Top Banner
 10  J UNE 2011 The PTSS Journal is a special service provided to gradu ates of the George C. Marshall European Center for Security Studies. This publication is produced under the direc tion of Professor Nick Pratt, Colonel, USMC, Retired. You may forward this e-mail provided that you forward it in its entirety. To subscribe to the journal or  to send us your comments  ,  please write us at : [email protected]  Linked Table of  Contents Thought for the Day Flash Points: Bitesized 'breaking' terrorism news, by country Top Headlines Special Counterterrorism News by Nation & Region: News articles and analysis, many with web links Afghanistan Algeria Bahrain Bangladesh Colombia Denmark France India Indonesia Iran Israel Libya Nigeria Pakistan Philippines Russia Saudi Arabia Serbia Somalia United States General Counterterrorism News Al Qa’idah & its Affiliates Aviation & Maritime Security Commentary & Opinion Legal Aspects & Lawfare NarcoTerrorism Network Notes Science and Technology Terrorist Financing WMD Terrorism Education: To continue a lifetime of  learning Events: Where to go next Counterterrorism Humor NOTE: If  you do not wish to receive this publication, please click on the link, below, to unsubscribe. “I no longer want to receive the PTSS Journal.” The views and comments expressed as well as the events and announcements contained within this newsletter are those of the authors and originators and do not necessarily reflect either the views of or endorsement by the Marshall Center, the U.S. Department of Defense, or the U.S. Government.
42

2011 September 8 - PTSS Journal

Apr 06, 2018

Download

Documents

bvg07
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 142

10 JUNE 2011

The PTSS Journal is a special service provided to graduates of the

George C Marshall European Center for Security Studies

This publication is produced under the direction of

Professor Nick Pratt Colonel USMC Retired

You may forward this e-mail provided that you forward it in its entirety

To subscribe to the journal or to send us your comments please write us at mcalumnimarshallcenterorg

Linked Table of Contents

Thought

for

the

Day

Flash Points Bite‐sized breaking terrorism news by country

Top Headlines

Special

Counterterrorism News by Nation amp Region News articles and analysis many with web links

Afghanistan

Algeria

Bahrain

Bangladesh

Colombia

Denmark

France

India

Indonesia

Iran

Israel

Libya

Nigeria

Pakistan

Philippines

Russia

Saudi Arabia

Serbia

Somalia

United States

General Counterterrorism News

Al Qarsquoidah amp its Affiliates

Aviation amp Maritime Security

Commentary amp Opinion

Legal Aspects amp Lawfare

Narco‐Terrorism

Network Notes

Science and Technology Terrorist Financing

WMD Terrorism

Education To continue a lifetime of learning

Events Where to go next

Counterterrorism Humor

NOTE If you do not wish to receive this publication please click on the link below to unsubscribe

ldquoI no longer want to receive the PTSS Journalrdquo

The views and comments expressed as well as the events and announcements contained within this newsletter are those of the authors and originators and do not necessarily reflect either the views of or endorsement by the Marshall Center theUS Department of Defense or the US Government

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 242

Thought for the Day| back to top |

ldquoThe past decade in Afghanistan has convinced many Americans of the folly of large-scale US militaryintervention The Pakistan experience shows that money often buys neither cooperation nor affectionThe United States still needs to find a way to get troops out of Afghanistan and a means to deal with awide range of enormous security challenges in Pakistan Americans should not kid themselves Enduringsuccess in Afghanistan and Pakistan remains essential but it is still a long ways offrdquo~Daniel Markey [For more please see ldquo911 Lessons Afghanistan and Pakistanrdquo under ldquoSpecialrdquo

Flash Points| back to top |

AFGHANISTAN An International Security Assistance Force (ISAF) soldier of undisclosed nationalitywas killed in an attack by unidentified militants in an unspecified area in the east of the country on 7September (Reuters)

PAKISTAN Two Pakistan International Airlines (PIA) passenger aircraft ndash one bound for the UK cityof Manchester and the other bound for Malaysia ndash were forced to perform emergency landings in theTurkish city of Istanbul and the Malaysian capital Kuala Lumpur respectively on 7 September after theairline received emailed bomb threats All passengers were safely evacuated from the aircraft and noviable devices were found onboard either during subsequent search operations (Al-JazeeraReuters)

KENYA At least seven civilians were killed and four others were wounded in a suspected sectarianattack by a group of unidentified tribal militiamen in the Marti area of Isiolo district in Eastern Provinceearly on 7 September (Daily Nation)

IRAQ A senior Awakening Councils commander identified as Sheikh Jassim al-Jubori was killed andone of his bodyguards was wounded in an improvised explosive device (IED) attack by unidentifiedmilitants east of the city of Baqubah in Diyala province on 7 September (Voices of Iraq)

INDIA Three people including an internet cafeacute owner identified as Mehmood Aziz were arrested bysecurity forces in the Kishtwar district of the state of Jammu and Kashmir late on 7 September onsuspicion of connection to an email allegedly sent by Harakat-ul-Jihad-ul-Islami (HUJI) claimingresponsibility for an IED attack on the High Court building in the capital New Delhi earlier that day thatkilled at least 12 people (Al-JazeeraBBC)

PHILIPPINES Two local village officials identified as Jose Pepito and Perlito de Leon were shot

dead by two unidentified militants on a motorcycle in the Tuburan area of Cawayan municipality inMasbate province late on 7 September (Philippines Daily Inquirer)

LIBYA In an audio message broadcast early on 8 September on the Syrian-based Al-Rai televisionstation Muammar Ghadaffi called on Libyans to take up arms against the National Transitional Council(NTC) and accused the organisation of being a front for Western interests in the country He also deniedspeculation that he had fled to neighbouring Niger (Al-JazeeraReutersBBC)

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 342

SYRIA At least 20 people were killed and 20 others were wounded when security forces loyal toPresident Bashar al-Assad ndash supported by tanks and armoured vehicles ndash launched a crackdown on aseries of anti-government demonstrations held in the Bab Dreib and Bostan Diwan districts of the city of Homs in Homs governorate on 7 September (Al-JazeeraBBCReuters)

ISRAELGAZA AND THE WEST BANK A suspected member of the Al-Quds Brigades the armedwing of Palestinian Islamic Jihad (PIJ) identified by the group as Remah Fayez Al-Husseni was killedand two others were wounded in an Israeli air strike targeting their vehicle west of the town of Deir el-Balah in the centre of the Gaza Strip late on 7 September (Maan News AgencyReuters)

UNITED STATES The Department of the Treasury announced on 7 September that three men itsuspected of links to Al-Qaeda ndash identified as Libyan-born Abu Yahya al-Libi Saudi-born Mauritaniannational Abu al-Rahman Ould Muhammad al-Husayn Ould Muhammad Salim and Pakistani nationalMustafa Hajji Muhammad Khan ndash had been added to its list of designated terrorists (Reuters)

Top Headlines| back to top |

Another Deadly Bomb Blast in New Delhi

Time | 7 September 2011

Ten people were killed and 61 injured by a bomb blast inside the Delhi High Court Complex in thecapital on Wednesday morning The militant group Harkat ul Jihad al Islami (HuJI) took responsibilityfor the blasts in an email sent to several Indian news organizations The attack seemed to have beencalculated to maximize the loss of life and to take advantage of gaps in the security screening process forthis busy public building [Article continues here httpglobalspinblogstimecom20110907another-deadly-bomb-blast-in-new-delhiiid=pf-main-mostpop2]

Hamas Surfaces In Worsening Israel-Turkey Ties

Jerusalem Post | 8 September 2011Israeli security officials reveal Turkish Chinese Hamas presences

Hamas has established a command post in Turkey that it uses to recruit new operatives andoversee some of its operations in the Middle East Israels Security Agency Shin Bet revealed Hamasrsquospresence in Turkey came up during the Shin Bet investigation into the 13 terrorist cells that it recentlydiscovered operating in the West Bank and Jerusalem One of the cells was working to carry out asuicide-bomb attack in Jerusalem the attack was thwarted A senior Shin Bet official stressed howeverthat the Hamas command post in Turkey was not directly involved in the cells that were capturedalthough one of the senior Hamas members who lives in Jordan also oversees operations in SyriaTurkey and China Shin Bet officials said Hamas operations in China were financial and included moneylaundering and procurement of equipment In Turkey Hamas is believed to be active in recruiting

operatives Meanwhile Strategic Affairs Minister Moshe Yarsquoalon accused Ankara of cooperating withHamas and Iran Hamasrsquos best-known overseas presence is in Damascus home to its political leaderKhaled Mashaal Hamas is believed to be the strongest overseas in Egypt Jordan Syria and Lebanon ndashbut could potentially work together with other groups such as Hezbollah to increase its reach

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 442

Special 911 Lessons Afghanistan and Pakistan| back to top |

911 Lessons Afghanistan and Pakistan

Council on Foreign Relations | By Daniel Markey Senior Fellow for India Pakistan and South Asia

August 26 2011

A decade after 911 the United States is still at war in Afghanistan and lurches from crisis to crisis withPakistan Osama bin Laden is dead and al-Qaeda is weakened but Americas decade in South Asia hasbeen full of mistakes Successes have been too few tallied slowly and at grave cost

The initial US invasion of Afghanistan was revolutionary in its combination of local militiasand their warlord chiefs US Special Forces and air power In Pakistan Washington demanded an endto Islamabads relationship with the Taliban regime in Kabul started a range of joint counterterroroperations and offered a generous package of assistance

At first apparent progress masked deeper problems In Afghanistan the Taliban were routedschools were opened and elections held In Pakistan the military-led government signed up to the Bushadministrations war on terror netting a number of senior al-Qaeda leaders and scores of lower-leveloperatives

Yet many senior al-Qaeda and Taliban leaders evaded capture and used Pakistani safe havens toregroup and plot The Afghan state and its security forces remained weak and corrupt Pakistan failed toend its longstanding relationships with a range of dangerous militant groups

Worse the veneer of success was intoxicating it encouraged an expansion of US ambition andrhetorical commitments even as the war in Iraq preoccupied the Bush administration The resultingmismatch of sweeping noble American aims with meager resources was disastrous Washington failedto destroy al-Qaeda failed to stem the Talibans resurgence and failed to clarify its goals or commitmentto allies and adversaries

The Obama administration came into office in 2009 determined to reverse these losses with newleadership attention money and troops That effort has netted bin Laden and turned the tide on manyAfghan battlefields Still Washington struggles to explain how military victories will translate intoenduring security Efforts to improve relations with Pakistan through aid and engagement have beenoverwhelmed by differences between Islamabad and Washington over whether and how to fight regionalmilitants

The past decade in Afghanistan has convinced many Americans of the folly of large-scale USmilitary intervention The Pakistan experience shows that money often buys neither cooperation noraffection The United States still needs to find a way to get troops out of Afghanistan and a means todeal with a wide range of enormous security challenges in Pakistan Americans should not kidthemselves Enduring success in Afghanistan and Pakistan remains essential but it is still a long waysoff[Part of the series Ten Lessons Since the 911 Attacks in which CFR fellows identify the top threatsand responses going forward Read more in the series here httpwwwcfrorg911ten-lessons-since-911-attacksp25687]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 542

Counterterrorism News by Nation amp Region

Afghanistan

| back to top |

Four NATO Trucks Destroyed in Afghanistan

Afghan Online Press | (Afghanistan) 7 September 2011

Taliban militants have destroyed four NATO trucks carrying supplies for US-led soldiers in Afghanistanin the eastern part of the country Press TV reports The attack occurred place in the city of MohammadAghe in the eastern province of Logar on Monday The incident did not cause any casualties Afghanofficials said Taliban spokesman Zabihullah Mojahid claimed that six NATO trucks had been damaged

NATO tankers and containers carrying fuel for US-led soldiers from Pakistan also come underattack by Tehrik-i-Taliban Pakistan militants in Afghanistans neighbor Hundreds of NATO tankers andcontainers have been destroyed in different parts of Pakistan over the past three years The US militaryand NATO rely heavily on the Pakistani supply route into landlocked Afghanistan more so now thatTaliban attacks are increasing Other routes largely through Russia and the Central Asian states haveproved to be too costly both politically and economically[Article continues here httpwwwaopnewscomtodayhtml]

Taleban Claim Killing 10 Security Forces In Afghan East

Afghan Islamic Press news agency | Peshawar in Pashto 7 September 2011

Two explosions targeted security forces in eastern Khost Province in the early morning on 7 Septemberprivate Pakistan-based Afghan Islamic Press news agency reported A local resident was quoted assaying the first explosion took place when a roadside mine exploded in the Mardikhel area while thesecond blast occurred when explosives placed on a tree went off as the security forces gathered at thescene The eyewitness said he had seen a number of injured people being transported from the area butcould not be more specific as the security forces immediately cordoned off the area and started firing inthe air A local health official told AIP that one body had been transferred from the scene of the incident

Meanwhile Taleban spokesman Zabihollah Mojahed claimed responsibility for the explosionssaying 10 security forces had been killed and a number of others injured in the attack

Afghan Government Rejects UN torture Allegations

Associated Press | 7 September 2011

The Afghan government on Wednesday strongly rejected allegations that its security agencies tortureddetainees mdash charges that were apparently raised in an unpublished UN report

The allegations prompted NATO to temporarily suspend some transfers of detainees frominternational to Afghan-run detention centers They also threatened to further erode the already shakyrelationship between President Hamid Karzais government and the international community InteriorMinister Besmillah Mohammadi and Rahmatullah Nabil head of the Afghan intelligence servicedescribed the NATO decision to suspend detainee transfers as politically motivated and aimed atslowing down the transition of security responsibilities to the Afghan government

Afghanistan is gradually taking over responsibility for the countrys security from the US-ledmilitary coalition as foreign forces aim to withdraw all their combat troops by the end of 2014 TheAfghan government believes that any move to halt the transfer of prisoners under any false excuses is aserious blow to the transition process Mohammadi and Nabil said in a joint statement The twoofficials said that in the past the United Nations in Afghanistan had assured the authorities that theirdetention facilities complied with international human rights standards

They also complained the UN had not given a copy of the report to the government Some of the details of the report have leaked out ahead of its publication prompting the responses The UN hassaid it is still working on finalizing the report and will publish it once it has been completed

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 642

Mohammadi said the government had found out about the allegations in the media The reportapparently included claims of torture such as electric shocks threats of sexual assault and physicaltorture such as the ripping out of nails in Afghan detention facilities The Afghan security agenciesstrongly reject the allegations Mohammadi said adding that international agencies including theUnited Nations had regularly visited Afghan detention facilities Following such visits they assuredauthorities of their satisfactory findings as to the situation in the prisons and compliance with humanrights standards he said hellip[Article continues herehttpnewsyahoocomafghan-government-rejects-un-torture-allegations-130001115html]

Afghan Taliban Spokesman Comments on Turkish Prisoners Release

SITE Monitoring Service | September 2011

Afghan Taliban spokesman Zabihulla remarked on the groups release of four Turkish engineers whowere held for over eight months and noted the well-treatment of the men during their detention In astatement posted on the groups website on September 6 2011 in Arabic and other languagesZabihullah argued that just as the Afghan Taliban treated these and other captives well the enemyshould treat captive fighters well also He reiterated the Afghan Talibans warning to foreign andAfghan companies not to work with the Afghan government and stated However some parties due to

their economic and political interests do not pay attention to the warnings of the Islamic Emirate andcontinue supporting the occupiers Thus the result of their violations will be the punishment and thecapture of their employees by the mujahideen

On September 4 the Afghan Taliban announced that it released four Turkish engineers whoworked for a Turkish company in the Batan area of Paktia province The release they said was basedon Islamic compassion and appreciate for Eid al-Fitr which marks the end of the holy month of Ramadan

Algeria

| back to top | Algerian Security Conference Focuses On Libya

BBC World Service | 7 September 2011

Foreign ministers from North Africa were due to meet in the Algerian capital Algiers on 7 September todiscuss ways of confronting terrorism and preventing the flow of weapons from Libya BBCWSreported High level delegations from France and the United States and diplomats from Mali Niger andMauritania were also due to attend the conference Algeria has expressed concern that arms from Libyacould fall into the hands of the north African branch of Al-Qaidah (AQIM) which has been active in theSahara and has kidnapped westerners the report noted

Algeria To Submit List Of Arms Smugglers At Conference

Le Temps dAlgerie website | Algiers in French 6 September 2011Algeria is expected to submit a list of weapons smugglers in the Sahel region to its partners in the fightagainst terrorism at the conference Algerian privately-owned newspaper Le Temps dAlgerie reportedon 6 September

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 742

Bahrain

| back to top |

Bahrain Panel 101 Activists on Hunger Strike

Associated Press | 7 September 2011

More than 100 jailed Bahraini activists mdash including doctors who treated injured protesters duringmonths of anti-government protests and crackdowns in the Gulf kingdom mdash are on hunger strike an

international panel said Wednesday The Bahrain Commission of Inquiry said in a statement that 84opposition supporters are on hunger strike in prison In addition 17 detained activists have beenhospitalized by the Interior Ministry for their refusal to eat

Hundreds of activists have been imprisoned since February when Shiite-led demonstrations forgreater rights began in the Sunni-ruled Bahrain the home of the US Navys 5th Fleet More than 30people have been killed since protests inspired by Arab uprisings began in February The five-memberpanel has been set up in June to investigate the unrest Wednesdays statement said an internationalexpert on hunger strikes will join the panel to visit the striking detainees and evaluate their condition

Medical advice will be provided and the expert will discuss the challenges of hunger strike thestatement said adding that the hunger strike started nine days ago

Among jailed activists on hunger strike are 20 doctors who are on trial in a special security court

on charges of participating in efforts to overthrow Bahrains 200-year-old monarchy Other jailedopposition supporters have joined the strike including two prominent Shiite activists Abdul Jalil al-Singace and Abdulhadi al-Khawaja They were sentenced to life in prison in June for their role inprotests The doctors trial is being closely watched by rights groups which have criticized Bahrains useof the security court that includes military prosecutors and civilians and military judges

The case against 11 health professionals was back in the special tribunal on Wednesday Noverdict is expected from the session The Bahrain Commission of Inquiry includes international judicialand human rights experts They started the probe with the consent of the Sunni rulers The commissionsfindings are expected Oct 30 Shiites comprise about 70 percent of Bahrains 525000 people but areblocked from top political and security posts[Article continues here httpnewsyahoocombahrain-panel-101-activists-hunger-strike-

112949681html]

Colombia

| back to top |

Colombias Complete Military Command Replaced

Colombia Reports

Colombian President Juan Manuel Santos announced Tuesday that the countrys entire militarycommand has been replaced amid growing concerns about increased violence by illegal armedgroups

[Article continues here httpwwwcolombiareportscomcolombia-newsnews18815-colombias-complete-military-command-replacedhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 842

Denmark

| back to top |

Family Held by Somali Pirates Released

Associated Press | 7 September 2011

Seven Danish hostages including a family with teenage children have been released by Somali piratesafter more than six months in captivity Denmarks Foreign Ministry said Wednesday The Danes -- a

couple with three children ages 12-16 and two crew members -- were captured in the Indian Ocean onFeb 24 while sailing around the world in a yacht

The seven Danes are doing well under the circumstances They are expected back in Denmark in a short time the ministry said in a brief statement It gave no details of how they were released andmade no mention of a ransom being paid No one at the Foreign Ministry was immediately available forcomment

Prime Minister Lars Loekke Rasmussen told public broadcaster DR that the Danes were on theirway back in a chartered airplane paid for by their insurance company Loekke Rasmussen said theirrelease came after a long period of negotiations Jan Quist Johansen his wife Birgit Marie Johansentheir sons Rune and Hjalte and daughter Naja were captured along with the two adult Danish crewmembers when their 43-foot yacht was seized by pirates The Johansens are from Kalundborg 75 miles

west of Copenhagen They set out on their round-the-world journey in 2009 Of course it is verycheerful news said Ole Meridin Petersen chairman of the Kalundborg yacht club where Jan QuistJohansen was a member I can imagine that the hostages after their release need quite a lot of calmMeridin Petersen told The Associated Press

The yacht was seized while the Johansens were sailing through the pirate-infested waters off EastAfrica The family very likely is aware that what they did was not so fortunate They certainly feelpretty bad about it now Meridin Petersen said Hostages are held in hot austere conditions in Somalia -- typically for many months -- before a ransom is agreed on and paid and the hijacked ships and creware released Last year a British sailing couple were released after 388 days in captivity Reportsindicated that a ransom in the region of $1 million was paid for their release Somalia hasnt had afunctioning government since 1991 one of the reasons the piracy trade has flourished hellip

[Article continues here httpwwwfoxnewscomworld20110907denmark-family-held-by-somali-pirates-since-february-releasedtest=latestnews]

France

| back to top |

Western Governments Said Protecting Intelligence Officers From Scrutiny

BBC World Service | 7 September 2011

Western governments have been accused by Europes leading human rights body of shielding theirintelligence services from accountability for serious violations BBC World Service reported on 7

September The reports author the rapporteur for the Council of Europe Dick Marty said theseviolations had occurred during anti-terrorist operations He said a licence to abduct torture or kill onlyexisted in films and dictatorships but western governments were using the notion of state security toprevent parliaments and judges from scrutinising the work of intelligence officers

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 942

India

| back to top |

Deadly Explosion Strikes Courthouse in New Delhi

New York Times | By Jim Yardley 7 September 2011

An explosion ripped through a reception area of an Indian courthouse on Wednesday morning killing atleast 10 people and wounding more than 60 others in a bombing that renewed concerns about Indiarsquos

vulnerability to terrorism It was the second bombing of the courthouse in less than four months

Relatives mourned a victim of the bombing which struck a courthouse reception area Harish TyagiEuropean PressphotoAgency

Witnesses described a chaotic scene at the Delhi High Court after the blast at 1014 am outside areception area used by litigants lawyers and visitors to enter the courthouse

ldquoIt was in shamblesrdquo said Ajay Mehrotra a lawyer who witnessed the explosion ldquoThere wastotal chaos There was blood People were running for their livesrdquo

The Indian home minister Palaniappan Chidambaram called the explosion a terrorist attack andnoted that New Delhi was already in a high state of alert with Parliament in session Mr Chidambaramsaid Indian intelligence agencies had received information in July about a possible terrorist threat to thecity which had been turned over to the local police He did not elaborate about the intelligence reportOn Thursday three people were detained for questioning by the police Reuters reported

ldquoThe bomb blast took place just outside the reception centerrdquo Mr Chidambaram said at a newsconference ldquoIt is suspected that the bomb was placed in a briefcaserdquoReuters reported that a militant terrorist group called HuJI for Harkat-ul-Jihad Islami based largely inPakistan and also Bangladesh had claimed responsibility for the attacks citing security officials

Prime Minister Manmohan Singh speaking to reporters during a visit to Bangladesh condemned

the explosion as ldquoa cowardly act of a terrorist naturerdquoldquoWe will deal with itrdquo Mr Singh said ldquoWe will never succumb to the pressure of terrorismrdquo

Indian authorities have come under renewed criticism in recent months about their preparedness toprevent terrorism Terrorist attacks are a persistent concern in India particularly in the countryrsquos rapidlygrowing cities which have endured a series of bombings in recent years

In July more than 20 people were killed in Mumbai the countryrsquos financial capital from threeblasts timed to the evening rush hour That attack raised painful memories of the bloody November 2008attacks on Mumbai in which militants trained in Pakistan swept through luxury hotels a railway stationand a Jewish center in a rampage that left more than 160 people dead

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1042

Wednesdayrsquos attack at the Delhi High Court exposed anew the weaknesses in the courthousersquossecurity In May a smaller bomb detonated near a parked car outside the courthouse causing no injuriesWitnesses told local media of seeing a black bag in flames after the blast

Rakesh Tiku chairman of the Delhi Bar Association criticized the Delhi police saying ldquothe low-intensity blast in May should have served as an eye-openerrdquo Mr Tiku said hundreds of litigants andclerks passed through the gate where the blast took place each day making it a vulnerable location ldquoTheDelhi High Court requested the Delhi police to install CCTV cameras as well as personnel to man theentrances three or four months ago but no action has been takenrdquo he said

The latest explosion occurred near Gate 5 of the High Court outside a reception center wherevisitors wait for passes to enter the building Lawyers said Wednesday was an especially busy daybecause the court heard public-interest litigation

ldquoWhat are the police doingrdquo asked Mr Mehrotra the lawyer ldquoThe lives of lawyers litigantsand judges are at stakerdquo

Another witness Brijmohan Sharma described a ldquovery loud sound the reverberations fromwhich caused me to lose my balance I got up and was surrounded by people runningrdquo He added ldquoItwas like a scene from a film People were lying on the floor with their hands cut off their legs brokenand bleedingrdquo

The last serious attacks in New Delhi took place in 2008 when coordinated blasts in a park and

in shopping areas killed more than 20 people and injured nearly 100 In those attacks the IndianMujahedeen an Islamic militant group claimed responsibility

The Delhi High Court is in the heart of the capital a short walk from the cityrsquos landmark IndiaGate Rahul Gupta a local resident said he was standing near the courthouse entrance when the groundshook from the blast throwing people onto the road outside the reception area

ldquoSecurity is one area which no one can handle in Delhi at the momentrdquo Mr Gupta said ldquoIt is thefanatical people who are creating these types of problems and trying to create panic in the publicrdquo hellip

The Indian government said that a preliminary analysis found a nitrate-based explosive withtraces of pentaerythritol tetranitrate or PETN a powerful plastic explosive often used in terror plots hellip[Article continues here httpwwwnytimescom20110908worldasia08indiahtml_r=1ampref=world]

Ten Killed In Delhi Blast

Multiple Sources

At least 10 people were killed and 65 others injured in a bomb blast outside the Delhi High Court on themorning of 7 September private Indian television channel IBN Live reported The terror strike took place in a high security area with Parliament the Prime Ministers Office and India Gate in the vicinitythe report said (CNN-IBN website New Delhi in English 07 Sep 11)

According to the website of the private Indian television channel NDT the blast went off at themain entrance to the court on Shershah Suri Road which is normally heavily guarded The bomb wentoff just before the court was about to open the report said (NDTV website Delhi in English 07 Sep 11)

Security officials were quoted by BBCWS as saying they suspected the explosives were hidden

in a briefcase that had been placed beside the desk where passes were being handed out An eyewitnesstold the BBC that it was a powerful blast shaking the ground and buildings around him (BBC WorldService 7 September 2011)

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1142

Delhi On High Alert In Wake Of Blast

Multiple Sources

The Indian capital has been put on high alert following the blast at the Delhi High Court privateEnglish-language TV news Channel Times Now reported (Times Now TV New Delhi in English0530GMT 07 Sep 11)

Hindi channel says received email from group claiming responsibility for attack Indias Hindinews channel Aaj Tak said on 7 September it had received an email claiming responsibility for the blastAccording to the report the email was sent from the ID harkatuljihadi2011gmailcom The channelsaid the police were investigating possible involvement of the Indian Mujahidin (Aaj Tak TV Delhi inHindi 7 September 2011)

Police Probe Possible Links To Al-Qaidah-Linked Group

Noida IBN Live | in English 7 September 2011

Police in Delhi are looking into claims that a Pakistan-based militant group linked to Al-Qaidah theHarkat-ul-Jihad Islami (HUJI) may have been involved in the attack Noida IBN TV reportedAccording to the report in an e-mail sent to a media house HUJI claimed it had carried out the attack inretaliation for the death sentence issued against Afzal Guru the man found guilty of involvement in an

attack on Delhis parliament almost ten years ago We owe the responsibility of todays blasts at highcourt delhi our demand is that Afzal Gurus death sentence should be repealed immediately else wewould target major high courts amp THE SUPREME COURT OF INDIA the e-mail read According tothe report it was sent from the id harkatuljihadi2011gmailcom

Home Minister Announces Probe Into Attack

CNN-IBN website | New Delhi in English 7 September 2011

Indian Home Minister P Chidambaram speaking in parliament said that investigators did not yet knowwho was behind the attack but he blamed it on terrorists seeking to destabilise the country He saidthat the National Investigative Agency (NIA) would carry out a probe into the attack

PM Denounces Blast As Cowardly Act

Doordarshan news website | New Delhi in English 7 September 2011

Prime Minister Manmohan Singh on 7 September described the blast outside the Delhi High Court as acowardly act and urged all political parties to unite and tackle any acts of terrorism state-run Indiantelevision channel DD News reported This is cowardly act of terrorist nature We will deal with it Wewill never succumb to the pressure of terrorism Singh said He said this is a long war in which allpolitical parties all the people of India have to stand united so that the scourge of terrorism is crushed

IED Explosion At Delhi High Court Domestic Islamists Likely Culprits Growing Signs Of Jihadist Agenda

Sterling-Assynt | 7 September 2011

An IED placed inside a briefcase exploded at 1017AM at an entrance to Delhi High Court wherelitigants collect their visitor passes Wednesdays are reserved for public-interest litigation and so thearea was crowded It is likely that the briefcase was placed in the queue at reception before visitors passthrough security checks There is reportedly no CCTV coverage in this area which will makeidentification of the perpetrator difficult

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1242

The blast was of at least medium intensity and created a crater between three to four feet deepAt least eleven people have died and 65 others have been injured ndash a toll that would probably have beenhigher if an international group had been responsible There were no other explosions which has thesame implication Mumbai has been placed on high alert following the attack especially as the HomeMinistry reported in August that coastal cities were under threat from pan-Islamic terror groups Noblame has yet been assigned A minor explosion occurred on 25 May (also a Wednesday) in a car-park near the Court That bomb was constructed using ammonium nitrate and is believed to havemalfunctioned causing no damage or injuries which suggests similar origins to this one

There are reports of an email from Harkat-ul-Jihadi al-Islami (HuJI) claiming responsibilityfor todayrsquos explosion but we remain sceptical about this since the group has not previously made suchclaims via email The nature of the bomb and the use of email to communicate suggest rather theinvolvement of the Indian Mujahideen (IM) Nonetheless the unverified HuJI email demands that AfzalGurursquos death sentence be repealed and this may point towards the involvement of a jihadist agendaGuru was involved in the December 2001 Parliamentary attacks in Delhi and had his mercy petitionrejected by the Home Ministry on 10 August

Todayrsquos incident indicates an increase in successful attacks by local groups A robust securityforce campaign following the 2008 Mumbai attacks diminished the capabilities of groups such as IMThey claimed responsibility for the December 2010 Varanasi bomb blast which killed one and injured

twenty people However IMrsquos likely involvement in the July 2011 blasts in Mumbai and the attack todaypoints towards the rebuilding of its capabilities and possibly also the establishment of closer ties with jihadi groups

We do not expect a spate of attacks to follow imminently but such incidents will continue tooccur possibly on a larger scale as IM continues to regroup following the security clampdownDevelopments in the cases of Afzal Guru and Ajmal Kasab (the surviving gunman from 2008) willprovide cause for further attacks Given a recent warming in relations between India and Pakistan theHigh Court attack will be unlikely to raise tensions between the two countries significantly

Indonesia

| back to top |

Islamic Groups Continue To Harass Religious Minorities Government Silence Further

Encourages Attacks Youths Beaten In East Jakarta

Assynt SEAsia Vol VIII No17 | 7 September 2011

Hard-line Islamic groups continued to intimidate religious minorities without any response from theGovernment at either a local or national level Yudhoyono relies on the support of Islamic parties inParliament and is unlikely to take any decisive action against such incidents This will further encourageradical groups and endangers the countryrsquos reputation for religious tolerance

Three youths were beaten by members of the Islamic Defenders Front (FPI) for allegedly beingdrunk The attack took place in Jakartarsquos business district but it remains unlikely that the FPI will targetforeigners and the security forces will not tolerate any threats to business interests Nonetheless such

incidents highlight a worrying trend towards increasingly hard-line behaviour that remains unchecked bythe Government

We previously reported that the light sentences handed down for the killing of three members of the Ahmadiyah sect will embolden radical groups (see our Report of 3 August) In this period theIslamic Reform Movement (Garis) coerced Ahmadi youths in Cianjur West Java to join mainstreamprayers The Ahmadiyah sect meanwhile was banned from conducting religious activities during theEid holidays by the South Sulawesi administration for fear of provoking violence

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1342

Iran

| back to top |

Two Arrested Al-Qaidah Members Iraqi Three Iranian - Iran Official

ISNA website | Tehran in Persian 7 September 2011

The public prosecutor of Irans Kerman Province Yadollah Movahhed has announced the start of aninvestigation into the case of five people arrested on charges of having links to Al-Qaidah the IranianStudents News Agency (ISNA) reported on 7 September Two of the detainees - arrested on 19 August -are Iraqis and the other three are Iranian nationals Movahhed told ISNA in an interview on 7 SeptemberThe prosecutor said the detained people are accused of carrying illegal arms and munitions and addedthat an investigation is ongoing into the possibility that they were members of a larger group

Israel

| back to top |

Israel Uncovers Planned Hamas Bombing Spree On Israelis

Xinhua | 8 September 2011

Hamas cells operating in the West Bank routed between May and AugustThe Israeli security agency Shin Bet has broken a network of Hamas cells operating in the West Bank and planning a series of attacks against Israeli targets local media reported Wednesday Dozens of

Hamas members comprising 13 militant cells were arrested throughout the West Bank between May andAugust Army Radio reported One of the groups has carried out a bombing attack at the entrance toJerusalem in March in which a British woman was killed and several dozen civilians wounded Anothercell had planned to dispatch a suicide bomber to Jerusalems Pisgat Zeev neighborhood on Aug 21 Theattack was thwarted at the last minute by Shin Bet agents assisted by the Israel Defense Forces (IDF)and police according to Army radio Other groups were in various stages of planning and preparingattacks including bombings and the kidnapping of civilians or soldiers for the release of Palestinians jailed in Israel The Shin Bet concluded based on its interrogations of the group members that theHamas military leadership in Gaza and abroad is exerting considerable efforts to rehabilitate itspresence in the West Bank with financing and weapon smuggling The West Bank has remainedrelatively quiet in recent years Israeli officials attributed the success in preventing violence in the area

to the cooperation between the IDF and the Palestinian National Authoritys security forces

Israeli Air Strike Kills One Gaza Militant

Xinhua | 8 September 2011

Strike follows more rocket launches from Gaza warnings of new battlesAn Israeli air strike killed an Islamic Jihad militant and wounded three others in the central Gaza

Strip town of Dier a-Balah witnesses and medical sources said Local witnesses said the militant diedafter his car was hit by a missile adding that three other people were also wounded The condition of theinjured is stable hospital sources said Earlier Wednesday an Israeli military spokesperson said a rocketwas launched from the Gaza Strip into south Israel adding the projectile landed in an open area and didnot cause injuries or damage None of the Palestinian armed factions has claimed responsibility for the

rocket attack Late on Tuesday a Palestinian militant was killed and two others injured when Israeliwarplanes targeted a group of gunmen east of Khanyounis City south of the Hamas-ruled Gaza Strip

The Gaza Strip witnessed an escalation of bloody violence between Israel and Gaza militantgroups in August leaving 26 Palestinians and three Israelis killed The violence was triggered after eightIsraelis were killed in well-coordinated operation in the Red Sea city of Eilat Israel accused Palestinianmilitants of plotting and carrying out the attack which started from the bordering Sinai Peninsula inEgypt

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1442

Libya

| back to top |

Libyan Extremist Britain Allowed To Stay Was Link To Al-Qaeda In Iran Papers Show

The Daily Telegraph | (London) By Richard Spencer Tripoli

The extremist Ismail Kamoka spent several years sending funds to terrorist groups across the Middle East

An Alleged Libyan extremist who sought political asylum in Britain regularly travelled to Iran from2002 to provide forged documents to extremists linked to al-Qaeda secret files found in a Tripoliintelligence service building have disclosed

The documents seen by The Daily Telegraph unearth British intelligence suspicions about linksbetween Iran and al-Qaeda dating back almost a decade Other details to come out of the documentssent by MI6 and found in the office of the former head of foreign intelligence and later foreign ministerMoussa Koussa who defected in March include the revelation that Britain had begun co-operating withthe Chinese security services on Islamic extremists The extent of Iranian co-operation with al-Qaedahas been disputed in intelligence communities though Iranians are thought to have provided weaponsand explosives to the Taliban in Afghanistan

A number of al-Qaeda operatives including members of the family of Osama bin Laden fled toTehran after the fall of the Taliban in Afghanistan and their precise status in Iran has been unclear Thepapers in Libya do not directly challenge the Iranian government but suggest that al-Qaeda operativeshad more freedom of movement there than previously thought The extremist Ismail Kamoka spent

several years sending funds to terrorist groups across the Middle East including some linked to al-Qaeda the files said Mr Kamoka who had been given indefinite leave to remain in Britain afterarriving from Saudi Arabia in 1994 and claiming asylum travelled from the UK to Iran viaSwitzerland in July 2002 according to one document[Article continues herehttpwwwtelegraphcouknewsworldnewsafricaandindianoceanlibya8740771Libyan-extremist-Britain-allowed-to-stay-was-link-to-al-Qaeda-in-Iran-papers-showhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1542

Nigeria

| back to top |

Bomb Explodes In Violence-Torn Nigerian City Residents

AFP | 6 September 2011

A bomb went off Tuesday in Nigerias northeastern city of Maiduguri disrupting a three-week lull inbombings in the violence-torn city local residents said [Article continues here httpnewsyahoocombomb-explodes-violence-torn-nigerian-city-residents-215718081html]

Pakistan

| back to top |

Pakistan Bans Foreign Travel For Those Involved In Bin-Ladin Probe

The News website | Islamabad in English 7 September 2011

A Pakistani commission investigating the circumstances surrounding the killing of Al-Qaidah chief Usamah Bin-Ladin has banned foreign travel for everyone involved in the probe Pakistani daily TheNews part of the Jang group which owns Geo TV reported on 7 September The paper recalled that thecommission had already directed the countrys interior ministry and the intelligence service ISI toensure that the Bin-Ladin family was not repatriated from Pakistan without the consent of the

commission

More Than 20 Killed In Two Suicide Blasts In Pakistans Quetta

Express247 TV | Lahore in English 5 September 2011

At least 22 people were killed and several others injured in two explosions in the south-westernPakistani city of Quetta on 7 September the website of the Dubai-based private Pakistani TV channelARY News reported According to the channel one blast went off near the residence of the FrontierConstabulary and another one near the commissioner office in Quetta According to the report around100 kilograms of explosives were used in each attack (ARY News website Dubai in English 07 Sep 11)

Private Pakistani English-language TV channel Express 247 carried a series of onscreen scrollswhich said police had confirmed that the two blasts were suicide attacks The report cited police sources

as saying that 25 people were killed and more than 40 injured in the attacks (Express247 TV Lahorein English 0654GMT 07 Sep 11)

BBCM notes that the attacks came after the Pakistani intelligence agency said on 5 August that ithad arrested Al-Qaidah commander Younis Al-Mauritani and two of his accomplices in Quetta

Taleban Say Quetta Blasts Revenge For Recent Al-Qaidah Arrests

AFP | 7 September 2011

The Pakistani Taleban have claimed responsibility for the twin suicide bombs in Quetta on 7 Septembersaying they were carried out to avenge the recent arrests of Al-Qadiah operatives in the city Wecarried out the attacks Taleban spokesman Ehsanullah Ehsan told AFP in a phone call from anundisclosed location

Twin Suicide Bombings In Pakistan Leave 23 Dead

Miami Herald

Twin suicide bombers attacked the home of a senior military officer Wednesday in the western city of Quetta injuring him and killing at least 23 people officials said in a possible revenge attack forPakistans recent arrest of a senior al Qaida commander [Article continues here httpwwwmiamiheraldcom201109072394264twin-suicide-bombings-in-pakistanhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1642

Philippines

| back to top |

Moro Splinter Group Threatens US Soldiers In Philippines But Capabilities Limited

Government-Rebel Negotiations Remain Difficult

Assynt | SEAsia Vol VIII No17 7 September 2011

Ameril Umbra Kato a former senior Moro Islamic Liberation Front (MILF) field commander whoresigned late last year because he rejects peace negotiations has threatened to attack US troops as wellas Filipino security forces and other Government targets US and Filipino troops are currentlyundertaking joint training exercises This is an annual event but the first time they have been conductedin central Mindanao However Katorsquos splinter group the Bangsamoro Islamic Freedom Fighters (BIFF)is believed to have as few as 200 members with generally unsophisticated weapons ConsequentlyBIFFrsquos ability to conduct an attack on US forces is likely to be limited

In this period Kato announced the creation of a political wing to his grouping the BangsamoroIslamic Freedom Movement emphasising his split with MILF Nevertheless he has not been expelledfrom MILF and so is protected by the current ceasefire with Manila though MILF has stronglycondemned Katorsquos threat against US troops It is possible that MILF leadership is content to allow himto operate relatively unimpeded in order to gain greater leverage in its negotiations with theGovernment since they can contrast their more compromising approach with BIFFrsquos threatened

violence Meanwhile negotiations between MILF and the Government continue MILF dismissed theGovernmentrsquos latest proposal for an autonomous region but both sides appear committed to continuingtalks

Russia

| back to top |

Suicide Bombings In Grozny Demonstrate Islamic Insurgencyrsquos Continuing Capabilities In

Chechnya

Stirling Assynt Reports | Report FSU Vol IV No17 7 September 2011

A series of suicide bombings in the Chechen capital on 31 August (which left nine casualties includingseven police officers) has severely undermined President Ramzan Karydovrsquos claims to have successfully

eradicated the Islamic insurgency in the Republic The first suicide bomber reportedly detonated hisexplosives in a densely populated area only 150 metres from a local Parliament building while twofurther jihadists targeted first-response units Significantly the attack occurred during the Muslimholiday of Eid a three day celebration which marks the end of Ramadan during which the risk of jihadist attacks is heightened Indeed in addition to this strike in Grozny jihadist militants carried outfurther attacks in Iraq Nigeria and Algeria during Eid this year

Although no group has claimed responsibility for this incident it bears the hallmark of theCaucasus Emirate and so was likely orchestrated by the grouprsquos newly appointed deputy KhuseynGakayev and his brother Vadalov Indeed the Gakayev brothers are believed to have been behind theattack on the Chechen Parliament in October 2010 demonstrating the grouprsquos capabilities and intent tocarry out such strikes Moreover the timing of these bombings ndash only two months after the

reconciliation of the Caucasus Emiratersquos leader Doku Umarov with Chechen commanders (see our 3August Report) ndash supports this assessment and suggests that further incidents and suicide bombings arelikely given this truce

Suspected Militant Killed In Russias Southern Republic

Interfax news agency | Moscow in Russian 7 September 2011 Russias National Antiterrorist Committee said on 7 September a militant had been killed in the Republicof Kabarda-Balkaria the corporate-owned Russian news agency Interfax reported

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1742

Saudi Arabia

| back to top |

Saudi Arabia Shopping Around For Nuke Technology

Haaretz | 8 September 2011

Ties with Pakistan may remain close as Riyadh seeks nuclear assistanceSynopsis This week brought news that Iran on its own has produced new advanced nuclearcentrifuges According to a report of the International Atomic Energy Agency Iran has begun to installthe centrifuges in its uranium enrichment facility in Natanz But the high-level source noted thatdevelopment and production of the new centrifuges began more than seven years ago That does notspeak of a great technological capability on Irans part Israeli intelligence like its American counterpartviews 2014 or 2015 as the date when Iran will be able to build nuclear weapons says the source - if itwants to and no one blocks it In Saudi Arabia in contrast they are a bit more disturbed by thedevelopments in Iran An American Department of Energy delegation visited Riyadh and met with DrHashim Yamani who heads the King Abdullah City for Atomic and Renewable Energy Saudi Arabiawants to equip itself with nuclear reactors to generate electricity The United States is interested inselling Riyadh reactors for two reasons - fat contracts and the ability to keep close tabs on nucleardevelopments in Saudi Arabia The American administration is concerned that with a nuclear programfor civilian uses Saudi Arabia would actually like to prepare the infrastructure so it could switch to

producing nuclear weapons relatively quickly should Iran possess such weapons Defense ministerSultan Bin Abdul Aziz and the countrys former intelligence chief Turki Bin Faisal reportedly favorthe preparation of a secret nuclear program for military uses in cooperation with a Sunni Muslim ally -Pakistan which possesses dozens of atomic bombs Saudi Arabia reportedly funded Pakistans nuclearweapons program in return for Pakistans promise to aid the monarchy in this area if need be

Serbia

| back to top |

Serbia Threatened By Terrorism Says Dacic

Tanjug | 8 September 2011

US officials warned Serbia of possible terrorist activity particularly against foreign interests

After a warning coming from USA officials Serbia will raise the level of security in all facilitiesbelieved to be a possible target of terrorists the countrys Deputy Prime Minister and Minister of InteriorIvica Dacic stated Wednesday in the Palace of Serbia He stated that the security measures will primarilyrefer to the facilities of foreign countries in Serbia and added that special attention will be paid to thesecurity of air traffic US officials assume that there is a possibility of new terrorist attacks in the USAand other countries including Serbia Dacic said following a meeting with Special Representative of the UN Secretary-General for Disaster Risk Reduction Margareta Wahlstrom in Belgrade and a sessionof the republic headquarters for emergency situations

Somalia

| back to top |

Six Killed In Mortar Attack In Somali CapitalShabeelle Media Network website | Mogadishu in Somali 7 September 2011

Six people were killed and several others injured after three mortars landed in Mogadishus Arjantiinneighbourhood in Kaaraan District on the night of 6 September the privately-owned Shabeelle websitereported It quoted an eyewitness as saying that two of the three mortars fired have caused thecasualties inflicting fear in the residents who returned to their homes after Al-Shabab vacated the areaearly last month Kaaraan District is one of the areas taken over by the government forces and AUpeacekeepers

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1842

United States

| back to top |

Post-911 Intelligence Reform Takes Root Problems Remain

Reuters | 8 September 2011

US intelligence agencies will forever be scarred by their failure to connect the dots and detect theSeptember 11 plot but a decade later efforts to break down barriers to information-sharing are takingroot Changing a culture of need-to-know to need-to-share does not come easily in spy circles Someofficials say they worry a decade later about a future attack in which it turns out that US spy agencieshad clues in their vast vaults of data but did not put them together or even know they existed

Yet significant changes both big and small have broken down barriers between agenciessmoothed information-sharing and improved coordination US intelligence experts say From issuing ablue badge to everyone working in the sprawling intelligence community to symbolize a commonidentity to larger moves of mixing employees from different agencies the goal is singular -- to preventanother attack

Were much further ahead David Shedd Defense Intelligence Agency deputy director said of the ability to connect the dots compared with 10 years ago Still signs of a plot to attack the UnitedStates could be missed again My worst fear and I suspect probably one that would come true is that inany future would-be or actual attack God forbid we will be able to find the dots again somewhere

because of simply how much data is collected Shedd said The political response to the failure to stopthe attack was the 2002 creation of the Department of Homeland Security pulling together 22 agenciesto form the third largest US Cabinet department behind the Pentagon and Veterans Affairs

That was followed by the creation in late 2004 of the Director of National Intelligence to overseeall the spy agencies as recommended by the bipartisan 911 commission Previously the CIA directorheld a dual role of also overseeing the multitude of intelligence agencies But in the aftermath of the2001 attacks policymakers decided that was too big of a job for one person to do effectively

Critics argued then and now that the reforms were the governments usual response to crises --create more bureaucracy But others see much-needed change It has been a tremendous improvementsaid Lee Hamilton who was the 911 commission vice chair Its not seamless there are problems andweve still got a ways to go The 2001 attacks involving airliners hijacked by al Qaeda operatives killed

nearly 3000 people in New York Pennsylvania and the Pentagon Various US intelligence and lawenforcement agencies had come across bits of information suggesting an impending attack but failed toput the pieces together The CIA had information about three of the 19 hijackers at least 20 monthsbefore the attacks the National Security Agency had information linking one of the hijackers with alQaeda leader Osama bin Ladens network the CIA knew one hijacker had entered the United States butdid not tell the FBI and an FBI agent warned of suspicious Middle Eastern men taking flying lessons

Have the reforms made America safer Officials say yes and point to the US operation thatkilled bin Laden in Pakistan in May that demanded coordination among intelligence agencies and themilitary But there is an inevitable caveat no one can guarantee there will never be another attack onUS soil On Christmas Day 2009 a Nigerian man linked to an al Qaeda off-shoot tried unsuccessfullyto light explosives sewn into his underwear on a flight to Detroit from Amsterdam It turned out US

authorities had pockets of information about him President Barack Obama used a familiar September 11phrase to describe the 2009 incident as a failure to connect the dots of intelligence that existed acrossour intelligence community

Roger Cressey a former White House National Security Council counterterrorism officialresurrected another September 11 phrase It was a failure of imaginationThe intelligence community had not seen al Qaeda in the Arabian Peninsula a Yemen-based al Qaedaoff-shoot as capable of striking the US homeland If the underwear bomber threat had originated inPakistan they would have gone to battle stations immediately Cressey said Some proposed changesin how authorities would respond to another successful attack still are pending For example creation of

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1942

a common communication system for police firefighters and other emergency personnel remainstangled up in political wrangling in Congress over how to implement it This is a no-brainer Hamiltonsaid The first responders at the scene of a disaster ought to be able to talk with one another Theycannot do it today in most jurisdictions

Former leaders of the 911 commission issued a report card saying nine of its 41recommendations remain unfinished The Office of the Director of National Intelligence hasexperienced growing pains as overseer of the 17 spy agencies churning through four chiefs in six yearsTensions over turf confusion about the DNIs role and problems herding agencies with very powerfulchiefs of their own all came to a crescendo when retired Admiral Dennis Blair the third DNI tried toassert authority over CIA station chiefs who represent the agency in different countries The positionof chief of station is one of the crown jewels of the CIA and they dont want anyone playing with theircrown jewels said Mark Lowenthal a former senior US intelligence official

After a dust-up with CIA Director Leon Panetta who now is defense secretary it was Blair whowas sent packing I think the mistake that some have made is to have viewed the DNI and the Directorof CIA as an eitheror proposition rather than the power of the two working together the DIAs Sheddsaid in an interview in his office There is a history of where that hasnt worked so well I believe it isworking much better today said Shedd who has worked at the DNI CIA and National SecurityCouncil

Intelligence experts say in the current administration Obamas top homeland security andcounterterrorism adviser John Brennan arguably has more power than any of them because he has thepresidents ear Its a reminder that bureaucratic reform or no personalities count in making nationalsecurity policy The improved sharing of secret data has led to yet another set of problems The delugeof bits and bytes has subjected intelligence analysts to information overload as they try to sift through itall for relevant pieces Our analysts still are spending way too much time on finding the informationrather than on the analysis of the information Shedd said There is just too much data to go find it all

The intelligence community wants a system developed that would automatically processinformation from multiple agencies and then make the connections for the analysts

But greater inroads into sharing data across agencies does not guarantee that another attack willbe averted The threat has evolved and officials now are increasingly concerned about a lone wolf plot

by an individual not tied to any militant group that may be more difficult to uncover Those threatswill not come to our attention because of an intelligence community intercept said John Cohen asenior Department of Homeland Security counterterrorism official

They will come to our attention because of an alert police officer an alert deputy sheriff analert store owner an alert member of the public sees something that is suspicious and reports it Cohensaid One measure of the success of post-911 reforms is that a decade later the United States has not hada similar attack Now that could be luck that could be skill we dont really know Hamilton said Butin all likelihood what we have done including the establishment of the Department of HomelandSecurity and the transformation in intelligence and FBI has certainly been helpful[Article continues here ]httpnewsyahoocompost-9-11-u-intelligence-reforms-root-problems-052514320html

Comment the value added provided by the Office of the DNI remains an open question for many withinthe Intelligence Community (IC) and is a favored theme of corridor discussion in IC-member agenciesOn the other hand there is broad agreement among intelligence officials that the degree of cooperationand coordination between intelligence agencies and the character of intelligence sharing has vastlyimproved The fact that there has not been a successful major attack on US soil since 911 ndash not forlack of plotting ndash is in great part testimony to this more effective cooperation

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2042

Jihadist Suggests Striking New York City Bridges

All SITE Intelligence Group | 6 September 2011

A jihadist pointed to what he found to be a weak point of suspension bridges and directed his messageto those who love blasting and explosions In a message posted on the Shumukh al-Islam forum onSeptember 6 2011 the jihadist Abu Suleiman al-Nasser gave a picture of the Verrazano Bridge inNew York on which he drew a red box and arrow on the bridges center He then gave a map on whichhe circled the various bridges in New York City and its boroughs A fellow jihadist offered his ownidea giving a picture of the Hoover Dam and explaining that there is no target more important thandams He wrote that striking a dam may lead to the submerging of cities and the killing of thousands of people and in the case of the Hoover Dam would impact Las Vegas the capital of gambling anddebauchery

Counterterror Veteran is New Deputy FBI Director

Atlanta Journal Constitution | 1September2011

A 24-year FBI veteran with extensive counterterrorism experience Sean Joyce has been named the lawenforcement agencys new deputy director Elevated to the No 2 post within the FBI by Director RobertMueller Joyce replaces Timothy Murphy who is retiring after 23 years with the bureau Since last yearJoyce has been executive assistant director of the national security branch responsible for the FBIs

national security and intelligence operations He earned the Attorney Generals Award for ExceptionalService in 2004 for work on a counterterrorism squad in Dallas In 2008 he was named chief of thecounterterrorism divisions international terrorism operations section with responsibility forinternational terrorism matters within the United States hellip[Complete article is available here httpwwwajccomnewsnation-worldcounterterror-veteran-is-new-1153018html]

Top CIA Official Obama Changed Virtually Nothing

Salon | 1 September2011

PBSs Frontline is airing an examination of Top Secret America on September 6 The show includes arare and lengthy interview with 34-year-CIA-veteran John Rizzo who is described as the most

influential lawyer in CIA historyHere is one quote they include from Rizzo With a notable exception of the lsquoenhanced

interrogationrsquo program the incoming Obama administration changed virtually nothing with respect toexisting CIA programs and operations Things continued Authorities were continued that wereoriginally granted by President Bush beginning shortly after 911 Those were all picked up reviewedand endorsed by the Obama administration hellip[Complete article is available herehttpwwwsaloncomnewspoliticsbarack_obamastory=opiniongreenwald20110901obama]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2142

General Counterterrorism News| back to top |

The Terrible Missed Chance

Newsweek | 4 September 2011

Special Agent Harry Samit of the FBIs Minneapolis field office knew he was looking into the eyes of aterrorist It was early afternoon on Friday Aug 17 2001 Across from him sat Zacarias Moussaoui a33-year-old French-born student arrested the day before for overstaying his visa Moussaoui had paidmore than $8000 in cash that summer to sit in a cockpit simulator in a flight school in the suburbs of Minneapolis and learn - in a matter of days - the basics of how to fly a 747-400 Samit a formerintelligence officer at the Navys celebrated Top Gun flight school felt sure the man across the desk from him was a Muslim extremist who was part of a plot to hijack a commercial jetliner filled withpassengers The trick Samit wrote in a soon-to-be-released excerpt of a book hes written about thecase was getting Moussaoui to admit this and reveal details and associates to allow us to stop the plot

Surely the bureau brass in Washington would share his concern Samit thought He was wrongThat same day halfway across the country in the fluorescent-lit hallways of the J Edgar Hoover

FBI headquarters building in Washington counterterrorism supervisors were treating Samits firstreports about Moussaoui with skepticism even contempt Michael Maltbie a DC counterterrorism

specialist insisted repeatedly in the days after the arrest that there was no clear link between Moussaouiand Al Qaeda - the link needed for a warrant Maltbie thought Moussaoui was a dirty bird he latertold investigators but favored deporting him to France

Believing a hijacking might be imminent Samit appealed to his boss in Minneapolis SpecialAgent Greg Jones Jones picked up the phone on Aug 27 and called Maltbie at FBI HQ

Moussaoui he said might be part of a plot to get control of an airplane and crash it into theWorld Trade Center or something like that

Maltbie scoffed You have a guy interested in this type of aircraft Maltbie replied accordingto FBI documents That is it (Maltbie declined requests for an interview)

At least Maltbie was paying attention Michael Rolince who ran the FBIs InternationalTerrorism Operations Section was arguably the bureaus most important go-between with the White

House on domestic terrorist threats in the summer of 2001 He tells Newsweek he spent less than 20seconds being briefed on the Moussaoui case that August His office was inundated with terrorismprobes he said since Moussaoui was in custody already he posed no immediate threat Did it rise tothe level of something that I would take upstairs Rolince asks The answer is no

At CIA headquarters alarm bells were ringing loudly CIA Director George Tenet was briefedon Moussaoui within days of the arrest receiving a paper with the eye-catching headline IslamicExtremist Learns to Fly But the FBIs acting director that summer and the bureaus most seniorcounterterrorism official were left in the dark[Article continues here httpwwwthedailybeastcomnewsweek20110904the-terrible-missed-chancehtml]

Pan Am Flight 103 - Lockerbie Bombing - al-Megrahi CIA FilesWebwire | 31 August2011

BACM ResearchPaperlessArchivescom has announced the publishing of CIA files related to the PanAm Flight 103 Lockerbie Bombing

The files can be downloaded at no cost at httpwwwpaperlessarchivescompanam103ciahtml The files date from 1984 to 1999 These are the most recent files on Pan Am 103 released by the

CIA This set of files is unique because it includes memos on the direct handling of an intelligencesource This type of information is exempt from the Freedom of Information Act (FOIA) and is not oftenreleased by the Agency

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2242

The files cover information received by the CIA on Abdel Basset al-Megrahi Al-Megrahi is theonly person ever convicted in the Pan AM 103 case The Scottish government in 2009 allowed al-Megrahi to be released from custody and returned to Libya because of his failing health With the recentfall of Muammar Qaddafis regime there have been renewed calls for al-Megrahi to be returned toScottish custody or extradited to the United States and put on trial[Complete article is available here httpwwwwebwirecomViewPressRelaspaId=144692]

Getting The Caucasus Emirate Right

CSIS | August 2011

ldquohellipThis report aims to set straight a rather distorted record It demonstrates the veracity of three vitallyimportant facts usually obfuscated in discussions of the subject (1) the longstanding and growing tiesbetween the CE and its predecessor organization the ChRI on the one hand and al Qaeda (AQ) and theglobal jihad on the other hand (2) the importance of the CE jihadi terrorist network as a united andorganized political and military force promoting jihad in the region and (3) the salience of local culturaland the Salifist jihadist theo-ideology and the influence of the global jihadi revolutionarymovementalliance as key if not the main factors drive the ldquoviolence in the North Caucasusrdquohelliprdquohttpcsisorgfilespublication110829_Hahn_GettingCaucasusEmirateRt_Webpdf

7 Things You Didnrsquot Know About the War on TerrorForeign Policy | By Eric Schmitt and Thomas Shanker 6 September 2011

From an attempt to negotiate with Osama bin Laden to a proposal to threaten to bomb Mecca its been awild decade for the US national security establishment

Our new book Counterstrike The Untold Story of Americas Secret Campaign Against Al Qaeda is in many ways asummary of the past decade of our reporting on the military intelligence community and domestic law enforcement as itentered a new era of Darwinian evolution to counter violent extremism

It also is our deep dive into a decade of American counterterrorism efforts -- from the work of commando trigger-pullers and spies on the ground up to senior political leaders who wanted to defendthe nation (and get re-elected) Our efforts to report and write this book allowed us to uncover many newmissions never discussed before -- and gave us an understanding of how the war on terror had changedover the last decade

Our book assesses the 10 years since 911 as the military divides the fight into tactical missionson the battlefields of modern terrorism then the operational advancements that provided the means tosuccess while not securing final victory and at the top the strategic level of policy debates about howthe nation should combat this threat to its security

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2342

Here are seven vignettes from Counterstrike that offer glimpses into the thinking of policymakers andcommanders in early days after the Sept 11 attacks and how that thinking evolved over the followingdecade into a more whole-of-government approach to combating terrorists

1 Bush Tried to Negotiate with al Qaeda

The George W Bush administration like all of its predecessors swore never to negotiate with terroristsBut it did undertake an extraordinary and extraordinarily secret outreach effort to open a line of communication with Osama bin Laden and al Qaedas senior leadership It was an attempt to replicatehow the United States tried to sustain a dialogue with the Soviet Union even during the darkest days of the Cold War when White House and Kremlin leaders described in private and in public a set of acceptable behaviors -- and described with equal clarity the swift vicious even nuclear punishment forgross violations

In the months after the Sept 11 attacks Bushs national security staff working through theintelligence agencies made several attempts to get a private message to bin Laden and his inner circleThe messages were sent through business associates of the bin Laden familys vast financial empire aswell as through some of the al Qaeda leaders closest relatives a number of whom were receptive toopening a secret dialogue to restrain and contain their terrorist kinsman whom they viewed as a blot on

their name (To be sure other relatives were openly hostile to the American entreaties)According to a senior American intelligence officer with first-hand knowledge of the effort the

response from Osama bin Laden was silence And the effort was suspended

2 Sometimes a Wedding Is Just a WeddingIn the early days after the Sept 11 attacks the CIA and FBI vied to produce the most compellingintelligence reports that tracked suspected terrorist plots The agencies often worked at cross purposessometimes unwittingly At one point in early 2002 both agencies were tracking what American analystssaid were growing preparations for a major wedding somewhere in the Midwest (In terroristvernacular the word wedding is often code for a major attack)

Dribs and drabs on this wedding planning made their way to President Bush from bothagencies independent of each other of course

Finally over the Easter holiday during a video-teleconference with top aides in Washingtonfrom his ranch in Crawford Texas Bush stopped the briefing exasperated by the discrepancies in therival agencies reporting about the suspected threat

George Bob get together and sort this out Bush told his CIA director George J Tenet andFBI director Robert S Mueller III

Bushs instincts were correct When the analysts finally untangled their clues it turned out thatthe ominous wedding really was just that the matrimony of a young man and a young woman fromtwo prominent Pakistani-American families There was no threat There was no plot

3 The Threat to Bomb MeccaAs fears of a second attack mounted following the 911 strikes US government planners franticallycast about for strategies to protect the country Even the most far-fetched ideas had a hearing howeverbriefly In one case some government planners proposed that if al Qaeda appeared ready to attack America again the United States should publicly threaten to bomb the city of Mecca in Saudi Arabiathe holiest site in all of Islam in retaliation Just nuts one Pentagon aide wrote to himself when heheard the proposal The idea was quickly and permanently shelved

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2442

4 The SEAL Raid in Iran That Didnt HappenWhen US forces routed the Taliban government in Afghanistan and forced bin Laden and his toplieutenants to flee many senior al Qaeda leaders including bin Laden and his deputy Ayman al-Zawahri escaped to neighboring Pakistan But a separate group including the al Qaeda leaders sonSaad bin Laden fled to northern Iran where American troops would not pursue them and the Iranianswould likely not detain them But the Shiite clerics running Iran placed the al Qaeda operatives and theirfamily members under virtual house arrest and they became a shield against possible attacks from theSunni-based terrorist organization

One plan in particular illustrated the bold thinking and wildly unrealistic aims of the militarysinitial approach after 911 to kill or capture terrorist leaders The plan called for hunting the eight to 10senior al Qaeda leaders and operatives who had sought refuge in Chalus an Iranian resort town on theCaspian Sea where they had been detained

At the Joint Special Operations Command at Fort Bragg NC military planners drew up optionsfor Navy SEALs to sneak ashore at night using state-of-the-art mini-submarines Once they landed theSEALs would slip past Iranian guards to snatch the al Qaeda leaders Another option called for SpecialOperations helicopters to spirit American commandos into the town and whisk them out again with theirquarry The Americans went as far as conducting two or three rehearsals at an undisclosed locationalong the US Gulf Coast in early 2002 They conducted small-boat insertion exercises involving about

30 Special Operations personnel most SEALs and eventually concluded the mission was feasible if they were provided with more detailed intelligence on the locations of the al Qaeda members and thesecurity around them

The logistics of the mission were daunting Chalus sits at the edge of the Elburz coastal mountainrange about 70 miles north of Tehran and the failed rescue of the American hostages in Iran in April1980 loomed large in commanders memories Eventually Gen Richard B Myers the chairman of theJoint Chiefs of Staff rejected the mission as too risky and too politically volatile Many of the al Qaedaoperatives are reportedly still there

5 Intelligence Hauls of Unusual Size

US intelligence and military commandos have carried out tens of thousands of raids in the decade since911 The amount of material seized from terrorist and insurgent targets has grown to a massive sizeThe Defense Intelligence Agency (DIA) operates exploitation triage centers and giant warehouses forstoring intelligence products -- in war zones rear headquarters in countries like Qatar and back in theUnited States One intelligence analyst said that walking into one of the warehouses for documents andmedia exploitation reminded him of the final scene in Raiders of the Lost Ark when the captured Ark of the Covenant is crated up and rolled into a cavernous storage area that contains all the governmentsother dangerous secrets

All told more than two million individual documents and electronic files have been cataloguedby media type hard copy phone number thumb drive Each is inspected by a linguist working with acommunications analyst or computer expert

The DIA analysts are joined by specialists from other agencies including the FBI and the DrugEnforcement Administration Yet given the overwhelming volume no more than about 10 percent of thecaptured intelligence has ever been analyzed

Intelligence officers say they simply are overwhelmed and untold quality leads may still beburied in the piles of computers digital files travel documents and pocket litter

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2542

6 The Digital Counterjihad Cyberspace is the terrorists ultimate safe haven Its where they recruit raise money and even plotattacks using coded language while playing online video war games The US government fights back

One technique is called false band replacement whereby the intelligence agencies infiltratemilitants networks and post their own material to counter extremist efforts on those same jihadistwebsites The trick is to forge the onscreen trademarks -- web watermarks -- of al Qaeda media sites

This makes messages posted on these sites official and sows dissent and confusion among themilitants

This Internet spoofing can be used in support of more traditional combat missions There is atleast one case confirmed by American officials in which a jihadist website was hacked by Americancyberwarriors to lure a high-value al Qaeda to a surreptitious meeting with extremist counterparts -- onlyto find a US military team in waiting

Getty images

7 First Kill the MullahsUS counterterrorism officials have learned fighting terrorists effectively means targeting specific nodesof that network that support and enable militants who strap on suicide vests This strategy focuses onneutralizing enablers such as the financiers gun-runners and logisticians Among these terror linchpins

are religious leaders who bless attacksHeavenly reward will not await a suicide bomber unless his death and those of his victims is

deemed halal in keeping with Islams sacred sharia law Each militant network has a sharia emir usuallyat the level of a sheikh or mullah In Iraq American commanders specifically killed emirs to throw awrench in a suicide bombing networks

Take him out and suicide bombings from that network are frozen until he is replaced said onemilitary officer with command experience in Iraq hellip[Complete article is available herehttpwwwforeignpolicycomarticles201109067_things_you_didn_t_know_about_the_war_on_terror]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2642

Dick Marty Rendition Report Condemns lsquoCult of Secrecyrsquo

BBC News | 8 September 2011

A report for Europes human rights watchdog has called for greater scrutiny of secret services andsupport for whistleblowers The Council of Europe investigated how countries like Britain GermanyRomania and Lithuania assisted the US with the rendition of terror suspects It said a cult of secrecyhad helped Western governments cover up abuses Defending whistleblowers it singled out USsoldier Bradley Manning accused of passing secrets to Wikileaks He had acted as a whistleblowerand should be treated as such CoE rapporteur Dick Marty wrote in the report which was due to besubmitted to the CoEs Parliamentary Assembly The soldier is currently in a US military prisonawaiting trial for passing restricted material to the controversial website

But the report praised Mr Manning and Wikileaks itself for uncovering evidence of renditionThe CoE represents 47 member-states including both EU countries and Russia and other ex-Sovietstates Mr Martys report focused on the record of Western states explaining that it was based oninvestigations into European links to the controversial US policy of rendition for terrorism suspectsThe CIA allegedly flew terror suspects around the world for interrogation in the years after 911 holdingthem in secret prisons in Europe and elsewhere

No licence to kill

In his 48-page report - entitled Abuse of State Secrecy and National Security - Mr Marty looked at thelevel of control exercised by European states over their security services He urged all states to useindependent parliamentary committees to oversee the work of their secret services saying this was of vital importance for the rule of law and democracy Mr Marty argued that Western governments wereusing the notion of state secrecy to shield their intelligence services from accountability for seriousviolations committed during anti-terrorist operations We consider that this is simply unacceptablehe wrote

A licence to kill (or to abduct and torture) only exists in certain films and in dictatorialregimes In democratic systems parliaments as representatives of the people have a right and duty toknow what the government is doing in the name of the people Mr Marty praised investigative journalists and non-governmental organisations for their work in exposing abuses of authority Stressing

the fundamental role whistleblowers had to play in an open society he warned against a real cult of secrecy as an instrument of power

While it was up to the courts to decide if Bradley Manning had committed any crime he wrotethe CoE was indebted to him for the publication of a recording of a helicopter attack in Iraq in whichthe crew seems to have intentionally targeted and killed civilians

Thanks to Mr Manning he said a large number of embassy reports had allowed us to learnsignificant details of important recent events which are obviously of general interest We therefore join Amnesty International in expressing our worries as to the treatment he receives Mr Marty wrote inthe draft report[Article continues here httpwwwbbccouknewsworld-europe-14820145]Comment This report demonstrates that Dick Marty is not as De Gaulle would say a serious man To

suggest that Bradley Manning is a hero and intelligence agencies bent on defeating terrorists arecriminals should say it all Manning knowingly violated his oath and willfully provided enormousamounts of classified material to WikiLeaks For Marty this is a good thing in the name of transparencyMarty always injudicious and anti-American in his remarks is now moving at warp speed into crackpotterritory

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2742

Al Qarsquoida amp its Affiliates| back to top |

Al Qaeda Is Down Not Out

Los Angeles Times | By Amy Zegart 7 September 2011

US talk of defeating terrorism is dangerously prematureTalk of strategically defeating Al Qaeda is all the rage in the White House these days Defense

Secretary Leon Panetta used the D-word in July President Obama declared in his new counter-terrorism strategy We can say with growing confidence that we have put Al Qaeda on the path todefeat Compared to the woeful state of the economy terrorism has become the administrations feel-good story of the year

Defeat is a big word It is also dangerously misleading Yes the United States has made greatstrides in the last decade to harden targets improve intelligence and degrade the capabilities of violentIslamist extremists Osama bin Ladens death was a major accomplishment But the fight is nowhereclose to being won and Americas most perilous times may lie ahead Three reasons explain why

The first is that strategically defeating Al Qaeda is not nearly as important as it sounds After911 Al Qaeda morphed into a more complicated decentralized and elusive threat consisting of threeelements core Al Qaeda affiliates or franchise groups operating in places like Yemen and Somalia with

loose ties to the core group and homegrown terrorists inspired by violent extremism often through theInternet in the comfort of their own living rooms

Core Al Qaedas capabilities started degrading in 2001 when the US invaded Afghanistandismantled training camps ousted the Taliban and sent Bin Laden running The CIA has estimated thecore group remaining in the AfghanistanPakistan region to number 50 to 100 fighters The last time BinLaden oversaw a successful operation was 2005 when Al Qaeda struck the London transit system

But plots by homegrowns and franchise groups have risen dramatically in recent years The 2009Ft Hood shooting the worst terrorist attack on US soil since 911 was the work of a homegrownterrorist The mastermind of the 2010 Times Square car bomb plot was a naturalized American citizentrained by the Pakistani Taliban not Al Qaeda Another franchise group Al Qaeda in the ArabianPeninsula was behind the foiled 2009 Christmas Day underwear bomber aviation plot and the 2010

plot to explode tampered printer cartridges aboard cargo planes The Bipartisan Policy Center reported11 violent Islamist extremist terrorist incidents against the US homeland in 2009 the most since 911Nearly all involved what former CIA Director Mike Hayden calls a witches brew of radicalizedAmericans and franchise groups

The second reason why talk of defeat is premature has to do with weapons Terrorism againstAmericans is nothing new The potential for terrorist groups to acquire weapons of mass destruction isIn 1995 a Japanese cult released sarin nerve gas in the Tokyo subway killing 12 people and injuringthousands It was the first WMD terrorist attack in modern history and it sparked a wave of presidentialterrorism commissions years before Bin Laden became a household name

It is this specter of the lone fanatic or small group armed with the worlds most devastatingweapons that keeps experts up at night In 2005 60 leading nuclear scientists and terrorism experts were

asked how many believed the odds of a nuclear attack on the US were negligible Only three or fourhands went up most were far more pessimistic Today there is enough nuclear material to build120000 weapons As long as fissile material is poorly stored and rogue states like Iran and North Koreacontinue their illicit weapons programs nuclear terrorism remains a haunting possibility

The third reason is that the FBI has not yet become a first-rate domestic intelligence agencyAnalysts whose work is vital to success are still second-class citizens labeled support staff alongsidesecretaries and janitors and passed over for key jobs including running the bureaus intelligence unitsThe FBIs information technology is so antiquated it belongs in a museum And the old crime-fighting

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2842

culture still lives There is now a move afoot to shrink new classified facilities so that agents dont haveto waste time away from their cases to read intelligence documents thereStrategically defeating Al Qaeda sounds too good to be true Because it is Amy Zegart is a senior fellow at Stanfords Hoover Institution and the author of Eyes on Spies

Congress and the United States Intelligence Community

US Counterterror Chief Al-Qaida On Steady Slide

Bostoncom | 31 August 2011

White House counterterrorism chief John Brennan said al-Qaida is on a steady slide after the death of al-Qaidas latest second-in-command in Pakistan Brennan told The Associated Press on Wednesdaythat its a huge blow in the first official White House comment since Atiyah Abd al-Rahmans reportedkilling by CIA drone strike in Pakistans tribal areas last week

Al-Qaida is sort of on the ropes and taking a lot of shots to the body and the head Brennansaid This is a time not to step back and let them recover a message he says hes sending to hiscounterparts in Pakistan[Article continues herehttpwwwbostoncomnewsnationwashingtonarticles20110831us_counterterror_chief_al_qaida_on_steady_slide ]

Al-Qaeda (AKA Al-Qaida Al-Qarsquoida)

Council on Foreign Relations | 29 August 2011

ldquoAl-Qaeda an international terrorist network is considered the top terrorist threat to the United StatesThe group is wanted for its September 11 2001 attacks on the World Trade Center and the Pentagon aswell as a host of lesser attacks To escape the post-911 US-led war in Afghanistan al-Qaedas centralleadership fled eastward into Pakistan securing a safe haven in loosely governed areas there In July2007 US intelligence agencies found that the organization was regrouping and regaining strength inthese tribal areas along the border with Afghanistan though targeted killings of senior al-Qaeda leadershave since diminished the groups command and control capabilities In February 2009 Director of National Intelligence Dennis C Blair told lawmakers that the groups core is less capable and effective

than it was a year ago The killing of al-Qaedas top leader Osama bin Laden by US forces in Pakistanin May 2011 served a significant blow to the organization but analysts say al-Qaeda remains deadlywith its networks spread all over the world Plus a number of affiliated groups have gained prominencein recent years complicating the task of containing the organizationrdquo

[Article continues here httpwwwcfrorgterrorist-organizationsal-qaeda-k-al-qaida-al-qaidap9126]

Al Qaeda In The Islamic Maghreb

CSIS | 1 September 2011

ldquoAl Qaeda in the Islamic Maghreb (AQIM) emerged from a decades-long militant Islamist tradition inAlgeria In 1998 the Salafist Group for Preaching and Combat (Groupe Salafiste pour la Preacutedication etle Combat or GSPC) broke away from the Armed Islamic Group (GIA) because of the GIArsquos extensive

targeting of civilians Gradually the GSPC evolved to encompass global jihadist ideology in addition toits historical focus on overturning the Algerian state In 2006 the GSPC officially affiliated with alQaeda core soon rebranding itself as al Qaeda in the Islamic Maghreb In the following years AQIMwas able to conduct a small number of large-scale attacks most notably its 2007 bombing of the UNheadquarters in Algiers In recent years counterterrorism pressure and weak governance have combinedto shift the center of AQIMrsquos presence to the Sahara-Sahel region AQIM continues to make its presenceknown through smuggling operations kidnappings and clashes with security forces in the desert In thecoming years general instability within the region could allow AQIM to further expand its influencerdquo[Complete article is available here httpcsisorgfilespublication110901_Thornberry_AQIM_WEBpdf ]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2942

AQ Strategy

The Assynt Report | 11 August 2011

Executive Summary Al-Qaedarsquos broad objectives remain unchanged in the wake of bin Ladenrsquos death There

are nonetheless growing questions over al-Qaedarsquos capability Longstanding paranoiaover the use of electronic communications is heightened by the ongoing US dronecampaign whilst attacks against the West have generally been disrupted at an early stage

The Pakistani Talibanrsquos attack on a Karachi naval base in May 2011 was a significantmilitary success and the first major act of revenge for bin Ladenrsquos killing Furtherattempts to avenge his loss are certain

All parts of al-Qaeda are working within a cohesive framework with the ultimate aim of restoring the Islamic Caliphate (Khilafa) The strategic plan to support this aim wasdrafted by 40 of al-Qaedarsquos brightest thinkers in Kandahar Afghanistan in November1999 This plan consists of four phases each seven years long leading to the dissolutionof corrupt regimes and the union of all newly-liberated states within the Khilafa

Apart from mounting strategic operations al-Qaedarsquos role is to be the inspiration for atruly global jihadist movement It seeks to achieve this through provision of trainingbeing a role model for others to follow extending acceptance and adoption of its tactics

particularly suicide bombings and professionalising jihadist media to build a commonbrand and message between hitherto separate groups

Between the late 1990s and 2003 the organisation was primarily devoted to classicinternational terrorism Most effort is now spent fighting insurgencies from North Africato South Asia The way in which this strategy helps to spread the struggle has been seenin North-West Africa where the initial development of al-Qaeda in the Islamic Maghrebwas in part fed by men returning from fighting with al-Qaeda in Iraq

Since mid-2009 al-Qaeda and its affiliates have increasingly encouraged jihadist-sympathisers resident in Western countries to engage in violence themselves withoutcentral direction or training making surveillance more difficult

One of the keys to awakening the spirit of jihad was the success in portraying the US and

its allies as Crusaders in the Muslim world Al-Qaedarsquos strategy essentially requires thatthis process be kept running until the forces of jihad have grown large enough to launchsuccessful liberation operations

Despite its successes in Afghanistan al-Qaedarsquos credibility has suffered both from its failure to landanother strategic blow on the West on the scale of 911 and also excessive Muslim casualties in someoperations Similarly al-Qaeda in Iraq was set back by its excessive sectarian zeal and local resentmentat the foreign fighter presence In turn this affected the movementrsquos funding from the Gulf

Analysis Sub-Saharan African Leaders Media Focus On Threats Prior to 911

OSC Feature | Sub-Sahara Africa -- OSC Analysis 6 September 2011Statements by Sub-Saharan African leaders and African media reports on terrorism prior to the 10thanniversary of 911 focus on the growing threats from local extremists and Al-Qaida affiliatesparticularly in West Africa with little direct commentary on the anniversary or US counterterrorismpolicies This focus on domestic threats suggests that counterterrorism messages expressing solidaritywith African nations and acknowledging the evolving terrorist threat on the continent would have thegreatest resonance with African audiences

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3042

Leaders Stressing Determination To Counter Local Threats African leaders public statements reflect an ongoing concern about the threat of terrorism on thecontinent and a strong commitment to find ways to combat this threat

Nigerian President Goodluck Jonathan emphasized the governments commitment tovigorously combat terrorism following the 26 August bombing of the UN office inAbuja by Nigerian extremist group Boko Haram reported the Paris-based news agencyAFP President Jonathan is hosting Liberian President Ellen Johnson Sirleaf and otherforeign dignitaries for a three-day forum on terrorism and economic crimes the widelyread Lagos-based independent daily The Guardian reported on 4 September

Malian President Amadou Toumani Toure launched a Special Program for PeaceSecurity and Development on 9 August stating that development remained the mostviable solution to counter threats to the countrys stability reported Malis state-owneddaily LEssor[ 3] The program aimed to undermine support for Al-Qaida in the IslamicMaghreb (AQIM) according to Burkinabe web portal Lefasonet on 11 August

Somali Prime Minister Abdiweli Muhammad Gas stated on 23 August that theTransitional Federal Government planned to remove Al-Shabaab from the central andsouthern regions in Somalia with the goal of restoring peace within one year so the

country can hold national elections according to the Puntland-based Garowe Online

Experts Media Highlight New Capabilities Tactics

African experts and media outlets are warning about the evolving nature of terrorist organizations on thecontinent the terrorists pursuit of new targets and tactics and their potential for taking advantage of regional instability

Leading South African think tank the Institute for Security Studies stated on 29 Augustthat Boko Harams attack on the UN in Abuja completes Boko Harams metamorphosisinto an international terrorist group Since December 2010 Boko Haram had killed over600 people in over 70 attacks against Nigerian targets according to the think tank buthad not previously targeted Western or international interests

A 26 August article on the popular Malian web portal Maliweb voiced concern thatAQIM could benefit from Tuareg mercenaries many of whom were recently returningfrom fighting in Libya and could benefit from an increase in arms trafficking through theSahel during the Libyan conflict

Ugandas privately owned Daily Monitor reported on 19 August that AU forces inSomalia warned that Al-Shabaab planned to increase the number of kidnappings andbomb attacks as part of its new strategy to shift from controlling territory in Mogadishuto conducting more of an insurgent campaign

Concern Over Al-Qaida Presence Terrorist Collaboration

West African official statements and media reports reflect a growing concern over an increased Al-

Qaida presence in West Africa and collaboration with AQIM Al-Shabaab and Boko Haram

Nigerian security services reported that the suspected mastermind behind the 26 Augustbombing of the UN office in Abuja was a Boko Haram member with close links to Al-Qaida and Al-Shabaab according Nigerias privately owned Daily Sun

A 28 August report in the privately owned daily Nigerian Tribune claimed that the 26August bombing in Abuja was part of Al-Qaidas plans to mark the 10th anniversary of 911 and called Boko Haram Al-Qaidas ally in the region

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3142

An 8 August commentary in Burkina Fasos LObservateur Paalga said that reports of Boko Haram collaboration with Al-Shabaab and AQIM could indicate that Al-Qaida isextending its African tentacles Abdourahmane Dieng security division chief of theEconomic Community of West African States said the collaboration represented a veryserious threat according to Senegals progovernment Le Soleil on 5 August

Messages Likely To Resonate With African Audience

Sub-Saharan Africas increasing concern about the shifting nature and potential strengthening of theterrorist threat on the continent suggests that messages directly addressing the impact of terrorism onAfricans the increasingly complex nature of the threat and the need for multilateral cooperation againstterrorism are most likely to resonate with Africans

Messages expressing solidarity and sympathy for Africans affected by Boko Haram Al-Shabaab and AQIM would almost certainly resonate with a broad African audience

African political and military leaders would probably welcome acknowledgement of thecomplex and changing nature of terrorism on the continent and recognition of theirinitiatives and commitment to countering violent extremism

African leaders and medias concern about potential collaboration between Boko Haram

Al-Shabaab and AQIM suggest that they would be open to improving multilateral andcross-regional sharing of lessons learned and strategies to counter the intensification of terrorism within Africa

Aviation and Maritime Security| back to top |

Bomb Threats Force Jets To Land

Associated Press | 7 September 2011

Both landed safely one landed in Ankara Ataturk International Airport and the other at Kuala LumpurTwo flights operated by Pakistans state-owned airline received bombs threats on Wednesday

and both landed safely one in Turkey the other in Malaysia officials said No bombs were found The

first flight was headed for Manchester England when it was notified of the threat near the Bulgariancapital of Sofia The crew contacted the control tower in Istanbul to seek permission for the landingstate-run Anatolia news agency reported Authorities quickly evacuated all 378 passengers from theBoeing 777-300ER aircraft after it parked at a remote corner of the International Ataturk Airport andbomb squads began searching the plane with sniffer dogs Anatolia reported PIA spokesman MashoodTajwar confirmed the flight received a threat and landed All passengers were safe A police searchturned up no bomb officials said Later a second PIA flight from Islamabad to Kuala Lumpur alsoreceived a bomb threat It landed in Kuala Lumpur and all the passengers disembarked safely saidTajwar The UK-bound Pakistan International Airlines plane was forced to make an emergency landingat Ataturk Airport in Istanbul after receiving a bomb threat Malaysias airports authority said thepassengers were being screened and the plane was isolated in a parking area while being searched bypolice No bomb was found

It said the plane carried 164 passengers and 13 crew Azmi Murad senior general manager forthe authority said the Pakistani airline informed it that the warning came by email Mr Tajwar gave nodetails on the nature of the threat or how it was delivered Pakistan is home to al Qaedas top leadershipMilitants who trained there have been responsible for many of the attacks and failed plots in the USand Europe since Sept 11 2001 when planes hijacked by al Qaeda militants destroyed the World TradeCenter in New York and crashed into the Pentagon The bomb threats came four days before the 10thanniversary of 911 but there was no apparent link to Islamist militants who typically do not alertauthorities in advance The FBI and Homeland Security department issued warnings last weekend aboutal Qaeda threats to small airlines

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3242

Commentary amp Opinion| back to top |

From Terror Group Founder To Libyan Rebel Military Commander

ABCNews | 29August 2011

The same man who triumphantly led Libyan rebels into Gadhafis compound last week first came to theattention of the US intelligence community years ago - as a founder of a terror group

Abdelhakim Belhaj who was recently appointed to Tripolis rebel military council was one of the original founders of the Libyan Islamic Fighting Group an anti-Gadhafi group which was laterdesignated by the US State Department as a terrorist organization with links to al Qaeda according toUS government reports

We proudly announce the liberation of Libya and that Libya has become free and that the ruleof the tyrant and the era of oppression is behind us a victorious Belhaj told reporters after the stormingof Gadhafis Bab al-Aziziya compound last week Ousting Gadhafi had been the main objective of theLIFG since its inception in the early 1990s even if some of the fighters believed that meant puttingAmericans in the crossfire

The group carried out operations against the Libyan government including at least four suspectedassassination attempts against Gadhafi in the 1990s and was also believed to be connected to a series of suicide bombings in Casablanca Morocco in 2003 the US State Department reported As relationsbetween the US and Gadhafi improved in the mid-2000s some LIFG leaders cultivated relationshipswith top al Qaeda leaders including Osama bin Laden and were suspected of funneling fighters to Iraq tocarry out operations against US soldiers

When the LIFG was designated a terror organization in 2004 it was meant as a gesture of solidarity with the Libyan government according to a March 2011 congressional report

Contrary to several US government reports Libyan rebel ambassador to the US Ali Aujalitold ABC News that the LIFG was never connected to al Qaeda and did not carry out terrorist operations

They were only opposed to Gadhafi during his rule and paid the price for that by beingoppressed by the regime Aujali said

The CIA first publicly voiced its concerns about the connection between the LIFG and al Qaedain 2004 when then-director George Tenet testified before the Senate Select Committee on Intelligenceand listed the LIFG among groups that represented an immediate threat [that] has benefited from alQaeda links[Article continues here httpabcnewsgocomBlotterterror-group-founder-libyan-rebel-military-commanderstoryid=14405319]

Interview With Saudi Sheik Wajdi Al-Ghazawi

MemriTVcom

Sheik Wajdi al-Ghazawi owner of al-Fajr TV criticizes extremist atmosphere in Saudi Arabia and saysafter 911 They Handed Out Sweets on the Streets of Mecca

Following are excerpts from a statement by Saudi Sheik Wajdi Al-Ghazawi owner of Al-FajrTV which was posted on YouTube on August 4 2011

Wajdi Al-Ghazawi When Al-Qaeda and Osama Bin Laden were at the height of their mightthey were extremely popular in Saudi Arabia From mosque pulpits across Saudi Arabia preacherswould pray for their success Moreover from the pulpits of the most important mosques ndash the Al-HaramMosque in Mecca and the Nabawi Mosque in Al-Madina ndash direct prayers for the success of Al-Qaedawere made during the days of the bombing of Tora Bora Oh Allah help our brothers in AfghanistanThese supplications were made during evening prayers as well as Friday prayers The preachers wouldpray for them in violation of the ministrys instructions

When the twin towers in New York were attacked they handed out sweets on the streets of Mecca By Allah they did I witnessed this myself The young people bowed in prayer and hugged one

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3342

another out of joy People were in heaven because of these young men who destroyed America andbombed this idol Am I right or not Was it like that or not

Back then when the Taliban broke off a piece of the nose of the Buddha statue which was hewnin the mountain an entire sermon was dedicated to it in the mosque in Mecca and the preacher was laterreprimanded for this sermon The entire Saudi people supported and loved Al-Qaeda

This went on until our brothers in Al-Qaeda ndash and I dont know what was going through theirminds ndash began to carry out operations inside Saudi Arabia Thats when we all raised our hands andsaid Youve gone too far We wont support you in this

The atmosphere here in Saudi Arabia is one of extremism It is characterized by focusing onminor details Many things are forbidden Yes maybe they are indeed forbidden but by forcing peopleto avoid them and by acting as if these were major sins an atmosphere was created that gave rise toextremist youth who might act recklessly at the most trivial provocation

For instance we blew out of proportion the issue of music the issue of smoking or the issue of hanging pictures in public places True there are clear texts on these issues but the young peopleembraced these issues as if they were fighting usury fornication or alcohol No these are not among theseven major sins So our society has become extreme

This extremist atmosphere has given rise to people who accuse others of heresy and people whopurport to be waging Jihad It has created genes that gave rise to cells of Al-Qaeda and other terrorists

We must examine our breeding ground in which these young men were sownBy Allah what can possibly emerge from such an atmosphere Muftis who accuse others of

heresy sheiks who incite and young people who bomb Am I right or not[Complete clip is available here httpwwwmemritvorgclipen3099htm]

Legal Aspects amp Lawfare| back to top |

Revisiting A Stale Counterterrorism Law

Council on Foreign Relations | 1 September 2011

ldquoNearly a decade after 911 the United States still relies on the 2001 Authorization for the Use of Military Force (AUMF) for the killing and detention of those considered responsible for or associatedwith the terrorist attacks But CFR national security law expert John Bellinger says it is becomingincreasingly difficult for the Obama administration to justify some of its counterterrorism operationsunder this limited statutory authority It has been used in defense of actions including drone attacks onindividuals as well as the targeting of groups in Yemen and Somalia that may have only the mosttenuous affiliation or association to the 911 attack A revised AUMF should clarify those operations aswell as the issue of detention specifically which individuals can be detained for how long and subjectto what processes There also needs to be greater effort at the international level he adds to fill thegaps in the law that covers conflicts between states and non-state actorsrdquohelliprdquo[Complete article is available here httpwwwcfrorgcounterterrorismrevisiting-stale-

counterterrorism-lawp25742]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3442

Narco-Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector[Complete article is available here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Mexicos Cartels Move Into Extortion

At a construction site of an apartment building in the heart of the Mexican capital a company engineerruns through his weekly payroll sheet He has salaries written out for carpenters bricklayers andelectricians At the bottom of the sheet is a notation of $200 for ldquosecurity servicesrdquo next to a nicknameldquoEl Indiordquo mdash the Indian [Complete article is available here

httpwwwtucsonsentinelcomnationworldreport090611_mexico_cartels_bribesmexicos-cartels-move-into-extortion ]

Seven Die In Mexican Pacific Port City

Latin American Herald Tribune

Seven people died in separate shootings in Mazatlan a port city in the northwestern Mexican state of Sinaloa with some of the incidents drug-related a police spokesman told Efe [Complete article is available herehttpwwwlahtcomarticleaspCategoryId=14091ampArticleId=423061]

Tijuana Violence Slows As One Cartel Takes Control

BorderlandBeatcom

Mexicos famously seedy border city of Tijuana is enjoying a lull in drug murders as the countrys mostpowerful cartel gains the upper hand over its rivals [Complete article is available here httpwwwborderlandbeatcom201109tijuana-violence-slows-as-one-cartelhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3542

Network Notes| back to top |

Canadian data foreign threats Spying in the digital age (Suggested by a reader in Lithuania ndash thanks) Globe and Mail | By Colin Freeze 31 July 2010

A government spy agency thatrsquos prohibited from monitoring Canadian citizens is now usingldquoinformation about Canadiansrdquo to zero in on foreign threatsThe ambiguous statement found in a new government report detailing the activities of CommunicationsSecurity Establishment Canada could sanction a range of intelligence-gathering activities ndash includingthe controversial practice of mining ldquometadatardquo from digital communications

Metadata ndash often called data about data ndash are found in e-mails and their attachments and containdigital signatures that can reveal when where and by whom documents were created

The collection of metadata has caused controversy in other countries but never in Canada wherethe Communications Security Establishment Canada operates as an ultra-secretive agency About theonly thing that is known about the classified practices is that they were halted and resumed after someldquomajor changesrdquo including directives signed by Defence Minister Peter MacKay

ldquoI cannot comment on specific operational activitiesrdquo Adrian Simpson a CSEC spokesman toldThe Globe He stressed that reviews upheld that the activities in question were ldquocarried out inaccordance with the law ministerial requirements and CSECrsquos policies and proceduresrdquo

ldquoCSEC is prohibited from directing its activities at Canadians anyone in Canada or Canadiansanywhere in the worldrdquo he said

For decades signals-intelligence agencies in the West have been allowed to safeguard nationalsecurity by eavesdropping on foreignersrsquo conversations Spies can whatever phone lines and satellitesignals they can so long as they never listen in on fellow citizens

But in the digital age governments run increasingly sophisticated dragnets scooping up andscouring through millions of intercepted Internet conversations daily Such practices create legalambiguities

ldquoThe whole issue of what constitutes boundaries for signals-intelligence agencies in cyberspaceis a big debate right nowrdquo said Rafal Rohozinski a security expert affiliated with the University of Torontorsquos Munk School

A watchdog agency that reviews the CSECrsquos activities released an annual report to Parliament onJuly 20 ldquoWhen other means have been exhausted CSEC may use information about Canadians when it

has reasonable grounds to believe that using this information may assist in identifying and obtainingforeign intelligencerdquo it reads

Sometimes collecting metadata is relatively benign It can involve aggregating sets of data tospot trends much like the way meteorologists discern national forecasts from localized information

For example while CSEC canrsquot usually monitor the communications of specific Canadian terrorsuspects it can glean insights by zooming out for big-picture patterns One way to do that MrRohozinski said would be to look at data flows between Canadian cities and Yemen where an Internet-savvy al-Qaeda offshoot works to recruit Westerners

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3642

Metadata however can be more revealing Documents that circulate on the Internet travelaround like postmarked letters marked with return addresses ndash e-mails and attachments have embeddedcodes that speak to the who where and when behind their creation

The US National Security Agency found itself mired in controversy a few years go after itskirted domestic-spying bans by secretly upholding that this sort of American metadata was fair gamedistinct from communication contents

Therersquos little to suggest the CSEC would go that far The federal agencyrsquos activities are reviewedby a watchdog body now headed by a former Federal Court of Appeal judge Robert Deacutecary appointedlast year wrote in his annual report that he was satisfied the CSEC activities in question are lawful evenif his predecessors felt them borderline

ldquoThis was the first review of these activities since hellip their resumption under new policiesrdquo thewatchdogrsquos report says It concludes that the surveillance activities are ldquoin accordance with the lawrdquo andfollow ldquomajor changes to certain policies procedures and practicesrdquo

Much of the concern arises from the possibility that CSEC could hand over metadata intelligenceto domestic law-enforcement and security agencies

As it stands the RCMP and CSIS have to develop their domestic investigations before coming toCSEC ndash usually with warrants ndash if they want specific intelligence The rules guiding handovers are strictbecause even though all agencies run surveillance operations they do so under vastly different

mandates and legal standardsThe spy agency however stood by its practicesldquoCSEC is extremely diligent when it comes to the privacy of Canadiansrdquo Mr Simpson said

[complete article is available here httpwwwtheglobeandmailcomnewsnationalcanadian-data-foreign-threats-spying-in-the-digital-agearticle2113772 ]

Cyber Attacks Against NATO Then And Now

New Atlanticist | 6 September 2011

ldquoNow that NATOrsquos Operation UNIFIED PROTECTOR over Libya is winding down it is worth

noting how few cyber incidents were directed in protest against the Alliance Certainly there was a

cyber component to the liberation of Libya but it was more about content and Internet freedom (the

most newsworthy elements here were the role of social media and the Libyan government taking largeparts of the nation offline) But compared to past history NATO cyber defenders had a relatively easy

time

ldquoNATO has not however had an easy 2011 Although there were three significant incidents we

know about none seemed to have been in direct response to operations over Libyahelliprdquo

[Complete article is available here httpwwwacusorgnew_atlanticistcyber-attacks-against-nato-then-

and-now]

The Calm Before The Storm

Foreign Policy | By Joel Brenner 6 September 2011

Cyberwar is already happening -- and its about to get much much worse A veteran cyberwarriorexplains how America can prepare itself

Revelations of wholesale electronic fraud and massive data heists have become weekly evendaily affairs A multinational electronics corporation loses personal information on more than 100million customers Cyberthieves break into an international bank counterfeit credit balances and lootATMs in four countries grabbing $9 million in just a few hours International gangs spread maliciouscode that conscripts unwitting computers into zombie armies of hundreds of thousands of similarlyenslaved machines Criminals then rent these armies called botnets as easily as you can buy a time-sharing arrangement in a beach condo No wonder the vast majority of Internet traffic is spam

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3742

Yet the loss of personal information and related criminal fraud intolerable as they are are theleast threatening face of electronic insecurity The US militarys secret network is penetratedAmericans corporate pockets are being picked clean of the intellectual property that makes the UnitedStates tick And the electricity grid that keeps the lights on and makes everything move is dangerouslyinsecure

In one remote attack on the Pentagons information systems about 10 years ago the Chinesehauled away up to 20 terabytes of information If the information had been on paper theyd have neededa line of moving vans stretching from the Pentagon to freighters docked 50 miles away in Baltimoreharbor just to haul it away Had they done so the military district of Washington wouldve become anactive theater of operations for the first time since 1865 and the Navy wouldve blockaded theChesapeake Bay But the Chinese did it electronically so who noticed

Corporate espionage by both competitors and foreign intelligence services or their surrogates isalso increasing Intelligence officials see this but cant speak openly about the specifics and Im seeingit now in my law practice The victims rarely admit it for understandable reasons Oracle whichsuccessfully sued SAP for theft of its software code was a prominent exception Google was another

When the Chinese penetrated Google in late 2009 -- yes that operation was Chinese and yes itwas done with the blessing of a member of the Politburo -- they werent after customer informationThey were after the source code that makes Google unique Nor was Google the only victim Thousands

of US and Western firms were penetrated in that affair Foreign governments -- and not only theChinese -- understand that they cannot compete with the United States militarily and politically if theycannot compete with it economically so their intelligence services want to steal its corporate intellectualproperty This is the technology that gives America its competitive edge and often it has nothing to dowith defense Ordinary companies with valuable technology are now being targeted by nation-statesThis is a new era National security and economic security have converged

The danger is not limited to the loss of technology and information however The owners andoperators of the North American electricity grid are hooking up their control systems to the Internet asfast as they can Exposing the grid to the Internet makes it marginally more efficient but it also makes itdramatically more vulnerable to disruption If you can remotely penetrate an electronic system to stealinformation you can remotely penetrate it to shut it down or make it go haywire This is why there is no

longer a meaningful difference between information security and operational security And the biggestoperational risk is the grid In contemporary society nothing moves without electricity If the grid goesout the country stops

As the Stuxnet affair demonstrated remotely engineered disruption of industrial control systemsis now a reality That episode involved the successful electronic attack on the centrifuges in the Iraniannuclear program Only a first-class intelligence agency could have pulled that off but the blueprint fordoing it -- the code itself -- is now public Many American industrial control systems run on the samekind of equipment the Iranians were using but unlike the controls on the Iranian centrifuges thecontrols on the US grid are now being connected to the Internet making them easier to disrupt Stuxnetwas a watershed there will be copycats

Other industrial control systems will also be targets Some already are Air traffic control

railroad switches and water and sewage systems are all electronically controlled now and many arevulnerable If an intruder can break into the right server electronically he can remotely shut downproduction send your goods to the wrong destination and even unlock your doors -- and delete your logentries so he leaves no record of ever having been there

The United States does not lack enemies who would attack it this way Seized al Qaedacomputers contain details of US industrial control systems In 2003 a group affiliated with thePakistani terrorist organization Lashkar-e-Taiba -- the same gang that engineered the 2008 terroristassaults in Mumbai -- plotted to attack the Australian grid Other groups conspired to attack the Britishgrid in 2004 2006 and 2009 Yet the owners and operators of the North American grid continue willy-

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3842

nilly to expose their control systems to the Internet instead of isolating and hardening it This is folly of a high order

Important conclusions for public and corporate policy follow from this vulnerable state of

affairs First cyber insecurity has operational consequences In the current and foreseeable states of technology a high degree of assurance against electronic penetration of anything connected to theInternet is not achievable Large efficient electronically connected organizations and nations aretherefore vulnerable to remotely engineered disruption as well as information theft

Second this risk cannot be eliminated -- but it can be reduced and managed As a nation theUnited States should start by isolating the grids controls from the Internet Undoubtedly there aremarginal efficiencies to be gained by seamless connectivity over a publicly accessible infrastructure butthese gains are usually exaggerated and the risk this connectivity creates is staggering The governmentand the major telecommunications carriers must also make the investment required to re-create themassive redundancies that made the wired telephone network so robust Resilience and swift recoveryshould be the goal If the consequences of cyberattacks were reduced penetration would cease to matter

Third companies that wait for the government to solve their own security problems do so attheir peril The government is broke and the IT backbone is 85 percent private so the governmentdoesnt control it The governments role in altering the status quo will be limited to setting standardsusing its purchasing power to move vendors toward better security and getting its own house in order

The government can neither secure corporate intellectual property nor protect firms against operationaldisruption

Fourth in a world in which everything cannot be protected companies must determine forthemselves what intellectual property and physical assets to isolate and safeguard Those that approachthis task seriously will quickly learn that technology is only one aspect of their insecurity and in manycases the easiest to deal with Unless technology is integrated with personnel practices and operationalsecurity it opens vulnerabilities that its users rarely understand This kind of integration requires theautomated enforcement of reasonable security policies and systematic workforce training and thatoccurs only when management the lawyers and the technologists work closely together This is an old-fashioned management challenge -- not a technological one For their part corporate boards need to takeIT security seriously and launch audits that examine how their systems are actually implemented and

used not merely how they are designed Because as the techies like to put it the weakest link in anysystem is not the silicon-based unit on the desk its the carbon-based unit in the chair Joel Brenner is author of the forthcoming America the Vulnerable Inside the New Threat Matrix of

Digital Espionage Crime and Warfare He has served as the inspector general of the National Security

Agency the national counterintelligence executive and the NSAs senior counsel He now practices law

at Cooley LLP in Washington DC

Cyberattacks Decline Slightly Symantec Report Finds

Dark Reading | 1 September 2011

Organizations worldwide are suffering damages as a result of cyberattacks but interestingly there hasbeen a slight decline in these attacks during the past 12 months according to a new report from

Symantec More than 90 percent of the more than 3300 respondents across 36 countries said theyexperienced tangible losses as a result of a hack with 84 percent reporting financial loss to the cost of abreach Around one-fifth lost at least $195000 in breaches during the past 12 months

Meanwhile Symantec attributes the unexpected bright spot of a decline in breaches toorganizations employing better cybersecurity defenses More than 70 percent of organizations sawattacks in the past 12 months a decline of 5 percent from 2010 And those that experienced anincreasing frequency of attacks dropped from 29 percent in 2010 to 21 percent this year While 100percent last year reported losses from cyberattacks 92 percent did so in 2011 The trend seemscounterintuitive given the rash of high-profile breaches this year More

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 2: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 242

Thought for the Day| back to top |

ldquoThe past decade in Afghanistan has convinced many Americans of the folly of large-scale US militaryintervention The Pakistan experience shows that money often buys neither cooperation nor affectionThe United States still needs to find a way to get troops out of Afghanistan and a means to deal with awide range of enormous security challenges in Pakistan Americans should not kid themselves Enduringsuccess in Afghanistan and Pakistan remains essential but it is still a long ways offrdquo~Daniel Markey [For more please see ldquo911 Lessons Afghanistan and Pakistanrdquo under ldquoSpecialrdquo

Flash Points| back to top |

AFGHANISTAN An International Security Assistance Force (ISAF) soldier of undisclosed nationalitywas killed in an attack by unidentified militants in an unspecified area in the east of the country on 7September (Reuters)

PAKISTAN Two Pakistan International Airlines (PIA) passenger aircraft ndash one bound for the UK cityof Manchester and the other bound for Malaysia ndash were forced to perform emergency landings in theTurkish city of Istanbul and the Malaysian capital Kuala Lumpur respectively on 7 September after theairline received emailed bomb threats All passengers were safely evacuated from the aircraft and noviable devices were found onboard either during subsequent search operations (Al-JazeeraReuters)

KENYA At least seven civilians were killed and four others were wounded in a suspected sectarianattack by a group of unidentified tribal militiamen in the Marti area of Isiolo district in Eastern Provinceearly on 7 September (Daily Nation)

IRAQ A senior Awakening Councils commander identified as Sheikh Jassim al-Jubori was killed andone of his bodyguards was wounded in an improvised explosive device (IED) attack by unidentifiedmilitants east of the city of Baqubah in Diyala province on 7 September (Voices of Iraq)

INDIA Three people including an internet cafeacute owner identified as Mehmood Aziz were arrested bysecurity forces in the Kishtwar district of the state of Jammu and Kashmir late on 7 September onsuspicion of connection to an email allegedly sent by Harakat-ul-Jihad-ul-Islami (HUJI) claimingresponsibility for an IED attack on the High Court building in the capital New Delhi earlier that day thatkilled at least 12 people (Al-JazeeraBBC)

PHILIPPINES Two local village officials identified as Jose Pepito and Perlito de Leon were shot

dead by two unidentified militants on a motorcycle in the Tuburan area of Cawayan municipality inMasbate province late on 7 September (Philippines Daily Inquirer)

LIBYA In an audio message broadcast early on 8 September on the Syrian-based Al-Rai televisionstation Muammar Ghadaffi called on Libyans to take up arms against the National Transitional Council(NTC) and accused the organisation of being a front for Western interests in the country He also deniedspeculation that he had fled to neighbouring Niger (Al-JazeeraReutersBBC)

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 342

SYRIA At least 20 people were killed and 20 others were wounded when security forces loyal toPresident Bashar al-Assad ndash supported by tanks and armoured vehicles ndash launched a crackdown on aseries of anti-government demonstrations held in the Bab Dreib and Bostan Diwan districts of the city of Homs in Homs governorate on 7 September (Al-JazeeraBBCReuters)

ISRAELGAZA AND THE WEST BANK A suspected member of the Al-Quds Brigades the armedwing of Palestinian Islamic Jihad (PIJ) identified by the group as Remah Fayez Al-Husseni was killedand two others were wounded in an Israeli air strike targeting their vehicle west of the town of Deir el-Balah in the centre of the Gaza Strip late on 7 September (Maan News AgencyReuters)

UNITED STATES The Department of the Treasury announced on 7 September that three men itsuspected of links to Al-Qaeda ndash identified as Libyan-born Abu Yahya al-Libi Saudi-born Mauritaniannational Abu al-Rahman Ould Muhammad al-Husayn Ould Muhammad Salim and Pakistani nationalMustafa Hajji Muhammad Khan ndash had been added to its list of designated terrorists (Reuters)

Top Headlines| back to top |

Another Deadly Bomb Blast in New Delhi

Time | 7 September 2011

Ten people were killed and 61 injured by a bomb blast inside the Delhi High Court Complex in thecapital on Wednesday morning The militant group Harkat ul Jihad al Islami (HuJI) took responsibilityfor the blasts in an email sent to several Indian news organizations The attack seemed to have beencalculated to maximize the loss of life and to take advantage of gaps in the security screening process forthis busy public building [Article continues here httpglobalspinblogstimecom20110907another-deadly-bomb-blast-in-new-delhiiid=pf-main-mostpop2]

Hamas Surfaces In Worsening Israel-Turkey Ties

Jerusalem Post | 8 September 2011Israeli security officials reveal Turkish Chinese Hamas presences

Hamas has established a command post in Turkey that it uses to recruit new operatives andoversee some of its operations in the Middle East Israels Security Agency Shin Bet revealed Hamasrsquospresence in Turkey came up during the Shin Bet investigation into the 13 terrorist cells that it recentlydiscovered operating in the West Bank and Jerusalem One of the cells was working to carry out asuicide-bomb attack in Jerusalem the attack was thwarted A senior Shin Bet official stressed howeverthat the Hamas command post in Turkey was not directly involved in the cells that were capturedalthough one of the senior Hamas members who lives in Jordan also oversees operations in SyriaTurkey and China Shin Bet officials said Hamas operations in China were financial and included moneylaundering and procurement of equipment In Turkey Hamas is believed to be active in recruiting

operatives Meanwhile Strategic Affairs Minister Moshe Yarsquoalon accused Ankara of cooperating withHamas and Iran Hamasrsquos best-known overseas presence is in Damascus home to its political leaderKhaled Mashaal Hamas is believed to be the strongest overseas in Egypt Jordan Syria and Lebanon ndashbut could potentially work together with other groups such as Hezbollah to increase its reach

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 442

Special 911 Lessons Afghanistan and Pakistan| back to top |

911 Lessons Afghanistan and Pakistan

Council on Foreign Relations | By Daniel Markey Senior Fellow for India Pakistan and South Asia

August 26 2011

A decade after 911 the United States is still at war in Afghanistan and lurches from crisis to crisis withPakistan Osama bin Laden is dead and al-Qaeda is weakened but Americas decade in South Asia hasbeen full of mistakes Successes have been too few tallied slowly and at grave cost

The initial US invasion of Afghanistan was revolutionary in its combination of local militiasand their warlord chiefs US Special Forces and air power In Pakistan Washington demanded an endto Islamabads relationship with the Taliban regime in Kabul started a range of joint counterterroroperations and offered a generous package of assistance

At first apparent progress masked deeper problems In Afghanistan the Taliban were routedschools were opened and elections held In Pakistan the military-led government signed up to the Bushadministrations war on terror netting a number of senior al-Qaeda leaders and scores of lower-leveloperatives

Yet many senior al-Qaeda and Taliban leaders evaded capture and used Pakistani safe havens toregroup and plot The Afghan state and its security forces remained weak and corrupt Pakistan failed toend its longstanding relationships with a range of dangerous militant groups

Worse the veneer of success was intoxicating it encouraged an expansion of US ambition andrhetorical commitments even as the war in Iraq preoccupied the Bush administration The resultingmismatch of sweeping noble American aims with meager resources was disastrous Washington failedto destroy al-Qaeda failed to stem the Talibans resurgence and failed to clarify its goals or commitmentto allies and adversaries

The Obama administration came into office in 2009 determined to reverse these losses with newleadership attention money and troops That effort has netted bin Laden and turned the tide on manyAfghan battlefields Still Washington struggles to explain how military victories will translate intoenduring security Efforts to improve relations with Pakistan through aid and engagement have beenoverwhelmed by differences between Islamabad and Washington over whether and how to fight regionalmilitants

The past decade in Afghanistan has convinced many Americans of the folly of large-scale USmilitary intervention The Pakistan experience shows that money often buys neither cooperation noraffection The United States still needs to find a way to get troops out of Afghanistan and a means todeal with a wide range of enormous security challenges in Pakistan Americans should not kidthemselves Enduring success in Afghanistan and Pakistan remains essential but it is still a long waysoff[Part of the series Ten Lessons Since the 911 Attacks in which CFR fellows identify the top threatsand responses going forward Read more in the series here httpwwwcfrorg911ten-lessons-since-911-attacksp25687]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 542

Counterterrorism News by Nation amp Region

Afghanistan

| back to top |

Four NATO Trucks Destroyed in Afghanistan

Afghan Online Press | (Afghanistan) 7 September 2011

Taliban militants have destroyed four NATO trucks carrying supplies for US-led soldiers in Afghanistanin the eastern part of the country Press TV reports The attack occurred place in the city of MohammadAghe in the eastern province of Logar on Monday The incident did not cause any casualties Afghanofficials said Taliban spokesman Zabihullah Mojahid claimed that six NATO trucks had been damaged

NATO tankers and containers carrying fuel for US-led soldiers from Pakistan also come underattack by Tehrik-i-Taliban Pakistan militants in Afghanistans neighbor Hundreds of NATO tankers andcontainers have been destroyed in different parts of Pakistan over the past three years The US militaryand NATO rely heavily on the Pakistani supply route into landlocked Afghanistan more so now thatTaliban attacks are increasing Other routes largely through Russia and the Central Asian states haveproved to be too costly both politically and economically[Article continues here httpwwwaopnewscomtodayhtml]

Taleban Claim Killing 10 Security Forces In Afghan East

Afghan Islamic Press news agency | Peshawar in Pashto 7 September 2011

Two explosions targeted security forces in eastern Khost Province in the early morning on 7 Septemberprivate Pakistan-based Afghan Islamic Press news agency reported A local resident was quoted assaying the first explosion took place when a roadside mine exploded in the Mardikhel area while thesecond blast occurred when explosives placed on a tree went off as the security forces gathered at thescene The eyewitness said he had seen a number of injured people being transported from the area butcould not be more specific as the security forces immediately cordoned off the area and started firing inthe air A local health official told AIP that one body had been transferred from the scene of the incident

Meanwhile Taleban spokesman Zabihollah Mojahed claimed responsibility for the explosionssaying 10 security forces had been killed and a number of others injured in the attack

Afghan Government Rejects UN torture Allegations

Associated Press | 7 September 2011

The Afghan government on Wednesday strongly rejected allegations that its security agencies tortureddetainees mdash charges that were apparently raised in an unpublished UN report

The allegations prompted NATO to temporarily suspend some transfers of detainees frominternational to Afghan-run detention centers They also threatened to further erode the already shakyrelationship between President Hamid Karzais government and the international community InteriorMinister Besmillah Mohammadi and Rahmatullah Nabil head of the Afghan intelligence servicedescribed the NATO decision to suspend detainee transfers as politically motivated and aimed atslowing down the transition of security responsibilities to the Afghan government

Afghanistan is gradually taking over responsibility for the countrys security from the US-ledmilitary coalition as foreign forces aim to withdraw all their combat troops by the end of 2014 TheAfghan government believes that any move to halt the transfer of prisoners under any false excuses is aserious blow to the transition process Mohammadi and Nabil said in a joint statement The twoofficials said that in the past the United Nations in Afghanistan had assured the authorities that theirdetention facilities complied with international human rights standards

They also complained the UN had not given a copy of the report to the government Some of the details of the report have leaked out ahead of its publication prompting the responses The UN hassaid it is still working on finalizing the report and will publish it once it has been completed

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 642

Mohammadi said the government had found out about the allegations in the media The reportapparently included claims of torture such as electric shocks threats of sexual assault and physicaltorture such as the ripping out of nails in Afghan detention facilities The Afghan security agenciesstrongly reject the allegations Mohammadi said adding that international agencies including theUnited Nations had regularly visited Afghan detention facilities Following such visits they assuredauthorities of their satisfactory findings as to the situation in the prisons and compliance with humanrights standards he said hellip[Article continues herehttpnewsyahoocomafghan-government-rejects-un-torture-allegations-130001115html]

Afghan Taliban Spokesman Comments on Turkish Prisoners Release

SITE Monitoring Service | September 2011

Afghan Taliban spokesman Zabihulla remarked on the groups release of four Turkish engineers whowere held for over eight months and noted the well-treatment of the men during their detention In astatement posted on the groups website on September 6 2011 in Arabic and other languagesZabihullah argued that just as the Afghan Taliban treated these and other captives well the enemyshould treat captive fighters well also He reiterated the Afghan Talibans warning to foreign andAfghan companies not to work with the Afghan government and stated However some parties due to

their economic and political interests do not pay attention to the warnings of the Islamic Emirate andcontinue supporting the occupiers Thus the result of their violations will be the punishment and thecapture of their employees by the mujahideen

On September 4 the Afghan Taliban announced that it released four Turkish engineers whoworked for a Turkish company in the Batan area of Paktia province The release they said was basedon Islamic compassion and appreciate for Eid al-Fitr which marks the end of the holy month of Ramadan

Algeria

| back to top | Algerian Security Conference Focuses On Libya

BBC World Service | 7 September 2011

Foreign ministers from North Africa were due to meet in the Algerian capital Algiers on 7 September todiscuss ways of confronting terrorism and preventing the flow of weapons from Libya BBCWSreported High level delegations from France and the United States and diplomats from Mali Niger andMauritania were also due to attend the conference Algeria has expressed concern that arms from Libyacould fall into the hands of the north African branch of Al-Qaidah (AQIM) which has been active in theSahara and has kidnapped westerners the report noted

Algeria To Submit List Of Arms Smugglers At Conference

Le Temps dAlgerie website | Algiers in French 6 September 2011Algeria is expected to submit a list of weapons smugglers in the Sahel region to its partners in the fightagainst terrorism at the conference Algerian privately-owned newspaper Le Temps dAlgerie reportedon 6 September

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 742

Bahrain

| back to top |

Bahrain Panel 101 Activists on Hunger Strike

Associated Press | 7 September 2011

More than 100 jailed Bahraini activists mdash including doctors who treated injured protesters duringmonths of anti-government protests and crackdowns in the Gulf kingdom mdash are on hunger strike an

international panel said Wednesday The Bahrain Commission of Inquiry said in a statement that 84opposition supporters are on hunger strike in prison In addition 17 detained activists have beenhospitalized by the Interior Ministry for their refusal to eat

Hundreds of activists have been imprisoned since February when Shiite-led demonstrations forgreater rights began in the Sunni-ruled Bahrain the home of the US Navys 5th Fleet More than 30people have been killed since protests inspired by Arab uprisings began in February The five-memberpanel has been set up in June to investigate the unrest Wednesdays statement said an internationalexpert on hunger strikes will join the panel to visit the striking detainees and evaluate their condition

Medical advice will be provided and the expert will discuss the challenges of hunger strike thestatement said adding that the hunger strike started nine days ago

Among jailed activists on hunger strike are 20 doctors who are on trial in a special security court

on charges of participating in efforts to overthrow Bahrains 200-year-old monarchy Other jailedopposition supporters have joined the strike including two prominent Shiite activists Abdul Jalil al-Singace and Abdulhadi al-Khawaja They were sentenced to life in prison in June for their role inprotests The doctors trial is being closely watched by rights groups which have criticized Bahrains useof the security court that includes military prosecutors and civilians and military judges

The case against 11 health professionals was back in the special tribunal on Wednesday Noverdict is expected from the session The Bahrain Commission of Inquiry includes international judicialand human rights experts They started the probe with the consent of the Sunni rulers The commissionsfindings are expected Oct 30 Shiites comprise about 70 percent of Bahrains 525000 people but areblocked from top political and security posts[Article continues here httpnewsyahoocombahrain-panel-101-activists-hunger-strike-

112949681html]

Colombia

| back to top |

Colombias Complete Military Command Replaced

Colombia Reports

Colombian President Juan Manuel Santos announced Tuesday that the countrys entire militarycommand has been replaced amid growing concerns about increased violence by illegal armedgroups

