An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation
Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.
As Jonathan Gruber will tell you, the MIT economist helped to write ObamaCare and remains one of its fiercest defenders. So it’s no surprise that on Friday the Web was full of chatter that Mr. Gruber had at least twice made public assertions that support the latest legal challenge to the health law.
The D.C. Circuit Court of Appeals ruled last week in Halbig v. Burwell that the plain language of ObamaCare says that subsidies for health insurance can only be delivered through state, not federal, exchanges. The Administration claims this ignores the clear intent of the law, but someone didn’t tell Mr. Gruber.
Now this case takes us to present day Congressional testimony where the esteemed MIT professor tells us they were able to sell Obamacare because of lack of transparency and mostly because America is stupid. Wait until the Supreme Court receives this testimony….or not.
We are stupid, we have been played and punked by the Obama administration on Obamacare and is thousands of cases it was a deadly position to be in.
The esteemed college professor who served as one of Obamacare’s key architects has admitted that a “lack of transparency” helped the administration pass the disastrous healthcare law, which is facing a number of legal challenges.
It’s a scandalous confession for an administration that has repeatedly vowed to be the most transparent in history. The information comes straight from Jonathan Gruber, the Massachusetts Institute of Technology (MIT) economist who served as a technical consultant to the Obama administration during the Affordable Care Act’s (Obamacare) design. Gruber was recorded during a panel and the video recently surfaced and has been making the rounds on the internet.
“This bill was written in a tortured way to make sure CBO did not score the mandate as taxes,” Gruber says. “If CBO scored the mandate as taxes, the bill dies. Okay, so it’s written to do that. In terms of risk rated subsidies, if you had a law which said that healthy people are going to pay in – you made explicit healthy people pay in and sick people get money, it would not have passed… Lack of transparency is a huge political advantage. And basically, call it the stupidity of the American voter or whatever, but basically that was really really critical for the thing to pass…”
Gruber also makes clear that the individual mandate, upheld by the Supreme Court only because it’s considered a tax, was not actually a tax in the original law because it never would have passed. The Obamacare designer is essentially saying that the administration intentionally deceived the public to push its hostile takeover of the nation’s healthcare system. “Look, I wish Mark was right that we could make it all transparent, but I’d rather have this law than not,” Gruber says in the recorded presentation.
The Gruber tape marks the latest of many scandals involving Obamacare. Judicial Watch has been a frontrunner in exposing the healthcare law’s multiple boondoggles and has sued the administration on behalf of a South Florida orthodontist over the unlawful, one-year delay of the employer mandate. The mandate, which subjects certain large employers to tax penalties if they don’t offer “affordable, minimum essential” health insurance coverage to their employees, was postponed without the approval of Congress. It marked one of more than a dozen times that the administration unilaterally rewrote the healthcare law by executive fiat.
JW also sued the Department of Health and Human Services (HHS) to obtain records about controversial Obamacare navigators and their qualifications and background checks. Earlier this year JW obtained records from HHS illustrating the scope of the Obamacare rollout disaster, including the fact that on its first full day of operation the government site—Healthcare.gov—received only one enrollment. On the second day of Healthcare.gov operation, 48% of registrations failed, according to the records obtained by JW as a result of a lawsuit.
The entire government of Mexico is infiltrated by barbaric drug cartels. We don’t hear much news about Mexico due mostly in part to journalists and media being kidnapped or killed. Mexico is a failed state, it is lawless and the leadership is morally bankrupt. Mexico is gruesome and that must be understood. Where is that ubiquitous United Nations Human Rights Council?
According to Mexico’s Attorney General’s Office, conflict between organized criminal groups has resulted in the beheading of 1,303 people in five years, a grisly tactic becoming the hallmark of the war between the country’s cartels.
El Universal reported that decapitations steadily increased during President Felipe Calderon’s term in office: just 32 beheadings were registered in 2007, while 2011 registered 493 such deaths between January and November.
MEXICO CITY, May 20 (Reuters) – Mexican soldiers have arrested an alleged perpetrator of the massacre of 49 people whose corpses were decapitated, dismembered and dumped on a highway last week.
Daniel Elizondo, alias “The Madman,” a leader of the Zetas drug cartel, was detained in the northern state of Nuevo Leon, a spokesman for the army said Sunday.
But the most recent outrage has sparked protests across Mexico and are calling fro President Nieto to resign over the missing students.
