Paris Had Their 9/11, who is Next? Interpol

Sorry, but some unvarnished truth is required now and beginning to understand the threat is the first step to safety and self preservation but more, it is both an offensive and defensive measure. This post will be data rich.

July 2015: Interpol has issued a warning to countries operating in the Mediterranean to be on the alert for an attempt by ISIS militants to carry out some sort of operation at sea over the next few days, Italian military sources have told Migrant Report.

Three U.S. governors have taken proactive measures to stop refugees from coming into their respective states but White House senior staffer on the National Security Council, Ben Rhodes stated that the refugee program will continue regardless of matters in Europe and Paris.

Michigan, Alabama, Louisiana are the governors asserting their 10th Amendment authority. The question then becomes if this program continues what other states will be forced to take the refugees?

PARIS (Reuters) – Fingerprints from one of the suicide bombers behind the attacks at the Stade de France in Paris matched the prints of a man registered in Greece in October, a French prosecutor said on Monday.

“At this stage, while the authenticity of a passport in the name of Ahmad al Mohammad, born Sept. 10 1990 in Idlib, Syria needs to be verified, there are similarities between the fingerprints of the suicide bomber and those taken during a control in Greece in October,” the Paris prosecutor said in a statement.

The prosecutor also said a second bomber at the Bataclan concert hall had now been identified. The prosecutor named him as 28-year old Samy Ammour from Drancy, north of Paris and said he was known to counter-terrorism units after being placed under investigation and judicial control for attempting to go to Yemen.

He disappeared in the autumn of 2013 and an international arrest warrant was issued for him.

“Five of the terrorists killed have now been identified,” prosecutor added.

The mastermind of the Paris attack has been identified:

A French official has named the suspected mastermind behind the Paris attacks as a Belgian man called Abdelhamid Abaaoud. He recently traveled to Syria and returned to Belgium.

June 2015: Juergen Stock cited this shift as an emerging trend at a UN Security Council meeting along with changing travel methods being used by foreign fighters seeking to join groups like the Islamic State and al-Qaeda.

Stock was a keynote speaker at a meeting attended by half a dozen ministers including US Secretary of Homeland Security Jeh Johnson to assess progress in implementing a US-sponsored resolution adopted last September requiring all countries to prevent the recruitment and transport of would-be foreign fighters preparing to join extremist groups.

On Friday, the Security Council adopted a presidential statement calling for a significant increase in border controls, improved cooperation at all levels “including preventing terrorists from exploiting technology, communications and resources.”

Johnson said the United States will be developing a new passenger data-screening and analysis system within the next 12 months which will be made available to the international community at no cost for both commercial and government organizations to use.

In a report obtained by The Associated Press on April 1, the panel of experts monitoring UN sanctions against al-Qaeda said the number of fighters leaving home to join al-Qaeda and the Islamic State group in Iraq, Syria and other countries has spiked to more than 25,000 from over 100 nations. The panel said its analysis indicated the number of “foreign terrorist fighters” worldwide increased by 71 percent between mid-2014 and March 2015.

There is no intelligence problem from or by an any government intelligence apparatus, but rather the voids are in the laps of the political wings where they themselves remain in a fetal position due to political correctness. Barack Obama is in that mix.

One of the Paris attacks terrorist was previosly charged, the French prosecutor François Molins said.

Fingerprints from one of the suicide bombers behind the attacks at the Stade de France in Paris matched the prints of a man registered in Greece in October, the prosecutor said on Monday.

It is known that International terrorism warrant was issued for one of the attackers by Interpol.

 

This post will be rich in links, so some real study is required here.

