The Muslim Brotherhood, Then, Now and Hillary

Wonder if Hillary or Anne Patterson received and read the full Great Britain document on the investigation into the Muslim Brotherhood? The scrubbed UK investigation report is here.

Misguided diplomacy at the White House and the U.S. State department is mission objectives and investment over terror facts and names, of this there is no dispute.

 

Hillary Emails: State Discussed ‘Cooperating,’ ‘Increased Investment’ With Egypt’s Muslim Brotherhood Government

TEL AVIV – 1,500 pages of former Secretary of State Hillary Clinton’s emails provide insight into the level of support the U.S. was considering in 2012 for Egypt’s newly elected Muslim Brotherhood government.

Breitbart: On August 30, 2012, Robert D. Hormats, the under-secretary of state for economic affairs, wrote to Clinton’s then-Deputy Chief of Staff Jake Sullivan to update him on a meeting he held with .

Shater was later sentenced to life imprisonment and then to death for multiple alleged crimes, including inciting violence and financial improprieties.

The email reveals Hormats and other U.S. diplomats discussed  methods of cooperation with Shater, including an increase in American direct foreign investment.

Hormats wrote:

Anne Patterson, Bill Taylor, and I met with Muslim Brotherhood Deputy Supreme Guide Khairat al-Shater. He discussed broad principles of economic development based on 100 large infrastructure projects (over a billion dollars each) as part of Morsi’s Nadah (Renaissance Plan) Plan; ways of cooperating with the US to obtain support for these projects and for SMEs; and his hope for an IMF agreement and increased foreign direct investment from the US, the West, and the Arab world. He also noted that it was a priority for the GOE to build a true democratic system based on human rights and the rule of law.

Patterson, the U.S. Ambassador to Egypt at the time, was known for her repeated engagement with the Muslim Brotherhood. Taylor was the U.S. Special Coordinator for Middle East Transitions; that is, the U.S. envoy to the new leadership that emerged in the wake of the so-called Arab Spring.

Hormats’ meetings with the Muslim Brotherhood were not secret. But the emails reveal the scope of his discussions with the group about possible future investment.

In September 2012, the New York Timesreported that Hormats had led a delegation of businesses to Egypt to discuss possible private investment.

That same month, the State Department published a document that received little news media attention. It revealed that in August and September 2012, “Hormats visited Egypt to negotiate possible bilateral debt relief,”but the document did not provide further details.

After the toppling of Egypt’s longtime president Hosni Mubarak, the Muslim Brotherhood’s Muhammad Morsi served as president from June 30, 2012 to July 3, 2013, when he was removed from office amidst widespread protests and a military coup. After Mubarak was removed from office, the Obama administration pledged $1 billion in assistance to bolster Egypt’s transition to democracy.

Clinton and Secretary of Defense Leon Panetta each visited Cairo and met with Morsi during his tenure as president.

The meeting that Hormats describes in the email took place while the U.S. was negotiating an aid package to help relieve Egypt’s debt crisis amid concerns from U.S. lawmakers about funding the Muslim Brotherhood.

The email was sent a week and a half before protesters besieged the U.S. Embassy in Cairo on September 11, 2012, the same day the U.S. Special Mission in Benghazi came under attack.

Following the attacks, Obama stated of Morsi’s government, “I don’t think that we would consider them an ally, but we don’t consider them an enemy.”

***

Back in November of 2015, Senator Cruz was leading a charge in the Senate to list the Muslim Brotherhood as a terror organization. The Muslim Brotherhood is part of several proven terror organizations. Going back to 2014, Saudi Arabia joined the United Arab Emirates and Bahrain in withdrawing its ambassadors from Qatar, which it sees as an important supporter of the Muslim Brotherhood.

in 2014, Prime Minister David Cameron ordered an investigation into the Muslim Brotherhood as a terror organization and the results were conclusive they were, however due to internal pressure from Islamists all over Europe and especially the UK, Cameron pulled the report.

