Anwar Awlaki is the Imam at Dar Al-Hijrah in Falls Church, Va, which is one of the largest Islamic Centers in the United States. He is currently working on his PhD in Human Resource Development at George Washington University, received a Master of Education Leadership from San Diego state University and his BS in Civil Engineering from Colorado State University. He completed Islamic Studies in Yemen. He has been doing extensive public speaking on the above topics, especially since the events on September 11. Mr. Nihad Awad, President of the Counsel of American-Islamic Relations has also expressed interest in attending. Mr. Amr Moussa, the Secretary General of the Arab League, will be in D.C. on February 4th and 5th, although I don’t think that our luncheon will have the clout to get his attendance!
If I told you that while the United States is engaged in a costly war against illegal drugs and the vicious cartels that traffic them, U.S. banks are willfully flouting U.S. and Mexican laws and helping these cartels launder their money , would you believe me? For decades the U.S. has served as a safe haven for the ill-gotten finances of corrupt foreign leaders and their ilk. Former foreign government ministers, military leaders, and corrupt heads of state have mansions, businesses, and bank accounts here. The banks who facilitate much of these activities are required by law to conduct “due diligence” in determining the source of funds for these “politically exposed persons,” but compliance is spotty.
Consular Affairs has developed a highly penetrative security ink to be used exclusively for cancelling nonimmigrant visas. This unique formulation, designated security ink #297, is specially designed to penetrate TESLIN, the synthetic material used as the basis of visa foils issued since late 1993 until the recent introduction of the Lincoln Visa. The ink finally selected was chosen after extensive laboratory testing undertaken by both the U.S. Secret Service and INS/FDL. Up to now, there existed no genuinely effective means for cancelling a visa permanently short of destructive methods that risked damaging the underlying passport page. To remedy this, CA commissioned the manufacture of two types of visa cancellation stamps in conjunction with the new security ink, and they are being distributed to visa issuing posts worldwide.
Direct Overt U.S. Aid and Military Reimbursements to Pakistan, FY2002-FY2012, prepared for the Congressional Research Service by K. Alan Kronstadt, Specialist in South Asian Affairs.
These photos range in date from April 2008 to May 2011 and depict a number of activities related to the Vigilant Guard exercises conducted each year. Previous versions of the exercise have involved riot control operations aimed at dispelling…
Israel’s military attaché in Moscow was arrested and expelled earlier this week, it was revealed on Wednesday, with sources saying that the top Israel Defense Forces officer was questioned over espionage suspicions. Colonel Vadim Leiderman was arrested during a May 12 meeting in a restaurant, in what appeared to be a violation of his diplomatic immunity. He was then questioned for a few hours, released, and subsequently deported. Leiderman, who was born in the Soviet Union, has a doctorate in engineering from the Technion – Israel Institute of Technology, Haifa. He was a member of the Israel Air Force (IAF) technical corps, and spent some years working for the IAF in America.
(U//FOUO) DHS Identifying Clandestine Biological, Chemical, Explosives, and Methamphetamine Laboratories
The purpose of this assessment is to assist members of the law enforcement and public safety communities in differentiating among four types of clandestine laboratories: biological, chemical, explosives, and methamphetamine. It provides descriptions, distinguishing features, and hazards of each type of laboratory and includes four reference guides for distribution to public safety personnel. This assessment expands on a related product—Distinguishing a Biological Agent Production Laboratory from a Methamphetamine Laboratory, Lawrence Livermore National Laboratory, 22 January 2008—by including indicators and warning signs associated with clandestine chemical and explosives laboratories.
Former NSA Mathematician Says He Believes the Agency Stores Copies of All Emails Transmitted in America
Binney, for his part, believes that the agency now stores copies of all e-mails transmitted in America, in case the government wants to retrieve the details later. In the past few years, the N.S.A. has built enormous electronic-storage facilities in Texas and Utah. Binney says that an N.S.A. e-mail database can be searched with “dictionary selection,” in the manner of Google. After 9/11, he says, “General Hayden reassured everyone that the N.S.A. didn’t put out dragnets, and that was true. It had no need—it was getting every fish in the sea.”
