Baker & Mckenzie's Surveillance Law Comparison Guide 2016

Total Page:16

File Type:pdf, Size:1020Kb

Baker & Mckenzie's Surveillance Law Comparison Guide 2016 Baker & McKenzie’s Surveillance Law Comparison Guide 2016 Baker & McKenzie’s Surveillance Law Comparison Guide 2016 ©2016 Baker & McKenzie All rights reserved. This publication is copyrighted. Apart from any fair dealing for the purposes of private study or research permitted under applicable copyright legislation, no part may be reproduced or transmitted by any process or means without the prior permission of the editors. The material in this guide is of the nature of general comment only. It is not offered as legal advice on any specific issue or matter and should not be taken as such. Readers should refrain from acting on the basis of any discussion contained in this publication without obtaining specific legal advice on the particular facts and circumstances at issue. While the authors have made every effort to provide accurate and up to date information on laws and regulations, these matters are continuously subject to change. Furthermore, the application of these laws depends on the particular facts and circumstances of each situation, and therefore readers should consult their attorney before taking any action. Baker & McKenzie International is a Swiss Verein with member law firms around the world. In accordance with the common terminology used in professional service organizations, reference to a “partner” means a person who is a partner, or equivalent, in such a law firm. Similarly, reference to an “office” means an office of any such law firm. This may qualify as “Attorney Advertising” requiring notice in some jurisdictions. Prior results do not guarantee a similar outcome. Surveillance Law Comparison Baker & McKenzie Global Surveillance Law Survey The Court of Justice of the European Union (CJEU) raised the question whether the level of data protection in the USA is adequate and equivalent to the European Economic Area (EEA). The CJEU did not answer this question in its judgment of October 6, 2015, but noted concerns regarding reports of indiscriminate mass surveillance by the National Security Agency (NSA) and the Federal Bureau of Investigation (FBI) in the United States.1 Since then, the EU Commission has published a revised draft adequacy decision relating to the United States data protection level and a proposed new “EU- U.S. Privacy Shield Program,” which is accompanied by assurances by a number of U.S. government authorities regarding privacy protections relating to surveillance programs.2 At the same time, other institutions in the EU and scholars have analysed the state of surveillance laws in individual jurisdictions within the EEA and elsewhere. They uniformly found comparisons difficult, as actual practices of intelligence authorities are cloaked in secrecy and laws are complex and fragmented in this area.3 Due to constitutional limitations on the EU’s jurisdiction to legislate matters of national security, the legal situation in the EEA member states is not very uniform. For example, in some EEA member states, senior police or military officers can issue search warrants.4 EU institutions have called for improvements in the U.S. as well as in the EEA.5 1 CJEU C-362/14 Schrems v. Data Protection Commissioner), 6.10.2015, #31. 2 http://ec.europa.eu/justice/data-protection/files/privacy-shield-adequacy- decision_en.pdf 3 Cate/Dempsey/Rubinstein, Systematic government access to private-sector data, 2 International Data Privacy Law, 215 (2012); Schwartz, Systematic government access to private-sector data in Germany, 2 International Data Privacy Law, 289 (2012); Brown, Government access to private-sector data in the United Kingdom, 2 International Data Privacy Law, 230 (2012). Freiwald/Métille, Reforming Surveillance Law: the Swiss Model, 28 Berkeley Tech. L. J., 1261 (2013). 