Thanksgiving Day Terror. Black Swan Exercise

Related reading: Predicting Future Military Threats: Implications of the Black Swan

Donald Trump’s transition team is getting a helping hand from the Obama administration on national security matters.

The administration is giving the president-elect and a select few of his top advisers sensitive intelligence briefings.

And, in addition, Trump and his team will take part in two so-called ‘black swan’ exercises that simulate a domestic or national security emergency.

The exercises are intended to help an incoming administration learn how to manage a crisis in real time in case there is some kind of global or domestic emergency in the first days of a Trump presidency.

A black swan exercise would, for example, ensure that a fledgling Trump administration knows how to activate the proper federal agencies to maintain stability.

According to a briefing book from the nonpartisan Center for Presidential Transition, in 2008 the Bush administration hosted two black swan exercises for then president-elect Obama’s national security team. More here from ABC.

Black Swan operations and exercises have been practiced also in the United Kingdom.

**** What is on the horizon regarding terror?

Islamic State is urging its followers to carry out acts of terrorism in New York City during the upcoming, Macy’s Thanksgiving Day Parade.  Jamie Schram writes in this morning’s (Nov. 14, 2016) New York Post, that “ISIS is offering a detailed how-to on using trucks as weapons of mass destruction — noting that the Macy’s Thanksgiving Parade would be an ‘excellent target.”

Rumiyah2(1).jpg

MEMRI: On November 11, 2016, Al-Hayat, one of the media centers of the Islamic State (ISIS), released the third issue of its monthly magazine Rumiyah featuring an article calling on lone wolves in the U.S. and Europe to use trucks to target large outdoor conventions, crowded streets, outdoor markets, festivals, parades, and political rallies. The article also emphasized the importance of using trucks in terrorist attacks, and provided suggestions on “ideal vehicles” to use and tactical tips for the preparation and planning of attacks.

Rumiyah3.jpg

The article, titled “Just Terror Tactics,” features images of rental trucks from companies such as Hertz and U-Haul, as well as a picture showing the Macy’s Thanksgiving Day Parade in New York City. It begins by highlighting the “destructive capability” of motor vehicles and referring to the Bastille Day attack in Nice, France on July 14, 2016. While praising the Nice attacker, the article states: “This was superbly demonstrated in the attack launched by the brother Mohamed Lahouaiej-Bouhlel who, while traveling at the speed of approximately 90 kilometers per hour, plowed his 19-ton load-bearing truck into crowds celebrating Bastille Day in Nice, France, harvesting through his attack the slaughter of 86 Crusader citizens and injuring 434 more.”

Rumiyah4(1).jpg

The article stresses the importance of using a vehicle that can inflict maximum damage, and describes the “ideal” vehicles for lone wolf attacks as “load-bearing trucks, large in size, reasonably fast in speed or rate of acceleration, heavy in weight, double-wheeled, possessing a slightly raised chassis.” The article continued: “If accessible, [vehicles] with a metal outer frame which are usually found in older cars [should be used], as the stronger outer frame allows for more damage to be caused when the vehicle is slammed into crowds, contrary to newer cars that are usually made of plastics and other weaker materials.”

Providing suggestions on how to acquire the vehicle, the article noted that buying it is the “easiest” option; however, it also mentioned renting, borrowing from relatives and acquaintances, hotwiring, and carjacking as additional options. Under “applicable targets” the article listed: “Large outdoor conventions and celebrations, pedestrian-congested streets, outdoor markets, festivals, parades and political rallies.”

The article further emphasized that in order to inflict maximum damage, attackers should consider targeting “any outdoor attraction that draws large crowds,” stating that “it is not conditional to target gatherings restricted to government or military personnel only. All so-called ‘civilian’ (and low-security) parades and gatherings are fair game and more devastating to Crusader nations.”

As for “preparation and planning,” the article recommended “assessing vehicle for roadworthiness, filling vehicle with a sufficient amount of fuel, mapping out the route of the attack, surveying the route for obstacles, such as posts, signs, barriers, humps, bus stops, dumpsters, and if accessible, a secondary weapon should be attained.”

The article also provided ideas for attackers to use in order to declare their affiliation to ISIS to “have their motives acknowledged” such as writing “ISIS will remain” or “I am a soldier of the Islamic State” on pieces of papers and throwing them out of the vehicle’s window during the attack.

The article concludes by instructing attackers to stay inside their vehicles until they are no longer movable and then to start shooting pedestrians, first responders and security forces until they are killed.

****

Black Swan exercises are those that prepare for the unexpected and several events worldwide have been part of these operations.

1. Electromagnetic Pulse (EMP) or Solar Burst

As The Heritage Foundation highlighted in the documentary 33 Minutes,[3] an EMP attack could throw America back to the pre-Industrial Revolution era. A powerful solar burst would have the same impact. Should either event occur, people would have little time to react, and the damage would be incalculable.

If the U.S. were to lose power for any prolonged period of time, given the sheer number of people located in the interior of the country, mass starvation and death would become a reality. Most experts consider these events as highly unlikely ones, so little investment or planning is done related to them.

2. Pandemic Virus

Although the U.S. has prepared for a pandemic influenza outbreak, little preparation has gone into other potential viruses. More importantly, it is the unknown virus or “super virus” that represents a Black Swan for America. Recall that it was less than 30 years ago that AIDS first began embedding itself in North America. If a far more deadly and communicable virus hits America, the U.S. would quickly expend its existing resources.

