An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation
Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.
USAToday: A new accounting of guns that were allowed to be trafficked to Mexico as part of a botched U.S. firearms investigation shows that one of the weapons was used last year in a deadly shootout that left three Mexican police officers dead.
A Justice Department summary provided to two Republican congressional committee chairmen Tuesday found that a WASR-10 rifle, purchased six years before in the U.S., was one of three rifles fired in the July 27 assault in the town of Valle de Zaragoza. It was not immediately known which weapon caused the officers’ fatal wounds.
Nevertheless, Bureau of Alcohol Tobacco Firearms and Explosives officials traced the WASR rifle to a Nov. 12, 2009, transaction that was part of the flawed federal gun trafficking operation, known as “Operation Fast and Furious.”
“ATF and the (Justice) Department deeply regret that firearms associated with Operation Fast and Furious have been used by criminals in the commission of violent crimes, particularly crimes resulting the death of civilians and law enforcement officers,’’ Assistant Attorney General Peter Kadzik said in a Tuesday letter to Senate Judiciary Committee Chairman Charles Grassley of Iowa and House Oversight and Government Reform Chairman Jason Chaffetz of Utah.
“ATF accepts full responsibility for the flawed execution of Fast and Furious, and will continue to support Mexican law enforcement in efforts to recover and identify associated firearms.’’
As of January, according to the Justice Department letter, 885 firearms purchased by targets of the ATF operation have been recovered. Of that number, 415 were found in the U.S. and 470 “appear to have been recovered in Mexico.’’
The same letter confirmed prior reports that one of 19 weapons —a .50-caliber rifle —recovered in the January raid in Mexico that resulted in the re-capture of drug lord Joaquin “El Chapo” Guzman also was traced to the ATF operation.
**** Is there an end it sight? Not so much For years, the United States has pushed countries battling powerful drug cartels, like Mexico, to decapitate the groups by killing or arresting their leaders. The pinnacle of that strategy was the capture of Mexico’s most powerful trafficker, Joaquín Guzmán Loera, better known as El Chapo, who escaped in spectacular fashion last month from a maximum-security prison.
And while the arrests of kingpins make for splashy headlines, the result has been a fragmenting of the cartels and spikes in violence in places like Chilapa, a city of about 31,000, as smaller groups fight for control. Like a hydra, it seems that each time the government cuts down a cartel, multiple other groups, sometimes even more vicious, spring up to take its place.
“In Mexico, this has been a copy of the American anti-terrorism strategy of high-value targets,” said Raúl Benítez Manaut, a professor at the National Autonomous University of Mexico who specializes in security issues. “What we have seen with the strategy of high-value targets is that al-Qaida has been diminished, but a monster appeared called the Islamic State. With the cartels, it has been similar.”
While the large cartels are like monopolies involved in the production, transportation, distribution and sale of drugs, experts say, the smaller groups often lack international reach and only control a portion of the drug supply chain.
They also frequently resort to other criminal activities to boost their income, like kidnapping, car theft, protection rackets and human trafficking. And while the big cartels have the resources to buy off government officials at the national level, the smaller gangs generally focus on the local and state levels, often with disastrous consequences for communities.
That was abundantly clear in a case that stunned the nation last year, when 43 students disappeared in Iguala, a city a short distance from Chilapa.
FNC: Less than a month after becoming secretary of state, and registering the personal email domain that she would use exclusively for government business, Hillary Clinton’s team aggressively pursued changes to existing State Department security protocols so she could use her BlackBerry in secure facilities for classified information, according to new documents released under the Freedom of Information Act.
“Anyone who has any appreciation at all of security, you don’t ask a question like that,”cybersecurity analyst Morgan Wright told Fox News. “It is contempt for the system, contempt for the rules that are designed to protect the exact kind of information that was exposed through this email set up. “
Current and former intelligence officials grimaced when asked by Fox News about the use of wireless communications devices, such as a BlackBerry, in a SCIF (Sensitive Compartmented Information Facility) emphasizing its use would defeat the purpose of the secure facility, and it is standard practice to leave all electronics outside.