  1. BRUSSELS (AFP) – One of the suicide bombers in the Paris attacks had links to a Belgian Islamic State in Iraq and Syria (ISIS) militant believed to be the mastermind of an extremist cell dismantled in January, a report said on Monday (Nov 16).The name of Paris attacker Brahim Abdeslam appears in several police files alongside leading militant Abdelhamid Abaaoud relating to criminal cases in 2010 and 2011, Flemish-language newspaper De Standaard reported.
  2. Let’s be clear: Al Qaeda, the Islamic State in Iraq and Syria, Boko Haram, the Shabab and others are all violent Sunni Salafi groupings. For five decades, Saudi Arabia has been the official sponsor of Sunni Salafism across the globe.

    Most Sunni Muslims around the world, approximately 90 percent of the Muslim population, are not Salafis. Salafism is seen as too rigid, too literalist, too detached from mainstream Islam. While Shiite and other denominations account for 10 percent of the total, Salafi adherents and other fundamentalists represent 3 percent of the world’s Muslims.

    Unlike a majority of Sunnis, Salafis are evangelicals who wish to convert Muslims and others to their “purer” form of Islam — unpolluted, as they see it, by modernity. In this effort, they have been lavishly supported by the Saudi government, which has appointed emissaries to its embassies in Muslim countries who proselytize for Salafism. The kingdom also grants compliant imams V.I.P. access for the annual hajj, and bankrolls ultraconservative Islamic organizations like the Muslim World League and World Assembly of Muslim Youth.

  3. Seven terrorist attacks have been thwarted in the last six months, David Cameron has revealed as he oversees the biggest increase in security in the UK since the 7/7 bombings, including the recruitment of nearly 2,000 new spies.  He warned that the deadly terrorist attacks that hit Paris on Friday night, killing 129 people, “could happen here” and Britain faced a continued threat by Isis.
  4. The French Prime Minister has warned that more terror attacks are being prepared against France and other European nations as police raids continue across the continent.
  5. The fifth named attacker is Ahmad al Mohammad, a Syrian. He is the man who entered the EU through Greece in October as an asylum seeker. The authenticity of his passport, which said he was born in Idlib in 1990, has not been confirmed.

    He blew himself up at the Stade de France.
  6. Samy Amimour was one of the attackers at the Bataclan, French media reports. 
  7. Prosecutors have confirmed the identity of the fourth named suicide bomber. He is  Samy Amimour, born in 1987 in Paris, living in Drancy. He was reportedly known to security services following a terror case in 2012.

Tell Bloomberg About Darknet Arms Trafficking

Michael Bloomberg, former mayor of New York went off after the Paris attacks stating once again an issue with people having the ability to get their hands on guns. Ah …Michael you trying to do gun control in Europe also? Sheesh. Get a clue Bloomberg, here is a memo on the Darknet.

There is also a State Department visa waiver program that allows foreigners to travel freely in countless countries globally much less, Europe is borderless due to the Schengen Agreement. Borders and documents MATTER! Oh and hey Michael, payment methods often include the bitcoins, track that sir.

The Middle East is full of weapons, all kinds of weapons and to resell them is nothing more than a yard sale. An AK-47 in good condition sells for $50.00 (U.S.) or less.

 

How Dark Net Arms Dealers Could Easily Smuggle Assault Weapons To Paris

Europe’s open-border policy has made it harder for government officials to track illegal weapons that come from as far away as the U.S.

Vocativ: When terrorists in Western Europe want guns, they usually tap into a 20-year-old market that took root and flourished at the end of the Balkan wars. Now with the rise of the dark net, that market has been digitized and deals on illegal guns are only a few minutes away.

Vocativ used our technology to scan several current and active dark net marketplaces and found several postings selling AK-47s, the types of guns eight ISIS terrorists were said to have used during the deadly attacks in Paris on November 13. Across a dozen sites, we found 281 listings of guns and ammunition, including 16 submachine and machine guns, 12 sniper rifles and 40 assault rifles. The majority of the vendors ship from the U.S., as well as Russia, Germany and the Netherlands.

Terrorists likely acquired weapons through the black market or dark net, as France has especially strict gun laws. The French government estimates there are about 7.5 million legally owned guns in the country. Some estimates claim there are as many as 10 to 20 million illegal weapons in France. A European Commission study estimates some 67 million unregistered firearms exist in the EU.

