A 2002 report (pdf) prepared by the CIA Counterterrorist Center discusses how terrorists recruit members in prisons such as Guantanamo Bay.
“Terrorists groups, including al-Qa’ida, use incarcerated members to recruit and train new members, and in some cases run terrorist organizations and manage or facilitate terrorist attacks.”
The classified CIA report was previously published on the web site The Smoking Gun.
See “Terrorists: Recruiting and Operating Behind Bars,” CIA Counterterrorism Center, August 20, 2002.
The last page of the document provides an extensive list of sources which are numbered — “but the numbers aren’t keyed to the text,” noticed former CIA analyst Allen Thomson.
He recalled being puzzled by this practice of decoupling the sources from the text more than two decades ago, and investigating the matter at the time.
“The list of sources wasn’t kept for reasons of documenting the reasoning that went into publications,” Mr. Thomson explained. “It was solely a security requirement so that, should somebody think that information had been published at too low a level of classification, the matter could be checked. Curiously, there was no master copy with the sources keyed to the text to aid in such security checking, so I suspect that checking was seldom done, if ever.”
To increase the real and perceived benefit of research funding, funding agencies should develop challenge goals for their extramural research programs focused on the impact portion of their mission.
Without trusted mechanisms to ensure privacy while enabling secure data access, essential R&D stalls, educational innovation stalls, and U.S. global competitiveness suffers.
Satellite imagery has long served as a tool for observing on-the-ground activity worldwide, and offers especially valuable insights into the operation, development, and physical features related to nuclear technology.
This year’s Red Sky Summit was an opportunity to further consider what the role of fire tech can and should be – and how public policy can support its development, scaling, and application.