An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation
Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.
Marquez-Complaint-Charging-Document-12-17Enrique Marquez, the friend of terrorist Syed Rizwan Farook, was arrested Dec. 17 and charged with conspiring to give material support to a terrorist plot, according to a charging statement released by federal officials.
Marquez, 24, was also charged in federal court with making a false statement in connection with the acquisition of firearms used in the attack, the Justice Department announced.
These charges are the first to stem from what became a sprawling global investigation into the Dec. 2 massacre at an office holiday gathering, a probe that has remained focused on the man who once lived next door to one of the attackers.
Syed Rizwan Farook and Tashfeen Malik, a married couple with a young baby, killed 14 people and wounded 21 others in what authorities said was a terrorist attack. The couple died in a shootout with police hours later.
Officials say that Marquez and Farook, former neighbors, had discussed mounting a attack in 2012, a year before the FBI says Farook and his future wife began corresponding online about waging violent jihad.
The FBI arrested Marquez on Thursday and he is expected to make his first court appearance in Riverside, Calif., later in the day.
“While there currently is no evidence that Mr. Marquez participated in the Dec. 2, 2015 attack or had advance knowledge of it, his prior purchase of the firearms and ongoing failure to warn authorities about Farook’s intent to commit mass murder had fatal consequences,” U.S. Attorney Eileen M. Decker of the Central District of California said in a statement.
Authorities also said Thursday that in addition to buying the guns used by the husband-and-wife attackers, Marquez had bought explosive material used to construct the pipe bomb authorities found at the Inland Regional Center after the shooting attack.
Marquez and Farook were friends who fixed up cars together and were also connected through marriage. Last year, Marquez married Mariya Chernykh, and her sister Tatiana is married to Farook’s brother, a Navy veteran named Syed Raheel Farook. A co-worker of Marquez said the marriage to Chernykh was arranged and described it as strained.
Marquez has also told the FBI that he and Farook talked about mounting some kind of attack in 2012, according to senior U.S. law enforcement officials. But he said said they were scared off after a terrorism investigation in Riverside, Calif., that year ended with four local men arrested for plotting to kill Americans in Afghanistan. The men were convicted and sentenced to prison.
Authorities say Marquez legally purchased two assault rifles in 2011 and 2012 that were eventually used in the massacre this month at the Inland Regional Center. California law states that transferring gun ownership from one person to another must be done by a registered dealer. Exemptions include transfers from a parent to an adult child or transfers between spouses.
Some Democratic lawmakers responded immediately with vows to push legislation to tighten gun trafficking laws.
“We must do everything we can to ensure that deadly weapons – like the rifles used in the San Bernardino shootings – do not fall into the hands of terrorists, violent criminals, and drug traffickers,” Sen. Patrick Leahy (D-Vt.), ranking member of the Judiciary Committee, said in a statement. “Law enforcement officials have complained for years that they lack effective tools necessary to investigate and deter straw purchasers and gun traffickers. Today’s arrest of the individual who provided the rifles for the San Bernardino shooters is a reminder that we need to strengthen our laws to give law enforcement agents and prosecutors the tools they need to fight terrorism and violent crime.”
Leahy said he would reintroduce legislation to make straw purchasing a federal crime and establish tough penalties for those who traffic guns to terrorists and criminals.
Law enforcement authorities searched Marquez’s home three days after the shooting. At the time, Marquez was not charged with a crime, and officials said he was cooperating with the investigation. He had checked himself into a mental-health facility in the aftermath of the shooting, but has cooperated with the FBI after he was tracked down.
Two days before his Riverside home was raided, Marquez had posted a garbled message on Facebook: “I’m. Very sorry sguys. It was a pleasure.” When he didn’t show up for work the next day as a doorman at a pirate-themed neighborhood bar, his co-workers began to worry that he may have become suicidal. Much more detail here.
Obama’s comments come as Sudanese militant Ibrahim al-Qosi — who was released in 2012 — seemingly appeared in a recent video by Al Qaeda in the Arabian Peninsula.
“The judgment that we’re continually making is, are there individuals who are significantly more dangerous than the people who are already out there who are fighting?” Obama said.
