The First Possible Prosecution from the Durham Investigation

Durham “has told the Justice Department that he will ask a grand jury to indict a prominent cybersecurity lawyer on a charge of making a false statement to the FBI,” the New York Times reported on Wednesday, citing “people familiar with the matter.”

Sussmann’s lawyers, Sean M. Berkowitz and Michael S. Bosworth, acknowledged Wednesday that they expected him to be indicted, but denied wrongdoing.

“Mr. Sussmann has committed no crime,” they told the Times. “Any prosecution here would be baseless, unprecedented and an unwarranted deviation from the apolitical and principled way in which the Department of Justice is supposed to do its work. We are confident that if Mr. Sussmann is charged, he will prevail at trial and vindicate his good name.

Durham has until the weekend to charge Sussmann because of a five-year statute of limitations, the newspaper said. source

Michael Sussmann (@michaelsuss) | Twitter

Breaking report from the New York Times (Savage and Goldman, et al.): Special Counsel John Durham “will ask a grand jury to indict” former DNC/Clinton campaign lawyer (and Perkins Coie partner) Michael Sussman for giving false statements. The false statement charges would relate to a September 19, 2016 meeting FBI lawyer James Baker had with Sussman, where Sussman relayed to the FBI the discredited theory that the Trump Organization was communicating with Alfa Bank.

The New York Times states:

Mr. Baker, the former F.B.I. lawyer, is said to have told investigators that he recalled Mr. Sussmann saying that he was not meeting him on behalf of any client.

This was contradicted by (1) Sussman’s testimony to Congress; and (2) Sussman’s own billing records. Sussman’s lawyers acknowledged “they expected him to be indicted.”

As to Sussman’s testimony, here is a portion where he discusses the Alfa Bank information was given to him by a client.

As we have discussed, the New Yorker first reported back in 2020 that Durham had impaneled a grand jury relating to the false Alfa Bank/Trump Organization story. There is the potential that former Feinstein staffer Daniel Jones – as well as the researches behind the Alfa Bank matter – will also face charges of giving false information to federal officials.

More recently, we noted that Fusion GPS has been fighting to keep secret its communications about Trump/Alfa Bank secret in a civil suit. Court records we reviewed appear to show the degree with which Fusion GPS, Glenn Simpson, and their associates went in drafting and promoting the false Alfa Bank/Trump Organization story.

One court document of interest is this August 26, 2016 e-mail from Fusion GPS to Michael Sussman.

That Fusion GPS-Sussman correspondence occurred not long before Sussman met with FBI General Counsel James Baker weeks later.

The e-mails correspond to the dates the Alfa Bank/Trump Organization was getting media exposure. One has to wonder what other correspondence Sussman had with Fusion GPS.

Questions have long been asked about Sussman’s involvement in the potential cover-up of the DNC hack in 2016. It was Sussman who brought in CrowdStrike (given his close relationship with founder Shawn Henry) to look into the DNC hack. According to Politico:

In late April [2016], the DNC’s IT department noticed some suspicious behavior and contacted DNC chief executive officer Amy Dacey, according to a DNC official. Dacey reached out to DNC lawyer Michael Sussmann, a partner at the Perkins Coie law firm and a former federal prosecutor specializing in cybercrimes. Sussmann called Shawn Henry, the president of cybersecurity firm CrowdStrike, to get his company’s help.

This CrowdStrike/Perkins Coie links put into perspective this information in the the New York Times article, where Durham

has been pursuing a theory that the Clinton campaign used Perkins Coie to submit dubious information to the F.B.I. about Russia and Mr. Trump in an effort to gin up investigative activity to hurt his 2016 campaign.

If that is the case, then we doubt it would be limited to the Alfa Bank allegations.

Future Developments

We’ll be following the Sussman story closely and will post the charging documents and criminal information once – or if – Durham gets the indictment. (hat-tip)

***

When Fox News anchor Bret Baier asked about the origin of the infamous Trump dossier, James Comey brushed off most of the questions. The former Federal Bureau of Investigations director said someone on his “senior staff”—he couldn’t remember who—had “briefed” him on the dossier “sometime in the fall” of 2016. Mr. Comey had been told it came “from a reliable source.” He insisted he “never knew exactly which Democrats had funded” it. He then continued on about his book, which meditated on the importance of “truth.”

