Kerry Ignores ALL Iran Violations

Iran is a known and verified state sponsor of terror, of this there is no dispute. Iran has violated sanctions, agreements, hidden nuclear operations from inspectors and worse the United States has fought against Iran militia factions in Iraq, Lebanon and Afghanistan at least since the 80’s.

Exactly how much slack is Barack Obama, John Kerry and even the other members of the P5+1 going to give Iran at the expense of the continue threat and nuclear operations of this rogue nation? Is there no red-line anywhere? Oh wait…every other country appears to have a red-line but that of the Obama administration either moves, changes color or is simply rhetoric. When foreign nations are leading the charge on stopping Iran, the West needs to take notice.

John Kerry was in Moscow this week meeting with the Russian leadership over Syria, Iraq and most of all Iran. Russia is not going to cooperate with the United Nations resolutions or with any sanctions against Iran. Kerry failed to gain Putin’s agreement.

A Russian official on Wednesday bluntly rejected claims that sanctions on Iran would be restored immediately should the Islamic Republic violate the terms of an agreement to curb its nuclear program, poking a hole in a central White House plank meant to soothe critics of the deal. The Obama administration has stated that Russia agreed “in principle” on the need to reimpose sanctions if Iran fails to comply with the agreement, but the Russian government has never confirmed that it agrees with such a stance.

Exclusive: Czechs stopped potential nuclear tech purchase by Iran – sources

The Czech Republic blocked an attempted purchase by Iran this year of a large shipment of sensitive technology useable for nuclear enrichment after false documentation raised suspicions, U.N. experts and Western sources said.

The incident could add to Western concerns about whether Tehran can be trusted to adhere to a nuclear deal being negotiated with world powers under which it would curb sensitive nuclear work in exchange for sanctions relief.

The negotiators are trying to reach a deal by the end of June after hammering out a preliminary agreement on April 2, with Iran committing to reduce the number of centrifuges it operates and agreeing to other long-term nuclear limitations.

Some details of the attempted purchase were described in the latest annual report of an expert panel for the United Nations Security Council’s Iran sanctions committee, which has been seen by Reuters.

The panel said that in January Iran attempted to buy compressors – which have nuclear and non-nuclear applications – made by the U.S.-owned company Howden CKD Compressors.

A Czech state official and a Western diplomat familiar with the case confirmed to Reuters that Iran had attempted to buy the shipment from Howden CKD in the Czech Republic, and that Czech authorities had acted to block the deal.

It was not clear if any intermediaries were involved in the attempt to acquire the machinery.

There was no suggestion that Howden CKD itself was involved in any wrongdoing. Officials at Prague-based Howden declined to comment on the attempted purchase.

The U.N. panel, which monitors compliance with the U.N. sanctions regime, said there had been a “false end user” stated for the order.

“The procurer and transport company involved in the deal had provided false documentation in order to hide the origins, movement and destination of the consignment with the intention of bypassing export controls and sanctions,” it added.

The report offered no further details about the attempted transaction. Iran’s U.N. mission did not respond to a query about the report.

CONTRACT WORTH $61 million

The Czech state official said the party seeking the compressors had claimed the machinery was needed for a compressor station, such as the kind used to transport natural gas from one relay station to another.

The official declined to say exactly how the transaction was stopped, provide specifications of the compressors or confirm the intended purchaser. However, he made clear it was the Czech authorities who halted the deal

The official, who spoke on condition of anonymity, said the total value of the contract would have been about 1.5 billion Czech koruna ($61 million).

This was a huge amount for the company concerned, the previously named CKD Kompresory, a leading supplier of multi-stage centrifugal compressors to the oil and gas, petrochemical and other industries.

The firm was acquired by Colfax Corp. of the United States in 2013 for $69.4 million. A spokesman for Colfax declined to comment.

The United States and its Western allies say Iran continues to try to skirt international sanctions on its atomic and missile programs even while negotiating the nuclear deal.

The U.N. panel of experts also noted in its report that Britain informed it of an active Iranian nuclear procurement network linked to blacklisted firms.

While compressors have non-nuclear applications in the oil and gas industry, they also have nuclear uses, including in centrifuge cascades. Centrifuges purify uranium gas fed into them for use as fuel in nuclear reactors or weapons, if purified to levels of around 90 percent of the fissile isotope uranium-235.

“Such compressors can be used to extract enriched uranium directly from the cascades,” Olli Heinonen, former deputy director-general of the International Atomic Energy Agency and a nuclear expert currently at Harvard University, told Reuters.