When the illegal firearm market initially grew from weapons originating in the Balkans, criminals and terrorists wanting weapons had to connect with the right crime organization. Now, they just have to connect to the Internet. If a terrorist (or anyone) wants to buy an illegal assault rifle today they just have to download the Tor browser, which allows them to search the web anonymously, then find eBay-like marketplaces, which can be found on the regular Internet.

In January, Philippe Capon, the head of UNSA police union told Bloomberg that AK-47s sell for about 1,000 euros ($1,181 USD) to 1,500 euros ($1,650 USD) on the French black market. Our Vocativ analysis shows that the current going rate for AK-47s on the dark net ranges from 547 eros ($590 USD) to 6,300 euros ($6,785 USD).

“The guns moved from the Balkans to Western Europe and other parts of Europe in small and medium shipments, so that makes it very difficult to monitor and investigate and protect against,” said Cédric Poitevin, head of the  Arms Transfers and Small Arms project at GRIP (Group for Research and Information on Peace and Security), which is based in Brussels. “They can move across criminal networks within Europe. First to Belgium and other parts and then to someone who is linked to criminal or terrorist networks.”

An open-border policy has likely made matters worse. The United Kingdom does not participate in Europe’s open-border program and the country has had very little gun crime, but other European nations have not been so fortunate. “We face the same challenge in all countries with the almost absence of border controls,” Poitevin told Vocativ. “The fact that we are close to the Balkans and, generally speaking, two countries in Eastern Europe with huge stockpiles of guns that have been made available.”

Poitevin say, most of what he and European government officials know about firearm trafficking and smuggling comes from assumptions, arrests and limited studies. “Only recently there has been political priority,” he said. “Until recently there was very little funds to study the issue and build stats and to gather quantitative information.”

One of the most recent efforts to study gun trafficking began in 2013, when Interpol created the Illicit Arms Records and Tracing Management System (iARMS), which allows member countries to report and track weapon trafficking. In 2014, Europol announced they would make gun smuggling a priority. That initiative focused largely on the rise in Internet trafficking. They had some success in October that year. French law enforcement agents raided several homes across the country and found hundreds of weapon stashes, which included assault rifles and machine guns.

*** Meanwhile, the Paris attackers communicated with each other using PlayStation 4 and they in turned communicated with Islamic State using an app called ‘WhatsApp’.

Belgium’s home affairs minister says ISIL communicates using Playstation 4

Quartz: The day after terror attacks in Paris left at least 127 dead and some 300 wounded, attention has turned to Belgium. Several arrests were made in Belgium today (Nov. 14), and a black Volkswagen Polo with a Belgian license plate had been spotted on the night of the attacks near the Bataclan theater. Police have raided a Brussels neighborhood where three of the eight attackers are believed to have lived.

More fighters have joined ISIL from Belgium, per capita, than any Western nation.

Belgian federal home affairs minister Jan Jambon has previously described Brussels as a weak link in the fight against terror. Speaking at a debate last week, he said: “The thing that keeps me awake at night is the guy behind his computer, looking for messages from IS and other hate preachers.”

Jambon also reportedly warned of the growing use by terror networks of the PlayStation 4 gaming console, which allows terrorists to communicate with each other and is difficult for the authorities to monitor. “PlayStation 4 is even more difficult to keep track of than WhatsApp,” he said.

The gaming console also was implicated in ISIL’s plans back in June, when an Austrian teen was arrested for downloading bomb plans to his PS4.

Drills on Homeland Have a Reason

We are always suspicious and question what law enforcement is doing and why. We ask the same when it comes to the Department of Homeland Security and we do the same regarding the military. There were huge questions and theories when Operation Jade Helm was held in 5 Southern states this past summer.

Okay, it is good we question government, it is a duty yet there are reasons why events and activities do occur. Here are two reasons why which may help us come to understand motivations for exercises and training even in either rural or urban areas.

