An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.

Abu Bakr al-Baghdadi = 1 Barack Obama = 0

The truth is that Barack Obama continues to tell us and the world that ISIL (as he calls them) is NOT Islamic, but rather a JV team of rag tag militants…..but here is the deal, the leader of Islamic State has a PhD and we don’t even really know what Barack has…

While many don’t want to understand the historical Islamic threat as it is for sure convoluted and quite a long teaching moment, the enemy does use it as a weapon and since it is historical and is a disgusting religious culture, countries in the West just don’t know how to create a strategy and defeat this non-state, non-country caliphate.

Consider, even IF ISIS is defeated in either Libya, Syria or Iraq, at this point the war goes on, their platform is planted around the globe so the fight could be a forever fight. The tactics of the enemy may change but it is important to understand the dynamics and fluid enemy strategy as it not exclusive to a battlefield in Fallujah, Raqqah or Mosul or Sirte or Sa’ana in Yemen.

Meanwhile the text below is the creed of Islamic State and there are important factors to understand not only as citizens, voters but as well demand more from a new regime in the White House in 2017.

Ladies and Gentlemen, the implications for domestic security and stability are very important. If you question the focus, keep in mind San Bernardino, Paris and Brussels.

   

A Self-Profile Of The Islamic State: The Creedal Document

By: Prof. Ella Landau-Tasseron*

MEMRI: In 2015, the Islamic State (ISIS) released a document titled “These Are Our Creeds and Ways.” The document is a self-profile of the Islamic State, presenting the organization’s basic theology and political ideology. It deals with topics that have occupied Muslim minds for generations, yet it also reflects modern and local conditions and phenomena. An examination of its contents reveals that ISIS adds nothing new to traditional Islamic dogmas except for making the return of the caliphate a mandatory article of faith. It is firmly based on Islamic sources, which it cites often, and much of its content is identical to Islamic conservative Hanbali and neo-Hanbali doctrines.

For the full text of Prof. Landau-Tasseron’s paper, click here.

 

The following is the full text of the report.

Introduction

In 2002 Abu Mus’ab al-Zarqawi established a jihadi group in Iraq called Monotheism and Jihad. In 2004 he pledged allegiance to Bin Laden and renamed his group “Al-Qaeda in Iraq,” thus apparently merging it with Al-Qaeda. After Al-Zarqawi was killed in June 2006, his followers renamed the group “The Islamic State in Iraq,” without bin Laden’s approval. This ostensive state was not proclaimed a caliphate, but its leader, Abu ‘Umar al-Baghdadi, was referred to as “The Commander of the Faithful,” a term usually applied to the caliph. This first version of the Islamic State was almost annihilated by 2010. It recuperated, however, and in June 2014 the group reestablished the state, this time explicitly declaring it to be it a caliphate. This second version was at first called The Islamic State in Iraq and Syria (ISIS; in Arabic: dawlat al-Islam fi al-Iraq wal-Sham, abbreviated as Daesh, and also translated as The Islamic State in Iraq and the Levant, ISIL). Later the name was changed to The Islamic State (dawlat al-Islam), in accordance with the organization’s rejection of the concept of nation states – though others continue to refer to the organization as ISIS, ISIL or Daesh (this report will use the name ISIS). Ibrahim Awwad, then head of Al-Qaeda in Iraq, was appointed as the Islamic State’s first caliph. Upon assuming the title he took the name Abu Bakr Al-Baghdadi Al-Huseini Al-Qurashi.[1]

During the period in which Al-Zarqawi cooperated with Al-Qaeda (October 2004 – June 2006), his movement posted a short document on its website signed by “The High Command and the Legal Committee of Al-Qaeda in the Land of the Two Rivers (i.e. Iraq).” This document set out the main creeds and doctrines of the combined Monotheism and Jihad/Al-Qaeda organization.[2]

In 2015 – by which time the political scene in Iraq and Syria had changed considerably – ISIS republished the document with small modifications under the title “These Are Our Creeds and Ways.” Released by ISIS’s publishing house, Maktabat Al-Himma, it was posted on the Internet and apparently also distributed in print.[3] One of the online copies is subtitled “Ahl al-sunna wa-jama’a madha ya’taqidun wa-bi-madha yu’minun?” (“What are the creeds and beliefs of the People who follow the Prophet’s Customs and adhere to the Community?”).  The term ahl al-sunna wa-jama’a has always denoted orthodox Sunni Islam. This subtitle thus identifies the Islamic State’s Islam as the genuine form of the religion.

The following report summarizes and analyzes the 2015 version of the creedal document, with occasional references to the earlier version. (For the full Arabic text of the 2015 document, see the Appendix at the end of this paper, following the Endnotes).

The document comprises 36 paragraphs (unnumbered in the original), appearing in a somewhat haphazard order. The opening paragraph delineates the boundaries of the community of believers, as follows: members are those who believe in absolute monotheism and the mission of the Prophet Muhammad, and meet all the requirements that ensue from this belief. Whoever fails to fully meet any of these requirements is an unbeliever, even if they proclaim themselves to be Muslims.

The next 35 paragraphs define the requirements that one must meet in order to be considered a Muslim, mostly in the form of mandatory creeds (as opposed to specific duties that must be performed by the believers). The requirements fall in two basic categories: theological and political. The first category involves articles of faith that relate to the concept of monotheism and the divine message, and to eschatology. The second involves principles relating to sources of authority, leadership, jihad, internal cohesion, the nature of faith and conditions for the accusation of unbelief (takfir). This is not to say that the religious/political distinction is a sharp one. “Politics” in Islam is informed by religion: the sources of authority are the sacred texts; internal cohesion is a religious obligation, and so is jihad, and the conditions for takfir define the transgressors against the religion, who must be fought. Conversely, some of the theological articles of faith have political implications. For example, within the category of eschatology the document mentions belief in the return of the caliphate. This tenet implies that believers owe allegiance to the Islamic State.

Theology: Monotheism And The Divine Message

Debates about the concept of monotheism have raged among Muslims since the first centuries of Islam. Rationalists who were later referred to as the Mu’tazila movement raised several questions pertaining to monotheism. For example, how should a believer interpret Koranic idioms such as “Allah sees,” “Allah’s hand,” etc., which are anthropomorphisms and might therefore be seen as impairing absolute monotheism? Another problem was presented by the belief, widely-held among Muslims, that the Koran is uncreated: this belief implies the existence of an eternal (because uncreated) entity besides Allah. Regarding the first question, the rationalists concluded that the attributes should not be taken literally, and regarding the second they concluded that the Koran was created by Allah. Yet another major issue related to Allah’s justice, namely, predestination versus free will. If Allah decrees everything, this must include human actions. But then how can He punish humans for committing sins and reward them for doing good? The rationalists concluded that man is free to choose his own actions.

The Mu’tazila’s opponents rejected these rationalist positions, and some of them attempted to resolve the conundrums using various intricate formulations. Regarding the issue of Allah’s attributes, for example, it was suggested that at least some of them must be taken as metaphorical. The traditionalists, however, insisted on accepting the attributes as real and avoiding any attempt to apply human understanding to them. This was the position of many renowned medieval scholars, among them Ibn Taymiyya (d. 1348), the main authority for the neo-Hanbali school as well as for modern radical Muslims. ISIS adopts Ibn Taymiyya’s position, citing him verbatim (par. 2 of the document). Ibn Taymiyya’s formula alludes to the old controversies by emphasizing that Allah’s attributes must be taken literally, “without allegorical or figurative interpretation and without voiding them of their content” (min ghayr takyif wa-la tamthil wa-la tawil wa-la ta’til).[4]

Taking a similar approach to the question of the Koran, Ibn Taymiyya argued that it, too, is part of Allah’s attributes. As quoted in the document (par. 5), he wrote that the Koran “is Allah’s words, part of His attributes, uncreated, both its letters and its meanings.” By avoiding the word “eternal,” Ibn Taymiyya’s formula circumvents the implication that there is an eternal entity besides Allah (the Koran).[5] The angels have been yet another challenge to logic, and the ISIS document adopts the conservative position, asserting that they exist and that love for them is a sign of true faith (par. 4). As for predestination and free will, ISIS adopts a complicated formula that retains both Allah’s omnipotence and omniscience and human free will, without really resolving the paradox. According to this formula, Allah decrees everything, the will is His and His alone, He creates all human actions, and humans are free to choose their course of action if Allah chooses to allow this. In all of this He is just and compassionate (par. 9).

