An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation
Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.
House Republicans are attempting the biggest transformation of the U.S. tax code in more than 30 years. The new bill aims to chop the corporate tax rate from 35% to 20%, as well as trim income tax brackets from seven to four, with the top rate of 39.6% to remain intact.
Currently, there are seven tax brackets: 10%, 15%, 25%, 28%, 33%, and 39.6%. 12%: This new rate applies to single filers starting at $12,000 up to $45,000 and married joint filers after the $24,000 deduction up to $90,000. 25%: This rate starts at $45,000 for single filers and $90,000 for married joint filers. 35%: This rate starts at $200,000 for single filers and $260,000 for married joint filers. 39.6%: This rate starts at $500,000 for single filers and one million plus for married couples.
The Heritage Foundation tax experts summarized it this way:
Months ago, conservatives began pressuring their lawmakers to ensure that tax reform followed five conservative principles. Here’s how the bill stacks up to those principles:
Lowering and Simplifying the Individual Tax Rates: The GOP proposal provides long overdue relief to millions of Americans by simplifying and lowering the individual tax rates to 12 percent, 25 percent, 35 percent and 39.6 percent. For married couples, the 25 percent rate starts at $90,000, the 35 percent rate starts at $260,000 and the top rate starts at $1 million. The bill will also double the standard deduction to $12,000 for individuals and $24,000 for families.
Lowering the Corporate Tax Rate: This bill will immediately lower the corporate rate to 20 percent — the rate demanded by conservatives for months — making American businesses more competitive with the rest of the world and providing hard working Americans with a much needed raise. Rates for small business pass throughs were also reduced by 15 percentage points, down to 25 percent.
Tax Free Entrepreneurship (Full Expensing): The GOP proposal includes full expensing for some investments that phases out after 5 years. This is a necessary boost to investment in the short-term, though improvements could be made as the process advances.
Establishing a Territorial Tax System: This bill attempts to eliminate the double taxation that defines our current worldwide tax system, though there are some provisions that could undermine the full value of that reform. Stay tuned for a more in-depth analysis.
Ending Cronyism in the Tax Code: Conservatives have also been fighting back against big-government special interest groups. The plan eliminates many special interest provisions including the State and Local Tax Deduction (SALT), though it allows a write off for property taxes. If not for conservative pushback, the swamp creatures would have been far more successful in defending the broken, corrupt status quo.
Here are some other things included in the bill you should know:
Repeals the Alternative Minimum Tax
Child tax credit goes to $1600 from $1000 plus additional $300 credit for parents and non-child dependents.
State and local deduction converted to property tax deduction with $10K cap
401k’s are untouched
The Death Tax exemption will be doubled and eventually phased out after five years.
Preserves the home mortgage interest deduction for current mortgages and limits the deduction to $500,000 for new mortgages.
Preserves the Charitable Tax Deduction.
At first glance, the preliminary text released today has the potential to unleash economic growth, create American jobs, increase wages for American workers, allow families to keep more of their hard-earned money, and make U.S. businesses competitive across the globe.
According to documents released by Republicans on the House Ways and Means Committee, a typical middle-income family of four, earning $59K (median household income), will receive a $1,182 tax cut under this bill.
FNC: The Justice Department reportedly has garnered enough evidence to charge at least six Russian government operatives with hacking the Democratic National Committee’s computers during the 2016 presidential election.
The Wall Street Journal reported Thursday that federal prosecutors could bring charges early next year. The Journal reported that dozens of others may have also played a role in the cyberattack.
19,000 malicious links collected by Secureworks after Fancy Bear mistake.
4,700 Gmail users across the globe were targeted by the state hacking team.
Alongside Democrats, a handful of Republican targets were also identified.
The hackers who upended the US presidential election had ambitions well beyond Hillary Clinton’s campaign, targeting the emails of Ukrainian officers, Russian opposition figures, US defence contractors and thousands of others of interest to the Kremlin, according to a previously unpublished digital hit list obtained by The Associated Press.
