Brennan and his Kill Drone Operation

Catch him if you can, as speeches to one audience are very different from those to another audience. CIA Chief, John Brennan is the designer of the Obama drone program and ‘that’ kill list.

In part: No one else was double-checking the administration’s work, and making sure that what Brennan called the “surgical” approach was only killing bad guys and not simply peasants with guns, civilians whose deaths might prolong the conflict. It was a secret program with an ad hoc structure and no real oversight or outside checks — only John Brennan. The courts weren’t interested even when Americans started showing up on the kill lists, and Congress was lost in a confused thicket of jurisdictional limitations surrounding covert action in the military and CIA. As one congressional staffer told me last year, “No one has a 360-degree view of this.” That left only public opinion, and the White House had a strategy for that. *** Almost a year later, in May 2012, the New York Times revealed that the U.S. had developed a new way of counting casualties. Instead of two categories, the U.S. had only one: militant. The U.S. assumed that every adult male who was killed — whether their names were known or not — was guilty. There were no innocent among the dead. The whole thing was an accounting trick.

But, Obama declared he has a pen and a phone. He can change anything, and does. Meanwhile, the family of Dr. Weinstein, the USAID worker killed in the drone strike, did pay a ransom to get him released. So that pesky and common question remains often, what did the White House know and when did it know it?

President Obama secretly granted the Central Intelligence Agency more flexibility to conduct drone strikes targeting terror suspects in Pakistan than anywhere else in the world after approving more restrictive rules in 2013, according to a published report.

The Wall Street Journal, citing current and former U.S. officials, reported that Obama approved a waiver exempting the CIA from proving that militants targeted in Pakistan posed an imminent threat to the U.S. According to the paper, under that standard, the agency might have been prevented from carrying out a Jan. 15 strike that killed an American and an Italian who were held hostage by Al Qaeda-linked militants.

The deaths of Dr. Warren Weinstein and Giovanni Lo Porto have renewed debate in Washington over what, if any, new limits should be put on the drone program. After announcing the deaths of Weinstein and Lo Porto on Thursday, Obama said that he had ordered a “full review,” but said the strike that killed the hostages was “fully consistent with the guidelines under which we conduct counterterrorism efforts in the region.”

The CIA conducts drone strikes in Pakistan as well as in Yemen, where it works alongside the military. The Pentagon has also conducted drone strikes in Somalia.

Drone strikes carried out by the CIA fall into two categories. Specific terror leaders are targeted due to their presence on a so-called “kill list.” Strikes that target anyone on a “kill list” must be approved personally by Obama. The second type of operation is a so-called “signature strike”, which does not need the president’s approval and can be carried out against any suspected group of militants. It was the latter type of operation that resulted in the hostages’ deaths on Jan. 15.

The Journal reports that while Obama issued a directive in 2013 aimed at eventually eliminated “signature strikes” in an effort to cut down on civilian deaths, officials say many of the changes specified in the directive either haven’t been implemented or have been works in progress.

The paper also reports that the CIA’s Pakistan drone strike program was initially exempted from the “imminent threat” requirement until the end of U.S. and NATO combat operations in Afghanistan. Officials told the Journal that waiver was extended when Obama decided to keep U.S. troops in Afghanistan beyond the original withdrawal date of December 2014, though it is not clear exactly when this happened.

If the “imminent threat” requirement had been extended to Pakistan, the Journal reports, the CIA would have had to carry out more surveillance of the suspected militants, possibly preventing the fatal Jan. 15 mission from being launched.

In addition to Weinstein and Lo Porto, the drone strike also killed two Americans who had leadership roles with Al Qaeda. U.S. officials told the Associated Press late last week that the compound was targeted because intelligence showed it was frequented by Al Qaeda leaders.

Late Sunday, the Wall Street Journal reported that heat sensors and other surveillance tolls indicated that there were only four people at the compound, not the six who were ultimately killed. Analysts tell the paper that they now believe Weinstein and Lo Porto were kept underground, either in a basement or a tunnel, which would have prevented them from being detected by heat sensors.

