IRGC’s Penetrator Bomb Evidence Killed Americans, Iran Hearing

Hoorah for Senator Tom Cotton vs. Secretary of State John Kerry at hearing dated July 29, 2015.

NYT ~ August 2007: Attacks on American-led forces using a lethal type of roadside bomb said to be supplied by Iran reached a new high in July, according to the American military.

The devices, known as explosively formed penetrators, were used to carry out 99 attacks last month and accounted for a third of the combat deaths suffered by the American-led forces, according to American military officials.

“July was an all-time high,” Lt. Gen. Raymond T. Odierno, the No. 2 commander in Iraq, said in an interview, referring to strikes with such devices.

Such bombs, which fire a semi-molten copper slug that can penetrate the armor on a Humvee and are among the deadliest weapons used against American forces, are used almost exclusively by Shiite militants. American intelligence officials have presented evidence that the weapons come from the Islamic Revolutionary Guard Corps in Iran, although Tehran has repeatedly denied providing lethal assistance to Iraqi groups.

Iran killed Americans yet waved off by the White House and the P5+1 for the sake of the Iran deal.

CTC: In June 2011, 14 U.S. soldiers were killed by hostile fire, representing the largest monthly toll for U.S. forces since June 2008. Twelve of those fatalities were attributed to three extremist Shi`a groups: Asaib Ahl al-Haq (AAH), Kataib Hizb Allah (KH), and the Promised Day Brigades (PDB). All three organizations are directly tied to the IRGC Qods Force, led under the direction of the enigmatic Brigadier General Qasem Soleimani. Their attacks and operations are “reflective of Iranian training,” said a U.S. military official under condition of anonymity. “Not amateurs, they’re professional.”

Rocket and mortar attacks on the International Zone and U.S. bases in central and southern Iraq are a frequent occurrence. This year, there were 162 attacks targeting U.S. forces in April, up from 128 in March, and 93 in February. Aside from the frequency of attacks, a concerning trend is that Shi`a militants trained by Iran have now learned how to effectively employ an improvised rocket-assisted mortar (IRAM), which has been responsible for many of the recent U.S. fatalities. “IRAMs are devastating,” said a U.S. military official. “They’re getting more sophisticated, more lethal, and more precise in targeting.”

 Travels 6000′ per second

Among the three Shi`a groups, KH has demonstrated to be the most advanced and sophisticated. “They’re much more experienced,” asserted the same military official. “It’s a learning process. They have better facilities, more money and backing, more experienced fighters, and better recruiting.”  On June 6, 2011, KH carried out multiple IRAM attacks on Camp Loyalty in eastern Baghdad that led to the deaths of five U.S. soldiers, the most in a single incident since April 2009.

Another major trend is the noticeable increase of attacks involving a roadside bomb known as an explosively-formed penetrator (EFP), a signature weapon used by Iranian-backed Shi`a insurgents. Of the types of roadside bombs used, EFPs represent a small fraction, but are one of the deadliest weapons in Iraq because of its ability to penetrate even the strongest armored vehicles used by the U.S. military.  Most recently, on July 7, 2011, two U.S. soldiers were killed by an EFP-attack just outside Camp Victory near Baghdad International Airport. In the past, one or two EFPs would be used in a single attack; some of the recent attacks, however, have involved as many as 14 EFPs.

The frequency and type of operations by Iranian-sponsored Shi`a insurgents has demonstrated their higher level of confidence and freedom of movement in Baghdad and southern Iraq. This is partially the result of the elevated political influence of the Sadrist Trend in key southern provinces since the March 2010 parliamentary elections. Occupying 40 seats out of the 325-seat Council of Representatives, the Shi`a cleric Moqtada al-Sadr holds more representation in parliament than any individual party in Iraq. His political weight is heavily considered by al-Maliki, as the latter retained the premiership after finally securing al-Sadr’s support during last year’s government formation crisis. The Sadrist Trend has continuously threatened to take drastic measures, including armed resistance against U.S. personnel, in an effort to deter Iraqi politicians from accepting an extended U.S. presence. They have utilized high-profile visits by senior U.S. officials to their advantage by intensifying Iraqi nationalism on the street.

