34 Groups Connected to Militant Islam

UN chief: 34 groups now allied to Islamic State extremists

UNITED NATIONS (AP)— Thirty-four militant groups from around the world had reportedly pledged allegiance to the Islamic State extremist group as of mid-December — and that number will only grow in 2016, U.N. Secretary-General Ban Ki-moon said in a report Friday.

Ban said IS poses “an unprecedented threat,” because of its ability to persuade groups from countries like the Philippines, Uzbekistan, Pakistan, Libya and Nigeria to pledge their allegiance.

He said U.N. member states should also prepare for an increase in attacks by IS associated groups traveling to other countries to launch attacks and develop networks.

“The recent expansion of the ISIL sphere of influence across west and north Africa, the Middle East and south and southeast Asia demonstrates the speed and scale at which the gravity of the threat has evolved in just 18 months,” Ban said, using another abbreviation for the group.

Adding to the threat, IS is “the world’s wealthiest terrorist organization,” Ban said, citing estimates the group generated $400-$500 million from oil and oil products in 2015, despite an embargo.

According to the U.N. mission in Iraq, cash taken from bank branches located in provinces under IS control totaled $1 billion. The mission also estimates that a tax on trucks entering IS controlled-territory generates nearly $1 billion a year, he said.

The extremist group captured large swathes of Iraq and Syria less than two years ago and despite international efforts to oust them, Ban said IS continues to maintain its presence in both countries and is expanding to other regions.

But the report and vote was in November of 2015:

UnitedNations: The Security Council determined today that the Islamic State in Iraq and the Levant/Sham (ISIL/ISIS) constituted an “unprecedented” threat to international peace and security, calling upon Member States with the requisite capacity to take “all necessary measures” to prevent and suppress its terrorist acts on territory under its control in Syria and Iraq.

Unanimously adopting resolution 2249 (2015), the Council unequivocally condemned the terrorist attacks perpetrated by ISIL — also known as Da’esh — on 26 June in Sousse, on 10 October in Ankara, on 31 October over the Sinaï Peninsula, on 12 November in Beirut and on 13 November in Paris, among others.  It expressed its deepest condolences to the victims and their families, as well as to the people and Governments of Tunisia, Turkey, Russian Federation, Lebanon and France.

The 15-member body condemned in the strongest terms ISIL’s gross, systematic and widespread abuses of human rights, as well as its destruction and looting of cultural heritage.  Those who committed, or were otherwise responsible for, terrorist acts or human rights violations must be held accountable.  By other terms, the Council urged Member States to intensify their efforts to stem the flow of foreign terrorist fighters into Iraq and Syria, and to prevent and suppress the financing of terrorism.

Following the vote, nearly all Council members took the floor to decry the “barbaric” attacks and hateful world view espoused by ISIL, reaffirming their support in both stemming the threat and bringing perpetrators to justice.  In an echo of the sentiments voiced by many around the table Spain’s representative declared:  “Today, we are all French, Russian, Malian and Arab,” adding:  “It is time to act with a French, Russian, Malian and Arab heart.”  The Council had a duty to guarantee the values and principles of the United Nations, and all must close ranks to vanquish terrorism, he stressed.

France’s representative, recalling that Da’esh had perpetrated an act of war against his country on 13 November, said today’s vote signalled recognition of the threat’s exceptional nature.  The fight against terrorism could only be effective if combined with a political transition that would eliminate Da’esh, he said, adding that France had obtained activation of the European Union’s mutual solidarity clause.

The Russian Federation’s representative said today’s unanimous vote was a step towards the creation of a broad anti-terrorism front aimed at eradicating root causes.  That also had been the aim of a Russian draft presented to the Council on 30 September, he said, describing attempts by some to block his delegation’s efforts as politically short-sighted.

Also speaking today were representatives of China, United States, Nigeria, Lithuania, Jordan, New Zealand, Chile, Angola, Venezuela and the United Kingdom.

Spooky Dude Behind Migrants and Benefits

The Open Society Foundations’ U.S. Programs is committed to building a vibrant, inclusive, and more just society in the United States. Through grant making, the Soros Justice Fellowships, and a special reserve fund used as crises and unexpected opportunities arise, U.S. Programs seeks to promote full participation in the nation’s civic, political, and economic life—particularly for communities that are historically marginalized and vulnerable—and to ensure that the core institutions of civil society are effective and accountable to the public.