[Article continues here httpwwwcolombiareportscomcolombia-newsnews18815-colombias-complete-military-command-replacedhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 842

Denmark

| back to top |

Family Held by Somali Pirates Released

Associated Press | 7 September 2011

Seven Danish hostages including a family with teenage children have been released by Somali piratesafter more than six months in captivity Denmarks Foreign Ministry said Wednesday The Danes -- a

couple with three children ages 12-16 and two crew members -- were captured in the Indian Ocean onFeb 24 while sailing around the world in a yacht

The seven Danes are doing well under the circumstances They are expected back in Denmark in a short time the ministry said in a brief statement It gave no details of how they were released andmade no mention of a ransom being paid No one at the Foreign Ministry was immediately available forcomment

Prime Minister Lars Loekke Rasmussen told public broadcaster DR that the Danes were on theirway back in a chartered airplane paid for by their insurance company Loekke Rasmussen said theirrelease came after a long period of negotiations Jan Quist Johansen his wife Birgit Marie Johansentheir sons Rune and Hjalte and daughter Naja were captured along with the two adult Danish crewmembers when their 43-foot yacht was seized by pirates The Johansens are from Kalundborg 75 miles

west of Copenhagen They set out on their round-the-world journey in 2009 Of course it is verycheerful news said Ole Meridin Petersen chairman of the Kalundborg yacht club where Jan QuistJohansen was a member I can imagine that the hostages after their release need quite a lot of calmMeridin Petersen told The Associated Press

The yacht was seized while the Johansens were sailing through the pirate-infested waters off EastAfrica The family very likely is aware that what they did was not so fortunate They certainly feelpretty bad about it now Meridin Petersen said Hostages are held in hot austere conditions in Somalia -- typically for many months -- before a ransom is agreed on and paid and the hijacked ships and creware released Last year a British sailing couple were released after 388 days in captivity Reportsindicated that a ransom in the region of $1 million was paid for their release Somalia hasnt had afunctioning government since 1991 one of the reasons the piracy trade has flourished hellip

[Article continues here httpwwwfoxnewscomworld20110907denmark-family-held-by-somali-pirates-since-february-releasedtest=latestnews]

France

| back to top |

Western Governments Said Protecting Intelligence Officers From Scrutiny

BBC World Service | 7 September 2011

Western governments have been accused by Europes leading human rights body of shielding theirintelligence services from accountability for serious violations BBC World Service reported on 7

September The reports author the rapporteur for the Council of Europe Dick Marty said theseviolations had occurred during anti-terrorist operations He said a licence to abduct torture or kill onlyexisted in films and dictatorships but western governments were using the notion of state security toprevent parliaments and judges from scrutinising the work of intelligence officers

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 942

India

| back to top |

Deadly Explosion Strikes Courthouse in New Delhi

New York Times | By Jim Yardley 7 September 2011

An explosion ripped through a reception area of an Indian courthouse on Wednesday morning killing atleast 10 people and wounding more than 60 others in a bombing that renewed concerns about Indiarsquos

vulnerability to terrorism It was the second bombing of the courthouse in less than four months

Relatives mourned a victim of the bombing which struck a courthouse reception area Harish TyagiEuropean PressphotoAgency

Witnesses described a chaotic scene at the Delhi High Court after the blast at 1014 am outside areception area used by litigants lawyers and visitors to enter the courthouse

ldquoIt was in shamblesrdquo said Ajay Mehrotra a lawyer who witnessed the explosion ldquoThere wastotal chaos There was blood People were running for their livesrdquo

The Indian home minister Palaniappan Chidambaram called the explosion a terrorist attack andnoted that New Delhi was already in a high state of alert with Parliament in session Mr Chidambaramsaid Indian intelligence agencies had received information in July about a possible terrorist threat to thecity which had been turned over to the local police He did not elaborate about the intelligence reportOn Thursday three people were detained for questioning by the police Reuters reported

ldquoThe bomb blast took place just outside the reception centerrdquo Mr Chidambaram said at a newsconference ldquoIt is suspected that the bomb was placed in a briefcaserdquoReuters reported that a militant terrorist group called HuJI for Harkat-ul-Jihad Islami based largely inPakistan and also Bangladesh had claimed responsibility for the attacks citing security officials

Prime Minister Manmohan Singh speaking to reporters during a visit to Bangladesh condemned

the explosion as ldquoa cowardly act of a terrorist naturerdquoldquoWe will deal with itrdquo Mr Singh said ldquoWe will never succumb to the pressure of terrorismrdquo

Indian authorities have come under renewed criticism in recent months about their preparedness toprevent terrorism Terrorist attacks are a persistent concern in India particularly in the countryrsquos rapidlygrowing cities which have endured a series of bombings in recent years

In July more than 20 people were killed in Mumbai the countryrsquos financial capital from threeblasts timed to the evening rush hour That attack raised painful memories of the bloody November 2008attacks on Mumbai in which militants trained in Pakistan swept through luxury hotels a railway stationand a Jewish center in a rampage that left more than 160 people dead

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1042

Wednesdayrsquos attack at the Delhi High Court exposed anew the weaknesses in the courthousersquossecurity In May a smaller bomb detonated near a parked car outside the courthouse causing no injuriesWitnesses told local media of seeing a black bag in flames after the blast

Rakesh Tiku chairman of the Delhi Bar Association criticized the Delhi police saying ldquothe low-intensity blast in May should have served as an eye-openerrdquo Mr Tiku said hundreds of litigants andclerks passed through the gate where the blast took place each day making it a vulnerable location ldquoTheDelhi High Court requested the Delhi police to install CCTV cameras as well as personnel to man theentrances three or four months ago but no action has been takenrdquo he said

The latest explosion occurred near Gate 5 of the High Court outside a reception center wherevisitors wait for passes to enter the building Lawyers said Wednesday was an especially busy daybecause the court heard public-interest litigation

ldquoWhat are the police doingrdquo asked Mr Mehrotra the lawyer ldquoThe lives of lawyers litigantsand judges are at stakerdquo

Another witness Brijmohan Sharma described a ldquovery loud sound the reverberations fromwhich caused me to lose my balance I got up and was surrounded by people runningrdquo He added ldquoItwas like a scene from a film People were lying on the floor with their hands cut off their legs brokenand bleedingrdquo

The last serious attacks in New Delhi took place in 2008 when coordinated blasts in a park and

in shopping areas killed more than 20 people and injured nearly 100 In those attacks the IndianMujahedeen an Islamic militant group claimed responsibility

The Delhi High Court is in the heart of the capital a short walk from the cityrsquos landmark IndiaGate Rahul Gupta a local resident said he was standing near the courthouse entrance when the groundshook from the blast throwing people onto the road outside the reception area

ldquoSecurity is one area which no one can handle in Delhi at the momentrdquo Mr Gupta said ldquoIt is thefanatical people who are creating these types of problems and trying to create panic in the publicrdquo hellip

The Indian government said that a preliminary analysis found a nitrate-based explosive withtraces of pentaerythritol tetranitrate or PETN a powerful plastic explosive often used in terror plots hellip[Article continues here httpwwwnytimescom20110908worldasia08indiahtml_r=1ampref=world]

Ten Killed In Delhi Blast

Multiple Sources

At least 10 people were killed and 65 others injured in a bomb blast outside the Delhi High Court on themorning of 7 September private Indian television channel IBN Live reported The terror strike took place in a high security area with Parliament the Prime Ministers Office and India Gate in the vicinitythe report said (CNN-IBN website New Delhi in English 07 Sep 11)

According to the website of the private Indian television channel NDT the blast went off at themain entrance to the court on Shershah Suri Road which is normally heavily guarded The bomb wentoff just before the court was about to open the report said (NDTV website Delhi in English 07 Sep 11)

Security officials were quoted by BBCWS as saying they suspected the explosives were hidden

in a briefcase that had been placed beside the desk where passes were being handed out An eyewitnesstold the BBC that it was a powerful blast shaking the ground and buildings around him (BBC WorldService 7 September 2011)

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1142

Delhi On High Alert In Wake Of Blast

Multiple Sources

The Indian capital has been put on high alert following the blast at the Delhi High Court privateEnglish-language TV news Channel Times Now reported (Times Now TV New Delhi in English0530GMT 07 Sep 11)

Hindi channel says received email from group claiming responsibility for attack Indias Hindinews channel Aaj Tak said on 7 September it had received an email claiming responsibility for the blastAccording to the report the email was sent from the ID harkatuljihadi2011gmailcom The channelsaid the police were investigating possible involvement of the Indian Mujahidin (Aaj Tak TV Delhi inHindi 7 September 2011)

Police Probe Possible Links To Al-Qaidah-Linked Group

Noida IBN Live | in English 7 September 2011

Police in Delhi are looking into claims that a Pakistan-based militant group linked to Al-Qaidah theHarkat-ul-Jihad Islami (HUJI) may have been involved in the attack Noida IBN TV reportedAccording to the report in an e-mail sent to a media house HUJI claimed it had carried out the attack inretaliation for the death sentence issued against Afzal Guru the man found guilty of involvement in an

attack on Delhis parliament almost ten years ago We owe the responsibility of todays blasts at highcourt delhi our demand is that Afzal Gurus death sentence should be repealed immediately else wewould target major high courts amp THE SUPREME COURT OF INDIA the e-mail read According tothe report it was sent from the id harkatuljihadi2011gmailcom

Home Minister Announces Probe Into Attack

CNN-IBN website | New Delhi in English 7 September 2011

Indian Home Minister P Chidambaram speaking in parliament said that investigators did not yet knowwho was behind the attack but he blamed it on terrorists seeking to destabilise the country He saidthat the National Investigative Agency (NIA) would carry out a probe into the attack

PM Denounces Blast As Cowardly Act

Doordarshan news website | New Delhi in English 7 September 2011

Prime Minister Manmohan Singh on 7 September described the blast outside the Delhi High Court as acowardly act and urged all political parties to unite and tackle any acts of terrorism state-run Indiantelevision channel DD News reported This is cowardly act of terrorist nature We will deal with it Wewill never succumb to the pressure of terrorism Singh said He said this is a long war in which allpolitical parties all the people of India have to stand united so that the scourge of terrorism is crushed

IED Explosion At Delhi High Court Domestic Islamists Likely Culprits Growing Signs Of Jihadist Agenda

Sterling-Assynt | 7 September 2011

An IED placed inside a briefcase exploded at 1017AM at an entrance to Delhi High Court wherelitigants collect their visitor passes Wednesdays are reserved for public-interest litigation and so thearea was crowded It is likely that the briefcase was placed in the queue at reception before visitors passthrough security checks There is reportedly no CCTV coverage in this area which will makeidentification of the perpetrator difficult

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1242

The blast was of at least medium intensity and created a crater between three to four feet deepAt least eleven people have died and 65 others have been injured ndash a toll that would probably have beenhigher if an international group had been responsible There were no other explosions which has thesame implication Mumbai has been placed on high alert following the attack especially as the HomeMinistry reported in August that coastal cities were under threat from pan-Islamic terror groups Noblame has yet been assigned A minor explosion occurred on 25 May (also a Wednesday) in a car-park near the Court That bomb was constructed using ammonium nitrate and is believed to havemalfunctioned causing no damage or injuries which suggests similar origins to this one

There are reports of an email from Harkat-ul-Jihadi al-Islami (HuJI) claiming responsibilityfor todayrsquos explosion but we remain sceptical about this since the group has not previously made suchclaims via email The nature of the bomb and the use of email to communicate suggest rather theinvolvement of the Indian Mujahideen (IM) Nonetheless the unverified HuJI email demands that AfzalGurursquos death sentence be repealed and this may point towards the involvement of a jihadist agendaGuru was involved in the December 2001 Parliamentary attacks in Delhi and had his mercy petitionrejected by the Home Ministry on 10 August

Todayrsquos incident indicates an increase in successful attacks by local groups A robust securityforce campaign following the 2008 Mumbai attacks diminished the capabilities of groups such as IMThey claimed responsibility for the December 2010 Varanasi bomb blast which killed one and injured

twenty people However IMrsquos likely involvement in the July 2011 blasts in Mumbai and the attack todaypoints towards the rebuilding of its capabilities and possibly also the establishment of closer ties with jihadi groups

We do not expect a spate of attacks to follow imminently but such incidents will continue tooccur possibly on a larger scale as IM continues to regroup following the security clampdownDevelopments in the cases of Afzal Guru and Ajmal Kasab (the surviving gunman from 2008) willprovide cause for further attacks Given a recent warming in relations between India and Pakistan theHigh Court attack will be unlikely to raise tensions between the two countries significantly

Indonesia

| back to top |

Islamic Groups Continue To Harass Religious Minorities Government Silence Further

Encourages Attacks Youths Beaten In East Jakarta

Assynt SEAsia Vol VIII No17 | 7 September 2011

Hard-line Islamic groups continued to intimidate religious minorities without any response from theGovernment at either a local or national level Yudhoyono relies on the support of Islamic parties inParliament and is unlikely to take any decisive action against such incidents This will further encourageradical groups and endangers the countryrsquos reputation for religious tolerance

Three youths were beaten by members of the Islamic Defenders Front (FPI) for allegedly beingdrunk The attack took place in Jakartarsquos business district but it remains unlikely that the FPI will targetforeigners and the security forces will not tolerate any threats to business interests Nonetheless such

incidents highlight a worrying trend towards increasingly hard-line behaviour that remains unchecked bythe Government

We previously reported that the light sentences handed down for the killing of three members of the Ahmadiyah sect will embolden radical groups (see our Report of 3 August) In this period theIslamic Reform Movement (Garis) coerced Ahmadi youths in Cianjur West Java to join mainstreamprayers The Ahmadiyah sect meanwhile was banned from conducting religious activities during theEid holidays by the South Sulawesi administration for fear of provoking violence

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1342

Iran

| back to top |

Two Arrested Al-Qaidah Members Iraqi Three Iranian - Iran Official

ISNA website | Tehran in Persian 7 September 2011

The public prosecutor of Irans Kerman Province Yadollah Movahhed has announced the start of aninvestigation into the case of five people arrested on charges of having links to Al-Qaidah the IranianStudents News Agency (ISNA) reported on 7 September Two of the detainees - arrested on 19 August -are Iraqis and the other three are Iranian nationals Movahhed told ISNA in an interview on 7 SeptemberThe prosecutor said the detained people are accused of carrying illegal arms and munitions and addedthat an investigation is ongoing into the possibility that they were members of a larger group

Israel

| back to top |

Israel Uncovers Planned Hamas Bombing Spree On Israelis

Xinhua | 8 September 2011

Hamas cells operating in the West Bank routed between May and AugustThe Israeli security agency Shin Bet has broken a network of Hamas cells operating in the West Bank and planning a series of attacks against Israeli targets local media reported Wednesday Dozens of

Hamas members comprising 13 militant cells were arrested throughout the West Bank between May andAugust Army Radio reported One of the groups has carried out a bombing attack at the entrance toJerusalem in March in which a British woman was killed and several dozen civilians wounded Anothercell had planned to dispatch a suicide bomber to Jerusalems Pisgat Zeev neighborhood on Aug 21 Theattack was thwarted at the last minute by Shin Bet agents assisted by the Israel Defense Forces (IDF)and police according to Army radio Other groups were in various stages of planning and preparingattacks including bombings and the kidnapping of civilians or soldiers for the release of Palestinians jailed in Israel The Shin Bet concluded based on its interrogations of the group members that theHamas military leadership in Gaza and abroad is exerting considerable efforts to rehabilitate itspresence in the West Bank with financing and weapon smuggling The West Bank has remainedrelatively quiet in recent years Israeli officials attributed the success in preventing violence in the area

to the cooperation between the IDF and the Palestinian National Authoritys security forces

Israeli Air Strike Kills One Gaza Militant

Xinhua | 8 September 2011

Strike follows more rocket launches from Gaza warnings of new battlesAn Israeli air strike killed an Islamic Jihad militant and wounded three others in the central Gaza

Strip town of Dier a-Balah witnesses and medical sources said Local witnesses said the militant diedafter his car was hit by a missile adding that three other people were also wounded The condition of theinjured is stable hospital sources said Earlier Wednesday an Israeli military spokesperson said a rocketwas launched from the Gaza Strip into south Israel adding the projectile landed in an open area and didnot cause injuries or damage None of the Palestinian armed factions has claimed responsibility for the

rocket attack Late on Tuesday a Palestinian militant was killed and two others injured when Israeliwarplanes targeted a group of gunmen east of Khanyounis City south of the Hamas-ruled Gaza Strip

The Gaza Strip witnessed an escalation of bloody violence between Israel and Gaza militantgroups in August leaving 26 Palestinians and three Israelis killed The violence was triggered after eightIsraelis were killed in well-coordinated operation in the Red Sea city of Eilat Israel accused Palestinianmilitants of plotting and carrying out the attack which started from the bordering Sinai Peninsula inEgypt

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1442

Libya

| back to top |

Libyan Extremist Britain Allowed To Stay Was Link To Al-Qaeda In Iran Papers Show

The Daily Telegraph | (London) By Richard Spencer Tripoli

The extremist Ismail Kamoka spent several years sending funds to terrorist groups across the Middle East

An Alleged Libyan extremist who sought political asylum in Britain regularly travelled to Iran from2002 to provide forged documents to extremists linked to al-Qaeda secret files found in a Tripoliintelligence service building have disclosed

The documents seen by The Daily Telegraph unearth British intelligence suspicions about linksbetween Iran and al-Qaeda dating back almost a decade Other details to come out of the documentssent by MI6 and found in the office of the former head of foreign intelligence and later foreign ministerMoussa Koussa who defected in March include the revelation that Britain had begun co-operating withthe Chinese security services on Islamic extremists The extent of Iranian co-operation with al-Qaedahas been disputed in intelligence communities though Iranians are thought to have provided weaponsand explosives to the Taliban in Afghanistan

A number of al-Qaeda operatives including members of the family of Osama bin Laden fled toTehran after the fall of the Taliban in Afghanistan and their precise status in Iran has been unclear Thepapers in Libya do not directly challenge the Iranian government but suggest that al-Qaeda operativeshad more freedom of movement there than previously thought The extremist Ismail Kamoka spent

several years sending funds to terrorist groups across the Middle East including some linked to al-Qaeda the files said Mr Kamoka who had been given indefinite leave to remain in Britain afterarriving from Saudi Arabia in 1994 and claiming asylum travelled from the UK to Iran viaSwitzerland in July 2002 according to one document[Article continues herehttpwwwtelegraphcouknewsworldnewsafricaandindianoceanlibya8740771Libyan-extremist-Britain-allowed-to-stay-was-link-to-al-Qaeda-in-Iran-papers-showhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1542

Nigeria

| back to top |

Bomb Explodes In Violence-Torn Nigerian City Residents

AFP | 6 September 2011

A bomb went off Tuesday in Nigerias northeastern city of Maiduguri disrupting a three-week lull inbombings in the violence-torn city local residents said [Article continues here httpnewsyahoocombomb-explodes-violence-torn-nigerian-city-residents-215718081html]

Pakistan

| back to top |

Pakistan Bans Foreign Travel For Those Involved In Bin-Ladin Probe

The News website | Islamabad in English 7 September 2011

A Pakistani commission investigating the circumstances surrounding the killing of Al-Qaidah chief Usamah Bin-Ladin has banned foreign travel for everyone involved in the probe Pakistani daily TheNews part of the Jang group which owns Geo TV reported on 7 September The paper recalled that thecommission had already directed the countrys interior ministry and the intelligence service ISI toensure that the Bin-Ladin family was not repatriated from Pakistan without the consent of the

commission

More Than 20 Killed In Two Suicide Blasts In Pakistans Quetta

Express247 TV | Lahore in English 5 September 2011

At least 22 people were killed and several others injured in two explosions in the south-westernPakistani city of Quetta on 7 September the website of the Dubai-based private Pakistani TV channelARY News reported According to the channel one blast went off near the residence of the FrontierConstabulary and another one near the commissioner office in Quetta According to the report around100 kilograms of explosives were used in each attack (ARY News website Dubai in English 07 Sep 11)

Private Pakistani English-language TV channel Express 247 carried a series of onscreen scrollswhich said police had confirmed that the two blasts were suicide attacks The report cited police sources

as saying that 25 people were killed and more than 40 injured in the attacks (Express247 TV Lahorein English 0654GMT 07 Sep 11)

BBCM notes that the attacks came after the Pakistani intelligence agency said on 5 August that ithad arrested Al-Qaidah commander Younis Al-Mauritani and two of his accomplices in Quetta

Taleban Say Quetta Blasts Revenge For Recent Al-Qaidah Arrests

AFP | 7 September 2011

The Pakistani Taleban have claimed responsibility for the twin suicide bombs in Quetta on 7 Septembersaying they were carried out to avenge the recent arrests of Al-Qadiah operatives in the city Wecarried out the attacks Taleban spokesman Ehsanullah Ehsan told AFP in a phone call from anundisclosed location

Twin Suicide Bombings In Pakistan Leave 23 Dead

Miami Herald

Twin suicide bombers attacked the home of a senior military officer Wednesday in the western city of Quetta injuring him and killing at least 23 people officials said in a possible revenge attack forPakistans recent arrest of a senior al Qaida commander [Article continues here httpwwwmiamiheraldcom201109072394264twin-suicide-bombings-in-pakistanhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1642

Philippines

| back to top |

Moro Splinter Group Threatens US Soldiers In Philippines But Capabilities Limited

Government-Rebel Negotiations Remain Difficult

Assynt | SEAsia Vol VIII No17 7 September 2011

Ameril Umbra Kato a former senior Moro Islamic Liberation Front (MILF) field commander whoresigned late last year because he rejects peace negotiations has threatened to attack US troops as wellas Filipino security forces and other Government targets US and Filipino troops are currentlyundertaking joint training exercises This is an annual event but the first time they have been conductedin central Mindanao However Katorsquos splinter group the Bangsamoro Islamic Freedom Fighters (BIFF)is believed to have as few as 200 members with generally unsophisticated weapons ConsequentlyBIFFrsquos ability to conduct an attack on US forces is likely to be limited

In this period Kato announced the creation of a political wing to his grouping the BangsamoroIslamic Freedom Movement emphasising his split with MILF Nevertheless he has not been expelledfrom MILF and so is protected by the current ceasefire with Manila though MILF has stronglycondemned Katorsquos threat against US troops It is possible that MILF leadership is content to allow himto operate relatively unimpeded in order to gain greater leverage in its negotiations with theGovernment since they can contrast their more compromising approach with BIFFrsquos threatened

violence Meanwhile negotiations between MILF and the Government continue MILF dismissed theGovernmentrsquos latest proposal for an autonomous region but both sides appear committed to continuingtalks

Russia

| back to top |

Suicide Bombings In Grozny Demonstrate Islamic Insurgencyrsquos Continuing Capabilities In

Chechnya

Stirling Assynt Reports | Report FSU Vol IV No17 7 September 2011

A series of suicide bombings in the Chechen capital on 31 August (which left nine casualties includingseven police officers) has severely undermined President Ramzan Karydovrsquos claims to have successfully

eradicated the Islamic insurgency in the Republic The first suicide bomber reportedly detonated hisexplosives in a densely populated area only 150 metres from a local Parliament building while twofurther jihadists targeted first-response units Significantly the attack occurred during the Muslimholiday of Eid a three day celebration which marks the end of Ramadan during which the risk of jihadist attacks is heightened Indeed in addition to this strike in Grozny jihadist militants carried outfurther attacks in Iraq Nigeria and Algeria during Eid this year

Although no group has claimed responsibility for this incident it bears the hallmark of theCaucasus Emirate and so was likely orchestrated by the grouprsquos newly appointed deputy KhuseynGakayev and his brother Vadalov Indeed the Gakayev brothers are believed to have been behind theattack on the Chechen Parliament in October 2010 demonstrating the grouprsquos capabilities and intent tocarry out such strikes Moreover the timing of these bombings ndash only two months after the

reconciliation of the Caucasus Emiratersquos leader Doku Umarov with Chechen commanders (see our 3August Report) ndash supports this assessment and suggests that further incidents and suicide bombings arelikely given this truce

Suspected Militant Killed In Russias Southern Republic

Interfax news agency | Moscow in Russian 7 September 2011 Russias National Antiterrorist Committee said on 7 September a militant had been killed in the Republicof Kabarda-Balkaria the corporate-owned Russian news agency Interfax reported

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1742

Saudi Arabia

| back to top |

Saudi Arabia Shopping Around For Nuke Technology

Haaretz | 8 September 2011

Ties with Pakistan may remain close as Riyadh seeks nuclear assistanceSynopsis This week brought news that Iran on its own has produced new advanced nuclearcentrifuges According to a report of the International Atomic Energy Agency Iran has begun to installthe centrifuges in its uranium enrichment facility in Natanz But the high-level source noted thatdevelopment and production of the new centrifuges began more than seven years ago That does notspeak of a great technological capability on Irans part Israeli intelligence like its American counterpartviews 2014 or 2015 as the date when Iran will be able to build nuclear weapons says the source - if itwants to and no one blocks it In Saudi Arabia in contrast they are a bit more disturbed by thedevelopments in Iran An American Department of Energy delegation visited Riyadh and met with DrHashim Yamani who heads the King Abdullah City for Atomic and Renewable Energy Saudi Arabiawants to equip itself with nuclear reactors to generate electricity The United States is interested inselling Riyadh reactors for two reasons - fat contracts and the ability to keep close tabs on nucleardevelopments in Saudi Arabia The American administration is concerned that with a nuclear programfor civilian uses Saudi Arabia would actually like to prepare the infrastructure so it could switch to

producing nuclear weapons relatively quickly should Iran possess such weapons Defense ministerSultan Bin Abdul Aziz and the countrys former intelligence chief Turki Bin Faisal reportedly favorthe preparation of a secret nuclear program for military uses in cooperation with a Sunni Muslim ally -Pakistan which possesses dozens of atomic bombs Saudi Arabia reportedly funded Pakistans nuclearweapons program in return for Pakistans promise to aid the monarchy in this area if need be

Serbia

| back to top |

Serbia Threatened By Terrorism Says Dacic

Tanjug | 8 September 2011

US officials warned Serbia of possible terrorist activity particularly against foreign interests

After a warning coming from USA officials Serbia will raise the level of security in all facilitiesbelieved to be a possible target of terrorists the countrys Deputy Prime Minister and Minister of InteriorIvica Dacic stated Wednesday in the Palace of Serbia He stated that the security measures will primarilyrefer to the facilities of foreign countries in Serbia and added that special attention will be paid to thesecurity of air traffic US officials assume that there is a possibility of new terrorist attacks in the USAand other countries including Serbia Dacic said following a meeting with Special Representative of the UN Secretary-General for Disaster Risk Reduction Margareta Wahlstrom in Belgrade and a sessionof the republic headquarters for emergency situations

Somalia

| back to top |

Six Killed In Mortar Attack In Somali CapitalShabeelle Media Network website | Mogadishu in Somali 7 September 2011

Six people were killed and several others injured after three mortars landed in Mogadishus Arjantiinneighbourhood in Kaaraan District on the night of 6 September the privately-owned Shabeelle websitereported It quoted an eyewitness as saying that two of the three mortars fired have caused thecasualties inflicting fear in the residents who returned to their homes after Al-Shabab vacated the areaearly last month Kaaraan District is one of the areas taken over by the government forces and AUpeacekeepers

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1842

United States

| back to top |

Post-911 Intelligence Reform Takes Root Problems Remain

Reuters | 8 September 2011

US intelligence agencies will forever be scarred by their failure to connect the dots and detect theSeptember 11 plot but a decade later efforts to break down barriers to information-sharing are takingroot Changing a culture of need-to-know to need-to-share does not come easily in spy circles Someofficials say they worry a decade later about a future attack in which it turns out that US spy agencieshad clues in their vast vaults of data but did not put them together or even know they existed

Yet significant changes both big and small have broken down barriers between agenciessmoothed information-sharing and improved coordination US intelligence experts say From issuing ablue badge to everyone working in the sprawling intelligence community to symbolize a commonidentity to larger moves of mixing employees from different agencies the goal is singular -- to preventanother attack

Were much further ahead David Shedd Defense Intelligence Agency deputy director said of the ability to connect the dots compared with 10 years ago Still signs of a plot to attack the UnitedStates could be missed again My worst fear and I suspect probably one that would come true is that inany future would-be or actual attack God forbid we will be able to find the dots again somewhere

because of simply how much data is collected Shedd said The political response to the failure to stopthe attack was the 2002 creation of the Department of Homeland Security pulling together 22 agenciesto form the third largest US Cabinet department behind the Pentagon and Veterans Affairs

That was followed by the creation in late 2004 of the Director of National Intelligence to overseeall the spy agencies as recommended by the bipartisan 911 commission Previously the CIA directorheld a dual role of also overseeing the multitude of intelligence agencies But in the aftermath of the2001 attacks policymakers decided that was too big of a job for one person to do effectively

Critics argued then and now that the reforms were the governments usual response to crises --create more bureaucracy But others see much-needed change It has been a tremendous improvementsaid Lee Hamilton who was the 911 commission vice chair Its not seamless there are problems andweve still got a ways to go The 2001 attacks involving airliners hijacked by al Qaeda operatives killed

nearly 3000 people in New York Pennsylvania and the Pentagon Various US intelligence and lawenforcement agencies had come across bits of information suggesting an impending attack but failed toput the pieces together The CIA had information about three of the 19 hijackers at least 20 monthsbefore the attacks the National Security Agency had information linking one of the hijackers with alQaeda leader Osama bin Ladens network the CIA knew one hijacker had entered the United States butdid not tell the FBI and an FBI agent warned of suspicious Middle Eastern men taking flying lessons

Have the reforms made America safer Officials say yes and point to the US operation thatkilled bin Laden in Pakistan in May that demanded coordination among intelligence agencies and themilitary But there is an inevitable caveat no one can guarantee there will never be another attack onUS soil On Christmas Day 2009 a Nigerian man linked to an al Qaeda off-shoot tried unsuccessfullyto light explosives sewn into his underwear on a flight to Detroit from Amsterdam It turned out US

authorities had pockets of information about him President Barack Obama used a familiar September 11phrase to describe the 2009 incident as a failure to connect the dots of intelligence that existed acrossour intelligence community

Roger Cressey a former White House National Security Council counterterrorism officialresurrected another September 11 phrase It was a failure of imaginationThe intelligence community had not seen al Qaeda in the Arabian Peninsula a Yemen-based al Qaedaoff-shoot as capable of striking the US homeland If the underwear bomber threat had originated inPakistan they would have gone to battle stations immediately Cressey said Some proposed changesin how authorities would respond to another successful attack still are pending For example creation of

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1942

a common communication system for police firefighters and other emergency personnel remainstangled up in political wrangling in Congress over how to implement it This is a no-brainer Hamiltonsaid The first responders at the scene of a disaster ought to be able to talk with one another Theycannot do it today in most jurisdictions

Former leaders of the 911 commission issued a report card saying nine of its 41recommendations remain unfinished The Office of the Director of National Intelligence hasexperienced growing pains as overseer of the 17 spy agencies churning through four chiefs in six yearsTensions over turf confusion about the DNIs role and problems herding agencies with very powerfulchiefs of their own all came to a crescendo when retired Admiral Dennis Blair the third DNI tried toassert authority over CIA station chiefs who represent the agency in different countries The positionof chief of station is one of the crown jewels of the CIA and they dont want anyone playing with theircrown jewels said Mark Lowenthal a former senior US intelligence official

After a dust-up with CIA Director Leon Panetta who now is defense secretary it was Blair whowas sent packing I think the mistake that some have made is to have viewed the DNI and the Directorof CIA as an eitheror proposition rather than the power of the two working together the DIAs Sheddsaid in an interview in his office There is a history of where that hasnt worked so well I believe it isworking much better today said Shedd who has worked at the DNI CIA and National SecurityCouncil

Intelligence experts say in the current administration Obamas top homeland security andcounterterrorism adviser John Brennan arguably has more power than any of them because he has thepresidents ear Its a reminder that bureaucratic reform or no personalities count in making nationalsecurity policy The improved sharing of secret data has led to yet another set of problems The delugeof bits and bytes has subjected intelligence analysts to information overload as they try to sift through itall for relevant pieces Our analysts still are spending way too much time on finding the informationrather than on the analysis of the information Shedd said There is just too much data to go find it all

The intelligence community wants a system developed that would automatically processinformation from multiple agencies and then make the connections for the analysts

But greater inroads into sharing data across agencies does not guarantee that another attack willbe averted The threat has evolved and officials now are increasingly concerned about a lone wolf plot

by an individual not tied to any militant group that may be more difficult to uncover Those threatswill not come to our attention because of an intelligence community intercept said John Cohen asenior Department of Homeland Security counterterrorism official

They will come to our attention because of an alert police officer an alert deputy sheriff analert store owner an alert member of the public sees something that is suspicious and reports it Cohensaid One measure of the success of post-911 reforms is that a decade later the United States has not hada similar attack Now that could be luck that could be skill we dont really know Hamilton said Butin all likelihood what we have done including the establishment of the Department of HomelandSecurity and the transformation in intelligence and FBI has certainly been helpful[Article continues here ]httpnewsyahoocompost-9-11-u-intelligence-reforms-root-problems-052514320html

Comment the value added provided by the Office of the DNI remains an open question for many withinthe Intelligence Community (IC) and is a favored theme of corridor discussion in IC-member agenciesOn the other hand there is broad agreement among intelligence officials that the degree of cooperationand coordination between intelligence agencies and the character of intelligence sharing has vastlyimproved The fact that there has not been a successful major attack on US soil since 911 ndash not forlack of plotting ndash is in great part testimony to this more effective cooperation

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2042

Jihadist Suggests Striking New York City Bridges

All SITE Intelligence Group | 6 September 2011

A jihadist pointed to what he found to be a weak point of suspension bridges and directed his messageto those who love blasting and explosions In a message posted on the Shumukh al-Islam forum onSeptember 6 2011 the jihadist Abu Suleiman al-Nasser gave a picture of the Verrazano Bridge inNew York on which he drew a red box and arrow on the bridges center He then gave a map on whichhe circled the various bridges in New York City and its boroughs A fellow jihadist offered his ownidea giving a picture of the Hoover Dam and explaining that there is no target more important thandams He wrote that striking a dam may lead to the submerging of cities and the killing of thousands of people and in the case of the Hoover Dam would impact Las Vegas the capital of gambling anddebauchery

Counterterror Veteran is New Deputy FBI Director

Atlanta Journal Constitution | 1September2011

A 24-year FBI veteran with extensive counterterrorism experience Sean Joyce has been named the lawenforcement agencys new deputy director Elevated to the No 2 post within the FBI by Director RobertMueller Joyce replaces Timothy Murphy who is retiring after 23 years with the bureau Since last yearJoyce has been executive assistant director of the national security branch responsible for the FBIs

national security and intelligence operations He earned the Attorney Generals Award for ExceptionalService in 2004 for work on a counterterrorism squad in Dallas In 2008 he was named chief of thecounterterrorism divisions international terrorism operations section with responsibility forinternational terrorism matters within the United States hellip[Complete article is available here httpwwwajccomnewsnation-worldcounterterror-veteran-is-new-1153018html]

Top CIA Official Obama Changed Virtually Nothing

Salon | 1 September2011

PBSs Frontline is airing an examination of Top Secret America on September 6 The show includes arare and lengthy interview with 34-year-CIA-veteran John Rizzo who is described as the most

influential lawyer in CIA historyHere is one quote they include from Rizzo With a notable exception of the lsquoenhanced

interrogationrsquo program the incoming Obama administration changed virtually nothing with respect toexisting CIA programs and operations Things continued Authorities were continued that wereoriginally granted by President Bush beginning shortly after 911 Those were all picked up reviewedand endorsed by the Obama administration hellip[Complete article is available herehttpwwwsaloncomnewspoliticsbarack_obamastory=opiniongreenwald20110901obama]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2142

General Counterterrorism News| back to top |

The Terrible Missed Chance

Newsweek | 4 September 2011

Special Agent Harry Samit of the FBIs Minneapolis field office knew he was looking into the eyes of aterrorist It was early afternoon on Friday Aug 17 2001 Across from him sat Zacarias Moussaoui a33-year-old French-born student arrested the day before for overstaying his visa Moussaoui had paidmore than $8000 in cash that summer to sit in a cockpit simulator in a flight school in the suburbs of Minneapolis and learn - in a matter of days - the basics of how to fly a 747-400 Samit a formerintelligence officer at the Navys celebrated Top Gun flight school felt sure the man across the desk from him was a Muslim extremist who was part of a plot to hijack a commercial jetliner filled withpassengers The trick Samit wrote in a soon-to-be-released excerpt of a book hes written about thecase was getting Moussaoui to admit this and reveal details and associates to allow us to stop the plot

Surely the bureau brass in Washington would share his concern Samit thought He was wrongThat same day halfway across the country in the fluorescent-lit hallways of the J Edgar Hoover

FBI headquarters building in Washington counterterrorism supervisors were treating Samits firstreports about Moussaoui with skepticism even contempt Michael Maltbie a DC counterterrorism

specialist insisted repeatedly in the days after the arrest that there was no clear link between Moussaouiand Al Qaeda - the link needed for a warrant Maltbie thought Moussaoui was a dirty bird he latertold investigators but favored deporting him to France

Believing a hijacking might be imminent Samit appealed to his boss in Minneapolis SpecialAgent Greg Jones Jones picked up the phone on Aug 27 and called Maltbie at FBI HQ

Moussaoui he said might be part of a plot to get control of an airplane and crash it into theWorld Trade Center or something like that

Maltbie scoffed You have a guy interested in this type of aircraft Maltbie replied accordingto FBI documents That is it (Maltbie declined requests for an interview)

At least Maltbie was paying attention Michael Rolince who ran the FBIs InternationalTerrorism Operations Section was arguably the bureaus most important go-between with the White

House on domestic terrorist threats in the summer of 2001 He tells Newsweek he spent less than 20seconds being briefed on the Moussaoui case that August His office was inundated with terrorismprobes he said since Moussaoui was in custody already he posed no immediate threat Did it rise tothe level of something that I would take upstairs Rolince asks The answer is no

At CIA headquarters alarm bells were ringing loudly CIA Director George Tenet was briefedon Moussaoui within days of the arrest receiving a paper with the eye-catching headline IslamicExtremist Learns to Fly But the FBIs acting director that summer and the bureaus most seniorcounterterrorism official were left in the dark[Article continues here httpwwwthedailybeastcomnewsweek20110904the-terrible-missed-chancehtml]

Pan Am Flight 103 - Lockerbie Bombing - al-Megrahi CIA FilesWebwire | 31 August2011

BACM ResearchPaperlessArchivescom has announced the publishing of CIA files related to the PanAm Flight 103 Lockerbie Bombing

The files can be downloaded at no cost at httpwwwpaperlessarchivescompanam103ciahtml The files date from 1984 to 1999 These are the most recent files on Pan Am 103 released by the

CIA This set of files is unique because it includes memos on the direct handling of an intelligencesource This type of information is exempt from the Freedom of Information Act (FOIA) and is not oftenreleased by the Agency

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2242

The files cover information received by the CIA on Abdel Basset al-Megrahi Al-Megrahi is theonly person ever convicted in the Pan AM 103 case The Scottish government in 2009 allowed al-Megrahi to be released from custody and returned to Libya because of his failing health With the recentfall of Muammar Qaddafis regime there have been renewed calls for al-Megrahi to be returned toScottish custody or extradited to the United States and put on trial[Complete article is available here httpwwwwebwirecomViewPressRelaspaId=144692]

Getting The Caucasus Emirate Right

CSIS | August 2011

ldquohellipThis report aims to set straight a rather distorted record It demonstrates the veracity of three vitallyimportant facts usually obfuscated in discussions of the subject (1) the longstanding and growing tiesbetween the CE and its predecessor organization the ChRI on the one hand and al Qaeda (AQ) and theglobal jihad on the other hand (2) the importance of the CE jihadi terrorist network as a united andorganized political and military force promoting jihad in the region and (3) the salience of local culturaland the Salifist jihadist theo-ideology and the influence of the global jihadi revolutionarymovementalliance as key if not the main factors drive the ldquoviolence in the North Caucasusrdquohelliprdquohttpcsisorgfilespublication110829_Hahn_GettingCaucasusEmirateRt_Webpdf

7 Things You Didnrsquot Know About the War on TerrorForeign Policy | By Eric Schmitt and Thomas Shanker 6 September 2011

From an attempt to negotiate with Osama bin Laden to a proposal to threaten to bomb Mecca its been awild decade for the US national security establishment

Our new book Counterstrike The Untold Story of Americas Secret Campaign Against Al Qaeda is in many ways asummary of the past decade of our reporting on the military intelligence community and domestic law enforcement as itentered a new era of Darwinian evolution to counter violent extremism

It also is our deep dive into a decade of American counterterrorism efforts -- from the work of commando trigger-pullers and spies on the ground up to senior political leaders who wanted to defendthe nation (and get re-elected) Our efforts to report and write this book allowed us to uncover many newmissions never discussed before -- and gave us an understanding of how the war on terror had changedover the last decade

Our book assesses the 10 years since 911 as the military divides the fight into tactical missionson the battlefields of modern terrorism then the operational advancements that provided the means tosuccess while not securing final victory and at the top the strategic level of policy debates about howthe nation should combat this threat to its security

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2342

Here are seven vignettes from Counterstrike that offer glimpses into the thinking of policymakers andcommanders in early days after the Sept 11 attacks and how that thinking evolved over the followingdecade into a more whole-of-government approach to combating terrorists

1 Bush Tried to Negotiate with al Qaeda

The George W Bush administration like all of its predecessors swore never to negotiate with terroristsBut it did undertake an extraordinary and extraordinarily secret outreach effort to open a line of communication with Osama bin Laden and al Qaedas senior leadership It was an attempt to replicatehow the United States tried to sustain a dialogue with the Soviet Union even during the darkest days of the Cold War when White House and Kremlin leaders described in private and in public a set of acceptable behaviors -- and described with equal clarity the swift vicious even nuclear punishment forgross violations

In the months after the Sept 11 attacks Bushs national security staff working through theintelligence agencies made several attempts to get a private message to bin Laden and his inner circleThe messages were sent through business associates of the bin Laden familys vast financial empire aswell as through some of the al Qaeda leaders closest relatives a number of whom were receptive toopening a secret dialogue to restrain and contain their terrorist kinsman whom they viewed as a blot on

their name (To be sure other relatives were openly hostile to the American entreaties)According to a senior American intelligence officer with first-hand knowledge of the effort the

response from Osama bin Laden was silence And the effort was suspended

2 Sometimes a Wedding Is Just a WeddingIn the early days after the Sept 11 attacks the CIA and FBI vied to produce the most compellingintelligence reports that tracked suspected terrorist plots The agencies often worked at cross purposessometimes unwittingly At one point in early 2002 both agencies were tracking what American analystssaid were growing preparations for a major wedding somewhere in the Midwest (In terroristvernacular the word wedding is often code for a major attack)

Dribs and drabs on this wedding planning made their way to President Bush from bothagencies independent of each other of course

Finally over the Easter holiday during a video-teleconference with top aides in Washingtonfrom his ranch in Crawford Texas Bush stopped the briefing exasperated by the discrepancies in therival agencies reporting about the suspected threat

George Bob get together and sort this out Bush told his CIA director George J Tenet andFBI director Robert S Mueller III

Bushs instincts were correct When the analysts finally untangled their clues it turned out thatthe ominous wedding really was just that the matrimony of a young man and a young woman fromtwo prominent Pakistani-American families There was no threat There was no plot

3 The Threat to Bomb MeccaAs fears of a second attack mounted following the 911 strikes US government planners franticallycast about for strategies to protect the country Even the most far-fetched ideas had a hearing howeverbriefly In one case some government planners proposed that if al Qaeda appeared ready to attack America again the United States should publicly threaten to bomb the city of Mecca in Saudi Arabiathe holiest site in all of Islam in retaliation Just nuts one Pentagon aide wrote to himself when heheard the proposal The idea was quickly and permanently shelved

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2442

4 The SEAL Raid in Iran That Didnt HappenWhen US forces routed the Taliban government in Afghanistan and forced bin Laden and his toplieutenants to flee many senior al Qaeda leaders including bin Laden and his deputy Ayman al-Zawahri escaped to neighboring Pakistan But a separate group including the al Qaeda leaders sonSaad bin Laden fled to northern Iran where American troops would not pursue them and the Iranianswould likely not detain them But the Shiite clerics running Iran placed the al Qaeda operatives and theirfamily members under virtual house arrest and they became a shield against possible attacks from theSunni-based terrorist organization

One plan in particular illustrated the bold thinking and wildly unrealistic aims of the militarysinitial approach after 911 to kill or capture terrorist leaders The plan called for hunting the eight to 10senior al Qaeda leaders and operatives who had sought refuge in Chalus an Iranian resort town on theCaspian Sea where they had been detained

At the Joint Special Operations Command at Fort Bragg NC military planners drew up optionsfor Navy SEALs to sneak ashore at night using state-of-the-art mini-submarines Once they landed theSEALs would slip past Iranian guards to snatch the al Qaeda leaders Another option called for SpecialOperations helicopters to spirit American commandos into the town and whisk them out again with theirquarry The Americans went as far as conducting two or three rehearsals at an undisclosed locationalong the US Gulf Coast in early 2002 They conducted small-boat insertion exercises involving about

30 Special Operations personnel most SEALs and eventually concluded the mission was feasible if they were provided with more detailed intelligence on the locations of the al Qaeda members and thesecurity around them

The logistics of the mission were daunting Chalus sits at the edge of the Elburz coastal mountainrange about 70 miles north of Tehran and the failed rescue of the American hostages in Iran in April1980 loomed large in commanders memories Eventually Gen Richard B Myers the chairman of theJoint Chiefs of Staff rejected the mission as too risky and too politically volatile Many of the al Qaedaoperatives are reportedly still there

5 Intelligence Hauls of Unusual Size

US intelligence and military commandos have carried out tens of thousands of raids in the decade since911 The amount of material seized from terrorist and insurgent targets has grown to a massive sizeThe Defense Intelligence Agency (DIA) operates exploitation triage centers and giant warehouses forstoring intelligence products -- in war zones rear headquarters in countries like Qatar and back in theUnited States One intelligence analyst said that walking into one of the warehouses for documents andmedia exploitation reminded him of the final scene in Raiders of the Lost Ark when the captured Ark of the Covenant is crated up and rolled into a cavernous storage area that contains all the governmentsother dangerous secrets

All told more than two million individual documents and electronic files have been cataloguedby media type hard copy phone number thumb drive Each is inspected by a linguist working with acommunications analyst or computer expert

The DIA analysts are joined by specialists from other agencies including the FBI and the DrugEnforcement Administration Yet given the overwhelming volume no more than about 10 percent of thecaptured intelligence has ever been analyzed

Intelligence officers say they simply are overwhelmed and untold quality leads may still beburied in the piles of computers digital files travel documents and pocket litter

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2542

6 The Digital Counterjihad Cyberspace is the terrorists ultimate safe haven Its where they recruit raise money and even plotattacks using coded language while playing online video war games The US government fights back

One technique is called false band replacement whereby the intelligence agencies infiltratemilitants networks and post their own material to counter extremist efforts on those same jihadistwebsites The trick is to forge the onscreen trademarks -- web watermarks -- of al Qaeda media sites

This makes messages posted on these sites official and sows dissent and confusion among themilitants

This Internet spoofing can be used in support of more traditional combat missions There is atleast one case confirmed by American officials in which a jihadist website was hacked by Americancyberwarriors to lure a high-value al Qaeda to a surreptitious meeting with extremist counterparts -- onlyto find a US military team in waiting

Getty images

7 First Kill the MullahsUS counterterrorism officials have learned fighting terrorists effectively means targeting specific nodesof that network that support and enable militants who strap on suicide vests This strategy focuses onneutralizing enablers such as the financiers gun-runners and logisticians Among these terror linchpins

are religious leaders who bless attacksHeavenly reward will not await a suicide bomber unless his death and those of his victims is

deemed halal in keeping with Islams sacred sharia law Each militant network has a sharia emir usuallyat the level of a sheikh or mullah In Iraq American commanders specifically killed emirs to throw awrench in a suicide bombing networks

Take him out and suicide bombings from that network are frozen until he is replaced said onemilitary officer with command experience in Iraq hellip[Complete article is available herehttpwwwforeignpolicycomarticles201109067_things_you_didn_t_know_about_the_war_on_terror]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2642

Dick Marty Rendition Report Condemns lsquoCult of Secrecyrsquo

BBC News | 8 September 2011

A report for Europes human rights watchdog has called for greater scrutiny of secret services andsupport for whistleblowers The Council of Europe investigated how countries like Britain GermanyRomania and Lithuania assisted the US with the rendition of terror suspects It said a cult of secrecyhad helped Western governments cover up abuses Defending whistleblowers it singled out USsoldier Bradley Manning accused of passing secrets to Wikileaks He had acted as a whistleblowerand should be treated as such CoE rapporteur Dick Marty wrote in the report which was due to besubmitted to the CoEs Parliamentary Assembly The soldier is currently in a US military prisonawaiting trial for passing restricted material to the controversial website

But the report praised Mr Manning and Wikileaks itself for uncovering evidence of renditionThe CoE represents 47 member-states including both EU countries and Russia and other ex-Sovietstates Mr Martys report focused on the record of Western states explaining that it was based oninvestigations into European links to the controversial US policy of rendition for terrorism suspectsThe CIA allegedly flew terror suspects around the world for interrogation in the years after 911 holdingthem in secret prisons in Europe and elsewhere

No licence to kill

In his 48-page report - entitled Abuse of State Secrecy and National Security - Mr Marty looked at thelevel of control exercised by European states over their security services He urged all states to useindependent parliamentary committees to oversee the work of their secret services saying this was of vital importance for the rule of law and democracy Mr Marty argued that Western governments wereusing the notion of state secrecy to shield their intelligence services from accountability for seriousviolations committed during anti-terrorist operations We consider that this is simply unacceptablehe wrote

A licence to kill (or to abduct and torture) only exists in certain films and in dictatorialregimes In democratic systems parliaments as representatives of the people have a right and duty toknow what the government is doing in the name of the people Mr Marty praised investigative journalists and non-governmental organisations for their work in exposing abuses of authority Stressing

the fundamental role whistleblowers had to play in an open society he warned against a real cult of secrecy as an instrument of power

While it was up to the courts to decide if Bradley Manning had committed any crime he wrotethe CoE was indebted to him for the publication of a recording of a helicopter attack in Iraq in whichthe crew seems to have intentionally targeted and killed civilians

Thanks to Mr Manning he said a large number of embassy reports had allowed us to learnsignificant details of important recent events which are obviously of general interest We therefore join Amnesty International in expressing our worries as to the treatment he receives Mr Marty wrote inthe draft report[Article continues here httpwwwbbccouknewsworld-europe-14820145]Comment This report demonstrates that Dick Marty is not as De Gaulle would say a serious man To

suggest that Bradley Manning is a hero and intelligence agencies bent on defeating terrorists arecriminals should say it all Manning knowingly violated his oath and willfully provided enormousamounts of classified material to WikiLeaks For Marty this is a good thing in the name of transparencyMarty always injudicious and anti-American in his remarks is now moving at warp speed into crackpotterritory

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2742

Al Qarsquoida amp its Affiliates| back to top |

Al Qaeda Is Down Not Out

Los Angeles Times | By Amy Zegart 7 September 2011

US talk of defeating terrorism is dangerously prematureTalk of strategically defeating Al Qaeda is all the rage in the White House these days Defense

Secretary Leon Panetta used the D-word in July President Obama declared in his new counter-terrorism strategy We can say with growing confidence that we have put Al Qaeda on the path todefeat Compared to the woeful state of the economy terrorism has become the administrations feel-good story of the year

Defeat is a big word It is also dangerously misleading Yes the United States has made greatstrides in the last decade to harden targets improve intelligence and degrade the capabilities of violentIslamist extremists Osama bin Ladens death was a major accomplishment But the fight is nowhereclose to being won and Americas most perilous times may lie ahead Three reasons explain why

The first is that strategically defeating Al Qaeda is not nearly as important as it sounds After911 Al Qaeda morphed into a more complicated decentralized and elusive threat consisting of threeelements core Al Qaeda affiliates or franchise groups operating in places like Yemen and Somalia with

loose ties to the core group and homegrown terrorists inspired by violent extremism often through theInternet in the comfort of their own living rooms

Core Al Qaedas capabilities started degrading in 2001 when the US invaded Afghanistandismantled training camps ousted the Taliban and sent Bin Laden running The CIA has estimated thecore group remaining in the AfghanistanPakistan region to number 50 to 100 fighters The last time BinLaden oversaw a successful operation was 2005 when Al Qaeda struck the London transit system

But plots by homegrowns and franchise groups have risen dramatically in recent years The 2009Ft Hood shooting the worst terrorist attack on US soil since 911 was the work of a homegrownterrorist The mastermind of the 2010 Times Square car bomb plot was a naturalized American citizentrained by the Pakistani Taliban not Al Qaeda Another franchise group Al Qaeda in the ArabianPeninsula was behind the foiled 2009 Christmas Day underwear bomber aviation plot and the 2010

plot to explode tampered printer cartridges aboard cargo planes The Bipartisan Policy Center reported11 violent Islamist extremist terrorist incidents against the US homeland in 2009 the most since 911Nearly all involved what former CIA Director Mike Hayden calls a witches brew of radicalizedAmericans and franchise groups

The second reason why talk of defeat is premature has to do with weapons Terrorism againstAmericans is nothing new The potential for terrorist groups to acquire weapons of mass destruction isIn 1995 a Japanese cult released sarin nerve gas in the Tokyo subway killing 12 people and injuringthousands It was the first WMD terrorist attack in modern history and it sparked a wave of presidentialterrorism commissions years before Bin Laden became a household name

It is this specter of the lone fanatic or small group armed with the worlds most devastatingweapons that keeps experts up at night In 2005 60 leading nuclear scientists and terrorism experts were

asked how many believed the odds of a nuclear attack on the US were negligible Only three or fourhands went up most were far more pessimistic Today there is enough nuclear material to build120000 weapons As long as fissile material is poorly stored and rogue states like Iran and North Koreacontinue their illicit weapons programs nuclear terrorism remains a haunting possibility

The third reason is that the FBI has not yet become a first-rate domestic intelligence agencyAnalysts whose work is vital to success are still second-class citizens labeled support staff alongsidesecretaries and janitors and passed over for key jobs including running the bureaus intelligence unitsThe FBIs information technology is so antiquated it belongs in a museum And the old crime-fighting

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2842

culture still lives There is now a move afoot to shrink new classified facilities so that agents dont haveto waste time away from their cases to read intelligence documents thereStrategically defeating Al Qaeda sounds too good to be true Because it is Amy Zegart is a senior fellow at Stanfords Hoover Institution and the author of Eyes on Spies

Congress and the United States Intelligence Community

US Counterterror Chief Al-Qaida On Steady Slide

Bostoncom | 31 August 2011

White House counterterrorism chief John Brennan said al-Qaida is on a steady slide after the death of al-Qaidas latest second-in-command in Pakistan Brennan told The Associated Press on Wednesdaythat its a huge blow in the first official White House comment since Atiyah Abd al-Rahmans reportedkilling by CIA drone strike in Pakistans tribal areas last week

Al-Qaida is sort of on the ropes and taking a lot of shots to the body and the head Brennansaid This is a time not to step back and let them recover a message he says hes sending to hiscounterparts in Pakistan[Article continues herehttpwwwbostoncomnewsnationwashingtonarticles20110831us_counterterror_chief_al_qaida_on_steady_slide ]

Al-Qaeda (AKA Al-Qaida Al-Qarsquoida)

Council on Foreign Relations | 29 August 2011

ldquoAl-Qaeda an international terrorist network is considered the top terrorist threat to the United StatesThe group is wanted for its September 11 2001 attacks on the World Trade Center and the Pentagon aswell as a host of lesser attacks To escape the post-911 US-led war in Afghanistan al-Qaedas centralleadership fled eastward into Pakistan securing a safe haven in loosely governed areas there In July2007 US intelligence agencies found that the organization was regrouping and regaining strength inthese tribal areas along the border with Afghanistan though targeted killings of senior al-Qaeda leadershave since diminished the groups command and control capabilities In February 2009 Director of National Intelligence Dennis C Blair told lawmakers that the groups core is less capable and effective

than it was a year ago The killing of al-Qaedas top leader Osama bin Laden by US forces in Pakistanin May 2011 served a significant blow to the organization but analysts say al-Qaeda remains deadlywith its networks spread all over the world Plus a number of affiliated groups have gained prominencein recent years complicating the task of containing the organizationrdquo

[Article continues here httpwwwcfrorgterrorist-organizationsal-qaeda-k-al-qaida-al-qaidap9126]

Al Qaeda In The Islamic Maghreb

CSIS | 1 September 2011

ldquoAl Qaeda in the Islamic Maghreb (AQIM) emerged from a decades-long militant Islamist tradition inAlgeria In 1998 the Salafist Group for Preaching and Combat (Groupe Salafiste pour la Preacutedication etle Combat or GSPC) broke away from the Armed Islamic Group (GIA) because of the GIArsquos extensive

targeting of civilians Gradually the GSPC evolved to encompass global jihadist ideology in addition toits historical focus on overturning the Algerian state In 2006 the GSPC officially affiliated with alQaeda core soon rebranding itself as al Qaeda in the Islamic Maghreb In the following years AQIMwas able to conduct a small number of large-scale attacks most notably its 2007 bombing of the UNheadquarters in Algiers In recent years counterterrorism pressure and weak governance have combinedto shift the center of AQIMrsquos presence to the Sahara-Sahel region AQIM continues to make its presenceknown through smuggling operations kidnappings and clashes with security forces in the desert In thecoming years general instability within the region could allow AQIM to further expand its influencerdquo[Complete article is available here httpcsisorgfilespublication110901_Thornberry_AQIM_WEBpdf ]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2942

AQ Strategy

The Assynt Report | 11 August 2011

Executive Summary Al-Qaedarsquos broad objectives remain unchanged in the wake of bin Ladenrsquos death There

are nonetheless growing questions over al-Qaedarsquos capability Longstanding paranoiaover the use of electronic communications is heightened by the ongoing US dronecampaign whilst attacks against the West have generally been disrupted at an early stage

The Pakistani Talibanrsquos attack on a Karachi naval base in May 2011 was a significantmilitary success and the first major act of revenge for bin Ladenrsquos killing Furtherattempts to avenge his loss are certain

All parts of al-Qaeda are working within a cohesive framework with the ultimate aim of restoring the Islamic Caliphate (Khilafa) The strategic plan to support this aim wasdrafted by 40 of al-Qaedarsquos brightest thinkers in Kandahar Afghanistan in November1999 This plan consists of four phases each seven years long leading to the dissolutionof corrupt regimes and the union of all newly-liberated states within the Khilafa

Apart from mounting strategic operations al-Qaedarsquos role is to be the inspiration for atruly global jihadist movement It seeks to achieve this through provision of trainingbeing a role model for others to follow extending acceptance and adoption of its tactics

particularly suicide bombings and professionalising jihadist media to build a commonbrand and message between hitherto separate groups

Between the late 1990s and 2003 the organisation was primarily devoted to classicinternational terrorism Most effort is now spent fighting insurgencies from North Africato South Asia The way in which this strategy helps to spread the struggle has been seenin North-West Africa where the initial development of al-Qaeda in the Islamic Maghrebwas in part fed by men returning from fighting with al-Qaeda in Iraq

Since mid-2009 al-Qaeda and its affiliates have increasingly encouraged jihadist-sympathisers resident in Western countries to engage in violence themselves withoutcentral direction or training making surveillance more difficult

One of the keys to awakening the spirit of jihad was the success in portraying the US and

its allies as Crusaders in the Muslim world Al-Qaedarsquos strategy essentially requires thatthis process be kept running until the forces of jihad have grown large enough to launchsuccessful liberation operations

Despite its successes in Afghanistan al-Qaedarsquos credibility has suffered both from its failure to landanother strategic blow on the West on the scale of 911 and also excessive Muslim casualties in someoperations Similarly al-Qaeda in Iraq was set back by its excessive sectarian zeal and local resentmentat the foreign fighter presence In turn this affected the movementrsquos funding from the Gulf

Analysis Sub-Saharan African Leaders Media Focus On Threats Prior to 911

OSC Feature | Sub-Sahara Africa -- OSC Analysis 6 September 2011Statements by Sub-Saharan African leaders and African media reports on terrorism prior to the 10thanniversary of 911 focus on the growing threats from local extremists and Al-Qaida affiliatesparticularly in West Africa with little direct commentary on the anniversary or US counterterrorismpolicies This focus on domestic threats suggests that counterterrorism messages expressing solidaritywith African nations and acknowledging the evolving terrorist threat on the continent would have thegreatest resonance with African audiences

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3042

Leaders Stressing Determination To Counter Local Threats African leaders public statements reflect an ongoing concern about the threat of terrorism on thecontinent and a strong commitment to find ways to combat this threat

Nigerian President Goodluck Jonathan emphasized the governments commitment tovigorously combat terrorism following the 26 August bombing of the UN office inAbuja by Nigerian extremist group Boko Haram reported the Paris-based news agencyAFP President Jonathan is hosting Liberian President Ellen Johnson Sirleaf and otherforeign dignitaries for a three-day forum on terrorism and economic crimes the widelyread Lagos-based independent daily The Guardian reported on 4 September

Malian President Amadou Toumani Toure launched a Special Program for PeaceSecurity and Development on 9 August stating that development remained the mostviable solution to counter threats to the countrys stability reported Malis state-owneddaily LEssor[ 3] The program aimed to undermine support for Al-Qaida in the IslamicMaghreb (AQIM) according to Burkinabe web portal Lefasonet on 11 August

Somali Prime Minister Abdiweli Muhammad Gas stated on 23 August that theTransitional Federal Government planned to remove Al-Shabaab from the central andsouthern regions in Somalia with the goal of restoring peace within one year so the

country can hold national elections according to the Puntland-based Garowe Online

Experts Media Highlight New Capabilities Tactics

African experts and media outlets are warning about the evolving nature of terrorist organizations on thecontinent the terrorists pursuit of new targets and tactics and their potential for taking advantage of regional instability

Leading South African think tank the Institute for Security Studies stated on 29 Augustthat Boko Harams attack on the UN in Abuja completes Boko Harams metamorphosisinto an international terrorist group Since December 2010 Boko Haram had killed over600 people in over 70 attacks against Nigerian targets according to the think tank buthad not previously targeted Western or international interests

A 26 August article on the popular Malian web portal Maliweb voiced concern thatAQIM could benefit from Tuareg mercenaries many of whom were recently returningfrom fighting in Libya and could benefit from an increase in arms trafficking through theSahel during the Libyan conflict

Ugandas privately owned Daily Monitor reported on 19 August that AU forces inSomalia warned that Al-Shabaab planned to increase the number of kidnappings andbomb attacks as part of its new strategy to shift from controlling territory in Mogadishuto conducting more of an insurgent campaign

Concern Over Al-Qaida Presence Terrorist Collaboration

West African official statements and media reports reflect a growing concern over an increased Al-

Qaida presence in West Africa and collaboration with AQIM Al-Shabaab and Boko Haram

Nigerian security services reported that the suspected mastermind behind the 26 Augustbombing of the UN office in Abuja was a Boko Haram member with close links to Al-Qaida and Al-Shabaab according Nigerias privately owned Daily Sun

A 28 August report in the privately owned daily Nigerian Tribune claimed that the 26August bombing in Abuja was part of Al-Qaidas plans to mark the 10th anniversary of 911 and called Boko Haram Al-Qaidas ally in the region

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3142

An 8 August commentary in Burkina Fasos LObservateur Paalga said that reports of Boko Haram collaboration with Al-Shabaab and AQIM could indicate that Al-Qaida isextending its African tentacles Abdourahmane Dieng security division chief of theEconomic Community of West African States said the collaboration represented a veryserious threat according to Senegals progovernment Le Soleil on 5 August

Messages Likely To Resonate With African Audience

Sub-Saharan Africas increasing concern about the shifting nature and potential strengthening of theterrorist threat on the continent suggests that messages directly addressing the impact of terrorism onAfricans the increasingly complex nature of the threat and the need for multilateral cooperation againstterrorism are most likely to resonate with Africans

Messages expressing solidarity and sympathy for Africans affected by Boko Haram Al-Shabaab and AQIM would almost certainly resonate with a broad African audience

African political and military leaders would probably welcome acknowledgement of thecomplex and changing nature of terrorism on the continent and recognition of theirinitiatives and commitment to countering violent extremism

African leaders and medias concern about potential collaboration between Boko Haram

Al-Shabaab and AQIM suggest that they would be open to improving multilateral andcross-regional sharing of lessons learned and strategies to counter the intensification of terrorism within Africa

Aviation and Maritime Security| back to top |

Bomb Threats Force Jets To Land

Associated Press | 7 September 2011

Both landed safely one landed in Ankara Ataturk International Airport and the other at Kuala LumpurTwo flights operated by Pakistans state-owned airline received bombs threats on Wednesday

and both landed safely one in Turkey the other in Malaysia officials said No bombs were found The

first flight was headed for Manchester England when it was notified of the threat near the Bulgariancapital of Sofia The crew contacted the control tower in Istanbul to seek permission for the landingstate-run Anatolia news agency reported Authorities quickly evacuated all 378 passengers from theBoeing 777-300ER aircraft after it parked at a remote corner of the International Ataturk Airport andbomb squads began searching the plane with sniffer dogs Anatolia reported PIA spokesman MashoodTajwar confirmed the flight received a threat and landed All passengers were safe A police searchturned up no bomb officials said Later a second PIA flight from Islamabad to Kuala Lumpur alsoreceived a bomb threat It landed in Kuala Lumpur and all the passengers disembarked safely saidTajwar The UK-bound Pakistan International Airlines plane was forced to make an emergency landingat Ataturk Airport in Istanbul after receiving a bomb threat Malaysias airports authority said thepassengers were being screened and the plane was isolated in a parking area while being searched bypolice No bomb was found

It said the plane carried 164 passengers and 13 crew Azmi Murad senior general manager forthe authority said the Pakistani airline informed it that the warning came by email Mr Tajwar gave nodetails on the nature of the threat or how it was delivered Pakistan is home to al Qaedas top leadershipMilitants who trained there have been responsible for many of the attacks and failed plots in the USand Europe since Sept 11 2001 when planes hijacked by al Qaeda militants destroyed the World TradeCenter in New York and crashed into the Pentagon The bomb threats came four days before the 10thanniversary of 911 but there was no apparent link to Islamist militants who typically do not alertauthorities in advance The FBI and Homeland Security department issued warnings last weekend aboutal Qaeda threats to small airlines

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3242

Commentary amp Opinion| back to top |

From Terror Group Founder To Libyan Rebel Military Commander

ABCNews | 29August 2011

The same man who triumphantly led Libyan rebels into Gadhafis compound last week first came to theattention of the US intelligence community years ago - as a founder of a terror group

Abdelhakim Belhaj who was recently appointed to Tripolis rebel military council was one of the original founders of the Libyan Islamic Fighting Group an anti-Gadhafi group which was laterdesignated by the US State Department as a terrorist organization with links to al Qaeda according toUS government reports

We proudly announce the liberation of Libya and that Libya has become free and that the ruleof the tyrant and the era of oppression is behind us a victorious Belhaj told reporters after the stormingof Gadhafis Bab al-Aziziya compound last week Ousting Gadhafi had been the main objective of theLIFG since its inception in the early 1990s even if some of the fighters believed that meant puttingAmericans in the crossfire

The group carried out operations against the Libyan government including at least four suspectedassassination attempts against Gadhafi in the 1990s and was also believed to be connected to a series of suicide bombings in Casablanca Morocco in 2003 the US State Department reported As relationsbetween the US and Gadhafi improved in the mid-2000s some LIFG leaders cultivated relationshipswith top al Qaeda leaders including Osama bin Laden and were suspected of funneling fighters to Iraq tocarry out operations against US soldiers

When the LIFG was designated a terror organization in 2004 it was meant as a gesture of solidarity with the Libyan government according to a March 2011 congressional report

Contrary to several US government reports Libyan rebel ambassador to the US Ali Aujalitold ABC News that the LIFG was never connected to al Qaeda and did not carry out terrorist operations

They were only opposed to Gadhafi during his rule and paid the price for that by beingoppressed by the regime Aujali said

The CIA first publicly voiced its concerns about the connection between the LIFG and al Qaedain 2004 when then-director George Tenet testified before the Senate Select Committee on Intelligenceand listed the LIFG among groups that represented an immediate threat [that] has benefited from alQaeda links[Article continues here httpabcnewsgocomBlotterterror-group-founder-libyan-rebel-military-commanderstoryid=14405319]

Interview With Saudi Sheik Wajdi Al-Ghazawi

MemriTVcom

Sheik Wajdi al-Ghazawi owner of al-Fajr TV criticizes extremist atmosphere in Saudi Arabia and saysafter 911 They Handed Out Sweets on the Streets of Mecca

Following are excerpts from a statement by Saudi Sheik Wajdi Al-Ghazawi owner of Al-FajrTV which was posted on YouTube on August 4 2011

Wajdi Al-Ghazawi When Al-Qaeda and Osama Bin Laden were at the height of their mightthey were extremely popular in Saudi Arabia From mosque pulpits across Saudi Arabia preacherswould pray for their success Moreover from the pulpits of the most important mosques ndash the Al-HaramMosque in Mecca and the Nabawi Mosque in Al-Madina ndash direct prayers for the success of Al-Qaedawere made during the days of the bombing of Tora Bora Oh Allah help our brothers in AfghanistanThese supplications were made during evening prayers as well as Friday prayers The preachers wouldpray for them in violation of the ministrys instructions

When the twin towers in New York were attacked they handed out sweets on the streets of Mecca By Allah they did I witnessed this myself The young people bowed in prayer and hugged one

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3342

another out of joy People were in heaven because of these young men who destroyed America andbombed this idol Am I right or not Was it like that or not

Back then when the Taliban broke off a piece of the nose of the Buddha statue which was hewnin the mountain an entire sermon was dedicated to it in the mosque in Mecca and the preacher was laterreprimanded for this sermon The entire Saudi people supported and loved Al-Qaeda

This went on until our brothers in Al-Qaeda ndash and I dont know what was going through theirminds ndash began to carry out operations inside Saudi Arabia Thats when we all raised our hands andsaid Youve gone too far We wont support you in this

The atmosphere here in Saudi Arabia is one of extremism It is characterized by focusing onminor details Many things are forbidden Yes maybe they are indeed forbidden but by forcing peopleto avoid them and by acting as if these were major sins an atmosphere was created that gave rise toextremist youth who might act recklessly at the most trivial provocation

For instance we blew out of proportion the issue of music the issue of smoking or the issue of hanging pictures in public places True there are clear texts on these issues but the young peopleembraced these issues as if they were fighting usury fornication or alcohol No these are not among theseven major sins So our society has become extreme

This extremist atmosphere has given rise to people who accuse others of heresy and people whopurport to be waging Jihad It has created genes that gave rise to cells of Al-Qaeda and other terrorists

We must examine our breeding ground in which these young men were sownBy Allah what can possibly emerge from such an atmosphere Muftis who accuse others of

heresy sheiks who incite and young people who bomb Am I right or not[Complete clip is available here httpwwwmemritvorgclipen3099htm]

Legal Aspects amp Lawfare| back to top |

Revisiting A Stale Counterterrorism Law

Council on Foreign Relations | 1 September 2011

ldquoNearly a decade after 911 the United States still relies on the 2001 Authorization for the Use of Military Force (AUMF) for the killing and detention of those considered responsible for or associatedwith the terrorist attacks But CFR national security law expert John Bellinger says it is becomingincreasingly difficult for the Obama administration to justify some of its counterterrorism operationsunder this limited statutory authority It has been used in defense of actions including drone attacks onindividuals as well as the targeting of groups in Yemen and Somalia that may have only the mosttenuous affiliation or association to the 911 attack A revised AUMF should clarify those operations aswell as the issue of detention specifically which individuals can be detained for how long and subjectto what processes There also needs to be greater effort at the international level he adds to fill thegaps in the law that covers conflicts between states and non-state actorsrdquohelliprdquo[Complete article is available here httpwwwcfrorgcounterterrorismrevisiting-stale-

counterterrorism-lawp25742]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3442

Narco-Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector[Complete article is available here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Mexicos Cartels Move Into Extortion

At a construction site of an apartment building in the heart of the Mexican capital a company engineerruns through his weekly payroll sheet He has salaries written out for carpenters bricklayers andelectricians At the bottom of the sheet is a notation of $200 for ldquosecurity servicesrdquo next to a nicknameldquoEl Indiordquo mdash the Indian [Complete article is available here

httpwwwtucsonsentinelcomnationworldreport090611_mexico_cartels_bribesmexicos-cartels-move-into-extortion ]

Seven Die In Mexican Pacific Port City

Latin American Herald Tribune

Seven people died in separate shootings in Mazatlan a port city in the northwestern Mexican state of Sinaloa with some of the incidents drug-related a police spokesman told Efe [Complete article is available herehttpwwwlahtcomarticleaspCategoryId=14091ampArticleId=423061]

Tijuana Violence Slows As One Cartel Takes Control

BorderlandBeatcom

Mexicos famously seedy border city of Tijuana is enjoying a lull in drug murders as the countrys mostpowerful cartel gains the upper hand over its rivals [Complete article is available here httpwwwborderlandbeatcom201109tijuana-violence-slows-as-one-cartelhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3542

Network Notes| back to top |

Canadian data foreign threats Spying in the digital age (Suggested by a reader in Lithuania ndash thanks) Globe and Mail | By Colin Freeze 31 July 2010

A government spy agency thatrsquos prohibited from monitoring Canadian citizens is now usingldquoinformation about Canadiansrdquo to zero in on foreign threatsThe ambiguous statement found in a new government report detailing the activities of CommunicationsSecurity Establishment Canada could sanction a range of intelligence-gathering activities ndash includingthe controversial practice of mining ldquometadatardquo from digital communications

Metadata ndash often called data about data ndash are found in e-mails and their attachments and containdigital signatures that can reveal when where and by whom documents were created

The collection of metadata has caused controversy in other countries but never in Canada wherethe Communications Security Establishment Canada operates as an ultra-secretive agency About theonly thing that is known about the classified practices is that they were halted and resumed after someldquomajor changesrdquo including directives signed by Defence Minister Peter MacKay

ldquoI cannot comment on specific operational activitiesrdquo Adrian Simpson a CSEC spokesman toldThe Globe He stressed that reviews upheld that the activities in question were ldquocarried out inaccordance with the law ministerial requirements and CSECrsquos policies and proceduresrdquo

ldquoCSEC is prohibited from directing its activities at Canadians anyone in Canada or Canadiansanywhere in the worldrdquo he said

For decades signals-intelligence agencies in the West have been allowed to safeguard nationalsecurity by eavesdropping on foreignersrsquo conversations Spies can whatever phone lines and satellitesignals they can so long as they never listen in on fellow citizens

But in the digital age governments run increasingly sophisticated dragnets scooping up andscouring through millions of intercepted Internet conversations daily Such practices create legalambiguities

ldquoThe whole issue of what constitutes boundaries for signals-intelligence agencies in cyberspaceis a big debate right nowrdquo said Rafal Rohozinski a security expert affiliated with the University of Torontorsquos Munk School

A watchdog agency that reviews the CSECrsquos activities released an annual report to Parliament onJuly 20 ldquoWhen other means have been exhausted CSEC may use information about Canadians when it

has reasonable grounds to believe that using this information may assist in identifying and obtainingforeign intelligencerdquo it reads

Sometimes collecting metadata is relatively benign It can involve aggregating sets of data tospot trends much like the way meteorologists discern national forecasts from localized information

For example while CSEC canrsquot usually monitor the communications of specific Canadian terrorsuspects it can glean insights by zooming out for big-picture patterns One way to do that MrRohozinski said would be to look at data flows between Canadian cities and Yemen where an Internet-savvy al-Qaeda offshoot works to recruit Westerners

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3642

Metadata however can be more revealing Documents that circulate on the Internet travelaround like postmarked letters marked with return addresses ndash e-mails and attachments have embeddedcodes that speak to the who where and when behind their creation

The US National Security Agency found itself mired in controversy a few years go after itskirted domestic-spying bans by secretly upholding that this sort of American metadata was fair gamedistinct from communication contents

Therersquos little to suggest the CSEC would go that far The federal agencyrsquos activities are reviewedby a watchdog body now headed by a former Federal Court of Appeal judge Robert Deacutecary appointedlast year wrote in his annual report that he was satisfied the CSEC activities in question are lawful evenif his predecessors felt them borderline

ldquoThis was the first review of these activities since hellip their resumption under new policiesrdquo thewatchdogrsquos report says It concludes that the surveillance activities are ldquoin accordance with the lawrdquo andfollow ldquomajor changes to certain policies procedures and practicesrdquo

Much of the concern arises from the possibility that CSEC could hand over metadata intelligenceto domestic law-enforcement and security agencies

As it stands the RCMP and CSIS have to develop their domestic investigations before coming toCSEC ndash usually with warrants ndash if they want specific intelligence The rules guiding handovers are strictbecause even though all agencies run surveillance operations they do so under vastly different

mandates and legal standardsThe spy agency however stood by its practicesldquoCSEC is extremely diligent when it comes to the privacy of Canadiansrdquo Mr Simpson said

[complete article is available here httpwwwtheglobeandmailcomnewsnationalcanadian-data-foreign-threats-spying-in-the-digital-agearticle2113772 ]

Cyber Attacks Against NATO Then And Now

New Atlanticist | 6 September 2011

ldquoNow that NATOrsquos Operation UNIFIED PROTECTOR over Libya is winding down it is worth

noting how few cyber incidents were directed in protest against the Alliance Certainly there was a

cyber component to the liberation of Libya but it was more about content and Internet freedom (the

most newsworthy elements here were the role of social media and the Libyan government taking largeparts of the nation offline) But compared to past history NATO cyber defenders had a relatively easy

time

ldquoNATO has not however had an easy 2011 Although there were three significant incidents we

know about none seemed to have been in direct response to operations over Libyahelliprdquo

[Complete article is available here httpwwwacusorgnew_atlanticistcyber-attacks-against-nato-then-

and-now]

The Calm Before The Storm

Foreign Policy | By Joel Brenner 6 September 2011

Cyberwar is already happening -- and its about to get much much worse A veteran cyberwarriorexplains how America can prepare itself

Revelations of wholesale electronic fraud and massive data heists have become weekly evendaily affairs A multinational electronics corporation loses personal information on more than 100million customers Cyberthieves break into an international bank counterfeit credit balances and lootATMs in four countries grabbing $9 million in just a few hours International gangs spread maliciouscode that conscripts unwitting computers into zombie armies of hundreds of thousands of similarlyenslaved machines Criminals then rent these armies called botnets as easily as you can buy a time-sharing arrangement in a beach condo No wonder the vast majority of Internet traffic is spam

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3742

Yet the loss of personal information and related criminal fraud intolerable as they are are theleast threatening face of electronic insecurity The US militarys secret network is penetratedAmericans corporate pockets are being picked clean of the intellectual property that makes the UnitedStates tick And the electricity grid that keeps the lights on and makes everything move is dangerouslyinsecure

In one remote attack on the Pentagons information systems about 10 years ago the Chinesehauled away up to 20 terabytes of information If the information had been on paper theyd have neededa line of moving vans stretching from the Pentagon to freighters docked 50 miles away in Baltimoreharbor just to haul it away Had they done so the military district of Washington wouldve become anactive theater of operations for the first time since 1865 and the Navy wouldve blockaded theChesapeake Bay But the Chinese did it electronically so who noticed

Corporate espionage by both competitors and foreign intelligence services or their surrogates isalso increasing Intelligence officials see this but cant speak openly about the specifics and Im seeingit now in my law practice The victims rarely admit it for understandable reasons Oracle whichsuccessfully sued SAP for theft of its software code was a prominent exception Google was another

When the Chinese penetrated Google in late 2009 -- yes that operation was Chinese and yes itwas done with the blessing of a member of the Politburo -- they werent after customer informationThey were after the source code that makes Google unique Nor was Google the only victim Thousands

of US and Western firms were penetrated in that affair Foreign governments -- and not only theChinese -- understand that they cannot compete with the United States militarily and politically if theycannot compete with it economically so their intelligence services want to steal its corporate intellectualproperty This is the technology that gives America its competitive edge and often it has nothing to dowith defense Ordinary companies with valuable technology are now being targeted by nation-statesThis is a new era National security and economic security have converged

The danger is not limited to the loss of technology and information however The owners andoperators of the North American electricity grid are hooking up their control systems to the Internet asfast as they can Exposing the grid to the Internet makes it marginally more efficient but it also makes itdramatically more vulnerable to disruption If you can remotely penetrate an electronic system to stealinformation you can remotely penetrate it to shut it down or make it go haywire This is why there is no

longer a meaningful difference between information security and operational security And the biggestoperational risk is the grid In contemporary society nothing moves without electricity If the grid goesout the country stops

As the Stuxnet affair demonstrated remotely engineered disruption of industrial control systemsis now a reality That episode involved the successful electronic attack on the centrifuges in the Iraniannuclear program Only a first-class intelligence agency could have pulled that off but the blueprint fordoing it -- the code itself -- is now public Many American industrial control systems run on the samekind of equipment the Iranians were using but unlike the controls on the Iranian centrifuges thecontrols on the US grid are now being connected to the Internet making them easier to disrupt Stuxnetwas a watershed there will be copycats

Other industrial control systems will also be targets Some already are Air traffic control

railroad switches and water and sewage systems are all electronically controlled now and many arevulnerable If an intruder can break into the right server electronically he can remotely shut downproduction send your goods to the wrong destination and even unlock your doors -- and delete your logentries so he leaves no record of ever having been there

The United States does not lack enemies who would attack it this way Seized al Qaedacomputers contain details of US industrial control systems In 2003 a group affiliated with thePakistani terrorist organization Lashkar-e-Taiba -- the same gang that engineered the 2008 terroristassaults in Mumbai -- plotted to attack the Australian grid Other groups conspired to attack the Britishgrid in 2004 2006 and 2009 Yet the owners and operators of the North American grid continue willy-

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3842

nilly to expose their control systems to the Internet instead of isolating and hardening it This is folly of a high order

Important conclusions for public and corporate policy follow from this vulnerable state of

affairs First cyber insecurity has operational consequences In the current and foreseeable states of technology a high degree of assurance against electronic penetration of anything connected to theInternet is not achievable Large efficient electronically connected organizations and nations aretherefore vulnerable to remotely engineered disruption as well as information theft

Second this risk cannot be eliminated -- but it can be reduced and managed As a nation theUnited States should start by isolating the grids controls from the Internet Undoubtedly there aremarginal efficiencies to be gained by seamless connectivity over a publicly accessible infrastructure butthese gains are usually exaggerated and the risk this connectivity creates is staggering The governmentand the major telecommunications carriers must also make the investment required to re-create themassive redundancies that made the wired telephone network so robust Resilience and swift recoveryshould be the goal If the consequences of cyberattacks were reduced penetration would cease to matter

Third companies that wait for the government to solve their own security problems do so attheir peril The government is broke and the IT backbone is 85 percent private so the governmentdoesnt control it The governments role in altering the status quo will be limited to setting standardsusing its purchasing power to move vendors toward better security and getting its own house in order

The government can neither secure corporate intellectual property nor protect firms against operationaldisruption

Fourth in a world in which everything cannot be protected companies must determine forthemselves what intellectual property and physical assets to isolate and safeguard Those that approachthis task seriously will quickly learn that technology is only one aspect of their insecurity and in manycases the easiest to deal with Unless technology is integrated with personnel practices and operationalsecurity it opens vulnerabilities that its users rarely understand This kind of integration requires theautomated enforcement of reasonable security policies and systematic workforce training and thatoccurs only when management the lawyers and the technologists work closely together This is an old-fashioned management challenge -- not a technological one For their part corporate boards need to takeIT security seriously and launch audits that examine how their systems are actually implemented and

used not merely how they are designed Because as the techies like to put it the weakest link in anysystem is not the silicon-based unit on the desk its the carbon-based unit in the chair Joel Brenner is author of the forthcoming America the Vulnerable Inside the New Threat Matrix of

Digital Espionage Crime and Warfare He has served as the inspector general of the National Security

Agency the national counterintelligence executive and the NSAs senior counsel He now practices law

at Cooley LLP in Washington DC

Cyberattacks Decline Slightly Symantec Report Finds

Dark Reading | 1 September 2011

Organizations worldwide are suffering damages as a result of cyberattacks but interestingly there hasbeen a slight decline in these attacks during the past 12 months according to a new report from

Symantec More than 90 percent of the more than 3300 respondents across 36 countries said theyexperienced tangible losses as a result of a hack with 84 percent reporting financial loss to the cost of abreach Around one-fifth lost at least $195000 in breaches during the past 12 months

Meanwhile Symantec attributes the unexpected bright spot of a decline in breaches toorganizations employing better cybersecurity defenses More than 70 percent of organizations sawattacks in the past 12 months a decline of 5 percent from 2010 And those that experienced anincreasing frequency of attacks dropped from 29 percent in 2010 to 21 percent this year While 100percent last year reported losses from cyberattacks 92 percent did so in 2011 The trend seemscounterintuitive given the rash of high-profile breaches this year More

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 3: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 342

SYRIA At least 20 people were killed and 20 others were wounded when security forces loyal toPresident Bashar al-Assad ndash supported by tanks and armoured vehicles ndash launched a crackdown on aseries of anti-government demonstrations held in the Bab Dreib and Bostan Diwan districts of the city of Homs in Homs governorate on 7 September (Al-JazeeraBBCReuters)

ISRAELGAZA AND THE WEST BANK A suspected member of the Al-Quds Brigades the armedwing of Palestinian Islamic Jihad (PIJ) identified by the group as Remah Fayez Al-Husseni was killedand two others were wounded in an Israeli air strike targeting their vehicle west of the town of Deir el-Balah in the centre of the Gaza Strip late on 7 September (Maan News AgencyReuters)

UNITED STATES The Department of the Treasury announced on 7 September that three men itsuspected of links to Al-Qaeda ndash identified as Libyan-born Abu Yahya al-Libi Saudi-born Mauritaniannational Abu al-Rahman Ould Muhammad al-Husayn Ould Muhammad Salim and Pakistani nationalMustafa Hajji Muhammad Khan ndash had been added to its list of designated terrorists (Reuters)

Top Headlines| back to top |

Another Deadly Bomb Blast in New Delhi

Time | 7 September 2011

Ten people were killed and 61 injured by a bomb blast inside the Delhi High Court Complex in thecapital on Wednesday morning The militant group Harkat ul Jihad al Islami (HuJI) took responsibilityfor the blasts in an email sent to several Indian news organizations The attack seemed to have beencalculated to maximize the loss of life and to take advantage of gaps in the security screening process forthis busy public building [Article continues here httpglobalspinblogstimecom20110907another-deadly-bomb-blast-in-new-delhiiid=pf-main-mostpop2]

Hamas Surfaces In Worsening Israel-Turkey Ties

Jerusalem Post | 8 September 2011Israeli security officials reveal Turkish Chinese Hamas presences

Hamas has established a command post in Turkey that it uses to recruit new operatives andoversee some of its operations in the Middle East Israels Security Agency Shin Bet revealed Hamasrsquospresence in Turkey came up during the Shin Bet investigation into the 13 terrorist cells that it recentlydiscovered operating in the West Bank and Jerusalem One of the cells was working to carry out asuicide-bomb attack in Jerusalem the attack was thwarted A senior Shin Bet official stressed howeverthat the Hamas command post in Turkey was not directly involved in the cells that were capturedalthough one of the senior Hamas members who lives in Jordan also oversees operations in SyriaTurkey and China Shin Bet officials said Hamas operations in China were financial and included moneylaundering and procurement of equipment In Turkey Hamas is believed to be active in recruiting

operatives Meanwhile Strategic Affairs Minister Moshe Yarsquoalon accused Ankara of cooperating withHamas and Iran Hamasrsquos best-known overseas presence is in Damascus home to its political leaderKhaled Mashaal Hamas is believed to be the strongest overseas in Egypt Jordan Syria and Lebanon ndashbut could potentially work together with other groups such as Hezbollah to increase its reach

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 442

Special 911 Lessons Afghanistan and Pakistan| back to top |

911 Lessons Afghanistan and Pakistan

Council on Foreign Relations | By Daniel Markey Senior Fellow for India Pakistan and South Asia

August 26 2011

A decade after 911 the United States is still at war in Afghanistan and lurches from crisis to crisis withPakistan Osama bin Laden is dead and al-Qaeda is weakened but Americas decade in South Asia hasbeen full of mistakes Successes have been too few tallied slowly and at grave cost

The initial US invasion of Afghanistan was revolutionary in its combination of local militiasand their warlord chiefs US Special Forces and air power In Pakistan Washington demanded an endto Islamabads relationship with the Taliban regime in Kabul started a range of joint counterterroroperations and offered a generous package of assistance

At first apparent progress masked deeper problems In Afghanistan the Taliban were routedschools were opened and elections held In Pakistan the military-led government signed up to the Bushadministrations war on terror netting a number of senior al-Qaeda leaders and scores of lower-leveloperatives

Yet many senior al-Qaeda and Taliban leaders evaded capture and used Pakistani safe havens toregroup and plot The Afghan state and its security forces remained weak and corrupt Pakistan failed toend its longstanding relationships with a range of dangerous militant groups

Worse the veneer of success was intoxicating it encouraged an expansion of US ambition andrhetorical commitments even as the war in Iraq preoccupied the Bush administration The resultingmismatch of sweeping noble American aims with meager resources was disastrous Washington failedto destroy al-Qaeda failed to stem the Talibans resurgence and failed to clarify its goals or commitmentto allies and adversaries

The Obama administration came into office in 2009 determined to reverse these losses with newleadership attention money and troops That effort has netted bin Laden and turned the tide on manyAfghan battlefields Still Washington struggles to explain how military victories will translate intoenduring security Efforts to improve relations with Pakistan through aid and engagement have beenoverwhelmed by differences between Islamabad and Washington over whether and how to fight regionalmilitants

The past decade in Afghanistan has convinced many Americans of the folly of large-scale USmilitary intervention The Pakistan experience shows that money often buys neither cooperation noraffection The United States still needs to find a way to get troops out of Afghanistan and a means todeal with a wide range of enormous security challenges in Pakistan Americans should not kidthemselves Enduring success in Afghanistan and Pakistan remains essential but it is still a long waysoff[Part of the series Ten Lessons Since the 911 Attacks in which CFR fellows identify the top threatsand responses going forward Read more in the series here httpwwwcfrorg911ten-lessons-since-911-attacksp25687]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 542

Counterterrorism News by Nation amp Region

Afghanistan

| back to top |

Four NATO Trucks Destroyed in Afghanistan

Afghan Online Press | (Afghanistan) 7 September 2011

Taliban militants have destroyed four NATO trucks carrying supplies for US-led soldiers in Afghanistanin the eastern part of the country Press TV reports The attack occurred place in the city of MohammadAghe in the eastern province of Logar on Monday The incident did not cause any casualties Afghanofficials said Taliban spokesman Zabihullah Mojahid claimed that six NATO trucks had been damaged

NATO tankers and containers carrying fuel for US-led soldiers from Pakistan also come underattack by Tehrik-i-Taliban Pakistan militants in Afghanistans neighbor Hundreds of NATO tankers andcontainers have been destroyed in different parts of Pakistan over the past three years The US militaryand NATO rely heavily on the Pakistani supply route into landlocked Afghanistan more so now thatTaliban attacks are increasing Other routes largely through Russia and the Central Asian states haveproved to be too costly both politically and economically[Article continues here httpwwwaopnewscomtodayhtml]

Taleban Claim Killing 10 Security Forces In Afghan East

Afghan Islamic Press news agency | Peshawar in Pashto 7 September 2011

Two explosions targeted security forces in eastern Khost Province in the early morning on 7 Septemberprivate Pakistan-based Afghan Islamic Press news agency reported A local resident was quoted assaying the first explosion took place when a roadside mine exploded in the Mardikhel area while thesecond blast occurred when explosives placed on a tree went off as the security forces gathered at thescene The eyewitness said he had seen a number of injured people being transported from the area butcould not be more specific as the security forces immediately cordoned off the area and started firing inthe air A local health official told AIP that one body had been transferred from the scene of the incident

Meanwhile Taleban spokesman Zabihollah Mojahed claimed responsibility for the explosionssaying 10 security forces had been killed and a number of others injured in the attack

Afghan Government Rejects UN torture Allegations

Associated Press | 7 September 2011

The Afghan government on Wednesday strongly rejected allegations that its security agencies tortureddetainees mdash charges that were apparently raised in an unpublished UN report

The allegations prompted NATO to temporarily suspend some transfers of detainees frominternational to Afghan-run detention centers They also threatened to further erode the already shakyrelationship between President Hamid Karzais government and the international community InteriorMinister Besmillah Mohammadi and Rahmatullah Nabil head of the Afghan intelligence servicedescribed the NATO decision to suspend detainee transfers as politically motivated and aimed atslowing down the transition of security responsibilities to the Afghan government

Afghanistan is gradually taking over responsibility for the countrys security from the US-ledmilitary coalition as foreign forces aim to withdraw all their combat troops by the end of 2014 TheAfghan government believes that any move to halt the transfer of prisoners under any false excuses is aserious blow to the transition process Mohammadi and Nabil said in a joint statement The twoofficials said that in the past the United Nations in Afghanistan had assured the authorities that theirdetention facilities complied with international human rights standards

They also complained the UN had not given a copy of the report to the government Some of the details of the report have leaked out ahead of its publication prompting the responses The UN hassaid it is still working on finalizing the report and will publish it once it has been completed

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 642

Mohammadi said the government had found out about the allegations in the media The reportapparently included claims of torture such as electric shocks threats of sexual assault and physicaltorture such as the ripping out of nails in Afghan detention facilities The Afghan security agenciesstrongly reject the allegations Mohammadi said adding that international agencies including theUnited Nations had regularly visited Afghan detention facilities Following such visits they assuredauthorities of their satisfactory findings as to the situation in the prisons and compliance with humanrights standards he said hellip[Article continues herehttpnewsyahoocomafghan-government-rejects-un-torture-allegations-130001115html]

Afghan Taliban Spokesman Comments on Turkish Prisoners Release

SITE Monitoring Service | September 2011

Afghan Taliban spokesman Zabihulla remarked on the groups release of four Turkish engineers whowere held for over eight months and noted the well-treatment of the men during their detention In astatement posted on the groups website on September 6 2011 in Arabic and other languagesZabihullah argued that just as the Afghan Taliban treated these and other captives well the enemyshould treat captive fighters well also He reiterated the Afghan Talibans warning to foreign andAfghan companies not to work with the Afghan government and stated However some parties due to

their economic and political interests do not pay attention to the warnings of the Islamic Emirate andcontinue supporting the occupiers Thus the result of their violations will be the punishment and thecapture of their employees by the mujahideen

On September 4 the Afghan Taliban announced that it released four Turkish engineers whoworked for a Turkish company in the Batan area of Paktia province The release they said was basedon Islamic compassion and appreciate for Eid al-Fitr which marks the end of the holy month of Ramadan

Algeria

| back to top | Algerian Security Conference Focuses On Libya

BBC World Service | 7 September 2011

Foreign ministers from North Africa were due to meet in the Algerian capital Algiers on 7 September todiscuss ways of confronting terrorism and preventing the flow of weapons from Libya BBCWSreported High level delegations from France and the United States and diplomats from Mali Niger andMauritania were also due to attend the conference Algeria has expressed concern that arms from Libyacould fall into the hands of the north African branch of Al-Qaidah (AQIM) which has been active in theSahara and has kidnapped westerners the report noted

Algeria To Submit List Of Arms Smugglers At Conference

Le Temps dAlgerie website | Algiers in French 6 September 2011Algeria is expected to submit a list of weapons smugglers in the Sahel region to its partners in the fightagainst terrorism at the conference Algerian privately-owned newspaper Le Temps dAlgerie reportedon 6 September

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 742

Bahrain

| back to top |

Bahrain Panel 101 Activists on Hunger Strike

Associated Press | 7 September 2011

More than 100 jailed Bahraini activists mdash including doctors who treated injured protesters duringmonths of anti-government protests and crackdowns in the Gulf kingdom mdash are on hunger strike an

international panel said Wednesday The Bahrain Commission of Inquiry said in a statement that 84opposition supporters are on hunger strike in prison In addition 17 detained activists have beenhospitalized by the Interior Ministry for their refusal to eat

Hundreds of activists have been imprisoned since February when Shiite-led demonstrations forgreater rights began in the Sunni-ruled Bahrain the home of the US Navys 5th Fleet More than 30people have been killed since protests inspired by Arab uprisings began in February The five-memberpanel has been set up in June to investigate the unrest Wednesdays statement said an internationalexpert on hunger strikes will join the panel to visit the striking detainees and evaluate their condition

Medical advice will be provided and the expert will discuss the challenges of hunger strike thestatement said adding that the hunger strike started nine days ago

Among jailed activists on hunger strike are 20 doctors who are on trial in a special security court

on charges of participating in efforts to overthrow Bahrains 200-year-old monarchy Other jailedopposition supporters have joined the strike including two prominent Shiite activists Abdul Jalil al-Singace and Abdulhadi al-Khawaja They were sentenced to life in prison in June for their role inprotests The doctors trial is being closely watched by rights groups which have criticized Bahrains useof the security court that includes military prosecutors and civilians and military judges

The case against 11 health professionals was back in the special tribunal on Wednesday Noverdict is expected from the session The Bahrain Commission of Inquiry includes international judicialand human rights experts They started the probe with the consent of the Sunni rulers The commissionsfindings are expected Oct 30 Shiites comprise about 70 percent of Bahrains 525000 people but areblocked from top political and security posts[Article continues here httpnewsyahoocombahrain-panel-101-activists-hunger-strike-

112949681html]

Colombia

| back to top |

Colombias Complete Military Command Replaced

Colombia Reports

Colombian President Juan Manuel Santos announced Tuesday that the countrys entire militarycommand has been replaced amid growing concerns about increased violence by illegal armedgroups

[Article continues here httpwwwcolombiareportscomcolombia-newsnews18815-colombias-complete-military-command-replacedhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 842

Denmark

| back to top |

Family Held by Somali Pirates Released

Associated Press | 7 September 2011

Seven Danish hostages including a family with teenage children have been released by Somali piratesafter more than six months in captivity Denmarks Foreign Ministry said Wednesday The Danes -- a

couple with three children ages 12-16 and two crew members -- were captured in the Indian Ocean onFeb 24 while sailing around the world in a yacht

The seven Danes are doing well under the circumstances They are expected back in Denmark in a short time the ministry said in a brief statement It gave no details of how they were released andmade no mention of a ransom being paid No one at the Foreign Ministry was immediately available forcomment

Prime Minister Lars Loekke Rasmussen told public broadcaster DR that the Danes were on theirway back in a chartered airplane paid for by their insurance company Loekke Rasmussen said theirrelease came after a long period of negotiations Jan Quist Johansen his wife Birgit Marie Johansentheir sons Rune and Hjalte and daughter Naja were captured along with the two adult Danish crewmembers when their 43-foot yacht was seized by pirates The Johansens are from Kalundborg 75 miles

west of Copenhagen They set out on their round-the-world journey in 2009 Of course it is verycheerful news said Ole Meridin Petersen chairman of the Kalundborg yacht club where Jan QuistJohansen was a member I can imagine that the hostages after their release need quite a lot of calmMeridin Petersen told The Associated Press

The yacht was seized while the Johansens were sailing through the pirate-infested waters off EastAfrica The family very likely is aware that what they did was not so fortunate They certainly feelpretty bad about it now Meridin Petersen said Hostages are held in hot austere conditions in Somalia -- typically for many months -- before a ransom is agreed on and paid and the hijacked ships and creware released Last year a British sailing couple were released after 388 days in captivity Reportsindicated that a ransom in the region of $1 million was paid for their release Somalia hasnt had afunctioning government since 1991 one of the reasons the piracy trade has flourished hellip

[Article continues here httpwwwfoxnewscomworld20110907denmark-family-held-by-somali-pirates-since-february-releasedtest=latestnews]

France

| back to top |

Western Governments Said Protecting Intelligence Officers From Scrutiny

BBC World Service | 7 September 2011

Western governments have been accused by Europes leading human rights body of shielding theirintelligence services from accountability for serious violations BBC World Service reported on 7

September The reports author the rapporteur for the Council of Europe Dick Marty said theseviolations had occurred during anti-terrorist operations He said a licence to abduct torture or kill onlyexisted in films and dictatorships but western governments were using the notion of state security toprevent parliaments and judges from scrutinising the work of intelligence officers

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 942

India

| back to top |

Deadly Explosion Strikes Courthouse in New Delhi

New York Times | By Jim Yardley 7 September 2011

An explosion ripped through a reception area of an Indian courthouse on Wednesday morning killing atleast 10 people and wounding more than 60 others in a bombing that renewed concerns about Indiarsquos

vulnerability to terrorism It was the second bombing of the courthouse in less than four months

Relatives mourned a victim of the bombing which struck a courthouse reception area Harish TyagiEuropean PressphotoAgency

Witnesses described a chaotic scene at the Delhi High Court after the blast at 1014 am outside areception area used by litigants lawyers and visitors to enter the courthouse

ldquoIt was in shamblesrdquo said Ajay Mehrotra a lawyer who witnessed the explosion ldquoThere wastotal chaos There was blood People were running for their livesrdquo

The Indian home minister Palaniappan Chidambaram called the explosion a terrorist attack andnoted that New Delhi was already in a high state of alert with Parliament in session Mr Chidambaramsaid Indian intelligence agencies had received information in July about a possible terrorist threat to thecity which had been turned over to the local police He did not elaborate about the intelligence reportOn Thursday three people were detained for questioning by the police Reuters reported

ldquoThe bomb blast took place just outside the reception centerrdquo Mr Chidambaram said at a newsconference ldquoIt is suspected that the bomb was placed in a briefcaserdquoReuters reported that a militant terrorist group called HuJI for Harkat-ul-Jihad Islami based largely inPakistan and also Bangladesh had claimed responsibility for the attacks citing security officials

Prime Minister Manmohan Singh speaking to reporters during a visit to Bangladesh condemned

the explosion as ldquoa cowardly act of a terrorist naturerdquoldquoWe will deal with itrdquo Mr Singh said ldquoWe will never succumb to the pressure of terrorismrdquo

Indian authorities have come under renewed criticism in recent months about their preparedness toprevent terrorism Terrorist attacks are a persistent concern in India particularly in the countryrsquos rapidlygrowing cities which have endured a series of bombings in recent years

In July more than 20 people were killed in Mumbai the countryrsquos financial capital from threeblasts timed to the evening rush hour That attack raised painful memories of the bloody November 2008attacks on Mumbai in which militants trained in Pakistan swept through luxury hotels a railway stationand a Jewish center in a rampage that left more than 160 people dead

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1042

Wednesdayrsquos attack at the Delhi High Court exposed anew the weaknesses in the courthousersquossecurity In May a smaller bomb detonated near a parked car outside the courthouse causing no injuriesWitnesses told local media of seeing a black bag in flames after the blast

Rakesh Tiku chairman of the Delhi Bar Association criticized the Delhi police saying ldquothe low-intensity blast in May should have served as an eye-openerrdquo Mr Tiku said hundreds of litigants andclerks passed through the gate where the blast took place each day making it a vulnerable location ldquoTheDelhi High Court requested the Delhi police to install CCTV cameras as well as personnel to man theentrances three or four months ago but no action has been takenrdquo he said

The latest explosion occurred near Gate 5 of the High Court outside a reception center wherevisitors wait for passes to enter the building Lawyers said Wednesday was an especially busy daybecause the court heard public-interest litigation

ldquoWhat are the police doingrdquo asked Mr Mehrotra the lawyer ldquoThe lives of lawyers litigantsand judges are at stakerdquo

Another witness Brijmohan Sharma described a ldquovery loud sound the reverberations fromwhich caused me to lose my balance I got up and was surrounded by people runningrdquo He added ldquoItwas like a scene from a film People were lying on the floor with their hands cut off their legs brokenand bleedingrdquo

The last serious attacks in New Delhi took place in 2008 when coordinated blasts in a park and

in shopping areas killed more than 20 people and injured nearly 100 In those attacks the IndianMujahedeen an Islamic militant group claimed responsibility

The Delhi High Court is in the heart of the capital a short walk from the cityrsquos landmark IndiaGate Rahul Gupta a local resident said he was standing near the courthouse entrance when the groundshook from the blast throwing people onto the road outside the reception area

ldquoSecurity is one area which no one can handle in Delhi at the momentrdquo Mr Gupta said ldquoIt is thefanatical people who are creating these types of problems and trying to create panic in the publicrdquo hellip

The Indian government said that a preliminary analysis found a nitrate-based explosive withtraces of pentaerythritol tetranitrate or PETN a powerful plastic explosive often used in terror plots hellip[Article continues here httpwwwnytimescom20110908worldasia08indiahtml_r=1ampref=world]

Ten Killed In Delhi Blast

Multiple Sources

At least 10 people were killed and 65 others injured in a bomb blast outside the Delhi High Court on themorning of 7 September private Indian television channel IBN Live reported The terror strike took place in a high security area with Parliament the Prime Ministers Office and India Gate in the vicinitythe report said (CNN-IBN website New Delhi in English 07 Sep 11)

According to the website of the private Indian television channel NDT the blast went off at themain entrance to the court on Shershah Suri Road which is normally heavily guarded The bomb wentoff just before the court was about to open the report said (NDTV website Delhi in English 07 Sep 11)

Security officials were quoted by BBCWS as saying they suspected the explosives were hidden

in a briefcase that had been placed beside the desk where passes were being handed out An eyewitnesstold the BBC that it was a powerful blast shaking the ground and buildings around him (BBC WorldService 7 September 2011)

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1142

Delhi On High Alert In Wake Of Blast

Multiple Sources

The Indian capital has been put on high alert following the blast at the Delhi High Court privateEnglish-language TV news Channel Times Now reported (Times Now TV New Delhi in English0530GMT 07 Sep 11)

Hindi channel says received email from group claiming responsibility for attack Indias Hindinews channel Aaj Tak said on 7 September it had received an email claiming responsibility for the blastAccording to the report the email was sent from the ID harkatuljihadi2011gmailcom The channelsaid the police were investigating possible involvement of the Indian Mujahidin (Aaj Tak TV Delhi inHindi 7 September 2011)

Police Probe Possible Links To Al-Qaidah-Linked Group

Noida IBN Live | in English 7 September 2011

Police in Delhi are looking into claims that a Pakistan-based militant group linked to Al-Qaidah theHarkat-ul-Jihad Islami (HUJI) may have been involved in the attack Noida IBN TV reportedAccording to the report in an e-mail sent to a media house HUJI claimed it had carried out the attack inretaliation for the death sentence issued against Afzal Guru the man found guilty of involvement in an

attack on Delhis parliament almost ten years ago We owe the responsibility of todays blasts at highcourt delhi our demand is that Afzal Gurus death sentence should be repealed immediately else wewould target major high courts amp THE SUPREME COURT OF INDIA the e-mail read According tothe report it was sent from the id harkatuljihadi2011gmailcom

Home Minister Announces Probe Into Attack

CNN-IBN website | New Delhi in English 7 September 2011

Indian Home Minister P Chidambaram speaking in parliament said that investigators did not yet knowwho was behind the attack but he blamed it on terrorists seeking to destabilise the country He saidthat the National Investigative Agency (NIA) would carry out a probe into the attack

PM Denounces Blast As Cowardly Act

Doordarshan news website | New Delhi in English 7 September 2011

Prime Minister Manmohan Singh on 7 September described the blast outside the Delhi High Court as acowardly act and urged all political parties to unite and tackle any acts of terrorism state-run Indiantelevision channel DD News reported This is cowardly act of terrorist nature We will deal with it Wewill never succumb to the pressure of terrorism Singh said He said this is a long war in which allpolitical parties all the people of India have to stand united so that the scourge of terrorism is crushed

IED Explosion At Delhi High Court Domestic Islamists Likely Culprits Growing Signs Of Jihadist Agenda

Sterling-Assynt | 7 September 2011

An IED placed inside a briefcase exploded at 1017AM at an entrance to Delhi High Court wherelitigants collect their visitor passes Wednesdays are reserved for public-interest litigation and so thearea was crowded It is likely that the briefcase was placed in the queue at reception before visitors passthrough security checks There is reportedly no CCTV coverage in this area which will makeidentification of the perpetrator difficult

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1242

The blast was of at least medium intensity and created a crater between three to four feet deepAt least eleven people have died and 65 others have been injured ndash a toll that would probably have beenhigher if an international group had been responsible There were no other explosions which has thesame implication Mumbai has been placed on high alert following the attack especially as the HomeMinistry reported in August that coastal cities were under threat from pan-Islamic terror groups Noblame has yet been assigned A minor explosion occurred on 25 May (also a Wednesday) in a car-park near the Court That bomb was constructed using ammonium nitrate and is believed to havemalfunctioned causing no damage or injuries which suggests similar origins to this one

There are reports of an email from Harkat-ul-Jihadi al-Islami (HuJI) claiming responsibilityfor todayrsquos explosion but we remain sceptical about this since the group has not previously made suchclaims via email The nature of the bomb and the use of email to communicate suggest rather theinvolvement of the Indian Mujahideen (IM) Nonetheless the unverified HuJI email demands that AfzalGurursquos death sentence be repealed and this may point towards the involvement of a jihadist agendaGuru was involved in the December 2001 Parliamentary attacks in Delhi and had his mercy petitionrejected by the Home Ministry on 10 August

Todayrsquos incident indicates an increase in successful attacks by local groups A robust securityforce campaign following the 2008 Mumbai attacks diminished the capabilities of groups such as IMThey claimed responsibility for the December 2010 Varanasi bomb blast which killed one and injured

twenty people However IMrsquos likely involvement in the July 2011 blasts in Mumbai and the attack todaypoints towards the rebuilding of its capabilities and possibly also the establishment of closer ties with jihadi groups

We do not expect a spate of attacks to follow imminently but such incidents will continue tooccur possibly on a larger scale as IM continues to regroup following the security clampdownDevelopments in the cases of Afzal Guru and Ajmal Kasab (the surviving gunman from 2008) willprovide cause for further attacks Given a recent warming in relations between India and Pakistan theHigh Court attack will be unlikely to raise tensions between the two countries significantly

Indonesia

| back to top |

Islamic Groups Continue To Harass Religious Minorities Government Silence Further

Encourages Attacks Youths Beaten In East Jakarta

Assynt SEAsia Vol VIII No17 | 7 September 2011

Hard-line Islamic groups continued to intimidate religious minorities without any response from theGovernment at either a local or national level Yudhoyono relies on the support of Islamic parties inParliament and is unlikely to take any decisive action against such incidents This will further encourageradical groups and endangers the countryrsquos reputation for religious tolerance

Three youths were beaten by members of the Islamic Defenders Front (FPI) for allegedly beingdrunk The attack took place in Jakartarsquos business district but it remains unlikely that the FPI will targetforeigners and the security forces will not tolerate any threats to business interests Nonetheless such

incidents highlight a worrying trend towards increasingly hard-line behaviour that remains unchecked bythe Government

We previously reported that the light sentences handed down for the killing of three members of the Ahmadiyah sect will embolden radical groups (see our Report of 3 August) In this period theIslamic Reform Movement (Garis) coerced Ahmadi youths in Cianjur West Java to join mainstreamprayers The Ahmadiyah sect meanwhile was banned from conducting religious activities during theEid holidays by the South Sulawesi administration for fear of provoking violence

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1342

Iran

| back to top |

Two Arrested Al-Qaidah Members Iraqi Three Iranian - Iran Official

ISNA website | Tehran in Persian 7 September 2011

The public prosecutor of Irans Kerman Province Yadollah Movahhed has announced the start of aninvestigation into the case of five people arrested on charges of having links to Al-Qaidah the IranianStudents News Agency (ISNA) reported on 7 September Two of the detainees - arrested on 19 August -are Iraqis and the other three are Iranian nationals Movahhed told ISNA in an interview on 7 SeptemberThe prosecutor said the detained people are accused of carrying illegal arms and munitions and addedthat an investigation is ongoing into the possibility that they were members of a larger group

Israel

| back to top |

Israel Uncovers Planned Hamas Bombing Spree On Israelis

Xinhua | 8 September 2011

Hamas cells operating in the West Bank routed between May and AugustThe Israeli security agency Shin Bet has broken a network of Hamas cells operating in the West Bank and planning a series of attacks against Israeli targets local media reported Wednesday Dozens of

Hamas members comprising 13 militant cells were arrested throughout the West Bank between May andAugust Army Radio reported One of the groups has carried out a bombing attack at the entrance toJerusalem in March in which a British woman was killed and several dozen civilians wounded Anothercell had planned to dispatch a suicide bomber to Jerusalems Pisgat Zeev neighborhood on Aug 21 Theattack was thwarted at the last minute by Shin Bet agents assisted by the Israel Defense Forces (IDF)and police according to Army radio Other groups were in various stages of planning and preparingattacks including bombings and the kidnapping of civilians or soldiers for the release of Palestinians jailed in Israel The Shin Bet concluded based on its interrogations of the group members that theHamas military leadership in Gaza and abroad is exerting considerable efforts to rehabilitate itspresence in the West Bank with financing and weapon smuggling The West Bank has remainedrelatively quiet in recent years Israeli officials attributed the success in preventing violence in the area

to the cooperation between the IDF and the Palestinian National Authoritys security forces

Israeli Air Strike Kills One Gaza Militant

Xinhua | 8 September 2011

Strike follows more rocket launches from Gaza warnings of new battlesAn Israeli air strike killed an Islamic Jihad militant and wounded three others in the central Gaza

Strip town of Dier a-Balah witnesses and medical sources said Local witnesses said the militant diedafter his car was hit by a missile adding that three other people were also wounded The condition of theinjured is stable hospital sources said Earlier Wednesday an Israeli military spokesperson said a rocketwas launched from the Gaza Strip into south Israel adding the projectile landed in an open area and didnot cause injuries or damage None of the Palestinian armed factions has claimed responsibility for the

rocket attack Late on Tuesday a Palestinian militant was killed and two others injured when Israeliwarplanes targeted a group of gunmen east of Khanyounis City south of the Hamas-ruled Gaza Strip

The Gaza Strip witnessed an escalation of bloody violence between Israel and Gaza militantgroups in August leaving 26 Palestinians and three Israelis killed The violence was triggered after eightIsraelis were killed in well-coordinated operation in the Red Sea city of Eilat Israel accused Palestinianmilitants of plotting and carrying out the attack which started from the bordering Sinai Peninsula inEgypt

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1442

Libya

| back to top |

Libyan Extremist Britain Allowed To Stay Was Link To Al-Qaeda In Iran Papers Show

The Daily Telegraph | (London) By Richard Spencer Tripoli

The extremist Ismail Kamoka spent several years sending funds to terrorist groups across the Middle East

An Alleged Libyan extremist who sought political asylum in Britain regularly travelled to Iran from2002 to provide forged documents to extremists linked to al-Qaeda secret files found in a Tripoliintelligence service building have disclosed

The documents seen by The Daily Telegraph unearth British intelligence suspicions about linksbetween Iran and al-Qaeda dating back almost a decade Other details to come out of the documentssent by MI6 and found in the office of the former head of foreign intelligence and later foreign ministerMoussa Koussa who defected in March include the revelation that Britain had begun co-operating withthe Chinese security services on Islamic extremists The extent of Iranian co-operation with al-Qaedahas been disputed in intelligence communities though Iranians are thought to have provided weaponsand explosives to the Taliban in Afghanistan

A number of al-Qaeda operatives including members of the family of Osama bin Laden fled toTehran after the fall of the Taliban in Afghanistan and their precise status in Iran has been unclear Thepapers in Libya do not directly challenge the Iranian government but suggest that al-Qaeda operativeshad more freedom of movement there than previously thought The extremist Ismail Kamoka spent

several years sending funds to terrorist groups across the Middle East including some linked to al-Qaeda the files said Mr Kamoka who had been given indefinite leave to remain in Britain afterarriving from Saudi Arabia in 1994 and claiming asylum travelled from the UK to Iran viaSwitzerland in July 2002 according to one document[Article continues herehttpwwwtelegraphcouknewsworldnewsafricaandindianoceanlibya8740771Libyan-extremist-Britain-allowed-to-stay-was-link-to-al-Qaeda-in-Iran-papers-showhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1542

Nigeria

| back to top |

Bomb Explodes In Violence-Torn Nigerian City Residents

AFP | 6 September 2011

A bomb went off Tuesday in Nigerias northeastern city of Maiduguri disrupting a three-week lull inbombings in the violence-torn city local residents said [Article continues here httpnewsyahoocombomb-explodes-violence-torn-nigerian-city-residents-215718081html]

Pakistan

| back to top |

Pakistan Bans Foreign Travel For Those Involved In Bin-Ladin Probe

The News website | Islamabad in English 7 September 2011

A Pakistani commission investigating the circumstances surrounding the killing of Al-Qaidah chief Usamah Bin-Ladin has banned foreign travel for everyone involved in the probe Pakistani daily TheNews part of the Jang group which owns Geo TV reported on 7 September The paper recalled that thecommission had already directed the countrys interior ministry and the intelligence service ISI toensure that the Bin-Ladin family was not repatriated from Pakistan without the consent of the

commission

More Than 20 Killed In Two Suicide Blasts In Pakistans Quetta

Express247 TV | Lahore in English 5 September 2011

At least 22 people were killed and several others injured in two explosions in the south-westernPakistani city of Quetta on 7 September the website of the Dubai-based private Pakistani TV channelARY News reported According to the channel one blast went off near the residence of the FrontierConstabulary and another one near the commissioner office in Quetta According to the report around100 kilograms of explosives were used in each attack (ARY News website Dubai in English 07 Sep 11)

Private Pakistani English-language TV channel Express 247 carried a series of onscreen scrollswhich said police had confirmed that the two blasts were suicide attacks The report cited police sources

as saying that 25 people were killed and more than 40 injured in the attacks (Express247 TV Lahorein English 0654GMT 07 Sep 11)

BBCM notes that the attacks came after the Pakistani intelligence agency said on 5 August that ithad arrested Al-Qaidah commander Younis Al-Mauritani and two of his accomplices in Quetta

Taleban Say Quetta Blasts Revenge For Recent Al-Qaidah Arrests

AFP | 7 September 2011

The Pakistani Taleban have claimed responsibility for the twin suicide bombs in Quetta on 7 Septembersaying they were carried out to avenge the recent arrests of Al-Qadiah operatives in the city Wecarried out the attacks Taleban spokesman Ehsanullah Ehsan told AFP in a phone call from anundisclosed location