 

U.S. 133 Cyber Teams Under Construction

Is this a change and an approval by Obama from 2012? (Note this is only a defensive strategy)

Presidential Cyberwar Authority

 

In October 2012, President Obama signed the top-secret Presidential Policy Directive 20, which enabled the military to aggressively initiate and thwart cyber­attacks related our nation’s security. While most of the cyber attack targets are network systems or infrastructure-based, an elite Psychological Operations (PsyOps) team has focused its efforts on secretly defacing the public websites of our adversaries. Due to the high visibility and sensitive nature of this activity, only President Obama has the authority to target and launch these types of attacks.

The President authorizes these attacks using the global Cyber Warfare Command and Control System (CWCCS), which is accessible from this web page only from the President’s authorized computer.

****

 

WASHINGTON (AP) — Not long after Defense Secretary Ash Carter prodded his cyber commanders to be more aggressive in the fight against Islamic State, the U.S. ramped up its offensive cyberattacks on the militant group.

According to several U.S. officials, the attacks are targeting the group’s abilities to use social media and the Internet to recruit fighters and inspire followers, U.S. officials told The Associated Press.

U.S. officials confirmed that operations launched out of Fort Meade, Maryland, where the U.S. Cyber Command is based, have focused on disrupting the group’s online activities. The officials said the effort is getting underway as operators try a range of attacks to see what works and what doesn’t. They declined to discuss details, other than to say that the attacks include efforts to prevent the group from distributing propaganda, videos or other types of recruiting and messaging on social media sites such as Twitter, and across the Internet in general.

Other attacks could include attempts to stop insurgents from conducting financial or logistical transactions online.

The surge of computer-based military operations by U.S. Cyber Command began shortly after Carter met with commanders at Fort Meade last month.

Several U.S. officials spoke about the cyber campaign on condition of anonymity because they were not authorized to discuss it publicly. Much of the effort is classified.

Carter mentioned the operations briefly Thursday, telling a House Appropriations subcommittee only that Cyber Command is beginning to conduct operations against the Islamic State group. He declined to say more in a public setting.

The more aggressive attacks come after months of pressure from Carter, who has been frustrated with the belief that the Pentagon — and particularly Cyber Command — was losing the war in the cyber domain.

Late last year Carter told cyber commanders they had 30 days to bring him options for how the military could use its cyberwarfare capabilities against the group’s deadly insurgency across Iraq and Syria, and spreading to Libya and Afghanistan. Officials said he told commanders that beefing up cyberwarfare against the Islamic State group was a test for them, and that they should have both the capability and the will to wage the online war.

 

But the military cyber fight is limited by concerns within the intelligence agencies that blocking the group’s Internet access could hurt intelligence gathering.

Officials said Carter told commanders that he the U.S. to be able to impact Islamic State operations without diminishing the indications or warnings U.S. intelligence officers can glean about what the group is doing. On Jan. 27, Carter and Marine Gen. Joseph Dunford, chairman of the Joint Chiefs of Staff, went to Fort Meade for an update.

Officials familiar with Carter’s meetings said the secretary was frustrated that as Cyber Command has grown and developed over the past several years, it was still focused on the cyberthreats from nations, such as Iran, Russia and China, rather than building a force to block the communications and propaganda campaigns of Internet-savvy insurgents.

 

“He was right to say they could be more forward leaning about what they could possibly do against ISIS,” said James Lewis, a cybersecurity expert at the Center for Strategic and International Studies. “You could disrupt their support networks, their business networks, their propaganda and recruitment networks.” However, Lewis added, the U.S. needs to be careful about disrupting the Internet to insure that attacks don’t also affect civilian networks or systems needed for critical infrastructure and other public necessities. U.S. officials have long been stymied by militants’ ability to use the Internet as a vehicle for inspiring so-called lone wolf attackers in Western nations, radicalized after reading propaganda easily available online.

