Mosul, Iraq Offensive Chemical Weapons Report

 DailyMail

Islamic State executes scores, stockpiles chemicals – U.N.

MOSUL: Islamic State fighters have executed scores more people around Mosul this week and are reportedly stockpiling ammonia and sulphur in civilian areas, possibly for use as chemical weapons, U.N. human rights spokeswoman Ravina Shamdasani said on Friday.

A mass grave with over 100 bodies found in the town of Hammam al-Alil was one of several Islamic State killing grounds, Shamdasani said, citing information gleaned from sources on the ground including a man who played dead during a mass execution.

Public executions were being carried out for “treason and collaboration” with Iraqi forces trying to recapture the city, or for the use of banned mobile phones or desertion.

People with explosive belts, possibly teenagers or young boys, were being deployed in the alleys of Old Mosul, while abducted women were being “distributed” to fighters or told they would be used to accompany Islamic State convoys, she said.


ISIS Killed over 70 Mosul Civilians as Iraqi Forces Advancing

Troops of Iraq’s elite Counter-Terrorism Service (CTS) resumed their offensive against ISIS on the streets of Mosul on Friday after several days of relative quiet as the United Nations said ISIS militants have executed scores more people around the city this week.

The battle to retake Mosul, the ISIS terrorist last major stronghold in Iraq, is now in its fourth week, while Iraqi troops have pushed into the east of the city.

“Our forces have begun the attack on Arbajiyah. The clashes are ongoing,” Staff Lieutenant Colonel Muntadhar Salem said, referring to an area in the east of the city.

According to United Nation ISIS (ISIL, IS and Daesh) shot dead 40 civilians on Tuesday in the northern Iraqi city of Mosul after accusing them of treason, the United Nations says.

Their bodies were then hung from electricity poles in several districts, the office of the UN Human Rights Commissioner said, citing sources.

A man was also reportedly shot dead in public in central Mosul for ignoring an ISIS ban on using mobile phones.

The killings of the civilians appeared to have been carried out on the orders of self-appointed “courts”, according to the UN report.

The UN says 20 civilians were also shot dead on Wednesday evening at the Ghabat military base in northern Mosul, supposedly for leaking information.

The UN also expressed concern at ISIS deployment of teenagers and young boys. Children are apparently seen in an ISIS video issued on Wednesday shooting dead four people for spying.

ISIS also announced on 6 November that it had beheaded seven militants for deserting the battlefield in the Kokjali district of eastern Mosul, the UN says.

Among the sources cited for the UN’s information was a man who played dead during a mass killing by ISIS terrorists.

UN High Commissioner for Human Rights Zeid Raad al-Hussein called for the government to “act quickly to restore effective law enforcement in areas retaken from ISIL (ISIS) to ensure that captured fighters and their perceived supporters are dealt with according to the law”.

Troops have reportedly been consolidating gains made in the eastern outskirts of Mosul, which they entered nine days ago amid fierce fighting.

Above Footage shows Peshmerga forces continue to clear the recently recaptured town of Bashiqa of improvised explosive devices left by Islamic State militants.

****What next for Islamic State? Incubating areas of sanctuary and they are.

In part from Rand: First, insurgent groups that lose territory generally need to find sanctuaries that allow them to rest, resupply their depleted forces, and plan future operations. In some cases, these safe havens are outside the country. In Afghanistan, the Taliban’s leadership and many of its fighters fled to neighboring Pakistan after their defeat in 2001 at the hands of U.S. and Afghan forces. Over the next several years, the Taliban used its safe havens in Pakistan to restart the war in Afghanistan, where it remains a significant threat to the Afghan state today. Similarly, Fidel Castro and his surly band of communist rebels suffered a debilitating defeat in July 1953 against the Cuban government in the city of Santiago de Cuba. But Castro eventually reorganized in Mexico, plotted his next steps in relative security, and eventually overthrew the government of Fulgencio Batista in 1959.

Sometimes adequate sanctuaries are available inside the country. In Somalia, al-Shabab lost virtually all of the territory it once controlled following military operations by the African Union Mission in Somalia, Somali government, allied clan militias, and U.S. forces from 2011 to 2015. But al-Shabab found a sanctuary in the Jubba River valley in southern Somalia among allied clans, and it has since waged a violent terrorist campaign in Somalia and neighboring countries like Kenya.

Islamic State leaders already appear to appreciate the importance of sanctuaries. Where the Islamic State has already lost territory in Iraq, such as in Ramadi and Fallujah, its fighters have melted away into the dense agricultural and desert areas around urban centers. Operating out of these jazirah (“isolated”) areas, the Islamic State could replicate the model it perfected a decade ago under the name “al Qaeda in Iraq” by sustaining itself through low-level criminal activity, storing weapons caches for extended operations, and executing a grueling murder and intimidation campaign. Islamic State fighters can also leverage the territory the group currently controls in Syria, which extends north of Raqqa and southeast along the Euphrates River to the Syrian-Iraqi border. This sanctuary was essential for the Islamic State’s resurgence in 2014.

Insurgent groups that face more powerful adversaries generally adopt a guerrilla strategy.

