Mexico, a Deadly State

The entire government of Mexico is infiltrated by barbaric drug cartels. We don’t hear much news about Mexico due mostly in part to journalists and media being kidnapped or killed. Mexico is a failed state, it is lawless and the leadership is morally bankrupt. Mexico is gruesome and that must be understood. Where is that ubiquitous United Nations Human Rights Council?

In 2013, the Bodies were headless and buried.

According to Mexico’s Attorney General’s Office, conflict between organized criminal groups has resulted in the beheading of 1,303 people in five years, a grisly tactic becoming the hallmark of the war between the country’s cartels.

El Universal reported that decapitations steadily increased during President Felipe Calderon’s term in office: just 32 beheadings were registered in 2007, while 2011 registered 493 such deaths between January and November.

The count will likely be similarly high for 2012. Last May saw the discovery of 49 headless and dismembered bodies in Nuevo Leon state, attributed to the Zetas, who are closely associated with the tactic.

MEXICO CITY, May 20 (Reuters) – Mexican soldiers have arrested an alleged perpetrator of the massacre of 49 people whose corpses were decapitated, dismembered and dumped on a highway last week.

Daniel Elizondo, alias “The Madman,” a leader of the Zetas drug cartel, was detained in the northern state of Nuevo Leon, a spokesman for the army said Sunday.

The list is long.

But the most recent outrage has sparked protests across Mexico and are calling fro President Nieto to resign over the missing students.

Federal police are investigating a case of 43 missing students last seen being put into police vehicles. Widespread protests have criticized the government’s handling of the case.

Protests occurred Nov. 8 throughout Mexico including the capital and the state of Guerrero. A group in Mexico City broke off from the main protest and tried to storm the ceremonial presidential palace. Hundreds descended on the Guerrero government headquarters, burning several vehicles.

“Ya me canse (I’ve had enough).” Jesus Murillo   

The comments by Murillo Nov. 7 at the end of press conference helped spark protests the next day. #YaMeCanse and #estoycansado were among the most trending Twitter hashtags in Mexico.

 

“We received a group of about 40 people… Some of them were unconscious or already dead.” 

Three suspects confessed to killing the students at a garbage dump in a video released by the attorney general’s office Nov. 7. The suspects said they burned the bodies using tires, logs and gasoline before putting the remains in trash bags and dumping them in a river. Authorities are testing bags they recovered.

Chilling video of gang members confessing to mass murder of missing Mexican students
Tens of thousands of people marched in Mexico City on Nov. 5 in protest of the government's inability to find the missing students 40 days after they were abducted. Some protesters have started to call for Mexican President Enrique Pena Nieto to resign.Copyright 2014 Reuters

Tens of thousands of people marched in Mexico City on Nov. 5 in protest of the government’s inability to find the missing students 40 days after they were abducted. Some protesters have started to call for Mexican President Enrique Pena Nieto to resign.

Iguala, Guerrero, Mexico

The students were last seen Sept. 26 in Iguala, Guerrero, during protests over job discrimination against rural teachers. Police opened fire on their buses. Six people died and more than 20 were wounded. 43 students were taken away, and were last seen being bundled into police vans.

©Mapbox ©OpenStreetMap Improve this map
Mass grave found in Mexican town where 43 students went missing
Mass grave found near Mexico town
Mass graves with charred victims found in southern Mexico
Iguala Mayor Jose Luis Abarca (pictured) and wife Maria de los Angeles Pineda were arrested early Nov. 4 after evading police for weeks. Mexico's attorney general called the pair "the probable masterminds" behind the disappearance of the students. They were found in rented accommodation in Mexico City.Copyright 2014 Reuters

Iguala Mayor Jose Luis Abarca (pictured) and wife Maria de los Angeles Pineda were arrested early Nov. 4 after evading police for weeks. Mexico’s attorney general called the pair “the probable masterminds” behind the disappearance of the students. They were found in rented accommodation in Mexico City.

Mexican mayor, wife arrested in case of missing students
José Ramón Salinas on Twitter: “Confirmada la detención en el DF por Policía Federal de José Luis Abarca y esposa.”

AG Jesus Murillo believes the mayor and his wife gave orders to police the day of the shootings and disappearances. Police shot and killed a student, and detained others before handing them over to the Guerreros Unidos gang, Murillo said. Sidronio Casarrubias, the gang’s leader, was arrested a week earlier.

Guerrero Gov. Angel Aguirre, 58, quit his post through a leave of absence Oct. 23 “to favor the political climate” after outcry over the disappearances and mass graves. He could not resign, according to Mexican law. Guerrero’s Congress elected Rogelio Ortega Oct. 26 to replace him through 2015.

Authorities arrested four suspected members of the Guerreros Unidos gang on Oct. 27. Dozens of police with ties to the gang have also been arrested. Several mass graves have been found in the aftermath of the students’ disappearance, but none contained the remains of the missing young people.

The Mexican government said Oct. 19 that federal police assumed control 13 towns within a 125-mile radius of Iguala, Guerrero. Police departments in those towns are under investigation for the students’ disappearance. The government announced Oct. 20 a reward of $111,000 for information on the students.

Dragonfly vs. America, Courtesy of Russia

Can you live without electricity for a day or two? Yes of course if you in advance right? Can you live without power for a week or so? Yes of course with advanced notice right? Can you live without power for a month, 4 months or 18 months? NOPE. It is time to not only think about preparations, but to get prepared and then to practice procedures for short term and long term power outages and the reason is Russia.