The U.S. military asserts that members of the Iranian Qods Force are entering Iraq and working to re-arm their surrogate Shi`a groups. According to Major General Jeffrey Buchanan, the top U.S. military spokesman in Iraq, the volume of weapons crossing into Iraq from Iran is considered the highest in years.  In the last six months, the Iraqi Security Forces (ISF) have uncovered a higher quantity of weapons caches throughout the country, including EFP materiel, roadside bombs, and rockets, some with manufacturing dates as recent as 2010. One discovered stockpile contained 49 prepared EFPs.

A significant amount of the weapons and materiel is believed to be entering Iraq through legal “ports of entry,” including during religious pilgrimages. Others include decades-old smuggling routes that cross into Maysan Province, where the city of Amara serves as a distribution point. In late June 2011, after receiving pressure from the United States, the ISF carried out operations in southern Iraq to confront the Shi`a groups and disrupt their smuggling routes and networks.[17] The operation, however, was diluted in robustness and scope, and was largely superficial in results. Only low-profile Shi`a insurgents were arrested, while operations were suspended as Iraqi forces were diverted toward protecting Shi`a religious pilgrims traveling to Karbala.

The Iraqis had not met the expectations of the U.S. military, which desired simultaneous operations to occur in multiple provinces. “Without multiple locations, you lose a lot of surprise,” said a U.S. military official, “and the bad guys will walk across the border.”[18] The U.S. military cited a lack of both will and capability on the part of Baghdad to confront the Shi`a groups. According to a senior Iraqi military official, however, the decision to diminish the operation was political: “There are some targets, known targets. We have not been allowed to go after them.”

Other Terrifying Facts on Affects of Immigration

 

Guardian: A group of eight illegal immigrant sex offenders, including at least one pedophile, have been arrested in the Rio Grande Valley, border officers have said.

The men, who come from Mexico, El Salvador, and Honduras had all previously been convicted of crimes including sex abuse, indecent assault and two counts of lewd behaviour with a child.

In a separate incident, four suspected illegal immigrants were discovered being taken across the border inside a black pickup truck and trailer, with two men locked inside a water butt.

A dog unit alerted police to the men’s presence inside the Dodge truck on July 25, and a quick search revealed two men hiding behind the back seats, and another two inside the trailer.

The truck and trailer have now been seized by the border patrol, and the men have been referred to the Rio Grande Valley Sector Prosecutions Office, a police press release said.

On the same day, border agents from the McAllen, Rio Grande City, and Kingsville forces arrested the eight sex offenders.

Four were from Mexico, two from El Salvador and another two were from Hoduras, agents said.

All eight had convictions for sex offences, including lewd and lascivious acts with a child under 14, sexual assault, fondling a child, and sexual abuse in the first degree.

Acting chief patrol agent Raul L. Ortiz said: ‘Thanks to the efforts of our Border Patrol agents, these convicted sex offenders no longer pose a threat to local communities.’

On the same day, another 11 suspected illegal immigrants were also detained, including two men found locked inside a water butt in a trailer (pictured)

On the same day, another 11 suspected illegal immigrants were also detained, including two men found locked inside a water butt in a trailer (pictured)

Later on Saturday officers arrested another seven suspected illegal immigrants at a known stash house along a river near Escobares, Texas.

Officers set out at 6am, following a singposted trail to the house, where the men were discovered hiding inside, a press released said.

The immigrants, six Mexicans and one Salvadoran, were all taken into custody, while the owner of the property was also arrested and was found to be carrying drugs.

The arrests come during heightened tensions over the U.S. – Mexico border following inflammatory remarks by Republican presidential hopeful Donald Trump.

In a blistering speech launching his campaign, he attacked lax controls along the border, suggesting that Mexico was sending ‘rapists and killers’ into America.

