Unit 450, The Syrian Chemical Weapons Program Details

 Fox News obtained photos of one of Syrian President Bashar al-Assad's close aides who oversaw the country's chemical weapons unit.

If you still think the chemical weapons attack was fake news, read on. Further, it must be stated that the Pentagon and CIA have extraordinary skills and ability to gather quality intelligence, intelligence that was gained under the Obama administration and did not stop the program but rather deferred it to Russia to handle. This was done under threat by Tehran to the Obama White House to leave Assad alone during the JPOA, the Iran nuclear talks. Obama complied.

For Secretary of State Rex Tillerson and for U.S. Ambassador Nikki Haley to lay the blame at the feet of Russia and Iran for the Assad/Syria chemical weapons program was exact and right.

Further in 2013, a Syrian army defector gave testimony to Western officials and the United Nations on the Unit 450 operations.

Bassem Al-Hassan, the head of the Syrian clandestine unit for special assignments, was appointed the position after Muhammad Suleiman, another key aide to Assad, was assassinated in his home in August 2008, Western intelligence sources told Fox News.

The close aide to Assad had been on the U.S. radar, and is one of the individuals named on the Office of Foreign Assets Control Specially Designated Nationals and Blocked Persons List (SDN). The list names individuals and companies who pose as a national security threat to the U.S.

Hassan is also considered a very close friend and contact to Qassem Soleimani, the Iranian Revolutionary Guard general, and has connections with Russian officials.

Western intelligence sources said Hassan was the head of Unit 450, Syria’s chemical weapons unit, and was responsible for any activities, including producing and ordering the weapons for the department.

Syria agreed in 2013 to destroy its stockpiles of chemical weapons as part of a deal brokered between former President Barack Obama and Russian President Vladimir Putin. A year later, then-Secretary of State John Kerry said that Syria’s chemical weapons were “100 percent” destroyed.

The statement came into question on Tuesday when a chemical weapons attack in an opposition-held town in northern Syria killed more than 80 people, including at least 30 children. The U.S. blamed Assad for the attack.

President Trump on Friday authorized to launch 60 U.S. Tomahawk missiles on the Shayrat air base, southeast of Homs, in retaliation to the chemical weapons attack. The Pentagon said the airstrikes will not eliminate the country’s chemical weapons supply completely, but reduce the government’s ability to deliver them.

Elite Syrian Unit 450 Scatters Chemical Arms Stockpile

Assad Regime Has Moved Weapons to as Many as 50 Sites

2013: A secretive Syrian military unit at the center of the Assad regime’s chemical weapons program has been moving stocks of poison gases and munitions to as many as 50 sites to make them harder for the U.S. to track, according to American and Middle Eastern officials.

The movements of chemical weapons by Syria’s elite Unit 450 could complicate any U.S. bombing campaign in Syria over its alleged chemical attacks, officials said. It also raises questions about implementation of a Russian proposal that calls for the regime to surrender control of its stockpile, they said.

U.S. and Israeli intelligence agencies still believe they know where most of the Syrian regime’s chemical weapons are located, but with less confidence than six months ago, U.S. officials said.

Secretary of State John Kerry met Thursday in Geneva with his Russian counterpart to discuss a road map for ending the weapons program. The challenges are immense, Mr. Kerry said.

The U.S. alleges a chemical-weapons attack by the Syrian government on Aug. 21 killed more than 1,400 people, including at least 400 children. Syrian President Bashar al-Assad on Thursday again denied any involvement in a chemical attack, but he said his government was prepared to sign an agreement banning the use of chemical weapons. Syrian officials couldn’t immediately be reached for comment on the weapons.

Unit 450 – a branch of the Syrian Scientific Studies and Research Center that manages the regime’s overall chemicals weapons program – has been moving the stocks around for months, officials and lawmakers briefed on the intelligence said.

Movements occurred as recently as last week, the officials said, after Mr. Obama said he was preparing to launch strikes.

