SECRET – FBI Finds “Minimal Correlation” Between Suicide Vests Used in Middle East and Europe

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

A collec

Images of suicide vests and belts from an FBI’s intelligence note released after the November 2013 .

An analysis of recent suicide bombings throughout the Middle East, Europe and Africa by the FBI Terrorism Explosive Device Analytical Center (TEDAC) that was released after the terrorist attacks in Paris, France last month states that “suicide vest and belt improvised explosive devices (IEDs) in the Middle Eastern, African, and European regions likely . . . have minimal correlation” and do not indicate tactical migration.

Following the attacks in Paris, which featured seven separate suicide bombings, media coverage has focused on the prominent use of suicide vests as indicative a tactical shift for the Islamic State of Iraq and the Levant (ISIL).  Though there are past examples of suicide attacks inside Europe, such as the 2005 London bombings, the use of suicide vests in the Paris attacks has been said to represent an entirely new type of threat, a tactic once relegated to the battlefields of Iraq and Syria now appearing in European cities.  However, an External Intelligence Note issued by TEDAC on November 17 titled “Suicide Vest and Belt Improvised Explosive Device Tactics in the Middle Eastern, African, and European Regions Show Minimal Signs of Tactic Migration” and obtained by Public Intelligence presents a different view, attributing the tactical similarities to factors such as “available materials, training, and local or national counter-IED policies.”

While TEDAC would normally assume that “similarities between suicide vests and belts from different regions likely indicate common training or common IED facilitators,” the intelligence note states that these similarities “may be a product of independent open source research, thus resulting in a false link between devices and subjects.”  Moreover, the similarities may “indicate tactic or construction influences” based on the nature of the devices and access to required materials.  Similarities can include everything from “overall IED construction, wiring techniques, common explosives, initiators, switches, electronic diagrams, enhancements, and employment.”

When broadly examined, the types of “suicide vests and belt IEDs observed in each region” covered in the intelligence note “differ broadly in many characteristics, resulting in an inconclusive determination that the suicide vest and belt IEDs prevalent in any one area translate to tactic migration.”

A study by the Institute of National Security Studies found that there were approximately 370 suicide bombings in the Middle East region in 2014 claiming the lives of over 2,700 victims.  Iraq, Yemen, Lebanon and Libya all saw a significant increase in the use of the tactic over the previous year.  Prior to the attacks in Paris, suicide bombings in Europe have been primarily limited to Turkey and Russia.

  Middle East Europe Africa
Common explosives used in suicide vests/belts triacetone triperoxide (TATP), trinitrotoluene (TNT), Semtex, C4, Research Development Formula X (RDX), and pentaerythritol tetranitrate (PETN) TNT and C4 RDX, Ammonium Nitrate, and Urea Nitrate

The intelligence note takes several quotes from an interview conducted by Der Spiegel with a captured ISIL leader named Abu Abdullah discussing the group’s target selection process and methods for constructing suicide vests.  He describes how he used “explosive fill removed from artillery shells for car bombs” and “drilled open the shells of anti-aircraft guns to construct suicide belts because he believed the effect of the powder was more intense.”  According to the interview, he would receive a potential bombers’ measurements in “advance from the leadership in order to be able to make a well-fitting belt” and “always had belts in different sizes prepared.”

Explosive vests in Yemen have also included similar design elements.  A suicide bomber tied to Al Qaeda in the Arabian Peninsula (AQAP) was killed in July 2015 by Houthi forces prior to detonating his vest, allowing for forensic analysis.  The device featured “dual grenade-pin detonators, a main charge wrapped with sheets of ball bearings, and detonation cord that was placed inside a pouch around the bomber’s waist.”

Similar to the Middle East, bombings in Turkey have often used either C4 or trinitrotoluene (TNT) in suicide vests.  Vests used in the Middle East often included other high-powered explosives such as Semtex or Research Development Formula X (RDX) or triacetone triperoxide (TATP), the explosive that was reportedly used in the vests detonated during the Paris attacks.

 

 