“In particular, they are useful when working with higher enrichment such as 20 percent enriched uranium,” he said, adding that precise specifications of the compressors in question would be necessary to make a definitive assessment.

Iran has frozen production of 20 percent enriched uranium, a move that Western officials cite as one of the most important curbs on Iranian nuclear activities under an interim agreement in 2013.

Tehran rejects allegations by Western powers and their allies that it is seeking the capability to produce atomic weapons and says its nuclear program is for peaceful purposes.

The IAEA and the United States have said repeatedly that Tehran has adhered to the terms of the 2013 interim deal.

 

 

 

Pentagon not Nimble to Challenge ISIS PR

The Pentagon has sought the assistance of DARPA, Defense Advanced Research Project Agency to collaborate on how best to cultivate the social media success of Islamic State, ISIS.

Social media, propaganda and public relations used by Islamic State is so advanced, effective and cutting edge that our own technology, resources and imagination has not kept pace with the successful methods broadcasted by the terror group.

DARPA developed software technology called MEMEX that can see and access something known as the ‘dark-web’, but dynamic encryption codes stifle efforts to capture communications used by all recognized terror groups where they collaborate on money, planning, movement, people and operations. Further our own government agencies are back to infighting on who takes the lead, what the strategy is and further what powerful countermeasures can be applied to stop the ISIS public relations/marketing machine. Enemies are nimble, the United States intelligence community is not.

Bureaucracy stifles counter-jihad info war

The Pentagon is struggling to counter the information warfare efforts of the Islamic State terrorist group that are effectively exploiting U.S. social media and Western press freedoms to recruit jihadists and communicate among themselves.

Bureaucratic red tape within the military, specifically the U.S. Central Command and Pentagon, is preventing rapid responses to IS propaganda and activities, Inside the Ring has learned from knowledgeable sources.

One problem is the cumbersome approval process needed before U.S. information warriors can carry out counter-actions online. Prior to doing so, they’re required to go through several layers of approvals along a lengthy chain of command.

As a result, in some cases U.S. information operations against IS propaganda were delayed for days or weeks, often making the responses ineffective or useless.

Additionally, U.S. information operations have been weakened and limited in conducting counter-information attacks because of concerns the American hand will be exposed. Another problem has been fear among U.S. higher-ups that IS will step up both information and kinetic attacks in response.

Outright lies — such as false reports of U.S. troops deployments — are more easily countered. But those cases are infrequent. Aggressive online programs to dissuade would-be jihadists and expose IS propaganda programs and activities have been stifled. Counter cyber attacks against known IS operators also have been limited.

The U.S. information warfare effort has been hampered by officials have said is a cultural bias against propaganda activities, which are sometime regarded as contrary to U.S. freedoms. That is said to be changing, however, as terrorist groups like IS and al Qaeda are increasing their use of soft power methods to attack the West. Nation-state information warfare, particularly by China, Russia and Iran, also is gradually being recognized as a growing strategic threat.

The IS information threat was highlighted by the alert issued last week raising the security threat level on U.S. military bases. The alert was prompted by an IS-linked hacker group that posted a notice online warning of an “another surprise for America” — interpreted as a possible attack.

As a result, U.S. Northern Command commander, Adm. Bill Gortney, ordered military bases to tighten security from “Alpha” to “Bravo” level around the country. Force-protection level Bravo is ordered in response to a somewhat predictable terrorist threat.

The group making the threat was the same hacker group that successfully conducted a cyber attack on Central Command’s social media accounts in January, replacing web pages with IS propaganda and the name “Cybercaliphate.”

The group conducted some low-level cyber attacks against several Pentagon web sites last week in attempted “denial-of-service” cyber strikes whose impact was limited.

One example of IS’s online agility is its use of Twitter. IS operatives and supporters are using multiple Twitter accounts to send well-crafted videos and propaganda materials. Usually, IS terrorists open up to six Twitter accounts, with successive accounts being used after one or more of the accounts are shut down by the social media giant, often at U.S. government urging.

One effective propaganda and recruiting video was posted on a Russian Internet site and targeted Central Asia Muslims. The five-minute video was described as extremely professional in both content and production values.

Another trend is a recent shift by IS away from Web-based social media sites to mobile devices that are being used to communicate through text messaging, and propagandize by mobile videos shared directly between hand-held devices.

Additionally, IS information operations to inspire Islamists to conduct attacks in the United States also are shifting to the so-called “Dark Web,” the gray Internet underworld used by criminals to share information and software.