The work of U.S. Programs is organized around four central goals: a more inclusive and accountable American democracy; a fair criminal justice system; full political, economic, and civic participation of communities of color and immigrants; and equitable economic growth.

Among its priorities:

Justice

Working to end mass incarceration; making police departments more accountable to the communities they serve; challenging the death penalty; and replacing youth justice policies that stigmatize and suppress with those that safeguard the rights of children.

Drug Policy

Promoting policies that address drug use—and the health, mental health, and social needs it creates—within the context of communities rather than the justice system, and working to ensure access to comprehensive treatment.

Equality

Promoting fairness and equality for all people in the United States by removing barriers to full participation in economic, social, and civic life for marginalized communities; seeking to reduce the racial wealth gap and reform harsh school discipline policies that disproportionately impact children of color; working to improve life outcomes for boys and men of color; and changing the racial narrative in this country.

Democracy

Supporting high-quality journalism to help hold powerful institutions accountable; protecting the free flow of information through an internet accessible to all; reducing the undue influence of money in politics; expanding electoral participation and combat voter suppression; and advancing reforms safeguarding the independence of state courts.

Economic Advancement

Working to promote economic opportunity for all Americans, reduce income equality, and advance fair housing and lending policies.

National Security & Human Rights

Working to promote the rule of law, defend civil liberties and human rights, and combat Islamophobia in the face of overbroad or discriminatory U.S. counterterrorism policies and practices.

Philanthropy of Place

Testing ideas at the state and local level through our sole field office, the Open Society Institute–Baltimore, which focuses on drug addiction, over-reliance on incarceration, and obstacles that prevent youth from succeeding inside and out of the classroom, as well as through the Open Places Initiative, which promotes equality and improved civic participation in Buffalo, San Diego, and Puerto Rico.

***

Countless pages here on who he gives grant money to.

Governance and Accountability
Through empowerment, policy change, and legal action, we target reforms that meaningfully improve the working and living conditions of migrants.

The International Migration Initiative seeks to address exploitation, discrimination and violence against migrants at every stage of their migration journey. Specifically, the initiative aims to increase protections for migrants in the Asia/Middle East and the Central America/Mexico corridors while improving policymaking and the governance of international migration.

Two unique aspects of the initiative’s approach amplify its impact: First, our focus on migration corridors means the initiative is active in both countries of origin and destination, and thus targets every stage of the migration journey. Second, we bridge advocacy and policy by drawing on the experience of grassroots organizations, while engaging with policymaker and political leaders. Through empowerment, policy change, and legal action, we target reforms that can meaningfully improve the working and living conditions of migrants.

The International Migration Initiative’s main areas of work are built around increasing protections for migrants and improving migration policymaking and the governance of international migration. Within these strategic priority areas, the initiative targets three overarching goals:

  • Deterring rights violations and increasing access to justice: The International Migration Initiative aims to demonstrably improve the working and living conditions of migrants by bringing about a measurable decline in acts of violence against them and reducing the incidence of forced labor. This requires the development of a broader, stronger network of organizations and practitioners engaged in advocacy. We are pursuing initiatives to increase access to justice by building capacity among legal practitioners so they can overcome legal and jurisdictional hurdles impeding migrants’ access to redress.
  • Empowering migrants: The initiative seeks to strengthen the ability of migrants to assert and defend their rights, primarily by increasing access to information. This involves improving the quality, coverage, and effectiveness of training and orientation seminars prior to departure and upon arrival in countries of employment. We also aim to create an enabling environment in which migrants can mobilize and make their voices heard through grassroots organizing, the development of associations and informal support networks, and the creation of migrant-run, community-based media.
  • Enhancing regional policymaking and dialogue: The initiative advances policy reform and the promulgation of best practices by enabling dialogue among key stakeholders, including among actors who might not otherwise come together. We also aim to build the evidence base necessary to inform these conversations and to deepen networks among policymakers, as well as between the state and civil society. In the long term, we aim to promote more inclusive, tolerant communities and a better-informed public in order to combat xenophobia and discrimination.