Second, insurgent groups that face more powerful adversaries generally adopt a guerrilla strategy rather than attempting to wage a conventional campaign and fight their enemies in pitched battles. A guerrilla strategy involves the use of military and political resources to mobilize a local population, conduct hit-and-run attacks rather than face the enemy directly on the battlefield, and undermine the government’s will to fight. Guerrilla warfare is attractive to groups that are significantly weaker than government security forces, which is why a guerrilla campaign is sometimes likened to a “war of the flea.”

For T.E. Lawrence, the British officer and advisor to Arab insurgents against the Ottoman Empire, guerrilla campaigns were the sine qua non of insurgent warfare, and mobility and hit-and-run attacks were their essential tactic. He wrote in The Evolution of a Revolt: “Granted mobility, security (in the form of denying targets to the enemy), time, and doctrine (the idea to convert every subject to friendliness), victory will rest with the insurgents, for the algebraical factors are in the end decisive.”

Most successful insurgent groups have utilized guerrilla strategies. In Guinea-Bissau, Amilcar Cabral and his African Party for the Independence of Guinea and Cape Verde (PAIGC) adopted a successful guerrilla campaign to win independence from Portugal. The PAIGC spent more than a decade conducting hit-and-run attacks against Portuguese forces until Guinea-Bissau became independent from Portugal in 1974. In South Africa, African National Congress (ANC) leaders began preparations in 1963 for Operation Mayibuye, which involved organizing and implementing a guerrilla strategy against the government. It was orchestrated by the ANC’s military wing, Umkhonto we Sizwe, and contributed to the end of the apartheid government in South Africa by 1994.

Today, the Islamic State faces a powerful coalition of adversaries that includes seasoned Kurdish Peshmerga, Iraqi security forces, Sunni Arab militias, Shiite militias, and U.S. and other coalition military power. If the Islamic State has any hope of surviving the loss of Mosul, its leaders will likely shift to a classic guerrilla campaign that includes ambushes, raids, sabotage, targeted assassinations, and suicide attacks. The Islamic State waged a successful conventional campaign in 2014 when its fighters from Syria surged across the border into Iraq’s Anbar province in large columns of mechanized and even armored vehicles, joining operatives that had already been active in Fallujah and Ramadi. Clashes often took the form of set battles, trench warfare, and town sieges. But the Islamic State no longer faces such parity, making guerrilla warfare its only viable option. More here.

Sid Blumenthal was POC for Libya, Muslim Brotherhood

 Leader of LIFG, Belhadj

Base of Operation:Mountain territory near Benghazi and al-Akhdar aside the Libyan northeast coasts. The Libyan Islamic Fighting Group began formation from return Libyan Afghans from the war against the soviets ending in 1989; however, was not officially established as a group until the year of 1995. Between then and the present, the group has gone through several mischievous movements of acting out against the government. Per the United Nations under the direction of the U.S. State Department during the Bush administration:

LIFG is believed to have several hundred members or supporters, mostly in the Middle East and Europe. Since the late 1990s, many LIFG members have fled from Libya to various Asian, Arabian Gulf, African, and European countries, particularly the United Kingdom. It is likely that LIFG has maintained a presence in eastern Libya and has facilitated the transfer of foreign fighters to Iraq.

Hillary Clinton Knew She Was Helping Islamists Move Into Power In Libya

Howley/DC: Hillary Clinton received intelligence that her effort to bring down Libyan president Muammar Gaddafi was leading to the rise of al-Qaeda militants and the Muslim Brotherhood in the country, according to emails released by WikiLeaks.

More than a year before the Benghazi attack, Clinton learned that al-Qaeda terrorists were infiltrating the post-Gadaffi transitional government. Clinton also acknowledged that the Muslim Brotherhood wielded the “real power” in the rebel movement that Clinton was supporting — and that their Brotherhood allies in Egypt were waiting in the wings to move into Libya’s oil sector.

Clinton received a “CONFIDENTIAL” memo from Sidney Blumenthal on March 27, 2011. The subject of the email was “Re: Lots of new intel; Libyan army possibly on verge of collapse.”

Blumenthal explained that “radical/terrorist” groups were “infiltrating the NLC,” or National Libyan Council, a rebel quasi-government that earned French recognition as Libya’s governing body that very same month. Clinton was warned that al-Qaeda could become major players in the region.

Blumenthal wrote:

“This situation has become increasingly frustrating for French President Nicolas Sarkozy, who, according to knowledgeable individuals, is pressing to have France emerge from this crisis as the principal foreign ally of any new government that takes power. Sarkozy is also concerned about continuing reports that radical/terrorist groups such as the Libyan Fighting Groups and Al Qa’ida in the Islamic Maghreb (AQIM) are infiltrating the NLC and its military command. Accordingly, he asked sociologist who has long established ties to Israel, Syria, and other B6 nations in the Middle East, to use his contacts to determine the level of influence AQIM and other. terrorist groups have inside of the NLC. Sarkozy also asked for reports setting out a clear picture of the role of the Muslim Brotherhood in the rebel leadership…

…(Source Comment: Senior European security officials caution that AQIM is watching developments in Libya, and elements of that organization have been in touch with tribes in the southeastern part of the country. These officials are concerned that in a post-Qaddafi Libya, France and other western European countries must move quickly to ensure that the new government does not allow AQIM and others to set up small, semi- autonomous local entities—or “Caliphates”—in the oil and gas producing regions of southeastern Libya.)”