Twin Suicide Bombings In Pakistan Leave 23 Dead

Miami Herald

Twin suicide bombers attacked the home of a senior military officer Wednesday in the western city of Quetta injuring him and killing at least 23 people officials said in a possible revenge attack forPakistans recent arrest of a senior al Qaida commander [Article continues here httpwwwmiamiheraldcom201109072394264twin-suicide-bombings-in-pakistanhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1642

Philippines

| back to top |

Moro Splinter Group Threatens US Soldiers In Philippines But Capabilities Limited

Government-Rebel Negotiations Remain Difficult

Assynt | SEAsia Vol VIII No17 7 September 2011

Ameril Umbra Kato a former senior Moro Islamic Liberation Front (MILF) field commander whoresigned late last year because he rejects peace negotiations has threatened to attack US troops as wellas Filipino security forces and other Government targets US and Filipino troops are currentlyundertaking joint training exercises This is an annual event but the first time they have been conductedin central Mindanao However Katorsquos splinter group the Bangsamoro Islamic Freedom Fighters (BIFF)is believed to have as few as 200 members with generally unsophisticated weapons ConsequentlyBIFFrsquos ability to conduct an attack on US forces is likely to be limited

In this period Kato announced the creation of a political wing to his grouping the BangsamoroIslamic Freedom Movement emphasising his split with MILF Nevertheless he has not been expelledfrom MILF and so is protected by the current ceasefire with Manila though MILF has stronglycondemned Katorsquos threat against US troops It is possible that MILF leadership is content to allow himto operate relatively unimpeded in order to gain greater leverage in its negotiations with theGovernment since they can contrast their more compromising approach with BIFFrsquos threatened

violence Meanwhile negotiations between MILF and the Government continue MILF dismissed theGovernmentrsquos latest proposal for an autonomous region but both sides appear committed to continuingtalks

Russia

| back to top |

Suicide Bombings In Grozny Demonstrate Islamic Insurgencyrsquos Continuing Capabilities In

Chechnya

Stirling Assynt Reports | Report FSU Vol IV No17 7 September 2011

A series of suicide bombings in the Chechen capital on 31 August (which left nine casualties includingseven police officers) has severely undermined President Ramzan Karydovrsquos claims to have successfully

eradicated the Islamic insurgency in the Republic The first suicide bomber reportedly detonated hisexplosives in a densely populated area only 150 metres from a local Parliament building while twofurther jihadists targeted first-response units Significantly the attack occurred during the Muslimholiday of Eid a three day celebration which marks the end of Ramadan during which the risk of jihadist attacks is heightened Indeed in addition to this strike in Grozny jihadist militants carried outfurther attacks in Iraq Nigeria and Algeria during Eid this year

Although no group has claimed responsibility for this incident it bears the hallmark of theCaucasus Emirate and so was likely orchestrated by the grouprsquos newly appointed deputy KhuseynGakayev and his brother Vadalov Indeed the Gakayev brothers are believed to have been behind theattack on the Chechen Parliament in October 2010 demonstrating the grouprsquos capabilities and intent tocarry out such strikes Moreover the timing of these bombings ndash only two months after the

reconciliation of the Caucasus Emiratersquos leader Doku Umarov with Chechen commanders (see our 3August Report) ndash supports this assessment and suggests that further incidents and suicide bombings arelikely given this truce

Suspected Militant Killed In Russias Southern Republic

Interfax news agency | Moscow in Russian 7 September 2011 Russias National Antiterrorist Committee said on 7 September a militant had been killed in the Republicof Kabarda-Balkaria the corporate-owned Russian news agency Interfax reported

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1742

Saudi Arabia

| back to top |

Saudi Arabia Shopping Around For Nuke Technology

Haaretz | 8 September 2011

Ties with Pakistan may remain close as Riyadh seeks nuclear assistanceSynopsis This week brought news that Iran on its own has produced new advanced nuclearcentrifuges According to a report of the International Atomic Energy Agency Iran has begun to installthe centrifuges in its uranium enrichment facility in Natanz But the high-level source noted thatdevelopment and production of the new centrifuges began more than seven years ago That does notspeak of a great technological capability on Irans part Israeli intelligence like its American counterpartviews 2014 or 2015 as the date when Iran will be able to build nuclear weapons says the source - if itwants to and no one blocks it In Saudi Arabia in contrast they are a bit more disturbed by thedevelopments in Iran An American Department of Energy delegation visited Riyadh and met with DrHashim Yamani who heads the King Abdullah City for Atomic and Renewable Energy Saudi Arabiawants to equip itself with nuclear reactors to generate electricity The United States is interested inselling Riyadh reactors for two reasons - fat contracts and the ability to keep close tabs on nucleardevelopments in Saudi Arabia The American administration is concerned that with a nuclear programfor civilian uses Saudi Arabia would actually like to prepare the infrastructure so it could switch to

producing nuclear weapons relatively quickly should Iran possess such weapons Defense ministerSultan Bin Abdul Aziz and the countrys former intelligence chief Turki Bin Faisal reportedly favorthe preparation of a secret nuclear program for military uses in cooperation with a Sunni Muslim ally -Pakistan which possesses dozens of atomic bombs Saudi Arabia reportedly funded Pakistans nuclearweapons program in return for Pakistans promise to aid the monarchy in this area if need be

Serbia

| back to top |

Serbia Threatened By Terrorism Says Dacic

Tanjug | 8 September 2011

US officials warned Serbia of possible terrorist activity particularly against foreign interests

After a warning coming from USA officials Serbia will raise the level of security in all facilitiesbelieved to be a possible target of terrorists the countrys Deputy Prime Minister and Minister of InteriorIvica Dacic stated Wednesday in the Palace of Serbia He stated that the security measures will primarilyrefer to the facilities of foreign countries in Serbia and added that special attention will be paid to thesecurity of air traffic US officials assume that there is a possibility of new terrorist attacks in the USAand other countries including Serbia Dacic said following a meeting with Special Representative of the UN Secretary-General for Disaster Risk Reduction Margareta Wahlstrom in Belgrade and a sessionof the republic headquarters for emergency situations

Somalia

| back to top |

Six Killed In Mortar Attack In Somali CapitalShabeelle Media Network website | Mogadishu in Somali 7 September 2011

Six people were killed and several others injured after three mortars landed in Mogadishus Arjantiinneighbourhood in Kaaraan District on the night of 6 September the privately-owned Shabeelle websitereported It quoted an eyewitness as saying that two of the three mortars fired have caused thecasualties inflicting fear in the residents who returned to their homes after Al-Shabab vacated the areaearly last month Kaaraan District is one of the areas taken over by the government forces and AUpeacekeepers

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1842

United States

| back to top |

Post-911 Intelligence Reform Takes Root Problems Remain

Reuters | 8 September 2011

US intelligence agencies will forever be scarred by their failure to connect the dots and detect theSeptember 11 plot but a decade later efforts to break down barriers to information-sharing are takingroot Changing a culture of need-to-know to need-to-share does not come easily in spy circles Someofficials say they worry a decade later about a future attack in which it turns out that US spy agencieshad clues in their vast vaults of data but did not put them together or even know they existed

Yet significant changes both big and small have broken down barriers between agenciessmoothed information-sharing and improved coordination US intelligence experts say From issuing ablue badge to everyone working in the sprawling intelligence community to symbolize a commonidentity to larger moves of mixing employees from different agencies the goal is singular -- to preventanother attack

Were much further ahead David Shedd Defense Intelligence Agency deputy director said of the ability to connect the dots compared with 10 years ago Still signs of a plot to attack the UnitedStates could be missed again My worst fear and I suspect probably one that would come true is that inany future would-be or actual attack God forbid we will be able to find the dots again somewhere

because of simply how much data is collected Shedd said The political response to the failure to stopthe attack was the 2002 creation of the Department of Homeland Security pulling together 22 agenciesto form the third largest US Cabinet department behind the Pentagon and Veterans Affairs

That was followed by the creation in late 2004 of the Director of National Intelligence to overseeall the spy agencies as recommended by the bipartisan 911 commission Previously the CIA directorheld a dual role of also overseeing the multitude of intelligence agencies But in the aftermath of the2001 attacks policymakers decided that was too big of a job for one person to do effectively

Critics argued then and now that the reforms were the governments usual response to crises --create more bureaucracy But others see much-needed change It has been a tremendous improvementsaid Lee Hamilton who was the 911 commission vice chair Its not seamless there are problems andweve still got a ways to go The 2001 attacks involving airliners hijacked by al Qaeda operatives killed

nearly 3000 people in New York Pennsylvania and the Pentagon Various US intelligence and lawenforcement agencies had come across bits of information suggesting an impending attack but failed toput the pieces together The CIA had information about three of the 19 hijackers at least 20 monthsbefore the attacks the National Security Agency had information linking one of the hijackers with alQaeda leader Osama bin Ladens network the CIA knew one hijacker had entered the United States butdid not tell the FBI and an FBI agent warned of suspicious Middle Eastern men taking flying lessons

Have the reforms made America safer Officials say yes and point to the US operation thatkilled bin Laden in Pakistan in May that demanded coordination among intelligence agencies and themilitary But there is an inevitable caveat no one can guarantee there will never be another attack onUS soil On Christmas Day 2009 a Nigerian man linked to an al Qaeda off-shoot tried unsuccessfullyto light explosives sewn into his underwear on a flight to Detroit from Amsterdam It turned out US

authorities had pockets of information about him President Barack Obama used a familiar September 11phrase to describe the 2009 incident as a failure to connect the dots of intelligence that existed acrossour intelligence community

Roger Cressey a former White House National Security Council counterterrorism officialresurrected another September 11 phrase It was a failure of imaginationThe intelligence community had not seen al Qaeda in the Arabian Peninsula a Yemen-based al Qaedaoff-shoot as capable of striking the US homeland If the underwear bomber threat had originated inPakistan they would have gone to battle stations immediately Cressey said Some proposed changesin how authorities would respond to another successful attack still are pending For example creation of

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1942

a common communication system for police firefighters and other emergency personnel remainstangled up in political wrangling in Congress over how to implement it This is a no-brainer Hamiltonsaid The first responders at the scene of a disaster ought to be able to talk with one another Theycannot do it today in most jurisdictions

Former leaders of the 911 commission issued a report card saying nine of its 41recommendations remain unfinished The Office of the Director of National Intelligence hasexperienced growing pains as overseer of the 17 spy agencies churning through four chiefs in six yearsTensions over turf confusion about the DNIs role and problems herding agencies with very powerfulchiefs of their own all came to a crescendo when retired Admiral Dennis Blair the third DNI tried toassert authority over CIA station chiefs who represent the agency in different countries The positionof chief of station is one of the crown jewels of the CIA and they dont want anyone playing with theircrown jewels said Mark Lowenthal a former senior US intelligence official

After a dust-up with CIA Director Leon Panetta who now is defense secretary it was Blair whowas sent packing I think the mistake that some have made is to have viewed the DNI and the Directorof CIA as an eitheror proposition rather than the power of the two working together the DIAs Sheddsaid in an interview in his office There is a history of where that hasnt worked so well I believe it isworking much better today said Shedd who has worked at the DNI CIA and National SecurityCouncil

Intelligence experts say in the current administration Obamas top homeland security andcounterterrorism adviser John Brennan arguably has more power than any of them because he has thepresidents ear Its a reminder that bureaucratic reform or no personalities count in making nationalsecurity policy The improved sharing of secret data has led to yet another set of problems The delugeof bits and bytes has subjected intelligence analysts to information overload as they try to sift through itall for relevant pieces Our analysts still are spending way too much time on finding the informationrather than on the analysis of the information Shedd said There is just too much data to go find it all

The intelligence community wants a system developed that would automatically processinformation from multiple agencies and then make the connections for the analysts

But greater inroads into sharing data across agencies does not guarantee that another attack willbe averted The threat has evolved and officials now are increasingly concerned about a lone wolf plot

by an individual not tied to any militant group that may be more difficult to uncover Those threatswill not come to our attention because of an intelligence community intercept said John Cohen asenior Department of Homeland Security counterterrorism official

They will come to our attention because of an alert police officer an alert deputy sheriff analert store owner an alert member of the public sees something that is suspicious and reports it Cohensaid One measure of the success of post-911 reforms is that a decade later the United States has not hada similar attack Now that could be luck that could be skill we dont really know Hamilton said Butin all likelihood what we have done including the establishment of the Department of HomelandSecurity and the transformation in intelligence and FBI has certainly been helpful[Article continues here ]httpnewsyahoocompost-9-11-u-intelligence-reforms-root-problems-052514320html

Comment the value added provided by the Office of the DNI remains an open question for many withinthe Intelligence Community (IC) and is a favored theme of corridor discussion in IC-member agenciesOn the other hand there is broad agreement among intelligence officials that the degree of cooperationand coordination between intelligence agencies and the character of intelligence sharing has vastlyimproved The fact that there has not been a successful major attack on US soil since 911 ndash not forlack of plotting ndash is in great part testimony to this more effective cooperation

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2042

Jihadist Suggests Striking New York City Bridges

All SITE Intelligence Group | 6 September 2011

A jihadist pointed to what he found to be a weak point of suspension bridges and directed his messageto those who love blasting and explosions In a message posted on the Shumukh al-Islam forum onSeptember 6 2011 the jihadist Abu Suleiman al-Nasser gave a picture of the Verrazano Bridge inNew York on which he drew a red box and arrow on the bridges center He then gave a map on whichhe circled the various bridges in New York City and its boroughs A fellow jihadist offered his ownidea giving a picture of the Hoover Dam and explaining that there is no target more important thandams He wrote that striking a dam may lead to the submerging of cities and the killing of thousands of people and in the case of the Hoover Dam would impact Las Vegas the capital of gambling anddebauchery

Counterterror Veteran is New Deputy FBI Director

Atlanta Journal Constitution | 1September2011

A 24-year FBI veteran with extensive counterterrorism experience Sean Joyce has been named the lawenforcement agencys new deputy director Elevated to the No 2 post within the FBI by Director RobertMueller Joyce replaces Timothy Murphy who is retiring after 23 years with the bureau Since last yearJoyce has been executive assistant director of the national security branch responsible for the FBIs

national security and intelligence operations He earned the Attorney Generals Award for ExceptionalService in 2004 for work on a counterterrorism squad in Dallas In 2008 he was named chief of thecounterterrorism divisions international terrorism operations section with responsibility forinternational terrorism matters within the United States hellip[Complete article is available here httpwwwajccomnewsnation-worldcounterterror-veteran-is-new-1153018html]

Top CIA Official Obama Changed Virtually Nothing

Salon | 1 September2011

PBSs Frontline is airing an examination of Top Secret America on September 6 The show includes arare and lengthy interview with 34-year-CIA-veteran John Rizzo who is described as the most

influential lawyer in CIA historyHere is one quote they include from Rizzo With a notable exception of the lsquoenhanced

interrogationrsquo program the incoming Obama administration changed virtually nothing with respect toexisting CIA programs and operations Things continued Authorities were continued that wereoriginally granted by President Bush beginning shortly after 911 Those were all picked up reviewedand endorsed by the Obama administration hellip[Complete article is available herehttpwwwsaloncomnewspoliticsbarack_obamastory=opiniongreenwald20110901obama]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2142

General Counterterrorism News| back to top |

The Terrible Missed Chance

Newsweek | 4 September 2011

Special Agent Harry Samit of the FBIs Minneapolis field office knew he was looking into the eyes of aterrorist It was early afternoon on Friday Aug 17 2001 Across from him sat Zacarias Moussaoui a33-year-old French-born student arrested the day before for overstaying his visa Moussaoui had paidmore than $8000 in cash that summer to sit in a cockpit simulator in a flight school in the suburbs of Minneapolis and learn - in a matter of days - the basics of how to fly a 747-400 Samit a formerintelligence officer at the Navys celebrated Top Gun flight school felt sure the man across the desk from him was a Muslim extremist who was part of a plot to hijack a commercial jetliner filled withpassengers The trick Samit wrote in a soon-to-be-released excerpt of a book hes written about thecase was getting Moussaoui to admit this and reveal details and associates to allow us to stop the plot

Surely the bureau brass in Washington would share his concern Samit thought He was wrongThat same day halfway across the country in the fluorescent-lit hallways of the J Edgar Hoover

FBI headquarters building in Washington counterterrorism supervisors were treating Samits firstreports about Moussaoui with skepticism even contempt Michael Maltbie a DC counterterrorism

specialist insisted repeatedly in the days after the arrest that there was no clear link between Moussaouiand Al Qaeda - the link needed for a warrant Maltbie thought Moussaoui was a dirty bird he latertold investigators but favored deporting him to France

Believing a hijacking might be imminent Samit appealed to his boss in Minneapolis SpecialAgent Greg Jones Jones picked up the phone on Aug 27 and called Maltbie at FBI HQ

Moussaoui he said might be part of a plot to get control of an airplane and crash it into theWorld Trade Center or something like that

Maltbie scoffed You have a guy interested in this type of aircraft Maltbie replied accordingto FBI documents That is it (Maltbie declined requests for an interview)

At least Maltbie was paying attention Michael Rolince who ran the FBIs InternationalTerrorism Operations Section was arguably the bureaus most important go-between with the White

House on domestic terrorist threats in the summer of 2001 He tells Newsweek he spent less than 20seconds being briefed on the Moussaoui case that August His office was inundated with terrorismprobes he said since Moussaoui was in custody already he posed no immediate threat Did it rise tothe level of something that I would take upstairs Rolince asks The answer is no

At CIA headquarters alarm bells were ringing loudly CIA Director George Tenet was briefedon Moussaoui within days of the arrest receiving a paper with the eye-catching headline IslamicExtremist Learns to Fly But the FBIs acting director that summer and the bureaus most seniorcounterterrorism official were left in the dark[Article continues here httpwwwthedailybeastcomnewsweek20110904the-terrible-missed-chancehtml]

Pan Am Flight 103 - Lockerbie Bombing - al-Megrahi CIA FilesWebwire | 31 August2011

BACM ResearchPaperlessArchivescom has announced the publishing of CIA files related to the PanAm Flight 103 Lockerbie Bombing

The files can be downloaded at no cost at httpwwwpaperlessarchivescompanam103ciahtml The files date from 1984 to 1999 These are the most recent files on Pan Am 103 released by the

CIA This set of files is unique because it includes memos on the direct handling of an intelligencesource This type of information is exempt from the Freedom of Information Act (FOIA) and is not oftenreleased by the Agency

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2242

The files cover information received by the CIA on Abdel Basset al-Megrahi Al-Megrahi is theonly person ever convicted in the Pan AM 103 case The Scottish government in 2009 allowed al-Megrahi to be released from custody and returned to Libya because of his failing health With the recentfall of Muammar Qaddafis regime there have been renewed calls for al-Megrahi to be returned toScottish custody or extradited to the United States and put on trial[Complete article is available here httpwwwwebwirecomViewPressRelaspaId=144692]

Getting The Caucasus Emirate Right

CSIS | August 2011

ldquohellipThis report aims to set straight a rather distorted record It demonstrates the veracity of three vitallyimportant facts usually obfuscated in discussions of the subject (1) the longstanding and growing tiesbetween the CE and its predecessor organization the ChRI on the one hand and al Qaeda (AQ) and theglobal jihad on the other hand (2) the importance of the CE jihadi terrorist network as a united andorganized political and military force promoting jihad in the region and (3) the salience of local culturaland the Salifist jihadist theo-ideology and the influence of the global jihadi revolutionarymovementalliance as key if not the main factors drive the ldquoviolence in the North Caucasusrdquohelliprdquohttpcsisorgfilespublication110829_Hahn_GettingCaucasusEmirateRt_Webpdf

7 Things You Didnrsquot Know About the War on TerrorForeign Policy | By Eric Schmitt and Thomas Shanker 6 September 2011

From an attempt to negotiate with Osama bin Laden to a proposal to threaten to bomb Mecca its been awild decade for the US national security establishment

Our new book Counterstrike The Untold Story of Americas Secret Campaign Against Al Qaeda is in many ways asummary of the past decade of our reporting on the military intelligence community and domestic law enforcement as itentered a new era of Darwinian evolution to counter violent extremism

It also is our deep dive into a decade of American counterterrorism efforts -- from the work of commando trigger-pullers and spies on the ground up to senior political leaders who wanted to defendthe nation (and get re-elected) Our efforts to report and write this book allowed us to uncover many newmissions never discussed before -- and gave us an understanding of how the war on terror had changedover the last decade

Our book assesses the 10 years since 911 as the military divides the fight into tactical missionson the battlefields of modern terrorism then the operational advancements that provided the means tosuccess while not securing final victory and at the top the strategic level of policy debates about howthe nation should combat this threat to its security

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2342

Here are seven vignettes from Counterstrike that offer glimpses into the thinking of policymakers andcommanders in early days after the Sept 11 attacks and how that thinking evolved over the followingdecade into a more whole-of-government approach to combating terrorists

1 Bush Tried to Negotiate with al Qaeda

The George W Bush administration like all of its predecessors swore never to negotiate with terroristsBut it did undertake an extraordinary and extraordinarily secret outreach effort to open a line of communication with Osama bin Laden and al Qaedas senior leadership It was an attempt to replicatehow the United States tried to sustain a dialogue with the Soviet Union even during the darkest days of the Cold War when White House and Kremlin leaders described in private and in public a set of acceptable behaviors -- and described with equal clarity the swift vicious even nuclear punishment forgross violations

In the months after the Sept 11 attacks Bushs national security staff working through theintelligence agencies made several attempts to get a private message to bin Laden and his inner circleThe messages were sent through business associates of the bin Laden familys vast financial empire aswell as through some of the al Qaeda leaders closest relatives a number of whom were receptive toopening a secret dialogue to restrain and contain their terrorist kinsman whom they viewed as a blot on

their name (To be sure other relatives were openly hostile to the American entreaties)According to a senior American intelligence officer with first-hand knowledge of the effort the

response from Osama bin Laden was silence And the effort was suspended

2 Sometimes a Wedding Is Just a WeddingIn the early days after the Sept 11 attacks the CIA and FBI vied to produce the most compellingintelligence reports that tracked suspected terrorist plots The agencies often worked at cross purposessometimes unwittingly At one point in early 2002 both agencies were tracking what American analystssaid were growing preparations for a major wedding somewhere in the Midwest (In terroristvernacular the word wedding is often code for a major attack)

Dribs and drabs on this wedding planning made their way to President Bush from bothagencies independent of each other of course

Finally over the Easter holiday during a video-teleconference with top aides in Washingtonfrom his ranch in Crawford Texas Bush stopped the briefing exasperated by the discrepancies in therival agencies reporting about the suspected threat

George Bob get together and sort this out Bush told his CIA director George J Tenet andFBI director Robert S Mueller III

Bushs instincts were correct When the analysts finally untangled their clues it turned out thatthe ominous wedding really was just that the matrimony of a young man and a young woman fromtwo prominent Pakistani-American families There was no threat There was no plot

3 The Threat to Bomb MeccaAs fears of a second attack mounted following the 911 strikes US government planners franticallycast about for strategies to protect the country Even the most far-fetched ideas had a hearing howeverbriefly In one case some government planners proposed that if al Qaeda appeared ready to attack America again the United States should publicly threaten to bomb the city of Mecca in Saudi Arabiathe holiest site in all of Islam in retaliation Just nuts one Pentagon aide wrote to himself when heheard the proposal The idea was quickly and permanently shelved

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2442

4 The SEAL Raid in Iran That Didnt HappenWhen US forces routed the Taliban government in Afghanistan and forced bin Laden and his toplieutenants to flee many senior al Qaeda leaders including bin Laden and his deputy Ayman al-Zawahri escaped to neighboring Pakistan But a separate group including the al Qaeda leaders sonSaad bin Laden fled to northern Iran where American troops would not pursue them and the Iranianswould likely not detain them But the Shiite clerics running Iran placed the al Qaeda operatives and theirfamily members under virtual house arrest and they became a shield against possible attacks from theSunni-based terrorist organization

One plan in particular illustrated the bold thinking and wildly unrealistic aims of the militarysinitial approach after 911 to kill or capture terrorist leaders The plan called for hunting the eight to 10senior al Qaeda leaders and operatives who had sought refuge in Chalus an Iranian resort town on theCaspian Sea where they had been detained

At the Joint Special Operations Command at Fort Bragg NC military planners drew up optionsfor Navy SEALs to sneak ashore at night using state-of-the-art mini-submarines Once they landed theSEALs would slip past Iranian guards to snatch the al Qaeda leaders Another option called for SpecialOperations helicopters to spirit American commandos into the town and whisk them out again with theirquarry The Americans went as far as conducting two or three rehearsals at an undisclosed locationalong the US Gulf Coast in early 2002 They conducted small-boat insertion exercises involving about

30 Special Operations personnel most SEALs and eventually concluded the mission was feasible if they were provided with more detailed intelligence on the locations of the al Qaeda members and thesecurity around them

The logistics of the mission were daunting Chalus sits at the edge of the Elburz coastal mountainrange about 70 miles north of Tehran and the failed rescue of the American hostages in Iran in April1980 loomed large in commanders memories Eventually Gen Richard B Myers the chairman of theJoint Chiefs of Staff rejected the mission as too risky and too politically volatile Many of the al Qaedaoperatives are reportedly still there

5 Intelligence Hauls of Unusual Size

US intelligence and military commandos have carried out tens of thousands of raids in the decade since911 The amount of material seized from terrorist and insurgent targets has grown to a massive sizeThe Defense Intelligence Agency (DIA) operates exploitation triage centers and giant warehouses forstoring intelligence products -- in war zones rear headquarters in countries like Qatar and back in theUnited States One intelligence analyst said that walking into one of the warehouses for documents andmedia exploitation reminded him of the final scene in Raiders of the Lost Ark when the captured Ark of the Covenant is crated up and rolled into a cavernous storage area that contains all the governmentsother dangerous secrets

All told more than two million individual documents and electronic files have been cataloguedby media type hard copy phone number thumb drive Each is inspected by a linguist working with acommunications analyst or computer expert

The DIA analysts are joined by specialists from other agencies including the FBI and the DrugEnforcement Administration Yet given the overwhelming volume no more than about 10 percent of thecaptured intelligence has ever been analyzed

Intelligence officers say they simply are overwhelmed and untold quality leads may still beburied in the piles of computers digital files travel documents and pocket litter

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2542

6 The Digital Counterjihad Cyberspace is the terrorists ultimate safe haven Its where they recruit raise money and even plotattacks using coded language while playing online video war games The US government fights back

One technique is called false band replacement whereby the intelligence agencies infiltratemilitants networks and post their own material to counter extremist efforts on those same jihadistwebsites The trick is to forge the onscreen trademarks -- web watermarks -- of al Qaeda media sites

This makes messages posted on these sites official and sows dissent and confusion among themilitants

This Internet spoofing can be used in support of more traditional combat missions There is atleast one case confirmed by American officials in which a jihadist website was hacked by Americancyberwarriors to lure a high-value al Qaeda to a surreptitious meeting with extremist counterparts -- onlyto find a US military team in waiting

Getty images

7 First Kill the MullahsUS counterterrorism officials have learned fighting terrorists effectively means targeting specific nodesof that network that support and enable militants who strap on suicide vests This strategy focuses onneutralizing enablers such as the financiers gun-runners and logisticians Among these terror linchpins

are religious leaders who bless attacksHeavenly reward will not await a suicide bomber unless his death and those of his victims is

deemed halal in keeping with Islams sacred sharia law Each militant network has a sharia emir usuallyat the level of a sheikh or mullah In Iraq American commanders specifically killed emirs to throw awrench in a suicide bombing networks

Take him out and suicide bombings from that network are frozen until he is replaced said onemilitary officer with command experience in Iraq hellip[Complete article is available herehttpwwwforeignpolicycomarticles201109067_things_you_didn_t_know_about_the_war_on_terror]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2642

Dick Marty Rendition Report Condemns lsquoCult of Secrecyrsquo

BBC News | 8 September 2011

A report for Europes human rights watchdog has called for greater scrutiny of secret services andsupport for whistleblowers The Council of Europe investigated how countries like Britain GermanyRomania and Lithuania assisted the US with the rendition of terror suspects It said a cult of secrecyhad helped Western governments cover up abuses Defending whistleblowers it singled out USsoldier Bradley Manning accused of passing secrets to Wikileaks He had acted as a whistleblowerand should be treated as such CoE rapporteur Dick Marty wrote in the report which was due to besubmitted to the CoEs Parliamentary Assembly The soldier is currently in a US military prisonawaiting trial for passing restricted material to the controversial website

But the report praised Mr Manning and Wikileaks itself for uncovering evidence of renditionThe CoE represents 47 member-states including both EU countries and Russia and other ex-Sovietstates Mr Martys report focused on the record of Western states explaining that it was based oninvestigations into European links to the controversial US policy of rendition for terrorism suspectsThe CIA allegedly flew terror suspects around the world for interrogation in the years after 911 holdingthem in secret prisons in Europe and elsewhere

No licence to kill

In his 48-page report - entitled Abuse of State Secrecy and National Security - Mr Marty looked at thelevel of control exercised by European states over their security services He urged all states to useindependent parliamentary committees to oversee the work of their secret services saying this was of vital importance for the rule of law and democracy Mr Marty argued that Western governments wereusing the notion of state secrecy to shield their intelligence services from accountability for seriousviolations committed during anti-terrorist operations We consider that this is simply unacceptablehe wrote

A licence to kill (or to abduct and torture) only exists in certain films and in dictatorialregimes In democratic systems parliaments as representatives of the people have a right and duty toknow what the government is doing in the name of the people Mr Marty praised investigative journalists and non-governmental organisations for their work in exposing abuses of authority Stressing

the fundamental role whistleblowers had to play in an open society he warned against a real cult of secrecy as an instrument of power

While it was up to the courts to decide if Bradley Manning had committed any crime he wrotethe CoE was indebted to him for the publication of a recording of a helicopter attack in Iraq in whichthe crew seems to have intentionally targeted and killed civilians

Thanks to Mr Manning he said a large number of embassy reports had allowed us to learnsignificant details of important recent events which are obviously of general interest We therefore join Amnesty International in expressing our worries as to the treatment he receives Mr Marty wrote inthe draft report[Article continues here httpwwwbbccouknewsworld-europe-14820145]Comment This report demonstrates that Dick Marty is not as De Gaulle would say a serious man To

suggest that Bradley Manning is a hero and intelligence agencies bent on defeating terrorists arecriminals should say it all Manning knowingly violated his oath and willfully provided enormousamounts of classified material to WikiLeaks For Marty this is a good thing in the name of transparencyMarty always injudicious and anti-American in his remarks is now moving at warp speed into crackpotterritory

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2742

Al Qarsquoida amp its Affiliates| back to top |

Al Qaeda Is Down Not Out

Los Angeles Times | By Amy Zegart 7 September 2011

US talk of defeating terrorism is dangerously prematureTalk of strategically defeating Al Qaeda is all the rage in the White House these days Defense

Secretary Leon Panetta used the D-word in July President Obama declared in his new counter-terrorism strategy We can say with growing confidence that we have put Al Qaeda on the path todefeat Compared to the woeful state of the economy terrorism has become the administrations feel-good story of the year

Defeat is a big word It is also dangerously misleading Yes the United States has made greatstrides in the last decade to harden targets improve intelligence and degrade the capabilities of violentIslamist extremists Osama bin Ladens death was a major accomplishment But the fight is nowhereclose to being won and Americas most perilous times may lie ahead Three reasons explain why

The first is that strategically defeating Al Qaeda is not nearly as important as it sounds After911 Al Qaeda morphed into a more complicated decentralized and elusive threat consisting of threeelements core Al Qaeda affiliates or franchise groups operating in places like Yemen and Somalia with

loose ties to the core group and homegrown terrorists inspired by violent extremism often through theInternet in the comfort of their own living rooms

Core Al Qaedas capabilities started degrading in 2001 when the US invaded Afghanistandismantled training camps ousted the Taliban and sent Bin Laden running The CIA has estimated thecore group remaining in the AfghanistanPakistan region to number 50 to 100 fighters The last time BinLaden oversaw a successful operation was 2005 when Al Qaeda struck the London transit system

But plots by homegrowns and franchise groups have risen dramatically in recent years The 2009Ft Hood shooting the worst terrorist attack on US soil since 911 was the work of a homegrownterrorist The mastermind of the 2010 Times Square car bomb plot was a naturalized American citizentrained by the Pakistani Taliban not Al Qaeda Another franchise group Al Qaeda in the ArabianPeninsula was behind the foiled 2009 Christmas Day underwear bomber aviation plot and the 2010

plot to explode tampered printer cartridges aboard cargo planes The Bipartisan Policy Center reported11 violent Islamist extremist terrorist incidents against the US homeland in 2009 the most since 911Nearly all involved what former CIA Director Mike Hayden calls a witches brew of radicalizedAmericans and franchise groups

The second reason why talk of defeat is premature has to do with weapons Terrorism againstAmericans is nothing new The potential for terrorist groups to acquire weapons of mass destruction isIn 1995 a Japanese cult released sarin nerve gas in the Tokyo subway killing 12 people and injuringthousands It was the first WMD terrorist attack in modern history and it sparked a wave of presidentialterrorism commissions years before Bin Laden became a household name

It is this specter of the lone fanatic or small group armed with the worlds most devastatingweapons that keeps experts up at night In 2005 60 leading nuclear scientists and terrorism experts were

asked how many believed the odds of a nuclear attack on the US were negligible Only three or fourhands went up most were far more pessimistic Today there is enough nuclear material to build120000 weapons As long as fissile material is poorly stored and rogue states like Iran and North Koreacontinue their illicit weapons programs nuclear terrorism remains a haunting possibility

The third reason is that the FBI has not yet become a first-rate domestic intelligence agencyAnalysts whose work is vital to success are still second-class citizens labeled support staff alongsidesecretaries and janitors and passed over for key jobs including running the bureaus intelligence unitsThe FBIs information technology is so antiquated it belongs in a museum And the old crime-fighting

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2842

culture still lives There is now a move afoot to shrink new classified facilities so that agents dont haveto waste time away from their cases to read intelligence documents thereStrategically defeating Al Qaeda sounds too good to be true Because it is Amy Zegart is a senior fellow at Stanfords Hoover Institution and the author of Eyes on Spies

Congress and the United States Intelligence Community

US Counterterror Chief Al-Qaida On Steady Slide

Bostoncom | 31 August 2011

White House counterterrorism chief John Brennan said al-Qaida is on a steady slide after the death of al-Qaidas latest second-in-command in Pakistan Brennan told The Associated Press on Wednesdaythat its a huge blow in the first official White House comment since Atiyah Abd al-Rahmans reportedkilling by CIA drone strike in Pakistans tribal areas last week

Al-Qaida is sort of on the ropes and taking a lot of shots to the body and the head Brennansaid This is a time not to step back and let them recover a message he says hes sending to hiscounterparts in Pakistan[Article continues herehttpwwwbostoncomnewsnationwashingtonarticles20110831us_counterterror_chief_al_qaida_on_steady_slide ]

Al-Qaeda (AKA Al-Qaida Al-Qarsquoida)

Council on Foreign Relations | 29 August 2011

ldquoAl-Qaeda an international terrorist network is considered the top terrorist threat to the United StatesThe group is wanted for its September 11 2001 attacks on the World Trade Center and the Pentagon aswell as a host of lesser attacks To escape the post-911 US-led war in Afghanistan al-Qaedas centralleadership fled eastward into Pakistan securing a safe haven in loosely governed areas there In July2007 US intelligence agencies found that the organization was regrouping and regaining strength inthese tribal areas along the border with Afghanistan though targeted killings of senior al-Qaeda leadershave since diminished the groups command and control capabilities In February 2009 Director of National Intelligence Dennis C Blair told lawmakers that the groups core is less capable and effective

than it was a year ago The killing of al-Qaedas top leader Osama bin Laden by US forces in Pakistanin May 2011 served a significant blow to the organization but analysts say al-Qaeda remains deadlywith its networks spread all over the world Plus a number of affiliated groups have gained prominencein recent years complicating the task of containing the organizationrdquo

[Article continues here httpwwwcfrorgterrorist-organizationsal-qaeda-k-al-qaida-al-qaidap9126]

Al Qaeda In The Islamic Maghreb

CSIS | 1 September 2011

ldquoAl Qaeda in the Islamic Maghreb (AQIM) emerged from a decades-long militant Islamist tradition inAlgeria In 1998 the Salafist Group for Preaching and Combat (Groupe Salafiste pour la Preacutedication etle Combat or GSPC) broke away from the Armed Islamic Group (GIA) because of the GIArsquos extensive

targeting of civilians Gradually the GSPC evolved to encompass global jihadist ideology in addition toits historical focus on overturning the Algerian state In 2006 the GSPC officially affiliated with alQaeda core soon rebranding itself as al Qaeda in the Islamic Maghreb In the following years AQIMwas able to conduct a small number of large-scale attacks most notably its 2007 bombing of the UNheadquarters in Algiers In recent years counterterrorism pressure and weak governance have combinedto shift the center of AQIMrsquos presence to the Sahara-Sahel region AQIM continues to make its presenceknown through smuggling operations kidnappings and clashes with security forces in the desert In thecoming years general instability within the region could allow AQIM to further expand its influencerdquo[Complete article is available here httpcsisorgfilespublication110901_Thornberry_AQIM_WEBpdf ]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2942

AQ Strategy

The Assynt Report | 11 August 2011

Executive Summary Al-Qaedarsquos broad objectives remain unchanged in the wake of bin Ladenrsquos death There

are nonetheless growing questions over al-Qaedarsquos capability Longstanding paranoiaover the use of electronic communications is heightened by the ongoing US dronecampaign whilst attacks against the West have generally been disrupted at an early stage

The Pakistani Talibanrsquos attack on a Karachi naval base in May 2011 was a significantmilitary success and the first major act of revenge for bin Ladenrsquos killing Furtherattempts to avenge his loss are certain

All parts of al-Qaeda are working within a cohesive framework with the ultimate aim of restoring the Islamic Caliphate (Khilafa) The strategic plan to support this aim wasdrafted by 40 of al-Qaedarsquos brightest thinkers in Kandahar Afghanistan in November1999 This plan consists of four phases each seven years long leading to the dissolutionof corrupt regimes and the union of all newly-liberated states within the Khilafa

Apart from mounting strategic operations al-Qaedarsquos role is to be the inspiration for atruly global jihadist movement It seeks to achieve this through provision of trainingbeing a role model for others to follow extending acceptance and adoption of its tactics

particularly suicide bombings and professionalising jihadist media to build a commonbrand and message between hitherto separate groups

Between the late 1990s and 2003 the organisation was primarily devoted to classicinternational terrorism Most effort is now spent fighting insurgencies from North Africato South Asia The way in which this strategy helps to spread the struggle has been seenin North-West Africa where the initial development of al-Qaeda in the Islamic Maghrebwas in part fed by men returning from fighting with al-Qaeda in Iraq

Since mid-2009 al-Qaeda and its affiliates have increasingly encouraged jihadist-sympathisers resident in Western countries to engage in violence themselves withoutcentral direction or training making surveillance more difficult

One of the keys to awakening the spirit of jihad was the success in portraying the US and

its allies as Crusaders in the Muslim world Al-Qaedarsquos strategy essentially requires thatthis process be kept running until the forces of jihad have grown large enough to launchsuccessful liberation operations

Despite its successes in Afghanistan al-Qaedarsquos credibility has suffered both from its failure to landanother strategic blow on the West on the scale of 911 and also excessive Muslim casualties in someoperations Similarly al-Qaeda in Iraq was set back by its excessive sectarian zeal and local resentmentat the foreign fighter presence In turn this affected the movementrsquos funding from the Gulf

Analysis Sub-Saharan African Leaders Media Focus On Threats Prior to 911

OSC Feature | Sub-Sahara Africa -- OSC Analysis 6 September 2011Statements by Sub-Saharan African leaders and African media reports on terrorism prior to the 10thanniversary of 911 focus on the growing threats from local extremists and Al-Qaida affiliatesparticularly in West Africa with little direct commentary on the anniversary or US counterterrorismpolicies This focus on domestic threats suggests that counterterrorism messages expressing solidaritywith African nations and acknowledging the evolving terrorist threat on the continent would have thegreatest resonance with African audiences

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3042

Leaders Stressing Determination To Counter Local Threats African leaders public statements reflect an ongoing concern about the threat of terrorism on thecontinent and a strong commitment to find ways to combat this threat

Nigerian President Goodluck Jonathan emphasized the governments commitment tovigorously combat terrorism following the 26 August bombing of the UN office inAbuja by Nigerian extremist group Boko Haram reported the Paris-based news agencyAFP President Jonathan is hosting Liberian President Ellen Johnson Sirleaf and otherforeign dignitaries for a three-day forum on terrorism and economic crimes the widelyread Lagos-based independent daily The Guardian reported on 4 September

Malian President Amadou Toumani Toure launched a Special Program for PeaceSecurity and Development on 9 August stating that development remained the mostviable solution to counter threats to the countrys stability reported Malis state-owneddaily LEssor[ 3] The program aimed to undermine support for Al-Qaida in the IslamicMaghreb (AQIM) according to Burkinabe web portal Lefasonet on 11 August

Somali Prime Minister Abdiweli Muhammad Gas stated on 23 August that theTransitional Federal Government planned to remove Al-Shabaab from the central andsouthern regions in Somalia with the goal of restoring peace within one year so the

country can hold national elections according to the Puntland-based Garowe Online

Experts Media Highlight New Capabilities Tactics

African experts and media outlets are warning about the evolving nature of terrorist organizations on thecontinent the terrorists pursuit of new targets and tactics and their potential for taking advantage of regional instability

Leading South African think tank the Institute for Security Studies stated on 29 Augustthat Boko Harams attack on the UN in Abuja completes Boko Harams metamorphosisinto an international terrorist group Since December 2010 Boko Haram had killed over600 people in over 70 attacks against Nigerian targets according to the think tank buthad not previously targeted Western or international interests

A 26 August article on the popular Malian web portal Maliweb voiced concern thatAQIM could benefit from Tuareg mercenaries many of whom were recently returningfrom fighting in Libya and could benefit from an increase in arms trafficking through theSahel during the Libyan conflict

Ugandas privately owned Daily Monitor reported on 19 August that AU forces inSomalia warned that Al-Shabaab planned to increase the number of kidnappings andbomb attacks as part of its new strategy to shift from controlling territory in Mogadishuto conducting more of an insurgent campaign

Concern Over Al-Qaida Presence Terrorist Collaboration

West African official statements and media reports reflect a growing concern over an increased Al-

Qaida presence in West Africa and collaboration with AQIM Al-Shabaab and Boko Haram

Nigerian security services reported that the suspected mastermind behind the 26 Augustbombing of the UN office in Abuja was a Boko Haram member with close links to Al-Qaida and Al-Shabaab according Nigerias privately owned Daily Sun

A 28 August report in the privately owned daily Nigerian Tribune claimed that the 26August bombing in Abuja was part of Al-Qaidas plans to mark the 10th anniversary of 911 and called Boko Haram Al-Qaidas ally in the region

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3142

An 8 August commentary in Burkina Fasos LObservateur Paalga said that reports of Boko Haram collaboration with Al-Shabaab and AQIM could indicate that Al-Qaida isextending its African tentacles Abdourahmane Dieng security division chief of theEconomic Community of West African States said the collaboration represented a veryserious threat according to Senegals progovernment Le Soleil on 5 August

Messages Likely To Resonate With African Audience

Sub-Saharan Africas increasing concern about the shifting nature and potential strengthening of theterrorist threat on the continent suggests that messages directly addressing the impact of terrorism onAfricans the increasingly complex nature of the threat and the need for multilateral cooperation againstterrorism are most likely to resonate with Africans

Messages expressing solidarity and sympathy for Africans affected by Boko Haram Al-Shabaab and AQIM would almost certainly resonate with a broad African audience

African political and military leaders would probably welcome acknowledgement of thecomplex and changing nature of terrorism on the continent and recognition of theirinitiatives and commitment to countering violent extremism

African leaders and medias concern about potential collaboration between Boko Haram

Al-Shabaab and AQIM suggest that they would be open to improving multilateral andcross-regional sharing of lessons learned and strategies to counter the intensification of terrorism within Africa

Aviation and Maritime Security| back to top |

Bomb Threats Force Jets To Land

Associated Press | 7 September 2011

Both landed safely one landed in Ankara Ataturk International Airport and the other at Kuala LumpurTwo flights operated by Pakistans state-owned airline received bombs threats on Wednesday

and both landed safely one in Turkey the other in Malaysia officials said No bombs were found The

first flight was headed for Manchester England when it was notified of the threat near the Bulgariancapital of Sofia The crew contacted the control tower in Istanbul to seek permission for the landingstate-run Anatolia news agency reported Authorities quickly evacuated all 378 passengers from theBoeing 777-300ER aircraft after it parked at a remote corner of the International Ataturk Airport andbomb squads began searching the plane with sniffer dogs Anatolia reported PIA spokesman MashoodTajwar confirmed the flight received a threat and landed All passengers were safe A police searchturned up no bomb officials said Later a second PIA flight from Islamabad to Kuala Lumpur alsoreceived a bomb threat It landed in Kuala Lumpur and all the passengers disembarked safely saidTajwar The UK-bound Pakistan International Airlines plane was forced to make an emergency landingat Ataturk Airport in Istanbul after receiving a bomb threat Malaysias airports authority said thepassengers were being screened and the plane was isolated in a parking area while being searched bypolice No bomb was found

It said the plane carried 164 passengers and 13 crew Azmi Murad senior general manager forthe authority said the Pakistani airline informed it that the warning came by email Mr Tajwar gave nodetails on the nature of the threat or how it was delivered Pakistan is home to al Qaedas top leadershipMilitants who trained there have been responsible for many of the attacks and failed plots in the USand Europe since Sept 11 2001 when planes hijacked by al Qaeda militants destroyed the World TradeCenter in New York and crashed into the Pentagon The bomb threats came four days before the 10thanniversary of 911 but there was no apparent link to Islamist militants who typically do not alertauthorities in advance The FBI and Homeland Security department issued warnings last weekend aboutal Qaeda threats to small airlines

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3242

Commentary amp Opinion| back to top |

From Terror Group Founder To Libyan Rebel Military Commander

ABCNews | 29August 2011

The same man who triumphantly led Libyan rebels into Gadhafis compound last week first came to theattention of the US intelligence community years ago - as a founder of a terror group

Abdelhakim Belhaj who was recently appointed to Tripolis rebel military council was one of the original founders of the Libyan Islamic Fighting Group an anti-Gadhafi group which was laterdesignated by the US State Department as a terrorist organization with links to al Qaeda according toUS government reports

We proudly announce the liberation of Libya and that Libya has become free and that the ruleof the tyrant and the era of oppression is behind us a victorious Belhaj told reporters after the stormingof Gadhafis Bab al-Aziziya compound last week Ousting Gadhafi had been the main objective of theLIFG since its inception in the early 1990s even if some of the fighters believed that meant puttingAmericans in the crossfire

The group carried out operations against the Libyan government including at least four suspectedassassination attempts against Gadhafi in the 1990s and was also believed to be connected to a series of suicide bombings in Casablanca Morocco in 2003 the US State Department reported As relationsbetween the US and Gadhafi improved in the mid-2000s some LIFG leaders cultivated relationshipswith top al Qaeda leaders including Osama bin Laden and were suspected of funneling fighters to Iraq tocarry out operations against US soldiers

When the LIFG was designated a terror organization in 2004 it was meant as a gesture of solidarity with the Libyan government according to a March 2011 congressional report

Contrary to several US government reports Libyan rebel ambassador to the US Ali Aujalitold ABC News that the LIFG was never connected to al Qaeda and did not carry out terrorist operations

They were only opposed to Gadhafi during his rule and paid the price for that by beingoppressed by the regime Aujali said

The CIA first publicly voiced its concerns about the connection between the LIFG and al Qaedain 2004 when then-director George Tenet testified before the Senate Select Committee on Intelligenceand listed the LIFG among groups that represented an immediate threat [that] has benefited from alQaeda links[Article continues here httpabcnewsgocomBlotterterror-group-founder-libyan-rebel-military-commanderstoryid=14405319]

Interview With Saudi Sheik Wajdi Al-Ghazawi

MemriTVcom

Sheik Wajdi al-Ghazawi owner of al-Fajr TV criticizes extremist atmosphere in Saudi Arabia and saysafter 911 They Handed Out Sweets on the Streets of Mecca

Following are excerpts from a statement by Saudi Sheik Wajdi Al-Ghazawi owner of Al-FajrTV which was posted on YouTube on August 4 2011

Wajdi Al-Ghazawi When Al-Qaeda and Osama Bin Laden were at the height of their mightthey were extremely popular in Saudi Arabia From mosque pulpits across Saudi Arabia preacherswould pray for their success Moreover from the pulpits of the most important mosques ndash the Al-HaramMosque in Mecca and the Nabawi Mosque in Al-Madina ndash direct prayers for the success of Al-Qaedawere made during the days of the bombing of Tora Bora Oh Allah help our brothers in AfghanistanThese supplications were made during evening prayers as well as Friday prayers The preachers wouldpray for them in violation of the ministrys instructions

When the twin towers in New York were attacked they handed out sweets on the streets of Mecca By Allah they did I witnessed this myself The young people bowed in prayer and hugged one

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3342

another out of joy People were in heaven because of these young men who destroyed America andbombed this idol Am I right or not Was it like that or not

Back then when the Taliban broke off a piece of the nose of the Buddha statue which was hewnin the mountain an entire sermon was dedicated to it in the mosque in Mecca and the preacher was laterreprimanded for this sermon The entire Saudi people supported and loved Al-Qaeda

This went on until our brothers in Al-Qaeda ndash and I dont know what was going through theirminds ndash began to carry out operations inside Saudi Arabia Thats when we all raised our hands andsaid Youve gone too far We wont support you in this

The atmosphere here in Saudi Arabia is one of extremism It is characterized by focusing onminor details Many things are forbidden Yes maybe they are indeed forbidden but by forcing peopleto avoid them and by acting as if these were major sins an atmosphere was created that gave rise toextremist youth who might act recklessly at the most trivial provocation

For instance we blew out of proportion the issue of music the issue of smoking or the issue of hanging pictures in public places True there are clear texts on these issues but the young peopleembraced these issues as if they were fighting usury fornication or alcohol No these are not among theseven major sins So our society has become extreme

This extremist atmosphere has given rise to people who accuse others of heresy and people whopurport to be waging Jihad It has created genes that gave rise to cells of Al-Qaeda and other terrorists

We must examine our breeding ground in which these young men were sownBy Allah what can possibly emerge from such an atmosphere Muftis who accuse others of

heresy sheiks who incite and young people who bomb Am I right or not[Complete clip is available here httpwwwmemritvorgclipen3099htm]

Legal Aspects amp Lawfare| back to top |

Revisiting A Stale Counterterrorism Law

Council on Foreign Relations | 1 September 2011

ldquoNearly a decade after 911 the United States still relies on the 2001 Authorization for the Use of Military Force (AUMF) for the killing and detention of those considered responsible for or associatedwith the terrorist attacks But CFR national security law expert John Bellinger says it is becomingincreasingly difficult for the Obama administration to justify some of its counterterrorism operationsunder this limited statutory authority It has been used in defense of actions including drone attacks onindividuals as well as the targeting of groups in Yemen and Somalia that may have only the mosttenuous affiliation or association to the 911 attack A revised AUMF should clarify those operations aswell as the issue of detention specifically which individuals can be detained for how long and subjectto what processes There also needs to be greater effort at the international level he adds to fill thegaps in the law that covers conflicts between states and non-state actorsrdquohelliprdquo[Complete article is available here httpwwwcfrorgcounterterrorismrevisiting-stale-

counterterrorism-lawp25742]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3442

Narco-Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector[Complete article is available here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Mexicos Cartels Move Into Extortion

At a construction site of an apartment building in the heart of the Mexican capital a company engineerruns through his weekly payroll sheet He has salaries written out for carpenters bricklayers andelectricians At the bottom of the sheet is a notation of $200 for ldquosecurity servicesrdquo next to a nicknameldquoEl Indiordquo mdash the Indian [Complete article is available here

httpwwwtucsonsentinelcomnationworldreport090611_mexico_cartels_bribesmexicos-cartels-move-into-extortion ]

Seven Die In Mexican Pacific Port City

Latin American Herald Tribune

Seven people died in separate shootings in Mazatlan a port city in the northwestern Mexican state of Sinaloa with some of the incidents drug-related a police spokesman told Efe [Complete article is available herehttpwwwlahtcomarticleaspCategoryId=14091ampArticleId=423061]

Tijuana Violence Slows As One Cartel Takes Control

BorderlandBeatcom

Mexicos famously seedy border city of Tijuana is enjoying a lull in drug murders as the countrys mostpowerful cartel gains the upper hand over its rivals [Complete article is available here httpwwwborderlandbeatcom201109tijuana-violence-slows-as-one-cartelhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3542

Network Notes| back to top |

Canadian data foreign threats Spying in the digital age (Suggested by a reader in Lithuania ndash thanks) Globe and Mail | By Colin Freeze 31 July 2010

A government spy agency thatrsquos prohibited from monitoring Canadian citizens is now usingldquoinformation about Canadiansrdquo to zero in on foreign threatsThe ambiguous statement found in a new government report detailing the activities of CommunicationsSecurity Establishment Canada could sanction a range of intelligence-gathering activities ndash includingthe controversial practice of mining ldquometadatardquo from digital communications

Metadata ndash often called data about data ndash are found in e-mails and their attachments and containdigital signatures that can reveal when where and by whom documents were created

The collection of metadata has caused controversy in other countries but never in Canada wherethe Communications Security Establishment Canada operates as an ultra-secretive agency About theonly thing that is known about the classified practices is that they were halted and resumed after someldquomajor changesrdquo including directives signed by Defence Minister Peter MacKay

ldquoI cannot comment on specific operational activitiesrdquo Adrian Simpson a CSEC spokesman toldThe Globe He stressed that reviews upheld that the activities in question were ldquocarried out inaccordance with the law ministerial requirements and CSECrsquos policies and proceduresrdquo

ldquoCSEC is prohibited from directing its activities at Canadians anyone in Canada or Canadiansanywhere in the worldrdquo he said

For decades signals-intelligence agencies in the West have been allowed to safeguard nationalsecurity by eavesdropping on foreignersrsquo conversations Spies can whatever phone lines and satellitesignals they can so long as they never listen in on fellow citizens

But in the digital age governments run increasingly sophisticated dragnets scooping up andscouring through millions of intercepted Internet conversations daily Such practices create legalambiguities

ldquoThe whole issue of what constitutes boundaries for signals-intelligence agencies in cyberspaceis a big debate right nowrdquo said Rafal Rohozinski a security expert affiliated with the University of Torontorsquos Munk School

A watchdog agency that reviews the CSECrsquos activities released an annual report to Parliament onJuly 20 ldquoWhen other means have been exhausted CSEC may use information about Canadians when it

has reasonable grounds to believe that using this information may assist in identifying and obtainingforeign intelligencerdquo it reads

Sometimes collecting metadata is relatively benign It can involve aggregating sets of data tospot trends much like the way meteorologists discern national forecasts from localized information

For example while CSEC canrsquot usually monitor the communications of specific Canadian terrorsuspects it can glean insights by zooming out for big-picture patterns One way to do that MrRohozinski said would be to look at data flows between Canadian cities and Yemen where an Internet-savvy al-Qaeda offshoot works to recruit Westerners

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3642

Metadata however can be more revealing Documents that circulate on the Internet travelaround like postmarked letters marked with return addresses ndash e-mails and attachments have embeddedcodes that speak to the who where and when behind their creation

The US National Security Agency found itself mired in controversy a few years go after itskirted domestic-spying bans by secretly upholding that this sort of American metadata was fair gamedistinct from communication contents

Therersquos little to suggest the CSEC would go that far The federal agencyrsquos activities are reviewedby a watchdog body now headed by a former Federal Court of Appeal judge Robert Deacutecary appointedlast year wrote in his annual report that he was satisfied the CSEC activities in question are lawful evenif his predecessors felt them borderline

ldquoThis was the first review of these activities since hellip their resumption under new policiesrdquo thewatchdogrsquos report says It concludes that the surveillance activities are ldquoin accordance with the lawrdquo andfollow ldquomajor changes to certain policies procedures and practicesrdquo

Much of the concern arises from the possibility that CSEC could hand over metadata intelligenceto domestic law-enforcement and security agencies

As it stands the RCMP and CSIS have to develop their domestic investigations before coming toCSEC ndash usually with warrants ndash if they want specific intelligence The rules guiding handovers are strictbecause even though all agencies run surveillance operations they do so under vastly different

mandates and legal standardsThe spy agency however stood by its practicesldquoCSEC is extremely diligent when it comes to the privacy of Canadiansrdquo Mr Simpson said

[complete article is available here httpwwwtheglobeandmailcomnewsnationalcanadian-data-foreign-threats-spying-in-the-digital-agearticle2113772 ]

Cyber Attacks Against NATO Then And Now

New Atlanticist | 6 September 2011

ldquoNow that NATOrsquos Operation UNIFIED PROTECTOR over Libya is winding down it is worth

noting how few cyber incidents were directed in protest against the Alliance Certainly there was a

cyber component to the liberation of Libya but it was more about content and Internet freedom (the

most newsworthy elements here were the role of social media and the Libyan government taking largeparts of the nation offline) But compared to past history NATO cyber defenders had a relatively easy

time

ldquoNATO has not however had an easy 2011 Although there were three significant incidents we

know about none seemed to have been in direct response to operations over Libyahelliprdquo

[Complete article is available here httpwwwacusorgnew_atlanticistcyber-attacks-against-nato-then-

and-now]

The Calm Before The Storm

Foreign Policy | By Joel Brenner 6 September 2011

Cyberwar is already happening -- and its about to get much much worse A veteran cyberwarriorexplains how America can prepare itself

Revelations of wholesale electronic fraud and massive data heists have become weekly evendaily affairs A multinational electronics corporation loses personal information on more than 100million customers Cyberthieves break into an international bank counterfeit credit balances and lootATMs in four countries grabbing $9 million in just a few hours International gangs spread maliciouscode that conscripts unwitting computers into zombie armies of hundreds of thousands of similarlyenslaved machines Criminals then rent these armies called botnets as easily as you can buy a time-sharing arrangement in a beach condo No wonder the vast majority of Internet traffic is spam

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3742

Yet the loss of personal information and related criminal fraud intolerable as they are are theleast threatening face of electronic insecurity The US militarys secret network is penetratedAmericans corporate pockets are being picked clean of the intellectual property that makes the UnitedStates tick And the electricity grid that keeps the lights on and makes everything move is dangerouslyinsecure

In one remote attack on the Pentagons information systems about 10 years ago the Chinesehauled away up to 20 terabytes of information If the information had been on paper theyd have neededa line of moving vans stretching from the Pentagon to freighters docked 50 miles away in Baltimoreharbor just to haul it away Had they done so the military district of Washington wouldve become anactive theater of operations for the first time since 1865 and the Navy wouldve blockaded theChesapeake Bay But the Chinese did it electronically so who noticed

Corporate espionage by both competitors and foreign intelligence services or their surrogates isalso increasing Intelligence officials see this but cant speak openly about the specifics and Im seeingit now in my law practice The victims rarely admit it for understandable reasons Oracle whichsuccessfully sued SAP for theft of its software code was a prominent exception Google was another

When the Chinese penetrated Google in late 2009 -- yes that operation was Chinese and yes itwas done with the blessing of a member of the Politburo -- they werent after customer informationThey were after the source code that makes Google unique Nor was Google the only victim Thousands

of US and Western firms were penetrated in that affair Foreign governments -- and not only theChinese -- understand that they cannot compete with the United States militarily and politically if theycannot compete with it economically so their intelligence services want to steal its corporate intellectualproperty This is the technology that gives America its competitive edge and often it has nothing to dowith defense Ordinary companies with valuable technology are now being targeted by nation-statesThis is a new era National security and economic security have converged

The danger is not limited to the loss of technology and information however The owners andoperators of the North American electricity grid are hooking up their control systems to the Internet asfast as they can Exposing the grid to the Internet makes it marginally more efficient but it also makes itdramatically more vulnerable to disruption If you can remotely penetrate an electronic system to stealinformation you can remotely penetrate it to shut it down or make it go haywire This is why there is no

longer a meaningful difference between information security and operational security And the biggestoperational risk is the grid In contemporary society nothing moves without electricity If the grid goesout the country stops

As the Stuxnet affair demonstrated remotely engineered disruption of industrial control systemsis now a reality That episode involved the successful electronic attack on the centrifuges in the Iraniannuclear program Only a first-class intelligence agency could have pulled that off but the blueprint fordoing it -- the code itself -- is now public Many American industrial control systems run on the samekind of equipment the Iranians were using but unlike the controls on the Iranian centrifuges thecontrols on the US grid are now being connected to the Internet making them easier to disrupt Stuxnetwas a watershed there will be copycats

Other industrial control systems will also be targets Some already are Air traffic control

railroad switches and water and sewage systems are all electronically controlled now and many arevulnerable If an intruder can break into the right server electronically he can remotely shut downproduction send your goods to the wrong destination and even unlock your doors -- and delete your logentries so he leaves no record of ever having been there

The United States does not lack enemies who would attack it this way Seized al Qaedacomputers contain details of US industrial control systems In 2003 a group affiliated with thePakistani terrorist organization Lashkar-e-Taiba -- the same gang that engineered the 2008 terroristassaults in Mumbai -- plotted to attack the Australian grid Other groups conspired to attack the Britishgrid in 2004 2006 and 2009 Yet the owners and operators of the North American grid continue willy-

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3842

nilly to expose their control systems to the Internet instead of isolating and hardening it This is folly of a high order

Important conclusions for public and corporate policy follow from this vulnerable state of

affairs First cyber insecurity has operational consequences In the current and foreseeable states of technology a high degree of assurance against electronic penetration of anything connected to theInternet is not achievable Large efficient electronically connected organizations and nations aretherefore vulnerable to remotely engineered disruption as well as information theft

Second this risk cannot be eliminated -- but it can be reduced and managed As a nation theUnited States should start by isolating the grids controls from the Internet Undoubtedly there aremarginal efficiencies to be gained by seamless connectivity over a publicly accessible infrastructure butthese gains are usually exaggerated and the risk this connectivity creates is staggering The governmentand the major telecommunications carriers must also make the investment required to re-create themassive redundancies that made the wired telephone network so robust Resilience and swift recoveryshould be the goal If the consequences of cyberattacks were reduced penetration would cease to matter

Third companies that wait for the government to solve their own security problems do so attheir peril The government is broke and the IT backbone is 85 percent private so the governmentdoesnt control it The governments role in altering the status quo will be limited to setting standardsusing its purchasing power to move vendors toward better security and getting its own house in order

The government can neither secure corporate intellectual property nor protect firms against operationaldisruption

Fourth in a world in which everything cannot be protected companies must determine forthemselves what intellectual property and physical assets to isolate and safeguard Those that approachthis task seriously will quickly learn that technology is only one aspect of their insecurity and in manycases the easiest to deal with Unless technology is integrated with personnel practices and operationalsecurity it opens vulnerabilities that its users rarely understand This kind of integration requires theautomated enforcement of reasonable security policies and systematic workforce training and thatoccurs only when management the lawyers and the technologists work closely together This is an old-fashioned management challenge -- not a technological one For their part corporate boards need to takeIT security seriously and launch audits that examine how their systems are actually implemented and

used not merely how they are designed Because as the techies like to put it the weakest link in anysystem is not the silicon-based unit on the desk its the carbon-based unit in the chair Joel Brenner is author of the forthcoming America the Vulnerable Inside the New Threat Matrix of

Digital Espionage Crime and Warfare He has served as the inspector general of the National Security

Agency the national counterintelligence executive and the NSAs senior counsel He now practices law

at Cooley LLP in Washington DC

Cyberattacks Decline Slightly Symantec Report Finds

Dark Reading | 1 September 2011

Organizations worldwide are suffering damages as a result of cyberattacks but interestingly there hasbeen a slight decline in these attacks during the past 12 months according to a new report from

Symantec More than 90 percent of the more than 3300 respondents across 36 countries said theyexperienced tangible losses as a result of a hack with 84 percent reporting financial loss to the cost of abreach Around one-fifth lost at least $195000 in breaches during the past 12 months

Meanwhile Symantec attributes the unexpected bright spot of a decline in breaches toorganizations employing better cybersecurity defenses More than 70 percent of organizations sawattacks in the past 12 months a decline of 5 percent from 2010 And those that experienced anincreasing frequency of attacks dropped from 29 percent in 2010 to 21 percent this year While 100percent last year reported losses from cyberattacks 92 percent did so in 2011 The trend seemscounterintuitive given the rash of high-profile breaches this year More

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 4: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 442

Special 911 Lessons Afghanistan and Pakistan| back to top |

911 Lessons Afghanistan and Pakistan

Council on Foreign Relations | By Daniel Markey Senior Fellow for India Pakistan and South Asia

August 26 2011

A decade after 911 the United States is still at war in Afghanistan and lurches from crisis to crisis withPakistan Osama bin Laden is dead and al-Qaeda is weakened but Americas decade in South Asia hasbeen full of mistakes Successes have been too few tallied slowly and at grave cost

The initial US invasion of Afghanistan was revolutionary in its combination of local militiasand their warlord chiefs US Special Forces and air power In Pakistan Washington demanded an endto Islamabads relationship with the Taliban regime in Kabul started a range of joint counterterroroperations and offered a generous package of assistance

At first apparent progress masked deeper problems In Afghanistan the Taliban were routedschools were opened and elections held In Pakistan the military-led government signed up to the Bushadministrations war on terror netting a number of senior al-Qaeda leaders and scores of lower-leveloperatives

Yet many senior al-Qaeda and Taliban leaders evaded capture and used Pakistani safe havens toregroup and plot The Afghan state and its security forces remained weak and corrupt Pakistan failed toend its longstanding relationships with a range of dangerous militant groups

Worse the veneer of success was intoxicating it encouraged an expansion of US ambition andrhetorical commitments even as the war in Iraq preoccupied the Bush administration The resultingmismatch of sweeping noble American aims with meager resources was disastrous Washington failedto destroy al-Qaeda failed to stem the Talibans resurgence and failed to clarify its goals or commitmentto allies and adversaries

The Obama administration came into office in 2009 determined to reverse these losses with newleadership attention money and troops That effort has netted bin Laden and turned the tide on manyAfghan battlefields Still Washington struggles to explain how military victories will translate intoenduring security Efforts to improve relations with Pakistan through aid and engagement have beenoverwhelmed by differences between Islamabad and Washington over whether and how to fight regionalmilitants

The past decade in Afghanistan has convinced many Americans of the folly of large-scale USmilitary intervention The Pakistan experience shows that money often buys neither cooperation noraffection The United States still needs to find a way to get troops out of Afghanistan and a means todeal with a wide range of enormous security challenges in Pakistan Americans should not kidthemselves Enduring success in Afghanistan and Pakistan remains essential but it is still a long waysoff[Part of the series Ten Lessons Since the 911 Attacks in which CFR fellows identify the top threatsand responses going forward Read more in the series here httpwwwcfrorg911ten-lessons-since-911-attacksp25687]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 542

Counterterrorism News by Nation amp Region

Afghanistan

| back to top |

Four NATO Trucks Destroyed in Afghanistan

Afghan Online Press | (Afghanistan) 7 September 2011

Taliban militants have destroyed four NATO trucks carrying supplies for US-led soldiers in Afghanistanin the eastern part of the country Press TV reports The attack occurred place in the city of MohammadAghe in the eastern province of Logar on Monday The incident did not cause any casualties Afghanofficials said Taliban spokesman Zabihullah Mojahid claimed that six NATO trucks had been damaged

NATO tankers and containers carrying fuel for US-led soldiers from Pakistan also come underattack by Tehrik-i-Taliban Pakistan militants in Afghanistans neighbor Hundreds of NATO tankers andcontainers have been destroyed in different parts of Pakistan over the past three years The US militaryand NATO rely heavily on the Pakistani supply route into landlocked Afghanistan more so now thatTaliban attacks are increasing Other routes largely through Russia and the Central Asian states haveproved to be too costly both politically and economically[Article continues here httpwwwaopnewscomtodayhtml]

Taleban Claim Killing 10 Security Forces In Afghan East

Afghan Islamic Press news agency | Peshawar in Pashto 7 September 2011

Two explosions targeted security forces in eastern Khost Province in the early morning on 7 Septemberprivate Pakistan-based Afghan Islamic Press news agency reported A local resident was quoted assaying the first explosion took place when a roadside mine exploded in the Mardikhel area while thesecond blast occurred when explosives placed on a tree went off as the security forces gathered at thescene The eyewitness said he had seen a number of injured people being transported from the area butcould not be more specific as the security forces immediately cordoned off the area and started firing inthe air A local health official told AIP that one body had been transferred from the scene of the incident

Meanwhile Taleban spokesman Zabihollah Mojahed claimed responsibility for the explosionssaying 10 security forces had been killed and a number of others injured in the attack

Afghan Government Rejects UN torture Allegations

Associated Press | 7 September 2011

The Afghan government on Wednesday strongly rejected allegations that its security agencies tortureddetainees mdash charges that were apparently raised in an unpublished UN report

The allegations prompted NATO to temporarily suspend some transfers of detainees frominternational to Afghan-run detention centers They also threatened to further erode the already shakyrelationship between President Hamid Karzais government and the international community InteriorMinister Besmillah Mohammadi and Rahmatullah Nabil head of the Afghan intelligence servicedescribed the NATO decision to suspend detainee transfers as politically motivated and aimed atslowing down the transition of security responsibilities to the Afghan government

Afghanistan is gradually taking over responsibility for the countrys security from the US-ledmilitary coalition as foreign forces aim to withdraw all their combat troops by the end of 2014 TheAfghan government believes that any move to halt the transfer of prisoners under any false excuses is aserious blow to the transition process Mohammadi and Nabil said in a joint statement The twoofficials said that in the past the United Nations in Afghanistan had assured the authorities that theirdetention facilities complied with international human rights standards

They also complained the UN had not given a copy of the report to the government Some of the details of the report have leaked out ahead of its publication prompting the responses The UN hassaid it is still working on finalizing the report and will publish it once it has been completed

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 642

Mohammadi said the government had found out about the allegations in the media The reportapparently included claims of torture such as electric shocks threats of sexual assault and physicaltorture such as the ripping out of nails in Afghan detention facilities The Afghan security agenciesstrongly reject the allegations Mohammadi said adding that international agencies including theUnited Nations had regularly visited Afghan detention facilities Following such visits they assuredauthorities of their satisfactory findings as to the situation in the prisons and compliance with humanrights standards he said hellip[Article continues herehttpnewsyahoocomafghan-government-rejects-un-torture-allegations-130001115html]

Afghan Taliban Spokesman Comments on Turkish Prisoners Release

SITE Monitoring Service | September 2011

Afghan Taliban spokesman Zabihulla remarked on the groups release of four Turkish engineers whowere held for over eight months and noted the well-treatment of the men during their detention In astatement posted on the groups website on September 6 2011 in Arabic and other languagesZabihullah argued that just as the Afghan Taliban treated these and other captives well the enemyshould treat captive fighters well also He reiterated the Afghan Talibans warning to foreign andAfghan companies not to work with the Afghan government and stated However some parties due to

their economic and political interests do not pay attention to the warnings of the Islamic Emirate andcontinue supporting the occupiers Thus the result of their violations will be the punishment and thecapture of their employees by the mujahideen

On September 4 the Afghan Taliban announced that it released four Turkish engineers whoworked for a Turkish company in the Batan area of Paktia province The release they said was basedon Islamic compassion and appreciate for Eid al-Fitr which marks the end of the holy month of Ramadan

Algeria

| back to top | Algerian Security Conference Focuses On Libya

BBC World Service | 7 September 2011

Foreign ministers from North Africa were due to meet in the Algerian capital Algiers on 7 September todiscuss ways of confronting terrorism and preventing the flow of weapons from Libya BBCWSreported High level delegations from France and the United States and diplomats from Mali Niger andMauritania were also due to attend the conference Algeria has expressed concern that arms from Libyacould fall into the hands of the north African branch of Al-Qaidah (AQIM) which has been active in theSahara and has kidnapped westerners the report noted

Algeria To Submit List Of Arms Smugglers At Conference

Le Temps dAlgerie website | Algiers in French 6 September 2011Algeria is expected to submit a list of weapons smugglers in the Sahel region to its partners in the fightagainst terrorism at the conference Algerian privately-owned newspaper Le Temps dAlgerie reportedon 6 September

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 742

Bahrain

| back to top |

Bahrain Panel 101 Activists on Hunger Strike

Associated Press | 7 September 2011

More than 100 jailed Bahraini activists mdash including doctors who treated injured protesters duringmonths of anti-government protests and crackdowns in the Gulf kingdom mdash are on hunger strike an

international panel said Wednesday The Bahrain Commission of Inquiry said in a statement that 84opposition supporters are on hunger strike in prison In addition 17 detained activists have beenhospitalized by the Interior Ministry for their refusal to eat

Hundreds of activists have been imprisoned since February when Shiite-led demonstrations forgreater rights began in the Sunni-ruled Bahrain the home of the US Navys 5th Fleet More than 30people have been killed since protests inspired by Arab uprisings began in February The five-memberpanel has been set up in June to investigate the unrest Wednesdays statement said an internationalexpert on hunger strikes will join the panel to visit the striking detainees and evaluate their condition

Medical advice will be provided and the expert will discuss the challenges of hunger strike thestatement said adding that the hunger strike started nine days ago

Among jailed activists on hunger strike are 20 doctors who are on trial in a special security court

on charges of participating in efforts to overthrow Bahrains 200-year-old monarchy Other jailedopposition supporters have joined the strike including two prominent Shiite activists Abdul Jalil al-Singace and Abdulhadi al-Khawaja They were sentenced to life in prison in June for their role inprotests The doctors trial is being closely watched by rights groups which have criticized Bahrains useof the security court that includes military prosecutors and civilians and military judges

The case against 11 health professionals was back in the special tribunal on Wednesday Noverdict is expected from the session The Bahrain Commission of Inquiry includes international judicialand human rights experts They started the probe with the consent of the Sunni rulers The commissionsfindings are expected Oct 30 Shiites comprise about 70 percent of Bahrains 525000 people but areblocked from top political and security posts[Article continues here httpnewsyahoocombahrain-panel-101-activists-hunger-strike-

112949681html]

Colombia

| back to top |

Colombias Complete Military Command Replaced

Colombia Reports

Colombian President Juan Manuel Santos announced Tuesday that the countrys entire militarycommand has been replaced amid growing concerns about increased violence by illegal armedgroups

[Article continues here httpwwwcolombiareportscomcolombia-newsnews18815-colombias-complete-military-command-replacedhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 842

Denmark

| back to top |

Family Held by Somali Pirates Released

Associated Press | 7 September 2011

Seven Danish hostages including a family with teenage children have been released by Somali piratesafter more than six months in captivity Denmarks Foreign Ministry said Wednesday The Danes -- a

couple with three children ages 12-16 and two crew members -- were captured in the Indian Ocean onFeb 24 while sailing around the world in a yacht

The seven Danes are doing well under the circumstances They are expected back in Denmark in a short time the ministry said in a brief statement It gave no details of how they were released andmade no mention of a ransom being paid No one at the Foreign Ministry was immediately available forcomment

Prime Minister Lars Loekke Rasmussen told public broadcaster DR that the Danes were on theirway back in a chartered airplane paid for by their insurance company Loekke Rasmussen said theirrelease came after a long period of negotiations Jan Quist Johansen his wife Birgit Marie Johansentheir sons Rune and Hjalte and daughter Naja were captured along with the two adult Danish crewmembers when their 43-foot yacht was seized by pirates The Johansens are from Kalundborg 75 miles

west of Copenhagen They set out on their round-the-world journey in 2009 Of course it is verycheerful news said Ole Meridin Petersen chairman of the Kalundborg yacht club where Jan QuistJohansen was a member I can imagine that the hostages after their release need quite a lot of calmMeridin Petersen told The Associated Press

The yacht was seized while the Johansens were sailing through the pirate-infested waters off EastAfrica The family very likely is aware that what they did was not so fortunate They certainly feelpretty bad about it now Meridin Petersen said Hostages are held in hot austere conditions in Somalia -- typically for many months -- before a ransom is agreed on and paid and the hijacked ships and creware released Last year a British sailing couple were released after 388 days in captivity Reportsindicated that a ransom in the region of $1 million was paid for their release Somalia hasnt had afunctioning government since 1991 one of the reasons the piracy trade has flourished hellip

[Article continues here httpwwwfoxnewscomworld20110907denmark-family-held-by-somali-pirates-since-february-releasedtest=latestnews]

France

| back to top |

Western Governments Said Protecting Intelligence Officers From Scrutiny

BBC World Service | 7 September 2011

Western governments have been accused by Europes leading human rights body of shielding theirintelligence services from accountability for serious violations BBC World Service reported on 7

September The reports author the rapporteur for the Council of Europe Dick Marty said theseviolations had occurred during anti-terrorist operations He said a licence to abduct torture or kill onlyexisted in films and dictatorships but western governments were using the notion of state security toprevent parliaments and judges from scrutinising the work of intelligence officers

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 942

India

| back to top |

Deadly Explosion Strikes Courthouse in New Delhi

New York Times | By Jim Yardley 7 September 2011

An explosion ripped through a reception area of an Indian courthouse on Wednesday morning killing atleast 10 people and wounding more than 60 others in a bombing that renewed concerns about Indiarsquos

vulnerability to terrorism It was the second bombing of the courthouse in less than four months

Relatives mourned a victim of the bombing which struck a courthouse reception area Harish TyagiEuropean PressphotoAgency

Witnesses described a chaotic scene at the Delhi High Court after the blast at 1014 am outside areception area used by litigants lawyers and visitors to enter the courthouse

ldquoIt was in shamblesrdquo said Ajay Mehrotra a lawyer who witnessed the explosion ldquoThere wastotal chaos There was blood People were running for their livesrdquo

The Indian home minister Palaniappan Chidambaram called the explosion a terrorist attack andnoted that New Delhi was already in a high state of alert with Parliament in session Mr Chidambaramsaid Indian intelligence agencies had received information in July about a possible terrorist threat to thecity which had been turned over to the local police He did not elaborate about the intelligence reportOn Thursday three people were detained for questioning by the police Reuters reported

ldquoThe bomb blast took place just outside the reception centerrdquo Mr Chidambaram said at a newsconference ldquoIt is suspected that the bomb was placed in a briefcaserdquoReuters reported that a militant terrorist group called HuJI for Harkat-ul-Jihad Islami based largely inPakistan and also Bangladesh had claimed responsibility for the attacks citing security officials

Prime Minister Manmohan Singh speaking to reporters during a visit to Bangladesh condemned

the explosion as ldquoa cowardly act of a terrorist naturerdquoldquoWe will deal with itrdquo Mr Singh said ldquoWe will never succumb to the pressure of terrorismrdquo

Indian authorities have come under renewed criticism in recent months about their preparedness toprevent terrorism Terrorist attacks are a persistent concern in India particularly in the countryrsquos rapidlygrowing cities which have endured a series of bombings in recent years

In July more than 20 people were killed in Mumbai the countryrsquos financial capital from threeblasts timed to the evening rush hour That attack raised painful memories of the bloody November 2008attacks on Mumbai in which militants trained in Pakistan swept through luxury hotels a railway stationand a Jewish center in a rampage that left more than 160 people dead

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1042

Wednesdayrsquos attack at the Delhi High Court exposed anew the weaknesses in the courthousersquossecurity In May a smaller bomb detonated near a parked car outside the courthouse causing no injuriesWitnesses told local media of seeing a black bag in flames after the blast

Rakesh Tiku chairman of the Delhi Bar Association criticized the Delhi police saying ldquothe low-intensity blast in May should have served as an eye-openerrdquo Mr Tiku said hundreds of litigants andclerks passed through the gate where the blast took place each day making it a vulnerable location ldquoTheDelhi High Court requested the Delhi police to install CCTV cameras as well as personnel to man theentrances three or four months ago but no action has been takenrdquo he said

The latest explosion occurred near Gate 5 of the High Court outside a reception center wherevisitors wait for passes to enter the building Lawyers said Wednesday was an especially busy daybecause the court heard public-interest litigation

ldquoWhat are the police doingrdquo asked Mr Mehrotra the lawyer ldquoThe lives of lawyers litigantsand judges are at stakerdquo

Another witness Brijmohan Sharma described a ldquovery loud sound the reverberations fromwhich caused me to lose my balance I got up and was surrounded by people runningrdquo He added ldquoItwas like a scene from a film People were lying on the floor with their hands cut off their legs brokenand bleedingrdquo

The last serious attacks in New Delhi took place in 2008 when coordinated blasts in a park and

in shopping areas killed more than 20 people and injured nearly 100 In those attacks the IndianMujahedeen an Islamic militant group claimed responsibility

The Delhi High Court is in the heart of the capital a short walk from the cityrsquos landmark IndiaGate Rahul Gupta a local resident said he was standing near the courthouse entrance when the groundshook from the blast throwing people onto the road outside the reception area

ldquoSecurity is one area which no one can handle in Delhi at the momentrdquo Mr Gupta said ldquoIt is thefanatical people who are creating these types of problems and trying to create panic in the publicrdquo hellip

The Indian government said that a preliminary analysis found a nitrate-based explosive withtraces of pentaerythritol tetranitrate or PETN a powerful plastic explosive often used in terror plots hellip[Article continues here httpwwwnytimescom20110908worldasia08indiahtml_r=1ampref=world]

Ten Killed In Delhi Blast

Multiple Sources

At least 10 people were killed and 65 others injured in a bomb blast outside the Delhi High Court on themorning of 7 September private Indian television channel IBN Live reported The terror strike took place in a high security area with Parliament the Prime Ministers Office and India Gate in the vicinitythe report said (CNN-IBN website New Delhi in English 07 Sep 11)

According to the website of the private Indian television channel NDT the blast went off at themain entrance to the court on Shershah Suri Road which is normally heavily guarded The bomb wentoff just before the court was about to open the report said (NDTV website Delhi in English 07 Sep 11)

Security officials were quoted by BBCWS as saying they suspected the explosives were hidden

in a briefcase that had been placed beside the desk where passes were being handed out An eyewitnesstold the BBC that it was a powerful blast shaking the ground and buildings around him (BBC WorldService 7 September 2011)

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1142

Delhi On High Alert In Wake Of Blast

Multiple Sources

The Indian capital has been put on high alert following the blast at the Delhi High Court privateEnglish-language TV news Channel Times Now reported (Times Now TV New Delhi in English0530GMT 07 Sep 11)

Hindi channel says received email from group claiming responsibility for attack Indias Hindinews channel Aaj Tak said on 7 September it had received an email claiming responsibility for the blastAccording to the report the email was sent from the ID harkatuljihadi2011gmailcom The channelsaid the police were investigating possible involvement of the Indian Mujahidin (Aaj Tak TV Delhi inHindi 7 September 2011)

Police Probe Possible Links To Al-Qaidah-Linked Group

Noida IBN Live | in English 7 September 2011

Police in Delhi are looking into claims that a Pakistan-based militant group linked to Al-Qaidah theHarkat-ul-Jihad Islami (HUJI) may have been involved in the attack Noida IBN TV reportedAccording to the report in an e-mail sent to a media house HUJI claimed it had carried out the attack inretaliation for the death sentence issued against Afzal Guru the man found guilty of involvement in an

attack on Delhis parliament almost ten years ago We owe the responsibility of todays blasts at highcourt delhi our demand is that Afzal Gurus death sentence should be repealed immediately else wewould target major high courts amp THE SUPREME COURT OF INDIA the e-mail read According tothe report it was sent from the id harkatuljihadi2011gmailcom

Home Minister Announces Probe Into Attack

CNN-IBN website | New Delhi in English 7 September 2011

Indian Home Minister P Chidambaram speaking in parliament said that investigators did not yet knowwho was behind the attack but he blamed it on terrorists seeking to destabilise the country He saidthat the National Investigative Agency (NIA) would carry out a probe into the attack

PM Denounces Blast As Cowardly Act

Doordarshan news website | New Delhi in English 7 September 2011

Prime Minister Manmohan Singh on 7 September described the blast outside the Delhi High Court as acowardly act and urged all political parties to unite and tackle any acts of terrorism state-run Indiantelevision channel DD News reported This is cowardly act of terrorist nature We will deal with it Wewill never succumb to the pressure of terrorism Singh said He said this is a long war in which allpolitical parties all the people of India have to stand united so that the scourge of terrorism is crushed

IED Explosion At Delhi High Court Domestic Islamists Likely Culprits Growing Signs Of Jihadist Agenda

Sterling-Assynt | 7 September 2011

An IED placed inside a briefcase exploded at 1017AM at an entrance to Delhi High Court wherelitigants collect their visitor passes Wednesdays are reserved for public-interest litigation and so thearea was crowded It is likely that the briefcase was placed in the queue at reception before visitors passthrough security checks There is reportedly no CCTV coverage in this area which will makeidentification of the perpetrator difficult

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1242

The blast was of at least medium intensity and created a crater between three to four feet deepAt least eleven people have died and 65 others have been injured ndash a toll that would probably have beenhigher if an international group had been responsible There were no other explosions which has thesame implication Mumbai has been placed on high alert following the attack especially as the HomeMinistry reported in August that coastal cities were under threat from pan-Islamic terror groups Noblame has yet been assigned A minor explosion occurred on 25 May (also a Wednesday) in a car-park near the Court That bomb was constructed using ammonium nitrate and is believed to havemalfunctioned causing no damage or injuries which suggests similar origins to this one

There are reports of an email from Harkat-ul-Jihadi al-Islami (HuJI) claiming responsibilityfor todayrsquos explosion but we remain sceptical about this since the group has not previously made suchclaims via email The nature of the bomb and the use of email to communicate suggest rather theinvolvement of the Indian Mujahideen (IM) Nonetheless the unverified HuJI email demands that AfzalGurursquos death sentence be repealed and this may point towards the involvement of a jihadist agendaGuru was involved in the December 2001 Parliamentary attacks in Delhi and had his mercy petitionrejected by the Home Ministry on 10 August

Todayrsquos incident indicates an increase in successful attacks by local groups A robust securityforce campaign following the 2008 Mumbai attacks diminished the capabilities of groups such as IMThey claimed responsibility for the December 2010 Varanasi bomb blast which killed one and injured

twenty people However IMrsquos likely involvement in the July 2011 blasts in Mumbai and the attack todaypoints towards the rebuilding of its capabilities and possibly also the establishment of closer ties with jihadi groups

We do not expect a spate of attacks to follow imminently but such incidents will continue tooccur possibly on a larger scale as IM continues to regroup following the security clampdownDevelopments in the cases of Afzal Guru and Ajmal Kasab (the surviving gunman from 2008) willprovide cause for further attacks Given a recent warming in relations between India and Pakistan theHigh Court attack will be unlikely to raise tensions between the two countries significantly

Indonesia

| back to top |

Islamic Groups Continue To Harass Religious Minorities Government Silence Further

Encourages Attacks Youths Beaten In East Jakarta

Assynt SEAsia Vol VIII No17 | 7 September 2011

Hard-line Islamic groups continued to intimidate religious minorities without any response from theGovernment at either a local or national level Yudhoyono relies on the support of Islamic parties inParliament and is unlikely to take any decisive action against such incidents This will further encourageradical groups and endangers the countryrsquos reputation for religious tolerance

Three youths were beaten by members of the Islamic Defenders Front (FPI) for allegedly beingdrunk The attack took place in Jakartarsquos business district but it remains unlikely that the FPI will targetforeigners and the security forces will not tolerate any threats to business interests Nonetheless such

incidents highlight a worrying trend towards increasingly hard-line behaviour that remains unchecked bythe Government

We previously reported that the light sentences handed down for the killing of three members of the Ahmadiyah sect will embolden radical groups (see our Report of 3 August) In this period theIslamic Reform Movement (Garis) coerced Ahmadi youths in Cianjur West Java to join mainstreamprayers The Ahmadiyah sect meanwhile was banned from conducting religious activities during theEid holidays by the South Sulawesi administration for fear of provoking violence

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1342

Iran

| back to top |

Two Arrested Al-Qaidah Members Iraqi Three Iranian - Iran Official

ISNA website | Tehran in Persian 7 September 2011

The public prosecutor of Irans Kerman Province Yadollah Movahhed has announced the start of aninvestigation into the case of five people arrested on charges of having links to Al-Qaidah the IranianStudents News Agency (ISNA) reported on 7 September Two of the detainees - arrested on 19 August -are Iraqis and the other three are Iranian nationals Movahhed told ISNA in an interview on 7 SeptemberThe prosecutor said the detained people are accused of carrying illegal arms and munitions and addedthat an investigation is ongoing into the possibility that they were members of a larger group

Israel

| back to top |

Israel Uncovers Planned Hamas Bombing Spree On Israelis

Xinhua | 8 September 2011

Hamas cells operating in the West Bank routed between May and AugustThe Israeli security agency Shin Bet has broken a network of Hamas cells operating in the West Bank and planning a series of attacks against Israeli targets local media reported Wednesday Dozens of

Hamas members comprising 13 militant cells were arrested throughout the West Bank between May andAugust Army Radio reported One of the groups has carried out a bombing attack at the entrance toJerusalem in March in which a British woman was killed and several dozen civilians wounded Anothercell had planned to dispatch a suicide bomber to Jerusalems Pisgat Zeev neighborhood on Aug 21 Theattack was thwarted at the last minute by Shin Bet agents assisted by the Israel Defense Forces (IDF)and police according to Army radio Other groups were in various stages of planning and preparingattacks including bombings and the kidnapping of civilians or soldiers for the release of Palestinians jailed in Israel The Shin Bet concluded based on its interrogations of the group members that theHamas military leadership in Gaza and abroad is exerting considerable efforts to rehabilitate itspresence in the West Bank with financing and weapon smuggling The West Bank has remainedrelatively quiet in recent years Israeli officials attributed the success in preventing violence in the area

to the cooperation between the IDF and the Palestinian National Authoritys security forces

Israeli Air Strike Kills One Gaza Militant

Xinhua | 8 September 2011

Strike follows more rocket launches from Gaza warnings of new battlesAn Israeli air strike killed an Islamic Jihad militant and wounded three others in the central Gaza

Strip town of Dier a-Balah witnesses and medical sources said Local witnesses said the militant diedafter his car was hit by a missile adding that three other people were also wounded The condition of theinjured is stable hospital sources said Earlier Wednesday an Israeli military spokesperson said a rocketwas launched from the Gaza Strip into south Israel adding the projectile landed in an open area and didnot cause injuries or damage None of the Palestinian armed factions has claimed responsibility for the

rocket attack Late on Tuesday a Palestinian militant was killed and two others injured when Israeliwarplanes targeted a group of gunmen east of Khanyounis City south of the Hamas-ruled Gaza Strip

The Gaza Strip witnessed an escalation of bloody violence between Israel and Gaza militantgroups in August leaving 26 Palestinians and three Israelis killed The violence was triggered after eightIsraelis were killed in well-coordinated operation in the Red Sea city of Eilat Israel accused Palestinianmilitants of plotting and carrying out the attack which started from the bordering Sinai Peninsula inEgypt

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1442

Libya

| back to top |

Libyan Extremist Britain Allowed To Stay Was Link To Al-Qaeda In Iran Papers Show

The Daily Telegraph | (London) By Richard Spencer Tripoli

The extremist Ismail Kamoka spent several years sending funds to terrorist groups across the Middle East

An Alleged Libyan extremist who sought political asylum in Britain regularly travelled to Iran from2002 to provide forged documents to extremists linked to al-Qaeda secret files found in a Tripoliintelligence service building have disclosed

The documents seen by The Daily Telegraph unearth British intelligence suspicions about linksbetween Iran and al-Qaeda dating back almost a decade Other details to come out of the documentssent by MI6 and found in the office of the former head of foreign intelligence and later foreign ministerMoussa Koussa who defected in March include the revelation that Britain had begun co-operating withthe Chinese security services on Islamic extremists The extent of Iranian co-operation with al-Qaedahas been disputed in intelligence communities though Iranians are thought to have provided weaponsand explosives to the Taliban in Afghanistan

A number of al-Qaeda operatives including members of the family of Osama bin Laden fled toTehran after the fall of the Taliban in Afghanistan and their precise status in Iran has been unclear Thepapers in Libya do not directly challenge the Iranian government but suggest that al-Qaeda operativeshad more freedom of movement there than previously thought The extremist Ismail Kamoka spent

several years sending funds to terrorist groups across the Middle East including some linked to al-Qaeda the files said Mr Kamoka who had been given indefinite leave to remain in Britain afterarriving from Saudi Arabia in 1994 and claiming asylum travelled from the UK to Iran viaSwitzerland in July 2002 according to one document[Article continues herehttpwwwtelegraphcouknewsworldnewsafricaandindianoceanlibya8740771Libyan-extremist-Britain-allowed-to-stay-was-link-to-al-Qaeda-in-Iran-papers-showhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1542

Nigeria

| back to top |

Bomb Explodes In Violence-Torn Nigerian City Residents

AFP | 6 September 2011

A bomb went off Tuesday in Nigerias northeastern city of Maiduguri disrupting a three-week lull inbombings in the violence-torn city local residents said [Article continues here httpnewsyahoocombomb-explodes-violence-torn-nigerian-city-residents-215718081html]

Pakistan

| back to top |

Pakistan Bans Foreign Travel For Those Involved In Bin-Ladin Probe

The News website | Islamabad in English 7 September 2011

A Pakistani commission investigating the circumstances surrounding the killing of Al-Qaidah chief Usamah Bin-Ladin has banned foreign travel for everyone involved in the probe Pakistani daily TheNews part of the Jang group which owns Geo TV reported on 7 September The paper recalled that thecommission had already directed the countrys interior ministry and the intelligence service ISI toensure that the Bin-Ladin family was not repatriated from Pakistan without the consent of the

commission

More Than 20 Killed In Two Suicide Blasts In Pakistans Quetta

Express247 TV | Lahore in English 5 September 2011

At least 22 people were killed and several others injured in two explosions in the south-westernPakistani city of Quetta on 7 September the website of the Dubai-based private Pakistani TV channelARY News reported According to the channel one blast went off near the residence of the FrontierConstabulary and another one near the commissioner office in Quetta According to the report around100 kilograms of explosives were used in each attack (ARY News website Dubai in English 07 Sep 11)

Private Pakistani English-language TV channel Express 247 carried a series of onscreen scrollswhich said police had confirmed that the two blasts were suicide attacks The report cited police sources

as saying that 25 people were killed and more than 40 injured in the attacks (Express247 TV Lahorein English 0654GMT 07 Sep 11)

BBCM notes that the attacks came after the Pakistani intelligence agency said on 5 August that ithad arrested Al-Qaidah commander Younis Al-Mauritani and two of his accomplices in Quetta

Taleban Say Quetta Blasts Revenge For Recent Al-Qaidah Arrests

AFP | 7 September 2011

The Pakistani Taleban have claimed responsibility for the twin suicide bombs in Quetta on 7 Septembersaying they were carried out to avenge the recent arrests of Al-Qadiah operatives in the city Wecarried out the attacks Taleban spokesman Ehsanullah Ehsan told AFP in a phone call from anundisclosed location

Twin Suicide Bombings In Pakistan Leave 23 Dead

Miami Herald

Twin suicide bombers attacked the home of a senior military officer Wednesday in the western city of Quetta injuring him and killing at least 23 people officials said in a possible revenge attack forPakistans recent arrest of a senior al Qaida commander [Article continues here httpwwwmiamiheraldcom201109072394264twin-suicide-bombings-in-pakistanhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1642

Philippines

| back to top |

Moro Splinter Group Threatens US Soldiers In Philippines But Capabilities Limited

Government-Rebel Negotiations Remain Difficult

Assynt | SEAsia Vol VIII No17 7 September 2011

Ameril Umbra Kato a former senior Moro Islamic Liberation Front (MILF) field commander whoresigned late last year because he rejects peace negotiations has threatened to attack US troops as wellas Filipino security forces and other Government targets US and Filipino troops are currentlyundertaking joint training exercises This is an annual event but the first time they have been conductedin central Mindanao However Katorsquos splinter group the Bangsamoro Islamic Freedom Fighters (BIFF)is believed to have as few as 200 members with generally unsophisticated weapons ConsequentlyBIFFrsquos ability to conduct an attack on US forces is likely to be limited

In this period Kato announced the creation of a political wing to his grouping the BangsamoroIslamic Freedom Movement emphasising his split with MILF Nevertheless he has not been expelledfrom MILF and so is protected by the current ceasefire with Manila though MILF has stronglycondemned Katorsquos threat against US troops It is possible that MILF leadership is content to allow himto operate relatively unimpeded in order to gain greater leverage in its negotiations with theGovernment since they can contrast their more compromising approach with BIFFrsquos threatened

violence Meanwhile negotiations between MILF and the Government continue MILF dismissed theGovernmentrsquos latest proposal for an autonomous region but both sides appear committed to continuingtalks

Russia

| back to top |

Suicide Bombings In Grozny Demonstrate Islamic Insurgencyrsquos Continuing Capabilities In

Chechnya

Stirling Assynt Reports | Report FSU Vol IV No17 7 September 2011

A series of suicide bombings in the Chechen capital on 31 August (which left nine casualties includingseven police officers) has severely undermined President Ramzan Karydovrsquos claims to have successfully

eradicated the Islamic insurgency in the Republic The first suicide bomber reportedly detonated hisexplosives in a densely populated area only 150 metres from a local Parliament building while twofurther jihadists targeted first-response units Significantly the attack occurred during the Muslimholiday of Eid a three day celebration which marks the end of Ramadan during which the risk of jihadist attacks is heightened Indeed in addition to this strike in Grozny jihadist militants carried outfurther attacks in Iraq Nigeria and Algeria during Eid this year

Although no group has claimed responsibility for this incident it bears the hallmark of theCaucasus Emirate and so was likely orchestrated by the grouprsquos newly appointed deputy KhuseynGakayev and his brother Vadalov Indeed the Gakayev brothers are believed to have been behind theattack on the Chechen Parliament in October 2010 demonstrating the grouprsquos capabilities and intent tocarry out such strikes Moreover the timing of these bombings ndash only two months after the

reconciliation of the Caucasus Emiratersquos leader Doku Umarov with Chechen commanders (see our 3August Report) ndash supports this assessment and suggests that further incidents and suicide bombings arelikely given this truce

Suspected Militant Killed In Russias Southern Republic

Interfax news agency | Moscow in Russian 7 September 2011 Russias National Antiterrorist Committee said on 7 September a militant had been killed in the Republicof Kabarda-Balkaria the corporate-owned Russian news agency Interfax reported

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1742

Saudi Arabia

| back to top |

Saudi Arabia Shopping Around For Nuke Technology

Haaretz | 8 September 2011

Ties with Pakistan may remain close as Riyadh seeks nuclear assistanceSynopsis This week brought news that Iran on its own has produced new advanced nuclearcentrifuges According to a report of the International Atomic Energy Agency Iran has begun to installthe centrifuges in its uranium enrichment facility in Natanz But the high-level source noted thatdevelopment and production of the new centrifuges began more than seven years ago That does notspeak of a great technological capability on Irans part Israeli intelligence like its American counterpartviews 2014 or 2015 as the date when Iran will be able to build nuclear weapons says the source - if itwants to and no one blocks it In Saudi Arabia in contrast they are a bit more disturbed by thedevelopments in Iran An American Department of Energy delegation visited Riyadh and met with DrHashim Yamani who heads the King Abdullah City for Atomic and Renewable Energy Saudi Arabiawants to equip itself with nuclear reactors to generate electricity The United States is interested inselling Riyadh reactors for two reasons - fat contracts and the ability to keep close tabs on nucleardevelopments in Saudi Arabia The American administration is concerned that with a nuclear programfor civilian uses Saudi Arabia would actually like to prepare the infrastructure so it could switch to

producing nuclear weapons relatively quickly should Iran possess such weapons Defense ministerSultan Bin Abdul Aziz and the countrys former intelligence chief Turki Bin Faisal reportedly favorthe preparation of a secret nuclear program for military uses in cooperation with a Sunni Muslim ally -Pakistan which possesses dozens of atomic bombs Saudi Arabia reportedly funded Pakistans nuclearweapons program in return for Pakistans promise to aid the monarchy in this area if need be

Serbia

| back to top |

Serbia Threatened By Terrorism Says Dacic

Tanjug | 8 September 2011

US officials warned Serbia of possible terrorist activity particularly against foreign interests

After a warning coming from USA officials Serbia will raise the level of security in all facilitiesbelieved to be a possible target of terrorists the countrys Deputy Prime Minister and Minister of InteriorIvica Dacic stated Wednesday in the Palace of Serbia He stated that the security measures will primarilyrefer to the facilities of foreign countries in Serbia and added that special attention will be paid to thesecurity of air traffic US officials assume that there is a possibility of new terrorist attacks in the USAand other countries including Serbia Dacic said following a meeting with Special Representative of the UN Secretary-General for Disaster Risk Reduction Margareta Wahlstrom in Belgrade and a sessionof the republic headquarters for emergency situations

Somalia

| back to top |

Six Killed In Mortar Attack In Somali CapitalShabeelle Media Network website | Mogadishu in Somali 7 September 2011

Six people were killed and several others injured after three mortars landed in Mogadishus Arjantiinneighbourhood in Kaaraan District on the night of 6 September the privately-owned Shabeelle websitereported It quoted an eyewitness as saying that two of the three mortars fired have caused thecasualties inflicting fear in the residents who returned to their homes after Al-Shabab vacated the areaearly last month Kaaraan District is one of the areas taken over by the government forces and AUpeacekeepers

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1842

United States

| back to top |

Post-911 Intelligence Reform Takes Root Problems Remain

Reuters | 8 September 2011

US intelligence agencies will forever be scarred by their failure to connect the dots and detect theSeptember 11 plot but a decade later efforts to break down barriers to information-sharing are takingroot Changing a culture of need-to-know to need-to-share does not come easily in spy circles Someofficials say they worry a decade later about a future attack in which it turns out that US spy agencieshad clues in their vast vaults of data but did not put them together or even know they existed

Yet significant changes both big and small have broken down barriers between agenciessmoothed information-sharing and improved coordination US intelligence experts say From issuing ablue badge to everyone working in the sprawling intelligence community to symbolize a commonidentity to larger moves of mixing employees from different agencies the goal is singular -- to preventanother attack

Were much further ahead David Shedd Defense Intelligence Agency deputy director said of the ability to connect the dots compared with 10 years ago Still signs of a plot to attack the UnitedStates could be missed again My worst fear and I suspect probably one that would come true is that inany future would-be or actual attack God forbid we will be able to find the dots again somewhere

because of simply how much data is collected Shedd said The political response to the failure to stopthe attack was the 2002 creation of the Department of Homeland Security pulling together 22 agenciesto form the third largest US Cabinet department behind the Pentagon and Veterans Affairs

That was followed by the creation in late 2004 of the Director of National Intelligence to overseeall the spy agencies as recommended by the bipartisan 911 commission Previously the CIA directorheld a dual role of also overseeing the multitude of intelligence agencies But in the aftermath of the2001 attacks policymakers decided that was too big of a job for one person to do effectively

Critics argued then and now that the reforms were the governments usual response to crises --create more bureaucracy But others see much-needed change It has been a tremendous improvementsaid Lee Hamilton who was the 911 commission vice chair Its not seamless there are problems andweve still got a ways to go The 2001 attacks involving airliners hijacked by al Qaeda operatives killed

nearly 3000 people in New York Pennsylvania and the Pentagon Various US intelligence and lawenforcement agencies had come across bits of information suggesting an impending attack but failed toput the pieces together The CIA had information about three of the 19 hijackers at least 20 monthsbefore the attacks the National Security Agency had information linking one of the hijackers with alQaeda leader Osama bin Ladens network the CIA knew one hijacker had entered the United States butdid not tell the FBI and an FBI agent warned of suspicious Middle Eastern men taking flying lessons

Have the reforms made America safer Officials say yes and point to the US operation thatkilled bin Laden in Pakistan in May that demanded coordination among intelligence agencies and themilitary But there is an inevitable caveat no one can guarantee there will never be another attack onUS soil On Christmas Day 2009 a Nigerian man linked to an al Qaeda off-shoot tried unsuccessfullyto light explosives sewn into his underwear on a flight to Detroit from Amsterdam It turned out US

authorities had pockets of information about him President Barack Obama used a familiar September 11phrase to describe the 2009 incident as a failure to connect the dots of intelligence that existed acrossour intelligence community

Roger Cressey a former White House National Security Council counterterrorism officialresurrected another September 11 phrase It was a failure of imaginationThe intelligence community had not seen al Qaeda in the Arabian Peninsula a Yemen-based al Qaedaoff-shoot as capable of striking the US homeland If the underwear bomber threat had originated inPakistan they would have gone to battle stations immediately Cressey said Some proposed changesin how authorities would respond to another successful attack still are pending For example creation of

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1942

a common communication system for police firefighters and other emergency personnel remainstangled up in political wrangling in Congress over how to implement it This is a no-brainer Hamiltonsaid The first responders at the scene of a disaster ought to be able to talk with one another Theycannot do it today in most jurisdictions

Former leaders of the 911 commission issued a report card saying nine of its 41recommendations remain unfinished The Office of the Director of National Intelligence hasexperienced growing pains as overseer of the 17 spy agencies churning through four chiefs in six yearsTensions over turf confusion about the DNIs role and problems herding agencies with very powerfulchiefs of their own all came to a crescendo when retired Admiral Dennis Blair the third DNI tried toassert authority over CIA station chiefs who represent the agency in different countries The positionof chief of station is one of the crown jewels of the CIA and they dont want anyone playing with theircrown jewels said Mark Lowenthal a former senior US intelligence official

After a dust-up with CIA Director Leon Panetta who now is defense secretary it was Blair whowas sent packing I think the mistake that some have made is to have viewed the DNI and the Directorof CIA as an eitheror proposition rather than the power of the two working together the DIAs Sheddsaid in an interview in his office There is a history of where that hasnt worked so well I believe it isworking much better today said Shedd who has worked at the DNI CIA and National SecurityCouncil

Intelligence experts say in the current administration Obamas top homeland security andcounterterrorism adviser John Brennan arguably has more power than any of them because he has thepresidents ear Its a reminder that bureaucratic reform or no personalities count in making nationalsecurity policy The improved sharing of secret data has led to yet another set of problems The delugeof bits and bytes has subjected intelligence analysts to information overload as they try to sift through itall for relevant pieces Our analysts still are spending way too much time on finding the informationrather than on the analysis of the information Shedd said There is just too much data to go find it all

The intelligence community wants a system developed that would automatically processinformation from multiple agencies and then make the connections for the analysts

But greater inroads into sharing data across agencies does not guarantee that another attack willbe averted The threat has evolved and officials now are increasingly concerned about a lone wolf plot

by an individual not tied to any militant group that may be more difficult to uncover Those threatswill not come to our attention because of an intelligence community intercept said John Cohen asenior Department of Homeland Security counterterrorism official

They will come to our attention because of an alert police officer an alert deputy sheriff analert store owner an alert member of the public sees something that is suspicious and reports it Cohensaid One measure of the success of post-911 reforms is that a decade later the United States has not hada similar attack Now that could be luck that could be skill we dont really know Hamilton said Butin all likelihood what we have done including the establishment of the Department of HomelandSecurity and the transformation in intelligence and FBI has certainly been helpful[Article continues here ]httpnewsyahoocompost-9-11-u-intelligence-reforms-root-problems-052514320html

Comment the value added provided by the Office of the DNI remains an open question for many withinthe Intelligence Community (IC) and is a favored theme of corridor discussion in IC-member agenciesOn the other hand there is broad agreement among intelligence officials that the degree of cooperationand coordination between intelligence agencies and the character of intelligence sharing has vastlyimproved The fact that there has not been a successful major attack on US soil since 911 ndash not forlack of plotting ndash is in great part testimony to this more effective cooperation

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2042

Jihadist Suggests Striking New York City Bridges

All SITE Intelligence Group | 6 September 2011

A jihadist pointed to what he found to be a weak point of suspension bridges and directed his messageto those who love blasting and explosions In a message posted on the Shumukh al-Islam forum onSeptember 6 2011 the jihadist Abu Suleiman al-Nasser gave a picture of the Verrazano Bridge inNew York on which he drew a red box and arrow on the bridges center He then gave a map on whichhe circled the various bridges in New York City and its boroughs A fellow jihadist offered his ownidea giving a picture of the Hoover Dam and explaining that there is no target more important thandams He wrote that striking a dam may lead to the submerging of cities and the killing of thousands of people and in the case of the Hoover Dam would impact Las Vegas the capital of gambling anddebauchery

Counterterror Veteran is New Deputy FBI Director

Atlanta Journal Constitution | 1September2011

A 24-year FBI veteran with extensive counterterrorism experience Sean Joyce has been named the lawenforcement agencys new deputy director Elevated to the No 2 post within the FBI by Director RobertMueller Joyce replaces Timothy Murphy who is retiring after 23 years with the bureau Since last yearJoyce has been executive assistant director of the national security branch responsible for the FBIs

national security and intelligence operations He earned the Attorney Generals Award for ExceptionalService in 2004 for work on a counterterrorism squad in Dallas In 2008 he was named chief of thecounterterrorism divisions international terrorism operations section with responsibility forinternational terrorism matters within the United States hellip[Complete article is available here httpwwwajccomnewsnation-worldcounterterror-veteran-is-new-1153018html]

Top CIA Official Obama Changed Virtually Nothing

Salon | 1 September2011

PBSs Frontline is airing an examination of Top Secret America on September 6 The show includes arare and lengthy interview with 34-year-CIA-veteran John Rizzo who is described as the most

influential lawyer in CIA historyHere is one quote they include from Rizzo With a notable exception of the lsquoenhanced

interrogationrsquo program the incoming Obama administration changed virtually nothing with respect toexisting CIA programs and operations Things continued Authorities were continued that wereoriginally granted by President Bush beginning shortly after 911 Those were all picked up reviewedand endorsed by the Obama administration hellip[Complete article is available herehttpwwwsaloncomnewspoliticsbarack_obamastory=opiniongreenwald20110901obama]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2142

General Counterterrorism News| back to top |

The Terrible Missed Chance

Newsweek | 4 September 2011

Special Agent Harry Samit of the FBIs Minneapolis field office knew he was looking into the eyes of aterrorist It was early afternoon on Friday Aug 17 2001 Across from him sat Zacarias Moussaoui a33-year-old French-born student arrested the day before for overstaying his visa Moussaoui had paidmore than $8000 in cash that summer to sit in a cockpit simulator in a flight school in the suburbs of Minneapolis and learn - in a matter of days - the basics of how to fly a 747-400 Samit a formerintelligence officer at the Navys celebrated Top Gun flight school felt sure the man across the desk from him was a Muslim extremist who was part of a plot to hijack a commercial jetliner filled withpassengers The trick Samit wrote in a soon-to-be-released excerpt of a book hes written about thecase was getting Moussaoui to admit this and reveal details and associates to allow us to stop the plot

Surely the bureau brass in Washington would share his concern Samit thought He was wrongThat same day halfway across the country in the fluorescent-lit hallways of the J Edgar Hoover

FBI headquarters building in Washington counterterrorism supervisors were treating Samits firstreports about Moussaoui with skepticism even contempt Michael Maltbie a DC counterterrorism

specialist insisted repeatedly in the days after the arrest that there was no clear link between Moussaouiand Al Qaeda - the link needed for a warrant Maltbie thought Moussaoui was a dirty bird he latertold investigators but favored deporting him to France

Believing a hijacking might be imminent Samit appealed to his boss in Minneapolis SpecialAgent Greg Jones Jones picked up the phone on Aug 27 and called Maltbie at FBI HQ

Moussaoui he said might be part of a plot to get control of an airplane and crash it into theWorld Trade Center or something like that

Maltbie scoffed You have a guy interested in this type of aircraft Maltbie replied accordingto FBI documents That is it (Maltbie declined requests for an interview)

At least Maltbie was paying attention Michael Rolince who ran the FBIs InternationalTerrorism Operations Section was arguably the bureaus most important go-between with the White

House on domestic terrorist threats in the summer of 2001 He tells Newsweek he spent less than 20seconds being briefed on the Moussaoui case that August His office was inundated with terrorismprobes he said since Moussaoui was in custody already he posed no immediate threat Did it rise tothe level of something that I would take upstairs Rolince asks The answer is no

At CIA headquarters alarm bells were ringing loudly CIA Director George Tenet was briefedon Moussaoui within days of the arrest receiving a paper with the eye-catching headline IslamicExtremist Learns to Fly But the FBIs acting director that summer and the bureaus most seniorcounterterrorism official were left in the dark[Article continues here httpwwwthedailybeastcomnewsweek20110904the-terrible-missed-chancehtml]

Pan Am Flight 103 - Lockerbie Bombing - al-Megrahi CIA FilesWebwire | 31 August2011

BACM ResearchPaperlessArchivescom has announced the publishing of CIA files related to the PanAm Flight 103 Lockerbie Bombing

The files can be downloaded at no cost at httpwwwpaperlessarchivescompanam103ciahtml The files date from 1984 to 1999 These are the most recent files on Pan Am 103 released by the

CIA This set of files is unique because it includes memos on the direct handling of an intelligencesource This type of information is exempt from the Freedom of Information Act (FOIA) and is not oftenreleased by the Agency

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2242

The files cover information received by the CIA on Abdel Basset al-Megrahi Al-Megrahi is theonly person ever convicted in the Pan AM 103 case The Scottish government in 2009 allowed al-Megrahi to be released from custody and returned to Libya because of his failing health With the recentfall of Muammar Qaddafis regime there have been renewed calls for al-Megrahi to be returned toScottish custody or extradited to the United States and put on trial[Complete article is available here httpwwwwebwirecomViewPressRelaspaId=144692]

Getting The Caucasus Emirate Right

CSIS | August 2011

ldquohellipThis report aims to set straight a rather distorted record It demonstrates the veracity of three vitallyimportant facts usually obfuscated in discussions of the subject (1) the longstanding and growing tiesbetween the CE and its predecessor organization the ChRI on the one hand and al Qaeda (AQ) and theglobal jihad on the other hand (2) the importance of the CE jihadi terrorist network as a united andorganized political and military force promoting jihad in the region and (3) the salience of local culturaland the Salifist jihadist theo-ideology and the influence of the global jihadi revolutionarymovementalliance as key if not the main factors drive the ldquoviolence in the North Caucasusrdquohelliprdquohttpcsisorgfilespublication110829_Hahn_GettingCaucasusEmirateRt_Webpdf

7 Things You Didnrsquot Know About the War on TerrorForeign Policy | By Eric Schmitt and Thomas Shanker 6 September 2011

From an attempt to negotiate with Osama bin Laden to a proposal to threaten to bomb Mecca its been awild decade for the US national security establishment

Our new book Counterstrike The Untold Story of Americas Secret Campaign Against Al Qaeda is in many ways asummary of the past decade of our reporting on the military intelligence community and domestic law enforcement as itentered a new era of Darwinian evolution to counter violent extremism

It also is our deep dive into a decade of American counterterrorism efforts -- from the work of commando trigger-pullers and spies on the ground up to senior political leaders who wanted to defendthe nation (and get re-elected) Our efforts to report and write this book allowed us to uncover many newmissions never discussed before -- and gave us an understanding of how the war on terror had changedover the last decade

Our book assesses the 10 years since 911 as the military divides the fight into tactical missionson the battlefields of modern terrorism then the operational advancements that provided the means tosuccess while not securing final victory and at the top the strategic level of policy debates about howthe nation should combat this threat to its security

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2342

Here are seven vignettes from Counterstrike that offer glimpses into the thinking of policymakers andcommanders in early days after the Sept 11 attacks and how that thinking evolved over the followingdecade into a more whole-of-government approach to combating terrorists

1 Bush Tried to Negotiate with al Qaeda

The George W Bush administration like all of its predecessors swore never to negotiate with terroristsBut it did undertake an extraordinary and extraordinarily secret outreach effort to open a line of communication with Osama bin Laden and al Qaedas senior leadership It was an attempt to replicatehow the United States tried to sustain a dialogue with the Soviet Union even during the darkest days of the Cold War when White House and Kremlin leaders described in private and in public a set of acceptable behaviors -- and described with equal clarity the swift vicious even nuclear punishment forgross violations

In the months after the Sept 11 attacks Bushs national security staff working through theintelligence agencies made several attempts to get a private message to bin Laden and his inner circleThe messages were sent through business associates of the bin Laden familys vast financial empire aswell as through some of the al Qaeda leaders closest relatives a number of whom were receptive toopening a secret dialogue to restrain and contain their terrorist kinsman whom they viewed as a blot on

their name (To be sure other relatives were openly hostile to the American entreaties)According to a senior American intelligence officer with first-hand knowledge of the effort the

response from Osama bin Laden was silence And the effort was suspended

2 Sometimes a Wedding Is Just a WeddingIn the early days after the Sept 11 attacks the CIA and FBI vied to produce the most compellingintelligence reports that tracked suspected terrorist plots The agencies often worked at cross purposessometimes unwittingly At one point in early 2002 both agencies were tracking what American analystssaid were growing preparations for a major wedding somewhere in the Midwest (In terroristvernacular the word wedding is often code for a major attack)

Dribs and drabs on this wedding planning made their way to President Bush from bothagencies independent of each other of course

Finally over the Easter holiday during a video-teleconference with top aides in Washingtonfrom his ranch in Crawford Texas Bush stopped the briefing exasperated by the discrepancies in therival agencies reporting about the suspected threat

George Bob get together and sort this out Bush told his CIA director George J Tenet andFBI director Robert S Mueller III

Bushs instincts were correct When the analysts finally untangled their clues it turned out thatthe ominous wedding really was just that the matrimony of a young man and a young woman fromtwo prominent Pakistani-American families There was no threat There was no plot

3 The Threat to Bomb MeccaAs fears of a second attack mounted following the 911 strikes US government planners franticallycast about for strategies to protect the country Even the most far-fetched ideas had a hearing howeverbriefly In one case some government planners proposed that if al Qaeda appeared ready to attack America again the United States should publicly threaten to bomb the city of Mecca in Saudi Arabiathe holiest site in all of Islam in retaliation Just nuts one Pentagon aide wrote to himself when heheard the proposal The idea was quickly and permanently shelved

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2442

4 The SEAL Raid in Iran That Didnt HappenWhen US forces routed the Taliban government in Afghanistan and forced bin Laden and his toplieutenants to flee many senior al Qaeda leaders including bin Laden and his deputy Ayman al-Zawahri escaped to neighboring Pakistan But a separate group including the al Qaeda leaders sonSaad bin Laden fled to northern Iran where American troops would not pursue them and the Iranianswould likely not detain them But the Shiite clerics running Iran placed the al Qaeda operatives and theirfamily members under virtual house arrest and they became a shield against possible attacks from theSunni-based terrorist organization

One plan in particular illustrated the bold thinking and wildly unrealistic aims of the militarysinitial approach after 911 to kill or capture terrorist leaders The plan called for hunting the eight to 10senior al Qaeda leaders and operatives who had sought refuge in Chalus an Iranian resort town on theCaspian Sea where they had been detained

