The Plot to Kill Saudi Ambassador and the Border Patrol Helicopter

In 2011, intelligence officials uncovered a plot to kill the Saudi Ambassador during his trip to the United States. He was to be blown up while he dined in a Washington DC restaurant.

Not come more was in the media after the initial news item on it. Years later, it is time to take another look due to a helicopter that was operated by Customs and Border patrol in Laredo, Texas that was shot at by ground fire and had to make an emergency landing.

This post brings home two points. 1) Iran is a mortal enemy of Saudi Arabia and does attempt to kill anywhere in the world. 2) The Iranian killing force al Quds has fully integrated with a drug cartel, Los Zetas that operates inside our southern neighbor, Mexico and had free access in the United States.

Neither terror group are on any U.S. terror list…let that sink in…

FreeBeacon in part:

The helicopter, part of USCBP’s Office of Air and Marine, was struck by gunfire on its side and on the rotor blade. The pilot was forced to make an emergency landing.

The law enforcement officers on the helicopter spotted the traffickers along the river during a routine flight around 5:00 P.M. local time June 5.

“The pilot was able to make a safe landing; there were no injuries,” said USCBP spokesman Daniel Hetlage, adding that U.S. and Mexican authorities are continuing to investigate. He declined to elaborate.

“I understand that they were chasing some people with bundles of marijuana,” Webb County Sheriff Martin Cuellar told the Laredo Morning Times. “People are getting desperate and crossing narcotics across the border.”

The helicopter that took fire was an EC-120, a medium-range turbine engine-powered aircraft.

A U.S. official said the helicopter attack was unusual but not unprecedented. The incident was not widely reported at the time and highlights the increasing danger of porous U.S. borders and widespread drug trafficking that takes place across them, the official said.

U.S. border security problems are expected to be a major topic of debate during the presidential election campaign.

The area near Laredo is a major transit route for Zetas drug runners.

Joel Vargas, head of intelligence for the international association InterPort Police, said the recent escape of Mexican drug kingpin El Chapo Guzman will re-energize drug cartel cells in Mexico that are battling the major Sinaloa drug cartel.

“The partnership between the Gulf Cartel and Los Zetas, even with their own internal fighting going on, makes the border town of Laredo, Texas, a powder keg,” Vargas said. “El Chapo will re-attempt to take back not only Laredo, Texas, but also consolidate control of El Paso, Texas.”

A month after the U.S. helicopter was forced down by gunfire, Mexican authorities killed six drug runners near Mexico’s Nuevo Laredo, across the border from Laredo, Texas.

The six suspects had fired on a Mexican Blackhawk helicopter, hitting it several times.

The Mexican helicopter incident July 6 involved an armed convoy of suspected Zetas drug cartel members.

According to U.S. officials, the Zetas are a well-armed organization. Authorities in Guatemala have captured M-16 and AK-47 rifles and grenades from Zetas operating in that country.

The Zetas also make extensive use of social media. The group has posted photos of beheadings it has carried out against members of rival drug gangs. It has also claimed responsibility for killing several bloggers who they say had exposed some of the group’s members.

The Zetas were implicated in an Iranian plot in 2011 to kill the Saudi ambassador to the United States, Adel al-Jubeir.

Iran’s Islamic Revolutionary Guards Quds Force, a paramilitary and covert action force, attempted to recruit Zetas members to conduct attacks against the United States.

The Quds force also has been seeking to collaborate with Zetas in setting up transit routes that will be used to smuggle Afghan heroin into the country.

As a result of the 2011 plot, the Obama administration placed Quds Force commander Gen. Qasem Soleimani, on the list of designated terrorists.

The Iran nuclear agreement reached in Vienna earlier this included Soleimani on a list of Iranians who would have sanctions against them lifted in the future.

