s 2004 public hearings. We used more of this material in preparing draft sections of the Commission’s final report. Some of the specialized staff work, while not appropriate for inclusion in the report, nonetheless offered substantial information or analysis that was not well represented in the Commission’s report. In a few cases this supplemental work could be prepared to a publishable standard, either in an unclassified or classified form, before the Commission expired. This study is on immigration, border security and terrorist travel issues. It was prepared principally by Thomas Eldridge, Susan Ginsburg, Walter T. Hempel II, Janice Kephart, and Kelly Moore, with assistance from Joanne Accolla, and editing assistance from Alice Falk. As in all staff studies, they often relied on work done by their colleagues. This is a study by Commission staff. While the Commissioners have been briefed on the work and have had the opportunity to review earlier drafts of some of this work, they have not approved this text and it does not necessarily reflect their views.
    [Show full text]
  • The Current Detainee Population of Guantánamo: an Empirical Study
    © Reuters/HO Old – Detainees at XRay Camp in Guantanamo. The Current Detainee Population of Guantánamo: An Empirical Study Benjamin Wittes and Zaahira Wyne with Erin Miller, Julia Pilcer, and Georgina Druce December 16, 2008 The Current Detainee Population of Guantánamo: An Empiricial Study Table of Contents Executive Summary 1 Introduction 3 The Public Record about Guantánamo 4 Demographic Overview 6 Government Allegations 9 Detainee Statements 13 Conclusion 22 Note on Sources and Methods 23 About the Authors 28 Endnotes 29 Appendix I: Detainees at Guantánamo 46 Appendix II: Detainees Not at Guantánamo 66 Appendix III: Sample Habeas Records 89 Sample 1 90 Sample 2 93 Sample 3 96 The Current Detainee Population of Guantánamo: An Empiricial Study EXECUTIVE SUMMARY he following report represents an effort both to document and to describe in as much detail as the public record will permit the current detainee population in American T military custody at the Guantánamo Bay Naval Station in Cuba. Since the military brought the first detainees to Guantánamo in January 2002, the Pentagon has consistently refused to comprehensively identify those it holds. While it has, at various times, released information about individuals who have been detained at Guantánamo, it has always maintained ambiguity about the population of the facility at any given moment, declining even to specify precisely the number of detainees held at the base. We have sought to identify the detainee population using a variety of records, mostly from habeas corpus litigation, and we have sorted the current population into subgroups using both the government’s allegations against detainees and detainee statements about their own affiliations and conduct.
    [Show full text]