Obama’s Emails Hacked, Russia’s Cyberwar

Russian Hackers Read Obama’s Unclassified Emails, Officials Say

WASHINGTON — Some of President Obama’s email correspondence was swept up by Russian hackers last year in a breach of the White House’s unclassified computer system that was far more intrusive and worrisome than has been publicly acknowledged, according to senior American officials briefed on the investigation.

The hackers, who also got deeply into the State Department’s unclassified system, do not appear to have penetrated closely guarded servers that control the message traffic from Mr. Obama’s BlackBerry, which he or an aide carries constantly.

But they obtained access to the email archives of people inside the White House, and perhaps some outside, with whom Mr. Obama regularly communicated. From those accounts, they reached emails that the president had sent and received, according to officials briefed on the investigation.

White House officials said that no classified networks had been compromised, and that the hackers had collected no classified information. Many senior officials have two computers in their offices, one operating on a highly secure classified network and another connected to the outside world for unclassified communications.

But officials have conceded that the unclassified system routinely contains much information that is considered highly sensitive: schedules, email exchanges with ambassadors and diplomats, discussions of pending personnel moves and legislation, and, inevitably, some debate about policy.

Officials did not disclose the number of Mr. Obama’s emails that were harvested by hackers, nor the sensitivity of their content. The president’s email account itself does not appear to have been hacked. Aides say that most of Mr. Obama’s classified briefings — such as the morning Presidential Daily Brief — are delivered orally or on paper (sometimes supplemented by an iPad system connected to classified networks) and that they are usually confined to the Oval Office or the Situation Room.

Still, the fact that Mr. Obama’s communications were among those hit by the hackers — who are presumed to be linked to the Russian government, if not working for it — has been one of the most closely held findings of the inquiry. Senior White House officials have known for months about the depth of the intrusion.

“This has been one of the most sophisticated actors we’ve seen,” said one senior American official briefed on the investigation.

Others confirmed that the White House intrusion was viewed as so serious that officials met on a nearly daily basis for several weeks after it was discovered. “It’s the Russian angle to this that’s particularly worrisome,” another senior official said.

While Chinese hacking groups are known for sweeping up vast amounts of commercial and design information, the best Russian hackers tend to hide their tracks better and focus on specific, often political targets. And the hacking happened at a moment of renewed tension with Russia — over its annexation of Crimea, the presence of its forces in Ukraine and its renewed military patrols in Europe, reminiscent of the Cold War.

Inside the White House, the intrusion has raised a new debate about whether it is possible to protect a president’s electronic presence, especially when it reaches out from behind the presumably secure firewalls of the executive branch.

Mr. Obama is no stranger to computer-network attacks: His 2008 campaign was hit by Chinese hackers. Nonetheless, he has long been a frequent user of email, and publicly fought the Secret Service in 2009 to retain his BlackBerry, a topic he has joked about in public. He was issued a special smartphone, and the list of those he can exchange emails with is highly restricted.

When asked about the investigation’s findings, the spokeswoman for the National Security Council, Bernadette Meehan, said, “We’ll decline to comment.” The White House has also declined to provide any explanations about how the breach was handled, though the State Department has been more candid about what kind of systems were hit and what it has done since to improve security. A spokesman for the F.B.I. declined to comment.

Officials who discussed the investigation spoke on the condition of anonymity because of the delicate nature of the hacking. While the White House has refused to identify the nationality of the hackers, others familiar with the investigation said that in both the White House and State Department cases, all signs pointed to Russians.

On Thursday, Secretary of Defense Ashton B. Carter revealed for the first time that Russian hackers had attacked the Pentagon’s unclassified systems, but said they had been identified and “kicked off.” Defense Department officials declined to say if the signatures of the attacks on the Pentagon appeared related to the White House and State Department attacks.