Federal police are investigating a case of 43 missing students last seen being put into police vehicles. Widespread protests have criticized the government’s handling of the case.
Protests occurred Nov. 8 throughout Mexico including the capital and the state of Guerrero. A group in Mexico City broke off from the main protest and tried to storm the ceremonial presidential palace. Hundreds descended on the Guerrero government headquarters, burning several vehicles.
“Ya me canse (I’ve had enough).” Jesus Murillo
The comments by Murillo Nov. 7 at the end of press conference helped spark protests the next day. #YaMeCanse and #estoycansado were among the most trending Twitter hashtags in Mexico.
‘I’ve had enough’, says Mexico Attorney General in massacre gaffe
“We received a group of about 40 people… Some of them were unconscious or already dead.”
Three suspects confessed to killing the students at a garbage dump in a video released by the attorney general’s office Nov. 7. The suspects said they burned the bodies using tires, logs and gasoline before putting the remains in trash bags and dumping them in a river. Authorities are testing bags they recovered.
Chilling video of gang members confessing to mass murder of missing Mexican students
Tens of thousands of people marched in Mexico City on Nov. 5 in protest of the government’s inability to find the missing students 40 days after they were abducted. Some protesters have started to call for Mexican President Enrique Pena Nieto to resign.
Protests Over Mexico’s Inaction on 43 Missing Students – NBC News
The students were last seen Sept. 26 in Iguala, Guerrero, during protests over job discrimination against rural teachers. Police opened fire on their buses. Six people died and more than 20 were wounded. 43 students were taken away, and were last seen being bundled into police vans.
Iguala Mayor Jose Luis Abarca (pictured) and wife Maria de los Angeles Pineda were arrested early Nov. 4 after evading police for weeks. Mexico’s attorney general called the pair “the probable masterminds” behind the disappearance of the students. They were found in rented accommodation in Mexico City.
Mexican mayor, wife arrested in case of missing students
AG Jesus Murillo believes the mayor and his wife gave orders to police the day of the shootings and disappearances. Police shot and killed a student, and detained others before handing them over to the Guerreros Unidos gang, Murillo said. Sidronio Casarrubias, the gang’s leader, was arrested a week earlier.
Mexico says mayor, wife were behind student-teacher disappearances
Guerrero Gov. Angel Aguirre, 58, quit his post through a leave of absence Oct. 23 “to favor the political climate” after outcry over the disappearances and mass graves. He could not resign, according to Mexican law. Guerrero’s Congress elected Rogelio Ortega Oct. 26 to replace him through 2015.
Authorities arrested four suspected members of the Guerreros Unidos gang on Oct. 27. Dozens of police with ties to the gang have also been arrested. Several mass graves have been found in the aftermath of the students’ disappearance, but none contained the remains of the missing young people.
Mexico arrests four gang members in students’ disappearance
The Mexican government said Oct. 19 that federal police assumed control 13 towns within a 125-mile radius of Iguala, Guerrero. Police departments in those towns are under investigation for the students’ disappearance. The government announced Oct. 20 a reward of $111,000 for information on the students.
Can you live without electricity for a day or two? Yes of course if you in advance right? Can you live without power for a week or so? Yes of course with advanced notice right? Can you live without power for a month, 4 months or 18 months? NOPE. It is time to not only think about preparations, but to get prepared and then to practice procedures for short term and long term power outages and the reason is Russia.
There is a sad truth to what is below, the United States is not prepared and what is worse we are not declaring war to stop Russia either. Russia has hacked into U.S. government sites, hacked into corporate sites and hacked into the financial industry all without so much as a whimper as a U.S. reply. We have no countermeasures, we have no offensive measures and have not even written a strongly worded letter.
Russia has gone to the dragons against America, well actually to the Dragonflies and this is what you need to know and do. Remember the entire infrastructure is tied to SCADA, that includes water systems, transportation systems, water, hospitals, schools and retail.
Cyberespionage campaign stole information from targets and had the capability to launch sabotage operations.
An ongoing cyberespionage campaign against a range of targets, mainly in the energy sector, gave attackers the ability to mount sabotage operations against their victims. The attackers, known to Symantec as Dragonfly, managed to compromise a number of strategically important organizations for spying purposes and, if they had used the sabotage capabilities open to them, could have caused damage or disruption to energy supplies in affected countries.