“What do they add? Do they have special skills? Do they have special knowledge that ends up making a significant threat to the United States?”
“And so the bottom line is that the strategic gains we make by closing Guantanamo will outweigh, you know, those low-level individuals who, you know, have been released so far.”
The Republican-controlled Congress has thwarted Obama’s repeated efforts to close Guantanamo.
Obama came to office in 2009 vowing to shutter the facility, which opened under his predecessor George W. Bush to hold terror suspects after the September 11, 2001 attacks and became known for harsh interrogation techniques that some have said were tantamount to torture.
Obama is soon expected to put forward a new plan that would speed the release of inmates and transfer the most dangerous ones to US soil.
The plan is likely to accelerate the release of low-level detainees to foreign countries and move the most dangerous prisoners to a specialized facility in the United States.
Because of a congressional ban on funding US transfers, Obama has suggested he may have to resort to an executive order to close the prison. This would ignite a political and legal firestorm.
Obama also told Yahoo News that he “very much” hopes to travel to Cuba before leaving office a little over a year from now.
The United States and Cuba restored diplomatic ties this summer, ending a half-century of enmity stemming from the Cold War era.
Obama reiterated previous White House comments that some progress would need to be seen on human rights before any presidential trip.
Obama said he would go when aides could determine “now would be a good time to shine a light on progress that’s been made, but also maybe (go) there to nudge the Cuban government in a new direction.”
NYT’s: WASHINGTON — The Obama administration appears to be on the cusp of the largest round of transfers of Guantánamo Bay detainees in a single month since 2007, a move that could reduce the detainee population there to as low as 90 by mid- to late January, according to officials familiar with internal deliberations.
Defense Secretary Ashton B. Carter has notified Congress in recent days that he has approved 17 proposed transfers of lower-level detainees, said the officials, who spoke on the condition of anonymity to discuss matters that have not yet been made public. Congress has required Mr. Carter to certify that security standards have been met at least 30 days before any transfers.
President Obama wants to close the Guantánamo prison in Cuba before he leaves office in a little over a year. His administration has stepped up efforts to find countries to take 48 detainees on a transfer list and moved to speed up the work of a parole-like board that might approve the release of others who are currently recommended for indefinite detention.
The Republican-led Congress, however, has shown little interest in lifting a ban on bringing any detainees to a prison inside the United States, which is Mr. Obama’s plan for those who are either facing trial or are deemed too dangerous to release.
But even as the administration seems to be trying to speed up its fitful effort to winnow down the Guantánamo population, the military is taking steps that will curtail journalists’ access to the wartime prison.
The commander who oversees the military base, Gen. John F. Kelly, has created new rules that will limit reporters to four “media day” trips a year in which large groups will come and depart the same day. Reporters will generally no longer be permitted to go inside the prison camp’s walls.
In a telephone interview, General Kelly connected his decision “to tighten things up a little bit, particularly on the scheduling” for news media visits, in part to what he described as a sharp rise in visits by delegations from foreign governments that are considering resettling detainees.
The operational strains of handling such visitors, he said, formed the backdrop to an episode in October that focused his attention on rules for visits. He said that a journalist, whom he would not identify, was “extremely impolite” during an interaction with a service member who worked at a detainee library.
All that, he said, prompted him to fix what he saw as a problem before his designated successor, Vice Adm. Kurt Tidd, who is awaiting a Senate confirmation vote, takes over.
Until now, the military has generally permitted small numbers of reporters to visit the prison throughout the year if no military commission hearing is going on. The reporters have flown to the base on a Monday and flown out the following Thursday.
Reporters have spent that time on a tour that included walking through the two camps that hold lower-level detainees. While reporters have never been permitted to speak to the detainees, they have seen them from afar, talked to the officers in charge of each camp, interviewed the senior medical officer in the detainee clinic and interviewed lower-ranking guards.
General Kelly said he decided it would be easier for everyone if groups of reporters came to the base only during quarterly “media days,” in which they could talk to a handful of officials like the joint task force commander and the military’s cultural adviser, and then leave that same day.