4 See Study of the EU Agency for Fundamental Rights (FRA), Surveillance by intelligence services: fundamental rights safeguards and remedies in the EU: Mapping Member States’ legal frameworks (2015), http://fra.europa.eu/en/publication/2015/surveillance-intelligence-services: A comparison Baker & McKenzie i Companies around the world are confronted with questions on how to comply with different jurisdictions’ laws and data access requests. Users and providers of cloud services, Software-as-a-Service and other services have to factor in government surveillance and data access practices of different countries into their business and location plans. With our surveillance law survey and heat map, we intend to contribute a global overview with broad jurisdictional scope to the discussion and corporate planning processes. See our heat maps here: Surveillance for Economic Purpose Data Subject Notifications Right to Court Review Publicized Cases Challenge to Orders Liability for Disclosure Of course, the situation regarding individual data access requests and responses is more nuanced than a comparative overview survey can address. Therefore, companies cannot rely on our overview as legal advice regarding a particular situation and have to continue to assess their own individual situation based on the pertinent facts and circumstances. Please contact us with any questions or suggestions. between US and EU data protection legislation for law enforcement purposes, www.europarl.europa.eu/RegData/etudes/STUD/2015/536459/IPOL_STU(2015)536459 _EN.pdf. 5 See studies cited in footnote 38. ii Baker & McKenzie Surveillance Law Comparison Baker & McKenzie’s Global Data Security Leadership Team Brian Hengesbaugh (Chicago) +1 312 861 3077 [email protected] Lothar Determann (Palo Alto) +1 650 856 5533 [email protected] Patrick Fair (Sydney) +61 2 8922 5534 [email protected] Paul Forbes (Sydney) +61 2 8922 5346 [email protected] Francesca Gaudino (Milan) +39 02 76231 452 [email protected] Daniel Krone (Munich) +49 89 5523 8156 [email protected] Theo Ling (Toronto) +1 416 865 6954 [email protected] Flavia Rebello (Sao Paulo) +55 11 3048 6851 [email protected] Michael Stoker (Chicago) +1 312 861 2870 [email protected] Baker & McKenzie iii Surveillance Law Comparison Contributing Lawyers Argentina Brazil Guillermo Cervio Flavia Rebello Buenos Aires Sao Paulo Tel: +54 11 4310 2223 Tel: +55 11 3048 6851 [email protected] [email protected] Roberto Grané Gabriela Paiva-Morette Buenos Aires Sao Paulo Tel: +54 11 4310 2214 Tel: +55 11 3048 6785 [email protected] [email protected] Sofia Canavessi Canada Buenos Aires Theodore Ling Tel: +54 11 5776 2329 Toronto [email protected] Tel: +416 865 6954 [email protected] Australia Patrick Fair Jonathan Tam Sydney Toronto Tel: +61 2 8922 5534 Tel: +416 865 2324 [email protected] [email protected] Adrian Lawrence Ricard Pochkhanawala Sydney Toronto Tel: +61 2 8922 5204 Tel: +416 865 6892 [email protected] ricard.pochkhanawala @bakermckenzie.com Ju Young Lee Sydney Chile Tel: +61 2 8922 5260 Diego Ferrada [email protected] Santiago Tel: +56 22 367 7087 Austria [email protected] Lukas Feiler Vienna Antonio Ortuzar, Jr. Tel: +43 1 24250 450 Santiago [email protected] Tel: +56 22 367 7078 [email protected] Ines Freitag Vienna Tel: +43 1 24250 276 [email protected] Baker & McKenzie v China (PRC) Finland Howard Wu Hannu Järvinen Shanghai Helsinki Tel: +86 21 6105 8538 Tel: +358 40 550 0306 [email protected] [email protected] Tracy Zhang Susanna Karlsson Shanghai Helsinki Tel: +86 21 6105 8582 Tel: + 358 20 713 3298 [email protected] [email protected] Colombia France Carolina Pardo Denise Lebeau-Marianna Bogota Paris Tel: +57 1 634 1559 Tel: +33 1 44 17 53 33 [email protected] denise.lebeau- [email protected] Sandra Castillo Bogota Idriss Kechida Tel: +57 1 634 1530 Paris [email protected] Tel: +33 1 44 17 59 08 [email protected] Daniela Cala Bogota Magalie Dansac Tel: +57 1 634 1500 Paris [email protected] Tel: +33 1 44 17 59 82 [email protected] Czech Republic Jiri Cermak Germany Prague Joachim Scherer Tel: +420 236 045 001 Frankfurt [email protected] Tel: +49 69 2 99 08 189 [email protected] Milena Hoffmanova Prague Caroline Heinickel Tel: +420 236 045 001 Frankfurt [email protected] Tel: +49 69 2 99 08 416 [email protected] Denmark Lisa Bo Larsen Hong Kong Copenhagen Paolo Sbuttoni Tel: +45 38 77 45 68 Hong Kong [email protected] Tel: +852 2846 1521 [email protected] Daiga Grunte-Sonne Copenhagen Tel: +45 