Among the targets of Dragonfly were energy grid operators, major electricity generation firms, petroleum pipeline operators, and energy industry industrial equipment providers. The majority of the victims were located in the United States, Spain, France, Italy, Germany, Turkey, and Poland.
The Dragonfly group is well resourced, with a range of malware tools at its disposal and is capable of launching attacks through a number of different vectors. Its most ambitious attack campaign saw it compromise a number of industrial control system (ICS) equipment providers, infecting their software with a remote access-type Trojan. This caused companies to install the malware when downloading software updates for computers running ICS equipment. These infections not only gave the attackers a beachhead in the targeted organizations’ networks, but also gave them the means to mount sabotage operations against infected ICS computers.
This campaign follows in the footsteps of Stuxnet, which was the first known major malware campaign to target ICS systems. While Stuxnet was narrowly targeted at the Iranian nuclear program and had sabotage as its primary goal, Dragonfly appears to have a much broader focus with espionage and persistent access as its current objective with sabotage as an optional capability if required.
In addition to compromising ICS software, Dragonfly has used spam email campaigns and watering hole attacks to infect targeted organizations. The group has used two main malware tools: Backdoor.Oldrea and Trojan.Karagany. The former appears to be a custom piece of malware, either written by or for the attackers.
Prior to publication, Symantec notified affected victims and relevant national authorities, such as Computer Emergency Response Centers (CERTs) that handle and respond to Internet security incidents.
Background
The Dragonfly group, which is also known by other vendors as Energetic Bear, appears to have been in operation since at least 2011 and may have been active even longer than that. Dragonfly initially targeted defense and aviation companies in the US and Canada before shifting its focus mainly to US and European energy firms in early 2013.
The campaign against the European and American energy sector quickly expanded in scope. The group initially began sending malware in phishing emails to personnel in target firms. Later, the group added watering hole attacks to its offensive, compromising websites likely to be visited by those working in energy in order to redirect them to websites hosting an exploit kit. The exploit kit in turn delivered malware to the victim’s computer. The third phase of the campaign was the Trojanizing of legitimate software bundles belonging to three different ICS equipment manufacturers.
Dragonfly bears the hallmarks of a state-sponsored operation, displaying a high degree of technical capability. The group is able to mount attacks through multiple vectors and compromise numerous third party websites in the process. Dragonfly has targeted multiple organizations in the energy sector over a long period of time. Its current main motive appears to be cyberespionage, with potential for sabotage a definite secondary capability.
Analysis of the compilation timestamps on the malware used by the attackers indicate that the group mostly worked between Monday and Friday, with activity mainly concentrated in a nine-hour period that corresponded to a 9am to 6pm working day in the UTC +4 time zone. Based on this information, it is likely the attackers are based in Eastern Europe.
Figure. Top 10 countries by active infections (where attackers stole information from infected computers)
Tools employed
Dragonfly uses two main pieces of malware in its attacks. Both are remote access tool (RAT) type malware which provide the attackers with access and control of compromised computers. Dragonfly’s favored malware tool is Backdoor.Oldrea, which is also known as Havex or the Energetic Bear RAT. Oldrea acts as a back door for the attackers on to the victim’s computer, allowing them to extract data and install further malware.
Oldrea appears to be custom malware, either written by the group itself or created for it. This provides some indication of the capabilities and resources behind the Dragonfly group.
Once installed on a victim’s computer, Oldrea gathers system information, along with lists of files, programs installed, and root of available drives. It will also extract data from the computer’s Outlook address book and VPN configuration files. This data is then written to a temporary file in an encrypted format before being sent to a remote command-and-control (C&C) server controlled by the attackers.
The majority of C&C servers appear to be hosted on compromised servers running content management systems, indicating that the attackers may have used the same exploit to gain control of each server. Oldrea has a basic control panel which allows an authenticated user to download a compressed version of the stolen data for each particular victim.
The second main tool used by Dragonfly is Trojan.Karagany. Unlike Oldrea, Karagany was available on the underground market. The source code for version 1 of Karagany was leaked in 2010. Symantec believes that Dragonfly may have taken this source code and modified it for its own use. This version is detected by Symantec as Trojan.Karagany!gen1.
Karagany is capable of uploading stolen data, downloading new files, and running executable files on an infected computer. It is also capable of running additional plugins, such as tools for collecting passwords, taking screenshots, and cataloging documents on infected computers.