The list provides the most detailed forensic evidence yet of the close alignment between the hackers and the Russian government, exposing an operation that stretched back years and tried to break into the inboxes of 4,700 Gmail users across the globe — from the pope’s representative in Kiev to the punk band Pussy Riot in Moscow.
“It’s a wish list of who you’d want to target to further Russian interests,” said Keir Giles, director of the Conflict Studies Research Centre in Cambridge, England, and one of five outside experts who reviewed the AP’s findings. He said the data was “a master list of individuals whom Russia would like to spy on, embarrass, discredit or silence.”
The AP findings draw on a database of 19,000 malicious links collected by cybersecurity firm Secureworks, dozens of rogue emails, and interviews with more than 100 hacking targets.
Secureworks stumbled upon the data after a hacking group known as Fancy Bear accidentally exposed part of its phishing operation to the internet.
The list revealed a direct line between the hackers and the leaks that rocked the presidential contest in its final stages, most notably the private emails of Clinton campaign chairman John Podesta.
The issue of who hacked the Democrats is back in the national spotlight following the revelation Monday that a Donald Trump campaign official, George Papadopoulos, was briefed early last year that the Russians had “dirt” on Clinton, including “thousands of emails.”
Kremlin spokesman Dmitry Peskov called the notion that Russia interfered “unfounded.” But the list examined by AP provides powerful evidence that the Kremlin did just that.
“This is the Kremlin and the general staff,” said Andras Racz, a specialist in Russian security policy at Pazmany Peter Catholic University in Hungary, as he examined the data. “I have no doubts.”
New evidence
Secureworks’ list covers the period between March 2015 and May 2016. Most of the identified targets were in the United States, Ukraine, Russia, Georgia and Syria.
In the United States, which was Russia’s Cold War rival, Fancy Bear tried to pry open at least 573 inboxes belonging to those in the top echelons of the country’s diplomatic and security services: then-Secretary of State John Kerry, former Secretary of State Colin Powell, then-NATO Supreme Commander, US Air Force Gen. Philip Breedlove, and one of his predecessors, US Army Gen. Wesley Clark.
The list skewed toward workers for defence contractors such as Boeing, Raytheon and Lockheed Martin or senior intelligence figures, prominent Russia watchers and — especially — Democrats. More than 130 party workers, campaign staffers and supporters of the party were targeted, including Podesta and other members of Clinton’s inner circle.
The AP also found a handful of Republican targets.
Podesta, Powell, Breedlove and more than a dozen Democratic targets besides Podesta would soon find their private correspondence dumped to the web. The AP has determined that all had been targeted by Fancy Bear, most of them three to seven months before the leaks.
“They got two years of email,” Powell recently told AP. He said that while he couldn’t know for sure who was responsible, “I always suspected some Russian connection.”
In Ukraine, which is fighting a grinding war against Russia-backed separatists, Fancy Bear attempted to break into at least 545 accounts, including those of President Petro Poroshenko and his son Alexei, half a dozen current and former ministers such as Interior Minister Arsen Avakov and as many as two dozen current and former lawmakers.
The list includes Serhiy Leshchenko, an opposition parliamentarian who helped uncover the off-the-books payments allegedly made to Trump campaign chairman Paul Manafort — whose indictment was unsealed Monday in Washington.
In Russia, Fancy Bear focused on government opponents and dozens of journalists.
Among the targets were oil tycoon-turned-Kremlin foe Mikhail Khodorkovsky, who spent a decade in prison and now lives in exile, and Pussy Riot’s Maria Alekhina. Along with them were 100 more civil society figures, including anti-corruption campaigner Alexei Navalny and his lieutenants.
“Everything on this list fits,” said Vasily Gatov, a Russian media analyst who was himself among the targets. He said Russian authorities would have been particularly interested in Navalny, one of the few opposition leaders with a national following.
Many of the targets have little in common except that they would have been crossing the Kremlin’s radar: an environmental activist in the remote Russian port city of Murmansk; a small political magazine in Armenia; the Vatican’s representative in Kiev; an adult education organisation in Kazakhstan.