There is a sad truth to what is below, the United States is not prepared and what is worse we are not declaring war to stop Russia either. Russia has hacked into U.S. government sites, hacked into corporate sites and hacked into the financial industry all without so much as a whimper as a U.S. reply. We have no countermeasures, we have no offensive measures and have not even written a strongly worded letter.

 

Russia has gone to the dragons against America, well actually to the Dragonflies and this is what you need to know and do. Remember the entire infrastructure is tied to SCADA, that includes water systems, transportation systems, water, hospitals, schools and retail.

Dragonfly: Western Energy Companies Under Sabotage Threat

Cyberespionage campaign stole information from targets and had the capability to launch sabotage operations.

An ongoing cyberespionage campaign against a range of targets, mainly in the energy sector, gave attackers the ability to mount sabotage operations against their victims. The attackers, known to Symantec as Dragonfly, managed to compromise a number of strategically important organizations for spying purposes and, if they had used the sabotage capabilities open to them, could have caused damage or disruption to energy supplies in affected countries.

Among the targets of Dragonfly were energy grid operators, major electricity generation firms, petroleum pipeline operators, and energy industry industrial equipment providers. The majority of the victims were located in the United States, Spain, France, Italy, Germany, Turkey, and Poland.

The Dragonfly group is well resourced, with a range of malware tools at its disposal and is capable of launching attacks through a number of different vectors. Its most ambitious attack campaign saw it compromise a number of industrial control system (ICS) equipment providers, infecting their software with a remote access-type Trojan. This caused companies to install the malware when downloading software updates for computers running ICS equipment. These infections not only gave the attackers a beachhead in the targeted organizations’ networks, but also gave them the means to mount sabotage operations against infected ICS computers.

This campaign follows in the footsteps of Stuxnet, which was the first known major malware campaign to target ICS systems. While Stuxnet was narrowly targeted at the Iranian nuclear program and had sabotage as its primary goal, Dragonfly appears to have a much broader focus with espionage and persistent access as its current objective with sabotage as an optional capability if required.

In addition to compromising ICS software, Dragonfly has used spam email campaigns and watering hole attacks to infect targeted organizations. The group has used two main malware tools: Backdoor.Oldrea and Trojan.Karagany. The former appears to be a custom piece of malware, either written by or for the attackers.

Prior to publication, Symantec notified affected victims and relevant national authorities, such as Computer Emergency Response Centers (CERTs) that handle and respond to Internet security incidents.

Background
The Dragonfly group, which is also known by other vendors as Energetic Bear, appears to have been in operation since at least 2011 and may have been active even longer than that. Dragonfly initially targeted defense and aviation companies in the US and Canada before shifting its focus mainly to US and European energy firms in early 2013.

The campaign against the European and American energy sector quickly expanded in scope. The group initially began sending malware in phishing emails to personnel in target firms. Later, the group added watering hole attacks to its offensive, compromising websites likely to be visited by those working in energy in order to redirect them to websites hosting an exploit kit. The exploit kit in turn delivered malware to the victim’s computer. The third phase of the campaign was the Trojanizing of legitimate software bundles belonging to three different ICS equipment manufacturers.

Dragonfly bears the hallmarks of a state-sponsored operation, displaying a high degree of technical capability. The group is able to mount attacks through multiple vectors and compromise numerous third party websites in the process. Dragonfly has targeted multiple organizations in the energy sector over a long period of time. Its current main motive appears to be cyberespionage, with potential for sabotage a definite secondary capability.

Analysis of the compilation timestamps on the malware used by the attackers indicate that the group mostly worked between Monday and Friday, with activity mainly concentrated in a nine-hour period that corresponded to a 9am to 6pm working day in the UTC +4 time zone. Based on this information, it is likely the attackers are based in Eastern Europe.

figure1_9.png
Figure. Top 10 countries by active infections (where attackers stole information from infected computers)

Tools employed
Dragonfly uses two main pieces of malware in its attacks. Both are remote access tool (RAT) type malware which provide the attackers with access and control of compromised computers. Dragonfly’s favored malware tool is Backdoor.Oldrea, which is also known as Havex or the Energetic Bear RAT. Oldrea acts as a back door for the attackers on to the victim’s computer, allowing them to extract data and install further malware.

Oldrea appears to be custom malware, either written by the group itself or created for it. This provides some indication of the capabilities and resources behind the Dragonfly group.

Once installed on a victim’s computer, Oldrea gathers system information, along with lists of files, programs installed, and root of available drives. It will also extract data from the computer’s Outlook address book and VPN configuration files. This data is then written to a temporary file in an encrypted format before being sent to a remote command-and-control (C&C) server controlled by the attackers.

The majority of C&C servers appear to be hosted on compromised servers running content management systems, indicating that the attackers may have used the same exploit to gain control of each server. Oldrea has a basic control panel which allows an authenticated user to download a compressed version of the stolen data for each particular victim.

The second main tool used by Dragonfly is Trojan.Karagany. Unlike Oldrea, Karagany was available on the underground market. The source code for version 1 of Karagany was leaked in 2010. Symantec believes that Dragonfly may have taken this source code and modified it for its own use. This version is detected by Symantec as Trojan.Karagany!gen1.