Symantec found that the majority of computers compromised by the attackers were infected with Oldrea. Karagany was only used in around 5 percent of infections. The two pieces of malware are similar in functionality and what prompts the attackers to choose one tool over another remains unknown.
Multiple attack vectors
The Dragonfly group has used at least three infection tactics against targets in the energy sector. The earliest method was an email campaign, which saw selected executives and senior employees in target companies receive emails containing a malicious PDF attachment. Infected emails had one of two subject lines: “The account” or “Settlement of delivery problem”. All of the emails were from a single Gmail address.
The spam campaign began in February 2013 and continued into June 2013. Symantec identified seven different organizations targeted in this campaign. The number of emails sent to each organization ranged from one to 84.
The attackers then shifted their focus to watering hole attacks, comprising a number of energy-related websites and injecting an iframe into each which redirected visitors to another compromised legitimate website hosting the Lightsout exploit kit. Lightsout exploits either Java or Internet Explorer in order to drop Oldrea or Karagany on the victim’s computer. The fact that the attackers compromised multiple legitimate websites for each stage of the operation is further evidence that the group has strong technical capabilities.
In September 2013, Dragonfly began using a new version of this exploit kit, known as the Hello exploit kit. The landing page for this kit contains JavaScript which fingerprints the system, identifying installed browser plugins. The victim is then redirected to a URL which in turn determines the best exploit to use based on the information collected.
Trojanized software
The most ambitious attack vector used by Dragonfly was the compromise of a number of legitimate software packages. Three different ICS equipment providers were targeted and malware was inserted into the software bundles they had made available for download on their websites. All three companies made equipment that is used in a number of industrial sectors, including energy.
The first identified Trojanized software was a product used to provide VPN access to programmable logic controller (PLC) type devices. The vendor discovered the attack shortly after it was mounted, but there had already been 250 unique downloads of the compromised software.
The second company to be compromised was a European manufacturer of specialist PLC type devices. In this instance, a software package containing a driver for one of its devices was compromised. Symantec estimates that the Trojanized software was available for download for at least six weeks in June and July 2013.
The third firm attacked was a European company which develops systems to manage wind turbines, biogas plants, and other energy infrastructure. Symantec believes that compromised software may have been available for download for approximately ten days in April 2014.
The Dragonfly group is technically adept and able to think strategically. Given the size of some of its targets, the group found a “soft underbelly” by compromising their suppliers, which are invariably smaller, less protected companies.
Two additional links are below for more information and key use.
The Senate passed an immigration bill but it was such a lousy bill it failed to be considered by the House. The Dream Act failed in both Houses of Congress so Barack Obama initiated the DACA executive order. Now that a new Congress is about to be seated, Obama demands a new revolutionary immigration policy law or he is going to use his pen to sign executive action giving amnesty and refugee status to millions.
Examining some historical facts and political machinations are important for perspective on the immigration mindset of the White House.
The Border Patrol’s annual statistics were posted on the U.S. Customs and Border Protection Web site for about five hours on Oct. 10, then taken down. But Customs and Border Protection spokesman Christopher O’Neil said in an e-mail that the decision to remove the briefly released data had nothing to do with the midterm elections. Rather, he said, it was an effort to provide all of the agency’s statistics — and not just the Border Patrol’s — “in one concise and comprehensive package.”
Using slides to illustrate his remarks at the Center for Strategic and International Studies on Oct. 9, Johnson announced that the Border Patrol had made 479,377 apprehensions last year on the border. He saluted CBP for recently making public an internal report and new policy on the agency’s use of force. And he underscored “a commitment to transparency.”
The new annual statistics were posted and taken down within hours the next day.
Then there are the Morton Memos and they include the edict for discretion on prosecuting criminal illegals and deportation going back 3-4 years.
A memo in full text is found here. Text in part is below demonstrating where immigration laws are not being enforced.
One of ICE’s central responsibilities is to enforce the nation’s civil immigration laws in coordination with U.S. Customs and Border Protection (CBP) and U.S. Citizenship and Immigration Services (USCIS). ICE, however, has limited resources to remove those illegally in the United States. ICE must prioritize the use of its enforcement personnel, detention space, and removal assets to ensure that the aliens it removes represent, as much as reasonably possible, the agency’s enforcement priorities, namely the promotion of national security, border security, public safety, and the integrity of the immigration system. These priorities are outlined in the ICE Civil Immigration Enforcement Priorities memorandum of March 2,2011, which this memorandum is intended to support.