Trump has since caused further controversy by retweeting a message accusing rival Jeb Bush of having a ‘soft spot’ for ‘Mexican illegals’ because of his wife. Bush’s wife Columba is a legal US citizen, but was born in Mexico. 

 

Inquisitor: An illegal immigrant charged with attempted murder in Ohio was set free earlier this month after the U.S. Border Patrol declined to take him into custody.

Authorities indicate that more felony charges against the man may be forthcoming.

Lake County sheriff’s deputies pulled over the suspect, who allegedly admitted to officers that he was in the U.S. illegally, on July 7, but upon being notified, federal immigration agents wouldn’t pick him up.

“The Lake County Sheriff’s deputies could not hold [the suspect] because he was not charged with any crime,” NewsNet5, the ABC News Cleveland affiliate, reported.

The man is now being held in connection with the ongoing investigation into the murder of a local woman and other crimes after being apprehended in a manhunt conducted by Lake County SWAT officers and other neighboring law enforcement agencies.

An irate judge (see footage of the initial court hearing embedded below) set bond at $10 million, and the suspect who entered a plea of not guilty is due back in court on August 3.

Multiple news outlets identify the suspect as Juan Emmanuel Razo, 35. As it emerge in the court hearing, he apparently has no driver’s license, passport, green card, or other documentation that would definitely establish his identity, however.

n illegal immigrant charged with attempted murder in Ohio was set free earlier this month after the U.S. Border Patrol declined to take him into custody.

Authorities indicate that more felony charges against the man may be forthcoming.

Lake County sheriff’s deputies pulled over the suspect, who allegedly admitted to officers that he was in the U.S. illegally, on July 7, but upon being notified, federal immigration agents wouldn’t pick him up.

“The Lake County Sheriff’s deputies could not hold [the suspect] because he was not charged with any crime,” NewsNet5, the ABC News Cleveland affiliate, reported.

The man is now being held in connection with the ongoing investigation into the murder of a local woman and other crimes after being apprehended in a manhunt conducted by Lake County SWAT officers and other neighboring law enforcement agencies.

An irate judge (see footage of the initial court hearing embedded below) set bond at $10 million, and the suspect who entered a plea of not guilty is due back in court on August 3.

Multiple news outlets identify the suspect as Juan Emmanuel Razo, 35. As it emerge in the court hearing, he apparently has no driver’s license, passport, green card, or other documentation that would definitely establish his identity, however.

Illegal Immigrants Outnumber Unemployed Americans

11.3 million illegal immigrants in U.S.
FreeBeacon:The number of illegal immigrants in the United States totaled 11.3 million in 2014, outnumbering the 9.6 million Americans who were unemployed in the same year, according to data from Pew Research Center and the Bureau of Labor Statistics (BLS).“An estimated 11.3 million unauthorized immigrants lived in the U.S. in 2014,” says a Pew report. “The new unauthorized immigrant total includes people who cross the border illegally as well as those who arrive with legal visas and remain in the U.S. after their visas expire.”Of those 11.3 illegal immigrants, 8.1 million are participating in the labor force. “Unauthorized immigrants make up 5.1% of the U.S. labor force,” Pew says. “In the U.S. labor force, there were 8.1 million unauthorized immigrants either working or looking for work in 2012.”

In 2014, there were 1.7 million more illegal immigrants living in the United States than there were unemployed Americans. According to the BLS, the average number of unemployed Americans in 2014 was 9.6 million. The BLS defines an unemployed individual as someone who did not have a job but actively sought one in the past four weeks.

The executive action on immigration President Obama put in place in November of 2014 is set to help more illegal aliens become active in the labor force.

“Last year, President Barack Obama took executive action to expand an existing program and establish a new one that would offer work permits and deportation relief to an estimated 5 million unauthorized immigrants,” according to Pew. “The actions—which are on hold because of a lawsuit by 26 states—would be open to unauthorized immigrants who were brought to the U.S. illegally as children, who are parents with a child who is a U.S. citizen or legal permanent resident, as long as they meet certain requirements.”