“Why should they be able to communicate? Why should they be using the Internet?” Carter said during testimony before the defense appropriations subcommittee. “The Internet shouldn’t be used for that purpose.” He added that the U.S. can conduct cyber operations under the legal authorities associated with the ongoing war against the Islamic State group. The U.S. has also struggled to defeat high-tech encryption techniques used by Islamic State and other groups to communicate. Experts have been working to find ways to defeat those programs.

Cyber Command is relatively new. Created in 2009, it did not begin operating until October 2010.

Early on, its key focus was on defending military networks, which are probed and attacked millions of times a day. But defense leaders also argued at length over the emerging issues surrounding cyberwarfare and how it should be incorporated.

 

The Pentagon is building 133 cyber teams by 2018, including 27 that are designed for combat and will work with regional commands to support warfighting operations. There will be 68 teams assigned to defend Defense Department networks and systems, 13 that would respond to major cyberattacks against the U.S. and 25 support teams.

FBI/NSA Versus Encryption, Investigating Plotting Attacks

Perspective only: Paris Attack and operating in a realm before any attack

NSA chief: ‘Paris would not have happened’ without encrypted apps

Michael Isikoff

Chief Investigative Correspondent

National Security Agency Director Adm. Michael Rogers warns that encryption is making it “much more difficult” for the agency to intercept the communications of terrorist groups like the Islamic State, citing November’s Paris attacks as a case where his agency was left in the dark because the perpetrators used new technologies to disguise their communications.

In an exclusive interview with Yahoo News, Rogers confirmed speculation that began right after the attack: that “some of the communications” of the Paris terrorists “were encrypted,” and, as a result, “we did not generate the insights ahead of time. Clearly, had we known, Paris would not have happened.”

Rogers’ comments were made on Friday, just days before the FBI obtained a court order requiring Apple to provide a “backdoor” into the data on the iPhone of one of the shooters in the San Bernardino, Calif., terror attack in December — an order the company is resisting. But his remarks are likely to fuel the debate over encryption that has sorely divided the U.S. intelligence and law enforcement community, on one side, and privacy advocates and U.S. technology companies. (A spokesman for the NSA had no comment today on the court order or on Apple’s response.)

Rogers has at times sought to steer a middle ground in this debate, acknowledging that encryption is “foundational to our future” and even saying recently that arguing about it “is a waste of time.” In the Yahoo News interview, he frankly acknowledged, “I don’t know the answer” to unencrypting devices and applications without addressing the concerns over privacy and competitiveness, calling for a national collaboration among industry and government officials to solve the problem.

But he left little doubt about the impact encryption is having on his agency’s mission.

“Is it harder for us to generate the kind of knowledge that I would like against some of these targets? Yes,” Rogers said. “Is that directly tied in part to changes they are making in their communications? Yes. Does encryption make it much more difficult for us to execute our mission. Yes.”

Rogers also provided new details about his agency’s efforts to implement the USA Freedom Act, a law passed in the wake of the Edward Snowden disclosures, which he said has made it “more expensive” for his agency to access the phone records of terror suspects inside the United States and has resulted in a “slightly slower” retrieval of data from U.S. phone companies.

But Rogers said the delay in retrieving phone records is measured “in hours, not days or weeks,” and he has not yet seen any “significant” problems that have “led to concerns … this is not going to work.”

“When I say more difficult to do the job, it’s certainly a little slower,” he said. “There is no doubt about that. It is not as fast.”

The new law — which has become a contentious issue in the presidential campaign — requires the NSA to get a secret court order to retrieve individual domestic phone records rather than collecting them in bulk and storing them in agency computers, as it had been doing before the Snowden disclosures. Critics, such as Sen. Marco Rubio, charge that the act has weakened the country’s defenses in the face of the mounting threats from the Islamic State and other terror groups.

But Rogers confirmed for the first time that the law was used successfully by the NSA after the San Bernardino terror attack to retrieve the phone records of the two perpetrators, and the agency “didn’t find any direct overseas connections.” Those records provided “metadata” — the time and duration of phone calls — but not the content of emails and text messages that the FBI is seeking by requiring Apple to unlock one of the iPhones. The FBI is continuing its efforts to track down who the two shooters “may have communicated with to plan and carry out” the attack, according to a court filing Tuesday.