On May 30, 2011, Hillary aide Jake Sullivan sent the secretary of state a full list of known “Libya emissaries.” By then, the National Libyan Council had given way to the Transitional National Council (TNC), but the “real power” still lay with the Muslim Brotherhood.

Sullivan’s intelligence memo noted:

“The Qadhafi regime has also met with the Libyan Muslim Brotherhood leadership in Egypt. According to Qadhafi chief of staff Fouad Zlitni, the Muslim Brotherhood asserts that TNC may be the political leadership of the opposition, but the real power lies with the Libyan Brotherhood and they are apparently willing to bide their time. The Qadhafi regime also offered to send senior tribal leaders to Benghazi to negotiate with the TNC, but the TNC rejected the proposal.”

Clinton forwarded that email to an aide, acknowledging that she had received it and assessed its contents.

Sidney Blumenthal wrote to Clinton again on July 3, 2012, two months before Benghazi, to talk about the upcoming election. The election, Blumenthal noted, was how the Muslim Brotherhood in Egypt was hoping to use the new Brotherhood party in Libya to get into the Libyan oil game.

Blumenthal wrote:

“Source Comment: In the opinion of a knowledgeable individual, the division of the 200 seats in the GNC lies at the heart of this matter, with 120 seats allotted for the Tripolitania, 60 for Barqa, and 18 for the Fezzan area. At present, the Libyan Muslim Brotherhood (LMB) and its political arm, the Justice and Construction Party (JCP), are attempting to mount a national campaign, receiving discreet advice and technical support from the Egyptian Muslim Brotherhood (EMB). With this assistance, Jalil is convinced that the JCP is the party that operates most effectively throughout the country. Jalil has established ties to the EMB, from whom he has learned that JCP leader Mohamad Sowan and his associates are working with the leadership of the EMB.) 4.According to his sources, Jalil believes that he can work with Sowan and the LMB/JCP; however, he is concerned that Mohammed Morsi, the newly elected EMB President of Egypt, and EMB Supreme Guide Mohammed Badie are focused on developing Egyptian influence in Libya. Jalil has been informed privately that these EMB leaders want to establish a strong position in Libya, particularly in the oil services sector as part of their effort to improve Egypt’s economic situation.

Over in Egypt, Clinton helped spur the uprising that led to the Muslim Brotherhood briefly taking power in that country around the same time. And a young Clinton Foundation employee, Gehad El-Haddad, was already working in Cairo to help the Muslim Brotherhood gain power.

El-Haddad was arrested in 2013, following the brief and disastrous reign of Muslim Brotherhood leader Mohammed Morsi, for inciting violence. He was reportedly one of Morsi’s top advisers. El-Haddad was sentenced to life in prison in 2015.

 

 

Contractors: ” Hillary Broke all the Rules”

Primer: JWICS =

The Joint Worldwide Intelligence Communications System, is a Top Secret/SCI network run by the United States’ Defense Intelligence Agency and used across the Department of Defense, Department of State, Department of Homeland Security and Department of Justice to transmit especially sensitive classified information.

FNC/EXCLUSIVETwo State Department contractors, with decades of experience protecting the United States’ most sensitive secrets, are speaking out for the first time about Hillary Clinton’s tenure as secretary of state and how the rules for government security clearance holders did not seem to apply to Clinton and her team.

“The State Department was her oyster and it was great for the [Clinton] foundation and great for the Clintons to be able to have such a great position,” Dave Whitnah told Fox News.

Whitnah said he worked within the State Department’s Office of Security Technology which is responsible for cameras and alarms and sweeping for bugs. Whitnah said everyone understood the secretary of state is the primary target of foreign intelligence services.

“The number one person would be the secretary of state and their communications,” Whitnah explained. “You can think of the Iran negotiations, nuclear negotiation, negotiations with Russia, talks with Russia. You know, anything to do with foreign policy.”

Whitnah emphasized that tens of millions of dollars were spent on technical security for Clinton that apparently was disregarded as her team traveled around the world on official U.S. government business.

“It was unfathomable that [her BlackBerry] would be used for anything other than just unclassified communication,” Whitnah said. Clinton’s devices were not certified as secure by the State Department. As for her use of a non-secure BlackBerry, Whitnah stressed that email can be intercepted and, “Even if turned off, it’s still a listening device so that’s why you take out the batteries.”

As Clinton was sworn in as secretary in January 2009, government contractor Amel Smith said he was also working at the department and: “State Department rules are clear. I helped write those rules.”

Smith says his 30 years of experience includes serving in the U.S. Army’s 82nd Airborne, before becoming a counter-intelligence and counter-espionage investigator at State tracking down breaches of classified materials. He reviewed some of the FBI witness interviews from the Clinton email investigation with Fox News, and questioned those who claimed not to have the proper training in handling sensitive information.