Obama Orders Financial Incentives

President Obama’s new immigrant amnesty provisions will incentivize businesses to hire illegal immigrants over native U.S. citizens – to the tune of $3000 per employee, congressional aides recently confirmed, according to The Washington Times.

Under the temporary amnesty, which will last for three years, five million illegal immigrants will be allowed to stay in the country legally for three years without threat of deportation. These immigrants will also be eligible for work permits, but will not be allowed certain public benefits such as access to Obamacare insurance.

This means that businesses who hire the undocumented immigrants will not be penalized for failing to provide health care coverage, reported The Washington Times. On the other hand, if the business hired a native-born worker and chose not to provide health coverage, the business could, by law, be fined a $3,000 penalty.

Businesses with more than 50 employees who refuse to provide insurance coverage to full-time workers are assessed a penalty for every employee who receives subsidies under Obamacare. But the five million undocumented immigrants are not allowed to sign up for Obamacare or receive subsidies, so businesses are not penalized, explains The Washington Times.

The loophole was criticized for seemingly placing illegal immigrants  ahead of American citizens in the job market.

“If it is true that the president’s actions give employers a $3,000 incentive to hire those who came here illegally, he has added insult to injury,” Republican Rep. Lamar Smith said. “The president’s actions would have just moved those who came here illegally to the front of the line, ahead of unemployed and underemployed Americans.”

Obama continues to maintain a positive outlook on his decision, saying Tuesday that “Immigrants are good for the economy.”

“We keep on hearing that they’re bad, but a report by my Council of Econmic Advisers put out last week shows how the actions we’re taking will grow our economy for everybody,” he said.

The China Hack of United Airlines, Electronic Insurgency

Warning corporations, industry and government entities is one thing, action and protection and or declaration of a cyber war is yet another.

July 2015:

Aspen Institute: Cyber warfare is one of the most potent security threats the United States faces, National Security Agency Director and Commander of the US Cyber Command General Keith Alexander told the crowd at the Aspen Security Forum in Aspen, discussing in conversation with NBC News Correspondent Pete Williams the nature of the threat and how his department is working to address it.
With the Stuxnet, Duqu, and Flame viruses in the fore of the public consciousness, Alexander took pains to point out that nation-states were not the only potential cyber actors. Citing power and water grids as his chief concerns, he said, “Somebody who finds vulnerability in our infrastructure could cause tremendous problems. They could erase the Input/output of a system so it can’t boot, and would have to be replaced. And these capabilities are not only nation-state-only capabilities.”

Alexander assessed the US’ readiness to confront such an attack as a three on a scale of ten, calling lack of adequately trained cyber defense forces the critical impediment to greater preparedness. “Our issue isn’t [having the tools] to address the threat,” he said. “It’s having the capacity, and building and training cyber forces. We have a big requirement, and a small force that is growing steadily.”

China-Tied Hackers That Hit U.S. Said to Breach United Airlines

Bloomberg:

The hackers who stole data on tens of millions of U.S. insurance holders and government employees in recent months breached another big target at around the same time — United Airlines.

United, the world’s second-largest airline, detected an incursion into its computer systems in May or early June, said several people familiar with the probe. According to three of these people, investigators working with the carrier have linked the attack to a group of China-backed hackers they say are behind several other large heists — including the theft of security-clearance records from the U.S. Office of Personnel Management and medical data from health insurer Anthem Inc.

The previously unreported United breach raises the possibility that the hackers now have data on the movements of millions of Americans, adding airlines to a growing list of strategic U.S. industries and institutions that have been compromised. Among the cache of data stolen from United are manifests — which include information on flights’ passengers, origins and destinations — according to one person familiar with the carrier’s investigation.

 

It’s increasingly clear, security experts say, that China’s intelligence apparatus is amassing a vast database. Files stolen from the federal personnel office by this one China-based group could allow the hackers to identify Americans who work in defense and intelligence, including those on the payrolls of contractors. U.S. officials believe the group has links to the Chinese government, people familiar with the matter have said.