Secret Life Of Pets, Secret Service, Secret Garden, Secret World Legends, Secret Flying, Secret Life Of Bees, Secret Life Of Pets Cast, Secret Life Of The American Teenager, Secret Squirrel, Secret Shopper, Secret Agent Man, Secret Admirer, Secret Aardvark, Secret Agent, Secret Annex, Secret And Lies, Secret Agent Man Song, Secret App, Secret Asian Man, Secret Agent Man Lyrics, Secretbuilders, Secret Book, Secret Beach Kauai, Secret Beach, Secret Ballot, Secret Box, Secret Beach Maui, Secret Bay Dominica, Secret Base, Secret Band, Secret Circle, Secret Church, Secret Caverns, Secret Classroom Superpowers, Secret Codes, Secret Clinical Strength, Secret Clearance, Secret Circle Cast, Secret Conversations Facebook, Secret Cameras, Secret Deodorant, Secret Definition, Secret Diary Of A Call Girl, Secret Door, Secret Deodorant Coupons, Secret Diary, Secret Deodorant Commercial, Secret Decoder Ring, Secret Daughter, Secret Door Lyrics, Secret Empire, Secret Extensions, Secret Escapes, Secret Empire #1, Secret Empire Reading Order, Secret Entourage, Secret Empire #0, Secret Empire #2, Secret Eaters, Secret Emoji, Secret Flying, Secret Forest, Secret Forest Ep 11, Secret Falls Kauai, Secret Flask, Secret Formula, Secret Facebook Group, Secret Frappuccino, Secret For The Mad Lyrics, Secret Falls, Secret Garden, Secret Garden Song, Secret Garden Movie, Secret Garden Cafe, Secret Garden Musical, Secret Garden Lyrics, Secret Garden Denver, Secret Garden Book, Secret Google Games, Secret Garden Miami, Secret Hitler Rules, Secret Hitler Game, Secret History Of Twin Peaks, Secret Hitler Online, Secret Hair Extensions, Secret Handshake, Secret History, Secret Hotel Deals, Secret Heart, Secret Hiding Places, Secret In Their Eyes, Secret In Spanish, Secret Ingredient, Secret Island, Secret In Their Eyes Cast, Secret Invasion, Secret In N Out Menu, Secret Invisible Solid, Secret Island In Texas, Secret In French, Secret Jardin, Secret Jewels, Secret Journal, Secret Jobs, Secret Jamaica, Secret Jieun, Secret Jardin Lodge, Secret Journey Police, Secret Journey To Planet Serpo, Secret Jardin Dr90, Secret Kpop, Secret Keeper Girl, Secret Keeper, Secret Key, Secret Korean Drama, Secret Knock, Secret Knowledge, Secret Krabby Patty Formula, Secret Key Starting Treatment Essence, Secret Kingdom, Secret Life Of Pets, Secret Life Of Bees, Secret Life Of Pets Cast, Secret Life Of The American Teenager, Secret Love Song, Secret Life Of Walter Mitty, Secret Lab Chair, Secret Life Of An American Teenager Cast, Secret Language, Secret Life Of Pets Imdb, Secret Menu, Secret Menu Items, Secret Mage, Secret Menu Starbucks, Secret Menu In N Out, Secret Messages, Secret Meaning, Secret Movie, Secret Mountain Fort Awesome, Secret Mage Deck, Secret Nails, Secret Nyc, Secret Netflix, Secret Nail Salon, Secret Names, Secret Netflix Codes, Secret Numbers, Secret News, Secret Nature From Jeju Peeling Gel, Secret Nation, Secret Of Mana, Secret Of Nimh, Secret Of The Snowy Peaks, Secret Of The Cedars, Secret Of Kells, Secret Of Evermore, Secret Of The Wings, Secret Of Moonacre, Secret Of Mana Rom, Secret Of Mana 2, Secret Pizza, Secret Police, Secret Project Robot, Secret Place, Secret Passion Fruit, Secret Power, Secret Passages, Secret Pizza Party, Secret Paladin, Secret Place Lyrics, Secret Quotes, Secret Question, Secret Quest, Secret Questions To Ask, Secret Questions To Ask Siri, Secret Quests Ffxv, Secret Quests Skyrim, Secret Qr Codes, Secret Questions To Ask Alexa, Secret Quote Spongebob, Secret Romance, Secret Resorts, Secret Recipe, Secret Rooms, Secret Rare Pokemon Cards, Secret Rainbow Hair, Secret Rare Ultra Ball, Secret Rendezvous, Secret Relationship, Secret Roku Channels, Secret Service, Secret Squirrel, Secret Shopper, Secret Societies, Secret Synonym, Secret Starbucks Menu, Secret Service Jobs, Secret Sandwich Society, Secret Sisters, Secret Shopper Jobs, Secret Treasures, Secret Treasures Sleepwear, Secret Tunnel, Secret Things, Secret Tunnel Song, Secret The Pierces, Secret Thesaurus, Secret Travel, Secret Treasures Bra, Secret To Success, Secret Underground Cities, Secret Us Weapons, Secret Underground Bases, Secret Universe Of Names, Secret Underground, Secret Underground Medicine, Secret Upgrades Office Space, Secret Us Bases, Secret Us Military Bases, Secret Unscented, Secret Variety Training, Secret Village Of The Spellcasters, Secret Video Recorder, Secret Variety Training Ep 2, Secret Vault, Secret Vault 81, Secret Veneers, Secret Voice Recorder, Secret Video, Secret Volume, Secret World Legends, Secret Window, Secret Wood, Secret Wars, Secret Wood Rings, Secret World Legends Release Date, Secret World Of Arrietty, Secret Weapon, Secret Wars 2015, Secret Warriors, Secret X Folder, Secret Xtians, Secret Xscape, Secret X Folder Comic, Secret X, Secret Xbox One Gamerpics, Secret Xtend, Secret Xbox One Games, Secret Xbox One Codes, Secret X Folder Webtoon, Secret Youtube, Secret Yeahu, Secret Yellowstone, Secret Young Justice, Secret Youtube Videos, Secret Yosemite, Secret Youtube Tricks, Secret Youtube Website, Secret Yumiverse, Secret Yosemite Spots, Secret Zoo Series, Secret Zoo, Secret Zoo Book, Secret Zinger, Secret Zombies Calling Card, Secret Zodiac Sign, Secret Zion Hikes, Secret Zone, Secret Zombies Challenge Infinite Warfare, Secret Zombie Challenge, Suicide Squad, Suicide Hotline, Suicide Squad 2, Suicide Squad Cast, Suicide Boys, Suicide Quotes, Suicide Forest, Suicide Doors, Suicide Squad Full Movie, Suicide Squad Joker, Suicide Awareness, Suicide Awareness Month, Suicide Awareness Ribbon, Suicide Attempt, Suicide Ann Arbor, Suicide Assessment, Suicide Awareness Day, Suicide Squad, Suicide Articles, Suicide Art, Suicide Boys, Suicide Bridge, Suicide By Cop, Suicide Bomber, Suicide Boys Merch, Suicide Boys Tour, Suicide Bunny, Suicide Boys Lyrics, Suicide Blonde, Suicide Band, Suicide Chat, Suicide Club, Suicide Contagion, Suicide Chat Line, Suicide Clutch, Suicide Challenge, Suicide Cluster, Suicide Caught On Tape, Suicide Cult, Suicide Causes, Suicide Doors, Suicide Definition, Suicide Disease, Suicide Drawings, Suicide Duck, Suicide Drink, Suicide Detroit, Suicide Documentary, Suicide Door Kit, Suicide Depression, Suicide Exercise, Suicide Emoji, Suicide Epidemic, Suicide Essay, Suicide Encouragement, Suicide Etymology, Suicide Effects, Suicide Evo, Suicide Education, Suicide Edits, Suicide Forest, Suicide Facts, Suicide Forest Movie, Suicide Facebook Live, Suicide Forum, Suicide Forest Stories, Suicide From Bullying, Suicide Forest Bodies, Suicide Facts 2017, Suicide For Dummies, Suicide Gif, Suicide Games, Suicide Grip, Suicide Grosse Pointe South, Suicide Gun, Suicide Golden Gate Bridge, Suicide Groups, Suicide Grip Bench, Suicide Grosse Pointe, Suicide Girls Blackheart Burlesque, Suicide Hotline, Suicide Hotline Text, Suicide Helpline, Suicide Hotline Michigan, Suicide Hotline Chat, Suicide Hotline Song, Suicide Help Chat, Suicide Handle, Suicide Howell Mi, Suicide Helmet, Suicide Is Painless, Suicide Is Badass, Suicide Ideation, Suicide In The Bible, Suicide Is Painless Lyrics, Suicide In Michigan, Suicide In Spanish, Suicide In Detroit, Suicide In Japanese, Suicide Is Not Selfish, Suicide Jokes, Suicide Jump, Suicide Jumpers, Suicide Jack, Suicide James, Suicide Joker, Suicide Jockey, Suicide Japan, Suicide Japanese, Suicide Jump Liveleak, Suicide Kings, Suicide Knob, Suicide King Card, Suicide Kings Cast, Suicide Kale, Suicide King Isaac, Suicide Kid Meme, Suicide Kermit, Suicide King Tattoo, Suicide Krannert, Suicide Letters, Suicide Lyrics, Suicide Line, Suicide Lane, Suicide Lifeline, Suicide Liveleak, Suicide Live, Suicide Lansing Mi, Suicide Life Insurance, Suicide Live Stream, Suicide Machines, Suicide Meme, Suicide Mouse, Suicide Movies, Suicide Meaning, Suicide Michigan, Suicide Machines Tour, Suicide Mission, Suicide Mickey, Suicide Mission Mass Effect 2, Suicide Notes, Suicide Number, Suicide Notes Book, Suicide News, Suicide Notes From Beautiful Girls, Suicide Nets, Suicide Northville, Suicide Note Poem, Suicide Note Lyrics, Suicide Netflix, Suicide On Facebook Live, Suicide On Camera, Suicide Online Chat, Suicide On Live Tv, Suicide On Video, Suicide On Facebook, Suicide Off Egg Rock Analysis, Suicide On Fb Live, Suicide Ocd, Suicide Organizations, Suicide Prevention, Suicide Poems, Suicide Prevention Month, Suicide Pact, Suicide Prevention Quotes, Suicide Plant, Suicide Prevention Chat, Suicide Pics, Suicide Prevention Ribbon, Suicide Pit Lyrics, Suicide Quotes, Suicide Quiz, Suicide Questions, Suicide Quotes Tumblr, Suicide Quotes Sad, Suicide Squad, Suicide Questionnaire, Suicide Quotes Images, Suicide Queen, Suicide Q, Suicide Rates, Suicide Room, Suicide Risk Assessment, Suicide Ribbon, Suicide Rate By Country, Suicide Rates By State, Suicide Rates In The Us, Suicide Risk Factors, Suicide Room Full Movie, Suicide Reddit, Suicide Squad, Suicide Squad 2, Suicide Squad Cast, Suicide Squad Full Movie, Suicide Squad Joker, Suicide Silence, Suicide Statistics, Suicide Squad Soundtrack, Suicide Squad Rating, Suicide Squad Imdb, Suicide Text Line, Suicide Tna, Suicide Tattoos, Suicide Trial, Suicide Text, Suicide Tree, Suicide Tuesday, Suicide Test, Suicide Today, Suicide Troy Mi, Suicide Unforgivable Sin, Suicide Urban Dictionary, Suicide Usa, Suicide Unmasked, Suicide Unemployment, Suicide Utah, Suicide University, Suicide Uk, Suicide Ukulele Chords, Suicide Understanding, Suicide Vest, Suicide Victims, Suicide Virgins, Suicide Veterans, Suicide Vs Homicide, Suicide Vector, Suicide Verb, Suicide Verses, Suicide Vest Jail, Suicide Ventricle, Suicide Watch, Suicide Warning Signs, Suicide Wrestler, Suicide Website, Suicide Wallpaper, Suicide Workout, Suicide Watch Meme, Suicide Watch Reddit, Suicide Wiki, Suicide Walk, Suicide Xanax, Suicide X, Suicide Xanax Alcohol, Suicide X Tna, Suicide Chat, Suicide Xanax Overdose, Suicide Club, Suicide Xanax Dose, Suicide X Factor, Suicide Xmas Day, Suicide Youtube, Suicide Yesterday, Suicideyear, Suicide Yourself, Suicide Young Adults, Suicide Yahoo Answers, Suicide Youth, Suicide Yearly Statistics, Suicide Youth Statistics, Suicide Yellow Ribbon, Suicide Zoo, Suicide Zoloft, Suicide Zoo 2017, Suicide Zero, Suicide Zion, Suicide Zion National Park, Suicide Zoloft Overdose, Suicide Squad, Suicide Zilwaukee Bridge 2017, Suicide Zolpidem, Europe Map, Europe Map Quiz, Europe Band, Europe West, Europe Countries, Europe Population, Europe News, Europe Train, Europe Countries Map, Europe Political Map, Europe After Ww1, Europe And Russia Map, Europe After Ww2, Europe And Asia Map, Europe After Ww2 Map, Europe And Asia, Europe Adapter, Europe And Russia Mapping Lab, Europe After Ww1 Map, Europe Airlines, Europe Band, Europe Blank Map, Europe Before Ww1, Europe By Train, Europe By Car, Europe