JTF GTMO Detainee Assessment

Total Page:16

File Type:pdf, Size:1020Kb

JTF GTMO Detainee Assessment S E C R E T / / NOFORN I I 2O3IOI23 DEPARTMENT OF DEFENSE JOINT TASK FORCE GUANTANAMO GUANTANAMO BAY, CUBA APO AE 09360 JTFGTMO-CG 23 Ianuaw2006 MEMORANDUMFOR Commander, United States Southern Command, 3511 NW 9lstAvenue, Miami,FL33172. SUBJECT: Recommendationfor ContinuedDetention Under DoD Control (CD) for GuantanamoDetainee, ISN: US9SA-000337DP(S) JTFGTMO Detainee Assessment 1. (S//NF)Personal Information: o JDIMSA{DRC ReferenceName: SaadAl Bedna o Aliasesand Current/TrueName: Sa'adIbraham Sa'ad Al Bidna o Placeof Birth: Riyadh. SaudiArabia (SA) o Dateof Birth: I I May 1978' o Crtizenship: Saudi Arabia o IntemmentSerial Number (lSN): US9SA-000337DP 2. (FOUO) Health: Detaineeis in goodhealth. His in processingBody MassIndex on 13 FEB 02 was 22o/o.He has a medicalhistory of Dyspepsiaand mixed personalitytraits. His chronicmedications include Sucralfateand Prevacid. He hasno known drug allergies. 3. (S//NF)JTF GTMOAssessment: a. (S) Recommendation:JTF GTMO recommends this detainee for Continued DetentionUnder DoD Control (CD). JTF GTMO previouslyassessed detainee as Retainin DoD Control (DoD) on 10 September2004. t O0O33Z302 2 September2002, (S/NF) (AnalystNote: Detainee'sKB stateshe was born in 1979,cited source indicatesdetainee stated his birth datewas 6 month,3 day, 1398of the ArabicCalendar. This dateconverts to I I May 1978.) CLASSIFIEDBY: MULTIPLESOURCES REASON:E.O. 129s8 SECTION 1.5(C) DECLASSIFYON: 20310123 S E C R E T // NOFORNI / 2O3IOI23 S E C R E T //NOFORN I I 2O3IOI23 JTF GTMO-CG SUBJECT: Recommendationfor ContinuedDetention Under DoD Control (CD) for GuantanamoDetainee, ISN: US9SA-000337DP(S) b. (S//NF) Executive Summary: Detaineeis assessedto be a supporterofjihad. He traveled to Pakistanwith a known Al Wafa recruiter.2 A variation of detainee'sname appearedon a travel itinerary associatedwith a (now deceased)terrorist on the Saudi government'smost wantedlist. It is assessedthis detaineeis a MEDIUM risk, as he may posea threatto the US, its interestsand allies. JTF GTMO determinedthis detaineeis of LOW intelligencevalue. TADDITIONAL INFORMATION ABOUT THIS DETAINEE IS AVAILABLE IN A SCI SUPPLEMENT.I 4. (S/NF)Detainee's Account of Events: The followingsection is based,unless othenarise indicated, on detainee'sown account. Thesestatements are includedwithout considerationof veracity, accuracy,or reliability. a. (S/NF) Prior History: Detaineegraduated from^Al-Sulaymania Middle School, Riyadh, SA, in 2001 with a diploma in generalstudies.' His fatheris a retiredteacher who worked in the constructionbusiness at the time detaineeleft. Detaineeclaimed his family is wealthy,and employsnumerous servants in their household.a b. (S/NF) Recruitment and Travel: In the summermonths of 2001,detainee traveled to Damascus,Syria (SY), for a vacation. He spenta week in Damascus.Detainee heard of the "temporary marriage season"in Iran (IR) for Shiite Muslims and decidedthat he would travel there to find a temporary wife to keep him company on vacation. Detaineetraveled to Tehran, IR, and spentthree days trying to identify where the temporary marriageswere taking place. He was told to travel to Meshad,IR, and did so. Detaineestayed in Meshadfor approximately two to three months, engagingin ten to twenty temporary marriages. One day towardsthe end of his time in Meshad,detainee met Wa'el Al Jabiri in the lobby of his hotel. Al Jabiri told detaineethat he was en route to Pakistan(PK) to deliver an unspecified amount of money to pay relief to an orgarization (NFI). Detaineementioned to Al Jabiri that he had developeddigestive problems, and his new acquaintancesuggested that detaineetravel with him to Pakistanfor treatment.s t 1SnUl Al Wafa is an IICT Tier I CounterterrorismNGO target, defined as those that have demonsffatedthe intent and willingness to support terrorist organizationswilling to attack US personsor interests. 