Because the agency is confronted with more administrative violations than its resources can address, the agency must regularly exercise “prosecutorial discretion” if it is to prioritize its efforts. In basic terms, prosecutorial discretion is the authority of an agency charged with enforcing a law to decide to what degree to enforce the law against a particular individual. ICE, like any other law enforcement agency, has prosecutorial discretion and may exercise “it in the ordinary course of enforcement1.When ICE favorably exercises prosecutorial discretion, it essentially decides not to assert the full scope of the enforcement authority available to the agency in a given case.
When weighing whether an exercise of prosecutorial discretion may be warranted for a given . alien, ICE officers, agents, and attorneys should consider all relevant factors, including, but not limited to
the agency’s civil immigration enforcement priorities;
the person’s length of presence in the United States, with particular consideration given to presence while in lawful status;
the circumstances of the person’s arrival in the United States and the manner of his or her entry, particularly if the alien came to the United States as a young child;
the person’s pursuit of education in the United States, with particular consideration given to those who have graduated from a U.S. high school or have successfully pursued or are pursuing a college or advanced degrees at a legitimate institution of higher education in the United States;
whether the person, or the person’s immediate relative, has served in the U.S. military, reserves, or national guard, with particular consideration given to those who served in combat;
the person’s criminal history, including arrests, prior convictions, or outstanding arrest warrants;
the person’s immigration history, including any prior removal, outstanding order of removal, prior denial of status, or evidence of fraud;
whether the person poses a national security or public safety concern;
the person’s ties and contributions to the community, including family relationships;
the person’s ties to the home country and condition~ in the country;
the person’s age, with particular consideration given to minors and the elderly;
whether the person has a U.S. citizen or permanent resident spouse, child, or parent;
whether the person is the primary caretaker ofa person with a mental or physical disability, minor, or seriously ill relative; ;
whether the person or the person’s spouse is pregnant or nursing;
whether the person or the person’s spouse suffers from severe mental or physical illness;
whether the person’s nationality renders removal unlikely;
Whether the person is likely to be granted temporary or permanent status or other relief from removal, including as a relative of a U.S. citizen or permanent resident;
whether the person is likely to be granted temporary or permanent status or other relief from removal, including as an asylum seeker, or a victim of domestic violence, human trafficking, or other crime; . and .
whether the person is currently cooperating or has cooperated with federal, state or local law enforcement authorities, such as ICE, the U.S Attorneys or Department of Justice, the Department of Labor, or National Labor Relations Board, among others.
We know that Islamic terror groups have been using chemical weapons to kill. We know they have been using prison tactics of the Holocaust to kill. We know they have been shooting with weapons to kill and we know they have been torturing and beheading without hesitation.
We need to know beyond the use of sophistication of global social media by al Nusra, al Qaeda and Daesh (ISIS), we must also come to understand the wide range of their knowledge and use of all internet applications against their enemies.
1. The terror networks know what countries pay ransom, how much they pay and who specifically to reach for negotiations.
2. The terror networks know how to match photos with dates and locations using Google features.
3. The terror networks know how to use LinkedIn, PowerPoint, Bots, thumb-drives.
4. The terror networks use an all cash financial system to avoid global banking tracing and tracking.
5. The terror networks know how to build address books, alter usernames and passwords on the fly and hide IP addresses.
6. The terror networks have members, fighters, technicians, tech geeks, bomb-makers, engineers, pilots, software programmers, tactical war-planners and smuggling access to anything.
7. The terror networks are effective at kidnapping, theft, buying and selling, investments, pysops, torture and have a tremendous knowledge of history.
8. The terror networks are smarter than you and smarter than you give them credit for being. They are adaptive, flexible, mobile, crafty and patient.
When it comes to kidnapping, torture, prison, waterboarding and beheading, this is a must read.
ISIS Hostages Endured Torture and Dashed Hopes, Freed Cellmates Say
By RUKMINI CALLIMACHI
The hostages were taken out of their cell one by one.
In a private room, their captors asked each of them three intimate questions, a standard technique used to obtain proof that a prisoner is still alive in a kidnapping negotiation.