Before Ww2, Europe Backpacking, Europe Beaches, Europe Bank Holidays, Europe Bodies Of Water, Europe Countries, Europe Countries Map, Europe Cruises, Europe Car Rental, Europe Continent, Europe Cities, Europe Currency, Europe Carrie, Europe Current Events, Europe Capitals, Europe Destinations, Europe Definition, Europe Drinking Age, Europe During Ww2, Europe During The Cold War, Europe Denmark Copenhagen, Europe During Ww1, Europe Day, Europe Date Format, Europe Deals, Europe East, Europe Etf, Europe Express, Europe East Map, Europe Economy, Europe Elections, Europe East Dna, Europe Ebay, Europe Economic Crisis, Europe Etymology, Europe Flag, Europe Flights, Europe First Strategy, Europe Final Countdown, Europe Facts, Europe Flight Deals, Europe First, Europe Food, Europe For Kids, Europe France, Europe Gyro, Europe Geography, Europe Gdp, Europe Geography Quiz, Europe Google Maps, Europe Government, Europe Geography Map, Europe Germany, Europe Guided Tours, Europe Gps, Europe History, Europe Hostels, Europe Honeymoon, Europe Holidays, Europe High Speed Rail, Europe Hotels, Europe Holidays 2017, Europe Hotel Killarney, Europe History Timeline, Europe High Speed Rail Map, Europe In 1914, Europe In Spanish, Europe In 1918, Europe In 1914 Map, Europe Itinerary, Europe In The Middle Ages, Europe Is Lost, Europe Is A Continent, Europe Immigration, Europe In December, Europe Jobs, Europe Jokes, Europe Jewish, Europe Jean Sizes, Europe Jewish Population, Europe June 2017, Europe Jade Dynasty, Europe June Weather, Europe Jersey, Europe July Weather, Europe King, Europe Kosovo, Europe Keyboard, Europe Knights, Europe Knife Laws, Europe Kitchen, Europe Killarney, Europe Katakana, Europe Known For, Europe Killing, Europa League, Europe Laptop Ban, Europe Languages, Europe Landmarks, Europa League Final, Europe Labeled Map, Europe Lead Singer, Europe Location, Europe Landforms, Europe Land Area, Europe Map, Europe Map Quiz, Europe Map 1914, Europe Map Blank, Europe Map Ww2, Europe Money, Europe Map 1939, Europe Mountains, Europe Music Festivals 2017, Europe Map Outline, Europe News, Europe Nails, Europe Nails Prices, Europe Natural Resources, Europe News Today, Europe No Go Zones, Europe Night Trains, Europe Nations, Europe Nails Robinson, Europe Names, Europe On A Map, Europe Outline, Europe Outlet, Europe On A Budget, Europe Outline Map, Europe Outlet Converter, Europe Outlet Adapter, Europe On World Map, Europe Oceans, Europe On A Shoestring, Europe Population, Europe Political Map, Europe Packing List, Europe Power Adapter, Europe Packages, Europe Physical Map, Europe Plunges Into War, Europe Physical Features, Europe Pictures, Europe Population 2016, Europe Quiz, Europe Quotes, Europe Quizlet, Europe Queen, Europe Qualifiers, Europe Questions, Europe Quiz Sporcle, Europe Qualifying 2018, Europe Quiz Lizard Point, Europe Qe, Europe River Cruises, Europe Rail, Europe Rail Pass, Europe Rental Car, Europe Rivers, Europe Rail Map, Europe Reddit, Europe Refugee Crisis, Europe Region, Europe Religion, Europe Songs, Europe Shoe Size, Europe Sim Card, Europe Square Miles, Europe Size, Europe Stock Market, Europe States, Europe Soccer, Europe Sim Card Prepaid, Europe Soccer Teams, Europe Time, Europe Train, Europe Tours, Europe Trip, Europe Trip Planner, Europe Time Zones, Europe Travel, Europe Train Map, Europe Train Pass, Europe Travel Packages, Europe Union, Europe Unemployment Rate, Europe Uk, Europe University, Europe Us Visa, Europe United Kingdom, Europe Uber, Europe Us Size Comparison, Europe Usa, Europa Universalis, Europe Vacation, Europe Visa, Europe Voltage, Europe Vs Usa, Europe Vs Usa Size, Europe Vs Asia, Europe Vacation Spots, Europe Visa From Usa, Europe Vacation Ideas, Europe Volcano, Europe West, Europe Weather, Europe World Map, Europe Ww2 Map, Europe Ww2, Europe With Kids, Europe Wiki, Europe Ww1 Map, Europe Wallpaper, Europe Weather In May, Europe Xenophobia, Europe Xi, Europe X, Europe Xl To Us, Europe X Factor Judges, Europe Xi Vs Manchester United, Europe Xmas Markets, Europe Xi 2017, Europe Xl, Europe Xiaomi, Europe Youtube, Europe Youth Hostels, Europe Youth Unemployment, Europe Yacht Week, Europe Yoga Retreat, Europe Yugoslavia, Europe Youth Hostel Pass, Europe Yacht Charter, Europe Yelp, Europe You Are Here Mugs, Europe Zip Codes, Europe Zillow, Europe Zika, Europe Zoo, Europe Zika Map, Europe Zara, Europe Zip Code Database, Europe Zone, Europe Z, Europa Zeus, Middle East Map, Middle East Countries, Middle East Market, Middle East News, Middle East Map Quiz, Middle East Flags, Middle East Airlines, Middle East Respiratory Syndrome, Middle East Restaurant, Middle East Current Events, Middle East Airlines, Middle East And North Africa Map, Middle East Asia, Middle East And North Africa, Middle East Articles, Middle East After Ww1, Middle East Asia Map, Middle East After Ww2, Middle East And Africa Map, Middle East Architecture, Middle East Blank Map, Middle East Boston, Middle East Bakery Near Me, Middle East Bodies Of Water, Middle East Breaking News, Middle East Before Islam, Middle East Bakery, Middle East Blood, Middle East Broadcasting Networks, Middle East Bakery Sterling Heights, Middle East Countries, Middle East Current Events, Middle East Conflict, Middle East Continent, Middle East Cambridge, Middle East Capitals, Middle East Countries Quiz, Middle East Culture, Middle East Countries List, Middle East Crisis, Middle East Definition, Middle East Desert, Middle East Downstairs, Middle East Documentary, Middle East Dictators, Middle East Desserts, Middle East During Ww2, Middle East During Cold War, Middle East Dbq, Middle East Democracy, Middle East Eye, Middle East Europe, Middle East Economy, Middle East Ethnic Groups, Middle East Explained, Middle East Ethnic Map, Middle East Events, Middle East Empires, Middle East Electronics Ban, Middle East Europe Map, Middle East Flags, Middle East Food Near Me, Middle East Food, Middle East Forum, Middle East Facts, Middle East Foreign Policy, Middle East For Dummies, Middle East Fashion, Middle East Flights, Middle East Food Market, Middle East Geography, Middle East Grocery Store, Middle East Geography Quiz, Middle East Government, Middle East Geography Map, Middle East Grocery, Middle East Garlic Sauce, Middle East Gdp, Middle East Games, Middle East Girl, Middle East History, Middle East History Books, Middle East Head Wrap, Middle East Holidays, Middle East Human Rights, Middle East Highest Mountain Range, Middle East Headwear, Middle East History Documentary, Middle East Houses, Middle East Historical Events, Middle East Institute, Middle East In Spanish, Middle East Inbreeding, Middle East In 1920, Middle East Issues, Middle East In The 70s, Middle East Israel, Middle East In Asia, Middle East Images, Middle East Instruments, Middle East Jobs, Middle East Journal, Middle East Journal Of Anesthesiology, Middle East Jokes, Middle East Jordan, Middle East Jesus, Middle East Jewelry, Middle East Jerusalem, Middle East Journal Of Culture And Communication, Middle East Judaism, Middle East Kuwait, Middle East Kings, Middle East Kingdoms, Middle East Kurds, Middle East Knife, Middle East Killings, Middle East Knives, Middle East Kabob, Middle East Kebab, Middle East Key Terms, Middle East Languages, Middle East Leaders, Middle East Lentil Soup, Middle East Location, Middle East Labeled Map, Middle East Laptop Ban, Middle East Lizard Point, Middle East Landforms, Middle East Landscape, Middle East Literacy Rate, Middle East Map, Middle East Market, Middle East Map Quiz, Middle East Monitor, Middle East Map Blank, Middle East Map Game, Middle East Map Israel, Middle East Music, Middle East Map Labeled, Middle East Memes, Middle East News, Middle East Near Me, Middle East Names, Middle East North Africa Map, Middle East Nations, Middle East Natural Resources, Middle East News Cnn, Middle East North Africa, Middle East Newspaper, Middle East Map, Middle East Oil, Middle East On Map, Middle East Outline Map, Middle East Oil Crisis, Middle East On World Map, Middle East Oil Reserves, Middle East Oil Map, Middle East Online, Middle East Oil Crisis Apush, Middle East Oil Production, Middle East Political Map, Middle East Population, Middle East Pastry, Middle East Physical Map, Middle East Physical Features, Middle East Peace, Middle East Physical Features Map, Middle East Problems, Middle East Politics, Middle East Pictures, Middle East Quiz, Middle East Quizlet, Middle East Quarterly, Middle East Qatar, Middle East Questions And Answers, Middle East Quartet, Middle East Quotes, Middle East Quinoa, Middle East Qatar Map, Middle East Quiz Game, Middle East Respiratory Syndrome, Middle East Restaurant, Middle East Religion, Middle East Restaurants Near Me, Middle East Region, Middle East Revolution, Middle East Rivers, Middle East Religion Map, Middle East Religious Intolerance, Middle East Restaurant Ann Arbor, Middle East Studies Association, Middle East Spiders, Middle East States, Middle East Scarf, Middle East Syria, Middle East Saudi Arabia, Middle East Spices, Middle East Studies, Middle East Seas, Middle East Sheppard Software, Middle East Technical University, Middle East Timeline, Middle East Time, Middle East Terrorism, Middle East Test, Middle East Trump, Middle East Terrorist Groups, Middle East Today, Middle East Travel, Middle East Travel Ban, Middle East Upstairs, Middle East University, Middle East Usa, Middle East United States, Middle East Union, Middle East Us, Middle East Union Attack On Titan, Middle East Us Allies, Middle East Uninhabitable, Middle East Unlabeled Map, Middle East Vocabulary, Middle East Vacation, Middle East Violence, Middle East Vs Near East, Middle East Video, Middle East Venture Partners, Middle East Virus, Middle East Venue, Middle East Village, Middle East Vacation Spots, Middle East War, Middle East Word Whizzle, Middle East World Map, Middle East War Movies, Middle East Wiki, Middle East Weather, Middle East Water Crisis, Middle East Ww1, Middle East Ww2, Middle East Water Map, Middle East Countries, Middle East X Words, Middle East Current Events, Middle East Conflict, Middle East Continent, Middle East Cambridge, Middle East Capitals, Middle East Countries Quiz, Middle East Culture, Middle East Countries List, Middle East Youtube, Middle East Yemen, Middle East Yogurt, Middle East Yogurt Drink, Middle East Youth Bulge, Middle East Youth Population, Middle East Youth Initiative, Middle East Yellow Rice Recipe, Middle East Youth Unemployment, Middle East Yogurt Sauce, Middle East Zionism, Middle East Zuzu, Middle East Zip Codes, Middle East Zinc Deficiency, Middle East Zksoftware, Middle East Zoo Association, Middle East Zone, Middle East Zone Free Of Nuclear Weapons, Middle East Zagros Mountains, Middle East Zucchini Recipes