'ooo33zKB 02-18-2002 oooo337 302 o9-sEP-2002 t 0003373022-s8p2002. IIR 6 0340048 03 2 S E C R E T // NOFORNI I 2O3IOI23 S E C R E T // NOFORN I I 2O3IOI23 JTF GTMO-CG SUBJECT: Recommendationfor ContinuedDetention Under DoD Control (CD) for GuantanamoDetainee, ISN: US9SA-000337DP(S) c. (S//NF) Training and Activities: Detaineeclaims that during Ramadan2001,6 he and Al Jabiri hired a taxi to drive them to Quetta,PK. Detaineeslept the entire trip, and estimatedthat the trip took four hours. He did not have a visa to enter Pakistan,and is not surehow they enteredthe country. Once in Quetta,Al Jabiri directed the taxi to an apartment. Detaineestayed in the apartmentfor approximately twenty-four hours awaiting Al Jabiri's retum from paying the donation.' 5. (S//NF)Capture lnformation: a. (S/AID When Al Jabiri did not return, detaineedecided to return to Syria, and thus hired a taxi to take him to the airport. While traveling to the airport, Pakistani authorities stopped detaineeand askedif he was Arab. When he answeredin the affrrmative, Pakistani authoritiestook him into custody,demanding his passportand money. Detaineeremained in Pakistani custody for approximately one month before being transferredto US custody on approximately2l January2002.6 b. (S) PropertyHeld: o 4 - 500 SaudiRiyal notes o 1-Multi-coloredhat o 1 - Black sports watch . Passporte c. (S)Transferred to JTF GTMO: 13February 2002 d. (S//NF)Reasons for Transferto JTF GTMO: Toprovide information on the followins: . Iranianor Arab activitiesinvolving Afghan refugees in Pakistanand Iran o Personalitiesin Iran andPakistan involved with terroristrecruitment of Afghani refugees " (FOUO) (AnalystNote: Ramadanwas from 17November 2001 to 16December 2001.) t 00o33z302 2 September2002, IIR 6 0340048 03 t OOO::Z302 2 September2002, IIR 6 0340048 03, 000337 Initial Screening Form ' 000337Initial Screening Form, GUAN-2002-000194, IIR 2 340 634102, (S/NF) (AnalystNote: GUAN-2002- 000194is a photocopyof the detainee'spassport. It is accompaniedby a handwrittentranslation. The translation providesan incorrectdate of entryto MehrabadAirport, IR. The correctdate of entryis 13 October2001 , consistent with detainee'sstated route of travelfrom Syriato Iran.) 3 s E c R E T //NOFORN | / 20310123 S E C R E T //NOFORN I I 2O3IOI23 JTF GTMO-CG SUBJECT: Recommendationfor ContinuedDetention Under DoD Control (CD) for GuantanamoDetainee, ISN: US9SA-000337DP(S) 6. (S//NF) Evaluation Of Detainee's Account: Detainee'stimeline is inconsistentand his true activities remain unclear. Detaineeclaims to have left Saudi Arabia in the summer months of 2001; however,his passportindicates he departedSaudi Arabiaand enteredSyria in October 2001. His timeline is questionableby the informationhe providedin his initial screening,in which he statedhe left Saudi Arabia in approximately late September2001. His statements regarding travel from Meshad to Quetta are highly suspect. The trip, estimatedto be more than a thousandmile journey through Iran, could not have been completed in the four hour taxi ride, as the detaineeclaimed.l0 Moreo,rer,his passportlacked an exit stampfrom Iran and an entry stamp for Pakistan,suggesting that he was smuggledout of Iran and into Pakistan,or was traveling on a second,probably forged, passport. Detaineefuither claimed that he traveled with Wa'el Al Jabiri, a known Al-Wafa recruiter,to Pakistanto receivetreatment for his digestive problems; however, after twenty-four hours in country, he decidedto retum to Syria without having soughtmedical care. 7. (S//NF)Detainee Threat: a. (S) Assessment: It is assessedthe detainee poses a MEDIUM risk,as he maypose a threatto theUS. its interestsand allies. b. (S//NF)Reasons for Continued Detention: Detaineeis assessedto be a supporter ofjihad, andhis identityis in