The unit is in charge of mixing and deploying chemical munitions, and it provides security at chemical sites, according to U.S. and European intelligence agencies. It is composed of officers from Mr. Assad’s Alawite sect. One diplomat briefed on the unit said it was Alawite from “janitor to commander.”

U.S. military officials have looked into the possibility of gaining influence over members of Unit 450 through inducements or threats. “In a perfect world, you would actually like to co-opt that unit. Who cares who pays them as long as they sit on the chemical weapons,” said a senior U.S. military official.

Although the option remains on the table, government experts say the unit is so close-knit that they doubt any member could break ranks without being exposed and killed.

The U.S. estimates the regime has 1,000 metric tons of chemical and biological agents. “That is what we know about. There might be more,” said one senior U.S. official.

The regime traditionally kept most of its chemical and biological weapons at a few large sites in western Syria, U.S. officials said. But beginning about a year ago, the Syrians started dispersing the arsenal to nearly two dozen major sites.

Unit 450 also started using dozens of smaller sites. The U.S. now believes Mr. Assad’s chemical arsenal has been scattered to as many as 50 locations in the west, north and south, as well as new sites in the east, officials said.

The U.S. is using satellites to track vehicles employed by Unit 450 to disperse the chemical-weapons stocks. But the imagery doesn’t always show what is being put on the trucks. “We know a lot less than we did six months ago about where the chemical weapons are,” one official said.

The movements, activities and base locations of Unit 450 are so sensitive that the U.S. won’t share information with even trusted allies in the opposition for fear the unit would be overrun by rebels, said current and former U.S. officials.

The U.S. wants any military strikes in Syria to send a message to the heads of Unit 450 that there is a steep price for following orders to use chemical weapons, U.S. officials said.

At the same time, the U.S. doesn’t want any strike to destabilize the unit so much that it loses control of its chemical weapons, giving rebels a chance to seize the arsenal.

Attacking Unit 450, assuming we have any idea where they actually are, would be a pretty tricky affair because”¦if you attack them you may reduce the security of their weapons, which is something we certainly don’t want,” said Jeffrey White, a veteran of the Defense Intelligence Agency and a defense fellow at The Washington Institute.

Within Syria, little is known about Unit 450 or the Syrian Scientific Studies and Research Center. One of the buildings is in a sprawling complex on the outskirts of Damascus.

Even high-ranking defectors from the Syrian military that form the core of the rebel insurgency – including those who served in units trained to handle chemical attacks – said they hadn’t heard of Unit 450.

The Pentagon has prepared multiple target lists for possible strikes, some of which include commanders of Unit 450.

But a senior U.S. official said no decision has been made to target them, reflecting the challenge of sending a message to Unit 450 without destabilizing it.

In some respects, officials said, the hands-on role that Unit 450 plays in safeguarding the regime’s chemical weapons secrets makes it too valuable for the U.S. to eliminate, even though the U.S. believes the unit is directly responsible for the alleged chemical weapons abuses.

The Syrian Scientific Studies and Research Center answers only to Mr. Assad and the most senior members of his clan, according to U.S. and European officials. Attack orders are forwarded to a commanding officer within Unit 450.

If the Russians clinch a deal for Mr. Assad to give up his chemical weapons, any prospective United Nations-led force to protect inspectors and secure storage sites would likely need to work closely with Unit 450 and the research center, current and former administration officials said.

Gen. Martin Dempsey, the chairman of the U.S. military’s Joint Chiefs of Staff, has said that President Barack Obama directed him to plan for “a militarily significant strike” that would deter the Assad regime’s further use of chemical weapons and degrade the regime’s military capability to employ chemical weapons in the future.

But officials said the U.S. doesn’t plan to bomb chemical weapons sites directly because of concerns any attack would disperse poison agents and put civilians at risk.

In addition to satellites, the U.S. also relies on Israeli spies for on-the-ground intelligence about the unit, according to U.S. and Israeli officials.

Though small in size, Unit 450 controls a vast infrastructure that makes it easier for the U.S. and Israel to track its movements. Chemical weapons storage depots are guarded by the unit within larger compounds to provide multiple layers of security, U.S. officials said.