IS also appears to have studied information dissemination methods used by neo-Nazi groups, in order to communicate and spread their message in the English-speaking world.

The target audience for IS includes Islamist sympathizers who are not directly linked to the Syrian/Iraqi based IS terror group.

New Net Assessment chief

Defense Secretary Ash Carter has selected a candidate for the influential post of director of the Office of Net Assessment, the Pentagon’s future warfare and worst-case scenario think tank.

The selection is said to be James. H. Baker, currently the principal deputy director for strategic plans and policy on the Joint Staff, and a key aide to Joint Chiefs Chairman Gen. Martin Dempsey. In the past Mr. Baker was head of Joint Chiefs chairman’s action group under then-Chairman Adm. Mike Mullen.

Some military and defense officials expressed concern that Mr. Baker will reverse decades of innovative work inside the secretive Net Assessment office led by Andrew Marshall, the 93-year-old academic who stepped down in January.

Mr. Marshall was known as the Pentagon’s “Yoda” and was the only official to hold the director’s post since the office was created in 1973.

Mr. Marshall appointed his deputy, Andrew May, as acting director who was a candidate for the top post. A third candidate who lost out in the selection process was Thomas Ehrhard, currently an aide to Deputy Defense Secretary Robert Work.

What concerns several China hawks is Mr. Baker’s reputation as a left-of-center analyst who has sought to minimize foreign threats, especially those from China. Mr. Baker disclosed his conciliatory views on China and advocated for greater unrestricted engagement at a 2013 speech to the Naval War College.

As ONA director, Mr. Baker would be in charge of the office’s annual $15 million budget, and have direct access to Mr. Carter. The Pentagon sought to downgrade the office last year by placing it within the office of the undersecretary of defense for policy. But Congress passed legislation blocking the move and added an additional $5 million for assessments.

Another problem for critics is Mr. Baker’s past role as senior official in the costly F-35 development program. The stealth jet program suffered cost overruns amounting to tens of millions of dollars and left the new frontline fighter with the dubious reputation of being the most expensive aircraft ever built. Unit costs for the three-version jet skyrocketed to between $98 million to $116 million per aircraft.

A Republican foreign policy adviser predicted to Inside the Ring: “James H. Baker will be fired on Jan. 20, 2017 if a Republican is elected president. He’s too partisan and too left wing. Frankly, Hillary Clinton may fire him too.”

A defense official confirmed Mr. Baker will be the next ONA director but declined to comment on his critics.

State issues foreign booze warning

The State Department’s security office recently sent out a warning notice to U.S. companies operating facilities overseas urging Americans to avoid drinking local booze.

The May 5 notice from the Overseas Security Advisory Council, a public-private entity that works with State’s Office of Diplomatic Security, stated that the warning followed the deaths last month in Nigeria of 23 people poisoned after drinking a local gin called ogogoro that apparently was tainted with a pesticide.

“The deadly situation in Nigeria underscores the need for awareness that consuming alcohol abroad comes with various risks that are not necessarily prevalent in the U.S.,” the four-page OSAC notice said.

The alert advised travelers or workers abroad to avoid drinking homemade or counterfeit alcoholic drinks around the world often made with varying levels of toxicity. For example, last year, 24 people died and dozens were injured from drinking a Kenyan bootleg alcohol called kathuvuria, and some 31 people died and 160 injured in India from drinking booze tainted with methyl alcohol.

The alert also warns Americans not to engage in drinking competitions with locals: “Even Australian PM Tony Abbott was celebrated ‘skolling’ (chugging) a schooner (2/3 of a pint) of beer before flipping the empty glass on top of his head at a pub,” the report said.

In South Korea, Americans were warned to avoid getting drunk at parties with business partners, often on Mondays, Wednesdays, and Thursdays, as part of South Koreans’ efforts to learn “true personalities in a tradition known as hoesik,” the report said.

“This level of inebriation can lead to cultural misunderstandings, ruined business relations or, worse, an increase in exposure to criminality,” the report added.

 

 

 

 

 

Senator McCaskill Leads Charge to Federalize Police

Due to the countless unrest and destruction in American cities in recent months, police departments across the country have been challenged to restore order. The ‘Occupier’ movement still exists today as well as concocted riots in towns like Ferguson, Seattle and Baltimore. Yet one component is missing from the growing threat conditions and must not be overlooked and that is ‘soft-targets’ as we have seen at the Boston bombing, Garland, Texas and even Moore, Oklahoma. Those locations experienced aggressions and death at the hands of militant Islamists and more are expected as told by James Comey, Director of the FBI.

