$1.7 Billion to Iran to be Spent this Way?

Iran ‘is running covert war in Syria costing BILLIONS from top secret spymaster HQ near Damascus airport’, with 60000 fighters

Iran is shoring up the Syrian regime from a secret HQ in Damascus nicknamed ‘the Glasshouse’ – and commanding a huge covert army in support of Assad, according to leaked intelligence passed by activists to MailOnline.
The National Council of Resistance of Iran ( NCRI ) claims that the theocratic state’s Supreme Leader Ali Khamenei has spent billions in hardware for its ally Bashar al-Assad in the last five years  – and runs operations on the ground from a five-floor monolith near Damascus airport.
The Iranian HQ, which plays a pivotal role in supporting Assad’s regime alongside Russia, contains intelligence and counterintelligence operations, and has vaults packed with millions of dollars in cash flown in from Tehran, claims the NCRI.
The allegations are contained in a dossier of reports apparently leaked by senior sources inside Iran’s Revolutionary Guards and collated by the dissident activists who oppose the Iranian regime.
The dossier – which was described as ‘credible’ by intelligence experts – makes the bold claims that Iran controls the biggest fighting force in Syria; has military bases throughout the splintered state; and has amassed a war-chest far greater than feared in support of Bashar Assad.

Much more to this story found here.

Six Key Unanswered Questions About the $1.7 Billion Ransom Payment to Iran

Over the past several weeks, the Obama administration has dodged questions, invented excuses, and misled the public to spin the apparent $1.7 billion ransom payment to Iran. So far this has left us with more questions than answers, particularly as it relates to the $1.3 billion “interest” payment.

As Speaker Ryan said earlier this month, “The president owes the American people a full accounting of his actions and the dangerous precedent he has set.”

Here are six key questions the president still needs to answer:

1. Why was the $1.3 billion transferred through an unknown central bank while the $400 million was paid in cash?

2. Why were these payments made separately?

3. Why wasn’t the $400 million paid through the central bank?

4. Was the $1.3 billion wired or paid in cash?

5. Was there a license issued to the unnamed central bank to shield it from sanctions under the Iran Transactions and Sanctions Regulations?

6. Is there a formal settlement agreement from the dispute at the Hague Tribunal?

The House will consider legislation later this month to address this dangerous ransom payment.

****

Khamenei: We will develop our defensive and offensive capabilities. Supreme Leader Ayatollah Ali Khamenei called the development of Iran’s “defensive and offensive capabilities” an “inalienable and clear right” during a meeting with officials from the Defense Ministry. Khamenei noted that developing weapons of mass destruction “including chemical and nuclear weapons” is prohibited but added that “besides these restrictions, there are no limitations on the development of our defensive and military capabilities. Advancing in these domains is our duty.”

President Hassan Rouhani called for enhanced defensive power through military and private sector collaboration; he also declared that Iran can purchase and sell weapons as it sees fit. The Defense Ministry unveiled an advanced short-range ballistic missile. The Iranian and British embassies reopened in Tehran and London after a four-year closure.

President Rouhani underlined the importance of integrating the military and private industry in order to advance the nation’s defensive capabilities. He also emphasized that Iran’s military doctrine is predicated on defense in an effort to allay concerns shared by some Arab states over the regime’s conventional capabilities. Rouhani reassured his domestic audiences that the nuclear deal will not limit Iran’s defense capacity, claiming: “We will sell and buy weapons whenever and wherever we deem it necessary… we will not wait for permission…or any resolution.” Defense Minister IRGC Brigadier General Hossein Dehghan stressed that Iran will not waver from its determination to strengthen its defense capabilities. The Defense Ministry, meanwhile, introduced the Fateh 313 precision-guided missile, which runs on solid fuel with a reported range of 500 kilometers.

