What is YOUR Profile? Ask Google and Facebook

You have been profiled, but is it accurate? You have been sold and sold out.

Scary New Ways the Internet Profiles You

Morrison/DailyBeast: Facebook, Google, and the other Internet titans have ever more sophisticated and intrusive methods of mining your data, and that’s just the tip of the iceberg.

The success of the consumer Internet can be attributed to a simple grand bargain. We’ve been encouraged to search the web, share our lives with friends, and take advantage of all sorts of other free services. In exchange, the Internet titans that provide these services, as well as hundreds of other lesser-known firms, have meticulously tracked our every move in order to bombard us with targeted advertising. Now, this grand bargain is being tested by new attitudes and technologies.

Consumers who were not long ago blithely dismissive of privacy issues are increasingly feeling that they’ve lost control over their personal information. Meanwhile, Internet companies, adtech firms, and data brokers continue to roll out new technologies to build ever more granular profiles of hundreds of millions, if not billions, of consumers. And with next generation of artificial intelligence poised to exploit our data in ways we can’t even imagine, the simple terms of the old agreement seem woefully inadequate.

In the early days of the Internet, we were led to believe that all this data would deliver us to a state of information nirvana. We were going to get new tools and better communications, access to all the information we could possibly need, and ads we actually wanted to receive. Who could possibly argue with that?

For a while, the predictions seemed to be coming true. But then privacy goalposts were (repeatedly) moved, companies were caught (accidentally) snooping on us, and hackers showed us just how easy it is to steal our personal information. Advertisers weren’t thrilled either, particularly when we adopted mobile phones and tablets. That’s because the cookies that track us on our computers don’t work very well on mobile devices. And with our online activity split among our various devices, each of us suddenly appeared to be two or three different people.

This wasn’t a bad thing for consumers, because mobile phones emit data that enable companies to learn new things about us, such as where we go, who we meet, places we shop, and other habits that help them recognize and then predict our long-term patterns.

But now, new cross-device technologies are enabling the advertising industry to combine all our information streams into a single comprehensive profile by linking each of us to our desktop, mobile phone, and iPad. Throw in wearable devices like a Fitbit, connected TVs, and the Internet of Things, and the concept of cross-device tracking expands to potentially include anything that gives off a signal.

The ad industry is drooling over this technology because it can follow and target us as we move through our daily routines, whether we are searching on our desktop, surfing on our iPad, or out on the town with our phone in hand.

There are two methods to track people across devices. The more precise technique is deterministic tracking, which links devices to a single user when that person logs into the same site from a desktop computer, phone, and tablet. This is the approach used by Internet giants like Facebook, Twitter, Google, and Apple, all of which have enormous user bases that log into their mobile and desktop properties.

A quick glance at Facebook’s data privacy policy shows it records just about everything we do, including the content we provide, who we communicate with, what we look at on its pages, as well as information about us that our friends provide. Facebook saves payment information, details about the devices we use, location info, and connection details. The social network also knows when we visit third-party sites that use its services (such as the Like button, Facebook Log In, or the company’s measurement and advertising services). It also collects information about us from its partners.

Most of the tech giants have similar policies and they all emphasize that they do not share personally identifiable information with third parties. Facebook, for example, uses our data to deliver ads within its walled garden but says it does not let outsiders export our information. Google says it only shares aggregated sets of anonymized data.

Little-known companies—primarily advertising networks and adtech firms like Tapad and Drawbridge—are also watching us. We will never log into their websites, so they use probabilistic tracking techniques to link us to our devices. They start by embedding digital tags or pixels into the millions of websites we visit so they can identify our devices, monitor our browsing habits, look for time-based patterns, as well as other metrics. By churning massive amounts of this data through statistical models, tracking companies can discern patterns and make predictions about who is using which device. Proponents claim they are accurate more than 90 percent of the time, but none of this is visible to us and is thus very difficult to control.

In recent comments to the Federal Trade Commission, the Center for Democracy and Technology illustrated just how invasive cross-device tracking technology could be. Suppose a user searched for sexually transmitted disease (STD) symptoms on her personal computer, used a phone to look up directions to a Planned Parenthood clinic, visited a pharmacy, and then returned home. With this kind of cross-device tracking, it would be easy to infer that the user was treated for an STD.

That’s creepy enough, but consider this: by using the GPS or WiFi information generated by the patient’s mobile phone, it would not be difficult to discover her address. And by merging her online profile with offline information from a third-party data broker, it would be fairly simple to identify the patient.