The general said he no longer wanted reporters to talk to lower-level guards because it was not their role to opine about detention operations, or to go inside the prison because that could cause disruptions. However, he said, depending on what else is going on, exceptions might be made to let first-time visitors inside.
Several news media outlets, including The Times, have asked the military to reconsider. Dave Wilson, a senior editor at The Miami Herald who oversees its coverage of Guantánamo, said he had told the military that it was important for experienced beat reporters to keep going inside the prison.
“A first-timer doesn’t know what they are seeing because they are seeing it for the first time,” Mr. Wilson said. “They don’t know if something has changed. They don’t know if it’s better or worse.”
NDTV: London: Hackers in Britain have claimed that a number of ISIS supporters’ social media accounts are being run from internet addresses linked to the UK government’s Department for Work and Pensions (DWP).
A group of four young computer experts, who call themselves VandaSec, have unearthed evidence indicating that at least three ISIS-supporting accounts can be traced back to the DWP’s London offices, the ‘Daily Mirror’ reported.
Every computer and mobile phone logs onto the internet using an IP address, which is a type of identification number. The hacking collective showed the newspaper details of the IP addresses used by three separate so-called “digital jihadis” to access Twitter accounts, which were then used to carry out online recruitment and propaganda campaigns.
At first glance, the IP addresses seem to be based in Saudi Arabia, but upon further inspection using specialist tools they appeared to link back to the DWP.
The newspaper learned that the British government had sold on a large number of IP addresses to two Saudi Arabian firms.
After the sale completed in October of this year, they were used by extremists to spread their message of hate.
A Cabinet Office spokesperson said: “The government owns millions of unused IP addresses which we are selling to get a good return for hardworking taxpayers.
“We have sold a number of these addresses to telecoms companies both in the UK and internationally to allow their customers to connect to the internet. We think carefully about which companies we sell addresses to, but how their customers use this internet connection is beyond our control.”
The UK government has not revealed how much money it has made from the sale of IP addresses.
Following the terrorist attacks in Paris and San Bernardino, Calif., FBI Director James Comey revealed to the Senate Judiciary Committee that one of the two Islamic State-inspired shooters in the May 3 attack in Garland, Tex., “exchanged 109 messages with an overseas terrorist” the morning of the attack. He followed up by saying that the FBI was unable to read those messages. His implication? Better regulation of message-disguising encryption technology could have revealed the shooters’ plans earlier and could help prevent attacks.
However, regulation of encryption is unlikely to provide the government with the counterterrorism benefit it says it will. Jihadists’ main tool for planning and executing attacks in recent years has been social media — to which the government has full access — not encrypted messaging. In addition, regulation of one messaging technology will lead to immediate adaptation and the creation of ways to circumvent it.
In recent years, smartphones and social media have enabled users from around the world to communicate easily, safely and free of charge. Programs facilitating such communications sprouted, and jihadists — the Islamic State in particular — quickly adopted them as their main means of communication. For over three years, Twitter has been the Islamic State’s most important platform. High-level operatives within the group have used Twitter’s unencrypted direct messaging to recruit, give instructions for donating and plan attacks. Jihadists even rely on Twitter to promote their channels on other platforms, such as Telegram, which supporters would otherwise have difficulty finding.
Jihadists’ presence on social media has also spread the Islamic State around the world, with people of all ages, sexes and ethnicities leaving their families and friends to join the group. Social media use has been linked to executed and attempted lone-wolf attacks in the United States, Canada, Australia, France, Denmark and other Western nations.
The Garland, Tex., shooting — the only example Comey used as an impetus to regulate encrypted technology — in fact makes the opposite point. Attacker Elton Simpson, who was under previous FBI terror-related investigations, used Twitter to openly follow and communicate with high-profile terrorists. His account was followed by prominent English-speaking Islamic State fighters and recruiters Abu Rahin Aziz and Junaid Hussain — both of whom for a long time were known to provide manuals on how to carry out lone-wolf attacks from Raqqa, Syria, before they were killed. Simpson also followed and communicated with Mohamed Abdullahi Hassan, a known American jihadist in Somalia who pledged allegiance to the Islamic State.