Karagany is capable of uploading stolen data, downloading new files, and running executable files on an infected computer. It is also capable of running additional plugins, such as tools for collecting passwords, taking screenshots, and cataloging documents on infected computers.

Symantec found that the majority of computers compromised by the attackers were infected with Oldrea. Karagany was only used in around 5 percent of infections. The two pieces of malware are similar in functionality and what prompts the attackers to choose one tool over another remains unknown.

Multiple attack vectors
The Dragonfly group has used at least three infection tactics against targets in the energy sector. The earliest method was an email campaign, which saw selected executives and senior employees in target companies receive emails containing a malicious PDF attachment. Infected emails had one of two subject lines: “The account” or “Settlement of delivery problem”. All of the emails were from a single Gmail address.

The spam campaign began in February 2013 and continued into June 2013. Symantec identified seven different organizations targeted in this campaign. The number of emails sent to each organization ranged from one to 84.

The attackers then shifted their focus to watering hole attacks, comprising a number of energy-related websites and injecting an iframe into each which redirected visitors to another compromised legitimate website hosting the Lightsout exploit kit. Lightsout exploits either Java or Internet Explorer in order to drop Oldrea or Karagany on the victim’s computer. The fact that the attackers compromised multiple legitimate websites for each stage of the operation is further evidence that the group has strong technical capabilities.

In September 2013, Dragonfly began using a new version of this exploit kit, known as the Hello exploit kit. The landing page for this kit contains JavaScript which fingerprints the system, identifying installed browser plugins. The victim is then redirected to a URL which in turn determines the best exploit to use based on the information collected.

Trojanized software
The most ambitious attack vector used by Dragonfly was the compromise of a number of legitimate software packages. Three different ICS equipment providers were targeted and malware was inserted into the software bundles they had made available for download on their websites. All three companies made equipment that is used in a number of industrial sectors, including energy.

The first identified Trojanized software was a product used to provide VPN access to programmable logic controller (PLC) type devices. The vendor discovered the attack shortly after it was mounted, but there had already been 250 unique downloads of the compromised software.

The second company to be compromised was a European manufacturer of specialist PLC type devices. In this instance, a software package containing a driver for one of its devices was compromised. Symantec estimates that the Trojanized software was available for download for at least six weeks in June and July 2013.

The third firm attacked was a European company which develops systems to manage wind turbines, biogas plants, and other energy infrastructure. Symantec believes that compromised software may have been available for download for approximately ten days in April 2014.

The Dragonfly group is technically adept and able to think strategically. Given the size of some of its targets, the group found a “soft underbelly” by compromising their suppliers, which are invariably smaller, less protected companies.

Two additional links are below for more information and key use.

http://energy.gov/sites/prod/files/Large%20Power%20Transformer%20Study%20-%20June%202012_0.pdf

http://www.fgdc.gov/usng/

 

 

 

Immigration: Morton, Johnson, Holder and the White House

The Senate passed an immigration bill but it was such a lousy bill it failed to be considered by the House. The Dream Act failed in both Houses of Congress so Barack Obama initiated the DACA executive order. Now that a new Congress is about to be seated, Obama demands a new revolutionary immigration policy law or he is going to use his pen to sign executive action giving amnesty and refugee status to millions.

Examining some historical facts and political machinations are important for perspective on the immigration mindset of the White House.

The Border Patrol’s annual statistics were posted on the U.S. Customs and Border Protection Web site for about five hours on Oct. 10, then taken down. But Customs and Border Protection spokesman Christopher O’Neil said in an e-mail that the decision to remove the briefly released data had nothing to do with the midterm elections. Rather, he said, it was an effort to provide all of the agency’s statistics — and not just the Border Patrol’s — “in one concise and comprehensive package.”

Using slides to illustrate his remarks at the Center for Strategic and International Studies on Oct. 9, Johnson announced that the Border Patrol had made 479,377 apprehensions last year on the border. He saluted CBP for recently making public an internal report and new policy on the agency’s use of force. And he underscored “a commitment to transparency.”

The new annual statistics were posted and taken down within hours the next day.

 

Then there are the Morton Memos and they include the edict for discretion on prosecuting criminal illegals and deportation going back 3-4 years.

A memo in full text is found here. Text in part is below demonstrating where immigration laws are not being enforced.

One of ICE’s central responsibilities is to enforce the nation’s civil immigration laws in coordination with U.S. Customs and Border Protection (CBP) and U.S. Citizenship and Immigration Services (USCIS). ICE, however, has limited resources to remove those illegally in the United States. ICE must prioritize the use of its enforcement personnel, detention space, and removal assets to ensure that the aliens it removes represent, as much as reasonably possible, the agency’s enforcement priorities, namely the promotion of national security, border security, public safety, and the integrity of the immigration system. These priorities are outlined in the ICE Civil Immigration Enforcement Priorities memorandum of March 2,2011, which this memorandum is intended to support.

Because the agency is confronted with more administrative violations than its resources can address, the agency must regularly exercise “prosecutorial discretion” if it is to prioritize its efforts. In basic terms, prosecutorial discretion is the authority of an agency charged with enforcing a law to decide to what degree to enforce the law against a particular individual. ICE, like any other law enforcement agency, has prosecutorial discretion and may exercise “it in the ordinary course of enforcement1.When ICE favorably exercises prosecutorial discretion, it essentially decides not to assert the full scope of the enforcement authority available to the agency in a given case.