So, should we be concerned that companies use cross-device tracking to compile more comprehensive profiles of us? Let us count the reasons:

Your data could be hacked: Privacy Rights Clearinghouse reports that in 2015 alone, hackers gained access to the records of 4.5 million patients at UCLA Health System, 37 million clients of online cheating website Ashley Madison, 15 million Experian accounts, 80 million Anthem customers, as well as more than 21 million individuals in the federal Office of Personnel Management’s security clearance database. And these were just the headliners that garnered media attention. No site or network is entirely safe and numerous researchers have already demonstrated how incredibly easy it is to “reidentify” or “deanonymize” individuals hidden in anonymized data.

Your profile could be sold: In fact, it typically is, in anonymized fashion. That’s the whole point. But in many cases, Internet companies’ privacy policies also make it clear our profiles are assets to be bought and sold should the company change ownership. This was the case when Verizon bought AOL and merged their advertising efforts, creating much more detailed profiles of their combined user base. Yahoo might be next should it decide to spin off its Internet properties.

Your data could be used in ways you did not anticipate: Google, Facebook, and other companies create customized web experiences based on our interests, behavior, and even our social circles. On one level, this makes perfect sense because none of us want to scroll through reams of irrelevant search results, news stories, or social media updates. But researchers have demonstrated that our online profiles also have real world consequences, including the prices we pay for products, the amount of credit extended to us, and even the job offers we may receive.

Our data is already used to build and test advanced analytics models for new services and features. There is much more to come. The Googles and the Facebooks of the Internet boast that newly emerging artificial intelligence will enable them to analyze greater amounts of our data to discern new behavioral patterns and to predict what we will think and want before we actually think and want it. These companies have only begun to scratch the surface of what is possible with our data.

We are being profiled in incredible and increasingly detailed ways, and our data may be exploited for purposes we cannot yet possibly understand. The old bargain—free Internet services in exchange for targeted advertising—is rapidly become a quaint relic of the past. And with no sense of how, when, or why our data might be used in the future, it is not clear what might take its place.

China’s Best Method of Industrial Espionage

Obscure Chinese Firm Dives Into $22 Trillion U.S. Market

Bloomberg: When Cromwell Coulson heard that an obscure Chinese real estate firm had agreed to buy the Chicago Stock Exchange, he was shocked.

“My first reaction was, ‘Wow, that’s who they’re selling to?”’ said Coulson, the chief executive officer of OTC Markets Group Inc. in New York. “These new buyers have no connection to Chicago’s existing business. They’re completely disconnected from the current business of supporting the Chicago trading community. So wow, that’s out of left field.”

While the world has gotten used to seeing Chinese companies snap up overseas businesses, the purchase of a 134-year-old U.S. stock market by Chongqing Casin Enterprise Group — a little-known property and investment firm from southwestern China — raises a whole host of questions. For starters, why does a provincial Chinese business with no apparent ties to the securities industry have any interest in buying one of America’s smallest equity exchanges? And will U.S. regulators sign off?

So far, Casin Group’s intentions are unclear, with calls to the company’s Chongqing headquarters going unanswered on Friday. If the deal does pass muster with American regulators, it would mark the first-ever Chinese purchase of a U.S. equity exchange, giving Casin Group a foothold in a $22 trillion market where even the smallest bourses have room to grow if they can provide the best price for a stock at any given moment.

The Chicago Stock Exchange — a subsidiary of CHX Holdings Inc. — is minority-owned by a group including E*Trade Financial Corp., Bank of America Corp., Goldman Sachs Group Inc. and JPMorgan Chase & Co., according to the company. The minority shareholders are also selling their stake, Chicago Stock Exchange Chief Executive Officer John Kerin said in a phone interview.

The deal values the exchange at less than $100 million, according to a person familiar with the matter, who asked to not be identified because the terms weren’t disclosed publicly. Mark O’Connor, a spokesman for the exchange, declined to comment on the size of the transaction.

Overseas Shopping

Casin Group’s offer, announced on Friday in a statement from the Chicago exchange, comes amid an unprecedented overseas shopping spree by Chinese companies. Businesses from Asia’s largest economy have announced $70 billion of cross-border acquisitions and investments this year, on track to break last year’s record of $123 billion, according to data compiled by Bloomberg.

While many of those deals had obvious business rationales, the reasons for Casin Group’s bid are less clear. The company, founded in the 1990s through a privatization of state-owned assets, initially focused on developing real estate projects in Chongqing, before expanding into the environmental and financial industries. While the firm owns stakes in banks and insurers, it has no previous experience owning an exchange.

Chinese Growth

Lu Shengju, the majority owner and chairman of Casin Group, wants to help bring Chinese companies to U.S. markets, according to the statement from Chicago’s bourse.

