Posts tagged ‘terrorism’
by Davi D’Agostino, Greg Wilshusen
Paperback, 79 pages, 2011, $25.00
The DoD is in the midst of a global cyberspace crisis as foreign nation states and other actors, such as hackers, criminals, terrorists, and activists exploit DoD and other U.S. government computer networks to further a variety of national, ideological, and personal objectives.
This report identifies: (1) how DoD is organized to address cybersecurity threats; and assesses the extent to which DoD has: (2) developed joint doctrine that addresses cyberspace oeprations; (3) assigned command and control responsibilities; and (4) identified and taken actions to mitigate any key capability gaps involving cyberspace operations.
It is an unclassified version of a previously issued classified report. Charts and tables. This is a print on demand report.
by Gregory C. Wilshusen
Paperback, 16 pages, 2011, $15.00
Discusses the cyber threats to critical infrastructure and the American economy. Pervasive and sustained cyber attacks against the U.S. continue to pose a potentially devastating impact on federal and non-federal systems and operations. In Feb. 2011, the Director of National Intelligence testified that, in the past year, there had been a dramatic increase in malicious cyber activity targeting U.S. computers and networks, including a more than tripling of the volume of malicious software since 2009. This testimony describes: (1) cyber threats to cyber-reliant critical infrastructures and federal information systems; and (2) the continuing challenges federal agencies face in protecting the nation’s cyber-reliant critical infrastructures and federal systems. A print on demand report.
Security of Air Cargo During Ground Transportation [Redacted]
by Richard L. Skinner
Paperback, 34 pages, 2009, $20.00
“This report addresses the effectiveness of the Transport. Security Admin’s. (TSA) efforts to secure air cargo while it is handled or transported on the ground, prior to being shipped on passenger aircraft. Conclusions: Personnel were accessing, handling, or transporting air cargo without the required background checks or training. Also, 23% of drivers did not satisfy the required training and testing requirements. Automated tools to assist inspectors in analyzing results and focusing on high-risk areas in air cargo security were not adequate. As a result, air cargo is vulnerable to the introduction of explosives and other destructive items before it is loaded onto planes. The report makes six recommendations to strengthen the security of air cargo during ground transportation.”
Saudi Arabia: Background and U.S. Relations
by Christopher M. Blanchard
Paperback, 51 pages, 2009, $30.00
Contents: (I) Recent Developments; (II) Background: Saudi Arabia’s Political Development; Saudi-U.S. Relations, 1931-2001; September 11, 2001, and its Aftermath; The 9/11 Commission Report; Saudi Responses; Recent Assessments; Terrorist Financing Concerns; Toward a New Relationship?; New Bilateral Agreements;
(III) Recent Congressional Interest in Saudi Arabia: U.S. Foreign Assistance to Saudi Arabia and Congressional Prohibitions; International Military Education and Training (IMET); Counterterrorism Assistance; Prohibitions on Foreign Assistance; FY2010 Appropriations Debate; U.S. Arms Sales to Saudi Arabia; Background; Criticism and Action in the 110th Congress; BAE Corruption Inquiry;
(IV) Current Issues in U.S.-Saudi Relations; U.S.-Saudi Military Cooperation: U.S. Military Training Mission in Saudi Arabia (USMTM); Saudi Arabian National Guard Modernization Program (PM-SANG); Office of Program Mgt. Ministry of Interior – Facilities Security Forces (OPM MOI-FSF); Counterterrorism; Al Qaeda in the Arabian Peninsula; Combating Extremism; The Arab-Israeli Conflict; Saudi-Palestinian Relations; Saudi Peace Proposals; Iraq;Saudi Policy Priorities in Iraq; Saudi-Iraqi Diplomatic and Economic Relations; Economic Relations and Trade; U.S.-Saudi Trade; U.S. Oil Imports and Saudi Policy; U.S.-Saudi Foreign Direct Investment; Saudi Boycott of Israel and WTO Membership; Human Rights, Religious Freedom, and Political Reform; Political Reform Debates and Elections; Leadership and Succession; Social Reform Debates and Recent Leadership Changes; Human Rights; Religious Freedom; Consular Issues;
(V) Further Reading and Historical Resources; Appendix A. Recent Proposed Arms Sales; Appendix B. Text of Saudi Peace Initiatives. Figures.
