FBI Global Hackers Sweeping Sting Arrests

So many complain the FBI is slow-walking cyber and hacking operations especially when it comes to the Russian investigations. Well, the FBI rarely announces cases and prosecutions. When it comes to the recent Russian hacking scandal into the United States election and campaign infrastructure, perhaps the Department of Justice and the FBI are building a huge file for proof.

So, try this:

NBC/McClatchy

 

U.S. sweeping up Russian hackers in a broad global dragnet

BY TIM JOHNSON/WASHINGTON

McClatchy: The arrests caught the Russian hackers totally by surprise. One was at a Finnish border crossing. Another was arriving at an airport in Spain. A third was dining at a restaurant in Prague. Still others were at luxury resorts in the Maldives and Thailand.

Many have now turned up in U.S. courts. The long arm of U.S. law enforcement is spanning the globe like never before to bring criminal hackers to justice.

And it may not be just about crime. The Justice Department cites fuzzy and overlapping boundaries between criminal hackers and Russian intelligence agencies, the same ones the U.S. accuses of coordinating the hacking and subsequent disclosure of emails from the Democratic National Committee and the Hillary Clinton presidential campaign.

President Donald Trump dismisses allegations that Russia meddled in the election as “fake news,” but the FBI and congressional committees have launched probes and the Obama administration ordered the expulsion of 35 Russian diplomats in late December.

Rubio says Russian hackers targeted his presidential campaign

During a Senate committee hearing on Thursday, Florida Senator Marco Rubio stated that his 2016 presidential campaign staff members were the targets of Russian hackers in July 2016 and March 2017, but both efforts were unsuccessful.

The U.S. campaign leaves Russian hackers with a dilemma: If they leave the safe confines of Russia, which has no extradition treaty with the United States, or Russia’s most ardent allies, they may get picked up and sent to the U.S.

“They no longer travel, the high-profile hackers. They understand the danger,” said Arkady Bukh, a criminal defense lawyer in New York City who has defended numerous accused Russian cybercriminals.

Still, some Russian and Eastern European hackers do enjoy holidays abroad – and live to regret it. Just this week, Maxim Senakh, a 41-year-old Russian, pleaded guilty in a Minneapolis courtroom to operating a massive robotic network that generated tens of millions of spam emails a day in a zombie criminal enterprise that purportedly brought in millions in profits.

Senakh didn’t come voluntarily. He’d been visiting a sister in Finland before that country put him on a U.S.-bound plane in January, answering a U.S. extradition request.

“He fought it, the Russian government fought it, and the Russian government put political pressure on its neighbor, Finland,” federal prosecutor Kevin S. Ueland said at a Feb. 19 hearing.

Another Russian, Mark Vartanyan, 29, pleaded guilty March 20 to computer fraud in an Atlanta courtroom after reaching a deal with prosecutors to offer far-reaching cooperation that would limit a prison term to five years or less.

Norway extradited Vartanyan to the U.S. in December.

David Hickton, a former U.S. attorney in Pittsburgh who made the city a hub for prosecutions of foreign hackers, said such actions are a sign of the new dimensions of crime.

IT’S NO DIFFERENT THAN IF SOMEONE PULLED A TRUCK UP TO YOUR HOUSE AND STOLE VALUABLE MATERIAL. David Hickton, former federal prosecutor

“This is 21st century burglary. It’s no different than if someone pulled a truck up to your house and stole valuable material,” said Hickton, who now directs the Institute for Cyber Law, Policy and Security at the University of Pittsburgh.

But Hickton acknowledged that carrying off successful prosecutions is a challenge.

“These cyber investigations are very, very hard. You’re talking about evaporating evidence, borderless crimes and defendants who can hide behind the borders of countries that don’t have extradition treaties with us,” he said.

It is not easy to pigeonhole the accused and convicted hackers. Some are brainy but merely cogs in larger crime groups. Others flash their wealth and opulent lifestyles.

NOT ALL OF THEM ARE RICH. 

Arkady Bukh, criminal defense attorney in New York City

“Not all of them are rich,” Bukh said. “A lot of them are involved in computer intrusion and that does not bring much money.”

Bukh recalled one client, Aleksandr Panin, who was placed by authorities on a plane in the Dominican Republic to 2013 bound for Atlanta, put on trial and convicted.

“The guy couldn’t afford a car even with (having caused) a billion dollars in losses. He’s like a mad scientist geek,” Bukh said.