question.He mayhave traveled to Iranwith an individual formerlyon the Saudigovernment's most wanted list. Detaineehas admitted to travelingto Pakistanwith a knownAl Wafarecruiter. An assessedextremist in Iraq is reportedlyusing detainee'sname and national identification number. o (S/AIIF)Detainee may not bethe individual he claimsto be. o (S) Detainee'spassport was evaluated by theUS govemmentand assessed to be fraudulent.The period of validity on the passportexamined was one week shortof the standardissue period.ll o (S/AIF) During the 2002Saudi delegation visit, detaineewas identified as having thetrue name of Sa'adIbrahim Sa'ad Al-Bidna.'' (AnalystNote: Thisis thename that appearson the passportwith which detaineewas captured.) o (S/AIF) A variationof detainee'strue name, Sa'd Ibrahim Al-Badnah, and his nationalidentification number (1042741056) appear on a SaudiMinistry of Interior's GeneralDirectorate of Investigations(Mabahith) listing of 47I Saudiextremists to 1UllnOUO) (Analyst Note: When confronted with this discrepancy,detainee conceded that the trip might have taken longer than four hours. However, he claimed to have slept through the entire journey, never once waking, evento usethe restroom. See000337 302 09-SEP-2002) tt c-os2-oo2i9 t' to-314129199-02 4 s E c R E T //NOFORN I | 20310123 S E C R E T // NOFORN I I 2O3IOI23 JTF GTMO-CG SUBJECT: Recommendationfor ContinuedDetention Under DoD Control (CD) for GuantanamoDetainee, ISN: US9SA-000337DP(S) believed to have enteredIraq as of late August 2005, and whose statusremains unknown.'' (Analyst Note: It is possiblethat an unknown individual in Iraq is using detainee'sname and identificationnumber. Detainee'suse of a fraudulentpassport, the Mabahithidentihcation of detaineeas Sa'ad Ibrahim Sa'adAl-Bidna in2002 while in US custody, and the subsequentidentification of the sameindividual in Iraq in 2005, raisesthe
Recommended publications
  • JTF-GTMO Detainee Assessment
    S E C R E T //NOFORN I I 20320619 DEPARTMENTOF DEFENSE HEADQUARTERS,JOINT TASK FORCEGUANTANAMO U.S. NAVAL STATION,GUANTANAMO BAY, CUBA APO AE 09350 JTF-GTMO-CDR 19June 2007 MEMORANDUM FOR Commander,United StatesSouthem Command. 3511 NW 9lst Avenue. Miami,FL33172. SUBJECT: Recommendationfor ContinuedDetention Under DoD Control (CD) for GuantanamoDetainee, ISN: US9SA-000079DP(S) JTF-GTMO DetaineeAssessment 1. (S//NF) Personal Information: o JDIMSAIDRC ReferenceName: FahedA al-Harasi o Aliases and Current/True Name: Fahd Atiyah Hamza Hamid al-Harazi" Hassanal-Makki. FahedFahad" Khalid. Abu Hassan. al-Sharif. Abu Barak o Placeof Birth: Mecca. SaudiArabia (SA) o Date of Birth: 18 November 1978 o Citizenship: SaudiArabia o InternmentSerial Number (ISN): US9SA-000079DP 2. (U//T'OUO) Health: Detaineeis in good health. 3. (S//NF) JTF-GTMO Assessment: a. (S) Recommendation: JTF-GTMO recommendsthis detaineefor ContinuedDetention Under DoD Control (CD). JTF-GTMO previouslyassessed detainee for Continued Detentionwith TransferLanguage on 26May 2006. b. (S//NF) Executive Summary: Detaineeis reportedto be a memberof al-Qaida. He was identified as having attendedmilitant training and was an instructor at the al-Qaida al- Faruq Training Camp. Detaineewas in Afghanistan (AF) since 1999 during which he is assessedto have participated in hostilities againstUS and Coalition forces as a member of Classifiedby: MultipleSources REASON:E.O. 12958, AS AMENDED,Section 1.4(C) Declassi$on:20320619 S E C R E T //NOFORN I I 20320619 S E C R E T // NOFORN I I 20320619 JTF-GTMO.CDR SUBJECT: Recommendationfor ContinuedDetention Under DoD Control (CD) for GuantanamoDetainee, ISN: US9SA-000079DP(S) UsamaBin Laden's (UBL) 55th Arab Brigade.l Detainee'sname and aliaswere listed in recovereddocuments associated with al-Qaida, and the Saudi Ministry of Interior General Directorate of Investigations(Mabahith) identified him as a high priority detainee.
