KUWAIT: The Call for Jihad, which was released by Al-Qaeda shells media department, called upon the youth from GCC countries to join it and get ready for a war in the area. This call as seen by a political activist, is warmly welcomed and accepted by many people, such acceptance was not available five years ago.
The invitation appeared in the internet and contained the following, "For those who want to perform jihad and to be one of Gods soldiers, for those who wish to sacrifice themselves in the name of God, for whoever wants to join in and be with the beloved Mohammad and his friends, for those who are honest in wanting martyrdom for everyone who felt pain for what is happening in the Muslim world, for those who saw the Muslim children cut into pieces, to all Muslims in general, for the heroes of this nation, we start a full programme for training and educating the heroes to fight the Jews and crusaders and to become the protective shield of Islam."
Mubarak Al-Bathali, the Islamist activist said that there is a huge response from the youths in GCC states for the call, and this acceptance was not there five years back. He added that these people are getting ready for a possible war in the area. Al-Bathali said those who join these courses keep it a secret to avoid getting punished by their government. Some of these courses lasts for three weeks and some for several months.
http://www.judeoscope.ca/breve.php3?id_breve=3485
Spain monitoring over 200 Islamist suspects
Sunday 15 April 2007
Spains security services are monitoring more than 200 suspected Islamist radicals following Al Qaedas threats against the country, a Spanish daily reported yesterday.
The security forces have more than 200 radical Islamist objectives under surveillance at the moment, said the conservative ABC newspaper, citing sources working in the anti-terrorism field. We are talking about people who, in the short- or medium-term could join terrorist cells or take part in support activities, financing, proselytism, or both, said the daily.
The surveillance, which has included phone taps and the tailing of individuals, has been directed in particular toward people from north Africa, the Sahel region and some members of the Pakistani community, said the paper.
http://www.judeoscope.ca/breve.php3?id_breve=3494
U.S. Shuts Morocco Consulate After Bomb
Apr 15, 2007 7:49 PM EDT
RABAT, Morocco (AP) -- The U.S. closed its consulate in Casablanca indefinitely on Sunday to review security a day after a suicide bombing beside the building, the U.S. Embassy said.
Excerpted
WASHINGTON: President General Pervez Musharraf has rejected absolutely and totally the prospect of joint US-Pakistan military operations to pursue retreating insurgents inside Pakistan. The whole population of Pakistan will rise against it, he told CBS news channel in an interview.
Pakistan is being maligned by the West unfairly in criticism that it is not doing enough to root out terrorists on its soil and to help crush the Taliban movement in Afghanistan, he said. He blamed the criticism on a total lack of understanding of the environment and reality by President Hamid Karzai himself. Asked if he was angry with Karzai, he replied: Yes, indeed. Very angry.
Musharraf dismissed as absolute nonsense a claim by Karzai that Taliban leader Mullah Omar was hiding in Pakistan. He is in south Afghanistan somewhere. He is not in Pakistan, although President Karzai and everyone keeps saying he is in Quetta - absolute nonsense, absolute total nonsense- he has never been in Pakistan.
Excerpted
http://www.dailytimes.com.pk/default.asp?page=2007/04/15/story_15-4-2007_pg1_1
Al Qaeda's Maritime Threat
April 15, 2007
I. Introduction
II. Definition of Maritime Terrorism
III. Historical overview
IV. Al Qaeda Background
V. Wake-up calls
VI. Analyzing the USS Cole Incident
A. Abdul al-Rahim al-Nashiri
B. Planning Cycle Recruitment
C. Planning Cycle Preparation
D. Planning Cycle Procurement
E. Planning Cycle Conclusion
VII. Post USS Cole Attack Skims
VIII. Global Maritime Trade Links
A. Weaknesses Vessels
B. Weaknesses Ports
C. Weaknesses Containers
IX. Response
X. Conclusion
XI. Bibliography
Excerpted