Then there are those on the opposite extreme, who pose for photos with piles of cash or at luxury beach resorts. One of them, Roman Seleznev, was convicted last year in Seattle on 38 counts related to cybercrime. His father is a deputy in the Russian parliament, or Duma. Prosecutors retrieved a photo from his cell phone of him standing next to a yellow Dodge Challenger muscle car in Red Square near the Kremlin.

The magnitude of damages that prosecutors have alleged can be mind-boggling.

Vartanyan, the young Russian hacker brought to Atlanta from Norway, was part of the development team that created Citadel, a “universal spyware system” sold on underground Russian criminal hacker forums that ended up lodged on 11 million infected computers around the world.

In their complaint against him, prosecutors cited industry estimates that Citadel caused “over $500 million in losses” in a three-year period.

The investigations can be incredibly complex, leading federal investigators to call in specialized cybersecurity firms to conduct forensics. In the probe of Senakh, whose guilty plea came last month, the feds turned to ESET, a cybersecurity firm with 18 offices around the world.

ESET analyzed the malicious code Senakh used, dubbed Ebury malware, and found that it had compromised 25,000 servers around the world, researcher Marc-Etienne Leveille said in an email.

Stanislav Lisov, a computer programmer from Taganrog, a town on Russia’s Black Sea coast, had arrived at Barcelona’s international airport with his wife on Jan. 13 when Spanish Civil Guard police arrested him on an FBI warrant issued through Interpol. The charges: electronic and computer fraud.

WE WERE DETAINED AT THE AIRPORT IN BARCELONA. 

Darya Lisova, wife of accused Russian hacker Stanislav Lisov

“We were detained at the airport in Barcelona, when we came to return a rented car before flying out to Lyon, to continue our trip and visit friends. When we were getting out of the car, two police officers approached, showed us the badge, and said they were detaining my husband,” Darya Lisova told the Russian state-operated RT network.

Spain has not yet extradited Lisov, who is blamed for being the architect of a sophisticated Trojan, NeverQuest, used in stealing log-in credentials for bank accounts.

Here is a rundown of some other recent cases:

Yevgeniy Nikulin, 29, was arrested by police while dining with his girlfriend in a hotel restaurant in Prague’s Old Town Oct. 5. He has been indicted by a federal grand jury in northern California on charges of computer intrusion, identity theft and other crimes for penetrating into the systems of high-tech companies LinkedIn, Dropbox and Formspring. Since then, Washington and Moscow have been in a tug-of-war over Nikulin’s extradition.

Olga Komova, a 26-year-old Uzbek, and Dmitry Ukrainsky, a Russian, were arrested in mid-2016 at beach resorts in Thailand and accused of stealing more than $28 million as part of a mega cyber bank fraud ring. Komova has turned up in U.S. custody and faces federal charges of wire fraud and money laundering. How she was brought to the United States is unclear. Her U.S. lawyer, Michael Soroka, declined to discuss the case.

When extradition isn’t an option, U.S. authorities lure alleged hackers to jurisdictions where they can be arrested. Such tactics have been decried by Moscow as “kidnapping.”

Seleznev, the identity thief who is the son of the Duma deputy, chose to vacation at a five-star resort in the Indian Ocean archipelago nation of the Maldives in 2014 precisely because it has no extradition treaty with the United States.

U.S. officials got word and persuaded Maldives authorities to intercept Seleznev at the airport, where in a fast-paced operation he was bundled on a private plane to Guam, a U.S. territory in the western Pacific, then flown to Seattle to face federal charges.

Upon his conviction last August, prosecutors said Seleznev had stolen millions of credit card numbers, causing 3,700 banks $169 million in losses. He faces a 40-year jail term.

No matter where the hackers travel, prosecutors say they will follow.

The U.S. attorney in Atlanta, John Horn, who has also made a name for himself in prosecuting Russian hackers, offered an unapologetic defense last year of the global reach of U.S. justice.

“Cybercrime is borderless, but increasingly, so too are our law enforcement capabilities,” Horn said.

Pyotr Levashov Arrested in Barcelona, Hacker

All domestic news media has been blaming the Russians for cyber election intrusion. Conservative outlets have pushed back asking for evidence. There are investigations on The Hill regarding Russian interference and the House Intelligence Committee, chaired by Devin Nunes has seen the documents and share them with the White House. The committee co-chair Adam Schiff was angry he was not read on early enough. A big political conflict has occurred and Nunes recused himself from the specific committee investigation regarding Russia as Nunes remains chairman of the committee.