National Security and Foreign Policy Parliamentary Commission member Mohammad Esmail Kowsari criticized the Rouhani administration for failing to strengthen the economy, claiming: “Mr. Rouhani made promises to the people regarding the improvement of the economic situation, but today, not much has emerged.” The former senior IRGC commander stated, “Unfortunately, the current government does not tolerate fair criticism…”

British Foreign Secretary Philip Hammond traveled to Iran on August 23 to reopen his country’s embassy in Tehran. Hammond and Foreign Minister Mohammad Javad Zarif held a joint press conference to mark the resumption of Tehran-London ties. The British Foreign Secretary also met with President Rouhani and other senior Iranian officials. 

Supreme National Security Council (SNSC) Undersecretary for Strategic Affairs Ali Hosseini Tash rejected a recent Associated Press report alleging that he signed a secret agreement with the IAEA, which purportedly allows Iran to use its own inspectors to monitor the Parchin military site. 

State Dept: Country Reports on Terrorism 2015

Cuba, Mexico, Venezuela, all in our hemisphere get major passes from the State Department.

Related reading: The 50 most violent cities in the world

Related reading: The world’s most dangerous and safest countries revealed  Interactive map for rankings is found here.

 

Country Reports on Terrorism 2015 is submitted in compliance with Title 22 of the United States Code, Section 2656f (the “Act”), which requires the Department of State to provide to Congress a full and complete annual report on terrorism for those countries and groups meeting the criteria of the Act.

Beginning with the report for 2004, it replaced the previously published Patterns of Global Terrorism.

 

Chapters

Chapter 1. Strategic Assessment
Chapter 2. Country Reports: Africa Overview
Chapter 2. Country Reports: East Asia and Pacific Overview
Chapter 2. Country Reports: Europe Overview
Chapter 2. Country Reports: Middle East and North Africa Overview
Chapter 2. Country Reports: South and Central Asia Overview
Chapter 2. Country Reports: Western Hemisphere Overview
Chapter 3: State Sponsors of Terrorism Overview
Chapter 4: The Global Challenge of Chemical, Biological, Radiological, or Nuclear (CBRN) Terrorism
Chapter 5: Terrorist Safe Havens (Update to 7120 Report)
Chapter 6. Foreign Terrorist Organizations
Chapter 7. Legislative Requirements and Key Terms

Annexes

National Consortium for the Study of Terrorism and Responses to Terrorism: Annex of Statistical Information [Get Acrobat Reader PDF version   ]
Terrorism Deaths, Injuries and Kidnappings of Private U.S. Citizens Overseas in 2015

Full Report

Country Reports on Terrorism 2015 (PDF)

Related reading: SUMMARY: Wilayat Sinai, an organization identified with the Islamic State, has recently suffered a series of serious blows from the Egyptian army. 

Court Reverses Jury Decision on PLO Attack, 11 Americans Died

Circuit Reverses $655M Award Against PLO for Terror Attacks

Hamblett/NewYorkLawJournal: A $655 million award against the Palestine Liberation Organization and the Palestinian Authority for attacks that killed or wounded members of 11 American families in Israel has been thrown out by the U.S. Court of Appeals for the Second Circuit.

The circuit held this morning that there was no personal jurisdiction over the action, where a jury found after a seven-week trial in 2015 that the PLO and the Authority, acting through their employees, perpetrated the attacks or provided material support for those who did.

The decision was a big setback for lawyers who have been working for years to win damages for families under the Anti-Terrorism Act, 18 U.S.C. §2333(a). The jury before Judge George Daniels in the Southern District of New York awarded the plaintiffs $218.5 million, an amount automatically tripled to $655.5 million under the Act.

Judges Pierre Leval and Christopher Droney and Southern District Judge John Koeltl, sitting by designation, said Daniels erred in finding personal jurisdiction in Sokolow v. Palestinian Liberation Organization, 15-3135.