3. Nuclear or Radiological Event

The U.S. has extensive knowledge of what would happen if a nuclear or radiological explosion occurred in a major American city. Theory, however, is a poor replacement for the reality of large numbers of deaths, burn victims, and physical debris. As former Vice President Dick Cheney wisely concluded, because of the sheer consequences, even a 1 percent chance of such an event occurring requires the nation to expend the necessary resources to prevent it.

4. Super-Volcanic Eruption

Seismic activity around the Yellowstone caldera is monitored, but tectonic shifts miles below the surface could result in the buildup of pressure and a super-volcanic eruption. The volcano beneath Yellowstone previously erupted, causing destruction as far away as California, Iowa, and Louisiana. An eruption, though unlikely given current readings, could have truly catastrophic consequences.

5. Nor’Easter/Hurricane

Hurricanes strike America with a fair degree of frequency. A Black Swan event would be a Nor’easter combined with a powerful hurricane that strikes New York City in the same manner as Hurricane Katrina struck New Orleans. Between the massive flooding and wind damage, New York City could sustain casualties and physical destruction well in excess of Katrina.

How Prepared Is the U.S.?

The honest and unfortunate answer to that question is unknown and, despite attempts to ascertain that answer, will not be known if existing policy remains in place. A Black Swan by definition becomes a Black Swan because it results in catastrophic outcomes. This “delicate” balance between preparing for events and not being able to prepare adequately for all events represents the ultimate risk-based decision making.

From 2003 to 2011, the U.S. Department of Homeland Security (DHS) distributed roughly $40 billion in funding to states and localities across America. Despite years of reporting requirements, DHS is fundamentally unable to state with any degree of certainty which capabilities exist, where those capabilities exist, the level of those capabilities, and the remaining capability needs. DHS knows it has funded the acquisition of many things, but specifics beyond that are unquantifiable.

Specifically, to gain a full accounting, Congress should:

  • Be fiscally responsible. Rather than continue to spread federal funds using an “inch thick and a mile wide” mentality, Congress should target federal funds at the highest-risk states, cities, and counties where the funds could meaningfully increase the security of Americans, including reducing the number of high-risk cities that are eligible for special funding.
  • Examine cooperative agreements. The need for equality downplays the need for the grant structure and invites another approach—such as the use of cooperative agreements, where the federal government and the states can sit down as true and equal partners and negotiate outcomes at the beginning and then direct funds to achieve those desired outcomes without the need for yearly applications.
  • Appoint a Black Swan commission. Rather than wait until after a catastrophic event has occurred, Congress should appoint an independent commission for the express purpose of analyzing the threats of a potential Black Swan, identifying existing capabilities, and making recommendations on how best to correct errors made thus far and accelerate closing the gap between where the nation stands today and where it needs to be tomorrow. The commission must have the independence and resources to quickly do its job after a full review of the status quo.

Expect the Unexpected

If the catastrophe in Japan has taught any lessons, it is that America must prepare for the unexpected with as much vigor as it prepares for the expected. Because a Black Swan can be so catastrophic, in many ways the ideal role for the federal government is to lead an effort surrounding those events. With the nation’s current fiscal challenges, conserving resources for catastrophic events is more vital than ever. More here from Heritage.

NoI or CAIR to Lead the DNC? Bring Back HUAC

Congressman Ellison has introduced several pieces of legislation that have never advanced.

Washington (CNN)Rep. Keith Ellison, the first Muslim elected to Congress and one of only two members in the Capitol, said Wednesday that in the wake of anti-Muslim rhetoric after the Paris attacks, Muslims are feeling a need to assert even more how patriotic they are.

The Minnesota Democrat said when he hears other lawmakers suggesting Christian Syrian refugees should be allowed into the country but Muslim Syrian refugees should not, it reminds him that the First Amendment to the Constitution establishes freedom of religion. More here.
Congressman Ellison attends the Masjid An-Nur mosque in Minneapolis and his visit to Mogadishu fulfilled a request from his constituents with ties to Somalia. Minnesota has one of the largest populations of Somali-Americans in the U.S. April of 2015, six Somali-Americans from Minneapolis were arrested for attempting to travel to Syria and link up with the Islamic State, also referred to as ISIS or ISIL. All were young men between the ages of 19 and 21. Zacharia Yusuf Abdurahman, 19, Adnan Farah, 19, Hanad Mustafe Musse, 19, and Guled Ali Omar, 20,  were arrested in Minneapolis while Abdirahman Yasin Daud, 21, and Mohamed Abdihamid Farah, 21, were arrested trying to buy fake passports in San Diego. The criminal complaint is here.

Who is Keith Ellison? Left-wing congressman with past ties to Nation of Islam wants DNC job

FNC: In an attempt to stave off a civil war in the ranks, Democratic leaders are scrambling to unite behind a candidate for the party’s chairmanship – and have landed for now on a Louis Farrakhan-linked congressman who once called for Dick Cheney’s impeachment and compared George W. Bush to Hitler.

Rep. Keith Ellison, D-Minn., the first Muslim elected to Congress and a leading progressive among House Democrats, already has picked up the backing of both the Democratic Party’s left – with support from Sens. Bernie Sanders and Elizabeth Warren – and its establishment, receiving endorsements from Senate leaders Chuck Schumer, D-N.Y., and retiring Harry Reid, D-Nev.

Ellison is firmly on the party’s left – he has a fax line in his office, but his website says they will not respond to faxes “for environmental reasons.” He backed Bernie Sanders during the primaries, even introducing him at the convention.

“Bernie sparked the beginning of a revolution y’all,” Ellison said at his address during the Democratic National Convention in Philadelphia. “Together we call for climate justice, racial justice, wage justice.”