38 77 41 18 [email protected] vi Baker & McKenzie Surveillance Law Comparison Gillian Lam Ireland Hong Kong John Cahir Tel: +852 2846 1686 Dublin [email protected] Tel: +353 1 649 2000 [email protected] Hungary Ines K. Radmilovic Alison Quinn Budapest Dublin Tel: +36 1 302 3330 Tel: +353 1 649 2461 [email protected] [email protected] Adam Liber Israel Budapest Nurit Dagan Tel: +36 1 302 3330 Tel Aviv [email protected] Tel: +972 3 692 7424 [email protected] Orsolya Gondos Budapest Daniel Reisner Tel: +36 1 302 3330 Tel Aviv [email protected] Tel: +972 3 692 2884 [email protected] India Probir Roy Chowdhury Italy Bangalore Francesca Gaudino Tel: +91-80-43503618 Milan [email protected] Tel: +39 02 76231 452 [email protected]
Recommended publications
  • Butcher, W. Scott
    The Association for Diplomatic Studies and Training Foreign Affairs Oral History Project WILLIAM SCOTT BUTCHER Interviewed by: David Reuther Initial interview date: December 23, 2010 Copyright 2015 ADST TABLE OF CONTENTS Background Born in Dayton, Ohio, December 12, 1942 Stamp collecting and reading Inspiring high school teacher Cincinnati World Affairs Council BA in Government-Foreign Affairs Oxford, Ohio, Miami University 1960–1964 Participated in student government Modest awareness of Vietnam Beginning of civil rights awareness MA in International Affairs John Hopkins School of Advanced International Studies 1964–1966 Entered the Foreign Service May 1965 Took the written exam Cincinnati, September 1963 Took the oral examination Columbus, November 1963 Took leave of absence to finish Johns Hopkins program Entered 73rd A-100 Class June 1966 Rangoon, Burma, Country—Rotational Officer 1967-1969 Burmese language training Traveling to Burma, being introduced to Asian sights and sounds Duties as General Services Officer Duties as Consular Officer Burmese anti-Indian immigration policies Anti-Chinese riots Ambassador Henry Byroade Comment on condition of embassy building Staff recreation Benefits of a small embassy 1 Major Japanese presence Comparing ambassadors Byroade and Hummel Dhaka, Pakistan—Political Officer 1969-1971 Traveling to Consulate General Dhaka Political duties and mission staff Comment on condition of embassy building USG focus was humanitarian and economic development Official and unofficial travels and colleagues November
    [Show full text]
  • IIIS Discussion Paper No. 211 the British Joint Intelligence Committee
    Institute for International Integration Studies IIIS Discussion Paper No.211 / March 2007 The British Joint Intelligence Committee and Ireland, 1965-1972 Eunan O’Halpin Centre for Contemporary Irish History Trinity College Dublin IIIS Discussion Paper No. 211 The British Joint Intelligence Committee and Ireland, 1965-1972 Eunan O’Halpin Disclaimer Any opinions expressed here are those of the author(s) and not those of the IIIS. All works posted here are owned and copyrighted by the author(s). Papers may only be downloaded for personal use only. IIIS Discussion Paper No. 211 The British Joint Intelligence Committee and Ireland, 1965-1972 Eunan O’Halpin Disclaimer Any opinions expressed here are those of the author(s) and not those of the IIIS. All works posted here are owned and copyrighted by the author(s). Papers may only be downloaded for personal use only. The British Joint Intelligence Committee and Ireland, 1965-1972 Eunan O’Halpin Centre for Contemporary Irish History Trinity College Dublin 3/8/2007\\Iiissan\iiismanagement\Discussion Paper Series B\Eunan O' Halpin\211\JICpaperIIIS.doc10:36 AM 2 This paper discusses the performance of the British Joint Intelligence Committee (JIC) in anticipating and assessing the dangers posed to British interests by instability in Ireland between 1965 and 1972, and in setting the parameters within which intelligence operations to counter terrorism were mounted. It concentrates on the performance of the central intelligence assessment machinery of British government, not on the politics of Anglo-Irish relations.1 It explores the performance of the JIC, at least as revealed by the redacted material available in the public archives, in terms of intelligence organization and intelligence failure.