“It’s simply hard to see how any other country would be particularly interested in their activities,” said Michael Kofman, an expert on Russian military affairs at the Woodrow Wilson International Centre in Washington.
He was also on the list.
“If you’re not Russia,” he said, “hacking these people is a colossal waste of time.”
Working 9 to 6 (Moscow Time)
Allegations that Fancy Bear works for Russia aren’t new. But raw data has been hard to come by.
Researchers have been documenting the group’s activities for more than a decade and many have accused it of being an extension of Russia’s intelligence services. The “Fancy Bear” nickname is a none-too-subtle reference to Russia’s national symbol.
In the wake of the 2016 election, US intelligence agencies publicly endorsed the consensus view, saying what American spooks had long alleged privately: Fancy Bear is a creature of the Kremlin.
But the US intelligence community provided little proof, and even media-friendly cybersecurity companies typically publish only summaries of their data.
That makes the Secureworks’ database a key piece of public evidence — all the more remarkable because it’s the result of a careless mistake.
Secureworks effectively stumbled across it when a researcher began working backward from a server tied to one of Fancy Bear’s signature pieces of malicious software.
He found a hyperactive Bitly account Fancy Bear was using to sneak thousands of malicious links past Google’s spam filter. Because Fancy Bear forgot to set the account to private, Secureworks spent the next few months hovering over the group’s shoulder, quietly copying down the details of the thousands of emails it was targeting.
The AP obtained the data recently, boiling it down to 4,700 individual email addresses, and then connecting roughly half to account holders.
The AP validated the list by running it against a sample of phishing emails obtained from people targeted and comparing it to similar rosters gathered independently by other cybersecurity companies, such as Tokyo-based Trend Micro and the Slovakian firm ESET.
The Secureworks data allowed reporters to determine that more than 95% of the malicious links were generated during Moscow office hours — between 9 am and 6 pm Monday to Friday.
The AP’s findings also track with a report that first brought Fancy Bear to the attention of American voters. In 2016, a cybersecurity company known as CrowdStrike said the Democratic National Committee had been compromised by Russian hackers, including Fancy Bear.
Secureworks’ roster shows Fancy Bear making aggressive attempts to hack into DNC technical staffers’ emails in early April 2016 — exactly when CrowdStrike says the hackers broke in.
And the raw data enabled the AP to speak directly to the people who were targeted, many of whom pointed the finger at the Kremlin.
“We have no doubts about who is behind these attacks,” said Artem Torchinskiy, a project coordinator with Navalny’s Anti-Corruption Fund who was targeted three times in 2015. “I am sure these are hackers controlled by Russian secret services.”
The myth if the 400-pound man
Even if only a small fraction of the 4,700 Gmail accounts targeted by Fancy Bear were hacked successfully, the data drawn from them could run into terabytes — easily rivalling the biggest known leaks in journalistic history.
For the hackers to have made sense of that mountain of messages — in English, Ukrainian, Russian, Georgian, Arabic and many other languages — they would have needed a substantial team of analysts and translators. Merely identifying and sorting the targets took six AP reporters eight weeks of work.
The AP’s effort offers “a little feel for how much labour went into this,” said Thomas Rid, a professor of strategic studies at Johns Hopkins University’s School of Advanced International Studies.
He said the investigation should put to rest any theories like the one then-candidate Donald Trump floated last year that the hacks could be the work of “someone sitting on their bed that weighs 400 pounds.”
“The notion that it’s just a lone hacker somewhere is utterly absurd,” Rid said.
***
Axios: Marathon congressional hearings on Russian election interference and social media left execs from Facebook, Google and Twitter badly bruised and with a new view of just how mad Washington is about their handling of content aiming to divide Americans.
The big takeaway: Lawmakers’ rebukes went far beyond the companies’ responses to Russia’s interference. They also repeatedly revealed a discomfort with the size, power and limited accountability of the large web platforms.