Sanders has given strong backing to Ellison in return, sending out a fundraising email saying an Ellison-led Democratic Party that will stand up to Wall Street greed and corporate America is “the Democratic Party we need.”

Ellison is expected to formally announce his bid Monday. On Sunday, Ellison hinted he would run and said the party needs to focus on middle- and working-class Americans and less on donors.

“I love the donors and we thank them, but it has to be that the guys in the barber shop, the lady at the diner, the folks who are worried about whether that plant is going to close, they’ve got to be our focus,” he said on ABC’s “This Week.”

Some strategists feel this economic message is exactly what the party needs to reach out to white working-class voters who pulled the lever for Trump.

“You can’t stand up for middle-class families if you are so closely associated with Wall Street and I think that was the issue with Clinton, her ties to Goldman Sachs, and I think that’s shown by how much money we raised from Wall Street,” Brad Bannon, Democratic strategist and CEO of Bannon Communications Research, told FoxNews.com. “We have to become more oriented to working-class families if we’re going to survive and prosper, because we blew the industrial Midwest.”

However, Ellison’s past associations and comments may trouble more moderate voters.

Ellison’s 2006 run for his seat was plunged into controversy after the conservative PowerLineBlog.com found he had once identified with Farrakhan’s Nation of Islam and in 1998 was referring to himself as Keith X Ellison and Keith Ellison-Muhammed.

The Washington Post reported that Ellison had defended Farrakhan against accusations of anti-Semitism in 1989 and in 1990 had called affirmative action a “sneaky” form of compensation for slavery, calling instead for reparations.

When the controversy erupted in 2006, Ellison acknowledged he had worked with the group, but only for 18 months to help organize Farrakhan’s 1995 Million Man March. He distanced himself from both Farrakhan and the Nation of Islam, and said he hadn’t scruitinized the group’s anti-Semitic positions appropriately.

“They were and are anti-Semitic, and I should have come to that conclusion earlier than I did,” he said.

Yet it isn’t the only controversy for Ellison. In 2007, Ellison made a comparison between Bush and 9/11 to Hitler and the 1933 Reichstag fire.

“9/11 is the juggernaut in American history and it allows… it’s almost like, you know, the Reichstag fire,” Ellison said, according to a Daily Telegraph report at the time. “After the Reichstag was burned, they blamed the Communists for it, and it put the leader of that country [Hitler] in a position where he could basically have authority to do whatever he wanted.”

He later clarified that he did indeed believe that Usama bin Laden was responsible for the terror attacks. But it wasn’t the only controversy for Ellison in 2007, as he also backed a movement to impeach then-Vice President Dick Cheney over his alleged fabrication of intelligence about weapons of mass destruction in Iraq.

However, Bannon believes that Ellison’s Muslim heritage could be a boost not a burden, especially in light of Trump’s elevation Sunday of controversial Breitbart boss Steve Bannon to chief strategist.

“[Steve] Bannon propagates Muslim conspiracy theories,” Brad Bannon, who is not related to the Breitbart head, said. “Ellison is the perfect guy to counter that. Ellison is exactly what we need to prove we aren’t the party of hate and racism.”

Ellison would have competition for the job. Former DNC chairman and ex-presidential candidate Howard Dean has put his name in the running. Former Maryland Gov. Martin O’Malle

y also said he’s considering a run.

Trust Even Less on the Internet Thanks to Real Russian Trolls

Daily, I am asked if this is true or that is true….admittedly it is getting harder each day to vet stories for accuracy and to dissect them for what is accurate and other parts being flatly false. That is what trolls do, mix accuracy with falsehoods so the reader assumes it is all factual….ah not so much.

So, what sites to do visit often and have come to rely on them? InfoWars or Zerohedge? Well what about people that are curiously appearing to be friends with you on Facebook or new followers on Twitter? Take caution and read carefully below, you reliance on truth and accuracy just got harder. Even some in the media are being punked.

Related reading: KGB Model: Army of Russia Trolls vs. America

Related reading: Even Russian Diplomats in DC are Trolling Obama Admin

Related reading: Are you Sick of Hearing About Russia? Putin Loves it

Here we go and hat tip to these fellas for taking many months of investigation to sound the warnings.

****   

Trolling for Trump: How Russia Is Trying to Destroy Our Democracy

Trump isn’t the end of Russia’s information war against America. They are just getting started.

WotR: In spring 2014, a funny story crossed our social media feeds. A petition on whitehouse.gov called for“sending Alaska back to Russia,” and it quickly amassed tens of thousands of signatures. The media ran a number of amused stories on the event, and it was quickly forgotten.

The petition seemed odd to us, and so we looked at which accounts were promoting it on social media. We discovered that thousands of Russian-language bots had been repetitively tweeting links to the petition for weeks before it caught journalists’ attention.

Those were the days. Now, instead of pranking petitions, Russian influence networks online are interfering with the 2016 U.S. election. Many people, especially Hillary Clinton supporters, believe that Russia is actively trying to put Donald Trump in the White House.

And the evidence is compelling. A range of activities speaks to a Russian connection: the theft of emails from the Democratic National Committee and Clinton campaign officials, hacks surrounding voter rolls and possibly election machines, Putin’s overt praise for Trump, and the curious Kremlin connections of Trump campaign operatives Paul Manafort and Carter Page.

But most observers are missing the point. Russia is helping Trump’s campaign, yes, but it is not doing so solely or even necessarily with the goal of placing him in the Oval Office. Rather, these efforts seek to produce a divided electorate and a president with no clear mandate to govern. The ultimate objective is to diminish and tarnish American democracy. Unfortunately, that effort is going very well indeed.