Being just, Allah has sent His message to humanity from the beginning of time. The document repeats the essential Muslim creed that Allah sent many prophets, the first being Adam and the last being Muhammad, whose message must be believed and obeyed by all humans (par. 3, 6).

Theology: Eschatology

Eschatological texts (i.e., texts discussing the afterlife and the end of days) in the Koran and Prophetical statements (hadith), and in other works by Muslims, comprise a vast corpus that allows for many different interpretations. That said, belief in certain eschatological themes was considered an indication of genuine faith from the very beginning of Islam. Moreover, the Last Judgment is presented in the Koran as the major incentive to repent and to believe in Allah and the Prophet.[6] The tribulations of the grave, the Last Day, the Resurrection, the Bridge leading to the final gathering place, the portents of the Hour, the Savior (Mahdi) who will rule justly before the Hour, the return of Jesus, prophet of Allah, who will break all the crosses and slay the evil false messiah (dajjal) – all of these and many other elements have been broadly accepted by Muslims as essential creeds. The view that whoever disbelieves in them is an unbeliever has been widespread. There are, however, many eschatological prophecies that did not become creedal, as well as eschatological elements whose creedal status is still debated.[7]

Muslims have debated the chronology of the eschatological events, as well as many details – and the reality – of the eschatological descriptions. For example, what are the respective roles of Jesus and the Mahdi? And is the resurrection in fact body-and soul? Are the pleasures of Heaven and tortures of Hell to be understood literally or figuratively? As with the issue of monotheism, the conservatives tended to understand the descriptions literally, whereas the rationalists did not.[8] Modern Muslims add new perspectives to the discussions. Some attempt to provide scientific explanations for apocalyptic descriptions, whereas others identify modern realities with eschatological events. The latter phenomenon peaked following the U.S. invasion of Iraq in 2003 and again after the “Arab Spring” in 2011.[9]

The ISIS creedal document avoids alluding to controversies in eschatological matters. It merely repeats the main Sunni eschatological creeds (pars. 10-14), with one important addition: “We believe in the return of Jesus who will rule justly, and we believe in the return of the Righteous Caliphate (al-khilafa al-rashida), modelled on the practices of the Prophet” (par. 12).

The return of Jesus (and/or the Mahdi), who will rule justly, has long been an essential dogma; the return of the caliphate, however, has never been one.

Throughout Islamic history, claimants to power, and whole dynasties, identified themselves with prophecies about the Savior – the Mahdi – in order to gain legitimacy and win the hearts of the masses. The most famous of these were the Abbasids (749-1258), the Fatimids (909-1171) and the Almohads (1130-1269) – and in modern times, the Mahdi of Sudan and Ghulam Ahmad of India. Although they all propagated apocalyptic ideas, the return of the Righteous Caliphate never became an article of faith. The modern dream of reestablishing the caliphate apparently emerged after the demise of the Ottoman Empire (1924),[10] but did not become dogma. The Islamic State, which claims to have realized this dream, elevated the status of the caliphate by turning it into dogma.

The Islamic State makes the connection between the caliphate and eschatology not only in the creedal document but in other texts as well. As part of this, ISIS scholars occasionally cite an enigmatic prediction attributed to the Prophet, recorded as early as the 9th century: “There will be after me twelve rulers (or caliphs), all of them from the tribe of Quraysh.”[11] Pre-modern attempts to explain this prophecy usually applied it to past events, deliberating who the twelve caliphs might have been (the Rashidun and some of the Umayyads, etc.). In other words, the explanations of the twelve-ruler tradition mostly involved retrojection, namely attempts to prove that the Prophet foresaw events that came after him, such as the decline of the Umayyads and advent of the Abbasids, the internecine wars, the revolt of the Zanj in Iraq in the 9th century, and so forth. The idea of a renewed caliphate in the future was marginal in the explanations of this tradition. By the 10th century, the twelve-ruler tradition was relegated to the status of “forged” and was rarely cited, whereas the dogma of the Mahdi who will rule justly retained its status.[12] The fate of the twelve-ruler tradition changed in modern times, when it received truly eschatological interpretations.

Even before the Islamic State, jihadists cited the twelve-ruler hadith as referring to a future caliphate, and also cited other Prophetic predictions referring to this. However, as a rule, they relegated the renewed caliphate to some unknown point in the future, seeing it as the culmination of a process of unification and consolidation of Muslim power. Contemporary Muslim apocalyptic literature sometimes contends that the Mahdi himself will establish the new caliphate.[13]

Challenging this view of the caliphate as a distant and perhaps eschatological vision, the Islamic State announced that the Caliphate has returned in the here and now, as tangible and present reality.[14] Moreover, ISIS accords the belief in the caliphate the status of an article of faith, which it never had. In the creedal document this is expressed by mentioning this belief in conjunction with a long-established creed, namely, the return of Jesus. The political implication of this newly-added creed is obvious: Whoever disbelieves in the Caliphate is an unbeliever on a par with those who disbelieve in basic eschatological events such as the return of Jesus, the Last Day, the portents of the Hour, etc.

The return of the Righteous Caliphate was already presented as dogma in the early version of the creedal document, issued by Al-Qaeda in Iraq, namely by Al-Zarqawi during his period of cooperation with Al-Qaeda (2004-2006). As a matter of fact, Al-Zarqawi and Al-Qaeda’s leaders were divided on the matter of the caliphate. Al-Zarqawi had aspired to establish a caliphate since his arrival in Iraq in 2002. Bin Laden and Zawahiri, however, did not make the establishment of a caliphate a first priority. On the contrary, Al-Qaeda warned against this at the time, arguing that the conditions were not ripe for a caliphate to be established. When the “Islamic State in Iraq” was first announced (in October 2006), it was not explicitly called a “caliphate,” though its head was referred to by the regnal title “Commander of the Faithful.” Bin Laden and Zawahiri firmly refused to recognize the state as a caliphate.[15] Accordingly, the paragraph about the caliphate in the earlier creedal document may be understood as expressing hopes for establishing a caliphate in the future – thus reflecting the ambition of Zarqawi and his followers, but also the reservations of Al-Qaeda about a caliphate in the here and now.

Only the second reincarnation of the Islamic State, established in June 2014 and headed by Abu Bakr Al-Baghdadi, came fully into the open as a self-proclaimed caliphate. Interestingly, its creedal document retains the original paragraph about the caliphate, which presents it as a vision for the future. Apparently this article is now meant to convey that the current caliphate is the righteous one promised by apocalyptic traditions. Indeed, the Islamic State goes to great lengths to prove that it is a “caliphate molded upon the Prophetic rule and customs.” This line of propaganda should be understood in the context of the criticism and de-legitimation directed against ISIS by the majority of Muslim circles, including jihadist movements and scholars.[16] In addition, keeping the caliphate in the realm of eschatological creeds, even though it has been established in reality, lends the ISIS regime an attractive transcendental aura.

Politics: Sources Of Authority

Traditionally, the sources of authority in Islam are the Koran; the model presented by the Prophet as embodied in the Hadith literature; the consensus of the scholars (ijma); and experts’ conclusions derived by deduction (qiyas) and by considering the public good (maslaha). “Consensus” was understood as the opinions prevalent within a school of jurisprudence, or the points of agreement among major early jurists. The validity of qiyas and maslaha was debated and so was the status of the Hadith. On the one hand the Hadith explained and completed the Koranic teachings, which were often unclear. On the other, it was known that much of the Hadith was fabricated. Furthermore, a problem was presented by cases where the Koran and the Hadith seemed to disagree. Already at the end of the 7th century CE many scholars solved this problem by contending that “the Sunna (as embodied in the Hadith) was the judge of the Koran and not vice versa.”[17] But the problem remained how to choose between the differing and sometimes contradictory hadiths. The Muslims developed mechanisms for distinguishing between true and false hadiths, but these were far from foolproof. Scholars continued to disagree on the authenticity of hadiths and therefore also on matters based on these hadiths.