Washington isn’t buying that Facebook, Google and Twitter aren’t media companies. Both Republicans and Democrats seemed baffled at times by an assumption that has been fundamental to Google, Facebook and Twitter’s growth: that they are neutral platforms for information, not judges of content. Multiple lawmakers questioned that argument: “That may well be a distinction that is lost on most of us, that you’re just a platform for other people to express their views as opposed to being a publisher in their own right of those views,” said Republican Sen. John Cornyn.
We now know what the Russian ads look like. Lawmakers released some of the Russian-bought ads, which were focused largely on divisive political issues like civil rights, immigration and religion. According to the metadata released, the ads targeted both Republicans and Democrats and were paid for in rubles. For example, one “Black Matters” ad targeted adults in Georgia, Maryland, Missouri and Virginia and received more than 200,000 impressions and more than 12,000 clicks. It cost 53,425 rubles ($915).
Still no backing for a regulatory fix. The only piece of concrete legislation tied to this issue is the Honest Ads Act, which would require disclosure for online political ads. While the companies all committed to improving transparency, and companies indicated that they could work with lawmakers on the bill, they did not endorse it.
Lawmakers felt slighted by the CEOs’ absence. “I wish your CEOs were here,” said Democratic Sen. Joe Manchin, one of many lawmakers who voiced that sentiment. “They need to answer for this.”
The companies are putting significant resources toward vetting content. During nine hours of hearings, they repeatedly touted how much they were investing in both money and personnel to solve the election interference issue. Facebook is doubling the people working on safety and security issues to 20,000 by the end of 2018, for example.
Democrats were the harshest critics. Silicon Valley has long had a strong relationship with the liberal left, but that didn’t stop California Sens. Dianne Feinstein and Kamala Harris, as well as tech ally Sen. Ron Wyden, from lacing into the witnesses. Republicans, while critical of the companies, stopped short of conceding that social media manipulation was a deciding factor in Donald Trump’s win.
Congressional investigators are still learning the basics. One lawmaker asked Twitter’s general counsel to explain the difference between a bot and a troll. Several inquired about the definition of “impressions.” This highlights how steep the learning curve is for elected officials to fully grasp the nuances of what went wrong online in 2016.
Tech made a huge political miscalculation in not moving faster. Again and again, the companies were chided for how long it took them to deliver the goods to investigators. “I hear all your words,” said Sen. Mark Warner, “but I have more than a little bit of frustration that many of us on this committee have been raising this issue since the beginning of this year, and our claims were frankly blown off by the leaderships of your companies.”
What’s next? All of the companies indicated their investigations are ongoing, so the scale of the Russian disinformation campaign could turn out to be even bigger than we know now.
A Romanian politician sentenced to jail for rigging elections is trying to arrange meetings with Vice President Mike Pence and House Speaker Paul Ryan (R-Wis.), according to recent Justice Department filings.
Liviu Dragnea, who is speaker of Romanian Parliament’s lower chamber and party president, received a two-year suspended jail sentence last year for trying to rig a referendum election to impeach the country’s president.
Now, his Social Democratic Party is paying Washington public-affairs group Madison & Co. $100,000 to introduce Dragnea to Pence and Ryan “as soon as possible” and to arrange “political, media and academic meetings” for Dragnea. Operatives working on the case include Madison & Co. president Al Madison; Democratic lobbyist and “rainmaker” William Oldaker; Drew Willison, Senate Democratic Minority Leader Harry Reid’s (Nev.) final chief of staff; and William Harris, a Republican operative who “has worked for the Trump Organization on a variety of political and business matters,” according to a disclosure filing. The Justice Department has not yet released disclosures forms for Oldaker or Willison.
This wouldn’t be Dragnea’s first brush with members of the current administration. In the days before President Donald Trump’s inauguration, Dragnea met with the president-elect, now-former National Security Adviser Michael Flynn and Ed Royce (R-Calif), who chairs the House Foreign Affairs Committee.