Hat tip to Michael

Hillary, FBI Investigation is a Security Review, Wrong

It was a moment where words could be applied in general. Hillary stating that the FBI probe was merely a security review is flatly wrong. There are at least 2 tracks to the investigation. 1) Reviewing classified material in violation of the Espionage Act. 2) Reviewing whether there were foreign intrusions into her server, any of her devices or at the State Department.

One question that has not been asked: If Hillary did not have a dot gov email address nor did she have any government issued devices, ‘exactly how DID she receive classified material including material all the up to TS-SCI material? Was she ever in a SCIF?

Hillary misleading about email probe during debate, former FBI agents say

FNC: Hillary Clinton used misleading language in Thursday night’s Democratic debate to describe the ongoing FBI investigation into her use of a private email server to conduct official government business while she was secretary of state, according to former senior FBI agents.

In the New Hampshire debate with Senator Bernie Sanders, which aired on MSNBC, Clinton told moderator Chuck Todd that nothing would come of the FBI probe, “I am 100 percent confident. This is a security review that was requested.  It is being carried out.”

Not true says Steve Pomerantz, who spent 28 years at the FBI, and rose from field investigative special agent to the rank of assistant director, the third highest position in the Bureau.

“They (the FBI) do not do security reviews,” Pomerantz said. “What they primarily do and what they are clearly doing in this instance is a criminal investigation.”

Pomerantz emphasized to Fox News, “There is no mechanism for her to be briefed and to have information about the conduct, the substance, the direction or the result of any FBI investigation.”

Separately, an intelligence source familiar with the two prongs of the ongoing FBI probe, stressed to Fox that the criminal and national security elements remain “inseparable.”  The source, not authorized to speak on the record,  characterized Clinton’s statement “as a typical Clinton diversion… and what is she going to say, “I’m 95 percent sure that I am going to get away with it?”

Fox recently learned that one of the FBI’s senior agents responsible for counterintelligence matters, Charles H. Kable IV, is working the Clinton case, another indicator the intelligence source said that the FBI probe is “extremely serious, and the A-team is handling.”

Kable, known as “Sandy,” was appointed special agent in charge of the counterintelligence division at the Washington field office by Director James Comey in December.

He had recently served as the chief of the counterespionage section at FBI headquarters.  In that capacity, a bureau press releases says the 15-year, well-respected FBI veteran, “provided leadership and oversight to the field offices engaged in espionage, economic espionage, and insider threat investigations.”

While his responsibilities are not publicly known, Kable was described to Fox as “tough and no- nonsense FBI ” and analyst and agents are exploring whether the mishandling of classified information was “intentional” and who may have benefited.

A spokeswoman for the FBI took Fox’s questions, but said they would not be providing comment on Kable’s role or the FBI case.

In 2009, Kable led investigations against known and suspected Chinese intelligence officers in the U.S.  In January, former Secretary of Defense Robert Gates, told the Hugh Hewitt radio show that “the odds are pretty high” that then-Secretary of State Clinton’s personal email server was hacked by Iran, China and Russia.

An intelligence source told Fox, “it is no less of a violation of espionage statutes if any material was classified secret or top secret….All the statute requires is national defense information or NDI,” adding “this is way past accidental spillage…(it) is being investigated as intentional mishandling….in this kind of high profile investigation, the most damaging information takes primacy.”

Investigations into the compromise of classified information include damage assessments.  In the recent case of former CIA Director David Petraeus, the damage was deemed to be limited, discreet, and knowable because the highly classified information was shared with his biographer, who also had a security clearance.

In Hillary Clinton’s case, if the private server was compromised by a third party, the extent of the damage maybe unknowable.

The hacker “Guccifer” compromised Clinton’s adviser Sydney Blumenthal’s aol account, and he copied the email exchanges sent to Clinton.  The Romanian hacker, whose real name is Marcel Lehel Lazar, has an extradition hearing February 17, and in an interview, indicated he would welcome extradition to the U.S.

The amount of classified information, now including top secret emails the State Department withheld from public release last week, and more than 15-hundred containing classified information at various levels.

At the State Department briefing Thursday, spokesman John Kirby was asked by Fox News chief intelligence correspondent Catherine Herridge whether Clinton, as well as aides Huma Abedin, and Cheryl Mills, completed the required classified training that includes the proper storage, handling, and identification of classified information.