“I hear things like, well, I forgot, um, I don’t know that I was trained, I don’t know this. You know — every single person that had access to that information when it was sent is in violation,” Smith emphasized.

The FBI witness interviews also show secure facilities for classified information — known as SCIFs — were specially built for Clinton in her in Washington, D.C., and Chappaqua, N.Y., homes. Doors that were supposed to be locked were left open.

“If you’ve got an uncleared person in there, it’s automatically a compromise,” Smith said.

Another FBI interview summary said there were personally owned desktop computers in the secure facilities at Clinton’s homes, yet she told the FBI that she did not have a computer of any kind in these facilities.

“If somebody said they’re there, then they probably were there, and you know, the reason you would deny it was because you probably didn’t have approval,” Smith said.

Having unapproved computers in a SCIF would automatically call for a security investigation.

Asked for his reaction to Clinton’s claim that nothing she sent or received was marked classified, Whitnah called that assertion a “misrepresentation.” Fox News was first to report in June that at least one of the emails contained a classified information portion marking for “c” which is confidential. FBI Director James Comey later said in July when he recommended against criminal charges that a handful of Clinton emails contained classified markings.

But more than 2,100 emails with classified information, and at least 22 at the “top secret” level, passed through Clinton’s unsecured private server. Asked how it happened, Smith said, “Personally, there had to have been somebody moving classified information from C-LAN, C-LAN again is Secret, Confidential only, and JWICS. JWICS is where all top secret information is.”

After new emails were found in the Anthony Weiner sexting case belonging to his estranged wife Clinton aide Huma Abedin, the FBI reopened the Clinton email investigation. On Sunday, Comey said the emails did not change his recommendation against criminal charges because his investigators did not find intent to move classified materials outside secure government channels

“Whether it’s the private email server, whether it’s this private laptop. If there’s classified — one document on there — that’s classified, it’s a violation. Somebody violated [the] law,” Smith said. “Throw all the politics out the window, what we’re talking about is the defense of this nation.”

Asked about Smith and Whitnah, who filed a complaint against the State Department, a department spokesman said they were not direct hires — adding that the head of diplomatic security told the FBI that Clinton was “very responsive to security issues.”

****

And her State Department approved that security team in Benghazi

Benghazi guards turned on US diplomats in 2012 attack, sources say

stevenspic1Expand / Contract

Stevens, shown in rear wearing black, with several of the guards sources say turned on him. (Special to Fox News)

FNC: An obscure private firm hired by the State Department over internal objections to protect U.S. diplomats in Benghazi just months before the American ambassador and three others were killed was staffed with hastily recruited locals with terror ties who helped carry out the attack, multiple sources told Fox News.

The explosive charge against Wales-based Blue Mountain Group comes from several sources, including an independent security specialist who has implemented training programs at U.S. Consulates around the world, including in Benghazi, where he trained a local militia that preceded Blue Mountain. The source, who spoke on condition of anonymity, said Blue Mountain used local newspaper ads to assemble a team of 20 guards, many of whom had terror ties, after securing a $9.2 million annual contract.

“The guards who were hired were locals who were part of the Ansar al-Sharia and Al Qaeda groups operating in Benghazi,” said the source, whose assignment in Benghazi had ended in November 2011. “Whoever approved contracts at the State Department hired Blue Mountain Group and then allowed Blue Mountain Group to hire local Libyans who were not vetted.”

TIMELINE OF CLINTON’S BENGHAZI STATEMENTS

Many were members of the Libyan government-financed February 17th Martyrs Brigade, an Islamist militia that had previously guarded Americans before being replaced by Blue Mountain.

John “Tig” Tiegen, one of the CIA contractors that responded to the Sept. 11, 2012 attack and co-author of “13 Hours: The Inside Account of What Really Happened in Benghazi,” confirmed to Fox News that the local Libyans who attacked the consulate that night included guards working for Blue Mountain.

“Many of the local Libyans who attacked the consulate on the night of Sept. 11, 2012, were the actual  guards that the State Department under Hillary Clinton hired to protect the Consulate in Benghazi,” Tiegen told Fox News. “The guards were unvetted and were locals with basically no background at all in providing security. Most of them never had held a job in security in the past.

“Blue Mountain Libya, at the time of being awarded the contract by our State Department, had no employees so they quickly had to find people to work, regardless of their backgrounds,” he said.

One former guard who witnessed the attack, Weeam Mohamed, confirmed in an email sent to the Citizens Commission on Benghazi and obtained by Fox News, that at least four of the guards hired by Blue Mountain took part in the attack after opening doors to allow their confederates in.

“In the U.S. Mission, there were four people [who] belonged to the battalion February 17,” Mohamed wrote to the Commission, an independent body formed with Accuracy in Media to investigate the attack and the administration’s handling of it.

“Always armed. And they are free to move anywhere inside a building mission.

“And therefore, they had a chance to do an attack on the mission’s headquarters. They have all the details about the place. At the same time they have given the United States a painful blow,” Mohamed wrote.