Russia’s desire to sow distrust in the American system of government is not new. It’s a goal Moscow has pursued since the beginning of the Cold War. Its strategy is not new, either. Soviet-era “active measures” called for using the “force of politics” rather than the “politics of force”to erode American democracy from within.  What is new is the methods Russia uses to achieve these objectives.

We have been tracking Russian online information operations since 2014, when our interest was piqued by strange activity we observed studying online dimensions of jihadism and the Syrian civil war. When experts published content criticizing the Russian-supported Bashar al Assad regime, organized hordes of trolls would appear to attack the authors on Twitter and Facebook. Examining the troll social networks revealed dozens of accounts presenting themselves as attractive young women eager to talk politics with Americans, including some working in the national security sector. These “honeypot” social media accounts were linked to other accounts used by the Syrian Electronic Army hacker operation. All three elements were working together: the trolls to sow doubt, the honeypots to win trust, and the hackers (we believe) to exploit clicks on dubious links sent out by the first two.

Related reading: U.S. charges three suspected Syrian Electronic Army hackers

 

The Syrian network did not stand alone. Beyond it lurked closely interconnected networks tied to Syria’s allies, Iran and Russia. Many of these networks were aimed at U.S. political dissenters and domestic extremist movements, including militia groups, white nationalists, and anarchists.

Today, that network is still hard at work, running at peak capacity to destroy Americans’ confidence in their system of government. We’ve monitored more than 7,000 social media accounts over the last 30 months and at times engaged directly with them. Trump isn’t the end of Russia’s social media and hacking campaign against America, but merely the beginning.  Here is what we’ve learned.

The Russian Social Media Approach: Soviet Union’s “Active Measures” On Steroids

The United States and its European allies have always placed state-to-state relations at the forefront of their international strategies. The Soviet system’s effort to undermine those relations during the Cold War, updated now by modern Russia, were known as “active measures.”

A June 1992 U.S. Information Agency report on the strategy explained:

It was often very difficult for Westerners to comprehend this fundamentally different Soviet approach to international relations and, as a result, the centrality to the Soviets (now Russians) of active measures operations was gravely underappreciated.

Active measures employ a three-pronged approach that attempts to shape foreign policy by directing influence in the following ways: state-to-people, people-to-people, and state-to-state. More often than not, active measures sidestep traditional diplomacy and normal state-to-state relationships. The Russian government today employs the state-to-people and people-to-people approaches on social media and the internet, directly engaging U.S. and European audiences ripe for an anti-American message, including the alt-right and more traditional right-wing and fascist parties. It also targets left-wing audiences, but currently at a lower tempo.

Until recently, Western governments focused on state-to-state negotiations with Putin’s regime largely missed Russian state-to-people social media approaches. Russia’s social media campaigns seek five complementary objectives to strengthen Russia’s position over Western democracies:

  • Undermine citizen confidence in democratic governance;
  • Foment and exacerbate divisive political fractures;
  • Erode trust between citizens and elected officials and democratic institutions;
  • Popularize Russian policy agendas within foreign populations;
  • Create general distrust or confusion over information sources by blurring the lines between fact and fiction
  • In sum, these influence efforts weaken Russia’s enemies without the use of force. Russian social media propaganda pushes four general themes to advance Moscow’s influence objectives and connect with foreign populations they target.

    Political messages are designed to tarnish democratic leaders or undermine institutions. Examples include allegations of voter fraud, election rigging, and political corruption. Leaders can be specifically targeted, for instance by promoting unsubstantiated claims about Hillary Clinton’s health, or more obviously by leaking hacked emails.

Financial propaganda weakens citizen and investor confidence in foreign markets and posits the failure of capitalist economies. Stoking fears over the national debt, attacking institutions such as the Federal Reserve, and attempts to discredit Western financial experts and business leaders are all part of this arsenal.

In one example from August, Disneyland Paris was the site of a reported bomb scare. Social media accounts on Twitter reported that the park had been evacuated, and several news outlets — including Russian propaganda stations RT and Sputnik — published alarming stories based on the tweets, which escalated in hysteria as the afternoon stretched on. In fact, the park had not been evacuated. But that didn’t stop Disney’s stock from taking a temporary hit. This fluctuation could be exploited by someone who knew the fake scare was coming, but we do not have access to the data that would allow us to know whether this happened.

disney

Social issues currently provide a useful window for Russian messaging. Police brutality, racial tensions, protests, anti-government standoffs, online privacy concerns, and alleged government misconduct are all emphasized to magnify their scale and leveraged to undermine the fabric of society.

Finally, wide-ranging conspiracy theories promote fear of global calamity while questioning the expertise of anyone who might calm those fears. Russian propaganda operations since 2014 have stoked fears of martial law in the United States, for instance, by promoting chemtrails and Jade Helm conspiracy theories. More recently, Moscow turned to stoking fears of nuclear war between the United States and Russia.

For the Kremlin, this is not just focused on the outside world. Russian news organizations bombard Russian citizens with the same combination of content. Steve Rosenberg, a BBC News correspondent in Moscow, filmed the Russian domestic equivalent of this approach on November 1, showing Russian language news headlines inciting fears such as impending nuclear war, a U.S.-Russia confrontation in Syria, and the potential for an assassination of Donald Trump.

russia_active_measures

The Confluence of Information and Cyberspace

Russian active measures use a blend of overt and covert channels to distribute political, financial, social, and calamitous messages (see above). During the Soviet era, “white” active measures were overt information outlets directly attributable to the Central Committee of the Communist Party of the Soviet Union. Today, RT and Sputnik push Kremlin-approved English-language news on television and the Internet. These outlets broadcast a mix of true information (the vast majority of content), manipulated or skewed stories, and strategically chosen falsehoods. RT’s slogan, “Question More,” aptly fits their reporting style — seeding ideas of conspiracy or wrongdoing without actually proving anything.