“Everybody here is trained in how to handle sensitive information. Sometimes that takes place in in-person briefings and I can’t comment any further,”  Kirby said.  Asked it was documented, Kirby said he had nothing more to offer, but did confirm Clinton, Abedin, Mills were not exempt from the strict rules that apply to State Department personnel.

Fox: “So they would not be an exception?”

Kirby: “Everybody that works at the State Department gets trained in how to handle sensitive information.  Sometimes that’s done in- person briefings.”

This is important because, on its face, it undercuts Clinton’s claim she had no way to know it was classified because the emails were not marked.  Personnel are trained (IF?) the content is classified, it can be marked, unmarked, or given in oral communications.

Under the Freedom of Information Act, Judicial Watch sought the records documented (IN?)the classification training, but in a letter dated January 22, 2016, exactly seven years after Clinton signed her Non-Disclosure Agreement (NDA) to serve as Secretary of State, the government watchdog was told “no responsive records” could be found.

Catherine Herridge is an award-winning Chief Intelligence correspondent for FOX News Channel (FNC) based in Washington, D.C. She covers intelligence, the Justice Department and the Department of Homeland Security. Herridge joined FNC in 1996 as a London-based correspondent.

Pamela K. Browne is Senior Executive Producer at the FOX News Channel (FNC) and is Director of Long-Form Series and Specials. Her journalism has been recognized with several awards. Browne first joined FOX in 1997 to launch the news magazine “Fox Files” and later, “War Stories.”

 

China’s Best Method of Industrial Espionage

Obscure Chinese Firm Dives Into $22 Trillion U.S. Market

Bloomberg: When Cromwell Coulson heard that an obscure Chinese real estate firm had agreed to buy the Chicago Stock Exchange, he was shocked.

“My first reaction was, ‘Wow, that’s who they’re selling to?”’ said Coulson, the chief executive officer of OTC Markets Group Inc. in New York. “These new buyers have no connection to Chicago’s existing business. They’re completely disconnected from the current business of supporting the Chicago trading community. So wow, that’s out of left field.”

While the world has gotten used to seeing Chinese companies snap up overseas businesses, the purchase of a 134-year-old U.S. stock market by Chongqing Casin Enterprise Group — a little-known property and investment firm from southwestern China — raises a whole host of questions. For starters, why does a provincial Chinese business with no apparent ties to the securities industry have any interest in buying one of America’s smallest equity exchanges? And will U.S. regulators sign off?

So far, Casin Group’s intentions are unclear, with calls to the company’s Chongqing headquarters going unanswered on Friday. If the deal does pass muster with American regulators, it would mark the first-ever Chinese purchase of a U.S. equity exchange, giving Casin Group a foothold in a $22 trillion market where even the smallest bourses have room to grow if they can provide the best price for a stock at any given moment.

The Chicago Stock Exchange — a subsidiary of CHX Holdings Inc. — is minority-owned by a group including E*Trade Financial Corp., Bank of America Corp., Goldman Sachs Group Inc. and JPMorgan Chase & Co., according to the company. The minority shareholders are also selling their stake, Chicago Stock Exchange Chief Executive Officer John Kerin said in a phone interview.

The deal values the exchange at less than $100 million, according to a person familiar with the matter, who asked to not be identified because the terms weren’t disclosed publicly. Mark O’Connor, a spokesman for the exchange, declined to comment on the size of the transaction.

Overseas Shopping

Casin Group’s offer, announced on Friday in a statement from the Chicago exchange, comes amid an unprecedented overseas shopping spree by Chinese companies. Businesses from Asia’s largest economy have announced $70 billion of cross-border acquisitions and investments this year, on track to break last year’s record of $123 billion, according to data compiled by Bloomberg.

While many of those deals had obvious business rationales, the reasons for Casin Group’s bid are less clear. The company, founded in the 1990s through a privatization of state-owned assets, initially focused on developing real estate projects in Chongqing, before expanding into the environmental and financial industries. While the firm owns stakes in banks and insurers, it has no previous experience owning an exchange.

Chinese Growth

Lu Shengju, the majority owner and chairman of Casin Group, wants to help bring Chinese companies to U.S. markets, according to the statement from Chicago’s bourse.