Law enforcement and the FBI as well as the Department of Homeland Security do not broadcast their work and investigations into cases they have pending while we know without dispute militant terrorists currently in the country are plotting attacks including more destructive bombings which was the case with John Booker in Kansas.

So why would Claire McCaskill (D-MO) introduce legislation that further weakens police and first responders to threats that include IED’s, trucks with laden explosives or soft targets that could be rigged with ambush conditions? Sure, there may be extreme cases where providing law enforcement with military gear may be over the top, previous cases often prove their value. Former CIA Deputy Director Mike Morell spoke this week on the never-ending threat of enemies such as al Qaeda still have the objective and ability to blow planes out of the sky or just as they land at a domestic airport.

WASHINGTON (Tribune News Service)The Fraternal Order of Police, the world’s largest organization of law enforcement officers, is objecting to parts of Sen. Claire McCaskill’s bill coordinating federal programs on the use of surplus military equipment and other aid to local police departments.

McCaskill, D-Mo., introduced her bill last week as an answer to police “militarization” claims made in the response to unrest in Ferguson last summer after the shooting death of Michael Brown by Ferguson police officer Darren Wilson. Read more here.

The bill also would bar small police departments those with fewer than 10 sworn officers from purchasing more than one military tactical vehicle. Departments with fewer than 35 officers would not able to obtain federal funding for SWAT equipment unless they teamed up with other agencies to form regional SWAT teams. Hotlines would be set up to receive reports from the public on the misuse of funds and equipment, and police departments would have to publish their requests for grant funding for certain equipment, such as tactical vehicles, camouflage, flash bang grenades and weapons over a certain caliber.

Money would be set aside to fund body cameras, dashboard cameras, gun cameras, and to cover the costs of maintenance and storage of footage. And local law enforcement agencies would have to meet additional requirements for training and data collection in order to qualify for federal grants and equipment.

There is some reasonable debate that law enforcement has already been militarized by virtue of Federal money supporting police across the country. Money has power and dictates rules of engagement. On top of that, mayors and governors have the ability through their own executive orders to order up the National Guard to patrol streets in towns where riots and destruction such as Baltimore.

At issue as well is just what does the Department of Defense do with surplus equipment no longer of use in a war theater? If there is no will to have ground operations in locations across the globe to defeat enemies such as al Nusra, Islamic State, Boko Haram or al Qaeda and air power is the tactic of choice then where do MRAP’s go?

In cases beyond domestic terror conditions, what about an earthquake in Texas that may require dynamic use of some of this equipment, or an attack on a power plant that happened a couple of years ago in California? Minneapolis is a hotbed of Somalis that are inspired by Boko Haram and Islamic State, is the Mall of America the next Nairobi mall target that killed 68 people in 2013?

Islamic State has effectively recruited and inspired an unknown quantity of soldiers in America, do you know their future targets? Is law enforcement prepared for those threats? Are you prepared?

Al Jazeera Trouble, al Qaeda and Anti-Semitism

The news outlet from the Middle East, al Jazeera which is the primary news source in the region also reaches into the United States with journalists and a television division. But lately they are in real trouble, ethically and financially. What is worse it appears they have al Qaeda on the payroll.

The embattled CEO of Al Jazeera America was pushed aside Wednesday, ending more than a week of public turmoil that included the resignations of three top female executives.
The announcement capped a turbulent week for Ehab Al Shihabi. His company was sued for $15 million, AJAM was cited for alleged sexism and anti-Semitism and al Shihabi was blamed by one departing executive for presiding over a ‘culture of fear’. Full article here.

But it gets worse.

U.S. Government Designated Prominent Al Jazeera Journalist as “Member of Al Qaeda”

The U.S. government labeled a prominent journalist as a member of Al Qaeda and placed him on a watch list of suspected terrorists, according to a top-secret document that details U.S. intelligence efforts to track Al Qaeda couriers by analyzing metadata.

The briefing singles out Ahmad Muaffaq Zaidan, Al Jazeera’s longtime Islamabad bureau chief, as a member of the terrorist group. A Syrian national, Zaidan has focused his reporting throughout his career on the Taliban and Al Qaeda, and has conducted several high-profile interviews with senior Al Qaeda leaders, including Osama bin Laden.

