An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.

Hey Moscow, What About the ‘neuroweapons’ Used in Cuba attacks

General view of the U.S. Embassy in Havana after the U.S. government pulled more than half of its diplomatic personnel out of Cuba in September 2017. (Photo: Ernesto Mastrascusa/Getty Images)

Primer:

Neurotechnologies as Weapons of Mass Disruption or Future Asymmetric Warfare: Putative Mechanisms, Emerging Threats, and Bad Actor Scenarios

Intelligence agencies investigating mysterious “attacks” that led to brain injuries in U.S. personnel in Cuba and China consider Russia to be the main suspect, three U.S. officials and two others briefed on the investigation tell NBC News.

The suspicion that Russia is likely behind the alleged attacks is backed up by evidence from communications intercepts, known in the spy world as signals intelligence, amassed during a lengthy and ongoing investigation involving the FBI, the CIA and other U.S. agencies. The officials declined to elaborate on the nature of the intelligence.

The evidence is not yet conclusive enough, however, for the U.S. to formally assign blame to Moscow for incidents that started in late 2016 and have continued in 2018, causing a major rupture in U.S.-Cuba relations.

Since last year, the U.S. military has been working to reverse-engineer the weapon or weapons used to harm the diplomats, according to Trump administration officials, congressional aides and others briefed on the investigation, including by testing various devices on animals. As part of that effort, the U.S. has turned to the Air Force and its directed energy research program at Kirtland Air Force Base in New Mexico, where the military has giant lasers and advanced laboratories to test high-power electromagnetic weapons, including microwaves.

Although the U.S. believes sophisticated microwaves or another type of electromagnetic weapon were likely used on the U.S. government workers, they are also exploring the possibility that one or more additional technologies were also used, possibly in conjunction with microwaves, officials and others involved in the government’s investigation say.

The U.S. has said 26 government workers were injured in unexplained attacks at their homes and hotels in Havana starting in late 2016, causing brain injuries, hearing loss and problems with cognition, balance, vision and hearing problems. Strange sounds heard by the workers initially led investigators to suspect a sonic weapon, but the FBI later determined sound waves by themselves couldn’t have caused the injuries. More here.

*** Truth be told, this investigation and the details are rather disjointed and weird.

Four scientists, including the first doctor to examine the diplomats reporting symptoms in Cuba, took part in a Pentagon-sponsored teleconference on Friday, where they announced new research results, including what they determined to be the probable use of “neuroweapons” in what they called the Havana Effect.

At issue are the more than two dozen U.S. government officials stationed in Havana, who have described hearing strange sounds, followed by a combination of medical symptoms, including dizziness, hearing loss and cognitive problems. More recently, a similar case has been reported in a U.S. embassy worker in Guangzhou, China. For months, a mix of secrecy and speculation has surrounded those incidents, including an increasingly popular theory that the diplomats were the victims of microwave weapons.

Michael Hoffer, an otolaryngologist at the University of Miami, who was the first to conduct tests on the embassy workers, said on the Friday call that the diplomats are suffering from a  “neurosensory dysfunction,” which is primarily affecting their sense of balance.

The Friday call was organized as part of a study program sponsored by the Pentagon and titled “Probable Use of a Neuroweapon to Affect Personnel of US  Embassy in Havana: Findings, Pathology, Possible Causes, and Disruptive Effects.”

A Pentagon official told Yahoo News that the briefing was offered by the scientific team for interested people in the Defense Department and was to gain “general knowledge” about their findings. “This didn’t have an operational element,” the official said.  Read on from here.

More International Classified Material on Hillary’s Server

Ruh Roh…hope the statute of limitations does not apply here.

As a reminder:

When Clinton was running for president in 2008, she had a private server installed at her home in Chappaqua, New York. The domains clintonemail.com, wjcoffice.com, and presidentclinton.com, which were registered to a man named Eric Hoteham, all pointed to that server. In 2013, a Denver-based IT company called Platte River Networks was hired to manage the server, but wasn’t cleared to work with classified information. The company executives received death threats for taking on the contract. It was later discovered that multiple private servers were used for Clinton’s email.