The discovery of the hacking in October led to a partial shutdown of the White House email system. The hackers appear to have been evicted from the White House systems by the end of October. But they continued to plague the State Department, whose system is much more far-flung. The disruptions were so severe that during the Iranian nuclear negotiations in Vienna in November, officials needed to distribute personal email accounts, to one another and to some reporters, to maintain contact.

Earlier this month, officials at the White House said that the hacking had not damaged its systems and that, while elements had been shut down to mitigate the effects of the attack, everything had been restored.

One of the curiosities of the White House and State Department attacks is that the administration, which recently has been looking to name and punish state and nonstate hackers in an effort to deter attacks, has refused to reveal its conclusions about who was responsible for this complex and artful intrusion into the government. That is in sharp contrast to Mr. Obama’s decision, after considerable internal debate in December, to name North Korea for ordering the attack on Sony Pictures Entertainment, and to the director of national intelligence’s decision to name Iranian hackers as the source of a destructive attack on the Sands Casino.

This month, after CNN reported that hackers had gained access to sensitive areas of the White House computer network, including sections that contained the president’s schedule, the White House spokesman, Josh Earnest, said the administration had not publicly named who was behind the hack because federal investigators had concluded that “it’s not in our best interests.”

By contrast, in the North Korea case, he said, investigators concluded that “we’re more likely to be successful in terms of holding them accountable by naming them publicly.”

But the breach of the president’s emails appeared to be a major factor in the government secrecy. “All of this is very tightly held,” one senior American official said, adding that the content of what had been breached was being kept secret to avoid tipping off the Russians about what had been learned from the investigation.

Mr. Obama’s friends and associates say that he is a committed user of his BlackBerry, but that he is careful when emailing outside the White House system.

“The frequency has dropped off in the last six months or so,” one of his close associates said, though this person added that he did not know if the drop was related to the hacking.

Mr. Obama is known to send emails to aides late at night from his residence, providing them with his feedback on speeches or, at times, entirely new drafts. Others say he has emailed on topics as diverse as his golf game and the struggle with Congress over the Iranian nuclear negotiations.

George W. Bush gave up emailing for the course of his presidency and did not carry a smartphone. But after Mr. Bush left office, his sister’s email account was hacked, and several photos — including some of his paintings — were made public.

The White House is bombarded with cyberattacks daily, not only from Russia and China. Most are easily deflected.

The White House, the State Department, the Pentagon and intelligence agencies put their most classified material into a system called Jwics, for Joint Worldwide Intelligence Communications System. That is where top-secret and “secret compartmentalized information” traverses within the government, to officials cleared for it — and it includes imagery, data and graphics. There is no evidence, senior officials said, that this hacking pierced it.

Clinton, General Electric, Algeria and Money

As Secretary of State, Hillary Clinton boast about being the most traveled of any U.S. diplomat, landing her plane in 112 countries. Hillary held 1700 meetings with world leaders and had 755 meetings at the White House. Her travels included dancing in none other than Columbia, Malawi and South Africa.

In October of 2012, Hillary traveled to Bosnia Herzegovina, Serbia, Kosovo, Albania, Croatia and Algeria. Perhaps it was quite telling as of this writing, interesting deals were made in Algeria, a country full of corruption led by President Bouteflika.

It should be noted that on October 19 of 2012, meetings were held in Washington DC where the topics were bilateral and regional concerns as well as economic and security cooperation under the title of U.S.-Algeria Strategic Dialogue. There was also a United Nations Security Council resolution authorizing West African States to perform a military intervention to remove the Islamist rebels from North Mali.

Two years earlier, The Clinton Foundation received $500,000 from Algeria without approval from the State Department ethic office or legal counsel. Algeria alleges the money was earmarked for the relief efforts in Haiti. At the same time, Hillary tells the public relations team her objectives with Algeria was to address human rights issues as well as to nurture the relationships between the United States and Algeria.