A slide dated June 2012 from a National Security Agency PowerPoint presentation bears his photo, name, and a terror watch list identification number, and labels him a “member of Al-Qa’ida” as well as the Muslim Brotherhood. It also notes that he “works for Al Jazeera.”

The presentation was among the documents provided by NSA whistleblower Edward Snowden.

In a brief phone interview with The Intercept, Zaidan “absolutely” denied that he is a member of Al Qaeda or the Muslim Brotherhood. In a statement provided through Al Jazeera, Zaidan noted that his career has spanned many years of dangerous work in Afghanistan and Pakistan, and required interviewing key people in the region — a normal part of any journalist’s job. 

“For us to be able to inform the world, we have to be able to freely contact relevant figures in the public discourse, speak with people on the ground, and gather critical information. Any hint of government surveillance that hinders this process is a violation of press freedom and harms the public’s right to know,” he wrote. “To assert that myself, or any journalist, has any affiliation with any group on account of their contact book, phone call logs, or sources is an absurd distortion of the truth and a complete violation of the profession of journalism.” 

A spokesman for Al Jazeera, a global news service funded by the government of Qatar, cited a long list of instances in which its journalists have been targeted by governments on which it reports, and described the labeling and surveillance of Zaidan as “yet another attempt at using questionable techniques to target our journalists, and in doing so, enforce a gross breach of press freedom.”

The document cites Zaidan as an example to demonstrate the powers of SKYNET, a program that analyzes location and communication data (or metadata) from bulk call records in order to detect suspicious patterns.

In the Terminator movies, SKYNET is a self-aware military computer system that launches a nuclear war to exterminate the human race, and then systematically kills the survivors.

According to the presentation, the NSA uses its version of SKYNET to identify people that it believes move like couriers used by Al Qaeda’s senior leadership. The program assessed Zaidan as a likely match, which raises troubling questions about the U.S. government’s method of identifying terrorist targets based on metadata.

It appears, however, that Zaidan had already been identified as an Al Qaeda member before he showed up on SKYNET’s radar. That he was already assigned a watch list number would seem to indicate that the government had a prior intelligence file on him. The Terrorist Identities Datamart Environment, or TIDE, is a U.S. government database of over one million names suspected of a connection to terrorism, which is shared across the U.S. intelligence community.

The presentation contains no evidence to explain the designation.

Peter Bergen, CNN’s national security analyst and author of several books on Al Qaeda and Osama bin Laden, told The Intercept, “I’ve known [Zaidan] for well over a decade, and he’s a first class journalist.”

“He has the contacts and the access that of course no Western journalist has,” said Bergen. “But by that standard any journalist who spent time with Al Qaeda would be suspect.” Bergen himself interviewed bin Laden in 1997.

The NSA and the Office of the Director of National Intelligence declined to answer questions about the basis of Zaidan’s inclusion on the watch list and alleged Al Qaeda affiliation. The NSA also declined to answer a set of detailed questions about SKYNET, and how it uses the information about the people that it identifies.

What is clear from the presentation is that in the NSA’s eyes, Zaidan’s movements and calls mirrored those of known Al Qaeda couriers.

According to another 2012 presentation describing SKYNET, the program looks for terrorist connections based on questions such as “who has traveled from Peshawar to Faisalabad or Lahore (and back) in the past month? Who does the traveler call when he arrives?” and behaviors such as “excessive SIM or handset swapping,” “incoming calls only,” “visits to airports,” and “overnight trips.”

That presentation states that the call data is acquired from major Pakistani telecom providers, though it does not specify the technical means by which the data is obtained.

The June 2012 document poses the question: “Given a handful of courier selectors, can we find others that ‘behave similarly’” by analyzing cell phone metadata? “We are looking for different people using phones in similar ways,” the presentation continues, and measuring “pattern of life, social network, and travel behavior.”

For the experiment, the analysts fed 55 million cell phone records from Pakistan into the system, the document states.

The results identified someone who is “PROB” — which appears to mean probably — Zaidan as the “highest scoring selector” traveling between Peshawar and Lahore.

The following slide appears to show other top hits, noting that 21 of the top 500 were previously tasked for surveillance, indicating that the program is “on the right track” to finding people of interest. A portion of that list visible on the slide includes individuals supposedly affiliated with Al Qaeda and the Taliban, as well as members of Pakistan’s spy agency, Inter-Services Intelligence. But sometimes the descriptions are vague. One selector is identified simply as “Sikh Extremist.”