The decision rejected the arguments of Arnold & Porter partner Kent Yalowitz, who told the circuit in April that jurisdiction should lie and justice be done for the “11 American families whose loved ones were murdered and maimed by the defendants” because the goal of the PLO and the Authority was to influence the foreign policy of the United States through coercion and intimidation—a key part of the Anti-Terrorism Act.

Yalowitz said the evidence was clear that the defendants were involved in the attacks, either through their own employees or through assistance to their allies within Hamas and the al-Aqsa Martyrs Brigade (NYLJ, April 13).

But Mitchell Berger, a partner at Squire Patton Boggs, got the better of the argument, telling the judges that case law was clear that “you have to find the brunt of the injury” in the United States to sue in an American courtroom.

The case was bought by 36 plaintiffs and four estates seeking compensation for death and injuries that occurred in a series of attacks, including the July 31, 2002, Hebrew University bombing carried out by Hamas that killed nine people, four of them U.S. citizens.

****  

During the second Intifada, numerous American citizens were murdered by terrorist attacks.

In 2004, the families of several deceased victims sued the Palestine Liberation Organization (PLO) and the Palestinian Authority (PA) in the Southern District of New York under the Antiterrorism Act. The families claim the PLO and PA organizations financed and orchestrated the following seven attacks:

(1) The January 8, 2001 shooting attack on Varda Guetta and her son Oz;

(2) The January 22, 2002 shooting attack on Shayna Gould and Shmuel Waldman;

(3)The January 27, 2002 suicide bombing attack on the Sokolow family;

(4) The March 21, 2002 suicide bombing attack on Alan Bauer and his son Yehonatan;

(5) The June 19, 2002 suicide bombing attack on Shaul Mandelkorn;

(6) The July 31, 2002 Hebrew University Cafeteria bombing which killed David Gritz, Benjamin Blustein, Diane Carter and Janis Coulter;

(7) The January 29, 2004 suicide bombing attack on a bus which killed Yechezkel Goldberg.

The plaintiffs seek up to $3 billion in damages from attacks between January 2001 and February 2004 by the PLO. In September 2008, U.S. District Judge George Daniels rejected the PLO’s argument that the attacks were acts of war rather than terrorism. Trial began in January 2015 and on February 23, the jury returned a guilty verdict on all counts. The defense has been found liable for $218.5 million, an amount set to be tripled to $655.5 million.

****

Case documents for Sokolow et al. v. PLO et al.

Hillary’s Responses are Under Oath

If anyone believes that Hillary herself will be crafting the responses to the 25 questions, you need to think again. Hillary likely wont even be in the same room, a fleet of lawyers will assume the task in full.

Personally, I have several additional questions that should be asked. 1. How many servers, where are they and what is being used today? 2. Where did you received classified and top secret communications? 3. Where are the communications between you, Mrs. Clinton and the Pentagon and or the White House? 4. Where are the communications regarding Syria, Russian and Iran? 5. Where are all the hardcopies of top secret materials that were delivered to you on a daily basis assuring all were placed in burn bags? 6. Where are the communications regarding the countless waivers to law you signed and list what they were and why?

Hillary Clinton to explain to court who ‘recommended’ secret email account

WashingtonTimes: Hillary Clinton will get a chance to explain why she continued to use her secret home email account for government business in defiance of repeated security warnings from her underlings — just some of the 25 questions she’ll have to answer, in writing and under oath, to a federal court.

Judicial Watch, a conservative public interest law firm, submitted the 25 questions to Mrs. Clinton Tuesday, and she now has a month to respond under the procedure set by Judge Emmet G. Sullivan.

Among the questions are who “recommended” that she use a secret email account in the first place, whether she ever told the officials responsible for archiving records that she had the secret account, and what steps she took after attempts to hack her account.

Mrs. Clinton could also have to answer whether she destroyed work-related emails.

“These are simple questions about her email system that we hope will finally result in straightforward answers, under oath, from Hillary Clinton,” Judicial Watch President Tom Fitton said in a statement as he released the 25 questions.

