Facts on TWO Lists, Watch List and Terror List

   

Most Wanted Terrorists

Select the images of suspected terrorists to display more information.

 

How Does the FBI Watch List Work? And Could It Have Prevented Orlando?

Wired:  OF ALL THE details investigators have uncovered about Orlando terrorist Omar Mateen, perhaps the most infuriating is the fact that he spent 10 months on a government watch list, yet had no trouble buying an assault rifle and a handgun.

Authorities placed Mateen on a watch list in May 2013 after coworkers at the Florida courthouse where he was a security guard told authorities he boasted of connections to al Qaeda and other terrorists organizations. He remained on the list for 10 months, and FBI Director James Comey told reporters this week that during that time the agency placed Mateen under surveillance and had confidential sources meet with him.

But the feds removed Mateen from the list in March 2014, after concluding that he had no significant links to terrorism beyond attending the same mosque as an American suicide bomber who died in Syria. “We don’t keep people under investigation indefinitely,” Comey said, adding that he doesn’t see anything that his agents should have done differently.

Comey didn’t identify the list Mateen was on, but an unnamed official told the Daily Beast that he was in two databases, the Terrorist Identities Datamart Environment database and the Terrorist Screening Database, more commonly called the terrorist watch list.

Here’s a look at what the lists are and how someone gets their name on one.

What is the Terrorist Watch List?
The Terrorist Screening Database was created in 2003 by order of a Homeland Security Presidential Directive. The database includes the names and aliases of anyone known to be, or reasonably suspected of being, involved in terrorism or assisting terrorists through financial aid or other ways. The federal Terrorist Screening Center maintains the database, and an array of government agencies nominate people to it through the National Counter Terrorism Center.

Some of the information in the database originates with the Terrorist Identities Datamart Environment, also called TIDE. That list contains classified data collected by intelligence agencies and militaries worldwide, but anything passed on to the terrorist watch list is first scrubbed of classified info. In 2013, TIDE had 1.1 million names in it.

The State Department checks all visa applicants against the watch list. The TSA’s No-Fly list and Selectee List, which identifies people who warrant additional screening and scrutiny at airports and border crossings, are also derived from the watch list. But it is most often used by law enforcement agencies at all levels to check the identity of anyone arrested, detained for questioning, or stopped for a traffic violation. The FBI calls it “one of the most effective counterterrorism tools for the US government.”

Entries in the database are coded according to threat level to provide law enforcement with instructions on what to do when they encounter a suspected terrorist who is on the list. According to a 2005 inspector general report (.pdf), of some 110,000 records in the database that the IG reviewed, 75 percent of them were given handling code 4, considered the lowest level, and 22 percent were given handling code 3. Only 318 records had handling codes 1 or 2. A description of what each level means is redacted in the publicly released version of the document, but a note indicates that people are usually given code 4 when they are either just an associate of a suspected terrorist and therefore may not pose a threat or if there is too little information known about the individual to categorize them at a higher level.

Appearing in the database doesn’t mean you’ll be arrested, denied a visa, or barred from entering the country. But it does mean your whereabouts and any other information gleaned from, say, a traffic stop, will be added to the file and scrutinized by authorities.

What’s the Criteria for Getting on the Watch List?
According to a 2013 watch list guideline produced by the Terrorist Screening Center and obtained by The Intercept, engaging in terrorism or having a direct connection to a terrorist organization is not necessary for inclusion on the list. Parents, spouses, siblings, children and “associates” of a suspected terrorist can appear on the list without any suspicion of terrorist involvement. “Irrefutable evidence” of terrorist activity and connections is also not necessary, the document states. Reasonable suspicion is sufficient, though this isn’t clearly defined.

“These lists are horribly imprecise,” a former federal prosecutor, who asked to remain anonymous, told WIRED. “They are based on rumor and innuendo, and it’s incredibly easy to get on the list and incredibly difficult to get off the list. There’s no due process for getting off the list.”