Okay so what you ask?

Well we want to blame the FBI, Comey and ODNI, Clapper for not being more forthcoming on the matter. Slow down everyone, as cyber investigations are international in scope and it takes a mobilized set of experts and agencies and international collaboration to make attribution by using exceptional tools, cyber talent and agreements. So….what does all this mean? It means the lid could soon blow off this whole operation.

You see, there was malware, phishing and countless botnet systems that were part of the U.S. election interference as we saw with the DNC hack and the John Podesta emails via WikiLeaks. There are countless moving parts and they are international. It is gratifying to know however, not only is government part of the investigation, but outside cyber corporations are doing their own due diligence and offering additional clues, evidence and assistance to the FBI. How so you ask?

From Krebs on Security: Then, on Jan. 26. 2012, I ran a story featuring a trail of evidence suggesting a possible identity of “Severa (a.k.a. “Peter Severa”), another SpamIt affiliate who is widely considered the author of the Waledac botnet (and likely the Storm Worm). In that story, I included several screen shots of Severa chatting on Spamdot.biz, an extremely secretive Russian forum dedicated to those involved in the spam business. In one of the screen shots, Severa laments the arrest of Alan Ralsky, a convicted American spam kingpin who specialized in stock spam and who — according to the U.S. Justice Department – was partnered with Severa. Anti-spam activists at Spamhaus.org maintain that Peter Severa’s real name is Peter Levashov (although the evidence I gathered also turned up another name, Viktor Sergeevich Ivashov). Read more here, it is fascinating and well done.

*** No wonder attribution takes a very long time right? Yes so read on please…..

Programmer Pyotr Levashov reportedly suspected in US election hacking arrested

Madrid: A Russian computer programmer, Pyotr Levashov, has been arrested in the Spanish city of Barcelona, a spokesman for the Russian embassy in Madrid said on Sunday.

It was unclear why Levashov was arrested. The embassy spokesman declined to give details for his arrest, and Spanish police and the interior ministry were not available for comment on Sunday.

Russian television station RT reported that Levashov was arrested under a US international arrest warrant and was suspected of being involved in hacking attacks linked to alleged interference in last year’s US election.

Peter Carr, a spokesman for the US Justice Department’s criminal division, said: “The US case remains under seal, so we have no information to provide at this time.”

The criminal division is separate from the national security division, which is responsible for investigating state-sponsored cyber crimes.

A US Department of Justice official said it was a criminal matter without an apparent national security connection.

Spanish authorities notified the Russian embassy of Levashov’s arrest on Friday, the embassy spokesman said.

In January, Spanish police arrested another Russian computer programmer, whose name was given as “Lisov” and who was wanted by the United States for leading a financial fraud network.

Russia's embassy in Madrid.Russia’s embassy in Madrid. Photo: Wikimedia/Luis García (Zaqarbal)

The US government has formally accused Russia of hacking Democratic Party emails to help the campaign of Republican President Donald Trump. The US Congress is also examining links between Russia and Trump during the election campaign.

Russian officials, including President Vladimir Putin, have repeatedly denied that Russia tried to influence the election.

Reuters

Related reading: Spain arrests Russian bank-account hacker wanted by FBI

January 2017: Spain has arrested a 32-year-old Russian computer programmer at Barcelona airport who is alleged to have designed and used software to steal bank account details from banks and individuals, Spanish police said on Friday.

Working with the U.S. Federal Bureau of Investigation (FBI), the man, named Lisov, was arrested by Spanish police on Jan. 13 as he waited to take a flight to another European country. He is suspected of leading a financial fraud network, the police said in a statement.

Lisov, wanted by the United States under an international arrest warrant, had been under observation by authorities for several days in the north-eastern region of Catalonia, police said. Police did not give the man’s first name. More here.

Related reading: Russian FSB Officers Charged in Yahoo Hack and More

Tip sheet on above:

ALEXSEY BELAN

Conspiring to Commit Computer Fraud and Abuse; Accessing a Computer Without Authorization for the Purpose of Commercial Advantage and Private Financial Gain; Damaging a Computer Through the Transmission of Code and Commands; Economic Espionage; Theft of Trade Secrets; Access Device Fraud; Aggravated Identity Theft; Wire Fraud

   Seems we need to be more patient when it comes to the FBI and associated international agencies…eh?