Testifying before a joint session of the House Judiciary and Oversight Committees, Mr. Baker said Mr. Sussmann approached him. The contact was initiated before the FBI and Justice Department applied for a Foreign Intelligence Surveillance Act warrant for key Trump campaign figure Carter Page, according to the Daily Caller’s report.

Mr. Baker was instrumental in obtaining the warrants for Mr. Page. source

General Milley Says China is not an Enemy

It was 2017 when General Milley said China is not an enemy.

Well let’s go back to some facts shall we?

Has General Milley even met FBI Director Chris Wray?

The counterintelligence and economic espionage efforts emanating from the government of China and the Chinese Communist Party are a grave threat to the economic well-being and democratic values of the United States.

The Chinese government is employing tactics that seek to influence lawmakers and public opinion to achieve policies that are more favorable to China.

At the same time, the Chinese government is seeking to become the world’s greatest superpower through predatory lending and business practices, systematic theft of intellectual property, and brazen cyber intrusions.

China’s efforts target businesses, academic institutions, researchers, lawmakers, and the general public and will require a whole-of-society response. The government and the private sector must commit to working together to better understand and counter the threat.

Then, the New York Times publishes an article on April 13, 2021 titled: ‘China Poses Biggest threat to U.S., Intelligence Report Says’

Sure, it is several years later but and after Milley says he has known his CCP counterpart for 5 years…there is this –>May be an image of text that says 'Milley reportedly made the calls before the 2020 presidential election on Oct. 30, 2020, and two days after the Jan. 6 Capitol riot, on Jan. 8, 2021, and assured Zuocheng of the stability of the American government. He also allegedly assured the Chinese general that he would contact him regarding any imminent attack from the U.S. in the waning days of Trump's presidency.'

and this –>

May be an image of text that says 'Four #ChineseWarships, including a Chinese destroyer, have sailed into the United States' exclusive economic zone. Chinese state-run media says this is a warning to the United State about China's naval capabilities.'

The Annual Threat Assessment of the Intelligence Community published on April 9, 2021 is here in full. 

The 112th Congress held a hearing (House Foreign Affairs Committee) on May 28, 2012 titled: Investigating the Chinese Threat, Part I: Military and Economic Aggression. 

How about APT 40 (Advanced Persistent Threat) published by CISA? Can we really safeguard our trade secrets, intellectual property and infrastructure from the Chinese cyber war? Did General Milley discuss any of this in any other phone calls with his Chinese Communist Party counterpart?

China hacked Microsoft. Chinese hacking goes back several years. How about NASA, the World Bank, the State Department (East Asia Division), the Commerce Department, the Naval War College or the Lockheed Martin F-35 fighter program?

Remember when President Obama removed all CIA operatives from China? That was because the Chinese military was killing our operatives in country. How did they know?

CHINA USED STOLEN DATA TO EXPOSE CIA OPERATIVES IN AFRICA AND EUROPE
The discovery of U.S. spy networks in China fueled a decadelong global war over data between Beijing and Washington. 

Around 2013, U.S. intelligence began noticing an alarming pattern: Undercover CIA personnel, flying into countries in Africa and Europe for sensitive work, were being rapidly and successfully identified by Chinese intelligence, according to three former U.S. officials. The surveillance by Chinese operatives began in some cases as soon as the CIA officers had cleared passport control. Sometimes, the surveillance was so overt that U.S. intelligence officials speculated that the Chinese wanted the U.S. side to know they had identified the CIA operatives, disrupting their missions; other times, however, it was much more subtle and only detected through U.S. spy agencies’ own sophisticated technical countersurveillance capabilities.

In part:

More than a thousand visiting researchers from China working at US universities have left the country since the summer, according to John Demers, chief of the Department of Justice’s national security division. This exodus comes as the Department of Justice has intensified its investigations of espionage by scientists at US institutions who are secretly affiliated with the Chinese government or military.