A former State Department employee familiar with the Clinton request emphasized security personnel at the time thought the BlackBerry was only for unclassified material, adding their concerns would have been magnified if they had known Clinton’s email account also held classified material.
“When you allow devices like this into a SCIF, you can allow the bad guys to listen in,” Wright added.
A February 17, 2009 email marked SECRET and cleared through the NSA says, “Ms. Mills described the requirement as chiefly driven by Secretary Clinton, who does not use standard computer equipment but relies exclusively on her Blackberry for emailing and remaining in contact on her schedule etc. Ideally all members of her suite would be allowed to use Blackberries for communication in the SCIF (Sensitive Compartmented Information Facility)”
Cheryl Mills was Clinton’s chief of staff from 2009-13.
The emails, obtained by Judicial Watch as part of a Freedom of Information Act lawsuit also show that a specialized NSA team was brought in to assess the vulnerabilities and feasibility of using wireless communications, including within a secure facility.
The NSA State Department liaison, whose name was withheld, told Mills in a now highly redacted email: “Sometimes the distinction between what can be done and what is, or is not, recommended to be done differ; this is one of those instances. (State Department Diplomatic Security) DS’s response illustrates their level of concern based on their extensive professional expertise. “
Clinton never used a State Department issued BlackBerry. It is not clear from the documents whether Clinton and her team went ahead and used their BlackBerrys in SCIFs despite the concerns, including those of the NSA.
A February 18 2009 email from the State Department’s Senior Coordinator for Security Infrastructure, Donald R. Reid, states “…once she (Clinton) got the hang of it, she was hooked, now every day, she feels hamstrung because she has to lock up her BB up. She does go out several times a day to an office they have crafted for her outside the SCIF and plays email catch-up. Cheryl Mills and others who are dedicated BB addicts are frustrated because they too are not near their desktop very often during the working day…”
The reference to a secondary office for Clinton appears to conflict with a February statement from the State Department that no stand-alone computer was set up outside Clinton’s main office on the executive floor, known as Mahogany Row, to check her personal account.
On February 25, Fox News pressed the State Department spokesman about a January 2009 email, also obtained by Judicial Watch, between Under Secretary for Management Patrick Kennedy and then Clinton chief of staff Mills where Kennedy said it was a “great idea” to setup a stand-alone PC for Clinton to check her email.
Asked by Fox News, State Department spokesman John Kirby said, “There was no stand-alone computer ever set up.”Fox News has asked Kirby to further clarify his statement.
In January 2009, Clinton signed at least two non-disclosure agreements in which she promised to protect classified information. Since then, more than 2,100 emails containing classified information have been identified, as well as 22 Top Secret that are too damaging to national security to release.
Earlier this week, Judicial Watch presented the federal court in Washington with a list of 7 Clinton aides it wants to question under oath about Clinton’s use of a private email sever when she was secretary of state.
Meanwhile, Judicial Watch is aggressively working on additional subpoenas for interrogatories of those within Hillary’s circle. One issue, in my humble opinion, they omitted Jake Sullivan.
(Washington, DC) – Judicial Watch today filed a plan for “narrowly tailored discovery” into former Secretary of State Hillary Clinton’s email matter with a federal court. Judicial Watch’s discovery plan seeks the testimony of eight current and former State Department officials, including top State Department official Patrick Kennedy, former State IT employee Bryan Pagliano, and Clinton’s two top aides at the State Department: Cheryl Mills and Huma Abedin. Judicial Watch’s plan says that “based on information learned during discovery, the deposition of Mrs. Clinton may be necessary” but would only occur with permission by the Court.