That data could be cross-referenced with stolen medical and financial records, revealing possible avenues for blackmailing or recruiting people who have security clearances. In all, the China-backed team has hacked at least 10 companies and organizations, which include other travel providers and health insurers, says security firm FireEye Inc.

Tracking Travelers

The theft of airline records potentially offers another layer of information that would allow China to chart the travel patterns of specific government or military officials.

United is one of the biggest contractors with the U.S. government among the airlines, making it a rich depository of data on the travel of American officials, military personnel and contractors. The hackers could match international flights by Chinese officials or industrialists with trips taken by U.S. personnel to the same cities at the same time, said James Lewis, a senior fellow in cybersecurity at the Center for Strategic and International Studies in Washington.

“You’re suspicious of some guy; you happen to notice that he flew to Papua New Guinea on June 23 and now you can see that the Americans have flown there on June 22 or 23,” Lewis said. “If you’re China, you’re looking for those things that will give you a better picture of what the other side is up to.”

Computer Glitches

The timing of the United breach also raises questions about whether it’s linked to computer faults that stranded thousands of the airline’s passengers in two incidents over the past couple of months. Two additional people close to the probe, who like the others asked not to be identified when discussing the investigation, say the carrier has found no connection between the hack and a July 8 systems failure that halted flights for two hours. They didn’t rule out a possible, tangential connection to an outage on June 2.

Luke Punzenberger, a spokesman for Chicago-based United, a unit of United Continental Holdings Inc., declined to comment on the breach investigation.

Zhu Haiquan, a spokesman for the Chinese embassy in Washington, said in a statement: “The Chinese government and the personnel in its institutions never engage in any form of cyberattack. We firmly oppose and combat any forms of cyberattacks.”

Embedded Names

United may have gotten help identifying the breach from U.S. investigators working on the OPM hack. The China-backed hackers that cybersecurity experts have linked to that attack have embedded the name of targets in web domains, phishing e-mails and other attack infrastructure, according to one of the people familiar with the investigation.

In May, the OPM investigators began drawing up a list of possible victims in the private sector and provided the companies with digital signatures that would indicate their systems had been breached. United Airlines was on that list.

Safety Concerns

In contrast to the theft of health records or financial data, the breach of airlines raises concerns of schedule disruptions or transportation gridlock. Mistakes by hackers or defenders could bring down sensitive systems that control the movement of millions of passengers annually in the U.S. and internationally.

Even if their main goal was data theft, state-sponsored hackers might seek to preserve access to airline computers for later use in more disruptive attacks, according to security experts. One of the chief tasks of the investigators in the United breach is ensuring that the hackers have no hidden backdoors that could be used to re-enter the carrier’s computer systems later, one of the people familiar with the probe said.

United spokesman Punzenberger said the company remains “vigilant in protecting against unauthorized access” and is focused on protecting its customers’ personal information.

There is evidence the hackers were in the carrier’s network for months. One web domain apparently set up for the attack — UNITED-AIRLINES.NET — was established in April 2014. The domain was registered by a James Rhodes, who provided an address in American Samoa.

James Rhodes is also the alias of the character War Machine in Marvel Comics’ Iron Man. Security companies tracking the OPM hackers say they often use Marvel comic book references as a way to “sign” their attack.

Targeting Pentagon

This isn’t the first time such an attack has been documented. Chinese military hackers have repeatedly targeted the U.S. Transportation Command, the Pentagon agency that coordinates defense logistics and travel.

A report last year from the Senate Armed Services Committee documented at least 50 successful hacks of the command’s contractors from June 2012 through May 2013. Hacks against the agency’s contractors have led to the theft of flight plans, shipping routes and other data from organizations working with the military, according to the report.

“The Chinese have been trying to get flight information from the government; now it looks as if they’re trying to do the same in the commercial sector,” said Tony Lawrence, a former Army sergeant and founder and chief executive officer of VOR Technology, a Columbia, Maryland-based cybersecurity firm.

It’s unclear whether United is considering notifying customers that data may have been compromised. Punzenberger said United “would abide by notification requirements if a situation warranted” it.