Whenever chemical munitions are deployed in the field, Unit 450 has to pre-deploy heavy equipment to chemical mixing areas, which the U.S. and Israel can track.

Tomahawks Destroyed 20 Assad Aircraft on Sharyat Flightline

Trump Orders Missile Attack in Retaliation for Syrian Chemical Strikes

By Jim Garamone

DoD News, Defense Media Activity

WASHINGTON, April 6, 2017 — The United States fired Tomahawk missiles into Syria today in retaliation for the regime of Bashar Assad using nerve agents to attack his own people.

President Donald J. Trump ordered the attack on Al-Shayrat Air Base, the base from which the chemical attack on Syria’s Idlib province was launched. The missiles were launched from U.S. Navy ships in the Eastern Mediterranean Sea.

The attack is in retaliation for the Syrian dictator for using banned chemical agents in the April 4 attack.

“Bashar al-Assad launched a horrible chemical weapons attack on innocent civilians,” Trump said in a statement to the nation. “Using a deadly nerve agent, Assad choked out the lives of helpless men, women and children. It was a slow and brutal death for so many. Even beautiful babies were cruelly murdered in this very barbaric attack. No child of God should ever suffer such horror.”

Vital National Security Interest

Trump ordered the targeted military strike on the airfield that launched the attack. “It is in the vital national security interest of the United States to prevent and deter the spread and use of deadly chemical weapons,” the president said.

No one disputes that Syria used banned chemical weapons of the people of Idlib, he said, adding that this is a violation of the Chemical Weapons Convention. Syria also ignored United Nations Security Council resolutions.

“Years of previous attempts at changing Assad’s behavior have all failed and failed very dramatically,” Trump said. “As a result, the refugee crisis continues to deepen and the region continues to destabilize, threatening the United States and its allies.”

Trump called on all civilized nations to join the United States in seeking an end to the slaughter in Syria, and to end the threat terrorism poses in the blighted nation.

Details of Strike

Shortly after the president’s address, Pentagon spokesman Navy Capt. Jeff Davis issued a statement providing details of the strike. It took place at about 8:40 p.m. EDT — 4:40 a.m.  April 7 in Syria, he said.

The strike was conducted using Tomahawk Land Attack Missiles, or TLAMs, launched from the destroyers USS Porter and USS Ross in the eastern Mediterranean Sea, Davis said in his statement. A total of 59 TLAMs targeted aircraft, hardened aircraft shelters, petroleum and logistical storage, ammunition supply bunkers, air defense systems, and radars.

“As always,” Davis said, “the U.S. took extraordinary measures to avoid civilian casualties and to comply with the Law of Armed Conflict.  Every precaution was taken to execute this strike with minimal risk to personnel at the airfield.”

The strike was “a proportional response to Assad’s heinous act,” the Pentagon spokesman said, noting that Shayrat Airfield was used to store chemical weapons and Syrian air forces. The U.S. intelligence community assesses that aircraft from Shayrat conducted the April 4 chemical weapons attack, he added, and the strike was intended to deter the regime from using chemical weapons again.

Russian forces were notified in advance of the strike using the established deconfliction line, Davis said, and U.S. military planners took precautions to minimize risk to Russian or Syrian personnel at the airfield.

“We are assessing the results of the strike,” Davis said. “Initial indications are that this strike has severely damaged or destroyed Syrian aircraft and support infrastructure and equipment at Shayrat Airfield, reducing the Syrian government’s ability to deliver chemical weapons. The use of chemical weapons against innocent people will not be tolerated.”

***

Russian military personnel were at the base during the U.S. attack, soldiers told Al Masdar. But the Russians weren’t harmed during the strike, which focused on the airfields, fuel tankers and aircraft hangars, according to Al Masdar. Rex Tillerson, Secretary of State earlier in the afternoon, placed a call to Putin with advanced warning but no call was made to warn Syria.