“We have reviewed CHX’s plans to improve market share through new growth initiatives and fully support them,” Lu, a torch bearer during the Beijing Olympic games in 2008, said in the statement, which didn’t disclose terms of the deal. “Together, we have a unique opportunity to help develop financial markets in China over the longer term and to bring exciting Chinese growth companies to U.S. investors.”

The Chicago Stock Exchange could serve as a venue for Chinese companies to list, said Dale Rosenthal, a clinical assistant professor of finance at the University of Illinois at Chicago.

“Because they’re an exchange, they can list stock,” Rosenthal said. “It has the potential to raise Chicago’s profile in China.”

Casin Group is no stranger to investing in outside businesses, including overseas targets. Three years ago, the firm increased its stake in Shenzhen-listed Guoxing Property to 30 percent, becoming the biggest shareholder. Guoxing, now 60 percent owned by Casin Group, has soared 170 percent in the past two months, versus a 19 percent drop in the CSI 300 Index, data compiled by Bloomberg show. Casin Group bought a 25 percent stake in Singapore-based Great Eastern Life Assurance in 2013.

“It’s interesting to see the Chinese increase their footprint in the U.S.,” said Ramon Camacho, a principal at RSM US LLP, an audit, tax and consulting company based in Chicago. “These investors are looking for a platform to showcase and bring to market Chinese companies.”

The company’s bid for the Chicago bourse could face political opposition, with American regulators and politicians taking a skeptical approach toward foreign investments in industries deemed important to national interests. When Germany’s Deutsche Boerse AG wanted to buy the owner of the New York Stock Exchange in 2011, U.S. Senator Charles Schumer, a Democrat from New York, raised obstacles. The deal was finally scrapped on monopoly concerns.

Heavy Scrutiny

Some Chinese companies have come under heavy scrutiny as they tried to enter U.S. markets. Huawei Technologies Co., China’s largest phone-network equipment maker, was barred by the U.S. in 2011 from participating in building a nationwide emergency network.

The U.S. Securities and Exchange Commission would have to approve the deal, because the exchange is a self-regulatory organization. The new owners will have to show they intend to follow all of the regulations imposed on stock exchanges, whose listing and trading rules also must be approved by the SEC.

Additionally, the takeover would probably be reviewed by the Committee on Foreign Investment in the U.S., said Anne Salladin, a lawyer at Stroock & Stroock & Lavan LLP in Washington. CFIUS, a panel of government officials led by the Treasury Department that examines purchases of American businesses by foreign investors, can recommend the president block transactions it believes compromise national security. It can also impose changes to address any concerns.

“It’s a Chinese investment, and it’s in a potentially sensitive sector: financial infrastructure,” Salladin said.

CFIUS has been closely scrutinizing purchases of American businesses by Chinese buyers. Last month, Royal Philips NV abandoned its plan to sell its lighting-components unit to a Chinese-led investment group following opposition from CFIUS.

“If you have a U.S. stock exchange that’s primarily satisfying Chinese companies, the regulators are gonna look very closely at it,” Coulson said. “If your core business is listing Chinese companies in the U.S., that’s going to pick up a lot of regulatory scrutiny and caution.”

China Industrial Espionage:

This new book is the first full account, inside or outside government, of China’s efforts to acquire foreign technology.

Based on primary sources and meticulously researched, the book lays bare China’s efforts to prosper technologically through others’ achievements. For decades, China has operated an elaborate system to spot foreign technologies, acquire them by all conceivable means, and convert them into weapons and competitive goods—without compensating the owners. The director of the US National Security Agency recently called it “the greatest transfer of wealth in history.”

Written by two of America’s leading government analysts and an expert on Chinese cyber networks, this book describes these transfer processes comprehensively and in detail, providing the breadth and depth missing in other works. Drawing upon previously unexploited Chinese language sources, the authors begin by placing the new research within historical context, before examining the People’s Republic of China’s policy support for economic espionage, clandestine technology transfers, theft through cyberspace and its impact on the future of the US.

This book will be of much interest to students of Chinese politics, Asian security studies, US defence, US foreign policy and IR in general.

***

China’s long history of spying on business

CNN: The United States indicted five members of China’s People’s Liberation Army Monday, accusing them of hacking into American companies and pilfering closely-guarded trade secrets.  The charges — rejected by Beijing as “purely ungrounded and with ulterior purpose” — are a dramatic escalation in a squabble between the two countries over spying. But they will surprise few Americans working in sensitive industries.

