Jewish Center Bomb Threats Includes the US and UK

WASHINGTON: Scotland Yard and the Federal Bureau of Investigation are investigating more than a hundred bomb threats made to Jewish groups in the United States and Britain since Jan. 7, U.S. and UK law enforcement and Jewish community officials said.

Investigators said there is evidence that some of the U.S. and British bomb threats are linked. According to people in both countries who have listened to recordings of the threats, most of the them have been made over the telephone by men and women with American accents whose voices are distorted by electronic scramblers.

Waves of threats against U.S. Jewish groups – including community centres, schools, and offices of national organizations such as the Anti-Defamation League (ADL) civil rights group – have been followed within hours by similar but smaller waves against Jewish organizations, mainly schools, in Britain, Jewish community representatives in both countries said.

FBI officials in Washington confirmed that the agency is investigating the threats against U.S. Jewish organizations. Sources in Britain’s Jewish community said London’s Metropolitan Police, otherwise known as Scotland Yard, is conducting its own investigation and collaborating with the FBI.

Scotland Yard did not immediately respond to an email requesting comment.

Some of the most recent threats were called in Tuesday to ADL offices in Atlanta, Boston, New York, and Washington. White House spokesman Sean Spicer said President Donald Trump’s administration would “continue to condemn them and look at ways to stop them.”

NO BOMBS FOUND

The threats, 140 of them in the United States alone, according to Jewish community leaders, usually have involved callers claiming that improvised explosive devices have been placed outside the buildings that have been threatened.

However, no homemade bombs have been found outside any of the threatened premises in either the United States or the UK, community officials said.

Earlier this month, all 100 U.S. senators signed a letter to Homeland Security Secretary John Kelly, Attorney General Jeff Sessions and FBI Director James Comey expressing concern that the wave of threats will put innocent people at risk and threaten the finances of Jewish institutions.

Federal prosecutors in Manhattan filed charges against Juan Thompson, a former writer for the investigative website The Intercept, earlier this month alleging that he was responsible for at least eight threats emailed to Jewish community centres as “part of a sustained campaign to harass and intimidate” a woman with whom he had a romantic relationship.

The Intercept, a news website, had fired Thompson months earlier for allegedly fabricating quotes.

Jewish community officials in the United States and Britain said they think the threats that investigators linked to Thompson were not related to the larger campaign against Jewish organizations in their countries.

*** Did some of it begin with the money Obama gave to the Palestinian Authority? This is not confirmed by a long stretch yet it must be part of the discussion. Was this another set-up plot by the previous administration?

***

State Department: Obama money reached Palestinian Authority
State Department confirms that millions which Obama earmarked for PA reached its destination, despite Republican efforts to the contrary

One of the first decisions the Trump government took after becoming President was to freeze $220.3 million that his predecessor President Obama earmarked for the PA just before he left the White House.

However, the State Department has confirmed that Obama’s money has reached its destination. Acting State Department spokesman Mark Toner said last night (Wednesday) in a press briefing that the money was mostly for humanitarian purposes in the Palestinian Authority and Gaza, and in part used to pay Israeli creditors of the PA.

“None of the funding was to go directly to the Palestinian Authority,” stressed Toner in response to questions on the subject.

At the same time, Toner criticized the conduct of UNRWA: “UNRWA is obviously something where …we’ve been very vocal about our concerns given some of the allegations … some of UNRWA’s programs and how it’s spent or used some of its funding…we certainly made those concerns clear to UNRWA’s leadership.”

The disbursal was one of President Obama’s last acts in the White House, and it was approved just hours before the exchange of Presidents.

Congress authorized the transfer amount to the PA, but at least two Republican lawmakers acted to prevent the fund transfer, due to PA actions attempting to join UN organizations as a sovereign entity.

State Department officials said they decided to delay executing the transfer until the new Secretary of State entered office – and it was assured that any funds transfer was consistent with the priorities of the Trump government.

As of now, at least according to Toner’s testimony, the frozen money ultimately was transferred to the PA.

*** It is curious that the Palestinian Authority has 20 embassies including one in Washington DC. and they needed the money. Mahmood Abbas is worth an estimated $100 million and his sons are also millionaires. Meanwhile, the PA continues to provide aid and support to terrorists.