As other documents from Snowden revealed, drone targets are often identified in part based on metadata analysis and cell phone tracking. Former NSA director Michael Hayden famously put it more bluntly in May 2014, when he said, “we kill people based on metadata.”

Metadata also played a key role in locating and killing Osama bin Laden. The CIA used cell phone calling patterns to track an Al Qaeda courier and identify bin Laden’s hiding place in Pakistan.

Yet U.S. drone strikes have killed many hundreds of civilians and unidentified alleged militants who may have been marked based on the patterns their cell phones gave up.

People whose work requires contact with extremists and groups that the U.S. government regards as terrorists have long worried that they themselves could look suspicious in metadata analysis.

“Prominent American journalists have interviewed members of blacklisted terrorist groups, including Al Qaeda,” said Jameel Jaffer, deputy legal director of the American Civil Liberties Union. “It would surprise me if journalists in Pakistan hadn’t done the same. Part of the job of journalists and human rights advocates is to talk to people the government doesn’t want them to talk to.”

A History of Targeting Al Jazeera 

The U.S. government’s surveillance of Zaidan is not the first time that it has linked Al Jazeera or its personnel to Al Qaeda.

During the invasion of Afghanistan, in November 2001, the United States bombed the network’s Kabul offices. The Pentagon claimed that it was “a known al-Qaeda facility.”

That was just the beginning. Sami al-Hajj, an Al Jazeera cameraman, was imprisoned by the U.S. government at Guantanamo for six years before being released in 2008 without ever being charged. He has said he was repeatedly interrogated about Al Jazeera. In 2003, Al Jazeera’s financial reporters were barred from the trading floor of the New York Stock Exchange for “security reasons.” Nasdaq soon followed suit.

During the invasion of Iraq, U.S. forces bombed Al Jazeera’s Baghdad offices, killing correspondent Tariq Ayoub. The U.S. insisted it was unintentional, though Al Jazeera had given the Pentagon the coordinates of the building. When American forces laid siege to Fallujah, and Al Jazeera was one of the few news organizations broadcasting from within the city, Bush administration officials accused it of airing propaganda and lies. Al Jazeera’s Fallujah correspondent, Ahmed Mansour, reported that his crew had been targeted with tanks, and the house they had stayed in had been bombed by fighter jets.

So great was the suspicion of Al Jazeera’s ties to terrorism that Dennis Montgomery, a contractor who had previously tried peddling cheat-detector software to Las Vegas casinos, managed to convince the CIA that he could decode secret Al Qaeda messages from Al Jazeera broadcasts. Those “codes” reportedly caused Bush to ground a number of commercial transatlantic flights in December 2003.

But the U.S. government appeared to have somewhat softened its view of the network in the last several years. The Obama administration has criticized Egypt for holding three of Al Jazeera’s journalists on charges of aiding the Muslim Brotherhood. During the height of the 2011 Arab Spring, then-Secretary of State Hillary Clinton praised the network’s coverage, saying, “Viewership of Al Jazeera is going up in the United States because it’s real news.”

A Journalist and Al Qaeda

Zaidan first came to international prominence after the 9/11 attacks because of his access to senior Al Qaeda leadership. Zaidan wrote an Arabic-language book on bin Laden, and interviewed him in person multiple times.

“He covered the wedding of bin Laden’s son which was shortly after the [U.S.S.] Cole attack, and I think it was a very useful piece of journalism, because bin Laden declaimed a poem about the Cole which implied him taking responsibility for the attacks, which of course he later did,” said Bergen.

Zaidan also received a number of bin Laden’s taped messages to Americans, which were broadcast on Al Jazeera.

In 2002, he met a mysterious man with a “half-covered face,” who handed him a cassette tape with bin Laden’s voice, Zaidan told Bergen in an interview. In 2004, another bin Laden tape was dropped off at the office gate, Zaidan told the Associated Press. “The guard brought it to me along with other mail. It was in an envelope, I opened it and it was a big scoop,” Zaidan recounted.

Zaidan, right, in a 2011 Al Jazeera documentary he made about bin Laden.

Files collected from bin Laden’s Abbottabad compound after his death — a portion of which were released this year — indicate that Al Qaeda members viewed Zaidan as a journalist they felt comfortable dealing with.

In an August 2010 missive, discussing Zaidan’s plans for a documentary, bin Laden directs his deputies to get “brother Ahmad Zaydan’s” questions and “tell him it would be good if it was on the tenth anniversary of September Eleventh.” Any other input should come in “an indirect way,” bin Laden cautions. “If we want this program to be a success, then we should not get involved in the details of how it is run, except that I don’t want him to interview any of my family,” he wrote.