This summer, the Department of Justice has had at least five researchers from China arrested. They all had US visas but hadn’t disclosed their affiliations with the Chinese Communist party or military in their visa applications, Demers explained at a 2 December virtual summit of the Aspen Institute, a global non-profit think tank based in Washington DC. Those handful of arrests were ‘just the tip of the iceberg’, Demers stated.

‘Between those five or six arrests, and the dozens of interviews that the [FBI]  did with individuals who were here under similar circumstances … more than 1000 [People’s Liberation Army]-affiliated Chinese researchers left the country,’ he claimed.

It appears that those departures were in addition to about a thousand Chinese graduate and postgraduate students whose visas were revoked by the State Department back in September under a ‘proclamation’ announced by outgoing President Trump. That directive prohibited individuals from studying or conducting research in the US if they were found to have links with the Chinese government or its military.

Bill Evanina, the US government’s top counterintelligence official, said at the summit that of the 1000-plus Chinese researchers who left the US he is ‘most concerned about the graduate-level students’. These researchers all came to the US ‘at the behest of the Chinese government and intelligence services’, and are going to particular universities to study specific fields that are expected to benefit China, he claimed.

***

CHICAGO (WLS) — The spy case against a former U.S. Army reservist and student at Illinois Institute of Technology wasn’t a one-man espionage show, according to federal investigators.

Ji Chaoqun’s federal court appearance in Chicago on Thursday is routine, in an anything-but-normal case. Chaoqun is charged against the backdrop of a possibly wider Chinese scheme to siphon intelligence information overseas.

Chaoqun and a similarly-accused spyman in Cincinnati, Ohio, shared the same foreign connection according to authorities, what’s known in intelligence circles as a “handler.” That link is pointed out in federal court records examined by the I-Team.

Chinese national Chaoqun, 30, is charged with providing intelligence officials in China with background check information on eight American citizens including defense contractors, federal investigators say. He had arrived in Chicago in 2013 with a student visa to study electrical engineering at IIT on the South Side but since being arrested has been locked up at the Metropolitan Correctional Center in the Loop for allegedly violating America’s Foreign Agents Registration Act.

In the Cincinnati case, Yanjun Xu is being held on charges he tried to steal trade secrets from GE Aviation, the giant military contractor and manufacturer. Xu, 40, is accused of downloading GE Aviation records onto his personal laptop and then smuggling them on a flight to China. As part of the charged scheme, federal authorities said Xu had posed as a technology association official and invited a GE Aviation employee to travel to China for a presentation. Xu became the first suspected Chinese intelligence official ever extradited to the U.S. He was arrested in Belgium and is now being detained at the federal penitentiary in Milan, Michigan.

So, what’s the connection between Cincinnati’s Xu and Chicago’s Chaoqun? While there is no indication the men were actual associates, commiserated in crime, or even ever met, the alleged link is buried in a Chicago court file.

Chaoqun’s criminal complaint cites a “clandestine and overt human source collection” used by Chinese officials to recruit spies and gather stolen intelligence.

“Chinese intelligence services conduct extensive overt, covert, and clandestine intelligence collection operations against U.S. national security entities, including private U.S. defense companies, through a network of agents within and outside of China,” states FBI Special Agent Andrew K. McKay.

According to the FBI, Chaoqun and Xu shared the very same covert, Chinese handler. U.S. authorities say the Chinese man assigned to secretly oversee both assignments, met with each alleged operative separately. They would get together in secret locations, frequently hotel rooms, but for the same alleged purpose: provide “information as a benefit to the Chinese government.”

Did General Milley discuss of of this with Li Zuocheng? Remember it is said that China was a little rattled at the potential instability of the United States and needed hand holding before and after the election of 2020 and the January 6 chaos in Washington DC. Seems, we Americans need hand holding from the woke Joint Chiefs of Staff and Pelosi.