 

When weighing whether an exercise of prosecutorial discretion may be warranted for a given . alien, ICE officers, agents, and attorneys should consider all relevant factors, including, but not limited to

  • the agency’s civil immigration enforcement priorities;
  • the person’s length of presence in the United States, with particular consideration given to presence while in lawful status;
  • the circumstances of the person’s arrival in the United States and the manner of his or her entry, particularly if the alien came to the United States as a young child;
  • the person’s pursuit of education in the United States, with particular consideration given to those who have graduated from a U.S. high school or have successfully pursued or are pursuing a college or advanced degrees at a legitimate institution of higher education in the United States;
  • whether the person, or the person’s immediate relative, has served in the U.S. military, reserves, or national guard, with particular consideration given to those who served in combat;
  • the person’s criminal history, including arrests, prior convictions, or outstanding arrest warrants;
  • the person’s immigration history, including any prior removal, outstanding order of removal, prior denial of status, or evidence of fraud;
  • whether the person poses a national security or public safety concern;
  • the person’s ties and contributions to the community, including family relationships;
  • the person’s ties to the home country and condition~ in the country;
  • the person’s age, with particular consideration given to minors and the elderly;
  • whether the person has a U.S. citizen or permanent resident spouse, child, or parent;
  • whether the person is the primary caretaker ofa person with a mental or physical disability, minor, or seriously ill relative; ;
  • whether the person or the person’s spouse is pregnant or nursing;
  • whether the person or the person’s spouse suffers from severe mental or physical illness;
  • whether the person’s nationality renders removal unlikely;
  • Whether the person is likely to be granted temporary or permanent status or other relief from removal, including as a relative of a U.S. citizen or permanent resident;
  • whether the person is likely to be granted temporary or permanent status or other relief from removal, including as an asylum seeker, or a victim of domestic violence, human trafficking, or other crime; . and .
  • whether the person is currently cooperating or has cooperated with federal, state or local law enforcement authorities, such as ICE, the U.S Attorneys or Department of Justice, the Department of Labor, or National Labor Relations Board, among others.

Islamic State: Tech Savvy, Tactical, Barbaric

We know that Islamic terror groups have been using chemical weapons to kill. We know they have been using prison tactics of the Holocaust to kill. We know they have been shooting with weapons to kill and we know they have been torturing and beheading without hesitation.

We need to know beyond the use of sophistication of global social media by al Nusra, al Qaeda and Daesh (ISIS), we must also come to understand the wide range of their knowledge and use of all internet applications against their enemies.

1. The terror networks know what countries pay ransom, how much they pay and who specifically to reach for negotiations.

2. The terror networks know how to match photos with dates and locations using Google features.

3. The terror networks know how to use LinkedIn, PowerPoint, Bots, thumb-drives.

4. The terror networks use an all cash financial system to avoid global banking tracing and tracking.

5. The terror networks know how to build address books, alter usernames and passwords on the fly and hide IP addresses.

6. The terror networks have members, fighters, technicians, tech geeks, bomb-makers, engineers, pilots, software programmers, tactical war-planners and smuggling access to anything.

7. The terror networks are effective at kidnapping, theft, buying and selling, investments, pysops, torture and have a tremendous knowledge of history.

8. The terror networks are smarter than you and smarter than you give them credit for being. They are adaptive, flexible, mobile, crafty and patient.

When it comes to kidnapping, torture, prison, waterboarding and beheading, this is a must read.

 

 

The Horror Before the Beheadings

ISIS Hostages Endured Torture and Dashed Hopes, Freed Cellmates Say

The hostages were taken out of their cell one by one.

In a private room, their captors asked each of them three intimate questions, a standard technique used to obtain proof that a prisoner is still alive in a kidnapping negotiation.

James Foley returned to the cell he shared with nearly two dozen other Western hostages and collapsed in tears of joy. The questions his kidnappers had asked were so personal (“Who cried at your brother’s wedding?” “Who was the captain of your high school soccer team?”) that he knew they were finally in touch with his family.

It was December 2013, and more than a year had passed since Mr. Foley vanished on a road in northern Syria. Finally, his worried parents would know he was alive, he told his fellow captives. His government, he believed, would soon negotiate his release.

What appeared to be a turning point was in fact the start of a downward spiral for Mr. Foley, a 40-year-old journalist, that ended in August when he was forced to his knees somewhere in the bald hills of Syria and beheaded as a camera rolled.

His videotaped death was a very public end to a hidden ordeal.

The story of what happened in the Islamic State’s underground network of prisons in Syria is one of excruciating suffering. Mr. Foley and his fellow hostages were routinely beaten and subjected to waterboarding. For months, they were starved and threatened with execution by one group of fighters, only to be handed off to another group that brought them sweets and contemplated freeing them. The prisoners banded together, playing games to pass the endless hours, but as conditions grew more desperate, they turned on one another. Some, including Mr. Foley, sought comfort in the faith of their captors, embracing Islam and taking Muslim names.

Their captivity coincided with the rise of the group that came to be known as the Islamic State out of the chaos of the Syrian civil war. It did not exist on the day Mr. Foley was abducted, but it slowly grew to become the most powerful and feared rebel movement in the region. By the second year of Mr. Foley’s imprisonment, the group had amassed close to two dozen hostages and devised a strategy to trade them for cash.