For ISIS, the Prophet’s authenticated practices (sunna) and statements, as recorded in the Hadith literature, have absolute authority. They consider the Hadith to be “a second revelation,” on a par with the Koran (par. 7). Shari’a laws must be derived exclusively from the Koran and the Hadith; no place is accorded by ISIS to the other traditional Islamic sources of law, namely qiyas, maslaha and ijma’. Admittedly, the first two of these have often been contested, but ijma’ has always had pride of place in Sunni law-derivation.

ISIS thus adopts the standard Salafi formulation, which recognizes as sources of authority only the Koran and the authenticated hadiths as understood by the salaf, i.e., the three first generations of Muslims (par. 23). The fact that Salafis disagree among themselves even on major issues attests to the problematic nature of this position. The problem stems from the fact that even authenticated hadiths are debatable: not everyone accepts the validity of the authentication. In addition, even authenticated hadiths, as well as the interpretations of the salaf, contain plenty of inconsistencies and contradictions.

Politics: Leadership 

The second basic tenet of Islam (after monotheism) is belief in the mission and the leadership of Muhammad. He was the last of the prophets, but as the leader of the community he was succeeded by the caliphs. In line with these tenets, the document affirms that Muhammad is a universal prophet and that every person must believe in him, follow his teachings, obey him in everything, love him and respect him. The Prophet’s family must also be loved and respected, though without exaggeration. As for the Prophet’s Companions, they must be respected without reservation, and their internecine wars must be passed over in silence (par. 3, 8).

The document states further that, once a leader is nominated, the community must accept and obey him even if he is known or suspected to be a sinner, or if he is mastur al-hal (“his condition is unknown”). Only if the leader is known to be an unbeliever must he be deposed and replaced by a righteous leader (par. 24, 29, 32).

These principles of ISIS are deeply rooted in the Sunni tradition. Love for the Prophet’s family “without exaggeration” has always been a hallmark of Sunni Islam. Sunnis regard this as a characteristic which differentiates them from the Shi’a: Sunnis love and respect the family of the Prophet (ahl al-bayt), whereas Shi’ites revere them excessively. The other side of the same coin is the attitude towards Muhammad’s Companions, the Sahaba. Supporters of the Shi’a denounce most of the Sahaba on the grounds that they were to blame for usurping the caliphate from Ali, Muhammad’s cousin and son in law.[18] In response, veneration of the Sahaba became an article of faith for the Sunnis at least as early as the 9th century. By all accounts, most of the Companions sinned by participating in the internecine wars after the Prophet’s death, and the Shi’a hold this fact against them; the Sunnis, however, expressly disregard or explain away this sin.[19] It may be added that the Sunnis had no alternative but to respect the Companions, because they were the transmitters of Muhammad’s legacy (sunna) to the following generations. The Shi’a did not need the Companions for this purpose because they relied on the imams, namely the descendants of the Prophet, for information about Muhammad’s legacy.

The requirement to obey a leader even if he is a sinner is a traditional Sunni principle, inspired by fear of rebellion and of internecine wars.[20] The classical formulation of this rule (cited verbatim in par. 24) is that one may perform the ritual prayer behind any imam (leader), be he a righteous person, a sinner, or an unknown quantity in terms of the sincerity of his belief or his moral integrity.[21] In the ISIS context, the stipulation regarding “unknown condition” (mastur al-hal) may also refer to states of uncertainty, as happened in March 2015 when Al-Baghdadi was reportedly injured in an airstrike and the believers had no way of knowing the state of his health.

Politics: Internal Cohesion

Internal cohesion has been a religious obligation from the inception of Islam, as was the prohibition on internecine wars. Accordingly, the document praises solidarity among Muslims and denounces disunity and disagreement among them (par. 32). It emphasizes that all the Muslims form one community and that Arabs and non-Arab Muslims are equal, surpassing one another only in the degree of their religious devotion. When it comes to the matter of granting protection to non-Muslims on behalf of the Muslim community (dhimma, or aman), the highest Muslim official and the lowest-ranking Muslim are equally authorized to do so (par. 35). The lives, property and dignity of Muslims are inviolable “except as made licit by Allah and the Prophet” (par. 26). The Muslims must unite under one banner (par. 34). Issues that may be subject to reasoning (and therefore to disagreements) must not be the cause of mutual denunciation (par. 32, 33). Adherents of all religion except Islam are unbelievers whom the Muslims must fight (par. 36). The establishment of an Islamic caliphate is a communal obligation incumbent upon all Muslims; obedience to the nominated caliph is mandatory and rebellion is forbidden, according to the Prophet’s statement, “Whoever dies without having pledged allegiance to a caliph dies as one who has never converted to Islam” (par. 32).

All the stipulations in this document regarding solidarity, the obligation to establish a caliphate, the ban on rebellion and the duty to fight the enemies of Allah derive from classical Sunni jurisprudence. Some expressions in the document are taken verbatim from Ibn Taymiyya.[22] The purpose of the classical scholars in making these stipulations was to safeguard the Muslim identity and avoid chaos. The principle of equality is also taken verbatim from the Koran and the Hadith.[23]  As for the adherents of other religions, classical Islam tolerated them as submissive-protected communities under Islam (dhimma). In practice, the Islamic State does too, but the creedal document does not mention this possibility, labelling all non-Muslims as unbelievers who must be fought.[24]

The statement that Muslims are inviolable “except as made licit by Allah and the Prophet” in fact belongs to the issue of takfir (on which see below). It is vague enough to be subject to various interpretations. This means that the alleged inviolability of all Muslims may be set aside at the discretion of the Islamic State leaders and officials, as has in fact been amply proven by ISIS’s actions and practices.[25]

Politics: Jihad

Pre-modern Muslim jurists generally agreed that jihad must be waged in order to “make Allah’s word supreme,” that is, in order to make the Shari’a prevail wherever possible. They also agreed that Jihad must be declared and led only by a Muslim ruler or his representative, unless it is in defense of the life and property of Muslims. This pre-modern Sunni consensus on jihad disintegrated under the impact of modern circumstances and international doctrines and laws.[26] The result is a heated and ongoing debate among Muslims about the interpretation of jihad, its necessity, and many details of its implementation.

According to the ISIS creedal document, jihad must be carried out by means of both propaganda and weapons. War against Allah’s enemies is obligatory under all circumstances: with or without the permission of a nominated leader, and even single-handedly, especially if Islamic values are under attack. Propagating a religion other than Islam or insulting Islam are belligerent acts that obligate fighting the perpetrators (par. 25, 27, 30, 31). However, fighting renegades is more important than fighting unbelievers (par. 28).

The ISIS document thus blurs all distinctions and calls for a total war not only against unbelievers but also against non-ISIS Muslims. It does not mention any of the modern controversies concerning jihad.

Politics: The Nature Of Faith And The Conditions For The Accusation Of Unbelief (Takfir)

Muslims have debated the nature of faith since the beginning of theological deliberations in the 8th century CE. Some held that proper Islamic faith required belief in the heart, declaration with the tongue, and acts with the limbs, i.e. performance of the religious obligations. They also held that there were degrees of faith: “faith may increase and decrease,” as they put it; that is, one may be a better or a lesser Muslim – depending on one’s obedience or disobedience to Islamic law. Others held that there were no degrees of faith – one was either a Muslim or a disbeliever – and that performance of the religious obligations was not a necessary condition for being considered a Muslim. This means that belief in the heart and the declaration of faith suffice to make one a Muslim. In fact, both positions were accepted by classical Sunnism, but the more fervent and conservative scholars favored the first. Ibn Taymiyya, the main authority for neo-Hanbalism as well as for modern radical Muslims, argued that the position which excludes acts from the requirements of faith was in fact heretical, not Sunni.[27]

ISIS adopts the stricter position. The document states that being a Muslim requires belief in the heart, speech (that is, a declaration of faith), and acts, and there are different degrees of faith, depending on how closely a Muslim obeys the Shari’a. (par. 15)

The other side of the same coin is the conditions for the accusation of unbelief. In other words, when does one cease to be a Muslim? If one fails to perform all or some of the religious obligations, or violates Islamic prohibitions, does one become a renegade?