Will Trump Grant this Request by the House Oversight Committee?

Chaffetz leads renewed call for Trump to fire IRS chief

House Oversight Committee Chairman Jason Chaffetz leads renewed call for Trump to fire IRS chiefRomney exploring 2018 Senate run: reportSecret Service strained by protection of Trump family: reportMORE (R-Utah) and nearly 40 other Republican lawmakers on Thursday called for President Trump to fire IRS Commissioner John Koskinen.

The letter, the second this week from House Republicans on the topic, argues that firing Koskinen, whose term ends in November, would be in line with Trump’s comments in his inauguration speech that it is important for the government to be controlled by the public.

“So long as the IRS commissioner is a man who has misled the people, destroyed evidence, and failed his legal duties to the people’s representatives in Congress, the IRS is not ‘controlled by the people,'” the GOP lawmakers wrote. “For that reason, we request you immediately remove Koskinen.” More here from The Hill.

*** There could be that pesky pending problem: Trump and Koskinen also have a personal relationship that goes back to the 1970s in New York City. Koskinen was involved in helping arrange the sale of the Commodore Hotel in Manhattan to Trump, a deal that helped launch Trump’s lucrative business career, according to a May 5, 1976, article in The New York Times.

Unit 450, The Syrian Chemical Weapons Program Details

 Fox News obtained photos of one of Syrian President Bashar al-Assad's close aides who oversaw the country's chemical weapons unit.

If you still think the chemical weapons attack was fake news, read on. Further, it must be stated that the Pentagon and CIA have extraordinary skills and ability to gather quality intelligence, intelligence that was gained under the Obama administration and did not stop the program but rather deferred it to Russia to handle. This was done under threat by Tehran to the Obama White House to leave Assad alone during the JPOA, the Iran nuclear talks. Obama complied.

For Secretary of State Rex Tillerson and for U.S. Ambassador Nikki Haley to lay the blame at the feet of Russia and Iran for the Assad/Syria chemical weapons program was exact and right.

Further in 2013, a Syrian army defector gave testimony to Western officials and the United Nations on the Unit 450 operations.

Bassem Al-Hassan, the head of the Syrian clandestine unit for special assignments, was appointed the position after Muhammad Suleiman, another key aide to Assad, was assassinated in his home in August 2008, Western intelligence sources told Fox News.

The close aide to Assad had been on the U.S. radar, and is one of the individuals named on the Office of Foreign Assets Control Specially Designated Nationals and Blocked Persons List (SDN). The list names individuals and companies who pose as a national security threat to the U.S.

Hassan is also considered a very close friend and contact to Qassem Soleimani, the Iranian Revolutionary Guard general, and has connections with Russian officials.

Western intelligence sources said Hassan was the head of Unit 450, Syria’s chemical weapons unit, and was responsible for any activities, including producing and ordering the weapons for the department.

Syria agreed in 2013 to destroy its stockpiles of chemical weapons as part of a deal brokered between former President Barack Obama and Russian President Vladimir Putin. A year later, then-Secretary of State John Kerry said that Syria’s chemical weapons were “100 percent” destroyed.

The statement came into question on Tuesday when a chemical weapons attack in an opposition-held town in northern Syria killed more than 80 people, including at least 30 children. The U.S. blamed Assad for the attack.

President Trump on Friday authorized to launch 60 U.S. Tomahawk missiles on the Shayrat air base, southeast of Homs, in retaliation to the chemical weapons attack. The Pentagon said the airstrikes will not eliminate the country’s chemical weapons supply completely, but reduce the government’s ability to deliver them.

Elite Syrian Unit 450 Scatters Chemical Arms Stockpile

Assad Regime Has Moved Weapons to as Many as 50 Sites

2013: A secretive Syrian military unit at the center of the Assad regime’s chemical weapons program has been moving stocks of poison gases and munitions to as many as 50 sites to make them harder for the U.S. to track, according to American and Middle Eastern officials.

The movements of chemical weapons by Syria’s elite Unit 450 could complicate any U.S. bombing campaign in Syria over its alleged chemical attacks, officials said. It also raises questions about implementation of a Russian proposal that calls for the regime to surrender control of its stockpile, they said.

U.S. and Israeli intelligence agencies still believe they know where most of the Syrian regime’s chemical weapons are located, but with less confidence than six months ago, U.S. officials said.