This “white” content provides ammunition for “gray” measures, which employ less overt outlets controlled by Russia, as well as so-called useful idiots that regurgitate Russian themes and “facts” without necessarily taking direction from Russia or collaborating in a fully informed manner.

During the Cold War, gray measures used semi-covert Communist parties, friendship societies, and non-governmental organizations to engage in party-to-party and people-to-people campaigns. Today, gray measures on social media include conspiracy websites, data dump websites, and seemingly credible news aggregators that amplify disinformation and misinformation.

Conspiracy sites include outlets such as InfoWars and Zero Hedge, along with a host of lesser-known sites that repeat and repackage the same basic content for both right- and left-wing consumers. Sometimes, these intermediaries will post the same stories on sites with opposite political orientations.

Data dump websites, such as Wikileaks and DC Leaks, overtly claim to be exposing corruption and promoting transparency by uploading private information stolen during hacks. But the timing and targets of their efforts help guide pro-Russian themes and shape messages by publishing compromising information on selected adversaries.

The people who run these sites do not necessarily know they are participants in Russian agitprop, or at least it is very difficult to prove conclusively that they do. Some sites likely receive direct financial or operational backing, while others may be paid only with juicy information.

Sincere conspiracy theorists can get vacuumed up into the social networks that promote this material. In at least one case, a site described by its creator as parody was thoroughly adopted by Russian influence operators online and turned into an unironic component of their promoted content stream, at least as far as the network’s targeted “news” consumers are concerned.

A small army of social media operatives — a mix of Russian-controlled accounts, useful idiots, and innocent bystanders— are deployed to promote all of this material to unknowing audiences. Some of these are real people, others are bots, and some present themselves as innocent news aggregators, providing “breaking news alerts” to happenings worldwide or in specific cities. The latter group is a key tool for moving misinformation and disinformation from primarily Russian-influenced circles into the general social media population. We saw this phenomenon at play in recent reports of a second military coup in Turkey and unsubstantiated reports of an active shooter that led to the shutdown of JFK Airport. Some news aggregators may be directly controlled by Russia, while other aggregators that use algorithmic collection may be the victims of manipulation.

“Black” active measures are now easier to execute than they were for the Soviets. During the Cold War, according to the 1992 USIA report, these included:

… the use of agents of influence, forgeries, covert media placements and controlled media to covertly introduce carefully crafted arguments, information, disinformation, and slogans into the discourse in government, media, religious, business, economic, and public arenas in targeted countries.

Black active measures create both risks and costs. Agents deployed into the West must avoid detection or risk state-to-state consequences. The KGB’s Cold War efforts to keep these operations secret bore significant financial costs while producing little quantifiable benefit. Stories were difficult to place in mainstream media outlets, and the slow process made it challenging to create momentum behind any one theme.

On social media, this process is far easier, more effective, and relatively difficult to attribute. Without stepping foot in America, Russia’s coordinated hackers, honeypots, and hecklers influence Americans through people-to-people engagement.

Hackers provide the fuel for themes and narratives. Initially, hackers concentrated on defacements, denial of service, and misinformation posted on compromised social media accounts. By 2015, the Kremlin’s hacking efforts were much more sophisticated, coalescing into two distinct, competing hacking collectives: Fancy Bear (APT 28), possibly operated by Russian military intelligence (GRU), and Cozy Bear (APT 29), possibly operated by Russia’s foreign intelligence service (FSB).

The most notorious Russian-linked hacker, using the handle Guccifer2.0, targets current and former U.S. government officials, American security experts, and media personalities by seeking access to their private communications and records. Former Secretary of State Colin Powell and Clinton campaign chairman John Podesta provide two current examples, but there will be many more to come. Today, Guccifer2.0 posts threats of election meddling this coming Tuesday.

guccif
Guccifer 2.0 Warning on Election Posted to Social Media

In addition to phishing and cracking attacks, these hackers are aided by honeypots, a Cold War term of art referring to an espionage operative who sexually seduced or compromised targets. Today’s honeypots may include a component of sexual appeal or attraction, but they just as often appear to be people who share a target’s political views, obscure personal hobbies, or issues related to family history. Through direct messaging or email conversations, honeypots seek to engage the target in conversations seemingly unrelated to national security or political influence.

These honeypots often appear as friends on social media sites, sending direct messages to their targets to lower their defenses through social engineering. After winning trust, honeypots have been observed taking part in a range of behaviors, including sharing content from white and gray active measures websites, attempting to compromise the target with sexual exchanges, and most perilously, inducing targets to click on malicious links or download attachments infected with malware.

One of us directly experienced how social media direct messages from hackers or influencers seek to compromise or sway a target by using social engineering to build a rapport. Operators may engage the target’s friends or acquaintances, drawing them into conversations to encourage trust. Once conversations are started, an agent of influence will be introduced into the group and will subsequently post on Russian themes from grey outlets or introduce malicious links.

When targets click on malicious links, Fancy Bear and Cozy Bear extract personal information from public officials, media personalities, and American experts and selectively dump the content obtained at opportune times. The goal is to increase popular mistrust of political leaders and people with expertise or influence in specific circles of interest to Russia, such as national security. In some cases, experts criticizing Russia have had their computers mysteriously compromised by destructive malware and their research destroyed.