Mrs. Clinton eschewed a state.gov account during her time in office and instead used an account tied to a server she kept at her home in New York. That arrangement effectively thwarted open-records laws and shielded her communications from public view for more than six years.

After prodding by Congress, the State Department demanded she return her emails, and she turned over about 30,000 messages she said were work-related, and said she deleted another 30,000 that were personal — and then wiped her server.

The FBI, after a yearlong investigation, recovered thousands of work-related messages it said Mrs. Clinton failed to turn over, and said there may have been others that investigators were unable to recover thanks to Mrs. Clinton’s thoroughness in wiping the server.

Judicial Watch had tried to force Mrs. Clinton to testify in person under oath but Judge Sullivan ruled against that, instead saying that the former Cabinet official, senator and first lady, and current Democratic presidential candidate, could testify in writing.

The questions are supposed to focus on the creation, use and handling of Mrs. Clinton’s emails under open-records laws.

Mrs. Clinton has said she thought her messages were being captured because she regularly emails fellow employees on their official State Department accounts. She estimated to Congress that as many as 95 percent of the messages should have been stored that way.

But her campaign has been unable to back up that number, and Judicial Watch said that has little bearing on the other messages Mrs. Clinton exchanged with those outside of the State Department, whose mail wasn’t part of the department’s system.

“What was your understanding about how such emails would be maintained, preserved, or searched by the Department in response to FOIA requests?” Judicial Watch said in one of its questions to Mrs. Clinton.

The FBI turned over some 15,000 messages it recovered that it said Mrs. Clinton didn’t turn over to the government. It’s unclear how many of those are personal, but at least several dozen are related to the 2012 Benghazi terrorist attack, department lawyers told a federal judge Tuesday.

The State Department is now fending off a barrage of requests to go through the 15,000 messages and release them ahead of the election.

The campaign of GOP presidential nominee Donald J. Trump said the surfacing of additional Benghazi emails was troubling.

Hillary Clinton swore before a federal court and told the American people she handed over all of her work-related emails. If Clinton did not consider emails about something as important as Benghazi to be work-related, one has to wonder what is contained in the other emails she attempted to wipe from her server,” said Jason Miller, a spokesman for the campaign.

*****

The questions are:

  1. Describe the creation of the clintonemail.com system, including who decided to create the system, the date it was decided to create the system, why it was created, who set it up, and when it became operational.
  1. Describe the creation of your clintonemail.com email account, including who decided to create it, when it was created, why it was created, and, if you did not set up the account yourself, who set it up for you.
  1. When did you decide to use a clintonemail.com email account to conduct official State Department business and whom did you consult in making this decision?
  1. Identify all communications in which you participated concerning or relating to your decision to use a clintonemail.com email account to conduct official State Department business and, for each communication, identify the time, date, place, manner (e.g., in person, in writing, by telephone, or by electronic or other means), persons present or participating, and content of the communication.
  1. In a 60 Minutes interview aired on July 24, 2016, you stated that it was “recommended” you use a personal email account to conduct official State Department business. What recommendations were you given about using or not using a personal email account to conduct official State Department business, who made any such recommendations, and when were any such recommendations made?
  1. Were you ever advised, cautioned, or warned, was it ever suggested, or did you ever participate in any communication, conversation, or meeting in which it was discussed that your use of a clintonemail.com email account to conduct official State Department business conflicted with or violated federal recordkeeping laws. For each instance in which you were so advised, cautioned or warned, in which such a suggestion was made, or in which such a discussion took place, identify the time, date, place, manner (e.g., in person, in writing, by telephone, or by electronic or other means), persons present or participating, and content of the advice, caution, warning, suggestion, or discussion.
  1. Your campaign website states, “When Clinton got to the Department, she opted to use her personal email account as a matter of convenience.” What factors other than convenience did you consider in deciding to use a personal email account to conduct official State Department business? Include in your answer whether you considered federal records management and preservation requirements and how email you used to conduct official State Department business would be searched in response to FOIA requests.
  1. After President Obama nominated you to be Secretary of State and during your tenure as secretary, did you expect the State Department to receive FOIA requests for or concerning your email?
  1. During your tenure as Secretary of State, did you understand that email you sent or received in the course of conducting official State Department business was subject to FOIA?
  1. During your tenure as Secretary of State, how did you manage and preserve emails in your clintonemail.com email account sent or received in the course of conducting official State Department business, and what, if anything, did you do to make those emails available to the Department for conducting searches in response to FOIA requests?
  1. During your tenure as Secretary of State, what, if any, effort did you make to inform the State Department’s records management personnel (e.g., Clarence Finney or the Executive Secretariat’s Office of Correspondence and Records) about your use of a clintonemail.com email account to conduct official State Department business?
  1. During your tenure as Secretary of State, did State Department personnel ever request access to your clintonemail.com email account to search for email responsive to a FOIA request? If so, identify the date access to your account was requested, the person or persons requesting access, and whether access was granted or denied.
  1. At the time you decided to use your clintonemail.com email account to conduct official State Department business, or at any time thereafter during your tenure as Secretary of State, did you consider how emails you sent to or received from persons who did not have State Department email accounts (i.e., “state.gov” accounts) would be maintained and preserved by the Department or searched by the Department in response to FOIA requests? If so, what was your understanding about how such emails would be maintained, preserved, or searched by the Department in response to FOIA requests?
  1. On March 6, 2009, Assistant Secretary of State for Diplomatic Security Eric J. Boswell wrote in an Information Memo to your Chief of Staff, Cheryl Mills, that he “cannot stress too strongly, however, that any unclassified BlackBerry is highly vulnerable in any setting to remotely and covertly monitoring conversations, retrieving email, and exploiting calendars.” A March 11, 2009 email states that, in a management meeting with the assistant secretaries, you approached Assistant Secretary Boswell and mentioned that you had read the “IM” and that you “get it.” Did you review the March 6, 2009 Information Memo, and, if so, why did you continue using an unclassified BlackBerry to access your clintonemail.com email account to conduct official State Department business? Copies of the March 6, 2009 Information Memo and March 11, 2009 email are attached as Exhibit A for your review.
  1. In a November 13, 2010 email exchange with Huma Abedin about problems with your clintonemail.com email account, you wrote to Ms. Abedin, in response to her suggestion that you use a State Department email account or release your email address to the Department, “Let’s get a separate address or device.” Why did you continue using your clintonemail.com email account to conduct official State Department business after agreeing on November 13, 2010 to “get a separate address or device?” Include in your answer whether by “address” you meant an official State Department email account (i.e., a “state.gov” account) and by “device” you meant a State Department-issued BlackBerry. A copy of the November 13, 2010 email exchange with Ms. Abedin is attached as Exhibit B for your review.