Of particular note, in 2010, Algeria also spent more than $400,000 in lobbying the U.S. government officials as specified by records under the Foreign Agents Registration Act, while sending representatives more than a dozen times to the United States to visit top political and diplomatic operatives.

Reports have been often published where the U.S. State Department have found that Algeria lacks any transparency, has a history of random killings and widespread corruption. Hillary even notes the facts of Algeria being a failed state in her book, “Hard Choices”.

Algerian security forces also benefit from U.S. cooperation programs. Obama Administration officials have stated a desire to deepen and broaden bilateral ties, including in the aftermath of a four-day terrorist hostage seizure at a natural gas compound in southeastern Algeria in January 2013, in which three Americans were killed. The attack highlighted the challenges the United States faces in advancing and protecting its interests in an increasingly volatile region.

The terrorist group that seized the hostages is a breakaway faction of Al Qaeda in the Islamic Maghreb (AQIM), a regional network and U.S.-designated Foreign Terrorist Organization with roots in Algeria’s 1990s civil conflict. Given Algeria’s large military and available financial resources, U.S. officials have expressed support for Algerian efforts to marshal a regional response to terrorist threats. Yet Algeria’s relations with neighboring states are complex and sometimes distrustful, at times hindering cooperation. Meanwhile, any U.S. unilateral action in response to regional security threats could present significant risks and opportunity costs. Algeria’s macroeconomic position is strong due to high global oil and gas prices, which have allowed it to amass large foreign reserves. Yet wealth has not necessarily trickled down, and the pressures of unemployment, high food prices, and housing shortages weigh on many families. Public unrest over political and economic grievances has at times been evident, though other factors may have dampened enthusiasm for dramatic political change.

Algeria’s foreign policy has often conflicted with that of the United States. Strains in ties with neighboring Morocco continue, due to the unresolved status of the Western Sahara and a rivalry for regional influence. The legacy of Algeria’s anti-colonial struggle contributes to Algerian leaders’ desire to prevent direct foreign intervention, their residual skepticism of French and NATO intentions, and their positions on regional affairs, including a non-interventionist stance toward the uprising in Syria and an ambivalent approach to external military intervention in neighboring Mali.

 

When it comes to Algeria’s economic status, both the International Monetary Fund and the World Trade Organization have assumed unusual positive forecasts on Algeria. The U.S, State Department in 2012 declared that Algeria has stabilized and all efforts were underway to enhanced the U.S./Algeria Trade Investment Framework Agreement (TIFA). This bring to light a company called Sonatrach, which exploits hydrocarbons for global consumption under research and development.

From the State Department’s website, Algeria concluded commercial agreements with several U.S. companies including Northrup Grumman and General Electric. The number of foreign trade missions to Algeria reportedly grew from 30 in 2010 to 60 in 2012, illustrating the increased focus and competition in the local market. In 2012, Algeria concluded commercial agreements with several Arab and European nations. U.S. firms, such as Northrop Grumman and General Electric won multi-million dollar tenders. President Abdelaziz Bouteflika appointed former Minister of Water Resources, Abdelmalek Sellal, as the new Prime Minister. Sellal is trusted by the political elite and viewed as a pragmatic politician who seeks new economic partnerships to tackle long-standing issues, such as housing shortages and unemployment. Algerian leadership remains focused on building domestic production capacity and reducing imports and seeks U.S. expertise and partnership. Minister of Commerce Mustapha Benbada visited the United States in December 2012 for discussions with the Office of the U.S. Trade Representative related to Algeria’s World Trade Organization (WTO) accession and cooperation under the U.S.-Algeria Trade and Investment Framework Agreement (TIFA).

 

General Electric continues to court Algeria in partnerships and joint ventures in 2015. Sonatrach is a company rocked by constant scandal including fraud suspicions and prison terms, in fact the country itself is ranked 105th out of 176 in fraud.  The national hydrocarbon group Sonatrach and the American company General Electric (GE) signed Thursday in Algiers a memorandum of understanding on the creation of a joint company for the manufacturing of equipment used in oil and gas industry. This new unit, of which Sonatrach will hold 51% stake through the oil services holding (SPP) while 49% will be held by GE, will be set up in the form of a joint stock company. This unit will manufacture and develop, among others, equipment of drilling and production, equipment for measurement and supervision as well as provision for services and trainings relating to oil fields.