Rogers’ comments came during a rare and wide-ranging interview inside the “Battle Bridge,” a special NSA situation room at its headquarters in Fort Meade, Md., equipped with teleconference screens to the White House and secure facilities around the world. It was built after the Osama bin Laden raid for use during international crises.

The former Navy cryptographer described a far-reaching reorganization of the electronic spying agency — dubbed NSA21 — that he is implementing this month to cope with evolving new national security threats. Chief among them: persistent cyberattacks from “nation state actors,” who he said are repeatedly hacking into — and Rogers believes laying the groundwork for manipulation of — the nation’s critical infrastructure systems, such as the electrical grid, the banking system and the energy sector.

Those foreign powers — widely acknowledged to be Russia, China, Iran and North Korea, although he wouldn’t name them — are “penetrating systems, what we think is for the purpose of reconnaissance. To get a sense of how they are structured. Where are their vulnerabilities? What are the control points that someone would want to access?”

While Rogers said he was “not going to get into specifics,” U.S. officials have confirmed that those attacks included an Iranian hack into the computer system of a New York dam that alarmed White House officials in 2013 and a highly sophisticated Russian infiltration of an unclassified Pentagon Joint Staff computer network that prompted the NSA director to shut down the entire network for two weeks last summer.

“This is not episodic or short-term focused,” said Rogers, who also serves as commander of the U.S. Cyber Command. “My sense is you are watching these actors make a long-term commitment. How do we ensure we have the capability to potentially impair [their] ability to actually operate?”

Yahoo News asked Rogers what motivated the attacks.

“I believe they want to have the capability, should they come to a political decision, that they in some way want to interfere with the United States or send a message to us,” he said.

One question Rogers pointedly declined to address is whether any overseas intelligence services had penetrated Hillary Clinton’s unsecured private email server — a scenario that former Defense Secretary Robert Gates recently said was “highly likely.”

“It’s something I’m not going to get into right now,” he said when pressed by Yahoo News as to whether such a penetration had taken place.

Rogers’ answer to the threat of foreign cyberattacks, incorporated into NSA21, is to create a new Directorate of Operations by merging the agency’s Signals Intelligence directorate — its electronic spying arm, which intercepts hundreds of millions of telephone calls, emails and text messages around the globe — with its smaller Information Assurance arm, which works with private industry to defend U.S. computer networks.

The proposal has prompted criticism that it will heighten suspicions of the NSA, making private companies even less willing to cooperate with the agency for fear of being seen as part of its massive global surveillance mission.

“I have to admit, it was something I spent a lot of time, as did the team, thinking about,” Rogers said when asked about the criticism. He added later, “I certainly acknowledge that there are some who would argue, ‘Hey, but you have this perception battle.’ My statement to that would be, ‘We have that perception battle every single day of the year, given the fact that the NSA, we acknowledge, works in both the offensive [signals interception] and defensive [cybersecurity] structures.’”

Dealing with the “perception” of the NSA as an unchecked surveillance colossus has been Rogers’ principal challenge since he took over the agency nearly two years ago during the biggest crisis in its history — the aftermath of the Snowden leaks, described by his predecessor, Gen. Keith Alexander, at the time as “the greatest damage to our combined nation’s intelligence systems that we have ever suffered.”

A congenial career Navy cryptologist who previously was commander of the Navy’s Fleet Cyber Command, Rogers has sought to repair the agency’s image and mend fences with Capitol Hill, striking a noticeably more measured and less combative tone in his public statements than Alexander did.

But when pressed about the lingering impact of the Snowden disclosures and persistent questions among privacy advocates and members of Congress about the NSA’s continued “incidental” collection of U.S. citizens’ communications, Rogers was unyielding and unapologetic.