The guidelines also reveal that the Assistant to the President for Homeland Security and Counterterrorism can temporarily authorize placing entire “categories” of people on to the No-Fly and Selectee lists based on “credible intelligence” that indicates a certain category of individuals may be used to conduct an act of terrorism.

“Instead of a watch list limited to actual, known terrorists, the government has built a vast system based on the unproven and flawed premise that it can predict if a person will commit a terrorist act in the future,” Hina Shamsi, head of the ACLU’s National Security Project, told The Intercept. “On that dangerous theory, the government is secretly blacklisting people as suspected terrorists and giving them the impossible task of proving themselves innocent of a threat they haven’t carried out.”

What Is the No-Fly List?
This narrower list, derived from the terrorist watch list, includes people who haven’t done anything to warrant being arrested, yet the government deems too dangerous to allow onto commercial aircraft. Mateen reportedly did not appear on this list. The list included 2,500 individuals when Homeland Security chief Michael Chertoff released the tally for the first time in 2008. Six years later, Christopher Piehota, director of the Terrorist Screening Center, told a House subcommittee it had 64,000 names on it. That sounds like a lot, but the list includes dead people and multiple versions of names.

The No-Fly list is also notorious for ensnaring the innocent whose names resemble those of suspected terrorists. Senator Ted Kennedy, for example, was repeatedly prevented from boarding planes because his name matched that of someone on the list.

What Kind of ‘Terrorist Activity’ Gets You on the Terrorist Watch List?
Obvious things like using or possessing weapons of mass destruction will land you on the terrorist watch list. So will committing violence at an international airport, or engaging in arson or other types of destruction of government property if it’s done to intimidate, coerce, or influence people or government policy. But computer hacking can also get you included if it damages a computer used for interstate or foreign commerce or ones that are used by a financial institution or the government, if the hack was intended to influence people or policy.

Just as there are those on the list who shouldn’t be, so too are there people who don’t make it onto the list who should. Umar Farouk Abdul Mutallab, the so-called “underwear bomber” who attempted to detonate explosives aboard a flight from Europe in 2009, wasn’t on the terrorist or No-Fly lists, even though his father alerted the US embassy in Nigeria to his radicalization. He did appear in the TIDE database, but because that information is classified, it didn’t make it to the No-Fly list or the Amsterdam airport where he boarded his flight.

A 2007 inspector general’s audit of the terrorist watch list found that in 15 percent of terrorism cases the inspector’s office reviewed, the FBI failed to add suspects in the cases to the list.

Can Someone on the List Buy a Gun from a Federally Licensed Seller?
Appearing on the terrorist watch list wouldn’t necessarily prevent someone from purchasing a gun; it simply means law enforcement is alerted if you apply to purchase a weapon. So even if he’d been included on the list at the time he bought his weapons, Mateen would still have had no trouble purchasing his Sig Sauer MCX rifle and Glock 17 handgun.

There are ten criteria, however, that do prevent people, whether they’re on the terrorist watch list or not, from buying firearms from a licensed seller. They include a felony conviction, being an undocumented immigrant and being deemed mentally unstable by a court.

Government Accountability Office data recently released to California Democratic Senator Dianne Feinstein indicate that 2,477 people on the watch list attempted to buy a firearm between February 2004 (when authorities started checking gun sale purchases against the list) and the end of 2015. Of those, 2,265 of the transactions were allowed.

Feinstein proposed legislation last year to prevent known or suspected terrorists on the watch list from obtaining a gun license or buying a weapon from a licensed seller. The Senate rejected the proposal one day after the San Bernadino attack, but Feinstein said she hopes the Orlando massacre will give the bill new life. This week, Senate Democrats filibustered until Republicans agreed to consider such legislation.

But barring anyone on the list from buying a gun can create a different problem. “If you prevent people on the list from buying a weapon, then an attempt to buy the weapon can alert the person that they’re on the list,” the former prosecutor told WIRED. “So you’re aiding the terrorist [with that information].”