Calls are routine? But the subject matter is hardly routine much less loyal to the homeland and the Constitution. Joint Chiefs spokesperson confirms Milley calls with China, defends them as routine Greg Nash

Joint Chiefs of Staff spokesperson Col. Dave Butler on Wednesday confirmed that Joint Chiefs Chairman Gen. Mark Milley called his Chinese counterparts after the Jan. 6 riot at the Capitol but said those calls were routine.

Butler said in a statement that Milley “regular communicates with Chiefs of Defense around the world, including China and Russia. These conversations remain vital to improving mutual understanding of U.S. national security interests, reducing tensions, providing clarity and avoiding unintended consequences or conflict.”

The statement comes in response to reports that a forthcoming book says Milley once told his Chinese counterpart that he would give a heads up before any attack on China by the U.S.

“You and I have known each other for now five years. If we’re going to attack, I’m going to call you ahead of time. It’s not going to be a surprise,” Milley said, according to an excerpt from a new book by veteran journalist Bob Woodward and The Washington Post’s Robert Costa.

“All calls from the Chairman to his counterparts, including those reported, are staffed, coordinated and communicated with the Department of Defense and the interagency,” Butler said in Wednesday’s statement.

 

 

Was it Eco-Health, NIH or Wuhan and the Money that Killed so Many?

The US-based, non-profit research group EcoHealth Alliance in 2014 received a US$3.1 million, five-year NIH grant to understand the risk of a novel bat virus spilling into humans in China, as had happened in the Sars outbreak in 2002.

“It would have been irresponsible of us if we did not investigate the bat viruses and the serology to see who might have been infected in China,” Fauci, whose institute was responsible for the grant, testified at a congressional hearing in May.

Research was undertaken in partnership with the Wuhan Institute of Virology, with a budget of between US$120,000 and US$150,000 a year under the grant, according to documents released by The Intercept.

Part of the work included exploring whether newly discovered bat viruses had the potential to infect people, and it is this aspect of the research which has come under scrutiny.

Wei Jingsheng, in a new report about his upcoming book called “What happened in Wuhan,” stated that he first heard about the Coronavirus at the World Military Games in Wuhan in October 2019. source

Chinese defector Wei Jingsheng tried to warn US officials.

source

Alerted by the news, he returned to the US and notified the CIA and FBI about what he had heard. The Agencies already knew him because he defected to the United States back in 1997 after leaving the Chinese communist party. Mr. Jingsheng said that he also alerted US politicians with connections to Trump and then alerted the Chinese human rights activist Dimon Liu.

Mr. Wei said that he found out more about the virus from one of his contacts in Beijing. He also noted that through Chinese activist Dimon Liu he spoke to politicians in the house about the dangers of the outbreak and that he also expressed his concerns to people in the Trump white house in 2019.
Wei said he would not reveal what politicians with ties to Trump he spoke with but states that the politicians could have reached the President immediately.

Chinese Human rights activist Demon Liu revealed that Mr. Lei told her about the virus at a dinner with her husband, a retired CIA agent, on November 22, 2019.
Liu said in a statement, “I couldn’t quite believe what he was saying,” Liu went on to say. “At that time, I had thought that the Coronavirus could not be worse than SARS. And SARS, as we knew from experience, was not that contagious, and it could be contained. I thought at the time that was the case. Okay, there was an outbreak, but the authorities and the advance of medical sciences would be able to contain the spread of it.”
Liu states that she wanted to pass the information that Mr. Wei gave her to Trump’s deputy National security advisor Matt Pottinger but decided against it because, as she puts it – “I didn’t send it to him because so many things were so incredulous,” she said. “I wrote it, but I didn’t send it because I decided it was better if Wei talks directly to Matt Pottinger.”

China hits back at Wuhan lab leak 'conspiracy' after Biden ...

***

KEY POINTS

  •  27 scientist published a letter in The Lancet last March denouncing lab-leak theories.
  • 26 of the 27 scientists have ties to Wuhan Institute funders or researchers.
  • Lead scientist says letter was written for “our collaborators” in China for a “show of support.”