It was at that point that the hostages’ journeys, which had been largely similar up to then, diverged based on actions taken thousands of miles away: in Washington and Paris, in Madrid, Rome and beyond. Mr. Foley was one of at least 23 Western hostages from 12 countries, a majority of them citizens of European nations whose governments have a history of paying ransoms.

Their struggle for survival, which is being told now for the first time, was pieced together through interviews with five former hostages, locals who witnessed their treatment, relatives and colleagues of the captives, and a tight circle of advisers who made trips to the region to try to win their release. Crucial details were confirmed by a former member of the Islamic State, also known as ISIS, who was initially stationed in the prison where Mr. Foley was held, and who provided previously unknown details of his captivity.

The ordeal has remained largely secret because the militants warned the hostages’ families not to go to the news media, threatening to kill their loved ones if they did. The New York Times is naming only those already identified publicly by the Islamic State, which began naming them in August.

Officials in the United States say they did everything in their power to save Mr. Foley and the others, including carrying out a failed rescue operation. They argue that the United States’ policy of not paying ransoms saves Americans’ lives in the long run by making them less attractive targets.

Inside their concrete box, the hostages did not know what their families or governments were doing on their behalf. They slowly pieced it together using the only information they had: their interactions with their guards and with one another. Mostly they suffered, waiting for any sign that they might escape with their lives.

The Grab

It was only a 40-minute drive to the Turkish border, but Mr. Foley decided to make one last stop.

In Binesh, Syria, two years ago, Mr. Foley and his traveling companion, the British photojournalist John Cantlie, pulled into an Internet cafe to file their work. The two were no strangers to the perils of reporting in Syria. Only a few months earlier, Mr. Cantlie had been kidnapped a few dozen miles from Binesh. He had tried to escape, barefoot and handcuffed, running for his life as bullets kicked up the dirt, only to be caught again. He was released a week later after moderate rebels intervened.

They were uploading their images when a man walked in.

“He had a big beard,” said Mustafa Ali, their Syrian translator, who was with them and recounted their final hours together. “He didn’t smile or say anything. And he looked at us with evil eyes.”

The man “went to the computer and sat for one minute only, and then left directly,” Mr. Ali said. “He wasn’t Syrian. He looked like he was from the Gulf.”

Mr. Foley, an American freelance journalist filing for GlobalPost and Agence France-Presse, and Mr. Cantlie, a photographer for British newspapers, continued transmitting their footage, according to Mr. Ali, whose account was confirmed by emails the journalists sent from the cafe to a colleague waiting for them in Turkey.

More than an hour later, they flagged a taxi for the 25-mile drive to Turkey. They never reached the border.

The gunmen who sped up behind their taxi did not call themselves the Islamic State because the group did not yet exist on Nov. 22, 2012, the day the two men were grabbed.

But the danger of Islamic extremism was already palpable in Syria’s rebel-held territories, and some news organizations were starting to pull back. Among the red flags was the growing number of foreign fighters flooding into Syria, dreaming of establishing a “caliphate.” These jihadists, many of them veterans of Al Qaeda’s branch in Iraq, looked and behaved differently from the moderate rebels. They wore their beards long. And they spoke with foreign accents, coming from the Persian Gulf, North Africa, Europe and beyond.

A van sped up on the left side of the taxi and cut it off. Masked fighters jumped out. They screamed in foreign-accented Arabic, telling the journalists to lie on the pavement. They handcuffed them and threw them into the van.

They left Mr. Ali on the side of the road. “If you follow us, we’ll kill you,” they told him.

Over the next 14 months, at least 23 foreigners, most of them freelance journalists and aid workers, would fall into a similar trap. The attackers identified the locals whom journalists hired to help them, like Mr. Ali and Yosef Abobaker, a Syrian translator. It was Mr. Abobaker who drove Steven J. Sotloff, an American freelance journalist, into Syria on Aug. 4, 2013.

“We were driving for only 20 minutes when I saw three cars stopped on the road ahead,” he said. “They must have had a spy on the border that saw my car and told them I was coming.”

The kidnappings, which were carried out by different groups of fighters jousting for influence and territory in Syria, became more frequent. In June 2013, four French journalists were abducted. In September, the militants grabbed three Spanish journalists.

Checkpoints became human nets, and last October, insurgents waited at one for Peter Kassig, 25, an emergency medical technician from Indianapolis who was delivering medical supplies. In December, Alan Henning, a British taxi driver, disappeared at another. Mr. Henning had cashed in his savings to buy a used ambulance, hoping to join an aid caravan to Syria. He was kidnapped 30 minutes after crossing into the country.

The last to vanish were five aid workers from Doctors Without Borders, who were plucked in January from the field hospital in rural Syria where they had been working.

The Interrogation

At gunpoint, Mr. Sotloff and Mr. Abobaker were driven to a textile factory in a village outside Aleppo, Syria, where they were placed in separate cells. Mr. Abobaker, who was freed two weeks later, heard their captors take Mr. Sotloff into an adjoining room.

Then he heard the Arabic-speaking interrogator say in English: “Password.”