Palestinian Authority President Mahmoud Abbas vowed to “make every effort to end the suffering of our heroic brothers and release them from the occupation’s prisons so they can take part in building the homeland for which they sacrificed,” the Middle East Media Research Institute (MEMRI) reported on Wednesday.

***

A new Palestine Liberation Organization (PLO) youth camp will be named after the terrorist who orchestrated the deadliest attack ever carried out in Israel.

The PLO’s Supreme Council for Youth and Sports announced it will honor Dalal Mughrabi, the female Palestinian behind the bloody March 11, 1978 Coastal Road Massacre, in which terrorists hijacked a bus on the highway near Tel Aviv and embarked on a rampage with Kalashnikov rifles, mortars, grenades and explosives. Thirty-eight Israeli civilians were murdered, including 13 children, and 71 others were wounded.

Kinda all fits, or at least the discussion needs to continue as do the investigations.

 

 

C’mon Trump, the IRGC IS a Terror Organization

For a full report performed by European Iraqi Freedom Association on Iran’s Destructive Role in the Middle East, click here. In their report, EIFA alleges that the IRGC is “directly involved in the hidden occupation” of Iraq, Yemen, Syria and Lebanon and “meddling” in the internal affairs of at least eight countries, including Egypt, Bahrein, Jordan and Lebanon.

Revolutionary Guards Leading Iran’s Ballistic Missile Drive, Nuclear Weapons Program — Through Control Over Docks

Despite the United States placing the Iranian regime “on notice” for test-firing medium-range ballistic missiles in January, Tehran has taken no steps to change its behavior. Indeed, reports indicate that Iran test launched a new pair of ballistic missiles over the weekend.

New evidence was uncovered about the extent of control that the Islamic Revolutionary Guard Corps (IRGC), which is leading the mullahs’ ballistic missile drive, parallel to the nuclear program and pursuit of weapons of mass destruction, has over this.

In London on Tuesday, the National Council of Resistance of Iran (NCRI) held a press conference revealing that the IRGC has a growing grip over Iran’s key economic hubs. The NCRI cited intelligence gathered by sources linked to the People’s Mojahedin Organization of Iran (PMOI/MEK) from inside the regime, particularly among the IRGC rank and file. The data obtained in recent months clearly proves the IRGC has full control over 90 docks, which amount to 45% of Iran’s total official number of 212 piers.

Image result for irgc

The IRGC began setting up these “Bahman Docks” in 1982, by order of regime founder Ayatollah Ruhollah Khomeini. The group was instructed to manage its activities outside the authority of any state supervision and beneath the proverbial radar of international institutions.

Over the years since then, Supreme Leader Ali Khamenei has ordered the expansion of IRGC activity at these docks, and the further intertwining of the organization with the country’s economy. The main goal today, and previously, is to bypass international sanctions.

As a result, the IRGC now has complete control over Iran’s ground, sea and air borders, flooding the economy with a variety of imports without paying a single dollar in customs.

The IRGC has ports in Bandar Lengeh in Hormozgan Province, two docks in Abu Musa Island and another two in the Greater Tunb Island — among others.

Image result for irgc docks control

In addition to exporting arms to Middle East militias, the IRGC takes advantage of these docks to smuggle oil, gasoline, natural gas, chemical products, cigarettes, narcotics, alcoholic beverages, mobile phones and pharmaceuticals. The IRGC reportedly pockets an annual revenue of around $12 billion from importing and exporting illicit goods through the docks.

According to the NCRI, the IRGC has also established a number of front companies tasked specifically with transferring weapons caches through the docks. This flow of arms continues non-stop, with only a small percentage having been discovered and blocked by the international community in recent years. And all this is in addition to the colossal official budget the IRGC receives from Tehran.

The new revelation is but another reason for the international community to take firm and swift action against the IRGC.

***

These PMOI sources helped to identify three organizations – Admiral Group, Hafez Daya Arya and Valfajr – as shipping companies being used as fronts for smuggling weapons to other countries throughout the region, in particular, Yemen.