In March of last year, 27 scientists wrote a letter to medical journal The Lancet denouncing claims that COVID-19 could have originated in a lab. It’s now been revealed that 26 of those 27 scientists have ties to the Wuhan Institute of Virology – that’s what we call a conflict of interest.

In The Lancet letter, the scientists stated, “We stand together to strongly condemn conspiracy theories suggesting that Covid-19 does not have a natural origin.” But, according to the Daily Mail, “The orchestrator of the letter, British zoologist Peter Daszak, [had] a conflict of interest through him being president of the US-based EcoHealth Alliance, which has funded research at the Wuhan Institute of Virology.”

Additionally, the Telegraph is reporting that a February 8th email released under an FOIA request reveals Mr. Daszak wrote The Lancet letter after being asked by “our collaborators” in China for a “show of support.”

That tanks Mr. Daszak’s credibility – and the other scientists don’t fare much better.

“Other signatories…include Prof Kanta Subbarao, who spoke at a conference in Wuhan – part organised by the Wuhan Institute of Virology. Dr John Mackenzie, of Curtin University of Technology in Australia, [also] put his name to the letter, but failed to mention he was still listed as a committee member of the Scientific Advisory Committee of Centre for Emerging Infectious Diseases at the Wuhan Institute of Virology,” the Telegraph reports.

The list goes on and on until…

“Dr Ronald Corley, a microbiology expert from Boston University – has been found to have no links back to funders or researchers at the Wuhan institute,” according to the Daily Mail.

When all is said and done, 26 of the 27 Lancet letter scientists have ties to funders or researchers at the Wuhan Institute of Virology. Even members of the scientific community don’t believe Daszak & Co. wrote the article in good faith.

“I was a little perplexed and a little bit upset with five very good scientists, some of whom I know well, who I thought stepped way out beyond what they should have been saying, based on the data available to all of us,” said David Welman, a professor who advises the U.S. government on biological threats and risks.

“These were not scientific papers, they did not present scientific evidence, they did not analyse and support scientific data, they were presenting opinion, they did not belong in scientific journals,” said Richard Ebrigh, chemistry professor at Rutgers University.

Since its publishing, the Lancet letter has been instrumental in slapping down lab-leak “conspiracy theorists.” Now, it won’t be so easy.

$64 Million to Afghanistan Per Biden Admin but Add in $1.2 Billion

The Taliban is swimming in significant assets, with more to come. and China is delighted.he ultimate winner of two decades of war in Afghanistan is likely China. Secretary of State Antony Blinkin confirmed that if the Taliban behaves, the $64 million will be authorized. Further, there is the matter of nations around the world and the pledges they have made in ’emergency funds’ for Afghanistan.

At the first high-level conference on Afghanistan since the Taliban took power a month ago, Western governments, big traditional donors and others announced pledges that went beyond the $606 million that the United Nations was seeking to cover costs through the end of the year for protecting Afghans from looming humanitarian disaster.

U.N. humanitarian chief Martin Griffiths announced at the close of the ministerial meeting that more than $1.2 billion in humanitarian and development aid had been pledged. He said this included the $606 million sought in a “flash appeal” but also a regional response to the Afghan crisis that U.N. refugee chief Filippo Grandi spoke about after arriving in Kabul on a previously unannounced visit.

He wrote on Twitter that he would assess humanitarian needs and the situation of 3.5 million displaced Afghans, including over 500,000 displaced this year alone.

Officials at the U.N. refugee agency, UNHCR, have expressed concerns that more Afghans could take refuge into neighboring Pakistan and Iran, which both already have large numbers of Afghans who fled their country during the past decades of war. sourceTaliban seen with SCAR rifle commonly carried by American ...

GovExe: The aircraft and armored vehicles left behind when U.S. forces withdrew will give China—through their eager partners, the Taliban—a broad window into how the U.S. military builds and uses some of its most important tools of war. Expect the Chinese military to use this windfall to create—and export to client states—a new generation of weapons and tactics tailored to U.S. vulnerabilities, said several experts who spent years building, acquiring, and testing some of the equipment that the Taliban now controls.