Veteran Wounded Warriors Become Hunters, Great Story

In War on Child Porn, US Turns Wounded Soldiers Into Hunters

A group of military veterans take the oath at a U.S. Immigration and Customs Enforcement (ICE) ceremony, swearing them in to serve as analysts on child exploitation cases, at ICE headquarters in Washington, March 31, 2017. (B. Hamdard/VOA)

A group of military veterans take the oath at a U.S. Immigration and Customs Enforcement (ICE) ceremony, swearing them in to serve as analysts on child exploitation cases, at ICE headquarters in Washington, March 31, 2017. (B. Hamdard/VOA)

***

The language at a small graduation ceremony inside a federal office building in Washington Friday morning was militaristic: Fighting. Frontlines. Enemies. War.

For a fifth year, U.S. Immigration and Customs Enforcement (ICE) rather quietly has trained a small team of injured, wounded or sick military veterans for a different type of deployment – supporting the agency’s lesser-known investigative arm as analysts on child exploitation cases – the ones who will be able to take photos off a hard drive in a child pornography investigation, then help identify the perpetrator and build the case for an arrest.

“It is a battle. It is a war. And it needs to be,” said Daniel Ragsdale, ICE Deputy Director.

Since 2013, more than 100 veterans have learned computer forensics through the H.E.R.O. Child-Rescue Corps, an 11-week program in the nation’s capital, followed by a nearly year-long internship in ICE field offices around the country.

Chris Wooten, a U.S. Army ranger who was injured in a helicopter crash seven years ago while serving with a special operations regiment in Afghanistan — his fifth tour in Iraq and Afghanistan — felt like the program could return that sense of purpose and pride he felt serving in the military.

“I did have a lot of buddies who weren’t able to make it home, that were killed overseas or even individuals that took their own lives when they made it back just because they didn’t have that sense of purpose anymore,” he explains after the ceremony, before flying home to southwest Florida, where he starts his internship next week.

“I think this opportunity, even though we’re all wounded and can’t do our military job anymore, that this program allows us to serve our country again, and not only that, but help save some kids.”

‘Daunting’ task

It’s unpaid work that first year, working alongside agents to find suspects and build the cases, often looking at graphic, violent content for clues about the perpetrator, the victim, or even the location. But the program regularly leads to job offers from ICE, according to an agency spokesman.

The collaboration between ICE’s Homeland Security Investigations office, U.S. Special Operations Command, and the National Association to Protect Children builds the ranks of child sexual abuse investigators, as law enforcement across the United States scrambles to keep up with networks of elusive online suspects — the ones supplying the images and the ones demanding them.

Non-profit organizations like the National Center for Missing and Exploited Children that also work on these cases report that the trade in child pornography images is growing “exponentially.” They report receiving thousands of requests from law enforcement agencies to analyze millions of images and videos in one year.

Ragsdale, the second in command at ICE, says there aren’t enough analysts to meet the investigative demand. The agency is only one of several federal bureaus trying to dismantle the online exchange of child pornography, and in the week before Friday’s graduation, it posted three updates on three such cases:

  • “Tucson man sentenced to 10 years in prison for possessing and distributing child pornography”
  • “Idaho man sentenced to 25 years on federal child pornography charges”
  • “Southwest Texas man sentenced to nearly 16 years in federal prison for distributing child pornography”

“It’s daunting to see case after case after case… when you see 100-year sentences or multiple life sentences,” Ragsdale told the graduates. “Unfortunately, it’s still not enough. It’s certainly not tipping the scale to dissuade people who abuse children.”

“You are joining a fight that law enforcement is having a hard time winning,” he added.

*

‘Horrible photos’

Chosen to speak for the class at the ceremony, Wooten’s voice faltered at the podium; he spoke about friends who died in combat or after returning home. He mentioned the veteran suicide rate in the U.S. — about 20 a day. He talked of “scars, visible and invisible.”

More than the adrenaline rush of military work under high stress, Wooten says with the investigatory work “you get that sense of pride back.”

“In the military, you’re very proud to serve your country. And this, you almost get a sense of pride that ‘I’m able to handle the images,’” said Wooten, who at 29, is the father of five children. “I knew the struggle was going to be looking at horrible photos and videos that everyday people don’t even know goes on.