Blue Mountain officials did not return multiple requests for comment. The State Department acknowledged in internal emails obtained by FoxNews.com the local recruits fell short of their duty, but discounted the claim any took an active role in the attack that resulted in the deaths of Ambassador Christopher Stevens, Foreign Service Information Officer Sean Smith and CIA contractors and former Navy SEALs Tyrone Woods and Glen Doherty.

“While the Accountability Review Board report and other reports were critical of our local guards’ performance, we are not aware of any evidence that they participated in the attacks themselves,” said State Department spokesman John Kirby.

Blue Mountain was hired in February 2012, following an uprising that ended Col. Muammar Gaddafi’s 42-year rule and plunged Libya into violent chaos. Congressional testimony in the wake of the attack on a consular office in Benghazi revealed that Stevens and his staff had made hundreds of requests for security upgrades but had been ignored by officials in Washington.

“We kept asking for additional support, including a 50-caliber mounted machine gun, but the State Department would not give it to us, because they said it would upset the locals,” the source told Fox News. “Instead, the State Department hired a company that doesn’t have employees, which then hired terrorists.”

Clare Lopez, a member of Citizens’ Commission on Benghazi, said the Clinton State Department bears blame for the security situation.

“Think about it: Hillary Clinton’s State Department actually hired the very people who, along with their jihadist allies in Benghazi, attacked us and killed U.S. Ambassador Chris Stevens and Sean Smith as well as CIA contractors Glen Doherty and Ty Woods,” Lopez said.

According to government records obtained by the Washington-based Judicial Watch, the State Department was in a “rush” to hire Blue Mountain UK, and its affiliate, Blue Mountain Libya, which together formed The Blue Mountain Group to secure the Benghazi contract.

“I understand there was a tremendous rush to get the original contract awarded, and the Service level agreement was most likely overlooked in the rush,” wrote State Department contracting officer Jan Visintainer, in a June 6, 2012, email. Emails obtained from [missing word] after the attack showed Visintainer urged Blue Mountain officials not to talk to the media.

Blue Mountain UK was formed in 2008 by David Nigel Thomas, a former Special Air Service official. Charles Tiefer, a commissioner at the Commission on Wartime Contracting, told Reuters the company was not well known.

“Blue Mountain was virtually unknown to the circles that studied private security contractors working for the United States, before the events in Benghazi,” Tiefer said.

Despite the size of the operation, and having no staff or track record with the State Department, Blue Mountain Group landed the $767,767-per-month contract to protect the Benghazi consular office, beginning on Feb. 17, 2012.

The company solicited applications in local newspapers and on websites, and very little, if any, screening of guards was done, the security specialist told Fox News. The lack of vetting led to several potentially dangerous hires beginning in March of 2012, he said.

“One of those guards hired by Blue Mountain was the younger brother of the leader of Al Qaeda of Benghazi,” he said.

In an email obtained by Judicial Watch, Jairo Saravia of the Regional Security office for the U.S. Embassy in Tripoli, told his superiors in Washington that Blue Mountain had held and lost security contracts in Tripoli, with the Corinthian Hotel and Palm City complex.

“The latest information is Blue Mountain is not licensed by the GOL (Government of Libya) to provide security services in Libya,” Saravia wrote. “I would advise not to use their services to provide security for any of our annexes and/or offices due to the sensitivity this issue has with the current GOL.”

Prior to Blue Mountain, security for Americans in Benghazi had been provided by the February 17th Martyrs Brigade under a direct agreement with the State Department. Despite its Islamist orientation, the militia included dozens of locals who had been carefully cultivated and trained by the U.S., according to the source. The majority of the February 17 Militia guards were fired without warning when Blue Mountain was hired, leading some members to turn against the Americans, he said. The State Department kept on at least three February 17 employees for patrol.

Eric Nordstrom, the regional security officer in Libya who has vast, first-hand knowledge of some 600 security requests denied to the U.S. diplomatic mission in Libya, testified on May 8, 2013, before the Congressional Committee On Oversight & Government Reform that he was aware that employees with both February 17 Martyrs Brigade and Blue Mountain had ties to Islamist terrorists.

“I had met with some of my agents and then also with some annex personnel. We discussed that,” Nordstrom told lawmakers.

Nordstrom testified that the “ferocity and intensity” of the 13-hour, four-phase attack, on the 11th anniversary of 9/11, was nothing that they had seen in Libya, or that he had seen in his time in the Diplomatic Security Service, with as many as 60 attackers in the consulate.

“I am stunned that the State Department was relying on [locals] with extremist ties to protect American diplomats,” U.S. Rep. Blake Farenthold, R-Texas, told Fox News. “That doesn’t make any sense. How does that happen?”

Fox News was able to verify through a former Libyan guard the identities of several February 17 employees hired despite terrorist ties, who he said participated in the attack. While their identities have been provided to federal authorizes, none have been prosecuted.

Foreign Spies on our College Campuses

International Espionage on Campus

Bishop/CB: The idyllic American university campus conjures the image of a safe and open academic environment where students spend four or more years learning new ideas and preparing for future careers.  Professors challenge eager students to open their minds to old and new perspectives in science, mathematics, business, and of course, the arts and humanities.  Universities nurture an atmosphere where academics and scientists can engage in groundbreaking research, make advances in technology, and publish on novel theories and discoveries.