Revealed – Top Secret – Terrorist Financing

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Charlie Hebdo #1178-page-001

National Terrorist Financing Risk Assessment 2015

Page Count: 70 pages
Date: June 2015
Restriction: None
Originating Organization: Department of the Treasury
File Type: pdf
File Size: 1,425,075 bytes
File Hash (SHA-256): DDC42CE4FBD16


After the September 11, 2001 terrorist attacks, the United States adopted a preventive approach to combating all forms of terrorist activity. Efforts to combat the financing of terrorism (CFT) are a central pillar of this approach. Cutting off financial support to terrorists and terrorist organizations is essential to disrupting their operations and preventing attacks. To that end, the U.S. government has sought to identify and disrupt ongoing terrorist financing (TF) and to prevent future TF. The law enforcement community, including various components of the U.S. Departments of Justice, Homeland Security, and the Treasury, along with the intelligence community and the federal functional regulators, applies robust authorities to identify, investigate, and combat specific TF threats, enforce compliance with applicable laws and regulations, and prosecute supporters in order to deter would-be terrorist financiers. The U.S. Department of the Treasury (Treasury), which leads financial and regulatory CFT efforts for the U.S. government, employs targeted financial sanctions, formulates systemic safeguards, and seeks to increase financial transparency to make accessing the U.S. financial system more difficult and risky for terrorists and their facilitators. All of these efforts involve extensive international engagement to try to prevent any form of TF, particularly financing that does not necessarily originate in the United States, from accessing the U.S. financial system.

These efforts have succeeded in making it significantly more difficult for terrorists and their facilitators to access and abuse the regulated U.S. and international financial systems. At the time of the September 11, 2001 attacks, Al-Qaida (AQ) was relying on both a web of wealthy supporters that practically operated in the open and a financial system that let money for terrorists flow with minimal scrutiny. Operating such a financial network would be substantially more difficult today in the United States because of robust anti-money laundering (AML)/CFT standards. Additionally, several of the most significant sources of TF—such as the ability of terrorists to derive financial benefit through the control of territory—result from weak governance that the United States does not experience.

However, the threat from terrorism and terrorist financing is constantly evolving and requires adaptation by law enforcement, financial regulators, intelligence services, and policy makers. When examined over time, several fundamental lessons emerge: first, a wide range of terrorist organizations have sought to draw upon the wealth and resources of the United States to finance their organizations and activities; second, just as there is no one type of terrorist, there is no one type of terrorist financier or facilitator; and third, terrorist financiers and facilitators are creative and will seek to exploit vulnerabilities in our society and financial system to further their unlawful aims.

Thus, even with the safeguards described above, the U.S. financial system continues to face residual TF risk. The central role of the U.S. financial system within the international financial system and the sheer volume and diversity of international financial transactions that in some way pass through U.S. financial institutions expose the U.S. financial system to TF risks that other financial systems may not face. As Treasury Secretary Jacob Lew has observed, “The dollar is the world’s reserve currency and, for over 200 years, we have established ourselves as the backbone of the global financial system.” While U.S. counterterrorism (CT)/CFT efforts have resulted in better identification and faster action than prior to September 11, 2001, information obtained from financial institution reporting, TF-related prosecutions, and enforcement actions against financial institutions in the United States are powerful reminders of the TF risk that remains in the United States.

As described in detail in Section III, multiple terrorist organizations and radicalized individuals seek to exploit several vulnerabilities in the United States and in the U.S. financial system to raise and move funds, that despite ongoing efforts by the U.S. government to mitigate, still pose a residual risk of TF. Terrorist financiers use various criminal schemes to raise funds in the United States, and they continue to attempt to exploit the generosity of American citizens. Although coordinated law enforcement and regulatory efforts by the U.S. government, working with charitable organizations, has improved the resiliency of the charitable sector to abuse by TF facilitators, the large size and diversity of the U.S. charitable sector and its global reach means the sector remains vulnerable to abuse. A notable trend identified in the charitable sector involves individuals supporting various terrorist groups seeking to raise funds in the United States under the auspices of charitable giving, but outside of any charitable organization recognized by the U.S. government. Additionally, the growth of online communication networks, including social media, has opened up new avenues for terrorists and their supporters to solicit directly, and receive funds from, U.S. residents.

B. GLOBAL SOURCES OF TERRORIST FINANCING

In order to operate, however, each of these groups requires significant funding. While the cost of an individual terrorist attack can be quite low, maintaining a terrorist organization requires large sums. Organizations require significant funds to create and maintain an infrastructure of organizational support, to sustain an ideology of terrorism through propaganda, and to finance the ostensibly legitimate activities needed to provide a veil of legitimacy for terrorist organizations. As deceased AQ financial chief Sa’id al-Masri put it: “without money, jihad stops.” Although financial activities can vary significantly among different terrorist groups, several areas of commonality exist.

1. CRIMINAL ACTIVITY

a. Kidnapping for Ransom

Terrorist groups engage in a range of criminal activity to raise needed funds. Extensive revenue from kidnapping for ransom (KFR) and other criminal activities such as extortion have permitted AQ affiliates and other terrorist groups to generate significant revenue. KFR remains one of the most frequent and profitable source of illicit financing, and an extremely challenging TF threat to combat. The U.S. government estimates that terrorist organizations collected approximately $120 million in ransom payments between 2005 and 2012. In 2014 alone, ISIL acquired at least $20 million and as much as $45 million in ransom payments. In addition, AQAP, AQIM, and Boko Haram are particularly effective with KFR and are using ransom money to fund the range of their activities. Kidnapping targets are usually Western citizens of countries with governments that have established a pattern of paying ransoms, either directly or through third party intermediaries, for the release of individuals in custody. AQAP used ransom money it received for the return of European hostages to finance its over $20 million campaign to seize territory in Yemen between mid-2011 and mid-2012. AQIM is believed to have obtained a €30 million ransom payment in October 2013 for the release of four French hostages who worked for the French government-owned nuclear firm Areva. Also in 2013, Boko Haram kidnapped eight French citizens in northern Cameroon and obtained a substantial ransom payment for their release.  Similarly, Al-Shabaab-affiliated groups received an approximately five million dollar ransom in exchange for the release of two Spanish hostages who were kidnapped in Kenya in October 2011.

b. Extortion

The exploitation of local populations and resources has become a key revenue source for numerous terrorist groups worldwide. Pioneered by groups such as Hamas and Al-Shabaab, this form of pseudosovereignty-based fundraising has spread to other un- or under-governed territories around the world, most recently Iraq and Syria. Not only does territorial occupation allow for fundraising from the theft of natural resources, but it also creates the opportunity to extort, under the threat of violence, local populations and businesses and generate funds from the seizure of public utility services and their accompanying revenues. Unlike taxation by local governing authorities, whereby tax revenue is used to pay for basic public services, terrorist groups extort funds from local populations with minimal corresponding provision of services in exchange, and under the threat of physical harm for non-payment. For example, Al-Shabaab, Al-Nusrah Front (ANF) and ISIL are all able to leverage their occupation of territory and the threat of violence to extort funds from the local population, as well as conduct criminal activity such as robbery and trafficking in stolen goods. ISIL generates significant revenue, up to several million dollars per week, from the sale of stolen and smuggled energy resources it controls inside Iraq and Syria. ISIL also operates sophisticated extortion rackets throughout Iraq and Syria, including extracting payments for the use of public highways and cash withdrawals from banks by depositors in cities such as Mosul. Through these schemes, ISIL can receive upwards of several million dollars a month of revenue. Despite losing control of the port of Kismayo, which was its key revenue source, Al-Shabaab continues to generate at least hundreds of thousands of dollars per month, primarily through extortion and the threat of violence, in its remaining strongholds in southern Somalia. Similarly, Hamas can also raise revenue from control of border crossings and avenues of commerce, as well as businesses and local populations.

c. Drug trafficking and other criminal activity

In addition, various terrorist groups derive significant financial benefit from other criminal activities, including through drug trafficking. Both the Revolutionary Armed Forces of Colombia (FARC) and the Taliban have utilized drug trafficking operations to finance their terrorist operations. The Haqqani Network is also financed by a wide range of revenue sources including businesses and proceeds derived from criminal activities such as smuggling, extortion, and KFR in Afghanistan and Pakistan. Hizballah supporters are often engaged in a range of criminal activities that benefit the group financially, such as smuggling contraband goods, passport falsification, drug trafficking, money laundering, and a variety of fraudulent schemes, including credit card, immigration, and bank fraud. BSA reporting specifically implicates individuals currently being investigated by the FBI for ties to Hizballah and Hamas in a wide variety of money laundering activity within the U.S. financial system, most prominently trade-based money laundering (TBML) activities including through the export of used cars.