Constraints Imposed by Laws on Torture
by Michael John Garcia
Paperback, 24 pages, 2009, $20.00
Persons suspected of criminal or terrorist activity may be transferred from one State (i.e., country) to another for arrest, detention, and/or interrogation. Commonly, this is done through extradition, by which one State surrenders a person within its jurisdiction to a requesting State via a formal legal process, typically established by treaty.
Far less often, such transfers are effectuated through a process known as “extraordinary rendition” or “irregular rendition.” These terms have often been used to refer to the extrajudicial transfer of a person from one State to another. Although the particularities regarding the usage of extraordinary renditions and the legal authority behind such renditions are not publicly available, various U.S. officials have acknowledged the practice’s existence.
During the Bush Admin., there was some controversy as to the usage of renditions by the U.S., particularly with regard to the alleged transfer of suspected terrorists to countries known to employ harsh interrogation techniques that may rise to the level of torture, purportedly with the knowledge or acquiescence of the U.S.
This report discusses relevant international and domestic law restricting the transfer of persons to foreign states for the purpose of torture. The U.N. Convention against Torture and Other Cruel, Inhuman, or Degrading Treatment or Punishment (CAT), and its domestic implementing legislation (the Foreign Affairs Reform and Restructuring Act of 1998) impose the primary legal restrictions on the transfer of persons to countries where they would face torture.
Both CAT and U.S. implementing legislation generally prohibit the rendition of persons to countries in most cases where they would more likely than not be tortured, though there are arguably limited exceptions to this prohibition. Under U.S. regulations implementing CAT, a person may be transferred to a country that provides credible assurances that the rendered person will not be tortured.
Neither CAT nor its implementing legislation prohibit the rendition of persons to countries where they would be subject to harsh treatment not rising to the level oftorture. Besides CAT, additional obligations may be imposed upon U.S. rendition practice via the Geneva Conventions, the War Crimes Act (as amended by the Military Commissions Act (P.L. 109-366)), the International Covenant on Civil and Political Rights (ICCPR), and the Universal Declaration on Human Rights.
Questioning Supreme Court Nominees About Their Views on Legal or Constitutional Issues: A Recurring Issue (ISBN: 9781437935899)
By Denis Steven Rutkus
(Paperback, 25 pages, 2010, $20.00)
Contents of this report: (I) The Rise of Islamist Militancy in Southeast Asia: Overview; The Rise of Al Qaeda in Southeast Asia; (II) The Jemaah Islamiyah Network: History of Jemaah Islamiyah; Jemaah Islamiyah’s Relationship to Al Qaeda; Jemaah Islamiyah’s Size and Structure; Major Plots; (III) Indonesia: Recent Events; Background; The Bali Bombings and Other JI attacks in Indonesia; The Trial and Release of Baasyir; U.S.-Indonesia Cooperation; (IV) The Philippines: Abu Sayyaf; The MILF; The Philippine Communist Party (CPP); U.S. Support for Philippine Military Operations; (V) Thailand: Southern Insurgency; Approaches of Recent Governments; Current Government’s Approach; Little Evidence of Transnational Elements; Leadership of Insurgency Unclear; U.S.-Thai Cooperation; (VI) Malaysia: Recent Events; A Muslim Voice of Moderation; Maritime Concerns; Terrorism and Counter-Terrorism in Malaysia; Terrorist Groups in Malaysia; Malaysia’s Counter-Terrorism Efforts and Their Critics; U.S.-Malaysia Counter-Terrorism Cooperation; (VII) Singapore: U.S.-Singapore Cooperation; Enhanced Homeland Security. Maps.
New Government Report: Cybersecurity: Continued Attention is Needed to Protect Federal Information Systems from Evolving Threats: Congressional Testimony (ISBN: 9781437935073)
Cybersecurity: Continued Attention is Needed to Protect Federal Information Systems from Evolving Threats: Congressional Testimony (ISBN: 9781437935073)
By Gregory C. Wilshusen
(Paperback, 15 pages, 2010, $15)
Pervasive and sustained cyber attacks continue to pose a potentially devastating threat to the systems and operations of the federal government. Many nation states, terrorist networks, and organized criminal groups have the capability to target elements of the U.S. information infrastructure for intelligence collection, intellectual property theft, or disruption. The dependence of federal agencies on information systems to carry out essential, everyday operations can make them vulnerable to an array of cyber-based risks.
This statement describes: (1) cyber threats to federal information systems and cyber-based critical infrastructures; (2) control deficiencies that make federal systems vulnerable to those threats; and (3) opportunities that exist for improving federal cybersecurity.