Online hecklers, commonly referred to as trolls, energize Russia’s active measures. Ringleader accounts designed to look like real people push organized harassment — including threats of violence — designed to discredit or silence people who wield influence in targeted realms, such as foreign policy or the Syrian civil war. Once the organized hecklers select a target, a variety of volunteers will join in, often out of simple antisocial tendencies. Sometimes, they join in as a result of the target’s gender, religion, or ethnic background, with anti-Semitic and misogynistic trolling particularly prevalent at the moment. Our family members and colleagues have been targeted and trolled in this manner via Facebook and other social media.

Hecklers and honeypots can also overlap. For instance, we identified hundreds of accounts of ostensibly American anti-government extremists that are actually linked to Russian influence operations. These accounts create noise and fear, but may also draw actual anti-government extremists into compromising situations. Based on our observations, the latter effort has not been widely successful so far among anti-government extremists, who tend to stay in their own social networks and are less likely to interact with Russian influence accounts, but our analysis points to greater overlap with networks involving American white nationalists.

Russia’s honeypots, hecklers, and hackers have run amok for at least two years, achieving unprecedented success in poisoning America’s body politic and creating deep dissent, including a rise in violent extremist activity and visibility. Posting hundreds of times a day on social media, thousands of Russian bots and human influence operators pump massive amounts of disinformation and harassment into public discourse.

This “computational propaganda,” a term coined by Philip Howard, has the cumulative effect of creating Clayton A. Davis at Indiana University calls a“majority illusion, where many people appear to believe something ….which makes that thing more credible.” The net result is an American information environment where citizens and even subject-matter experts are hard-pressed to distinguish fact from fiction. They are unsure who to trust and thus more willing to believe anything that supports their personal biases and preferences.

The United States disbanded the U.S. Information Agency after the Cold War and currently fields no apparatus to detect and mitigate Russia’s social media influence campaign. As seen in America’s disjointed counter narratives against the Islamic State, efforts to create any kind of U.S. information strategy are plagued by disparate and uncoordinated efforts strewn among many military, diplomatic, and intelligence commands. American cyber operations and hacking reside separately with the National Security Agency. Russia, on the other hand, seamlessly integrates the two efforts to devastating effect.

After Election Day: What to do about Russia’s Active Measures?

The most overwhelming element of Russia’s online active measures over the last year relate to the presidential campaign of Donald Trump. Russian promotion of Trump not only plagues Clinton, but likely helped sideline other GOP candidates in early 2016 with a more traditional anti-Russia view of foreign policy. It is impossible to assess whether Donald Trump is even fully aware of these efforts, let alone complicit. Setting aside that question for a moment, some readers will immediately ask how we are so sure all this activity goes back to Russia?

There are a number of technical indicators, most tellingly the synchronization of messaging and disinformation with “white” outlets such as RT and Sputnik, as well as the shocking consistency of messaging through specific social networks we have identified.

Dmitri Alperovich of the cyber-security firm Crowdstrike first attributed the DNC hacks to Russia. He explained in a recent War on the Rocks podcast:

The important thing about attribution…is that it’s not that much different from the physical world. Just like someone can plan a perfect bank heist and get away with it, you can do that in the cyber-domain, but you can almost never actually execute a series of bank heists over the course of many years and get away with it. In fact, the probability of you not getting caught is miniscule. And the same thing is true in cyber-space because eventually you make mistakes. Eventually you repeat tradecraft. It’s hard to sort of hide the targets you’re going after…

There are other, less subtle indications as well, for instance, a notification from Google: “We believe we detected government backed attackers trying to steal your password. This happens to less than 0.1% of all Gmail users.” When one of us receives these messages, we feel confident we’re on the right trail.

Mosul, Iraq Offensive Chemical Weapons Report

 DailyMail

Islamic State executes scores, stockpiles chemicals – U.N.

MOSUL: Islamic State fighters have executed scores more people around Mosul this week and are reportedly stockpiling ammonia and sulphur in civilian areas, possibly for use as chemical weapons, U.N. human rights spokeswoman Ravina Shamdasani said on Friday.

A mass grave with over 100 bodies found in the town of Hammam al-Alil was one of several Islamic State killing grounds, Shamdasani said, citing information gleaned from sources on the ground including a man who played dead during a mass execution.

Public executions were being carried out for “treason and collaboration” with Iraqi forces trying to recapture the city, or for the use of banned mobile phones or desertion.

People with explosive belts, possibly teenagers or young boys, were being deployed in the alleys of Old Mosul, while abducted women were being “distributed” to fighters or told they would be used to accompany Islamic State convoys, she said.


ISIS Killed over 70 Mosul Civilians as Iraqi Forces Advancing

Troops of Iraq’s elite Counter-Terrorism Service (CTS) resumed their offensive against ISIS on the streets of Mosul on Friday after several days of relative quiet as the United Nations said ISIS militants have executed scores more people around the city this week.

The battle to retake Mosul, the ISIS terrorist last major stronghold in Iraq, is now in its fourth week, while Iraqi troops have pushed into the east of the city.

“Our forces have begun the attack on Arbajiyah. The clashes are ongoing,” Staff Lieutenant Colonel Muntadhar Salem said, referring to an area in the east of the city.

According to United Nation ISIS (ISIL, IS and Daesh) shot dead 40 civilians on Tuesday in the northern Iraqi city of Mosul after accusing them of treason, the United Nations says.

Their bodies were then hung from electricity poles in several districts, the office of the UN Human Rights Commissioner said, citing sources.

A man was also reportedly shot dead in public in central Mosul for ignoring an ISIS ban on using mobile phones.

The killings of the civilians appeared to have been carried out on the orders of self-appointed “courts”, according to the UN report.