At the Joint Special Operations Command at Fort Bragg NC military planners drew up optionsfor Navy SEALs to sneak ashore at night using state-of-the-art mini-submarines Once they landed theSEALs would slip past Iranian guards to snatch the al Qaeda leaders Another option called for SpecialOperations helicopters to spirit American commandos into the town and whisk them out again with theirquarry The Americans went as far as conducting two or three rehearsals at an undisclosed locationalong the US Gulf Coast in early 2002 They conducted small-boat insertion exercises involving about

30 Special Operations personnel most SEALs and eventually concluded the mission was feasible if they were provided with more detailed intelligence on the locations of the al Qaeda members and thesecurity around them

The logistics of the mission were daunting Chalus sits at the edge of the Elburz coastal mountainrange about 70 miles north of Tehran and the failed rescue of the American hostages in Iran in April1980 loomed large in commanders memories Eventually Gen Richard B Myers the chairman of theJoint Chiefs of Staff rejected the mission as too risky and too politically volatile Many of the al Qaedaoperatives are reportedly still there

5 Intelligence Hauls of Unusual Size

US intelligence and military commandos have carried out tens of thousands of raids in the decade since911 The amount of material seized from terrorist and insurgent targets has grown to a massive sizeThe Defense Intelligence Agency (DIA) operates exploitation triage centers and giant warehouses forstoring intelligence products -- in war zones rear headquarters in countries like Qatar and back in theUnited States One intelligence analyst said that walking into one of the warehouses for documents andmedia exploitation reminded him of the final scene in Raiders of the Lost Ark when the captured Ark of the Covenant is crated up and rolled into a cavernous storage area that contains all the governmentsother dangerous secrets

All told more than two million individual documents and electronic files have been cataloguedby media type hard copy phone number thumb drive Each is inspected by a linguist working with acommunications analyst or computer expert

The DIA analysts are joined by specialists from other agencies including the FBI and the DrugEnforcement Administration Yet given the overwhelming volume no more than about 10 percent of thecaptured intelligence has ever been analyzed

Intelligence officers say they simply are overwhelmed and untold quality leads may still beburied in the piles of computers digital files travel documents and pocket litter

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2542

6 The Digital Counterjihad Cyberspace is the terrorists ultimate safe haven Its where they recruit raise money and even plotattacks using coded language while playing online video war games The US government fights back

One technique is called false band replacement whereby the intelligence agencies infiltratemilitants networks and post their own material to counter extremist efforts on those same jihadistwebsites The trick is to forge the onscreen trademarks -- web watermarks -- of al Qaeda media sites

This makes messages posted on these sites official and sows dissent and confusion among themilitants

This Internet spoofing can be used in support of more traditional combat missions There is atleast one case confirmed by American officials in which a jihadist website was hacked by Americancyberwarriors to lure a high-value al Qaeda to a surreptitious meeting with extremist counterparts -- onlyto find a US military team in waiting

Getty images

7 First Kill the MullahsUS counterterrorism officials have learned fighting terrorists effectively means targeting specific nodesof that network that support and enable militants who strap on suicide vests This strategy focuses onneutralizing enablers such as the financiers gun-runners and logisticians Among these terror linchpins

are religious leaders who bless attacksHeavenly reward will not await a suicide bomber unless his death and those of his victims is

deemed halal in keeping with Islams sacred sharia law Each militant network has a sharia emir usuallyat the level of a sheikh or mullah In Iraq American commanders specifically killed emirs to throw awrench in a suicide bombing networks

Take him out and suicide bombings from that network are frozen until he is replaced said onemilitary officer with command experience in Iraq hellip[Complete article is available herehttpwwwforeignpolicycomarticles201109067_things_you_didn_t_know_about_the_war_on_terror]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2642

Dick Marty Rendition Report Condemns lsquoCult of Secrecyrsquo

BBC News | 8 September 2011

A report for Europes human rights watchdog has called for greater scrutiny of secret services andsupport for whistleblowers The Council of Europe investigated how countries like Britain GermanyRomania and Lithuania assisted the US with the rendition of terror suspects It said a cult of secrecyhad helped Western governments cover up abuses Defending whistleblowers it singled out USsoldier Bradley Manning accused of passing secrets to Wikileaks He had acted as a whistleblowerand should be treated as such CoE rapporteur Dick Marty wrote in the report which was due to besubmitted to the CoEs Parliamentary Assembly The soldier is currently in a US military prisonawaiting trial for passing restricted material to the controversial website

But the report praised Mr Manning and Wikileaks itself for uncovering evidence of renditionThe CoE represents 47 member-states including both EU countries and Russia and other ex-Sovietstates Mr Martys report focused on the record of Western states explaining that it was based oninvestigations into European links to the controversial US policy of rendition for terrorism suspectsThe CIA allegedly flew terror suspects around the world for interrogation in the years after 911 holdingthem in secret prisons in Europe and elsewhere

No licence to kill

In his 48-page report - entitled Abuse of State Secrecy and National Security - Mr Marty looked at thelevel of control exercised by European states over their security services He urged all states to useindependent parliamentary committees to oversee the work of their secret services saying this was of vital importance for the rule of law and democracy Mr Marty argued that Western governments wereusing the notion of state secrecy to shield their intelligence services from accountability for seriousviolations committed during anti-terrorist operations We consider that this is simply unacceptablehe wrote

A licence to kill (or to abduct and torture) only exists in certain films and in dictatorialregimes In democratic systems parliaments as representatives of the people have a right and duty toknow what the government is doing in the name of the people Mr Marty praised investigative journalists and non-governmental organisations for their work in exposing abuses of authority Stressing

the fundamental role whistleblowers had to play in an open society he warned against a real cult of secrecy as an instrument of power

While it was up to the courts to decide if Bradley Manning had committed any crime he wrotethe CoE was indebted to him for the publication of a recording of a helicopter attack in Iraq in whichthe crew seems to have intentionally targeted and killed civilians

Thanks to Mr Manning he said a large number of embassy reports had allowed us to learnsignificant details of important recent events which are obviously of general interest We therefore join Amnesty International in expressing our worries as to the treatment he receives Mr Marty wrote inthe draft report[Article continues here httpwwwbbccouknewsworld-europe-14820145]Comment This report demonstrates that Dick Marty is not as De Gaulle would say a serious man To

suggest that Bradley Manning is a hero and intelligence agencies bent on defeating terrorists arecriminals should say it all Manning knowingly violated his oath and willfully provided enormousamounts of classified material to WikiLeaks For Marty this is a good thing in the name of transparencyMarty always injudicious and anti-American in his remarks is now moving at warp speed into crackpotterritory

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2742

Al Qarsquoida amp its Affiliates| back to top |

Al Qaeda Is Down Not Out

Los Angeles Times | By Amy Zegart 7 September 2011

US talk of defeating terrorism is dangerously prematureTalk of strategically defeating Al Qaeda is all the rage in the White House these days Defense

Secretary Leon Panetta used the D-word in July President Obama declared in his new counter-terrorism strategy We can say with growing confidence that we have put Al Qaeda on the path todefeat Compared to the woeful state of the economy terrorism has become the administrations feel-good story of the year

Defeat is a big word It is also dangerously misleading Yes the United States has made greatstrides in the last decade to harden targets improve intelligence and degrade the capabilities of violentIslamist extremists Osama bin Ladens death was a major accomplishment But the fight is nowhereclose to being won and Americas most perilous times may lie ahead Three reasons explain why

The first is that strategically defeating Al Qaeda is not nearly as important as it sounds After911 Al Qaeda morphed into a more complicated decentralized and elusive threat consisting of threeelements core Al Qaeda affiliates or franchise groups operating in places like Yemen and Somalia with

loose ties to the core group and homegrown terrorists inspired by violent extremism often through theInternet in the comfort of their own living rooms

Core Al Qaedas capabilities started degrading in 2001 when the US invaded Afghanistandismantled training camps ousted the Taliban and sent Bin Laden running The CIA has estimated thecore group remaining in the AfghanistanPakistan region to number 50 to 100 fighters The last time BinLaden oversaw a successful operation was 2005 when Al Qaeda struck the London transit system

But plots by homegrowns and franchise groups have risen dramatically in recent years The 2009Ft Hood shooting the worst terrorist attack on US soil since 911 was the work of a homegrownterrorist The mastermind of the 2010 Times Square car bomb plot was a naturalized American citizentrained by the Pakistani Taliban not Al Qaeda Another franchise group Al Qaeda in the ArabianPeninsula was behind the foiled 2009 Christmas Day underwear bomber aviation plot and the 2010

plot to explode tampered printer cartridges aboard cargo planes The Bipartisan Policy Center reported11 violent Islamist extremist terrorist incidents against the US homeland in 2009 the most since 911Nearly all involved what former CIA Director Mike Hayden calls a witches brew of radicalizedAmericans and franchise groups

The second reason why talk of defeat is premature has to do with weapons Terrorism againstAmericans is nothing new The potential for terrorist groups to acquire weapons of mass destruction isIn 1995 a Japanese cult released sarin nerve gas in the Tokyo subway killing 12 people and injuringthousands It was the first WMD terrorist attack in modern history and it sparked a wave of presidentialterrorism commissions years before Bin Laden became a household name

It is this specter of the lone fanatic or small group armed with the worlds most devastatingweapons that keeps experts up at night In 2005 60 leading nuclear scientists and terrorism experts were

asked how many believed the odds of a nuclear attack on the US were negligible Only three or fourhands went up most were far more pessimistic Today there is enough nuclear material to build120000 weapons As long as fissile material is poorly stored and rogue states like Iran and North Koreacontinue their illicit weapons programs nuclear terrorism remains a haunting possibility

The third reason is that the FBI has not yet become a first-rate domestic intelligence agencyAnalysts whose work is vital to success are still second-class citizens labeled support staff alongsidesecretaries and janitors and passed over for key jobs including running the bureaus intelligence unitsThe FBIs information technology is so antiquated it belongs in a museum And the old crime-fighting

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2842

culture still lives There is now a move afoot to shrink new classified facilities so that agents dont haveto waste time away from their cases to read intelligence documents thereStrategically defeating Al Qaeda sounds too good to be true Because it is Amy Zegart is a senior fellow at Stanfords Hoover Institution and the author of Eyes on Spies

Congress and the United States Intelligence Community

US Counterterror Chief Al-Qaida On Steady Slide

Bostoncom | 31 August 2011

White House counterterrorism chief John Brennan said al-Qaida is on a steady slide after the death of al-Qaidas latest second-in-command in Pakistan Brennan told The Associated Press on Wednesdaythat its a huge blow in the first official White House comment since Atiyah Abd al-Rahmans reportedkilling by CIA drone strike in Pakistans tribal areas last week

Al-Qaida is sort of on the ropes and taking a lot of shots to the body and the head Brennansaid This is a time not to step back and let them recover a message he says hes sending to hiscounterparts in Pakistan[Article continues herehttpwwwbostoncomnewsnationwashingtonarticles20110831us_counterterror_chief_al_qaida_on_steady_slide ]

Al-Qaeda (AKA Al-Qaida Al-Qarsquoida)

Council on Foreign Relations | 29 August 2011

ldquoAl-Qaeda an international terrorist network is considered the top terrorist threat to the United StatesThe group is wanted for its September 11 2001 attacks on the World Trade Center and the Pentagon aswell as a host of lesser attacks To escape the post-911 US-led war in Afghanistan al-Qaedas centralleadership fled eastward into Pakistan securing a safe haven in loosely governed areas there In July2007 US intelligence agencies found that the organization was regrouping and regaining strength inthese tribal areas along the border with Afghanistan though targeted killings of senior al-Qaeda leadershave since diminished the groups command and control capabilities In February 2009 Director of National Intelligence Dennis C Blair told lawmakers that the groups core is less capable and effective

than it was a year ago The killing of al-Qaedas top leader Osama bin Laden by US forces in Pakistanin May 2011 served a significant blow to the organization but analysts say al-Qaeda remains deadlywith its networks spread all over the world Plus a number of affiliated groups have gained prominencein recent years complicating the task of containing the organizationrdquo

[Article continues here httpwwwcfrorgterrorist-organizationsal-qaeda-k-al-qaida-al-qaidap9126]

Al Qaeda In The Islamic Maghreb

CSIS | 1 September 2011

ldquoAl Qaeda in the Islamic Maghreb (AQIM) emerged from a decades-long militant Islamist tradition inAlgeria In 1998 the Salafist Group for Preaching and Combat (Groupe Salafiste pour la Preacutedication etle Combat or GSPC) broke away from the Armed Islamic Group (GIA) because of the GIArsquos extensive

targeting of civilians Gradually the GSPC evolved to encompass global jihadist ideology in addition toits historical focus on overturning the Algerian state In 2006 the GSPC officially affiliated with alQaeda core soon rebranding itself as al Qaeda in the Islamic Maghreb In the following years AQIMwas able to conduct a small number of large-scale attacks most notably its 2007 bombing of the UNheadquarters in Algiers In recent years counterterrorism pressure and weak governance have combinedto shift the center of AQIMrsquos presence to the Sahara-Sahel region AQIM continues to make its presenceknown through smuggling operations kidnappings and clashes with security forces in the desert In thecoming years general instability within the region could allow AQIM to further expand its influencerdquo[Complete article is available here httpcsisorgfilespublication110901_Thornberry_AQIM_WEBpdf ]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2942

AQ Strategy

The Assynt Report | 11 August 2011

Executive Summary Al-Qaedarsquos broad objectives remain unchanged in the wake of bin Ladenrsquos death There

are nonetheless growing questions over al-Qaedarsquos capability Longstanding paranoiaover the use of electronic communications is heightened by the ongoing US dronecampaign whilst attacks against the West have generally been disrupted at an early stage

The Pakistani Talibanrsquos attack on a Karachi naval base in May 2011 was a significantmilitary success and the first major act of revenge for bin Ladenrsquos killing Furtherattempts to avenge his loss are certain

All parts of al-Qaeda are working within a cohesive framework with the ultimate aim of restoring the Islamic Caliphate (Khilafa) The strategic plan to support this aim wasdrafted by 40 of al-Qaedarsquos brightest thinkers in Kandahar Afghanistan in November1999 This plan consists of four phases each seven years long leading to the dissolutionof corrupt regimes and the union of all newly-liberated states within the Khilafa

Apart from mounting strategic operations al-Qaedarsquos role is to be the inspiration for atruly global jihadist movement It seeks to achieve this through provision of trainingbeing a role model for others to follow extending acceptance and adoption of its tactics

particularly suicide bombings and professionalising jihadist media to build a commonbrand and message between hitherto separate groups

Between the late 1990s and 2003 the organisation was primarily devoted to classicinternational terrorism Most effort is now spent fighting insurgencies from North Africato South Asia The way in which this strategy helps to spread the struggle has been seenin North-West Africa where the initial development of al-Qaeda in the Islamic Maghrebwas in part fed by men returning from fighting with al-Qaeda in Iraq

Since mid-2009 al-Qaeda and its affiliates have increasingly encouraged jihadist-sympathisers resident in Western countries to engage in violence themselves withoutcentral direction or training making surveillance more difficult

One of the keys to awakening the spirit of jihad was the success in portraying the US and

its allies as Crusaders in the Muslim world Al-Qaedarsquos strategy essentially requires thatthis process be kept running until the forces of jihad have grown large enough to launchsuccessful liberation operations

Despite its successes in Afghanistan al-Qaedarsquos credibility has suffered both from its failure to landanother strategic blow on the West on the scale of 911 and also excessive Muslim casualties in someoperations Similarly al-Qaeda in Iraq was set back by its excessive sectarian zeal and local resentmentat the foreign fighter presence In turn this affected the movementrsquos funding from the Gulf

Analysis Sub-Saharan African Leaders Media Focus On Threats Prior to 911

OSC Feature | Sub-Sahara Africa -- OSC Analysis 6 September 2011Statements by Sub-Saharan African leaders and African media reports on terrorism prior to the 10thanniversary of 911 focus on the growing threats from local extremists and Al-Qaida affiliatesparticularly in West Africa with little direct commentary on the anniversary or US counterterrorismpolicies This focus on domestic threats suggests that counterterrorism messages expressing solidaritywith African nations and acknowledging the evolving terrorist threat on the continent would have thegreatest resonance with African audiences

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3042

Leaders Stressing Determination To Counter Local Threats African leaders public statements reflect an ongoing concern about the threat of terrorism on thecontinent and a strong commitment to find ways to combat this threat

Nigerian President Goodluck Jonathan emphasized the governments commitment tovigorously combat terrorism following the 26 August bombing of the UN office inAbuja by Nigerian extremist group Boko Haram reported the Paris-based news agencyAFP President Jonathan is hosting Liberian President Ellen Johnson Sirleaf and otherforeign dignitaries for a three-day forum on terrorism and economic crimes the widelyread Lagos-based independent daily The Guardian reported on 4 September

Malian President Amadou Toumani Toure launched a Special Program for PeaceSecurity and Development on 9 August stating that development remained the mostviable solution to counter threats to the countrys stability reported Malis state-owneddaily LEssor[ 3] The program aimed to undermine support for Al-Qaida in the IslamicMaghreb (AQIM) according to Burkinabe web portal Lefasonet on 11 August

Somali Prime Minister Abdiweli Muhammad Gas stated on 23 August that theTransitional Federal Government planned to remove Al-Shabaab from the central andsouthern regions in Somalia with the goal of restoring peace within one year so the

country can hold national elections according to the Puntland-based Garowe Online

Experts Media Highlight New Capabilities Tactics

African experts and media outlets are warning about the evolving nature of terrorist organizations on thecontinent the terrorists pursuit of new targets and tactics and their potential for taking advantage of regional instability

Leading South African think tank the Institute for Security Studies stated on 29 Augustthat Boko Harams attack on the UN in Abuja completes Boko Harams metamorphosisinto an international terrorist group Since December 2010 Boko Haram had killed over600 people in over 70 attacks against Nigerian targets according to the think tank buthad not previously targeted Western or international interests

A 26 August article on the popular Malian web portal Maliweb voiced concern thatAQIM could benefit from Tuareg mercenaries many of whom were recently returningfrom fighting in Libya and could benefit from an increase in arms trafficking through theSahel during the Libyan conflict

Ugandas privately owned Daily Monitor reported on 19 August that AU forces inSomalia warned that Al-Shabaab planned to increase the number of kidnappings andbomb attacks as part of its new strategy to shift from controlling territory in Mogadishuto conducting more of an insurgent campaign

Concern Over Al-Qaida Presence Terrorist Collaboration

West African official statements and media reports reflect a growing concern over an increased Al-

Qaida presence in West Africa and collaboration with AQIM Al-Shabaab and Boko Haram

Nigerian security services reported that the suspected mastermind behind the 26 Augustbombing of the UN office in Abuja was a Boko Haram member with close links to Al-Qaida and Al-Shabaab according Nigerias privately owned Daily Sun

A 28 August report in the privately owned daily Nigerian Tribune claimed that the 26August bombing in Abuja was part of Al-Qaidas plans to mark the 10th anniversary of 911 and called Boko Haram Al-Qaidas ally in the region

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3142

An 8 August commentary in Burkina Fasos LObservateur Paalga said that reports of Boko Haram collaboration with Al-Shabaab and AQIM could indicate that Al-Qaida isextending its African tentacles Abdourahmane Dieng security division chief of theEconomic Community of West African States said the collaboration represented a veryserious threat according to Senegals progovernment Le Soleil on 5 August

Messages Likely To Resonate With African Audience

Sub-Saharan Africas increasing concern about the shifting nature and potential strengthening of theterrorist threat on the continent suggests that messages directly addressing the impact of terrorism onAfricans the increasingly complex nature of the threat and the need for multilateral cooperation againstterrorism are most likely to resonate with Africans

Messages expressing solidarity and sympathy for Africans affected by Boko Haram Al-Shabaab and AQIM would almost certainly resonate with a broad African audience

African political and military leaders would probably welcome acknowledgement of thecomplex and changing nature of terrorism on the continent and recognition of theirinitiatives and commitment to countering violent extremism

African leaders and medias concern about potential collaboration between Boko Haram

Al-Shabaab and AQIM suggest that they would be open to improving multilateral andcross-regional sharing of lessons learned and strategies to counter the intensification of terrorism within Africa

Aviation and Maritime Security| back to top |

Bomb Threats Force Jets To Land

Associated Press | 7 September 2011

Both landed safely one landed in Ankara Ataturk International Airport and the other at Kuala LumpurTwo flights operated by Pakistans state-owned airline received bombs threats on Wednesday

and both landed safely one in Turkey the other in Malaysia officials said No bombs were found The

first flight was headed for Manchester England when it was notified of the threat near the Bulgariancapital of Sofia The crew contacted the control tower in Istanbul to seek permission for the landingstate-run Anatolia news agency reported Authorities quickly evacuated all 378 passengers from theBoeing 777-300ER aircraft after it parked at a remote corner of the International Ataturk Airport andbomb squads began searching the plane with sniffer dogs Anatolia reported PIA spokesman MashoodTajwar confirmed the flight received a threat and landed All passengers were safe A police searchturned up no bomb officials said Later a second PIA flight from Islamabad to Kuala Lumpur alsoreceived a bomb threat It landed in Kuala Lumpur and all the passengers disembarked safely saidTajwar The UK-bound Pakistan International Airlines plane was forced to make an emergency landingat Ataturk Airport in Istanbul after receiving a bomb threat Malaysias airports authority said thepassengers were being screened and the plane was isolated in a parking area while being searched bypolice No bomb was found

It said the plane carried 164 passengers and 13 crew Azmi Murad senior general manager forthe authority said the Pakistani airline informed it that the warning came by email Mr Tajwar gave nodetails on the nature of the threat or how it was delivered Pakistan is home to al Qaedas top leadershipMilitants who trained there have been responsible for many of the attacks and failed plots in the USand Europe since Sept 11 2001 when planes hijacked by al Qaeda militants destroyed the World TradeCenter in New York and crashed into the Pentagon The bomb threats came four days before the 10thanniversary of 911 but there was no apparent link to Islamist militants who typically do not alertauthorities in advance The FBI and Homeland Security department issued warnings last weekend aboutal Qaeda threats to small airlines

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3242

Commentary amp Opinion| back to top |

From Terror Group Founder To Libyan Rebel Military Commander

ABCNews | 29August 2011

The same man who triumphantly led Libyan rebels into Gadhafis compound last week first came to theattention of the US intelligence community years ago - as a founder of a terror group

Abdelhakim Belhaj who was recently appointed to Tripolis rebel military council was one of the original founders of the Libyan Islamic Fighting Group an anti-Gadhafi group which was laterdesignated by the US State Department as a terrorist organization with links to al Qaeda according toUS government reports

We proudly announce the liberation of Libya and that Libya has become free and that the ruleof the tyrant and the era of oppression is behind us a victorious Belhaj told reporters after the stormingof Gadhafis Bab al-Aziziya compound last week Ousting Gadhafi had been the main objective of theLIFG since its inception in the early 1990s even if some of the fighters believed that meant puttingAmericans in the crossfire

The group carried out operations against the Libyan government including at least four suspectedassassination attempts against Gadhafi in the 1990s and was also believed to be connected to a series of suicide bombings in Casablanca Morocco in 2003 the US State Department reported As relationsbetween the US and Gadhafi improved in the mid-2000s some LIFG leaders cultivated relationshipswith top al Qaeda leaders including Osama bin Laden and were suspected of funneling fighters to Iraq tocarry out operations against US soldiers

When the LIFG was designated a terror organization in 2004 it was meant as a gesture of solidarity with the Libyan government according to a March 2011 congressional report

Contrary to several US government reports Libyan rebel ambassador to the US Ali Aujalitold ABC News that the LIFG was never connected to al Qaeda and did not carry out terrorist operations

They were only opposed to Gadhafi during his rule and paid the price for that by beingoppressed by the regime Aujali said

The CIA first publicly voiced its concerns about the connection between the LIFG and al Qaedain 2004 when then-director George Tenet testified before the Senate Select Committee on Intelligenceand listed the LIFG among groups that represented an immediate threat [that] has benefited from alQaeda links[Article continues here httpabcnewsgocomBlotterterror-group-founder-libyan-rebel-military-commanderstoryid=14405319]

Interview With Saudi Sheik Wajdi Al-Ghazawi

MemriTVcom

Sheik Wajdi al-Ghazawi owner of al-Fajr TV criticizes extremist atmosphere in Saudi Arabia and saysafter 911 They Handed Out Sweets on the Streets of Mecca

Following are excerpts from a statement by Saudi Sheik Wajdi Al-Ghazawi owner of Al-FajrTV which was posted on YouTube on August 4 2011

Wajdi Al-Ghazawi When Al-Qaeda and Osama Bin Laden were at the height of their mightthey were extremely popular in Saudi Arabia From mosque pulpits across Saudi Arabia preacherswould pray for their success Moreover from the pulpits of the most important mosques ndash the Al-HaramMosque in Mecca and the Nabawi Mosque in Al-Madina ndash direct prayers for the success of Al-Qaedawere made during the days of the bombing of Tora Bora Oh Allah help our brothers in AfghanistanThese supplications were made during evening prayers as well as Friday prayers The preachers wouldpray for them in violation of the ministrys instructions

When the twin towers in New York were attacked they handed out sweets on the streets of Mecca By Allah they did I witnessed this myself The young people bowed in prayer and hugged one

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3342

another out of joy People were in heaven because of these young men who destroyed America andbombed this idol Am I right or not Was it like that or not

Back then when the Taliban broke off a piece of the nose of the Buddha statue which was hewnin the mountain an entire sermon was dedicated to it in the mosque in Mecca and the preacher was laterreprimanded for this sermon The entire Saudi people supported and loved Al-Qaeda

This went on until our brothers in Al-Qaeda ndash and I dont know what was going through theirminds ndash began to carry out operations inside Saudi Arabia Thats when we all raised our hands andsaid Youve gone too far We wont support you in this

The atmosphere here in Saudi Arabia is one of extremism It is characterized by focusing onminor details Many things are forbidden Yes maybe they are indeed forbidden but by forcing peopleto avoid them and by acting as if these were major sins an atmosphere was created that gave rise toextremist youth who might act recklessly at the most trivial provocation

For instance we blew out of proportion the issue of music the issue of smoking or the issue of hanging pictures in public places True there are clear texts on these issues but the young peopleembraced these issues as if they were fighting usury fornication or alcohol No these are not among theseven major sins So our society has become extreme

This extremist atmosphere has given rise to people who accuse others of heresy and people whopurport to be waging Jihad It has created genes that gave rise to cells of Al-Qaeda and other terrorists

We must examine our breeding ground in which these young men were sownBy Allah what can possibly emerge from such an atmosphere Muftis who accuse others of

heresy sheiks who incite and young people who bomb Am I right or not[Complete clip is available here httpwwwmemritvorgclipen3099htm]

Legal Aspects amp Lawfare| back to top |

Revisiting A Stale Counterterrorism Law

Council on Foreign Relations | 1 September 2011

ldquoNearly a decade after 911 the United States still relies on the 2001 Authorization for the Use of Military Force (AUMF) for the killing and detention of those considered responsible for or associatedwith the terrorist attacks But CFR national security law expert John Bellinger says it is becomingincreasingly difficult for the Obama administration to justify some of its counterterrorism operationsunder this limited statutory authority It has been used in defense of actions including drone attacks onindividuals as well as the targeting of groups in Yemen and Somalia that may have only the mosttenuous affiliation or association to the 911 attack A revised AUMF should clarify those operations aswell as the issue of detention specifically which individuals can be detained for how long and subjectto what processes There also needs to be greater effort at the international level he adds to fill thegaps in the law that covers conflicts between states and non-state actorsrdquohelliprdquo[Complete article is available here httpwwwcfrorgcounterterrorismrevisiting-stale-

counterterrorism-lawp25742]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3442

Narco-Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector[Complete article is available here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Mexicos Cartels Move Into Extortion

At a construction site of an apartment building in the heart of the Mexican capital a company engineerruns through his weekly payroll sheet He has salaries written out for carpenters bricklayers andelectricians At the bottom of the sheet is a notation of $200 for ldquosecurity servicesrdquo next to a nicknameldquoEl Indiordquo mdash the Indian [Complete article is available here

httpwwwtucsonsentinelcomnationworldreport090611_mexico_cartels_bribesmexicos-cartels-move-into-extortion ]

Seven Die In Mexican Pacific Port City

Latin American Herald Tribune

Seven people died in separate shootings in Mazatlan a port city in the northwestern Mexican state of Sinaloa with some of the incidents drug-related a police spokesman told Efe [Complete article is available herehttpwwwlahtcomarticleaspCategoryId=14091ampArticleId=423061]

Tijuana Violence Slows As One Cartel Takes Control

BorderlandBeatcom

Mexicos famously seedy border city of Tijuana is enjoying a lull in drug murders as the countrys mostpowerful cartel gains the upper hand over its rivals [Complete article is available here httpwwwborderlandbeatcom201109tijuana-violence-slows-as-one-cartelhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3542

Network Notes| back to top |

Canadian data foreign threats Spying in the digital age (Suggested by a reader in Lithuania ndash thanks) Globe and Mail | By Colin Freeze 31 July 2010

A government spy agency thatrsquos prohibited from monitoring Canadian citizens is now usingldquoinformation about Canadiansrdquo to zero in on foreign threatsThe ambiguous statement found in a new government report detailing the activities of CommunicationsSecurity Establishment Canada could sanction a range of intelligence-gathering activities ndash includingthe controversial practice of mining ldquometadatardquo from digital communications

Metadata ndash often called data about data ndash are found in e-mails and their attachments and containdigital signatures that can reveal when where and by whom documents were created

The collection of metadata has caused controversy in other countries but never in Canada wherethe Communications Security Establishment Canada operates as an ultra-secretive agency About theonly thing that is known about the classified practices is that they were halted and resumed after someldquomajor changesrdquo including directives signed by Defence Minister Peter MacKay

ldquoI cannot comment on specific operational activitiesrdquo Adrian Simpson a CSEC spokesman toldThe Globe He stressed that reviews upheld that the activities in question were ldquocarried out inaccordance with the law ministerial requirements and CSECrsquos policies and proceduresrdquo

ldquoCSEC is prohibited from directing its activities at Canadians anyone in Canada or Canadiansanywhere in the worldrdquo he said

For decades signals-intelligence agencies in the West have been allowed to safeguard nationalsecurity by eavesdropping on foreignersrsquo conversations Spies can whatever phone lines and satellitesignals they can so long as they never listen in on fellow citizens

But in the digital age governments run increasingly sophisticated dragnets scooping up andscouring through millions of intercepted Internet conversations daily Such practices create legalambiguities

ldquoThe whole issue of what constitutes boundaries for signals-intelligence agencies in cyberspaceis a big debate right nowrdquo said Rafal Rohozinski a security expert affiliated with the University of Torontorsquos Munk School

A watchdog agency that reviews the CSECrsquos activities released an annual report to Parliament onJuly 20 ldquoWhen other means have been exhausted CSEC may use information about Canadians when it

has reasonable grounds to believe that using this information may assist in identifying and obtainingforeign intelligencerdquo it reads

Sometimes collecting metadata is relatively benign It can involve aggregating sets of data tospot trends much like the way meteorologists discern national forecasts from localized information

For example while CSEC canrsquot usually monitor the communications of specific Canadian terrorsuspects it can glean insights by zooming out for big-picture patterns One way to do that MrRohozinski said would be to look at data flows between Canadian cities and Yemen where an Internet-savvy al-Qaeda offshoot works to recruit Westerners

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3642

Metadata however can be more revealing Documents that circulate on the Internet travelaround like postmarked letters marked with return addresses ndash e-mails and attachments have embeddedcodes that speak to the who where and when behind their creation

The US National Security Agency found itself mired in controversy a few years go after itskirted domestic-spying bans by secretly upholding that this sort of American metadata was fair gamedistinct from communication contents

Therersquos little to suggest the CSEC would go that far The federal agencyrsquos activities are reviewedby a watchdog body now headed by a former Federal Court of Appeal judge Robert Deacutecary appointedlast year wrote in his annual report that he was satisfied the CSEC activities in question are lawful evenif his predecessors felt them borderline

ldquoThis was the first review of these activities since hellip their resumption under new policiesrdquo thewatchdogrsquos report says It concludes that the surveillance activities are ldquoin accordance with the lawrdquo andfollow ldquomajor changes to certain policies procedures and practicesrdquo

Much of the concern arises from the possibility that CSEC could hand over metadata intelligenceto domestic law-enforcement and security agencies

As it stands the RCMP and CSIS have to develop their domestic investigations before coming toCSEC ndash usually with warrants ndash if they want specific intelligence The rules guiding handovers are strictbecause even though all agencies run surveillance operations they do so under vastly different

mandates and legal standardsThe spy agency however stood by its practicesldquoCSEC is extremely diligent when it comes to the privacy of Canadiansrdquo Mr Simpson said

[complete article is available here httpwwwtheglobeandmailcomnewsnationalcanadian-data-foreign-threats-spying-in-the-digital-agearticle2113772 ]

Cyber Attacks Against NATO Then And Now

New Atlanticist | 6 September 2011

ldquoNow that NATOrsquos Operation UNIFIED PROTECTOR over Libya is winding down it is worth

noting how few cyber incidents were directed in protest against the Alliance Certainly there was a

cyber component to the liberation of Libya but it was more about content and Internet freedom (the

most newsworthy elements here were the role of social media and the Libyan government taking largeparts of the nation offline) But compared to past history NATO cyber defenders had a relatively easy

time

ldquoNATO has not however had an easy 2011 Although there were three significant incidents we

know about none seemed to have been in direct response to operations over Libyahelliprdquo

[Complete article is available here httpwwwacusorgnew_atlanticistcyber-attacks-against-nato-then-

and-now]

The Calm Before The Storm

Foreign Policy | By Joel Brenner 6 September 2011

Cyberwar is already happening -- and its about to get much much worse A veteran cyberwarriorexplains how America can prepare itself

Revelations of wholesale electronic fraud and massive data heists have become weekly evendaily affairs A multinational electronics corporation loses personal information on more than 100million customers Cyberthieves break into an international bank counterfeit credit balances and lootATMs in four countries grabbing $9 million in just a few hours International gangs spread maliciouscode that conscripts unwitting computers into zombie armies of hundreds of thousands of similarlyenslaved machines Criminals then rent these armies called botnets as easily as you can buy a time-sharing arrangement in a beach condo No wonder the vast majority of Internet traffic is spam

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3742

Yet the loss of personal information and related criminal fraud intolerable as they are are theleast threatening face of electronic insecurity The US militarys secret network is penetratedAmericans corporate pockets are being picked clean of the intellectual property that makes the UnitedStates tick And the electricity grid that keeps the lights on and makes everything move is dangerouslyinsecure

In one remote attack on the Pentagons information systems about 10 years ago the Chinesehauled away up to 20 terabytes of information If the information had been on paper theyd have neededa line of moving vans stretching from the Pentagon to freighters docked 50 miles away in Baltimoreharbor just to haul it away Had they done so the military district of Washington wouldve become anactive theater of operations for the first time since 1865 and the Navy wouldve blockaded theChesapeake Bay But the Chinese did it electronically so who noticed

Corporate espionage by both competitors and foreign intelligence services or their surrogates isalso increasing Intelligence officials see this but cant speak openly about the specifics and Im seeingit now in my law practice The victims rarely admit it for understandable reasons Oracle whichsuccessfully sued SAP for theft of its software code was a prominent exception Google was another

When the Chinese penetrated Google in late 2009 -- yes that operation was Chinese and yes itwas done with the blessing of a member of the Politburo -- they werent after customer informationThey were after the source code that makes Google unique Nor was Google the only victim Thousands

of US and Western firms were penetrated in that affair Foreign governments -- and not only theChinese -- understand that they cannot compete with the United States militarily and politically if theycannot compete with it economically so their intelligence services want to steal its corporate intellectualproperty This is the technology that gives America its competitive edge and often it has nothing to dowith defense Ordinary companies with valuable technology are now being targeted by nation-statesThis is a new era National security and economic security have converged

The danger is not limited to the loss of technology and information however The owners andoperators of the North American electricity grid are hooking up their control systems to the Internet asfast as they can Exposing the grid to the Internet makes it marginally more efficient but it also makes itdramatically more vulnerable to disruption If you can remotely penetrate an electronic system to stealinformation you can remotely penetrate it to shut it down or make it go haywire This is why there is no

longer a meaningful difference between information security and operational security And the biggestoperational risk is the grid In contemporary society nothing moves without electricity If the grid goesout the country stops

As the Stuxnet affair demonstrated remotely engineered disruption of industrial control systemsis now a reality That episode involved the successful electronic attack on the centrifuges in the Iraniannuclear program Only a first-class intelligence agency could have pulled that off but the blueprint fordoing it -- the code itself -- is now public Many American industrial control systems run on the samekind of equipment the Iranians were using but unlike the controls on the Iranian centrifuges thecontrols on the US grid are now being connected to the Internet making them easier to disrupt Stuxnetwas a watershed there will be copycats

Other industrial control systems will also be targets Some already are Air traffic control

railroad switches and water and sewage systems are all electronically controlled now and many arevulnerable If an intruder can break into the right server electronically he can remotely shut downproduction send your goods to the wrong destination and even unlock your doors -- and delete your logentries so he leaves no record of ever having been there

The United States does not lack enemies who would attack it this way Seized al Qaedacomputers contain details of US industrial control systems In 2003 a group affiliated with thePakistani terrorist organization Lashkar-e-Taiba -- the same gang that engineered the 2008 terroristassaults in Mumbai -- plotted to attack the Australian grid Other groups conspired to attack the Britishgrid in 2004 2006 and 2009 Yet the owners and operators of the North American grid continue willy-

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3842

nilly to expose their control systems to the Internet instead of isolating and hardening it This is folly of a high order

Important conclusions for public and corporate policy follow from this vulnerable state of

affairs First cyber insecurity has operational consequences In the current and foreseeable states of technology a high degree of assurance against electronic penetration of anything connected to theInternet is not achievable Large efficient electronically connected organizations and nations aretherefore vulnerable to remotely engineered disruption as well as information theft

Second this risk cannot be eliminated -- but it can be reduced and managed As a nation theUnited States should start by isolating the grids controls from the Internet Undoubtedly there aremarginal efficiencies to be gained by seamless connectivity over a publicly accessible infrastructure butthese gains are usually exaggerated and the risk this connectivity creates is staggering The governmentand the major telecommunications carriers must also make the investment required to re-create themassive redundancies that made the wired telephone network so robust Resilience and swift recoveryshould be the goal If the consequences of cyberattacks were reduced penetration would cease to matter

Third companies that wait for the government to solve their own security problems do so attheir peril The government is broke and the IT backbone is 85 percent private so the governmentdoesnt control it The governments role in altering the status quo will be limited to setting standardsusing its purchasing power to move vendors toward better security and getting its own house in order

The government can neither secure corporate intellectual property nor protect firms against operationaldisruption

Fourth in a world in which everything cannot be protected companies must determine forthemselves what intellectual property and physical assets to isolate and safeguard Those that approachthis task seriously will quickly learn that technology is only one aspect of their insecurity and in manycases the easiest to deal with Unless technology is integrated with personnel practices and operationalsecurity it opens vulnerabilities that its users rarely understand This kind of integration requires theautomated enforcement of reasonable security policies and systematic workforce training and thatoccurs only when management the lawyers and the technologists work closely together This is an old-fashioned management challenge -- not a technological one For their part corporate boards need to takeIT security seriously and launch audits that examine how their systems are actually implemented and

used not merely how they are designed Because as the techies like to put it the weakest link in anysystem is not the silicon-based unit on the desk its the carbon-based unit in the chair Joel Brenner is author of the forthcoming America the Vulnerable Inside the New Threat Matrix of

Digital Espionage Crime and Warfare He has served as the inspector general of the National Security

Agency the national counterintelligence executive and the NSAs senior counsel He now practices law

at Cooley LLP in Washington DC

Cyberattacks Decline Slightly Symantec Report Finds

Dark Reading | 1 September 2011

Organizations worldwide are suffering damages as a result of cyberattacks but interestingly there hasbeen a slight decline in these attacks during the past 12 months according to a new report from

Symantec More than 90 percent of the more than 3300 respondents across 36 countries said theyexperienced tangible losses as a result of a hack with 84 percent reporting financial loss to the cost of abreach Around one-fifth lost at least $195000 in breaches during the past 12 months

Meanwhile Symantec attributes the unexpected bright spot of a decline in breaches toorganizations employing better cybersecurity defenses More than 70 percent of organizations sawattacks in the past 12 months a decline of 5 percent from 2010 And those that experienced anincreasing frequency of attacks dropped from 29 percent in 2010 to 21 percent this year While 100percent last year reported losses from cyberattacks 92 percent did so in 2011 The trend seemscounterintuitive given the rash of high-profile breaches this year More

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 5: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 542

Counterterrorism News by Nation amp Region

Afghanistan

| back to top |

Four NATO Trucks Destroyed in Afghanistan

Afghan Online Press | (Afghanistan) 7 September 2011

Taliban militants have destroyed four NATO trucks carrying supplies for US-led soldiers in Afghanistanin the eastern part of the country Press TV reports The attack occurred place in the city of MohammadAghe in the eastern province of Logar on Monday The incident did not cause any casualties Afghanofficials said Taliban spokesman Zabihullah Mojahid claimed that six NATO trucks had been damaged

NATO tankers and containers carrying fuel for US-led soldiers from Pakistan also come underattack by Tehrik-i-Taliban Pakistan militants in Afghanistans neighbor Hundreds of NATO tankers andcontainers have been destroyed in different parts of Pakistan over the past three years The US militaryand NATO rely heavily on the Pakistani supply route into landlocked Afghanistan more so now thatTaliban attacks are increasing Other routes largely through Russia and the Central Asian states haveproved to be too costly both politically and economically[Article continues here httpwwwaopnewscomtodayhtml]

Taleban Claim Killing 10 Security Forces In Afghan East

Afghan Islamic Press news agency | Peshawar in Pashto 7 September 2011

Two explosions targeted security forces in eastern Khost Province in the early morning on 7 Septemberprivate Pakistan-based Afghan Islamic Press news agency reported A local resident was quoted assaying the first explosion took place when a roadside mine exploded in the Mardikhel area while thesecond blast occurred when explosives placed on a tree went off as the security forces gathered at thescene The eyewitness said he had seen a number of injured people being transported from the area butcould not be more specific as the security forces immediately cordoned off the area and started firing inthe air A local health official told AIP that one body had been transferred from the scene of the incident

Meanwhile Taleban spokesman Zabihollah Mojahed claimed responsibility for the explosionssaying 10 security forces had been killed and a number of others injured in the attack

Afghan Government Rejects UN torture Allegations

Associated Press | 7 September 2011

The Afghan government on Wednesday strongly rejected allegations that its security agencies tortureddetainees mdash charges that were apparently raised in an unpublished UN report

The allegations prompted NATO to temporarily suspend some transfers of detainees frominternational to Afghan-run detention centers They also threatened to further erode the already shakyrelationship between President Hamid Karzais government and the international community InteriorMinister Besmillah Mohammadi and Rahmatullah Nabil head of the Afghan intelligence servicedescribed the NATO decision to suspend detainee transfers as politically motivated and aimed atslowing down the transition of security responsibilities to the Afghan government

Afghanistan is gradually taking over responsibility for the countrys security from the US-ledmilitary coalition as foreign forces aim to withdraw all their combat troops by the end of 2014 TheAfghan government believes that any move to halt the transfer of prisoners under any false excuses is aserious blow to the transition process Mohammadi and Nabil said in a joint statement The twoofficials said that in the past the United Nations in Afghanistan had assured the authorities that theirdetention facilities complied with international human rights standards

They also complained the UN had not given a copy of the report to the government Some of the details of the report have leaked out ahead of its publication prompting the responses The UN hassaid it is still working on finalizing the report and will publish it once it has been completed

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 642

Mohammadi said the government had found out about the allegations in the media The reportapparently included claims of torture such as electric shocks threats of sexual assault and physicaltorture such as the ripping out of nails in Afghan detention facilities The Afghan security agenciesstrongly reject the allegations Mohammadi said adding that international agencies including theUnited Nations had regularly visited Afghan detention facilities Following such visits they assuredauthorities of their satisfactory findings as to the situation in the prisons and compliance with humanrights standards he said hellip[Article continues herehttpnewsyahoocomafghan-government-rejects-un-torture-allegations-130001115html]

Afghan Taliban Spokesman Comments on Turkish Prisoners Release

SITE Monitoring Service | September 2011

Afghan Taliban spokesman Zabihulla remarked on the groups release of four Turkish engineers whowere held for over eight months and noted the well-treatment of the men during their detention In astatement posted on the groups website on September 6 2011 in Arabic and other languagesZabihullah argued that just as the Afghan Taliban treated these and other captives well the enemyshould treat captive fighters well also He reiterated the Afghan Talibans warning to foreign andAfghan companies not to work with the Afghan government and stated However some parties due to

their economic and political interests do not pay attention to the warnings of the Islamic Emirate andcontinue supporting the occupiers Thus the result of their violations will be the punishment and thecapture of their employees by the mujahideen

On September 4 the Afghan Taliban announced that it released four Turkish engineers whoworked for a Turkish company in the Batan area of Paktia province The release they said was basedon Islamic compassion and appreciate for Eid al-Fitr which marks the end of the holy month of Ramadan

Algeria

| back to top | Algerian Security Conference Focuses On Libya

BBC World Service | 7 September 2011

Foreign ministers from North Africa were due to meet in the Algerian capital Algiers on 7 September todiscuss ways of confronting terrorism and preventing the flow of weapons from Libya BBCWSreported High level delegations from France and the United States and diplomats from Mali Niger andMauritania were also due to attend the conference Algeria has expressed concern that arms from Libyacould fall into the hands of the north African branch of Al-Qaidah (AQIM) which has been active in theSahara and has kidnapped westerners the report noted

Algeria To Submit List Of Arms Smugglers At Conference

Le Temps dAlgerie website | Algiers in French 6 September 2011Algeria is expected to submit a list of weapons smugglers in the Sahel region to its partners in the fightagainst terrorism at the conference Algerian privately-owned newspaper Le Temps dAlgerie reportedon 6 September

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 742

Bahrain

| back to top |

Bahrain Panel 101 Activists on Hunger Strike

Associated Press | 7 September 2011

More than 100 jailed Bahraini activists mdash including doctors who treated injured protesters duringmonths of anti-government protests and crackdowns in the Gulf kingdom mdash are on hunger strike an

international panel said Wednesday The Bahrain Commission of Inquiry said in a statement that 84opposition supporters are on hunger strike in prison In addition 17 detained activists have beenhospitalized by the Interior Ministry for their refusal to eat

Hundreds of activists have been imprisoned since February when Shiite-led demonstrations forgreater rights began in the Sunni-ruled Bahrain the home of the US Navys 5th Fleet More than 30people have been killed since protests inspired by Arab uprisings began in February The five-memberpanel has been set up in June to investigate the unrest Wednesdays statement said an internationalexpert on hunger strikes will join the panel to visit the striking detainees and evaluate their condition

Medical advice will be provided and the expert will discuss the challenges of hunger strike thestatement said adding that the hunger strike started nine days ago

Among jailed activists on hunger strike are 20 doctors who are on trial in a special security court

on charges of participating in efforts to overthrow Bahrains 200-year-old monarchy Other jailedopposition supporters have joined the strike including two prominent Shiite activists Abdul Jalil al-Singace and Abdulhadi al-Khawaja They were sentenced to life in prison in June for their role inprotests The doctors trial is being closely watched by rights groups which have criticized Bahrains useof the security court that includes military prosecutors and civilians and military judges

The case against 11 health professionals was back in the special tribunal on Wednesday Noverdict is expected from the session The Bahrain Commission of Inquiry includes international judicialand human rights experts They started the probe with the consent of the Sunni rulers The commissionsfindings are expected Oct 30 Shiites comprise about 70 percent of Bahrains 525000 people but areblocked from top political and security posts[Article continues here httpnewsyahoocombahrain-panel-101-activists-hunger-strike-

112949681html]

Colombia

| back to top |

Colombias Complete Military Command Replaced

Colombia Reports

Colombian President Juan Manuel Santos announced Tuesday that the countrys entire militarycommand has been replaced amid growing concerns about increased violence by illegal armedgroups

[Article continues here httpwwwcolombiareportscomcolombia-newsnews18815-colombias-complete-military-command-replacedhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 842

Denmark

| back to top |

Family Held by Somali Pirates Released

Associated Press | 7 September 2011

Seven Danish hostages including a family with teenage children have been released by Somali piratesafter more than six months in captivity Denmarks Foreign Ministry said Wednesday The Danes -- a

couple with three children ages 12-16 and two crew members -- were captured in the Indian Ocean onFeb 24 while sailing around the world in a yacht

The seven Danes are doing well under the circumstances They are expected back in Denmark in a short time the ministry said in a brief statement It gave no details of how they were released andmade no mention of a ransom being paid No one at the Foreign Ministry was immediately available forcomment

Prime Minister Lars Loekke Rasmussen told public broadcaster DR that the Danes were on theirway back in a chartered airplane paid for by their insurance company Loekke Rasmussen said theirrelease came after a long period of negotiations Jan Quist Johansen his wife Birgit Marie Johansentheir sons Rune and Hjalte and daughter Naja were captured along with the two adult Danish crewmembers when their 43-foot yacht was seized by pirates The Johansens are from Kalundborg 75 miles

west of Copenhagen They set out on their round-the-world journey in 2009 Of course it is verycheerful news said Ole Meridin Petersen chairman of the Kalundborg yacht club where Jan QuistJohansen was a member I can imagine that the hostages after their release need quite a lot of calmMeridin Petersen told The Associated Press

The yacht was seized while the Johansens were sailing through the pirate-infested waters off EastAfrica The family very likely is aware that what they did was not so fortunate They certainly feelpretty bad about it now Meridin Petersen said Hostages are held in hot austere conditions in Somalia -- typically for many months -- before a ransom is agreed on and paid and the hijacked ships and creware released Last year a British sailing couple were released after 388 days in captivity Reportsindicated that a ransom in the region of $1 million was paid for their release Somalia hasnt had afunctioning government since 1991 one of the reasons the piracy trade has flourished hellip

[Article continues here httpwwwfoxnewscomworld20110907denmark-family-held-by-somali-pirates-since-february-releasedtest=latestnews]

France

| back to top |

Western Governments Said Protecting Intelligence Officers From Scrutiny

BBC World Service | 7 September 2011

Western governments have been accused by Europes leading human rights body of shielding theirintelligence services from accountability for serious violations BBC World Service reported on 7

September The reports author the rapporteur for the Council of Europe Dick Marty said theseviolations had occurred during anti-terrorist operations He said a licence to abduct torture or kill onlyexisted in films and dictatorships but western governments were using the notion of state security toprevent parliaments and judges from scrutinising the work of intelligence officers

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 942

India

| back to top |

Deadly Explosion Strikes Courthouse in New Delhi

New York Times | By Jim Yardley 7 September 2011

An explosion ripped through a reception area of an Indian courthouse on Wednesday morning killing atleast 10 people and wounding more than 60 others in a bombing that renewed concerns about Indiarsquos

vulnerability to terrorism It was the second bombing of the courthouse in less than four months

Relatives mourned a victim of the bombing which struck a courthouse reception area Harish TyagiEuropean PressphotoAgency

Witnesses described a chaotic scene at the Delhi High Court after the blast at 1014 am outside areception area used by litigants lawyers and visitors to enter the courthouse

ldquoIt was in shamblesrdquo said Ajay Mehrotra a lawyer who witnessed the explosion ldquoThere wastotal chaos There was blood People were running for their livesrdquo

The Indian home minister Palaniappan Chidambaram called the explosion a terrorist attack andnoted that New Delhi was already in a high state of alert with Parliament in session Mr Chidambaramsaid Indian intelligence agencies had received information in July about a possible terrorist threat to thecity which had been turned over to the local police He did not elaborate about the intelligence reportOn Thursday three people were detained for questioning by the police Reuters reported

ldquoThe bomb blast took place just outside the reception centerrdquo Mr Chidambaram said at a newsconference ldquoIt is suspected that the bomb was placed in a briefcaserdquoReuters reported that a militant terrorist group called HuJI for Harkat-ul-Jihad Islami based largely inPakistan and also Bangladesh had claimed responsibility for the attacks citing security officials

Prime Minister Manmohan Singh speaking to reporters during a visit to Bangladesh condemned

the explosion as ldquoa cowardly act of a terrorist naturerdquoldquoWe will deal with itrdquo Mr Singh said ldquoWe will never succumb to the pressure of terrorismrdquo

Indian authorities have come under renewed criticism in recent months about their preparedness toprevent terrorism Terrorist attacks are a persistent concern in India particularly in the countryrsquos rapidlygrowing cities which have endured a series of bombings in recent years

In July more than 20 people were killed in Mumbai the countryrsquos financial capital from threeblasts timed to the evening rush hour That attack raised painful memories of the bloody November 2008attacks on Mumbai in which militants trained in Pakistan swept through luxury hotels a railway stationand a Jewish center in a rampage that left more than 160 people dead

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1042

Wednesdayrsquos attack at the Delhi High Court exposed anew the weaknesses in the courthousersquossecurity In May a smaller bomb detonated near a parked car outside the courthouse causing no injuriesWitnesses told local media of seeing a black bag in flames after the blast

Rakesh Tiku chairman of the Delhi Bar Association criticized the Delhi police saying ldquothe low-intensity blast in May should have served as an eye-openerrdquo Mr Tiku said hundreds of litigants andclerks passed through the gate where the blast took place each day making it a vulnerable location ldquoTheDelhi High Court requested the Delhi police to install CCTV cameras as well as personnel to man theentrances three or four months ago but no action has been takenrdquo he said

The latest explosion occurred near Gate 5 of the High Court outside a reception center wherevisitors wait for passes to enter the building Lawyers said Wednesday was an especially busy daybecause the court heard public-interest litigation

ldquoWhat are the police doingrdquo asked Mr Mehrotra the lawyer ldquoThe lives of lawyers litigantsand judges are at stakerdquo

Another witness Brijmohan Sharma described a ldquovery loud sound the reverberations fromwhich caused me to lose my balance I got up and was surrounded by people runningrdquo He added ldquoItwas like a scene from a film People were lying on the floor with their hands cut off their legs brokenand bleedingrdquo

The last serious attacks in New Delhi took place in 2008 when coordinated blasts in a park and

in shopping areas killed more than 20 people and injured nearly 100 In those attacks the IndianMujahedeen an Islamic militant group claimed responsibility

The Delhi High Court is in the heart of the capital a short walk from the cityrsquos landmark IndiaGate Rahul Gupta a local resident said he was standing near the courthouse entrance when the groundshook from the blast throwing people onto the road outside the reception area

ldquoSecurity is one area which no one can handle in Delhi at the momentrdquo Mr Gupta said ldquoIt is thefanatical people who are creating these types of problems and trying to create panic in the publicrdquo hellip

The Indian government said that a preliminary analysis found a nitrate-based explosive withtraces of pentaerythritol tetranitrate or PETN a powerful plastic explosive often used in terror plots hellip[Article continues here httpwwwnytimescom20110908worldasia08indiahtml_r=1ampref=world]

Ten Killed In Delhi Blast

Multiple Sources

At least 10 people were killed and 65 others injured in a bomb blast outside the Delhi High Court on themorning of 7 September private Indian television channel IBN Live reported The terror strike took place in a high security area with Parliament the Prime Ministers Office and India Gate in the vicinitythe report said (CNN-IBN website New Delhi in English 07 Sep 11)

According to the website of the private Indian television channel NDT the blast went off at themain entrance to the court on Shershah Suri Road which is normally heavily guarded The bomb wentoff just before the court was about to open the report said (NDTV website Delhi in English 07 Sep 11)

Security officials were quoted by BBCWS as saying they suspected the explosives were hidden

in a briefcase that had been placed beside the desk where passes were being handed out An eyewitnesstold the BBC that it was a powerful blast shaking the ground and buildings around him (BBC WorldService 7 September 2011)

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1142

Delhi On High Alert In Wake Of Blast

Multiple Sources

The Indian capital has been put on high alert following the blast at the Delhi High Court privateEnglish-language TV news Channel Times Now reported (Times Now TV New Delhi in English0530GMT 07 Sep 11)

Hindi channel says received email from group claiming responsibility for attack Indias Hindinews channel Aaj Tak said on 7 September it had received an email claiming responsibility for the blastAccording to the report the email was sent from the ID harkatuljihadi2011gmailcom The channelsaid the police were investigating possible involvement of the Indian Mujahidin (Aaj Tak TV Delhi inHindi 7 September 2011)

Police Probe Possible Links To Al-Qaidah-Linked Group

Noida IBN Live | in English 7 September 2011

Police in Delhi are looking into claims that a Pakistan-based militant group linked to Al-Qaidah theHarkat-ul-Jihad Islami (HUJI) may have been involved in the attack Noida IBN TV reportedAccording to the report in an e-mail sent to a media house HUJI claimed it had carried out the attack inretaliation for the death sentence issued against Afzal Guru the man found guilty of involvement in an

attack on Delhis parliament almost ten years ago We owe the responsibility of todays blasts at highcourt delhi our demand is that Afzal Gurus death sentence should be repealed immediately else wewould target major high courts amp THE SUPREME COURT OF INDIA the e-mail read According tothe report it was sent from the id harkatuljihadi2011gmailcom

Home Minister Announces Probe Into Attack

CNN-IBN website | New Delhi in English 7 September 2011

Indian Home Minister P Chidambaram speaking in parliament said that investigators did not yet knowwho was behind the attack but he blamed it on terrorists seeking to destabilise the country He saidthat the National Investigative Agency (NIA) would carry out a probe into the attack

PM Denounces Blast As Cowardly Act

Doordarshan news website | New Delhi in English 7 September 2011

Prime Minister Manmohan Singh on 7 September described the blast outside the Delhi High Court as acowardly act and urged all political parties to unite and tackle any acts of terrorism state-run Indiantelevision channel DD News reported This is cowardly act of terrorist nature We will deal with it Wewill never succumb to the pressure of terrorism Singh said He said this is a long war in which allpolitical parties all the people of India have to stand united so that the scourge of terrorism is crushed

IED Explosion At Delhi High Court Domestic Islamists Likely Culprits Growing Signs Of Jihadist Agenda

Sterling-Assynt | 7 September 2011

An IED placed inside a briefcase exploded at 1017AM at an entrance to Delhi High Court wherelitigants collect their visitor passes Wednesdays are reserved for public-interest litigation and so thearea was crowded It is likely that the briefcase was placed in the queue at reception before visitors passthrough security checks There is reportedly no CCTV coverage in this area which will makeidentification of the perpetrator difficult

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1242

The blast was of at least medium intensity and created a crater between three to four feet deepAt least eleven people have died and 65 others have been injured ndash a toll that would probably have beenhigher if an international group had been responsible There were no other explosions which has thesame implication Mumbai has been placed on high alert following the attack especially as the HomeMinistry reported in August that coastal cities were under threat from pan-Islamic terror groups Noblame has yet been assigned A minor explosion occurred on 25 May (also a Wednesday) in a car-park near the Court That bomb was constructed using ammonium nitrate and is believed to havemalfunctioned causing no damage or injuries which suggests similar origins to this one

There are reports of an email from Harkat-ul-Jihadi al-Islami (HuJI) claiming responsibilityfor todayrsquos explosion but we remain sceptical about this since the group has not previously made suchclaims via email The nature of the bomb and the use of email to communicate suggest rather theinvolvement of the Indian Mujahideen (IM) Nonetheless the unverified HuJI email demands that AfzalGurursquos death sentence be repealed and this may point towards the involvement of a jihadist agendaGuru was involved in the December 2001 Parliamentary attacks in Delhi and had his mercy petitionrejected by the Home Ministry on 10 August

Todayrsquos incident indicates an increase in successful attacks by local groups A robust securityforce campaign following the 2008 Mumbai attacks diminished the capabilities of groups such as IMThey claimed responsibility for the December 2010 Varanasi bomb blast which killed one and injured

twenty people However IMrsquos likely involvement in the July 2011 blasts in Mumbai and the attack todaypoints towards the rebuilding of its capabilities and possibly also the establishment of closer ties with jihadi groups

We do not expect a spate of attacks to follow imminently but such incidents will continue tooccur possibly on a larger scale as IM continues to regroup following the security clampdownDevelopments in the cases of Afzal Guru and Ajmal Kasab (the surviving gunman from 2008) willprovide cause for further attacks Given a recent warming in relations between India and Pakistan theHigh Court attack will be unlikely to raise tensions between the two countries significantly

Indonesia

| back to top |

Islamic Groups Continue To Harass Religious Minorities Government Silence Further

Encourages Attacks Youths Beaten In East Jakarta

Assynt SEAsia Vol VIII No17 | 7 September 2011

Hard-line Islamic groups continued to intimidate religious minorities without any response from theGovernment at either a local or national level Yudhoyono relies on the support of Islamic parties inParliament and is unlikely to take any decisive action against such incidents This will further encourageradical groups and endangers the countryrsquos reputation for religious tolerance

Three youths were beaten by members of the Islamic Defenders Front (FPI) for allegedly beingdrunk The attack took place in Jakartarsquos business district but it remains unlikely that the FPI will targetforeigners and the security forces will not tolerate any threats to business interests Nonetheless such

incidents highlight a worrying trend towards increasingly hard-line behaviour that remains unchecked bythe Government

We previously reported that the light sentences handed down for the killing of three members of the Ahmadiyah sect will embolden radical groups (see our Report of 3 August) In this period theIslamic Reform Movement (Garis) coerced Ahmadi youths in Cianjur West Java to join mainstreamprayers The Ahmadiyah sect meanwhile was banned from conducting religious activities during theEid holidays by the South Sulawesi administration for fear of provoking violence

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1342

Iran

| back to top |

Two Arrested Al-Qaidah Members Iraqi Three Iranian - Iran Official

ISNA website | Tehran in Persian 7 September 2011

The public prosecutor of Irans Kerman Province Yadollah Movahhed has announced the start of aninvestigation into the case of five people arrested on charges of having links to Al-Qaidah the IranianStudents News Agency (ISNA) reported on 7 September Two of the detainees - arrested on 19 August -are Iraqis and the other three are Iranian nationals Movahhed told ISNA in an interview on 7 SeptemberThe prosecutor said the detained people are accused of carrying illegal arms and munitions and addedthat an investigation is ongoing into the possibility that they were members of a larger group

Israel

| back to top |

Israel Uncovers Planned Hamas Bombing Spree On Israelis

Xinhua | 8 September 2011

Hamas cells operating in the West Bank routed between May and AugustThe Israeli security agency Shin Bet has broken a network of Hamas cells operating in the West Bank and planning a series of attacks against Israeli targets local media reported Wednesday Dozens of

Hamas members comprising 13 militant cells were arrested throughout the West Bank between May andAugust Army Radio reported One of the groups has carried out a bombing attack at the entrance toJerusalem in March in which a British woman was killed and several dozen civilians wounded Anothercell had planned to dispatch a suicide bomber to Jerusalems Pisgat Zeev neighborhood on Aug 21 Theattack was thwarted at the last minute by Shin Bet agents assisted by the Israel Defense Forces (IDF)and police according to Army radio Other groups were in various stages of planning and preparingattacks including bombings and the kidnapping of civilians or soldiers for the release of Palestinians jailed in Israel The Shin Bet concluded based on its interrogations of the group members that theHamas military leadership in Gaza and abroad is exerting considerable efforts to rehabilitate itspresence in the West Bank with financing and weapon smuggling The West Bank has remainedrelatively quiet in recent years Israeli officials attributed the success in preventing violence in the area

to the cooperation between the IDF and the Palestinian National Authoritys security forces

Israeli Air Strike Kills One Gaza Militant

Xinhua | 8 September 2011

Strike follows more rocket launches from Gaza warnings of new battlesAn Israeli air strike killed an Islamic Jihad militant and wounded three others in the central Gaza

Strip town of Dier a-Balah witnesses and medical sources said Local witnesses said the militant diedafter his car was hit by a missile adding that three other people were also wounded The condition of theinjured is stable hospital sources said Earlier Wednesday an Israeli military spokesperson said a rocketwas launched from the Gaza Strip into south Israel adding the projectile landed in an open area and didnot cause injuries or damage None of the Palestinian armed factions has claimed responsibility for the

rocket attack Late on Tuesday a Palestinian militant was killed and two others injured when Israeliwarplanes targeted a group of gunmen east of Khanyounis City south of the Hamas-ruled Gaza Strip

The Gaza Strip witnessed an escalation of bloody violence between Israel and Gaza militantgroups in August leaving 26 Palestinians and three Israelis killed The violence was triggered after eightIsraelis were killed in well-coordinated operation in the Red Sea city of Eilat Israel accused Palestinianmilitants of plotting and carrying out the attack which started from the bordering Sinai Peninsula inEgypt

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1442

Libya

| back to top |

Libyan Extremist Britain Allowed To Stay Was Link To Al-Qaeda In Iran Papers Show

The Daily Telegraph | (London) By Richard Spencer Tripoli

The extremist Ismail Kamoka spent several years sending funds to terrorist groups across the Middle East

An Alleged Libyan extremist who sought political asylum in Britain regularly travelled to Iran from2002 to provide forged documents to extremists linked to al-Qaeda secret files found in a Tripoliintelligence service building have disclosed

The documents seen by The Daily Telegraph unearth British intelligence suspicions about linksbetween Iran and al-Qaeda dating back almost a decade Other details to come out of the documentssent by MI6 and found in the office of the former head of foreign intelligence and later foreign ministerMoussa Koussa who defected in March include the revelation that Britain had begun co-operating withthe Chinese security services on Islamic extremists The extent of Iranian co-operation with al-Qaedahas been disputed in intelligence communities though Iranians are thought to have provided weaponsand explosives to the Taliban in Afghanistan

A number of al-Qaeda operatives including members of the family of Osama bin Laden fled toTehran after the fall of the Taliban in Afghanistan and their precise status in Iran has been unclear Thepapers in Libya do not directly challenge the Iranian government but suggest that al-Qaeda operativeshad more freedom of movement there than previously thought The extremist Ismail Kamoka spent

several years sending funds to terrorist groups across the Middle East including some linked to al-Qaeda the files said Mr Kamoka who had been given indefinite leave to remain in Britain afterarriving from Saudi Arabia in 1994 and claiming asylum travelled from the UK to Iran viaSwitzerland in July 2002 according to one document[Article continues herehttpwwwtelegraphcouknewsworldnewsafricaandindianoceanlibya8740771Libyan-extremist-Britain-allowed-to-stay-was-link-to-al-Qaeda-in-Iran-papers-showhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1542

Nigeria

| back to top |

Bomb Explodes In Violence-Torn Nigerian City Residents

AFP | 6 September 2011

A bomb went off Tuesday in Nigerias northeastern city of Maiduguri disrupting a three-week lull inbombings in the violence-torn city local residents said [Article continues here httpnewsyahoocombomb-explodes-violence-torn-nigerian-city-residents-215718081html]

Pakistan

| back to top |

Pakistan Bans Foreign Travel For Those Involved In Bin-Ladin Probe

The News website | Islamabad in English 7 September 2011

A Pakistani commission investigating the circumstances surrounding the killing of Al-Qaidah chief Usamah Bin-Ladin has banned foreign travel for everyone involved in the probe Pakistani daily TheNews part of the Jang group which owns Geo TV reported on 7 September The paper recalled that thecommission had already directed the countrys interior ministry and the intelligence service ISI toensure that the Bin-Ladin family was not repatriated from Pakistan without the consent of the

commission

More Than 20 Killed In Two Suicide Blasts In Pakistans Quetta

Express247 TV | Lahore in English 5 September 2011

At least 22 people were killed and several others injured in two explosions in the south-westernPakistani city of Quetta on 7 September the website of the Dubai-based private Pakistani TV channelARY News reported According to the channel one blast went off near the residence of the FrontierConstabulary and another one near the commissioner office in Quetta According to the report around100 kilograms of explosives were used in each attack (ARY News website Dubai in English 07 Sep 11)

Private Pakistani English-language TV channel Express 247 carried a series of onscreen scrollswhich said police had confirmed that the two blasts were suicide attacks The report cited police sources

as saying that 25 people were killed and more than 40 injured in the attacks (Express247 TV Lahorein English 0654GMT 07 Sep 11)

BBCM notes that the attacks came after the Pakistani intelligence agency said on 5 August that ithad arrested Al-Qaidah commander Younis Al-Mauritani and two of his accomplices in Quetta

Taleban Say Quetta Blasts Revenge For Recent Al-Qaidah Arrests

AFP | 7 September 2011

The Pakistani Taleban have claimed responsibility for the twin suicide bombs in Quetta on 7 Septembersaying they were carried out to avenge the recent arrests of Al-Qadiah operatives in the city Wecarried out the attacks Taleban spokesman Ehsanullah Ehsan told AFP in a phone call from anundisclosed location

Twin Suicide Bombings In Pakistan Leave 23 Dead

Miami Herald

Twin suicide bombers attacked the home of a senior military officer Wednesday in the western city of Quetta injuring him and killing at least 23 people officials said in a possible revenge attack forPakistans recent arrest of a senior al Qaida commander [Article continues here httpwwwmiamiheraldcom201109072394264twin-suicide-bombings-in-pakistanhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1642

Philippines

| back to top |

Moro Splinter Group Threatens US Soldiers In Philippines But Capabilities Limited

Government-Rebel Negotiations Remain Difficult

Assynt | SEAsia Vol VIII No17 7 September 2011

Ameril Umbra Kato a former senior Moro Islamic Liberation Front (MILF) field commander whoresigned late last year because he rejects peace negotiations has threatened to attack US troops as wellas Filipino security forces and other Government targets US and Filipino troops are currentlyundertaking joint training exercises This is an annual event but the first time they have been conductedin central Mindanao However Katorsquos splinter group the Bangsamoro Islamic Freedom Fighters (BIFF)is believed to have as few as 200 members with generally unsophisticated weapons ConsequentlyBIFFrsquos ability to conduct an attack on US forces is likely to be limited

In this period Kato announced the creation of a political wing to his grouping the BangsamoroIslamic Freedom Movement emphasising his split with MILF Nevertheless he has not been expelledfrom MILF and so is protected by the current ceasefire with Manila though MILF has stronglycondemned Katorsquos threat against US troops It is possible that MILF leadership is content to allow himto operate relatively unimpeded in order to gain greater leverage in its negotiations with theGovernment since they can contrast their more compromising approach with BIFFrsquos threatened

violence Meanwhile negotiations between MILF and the Government continue MILF dismissed theGovernmentrsquos latest proposal for an autonomous region but both sides appear committed to continuingtalks

Russia

| back to top |

Suicide Bombings In Grozny Demonstrate Islamic Insurgencyrsquos Continuing Capabilities In

Chechnya

Stirling Assynt Reports | Report FSU Vol IV No17 7 September 2011

A series of suicide bombings in the Chechen capital on 31 August (which left nine casualties includingseven police officers) has severely undermined President Ramzan Karydovrsquos claims to have successfully

eradicated the Islamic insurgency in the Republic The first suicide bomber reportedly detonated hisexplosives in a densely populated area only 150 metres from a local Parliament building while twofurther jihadists targeted first-response units Significantly the attack occurred during the Muslimholiday of Eid a three day celebration which marks the end of Ramadan during which the risk of jihadist attacks is heightened Indeed in addition to this strike in Grozny jihadist militants carried outfurther attacks in Iraq Nigeria and Algeria during Eid this year

Although no group has claimed responsibility for this incident it bears the hallmark of theCaucasus Emirate and so was likely orchestrated by the grouprsquos newly appointed deputy KhuseynGakayev and his brother Vadalov Indeed the Gakayev brothers are believed to have been behind theattack on the Chechen Parliament in October 2010 demonstrating the grouprsquos capabilities and intent tocarry out such strikes Moreover the timing of these bombings ndash only two months after the

reconciliation of the Caucasus Emiratersquos leader Doku Umarov with Chechen commanders (see our 3August Report) ndash supports this assessment and suggests that further incidents and suicide bombings arelikely given this truce

Suspected Militant Killed In Russias Southern Republic

Interfax news agency | Moscow in Russian 7 September 2011 Russias National Antiterrorist Committee said on 7 September a militant had been killed in the Republicof Kabarda-Balkaria the corporate-owned Russian news agency Interfax reported

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1742

Saudi Arabia

| back to top |

Saudi Arabia Shopping Around For Nuke Technology

Haaretz | 8 September 2011

Ties with Pakistan may remain close as Riyadh seeks nuclear assistanceSynopsis This week brought news that Iran on its own has produced new advanced nuclearcentrifuges According to a report of the International Atomic Energy Agency Iran has begun to installthe centrifuges in its uranium enrichment facility in Natanz But the high-level source noted thatdevelopment and production of the new centrifuges began more than seven years ago That does notspeak of a great technological capability on Irans part Israeli intelligence like its American counterpartviews 2014 or 2015 as the date when Iran will be able to build nuclear weapons says the source - if itwants to and no one blocks it In Saudi Arabia in contrast they are a bit more disturbed by thedevelopments in Iran An American Department of Energy delegation visited Riyadh and met with DrHashim Yamani who heads the King Abdullah City for Atomic and Renewable Energy Saudi Arabiawants to equip itself with nuclear reactors to generate electricity The United States is interested inselling Riyadh reactors for two reasons - fat contracts and the ability to keep close tabs on nucleardevelopments in Saudi Arabia The American administration is concerned that with a nuclear programfor civilian uses Saudi Arabia would actually like to prepare the infrastructure so it could switch to

producing nuclear weapons relatively quickly should Iran possess such weapons Defense ministerSultan Bin Abdul Aziz and the countrys former intelligence chief Turki Bin Faisal reportedly favorthe preparation of a secret nuclear program for military uses in cooperation with a Sunni Muslim ally -Pakistan which possesses dozens of atomic bombs Saudi Arabia reportedly funded Pakistans nuclearweapons program in return for Pakistans promise to aid the monarchy in this area if need be

Serbia

| back to top |

Serbia Threatened By Terrorism Says Dacic

Tanjug | 8 September 2011

US officials warned Serbia of possible terrorist activity particularly against foreign interests

After a warning coming from USA officials Serbia will raise the level of security in all facilitiesbelieved to be a possible target of terrorists the countrys Deputy Prime Minister and Minister of InteriorIvica Dacic stated Wednesday in the Palace of Serbia He stated that the security measures will primarilyrefer to the facilities of foreign countries in Serbia and added that special attention will be paid to thesecurity of air traffic US officials assume that there is a possibility of new terrorist attacks in the USAand other countries including Serbia Dacic said following a meeting with Special Representative of the UN Secretary-General for Disaster Risk Reduction Margareta Wahlstrom in Belgrade and a sessionof the republic headquarters for emergency situations

Somalia

| back to top |

Six Killed In Mortar Attack In Somali CapitalShabeelle Media Network website | Mogadishu in Somali 7 September 2011

Six people were killed and several others injured after three mortars landed in Mogadishus Arjantiinneighbourhood in Kaaraan District on the night of 6 September the privately-owned Shabeelle websitereported It quoted an eyewitness as saying that two of the three mortars fired have caused thecasualties inflicting fear in the residents who returned to their homes after Al-Shabab vacated the areaearly last month Kaaraan District is one of the areas taken over by the government forces and AUpeacekeepers

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1842

United States

| back to top |

Post-911 Intelligence Reform Takes Root Problems Remain

Reuters | 8 September 2011

US intelligence agencies will forever be scarred by their failure to connect the dots and detect theSeptember 11 plot but a decade later efforts to break down barriers to information-sharing are takingroot Changing a culture of need-to-know to need-to-share does not come easily in spy circles Someofficials say they worry a decade later about a future attack in which it turns out that US spy agencieshad clues in their vast vaults of data but did not put them together or even know they existed

Yet significant changes both big and small have broken down barriers between agenciessmoothed information-sharing and improved coordination US intelligence experts say From issuing ablue badge to everyone working in the sprawling intelligence community to symbolize a commonidentity to larger moves of mixing employees from different agencies the goal is singular -- to preventanother attack

Were much further ahead David Shedd Defense Intelligence Agency deputy director said of the ability to connect the dots compared with 10 years ago Still signs of a plot to attack the UnitedStates could be missed again My worst fear and I suspect probably one that would come true is that inany future would-be or actual attack God forbid we will be able to find the dots again somewhere

because of simply how much data is collected Shedd said The political response to the failure to stopthe attack was the 2002 creation of the Department of Homeland Security pulling together 22 agenciesto form the third largest US Cabinet department behind the Pentagon and Veterans Affairs

That was followed by the creation in late 2004 of the Director of National Intelligence to overseeall the spy agencies as recommended by the bipartisan 911 commission Previously the CIA directorheld a dual role of also overseeing the multitude of intelligence agencies But in the aftermath of the2001 attacks policymakers decided that was too big of a job for one person to do effectively

Critics argued then and now that the reforms were the governments usual response to crises --create more bureaucracy But others see much-needed change It has been a tremendous improvementsaid Lee Hamilton who was the 911 commission vice chair Its not seamless there are problems andweve still got a ways to go The 2001 attacks involving airliners hijacked by al Qaeda operatives killed

nearly 3000 people in New York Pennsylvania and the Pentagon Various US intelligence and lawenforcement agencies had come across bits of information suggesting an impending attack but failed toput the pieces together The CIA had information about three of the 19 hijackers at least 20 monthsbefore the attacks the National Security Agency had information linking one of the hijackers with alQaeda leader Osama bin Ladens network the CIA knew one hijacker had entered the United States butdid not tell the FBI and an FBI agent warned of suspicious Middle Eastern men taking flying lessons

Have the reforms made America safer Officials say yes and point to the US operation thatkilled bin Laden in Pakistan in May that demanded coordination among intelligence agencies and themilitary But there is an inevitable caveat no one can guarantee there will never be another attack onUS soil On Christmas Day 2009 a Nigerian man linked to an al Qaeda off-shoot tried unsuccessfullyto light explosives sewn into his underwear on a flight to Detroit from Amsterdam It turned out US

authorities had pockets of information about him President Barack Obama used a familiar September 11phrase to describe the 2009 incident as a failure to connect the dots of intelligence that existed acrossour intelligence community

Roger Cressey a former White House National Security Council counterterrorism officialresurrected another September 11 phrase It was a failure of imaginationThe intelligence community had not seen al Qaeda in the Arabian Peninsula a Yemen-based al Qaedaoff-shoot as capable of striking the US homeland If the underwear bomber threat had originated inPakistan they would have gone to battle stations immediately Cressey said Some proposed changesin how authorities would respond to another successful attack still are pending For example creation of

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1942

a common communication system for police firefighters and other emergency personnel remainstangled up in political wrangling in Congress over how to implement it This is a no-brainer Hamiltonsaid The first responders at the scene of a disaster ought to be able to talk with one another Theycannot do it today in most jurisdictions

Former leaders of the 911 commission issued a report card saying nine of its 41recommendations remain unfinished The Office of the Director of National Intelligence hasexperienced growing pains as overseer of the 17 spy agencies churning through four chiefs in six yearsTensions over turf confusion about the DNIs role and problems herding agencies with very powerfulchiefs of their own all came to a crescendo when retired Admiral Dennis Blair the third DNI tried toassert authority over CIA station chiefs who represent the agency in different countries The positionof chief of station is one of the crown jewels of the CIA and they dont want anyone playing with theircrown jewels said Mark Lowenthal a former senior US intelligence official

After a dust-up with CIA Director Leon Panetta who now is defense secretary it was Blair whowas sent packing I think the mistake that some have made is to have viewed the DNI and the Directorof CIA as an eitheror proposition rather than the power of the two working together the DIAs Sheddsaid in an interview in his office There is a history of where that hasnt worked so well I believe it isworking much better today said Shedd who has worked at the DNI CIA and National SecurityCouncil

Intelligence experts say in the current administration Obamas top homeland security andcounterterrorism adviser John Brennan arguably has more power than any of them because he has thepresidents ear Its a reminder that bureaucratic reform or no personalities count in making nationalsecurity policy The improved sharing of secret data has led to yet another set of problems The delugeof bits and bytes has subjected intelligence analysts to information overload as they try to sift through itall for relevant pieces Our analysts still are spending way too much time on finding the informationrather than on the analysis of the information Shedd said There is just too much data to go find it all

The intelligence community wants a system developed that would automatically processinformation from multiple agencies and then make the connections for the analysts

But greater inroads into sharing data across agencies does not guarantee that another attack willbe averted The threat has evolved and officials now are increasingly concerned about a lone wolf plot

by an individual not tied to any militant group that may be more difficult to uncover Those threatswill not come to our attention because of an intelligence community intercept said John Cohen asenior Department of Homeland Security counterterrorism official

They will come to our attention because of an alert police officer an alert deputy sheriff analert store owner an alert member of the public sees something that is suspicious and reports it Cohensaid One measure of the success of post-911 reforms is that a decade later the United States has not hada similar attack Now that could be luck that could be skill we dont really know Hamilton said Butin all likelihood what we have done including the establishment of the Department of HomelandSecurity and the transformation in intelligence and FBI has certainly been helpful[Article continues here ]httpnewsyahoocompost-9-11-u-intelligence-reforms-root-problems-052514320html

Comment the value added provided by the Office of the DNI remains an open question for many withinthe Intelligence Community (IC) and is a favored theme of corridor discussion in IC-member agenciesOn the other hand there is broad agreement among intelligence officials that the degree of cooperationand coordination between intelligence agencies and the character of intelligence sharing has vastlyimproved The fact that there has not been a successful major attack on US soil since 911 ndash not forlack of plotting ndash is in great part testimony to this more effective cooperation

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2042

Jihadist Suggests Striking New York City Bridges

All SITE Intelligence Group | 6 September 2011

A jihadist pointed to what he found to be a weak point of suspension bridges and directed his messageto those who love blasting and explosions In a message posted on the Shumukh al-Islam forum onSeptember 6 2011 the jihadist Abu Suleiman al-Nasser gave a picture of the Verrazano Bridge inNew York on which he drew a red box and arrow on the bridges center He then gave a map on whichhe circled the various bridges in New York City and its boroughs A fellow jihadist offered his ownidea giving a picture of the Hoover Dam and explaining that there is no target more important thandams He wrote that striking a dam may lead to the submerging of cities and the killing of thousands of people and in the case of the Hoover Dam would impact Las Vegas the capital of gambling anddebauchery

Counterterror Veteran is New Deputy FBI Director

Atlanta Journal Constitution | 1September2011

A 24-year FBI veteran with extensive counterterrorism experience Sean Joyce has been named the lawenforcement agencys new deputy director Elevated to the No 2 post within the FBI by Director RobertMueller Joyce replaces Timothy Murphy who is retiring after 23 years with the bureau Since last yearJoyce has been executive assistant director of the national security branch responsible for the FBIs

national security and intelligence operations He earned the Attorney Generals Award for ExceptionalService in 2004 for work on a counterterrorism squad in Dallas In 2008 he was named chief of thecounterterrorism divisions international terrorism operations section with responsibility forinternational terrorism matters within the United States hellip[Complete article is available here httpwwwajccomnewsnation-worldcounterterror-veteran-is-new-1153018html]

Top CIA Official Obama Changed Virtually Nothing

Salon | 1 September2011

PBSs Frontline is airing an examination of Top Secret America on September 6 The show includes arare and lengthy interview with 34-year-CIA-veteran John Rizzo who is described as the most

influential lawyer in CIA historyHere is one quote they include from Rizzo With a notable exception of the lsquoenhanced

interrogationrsquo program the incoming Obama administration changed virtually nothing with respect toexisting CIA programs and operations Things continued Authorities were continued that wereoriginally granted by President Bush beginning shortly after 911 Those were all picked up reviewedand endorsed by the Obama administration hellip[Complete article is available herehttpwwwsaloncomnewspoliticsbarack_obamastory=opiniongreenwald20110901obama]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2142

General Counterterrorism News| back to top |

The Terrible Missed Chance

Newsweek | 4 September 2011

Special Agent Harry Samit of the FBIs Minneapolis field office knew he was looking into the eyes of aterrorist It was early afternoon on Friday Aug 17 2001 Across from him sat Zacarias Moussaoui a33-year-old French-born student arrested the day before for overstaying his visa Moussaoui had paidmore than $8000 in cash that summer to sit in a cockpit simulator in a flight school in the suburbs of Minneapolis and learn - in a matter of days - the basics of how to fly a 747-400 Samit a formerintelligence officer at the Navys celebrated Top Gun flight school felt sure the man across the desk from him was a Muslim extremist who was part of a plot to hijack a commercial jetliner filled withpassengers The trick Samit wrote in a soon-to-be-released excerpt of a book hes written about thecase was getting Moussaoui to admit this and reveal details and associates to allow us to stop the plot

Surely the bureau brass in Washington would share his concern Samit thought He was wrongThat same day halfway across the country in the fluorescent-lit hallways of the J Edgar Hoover

FBI headquarters building in Washington counterterrorism supervisors were treating Samits firstreports about Moussaoui with skepticism even contempt Michael Maltbie a DC counterterrorism

specialist insisted repeatedly in the days after the arrest that there was no clear link between Moussaouiand Al Qaeda - the link needed for a warrant Maltbie thought Moussaoui was a dirty bird he latertold investigators but favored deporting him to France

Believing a hijacking might be imminent Samit appealed to his boss in Minneapolis SpecialAgent Greg Jones Jones picked up the phone on Aug 27 and called Maltbie at FBI HQ

Moussaoui he said might be part of a plot to get control of an airplane and crash it into theWorld Trade Center or something like that

Maltbie scoffed You have a guy interested in this type of aircraft Maltbie replied accordingto FBI documents That is it (Maltbie declined requests for an interview)

At least Maltbie was paying attention Michael Rolince who ran the FBIs InternationalTerrorism Operations Section was arguably the bureaus most important go-between with the White

House on domestic terrorist threats in the summer of 2001 He tells Newsweek he spent less than 20seconds being briefed on the Moussaoui case that August His office was inundated with terrorismprobes he said since Moussaoui was in custody already he posed no immediate threat Did it rise tothe level of something that I would take upstairs Rolince asks The answer is no

At CIA headquarters alarm bells were ringing loudly CIA Director George Tenet was briefedon Moussaoui within days of the arrest receiving a paper with the eye-catching headline IslamicExtremist Learns to Fly But the FBIs acting director that summer and the bureaus most seniorcounterterrorism official were left in the dark[Article continues here httpwwwthedailybeastcomnewsweek20110904the-terrible-missed-chancehtml]

Pan Am Flight 103 - Lockerbie Bombing - al-Megrahi CIA FilesWebwire | 31 August2011

BACM ResearchPaperlessArchivescom has announced the publishing of CIA files related to the PanAm Flight 103 Lockerbie Bombing

The files can be downloaded at no cost at httpwwwpaperlessarchivescompanam103ciahtml The files date from 1984 to 1999 These are the most recent files on Pan Am 103 released by the

CIA This set of files is unique because it includes memos on the direct handling of an intelligencesource This type of information is exempt from the Freedom of Information Act (FOIA) and is not oftenreleased by the Agency

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2242

The files cover information received by the CIA on Abdel Basset al-Megrahi Al-Megrahi is theonly person ever convicted in the Pan AM 103 case The Scottish government in 2009 allowed al-Megrahi to be released from custody and returned to Libya because of his failing health With the recentfall of Muammar Qaddafis regime there have been renewed calls for al-Megrahi to be returned toScottish custody or extradited to the United States and put on trial[Complete article is available here httpwwwwebwirecomViewPressRelaspaId=144692]

Getting The Caucasus Emirate Right

CSIS | August 2011

ldquohellipThis report aims to set straight a rather distorted record It demonstrates the veracity of three vitallyimportant facts usually obfuscated in discussions of the subject (1) the longstanding and growing tiesbetween the CE and its predecessor organization the ChRI on the one hand and al Qaeda (AQ) and theglobal jihad on the other hand (2) the importance of the CE jihadi terrorist network as a united andorganized political and military force promoting jihad in the region and (3) the salience of local culturaland the Salifist jihadist theo-ideology and the influence of the global jihadi revolutionarymovementalliance as key if not the main factors drive the ldquoviolence in the North Caucasusrdquohelliprdquohttpcsisorgfilespublication110829_Hahn_GettingCaucasusEmirateRt_Webpdf

7 Things You Didnrsquot Know About the War on TerrorForeign Policy | By Eric Schmitt and Thomas Shanker 6 September 2011

From an attempt to negotiate with Osama bin Laden to a proposal to threaten to bomb Mecca its been awild decade for the US national security establishment

Our new book Counterstrike The Untold Story of Americas Secret Campaign Against Al Qaeda is in many ways asummary of the past decade of our reporting on the military intelligence community and domestic law enforcement as itentered a new era of Darwinian evolution to counter violent extremism

It also is our deep dive into a decade of American counterterrorism efforts -- from the work of commando trigger-pullers and spies on the ground up to senior political leaders who wanted to defendthe nation (and get re-elected) Our efforts to report and write this book allowed us to uncover many newmissions never discussed before -- and gave us an understanding of how the war on terror had changedover the last decade

Our book assesses the 10 years since 911 as the military divides the fight into tactical missionson the battlefields of modern terrorism then the operational advancements that provided the means tosuccess while not securing final victory and at the top the strategic level of policy debates about howthe nation should combat this threat to its security

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2342

Here are seven vignettes from Counterstrike that offer glimpses into the thinking of policymakers andcommanders in early days after the Sept 11 attacks and how that thinking evolved over the followingdecade into a more whole-of-government approach to combating terrorists

1 Bush Tried to Negotiate with al Qaeda

The George W Bush administration like all of its predecessors swore never to negotiate with terroristsBut it did undertake an extraordinary and extraordinarily secret outreach effort to open a line of communication with Osama bin Laden and al Qaedas senior leadership It was an attempt to replicatehow the United States tried to sustain a dialogue with the Soviet Union even during the darkest days of the Cold War when White House and Kremlin leaders described in private and in public a set of acceptable behaviors -- and described with equal clarity the swift vicious even nuclear punishment forgross violations

In the months after the Sept 11 attacks Bushs national security staff working through theintelligence agencies made several attempts to get a private message to bin Laden and his inner circleThe messages were sent through business associates of the bin Laden familys vast financial empire aswell as through some of the al Qaeda leaders closest relatives a number of whom were receptive toopening a secret dialogue to restrain and contain their terrorist kinsman whom they viewed as a blot on

their name (To be sure other relatives were openly hostile to the American entreaties)According to a senior American intelligence officer with first-hand knowledge of the effort the

response from Osama bin Laden was silence And the effort was suspended

2 Sometimes a Wedding Is Just a WeddingIn the early days after the Sept 11 attacks the CIA and FBI vied to produce the most compellingintelligence reports that tracked suspected terrorist plots The agencies often worked at cross purposessometimes unwittingly At one point in early 2002 both agencies were tracking what American analystssaid were growing preparations for a major wedding somewhere in the Midwest (In terroristvernacular the word wedding is often code for a major attack)

Dribs and drabs on this wedding planning made their way to President Bush from bothagencies independent of each other of course

Finally over the Easter holiday during a video-teleconference with top aides in Washingtonfrom his ranch in Crawford Texas Bush stopped the briefing exasperated by the discrepancies in therival agencies reporting about the suspected threat

George Bob get together and sort this out Bush told his CIA director George J Tenet andFBI director Robert S Mueller III

Bushs instincts were correct When the analysts finally untangled their clues it turned out thatthe ominous wedding really was just that the matrimony of a young man and a young woman fromtwo prominent Pakistani-American families There was no threat There was no plot

3 The Threat to Bomb MeccaAs fears of a second attack mounted following the 911 strikes US government planners franticallycast about for strategies to protect the country Even the most far-fetched ideas had a hearing howeverbriefly In one case some government planners proposed that if al Qaeda appeared ready to attack America again the United States should publicly threaten to bomb the city of Mecca in Saudi Arabiathe holiest site in all of Islam in retaliation Just nuts one Pentagon aide wrote to himself when heheard the proposal The idea was quickly and permanently shelved

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2442

4 The SEAL Raid in Iran That Didnt HappenWhen US forces routed the Taliban government in Afghanistan and forced bin Laden and his toplieutenants to flee many senior al Qaeda leaders including bin Laden and his deputy Ayman al-Zawahri escaped to neighboring Pakistan But a separate group including the al Qaeda leaders sonSaad bin Laden fled to northern Iran where American troops would not pursue them and the Iranianswould likely not detain them But the Shiite clerics running Iran placed the al Qaeda operatives and theirfamily members under virtual house arrest and they became a shield against possible attacks from theSunni-based terrorist organization

One plan in particular illustrated the bold thinking and wildly unrealistic aims of the militarysinitial approach after 911 to kill or capture terrorist leaders The plan called for hunting the eight to 10senior al Qaeda leaders and operatives who had sought refuge in Chalus an Iranian resort town on theCaspian Sea where they had been detained

At the Joint Special Operations Command at Fort Bragg NC military planners drew up optionsfor Navy SEALs to sneak ashore at night using state-of-the-art mini-submarines Once they landed theSEALs would slip past Iranian guards to snatch the al Qaeda leaders Another option called for SpecialOperations helicopters to spirit American commandos into the town and whisk them out again with theirquarry The Americans went as far as conducting two or three rehearsals at an undisclosed locationalong the US Gulf Coast in early 2002 They conducted small-boat insertion exercises involving about

30 Special Operations personnel most SEALs and eventually concluded the mission was feasible if they were provided with more detailed intelligence on the locations of the al Qaeda members and thesecurity around them

The logistics of the mission were daunting Chalus sits at the edge of the Elburz coastal mountainrange about 70 miles north of Tehran and the failed rescue of the American hostages in Iran in April1980 loomed large in commanders memories Eventually Gen Richard B Myers the chairman of theJoint Chiefs of Staff rejected the mission as too risky and too politically volatile Many of the al Qaedaoperatives are reportedly still there

5 Intelligence Hauls of Unusual Size

US intelligence and military commandos have carried out tens of thousands of raids in the decade since911 The amount of material seized from terrorist and insurgent targets has grown to a massive sizeThe Defense Intelligence Agency (DIA) operates exploitation triage centers and giant warehouses forstoring intelligence products -- in war zones rear headquarters in countries like Qatar and back in theUnited States One intelligence analyst said that walking into one of the warehouses for documents andmedia exploitation reminded him of the final scene in Raiders of the Lost Ark when the captured Ark of the Covenant is crated up and rolled into a cavernous storage area that contains all the governmentsother dangerous secrets

All told more than two million individual documents and electronic files have been cataloguedby media type hard copy phone number thumb drive Each is inspected by a linguist working with acommunications analyst or computer expert

The DIA analysts are joined by specialists from other agencies including the FBI and the DrugEnforcement Administration Yet given the overwhelming volume no more than about 10 percent of thecaptured intelligence has ever been analyzed

Intelligence officers say they simply are overwhelmed and untold quality leads may still beburied in the piles of computers digital files travel documents and pocket litter

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2542

6 The Digital Counterjihad Cyberspace is the terrorists ultimate safe haven Its where they recruit raise money and even plotattacks using coded language while playing online video war games The US government fights back

One technique is called false band replacement whereby the intelligence agencies infiltratemilitants networks and post their own material to counter extremist efforts on those same jihadistwebsites The trick is to forge the onscreen trademarks -- web watermarks -- of al Qaeda media sites

This makes messages posted on these sites official and sows dissent and confusion among themilitants

This Internet spoofing can be used in support of more traditional combat missions There is atleast one case confirmed by American officials in which a jihadist website was hacked by Americancyberwarriors to lure a high-value al Qaeda to a surreptitious meeting with extremist counterparts -- onlyto find a US military team in waiting

Getty images

7 First Kill the MullahsUS counterterrorism officials have learned fighting terrorists effectively means targeting specific nodesof that network that support and enable militants who strap on suicide vests This strategy focuses onneutralizing enablers such as the financiers gun-runners and logisticians Among these terror linchpins

are religious leaders who bless attacksHeavenly reward will not await a suicide bomber unless his death and those of his victims is

deemed halal in keeping with Islams sacred sharia law Each militant network has a sharia emir usuallyat the level of a sheikh or mullah In Iraq American commanders specifically killed emirs to throw awrench in a suicide bombing networks

Take him out and suicide bombings from that network are frozen until he is replaced said onemilitary officer with command experience in Iraq hellip[Complete article is available herehttpwwwforeignpolicycomarticles201109067_things_you_didn_t_know_about_the_war_on_terror]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2642

Dick Marty Rendition Report Condemns lsquoCult of Secrecyrsquo

BBC News | 8 September 2011

A report for Europes human rights watchdog has called for greater scrutiny of secret services andsupport for whistleblowers The Council of Europe investigated how countries like Britain GermanyRomania and Lithuania assisted the US with the rendition of terror suspects It said a cult of secrecyhad helped Western governments cover up abuses Defending whistleblowers it singled out USsoldier Bradley Manning accused of passing secrets to Wikileaks He had acted as a whistleblowerand should be treated as such CoE rapporteur Dick Marty wrote in the report which was due to besubmitted to the CoEs Parliamentary Assembly The soldier is currently in a US military prisonawaiting trial for passing restricted material to the controversial website

But the report praised Mr Manning and Wikileaks itself for uncovering evidence of renditionThe CoE represents 47 member-states including both EU countries and Russia and other ex-Sovietstates Mr Martys report focused on the record of Western states explaining that it was based oninvestigations into European links to the controversial US policy of rendition for terrorism suspectsThe CIA allegedly flew terror suspects around the world for interrogation in the years after 911 holdingthem in secret prisons in Europe and elsewhere

No licence to kill

In his 48-page report - entitled Abuse of State Secrecy and National Security - Mr Marty looked at thelevel of control exercised by European states over their security services He urged all states to useindependent parliamentary committees to oversee the work of their secret services saying this was of vital importance for the rule of law and democracy Mr Marty argued that Western governments wereusing the notion of state secrecy to shield their intelligence services from accountability for seriousviolations committed during anti-terrorist operations We consider that this is simply unacceptablehe wrote

A licence to kill (or to abduct and torture) only exists in certain films and in dictatorialregimes In democratic systems parliaments as representatives of the people have a right and duty toknow what the government is doing in the name of the people Mr Marty praised investigative journalists and non-governmental organisations for their work in exposing abuses of authority Stressing

the fundamental role whistleblowers had to play in an open society he warned against a real cult of secrecy as an instrument of power

While it was up to the courts to decide if Bradley Manning had committed any crime he wrotethe CoE was indebted to him for the publication of a recording of a helicopter attack in Iraq in whichthe crew seems to have intentionally targeted and killed civilians

Thanks to Mr Manning he said a large number of embassy reports had allowed us to learnsignificant details of important recent events which are obviously of general interest We therefore join Amnesty International in expressing our worries as to the treatment he receives Mr Marty wrote inthe draft report[Article continues here httpwwwbbccouknewsworld-europe-14820145]Comment This report demonstrates that Dick Marty is not as De Gaulle would say a serious man To

suggest that Bradley Manning is a hero and intelligence agencies bent on defeating terrorists arecriminals should say it all Manning knowingly violated his oath and willfully provided enormousamounts of classified material to WikiLeaks For Marty this is a good thing in the name of transparencyMarty always injudicious and anti-American in his remarks is now moving at warp speed into crackpotterritory

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2742

Al Qarsquoida amp its Affiliates| back to top |

Al Qaeda Is Down Not Out

Los Angeles Times | By Amy Zegart 7 September 2011

US talk of defeating terrorism is dangerously prematureTalk of strategically defeating Al Qaeda is all the rage in the White House these days Defense

Secretary Leon Panetta used the D-word in July President Obama declared in his new counter-terrorism strategy We can say with growing confidence that we have put Al Qaeda on the path todefeat Compared to the woeful state of the economy terrorism has become the administrations feel-good story of the year

Defeat is a big word It is also dangerously misleading Yes the United States has made greatstrides in the last decade to harden targets improve intelligence and degrade the capabilities of violentIslamist extremists Osama bin Ladens death was a major accomplishment But the fight is nowhereclose to being won and Americas most perilous times may lie ahead Three reasons explain why

The first is that strategically defeating Al Qaeda is not nearly as important as it sounds After911 Al Qaeda morphed into a more complicated decentralized and elusive threat consisting of threeelements core Al Qaeda affiliates or franchise groups operating in places like Yemen and Somalia with

loose ties to the core group and homegrown terrorists inspired by violent extremism often through theInternet in the comfort of their own living rooms

Core Al Qaedas capabilities started degrading in 2001 when the US invaded Afghanistandismantled training camps ousted the Taliban and sent Bin Laden running The CIA has estimated thecore group remaining in the AfghanistanPakistan region to number 50 to 100 fighters The last time BinLaden oversaw a successful operation was 2005 when Al Qaeda struck the London transit system

But plots by homegrowns and franchise groups have risen dramatically in recent years The 2009Ft Hood shooting the worst terrorist attack on US soil since 911 was the work of a homegrownterrorist The mastermind of the 2010 Times Square car bomb plot was a naturalized American citizentrained by the Pakistani Taliban not Al Qaeda Another franchise group Al Qaeda in the ArabianPeninsula was behind the foiled 2009 Christmas Day underwear bomber aviation plot and the 2010

plot to explode tampered printer cartridges aboard cargo planes The Bipartisan Policy Center reported11 violent Islamist extremist terrorist incidents against the US homeland in 2009 the most since 911Nearly all involved what former CIA Director Mike Hayden calls a witches brew of radicalizedAmericans and franchise groups

The second reason why talk of defeat is premature has to do with weapons Terrorism againstAmericans is nothing new The potential for terrorist groups to acquire weapons of mass destruction isIn 1995 a Japanese cult released sarin nerve gas in the Tokyo subway killing 12 people and injuringthousands It was the first WMD terrorist attack in modern history and it sparked a wave of presidentialterrorism commissions years before Bin Laden became a household name

It is this specter of the lone fanatic or small group armed with the worlds most devastatingweapons that keeps experts up at night In 2005 60 leading nuclear scientists and terrorism experts were

asked how many believed the odds of a nuclear attack on the US were negligible Only three or fourhands went up most were far more pessimistic Today there is enough nuclear material to build120000 weapons As long as fissile material is poorly stored and rogue states like Iran and North Koreacontinue their illicit weapons programs nuclear terrorism remains a haunting possibility

The third reason is that the FBI has not yet become a first-rate domestic intelligence agencyAnalysts whose work is vital to success are still second-class citizens labeled support staff alongsidesecretaries and janitors and passed over for key jobs including running the bureaus intelligence unitsThe FBIs information technology is so antiquated it belongs in a museum And the old crime-fighting

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2842

culture still lives There is now a move afoot to shrink new classified facilities so that agents dont haveto waste time away from their cases to read intelligence documents thereStrategically defeating Al Qaeda sounds too good to be true Because it is Amy Zegart is a senior fellow at Stanfords Hoover Institution and the author of Eyes on Spies

Congress and the United States Intelligence Community

US Counterterror Chief Al-Qaida On Steady Slide

Bostoncom | 31 August 2011

White House counterterrorism chief John Brennan said al-Qaida is on a steady slide after the death of al-Qaidas latest second-in-command in Pakistan Brennan told The Associated Press on Wednesdaythat its a huge blow in the first official White House comment since Atiyah Abd al-Rahmans reportedkilling by CIA drone strike in Pakistans tribal areas last week

Al-Qaida is sort of on the ropes and taking a lot of shots to the body and the head Brennansaid This is a time not to step back and let them recover a message he says hes sending to hiscounterparts in Pakistan[Article continues herehttpwwwbostoncomnewsnationwashingtonarticles20110831us_counterterror_chief_al_qaida_on_steady_slide ]

Al-Qaeda (AKA Al-Qaida Al-Qarsquoida)

Council on Foreign Relations | 29 August 2011

ldquoAl-Qaeda an international terrorist network is considered the top terrorist threat to the United StatesThe group is wanted for its September 11 2001 attacks on the World Trade Center and the Pentagon aswell as a host of lesser attacks To escape the post-911 US-led war in Afghanistan al-Qaedas centralleadership fled eastward into Pakistan securing a safe haven in loosely governed areas there In July2007 US intelligence agencies found that the organization was regrouping and regaining strength inthese tribal areas along the border with Afghanistan though targeted killings of senior al-Qaeda leadershave since diminished the groups command and control capabilities In February 2009 Director of National Intelligence Dennis C Blair told lawmakers that the groups core is less capable and effective

than it was a year ago The killing of al-Qaedas top leader Osama bin Laden by US forces in Pakistanin May 2011 served a significant blow to the organization but analysts say al-Qaeda remains deadlywith its networks spread all over the world Plus a number of affiliated groups have gained prominencein recent years complicating the task of containing the organizationrdquo

[Article continues here httpwwwcfrorgterrorist-organizationsal-qaeda-k-al-qaida-al-qaidap9126]

Al Qaeda In The Islamic Maghreb

CSIS | 1 September 2011

ldquoAl Qaeda in the Islamic Maghreb (AQIM) emerged from a decades-long militant Islamist tradition inAlgeria In 1998 the Salafist Group for Preaching and Combat (Groupe Salafiste pour la Preacutedication etle Combat or GSPC) broke away from the Armed Islamic Group (GIA) because of the GIArsquos extensive

targeting of civilians Gradually the GSPC evolved to encompass global jihadist ideology in addition toits historical focus on overturning the Algerian state In 2006 the GSPC officially affiliated with alQaeda core soon rebranding itself as al Qaeda in the Islamic Maghreb In the following years AQIMwas able to conduct a small number of large-scale attacks most notably its 2007 bombing of the UNheadquarters in Algiers In recent years counterterrorism pressure and weak governance have combinedto shift the center of AQIMrsquos presence to the Sahara-Sahel region AQIM continues to make its presenceknown through smuggling operations kidnappings and clashes with security forces in the desert In thecoming years general instability within the region could allow AQIM to further expand its influencerdquo[Complete article is available here httpcsisorgfilespublication110901_Thornberry_AQIM_WEBpdf ]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2942

AQ Strategy

The Assynt Report | 11 August 2011

Executive Summary Al-Qaedarsquos broad objectives remain unchanged in the wake of bin Ladenrsquos death There

are nonetheless growing questions over al-Qaedarsquos capability Longstanding paranoiaover the use of electronic communications is heightened by the ongoing US dronecampaign whilst attacks against the West have generally been disrupted at an early stage

The Pakistani Talibanrsquos attack on a Karachi naval base in May 2011 was a significantmilitary success and the first major act of revenge for bin Ladenrsquos killing Furtherattempts to avenge his loss are certain

All parts of al-Qaeda are working within a cohesive framework with the ultimate aim of restoring the Islamic Caliphate (Khilafa) The strategic plan to support this aim wasdrafted by 40 of al-Qaedarsquos brightest thinkers in Kandahar Afghanistan in November1999 This plan consists of four phases each seven years long leading to the dissolutionof corrupt regimes and the union of all newly-liberated states within the Khilafa

Apart from mounting strategic operations al-Qaedarsquos role is to be the inspiration for atruly global jihadist movement It seeks to achieve this through provision of trainingbeing a role model for others to follow extending acceptance and adoption of its tactics

particularly suicide bombings and professionalising jihadist media to build a commonbrand and message between hitherto separate groups

Between the late 1990s and 2003 the organisation was primarily devoted to classicinternational terrorism Most effort is now spent fighting insurgencies from North Africato South Asia The way in which this strategy helps to spread the struggle has been seenin North-West Africa where the initial development of al-Qaeda in the Islamic Maghrebwas in part fed by men returning from fighting with al-Qaeda in Iraq

Since mid-2009 al-Qaeda and its affiliates have increasingly encouraged jihadist-sympathisers resident in Western countries to engage in violence themselves withoutcentral direction or training making surveillance more difficult

One of the keys to awakening the spirit of jihad was the success in portraying the US and

its allies as Crusaders in the Muslim world Al-Qaedarsquos strategy essentially requires thatthis process be kept running until the forces of jihad have grown large enough to launchsuccessful liberation operations

Despite its successes in Afghanistan al-Qaedarsquos credibility has suffered both from its failure to landanother strategic blow on the West on the scale of 911 and also excessive Muslim casualties in someoperations Similarly al-Qaeda in Iraq was set back by its excessive sectarian zeal and local resentmentat the foreign fighter presence In turn this affected the movementrsquos funding from the Gulf

Analysis Sub-Saharan African Leaders Media Focus On Threats Prior to 911

OSC Feature | Sub-Sahara Africa -- OSC Analysis 6 September 2011Statements by Sub-Saharan African leaders and African media reports on terrorism prior to the 10thanniversary of 911 focus on the growing threats from local extremists and Al-Qaida affiliatesparticularly in West Africa with little direct commentary on the anniversary or US counterterrorismpolicies This focus on domestic threats suggests that counterterrorism messages expressing solidaritywith African nations and acknowledging the evolving terrorist threat on the continent would have thegreatest resonance with African audiences

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3042

Leaders Stressing Determination To Counter Local Threats African leaders public statements reflect an ongoing concern about the threat of terrorism on thecontinent and a strong commitment to find ways to combat this threat

Nigerian President Goodluck Jonathan emphasized the governments commitment tovigorously combat terrorism following the 26 August bombing of the UN office inAbuja by Nigerian extremist group Boko Haram reported the Paris-based news agencyAFP President Jonathan is hosting Liberian President Ellen Johnson Sirleaf and otherforeign dignitaries for a three-day forum on terrorism and economic crimes the widelyread Lagos-based independent daily The Guardian reported on 4 September

Malian President Amadou Toumani Toure launched a Special Program for PeaceSecurity and Development on 9 August stating that development remained the mostviable solution to counter threats to the countrys stability reported Malis state-owneddaily LEssor[ 3] The program aimed to undermine support for Al-Qaida in the IslamicMaghreb (AQIM) according to Burkinabe web portal Lefasonet on 11 August

Somali Prime Minister Abdiweli Muhammad Gas stated on 23 August that theTransitional Federal Government planned to remove Al-Shabaab from the central andsouthern regions in Somalia with the goal of restoring peace within one year so the

country can hold national elections according to the Puntland-based Garowe Online

Experts Media Highlight New Capabilities Tactics

African experts and media outlets are warning about the evolving nature of terrorist organizations on thecontinent the terrorists pursuit of new targets and tactics and their potential for taking advantage of regional instability

Leading South African think tank the Institute for Security Studies stated on 29 Augustthat Boko Harams attack on the UN in Abuja completes Boko Harams metamorphosisinto an international terrorist group Since December 2010 Boko Haram had killed over600 people in over 70 attacks against Nigerian targets according to the think tank buthad not previously targeted Western or international interests

A 26 August article on the popular Malian web portal Maliweb voiced concern thatAQIM could benefit from Tuareg mercenaries many of whom were recently returningfrom fighting in Libya and could benefit from an increase in arms trafficking through theSahel during the Libyan conflict

Ugandas privately owned Daily Monitor reported on 19 August that AU forces inSomalia warned that Al-Shabaab planned to increase the number of kidnappings andbomb attacks as part of its new strategy to shift from controlling territory in Mogadishuto conducting more of an insurgent campaign

Concern Over Al-Qaida Presence Terrorist Collaboration

West African official statements and media reports reflect a growing concern over an increased Al-

Qaida presence in West Africa and collaboration with AQIM Al-Shabaab and Boko Haram

Nigerian security services reported that the suspected mastermind behind the 26 Augustbombing of the UN office in Abuja was a Boko Haram member with close links to Al-Qaida and Al-Shabaab according Nigerias privately owned Daily Sun

A 28 August report in the privately owned daily Nigerian Tribune claimed that the 26August bombing in Abuja was part of Al-Qaidas plans to mark the 10th anniversary of 911 and called Boko Haram Al-Qaidas ally in the region

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3142

An 8 August commentary in Burkina Fasos LObservateur Paalga said that reports of Boko Haram collaboration with Al-Shabaab and AQIM could indicate that Al-Qaida isextending its African tentacles Abdourahmane Dieng security division chief of theEconomic Community of West African States said the collaboration represented a veryserious threat according to Senegals progovernment Le Soleil on 5 August

Messages Likely To Resonate With African Audience

Sub-Saharan Africas increasing concern about the shifting nature and potential strengthening of theterrorist threat on the continent suggests that messages directly addressing the impact of terrorism onAfricans the increasingly complex nature of the threat and the need for multilateral cooperation againstterrorism are most likely to resonate with Africans

Messages expressing solidarity and sympathy for Africans affected by Boko Haram Al-Shabaab and AQIM would almost certainly resonate with a broad African audience

African political and military leaders would probably welcome acknowledgement of thecomplex and changing nature of terrorism on the continent and recognition of theirinitiatives and commitment to countering violent extremism

African leaders and medias concern about potential collaboration between Boko Haram

Al-Shabaab and AQIM suggest that they would be open to improving multilateral andcross-regional sharing of lessons learned and strategies to counter the intensification of terrorism within Africa

Aviation and Maritime Security| back to top |

Bomb Threats Force Jets To Land

Associated Press | 7 September 2011

Both landed safely one landed in Ankara Ataturk International Airport and the other at Kuala LumpurTwo flights operated by Pakistans state-owned airline received bombs threats on Wednesday

and both landed safely one in Turkey the other in Malaysia officials said No bombs were found The

first flight was headed for Manchester England when it was notified of the threat near the Bulgariancapital of Sofia The crew contacted the control tower in Istanbul to seek permission for the landingstate-run Anatolia news agency reported Authorities quickly evacuated all 378 passengers from theBoeing 777-300ER aircraft after it parked at a remote corner of the International Ataturk Airport andbomb squads began searching the plane with sniffer dogs Anatolia reported PIA spokesman MashoodTajwar confirmed the flight received a threat and landed All passengers were safe A police searchturned up no bomb officials said Later a second PIA flight from Islamabad to Kuala Lumpur alsoreceived a bomb threat It landed in Kuala Lumpur and all the passengers disembarked safely saidTajwar The UK-bound Pakistan International Airlines plane was forced to make an emergency landingat Ataturk Airport in Istanbul after receiving a bomb threat Malaysias airports authority said thepassengers were being screened and the plane was isolated in a parking area while being searched bypolice No bomb was found

It said the plane carried 164 passengers and 13 crew Azmi Murad senior general manager forthe authority said the Pakistani airline informed it that the warning came by email Mr Tajwar gave nodetails on the nature of the threat or how it was delivered Pakistan is home to al Qaedas top leadershipMilitants who trained there have been responsible for many of the attacks and failed plots in the USand Europe since Sept 11 2001 when planes hijacked by al Qaeda militants destroyed the World TradeCenter in New York and crashed into the Pentagon The bomb threats came four days before the 10thanniversary of 911 but there was no apparent link to Islamist militants who typically do not alertauthorities in advance The FBI and Homeland Security department issued warnings last weekend aboutal Qaeda threats to small airlines

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3242

Commentary amp Opinion| back to top |

From Terror Group Founder To Libyan Rebel Military Commander

ABCNews | 29August 2011

The same man who triumphantly led Libyan rebels into Gadhafis compound last week first came to theattention of the US intelligence community years ago - as a founder of a terror group

Abdelhakim Belhaj who was recently appointed to Tripolis rebel military council was one of the original founders of the Libyan Islamic Fighting Group an anti-Gadhafi group which was laterdesignated by the US State Department as a terrorist organization with links to al Qaeda according toUS government reports

We proudly announce the liberation of Libya and that Libya has become free and that the ruleof the tyrant and the era of oppression is behind us a victorious Belhaj told reporters after the stormingof Gadhafis Bab al-Aziziya compound last week Ousting Gadhafi had been the main objective of theLIFG since its inception in the early 1990s even if some of the fighters believed that meant puttingAmericans in the crossfire

The group carried out operations against the Libyan government including at least four suspectedassassination attempts against Gadhafi in the 1990s and was also believed to be connected to a series of suicide bombings in Casablanca Morocco in 2003 the US State Department reported As relationsbetween the US and Gadhafi improved in the mid-2000s some LIFG leaders cultivated relationshipswith top al Qaeda leaders including Osama bin Laden and were suspected of funneling fighters to Iraq tocarry out operations against US soldiers

When the LIFG was designated a terror organization in 2004 it was meant as a gesture of solidarity with the Libyan government according to a March 2011 congressional report

Contrary to several US government reports Libyan rebel ambassador to the US Ali Aujalitold ABC News that the LIFG was never connected to al Qaeda and did not carry out terrorist operations

They were only opposed to Gadhafi during his rule and paid the price for that by beingoppressed by the regime Aujali said

The CIA first publicly voiced its concerns about the connection between the LIFG and al Qaedain 2004 when then-director George Tenet testified before the Senate Select Committee on Intelligenceand listed the LIFG among groups that represented an immediate threat [that] has benefited from alQaeda links[Article continues here httpabcnewsgocomBlotterterror-group-founder-libyan-rebel-military-commanderstoryid=14405319]

Interview With Saudi Sheik Wajdi Al-Ghazawi

MemriTVcom

Sheik Wajdi al-Ghazawi owner of al-Fajr TV criticizes extremist atmosphere in Saudi Arabia and saysafter 911 They Handed Out Sweets on the Streets of Mecca

Following are excerpts from a statement by Saudi Sheik Wajdi Al-Ghazawi owner of Al-FajrTV which was posted on YouTube on August 4 2011

Wajdi Al-Ghazawi When Al-Qaeda and Osama Bin Laden were at the height of their mightthey were extremely popular in Saudi Arabia From mosque pulpits across Saudi Arabia preacherswould pray for their success Moreover from the pulpits of the most important mosques ndash the Al-HaramMosque in Mecca and the Nabawi Mosque in Al-Madina ndash direct prayers for the success of Al-Qaedawere made during the days of the bombing of Tora Bora Oh Allah help our brothers in AfghanistanThese supplications were made during evening prayers as well as Friday prayers The preachers wouldpray for them in violation of the ministrys instructions

When the twin towers in New York were attacked they handed out sweets on the streets of Mecca By Allah they did I witnessed this myself The young people bowed in prayer and hugged one

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3342

another out of joy People were in heaven because of these young men who destroyed America andbombed this idol Am I right or not Was it like that or not

Back then when the Taliban broke off a piece of the nose of the Buddha statue which was hewnin the mountain an entire sermon was dedicated to it in the mosque in Mecca and the preacher was laterreprimanded for this sermon The entire Saudi people supported and loved Al-Qaeda

This went on until our brothers in Al-Qaeda ndash and I dont know what was going through theirminds ndash began to carry out operations inside Saudi Arabia Thats when we all raised our hands andsaid Youve gone too far We wont support you in this

The atmosphere here in Saudi Arabia is one of extremism It is characterized by focusing onminor details Many things are forbidden Yes maybe they are indeed forbidden but by forcing peopleto avoid them and by acting as if these were major sins an atmosphere was created that gave rise toextremist youth who might act recklessly at the most trivial provocation

For instance we blew out of proportion the issue of music the issue of smoking or the issue of hanging pictures in public places True there are clear texts on these issues but the young peopleembraced these issues as if they were fighting usury fornication or alcohol No these are not among theseven major sins So our society has become extreme

This extremist atmosphere has given rise to people who accuse others of heresy and people whopurport to be waging Jihad It has created genes that gave rise to cells of Al-Qaeda and other terrorists