Clinton used a BlackBerry phone to communicate during her tenure as secretary of state, including sending and receiving emails through her private server in New York. The State Department expressed concern about the security of the device. Clinton had requested the NSA provide a strengthened BlackBerry, similar to the one used by President Obama. But, her request was denied. Instead, the NSA requested that Clinton use a secure Windows Phone known as the Sectera Edge, but she opted to continue using her personal BlackBerry.

Hillary Clinton 'used Blackberry to send emails as she's ...

***

The classified material Hillary Clinton sent and received using an unsecure, private email server included correspondence with foreign leaders, according to documents obtained from the State Department by a government watchdog group.

Judicial Watch, which has called on Attorney General Jeff Sessions to order “an honest criminal investigation” of Clinton’s email practices while she was secretary of state, now awaits a federal judge’s Sept. 28 deadline for the State Department to finish sorting through the emails.

Judicial Watch President Tom Fitton last month said the classified information in Clinton emails uncovered by his team shows that then-FBI Director James Comey and other top FBI officials conducted a “sham investigation” into Clinton’s misuse of email as secretary of state.

“These classified Hillary Clinton emails that she tried to hide or destroy show why it is urgent that the DOJ [Department of Justice] finally undertake an honest criminal investigation,” Fitton said in a press release Aug. 16. “It is past time for Attorney General Jeff Sessions to order a new investigation of the Hillary Clinton email scandal.”

Comey, apparently without consulting then-Attorney General Loretta Lynch, told reporters in July 2016 that Clinton was careless in using her private email account for official business and transmitted classified information, but did not commit prosecutable offenses. President Donald Trump, who defeated Clinton in the November 2016 election, fired Comey in May 2017.

The FBI had uncovered 72,000 documents as part of its 2016 investigation into Clinton’s use of the private email server while serving as secretary of state under President Barack Obama from Jan. 21, 2009, to Jan. 31, 2013.

Judicial Watch, a Washington-based nonprofit that describes itself as promoting “integrity, transparency, and accountability in government,” last month released two new batches of Clinton emails (here and here) that it pried loose from the State Department.

Besides five instances of classified materials, the group said, the newly released Clinton emails contain messages about a meeting with billionaire financier George Soros and a memo to Clinton about a foreign government from a former top aide to her husband when he was president.

U.S. District Court Judge James E. Boasberg ordered the State Department to complete processing the Clinton emails by Sept. 28 in response to a Freedom of Information Act lawsuit brough by Judicial Watch.

It is not clear whether State will meet that deadline.

In its FOIA request filed initially in March 2015, Judicial Watch sought all emails sent or received by Clinton in her official capacity as secretary of state, “as well as all emails by other State Department employees to Secretary Clinton regarding her non-‘state.gov’ email address.”

The tens of thousands of Clinton emails include messages sent to her by a longtime aide, Huma Abedin. The FBI found emails from Abedin on the laptop of her estranged husband, former Rep. Anthony Weiner, D-N.Y., prompting Comey to briefly reopen the FBI probe days before the election on Nov. 8, 2016.

One chain of emails from Abedin, with the subject “Invites for the week,” refers to a two-hour meeting in Southampton, New York, with Soros, founder and chairman of Open Society Foundations, a New York-based international institution known for financing progressive political causes.

The emails referring to Soros do not include dates, but Judicial Watch investigators deduced they were written before November 2011, and perhaps as long ago as early 2009, based on individuals involved in the exchange and the timing of certain events. It is not clear whether the meeting took place.

Five messages in the just-released batch of Clinton emails include classified material, according to Judicial Watch.

For example, on June 7, 2011, Clinton received classified information on her unsecure email account from former British Prime Minister Tony Blair with regard to Blair’s Middle East negotiations with Israel, the Palestinians, and the French. Blair also forwarded the information to Jack Sullivan, who was Clinton’s deputy chief of staff.