 

How Many People Are on the Terrorist Watch List?
The exact number is unclear because the list includes many aliases and variations of names, and officials often confuse the number of names that are on the list and the number of unique individuals that are on it. In 2011, for example, more than 1 million names appeared on the list, but just 400,000 of these represented unique individuals. In 2014, the Terrorist Screening Center’s Piehota told lawmakers the list included 800,000 names.

About 99 percent of names nominated to the list each year are accepted, and the number of nominations grows annually. In 2009, authorities nominated 227,932 known or suspected terrorists. In 2013, the number reached nearly 469,000.

Most of the people on the watch list are not US citizens; placing a citizen or permanent US resident on the list is supposed to require a higher standard, such information “from sources of known reliability or where there exists additional corroboration or context supporting reasonable suspicion,” according to the guidelines The Intercept obtained.

How Do You Get Off the Terrorist Watch List or No-Fly List?
This remains a source of great controversy. People on these lists rarely know how or why they landed there, and the process of removal can be convoluted. In 2007, the Department of Homeland Security created a redress program through which people can challenge their inclusion on the No-Fly list. It works well enough for anyone mistakenly added to the list, but provides little help to those whom the government says are on the list for legitimate reasons but won’t disclose the reasons.

The FBI will remove people from the terrorist watch list after closing an investigation that failed to uncover terrorist activity or connections. This is exactly what happened to Mateen, which has angered some officials. “The only way you should get off the list is if they no longer believe you’re a threat,” Senator Lindsey Graham said during a Capitol Hill briefing after the Orlando shooting. “It should have nothing to do with not being able to prove a crime.”

But the FBI was simply following procedure when it dropped Mateen from the watch list, after being criticized in the past for not promptly removing people when cases get closed. An inspector general’s report in 2007 found that the FBI failed to remove names in a timely manner in 72 percent of the cases the Bureau closed for lack of evidence. A 2009 audit found that the situation had not improved, prompting lawmakers like Vermont Democratic Senator Patrick Leahy to criticize the Bureau.

 

The bigger question then, is not why was Mateen removed from the list, but why did the FBI close its investigation of him prematurely? “To me, there was enough here to keep it in some sort of a status,” New York Republican Representative Peter King said during the Capitol Hill briefing this week.

But with so many suspects on the watch list, authorities must be judicious in choosing which ones to pursue. “Our work is very challenging,” Comey said this week. “We are looking for needles in a nationwide haystack. But we’re also called upon to figure out which pieces of hay might someday become needles.”

There is no specific criteria guiding when to close a case related to the terrorist watch list. “It’s a judgment call,” says the former prosecutor. “It depends on the seriousness of the allegations and the result of the investigation. It’s [a matter of whether an] investigator is convinced, more than anything else, that ‘We better keep looking at this guy.’”

In the case of Mateen, investigators surveilled him, looked into his background, and performed a “dangle,” the former prosecutor says. That’s when a confidential informant meets with a suspect. “They feel the guy out to try to figure out if he’s real or if he’s just all talk,” he says. They may do this by asking if he’s interested in purchasing weapons or materials to make a bomb. “They may try the dangle operation two or three times, and if he shows no genuine interest in activity, if he doesn’t take the bait, then they say after a period of time, we’ve got no reason to believe this person is something other than an angry young man … and they close the investigation.”

Still, a case is never truly closed. Authorities can re-open it if something piques their interest—like say, a suspect buying weapons. That would have been sufficient to get Mateen back on the FBI’s radar. But because he wasn’t on the watch list, the FBI didn’t know what he was up to. And that’s what lawmakers are saying they want to fix.