We must examine our breeding ground in which these young men were sownBy Allah what can possibly emerge from such an atmosphere Muftis who accuse others of

heresy sheiks who incite and young people who bomb Am I right or not[Complete clip is available here httpwwwmemritvorgclipen3099htm]

Legal Aspects amp Lawfare| back to top |

Revisiting A Stale Counterterrorism Law

Council on Foreign Relations | 1 September 2011

ldquoNearly a decade after 911 the United States still relies on the 2001 Authorization for the Use of Military Force (AUMF) for the killing and detention of those considered responsible for or associatedwith the terrorist attacks But CFR national security law expert John Bellinger says it is becomingincreasingly difficult for the Obama administration to justify some of its counterterrorism operationsunder this limited statutory authority It has been used in defense of actions including drone attacks onindividuals as well as the targeting of groups in Yemen and Somalia that may have only the mosttenuous affiliation or association to the 911 attack A revised AUMF should clarify those operations aswell as the issue of detention specifically which individuals can be detained for how long and subjectto what processes There also needs to be greater effort at the international level he adds to fill thegaps in the law that covers conflicts between states and non-state actorsrdquohelliprdquo[Complete article is available here httpwwwcfrorgcounterterrorismrevisiting-stale-

counterterrorism-lawp25742]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3442

Narco-Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector[Complete article is available here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Mexicos Cartels Move Into Extortion

At a construction site of an apartment building in the heart of the Mexican capital a company engineerruns through his weekly payroll sheet He has salaries written out for carpenters bricklayers andelectricians At the bottom of the sheet is a notation of $200 for ldquosecurity servicesrdquo next to a nicknameldquoEl Indiordquo mdash the Indian [Complete article is available here

httpwwwtucsonsentinelcomnationworldreport090611_mexico_cartels_bribesmexicos-cartels-move-into-extortion ]

Seven Die In Mexican Pacific Port City

Latin American Herald Tribune

Seven people died in separate shootings in Mazatlan a port city in the northwestern Mexican state of Sinaloa with some of the incidents drug-related a police spokesman told Efe [Complete article is available herehttpwwwlahtcomarticleaspCategoryId=14091ampArticleId=423061]

Tijuana Violence Slows As One Cartel Takes Control

BorderlandBeatcom

Mexicos famously seedy border city of Tijuana is enjoying a lull in drug murders as the countrys mostpowerful cartel gains the upper hand over its rivals [Complete article is available here httpwwwborderlandbeatcom201109tijuana-violence-slows-as-one-cartelhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3542

Network Notes| back to top |

Canadian data foreign threats Spying in the digital age (Suggested by a reader in Lithuania ndash thanks) Globe and Mail | By Colin Freeze 31 July 2010

A government spy agency thatrsquos prohibited from monitoring Canadian citizens is now usingldquoinformation about Canadiansrdquo to zero in on foreign threatsThe ambiguous statement found in a new government report detailing the activities of CommunicationsSecurity Establishment Canada could sanction a range of intelligence-gathering activities ndash includingthe controversial practice of mining ldquometadatardquo from digital communications

Metadata ndash often called data about data ndash are found in e-mails and their attachments and containdigital signatures that can reveal when where and by whom documents were created

The collection of metadata has caused controversy in other countries but never in Canada wherethe Communications Security Establishment Canada operates as an ultra-secretive agency About theonly thing that is known about the classified practices is that they were halted and resumed after someldquomajor changesrdquo including directives signed by Defence Minister Peter MacKay

ldquoI cannot comment on specific operational activitiesrdquo Adrian Simpson a CSEC spokesman toldThe Globe He stressed that reviews upheld that the activities in question were ldquocarried out inaccordance with the law ministerial requirements and CSECrsquos policies and proceduresrdquo

ldquoCSEC is prohibited from directing its activities at Canadians anyone in Canada or Canadiansanywhere in the worldrdquo he said

For decades signals-intelligence agencies in the West have been allowed to safeguard nationalsecurity by eavesdropping on foreignersrsquo conversations Spies can whatever phone lines and satellitesignals they can so long as they never listen in on fellow citizens

But in the digital age governments run increasingly sophisticated dragnets scooping up andscouring through millions of intercepted Internet conversations daily Such practices create legalambiguities

ldquoThe whole issue of what constitutes boundaries for signals-intelligence agencies in cyberspaceis a big debate right nowrdquo said Rafal Rohozinski a security expert affiliated with the University of Torontorsquos Munk School

A watchdog agency that reviews the CSECrsquos activities released an annual report to Parliament onJuly 20 ldquoWhen other means have been exhausted CSEC may use information about Canadians when it

has reasonable grounds to believe that using this information may assist in identifying and obtainingforeign intelligencerdquo it reads

Sometimes collecting metadata is relatively benign It can involve aggregating sets of data tospot trends much like the way meteorologists discern national forecasts from localized information

For example while CSEC canrsquot usually monitor the communications of specific Canadian terrorsuspects it can glean insights by zooming out for big-picture patterns One way to do that MrRohozinski said would be to look at data flows between Canadian cities and Yemen where an Internet-savvy al-Qaeda offshoot works to recruit Westerners

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3642

Metadata however can be more revealing Documents that circulate on the Internet travelaround like postmarked letters marked with return addresses ndash e-mails and attachments have embeddedcodes that speak to the who where and when behind their creation

The US National Security Agency found itself mired in controversy a few years go after itskirted domestic-spying bans by secretly upholding that this sort of American metadata was fair gamedistinct from communication contents

Therersquos little to suggest the CSEC would go that far The federal agencyrsquos activities are reviewedby a watchdog body now headed by a former Federal Court of Appeal judge Robert Deacutecary appointedlast year wrote in his annual report that he was satisfied the CSEC activities in question are lawful evenif his predecessors felt them borderline

ldquoThis was the first review of these activities since hellip their resumption under new policiesrdquo thewatchdogrsquos report says It concludes that the surveillance activities are ldquoin accordance with the lawrdquo andfollow ldquomajor changes to certain policies procedures and practicesrdquo

Much of the concern arises from the possibility that CSEC could hand over metadata intelligenceto domestic law-enforcement and security agencies

As it stands the RCMP and CSIS have to develop their domestic investigations before coming toCSEC ndash usually with warrants ndash if they want specific intelligence The rules guiding handovers are strictbecause even though all agencies run surveillance operations they do so under vastly different

mandates and legal standardsThe spy agency however stood by its practicesldquoCSEC is extremely diligent when it comes to the privacy of Canadiansrdquo Mr Simpson said

[complete article is available here httpwwwtheglobeandmailcomnewsnationalcanadian-data-foreign-threats-spying-in-the-digital-agearticle2113772 ]

Cyber Attacks Against NATO Then And Now

New Atlanticist | 6 September 2011

ldquoNow that NATOrsquos Operation UNIFIED PROTECTOR over Libya is winding down it is worth

noting how few cyber incidents were directed in protest against the Alliance Certainly there was a

cyber component to the liberation of Libya but it was more about content and Internet freedom (the

most newsworthy elements here were the role of social media and the Libyan government taking largeparts of the nation offline) But compared to past history NATO cyber defenders had a relatively easy

time

ldquoNATO has not however had an easy 2011 Although there were three significant incidents we

know about none seemed to have been in direct response to operations over Libyahelliprdquo

[Complete article is available here httpwwwacusorgnew_atlanticistcyber-attacks-against-nato-then-

and-now]

The Calm Before The Storm

Foreign Policy | By Joel Brenner 6 September 2011

Cyberwar is already happening -- and its about to get much much worse A veteran cyberwarriorexplains how America can prepare itself

Revelations of wholesale electronic fraud and massive data heists have become weekly evendaily affairs A multinational electronics corporation loses personal information on more than 100million customers Cyberthieves break into an international bank counterfeit credit balances and lootATMs in four countries grabbing $9 million in just a few hours International gangs spread maliciouscode that conscripts unwitting computers into zombie armies of hundreds of thousands of similarlyenslaved machines Criminals then rent these armies called botnets as easily as you can buy a time-sharing arrangement in a beach condo No wonder the vast majority of Internet traffic is spam

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3742

Yet the loss of personal information and related criminal fraud intolerable as they are are theleast threatening face of electronic insecurity The US militarys secret network is penetratedAmericans corporate pockets are being picked clean of the intellectual property that makes the UnitedStates tick And the electricity grid that keeps the lights on and makes everything move is dangerouslyinsecure

In one remote attack on the Pentagons information systems about 10 years ago the Chinesehauled away up to 20 terabytes of information If the information had been on paper theyd have neededa line of moving vans stretching from the Pentagon to freighters docked 50 miles away in Baltimoreharbor just to haul it away Had they done so the military district of Washington wouldve become anactive theater of operations for the first time since 1865 and the Navy wouldve blockaded theChesapeake Bay But the Chinese did it electronically so who noticed

Corporate espionage by both competitors and foreign intelligence services or their surrogates isalso increasing Intelligence officials see this but cant speak openly about the specifics and Im seeingit now in my law practice The victims rarely admit it for understandable reasons Oracle whichsuccessfully sued SAP for theft of its software code was a prominent exception Google was another

When the Chinese penetrated Google in late 2009 -- yes that operation was Chinese and yes itwas done with the blessing of a member of the Politburo -- they werent after customer informationThey were after the source code that makes Google unique Nor was Google the only victim Thousands

of US and Western firms were penetrated in that affair Foreign governments -- and not only theChinese -- understand that they cannot compete with the United States militarily and politically if theycannot compete with it economically so their intelligence services want to steal its corporate intellectualproperty This is the technology that gives America its competitive edge and often it has nothing to dowith defense Ordinary companies with valuable technology are now being targeted by nation-statesThis is a new era National security and economic security have converged

The danger is not limited to the loss of technology and information however The owners andoperators of the North American electricity grid are hooking up their control systems to the Internet asfast as they can Exposing the grid to the Internet makes it marginally more efficient but it also makes itdramatically more vulnerable to disruption If you can remotely penetrate an electronic system to stealinformation you can remotely penetrate it to shut it down or make it go haywire This is why there is no

longer a meaningful difference between information security and operational security And the biggestoperational risk is the grid In contemporary society nothing moves without electricity If the grid goesout the country stops

As the Stuxnet affair demonstrated remotely engineered disruption of industrial control systemsis now a reality That episode involved the successful electronic attack on the centrifuges in the Iraniannuclear program Only a first-class intelligence agency could have pulled that off but the blueprint fordoing it -- the code itself -- is now public Many American industrial control systems run on the samekind of equipment the Iranians were using but unlike the controls on the Iranian centrifuges thecontrols on the US grid are now being connected to the Internet making them easier to disrupt Stuxnetwas a watershed there will be copycats

Other industrial control systems will also be targets Some already are Air traffic control

railroad switches and water and sewage systems are all electronically controlled now and many arevulnerable If an intruder can break into the right server electronically he can remotely shut downproduction send your goods to the wrong destination and even unlock your doors -- and delete your logentries so he leaves no record of ever having been there

The United States does not lack enemies who would attack it this way Seized al Qaedacomputers contain details of US industrial control systems In 2003 a group affiliated with thePakistani terrorist organization Lashkar-e-Taiba -- the same gang that engineered the 2008 terroristassaults in Mumbai -- plotted to attack the Australian grid Other groups conspired to attack the Britishgrid in 2004 2006 and 2009 Yet the owners and operators of the North American grid continue willy-

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3842

nilly to expose their control systems to the Internet instead of isolating and hardening it This is folly of a high order

Important conclusions for public and corporate policy follow from this vulnerable state of

affairs First cyber insecurity has operational consequences In the current and foreseeable states of technology a high degree of assurance against electronic penetration of anything connected to theInternet is not achievable Large efficient electronically connected organizations and nations aretherefore vulnerable to remotely engineered disruption as well as information theft

Second this risk cannot be eliminated -- but it can be reduced and managed As a nation theUnited States should start by isolating the grids controls from the Internet Undoubtedly there aremarginal efficiencies to be gained by seamless connectivity over a publicly accessible infrastructure butthese gains are usually exaggerated and the risk this connectivity creates is staggering The governmentand the major telecommunications carriers must also make the investment required to re-create themassive redundancies that made the wired telephone network so robust Resilience and swift recoveryshould be the goal If the consequences of cyberattacks were reduced penetration would cease to matter

Third companies that wait for the government to solve their own security problems do so attheir peril The government is broke and the IT backbone is 85 percent private so the governmentdoesnt control it The governments role in altering the status quo will be limited to setting standardsusing its purchasing power to move vendors toward better security and getting its own house in order

The government can neither secure corporate intellectual property nor protect firms against operationaldisruption

Fourth in a world in which everything cannot be protected companies must determine forthemselves what intellectual property and physical assets to isolate and safeguard Those that approachthis task seriously will quickly learn that technology is only one aspect of their insecurity and in manycases the easiest to deal with Unless technology is integrated with personnel practices and operationalsecurity it opens vulnerabilities that its users rarely understand This kind of integration requires theautomated enforcement of reasonable security policies and systematic workforce training and thatoccurs only when management the lawyers and the technologists work closely together This is an old-fashioned management challenge -- not a technological one For their part corporate boards need to takeIT security seriously and launch audits that examine how their systems are actually implemented and

used not merely how they are designed Because as the techies like to put it the weakest link in anysystem is not the silicon-based unit on the desk its the carbon-based unit in the chair Joel Brenner is author of the forthcoming America the Vulnerable Inside the New Threat Matrix of

Digital Espionage Crime and Warfare He has served as the inspector general of the National Security

Agency the national counterintelligence executive and the NSAs senior counsel He now practices law

at Cooley LLP in Washington DC

Cyberattacks Decline Slightly Symantec Report Finds

Dark Reading | 1 September 2011

Organizations worldwide are suffering damages as a result of cyberattacks but interestingly there hasbeen a slight decline in these attacks during the past 12 months according to a new report from

Symantec More than 90 percent of the more than 3300 respondents across 36 countries said theyexperienced tangible losses as a result of a hack with 84 percent reporting financial loss to the cost of abreach Around one-fifth lost at least $195000 in breaches during the past 12 months

Meanwhile Symantec attributes the unexpected bright spot of a decline in breaches toorganizations employing better cybersecurity defenses More than 70 percent of organizations sawattacks in the past 12 months a decline of 5 percent from 2010 And those that experienced anincreasing frequency of attacks dropped from 29 percent in 2010 to 21 percent this year While 100percent last year reported losses from cyberattacks 92 percent did so in 2011 The trend seemscounterintuitive given the rash of high-profile breaches this year More

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 6: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 642

Mohammadi said the government had found out about the allegations in the media The reportapparently included claims of torture such as electric shocks threats of sexual assault and physicaltorture such as the ripping out of nails in Afghan detention facilities The Afghan security agenciesstrongly reject the allegations Mohammadi said adding that international agencies including theUnited Nations had regularly visited Afghan detention facilities Following such visits they assuredauthorities of their satisfactory findings as to the situation in the prisons and compliance with humanrights standards he said hellip[Article continues herehttpnewsyahoocomafghan-government-rejects-un-torture-allegations-130001115html]

Afghan Taliban Spokesman Comments on Turkish Prisoners Release

SITE Monitoring Service | September 2011

Afghan Taliban spokesman Zabihulla remarked on the groups release of four Turkish engineers whowere held for over eight months and noted the well-treatment of the men during their detention In astatement posted on the groups website on September 6 2011 in Arabic and other languagesZabihullah argued that just as the Afghan Taliban treated these and other captives well the enemyshould treat captive fighters well also He reiterated the Afghan Talibans warning to foreign andAfghan companies not to work with the Afghan government and stated However some parties due to

their economic and political interests do not pay attention to the warnings of the Islamic Emirate andcontinue supporting the occupiers Thus the result of their violations will be the punishment and thecapture of their employees by the mujahideen

On September 4 the Afghan Taliban announced that it released four Turkish engineers whoworked for a Turkish company in the Batan area of Paktia province The release they said was basedon Islamic compassion and appreciate for Eid al-Fitr which marks the end of the holy month of Ramadan

Algeria

| back to top | Algerian Security Conference Focuses On Libya

BBC World Service | 7 September 2011

Foreign ministers from North Africa were due to meet in the Algerian capital Algiers on 7 September todiscuss ways of confronting terrorism and preventing the flow of weapons from Libya BBCWSreported High level delegations from France and the United States and diplomats from Mali Niger andMauritania were also due to attend the conference Algeria has expressed concern that arms from Libyacould fall into the hands of the north African branch of Al-Qaidah (AQIM) which has been active in theSahara and has kidnapped westerners the report noted

Algeria To Submit List Of Arms Smugglers At Conference

Le Temps dAlgerie website | Algiers in French 6 September 2011Algeria is expected to submit a list of weapons smugglers in the Sahel region to its partners in the fightagainst terrorism at the conference Algerian privately-owned newspaper Le Temps dAlgerie reportedon 6 September

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 742

Bahrain

| back to top |

Bahrain Panel 101 Activists on Hunger Strike

Associated Press | 7 September 2011

More than 100 jailed Bahraini activists mdash including doctors who treated injured protesters duringmonths of anti-government protests and crackdowns in the Gulf kingdom mdash are on hunger strike an

international panel said Wednesday The Bahrain Commission of Inquiry said in a statement that 84opposition supporters are on hunger strike in prison In addition 17 detained activists have beenhospitalized by the Interior Ministry for their refusal to eat

Hundreds of activists have been imprisoned since February when Shiite-led demonstrations forgreater rights began in the Sunni-ruled Bahrain the home of the US Navys 5th Fleet More than 30people have been killed since protests inspired by Arab uprisings began in February The five-memberpanel has been set up in June to investigate the unrest Wednesdays statement said an internationalexpert on hunger strikes will join the panel to visit the striking detainees and evaluate their condition

Medical advice will be provided and the expert will discuss the challenges of hunger strike thestatement said adding that the hunger strike started nine days ago

Among jailed activists on hunger strike are 20 doctors who are on trial in a special security court

on charges of participating in efforts to overthrow Bahrains 200-year-old monarchy Other jailedopposition supporters have joined the strike including two prominent Shiite activists Abdul Jalil al-Singace and Abdulhadi al-Khawaja They were sentenced to life in prison in June for their role inprotests The doctors trial is being closely watched by rights groups which have criticized Bahrains useof the security court that includes military prosecutors and civilians and military judges

The case against 11 health professionals was back in the special tribunal on Wednesday Noverdict is expected from the session The Bahrain Commission of Inquiry includes international judicialand human rights experts They started the probe with the consent of the Sunni rulers The commissionsfindings are expected Oct 30 Shiites comprise about 70 percent of Bahrains 525000 people but areblocked from top political and security posts[Article continues here httpnewsyahoocombahrain-panel-101-activists-hunger-strike-

112949681html]

Colombia

| back to top |

Colombias Complete Military Command Replaced

Colombia Reports

Colombian President Juan Manuel Santos announced Tuesday that the countrys entire militarycommand has been replaced amid growing concerns about increased violence by illegal armedgroups

[Article continues here httpwwwcolombiareportscomcolombia-newsnews18815-colombias-complete-military-command-replacedhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 842

Denmark

| back to top |

Family Held by Somali Pirates Released

Associated Press | 7 September 2011

Seven Danish hostages including a family with teenage children have been released by Somali piratesafter more than six months in captivity Denmarks Foreign Ministry said Wednesday The Danes -- a

couple with three children ages 12-16 and two crew members -- were captured in the Indian Ocean onFeb 24 while sailing around the world in a yacht

The seven Danes are doing well under the circumstances They are expected back in Denmark in a short time the ministry said in a brief statement It gave no details of how they were released andmade no mention of a ransom being paid No one at the Foreign Ministry was immediately available forcomment

Prime Minister Lars Loekke Rasmussen told public broadcaster DR that the Danes were on theirway back in a chartered airplane paid for by their insurance company Loekke Rasmussen said theirrelease came after a long period of negotiations Jan Quist Johansen his wife Birgit Marie Johansentheir sons Rune and Hjalte and daughter Naja were captured along with the two adult Danish crewmembers when their 43-foot yacht was seized by pirates The Johansens are from Kalundborg 75 miles

west of Copenhagen They set out on their round-the-world journey in 2009 Of course it is verycheerful news said Ole Meridin Petersen chairman of the Kalundborg yacht club where Jan QuistJohansen was a member I can imagine that the hostages after their release need quite a lot of calmMeridin Petersen told The Associated Press

The yacht was seized while the Johansens were sailing through the pirate-infested waters off EastAfrica The family very likely is aware that what they did was not so fortunate They certainly feelpretty bad about it now Meridin Petersen said Hostages are held in hot austere conditions in Somalia -- typically for many months -- before a ransom is agreed on and paid and the hijacked ships and creware released Last year a British sailing couple were released after 388 days in captivity Reportsindicated that a ransom in the region of $1 million was paid for their release Somalia hasnt had afunctioning government since 1991 one of the reasons the piracy trade has flourished hellip

[Article continues here httpwwwfoxnewscomworld20110907denmark-family-held-by-somali-pirates-since-february-releasedtest=latestnews]

France

| back to top |

Western Governments Said Protecting Intelligence Officers From Scrutiny

BBC World Service | 7 September 2011

Western governments have been accused by Europes leading human rights body of shielding theirintelligence services from accountability for serious violations BBC World Service reported on 7

September The reports author the rapporteur for the Council of Europe Dick Marty said theseviolations had occurred during anti-terrorist operations He said a licence to abduct torture or kill onlyexisted in films and dictatorships but western governments were using the notion of state security toprevent parliaments and judges from scrutinising the work of intelligence officers

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 942

India

| back to top |

Deadly Explosion Strikes Courthouse in New Delhi

New York Times | By Jim Yardley 7 September 2011

An explosion ripped through a reception area of an Indian courthouse on Wednesday morning killing atleast 10 people and wounding more than 60 others in a bombing that renewed concerns about Indiarsquos

vulnerability to terrorism It was the second bombing of the courthouse in less than four months

Relatives mourned a victim of the bombing which struck a courthouse reception area Harish TyagiEuropean PressphotoAgency

Witnesses described a chaotic scene at the Delhi High Court after the blast at 1014 am outside areception area used by litigants lawyers and visitors to enter the courthouse

ldquoIt was in shamblesrdquo said Ajay Mehrotra a lawyer who witnessed the explosion ldquoThere wastotal chaos There was blood People were running for their livesrdquo

The Indian home minister Palaniappan Chidambaram called the explosion a terrorist attack andnoted that New Delhi was already in a high state of alert with Parliament in session Mr Chidambaramsaid Indian intelligence agencies had received information in July about a possible terrorist threat to thecity which had been turned over to the local police He did not elaborate about the intelligence reportOn Thursday three people were detained for questioning by the police Reuters reported

ldquoThe bomb blast took place just outside the reception centerrdquo Mr Chidambaram said at a newsconference ldquoIt is suspected that the bomb was placed in a briefcaserdquoReuters reported that a militant terrorist group called HuJI for Harkat-ul-Jihad Islami based largely inPakistan and also Bangladesh had claimed responsibility for the attacks citing security officials

Prime Minister Manmohan Singh speaking to reporters during a visit to Bangladesh condemned

the explosion as ldquoa cowardly act of a terrorist naturerdquoldquoWe will deal with itrdquo Mr Singh said ldquoWe will never succumb to the pressure of terrorismrdquo

Indian authorities have come under renewed criticism in recent months about their preparedness toprevent terrorism Terrorist attacks are a persistent concern in India particularly in the countryrsquos rapidlygrowing cities which have endured a series of bombings in recent years

In July more than 20 people were killed in Mumbai the countryrsquos financial capital from threeblasts timed to the evening rush hour That attack raised painful memories of the bloody November 2008attacks on Mumbai in which militants trained in Pakistan swept through luxury hotels a railway stationand a Jewish center in a rampage that left more than 160 people dead

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1042

Wednesdayrsquos attack at the Delhi High Court exposed anew the weaknesses in the courthousersquossecurity In May a smaller bomb detonated near a parked car outside the courthouse causing no injuriesWitnesses told local media of seeing a black bag in flames after the blast

Rakesh Tiku chairman of the Delhi Bar Association criticized the Delhi police saying ldquothe low-intensity blast in May should have served as an eye-openerrdquo Mr Tiku said hundreds of litigants andclerks passed through the gate where the blast took place each day making it a vulnerable location ldquoTheDelhi High Court requested the Delhi police to install CCTV cameras as well as personnel to man theentrances three or four months ago but no action has been takenrdquo he said

The latest explosion occurred near Gate 5 of the High Court outside a reception center wherevisitors wait for passes to enter the building Lawyers said Wednesday was an especially busy daybecause the court heard public-interest litigation

ldquoWhat are the police doingrdquo asked Mr Mehrotra the lawyer ldquoThe lives of lawyers litigantsand judges are at stakerdquo

Another witness Brijmohan Sharma described a ldquovery loud sound the reverberations fromwhich caused me to lose my balance I got up and was surrounded by people runningrdquo He added ldquoItwas like a scene from a film People were lying on the floor with their hands cut off their legs brokenand bleedingrdquo

The last serious attacks in New Delhi took place in 2008 when coordinated blasts in a park and

in shopping areas killed more than 20 people and injured nearly 100 In those attacks the IndianMujahedeen an Islamic militant group claimed responsibility

The Delhi High Court is in the heart of the capital a short walk from the cityrsquos landmark IndiaGate Rahul Gupta a local resident said he was standing near the courthouse entrance when the groundshook from the blast throwing people onto the road outside the reception area

ldquoSecurity is one area which no one can handle in Delhi at the momentrdquo Mr Gupta said ldquoIt is thefanatical people who are creating these types of problems and trying to create panic in the publicrdquo hellip

The Indian government said that a preliminary analysis found a nitrate-based explosive withtraces of pentaerythritol tetranitrate or PETN a powerful plastic explosive often used in terror plots hellip[Article continues here httpwwwnytimescom20110908worldasia08indiahtml_r=1ampref=world]

Ten Killed In Delhi Blast

Multiple Sources

At least 10 people were killed and 65 others injured in a bomb blast outside the Delhi High Court on themorning of 7 September private Indian television channel IBN Live reported The terror strike took place in a high security area with Parliament the Prime Ministers Office and India Gate in the vicinitythe report said (CNN-IBN website New Delhi in English 07 Sep 11)

According to the website of the private Indian television channel NDT the blast went off at themain entrance to the court on Shershah Suri Road which is normally heavily guarded The bomb wentoff just before the court was about to open the report said (NDTV website Delhi in English 07 Sep 11)

Security officials were quoted by BBCWS as saying they suspected the explosives were hidden

in a briefcase that had been placed beside the desk where passes were being handed out An eyewitnesstold the BBC that it was a powerful blast shaking the ground and buildings around him (BBC WorldService 7 September 2011)

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1142

Delhi On High Alert In Wake Of Blast

Multiple Sources

The Indian capital has been put on high alert following the blast at the Delhi High Court privateEnglish-language TV news Channel Times Now reported (Times Now TV New Delhi in English0530GMT 07 Sep 11)

Hindi channel says received email from group claiming responsibility for attack Indias Hindinews channel Aaj Tak said on 7 September it had received an email claiming responsibility for the blastAccording to the report the email was sent from the ID harkatuljihadi2011gmailcom The channelsaid the police were investigating possible involvement of the Indian Mujahidin (Aaj Tak TV Delhi inHindi 7 September 2011)

Police Probe Possible Links To Al-Qaidah-Linked Group

Noida IBN Live | in English 7 September 2011

Police in Delhi are looking into claims that a Pakistan-based militant group linked to Al-Qaidah theHarkat-ul-Jihad Islami (HUJI) may have been involved in the attack Noida IBN TV reportedAccording to the report in an e-mail sent to a media house HUJI claimed it had carried out the attack inretaliation for the death sentence issued against Afzal Guru the man found guilty of involvement in an

attack on Delhis parliament almost ten years ago We owe the responsibility of todays blasts at highcourt delhi our demand is that Afzal Gurus death sentence should be repealed immediately else wewould target major high courts amp THE SUPREME COURT OF INDIA the e-mail read According tothe report it was sent from the id harkatuljihadi2011gmailcom

Home Minister Announces Probe Into Attack

CNN-IBN website | New Delhi in English 7 September 2011

Indian Home Minister P Chidambaram speaking in parliament said that investigators did not yet knowwho was behind the attack but he blamed it on terrorists seeking to destabilise the country He saidthat the National Investigative Agency (NIA) would carry out a probe into the attack

PM Denounces Blast As Cowardly Act

Doordarshan news website | New Delhi in English 7 September 2011

Prime Minister Manmohan Singh on 7 September described the blast outside the Delhi High Court as acowardly act and urged all political parties to unite and tackle any acts of terrorism state-run Indiantelevision channel DD News reported This is cowardly act of terrorist nature We will deal with it Wewill never succumb to the pressure of terrorism Singh said He said this is a long war in which allpolitical parties all the people of India have to stand united so that the scourge of terrorism is crushed

IED Explosion At Delhi High Court Domestic Islamists Likely Culprits Growing Signs Of Jihadist Agenda

Sterling-Assynt | 7 September 2011

An IED placed inside a briefcase exploded at 1017AM at an entrance to Delhi High Court wherelitigants collect their visitor passes Wednesdays are reserved for public-interest litigation and so thearea was crowded It is likely that the briefcase was placed in the queue at reception before visitors passthrough security checks There is reportedly no CCTV coverage in this area which will makeidentification of the perpetrator difficult

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1242

The blast was of at least medium intensity and created a crater between three to four feet deepAt least eleven people have died and 65 others have been injured ndash a toll that would probably have beenhigher if an international group had been responsible There were no other explosions which has thesame implication Mumbai has been placed on high alert following the attack especially as the HomeMinistry reported in August that coastal cities were under threat from pan-Islamic terror groups Noblame has yet been assigned A minor explosion occurred on 25 May (also a Wednesday) in a car-park near the Court That bomb was constructed using ammonium nitrate and is believed to havemalfunctioned causing no damage or injuries which suggests similar origins to this one

There are reports of an email from Harkat-ul-Jihadi al-Islami (HuJI) claiming responsibilityfor todayrsquos explosion but we remain sceptical about this since the group has not previously made suchclaims via email The nature of the bomb and the use of email to communicate suggest rather theinvolvement of the Indian Mujahideen (IM) Nonetheless the unverified HuJI email demands that AfzalGurursquos death sentence be repealed and this may point towards the involvement of a jihadist agendaGuru was involved in the December 2001 Parliamentary attacks in Delhi and had his mercy petitionrejected by the Home Ministry on 10 August

Todayrsquos incident indicates an increase in successful attacks by local groups A robust securityforce campaign following the 2008 Mumbai attacks diminished the capabilities of groups such as IMThey claimed responsibility for the December 2010 Varanasi bomb blast which killed one and injured

twenty people However IMrsquos likely involvement in the July 2011 blasts in Mumbai and the attack todaypoints towards the rebuilding of its capabilities and possibly also the establishment of closer ties with jihadi groups

We do not expect a spate of attacks to follow imminently but such incidents will continue tooccur possibly on a larger scale as IM continues to regroup following the security clampdownDevelopments in the cases of Afzal Guru and Ajmal Kasab (the surviving gunman from 2008) willprovide cause for further attacks Given a recent warming in relations between India and Pakistan theHigh Court attack will be unlikely to raise tensions between the two countries significantly

Indonesia

| back to top |

Islamic Groups Continue To Harass Religious Minorities Government Silence Further

Encourages Attacks Youths Beaten In East Jakarta

Assynt SEAsia Vol VIII No17 | 7 September 2011

Hard-line Islamic groups continued to intimidate religious minorities without any response from theGovernment at either a local or national level Yudhoyono relies on the support of Islamic parties inParliament and is unlikely to take any decisive action against such incidents This will further encourageradical groups and endangers the countryrsquos reputation for religious tolerance

Three youths were beaten by members of the Islamic Defenders Front (FPI) for allegedly beingdrunk The attack took place in Jakartarsquos business district but it remains unlikely that the FPI will targetforeigners and the security forces will not tolerate any threats to business interests Nonetheless such

incidents highlight a worrying trend towards increasingly hard-line behaviour that remains unchecked bythe Government

We previously reported that the light sentences handed down for the killing of three members of the Ahmadiyah sect will embolden radical groups (see our Report of 3 August) In this period theIslamic Reform Movement (Garis) coerced Ahmadi youths in Cianjur West Java to join mainstreamprayers The Ahmadiyah sect meanwhile was banned from conducting religious activities during theEid holidays by the South Sulawesi administration for fear of provoking violence

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1342

Iran

| back to top |

Two Arrested Al-Qaidah Members Iraqi Three Iranian - Iran Official

ISNA website | Tehran in Persian 7 September 2011

The public prosecutor of Irans Kerman Province Yadollah Movahhed has announced the start of aninvestigation into the case of five people arrested on charges of having links to Al-Qaidah the IranianStudents News Agency (ISNA) reported on 7 September Two of the detainees - arrested on 19 August -are Iraqis and the other three are Iranian nationals Movahhed told ISNA in an interview on 7 SeptemberThe prosecutor said the detained people are accused of carrying illegal arms and munitions and addedthat an investigation is ongoing into the possibility that they were members of a larger group

Israel

| back to top |

Israel Uncovers Planned Hamas Bombing Spree On Israelis

Xinhua | 8 September 2011

Hamas cells operating in the West Bank routed between May and AugustThe Israeli security agency Shin Bet has broken a network of Hamas cells operating in the West Bank and planning a series of attacks against Israeli targets local media reported Wednesday Dozens of

Hamas members comprising 13 militant cells were arrested throughout the West Bank between May andAugust Army Radio reported One of the groups has carried out a bombing attack at the entrance toJerusalem in March in which a British woman was killed and several dozen civilians wounded Anothercell had planned to dispatch a suicide bomber to Jerusalems Pisgat Zeev neighborhood on Aug 21 Theattack was thwarted at the last minute by Shin Bet agents assisted by the Israel Defense Forces (IDF)and police according to Army radio Other groups were in various stages of planning and preparingattacks including bombings and the kidnapping of civilians or soldiers for the release of Palestinians jailed in Israel The Shin Bet concluded based on its interrogations of the group members that theHamas military leadership in Gaza and abroad is exerting considerable efforts to rehabilitate itspresence in the West Bank with financing and weapon smuggling The West Bank has remainedrelatively quiet in recent years Israeli officials attributed the success in preventing violence in the area

to the cooperation between the IDF and the Palestinian National Authoritys security forces

Israeli Air Strike Kills One Gaza Militant

Xinhua | 8 September 2011

Strike follows more rocket launches from Gaza warnings of new battlesAn Israeli air strike killed an Islamic Jihad militant and wounded three others in the central Gaza

Strip town of Dier a-Balah witnesses and medical sources said Local witnesses said the militant diedafter his car was hit by a missile adding that three other people were also wounded The condition of theinjured is stable hospital sources said Earlier Wednesday an Israeli military spokesperson said a rocketwas launched from the Gaza Strip into south Israel adding the projectile landed in an open area and didnot cause injuries or damage None of the Palestinian armed factions has claimed responsibility for the

rocket attack Late on Tuesday a Palestinian militant was killed and two others injured when Israeliwarplanes targeted a group of gunmen east of Khanyounis City south of the Hamas-ruled Gaza Strip

The Gaza Strip witnessed an escalation of bloody violence between Israel and Gaza militantgroups in August leaving 26 Palestinians and three Israelis killed The violence was triggered after eightIsraelis were killed in well-coordinated operation in the Red Sea city of Eilat Israel accused Palestinianmilitants of plotting and carrying out the attack which started from the bordering Sinai Peninsula inEgypt

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1442

Libya

| back to top |

Libyan Extremist Britain Allowed To Stay Was Link To Al-Qaeda In Iran Papers Show

The Daily Telegraph | (London) By Richard Spencer Tripoli

The extremist Ismail Kamoka spent several years sending funds to terrorist groups across the Middle East

An Alleged Libyan extremist who sought political asylum in Britain regularly travelled to Iran from2002 to provide forged documents to extremists linked to al-Qaeda secret files found in a Tripoliintelligence service building have disclosed

The documents seen by The Daily Telegraph unearth British intelligence suspicions about linksbetween Iran and al-Qaeda dating back almost a decade Other details to come out of the documentssent by MI6 and found in the office of the former head of foreign intelligence and later foreign ministerMoussa Koussa who defected in March include the revelation that Britain had begun co-operating withthe Chinese security services on Islamic extremists The extent of Iranian co-operation with al-Qaedahas been disputed in intelligence communities though Iranians are thought to have provided weaponsand explosives to the Taliban in Afghanistan

A number of al-Qaeda operatives including members of the family of Osama bin Laden fled toTehran after the fall of the Taliban in Afghanistan and their precise status in Iran has been unclear Thepapers in Libya do not directly challenge the Iranian government but suggest that al-Qaeda operativeshad more freedom of movement there than previously thought The extremist Ismail Kamoka spent

several years sending funds to terrorist groups across the Middle East including some linked to al-Qaeda the files said Mr Kamoka who had been given indefinite leave to remain in Britain afterarriving from Saudi Arabia in 1994 and claiming asylum travelled from the UK to Iran viaSwitzerland in July 2002 according to one document[Article continues herehttpwwwtelegraphcouknewsworldnewsafricaandindianoceanlibya8740771Libyan-extremist-Britain-allowed-to-stay-was-link-to-al-Qaeda-in-Iran-papers-showhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1542

Nigeria

| back to top |

Bomb Explodes In Violence-Torn Nigerian City Residents

AFP | 6 September 2011

A bomb went off Tuesday in Nigerias northeastern city of Maiduguri disrupting a three-week lull inbombings in the violence-torn city local residents said [Article continues here httpnewsyahoocombomb-explodes-violence-torn-nigerian-city-residents-215718081html]

Pakistan

| back to top |

Pakistan Bans Foreign Travel For Those Involved In Bin-Ladin Probe

The News website | Islamabad in English 7 September 2011

A Pakistani commission investigating the circumstances surrounding the killing of Al-Qaidah chief Usamah Bin-Ladin has banned foreign travel for everyone involved in the probe Pakistani daily TheNews part of the Jang group which owns Geo TV reported on 7 September The paper recalled that thecommission had already directed the countrys interior ministry and the intelligence service ISI toensure that the Bin-Ladin family was not repatriated from Pakistan without the consent of the

commission

More Than 20 Killed In Two Suicide Blasts In Pakistans Quetta

Express247 TV | Lahore in English 5 September 2011

At least 22 people were killed and several others injured in two explosions in the south-westernPakistani city of Quetta on 7 September the website of the Dubai-based private Pakistani TV channelARY News reported According to the channel one blast went off near the residence of the FrontierConstabulary and another one near the commissioner office in Quetta According to the report around100 kilograms of explosives were used in each attack (ARY News website Dubai in English 07 Sep 11)

Private Pakistani English-language TV channel Express 247 carried a series of onscreen scrollswhich said police had confirmed that the two blasts were suicide attacks The report cited police sources

as saying that 25 people were killed and more than 40 injured in the attacks (Express247 TV Lahorein English 0654GMT 07 Sep 11)

BBCM notes that the attacks came after the Pakistani intelligence agency said on 5 August that ithad arrested Al-Qaidah commander Younis Al-Mauritani and two of his accomplices in Quetta

Taleban Say Quetta Blasts Revenge For Recent Al-Qaidah Arrests

AFP | 7 September 2011

The Pakistani Taleban have claimed responsibility for the twin suicide bombs in Quetta on 7 Septembersaying they were carried out to avenge the recent arrests of Al-Qadiah operatives in the city Wecarried out the attacks Taleban spokesman Ehsanullah Ehsan told AFP in a phone call from anundisclosed location

Twin Suicide Bombings In Pakistan Leave 23 Dead

Miami Herald

Twin suicide bombers attacked the home of a senior military officer Wednesday in the western city of Quetta injuring him and killing at least 23 people officials said in a possible revenge attack forPakistans recent arrest of a senior al Qaida commander [Article continues here httpwwwmiamiheraldcom201109072394264twin-suicide-bombings-in-pakistanhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1642

Philippines

| back to top |

Moro Splinter Group Threatens US Soldiers In Philippines But Capabilities Limited

Government-Rebel Negotiations Remain Difficult

Assynt | SEAsia Vol VIII No17 7 September 2011

Ameril Umbra Kato a former senior Moro Islamic Liberation Front (MILF) field commander whoresigned late last year because he rejects peace negotiations has threatened to attack US troops as wellas Filipino security forces and other Government targets US and Filipino troops are currentlyundertaking joint training exercises This is an annual event but the first time they have been conductedin central Mindanao However Katorsquos splinter group the Bangsamoro Islamic Freedom Fighters (BIFF)is believed to have as few as 200 members with generally unsophisticated weapons ConsequentlyBIFFrsquos ability to conduct an attack on US forces is likely to be limited

In this period Kato announced the creation of a political wing to his grouping the BangsamoroIslamic Freedom Movement emphasising his split with MILF Nevertheless he has not been expelledfrom MILF and so is protected by the current ceasefire with Manila though MILF has stronglycondemned Katorsquos threat against US troops It is possible that MILF leadership is content to allow himto operate relatively unimpeded in order to gain greater leverage in its negotiations with theGovernment since they can contrast their more compromising approach with BIFFrsquos threatened

violence Meanwhile negotiations between MILF and the Government continue MILF dismissed theGovernmentrsquos latest proposal for an autonomous region but both sides appear committed to continuingtalks

Russia

| back to top |

Suicide Bombings In Grozny Demonstrate Islamic Insurgencyrsquos Continuing Capabilities In

Chechnya

Stirling Assynt Reports | Report FSU Vol IV No17 7 September 2011

A series of suicide bombings in the Chechen capital on 31 August (which left nine casualties includingseven police officers) has severely undermined President Ramzan Karydovrsquos claims to have successfully

eradicated the Islamic insurgency in the Republic The first suicide bomber reportedly detonated hisexplosives in a densely populated area only 150 metres from a local Parliament building while twofurther jihadists targeted first-response units Significantly the attack occurred during the Muslimholiday of Eid a three day celebration which marks the end of Ramadan during which the risk of jihadist attacks is heightened Indeed in addition to this strike in Grozny jihadist militants carried outfurther attacks in Iraq Nigeria and Algeria during Eid this year

Although no group has claimed responsibility for this incident it bears the hallmark of theCaucasus Emirate and so was likely orchestrated by the grouprsquos newly appointed deputy KhuseynGakayev and his brother Vadalov Indeed the Gakayev brothers are believed to have been behind theattack on the Chechen Parliament in October 2010 demonstrating the grouprsquos capabilities and intent tocarry out such strikes Moreover the timing of these bombings ndash only two months after the

reconciliation of the Caucasus Emiratersquos leader Doku Umarov with Chechen commanders (see our 3August Report) ndash supports this assessment and suggests that further incidents and suicide bombings arelikely given this truce

Suspected Militant Killed In Russias Southern Republic

Interfax news agency | Moscow in Russian 7 September 2011 Russias National Antiterrorist Committee said on 7 September a militant had been killed in the Republicof Kabarda-Balkaria the corporate-owned Russian news agency Interfax reported

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1742

Saudi Arabia

| back to top |

Saudi Arabia Shopping Around For Nuke Technology

Haaretz | 8 September 2011

Ties with Pakistan may remain close as Riyadh seeks nuclear assistanceSynopsis This week brought news that Iran on its own has produced new advanced nuclearcentrifuges According to a report of the International Atomic Energy Agency Iran has begun to installthe centrifuges in its uranium enrichment facility in Natanz But the high-level source noted thatdevelopment and production of the new centrifuges began more than seven years ago That does notspeak of a great technological capability on Irans part Israeli intelligence like its American counterpartviews 2014 or 2015 as the date when Iran will be able to build nuclear weapons says the source - if itwants to and no one blocks it In Saudi Arabia in contrast they are a bit more disturbed by thedevelopments in Iran An American Department of Energy delegation visited Riyadh and met with DrHashim Yamani who heads the King Abdullah City for Atomic and Renewable Energy Saudi Arabiawants to equip itself with nuclear reactors to generate electricity The United States is interested inselling Riyadh reactors for two reasons - fat contracts and the ability to keep close tabs on nucleardevelopments in Saudi Arabia The American administration is concerned that with a nuclear programfor civilian uses Saudi Arabia would actually like to prepare the infrastructure so it could switch to

producing nuclear weapons relatively quickly should Iran possess such weapons Defense ministerSultan Bin Abdul Aziz and the countrys former intelligence chief Turki Bin Faisal reportedly favorthe preparation of a secret nuclear program for military uses in cooperation with a Sunni Muslim ally -Pakistan which possesses dozens of atomic bombs Saudi Arabia reportedly funded Pakistans nuclearweapons program in return for Pakistans promise to aid the monarchy in this area if need be

Serbia

| back to top |

Serbia Threatened By Terrorism Says Dacic

Tanjug | 8 September 2011

US officials warned Serbia of possible terrorist activity particularly against foreign interests

After a warning coming from USA officials Serbia will raise the level of security in all facilitiesbelieved to be a possible target of terrorists the countrys Deputy Prime Minister and Minister of InteriorIvica Dacic stated Wednesday in the Palace of Serbia He stated that the security measures will primarilyrefer to the facilities of foreign countries in Serbia and added that special attention will be paid to thesecurity of air traffic US officials assume that there is a possibility of new terrorist attacks in the USAand other countries including Serbia Dacic said following a meeting with Special Representative of the UN Secretary-General for Disaster Risk Reduction Margareta Wahlstrom in Belgrade and a sessionof the republic headquarters for emergency situations

Somalia

| back to top |

Six Killed In Mortar Attack In Somali CapitalShabeelle Media Network website | Mogadishu in Somali 7 September 2011

Six people were killed and several others injured after three mortars landed in Mogadishus Arjantiinneighbourhood in Kaaraan District on the night of 6 September the privately-owned Shabeelle websitereported It quoted an eyewitness as saying that two of the three mortars fired have caused thecasualties inflicting fear in the residents who returned to their homes after Al-Shabab vacated the areaearly last month Kaaraan District is one of the areas taken over by the government forces and AUpeacekeepers

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1842

United States

| back to top |

Post-911 Intelligence Reform Takes Root Problems Remain

Reuters | 8 September 2011

US intelligence agencies will forever be scarred by their failure to connect the dots and detect theSeptember 11 plot but a decade later efforts to break down barriers to information-sharing are takingroot Changing a culture of need-to-know to need-to-share does not come easily in spy circles Someofficials say they worry a decade later about a future attack in which it turns out that US spy agencieshad clues in their vast vaults of data but did not put them together or even know they existed

Yet significant changes both big and small have broken down barriers between agenciessmoothed information-sharing and improved coordination US intelligence experts say From issuing ablue badge to everyone working in the sprawling intelligence community to symbolize a commonidentity to larger moves of mixing employees from different agencies the goal is singular -- to preventanother attack

Were much further ahead David Shedd Defense Intelligence Agency deputy director said of the ability to connect the dots compared with 10 years ago Still signs of a plot to attack the UnitedStates could be missed again My worst fear and I suspect probably one that would come true is that inany future would-be or actual attack God forbid we will be able to find the dots again somewhere

because of simply how much data is collected Shedd said The political response to the failure to stopthe attack was the 2002 creation of the Department of Homeland Security pulling together 22 agenciesto form the third largest US Cabinet department behind the Pentagon and Veterans Affairs

That was followed by the creation in late 2004 of the Director of National Intelligence to overseeall the spy agencies as recommended by the bipartisan 911 commission Previously the CIA directorheld a dual role of also overseeing the multitude of intelligence agencies But in the aftermath of the2001 attacks policymakers decided that was too big of a job for one person to do effectively

Critics argued then and now that the reforms were the governments usual response to crises --create more bureaucracy But others see much-needed change It has been a tremendous improvementsaid Lee Hamilton who was the 911 commission vice chair Its not seamless there are problems andweve still got a ways to go The 2001 attacks involving airliners hijacked by al Qaeda operatives killed

nearly 3000 people in New York Pennsylvania and the Pentagon Various US intelligence and lawenforcement agencies had come across bits of information suggesting an impending attack but failed toput the pieces together The CIA had information about three of the 19 hijackers at least 20 monthsbefore the attacks the National Security Agency had information linking one of the hijackers with alQaeda leader Osama bin Ladens network the CIA knew one hijacker had entered the United States butdid not tell the FBI and an FBI agent warned of suspicious Middle Eastern men taking flying lessons

Have the reforms made America safer Officials say yes and point to the US operation thatkilled bin Laden in Pakistan in May that demanded coordination among intelligence agencies and themilitary But there is an inevitable caveat no one can guarantee there will never be another attack onUS soil On Christmas Day 2009 a Nigerian man linked to an al Qaeda off-shoot tried unsuccessfullyto light explosives sewn into his underwear on a flight to Detroit from Amsterdam It turned out US

authorities had pockets of information about him President Barack Obama used a familiar September 11phrase to describe the 2009 incident as a failure to connect the dots of intelligence that existed acrossour intelligence community

Roger Cressey a former White House National Security Council counterterrorism officialresurrected another September 11 phrase It was a failure of imaginationThe intelligence community had not seen al Qaeda in the Arabian Peninsula a Yemen-based al Qaedaoff-shoot as capable of striking the US homeland If the underwear bomber threat had originated inPakistan they would have gone to battle stations immediately Cressey said Some proposed changesin how authorities would respond to another successful attack still are pending For example creation of

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1942

a common communication system for police firefighters and other emergency personnel remainstangled up in political wrangling in Congress over how to implement it This is a no-brainer Hamiltonsaid The first responders at the scene of a disaster ought to be able to talk with one another Theycannot do it today in most jurisdictions

Former leaders of the 911 commission issued a report card saying nine of its 41recommendations remain unfinished The Office of the Director of National Intelligence hasexperienced growing pains as overseer of the 17 spy agencies churning through four chiefs in six yearsTensions over turf confusion about the DNIs role and problems herding agencies with very powerfulchiefs of their own all came to a crescendo when retired Admiral Dennis Blair the third DNI tried toassert authority over CIA station chiefs who represent the agency in different countries The positionof chief of station is one of the crown jewels of the CIA and they dont want anyone playing with theircrown jewels said Mark Lowenthal a former senior US intelligence official

After a dust-up with CIA Director Leon Panetta who now is defense secretary it was Blair whowas sent packing I think the mistake that some have made is to have viewed the DNI and the Directorof CIA as an eitheror proposition rather than the power of the two working together the DIAs Sheddsaid in an interview in his office There is a history of where that hasnt worked so well I believe it isworking much better today said Shedd who has worked at the DNI CIA and National SecurityCouncil

Intelligence experts say in the current administration Obamas top homeland security andcounterterrorism adviser John Brennan arguably has more power than any of them because he has thepresidents ear Its a reminder that bureaucratic reform or no personalities count in making nationalsecurity policy The improved sharing of secret data has led to yet another set of problems The delugeof bits and bytes has subjected intelligence analysts to information overload as they try to sift through itall for relevant pieces Our analysts still are spending way too much time on finding the informationrather than on the analysis of the information Shedd said There is just too much data to go find it all

The intelligence community wants a system developed that would automatically processinformation from multiple agencies and then make the connections for the analysts

But greater inroads into sharing data across agencies does not guarantee that another attack willbe averted The threat has evolved and officials now are increasingly concerned about a lone wolf plot

by an individual not tied to any militant group that may be more difficult to uncover Those threatswill not come to our attention because of an intelligence community intercept said John Cohen asenior Department of Homeland Security counterterrorism official

They will come to our attention because of an alert police officer an alert deputy sheriff analert store owner an alert member of the public sees something that is suspicious and reports it Cohensaid One measure of the success of post-911 reforms is that a decade later the United States has not hada similar attack Now that could be luck that could be skill we dont really know Hamilton said Butin all likelihood what we have done including the establishment of the Department of HomelandSecurity and the transformation in intelligence and FBI has certainly been helpful[Article continues here ]httpnewsyahoocompost-9-11-u-intelligence-reforms-root-problems-052514320html

Comment the value added provided by the Office of the DNI remains an open question for many withinthe Intelligence Community (IC) and is a favored theme of corridor discussion in IC-member agenciesOn the other hand there is broad agreement among intelligence officials that the degree of cooperationand coordination between intelligence agencies and the character of intelligence sharing has vastlyimproved The fact that there has not been a successful major attack on US soil since 911 ndash not forlack of plotting ndash is in great part testimony to this more effective cooperation

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2042

Jihadist Suggests Striking New York City Bridges

All SITE Intelligence Group | 6 September 2011

A jihadist pointed to what he found to be a weak point of suspension bridges and directed his messageto those who love blasting and explosions In a message posted on the Shumukh al-Islam forum onSeptember 6 2011 the jihadist Abu Suleiman al-Nasser gave a picture of the Verrazano Bridge inNew York on which he drew a red box and arrow on the bridges center He then gave a map on whichhe circled the various bridges in New York City and its boroughs A fellow jihadist offered his ownidea giving a picture of the Hoover Dam and explaining that there is no target more important thandams He wrote that striking a dam may lead to the submerging of cities and the killing of thousands of people and in the case of the Hoover Dam would impact Las Vegas the capital of gambling anddebauchery

Counterterror Veteran is New Deputy FBI Director

Atlanta Journal Constitution | 1September2011

A 24-year FBI veteran with extensive counterterrorism experience Sean Joyce has been named the lawenforcement agencys new deputy director Elevated to the No 2 post within the FBI by Director RobertMueller Joyce replaces Timothy Murphy who is retiring after 23 years with the bureau Since last yearJoyce has been executive assistant director of the national security branch responsible for the FBIs

national security and intelligence operations He earned the Attorney Generals Award for ExceptionalService in 2004 for work on a counterterrorism squad in Dallas In 2008 he was named chief of thecounterterrorism divisions international terrorism operations section with responsibility forinternational terrorism matters within the United States hellip[Complete article is available here httpwwwajccomnewsnation-worldcounterterror-veteran-is-new-1153018html]

Top CIA Official Obama Changed Virtually Nothing

Salon | 1 September2011

PBSs Frontline is airing an examination of Top Secret America on September 6 The show includes arare and lengthy interview with 34-year-CIA-veteran John Rizzo who is described as the most

influential lawyer in CIA historyHere is one quote they include from Rizzo With a notable exception of the lsquoenhanced

interrogationrsquo program the incoming Obama administration changed virtually nothing with respect toexisting CIA programs and operations Things continued Authorities were continued that wereoriginally granted by President Bush beginning shortly after 911 Those were all picked up reviewedand endorsed by the Obama administration hellip[Complete article is available herehttpwwwsaloncomnewspoliticsbarack_obamastory=opiniongreenwald20110901obama]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2142

General Counterterrorism News| back to top |

The Terrible Missed Chance

Newsweek | 4 September 2011

Special Agent Harry Samit of the FBIs Minneapolis field office knew he was looking into the eyes of aterrorist It was early afternoon on Friday Aug 17 2001 Across from him sat Zacarias Moussaoui a33-year-old French-born student arrested the day before for overstaying his visa Moussaoui had paidmore than $8000 in cash that summer to sit in a cockpit simulator in a flight school in the suburbs of Minneapolis and learn - in a matter of days - the basics of how to fly a 747-400 Samit a formerintelligence officer at the Navys celebrated Top Gun flight school felt sure the man across the desk from him was a Muslim extremist who was part of a plot to hijack a commercial jetliner filled withpassengers The trick Samit wrote in a soon-to-be-released excerpt of a book hes written about thecase was getting Moussaoui to admit this and reveal details and associates to allow us to stop the plot

Surely the bureau brass in Washington would share his concern Samit thought He was wrongThat same day halfway across the country in the fluorescent-lit hallways of the J Edgar Hoover

FBI headquarters building in Washington counterterrorism supervisors were treating Samits firstreports about Moussaoui with skepticism even contempt Michael Maltbie a DC counterterrorism

specialist insisted repeatedly in the days after the arrest that there was no clear link between Moussaouiand Al Qaeda - the link needed for a warrant Maltbie thought Moussaoui was a dirty bird he latertold investigators but favored deporting him to France

Believing a hijacking might be imminent Samit appealed to his boss in Minneapolis SpecialAgent Greg Jones Jones picked up the phone on Aug 27 and called Maltbie at FBI HQ

Moussaoui he said might be part of a plot to get control of an airplane and crash it into theWorld Trade Center or something like that

Maltbie scoffed You have a guy interested in this type of aircraft Maltbie replied accordingto FBI documents That is it (Maltbie declined requests for an interview)

At least Maltbie was paying attention Michael Rolince who ran the FBIs InternationalTerrorism Operations Section was arguably the bureaus most important go-between with the White

House on domestic terrorist threats in the summer of 2001 He tells Newsweek he spent less than 20seconds being briefed on the Moussaoui case that August His office was inundated with terrorismprobes he said since Moussaoui was in custody already he posed no immediate threat Did it rise tothe level of something that I would take upstairs Rolince asks The answer is no

At CIA headquarters alarm bells were ringing loudly CIA Director George Tenet was briefedon Moussaoui within days of the arrest receiving a paper with the eye-catching headline IslamicExtremist Learns to Fly But the FBIs acting director that summer and the bureaus most seniorcounterterrorism official were left in the dark[Article continues here httpwwwthedailybeastcomnewsweek20110904the-terrible-missed-chancehtml]

Pan Am Flight 103 - Lockerbie Bombing - al-Megrahi CIA FilesWebwire | 31 August2011

BACM ResearchPaperlessArchivescom has announced the publishing of CIA files related to the PanAm Flight 103 Lockerbie Bombing

The files can be downloaded at no cost at httpwwwpaperlessarchivescompanam103ciahtml The files date from 1984 to 1999 These are the most recent files on Pan Am 103 released by the

CIA This set of files is unique because it includes memos on the direct handling of an intelligencesource This type of information is exempt from the Freedom of Information Act (FOIA) and is not oftenreleased by the Agency

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2242

The files cover information received by the CIA on Abdel Basset al-Megrahi Al-Megrahi is theonly person ever convicted in the Pan AM 103 case The Scottish government in 2009 allowed al-Megrahi to be released from custody and returned to Libya because of his failing health With the recentfall of Muammar Qaddafis regime there have been renewed calls for al-Megrahi to be returned toScottish custody or extradited to the United States and put on trial[Complete article is available here httpwwwwebwirecomViewPressRelaspaId=144692]

Getting The Caucasus Emirate Right

CSIS | August 2011

ldquohellipThis report aims to set straight a rather distorted record It demonstrates the veracity of three vitallyimportant facts usually obfuscated in discussions of the subject (1) the longstanding and growing tiesbetween the CE and its predecessor organization the ChRI on the one hand and al Qaeda (AQ) and theglobal jihad on the other hand (2) the importance of the CE jihadi terrorist network as a united andorganized political and military force promoting jihad in the region and (3) the salience of local culturaland the Salifist jihadist theo-ideology and the influence of the global jihadi revolutionarymovementalliance as key if not the main factors drive the ldquoviolence in the North Caucasusrdquohelliprdquohttpcsisorgfilespublication110829_Hahn_GettingCaucasusEmirateRt_Webpdf

7 Things You Didnrsquot Know About the War on TerrorForeign Policy | By Eric Schmitt and Thomas Shanker 6 September 2011

From an attempt to negotiate with Osama bin Laden to a proposal to threaten to bomb Mecca its been awild decade for the US national security establishment

Our new book Counterstrike The Untold Story of Americas Secret Campaign Against Al Qaeda is in many ways asummary of the past decade of our reporting on the military intelligence community and domestic law enforcement as itentered a new era of Darwinian evolution to counter violent extremism

It also is our deep dive into a decade of American counterterrorism efforts -- from the work of commando trigger-pullers and spies on the ground up to senior political leaders who wanted to defendthe nation (and get re-elected) Our efforts to report and write this book allowed us to uncover many newmissions never discussed before -- and gave us an understanding of how the war on terror had changedover the last decade

Our book assesses the 10 years since 911 as the military divides the fight into tactical missionson the battlefields of modern terrorism then the operational advancements that provided the means tosuccess while not securing final victory and at the top the strategic level of policy debates about howthe nation should combat this threat to its security

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2342

Here are seven vignettes from Counterstrike that offer glimpses into the thinking of policymakers andcommanders in early days after the Sept 11 attacks and how that thinking evolved over the followingdecade into a more whole-of-government approach to combating terrorists

1 Bush Tried to Negotiate with al Qaeda

The George W Bush administration like all of its predecessors swore never to negotiate with terroristsBut it did undertake an extraordinary and extraordinarily secret outreach effort to open a line of communication with Osama bin Laden and al Qaedas senior leadership It was an attempt to replicatehow the United States tried to sustain a dialogue with the Soviet Union even during the darkest days of the Cold War when White House and Kremlin leaders described in private and in public a set of acceptable behaviors -- and described with equal clarity the swift vicious even nuclear punishment forgross violations

In the months after the Sept 11 attacks Bushs national security staff working through theintelligence agencies made several attempts to get a private message to bin Laden and his inner circleThe messages were sent through business associates of the bin Laden familys vast financial empire aswell as through some of the al Qaeda leaders closest relatives a number of whom were receptive toopening a secret dialogue to restrain and contain their terrorist kinsman whom they viewed as a blot on

their name (To be sure other relatives were openly hostile to the American entreaties)According to a senior American intelligence officer with first-hand knowledge of the effort the

response from Osama bin Laden was silence And the effort was suspended

2 Sometimes a Wedding Is Just a WeddingIn the early days after the Sept 11 attacks the CIA and FBI vied to produce the most compellingintelligence reports that tracked suspected terrorist plots The agencies often worked at cross purposessometimes unwittingly At one point in early 2002 both agencies were tracking what American analystssaid were growing preparations for a major wedding somewhere in the Midwest (In terroristvernacular the word wedding is often code for a major attack)

Dribs and drabs on this wedding planning made their way to President Bush from bothagencies independent of each other of course

Finally over the Easter holiday during a video-teleconference with top aides in Washingtonfrom his ranch in Crawford Texas Bush stopped the briefing exasperated by the discrepancies in therival agencies reporting about the suspected threat

George Bob get together and sort this out Bush told his CIA director George J Tenet andFBI director Robert S Mueller III

Bushs instincts were correct When the analysts finally untangled their clues it turned out thatthe ominous wedding really was just that the matrimony of a young man and a young woman fromtwo prominent Pakistani-American families There was no threat There was no plot

3 The Threat to Bomb MeccaAs fears of a second attack mounted following the 911 strikes US government planners franticallycast about for strategies to protect the country Even the most far-fetched ideas had a hearing howeverbriefly In one case some government planners proposed that if al Qaeda appeared ready to attack America again the United States should publicly threaten to bomb the city of Mecca in Saudi Arabiathe holiest site in all of Islam in retaliation Just nuts one Pentagon aide wrote to himself when heheard the proposal The idea was quickly and permanently shelved

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2442

4 The SEAL Raid in Iran That Didnt HappenWhen US forces routed the Taliban government in Afghanistan and forced bin Laden and his toplieutenants to flee many senior al Qaeda leaders including bin Laden and his deputy Ayman al-Zawahri escaped to neighboring Pakistan But a separate group including the al Qaeda leaders sonSaad bin Laden fled to northern Iran where American troops would not pursue them and the Iranianswould likely not detain them But the Shiite clerics running Iran placed the al Qaeda operatives and theirfamily members under virtual house arrest and they became a shield against possible attacks from theSunni-based terrorist organization

One plan in particular illustrated the bold thinking and wildly unrealistic aims of the militarysinitial approach after 911 to kill or capture terrorist leaders The plan called for hunting the eight to 10senior al Qaeda leaders and operatives who had sought refuge in Chalus an Iranian resort town on theCaspian Sea where they had been detained

At the Joint Special Operations Command at Fort Bragg NC military planners drew up optionsfor Navy SEALs to sneak ashore at night using state-of-the-art mini-submarines Once they landed theSEALs would slip past Iranian guards to snatch the al Qaeda leaders Another option called for SpecialOperations helicopters to spirit American commandos into the town and whisk them out again with theirquarry The Americans went as far as conducting two or three rehearsals at an undisclosed locationalong the US Gulf Coast in early 2002 They conducted small-boat insertion exercises involving about

30 Special Operations personnel most SEALs and eventually concluded the mission was feasible if they were provided with more detailed intelligence on the locations of the al Qaeda members and thesecurity around them

The logistics of the mission were daunting Chalus sits at the edge of the Elburz coastal mountainrange about 70 miles north of Tehran and the failed rescue of the American hostages in Iran in April1980 loomed large in commanders memories Eventually Gen Richard B Myers the chairman of theJoint Chiefs of Staff rejected the mission as too risky and too politically volatile Many of the al Qaedaoperatives are reportedly still there

5 Intelligence Hauls of Unusual Size

US intelligence and military commandos have carried out tens of thousands of raids in the decade since911 The amount of material seized from terrorist and insurgent targets has grown to a massive sizeThe Defense Intelligence Agency (DIA) operates exploitation triage centers and giant warehouses forstoring intelligence products -- in war zones rear headquarters in countries like Qatar and back in theUnited States One intelligence analyst said that walking into one of the warehouses for documents andmedia exploitation reminded him of the final scene in Raiders of the Lost Ark when the captured Ark of the Covenant is crated up and rolled into a cavernous storage area that contains all the governmentsother dangerous secrets

All told more than two million individual documents and electronic files have been cataloguedby media type hard copy phone number thumb drive Each is inspected by a linguist working with acommunications analyst or computer expert

The DIA analysts are joined by specialists from other agencies including the FBI and the DrugEnforcement Administration Yet given the overwhelming volume no more than about 10 percent of thecaptured intelligence has ever been analyzed

Intelligence officers say they simply are overwhelmed and untold quality leads may still beburied in the piles of computers digital files travel documents and pocket litter

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2542

6 The Digital Counterjihad Cyberspace is the terrorists ultimate safe haven Its where they recruit raise money and even plotattacks using coded language while playing online video war games The US government fights back

One technique is called false band replacement whereby the intelligence agencies infiltratemilitants networks and post their own material to counter extremist efforts on those same jihadistwebsites The trick is to forge the onscreen trademarks -- web watermarks -- of al Qaeda media sites

This makes messages posted on these sites official and sows dissent and confusion among themilitants

This Internet spoofing can be used in support of more traditional combat missions There is atleast one case confirmed by American officials in which a jihadist website was hacked by Americancyberwarriors to lure a high-value al Qaeda to a surreptitious meeting with extremist counterparts -- onlyto find a US military team in waiting

Getty images

7 First Kill the MullahsUS counterterrorism officials have learned fighting terrorists effectively means targeting specific nodesof that network that support and enable militants who strap on suicide vests This strategy focuses onneutralizing enablers such as the financiers gun-runners and logisticians Among these terror linchpins

are religious leaders who bless attacksHeavenly reward will not await a suicide bomber unless his death and those of his victims is

deemed halal in keeping with Islams sacred sharia law Each militant network has a sharia emir usuallyat the level of a sheikh or mullah In Iraq American commanders specifically killed emirs to throw awrench in a suicide bombing networks

Take him out and suicide bombings from that network are frozen until he is replaced said onemilitary officer with command experience in Iraq hellip[Complete article is available herehttpwwwforeignpolicycomarticles201109067_things_you_didn_t_know_about_the_war_on_terror]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2642

Dick Marty Rendition Report Condemns lsquoCult of Secrecyrsquo

BBC News | 8 September 2011

A report for Europes human rights watchdog has called for greater scrutiny of secret services andsupport for whistleblowers The Council of Europe investigated how countries like Britain GermanyRomania and Lithuania assisted the US with the rendition of terror suspects It said a cult of secrecyhad helped Western governments cover up abuses Defending whistleblowers it singled out USsoldier Bradley Manning accused of passing secrets to Wikileaks He had acted as a whistleblowerand should be treated as such CoE rapporteur Dick Marty wrote in the report which was due to besubmitted to the CoEs Parliamentary Assembly The soldier is currently in a US military prisonawaiting trial for passing restricted material to the controversial website

But the report praised Mr Manning and Wikileaks itself for uncovering evidence of renditionThe CoE represents 47 member-states including both EU countries and Russia and other ex-Sovietstates Mr Martys report focused on the record of Western states explaining that it was based oninvestigations into European links to the controversial US policy of rendition for terrorism suspectsThe CIA allegedly flew terror suspects around the world for interrogation in the years after 911 holdingthem in secret prisons in Europe and elsewhere

No licence to kill

In his 48-page report - entitled Abuse of State Secrecy and National Security - Mr Marty looked at thelevel of control exercised by European states over their security services He urged all states to useindependent parliamentary committees to oversee the work of their secret services saying this was of vital importance for the rule of law and democracy Mr Marty argued that Western governments wereusing the notion of state secrecy to shield their intelligence services from accountability for seriousviolations committed during anti-terrorist operations We consider that this is simply unacceptablehe wrote

A licence to kill (or to abduct and torture) only exists in certain films and in dictatorialregimes In democratic systems parliaments as representatives of the people have a right and duty toknow what the government is doing in the name of the people Mr Marty praised investigative journalists and non-governmental organisations for their work in exposing abuses of authority Stressing

the fundamental role whistleblowers had to play in an open society he warned against a real cult of secrecy as an instrument of power

While it was up to the courts to decide if Bradley Manning had committed any crime he wrotethe CoE was indebted to him for the publication of a recording of a helicopter attack in Iraq in whichthe crew seems to have intentionally targeted and killed civilians

Thanks to Mr Manning he said a large number of embassy reports had allowed us to learnsignificant details of important recent events which are obviously of general interest We therefore join Amnesty International in expressing our worries as to the treatment he receives Mr Marty wrote inthe draft report[Article continues here httpwwwbbccouknewsworld-europe-14820145]Comment This report demonstrates that Dick Marty is not as De Gaulle would say a serious man To

suggest that Bradley Manning is a hero and intelligence agencies bent on defeating terrorists arecriminals should say it all Manning knowingly violated his oath and willfully provided enormousamounts of classified material to WikiLeaks For Marty this is a good thing in the name of transparencyMarty always injudicious and anti-American in his remarks is now moving at warp speed into crackpotterritory

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2742

Al Qarsquoida amp its Affiliates| back to top |

Al Qaeda Is Down Not Out

Los Angeles Times | By Amy Zegart 7 September 2011

US talk of defeating terrorism is dangerously prematureTalk of strategically defeating Al Qaeda is all the rage in the White House these days Defense

Secretary Leon Panetta used the D-word in July President Obama declared in his new counter-terrorism strategy We can say with growing confidence that we have put Al Qaeda on the path todefeat Compared to the woeful state of the economy terrorism has become the administrations feel-good story of the year

Defeat is a big word It is also dangerously misleading Yes the United States has made greatstrides in the last decade to harden targets improve intelligence and degrade the capabilities of violentIslamist extremists Osama bin Ladens death was a major accomplishment But the fight is nowhereclose to being won and Americas most perilous times may lie ahead Three reasons explain why

The first is that strategically defeating Al Qaeda is not nearly as important as it sounds After911 Al Qaeda morphed into a more complicated decentralized and elusive threat consisting of threeelements core Al Qaeda affiliates or franchise groups operating in places like Yemen and Somalia with

loose ties to the core group and homegrown terrorists inspired by violent extremism often through theInternet in the comfort of their own living rooms

Core Al Qaedas capabilities started degrading in 2001 when the US invaded Afghanistandismantled training camps ousted the Taliban and sent Bin Laden running The CIA has estimated thecore group remaining in the AfghanistanPakistan region to number 50 to 100 fighters The last time BinLaden oversaw a successful operation was 2005 when Al Qaeda struck the London transit system

But plots by homegrowns and franchise groups have risen dramatically in recent years The 2009Ft Hood shooting the worst terrorist attack on US soil since 911 was the work of a homegrownterrorist The mastermind of the 2010 Times Square car bomb plot was a naturalized American citizentrained by the Pakistani Taliban not Al Qaeda Another franchise group Al Qaeda in the ArabianPeninsula was behind the foiled 2009 Christmas Day underwear bomber aviation plot and the 2010

plot to explode tampered printer cartridges aboard cargo planes The Bipartisan Policy Center reported11 violent Islamist extremist terrorist incidents against the US homeland in 2009 the most since 911Nearly all involved what former CIA Director Mike Hayden calls a witches brew of radicalizedAmericans and franchise groups

The second reason why talk of defeat is premature has to do with weapons Terrorism againstAmericans is nothing new The potential for terrorist groups to acquire weapons of mass destruction isIn 1995 a Japanese cult released sarin nerve gas in the Tokyo subway killing 12 people and injuringthousands It was the first WMD terrorist attack in modern history and it sparked a wave of presidentialterrorism commissions years before Bin Laden became a household name

It is this specter of the lone fanatic or small group armed with the worlds most devastatingweapons that keeps experts up at night In 2005 60 leading nuclear scientists and terrorism experts were

asked how many believed the odds of a nuclear attack on the US were negligible Only three or fourhands went up most were far more pessimistic Today there is enough nuclear material to build120000 weapons As long as fissile material is poorly stored and rogue states like Iran and North Koreacontinue their illicit weapons programs nuclear terrorism remains a haunting possibility

The third reason is that the FBI has not yet become a first-rate domestic intelligence agencyAnalysts whose work is vital to success are still second-class citizens labeled support staff alongsidesecretaries and janitors and passed over for key jobs including running the bureaus intelligence unitsThe FBIs information technology is so antiquated it belongs in a museum And the old crime-fighting

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2842

culture still lives There is now a move afoot to shrink new classified facilities so that agents dont haveto waste time away from their cases to read intelligence documents thereStrategically defeating Al Qaeda sounds too good to be true Because it is Amy Zegart is a senior fellow at Stanfords Hoover Institution and the author of Eyes on Spies

Congress and the United States Intelligence Community

US Counterterror Chief Al-Qaida On Steady Slide

Bostoncom | 31 August 2011

White House counterterrorism chief John Brennan said al-Qaida is on a steady slide after the death of al-Qaidas latest second-in-command in Pakistan Brennan told The Associated Press on Wednesdaythat its a huge blow in the first official White House comment since Atiyah Abd al-Rahmans reportedkilling by CIA drone strike in Pakistans tribal areas last week

Al-Qaida is sort of on the ropes and taking a lot of shots to the body and the head Brennansaid This is a time not to step back and let them recover a message he says hes sending to hiscounterparts in Pakistan[Article continues herehttpwwwbostoncomnewsnationwashingtonarticles20110831us_counterterror_chief_al_qaida_on_steady_slide ]

Al-Qaeda (AKA Al-Qaida Al-Qarsquoida)

Council on Foreign Relations | 29 August 2011

ldquoAl-Qaeda an international terrorist network is considered the top terrorist threat to the United StatesThe group is wanted for its September 11 2001 attacks on the World Trade Center and the Pentagon aswell as a host of lesser attacks To escape the post-911 US-led war in Afghanistan al-Qaedas centralleadership fled eastward into Pakistan securing a safe haven in loosely governed areas there In July2007 US intelligence agencies found that the organization was regrouping and regaining strength inthese tribal areas along the border with Afghanistan though targeted killings of senior al-Qaeda leadershave since diminished the groups command and control capabilities In February 2009 Director of National Intelligence Dennis C Blair told lawmakers that the groups core is less capable and effective

than it was a year ago The killing of al-Qaedas top leader Osama bin Laden by US forces in Pakistanin May 2011 served a significant blow to the organization but analysts say al-Qaeda remains deadlywith its networks spread all over the world Plus a number of affiliated groups have gained prominencein recent years complicating the task of containing the organizationrdquo

[Article continues here httpwwwcfrorgterrorist-organizationsal-qaeda-k-al-qaida-al-qaidap9126]

Al Qaeda In The Islamic Maghreb

CSIS | 1 September 2011

ldquoAl Qaeda in the Islamic Maghreb (AQIM) emerged from a decades-long militant Islamist tradition inAlgeria In 1998 the Salafist Group for Preaching and Combat (Groupe Salafiste pour la Preacutedication etle Combat or GSPC) broke away from the Armed Islamic Group (GIA) because of the GIArsquos extensive

targeting of civilians Gradually the GSPC evolved to encompass global jihadist ideology in addition toits historical focus on overturning the Algerian state In 2006 the GSPC officially affiliated with alQaeda core soon rebranding itself as al Qaeda in the Islamic Maghreb In the following years AQIMwas able to conduct a small number of large-scale attacks most notably its 2007 bombing of the UNheadquarters in Algiers In recent years counterterrorism pressure and weak governance have combinedto shift the center of AQIMrsquos presence to the Sahara-Sahel region AQIM continues to make its presenceknown through smuggling operations kidnappings and clashes with security forces in the desert In thecoming years general instability within the region could allow AQIM to further expand its influencerdquo[Complete article is available here httpcsisorgfilespublication110901_Thornberry_AQIM_WEBpdf ]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2942

AQ Strategy

The Assynt Report | 11 August 2011

Executive Summary Al-Qaedarsquos broad objectives remain unchanged in the wake of bin Ladenrsquos death There

are nonetheless growing questions over al-Qaedarsquos capability Longstanding paranoiaover the use of electronic communications is heightened by the ongoing US dronecampaign whilst attacks against the West have generally been disrupted at an early stage

The Pakistani Talibanrsquos attack on a Karachi naval base in May 2011 was a significantmilitary success and the first major act of revenge for bin Ladenrsquos killing Furtherattempts to avenge his loss are certain

All parts of al-Qaeda are working within a cohesive framework with the ultimate aim of restoring the Islamic Caliphate (Khilafa) The strategic plan to support this aim wasdrafted by 40 of al-Qaedarsquos brightest thinkers in Kandahar Afghanistan in November1999 This plan consists of four phases each seven years long leading to the dissolutionof corrupt regimes and the union of all newly-liberated states within the Khilafa

Apart from mounting strategic operations al-Qaedarsquos role is to be the inspiration for atruly global jihadist movement It seeks to achieve this through provision of trainingbeing a role model for others to follow extending acceptance and adoption of its tactics

particularly suicide bombings and professionalising jihadist media to build a commonbrand and message between hitherto separate groups

Between the late 1990s and 2003 the organisation was primarily devoted to classicinternational terrorism Most effort is now spent fighting insurgencies from North Africato South Asia The way in which this strategy helps to spread the struggle has been seenin North-West Africa where the initial development of al-Qaeda in the Islamic Maghrebwas in part fed by men returning from fighting with al-Qaeda in Iraq

Since mid-2009 al-Qaeda and its affiliates have increasingly encouraged jihadist-sympathisers resident in Western countries to engage in violence themselves withoutcentral direction or training making surveillance more difficult

One of the keys to awakening the spirit of jihad was the success in portraying the US and

its allies as Crusaders in the Muslim world Al-Qaedarsquos strategy essentially requires thatthis process be kept running until the forces of jihad have grown large enough to launchsuccessful liberation operations

Despite its successes in Afghanistan al-Qaedarsquos credibility has suffered both from its failure to landanother strategic blow on the West on the scale of 911 and also excessive Muslim casualties in someoperations Similarly al-Qaeda in Iraq was set back by its excessive sectarian zeal and local resentmentat the foreign fighter presence In turn this affected the movementrsquos funding from the Gulf

Analysis Sub-Saharan African Leaders Media Focus On Threats Prior to 911

OSC Feature | Sub-Sahara Africa -- OSC Analysis 6 September 2011Statements by Sub-Saharan African leaders and African media reports on terrorism prior to the 10thanniversary of 911 focus on the growing threats from local extremists and Al-Qaida affiliatesparticularly in West Africa with little direct commentary on the anniversary or US counterterrorismpolicies This focus on domestic threats suggests that counterterrorism messages expressing solidaritywith African nations and acknowledging the evolving terrorist threat on the continent would have thegreatest resonance with African audiences

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3042

Leaders Stressing Determination To Counter Local Threats African leaders public statements reflect an ongoing concern about the threat of terrorism on thecontinent and a strong commitment to find ways to combat this threat

Nigerian President Goodluck Jonathan emphasized the governments commitment tovigorously combat terrorism following the 26 August bombing of the UN office inAbuja by Nigerian extremist group Boko Haram reported the Paris-based news agencyAFP President Jonathan is hosting Liberian President Ellen Johnson Sirleaf and otherforeign dignitaries for a three-day forum on terrorism and economic crimes the widelyread Lagos-based independent daily The Guardian reported on 4 September

Malian President Amadou Toumani Toure launched a Special Program for PeaceSecurity and Development on 9 August stating that development remained the mostviable solution to counter threats to the countrys stability reported Malis state-owneddaily LEssor[ 3] The program aimed to undermine support for Al-Qaida in the IslamicMaghreb (AQIM) according to Burkinabe web portal Lefasonet on 11 August

Somali Prime Minister Abdiweli Muhammad Gas stated on 23 August that theTransitional Federal Government planned to remove Al-Shabaab from the central andsouthern regions in Somalia with the goal of restoring peace within one year so the

country can hold national elections according to the Puntland-based Garowe Online

Experts Media Highlight New Capabilities Tactics

African experts and media outlets are warning about the evolving nature of terrorist organizations on thecontinent the terrorists pursuit of new targets and tactics and their potential for taking advantage of regional instability

Leading South African think tank the Institute for Security Studies stated on 29 Augustthat Boko Harams attack on the UN in Abuja completes Boko Harams metamorphosisinto an international terrorist group Since December 2010 Boko Haram had killed over600 people in over 70 attacks against Nigerian targets according to the think tank buthad not previously targeted Western or international interests

A 26 August article on the popular Malian web portal Maliweb voiced concern thatAQIM could benefit from Tuareg mercenaries many of whom were recently returningfrom fighting in Libya and could benefit from an increase in arms trafficking through theSahel during the Libyan conflict

Ugandas privately owned Daily Monitor reported on 19 August that AU forces inSomalia warned that Al-Shabaab planned to increase the number of kidnappings andbomb attacks as part of its new strategy to shift from controlling territory in Mogadishuto conducting more of an insurgent campaign

Concern Over Al-Qaida Presence Terrorist Collaboration

West African official statements and media reports reflect a growing concern over an increased Al-

Qaida presence in West Africa and collaboration with AQIM Al-Shabaab and Boko Haram

Nigerian security services reported that the suspected mastermind behind the 26 Augustbombing of the UN office in Abuja was a Boko Haram member with close links to Al-Qaida and Al-Shabaab according Nigerias privately owned Daily Sun

A 28 August report in the privately owned daily Nigerian Tribune claimed that the 26August bombing in Abuja was part of Al-Qaidas plans to mark the 10th anniversary of 911 and called Boko Haram Al-Qaidas ally in the region

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3142

An 8 August commentary in Burkina Fasos LObservateur Paalga said that reports of Boko Haram collaboration with Al-Shabaab and AQIM could indicate that Al-Qaida isextending its African tentacles Abdourahmane Dieng security division chief of theEconomic Community of West African States said the collaboration represented a veryserious threat according to Senegals progovernment Le Soleil on 5 August

Messages Likely To Resonate With African Audience

Sub-Saharan Africas increasing concern about the shifting nature and potential strengthening of theterrorist threat on the continent suggests that messages directly addressing the impact of terrorism onAfricans the increasingly complex nature of the threat and the need for multilateral cooperation againstterrorism are most likely to resonate with Africans

Messages expressing solidarity and sympathy for Africans affected by Boko Haram Al-Shabaab and AQIM would almost certainly resonate with a broad African audience

African political and military leaders would probably welcome acknowledgement of thecomplex and changing nature of terrorism on the continent and recognition of theirinitiatives and commitment to countering violent extremism

African leaders and medias concern about potential collaboration between Boko Haram

Al-Shabaab and AQIM suggest that they would be open to improving multilateral andcross-regional sharing of lessons learned and strategies to counter the intensification of terrorism within Africa

Aviation and Maritime Security| back to top |

Bomb Threats Force Jets To Land

Associated Press | 7 September 2011

Both landed safely one landed in Ankara Ataturk International Airport and the other at Kuala LumpurTwo flights operated by Pakistans state-owned airline received bombs threats on Wednesday

and both landed safely one in Turkey the other in Malaysia officials said No bombs were found The

first flight was headed for Manchester England when it was notified of the threat near the Bulgariancapital of Sofia The crew contacted the control tower in Istanbul to seek permission for the landingstate-run Anatolia news agency reported Authorities quickly evacuated all 378 passengers from theBoeing 777-300ER aircraft after it parked at a remote corner of the International Ataturk Airport andbomb squads began searching the plane with sniffer dogs Anatolia reported PIA spokesman MashoodTajwar confirmed the flight received a threat and landed All passengers were safe A police searchturned up no bomb officials said Later a second PIA flight from Islamabad to Kuala Lumpur alsoreceived a bomb threat It landed in Kuala Lumpur and all the passengers disembarked safely saidTajwar The UK-bound Pakistan International Airlines plane was forced to make an emergency landingat Ataturk Airport in Istanbul after receiving a bomb threat Malaysias airports authority said thepassengers were being screened and the plane was isolated in a parking area while being searched bypolice No bomb was found

It said the plane carried 164 passengers and 13 crew Azmi Murad senior general manager forthe authority said the Pakistani airline informed it that the warning came by email Mr Tajwar gave nodetails on the nature of the threat or how it was delivered Pakistan is home to al Qaedas top leadershipMilitants who trained there have been responsible for many of the attacks and failed plots in the USand Europe since Sept 11 2001 when planes hijacked by al Qaeda militants destroyed the World TradeCenter in New York and crashed into the Pentagon The bomb threats came four days before the 10thanniversary of 911 but there was no apparent link to Islamist militants who typically do not alertauthorities in advance The FBI and Homeland Security department issued warnings last weekend aboutal Qaeda threats to small airlines

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3242

Commentary amp Opinion| back to top |

From Terror Group Founder To Libyan Rebel Military Commander

ABCNews | 29August 2011

The same man who triumphantly led Libyan rebels into Gadhafis compound last week first came to theattention of the US intelligence community years ago - as a founder of a terror group

Abdelhakim Belhaj who was recently appointed to Tripolis rebel military council was one of the original founders of the Libyan Islamic Fighting Group an anti-Gadhafi group which was laterdesignated by the US State Department as a terrorist organization with links to al Qaeda according toUS government reports

We proudly announce the liberation of Libya and that Libya has become free and that the ruleof the tyrant and the era of oppression is behind us a victorious Belhaj told reporters after the stormingof Gadhafis Bab al-Aziziya compound last week Ousting Gadhafi had been the main objective of theLIFG since its inception in the early 1990s even if some of the fighters believed that meant puttingAmericans in the crossfire

The group carried out operations against the Libyan government including at least four suspectedassassination attempts against Gadhafi in the 1990s and was also believed to be connected to a series of suicide bombings in Casablanca Morocco in 2003 the US State Department reported As relationsbetween the US and Gadhafi improved in the mid-2000s some LIFG leaders cultivated relationshipswith top al Qaeda leaders including Osama bin Laden and were suspected of funneling fighters to Iraq tocarry out operations against US soldiers

When the LIFG was designated a terror organization in 2004 it was meant as a gesture of solidarity with the Libyan government according to a March 2011 congressional report

Contrary to several US government reports Libyan rebel ambassador to the US Ali Aujalitold ABC News that the LIFG was never connected to al Qaeda and did not carry out terrorist operations

They were only opposed to Gadhafi during his rule and paid the price for that by beingoppressed by the regime Aujali said

The CIA first publicly voiced its concerns about the connection between the LIFG and al Qaedain 2004 when then-director George Tenet testified before the Senate Select Committee on Intelligenceand listed the LIFG among groups that represented an immediate threat [that] has benefited from alQaeda links[Article continues here httpabcnewsgocomBlotterterror-group-founder-libyan-rebel-military-commanderstoryid=14405319]

Interview With Saudi Sheik Wajdi Al-Ghazawi

MemriTVcom

Sheik Wajdi al-Ghazawi owner of al-Fajr TV criticizes extremist atmosphere in Saudi Arabia and saysafter 911 They Handed Out Sweets on the Streets of Mecca

Following are excerpts from a statement by Saudi Sheik Wajdi Al-Ghazawi owner of Al-FajrTV which was posted on YouTube on August 4 2011

Wajdi Al-Ghazawi When Al-Qaeda and Osama Bin Laden were at the height of their mightthey were extremely popular in Saudi Arabia From mosque pulpits across Saudi Arabia preacherswould pray for their success Moreover from the pulpits of the most important mosques ndash the Al-HaramMosque in Mecca and the Nabawi Mosque in Al-Madina ndash direct prayers for the success of Al-Qaedawere made during the days of the bombing of Tora Bora Oh Allah help our brothers in AfghanistanThese supplications were made during evening prayers as well as Friday prayers The preachers wouldpray for them in violation of the ministrys instructions

When the twin towers in New York were attacked they handed out sweets on the streets of Mecca By Allah they did I witnessed this myself The young people bowed in prayer and hugged one

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3342

another out of joy People were in heaven because of these young men who destroyed America andbombed this idol Am I right or not Was it like that or not

Back then when the Taliban broke off a piece of the nose of the Buddha statue which was hewnin the mountain an entire sermon was dedicated to it in the mosque in Mecca and the preacher was laterreprimanded for this sermon The entire Saudi people supported and loved Al-Qaeda

This went on until our brothers in Al-Qaeda ndash and I dont know what was going through theirminds ndash began to carry out operations inside Saudi Arabia Thats when we all raised our hands andsaid Youve gone too far We wont support you in this

The atmosphere here in Saudi Arabia is one of extremism It is characterized by focusing onminor details Many things are forbidden Yes maybe they are indeed forbidden but by forcing peopleto avoid them and by acting as if these were major sins an atmosphere was created that gave rise toextremist youth who might act recklessly at the most trivial provocation

For instance we blew out of proportion the issue of music the issue of smoking or the issue of hanging pictures in public places True there are clear texts on these issues but the young peopleembraced these issues as if they were fighting usury fornication or alcohol No these are not among theseven major sins So our society has become extreme

This extremist atmosphere has given rise to people who accuse others of heresy and people whopurport to be waging Jihad It has created genes that gave rise to cells of Al-Qaeda and other terrorists

We must examine our breeding ground in which these young men were sownBy Allah what can possibly emerge from such an atmosphere Muftis who accuse others of

heresy sheiks who incite and young people who bomb Am I right or not[Complete clip is available here httpwwwmemritvorgclipen3099htm]

Legal Aspects amp Lawfare| back to top |

Revisiting A Stale Counterterrorism Law

Council on Foreign Relations | 1 September 2011

ldquoNearly a decade after 911 the United States still relies on the 2001 Authorization for the Use of Military Force (AUMF) for the killing and detention of those considered responsible for or associatedwith the terrorist attacks But CFR national security law expert John Bellinger says it is becomingincreasingly difficult for the Obama administration to justify some of its counterterrorism operationsunder this limited statutory authority It has been used in defense of actions including drone attacks onindividuals as well as the targeting of groups in Yemen and Somalia that may have only the mosttenuous affiliation or association to the 911 attack A revised AUMF should clarify those operations aswell as the issue of detention specifically which individuals can be detained for how long and subjectto what processes There also needs to be greater effort at the international level he adds to fill thegaps in the law that covers conflicts between states and non-state actorsrdquohelliprdquo[Complete article is available here httpwwwcfrorgcounterterrorismrevisiting-stale-

counterterrorism-lawp25742]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3442

Narco-Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector[Complete article is available here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Mexicos Cartels Move Into Extortion

At a construction site of an apartment building in the heart of the Mexican capital a company engineerruns through his weekly payroll sheet He has salaries written out for carpenters bricklayers andelectricians At the bottom of the sheet is a notation of $200 for ldquosecurity servicesrdquo next to a nicknameldquoEl Indiordquo mdash the Indian [Complete article is available here

httpwwwtucsonsentinelcomnationworldreport090611_mexico_cartels_bribesmexicos-cartels-move-into-extortion ]

Seven Die In Mexican Pacific Port City

Latin American Herald Tribune

Seven people died in separate shootings in Mazatlan a port city in the northwestern Mexican state of Sinaloa with some of the incidents drug-related a police spokesman told Efe [Complete article is available herehttpwwwlahtcomarticleaspCategoryId=14091ampArticleId=423061]

Tijuana Violence Slows As One Cartel Takes Control

BorderlandBeatcom

Mexicos famously seedy border city of Tijuana is enjoying a lull in drug murders as the countrys mostpowerful cartel gains the upper hand over its rivals [Complete article is available here httpwwwborderlandbeatcom201109tijuana-violence-slows-as-one-cartelhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3542

Network Notes| back to top |

Canadian data foreign threats Spying in the digital age (Suggested by a reader in Lithuania ndash thanks) Globe and Mail | By Colin Freeze 31 July 2010

A government spy agency thatrsquos prohibited from monitoring Canadian citizens is now usingldquoinformation about Canadiansrdquo to zero in on foreign threatsThe ambiguous statement found in a new government report detailing the activities of CommunicationsSecurity Establishment Canada could sanction a range of intelligence-gathering activities ndash includingthe controversial practice of mining ldquometadatardquo from digital communications

Metadata ndash often called data about data ndash are found in e-mails and their attachments and containdigital signatures that can reveal when where and by whom documents were created

The collection of metadata has caused controversy in other countries but never in Canada wherethe Communications Security Establishment Canada operates as an ultra-secretive agency About theonly thing that is known about the classified practices is that they were halted and resumed after someldquomajor changesrdquo including directives signed by Defence Minister Peter MacKay

ldquoI cannot comment on specific operational activitiesrdquo Adrian Simpson a CSEC spokesman toldThe Globe He stressed that reviews upheld that the activities in question were ldquocarried out inaccordance with the law ministerial requirements and CSECrsquos policies and proceduresrdquo

ldquoCSEC is prohibited from directing its activities at Canadians anyone in Canada or Canadiansanywhere in the worldrdquo he said

For decades signals-intelligence agencies in the West have been allowed to safeguard nationalsecurity by eavesdropping on foreignersrsquo conversations Spies can whatever phone lines and satellitesignals they can so long as they never listen in on fellow citizens

But in the digital age governments run increasingly sophisticated dragnets scooping up andscouring through millions of intercepted Internet conversations daily Such practices create legalambiguities

ldquoThe whole issue of what constitutes boundaries for signals-intelligence agencies in cyberspaceis a big debate right nowrdquo said Rafal Rohozinski a security expert affiliated with the University of Torontorsquos Munk School

A watchdog agency that reviews the CSECrsquos activities released an annual report to Parliament onJuly 20 ldquoWhen other means have been exhausted CSEC may use information about Canadians when it

has reasonable grounds to believe that using this information may assist in identifying and obtainingforeign intelligencerdquo it reads

Sometimes collecting metadata is relatively benign It can involve aggregating sets of data tospot trends much like the way meteorologists discern national forecasts from localized information

For example while CSEC canrsquot usually monitor the communications of specific Canadian terrorsuspects it can glean insights by zooming out for big-picture patterns One way to do that MrRohozinski said would be to look at data flows between Canadian cities and Yemen where an Internet-savvy al-Qaeda offshoot works to recruit Westerners

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3642

Metadata however can be more revealing Documents that circulate on the Internet travelaround like postmarked letters marked with return addresses ndash e-mails and attachments have embeddedcodes that speak to the who where and when behind their creation

The US National Security Agency found itself mired in controversy a few years go after itskirted domestic-spying bans by secretly upholding that this sort of American metadata was fair gamedistinct from communication contents

Therersquos little to suggest the CSEC would go that far The federal agencyrsquos activities are reviewedby a watchdog body now headed by a former Federal Court of Appeal judge Robert Deacutecary appointedlast year wrote in his annual report that he was satisfied the CSEC activities in question are lawful evenif his predecessors felt them borderline

ldquoThis was the first review of these activities since hellip their resumption under new policiesrdquo thewatchdogrsquos report says It concludes that the surveillance activities are ldquoin accordance with the lawrdquo andfollow ldquomajor changes to certain policies procedures and practicesrdquo

Much of the concern arises from the possibility that CSEC could hand over metadata intelligenceto domestic law-enforcement and security agencies

As it stands the RCMP and CSIS have to develop their domestic investigations before coming toCSEC ndash usually with warrants ndash if they want specific intelligence The rules guiding handovers are strictbecause even though all agencies run surveillance operations they do so under vastly different

mandates and legal standardsThe spy agency however stood by its practicesldquoCSEC is extremely diligent when it comes to the privacy of Canadiansrdquo Mr Simpson said

[complete article is available here httpwwwtheglobeandmailcomnewsnationalcanadian-data-foreign-threats-spying-in-the-digital-agearticle2113772 ]

Cyber Attacks Against NATO Then And Now

New Atlanticist | 6 September 2011

ldquoNow that NATOrsquos Operation UNIFIED PROTECTOR over Libya is winding down it is worth

noting how few cyber incidents were directed in protest against the Alliance Certainly there was a

cyber component to the liberation of Libya but it was more about content and Internet freedom (the

most newsworthy elements here were the role of social media and the Libyan government taking largeparts of the nation offline) But compared to past history NATO cyber defenders had a relatively easy

time

ldquoNATO has not however had an easy 2011 Although there were three significant incidents we

know about none seemed to have been in direct response to operations over Libyahelliprdquo

[Complete article is available here httpwwwacusorgnew_atlanticistcyber-attacks-against-nato-then-

and-now]

The Calm Before The Storm

Foreign Policy | By Joel Brenner 6 September 2011

Cyberwar is already happening -- and its about to get much much worse A veteran cyberwarriorexplains how America can prepare itself

Revelations of wholesale electronic fraud and massive data heists have become weekly evendaily affairs A multinational electronics corporation loses personal information on more than 100million customers Cyberthieves break into an international bank counterfeit credit balances and lootATMs in four countries grabbing $9 million in just a few hours International gangs spread maliciouscode that conscripts unwitting computers into zombie armies of hundreds of thousands of similarlyenslaved machines Criminals then rent these armies called botnets as easily as you can buy a time-sharing arrangement in a beach condo No wonder the vast majority of Internet traffic is spam

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3742

Yet the loss of personal information and related criminal fraud intolerable as they are are theleast threatening face of electronic insecurity The US militarys secret network is penetratedAmericans corporate pockets are being picked clean of the intellectual property that makes the UnitedStates tick And the electricity grid that keeps the lights on and makes everything move is dangerouslyinsecure

In one remote attack on the Pentagons information systems about 10 years ago the Chinesehauled away up to 20 terabytes of information If the information had been on paper theyd have neededa line of moving vans stretching from the Pentagon to freighters docked 50 miles away in Baltimoreharbor just to haul it away Had they done so the military district of Washington wouldve become anactive theater of operations for the first time since 1865 and the Navy wouldve blockaded theChesapeake Bay But the Chinese did it electronically so who noticed

Corporate espionage by both competitors and foreign intelligence services or their surrogates isalso increasing Intelligence officials see this but cant speak openly about the specifics and Im seeingit now in my law practice The victims rarely admit it for understandable reasons Oracle whichsuccessfully sued SAP for theft of its software code was a prominent exception Google was another

When the Chinese penetrated Google in late 2009 -- yes that operation was Chinese and yes itwas done with the blessing of a member of the Politburo -- they werent after customer informationThey were after the source code that makes Google unique Nor was Google the only victim Thousands

of US and Western firms were penetrated in that affair Foreign governments -- and not only theChinese -- understand that they cannot compete with the United States militarily and politically if theycannot compete with it economically so their intelligence services want to steal its corporate intellectualproperty This is the technology that gives America its competitive edge and often it has nothing to dowith defense Ordinary companies with valuable technology are now being targeted by nation-statesThis is a new era National security and economic security have converged

The danger is not limited to the loss of technology and information however The owners andoperators of the North American electricity grid are hooking up their control systems to the Internet asfast as they can Exposing the grid to the Internet makes it marginally more efficient but it also makes itdramatically more vulnerable to disruption If you can remotely penetrate an electronic system to stealinformation you can remotely penetrate it to shut it down or make it go haywire This is why there is no

longer a meaningful difference between information security and operational security And the biggestoperational risk is the grid In contemporary society nothing moves without electricity If the grid goesout the country stops

As the Stuxnet affair demonstrated remotely engineered disruption of industrial control systemsis now a reality That episode involved the successful electronic attack on the centrifuges in the Iraniannuclear program Only a first-class intelligence agency could have pulled that off but the blueprint fordoing it -- the code itself -- is now public Many American industrial control systems run on the samekind of equipment the Iranians were using but unlike the controls on the Iranian centrifuges thecontrols on the US grid are now being connected to the Internet making them easier to disrupt Stuxnetwas a watershed there will be copycats

Other industrial control systems will also be targets Some already are Air traffic control

railroad switches and water and sewage systems are all electronically controlled now and many arevulnerable If an intruder can break into the right server electronically he can remotely shut downproduction send your goods to the wrong destination and even unlock your doors -- and delete your logentries so he leaves no record of ever having been there

The United States does not lack enemies who would attack it this way Seized al Qaedacomputers contain details of US industrial control systems In 2003 a group affiliated with thePakistani terrorist organization Lashkar-e-Taiba -- the same gang that engineered the 2008 terroristassaults in Mumbai -- plotted to attack the Australian grid Other groups conspired to attack the Britishgrid in 2004 2006 and 2009 Yet the owners and operators of the North American grid continue willy-

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3842

nilly to expose their control systems to the Internet instead of isolating and hardening it This is folly of a high order

Important conclusions for public and corporate policy follow from this vulnerable state of

affairs First cyber insecurity has operational consequences In the current and foreseeable states of technology a high degree of assurance against electronic penetration of anything connected to theInternet is not achievable Large efficient electronically connected organizations and nations aretherefore vulnerable to remotely engineered disruption as well as information theft

Second this risk cannot be eliminated -- but it can be reduced and managed As a nation theUnited States should start by isolating the grids controls from the Internet Undoubtedly there aremarginal efficiencies to be gained by seamless connectivity over a publicly accessible infrastructure butthese gains are usually exaggerated and the risk this connectivity creates is staggering The governmentand the major telecommunications carriers must also make the investment required to re-create themassive redundancies that made the wired telephone network so robust Resilience and swift recoveryshould be the goal If the consequences of cyberattacks were reduced penetration would cease to matter

Third companies that wait for the government to solve their own security problems do so attheir peril The government is broke and the IT backbone is 85 percent private so the governmentdoesnt control it The governments role in altering the status quo will be limited to setting standardsusing its purchasing power to move vendors toward better security and getting its own house in order

The government can neither secure corporate intellectual property nor protect firms against operationaldisruption

Fourth in a world in which everything cannot be protected companies must determine forthemselves what intellectual property and physical assets to isolate and safeguard Those that approachthis task seriously will quickly learn that technology is only one aspect of their insecurity and in manycases the easiest to deal with Unless technology is integrated with personnel practices and operationalsecurity it opens vulnerabilities that its users rarely understand This kind of integration requires theautomated enforcement of reasonable security policies and systematic workforce training and thatoccurs only when management the lawyers and the technologists work closely together This is an old-fashioned management challenge -- not a technological one For their part corporate boards need to takeIT security seriously and launch audits that examine how their systems are actually implemented and

used not merely how they are designed Because as the techies like to put it the weakest link in anysystem is not the silicon-based unit on the desk its the carbon-based unit in the chair Joel Brenner is author of the forthcoming America the Vulnerable Inside the New Threat Matrix of

Digital Espionage Crime and Warfare He has served as the inspector general of the National Security

Agency the national counterintelligence executive and the NSAs senior counsel He now practices law

at Cooley LLP in Washington DC

Cyberattacks Decline Slightly Symantec Report Finds

Dark Reading | 1 September 2011

Organizations worldwide are suffering damages as a result of cyberattacks but interestingly there hasbeen a slight decline in these attacks during the past 12 months according to a new report from

Symantec More than 90 percent of the more than 3300 respondents across 36 countries said theyexperienced tangible losses as a result of a hack with 84 percent reporting financial loss to the cost of abreach Around one-fifth lost at least $195000 in breaches during the past 12 months

Meanwhile Symantec attributes the unexpected bright spot of a decline in breaches toorganizations employing better cybersecurity defenses More than 70 percent of organizations sawattacks in the past 12 months a decline of 5 percent from 2010 And those that experienced anincreasing frequency of attacks dropped from 29 percent in 2010 to 21 percent this year While 100percent last year reported losses from cyberattacks 92 percent did so in 2011 The trend seemscounterintuitive given the rash of high-profile breaches this year More

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 7: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 742

Bahrain

| back to top |

Bahrain Panel 101 Activists on Hunger Strike

Associated Press | 7 September 2011

More than 100 jailed Bahraini activists mdash including doctors who treated injured protesters duringmonths of anti-government protests and crackdowns in the Gulf kingdom mdash are on hunger strike an

international panel said Wednesday The Bahrain Commission of Inquiry said in a statement that 84opposition supporters are on hunger strike in prison In addition 17 detained activists have beenhospitalized by the Interior Ministry for their refusal to eat

Hundreds of activists have been imprisoned since February when Shiite-led demonstrations forgreater rights began in the Sunni-ruled Bahrain the home of the US Navys 5th Fleet More than 30people have been killed since protests inspired by Arab uprisings began in February The five-memberpanel has been set up in June to investigate the unrest Wednesdays statement said an internationalexpert on hunger strikes will join the panel to visit the striking detainees and evaluate their condition

Medical advice will be provided and the expert will discuss the challenges of hunger strike thestatement said adding that the hunger strike started nine days ago

Among jailed activists on hunger strike are 20 doctors who are on trial in a special security court

on charges of participating in efforts to overthrow Bahrains 200-year-old monarchy Other jailedopposition supporters have joined the strike including two prominent Shiite activists Abdul Jalil al-Singace and Abdulhadi al-Khawaja They were sentenced to life in prison in June for their role inprotests The doctors trial is being closely watched by rights groups which have criticized Bahrains useof the security court that includes military prosecutors and civilians and military judges

The case against 11 health professionals was back in the special tribunal on Wednesday Noverdict is expected from the session The Bahrain Commission of Inquiry includes international judicialand human rights experts They started the probe with the consent of the Sunni rulers The commissionsfindings are expected Oct 30 Shiites comprise about 70 percent of Bahrains 525000 people but areblocked from top political and security posts[Article continues here httpnewsyahoocombahrain-panel-101-activists-hunger-strike-

112949681html]

Colombia

| back to top |

Colombias Complete Military Command Replaced

Colombia Reports

Colombian President Juan Manuel Santos announced Tuesday that the countrys entire militarycommand has been replaced amid growing concerns about increased violence by illegal armedgroups

[Article continues here httpwwwcolombiareportscomcolombia-newsnews18815-colombias-complete-military-command-replacedhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 842

Denmark

| back to top |

Family Held by Somali Pirates Released

Associated Press | 7 September 2011

Seven Danish hostages including a family with teenage children have been released by Somali piratesafter more than six months in captivity Denmarks Foreign Ministry said Wednesday The Danes -- a

couple with three children ages 12-16 and two crew members -- were captured in the Indian Ocean onFeb 24 while sailing around the world in a yacht

The seven Danes are doing well under the circumstances They are expected back in Denmark in a short time the ministry said in a brief statement It gave no details of how they were released andmade no mention of a ransom being paid No one at the Foreign Ministry was immediately available forcomment

Prime Minister Lars Loekke Rasmussen told public broadcaster DR that the Danes were on theirway back in a chartered airplane paid for by their insurance company Loekke Rasmussen said theirrelease came after a long period of negotiations Jan Quist Johansen his wife Birgit Marie Johansentheir sons Rune and Hjalte and daughter Naja were captured along with the two adult Danish crewmembers when their 43-foot yacht was seized by pirates The Johansens are from Kalundborg 75 miles

west of Copenhagen They set out on their round-the-world journey in 2009 Of course it is verycheerful news said Ole Meridin Petersen chairman of the Kalundborg yacht club where Jan QuistJohansen was a member I can imagine that the hostages after their release need quite a lot of calmMeridin Petersen told The Associated Press

The yacht was seized while the Johansens were sailing through the pirate-infested waters off EastAfrica The family very likely is aware that what they did was not so fortunate They certainly feelpretty bad about it now Meridin Petersen said Hostages are held in hot austere conditions in Somalia -- typically for many months -- before a ransom is agreed on and paid and the hijacked ships and creware released Last year a British sailing couple were released after 388 days in captivity Reportsindicated that a ransom in the region of $1 million was paid for their release Somalia hasnt had afunctioning government since 1991 one of the reasons the piracy trade has flourished hellip

[Article continues here httpwwwfoxnewscomworld20110907denmark-family-held-by-somali-pirates-since-february-releasedtest=latestnews]

France

| back to top |

Western Governments Said Protecting Intelligence Officers From Scrutiny

BBC World Service | 7 September 2011

Western governments have been accused by Europes leading human rights body of shielding theirintelligence services from accountability for serious violations BBC World Service reported on 7

September The reports author the rapporteur for the Council of Europe Dick Marty said theseviolations had occurred during anti-terrorist operations He said a licence to abduct torture or kill onlyexisted in films and dictatorships but western governments were using the notion of state security toprevent parliaments and judges from scrutinising the work of intelligence officers

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 942

India

| back to top |

Deadly Explosion Strikes Courthouse in New Delhi

New York Times | By Jim Yardley 7 September 2011

An explosion ripped through a reception area of an Indian courthouse on Wednesday morning killing atleast 10 people and wounding more than 60 others in a bombing that renewed concerns about Indiarsquos

vulnerability to terrorism It was the second bombing of the courthouse in less than four months

Relatives mourned a victim of the bombing which struck a courthouse reception area Harish TyagiEuropean PressphotoAgency

Witnesses described a chaotic scene at the Delhi High Court after the blast at 1014 am outside areception area used by litigants lawyers and visitors to enter the courthouse

ldquoIt was in shamblesrdquo said Ajay Mehrotra a lawyer who witnessed the explosion ldquoThere wastotal chaos There was blood People were running for their livesrdquo

The Indian home minister Palaniappan Chidambaram called the explosion a terrorist attack andnoted that New Delhi was already in a high state of alert with Parliament in session Mr Chidambaramsaid Indian intelligence agencies had received information in July about a possible terrorist threat to thecity which had been turned over to the local police He did not elaborate about the intelligence reportOn Thursday three people were detained for questioning by the police Reuters reported

ldquoThe bomb blast took place just outside the reception centerrdquo Mr Chidambaram said at a newsconference ldquoIt is suspected that the bomb was placed in a briefcaserdquoReuters reported that a militant terrorist group called HuJI for Harkat-ul-Jihad Islami based largely inPakistan and also Bangladesh had claimed responsibility for the attacks citing security officials

Prime Minister Manmohan Singh speaking to reporters during a visit to Bangladesh condemned

the explosion as ldquoa cowardly act of a terrorist naturerdquoldquoWe will deal with itrdquo Mr Singh said ldquoWe will never succumb to the pressure of terrorismrdquo

Indian authorities have come under renewed criticism in recent months about their preparedness toprevent terrorism Terrorist attacks are a persistent concern in India particularly in the countryrsquos rapidlygrowing cities which have endured a series of bombings in recent years

In July more than 20 people were killed in Mumbai the countryrsquos financial capital from threeblasts timed to the evening rush hour That attack raised painful memories of the bloody November 2008attacks on Mumbai in which militants trained in Pakistan swept through luxury hotels a railway stationand a Jewish center in a rampage that left more than 160 people dead

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1042

Wednesdayrsquos attack at the Delhi High Court exposed anew the weaknesses in the courthousersquossecurity In May a smaller bomb detonated near a parked car outside the courthouse causing no injuriesWitnesses told local media of seeing a black bag in flames after the blast

Rakesh Tiku chairman of the Delhi Bar Association criticized the Delhi police saying ldquothe low-intensity blast in May should have served as an eye-openerrdquo Mr Tiku said hundreds of litigants andclerks passed through the gate where the blast took place each day making it a vulnerable location ldquoTheDelhi High Court requested the Delhi police to install CCTV cameras as well as personnel to man theentrances three or four months ago but no action has been takenrdquo he said

The latest explosion occurred near Gate 5 of the High Court outside a reception center wherevisitors wait for passes to enter the building Lawyers said Wednesday was an especially busy daybecause the court heard public-interest litigation

ldquoWhat are the police doingrdquo asked Mr Mehrotra the lawyer ldquoThe lives of lawyers litigantsand judges are at stakerdquo

Another witness Brijmohan Sharma described a ldquovery loud sound the reverberations fromwhich caused me to lose my balance I got up and was surrounded by people runningrdquo He added ldquoItwas like a scene from a film People were lying on the floor with their hands cut off their legs brokenand bleedingrdquo

The last serious attacks in New Delhi took place in 2008 when coordinated blasts in a park and

in shopping areas killed more than 20 people and injured nearly 100 In those attacks the IndianMujahedeen an Islamic militant group claimed responsibility

The Delhi High Court is in the heart of the capital a short walk from the cityrsquos landmark IndiaGate Rahul Gupta a local resident said he was standing near the courthouse entrance when the groundshook from the blast throwing people onto the road outside the reception area

ldquoSecurity is one area which no one can handle in Delhi at the momentrdquo Mr Gupta said ldquoIt is thefanatical people who are creating these types of problems and trying to create panic in the publicrdquo hellip

The Indian government said that a preliminary analysis found a nitrate-based explosive withtraces of pentaerythritol tetranitrate or PETN a powerful plastic explosive often used in terror plots hellip[Article continues here httpwwwnytimescom20110908worldasia08indiahtml_r=1ampref=world]

Ten Killed In Delhi Blast

Multiple Sources

At least 10 people were killed and 65 others injured in a bomb blast outside the Delhi High Court on themorning of 7 September private Indian television channel IBN Live reported The terror strike took place in a high security area with Parliament the Prime Ministers Office and India Gate in the vicinitythe report said (CNN-IBN website New Delhi in English 07 Sep 11)

According to the website of the private Indian television channel NDT the blast went off at themain entrance to the court on Shershah Suri Road which is normally heavily guarded The bomb wentoff just before the court was about to open the report said (NDTV website Delhi in English 07 Sep 11)

Security officials were quoted by BBCWS as saying they suspected the explosives were hidden

in a briefcase that had been placed beside the desk where passes were being handed out An eyewitnesstold the BBC that it was a powerful blast shaking the ground and buildings around him (BBC WorldService 7 September 2011)

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1142

Delhi On High Alert In Wake Of Blast

Multiple Sources

The Indian capital has been put on high alert following the blast at the Delhi High Court privateEnglish-language TV news Channel Times Now reported (Times Now TV New Delhi in English0530GMT 07 Sep 11)

Hindi channel says received email from group claiming responsibility for attack Indias Hindinews channel Aaj Tak said on 7 September it had received an email claiming responsibility for the blastAccording to the report the email was sent from the ID harkatuljihadi2011gmailcom The channelsaid the police were investigating possible involvement of the Indian Mujahidin (Aaj Tak TV Delhi inHindi 7 September 2011)

Police Probe Possible Links To Al-Qaidah-Linked Group

Noida IBN Live | in English 7 September 2011

Police in Delhi are looking into claims that a Pakistan-based militant group linked to Al-Qaidah theHarkat-ul-Jihad Islami (HUJI) may have been involved in the attack Noida IBN TV reportedAccording to the report in an e-mail sent to a media house HUJI claimed it had carried out the attack inretaliation for the death sentence issued against Afzal Guru the man found guilty of involvement in an

attack on Delhis parliament almost ten years ago We owe the responsibility of todays blasts at highcourt delhi our demand is that Afzal Gurus death sentence should be repealed immediately else wewould target major high courts amp THE SUPREME COURT OF INDIA the e-mail read According tothe report it was sent from the id harkatuljihadi2011gmailcom

Home Minister Announces Probe Into Attack

CNN-IBN website | New Delhi in English 7 September 2011

Indian Home Minister P Chidambaram speaking in parliament said that investigators did not yet knowwho was behind the attack but he blamed it on terrorists seeking to destabilise the country He saidthat the National Investigative Agency (NIA) would carry out a probe into the attack

PM Denounces Blast As Cowardly Act

Doordarshan news website | New Delhi in English 7 September 2011

Prime Minister Manmohan Singh on 7 September described the blast outside the Delhi High Court as acowardly act and urged all political parties to unite and tackle any acts of terrorism state-run Indiantelevision channel DD News reported This is cowardly act of terrorist nature We will deal with it Wewill never succumb to the pressure of terrorism Singh said He said this is a long war in which allpolitical parties all the people of India have to stand united so that the scourge of terrorism is crushed

IED Explosion At Delhi High Court Domestic Islamists Likely Culprits Growing Signs Of Jihadist Agenda

Sterling-Assynt | 7 September 2011

An IED placed inside a briefcase exploded at 1017AM at an entrance to Delhi High Court wherelitigants collect their visitor passes Wednesdays are reserved for public-interest litigation and so thearea was crowded It is likely that the briefcase was placed in the queue at reception before visitors passthrough security checks There is reportedly no CCTV coverage in this area which will makeidentification of the perpetrator difficult

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1242

The blast was of at least medium intensity and created a crater between three to four feet deepAt least eleven people have died and 65 others have been injured ndash a toll that would probably have beenhigher if an international group had been responsible There were no other explosions which has thesame implication Mumbai has been placed on high alert following the attack especially as the HomeMinistry reported in August that coastal cities were under threat from pan-Islamic terror groups Noblame has yet been assigned A minor explosion occurred on 25 May (also a Wednesday) in a car-park near the Court That bomb was constructed using ammonium nitrate and is believed to havemalfunctioned causing no damage or injuries which suggests similar origins to this one

There are reports of an email from Harkat-ul-Jihadi al-Islami (HuJI) claiming responsibilityfor todayrsquos explosion but we remain sceptical about this since the group has not previously made suchclaims via email The nature of the bomb and the use of email to communicate suggest rather theinvolvement of the Indian Mujahideen (IM) Nonetheless the unverified HuJI email demands that AfzalGurursquos death sentence be repealed and this may point towards the involvement of a jihadist agendaGuru was involved in the December 2001 Parliamentary attacks in Delhi and had his mercy petitionrejected by the Home Ministry on 10 August

Todayrsquos incident indicates an increase in successful attacks by local groups A robust securityforce campaign following the 2008 Mumbai attacks diminished the capabilities of groups such as IMThey claimed responsibility for the December 2010 Varanasi bomb blast which killed one and injured

twenty people However IMrsquos likely involvement in the July 2011 blasts in Mumbai and the attack todaypoints towards the rebuilding of its capabilities and possibly also the establishment of closer ties with jihadi groups

We do not expect a spate of attacks to follow imminently but such incidents will continue tooccur possibly on a larger scale as IM continues to regroup following the security clampdownDevelopments in the cases of Afzal Guru and Ajmal Kasab (the surviving gunman from 2008) willprovide cause for further attacks Given a recent warming in relations between India and Pakistan theHigh Court attack will be unlikely to raise tensions between the two countries significantly

Indonesia

| back to top |

Islamic Groups Continue To Harass Religious Minorities Government Silence Further

Encourages Attacks Youths Beaten In East Jakarta

Assynt SEAsia Vol VIII No17 | 7 September 2011

Hard-line Islamic groups continued to intimidate religious minorities without any response from theGovernment at either a local or national level Yudhoyono relies on the support of Islamic parties inParliament and is unlikely to take any decisive action against such incidents This will further encourageradical groups and endangers the countryrsquos reputation for religious tolerance

Three youths were beaten by members of the Islamic Defenders Front (FPI) for allegedly beingdrunk The attack took place in Jakartarsquos business district but it remains unlikely that the FPI will targetforeigners and the security forces will not tolerate any threats to business interests Nonetheless such

incidents highlight a worrying trend towards increasingly hard-line behaviour that remains unchecked bythe Government