    [Show full text]
  • Inside Russia's Intelligence Agencies
    EUROPEAN COUNCIL ON FOREIGN BRIEF POLICY RELATIONS ecfr.eu PUTIN’S HYDRA: INSIDE RUSSIA’S INTELLIGENCE SERVICES Mark Galeotti For his birthday in 2014, Russian President Vladimir Putin was treated to an exhibition of faux Greek friezes showing SUMMARY him in the guise of Hercules. In one, he was slaying the • Russia’s intelligence agencies are engaged in an “hydra of sanctions”.1 active and aggressive campaign in support of the Kremlin’s wider geopolitical agenda. The image of the hydra – a voracious and vicious multi- headed beast, guided by a single mind, and which grows • As well as espionage, Moscow’s “special services” new heads as soon as one is lopped off – crops up frequently conduct active measures aimed at subverting in discussions of Russia’s intelligence and security services. and destabilising European governments, Murdered dissident Alexander Litvinenko and his co-author operations in support of Russian economic Yuri Felshtinsky wrote of the way “the old KGB, like some interests, and attacks on political enemies. multi-headed hydra, split into four new structures” after 1991.2 More recently, a British counterintelligence officer • Moscow has developed an array of overlapping described Russia’s Foreign Intelligence Service (SVR) as and competitive security and spy services. The a hydra because of the way that, for every plot foiled or aim is to encourage risk-taking and multiple operative expelled, more quickly appear. sources, but it also leads to turf wars and a tendency to play to Kremlin prejudices. The West finds itself in a new “hot peace” in which many consider Russia not just as an irritant or challenge, but • While much useful intelligence is collected, as an outright threat.
    [Show full text]
  • CIA Best Practices in Counterinsurgency
    CIA Best Practices in Counterinsurgency WikiLeaks release: December 18, 2014 Keywords: CIA, counterinsurgency, HVT, HVD, Afghanistan, Algeria, Colombia, Iraq, Israel, Peru, Northern Ireland, Sri Lanka, Chechnya, Libya, Pakistan, Thailand,HAMAS, FARC, PULO, AQI, FLN, IRA, PLO, LTTE, al-Qa‘ida, Taliban, drone, assassination Restraint: SECRET//NOFORN (no foreign nationals) Title: Best Practices in Counterinsurgency: Making High-Value Targeting Operations an Effective Counterinsurgency Tool Date: July 07, 2009 Organisation: Central Intelligence Agency (CIA) Author: CIA Office of Transnational Issues; Conflict, Governance, and Society Group Link: http://wikileaks.org/cia-hvt-counterinsurgency Pages: 21 Description This is a secret CIA document assessing high-value targeting (HVT) programs world-wide for their impact on insurgencies. The document is classified SECRET//NOFORN (no foreign nationals) and is for internal use to review the positive and negative implications of targeted assassinations on these groups for the strength of the group post the attack. The document assesses attacks on insurgent groups by the United States and other countries within Afghanistan, Algeria, Colombia, Iraq, Israel, Peru, Northern Ireland, Sri Lanka, Chechnya, Libya, Pakistan and Thailand. The document, which is "pro-assassination", was completed in July 2009 and coincides with the first year of the Obama administration and Leon Panetta's directorship of the CIA during which the United States very significantly increased its CIA assassination program at the
    [Show full text]
  • Wikileaks and the Institutional Framework for National Security Disclosures
    THE YALE LAW JOURNAL PATRICIA L. BELLIA WikiLeaks and the Institutional Framework for National Security Disclosures ABSTRACT. WikiLeaks' successive disclosures of classified U.S. documents throughout 2010 and 2011 invite comparison to publishers' decisions forty years ago to release portions of the Pentagon Papers, the classified analytic history of U.S. policy in Vietnam. The analogy is a powerful weapon for WikiLeaks' defenders. The Supreme Court's decision in the Pentagon Papers case signaled that the task of weighing whether to publicly disclose leaked national security information would fall to publishers, not the executive or the courts, at least in the absence of an exceedingly grave threat of harm. The lessons of the PentagonPapers case for WikiLeaks, however, are more complicated than they may first appear. The Court's per curiam opinion masks areas of substantial disagreement as well as a number of shared assumptions among the Court's members. Specifically, the Pentagon Papers case reflects an institutional framework for downstream disclosure of leaked national security information, under which publishers within the reach of U.S. law would weigh the potential harms and benefits of disclosure against the backdrop of potential criminal penalties and recognized journalistic norms. The WikiLeaks disclosures show the instability of this framework by revealing new challenges for controlling the downstream disclosure of leaked information and the corresponding likelihood of "unintermediated" disclosure by an insider; the risks of non-media intermediaries attempting to curtail such disclosures, in response to government pressure or otherwise; and the pressing need to prevent and respond to leaks at the source. AUTHOR.