“This job, I’m actually going out and saving kids and stopping bad guys, and help putting bad guys behind bars by analyzing evidence and different things that help them get a prison sentence,” said Wooten. “Before, I was just sitting at a desk basically doing paperwork.”

From Space, China’s Cyber-Warriors, PLA

Image result for pla china cyber  PLA Unit 61398  Operation Shady Rat

Primer: Xi Jinping to visit president Trump, hum…..will this be a topic?

China’s external strategies in cyberspace – as distinct from its internal social control policies – can be divided into two parts: the first, before late 2015; the second, after that point. The most notable transition, from the U.S. perspective, has been the agreement to foreswear commercial cyberespionage.

Less well noted, but of comparable importance, has been the formation of its Strategic Support Force, which has combined the cyber warriors of the Chinese People’s Liberation Army (PLA), its electronic warriors, and a large chunk of those conducting intelligence, surveillance, and reconnaissance, notably from space.

  FreeBeacon

China Pivots its Hackers from Industrial Spies to Cyber Warriors

Levi Maxey:

China continues to deploy military equipment to contested islands in the South China Sea, raising concerns among regional players and U.S. forces stationed in the Pacific.

A Chinese government strategy document published last month by China’s state-owned news agency Xinhua signals that Beijing is building up its military cyber capabilities. It says that China will “expedite the development of a cyber force and enhance capabilities… to prevent major cyber crisis, safeguard cyberspace security and maintain national security and social stability.”

To be sure, the Chinese document acknowledges that its activities in cyberspace could aggravate tensions with the U.S. and other major powers. It says that “the tendency of militarization and deterrence buildup in cyberspace is not conducive to international security and mutual trust” – seemingly a direct response to the April 2015 Pentagon strategy report strongly emphasizing that the U.S. must build up its offensive capabilities to deter adversaries from engaging in malicious activity in cyberspace.

Given China’s past espionage in cyberspace, its move from economic theft towards militarization in the virtual domain represents a pivot that Washington could regard as threatening. While issues of trade and North Korea are likely to consume much of the discussion during this week’s summit between Chinese President Xi Jinping and President Donald Trump, the growth of cyberspace as a battlefield domain could also be a point of focus. What is China’s history in cyberspace in relation to the United States, and what has led to this change in policy?

Chinese leaders perceive cyberspace as a means of advancing economic growth, preserving the Chinese Communist Party, and maintaining stability and national security. Adam Segal, director of the digital and cyberspace policy program at the Council on Foreign Relations, argues that Chinese state-sponsored hackers seek to steal foreign technology via cyber espionage, weaken domestic opposition to the regime, and offset U.S. conventional military supremacy.

Despite some instances of political and counter-intelligence collection – such as the 2015 breach of the U.S. Office of Personnel Management and the alleged hacking into the 2008 presidential campaigns of former President Barack Obama and Sen. John McCain (R-Az) – Chinese cyber espionage has focused largely on the theft of intellectual property, trade secrets, and other sensitive commercial information. Its chief aim has been to boost Chinese economic competitiveness.

In 2010, Gen. Keith Alexander, then U.S. Cyber Commander and director of the National Security Agency, said that, “our intellectual property here is about $5 trillion. Of that, approximately $300 billion is stolen over the networks per year.” He called this theft “the greatest transfer of wealth in history.” By 2013, U.S. officials had begun publically decrying China’s economic espionage, only to be faced with denial from Beijing. In 2014, the Department of Justice obtained indictments against five members of the Chinese People’s Liberation Army (PLA), charging them with using computer network operations to commit commercial espionage.

Not long after, the U.S. threated China with sanctions and potential cancellation of a planned summit in September 2015 between President Xi and then-President Obama. Negotiators were quickly dispatched and the event went forward. During the summit both countries announced an accord, commonly referred to as the Xi Agreement, in which they agreed that “neither country’s government will conduct or knowingly support cyber-enabled theft of intellectual property, including trade secrets or other confidential business information, with the intent of providing competitive advantages to companies or commercial sectors.”