The UN says 20 civilians were also shot dead on Wednesday evening at the Ghabat military base in northern Mosul, supposedly for leaking information.

The UN also expressed concern at ISIS deployment of teenagers and young boys. Children are apparently seen in an ISIS video issued on Wednesday shooting dead four people for spying.

ISIS also announced on 6 November that it had beheaded seven militants for deserting the battlefield in the Kokjali district of eastern Mosul, the UN says.

Among the sources cited for the UN’s information was a man who played dead during a mass killing by ISIS terrorists.

UN High Commissioner for Human Rights Zeid Raad al-Hussein called for the government to “act quickly to restore effective law enforcement in areas retaken from ISIL (ISIS) to ensure that captured fighters and their perceived supporters are dealt with according to the law”.

Troops have reportedly been consolidating gains made in the eastern outskirts of Mosul, which they entered nine days ago amid fierce fighting.

Above Footage shows Peshmerga forces continue to clear the recently recaptured town of Bashiqa of improvised explosive devices left by Islamic State militants.

****What next for Islamic State? Incubating areas of sanctuary and they are.

In part from Rand: First, insurgent groups that lose territory generally need to find sanctuaries that allow them to rest, resupply their depleted forces, and plan future operations. In some cases, these safe havens are outside the country. In Afghanistan, the Taliban’s leadership and many of its fighters fled to neighboring Pakistan after their defeat in 2001 at the hands of U.S. and Afghan forces. Over the next several years, the Taliban used its safe havens in Pakistan to restart the war in Afghanistan, where it remains a significant threat to the Afghan state today. Similarly, Fidel Castro and his surly band of communist rebels suffered a debilitating defeat in July 1953 against the Cuban government in the city of Santiago de Cuba. But Castro eventually reorganized in Mexico, plotted his next steps in relative security, and eventually overthrew the government of Fulgencio Batista in 1959.

Sometimes adequate sanctuaries are available inside the country. In Somalia, al-Shabab lost virtually all of the territory it once controlled following military operations by the African Union Mission in Somalia, Somali government, allied clan militias, and U.S. forces from 2011 to 2015. But al-Shabab found a sanctuary in the Jubba River valley in southern Somalia among allied clans, and it has since waged a violent terrorist campaign in Somalia and neighboring countries like Kenya.

Islamic State leaders already appear to appreciate the importance of sanctuaries. Where the Islamic State has already lost territory in Iraq, such as in Ramadi and Fallujah, its fighters have melted away into the dense agricultural and desert areas around urban centers. Operating out of these jazirah (“isolated”) areas, the Islamic State could replicate the model it perfected a decade ago under the name “al Qaeda in Iraq” by sustaining itself through low-level criminal activity, storing weapons caches for extended operations, and executing a grueling murder and intimidation campaign. Islamic State fighters can also leverage the territory the group currently controls in Syria, which extends north of Raqqa and southeast along the Euphrates River to the Syrian-Iraqi border. This sanctuary was essential for the Islamic State’s resurgence in 2014.

Insurgent groups that face more powerful adversaries generally adopt a guerrilla strategy.

Second, insurgent groups that face more powerful adversaries generally adopt a guerrilla strategy rather than attempting to wage a conventional campaign and fight their enemies in pitched battles. A guerrilla strategy involves the use of military and political resources to mobilize a local population, conduct hit-and-run attacks rather than face the enemy directly on the battlefield, and undermine the government’s will to fight. Guerrilla warfare is attractive to groups that are significantly weaker than government security forces, which is why a guerrilla campaign is sometimes likened to a “war of the flea.”

For T.E. Lawrence, the British officer and advisor to Arab insurgents against the Ottoman Empire, guerrilla campaigns were the sine qua non of insurgent warfare, and mobility and hit-and-run attacks were their essential tactic. He wrote in The Evolution of a Revolt: “Granted mobility, security (in the form of denying targets to the enemy), time, and doctrine (the idea to convert every subject to friendliness), victory will rest with the insurgents, for the algebraical factors are in the end decisive.”

Most successful insurgent groups have utilized guerrilla strategies. In Guinea-Bissau, Amilcar Cabral and his African Party for the Independence of Guinea and Cape Verde (PAIGC) adopted a successful guerrilla campaign to win independence from Portugal. The PAIGC spent more than a decade conducting hit-and-run attacks against Portuguese forces until Guinea-Bissau became independent from Portugal in 1974. In South Africa, African National Congress (ANC) leaders began preparations in 1963 for Operation Mayibuye, which involved organizing and implementing a guerrilla strategy against the government. It was orchestrated by the ANC’s military wing, Umkhonto we Sizwe, and contributed to the end of the apartheid government in South Africa by 1994.

Today, the Islamic State faces a powerful coalition of adversaries that includes seasoned Kurdish Peshmerga, Iraqi security forces, Sunni Arab militias, Shiite militias, and U.S. and other coalition military power. If the Islamic State has any hope of surviving the loss of Mosul, its leaders will likely shift to a classic guerrilla campaign that includes ambushes, raids, sabotage, targeted assassinations, and suicide attacks. The Islamic State waged a successful conventional campaign in 2014 when its fighters from Syria surged across the border into Iraq’s Anbar province in large columns of mechanized and even armored vehicles, joining operatives that had already been active in Fallujah and Ramadi. Clashes often took the form of set battles, trench warfare, and town sieges. But the Islamic State no longer faces such parity, making guerrilla warfare its only viable option. More here.