During a court hearing on February 23, U.S. District Court Judge Emmet G. Sullivan granted Judicial Watch’s motion for discovery into whether the State Department and Clinton deliberately thwarted the Freedom of Information Act (FOIA) for six years. The discovery arises in a Judicial Watch FOIA lawsuit that seeks records about the controversial employment status of Huma Abedin, former Deputy Chief of Staff to Clinton. The lawsuit was reopened because of revelations about the clintonemail.com system. (Judicial Watch v. U.S. Department of State (No. 1:13-cv-01363)).
Judicial Watch seeks testimony from:
Stephen D. Mull (Executive Secretary of the State Department from June 2009 to October 2012 and suggested that Mrs. Clinton be issued a State Department BlackBerry, which would protect her identity and would also be subject to FOIA requests);
Lewis A. Lukens (Executive Director of the Executive Secretariat from 2008 to 2011 and emailed with Patrick Kennedy and Cheryl Smith about setting up a computer for Mrs. Clinton to check her clintonemail.com email account);
Patrick F. Kennedy (Under Secretary for Management since 2007 and the Secretary’s principal advisor on management issues, including technology and information services);
Donald R. Reid (Senior Coordinator for Security Infrastructure, Bureau of Diplomatic Security since 2003 and was involved in early discussions about Mrs. Clinton using her BlackBerry and other devices to conduct official State Department business);
30(b)(6) deposition(s) of Defendant [designated witness(es) for the State Department] regarding the processing of FOIA requests, including Plaintiff’s FOIA request, for emails of Mrs. Clinton and Ms. Abedin both during Mrs. Clinton’s tenure as Secretary of State and after;
Cheryl D. Mills (Mrs. Clinton’s Chief of Staff throughout her four years as Secretary of State);
Huma Abedin (Mrs. Clinton’s Deputy Chief of Staff and a senior advisor to Mrs. Clinton throughout her four years as Secretary of State and also had an email account on clintonemail.com); and
Bryan Pagliano (State Department Schedule C employee who has been reported to have serviced and maintained the server that hosted the “clintonemail.com” system during Mrs. Clinton’s tenure as Secretary of State four years as secretary).
With respect to testimony of Clinton, the Judicial Watch court filing states:
Based on information learned during discovery, the deposition of Mrs. Clinton may be necessary. If [Judicial Watch] believes Mrs. Clinton’s testimony is required, it will request permission from the Court at the appropriate time.
Judicial Watch also seeks court approval of written questions requiring answers under oath by the State Department:
Who was responsible for processing and/or responding to record requests, including FOIA requests, concerning emails of Mrs. Clinton and other employees of the Office of the Secretary;
Who was responsible for the inventorying or other accounting of Mrs. Clinton’s and Ms. Abedin’s emails, records, and information;
Who was responsible for responding to Plaintiff’s FOIA request from the date of submission to the present; and
Which State Department officials and employees had and/or used an account on the clintonemail.com system to conduct official government business.
Judicial Watch also seeks testimony from a 30 (b)(6) witness or witnesses who can provide testimony on behalf of the State Department on the following issues:
the creation or establishment of the clintonemail.com system as well as any maintenance, service, or support provided by the State Department of that system;
the knowledge or awareness of State Department officials and employees about the existence and use of the clintonemail.com system;
any instructions or directions given to State Department officials and employees about communicating with Mrs. Clinton and Ms. Abedin via email;
any inquiries into Mrs. Clinton’s use of the clintonemail.com system as well as any discussions about responding to such inquiries or publicly revealing the existence and use of the clintonemail.com system to the public; and
the inventorying or other accounting of Mrs. Clinton’s and Ms. Abedin’s email upon their departure from the State Department.
The Judicial Watch plan requests only eight weeks to conduct the requested depositions. Judge Sullivan will rule on Judicial Watch’s proposed discovery plan after April 15.
“This discovery will help Judicial Watch get all of the facts behind Hillary Clinton’s and the Obama State Department’s thwarting of FOIA so that the public can be sure that all of the emails from her illicit email system are reviewed and released to the public as the law requires,” stated Judicial Watch president Tom Fitton.