The Xi Agreement was shocking in that China implicitly acknowledged having conducted economic espionage in the past and agreed to stop doing it. Many observers were skeptical that the Chinese would abide by the pact, but a report by Mandiant, now a branch of the American cyber security firm FireEye, found a notable decline in Chinese hackers targeting U.S. companies – which suggests that the Chinese were taking the accord seriously.

However, according to Chris Porter, manager of FireEye’s Horizons team, “while appearing as a significant diplomatic victory for the Obama administration, in reality China simply agreed to stop doing operations that it didn’t want to continue anyway.” He notes that Chinese hackers were often moonlighting as for-hire-hackers, sometimes even targeting Chinese companies. At the time, President Xi was in the midst of a robust anti-corruption campaign while also centralizing power, including in cyberspace, under his control.

Porter argues that “Chinese leaders are heeding a lesson about the limitations of cyber espionage that stems from the fall of the Soviet Union: you cannot steal your way to innovation.” China hopes eventually to become a world leader in cutting-edge research, he says, so it “wants to live in a world where patents are respected and its own claims are viewed as legitimate and untainted by accusations of intellectual property theft.”

Martin Libicki, the Keyser Chair of cybersecurity studies at the U.S. Naval Academy, says that ultimately, “A combination of declining returns and increasing risks on the one hand and the prospects of U.S. sanctions on the other led Chinese President Xi Jinping to agree to end Chinese commercial cyber espionage against first the United States, then the United Kingdom, and finally the other G-20 nations.” Chinese hackers are still conducting some business-focused espionage and recently have intensified their targeting of Russian officials and institutions. But they seem focused on gleaning intelligence on military capabilities and on government officials who interact with business executives.

Furthermore, the Chinese People’s Liberation Army (PLA) elevated cyber operations under the Strategic Support Force in December 2015, placing the virtual domain on par with other branches of the military. “The best guess,” Libicki says, “is that Chinese cyber warfare will be focused on supporting conventional military operations as opposed to assuming an independent role in strategic warfare, as U.S. Cyber Command seems to be doing, or to bolster information operations, as Russia seems to be doing.”

The U.S. may use its cyber capabilities for “left-of-launch” missile defense against North Korea – meaning, sabotaging planned missile launches before they happen – and to disrupt ISIS communications.

By contrast, China is consumed by fears of a massive U.S. military intervention in Asia. Beijing is building up its anti-access and area-denial (A2/AD) military strategy in the South China Sea by adding cyber and electronic warfare capabilities meshed into what is referred to as “Integrated Network-Electronic Warfare.” A report published by the NATO Cooperative Cyber Defence Centre of Excellence in Tallinn maintains that PLA units responsible for electronic warfare are taking on the role of running computer network operations as well.

China’s “strategy consists of neutralizing the logistics and communications infrastructure that permits U.S. forces to operate so far from home,” Libicki says, and is “pursuing the ability to corrupt U.S. information systems – notably, those for military logistics – and disrupt the information links associated with command and control.”

Such network and electronic attacks could target the U.S. military or regional allies’ early warning radar systems and could cause blind spots in U.S. command and control systems. The PLA could use these blind spots to deploy sorties or launch ballistic missile strikes. It could deliver these capabilities early in hostilities, integrated with technologies that could sabotage U.S. weapons systems, or even U.S. critical infrastructure, so that U.S. forces could not respond in a timely way.

To accomplish effective cyber attacks on U.S. command, control and communications platforms, or any advanced systems, the PLA would have to conduct cyber reconnaissance ahead of time. China has already begun to probe some potential targets, including elements of the U.S. power grid and review the designs of weapons systems such as the F-35 combat aircraft, the Patriot missile defense system, and U.S. Navy littoral combat ships.

“Because China, like other nations, has had far less practice at cyber warfare than cyber espionage, it is harder to anticipate its intentions and plans,” says Libicki. China’s efforts to augment kinetic assaults with cyber and electronic warfare could escalate a conflict by setting up a scenario in which adversaries might view espionage as a step toward war.