Download

USTreasury-TerroristFinancing-2015

Secret Life Of Pets, Secret Service, Secret Garden, Secret World Legends, Secret Flying, Secret Life Of Bees, Secret Life Of Pets Cast, Secret Life Of The American Teenager, Secret Squirrel, Secret Shopper, Secret Agent Man, Secret Admirer, Secret Aardvark, Secret Agent, Secret Annex, Secret And Lies, Secret Agent Man Song, Secret App, Secret Asian Man, Secret Agent Man Lyrics, Secretbuilders, Secret Book, Secret Beach Kauai, Secret Beach, Secret Ballot, Secret Box, Secret Beach Maui, Secret Bay Dominica, Secret Base, Secret Band, Secret Circle, Secret Church, Secret Caverns, Secret Classroom Superpowers, Secret Codes, Secret Clinical Strength, Secret Clearance, Secret Circle Cast, Secret Conversations Facebook, Secret Cameras, Secret Deodorant, Secret Definition, Secret Diary Of A Call Girl, Secret Door, Secret Deodorant Coupons, Secret Diary, Secret Deodorant Commercial, Secret Decoder Ring, Secret Daughter, Secret Door Lyrics, Secret Empire, Secret Extensions, Secret Escapes, Secret Empire #1, Secret Empire Reading Order, Secret Entourage, Secret Empire #0, Secret Empire #2, Secret Eaters, Secret Emoji, Secret Flying, Secret Forest, Secret Forest Ep 11, Secret Falls Kauai, Secret Flask, Secret Formula, Secret Facebook Group, Secret Frappuccino, Secret For The Mad Lyrics, Secret Falls, Secret Garden, Secret Garden Song, Secret Garden Movie, Secret Garden Cafe, Secret Garden Musical, Secret Garden Lyrics, Secret Garden Denver, Secret Garden Book, Secret Google Games, Secret Garden Miami, Secret Hitler Rules, Secret Hitler Game, Secret History Of Twin Peaks, Secret Hitler Online, Secret Hair Extensions, Secret Handshake, Secret History, Secret Hotel Deals, Secret Heart, Secret Hiding Places, Secret In Their Eyes, Secret In Spanish, Secret Ingredient, Secret Island, Secret In Their Eyes Cast, Secret Invasion, Secret In N Out Menu, Secret Invisible Solid, Secret Island In Texas, Secret In French, Secret Jardin, Secret Jewels, Secret Journal, Secret Jobs, Secret Jamaica, Secret Jieun, Secret Jardin Lodge, Secret Journey Police, Secret Journey To Planet Serpo, Secret Jardin Dr90, Secret Kpop, Secret Keeper Girl, Secret Keeper, Secret Key, Secret Korean Drama, Secret Knock, Secret Knowledge, Secret Krabby Patty Formula, Secret Key Starting Treatment Essence, Secret Kingdom, Secret Life Of Pets, Secret Life Of Bees, Secret Life Of Pets Cast, Secret Life Of The American Teenager, Secret Love Song, Secret Life Of Walter Mitty, Secret Lab Chair, Secret Life Of An American Teenager Cast, Secret Language, Secret Life Of Pets Imdb, Secret Menu, Secret Menu Items, Secret Mage, Secret Menu Starbucks, Secret Menu In N Out, Secret Messages, Secret Meaning, Secret Movie, Secret Mountain Fort Awesome, Secret Mage Deck, Secret Nails, Secret Nyc, Secret Netflix, Secret Nail Salon, Secret Names, Secret Netflix Codes, Secret Numbers, Secret News, Secret Nature From Jeju Peeling Gel, Secret Nation, Secret Of Mana, Secret Of Nimh, Secret Of The Snowy Peaks, Secret Of The Cedars, Secret Of Kells, Secret Of Evermore, Secret Of The Wings, Secret Of Moonacre, Secret Of Mana Rom, Secret Of Mana 2, Secret Pizza, Secret Police, Secret Project Robot, Secret Place, Secret Passion Fruit, Secret Power, Secret Passages, Secret Pizza Party, Secret Paladin, Secret Place Lyrics, Secret Quotes, Secret Question, Secret Quest, Secret Questions To Ask, Secret Questions To Ask Siri, Secret Quests Ffxv, Secret Quests Skyrim, Secret Qr Codes, Secret Questions To Ask Alexa, Secret Quote Spongebob, Secret Romance, Secret Resorts, Secret Recipe, Secret Rooms, Secret Rare Pokemon Cards, Secret Rainbow Hair, Secret Rare Ultra Ball, Secret Rendezvous, Secret Relationship, Secret Roku Channels, Secret Service, Secret Squirrel, Secret Shopper, Secret Societies, Secret Synonym, Secret Starbucks Menu, Secret Service Jobs, Secret Sandwich Society, Secret Sisters, Secret Shopper Jobs, Secret Treasures, Secret Treasures Sleepwear, Secret Tunnel, Secret Things, Secret Tunnel Song, Secret The Pierces, Secret Thesaurus, Secret Travel, Secret Treasures Bra, Secret To Success, Secret Underground Cities, Secret Us Weapons, Secret Underground Bases, Secret Universe Of Names, Secret Underground, Secret Underground Medicine, Secret Upgrades Office Space, Secret Us Bases, Secret Us Military Bases, Secret Unscented, Secret Variety Training, Secret Village Of The Spellcasters, Secret Video Recorder, Secret Variety Training Ep 2, Secret Vault, Secret Vault 81, Secret Veneers, Secret Voice Recorder, Secret Video, Secret Volume, Secret World Legends, Secret Window, Secret Wood, Secret Wars, Secret Wood Rings, Secret World Legends Release Date, Secret World Of Arrietty, Secret Weapon, Secret Wars 2015, Secret Warriors, Secret X Folder, Secret Xtians, Secret Xscape, Secret X Folder Comic, Secret X, Secret Xbox One Gamerpics, Secret Xtend, Secret Xbox One Games, Secret Xbox One Codes, Secret X Folder Webtoon, Secret Youtube, Secret Yeahu, Secret Yellowstone, Secret Young Justice, Secret Youtube Videos, Secret Yosemite, Secret Youtube Tricks, Secret Youtube Website, Secret Yumiverse, Secret Yosemite Spots, Secret Zoo Series, Secret Zoo, Secret Zoo Book, Secret Zinger, Secret Zombies Calling Card, Secret Zodiac Sign, Secret Zion Hikes, Secret Zone, Secret Zombies Challenge Infinite Warfare, Secret Zombie Challenge, Terror Financing In India, Terror Financing And Money Laundering, Terror Financing Definition, Terror Financing In Pakistan, Terror Financing And Demonetisation, Terror Financing, Terror Financing Unit Of The Treasury Department, Terror Financing Convention, Terror Financing Meaning, Terror Financing In Bangladesh, Terror Financing And Money Laundering, Terror Financing And Demonetisation, Iran Terror Financing And The Tax Code, Anti Terror Financing, Financing Terror Bit By Bit, Terror Financing In Bangladesh, Terror Financing Convention, Terror Financing Cases, Terror Financing Challenges, Terror Financing Channels, Counter Terror Financing, Combating Terror Financing, Cyber Crime Terror Financing, Terror Financing Definition, Terror Financing Department, Define Terror Financing, Terror Financing Essay, Terror Financing Expert, Fight Terror Financing, Fbi Terror Financing, Terror Financing To Top G7 Meeting Agenda, Terror Financing In Hindi, Terror Financing In India, Terror Financing In Pakistan, Terror Financing In Bangladesh, Terror Financing In Hindi, Isis Terror Financing, Iran Terror Financing And The Tax Code, Kuwait Terror Financing, Terror Financing Meaning, Terror Financing Methods, Terror Financing To Top G7 Meeting Agenda, Terror Financing Unit Of The Treasury Department, Financing Of Terror, Terror Financing Pakistan, Qatar Terror Financing, Terror Financing Risk, Saudi Terror Financing, Terror Financing To Top G7 Meeting Agenda, Hezbollah Financing Terror Through Criminal Enterprise, Terror Financing Unit Of The Treasury Department, Iran Terror Financing And The Tax Code, Terror Financing Unit Of The Treasury Department, Terror Finance Briefing Book, Terror Finance Blog, Terror Finance Watch List, Terror Finance, Terror Finance Tracking Program, Terror Finance Transparency Act, Terror Finance Networks, Qatar Terror Finance, Counter Terror Finance, Terror Threat Finance Course, Terror Finance Abroad Touches Thanksgiving At Home, Terror Finance Transparency Act, Iran Terror Financing And The Tax Code, Terror Finance Briefing Book, Terror Finance Blog, Financing Terror Bit By Bit, Terror Financing In Bangladesh, Terror Financing Convention, Terror Financing Cases, Terror Financing Challenges, Terror Financing Channels, Terror Threat Finance Course, Counter Terror Finance, Terror Financing Definition, Terror Financing Department, Terror Financing Essay, Terror Financing Expert, Terror Financing In Hindi, Terror Financing In India, Terror Financing In Pakistan, Terror Financing In Bangladesh, Terror Financing In Hindi, Iran Terror Finance Transparency Act, Iran Terror Finance Transparency, Kuwait Terror Finance, Terror Financing Meaning, Terror Financing Methods, Terror Finance Networks, Qatar And Terror Finance Negligence, Terror Financing Unit Of The Treasury Department, Terror Financing Pakistan, Terror Finance Tracking Program, Qatar And Terror Finance Part Ii, Prosper Terror Finance, Qatar Terror Finance, Terror Financing Risk, Us Terror Finance Rules, Qatar And Terror Finance Report, Stop Terror Finance, Terror Finance Tracking Program, Terror Finance Transparency Act, Terror Financing To Top G7 Meeting Agenda, Terror Threat Finance Course, Iran Terror Finance Transparency, The Terror Finance Blog, Turkey Terror Finance, Terror Financing Unit Of The Treasury Department, Us Terror Finance Rules, Terror Finance Watch List