Zaidan released his documentary on Al Jazeera in December 2011, an oral history of bin Laden’s years in Pakistan and Afghanistan comprised of interviews with a range of people who had known him, including Taliban fighters, government officials, and many journalists.

Bin Laden had also grown paranoid about meetings with Zaidan, although he did not think the U.S. government had managed to kill anyone “from surveying Ahmad Zaydan,” he wrote in May 2010.

He continued, “keep in mind, the possibility, though remote, that the journalists may be involuntarily monitored in a way that we or they do not know about, either on ground or by satellite, especially Ahmad Zaydan of Al Jazeera, and it is possible that a tracking chip could be put into some of their personal effects before coming to the meeting place.”

Zaidan is still Al Jazeera’s Islamabad bureau chief, and has also reported from Syria and Yemen in recent years. Al Jazeera vigorously defended his reporting. “Our commitment to our audiences is to gain access to authentic, raw, unfiltered information from key sources and present it in an honest and responsible way.” They added that, “our journalists continue to be targeted and stigmatized by governments,” even though “Al Jazeera is not the first channel that has met with controversial figures such as bin Laden and others — prominent western media outlets were among the first to do so.”

 

ThreatCon Bravo and Background Information

Today, the military bases across the homeland have taken an extraordinary measure not seen since 2011, declaring ThreatCon Bravo.

Terrorist Threat Conditions

A Chairman of the Joint Chiefs of Staff-approved program standardizes the military services’ identification of and recommended responses to terrorist threats against U.S. personnel and facilities. This program facilitates interservice coordination and support for antiterrorism activities. Also called THREATCONs. There are four THREATCONs above normal:

THREATCON ALPHA THREATCON BRAVO THREATCON CHARLIE THREATCON DELTA
This condition applies when there is a general threat of possible terrorist activity against personnel and facilities, the nature and extent of which are unpredictable, and circumstances do not justify full implementation of THREATCON BRAVO measures. However, it may be necessary to implement certain measures from higher THREATCONS resulting from intelligence received or as a deterrent. The measures in this THREATCON must be capable of being maintained indefinitely. This condition applies when an increased and more predictable threat of terrorist activity exists. The measures in this THREATCON must be capable of being maintained for weeks without causing undue hardship, affecting operational capability, and aggravating relations with local authorities. This condition applies when an incident occurs or intelligence is received indicating some form of terrorist action against personnel and facilities is imminent. Implementation of measures in this THREATCON for more than a short period probably will create hardship and affect the peacetime activities of the unit and its personnel. This condition applies in the immediate area where a terrorist attack has occurred or when intelligence has been received that terrorist action against a specific location or person is likely. Normally, this THREATCON is declared as a localized condition. See also antiterrorism.

Texas incident fuels concern about lone-wolf terror attacks

DAVID CRARY and ERIC TUCKE, Associated Press

NEW YORK (AP) — The attempted attack on a provocative cartoon contest in Texas appears to reflect a scenario that has long troubled national security officials: a do-it-yourself terror plot, inspired by the Islamic State extremist group and facilitated through the ease of social media.

Trying to gauge which individuals in the United States pose such threats — and how vigorously they should be monitored — is a daunting challenge for counterterrorism agencies. Some experts caution that a limited number of small-scale attacks are likely to continue.

Michael McCaul, chairman of the House Homeland Security Committee, said federal authorities are aware of “thousands” of potential extremists living in the U.S., only a small portion of whom are under active surveillance.

Concerns have been intensifying since the rise of the Islamic State group and were heightened this week after two gunmen were shot dead while trying to attack the event in Garland, Texas, that featured cartoon images of the Prophet Muhammad. One of the men, Elton Simpson of Phoenix, was charged in 2010 after being the focus of a terror investigation; investigators are trying to determine the extent of any terror-related ties involving him or his accomplice, Nadir Soofi.

At the White House, Press Secretary Josh Earnest said intelligence officials would be investigating Islamic State’s claim of responsibility.

“This is consistent with what has previously been described as a lone-wolf attack,” Earnest said. “Essentially you have two individuals that don’t appear to be part of a broader conspiracy, and identifying those individuals and keeping tabs on them is difficult work.”

Terrorism experts say the spread of social media, and savvy use of it by extremist groups, has facilitated a new wave of relatively small-scale plots that are potentially easy to carry out and harder for law enforcement to anticipate.