For many students, college may be the first time they are living on their own, allowing them to explore not only academic freedom but personal freedom. For parents coping with their children leaving home, some comfort is found in the expectation that while students are on campus the university will be actively taking measures to protect them from physical harm and risks that could affect their future.  Parents don’t realize that for some students, college may be the first time students are exposed to the clandestine world of international espionage.

Espionage knows no boundaries.  Foreign intelligence officers and spies lurk wherever there is information of value to be had or people with access to it. Information does not have to be a government secret for a foreign intelligence service to want to steal it.  Nation states play the Great Game to gain an advantage, whether political or economic, over their adversaries.  And there is plenty of information of value on American college campuses to attract the attention of adversary nations.  From advanced research in sciences and technology to professors with access to U.S. government officials, American universities are a target-rich environment for intelligence collection, intellectual property theft, and the illicit transfer of research and technology.   The welcoming nature of American universities—from unlocked entrances to university facilities, minimal investigation into the backgrounds of students enrolling in classes, and open admission to conferences, seminars, and other campus events—creates the perfect opportunity for undercover foreign intelligence officers or their human sources to slip onto campus and search for students who have potential for entering sensitive positions in the U.S. government or landing jobs with American companies engaged in the development and production of emerging and advanced technologies.

While the threat of espionage may not be apparent to parents and students, American universities have little excuse for not knowing about it.  Federal law enforcement agencies like the FBI regularly attempt to advise universities of the potential espionage threats on campus, and the media also has reported extensively on them.  The risks are real, knowable, and preventable, and universities that ignore the threats could face potentially devastating consequences to their reputations, relationships, and financial well being.  For students who do not fully appreciate the risk and get wrapped up on the wrong side of the clandestine world, the impact on their futures can be tremendous and irreversible.  Espionage on campus and the often-related illicit transfer of research and technology from school laboratories also contribute to immediate and long-term decline of U.S. national security interests and the competitive advantage the United States possesses in sciences and technology.  The university campus has been part of the Great Game chessboard for years. This is nothing new and not much has changed.

In 1930s Great Britain, five college students with communist sympathies came under the spell of espionage at the University of Cambridge.  Donald MacLean, Guy Burgess, Anthony Blunt, John Cairncross, and Kim Philby were in their undergraduate years when the NKVD, the Soviet precursor to the KGB, recruited them to serve the communist cause.  At the time, none of the students had access to information of value or persons of interest, but the NKVD believed these men, who came from the right social class, would find their way into positions of influence and access. They all did.

MacLean landed key positions in the UK’s foreign office, the equivalent of the U.S. Department of State.  Burgess held positions with the foreign office, the BBC, and MI6.  Blunt spent some time in MI5, served as the Surveyor of the King’s Pictures, and used his standing in academic and social circles to spot other potential Soviet spies. Cairncross made the rounds at MI6 and Bletchley Park, the precursor to the UK’s Government Communication Headquarters (GCHQ).  Kim Philby was the prize of the five.  While starting his espionage as a freelance journalist in the Spanish Civil War, which gave him access to pro-Franco forces—the ideological enemies of the Soviet Union—Philby returned to the UK and entered MI6.  There, he steadily rose through the ranks, eventually overseeing MI6’s counterintelligence operations against the Soviet Union. The Cambridge spies, most notably Philby, are still considered to be some of the most damaging spies in UK espionage history. The notoriety of these men is well known in England, and their association with the University of Cambridge as the Cambridge Ring or Cambridge Five will forever be remembered.

American universities have not been immune to the espionage efforts of foreign intelligence services.  In 1984, a student-spy working for the Cuban intelligence service and studying at Johns Hopkins University “spotted” Ana Montes as a potential Cuban recruit.  After being introduced to Cuban intelligence officers, Montes agreed to spy for Cuba while still a graduate student at Johns Hopkins.  She later became an intelligence analyst at the Defense Intelligence Agency (DIA), focusing on Cuban issues.  She was arrested in 2001 and sentenced to 20 years in prison.

Other known espionage or technology/research theft cases affecting the American university community include:

  • In 2002, Qingqiang Yin, a former Cornell University researcher was arrested before boarding a flight to Shanghai from New York.  He was carrying numerous bacteria samples and yeast cultures belonging to the university.  The FBI investigation revealed Yin was seeking a job with a research facility in China and offered to bring the bacteria and yeast cultures to China for commercial enzyme production.  He was sentenced to 12 months’ imprisonment for conspiracy to defraud the U.S. government.
  • In 2006, Carlos Alvarez, a psychology professor at Florida International University, admitted during a plea hearing that he had been a Cuban spy for nearly 30 years, gathering and transmitting information about Cuban exile groups to Cuban intelligence agents.  His wife Elsa, also a professor, admitted knowing of her husband’s conduct.  They were sentenced to five and three years’ imprisonment, respectively.  
  • In 2012, the FBI arrested 12 deep-cover Russian SVR intelligence officers who were engaged in espionage against various American targets.  One of the SVR officers was Cynthia Murphy, a.k.a. Lydia Guryeva, who while studying for a master’s degree at Columbia University, was tasked by the SVR to develop relationships with classmates and professors who have or will acquire access to secret information and to report on their backgrounds and characteristics, providing assessments on their vulnerability for recruitment as spies. The SVR also directed Guryeva to collect information on students seeking employment with the CIA.  After pleading guilty to failing to register as an agent of a foreign government, the United States returned Guryeva (and the other deep-cover officers) to Russia in exchange for prisoners held there. 
  •  
  • In 2013, Hua Jun Zhao, a Chinese research assistant at the Medical College of Wisconsin, was arrested and charged with economic espionage after stealing cancer research compounds and shipping them to China, where he allegedly planned to take them to a Chinese university for further development.  He pleaded guilty to the lesser charge of illegally downloading research data and was sentenced to time served (four-and-a-half months).
  •    Image result for Hua Jun Zhao
  • Since 2004, the Chinese government has opened numerous Confucius Institutes at universities across the world, including approximately 64 institutes at American universities.  While the stated mission of the institutes is to promote the study of Chinese language and culture abroad, concerns have been raised about the ulterior motives of these institutes.  Allegations have also surfaced that the institutes may be Trojan Horses used by the Chinese government to conduct espionage activities. Regardless of the public evidence available on the alleged intelligence function of these institutes, from this former intelligence officer’s perspective, they are the perfect front for penetrating American universities and targeting their students.  

Again, these are only examples of the espionage threats facing American universities.  These incidents and others have been well documented in the public domain, and American universities dedicated to risk management should know about them, if not for their own protection, then for the benefit of their donors and students and U.S. national security.

Today’s American university receives funding from a variety of sources, including alumni, businesses, philanthropic organizations, and federal and state governments.  Research grants from the public and private sectors are a significant source of income for universities, and donors want the university to reap the benefits of their contributions.  No donor wants to see years of research and funding illegally diverted to a foreign government or competitor.  A university that does not take this risk seriously could begin to see expected research grants and contributions being provided to other schools or facilities, especially when the U.S. government is the funding source.

Universities should also consider the disruption a law enforcement investigation into espionage on campus can have on its day-to-day operations, reputation, and ability to maintain investor (philanthropic) confidence.  The media will undoubtedly provide thorough coverage of an espionage investigation, the accuracy of which is not guaranteed.

Investigators will be removing and combing through files and records.  Computers may be seized, and electronic files of all kinds will be requested.  Interviews of those with knowledge of the incident or perpetrators will be required, and if a public trial takes place, there will be more disruption and publicity.  A university wanting to maintain or salvage its reputation after the uncovering of espionage on its campus will find it advantageous if it can truthfully state it has been cooperating with law enforcement on the investigation rather than have a story surface that the university was one of the obstacles law enforcement had to overcome in order to put an end to the espionage. Having the university’s name negatively associated with a foreign espionage investigation is not the kind of publicity a university will find easy to overcome.
For students, the consequences of becoming entangled in espionage could be severe.   Students make easy targets, and their idealism and naiveté can often get in the way of their judgment.  Once a student is recruited as a spy, his opportunities for reversing course without consequence are limited.  One only needs to look at the choices made by Glenn Duffie Shriver, an American just out of college and living in China, who was slowly manipulated by Chinese intelligence to seek employment with the CIA.  Shriver was arrested and sentenced to four years’ imprisonment after pleading guilty to conspiracy to commit unlawful conveyance of national defense information.  Shriver was released from prison in 2013, but he will be forever remembered as a Chinese spy.  Not a great resume builder.

From a national security perspective, espionage on campus also contributes to the perpetual and long-term decline of the United States’ competitive advantage over its adversaries.  The technology and research lost to other countries through espionage and theft robs the American economy of the commercial and economic benefits it would have derived in terms of jobs, profits, and scientific and technological advancement.  The stolen knowledge increases the commercial and economic standing of the countries that committed the theft to the detriment of the United States.  If the stolen technologies and research have military, defense, or security applications, then the losses also contribute to the threats the United States faces from countries and adversaries who seek to challenge or harm its national security interests.

Universities are a soft target for espionage and offer potentially lucrative rewards for our adversaries’ intelligence targeting efforts.  Every loss resulting from espionage or foreign theft at an American university is a gain for the adversaries of the United States. These risks and potential consequences transcend the inerrant concept of the open, academic environment.

Eastern Europe Readiness for War with Russia

NATO puts 300,000 troops on ‘high alert’ in readiness for a confrontation with Russia as fears grow Putin is preparing to attack the West

  • Nato chief Jens Stoltenberg putting 300,000 troops on ‘high alert’ 
  • Military intelligence are worried about Putin’s new Armata battle tank  
  • UK stalled new tank design as heavy armour is not useful against jihadis

Nato chiefs, thrown into a panic by fears that Russian President Vladimir Putin might attack the West, are scrambling to put together a force of 300,000 troops which they can put on ‘high alert’.