***

From TWS in part:

The revelation that the Iranian Revolutionary Guards Corps and its Quds Force had plotted to kill Saudi Arabia’s ambassador to the United States – by blowing him up as he dined at a Washington restaurant – is a stark reminder of the nature of the Tehran regime and its ambitions. But perhaps the most disturbing aspect of the story is that Iran’s thugs are developing a strategic partnership with Mexico’s most violent thugs: Los Zetas may only be the second-largest drug cartel in the Drug Enforcement Administration’s rankings, but they’re probably the most lethal. The gang is said to have formed around a platoon’s worth of deserters from Mexico’s special operations forces, and became the elite troops of another Mexican drug organization, the Gulf Cartel. The leader of that cartel got himself arrested, and the Zetas moved out on their own.


The Zetas have shot their way to prominence ever since, in turf wars with other gangs and in a number of spectacular massacres. This past August, the Zetas conducted a mounted raid on the Casino Royale – yes, the Casino Royale – in Monterrey in Nuevo Leon. After gunning down a few gamblers and guards at the entrance, they then doused the premises with gasoline and set the entrance ablaze. New reports indicate that more than 60 were killed, and another 35 trapped inside the building. The purpose of the attack appears to be simple retaliation for the Calderon government’s crackdown on the cartels, to demonstrate vividly that Mexican security forces – 3,000 were sent to restore order in Monterey – could not control what amounts to an insurgent group. The attack was mostly an act of political symbolism.


The alliance with the Zetas is only the tip of the Iranian iceberg in Latin America. As Roger Noriega and Jose Cardenas have recently written, “Iran has made the Western Hemisphere a priority….The real game changer has been the alliance developed between Iran’s Mahmoud Ahmedinejad and Venezuela’s Hugo Chavez.” In addition to the Quds Force, Iran often operates through Hezbollah, which has established networks in the Lebanese communities that have long-standing enclaves in the trading and port cities of South America. In addition to Chavez, Iran has established closer ties to the Bolivian government of Evo Morales’s and Rafael Correa’s regime in Ecuador.

No one has tracked the increasing strategic cooperation between Iran, other anti-America states, international criminal, and narco-gangs than Douglas Farah of the International Assessment and Strategy Center. Recently, he testified to the House Homeland Security Committee that:

We see the further empowerment, training and technological support [to] the oppressive security apparatuses in the increasingly undemocratic Bolivarian states provided by the Iran-Hezbollah-IRGC/Quds Force combine….[They] are the sharpest edge of the sword at present, and the one most openly aimed at the United States, and the one least tractable to diplomacy.  More details are here.

White House Signed a National Security Waiver for Iran Deal

On August 14, 2012, Barack Obama signed H.R. 1905 into law the’ Iran Threat Reduction and Syrian Human Rights Act of 2012′.

The he signed a National Security Waiver for the sake of the escalating talks with Iran seeking a deal defined early as the JPOA, the Joint Plan of Action. Sanctions of several key factors were lifted by his waiver signature.

While we cannot determine the date of the waiver, it was noted by Senator Marco Rubio in 2015, directly after the State of the Union address and picked up by CNN:

Republican presidential candidates have said they’d undo President Barack Obama’s Iran deal.

Florida Sen. Marco Rubio said Sunday on “State of the Union” that he’d revoke the national security waiver under which Obama is implementing the deal, effectively re-instituting U.S. sanctions against Iran.

“We will not use the national security waiver to hold back U.S. sanctions against Iran — especially not as a result of this flawed deal that he is pursuing,” Rubio said.

 

Due to the president having extraordinary authority, he took full advantage as noted below:

Revises Presidential Waiver Authority. The Act preserves the President’s general authority to waive sanctions against non-U.S. persons.  However, the Act revises and raises the standard under which the President may exercise the general waiver authority. First, energy-related sanctions can only be waived if the waiver is “essential to the national security interests of the United States.” Second, weapons of mass destruction (WMD)-related sanctions can only be waived if the waiver is “vital to the national security interests of the United States.” Furthermore, the President’s “permanent” waiver authority is removed and replaced with a one-year renewable waiver authority.

The full summary of the Act, the sanctions and details are found here.

The White House soon went into full pro Iran deal mode using the White House website to push the soon to be successful results of the work he deployed John Kerry along with the P5+1 team to accomplish.