Relatedly, the incitement for the Texas shooting came from Hassan’s 31st Twitter account. Simpson, a friend and follower of Hassan, retweeted the call and later requested that Hassan send him a direct message. We at SITE, using only open-source information, reported on the call before the attack took place, and the FBI had a week to investigate the matter before the shooting. Though only nine Twitter users retweeted the call for attack, the FBI failed to prevent it.
The encrypted messages Comey mentioned before the Judiciary Committee were discovered by the FBI only after the attack took place, but Simpson’s open-source communication was available far in advance. There is in fact no evidence that this or any of these other lone-wolf attacks could have been prevented by regulation of encryption technology.
In stark contrast, a proper, targeted open-source investigation could have. Yet the FBI is reluctant to recognize open-source as an important — arguably the most important — tool to track jihadists online.
It’s also important to note that jihadists are very quick to adapt online. In the past year alone, the Islamic State and al-Qaeda fighters have moved quickly from WhatsApp to Kik, Wickr, Surespot, then to Telegram – all different encryption programs created to give smartphone users safe and free text messaging available across multiple devices. Jihadists are constantly ranking, debating and explaining which of the services is the safest and most effective. Regulation of these programs will take jihadists next to no time to circumvent; the U.S. government would be the one taking years to catch up. And even if successful, they may be able to regulate companies based in the United States, but such programs would appear everywhere else, from Russia to India to China
SITE’s leadership and continued success do not stem from access to secret databases. Our research, investigations and reporting are based on open-source information — social media, forums, websites, blogs, IP addresses — which can be immensely powerful if used wisely. Government agencies, however, seem blind to this bountiful intelligence resource, and too often rely solely on classified documents and back-end access to websites.
Rather than try to create backdoors to encrypted communication services, or use the lack thereof as an excuse to intelligence failures, the U.S. government must first know how to utilize the mass amount of data it has been collecting and to improve its monitoring of jihadist activity online. A focused approach of this sort is much more likely to lead to success in the war on terrorism.
https://www.indiegogo.com/projects/fallen-angel-shoot-down-of-seal-team-six#/ DONATE HERE
AirandSpaceMagazine: A few minutes past 2 a.m. on August 6, 2011, at a dusty forward operating base 40 miles south of Kabul, Afghanistan, the rotors of two U.S. Army CH-47D Chinooks began to turn. Operating with no lights save for the faint green glow of night vision goggles and cockpit instrument panels, the two helicopters, call signs Extortion 17 (“one-seven”) and Extortion 16, lifted into the darkness and accelerated toward a destination less than 20 miles west.
Extortion 17 and its 38 occupants would not return. A Taliban fighter shot the helicopter out of the sky with a rocket-propelled grenade and all aboard were killed—the single greatest loss of American life in the Afghan war. Those killed ranked among the world’s most highly trained and experienced commandos, including 15 men from Gold Squadron of the Naval Special Warfare Development Group, popularly called SEAL Team 6. Just three months earlier, members of a counterpart SEAL Team 6 squadron successfully raided a compound in Abbottabad, Pakistan, and killed Osama bin Laden. In light of that raid’s success, the shootdown of Extortion 17 incited a flurry of conspiracy theories: The Taliban were tipped off; it was a trap; it was retribution for the killing. No evidence has emerged to support any of these claims. Instead, two rigorous U. S. military investigations followed every moment of the mission to determine what went wrong on Extortion 17’s final flight.
The mission had begun about four hours prior to the shootdown, when the two helicopters touched down side by side in Juy Zarin, a village in the bare rock-walled Tangi Valley of Wardak Province. As two U.S. Army AH-64 Apache attack helicopters, an Air Force AC-130 gunship, and a small fleet of unmanned surveillance aircraft orbited overhead, a platoon of the 75th Ranger Regiment and members of an Afghan special operations unit stormed down the rear ramps of the Chinooks and into the night. Their target: an Afghan named Qari Tahir and his group of fighters. Intelligence had revealed Tahir to be the senior Taliban chief of the Tangi Valley region, with probable ties to upper-echelon Taliban leadership in Pakistan. As the ground assault force rushed toward Tahir’s compound, Extortion 17 and 16 sped back to base, where they were refueled, and awaited word to extract the team, evacuate wounded, or race reinforcing troops to Juy Zarin.