General Electric CEO, Jeffrey Immelt stated on April 22, 2015, he refused to turn over emails between himself and Hillary Clinton or those exchanged with the State Department. Immelt was also brought into the Obama administration as the ‘Job Czar’ and tendered his support for Obamacare while transferring his GE X-ray division to China to avoid the Obamacare taxes applied to medical devices. Immelt does need to provide evidence of the collusion especially when he authorized GE to contribute up to $1.0 million dollars to the Clinton Health Access Initiative.

Numerous sources, including the Wall Street Journal and the New Yorker, have recently reported that, while Secretary of State, Hillary Clinton lobbied foreign governments on behalf of companies including General Electric at a time when those companies were making donations to the Clinton Foundation. In late 2012, for example, Clinton urged the Algerian government to award a power plant contract to GE. GE contributed to the Clinton Foundation. Then in 2013, Algeria awarded the power plant contract to GE.

By donating to the Clinton Foundation while receiving a huge favor from the Secretary of State, did we not expose our company to the risk of being charged with honest services fraud? I am not accusing the company of any wrongdoing. But you have to admit that the optics suggest a quid pro quo could have occurred, and a public official pushing a foreign government to buy a company’s products while that company makes a generous donation to that public official’s family- run foundation appears to fit even the more limited definitions.

Since Mrs. Clinton had control of her business emails during this time and has said she deleted many of them, GE presumably is the only entity with evidence that everything was above board. To prevent the company from being the focus of any media or public investigation, would you consider making public all the Company’s written communications with the State Department during the relevant period?

It is Iran Stupid…

A partial list of where Iran has their proxies: Venezuela, Argentina, Nicaragua, Lebanon, Syria, Yemen, Iraq, Afghanistan…..there is more. Armed tribes and there is no dispute, Iran has a financial network in the United States giving validation to the notion that Iran is the country where the global terror banking system resides.

 

The White House, the National Security Council, the State Department, the U.S. Treasury, the FBI and ODNI as well as the CIA all have tangible proof of the machinations of Iran, yet still the diplomatic process continues with impunity.

Iran’s increasingly active involvement in the region’s proxy wars increases domestic separatist terrorism risk

Key Points

  • Although protests by Ahwazi Arabs are fairly routine, the participation of sympathisers from other Arab states indicates the potential for ethnic and religiously motivated unrest and insurgency to evolve.
  • Ahwazi Arab militants in Khuzestan and Jaish al-Adl militants in Sistan-Baluchistan province have increasingly positioned their separatist narratives in the context of the regional Iran-Saudi conflict, indicating their receptiveness to external support, potentially from Iran’s regional rival Saudi Arabia.
  • Although IHS has no evidence of current Saudi involvement, Saudi support for these groups is a likely retaliatory option, in the event of perceived Iranian dominance in Yemen, Syria, and Iraq, but this would likely be limited to funding and non-attributable low-capability weaponry. A sustained and high capability insurgency is unlikely in the one-year outlook.

EVENT

Hundreds of Ahwazi Arabs, along with Syrian, Iraqi, Palestinian, Lebanese, and Yemeni sympathisers, gathered on 17 April outside the European Parliament in Brussels to protest Iran’s “occupation of al-Ahwaz” in the country’s Khuzestan province.

Iran’s perceived successes in the Sunni-Shia regional conflict make it more likely that Iranian-backed groups will challenge Saudi Arabia’s regional authority, and increase the pressure on the Kingdom to confront Iran more directly. However, regardless of whether Saudi Arabia is backing insurgent groups in Iran, any such attack or protest by regional-based groups are likely to be attributed by Iran’s government to Saudi Arabia, not least as a way of deflecting relevance from domestic opposition.