We previously reported that the light sentences handed down for the killing of three members of the Ahmadiyah sect will embolden radical groups (see our Report of 3 August) In this period theIslamic Reform Movement (Garis) coerced Ahmadi youths in Cianjur West Java to join mainstreamprayers The Ahmadiyah sect meanwhile was banned from conducting religious activities during theEid holidays by the South Sulawesi administration for fear of provoking violence

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1342

Iran

| back to top |

Two Arrested Al-Qaidah Members Iraqi Three Iranian - Iran Official

ISNA website | Tehran in Persian 7 September 2011

The public prosecutor of Irans Kerman Province Yadollah Movahhed has announced the start of aninvestigation into the case of five people arrested on charges of having links to Al-Qaidah the IranianStudents News Agency (ISNA) reported on 7 September Two of the detainees - arrested on 19 August -are Iraqis and the other three are Iranian nationals Movahhed told ISNA in an interview on 7 SeptemberThe prosecutor said the detained people are accused of carrying illegal arms and munitions and addedthat an investigation is ongoing into the possibility that they were members of a larger group

Israel

| back to top |

Israel Uncovers Planned Hamas Bombing Spree On Israelis

Xinhua | 8 September 2011

Hamas cells operating in the West Bank routed between May and AugustThe Israeli security agency Shin Bet has broken a network of Hamas cells operating in the West Bank and planning a series of attacks against Israeli targets local media reported Wednesday Dozens of

Hamas members comprising 13 militant cells were arrested throughout the West Bank between May andAugust Army Radio reported One of the groups has carried out a bombing attack at the entrance toJerusalem in March in which a British woman was killed and several dozen civilians wounded Anothercell had planned to dispatch a suicide bomber to Jerusalems Pisgat Zeev neighborhood on Aug 21 Theattack was thwarted at the last minute by Shin Bet agents assisted by the Israel Defense Forces (IDF)and police according to Army radio Other groups were in various stages of planning and preparingattacks including bombings and the kidnapping of civilians or soldiers for the release of Palestinians jailed in Israel The Shin Bet concluded based on its interrogations of the group members that theHamas military leadership in Gaza and abroad is exerting considerable efforts to rehabilitate itspresence in the West Bank with financing and weapon smuggling The West Bank has remainedrelatively quiet in recent years Israeli officials attributed the success in preventing violence in the area

to the cooperation between the IDF and the Palestinian National Authoritys security forces

Israeli Air Strike Kills One Gaza Militant

Xinhua | 8 September 2011

Strike follows more rocket launches from Gaza warnings of new battlesAn Israeli air strike killed an Islamic Jihad militant and wounded three others in the central Gaza

Strip town of Dier a-Balah witnesses and medical sources said Local witnesses said the militant diedafter his car was hit by a missile adding that three other people were also wounded The condition of theinjured is stable hospital sources said Earlier Wednesday an Israeli military spokesperson said a rocketwas launched from the Gaza Strip into south Israel adding the projectile landed in an open area and didnot cause injuries or damage None of the Palestinian armed factions has claimed responsibility for the

rocket attack Late on Tuesday a Palestinian militant was killed and two others injured when Israeliwarplanes targeted a group of gunmen east of Khanyounis City south of the Hamas-ruled Gaza Strip

The Gaza Strip witnessed an escalation of bloody violence between Israel and Gaza militantgroups in August leaving 26 Palestinians and three Israelis killed The violence was triggered after eightIsraelis were killed in well-coordinated operation in the Red Sea city of Eilat Israel accused Palestinianmilitants of plotting and carrying out the attack which started from the bordering Sinai Peninsula inEgypt

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1442

Libya

| back to top |

Libyan Extremist Britain Allowed To Stay Was Link To Al-Qaeda In Iran Papers Show

The Daily Telegraph | (London) By Richard Spencer Tripoli

The extremist Ismail Kamoka spent several years sending funds to terrorist groups across the Middle East

An Alleged Libyan extremist who sought political asylum in Britain regularly travelled to Iran from2002 to provide forged documents to extremists linked to al-Qaeda secret files found in a Tripoliintelligence service building have disclosed

The documents seen by The Daily Telegraph unearth British intelligence suspicions about linksbetween Iran and al-Qaeda dating back almost a decade Other details to come out of the documentssent by MI6 and found in the office of the former head of foreign intelligence and later foreign ministerMoussa Koussa who defected in March include the revelation that Britain had begun co-operating withthe Chinese security services on Islamic extremists The extent of Iranian co-operation with al-Qaedahas been disputed in intelligence communities though Iranians are thought to have provided weaponsand explosives to the Taliban in Afghanistan

A number of al-Qaeda operatives including members of the family of Osama bin Laden fled toTehran after the fall of the Taliban in Afghanistan and their precise status in Iran has been unclear Thepapers in Libya do not directly challenge the Iranian government but suggest that al-Qaeda operativeshad more freedom of movement there than previously thought The extremist Ismail Kamoka spent

several years sending funds to terrorist groups across the Middle East including some linked to al-Qaeda the files said Mr Kamoka who had been given indefinite leave to remain in Britain afterarriving from Saudi Arabia in 1994 and claiming asylum travelled from the UK to Iran viaSwitzerland in July 2002 according to one document[Article continues herehttpwwwtelegraphcouknewsworldnewsafricaandindianoceanlibya8740771Libyan-extremist-Britain-allowed-to-stay-was-link-to-al-Qaeda-in-Iran-papers-showhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1542

Nigeria

| back to top |

Bomb Explodes In Violence-Torn Nigerian City Residents

AFP | 6 September 2011

A bomb went off Tuesday in Nigerias northeastern city of Maiduguri disrupting a three-week lull inbombings in the violence-torn city local residents said [Article continues here httpnewsyahoocombomb-explodes-violence-torn-nigerian-city-residents-215718081html]

Pakistan

| back to top |

Pakistan Bans Foreign Travel For Those Involved In Bin-Ladin Probe

The News website | Islamabad in English 7 September 2011

A Pakistani commission investigating the circumstances surrounding the killing of Al-Qaidah chief Usamah Bin-Ladin has banned foreign travel for everyone involved in the probe Pakistani daily TheNews part of the Jang group which owns Geo TV reported on 7 September The paper recalled that thecommission had already directed the countrys interior ministry and the intelligence service ISI toensure that the Bin-Ladin family was not repatriated from Pakistan without the consent of the

commission

More Than 20 Killed In Two Suicide Blasts In Pakistans Quetta

Express247 TV | Lahore in English 5 September 2011

At least 22 people were killed and several others injured in two explosions in the south-westernPakistani city of Quetta on 7 September the website of the Dubai-based private Pakistani TV channelARY News reported According to the channel one blast went off near the residence of the FrontierConstabulary and another one near the commissioner office in Quetta According to the report around100 kilograms of explosives were used in each attack (ARY News website Dubai in English 07 Sep 11)

Private Pakistani English-language TV channel Express 247 carried a series of onscreen scrollswhich said police had confirmed that the two blasts were suicide attacks The report cited police sources

as saying that 25 people were killed and more than 40 injured in the attacks (Express247 TV Lahorein English 0654GMT 07 Sep 11)

BBCM notes that the attacks came after the Pakistani intelligence agency said on 5 August that ithad arrested Al-Qaidah commander Younis Al-Mauritani and two of his accomplices in Quetta

Taleban Say Quetta Blasts Revenge For Recent Al-Qaidah Arrests

AFP | 7 September 2011

The Pakistani Taleban have claimed responsibility for the twin suicide bombs in Quetta on 7 Septembersaying they were carried out to avenge the recent arrests of Al-Qadiah operatives in the city Wecarried out the attacks Taleban spokesman Ehsanullah Ehsan told AFP in a phone call from anundisclosed location

Twin Suicide Bombings In Pakistan Leave 23 Dead

Miami Herald

Twin suicide bombers attacked the home of a senior military officer Wednesday in the western city of Quetta injuring him and killing at least 23 people officials said in a possible revenge attack forPakistans recent arrest of a senior al Qaida commander [Article continues here httpwwwmiamiheraldcom201109072394264twin-suicide-bombings-in-pakistanhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1642

Philippines

| back to top |

Moro Splinter Group Threatens US Soldiers In Philippines But Capabilities Limited

Government-Rebel Negotiations Remain Difficult

Assynt | SEAsia Vol VIII No17 7 September 2011

Ameril Umbra Kato a former senior Moro Islamic Liberation Front (MILF) field commander whoresigned late last year because he rejects peace negotiations has threatened to attack US troops as wellas Filipino security forces and other Government targets US and Filipino troops are currentlyundertaking joint training exercises This is an annual event but the first time they have been conductedin central Mindanao However Katorsquos splinter group the Bangsamoro Islamic Freedom Fighters (BIFF)is believed to have as few as 200 members with generally unsophisticated weapons ConsequentlyBIFFrsquos ability to conduct an attack on US forces is likely to be limited

In this period Kato announced the creation of a political wing to his grouping the BangsamoroIslamic Freedom Movement emphasising his split with MILF Nevertheless he has not been expelledfrom MILF and so is protected by the current ceasefire with Manila though MILF has stronglycondemned Katorsquos threat against US troops It is possible that MILF leadership is content to allow himto operate relatively unimpeded in order to gain greater leverage in its negotiations with theGovernment since they can contrast their more compromising approach with BIFFrsquos threatened

violence Meanwhile negotiations between MILF and the Government continue MILF dismissed theGovernmentrsquos latest proposal for an autonomous region but both sides appear committed to continuingtalks

Russia

| back to top |

Suicide Bombings In Grozny Demonstrate Islamic Insurgencyrsquos Continuing Capabilities In

Chechnya

Stirling Assynt Reports | Report FSU Vol IV No17 7 September 2011

A series of suicide bombings in the Chechen capital on 31 August (which left nine casualties includingseven police officers) has severely undermined President Ramzan Karydovrsquos claims to have successfully

eradicated the Islamic insurgency in the Republic The first suicide bomber reportedly detonated hisexplosives in a densely populated area only 150 metres from a local Parliament building while twofurther jihadists targeted first-response units Significantly the attack occurred during the Muslimholiday of Eid a three day celebration which marks the end of Ramadan during which the risk of jihadist attacks is heightened Indeed in addition to this strike in Grozny jihadist militants carried outfurther attacks in Iraq Nigeria and Algeria during Eid this year

Although no group has claimed responsibility for this incident it bears the hallmark of theCaucasus Emirate and so was likely orchestrated by the grouprsquos newly appointed deputy KhuseynGakayev and his brother Vadalov Indeed the Gakayev brothers are believed to have been behind theattack on the Chechen Parliament in October 2010 demonstrating the grouprsquos capabilities and intent tocarry out such strikes Moreover the timing of these bombings ndash only two months after the

reconciliation of the Caucasus Emiratersquos leader Doku Umarov with Chechen commanders (see our 3August Report) ndash supports this assessment and suggests that further incidents and suicide bombings arelikely given this truce

Suspected Militant Killed In Russias Southern Republic

Interfax news agency | Moscow in Russian 7 September 2011 Russias National Antiterrorist Committee said on 7 September a militant had been killed in the Republicof Kabarda-Balkaria the corporate-owned Russian news agency Interfax reported

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1742

Saudi Arabia

| back to top |

Saudi Arabia Shopping Around For Nuke Technology

Haaretz | 8 September 2011

Ties with Pakistan may remain close as Riyadh seeks nuclear assistanceSynopsis This week brought news that Iran on its own has produced new advanced nuclearcentrifuges According to a report of the International Atomic Energy Agency Iran has begun to installthe centrifuges in its uranium enrichment facility in Natanz But the high-level source noted thatdevelopment and production of the new centrifuges began more than seven years ago That does notspeak of a great technological capability on Irans part Israeli intelligence like its American counterpartviews 2014 or 2015 as the date when Iran will be able to build nuclear weapons says the source - if itwants to and no one blocks it In Saudi Arabia in contrast they are a bit more disturbed by thedevelopments in Iran An American Department of Energy delegation visited Riyadh and met with DrHashim Yamani who heads the King Abdullah City for Atomic and Renewable Energy Saudi Arabiawants to equip itself with nuclear reactors to generate electricity The United States is interested inselling Riyadh reactors for two reasons - fat contracts and the ability to keep close tabs on nucleardevelopments in Saudi Arabia The American administration is concerned that with a nuclear programfor civilian uses Saudi Arabia would actually like to prepare the infrastructure so it could switch to

producing nuclear weapons relatively quickly should Iran possess such weapons Defense ministerSultan Bin Abdul Aziz and the countrys former intelligence chief Turki Bin Faisal reportedly favorthe preparation of a secret nuclear program for military uses in cooperation with a Sunni Muslim ally -Pakistan which possesses dozens of atomic bombs Saudi Arabia reportedly funded Pakistans nuclearweapons program in return for Pakistans promise to aid the monarchy in this area if need be

Serbia

| back to top |

Serbia Threatened By Terrorism Says Dacic

Tanjug | 8 September 2011

US officials warned Serbia of possible terrorist activity particularly against foreign interests

After a warning coming from USA officials Serbia will raise the level of security in all facilitiesbelieved to be a possible target of terrorists the countrys Deputy Prime Minister and Minister of InteriorIvica Dacic stated Wednesday in the Palace of Serbia He stated that the security measures will primarilyrefer to the facilities of foreign countries in Serbia and added that special attention will be paid to thesecurity of air traffic US officials assume that there is a possibility of new terrorist attacks in the USAand other countries including Serbia Dacic said following a meeting with Special Representative of the UN Secretary-General for Disaster Risk Reduction Margareta Wahlstrom in Belgrade and a sessionof the republic headquarters for emergency situations

Somalia

| back to top |

Six Killed In Mortar Attack In Somali CapitalShabeelle Media Network website | Mogadishu in Somali 7 September 2011

Six people were killed and several others injured after three mortars landed in Mogadishus Arjantiinneighbourhood in Kaaraan District on the night of 6 September the privately-owned Shabeelle websitereported It quoted an eyewitness as saying that two of the three mortars fired have caused thecasualties inflicting fear in the residents who returned to their homes after Al-Shabab vacated the areaearly last month Kaaraan District is one of the areas taken over by the government forces and AUpeacekeepers

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1842

United States

| back to top |

Post-911 Intelligence Reform Takes Root Problems Remain

Reuters | 8 September 2011

US intelligence agencies will forever be scarred by their failure to connect the dots and detect theSeptember 11 plot but a decade later efforts to break down barriers to information-sharing are takingroot Changing a culture of need-to-know to need-to-share does not come easily in spy circles Someofficials say they worry a decade later about a future attack in which it turns out that US spy agencieshad clues in their vast vaults of data but did not put them together or even know they existed

Yet significant changes both big and small have broken down barriers between agenciessmoothed information-sharing and improved coordination US intelligence experts say From issuing ablue badge to everyone working in the sprawling intelligence community to symbolize a commonidentity to larger moves of mixing employees from different agencies the goal is singular -- to preventanother attack

Were much further ahead David Shedd Defense Intelligence Agency deputy director said of the ability to connect the dots compared with 10 years ago Still signs of a plot to attack the UnitedStates could be missed again My worst fear and I suspect probably one that would come true is that inany future would-be or actual attack God forbid we will be able to find the dots again somewhere

because of simply how much data is collected Shedd said The political response to the failure to stopthe attack was the 2002 creation of the Department of Homeland Security pulling together 22 agenciesto form the third largest US Cabinet department behind the Pentagon and Veterans Affairs

That was followed by the creation in late 2004 of the Director of National Intelligence to overseeall the spy agencies as recommended by the bipartisan 911 commission Previously the CIA directorheld a dual role of also overseeing the multitude of intelligence agencies But in the aftermath of the2001 attacks policymakers decided that was too big of a job for one person to do effectively

Critics argued then and now that the reforms were the governments usual response to crises --create more bureaucracy But others see much-needed change It has been a tremendous improvementsaid Lee Hamilton who was the 911 commission vice chair Its not seamless there are problems andweve still got a ways to go The 2001 attacks involving airliners hijacked by al Qaeda operatives killed

nearly 3000 people in New York Pennsylvania and the Pentagon Various US intelligence and lawenforcement agencies had come across bits of information suggesting an impending attack but failed toput the pieces together The CIA had information about three of the 19 hijackers at least 20 monthsbefore the attacks the National Security Agency had information linking one of the hijackers with alQaeda leader Osama bin Ladens network the CIA knew one hijacker had entered the United States butdid not tell the FBI and an FBI agent warned of suspicious Middle Eastern men taking flying lessons

Have the reforms made America safer Officials say yes and point to the US operation thatkilled bin Laden in Pakistan in May that demanded coordination among intelligence agencies and themilitary But there is an inevitable caveat no one can guarantee there will never be another attack onUS soil On Christmas Day 2009 a Nigerian man linked to an al Qaeda off-shoot tried unsuccessfullyto light explosives sewn into his underwear on a flight to Detroit from Amsterdam It turned out US

authorities had pockets of information about him President Barack Obama used a familiar September 11phrase to describe the 2009 incident as a failure to connect the dots of intelligence that existed acrossour intelligence community

Roger Cressey a former White House National Security Council counterterrorism officialresurrected another September 11 phrase It was a failure of imaginationThe intelligence community had not seen al Qaeda in the Arabian Peninsula a Yemen-based al Qaedaoff-shoot as capable of striking the US homeland If the underwear bomber threat had originated inPakistan they would have gone to battle stations immediately Cressey said Some proposed changesin how authorities would respond to another successful attack still are pending For example creation of

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1942

a common communication system for police firefighters and other emergency personnel remainstangled up in political wrangling in Congress over how to implement it This is a no-brainer Hamiltonsaid The first responders at the scene of a disaster ought to be able to talk with one another Theycannot do it today in most jurisdictions

Former leaders of the 911 commission issued a report card saying nine of its 41recommendations remain unfinished The Office of the Director of National Intelligence hasexperienced growing pains as overseer of the 17 spy agencies churning through four chiefs in six yearsTensions over turf confusion about the DNIs role and problems herding agencies with very powerfulchiefs of their own all came to a crescendo when retired Admiral Dennis Blair the third DNI tried toassert authority over CIA station chiefs who represent the agency in different countries The positionof chief of station is one of the crown jewels of the CIA and they dont want anyone playing with theircrown jewels said Mark Lowenthal a former senior US intelligence official

After a dust-up with CIA Director Leon Panetta who now is defense secretary it was Blair whowas sent packing I think the mistake that some have made is to have viewed the DNI and the Directorof CIA as an eitheror proposition rather than the power of the two working together the DIAs Sheddsaid in an interview in his office There is a history of where that hasnt worked so well I believe it isworking much better today said Shedd who has worked at the DNI CIA and National SecurityCouncil

Intelligence experts say in the current administration Obamas top homeland security andcounterterrorism adviser John Brennan arguably has more power than any of them because he has thepresidents ear Its a reminder that bureaucratic reform or no personalities count in making nationalsecurity policy The improved sharing of secret data has led to yet another set of problems The delugeof bits and bytes has subjected intelligence analysts to information overload as they try to sift through itall for relevant pieces Our analysts still are spending way too much time on finding the informationrather than on the analysis of the information Shedd said There is just too much data to go find it all

The intelligence community wants a system developed that would automatically processinformation from multiple agencies and then make the connections for the analysts

But greater inroads into sharing data across agencies does not guarantee that another attack willbe averted The threat has evolved and officials now are increasingly concerned about a lone wolf plot

by an individual not tied to any militant group that may be more difficult to uncover Those threatswill not come to our attention because of an intelligence community intercept said John Cohen asenior Department of Homeland Security counterterrorism official

They will come to our attention because of an alert police officer an alert deputy sheriff analert store owner an alert member of the public sees something that is suspicious and reports it Cohensaid One measure of the success of post-911 reforms is that a decade later the United States has not hada similar attack Now that could be luck that could be skill we dont really know Hamilton said Butin all likelihood what we have done including the establishment of the Department of HomelandSecurity and the transformation in intelligence and FBI has certainly been helpful[Article continues here ]httpnewsyahoocompost-9-11-u-intelligence-reforms-root-problems-052514320html

Comment the value added provided by the Office of the DNI remains an open question for many withinthe Intelligence Community (IC) and is a favored theme of corridor discussion in IC-member agenciesOn the other hand there is broad agreement among intelligence officials that the degree of cooperationand coordination between intelligence agencies and the character of intelligence sharing has vastlyimproved The fact that there has not been a successful major attack on US soil since 911 ndash not forlack of plotting ndash is in great part testimony to this more effective cooperation

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2042

Jihadist Suggests Striking New York City Bridges

All SITE Intelligence Group | 6 September 2011

A jihadist pointed to what he found to be a weak point of suspension bridges and directed his messageto those who love blasting and explosions In a message posted on the Shumukh al-Islam forum onSeptember 6 2011 the jihadist Abu Suleiman al-Nasser gave a picture of the Verrazano Bridge inNew York on which he drew a red box and arrow on the bridges center He then gave a map on whichhe circled the various bridges in New York City and its boroughs A fellow jihadist offered his ownidea giving a picture of the Hoover Dam and explaining that there is no target more important thandams He wrote that striking a dam may lead to the submerging of cities and the killing of thousands of people and in the case of the Hoover Dam would impact Las Vegas the capital of gambling anddebauchery

Counterterror Veteran is New Deputy FBI Director

Atlanta Journal Constitution | 1September2011

A 24-year FBI veteran with extensive counterterrorism experience Sean Joyce has been named the lawenforcement agencys new deputy director Elevated to the No 2 post within the FBI by Director RobertMueller Joyce replaces Timothy Murphy who is retiring after 23 years with the bureau Since last yearJoyce has been executive assistant director of the national security branch responsible for the FBIs

national security and intelligence operations He earned the Attorney Generals Award for ExceptionalService in 2004 for work on a counterterrorism squad in Dallas In 2008 he was named chief of thecounterterrorism divisions international terrorism operations section with responsibility forinternational terrorism matters within the United States hellip[Complete article is available here httpwwwajccomnewsnation-worldcounterterror-veteran-is-new-1153018html]

Top CIA Official Obama Changed Virtually Nothing

Salon | 1 September2011

PBSs Frontline is airing an examination of Top Secret America on September 6 The show includes arare and lengthy interview with 34-year-CIA-veteran John Rizzo who is described as the most

influential lawyer in CIA historyHere is one quote they include from Rizzo With a notable exception of the lsquoenhanced

interrogationrsquo program the incoming Obama administration changed virtually nothing with respect toexisting CIA programs and operations Things continued Authorities were continued that wereoriginally granted by President Bush beginning shortly after 911 Those were all picked up reviewedand endorsed by the Obama administration hellip[Complete article is available herehttpwwwsaloncomnewspoliticsbarack_obamastory=opiniongreenwald20110901obama]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2142

General Counterterrorism News| back to top |

The Terrible Missed Chance

Newsweek | 4 September 2011

Special Agent Harry Samit of the FBIs Minneapolis field office knew he was looking into the eyes of aterrorist It was early afternoon on Friday Aug 17 2001 Across from him sat Zacarias Moussaoui a33-year-old French-born student arrested the day before for overstaying his visa Moussaoui had paidmore than $8000 in cash that summer to sit in a cockpit simulator in a flight school in the suburbs of Minneapolis and learn - in a matter of days - the basics of how to fly a 747-400 Samit a formerintelligence officer at the Navys celebrated Top Gun flight school felt sure the man across the desk from him was a Muslim extremist who was part of a plot to hijack a commercial jetliner filled withpassengers The trick Samit wrote in a soon-to-be-released excerpt of a book hes written about thecase was getting Moussaoui to admit this and reveal details and associates to allow us to stop the plot

Surely the bureau brass in Washington would share his concern Samit thought He was wrongThat same day halfway across the country in the fluorescent-lit hallways of the J Edgar Hoover

FBI headquarters building in Washington counterterrorism supervisors were treating Samits firstreports about Moussaoui with skepticism even contempt Michael Maltbie a DC counterterrorism

specialist insisted repeatedly in the days after the arrest that there was no clear link between Moussaouiand Al Qaeda - the link needed for a warrant Maltbie thought Moussaoui was a dirty bird he latertold investigators but favored deporting him to France

Believing a hijacking might be imminent Samit appealed to his boss in Minneapolis SpecialAgent Greg Jones Jones picked up the phone on Aug 27 and called Maltbie at FBI HQ

Moussaoui he said might be part of a plot to get control of an airplane and crash it into theWorld Trade Center or something like that

Maltbie scoffed You have a guy interested in this type of aircraft Maltbie replied accordingto FBI documents That is it (Maltbie declined requests for an interview)

At least Maltbie was paying attention Michael Rolince who ran the FBIs InternationalTerrorism Operations Section was arguably the bureaus most important go-between with the White

House on domestic terrorist threats in the summer of 2001 He tells Newsweek he spent less than 20seconds being briefed on the Moussaoui case that August His office was inundated with terrorismprobes he said since Moussaoui was in custody already he posed no immediate threat Did it rise tothe level of something that I would take upstairs Rolince asks The answer is no

At CIA headquarters alarm bells were ringing loudly CIA Director George Tenet was briefedon Moussaoui within days of the arrest receiving a paper with the eye-catching headline IslamicExtremist Learns to Fly But the FBIs acting director that summer and the bureaus most seniorcounterterrorism official were left in the dark[Article continues here httpwwwthedailybeastcomnewsweek20110904the-terrible-missed-chancehtml]

Pan Am Flight 103 - Lockerbie Bombing - al-Megrahi CIA FilesWebwire | 31 August2011

BACM ResearchPaperlessArchivescom has announced the publishing of CIA files related to the PanAm Flight 103 Lockerbie Bombing

The files can be downloaded at no cost at httpwwwpaperlessarchivescompanam103ciahtml The files date from 1984 to 1999 These are the most recent files on Pan Am 103 released by the

CIA This set of files is unique because it includes memos on the direct handling of an intelligencesource This type of information is exempt from the Freedom of Information Act (FOIA) and is not oftenreleased by the Agency

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2242

The files cover information received by the CIA on Abdel Basset al-Megrahi Al-Megrahi is theonly person ever convicted in the Pan AM 103 case The Scottish government in 2009 allowed al-Megrahi to be released from custody and returned to Libya because of his failing health With the recentfall of Muammar Qaddafis regime there have been renewed calls for al-Megrahi to be returned toScottish custody or extradited to the United States and put on trial[Complete article is available here httpwwwwebwirecomViewPressRelaspaId=144692]

Getting The Caucasus Emirate Right

CSIS | August 2011

ldquohellipThis report aims to set straight a rather distorted record It demonstrates the veracity of three vitallyimportant facts usually obfuscated in discussions of the subject (1) the longstanding and growing tiesbetween the CE and its predecessor organization the ChRI on the one hand and al Qaeda (AQ) and theglobal jihad on the other hand (2) the importance of the CE jihadi terrorist network as a united andorganized political and military force promoting jihad in the region and (3) the salience of local culturaland the Salifist jihadist theo-ideology and the influence of the global jihadi revolutionarymovementalliance as key if not the main factors drive the ldquoviolence in the North Caucasusrdquohelliprdquohttpcsisorgfilespublication110829_Hahn_GettingCaucasusEmirateRt_Webpdf

7 Things You Didnrsquot Know About the War on TerrorForeign Policy | By Eric Schmitt and Thomas Shanker 6 September 2011

From an attempt to negotiate with Osama bin Laden to a proposal to threaten to bomb Mecca its been awild decade for the US national security establishment

Our new book Counterstrike The Untold Story of Americas Secret Campaign Against Al Qaeda is in many ways asummary of the past decade of our reporting on the military intelligence community and domestic law enforcement as itentered a new era of Darwinian evolution to counter violent extremism

It also is our deep dive into a decade of American counterterrorism efforts -- from the work of commando trigger-pullers and spies on the ground up to senior political leaders who wanted to defendthe nation (and get re-elected) Our efforts to report and write this book allowed us to uncover many newmissions never discussed before -- and gave us an understanding of how the war on terror had changedover the last decade

Our book assesses the 10 years since 911 as the military divides the fight into tactical missionson the battlefields of modern terrorism then the operational advancements that provided the means tosuccess while not securing final victory and at the top the strategic level of policy debates about howthe nation should combat this threat to its security

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2342

Here are seven vignettes from Counterstrike that offer glimpses into the thinking of policymakers andcommanders in early days after the Sept 11 attacks and how that thinking evolved over the followingdecade into a more whole-of-government approach to combating terrorists

1 Bush Tried to Negotiate with al Qaeda

The George W Bush administration like all of its predecessors swore never to negotiate with terroristsBut it did undertake an extraordinary and extraordinarily secret outreach effort to open a line of communication with Osama bin Laden and al Qaedas senior leadership It was an attempt to replicatehow the United States tried to sustain a dialogue with the Soviet Union even during the darkest days of the Cold War when White House and Kremlin leaders described in private and in public a set of acceptable behaviors -- and described with equal clarity the swift vicious even nuclear punishment forgross violations

In the months after the Sept 11 attacks Bushs national security staff working through theintelligence agencies made several attempts to get a private message to bin Laden and his inner circleThe messages were sent through business associates of the bin Laden familys vast financial empire aswell as through some of the al Qaeda leaders closest relatives a number of whom were receptive toopening a secret dialogue to restrain and contain their terrorist kinsman whom they viewed as a blot on

their name (To be sure other relatives were openly hostile to the American entreaties)According to a senior American intelligence officer with first-hand knowledge of the effort the

response from Osama bin Laden was silence And the effort was suspended

2 Sometimes a Wedding Is Just a WeddingIn the early days after the Sept 11 attacks the CIA and FBI vied to produce the most compellingintelligence reports that tracked suspected terrorist plots The agencies often worked at cross purposessometimes unwittingly At one point in early 2002 both agencies were tracking what American analystssaid were growing preparations for a major wedding somewhere in the Midwest (In terroristvernacular the word wedding is often code for a major attack)

Dribs and drabs on this wedding planning made their way to President Bush from bothagencies independent of each other of course

Finally over the Easter holiday during a video-teleconference with top aides in Washingtonfrom his ranch in Crawford Texas Bush stopped the briefing exasperated by the discrepancies in therival agencies reporting about the suspected threat

George Bob get together and sort this out Bush told his CIA director George J Tenet andFBI director Robert S Mueller III

Bushs instincts were correct When the analysts finally untangled their clues it turned out thatthe ominous wedding really was just that the matrimony of a young man and a young woman fromtwo prominent Pakistani-American families There was no threat There was no plot

3 The Threat to Bomb MeccaAs fears of a second attack mounted following the 911 strikes US government planners franticallycast about for strategies to protect the country Even the most far-fetched ideas had a hearing howeverbriefly In one case some government planners proposed that if al Qaeda appeared ready to attack America again the United States should publicly threaten to bomb the city of Mecca in Saudi Arabiathe holiest site in all of Islam in retaliation Just nuts one Pentagon aide wrote to himself when heheard the proposal The idea was quickly and permanently shelved

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2442

4 The SEAL Raid in Iran That Didnt HappenWhen US forces routed the Taliban government in Afghanistan and forced bin Laden and his toplieutenants to flee many senior al Qaeda leaders including bin Laden and his deputy Ayman al-Zawahri escaped to neighboring Pakistan But a separate group including the al Qaeda leaders sonSaad bin Laden fled to northern Iran where American troops would not pursue them and the Iranianswould likely not detain them But the Shiite clerics running Iran placed the al Qaeda operatives and theirfamily members under virtual house arrest and they became a shield against possible attacks from theSunni-based terrorist organization

One plan in particular illustrated the bold thinking and wildly unrealistic aims of the militarysinitial approach after 911 to kill or capture terrorist leaders The plan called for hunting the eight to 10senior al Qaeda leaders and operatives who had sought refuge in Chalus an Iranian resort town on theCaspian Sea where they had been detained

At the Joint Special Operations Command at Fort Bragg NC military planners drew up optionsfor Navy SEALs to sneak ashore at night using state-of-the-art mini-submarines Once they landed theSEALs would slip past Iranian guards to snatch the al Qaeda leaders Another option called for SpecialOperations helicopters to spirit American commandos into the town and whisk them out again with theirquarry The Americans went as far as conducting two or three rehearsals at an undisclosed locationalong the US Gulf Coast in early 2002 They conducted small-boat insertion exercises involving about

30 Special Operations personnel most SEALs and eventually concluded the mission was feasible if they were provided with more detailed intelligence on the locations of the al Qaeda members and thesecurity around them

The logistics of the mission were daunting Chalus sits at the edge of the Elburz coastal mountainrange about 70 miles north of Tehran and the failed rescue of the American hostages in Iran in April1980 loomed large in commanders memories Eventually Gen Richard B Myers the chairman of theJoint Chiefs of Staff rejected the mission as too risky and too politically volatile Many of the al Qaedaoperatives are reportedly still there

5 Intelligence Hauls of Unusual Size

US intelligence and military commandos have carried out tens of thousands of raids in the decade since911 The amount of material seized from terrorist and insurgent targets has grown to a massive sizeThe Defense Intelligence Agency (DIA) operates exploitation triage centers and giant warehouses forstoring intelligence products -- in war zones rear headquarters in countries like Qatar and back in theUnited States One intelligence analyst said that walking into one of the warehouses for documents andmedia exploitation reminded him of the final scene in Raiders of the Lost Ark when the captured Ark of the Covenant is crated up and rolled into a cavernous storage area that contains all the governmentsother dangerous secrets

All told more than two million individual documents and electronic files have been cataloguedby media type hard copy phone number thumb drive Each is inspected by a linguist working with acommunications analyst or computer expert

The DIA analysts are joined by specialists from other agencies including the FBI and the DrugEnforcement Administration Yet given the overwhelming volume no more than about 10 percent of thecaptured intelligence has ever been analyzed

Intelligence officers say they simply are overwhelmed and untold quality leads may still beburied in the piles of computers digital files travel documents and pocket litter

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2542

6 The Digital Counterjihad Cyberspace is the terrorists ultimate safe haven Its where they recruit raise money and even plotattacks using coded language while playing online video war games The US government fights back

One technique is called false band replacement whereby the intelligence agencies infiltratemilitants networks and post their own material to counter extremist efforts on those same jihadistwebsites The trick is to forge the onscreen trademarks -- web watermarks -- of al Qaeda media sites

This makes messages posted on these sites official and sows dissent and confusion among themilitants

This Internet spoofing can be used in support of more traditional combat missions There is atleast one case confirmed by American officials in which a jihadist website was hacked by Americancyberwarriors to lure a high-value al Qaeda to a surreptitious meeting with extremist counterparts -- onlyto find a US military team in waiting

Getty images

7 First Kill the MullahsUS counterterrorism officials have learned fighting terrorists effectively means targeting specific nodesof that network that support and enable militants who strap on suicide vests This strategy focuses onneutralizing enablers such as the financiers gun-runners and logisticians Among these terror linchpins

are religious leaders who bless attacksHeavenly reward will not await a suicide bomber unless his death and those of his victims is

deemed halal in keeping with Islams sacred sharia law Each militant network has a sharia emir usuallyat the level of a sheikh or mullah In Iraq American commanders specifically killed emirs to throw awrench in a suicide bombing networks

Take him out and suicide bombings from that network are frozen until he is replaced said onemilitary officer with command experience in Iraq hellip[Complete article is available herehttpwwwforeignpolicycomarticles201109067_things_you_didn_t_know_about_the_war_on_terror]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2642

Dick Marty Rendition Report Condemns lsquoCult of Secrecyrsquo

BBC News | 8 September 2011

A report for Europes human rights watchdog has called for greater scrutiny of secret services andsupport for whistleblowers The Council of Europe investigated how countries like Britain GermanyRomania and Lithuania assisted the US with the rendition of terror suspects It said a cult of secrecyhad helped Western governments cover up abuses Defending whistleblowers it singled out USsoldier Bradley Manning accused of passing secrets to Wikileaks He had acted as a whistleblowerand should be treated as such CoE rapporteur Dick Marty wrote in the report which was due to besubmitted to the CoEs Parliamentary Assembly The soldier is currently in a US military prisonawaiting trial for passing restricted material to the controversial website

But the report praised Mr Manning and Wikileaks itself for uncovering evidence of renditionThe CoE represents 47 member-states including both EU countries and Russia and other ex-Sovietstates Mr Martys report focused on the record of Western states explaining that it was based oninvestigations into European links to the controversial US policy of rendition for terrorism suspectsThe CIA allegedly flew terror suspects around the world for interrogation in the years after 911 holdingthem in secret prisons in Europe and elsewhere

No licence to kill

In his 48-page report - entitled Abuse of State Secrecy and National Security - Mr Marty looked at thelevel of control exercised by European states over their security services He urged all states to useindependent parliamentary committees to oversee the work of their secret services saying this was of vital importance for the rule of law and democracy Mr Marty argued that Western governments wereusing the notion of state secrecy to shield their intelligence services from accountability for seriousviolations committed during anti-terrorist operations We consider that this is simply unacceptablehe wrote

A licence to kill (or to abduct and torture) only exists in certain films and in dictatorialregimes In democratic systems parliaments as representatives of the people have a right and duty toknow what the government is doing in the name of the people Mr Marty praised investigative journalists and non-governmental organisations for their work in exposing abuses of authority Stressing

the fundamental role whistleblowers had to play in an open society he warned against a real cult of secrecy as an instrument of power

While it was up to the courts to decide if Bradley Manning had committed any crime he wrotethe CoE was indebted to him for the publication of a recording of a helicopter attack in Iraq in whichthe crew seems to have intentionally targeted and killed civilians

Thanks to Mr Manning he said a large number of embassy reports had allowed us to learnsignificant details of important recent events which are obviously of general interest We therefore join Amnesty International in expressing our worries as to the treatment he receives Mr Marty wrote inthe draft report[Article continues here httpwwwbbccouknewsworld-europe-14820145]Comment This report demonstrates that Dick Marty is not as De Gaulle would say a serious man To

suggest that Bradley Manning is a hero and intelligence agencies bent on defeating terrorists arecriminals should say it all Manning knowingly violated his oath and willfully provided enormousamounts of classified material to WikiLeaks For Marty this is a good thing in the name of transparencyMarty always injudicious and anti-American in his remarks is now moving at warp speed into crackpotterritory

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2742

Al Qarsquoida amp its Affiliates| back to top |

Al Qaeda Is Down Not Out

Los Angeles Times | By Amy Zegart 7 September 2011

US talk of defeating terrorism is dangerously prematureTalk of strategically defeating Al Qaeda is all the rage in the White House these days Defense

Secretary Leon Panetta used the D-word in July President Obama declared in his new counter-terrorism strategy We can say with growing confidence that we have put Al Qaeda on the path todefeat Compared to the woeful state of the economy terrorism has become the administrations feel-good story of the year

Defeat is a big word It is also dangerously misleading Yes the United States has made greatstrides in the last decade to harden targets improve intelligence and degrade the capabilities of violentIslamist extremists Osama bin Ladens death was a major accomplishment But the fight is nowhereclose to being won and Americas most perilous times may lie ahead Three reasons explain why

The first is that strategically defeating Al Qaeda is not nearly as important as it sounds After911 Al Qaeda morphed into a more complicated decentralized and elusive threat consisting of threeelements core Al Qaeda affiliates or franchise groups operating in places like Yemen and Somalia with

loose ties to the core group and homegrown terrorists inspired by violent extremism often through theInternet in the comfort of their own living rooms

Core Al Qaedas capabilities started degrading in 2001 when the US invaded Afghanistandismantled training camps ousted the Taliban and sent Bin Laden running The CIA has estimated thecore group remaining in the AfghanistanPakistan region to number 50 to 100 fighters The last time BinLaden oversaw a successful operation was 2005 when Al Qaeda struck the London transit system

But plots by homegrowns and franchise groups have risen dramatically in recent years The 2009Ft Hood shooting the worst terrorist attack on US soil since 911 was the work of a homegrownterrorist The mastermind of the 2010 Times Square car bomb plot was a naturalized American citizentrained by the Pakistani Taliban not Al Qaeda Another franchise group Al Qaeda in the ArabianPeninsula was behind the foiled 2009 Christmas Day underwear bomber aviation plot and the 2010

plot to explode tampered printer cartridges aboard cargo planes The Bipartisan Policy Center reported11 violent Islamist extremist terrorist incidents against the US homeland in 2009 the most since 911Nearly all involved what former CIA Director Mike Hayden calls a witches brew of radicalizedAmericans and franchise groups

The second reason why talk of defeat is premature has to do with weapons Terrorism againstAmericans is nothing new The potential for terrorist groups to acquire weapons of mass destruction isIn 1995 a Japanese cult released sarin nerve gas in the Tokyo subway killing 12 people and injuringthousands It was the first WMD terrorist attack in modern history and it sparked a wave of presidentialterrorism commissions years before Bin Laden became a household name

It is this specter of the lone fanatic or small group armed with the worlds most devastatingweapons that keeps experts up at night In 2005 60 leading nuclear scientists and terrorism experts were

asked how many believed the odds of a nuclear attack on the US were negligible Only three or fourhands went up most were far more pessimistic Today there is enough nuclear material to build120000 weapons As long as fissile material is poorly stored and rogue states like Iran and North Koreacontinue their illicit weapons programs nuclear terrorism remains a haunting possibility

The third reason is that the FBI has not yet become a first-rate domestic intelligence agencyAnalysts whose work is vital to success are still second-class citizens labeled support staff alongsidesecretaries and janitors and passed over for key jobs including running the bureaus intelligence unitsThe FBIs information technology is so antiquated it belongs in a museum And the old crime-fighting

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2842

culture still lives There is now a move afoot to shrink new classified facilities so that agents dont haveto waste time away from their cases to read intelligence documents thereStrategically defeating Al Qaeda sounds too good to be true Because it is Amy Zegart is a senior fellow at Stanfords Hoover Institution and the author of Eyes on Spies

Congress and the United States Intelligence Community

US Counterterror Chief Al-Qaida On Steady Slide

Bostoncom | 31 August 2011

White House counterterrorism chief John Brennan said al-Qaida is on a steady slide after the death of al-Qaidas latest second-in-command in Pakistan Brennan told The Associated Press on Wednesdaythat its a huge blow in the first official White House comment since Atiyah Abd al-Rahmans reportedkilling by CIA drone strike in Pakistans tribal areas last week

Al-Qaida is sort of on the ropes and taking a lot of shots to the body and the head Brennansaid This is a time not to step back and let them recover a message he says hes sending to hiscounterparts in Pakistan[Article continues herehttpwwwbostoncomnewsnationwashingtonarticles20110831us_counterterror_chief_al_qaida_on_steady_slide ]

Al-Qaeda (AKA Al-Qaida Al-Qarsquoida)

Council on Foreign Relations | 29 August 2011

ldquoAl-Qaeda an international terrorist network is considered the top terrorist threat to the United StatesThe group is wanted for its September 11 2001 attacks on the World Trade Center and the Pentagon aswell as a host of lesser attacks To escape the post-911 US-led war in Afghanistan al-Qaedas centralleadership fled eastward into Pakistan securing a safe haven in loosely governed areas there In July2007 US intelligence agencies found that the organization was regrouping and regaining strength inthese tribal areas along the border with Afghanistan though targeted killings of senior al-Qaeda leadershave since diminished the groups command and control capabilities In February 2009 Director of National Intelligence Dennis C Blair told lawmakers that the groups core is less capable and effective

than it was a year ago The killing of al-Qaedas top leader Osama bin Laden by US forces in Pakistanin May 2011 served a significant blow to the organization but analysts say al-Qaeda remains deadlywith its networks spread all over the world Plus a number of affiliated groups have gained prominencein recent years complicating the task of containing the organizationrdquo

[Article continues here httpwwwcfrorgterrorist-organizationsal-qaeda-k-al-qaida-al-qaidap9126]

Al Qaeda In The Islamic Maghreb

CSIS | 1 September 2011

ldquoAl Qaeda in the Islamic Maghreb (AQIM) emerged from a decades-long militant Islamist tradition inAlgeria In 1998 the Salafist Group for Preaching and Combat (Groupe Salafiste pour la Preacutedication etle Combat or GSPC) broke away from the Armed Islamic Group (GIA) because of the GIArsquos extensive

targeting of civilians Gradually the GSPC evolved to encompass global jihadist ideology in addition toits historical focus on overturning the Algerian state In 2006 the GSPC officially affiliated with alQaeda core soon rebranding itself as al Qaeda in the Islamic Maghreb In the following years AQIMwas able to conduct a small number of large-scale attacks most notably its 2007 bombing of the UNheadquarters in Algiers In recent years counterterrorism pressure and weak governance have combinedto shift the center of AQIMrsquos presence to the Sahara-Sahel region AQIM continues to make its presenceknown through smuggling operations kidnappings and clashes with security forces in the desert In thecoming years general instability within the region could allow AQIM to further expand its influencerdquo[Complete article is available here httpcsisorgfilespublication110901_Thornberry_AQIM_WEBpdf ]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2942

AQ Strategy

The Assynt Report | 11 August 2011

Executive Summary Al-Qaedarsquos broad objectives remain unchanged in the wake of bin Ladenrsquos death There

are nonetheless growing questions over al-Qaedarsquos capability Longstanding paranoiaover the use of electronic communications is heightened by the ongoing US dronecampaign whilst attacks against the West have generally been disrupted at an early stage

The Pakistani Talibanrsquos attack on a Karachi naval base in May 2011 was a significantmilitary success and the first major act of revenge for bin Ladenrsquos killing Furtherattempts to avenge his loss are certain

All parts of al-Qaeda are working within a cohesive framework with the ultimate aim of restoring the Islamic Caliphate (Khilafa) The strategic plan to support this aim wasdrafted by 40 of al-Qaedarsquos brightest thinkers in Kandahar Afghanistan in November1999 This plan consists of four phases each seven years long leading to the dissolutionof corrupt regimes and the union of all newly-liberated states within the Khilafa

Apart from mounting strategic operations al-Qaedarsquos role is to be the inspiration for atruly global jihadist movement It seeks to achieve this through provision of trainingbeing a role model for others to follow extending acceptance and adoption of its tactics

particularly suicide bombings and professionalising jihadist media to build a commonbrand and message between hitherto separate groups

Between the late 1990s and 2003 the organisation was primarily devoted to classicinternational terrorism Most effort is now spent fighting insurgencies from North Africato South Asia The way in which this strategy helps to spread the struggle has been seenin North-West Africa where the initial development of al-Qaeda in the Islamic Maghrebwas in part fed by men returning from fighting with al-Qaeda in Iraq

Since mid-2009 al-Qaeda and its affiliates have increasingly encouraged jihadist-sympathisers resident in Western countries to engage in violence themselves withoutcentral direction or training making surveillance more difficult

One of the keys to awakening the spirit of jihad was the success in portraying the US and

its allies as Crusaders in the Muslim world Al-Qaedarsquos strategy essentially requires thatthis process be kept running until the forces of jihad have grown large enough to launchsuccessful liberation operations

Despite its successes in Afghanistan al-Qaedarsquos credibility has suffered both from its failure to landanother strategic blow on the West on the scale of 911 and also excessive Muslim casualties in someoperations Similarly al-Qaeda in Iraq was set back by its excessive sectarian zeal and local resentmentat the foreign fighter presence In turn this affected the movementrsquos funding from the Gulf

Analysis Sub-Saharan African Leaders Media Focus On Threats Prior to 911

OSC Feature | Sub-Sahara Africa -- OSC Analysis 6 September 2011Statements by Sub-Saharan African leaders and African media reports on terrorism prior to the 10thanniversary of 911 focus on the growing threats from local extremists and Al-Qaida affiliatesparticularly in West Africa with little direct commentary on the anniversary or US counterterrorismpolicies This focus on domestic threats suggests that counterterrorism messages expressing solidaritywith African nations and acknowledging the evolving terrorist threat on the continent would have thegreatest resonance with African audiences

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3042

Leaders Stressing Determination To Counter Local Threats African leaders public statements reflect an ongoing concern about the threat of terrorism on thecontinent and a strong commitment to find ways to combat this threat

Nigerian President Goodluck Jonathan emphasized the governments commitment tovigorously combat terrorism following the 26 August bombing of the UN office inAbuja by Nigerian extremist group Boko Haram reported the Paris-based news agencyAFP President Jonathan is hosting Liberian President Ellen Johnson Sirleaf and otherforeign dignitaries for a three-day forum on terrorism and economic crimes the widelyread Lagos-based independent daily The Guardian reported on 4 September

Malian President Amadou Toumani Toure launched a Special Program for PeaceSecurity and Development on 9 August stating that development remained the mostviable solution to counter threats to the countrys stability reported Malis state-owneddaily LEssor[ 3] The program aimed to undermine support for Al-Qaida in the IslamicMaghreb (AQIM) according to Burkinabe web portal Lefasonet on 11 August

Somali Prime Minister Abdiweli Muhammad Gas stated on 23 August that theTransitional Federal Government planned to remove Al-Shabaab from the central andsouthern regions in Somalia with the goal of restoring peace within one year so the

country can hold national elections according to the Puntland-based Garowe Online

Experts Media Highlight New Capabilities Tactics

African experts and media outlets are warning about the evolving nature of terrorist organizations on thecontinent the terrorists pursuit of new targets and tactics and their potential for taking advantage of regional instability

Leading South African think tank the Institute for Security Studies stated on 29 Augustthat Boko Harams attack on the UN in Abuja completes Boko Harams metamorphosisinto an international terrorist group Since December 2010 Boko Haram had killed over600 people in over 70 attacks against Nigerian targets according to the think tank buthad not previously targeted Western or international interests

A 26 August article on the popular Malian web portal Maliweb voiced concern thatAQIM could benefit from Tuareg mercenaries many of whom were recently returningfrom fighting in Libya and could benefit from an increase in arms trafficking through theSahel during the Libyan conflict

Ugandas privately owned Daily Monitor reported on 19 August that AU forces inSomalia warned that Al-Shabaab planned to increase the number of kidnappings andbomb attacks as part of its new strategy to shift from controlling territory in Mogadishuto conducting more of an insurgent campaign

Concern Over Al-Qaida Presence Terrorist Collaboration

West African official statements and media reports reflect a growing concern over an increased Al-

Qaida presence in West Africa and collaboration with AQIM Al-Shabaab and Boko Haram

Nigerian security services reported that the suspected mastermind behind the 26 Augustbombing of the UN office in Abuja was a Boko Haram member with close links to Al-Qaida and Al-Shabaab according Nigerias privately owned Daily Sun

A 28 August report in the privately owned daily Nigerian Tribune claimed that the 26August bombing in Abuja was part of Al-Qaidas plans to mark the 10th anniversary of 911 and called Boko Haram Al-Qaidas ally in the region

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3142

An 8 August commentary in Burkina Fasos LObservateur Paalga said that reports of Boko Haram collaboration with Al-Shabaab and AQIM could indicate that Al-Qaida isextending its African tentacles Abdourahmane Dieng security division chief of theEconomic Community of West African States said the collaboration represented a veryserious threat according to Senegals progovernment Le Soleil on 5 August

Messages Likely To Resonate With African Audience

Sub-Saharan Africas increasing concern about the shifting nature and potential strengthening of theterrorist threat on the continent suggests that messages directly addressing the impact of terrorism onAfricans the increasingly complex nature of the threat and the need for multilateral cooperation againstterrorism are most likely to resonate with Africans

Messages expressing solidarity and sympathy for Africans affected by Boko Haram Al-Shabaab and AQIM would almost certainly resonate with a broad African audience

African political and military leaders would probably welcome acknowledgement of thecomplex and changing nature of terrorism on the continent and recognition of theirinitiatives and commitment to countering violent extremism

African leaders and medias concern about potential collaboration between Boko Haram

Al-Shabaab and AQIM suggest that they would be open to improving multilateral andcross-regional sharing of lessons learned and strategies to counter the intensification of terrorism within Africa

Aviation and Maritime Security| back to top |

Bomb Threats Force Jets To Land

Associated Press | 7 September 2011

Both landed safely one landed in Ankara Ataturk International Airport and the other at Kuala LumpurTwo flights operated by Pakistans state-owned airline received bombs threats on Wednesday

and both landed safely one in Turkey the other in Malaysia officials said No bombs were found The

first flight was headed for Manchester England when it was notified of the threat near the Bulgariancapital of Sofia The crew contacted the control tower in Istanbul to seek permission for the landingstate-run Anatolia news agency reported Authorities quickly evacuated all 378 passengers from theBoeing 777-300ER aircraft after it parked at a remote corner of the International Ataturk Airport andbomb squads began searching the plane with sniffer dogs Anatolia reported PIA spokesman MashoodTajwar confirmed the flight received a threat and landed All passengers were safe A police searchturned up no bomb officials said Later a second PIA flight from Islamabad to Kuala Lumpur alsoreceived a bomb threat It landed in Kuala Lumpur and all the passengers disembarked safely saidTajwar The UK-bound Pakistan International Airlines plane was forced to make an emergency landingat Ataturk Airport in Istanbul after receiving a bomb threat Malaysias airports authority said thepassengers were being screened and the plane was isolated in a parking area while being searched bypolice No bomb was found

It said the plane carried 164 passengers and 13 crew Azmi Murad senior general manager forthe authority said the Pakistani airline informed it that the warning came by email Mr Tajwar gave nodetails on the nature of the threat or how it was delivered Pakistan is home to al Qaedas top leadershipMilitants who trained there have been responsible for many of the attacks and failed plots in the USand Europe since Sept 11 2001 when planes hijacked by al Qaeda militants destroyed the World TradeCenter in New York and crashed into the Pentagon The bomb threats came four days before the 10thanniversary of 911 but there was no apparent link to Islamist militants who typically do not alertauthorities in advance The FBI and Homeland Security department issued warnings last weekend aboutal Qaeda threats to small airlines

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3242

Commentary amp Opinion| back to top |

From Terror Group Founder To Libyan Rebel Military Commander

ABCNews | 29August 2011

The same man who triumphantly led Libyan rebels into Gadhafis compound last week first came to theattention of the US intelligence community years ago - as a founder of a terror group

Abdelhakim Belhaj who was recently appointed to Tripolis rebel military council was one of the original founders of the Libyan Islamic Fighting Group an anti-Gadhafi group which was laterdesignated by the US State Department as a terrorist organization with links to al Qaeda according toUS government reports

We proudly announce the liberation of Libya and that Libya has become free and that the ruleof the tyrant and the era of oppression is behind us a victorious Belhaj told reporters after the stormingof Gadhafis Bab al-Aziziya compound last week Ousting Gadhafi had been the main objective of theLIFG since its inception in the early 1990s even if some of the fighters believed that meant puttingAmericans in the crossfire

The group carried out operations against the Libyan government including at least four suspectedassassination attempts against Gadhafi in the 1990s and was also believed to be connected to a series of suicide bombings in Casablanca Morocco in 2003 the US State Department reported As relationsbetween the US and Gadhafi improved in the mid-2000s some LIFG leaders cultivated relationshipswith top al Qaeda leaders including Osama bin Laden and were suspected of funneling fighters to Iraq tocarry out operations against US soldiers

When the LIFG was designated a terror organization in 2004 it was meant as a gesture of solidarity with the Libyan government according to a March 2011 congressional report

Contrary to several US government reports Libyan rebel ambassador to the US Ali Aujalitold ABC News that the LIFG was never connected to al Qaeda and did not carry out terrorist operations

They were only opposed to Gadhafi during his rule and paid the price for that by beingoppressed by the regime Aujali said

The CIA first publicly voiced its concerns about the connection between the LIFG and al Qaedain 2004 when then-director George Tenet testified before the Senate Select Committee on Intelligenceand listed the LIFG among groups that represented an immediate threat [that] has benefited from alQaeda links[Article continues here httpabcnewsgocomBlotterterror-group-founder-libyan-rebel-military-commanderstoryid=14405319]

Interview With Saudi Sheik Wajdi Al-Ghazawi

MemriTVcom

Sheik Wajdi al-Ghazawi owner of al-Fajr TV criticizes extremist atmosphere in Saudi Arabia and saysafter 911 They Handed Out Sweets on the Streets of Mecca

Following are excerpts from a statement by Saudi Sheik Wajdi Al-Ghazawi owner of Al-FajrTV which was posted on YouTube on August 4 2011

Wajdi Al-Ghazawi When Al-Qaeda and Osama Bin Laden were at the height of their mightthey were extremely popular in Saudi Arabia From mosque pulpits across Saudi Arabia preacherswould pray for their success Moreover from the pulpits of the most important mosques ndash the Al-HaramMosque in Mecca and the Nabawi Mosque in Al-Madina ndash direct prayers for the success of Al-Qaedawere made during the days of the bombing of Tora Bora Oh Allah help our brothers in AfghanistanThese supplications were made during evening prayers as well as Friday prayers The preachers wouldpray for them in violation of the ministrys instructions

When the twin towers in New York were attacked they handed out sweets on the streets of Mecca By Allah they did I witnessed this myself The young people bowed in prayer and hugged one

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3342

another out of joy People were in heaven because of these young men who destroyed America andbombed this idol Am I right or not Was it like that or not

Back then when the Taliban broke off a piece of the nose of the Buddha statue which was hewnin the mountain an entire sermon was dedicated to it in the mosque in Mecca and the preacher was laterreprimanded for this sermon The entire Saudi people supported and loved Al-Qaeda

This went on until our brothers in Al-Qaeda ndash and I dont know what was going through theirminds ndash began to carry out operations inside Saudi Arabia Thats when we all raised our hands andsaid Youve gone too far We wont support you in this

The atmosphere here in Saudi Arabia is one of extremism It is characterized by focusing onminor details Many things are forbidden Yes maybe they are indeed forbidden but by forcing peopleto avoid them and by acting as if these were major sins an atmosphere was created that gave rise toextremist youth who might act recklessly at the most trivial provocation

For instance we blew out of proportion the issue of music the issue of smoking or the issue of hanging pictures in public places True there are clear texts on these issues but the young peopleembraced these issues as if they were fighting usury fornication or alcohol No these are not among theseven major sins So our society has become extreme

This extremist atmosphere has given rise to people who accuse others of heresy and people whopurport to be waging Jihad It has created genes that gave rise to cells of Al-Qaeda and other terrorists

We must examine our breeding ground in which these young men were sownBy Allah what can possibly emerge from such an atmosphere Muftis who accuse others of

heresy sheiks who incite and young people who bomb Am I right or not[Complete clip is available here httpwwwmemritvorgclipen3099htm]

Legal Aspects amp Lawfare| back to top |

Revisiting A Stale Counterterrorism Law

Council on Foreign Relations | 1 September 2011

ldquoNearly a decade after 911 the United States still relies on the 2001 Authorization for the Use of Military Force (AUMF) for the killing and detention of those considered responsible for or associatedwith the terrorist attacks But CFR national security law expert John Bellinger says it is becomingincreasingly difficult for the Obama administration to justify some of its counterterrorism operationsunder this limited statutory authority It has been used in defense of actions including drone attacks onindividuals as well as the targeting of groups in Yemen and Somalia that may have only the mosttenuous affiliation or association to the 911 attack A revised AUMF should clarify those operations aswell as the issue of detention specifically which individuals can be detained for how long and subjectto what processes There also needs to be greater effort at the international level he adds to fill thegaps in the law that covers conflicts between states and non-state actorsrdquohelliprdquo[Complete article is available here httpwwwcfrorgcounterterrorismrevisiting-stale-

counterterrorism-lawp25742]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3442

Narco-Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector[Complete article is available here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Mexicos Cartels Move Into Extortion

At a construction site of an apartment building in the heart of the Mexican capital a company engineerruns through his weekly payroll sheet He has salaries written out for carpenters bricklayers andelectricians At the bottom of the sheet is a notation of $200 for ldquosecurity servicesrdquo next to a nicknameldquoEl Indiordquo mdash the Indian [Complete article is available here

httpwwwtucsonsentinelcomnationworldreport090611_mexico_cartels_bribesmexicos-cartels-move-into-extortion ]

Seven Die In Mexican Pacific Port City

Latin American Herald Tribune

Seven people died in separate shootings in Mazatlan a port city in the northwestern Mexican state of Sinaloa with some of the incidents drug-related a police spokesman told Efe [Complete article is available herehttpwwwlahtcomarticleaspCategoryId=14091ampArticleId=423061]

Tijuana Violence Slows As One Cartel Takes Control

BorderlandBeatcom

Mexicos famously seedy border city of Tijuana is enjoying a lull in drug murders as the countrys mostpowerful cartel gains the upper hand over its rivals [Complete article is available here httpwwwborderlandbeatcom201109tijuana-violence-slows-as-one-cartelhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3542

Network Notes| back to top |

Canadian data foreign threats Spying in the digital age (Suggested by a reader in Lithuania ndash thanks) Globe and Mail | By Colin Freeze 31 July 2010

A government spy agency thatrsquos prohibited from monitoring Canadian citizens is now usingldquoinformation about Canadiansrdquo to zero in on foreign threatsThe ambiguous statement found in a new government report detailing the activities of CommunicationsSecurity Establishment Canada could sanction a range of intelligence-gathering activities ndash includingthe controversial practice of mining ldquometadatardquo from digital communications

Metadata ndash often called data about data ndash are found in e-mails and their attachments and containdigital signatures that can reveal when where and by whom documents were created

The collection of metadata has caused controversy in other countries but never in Canada wherethe Communications Security Establishment Canada operates as an ultra-secretive agency About theonly thing that is known about the classified practices is that they were halted and resumed after someldquomajor changesrdquo including directives signed by Defence Minister Peter MacKay

ldquoI cannot comment on specific operational activitiesrdquo Adrian Simpson a CSEC spokesman toldThe Globe He stressed that reviews upheld that the activities in question were ldquocarried out inaccordance with the law ministerial requirements and CSECrsquos policies and proceduresrdquo

ldquoCSEC is prohibited from directing its activities at Canadians anyone in Canada or Canadiansanywhere in the worldrdquo he said

For decades signals-intelligence agencies in the West have been allowed to safeguard nationalsecurity by eavesdropping on foreignersrsquo conversations Spies can whatever phone lines and satellitesignals they can so long as they never listen in on fellow citizens

But in the digital age governments run increasingly sophisticated dragnets scooping up andscouring through millions of intercepted Internet conversations daily Such practices create legalambiguities

ldquoThe whole issue of what constitutes boundaries for signals-intelligence agencies in cyberspaceis a big debate right nowrdquo said Rafal Rohozinski a security expert affiliated with the University of Torontorsquos Munk School

A watchdog agency that reviews the CSECrsquos activities released an annual report to Parliament onJuly 20 ldquoWhen other means have been exhausted CSEC may use information about Canadians when it

has reasonable grounds to believe that using this information may assist in identifying and obtainingforeign intelligencerdquo it reads

Sometimes collecting metadata is relatively benign It can involve aggregating sets of data tospot trends much like the way meteorologists discern national forecasts from localized information

For example while CSEC canrsquot usually monitor the communications of specific Canadian terrorsuspects it can glean insights by zooming out for big-picture patterns One way to do that MrRohozinski said would be to look at data flows between Canadian cities and Yemen where an Internet-savvy al-Qaeda offshoot works to recruit Westerners

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3642

Metadata however can be more revealing Documents that circulate on the Internet travelaround like postmarked letters marked with return addresses ndash e-mails and attachments have embeddedcodes that speak to the who where and when behind their creation

The US National Security Agency found itself mired in controversy a few years go after itskirted domestic-spying bans by secretly upholding that this sort of American metadata was fair gamedistinct from communication contents

Therersquos little to suggest the CSEC would go that far The federal agencyrsquos activities are reviewedby a watchdog body now headed by a former Federal Court of Appeal judge Robert Deacutecary appointedlast year wrote in his annual report that he was satisfied the CSEC activities in question are lawful evenif his predecessors felt them borderline

ldquoThis was the first review of these activities since hellip their resumption under new policiesrdquo thewatchdogrsquos report says It concludes that the surveillance activities are ldquoin accordance with the lawrdquo andfollow ldquomajor changes to certain policies procedures and practicesrdquo

Much of the concern arises from the possibility that CSEC could hand over metadata intelligenceto domestic law-enforcement and security agencies

As it stands the RCMP and CSIS have to develop their domestic investigations before coming toCSEC ndash usually with warrants ndash if they want specific intelligence The rules guiding handovers are strictbecause even though all agencies run surveillance operations they do so under vastly different

mandates and legal standardsThe spy agency however stood by its practicesldquoCSEC is extremely diligent when it comes to the privacy of Canadiansrdquo Mr Simpson said

[complete article is available here httpwwwtheglobeandmailcomnewsnationalcanadian-data-foreign-threats-spying-in-the-digital-agearticle2113772 ]

Cyber Attacks Against NATO Then And Now

New Atlanticist | 6 September 2011

ldquoNow that NATOrsquos Operation UNIFIED PROTECTOR over Libya is winding down it is worth

noting how few cyber incidents were directed in protest against the Alliance Certainly there was a

cyber component to the liberation of Libya but it was more about content and Internet freedom (the

most newsworthy elements here were the role of social media and the Libyan government taking largeparts of the nation offline) But compared to past history NATO cyber defenders had a relatively easy

time

ldquoNATO has not however had an easy 2011 Although there were three significant incidents we

know about none seemed to have been in direct response to operations over Libyahelliprdquo

[Complete article is available here httpwwwacusorgnew_atlanticistcyber-attacks-against-nato-then-

and-now]

The Calm Before The Storm

Foreign Policy | By Joel Brenner 6 September 2011

Cyberwar is already happening -- and its about to get much much worse A veteran cyberwarriorexplains how America can prepare itself

Revelations of wholesale electronic fraud and massive data heists have become weekly evendaily affairs A multinational electronics corporation loses personal information on more than 100million customers Cyberthieves break into an international bank counterfeit credit balances and lootATMs in four countries grabbing $9 million in just a few hours International gangs spread maliciouscode that conscripts unwitting computers into zombie armies of hundreds of thousands of similarlyenslaved machines Criminals then rent these armies called botnets as easily as you can buy a time-sharing arrangement in a beach condo No wonder the vast majority of Internet traffic is spam

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3742

Yet the loss of personal information and related criminal fraud intolerable as they are are theleast threatening face of electronic insecurity The US militarys secret network is penetratedAmericans corporate pockets are being picked clean of the intellectual property that makes the UnitedStates tick And the electricity grid that keeps the lights on and makes everything move is dangerouslyinsecure

In one remote attack on the Pentagons information systems about 10 years ago the Chinesehauled away up to 20 terabytes of information If the information had been on paper theyd have neededa line of moving vans stretching from the Pentagon to freighters docked 50 miles away in Baltimoreharbor just to haul it away Had they done so the military district of Washington wouldve become anactive theater of operations for the first time since 1865 and the Navy wouldve blockaded theChesapeake Bay But the Chinese did it electronically so who noticed

Corporate espionage by both competitors and foreign intelligence services or their surrogates isalso increasing Intelligence officials see this but cant speak openly about the specifics and Im seeingit now in my law practice The victims rarely admit it for understandable reasons Oracle whichsuccessfully sued SAP for theft of its software code was a prominent exception Google was another

When the Chinese penetrated Google in late 2009 -- yes that operation was Chinese and yes itwas done with the blessing of a member of the Politburo -- they werent after customer informationThey were after the source code that makes Google unique Nor was Google the only victim Thousands

of US and Western firms were penetrated in that affair Foreign governments -- and not only theChinese -- understand that they cannot compete with the United States militarily and politically if theycannot compete with it economically so their intelligence services want to steal its corporate intellectualproperty This is the technology that gives America its competitive edge and often it has nothing to dowith defense Ordinary companies with valuable technology are now being targeted by nation-statesThis is a new era National security and economic security have converged

The danger is not limited to the loss of technology and information however The owners andoperators of the North American electricity grid are hooking up their control systems to the Internet asfast as they can Exposing the grid to the Internet makes it marginally more efficient but it also makes itdramatically more vulnerable to disruption If you can remotely penetrate an electronic system to stealinformation you can remotely penetrate it to shut it down or make it go haywire This is why there is no

longer a meaningful difference between information security and operational security And the biggestoperational risk is the grid In contemporary society nothing moves without electricity If the grid goesout the country stops

As the Stuxnet affair demonstrated remotely engineered disruption of industrial control systemsis now a reality That episode involved the successful electronic attack on the centrifuges in the Iraniannuclear program Only a first-class intelligence agency could have pulled that off but the blueprint fordoing it -- the code itself -- is now public Many American industrial control systems run on the samekind of equipment the Iranians were using but unlike the controls on the Iranian centrifuges thecontrols on the US grid are now being connected to the Internet making them easier to disrupt Stuxnetwas a watershed there will be copycats

Other industrial control systems will also be targets Some already are Air traffic control

railroad switches and water and sewage systems are all electronically controlled now and many arevulnerable If an intruder can break into the right server electronically he can remotely shut downproduction send your goods to the wrong destination and even unlock your doors -- and delete your logentries so he leaves no record of ever having been there

The United States does not lack enemies who would attack it this way Seized al Qaedacomputers contain details of US industrial control systems In 2003 a group affiliated with thePakistani terrorist organization Lashkar-e-Taiba -- the same gang that engineered the 2008 terroristassaults in Mumbai -- plotted to attack the Australian grid Other groups conspired to attack the Britishgrid in 2004 2006 and 2009 Yet the owners and operators of the North American grid continue willy-

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3842

nilly to expose their control systems to the Internet instead of isolating and hardening it This is folly of a high order

Important conclusions for public and corporate policy follow from this vulnerable state of

affairs First cyber insecurity has operational consequences In the current and foreseeable states of technology a high degree of assurance against electronic penetration of anything connected to theInternet is not achievable Large efficient electronically connected organizations and nations aretherefore vulnerable to remotely engineered disruption as well as information theft

Second this risk cannot be eliminated -- but it can be reduced and managed As a nation theUnited States should start by isolating the grids controls from the Internet Undoubtedly there aremarginal efficiencies to be gained by seamless connectivity over a publicly accessible infrastructure butthese gains are usually exaggerated and the risk this connectivity creates is staggering The governmentand the major telecommunications carriers must also make the investment required to re-create themassive redundancies that made the wired telephone network so robust Resilience and swift recoveryshould be the goal If the consequences of cyberattacks were reduced penetration would cease to matter

Third companies that wait for the government to solve their own security problems do so attheir peril The government is broke and the IT backbone is 85 percent private so the governmentdoesnt control it The governments role in altering the status quo will be limited to setting standardsusing its purchasing power to move vendors toward better security and getting its own house in order

The government can neither secure corporate intellectual property nor protect firms against operationaldisruption

Fourth in a world in which everything cannot be protected companies must determine forthemselves what intellectual property and physical assets to isolate and safeguard Those that approachthis task seriously will quickly learn that technology is only one aspect of their insecurity and in manycases the easiest to deal with Unless technology is integrated with personnel practices and operationalsecurity it opens vulnerabilities that its users rarely understand This kind of integration requires theautomated enforcement of reasonable security policies and systematic workforce training and thatoccurs only when management the lawyers and the technologists work closely together This is an old-fashioned management challenge -- not a technological one For their part corporate boards need to takeIT security seriously and launch audits that examine how their systems are actually implemented and

used not merely how they are designed Because as the techies like to put it the weakest link in anysystem is not the silicon-based unit on the desk its the carbon-based unit in the chair Joel Brenner is author of the forthcoming America the Vulnerable Inside the New Threat Matrix of

Digital Espionage Crime and Warfare He has served as the inspector general of the National Security

Agency the national counterintelligence executive and the NSAs senior counsel He now practices law

at Cooley LLP in Washington DC

Cyberattacks Decline Slightly Symantec Report Finds

Dark Reading | 1 September 2011

Organizations worldwide are suffering damages as a result of cyberattacks but interestingly there hasbeen a slight decline in these attacks during the past 12 months according to a new report from

Symantec More than 90 percent of the more than 3300 respondents across 36 countries said theyexperienced tangible losses as a result of a hack with 84 percent reporting financial loss to the cost of abreach Around one-fifth lost at least $195000 in breaches during the past 12 months

Meanwhile Symantec attributes the unexpected bright spot of a decline in breaches toorganizations employing better cybersecurity defenses More than 70 percent of organizations sawattacks in the past 12 months a decline of 5 percent from 2010 And those that experienced anincreasing frequency of attacks dropped from 29 percent in 2010 to 21 percent this year While 100percent last year reported losses from cyberattacks 92 percent did so in 2011 The trend seemscounterintuitive given the rash of high-profile breaches this year More

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 8: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 842

Denmark

| back to top |

Family Held by Somali Pirates Released

Associated Press | 7 September 2011

Seven Danish hostages including a family with teenage children have been released by Somali piratesafter more than six months in captivity Denmarks Foreign Ministry said Wednesday The Danes -- a

couple with three children ages 12-16 and two crew members -- were captured in the Indian Ocean onFeb 24 while sailing around the world in a yacht

The seven Danes are doing well under the circumstances They are expected back in Denmark in a short time the ministry said in a brief statement It gave no details of how they were released andmade no mention of a ransom being paid No one at the Foreign Ministry was immediately available forcomment

Prime Minister Lars Loekke Rasmussen told public broadcaster DR that the Danes were on theirway back in a chartered airplane paid for by their insurance company Loekke Rasmussen said theirrelease came after a long period of negotiations Jan Quist Johansen his wife Birgit Marie Johansentheir sons Rune and Hjalte and daughter Naja were captured along with the two adult Danish crewmembers when their 43-foot yacht was seized by pirates The Johansens are from Kalundborg 75 miles

west of Copenhagen They set out on their round-the-world journey in 2009 Of course it is verycheerful news said Ole Meridin Petersen chairman of the Kalundborg yacht club where Jan QuistJohansen was a member I can imagine that the hostages after their release need quite a lot of calmMeridin Petersen told The Associated Press

The yacht was seized while the Johansens were sailing through the pirate-infested waters off EastAfrica The family very likely is aware that what they did was not so fortunate They certainly feelpretty bad about it now Meridin Petersen said Hostages are held in hot austere conditions in Somalia -- typically for many months -- before a ransom is agreed on and paid and the hijacked ships and creware released Last year a British sailing couple were released after 388 days in captivity Reportsindicated that a ransom in the region of $1 million was paid for their release Somalia hasnt had afunctioning government since 1991 one of the reasons the piracy trade has flourished hellip

[Article continues here httpwwwfoxnewscomworld20110907denmark-family-held-by-somali-pirates-since-february-releasedtest=latestnews]

France

| back to top |

Western Governments Said Protecting Intelligence Officers From Scrutiny

BBC World Service | 7 September 2011

Western governments have been accused by Europes leading human rights body of shielding theirintelligence services from accountability for serious violations BBC World Service reported on 7

September The reports author the rapporteur for the Council of Europe Dick Marty said theseviolations had occurred during anti-terrorist operations He said a licence to abduct torture or kill onlyexisted in films and dictatorships but western governments were using the notion of state security toprevent parliaments and judges from scrutinising the work of intelligence officers

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 942

India

| back to top |

Deadly Explosion Strikes Courthouse in New Delhi

New York Times | By Jim Yardley 7 September 2011

An explosion ripped through a reception area of an Indian courthouse on Wednesday morning killing atleast 10 people and wounding more than 60 others in a bombing that renewed concerns about Indiarsquos

vulnerability to terrorism It was the second bombing of the courthouse in less than four months

Relatives mourned a victim of the bombing which struck a courthouse reception area Harish TyagiEuropean PressphotoAgency

Witnesses described a chaotic scene at the Delhi High Court after the blast at 1014 am outside areception area used by litigants lawyers and visitors to enter the courthouse

ldquoIt was in shamblesrdquo said Ajay Mehrotra a lawyer who witnessed the explosion ldquoThere wastotal chaos There was blood People were running for their livesrdquo

The Indian home minister Palaniappan Chidambaram called the explosion a terrorist attack andnoted that New Delhi was already in a high state of alert with Parliament in session Mr Chidambaramsaid Indian intelligence agencies had received information in July about a possible terrorist threat to thecity which had been turned over to the local police He did not elaborate about the intelligence reportOn Thursday three people were detained for questioning by the police Reuters reported

ldquoThe bomb blast took place just outside the reception centerrdquo Mr Chidambaram said at a newsconference ldquoIt is suspected that the bomb was placed in a briefcaserdquoReuters reported that a militant terrorist group called HuJI for Harkat-ul-Jihad Islami based largely inPakistan and also Bangladesh had claimed responsibility for the attacks citing security officials

Prime Minister Manmohan Singh speaking to reporters during a visit to Bangladesh condemned

the explosion as ldquoa cowardly act of a terrorist naturerdquoldquoWe will deal with itrdquo Mr Singh said ldquoWe will never succumb to the pressure of terrorismrdquo

Indian authorities have come under renewed criticism in recent months about their preparedness toprevent terrorism Terrorist attacks are a persistent concern in India particularly in the countryrsquos rapidlygrowing cities which have endured a series of bombings in recent years

In July more than 20 people were killed in Mumbai the countryrsquos financial capital from threeblasts timed to the evening rush hour That attack raised painful memories of the bloody November 2008attacks on Mumbai in which militants trained in Pakistan swept through luxury hotels a railway stationand a Jewish center in a rampage that left more than 160 people dead

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1042

Wednesdayrsquos attack at the Delhi High Court exposed anew the weaknesses in the courthousersquossecurity In May a smaller bomb detonated near a parked car outside the courthouse causing no injuriesWitnesses told local media of seeing a black bag in flames after the blast

Rakesh Tiku chairman of the Delhi Bar Association criticized the Delhi police saying ldquothe low-intensity blast in May should have served as an eye-openerrdquo Mr Tiku said hundreds of litigants andclerks passed through the gate where the blast took place each day making it a vulnerable location ldquoTheDelhi High Court requested the Delhi police to install CCTV cameras as well as personnel to man theentrances three or four months ago but no action has been takenrdquo he said

The latest explosion occurred near Gate 5 of the High Court outside a reception center wherevisitors wait for passes to enter the building Lawyers said Wednesday was an especially busy daybecause the court heard public-interest litigation

ldquoWhat are the police doingrdquo asked Mr Mehrotra the lawyer ldquoThe lives of lawyers litigantsand judges are at stakerdquo

Another witness Brijmohan Sharma described a ldquovery loud sound the reverberations fromwhich caused me to lose my balance I got up and was surrounded by people runningrdquo He added ldquoItwas like a scene from a film People were lying on the floor with their hands cut off their legs brokenand bleedingrdquo

The last serious attacks in New Delhi took place in 2008 when coordinated blasts in a park and

in shopping areas killed more than 20 people and injured nearly 100 In those attacks the IndianMujahedeen an Islamic militant group claimed responsibility

The Delhi High Court is in the heart of the capital a short walk from the cityrsquos landmark IndiaGate Rahul Gupta a local resident said he was standing near the courthouse entrance when the groundshook from the blast throwing people onto the road outside the reception area

ldquoSecurity is one area which no one can handle in Delhi at the momentrdquo Mr Gupta said ldquoIt is thefanatical people who are creating these types of problems and trying to create panic in the publicrdquo hellip

The Indian government said that a preliminary analysis found a nitrate-based explosive withtraces of pentaerythritol tetranitrate or PETN a powerful plastic explosive often used in terror plots hellip[Article continues here httpwwwnytimescom20110908worldasia08indiahtml_r=1ampref=world]

Ten Killed In Delhi Blast

Multiple Sources

At least 10 people were killed and 65 others injured in a bomb blast outside the Delhi High Court on themorning of 7 September private Indian television channel IBN Live reported The terror strike took place in a high security area with Parliament the Prime Ministers Office and India Gate in the vicinitythe report said (CNN-IBN website New Delhi in English 07 Sep 11)

According to the website of the private Indian television channel NDT the blast went off at themain entrance to the court on Shershah Suri Road which is normally heavily guarded The bomb wentoff just before the court was about to open the report said (NDTV website Delhi in English 07 Sep 11)

Security officials were quoted by BBCWS as saying they suspected the explosives were hidden

in a briefcase that had been placed beside the desk where passes were being handed out An eyewitnesstold the BBC that it was a powerful blast shaking the ground and buildings around him (BBC WorldService 7 September 2011)

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1142

Delhi On High Alert In Wake Of Blast

Multiple Sources

The Indian capital has been put on high alert following the blast at the Delhi High Court privateEnglish-language TV news Channel Times Now reported (Times Now TV New Delhi in English0530GMT 07 Sep 11)

Hindi channel says received email from group claiming responsibility for attack Indias Hindinews channel Aaj Tak said on 7 September it had received an email claiming responsibility for the blastAccording to the report the email was sent from the ID harkatuljihadi2011gmailcom The channelsaid the police were investigating possible involvement of the Indian Mujahidin (Aaj Tak TV Delhi inHindi 7 September 2011)

Police Probe Possible Links To Al-Qaidah-Linked Group

Noida IBN Live | in English 7 September 2011

Police in Delhi are looking into claims that a Pakistan-based militant group linked to Al-Qaidah theHarkat-ul-Jihad Islami (HUJI) may have been involved in the attack Noida IBN TV reportedAccording to the report in an e-mail sent to a media house HUJI claimed it had carried out the attack inretaliation for the death sentence issued against Afzal Guru the man found guilty of involvement in an

attack on Delhis parliament almost ten years ago We owe the responsibility of todays blasts at highcourt delhi our demand is that Afzal Gurus death sentence should be repealed immediately else wewould target major high courts amp THE SUPREME COURT OF INDIA the e-mail read According tothe report it was sent from the id harkatuljihadi2011gmailcom

Home Minister Announces Probe Into Attack

CNN-IBN website | New Delhi in English 7 September 2011

Indian Home Minister P Chidambaram speaking in parliament said that investigators did not yet knowwho was behind the attack but he blamed it on terrorists seeking to destabilise the country He saidthat the National Investigative Agency (NIA) would carry out a probe into the attack

PM Denounces Blast As Cowardly Act

Doordarshan news website | New Delhi in English 7 September 2011

Prime Minister Manmohan Singh on 7 September described the blast outside the Delhi High Court as acowardly act and urged all political parties to unite and tackle any acts of terrorism state-run Indiantelevision channel DD News reported This is cowardly act of terrorist nature We will deal with it Wewill never succumb to the pressure of terrorism Singh said He said this is a long war in which allpolitical parties all the people of India have to stand united so that the scourge of terrorism is crushed

IED Explosion At Delhi High Court Domestic Islamists Likely Culprits Growing Signs Of Jihadist Agenda

Sterling-Assynt | 7 September 2011

An IED placed inside a briefcase exploded at 1017AM at an entrance to Delhi High Court wherelitigants collect their visitor passes Wednesdays are reserved for public-interest litigation and so thearea was crowded It is likely that the briefcase was placed in the queue at reception before visitors passthrough security checks There is reportedly no CCTV coverage in this area which will makeidentification of the perpetrator difficult

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1242

The blast was of at least medium intensity and created a crater between three to four feet deepAt least eleven people have died and 65 others have been injured ndash a toll that would probably have beenhigher if an international group had been responsible There were no other explosions which has thesame implication Mumbai has been placed on high alert following the attack especially as the HomeMinistry reported in August that coastal cities were under threat from pan-Islamic terror groups Noblame has yet been assigned A minor explosion occurred on 25 May (also a Wednesday) in a car-park near the Court That bomb was constructed using ammonium nitrate and is believed to havemalfunctioned causing no damage or injuries which suggests similar origins to this one

There are reports of an email from Harkat-ul-Jihadi al-Islami (HuJI) claiming responsibilityfor todayrsquos explosion but we remain sceptical about this since the group has not previously made suchclaims via email The nature of the bomb and the use of email to communicate suggest rather theinvolvement of the Indian Mujahideen (IM) Nonetheless the unverified HuJI email demands that AfzalGurursquos death sentence be repealed and this may point towards the involvement of a jihadist agendaGuru was involved in the December 2001 Parliamentary attacks in Delhi and had his mercy petitionrejected by the Home Ministry on 10 August

Todayrsquos incident indicates an increase in successful attacks by local groups A robust securityforce campaign following the 2008 Mumbai attacks diminished the capabilities of groups such as IMThey claimed responsibility for the December 2010 Varanasi bomb blast which killed one and injured

twenty people However IMrsquos likely involvement in the July 2011 blasts in Mumbai and the attack todaypoints towards the rebuilding of its capabilities and possibly also the establishment of closer ties with jihadi groups

We do not expect a spate of attacks to follow imminently but such incidents will continue tooccur possibly on a larger scale as IM continues to regroup following the security clampdownDevelopments in the cases of Afzal Guru and Ajmal Kasab (the surviving gunman from 2008) willprovide cause for further attacks Given a recent warming in relations between India and Pakistan theHigh Court attack will be unlikely to raise tensions between the two countries significantly

Indonesia

| back to top |

Islamic Groups Continue To Harass Religious Minorities Government Silence Further

Encourages Attacks Youths Beaten In East Jakarta

Assynt SEAsia Vol VIII No17 | 7 September 2011

Hard-line Islamic groups continued to intimidate religious minorities without any response from theGovernment at either a local or national level Yudhoyono relies on the support of Islamic parties inParliament and is unlikely to take any decisive action against such incidents This will further encourageradical groups and endangers the countryrsquos reputation for religious tolerance

Three youths were beaten by members of the Islamic Defenders Front (FPI) for allegedly beingdrunk The attack took place in Jakartarsquos business district but it remains unlikely that the FPI will targetforeigners and the security forces will not tolerate any threats to business interests Nonetheless such

incidents highlight a worrying trend towards increasingly hard-line behaviour that remains unchecked bythe Government

We previously reported that the light sentences handed down for the killing of three members of the Ahmadiyah sect will embolden radical groups (see our Report of 3 August) In this period theIslamic Reform Movement (Garis) coerced Ahmadi youths in Cianjur West Java to join mainstreamprayers The Ahmadiyah sect meanwhile was banned from conducting religious activities during theEid holidays by the South Sulawesi administration for fear of provoking violence

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1342

Iran

| back to top |

Two Arrested Al-Qaidah Members Iraqi Three Iranian - Iran Official

ISNA website | Tehran in Persian 7 September 2011

The public prosecutor of Irans Kerman Province Yadollah Movahhed has announced the start of aninvestigation into the case of five people arrested on charges of having links to Al-Qaidah the IranianStudents News Agency (ISNA) reported on 7 September Two of the detainees - arrested on 19 August -are Iraqis and the other three are Iranian nationals Movahhed told ISNA in an interview on 7 SeptemberThe prosecutor said the detained people are accused of carrying illegal arms and munitions and addedthat an investigation is ongoing into the possibility that they were members of a larger group

Israel

| back to top |

Israel Uncovers Planned Hamas Bombing Spree On Israelis

Xinhua | 8 September 2011

Hamas cells operating in the West Bank routed between May and AugustThe Israeli security agency Shin Bet has broken a network of Hamas cells operating in the West Bank and planning a series of attacks against Israeli targets local media reported Wednesday Dozens of

Hamas members comprising 13 militant cells were arrested throughout the West Bank between May andAugust Army Radio reported One of the groups has carried out a bombing attack at the entrance toJerusalem in March in which a British woman was killed and several dozen civilians wounded Anothercell had planned to dispatch a suicide bomber to Jerusalems Pisgat Zeev neighborhood on Aug 21 Theattack was thwarted at the last minute by Shin Bet agents assisted by the Israel Defense Forces (IDF)and police according to Army radio Other groups were in various stages of planning and preparingattacks including bombings and the kidnapping of civilians or soldiers for the release of Palestinians jailed in Israel The Shin Bet concluded based on its interrogations of the group members that theHamas military leadership in Gaza and abroad is exerting considerable efforts to rehabilitate itspresence in the West Bank with financing and weapon smuggling The West Bank has remainedrelatively quiet in recent years Israeli officials attributed the success in preventing violence in the area

to the cooperation between the IDF and the Palestinian National Authoritys security forces

Israeli Air Strike Kills One Gaza Militant

Xinhua | 8 September 2011

Strike follows more rocket launches from Gaza warnings of new battlesAn Israeli air strike killed an Islamic Jihad militant and wounded three others in the central Gaza

Strip town of Dier a-Balah witnesses and medical sources said Local witnesses said the militant diedafter his car was hit by a missile adding that three other people were also wounded The condition of theinjured is stable hospital sources said Earlier Wednesday an Israeli military spokesperson said a rocketwas launched from the Gaza Strip into south Israel adding the projectile landed in an open area and didnot cause injuries or damage None of the Palestinian armed factions has claimed responsibility for the

rocket attack Late on Tuesday a Palestinian militant was killed and two others injured when Israeliwarplanes targeted a group of gunmen east of Khanyounis City south of the Hamas-ruled Gaza Strip

The Gaza Strip witnessed an escalation of bloody violence between Israel and Gaza militantgroups in August leaving 26 Palestinians and three Israelis killed The violence was triggered after eightIsraelis were killed in well-coordinated operation in the Red Sea city of Eilat Israel accused Palestinianmilitants of plotting and carrying out the attack which started from the bordering Sinai Peninsula inEgypt

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1442

Libya

| back to top |

Libyan Extremist Britain Allowed To Stay Was Link To Al-Qaeda In Iran Papers Show

The Daily Telegraph | (London) By Richard Spencer Tripoli

The extremist Ismail Kamoka spent several years sending funds to terrorist groups across the Middle East

An Alleged Libyan extremist who sought political asylum in Britain regularly travelled to Iran from2002 to provide forged documents to extremists linked to al-Qaeda secret files found in a Tripoliintelligence service building have disclosed

The documents seen by The Daily Telegraph unearth British intelligence suspicions about linksbetween Iran and al-Qaeda dating back almost a decade Other details to come out of the documentssent by MI6 and found in the office of the former head of foreign intelligence and later foreign ministerMoussa Koussa who defected in March include the revelation that Britain had begun co-operating withthe Chinese security services on Islamic extremists The extent of Iranian co-operation with al-Qaedahas been disputed in intelligence communities though Iranians are thought to have provided weaponsand explosives to the Taliban in Afghanistan

A number of al-Qaeda operatives including members of the family of Osama bin Laden fled toTehran after the fall of the Taliban in Afghanistan and their precise status in Iran has been unclear Thepapers in Libya do not directly challenge the Iranian government but suggest that al-Qaeda operativeshad more freedom of movement there than previously thought The extremist Ismail Kamoka spent

several years sending funds to terrorist groups across the Middle East including some linked to al-Qaeda the files said Mr Kamoka who had been given indefinite leave to remain in Britain afterarriving from Saudi Arabia in 1994 and claiming asylum travelled from the UK to Iran viaSwitzerland in July 2002 according to one document[Article continues herehttpwwwtelegraphcouknewsworldnewsafricaandindianoceanlibya8740771Libyan-extremist-Britain-allowed-to-stay-was-link-to-al-Qaeda-in-Iran-papers-showhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1542

Nigeria

| back to top |

Bomb Explodes In Violence-Torn Nigerian City Residents

AFP | 6 September 2011

A bomb went off Tuesday in Nigerias northeastern city of Maiduguri disrupting a three-week lull inbombings in the violence-torn city local residents said [Article continues here httpnewsyahoocombomb-explodes-violence-torn-nigerian-city-residents-215718081html]

Pakistan

| back to top |

Pakistan Bans Foreign Travel For Those Involved In Bin-Ladin Probe

The News website | Islamabad in English 7 September 2011

A Pakistani commission investigating the circumstances surrounding the killing of Al-Qaidah chief Usamah Bin-Ladin has banned foreign travel for everyone involved in the probe Pakistani daily TheNews part of the Jang group which owns Geo TV reported on 7 September The paper recalled that thecommission had already directed the countrys interior ministry and the intelligence service ISI toensure that the Bin-Ladin family was not repatriated from Pakistan without the consent of the

commission

More Than 20 Killed In Two Suicide Blasts In Pakistans Quetta

Express247 TV | Lahore in English 5 September 2011

At least 22 people were killed and several others injured in two explosions in the south-westernPakistani city of Quetta on 7 September the website of the Dubai-based private Pakistani TV channelARY News reported According to the channel one blast went off near the residence of the FrontierConstabulary and another one near the commissioner office in Quetta According to the report around100 kilograms of explosives were used in each attack (ARY News website Dubai in English 07 Sep 11)

Private Pakistani English-language TV channel Express 247 carried a series of onscreen scrollswhich said police had confirmed that the two blasts were suicide attacks The report cited police sources

as saying that 25 people were killed and more than 40 injured in the attacks (Express247 TV Lahorein English 0654GMT 07 Sep 11)

BBCM notes that the attacks came after the Pakistani intelligence agency said on 5 August that ithad arrested Al-Qaidah commander Younis Al-Mauritani and two of his accomplices in Quetta

Taleban Say Quetta Blasts Revenge For Recent Al-Qaidah Arrests

AFP | 7 September 2011

The Pakistani Taleban have claimed responsibility for the twin suicide bombs in Quetta on 7 Septembersaying they were carried out to avenge the recent arrests of Al-Qadiah operatives in the city Wecarried out the attacks Taleban spokesman Ehsanullah Ehsan told AFP in a phone call from anundisclosed location

Twin Suicide Bombings In Pakistan Leave 23 Dead

Miami Herald

Twin suicide bombers attacked the home of a senior military officer Wednesday in the western city of Quetta injuring him and killing at least 23 people officials said in a possible revenge attack forPakistans recent arrest of a senior al Qaida commander [Article continues here httpwwwmiamiheraldcom201109072394264twin-suicide-bombings-in-pakistanhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1642

Philippines

| back to top |

Moro Splinter Group Threatens US Soldiers In Philippines But Capabilities Limited

Government-Rebel Negotiations Remain Difficult

Assynt | SEAsia Vol VIII No17 7 September 2011

Ameril Umbra Kato a former senior Moro Islamic Liberation Front (MILF) field commander whoresigned late last year because he rejects peace negotiations has threatened to attack US troops as wellas Filipino security forces and other Government targets US and Filipino troops are currentlyundertaking joint training exercises This is an annual event but the first time they have been conductedin central Mindanao However Katorsquos splinter group the Bangsamoro Islamic Freedom Fighters (BIFF)is believed to have as few as 200 members with generally unsophisticated weapons ConsequentlyBIFFrsquos ability to conduct an attack on US forces is likely to be limited

In this period Kato announced the creation of a political wing to his grouping the BangsamoroIslamic Freedom Movement emphasising his split with MILF Nevertheless he has not been expelledfrom MILF and so is protected by the current ceasefire with Manila though MILF has stronglycondemned Katorsquos threat against US troops It is possible that MILF leadership is content to allow himto operate relatively unimpeded in order to gain greater leverage in its negotiations with theGovernment since they can contrast their more compromising approach with BIFFrsquos threatened

violence Meanwhile negotiations between MILF and the Government continue MILF dismissed theGovernmentrsquos latest proposal for an autonomous region but both sides appear committed to continuingtalks

Russia

| back to top |

Suicide Bombings In Grozny Demonstrate Islamic Insurgencyrsquos Continuing Capabilities In

Chechnya

Stirling Assynt Reports | Report FSU Vol IV No17 7 September 2011

A series of suicide bombings in the Chechen capital on 31 August (which left nine casualties includingseven police officers) has severely undermined President Ramzan Karydovrsquos claims to have successfully

eradicated the Islamic insurgency in the Republic The first suicide bomber reportedly detonated hisexplosives in a densely populated area only 150 metres from a local Parliament building while twofurther jihadists targeted first-response units Significantly the attack occurred during the Muslimholiday of Eid a three day celebration which marks the end of Ramadan during which the risk of jihadist attacks is heightened Indeed in addition to this strike in Grozny jihadist militants carried outfurther attacks in Iraq Nigeria and Algeria during Eid this year

Although no group has claimed responsibility for this incident it bears the hallmark of theCaucasus Emirate and so was likely orchestrated by the grouprsquos newly appointed deputy KhuseynGakayev and his brother Vadalov Indeed the Gakayev brothers are believed to have been behind theattack on the Chechen Parliament in October 2010 demonstrating the grouprsquos capabilities and intent tocarry out such strikes Moreover the timing of these bombings ndash only two months after the

reconciliation of the Caucasus Emiratersquos leader Doku Umarov with Chechen commanders (see our 3August Report) ndash supports this assessment and suggests that further incidents and suicide bombings arelikely given this truce

Suspected Militant Killed In Russias Southern Republic

Interfax news agency | Moscow in Russian 7 September 2011 Russias National Antiterrorist Committee said on 7 September a militant had been killed in the Republicof Kabarda-Balkaria the corporate-owned Russian news agency Interfax reported

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1742

Saudi Arabia

| back to top |

Saudi Arabia Shopping Around For Nuke Technology

Haaretz | 8 September 2011

Ties with Pakistan may remain close as Riyadh seeks nuclear assistanceSynopsis This week brought news that Iran on its own has produced new advanced nuclearcentrifuges According to a report of the International Atomic Energy Agency Iran has begun to installthe centrifuges in its uranium enrichment facility in Natanz But the high-level source noted thatdevelopment and production of the new centrifuges began more than seven years ago That does notspeak of a great technological capability on Irans part Israeli intelligence like its American counterpartviews 2014 or 2015 as the date when Iran will be able to build nuclear weapons says the source - if itwants to and no one blocks it In Saudi Arabia in contrast they are a bit more disturbed by thedevelopments in Iran An American Department of Energy delegation visited Riyadh and met with DrHashim Yamani who heads the King Abdullah City for Atomic and Renewable Energy Saudi Arabiawants to equip itself with nuclear reactors to generate electricity The United States is interested inselling Riyadh reactors for two reasons - fat contracts and the ability to keep close tabs on nucleardevelopments in Saudi Arabia The American administration is concerned that with a nuclear programfor civilian uses Saudi Arabia would actually like to prepare the infrastructure so it could switch to

producing nuclear weapons relatively quickly should Iran possess such weapons Defense ministerSultan Bin Abdul Aziz and the countrys former intelligence chief Turki Bin Faisal reportedly favorthe preparation of a secret nuclear program for military uses in cooperation with a Sunni Muslim ally -Pakistan which possesses dozens of atomic bombs Saudi Arabia reportedly funded Pakistans nuclearweapons program in return for Pakistans promise to aid the monarchy in this area if need be

Serbia

| back to top |

Serbia Threatened By Terrorism Says Dacic

Tanjug | 8 September 2011

US officials warned Serbia of possible terrorist activity particularly against foreign interests

After a warning coming from USA officials Serbia will raise the level of security in all facilitiesbelieved to be a possible target of terrorists the countrys Deputy Prime Minister and Minister of InteriorIvica Dacic stated Wednesday in the Palace of Serbia He stated that the security measures will primarilyrefer to the facilities of foreign countries in Serbia and added that special attention will be paid to thesecurity of air traffic US officials assume that there is a possibility of new terrorist attacks in the USAand other countries including Serbia Dacic said following a meeting with Special Representative of the UN Secretary-General for Disaster Risk Reduction Margareta Wahlstrom in Belgrade and a sessionof the republic headquarters for emergency situations

Somalia

| back to top |

Six Killed In Mortar Attack In Somali CapitalShabeelle Media Network website | Mogadishu in Somali 7 September 2011

Six people were killed and several others injured after three mortars landed in Mogadishus Arjantiinneighbourhood in Kaaraan District on the night of 6 September the privately-owned Shabeelle websitereported It quoted an eyewitness as saying that two of the three mortars fired have caused thecasualties inflicting fear in the residents who returned to their homes after Al-Shabab vacated the areaearly last month Kaaraan District is one of the areas taken over by the government forces and AUpeacekeepers

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1842

United States

| back to top |

Post-911 Intelligence Reform Takes Root Problems Remain

Reuters | 8 September 2011

US intelligence agencies will forever be scarred by their failure to connect the dots and detect theSeptember 11 plot but a decade later efforts to break down barriers to information-sharing are takingroot Changing a culture of need-to-know to need-to-share does not come easily in spy circles Someofficials say they worry a decade later about a future attack in which it turns out that US spy agencieshad clues in their vast vaults of data but did not put them together or even know they existed

Yet significant changes both big and small have broken down barriers between agenciessmoothed information-sharing and improved coordination US intelligence experts say From issuing ablue badge to everyone working in the sprawling intelligence community to symbolize a commonidentity to larger moves of mixing employees from different agencies the goal is singular -- to preventanother attack

Were much further ahead David Shedd Defense Intelligence Agency deputy director said of the ability to connect the dots compared with 10 years ago Still signs of a plot to attack the UnitedStates could be missed again My worst fear and I suspect probably one that would come true is that inany future would-be or actual attack God forbid we will be able to find the dots again somewhere

because of simply how much data is collected Shedd said The political response to the failure to stopthe attack was the 2002 creation of the Department of Homeland Security pulling together 22 agenciesto form the third largest US Cabinet department behind the Pentagon and Veterans Affairs

That was followed by the creation in late 2004 of the Director of National Intelligence to overseeall the spy agencies as recommended by the bipartisan 911 commission Previously the CIA directorheld a dual role of also overseeing the multitude of intelligence agencies But in the aftermath of the2001 attacks policymakers decided that was too big of a job for one person to do effectively

Critics argued then and now that the reforms were the governments usual response to crises --create more bureaucracy But others see much-needed change It has been a tremendous improvementsaid Lee Hamilton who was the 911 commission vice chair Its not seamless there are problems andweve still got a ways to go The 2001 attacks involving airliners hijacked by al Qaeda operatives killed

nearly 3000 people in New York Pennsylvania and the Pentagon Various US intelligence and lawenforcement agencies had come across bits of information suggesting an impending attack but failed toput the pieces together The CIA had information about three of the 19 hijackers at least 20 monthsbefore the attacks the National Security Agency had information linking one of the hijackers with alQaeda leader Osama bin Ladens network the CIA knew one hijacker had entered the United States butdid not tell the FBI and an FBI agent warned of suspicious Middle Eastern men taking flying lessons

Have the reforms made America safer Officials say yes and point to the US operation thatkilled bin Laden in Pakistan in May that demanded coordination among intelligence agencies and themilitary But there is an inevitable caveat no one can guarantee there will never be another attack onUS soil On Christmas Day 2009 a Nigerian man linked to an al Qaeda off-shoot tried unsuccessfullyto light explosives sewn into his underwear on a flight to Detroit from Amsterdam It turned out US

authorities had pockets of information about him President Barack Obama used a familiar September 11phrase to describe the 2009 incident as a failure to connect the dots of intelligence that existed acrossour intelligence community

Roger Cressey a former White House National Security Council counterterrorism officialresurrected another September 11 phrase It was a failure of imaginationThe intelligence community had not seen al Qaeda in the Arabian Peninsula a Yemen-based al Qaedaoff-shoot as capable of striking the US homeland If the underwear bomber threat had originated inPakistan they would have gone to battle stations immediately Cressey said Some proposed changesin how authorities would respond to another successful attack still are pending For example creation of

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1942

a common communication system for police firefighters and other emergency personnel remainstangled up in political wrangling in Congress over how to implement it This is a no-brainer Hamiltonsaid The first responders at the scene of a disaster ought to be able to talk with one another Theycannot do it today in most jurisdictions

Former leaders of the 911 commission issued a report card saying nine of its 41recommendations remain unfinished The Office of the Director of National Intelligence hasexperienced growing pains as overseer of the 17 spy agencies churning through four chiefs in six yearsTensions over turf confusion about the DNIs role and problems herding agencies with very powerfulchiefs of their own all came to a crescendo when retired Admiral Dennis Blair the third DNI tried toassert authority over CIA station chiefs who represent the agency in different countries The positionof chief of station is one of the crown jewels of the CIA and they dont want anyone playing with theircrown jewels said Mark Lowenthal a former senior US intelligence official

After a dust-up with CIA Director Leon Panetta who now is defense secretary it was Blair whowas sent packing I think the mistake that some have made is to have viewed the DNI and the Directorof CIA as an eitheror proposition rather than the power of the two working together the DIAs Sheddsaid in an interview in his office There is a history of where that hasnt worked so well I believe it isworking much better today said Shedd who has worked at the DNI CIA and National SecurityCouncil

Intelligence experts say in the current administration Obamas top homeland security andcounterterrorism adviser John Brennan arguably has more power than any of them because he has thepresidents ear Its a reminder that bureaucratic reform or no personalities count in making nationalsecurity policy The improved sharing of secret data has led to yet another set of problems The delugeof bits and bytes has subjected intelligence analysts to information overload as they try to sift through itall for relevant pieces Our analysts still are spending way too much time on finding the informationrather than on the analysis of the information Shedd said There is just too much data to go find it all

The intelligence community wants a system developed that would automatically processinformation from multiple agencies and then make the connections for the analysts

But greater inroads into sharing data across agencies does not guarantee that another attack willbe averted The threat has evolved and officials now are increasingly concerned about a lone wolf plot

by an individual not tied to any militant group that may be more difficult to uncover Those threatswill not come to our attention because of an intelligence community intercept said John Cohen asenior Department of Homeland Security counterterrorism official

They will come to our attention because of an alert police officer an alert deputy sheriff analert store owner an alert member of the public sees something that is suspicious and reports it Cohensaid One measure of the success of post-911 reforms is that a decade later the United States has not hada similar attack Now that could be luck that could be skill we dont really know Hamilton said Butin all likelihood what we have done including the establishment of the Department of HomelandSecurity and the transformation in intelligence and FBI has certainly been helpful[Article continues here ]httpnewsyahoocompost-9-11-u-intelligence-reforms-root-problems-052514320html

Comment the value added provided by the Office of the DNI remains an open question for many withinthe Intelligence Community (IC) and is a favored theme of corridor discussion in IC-member agenciesOn the other hand there is broad agreement among intelligence officials that the degree of cooperationand coordination between intelligence agencies and the character of intelligence sharing has vastlyimproved The fact that there has not been a successful major attack on US soil since 911 ndash not forlack of plotting ndash is in great part testimony to this more effective cooperation

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2042

Jihadist Suggests Striking New York City Bridges

All SITE Intelligence Group | 6 September 2011

A jihadist pointed to what he found to be a weak point of suspension bridges and directed his messageto those who love blasting and explosions In a message posted on the Shumukh al-Islam forum onSeptember 6 2011 the jihadist Abu Suleiman al-Nasser gave a picture of the Verrazano Bridge inNew York on which he drew a red box and arrow on the bridges center He then gave a map on whichhe circled the various bridges in New York City and its boroughs A fellow jihadist offered his ownidea giving a picture of the Hoover Dam and explaining that there is no target more important thandams He wrote that striking a dam may lead to the submerging of cities and the killing of thousands of people and in the case of the Hoover Dam would impact Las Vegas the capital of gambling anddebauchery

Counterterror Veteran is New Deputy FBI Director

Atlanta Journal Constitution | 1September2011

A 24-year FBI veteran with extensive counterterrorism experience Sean Joyce has been named the lawenforcement agencys new deputy director Elevated to the No 2 post within the FBI by Director RobertMueller Joyce replaces Timothy Murphy who is retiring after 23 years with the bureau Since last yearJoyce has been executive assistant director of the national security branch responsible for the FBIs

national security and intelligence operations He earned the Attorney Generals Award for ExceptionalService in 2004 for work on a counterterrorism squad in Dallas In 2008 he was named chief of thecounterterrorism divisions international terrorism operations section with responsibility forinternational terrorism matters within the United States hellip[Complete article is available here httpwwwajccomnewsnation-worldcounterterror-veteran-is-new-1153018html]

Top CIA Official Obama Changed Virtually Nothing

Salon | 1 September2011

PBSs Frontline is airing an examination of Top Secret America on September 6 The show includes arare and lengthy interview with 34-year-CIA-veteran John Rizzo who is described as the most

influential lawyer in CIA historyHere is one quote they include from Rizzo With a notable exception of the lsquoenhanced

interrogationrsquo program the incoming Obama administration changed virtually nothing with respect toexisting CIA programs and operations Things continued Authorities were continued that wereoriginally granted by President Bush beginning shortly after 911 Those were all picked up reviewedand endorsed by the Obama administration hellip[Complete article is available herehttpwwwsaloncomnewspoliticsbarack_obamastory=opiniongreenwald20110901obama]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2142

General Counterterrorism News| back to top |

The Terrible Missed Chance

Newsweek | 4 September 2011

Special Agent Harry Samit of the FBIs Minneapolis field office knew he was looking into the eyes of aterrorist It was early afternoon on Friday Aug 17 2001 Across from him sat Zacarias Moussaoui a33-year-old French-born student arrested the day before for overstaying his visa Moussaoui had paidmore than $8000 in cash that summer to sit in a cockpit simulator in a flight school in the suburbs of Minneapolis and learn - in a matter of days - the basics of how to fly a 747-400 Samit a formerintelligence officer at the Navys celebrated Top Gun flight school felt sure the man across the desk from him was a Muslim extremist who was part of a plot to hijack a commercial jetliner filled withpassengers The trick Samit wrote in a soon-to-be-released excerpt of a book hes written about thecase was getting Moussaoui to admit this and reveal details and associates to allow us to stop the plot

Surely the bureau brass in Washington would share his concern Samit thought He was wrongThat same day halfway across the country in the fluorescent-lit hallways of the J Edgar Hoover

FBI headquarters building in Washington counterterrorism supervisors were treating Samits firstreports about Moussaoui with skepticism even contempt Michael Maltbie a DC counterterrorism

specialist insisted repeatedly in the days after the arrest that there was no clear link between Moussaouiand Al Qaeda - the link needed for a warrant Maltbie thought Moussaoui was a dirty bird he latertold investigators but favored deporting him to France

Believing a hijacking might be imminent Samit appealed to his boss in Minneapolis SpecialAgent Greg Jones Jones picked up the phone on Aug 27 and called Maltbie at FBI HQ

Moussaoui he said might be part of a plot to get control of an airplane and crash it into theWorld Trade Center or something like that

Maltbie scoffed You have a guy interested in this type of aircraft Maltbie replied accordingto FBI documents That is it (Maltbie declined requests for an interview)

At least Maltbie was paying attention Michael Rolince who ran the FBIs InternationalTerrorism Operations Section was arguably the bureaus most important go-between with the White

House on domestic terrorist threats in the summer of 2001 He tells Newsweek he spent less than 20seconds being briefed on the Moussaoui case that August His office was inundated with terrorismprobes he said since Moussaoui was in custody already he posed no immediate threat Did it rise tothe level of something that I would take upstairs Rolince asks The answer is no

At CIA headquarters alarm bells were ringing loudly CIA Director George Tenet was briefedon Moussaoui within days of the arrest receiving a paper with the eye-catching headline IslamicExtremist Learns to Fly But the FBIs acting director that summer and the bureaus most seniorcounterterrorism official were left in the dark[Article continues here httpwwwthedailybeastcomnewsweek20110904the-terrible-missed-chancehtml]

Pan Am Flight 103 - Lockerbie Bombing - al-Megrahi CIA FilesWebwire | 31 August2011

BACM ResearchPaperlessArchivescom has announced the publishing of CIA files related to the PanAm Flight 103 Lockerbie Bombing

The files can be downloaded at no cost at httpwwwpaperlessarchivescompanam103ciahtml The files date from 1984 to 1999 These are the most recent files on Pan Am 103 released by the

CIA This set of files is unique because it includes memos on the direct handling of an intelligencesource This type of information is exempt from the Freedom of Information Act (FOIA) and is not oftenreleased by the Agency

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2242

The files cover information received by the CIA on Abdel Basset al-Megrahi Al-Megrahi is theonly person ever convicted in the Pan AM 103 case The Scottish government in 2009 allowed al-Megrahi to be released from custody and returned to Libya because of his failing health With the recentfall of Muammar Qaddafis regime there have been renewed calls for al-Megrahi to be returned toScottish custody or extradited to the United States and put on trial[Complete article is available here httpwwwwebwirecomViewPressRelaspaId=144692]

Getting The Caucasus Emirate Right

CSIS | August 2011

ldquohellipThis report aims to set straight a rather distorted record It demonstrates the veracity of three vitallyimportant facts usually obfuscated in discussions of the subject (1) the longstanding and growing tiesbetween the CE and its predecessor organization the ChRI on the one hand and al Qaeda (AQ) and theglobal jihad on the other hand (2) the importance of the CE jihadi terrorist network as a united andorganized political and military force promoting jihad in the region and (3) the salience of local culturaland the Salifist jihadist theo-ideology and the influence of the global jihadi revolutionarymovementalliance as key if not the main factors drive the ldquoviolence in the North Caucasusrdquohelliprdquohttpcsisorgfilespublication110829_Hahn_GettingCaucasusEmirateRt_Webpdf

7 Things You Didnrsquot Know About the War on TerrorForeign Policy | By Eric Schmitt and Thomas Shanker 6 September 2011

From an attempt to negotiate with Osama bin Laden to a proposal to threaten to bomb Mecca its been awild decade for the US national security establishment

Our new book Counterstrike The Untold Story of Americas Secret Campaign Against Al Qaeda is in many ways asummary of the past decade of our reporting on the military intelligence community and domestic law enforcement as itentered a new era of Darwinian evolution to counter violent extremism

It also is our deep dive into a decade of American counterterrorism efforts -- from the work of commando trigger-pullers and spies on the ground up to senior political leaders who wanted to defendthe nation (and get re-elected) Our efforts to report and write this book allowed us to uncover many newmissions never discussed before -- and gave us an understanding of how the war on terror had changedover the last decade

Our book assesses the 10 years since 911 as the military divides the fight into tactical missionson the battlefields of modern terrorism then the operational advancements that provided the means tosuccess while not securing final victory and at the top the strategic level of policy debates about howthe nation should combat this threat to its security

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2342

Here are seven vignettes from Counterstrike that offer glimpses into the thinking of policymakers andcommanders in early days after the Sept 11 attacks and how that thinking evolved over the followingdecade into a more whole-of-government approach to combating terrorists

1 Bush Tried to Negotiate with al Qaeda

The George W Bush administration like all of its predecessors swore never to negotiate with terroristsBut it did undertake an extraordinary and extraordinarily secret outreach effort to open a line of communication with Osama bin Laden and al Qaedas senior leadership It was an attempt to replicatehow the United States tried to sustain a dialogue with the Soviet Union even during the darkest days of the Cold War when White House and Kremlin leaders described in private and in public a set of acceptable behaviors -- and described with equal clarity the swift vicious even nuclear punishment forgross violations

In the months after the Sept 11 attacks Bushs national security staff working through theintelligence agencies made several attempts to get a private message to bin Laden and his inner circleThe messages were sent through business associates of the bin Laden familys vast financial empire aswell as through some of the al Qaeda leaders closest relatives a number of whom were receptive toopening a secret dialogue to restrain and contain their terrorist kinsman whom they viewed as a blot on

their name (To be sure other relatives were openly hostile to the American entreaties)According to a senior American intelligence officer with first-hand knowledge of the effort the

response from Osama bin Laden was silence And the effort was suspended

2 Sometimes a Wedding Is Just a WeddingIn the early days after the Sept 11 attacks the CIA and FBI vied to produce the most compellingintelligence reports that tracked suspected terrorist plots The agencies often worked at cross purposessometimes unwittingly At one point in early 2002 both agencies were tracking what American analystssaid were growing preparations for a major wedding somewhere in the Midwest (In terroristvernacular the word wedding is often code for a major attack)

Dribs and drabs on this wedding planning made their way to President Bush from bothagencies independent of each other of course

Finally over the Easter holiday during a video-teleconference with top aides in Washingtonfrom his ranch in Crawford Texas Bush stopped the briefing exasperated by the discrepancies in therival agencies reporting about the suspected threat

George Bob get together and sort this out Bush told his CIA director George J Tenet andFBI director Robert S Mueller III

Bushs instincts were correct When the analysts finally untangled their clues it turned out thatthe ominous wedding really was just that the matrimony of a young man and a young woman fromtwo prominent Pakistani-American families There was no threat There was no plot

3 The Threat to Bomb MeccaAs fears of a second attack mounted following the 911 strikes US government planners franticallycast about for strategies to protect the country Even the most far-fetched ideas had a hearing howeverbriefly In one case some government planners proposed that if al Qaeda appeared ready to attack America again the United States should publicly threaten to bomb the city of Mecca in Saudi Arabiathe holiest site in all of Islam in retaliation Just nuts one Pentagon aide wrote to himself when heheard the proposal The idea was quickly and permanently shelved

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2442

4 The SEAL Raid in Iran That Didnt HappenWhen US forces routed the Taliban government in Afghanistan and forced bin Laden and his toplieutenants to flee many senior al Qaeda leaders including bin Laden and his deputy Ayman al-Zawahri escaped to neighboring Pakistan But a separate group including the al Qaeda leaders sonSaad bin Laden fled to northern Iran where American troops would not pursue them and the Iranianswould likely not detain them But the Shiite clerics running Iran placed the al Qaeda operatives and theirfamily members under virtual house arrest and they became a shield against possible attacks from theSunni-based terrorist organization

One plan in particular illustrated the bold thinking and wildly unrealistic aims of the militarysinitial approach after 911 to kill or capture terrorist leaders The plan called for hunting the eight to 10senior al Qaeda leaders and operatives who had sought refuge in Chalus an Iranian resort town on theCaspian Sea where they had been detained

At the Joint Special Operations Command at Fort Bragg NC military planners drew up optionsfor Navy SEALs to sneak ashore at night using state-of-the-art mini-submarines Once they landed theSEALs would slip past Iranian guards to snatch the al Qaeda leaders Another option called for SpecialOperations helicopters to spirit American commandos into the town and whisk them out again with theirquarry The Americans went as far as conducting two or three rehearsals at an undisclosed locationalong the US Gulf Coast in early 2002 They conducted small-boat insertion exercises involving about

30 Special Operations personnel most SEALs and eventually concluded the mission was feasible if they were provided with more detailed intelligence on the locations of the al Qaeda members and thesecurity around them

The logistics of the mission were daunting Chalus sits at the edge of the Elburz coastal mountainrange about 70 miles north of Tehran and the failed rescue of the American hostages in Iran in April1980 loomed large in commanders memories Eventually Gen Richard B Myers the chairman of theJoint Chiefs of Staff rejected the mission as too risky and too politically volatile Many of the al Qaedaoperatives are reportedly still there

5 Intelligence Hauls of Unusual Size

US intelligence and military commandos have carried out tens of thousands of raids in the decade since911 The amount of material seized from terrorist and insurgent targets has grown to a massive sizeThe Defense Intelligence Agency (DIA) operates exploitation triage centers and giant warehouses forstoring intelligence products -- in war zones rear headquarters in countries like Qatar and back in theUnited States One intelligence analyst said that walking into one of the warehouses for documents andmedia exploitation reminded him of the final scene in Raiders of the Lost Ark when the captured Ark of the Covenant is crated up and rolled into a cavernous storage area that contains all the governmentsother dangerous secrets

All told more than two million individual documents and electronic files have been cataloguedby media type hard copy phone number thumb drive Each is inspected by a linguist working with acommunications analyst or computer expert

The DIA analysts are joined by specialists from other agencies including the FBI and the DrugEnforcement Administration Yet given the overwhelming volume no more than about 10 percent of thecaptured intelligence has ever been analyzed

Intelligence officers say they simply are overwhelmed and untold quality leads may still beburied in the piles of computers digital files travel documents and pocket litter

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2542

6 The Digital Counterjihad Cyberspace is the terrorists ultimate safe haven Its where they recruit raise money and even plotattacks using coded language while playing online video war games The US government fights back