While many countries engage in industrial espionage, China has long been among the most aggressive collectors of economic secrets — both online and off, experts say.

“I can tell you they [China] are the most pervasive,” Kevin Mandia, founder of cybersecurity firm Mandiant, told CNN. “The indictment is about taking intellectual property … it’s the theft of trade secrets, it’s economic espionage.” Full article here.

Putin’s Hidden Agents in ISIS

It is about a global power-ranking. When Russia and Iran team up to destabilized Syria, refugees, millions of them flee. Destination for the refugees, The West. The West is forced to accommodate millions, pay for them, house them, educated them and provide medical care, breaking the financial structure. How come Russia has not taken any refugees or Iran or any country in the Middle East? They already know. Now the challenge for the West is to have aggressive leadership by the United States, not until 2017 will that be realized or will it?

The KGB/FSB has an agenda, it is well underway…..As you read below, submit your thoughts.

NewAmerican: On December 6, 2015, in a televised interview with the Ukrainian news program ТСН Тиждень (TSN Tyzhden, Ukrainian for TSN Weekly), a former FSB officer admitted that Russia is behind ISIS while ostensibly opposing it.

Former FSB officer codenamed “Yevgeniy” (shown, back toward camera) revealed that Russia’s FSB security services was, at the very least, complicit in the Paris attacks carried out by ISIS, and most shockingly that the FSB was involved in the creation of ISIS, which it influences through its agents who staff it as well as other related Islamic terrorist organizations.

The FSB, which stands for Federal Security Service in Russian, was organized in 1995 as the successor to the Soviet KGB. After the KGB was officially dissolved in 1991, it was briefly renamed the AFB (Agency for Federal Security), which was reorganized that same year as the MB (Ministry of Security). In 1993, the MB became the FSK (Federal Counter-Intelligence Service), which was again reorganized into its present form and name as the FSB on April 12, 1995.

Yevgeniy reportedly specialized in both terrorist organizations and counter-terrorism activities within the FSB. Defecting for personal reasons rather than ideological, Yevgeniy told TSN’s Andriy Tsaplienko that among the vast number of refugees entering Europe were certain Russian operatives whose task it was to infiltrate the Muslim communities. Financed by the FSB, these undercover Muslim operatives would rise to prominence within their respective communities, in turn providing the Kremlin with valuable intelligence of Muslim activates in Europe and allowing Moscow to exert influence over the communities. More here.

****   Russia's Hidden Influence Agents Within ISIS (Pt. 1)

WikiLeaks Forum:
Part one of this series looked at the historical manipulation of Islamists by Russian security services. Jihadists were armed and trained to fight by the FSB and GRU in places like Georgia and Nargono-Karabakh. Domestically, jihadists were infiltrated by the FSB into nationalist separatist movements in Dagestan and Chechnya, effectively painting those movements as religious radicals rather than freedom fighters battling an oppressive regime in Moscow.
Related Posts

Part two looked at a few specific examples of Chechen and Georgian jihadists who are probably witting or unwitting FSB assets, and how they have become power players within ISIS. The reasons for this are twofold and represent a re-creation of the same strategy used in Chechnya. Chechen jihadists helped to re-contextualize the Syrian rebels, Islamizing them in the world’s eyes. By doing this, they also acted as a spoiler force, preventing the CIA from being able to train and arm many Syrian rebels because of the presence of so many jihadi groups, a draw for many of the moderates in the region.
This article will take a look at ISIS propaganda, or what the world’s intelligence services would call information operations or psychological operations, and ask the question as to whether there is a hidden hand behind these propaganda videos.

Wahhabywood

The allure that ISIS holds for young jihadis and the fear they inspire in the rest of the world stems not from the actual combat prowess of the organization, but from its image. That image is carefully crafted, and much has been written about the high production values of the propaganda ISIS puts out. Their videos display dehumanized Islamic warriors in black masks, fully devoted to the cause of creating an Islamic caliphate. They never sleep, they never tire, they will conquer the entire world, bathing it in the blood of infidels and installing some kind of Muslim mojo hocus pocus 7th-century sharia law, or so we are told.

ISIS represents the darkest nightmares the Western world has about the Middle East, Arabs, and Muslims. The Islamic State represents a temporally displaced land of barbarians that has no place in the modern world. These nightmares are carefully cultivated by ISIS in slick propaganda films that show a deep awareness of liberal Western cultural values; the images and actions in these films are often specifically targeting Western audiences. ISIS’s reputation in the Middle East, much of it gained by way of their propaganda, is so profound, this author has been told that when an ISIS convoy rolls up to a village, all they need to do is blink their headlights and the locals will completely abandon their homes without a fight.