Relations between Russia and the West have plunged in the last year, with Moscow’s insistence on backing its Syrian ally, President Bashar al-Assad, at all costs leading to serious tension with the US, Britain and France.

Most Nato members cut their defence spending dramatically since the Soviet Union collapsed in 1991 but Russia has been bolstering its military capabilities, holding parades involving more than 100,000 troops each year.

Nato soldiers stand on a pontoon bridge constructed across the Vistula river in Poland during the NATO Anaconda-16 exercise earlier this year

Nato soldiers stand on a pontoon bridge constructed across the Vistula river in Poland during the NATO Anaconda-16 exercise earlier this year

DailyMail: Moscow has been throwing its weight around in recent years – in 2008 Russian troops humiliated the Georgians and in turn the White House by invading South Ossetia and Abkhazia in support of pro-Moscow rebels.

Nato members like Estonia, Poland and Romania, who are feeling increasingly threatened by Moscow, are now being promised a rapid deployment force.

Nato Secretary General Jens Stoltenberg told The Times this week: ‘We have also seen Russia using propaganda in Europe among Nato allies and that is exactly the reason why Nato is responding. We are responding with the biggest reinforcement of our collective defence since the end of the Cold War.

‘We have seen Russia being much more active in many different ways.

‘We have seen a more assertive Russia implementing a substantial military build-up over many years; tripling defence spending since 2000 in real terms; developing new military capabilities; exercising their forces and using military force against neighbours,’ added Mr Stoltenberg. More here.

****

Russia’s hybrid war actions:

Montenegro says “nationalists from Russia” planned to kill prime minister

IanAllen: Authorities in the former Yugoslav Republic of Montenegro say that “nationalists from Russia” and Serbia were behind a failed plot to kill the country’s prime minister and spark a pro-Russian coup in the country. As intelNews reported last week, the coup allegations surfaced on October 16, after 20 Serbians and Montenegrins were arrested by authorities for allegedly planning a military coup against the government of Montenegro. The arrests took place on election day, as Montenegrins were voting across the Balkan country of 650,000 people.

On Sunday, at a press conference in Montenegro’s capital and largest city, Podgorica, the country’s Chief Special Prosecutor, Milivoje Katnić, reiterated claims that the failed coup aimed to prevent the reelection of Prime Minister Milo Đukanović, whose push for Montenegro to join the North Atlantic Treaty Organization has prompted strong objections from Moscow. Katnić told journalists that the plotters had hired a “long-distance sharpshooter” who was “a professional killer”, for the task of killing Đukanović. After killing the Prime Minister, the plotters had planned to storm the parliament and prompt a pro-Russian coup in the former Yugoslav Republic, said the special prosecutor. He added that authorities had confiscated weapons, military uniforms and nearly $140,000 in cash that were found in the possession of the alleged coup plotters.

Asked about the fate of the 20 alleged coup plotters, Katnić said that 14 of them remained in custody in Podgorica, while six others had been extradited to Serbia. The Serbian government of Prime Minister Vučić has accepted Montenegro’s allegations that the coup was hatched in Serbia and has offered to help investigate alleged links between the plotters and the Russian state. However, said Katnić, his team of investigators had no evidence of direct involvement by Russia in the alleged coup plot. But, he said, “two nationalists from Russia”, whom he did not name, were among the leaders of the plot. In a press statement, Katnić’s office said that other coup plotters in addition to the 20 men arrested, remained at large, having escaped from Serbia. They could now be in Russia, he said. Moscow has not responded to the claims by the Montenegrin authorities.

*** Denise has interview Nolan Peterson on Ukraine

Back to Ukraine, ready for the Russian Invasion

Nolan Peterson: Kiev, Ukraine—The young man never told anyone he was going to war.

The 20-year-old student at Kiev’s Taras Shevchenko National University slipped away in June 2014 to join a civilian paramilitary group fighting in eastern Ukraine.

The young man, whose name was Sviatoslav Horbenko, was a star pupil at the university’s Institute of Philology, where he studied Japanese. When he transferred from a university in Kharkiv, a city in eastern Ukraine, during his third year, he had to retake 17 exams.

He aced them all.

“There was no bellicose air about him,” said Serhiy Yanchuk, an associate professor at Taras Shevchenko University and coordinator of the university’s Students Guard, a volunteer militia comprising students and faculty.

“He never acted or behaved aggressively for his personal cause,” Yanchuk said. “He was friendly, warm hearted, and an easy-going person. One would surely want to be a friend of such a guy.”

At his father’s behest, the younger Horbenko moved to Kiev and settled into life and his studies at Taras Shevchenko National University.

And then, a few months after the war began in the summer of 2014, Sviatoslav Horbenko disappeared. Without telling his friends, family, or teachers, he joined Right Sector, a civilian volunteer battalion, to fight at the battle for the Donetsk airport.

Olexander Horbenko ultimately was able to track Sviatoslav down at boot camp. The father tried to dissuade his son from going to war. But Sviatoslav was determined.

“That was my last meeting with him alive, our unforgettable conversation,” Olexander Horbenko later said. “Sviatoslav considered defending his fatherland as his duty, and he developed the strong bonds of military comradeship.” Read the full story here.