To understand how big a potential loss this is for the United States, look beyond the headlines foretelling a Taliban air force. Look instead to the bespoke and relatively primitive pieces of command, control, and communication equipment sitting around in vehicles the United States left on tarmacs and on airfields. These purpose-built items aren’t nearly as invincible to penetration as even your own phone.

“The only reason we aren’t seeing more attacks is because of a veil of secrecy around these systems,” said Josh Lospinoso, CEO of cybersecurity company Shift5. “Once you pierce that veil of secrecy…it massively accelerates the timeline for being able to build cyber weapons” to attack them.

Lospinoso spent ten years in the Army conducting penetration tests against radios, small computers, and other IT gear commonly deployed in Afghanistan.

Take the radios and communications equipment aboard the Afghan Air Force C-130 transport plane captured by the Taliban. The Pentagon has assured that the equipment was disabled. But if any of it remains on the plane an adversary with time and will could pick those apart one by one.

“You now have some or all of the electronic components on that system and it’s a representative laboratory; it’s a playground for building, testing, and iterating on cyber-attacks where maybe the adversary had a really hard time” until he obtained actual copies of the gear, Lospinoso said. “It is the playground for them to develop attacks against similar items.”

Georgianna Shea, who spent five years at MITRE helping the Pentagon research and test new technologies,  said the loss of key equipment to the Taliban “exposes everything we do in the U.S., DOD: our plans of action, how we configure things, how we protect things. It allows them unlimited time and access to go through and find vulnerabilities that we may not be aware of.”

“It’s not just a Humvee. It’s not just a vehicle that gets you from point A to point B. It’s a Humvee that’s full of radios, technologies, crypto systems, things we don’t want our adversaries getting a hold of,” said Shea, now chief technologist at the Foundation for Defense of Democracies’s Transformative Innovation Lab.

Of particular concern are the electronic countermeasures gear, or ECMs, used to detect improvised explosive devices.

“Imagine the research and development effort that went into develop those ECM devices that were designed to counter IEDs,” said Peter Christensen, a former director of the U.S. Army’s National Cyber Range. “Now, our adversaries have them. They’re going to have the software and the hardware that goes with that system. But also develop capabilities to defeat or mitigate the effectiveness of those ECM devices.”

Gear that has been “demilitarized” or “rendered inoperable,” as U.S. officials described the planes and vehicles left behind, can still reveal secrets, Shea said.

“In some cases, this equipment was fielded with the assumption we would have gates and guards to protect it. When it was developed, no one thought the Chinese would have it in their cyber lab, dissecting it, pulling it apart.”

Once an attacker has physical control of a device, little can stop her from discovering its vulnerabilities—and there are always vulnerabilities, Shea said.

Under current acquisition practices, most new defense gear is not tested for vulnerabilities until late in the design process. Testers often receive far too little time to test comprehensively. Sometimes they get just two weeks, she said, and yet “they always find something. Always.”

“Regardless of the previous testing that’s been done on compliance, they always find something: always… “They’re very backlogged and don’t have an unending amount of resources,” she said. So you have to schedule development with these testers. There’s not enough resources to test it to the depth and breadth that it should be to understand all of the vulnerabilities.”

Plans to fix newly discovered vulnerabilities “were often inconsistent or inadequate,” Christensen said.

Lospinoso, who spent years conducting such tests for the Army, still performs penetration testing for the U.S. military as a contractor. He says a smart hacker can usually find useful vulnerabilities  in hardware “within hours.”

When such a network attack disables a radio or a truck, troops are generally not trained to do anything about it. They may not even realize that they have been attacked, and may chalk up problems to age or maintenance problems.

“Every time we run an attack against a system, knocked out a subcomponent or have some really devastating effect that could cause loss of an asset—every time, the operator in the cockpit says, ‘We do not have operating procedures for what you just did,’” Lospinoso said.

Little of this is new. In 2017, the Government Accountability Office highlighted many of these concerns in a blistering report.