The Foreign Agents Registration Act is in fact a joke, but quite a lucrative one if you are part of a Washington DC law firm. As noted on the website, under the guidance and management of the Department of Justice:
The Foreign Agents Registration Act (FARA) was enacted in 1938. FARA is a disclosure statute that requires persons acting as agents of foreign principals in a political or quasi-political capacity to make periodic public disclosure of their relationship with the foreign principal, as well as activities, receipts and disbursements in support of those activities. Disclosure of the required information facilitates evaluation by the government and the American people of the statements and activities of such persons in light of their function as foreign agents. The FARA Registration Unit of the Counterintelligence and Export Control Section (CES) in the National Security Division (NSD) is responsible for the administration and enforcement of the Act.
The person at the Justice Department who is in charge of this division was Dana Boente. He suddenly resigned last week…..hummmm. Boente assumed the position of Deputy Attorney General, when Trump fired Sally Yates when she refused to defend Trump’s travel suspension executive order. Boente declared he would defend in court that executive order, but was that really true since he suddenly resigned?
Seems Boente was selected to oversee the department’s division handling the probe into alleged Russian election interference, overseeing efforts on cybersecurity and counterintelligence.
Another hummm
So back to foreign lobby and continued foreign interference in DC…
The last time I can remember a stir about a lobby firm evading disclosure law was in 2004, when Qorvis Communications’ offices were raided by the FBI in a probe about its work for the royal family of Saudi Arabia. However, nothing much came of it, and business carried on as usual among Washington lobbyists. Two years ago, reportedly, a number of Qorvis lobbyists quit because they were uncomfortable with the firm’s work. According to this 2015 story in the New York Observer, more than a third of Qorvis partners had left the firm—to start their own lobby shops—“partly because of the firm’s work on behalf of such clients as Yemen, Bahrain, Saudi Arabia and the Central African nation of Equatorial Guinea,” reported the Huffington Post. “‘I just have trouble working with despotic dictators killing their own people,’ said one Qorvis insider.”
The last time I can remember a stir about a lobby firm evading disclosure law was in 2004, when Qorvis Communications’ offices were raided by the FBI in a probe about its work for the royal family of Saudi Arabia. However, nothing much came of it, and business carried on as usual among Washington lobbyists. Two years ago, reportedly, a number of Qorvis lobbyists quit because they were uncomfortable with the firm’s work. According to this 2015 story in the New York Observer, more than a third of Qorvis partners had left the firm—to start their own lobby shops—“partly because of the firm’s work on behalf of such clients as Yemen, Bahrain, Saudi Arabia and the Central African nation of Equatorial Guinea,” reported the Huffington Post. “‘I just have trouble working with despotic dictators killing their own people,’ said one Qorvis insider.”
Imagine that….Europe may be more right on this issue than the United States is due to congress where decisions just cannot be made.
Going back to 2011, the Pentagon has concluded that computer sabotage coming from another country can constitute an act of war, a finding that for the first time opens the door for the U.S. to respond using traditional military force.
In 2016, Pentagon leaders are still working to determine when, exactly, a cyber-attack against the U.S. would constitute an act of war, and when, exactly, the Defense Department would respond to a cyber-attack on civilian infrastructure, a senior Defense Department official told lawmakers on Wednesday.
A cyber strike as an act of war “has not been defined,” Acting Assistant Secretary of Defense for Homeland Defense and Global Security Thomas Atkin told the House Armed Services Committee. “We’re still working toward that definition.” More here.
So, is Europe ahead of the United States on this issue?
EU governments to warn cyber attacks can be an act of war
European Union governments will formally state that cyber attacks can be an act of war in a show of strength to countries such as Russia and North Korea.
Diplomats and ambassadors in Brussels have drafted a document, obtained by The Telegraph, that represents an unprecedented deterrent aimed at countries using hackers and cyber espionage against EU members.
The document, set to be agreed by all 28 EU members states, including Britain, in the coming weeks warns that individual member states could respond “in grave instances” to cyber attacks with conventional weapons.
The British government has now said it was all but certain that North Korea was behind the “WannaCry” malware attack that hit NHS IT systems in May. Work on the EU paper began among fears that Russia would attempt to influence this year’s German elections and over hybrid warfare employed in Ukraine. More here.
This could be a pretext for what is a probable threat.