    [Show full text]
  • Offensive Capabilities
    GCHQ and UK Mass Surveillance Chapter 5 5 Beyond signals intelligence: Offensive capabilities 5.1 Introduction Documents released by German magazine Der Spiegel provide a much richer picture of the offensive activities of the NSA and its allies, including the UK’s GCHQ.i The global surveillance infrastructure and hacking tools described in the previous chapters are not only used for obtaining information to be fed into intelligence reports and tracking terrorists. The agencies are also developing cyber-warfare capabilities, with the NSA taking the lead within the US armed forces. This militarisation of the internet saw U.S. intelligence services carried out 231 offensive cyber-operations in 2011ii. The UK's National Strategic Defence and Security Review from 2010 made hostile attacks upon UK cyberspace a major priorityiii. It is fair to assume that many countries are following suit and building cyber-warfare capabilities. Der Spiegel terms the development of these aggressive hacking tools as Digital Weapons. In their view D weapons which should join the ABC (Atomic, Biological and Chemical) weapons of the 20th century because of their indiscriminate nature. Here lies a fundamental problem. The modern world with connected global communications networks means that non-state actors such as civilians and businesses are now affected by the agencies’ activities much more frequently than before. The internet is used by everyone – cyberspace is mainly a civilian space – and the opportunity for collateral damage is huge. The papers leaked to Der Spiegel appear to show that signal agencies have little regard for the security and wellbeing of anyone who gets caught in the path of their operations.
    [Show full text]
  • Mass Surveillance
    Mass Surveillance Mass Surveillance What are the risks for the citizens and the opportunities for the European Information Society? What are the possible mitigation strategies? Part 1 - Risks and opportunities raised by the current generation of network services and applications Study IP/G/STOA/FWC-2013-1/LOT 9/C5/SC1 January 2015 PE 527.409 STOA - Science and Technology Options Assessment The STOA project “Mass Surveillance Part 1 – Risks, Opportunities and Mitigation Strategies” was carried out by TECNALIA Research and Investigation in Spain. AUTHORS Arkaitz Gamino Garcia Concepción Cortes Velasco Eider Iturbe Zamalloa Erkuden Rios Velasco Iñaki Eguía Elejabarrieta Javier Herrera Lotero Jason Mansell (Linguistic Review) José Javier Larrañeta Ibañez Stefan Schuster (Editor) The authors acknowledge and would like to thank the following experts for their contributions to this report: Prof. Nigel Smart, University of Bristol; Matteo E. Bonfanti PhD, Research Fellow in International Law and Security, Scuola Superiore Sant’Anna Pisa; Prof. Fred Piper, University of London; Caspar Bowden, independent privacy researcher; Maria Pilar Torres Bruna, Head of Cybersecurity, Everis Aerospace, Defense and Security; Prof. Kenny Paterson, University of London; Agustín Martin and Luis Hernández Encinas, Tenured Scientists, Department of Information Processing and Cryptography (Cryptology and Information Security Group), CSIC; Alessandro Zanasi, Zanasi & Partners; Fernando Acero, Expert on Open Source Software; Luigi Coppolino,Università degli Studi di Napoli; Marcello Antonucci, EZNESS srl; Rachel Oldroyd, Managing Editor of The Bureau of Investigative Journalism; Peter Kruse, Founder of CSIS Security Group A/S; Ryan Gallagher, investigative Reporter of The Intercept; Capitán Alberto Redondo, Guardia Civil; Prof. Bart Preneel, KU Leuven; Raoul Chiesa, Security Brokers SCpA, CyberDefcon Ltd.; Prof.