He twice refused, for example, to shed any light on how many Americans’ emails and phone calls are “incidentally” collected by the NSA in the course of intercepting the communications of foreign targets. “We don’t talk about the specifics of the classified mission we do,” he said. He declined to explain why such information would be classified but insisted that access to those communications by the FBI is governed by legal processes.

Rogers warned that terrorist groups such as the Islamic State are moving to encrypted apps and networks, the so-called dark Web — a trend he asserted was “accelerated” by the Snowden disclosures.

“The trend has happened much faster than we thought,” he said. “And the part that is particularly discouraging to me is when we get groups, actors, specifically discussing the [Snowden] disclosures saying, ‘Hey, you need to make sure you don’t do X, Y or Z, or you don’t use this, because remember we know the Americans are into this.

“You’ve seen al-Qaida expressly, for example, reference the [Snowden] disclosures. You’ve seen groups — ISIL does the same — talk about how they need to change their discipline, need to change their security as a result of their increased knowledge of what we do and how we do it.”

But while many experts have argued that the movement toward encryption is the inevitable result of evolving new technologies, Rogers pointed to Snowden.

“No one should doubt for one minute there has been an impact here,” Rogers said. “I will leave it to others to decide right, wrong, good or bad. But there shouldn’t be any doubt in anybody’s mind that there has been an impact as a result of these disclosures.”

Rogers has strong feelings about what should happen to Snowden, who remains in Moscow, hailed around the world by many civil liberties groups, receiving accolades and awards (and financial compensation for speeches he delivers via Skype) — all while remaining a fugitive from U.S. justice. Rogers has not seen “Citizenfour,” the Oscar-winning documentary by Laura Poitras that presents the former NSA contractor as a courageous whistleblower, and he says he will “probably” not see the upcoming film “Snowden,” due in theaters this May, by Oliver Stone.

Asked about proposals that Snowden should receive some sort of leniency as part of a deal that would bring him home, Rogers talked about the concept of “accountability.” He recalled a conversation he had with his father about the My Lai Massacre when he joined the Naval ROTC in the post-Vietnam era in 1981.

“Dad, what do you do when you get an order that you think is immoral, unethical or illegal?” he said. “And my father, something I’ll always remember, said to me, ‘Michael, you must be willing to stand up and say, “This I will not do.” But Michael, you must also be willing to be held accountable for the decision you have made. And don’t ever forget, son, responsibility and accountability are intertwined. And it ain’t one or the other. It’s about both.’ And that seems to have been forgotten in all of this.”

Genocide Label for ISIS? Kerry Unsure

What happened to Bashir al Assad and the genocide happening to Syrians?

Kerry weighs ‘genocide’ label for Islamic State

Secretary of State John Kerry signaled today that he plans to decide soon whether to formally accuse the Islamic State of genocide amid what sources describe as an intense debate within the Obama administration about how such a declaration should be worded and what it might mean for U.S. strategy against the terrorist group.

“None of us have ever seen anything like it in our lifetimes,” Kerry said during a House subcommittee hearing Wednesday about beheadings and atrocities committed by the Islamic State.

But in response to questioning by Rep. Jeff Fortenberry, a Nebraska Republican who has been spearheading a resolution in Congress demanding the administration invoke an international treaty against genocide, Kerry was careful not to tip his hand on what has turned into a thorny internal legal debate with political and potentially military consequences.

Saying the department was reviewing “very carefully the legal standards and precedents” for a declaration of genocide against the Islamic State, Kerry added that he had received “initial recommendations” on the issue but had then asked for “further evaluations.”

In his first public comments on the issue, Kerry said he “will make a decision on this” as soon as he receives those evaluations. He didn’t elaborate on when that might occur.

The administration’s plans to invoke the powerfully evocative genocide label — an extremely rare move — was first reported by Yahoo News last November. But at the time, the State Department was focused on restricting the designation to the Islamic State’s mass killings, beheadings and enslavement of the Yazidis — a relatively small minority group of about 500,000 in northern Iraq that the terrorist group has vowed to wipe out on the grounds they are “devil worshipers.”