The matter was and continues to be hotly debated among Muslims because of the dire consequences of reneging from Islam: renegades must repent or be killed. Some 7th-8th century extremists (certain parts of the Khawarij movement) considered Muslim sinners to be unbelievers, but most Muslims have rejected this attitude and considered these Khawarij to be heretical. Various formulations were composed that, generally speaking, avoid takfir as far as possible (as opposed to the position of the abovementioned Khawarij). Even ISIS scholars, though they are extremist by the standards of the rest of the world (including Al-Qaeda), explicitly distance themselves from the fanatical Khawarij and from “extremists” (ghulat, par. 16).

The ISIS document stipulates that a Muslim forfeits the faith and becomes a renegade only if he or she abandons belief in monotheism and the Prophet, or fails to perform the ritual prayer, or commits sins while considering these sins to be licit. Committing sin (without considering it licit) does not in itself put a Muslim beyond the pale of Islam, nor does the omission of certain obligations, because the Islamic faith comprises many elements (shu’ba), not all of which are requisite for being considered a Muslim (par. 15-16).[28] According to the document, whoever appears to be a Muslim must be treated as one, unless he or she is involved in something that contradicts Islam (nawaqid al-Islam). Certain conditions and judicial processes are needed in order to establish an accusation of unbelief against individual Muslims (takfir al-muayyan) (par. 17, 19). At the same time, the document states that the Shi’a are all unbelievers, as well as everyone who adheres to a religion other than Islam (par. 18, 20). Countries governed by infidel governments are “the abode of unbelief” (dar kufr), but their inhabitants are not necessarily all unbelievers (par. 21).

All of these stipulations concerning takfir are characteristic Hanbali and neo-Hanbali positions, often cited verbatim in the document.[29] Muhammad bin Abd Al-Wahhab composed a list of ten nawaqid al-Islam.[30] Ibn Taymiyya in particular promoted the distinction between unbelief in the abstract sense, that is, the heretical doctrines themselves, and the proclamation of a specific individual as an unbeliever (takfir al-mu’ayyan).[31] The latter requires meeting certain conditions and carrying out a judicial process of proof. Its purported consequence is that no punitive measures may be taken against a renegade until his or her status as such has been proven. It should be noted that abandoning Allah and the Prophet, omitting the act of prayer, and considering sins as licit are not the only ways to forfeit the faith.[32] Thus, for example, Ibn Taymiyya considered the widely-practiced custom of venerating saints to be an expression of unbelief. Accordingly the ISIS document stipulates that whoever is involved in “anything that contradicts Islam” is an unbeliever (par. 19), and that “whoever fails to meet all the conditions and requirements [of monotheism] or infringes upon it in any way” (par. 1) is an unbeliever. However, the document does not specify precisely what “the conditions and requirements” of monotheism are, the result being that the statement “whoever pronounces the proclamation of faith and shows himself to be a Muslim must be treated as one” (par. 19) is rendered meaningless. Without specific rules regarding the tests of faith, the criteria employed in a judicial process to establish takfir al-muayyan remain at the discretion of the Islamic State. Indeed, in the past these tests of faith were at the discretion of the Muslim scholars. This is precisely why there were always disagreements about takfir. Furthermore, the document adds modern ideologies to the category of egregious unbelief, namely, secularism, nationalism, patriotism, communism and Baathism. It therefore appears that the distinction between abstract unbelief and specific unbelievers who must be punished is quite blurry, and the rules for the accusation of takfir are conveniently vague. It is not surprising that many Sunnis have been killed by the Islamic State not necessarily because they omitted to perform the ritual prayer, or disavowed Allah and Muhammad, but because they did not join the State, or criticized it. Obviously, ISIS’s loose criteria of takfir enabled it to kill those Sunnis as apostates or rebels, even though they proclaimed themselves to be Muslims.[33]

The stipulation that Muslims under infidel rule are not necessarily infidels themselves (par.21) harks back to situations in medieval times when frontier lands, as well as Al-Andalus, all of which were formerly under Muslim rule, fell back under the control of unbelievers. A famous case in point is that of the Anatolian town Mardin, which was contested between the Mongols and the Mamluks in the 13th century CE. Ibn Taymiyya wrote several legal rulings concerning the status of this town.[34] The legal problem was that many of the Islamic obligations, such as giving alms (sadaqa), performing jihad, judging according to the Shari’a and so on, depend on the regime being Islamic. Muslims under an unbeliever regime cannot perform these obligations, so the question arises whether they still count as Muslims.

In mentioning this issue in its creedal document (i.e. the status of those living under non-Muslim rule), ISIS is obviously referring to the citizens of Arab and Muslim countries, whose regimes it considers to be renegade. It is noteworthy that the earlier version of the document (the Al-Qaeda version) explained why the subjects of such renegade Arab and Muslim regimes still count as Muslims. It stated that these renegade regimes took power in Muslim countries and there was no Muslim State to deter them. The citizens of these countries, who were powerless, are therefore blameless and do not forfeit their status as Muslims. This explanation is omitted in the current ISIS document for obvious reasons: The Islamic State is now in power and fights the renegade regimes. Nevertheless, ISIS retained the statement about the inhabitants of the “abode of unbelief” not necessarily being unbelievers. The reason is probably ISIS’s wish to distinguish itself from “extremists” and to avoid alienating the inhabitants of these countries. However, this statement does not prevent ISIS from killing Muslims indiscriminately.

Conclusion

The document “These are our Creeds and Ways” is a self-profile of the Islamic State, reflecting its basic theology and political ideology. ISIS declares that it shuns extremism, and in fact it adds nothing new to traditional Islamic dogmas except for making the return of the caliphate a mandatory article of faith. The document deals with topics that have occupied Muslim minds for generations, yet it also reflects modern and local conditions and phenomena. It is firmly based on Islamic sources, which it cites often, and much of its content is identical to Islamic conservative Hanbali and neo-Hanbali doctrines.

 

* Ella Landau-Tasseron is a retired professor at the Department for Islamic and Middle Eastern Studies at the Hebrew University of Jerusalem. Her research fields are early Islamic history, the Arabian tribal system, Islamic political institutions, hadith, Islamic historiography, and jihad. Among her publications are a series of articles on the tribal society in pre-and early Islamic times, two monographs on the institution of the Islamic “oath of allegiance,” and a monograph on non-combatants in Islamic thought.

 

Endnotes:

[1] See William McCants, The ISIS Apocalypse: The History, Strategy, and Doomsday Vision of the Islamic State, New York, 2015, 1-22, 31-45, 73-84, 121-6, 135-44 (12-15 on the period of cooperation between al-Zarqawi and  al-Qaeda).

[2] “The Pulpit of Monotheism and Jihad” website http://www.ilmway.com/site/maqdis/MS_35417.html (accessed 21 March, 2016).

[3] The document was provided to me by MEMRI. I owe thanks in particular to Rafi Green and Hagit Migron. The text can be accessed at https://ia801302.us.archive.org/1/items/3akedatona-1/3Qidatona.pdf and also at https://archive.org/details/3akedatona-1 (accessed 18 April, 2016). The date of publication is July 22, 2015 and the compiler is identified as Abu Qudama Al-Muhajir.

[4] This formula concludes Ibn Taymiyya’s highly sophisticated discussion of the subject, see Ibn Taymiyya, Majmu Fatawa Shaykh al-Islam, Medina: Majma’ al-Malik Fahd li-Tiba’at al-Mushaf al-Sharif, 2004, 8/432; idem, Al-Risala al-Tadmuriyya, Medina: Matabi’ al-Madina al-Munawwara, n.d. See also http://www.alagidah.com/vb/showthread.php?t=2238 (accessed  March 17, 2016).

[5] See Ibn Taymiyya, Majmu Fatawa , 13/132.