When the two Chinooks had first touched down in the village, a group of eight fighters armed with AK-47 rifles and RPG-7 rocket-propelled grenade launchers bolted from the compound. One AH-64 crew, after identifying the men as enemy combatants, fired on them with their gunship’s 30mm cannon, killing six. The remaining two fighters ducked into a stand of trees and disappeared from the Apaches’ infrared scanners. Three hours after disembarking from the Chinooks, the assault force had secured the compound and detained a number of Tahir’s men, but they hadn’t found Tahir himself. Through sensors on manned and unmanned aircraft, U.S. forces observing the mud walls and terraces of the village saw new groups of fighters gathering and maneuvering. Mission commanders, believing that Tahir was likely among one of the groups, deployed an Immediate Reaction Force (IRF) to interdict them while the Rangers held the compound. Planners then chose a new landing zone for the IRF, but it was large enough to accommodate only one Chinook.
Faced with the possibility of confronting nine or 10 Taliban fighters, planners increased the reinforcement team from 17 to 32 men, formed around the 15-man SEAL group. The IRF also included two SEALs from another team, five Navy special operations support personnel, three Air Force special tactics airmen, seven Afghan National Army commandos, a translator, and a combat assault dog. The IRF commander then made a critical decision: In order to get everyone on the ground as quickly as possible and deny the Taliban time to react, he ordered the entire force to fly in Extortion 17. Extortion 16 flew empty.
Commanders frequently request CH-47 Chinooks to insert troops. The helicopters are capacious and fast, and they can perform well in Afghanistan’s performance-degrading high altitudes and heat. U.S. Special Operations Command possesses its own specialized Chinooks—MH-47s—flown by the ultra-secretive 160th Special Operations Aviation Regiment, the “Night Stalkers.” The MH-47s’ modifications include inflight refueling probes, additional and upgraded sensors, more powerful engines, and more powerful defensive weapons than their conventional counterparts. Night Stalker pilots and crew rigorously train for nighttime raids, like the one in Juy Zarin.
Extortion 17 and 16 weren’t MH-47s and their crews were not Night Stalkers. The mission was flown by conventional pilots flying unmodified CH-47Ds. “It’s a math problem. There are more operations than can be supported by the 160th at any given time,” says Major Matthew Brady, a former 160th pilot and company commander.
The pilots and crew of Extortion 17, however, had ideal experience and abilities for the mission that night. At the flight controls were David R. Carter of the Colorado Army National Guard and copilot Bryan J. Nichols, a Kansas-based Army reservist. Nichols had deployed three times to combat zones, and Carter, with more than 4,000 hours of flight time, was one of the most experienced helicopter pilots in the U.S. military. He was also an instructor at the High Altitude Army National Guard Aviation Training Site (see “Triple Threat: High, Hot, and Heavy,” Aug. 2014), where many U.S. and foreign helicopter pilots train for mountainous and high-altitude flying, often before deployment to Afghanistan.
During a previous deployment to Iraq, Carter’s unit flew dozens of similar raids, which he often planned and led, and gained a reputation for working well with special operations troops. “Our area of operation was the entire country of Iraq, and every mission was at night,” says David “Pat” Gates, a pilot with Carter’s unit , the 2nd Battalion, 135th Aviation Regiment (2-135th), a Colorado Army National Guard unit based in Aurora, Colorado. “We were on goggles the whole time. We were supporting special operations, but not to the degree of the 160th. We didn’t do fast-rope inserts, building insertions, or anything like that.” Subsequent to their Iraq deployment, the unit flew the SEALs of Team 6 on practice raids around Fort Carson, Colorado, and during nighttime urban training in Denver, further cementing the 2-135th’s reputation with special operations units. At the time of the Juy Zarin raid, the battalion had been flying in Afghanistan for about two weeks.
Flying to the Tangi Valley for the second time, Extortion 17 and 16 took a different route, approaching from the northwest instead of the south. Six minutes from their estimated landing time, Extortion 16 broke away from the lead Chinook and orbited at a location close enough to help if needed. Extortion 17 sped alone toward the landing zone.