Banks fearing North Korea hacking prepare defenses: cyber experts
WASHINGTON/TORONTO (Reuters) – Global banks are preparing to defend themselves against North Korea potentially intensifying a years-long hacking spree by seeking to cripple financial networks as Pyongyang weighs the threat of U.S. military action over its nuclear program, cyber security experts said.
North Korean hackers have stolen hundreds of millions of dollars from banks during the past three years, including a heist in 2016 at Bangladesh Bank that yielded $81 million, according to Dmitri Alperovitch, chief technology officer at cyber security firm CrowdStrike.
Alperovitch told the Reuters Cyber Security Summit on Tuesday that banks were concerned Pyongyang’s hackers may become more destructive by using the same type of “wiper” viruses they deployed across South Korea and at Sony Corp’s (6758.T) Hollywood studio.
The North Korean government has repeatedly denied accusations by security researchers and the U.S. government that it has carried out cyber attacks.
North Korean hackers could leverage knowledge about financial networks gathered during cyber heists to disrupt bank operations, according to Alperovitch, who said his firm has conducted “war game” exercises for several banks.
“The difference between theft and destruction is often a few keystrokes,” Alperovitch said.
Security teams at major U.S. banks have shared information on the North Korean cyber threat in recent months, said a second cyber security expert familiar with those talks.
“We know they attacked South Korean banks,” said the source, who added that fears have grown that banks in the United States will be targeted next.
Tensions between Washington and Pyongyang have been building after a series of nuclear and missile tests by North Korea and bellicose verbal exchanges between U.S. President Donald Trump and North Korean leader Kim Jong Un.
John Carlin, a former U.S. assistant attorney general, told the Reuters summit that other firms, among them defense contractors, retailers and social media companies, were also concerned.
“They are thinking ‘Are we going to see an escalation in attacks from North Korea?’” said Carlin, chair of Morrison & Foerster international law firm’s global risk and crisis management team.
Jim Lewis, a cyber expert with Washington’s Center for Strategic and International Studies, said it is unlikely that North Korea would launch destructive attacks on American banks because of concerns about U.S. retaliation.
Representatives of the U.S. Federal Reserve and the Office of the Comptroller of the Currency, the top U.S. banking regulators, declined to comment. Both have ramped up cyber security oversight in recent years.
And you can bet that the Obama White House and the John Kerry State Department knew all of this when they concocted the JCPOA, the nuclear deal, which by way almost now seems like America reimbursed Iran for the financial support of al Qaeda. (that was $1.7 billion in all cash in addition to $400 million)
Anyway…this is some great news if you want to know more about Usama bin Ladin and the al Qaeda network which still exists today.
Long forgotten now was the legal case in New York where the Judge ordered Iran, al Qaeda and the Taliban to pay up for the 9/11 attack. Iran was ordered to pay $10.5 billion to the victims families and to the insurance companies. Do you think that will be paid? Nah…
TLWJ: The CIA is releasing hundreds of thousands of documents, images, and computer files recovered during the May 2011 raid on Osama bin Laden’s compound in Abbottabad, Pakistan. The newly-available material provides invaluable insights into the terrorist organization that struck America on September 11, 2001.
FDD’s Long War Journal has advocated for the release of bin Laden’s secret cache since 2011, arguing that such transparency would help to better inform the American people, experts and policymakers. Today’s release goes a long way toward satisfying that goal. We applaud the CIA and Director Mike Pompeo for making this material available to the public.
While the world has changed dramatically since the al Qaeda founder’s death more than six years ago, many of the files are still relevant today. Indeed, the CIA has withheld an unspecified number of documents for reasons related to protecting national security. We don’t doubt that some documents are still sensitive, but we hope that everything can be eventually released.
The CIA provided FDD’s Long War Journal with an advance copy of many of the files. It will take years for experts and researchers to comb through this treasure trove of information. However, we offer some preliminary observations below.