    [Show full text]
  • Download the PDF File
    S E C RE T //NOFORN I I 20310825 DEPARTMENT OF DEFENSE JOINT TASK FORCE GUANTANAMO GUANTANAMO BAY, CI,IBA APO AE 09360 JTF-GTMO-CC 25 August2006 MEMORANDUM FOR Commander,United StatesSouthern Command, 3511 NW 9lst Avenue. Miami. FL33172 SUBJECT: Recommendationfor Continued Detention Under DoD Control (CD) for GuantanamoDetainee, ISN: US9SA-000230DP(S) JTF-GTMODetainee Assessment 1. (S/NF) PersonalInformation: o JDIMSAIDRC ReferenceName: Hamud Dakhil Hamud o Aliases and Current/True Name: Talut al-Jeddawi. Humud Dakhil Humud Said al-Jadani.Hamud Sultan.Nag Mohammad. Safwan the Afghan o Placeof Birth: Jeddah.Saudi Arabia (SA) o Dateof Birth: 22May 1973 o Citizenship: SaudiArabia o InternmentSerial Number (ISN): US9SA-000230DP 2. (FOUO) Health: Detaineeis in goodhealth. 3. (S//NF) JTF-GTMOAssessment: a. (S) Recommendation: JTF-GTMOrecommends this detaineefor Continued DetentionUnder DoD Control(CD). JTF-GTMOpreviously assessed detainee as Continued DetentionUnder DoD Control(CD) on 5 September2005. b. (S/NF) Executive Summary: Detaineeis assessedto be a memberof al-Qaidawith an extensivehistory of militantjihad. Detaineeis an admittedleader of armedfighters in ToraBora duringhostilities against US forcesand associated with severalsenior al-Qaida members.He receivedbasic and advanced training in Chechnyaand Afghanistan (AF) CLASSIFIEDBY: MULTIPLESOURCES REASON:E.O. 12958 SECTION 1.5(C) DECLASSIFYON: 203108 1 I S E C RE T // NOFORNI I 20310825 S E C R E T // NOFORNI I 20310825 JTF-GTMO-CC SUBJECT:Recommendation for ContinuedDetention Under DoD Control(CD) for GuantanamoDetainee, ISN: US9SA-000230DP (S) includingtraining on smallarns, explosives,mortars, and anti-aircraft weaponry. JTF- GTMO determinedthis detaineeto be: o A HIGH risk, as he is likely to posea threatto the US, its interestsand allies.
    [Show full text]
  • Wikileaks.Org
    U.S. Intelligence planned to destroy WikiLeaks WikiLeaks release: March 15, 2010 keywords: WikiLeaks, U.S. intelligence, U.S. Army, National Ground Intelligence Center, NGIC, classified, SE- CRET, NOFORN restraint: Classified SECRET/NOFORN (US) title: Wikileaks.org - An Online Reference to Foreign Intelligence Services, Insurgents, Or Terrorist Groups? date: March 18, 2008 group: United States Army Counterintelligence Center, Cyber Counterintelligence Assessments Branch; De- partment of Defence Intelligence Analysis Program author: Michael D. Horvath link: http://wikileaks.org/file/us-intel-wikileaks.pdf pages: 32 Description By Julian Assange ([email protected]) This document is a classifed (SECRET/NOFORN) 32 page U.S. counterintelligence investigation into WikiLeaks. “The possibility that current employees or moles within DoD or elsewhere in the U.S. government are providing sensitive or classified information to Wikileaks.org cannot be ruled out”. It concocts a plan to fatally marginalize the organization. Since WikiLeaks uses “trust as a center of gravity by protecting the anonymity and identity of the insiders, leakers or whisteblowers”, the report recommends “The identification, exposure, termination of employment, criminal prosecution, legal action against current or former insiders, leakers, or whistlblowers could potentially damage or destroy this center of gravity and deter others considering similar actions from using the Wikileaks.org Web site”. [As two years have passed since the date of the report, with no WikiLeaks’ source exposed, it appears that this plan was ineffective]. As an odd justificaton for the plan, the report claims that “Several foreign countries including China, Israel, North Kora, Russia, Vietnam, and Zimbabwe have denounced or blocked access to the Wikileaks.org website”.