The airline is still trying to determine exactly which data was removed from the network, said two of the people familiar with the probe. That assessment took months in the OPM case, which was discovered in April and made public in June.

M&A Strategy

Besides passenger lists and other flight-related data, the hackers may also have taken information related to United’s mergers and acquisitions strategy, one of the people familiar with the investigation said.

Flight manifests usually contain the names and birthdates of passengers, but even if those files were taken, experts say that would be unlikely to trigger disclosure requirements in any of the 47 states with breach-notification laws.

Those disclosure laws are widely seen as outdated. The theft by hackers of corporate secrets usually goes unreported, while the stealing of customer records such as Social Security numbers and credit cards is required in most states.

“In most states, this is not going to trigger a notification,” said Srini Subramanian, state government leader for Deloitte cyber risk services.

Clinton Campaign Punting on Missing Benghazi Abedin Emails?

Check that Lincoln bedroom….no one knows anything, perhaps Sidney Blumenthal is still available or Sandy Berger hid them in some vault posthumously.

There is some inside the DC beltway conspiracy when it comes to official government business emails. They all seem to go missing.

The Missing Hillary Emails No One Can Explain

Daily Beast: There is a two-month gap in Hillary Clinton’s emails that coincides with violence in Libya and the employment status of a top Clinton aide, Huma Abedin.
Among the approximately 2,000 emails that former Secretary of State Hillary Clinton has released from her private account, there is a conspicuous two-month gap. There are no emails between Clinton and her State Department staff during May and June 2012, a period of escalating violence in Libya leading up to the September 11 attack on the U.S. consulate in Benghazi that left four Americans dead.

A State Department spokesman told The Daily Beast that for the year 2012, only those emails related to the security of the consulate or to the U.S. diplomatic presence in Libya were made public and turned over to a House committee investigating the fatal Benghazi assault. But if that’s true, then neither Clinton nor her staff communicated via email about the escalating dangers in Libya. There were three attacks during that two-month period, including one that targeted the consulate.

That two-month period also coincides with a senior Clinton aide obtaining a special exemption that allowed her to work both as a staff member to the secretary and in a private capacity for Clinton and her husband’s foundation. The Associated Press has sued to obtain emails from Clinton’s account about the aide, Huma Abedin.

The status of Clinton’s emails has become an explosive political issue ever since The New York Times revealed that the then-Secretary of State was using a private email server to handle her official correspondence. Cybersecurity experts believe the homebrew system opened Clinton and her colleagues to targeting from online spies. The State Department and Intelligence Community Inspector Generals have asked the Justice Department to look into possible disclosure of classified information.

Regarding the security situation in Libya, there was plenty for Clinton and her team to discuss via email. On May 22, 2012, the International Red Cross’s Benghazi office was hit by rocket-propelled grenades.

“The attack on the International Red Cross was another attack that also involved us and threats to the compound there in Benghazi,” testified Lieutenant Colonel Andrew Wood, a senior State Department security chief in Libya (PDF) before the House Oversight Committee in October 2012.

Then, on June 6, an improvised explosive device detonated outside of the U.S. consulate, ripping a 12-foot-wide hole in the compound’s wall and prompting officials to release a public warning on “the fluid security situation in Libya.”

Yet the State Department has not produced any emails to or from Clinton about the improvised bomb.

Republicans on the House committee investigating the Benghazi attack have called the absence of any email communication noting the explosive attack at the U.S. consulate “inexplicable.”

“There are gaps of months and months and months,” Republican Representative Trey Gowdy, chairman of the Select Committee on Benghazi, said in a March 8 interview.

“The State Department transferred 300 messages exclusively reviewed and released by her [Clinton’s] own lawyers,” Gowdy added in a May 22 statement noting gaps in the email records. “To assume a self-selected public record is complete, when no one with a duty or responsibility to the public had the ability to take part in the selection, requires a leap in logic no impartial reviewer should be required to make and strains credibility.”