James Foley returned to the cell he shared with nearly two dozen other Western hostages and collapsed in tears of joy. The questions his kidnappers had asked were so personal (“Who cried at your brother’s wedding?” “Who was the captain of your high school soccer team?”) that he knew they were finally in touch with his family.
It was December 2013, and more than a year had passed since Mr. Foley vanished on a road in northern Syria. Finally, his worried parents would know he was alive, he told his fellow captives. His government, he believed, would soon negotiate his release.
What appeared to be a turning point was in fact the start of a downward spiral for Mr. Foley, a 40-year-old journalist, that ended in August when he was forced to his knees somewhere in the bald hills of Syria and beheaded as a camera rolled.
His videotaped death was a very public end to a hidden ordeal.
The story of what happened in the Islamic State’s underground network of prisons in Syria is one of excruciating suffering. Mr. Foley and his fellow hostages were routinely beaten and subjected to waterboarding. For months, they were starved and threatened with execution by one group of fighters, only to be handed off to another group that brought them sweets and contemplated freeing them. The prisoners banded together, playing games to pass the endless hours, but as conditions grew more desperate, they turned on one another. Some, including Mr. Foley, sought comfort in the faith of their captors, embracing Islam and taking Muslim names.
Their captivity coincided with the rise of the group that came to be known as the Islamic State out of the chaos of the Syrian civil war. It did not exist on the day Mr. Foley was abducted, but it slowly grew to become the most powerful and feared rebel movement in the region. By the second year of Mr. Foley’s imprisonment, the group had amassed close to two dozen hostages and devised a strategy to trade them for cash.
It was at that point that the hostages’ journeys, which had been largely similar up to then, diverged based on actions taken thousands of miles away: in Washington and Paris, in Madrid, Rome and beyond. Mr. Foley was one of at least 23 Western hostages from 12 countries, a majority of them citizens of European nations whose governments have a history of paying ransoms.
Their struggle for survival, which is being told now for the first time, was pieced together through interviews with five former hostages, locals who witnessed their treatment, relatives and colleagues of the captives, and a tight circle of advisers who made trips to the region to try to win their release. Crucial details were confirmed by a former member of the Islamic State, also known as ISIS, who was initially stationed in the prison where Mr. Foley was held, and who provided previously unknown details of his captivity.
The ordeal has remained largely secret because the militants warned the hostages’ families not to go to the news media, threatening to kill their loved ones if they did. The New York Times is naming only those already identified publicly by the Islamic State, which began naming them in August.
Officials in the United States say they did everything in their power to save Mr. Foley and the others, including carrying out a failed rescue operation. They argue that the United States’ policy of not paying ransoms saves Americans’ lives in the long run by making them less attractive targets.
Inside their concrete box, the hostages did not know what their families or governments were doing on their behalf. They slowly pieced it together using the only information they had: their interactions with their guards and with one another. Mostly they suffered, waiting for any sign that they might escape with their lives.
The Grab
It was only a 40-minute drive to the Turkish border, but Mr. Foley decided to make one last stop.
In Binesh, Syria, two years ago, Mr. Foley and his traveling companion, the British photojournalist John Cantlie, pulled into an Internet cafe to file their work. The two were no strangers to the perils of reporting in Syria. Only a few months earlier, Mr. Cantlie had been kidnapped a few dozen miles from Binesh. He had tried to escape, barefoot and handcuffed, running for his life as bullets kicked up the dirt, only to be caught again. He was released a week later after moderate rebels intervened.
They were uploading their images when a man walked in.
“He had a big beard,” said Mustafa Ali, their Syrian translator, who was with them and recounted their final hours together. “He didn’t smile or say anything. And he looked at us with evil eyes.”
The man “went to the computer and sat for one minute only, and then left directly,” Mr. Ali said. “He wasn’t Syrian. He looked like he was from the Gulf.”
Mr. Foley, an American freelance journalist filing for GlobalPost and Agence France-Presse, and Mr. Cantlie, a photographer for British newspapers, continued transmitting their footage, according to Mr. Ali, whose account was confirmed by emails the journalists sent from the cafe to a colleague waiting for them in Turkey.
More than an hour later, they flagged a taxi for the 25-mile drive to Turkey. They never reached the border.
The gunmen who sped up behind their taxi did not call themselves the Islamic State because the group did not yet exist on Nov. 22, 2012, the day the two men were grabbed.