For helicopter crews in Afghanistan, the most dangerous times are landing and taking off. Approaching to land or having just taken off, the craft is flying slow and low, so it presents a tempting target. But even a precisely aimed shot fired from an unguided weapon by a seasoned fighter is subject to the ballistics-altering whims of atmospheric variation, subtle and undetected flaws in launcher or projectile, and uncontrollable environmental factors such as wind gusts, large temperature variations, or even particulates in the air.
“There are a lot of bullets out there that say ‘To whom it may concern,’ ”says Major Doug Glover, a U.S. Marine F/A-18D weapons and sensors operator who was a senior watch officer for the Marine air operations center in southern Afghanistan. “The RPG is not a laser. It does not fly in a straight line, and there is no way to know what exact path it will take—just a fairly good idea of its trajectory.”
Sometimes the enemy succeeds in delivering one of these “To whom it may concern” projectiles. In July 2010, an RPG-wielding fighter put a round into the tail boom of a Marine AH-1W Super Cobra, downing it and killing both pilots. In June 2005, a rocket-propelled grenade connected with the rear transmission of a 160th MH-47E Chinook as it attempted to come to a hover, downing it; all 16 on board were killed. In March 2002, two MH-47s were downed by machine gun and rocket-propelled grenade fire while close to ground level. “What we saw is that if the enemy knew where you were going to attack, they would back some guys with RPGs off 500 meters or so, to shoot during an ingress,” Glover explains.
***
Now deep in the Tangi Valley, their night vision goggles showing the world around them in greenish hues, the IRF team members readied to hit the ground running as the pilots slowed Extortion 17 and descended toward the village. At 2:36 a.m., Extortion 17 requested an infrared spotlight, visible only through night vision goggles, to illuminate the landing zone. The crew of Slasher 02, the AC-130 circling above, flipped the switch on their powerful light. “Burn is on,” they radioed. Through the goggles, the landing zone shone brilliantly. Carter and Nichols continued the descent. “LZ is ice,” transmitted one of the Rangers on the ground, indicating the landing zone was free of enemy activity.
Seconds later, with the Chinook just over 100 feet off the ground and traveling at 58 mph, two or three previously unseen fighters emerged from the tower of a two-story building roughly 220 yards south of the helicopter, shouldering RPG launchers. They may have seen Extortion 17 and its landing zone through their own night vision goggles or simply aimed by sound alone. Two fired at roughly the same time. The first round sailed past the helicopter. The second slammed into one of the Chinook’s rear rotor blades and exploded, severing 10 feet of it. The torque of the spinning rotor assembly, now catastrophically imbalanced, ripped the rear pylon off the Chinook’s fuselage. The forward rotor system then tore off, stressed by the imbalance and the strain of carrying what would normally be a shared load. Less than five seconds after the RPG round hit, the helicopter spun uncontrollably, plummeting into a dry creek bed and erupting in a ball of fire that killed all on board.
The United States military continually works to improve protection for transport helicopters and their occupants, according to Glover and Brady. One of the most significant tactical evolutions of the Afghanistan conflict is the ever-heavier use of unmanned aerial systems and other airborne intelligence-gathering systems. Capable of loitering overhead for hours undetected, small fleets of unmanned craft passed imagery to mission planners before and during the raid at Juy Zarin, allowing them to recognize individual fighters, learn their habits, pinpoint where they slept, and identify the types of weapons they carried.
But U.S. forces didn’t know about every fighter during the raid, and they lost track of at least two—one of whom fired the deadly shot. Since the shootdown of Extortion 17, the military has continued to gain vital experience and equipment to enable an ever greater understanding of an enemy force, aiming to know every combatant and potential combatant and his weapon system before a raid. According to Glover, improved systems in place enable U.S. forces to monitor a target for days or even weeks prior to an operation, so they theoretically will know of even well-hidden potential RPG shooters throughout a village before transport helicopters first touch down.