Under the framework for an Iran nuclear deal Iran's uranium enrichment pathway to a weapon will be shut down

What Iran’s Nuclear Program Would Look Like Without This Deal

As it stands today, Iran has a large stockpile of enriched uranium and nearly 20,000 centrifuges, enough to create 8 to 10 bombs. If Iran decided to rush to make a bomb without the deal in place, it would take them 2 to 3 months until they had enough weapon-ready uranium (or highly enriched uranium) to build their first nuclear weapon. Left unchecked, that stockpile and that number of centrifuges would grow exponentially, practically guaranteeing that Iran could create a bomb—and create one quickly – if it so chose.
This deal removes the key elements needed to create a bomb and prolongs Iran’s breakout time from 2-3 months to 1 year or more if Iran broke its commitments. Importantly, Iran won’t garner any new sanctions relief until the IAEA confirms that Iran has followed through with its end of the deal. And should Iran violate any aspect of this deal, the U.N., U.S., and E.U. can snap the sanctions that have crippled Iran’s economy back into place.
Here’s what Iran has committed to:

Under the framework for an Iran nuclear deal Iran's uranium enrichment pathway to a weapon will be shut down

Heck, check the White House website and read the rest of the mess.

There are so many details and caveats omitted that even the House of Representatives has begun listing them.

Speaker of the House, John Boehner’s office has been watching the new twitter handle established by the White House to address head on all the misconceptions of the Iran deal.

@TheIranDeal is throwing out some real whoppers
July 24, 2015|Cory Fritz
The White House launched a new Twitter handle this week to help sell President Obama’s proposed nuclear deal with Iran.  So far its effort to “set the record straight” is offering nothing more than baseless claims:

CLAIM: “Thanks to the #IranDeal, Iran has agreed to provide the IAEA with the information necessary to address PMD.”

FACTS:  Iran has consistently delayed, obstructed and denied inspectors access to key information, and the proposed nuclear agreement will not compel Iran to come clean about its past activities.

“Tehran should already have made a full declaration under its obligations that predated the [July 14] accord, but the IAEA has found that Iran repeatedly failed to do so… Now the new agreement calls again on Iran to cooperate, but it offers no reason to believe that the Iranian regime will end its recalcitrance,” William Tobey, a former deputy administrator for defense nuclear nonproliferation at the National Nuclear Security administration wrote in the Wall Street Journal. More from the Speaker’s office on the Iran deal is here.

 

Hillary’s Team Denies Classified Emails

As the probe continues on Hillary Clinton’s email history and her private server, one must question how a Secretary of State in four years never electronically interacted in classified communications.

If this is accurate when it comes to her private email server, then where did classified communications occur?

Hillary was a lawyer and so is Jeh Johnson, the Secretary of the Department of Homeland Security and he too used a private email for official business and did the former Secretary of the Environmental Protection Agency, Lisa Jackson, who also created an alias.

Clearly there is a real pattern in the Obama administration where abuse and waivers are the culture of corruption and obstruction of procedures and law. Imagine how many others use non official communications systems.

Criminal Inquiry Is Sought in Clinton Email Account

NYT’s

WASHINGTON — Two inspectors general have asked the Justice Department to open a criminal investigation into whether sensitive government information was mishandled in connection with the personal email account Hillary Rodham Clinton used as secretary of state, senior government officials said Thursday.

The request follows an assessment in a June 29 memo by the inspectors general for the State Department and the intelligence agencies that Mrs. Clinton’s private account contained “hundreds of potentially classified emails.” The memo was written to Patrick F. Kennedy, the under secretary of state for management.

It is not clear if any of the information in the emails was marked as classified by the State Department when Mrs. Clinton sent or received them.

But since her use of a private email account for official State Department business was revealed in March, she has repeatedly said that she had no classified information on the account.

The Justice Department has not decided if it will open an investigation, senior officials said. A spokesman for Mrs. Clinton’s campaign declined to comment.

At issue are thousands of pages of State Department emails from Mrs. Clinton’s private account. Mrs. Clinton has said she used the account because it was more convenient, but it also shielded her correspondence from congressional and Freedom of Information Act requests.

She faced sharp criticism after her use of the account became public, and subsequently said she would ask the State Department to release her emails.

The department is now reviewing some 55,000 pages of emails. A first batch of 3,000 pages was made public on June 30.