The Most Influential People of All Time – The Secret List

Rank – Name – Year of Birth – Score
  1. 1
    1207
    396
    4
  2. 2
    698
    257
    1642
  3. 3
    1541
    801
    570
  4. 4
    702
    285
    1879
  5. 5
    455
    182
    384
  6. 6
    524
    179
    1564
  7. 7
    646
    219
    1452
  8. 8
    391
    182
    427
  9. 9
    436
    235
    1809
  10. 10
    354
    161
    469
  11. 11
    280
    158
    356
  12. 12
    461
    243
    1869
  13. 13
    316
    168
    1564
  14. 14
    256
    147
    551
  15. 15
    260
    163
    100
  16. 16
    284
    137
    1809
  17. 17
    294
    178
    563
  18. 18
    236
    123
    1473
  19. 19
    145
    58
    1398
  20. 20
    272
    151
    1732
    21
  21. 227
    165
    1818
  22. 22
    281
    156
    1847
  23. 23
    370
    221
    1929
  24. 24
    415
    206
    1856
  25. 25
    243
    128
    1743
  26. 26
    193
    78
  27. 27
    232
    151
    1769
  28. 28
    289
    142
    1706
  29. 29
    209
    154
    1451
  30. 30
    249
    122
    1847
  31. 31
    327
    258
    1889
  32. 32
    171
    135
    1162
  33. 33
    74
    27
    1483
  34. 34
    204
    118
    1863
  35. 35
    221
    130

    The Wright Brothers

  36. 36
    178
    118
  37. 37
    166
    139
    1856
  38. 38
    115
    42
    570
  39. 39
    145
    118
    1596
  40. 40
    233
    147
    1918
  41. 41
    118
    60
    1475
  42. 42
    235
    158
    1874
  43. 43
    122
    88
    742
  44. 44
    128
    113
    272
  45. 45
    137
    125
    1870
  46. 46
    203
    153
    1955
  47. 47
    60
    12
    1756
  48. 48
    28
    8
    1712

    added by: Polar Bear

  49. 49
    91
    74
    5
  50. 50
    99
    81
    18784

 

 

Secret Photos and Inside Viewws of the Scientology Headquarters “Gold Base”

goldbase3

The international headquarters of Church of Scientology, also called the Gold Base or Int Base,1 is located on a 500-acre parcel of land in San Jacinto in Riverside County, California. The Church of Scientology purchased the site, a former resort used by celebrities, in 1978. Many of Scientology’s organizations are headquartered there, including the Religious Technology Center, the Commodore’s Messenger Organization International and Golden Era Productions. Golden Era Productions manufactures the E-Meter and produces and distributes all church audio-visual materials, both internal and promotional. The motif of the facility is designed to look like a Scottish castle, perhaps as a reference to one of Hubbard’s largest ideological inspirations Aleister Crowley. Like Mr. Crowley’s Boleskine House, which is located near Loch Ness, Scotland, Mr. Hubbard also refers to his house in a singular epithet “Bonnie View”. 2 The two facilities also share architectural similarities and the Boleskine House is considered to be of great importance in Thelema, Crowley’s own psuedo-religious magical organization.

cinecastle
Cine Castle

Scientology has a long, sometimes stormy history in the Inland area, dating to the 1960s, when the first mission opened in Grand Terrace. In 1974, the church opened a mission — then the largest worldwide — near University Avenue and Lime Street in Riverside, in what is now the Life Arts Center.

But Scientology’s largest presence here is the Gold Base — home to Golden Era Productions, where all the church’s training videos, books and audiotapes are made.

The compound is nestled against rolling green hills and bisected by winding, two-lane Gilman Springs Road. The movie studio is designed after a Scottish castle, with conical turrets and a sky-blue tiled roof.

Each of the three dozen buildings in the complex shares the motif. Flagstones line bright white exterior walls and gates are made of rough-hewn oak on wrought-iron hinges.

Fraser joked that people stop “about 50 times a day” just to ask what the place is.

The church bought the site, formerly a resort popular among Hollywood moguls, in 1978.

Golden Era’s high-tech studios produce 300 different videos, films and audiotapes a year for distribution worldwide, along with books, television commercials and E-Meters — the electronic devices used for personal counseling, an underlying feature of Scientology.

About 500 staff members live and work at the base, and another 100 or so non-Scientologists are employed there.

Photographs of Hubbard are everywhere, and several corridors are lined with signed photos of celebrity Scientologists, including John Travolta and Isaac Hayes.

Fraser said the site has hosted more than 100 fundraisers for local charities. She serves on the board of a youth museum, and another staff member is on the Hemet Public Library board and helped with a plan for San Jacinto’s Main Street.

Fraser gives free tours of Golden Era and has hosted Riverside County leaders. 3

Notable buildings and features in Gold Base include:4

Upper Villas—RTC offices and housing, where David Miscavige and other high level Scientologists live and work
BonnieView—L. Ron Hubbard’s fully-furnished mansion, still maintained and staffed in the belief that he will return in another body.
Cine Castle—main film studio in the shape of a castle, for producing church A/V materials
OGH buildings—Old Gilman House. Formerly “isolation” space for physically ill staff. Possibly now used for auditing or solo auditing.
Del Sol—CSI offices, and auditing rooms for staff.
Staff berthing—four buildings where staff live.
Qual Gold—Headquarters for Qual Sec, in charge of “quality control” as per the Hubbard organization policies. In practice this mostly means facilities staff auditing and training.
MCI—This large building is the staff dining hall, known as “Massacre Canyon Inn” from the building’s pre-Scientology name when the property was a resort.

Unusually Strong Security Measures at Gold Base

Gold Base has a number of unusually strong security measures, including razor-tipped fences, motion sensors, snipers nests and a large number of regular and infrared CCTV cameras. However, it is unclear whether the purpose of many of these security measures is to protect the base from outside threats or to keep unruly members inside the compound. The outer fences are lined with razors and motion sensors at regular intervals of approximately 20 ft. The facility also has infrared cameras, anti-protester speaker systems as well as floodlights arranged at regular intervals. There are are also “lookout posts” that are akin to snipers’ nests in the sides of the hills surrounding the complex.
goldbasefence
Razor-tipped fences at Gold Base point both inward and outward.
goldbasemotionsensor
Motion sensors are positioned at regular intervals along the outer fences of Gold Base.
infraredcameras

Infrared cameras are positioned around Gold Base.
Address

19625 Gilman Springs Road
Gilman Hot Springs, California 92583

Golden Era Golf Course
19871 Gilman Springs Road
San Jacinto, CA 92583-2105
(951) 654-0130
goldbase-1024x731
goldbasemap-1024x740
goldbase1-1023x477

The large mansion at top right is L. Ron Hubbard’s former house “Bonnie View”.
goldbase2-1024x574
Close up of L. Ron Hubbard’s former home. The Religious Technology Center Building is in the bottom right. David Miscavige’s office is located in the RTC building
goldbase4-1024x502
Golden Era Productions and Golf Course. The building at right is “Building 36”. Building 36 contains the Gold Executives and administrative staff, marketing, and manufacturing.
goldbase5-1024x544
Production studios for video and audio in upper portion of photo. Auditing rooms and “the Ranchos”, which are the book compilation, editing, design and typesetting units, are located to lower right. Flat-roofed building to the left is CMO International and Exec Strata are located in atemporary building, called “The Trailers”. In the nearby “200’s” are the offices of L. Ron Hubbard’s Public Relations staff and the LRH Biographer, Dan Sherman.
goldbase6-1024x715
Cine Castle. “The Castle” is a large, state-of-the art sound studio for filming. It also has alarge area for set and prop construction and storage, costumes, and makeup.
goldbase7-1024x577
Garage and motor pool at top. Massacre Canyon Inn is at lower right, where the staff eats, and where they have military-style “musters” three times a day.
goldbase8
The Running Program Track is used for punishment. The Rehabilitation Project Force uses the track to force offending members of the Sea Org to run consistently in circles, without stopping, for up to 12 hours at a time.

TOP-SECRET-Committee on National Security Systems Recommendations for Implementing FICAM on U.S. Secret Networks

CNSS-ImplementingFICAM

Download the original document below

CNSS-ImplementingFICAM

Threats to Federal information systems are rising as demands for sharing of information and intelligence between Federal Departments and Agencies increase. It is essential that the Federal Government devise an approach that addresses both challenges without compromising the ability to achieve either objective. Developing a common governance framework and set of Identity, Credential, and Access Management (ICAM) capabilities that enhance the security of our systems by ensuring that only authorized persons and systems from different Federal components have access to necessary information is a high priority. The Federal Identity, Credential and Access Management (FICAM) Roadmap and Implementation Guidance was developed to address the need for secure information sharing capabilities across the breadth of the Federal Government.

A recent gap analysis conducted to determine gaps between the current state of the Secret Fabric and FICAM revealed substantive differences between levels of adoption of this framework and served as the catalyst for this document. In addition to varying levels of FICAM maturity, the gap analysis also showed significant variations in levels of sharable information, connectivity, and governance structures which further complicate the aim of a common FICAM framework across the Secret Fabric.