The military has worked diligently to more tightly integrate gunship escorts with transport craft, according to Brady. While classification veils the specifics of these tactics, particularly for special operations raids, manned gunships can detect potential threats through a range of sensors and immediately attack if needed. Another tactic sometimes employed by gunships, according to Glover, is a show of force, in which pilots and crew fire into an empty field or stand of trees just before a transport helicopter prepares to land, using the sound of a gun alone to keep enemy heads down and fingers off triggers.
The two military investigations, one conducted by United States Central Command and one by the multi-service Joint Combat Assessment Team, pored over the details of the crash with excruciating focus and concluded that no planners or participants bore any fault regarding the circumstances leading to the shootdown of Extortion 17. Though both noted that airborne sensor coverage and closer AH-64 gunship escort should be considered in future operations, nothing could have kept the shooters from firing their RPGs that night. The Joint Combat Assessment Team report further noted that despite a robust deck of intelligence, surveillance, and reconnaissance assets, none identified the location from which the shooters fired prior to the helicopter downing.
The shooters’ origin remains a mystery. The two may have been those who escaped Apache cannon fire, or they may have split away from either of the groups that formed after the start of the raid. The duo may also have had no ties to Tahir or any of his suspected fighters, and attacked the helicopter on their own. Should the Apache pilots have fired into the stand of trees after the two fighters ducked out of sight? Should the Apaches, or the AC-130 overhead, have fired upon the groups of suspected Taliban that gathered in the village after the raid began?
Restrained by strict rules of engagement in force at the time, the helicopter crews could not have fired without a strong indication of hostile intent. Afghanistan has long been a counter-insurgency campaign: The United States’ strategy has been to win Afghan trust through cooperation and aid. Having studied and directly observed the counter-insurgency campaign in Afghanistan, I’ve watched commanders and individual American troops consistently lean far to the side of restraint to encourage Afghans to side with American interests long after U.S. forces have left. Because unarmed villagers, unaffiliated with the Taliban, could also have been in those trees and among the groups milling about the village, the gunships could not have fired. Following a “scorched earth” tactic may have killed the two shooters—and possibly a greater number of innocents—prior to Extortion 17’s return that night, but counterinsurgency doctrine dictates that such tactics lead to potentially far worse long-term consequences.
With a keen understanding of the propaganda value of downing Coalition helicopters, the Taliban single them out as targets. Classified reports, published by Wikileaks, teem with notes from pilots and crew of all types of military helicopters who saw RPG attacks throughout the war. According to one Army report, in the three months prior to the Juy Zarin raid, as many as 17 RPGs were fired at helicopters over Wardak and Logar provinces, a relatively small part of the country. And while all military helicopters carry countermeasures for guided missiles, nothing can interdict the dumb luck of an unguided RPG round sailing through the air. The vast majority miss. “Chance is still part of the battlefield,” says Brady. “For every one that gets lucky, there are hundreds, even thousands, that zip by you.”
“As we’ve seen a number of times, there’s a point that a lucky shot is going to get you and there is only so much you can do to mitigate it,” says Glover, the Marine aviator. “To remove the risk of rocket-propelled grenades downing helicopters in Afghanistan 100 percent, you’d have to remove the opposable thumbs of every fighting-age male in the objective area, and that’s not how we win a counter-insurgency.”
FNC: The Obama administration cannot be sure of the whereabouts of thousands of foreigners in the U.S. who had their visas revoked over terror concerns and other reasons, a State Department official acknowledged Thursday.
The admission, made at a House oversight hearing examining immigrant vetting in the wake of major terror attacks, drew a sharp rebuke from the committee chairman.
“You don’t have a clue do you?” Rep. Jason Chaffetz, R-Utah, told Michele Thoren Bond, assistant secretary for the Bureau of Consular Affairs.
Bond initially said the U.S. has revoked more than 122,000 visas since 2001, including 9,500 because of the threat of terrorism.
But Chaffetz quickly pried at that stat, pressing the witness about the present location of those individuals.
“I don’t know,” she said.
The startling admission came as members of the committee pressed administration officials on what safeguards are in place to reduce the risk from would-be extremists.
At issue is how closely the U.S. government examines the background of people seeking entry to the country, including reviews of their social media postings.