Their propaganda is good. Maybe too good.

ISIS propaganda targets Western liberal sensitivities in a very deliberate manner. There are many ways they do this, but four stand out quite clearly.

1. Mass executions, especially of Christians.
ISIS thrives on the blood bath of mass executions. No one is spared. Shia Muslims, children, ordinary civilians, so-called infidels and apostates, suspected traitors, Kurds, it hardly matters to ISIS. They are also known to carry out summary beheadings when they arrive in a village of the first person they can get their hands on just to prove that they are now in charge. However, it is the deliberate mass murder of Christians in Syria, Iraq, and Libya that is clearly designed to antagonize Western populations.

2. Sexual slavery
Openly flaunting sexual slavery is another propaganda point for ISIS, one that intentionally provokes Western values, but arguably human values across the world. Murder is one thing, but holding slave auctions in Mosul and selling off 13-year-old Yezidi girls or handing them out as gifts to ISIS fighters is particularly vile. ISIS is quite proud of this and brags about it in videos and public statements; their brand of sharia law also openly endorses it. This savage behavior deliberately provokes Westerners sensitive to gender issues.

3. Destruction of antiquities
The truth is that many Americans could care less about what happens in the Middle East. Arabs have been killing each other for hundreds of years and will continue to do so unabated. But even some of the most jaded people in the West get outraged at the destruction of antiquities. Following in the footsteps of the Taliban, who destroyed ancient Buddha statues, ISIS knows that their destruction of ancient Roman and Assyrian artifacts and structure will invite the ire of the world.

4. Targeting homosexuals
ISIS beheads and murders people at whim, but full-page spreads of professionally done photographs capturing ISIS tossing homosexual men from rooftops is something else entirely. Gay rights is an important issue in the West, and ISIS not only murders gays but makes sure that the entire world knows about it by recording these executions.
It is important to remember that none of these propaganda videos or pictures are released without permission from ISIS. We see what ISIS wants us to see. I am not cherry-picking the worst behavior of ISIS to present to our readers, I’m simply pointing out the images they want foremost in our minds. ISIS is baiting the Western world. Their end goal is also stated in the open: They want a coalition of Western nations to attack them.

Reflexive control

Reflexive control is a theory of psychological warfare designed to control enemy perceptions and has been studied and developed by Russian intelligence services for over 40 years. “Reflexive control is defined as a means of conveying to a partner or an opponent specially prepared information to incline him to voluntarily make the predetermined decision desired by the initiator of the action,” writes Timothy Thomas. Reflexive control involves studying the opposition’s decision-making process, then introducing socially, strategically, or politically loaded information into that process in order to influence it in a direction favorable to your objectives.

Russian defense analysts perceive America’s 1980s “Star Wars” or SDI program as a perfect example of reflexive control. According to the Russians, America knew that the USSR would respond to match horizontal and vertical proliferation of weapons, as well as the countermeasures to stop them. Therefore, America instituted the Star Wars program to trick the Soviet Union into investing in novel new weapons programs it could not afford, which then led to the crash of the Soviet economy. By doing this, we “compelled the enemy to act according to a plan favorable to the U.S.” (Thomas, 239).

By definition, reflexive control occurs when the controlling organ conveys (to the objective system) motives and reasons that cause it to reach the desired decision, the nature of which is maintained in strict secrecy. The decision itself must be made independently. A “reflex” itself involves the specific process of imitating the enemy’s reasoning or imitating the enemy’s possible behavior and causes him to make a decision unfavorable to himself (Thomas, 241).

In other words, once you understand how the enemy thinks, you then feed him information you know will cause him to reach an independent decision favoring your own strategy. In essence, you are using deception to trick the enemy, hoping that they will blunder into something that they wouldn’t attempt if they knew that they were being presented with loaded, and potentially false, information. While we are focused on Russian stratagems here, it may also be useful to reflect back of the deception tactics used by China as well, many of them derived from the period of the Warring States.

ISIS feeds the West loaded information

There is no proof that Russian intelligence has a hand in ISIS information/propaganda operations. However, considering what we have discussed thus far, this scenario should be taken seriously. ISIS is actively gaming the psychological makeup of Western audiences in order to provoke the United States and allied nations into a full-blown military confrontation with the Islamic State in Syria and Iraq. If the hypothesis about Russian influence agents in ISIS is correct, and if they are participating in ISIS propaganda efforts, then we should ask why Russia would be interested in doing this to begin with.