Using the gap analysis as a starting point, this document provides four major recommendations:

Establish and Empower a Governance Structure for ICAM on All Networks
 Develop a Common Interoperable ICAM Architecture for the Secret Fabric
 Transition to a Common Interoperable ICAM Architecture
 Prepare for the Evolution of ICAM on the Secret Fabric as New Technology Emerges and New Mission and Business Needs Arise

The following progress chart summarizes the recommendations with objective end states and suggested activities required to accomplish the objectives along a snapshot of status of ICAM on the Secret Fabric as of the publication date of this document. These recommendations, objectives and activities will be included in the FICAM Implementation Plan for the Secret Fabric currently under development by the National Security Systems (NSS) Identity and Access Management (IdAM) Working Group under the guidance of the Program Manager for the Information Sharing Environment (PM-ISE).

introducing-ficam

Unveiled – US Secret Service Visits Cryptome

US Secret Service Visits Cryptome

 


7:30PM, June 18, 2013. Guccifer Bush Family Contact List Removed In Response to Two US Secret Service Agents Visit to Cryptome at Request of Bush Family. More Information Available at New York Office of the US Secret Service: 718-840-1000.

Original source of Cryptome’s mirror of Guccifer Bush Family Contact List remains online at 6:50AM 6/19/13 (and at 7:00AM 6/20/13):

https://drive.google.com/folderview?id=0B_WrF7_bWvgaVGszaTU1U3BhTXc&usp=sharing

An account of the visit provided to Gawker for its interview of Cryptome:

http://gawker.com/a-discussion-with-cryptome-514154708

Young and Nastios emailed this account of the visit:

Two USSS agents appeared at our door about 7:30PM, June 18, 2013 showed ID and badges.

They asked are you John Young of Cryptome holding up a NY motor vehicle photo.

We said yes that’s us.

They showed a Guccifer file listing Bush Family contacts said do you recognize this.

We said yes.

They said we are here at the request of the Bush Family to ask you to remove the Guccifer file, posting it is not illegal, “freedom of information,” it contains nothing secret, the family is concerned, some live in New York City, we are politely asking for its removal.

We asked what would happen if the file was not removed.

They said we don’t know, will report your response up the line.

We said we see what you are saying.

They asked if we had met or knew Guccifer.

We said no no.

They said he’s pretty active.

We said she or he.

They asked how did you get the file.

We said anonymously.

They asked by email?

We said cant tell.

They said understood.

We asked to see their IDs again.

They said you are not going to publish our names are you we know you do that.

We said yes we do and will.

They showed their badges while covering their photos and names.

They said this is not being recorded is it.

We said no lifted our shirt offered to drop our sweats.

They said not necessary this is not an NSA thing.

We said the NSA thing’s a hoot.

They said yes yes.

They said thank you for courtesy.

They said call NY Secret Service to vet us then departed.

We got NY SS number online made the call.

NY SS said we cannot answer questions call this number in DC.

We called DC got a number disconnected message with a number to call and called that number.

DC SS answered White House Operations Center.

We said NY SS told us to call you to vet agent visit.

DC SS said that makes no sense call NY SS again.

We called NY SS again and said what DC SS said.

NY SS went away for several minutes then asked are you at this NY address.

We said yes.

NY SS said we confirm two SS agents visited you.

End.

Cryptome removed the document, though a link to a copy hosted by a third-party remains prominently displayed on their website.

Another account:

http://www.examiner.com/article/cryptome-removes-guccifer-s-bush-family-contact-
list-after-secret-service-visit

In an email to Examiner, John Young said, “Cryptome has a gaggle of responses to removal requests and demands. Nothing is ever fully removed, not by us, not by the Net. The USSS acknowledged that, implying with a grimace that the Bush Family knows that too.”

 


 

SECRET – Senate Permanent Subcommittee on Investigations Apple Offshore Profit Shifting Exhibits

The following exhibits were released May 21, 2013 by the Senate Permanent Subcommittee on Investigations Homeland Security and Governmental Affairs Committee.

U.S. Senate Permanent Subcommittee on Investigations Committee on Homeland Security and Governmental Affairs

  • 142 pages
  • May 21, 2013
  • 4.4 MB

Download

On May 21, 2013, the Permanent Subcommittee on Investigations (PSI) of the U.S. Senate Homeland Security and Government Affairs Committee will hold a hearing that is a continuation of a series of reviews conducted by the Subcommittee on how individual and corporate taxpayers are shifting billions of dollars offshore to avoid U.S. taxes. The hearing will examine how Apple Inc., a U.S. multinational corporation, has used a variety of offshore structures, arrangements, and transactions to shift billions of dollars in profits away from the United States and into Ireland, where Apple has negotiated a special corporate tax rate of less than two percent. One of Apple’s more unusual tactics has been to establish and direct substantial funds to offshore entities in Ireland, while claiming they are not tax residents of any jurisdiction. For example, Apple Inc. established an offshore subsidiary, Apple Operations International, which from 2009 to 2012 reported net income of $30 billion, but declined to declare any tax residence, filed no corporate income tax return, and paid no corporate income taxes to any national government for five years. A second Irish affiliate, Apple Sales International, received $74 billion in sales income over four years, but due in part to its alleged status as a non-tax resident, paid taxes on only a tiny fraction of that income.

In addition, the hearing will examine how Apple Inc. transferred the economic rights to its intellectual property through a cost sharing agreement with its own offshore affiliates, and was thereby able to shift tens of billions of dollars offshore to a low tax jurisdiction and avoid U.S. tax. Apple Inc. then utilized U.S. tax loopholes, including the so-called “check-the-box” rules, to avoid U.S. taxes on $44 billion in taxable offshore income over the past four years, or about $10 billion in tax avoidance per year. The hearing will also examine some of the weaknesses and loopholes in certain U.S. tax code provisions, including transfer pricing, Subpart F, and related regulations, that enable multinational corporations to avoid U.S. taxes.

A. Subcommittee Investigation

For a number of years, the Subcommittee has reviewed how U.S. citizens and multinational corporations have exploited and, at times, abused or violated U.S. tax statutes, regulations and accounting rules to shift profits and valuable assets offshore to avoid U.S. taxes. The Subcommittee inquiries have resulted in a series of hearings and reports. The Subcommittee’s recent reviews have focused on how multinational corporations have employed various complex structures and transactions to exploit taxloopholes to shift large portions of their profits offshore and dodge U.S. taxes.

At the same time as the U.S. federal debt has continued to grow – now surpassing $16 trillion – the U.S. corporate tax base has continued to decline, placing a greater burden on individual taxpayers and future generations. According to a report prepared for Congress: “At its post-WWII peak in 1952, the corporate tax generated 32.1% of all federal tax revenue. In that same year the individual tax accounted for 42.2% of federal revenue, and the payroll tax accounted for 9.7% of revenue. Today, the corporate tax accounts for 8.9% of federal tax revenue, whereas the individual and payroll taxes generate 41.5% and 40.0%, respectively, of federal revenue.”

Over the past several years, the amount of permanently reinvested foreign earnings reported by U.S. multinationals on their financial statements has increased dramatically. One study has calculated that undistributed foreign earnings for companies in the S&P 500 have increased by more than 400%. According to recent analysis by Audit Analytics, over a five year period from 2008 to 2012, total untaxed indefinitely reinvested earnings reported in 10-K filings for firms comprising the Russell 3000 increased by 70.3%. During the same period, the number of firms reporting indefinitely reinvested earnings increased by 11.4%.

The increase in multinational corporate claims regarding permanently reinvested foreign earnings and the decline in corporate tax revenue are due in part to the shifting of mobile income offshore into tax havens. A number of studies show that multinational corporations are moving “mobile” income out of the United States into low or no tax jurisdictions, including tax havens such as Ireland, Bermuda, and the Cayman Islands. In one 2012 study, a leading expert in the Office of Tax Analysis of the U.S. Department of Treasury found that foreign profit margins, not foreign sales, are the cause for significant increases in profits abroad. He wrote:

“The foreign share of the worldwide income of U.S. multinational corporations (MNCs) has risen sharply in recent years. Data from a panel of 754 large MNCs indicate that the MNC foreign income share increased by 14 percentage points from 1996 to 2004. The differential between a company’s U.S. and foreign effective tax rates exerts a significant effect on the share of its income abroad, largely through changes in foreign and domestic profit margins rather than a shift in sales. U.S.-foreign tax differentials are estimated to have raised the foreign share of MNC worldwide income by about 12 percentage points by 2004. Lower foreign effective tax rates had no significant effect on a company’s domestic sales or on the growth of its worldwide pre-tax profits. Lower taxes on foreign income do not seem to promote ‘competitiveness.’”

One study showed that foreign profits of controlled foreign corporations (CFCs) of U.S. multinationals significantly outpace the total GDP of some tax havens.” For example, profits of CFCs in Bermuda were 645% and in the Cayman Islands were 546% as a percentage of GDP, respectively. In a recent research report, JPMorgan expressed the opinion that the transfer pricing of intellectual property “explains some of the phenomenon as to why the balances of foreign cash and foreign earnings at multinational companies continue to grow at such impressive rates.”