In the course of the email review, State Department officials determined that some information in the messages should be retroactively classified. In the 3,000 pages that were released, for example, portions of two dozen emails were redacted because they were upgraded to “classified status.” But none of those were marked as classified at the time Mrs. Clinton handled them.

In a second memo to Mr. Kennedy, sent on July 17, the inspectors general said that at least one email made public by the State Department contained classified information. The inspectors general did not identify the email or reveal its substance.

The memos were provided to The New York Times by a senior government official.

The inspectors general also criticized the State Department for its handling of sensitive information, particularly its reliance on retired senior Foreign Service officers to decide if information should be classified, and for not consulting with the intelligence agencies about its determinations.

In March, Mrs. Clinton insisted that she was careful in her handling of information on her private account. “I did not email any classified material to anyone on my email,” she said. “There is no classified material. So I’m certainly well aware of the classification requirements and did not send classified material.”

In May, the F.B.I. asked the State Department to classify a section of Mrs. Clinton’s emails that related to suspects who may have been arrested in connection with the 2012 attacks in Benghazi, Libya. The information was not classified at the time Mrs. Clinton received it.

The revelations about how Mrs. Clinton handled her email have been an embarrassment for the State Department, which has been repeatedly criticized over its handling of documents related to Mrs. Clinton and her advisers.

On Monday, a federal judge sharply questioned State Department lawyers at a hearing in Washington about why they had not responded to Freedom of Information Act requests from The Associated Press, some of which were four years old.

“I want to find out what’s been going on over there — I should say, what’s not been going on over there,” said Judge Richard J. Leon of United States District Court, according to a transcript obtained by Politico. The judge said that “for reasons known only to itself,” the State Department “has been, to say the least, recalcitrant in responding.”

Two days later, lawmakers on the Republican-led House committee investigating the Benghazi attacks said they planned to summon Secretary of State John Kerry’s chief of staff to Capitol Hill to answer questions about why the department has not produced documents that the panel subpoenaed. That hearing is set for next Wednesday.

“The State Department has used every excuse to avoid complying with fundamental requests for documents,” said the chairman of the House committee, Representative Trey Gowdy, Republican of South Carolina.

Mr. Gowdy said that while the committee has used an array of measures to try to get the State Department to hand over documents, the results have been the same. “Our committee is not in possession of all documents needed to do the work assigned to us,” he said.

The State Department has sought to delay the hearing, citing continuing efforts to brief members of Congress on the details of the nuclear accord with Iran. It is not clear why the State Department has struggled with the classification issues and document production. Republicans have said the department is trying to use those processes to protect Mrs. Clinton.

State Department officials say they simply do not have the resources or infrastructure to properly comply with all the requests. Since March, requests for documents have significantly increased.

Some State Department officials said they believe that many senior officials did not initially take the House committee seriously, which slowed document production and created an appearance of stonewalling.

State Department officials also said that Mr. Kerry is concerned about the toll the criticism has had on the department and has urged his deputies to comply with the requests quickly.

What the Hell is the Army Thinking? Bergdahl Picked up at Pot Farm

OMG, this man, a deserter got a pass from the Army to go to Mendocino County, California and well there was a raid. Then the Army, yes the Army sent a plane to go get him. WHAT???

US Army confirms to @FoxNews that Bowe Bergdahl was up in Mendocino County at Pot Farm, released back to his command at Fort Sam Houston. 8:10 PM, EST July 23, 2015

Fresh details here.

From NBC, Bay Area:

Bowe Bergdahl — the once-missing U.S. soldier in Afghanistan who was accused of desertion — was spotted hanging out at a Mendocino County marijuana farm during a raid.
According to the The Anderson Valley Advertiser, Bergdahl was an “unexpected visitor” in Mendocino County, where he was visiting old friends when the “local dope team arrived on a marijuana raid.”
Bergdahl arrived Friday at the farm, which is located in a remote part of Redwood Valley.
Bergdahl, who is awaiting military court martial, had an Army pass allowing him to be in Mendocino County, the Advertiser reported, adding he was “not connected to the dope grow in any way.”
The Mendocino Sheriff Department confirmed the report to NBC Bay Area, stressing Bergdahl was not arrested during the raid.
However, the Advertiser reported that military officials were notified and, after “calls all the way up to the Pentagon,” Bergdahl was escorted by military personnel sent to Ukiah. The sheriff told the Advertiser that Bergdahl was “above politeness” and even produced his military ID when people from the house he was visiting were being arrested.
The Sheriff’s Department was able to confirm that Bergdahl was on authorized leave to visit his friends and was not involved with the production of marijuana.
At the request of the Pentagon, Bergdahl was transported to Santa Rosa by the sheriff’s department. An Army major was expected to take him to his duty station near Washington.