Stripes: WASHINGTON — If the Marines were called today to respond to an unexpected crisis, they might not be ready, a top Marine general told the Senate Armed Services Committee on Tuesday.
Gen. John Paxton, assistant commandant of the U.S. Marine Corps, testified to lawmakers that the Marines could face more casualties in a war and might not be able to deter a potential enemy.
“I worry about the capability and the capacity to win in a major fight somewhere else right now,” he said, citing a lack of training and equipment.
Paxton, along with the vice chiefs of the Army, Navy and Air Force, spoke to the Senate committee on the readiness challenges facing each service after 15 years of war and recent budget cuts.
For the Marines, he said units at home face the most risk because of fewer training opportunities with the best equipment deployed with forces overseas. And it would be these undertrained home units that would be called to respond to an unexpected crisis.
“In the event of a crisis, these degraded units could either be called upon to deploy immediately at increased risk to the force and the mission, or require additional time to prepare thus incurring increased risk to mission by surrendering the initiative to our adversaries,” Paxton said. “This does not mean we will not be able to respond to the call … It does mean that executing our defense strategy or responding to an emergent crisis may require more time, more risk, and incur greater costs and casualties.”
Communication, intelligence and aviation units are the hardest hit, Paxton said. More here.
In part FP: As Kabul’s fragile army struggles to hold the line, will Washington’s warplanes come to the rescue?
Times have changed. The United States withdrew most of its troops in 2014 and dramatically reduced the number of airstrikes against Taliban targets throughout the country. The footage from Kunduz illustrated how the Taliban has been taking advantage of their new freedom: by conquering the city. The insurgents held Kunduz for two weeks before being pushed out by Afghan and U.S. personnel in October. Still, many officials believe it’s only a matter of time before the Taliban targets the city again.
The Taliban’s growing military might is posing a thorny strategic question for President Barack Obama, who took office promising to end what is now America’s longest war. The U.S. has spent tens of billions of dollars training Afghan security personnel, who have suffered enormous casualties while trying — and failing — to repel the Taliban’s advances in the country’s south, east, and north. That leaves the White House with an unpalatable choice: Keep the stringent rules limiting the numbers of strikes in place and risk seeing the militants continue to gain ground, or allow American pilots to bomb a broader array of targets at the risk of deepening Washington’s combat role in Afghanistan. More details here.
FC: China and Russia are preparing to attack and disrupt critical U.S. military and intelligence satellites in a future conflict with crippling space missile, maneuvering satellite, and laser attacks, senior Pentagon and intelligence officials told Congress on Tuesday.
Air Force Gen. John Hyten, commander of the Air Force Space Command, said the threat to U.S. space systems has reached a new tipping point, and after years of post-Cold War stagnation foreign states are focused on curbing U.S. space systems.
“Adversaries are developing kinetic, directed-energy, and cyber tools to deny, degrade, and destroy our space capabilities,” Hyten said in a prepared statement for a hearing of the House Armed Service strategic forces subcommittee.
“They understand our reliance on space, and they understand the competitive advantage we derive from space. The need for vigilance has never been greater,” the four-star general said.
Hyten said U.S. Global Positioning System satellites remain vulnerable to attack or jamming. The satellites’ extremely accurate time-keeping feature is even more critical to U.S. guided weapons than their ability to provide navigation guidance, he said.
Disrupting the satellites time capabilities would degrade the military’s ability to conduct precision strike operations used in most weapons systems today.
Hyten said a new joint military-intelligence command center is helping to monitor space threats, such as anti-satellite missile launches, covert killer robot satellites, and ground-fired lasers that can blind or disrupt satellites. The unit is called the Joint Interagency Combined Space Operations Center, located at Schriever Air Force Base, Colorado.
The Space Command also is creating 39 cyber mission teams that will be used for defensive and offensive cyber operations involving space systems.