[6] See e.g., Koran 2: 62, 126 177, 4: 39, 162, 6:31, 32:10-12, 70:26, among others. On the Apocalypse in Islam see J. Idleman Smith and Y. Yazbek Haddad, The Islamic Understanding of Death and Resurrection, Albany: State University of New York Press, 1981; D. Cook, Studies in Muslim Apocalyptic, Princeton, New Jersey: The Darwin Press, 2002 (apocalypse in the Quran: 269-306).

[7] See e.g., http://www.ahlalhdeeth.com/vb/showthread.php?t=231962  (accessed March 20, 2016). The scholarly works consulted for this paper do not make the distinction between eschatological themes that became creeds and others that did not.

[8] Smith and Haddad, The Islamic Understanding, 65, 95, among others.

[9] Smith and Haddad, The Islamic Understanding, 127-46; D. Cook, Contemporary Muslim Apocalyptic Literature, Syracuse: Syracuse University Press, 2005; McCants, The ISIS Apocalypse, especially 28-29, 99-100, 105-111, 145-7 among others.

[10] There were a few abortive attempts to reestablish a caliphate, see McCants, ISIS, 122. See also Cook, Contemporary Muslim Apocalyptic, 129-32, 225-9.

[11] McCants, ISIS, 114-9, 179-81.

[12] There are several versions of the twelve-ruler hadith, see, Ahmad b. Muhammad al-Khallal, Al-Sunna, Riyadh: Dar al-Raya lil-Nashr wal-Tawzi’, 1410/1489, 431 (no. 652); Ibn Hibban, Sahih Ibn Hibban, ed. Shu’ayb al-Arnauut, Muassasat al-Risala, 1993, 15/43-45; al-Haythami, Majma al-Zawa’id wa-Manba’ al-Fawa’id, Cairo and Beirut: Dar al-Rayyan lil-Turath and Dar al-Kitab al-‘Arabi, 1407/ 1986, 5/178; Ahmad ibn Hanbal, Musnad Ahmad, Cairo: Muassasat Qurtuba, n.d. ,5/92-99; Ibn Hajar al-Asqalani, Fath al-Bari Sharh Sahih al-Bukhari, ed. Muhammad Fu’ad Abd al-Baqi and Muhibb al-Din al-Khatib, Beirut: Dar al-Ma’rifa, 1379/1959, 13/213-215. For a discussion of this tradition, as well as the Mahdi and the return of Jesus, see D. Cook, Studies, especially  34-188, 236-47 (the twelve rulers  on pp. 36-49).

[13] See Cook, Contemporary Muslim Apocalyptic, 90, 127-32, 157, 198, 226-9; McCants, ISIS, 134.

[14] Mullah Umar in Afghanistan assumed the Islamic regnal title “Commander of the Faithful” (amir al-muminin) as early as 1996, but his Emirate was not called caliphate. See Cook, Contemporary Muslim Apocalyptic, 172-5.

[15] See McCants, ISIS, 3-20, 39-42, 52-5, 124-5; but cf. 52, 45, 78-9, 129-30. It should be mentioned that, once the Islamic State in Iraq was declared, bin Laden did not acknowledge it but he did not openly reject it, either. Apparently his statements concerning it depended on the contexts in which they were made and the public addressed.

[16] McCants, ISIS, 126-30; see also Ella Landau-Tasseron, Delegitimizing ISIS on Islamic Grounds: Criticism Of Abu Bakr Al-Baghdadi By Muslim Scholars, MEMRI Inquiry & Analysis No. 1205, November 19, 2015.

[17] See I. Goldziher, Muslim Studies, vol. 2, translated from the German by C.R. Barber and S.M. Stern, London: George Allen and Unwin ltd. 1971, 31-3.

[18] See Etan Kohlberg, “Some Imami Shi’i views on the Sahaba”, Jerusalem Studies in Arabic and Islam 5 (1984), 143-75.

[19]  See e.g., al-Lalika’i, Sharh Usul I’tiqad Ahl al-Sunna wal-Jama’a, ed. Ahmad Sa’d Hamdan, Riyadh: Dar Tayba li-l-Nashr wa-l-Tawzi’, n.d. 7/1241 ff.

[20] See P. Crone, God’s Rule, New York: Columbia University Press, 2004, 135-8, 228-37; B. Lewis, Islam in History, Chicago: Open Court, 1993, part VI: History and Revolution (especially 261-322).

[21] Leading the prayer is one of the functions of the ruler – imam – or his representative, so that performing the prayer behind the appointed imam is a sign of obedience. See legal rulings on this topic, Islamweb.net, Markaz al-Fatwa, at

http://fatwa.islamweb.net/fatwa/index.php?page=showfatwa&Option=FatwaId&Id=120175 (accessed 19 April, 2016); Tariq al-Salaf, Bab al-Salah, at http://www.alsalafway.com/cms/fatwa.php?action=fatwa&id=3192 (accessed 19 April, 2016, cited from Ibn Taymiyya).

[22] Par. 35 – cf. Ahmad Ibn Taymiyya, Majmi’ Fatawa, 1/414, 418-22.

[23] Koran 49:13. The hadith “All Muslims are equal in blood, and the lowest of them may grant protection” is widely circulating, see e.g. Ibn Hajar al-Asqalani, Talkhis al-Habir, Cairo: Mu’assasat Qurtuba 1995, 4/216.

[24]  On ISIS and dhimma see MEMRI Inquiry & Analysis Series Report No. 1205, Delegitimizing ISIS on Islamic Grounds: Criticism Of Abu Bakr Al-Baghdadi By Muslim Scholars, November 19, 2015;

10-11.

[25] Atrocities committed against Muslims are too well known to be detailed here.

[26] See R. Peters, Islam and Colonialism: The Doctrine of jihad in Modern History, The Hague, Paris and New York: Mouton; Berlin and New York: Walter de Gruyter Distributor, 1979; Bonner, M. Jihad in Islamic History. Princeton: Princeton University Press, 2006; also see MEMRI Inquiry & Analysis Series Report No. 1205, Delegitimizing ISIS on Islamic Grounds: Criticism Of Abu Bakr Al-Baghdadi By Muslim Scholars, November 19, 2015; 7-9.

[27] See a lucid explanation of the matter in Daniel Lav, Radical Islam and the Revival of Medieval Theology, Cambridge: Cambridge University Press 2012, 24-40.

[28] Not all radicals would agree with this. See Lav, Radical Islam, 114-9. Cf. Ibn Taymiyya, Majmi Fatawa, 1/420, where he promotes internal cohesion, and denounces the Khawarij who infringe upon it by accusing other Muslims of unbelief.

[29]  See Lav, Radical Islam, 33-4, 38-40. The notion that faith comprises many elements is based on a widely circulating hadith cited in the document (par. 15).

[30] For the text, see:  http://www.twhed.com/vb/t5427/

[31] Ahmad Ibn Hanbal, Al-Masa’il wa-l-Rasa’il al-Marwiyya ‘an al-Imam Ahmad Ibn Hanbal, ed. Abdallah ibn Salman ibn Salim al-Ahmadi,  Riyadh: Dar Tayba, 1991, 1/225-30 (most of the opinions therein are not derived from Ibn Hanbal himself, although the book was published by al-Ahmadi under Ibn Hanbal’s name);  Abu al-‘Ala ibn Rashid, Dawabit Takfir al-Mu’ayyan inda Shaykhay al-Islam Ibn Taymiyya wa-Ibn Abd al-Wahhab wa-Ulama al-Da’wa al-Islahiyya, Riyadh: Maktabat al-Rushd li-l-Nashr wa-l-Tawzi’, 2004.

[32]  Lav, Radical Islam, 118.

[33]  See examples of ISIS’s arbitrary violence in McCants, ISIS, 33-5, 42-4, 136.

[34] See George Grigore, “The Historical Context of Fatwa of Mardin Given by Ibn Taymiyya,” 1st International Symposium of Mardin History Papers, ed. Ibrahim Ozcosar and Huseyin H Gunes, Istanbul 2006, 345-50.

White House: No Cyber Danger, Really?