Since most Yemani docks are closed to Iranian ships, the IRGC’s shell companies began using ports in nearby Oman to smuggle weapons into Yemen. The PMOI alleges that they primarily used Soltan Qaboos Port in Muscat, Sohar Port in North Oman and Salalah Port in South Oman. For the rest of their operations, the guard is operating in ports in the Hormozgan and Bushehr Provinces  along the Persian Gulf, as well as, the Farsi and Faror Islands, the group charged. More here.

***

The Islamic Revolutionary Guard Corps (IRGC), reported that the IRGC is using civilian passenger jets operated by the Iranian airline Mahan Air to transfer weapons to Syria and Yemen and also to bring back the bodies of fallen fighters as well as injured fighters requiring treatment.

“In October 2016, a knowledgeable source at the U.S. Treasury Department told AP that the U.S. was trying to convince the E.U. to cooperate with American steps to disrupt Mahan Air’s financial flows. Five years ago, America leveled sanctions on Mahan Air due to its close ties to the IRGC and allegations that it was transferring weapons to Syria and Yemen, but thus far, the E.U. has not complied with these sanctions. More here.

Does the White House Know ‘all’ about North Korea?

Check your personal cell phone, who manufactured it… ZTE is the No. 4 smartphone vendor in the United States, selling handset devices to U.S. mobile carriers AT&T Inc (T.N), T-Mobile US Inc (TMUS.O) and Sprint Corp (S.N).

Since 1995, the United States has provided North Korea with over $1.2 billion in assistance, of which about 60% has paid for food aid and about 40% for energy assistance. As of early March 2010, the United States is not providing any aid to North Korea, except for a small medical assistance program. The Obama Administration, along with the South Korean government, have said that they would be willing to provide large-scale aid if North Korea takes steps to irreversibly dismantle its nuclear program. The main vehicle for persuading Pyongyang to denuclearize is the Six-Party Talks, involving North Korea, the United States, China, South Korea, Japan, and Russia. The Talks have not met since late 2008.

North Korea did not militarily threaten the region until the Obama administration. Since, North Korea has taken exceptional steps in the realm of illicit activities, collusion, theft and shadow companies to finesse sanctions. China is essentially in the diplomatic field responsible for checks and balances on North Korea and once again is calling for a truce of sorts. This objective is not new and has failed each time.

Enter Japan, where the Prime Minister, Shinzo Abe who has been in contact with the White House is escalating responsive military actions against North Korea. This could lead to a much more hostile region. It seems that the recent missile launches coordinated with Iran are part of a mission to strike U.S. bases in the region. There are 3 of distinction, however the United States maintains additional joint locations.

Image result for us military bases in japan 2017 Image result for us military bases in japan 2017

Rattled by North Korean military advances, influential Japanese lawmakers are pushing harder for Japan to develop the ability to strike preemptively at the missile facilities of its nuclear-armed neighbor.

Japan has so far avoided taking the controversial and costly step of acquiring bombers or weapons such as cruise missiles with enough range to strike other countries, relying instead on its U.S. ally to take the fight to its enemies.

But the growing threat posed by Pyongyang, including Monday’s simultaneous launch of four rockets, is adding weight to an argument that aiming for the archer rather than his arrows is a more effective defense.

“If bombers attacked us or warships bombarded us, we would fire back. Striking a country lobbing missiles at us is no different,” said Itsunori Onodera, a former defense minister who heads a ruling Liberal Democratic Party committee looking at how Japan can defend against the North Korean missile threat. “Technology has advanced and the nature of conflict has changed.”

*** Meanwhile, as an indication of illicit activities and fraud, below is a sample.

China’s ZTE pleads guilty, settles with U.S. over Iran, North Korea sales

NEW YORK (Reuters) – Chinese telecom equipment maker ZTE Corp <000063.SZ> has agreed to pay $892 million and plead guilty to criminal charges for violating U.S. laws that restrict the sale of American-made technology to Iran and North Korea.

While a guilty plea deals a blow to ZTE’s reputation, the resolution could lift some uncertainty for a company that relies on U.S. suppliers for 25 percent to 30 percent of its components.

A five-year investigation found ZTE conspired to evade U.S. embargoes by buying U.S. components, incorporating them into ZTE equipment and illegally shipping them to Iran.

In addition, it was charged in connection with 283 shipments of telecommunications equipment to North Korea.