The disclosure set off a strong backlash among members of Congress and Christian groups who argued that Islamic State atrocities against Iraqi and Syrian Christians and other smaller minority groups also deserved the genocide label. Some conservatives even chastised the administration for displaying a “politically correct bias that views Christians … never as victims but always as Inquisition-style oppressors.”

The issue has since made its way into the presidential campaign; Sen. Marco Rubio has signed a Senate version of a House resolution, co-sponsored by Fortenberry and Rep. Anna Eshoo, for a broader genocide designation that incorporates Christians, Turkmen, Kurds and other groups. Hillary Clinton has also endorsed such as move. In response to a question from a voter at a New Hampshire town hall last December about whether she believes Christians as well as Yazidis should be declared victims of genocide, she said, “I will, because we now have enough evidence.”

A Iraqi Yazidi woman and her children took refuge at the Bajid Kandala camp in Dohuk, Iraq, after fleeing Islamic State jihadists. (Photo: Ahmad Al-Rubaye/AFP)

But administration sources and others intimately familiar with the internal debate say the issue has proven more complicated. While ISIS has openly declared its intention of destroying the Yazidis, they argue, the terrorist group’s leaders have not made equally explicit statements about Christians even while committing killings, kidnappings, forced removals and the confiscation and destruction of churches aimed at Christian groups. As a result, administration officials and State Department lawyers have weighed labeling those acts “crimes against humanity” — a step that critics have said doesn’t go far enough. “We’ve been trying to tell them, crimes against humanity are not a bronze medal,” said one administration official, contending that it should not be viewed as a less serious designation.

Kerry seemed to hint as much in his responses to Fortenberry at Wednesday’s hearing, noting that Christians in Syria “and other places” have been forcibly removed from their homes. “There have been increased, forced evacuations,” he said. “No, its not — they are killing them in that case — but it’s a removal and a cleansing, ethnically and religiously, that is equally disturbing.”

At the same time, two sources familiar with the debate said, Pentagon officials have expressed concerns that a genocide designation would morally obligate the U.S. military to take steps — such as protecting endangered populations or using drones to identify enslaved women — that could divert resources from the campaign to defeat the Islamic State. (An administration official told Yahoo News Wednesday that any such concerns have not been raised in “interagency” discussions over the genocide issue. “There is no resource issue,” the official said.)

In fact, many legal scholars say, there is considerable debate about just what practical impact a genocide designation would have. It would be made under a loosely worded 1948 international treaty that compels signatory nations, including the United States, “to prevent and to punish” the “odious scourge” of genocide defined as acts “committed with intent to destroy, in whole or in part, a national, ethnical (sic), racial or religious group.” As documented by Samantha Power, now the U.S. ambassador to the United Nations, in her 2002 book, “A Problem from Hell,” President Clinton’s Secretary of State Warren Christopher, resisted labeling the mass murder of the Tutsis in Rwanda in 1994 as genocide for fear, as one State Department memo put it at the time, “it could commit [the U.S. government] to actually do something.”

But 10 years later, Secretary of State Colin Powell declared the killings of non-Arab people in Darfur to be genocide — the first time the U.S. invoked such a declaration during an ongoing conflict. But he did so only after receiving a secret State Department memo concluding the designation “has no immediate legal — as opposed to moral, political or policy consequences for the United States.”

Administration officials have argued they are already taking extraordinary steps to protect threatened minorities in Iraq, pointing to, for example, the 2014 evacuation of Yazidis from Mount Sinjar — and that a genocide designation wouldn’t change that. White House press secretary Josh Earnest said as much when he was pressed on the issue during a recent White House briefing during which he said a genocide designation is “an open question that continues to be considered by administration lawyers.”

“The decision to apply this term to this situation is an important one,” Earnest said during a Feb. 4 briefing. “It has significant consequences, and it matters for a whole variety of reasons, both legal and moral. But it doesn’t change our response. And the fact is that this administration has been aggressive, even though that term has not been applied, in trying to protect religious minorities who are victims or potential victims of violence.”