“We have reviewed CHX’s plans to improve market share through new growth initiatives and fully support them,” Lu, a torch bearer during the Beijing Olympic games in 2008, said in the statement, which didn’t disclose terms of the deal. “Together, we have a unique opportunity to help develop financial markets in China over the longer term and to bring exciting Chinese growth companies to U.S. investors.”

The Chicago Stock Exchange could serve as a venue for Chinese companies to list, said Dale Rosenthal, a clinical assistant professor of finance at the University of Illinois at Chicago.

“Because they’re an exchange, they can list stock,” Rosenthal said. “It has the potential to raise Chicago’s profile in China.”

Casin Group is no stranger to investing in outside businesses, including overseas targets. Three years ago, the firm increased its stake in Shenzhen-listed Guoxing Property to 30 percent, becoming the biggest shareholder. Guoxing, now 60 percent owned by Casin Group, has soared 170 percent in the past two months, versus a 19 percent drop in the CSI 300 Index, data compiled by Bloomberg show. Casin Group bought a 25 percent stake in Singapore-based Great Eastern Life Assurance in 2013.

“It’s interesting to see the Chinese increase their footprint in the U.S.,” said Ramon Camacho, a principal at RSM US LLP, an audit, tax and consulting company based in Chicago. “These investors are looking for a platform to showcase and bring to market Chinese companies.”

The company’s bid for the Chicago bourse could face political opposition, with American regulators and politicians taking a skeptical approach toward foreign investments in industries deemed important to national interests. When Germany’s Deutsche Boerse AG wanted to buy the owner of the New York Stock Exchange in 2011, U.S. Senator Charles Schumer, a Democrat from New York, raised obstacles. The deal was finally scrapped on monopoly concerns.

Heavy Scrutiny

Some Chinese companies have come under heavy scrutiny as they tried to enter U.S. markets. Huawei Technologies Co., China’s largest phone-network equipment maker, was barred by the U.S. in 2011 from participating in building a nationwide emergency network.

The U.S. Securities and Exchange Commission would have to approve the deal, because the exchange is a self-regulatory organization. The new owners will have to show they intend to follow all of the regulations imposed on stock exchanges, whose listing and trading rules also must be approved by the SEC.

Additionally, the takeover would probably be reviewed by the Committee on Foreign Investment in the U.S., said Anne Salladin, a lawyer at Stroock & Stroock & Lavan LLP in Washington. CFIUS, a panel of government officials led by the Treasury Department that examines purchases of American businesses by foreign investors, can recommend the president block transactions it believes compromise national security. It can also impose changes to address any concerns.

“It’s a Chinese investment, and it’s in a potentially sensitive sector: financial infrastructure,” Salladin said.

CFIUS has been closely scrutinizing purchases of American businesses by Chinese buyers. Last month, Royal Philips NV abandoned its plan to sell its lighting-components unit to a Chinese-led investment group following opposition from CFIUS.

“If you have a U.S. stock exchange that’s primarily satisfying Chinese companies, the regulators are gonna look very closely at it,” Coulson said. “If your core business is listing Chinese companies in the U.S., that’s going to pick up a lot of regulatory scrutiny and caution.”

China Industrial Espionage:

This new book is the first full account, inside or outside government, of China’s efforts to acquire foreign technology.

Based on primary sources and meticulously researched, the book lays bare China’s efforts to prosper technologically through others’ achievements. For decades, China has operated an elaborate system to spot foreign technologies, acquire them by all conceivable means, and convert them into weapons and competitive goods—without compensating the owners. The director of the US National Security Agency recently called it “the greatest transfer of wealth in history.”

Written by two of America’s leading government analysts and an expert on Chinese cyber networks, this book describes these transfer processes comprehensively and in detail, providing the breadth and depth missing in other works. Drawing upon previously unexploited Chinese language sources, the authors begin by placing the new research within historical context, before examining the People’s Republic of China’s policy support for economic espionage, clandestine technology transfers, theft through cyberspace and its impact on the future of the US.

This book will be of much interest to students of Chinese politics, Asian security studies, US defence, US foreign policy and IR in general.