More than just insight into network vulnerabilities, the abandoned vehicles and gear will help China understand how U.S. forces work with partner militaries, said N. MacDonnell Ulsch, the CEO and chief analyst of Phylax Analytics.

“If you were to take all of the technology that was currently deployed in Afghanistan by the [United States] and you made an assessment of that, you have a point in time and a point in place reference of what the status quo is; what technology is being used, how much it costs, what’s it capable of doing and you realize it’s going to a developing nation,” Ulsch said.

China can use the knowledge to develop their weapons and tactics, but also to give their arms-export sales team an edge, he said. The Taliban have highlighted their nascent partnership with China as perhaps their most important foreign diplomatic effort. China, meanwhile, has already begun giving millions in aid to the new regime.

Whatever vulnerabilities China does discover will likely imperil U.S. troops for years to come, Lospinoso said.

“There is a zero percent chance we will go back and re-engineer” all of the various systems with serious cyber vulnerabilities, he said. “We are stuck with billions and billions in weapon systems that have fundamental flaws.”

 

Deputy CIA Director Says Here Comes al Qaeda Again

Leaving Afghanistan and abandoning Bagram Air Base immediately created a terror state. Did anyone contemplate that?

Meanwhile, the Taliban has named Mohammad Hassan Akhund, a longtime ally of Taliban founder Mullah Mohammad Omar, to serve as the country’s acting prime minister. Akhund, who was the Taliban’s foreign minister before the U.S. invasion in 2001, told the United Nations in 1999 that “we will never give up Osama [bin Laden] at any price.”Hibatullah Akhundzada, considered the “emir” of Afghanistan by the Taliban, is a strong al Qaeda ally and proud father of a suicide bomber known as the “commander of the faithful.” Current al Qaeda leader Ayman Zawahiri reportedly swore allegiance to him as the “emir of the believers” in 2016.

Al Qaeda could reconstitute in Afghanistan and regain the capability to threaten the U.S. in “one to two” years, intelligence chiefs said Tuesday, revising downward estimates that were previously issued by the Pentagon.

source

“The current assessment, probably conservatively, is one to two years for al Qaeda to build some capability to at least threaten the homeland,” said Lieutenant General Scott Berrier, director of the Defense Intelligence Agency (DIA), at an annual summit hosted by the Intelligence and National Security Alliance, with panels moderated by CBS News.

“That said, DIA is not going to take…their eye off the ball of terrorism,” Berrier said.

CIA deputy director David Cohen said at the same event that the agency was keeping “a very keen watch” on the terror network’s activities in Afghanistan, adding there is evidence its militants are returning to the country.

“[W]e are already beginning to see some of the indications of some potential movement of al Qaeda to Afghanistan,” Cohen said, “but it’s early days, and we will obviously keep a very close eye on that.”

The Taliban, who seized control of Afghanistan in a stunningly rapid takeover last month, are known to have maintained close ties with al Qaeda and are suspected by analysts of harboring senior operatives.

Both U.S. officials said Tuesday that intelligence agencies were working on ways to continue intelligence collection without a troop presence or embassy in the country, acknowledging current capabilities had been meaningfully reduced by the U.S. withdrawal. Lawmakers, counterterrorism experts and former intelligence officials have expressed concern over how reliable so-called over-the-horizon capabilities can be without networks of informants to guide them.

“We’re thinking about ways how to gain access back into Afghanistan with all kinds of sources,” Berrier said. “We are prioritizing that effort.”

Cohen said the agency would seek to maintain a network of intelligence assets within Afghanistan, but that operating from a distance and absent a physical presence was not a “new” challenge for the intelligence community.

“As we work from over the horizon principally…we will also look for ways to work from within the horizon, to the extent that is possible,” Cohen said. “But we will approach this in the way that we have approached the counterterrorism mission in many places around the world for a number of years, and I think, as a community, we continue to get better and better at doing that.”

Speaking at the summit on Monday, Director of National Intelligence Avril Haines said Afghanistan did not currently top the list of international terror threats, saying the “greatest threat” came from militant groups operating in Yemen, Somalia, Iraq and Syria.