On Jan. 26, 2010, Sullivan sent classified information through his own unsecure BlackBerry to Abedin’s State Department email address, information that he previously sent to Clinton’s and Abedin’s unsecure @clintonemail.com accounts.

The email, classified as confidential, concerned negotiations between the United Kingdom and Northern Ireland and included a “call sheet” Clinton received before making a call to political leaders in Northern Ireland.

Redacted portions appear to have contained the names of members of the left-wing Irish political party Sinn Fein, according to Judicial Watch. The Sinn Fein members had been invited to a meeting, but its purpose is not clear.

Northern Ireland was also the subject of a June 13, 2009, email from Sullivan to Clinton that was classified as confidential and almost entirely redacted by the State Department.

As previously reported, Clinton also received emails from Sid Blumenthal, a confidant and former senior adviser to President Bill Clinton, her husband. The Obama administration had barred Blumenthal from serving in the State Department under Clinton.

Yet the email messages obtained by Judicial Watch show that Blumenthal advised Hillary Clinton on government policy. In an April 8, 2010, memo that included information classified as confidential, for example, Blumenthal encouraged her to develop relations with the new government in Kyrgyzstan.

N Korean, Park Jin hyok Charged with Global Cyber Attacks

U.S. CHARGES NORTH KOREAN HACKER

Federal prosecutors charged a North Korean man, Park Jin-hyok, with crimes in connection with a series of costly cyberattacks around the globe, including the WannaCry ransomware attack in 2018, the heist of Bangladesh’s central bank in 2017, and the hack of Sony Pictures in 2014. It is the first time the Justice Department has explicitly charged a North Korean hacker backed by the government. Park was allegedly working as a programmer for a North Korean front company in China called Chosun Expo, which had ties to North Korea’s military intelligence.

Legal analysts say the complaint is the most detailed public accounting yet of North Korea’s cyberattacks against foreign adversaries. The Justice Department has now brought hacking-related charges against North Korea, China, Iran, and Russia. (WSJ, NYT, Reuters, DOJ)

Park Jin Hyok, named by officials as a member of the so-called Lazarus Group hacking team behind last year’s WannaCry global ransomware attack and the 2014 digital attack on Sony, apparently used not only advanced technology, but elaborate reconnaissance work to digitally steal money and sensitive information.

First, Park would obtain a number of email addresses of people affiliated with target businesses from traders dealing in large amounts of personal information. Then he would use the emails to gain an understanding of company employees’ fields of interest and personal relationships.

That would let him craft emails that could pass as genuine messages from major companies in content and style, a tactic known as spear phishing. After spending some time building trust, he would send the malicious links to websites that would infect a target’s computer.

In one case, Park apparently masqueraded as a human resources official at a U.S. defense-linked company to exchange messages with workers at one of the company’s competitors.

Last week’s charges were said to be the first in years against a North Korean hacker related to high-profile attacks linked to the state. The attack on Sony came as the company was preparing to release a movie called “The Interview,” which depicted the assassination of a character resembling North Korean leader Kim Jong Un. The group also allegedly stole $81 million from the central bank of Bangladesh in 2016.

A North Korean suspect is wanted by U.S. authorities on suspicion of hacking. (Courtesy of the U.S. Federal Bureau of Investigation)

“We stand with our partners to name the North Korean government as the force behind this destructive global cyber campaign,” Christopher Wray, director of the Federal Bureau of Investigation, said in a statement on Sept. 6.

The U.S. Treasury also imposed sanctions on Park and a Chinese business he was affiliated with. “We will not allow North Korea to undermine global cybersecurity to advance its interests and generate illicit revenues in violation of our sanctions,” Treasury Secretary Steven Mnuchin said in his own statement.

Under Kim, the North has consolidated its cyber forces under its Reconnaissance General Bureau, which handles overseas spying. The state has a team of 6,800, according to the South Korean government, and is counted as one of the five cyber powers along with the U.S., Russia, China and Israel.

The core of cyber operations is a team known as “Bureau 121,” established in 1998 by Kim’s father, then-leader Kim Jong Il. Bureau 121 is known for its willingness to commit crimes for the sake of bringing in cash.