Secretary of State John Kerry met Thursday in Geneva with his Russian counterpart to discuss a road map for ending the weapons program. The challenges are immense, Mr. Kerry said.

The U.S. alleges a chemical-weapons attack by the Syrian government on Aug. 21 killed more than 1,400 people, including at least 400 children. Syrian President Bashar al-Assad on Thursday again denied any involvement in a chemical attack, but he said his government was prepared to sign an agreement banning the use of chemical weapons. Syrian officials couldn’t immediately be reached for comment on the weapons.

Unit 450 – a branch of the Syrian Scientific Studies and Research Center that manages the regime’s overall chemicals weapons program – has been moving the stocks around for months, officials and lawmakers briefed on the intelligence said.

Movements occurred as recently as last week, the officials said, after Mr. Obama said he was preparing to launch strikes.

The unit is in charge of mixing and deploying chemical munitions, and it provides security at chemical sites, according to U.S. and European intelligence agencies. It is composed of officers from Mr. Assad’s Alawite sect. One diplomat briefed on the unit said it was Alawite from “janitor to commander.”

U.S. military officials have looked into the possibility of gaining influence over members of Unit 450 through inducements or threats. “In a perfect world, you would actually like to co-opt that unit. Who cares who pays them as long as they sit on the chemical weapons,” said a senior U.S. military official.

Although the option remains on the table, government experts say the unit is so close-knit that they doubt any member could break ranks without being exposed and killed.

The U.S. estimates the regime has 1,000 metric tons of chemical and biological agents. “That is what we know about. There might be more,” said one senior U.S. official.

The regime traditionally kept most of its chemical and biological weapons at a few large sites in western Syria, U.S. officials said. But beginning about a year ago, the Syrians started dispersing the arsenal to nearly two dozen major sites.

Unit 450 also started using dozens of smaller sites. The U.S. now believes Mr. Assad’s chemical arsenal has been scattered to as many as 50 locations in the west, north and south, as well as new sites in the east, officials said.

The U.S. is using satellites to track vehicles employed by Unit 450 to disperse the chemical-weapons stocks. But the imagery doesn’t always show what is being put on the trucks. “We know a lot less than we did six months ago about where the chemical weapons are,” one official said.

The movements, activities and base locations of Unit 450 are so sensitive that the U.S. won’t share information with even trusted allies in the opposition for fear the unit would be overrun by rebels, said current and former U.S. officials.

The U.S. wants any military strikes in Syria to send a message to the heads of Unit 450 that there is a steep price for following orders to use chemical weapons, U.S. officials said.

At the same time, the U.S. doesn’t want any strike to destabilize the unit so much that it loses control of its chemical weapons, giving rebels a chance to seize the arsenal.

Attacking Unit 450, assuming we have any idea where they actually are, would be a pretty tricky affair because”¦if you attack them you may reduce the security of their weapons, which is something we certainly don’t want,” said Jeffrey White, a veteran of the Defense Intelligence Agency and a defense fellow at The Washington Institute.

Within Syria, little is known about Unit 450 or the Syrian Scientific Studies and Research Center. One of the buildings is in a sprawling complex on the outskirts of Damascus.

Even high-ranking defectors from the Syrian military that form the core of the rebel insurgency – including those who served in units trained to handle chemical attacks – said they hadn’t heard of Unit 450.

The Pentagon has prepared multiple target lists for possible strikes, some of which include commanders of Unit 450.

But a senior U.S. official said no decision has been made to target them, reflecting the challenge of sending a message to Unit 450 without destabilizing it.

In some respects, officials said, the hands-on role that Unit 450 plays in safeguarding the regime’s chemical weapons secrets makes it too valuable for the U.S. to eliminate, even though the U.S. believes the unit is directly responsible for the alleged chemical weapons abuses.

The Syrian Scientific Studies and Research Center answers only to Mr. Assad and the most senior members of his clan, according to U.S. and European officials. Attack orders are forwarded to a commanding officer within Unit 450.

If the Russians clinch a deal for Mr. Assad to give up his chemical weapons, any prospective United Nations-led force to protect inspectors and secure storage sites would likely need to work closely with Unit 450 and the research center, current and former administration officials said.

Gen. Martin Dempsey, the chairman of the U.S. military’s Joint Chiefs of Staff, has said that President Barack Obama directed him to plan for “a militarily significant strike” that would deter the Assad regime’s further use of chemical weapons and degrade the regime’s military capability to employ chemical weapons in the future.