***

China’s long history of spying on business

CNN: The United States indicted five members of China’s People’s Liberation Army Monday, accusing them of hacking into American companies and pilfering closely-guarded trade secrets.  The charges — rejected by Beijing as “purely ungrounded and with ulterior purpose” — are a dramatic escalation in a squabble between the two countries over spying. But they will surprise few Americans working in sensitive industries.

While many countries engage in industrial espionage, China has long been among the most aggressive collectors of economic secrets — both online and off, experts say.

“I can tell you they [China] are the most pervasive,” Kevin Mandia, founder of cybersecurity firm Mandiant, told CNN. “The indictment is about taking intellectual property … it’s the theft of trade secrets, it’s economic espionage.” Full article here.

Putin’s Hidden Agents in ISIS

It is about a global power-ranking. When Russia and Iran team up to destabilized Syria, refugees, millions of them flee. Destination for the refugees, The West. The West is forced to accommodate millions, pay for them, house them, educated them and provide medical care, breaking the financial structure. How come Russia has not taken any refugees or Iran or any country in the Middle East? They already know. Now the challenge for the West is to have aggressive leadership by the United States, not until 2017 will that be realized or will it?

The KGB/FSB has an agenda, it is well underway…..As you read below, submit your thoughts.

NewAmerican: On December 6, 2015, in a televised interview with the Ukrainian news program ТСН Тиждень (TSN Tyzhden, Ukrainian for TSN Weekly), a former FSB officer admitted that Russia is behind ISIS while ostensibly opposing it.

Former FSB officer codenamed “Yevgeniy” (shown, back toward camera) revealed that Russia’s FSB security services was, at the very least, complicit in the Paris attacks carried out by ISIS, and most shockingly that the FSB was involved in the creation of ISIS, which it influences through its agents who staff it as well as other related Islamic terrorist organizations.

The FSB, which stands for Federal Security Service in Russian, was organized in 1995 as the successor to the Soviet KGB. After the KGB was officially dissolved in 1991, it was briefly renamed the AFB (Agency for Federal Security), which was reorganized that same year as the MB (Ministry of Security). In 1993, the MB became the FSK (Federal Counter-Intelligence Service), which was again reorganized into its present form and name as the FSB on April 12, 1995.

Yevgeniy reportedly specialized in both terrorist organizations and counter-terrorism activities within the FSB. Defecting for personal reasons rather than ideological, Yevgeniy told TSN’s Andriy Tsaplienko that among the vast number of refugees entering Europe were certain Russian operatives whose task it was to infiltrate the Muslim communities. Financed by the FSB, these undercover Muslim operatives would rise to prominence within their respective communities, in turn providing the Kremlin with valuable intelligence of Muslim activates in Europe and allowing Moscow to exert influence over the communities. More here.

****   Russia's Hidden Influence Agents Within ISIS (Pt. 1)

WikiLeaks Forum:
Part one of this series looked at the historical manipulation of Islamists by Russian security services. Jihadists were armed and trained to fight by the FSB and GRU in places like Georgia and Nargono-Karabakh. Domestically, jihadists were infiltrated by the FSB into nationalist separatist movements in Dagestan and Chechnya, effectively painting those movements as religious radicals rather than freedom fighters battling an oppressive regime in Moscow.
Related Posts

Part two looked at a few specific examples of Chechen and Georgian jihadists who are probably witting or unwitting FSB assets, and how they have become power players within ISIS. The reasons for this are twofold and represent a re-creation of the same strategy used in Chechnya. Chechen jihadists helped to re-contextualize the Syrian rebels, Islamizing them in the world’s eyes. By doing this, they also acted as a spoiler force, preventing the CIA from being able to train and arm many Syrian rebels because of the presence of so many jihadi groups, a draw for many of the moderates in the region.
This article will take a look at ISIS propaganda, or what the world’s intelligence services would call information operations or psychological operations, and ask the question as to whether there is a hidden hand behind these propaganda videos.

Wahhabywood

The allure that ISIS holds for young jihadis and the fear they inspire in the rest of the world stems not from the actual combat prowess of the organization, but from its image. That image is carefully crafted, and much has been written about the high production values of the propaganda ISIS puts out. Their videos display dehumanized Islamic warriors in black masks, fully devoted to the cause of creating an Islamic caliphate. They never sleep, they never tire, they will conquer the entire world, bathing it in the blood of infidels and installing some kind of Muslim mojo hocus pocus 7th-century sharia law, or so we are told.