    [Show full text]
  • Asia Pacific Bulletin | August 2, 2010 War Effort
    Asia Pacific Bulletin Number 65 | August 2, 2010 WikiLeaks Intensifies Afghanistan Debate BY GAUTAM ADHIKARI On the face of it, they are not particularly revealing documents. The over 90,000 classified U.S. military papers released by WikiLeaks are apparently intended to unveil what was unknown about the conduct of the war in Afghanistan. To those who have followed that war closely, there is not much that is strikingly new in the revelations. Nevertheless, the exposé is significant on at least two counts. First, within hours of their publication they have begun to strengthen anti-war Gautam Adhikari, FICCI-EWC sentiment, both among those who were against the war from the start, as well as those who were watching and waiting, and growing increasingly skeptical of a costly Visiting Fellow at the East-West exercise in a faraway wilderness that was taking more and more American lives, with Center in Washington, explains no winning outcome in sight. Such sentiments abound on the left and the right of the that “The over 90,000 political spectrum, and which are also gaining strength on Capitol Hill. And, frankly, classified U.S. military papers one cannot be certain exactly where President Obama stands on this issue. released by WikiLeaks are One could go by what his press secretary, Robert Gibbs, said the day after the papers apparently intended to unveil were published: “We are in this region because of what happened on 9/11.” The what was unknown about the United States, said Gibbs, wanted to “ensure that there is not a safe haven in Afghanistan by which attacks against this country and countries around the world can conduct of the war in be planned.” But, given the changing political climate, will President Obama and his Afghanistan.
    [Show full text]
  • JTF-GTMO Detainee Assessment
    S E C R E T // NOFORNI I 20320415 DEPARTMENTOF DEFENSE HEADQUARTERS,JOINT TASK FORCEGUANTANAMO U.S. NAVAL STATION,GUANTANAMO BAY, CUBA APO AE 09360 JTF-GTMO-CDR i5 Apri12007 MEMORANDUM FOR Commander,United StatesSouthem Command, 3511 NW 91stAvenue, Miami,FL33172 SUBJECT: Recommendationfor ContinuedDetention Under DoD Control (CD) for GuantanamoDetainee, ISN US9SA-000053DP(S) JTF-GTMO DetaineeAssessment l. (S//NF) Personal Information: o JDIMSA{DRC ReferenceName: Saud D Dakhil Allah o Aliases and CurrentlTrue Name: SaudDakhilallah al- Jihni. SaudDakhil Allah Muslih al-Mahayawi. Abu Shakir. SaudDakheel al-Hareth. Abu al-Harith al- Jadawi.Jaafar al-Ta'efi. Shakr o Placeof Birth: Jeddah.Saudi Arabia (SA) o Dateof Birth: 21 Aueust 1976 . Citizenship: Saudi Arabia o IntemmentSerial Number (ISN): US9SA-000053DP ) (U//FOUO) Health: Detaineeis in good health. 3. (U) JTF-GTMO Assessment: a. (S) Recommendation: JTF-GTMO recommendsthis detaineefor ContinuedDetention Under DoD Control (CD). JTF-GTMO previouslyassessed detainee as ContinuedDetention Under DoD Control (CD) with Transfer Languageon 27 February 2006. b. (S//NF) Executive Summary: Detaineeis a memberof al-Qaidawho was activein Kandahar and engagedUS and Coalition forces in combat action at Tora Bora, Afghanistan (Af'). Detaineepossibly arrangedtravel for mujahideenfor personalvisits to UBL. A1- Qaidadocuments included detainee's name and aliasesamong lists of al-Qaidaoperatives. Detaineeis associatedwith al-Qaida members,including IIBL bodyguards. The Saudi CLASSIFIEDBY: MULTIPLESOURCES REASON:E.O. 12958, AS AMENDED, SECTION 1.4(C) DECLASSIFYON: 20320415 S E C RE T //NOFORN I I 20320415 S E C RE T // NOFORN I I 20320415 JTF-GTMO-CDR SUBJECT: Recommendationfor Continued Detention Under DoD Control (CD) for GuantanamoDetainee, ISN US9SA-000053DP(S) Ministry of Interior, GeneralDirectorate of Investigations(Mabahith) identified detaineeas a high priority target who has been watchlisted for his travel to Chechnyaand jihadist activities in Ethiopia.