 

 

 

How Terrorists use Encryption

 

How Terrorists Use Encryption

June 16, 2016

CTC: Abstract: As powerful encryption increasingly becomes embedded in electronic devices and online messaging apps, Islamist terrorists are exploiting the technology to communicate securely and store information. Legislative efforts to help law enforcement agencies wrestle with the phenomenon of “going dark” will never lead to a return to the status quo ante, however. With the code underlying end-to-end encryption now widely available, unbreakable encryption is here to stay. However, the picture is not wholly bleak. While end-to-end encryption itself often cannot be broken, intelligence agencies have been able to hack the software on the ends and take advantage of users’ mistakes.

Counterterrorism officials have grown increasingly concerned about terrorist groups using encryption in order to communicate securely. As encryption increasingly becomes a part of electronic devices and online messaging apps, a range of criminal actors including Islamist terrorists are exploiting the technology to communicate and store information, thus avoiding detection and incrimination, a phenomenon law enforcement officials refer to as “going dark.”

Despite a vociferous public debate on both sides of the Atlantic that has pitted government agencies against tech companies, civil liberties advocates, and even senior figures in the national security establishment who have argued that creation of “backdoors”[1] for law enforcement agencies to retrieve communications would do more harm than good, there remains widespread confusion about how encryption actually works.[a]

Technologists have long understood that regulatory measures stand little chance of rolling back the tide. Besides software being written in other countries (and beyond local laws), what has not been fully understood in the public debate is that the “source code” itself behind end-to-end encryption is now widely available online, which means that short of shutting down the internet, there is nothing that can be done to stop individuals, including terrorists, from creating and customizing their own encryption software.

The first part of this article provides a primer on the various forms of encryption, including end-to-end encryption, full device encryption, anonymization, and various secure communication (operational security or opsec) methods that are used on top of or instead of encryption. Part two then looks at some examples of how terrorist actors are using these methods.

Part 1: Encryption 101 

End-to-End Encryption
A cell phone already uses encryption to talk to the nearest cell tower. This is because hackers could otherwise eavesdrop on radio waves to listen in on phone calls. However, after the cell tower, phone calls are not encrypted as they traverse copper wires and fiber optic cables. It is considered too hard for nefarious actors to dig up these cables and tap into them.

In a similar manner, older chat apps only encrypted messages as far as the servers, using what is known as SSL.[b] That was to defeat hackers who would be able to eavesdrop on internet traffic to the servers going over the Wi-Fi at public places. But once the messages reached the servers, they were stored in an unencrypted format because at that point they were considered “safe” from hackers. Law enforcement could still obtain the messages with a court order.

Newer chat apps, instead of encrypting the messages only as far as the server, encrypt the message all the way to the other end, to the recipient’s phone. Only the recipients, with a private key, are able to decrypt the message. Service providers can still provide the “metadata” to police (who sent messages to whom), but they no longer have access to the content of the messages.

The online messaging app Telegram was one of the earliest systems to support end-to-end encryption, and terrorists groups such as the Islamic State took advantage.[2] These days, the feature has been added to most messaging apps, such as Signal, Wickr, and even Apple’s own iMessage. Recently, Facebook’s WhatsApp[3] and Google[4] announced they will be supporting Signal’s end-to-end encryption protocol.

On personal computers, the software known as PGP,[c] first created in the mid-1990s, reigns supreme for end-to-end encryption. It converts a message (or even entire files) into encrypted text that can be copy/pasted anywhere, such as email messages, Facebook posts, or forum posts. There is no difference between “military grade encryption” and the “consumer encryption” that is seen in PGP. That means individuals can post these encrypted messages publicly and even the NSA is unable to access them. There is a misconception that intelligence agencies like the NSA are able to crack any encryption. This is not true. Most encryption that is done correctly cannot be overcome unless the user makes a mistake.

Such end-to-end encryption relies upon something called public-key cryptography. Two mathematically related keys are created, such that a message encrypted by one key can only be decrypted by the other. This allows one key to be made public so that one’s interlocutor can use it to encrypt messages that the intended recipient can decrypt through the private-key.[d] Al-Qa`ida’s Inspire magazine, for example, publishes its public-key[5] so that anyone using PGP can use it to encrypt a message that only the publishers of the magazine can read.