Ahwazi Arabs

Iran has accused Saudi Arabia of supporting Ahwazi Arab militants based in the oil-rich Khuzestan province, southwest Iran, although this claim has not been substantiated, and nor has Iran specified the extent of such support. The Arab Struggle Movement for the Liberation of Ahwaz (ASMLA) has carried out a series of successful attacks on Iran’s oil and gas pipelines using improvised explosive devices (IEDs) in Khuzestan, with the most recent wave of such attacks occurring in 2012 and 2013. Although the long remote stretches of pipelines are potential targets for further IEDs, Iran has since enhanced pipeline security and there have been no successful attacks reported since 2013. The Islamic Revolution Guards Corps (IRGC) foiled a bomb plot on the Abadan-Mahashahr oil pipeline in November 2013, which the IRGC later claimed was by the ASMLA.

The ASMLA is likely to be receptive to external support from Iran’s opponents, principally Saudi Arabia. Indeed, the presence of Syrian, Iraqi, Lebanese, and Yemeni sympathisers at the 17 April Ahwazi protest rally held in Brussels indicates the group’s increasing alignment with those disaffected by Iran’s influence in those countries’ internal conflicts. Although Ahwazi Arabs are overwhelmingly Shia, the ASMLA dedicated the August 2013 attack on a gas pipeline to their Syrian ‘brothers-in-arms’, positioning the group’s agenda against Iran as part of the larger regional conflict. Moreover, the head of the ASMLA met with Mohammad Riad al-Shaqfeh, head of the Syrian Muslim Brotherhood, in September 2012, indicating their potential co-operation. Nevertheless, the extent of Ahwazi Arab support for the ASMLA and militancy is unclear. Despite having economic grievances, Ahwazi Arabs sided with Iran during the Iran-Iraq war (1980-1988).

Jaish al-Adl

IHS monitoring of Jaish al-Adl’s social media accounts shows that the group is increasingly reaching out to an Arabic-speaking audience, probably to secure funding from Gulf donors. It released a video purportedly showing the 6 April attack in Negur, Sistan-Baluchistan province, in which eight Iranian border guards were killed. The video included Arabic subtitles. Publishing videos of successful attacks is used by some Syrian militant groups to secure donor funding. Jaish al-Adl’s social media accounts also increasingly report on regional conflicts, particularly Yemen, marking a shift in its rhetoric from an exclusively Baluchi nationalist one to one that positions itself within the regional Sunni-Shia conflict.

Although there is no evidence to prove existing Saudi support for Jaish al-Adl, if this did occur it would most likely be through Pakistan, where the group’s core leadership is based and which has a history of support for the group. The Iran-Pakistan border is porous and the group can move across the border with relative ease. For its part, Pakistan’s unwillingness or inability to supply weaponry or forces to the Saudi-led military campaign in Yemen might well create pressure on Pakistan to facilitate Saudi support for Jaish al-Adl in Iran, however even this might well prove problematic, given Pakistan’s interest in securing gas from Iran via a planned pipeline.

Kurds

Kurdish separatists have traditionally been active in their homeland of Iran’s northwestern provinces of Kurdistan, Kermanshah, and West Azerbaijan, but there has been little recent activity by its main group, Party for a Free Life in Kurdistan (Partiya Jiyana Azada Kurdistane: PJAK). However, at least one faction of PJAK is likely to have been radicalised after Iran ignored the group’s call for negotiations in May 2014. A possible indication of such radicalisation was an alleged plot by ‘Islamist extremists’ to blow up a mosque in January 2015 in Mahabad, West Azerbaijan province, which Iranian authorities claimed to have foiled. The Iranian deputy interior minister Hossein Zolfaqari also claimed in March 2015 that Iran’s security forces have also dismantled several Islamic State-affiliated cells in the past year. The Islamic State has separately claimed to have Iranian Kurds among its recruits, although IHS has no evidence to substantiate this claim. Even if there is an appeal for Islamic State-inspired militancy in these provinces, Iran’s pervasive intelligence network is likely to mitigate risks of successful attacks. Meanwhile, as with Jaish al-Adl, it is quite probable that Iran will attribute alleged Islamist militancy amongst Iranian Kurds to external, principally Saudi, involvement, particularly in the event of fatalities amongst Iranian security forces or civilians.