One technique is called false band replacement whereby the intelligence agencies infiltratemilitants networks and post their own material to counter extremist efforts on those same jihadistwebsites The trick is to forge the onscreen trademarks -- web watermarks -- of al Qaeda media sites

This makes messages posted on these sites official and sows dissent and confusion among themilitants

This Internet spoofing can be used in support of more traditional combat missions There is atleast one case confirmed by American officials in which a jihadist website was hacked by Americancyberwarriors to lure a high-value al Qaeda to a surreptitious meeting with extremist counterparts -- onlyto find a US military team in waiting

Getty images

7 First Kill the MullahsUS counterterrorism officials have learned fighting terrorists effectively means targeting specific nodesof that network that support and enable militants who strap on suicide vests This strategy focuses onneutralizing enablers such as the financiers gun-runners and logisticians Among these terror linchpins

are religious leaders who bless attacksHeavenly reward will not await a suicide bomber unless his death and those of his victims is

deemed halal in keeping with Islams sacred sharia law Each militant network has a sharia emir usuallyat the level of a sheikh or mullah In Iraq American commanders specifically killed emirs to throw awrench in a suicide bombing networks

Take him out and suicide bombings from that network are frozen until he is replaced said onemilitary officer with command experience in Iraq hellip[Complete article is available herehttpwwwforeignpolicycomarticles201109067_things_you_didn_t_know_about_the_war_on_terror]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2642

Dick Marty Rendition Report Condemns lsquoCult of Secrecyrsquo

BBC News | 8 September 2011

A report for Europes human rights watchdog has called for greater scrutiny of secret services andsupport for whistleblowers The Council of Europe investigated how countries like Britain GermanyRomania and Lithuania assisted the US with the rendition of terror suspects It said a cult of secrecyhad helped Western governments cover up abuses Defending whistleblowers it singled out USsoldier Bradley Manning accused of passing secrets to Wikileaks He had acted as a whistleblowerand should be treated as such CoE rapporteur Dick Marty wrote in the report which was due to besubmitted to the CoEs Parliamentary Assembly The soldier is currently in a US military prisonawaiting trial for passing restricted material to the controversial website

But the report praised Mr Manning and Wikileaks itself for uncovering evidence of renditionThe CoE represents 47 member-states including both EU countries and Russia and other ex-Sovietstates Mr Martys report focused on the record of Western states explaining that it was based oninvestigations into European links to the controversial US policy of rendition for terrorism suspectsThe CIA allegedly flew terror suspects around the world for interrogation in the years after 911 holdingthem in secret prisons in Europe and elsewhere

No licence to kill

In his 48-page report - entitled Abuse of State Secrecy and National Security - Mr Marty looked at thelevel of control exercised by European states over their security services He urged all states to useindependent parliamentary committees to oversee the work of their secret services saying this was of vital importance for the rule of law and democracy Mr Marty argued that Western governments wereusing the notion of state secrecy to shield their intelligence services from accountability for seriousviolations committed during anti-terrorist operations We consider that this is simply unacceptablehe wrote

A licence to kill (or to abduct and torture) only exists in certain films and in dictatorialregimes In democratic systems parliaments as representatives of the people have a right and duty toknow what the government is doing in the name of the people Mr Marty praised investigative journalists and non-governmental organisations for their work in exposing abuses of authority Stressing

the fundamental role whistleblowers had to play in an open society he warned against a real cult of secrecy as an instrument of power

While it was up to the courts to decide if Bradley Manning had committed any crime he wrotethe CoE was indebted to him for the publication of a recording of a helicopter attack in Iraq in whichthe crew seems to have intentionally targeted and killed civilians

Thanks to Mr Manning he said a large number of embassy reports had allowed us to learnsignificant details of important recent events which are obviously of general interest We therefore join Amnesty International in expressing our worries as to the treatment he receives Mr Marty wrote inthe draft report[Article continues here httpwwwbbccouknewsworld-europe-14820145]Comment This report demonstrates that Dick Marty is not as De Gaulle would say a serious man To

suggest that Bradley Manning is a hero and intelligence agencies bent on defeating terrorists arecriminals should say it all Manning knowingly violated his oath and willfully provided enormousamounts of classified material to WikiLeaks For Marty this is a good thing in the name of transparencyMarty always injudicious and anti-American in his remarks is now moving at warp speed into crackpotterritory

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2742

Al Qarsquoida amp its Affiliates| back to top |

Al Qaeda Is Down Not Out

Los Angeles Times | By Amy Zegart 7 September 2011

US talk of defeating terrorism is dangerously prematureTalk of strategically defeating Al Qaeda is all the rage in the White House these days Defense

Secretary Leon Panetta used the D-word in July President Obama declared in his new counter-terrorism strategy We can say with growing confidence that we have put Al Qaeda on the path todefeat Compared to the woeful state of the economy terrorism has become the administrations feel-good story of the year

Defeat is a big word It is also dangerously misleading Yes the United States has made greatstrides in the last decade to harden targets improve intelligence and degrade the capabilities of violentIslamist extremists Osama bin Ladens death was a major accomplishment But the fight is nowhereclose to being won and Americas most perilous times may lie ahead Three reasons explain why

The first is that strategically defeating Al Qaeda is not nearly as important as it sounds After911 Al Qaeda morphed into a more complicated decentralized and elusive threat consisting of threeelements core Al Qaeda affiliates or franchise groups operating in places like Yemen and Somalia with

loose ties to the core group and homegrown terrorists inspired by violent extremism often through theInternet in the comfort of their own living rooms

Core Al Qaedas capabilities started degrading in 2001 when the US invaded Afghanistandismantled training camps ousted the Taliban and sent Bin Laden running The CIA has estimated thecore group remaining in the AfghanistanPakistan region to number 50 to 100 fighters The last time BinLaden oversaw a successful operation was 2005 when Al Qaeda struck the London transit system

But plots by homegrowns and franchise groups have risen dramatically in recent years The 2009Ft Hood shooting the worst terrorist attack on US soil since 911 was the work of a homegrownterrorist The mastermind of the 2010 Times Square car bomb plot was a naturalized American citizentrained by the Pakistani Taliban not Al Qaeda Another franchise group Al Qaeda in the ArabianPeninsula was behind the foiled 2009 Christmas Day underwear bomber aviation plot and the 2010

plot to explode tampered printer cartridges aboard cargo planes The Bipartisan Policy Center reported11 violent Islamist extremist terrorist incidents against the US homeland in 2009 the most since 911Nearly all involved what former CIA Director Mike Hayden calls a witches brew of radicalizedAmericans and franchise groups

The second reason why talk of defeat is premature has to do with weapons Terrorism againstAmericans is nothing new The potential for terrorist groups to acquire weapons of mass destruction isIn 1995 a Japanese cult released sarin nerve gas in the Tokyo subway killing 12 people and injuringthousands It was the first WMD terrorist attack in modern history and it sparked a wave of presidentialterrorism commissions years before Bin Laden became a household name

It is this specter of the lone fanatic or small group armed with the worlds most devastatingweapons that keeps experts up at night In 2005 60 leading nuclear scientists and terrorism experts were

asked how many believed the odds of a nuclear attack on the US were negligible Only three or fourhands went up most were far more pessimistic Today there is enough nuclear material to build120000 weapons As long as fissile material is poorly stored and rogue states like Iran and North Koreacontinue their illicit weapons programs nuclear terrorism remains a haunting possibility

The third reason is that the FBI has not yet become a first-rate domestic intelligence agencyAnalysts whose work is vital to success are still second-class citizens labeled support staff alongsidesecretaries and janitors and passed over for key jobs including running the bureaus intelligence unitsThe FBIs information technology is so antiquated it belongs in a museum And the old crime-fighting

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2842

culture still lives There is now a move afoot to shrink new classified facilities so that agents dont haveto waste time away from their cases to read intelligence documents thereStrategically defeating Al Qaeda sounds too good to be true Because it is Amy Zegart is a senior fellow at Stanfords Hoover Institution and the author of Eyes on Spies

Congress and the United States Intelligence Community

US Counterterror Chief Al-Qaida On Steady Slide

Bostoncom | 31 August 2011

White House counterterrorism chief John Brennan said al-Qaida is on a steady slide after the death of al-Qaidas latest second-in-command in Pakistan Brennan told The Associated Press on Wednesdaythat its a huge blow in the first official White House comment since Atiyah Abd al-Rahmans reportedkilling by CIA drone strike in Pakistans tribal areas last week

Al-Qaida is sort of on the ropes and taking a lot of shots to the body and the head Brennansaid This is a time not to step back and let them recover a message he says hes sending to hiscounterparts in Pakistan[Article continues herehttpwwwbostoncomnewsnationwashingtonarticles20110831us_counterterror_chief_al_qaida_on_steady_slide ]

Al-Qaeda (AKA Al-Qaida Al-Qarsquoida)

Council on Foreign Relations | 29 August 2011

ldquoAl-Qaeda an international terrorist network is considered the top terrorist threat to the United StatesThe group is wanted for its September 11 2001 attacks on the World Trade Center and the Pentagon aswell as a host of lesser attacks To escape the post-911 US-led war in Afghanistan al-Qaedas centralleadership fled eastward into Pakistan securing a safe haven in loosely governed areas there In July2007 US intelligence agencies found that the organization was regrouping and regaining strength inthese tribal areas along the border with Afghanistan though targeted killings of senior al-Qaeda leadershave since diminished the groups command and control capabilities In February 2009 Director of National Intelligence Dennis C Blair told lawmakers that the groups core is less capable and effective

than it was a year ago The killing of al-Qaedas top leader Osama bin Laden by US forces in Pakistanin May 2011 served a significant blow to the organization but analysts say al-Qaeda remains deadlywith its networks spread all over the world Plus a number of affiliated groups have gained prominencein recent years complicating the task of containing the organizationrdquo

[Article continues here httpwwwcfrorgterrorist-organizationsal-qaeda-k-al-qaida-al-qaidap9126]

Al Qaeda In The Islamic Maghreb

CSIS | 1 September 2011

ldquoAl Qaeda in the Islamic Maghreb (AQIM) emerged from a decades-long militant Islamist tradition inAlgeria In 1998 the Salafist Group for Preaching and Combat (Groupe Salafiste pour la Preacutedication etle Combat or GSPC) broke away from the Armed Islamic Group (GIA) because of the GIArsquos extensive

targeting of civilians Gradually the GSPC evolved to encompass global jihadist ideology in addition toits historical focus on overturning the Algerian state In 2006 the GSPC officially affiliated with alQaeda core soon rebranding itself as al Qaeda in the Islamic Maghreb In the following years AQIMwas able to conduct a small number of large-scale attacks most notably its 2007 bombing of the UNheadquarters in Algiers In recent years counterterrorism pressure and weak governance have combinedto shift the center of AQIMrsquos presence to the Sahara-Sahel region AQIM continues to make its presenceknown through smuggling operations kidnappings and clashes with security forces in the desert In thecoming years general instability within the region could allow AQIM to further expand its influencerdquo[Complete article is available here httpcsisorgfilespublication110901_Thornberry_AQIM_WEBpdf ]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2942

AQ Strategy

The Assynt Report | 11 August 2011

Executive Summary Al-Qaedarsquos broad objectives remain unchanged in the wake of bin Ladenrsquos death There

are nonetheless growing questions over al-Qaedarsquos capability Longstanding paranoiaover the use of electronic communications is heightened by the ongoing US dronecampaign whilst attacks against the West have generally been disrupted at an early stage

The Pakistani Talibanrsquos attack on a Karachi naval base in May 2011 was a significantmilitary success and the first major act of revenge for bin Ladenrsquos killing Furtherattempts to avenge his loss are certain

All parts of al-Qaeda are working within a cohesive framework with the ultimate aim of restoring the Islamic Caliphate (Khilafa) The strategic plan to support this aim wasdrafted by 40 of al-Qaedarsquos brightest thinkers in Kandahar Afghanistan in November1999 This plan consists of four phases each seven years long leading to the dissolutionof corrupt regimes and the union of all newly-liberated states within the Khilafa

Apart from mounting strategic operations al-Qaedarsquos role is to be the inspiration for atruly global jihadist movement It seeks to achieve this through provision of trainingbeing a role model for others to follow extending acceptance and adoption of its tactics

particularly suicide bombings and professionalising jihadist media to build a commonbrand and message between hitherto separate groups

Between the late 1990s and 2003 the organisation was primarily devoted to classicinternational terrorism Most effort is now spent fighting insurgencies from North Africato South Asia The way in which this strategy helps to spread the struggle has been seenin North-West Africa where the initial development of al-Qaeda in the Islamic Maghrebwas in part fed by men returning from fighting with al-Qaeda in Iraq

Since mid-2009 al-Qaeda and its affiliates have increasingly encouraged jihadist-sympathisers resident in Western countries to engage in violence themselves withoutcentral direction or training making surveillance more difficult

One of the keys to awakening the spirit of jihad was the success in portraying the US and

its allies as Crusaders in the Muslim world Al-Qaedarsquos strategy essentially requires thatthis process be kept running until the forces of jihad have grown large enough to launchsuccessful liberation operations

Despite its successes in Afghanistan al-Qaedarsquos credibility has suffered both from its failure to landanother strategic blow on the West on the scale of 911 and also excessive Muslim casualties in someoperations Similarly al-Qaeda in Iraq was set back by its excessive sectarian zeal and local resentmentat the foreign fighter presence In turn this affected the movementrsquos funding from the Gulf

Analysis Sub-Saharan African Leaders Media Focus On Threats Prior to 911

OSC Feature | Sub-Sahara Africa -- OSC Analysis 6 September 2011Statements by Sub-Saharan African leaders and African media reports on terrorism prior to the 10thanniversary of 911 focus on the growing threats from local extremists and Al-Qaida affiliatesparticularly in West Africa with little direct commentary on the anniversary or US counterterrorismpolicies This focus on domestic threats suggests that counterterrorism messages expressing solidaritywith African nations and acknowledging the evolving terrorist threat on the continent would have thegreatest resonance with African audiences

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3042

Leaders Stressing Determination To Counter Local Threats African leaders public statements reflect an ongoing concern about the threat of terrorism on thecontinent and a strong commitment to find ways to combat this threat

Nigerian President Goodluck Jonathan emphasized the governments commitment tovigorously combat terrorism following the 26 August bombing of the UN office inAbuja by Nigerian extremist group Boko Haram reported the Paris-based news agencyAFP President Jonathan is hosting Liberian President Ellen Johnson Sirleaf and otherforeign dignitaries for a three-day forum on terrorism and economic crimes the widelyread Lagos-based independent daily The Guardian reported on 4 September

Malian President Amadou Toumani Toure launched a Special Program for PeaceSecurity and Development on 9 August stating that development remained the mostviable solution to counter threats to the countrys stability reported Malis state-owneddaily LEssor[ 3] The program aimed to undermine support for Al-Qaida in the IslamicMaghreb (AQIM) according to Burkinabe web portal Lefasonet on 11 August

Somali Prime Minister Abdiweli Muhammad Gas stated on 23 August that theTransitional Federal Government planned to remove Al-Shabaab from the central andsouthern regions in Somalia with the goal of restoring peace within one year so the

country can hold national elections according to the Puntland-based Garowe Online

Experts Media Highlight New Capabilities Tactics

African experts and media outlets are warning about the evolving nature of terrorist organizations on thecontinent the terrorists pursuit of new targets and tactics and their potential for taking advantage of regional instability

Leading South African think tank the Institute for Security Studies stated on 29 Augustthat Boko Harams attack on the UN in Abuja completes Boko Harams metamorphosisinto an international terrorist group Since December 2010 Boko Haram had killed over600 people in over 70 attacks against Nigerian targets according to the think tank buthad not previously targeted Western or international interests

A 26 August article on the popular Malian web portal Maliweb voiced concern thatAQIM could benefit from Tuareg mercenaries many of whom were recently returningfrom fighting in Libya and could benefit from an increase in arms trafficking through theSahel during the Libyan conflict

Ugandas privately owned Daily Monitor reported on 19 August that AU forces inSomalia warned that Al-Shabaab planned to increase the number of kidnappings andbomb attacks as part of its new strategy to shift from controlling territory in Mogadishuto conducting more of an insurgent campaign

Concern Over Al-Qaida Presence Terrorist Collaboration

West African official statements and media reports reflect a growing concern over an increased Al-

Qaida presence in West Africa and collaboration with AQIM Al-Shabaab and Boko Haram

Nigerian security services reported that the suspected mastermind behind the 26 Augustbombing of the UN office in Abuja was a Boko Haram member with close links to Al-Qaida and Al-Shabaab according Nigerias privately owned Daily Sun

A 28 August report in the privately owned daily Nigerian Tribune claimed that the 26August bombing in Abuja was part of Al-Qaidas plans to mark the 10th anniversary of 911 and called Boko Haram Al-Qaidas ally in the region

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3142

An 8 August commentary in Burkina Fasos LObservateur Paalga said that reports of Boko Haram collaboration with Al-Shabaab and AQIM could indicate that Al-Qaida isextending its African tentacles Abdourahmane Dieng security division chief of theEconomic Community of West African States said the collaboration represented a veryserious threat according to Senegals progovernment Le Soleil on 5 August

Messages Likely To Resonate With African Audience

Sub-Saharan Africas increasing concern about the shifting nature and potential strengthening of theterrorist threat on the continent suggests that messages directly addressing the impact of terrorism onAfricans the increasingly complex nature of the threat and the need for multilateral cooperation againstterrorism are most likely to resonate with Africans

Messages expressing solidarity and sympathy for Africans affected by Boko Haram Al-Shabaab and AQIM would almost certainly resonate with a broad African audience

African political and military leaders would probably welcome acknowledgement of thecomplex and changing nature of terrorism on the continent and recognition of theirinitiatives and commitment to countering violent extremism

African leaders and medias concern about potential collaboration between Boko Haram

Al-Shabaab and AQIM suggest that they would be open to improving multilateral andcross-regional sharing of lessons learned and strategies to counter the intensification of terrorism within Africa

Aviation and Maritime Security| back to top |

Bomb Threats Force Jets To Land

Associated Press | 7 September 2011

Both landed safely one landed in Ankara Ataturk International Airport and the other at Kuala LumpurTwo flights operated by Pakistans state-owned airline received bombs threats on Wednesday

and both landed safely one in Turkey the other in Malaysia officials said No bombs were found The

first flight was headed for Manchester England when it was notified of the threat near the Bulgariancapital of Sofia The crew contacted the control tower in Istanbul to seek permission for the landingstate-run Anatolia news agency reported Authorities quickly evacuated all 378 passengers from theBoeing 777-300ER aircraft after it parked at a remote corner of the International Ataturk Airport andbomb squads began searching the plane with sniffer dogs Anatolia reported PIA spokesman MashoodTajwar confirmed the flight received a threat and landed All passengers were safe A police searchturned up no bomb officials said Later a second PIA flight from Islamabad to Kuala Lumpur alsoreceived a bomb threat It landed in Kuala Lumpur and all the passengers disembarked safely saidTajwar The UK-bound Pakistan International Airlines plane was forced to make an emergency landingat Ataturk Airport in Istanbul after receiving a bomb threat Malaysias airports authority said thepassengers were being screened and the plane was isolated in a parking area while being searched bypolice No bomb was found

It said the plane carried 164 passengers and 13 crew Azmi Murad senior general manager forthe authority said the Pakistani airline informed it that the warning came by email Mr Tajwar gave nodetails on the nature of the threat or how it was delivered Pakistan is home to al Qaedas top leadershipMilitants who trained there have been responsible for many of the attacks and failed plots in the USand Europe since Sept 11 2001 when planes hijacked by al Qaeda militants destroyed the World TradeCenter in New York and crashed into the Pentagon The bomb threats came four days before the 10thanniversary of 911 but there was no apparent link to Islamist militants who typically do not alertauthorities in advance The FBI and Homeland Security department issued warnings last weekend aboutal Qaeda threats to small airlines

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3242

Commentary amp Opinion| back to top |

From Terror Group Founder To Libyan Rebel Military Commander

ABCNews | 29August 2011

The same man who triumphantly led Libyan rebels into Gadhafis compound last week first came to theattention of the US intelligence community years ago - as a founder of a terror group

Abdelhakim Belhaj who was recently appointed to Tripolis rebel military council was one of the original founders of the Libyan Islamic Fighting Group an anti-Gadhafi group which was laterdesignated by the US State Department as a terrorist organization with links to al Qaeda according toUS government reports

We proudly announce the liberation of Libya and that Libya has become free and that the ruleof the tyrant and the era of oppression is behind us a victorious Belhaj told reporters after the stormingof Gadhafis Bab al-Aziziya compound last week Ousting Gadhafi had been the main objective of theLIFG since its inception in the early 1990s even if some of the fighters believed that meant puttingAmericans in the crossfire

The group carried out operations against the Libyan government including at least four suspectedassassination attempts against Gadhafi in the 1990s and was also believed to be connected to a series of suicide bombings in Casablanca Morocco in 2003 the US State Department reported As relationsbetween the US and Gadhafi improved in the mid-2000s some LIFG leaders cultivated relationshipswith top al Qaeda leaders including Osama bin Laden and were suspected of funneling fighters to Iraq tocarry out operations against US soldiers

When the LIFG was designated a terror organization in 2004 it was meant as a gesture of solidarity with the Libyan government according to a March 2011 congressional report

Contrary to several US government reports Libyan rebel ambassador to the US Ali Aujalitold ABC News that the LIFG was never connected to al Qaeda and did not carry out terrorist operations

They were only opposed to Gadhafi during his rule and paid the price for that by beingoppressed by the regime Aujali said

The CIA first publicly voiced its concerns about the connection between the LIFG and al Qaedain 2004 when then-director George Tenet testified before the Senate Select Committee on Intelligenceand listed the LIFG among groups that represented an immediate threat [that] has benefited from alQaeda links[Article continues here httpabcnewsgocomBlotterterror-group-founder-libyan-rebel-military-commanderstoryid=14405319]

Interview With Saudi Sheik Wajdi Al-Ghazawi

MemriTVcom

Sheik Wajdi al-Ghazawi owner of al-Fajr TV criticizes extremist atmosphere in Saudi Arabia and saysafter 911 They Handed Out Sweets on the Streets of Mecca

Following are excerpts from a statement by Saudi Sheik Wajdi Al-Ghazawi owner of Al-FajrTV which was posted on YouTube on August 4 2011

Wajdi Al-Ghazawi When Al-Qaeda and Osama Bin Laden were at the height of their mightthey were extremely popular in Saudi Arabia From mosque pulpits across Saudi Arabia preacherswould pray for their success Moreover from the pulpits of the most important mosques ndash the Al-HaramMosque in Mecca and the Nabawi Mosque in Al-Madina ndash direct prayers for the success of Al-Qaedawere made during the days of the bombing of Tora Bora Oh Allah help our brothers in AfghanistanThese supplications were made during evening prayers as well as Friday prayers The preachers wouldpray for them in violation of the ministrys instructions

When the twin towers in New York were attacked they handed out sweets on the streets of Mecca By Allah they did I witnessed this myself The young people bowed in prayer and hugged one

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3342

another out of joy People were in heaven because of these young men who destroyed America andbombed this idol Am I right or not Was it like that or not

Back then when the Taliban broke off a piece of the nose of the Buddha statue which was hewnin the mountain an entire sermon was dedicated to it in the mosque in Mecca and the preacher was laterreprimanded for this sermon The entire Saudi people supported and loved Al-Qaeda

This went on until our brothers in Al-Qaeda ndash and I dont know what was going through theirminds ndash began to carry out operations inside Saudi Arabia Thats when we all raised our hands andsaid Youve gone too far We wont support you in this

The atmosphere here in Saudi Arabia is one of extremism It is characterized by focusing onminor details Many things are forbidden Yes maybe they are indeed forbidden but by forcing peopleto avoid them and by acting as if these were major sins an atmosphere was created that gave rise toextremist youth who might act recklessly at the most trivial provocation

For instance we blew out of proportion the issue of music the issue of smoking or the issue of hanging pictures in public places True there are clear texts on these issues but the young peopleembraced these issues as if they were fighting usury fornication or alcohol No these are not among theseven major sins So our society has become extreme

This extremist atmosphere has given rise to people who accuse others of heresy and people whopurport to be waging Jihad It has created genes that gave rise to cells of Al-Qaeda and other terrorists

We must examine our breeding ground in which these young men were sownBy Allah what can possibly emerge from such an atmosphere Muftis who accuse others of

heresy sheiks who incite and young people who bomb Am I right or not[Complete clip is available here httpwwwmemritvorgclipen3099htm]

Legal Aspects amp Lawfare| back to top |

Revisiting A Stale Counterterrorism Law

Council on Foreign Relations | 1 September 2011

ldquoNearly a decade after 911 the United States still relies on the 2001 Authorization for the Use of Military Force (AUMF) for the killing and detention of those considered responsible for or associatedwith the terrorist attacks But CFR national security law expert John Bellinger says it is becomingincreasingly difficult for the Obama administration to justify some of its counterterrorism operationsunder this limited statutory authority It has been used in defense of actions including drone attacks onindividuals as well as the targeting of groups in Yemen and Somalia that may have only the mosttenuous affiliation or association to the 911 attack A revised AUMF should clarify those operations aswell as the issue of detention specifically which individuals can be detained for how long and subjectto what processes There also needs to be greater effort at the international level he adds to fill thegaps in the law that covers conflicts between states and non-state actorsrdquohelliprdquo[Complete article is available here httpwwwcfrorgcounterterrorismrevisiting-stale-

counterterrorism-lawp25742]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3442

Narco-Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector[Complete article is available here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Mexicos Cartels Move Into Extortion

At a construction site of an apartment building in the heart of the Mexican capital a company engineerruns through his weekly payroll sheet He has salaries written out for carpenters bricklayers andelectricians At the bottom of the sheet is a notation of $200 for ldquosecurity servicesrdquo next to a nicknameldquoEl Indiordquo mdash the Indian [Complete article is available here

httpwwwtucsonsentinelcomnationworldreport090611_mexico_cartels_bribesmexicos-cartels-move-into-extortion ]

Seven Die In Mexican Pacific Port City

Latin American Herald Tribune

Seven people died in separate shootings in Mazatlan a port city in the northwestern Mexican state of Sinaloa with some of the incidents drug-related a police spokesman told Efe [Complete article is available herehttpwwwlahtcomarticleaspCategoryId=14091ampArticleId=423061]

Tijuana Violence Slows As One Cartel Takes Control

BorderlandBeatcom

Mexicos famously seedy border city of Tijuana is enjoying a lull in drug murders as the countrys mostpowerful cartel gains the upper hand over its rivals [Complete article is available here httpwwwborderlandbeatcom201109tijuana-violence-slows-as-one-cartelhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3542

Network Notes| back to top |

Canadian data foreign threats Spying in the digital age (Suggested by a reader in Lithuania ndash thanks) Globe and Mail | By Colin Freeze 31 July 2010

A government spy agency thatrsquos prohibited from monitoring Canadian citizens is now usingldquoinformation about Canadiansrdquo to zero in on foreign threatsThe ambiguous statement found in a new government report detailing the activities of CommunicationsSecurity Establishment Canada could sanction a range of intelligence-gathering activities ndash includingthe controversial practice of mining ldquometadatardquo from digital communications

Metadata ndash often called data about data ndash are found in e-mails and their attachments and containdigital signatures that can reveal when where and by whom documents were created

The collection of metadata has caused controversy in other countries but never in Canada wherethe Communications Security Establishment Canada operates as an ultra-secretive agency About theonly thing that is known about the classified practices is that they were halted and resumed after someldquomajor changesrdquo including directives signed by Defence Minister Peter MacKay

ldquoI cannot comment on specific operational activitiesrdquo Adrian Simpson a CSEC spokesman toldThe Globe He stressed that reviews upheld that the activities in question were ldquocarried out inaccordance with the law ministerial requirements and CSECrsquos policies and proceduresrdquo

ldquoCSEC is prohibited from directing its activities at Canadians anyone in Canada or Canadiansanywhere in the worldrdquo he said

For decades signals-intelligence agencies in the West have been allowed to safeguard nationalsecurity by eavesdropping on foreignersrsquo conversations Spies can whatever phone lines and satellitesignals they can so long as they never listen in on fellow citizens

But in the digital age governments run increasingly sophisticated dragnets scooping up andscouring through millions of intercepted Internet conversations daily Such practices create legalambiguities

ldquoThe whole issue of what constitutes boundaries for signals-intelligence agencies in cyberspaceis a big debate right nowrdquo said Rafal Rohozinski a security expert affiliated with the University of Torontorsquos Munk School

A watchdog agency that reviews the CSECrsquos activities released an annual report to Parliament onJuly 20 ldquoWhen other means have been exhausted CSEC may use information about Canadians when it

has reasonable grounds to believe that using this information may assist in identifying and obtainingforeign intelligencerdquo it reads

Sometimes collecting metadata is relatively benign It can involve aggregating sets of data tospot trends much like the way meteorologists discern national forecasts from localized information

For example while CSEC canrsquot usually monitor the communications of specific Canadian terrorsuspects it can glean insights by zooming out for big-picture patterns One way to do that MrRohozinski said would be to look at data flows between Canadian cities and Yemen where an Internet-savvy al-Qaeda offshoot works to recruit Westerners

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3642

Metadata however can be more revealing Documents that circulate on the Internet travelaround like postmarked letters marked with return addresses ndash e-mails and attachments have embeddedcodes that speak to the who where and when behind their creation

The US National Security Agency found itself mired in controversy a few years go after itskirted domestic-spying bans by secretly upholding that this sort of American metadata was fair gamedistinct from communication contents

Therersquos little to suggest the CSEC would go that far The federal agencyrsquos activities are reviewedby a watchdog body now headed by a former Federal Court of Appeal judge Robert Deacutecary appointedlast year wrote in his annual report that he was satisfied the CSEC activities in question are lawful evenif his predecessors felt them borderline

ldquoThis was the first review of these activities since hellip their resumption under new policiesrdquo thewatchdogrsquos report says It concludes that the surveillance activities are ldquoin accordance with the lawrdquo andfollow ldquomajor changes to certain policies procedures and practicesrdquo

Much of the concern arises from the possibility that CSEC could hand over metadata intelligenceto domestic law-enforcement and security agencies

As it stands the RCMP and CSIS have to develop their domestic investigations before coming toCSEC ndash usually with warrants ndash if they want specific intelligence The rules guiding handovers are strictbecause even though all agencies run surveillance operations they do so under vastly different

mandates and legal standardsThe spy agency however stood by its practicesldquoCSEC is extremely diligent when it comes to the privacy of Canadiansrdquo Mr Simpson said

[complete article is available here httpwwwtheglobeandmailcomnewsnationalcanadian-data-foreign-threats-spying-in-the-digital-agearticle2113772 ]

Cyber Attacks Against NATO Then And Now

New Atlanticist | 6 September 2011

ldquoNow that NATOrsquos Operation UNIFIED PROTECTOR over Libya is winding down it is worth

noting how few cyber incidents were directed in protest against the Alliance Certainly there was a

cyber component to the liberation of Libya but it was more about content and Internet freedom (the

most newsworthy elements here were the role of social media and the Libyan government taking largeparts of the nation offline) But compared to past history NATO cyber defenders had a relatively easy

time

ldquoNATO has not however had an easy 2011 Although there were three significant incidents we

know about none seemed to have been in direct response to operations over Libyahelliprdquo

[Complete article is available here httpwwwacusorgnew_atlanticistcyber-attacks-against-nato-then-

and-now]

The Calm Before The Storm

Foreign Policy | By Joel Brenner 6 September 2011

Cyberwar is already happening -- and its about to get much much worse A veteran cyberwarriorexplains how America can prepare itself

Revelations of wholesale electronic fraud and massive data heists have become weekly evendaily affairs A multinational electronics corporation loses personal information on more than 100million customers Cyberthieves break into an international bank counterfeit credit balances and lootATMs in four countries grabbing $9 million in just a few hours International gangs spread maliciouscode that conscripts unwitting computers into zombie armies of hundreds of thousands of similarlyenslaved machines Criminals then rent these armies called botnets as easily as you can buy a time-sharing arrangement in a beach condo No wonder the vast majority of Internet traffic is spam

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3742

Yet the loss of personal information and related criminal fraud intolerable as they are are theleast threatening face of electronic insecurity The US militarys secret network is penetratedAmericans corporate pockets are being picked clean of the intellectual property that makes the UnitedStates tick And the electricity grid that keeps the lights on and makes everything move is dangerouslyinsecure

In one remote attack on the Pentagons information systems about 10 years ago the Chinesehauled away up to 20 terabytes of information If the information had been on paper theyd have neededa line of moving vans stretching from the Pentagon to freighters docked 50 miles away in Baltimoreharbor just to haul it away Had they done so the military district of Washington wouldve become anactive theater of operations for the first time since 1865 and the Navy wouldve blockaded theChesapeake Bay But the Chinese did it electronically so who noticed

Corporate espionage by both competitors and foreign intelligence services or their surrogates isalso increasing Intelligence officials see this but cant speak openly about the specifics and Im seeingit now in my law practice The victims rarely admit it for understandable reasons Oracle whichsuccessfully sued SAP for theft of its software code was a prominent exception Google was another

When the Chinese penetrated Google in late 2009 -- yes that operation was Chinese and yes itwas done with the blessing of a member of the Politburo -- they werent after customer informationThey were after the source code that makes Google unique Nor was Google the only victim Thousands

of US and Western firms were penetrated in that affair Foreign governments -- and not only theChinese -- understand that they cannot compete with the United States militarily and politically if theycannot compete with it economically so their intelligence services want to steal its corporate intellectualproperty This is the technology that gives America its competitive edge and often it has nothing to dowith defense Ordinary companies with valuable technology are now being targeted by nation-statesThis is a new era National security and economic security have converged

The danger is not limited to the loss of technology and information however The owners andoperators of the North American electricity grid are hooking up their control systems to the Internet asfast as they can Exposing the grid to the Internet makes it marginally more efficient but it also makes itdramatically more vulnerable to disruption If you can remotely penetrate an electronic system to stealinformation you can remotely penetrate it to shut it down or make it go haywire This is why there is no

longer a meaningful difference between information security and operational security And the biggestoperational risk is the grid In contemporary society nothing moves without electricity If the grid goesout the country stops

As the Stuxnet affair demonstrated remotely engineered disruption of industrial control systemsis now a reality That episode involved the successful electronic attack on the centrifuges in the Iraniannuclear program Only a first-class intelligence agency could have pulled that off but the blueprint fordoing it -- the code itself -- is now public Many American industrial control systems run on the samekind of equipment the Iranians were using but unlike the controls on the Iranian centrifuges thecontrols on the US grid are now being connected to the Internet making them easier to disrupt Stuxnetwas a watershed there will be copycats

Other industrial control systems will also be targets Some already are Air traffic control

railroad switches and water and sewage systems are all electronically controlled now and many arevulnerable If an intruder can break into the right server electronically he can remotely shut downproduction send your goods to the wrong destination and even unlock your doors -- and delete your logentries so he leaves no record of ever having been there

The United States does not lack enemies who would attack it this way Seized al Qaedacomputers contain details of US industrial control systems In 2003 a group affiliated with thePakistani terrorist organization Lashkar-e-Taiba -- the same gang that engineered the 2008 terroristassaults in Mumbai -- plotted to attack the Australian grid Other groups conspired to attack the Britishgrid in 2004 2006 and 2009 Yet the owners and operators of the North American grid continue willy-

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3842

nilly to expose their control systems to the Internet instead of isolating and hardening it This is folly of a high order

Important conclusions for public and corporate policy follow from this vulnerable state of

affairs First cyber insecurity has operational consequences In the current and foreseeable states of technology a high degree of assurance against electronic penetration of anything connected to theInternet is not achievable Large efficient electronically connected organizations and nations aretherefore vulnerable to remotely engineered disruption as well as information theft

Second this risk cannot be eliminated -- but it can be reduced and managed As a nation theUnited States should start by isolating the grids controls from the Internet Undoubtedly there aremarginal efficiencies to be gained by seamless connectivity over a publicly accessible infrastructure butthese gains are usually exaggerated and the risk this connectivity creates is staggering The governmentand the major telecommunications carriers must also make the investment required to re-create themassive redundancies that made the wired telephone network so robust Resilience and swift recoveryshould be the goal If the consequences of cyberattacks were reduced penetration would cease to matter

Third companies that wait for the government to solve their own security problems do so attheir peril The government is broke and the IT backbone is 85 percent private so the governmentdoesnt control it The governments role in altering the status quo will be limited to setting standardsusing its purchasing power to move vendors toward better security and getting its own house in order

The government can neither secure corporate intellectual property nor protect firms against operationaldisruption

Fourth in a world in which everything cannot be protected companies must determine forthemselves what intellectual property and physical assets to isolate and safeguard Those that approachthis task seriously will quickly learn that technology is only one aspect of their insecurity and in manycases the easiest to deal with Unless technology is integrated with personnel practices and operationalsecurity it opens vulnerabilities that its users rarely understand This kind of integration requires theautomated enforcement of reasonable security policies and systematic workforce training and thatoccurs only when management the lawyers and the technologists work closely together This is an old-fashioned management challenge -- not a technological one For their part corporate boards need to takeIT security seriously and launch audits that examine how their systems are actually implemented and

used not merely how they are designed Because as the techies like to put it the weakest link in anysystem is not the silicon-based unit on the desk its the carbon-based unit in the chair Joel Brenner is author of the forthcoming America the Vulnerable Inside the New Threat Matrix of

Digital Espionage Crime and Warfare He has served as the inspector general of the National Security

Agency the national counterintelligence executive and the NSAs senior counsel He now practices law

at Cooley LLP in Washington DC

Cyberattacks Decline Slightly Symantec Report Finds

Dark Reading | 1 September 2011

Organizations worldwide are suffering damages as a result of cyberattacks but interestingly there hasbeen a slight decline in these attacks during the past 12 months according to a new report from

Symantec More than 90 percent of the more than 3300 respondents across 36 countries said theyexperienced tangible losses as a result of a hack with 84 percent reporting financial loss to the cost of abreach Around one-fifth lost at least $195000 in breaches during the past 12 months

Meanwhile Symantec attributes the unexpected bright spot of a decline in breaches toorganizations employing better cybersecurity defenses More than 70 percent of organizations sawattacks in the past 12 months a decline of 5 percent from 2010 And those that experienced anincreasing frequency of attacks dropped from 29 percent in 2010 to 21 percent this year While 100percent last year reported losses from cyberattacks 92 percent did so in 2011 The trend seemscounterintuitive given the rash of high-profile breaches this year More

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 9: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 942

India

| back to top |

Deadly Explosion Strikes Courthouse in New Delhi

New York Times | By Jim Yardley 7 September 2011

An explosion ripped through a reception area of an Indian courthouse on Wednesday morning killing atleast 10 people and wounding more than 60 others in a bombing that renewed concerns about Indiarsquos

vulnerability to terrorism It was the second bombing of the courthouse in less than four months

Relatives mourned a victim of the bombing which struck a courthouse reception area Harish TyagiEuropean PressphotoAgency

Witnesses described a chaotic scene at the Delhi High Court after the blast at 1014 am outside areception area used by litigants lawyers and visitors to enter the courthouse

ldquoIt was in shamblesrdquo said Ajay Mehrotra a lawyer who witnessed the explosion ldquoThere wastotal chaos There was blood People were running for their livesrdquo

The Indian home minister Palaniappan Chidambaram called the explosion a terrorist attack andnoted that New Delhi was already in a high state of alert with Parliament in session Mr Chidambaramsaid Indian intelligence agencies had received information in July about a possible terrorist threat to thecity which had been turned over to the local police He did not elaborate about the intelligence reportOn Thursday three people were detained for questioning by the police Reuters reported

ldquoThe bomb blast took place just outside the reception centerrdquo Mr Chidambaram said at a newsconference ldquoIt is suspected that the bomb was placed in a briefcaserdquoReuters reported that a militant terrorist group called HuJI for Harkat-ul-Jihad Islami based largely inPakistan and also Bangladesh had claimed responsibility for the attacks citing security officials

Prime Minister Manmohan Singh speaking to reporters during a visit to Bangladesh condemned

the explosion as ldquoa cowardly act of a terrorist naturerdquoldquoWe will deal with itrdquo Mr Singh said ldquoWe will never succumb to the pressure of terrorismrdquo

Indian authorities have come under renewed criticism in recent months about their preparedness toprevent terrorism Terrorist attacks are a persistent concern in India particularly in the countryrsquos rapidlygrowing cities which have endured a series of bombings in recent years

In July more than 20 people were killed in Mumbai the countryrsquos financial capital from threeblasts timed to the evening rush hour That attack raised painful memories of the bloody November 2008attacks on Mumbai in which militants trained in Pakistan swept through luxury hotels a railway stationand a Jewish center in a rampage that left more than 160 people dead

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1042

Wednesdayrsquos attack at the Delhi High Court exposed anew the weaknesses in the courthousersquossecurity In May a smaller bomb detonated near a parked car outside the courthouse causing no injuriesWitnesses told local media of seeing a black bag in flames after the blast

Rakesh Tiku chairman of the Delhi Bar Association criticized the Delhi police saying ldquothe low-intensity blast in May should have served as an eye-openerrdquo Mr Tiku said hundreds of litigants andclerks passed through the gate where the blast took place each day making it a vulnerable location ldquoTheDelhi High Court requested the Delhi police to install CCTV cameras as well as personnel to man theentrances three or four months ago but no action has been takenrdquo he said

The latest explosion occurred near Gate 5 of the High Court outside a reception center wherevisitors wait for passes to enter the building Lawyers said Wednesday was an especially busy daybecause the court heard public-interest litigation

ldquoWhat are the police doingrdquo asked Mr Mehrotra the lawyer ldquoThe lives of lawyers litigantsand judges are at stakerdquo

Another witness Brijmohan Sharma described a ldquovery loud sound the reverberations fromwhich caused me to lose my balance I got up and was surrounded by people runningrdquo He added ldquoItwas like a scene from a film People were lying on the floor with their hands cut off their legs brokenand bleedingrdquo

The last serious attacks in New Delhi took place in 2008 when coordinated blasts in a park and

in shopping areas killed more than 20 people and injured nearly 100 In those attacks the IndianMujahedeen an Islamic militant group claimed responsibility

The Delhi High Court is in the heart of the capital a short walk from the cityrsquos landmark IndiaGate Rahul Gupta a local resident said he was standing near the courthouse entrance when the groundshook from the blast throwing people onto the road outside the reception area

ldquoSecurity is one area which no one can handle in Delhi at the momentrdquo Mr Gupta said ldquoIt is thefanatical people who are creating these types of problems and trying to create panic in the publicrdquo hellip

The Indian government said that a preliminary analysis found a nitrate-based explosive withtraces of pentaerythritol tetranitrate or PETN a powerful plastic explosive often used in terror plots hellip[Article continues here httpwwwnytimescom20110908worldasia08indiahtml_r=1ampref=world]

Ten Killed In Delhi Blast

Multiple Sources

At least 10 people were killed and 65 others injured in a bomb blast outside the Delhi High Court on themorning of 7 September private Indian television channel IBN Live reported The terror strike took place in a high security area with Parliament the Prime Ministers Office and India Gate in the vicinitythe report said (CNN-IBN website New Delhi in English 07 Sep 11)

According to the website of the private Indian television channel NDT the blast went off at themain entrance to the court on Shershah Suri Road which is normally heavily guarded The bomb wentoff just before the court was about to open the report said (NDTV website Delhi in English 07 Sep 11)

Security officials were quoted by BBCWS as saying they suspected the explosives were hidden

in a briefcase that had been placed beside the desk where passes were being handed out An eyewitnesstold the BBC that it was a powerful blast shaking the ground and buildings around him (BBC WorldService 7 September 2011)

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1142

Delhi On High Alert In Wake Of Blast

Multiple Sources

The Indian capital has been put on high alert following the blast at the Delhi High Court privateEnglish-language TV news Channel Times Now reported (Times Now TV New Delhi in English0530GMT 07 Sep 11)

Hindi channel says received email from group claiming responsibility for attack Indias Hindinews channel Aaj Tak said on 7 September it had received an email claiming responsibility for the blastAccording to the report the email was sent from the ID harkatuljihadi2011gmailcom The channelsaid the police were investigating possible involvement of the Indian Mujahidin (Aaj Tak TV Delhi inHindi 7 September 2011)

Police Probe Possible Links To Al-Qaidah-Linked Group

Noida IBN Live | in English 7 September 2011

Police in Delhi are looking into claims that a Pakistan-based militant group linked to Al-Qaidah theHarkat-ul-Jihad Islami (HUJI) may have been involved in the attack Noida IBN TV reportedAccording to the report in an e-mail sent to a media house HUJI claimed it had carried out the attack inretaliation for the death sentence issued against Afzal Guru the man found guilty of involvement in an

attack on Delhis parliament almost ten years ago We owe the responsibility of todays blasts at highcourt delhi our demand is that Afzal Gurus death sentence should be repealed immediately else wewould target major high courts amp THE SUPREME COURT OF INDIA the e-mail read According tothe report it was sent from the id harkatuljihadi2011gmailcom

Home Minister Announces Probe Into Attack

CNN-IBN website | New Delhi in English 7 September 2011

Indian Home Minister P Chidambaram speaking in parliament said that investigators did not yet knowwho was behind the attack but he blamed it on terrorists seeking to destabilise the country He saidthat the National Investigative Agency (NIA) would carry out a probe into the attack

PM Denounces Blast As Cowardly Act

Doordarshan news website | New Delhi in English 7 September 2011

Prime Minister Manmohan Singh on 7 September described the blast outside the Delhi High Court as acowardly act and urged all political parties to unite and tackle any acts of terrorism state-run Indiantelevision channel DD News reported This is cowardly act of terrorist nature We will deal with it Wewill never succumb to the pressure of terrorism Singh said He said this is a long war in which allpolitical parties all the people of India have to stand united so that the scourge of terrorism is crushed

IED Explosion At Delhi High Court Domestic Islamists Likely Culprits Growing Signs Of Jihadist Agenda

Sterling-Assynt | 7 September 2011

An IED placed inside a briefcase exploded at 1017AM at an entrance to Delhi High Court wherelitigants collect their visitor passes Wednesdays are reserved for public-interest litigation and so thearea was crowded It is likely that the briefcase was placed in the queue at reception before visitors passthrough security checks There is reportedly no CCTV coverage in this area which will makeidentification of the perpetrator difficult

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1242

The blast was of at least medium intensity and created a crater between three to four feet deepAt least eleven people have died and 65 others have been injured ndash a toll that would probably have beenhigher if an international group had been responsible There were no other explosions which has thesame implication Mumbai has been placed on high alert following the attack especially as the HomeMinistry reported in August that coastal cities were under threat from pan-Islamic terror groups Noblame has yet been assigned A minor explosion occurred on 25 May (also a Wednesday) in a car-park near the Court That bomb was constructed using ammonium nitrate and is believed to havemalfunctioned causing no damage or injuries which suggests similar origins to this one

There are reports of an email from Harkat-ul-Jihadi al-Islami (HuJI) claiming responsibilityfor todayrsquos explosion but we remain sceptical about this since the group has not previously made suchclaims via email The nature of the bomb and the use of email to communicate suggest rather theinvolvement of the Indian Mujahideen (IM) Nonetheless the unverified HuJI email demands that AfzalGurursquos death sentence be repealed and this may point towards the involvement of a jihadist agendaGuru was involved in the December 2001 Parliamentary attacks in Delhi and had his mercy petitionrejected by the Home Ministry on 10 August

Todayrsquos incident indicates an increase in successful attacks by local groups A robust securityforce campaign following the 2008 Mumbai attacks diminished the capabilities of groups such as IMThey claimed responsibility for the December 2010 Varanasi bomb blast which killed one and injured

twenty people However IMrsquos likely involvement in the July 2011 blasts in Mumbai and the attack todaypoints towards the rebuilding of its capabilities and possibly also the establishment of closer ties with jihadi groups

We do not expect a spate of attacks to follow imminently but such incidents will continue tooccur possibly on a larger scale as IM continues to regroup following the security clampdownDevelopments in the cases of Afzal Guru and Ajmal Kasab (the surviving gunman from 2008) willprovide cause for further attacks Given a recent warming in relations between India and Pakistan theHigh Court attack will be unlikely to raise tensions between the two countries significantly

Indonesia

| back to top |

Islamic Groups Continue To Harass Religious Minorities Government Silence Further

Encourages Attacks Youths Beaten In East Jakarta

Assynt SEAsia Vol VIII No17 | 7 September 2011

Hard-line Islamic groups continued to intimidate religious minorities without any response from theGovernment at either a local or national level Yudhoyono relies on the support of Islamic parties inParliament and is unlikely to take any decisive action against such incidents This will further encourageradical groups and endangers the countryrsquos reputation for religious tolerance

Three youths were beaten by members of the Islamic Defenders Front (FPI) for allegedly beingdrunk The attack took place in Jakartarsquos business district but it remains unlikely that the FPI will targetforeigners and the security forces will not tolerate any threats to business interests Nonetheless such

incidents highlight a worrying trend towards increasingly hard-line behaviour that remains unchecked bythe Government

We previously reported that the light sentences handed down for the killing of three members of the Ahmadiyah sect will embolden radical groups (see our Report of 3 August) In this period theIslamic Reform Movement (Garis) coerced Ahmadi youths in Cianjur West Java to join mainstreamprayers The Ahmadiyah sect meanwhile was banned from conducting religious activities during theEid holidays by the South Sulawesi administration for fear of provoking violence

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1342

Iran

| back to top |

Two Arrested Al-Qaidah Members Iraqi Three Iranian - Iran Official

ISNA website | Tehran in Persian 7 September 2011

The public prosecutor of Irans Kerman Province Yadollah Movahhed has announced the start of aninvestigation into the case of five people arrested on charges of having links to Al-Qaidah the IranianStudents News Agency (ISNA) reported on 7 September Two of the detainees - arrested on 19 August -are Iraqis and the other three are Iranian nationals Movahhed told ISNA in an interview on 7 SeptemberThe prosecutor said the detained people are accused of carrying illegal arms and munitions and addedthat an investigation is ongoing into the possibility that they were members of a larger group

Israel

| back to top |

Israel Uncovers Planned Hamas Bombing Spree On Israelis

Xinhua | 8 September 2011

Hamas cells operating in the West Bank routed between May and AugustThe Israeli security agency Shin Bet has broken a network of Hamas cells operating in the West Bank and planning a series of attacks against Israeli targets local media reported Wednesday Dozens of

Hamas members comprising 13 militant cells were arrested throughout the West Bank between May andAugust Army Radio reported One of the groups has carried out a bombing attack at the entrance toJerusalem in March in which a British woman was killed and several dozen civilians wounded Anothercell had planned to dispatch a suicide bomber to Jerusalems Pisgat Zeev neighborhood on Aug 21 Theattack was thwarted at the last minute by Shin Bet agents assisted by the Israel Defense Forces (IDF)and police according to Army radio Other groups were in various stages of planning and preparingattacks including bombings and the kidnapping of civilians or soldiers for the release of Palestinians jailed in Israel The Shin Bet concluded based on its interrogations of the group members that theHamas military leadership in Gaza and abroad is exerting considerable efforts to rehabilitate itspresence in the West Bank with financing and weapon smuggling The West Bank has remainedrelatively quiet in recent years Israeli officials attributed the success in preventing violence in the area

to the cooperation between the IDF and the Palestinian National Authoritys security forces

Israeli Air Strike Kills One Gaza Militant

Xinhua | 8 September 2011

Strike follows more rocket launches from Gaza warnings of new battlesAn Israeli air strike killed an Islamic Jihad militant and wounded three others in the central Gaza

Strip town of Dier a-Balah witnesses and medical sources said Local witnesses said the militant diedafter his car was hit by a missile adding that three other people were also wounded The condition of theinjured is stable hospital sources said Earlier Wednesday an Israeli military spokesperson said a rocketwas launched from the Gaza Strip into south Israel adding the projectile landed in an open area and didnot cause injuries or damage None of the Palestinian armed factions has claimed responsibility for the

rocket attack Late on Tuesday a Palestinian militant was killed and two others injured when Israeliwarplanes targeted a group of gunmen east of Khanyounis City south of the Hamas-ruled Gaza Strip

The Gaza Strip witnessed an escalation of bloody violence between Israel and Gaza militantgroups in August leaving 26 Palestinians and three Israelis killed The violence was triggered after eightIsraelis were killed in well-coordinated operation in the Red Sea city of Eilat Israel accused Palestinianmilitants of plotting and carrying out the attack which started from the bordering Sinai Peninsula inEgypt

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1442

Libya

| back to top |

Libyan Extremist Britain Allowed To Stay Was Link To Al-Qaeda In Iran Papers Show

The Daily Telegraph | (London) By Richard Spencer Tripoli

The extremist Ismail Kamoka spent several years sending funds to terrorist groups across the Middle East

An Alleged Libyan extremist who sought political asylum in Britain regularly travelled to Iran from2002 to provide forged documents to extremists linked to al-Qaeda secret files found in a Tripoliintelligence service building have disclosed

The documents seen by The Daily Telegraph unearth British intelligence suspicions about linksbetween Iran and al-Qaeda dating back almost a decade Other details to come out of the documentssent by MI6 and found in the office of the former head of foreign intelligence and later foreign ministerMoussa Koussa who defected in March include the revelation that Britain had begun co-operating withthe Chinese security services on Islamic extremists The extent of Iranian co-operation with al-Qaedahas been disputed in intelligence communities though Iranians are thought to have provided weaponsand explosives to the Taliban in Afghanistan

A number of al-Qaeda operatives including members of the family of Osama bin Laden fled toTehran after the fall of the Taliban in Afghanistan and their precise status in Iran has been unclear Thepapers in Libya do not directly challenge the Iranian government but suggest that al-Qaeda operativeshad more freedom of movement there than previously thought The extremist Ismail Kamoka spent

several years sending funds to terrorist groups across the Middle East including some linked to al-Qaeda the files said Mr Kamoka who had been given indefinite leave to remain in Britain afterarriving from Saudi Arabia in 1994 and claiming asylum travelled from the UK to Iran viaSwitzerland in July 2002 according to one document[Article continues herehttpwwwtelegraphcouknewsworldnewsafricaandindianoceanlibya8740771Libyan-extremist-Britain-allowed-to-stay-was-link-to-al-Qaeda-in-Iran-papers-showhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1542

Nigeria

| back to top |

Bomb Explodes In Violence-Torn Nigerian City Residents

AFP | 6 September 2011

A bomb went off Tuesday in Nigerias northeastern city of Maiduguri disrupting a three-week lull inbombings in the violence-torn city local residents said [Article continues here httpnewsyahoocombomb-explodes-violence-torn-nigerian-city-residents-215718081html]

Pakistan

| back to top |

Pakistan Bans Foreign Travel For Those Involved In Bin-Ladin Probe

The News website | Islamabad in English 7 September 2011

A Pakistani commission investigating the circumstances surrounding the killing of Al-Qaidah chief Usamah Bin-Ladin has banned foreign travel for everyone involved in the probe Pakistani daily TheNews part of the Jang group which owns Geo TV reported on 7 September The paper recalled that thecommission had already directed the countrys interior ministry and the intelligence service ISI toensure that the Bin-Ladin family was not repatriated from Pakistan without the consent of the

commission

More Than 20 Killed In Two Suicide Blasts In Pakistans Quetta

Express247 TV | Lahore in English 5 September 2011

At least 22 people were killed and several others injured in two explosions in the south-westernPakistani city of Quetta on 7 September the website of the Dubai-based private Pakistani TV channelARY News reported According to the channel one blast went off near the residence of the FrontierConstabulary and another one near the commissioner office in Quetta According to the report around100 kilograms of explosives were used in each attack (ARY News website Dubai in English 07 Sep 11)

Private Pakistani English-language TV channel Express 247 carried a series of onscreen scrollswhich said police had confirmed that the two blasts were suicide attacks The report cited police sources

as saying that 25 people were killed and more than 40 injured in the attacks (Express247 TV Lahorein English 0654GMT 07 Sep 11)

BBCM notes that the attacks came after the Pakistani intelligence agency said on 5 August that ithad arrested Al-Qaidah commander Younis Al-Mauritani and two of his accomplices in Quetta

Taleban Say Quetta Blasts Revenge For Recent Al-Qaidah Arrests

AFP | 7 September 2011

The Pakistani Taleban have claimed responsibility for the twin suicide bombs in Quetta on 7 Septembersaying they were carried out to avenge the recent arrests of Al-Qadiah operatives in the city Wecarried out the attacks Taleban spokesman Ehsanullah Ehsan told AFP in a phone call from anundisclosed location

Twin Suicide Bombings In Pakistan Leave 23 Dead

Miami Herald

Twin suicide bombers attacked the home of a senior military officer Wednesday in the western city of Quetta injuring him and killing at least 23 people officials said in a possible revenge attack forPakistans recent arrest of a senior al Qaida commander [Article continues here httpwwwmiamiheraldcom201109072394264twin-suicide-bombings-in-pakistanhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1642

Philippines

| back to top |

Moro Splinter Group Threatens US Soldiers In Philippines But Capabilities Limited

Government-Rebel Negotiations Remain Difficult

Assynt | SEAsia Vol VIII No17 7 September 2011

Ameril Umbra Kato a former senior Moro Islamic Liberation Front (MILF) field commander whoresigned late last year because he rejects peace negotiations has threatened to attack US troops as wellas Filipino security forces and other Government targets US and Filipino troops are currentlyundertaking joint training exercises This is an annual event but the first time they have been conductedin central Mindanao However Katorsquos splinter group the Bangsamoro Islamic Freedom Fighters (BIFF)is believed to have as few as 200 members with generally unsophisticated weapons ConsequentlyBIFFrsquos ability to conduct an attack on US forces is likely to be limited

In this period Kato announced the creation of a political wing to his grouping the BangsamoroIslamic Freedom Movement emphasising his split with MILF Nevertheless he has not been expelledfrom MILF and so is protected by the current ceasefire with Manila though MILF has stronglycondemned Katorsquos threat against US troops It is possible that MILF leadership is content to allow himto operate relatively unimpeded in order to gain greater leverage in its negotiations with theGovernment since they can contrast their more compromising approach with BIFFrsquos threatened

violence Meanwhile negotiations between MILF and the Government continue MILF dismissed theGovernmentrsquos latest proposal for an autonomous region but both sides appear committed to continuingtalks

Russia

| back to top |

Suicide Bombings In Grozny Demonstrate Islamic Insurgencyrsquos Continuing Capabilities In

Chechnya

Stirling Assynt Reports | Report FSU Vol IV No17 7 September 2011

A series of suicide bombings in the Chechen capital on 31 August (which left nine casualties includingseven police officers) has severely undermined President Ramzan Karydovrsquos claims to have successfully

eradicated the Islamic insurgency in the Republic The first suicide bomber reportedly detonated hisexplosives in a densely populated area only 150 metres from a local Parliament building while twofurther jihadists targeted first-response units Significantly the attack occurred during the Muslimholiday of Eid a three day celebration which marks the end of Ramadan during which the risk of jihadist attacks is heightened Indeed in addition to this strike in Grozny jihadist militants carried outfurther attacks in Iraq Nigeria and Algeria during Eid this year

Although no group has claimed responsibility for this incident it bears the hallmark of theCaucasus Emirate and so was likely orchestrated by the grouprsquos newly appointed deputy KhuseynGakayev and his brother Vadalov Indeed the Gakayev brothers are believed to have been behind theattack on the Chechen Parliament in October 2010 demonstrating the grouprsquos capabilities and intent tocarry out such strikes Moreover the timing of these bombings ndash only two months after the

reconciliation of the Caucasus Emiratersquos leader Doku Umarov with Chechen commanders (see our 3August Report) ndash supports this assessment and suggests that further incidents and suicide bombings arelikely given this truce

Suspected Militant Killed In Russias Southern Republic

Interfax news agency | Moscow in Russian 7 September 2011 Russias National Antiterrorist Committee said on 7 September a militant had been killed in the Republicof Kabarda-Balkaria the corporate-owned Russian news agency Interfax reported

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1742

Saudi Arabia

| back to top |

Saudi Arabia Shopping Around For Nuke Technology

Haaretz | 8 September 2011

Ties with Pakistan may remain close as Riyadh seeks nuclear assistanceSynopsis This week brought news that Iran on its own has produced new advanced nuclearcentrifuges According to a report of the International Atomic Energy Agency Iran has begun to installthe centrifuges in its uranium enrichment facility in Natanz But the high-level source noted thatdevelopment and production of the new centrifuges began more than seven years ago That does notspeak of a great technological capability on Irans part Israeli intelligence like its American counterpartviews 2014 or 2015 as the date when Iran will be able to build nuclear weapons says the source - if itwants to and no one blocks it In Saudi Arabia in contrast they are a bit more disturbed by thedevelopments in Iran An American Department of Energy delegation visited Riyadh and met with DrHashim Yamani who heads the King Abdullah City for Atomic and Renewable Energy Saudi Arabiawants to equip itself with nuclear reactors to generate electricity The United States is interested inselling Riyadh reactors for two reasons - fat contracts and the ability to keep close tabs on nucleardevelopments in Saudi Arabia The American administration is concerned that with a nuclear programfor civilian uses Saudi Arabia would actually like to prepare the infrastructure so it could switch to

producing nuclear weapons relatively quickly should Iran possess such weapons Defense ministerSultan Bin Abdul Aziz and the countrys former intelligence chief Turki Bin Faisal reportedly favorthe preparation of a secret nuclear program for military uses in cooperation with a Sunni Muslim ally -Pakistan which possesses dozens of atomic bombs Saudi Arabia reportedly funded Pakistans nuclearweapons program in return for Pakistans promise to aid the monarchy in this area if need be

Serbia

| back to top |

Serbia Threatened By Terrorism Says Dacic

Tanjug | 8 September 2011

US officials warned Serbia of possible terrorist activity particularly against foreign interests

After a warning coming from USA officials Serbia will raise the level of security in all facilitiesbelieved to be a possible target of terrorists the countrys Deputy Prime Minister and Minister of InteriorIvica Dacic stated Wednesday in the Palace of Serbia He stated that the security measures will primarilyrefer to the facilities of foreign countries in Serbia and added that special attention will be paid to thesecurity of air traffic US officials assume that there is a possibility of new terrorist attacks in the USAand other countries including Serbia Dacic said following a meeting with Special Representative of the UN Secretary-General for Disaster Risk Reduction Margareta Wahlstrom in Belgrade and a sessionof the republic headquarters for emergency situations

Somalia

| back to top |

Six Killed In Mortar Attack In Somali CapitalShabeelle Media Network website | Mogadishu in Somali 7 September 2011

Six people were killed and several others injured after three mortars landed in Mogadishus Arjantiinneighbourhood in Kaaraan District on the night of 6 September the privately-owned Shabeelle websitereported It quoted an eyewitness as saying that two of the three mortars fired have caused thecasualties inflicting fear in the residents who returned to their homes after Al-Shabab vacated the areaearly last month Kaaraan District is one of the areas taken over by the government forces and AUpeacekeepers

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1842

United States

| back to top |

Post-911 Intelligence Reform Takes Root Problems Remain

Reuters | 8 September 2011

US intelligence agencies will forever be scarred by their failure to connect the dots and detect theSeptember 11 plot but a decade later efforts to break down barriers to information-sharing are takingroot Changing a culture of need-to-know to need-to-share does not come easily in spy circles Someofficials say they worry a decade later about a future attack in which it turns out that US spy agencieshad clues in their vast vaults of data but did not put them together or even know they existed

Yet significant changes both big and small have broken down barriers between agenciessmoothed information-sharing and improved coordination US intelligence experts say From issuing ablue badge to everyone working in the sprawling intelligence community to symbolize a commonidentity to larger moves of mixing employees from different agencies the goal is singular -- to preventanother attack

Were much further ahead David Shedd Defense Intelligence Agency deputy director said of the ability to connect the dots compared with 10 years ago Still signs of a plot to attack the UnitedStates could be missed again My worst fear and I suspect probably one that would come true is that inany future would-be or actual attack God forbid we will be able to find the dots again somewhere

because of simply how much data is collected Shedd said The political response to the failure to stopthe attack was the 2002 creation of the Department of Homeland Security pulling together 22 agenciesto form the third largest US Cabinet department behind the Pentagon and Veterans Affairs

That was followed by the creation in late 2004 of the Director of National Intelligence to overseeall the spy agencies as recommended by the bipartisan 911 commission Previously the CIA directorheld a dual role of also overseeing the multitude of intelligence agencies But in the aftermath of the2001 attacks policymakers decided that was too big of a job for one person to do effectively

Critics argued then and now that the reforms were the governments usual response to crises --create more bureaucracy But others see much-needed change It has been a tremendous improvementsaid Lee Hamilton who was the 911 commission vice chair Its not seamless there are problems andweve still got a ways to go The 2001 attacks involving airliners hijacked by al Qaeda operatives killed

nearly 3000 people in New York Pennsylvania and the Pentagon Various US intelligence and lawenforcement agencies had come across bits of information suggesting an impending attack but failed toput the pieces together The CIA had information about three of the 19 hijackers at least 20 monthsbefore the attacks the National Security Agency had information linking one of the hijackers with alQaeda leader Osama bin Ladens network the CIA knew one hijacker had entered the United States butdid not tell the FBI and an FBI agent warned of suspicious Middle Eastern men taking flying lessons

Have the reforms made America safer Officials say yes and point to the US operation thatkilled bin Laden in Pakistan in May that demanded coordination among intelligence agencies and themilitary But there is an inevitable caveat no one can guarantee there will never be another attack onUS soil On Christmas Day 2009 a Nigerian man linked to an al Qaeda off-shoot tried unsuccessfullyto light explosives sewn into his underwear on a flight to Detroit from Amsterdam It turned out US

authorities had pockets of information about him President Barack Obama used a familiar September 11phrase to describe the 2009 incident as a failure to connect the dots of intelligence that existed acrossour intelligence community

Roger Cressey a former White House National Security Council counterterrorism officialresurrected another September 11 phrase It was a failure of imaginationThe intelligence community had not seen al Qaeda in the Arabian Peninsula a Yemen-based al Qaedaoff-shoot as capable of striking the US homeland If the underwear bomber threat had originated inPakistan they would have gone to battle stations immediately Cressey said Some proposed changesin how authorities would respond to another successful attack still are pending For example creation of

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1942

a common communication system for police firefighters and other emergency personnel remainstangled up in political wrangling in Congress over how to implement it This is a no-brainer Hamiltonsaid The first responders at the scene of a disaster ought to be able to talk with one another Theycannot do it today in most jurisdictions

Former leaders of the 911 commission issued a report card saying nine of its 41recommendations remain unfinished The Office of the Director of National Intelligence hasexperienced growing pains as overseer of the 17 spy agencies churning through four chiefs in six yearsTensions over turf confusion about the DNIs role and problems herding agencies with very powerfulchiefs of their own all came to a crescendo when retired Admiral Dennis Blair the third DNI tried toassert authority over CIA station chiefs who represent the agency in different countries The positionof chief of station is one of the crown jewels of the CIA and they dont want anyone playing with theircrown jewels said Mark Lowenthal a former senior US intelligence official

After a dust-up with CIA Director Leon Panetta who now is defense secretary it was Blair whowas sent packing I think the mistake that some have made is to have viewed the DNI and the Directorof CIA as an eitheror proposition rather than the power of the two working together the DIAs Sheddsaid in an interview in his office There is a history of where that hasnt worked so well I believe it isworking much better today said Shedd who has worked at the DNI CIA and National SecurityCouncil

Intelligence experts say in the current administration Obamas top homeland security andcounterterrorism adviser John Brennan arguably has more power than any of them because he has thepresidents ear Its a reminder that bureaucratic reform or no personalities count in making nationalsecurity policy The improved sharing of secret data has led to yet another set of problems The delugeof bits and bytes has subjected intelligence analysts to information overload as they try to sift through itall for relevant pieces Our analysts still are spending way too much time on finding the informationrather than on the analysis of the information Shedd said There is just too much data to go find it all

The intelligence community wants a system developed that would automatically processinformation from multiple agencies and then make the connections for the analysts

But greater inroads into sharing data across agencies does not guarantee that another attack willbe averted The threat has evolved and officials now are increasingly concerned about a lone wolf plot

by an individual not tied to any militant group that may be more difficult to uncover Those threatswill not come to our attention because of an intelligence community intercept said John Cohen asenior Department of Homeland Security counterterrorism official

They will come to our attention because of an alert police officer an alert deputy sheriff analert store owner an alert member of the public sees something that is suspicious and reports it Cohensaid One measure of the success of post-911 reforms is that a decade later the United States has not hada similar attack Now that could be luck that could be skill we dont really know Hamilton said Butin all likelihood what we have done including the establishment of the Department of HomelandSecurity and the transformation in intelligence and FBI has certainly been helpful[Article continues here ]httpnewsyahoocompost-9-11-u-intelligence-reforms-root-problems-052514320html

Comment the value added provided by the Office of the DNI remains an open question for many withinthe Intelligence Community (IC) and is a favored theme of corridor discussion in IC-member agenciesOn the other hand there is broad agreement among intelligence officials that the degree of cooperationand coordination between intelligence agencies and the character of intelligence sharing has vastlyimproved The fact that there has not been a successful major attack on US soil since 911 ndash not forlack of plotting ndash is in great part testimony to this more effective cooperation

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2042

Jihadist Suggests Striking New York City Bridges

All SITE Intelligence Group | 6 September 2011

A jihadist pointed to what he found to be a weak point of suspension bridges and directed his messageto those who love blasting and explosions In a message posted on the Shumukh al-Islam forum onSeptember 6 2011 the jihadist Abu Suleiman al-Nasser gave a picture of the Verrazano Bridge inNew York on which he drew a red box and arrow on the bridges center He then gave a map on whichhe circled the various bridges in New York City and its boroughs A fellow jihadist offered his ownidea giving a picture of the Hoover Dam and explaining that there is no target more important thandams He wrote that striking a dam may lead to the submerging of cities and the killing of thousands of people and in the case of the Hoover Dam would impact Las Vegas the capital of gambling anddebauchery

Counterterror Veteran is New Deputy FBI Director

Atlanta Journal Constitution | 1September2011

A 24-year FBI veteran with extensive counterterrorism experience Sean Joyce has been named the lawenforcement agencys new deputy director Elevated to the No 2 post within the FBI by Director RobertMueller Joyce replaces Timothy Murphy who is retiring after 23 years with the bureau Since last yearJoyce has been executive assistant director of the national security branch responsible for the FBIs

national security and intelligence operations He earned the Attorney Generals Award for ExceptionalService in 2004 for work on a counterterrorism squad in Dallas In 2008 he was named chief of thecounterterrorism divisions international terrorism operations section with responsibility forinternational terrorism matters within the United States hellip[Complete article is available here httpwwwajccomnewsnation-worldcounterterror-veteran-is-new-1153018html]

Top CIA Official Obama Changed Virtually Nothing

Salon | 1 September2011

PBSs Frontline is airing an examination of Top Secret America on September 6 The show includes arare and lengthy interview with 34-year-CIA-veteran John Rizzo who is described as the most

influential lawyer in CIA historyHere is one quote they include from Rizzo With a notable exception of the lsquoenhanced

interrogationrsquo program the incoming Obama administration changed virtually nothing with respect toexisting CIA programs and operations Things continued Authorities were continued that wereoriginally granted by President Bush beginning shortly after 911 Those were all picked up reviewedand endorsed by the Obama administration hellip[Complete article is available herehttpwwwsaloncomnewspoliticsbarack_obamastory=opiniongreenwald20110901obama]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2142

General Counterterrorism News| back to top |

The Terrible Missed Chance

Newsweek | 4 September 2011

Special Agent Harry Samit of the FBIs Minneapolis field office knew he was looking into the eyes of aterrorist It was early afternoon on Friday Aug 17 2001 Across from him sat Zacarias Moussaoui a33-year-old French-born student arrested the day before for overstaying his visa Moussaoui had paidmore than $8000 in cash that summer to sit in a cockpit simulator in a flight school in the suburbs of Minneapolis and learn - in a matter of days - the basics of how to fly a 747-400 Samit a formerintelligence officer at the Navys celebrated Top Gun flight school felt sure the man across the desk from him was a Muslim extremist who was part of a plot to hijack a commercial jetliner filled withpassengers The trick Samit wrote in a soon-to-be-released excerpt of a book hes written about thecase was getting Moussaoui to admit this and reveal details and associates to allow us to stop the plot

Surely the bureau brass in Washington would share his concern Samit thought He was wrongThat same day halfway across the country in the fluorescent-lit hallways of the J Edgar Hoover

FBI headquarters building in Washington counterterrorism supervisors were treating Samits firstreports about Moussaoui with skepticism even contempt Michael Maltbie a DC counterterrorism

specialist insisted repeatedly in the days after the arrest that there was no clear link between Moussaouiand Al Qaeda - the link needed for a warrant Maltbie thought Moussaoui was a dirty bird he latertold investigators but favored deporting him to France

Believing a hijacking might be imminent Samit appealed to his boss in Minneapolis SpecialAgent Greg Jones Jones picked up the phone on Aug 27 and called Maltbie at FBI HQ

Moussaoui he said might be part of a plot to get control of an airplane and crash it into theWorld Trade Center or something like that

Maltbie scoffed You have a guy interested in this type of aircraft Maltbie replied accordingto FBI documents That is it (Maltbie declined requests for an interview)

At least Maltbie was paying attention Michael Rolince who ran the FBIs InternationalTerrorism Operations Section was arguably the bureaus most important go-between with the White

House on domestic terrorist threats in the summer of 2001 He tells Newsweek he spent less than 20seconds being briefed on the Moussaoui case that August His office was inundated with terrorismprobes he said since Moussaoui was in custody already he posed no immediate threat Did it rise tothe level of something that I would take upstairs Rolince asks The answer is no

At CIA headquarters alarm bells were ringing loudly CIA Director George Tenet was briefedon Moussaoui within days of the arrest receiving a paper with the eye-catching headline IslamicExtremist Learns to Fly But the FBIs acting director that summer and the bureaus most seniorcounterterrorism official were left in the dark[Article continues here httpwwwthedailybeastcomnewsweek20110904the-terrible-missed-chancehtml]

Pan Am Flight 103 - Lockerbie Bombing - al-Megrahi CIA FilesWebwire | 31 August2011

BACM ResearchPaperlessArchivescom has announced the publishing of CIA files related to the PanAm Flight 103 Lockerbie Bombing

The files can be downloaded at no cost at httpwwwpaperlessarchivescompanam103ciahtml The files date from 1984 to 1999 These are the most recent files on Pan Am 103 released by the

CIA This set of files is unique because it includes memos on the direct handling of an intelligencesource This type of information is exempt from the Freedom of Information Act (FOIA) and is not oftenreleased by the Agency

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2242

The files cover information received by the CIA on Abdel Basset al-Megrahi Al-Megrahi is theonly person ever convicted in the Pan AM 103 case The Scottish government in 2009 allowed al-Megrahi to be released from custody and returned to Libya because of his failing health With the recentfall of Muammar Qaddafis regime there have been renewed calls for al-Megrahi to be returned toScottish custody or extradited to the United States and put on trial[Complete article is available here httpwwwwebwirecomViewPressRelaspaId=144692]

Getting The Caucasus Emirate Right

CSIS | August 2011

ldquohellipThis report aims to set straight a rather distorted record It demonstrates the veracity of three vitallyimportant facts usually obfuscated in discussions of the subject (1) the longstanding and growing tiesbetween the CE and its predecessor organization the ChRI on the one hand and al Qaeda (AQ) and theglobal jihad on the other hand (2) the importance of the CE jihadi terrorist network as a united andorganized political and military force promoting jihad in the region and (3) the salience of local culturaland the Salifist jihadist theo-ideology and the influence of the global jihadi revolutionarymovementalliance as key if not the main factors drive the ldquoviolence in the North Caucasusrdquohelliprdquohttpcsisorgfilespublication110829_Hahn_GettingCaucasusEmirateRt_Webpdf

7 Things You Didnrsquot Know About the War on TerrorForeign Policy | By Eric Schmitt and Thomas Shanker 6 September 2011

From an attempt to negotiate with Osama bin Laden to a proposal to threaten to bomb Mecca its been awild decade for the US national security establishment

Our new book Counterstrike The Untold Story of Americas Secret Campaign Against Al Qaeda is in many ways asummary of the past decade of our reporting on the military intelligence community and domestic law enforcement as itentered a new era of Darwinian evolution to counter violent extremism

It also is our deep dive into a decade of American counterterrorism efforts -- from the work of commando trigger-pullers and spies on the ground up to senior political leaders who wanted to defendthe nation (and get re-elected) Our efforts to report and write this book allowed us to uncover many newmissions never discussed before -- and gave us an understanding of how the war on terror had changedover the last decade

Our book assesses the 10 years since 911 as the military divides the fight into tactical missionson the battlefields of modern terrorism then the operational advancements that provided the means tosuccess while not securing final victory and at the top the strategic level of policy debates about howthe nation should combat this threat to its security

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2342

Here are seven vignettes from Counterstrike that offer glimpses into the thinking of policymakers andcommanders in early days after the Sept 11 attacks and how that thinking evolved over the followingdecade into a more whole-of-government approach to combating terrorists

1 Bush Tried to Negotiate with al Qaeda

The George W Bush administration like all of its predecessors swore never to negotiate with terroristsBut it did undertake an extraordinary and extraordinarily secret outreach effort to open a line of communication with Osama bin Laden and al Qaedas senior leadership It was an attempt to replicatehow the United States tried to sustain a dialogue with the Soviet Union even during the darkest days of the Cold War when White House and Kremlin leaders described in private and in public a set of acceptable behaviors -- and described with equal clarity the swift vicious even nuclear punishment forgross violations

In the months after the Sept 11 attacks Bushs national security staff working through theintelligence agencies made several attempts to get a private message to bin Laden and his inner circleThe messages were sent through business associates of the bin Laden familys vast financial empire aswell as through some of the al Qaeda leaders closest relatives a number of whom were receptive toopening a secret dialogue to restrain and contain their terrorist kinsman whom they viewed as a blot on

their name (To be sure other relatives were openly hostile to the American entreaties)According to a senior American intelligence officer with first-hand knowledge of the effort the

response from Osama bin Laden was silence And the effort was suspended

2 Sometimes a Wedding Is Just a WeddingIn the early days after the Sept 11 attacks the CIA and FBI vied to produce the most compellingintelligence reports that tracked suspected terrorist plots The agencies often worked at cross purposessometimes unwittingly At one point in early 2002 both agencies were tracking what American analystssaid were growing preparations for a major wedding somewhere in the Midwest (In terroristvernacular the word wedding is often code for a major attack)

Dribs and drabs on this wedding planning made their way to President Bush from bothagencies independent of each other of course

Finally over the Easter holiday during a video-teleconference with top aides in Washingtonfrom his ranch in Crawford Texas Bush stopped the briefing exasperated by the discrepancies in therival agencies reporting about the suspected threat

George Bob get together and sort this out Bush told his CIA director George J Tenet andFBI director Robert S Mueller III

Bushs instincts were correct When the analysts finally untangled their clues it turned out thatthe ominous wedding really was just that the matrimony of a young man and a young woman fromtwo prominent Pakistani-American families There was no threat There was no plot

3 The Threat to Bomb MeccaAs fears of a second attack mounted following the 911 strikes US government planners franticallycast about for strategies to protect the country Even the most far-fetched ideas had a hearing howeverbriefly In one case some government planners proposed that if al Qaeda appeared ready to attack America again the United States should publicly threaten to bomb the city of Mecca in Saudi Arabiathe holiest site in all of Islam in retaliation Just nuts one Pentagon aide wrote to himself when heheard the proposal The idea was quickly and permanently shelved

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2442

4 The SEAL Raid in Iran That Didnt HappenWhen US forces routed the Taliban government in Afghanistan and forced bin Laden and his toplieutenants to flee many senior al Qaeda leaders including bin Laden and his deputy Ayman al-Zawahri escaped to neighboring Pakistan But a separate group including the al Qaeda leaders sonSaad bin Laden fled to northern Iran where American troops would not pursue them and the Iranianswould likely not detain them But the Shiite clerics running Iran placed the al Qaeda operatives and theirfamily members under virtual house arrest and they became a shield against possible attacks from theSunni-based terrorist organization

One plan in particular illustrated the bold thinking and wildly unrealistic aims of the militarysinitial approach after 911 to kill or capture terrorist leaders The plan called for hunting the eight to 10senior al Qaeda leaders and operatives who had sought refuge in Chalus an Iranian resort town on theCaspian Sea where they had been detained

At the Joint Special Operations Command at Fort Bragg NC military planners drew up optionsfor Navy SEALs to sneak ashore at night using state-of-the-art mini-submarines Once they landed theSEALs would slip past Iranian guards to snatch the al Qaeda leaders Another option called for SpecialOperations helicopters to spirit American commandos into the town and whisk them out again with theirquarry The Americans went as far as conducting two or three rehearsals at an undisclosed locationalong the US Gulf Coast in early 2002 They conducted small-boat insertion exercises involving about

30 Special Operations personnel most SEALs and eventually concluded the mission was feasible if they were provided with more detailed intelligence on the locations of the al Qaeda members and thesecurity around them

The logistics of the mission were daunting Chalus sits at the edge of the Elburz coastal mountainrange about 70 miles north of Tehran and the failed rescue of the American hostages in Iran in April1980 loomed large in commanders memories Eventually Gen Richard B Myers the chairman of theJoint Chiefs of Staff rejected the mission as too risky and too politically volatile Many of the al Qaedaoperatives are reportedly still there

5 Intelligence Hauls of Unusual Size

US intelligence and military commandos have carried out tens of thousands of raids in the decade since911 The amount of material seized from terrorist and insurgent targets has grown to a massive sizeThe Defense Intelligence Agency (DIA) operates exploitation triage centers and giant warehouses forstoring intelligence products -- in war zones rear headquarters in countries like Qatar and back in theUnited States One intelligence analyst said that walking into one of the warehouses for documents andmedia exploitation reminded him of the final scene in Raiders of the Lost Ark when the captured Ark of the Covenant is crated up and rolled into a cavernous storage area that contains all the governmentsother dangerous secrets

All told more than two million individual documents and electronic files have been cataloguedby media type hard copy phone number thumb drive Each is inspected by a linguist working with acommunications analyst or computer expert

The DIA analysts are joined by specialists from other agencies including the FBI and the DrugEnforcement Administration Yet given the overwhelming volume no more than about 10 percent of thecaptured intelligence has ever been analyzed

Intelligence officers say they simply are overwhelmed and untold quality leads may still beburied in the piles of computers digital files travel documents and pocket litter

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2542

6 The Digital Counterjihad Cyberspace is the terrorists ultimate safe haven Its where they recruit raise money and even plotattacks using coded language while playing online video war games The US government fights back

One technique is called false band replacement whereby the intelligence agencies infiltratemilitants networks and post their own material to counter extremist efforts on those same jihadistwebsites The trick is to forge the onscreen trademarks -- web watermarks -- of al Qaeda media sites

This makes messages posted on these sites official and sows dissent and confusion among themilitants

This Internet spoofing can be used in support of more traditional combat missions There is atleast one case confirmed by American officials in which a jihadist website was hacked by Americancyberwarriors to lure a high-value al Qaeda to a surreptitious meeting with extremist counterparts -- onlyto find a US military team in waiting

Getty images

7 First Kill the MullahsUS counterterrorism officials have learned fighting terrorists effectively means targeting specific nodesof that network that support and enable militants who strap on suicide vests This strategy focuses onneutralizing enablers such as the financiers gun-runners and logisticians Among these terror linchpins

are religious leaders who bless attacksHeavenly reward will not await a suicide bomber unless his death and those of his victims is

deemed halal in keeping with Islams sacred sharia law Each militant network has a sharia emir usuallyat the level of a sheikh or mullah In Iraq American commanders specifically killed emirs to throw awrench in a suicide bombing networks

Take him out and suicide bombings from that network are frozen until he is replaced said onemilitary officer with command experience in Iraq hellip[Complete article is available herehttpwwwforeignpolicycomarticles201109067_things_you_didn_t_know_about_the_war_on_terror]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2642

Dick Marty Rendition Report Condemns lsquoCult of Secrecyrsquo

BBC News | 8 September 2011

A report for Europes human rights watchdog has called for greater scrutiny of secret services andsupport for whistleblowers The Council of Europe investigated how countries like Britain GermanyRomania and Lithuania assisted the US with the rendition of terror suspects It said a cult of secrecyhad helped Western governments cover up abuses Defending whistleblowers it singled out USsoldier Bradley Manning accused of passing secrets to Wikileaks He had acted as a whistleblowerand should be treated as such CoE rapporteur Dick Marty wrote in the report which was due to besubmitted to the CoEs Parliamentary Assembly The soldier is currently in a US military prisonawaiting trial for passing restricted material to the controversial website

But the report praised Mr Manning and Wikileaks itself for uncovering evidence of renditionThe CoE represents 47 member-states including both EU countries and Russia and other ex-Sovietstates Mr Martys report focused on the record of Western states explaining that it was based oninvestigations into European links to the controversial US policy of rendition for terrorism suspectsThe CIA allegedly flew terror suspects around the world for interrogation in the years after 911 holdingthem in secret prisons in Europe and elsewhere

No licence to kill

In his 48-page report - entitled Abuse of State Secrecy and National Security - Mr Marty looked at thelevel of control exercised by European states over their security services He urged all states to useindependent parliamentary committees to oversee the work of their secret services saying this was of vital importance for the rule of law and democracy Mr Marty argued that Western governments wereusing the notion of state secrecy to shield their intelligence services from accountability for seriousviolations committed during anti-terrorist operations We consider that this is simply unacceptablehe wrote

A licence to kill (or to abduct and torture) only exists in certain films and in dictatorialregimes In democratic systems parliaments as representatives of the people have a right and duty toknow what the government is doing in the name of the people Mr Marty praised investigative journalists and non-governmental organisations for their work in exposing abuses of authority Stressing

the fundamental role whistleblowers had to play in an open society he warned against a real cult of secrecy as an instrument of power

While it was up to the courts to decide if Bradley Manning had committed any crime he wrotethe CoE was indebted to him for the publication of a recording of a helicopter attack in Iraq in whichthe crew seems to have intentionally targeted and killed civilians

Thanks to Mr Manning he said a large number of embassy reports had allowed us to learnsignificant details of important recent events which are obviously of general interest We therefore join Amnesty International in expressing our worries as to the treatment he receives Mr Marty wrote inthe draft report[Article continues here httpwwwbbccouknewsworld-europe-14820145]Comment This report demonstrates that Dick Marty is not as De Gaulle would say a serious man To

suggest that Bradley Manning is a hero and intelligence agencies bent on defeating terrorists arecriminals should say it all Manning knowingly violated his oath and willfully provided enormousamounts of classified material to WikiLeaks For Marty this is a good thing in the name of transparencyMarty always injudicious and anti-American in his remarks is now moving at warp speed into crackpotterritory

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2742

Al Qarsquoida amp its Affiliates| back to top |

Al Qaeda Is Down Not Out

Los Angeles Times | By Amy Zegart 7 September 2011

US talk of defeating terrorism is dangerously prematureTalk of strategically defeating Al Qaeda is all the rage in the White House these days Defense

Secretary Leon Panetta used the D-word in July President Obama declared in his new counter-terrorism strategy We can say with growing confidence that we have put Al Qaeda on the path todefeat Compared to the woeful state of the economy terrorism has become the administrations feel-good story of the year

Defeat is a big word It is also dangerously misleading Yes the United States has made greatstrides in the last decade to harden targets improve intelligence and degrade the capabilities of violentIslamist extremists Osama bin Ladens death was a major accomplishment But the fight is nowhereclose to being won and Americas most perilous times may lie ahead Three reasons explain why

The first is that strategically defeating Al Qaeda is not nearly as important as it sounds After911 Al Qaeda morphed into a more complicated decentralized and elusive threat consisting of threeelements core Al Qaeda affiliates or franchise groups operating in places like Yemen and Somalia with

loose ties to the core group and homegrown terrorists inspired by violent extremism often through theInternet in the comfort of their own living rooms

Core Al Qaedas capabilities started degrading in 2001 when the US invaded Afghanistandismantled training camps ousted the Taliban and sent Bin Laden running The CIA has estimated thecore group remaining in the AfghanistanPakistan region to number 50 to 100 fighters The last time BinLaden oversaw a successful operation was 2005 when Al Qaeda struck the London transit system

But plots by homegrowns and franchise groups have risen dramatically in recent years The 2009Ft Hood shooting the worst terrorist attack on US soil since 911 was the work of a homegrownterrorist The mastermind of the 2010 Times Square car bomb plot was a naturalized American citizentrained by the Pakistani Taliban not Al Qaeda Another franchise group Al Qaeda in the ArabianPeninsula was behind the foiled 2009 Christmas Day underwear bomber aviation plot and the 2010

plot to explode tampered printer cartridges aboard cargo planes The Bipartisan Policy Center reported11 violent Islamist extremist terrorist incidents against the US homeland in 2009 the most since 911Nearly all involved what former CIA Director Mike Hayden calls a witches brew of radicalizedAmericans and franchise groups

The second reason why talk of defeat is premature has to do with weapons Terrorism againstAmericans is nothing new The potential for terrorist groups to acquire weapons of mass destruction isIn 1995 a Japanese cult released sarin nerve gas in the Tokyo subway killing 12 people and injuringthousands It was the first WMD terrorist attack in modern history and it sparked a wave of presidentialterrorism commissions years before Bin Laden became a household name

It is this specter of the lone fanatic or small group armed with the worlds most devastatingweapons that keeps experts up at night In 2005 60 leading nuclear scientists and terrorism experts were

asked how many believed the odds of a nuclear attack on the US were negligible Only three or fourhands went up most were far more pessimistic Today there is enough nuclear material to build120000 weapons As long as fissile material is poorly stored and rogue states like Iran and North Koreacontinue their illicit weapons programs nuclear terrorism remains a haunting possibility

The third reason is that the FBI has not yet become a first-rate domestic intelligence agencyAnalysts whose work is vital to success are still second-class citizens labeled support staff alongsidesecretaries and janitors and passed over for key jobs including running the bureaus intelligence unitsThe FBIs information technology is so antiquated it belongs in a museum And the old crime-fighting

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2842

culture still lives There is now a move afoot to shrink new classified facilities so that agents dont haveto waste time away from their cases to read intelligence documents thereStrategically defeating Al Qaeda sounds too good to be true Because it is Amy Zegart is a senior fellow at Stanfords Hoover Institution and the author of Eyes on Spies

Congress and the United States Intelligence Community

US Counterterror Chief Al-Qaida On Steady Slide

Bostoncom | 31 August 2011

White House counterterrorism chief John Brennan said al-Qaida is on a steady slide after the death of al-Qaidas latest second-in-command in Pakistan Brennan told The Associated Press on Wednesdaythat its a huge blow in the first official White House comment since Atiyah Abd al-Rahmans reportedkilling by CIA drone strike in Pakistans tribal areas last week

Al-Qaida is sort of on the ropes and taking a lot of shots to the body and the head Brennansaid This is a time not to step back and let them recover a message he says hes sending to hiscounterparts in Pakistan[Article continues herehttpwwwbostoncomnewsnationwashingtonarticles20110831us_counterterror_chief_al_qaida_on_steady_slide ]

Al-Qaeda (AKA Al-Qaida Al-Qarsquoida)

Council on Foreign Relations | 29 August 2011

ldquoAl-Qaeda an international terrorist network is considered the top terrorist threat to the United StatesThe group is wanted for its September 11 2001 attacks on the World Trade Center and the Pentagon aswell as a host of lesser attacks To escape the post-911 US-led war in Afghanistan al-Qaedas centralleadership fled eastward into Pakistan securing a safe haven in loosely governed areas there In July2007 US intelligence agencies found that the organization was regrouping and regaining strength inthese tribal areas along the border with Afghanistan though targeted killings of senior al-Qaeda leadershave since diminished the groups command and control capabilities In February 2009 Director of National Intelligence Dennis C Blair told lawmakers that the groups core is less capable and effective

than it was a year ago The killing of al-Qaedas top leader Osama bin Laden by US forces in Pakistanin May 2011 served a significant blow to the organization but analysts say al-Qaeda remains deadlywith its networks spread all over the world Plus a number of affiliated groups have gained prominencein recent years complicating the task of containing the organizationrdquo

[Article continues here httpwwwcfrorgterrorist-organizationsal-qaeda-k-al-qaida-al-qaidap9126]

Al Qaeda In The Islamic Maghreb

CSIS | 1 September 2011

ldquoAl Qaeda in the Islamic Maghreb (AQIM) emerged from a decades-long militant Islamist tradition inAlgeria In 1998 the Salafist Group for Preaching and Combat (Groupe Salafiste pour la Preacutedication etle Combat or GSPC) broke away from the Armed Islamic Group (GIA) because of the GIArsquos extensive

targeting of civilians Gradually the GSPC evolved to encompass global jihadist ideology in addition toits historical focus on overturning the Algerian state In 2006 the GSPC officially affiliated with alQaeda core soon rebranding itself as al Qaeda in the Islamic Maghreb In the following years AQIMwas able to conduct a small number of large-scale attacks most notably its 2007 bombing of the UNheadquarters in Algiers In recent years counterterrorism pressure and weak governance have combinedto shift the center of AQIMrsquos presence to the Sahara-Sahel region AQIM continues to make its presenceknown through smuggling operations kidnappings and clashes with security forces in the desert In thecoming years general instability within the region could allow AQIM to further expand its influencerdquo[Complete article is available here httpcsisorgfilespublication110901_Thornberry_AQIM_WEBpdf ]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2942

AQ Strategy

The Assynt Report | 11 August 2011

Executive Summary Al-Qaedarsquos broad objectives remain unchanged in the wake of bin Ladenrsquos death There

are nonetheless growing questions over al-Qaedarsquos capability Longstanding paranoiaover the use of electronic communications is heightened by the ongoing US dronecampaign whilst attacks against the West have generally been disrupted at an early stage

The Pakistani Talibanrsquos attack on a Karachi naval base in May 2011 was a significantmilitary success and the first major act of revenge for bin Ladenrsquos killing Furtherattempts to avenge his loss are certain

All parts of al-Qaeda are working within a cohesive framework with the ultimate aim of restoring the Islamic Caliphate (Khilafa) The strategic plan to support this aim wasdrafted by 40 of al-Qaedarsquos brightest thinkers in Kandahar Afghanistan in November1999 This plan consists of four phases each seven years long leading to the dissolutionof corrupt regimes and the union of all newly-liberated states within the Khilafa

Apart from mounting strategic operations al-Qaedarsquos role is to be the inspiration for atruly global jihadist movement It seeks to achieve this through provision of trainingbeing a role model for others to follow extending acceptance and adoption of its tactics

particularly suicide bombings and professionalising jihadist media to build a commonbrand and message between hitherto separate groups

Between the late 1990s and 2003 the organisation was primarily devoted to classicinternational terrorism Most effort is now spent fighting insurgencies from North Africato South Asia The way in which this strategy helps to spread the struggle has been seenin North-West Africa where the initial development of al-Qaeda in the Islamic Maghrebwas in part fed by men returning from fighting with al-Qaeda in Iraq

Since mid-2009 al-Qaeda and its affiliates have increasingly encouraged jihadist-sympathisers resident in Western countries to engage in violence themselves withoutcentral direction or training making surveillance more difficult

One of the keys to awakening the spirit of jihad was the success in portraying the US and

its allies as Crusaders in the Muslim world Al-Qaedarsquos strategy essentially requires thatthis process be kept running until the forces of jihad have grown large enough to launchsuccessful liberation operations

Despite its successes in Afghanistan al-Qaedarsquos credibility has suffered both from its failure to landanother strategic blow on the West on the scale of 911 and also excessive Muslim casualties in someoperations Similarly al-Qaeda in Iraq was set back by its excessive sectarian zeal and local resentmentat the foreign fighter presence In turn this affected the movementrsquos funding from the Gulf

Analysis Sub-Saharan African Leaders Media Focus On Threats Prior to 911

OSC Feature | Sub-Sahara Africa -- OSC Analysis 6 September 2011Statements by Sub-Saharan African leaders and African media reports on terrorism prior to the 10thanniversary of 911 focus on the growing threats from local extremists and Al-Qaida affiliatesparticularly in West Africa with little direct commentary on the anniversary or US counterterrorismpolicies This focus on domestic threats suggests that counterterrorism messages expressing solidaritywith African nations and acknowledging the evolving terrorist threat on the continent would have thegreatest resonance with African audiences

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3042

Leaders Stressing Determination To Counter Local Threats African leaders public statements reflect an ongoing concern about the threat of terrorism on thecontinent and a strong commitment to find ways to combat this threat

Nigerian President Goodluck Jonathan emphasized the governments commitment tovigorously combat terrorism following the 26 August bombing of the UN office inAbuja by Nigerian extremist group Boko Haram reported the Paris-based news agencyAFP President Jonathan is hosting Liberian President Ellen Johnson Sirleaf and otherforeign dignitaries for a three-day forum on terrorism and economic crimes the widelyread Lagos-based independent daily The Guardian reported on 4 September

Malian President Amadou Toumani Toure launched a Special Program for PeaceSecurity and Development on 9 August stating that development remained the mostviable solution to counter threats to the countrys stability reported Malis state-owneddaily LEssor[ 3] The program aimed to undermine support for Al-Qaida in the IslamicMaghreb (AQIM) according to Burkinabe web portal Lefasonet on 11 August

Somali Prime Minister Abdiweli Muhammad Gas stated on 23 August that theTransitional Federal Government planned to remove Al-Shabaab from the central andsouthern regions in Somalia with the goal of restoring peace within one year so the

country can hold national elections according to the Puntland-based Garowe Online

Experts Media Highlight New Capabilities Tactics

African experts and media outlets are warning about the evolving nature of terrorist organizations on thecontinent the terrorists pursuit of new targets and tactics and their potential for taking advantage of regional instability

Leading South African think tank the Institute for Security Studies stated on 29 Augustthat Boko Harams attack on the UN in Abuja completes Boko Harams metamorphosisinto an international terrorist group Since December 2010 Boko Haram had killed over600 people in over 70 attacks against Nigerian targets according to the think tank buthad not previously targeted Western or international interests

A 26 August article on the popular Malian web portal Maliweb voiced concern thatAQIM could benefit from Tuareg mercenaries many of whom were recently returningfrom fighting in Libya and could benefit from an increase in arms trafficking through theSahel during the Libyan conflict

Ugandas privately owned Daily Monitor reported on 19 August that AU forces inSomalia warned that Al-Shabaab planned to increase the number of kidnappings andbomb attacks as part of its new strategy to shift from controlling territory in Mogadishuto conducting more of an insurgent campaign

Concern Over Al-Qaida Presence Terrorist Collaboration

West African official statements and media reports reflect a growing concern over an increased Al-

Qaida presence in West Africa and collaboration with AQIM Al-Shabaab and Boko Haram

Nigerian security services reported that the suspected mastermind behind the 26 Augustbombing of the UN office in Abuja was a Boko Haram member with close links to Al-Qaida and Al-Shabaab according Nigerias privately owned Daily Sun

A 28 August report in the privately owned daily Nigerian Tribune claimed that the 26August bombing in Abuja was part of Al-Qaidas plans to mark the 10th anniversary of 911 and called Boko Haram Al-Qaidas ally in the region

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3142

An 8 August commentary in Burkina Fasos LObservateur Paalga said that reports of Boko Haram collaboration with Al-Shabaab and AQIM could indicate that Al-Qaida isextending its African tentacles Abdourahmane Dieng security division chief of theEconomic Community of West African States said the collaboration represented a veryserious threat according to Senegals progovernment Le Soleil on 5 August

Messages Likely To Resonate With African Audience

Sub-Saharan Africas increasing concern about the shifting nature and potential strengthening of theterrorist threat on the continent suggests that messages directly addressing the impact of terrorism onAfricans the increasingly complex nature of the threat and the need for multilateral cooperation againstterrorism are most likely to resonate with Africans

Messages expressing solidarity and sympathy for Africans affected by Boko Haram Al-Shabaab and AQIM would almost certainly resonate with a broad African audience

African political and military leaders would probably welcome acknowledgement of thecomplex and changing nature of terrorism on the continent and recognition of theirinitiatives and commitment to countering violent extremism

African leaders and medias concern about potential collaboration between Boko Haram

Al-Shabaab and AQIM suggest that they would be open to improving multilateral andcross-regional sharing of lessons learned and strategies to counter the intensification of terrorism within Africa

Aviation and Maritime Security| back to top |

Bomb Threats Force Jets To Land

Associated Press | 7 September 2011

Both landed safely one landed in Ankara Ataturk International Airport and the other at Kuala LumpurTwo flights operated by Pakistans state-owned airline received bombs threats on Wednesday

and both landed safely one in Turkey the other in Malaysia officials said No bombs were found The

first flight was headed for Manchester England when it was notified of the threat near the Bulgariancapital of Sofia The crew contacted the control tower in Istanbul to seek permission for the landingstate-run Anatolia news agency reported Authorities quickly evacuated all 378 passengers from theBoeing 777-300ER aircraft after it parked at a remote corner of the International Ataturk Airport andbomb squads began searching the plane with sniffer dogs Anatolia reported PIA spokesman MashoodTajwar confirmed the flight received a threat and landed All passengers were safe A police searchturned up no bomb officials said Later a second PIA flight from Islamabad to Kuala Lumpur alsoreceived a bomb threat It landed in Kuala Lumpur and all the passengers disembarked safely saidTajwar The UK-bound Pakistan International Airlines plane was forced to make an emergency landingat Ataturk Airport in Istanbul after receiving a bomb threat Malaysias airports authority said thepassengers were being screened and the plane was isolated in a parking area while being searched bypolice No bomb was found

It said the plane carried 164 passengers and 13 crew Azmi Murad senior general manager forthe authority said the Pakistani airline informed it that the warning came by email Mr Tajwar gave nodetails on the nature of the threat or how it was delivered Pakistan is home to al Qaedas top leadershipMilitants who trained there have been responsible for many of the attacks and failed plots in the USand Europe since Sept 11 2001 when planes hijacked by al Qaeda militants destroyed the World TradeCenter in New York and crashed into the Pentagon The bomb threats came four days before the 10thanniversary of 911 but there was no apparent link to Islamist militants who typically do not alertauthorities in advance The FBI and Homeland Security department issued warnings last weekend aboutal Qaeda threats to small airlines

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3242

Commentary amp Opinion| back to top |

From Terror Group Founder To Libyan Rebel Military Commander

ABCNews | 29August 2011

The same man who triumphantly led Libyan rebels into Gadhafis compound last week first came to theattention of the US intelligence community years ago - as a founder of a terror group

Abdelhakim Belhaj who was recently appointed to Tripolis rebel military council was one of the original founders of the Libyan Islamic Fighting Group an anti-Gadhafi group which was laterdesignated by the US State Department as a terrorist organization with links to al Qaeda according toUS government reports

We proudly announce the liberation of Libya and that Libya has become free and that the ruleof the tyrant and the era of oppression is behind us a victorious Belhaj told reporters after the stormingof Gadhafis Bab al-Aziziya compound last week Ousting Gadhafi had been the main objective of theLIFG since its inception in the early 1990s even if some of the fighters believed that meant puttingAmericans in the crossfire

The group carried out operations against the Libyan government including at least four suspectedassassination attempts against Gadhafi in the 1990s and was also believed to be connected to a series of suicide bombings in Casablanca Morocco in 2003 the US State Department reported As relationsbetween the US and Gadhafi improved in the mid-2000s some LIFG leaders cultivated relationshipswith top al Qaeda leaders including Osama bin Laden and were suspected of funneling fighters to Iraq tocarry out operations against US soldiers

When the LIFG was designated a terror organization in 2004 it was meant as a gesture of solidarity with the Libyan government according to a March 2011 congressional report

Contrary to several US government reports Libyan rebel ambassador to the US Ali Aujalitold ABC News that the LIFG was never connected to al Qaeda and did not carry out terrorist operations

They were only opposed to Gadhafi during his rule and paid the price for that by beingoppressed by the regime Aujali said

The CIA first publicly voiced its concerns about the connection between the LIFG and al Qaedain 2004 when then-director George Tenet testified before the Senate Select Committee on Intelligenceand listed the LIFG among groups that represented an immediate threat [that] has benefited from alQaeda links[Article continues here httpabcnewsgocomBlotterterror-group-founder-libyan-rebel-military-commanderstoryid=14405319]

Interview With Saudi Sheik Wajdi Al-Ghazawi

MemriTVcom

Sheik Wajdi al-Ghazawi owner of al-Fajr TV criticizes extremist atmosphere in Saudi Arabia and saysafter 911 They Handed Out Sweets on the Streets of Mecca

Following are excerpts from a statement by Saudi Sheik Wajdi Al-Ghazawi owner of Al-FajrTV which was posted on YouTube on August 4 2011

Wajdi Al-Ghazawi When Al-Qaeda and Osama Bin Laden were at the height of their mightthey were extremely popular in Saudi Arabia From mosque pulpits across Saudi Arabia preacherswould pray for their success Moreover from the pulpits of the most important mosques ndash the Al-HaramMosque in Mecca and the Nabawi Mosque in Al-Madina ndash direct prayers for the success of Al-Qaedawere made during the days of the bombing of Tora Bora Oh Allah help our brothers in AfghanistanThese supplications were made during evening prayers as well as Friday prayers The preachers wouldpray for them in violation of the ministrys instructions

When the twin towers in New York were attacked they handed out sweets on the streets of Mecca By Allah they did I witnessed this myself The young people bowed in prayer and hugged one

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3342

another out of joy People were in heaven because of these young men who destroyed America andbombed this idol Am I right or not Was it like that or not

Back then when the Taliban broke off a piece of the nose of the Buddha statue which was hewnin the mountain an entire sermon was dedicated to it in the mosque in Mecca and the preacher was laterreprimanded for this sermon The entire Saudi people supported and loved Al-Qaeda

This went on until our brothers in Al-Qaeda ndash and I dont know what was going through theirminds ndash began to carry out operations inside Saudi Arabia Thats when we all raised our hands andsaid Youve gone too far We wont support you in this

The atmosphere here in Saudi Arabia is one of extremism It is characterized by focusing onminor details Many things are forbidden Yes maybe they are indeed forbidden but by forcing peopleto avoid them and by acting as if these were major sins an atmosphere was created that gave rise toextremist youth who might act recklessly at the most trivial provocation

For instance we blew out of proportion the issue of music the issue of smoking or the issue of hanging pictures in public places True there are clear texts on these issues but the young peopleembraced these issues as if they were fighting usury fornication or alcohol No these are not among theseven major sins So our society has become extreme

This extremist atmosphere has given rise to people who accuse others of heresy and people whopurport to be waging Jihad It has created genes that gave rise to cells of Al-Qaeda and other terrorists

We must examine our breeding ground in which these young men were sownBy Allah what can possibly emerge from such an atmosphere Muftis who accuse others of

heresy sheiks who incite and young people who bomb Am I right or not[Complete clip is available here httpwwwmemritvorgclipen3099htm]

Legal Aspects amp Lawfare| back to top |

Revisiting A Stale Counterterrorism Law

Council on Foreign Relations | 1 September 2011

ldquoNearly a decade after 911 the United States still relies on the 2001 Authorization for the Use of Military Force (AUMF) for the killing and detention of those considered responsible for or associatedwith the terrorist attacks But CFR national security law expert John Bellinger says it is becomingincreasingly difficult for the Obama administration to justify some of its counterterrorism operationsunder this limited statutory authority It has been used in defense of actions including drone attacks onindividuals as well as the targeting of groups in Yemen and Somalia that may have only the mosttenuous affiliation or association to the 911 attack A revised AUMF should clarify those operations aswell as the issue of detention specifically which individuals can be detained for how long and subjectto what processes There also needs to be greater effort at the international level he adds to fill thegaps in the law that covers conflicts between states and non-state actorsrdquohelliprdquo[Complete article is available here httpwwwcfrorgcounterterrorismrevisiting-stale-

counterterrorism-lawp25742]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3442

Narco-Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector[Complete article is available here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Mexicos Cartels Move Into Extortion

At a construction site of an apartment building in the heart of the Mexican capital a company engineerruns through his weekly payroll sheet He has salaries written out for carpenters bricklayers andelectricians At the bottom of the sheet is a notation of $200 for ldquosecurity servicesrdquo next to a nicknameldquoEl Indiordquo mdash the Indian [Complete article is available here

httpwwwtucsonsentinelcomnationworldreport090611_mexico_cartels_bribesmexicos-cartels-move-into-extortion ]

Seven Die In Mexican Pacific Port City

Latin American Herald Tribune

Seven people died in separate shootings in Mazatlan a port city in the northwestern Mexican state of Sinaloa with some of the incidents drug-related a police spokesman told Efe [Complete article is available herehttpwwwlahtcomarticleaspCategoryId=14091ampArticleId=423061]

Tijuana Violence Slows As One Cartel Takes Control

BorderlandBeatcom

Mexicos famously seedy border city of Tijuana is enjoying a lull in drug murders as the countrys mostpowerful cartel gains the upper hand over its rivals [Complete article is available here httpwwwborderlandbeatcom201109tijuana-violence-slows-as-one-cartelhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3542

Network Notes| back to top |

Canadian data foreign threats Spying in the digital age (Suggested by a reader in Lithuania ndash thanks) Globe and Mail | By Colin Freeze 31 July 2010

A government spy agency thatrsquos prohibited from monitoring Canadian citizens is now usingldquoinformation about Canadiansrdquo to zero in on foreign threatsThe ambiguous statement found in a new government report detailing the activities of CommunicationsSecurity Establishment Canada could sanction a range of intelligence-gathering activities ndash includingthe controversial practice of mining ldquometadatardquo from digital communications

Metadata ndash often called data about data ndash are found in e-mails and their attachments and containdigital signatures that can reveal when where and by whom documents were created

The collection of metadata has caused controversy in other countries but never in Canada wherethe Communications Security Establishment Canada operates as an ultra-secretive agency About theonly thing that is known about the classified practices is that they were halted and resumed after someldquomajor changesrdquo including directives signed by Defence Minister Peter MacKay

ldquoI cannot comment on specific operational activitiesrdquo Adrian Simpson a CSEC spokesman toldThe Globe He stressed that reviews upheld that the activities in question were ldquocarried out inaccordance with the law ministerial requirements and CSECrsquos policies and proceduresrdquo

ldquoCSEC is prohibited from directing its activities at Canadians anyone in Canada or Canadiansanywhere in the worldrdquo he said

For decades signals-intelligence agencies in the West have been allowed to safeguard nationalsecurity by eavesdropping on foreignersrsquo conversations Spies can whatever phone lines and satellitesignals they can so long as they never listen in on fellow citizens

But in the digital age governments run increasingly sophisticated dragnets scooping up andscouring through millions of intercepted Internet conversations daily Such practices create legalambiguities

ldquoThe whole issue of what constitutes boundaries for signals-intelligence agencies in cyberspaceis a big debate right nowrdquo said Rafal Rohozinski a security expert affiliated with the University of Torontorsquos Munk School

A watchdog agency that reviews the CSECrsquos activities released an annual report to Parliament onJuly 20 ldquoWhen other means have been exhausted CSEC may use information about Canadians when it

has reasonable grounds to believe that using this information may assist in identifying and obtainingforeign intelligencerdquo it reads

Sometimes collecting metadata is relatively benign It can involve aggregating sets of data tospot trends much like the way meteorologists discern national forecasts from localized information

For example while CSEC canrsquot usually monitor the communications of specific Canadian terrorsuspects it can glean insights by zooming out for big-picture patterns One way to do that MrRohozinski said would be to look at data flows between Canadian cities and Yemen where an Internet-savvy al-Qaeda offshoot works to recruit Westerners

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3642

Metadata however can be more revealing Documents that circulate on the Internet travelaround like postmarked letters marked with return addresses ndash e-mails and attachments have embeddedcodes that speak to the who where and when behind their creation

The US National Security Agency found itself mired in controversy a few years go after itskirted domestic-spying bans by secretly upholding that this sort of American metadata was fair gamedistinct from communication contents

Therersquos little to suggest the CSEC would go that far The federal agencyrsquos activities are reviewedby a watchdog body now headed by a former Federal Court of Appeal judge Robert Deacutecary appointedlast year wrote in his annual report that he was satisfied the CSEC activities in question are lawful evenif his predecessors felt them borderline

ldquoThis was the first review of these activities since hellip their resumption under new policiesrdquo thewatchdogrsquos report says It concludes that the surveillance activities are ldquoin accordance with the lawrdquo andfollow ldquomajor changes to certain policies procedures and practicesrdquo

Much of the concern arises from the possibility that CSEC could hand over metadata intelligenceto domestic law-enforcement and security agencies

As it stands the RCMP and CSIS have to develop their domestic investigations before coming toCSEC ndash usually with warrants ndash if they want specific intelligence The rules guiding handovers are strictbecause even though all agencies run surveillance operations they do so under vastly different

mandates and legal standardsThe spy agency however stood by its practicesldquoCSEC is extremely diligent when it comes to the privacy of Canadiansrdquo Mr Simpson said

[complete article is available here httpwwwtheglobeandmailcomnewsnationalcanadian-data-foreign-threats-spying-in-the-digital-agearticle2113772 ]

Cyber Attacks Against NATO Then And Now

New Atlanticist | 6 September 2011

ldquoNow that NATOrsquos Operation UNIFIED PROTECTOR over Libya is winding down it is worth

noting how few cyber incidents were directed in protest against the Alliance Certainly there was a

cyber component to the liberation of Libya but it was more about content and Internet freedom (the

most newsworthy elements here were the role of social media and the Libyan government taking largeparts of the nation offline) But compared to past history NATO cyber defenders had a relatively easy

time

ldquoNATO has not however had an easy 2011 Although there were three significant incidents we

know about none seemed to have been in direct response to operations over Libyahelliprdquo

[Complete article is available here httpwwwacusorgnew_atlanticistcyber-attacks-against-nato-then-

and-now]

The Calm Before The Storm

Foreign Policy | By Joel Brenner 6 September 2011

Cyberwar is already happening -- and its about to get much much worse A veteran cyberwarriorexplains how America can prepare itself

Revelations of wholesale electronic fraud and massive data heists have become weekly evendaily affairs A multinational electronics corporation loses personal information on more than 100million customers Cyberthieves break into an international bank counterfeit credit balances and lootATMs in four countries grabbing $9 million in just a few hours International gangs spread maliciouscode that conscripts unwitting computers into zombie armies of hundreds of thousands of similarlyenslaved machines Criminals then rent these armies called botnets as easily as you can buy a time-sharing arrangement in a beach condo No wonder the vast majority of Internet traffic is spam

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3742

Yet the loss of personal information and related criminal fraud intolerable as they are are theleast threatening face of electronic insecurity The US militarys secret network is penetratedAmericans corporate pockets are being picked clean of the intellectual property that makes the UnitedStates tick And the electricity grid that keeps the lights on and makes everything move is dangerouslyinsecure

In one remote attack on the Pentagons information systems about 10 years ago the Chinesehauled away up to 20 terabytes of information If the information had been on paper theyd have neededa line of moving vans stretching from the Pentagon to freighters docked 50 miles away in Baltimoreharbor just to haul it away Had they done so the military district of Washington wouldve become anactive theater of operations for the first time since 1865 and the Navy wouldve blockaded theChesapeake Bay But the Chinese did it electronically so who noticed

Corporate espionage by both competitors and foreign intelligence services or their surrogates isalso increasing Intelligence officials see this but cant speak openly about the specifics and Im seeingit now in my law practice The victims rarely admit it for understandable reasons Oracle whichsuccessfully sued SAP for theft of its software code was a prominent exception Google was another

When the Chinese penetrated Google in late 2009 -- yes that operation was Chinese and yes itwas done with the blessing of a member of the Politburo -- they werent after customer informationThey were after the source code that makes Google unique Nor was Google the only victim Thousands

of US and Western firms were penetrated in that affair Foreign governments -- and not only theChinese -- understand that they cannot compete with the United States militarily and politically if theycannot compete with it economically so their intelligence services want to steal its corporate intellectualproperty This is the technology that gives America its competitive edge and often it has nothing to dowith defense Ordinary companies with valuable technology are now being targeted by nation-statesThis is a new era National security and economic security have converged

The danger is not limited to the loss of technology and information however The owners andoperators of the North American electricity grid are hooking up their control systems to the Internet asfast as they can Exposing the grid to the Internet makes it marginally more efficient but it also makes itdramatically more vulnerable to disruption If you can remotely penetrate an electronic system to stealinformation you can remotely penetrate it to shut it down or make it go haywire This is why there is no

longer a meaningful difference between information security and operational security And the biggestoperational risk is the grid In contemporary society nothing moves without electricity If the grid goesout the country stops

As the Stuxnet affair demonstrated remotely engineered disruption of industrial control systemsis now a reality That episode involved the successful electronic attack on the centrifuges in the Iraniannuclear program Only a first-class intelligence agency could have pulled that off but the blueprint fordoing it -- the code itself -- is now public Many American industrial control systems run on the samekind of equipment the Iranians were using but unlike the controls on the Iranian centrifuges thecontrols on the US grid are now being connected to the Internet making them easier to disrupt Stuxnetwas a watershed there will be copycats

Other industrial control systems will also be targets Some already are Air traffic control

railroad switches and water and sewage systems are all electronically controlled now and many arevulnerable If an intruder can break into the right server electronically he can remotely shut downproduction send your goods to the wrong destination and even unlock your doors -- and delete your logentries so he leaves no record of ever having been there

The United States does not lack enemies who would attack it this way Seized al Qaedacomputers contain details of US industrial control systems In 2003 a group affiliated with thePakistani terrorist organization Lashkar-e-Taiba -- the same gang that engineered the 2008 terroristassaults in Mumbai -- plotted to attack the Australian grid Other groups conspired to attack the Britishgrid in 2004 2006 and 2009 Yet the owners and operators of the North American grid continue willy-

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3842

nilly to expose their control systems to the Internet instead of isolating and hardening it This is folly of a high order

Important conclusions for public and corporate policy follow from this vulnerable state of

affairs First cyber insecurity has operational consequences In the current and foreseeable states of technology a high degree of assurance against electronic penetration of anything connected to theInternet is not achievable Large efficient electronically connected organizations and nations aretherefore vulnerable to remotely engineered disruption as well as information theft

Second this risk cannot be eliminated -- but it can be reduced and managed As a nation theUnited States should start by isolating the grids controls from the Internet Undoubtedly there aremarginal efficiencies to be gained by seamless connectivity over a publicly accessible infrastructure butthese gains are usually exaggerated and the risk this connectivity creates is staggering The governmentand the major telecommunications carriers must also make the investment required to re-create themassive redundancies that made the wired telephone network so robust Resilience and swift recoveryshould be the goal If the consequences of cyberattacks were reduced penetration would cease to matter

Third companies that wait for the government to solve their own security problems do so attheir peril The government is broke and the IT backbone is 85 percent private so the governmentdoesnt control it The governments role in altering the status quo will be limited to setting standardsusing its purchasing power to move vendors toward better security and getting its own house in order

The government can neither secure corporate intellectual property nor protect firms against operationaldisruption