“ZTE Corporation not only violated export controls that keep sensitive American technology out of the hands of hostile regimes like Iran’s, they lied … about their illegal acts,” U.S. Attorney General Jeff Sessions said in a statement.

The investigation, spearheaded by the U.S. Department of Commerce, followed reports by Reuters in 2012 that ZTE had signed contracts to ship millions of dollars worth of hardware and software from some of the best-known U.S. technology companies to Iran’s largest telecoms carrier.

The Justice Department noted one Reuters article in its statement announcing the plea deal on Tuesday. The original report can be read here: http://www.reuters.com/article/us-iran-telecoms-idUSBRE82L0B820120322.

The company’s guilty pleas, which must be approved by a judge, will take place in U.S. District Court in Texas. The Shenzhen-based company has a U.S. subsidiary in Richardson, Texas.

In March 2016, ZTE was placed on a list of entities that U.S. firm could not supply without a license. ZTE acted contrary to U.S. national security or foreign policy interests, the Commerce Department said at the time.

ZTE purchases about $2.6 billion worth of components a year from U.S. technology companies, according to a company spokesman. Qualcomm (QCOM.O), Microsoft (MSFT.O) and Intel (INTC.O) are among its suppliers.

Items shipped in violation of U.S. export laws included routers, microprocessors and servers controlled under export regulations.

Authorities said executives at ZTE approved the scheme to prevent disclosure of the sales. The scheme included a data team that destroyed or sanitized materials involving ZTE’s Iran business after March 2012.

“Despite ZTE’s repeated attempts to thwart the investigation, the dogged determination of investigators uncovered damning evidence,” said Douglas Hassebrock, director of the Commerce Department office that led the investigation.

Last year, Commerce released internal documents showing senior ZTE executives instructing the company to carry out a project for dodging export controls in Iran, North Korea, Syria, Sudan and Cuba.

The company on Tuesday agreed to a seven-year suspended denial of export privileges, which could be activated if there are further violations. A denial order would bar the receipt of U.S. origin goods and technology.

The denial order is key to keeping ZTE in line, said Eric Hirschhorn, former Under Secretary at the Commerce Department, who was involved in the investigation.

“If the suspension is removed, they’ll probably be put out of business,” he said.

ZTE also agreed to three years of probation, a compliance and ethics program, and a corporate monitor.

The settlement includes a $661 million penalty to Commerce; $430 million in combined criminal fines and forfeiture; and $101 million paid to the Treasury’s Office of Foreign Assets Control (OFAC). The action marks OFAC’s largest-ever settlement with a non-financial entity.

ZTE also agreed to an additional penalty of $300 million to the U.S. Commerce Department that will be suspended during a seven-year term on the condition the company complies with requirements in the agreement.

In addition to being one of the world’s biggest telecommunications gear makers, ZTE is the No. 4 smartphone vendor in the United States, selling handset devices to U.S. mobile carriers AT&T Inc (T.N), T-Mobile US Inc (TMUS.O) and Sprint Corp (S.N).

 

WikiLeaks Releases CIA Cyber Docs, Problem?

Primer: Steve Bannon works for President Trump in the White House.

Steve Bannon is a star – for Al-Qaeda, that featured him on the cover of their newspaper

steve-bannon-is-a-star---for-al-qaeda-that-featured-him-on-the-cover-of-their-paper

Then this headline….

The new scandal headlines for today is WikiLeaks, telling us they published the largest cache of secret CIA documents relating to the CIA’s ability to hack, break encryption and install malware. This is a problem? The problem is not the tools the CIA has, the problem is that someone inside the agency stole them and delivered them to WikiLeaks.

It is a good thing that the agency has these resources, why you ask?

Well….try this…The threat is real from Russians, Chinese, North Korea, Iran, Syria, Ukraine, al Qaeda and Islamic State…

Image result for stuxnet

Remember Stuxnet? This was a successful joint program under the Bush presidency with Israel to infect the Iranian nuclear program and it was to forces the centrifuges to spin out of control, which they did. Ultimately, it caused the progress of the Iranian infrastructure to be delayed substantially. It was in fact later uncovered by cyber scientists working for Siemens, the hardware and software platform used as the operating system. Good right? Yes.