“The technology behind North Korea’s cybercrimes is some of the most advanced in the world,” said a source with the U.S. State Department.

Governments and businesses around the world are hurrying to guard themselves from the North’s attacks even as its methods grow more sophisticated. Further cooperation between countries’ cyberdefense authorities may be key to finding effective solutions.

British Airways: The airline said a “very sophisticated” hacker stole credit card details of hundreds of thousands of its customers in recent days. Anyone who lost out financially as a result of the breach would be compensated, BA officials said. (Reuters)

JPMorgan Hacker: A Russian man, Andrei Tyurin, has been extradited by Georgia to the United States on charges that he participated in the 2014 hack of JPMorgan Chase and other U.S. companies. (Reuters)

Care Center Owners Charged with Human Trafficking

And there are at least 50 criminal counts against the owners…..a sanctuary state eh?

Rainbow Bright Adult Residential Facility in South San Francisco, CA provides Assisted Living services.

The staff at Rainbow Bright Adult Residential Facility provide personalized services designed to meet the needs of every patient. The dedicated health professionals offer the assistance you need while respecting your independence.

Rainbow Bright Adult Residential Facility is a licensed care provider with the State of California. The California Department of Social Services provides a list of registered care providers in California.

CA Family Arrested Charged Running Human Trafficking Ring ...

Owners of senior and child care centers charged with human trafficking

A family of four running several senior and child care centers in San Mateo County has been charged with human trafficking and other labor-related charges, California Atty. Gen. Xavier Becerra said Friday.

The defendants — Joshua Gamos, 42; Noel Gamos, 40; Gerlen Gamos, 38; and Carlina Gamos, 67 — are accused of holding employees of the Rainbow Bright day-care centers against their will, failing to pay them minimum wage and overtime pay, and abusing them verbally, physically and psychologically.

The alleged abuse took place between 2008 and 2017, according to the complaint.

The charges are the result of a yearlong investigation by the attorney general’s office’s Tax Recovery and Criminal Enforcement Task Force, which involved the collaboration of multiple agencies including the U.S. Department of Labor and law enforcement departments in Daly City, South San Francisco and Pacifica.

While serving the arrest warrants, officials seized 14 illegal assault weapons, three of which were “ghost gun” rifles without serial numbers, according to a statement released by Becerra’s office.

The Gamoses are charged with 59 criminal counts, including human trafficking, rape and grand theft.

The four family members allegedly targeted Filipinos who were living in the U.S. illegally or otherwise vulnerable by posting ads in a local Filipino newspaper. According to the complaint, employees at multiple Rainbow Bright facilities were promised food and a room to sleep in for their work as live-in caregivers for developmentally delayed adults. They were told they would work eight hours a day for five days a week and receive a monthly salary of between $1,000 and $1,200.

But according to the complaint, employees were made to work 24 hours a day, seven days a week with no increase in pay, sometimes with only a few hours of sleep a night. At times, they were not allowed to communicate with one another.

If the employees didn’t behave properly in the eyes of the owners, according to the complaint, they would be punished, sometimes with a decrease in pay or threats that they would be deported.

The owners also withheld employees’ passports on the pretext that they would help employees with their immigration status, the complaint said. In some cases they kept the passports until the employees were fired or quit.

The complaint also alleges that Joshua and Noel Gamos offered female employees gifts in exchange for sex acts. Joshua Gamos is also accused of raping employees on multiple occasions, according to the complaint.

“No worker in the United States should live in fear or be subjected to violence, abuse or exploitation at the hands of their employer,” Becerra said in a statement. “We must not turn a blind eye to abusive labor practices. Report it, and we will investigate and prosecute.”

CIA Files on al Qaeda/bin Ladin leading up to 9/11

The collection includes rarely released CIA emails, raw intelligence cables, analytical summaries, high-level briefing materials, and comprehensive counterterrorism reports that are usually withheld from the public because of their sensitivity. Today’s posting covers a variety of topics of major public interest, including background to al-Qaeda’s planning for the attacks; the origins of the Predator program now in heavy use over Afghanistan, Pakistan and Iran; al-Qaeda’s relationship with Pakistan; CIA attempts to warn about the impending threat; and the impact of budget constraints on the U.S. government’s hunt for bin Laden.