It was a process to be repeated with several other hostages. The kidnappers seized their laptops, cellphones and cameras and demanded the passwords to their accounts. They scanned their Facebook timelines, their Skype chats, their image archives and their emails, looking for evidence of collusion with Western spy agencies and militaries.

“They took me to a building that was specifically for the interrogation,” said Marcin Suder, a 37-year-old Polish photojournalist kidnapped in July 2013 in Saraqib, Syria, where the jihadists were known to be operating. He was passed among several groups before managing to escape four months later.

“They checked my camera,” Mr. Suder said. “They checked my tablet. Then they undressed me completely. I was naked. They looked to see if there was a GPS chip under my skin or in my clothes. Then they started beating me. They Googled ‘Marcin Suder and C.I.A.,’ ‘Marcin Suder and K.G.B.’ They accused me of being a spy.”

Mr. Suder — who was never told the name of the group holding him, and who never met the other hostages because he escaped before they were transferred to the same location — remarked on the typically English vocabulary his interrogators had used.

During one session, they kept telling him he had been “naughty” — a word that hostages who were held with Mr. Foley also recalled their guards’ using during the most brutal torture.

It was in the course of these interrogations that the jihadists found images of American military personnel on Mr. Foley’s laptop, taken during his assignments in Afghanistan and Iraq.

“In the archive of photographs he had personally taken, there were images glorifying the American crusaders,” they wrote in an article published after Mr. Foley’s death. “Alas for James, this archive was with him at the time of his arrest.”

A British hostage, David Cawthorne Haines, was forced to acknowledge his military background: It was listed on his LinkedIn profile.

The militants also discovered that Mr. Kassig, the aid worker from Indiana, was a former Army Ranger and a veteran of the Iraq war. Both facts are easy to find online, because CNN featured Mr. Kassig’s humanitarian work prominently before his capture.

The punishment for any perceived offense was torture.

“You could see the scars on his ankles,” Jejoen Bontinck, 19, of Belgium, a teenage convert to Islam who spent three weeks in the summer of 2013 in the same cell as Mr. Foley, said of him. “He told me how they had chained his feet to a bar and then hung the bar so that he was upside down from the ceiling. Then they left him there.”

Mr. Bontinck, who was released late last year, spoke about his experiences for the first time for this article in his hometown, Antwerp, where he is one of 46 Belgian youths on trial on charges of belonging to a terrorist organization.

At first, the abuse did not appear to have a larger purpose. Nor did the jihadists seem to have a plan for their growing number of hostages.

Mr. Bontinck said Mr. Foley and Mr. Cantlie had first been held by the Nusra Front, a Qaeda affiliate. Their guards, an English-speaking trio whom they nicknamed “the Beatles,” seemed to take pleasure in brutalizing them.

Later, they were handed over to a group called the Mujahedeen Shura Council, led by French speakers.

Mr. Foley and Mr. Cantlie were moved at least three times before being transferred to a prison underneath the Children’s Hospital of Aleppo.

It was in this building that Mr. Bontinck, then only 18, met Mr. Foley. At first, Mr. Bontinck was a fighter, one of thousands of young Europeans drawn to the promise of jihad. He later ran afoul of the group when he received a text message from his worried father back in Belgium and his commander accused him of being a spy.

The militants dragged him into a basement room with pale brown walls. Inside were two very thin, bearded foreigners: Mr. Foley and Mr. Cantlie.

For the next three weeks, when the call to prayer sounded, all three stood.

Mr. Foley converted to Islam soon after his capture and adopted the name Abu Hamza, Mr. Bontinck said. (His conversion was confirmed by three other recently released hostages, as well as by his former employer.)

“I recited the Quran with him,” Mr. Bontinck said. “Most people would say, ‘Let’s convert so that we can get better treatment.’ But in his case, I think it was sincere.”

Former hostages said that a majority of the Western prisoners had converted during their difficult captivity. Among them was Mr. Kassig, who adopted the name Abdul-Rahman, according to his family, who learned of his conversion in a letter smuggled out of the prison.

Only a handful of the hostages stayed true to their own faiths, including Mr. Sotloff, then 30, a practicing Jew. On Yom Kippur, he told his guards he was not feeling well and refused his food so he could secretly observe the traditional fast, a witness said.

Those recently released said that most of the foreigners had converted under duress, but that Mr. Foley had been captivated by Islam. When the guards brought an English version of the Quran, those who were just pretending to be Muslims paged through it, one former hostage said. Mr. Foley spent hours engrossed in the text.

His first set of guards, from the Nusra Front, viewed his professed Islamic faith with suspicion. But the second group holding him seemed moved by it. For an extended period, the abuse stopped. Unlike the Syrian prisoners, who were chained to radiators, Mr. Foley and Mr. Cantlie were able to move freely inside their cell.

Mr. Bontinck had a chance to ask the prison’s emir, a Dutch citizen, whether the militants had asked for a ransom for the foreigners. He said they had not.

“He explained there was a Plan A and a Plan B,” Mr. Bontinck said. The journalists would be put under house arrest, or they would be conscripted into a jihadist training camp. Both possibilities suggested that the group was planning to release them.

One day, their guards brought them a gift of chocolates.

When Mr. Bontinck was released, he jotted down the phone number of Mr. Foley’s parents and promised to call them. They made plans to meet again.

He left thinking that the journalists, like him, would soon be freed.