As a side note, when Bergdahl as picked up from the Haqqani network, he was stoned then as well.

Secret Service On the Anti-Govt Crowd on the Internet

The Secret Agents Who Stake Out the Ugliest Corners of the Internet

From the Atlantic:

 

A team tasked with protecting the president of the United States is constantly sifting through hateful online comments to find would-be assassins or terrorists.

When President Obama launched his Twitter account in May, people noticed his rapid accumulation of followers, a silly back-and-forth with President Clinton, but also something more serious: the number of hostile and threatening messages directed at the president.

Sifting through those messages to determine which, if any, need to be taken seriously is the responsibility of the Secret Service Internet Threat Desk, a group of agents tasked with identifying and assessing online threats to the president and his family. The first part of this mission—finding threats—is in many ways made easier by the Internet: all you have to do is search! Pulling up every tweet which uses the words “Obama” and “assassinate” takes mere seconds, and the Secret Service has tried to make it easier for people to draw threats to its attention by setting up its own Twitter handle, @secretservice, for users to report threatening messages to.

But if the Internet makes it easier to find threats directed at the president, it can also make it harder to figure out which ones should be taken seriously. The sheer volume of threatening messages online, the lack of context, and the ease with which users can shield their identities all contribute to the challenges of assessing online threats. One series of tweets addressed to @POTUS that caught the Secret Service’s attention—at least enough to warrant an in-person visit from an agent—came from a user with the handle @jeffgully49 and included a picture showing a doctored version of the president’s campaign posters with his head in a noose and the word “HOPE” changed to “ROPE.” The messages were apparently posted by Jeff Gullickson of Plymouth, Minnesota, who was later visited at his home by a Secret Service agent. “The agent from the secret service was cordial,” Gullickson wrote in an email to MPR News, adding that the agent just wanted to be sure his tweets were not serious threats.

Making sure that Gullickson was not a threat required more than just an analysis of his online comments—it called for offline contact, an in-person visit, an assessment of who he was and what he was like face-to-face, not just on the Internet. Context is crucial for evaluating the seriousness of threats—both digital and analog—but online threats offer a slightly different set of contextual clues than their offline counterparts. And while much of the hate-filled commentary on the Internet is routinely written off as hyperbole and ranting, threats directed at the president are not so easily dismissed. So, every day, the Secret Service Internet Threat Desk is faced with the unenviable task of taking seriously some of the most extreme online rhetoric and trying to identify potential assassins or terrorists in the deluge of venomous messages directed at the president and his family.

Though most of the public cases involving the Internet threat desk have to do with threats made via Twitter or Facebook, the desk actually predates both platforms. Founded in 2000, the desk was reportedly expanded in 2009 around the same time that threats against President Obama spiked in the early months of his first term. Ronald Kessler, author of In the President’s Secret Service, said that when he visited the Internet threat desk several years ago it was “just a small room with a few people,” but added, “I’m sure it’s much bigger now.” Secret Service spokesman Robert Hoback declined to comment.

Since the Internet threat desk’s founding, Kessler said, more of the threats the Secret Service assesses have originated online, but the overall number of threats directed at the first family that require investigation has stayed relatively steady at about 10 per day—except for the period when Obama was first elected, when the Secret Service had to follow up on roughly 50 threats per day. “That includes threats on Twitter,” Kessler said. “It makes no difference to [the Secret Service] how a threat is communicated,” he added. “They can’t take that chance of assuming that because it’s on Twitter it’s less serious.”