Full Device Encryption
If an individual loses his iPhone, for example, his data should be safe from criminals.[e] Only governments are likely to have the resources to crack the phone by finding some strange vulnerability. The FBI reportedly paid a private contractor close to $1 million to unlock the iPhone of San Bernardino terrorist Syed Rizwan Farook.[6]

The reason an iPhone is secure from criminals is because of full device encryption, also full disk encryption. Not only is all of the data encrypted, it is done in a way that is combined or entangled[7] with the hardware. Thus, the police cannot clone the encrypted data, then crack it offline using supercomputers to “brute-force” guess all possible combinations of the passcode. Instead, they effectively have to ask the phone to decrypt itself, which it will do but slowly, defeating cracking.[f]

Android phones work in much the same manner. However, most manufacturers put less effort into securing their phones than Apple. Exceptions are companies like Blackphone, which explicitly took extra care to secure their devices.

Full disk encryption is also a feature of personal computers. Microsoft Windows comes with BitLocker, Macintosh comes with FileVault, and Linux comes with LUKS. The well-known disk encryption software TrueCrypt works with all three operating systems as does a variation of PGP called PGPdisk. Some computers come with a chip called a TPM[g] that can protect the password from cracking, but most owners do not use a TPM. This means that unless they use long/complex passwords, adversaries will be able to crack their passwords.

Militant Islam, Obama Admin Forbidden Terms

A distinction needs to be made. Radical extremists are for the force multipliers, those like Anwar al Awlaki. The militants like Mohammed Emwazi are born from the radicals and they are the deadly enforcers of the Islamic doctrine and Sharia.

Don’t blame the FBI for failures, with particular regard to the worst terror attack in American by a gunman, Orlando. Blame the White House. All the Q&A sessions, congressional testimony and press briefings by FBI Director James Comey have had an underlying message, a cry for help, attention and support.

Don’t blame the intelligence community including CENTCOM and the Pentagon for battlefield or rules of engagement failures. That belongs to the entire White House national security team. The Office of National Intelligence has also been affected.

This is not political correctness at all, it is a Barak Obama edict, sensitivity to Islam across our homeland and across the globe. Obama has had a strident mission since he assumed the Oval Office to create a Muslim protective shield. This is beyond dispute.

While not in any chronological order, there are some very key decisions that were made and continue to be made by the Obama administration that affect our national security and this generational war titled the Overseas Contingency Operation.

In April of 2009, Barak Obama delivered ‘The New Beginnings’ speech. In this presentation he spelled out his full agenda in what was to become the long-term mission to elevate Muslims and their organizations at home and globally. The White House objectives have been successful and consequential.

With the new beginning announced, Obama extended his same purpose throughout government agencies, law enforcement and policies as a mandatory doctrine.

‘Just before that Christmas Day attack, in early November 2009, I was ordered by my superiors at the Department of Homeland Security to delete or modify several hundred records of individuals tied to designated Islamist terror groups like Hamas from the important federal database, the Treasury Enforcement Communications System (TECS). These types of records are the basis for any ability to “connect dots.”  Every day, DHS Customs and Border Protection officers watch entering and exiting many individuals associated with known terrorist affiliations, then look for patterns. Enforcing a political scrubbing of records of Muslims greatly affected our ability to do that. Even worse, going forward, my colleagues and I were prohibited from entering pertinent information into the database.’ Philip Haney, The Hill.

Directly after the 9/11 attack, the Bush administration did reach out to the Muslim communities to determine who was with peace and national security and who perhaps gave clues of a larger and hidden condition that could be festering that would prove clues to more domestic security challenges.

Then came the Holyland Foundation trial in 2007/2008. The material facts and conditions of the domestic threat, people, money, collaboration and global consequence all converged in a courtroom in Texas.