A Terrorist State

The Syrian civil war, previously dominated by secular rebels and a handful of rival jihadist groups, was shifting decisively, and the new extremist group had taken a dominant position. Sometime last year, the battalion in the Aleppo hospital pledged allegiance to what was then called the Islamic State in Iraq and Syria.

Other factions of fighters joined forces with the group, whose tactics were so extreme that even Al Qaeda expelled it from its terror network. Its ambitions went far beyond toppling Bashar al-Assad, Syria’s president.

Late last year, the jihadists began pooling their prisoners, bringing them to the same location underneath the hospital. By January, there were at least 19 men in one 20-square-meter cell (about 215 square feet) and four women in an adjoining one. All but one of them were European or North American. The relative freedom that Mr. Foley and Mr. Cantlie had enjoyed came to an abrupt end. Each prisoner was now handcuffed to another.

More worrying was the fact that their French-speaking guards were replaced by English-speaking ones. Mr. Foley recognized them with dread.

Continue Reading here.

Ebola, Years of Building the Perfect Storm

Barack Obama is not going to either slow or stop the air traffic from at least three countries in a Dante’s Inferno of the epidemic Ebola outbreak. So a sensible plan would be for control of people and passengers leaving African nations affected by Ebola to be done so only on chartered aircraft medically designed to assess signs of illness with experts from the Center for Disease Control as part of the medical crew on board. Then all passengers with any type of indications we transported to a single isolation facility in the United States where again Center for Disease Control personnel and virus experts are in control rather than spreading patients around the United States terrifying the country.

Now, the genesis of the Ebola outbreak, there are two articles of due importance for consideration and understanding.

Professor Peter Piot, who discovered the Ebola virus in 1976, conducted an extensive interview with the London newspaper, The Guardian, over the weekend whereby he discussed his initial discovery of the virus; and, what may lie ahead. The Guardians’ Rafela von Bredow, and Veronika Hackenbroch write that Professor Piot “still remembers that day in September 1976, when a pilot from Sabena Airlines brought us a shinny blue Thermos; and, a letter from a doctor in Kinshasa — in what was then Zaire.” At the time, Professor Piot was a researcher at a lab in Antwerp, Belgium. The letter stated that the blood sample contained in the Thermos came from a Belgian nun who had recently fallen ill from a mysterious illness in Yambuku. a remote village in the northern part of the country. The doctor who sent the sample, asked Professor Piot’s lab to test the sample for yellow fever.”

 

When asked by the two Guardian reporters how he protected himself back then from such a dangerous pathogen?, Professor Piot said “we had no idea how dangerous the virus was; and, there were no high-security labs in Belgium.” Tests for yellow and Lassa fever, as well as typhoid were all negative. What then, could it be?” Professor Piot said they all asked themselves. In order to get at least some idea of what they might be dealing with, Professor Piot and his lab colleagues decided to inject some of the blood sample into mice and other lab animals. At first, nothing happened,” Professor Piot said, and the researchers “thought that perhaps the pathogen had been damaged from insufficient refrigeration in the Thermos. But then, one animal after the next began to die. We began to realize the sample contained something very deadly.”

As they began to analyze additional samples that had just been received; the World Health Organization (WHO) “instructed us to send all of our samples to a high-security lab in England.” But, says Professor Piot, his boss at the time “wanted to bring our work to a conclusion, no matter what.” “He grabbed a vial containing the virus to examine it, but his hand was shaking and he dropped it on a colleagues foot. The vial shattered, My only thought was: “Oh shit!” “We immediately disinfected everything; and luckily, our colleague was wearing thick leather shoes. Nothing happened to any of us.”

Eventually, The Guardian reports, Professor Piot and his colleagues were able to create an image of the virus using an electron microscope. “What the hell is that?” they asked themselves. “The virus we had been searching for was very big, very long, and worm-like. It had no similarities with yellow fever. Rather, it looked like an extremely dangerous Marburg virus which, like Ebola, causes hemorrhagic fever. In the 1960s, the virus killed several laboratory workers in Marburg, Germany.”

Soon after it was confirmed that this was a new, previously unknown virus, Professor Piot “became one of the first scientists to fly to Zaire,” The Guardian noted. Although thrilled at being one of the first doctors to be tracking down and studying this new, deadly virus, there was genuine fear among these scientists as “we had no idea that it was transmitted by bodily fluids.”

When deciding what to name the new virus, Professor Piot and his colleagues “definitely didn’t want to name the new pathogen “Yambuku Virus,” since that name would stigmatize the place of origin forever. “There was a map hanging on the wall; and, our American team leader suggested looking for the nearest river — ultimately giving the virus its name. It was the Ebola River. But, the map on the wall was small and inexact. We only learned later that the nearest river was actually a different one; but, Ebola is a nice name isn’t it?” Professor Piot said, and the name stuck.”

Professor Piot and his colleagues eventually discovered that the infected Belgian nuns had also unwittingly spread the new virus called Ebola. “In their hospital, they regularly gave pregnant women vitamin injections using unsterilized needles. By doing so, they infected many young women in Yambuku with the virus.” “Clinics that failed to observe [proper hygiene] this and other rules of hygiene functioned as catalysts in all additional Ebola outbreaks.” Their mistakes, “drastically sped up the spread of the virus, or made the spread possible in the first place. Even in the current Ebola outbreak in West Africa, hospitals unfortunately played this ignominious role in the beginning,” the Guardian journalists noted; and, no doubt feed the suspicion and distrust of the medical profession in these remote places in the world — a suspicion that probably still lingers today.