Lt. Gen. David Buck, commander of Joint Functional Component for Space, a U.S. Strategic Command unit, testified along with Hyten that China and Russia pose the most serious threats to space systems.
“Simply stated, there isn’t a single aspect of our space architecture, to include the ground architecture, that isn’t at risk,” Buck said.
“Russia views U.S. dependency on space as an exploitable vulnerability and they are taking deliberate actions to strengthen their counter-space capabilities,” he said.
China in December created its first dedicated space warfare and cyber warfare unit, called the Strategic Support Forces, for concentrating their “space, electronic, and network warfare capabilities,” Buck said.
“China is developing, and has demonstrated, a wide range of counter-space technologies to include direct-ascent, kinetic-kill vehicles, co-orbital technologies that can disable or destroy a satellite, terrestrially-based communications jammers, and lasers that can blind or disable satellites,” Buck said.
“Moreover, they continue to modernize their space programs to support near-real-time tracking of objects, command and control of deployed forces, and long-range precision strikes capabilities,” the three-star general said.
Douglas Loverro, deputy assistant defense secretary for space policy, also warned about growing threats to satellites and outlined U.S. plans to deter future attacks.
Loverro said the United States does not want a war in space. “But let me be clear about our intent—we will be ready,” he said.
None of the five Pentagon and intelligence officials who took part in the budget hearing for military space efforts mentioned any U.S. plans or programs to develop anti-satellite missiles and other space weapons for use against Chinese or Russian space systems. The subcommittee, however, held a closed-door session after the public hearing.
A modified U.S. missile defense interceptor, the SM-3, was used in 2008 to shoot down a falling U.S. satellites in a demonstration of the country’s undeclared anti-satellite warfare capability.
Loverro suggested U.S. defense and deterrence of space attacks could involve counter attacks, possibly on the ground or in cyber space. But he provided no specifics.
“Today our adversaries perceive that space is a weak-link in our deterrence calculus,” Loverro said. “Our strategy is to strengthen that link, to assure it never breaks, and to disabuse our adversaries of the idea that our space capabilities make tempting targets.”
Many of the most important navigation, communications, and intelligence satellites were designed during the Cold War for use in nuclear war and thus incorporate hardening against electronic attacks, Loverro said.
For conventional military conflict, however, adversaries today view attacks on U.S. satellites as a way to blunt a conventional military response what Loverro called the “chink in the conventional armor of the United States.”
“In this topsy-turvy state, attacks on space forces may even become the opening gambit of an anti-access/area-denial strategy in a regional conflict wherein an adversary seeks to forestall or preclude a U.S. military response,” he said. “Chinese military strategists began writing about the targeting of space assets as a ‘tempting and most irresistible choice’ in the late 1990s, and the People’s Liberation Army has been pursuing the necessary capabilities ever since,” he said.
Rather than threatening foreign states’ satellites, Loverro said deterrence against foreign nations’ space attacks is based on defending against missile strikes or other attacks and making sure satellite operations will not be disrupted in war.
That would be carried out through partnering with the growing commercial space sector that is expected to deploy hundreds of new satellites in the coming years that could be used as back up systems for the Pentagon in a conflict.
Deterrence also will be based on increasing foreign partnerships with allied nations in gathering intelligence on space threats and other cooperation.
A space defense “offset” strategy will seek to reduce the advantage of using relatively low cost of missiles, small satellites, or cyber forces to attack U.S. satellites, Loverro said.
“An advanced U.S. satellite might cost upwards of $1 billion; missiles that could destroy such a satellite cost a few percent of that sum; co-orbital microsatellites cost even less; and lasers that might blind or damage satellites have an unlimited magazine with almost zero cost per shot,” Loverro said.
Deploying large numbers of low-cost satellites will not offset those advantages, he said.
Instead, Loverro offered vague plans for countering the threat. “A space offset strategy must employ a diverse set of resilience measures that complicate the technical, political, and force structure calculus of our adversaries, by arraying a complex set of responses, with few overlapping vulnerabilities and a combination of known and ambiguous elements,” he said.