The documents released by CIA detail the meticulousness of al-Qaeda’s plot against the United States and CIA attempts to counter the rising terrorist threat. A previously undisclosed raw intelligence report that became the basis for the December 4, 1998, President’s Daily Brief notes that five years before the actual attack, al-Qaeda operatives had successfully evaded security at a New York airport in a test-run for bin Laden’s plan to hijack a U.S. airplane. [1998-12-03]. CIA analytical reports also provide interesting insights into al-Qaeda’s evolving political strategies. “In our view, the hijackers were carefully selected with an eye to their operational and political value. For instance, the large number of Saudi nationals was most likely chosen not only because of the ease with which Saudi nationals could get US visas but also because Bin Ladin could send a message to the Saudi Royal family.” [2003-06-01]

Reports on early attempts to apprehend bin Laden detail the beginning of the U.S. Predator drone program in Afghanistan and Pakistan. “First Predator mission over Afghanistan [excised] September 7, 2000.” [1] “Twice in the fall of 2000, the Predator observed an individual most likely to be Bin Ladin; however we had no way at the time to react to this information.” [2004-03-19] American UAVs did not have sufficient weapons capabilities at the time the CIA likely spotted bin Laden in 2000 to fire on the suspect using the UAV.

Al-Qaeda’s ties to Pakistan before September 11 are also noted in several documents. “Usama ((Bin Ladin))’s Islamic Army considered the Pakistan/Afghanistan area one region. Both Pakistan and Afghanistan serve as a regional base and training center for Islamic Army activities supporting Islamic insurgencies in Tajikistan, the Kashmir region and Chechnya. [Excised] The Islamic Army had a camp in Pakistan [Excised] purpose of the camp was to train and recruit new members, mostly from Pakistan.” [1997-07-14] While, “UBL elements in Pakistan reportedly plan to attack POTUS [U.S. President Clinton’s] plane with [excised] missiles if he visits Pakistan.” [2000-02-18]

Similar to the 9/11 Commission Report, the document collection details repeated CIA warnings of the bin Laden terrorist threat prior to September 11. According to a January 2000 Top Secret briefing to the Director of Central Intelligence, disruption operations against the Millennium plot “bought time… weeks… months… but no more than one year” before al-Qaeda would strike. [2000-01-07] “A UBL attack against U.S. interests could occur at any time or any place. It is unlikely that the CIA will have prior warning about the time or place.” [1999-08-03] By September 2001, CIA counterterrorism officials knew a plot was developing but couldn’t provide policymakers with details. “As of Late August 2001, there were indications that an individual associated with al-Qa’ida was considering mounting terrorist operations in the United States, [Excised]. No further information is currently available in the timing of possible attacks or on the alleged targets in the United States.” [2001-08-24]

Despite mounting warnings about al-Qaeda, the documents released today illustrate how prior to September 11, CIA counterterrorism units were lacking the funds to aggressively pursue bin Laden. “Budget concerns… CT [counterterrorism] supplemental still at NSC-OMB [National Security Council – Office of Management and Budget] level. Need forward movement on supplemental soonest due to expected early recess due to conventions, campaigning and elections. Due to budgetary constraints… CTC/UBL [Counterterrorism Center/Osama bin Laden Unit] will move from offensive to defensive posture.” [2000-04-05]

Although the collection is part of a laudable effort by the CIA to provide documents on events related to September 11, many of these materials are heavily redacted, and still only represent one-quarter of the CIA materials cited in the 9/11 Commission Report. Hundreds of cited reports and cables remain classified, including all interrogation materials such as the 47 reports from CIA interrogations of Khalid Sheikh Mohammed from March 24, 2003 – June 15, 2004, which are referenced in detail in the 9/11 Report.