But the danger of Islamic extremism was already palpable in Syria’s rebel-held territories, and some news organizations were starting to pull back. Among the red flags was the growing number of foreign fighters flooding into Syria, dreaming of establishing a “caliphate.” These jihadists, many of them veterans of Al Qaeda’s branch in Iraq, looked and behaved differently from the moderate rebels. They wore their beards long. And they spoke with foreign accents, coming from the Persian Gulf, North Africa, Europe and beyond.
A van sped up on the left side of the taxi and cut it off. Masked fighters jumped out. They screamed in foreign-accented Arabic, telling the journalists to lie on the pavement. They handcuffed them and threw them into the van.
They left Mr. Ali on the side of the road. “If you follow us, we’ll kill you,” they told him.
Over the next 14 months, at least 23 foreigners, most of them freelance journalists and aid workers, would fall into a similar trap. The attackers identified the locals whom journalists hired to help them, like Mr. Ali and Yosef Abobaker, a Syrian translator. It was Mr. Abobaker who drove Steven J. Sotloff, an American freelance journalist, into Syria on Aug. 4, 2013.
“We were driving for only 20 minutes when I saw three cars stopped on the road ahead,” he said. “They must have had a spy on the border that saw my car and told them I was coming.”
The kidnappings, which were carried out by different groups of fighters jousting for influence and territory in Syria, became more frequent. In June 2013, four French journalists were abducted. In September, the militants grabbed three Spanish journalists.
Checkpoints became human nets, and last October, insurgents waited at one for Peter Kassig, 25, an emergency medical technician from Indianapolis who was delivering medical supplies. In December, Alan Henning, a British taxi driver, disappeared at another. Mr. Henning had cashed in his savings to buy a used ambulance, hoping to join an aid caravan to Syria. He was kidnapped 30 minutes after crossing into the country.
The last to vanish were five aid workers from Doctors Without Borders, who were plucked in January from the field hospital in rural Syria where they had been working.
The Interrogation
At gunpoint, Mr. Sotloff and Mr. Abobaker were driven to a textile factory in a village outside Aleppo, Syria, where they were placed in separate cells. Mr. Abobaker, who was freed two weeks later, heard their captors take Mr. Sotloff into an adjoining room.
Then he heard the Arabic-speaking interrogator say in English: “Password.”
It was a process to be repeated with several other hostages. The kidnappers seized their laptops, cellphones and cameras and demanded the passwords to their accounts. They scanned their Facebook timelines, their Skype chats, their image archives and their emails, looking for evidence of collusion with Western spy agencies and militaries.
“They took me to a building that was specifically for the interrogation,” said Marcin Suder, a 37-year-old Polish photojournalist kidnapped in July 2013 in Saraqib, Syria, where the jihadists were known to be operating. He was passed among several groups before managing to escape four months later.
“They checked my camera,” Mr. Suder said. “They checked my tablet. Then they undressed me completely. I was naked. They looked to see if there was a GPS chip under my skin or in my clothes. Then they started beating me. They Googled ‘Marcin Suder and C.I.A.,’ ‘Marcin Suder and K.G.B.’ They accused me of being a spy.”
Mr. Suder — who was never told the name of the group holding him, and who never met the other hostages because he escaped before they were transferred to the same location — remarked on the typically English vocabulary his interrogators had used.
During one session, they kept telling him he had been “naughty” — a word that hostages who were held with Mr. Foley also recalled their guards’ using during the most brutal torture.
It was in the course of these interrogations that the jihadists found images of American military personnel on Mr. Foley’s laptop, taken during his assignments in Afghanistan and Iraq.
“In the archive of photographs he had personally taken, there were images glorifying the American crusaders,” they wrote in an article published after Mr. Foley’s death. “Alas for James, this archive was with him at the time of his arrest.”
A British hostage, David Cawthorne Haines, was forced to acknowledge his military background: It was listed on his LinkedIn profile.
The militants also discovered that Mr. Kassig, the aid worker from Indiana, was a former Army Ranger and a veteran of the Iraq war. Both facts are easy to find online, because CNN featured Mr. Kassig’s humanitarian work prominently before his capture.
The punishment for any perceived offense was torture.