Image result for u.s. cyber command

Well, there is more…

In recent years, Iran and North Korea have been sharing nuclear scientists and engineers, parts, testing and missile collaboration. So far, the missiles launched by North Korea for the most part have been unsuccessful, or at least did not achieve the ultimate objective and that is an official target strike. Why? Because of the United States. How so you ask?

Over the weekend, North Korea fired off 4 missiles in succession toward Japan. They did not reach the mainland but did reach the waterway that is part of the Japanese economic zone for maritime operations. We have American cyberwarriors that are doing effective work causing the missiles to fly off course or to technically fail. The objective is to use non-explosive weaponry to foul the North Korea and hence Iran’s missile program and while North Korea is not especially connected to the internet, some related systems are connected and then there is electronic warfare.

Image result for foreign hacking omb

We know that Islamic State is a terror operation that has militant cells in an estimated 30 countries. While they have depraved methods of murder, rape and terror, they too have a cyber operation.

The Will to Act

One question is whether ISIS will be consumed with the protection and continued expansion of its immediate fighting fronts, i.e., the “near enemy,” or whether its scope of vision includes America’s homeland. The Economist advances a strong case that desire for such expansion not only exists but will be exercised: “With its ideological ferocity, platoons of Western passport holders, hatred of America and determination to become the leader of global jihadism, ISIS will surely turn, sooner or later, to the ‘far enemy’ of America and Europe.”

And perhaps any doubt the militant’s sights are on America was removed by ISIS leader Abu Bakr al-Baghdadi’s Sept. 22 call for jihadists to not wait for the order but to rise, take up arms, and “kill Americans and other infidels” wherever they are. Clearly the group is showing no hesitancy in its desire to strike the U.S. heartland on a personal scale.

Cyber Operations Capability?

As to whether ISIS will have the capability to mount cyber operations against the U.S., David DeWalt, head of cybersecurity firm FireEye, believes that ISIS will follow in the footsteps of the Syrian Electronic Army and the Iran-based Ajax Security Team to target the United States and other Western nations.

“We’ve begun to see signs that rebel terrorist organizations are attempting to gain access to cyber weaponry,” DeWalt stated recently. He added that booming underground markets dealing in malicious software make offensive cyber weapons just an “Internet transaction” away for groups such as ISIS. More here.

Is there more to this that we should know? Yes…

There is the Middle East and we have a major vested interest in the region.

***

Cybersecurity in the Gulf: The Middle East’s Virtual Frontline

Cybersecurity is often discussed in relation to the major global powers: China’s economic espionage, Russian influence operations, and U.S. dragnet global surveillance to thwart terrorism.

However, as other countries move to digitize their economies, cybercriminals are zeroing in on these new and lucrative targets while regional players are quickly incorporating cyber capabilities into their own arsenals for achieving strategic ends.

The Middle East, particularly the Gulf states, are quickly recognizing the urgent need for better cybersecurity, while regional adversaries such as Iran have begun weaponizing code as an extension of broader strategic goals within the region. What, though, is the Gulf’s current cybersecurity atmosphere, and how does Iran’s emerging use of offensive cyber capabilities fit into its broader strategy in the Middle East?

Wajdi Al Quliti, the Director of Information Technology at the Organization of Islamic Cooperation, notes that “the region’s dramatic strides towards digitization—expected to add over $800 billion to GDP and over 4 million jobs by 2020—is making the Gulf a major target for fast evolving cyber threats.” Much like other regions, the Gulf is finding it difficult to sufficiently create criminal deterrence due to segmented laws and difficulties in attribution. Al Quliti argues “cross-border cooperation and common cybersecurity structures could prove to be a game-changing advantage in the fight against cybercrime.” However, “the elephant in the room,” according to Al Quliti, “is the issue of state-sponsored hacking, in which case harmonized laws are unlikely to make a difference.”

A critical point in nation-state hacking in the Middle East begins with the Stuxnet worm. Discovered in 2010 burrowed deep in Iranian networks, the worm had slowly been sabotaging Iran’s nuclear ambitions. Then in 2011 CrySyS Lab discovered Duqu, a cyber espionage tool tailored to gather information from industrial control systems, and in 2012, Kaspersky Labs identified Flame, another espionage tool, targeting various organizations in the Middle East. Both Duqu and Flame are associated with Stuxnet and attributed back to the Equation Group, widely considered an arm of the National Security Agency.