FORECAST

Although Saudi Arabia has some incentive to provide limited support to opposition or insurgent/militant groups in Iran in the context of its regional proxy war with Iran, such support is likely to be confined to funding and non-attributable light weaponry. Even if this option were adopted, Iran’s transit routes are heavily guarded by the IRGC, and arms shipments through the Iraqi border or the Gulf coast would very likely be intercepted. Transfers of weaponry would be easier across the porous Pakistan border, but even then, Jaish al-Adl has not demonstrated the capability to move beyond the border area, much less transfer weaponry to Khuzestan. However, regardless of whether Saudi support is forthcoming, Iran would probably attribute blame to Saudi or other Gulf actors in the event of an increase in the frequency or capability of attacks in its peripheral provinces, which would also exacerbate the state of hostility between the two countries.

Obama Giving Allies Away, Putin Winning Them

In Eastern Europe:

Hungary, a NATO member whose prime minister recently named Putin’s Russia as a political model to be emulated. Or NATO member Slovakia, whose leftist prime minister likened the possible deployment of NATO troops in his country to the Soviet invasion of 1968. Or NATO member Czech Republic, where the defense minister made a similar comparison and where the government joined Slovakia and Hungary in fighting the European Union’s sanctions against Russia. Or Serbia, a member of NATO’s “partnership for peace” that has invited Putin to visit Belgrade this month for a military parade to celebrate the 70th anniversary of the Red Army’s “liberation” of the city. Then there is Poland, which until recently was leading the effort within NATO and the European Union to support Ukraine’s beleaguered pro-Western government and punish Putin’s aggression. This month its new prime minister, Ewa Kopacz, ordered her new foreign minister to urgently revise its policy.

Russia recruits U.S. allies in Eastern Europe by raising doubts about security commitment

Russia is trying to slowly strip away U.S. allies in Eastern Europe by playing up fears that Washington will not come to their aid, as promised nearly a decade ago, because of a lack of foreign strategy and commitment to the region, analysts say.

Russian President Vladimir Putin has authorized a string of provocative moves from the Arctic to the Black Sea in recent months in an attempt to intimidate NATO allies along the border for the old Soviet Union, including Hungary, Romania and Latvia, and boost allies of Moscow living in those countries.

Last year, a Russian-friendly party won the largest number of votes in Latvia’s parliamentary elections amid reports that a mayor of a city in eastern Latvia voiced concerns that activists were engaged in door-to-door campaigning in support of the communities’ secession from Latvia to join Russia.

Hungarian Prime Minister Victor Orban, who helped engineer his country’s successful application for membership in NATO in 1999, now seems to be cozying up to Russia by making large deals with Moscow and criticizing Western sanctions.

In November, Hungary authorized construction of the South Stream pipeline, a Russian-backed project that will bypass Ukraine to funnel natural gas exports to Europe and elsewhere, to the dismay of the European Union. Ukraine is engaged in a fierce political and military standoff with Russian-based separatists.

The fact that some countries along the tense border with Russia may be tempted to switch sides suggests a broader problem of a lack of trust in the U.S. commitment to protect them if they are attacked, said Matthew Rojansky, director of the Kennan Institute at the Woodrow Wilson International Center for Scholars.

“Why don’t they feel that deterrent effect of America’s commitment to defend them?” he said. “They clearly don’t think that we are committed to that commitment. That’s really where the problem is. They’re doubting the American security commitment.”

