Al Qaeda and Affiliates: Historical Perspective, Global Presence, and Implications for U.S. Policy

Al Qaeda and Affiliates: Historical Perspective, Global Presence, and Implications for U.S. Policy

Date: January 25, 2011
Creator: Rollins, John
Description: The focus of this report is on the history of Al Qaeda, known (or attributed) actions, suspected capabilities of the organization and non-aligned entities, and an analysis of select regional Al Qaeda affiliates.
Contributing Partner: UNT Libraries Government Documents Department
2012-2013 Presidential Election Period: National Security Considerations and Options

2012-2013 Presidential Election Period: National Security Considerations and Options

Date: October 5, 2012
Creator: Rollins, John
Description: This report discusses historical national security-related presidential transition activities, provides a representative sampling of national security issues a new Administration may encounter, and offers considerations and options relevant to each of the five phases of the presidential election period. Each phase has distinct challenges and opportunities for the incoming Administration, the outgoing Administration, and Congress. This report is intended to provide a framework for national security considerations during the current election period and will be updated to reflect the election outcome.
Contributing Partner: UNT Libraries Government Documents Department
Osama bin Laden's Death: Implications and Considerations

Osama bin Laden's Death: Implications and Considerations

Date: May 5, 2011
Creator: Rollins, John.
Description: This report discusses issues and questions related to the killing of Osama bin Laden (OBL), which are multifaceted and may have operational, regional, and policy implications. Operational policy issues include congressional notification, legal considerations, and current and future military activities.
Contributing Partner: UNT Libraries Government Documents Department
"Gang of Four" Congressional Intelligence Notifications

"Gang of Four" Congressional Intelligence Notifications

Date: November 19, 2012
Creator: Rollins, John & Lange, Rebecca S.
Description: Report that reviews the history of the Gang of Four intelligence notification process and compares this procedure with that of the "Gang of Eight" notification procedure.
Contributing Partner: UNT Libraries Government Documents Department
Terrorist Use of the Internet: Information Operations in Cyberspace

Terrorist Use of the Internet: Information Operations in Cyberspace

Date: March 8, 2011
Creator: Theohary, Catherine A. & Rollins, John
Description: This report describes the ways that international terrorists and insurgents use the Internet, strategically and tactically, in pursuit of their political agendas.
Contributing Partner: UNT Libraries Government Documents Department
U.S. Citizens Kidnapped by the Islamic State

U.S. Citizens Kidnapped by the Islamic State

Date: October 17, 2014
Creator: Rollins, John W. & Rosen, Liana
Description: This report briefly discusses the Islamic State's (IS, or alternatively, Islamic State in Iraq and the Levant, ISIL, or Islamic State in Iraq and Syria, ISIS) kidnapping of American citizens and the implications for congressional response.
Contributing Partner: UNT Libraries Government Documents Department
Terrorism and Transnational Crime: Foreign Policy Issues for Congress

Terrorism and Transnational Crime: Foreign Policy Issues for Congress

Date: June 11, 2013
Creator: Rollins, John & Wyler, Liana Sun
Description: This report provides an overview of transnational security issues related to patterns of interaction among international terrorist and crime groups. In addition, the report discusses the U.S. government's perception of and response to the threat. It concludes with an analysis of foreign policy options.
Contributing Partner: UNT Libraries Government Documents Department
International Terrorism and Transnational Crime: Security Threats, U.S. Policy, and Considerations for Congress

International Terrorism and Transnational Crime: Security Threats, U.S. Policy, and Considerations for Congress

Date: March 18, 2010
Creator: Rollins, John & Wyler, Liana Sun
Description: This report provides a primer on the confluence of transnational terrorist and criminal groups and related activities abroad. It evaluates possible motivations and disincentives for cooperation between terrorist and criminal organizations, variations in the scope of crime-terrorism links, and the types of criminal activities--fundraising, material and logistics support, and exploitation of corruption and gaps in the rule of law--used by terrorist organizations to sustain operations.
Contributing Partner: UNT Libraries Government Documents Department
NSA Surveillance Leaks: Background and Issues for Congress

NSA Surveillance Leaks: Background and Issues for Congress

Date: September 4, 2013
Creator: Rollins, John W. & Liu, Edward C.
Description: This report discusses the specifics of these two NSA collection programs. The first program collects in bulk the phone records--including the number that was dialed from, the number that was dialed to, and the date and duration of the call--of customers of Verizon and possibly other U.S. telephone service providers. The second program targets the electronic communications, including content, of foreign targets overseas whose communications flow through American networks.
Contributing Partner: UNT Libraries Government Documents Department
International Terrorism and Transnational Crime: Security Threats, U.S. Policy, and Considerations for Congress

International Terrorism and Transnational Crime: Security Threats, U.S. Policy, and Considerations for Congress

Date: January 5, 2010
Creator: Rollins, John; Wyler, Liana Sun & Rosen, Seth
Description: This report provides a primer on the confluence of transnational terrorist and criminal groups and related activities abroad. It evaluates possible motivations and disincentives for cooperation between terrorist and criminal organizations, variations in the scope of crime-terrorism links, and the types of criminal activities--fundraising, material and logistics support, and exploitation of corruption and gaps in the rule of law--used by terrorist organizations to sustain operations.
Contributing Partner: UNT Libraries Government Documents Department
FIRST PREV 1 2 NEXT LAST