In 2012, Iranian officials found a wiper virus erasing files in the network of the Oil Ministry headquarters in Tehran, leading the ministry to disconnect all oil terminals from the Internet to prevent the virus from spreading. It is uncertain who was behind the attacks, but a mere four months later, Saudi Arabia’s largest oil company, Saudi Aramco, was hit with a similar wiper virus known as Disttrack—possibly coopted from the previous attack on Iran’s oil industry.

The data-erasing malware sabotaged three-quarters, some 35,000 of the company’s computers while branding screens with an image of a burning American flag. A few months later, another wiper virus attacked Qatar’s RasGas.

Al Quliti identifies “the region’s heavy dependence on oil and gas—as well as the oil and gas-powered desalination plants that provide much of the region’s fresh water”—as “a source of cyber vulnerability,” adding that “any cyber attack on these installations could prove catastrophic and might result in a humanitarian disaster.”

The sabotage operations against the Gulf’s oil industry have been attributed by various cybersecurity firms—but not officially by any government—to a group called Shamoon, thought to be an arm of the Iranian government.

Michael Eisenstadt, the Director of the Military and Security Studies Program at the Washington Institute for Near East Policy, notes that “cyber allows Iran to strike at adversaries globally, instantaneously, and on a sustained basis, and to potentially achieve strategic effects in ways it cannot in the physical domain.” For example, in March 2016, the Justice Department indicted seven Iranian Revolutionary Guard members for distributed denial of service attacks against U.S. banks in 2012 in retaliation for Iran sanctions imposed the previous year, as well as for infiltrating the systems of a small New York dam in 2013—a possible testing ground for penetrating larger pieces of U.S. critical infrastructure. In 2014, the same year North Korea set its sights on Sony Pictures, Iran’s cyber capabilities again reached into the United States, using another wiper virus to sabotage the operations of the Las Vegas Sands casino, whose chief executive, a staunch supporter of Israel, had suggested detonating a nuclear bomb in the heart of Tehran.

Last November, right before a major OPEC meeting, a variation of the Disttrack wiper used against Saudi Aramco struck again, now fitted with a picture of Alan Kurdi, the drowned Syrian toddler who washed up in Turkey in 2015. The virus targeted six Saudi organizations, most notably the Saudi General Authority of Civil Aviation, delivering its payload at the close of business on a Thursday, the start of the Islamic weekend, for maximum impact. Some experts speculate the November attack could have also been a false-flag operation to derail the Iranian nuclear deal.

Interestingly, for both the 2012 and 2016 Shamoon attacks, the wiper came fitted with stolen login credentials that Symantec now believes could have been gleaned from a cyber espionage tool, known as Greenbug, found on one of the administrator computers of a Saudi organization targeted in November. The potential link between Greenbug and the Shamoon group opens up possible investigations into the group’s involvement in a host of other Greenbug attacks throughout the Middle East, including breaches in Saudi Arabia, Bahrain, Iraq, Qatar, Kuwait, Turkey, and even Iran—though likely for domestic surveillance on dissidents. Just last week, another wiper virus hit 15 Saudi organizations, including the Ministry of Labor, prompting the government to issue an urgent warning of pending Shamoon attacks.

Eisenstadt points out that “Iran’s cyber activities show that a third-tier cyber power can carry out significant nuisance and cost-imposing attacks,” and “its network reconnaissance activities seem to indicate that it is developing contingency plans to attack its enemies’ critical infrastructure.” According to Eisentadt, is now seems that “in the past decade, Iran’s cyber toolkit has evolved from a low-tech means of lashing out at its enemies by defacing websites and conducting DDoS attacks, to a central pillar of its national security concept.”

Beginning to understand why the CIA and the other agencies are building cyber command war-rooms?

 

U.S. Military Footprint in Syria Expands

The hunt for ISIS leader Abu Bakr al-Baghdadi also continues in earnest. Raqqa is now surrounded by Kurdish and Free Syrian forces and Mosul is crumbling, a military official told ABC News, promising al-Baghdadi’s death at the hands of the U.S.-led coalition is “just a matter of time.”