NATO’s famous Article 5 declares that an attack against any of the 28 countries in the alliance will be considered an attack against all. As a result, countries that have signed the treaty must come to the defense of others that are threatened or attacked.

Mr. Rojansky likened the U.S. commitment to these countries to life insurance: A 25-year-old healthy person generally has no trouble getting a life insurance policy because the company knows it likely won’t have to pay up soon. A 67-year-old with a history of heart disease, however, could have trouble obtaining a policy and face high premiums.

Seven countries — including Latvia, Lithuania and Estonia — became NATO members in 2004. Because the threat of a Russian attack wasn’t a serious consideration at that time, there was no lengthy debate on the wisdom of letting these Baltic states join, Mr. Rojansky said.

Now that Russia under Mr. Putin has taken a far more aggressive stance in Ukraine, Georgia and elsewhere, the situation has changed, he said.

“We’ve given them the policy coverage, but we gave it to them in a totally different circumstance, and that’s creating doubts on their part about if we’ll honor the policy,” Mr. Rojansky said.

Saber-rattling

Both sides have engaged in saber-rattling in recent weeks, leading to talks on both sides of the European divide of a potential new cold war.

Russian fighter jets have grown increasingly brazen in challenging U.S. and allied surveillance flights, and Sweden this fall scrambled ships and helicopters to track a Russian submarine that was believed to have surreptitiously entered Swedish waters. Planes from Russia’s Northern Fleet this week have begun anti-ship exercises in the Barents Sea.

Pentagon officials said Thursday that they were asking Russia to investigate an incident in early April in which a Russian fighter jet intercepted a U.S. reconnaissance plane in international airspace north of Russia and conducted multiple “unprofessional and reckless and foolish” maneuvers in proximity to the American plane.

Analysts in Moscow say the West has been just as provocative, with the U.S. holding joint exercises with Ukraine’s military, accelerating talks with Poland on a state-of-the-art missile defense system, staging a high-profile military convoy trip through six Eastern European nations, and deploying 12 A-10 Warthog planes to Romania as part of a theater-security effort to counter Russian moves in the region.

“The unit will conduct training alongside our NATO allies to strengthen interoperability and demonstrate U.S. commitment to the security and stability of Europe,” Pentagon spokesman James Brindle said this month in a statement about the action to Military.com.

Pentagon officials told the website that the deployment of the A-10s was part of NATO’s Operation Atlantic Resolve. The mission objective is, in part, to send a message to Russia about the U.S. commitment to NATO allies.

“Operation Atlantic Resolve will remain in place as long as the need exists to reassure our allies and deter Russia from regional hegemony,” Pentagon spokesman Maj. James Brindle said.

Pentagon officials strongly contested criticism that the Obama administration was having second thoughts about fulfilling the U.S. commitment to its allies in Eastern Europe now that Russia poses a significant threat.

“The U.S. thoroughly considered all aspects associated with establishing and joining NATO,” the official said. “The principles contained in opening paragraphs of the Washington Treaty remain as relevant today as they were 66 years ago.”

The U.S. needs to do more to reassure NATO allies of its commitment, including permanently basing troops in Eastern Europe, as well as more frequent and larger-scale deployments, said Boris Zilberman, deputy director of congressional relations at the Foundation for the Defense of Democracies.

The ultimate goal, he said, is to ensure that countries that have been allies remain on the side of the U.S.

At the same time, the U.S. must walk a fine line by increasing its presence enough to reassert its commitment to allies but not so much so as to give Mr. Putin political ammunition to escalate Russian aggression, Mr. Zilberman said.

“How much do we want to mirror image what they’re doing and give Putin a reason to keep doing it?” he said.

The U.S. is deploying small groups of service members to conduct drills in Baltic partner countries and has imposed sanctions on Russia, a policy that Defense Secretary Ashton Carter said is working.

“My observation is that this is having a real effect on the Russian economy and at some point the Russian people are going to ask themselves whether these kinds of adventures are worth the price,” Mr. Carter told reporters in a briefing Thursday.