    [Show full text]
  • Historical Dictionary of Air Intelligence
    Historical Dictionaries of Intelligence and Counterintelligence Jon Woronoff, Series Editor 1. British Intelligence, by Nigel West, 2005. 2. United States Intelligence, by Michael A. Turner, 2006. 3. Israeli Intelligence, by Ephraim Kahana, 2006. 4. International Intelligence, by Nigel West, 2006. 5. Russian and Soviet Intelligence, by Robert W. Pringle, 2006. 6. Cold War Counterintelligence, by Nigel West, 2007. 7. World War II Intelligence, by Nigel West, 2008. 8. Sexspionage, by Nigel West, 2009. 9. Air Intelligence, by Glenmore S. Trenear-Harvey, 2009. Historical Dictionary of Air Intelligence Glenmore S. Trenear-Harvey Historical Dictionaries of Intelligence and Counterintelligence, No. 9 The Scarecrow Press, Inc. Lanham, Maryland • Toronto • Plymouth, UK 2009 SCARECROW PRESS, INC. Published in the United States of America by Scarecrow Press, Inc. A wholly owned subsidiary of The Rowman & Littlefield Publishing Group, Inc. 4501 Forbes Boulevard, Suite 200, Lanham, Maryland 20706 www.scarecrowpress.com Estover Road Plymouth PL6 7PY United Kingdom Copyright © 2009 by Glenmore S. Trenear-Harvey All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior permission of the publisher. British Library Cataloguing in Publication Information Available Library of Congress Cataloging-in-Publication Data Trenear-Harvey, Glenmore S., 1940– Historical dictionary of air intelligence / Glenmore S. Trenear-Harvey. p. cm. — (Historical dictionaries of intelligence and counterintelligence ; no. 9) Includes bibliographical references. ISBN-13: 978-0-8108-5982-1 (cloth : alk. paper) ISBN-10: 0-8108-5982-3 (cloth : alk. paper) ISBN-13: 978-0-8108-6294-4 (eBook) ISBN-10: 0-8108-6294-8 (eBook) 1.
    [Show full text]
  • Countering Violent Extremism the Counter Narrative Study
    ! COUNTERING VIOLENT EXTREMISM THE COUNTER NARRATIVE STUDY “Countering the Narratives of Violent Extremism FOREWORD The Achilles’ heel of our strategy against terrorism and violent extremism has been the failure to counter the narratives that groups use to recruit. As long as groups attract a steady stream of new members, the terrorism and violence will continue. This is why the strategy known as Countering Violent Extremism (CVE) is so important, and must be used as a counterterrorism tool alongside military, intelligence, and law enforcement operations. Through our partnership with the Qatar International Academy for Security Studies (QIASS), we offer critical guidance to those wishing to counter the narratives of violence and extremism. “Countering Violent Extremism: The Counter-Narrative Study” is the result of a year- long research project conducted by our team of former top law enforcement, intelligence, and counterterrorism officials. We traveled around the world, from Malaysia to Kenya to Norway to Northern Ireland to the United States, studying extremist and terrorist groups and interviewing their members, as well as those in government and other important stakeholders responsible for tackling the problem. As you will see from our “Findings,” we’ve put together some essential lessons. One of the most important takeaways is understanding the pattern(s) behind group recruitment. Terrorist and extremist groups first prey on local grievances—exploiting feelings of anger, humiliation, resentment, or lack of purpose. They then incorporate, into their violent pronouncements, conspiratorial messages that blame those they are targeting. Self-proclaimed religious groups use distorted religious edicts in their narratives. Recruiters achieve success by providing both answers and a sense of purpose to vulnerable individuals.
    [Show full text]
  • PART I 01 • October 6, 1981 (Page 7) Egyptian President An- War Sadat Is Assassi- Sadat Assassination Nated by Radical Army Troops Loyal to the Egyptian Islamic Jihad
    TripleCrossINSERT_01-09_2nd 10/16/06 3:34 PM Page 1 TIMELINE PART I 01 • October 6, 1981 (page 7) Egyptian president An- war Sadat is assassi- Sadat assassination nated by radical army troops loyal to the Egyptian Islamic Jihad. One EIJ member associated with the unit that killed Sadat is Major Ali Abdel Saoud Mohamed. His alibi at the time is that he is on an officer exchange program studying at the JFK Special Warfare Center at Fort Bragg, North Carolina, where Green Beret and Delta Force officers receive advanced training. Mohamed 02 • 1981 (page 9) One of more than three hundred radicals jailed for the assassination is young surgeon Ayman al-Zawahiri. The English-speaking son of a promi- nent Egyptian family, al-Zawahiri emerges as the spokesman for the EIJ suspects and becomes a celebrity in the growing ranks of radical Islam. al-Zawahiri in 1981 03 • April 18, 1983 (page 13) The U.S. embassy in Beirut is bombed, killing 63, including 17 Americans. On October 23, suicide truck bombers hit the U.S. Marine barracks and a French garrison. 321 die. Hezbollah takes credit for all three attacks. The following March 16, Hezbollah operatives kidnap the CIA’s Beirut station chief, William Buckley. He’s tortured and held cap- tive for more than a year before his execution in mid-1985. Marine barracks 04 • 1984 (page 16) Forced out of the Egyptian army for his radical views, Ali Mohamed is assigned by al-Zawahiri to learn how to hijack airliners for the EIJ. He takes a job as “security advisor” with Egyptair, the state airline.