But officials said the U.S. doesn’t plan to bomb chemical weapons sites directly because of concerns any attack would disperse poison agents and put civilians at risk.

In addition to satellites, the U.S. also relies on Israeli spies for on-the-ground intelligence about the unit, according to U.S. and Israeli officials.

Though small in size, Unit 450 controls a vast infrastructure that makes it easier for the U.S. and Israel to track its movements. Chemical weapons storage depots are guarded by the unit within larger compounds to provide multiple layers of security, U.S. officials said.

Whenever chemical munitions are deployed in the field, Unit 450 has to pre-deploy heavy equipment to chemical mixing areas, which the U.S. and Israel can track.

Tomahawks Destroyed 20 Assad Aircraft on Sharyat Flightline

Trump Orders Missile Attack in Retaliation for Syrian Chemical Strikes

By Jim Garamone

DoD News, Defense Media Activity

WASHINGTON, April 6, 2017 — The United States fired Tomahawk missiles into Syria today in retaliation for the regime of Bashar Assad using nerve agents to attack his own people.

President Donald J. Trump ordered the attack on Al-Shayrat Air Base, the base from which the chemical attack on Syria’s Idlib province was launched. The missiles were launched from U.S. Navy ships in the Eastern Mediterranean Sea.

The attack is in retaliation for the Syrian dictator for using banned chemical agents in the April 4 attack.

“Bashar al-Assad launched a horrible chemical weapons attack on innocent civilians,” Trump said in a statement to the nation. “Using a deadly nerve agent, Assad choked out the lives of helpless men, women and children. It was a slow and brutal death for so many. Even beautiful babies were cruelly murdered in this very barbaric attack. No child of God should ever suffer such horror.”

Vital National Security Interest

Trump ordered the targeted military strike on the airfield that launched the attack. “It is in the vital national security interest of the United States to prevent and deter the spread and use of deadly chemical weapons,” the president said.

No one disputes that Syria used banned chemical weapons of the people of Idlib, he said, adding that this is a violation of the Chemical Weapons Convention. Syria also ignored United Nations Security Council resolutions.

“Years of previous attempts at changing Assad’s behavior have all failed and failed very dramatically,” Trump said. “As a result, the refugee crisis continues to deepen and the region continues to destabilize, threatening the United States and its allies.”

Trump called on all civilized nations to join the United States in seeking an end to the slaughter in Syria, and to end the threat terrorism poses in the blighted nation.

Details of Strike

Shortly after the president’s address, Pentagon spokesman Navy Capt. Jeff Davis issued a statement providing details of the strike. It took place at about 8:40 p.m. EDT — 4:40 a.m.  April 7 in Syria, he said.

The strike was conducted using Tomahawk Land Attack Missiles, or TLAMs, launched from the destroyers USS Porter and USS Ross in the eastern Mediterranean Sea, Davis said in his statement. A total of 59 TLAMs targeted aircraft, hardened aircraft shelters, petroleum and logistical storage, ammunition supply bunkers, air defense systems, and radars.

“As always,” Davis said, “the U.S. took extraordinary measures to avoid civilian casualties and to comply with the Law of Armed Conflict.  Every precaution was taken to execute this strike with minimal risk to personnel at the airfield.”

The strike was “a proportional response to Assad’s heinous act,” the Pentagon spokesman said, noting that Shayrat Airfield was used to store chemical weapons and Syrian air forces. The U.S. intelligence community assesses that aircraft from Shayrat conducted the April 4 chemical weapons attack, he added, and the strike was intended to deter the regime from using chemical weapons again.

Russian forces were notified in advance of the strike using the established deconfliction line, Davis said, and U.S. military planners took precautions to minimize risk to Russian or Syrian personnel at the airfield.

“We are assessing the results of the strike,” Davis said. “Initial indications are that this strike has severely damaged or destroyed Syrian aircraft and support infrastructure and equipment at Shayrat Airfield, reducing the Syrian government’s ability to deliver chemical weapons. The use of chemical weapons against innocent people will not be tolerated.”

***

Russian military personnel were at the base during the U.S. attack, soldiers told Al Masdar. But the Russians weren’t harmed during the strike, which focused on the airfields, fuel tankers and aircraft hangars, according to Al Masdar. Rex Tillerson, Secretary of State earlier in the afternoon, placed a call to Putin with advanced warning but no call was made to warn Syria.