ISIS with WMD, Overstated Threat? Peshmerga Today

Authorities in the Kurdistan said on Friday, according to Reuters, that they are investigating another suspected gas attack by Islamic State (ISIS) against the Kurdish Peshmerga.

Civilians and Peshmerga alike in the Sinjar area are being treated for nausea and vomiting after ISIS rockets containing a chemical substance were fired at them on Thursday the Kurdistan Region Security Council (KRSC) said on its Twitter page.

“If confirmed this will be the eight ISIL weaponized chemical attack against Peshmerga. ISIL tactics continue to become more sophisticated,” warned the council.

The KRSC said the American-led anti-ISIS coalition is helping them with the investigation.

This attack comes the same week that a source within the Organization for the Prohibition of Chemical Weapons (OPCW) said that mustard gas was used against the Peshmerga in August of last year, making 35 of them ill.

This latest attack however appears to have used chlorine gas, a type of gas that is often used in the Syrian conflict. Chlorine gas is a choking agent and nausea and vomiting are telltale signs one has been exposed to it.

Rogan/NR: Chemical agents, by disrupting a military adversary and sowing terror among its civilian population, make for powerful psychological weapons. And, as attested by Bashar al-Assad’s ongoing suffocation of innocent Syrians, chemical weapons are also tools of torture. The National Institutes of Health describes how concentrated chlorine gas affects a human body: “respiratory failure, pulmonary edema, likely acute pulmonary hypertension, cardiomegaly, pulmonary vascular congestion, acute burns of the upper and especially the proximal lower airways, and death.”

For ISIS, weaponized chlorine is a perfect instrument. And ISIS is using it. Reports suggest that ISIS has employed mustard- and chlorine-gas–based weapons in Iraq and Syria. Unfortunately, far worse is likely to come. After all, it’s increasingly obvious that ISIS regards its chemical-weapons programs as a key strategic priority. Last October, for example, the Associated Press described how European organized-crime groups are offering radioactive material to ISIS. And just last week, the Independent reported on the disruption of a ten-person ISIS cell in Morocco — a cell masterminded by ISIS leaders in Libya. The connecting threads are clear: Morocco, a favored destination of Western tourists, offered ISIS an opportunity to follow up in 2016 on its 2015 massacre of 38 people — including 30 Britons — in Sousse, Tunisia. ISIS wants to scare Western tourist investment away from moderate-Muslim nations and implode those nations into chaos. ISIS chemical weapons also threaten U.S. personnel. As ISIS confronts higher stakes — as it does in the battle for its Iraqi capital, Mosul — U.S. personnel will face a growing threat of chemical attack.
This threat demands the strengthening of the U.S. deterrent posture against chemical, biological, radiological, and nuclear threats. At present, that posture stands eviscerated because of the failure to punish Assad’s breach of President Obama’s “red line” on chemical weapons. But that’s only half the story. Consider, too, that an AP report from October highlighted how senior figures in WMD conspiracies are escaping consequences for their actions. That must end. In future, those who enable ISIS WMD programs should face one of two simple repercussions: detention by Jordan’s GID intelligence service, or death. The special urgency of this threat is unique. From Morocco and France to Turkey and Indonesia, ISIS has proven its ability to launch attacks from separate bases in Iraq, Syria, and Libya — and to do so while evading detection by Western intelligence. ISIS chemical-weapons plots must not be underestimated. Of course, as Wilfred Owen reminds us, the use of chemical weapons in pursuit of human misery is nothing new. My British great-grandfather — a veteran of World War I– described German chemical attacks this way: “We could smell the gas coming. Every horse that we had was blind due to gas.” President Obama must recognize this new, old reality. In February 2016, “acute burns of the upper and especially the proximal lower airways, and death” are no longer peripheral concerns suffered by forgotten Syrians at the hands of Assad. Today, ISIS has the means and intent to drown Western civilians — and American credibility — in a green and yellow sea.