Frank Calvelli, deputy director of the National Reconnaissance Office, the spy agency that builds and operates strategic intelligence and reconnaissance satellites, said a resurgent Russia and aggressive China are among several current national security threats.
Calvelli revealed that the agency in October launched a new satellite that carried 13 smaller “CubeSats.”
“The NRO sponsored nine of the CubeSats while the National Aeronautics and Space Administration sponsored the remaining four,” Calvelli said.
Among the missions of the CubeSats are software-defined radios “to provide beyond-line-of-sight communication for disadvantaged users in remote locations, and technology pathfinders to demonstrate tracking technologies, optical communications, and laser communication,” he said.
Four advanced intelligence-gathering satellites will be launched this year to support military operations and intelligence analysis and decision-making.
Calvelli also said space threats are prompting the Reconnaissance Office to develop “better and faster” systems in space and on the ground, along with better overall “resiliency”—a term used by the military to signify an ability to operate during high-intensity warfare.
The agency is investing substantial sums in bolstering defenses for space and ground systems to make them more survivable during space war.
“We are more focused on survivability and resiliency from an enterprise perspective than we have ever been and we have made significant investments to that end,” he said.
The agency also is “improving the persistence of our space-based systems, providing greater ‘time on target’ to observe and characterize activities, and the potential relationship between activities, and to hold even small, mobile targets at risk,” Calvelli said.
It also is upgrading its ground stations, which are used to control and communicate with orbiting satellites, including an artificial intelligence system called “Sentient.”
“Sentient—a ‘thinking’ system that allows automated, multi-intelligence tipping and cueing at machine speeds—is just one of those capabilities,” Calvelli said.
New ground stations also are being deployed that will empower “users of all types with the capabilities to receive, process, and generate tailored, timely, highly-assured, and actionable intelligence,” he said.
The comments were a rare public discussion of the activities of one of the most secret U.S. intelligence agencies.
Dyke D. Weatherington, director of unmanned warfare and intelligence, surveillance, and reconnaissance at the Pentagon, said eight national security satellites were launched in 2015, including tactical and strategic communications, and navigation, position, and timing satellites.
Weatherington said the United States maintains a strategy advantage in space system but warned that is changing. “The rapid evolution and expansion of threats to our space capabilities in every orbit regime has highlighted the converse: an asymmetric disadvantage due to the inherent susceptibilities and increasing vulnerabilities of these systems,” he said.
While space threats are increasing, “our abilities have lagged to protect our own use of space and operate through the effects of adversary threats,” Weatherington said.
The Pentagon currently has 19 military-capable GPS satellites on orbit and a new generation of GPS satellites is being developed that will be produce signals three times stronger than current system to be able to overcome electronic jamming, he said.
The officials at the hearing also discussed plans to transition from the sole reliance on the use of Russian-made RD-180 rocket engines to launch national security satellites.
A new U.S. made engine, however, will not be fully developed until 2022 or 2023.
Time: U.S. forces killed another to ISIS leader this week, but experts say removing top officials won’t be enough to take the terror organization down.
The U.S.-led coalition against ISIS confirmed the death on Tuesday of one of the group’s biggest operatives, Omar al-Shishani. The Georgian national, who is also known as Omar the Chechen, is believed to have died from injuries sustained in a U.S. airstrike earlier in March.
But while killing top ISIS officials is sure to negatively affect the organization, it’s unlikely to be decisive. Patrick Skinner, special projects director of the Soufan Group, a private intelligence firm based in New York, says that ISIS has become so large that, like al-Qaeda, killing even its top leader won’t bring it down. “They are not going to fall apart if they lose one person,” Skinner says.
The assassination campaign has also been a victim of its own success. ISIS has filled the roles of slain leaders who, like Shishani, have been targeted during airstrikes over the past few months. But according to Skinner, the replacements won’t be announced because doing so would cause “that person to become a target.”