The Guardian journalist’s postulated that “there is actually a well-established procedure for curtailing Ebola outbreaks: isolating those infected and closely monitoring those who had contact with them. How could such a catastrophe as the one we’re seeing now — ever happen?” Professor Piot responded that “I think it is what people call a Perfect Storm: when every individual circumstance is a bit worse than normal; and, they combine to create a disaster. And with this outbreak, there were many factors that were disadvantageous from the very beginning. Some of the countries involved were just emerging from terrible civil wars, many of their doctors had fled, and their healthcare system [such as it was] had collapsed. In all of Liberia for example,” Professor Piot said, there were only 51 doctors in 2010, and many of them since then — have died of Ebola.” “The fact that the outbreak began in the densely populated border region between Guinea, Sierra Leone, and Liberia…also contributed to the catastrophe,” Professor Piot added.

“For the first time in its history, the virus also reached metropolises such as Monrovia and Freetown. Is that the worst that can happen?” The Guardian journalists asked Professor Piot. “In large cities — particularly in chaotic slums — it is virtually impossible to find those who had contact with patients, no matter how great the effort. That is why I am so worried about Nigeria as well. The country is home to mega-cities like Lagos and Port Harcourt; and, if the Ebola virus lodges there…and begins to spread….it would be an unimaginable catastrophe,” Professor Piot warned.

When asked “if we’ve lost complete control of the epidemic?,” Professor Piot responded that “I have always been an optimist; and, I think we have no other choice than to try everything, really everything. It’s good the United States and some other countries are finally beginning to help. But, Germany, or even Belgium, for example, must do a lot more. And, it should be clear to all of us: This isn’t just an epidemic any more. This is a humanitarian catastrophe. We don’t just need care personnel, but also logistics experts, trucks, jeeps, and foodstuffs. Such an epidemic can destabilize entire regions. I can only hope that we will be able to get it under control. I never really thought that it could get this bad.” Professor Piot said.

When asked if he thought “we might be facing the beginnings of a pandemic?” Professor Piot said, “there will certainly be Ebola patients from West Africa who will come to us in the hopes of receiving treatment. But, an outbreak in Europe or North America would quickly be brought under control. I am more worried about the many people from India who work in trade or industry in West Africa. It would only take one of them to become infected; and, travel to India to visit relatives during the virus’s incubation period, and once he/she becomes sick, go to a public hospital there. Doctors and nurses in India, too often, don’t wear protective gloves. They would immediately become infected and spread the virus.”

The Guardian journalists postulated that the “virus is constantly changing its genetic makeup; and, the more people who become infected, the greater [the] chance the virus will mutate.,” to a more virulent and transmissible form — “which might speed its spread.” Professor Piot said, “yes, that really is the apocalyptic scenario. Humans are actually just an accidental host for the virus, and not a good one. From the perspective of a virus, it isn’t desirable for its host, within which the pathogen hopes to multiply, to die so quickly. It would be much better for the virus to allow us to stay alive longer.”

When asked “if the virus could suddenly change itself…so, it could spread via the air/respiratory route?,” Professor Piot responded that “luckily, that is extremely unlikely. But, a mutation that would allow Ebola patients to live a couple of weeks longer is certainly possible; and, would be disadvantageous for the virus. But, that would allow Ebola patients to infect many more people than is currently the case.” “But that is speculation isn’t it?” The Guardian journalists asked. “Certainly,” Professor Piot responded. “But, it is just one of many possible ways the virus could change to spread more easily. And, it is clear that this virus is mutating.”

When asked about his views with respect to experimental drugs, Professor Piot said “patients could probably be treated more quickly with blood serum from Ebola survivors, even if that would likely be extremely difficult — given the chaotic local conditions. We need to find out now, if these methods, or if experimental drugs like ZMapp, really help. For most people, they will come [experimental drugs] too late in this epidemic. But, if they help, they should be made available for the next outbreak.”

In concluding the interview, The Guardian journalists observed that “in Zaire, during the first outbreak, a hospital with poor hygiene was responsible for spreading the illness. Today, almost the same thing is happening. Was Louis Pasteur right when he said: “It is the microbes who will have the last word?” Professor Piot said, “Of course we are a long way from declaring victory over bacteria and viruses. HIV is still here; in London alone, five gaymen become infected daily. An increasing number of bacteria are becoming resistant to antibiotics. And, I can still see Ebola patients in Yambuku, how they died in their shacks; and, we couldn’t do anything except let them die. In principal, it’s still the same today. That is very depressing. But, it also provides me with a strong motivation to do something. I love life. That is why I am doing everything I can to convince the powerful in this world to finally send sufficient help to West Africa. Now! Enough said.

 

While this is long, please continue reading to understand the scope and reason of the Ebola threats. Now let us move on to the World Health Organization (WHO) and why that is yet another very big problem.

World Health Organization is absent:

More information with links but not all vetted with regard to Ebola possibilities:

http://www.eddiefleming.com/2014/10/was-ebola-designed-as-bioterrorism-weapon-and-is-already-airborne/

How Ebola is spreading:

http://newsok.com/how-the-world-let-ebola-spread/article/feed/743729