The answer is fairly straightforward. Keeping America bogged down and preoccupied in the Middle East is of massive benefit to the Russian Federation. By goading America into another war in the Middle East, Russia has more opportunity to engage in military aggression in Ukraine, Dagestan, Chechnya, Georgia, Moldova, Akbazia, Nagorno-Karabakh, Uzbekistan, Tajikistan, Turkmenistan, and on and on throughout Russia’s near abroad. For sure, there would also be some more specific tactical and strategic goals, but in the general sense, the Gulf War III would help keep America off Russia’s back.

ISIS, and perhaps Russian intelligence, understands America’s future rationalizations for war very well. In the past we could justify war as being battles against communism or fascism for the preservation of the American way of life. Before that, more jingoistic narratives about manifest destiny were brought into play. But these justifications for war, racial or nationalistic, will have no place in future liberal Western nations. Instead wars will be justified as fights for gay rights, women’s rights, and other equality issues. One hypothetical example: Americans will be told that we have to invade Iran because gays are stoned to death or beheaded by the Iranian regime.

The Islamic State knows that there is no better way to terrify and incite Americans than to use mass executions, the murder of Christians, the use of sex slaves, the destruction of ancient relics, and the killing of homosexuals. ISIS is at war with Western consciousness, and it is a very deliberate effort.

Basically, we see Daesh, we see the Islamic State — especially in the West — we see it from the surface, which is the mix of their propaganda; their version of what they really do. You see the pictures of actual killings, slaughtering, beheadings, blowing up things, mixed with their propaganda, or mixed with the things which are not true. They are controlling whatever comes out of their area. For example, if you take the pictures and the images we have of the Islamic State, 99% are approved by their PR department. They give us pictures of all these lined-up Humvees, guys with guns, perfect afternoon light set in the desert. They have accepted the presence of a few photographers who are in the area, from AFP, Reuters, AP; the big agencies, no matter if they would be considered Zionists, masons, imperialists, infidel agencies — they are in their area and they had to swear allegiance and in most cases the office is directly controlling all the images before they are permitted to submit them or it’s made clear to them. They sort of tell them, ‘if you do something wrong which harms our reputation, you know what will happen to you. We know you; we will find you.’ So the images that are transferred through the agencies, all the big agencies, are images that have been approved by Daesh. And Daesh invites the photographers to their events.—Christoph Reuters

None of this proves that this effort is being led, sponsored by, or covertly influenced by Russian intelligence assets. ISIS seems quite capable of hiring contractors with technical expertise, from oil industry engineers to computer hackers. Also, it is not as hard to make professional-looking films as it was 10 or 20 years ago. A kid with a decent digital camera and a laptop with film-editing software can do a pretty good job at filmmaking. Perhaps ISIS has developed all of this methodology on their own, but I am far from the first person to be surprised by ISIS’s slick Madison Avenue-worthy propaganda.

There are far more questions than answers here. For example, what about the Baath party leadership cells that actually run ISIS? These old dogs are not suicidal by any means and are actually quite cunning. A coalition of Western states spearheading a third Gulf War seems like it would be counterproductive to their goals. Yet, it would be impossible to believe that a few influence agents within ISIS have completely hijacked their propaganda efforts away from the Baathists. Maybe they are getting something in return? One can only speculate. While the first two parts of this article give some solid evidence for the reader to ponder, part three is an extrapolation on the first two articles. We don’t know if Russian intelligence has a hand in ISIS propaganda.

El Chapo’s America: Flooded with Heroin-Fentanyl

The DEA operation, called “Project Cassandra,” is meant to disrupt and dismantle Hezbollah’s global network that supplies drugs to the U.S. and Europe as well as cut into the terror organization’s ability to fund its activities through drug trafficking.

In the investigation, authorities uncovered a network of money couriers who collect and transport millions of euros in drug proceeds from Europe to the Middle East. The currency is then paid in Colombia to drug traffickers using the Hawala disbursement system, which makes it difficult to track. ***

Last spring, Brazil’s Civil Police arrested Hamzi Ahmad Barakat in the city of Curitiba under allegations that he had connections to a network of front companies that fleeced Lebanese immigrants who had recently moved to Brazil.

Barakat, who allegedly has ties to the infamous Triple Frontier region, is listed in the United States as a member of Hezbollah and is suspected of trafficking arms, drugs, explosives and counterfeit bills.

“He was preying on his own countrymen, using their identities to create companies to carry out schemes,” said Cassiano Aufiero, the police investigator in charge of the case.

Aufiero added that while he knew of Barakat’s purported ties to the Islamic militant group, he said that he was under arrest for different matters, including embezzlement and the creation of false documents.