That said, experts have identified other top ISIS leaders who remain on the coalition’s hit list. Still at large are:
Abu Bakr al-Baghdadi
The group’s leader and self-proclaimed caliph has played an instrumental part in creating and gathering new supporters for ISIS. The shadowy figure, who has a $10 million bounty on his head, has revealed little about himself, reportedly wearing a mask while addressing fighters. He is thought to be 44 years old. Compared to Shishani, who was a decorated military man, al-Baghdadi “is not the main military figure in ISIS,” according to Omar Ashour, a lecturer in security studies at the University of Exeter and an associate fellow at Chatham House. Instead, Ashour says the ISIS leader’s strengths lie in theology—al-Baghdadi received a PhD in Islamic studies—while also symbolizing the successes of ISIS’s expansion from Mosul in Iraq to Aleppo in Syria. His skill at warping Islam for his own ends have enabled ISIS to recruit thousands members and helped justify the group’s trademark atrocities in the eyes of some believers.
Abd al-Rahman Mustafa al-Qaduli
This senior ISIS operative was one of the oldest members of al-Qaeda in Iraq (AQI), an al-Qaeda offshoot started by the notorious Abu Musab al-Zarqawi, who masterminded the Sunni insurgency in Iraq and created the foundation of what would become ISIS. Al-Qaduli, like al-Baghdadi after him, served as al-Zarqawi’s right-hand man before Zarqawi was killed in an airstrike in 2006. In 2012, al-Qaduli allegedly escaped from prison and joined the early iteration of ISIS, since becoming a second-in-command to al-Baghdadi. According to the BBC, he is alleged to have acted as ISIS’s leader when al-Baghdadi was wounded in an airstrike in March. There has been an unconfirmed report of his death during an airstrike in Tal Afar, Iraq, but the Department of Justice continues to offer up to $7 million for any information his whereabouts. “Many allege that he is one of the main figures of ISIS,” says Ashour of al-Qaduli. “He is certainly the most experienced.”
Abu Mohammed al-Adnani
The 38-year-old Syrian from the northwestern city of Idlib became the senior spokesman for the group in 2014. According to CNN, it is believed he spent time in a U.S. detention facility, Camp Bucca, between 2005 and 2010, and he was also the first to declare ISIS’s “caliphate” for areas in Syria and Iraq. The charismatic spokesperson is also known for his bombing campaigns against Iraqis and the expansion of ISIS into Syria, reports the Associated Press. Iraq officials say al-Adnani was wounded in an Iraqi airstrike in January, but the Syrian still has a $5 million bounty on his head. “He would be a top target,” says Skinner, of the Soufan Group, who explains that Adnani’s role as “a really effective press secretary” would have given him access to unreleased operational details of ISIS. “He is a guy you want to capture because he is clearly plugged in, he has access (al-)Baghdadi,” Skinner adds.
Zelin: Since the Islamic State of Iraq and al-Sham (ISIS) shot into the news after its takeover of Mosul, many have been confused
over how to describe the group in relation to al-Qaeda,1the global jihadist organization best known for its audacious terror attacks against the West from the late 1990s through the mid-2000s. Relations between ISIS—and its prior incarnations, to be discussed—and al-Qaeda have been fraught with distrust, open competition, and outright hostility that have grown over time. The two groups are now in an open war for supremacy of the global jihadist movement. ISIS holds an advantage,2 but the battle is not over yet.
Background
Both Abu Musab al-Zarqawi, who founded Jamaat
al-Tawhid wa-l-Jihad ( JTWJ) in 1999 (see Table 1
for the history of ISIS names), and al-Qaeda head
Usama bin Laden came of age during the Afghan
jihad against the Soviet Union in the 1980s, but their
respective organizations have distinct genetic material,
attributable in part to their different backgrounds,
leadership styles, and aims. This is the case even
though the two groups formed a marriage of convenience
beginning in 2004.