 

Bomb in Briefcase, Train Station, Russia, Multiple Deaths

Reuters is reporting:

General view of emergency services attending the scene outside Sennaya Ploshchad metro station. REUTERS/Anton Vaganov

Surveillance cameras in St Petersburg’s metro system may have captured images of the person suspected of organizing Monday’s deadly train blast, Russian news agency Interfax quoted a source as saying.

“Images of the suspected organizer of the metro blast were captured on metro station cameras,” the source said.

The explosive device may have been left in a briefcase in a metro train carriage, the source added. Russian President Vladimir Putin said on Monday the government was considering all possible causes for the blasts in St Petersburg’s metro system, including terrorism. Russian security agencies found an explosive device at a metro station in central St Petersburg and made it safe, the National Anti-Terrorist Committee said in a statement on Monday.

 The Committee also said that nine people were killed and 20 injured in the blast, which took place as a train traveled between the “Sennaya Ploshchad” and “Tekhnologichesky Institut” stations.

At least nine people were killed and 20 were injured when an explosion tore through a train carriage in the St.Petersburg metro system on Monday, the Russian National Anti-Terrorist Committee said.

Interfax news agency quoted an unnamed source as saying the blast, which occurred when the train was between two stations, was caused by a bomb filled with shrapnel.

President Vladimir Putin, who was in the city for a meeting with Belarus’s leader, said he was considering all possible causes for the blast, including terrorism and was consulting with security services.

Ambulances and fire engines descended on the concrete-and-glass Sennaya Ploshchad metro station. A helicopter hovered overhead as crowds gathered to observe rescue operations.

“I appeal to you citizens of St. Petersburg and guests of our city to be alert, attentive and cautious and to behave in a responsible matter in light of events,” St Petersburg Governor Georgy Poltavchenko said in an address.

An attack on St Petersburg, Russia’s old imperial capital, would have some symbolic force for any militant group, especially Islamic State or Chechen secessionist rebels. Attacks in the past have largely concentrated on Moscow, including an attack on an airport, a theatre and in 2010 a metro train.

Video showed injured people lying bleeding on a platform, some being treated by emergency services and fellow passengers. Others ran away from the platform amid clouds of smoke, some screaming or holding their hands to their faces.

A huge hole was blown open in the side of a carriage with metal wreckage strewn across the platform. Passengers were seen hammering at the windows of one closed carriage. Russian TV said many had suffered lacerations from glass shards and metal.

Russia has been the target of attacks by separatist Islamist Chechen militants in past years. Islamic State, which has drawn recruits from the ranks of Chechen rebels, has also threatened attacks across Russia in retaliation for Russian military intervention in Syria.

The Russian air force and special forces have been supporting President Bashar al-Assad in fighting rebel groups and Islamic State fighters now being driven out of their Syrian strongholds.

ALL STATIONS CLOSED

St. Petersburg emergency services at first said that there had been two explosions. But a source in the emergency services later said that there had been only one but that the explosion had occurred in a tunnel between stations.

The blast occurred at 2.40 p.m., well shy of the evening rush hour.

Authorities closed all St. Petersburg metro stations. The Moscow metro said it was taking unspecified additional security measures in case of an attack there.

Russia has been on particular alert against Chechen rebels returning from Syria and wary of any attempts to resume attacks that dogged the country several years ago.

At least 38 people were killed in 2010 when two female suicide bombers detonated bombs on packed Moscow metro trains.

Over 330 people, half of them children, were killed in 2004 when police stormed a school in southern Russia after a hostage taking by Islamist militants. In 2002, 120 hostages were killed when police stormed a Moscow theatre to end another hostage-taking.

Putin, as prime minister, launched a 1999 campaign to crush a separatist government in the Muslim southern region of Chechnya, and as president continued a hard line in suppressing rebellion.

*** Update:

Photo of the person looking for criminal investigation in connection with the bombing […] One of the blasts came from a device filled with shrapnel, Sky News reported. An unexploded device turned up at a different subway station rigged with shrapnel and up to 2.2 pounds of explosives, according to the Interfax news agency.