The US has given the broadest hint yet that a cyber-attack on one Nato country will be regarded as an attack on all. It is a potentially dangerous development, as cyber-attacks are increasingly common, with the Pentagon reporting millions of probes a day and actions by more than 100 foreign intelligence agencies. In 2007, Estonia was almost crippled by a cyber-attack thought to originate in Russia. At the time, Estonia, a member of Nato, said it did not know if the alliance covered cyber-attacks, and the US, Britain and others danced round the issue. The development is contained in a report by the Obama administration, International Strategy for Cyberspace, in which the US for the first time sets out a strategy for dealing with the expansion of the internet and what it describes as “arbitrary and malicious disruption”. It notes the growing threats by individual hackers, companies and hostile states, and offers broad proposals on how to tackle these.
Digital infrastructure is increasingly the backbone of prosperous economies, vigorous research communities, strong militaries, transparent governments, and free societies. As never before, information technology is fostering transnational dialogue and facilitating the global flow of goods and services. These social and trade links have become indispensable to our daily lives. Critical life-sustaining infrastructures that deliver electricity and water, control air traffic, and support our financial system all depend on networked information systems. Governments are now able to streamline the provision of essential services through eGovernment initiatives. Social and political movements rely on the Internet to enable new and more expansive forms of organization and action. The reach of networked technology is pervasive and global. For all nations, the underlying digital infrastructure is or will soon become a national asset.
To consider terrorist threat indicators in relationship to chemical storage facilities, it is useful to understand the basic structure of the industry and what general types of facilities might be attractive targets for terrorist attack. Chemical storage facilities are attractive terrorist targets because they can contain toxic and hazardous materials, can create extensive casualties and property damage, and can be a source of materials for use in other attacks. Figure 1 shows some of the potential terrorist targeting objectives.
The United States (U.S.) has two types of pipelines that transport petroleum: those that carry crude oil and those that carry refined petroleum products, such as gasoline, diesel fuel, jet fuel, and home heating oil. Pipelines transport more than two-thirds of all crude oil and refined products in the U.S. Other transportation modes are water, which includes ocean tankers and barges and accounts for 28% of petroleum transportation; tanker trucks, which account for 3% of petroleum transportation; and railroads, which account for 2% of petroleum transportation. The U.S. has more than 200,000 miles of petroleum pipelines.
Highway tunnels are enclosed passageways for road vehicles to travel through or under an obstruction, such as a city, mountain, river, or harbor. Tunnels may have one or more “tubes,” and some are also equipped with rail lines for trains. Highway tunnels are generally classified with regard to their method of construction: bored, cut and cover, or submerged. Tunnels through hard rock formations are usually bored (i.e., drilled) and finished to facilitate vehicular traffic. Very large boring machines are often used to cut the tunnel tubes through the hard rock formation.
Though horrified by those alleged crimes, the French press and political elite on Monday seemed perhaps more scandalized still by the images of Mr. Strauss-Kahn’s brusque treatment by the New York police, and his exposure in the American media. “I found that image to be incredibly brutal, violent and cruel,” the former justice minister Elisabeth Guigou told France-Info radio on Monday, referring to widely published photographs of a beleaguered-looking Mr. Strauss-Kahn, handcuffed and led by several New York police officers. “I am happy that we do not have the same judicial system.” As justice minister, Ms. Guigou, now a parliamentarian, oversaw the passage of a law prohibiting the publication of photographs of handcuffed criminal suspects.
The defendant engaged in oral sexual conduct and anal sexual conduct with another person by forcible compulsion; the defendant attempted to engage in sexual intercourse with another person by forcible compulsion; the defendant subjected another person to sexual contact by forcible compulsion; the defendant restrained another person; the defendant subjected another person to sexual contact without the latter’s consent; and in that the defendant intentionally, and for no legitimate purpose, forcibly touched the sexual and other intimate parts of another person for the purpose of degrading and abusing such person, and for the purpose of gratifying the defendant’s sexual desire.