Sid Blumenthal was POC for Libya, Muslim Brotherhood

 Leader of LIFG, Belhadj

Base of Operation:Mountain territory near Benghazi and al-Akhdar aside the Libyan northeast coasts. The Libyan Islamic Fighting Group began formation from return Libyan Afghans from the war against the soviets ending in 1989; however, was not officially established as a group until the year of 1995. Between then and the present, the group has gone through several mischievous movements of acting out against the government. Per the United Nations under the direction of the U.S. State Department during the Bush administration:

LIFG is believed to have several hundred members or supporters, mostly in the Middle East and Europe. Since the late 1990s, many LIFG members have fled from Libya to various Asian, Arabian Gulf, African, and European countries, particularly the United Kingdom. It is likely that LIFG has maintained a presence in eastern Libya and has facilitated the transfer of foreign fighters to Iraq.

Hillary Clinton Knew She Was Helping Islamists Move Into Power In Libya

Howley/DC: Hillary Clinton received intelligence that her effort to bring down Libyan president Muammar Gaddafi was leading to the rise of al-Qaeda militants and the Muslim Brotherhood in the country, according to emails released by WikiLeaks.

More than a year before the Benghazi attack, Clinton learned that al-Qaeda terrorists were infiltrating the post-Gadaffi transitional government. Clinton also acknowledged that the Muslim Brotherhood wielded the “real power” in the rebel movement that Clinton was supporting — and that their Brotherhood allies in Egypt were waiting in the wings to move into Libya’s oil sector.

Clinton received a “CONFIDENTIAL” memo from Sidney Blumenthal on March 27, 2011. The subject of the email was “Re: Lots of new intel; Libyan army possibly on verge of collapse.”

Blumenthal explained that “radical/terrorist” groups were “infiltrating the NLC,” or National Libyan Council, a rebel quasi-government that earned French recognition as Libya’s governing body that very same month. Clinton was warned that al-Qaeda could become major players in the region.

Blumenthal wrote:

“This situation has become increasingly frustrating for French President Nicolas Sarkozy, who, according to knowledgeable individuals, is pressing to have France emerge from this crisis as the principal foreign ally of any new government that takes power. Sarkozy is also concerned about continuing reports that radical/terrorist groups such as the Libyan Fighting Groups and Al Qa’ida in the Islamic Maghreb (AQIM) are infiltrating the NLC and its military command. Accordingly, he asked sociologist who has long established ties to Israel, Syria, and other B6 nations in the Middle East, to use his contacts to determine the level of influence AQIM and other. terrorist groups have inside of the NLC. Sarkozy also asked for reports setting out a clear picture of the role of the Muslim Brotherhood in the rebel leadership…

…(Source Comment: Senior European security officials caution that AQIM is watching developments in Libya, and elements of that organization have been in touch with tribes in the southeastern part of the country. These officials are concerned that in a post-Qaddafi Libya, France and other western European countries must move quickly to ensure that the new government does not allow AQIM and others to set up small, semi- autonomous local entities—or “Caliphates”—in the oil and gas producing regions of southeastern Libya.)”

On May 30, 2011, Hillary aide Jake Sullivan sent the secretary of state a full list of known “Libya emissaries.” By then, the National Libyan Council had given way to the Transitional National Council (TNC), but the “real power” still lay with the Muslim Brotherhood.

Sullivan’s intelligence memo noted:

“The Qadhafi regime has also met with the Libyan Muslim Brotherhood leadership in Egypt. According to Qadhafi chief of staff Fouad Zlitni, the Muslim Brotherhood asserts that TNC may be the political leadership of the opposition, but the real power lies with the Libyan Brotherhood and they are apparently willing to bide their time. The Qadhafi regime also offered to send senior tribal leaders to Benghazi to negotiate with the TNC, but the TNC rejected the proposal.”

Clinton forwarded that email to an aide, acknowledging that she had received it and assessed its contents.

Sidney Blumenthal wrote to Clinton again on July 3, 2012, two months before Benghazi, to talk about the upcoming election. The election, Blumenthal noted, was how the Muslim Brotherhood in Egypt was hoping to use the new Brotherhood party in Libya to get into the Libyan oil game.

Blumenthal wrote:

“Source Comment: In the opinion of a knowledgeable individual, the division of the 200 seats in the GNC lies at the heart of this matter, with 120 seats allotted for the Tripolitania, 60 for Barqa, and 18 for the Fezzan area. At present, the Libyan Muslim Brotherhood (LMB) and its political arm, the Justice and Construction Party (JCP), are attempting to mount a national campaign, receiving discreet advice and technical support from the Egyptian Muslim Brotherhood (EMB). With this assistance, Jalil is convinced that the JCP is the party that operates most effectively throughout the country. Jalil has established ties to the EMB, from whom he has learned that JCP leader Mohamad Sowan and his associates are working with the leadership of the EMB.) 4.According to his sources, Jalil believes that he can work with Sowan and the LMB/JCP; however, he is concerned that Mohammed Morsi, the newly elected EMB President of Egypt, and EMB Supreme Guide Mohammed Badie are focused on developing Egyptian influence in Libya. Jalil has been informed privately that these EMB leaders want to establish a strong position in Libya, particularly in the oil services sector as part of their effort to improve Egypt’s economic situation.

Over in Egypt, Clinton helped spur the uprising that led to the Muslim Brotherhood briefly taking power in that country around the same time. And a young Clinton Foundation employee, Gehad El-Haddad, was already working in Cairo to help the Muslim Brotherhood gain power.

El-Haddad was arrested in 2013, following the brief and disastrous reign of Muslim Brotherhood leader Mohammed Morsi, for inciting violence. He was reportedly one of Morsi’s top advisers. El-Haddad was sentenced to life in prison in 2015.