One key difference involves the socioeconomic
background of the groups’ founders. Whereas bin
Laden and his cadre grew up in at least the upper
middle class and had a university education, Zarqawi
and those closest to him came from poorer, less
educated backgrounds. Zarqawi’s criminal past and
extreme views on takfir (accusing another Muslim
of heresy and thereby justifying his killing) created
major friction3 and distrust with bin Laden when the
WASHINGTON — House Speaker Paul Ryan (R-WI) issued the following statement on House passage of H. Con. Res. 121 and H. Con. Res. 75, which condemn the atrocities committed by Syrian President Bashar al-Assad and ISIS:
“What is happening in Iraq and Syria is a deliberate, systematic targeting of religious and ethnic minorities. Today, the House unanimously voted to call ISIS’s atrocities what they are: a genocide.We also will continue to offer our prayers for the persecuted.”
NOTE: A congressionally mandated deadline of Thursday, March 17 requires the Obama administration to judge whether ISIS is perpetrating a genocide. The State Department must also assess whether the Assad regime has committed war crimes and crimes against humanity.
FNC: Having driven the last Christian out of Mosul, ISIS has now released a chilling video showing a bonfire consuming a huge pile of Bibles and other Christian literature.
The video, entitled “Diwan of education destroys Christian instruction books in Mosul,” was made by ISIS’ “morality police,” the infamous Diwan Al-Hisbah, according to Christian Today. It comes as the U.S. is deliberating over whether to label the terrorist group’s actions in Iraq as genocide, a term that has important ramifications under international law.
“It’s another example that ISIS means what they say,” David Curry, CEO of Open Doors USA, told FoxNews.com. “That’s what makes the debate so powerful. They want elimination and they are very serious.”
While ISIS has killed, enslaved and displaced hundreds of thousands of Iraqi Christians, the destruction of religious materials could also be part of a genocide determination.
The House voted unanimously Monday to approve a resolution branding ISIS’ actions as genocide, which the UN Convention on the Prevention and Punishment of Genocide defines in part as “acts committed with intent to destroy, in whole or in part, a national, ethnical, racial or religious group.”
‘This has always been genocide.The west has realized that they cannot deny it any longer.”
– David Curry, Open Doors USA
The State Department is under pressure to reach the same conclusion, which could obligate the U.S. to take action.
The video first surfaced last week and shows ISIS militants piling hundreds of books with crosses printed on the cover into a large fire at an unknown location in the northern Iraqi city.
“This video is the first specifically showing the burning of Christian books,” officials for the Jihad and Terrorism Threat Monitor team for the Middle East Media Research Institute said in a statement to FoxNews.com.
“It is in line with ISIS’ treatment of Christians, which MEMRI regularly monitors in ISIS publications. There is not any particularly new or recent trend in regard to ISIS’s treatment of Christians, which has been consistent in its statements and actions since ISIS declared its caliphate in 2014.”
Mosul, long considered a haven for Iraq’s Christian population, was overrun by militants in 2014. After the takeover, ISIS demanded that Christians convert to Islam, pay a tax known as a jizya, or flee the city. Although Mosul was once considered a center of Christianity in the region, all Christians are believed to be gone from the city.
http://www.foxnews.com/us/2016/03/15/bible-bonfire-isis-video-shows-christian-books-being-destroyed-adds-fuel-to-genocide-debate.html?intcmp=hpbt3
The Christian population of Iraq has dropped from 1.5 million to 275,000 since ISIS established its caliphate.
“The stated purpose [of ISIS] to eliminate and force the Christians and Yazidi people out of the region,” Curry said. “They are succeeding. The Christian population in the region has greatly diminished.”
If U.S. Secretary of State John Kerry determines their actions amount to genocide, the UN could be forced to address the issue.
“This has always been genocide,” Curry told FoxNews.com. “The West has realized that they cannot deny it any longer.”