Highlights of the CIA September 11 Document Collection Include:

  • The 1998 Raw Intelligence Report on UBL’s Plans to Hijack an Airplane that Became an Item in the December 4, 1998 President’s Daily Brief [1998-12-03].
    • The report details how bin Laden was planning “new operations against the United States (U.S.) targets in the near future. Plans to hijack a U.S. aircraft were proceeding well. Two individuals from the relevant operational team in the U.S. had successfully evaded security checks during a trial run at “New York airport [excised].”
  • Internal CIA E-mails on Osama bin Laden
    • 1998-05-05 – “[Title Excised]” “Planning for the UBL Rendition is Going Very Well,” To: Michael F. Scheuer, From: [Excised], Central Intelligence Agency Email. Cited in 9/11 Commission Report as “Capture Op,” “[Gary] Schroen to Mike.” [Chapter 4, Endnote 22 9/11 Commission Report]
    • 1998-12-20 – “Re: urgent re ubl,” Note For: Michael F. Scheuer, From: [Excised], Central Intelligence Agency Email. Cited in 9/11 Commission Report as “[Gary] Schroen to Mike” [Chapter 4, Endnotes 117, 119 9/11 Commission Report]
    • 1998-12-21 – “your note,” Note For: [Excised], From: Michael F. Scheuer, Central Intelligence Agency Email. Cited in 9/11 Commission Report as “Mike to [Gary] Schroen,” [Chapter 4, Endnote 119 9/11 Commission Report]
    • 1999-05-17 – “your note,” From Michael F. Scheuer, To [Excised], Central Intelligence Agency Email. Cited in 9/11 Commission Report as “Mike to [Gary] Schroen” [Chapter 4, Endnote 174 9/11 Commission Report]
    • 2001-05-15 – “[Excised] Query [Excised].” Central Intelligence Agency Email. Cited in 9/11 Commission Report as “Dave to John.” [Chapter 8, Endnote 72 9/11 Commission Report]
    • 2001-05-24 – [Title Excised] “Agee (sic) we need to compare notes,” Central Intelligence Agency Email. Cited in 9/11 Commission Report as “Dave to John.” [Chapter 8, Endnote 64 9/11 Commission Report]
    • 2001-07-13 – “[Excised] Khalad [Excised],” Central Intelligence Agency Email. Cited in 9/11 Commission Report as “Richard to Alan” [Chapter 8, Endnote 64 9/11 Commission Report]
    • 2001-08-21 – “Re: Khalid Al-Mihdhar,” Memorandum, Central Intelligence Agency Email. Cited in 9/11 Commission Report as “Mary to John.” [Chapter 8, Endnote 106 9/11 Commission Report]
  • Two Definitive CIA Reports on the September 11, 2001 Attacks
    • 2003-06-01 – “11 September: The Plot and the Plotters,” CTC 2003-40044HC, Central Intelligence Agency Intelligence Report.
      [Chapter 5, Endnotes 42, 60, 61, 64, 70, 105, Chapter 7, Endnotes 45, 52, 60, 83, 86, 92, 94, 95, 96, 97, 105 9/11 Commission Report]

      This document is a comprehensive CIA history of the 9/11 attack. Analysis includes notes on al-Qaeda, the evolution of the plot, terrorist techniques, timelines and detailed hijacker profiles.

    • 2004-03-19 – “DCI Report: The Rise of UBL and Al-Qa’ida and the Intelligence Community Response,” Draft, Central Intelligence Agency Analytic Report. [Chapter 2, Endnote 67]

      This document is a detailed summary of CIA efforts to apprehend Osama bin Laden from 1989-2004. Highlights include:

        • Agency notes on bin Laden’s evolution from “terrorist financier” in the early 1990s to a significant threat to U.S. interests by mid-1990.
        • Discussions and debates regarding the use of Predator drones as early as 2000. [2]
        • Critiques of FBI information systems as impediments to counterterrorism efforts – “A major, ongoing concern is FBI’s own internal dissemination system. CIA officers still often find it necessary to hand-deliver messages to the intended recipient within the FBI. In additional FBI has not perfected its FI reporting system and headquarters-field communications so dissemination of intelligence outside of FBI is still spotty.” And the report confirms suggestions by the 9/11 Commission Report that “the different organizational culture and goals of the FBI and CIA sometimes get in the way of desired results.” (p. 22)
        • A group of Afghan trial leaders worked with the CIA on the UBL issue, but “[Excised] judged to be unlikely to successfully attack a heavily guarded Bin Ladin.” “Masood has to be engaged to help in the attempt to capture Bin Ladin, but with the understanding that he would be his own man, never an agent of surrogate of the US government… Even if he agreed to do so, his chances of success against the Taliban were judged to be less than five percent.” (p. 58)Note “DIF” written on multiple pages stands for “Denied in Full”
  • A Series of CIA Senior Executive Intelligence Briefs (SEIBS) from June-September 2001 Warning of “Imminent” Al-Qaeda Attacks:
    • 2001-06-23 – “International: Bin Ladin Attacks May Be Imminent [Excised]” Senior Executive Intelligence Brief. [Chapter 8, Endnote 14, See also p. 257 9/11 Commission Report]
    • 2001-06-25 – “Terrorism: Bin Ladin and Associates Making Near-Term Threats,” Senior Executive Intelligence Brief. [Chapter 8, Endnotes 12, 14]
    • 2001-06-30 – “Terrorism: Bin Laden Planning High Profile Attacks [Excised],” Senior Executive Intelligence Brief. [Chapter 8, Endnote 12]
    • 2001-07-02 – “Terrorism: Planning for Bin Ladin Attacks Continues, Despite Delay [Excised],” Senior Executive Intelligence Brief. [Chapter 8, Endnote 18]
    • 2001-07-13 – “Terrorism: Bin Ladin Plans Delayed but Not Abandoned [Excised],” Senior Executive Intelligence Brief. [Chapter 8, Endnote 28]
    • 2001-07-25 – “Terrorism: One Bin Ladin Operation Delayed, Others Ongoing [Excised],” Senior Executive Intelligence Brief. [Chapter 8, Endnote 28]
    • 2001-08-07 – “Terrorism: Bin Ladin Determined to Strike in the US,” Senior Executive Intelligence Brief. [Chapter 8, Endnote 38. Chapter 11, Endnote 5. Page 342]
  • Detailed Reports on Al-Qaeda Organization
    • “The spike in the network’s activity stems in part from changes in Bin Ladin’s practices. To avoid implicating himself and his Taliban hosts, Bin Ladin over the past two years has allowed cells in his network, al-Qa’ida, to plan attacks more independently of the central leadership and has tried to gain support for his agenda outside the group. – The network also has benefited from a sharp increase in mujahidin recruitment since the resumption of the conflict in Chechnya in 1999, which exposed a new generation of militants to terrorist techniques and extremist ideology through training at al-Qai’da-run camps in Afghanistan. – Violence between Israelis and the Palestinians, moreover is making Sunni extremists more willing to participate in attacks against US or Israeli interests.” 2001-02-06 – “Sunni Terrorist Threat Growing,” Senior Executive Intelligence Brief, The Central Intelligence Agency. [Chapter 8, Endnote 4 9/11 Commission Report]
  • Bin Laden’s Attempts to Acquire Weapons of Mass Destruction
  • A Positive CIA Assessment of CIA Counterterrorism Capabilities in August 2001
    • In contrast to the findings of the 9/11 Commission Report and a 2004 CIA Office of Inspector General’s review of its pre-9/11 counterterrorism practices, a report completed in August 2001 by the CIA Inspector General gives very positively reviews to CIA counterterrorism practices, the management of information and interagency cooperation. “CTC fulfills inter-agency responsibilities for the DCI by coordinating national intelligence, providing warning, and promoting the effective use of Intelligence Community resources on terrorism issues. The Center has made progress on problems identified at the time of the last inspection in 1994 – specifically its professional relationship with the Federal Bureau of Investigation.

For the document list including why Iraq, go here.