During the Holy Land trial, FBI Agent Lara Burns testified in court that CAIR was a front for HAMAS. One trial exhibit submitted by federal prosecutors – and stipulated to by the defense in the case – explained that these organizations were dedicated to a “civilizational-jihadist process” to destroy America from within and replace the Constitution with sharia (Islamic law):

The Ikhwah [Muslim Brotherhood] must understand that their work in America is a kind of grand Jihad in eliminating and destroying the Western civilization from within and “sabotaging” its miserable house by their hands and the hands of the believers so that it is eliminated and God’s religion [Islam] is made victorious over all other religions. (p. 21)

Federal prosecutors specifically cited this internal Muslim Brotherhood planning document as the strategic goal of these U.S.-based Islamic groups – the very same group advising the Obama Administration. The federal judge in the Holy Foundation case agreed with the case presented by the federal prosecutors had made regarding these organizations, stating in one ruling that “the Government has produced ample evidence to establish the associations with CAIR, ISNA and NAIT with HLF…and with HAMAS.” (p. 14-15) More important details here from the CounterjihadReport.

The Department of Justice under Eric Holder was included in the full protection of the terror networks and associated people. Congressman Gohmert of Texas challenged AG Holder to no avail in a chilling exchange.

Here is where the ‘words matter’ material documentation began. The Obama administration took this agenda to new standard.

In 2009, DHS published via the Office of Intelligence and Analysis Assessment a ‘Rightwing Extremism’ document, pinpointing those that may challenge the Obama Muslim doctrine. Additionally, DHS posted The Department of Homeland Security launched a ‘Do’s and Dont’s bulletin.

The entire complexion of the Department of Homeland Security began to change with new personnel and outreach under Secretary Janet Napolitano. The outreach extended to law enforcement agencies of which LAPD demonstrates.

The order to purge documents, training materials and database was made. The proof is here.

Barak Obama was not finished. In 2015, the White House introduced a strategy for CVE, Counter Violent Extremism.

Then comes the foreign policy of Obama. All deference to Iran began before Obama assumed the White House in 2009 and continues today. Secret back channels to Iran using Ambassador Burns began in 2008. Further, there is Iraq and Syria with Islamic State. Documents here on ISIS prove the intelligence and forecasts were known, available and delivered.

This would not be complete without mentioning China, Russia or North Korea where policies are non-existent.

The Paris attack was a slaughter and Obama found it wise to snub the solidarity march with other world leaders.

Obama touted Yemen as one of his successes but the country collapsed. Finally, the Obama policy doctrine crumbled and the cause was fully explained here. Obama wilfully recoiled as he and Hillary did on Benghazi.

It really no longer matters that Barak Obama, Hillary Clinton or John Kerry refuse to use key terms to describe militant Islam, the entire well verse and informed world have defined it for them. What does matter beyond the words are the policies and refusals of missions, strategies and conditions to keep America, her interests and allies safe.

It is no wonder there is no global respect for the Obama administration and there is much less to fear from her.

In summary, Obama owns this terror, owns this jihad and owns the death as well as the genocide. This is his legacy, he owns it as his own scarlet letter.

 

 

Latin America, Hezbollah Moving Cocaine, Funding Terror

Hezbollah moving ‘tons of cocaine’ in Latin America, Europe to finance terror operations

 

Taylor/Dinan/WashingtonTimes: Hezbollah’s terrorism finance operations are thriving across Latin America months after the Drug Enforcement Administration linked the Iran-backed Lebanese militant group to drug cartels in the region, U.S. lawmakers were told this week.

Former DEA operations chief Michael Braun said Hezbollah is “moving [multiple] tons of cocaine” from South America to Europe and has developed “the most sophisticated money laundering scheme or schemes that we have ever witnessed.”

The agency announced in February that it had arrested several Hezbollah operatives accused of working with a major Colombian drug cartel to traffic drugs to Europe and launder money through Lebanon. Those arrests come against a backdrop of rising fears in Washington about smuggling connections between Middle East terrorist groups and the Western Hemisphere.