  1. Email exchanges among your top aides and assistants in August 30, 2011 discuss providing you with a State Department-issued BlackBerry or State Department email address. In the course of these discussions, State Department Executive Secretary Stephen Mull wrote, “[W]e are working to provide the Secretary per her request a Department issued BlackBerry to replace her personal unit which is malfunctioning (possibly because of her personal email server is down). We will prepare two versions for her to use – one with an operating State Department email account (which would mask her identity, but which would also be subject to FOIA requests).” Similarly, John Bentel, the Director of Information and Records Management in the Executive Secretariat, wrote, “You should be aware that any email would go through the Department’s infrastructure and [be] subject to FOIA searches.” Did you request a State Department issued Blackberry or a State Department email account in or around August 2011, and, if so, why did you continue using your personal device and clintonemail.com email account to conduct official State Department business instead of replacing your device and account with a State Department-issued BlackBerry or a State Department email account? Include in your answer whether the fact that a State Department-issued BlackBerry or a State Department email address would be subject to FOIA affected your decision. Copies of the email exchanges are attached as Exhibit C for your review.
  1. In February 2011, Assistant Secretary Boswell sent you an Information Memo noting “a dramatic increase since January 2011 in attempts . . . to compromise the private home email accounts of senior Department officials.” Assistant Secretary Boswell “urge[d] Department users to minimize the use of personal web-email for business.” Did you review Assistant Secretary Boswell’s Information Memo in or after February 2011, and, if so, why did you continue using your clintonemail.com email account to conduct official State Department business? Include in your answer any steps you took to minimize use of your clintonemail.com email account after reviewing the memo. A copy of Assistant Secretary Boswell’s February 2011 Information Memo is attached as Exhibit D for your review.
  1. On June 28, 2011, you sent a message to all State Department personnel about securing personal email accounts. In the message, you noted “recent targeting of personal email accounts by online adversaries” and directed all personnel to “[a]void conducting official Department business from your personal email accounts.” Why did you continue using your clintonemail.com email account to conduct official State Department business after June 28, 2011, when you were advising all State Department Personnel to avoid doing so? A copy of the June 28, 2011 message is attached as Exhibit E for your review.
  1. Were you ever advised, cautioned, or warned about hacking or attempted hacking of your clintonemail.com email account or the server that hosted your clintonemail.com account and, if so, what did you do in response to the advice, caution, or warning?
  1. When you were preparing to leave office, did you consider allowing the State Department access to your clintonemail.com email account to manage and preserve the official emails in your account and to search those emails in response to FOIA requests? If you considered allowing access to your email account, why did you decide against it? If you did not consider allowing access to your email account, why not?
  1. After you left office, did you believe you could alter, destroy, disclose, or use email you sent or received concerning official State Department business as you saw fit? If not, why not?
  1. In late 2014, the State Department asked that you make available to the Department copies of any federal records of which you were aware, “such as an email sent or received on a personal email account while serving as Secretary of State.” After you left office but before your attorneys reviewed the email in your clintonemail.com email account in response to the State Department’s request, did you alter, destroy, disclose, or use any of the email in the account or authorize or instruct that any email in the account be altered, destroyed, disclosed, or used? If so, describe any email that was altered, destroyed, disclosed, or used, when the alteration, destruction, disclosure, or use took place, and the circumstances under which the email was altered, destroyed, disclosed, or used? A copy of a November 12, 2014 letter from Under Secretary of State for Management Patrick F. Kennedy regarding the State Department’s request is attached as Exhibit F for your review.
  1. After your lawyers completed their review of the emails in your clintonemail.com email account in late 2014, were the electronic versions of your emails preserved, deleted, or destroyed? If they were deleted or destroyed, what tool or software was used to delete or destroy them, who deleted or destroyed them, and was the deletion or destruction done at your direction?
  1. During your October 22, 2015 appearance before the U.S. House of Representatives Select Committee on Benghazi, you testified that 90 to 95 percent of your emails “were in the State’s system” and “if they wanted to see them, they would certainly have been able to do so.” Identify the basis for this statement, including all facts on which you relied in support of the statement, how and when you became aware of these facts, and, if you were made aware of these facts by or through another person, identify the person who made you aware of these facts.
  1. Identify all communications between you and Brian Pagliano concerning or relating to the management, preservation, deletion, or destruction of any emails in your clintonemail.com email account, including any instruction or direction to Mr. Pagliano about the management, preservation, deletion, or destruction of emails in your account when transferring the clintonemail.com email system to any alternate or replacement server. For each communication, identify the time, date, place, manner (e.g., in person, in writing, by telephone, or by electronic or other means), persons present or participating, and content of the communication.