    [Show full text]
  • Macron Leaks” Operation: a Post-Mortem
    Atlantic Council The “Macron Leaks” Operation: A Post-Mortem Jean-Baptiste Jeangène Vilmer The “Macron Leaks” Operation: A Post-Mortem Jean-Baptiste Jeangène Vilmer ISBN-13: 978-1-61977-588-6 This report is written and published in accordance with the Atlantic Council Policy on Intellectual Indepen- dence. The author is solely responsible for its analysis and recommendations. The Atlantic Council and its donors do not determine, nor do they necessarily endorse or advocate for, any of this report’s conclusions. June 2019 Contents Acknowledgments iv Abstract v Introduction 1 I- WHAT HAPPENED 4 1. The Disinformation Campaign 4 a) By the Kremlin media 4 b) By the American alt-right 6 2. The Aperitif: #MacronGate 9 3. The Hack 10 4. The Leak 11 5. In Summary, a Classic “Hack and Leak” Information Operation 14 6. Epilogue: One and Two Years Later 15 II- WHO DID IT? 17 1. The Disinformation Campaign 17 2. The Hack 18 3. The Leak 21 4. Conclusion: a combination of Russian intelligence and American alt-right 23 III- WHY DID IT FAIL AND WHAT LESSONS CAN BE LEARNED? 26 1. Structural Reasons 26 2. Luck 28 3. Anticipation 29 Lesson 1: Learn from others 29 Lesson 2: Use the right administrative tools 31 Lesson 3: Raise awareness 32 Lesson 4: Show resolve and determination 32 Lesson 5: Take (technical) precautions 33 Lesson 6: Put pressure on digital platforms 33 4. Reaction 34 Lesson 7: Make all hacking attempts public 34 Lesson 8: Gain control over the leaked information 34 Lesson 9: Stay focused and strike back 35 Lesson 10: Use humor 35 Lesson 11: Alert law enforcement 36 Lesson 12: Undermine propaganda outlets 36 Lesson 13: Trivialize the leaked content 37 Lesson 14: Compartmentalize communication 37 Lesson 15: Call on the media to behave responsibly 37 5.
    [Show full text]
  • Cia-Wikileaks-Task-Force.Pdf
    TOP SECRET//HCS-O-P/SI//ORCON/NOFORN/FISA 17 October 2017 WikiLeaks Task Force Final Report TOP SECRET//HCS-O-P/SI//ORCON/NOFORN/FISA 17 October 2017 Memo To: Director, Central Intelligence Agency Deputy Director, Central Intelligence Agency Chief Operating Officer, Central Intelligence Agency From: WikiLeaks Task Force, Subject: WikiLeaks Task Force Final Report Executive Summary WikiLeaks’ announcement on 7 March that it possessed cyber tools from CIA’s Center for Cyber Intelligence (CCI), dubbed “Vault 7,” marked the largest data loss in CIA history. In its initial public disclosure, WikiLeaks provided the names and brief descriptions of multiple tools that CIA developed for cyber operations. Since 7 March, WikiLeaks has published more comprehensive descriptions of 35 tools, including internal CIA documents associated with each tool. — We assess that in spring 2016 a CIA employee stole at least 180 gigabytes to as much as 34 terabytes of information. This is roughly equivalent to 11.6 million to 2.2 billion pages in Microsoft Word. This data loss includes cyber tools that resided on the Center for Cyber Intelligence (CCI) software development network (DevLAN). We cannot determine the precise scope of the loss because, like other mission systemsa at that time, DevLAN did not require user activity monitoring or other safeguards that exist on our enterprise system. — — To date, WikiLeaks has released user and training guides and limited source code from two parts of DevLAN: Stash, a source code repository, and Confluence, a collaboration and communication platform. All of the documents reveal, to varying degrees, CIA’s tradecraft in cyber operations.
    [Show full text]