Al Qaeda has survived more than sixteen years of war. The group has failed to execute another 9/11-style attack inside the US, despite bin Laden’s continued desire to bring mass terror to America’s shores. Numerous plots have been thwarted by counterterrorism and intelligence professionals. And bin Laden’s organization has suffered setbacks, including the loss of key leaders.
But al Qaeda has adapted and in some ways grown, spreading its insurgency footprint in countries where it had little to no capacity for operations in 2001. The newly-released files help to explain how al Qaeda groomed supporters everywhere from West Africa to South Asia.
With that perspective in mind, here is some of what we’ve already learned from the files posted online today.
The world can see Hamza bin Laden’s face, as a young man, for the first time.
Since 2015, al Qaeda has released a string of audio messages from Osama bin Laden’s son, Hamza. Al Qaeda is clearly attempting to capitalize on the bin Laden brand name and build Hamza’s profile in jihadi circles. Yet, the organization has refused to release current images of Hamza, likely fearing that this would increase the threats to his safety. On the most recent anniversary of the Sept. 11 attacks, for example, al Qaeda produced an image of the World Trade Center with a stock photo of Hamza as a young boy superimposed on one of the towers.
Two newly-released videos show scenes from Hamza’s wedding, publicly revealing his face as a young adult for the first time. The images are not current, but they are much more recent than the photo al Qaeda is willing to distribute. That same video footage shows other senior al Qaeda figures, including Mohammed Islambouli, the brother of Anwar Sadat’s assassin. Islambouli lived in Iran for much of the post-9/11 period and, in more recent times, has been in Turkey.
The public can finally examine Osama bin Laden’s personal journal.
One of the newly-available files is a handwritten, 228-page journal kept by Osama bin Laden himself. The notebook contains the al Qaeda master’s private reflections on the world and al Qaeda’s place in it. Some of the pages contain bin Laden’s thoughts on the 2011 Arab uprisings, which bin Laden wanted his men to capitalize on. While al Qaeda did not predict the revolutions that swept through North Africa and the Middle East, it moved quickly to set up operations in countries such as Libya.
Bin Laden was in charge of al Qaeda’s global network.
The Abbottabad repository confirms that bin Laden was anything but retired when US forces knocked down his door. He was not a mere figurehead. During the final months of his life, Osama bin Laden was communicating with subordinates around the globe. Recovered memos discuss the various committees and lieutenants who helped bin Laden manage his sprawling empire of terror.
In fact, al Qaeda’s network was a great deal more cohesive than was widely suspected in May 2011. Groups such as Al Qaeda in the Arabian Peninsula (AQAP), Al Qaeda in the Islamic Maghreb (AQIM), and Shabaab (in Somalia) regularly sought and received the al Qaeda master’s direction. Other organizations, such as the Pakistani Taliban, are featured throughout the documents as well. And al Qaeda continued to maintain a significant footprint inside Afghanistan, relocating personnel to the country in 2010 and fighting alongside the Taliban.
Bin Laden wasn’t always pleased with the course his subordinates pursued and his men debated a variety of matters internally. The al Qaeda master sometimes instructed his followers to hide their allegiance to him, calculating that it would cause additional problems if their fealty was acknowledged. The al Qaeda founder also viewed the world through a conspiratorial lens, often misjudging his main adversary: America.
However, bin Laden kept up with current events and studied America’s approach to the wars in Afghanistan and Iraq. One of his minions even translated sections of Bob Woodward’s 2010 book, Obama’s Wars, so that he could understand the Obama administration’s strategy for those conflicts.
The files provide new details concerning al Qaeda’s relationship with Iran.
One never-before-seen 19-page document contains a senior jihadist’s assessment of the group’s relationship with Iran. The author explains that Iran offered some “Saudi brothers” in al Qaeda “everything they needed,” including “money, arms” and “training in Hezbollah camps in Lebanon, in exchange for striking American interests in Saudi Arabia and the Gulf.” Iranian intelligence facilitated the travel of some operatives with visas, while sheltering others. Abu Hafs al-Mauritani, an influential ideologue prior to 9/11, helped negotiate a safe haven for his jihadi comrades inside Iran. But the author of the file, who is clearly well-connected, indicates that al Qaeda’s men violated the terms of the agreement and Iran eventually cracked down on the Sunni jihadists’ network, detaining some personnel. Still, the author explains that al Qaeda is not at war with Iran and some of their “interests intersect,” especially when it comes to being an “enemy of America.”