“These are simple questions about her email system that we hope will finally result in straight-forward answers, under oath, from Hillary Clinton,” stated Judicial Watch President Tom Fitton.

In his opinion ordering Clinton to answer written questions under oath Judge Sullivan wrote:

The Court is persuaded that Secretary Clinton’s testimony is necessary to enable her to explain on the record the purpose for the creation and operation of the clintonemail.com system for State Department business.

In its July 2016 request to depose Hillary Clinton, Judicial Watch argued:

Secretary Clinton’s deposition is necessary to complete the record. Although certain information has become available through investigations by the Benghazi Select Committee, the FBI, and the State Department Inspector General, as well as through Plaintiff’s narrowly tailored discovery to date, significant gaps in the evidence remain. Only Secretary Clinton can fill these gaps, and she does not argue otherwise.

***

To [Judicial Watch’s] knowledge, Secretary Clinton has never testified under oath why she created and used the clintonemail.com system to conduct official government business. Her only public statements on the issue are unsworn.

Judge Sullivan also ordered that Judicial Watch may depose the former Director of Information Resource Management of the Executive Secretariat (“S/ES-IRM”) John Bentel by October 31.

The questions and deposition arise in a Judicial Watch Freedom of Information Act (FOIA) lawsuit before Judge Sullivan first filed in September 2013 seeking records about the controversial employment status of Huma Abedin, former Deputy Chief of Staff to Clinton.  The lawsuit was reopened because of revelations about the clintonemail.com system. (Judicial Watch v. U.S. Department of State (No. 1:13-cv-01363)).

Judicial Watch has already taken the deposition testimony of seven Clinton aides and State Department officials.

For further information on this case, click here.

ISIS Built Their Network in Front of Europe’s Face

How ISIS built the machinery of terror under Europe’s gaze

TimesofIndia: The day he left Syria with instructions to carry out a terrorist attack in France, Reda Hame, 29, a computer technician from Paris, had been a member of the Islamic State for just over a week.

His French passport and his background in information technology made him an ideal recruit for a rapidly expanding group within ISIS that was dedicated to terrorizing Europe. Over just a few days, he was rushed to a park, shown how to fire an assault rifle, handed a grenade and told to hurl it at a human silhouette. His accelerated course included how to use an encryption program called TrueCrypt, the first step in a process intended to mask communications with his ISIS handler back in Syria.

The handler, code-named Dad, drove Hame to the Turkish border and sent him off with advice to pick an easy target, shoot as many civilians as possible and hold hostages until the security forces made a martyr of him.

“Be brave,” Dad said, embracing him.

Hame was sent out by a body inside the Islamic State that was obsessed with striking Europe for at least two years before the deadly assaults in Paris last November and in Brussels this month. In that time, the group dispatched a string of operatives trained in Syria, aiming to carry out small attacks meant to test and stretch Europe’s security apparatus even as the most deadly assaults were in the works, according to court proceedings, interrogation transcripts and records of European wiretaps obtained by The New York Times.

Related reading: Terror in Europe: Safeguarding U.S. Citizens At Home And Abroad
Officials now say the signs of this focused terrorist machine were readable in Europe as far back as early 2014. Yet local authorities repeatedly discounted each successive plot, describing them as isolated or random acts, the connection to the Islamic State either overlooked or played down.

“This didn’t all of a sudden pop up in the last six months,” said Michael T Flynn, a retired Army lieutenant general who ran the Defense Intelligence Agency from 2012 to 2014. “They have been contemplating external attacks ever since the group moved into Syria in 2012.”

Hame was arrested in Paris last August, before he could strike, one of at least 21 trained operatives who succeeded in slipping back into Europe. Their interrogation records offer a window into the origins and evolution of an Islamic State branch responsible for killing hundreds of people in Paris, Brussels and beyond.

European officials now know that Dad, Hame’s handler, was none other than Abdelhamid Abaaoud, the Belgian operative who selected and trained fighters for plots in Europe and who returned himself to oversee the Paris attack, the deadliest terrorist strike on European soil in over a decade.