While plots orchestrated by al-Qaida have historically involved grandiose plans designed to yield mass carnage — including airline bombings or attacks on transportation systems — the Islamic State group has endorsed less ambitious efforts that its leaders say can have the same terrorizing effect.

“If you can get your hands on a weapon, how is the state security apparatus supposed to find you?” said Will McCants, a fellow in the Center for Middle East Policy at the Brookings Institution in Washington. “It’s attractive because it gets just as much attention as a small- to mid-size bomb.”

A public forum like Twitter, with its millions of users, means those who might otherwise have had limited exposure to terrorist ideologies now have ample access to what FBI Director James Comey has described as the “siren song” of the Islamic State. Social media provides a venue for agitators to exhort each other to action, recruit followers for violence and scout locations for potential attacks.

A former Minneapolis man who goes by the name Mujahid Miski on Twitter was among those urging an attack on the event in Garland. A law enforcement official familiar with the investigation confirmed to The Associated Press that Mujahid Miski is Mohamed Abdullahi Hassan, who left the U.S. in 2008 to join al-Shabab in Somalia. The official spoke on condition of anonymity because details of the investigation are not public.

Hassan has been prolific on social media in recent months — urging his Twitter followers to carry out acts of violence in the U.S., including beheadings — commending attacks elsewhere, and using protests of police activity in Ferguson, Missouri, and Baltimore, Maryland, to try to recruit others.

The phenomenon poses a challenge for investigators as they sift through countless online communications.

“Where is the threshold of saying this is more than just an avid consumer of propaganda?” asked William Braniff, executive director of a terrorism research center at the University of Maryland and a former instructor at the U.S. Military Academy‘s Combating Terrorism Center.

“It’s exceptionally difficult to estimate of the number of people who’ve considered becoming foreign fighters,” he said. “Often you’re not dealing with specific behaviors, but with expressions of belief, which are constitutionally protected.”

U.S. officials say that more than 3,400 people from Western countries — including nearly 180 from the U.S. — have gone to Syria or Iraq, or attempted to do so, to fight on behalf of Islamic State or other extremists groups.

Although there is concern that fighters returning to the U.S. might pose a terrorism threat, some experts say a more immediate danger is posed by individuals in America who are inspired by these extremist groups yet have no direct ties to them.

Such individuals “can be motivated to action, with little to no warning,” National Counterterrorism Center director Nicholas Rasmussen told the House Committee on Homeland Security in February. “Many of these so-called homegrown violent extremists are lone actors, who can potentially operate undetected and plan and execute a simple attack.”

He predicted that the threat posed by these individuals will remain stable, “resulting in fewer than 10 uncoordinated and unsophisticated plots annually from a pool of up to a few hundred individuals.”

The online propaganda can be alluring, even to U.S. residents leading comfortable lives, said Peter Bergen, director of International Security Program at the public policy institute New America.

In testimony Bergen planned to give Thursday before the Senate Homeland Security Committee, he says some Islamic State group recruits are motivated by the same level of idealism as young people who join the Marines or the Peace Corps. In their view, Bergen asserts, the extremist group “is doing something that is of cosmic importance.”

Daniel Benjamin, former coordinator for counterterrorism at the State Department and now director of a global issues center at Dartmouth College, said the lone-wolf terrorist phenomenon is not new, but has taken on a new character due to the aggressive military and propaganda activities of the group also known as ISIS.

“What is new is the level of excitement among extremists,” Benjamin said. “The feeling is that ISIS has done what al-Qaida couldn’t — it has held territory, it has damaged armies much larger than it is.”

Benjamin cautions that low-level, lone-wolf attacks may be difficult to stamp out, and said Americans should not let such attacks demoralize them.

Long before this week, the lone-wolf scenario manifested itself when Army Maj. Nidal Hasan, who had been inspired by a radical Yemen-based preacher, killed 13 people at Fort Hood in 2009.

Government officials have acknowledged that surveillance programs, however diligent, aren’t the full answer to thwarting terrorism. Among the preventive strategies is a federal program launched last fall called Countering Violent Extremism, which aims to encourage community engagement to thwart radicalization. It’s been tested in Los Angeles, Boston and Minneapolis-St. Paul.
[3:24:28 PM] The Denise Simon Experience: Bergen, in his prepared testimony for the Senate committee, said relatives of potential Islamic state group recruits might be more willing to inform authorities if the family member faced options other than a long prison term. He suggested some sort of mix of a token prison term, followed by probation and counseling services.