The fuel for a nuclear bomb is in the hands of an unknown black marketeer from Russia, U.S. officials say

The presence of identical fissile materials in three smuggling incidents indicates someone has a larger cache and is hunting for a buyer

With so many nuclear explosives held by governments around the world, US officials have long worried about the possibility of a terrorist-engineered nuclear or radiological blast within the United States. Multiple federal agencies have held almost 1,400 drills in cities around the country over the last decade to train local police and emergency personnel in how to behave after such a nightmare unfolds, according to a spokeswoman for the National Nuclear Security Administration.

CHISINAU, MoldovaThe sample of highly-enriched uranium, of a type that could be used in a nuclear bomb, arrived here on a rainy summer day four years ago, in a blue shopping bag carried by a former policeman.

According to court documents, the bag quickly passed through the hands of three others on its way to a prospective buyer. It was not the first time such material had passed through this city, raising international alarms: It had happened twice before. And mysteriously, in all three cases, spanning more than a decade, the nuclear material appeared to have the same origin – a restricted military installation in Russia.

This news would quickly reach Washington. But that day, the first to pick up the blue bag was the wife of a former Russian military officer, who handed it off to a friend while she went shopping in this former Soviet city’s ragged downtown.

Not long afterward, a 57-year old lawyer named Teodor Chetrus, from a provincial town near the Ukrainian border, retrieved it and brought it to a meeting with a man named Ruslan Andropov. According to an account by Moldovan police, the two men had, earlier in the day, visited a local bank, where Chetrus confirmed that Andropov had deposited more than $330,000 as an initial payment.

Andropov next examined the contents of the bag: a lead-lined cylinder, shaped like a thermos. It was meant to be the first of several shipments of highly-enriched uranium totaling 10 kilograms (22 lbs), a senior investigator here said. That’s about a fifth of what might be needed to fuel a Hiroshima-sized nuclear explosion — but almost enough to power a more technically-advanced “implosion-style” nuclear bomb. The full story is a MUST read in its entirety and exceptional work from Public Integrity.

*** Then last week, there was yet another event off the coast of California that forced air traffic to be halted and re-routed as well as some automobile traffic. A peculiar set of beams of light were noted in the sky. Bigger questions were asked. Some thought the U.S. military was training to bomb the homeland. Ah….not so much.

There Is a Secret U.S. Spy Plane Flying Over the Pacific

Here’s what we know … and what we don’t

In 2013, the U.S. Air Force sent a secret spy plane out over the Pacific region. The unknown aircraft – possibly a drone – flew “national collection missions” – a euphemism for strategic intelligence against states like North Korea or China.

It was one of five different types of aircraft flying these missions. The Pentagon’s top headquarters asked the flying branch to use its U-2 Dragon Ladies and RC-135V/W Rivet Joints to take high resolution pictures and scoop up radio chatter, according to an official history of the Air Force’s Intelligence, Surveillance and Reconnaissance Agency – a.k.a. AFISRA – for that year.

“Other USAF aircraft flying national collection missions included the RC-135U Combat Sent, the RC-135S Cobra Ball and the aforementioned [redacted],” the history stated.

So what is the mystery aircraft? The blacked-out portion of the document suggests the missing portion is five to seven characters long. With that in mind, the super secret RQ-170 Sentinel – a six character designation that would fit in the redacted segment – is one possibility.

Lockheed built an estimated 20 to 30 RQ-170s – also known as Wraiths– for the Air Force sometime in the early 2000s. The 30th Reconnaissance Squadron at Creech Air Force Base in Nevada owns all of these bat-winged pilotless spies.

In 2007, journalists first spotted the Wraith at Kandahar Air Field in Afghanistan, earning the nickname “the Beast of Kandahar.” On Dec. 4, 2009, the Air Force formally announced the Sentinel to the world … and little else.