“You could see the scars on his ankles,” Jejoen Bontinck, 19, of Belgium, a teenage convert to Islam who spent three weeks in the summer of 2013 in the same cell as Mr. Foley, said of him. “He told me how they had chained his feet to a bar and then hung the bar so that he was upside down from the ceiling. Then they left him there.”
Mr. Bontinck, who was released late last year, spoke about his experiences for the first time for this article in his hometown, Antwerp, where he is one of 46 Belgian youths on trial on charges of belonging to a terrorist organization.
At first, the abuse did not appear to have a larger purpose. Nor did the jihadists seem to have a plan for their growing number of hostages.
Mr. Bontinck said Mr. Foley and Mr. Cantlie had first been held by the Nusra Front, a Qaeda affiliate. Their guards, an English-speaking trio whom they nicknamed “the Beatles,” seemed to take pleasure in brutalizing them.
Later, they were handed over to a group called the Mujahedeen Shura Council, led by French speakers.
Mr. Foley and Mr. Cantlie were moved at least three times before being transferred to a prison underneath the Children’s Hospital of Aleppo.
It was in this building that Mr. Bontinck, then only 18, met Mr. Foley. At first, Mr. Bontinck was a fighter, one of thousands of young Europeans drawn to the promise of jihad. He later ran afoul of the group when he received a text message from his worried father back in Belgium and his commander accused him of being a spy.
The militants dragged him into a basement room with pale brown walls. Inside were two very thin, bearded foreigners: Mr. Foley and Mr. Cantlie.
For the next three weeks, when the call to prayer sounded, all three stood.
Mr. Foley converted to Islam soon after his capture and adopted the name Abu Hamza, Mr. Bontinck said. (His conversion was confirmed by three other recently released hostages, as well as by his former employer.)
“I recited the Quran with him,” Mr. Bontinck said. “Most people would say, ‘Let’s convert so that we can get better treatment.’ But in his case, I think it was sincere.”
Former hostages said that a majority of the Western prisoners had converted during their difficult captivity. Among them was Mr. Kassig, who adopted the name Abdul-Rahman, according to his family, who learned of his conversion in a letter smuggled out of the prison.
Only a handful of the hostages stayed true to their own faiths, including Mr. Sotloff, then 30, a practicing Jew. On Yom Kippur, he told his guards he was not feeling well and refused his food so he could secretly observe the traditional fast, a witness said.
Those recently released said that most of the foreigners had converted under duress, but that Mr. Foley had been captivated by Islam. When the guards brought an English version of the Quran, those who were just pretending to be Muslims paged through it, one former hostage said. Mr. Foley spent hours engrossed in the text.
His first set of guards, from the Nusra Front, viewed his professed Islamic faith with suspicion. But the second group holding him seemed moved by it. For an extended period, the abuse stopped. Unlike the Syrian prisoners, who were chained to radiators, Mr. Foley and Mr. Cantlie were able to move freely inside their cell.
Mr. Bontinck had a chance to ask the prison’s emir, a Dutch citizen, whether the militants had asked for a ransom for the foreigners. He said they had not.
“He explained there was a Plan A and a Plan B,” Mr. Bontinck said. The journalists would be put under house arrest, or they would be conscripted into a jihadist training camp. Both possibilities suggested that the group was planning to release them.
One day, their guards brought them a gift of chocolates.
When Mr. Bontinck was released, he jotted down the phone number of Mr. Foley’s parents and promised to call them. They made plans to meet again.
He left thinking that the journalists, like him, would soon be freed.
A Terrorist State
The Syrian civil war, previously dominated by secular rebels and a handful of rival jihadist groups, was shifting decisively, and the new extremist group had taken a dominant position. Sometime last year, the battalion in the Aleppo hospital pledged allegiance to what was then called the Islamic State in Iraq and Syria.
Other factions of fighters joined forces with the group, whose tactics were so extreme that even Al Qaeda expelled it from its terror network. Its ambitions went far beyond toppling Bashar al-Assad, Syria’s president.
Late last year, the jihadists began pooling their prisoners, bringing them to the same location underneath the hospital. By January, there were at least 19 men in one 20-square-meter cell (about 215 square feet) and four women in an adjoining one. All but one of them were European or North American. The relative freedom that Mr. Foley and Mr. Cantlie had enjoyed came to an abrupt end. Each prisoner was now handcuffed to another.
More worrying was the fact that their French-speaking guards were replaced by English-speaking ones. Mr. Foley recognized them with dread.