White House Fails to Detect a Single Cyber Threat

After ordering ‘national emergency,’ Obama admin finds no cyber danger

FreeBeacon: The White House has been unable to detect a single cyber security threat more than six months after issuing a “national emergency” to deal with what the administration identified as growing and immediate danger, according to a new government report.

Six months after President Barack Obama invoked emergency powers to block the assets of any person caught engaging in “malicious cyber-enabled activities,” the administration has not identified a single qualifying target, according to the Treasury Department, which disclosed in a report that “no entities or individuals have been designated.”

Related: Iranians Hacked From Wall Street to New York Dam, U.S. Says 

The April 2015 directive issued by the White House identified an “increasing prevalence and severity of malicious cyber-enabled activities” among individuals living outside the United States.

Related: Map of Government Hack Activists

These activities were said to constitute “an unusual and extraordinary threat to the national security, foreign policy, and economy of the United States,” prompting Obama to declare “a national emergency to deal with this threat.”

A half a year later, the White House still has not invoked this power to combat growing cyber threats, despite a rise in such activity among rogue nations such as Iran, North Korea, and China.

Related: White House Cyber Security Initiative

“The Department of the Treasury took no punitive licensing actions, and it assessed no monetary penalties,” according to the department’s first periodic review of the president’s emergency order.

The White House has not explained why it has not yet invoked its powers, even following reports that Russian hackers penetrated the State Department and “sensitive parts” of the White House’s computer networks last year.

Related: Cyber attacks against our critical infrastructure are likely to increase

The Pentagon and other branches of the U.S. government also have been the targets of these types of attacks, which officials have traced back to the Russians, North Koreans, and others.

Military organizations tied to the Iranian government also have been identified as hacking into the email and social media accounts of White House officials.

The emergency powers invoked by Obama could be used to sanction individuals tied to these attacks if the administration agrees that such a determination should be made.

Those responsible for the cyber attacks already reported by the media and currently being investigated by federal authorities could quality for designation under these emergency powers.

The cyber threat posed by other nations and foreign criminals continues to grow, according to the White House, which moved to take further action on this front in February.

“Criminals, terrorists, and countries who wish to do us harm have all realized that attacking us online is often easier than attacking us in person,” the White House disclosed in announcing the creation of national plan of action to combat cyber terrorists. “As more and more sensitive data is stored online, the consequences of those attacks grow more significant each year.”

A month after Obama invoked the emergency powers, Congress launched a probe into data breaches at the White House. Some lawmakers suspected that the White House had attempted to downplay the extent of these attacks by Russians and others.

Tech, One Extreme to Another

Does anyone remember the floppy disk? How about Windows Me or COBOL?

Sheesh….

Gov’t report: Feds spend billions to run ancient technology

In a report to be released Wednesday, nonpartisan congressional investigators say the increasing cost of maintaining museum-ready equipment devours money better spent on modernization.

Despite a White House push to replace aging workhorse systems, the budget for modernization has fallen, and will be $7 billion less in 2017 than in 2010, said the Government Accountability Office. The report was provided to The Associated Press ahead of a House oversight committee hearing.

GAO said it found problems across the government, not just in a few agencies. Among those highlighted in the report:

The Defense Department’s Strategic Automated Command and Control System, which is used to send and receive emergency action messages to U.S. nuclear forces. The system is running on a 1970s IBM computing platform, and still uses 8-inch floppy disks to store data. “Replacement parts for the system are difficult to find because they are now obsolete,” GAO said. The Pentagon is initiating a full replacement and says the floppy disks should be gone by the end of next year. The entire upgrade will take longer.

Treasury’s individual and business master files, the authoritative data sources for taxpayer information. The systems are about 56 years old, and use an outdated computer language that is difficult to write and maintain. Treasury plans to replace the systems, but has no firm dates.

Social Security systems that are used to determine eligibility and estimate benefits, about 31 years old. Some use a programming language called COBOL, dating to the late 1950s and early 1960s. “Most of the employees who developed these systems are ready to retire and the agency will lose their collective knowledge,” the report said. “Training new employees to maintain the older systems takes a lot of time.” Social Security has no plans to replace the entire system, but is eliminating and upgrading older and costlier components. It is also rehiring retirees who know the technology.

Medicare’s Appeals System, which is only 11 years old, but facing challenges keeping up with a growing number of appeals, as well as questions from congressional offices following up on constituent concerns. The report says the agency has general plans to keep updating the system, depending on the availability of funds.

The Transportation Department’s Hazardous Materials Information System, used to track incidents and keep information relied on by regulators. The system is about 41 years old, and some of its software is no longer supported by vendors, which can create security risks. The department plans to complete its modernization program in 2018.

GAO estimates that the government spent at least $80 billion on information technology, or IT, in 2015. However, the total could be significantly higher. Not counted in the report are certain Pentagon systems, as well as those run by independent agencies, among them the CIA. Major systems are known as “IT investments” in government jargon. More here from WashingtonPost.

*****

Smarter than Google?

This new search engine could be way smarter than Google

Search engines that aren’t Google rarely have much that’s interesting to offer to the average consumer. But Omnity, a new search engine aimed at researchers — or even just students doing their homework — offers some glimmers of something new that make it worth taking notice.

Search, as we know it, is ripe for some sort of change, after all. Google is certainly working to bake search more fully into our cars, phones and other devices. Specialized search engines — for flights, places to stay, even .gifs — are going strong.  And then there are those AI bots being promised by Google, Facebook, Microsoft and others. What are they but high-powered, repackaged search engines?

Omnity stands out by offering results that best match for any given search term and also how those results relate to each other. So if you’re about to start a research project on a topic you know little about, you can quickly see who is getting cited the most, whose research is the most influential or which university is leading the pack on that subject. It draws from a number of data sets, including SEC filings, public news organization reports, scientific journals, financial reports and legal histories.

You can also drag and drop documents into the search engine to get an analysis of the “rare words” in it — Omnity obviously strips out the little words like “he,” “she,” “it” and “but,” yet also looks for words that are more unique to any given document to get a better idea of what it’s about. For example, I dragged in a legal filing from a case I’m researching for another article. Omnity turned up links to other cases that were relevant but not directly cited in the filing, as well as the names of some experts that I may now end up calling. More from WashingtonPost.

 

How the Military is Defeating Hackers

Here’s how the US military is beating hackers at their own game

US Soldiers IraqStaff Sgt. Stacy L. Pearsall/USAF

TechInsiders: There’s an unseen world war that has been fought for years with no clear battle lines, few rules of engagement, and no end in sight.

But it’s not a shooting war; not a war where combatants have been killed or wounded — at least not yet.

It’s a war that pits nations against each other for dominance in cyberspace, and the United States, like other nations employing professional hackers as “cyber soldiers,” sees it as a battlefield just like any other.

“It’s like an operational domain: Sea, land, air, space, and cyber,” Charlie Stadtlander, chief spokesperson for US Army Cyber Command, told Tech Insider. “It’s a place where our presence exists. Cyber is a normal part of military operations and needs to be considered as such.”

As US military leaders warn of the growing progress of Russia, China, and North Korea in cyberspace, the Pentagon has ramped up its own efforts in what it calls the “cyber domain” after the release of a new cyber strategy in April 2015.

“This ephemeral space that’s all around us, literally, is a space where operations can be performed against us,” Frank Pound, a program manager who leads DARPA’s “Plan X” cyber warfare platform, told Tech Insider. “And how do we defend against that? How do we detect that?”

Building a cyber army

In its cyber strategy, the military proposed 133 teams for its “cyber mission force” by 2018, 27 of which were directed to support combat missions by “generating integrated cyberspace effects in support of … operations.” (Effects is a common military term used for artillery and aircraft targeting, and soldiers proclaim “good effect on target” to communicate a direct hit).

The cyber mission force will comprise some 4,300 personnel. But only about 1,600 of those would be on a “combat mission team” that would likely be considered to be taking an offensive hacking role. They are up against China’s own “specialized military network warfare forces,” North Korea’s secretive Bureau 121 hacker unit, other nation-states, hacktivists like Anonymous, and criminal enterprises alike.