That same year, the drones were flying missions in the Pacific from Andersen Air Force Base on Guam and Kunsan Air Base in South Korea, according to previous Air Force histories we obtained through FOIA. During the latter deployment, the Wraiths likely gathered information about North Korea’s nuclear, ballistic missile and space programs.

In December 2011, one RQ-170 crashed in Iran.

And as of April 2014, at least one of these stealthy flying wings was still on duty, according to an accident report in Combat Edge, Air Combat Command’s official safety magazine. ACC owns the bulk of the Air Force’s combat aircraft, including its spy planes and the RQ-170s.

If the RQ-170s are still in service, the flying branch would have every incentive to keep using them. And the Sentinels and their crews already had experience in the Asia-Pacific theater.

Of course, the censored plane could be something entirely new. For decades, the Pentagon and the CIA have repeatedly acknowledged advanced aircraft projects — after the fact — only to decline to release any significant information about them. Hat tip to War is Boring for doing the investigative work, the rest of the work is found here.

FBI: Hillary and Gross Negligence

We cant officially know at the point who on Hillary’s team has met with the FBI and made statements or answered questions, Conversations with the FBI are not under oath, but still making false statements or responses is a felony. It must also be noted that even Barack Obama said he was NOT aware of a private server but did know and in fact the White House did communicate with Hillary and her team via private, non-governmental email addresses.

It is noteworthy that this snippet of news of the FBI widening their investigation is even in the public domain. The FBI is reviewing all emails to determine themselves which should be classified and those that are not deemed so. If Hillary never revealed to Obama himself that she was using a private server and providing him notice is itself a standard to prosecute her.

Documents and information includes: any material in written form, books, sketches, photographs, blueprints, maps, notes documents, plans or comments.

FBI expands probe of Clinton emails, launches independent classification review

FNC: The FBI has expanded its probe of Hillary Clinton’s emails, with agents exploring whether multiple statements violate a federal false statements statute, according to intelligence sources familiar with the ongoing case.

Fox News is told agents are looking at U.S. Code 18, Section 1001, which pertains to “materially false” statements given either in writing, orally or through a third party. Violations also include pressuring a third party to conspire in a cover-up. Each felony violation is subject to five years in prison.

This phase represents an expansion of the FBI probe, which is also exploring potential violations of an Espionage Act provision relating to “gross negligence” in the handling of national defense information.

“The agents involved are under a lot of pressure and are busting a–,” an intelligence source, who was not authorized to speak on the record, told Fox News.

The section of the criminal code being explored is known as “statements or entries generally,” and can be applied when an individual makes misleading or false statements causing federal agents to expend additional resources and time. In this case, legal experts as well as a former FBI agent said, Section 1001 could apply if Clinton, her aides or attorney were not forthcoming with FBI agents about her emails, classification and whether only non-government records were destroyed. It is not publicly known who may have been interviewed.

Fox News judicial analyst Judge Andrew Napolitano said the same section got Martha Stewart in trouble with the FBI. To be a violation, the statements do not need to be given under oath.

“This is a broad, brush statute that punishes individuals who are not direct and fulsome in their answers,” former FBI intelligence officer Timothy Gill told Fox News. Gill is not connected to the email investigation, but spent 16 years as part of the bureau’s national security branch, and worked the post 9/11 anthrax case where considerable time was spent resolving discrepancies in Bruce Ivins’ statements and his unusual work activities at Fort Detrick, Md.

“It is a cover-all. The problem for a defendant is when their statements cause the bureau to expend more time, energy, resources to de-conflict their statements with the evidence,” he said.

Separately, two U.S. government officials told Fox News that the FBI is doing its own classification review of the Clinton emails, effectively cutting out what has become a grinding process at the State Department. Under Secretary for Management Patrick Kennedy has argued to both Director of National Intelligence James Clapper and Congress that the “Top Secret” emails on Clinton’s server could have been pulled from unclassified sources including news reports.

“You want to go right to the source,” Gill said. “Go to the originating, not the collateral, authority. Investigative protocol would demand that.”