Barakat’s arrest shed more light on the Triple Border region, which has become a hotspot for smugglers and drawn the attention of the U.S., Israel and governments throughout South America.

The region has drawn a number of immigrants for the Middle East, particularly from Lebanon, and is believed to be one of Hezbollah’s major areas of operation outside of the Islamic world, due to its seclusion, loose borders, rampant political corruption and weak judicial system. Brazil has one of the largest Lebanese population’s outside of Lebanon with at least 7 million people from that country residing there and some estimates claiming closer to 13 million.

In 2004, Barakat’s brother, Assad Ahmad Barakat, was named by the Treasury Department as one of Hezbollah’s “most prominent and influential members” and was believed to have used an electronics wholesale store in the Triple Frontier as a cover for raising funds for Hezbollah. The Brazilian police arrested him in 2002 and deported him to Paraguay, where he went to prison for tax evasion.

The Department of Justice National Drug Threat Assessment report.

Fentanyl: drug 50 times more potent than heroin ravages New Hampshire

Of 69 fatal overdose victims last year, 68% had taken the synthetic opioid, which Mexican cartels have learned to make and smuggle to interstate highways. The drug ‘is what is killing our citizens,’ says Manchester’s police chief

Guardian: to the Drug Enforcement Administration, fentanyl is a synthetic opioid 100 times more powerful than morphine, and 30-50 times more powerful than heroin.

“Fentanyl is what is killing our citizens,” said Manchester’s chief of police, Nick Willard, in testimony before Congress last week.

In 2013, the city of Manchester had 14 fatal overdoses, one of which (7%) involved a victim with fentanyl in their system, according to Willard. In 2015, 69 people fatally overdosed, 68% of whom had taken fentanyl. The state statistics are no more cheery. Officials at the office of the chief medical examiner in New Hampshire say they have yet to receive testing results from 36 suspected overdoses, but they’ve counted 399 fatal overdose victims so far, more than two-thirds of whom died with fentanyl in their system.

“It’s not like Mario Batali,” said Willard from his office in Manchester, comparing heroin dealers cutting their supply with the famed chef. “These guys are just throwing it in a mixer. You could get a bag that’s perfect and no one is going to die from it. You could also get a bag [that’s] straight fentanyl and that would kill you.”

Willard said that during a recent raid in Manchester, he found a dealer mixing fentanyl with whey protein. In another sting that led to a seizure in Lawrence, Massachusetts, the dealer was allegedly mixing heroin and fentanyl in a kitchen blender.

For the most part, said Willard, the story of opiate use in Manchester follows the same patterns as the rest of the country. The crisis was ushered in by the rise of prescription painkillers like OxyContin. Addicts looking for a cheaper high frequently turned to the more dangerous, yet significantly cheaper, heroin.

The turning point, he says, happened sometime after 2010, when Purdue Pharma altered the medication to make it more difficult to tamper with and get high. Suppliers in Mexico were quick to keep up with the burgeoning market, and addicts in Manchester, which sits near Interstate 93, Route 3, Route 81, and Route 9, had no problem tapping into the supply. More here.

Chicago:

“What Al Capone was to beer and whiskey, Guzmán is to narcotics,” Art Bilek, the commission’s executive vice president, said at the time. Except, Bilek added, Guzmán “is clearly more dangerous than Al Capone was at his height.” (Zambada is plenty dangerous, too: Prosecutors say he commanded logistics and security for the cartel, including assassinations. He is suspected in a number of slayings, including the murders of government officials.)

The cartel’s scope is staggering. About half of the estimated $65 billion worth of illegal cocaine, heroin, and other narcotics that Americans buy each year enters the United States via Mexico, according to law enforcement experts (though the drugs often originate in South or Central America). More than half of that is believed to be supplied by Sinaloa. Drug enforcement experts estimate, conservatively, that the cartel’s annual revenues exceed $3 billion: more than those of the Chicago Mercantile Exchange Group.

In Chicago, the cartel has a near monopoly. “I’d say 70 to 80 percent of the narcotics here are controlled by Sinaloa and Chapo Guzmán,” says Jack Riley, director of the DEA’s Chicago office. “Virtually all of our major investigations at some point lead back to other investigations tied to Sinaloa.”

In August 2009, five months after Zambada’s capture, a federal grand jury in Chicago indicted him and 45 others tied to a Sinaloa-led drug ring in the city. Patrick Fitzgerald, the U.S. attorney at the time, called the indictments “the most significant drug importation conspiracies ever charged in Chicago,” claiming that the cartel imported and distributed nearly $6 billion worth of illegal narcotics mostly to the Chicago area between 1990 and 2008.