They have been further tasked with breaking into the networks of adversaries like ISIS, disrupting communications channels, stopping improvised explosive devices from being triggered through cellphones, or even, as one Marine general put it, just “trying to get inside the enemy’s [head].”

Online hacks can lead to offline outcomes, and the military has become keenly aware of that power. In 2009, the US and Israel reportedly infected Iranian computers with the Stuxnet malware that destroyed roughly one-fifth of the country’s nuclear centrifuges. And as recently as February, hackers were used against ISIS as others fought on the ground, quite possibly for the first time ever.

“These are strikes that are conducted in the war zone using cyber essentially as a weapon of war,” Defense Secretary Ash Carter told NPR. “Just like we drop bombs, we’re dropping cyber bombs.”

As one Army officer said during a 2015 training exercise, the cyber war seems to just be getting started: “Future fights aren’t going to be guns and bullets. They’re going to be ones and zeroes.”

soldiers cyber commandBrian Rodan/US ArmySoldiers work together during a training exercise in 2011.

‘Prepping the battlefield’

That the Pentagon would employ specialists to defend itself in cyberspace is not surprising, since government and military systems are attacked regularly by nations trying to read soldier’s email, or others who want to uncover personal details on millions who undergo background checks for security clearances.

But the defense of networks — while still an important function — has been supplanted in some cases by an offensive strategy. That is, soldiers hacking into computers overseas for intelligence or to disrupt the enemy on the battlefield — a kind of digital tit-for-tat.

“If there’s something that you can do to prep the battlefield before a kinetic attack or to disrupt defenses during kinetic attacks, why wouldn’t a combatant commander turn to that?” Stadtlander said.

Stadtlander couldn’t talk about ongoing operations that Army Cyber Command is involved in, mainly due to the unique nature of cyber warfare. An enemy who knows the US is developing a next-generation fighter jet might develop something in response that could take years, but with a cyberattack, a fix can be developed sometimes within days.

“The unique thing about cyber activity and defense is you’re talking about building a couple thousand lines of code or having a certain electronic device, or some sort of cyber capability. And just based on the nature of this space, a lot of times it can only be used once,” he said. “Once it’s known … it’s no longer a viable tool.”

Still, some insight into what the US military is capable of can be found within its own training manuals, presentations, and the few news stories by the military’s own writers. And it’s likely that hackers with Army Cyber Command, subordinate to US Cyber Command and NSA, benefit from top secret initiatives to infect “millions” of computers with malware in an effort aimed at “owning the net.”

“Denying the ability to coordinate, communicate, and assess,” Stadtlander said. “That’s an advantage that we might be able to leverage.”

Inside the Army’s cyber warfare ‘Bible’

Perhaps one of the most important publications on cyber warfare was released with little fanfare in Feb. 2014. Known as Army Field Manual 3-38 Cyber Electromagnetic Activities, it proclaimed itself as the “first doctrinal field manual of its kind,” unifying a number of other publications on network operations, electronic warfare, and intelligence into one 96-page document.

In FM 3-38, the Army defined offensive cyberspace operations as actions “intended to project power by the application of force in or through cyberspace,” while noting they are to be carried out in support of command objectives and within legal frameworks.

But what can soldiers do in cyberspace that can affect what happens on the battlefield? Quite a bit, according to the manual.

us army cyber soldierUS Army

“A cyberspace attack may be employed in conjunction with” other methods of attack “to deceive, degrade, destroy, and disrupt a specific enemy integrated air defense system or enemy safe haven,” it says.

As an example, the manual offers an early warning radar site as a target which, if soldiers can get inside the network, could possibly be destroyed or degraded.

That’s just what students trained for during an exercise in March, according to the Fort Gordon Globe. Acting just as they would on the battlefield, cyber soldiers patrolled to their objective — a simulated enemy air defense control system — then searched for their target’s wireless network so it could be exploited or neutralized.

There’s little need for stealth coating on aircraft when a guy behind a computer can disable the radar site for you. The manual also offers other systems Army hackers may consider breaking into, such as enemy telephone networks, servers, and smartphones.

“Even if you think about the way that IEDs are triggered,” Stadtlander said, using the acronym for improvised explosive devices. “Or an adversary’s [intelligence, surveillance, and reconnaissance], a lot of these are done through electronics and with internet connections.”

Getting into the Army’s ‘hacker university’

Located just southwest of Augusta, Georgia is Fort Gordon, an Army installation that brings together most of the service’s cyber warriors under one roof. In 2013, the Army chose the site as the home base of its Cyber Command after the unit was established in 2010.

Also home to a 604,000 square foot operations center for the National Security Agency, Gordon is where cyber warriors are taught their craft at what the Army calls its Cyber Center of Excellence. But before they get to the military’s “hacker university,” enlisted soldiers need to score high technical scores on the military entrance exam, and sign on for five years of service, instead of the normal four-year tour.

army cyber commandUS ArmyInsider Fort Gordon’s Cyber Operations Center.

Due to the classified nature of their work, cyber training is often conducted in secure compartmented information facilities (SCIFs) where cell phones and other outside recording devices are not allowed, and all soldiers will have to obtain a Top Secret clearance prior to being assigned to their unit.

Soldiers go through a lengthy period of training after basic training: Six months spent at the Navy’s Center for Information Dominance in Pensacola, Florida followed by six months at Fort Gordon.

Army officers go through their own training program at the Georgia base, called Cyber Basic Officer Leader Course. The course takes nearly nine months to complete and is the longest officer training program in the Army.

Enlisted soldiers train with members of all military branches over six months at the Navy’s Cyber Analysis Course, according to Bloomberg. Since students can come from a variety of skill sets and backgrounds, the first two-thirds of classroom time focuses on basic programming, mathematics, and how networks and operating systems function. But later on they learn the steps to research and infiltrate targets, defend networks, and even hack a simulated network with Metasploit, a common tool hackers have used since its release in 2004.

Meanwhile, officers receive similar training, though their position merits other coursework in leading operations as opposed to carrying them out. Though a cyber officer can likely step in and be more than capable, given the certifications they obtain, to include Cisco’s Certified Network Associate (CCNA) and the independent Certified Information Systems Security Professional (CISSP) credential.

“They are really valuably trained after that [schooling],” Stadtlander said.

So valuable in fact that the Army is seeing a challenge in retaining its talent from heavyweights in Silicon Valley.

Is hacking considered an ‘act of war’?

Chinese Army Hackersvia Flickr

“There is no international standing or framework that is binding over any one nation-state in terms of offensive cyber operations,” Bradley P. Moss, a national security lawyer, told Tech Insider. “It’s whatever rules we put in place for ourselves.”

In essence, the US, China, Russia, and others are operating in a sort-of “digital Wild West” with few overarching guidelines outside of the Law of War that predates our interconnected world.

Cyber warfare continues unabated because there is no governing body such as the United Nations telling nations not to hack one another. Not that that would necessarily make a difference, as a 2014 UN report criticized mass surveillance programs employed by NSA and others as violating privacy rights “guaranteed by multiple treaties and conventions,” The Intercept reported.

Still, Moss explained that nations are less concerned with the legalities of hacking each other, and instead, worry about the potential diplomatic and political fallout should they be exposed.

“More or less, we all engage in some manner of warfare these days, we just don’t go to ‘war’ over it,” Moss said.

How foreign nations would likely respond to being hacked by the US is something that is considered before any offensive operation, according to a top secret presidential policy directive leaked by ex-NSA contractor Edward Snowden.

The document, made public in 2013, listed cyber attacks resulting in “loss of life, significant responsive actions against the United States, significant damage to property, serious adverse US foreign policy consequences, or serious economic impact” as requiring presidential approval.

And for US military hackers who may be on a battlefield in Iraq, Syria, or elsewhere, their self-imposed rules for cyber attacks are clear:

“Military attacks will be directed only at military targets,” reads the Pentagon’s cyberspace operations document.

us army cyber commandUS Army

But what of cyber attacks that have potentially devastating effects on foreign nations, such as US-made worms that cause nuclear centrifuges to fall apart, or alleged Russian-made malware that knocks out power and heat to people in the dead of winter?

Are these “acts of war”?