Since then, the Benghazi committee has recovered one email, largely about business interests in Libya, from June 2012 after subpoenaing Clinton confidant Sidney Blumenthal. The email from Blumenthal does not mention threats to the U.S. consulate, and there is no response from Clinton. The State Department subsequently gave the committee its copy.

U.S. interests weren’t the only ones being targeted in Benghazi. Five days after the improvised bomb damaged the consulate, an RPG hit a convoy carrying the British ambassador in Benghazi, wounding two bodyguards.

The United Kingdom and the Red Cross closed their facilities in Benghazi by the end of June 2012.

From there, the violence directed at the U.S. escalated. In a cable dated July 9, 2012, U.S. Ambassador Chris Stevens asked that the State Department provide a minimum of 13 security personnel for the U.S. embassy in Tripoli and the consulate in Benghazi, noting a heightened security threat. The State Department did not fulfill Stevens’s request, a Senate Intelligence Committee report (PDF) later revealed.

A Clinton aide didn’t respond specifically to a request about the two-month email absence. But in a statement to reporters, Clinton spokesperson Nick Merrill noted, “More emails are slated to be released by the State Department next week, and we hope that release is as inclusive as possible.”

The two-month period wasn’t notable only for violence in Libya, and it has been the subject of questions about Clinton’s email and State Department records for a different reason.

On June 3, Abedin, a longtime Clinton aide and personal friend of the Clinton family, was given the status of a “special government employee,” which allowed her to stay on the State Department payroll while simultaneously working for the Clinton Foundation, Teneo, a consulting firm founded by Clinton confidant Doug Band, and as a private adviser to Clinton regarding her post-State Department transition.

Conflict-of-interest laws ordinarily would prohibit that arrangement, but the special designation exempted Abedin from some ethics rules.

In 2013, the AP filed a Freedom of Information Act request for State Department records on how Abedin obtained the special employee status. The news organization asked for emails about the matter.

Last week, a federal judge gave the State Department one week to respond to the AP’s two-year-old request. At midnight Tuesday, just before the judge’s deadline, the department’s lawyers submitted a declaration identifying about 68 pages of “potentially responsive” documents.

That marked the first time that the department acknowledged, in its two-year dispute with the AP, the existence of any agency documents related to Abedin’s arrangement.

Michael Smallberg, an investigator at the Project on Government Oversight, told The Daily Beast that while special government employees are not uncommon, the lack of information about Abedin may be keeping alive questions about potential conflict of interest in her work for the secretary and the foundation’s fundraising.

“Unless you come across any evidence to the contrary, there’s no reason to believe she was abusing the special government position,” Smallberg said. But, “the State Department has allowed those concerns to fester by withholding basic information,” Smallberg added. “Even if she did nothing wrong, secrecy breeds mistrust.”

State Department lawyers have argued that once all of Clinton’s emails are released on the agency’s website, following a vetting process that will take months, the AP’s request for information about Abedin will have been satisfied.

However, since some of the emails on Abedin that the AP wants likely fall within the June 2012 time frame, that might not be the case.

About 7 percent of Clinton’s emails have been released. All the emails are scheduled to be released on a rolling, monthly basis until the last set is released in January 2016, to comply with an order by a different federal judge. The next release is tentatively scheduled for this Friday.

 

Taliban Leader Mullah Omar Dead Again?

One or more of the Taliban 5 that Obama traded out from Gitmo for Bowe Bergdahl is likely taken control and replaced Mullah Omar, even from the feeble detention in Qatar.

Directly after the attacks of 9/11, the CIA contacted Mullah Omar and said turn over Usama bin Ladin and the United States will not invade Afghanistan, Omar refused, so the war began against the Taliban. (factoid).

As ISIS, Islamic State has moved into Afghanistan and has declared the region a target, Taliban fighters have defected to ISIS. Meanwhile, no one has seen Mullah Omar in at least two years, yet some Afghanistan officials have made some declarations that he is dead. The Taliban has recently made some aggressive and deadly advances in designated Afghanistan territory while there is chatter that the terror group could merge with ISIS.