In Syria, coalition military forces conducted eight strikes consisting of 11 engagements against ISIS targets:

— Near Abu Kamal, two strikes destroyed a wellhead and an oil inlet manifold.

— Near Raqqa, two strikes engaged an ISIS tactical unit, destroyed two vehicles, and suppressed an ISIS tactical unit.

— Near Dayr Az Zawr, two strikes destroyed four tactical vehicles, four ISIS-held buildings, two wellheads, two engineering equipment pieces and a tank.

— Near Manbij, two strikes destroyed a vehicle and an artillery system.

Related reading: US-backed forces in Syria have isolated ISIS’s last stronghold in the country

All strikes are conducted by fighter, attack, bomber, rotary-wing or remotely piloted aircraft; rocket-propelled artillery; and some ground-based tactical artillery when fired on planned targets, officials noted.

U.S. Special Forces have been on the move in northern Syria, deploying near the city of Manbij over the weekend to act as a buffer between American-backed Syrian militias and forces controlled by Turkey. Photos have emerged of U.S. Stryker vehicles configured for the U.S. Army’s 75th Ranger Regiment and specialized Humvees used by Special Forces moving near the city, and U.S. officials confirmed that the American presence around the city had been beefed up. The Ankara-backed Free Syrian Army militia — bolstered by Turkish special forces — moved on Manbij last week, as Turkish officials said they wanted to clear the Kurdish YPG out of the area. Local Syrian forces and the U.S. military deny that the Kurdish forces are near the city.

On a recent trip to northern Syria, FP’s Paul McLeary spent time with both U.S. Special Forces and their local allies near the city, and found the Syrians clearly worried about the Turkish threat. The view from Baghdad. Speaking with FP on Monday, spokesman for the U.S. military command in Baghdad Col. John Dorrian said the American troop presence in Syria and Iraq hasn’t grown, despite the movement of more U.S. troops to Manbij. “There are adequate forces in the area” to handle the situation and “reassure our allies and our partners,” he said. The Manbij Military Council has also said that it turned back a Russian convoy of armored vehicles and troops that tried to enter the area, but Dorrian said he hasn’t seen any increase in Russian troops or aircraft around the city.
“Until now, U.S. military commanders have ruled out anything beyond some artillery support and an advisory role for U.S. special operations forces. But some officials and administration advisors are open to at least considering the idea of using conventional forces in a full-fledged combat role.”

  US SOF base at cement plant between Manbij, Raqqa.

A Syrian MiG-23 crashed in Turkey and the pilot is now claiming he was shot down.  Reuters reports that the pilot, who was rescued by Turkish authorities, says he was downed while flying over Idlib. The Islamist rebel group Ahrar al-Sham has claimed responsibility for downing the aircraft although the assertion has yet to be independently verified. The rescue by Turkey marks yet another sign of the turnaround in relations between Ankara, the Assad regime, and its supporters. In November 2015, a Turkish F-16 shot down a Russian Su-24 carrying out operations over Syria after it violated Turkish airspace, leading to a lengthy and bitter dispute between Turkey and Russia.

***

On Sunday, Syrian forces pushed ahead with their military campaign against the Takfiri Jabhat Fatah al-Sham group, formerly known as al-Nusra Front, in the Dar’a al-Balad neighborhood of the southwestern city of Dara’a, managing to retake several blocks of buildings, Syria’s official news agency, SANA, reported.

Large groups of the militants were killed in the areas of al-Masri, al-Karak and al-Arba’een.

Separately, the Syrian government forces targeted Daesh (ISIL or ISIS) positions on the southern outskirts of al-Qassr village in the northeastern countryside of Sweida province, leaving dozens of the terrorists dead and injured.

Additionally, the Daesh militants suffered serious setbacks in the western city of Deir ez-Zor after the army and its allies shelled their positions in the areas of al-Bogheiliyeh, Hatla, al-Sannof, al-Rwad, al-Sinaa and al-Rushdiye in the province.

Syria has been gripped by civil war since March 2011 with various terrorist groups, including Daesh, currently controlling parts of it.