Bin Laden’s files show the two sides have had heated disagreements. There has been hostility between the two. Al Qaeda even penned a letter to Ayatollah Khamenei demanding the release of family members held in Iranian custody. Other files show that al Qaeda kidnapped an Iranian diplomat to exchange for its men and women. Bin Laden himself considered plans to counter Iran’s influence throughout the Middle East, which he viewed as pernicious.
However, bin Laden urged caution when it came to threatening Iran. In a previously released letter, bin Laden described Iran as al Qaeda’s “main artery for funds, personnel, and communication.” And despite their differences, Iran continued to provide crucial support for al Qaeda’s operations.
In a series of designations and other official statements issued since July 2011, the US Treasury and State Departments have repeatedly targeted al Qaeda’s “core facilitation pipeline” inside Iran. Sources familiar with the intelligence used to justify those designations say they are based, in part, on the Abbottabad files. It is likely that still more revelations concerning al Qaeda’s relationship with Iran remain to be found in the cache made available today.
The files are vital for understanding the history of the Iraqi insurgency and al Qaeda’s role in it.
Since bin Laden’s death, Abu Bakr al Baghdadi’s Islamic State (ISIS) rose to prominence, becoming an international menace in its own right and al Qaeda’s main jihadi competitor. FDD’s Long War Journal has reviewed dozens of audio files and other documents pertaining to the Iraqi insurgency. This valuable, primary source material provides new details on the history of al Qaeda’s efforts in the Iraq, ranging from Abu Musab al Zarqawi’s earliest days inside the country before the war, to the creation of the Islamic State of Iraq (ISI) and Baghdadi’s appointment as its chief.
One newly-available audio file contains a biography for Zarqawi, placing him in Baghdad before the American-led invasion and tracing his travels to Iran, Syria and elsewhere. Other audio files summarize al Qaeda’s opinions of various Saudi sheikhs, some of whom supported the jihadis’ efforts in Iraq.
An assessment of bin Laden’s support network in Pakistan will require careful analysis.
Many people will be interested in what the files have to say about bin Laden’s network inside Pakistan. He was, of course, hunted down in Abbottabad, near a Pakistani military academy. It is likely that the files contain new details concerning the personalities in Pakistan who supported al Qaeda in one way or another, including jihadists sponsored by the state. Parts of the Pakistani military and intelligence establishment have opposed al Qaeda and helped capture senior operatives. Al Qaeda has also helped direct an insurgency against Pakistani forces in the northern part of the country. Some of the files decry Pakistan’s supposed betrayal of the mujahideen after 9/11.
But Pakistan is a complex country, with multiple competing factions, and it is widely suspected that some in the military and intelligence apparatus were complicit in bin Laden’s operations. There may never be a “smoking gun,” but a meticulous review of the documents will likely shed light on previously unknown aspects of bin Laden’s Pakistani-based network. Specifically, any “former” military and intelligence figures named in the files should be closely examined, as should jihadi personalities who have cozy relations with the state. For instance, the New York Times first reported that American officials found contacts between bin Laden’s most trusted courier and Harakat ul Mujahedin (HUM). The contacts were discovered on the courier’s cellphone, which was seized during the Abbottabad raid. FDD’s Long War Journal does not know if this information is included in today’s release, but similar data can be used to build a composite picture of bin Laden’s Pakistani supporters.
The US service members who raided bin Laden’s compound risked their lives to bring the terror master to justice and did an incredible service by seizing the files released today. They did not have the time to recover everything. Pakistani authorities reportedly scooped up the intelligence left behind. We do not know if any of those files were shared with American officials, or if some of them are included in today’s release. But we hope that material will come to light as well.
Today’s release creates a unique opportunity for experts, researchers and journalists to garner a better understanding of al Qaeda.