Leon Rodriguez, director of U.S. Citizenship and Immigration Services, told committee members that such checks aren’t being done in an abundant manner, and he was not specific about when or how it would occur.
Lawmakers are trying to ascertain which safeguards are in place to ensure that extremists are not exploiting a variety of legal paths to travel to the United States.
One of the San Bernardino, Calif., shooters came to the U.S. on a K-1 fiancee visa last year despite the fact that the FBI believed she was already radicalized.
Tashfeen Malik came to the U.S. on a K-1 fiance visa in July 2014 and passed multiple background checks and at least two in-person interviews, one in Pakistan and another after she married Syed Farook. FBI Director James Comey has said Malik and Farook communicated privately online about jihad and martyrdom before they married.
Lawmakers at times angrily pressed officials on why even public social media wouldn’t routinely be looked at for vetting those trying to enter the country.
“If half the employers are doing it in the United States of America, if colleges are doing it for students, why wouldn’t Homeland Security do it?” said Rep. Stephen Lynch, D-Mass. “We don’t even look at their public stuff, that’s what kills me.”
DHS did launch three pilot programs specifically aimed at reviewing social media postings as part of the immigration vetting process.
“There is less there that is actually of screening value than you would expect, at least in small early samples, some things seem more ambiguous than clear,” Rodriguez told lawmakers Thursday. He said foreign alphabets frequently used in social media posts were a challenge to translate.
“We all continue to believe there’s a potential for there to be information of screening value … particularly in high risk environments,” he added.
Both DHS and the State Department are reviewing the process for vetting visa applications, including the K-1 program, and have been directed by the White House to create specific recommendations for improvements.
DHS is specifically reviewing policies on when authorities at U.S. Citizenship and Immigration Services can look at social media posts as part of the process for evaluating applications for certain visas.
“There are some legal limits to what we can do,” Homeland Security Secretary Jeh Johnson said Wednesday. He added that he thinks reviews of social media should be done more often, but did not provide specifics.
During his opening remarks Chaffetz, said: “It is unclear how someone who so openly discussed her hatred of our country and way of life could easily pass three background checks. We need to understand how the breakdown happened with Malik and what we are doing to make sure it doesn’t happen again.”
Lawmakers have also pressed for changes to the Visa Waiver Program, which allows many citizens from 38 countries to travel to the United States without being subjected to the in-person interview required to receive a visa. Many fear that foreign fighters who carry western passports will be able to exploit that system to travel freely to the United States.
Earlier this month the House voted overwhelmingly to tighten controls on that program and require visas for anyone who has been to Iraq or Syria in the last five years. Security changes to the program were also included in the Senate version of a massive spending bill expected to be approved later this week.
• To review the screening process for foreign nationals entering the United States, including the ability to review social media as part of the vetting process.
• To assess the likelihood of foreign nationals exploiting the U.S. immigration system and examine vulnerabilities within that system.
• This hearing is a follow-up to an Oversight Subcommittee hearing last week, where a Department of Homeland Security (DHS) official was unable to answer basic questions on the Agency’s ability to vet, track, and screen individuals who arrive in the United States.
BACKGROUND:
• Foreign nationals seeking to enter the U.S. must ordinarily obtain either an immigrant visa or a nonimmigrant visa. A third category of foreign nationals seeking entry into the U.S. are refugees, who enter under refugee status.
• An exception to the rule is the Visa Waiver Program (VWP), where an individual who seeks entry to the U.S. must apply for, and receive, a visa before entering the country. Currently, nationals of 38 countries can enter the U.S. without first obtaining a visa under the VWP.
• Under current law, two departments—the Department of State and DHS—play roles in administering the law and policies on immigration visas.
• In light of the attacks in San Bernardino, CA, Committee Chairman Jason Chaffetz (R-UT) and Subcommittee Chairman Ron DeSantis (R-FL) sent a letter to DHS seeking information relating Tashfeen Malik’s entry into the U.S. on a fiancée visa.
Witnesses and testimonies
Name
Title
Organization
Panel
Document
The Honorable Anne C. Richards
Assistant Secretary, Bureau of Population, Refugees, and Migration