 

The people in Abaaoud’s external operations branch were also behind the Brussels attacks, as well as a foiled attack in a suburb of Paris last week, and others are urgently being sought, Belgian and French officials say.

“It’s a factory over there,” Hame warned his interlocutors from France’s intelligence service after his arrest. “They are doing everything possible to strike France, or else Europe.”

For much of 2012 and 2013, the jihadi group that eventually became the Islamic State was putting down roots in Syria. Even as the group began aggressively recruiting foreigners, especially Europeans, policymakers in the United States and Europe continued to see it as a lower-profile branch of al-Qaida that was mostly interested in gaining and governing territory.

One of the first clues that the Islamic State was getting into the business of international terrorism came at 12:10 p.m. on Jan. 3, 2014, when the Greek police pulled over a taxi in the town of Orestiada, less than four miles from the Turkish border. Inside was a 23-year-old French citizen named Ibrahim Boudina, who was returning from Syria. In his luggage, the officers found 1,500 euros, or almost $1,700, and a French document titled “How to Make Artisanal Bombs  in the Name of Allah.”

But there was no warrant for his arrest in Europe, so the Greeks let him go, according to court records detailing the French investigation.

Boudina was already on France’s watch list, part of a cell of 22 men radicalized at a mosque in the resort city of Cannes. When French officials were notified about the Greek traffic stop, they were already wiretapping his friends and relatives. Several weeks later, Boudina’s mother received a call from a number in Syria. Before hanging up, the unknown caller informed her that her son had been “sent on a mission,” according to a partial transcript of the call.

The police set up a perimeter around the family’s apartment near Cannes, arresting Boudina on February 11, 2014.

In a utility closet in the same building, they found three Red Bull soda cans filled with 600 grams of TATP, the temperamental peroxide-based explosive that would later be used to deadly effect in Paris and Brussels.

It was not until nearly two years later, on Page 278 of a 359-page sealed court filing, that investigators revealed an important detail: Boudina’s Facebook chats placed him in Syria in late 2013, at the scene of a major battle fought by a group calling itself the “Islamic State in Iraq and Syria.”

According to a brief by France’s domestic intelligence agency, he was the first European citizen known to have traveled to Syria, joined the Islamic State and returned with the aim of committing terrorism. Yet his ties to the group were buried in French paperwork and went unconnected to later cases.

Including Boudina, at least 21 fighters trained by the Islamic State in Syria have been dispatched back to Europe with the intention of causing mass murder, according to a Times count based on records from France’s domestic intelligence agency. The fighters arrived in a steady trickle, returning alone or in pairs at the rate of one every two to three months throughout 2014 and the first part of 2015.

Like the killers in Paris and Brussels, all of these earlier operatives were French speakers — mostly French and Belgian citizens, alongside a handful of immigrants from former French colonies, including Morocco.

They were arrested in Italy, Spain, Belgium, France, Greece, Turkey and Lebanon with plans to attack Jewish businesses, police stations and a carnival parade. They attempted to open fire on packed train cars and on church congregations. In their possession were box cutters and automatic weapons, walkie-talkies and disposable cellphones, as well as the chemicals to make TATP.

Most of them failed. And in each instance, officials failed to catch — or at least to flag to colleagues — the men’s ties to the nascent Islamic State.
In one of the highest-profile instances, Mehdi Nemmouche returned from Syria via Frankfurt, Germany, and made his way by car to Brussels, where on May 24, 2014, he opened fire inside the Jewish Museum of Belgium, killing four people. Even when the police found a video in his possession, in which he claims responsibility for the attack next to a flag bearing the words “Islamic State of Iraq and Syria,” Belgium’s deputy prosecutor, Ine Van Wymersch, dismissed any connection.

“He probably acted alone,” she told reporters at the time.
Among the clearest signs of the Islamic State’s growing capacity for terrorist attacks is its progress in making and deploying bombs containing triacetone triperoxide, or TATP.