ISIS represents the darkest nightmares the Western world has about the Middle East, Arabs, and Muslims. The Islamic State represents a temporally displaced land of barbarians that has no place in the modern world. These nightmares are carefully cultivated by ISIS in slick propaganda films that show a deep awareness of liberal Western cultural values; the images and actions in these films are often specifically targeting Western audiences. ISIS’s reputation in the Middle East, much of it gained by way of their propaganda, is so profound, this author has been told that when an ISIS convoy rolls up to a village, all they need to do is blink their headlights and the locals will completely abandon their homes without a fight.

Their propaganda is good. Maybe too good.

ISIS propaganda targets Western liberal sensitivities in a very deliberate manner. There are many ways they do this, but four stand out quite clearly.

1. Mass executions, especially of Christians.
ISIS thrives on the blood bath of mass executions. No one is spared. Shia Muslims, children, ordinary civilians, so-called infidels and apostates, suspected traitors, Kurds, it hardly matters to ISIS. They are also known to carry out summary beheadings when they arrive in a village of the first person they can get their hands on just to prove that they are now in charge. However, it is the deliberate mass murder of Christians in Syria, Iraq, and Libya that is clearly designed to antagonize Western populations.

2. Sexual slavery
Openly flaunting sexual slavery is another propaganda point for ISIS, one that intentionally provokes Western values, but arguably human values across the world. Murder is one thing, but holding slave auctions in Mosul and selling off 13-year-old Yezidi girls or handing them out as gifts to ISIS fighters is particularly vile. ISIS is quite proud of this and brags about it in videos and public statements; their brand of sharia law also openly endorses it. This savage behavior deliberately provokes Westerners sensitive to gender issues.

3. Destruction of antiquities
The truth is that many Americans could care less about what happens in the Middle East. Arabs have been killing each other for hundreds of years and will continue to do so unabated. But even some of the most jaded people in the West get outraged at the destruction of antiquities. Following in the footsteps of the Taliban, who destroyed ancient Buddha statues, ISIS knows that their destruction of ancient Roman and Assyrian artifacts and structure will invite the ire of the world.

4. Targeting homosexuals
ISIS beheads and murders people at whim, but full-page spreads of professionally done photographs capturing ISIS tossing homosexual men from rooftops is something else entirely. Gay rights is an important issue in the West, and ISIS not only murders gays but makes sure that the entire world knows about it by recording these executions.
It is important to remember that none of these propaganda videos or pictures are released without permission from ISIS. We see what ISIS wants us to see. I am not cherry-picking the worst behavior of ISIS to present to our readers, I’m simply pointing out the images they want foremost in our minds. ISIS is baiting the Western world. Their end goal is also stated in the open: They want a coalition of Western nations to attack them.

Reflexive control

Reflexive control is a theory of psychological warfare designed to control enemy perceptions and has been studied and developed by Russian intelligence services for over 40 years. “Reflexive control is defined as a means of conveying to a partner or an opponent specially prepared information to incline him to voluntarily make the predetermined decision desired by the initiator of the action,” writes Timothy Thomas. Reflexive control involves studying the opposition’s decision-making process, then introducing socially, strategically, or politically loaded information into that process in order to influence it in a direction favorable to your objectives.

Russian defense analysts perceive America’s 1980s “Star Wars” or SDI program as a perfect example of reflexive control. According to the Russians, America knew that the USSR would respond to match horizontal and vertical proliferation of weapons, as well as the countermeasures to stop them. Therefore, America instituted the Star Wars program to trick the Soviet Union into investing in novel new weapons programs it could not afford, which then led to the crash of the Soviet economy. By doing this, we “compelled the enemy to act according to a plan favorable to the U.S.” (Thomas, 239).

By definition, reflexive control occurs when the controlling organ conveys (to the objective system) motives and reasons that cause it to reach the desired decision, the nature of which is maintained in strict secrecy. The decision itself must be made independently. A “reflex” itself involves the specific process of imitating the enemy’s reasoning or imitating the enemy’s possible behavior and causes him to make a decision unfavorable to himself (Thomas, 241).