Hezbollah has “metastasized into a hydra with international connections that the likes of [the Islamic State] and groups like al Qaeda could only hope to have,” Mr. Braun told the House Financial Services Committee.

Adding to concerns about security threats from Central and South America, intelligence reports have also tracked how smugglers managed to sneak illegal immigrants from the Middle Eastern and South Asia straight to the doorstep of the U.S. — including helping one Afghan who U.S. authorities say was part of an attack plot in North America.

Immigration officials identified at least a dozen Middle Eastern men smuggled into the Western Hemisphere by a Brazilian-based network that connected them with Mexicans who guided them to the U.S. border, according to internal government documents reviewed this month by The Washington Times.

 

Those smuggled included Palestinians, Pakistanis and the Afghan man who Homeland Security officials said had family ties to the Taliban and was “involved in a plot to conduct an attack in the U.S. and/or Canada.”

Concerns about Hezbollah’s activities in Latin America have surged the DEA’s announcement in February that top operatives from the group’s so-called Business Affairs Component, or BAC, “have established business relationships” with South American drug cartels such as the Colombia-based Oficina de Envigado, a crime syndicate “responsible for supplying large quantities of cocaine to the European and United States drug markets.”

The DEA said several of the BAC’s Europe-based operatives had been arrested on charges of trafficking drugs and laundering money from South America to purchase weapons and finance the group’s military activities in Syria. The agency described an intricate network of money couriers who collect and transport millions of euros in drug proceeds from Europe to the Middle East.

 

“The currency is then paid in Colombia to drug traffickers,” it said, adding that “a large portion of the drug proceeds was found to transit through Lebanon, and a significant percentage of these proceeds are benefiting terrorist organizations, namely Hezbollah.”

The DEA said seven countries, including France, Germany, Italy and Belgium, were involved in an ongoing investigation. But few details were provided about how many suspects had been apprehended or where they are being held.

Officials said the most significant arrest was of Mohamad Noureddine, whom the DEA accused of being a Lebanese money launderer for Hezbollah. A week prior to the announcement, the Treasury Department had imposed sanctions freezing any U.S. accounts tied to Mr. Noureddine as well as to Hamdi Zaher El Dine, another suspected money launderer.

Decades of activity

U.S. officials have long been wary of Hezbollah, a Shiite Islamic group.

While it has a mainstream political arm in Lebanon, officials have linked the group to terrorist attacks in various corners of the world over the past 25 years — the vast majority targeting Israel. The State Department listed Hezbollah as a terrorist organization in the late 1990s and has characterized Iran as a leading state sponsor of terrorism largely on grounds that it supplies the group with weapons.

But the full scope of Hezbollah’s operations has long been a subject of debate in Washington. The DEA’s recent claims followed years of speculation about Iranian activities in Latin America.

Responding to pressure from Republican lawmakers, the State Department conducted a formal probe into the matter in 2013 and issued a report claiming that Iran was not supporting any active terrorist cells in the region.

While the report said the number of Iranian officials operating in Latin America had increased, the report concluded Tehran had far less influence in Latin America than critics claimed.

But former officials like Mr. Braun, who retired as DEA chief of operations in 2008, say Hezbollah is extremely active in the region.

President Obama signed the “Hizballah International Financing Prevention Act” last year, authorizing a range of actions, including sanctions, to block Hezbollah’s ability to fund itself.

Emanuele Ottolenghi, a senior fellow on Iran and illicit finance with the Foundation for Defense of Democracies, told lawmakers at Wednesday’s hearing that Congress and the administration should use the law to “aggressively focus” on Hezbollah’s presence in Latin America.

Brazilian connection

Mr. Ottolenghi pointed to the group’s “vast network of support,” particularly in Brazil, which is home to some 7 million people of Lebanese descent, including an estimated 1 million Shiite Muslims.