    [Show full text]
  • Jihadists Assemble: the Rise of Militant Islamism in Southeast Asia
    JIHADISTS ASSEMBLE: THE RISE OF MILITANT ISLAMISM IN SOUTHEAST ASIA Quinton Temby A thesis submitted for the degree of Doctor of Philosophy of the Australian National University Department of Political & Social Change Coral Bell School of Asia Pacific Affairs College of Asia & the Pacific Australian National University © Copyright Quinton Temby All Rights Reserved July 2017 I certify that this dissertation is my own original work. To the best of my knowledge, it contains no material that has been accepted for the award of a degree or diploma in any university and contains no material previously published by another person, except where due reference is made in the text of the dissertation. Quinton Temby ii ACKNOWLEDGEMENTS The preparation of this thesis has left me indebted to many people. It would not have been possible at all without the generous support of my primary supervisor, Associate Professor Greg Fealy, who encouraged my curiosity for this topic from the outset and who expertly guided and challenged me throughout the long process of research and writing. On my supervisory panel, I was privileged to have Professor Ed Aspinall and Professor Robert Cribb, whose critical feedback and scholarly example has been an object lesson. For help and guidance in ways impossible to count or measure, much less repay, I am grateful to Sidney Jones. In both Canberra and Jakarta, I enjoyed the support of Associate Professor Marcus Mietzner. For persistently challenging me to think regionally, I owe much of the vision of this thesis to Dr Kit Collier. In Indonesia, above all I would like to thank Sita W.
    [Show full text]
  • Southern Thailand: from Conflict to Negotiations? | Lowy Institute
    Southern Thailand: Duncan McCargo From conflict to negotiations? April 2014 SOUTHERN THAILAND: FROM CONFLICT TO NEGOTIATIONS? The Lowy Institute for International Policy is an independent policy think tank. Its mandate ranges across all the dimensions of international policy debate in Australia – economic, political and strategic – and it is not limited to a particular geographic region. Its two core tasks are to: • produce distinctive research and fresh policy options for Australia’s international policy and to contribute to the wider international debate. • promote discussion of Australia’s role in the world by providing an accessible and high quality forum for discussion of Australian international relations through debates, seminars, lectures, dialogues and conferences. Lowy Institute Analyses are short papers analysing recent international trends and events and their policy implications. The views expressed in this paper are entirely the author’s own and not those of the Lowy Institute for International Policy. SOUTHERN THAILAND: FROM CONFLICT TO NEGOTIATIONS? EXECUTIVE SUMMARY It has been a decade since the outbreak of one of Asia’s most serious insurgencies, the conflict between Malay Muslims and the Thai state in Southern Thailand. Often ignored and unremarked upon by the international community, this conflict has left over 6,000 dead and countless others wounded. There is more at stake here than just stability in the south. In recent years, Thailand has seen a resurgence of ethno regionalist tensions across the country, most recently in the North and Northeast. Grasping the nettle by addressing the root causes of the southern insurgency will be crucial in turning back the tide of regional resentments and allowing Thais everywhere more political space to manage their own affairs without constant interference from Bangkok.