The Secret Service categorizes all threats, online and offline alike, into one of three categories, according to Kessler. Class 3 threats are considered the most serious, and require agents to interview the individual who issued the threat and any acquaintances to determine whether that person really has the capability to carry out the threat. Class 2 threats are considered to be serious but issued by people incapable of actually follow up on their intentions, either because they are in jail or located at a great distance from the president. And Class 1 threats are those that may seem serious at first, but are determined not to be.

Classifying threats into these categories is partly a matter of wording and specificity—whether the speaker has developed a detailed plan, whether they state that they will kill the president or just that someone should kill the president—but also depends largely on the background of the people who issue them. “The Secret Service looks at whether this person has expressed similar plans previously, whether this person has a criminal record, or is mentally ill,” Kessler said. Presumably, that’s why an agent showed up at Gullickson’s house—to assess the person who issued the Twitter threat, not just the threat itself.

At a 2011 hearing before the House Subcommittee on Counterterrorism and Intelligence, then-Secret Service Director Mark Sullivan emphasized the importance of identifying the people who threaten the president for Secret Service investigations. “When I was a new agent, a lot of times if you got a threat, it would come in the mail, and if the person who was making the threat was very courteous, they would put their return address on there. You would know who to go out and talk to,” Sullivan said. “But regardless of whether it is by mail or over the internet, our people are extremely aggressive with [figuring out who issued threats] … when we do identify that individual who has made that threat or that inappropriate interest that they are displaying, whether it is 2 o’clock in the morning or 2 o’clock in the afternoon, our people are out there looking for that individual to interview them.”

But the Secret Service can’t very well interview everyone who directs hostile comments at the president online—there are just too many of them—especially as the government’s embrace of social media platforms creates an increasing number of channels for lashing out at the president. “What you’ve done with the POTUS Twitter account is created a one-stop shopping for people who don’t like the president to blow off steam and convey their view that they don’t like the president,” said University of Maryland law professor Danielle Citron. “That could perfectly well be political protest: ‘I hate you and I want to throw you in the river’ could mean ‘I hate your ideas and want to throw them in the river,’ or it could mean ‘I’m a neo-Nazi and I want to kill you because you’re a black president.’ For the president, [the Secret Service] is going to err on the side of over-inclusion and more false positives.”

Paring down those false positives may be even more of a challenge online than off. The Internet threat desk “comb[s] the internet” and has people “working 24 hours a day just going through the Internet looking for any type of buzzwords or any type of threatening or inappropriate activity out there that we may see that involves any of our protectees,” Sullivan said at the 2011 hearing.

In other words, the Secret Service is actively seeking out threats made online, rather than waiting for others to report them, or for the people issuing threats to contact the White House directly. “Online threats are much more findable—I can set up some structured queries and find out who’s making threats in real time,” said Andy Sellars, a fellow at Harvard’s Berkman Center for Internet & Society. “You can essentially have a column on TweetDeck for every time someone says ‘president’ and ‘kill’ in the same tweet. A lot of tools being sold to law enforcement are basically just glorified versions of TweetDeck.”

Finding the threats is the easy part, though. “It’s a lot easier to figure out the context of speech in the physical world than in the online world,” said Hanni Fakhoury, a senior staff attorney at the Electronic Frontier Foundation. “You need that context in order to see what that speech really means.”

The cases that the Secret Service has pursued in recent years offer some clues as to which types of threats they seem to take most seriously. Repeat offenders, unsurprisingly, seem to come in for particular attention. For instance, Jarvis Britton of Birmingham, Alabama, was arrested and sentenced to a year in prison in 2013 after posting a series of tweets over the course of several months. In a 2012 affidavit, Secret Service Special Agent Phillip Holly described the series of events that led up to Britton’s arrest, beginning with two tweets on June 28, 2012, that read: “Free speech? Really? Let’s test this! Let’s kill the president!” and “I’m going to finish this, if they get me, they get me! #ohwell. I think we could get the president with cyanide. #MakeItSlow.” The next day, Britton tweeted “Barack Obama, I wish you were DEAD!”