“From a strictly legal matter, you could designate the US Army hacking the Russian Army’s [computer] system as an act of war,” Moss said. “Just as much as if we were to have infiltrated and damaged a Russian bomber, that would be an act of war.”

But, he added: “There’s nothing that necessarily stops us, except the political and diplomatic ramifications.”

Russian Spies and Espionage in NATO and USA

It was not long ago while interviewing a former CIA operative that he responded to my question, ‘do we have a handle on the Russian spies in the United States?’ His answer is no, and they are all over the country and the same goes with China.

2015: Three alleged Russian spies exposed by the FBI are part of the most intense effort by Russia to infiltrate agents onto American soil since the Cold War.

In an affidavit unsealed in federal court on Monday, the Justice Department accused  , also known as “Zhenya,” of posing as a Russian banker in Manhattan to funnel economic intelligence to the SVR, Russia’s foreign intelligence agency.
     
 
Two other Russians, Igor Sporyshev and Victor Podobnyy, were ostensibly diplomats in Russia’s UN mission in New York but are accused of being Buryakov’s SVR handlers. While Buryakov was operating deep undercover and therefore had no diplomatic protection, the other two have immunity and have already left the the United States.
Anecdotes in the affidavit portray the accused spies as bumbling and hapless compared to the stereotype of hard-eyed Soviet-era KGB professionals. Still, news of their existences comes at the most perilous moment in U.S.-Russia relations in decades, with Barack Obama and Vladimir Putin at a standoff over issues ranging from Ukraine to Moscow’s claims it has a right to a “sphere of influence” in its backyard. More from CNN here.
**** Now NATO:

NATO’s Big New Russian Spy Scandal

A Russian mole has been uncovered inside NATO intelligence. What does this mean for Western security?

Frederico Carvalhão Gil, a senior intelligence official was arrested this weekend in Rome.

Frederico Carvalhão Gil was arrested this weekend in Rome. (Photo: Facebook/Frederico.CarvalhaoGil

Observer: Last weekend, in the latest development in the secret espionage struggle between Vladimir Putin’s Kremlin and the West, a major Russian spy was arrested in Italy. On Saturday, Frederico Carvalhão Gil, a senior intelligence official from Portugal, was picked up by Italian police along with his Russian intelligence handler, whom he was meeting clandestinely in Rome.

Although Portugal is hardly a big player in the global spy game, it has been a member of the Atlantic Alliance since its founding in 1949, and Lisbon’s intelligence services are full members of the West’s secret spy network. Finding a mole like Mr. Carvalhão in any NATO security service is a serious matter for the whole alliance.

A career intelligence officer, the 57-year-old Mr. Carvalhão, who went into the espionage business in the late 1980s, had risen to the senior ranks of Portugal’s domestic spy agency, the Security Intelligence Service—SIS for short. He is a division chief in that service, according to Portuguese press reports, what SIS terms an area director. Mr. Carvalhão’s previous assignments have included operational work in counterintelligence and counterterrorism. A philosophy graduate, the suspected traitor is described as highly intelligent—an intellectual. It’s evident Mr. Carvalhão had access to a wide array of NATO secrets thanks to his official position.

Portuguese intelligence suspected it had a mole for some time, and a secret hunt for the turncoat commenced in 2014. With help from spy partners, including the CIA, Lisbon developed a list of suspects. Mr. Carvalhão was high on that list, not least because of his open affection for all things Eastern European, which he made plain on his Facebook page.

He also likes Eastern European women. “Zipper problems” as they are known in the spy trade have been the downfall of many turncoats, and reports of a Georgian woman Mr. Carvalhão was romantically involved with offer hints of a possible honey-trap. That deserves investigation, since such operations are textbook for the Russian intelligence services. One reason he wound up on NATO counterintelligence radar was multiple reports of indiscreet liaisons with women from the former Soviet Union.

Greed seems to have also played a role. Mr. Carvalhão was allegedly charging the Kremlin’s Foreign Intelligence Service, the SVR, 10,000 Euros ($11,100) for each classified document he was selling them—a princely sum by spy standards. We know that the SVR’s main interest in the information it sought from its Portuguese mole were secrets about NATO and the European Union. If the Russians were willing to pay that much per purloined document, it’s evident to any veteran counterintelligence hand that the classified information he was giving the SVR was important. The Kremlin won’t pay that much for junk.

Mr. Carvalhão had been through a divorce, which may have been a motivation as well—both financially and psychologically. Reeling from a divorce that left him financially strapped, the notorious CIA turncoat Aldrich Ames reached out to the KGB, the SVR’s predecessor, in 1985, offering them top secret information in exchange for $50,000. Thus began Mr. Ames’ nine years of betrayal that lasted until his 1994 arrest—a huge success for the Kremlin that cost the lives of several Soviets who were spying for the CIA.

Once SIS realized Mr. Carvalhão may have gone rogue, he was moved to a less sensitive position at work, where he had access to fewer secrets and was placed under surveillance. By last autumn, he was being watched and his phones were tapped as his employer looked for evidence of his betrayal. They soon discovered that Mr. Carvalhão made regular trips across Europe, which SIS assessed were actually clandestine meetings with the SVR to pass secrets to the Russians outside Portugal. That was less risky than meeting Russians on his home turf, as the career spy knew from his own service with Portuguese counterintelligence.

This culminated in the top secret operation in Rome last weekend which led to Mr. Carvalhão’s arrest. In coordination with Italian partners, SIS watched his movements as he took a flight to Rome last Friday, in preparation for the next day’s planned meeting with the Russians. That clandestine rendezvous was spoiled for Mr. Carvalhão when Italian police appeared at the Roman café, downtown on the Tiber, to bring him into custody on espionage charges proffered by Lisbon. He did not resist arrest.

Neither did the Russian he was meeting. In an interesting twist, his SVR handler was not in Rome under official cover, posing as a diplomat or trade representative—the default setting in espionage circles. Rather, his SVR handler was what the Russian term an Illegal, meaning he was operating without any official protection. He therefore was subject to arrest, whereas a Russian spy pretending to work at their embassy could claim diplomatic immunity to avoid police detention.

The identity of the SVR officer in custody has not been released by Italian authorities, but Illegals are an elite cadre in Russian intelligence circles, much less frequently encountered than their counterparts posing as diplomats. They are also much tougher to detect, since they aren’t working at any embassy or consulate, and last year’s FBI arrest of an SVR Illegal in New York City—where he was spying on Wall Street—was a coup for American counterintelligence.

Rome and Lisbon may have unraveled an important spy ring here. Illegals are used to handle high-value agents, for instance moles inside Western spy services like Mr. Carvalhão for whom meetings with SVR officers under official cover—who are often known to the local security service, which watches their movements closely—would pose a serious risk of exposure.

Just what this Portuguese mole gave the Russians is not yet known. Assessing that, and therefore the damage he caused to Western security, is the major task facing investigators in Lisbon and other NATO capitals right now. The Atlantic Alliances have been penetrated by the SVR many times—the most recent big case was Herman Simm, a senior Estonian security official who was arrested in 2008 after spying for the Kremlin for years, during which he had access to countless NATO secrets.

 

The disastrous case of Edward Snowden, the National Security agency IT contractor who defected to Moscow nearly three years ago, was an unprecedented blow to American intelligence and the entire Western spy partnership. In response, NATO has belatedly begun to get serious about the threat posed by Russian espionage. There was a major increase in Kremlin spying against the West beginning a decade ago, reaching and in some cases even surpassing Cold War levels of intensity. Last year, NATO forced the Russians to cut back their official delegation to alliance headquarters in Brussels, since so many of them were actually spies, brazenly stealing NATO secrets.

The SVR is every bit as audacious at stealing our secrets as the KGB ever was. The SpyWar between East and West never ended, and under Vladimir Putin—that onetime KGB officer who values espionage highly—it forms a core component of Kremlin foreign and security policy. The case of Frederico Carvalhão demonstrates that Moscow is still stealing our secrets at every opportunity. The West ignores counterintelligence, particularly against an increasingly aggressive Russia, at its peril.

 

John Schindler is a security expert and former National Security Agency analyst and counterintelligence officer.