    [Show full text]
  • Corruption As a Facilitator of Trafficking in Persons and Smuggling
    Acknowledgements The Desk Review was overseen by the United Nations Office on Drugs and Crime (UNODC) Regional Office for Southeast Asia and the Pacific (ROSEAP) and the Regional Support Office of the Bali Process (RSO) under the supervision of Dr Rebecca Miller, Regional Coordinator – Human Trafficking and Migrant Smuggling and Dr Marika McAdam, International Law and Policy Advisor respectively. This report also benefited from the valuable input of Francesco Checchi, UNODC Regional Advisor, Anti-Corruption Programme, based in Bangkok. The Desk Review was conducted by Dr Joseph Lelliott, Lecturer, School of Law, University of Queensland and Dr Andreas Schloenhardt, Professor of Criminal Law, University of Queensland and Honorary Professor of Foreign and International Criminal Law, Faculty of Law, University of Vienna, Austria. UNODC ROSEAP gratefully acknowledges the generous funding from the Australian Government, Department of Home Affairs. Disclaimers: This report has not been formally edited. The contents of this publication do not necessarily reflect the views or policies of UNODC, Member States, or contributory organizations, and neither do they imply any endorsement. The designations employed and the presentation of the material in this publication do not imply the expression of any opinion whatsoever on the part of UNODC or the Secretariat of the United Nations concerning the legal status of any country, territory, city or area or of its authorities, or concerning the delimitation of its frontiers or boundaries Cover Photo Sung Shin i Table of Contents 1 1. Introduction 3 1.1 Context and Background 4 1.2 Purpose and Structure of this Desk Review 4 1.3 Methodology 5 2.
    [Show full text]
  • U.S. Relations with Central Asian States:...1991 to 2012
    U.S. RELATIONS WITH CENTRAL ASIAN STATES: A STUDY WITH REFERENCE TO ENERGY RESOURCES GEOPOLITICS FROM 1991 TO 2012 HUJJATHULLAH S/O M.H. BABU SAHIB FACULTY OF ARTS AND SOCIAL SCIENCES UNIVERSITY OF MALAYA KUALA LUMPUR University of Malaya 2018 U.S. RELATIONS WITH CENTRAL ASIAN STATES: A STUDY WITH REFERENCE TO ENERGY RESOURCES GEOPOLITICS FROM 1991 TO 2012 HUJJATHULLAH S/O M. H. BABU SAHIB THESIS SUBMITTED IN FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY, BY RESEARCH FACULTY OF ARTS AND SOCIAL SCIENCES UniversityUNIVERSITY of OF MALAYAMalaya KUALA LUMPUR 2018 DEDICATION This research is, humbly, dedicated to the disquieting memory of the numerous innocent ordinary victims of the Central Asian states (CAS) and the United States of America (USA) who, over the ages, have been the, unfortunate, casualties in elitist-hatched geopolitics, both internal and external. May all those innocent souls, regardless of their various convictions, find true peace! University of Malaya UNIVERSITI MALAYA ORIGINAL LITERARY WORK DECLARATION Name of Candidate: Hujjathullah s/o. M. H. Babu Sahib Registration/Matric No.: AHA 050032 Name of Degree: Doctor of Philosophy Title of Thesis (“This Work”): U.S. Relations with Central Asian States: A Study with Reference to Energy Resources Geopolitics from 1991 to 2012 Field of Study: History I do solemnly and sincerely declare that: (1) I am the sole author/writer of this Work; (2) This Work is original; (3) Any use of any work in which copyright exists was done by way of fair dealing and for
    [Show full text]
  • Revisiting Al-Qa`Ida's Anthrax Program
    MAY 2009 . VOL 2 . ISSUE 5 Revisiting Al-Qa`ida’s This article outlines al-Qa`ida’s known as “al-Zabadi” (“Yogurt”), with justifications for using weapons of a budget of only $2,000 to $4,000. Anthrax Program mass destruction (WMD), provides `Atif and Ayman al-Zawahiri started background information on the first and the program in May 1999 after studying By René Pita and Rohan Gunaratna second phases of al-Qa`ida’s anthrax- different Western biomedical books based BW program, and then assesses and publications on the weapons.8 An since november 2008, a number whether it could begin a third phase. electronic message sent by al-Zawahiri of developments have occurred to `Atif dated April 15, 1999 stated: concerning al-Qa`ida’s biological WMD Justifications weapons (BW) program. On November Since Usama bin Ladin declared in I have read the majority of the 24, the Malaysian government released 1998 that the acquisition of WMD was book…[It] is undoubtedly useful. It from jail Yazid Sufaat, previously a “religious duty,” there have been emphasizes a number of important responsible for al-Qa`ida’s anthrax numerous statements indicating that facts, such as: program in Afghanistan. On February 2, jihadists are not restricted from using 2009, Abdallah al-Nafisi, identified as these weapons.5 In fact, they have a) The enemy started thinking a Kuwaiti “professor,” appeared on al- argued that it is justified as retaliation about these weapons before Jazira television promoting an anthrax for what they consider use of WMD WWI. Despite their extreme attack against the United States.