On Friday, Clapper spokesman Brian Hale confirmed that no change has been made to the two “Top Secrets” emails after a Politico report said the intelligence community was retreating from the finding.

“ODNI has made no such determination and the review is ongoing,” Hale said. Andrea G. Williams, spokeswoman for the intelligence community inspector general, said she had the same information. Kennedy is seeking an appeal, but no one can explain what statute or executive order would give Clapper that authority.

A U.S. government official who was not authorized to speak on the record said the FBI is identifying suspect emails, and then going directly to the agencies who originated them and therefore own the intelligence — and who, under the regulations, have final say on the classification.

As Fox News previously reported, at least four classified Clinton emails had their markings changed to a category that shields the content from Congress and the public, in what State Department whistleblowers believed to be an effort to hide the true extent of classified information on the former secretary of state’s server.

One State Department lawyer involved in the alleged re-categorization was Kate Duval. Duval once worked in the same law firm as Clinton’s current and long-time lawyer David Kendall and at the IRS during the Lois Lerner email controversy. Duval left government service for private practice in mid-September.

 

Why is Rocket Kitten Important?

Security firm says it shut down extensive Iranian cyber spy program

A security firm with headquarters in Israel and the United States says it detected and neutralized an extensive cyber espionage program with direct ties to the government of Iran. The firm, called Check Point Software, which has offices in Tel Aviv and California, says it dubbed the cyber espionage program ROCKET KITTEN. In a media statement published on its website on Monday, Check Point claims that the hacker group maintained a high-profile target list of 1,600 individuals. The list reportedly includes members of the Saudi royal family and government, American and European officials, North Atlantic Treaty Organization officers and nuclear scientists working for the government of Israel. The list is said to include even the names of spouses of senior military officials from numerous nations.

News agency Reuters quoted Check Point Software’s research group manager Shahar Tal, who said that his team was able to compromise the ROCKET KITTEN databases and acquire the list of espionage targets maintained by the group. Most targets were from Saudi Arabia, Israel, and the United States, he said, although countries like Turkey and Venezuela were also on the list. Tal told Reuters that the hackers had compromised servers in the United Kingdom, Germany and the Netherlands, and that they were using these and other facilities in Europe to launch attacks on their unsuspecting targets. According to Check Point, the hacker group was under the command of Iran’s Revolutionary Guards Corps, a branch of the Iranian military that is ideologically committed to the defense of the 1979 Islamic Revolution.

Reuters said it contacted the US Federal Bureau of Investigation and Europol, but that both agencies refused comment, as did the Iranian Ministry of Foreign Affairs. However, an unnamed official representing the Shin Bet, Israel’s domestic security agency, said that ROCKET KITTEN “is familiar to us and is being attended to”. The official declined to provide further details. Meanwhile, Check Point said it would issue a detailed report on the subject late on Monday.

*** In part from SCMagazine:

The researchers uncovered more thorough indicators of compromise, along with new malware strains, including a Remote Access Trojan (RAT) the group apparently favored.

Further down the Rocket Kitten rabbit hole, the researchers appeared to identify the mastermind behind the operation, who goes by “Wool3n.H4t,” as Yaser Balaghi.

The company found references to his alias and real name on various developer forums, within the server itself, and eventually, in an online tutorial he posted on SQL injection.

Additionally, a reported resume for Balaghi has listed “designing a phishing system” as ordered by a “cyber-organization.”

Saying technical evidence can be forged, or information be planted, Tal said he backs his company’s findings because of “overwhelming evidence.”

“All evidence fits the same story and same narrative,” he said. “The probability that this is a false lead is extremely nonexistent in my opinion.”

Given that Balaghi resides in Iran, there will likely not be any repercussions or extradition. However, Tal said the findings have been passed along to European and U.S. search bodies, as well as service providers who hosted the malicious servers.

Most infrastructure has been taken down since then, Tal said, and continued, “don’t expect to see them attacking any time soon.”