In other words, once you understand how the enemy thinks, you then feed him information you know will cause him to reach an independent decision favoring your own strategy. In essence, you are using deception to trick the enemy, hoping that they will blunder into something that they wouldn’t attempt if they knew that they were being presented with loaded, and potentially false, information. While we are focused on Russian stratagems here, it may also be useful to reflect back of the deception tactics used by China as well, many of them derived from the period of the Warring States.

ISIS feeds the West loaded information

There is no proof that Russian intelligence has a hand in ISIS information/propaganda operations. However, considering what we have discussed thus far, this scenario should be taken seriously. ISIS is actively gaming the psychological makeup of Western audiences in order to provoke the United States and allied nations into a full-blown military confrontation with the Islamic State in Syria and Iraq. If the hypothesis about Russian influence agents in ISIS is correct, and if they are participating in ISIS propaganda efforts, then we should ask why Russia would be interested in doing this to begin with.

The answer is fairly straightforward. Keeping America bogged down and preoccupied in the Middle East is of massive benefit to the Russian Federation. By goading America into another war in the Middle East, Russia has more opportunity to engage in military aggression in Ukraine, Dagestan, Chechnya, Georgia, Moldova, Akbazia, Nagorno-Karabakh, Uzbekistan, Tajikistan, Turkmenistan, and on and on throughout Russia’s near abroad. For sure, there would also be some more specific tactical and strategic goals, but in the general sense, the Gulf War III would help keep America off Russia’s back.

ISIS, and perhaps Russian intelligence, understands America’s future rationalizations for war very well. In the past we could justify war as being battles against communism or fascism for the preservation of the American way of life. Before that, more jingoistic narratives about manifest destiny were brought into play. But these justifications for war, racial or nationalistic, will have no place in future liberal Western nations. Instead wars will be justified as fights for gay rights, women’s rights, and other equality issues. One hypothetical example: Americans will be told that we have to invade Iran because gays are stoned to death or beheaded by the Iranian regime.

The Islamic State knows that there is no better way to terrify and incite Americans than to use mass executions, the murder of Christians, the use of sex slaves, the destruction of ancient relics, and the killing of homosexuals. ISIS is at war with Western consciousness, and it is a very deliberate effort.

Basically, we see Daesh, we see the Islamic State — especially in the West — we see it from the surface, which is the mix of their propaganda; their version of what they really do. You see the pictures of actual killings, slaughtering, beheadings, blowing up things, mixed with their propaganda, or mixed with the things which are not true. They are controlling whatever comes out of their area. For example, if you take the pictures and the images we have of the Islamic State, 99% are approved by their PR department. They give us pictures of all these lined-up Humvees, guys with guns, perfect afternoon light set in the desert. They have accepted the presence of a few photographers who are in the area, from AFP, Reuters, AP; the big agencies, no matter if they would be considered Zionists, masons, imperialists, infidel agencies — they are in their area and they had to swear allegiance and in most cases the office is directly controlling all the images before they are permitted to submit them or it’s made clear to them. They sort of tell them, ‘if you do something wrong which harms our reputation, you know what will happen to you. We know you; we will find you.’ So the images that are transferred through the agencies, all the big agencies, are images that have been approved by Daesh. And Daesh invites the photographers to their events.—Christoph Reuters

None of this proves that this effort is being led, sponsored by, or covertly influenced by Russian intelligence assets. ISIS seems quite capable of hiring contractors with technical expertise, from oil industry engineers to computer hackers. Also, it is not as hard to make professional-looking films as it was 10 or 20 years ago. A kid with a decent digital camera and a laptop with film-editing software can do a pretty good job at filmmaking. Perhaps ISIS has developed all of this methodology on their own, but I am far from the first person to be surprised by ISIS’s slick Madison Avenue-worthy propaganda.

There are far more questions than answers here. For example, what about the Baath party leadership cells that actually run ISIS? These old dogs are not suicidal by any means and are actually quite cunning. A coalition of Western states spearheading a third Gulf War seems like it would be counterproductive to their goals. Yet, it would be impossible to believe that a few influence agents within ISIS have completely hijacked their propaganda efforts away from the Baathists. Maybe they are getting something in return? One can only speculate. While the first two parts of this article give some solid evidence for the reader to ponder, part three is an extrapolation on the first two articles. We don’t know if Russian intelligence has a hand in ISIS propaganda.