The Technical Support Working Group’s Chemical, Biological, Radiological, and Nuclear Countermeasures (CBRNC) Subgroup, in cooperation with law enforcement and intelligence agencies, conducts comprehensive assessments of chemical and biological materials, devices, and countermeasures. As part of their efforts, they evaluated the potential effectiveness of production methods found in the form of recipes from open-source improvised production handbooks that may be used by extremists groups. They assessed the skill level required to follow the instructions and determined the availability of the necessary equipment and ingredients.
The federal government loses both individual and corporate income tax revenue from the shifting of profits and income into low-tax countries, often referred to as tax havens. The revenue losses from this tax avoidance and evasion are difficult to estimate, but some have suggested that the annual cost of offshore tax abuses may be around $100 billion per year. International tax avoidance can arise from large multinational corporations who shift profits into low-tax foreign subsidiaries or wealthy individual investors who set up secret bank accounts in tax haven countries.
The US state department said on Sunday that it was examining the legality of an American-led private army that is being established in the United Arab Emirates. Erik Prince, the founder of Blackwater private security company, is establishing a counter-terrorism force of up to 800 foreign mercenaries in Abu Dhabi, capital of the United Arab Emirates, The New York Times reported on Sunday. Mr Prince has been hired by Sheikh Mohammed bin Zayed Al-Nahyan, the crown prince of Abu Dhabi, to recruit an American-led force of mainly South American former soldiers, through a company called R2, with a view to countering a perceived threat from Iran and bolstering domestic security, the report said.
A refinery comprises upstream components, process units, downstream components, and product storage. There are four basic processes used in refineries to produce products. Distillation is used to separate hydrocarbons of similar boiling range into intermediate and final products. Chemical processes are used to change the structure of the hydrocarbons to give them different properties breaking them into smaller pieces or combining them into larger ones. Treating processes are used to remove impurities such as sulfur, and blending systems are used to combine intermediate products and additives into final products for sale.
Military units tasked to support civilian authorities during domestic disasters enable rapid and effective disaster relief operations that limit loss of life, mitigate suffering, and curtail further significant property damage. Lessons learned from recent disaster operations, however, highlight inefficiencies where DOD organizations interface with other local, state, and federal government agencies tasked with disaster relief operations. The challenge remains in integrating military and civil capabilities within a disaster stricken operating environment with little intact infrastructure while urgently and efficiently executing relief operations. Critical to effective disaster relief operations is the DOD ability to commence immediate tactical level relief operations nearly simultaneous to the occurring disaster.
The French political bigshot who heads the International Monetary Fund was arrested for allegedly sodomizing a Manhattan hotel maid today — getting hauled off an Air France flight just moments before takeoff from Kennedy Airport, police sources told The Post. Three Port Authority detectives pulled Dominique Strauss-Kahn from the plane’s first-class cabin just two minutes before it was due to depart for Paris, the sources said. Strauss-Kahn, 62, was turned over to NYPD officers from the Midtown South precinct, and the case is being investigated by the Special Victims Unit.
This Joint Intelligence Bulletin provides law enforcement and public and private sector officials with information for consideration in the wake of the death of Usama bin Ladin. This information is provided to support the activities of DHS and FBI and to help federal, state, and local government counterterrorism and law enforcement officials deter, prevent, preempt, or respond to terrorist attacks directed against the United States.
While hazardous and nonhazardous chemicals are stored and used in many industries, the focus of this report is specific to facilities that manufacture chemicals. A chemical manufacturing facility comprises upstream components, process units, downstream components, and product storage. The chemical manufacturing process can be further divided into the following five stages, each of which may contain one or more processing activities: (1) receipt of chemical ingredients, (2) temporarily staging or storing chemical ingredients awaiting use in production, (3) processing chemical ingredients into product, (4) temporarily staging or storing chemical products awaiting shipment, and (5) shipping chemical products.
The Obama administration is proposing comprehensive cybersecurity legislation that would clarify the government’s role in protecting the nation’s critical infrastructure and favor public/private cooperation over regulation. The proposal would give the Homeland Security Department oversight authority for the Federal Information Security Management Act, the primary framework for protecting civilian government IT systems, and establish a program to encourage owners and operators of critical infrastructure to implement cybersecurity. “The nation cannot fully defend against these threats unless portions of existing cybersecurity laws are updated,” a senior White House official said in a briefing today.