Following the June tweets, the Secret Service spoke with Britton and advised him of “the seriousness of the matter,” according to Holly, but “no further action was taken” until Britton resumed tweeting threats several months later. On September 14, 2012, he posted the message “Let’s kill the president. F.E.A.R.” After learning of the September threats from the Internet Threat Desk, Holly concludes: “Based upon the foregoing, I have probable cause to believe that Jarvis M. Britton did knowingly and willfully threaten to take the life of, kidnap, or inflict bodily harm upon the President of the United States.”

Donte Jamar Sims of Charlotte, North Carolina, was also sentenced in 2013 to serve jail time for a series of threatening tweets directed at the president. Sims’ tweets, posted during the 2012 Democratic National Convention, included the messages: “Ima Assassinate president Obama this evening!” and “The Secret Service is gonna be defenseless once I aim the Assault Rifle at Barack’s Forehead.”

The Internet Threat Desk’s investigations are not limited to Twitter. One 2012 investigation centered on a Facebook photo of several young men from Arizona posing with guns and a T-shirt with the president’s face on it riddled with bullet holes. A 2008 case focused on a series of pseudonymous comments made by the user californiaradial on the Yahoo Finance website, including “Shoot the nig. Country fkd for another 4 years+, what nig has done ANYTHING right???? Long term???? Never in history, except sambos.” And “Fk the niggar, he will have a 50 cal in the head soon.” In court documents, Special Agent Gregory Becker identified californiaradial as Walter Edward Bagdasarian after the Internet Threat Desk “obtained the IP address from which the messages had been sent, as well as the subscriber information for that account.”

When people who issue online threats are identified, they sometimes try to provide context for those threats that might excuse their behavior. Sims, for instance, claimed he was high on marijuana when he threatened the president. Britton’s lawyer similarly insisted his client had no intentions to actually harm the president. Other times, the real world context of online threats makes them seems more concerning—when the Secret Service searched Bagdasarian’s house, they found a .50 caliber rifle among his possessions, which appeared to lend credence to the prediction “he will have a 50 cal in the head soon.”

Ultimately, however, it is the content of the threat itself—not the context—that seems to matter most in court. Sims, Britton, and Bagdasarian all allegedly issued multiple violent threats at the president in online forums. But Sims and Britton were sent to jail, regardless of the claims both made about their respective mental states when they issued the threats—while Bagdasarian’s conviction was ultimately reversed by a federal appeals court in California because he had not specifically said that he himself would kill the president but, rather, suggested more generally that someone should do so.

Making these distinctions between the people who really intended harm—the people who, in legal language, issued threats that they should have reasonably foreseen would be interpreted as “serious expressions of intent to inflict bodily harm upon that person”—and the people who were merely venting political frustrations or indulging in some hyperbolic anger is a very murky area of law, particularly when it comes to online threats. “It is harder to separate the wheat from the chaff online,” said Fakhoury, the Electronic Frontier Foundation lawyer, of distinguishing “true threats” from speech that is protected by the First Amendment. “Part of that is the speed with which people can communicate online, part of it is that people are somewhat removed from what they say online, part of it is the breadth of the audience that exists online,” he explained.

The ease with which anyone can fire off a threat to the president’s Twitter account does not necessarily make such threats less concerning, Citron noted. “Sometimes people say online threats are never to be taken seriously because we’re behind a screen and we tend to just kind of mouth off without thinking, but on the other hand when someone writes something down then there’s the perception that its thoughtful—someone took the time to write this down,” she said.

“The anonymous part doesn’t make it less threatening, but it makes it harder for us to gauge whether it’s a joke or not.”

Many online threats are not even anonymous, Sellars pointed out. “People are making a shocking number of these threats posting on Facebook using their real names,” he said, calling to mind Sullivan’s comment about the letter writers who included their return addresses.

In a recent decision for the case Elonis v. United States, about a man accused of threatening his wife on Facebook, the Supreme Court avoided establishing any clear test for how to identify true threats online. Their decision to dodge the issue leaves not just the Secret Service but everyone who is the victim of online harassment to figure out how to draw the line between true threats and free speech on the Internet.

When it comes to protecting the president, however, that distinction may not be so vital, either online or offline. Kessler noted, “Actual assassinations are usually not preceded by threats.”