C. Transfer Pricing and the Use of Shell Corporations

The Subcommittee’s investigations, as well as government and academic studies, have shown that U.S. multinationals use transfer pricing to move the economic rights of intangible assets to CFCs in tax havens or low tax jurisdictions, while they attribute expenses to their U.S. operations, lowering their taxable income at home. Their ability to artificially shift income to a tax haven provides multinationals with an unfair advantage over U.S. domestic corporations; it amounts to a subsidy for those multinationals. The recipient CFC in many cases is a shell entity that is created for the purpose of holding the rights. Shell companies are legal entities without any substantive existence – they have no employees, no physical presence, and produce no goods or services. Such shell companies are “ubiquitous in U.S international tax planning.” Typically, multinationals set up a shell corporation to enable it to artificially shift income to shell subsidiaries in low tax or tax haven jurisdictions.

According to a 2008 GAO study, “eighty-three of the 100 largest publicly traded U.S. corporations in terms of revenue reported having subsidiaries in jurisdictions list as tax havens or financial privacy jurisdictions….” Many of the largest U.S. multinationals use shell corporations to hold the economic rights to intellectual property and the profits generated from those rights in tax haven jurisdictions to avoid U.S. taxation. By doing this, multinational companies are shifting taxable U.S. income on paper to affiliated offshore shells. These strategies are causing the United States to lose billions of tax dollars annually. Moreover, from a broader prospective, multinationals are able to benefit from the tax rules which assume that different entities of a multinational, including shell corporations, act independently from one another. The reality today is that the entities of a parent multinational typically operate as one global enterprise following a global business plan directed by the U.S. parent. If that reality were recognized, rather than viewing the various affiliated entities as independent companies, they would not be able to benefit from creating fictitious entities in tax havens and shifting income to those entities. In fact, when Congress enacted Subpart F, discussed in detail below, more than fifty years ago in 1962, an express purpose of that law was to stop the deflection of multinational income to tax havens, an activity which is so prevalent today.

SECRET – Joint and Coalition Operational Analysis (JCOA)

Reducing and Mitigating Civilian Casualties: Enduring Lessons

17 pages
April 12, 2013

Download

The United States has long been committed to upholding the Law of Armed Conflict (LOAC) and minimizing collateral damage, which includes civilian casualties (CIVCAS) and unintended damage to civilian objects (facilities, equipment, or other property that is not a military objective). In support of these goals, the U.S. military developed capabilities for precision engagements and accurately identifying targets, such as the development of refined targeting processes and predictive tools to better estimate and minimize collateral damage. These capabilities permitted the conduct of combat operations with lower relative numbers of civilian casualties compared to past operations. However, despite these efforts, and while maintaining compliance with the laws of war, the U.S. military found over the past decade that these measures were not always sufficient for meeting the goal of minimizing civilian casualties when possible. Resulting civilian casualties ran counter to U.S. desires and public statements that the United States did “everything possible” to avoid civilian casualties, and therefore caused negative second-order effects that impacted U.S. national, strategic, and operational interests.

Afghanistan (2001-2002)

The United States reaffirmed its commitment to minimizing harm to the peaceful civilian population when it commenced major combat operations in Afghanistan and Iraq in 2001 and 2003, respectively. On 7 October 2001, U.S. forces began combat operations to capture Al Qaeda leadership and eliminate the use of Afghanistan as a launching point for terrorism. Within days of the start of operations, international media began reporting incidents of civilian casualties. Many of these incidents involved villages where suspected enemy were located, highlighting the challenge posed by fighting an enemy that eschews its obligations under the law of war (e.g., not wearing a uniform and hiding among the population). As a result, obtaining positive identification (PID) was more problematic, and U.S. engagements tended to rely more on self-defense considerations based on perceived hostile acts or intent. Probably the two highest profile incidents during this time were the 21 December 2001 attack on a convoy that the Afghan government claimed included tribal leaders; and the 1 July 2002 AC-130 attack on a group in Deh Rawud, central Afghanistan, that turned out to be a wedding party. In both attacks, U.S. aircraft had observed ground fire and engaged because of self-defense considerations.

Iraq Major Combat Operations (2003)

During major combat operations in Iraq, the ability to distinguish the enemy from the civilian population was simplified by the fact that the enemy was the Iraqi military. Iraqi forces were generally located away from civilian areas; their military equipment and uniforms reduced the ambiguity of engagement decisions relative to those faced by U.S. forces in Afghanistan. However, the Iraq military purposely violated law of war rules designed to protect the peaceful civilian population by employing human shields, misusing protected symbols for impartial humanitarian organizations (e.g., Red Crescent), and placing equipment in protected sites. In addition, Fedayeen Saddam forces did not wear uniforms and fought using irregular tactics, contributing to U.S. challenges in obtaining positive identification.

In contrast, the United States and its allies went to great lengths to minimize collateral damage; for example, in Iraq, similar to Afghanistan, most air engagements used precision-guided munitions. While no Department of Defense (DOD) assessment of civilian casualties during Iraq major combat operations could be found by this author, an independent assessment judged U.S. pre-planned attacks to be relatively effective in minimizing civilian casualties. The main concerns over civilian casualties centered on coalition forces conducting time-sensitive targeting of leadership in urban areas.

Counterinsurgencies in Iraq and Afghanistan

As insurgencies developed in Iraq and Afghanistan, the United States was forced to adopt a counterinsurgency (COIN) approach for which it was largely unprepared. With civilian protection being a central feature of COIN, the reduction and mitigation of CIVCAS became a key issue in these operations.

Counterinsurgency in Iraq

In Iraq, noncombatant casualties were primarily caused by escalation of force (EOF) incidents, both at check points and during convoy operations. These incidents resulted in a significant outcry from nongovernmental organizations (NGOs) and the media; the shooting of a vehicle containing Italian journalist Giuliana Sgrena and her rescuers during an EOF incident further increased visibility of this issue. In mid-2005, U.S. forces in Iraq adapted and made heightened efforts, widely seen as successful, to prevent and mitigate the effects of civilian casualties. Still, this issue was not completely resolved: later in the conflict, Multinational Forces – Iraq (MNF-I) pointed to the strategic importance of reducing CIVCAS from EOF and cited the lack of available nonlethal capabilities and inadequate training in their use as key deficiencies.

Counterinsurgency in Afghanistan

In Afghanistan, President Karzai made his first public statements regarding CIVCAS in 2005, asking the International Security Assistance Force (ISAF) to take measures to reduce such casualties. Initial initiatives to reduce CIVCAS in Afghanistan, such as the “Karzai 12” rules for approving operations in 2005 and the initial Commander, ISAF (COMISAF) Tactical Directive in 2007, were not successful in reducing high profile incidents. Additional efforts, including redrafting the COMISAF Tactical Directive in 2008, were made in response to several high profile, high casualty CIVCAS incidents; however, a May 2009 incident in Bala Balouk highlighted the lack of progress in effectively addressing the issue of civilian casualties.

The Bala Balouk incident served as an impetus for major efforts to reduce CIVCAS by both ISAF and the United States. Since mid-2009, ISAF leadership clearly and consistently emphasized the importance of reducing CIVCAS, and ISAF modified its policies and procedures to that end. Similarly, concerted efforts on the part of the United States—spearheaded by the U.S. Joint Staff CIVCAS Working Group, currently led by a three-star general officer—aided efforts to improve U.S. pre-deployment training to better prepare U.S. forces for CIVCAS reduction and mitigation in Afghanistan. This renewed focus addressed deficiencies in pre-deployment training regarding the use of nonlethal weapons (NLWs), amongst many other efforts. Collectively, these dedicated efforts bore fruit: because of improved guidance and training, ISAF forces adapted the way they conducted operations in light of CIVCAS concerns, and ISAF-caused CIVCAS decreased over time. Importantly, analysis of available data suggested that these CIVCAS mitigation efforts were a win-win, with no apparent cost to mission effectiveness or increase in friendly force casualties.

CIVCAS: An Enduring Issue

While the progress in Afghanistan is good news, to date the changes put into place have remained largely focused on supporting operations there. Sharing lessons between operations and institutionalization of those lessons are less apparent. For example, existing lessons from Iraq regarding EOF did not appear to migrate to Afghanistan, and lessons from Afghanistan regarding air-to-ground operations did not reach North Atlantic Treaty Organization (NATO) participants in Libya during Operation UNIFIED PROTECTOR (OUP). Further, a CIVCAS incident where a U.S. Navy ship engaged a small boat in the Persian Gulf and incidents regarding U.S. operations in Yemen and Pakistan (as reported in the international media) also suggest that the applicability of lessons regarding ways to minimize civilian casualties and mitigate their impact are not limited to Afghanistan. Former COMISAF, General David Petraeus, echoed this point, describing the enduring nature of the challenge of CIVCAS: “Avoiding civilian casualties is a central operational challenge in Afghanistan and Iraq and it will be a challenge in any future conflict as well.” Lessons learned in the past decade should therefore be looked at with an eye toward their application in future conflicts, as well as their continued importance to current operations in Afghanistan and elsewhere.

This paper identifies key CIVCAS lessons that are applicable to future operations conducted by the United States and its allies. These lessons were drawn from four years of analytic effort focused on understanding and effectively responding to the challenge of CIVCAS in Afghanistan, Iraq, and elsewhere. These lessons are not limited to COIN operations; rather, they apply to a wide range of potential combat activities, including major combat operations (in light of the political impact of CIVCAS during 1991 and 2003 Iraq wars), airpower-focused operations such as OUP in Libya, and counterterrorism operations such as the U.S. is currently conducting in Pakistan. Since each of these cases included an enemy that did not appropriately distinguish itself from the peaceful civilian population, these lessons should be particularly applicable in other, similar situations.