Given this possibility, it is curious that Mullah Omar has been declared dead, again.

Taliban splinter group claims Mullah Omar was killed 2 yrs ago

In part:

The Afghanistan Islamic Movement Fidai Mahaz’s spokesperson Qari Hamza, said the reclusive Omar was killed by commanders Mullah Akhtar Muhammad Mansoor and Gull Agha in July 2013.

Hamza said his group has evidence to prove its claims, Khaama Press reported on Thursday.

Afghanistan’s spy agency, the National Directorate of Security (NDS), had said in November last year that Omar had possibly died. There are also reports that the Afghan Taliban has split into three factions.

NDS spokesperson Hasib Sediqi told the media in November last year that the two Taliban factions are led by Mullah Qayum Zakir and Mullah Agha, while the third comprises “neutral” militant leaders.

Reports last year had also suggested that Omar had given his old friend and deputy, Mullah Akhtar Mohammad Mansoor, the authority to make decisions on his behalf regarding the peace process with the government.

Some officials in the presidential palace have claimed Omar is in custody of Pakistani security forces in the port city of Karachi.

Aimal Faizi, spokesperson for former president Hamid Karzai, said this information was shared by US secretary of state John Kerry. More of the story here.

Meanwhile, a document has been located, written in Urdu that spells out the plan ISIS has for targets in Afghanistan and even India. ISIS plans an end of the world operation.

 

Reported by Sara Carter via USAToday: The document was reviewed by three U.S. intelligence officials, who said they believe the document is authentic based on its unique markings and the fact that language used to describe leaders, the writing style and religious wording match other documents from the Islamic State, also known as ISIL and ISIS. They asked to remain anonymous because they are not authorized to discuss the matter publicly.

A video grab released by the Tehreek-e-Taliban Pakistan (TTP) on July 11, 2015, shows Hafiz Saeed, the Islamic State leader of the Khorasan State, at an undisclosed location along the Pakistani-Afghan border. (Photo: TTP/EPA)

The undated document, titled “A Brief History of the Islamic State Caliphate (ISC), The Caliphate According to the Prophet,” seeks to unite dozens of factions of the Pakistani and Afghan Taliban into a single army of terror.  It includes a never-before-seen history of the Islamic State, details chilling future battle plans, urges al-Qaeda to join the group and says the Islamic State’s leader should be recognized as the sole ruler of the world’s 1 billion Muslims under a religious empire called a “caliphate.”

“Accept the fact that this caliphate will survive and prosper until it takes over the entire world and beheads every last person that rebels against Allah,” it proclaims. “This is the bitter truth, swallow it.”

By Graeme Wood: Bin Laden viewed his terrorism as a prologue to a caliphate he did not expect to see in his lifetime. His organization was flexible, operating as a geographically diffuse network of autonomous cells. The Islamic State, by contrast, requires territory to remain legitimate, and a top-down structure to rule it. (Its bureaucracy is divided into civil and military arms, and its territory into provinces.) Much more detail here.

Published by WaPo in part: The Afghan Taliban recently published a 5,000-word biography hailing its leader, whose whereabouts remain largely unknown. It maintains that Mullah Omar, who has a $10 million American bounty on his head, is alive, well, and in charge.

According to SITE Intelligence group, the lengthy paean comes at a conspicuous moment, given both the political efforts being made to curtail the Taliban’s Afghan insurgency as well as the growing antagonism between the Taliban and the Islamic State, the leading extremist Islamist militants of the moment.

As an aside, negotiations by the new Afghan leadership is still in some peace talks with the Taliban.

NYT: An Afghan government delegation met with Taliban officials in the Pakistani capital for the first time on Tuesday, in a significant effort to open formal peace negotiations, according to Afghan, Pakistani and Western officials.

The Islamabad meeting, brokered by Pakistani officials after months of intense effort by President Ashraf Ghani of Afghanistan to get them more centrally involved in the peace process, was the most promising contact between the two warring sides in years. And it followed a series of less formal encounters between various Afghan officials and Taliban representatives in other countries in recent months.