    [Show full text]
  • Order out of Chaos
    ORDEROUT OFCHAOS ORDEROUT OFCHAOS Elite Sponsored Terrorism and the New World Order Paul Joseph Watson Alex Jones Productions Since 1996 Austin, TX Copyright © 2003 by Paul Joseph Watson All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means electronic or mechanical, including photocopy, recording, or any information storage and retrieval system now known or to be invented, without permission in writing from the publisher, except by a reviewer who wishes to quote brief passages in connection with a review written for inclusion in a magazine, newspaper, broadcast, or website. Published in the United States by AEJ Productions A Jones Productions Company 3001 S. Lamar, Suite 100 Austin, TX 78704 Visit Our Websites at www.infowars.com and www.prisonplanet.com This book is dedicated to my cousin Christopher Rowley. I hope that I can be as good a man as Chris was so that I can see him again in Heaven some day. Special Thanks: My mum and dad, my brother Stephen, my auntie Susan, my cousin Philip. Thanks to Alex Jones for awakening me to the New World Order and for publishing this book. Thanks for the support: William Kennedy, Ankur Patel, Gregory T. Janetka, Kathy Nielsen, Taylor Moran, Vincenzo Ercole, Brendy Meurisse, Scott Windle, Lee Samelson. CONTENTS Chapter 1: Introduction Chapter 2: The History of Tyrants: A Lesson From the Past Chapter 3: British Intelligence: Her Majesty’s Terrorist Network Chapter 4: Chaos 101: Building Your Own Enemies Chapter 5: 9/11: Countdown to Terror – Warnings Ignored Chapter 6: Treason Beneath a Clear Blue Sky Chapter 7: 9/11 Aftermath: New World Order Chapter 8: The Pakistan/India Conflict: Familiar Faces and Nuclear Holocaust Chapter 9: Counterfeit Foe: Staging a Cosmic Threat Chapter 10: Empire: Global Pax-Americana Chapter 11: Conclusion Chapter 1 Introduction A New World Order is being erected and it is the biggest threat humanity has ever faced.
    [Show full text]
  • Understanding the Intelligence Failure and Information Sharing in Handling Terrorism Among Intelligence Community
    International Journal of Academic Research in Business and Social Sciences Vol. 9 , No. 9, September, 2019, E-ISSN: 2222-6990 © 2019 HRMARS Understanding the Intelligence Failure and Information Sharing in Handling Terrorism among Intelligence Community Syariffah Nur Qasyfi Syed Mohamed, Mohammed Yaacob To Link this Article: http://dx.doi.org/10.6007/IJARBSS/v9-i9/6414 DOI: 10.6007/IJARBSS/v9-i9/6414 Received: 12 July 2019, Revised: 01 August 2019, Accepted: 30 August 2019 Published Online: 11 September 2019 In-Text Citation: (Mohamed & Yaacob, 2019) To Cite this Article: Mohamed, S. N. Q. S., & Yaacob, M. (2019). Understanding the Intelligence Failure and Information Sharing in Handling Terrorism among Intelligence Community. International Journal of Academic Research in Business and Social Sciences, 9(9), 1201–1213. Copyright: © 2019 The Author(s) Published by Human Resource Management Academic Research Society (www.hrmars.com) This article is published under the Creative Commons Attribution (CC BY 4.0) license. Anyone may reproduce, distribute, translate and create derivative works of this article (for both commercial and non-commercial purposes), subject to full attribution to the original publication and authors. The full terms of this license may be seen at: http://creativecommons.org/licences/by/4.0/legalcode Vol. 9, No. 9, 2019, Pg. 1201 - 1213 http://hrmars.com/index.php/pages/detail/IJARBSS JOURNAL HOMEPAGE Full Terms & Conditions of access and use can be found at http://hrmars.com/index.php/pages/detail/publication-ethics 1201 International Journal of Academic Research in Business and Social Sciences Vol. 9 , No. 9, September, 2019, E-ISSN: 2222-6990 © 2019 HRMARS Understanding the Intelligence Failure and Information Sharing in Handling Terrorism among Intelligence Community Syariffah Nur Qasyfi Syed Mohamed, Mohammed Yaacob Centre of Media Information and Warfare Studies, Universiti Teknologi MARA 40450 Shah Alam, Selangor, Malaysia.
    [Show full text]