North Korea Missile or Satellite Launch?

IAEA on North Korea

Countdown to Launch: New Activity at the Sohae Horizontal Processing Building

By

Editor’s Note: With North Korea’s recent notifications to the International Maritime Organization (IMO) and International Telecommunication Union (ITU) that it would launch an “earth observation satellite” between February 8 and February 25, 38 North has initiated a series of brief imagery analysis updates to closely follow developments at the North’s Sohae Satellite Launching Station (“Tongchang-dong”). This is the first of these updates.

Activity at the Horizontal Processing Building

Recent commercial satellite imagery indicates that the level of activity at the Horizontal Processing Building at the Sohae Satellite Launching Station (“Tongchang-dong”) is suggestive of preparations for a space launch and supports North Korea’s announced launch window of February 8 through 24. During past launches, this building has been used to receive the various rocket stages. Once received, they are assembled in the horizontal position to test all connections, perform final testing of subsystems and prepare the stages for mounting on the launch pad. Specifically, on February 1, there are nine vehicles present, of which two are likely to be buses. Compared with only one vehicle present on January 25, this level of activity is similar to that seen prior to the previous launch in 2012 and is suggestive of launch preparations.

At the nearby covered rail station, the shed roof obscures the view of any activity within. On February 1, a small utility pole (i.e., for lighting or communications) has been erected near the northeast corner of the shed.

Figure 1. Increased activity at the Horizontal Processing Building and rail station. 

Image includes material Pleiades © CNES 2016. Distribution Airbus DS / Spot Image, all rights reserved. For media licensing options, please contact thirtyeightnorth@gmail.com.

Image includes material Pleiades © CNES 2016. Distribution Airbus DS / Spot Image, all rights reserved. For media licensing options, please contact [email protected].

No New Activity at the Launch Pad

Recent imagery indicates no significant changes at the Sohae launch pad since last viewed on January 25. The work platforms on the gantry tower remain folded forward, with the environmental covers in place, obscuring any activity that might be taking place within. It is also not possible to see whether a space launch vehicle (SLV) is already present within the utility platforms.

No personnel or vehicles appear present elsewhere on the launch pad or in the fuel/oxidizer bunker. The rail-mounted transfer structure, which will likely be used to move the various rocket stages from the underground station or the stationary processing building to the launch pad, remains at the south end of the pad adjacent to the stationary processing building. Although there is no activity indicating an imminent launch, the gantry tower and launch pad complex appear to be in a condition capable of conducting a launch within the announced launch window of February 8 through 24.

Figure 2. Environmental covers still obscure any activity that might be taking place inside the gantry tower.

Image includes material Pleiades © CNES 2016. Distribution Airbus DS / Spot Image, all rights reserved. For media licensing options, please contact thirtyeightnorth@gmail.com.

Image includes material Pleiades © CNES 2016. Distribution Airbus DS / Spot Image, all rights reserved. For media licensing options, please contact [email protected].

Low Activity at other Key Launch related Facilities

Recent imagery indicates a still low level of activity at other key facilities likely to be involved in a space launch when compared to January 25. Specifically:

  • There are no significant changes at what is believed to be the launch control building. The structure appears to be in good condition. Activity at this facility should increase as the launch date grows closer.
  • No activity is noted at the building North Korea has previously identified at the Satellite Control Building. On January 25, there were five vehicles present in the two buildings in the VIP housing area. By February 1, only one vehicle is present. Extended vehicle activity in this area—seen prior to the 2012 launch—could mean that scientists and engineers are present.
  • There are no significant changes at what is believed to be the National Aerospace Development Administration (NADA) Auditorium between January 25 and February 1, although the adjacent helicopter pad had been cleared of snow. Guests, dignitaries and workers would view the launch from this location.

Vertical Engine Test Stand Appears Ready

Activity noted at the vertical engine test stand during the last month indicates that an engine test could be conducted at any time and with little prior notice. There are no significant changes noted at the vertical engine test stand between January 25 and February 1. The rail-mounted environmental shelter remains immediately adjacent to the test stand. No personnel are visible and there are no indications that an engine test has recently taken place. The complex appears capable of conducting a test at any time.

Figure 3. Engine test stand appears ready for use. 

Image includes material Pleiades © CNES 2016. Distribution Airbus DS / Spot Image, all rights reserved. For media licensing options, please contact thirtyeightnorth@gmail.com.

Image includes material Pleiades © CNES 2016. Distribution Airbus DS / Spot Image, all rights reserved.

For media licensing options, please contact [email protected].