Hezbollah generates loyalty among the local Shia communities by managing their religious and educational structures,” Mr. Ottolenghi told the hearing. “It then leverages loyalty to solicit funds and use business connections to its own advantage, including, critically, to facilitate its interactions with organized crime.”

He cited a 2014 report by the Brazilian newspaper O Globo that outlined a connection between Hezbollah and the Primeiro Comando da Capital, a Sao Paulo-based prison gang, which is widely regarded to be among the country’s biggest exporters of cocaine.

“Drug cartels need middlemen, as well as commodity and service providers, for the supply line and delivery to cartels in Colombia, Venezuela and Central America,” Mr. Ottolenghi said. “They need assistance facilitating transit to West Africa before drugs cross the Sahara on their way to Western Europe and enabling the producers, refiners and cartels to launder their revenues and acquire the accessories for the trade in the process.”

 

Drug Cartel Zetas, Prison used as Extermination Camp

DEA Cartel footprintDeclassified: United States: Areas of Influence of Major Mexican Transnational Criminal Organizations

Mexican cartels such as the Gulf, Juarez, and Los Zetas hold more significant influence closer to the Southwest Border, but as shown on the map, their operational capacity decreases with distance from the border. As mentioned above, splinter groups from the disrupted LCT organization continue to traffic drugs from the Michoacán, Mexico area into the United States.

Zetas drug gang ‘used Mexico prison as extermination camp to kidnap and kill 150’

Telegraph: Members of the Zetas drug gang used a prison in northern Mexico as their private house of horrors where they tortured and killed kidnapping victims and underworld enemies, public prosecutors in the state of Coahuila have said.

 

Between 2009 and 2012, Piedras Negras prison became a virtual extermination camp, ruled with impunity by the notorious crime cartel as an operational base for their reign of terror in the US-Mexican border region.

After an investigation into the three-year period, authorities estimate that around 150 people were murdered inside the prison, with their bodies being burnt or broken down in acid-filled tanks before the remains were disposed of in a river some 20 miles away from the jail.

It is not clear to what extent the prison’s official guards actively cooperated with gang members or whether they merely allowed them to act with impunity in exchange for keeping order among inmates.

But prosecutors have revealed that Zetas’ prison leaders dressed up in uniforms as the prison’s de facto security force, wearing bulletproof vests and driving customised vehicles.

52 people died on August 25, 2011, when members of Los Zetas drug cartel doused the Casino Royale with gasoline and set it ablaze. More than 40.000 people have been killed in rising drug-related violence in Mexico since December 20052 people died on August 25, 2011, when members of Los Zetas drug cartel doused the Casino Royale nightlcub with gasoline and set it ablaze. More than 40.000 people have been killed in rising drug-related violence in Mexico since December 200 Credit: Getty Images

“We have received information that in this place was governed autonomously by the Zetas,” a spokesman for the Coahuila state prosecution force said on Wednesday after an investigation based on the testimony of 42 prisoners who were being held in Piedras Negras during that period.

The leader of the bloodthirsty Zetas prison gang has been identified as Ramón Burciaga Magallanes, who is currently in another jail serving time for kidnapping.

Besides Burciaga Magallanes, prosecutors served arrest warrants on four other suspects. All five are accused of participating in just seven murders because the remains of seven victims have been found and identifies within the prison compound.

The state prosecutor’s office said that it is searching for more missing persons who “were taken to the prison to be killed”.

Piedras Negras prison hit the headlines in September 2012, when 131 inmates escaped through the front door in what was reported as Mexico’s biggest-ever jailbreak.

That incident jolted state security forces from their passive stance and the prison was closed down later that year, with remaining inmates transferred elsewhere.

The case highlights the self-government that criminal gangs enjoy in Mexican prisons.

In February, 49 inmates were killed in a pitched battle in Monterrey, where two rival Zetas leaders were fighting for control of a prison.