Fourth in a world in which everything cannot be protected companies must determine forthemselves what intellectual property and physical assets to isolate and safeguard Those that approachthis task seriously will quickly learn that technology is only one aspect of their insecurity and in manycases the easiest to deal with Unless technology is integrated with personnel practices and operationalsecurity it opens vulnerabilities that its users rarely understand This kind of integration requires theautomated enforcement of reasonable security policies and systematic workforce training and thatoccurs only when management the lawyers and the technologists work closely together This is an old-fashioned management challenge -- not a technological one For their part corporate boards need to takeIT security seriously and launch audits that examine how their systems are actually implemented and

used not merely how they are designed Because as the techies like to put it the weakest link in anysystem is not the silicon-based unit on the desk its the carbon-based unit in the chair Joel Brenner is author of the forthcoming America the Vulnerable Inside the New Threat Matrix of

Digital Espionage Crime and Warfare He has served as the inspector general of the National Security

Agency the national counterintelligence executive and the NSAs senior counsel He now practices law

at Cooley LLP in Washington DC

Cyberattacks Decline Slightly Symantec Report Finds

Dark Reading | 1 September 2011

Organizations worldwide are suffering damages as a result of cyberattacks but interestingly there hasbeen a slight decline in these attacks during the past 12 months according to a new report from

Symantec More than 90 percent of the more than 3300 respondents across 36 countries said theyexperienced tangible losses as a result of a hack with 84 percent reporting financial loss to the cost of abreach Around one-fifth lost at least $195000 in breaches during the past 12 months

Meanwhile Symantec attributes the unexpected bright spot of a decline in breaches toorganizations employing better cybersecurity defenses More than 70 percent of organizations sawattacks in the past 12 months a decline of 5 percent from 2010 And those that experienced anincreasing frequency of attacks dropped from 29 percent in 2010 to 21 percent this year While 100percent last year reported losses from cyberattacks 92 percent did so in 2011 The trend seemscounterintuitive given the rash of high-profile breaches this year More

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 10: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1042

Wednesdayrsquos attack at the Delhi High Court exposed anew the weaknesses in the courthousersquossecurity In May a smaller bomb detonated near a parked car outside the courthouse causing no injuriesWitnesses told local media of seeing a black bag in flames after the blast

Rakesh Tiku chairman of the Delhi Bar Association criticized the Delhi police saying ldquothe low-intensity blast in May should have served as an eye-openerrdquo Mr Tiku said hundreds of litigants andclerks passed through the gate where the blast took place each day making it a vulnerable location ldquoTheDelhi High Court requested the Delhi police to install CCTV cameras as well as personnel to man theentrances three or four months ago but no action has been takenrdquo he said

The latest explosion occurred near Gate 5 of the High Court outside a reception center wherevisitors wait for passes to enter the building Lawyers said Wednesday was an especially busy daybecause the court heard public-interest litigation

ldquoWhat are the police doingrdquo asked Mr Mehrotra the lawyer ldquoThe lives of lawyers litigantsand judges are at stakerdquo

Another witness Brijmohan Sharma described a ldquovery loud sound the reverberations fromwhich caused me to lose my balance I got up and was surrounded by people runningrdquo He added ldquoItwas like a scene from a film People were lying on the floor with their hands cut off their legs brokenand bleedingrdquo

The last serious attacks in New Delhi took place in 2008 when coordinated blasts in a park and

in shopping areas killed more than 20 people and injured nearly 100 In those attacks the IndianMujahedeen an Islamic militant group claimed responsibility

The Delhi High Court is in the heart of the capital a short walk from the cityrsquos landmark IndiaGate Rahul Gupta a local resident said he was standing near the courthouse entrance when the groundshook from the blast throwing people onto the road outside the reception area

ldquoSecurity is one area which no one can handle in Delhi at the momentrdquo Mr Gupta said ldquoIt is thefanatical people who are creating these types of problems and trying to create panic in the publicrdquo hellip

The Indian government said that a preliminary analysis found a nitrate-based explosive withtraces of pentaerythritol tetranitrate or PETN a powerful plastic explosive often used in terror plots hellip[Article continues here httpwwwnytimescom20110908worldasia08indiahtml_r=1ampref=world]

Ten Killed In Delhi Blast

Multiple Sources

At least 10 people were killed and 65 others injured in a bomb blast outside the Delhi High Court on themorning of 7 September private Indian television channel IBN Live reported The terror strike took place in a high security area with Parliament the Prime Ministers Office and India Gate in the vicinitythe report said (CNN-IBN website New Delhi in English 07 Sep 11)

According to the website of the private Indian television channel NDT the blast went off at themain entrance to the court on Shershah Suri Road which is normally heavily guarded The bomb wentoff just before the court was about to open the report said (NDTV website Delhi in English 07 Sep 11)

Security officials were quoted by BBCWS as saying they suspected the explosives were hidden

in a briefcase that had been placed beside the desk where passes were being handed out An eyewitnesstold the BBC that it was a powerful blast shaking the ground and buildings around him (BBC WorldService 7 September 2011)

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1142

Delhi On High Alert In Wake Of Blast

Multiple Sources

The Indian capital has been put on high alert following the blast at the Delhi High Court privateEnglish-language TV news Channel Times Now reported (Times Now TV New Delhi in English0530GMT 07 Sep 11)

Hindi channel says received email from group claiming responsibility for attack Indias Hindinews channel Aaj Tak said on 7 September it had received an email claiming responsibility for the blastAccording to the report the email was sent from the ID harkatuljihadi2011gmailcom The channelsaid the police were investigating possible involvement of the Indian Mujahidin (Aaj Tak TV Delhi inHindi 7 September 2011)

Police Probe Possible Links To Al-Qaidah-Linked Group

Noida IBN Live | in English 7 September 2011

Police in Delhi are looking into claims that a Pakistan-based militant group linked to Al-Qaidah theHarkat-ul-Jihad Islami (HUJI) may have been involved in the attack Noida IBN TV reportedAccording to the report in an e-mail sent to a media house HUJI claimed it had carried out the attack inretaliation for the death sentence issued against Afzal Guru the man found guilty of involvement in an

attack on Delhis parliament almost ten years ago We owe the responsibility of todays blasts at highcourt delhi our demand is that Afzal Gurus death sentence should be repealed immediately else wewould target major high courts amp THE SUPREME COURT OF INDIA the e-mail read According tothe report it was sent from the id harkatuljihadi2011gmailcom

Home Minister Announces Probe Into Attack

CNN-IBN website | New Delhi in English 7 September 2011

Indian Home Minister P Chidambaram speaking in parliament said that investigators did not yet knowwho was behind the attack but he blamed it on terrorists seeking to destabilise the country He saidthat the National Investigative Agency (NIA) would carry out a probe into the attack

PM Denounces Blast As Cowardly Act

Doordarshan news website | New Delhi in English 7 September 2011

Prime Minister Manmohan Singh on 7 September described the blast outside the Delhi High Court as acowardly act and urged all political parties to unite and tackle any acts of terrorism state-run Indiantelevision channel DD News reported This is cowardly act of terrorist nature We will deal with it Wewill never succumb to the pressure of terrorism Singh said He said this is a long war in which allpolitical parties all the people of India have to stand united so that the scourge of terrorism is crushed

IED Explosion At Delhi High Court Domestic Islamists Likely Culprits Growing Signs Of Jihadist Agenda

Sterling-Assynt | 7 September 2011

An IED placed inside a briefcase exploded at 1017AM at an entrance to Delhi High Court wherelitigants collect their visitor passes Wednesdays are reserved for public-interest litigation and so thearea was crowded It is likely that the briefcase was placed in the queue at reception before visitors passthrough security checks There is reportedly no CCTV coverage in this area which will makeidentification of the perpetrator difficult

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1242

The blast was of at least medium intensity and created a crater between three to four feet deepAt least eleven people have died and 65 others have been injured ndash a toll that would probably have beenhigher if an international group had been responsible There were no other explosions which has thesame implication Mumbai has been placed on high alert following the attack especially as the HomeMinistry reported in August that coastal cities were under threat from pan-Islamic terror groups Noblame has yet been assigned A minor explosion occurred on 25 May (also a Wednesday) in a car-park near the Court That bomb was constructed using ammonium nitrate and is believed to havemalfunctioned causing no damage or injuries which suggests similar origins to this one

There are reports of an email from Harkat-ul-Jihadi al-Islami (HuJI) claiming responsibilityfor todayrsquos explosion but we remain sceptical about this since the group has not previously made suchclaims via email The nature of the bomb and the use of email to communicate suggest rather theinvolvement of the Indian Mujahideen (IM) Nonetheless the unverified HuJI email demands that AfzalGurursquos death sentence be repealed and this may point towards the involvement of a jihadist agendaGuru was involved in the December 2001 Parliamentary attacks in Delhi and had his mercy petitionrejected by the Home Ministry on 10 August

Todayrsquos incident indicates an increase in successful attacks by local groups A robust securityforce campaign following the 2008 Mumbai attacks diminished the capabilities of groups such as IMThey claimed responsibility for the December 2010 Varanasi bomb blast which killed one and injured

twenty people However IMrsquos likely involvement in the July 2011 blasts in Mumbai and the attack todaypoints towards the rebuilding of its capabilities and possibly also the establishment of closer ties with jihadi groups

We do not expect a spate of attacks to follow imminently but such incidents will continue tooccur possibly on a larger scale as IM continues to regroup following the security clampdownDevelopments in the cases of Afzal Guru and Ajmal Kasab (the surviving gunman from 2008) willprovide cause for further attacks Given a recent warming in relations between India and Pakistan theHigh Court attack will be unlikely to raise tensions between the two countries significantly

Indonesia

| back to top |

Islamic Groups Continue To Harass Religious Minorities Government Silence Further

Encourages Attacks Youths Beaten In East Jakarta

Assynt SEAsia Vol VIII No17 | 7 September 2011

Hard-line Islamic groups continued to intimidate religious minorities without any response from theGovernment at either a local or national level Yudhoyono relies on the support of Islamic parties inParliament and is unlikely to take any decisive action against such incidents This will further encourageradical groups and endangers the countryrsquos reputation for religious tolerance

Three youths were beaten by members of the Islamic Defenders Front (FPI) for allegedly beingdrunk The attack took place in Jakartarsquos business district but it remains unlikely that the FPI will targetforeigners and the security forces will not tolerate any threats to business interests Nonetheless such

incidents highlight a worrying trend towards increasingly hard-line behaviour that remains unchecked bythe Government

We previously reported that the light sentences handed down for the killing of three members of the Ahmadiyah sect will embolden radical groups (see our Report of 3 August) In this period theIslamic Reform Movement (Garis) coerced Ahmadi youths in Cianjur West Java to join mainstreamprayers The Ahmadiyah sect meanwhile was banned from conducting religious activities during theEid holidays by the South Sulawesi administration for fear of provoking violence

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1342

Iran

| back to top |

Two Arrested Al-Qaidah Members Iraqi Three Iranian - Iran Official

ISNA website | Tehran in Persian 7 September 2011

The public prosecutor of Irans Kerman Province Yadollah Movahhed has announced the start of aninvestigation into the case of five people arrested on charges of having links to Al-Qaidah the IranianStudents News Agency (ISNA) reported on 7 September Two of the detainees - arrested on 19 August -are Iraqis and the other three are Iranian nationals Movahhed told ISNA in an interview on 7 SeptemberThe prosecutor said the detained people are accused of carrying illegal arms and munitions and addedthat an investigation is ongoing into the possibility that they were members of a larger group

Israel

| back to top |

Israel Uncovers Planned Hamas Bombing Spree On Israelis

Xinhua | 8 September 2011

Hamas cells operating in the West Bank routed between May and AugustThe Israeli security agency Shin Bet has broken a network of Hamas cells operating in the West Bank and planning a series of attacks against Israeli targets local media reported Wednesday Dozens of

Hamas members comprising 13 militant cells were arrested throughout the West Bank between May andAugust Army Radio reported One of the groups has carried out a bombing attack at the entrance toJerusalem in March in which a British woman was killed and several dozen civilians wounded Anothercell had planned to dispatch a suicide bomber to Jerusalems Pisgat Zeev neighborhood on Aug 21 Theattack was thwarted at the last minute by Shin Bet agents assisted by the Israel Defense Forces (IDF)and police according to Army radio Other groups were in various stages of planning and preparingattacks including bombings and the kidnapping of civilians or soldiers for the release of Palestinians jailed in Israel The Shin Bet concluded based on its interrogations of the group members that theHamas military leadership in Gaza and abroad is exerting considerable efforts to rehabilitate itspresence in the West Bank with financing and weapon smuggling The West Bank has remainedrelatively quiet in recent years Israeli officials attributed the success in preventing violence in the area

to the cooperation between the IDF and the Palestinian National Authoritys security forces

Israeli Air Strike Kills One Gaza Militant

Xinhua | 8 September 2011

Strike follows more rocket launches from Gaza warnings of new battlesAn Israeli air strike killed an Islamic Jihad militant and wounded three others in the central Gaza

Strip town of Dier a-Balah witnesses and medical sources said Local witnesses said the militant diedafter his car was hit by a missile adding that three other people were also wounded The condition of theinjured is stable hospital sources said Earlier Wednesday an Israeli military spokesperson said a rocketwas launched from the Gaza Strip into south Israel adding the projectile landed in an open area and didnot cause injuries or damage None of the Palestinian armed factions has claimed responsibility for the

rocket attack Late on Tuesday a Palestinian militant was killed and two others injured when Israeliwarplanes targeted a group of gunmen east of Khanyounis City south of the Hamas-ruled Gaza Strip

The Gaza Strip witnessed an escalation of bloody violence between Israel and Gaza militantgroups in August leaving 26 Palestinians and three Israelis killed The violence was triggered after eightIsraelis were killed in well-coordinated operation in the Red Sea city of Eilat Israel accused Palestinianmilitants of plotting and carrying out the attack which started from the bordering Sinai Peninsula inEgypt

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1442

Libya

| back to top |

Libyan Extremist Britain Allowed To Stay Was Link To Al-Qaeda In Iran Papers Show

The Daily Telegraph | (London) By Richard Spencer Tripoli

The extremist Ismail Kamoka spent several years sending funds to terrorist groups across the Middle East

An Alleged Libyan extremist who sought political asylum in Britain regularly travelled to Iran from2002 to provide forged documents to extremists linked to al-Qaeda secret files found in a Tripoliintelligence service building have disclosed

The documents seen by The Daily Telegraph unearth British intelligence suspicions about linksbetween Iran and al-Qaeda dating back almost a decade Other details to come out of the documentssent by MI6 and found in the office of the former head of foreign intelligence and later foreign ministerMoussa Koussa who defected in March include the revelation that Britain had begun co-operating withthe Chinese security services on Islamic extremists The extent of Iranian co-operation with al-Qaedahas been disputed in intelligence communities though Iranians are thought to have provided weaponsand explosives to the Taliban in Afghanistan

A number of al-Qaeda operatives including members of the family of Osama bin Laden fled toTehran after the fall of the Taliban in Afghanistan and their precise status in Iran has been unclear Thepapers in Libya do not directly challenge the Iranian government but suggest that al-Qaeda operativeshad more freedom of movement there than previously thought The extremist Ismail Kamoka spent

several years sending funds to terrorist groups across the Middle East including some linked to al-Qaeda the files said Mr Kamoka who had been given indefinite leave to remain in Britain afterarriving from Saudi Arabia in 1994 and claiming asylum travelled from the UK to Iran viaSwitzerland in July 2002 according to one document[Article continues herehttpwwwtelegraphcouknewsworldnewsafricaandindianoceanlibya8740771Libyan-extremist-Britain-allowed-to-stay-was-link-to-al-Qaeda-in-Iran-papers-showhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1542

Nigeria

| back to top |

Bomb Explodes In Violence-Torn Nigerian City Residents

AFP | 6 September 2011

A bomb went off Tuesday in Nigerias northeastern city of Maiduguri disrupting a three-week lull inbombings in the violence-torn city local residents said [Article continues here httpnewsyahoocombomb-explodes-violence-torn-nigerian-city-residents-215718081html]

Pakistan

| back to top |

Pakistan Bans Foreign Travel For Those Involved In Bin-Ladin Probe

The News website | Islamabad in English 7 September 2011

A Pakistani commission investigating the circumstances surrounding the killing of Al-Qaidah chief Usamah Bin-Ladin has banned foreign travel for everyone involved in the probe Pakistani daily TheNews part of the Jang group which owns Geo TV reported on 7 September The paper recalled that thecommission had already directed the countrys interior ministry and the intelligence service ISI toensure that the Bin-Ladin family was not repatriated from Pakistan without the consent of the

commission

More Than 20 Killed In Two Suicide Blasts In Pakistans Quetta

Express247 TV | Lahore in English 5 September 2011

At least 22 people were killed and several others injured in two explosions in the south-westernPakistani city of Quetta on 7 September the website of the Dubai-based private Pakistani TV channelARY News reported According to the channel one blast went off near the residence of the FrontierConstabulary and another one near the commissioner office in Quetta According to the report around100 kilograms of explosives were used in each attack (ARY News website Dubai in English 07 Sep 11)

Private Pakistani English-language TV channel Express 247 carried a series of onscreen scrollswhich said police had confirmed that the two blasts were suicide attacks The report cited police sources

as saying that 25 people were killed and more than 40 injured in the attacks (Express247 TV Lahorein English 0654GMT 07 Sep 11)

BBCM notes that the attacks came after the Pakistani intelligence agency said on 5 August that ithad arrested Al-Qaidah commander Younis Al-Mauritani and two of his accomplices in Quetta

Taleban Say Quetta Blasts Revenge For Recent Al-Qaidah Arrests

AFP | 7 September 2011

The Pakistani Taleban have claimed responsibility for the twin suicide bombs in Quetta on 7 Septembersaying they were carried out to avenge the recent arrests of Al-Qadiah operatives in the city Wecarried out the attacks Taleban spokesman Ehsanullah Ehsan told AFP in a phone call from anundisclosed location

Twin Suicide Bombings In Pakistan Leave 23 Dead

Miami Herald

Twin suicide bombers attacked the home of a senior military officer Wednesday in the western city of Quetta injuring him and killing at least 23 people officials said in a possible revenge attack forPakistans recent arrest of a senior al Qaida commander [Article continues here httpwwwmiamiheraldcom201109072394264twin-suicide-bombings-in-pakistanhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1642

Philippines

| back to top |

Moro Splinter Group Threatens US Soldiers In Philippines But Capabilities Limited

Government-Rebel Negotiations Remain Difficult

Assynt | SEAsia Vol VIII No17 7 September 2011

Ameril Umbra Kato a former senior Moro Islamic Liberation Front (MILF) field commander whoresigned late last year because he rejects peace negotiations has threatened to attack US troops as wellas Filipino security forces and other Government targets US and Filipino troops are currentlyundertaking joint training exercises This is an annual event but the first time they have been conductedin central Mindanao However Katorsquos splinter group the Bangsamoro Islamic Freedom Fighters (BIFF)is believed to have as few as 200 members with generally unsophisticated weapons ConsequentlyBIFFrsquos ability to conduct an attack on US forces is likely to be limited

In this period Kato announced the creation of a political wing to his grouping the BangsamoroIslamic Freedom Movement emphasising his split with MILF Nevertheless he has not been expelledfrom MILF and so is protected by the current ceasefire with Manila though MILF has stronglycondemned Katorsquos threat against US troops It is possible that MILF leadership is content to allow himto operate relatively unimpeded in order to gain greater leverage in its negotiations with theGovernment since they can contrast their more compromising approach with BIFFrsquos threatened

violence Meanwhile negotiations between MILF and the Government continue MILF dismissed theGovernmentrsquos latest proposal for an autonomous region but both sides appear committed to continuingtalks

Russia

| back to top |

Suicide Bombings In Grozny Demonstrate Islamic Insurgencyrsquos Continuing Capabilities In

Chechnya

Stirling Assynt Reports | Report FSU Vol IV No17 7 September 2011

A series of suicide bombings in the Chechen capital on 31 August (which left nine casualties includingseven police officers) has severely undermined President Ramzan Karydovrsquos claims to have successfully

eradicated the Islamic insurgency in the Republic The first suicide bomber reportedly detonated hisexplosives in a densely populated area only 150 metres from a local Parliament building while twofurther jihadists targeted first-response units Significantly the attack occurred during the Muslimholiday of Eid a three day celebration which marks the end of Ramadan during which the risk of jihadist attacks is heightened Indeed in addition to this strike in Grozny jihadist militants carried outfurther attacks in Iraq Nigeria and Algeria during Eid this year

Although no group has claimed responsibility for this incident it bears the hallmark of theCaucasus Emirate and so was likely orchestrated by the grouprsquos newly appointed deputy KhuseynGakayev and his brother Vadalov Indeed the Gakayev brothers are believed to have been behind theattack on the Chechen Parliament in October 2010 demonstrating the grouprsquos capabilities and intent tocarry out such strikes Moreover the timing of these bombings ndash only two months after the

reconciliation of the Caucasus Emiratersquos leader Doku Umarov with Chechen commanders (see our 3August Report) ndash supports this assessment and suggests that further incidents and suicide bombings arelikely given this truce

Suspected Militant Killed In Russias Southern Republic

Interfax news agency | Moscow in Russian 7 September 2011 Russias National Antiterrorist Committee said on 7 September a militant had been killed in the Republicof Kabarda-Balkaria the corporate-owned Russian news agency Interfax reported

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1742

Saudi Arabia

| back to top |

Saudi Arabia Shopping Around For Nuke Technology

Haaretz | 8 September 2011

Ties with Pakistan may remain close as Riyadh seeks nuclear assistanceSynopsis This week brought news that Iran on its own has produced new advanced nuclearcentrifuges According to a report of the International Atomic Energy Agency Iran has begun to installthe centrifuges in its uranium enrichment facility in Natanz But the high-level source noted thatdevelopment and production of the new centrifuges began more than seven years ago That does notspeak of a great technological capability on Irans part Israeli intelligence like its American counterpartviews 2014 or 2015 as the date when Iran will be able to build nuclear weapons says the source - if itwants to and no one blocks it In Saudi Arabia in contrast they are a bit more disturbed by thedevelopments in Iran An American Department of Energy delegation visited Riyadh and met with DrHashim Yamani who heads the King Abdullah City for Atomic and Renewable Energy Saudi Arabiawants to equip itself with nuclear reactors to generate electricity The United States is interested inselling Riyadh reactors for two reasons - fat contracts and the ability to keep close tabs on nucleardevelopments in Saudi Arabia The American administration is concerned that with a nuclear programfor civilian uses Saudi Arabia would actually like to prepare the infrastructure so it could switch to

producing nuclear weapons relatively quickly should Iran possess such weapons Defense ministerSultan Bin Abdul Aziz and the countrys former intelligence chief Turki Bin Faisal reportedly favorthe preparation of a secret nuclear program for military uses in cooperation with a Sunni Muslim ally -Pakistan which possesses dozens of atomic bombs Saudi Arabia reportedly funded Pakistans nuclearweapons program in return for Pakistans promise to aid the monarchy in this area if need be

Serbia

| back to top |

Serbia Threatened By Terrorism Says Dacic

Tanjug | 8 September 2011

US officials warned Serbia of possible terrorist activity particularly against foreign interests

After a warning coming from USA officials Serbia will raise the level of security in all facilitiesbelieved to be a possible target of terrorists the countrys Deputy Prime Minister and Minister of InteriorIvica Dacic stated Wednesday in the Palace of Serbia He stated that the security measures will primarilyrefer to the facilities of foreign countries in Serbia and added that special attention will be paid to thesecurity of air traffic US officials assume that there is a possibility of new terrorist attacks in the USAand other countries including Serbia Dacic said following a meeting with Special Representative of the UN Secretary-General for Disaster Risk Reduction Margareta Wahlstrom in Belgrade and a sessionof the republic headquarters for emergency situations

Somalia

| back to top |

Six Killed In Mortar Attack In Somali CapitalShabeelle Media Network website | Mogadishu in Somali 7 September 2011

Six people were killed and several others injured after three mortars landed in Mogadishus Arjantiinneighbourhood in Kaaraan District on the night of 6 September the privately-owned Shabeelle websitereported It quoted an eyewitness as saying that two of the three mortars fired have caused thecasualties inflicting fear in the residents who returned to their homes after Al-Shabab vacated the areaearly last month Kaaraan District is one of the areas taken over by the government forces and AUpeacekeepers

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1842

United States

| back to top |

Post-911 Intelligence Reform Takes Root Problems Remain

Reuters | 8 September 2011

US intelligence agencies will forever be scarred by their failure to connect the dots and detect theSeptember 11 plot but a decade later efforts to break down barriers to information-sharing are takingroot Changing a culture of need-to-know to need-to-share does not come easily in spy circles Someofficials say they worry a decade later about a future attack in which it turns out that US spy agencieshad clues in their vast vaults of data but did not put them together or even know they existed

Yet significant changes both big and small have broken down barriers between agenciessmoothed information-sharing and improved coordination US intelligence experts say From issuing ablue badge to everyone working in the sprawling intelligence community to symbolize a commonidentity to larger moves of mixing employees from different agencies the goal is singular -- to preventanother attack

Were much further ahead David Shedd Defense Intelligence Agency deputy director said of the ability to connect the dots compared with 10 years ago Still signs of a plot to attack the UnitedStates could be missed again My worst fear and I suspect probably one that would come true is that inany future would-be or actual attack God forbid we will be able to find the dots again somewhere

because of simply how much data is collected Shedd said The political response to the failure to stopthe attack was the 2002 creation of the Department of Homeland Security pulling together 22 agenciesto form the third largest US Cabinet department behind the Pentagon and Veterans Affairs

That was followed by the creation in late 2004 of the Director of National Intelligence to overseeall the spy agencies as recommended by the bipartisan 911 commission Previously the CIA directorheld a dual role of also overseeing the multitude of intelligence agencies But in the aftermath of the2001 attacks policymakers decided that was too big of a job for one person to do effectively

Critics argued then and now that the reforms were the governments usual response to crises --create more bureaucracy But others see much-needed change It has been a tremendous improvementsaid Lee Hamilton who was the 911 commission vice chair Its not seamless there are problems andweve still got a ways to go The 2001 attacks involving airliners hijacked by al Qaeda operatives killed

nearly 3000 people in New York Pennsylvania and the Pentagon Various US intelligence and lawenforcement agencies had come across bits of information suggesting an impending attack but failed toput the pieces together The CIA had information about three of the 19 hijackers at least 20 monthsbefore the attacks the National Security Agency had information linking one of the hijackers with alQaeda leader Osama bin Ladens network the CIA knew one hijacker had entered the United States butdid not tell the FBI and an FBI agent warned of suspicious Middle Eastern men taking flying lessons

Have the reforms made America safer Officials say yes and point to the US operation thatkilled bin Laden in Pakistan in May that demanded coordination among intelligence agencies and themilitary But there is an inevitable caveat no one can guarantee there will never be another attack onUS soil On Christmas Day 2009 a Nigerian man linked to an al Qaeda off-shoot tried unsuccessfullyto light explosives sewn into his underwear on a flight to Detroit from Amsterdam It turned out US

authorities had pockets of information about him President Barack Obama used a familiar September 11phrase to describe the 2009 incident as a failure to connect the dots of intelligence that existed acrossour intelligence community

Roger Cressey a former White House National Security Council counterterrorism officialresurrected another September 11 phrase It was a failure of imaginationThe intelligence community had not seen al Qaeda in the Arabian Peninsula a Yemen-based al Qaedaoff-shoot as capable of striking the US homeland If the underwear bomber threat had originated inPakistan they would have gone to battle stations immediately Cressey said Some proposed changesin how authorities would respond to another successful attack still are pending For example creation of

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1942

a common communication system for police firefighters and other emergency personnel remainstangled up in political wrangling in Congress over how to implement it This is a no-brainer Hamiltonsaid The first responders at the scene of a disaster ought to be able to talk with one another Theycannot do it today in most jurisdictions

Former leaders of the 911 commission issued a report card saying nine of its 41recommendations remain unfinished The Office of the Director of National Intelligence hasexperienced growing pains as overseer of the 17 spy agencies churning through four chiefs in six yearsTensions over turf confusion about the DNIs role and problems herding agencies with very powerfulchiefs of their own all came to a crescendo when retired Admiral Dennis Blair the third DNI tried toassert authority over CIA station chiefs who represent the agency in different countries The positionof chief of station is one of the crown jewels of the CIA and they dont want anyone playing with theircrown jewels said Mark Lowenthal a former senior US intelligence official

After a dust-up with CIA Director Leon Panetta who now is defense secretary it was Blair whowas sent packing I think the mistake that some have made is to have viewed the DNI and the Directorof CIA as an eitheror proposition rather than the power of the two working together the DIAs Sheddsaid in an interview in his office There is a history of where that hasnt worked so well I believe it isworking much better today said Shedd who has worked at the DNI CIA and National SecurityCouncil

Intelligence experts say in the current administration Obamas top homeland security andcounterterrorism adviser John Brennan arguably has more power than any of them because he has thepresidents ear Its a reminder that bureaucratic reform or no personalities count in making nationalsecurity policy The improved sharing of secret data has led to yet another set of problems The delugeof bits and bytes has subjected intelligence analysts to information overload as they try to sift through itall for relevant pieces Our analysts still are spending way too much time on finding the informationrather than on the analysis of the information Shedd said There is just too much data to go find it all

The intelligence community wants a system developed that would automatically processinformation from multiple agencies and then make the connections for the analysts

But greater inroads into sharing data across agencies does not guarantee that another attack willbe averted The threat has evolved and officials now are increasingly concerned about a lone wolf plot

by an individual not tied to any militant group that may be more difficult to uncover Those threatswill not come to our attention because of an intelligence community intercept said John Cohen asenior Department of Homeland Security counterterrorism official

They will come to our attention because of an alert police officer an alert deputy sheriff analert store owner an alert member of the public sees something that is suspicious and reports it Cohensaid One measure of the success of post-911 reforms is that a decade later the United States has not hada similar attack Now that could be luck that could be skill we dont really know Hamilton said Butin all likelihood what we have done including the establishment of the Department of HomelandSecurity and the transformation in intelligence and FBI has certainly been helpful[Article continues here ]httpnewsyahoocompost-9-11-u-intelligence-reforms-root-problems-052514320html

Comment the value added provided by the Office of the DNI remains an open question for many withinthe Intelligence Community (IC) and is a favored theme of corridor discussion in IC-member agenciesOn the other hand there is broad agreement among intelligence officials that the degree of cooperationand coordination between intelligence agencies and the character of intelligence sharing has vastlyimproved The fact that there has not been a successful major attack on US soil since 911 ndash not forlack of plotting ndash is in great part testimony to this more effective cooperation

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2042

Jihadist Suggests Striking New York City Bridges

All SITE Intelligence Group | 6 September 2011

A jihadist pointed to what he found to be a weak point of suspension bridges and directed his messageto those who love blasting and explosions In a message posted on the Shumukh al-Islam forum onSeptember 6 2011 the jihadist Abu Suleiman al-Nasser gave a picture of the Verrazano Bridge inNew York on which he drew a red box and arrow on the bridges center He then gave a map on whichhe circled the various bridges in New York City and its boroughs A fellow jihadist offered his ownidea giving a picture of the Hoover Dam and explaining that there is no target more important thandams He wrote that striking a dam may lead to the submerging of cities and the killing of thousands of people and in the case of the Hoover Dam would impact Las Vegas the capital of gambling anddebauchery

Counterterror Veteran is New Deputy FBI Director

Atlanta Journal Constitution | 1September2011

A 24-year FBI veteran with extensive counterterrorism experience Sean Joyce has been named the lawenforcement agencys new deputy director Elevated to the No 2 post within the FBI by Director RobertMueller Joyce replaces Timothy Murphy who is retiring after 23 years with the bureau Since last yearJoyce has been executive assistant director of the national security branch responsible for the FBIs

national security and intelligence operations He earned the Attorney Generals Award for ExceptionalService in 2004 for work on a counterterrorism squad in Dallas In 2008 he was named chief of thecounterterrorism divisions international terrorism operations section with responsibility forinternational terrorism matters within the United States hellip[Complete article is available here httpwwwajccomnewsnation-worldcounterterror-veteran-is-new-1153018html]

Top CIA Official Obama Changed Virtually Nothing

Salon | 1 September2011

PBSs Frontline is airing an examination of Top Secret America on September 6 The show includes arare and lengthy interview with 34-year-CIA-veteran John Rizzo who is described as the most

influential lawyer in CIA historyHere is one quote they include from Rizzo With a notable exception of the lsquoenhanced

interrogationrsquo program the incoming Obama administration changed virtually nothing with respect toexisting CIA programs and operations Things continued Authorities were continued that wereoriginally granted by President Bush beginning shortly after 911 Those were all picked up reviewedand endorsed by the Obama administration hellip[Complete article is available herehttpwwwsaloncomnewspoliticsbarack_obamastory=opiniongreenwald20110901obama]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2142

General Counterterrorism News| back to top |

The Terrible Missed Chance

Newsweek | 4 September 2011

Special Agent Harry Samit of the FBIs Minneapolis field office knew he was looking into the eyes of aterrorist It was early afternoon on Friday Aug 17 2001 Across from him sat Zacarias Moussaoui a33-year-old French-born student arrested the day before for overstaying his visa Moussaoui had paidmore than $8000 in cash that summer to sit in a cockpit simulator in a flight school in the suburbs of Minneapolis and learn - in a matter of days - the basics of how to fly a 747-400 Samit a formerintelligence officer at the Navys celebrated Top Gun flight school felt sure the man across the desk from him was a Muslim extremist who was part of a plot to hijack a commercial jetliner filled withpassengers The trick Samit wrote in a soon-to-be-released excerpt of a book hes written about thecase was getting Moussaoui to admit this and reveal details and associates to allow us to stop the plot

Surely the bureau brass in Washington would share his concern Samit thought He was wrongThat same day halfway across the country in the fluorescent-lit hallways of the J Edgar Hoover

FBI headquarters building in Washington counterterrorism supervisors were treating Samits firstreports about Moussaoui with skepticism even contempt Michael Maltbie a DC counterterrorism

specialist insisted repeatedly in the days after the arrest that there was no clear link between Moussaouiand Al Qaeda - the link needed for a warrant Maltbie thought Moussaoui was a dirty bird he latertold investigators but favored deporting him to France

Believing a hijacking might be imminent Samit appealed to his boss in Minneapolis SpecialAgent Greg Jones Jones picked up the phone on Aug 27 and called Maltbie at FBI HQ

Moussaoui he said might be part of a plot to get control of an airplane and crash it into theWorld Trade Center or something like that

Maltbie scoffed You have a guy interested in this type of aircraft Maltbie replied accordingto FBI documents That is it (Maltbie declined requests for an interview)

At least Maltbie was paying attention Michael Rolince who ran the FBIs InternationalTerrorism Operations Section was arguably the bureaus most important go-between with the White

House on domestic terrorist threats in the summer of 2001 He tells Newsweek he spent less than 20seconds being briefed on the Moussaoui case that August His office was inundated with terrorismprobes he said since Moussaoui was in custody already he posed no immediate threat Did it rise tothe level of something that I would take upstairs Rolince asks The answer is no

At CIA headquarters alarm bells were ringing loudly CIA Director George Tenet was briefedon Moussaoui within days of the arrest receiving a paper with the eye-catching headline IslamicExtremist Learns to Fly But the FBIs acting director that summer and the bureaus most seniorcounterterrorism official were left in the dark[Article continues here httpwwwthedailybeastcomnewsweek20110904the-terrible-missed-chancehtml]

Pan Am Flight 103 - Lockerbie Bombing - al-Megrahi CIA FilesWebwire | 31 August2011

BACM ResearchPaperlessArchivescom has announced the publishing of CIA files related to the PanAm Flight 103 Lockerbie Bombing

The files can be downloaded at no cost at httpwwwpaperlessarchivescompanam103ciahtml The files date from 1984 to 1999 These are the most recent files on Pan Am 103 released by the

CIA This set of files is unique because it includes memos on the direct handling of an intelligencesource This type of information is exempt from the Freedom of Information Act (FOIA) and is not oftenreleased by the Agency

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2242

The files cover information received by the CIA on Abdel Basset al-Megrahi Al-Megrahi is theonly person ever convicted in the Pan AM 103 case The Scottish government in 2009 allowed al-Megrahi to be released from custody and returned to Libya because of his failing health With the recentfall of Muammar Qaddafis regime there have been renewed calls for al-Megrahi to be returned toScottish custody or extradited to the United States and put on trial[Complete article is available here httpwwwwebwirecomViewPressRelaspaId=144692]

Getting The Caucasus Emirate Right

CSIS | August 2011

ldquohellipThis report aims to set straight a rather distorted record It demonstrates the veracity of three vitallyimportant facts usually obfuscated in discussions of the subject (1) the longstanding and growing tiesbetween the CE and its predecessor organization the ChRI on the one hand and al Qaeda (AQ) and theglobal jihad on the other hand (2) the importance of the CE jihadi terrorist network as a united andorganized political and military force promoting jihad in the region and (3) the salience of local culturaland the Salifist jihadist theo-ideology and the influence of the global jihadi revolutionarymovementalliance as key if not the main factors drive the ldquoviolence in the North Caucasusrdquohelliprdquohttpcsisorgfilespublication110829_Hahn_GettingCaucasusEmirateRt_Webpdf

7 Things You Didnrsquot Know About the War on TerrorForeign Policy | By Eric Schmitt and Thomas Shanker 6 September 2011

From an attempt to negotiate with Osama bin Laden to a proposal to threaten to bomb Mecca its been awild decade for the US national security establishment

Our new book Counterstrike The Untold Story of Americas Secret Campaign Against Al Qaeda is in many ways asummary of the past decade of our reporting on the military intelligence community and domestic law enforcement as itentered a new era of Darwinian evolution to counter violent extremism

It also is our deep dive into a decade of American counterterrorism efforts -- from the work of commando trigger-pullers and spies on the ground up to senior political leaders who wanted to defendthe nation (and get re-elected) Our efforts to report and write this book allowed us to uncover many newmissions never discussed before -- and gave us an understanding of how the war on terror had changedover the last decade

Our book assesses the 10 years since 911 as the military divides the fight into tactical missionson the battlefields of modern terrorism then the operational advancements that provided the means tosuccess while not securing final victory and at the top the strategic level of policy debates about howthe nation should combat this threat to its security

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2342

Here are seven vignettes from Counterstrike that offer glimpses into the thinking of policymakers andcommanders in early days after the Sept 11 attacks and how that thinking evolved over the followingdecade into a more whole-of-government approach to combating terrorists

1 Bush Tried to Negotiate with al Qaeda

The George W Bush administration like all of its predecessors swore never to negotiate with terroristsBut it did undertake an extraordinary and extraordinarily secret outreach effort to open a line of communication with Osama bin Laden and al Qaedas senior leadership It was an attempt to replicatehow the United States tried to sustain a dialogue with the Soviet Union even during the darkest days of the Cold War when White House and Kremlin leaders described in private and in public a set of acceptable behaviors -- and described with equal clarity the swift vicious even nuclear punishment forgross violations

In the months after the Sept 11 attacks Bushs national security staff working through theintelligence agencies made several attempts to get a private message to bin Laden and his inner circleThe messages were sent through business associates of the bin Laden familys vast financial empire aswell as through some of the al Qaeda leaders closest relatives a number of whom were receptive toopening a secret dialogue to restrain and contain their terrorist kinsman whom they viewed as a blot on

their name (To be sure other relatives were openly hostile to the American entreaties)According to a senior American intelligence officer with first-hand knowledge of the effort the

response from Osama bin Laden was silence And the effort was suspended

2 Sometimes a Wedding Is Just a WeddingIn the early days after the Sept 11 attacks the CIA and FBI vied to produce the most compellingintelligence reports that tracked suspected terrorist plots The agencies often worked at cross purposessometimes unwittingly At one point in early 2002 both agencies were tracking what American analystssaid were growing preparations for a major wedding somewhere in the Midwest (In terroristvernacular the word wedding is often code for a major attack)

Dribs and drabs on this wedding planning made their way to President Bush from bothagencies independent of each other of course

Finally over the Easter holiday during a video-teleconference with top aides in Washingtonfrom his ranch in Crawford Texas Bush stopped the briefing exasperated by the discrepancies in therival agencies reporting about the suspected threat

George Bob get together and sort this out Bush told his CIA director George J Tenet andFBI director Robert S Mueller III

Bushs instincts were correct When the analysts finally untangled their clues it turned out thatthe ominous wedding really was just that the matrimony of a young man and a young woman fromtwo prominent Pakistani-American families There was no threat There was no plot

3 The Threat to Bomb MeccaAs fears of a second attack mounted following the 911 strikes US government planners franticallycast about for strategies to protect the country Even the most far-fetched ideas had a hearing howeverbriefly In one case some government planners proposed that if al Qaeda appeared ready to attack America again the United States should publicly threaten to bomb the city of Mecca in Saudi Arabiathe holiest site in all of Islam in retaliation Just nuts one Pentagon aide wrote to himself when heheard the proposal The idea was quickly and permanently shelved

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2442

4 The SEAL Raid in Iran That Didnt HappenWhen US forces routed the Taliban government in Afghanistan and forced bin Laden and his toplieutenants to flee many senior al Qaeda leaders including bin Laden and his deputy Ayman al-Zawahri escaped to neighboring Pakistan But a separate group including the al Qaeda leaders sonSaad bin Laden fled to northern Iran where American troops would not pursue them and the Iranianswould likely not detain them But the Shiite clerics running Iran placed the al Qaeda operatives and theirfamily members under virtual house arrest and they became a shield against possible attacks from theSunni-based terrorist organization

One plan in particular illustrated the bold thinking and wildly unrealistic aims of the militarysinitial approach after 911 to kill or capture terrorist leaders The plan called for hunting the eight to 10senior al Qaeda leaders and operatives who had sought refuge in Chalus an Iranian resort town on theCaspian Sea where they had been detained

At the Joint Special Operations Command at Fort Bragg NC military planners drew up optionsfor Navy SEALs to sneak ashore at night using state-of-the-art mini-submarines Once they landed theSEALs would slip past Iranian guards to snatch the al Qaeda leaders Another option called for SpecialOperations helicopters to spirit American commandos into the town and whisk them out again with theirquarry The Americans went as far as conducting two or three rehearsals at an undisclosed locationalong the US Gulf Coast in early 2002 They conducted small-boat insertion exercises involving about

30 Special Operations personnel most SEALs and eventually concluded the mission was feasible if they were provided with more detailed intelligence on the locations of the al Qaeda members and thesecurity around them

The logistics of the mission were daunting Chalus sits at the edge of the Elburz coastal mountainrange about 70 miles north of Tehran and the failed rescue of the American hostages in Iran in April1980 loomed large in commanders memories Eventually Gen Richard B Myers the chairman of theJoint Chiefs of Staff rejected the mission as too risky and too politically volatile Many of the al Qaedaoperatives are reportedly still there

5 Intelligence Hauls of Unusual Size

US intelligence and military commandos have carried out tens of thousands of raids in the decade since911 The amount of material seized from terrorist and insurgent targets has grown to a massive sizeThe Defense Intelligence Agency (DIA) operates exploitation triage centers and giant warehouses forstoring intelligence products -- in war zones rear headquarters in countries like Qatar and back in theUnited States One intelligence analyst said that walking into one of the warehouses for documents andmedia exploitation reminded him of the final scene in Raiders of the Lost Ark when the captured Ark of the Covenant is crated up and rolled into a cavernous storage area that contains all the governmentsother dangerous secrets

All told more than two million individual documents and electronic files have been cataloguedby media type hard copy phone number thumb drive Each is inspected by a linguist working with acommunications analyst or computer expert

The DIA analysts are joined by specialists from other agencies including the FBI and the DrugEnforcement Administration Yet given the overwhelming volume no more than about 10 percent of thecaptured intelligence has ever been analyzed

Intelligence officers say they simply are overwhelmed and untold quality leads may still beburied in the piles of computers digital files travel documents and pocket litter

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2542

6 The Digital Counterjihad Cyberspace is the terrorists ultimate safe haven Its where they recruit raise money and even plotattacks using coded language while playing online video war games The US government fights back

One technique is called false band replacement whereby the intelligence agencies infiltratemilitants networks and post their own material to counter extremist efforts on those same jihadistwebsites The trick is to forge the onscreen trademarks -- web watermarks -- of al Qaeda media sites

This makes messages posted on these sites official and sows dissent and confusion among themilitants

This Internet spoofing can be used in support of more traditional combat missions There is atleast one case confirmed by American officials in which a jihadist website was hacked by Americancyberwarriors to lure a high-value al Qaeda to a surreptitious meeting with extremist counterparts -- onlyto find a US military team in waiting

Getty images

7 First Kill the MullahsUS counterterrorism officials have learned fighting terrorists effectively means targeting specific nodesof that network that support and enable militants who strap on suicide vests This strategy focuses onneutralizing enablers such as the financiers gun-runners and logisticians Among these terror linchpins

are religious leaders who bless attacksHeavenly reward will not await a suicide bomber unless his death and those of his victims is

deemed halal in keeping with Islams sacred sharia law Each militant network has a sharia emir usuallyat the level of a sheikh or mullah In Iraq American commanders specifically killed emirs to throw awrench in a suicide bombing networks

Take him out and suicide bombings from that network are frozen until he is replaced said onemilitary officer with command experience in Iraq hellip[Complete article is available herehttpwwwforeignpolicycomarticles201109067_things_you_didn_t_know_about_the_war_on_terror]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2642

Dick Marty Rendition Report Condemns lsquoCult of Secrecyrsquo

BBC News | 8 September 2011

A report for Europes human rights watchdog has called for greater scrutiny of secret services andsupport for whistleblowers The Council of Europe investigated how countries like Britain GermanyRomania and Lithuania assisted the US with the rendition of terror suspects It said a cult of secrecyhad helped Western governments cover up abuses Defending whistleblowers it singled out USsoldier Bradley Manning accused of passing secrets to Wikileaks He had acted as a whistleblowerand should be treated as such CoE rapporteur Dick Marty wrote in the report which was due to besubmitted to the CoEs Parliamentary Assembly The soldier is currently in a US military prisonawaiting trial for passing restricted material to the controversial website

But the report praised Mr Manning and Wikileaks itself for uncovering evidence of renditionThe CoE represents 47 member-states including both EU countries and Russia and other ex-Sovietstates Mr Martys report focused on the record of Western states explaining that it was based oninvestigations into European links to the controversial US policy of rendition for terrorism suspectsThe CIA allegedly flew terror suspects around the world for interrogation in the years after 911 holdingthem in secret prisons in Europe and elsewhere

No licence to kill

In his 48-page report - entitled Abuse of State Secrecy and National Security - Mr Marty looked at thelevel of control exercised by European states over their security services He urged all states to useindependent parliamentary committees to oversee the work of their secret services saying this was of vital importance for the rule of law and democracy Mr Marty argued that Western governments wereusing the notion of state secrecy to shield their intelligence services from accountability for seriousviolations committed during anti-terrorist operations We consider that this is simply unacceptablehe wrote

A licence to kill (or to abduct and torture) only exists in certain films and in dictatorialregimes In democratic systems parliaments as representatives of the people have a right and duty toknow what the government is doing in the name of the people Mr Marty praised investigative journalists and non-governmental organisations for their work in exposing abuses of authority Stressing

the fundamental role whistleblowers had to play in an open society he warned against a real cult of secrecy as an instrument of power

While it was up to the courts to decide if Bradley Manning had committed any crime he wrotethe CoE was indebted to him for the publication of a recording of a helicopter attack in Iraq in whichthe crew seems to have intentionally targeted and killed civilians

Thanks to Mr Manning he said a large number of embassy reports had allowed us to learnsignificant details of important recent events which are obviously of general interest We therefore join Amnesty International in expressing our worries as to the treatment he receives Mr Marty wrote inthe draft report[Article continues here httpwwwbbccouknewsworld-europe-14820145]Comment This report demonstrates that Dick Marty is not as De Gaulle would say a serious man To

suggest that Bradley Manning is a hero and intelligence agencies bent on defeating terrorists arecriminals should say it all Manning knowingly violated his oath and willfully provided enormousamounts of classified material to WikiLeaks For Marty this is a good thing in the name of transparencyMarty always injudicious and anti-American in his remarks is now moving at warp speed into crackpotterritory

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2742

Al Qarsquoida amp its Affiliates| back to top |

Al Qaeda Is Down Not Out

Los Angeles Times | By Amy Zegart 7 September 2011

US talk of defeating terrorism is dangerously prematureTalk of strategically defeating Al Qaeda is all the rage in the White House these days Defense

Secretary Leon Panetta used the D-word in July President Obama declared in his new counter-terrorism strategy We can say with growing confidence that we have put Al Qaeda on the path todefeat Compared to the woeful state of the economy terrorism has become the administrations feel-good story of the year

Defeat is a big word It is also dangerously misleading Yes the United States has made greatstrides in the last decade to harden targets improve intelligence and degrade the capabilities of violentIslamist extremists Osama bin Ladens death was a major accomplishment But the fight is nowhereclose to being won and Americas most perilous times may lie ahead Three reasons explain why

The first is that strategically defeating Al Qaeda is not nearly as important as it sounds After911 Al Qaeda morphed into a more complicated decentralized and elusive threat consisting of threeelements core Al Qaeda affiliates or franchise groups operating in places like Yemen and Somalia with

loose ties to the core group and homegrown terrorists inspired by violent extremism often through theInternet in the comfort of their own living rooms

Core Al Qaedas capabilities started degrading in 2001 when the US invaded Afghanistandismantled training camps ousted the Taliban and sent Bin Laden running The CIA has estimated thecore group remaining in the AfghanistanPakistan region to number 50 to 100 fighters The last time BinLaden oversaw a successful operation was 2005 when Al Qaeda struck the London transit system

But plots by homegrowns and franchise groups have risen dramatically in recent years The 2009Ft Hood shooting the worst terrorist attack on US soil since 911 was the work of a homegrownterrorist The mastermind of the 2010 Times Square car bomb plot was a naturalized American citizentrained by the Pakistani Taliban not Al Qaeda Another franchise group Al Qaeda in the ArabianPeninsula was behind the foiled 2009 Christmas Day underwear bomber aviation plot and the 2010

plot to explode tampered printer cartridges aboard cargo planes The Bipartisan Policy Center reported11 violent Islamist extremist terrorist incidents against the US homeland in 2009 the most since 911Nearly all involved what former CIA Director Mike Hayden calls a witches brew of radicalizedAmericans and franchise groups

The second reason why talk of defeat is premature has to do with weapons Terrorism againstAmericans is nothing new The potential for terrorist groups to acquire weapons of mass destruction isIn 1995 a Japanese cult released sarin nerve gas in the Tokyo subway killing 12 people and injuringthousands It was the first WMD terrorist attack in modern history and it sparked a wave of presidentialterrorism commissions years before Bin Laden became a household name

It is this specter of the lone fanatic or small group armed with the worlds most devastatingweapons that keeps experts up at night In 2005 60 leading nuclear scientists and terrorism experts were

asked how many believed the odds of a nuclear attack on the US were negligible Only three or fourhands went up most were far more pessimistic Today there is enough nuclear material to build120000 weapons As long as fissile material is poorly stored and rogue states like Iran and North Koreacontinue their illicit weapons programs nuclear terrorism remains a haunting possibility

The third reason is that the FBI has not yet become a first-rate domestic intelligence agencyAnalysts whose work is vital to success are still second-class citizens labeled support staff alongsidesecretaries and janitors and passed over for key jobs including running the bureaus intelligence unitsThe FBIs information technology is so antiquated it belongs in a museum And the old crime-fighting

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2842

culture still lives There is now a move afoot to shrink new classified facilities so that agents dont haveto waste time away from their cases to read intelligence documents thereStrategically defeating Al Qaeda sounds too good to be true Because it is Amy Zegart is a senior fellow at Stanfords Hoover Institution and the author of Eyes on Spies

Congress and the United States Intelligence Community

US Counterterror Chief Al-Qaida On Steady Slide

Bostoncom | 31 August 2011

White House counterterrorism chief John Brennan said al-Qaida is on a steady slide after the death of al-Qaidas latest second-in-command in Pakistan Brennan told The Associated Press on Wednesdaythat its a huge blow in the first official White House comment since Atiyah Abd al-Rahmans reportedkilling by CIA drone strike in Pakistans tribal areas last week

Al-Qaida is sort of on the ropes and taking a lot of shots to the body and the head Brennansaid This is a time not to step back and let them recover a message he says hes sending to hiscounterparts in Pakistan[Article continues herehttpwwwbostoncomnewsnationwashingtonarticles20110831us_counterterror_chief_al_qaida_on_steady_slide ]

Al-Qaeda (AKA Al-Qaida Al-Qarsquoida)

Council on Foreign Relations | 29 August 2011

ldquoAl-Qaeda an international terrorist network is considered the top terrorist threat to the United StatesThe group is wanted for its September 11 2001 attacks on the World Trade Center and the Pentagon aswell as a host of lesser attacks To escape the post-911 US-led war in Afghanistan al-Qaedas centralleadership fled eastward into Pakistan securing a safe haven in loosely governed areas there In July2007 US intelligence agencies found that the organization was regrouping and regaining strength inthese tribal areas along the border with Afghanistan though targeted killings of senior al-Qaeda leadershave since diminished the groups command and control capabilities In February 2009 Director of National Intelligence Dennis C Blair told lawmakers that the groups core is less capable and effective

than it was a year ago The killing of al-Qaedas top leader Osama bin Laden by US forces in Pakistanin May 2011 served a significant blow to the organization but analysts say al-Qaeda remains deadlywith its networks spread all over the world Plus a number of affiliated groups have gained prominencein recent years complicating the task of containing the organizationrdquo

[Article continues here httpwwwcfrorgterrorist-organizationsal-qaeda-k-al-qaida-al-qaidap9126]

Al Qaeda In The Islamic Maghreb

CSIS | 1 September 2011

ldquoAl Qaeda in the Islamic Maghreb (AQIM) emerged from a decades-long militant Islamist tradition inAlgeria In 1998 the Salafist Group for Preaching and Combat (Groupe Salafiste pour la Preacutedication etle Combat or GSPC) broke away from the Armed Islamic Group (GIA) because of the GIArsquos extensive

targeting of civilians Gradually the GSPC evolved to encompass global jihadist ideology in addition toits historical focus on overturning the Algerian state In 2006 the GSPC officially affiliated with alQaeda core soon rebranding itself as al Qaeda in the Islamic Maghreb In the following years AQIMwas able to conduct a small number of large-scale attacks most notably its 2007 bombing of the UNheadquarters in Algiers In recent years counterterrorism pressure and weak governance have combinedto shift the center of AQIMrsquos presence to the Sahara-Sahel region AQIM continues to make its presenceknown through smuggling operations kidnappings and clashes with security forces in the desert In thecoming years general instability within the region could allow AQIM to further expand its influencerdquo[Complete article is available here httpcsisorgfilespublication110901_Thornberry_AQIM_WEBpdf ]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2942

AQ Strategy

The Assynt Report | 11 August 2011

Executive Summary Al-Qaedarsquos broad objectives remain unchanged in the wake of bin Ladenrsquos death There

are nonetheless growing questions over al-Qaedarsquos capability Longstanding paranoiaover the use of electronic communications is heightened by the ongoing US dronecampaign whilst attacks against the West have generally been disrupted at an early stage

The Pakistani Talibanrsquos attack on a Karachi naval base in May 2011 was a significantmilitary success and the first major act of revenge for bin Ladenrsquos killing Furtherattempts to avenge his loss are certain

All parts of al-Qaeda are working within a cohesive framework with the ultimate aim of restoring the Islamic Caliphate (Khilafa) The strategic plan to support this aim wasdrafted by 40 of al-Qaedarsquos brightest thinkers in Kandahar Afghanistan in November1999 This plan consists of four phases each seven years long leading to the dissolutionof corrupt regimes and the union of all newly-liberated states within the Khilafa

Apart from mounting strategic operations al-Qaedarsquos role is to be the inspiration for atruly global jihadist movement It seeks to achieve this through provision of trainingbeing a role model for others to follow extending acceptance and adoption of its tactics

particularly suicide bombings and professionalising jihadist media to build a commonbrand and message between hitherto separate groups

Between the late 1990s and 2003 the organisation was primarily devoted to classicinternational terrorism Most effort is now spent fighting insurgencies from North Africato South Asia The way in which this strategy helps to spread the struggle has been seenin North-West Africa where the initial development of al-Qaeda in the Islamic Maghrebwas in part fed by men returning from fighting with al-Qaeda in Iraq

Since mid-2009 al-Qaeda and its affiliates have increasingly encouraged jihadist-sympathisers resident in Western countries to engage in violence themselves withoutcentral direction or training making surveillance more difficult

One of the keys to awakening the spirit of jihad was the success in portraying the US and

its allies as Crusaders in the Muslim world Al-Qaedarsquos strategy essentially requires thatthis process be kept running until the forces of jihad have grown large enough to launchsuccessful liberation operations

Despite its successes in Afghanistan al-Qaedarsquos credibility has suffered both from its failure to landanother strategic blow on the West on the scale of 911 and also excessive Muslim casualties in someoperations Similarly al-Qaeda in Iraq was set back by its excessive sectarian zeal and local resentmentat the foreign fighter presence In turn this affected the movementrsquos funding from the Gulf

Analysis Sub-Saharan African Leaders Media Focus On Threats Prior to 911

OSC Feature | Sub-Sahara Africa -- OSC Analysis 6 September 2011Statements by Sub-Saharan African leaders and African media reports on terrorism prior to the 10thanniversary of 911 focus on the growing threats from local extremists and Al-Qaida affiliatesparticularly in West Africa with little direct commentary on the anniversary or US counterterrorismpolicies This focus on domestic threats suggests that counterterrorism messages expressing solidaritywith African nations and acknowledging the evolving terrorist threat on the continent would have thegreatest resonance with African audiences

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3042

Leaders Stressing Determination To Counter Local Threats African leaders public statements reflect an ongoing concern about the threat of terrorism on thecontinent and a strong commitment to find ways to combat this threat

Nigerian President Goodluck Jonathan emphasized the governments commitment tovigorously combat terrorism following the 26 August bombing of the UN office inAbuja by Nigerian extremist group Boko Haram reported the Paris-based news agencyAFP President Jonathan is hosting Liberian President Ellen Johnson Sirleaf and otherforeign dignitaries for a three-day forum on terrorism and economic crimes the widelyread Lagos-based independent daily The Guardian reported on 4 September

Malian President Amadou Toumani Toure launched a Special Program for PeaceSecurity and Development on 9 August stating that development remained the mostviable solution to counter threats to the countrys stability reported Malis state-owneddaily LEssor[ 3] The program aimed to undermine support for Al-Qaida in the IslamicMaghreb (AQIM) according to Burkinabe web portal Lefasonet on 11 August

Somali Prime Minister Abdiweli Muhammad Gas stated on 23 August that theTransitional Federal Government planned to remove Al-Shabaab from the central andsouthern regions in Somalia with the goal of restoring peace within one year so the

country can hold national elections according to the Puntland-based Garowe Online

Experts Media Highlight New Capabilities Tactics

African experts and media outlets are warning about the evolving nature of terrorist organizations on thecontinent the terrorists pursuit of new targets and tactics and their potential for taking advantage of regional instability

Leading South African think tank the Institute for Security Studies stated on 29 Augustthat Boko Harams attack on the UN in Abuja completes Boko Harams metamorphosisinto an international terrorist group Since December 2010 Boko Haram had killed over600 people in over 70 attacks against Nigerian targets according to the think tank buthad not previously targeted Western or international interests

A 26 August article on the popular Malian web portal Maliweb voiced concern thatAQIM could benefit from Tuareg mercenaries many of whom were recently returningfrom fighting in Libya and could benefit from an increase in arms trafficking through theSahel during the Libyan conflict

Ugandas privately owned Daily Monitor reported on 19 August that AU forces inSomalia warned that Al-Shabaab planned to increase the number of kidnappings andbomb attacks as part of its new strategy to shift from controlling territory in Mogadishuto conducting more of an insurgent campaign

Concern Over Al-Qaida Presence Terrorist Collaboration

West African official statements and media reports reflect a growing concern over an increased Al-

Qaida presence in West Africa and collaboration with AQIM Al-Shabaab and Boko Haram

Nigerian security services reported that the suspected mastermind behind the 26 Augustbombing of the UN office in Abuja was a Boko Haram member with close links to Al-Qaida and Al-Shabaab according Nigerias privately owned Daily Sun

A 28 August report in the privately owned daily Nigerian Tribune claimed that the 26August bombing in Abuja was part of Al-Qaidas plans to mark the 10th anniversary of 911 and called Boko Haram Al-Qaidas ally in the region

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3142

An 8 August commentary in Burkina Fasos LObservateur Paalga said that reports of Boko Haram collaboration with Al-Shabaab and AQIM could indicate that Al-Qaida isextending its African tentacles Abdourahmane Dieng security division chief of theEconomic Community of West African States said the collaboration represented a veryserious threat according to Senegals progovernment Le Soleil on 5 August

Messages Likely To Resonate With African Audience

Sub-Saharan Africas increasing concern about the shifting nature and potential strengthening of theterrorist threat on the continent suggests that messages directly addressing the impact of terrorism onAfricans the increasingly complex nature of the threat and the need for multilateral cooperation againstterrorism are most likely to resonate with Africans

Messages expressing solidarity and sympathy for Africans affected by Boko Haram Al-Shabaab and AQIM would almost certainly resonate with a broad African audience

African political and military leaders would probably welcome acknowledgement of thecomplex and changing nature of terrorism on the continent and recognition of theirinitiatives and commitment to countering violent extremism

African leaders and medias concern about potential collaboration between Boko Haram

Al-Shabaab and AQIM suggest that they would be open to improving multilateral andcross-regional sharing of lessons learned and strategies to counter the intensification of terrorism within Africa

Aviation and Maritime Security| back to top |

Bomb Threats Force Jets To Land

Associated Press | 7 September 2011

Both landed safely one landed in Ankara Ataturk International Airport and the other at Kuala LumpurTwo flights operated by Pakistans state-owned airline received bombs threats on Wednesday

and both landed safely one in Turkey the other in Malaysia officials said No bombs were found The

first flight was headed for Manchester England when it was notified of the threat near the Bulgariancapital of Sofia The crew contacted the control tower in Istanbul to seek permission for the landingstate-run Anatolia news agency reported Authorities quickly evacuated all 378 passengers from theBoeing 777-300ER aircraft after it parked at a remote corner of the International Ataturk Airport andbomb squads began searching the plane with sniffer dogs Anatolia reported PIA spokesman MashoodTajwar confirmed the flight received a threat and landed All passengers were safe A police searchturned up no bomb officials said Later a second PIA flight from Islamabad to Kuala Lumpur alsoreceived a bomb threat It landed in Kuala Lumpur and all the passengers disembarked safely saidTajwar The UK-bound Pakistan International Airlines plane was forced to make an emergency landingat Ataturk Airport in Istanbul after receiving a bomb threat Malaysias airports authority said thepassengers were being screened and the plane was isolated in a parking area while being searched bypolice No bomb was found

It said the plane carried 164 passengers and 13 crew Azmi Murad senior general manager forthe authority said the Pakistani airline informed it that the warning came by email Mr Tajwar gave nodetails on the nature of the threat or how it was delivered Pakistan is home to al Qaedas top leadershipMilitants who trained there have been responsible for many of the attacks and failed plots in the USand Europe since Sept 11 2001 when planes hijacked by al Qaeda militants destroyed the World TradeCenter in New York and crashed into the Pentagon The bomb threats came four days before the 10thanniversary of 911 but there was no apparent link to Islamist militants who typically do not alertauthorities in advance The FBI and Homeland Security department issued warnings last weekend aboutal Qaeda threats to small airlines

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3242

Commentary amp Opinion| back to top |

From Terror Group Founder To Libyan Rebel Military Commander

ABCNews | 29August 2011

The same man who triumphantly led Libyan rebels into Gadhafis compound last week first came to theattention of the US intelligence community years ago - as a founder of a terror group

Abdelhakim Belhaj who was recently appointed to Tripolis rebel military council was one of the original founders of the Libyan Islamic Fighting Group an anti-Gadhafi group which was laterdesignated by the US State Department as a terrorist organization with links to al Qaeda according toUS government reports

We proudly announce the liberation of Libya and that Libya has become free and that the ruleof the tyrant and the era of oppression is behind us a victorious Belhaj told reporters after the stormingof Gadhafis Bab al-Aziziya compound last week Ousting Gadhafi had been the main objective of theLIFG since its inception in the early 1990s even if some of the fighters believed that meant puttingAmericans in the crossfire

The group carried out operations against the Libyan government including at least four suspectedassassination attempts against Gadhafi in the 1990s and was also believed to be connected to a series of suicide bombings in Casablanca Morocco in 2003 the US State Department reported As relationsbetween the US and Gadhafi improved in the mid-2000s some LIFG leaders cultivated relationshipswith top al Qaeda leaders including Osama bin Laden and were suspected of funneling fighters to Iraq tocarry out operations against US soldiers

When the LIFG was designated a terror organization in 2004 it was meant as a gesture of solidarity with the Libyan government according to a March 2011 congressional report

Contrary to several US government reports Libyan rebel ambassador to the US Ali Aujalitold ABC News that the LIFG was never connected to al Qaeda and did not carry out terrorist operations

They were only opposed to Gadhafi during his rule and paid the price for that by beingoppressed by the regime Aujali said

The CIA first publicly voiced its concerns about the connection between the LIFG and al Qaedain 2004 when then-director George Tenet testified before the Senate Select Committee on Intelligenceand listed the LIFG among groups that represented an immediate threat [that] has benefited from alQaeda links[Article continues here httpabcnewsgocomBlotterterror-group-founder-libyan-rebel-military-commanderstoryid=14405319]

Interview With Saudi Sheik Wajdi Al-Ghazawi

MemriTVcom

Sheik Wajdi al-Ghazawi owner of al-Fajr TV criticizes extremist atmosphere in Saudi Arabia and saysafter 911 They Handed Out Sweets on the Streets of Mecca

Following are excerpts from a statement by Saudi Sheik Wajdi Al-Ghazawi owner of Al-FajrTV which was posted on YouTube on August 4 2011

Wajdi Al-Ghazawi When Al-Qaeda and Osama Bin Laden were at the height of their mightthey were extremely popular in Saudi Arabia From mosque pulpits across Saudi Arabia preacherswould pray for their success Moreover from the pulpits of the most important mosques ndash the Al-HaramMosque in Mecca and the Nabawi Mosque in Al-Madina ndash direct prayers for the success of Al-Qaedawere made during the days of the bombing of Tora Bora Oh Allah help our brothers in AfghanistanThese supplications were made during evening prayers as well as Friday prayers The preachers wouldpray for them in violation of the ministrys instructions

When the twin towers in New York were attacked they handed out sweets on the streets of Mecca By Allah they did I witnessed this myself The young people bowed in prayer and hugged one

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3342

another out of joy People were in heaven because of these young men who destroyed America andbombed this idol Am I right or not Was it like that or not

Back then when the Taliban broke off a piece of the nose of the Buddha statue which was hewnin the mountain an entire sermon was dedicated to it in the mosque in Mecca and the preacher was laterreprimanded for this sermon The entire Saudi people supported and loved Al-Qaeda

This went on until our brothers in Al-Qaeda ndash and I dont know what was going through theirminds ndash began to carry out operations inside Saudi Arabia Thats when we all raised our hands andsaid Youve gone too far We wont support you in this

The atmosphere here in Saudi Arabia is one of extremism It is characterized by focusing onminor details Many things are forbidden Yes maybe they are indeed forbidden but by forcing peopleto avoid them and by acting as if these were major sins an atmosphere was created that gave rise toextremist youth who might act recklessly at the most trivial provocation

For instance we blew out of proportion the issue of music the issue of smoking or the issue of hanging pictures in public places True there are clear texts on these issues but the young peopleembraced these issues as if they were fighting usury fornication or alcohol No these are not among theseven major sins So our society has become extreme

This extremist atmosphere has given rise to people who accuse others of heresy and people whopurport to be waging Jihad It has created genes that gave rise to cells of Al-Qaeda and other terrorists

We must examine our breeding ground in which these young men were sownBy Allah what can possibly emerge from such an atmosphere Muftis who accuse others of

heresy sheiks who incite and young people who bomb Am I right or not[Complete clip is available here httpwwwmemritvorgclipen3099htm]

Legal Aspects amp Lawfare| back to top |

Revisiting A Stale Counterterrorism Law

Council on Foreign Relations | 1 September 2011

ldquoNearly a decade after 911 the United States still relies on the 2001 Authorization for the Use of Military Force (AUMF) for the killing and detention of those considered responsible for or associatedwith the terrorist attacks But CFR national security law expert John Bellinger says it is becomingincreasingly difficult for the Obama administration to justify some of its counterterrorism operationsunder this limited statutory authority It has been used in defense of actions including drone attacks onindividuals as well as the targeting of groups in Yemen and Somalia that may have only the mosttenuous affiliation or association to the 911 attack A revised AUMF should clarify those operations aswell as the issue of detention specifically which individuals can be detained for how long and subjectto what processes There also needs to be greater effort at the international level he adds to fill thegaps in the law that covers conflicts between states and non-state actorsrdquohelliprdquo[Complete article is available here httpwwwcfrorgcounterterrorismrevisiting-stale-

counterterrorism-lawp25742]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3442

Narco-Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector[Complete article is available here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Mexicos Cartels Move Into Extortion

At a construction site of an apartment building in the heart of the Mexican capital a company engineerruns through his weekly payroll sheet He has salaries written out for carpenters bricklayers andelectricians At the bottom of the sheet is a notation of $200 for ldquosecurity servicesrdquo next to a nicknameldquoEl Indiordquo mdash the Indian [Complete article is available here

httpwwwtucsonsentinelcomnationworldreport090611_mexico_cartels_bribesmexicos-cartels-move-into-extortion ]

Seven Die In Mexican Pacific Port City

Latin American Herald Tribune

Seven people died in separate shootings in Mazatlan a port city in the northwestern Mexican state of Sinaloa with some of the incidents drug-related a police spokesman told Efe [Complete article is available herehttpwwwlahtcomarticleaspCategoryId=14091ampArticleId=423061]

Tijuana Violence Slows As One Cartel Takes Control

BorderlandBeatcom

Mexicos famously seedy border city of Tijuana is enjoying a lull in drug murders as the countrys mostpowerful cartel gains the upper hand over its rivals [Complete article is available here httpwwwborderlandbeatcom201109tijuana-violence-slows-as-one-cartelhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3542

Network Notes| back to top |

Canadian data foreign threats Spying in the digital age (Suggested by a reader in Lithuania ndash thanks) Globe and Mail | By Colin Freeze 31 July 2010

A government spy agency thatrsquos prohibited from monitoring Canadian citizens is now usingldquoinformation about Canadiansrdquo to zero in on foreign threatsThe ambiguous statement found in a new government report detailing the activities of CommunicationsSecurity Establishment Canada could sanction a range of intelligence-gathering activities ndash includingthe controversial practice of mining ldquometadatardquo from digital communications

Metadata ndash often called data about data ndash are found in e-mails and their attachments and containdigital signatures that can reveal when where and by whom documents were created

The collection of metadata has caused controversy in other countries but never in Canada wherethe Communications Security Establishment Canada operates as an ultra-secretive agency About theonly thing that is known about the classified practices is that they were halted and resumed after someldquomajor changesrdquo including directives signed by Defence Minister Peter MacKay

ldquoI cannot comment on specific operational activitiesrdquo Adrian Simpson a CSEC spokesman toldThe Globe He stressed that reviews upheld that the activities in question were ldquocarried out inaccordance with the law ministerial requirements and CSECrsquos policies and proceduresrdquo

ldquoCSEC is prohibited from directing its activities at Canadians anyone in Canada or Canadiansanywhere in the worldrdquo he said

For decades signals-intelligence agencies in the West have been allowed to safeguard nationalsecurity by eavesdropping on foreignersrsquo conversations Spies can whatever phone lines and satellitesignals they can so long as they never listen in on fellow citizens

But in the digital age governments run increasingly sophisticated dragnets scooping up andscouring through millions of intercepted Internet conversations daily Such practices create legalambiguities

ldquoThe whole issue of what constitutes boundaries for signals-intelligence agencies in cyberspaceis a big debate right nowrdquo said Rafal Rohozinski a security expert affiliated with the University of Torontorsquos Munk School

A watchdog agency that reviews the CSECrsquos activities released an annual report to Parliament onJuly 20 ldquoWhen other means have been exhausted CSEC may use information about Canadians when it

has reasonable grounds to believe that using this information may assist in identifying and obtainingforeign intelligencerdquo it reads

Sometimes collecting metadata is relatively benign It can involve aggregating sets of data tospot trends much like the way meteorologists discern national forecasts from localized information

For example while CSEC canrsquot usually monitor the communications of specific Canadian terrorsuspects it can glean insights by zooming out for big-picture patterns One way to do that MrRohozinski said would be to look at data flows between Canadian cities and Yemen where an Internet-savvy al-Qaeda offshoot works to recruit Westerners

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3642

Metadata however can be more revealing Documents that circulate on the Internet travelaround like postmarked letters marked with return addresses ndash e-mails and attachments have embeddedcodes that speak to the who where and when behind their creation

The US National Security Agency found itself mired in controversy a few years go after itskirted domestic-spying bans by secretly upholding that this sort of American metadata was fair gamedistinct from communication contents

Therersquos little to suggest the CSEC would go that far The federal agencyrsquos activities are reviewedby a watchdog body now headed by a former Federal Court of Appeal judge Robert Deacutecary appointedlast year wrote in his annual report that he was satisfied the CSEC activities in question are lawful evenif his predecessors felt them borderline

ldquoThis was the first review of these activities since hellip their resumption under new policiesrdquo thewatchdogrsquos report says It concludes that the surveillance activities are ldquoin accordance with the lawrdquo andfollow ldquomajor changes to certain policies procedures and practicesrdquo

Much of the concern arises from the possibility that CSEC could hand over metadata intelligenceto domestic law-enforcement and security agencies

As it stands the RCMP and CSIS have to develop their domestic investigations before coming toCSEC ndash usually with warrants ndash if they want specific intelligence The rules guiding handovers are strictbecause even though all agencies run surveillance operations they do so under vastly different

mandates and legal standardsThe spy agency however stood by its practicesldquoCSEC is extremely diligent when it comes to the privacy of Canadiansrdquo Mr Simpson said

[complete article is available here httpwwwtheglobeandmailcomnewsnationalcanadian-data-foreign-threats-spying-in-the-digital-agearticle2113772 ]

Cyber Attacks Against NATO Then And Now

New Atlanticist | 6 September 2011

ldquoNow that NATOrsquos Operation UNIFIED PROTECTOR over Libya is winding down it is worth

noting how few cyber incidents were directed in protest against the Alliance Certainly there was a

cyber component to the liberation of Libya but it was more about content and Internet freedom (the

most newsworthy elements here were the role of social media and the Libyan government taking largeparts of the nation offline) But compared to past history NATO cyber defenders had a relatively easy

time

ldquoNATO has not however had an easy 2011 Although there were three significant incidents we

know about none seemed to have been in direct response to operations over Libyahelliprdquo

[Complete article is available here httpwwwacusorgnew_atlanticistcyber-attacks-against-nato-then-

and-now]

The Calm Before The Storm

Foreign Policy | By Joel Brenner 6 September 2011

Cyberwar is already happening -- and its about to get much much worse A veteran cyberwarriorexplains how America can prepare itself

Revelations of wholesale electronic fraud and massive data heists have become weekly evendaily affairs A multinational electronics corporation loses personal information on more than 100million customers Cyberthieves break into an international bank counterfeit credit balances and lootATMs in four countries grabbing $9 million in just a few hours International gangs spread maliciouscode that conscripts unwitting computers into zombie armies of hundreds of thousands of similarlyenslaved machines Criminals then rent these armies called botnets as easily as you can buy a time-sharing arrangement in a beach condo No wonder the vast majority of Internet traffic is spam

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3742

Yet the loss of personal information and related criminal fraud intolerable as they are are theleast threatening face of electronic insecurity The US militarys secret network is penetratedAmericans corporate pockets are being picked clean of the intellectual property that makes the UnitedStates tick And the electricity grid that keeps the lights on and makes everything move is dangerouslyinsecure

In one remote attack on the Pentagons information systems about 10 years ago the Chinesehauled away up to 20 terabytes of information If the information had been on paper theyd have neededa line of moving vans stretching from the Pentagon to freighters docked 50 miles away in Baltimoreharbor just to haul it away Had they done so the military district of Washington wouldve become anactive theater of operations for the first time since 1865 and the Navy wouldve blockaded theChesapeake Bay But the Chinese did it electronically so who noticed

Corporate espionage by both competitors and foreign intelligence services or their surrogates isalso increasing Intelligence officials see this but cant speak openly about the specifics and Im seeingit now in my law practice The victims rarely admit it for understandable reasons Oracle whichsuccessfully sued SAP for theft of its software code was a prominent exception Google was another

When the Chinese penetrated Google in late 2009 -- yes that operation was Chinese and yes itwas done with the blessing of a member of the Politburo -- they werent after customer informationThey were after the source code that makes Google unique Nor was Google the only victim Thousands

of US and Western firms were penetrated in that affair Foreign governments -- and not only theChinese -- understand that they cannot compete with the United States militarily and politically if theycannot compete with it economically so their intelligence services want to steal its corporate intellectualproperty This is the technology that gives America its competitive edge and often it has nothing to dowith defense Ordinary companies with valuable technology are now being targeted by nation-statesThis is a new era National security and economic security have converged

The danger is not limited to the loss of technology and information however The owners andoperators of the North American electricity grid are hooking up their control systems to the Internet asfast as they can Exposing the grid to the Internet makes it marginally more efficient but it also makes itdramatically more vulnerable to disruption If you can remotely penetrate an electronic system to stealinformation you can remotely penetrate it to shut it down or make it go haywire This is why there is no

longer a meaningful difference between information security and operational security And the biggestoperational risk is the grid In contemporary society nothing moves without electricity If the grid goesout the country stops

As the Stuxnet affair demonstrated remotely engineered disruption of industrial control systemsis now a reality That episode involved the successful electronic attack on the centrifuges in the Iraniannuclear program Only a first-class intelligence agency could have pulled that off but the blueprint fordoing it -- the code itself -- is now public Many American industrial control systems run on the samekind of equipment the Iranians were using but unlike the controls on the Iranian centrifuges thecontrols on the US grid are now being connected to the Internet making them easier to disrupt Stuxnetwas a watershed there will be copycats

Other industrial control systems will also be targets Some already are Air traffic control

railroad switches and water and sewage systems are all electronically controlled now and many arevulnerable If an intruder can break into the right server electronically he can remotely shut downproduction send your goods to the wrong destination and even unlock your doors -- and delete your logentries so he leaves no record of ever having been there

The United States does not lack enemies who would attack it this way Seized al Qaedacomputers contain details of US industrial control systems In 2003 a group affiliated with thePakistani terrorist organization Lashkar-e-Taiba -- the same gang that engineered the 2008 terroristassaults in Mumbai -- plotted to attack the Australian grid Other groups conspired to attack the Britishgrid in 2004 2006 and 2009 Yet the owners and operators of the North American grid continue willy-

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3842

nilly to expose their control systems to the Internet instead of isolating and hardening it This is folly of a high order

Important conclusions for public and corporate policy follow from this vulnerable state of

affairs First cyber insecurity has operational consequences In the current and foreseeable states of technology a high degree of assurance against electronic penetration of anything connected to theInternet is not achievable Large efficient electronically connected organizations and nations aretherefore vulnerable to remotely engineered disruption as well as information theft

Second this risk cannot be eliminated -- but it can be reduced and managed As a nation theUnited States should start by isolating the grids controls from the Internet Undoubtedly there aremarginal efficiencies to be gained by seamless connectivity over a publicly accessible infrastructure butthese gains are usually exaggerated and the risk this connectivity creates is staggering The governmentand the major telecommunications carriers must also make the investment required to re-create themassive redundancies that made the wired telephone network so robust Resilience and swift recoveryshould be the goal If the consequences of cyberattacks were reduced penetration would cease to matter

Third companies that wait for the government to solve their own security problems do so attheir peril The government is broke and the IT backbone is 85 percent private so the governmentdoesnt control it The governments role in altering the status quo will be limited to setting standardsusing its purchasing power to move vendors toward better security and getting its own house in order

The government can neither secure corporate intellectual property nor protect firms against operationaldisruption

Fourth in a world in which everything cannot be protected companies must determine forthemselves what intellectual property and physical assets to isolate and safeguard Those that approachthis task seriously will quickly learn that technology is only one aspect of their insecurity and in manycases the easiest to deal with Unless technology is integrated with personnel practices and operationalsecurity it opens vulnerabilities that its users rarely understand This kind of integration requires theautomated enforcement of reasonable security policies and systematic workforce training and thatoccurs only when management the lawyers and the technologists work closely together This is an old-fashioned management challenge -- not a technological one For their part corporate boards need to takeIT security seriously and launch audits that examine how their systems are actually implemented and

used not merely how they are designed Because as the techies like to put it the weakest link in anysystem is not the silicon-based unit on the desk its the carbon-based unit in the chair Joel Brenner is author of the forthcoming America the Vulnerable Inside the New Threat Matrix of

Digital Espionage Crime and Warfare He has served as the inspector general of the National Security

Agency the national counterintelligence executive and the NSAs senior counsel He now practices law

at Cooley LLP in Washington DC

Cyberattacks Decline Slightly Symantec Report Finds

Dark Reading | 1 September 2011

Organizations worldwide are suffering damages as a result of cyberattacks but interestingly there hasbeen a slight decline in these attacks during the past 12 months according to a new report from

Symantec More than 90 percent of the more than 3300 respondents across 36 countries said theyexperienced tangible losses as a result of a hack with 84 percent reporting financial loss to the cost of abreach Around one-fifth lost at least $195000 in breaches during the past 12 months

Meanwhile Symantec attributes the unexpected bright spot of a decline in breaches toorganizations employing better cybersecurity defenses More than 70 percent of organizations sawattacks in the past 12 months a decline of 5 percent from 2010 And those that experienced anincreasing frequency of attacks dropped from 29 percent in 2010 to 21 percent this year While 100percent last year reported losses from cyberattacks 92 percent did so in 2011 The trend seemscounterintuitive given the rash of high-profile breaches this year More

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 11: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1142

Delhi On High Alert In Wake Of Blast

Multiple Sources

The Indian capital has been put on high alert following the blast at the Delhi High Court privateEnglish-language TV news Channel Times Now reported (Times Now TV New Delhi in English0530GMT 07 Sep 11)

Hindi channel says received email from group claiming responsibility for attack Indias Hindinews channel Aaj Tak said on 7 September it had received an email claiming responsibility for the blastAccording to the report the email was sent from the ID harkatuljihadi2011gmailcom The channelsaid the police were investigating possible involvement of the Indian Mujahidin (Aaj Tak TV Delhi inHindi 7 September 2011)

Police Probe Possible Links To Al-Qaidah-Linked Group

Noida IBN Live | in English 7 September 2011

Police in Delhi are looking into claims that a Pakistan-based militant group linked to Al-Qaidah theHarkat-ul-Jihad Islami (HUJI) may have been involved in the attack Noida IBN TV reportedAccording to the report in an e-mail sent to a media house HUJI claimed it had carried out the attack inretaliation for the death sentence issued against Afzal Guru the man found guilty of involvement in an

attack on Delhis parliament almost ten years ago We owe the responsibility of todays blasts at highcourt delhi our demand is that Afzal Gurus death sentence should be repealed immediately else wewould target major high courts amp THE SUPREME COURT OF INDIA the e-mail read According tothe report it was sent from the id harkatuljihadi2011gmailcom

Home Minister Announces Probe Into Attack

CNN-IBN website | New Delhi in English 7 September 2011

Indian Home Minister P Chidambaram speaking in parliament said that investigators did not yet knowwho was behind the attack but he blamed it on terrorists seeking to destabilise the country He saidthat the National Investigative Agency (NIA) would carry out a probe into the attack

PM Denounces Blast As Cowardly Act

Doordarshan news website | New Delhi in English 7 September 2011

Prime Minister Manmohan Singh on 7 September described the blast outside the Delhi High Court as acowardly act and urged all political parties to unite and tackle any acts of terrorism state-run Indiantelevision channel DD News reported This is cowardly act of terrorist nature We will deal with it Wewill never succumb to the pressure of terrorism Singh said He said this is a long war in which allpolitical parties all the people of India have to stand united so that the scourge of terrorism is crushed

IED Explosion At Delhi High Court Domestic Islamists Likely Culprits Growing Signs Of Jihadist Agenda

Sterling-Assynt | 7 September 2011

An IED placed inside a briefcase exploded at 1017AM at an entrance to Delhi High Court wherelitigants collect their visitor passes Wednesdays are reserved for public-interest litigation and so thearea was crowded It is likely that the briefcase was placed in the queue at reception before visitors passthrough security checks There is reportedly no CCTV coverage in this area which will makeidentification of the perpetrator difficult

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1242

The blast was of at least medium intensity and created a crater between three to four feet deepAt least eleven people have died and 65 others have been injured ndash a toll that would probably have beenhigher if an international group had been responsible There were no other explosions which has thesame implication Mumbai has been placed on high alert following the attack especially as the HomeMinistry reported in August that coastal cities were under threat from pan-Islamic terror groups Noblame has yet been assigned A minor explosion occurred on 25 May (also a Wednesday) in a car-park near the Court That bomb was constructed using ammonium nitrate and is believed to havemalfunctioned causing no damage or injuries which suggests similar origins to this one

There are reports of an email from Harkat-ul-Jihadi al-Islami (HuJI) claiming responsibilityfor todayrsquos explosion but we remain sceptical about this since the group has not previously made suchclaims via email The nature of the bomb and the use of email to communicate suggest rather theinvolvement of the Indian Mujahideen (IM) Nonetheless the unverified HuJI email demands that AfzalGurursquos death sentence be repealed and this may point towards the involvement of a jihadist agendaGuru was involved in the December 2001 Parliamentary attacks in Delhi and had his mercy petitionrejected by the Home Ministry on 10 August

Todayrsquos incident indicates an increase in successful attacks by local groups A robust securityforce campaign following the 2008 Mumbai attacks diminished the capabilities of groups such as IMThey claimed responsibility for the December 2010 Varanasi bomb blast which killed one and injured

twenty people However IMrsquos likely involvement in the July 2011 blasts in Mumbai and the attack todaypoints towards the rebuilding of its capabilities and possibly also the establishment of closer ties with jihadi groups

We do not expect a spate of attacks to follow imminently but such incidents will continue tooccur possibly on a larger scale as IM continues to regroup following the security clampdownDevelopments in the cases of Afzal Guru and Ajmal Kasab (the surviving gunman from 2008) willprovide cause for further attacks Given a recent warming in relations between India and Pakistan theHigh Court attack will be unlikely to raise tensions between the two countries significantly

Indonesia

| back to top |

Islamic Groups Continue To Harass Religious Minorities Government Silence Further

Encourages Attacks Youths Beaten In East Jakarta

Assynt SEAsia Vol VIII No17 | 7 September 2011

Hard-line Islamic groups continued to intimidate religious minorities without any response from theGovernment at either a local or national level Yudhoyono relies on the support of Islamic parties inParliament and is unlikely to take any decisive action against such incidents This will further encourageradical groups and endangers the countryrsquos reputation for religious tolerance

Three youths were beaten by members of the Islamic Defenders Front (FPI) for allegedly beingdrunk The attack took place in Jakartarsquos business district but it remains unlikely that the FPI will targetforeigners and the security forces will not tolerate any threats to business interests Nonetheless such

incidents highlight a worrying trend towards increasingly hard-line behaviour that remains unchecked bythe Government

We previously reported that the light sentences handed down for the killing of three members of the Ahmadiyah sect will embolden radical groups (see our Report of 3 August) In this period theIslamic Reform Movement (Garis) coerced Ahmadi youths in Cianjur West Java to join mainstreamprayers The Ahmadiyah sect meanwhile was banned from conducting religious activities during theEid holidays by the South Sulawesi administration for fear of provoking violence

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1342

Iran

| back to top |

Two Arrested Al-Qaidah Members Iraqi Three Iranian - Iran Official

ISNA website | Tehran in Persian 7 September 2011

The public prosecutor of Irans Kerman Province Yadollah Movahhed has announced the start of aninvestigation into the case of five people arrested on charges of having links to Al-Qaidah the IranianStudents News Agency (ISNA) reported on 7 September Two of the detainees - arrested on 19 August -are Iraqis and the other three are Iranian nationals Movahhed told ISNA in an interview on 7 SeptemberThe prosecutor said the detained people are accused of carrying illegal arms and munitions and addedthat an investigation is ongoing into the possibility that they were members of a larger group

Israel

| back to top |

Israel Uncovers Planned Hamas Bombing Spree On Israelis

Xinhua | 8 September 2011

Hamas cells operating in the West Bank routed between May and AugustThe Israeli security agency Shin Bet has broken a network of Hamas cells operating in the West Bank and planning a series of attacks against Israeli targets local media reported Wednesday Dozens of

Hamas members comprising 13 militant cells were arrested throughout the West Bank between May andAugust Army Radio reported One of the groups has carried out a bombing attack at the entrance toJerusalem in March in which a British woman was killed and several dozen civilians wounded Anothercell had planned to dispatch a suicide bomber to Jerusalems Pisgat Zeev neighborhood on Aug 21 Theattack was thwarted at the last minute by Shin Bet agents assisted by the Israel Defense Forces (IDF)and police according to Army radio Other groups were in various stages of planning and preparingattacks including bombings and the kidnapping of civilians or soldiers for the release of Palestinians jailed in Israel The Shin Bet concluded based on its interrogations of the group members that theHamas military leadership in Gaza and abroad is exerting considerable efforts to rehabilitate itspresence in the West Bank with financing and weapon smuggling The West Bank has remainedrelatively quiet in recent years Israeli officials attributed the success in preventing violence in the area

to the cooperation between the IDF and the Palestinian National Authoritys security forces

Israeli Air Strike Kills One Gaza Militant

Xinhua | 8 September 2011

Strike follows more rocket launches from Gaza warnings of new battlesAn Israeli air strike killed an Islamic Jihad militant and wounded three others in the central Gaza

Strip town of Dier a-Balah witnesses and medical sources said Local witnesses said the militant diedafter his car was hit by a missile adding that three other people were also wounded The condition of theinjured is stable hospital sources said Earlier Wednesday an Israeli military spokesperson said a rocketwas launched from the Gaza Strip into south Israel adding the projectile landed in an open area and didnot cause injuries or damage None of the Palestinian armed factions has claimed responsibility for the

rocket attack Late on Tuesday a Palestinian militant was killed and two others injured when Israeliwarplanes targeted a group of gunmen east of Khanyounis City south of the Hamas-ruled Gaza Strip

The Gaza Strip witnessed an escalation of bloody violence between Israel and Gaza militantgroups in August leaving 26 Palestinians and three Israelis killed The violence was triggered after eightIsraelis were killed in well-coordinated operation in the Red Sea city of Eilat Israel accused Palestinianmilitants of plotting and carrying out the attack which started from the bordering Sinai Peninsula inEgypt

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1442

Libya

| back to top |

Libyan Extremist Britain Allowed To Stay Was Link To Al-Qaeda In Iran Papers Show

The Daily Telegraph | (London) By Richard Spencer Tripoli

The extremist Ismail Kamoka spent several years sending funds to terrorist groups across the Middle East

An Alleged Libyan extremist who sought political asylum in Britain regularly travelled to Iran from2002 to provide forged documents to extremists linked to al-Qaeda secret files found in a Tripoliintelligence service building have disclosed

The documents seen by The Daily Telegraph unearth British intelligence suspicions about linksbetween Iran and al-Qaeda dating back almost a decade Other details to come out of the documentssent by MI6 and found in the office of the former head of foreign intelligence and later foreign ministerMoussa Koussa who defected in March include the revelation that Britain had begun co-operating withthe Chinese security services on Islamic extremists The extent of Iranian co-operation with al-Qaedahas been disputed in intelligence communities though Iranians are thought to have provided weaponsand explosives to the Taliban in Afghanistan

A number of al-Qaeda operatives including members of the family of Osama bin Laden fled toTehran after the fall of the Taliban in Afghanistan and their precise status in Iran has been unclear Thepapers in Libya do not directly challenge the Iranian government but suggest that al-Qaeda operativeshad more freedom of movement there than previously thought The extremist Ismail Kamoka spent

several years sending funds to terrorist groups across the Middle East including some linked to al-Qaeda the files said Mr Kamoka who had been given indefinite leave to remain in Britain afterarriving from Saudi Arabia in 1994 and claiming asylum travelled from the UK to Iran viaSwitzerland in July 2002 according to one document[Article continues herehttpwwwtelegraphcouknewsworldnewsafricaandindianoceanlibya8740771Libyan-extremist-Britain-allowed-to-stay-was-link-to-al-Qaeda-in-Iran-papers-showhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1542

Nigeria

| back to top |

Bomb Explodes In Violence-Torn Nigerian City Residents

AFP | 6 September 2011

A bomb went off Tuesday in Nigerias northeastern city of Maiduguri disrupting a three-week lull inbombings in the violence-torn city local residents said [Article continues here httpnewsyahoocombomb-explodes-violence-torn-nigerian-city-residents-215718081html]

Pakistan

| back to top |

Pakistan Bans Foreign Travel For Those Involved In Bin-Ladin Probe

The News website | Islamabad in English 7 September 2011

A Pakistani commission investigating the circumstances surrounding the killing of Al-Qaidah chief Usamah Bin-Ladin has banned foreign travel for everyone involved in the probe Pakistani daily TheNews part of the Jang group which owns Geo TV reported on 7 September The paper recalled that thecommission had already directed the countrys interior ministry and the intelligence service ISI toensure that the Bin-Ladin family was not repatriated from Pakistan without the consent of the

commission

More Than 20 Killed In Two Suicide Blasts In Pakistans Quetta

Express247 TV | Lahore in English 5 September 2011

At least 22 people were killed and several others injured in two explosions in the south-westernPakistani city of Quetta on 7 September the website of the Dubai-based private Pakistani TV channelARY News reported According to the channel one blast went off near the residence of the FrontierConstabulary and another one near the commissioner office in Quetta According to the report around100 kilograms of explosives were used in each attack (ARY News website Dubai in English 07 Sep 11)

Private Pakistani English-language TV channel Express 247 carried a series of onscreen scrollswhich said police had confirmed that the two blasts were suicide attacks The report cited police sources

as saying that 25 people were killed and more than 40 injured in the attacks (Express247 TV Lahorein English 0654GMT 07 Sep 11)

BBCM notes that the attacks came after the Pakistani intelligence agency said on 5 August that ithad arrested Al-Qaidah commander Younis Al-Mauritani and two of his accomplices in Quetta

Taleban Say Quetta Blasts Revenge For Recent Al-Qaidah Arrests

AFP | 7 September 2011

The Pakistani Taleban have claimed responsibility for the twin suicide bombs in Quetta on 7 Septembersaying they were carried out to avenge the recent arrests of Al-Qadiah operatives in the city Wecarried out the attacks Taleban spokesman Ehsanullah Ehsan told AFP in a phone call from anundisclosed location

Twin Suicide Bombings In Pakistan Leave 23 Dead

Miami Herald

Twin suicide bombers attacked the home of a senior military officer Wednesday in the western city of Quetta injuring him and killing at least 23 people officials said in a possible revenge attack forPakistans recent arrest of a senior al Qaida commander [Article continues here httpwwwmiamiheraldcom201109072394264twin-suicide-bombings-in-pakistanhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1642

Philippines

| back to top |

Moro Splinter Group Threatens US Soldiers In Philippines But Capabilities Limited

Government-Rebel Negotiations Remain Difficult

Assynt | SEAsia Vol VIII No17 7 September 2011

Ameril Umbra Kato a former senior Moro Islamic Liberation Front (MILF) field commander whoresigned late last year because he rejects peace negotiations has threatened to attack US troops as wellas Filipino security forces and other Government targets US and Filipino troops are currentlyundertaking joint training exercises This is an annual event but the first time they have been conductedin central Mindanao However Katorsquos splinter group the Bangsamoro Islamic Freedom Fighters (BIFF)is believed to have as few as 200 members with generally unsophisticated weapons ConsequentlyBIFFrsquos ability to conduct an attack on US forces is likely to be limited

In this period Kato announced the creation of a political wing to his grouping the BangsamoroIslamic Freedom Movement emphasising his split with MILF Nevertheless he has not been expelledfrom MILF and so is protected by the current ceasefire with Manila though MILF has stronglycondemned Katorsquos threat against US troops It is possible that MILF leadership is content to allow himto operate relatively unimpeded in order to gain greater leverage in its negotiations with theGovernment since they can contrast their more compromising approach with BIFFrsquos threatened

violence Meanwhile negotiations between MILF and the Government continue MILF dismissed theGovernmentrsquos latest proposal for an autonomous region but both sides appear committed to continuingtalks

Russia

| back to top |

Suicide Bombings In Grozny Demonstrate Islamic Insurgencyrsquos Continuing Capabilities In

Chechnya

Stirling Assynt Reports | Report FSU Vol IV No17 7 September 2011

A series of suicide bombings in the Chechen capital on 31 August (which left nine casualties includingseven police officers) has severely undermined President Ramzan Karydovrsquos claims to have successfully

eradicated the Islamic insurgency in the Republic The first suicide bomber reportedly detonated hisexplosives in a densely populated area only 150 metres from a local Parliament building while twofurther jihadists targeted first-response units Significantly the attack occurred during the Muslimholiday of Eid a three day celebration which marks the end of Ramadan during which the risk of jihadist attacks is heightened Indeed in addition to this strike in Grozny jihadist militants carried outfurther attacks in Iraq Nigeria and Algeria during Eid this year

Although no group has claimed responsibility for this incident it bears the hallmark of theCaucasus Emirate and so was likely orchestrated by the grouprsquos newly appointed deputy KhuseynGakayev and his brother Vadalov Indeed the Gakayev brothers are believed to have been behind theattack on the Chechen Parliament in October 2010 demonstrating the grouprsquos capabilities and intent tocarry out such strikes Moreover the timing of these bombings ndash only two months after the

reconciliation of the Caucasus Emiratersquos leader Doku Umarov with Chechen commanders (see our 3August Report) ndash supports this assessment and suggests that further incidents and suicide bombings arelikely given this truce

Suspected Militant Killed In Russias Southern Republic

Interfax news agency | Moscow in Russian 7 September 2011 Russias National Antiterrorist Committee said on 7 September a militant had been killed in the Republicof Kabarda-Balkaria the corporate-owned Russian news agency Interfax reported

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1742

Saudi Arabia

| back to top |

Saudi Arabia Shopping Around For Nuke Technology

Haaretz | 8 September 2011

Ties with Pakistan may remain close as Riyadh seeks nuclear assistanceSynopsis This week brought news that Iran on its own has produced new advanced nuclearcentrifuges According to a report of the International Atomic Energy Agency Iran has begun to installthe centrifuges in its uranium enrichment facility in Natanz But the high-level source noted thatdevelopment and production of the new centrifuges began more than seven years ago That does notspeak of a great technological capability on Irans part Israeli intelligence like its American counterpartviews 2014 or 2015 as the date when Iran will be able to build nuclear weapons says the source - if itwants to and no one blocks it In Saudi Arabia in contrast they are a bit more disturbed by thedevelopments in Iran An American Department of Energy delegation visited Riyadh and met with DrHashim Yamani who heads the King Abdullah City for Atomic and Renewable Energy Saudi Arabiawants to equip itself with nuclear reactors to generate electricity The United States is interested inselling Riyadh reactors for two reasons - fat contracts and the ability to keep close tabs on nucleardevelopments in Saudi Arabia The American administration is concerned that with a nuclear programfor civilian uses Saudi Arabia would actually like to prepare the infrastructure so it could switch to

producing nuclear weapons relatively quickly should Iran possess such weapons Defense ministerSultan Bin Abdul Aziz and the countrys former intelligence chief Turki Bin Faisal reportedly favorthe preparation of a secret nuclear program for military uses in cooperation with a Sunni Muslim ally -Pakistan which possesses dozens of atomic bombs Saudi Arabia reportedly funded Pakistans nuclearweapons program in return for Pakistans promise to aid the monarchy in this area if need be

Serbia

| back to top |

Serbia Threatened By Terrorism Says Dacic

Tanjug | 8 September 2011

US officials warned Serbia of possible terrorist activity particularly against foreign interests

After a warning coming from USA officials Serbia will raise the level of security in all facilitiesbelieved to be a possible target of terrorists the countrys Deputy Prime Minister and Minister of InteriorIvica Dacic stated Wednesday in the Palace of Serbia He stated that the security measures will primarilyrefer to the facilities of foreign countries in Serbia and added that special attention will be paid to thesecurity of air traffic US officials assume that there is a possibility of new terrorist attacks in the USAand other countries including Serbia Dacic said following a meeting with Special Representative of the UN Secretary-General for Disaster Risk Reduction Margareta Wahlstrom in Belgrade and a sessionof the republic headquarters for emergency situations

Somalia

| back to top |

Six Killed In Mortar Attack In Somali CapitalShabeelle Media Network website | Mogadishu in Somali 7 September 2011

Six people were killed and several others injured after three mortars landed in Mogadishus Arjantiinneighbourhood in Kaaraan District on the night of 6 September the privately-owned Shabeelle websitereported It quoted an eyewitness as saying that two of the three mortars fired have caused thecasualties inflicting fear in the residents who returned to their homes after Al-Shabab vacated the areaearly last month Kaaraan District is one of the areas taken over by the government forces and AUpeacekeepers

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1842

United States

| back to top |

Post-911 Intelligence Reform Takes Root Problems Remain

Reuters | 8 September 2011

US intelligence agencies will forever be scarred by their failure to connect the dots and detect theSeptember 11 plot but a decade later efforts to break down barriers to information-sharing are takingroot Changing a culture of need-to-know to need-to-share does not come easily in spy circles Someofficials say they worry a decade later about a future attack in which it turns out that US spy agencieshad clues in their vast vaults of data but did not put them together or even know they existed

Yet significant changes both big and small have broken down barriers between agenciessmoothed information-sharing and improved coordination US intelligence experts say From issuing ablue badge to everyone working in the sprawling intelligence community to symbolize a commonidentity to larger moves of mixing employees from different agencies the goal is singular -- to preventanother attack

Were much further ahead David Shedd Defense Intelligence Agency deputy director said of the ability to connect the dots compared with 10 years ago Still signs of a plot to attack the UnitedStates could be missed again My worst fear and I suspect probably one that would come true is that inany future would-be or actual attack God forbid we will be able to find the dots again somewhere

because of simply how much data is collected Shedd said The political response to the failure to stopthe attack was the 2002 creation of the Department of Homeland Security pulling together 22 agenciesto form the third largest US Cabinet department behind the Pentagon and Veterans Affairs

That was followed by the creation in late 2004 of the Director of National Intelligence to overseeall the spy agencies as recommended by the bipartisan 911 commission Previously the CIA directorheld a dual role of also overseeing the multitude of intelligence agencies But in the aftermath of the2001 attacks policymakers decided that was too big of a job for one person to do effectively

Critics argued then and now that the reforms were the governments usual response to crises --create more bureaucracy But others see much-needed change It has been a tremendous improvementsaid Lee Hamilton who was the 911 commission vice chair Its not seamless there are problems andweve still got a ways to go The 2001 attacks involving airliners hijacked by al Qaeda operatives killed

nearly 3000 people in New York Pennsylvania and the Pentagon Various US intelligence and lawenforcement agencies had come across bits of information suggesting an impending attack but failed toput the pieces together The CIA had information about three of the 19 hijackers at least 20 monthsbefore the attacks the National Security Agency had information linking one of the hijackers with alQaeda leader Osama bin Ladens network the CIA knew one hijacker had entered the United States butdid not tell the FBI and an FBI agent warned of suspicious Middle Eastern men taking flying lessons

Have the reforms made America safer Officials say yes and point to the US operation thatkilled bin Laden in Pakistan in May that demanded coordination among intelligence agencies and themilitary But there is an inevitable caveat no one can guarantee there will never be another attack onUS soil On Christmas Day 2009 a Nigerian man linked to an al Qaeda off-shoot tried unsuccessfullyto light explosives sewn into his underwear on a flight to Detroit from Amsterdam It turned out US

authorities had pockets of information about him President Barack Obama used a familiar September 11phrase to describe the 2009 incident as a failure to connect the dots of intelligence that existed acrossour intelligence community

Roger Cressey a former White House National Security Council counterterrorism officialresurrected another September 11 phrase It was a failure of imaginationThe intelligence community had not seen al Qaeda in the Arabian Peninsula a Yemen-based al Qaedaoff-shoot as capable of striking the US homeland If the underwear bomber threat had originated inPakistan they would have gone to battle stations immediately Cressey said Some proposed changesin how authorities would respond to another successful attack still are pending For example creation of

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1942

a common communication system for police firefighters and other emergency personnel remainstangled up in political wrangling in Congress over how to implement it This is a no-brainer Hamiltonsaid The first responders at the scene of a disaster ought to be able to talk with one another Theycannot do it today in most jurisdictions

Former leaders of the 911 commission issued a report card saying nine of its 41recommendations remain unfinished The Office of the Director of National Intelligence hasexperienced growing pains as overseer of the 17 spy agencies churning through four chiefs in six yearsTensions over turf confusion about the DNIs role and problems herding agencies with very powerfulchiefs of their own all came to a crescendo when retired Admiral Dennis Blair the third DNI tried toassert authority over CIA station chiefs who represent the agency in different countries The positionof chief of station is one of the crown jewels of the CIA and they dont want anyone playing with theircrown jewels said Mark Lowenthal a former senior US intelligence official

After a dust-up with CIA Director Leon Panetta who now is defense secretary it was Blair whowas sent packing I think the mistake that some have made is to have viewed the DNI and the Directorof CIA as an eitheror proposition rather than the power of the two working together the DIAs Sheddsaid in an interview in his office There is a history of where that hasnt worked so well I believe it isworking much better today said Shedd who has worked at the DNI CIA and National SecurityCouncil

Intelligence experts say in the current administration Obamas top homeland security andcounterterrorism adviser John Brennan arguably has more power than any of them because he has thepresidents ear Its a reminder that bureaucratic reform or no personalities count in making nationalsecurity policy The improved sharing of secret data has led to yet another set of problems The delugeof bits and bytes has subjected intelligence analysts to information overload as they try to sift through itall for relevant pieces Our analysts still are spending way too much time on finding the informationrather than on the analysis of the information Shedd said There is just too much data to go find it all

The intelligence community wants a system developed that would automatically processinformation from multiple agencies and then make the connections for the analysts

But greater inroads into sharing data across agencies does not guarantee that another attack willbe averted The threat has evolved and officials now are increasingly concerned about a lone wolf plot

by an individual not tied to any militant group that may be more difficult to uncover Those threatswill not come to our attention because of an intelligence community intercept said John Cohen asenior Department of Homeland Security counterterrorism official

They will come to our attention because of an alert police officer an alert deputy sheriff analert store owner an alert member of the public sees something that is suspicious and reports it Cohensaid One measure of the success of post-911 reforms is that a decade later the United States has not hada similar attack Now that could be luck that could be skill we dont really know Hamilton said Butin all likelihood what we have done including the establishment of the Department of HomelandSecurity and the transformation in intelligence and FBI has certainly been helpful[Article continues here ]httpnewsyahoocompost-9-11-u-intelligence-reforms-root-problems-052514320html

Comment the value added provided by the Office of the DNI remains an open question for many withinthe Intelligence Community (IC) and is a favored theme of corridor discussion in IC-member agenciesOn the other hand there is broad agreement among intelligence officials that the degree of cooperationand coordination between intelligence agencies and the character of intelligence sharing has vastlyimproved The fact that there has not been a successful major attack on US soil since 911 ndash not forlack of plotting ndash is in great part testimony to this more effective cooperation

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2042

Jihadist Suggests Striking New York City Bridges

All SITE Intelligence Group | 6 September 2011

A jihadist pointed to what he found to be a weak point of suspension bridges and directed his messageto those who love blasting and explosions In a message posted on the Shumukh al-Islam forum onSeptember 6 2011 the jihadist Abu Suleiman al-Nasser gave a picture of the Verrazano Bridge inNew York on which he drew a red box and arrow on the bridges center He then gave a map on whichhe circled the various bridges in New York City and its boroughs A fellow jihadist offered his ownidea giving a picture of the Hoover Dam and explaining that there is no target more important thandams He wrote that striking a dam may lead to the submerging of cities and the killing of thousands of people and in the case of the Hoover Dam would impact Las Vegas the capital of gambling anddebauchery

Counterterror Veteran is New Deputy FBI Director

Atlanta Journal Constitution | 1September2011

A 24-year FBI veteran with extensive counterterrorism experience Sean Joyce has been named the lawenforcement agencys new deputy director Elevated to the No 2 post within the FBI by Director RobertMueller Joyce replaces Timothy Murphy who is retiring after 23 years with the bureau Since last yearJoyce has been executive assistant director of the national security branch responsible for the FBIs

national security and intelligence operations He earned the Attorney Generals Award for ExceptionalService in 2004 for work on a counterterrorism squad in Dallas In 2008 he was named chief of thecounterterrorism divisions international terrorism operations section with responsibility forinternational terrorism matters within the United States hellip[Complete article is available here httpwwwajccomnewsnation-worldcounterterror-veteran-is-new-1153018html]

Top CIA Official Obama Changed Virtually Nothing

Salon | 1 September2011

PBSs Frontline is airing an examination of Top Secret America on September 6 The show includes arare and lengthy interview with 34-year-CIA-veteran John Rizzo who is described as the most

influential lawyer in CIA historyHere is one quote they include from Rizzo With a notable exception of the lsquoenhanced

interrogationrsquo program the incoming Obama administration changed virtually nothing with respect toexisting CIA programs and operations Things continued Authorities were continued that wereoriginally granted by President Bush beginning shortly after 911 Those were all picked up reviewedand endorsed by the Obama administration hellip[Complete article is available herehttpwwwsaloncomnewspoliticsbarack_obamastory=opiniongreenwald20110901obama]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2142

General Counterterrorism News| back to top |

The Terrible Missed Chance

Newsweek | 4 September 2011

Special Agent Harry Samit of the FBIs Minneapolis field office knew he was looking into the eyes of aterrorist It was early afternoon on Friday Aug 17 2001 Across from him sat Zacarias Moussaoui a33-year-old French-born student arrested the day before for overstaying his visa Moussaoui had paidmore than $8000 in cash that summer to sit in a cockpit simulator in a flight school in the suburbs of Minneapolis and learn - in a matter of days - the basics of how to fly a 747-400 Samit a formerintelligence officer at the Navys celebrated Top Gun flight school felt sure the man across the desk from him was a Muslim extremist who was part of a plot to hijack a commercial jetliner filled withpassengers The trick Samit wrote in a soon-to-be-released excerpt of a book hes written about thecase was getting Moussaoui to admit this and reveal details and associates to allow us to stop the plot

Surely the bureau brass in Washington would share his concern Samit thought He was wrongThat same day halfway across the country in the fluorescent-lit hallways of the J Edgar Hoover

FBI headquarters building in Washington counterterrorism supervisors were treating Samits firstreports about Moussaoui with skepticism even contempt Michael Maltbie a DC counterterrorism

specialist insisted repeatedly in the days after the arrest that there was no clear link between Moussaouiand Al Qaeda - the link needed for a warrant Maltbie thought Moussaoui was a dirty bird he latertold investigators but favored deporting him to France

Believing a hijacking might be imminent Samit appealed to his boss in Minneapolis SpecialAgent Greg Jones Jones picked up the phone on Aug 27 and called Maltbie at FBI HQ

Moussaoui he said might be part of a plot to get control of an airplane and crash it into theWorld Trade Center or something like that

Maltbie scoffed You have a guy interested in this type of aircraft Maltbie replied accordingto FBI documents That is it (Maltbie declined requests for an interview)

At least Maltbie was paying attention Michael Rolince who ran the FBIs InternationalTerrorism Operations Section was arguably the bureaus most important go-between with the White

House on domestic terrorist threats in the summer of 2001 He tells Newsweek he spent less than 20seconds being briefed on the Moussaoui case that August His office was inundated with terrorismprobes he said since Moussaoui was in custody already he posed no immediate threat Did it rise tothe level of something that I would take upstairs Rolince asks The answer is no

At CIA headquarters alarm bells were ringing loudly CIA Director George Tenet was briefedon Moussaoui within days of the arrest receiving a paper with the eye-catching headline IslamicExtremist Learns to Fly But the FBIs acting director that summer and the bureaus most seniorcounterterrorism official were left in the dark[Article continues here httpwwwthedailybeastcomnewsweek20110904the-terrible-missed-chancehtml]

Pan Am Flight 103 - Lockerbie Bombing - al-Megrahi CIA FilesWebwire | 31 August2011

BACM ResearchPaperlessArchivescom has announced the publishing of CIA files related to the PanAm Flight 103 Lockerbie Bombing

The files can be downloaded at no cost at httpwwwpaperlessarchivescompanam103ciahtml The files date from 1984 to 1999 These are the most recent files on Pan Am 103 released by the

CIA This set of files is unique because it includes memos on the direct handling of an intelligencesource This type of information is exempt from the Freedom of Information Act (FOIA) and is not oftenreleased by the Agency

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2242

The files cover information received by the CIA on Abdel Basset al-Megrahi Al-Megrahi is theonly person ever convicted in the Pan AM 103 case The Scottish government in 2009 allowed al-Megrahi to be released from custody and returned to Libya because of his failing health With the recentfall of Muammar Qaddafis regime there have been renewed calls for al-Megrahi to be returned toScottish custody or extradited to the United States and put on trial[Complete article is available here httpwwwwebwirecomViewPressRelaspaId=144692]

Getting The Caucasus Emirate Right

CSIS | August 2011

ldquohellipThis report aims to set straight a rather distorted record It demonstrates the veracity of three vitallyimportant facts usually obfuscated in discussions of the subject (1) the longstanding and growing tiesbetween the CE and its predecessor organization the ChRI on the one hand and al Qaeda (AQ) and theglobal jihad on the other hand (2) the importance of the CE jihadi terrorist network as a united andorganized political and military force promoting jihad in the region and (3) the salience of local culturaland the Salifist jihadist theo-ideology and the influence of the global jihadi revolutionarymovementalliance as key if not the main factors drive the ldquoviolence in the North Caucasusrdquohelliprdquohttpcsisorgfilespublication110829_Hahn_GettingCaucasusEmirateRt_Webpdf

7 Things You Didnrsquot Know About the War on TerrorForeign Policy | By Eric Schmitt and Thomas Shanker 6 September 2011

From an attempt to negotiate with Osama bin Laden to a proposal to threaten to bomb Mecca its been awild decade for the US national security establishment

Our new book Counterstrike The Untold Story of Americas Secret Campaign Against Al Qaeda is in many ways asummary of the past decade of our reporting on the military intelligence community and domestic law enforcement as itentered a new era of Darwinian evolution to counter violent extremism

It also is our deep dive into a decade of American counterterrorism efforts -- from the work of commando trigger-pullers and spies on the ground up to senior political leaders who wanted to defendthe nation (and get re-elected) Our efforts to report and write this book allowed us to uncover many newmissions never discussed before -- and gave us an understanding of how the war on terror had changedover the last decade

Our book assesses the 10 years since 911 as the military divides the fight into tactical missionson the battlefields of modern terrorism then the operational advancements that provided the means tosuccess while not securing final victory and at the top the strategic level of policy debates about howthe nation should combat this threat to its security

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2342

Here are seven vignettes from Counterstrike that offer glimpses into the thinking of policymakers andcommanders in early days after the Sept 11 attacks and how that thinking evolved over the followingdecade into a more whole-of-government approach to combating terrorists

1 Bush Tried to Negotiate with al Qaeda

The George W Bush administration like all of its predecessors swore never to negotiate with terroristsBut it did undertake an extraordinary and extraordinarily secret outreach effort to open a line of communication with Osama bin Laden and al Qaedas senior leadership It was an attempt to replicatehow the United States tried to sustain a dialogue with the Soviet Union even during the darkest days of the Cold War when White House and Kremlin leaders described in private and in public a set of acceptable behaviors -- and described with equal clarity the swift vicious even nuclear punishment forgross violations

In the months after the Sept 11 attacks Bushs national security staff working through theintelligence agencies made several attempts to get a private message to bin Laden and his inner circleThe messages were sent through business associates of the bin Laden familys vast financial empire aswell as through some of the al Qaeda leaders closest relatives a number of whom were receptive toopening a secret dialogue to restrain and contain their terrorist kinsman whom they viewed as a blot on

their name (To be sure other relatives were openly hostile to the American entreaties)According to a senior American intelligence officer with first-hand knowledge of the effort the

response from Osama bin Laden was silence And the effort was suspended

2 Sometimes a Wedding Is Just a WeddingIn the early days after the Sept 11 attacks the CIA and FBI vied to produce the most compellingintelligence reports that tracked suspected terrorist plots The agencies often worked at cross purposessometimes unwittingly At one point in early 2002 both agencies were tracking what American analystssaid were growing preparations for a major wedding somewhere in the Midwest (In terroristvernacular the word wedding is often code for a major attack)

Dribs and drabs on this wedding planning made their way to President Bush from bothagencies independent of each other of course

Finally over the Easter holiday during a video-teleconference with top aides in Washingtonfrom his ranch in Crawford Texas Bush stopped the briefing exasperated by the discrepancies in therival agencies reporting about the suspected threat

George Bob get together and sort this out Bush told his CIA director George J Tenet andFBI director Robert S Mueller III

Bushs instincts were correct When the analysts finally untangled their clues it turned out thatthe ominous wedding really was just that the matrimony of a young man and a young woman fromtwo prominent Pakistani-American families There was no threat There was no plot

3 The Threat to Bomb MeccaAs fears of a second attack mounted following the 911 strikes US government planners franticallycast about for strategies to protect the country Even the most far-fetched ideas had a hearing howeverbriefly In one case some government planners proposed that if al Qaeda appeared ready to attack America again the United States should publicly threaten to bomb the city of Mecca in Saudi Arabiathe holiest site in all of Islam in retaliation Just nuts one Pentagon aide wrote to himself when heheard the proposal The idea was quickly and permanently shelved

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2442

4 The SEAL Raid in Iran That Didnt HappenWhen US forces routed the Taliban government in Afghanistan and forced bin Laden and his toplieutenants to flee many senior al Qaeda leaders including bin Laden and his deputy Ayman al-Zawahri escaped to neighboring Pakistan But a separate group including the al Qaeda leaders sonSaad bin Laden fled to northern Iran where American troops would not pursue them and the Iranianswould likely not detain them But the Shiite clerics running Iran placed the al Qaeda operatives and theirfamily members under virtual house arrest and they became a shield against possible attacks from theSunni-based terrorist organization

One plan in particular illustrated the bold thinking and wildly unrealistic aims of the militarysinitial approach after 911 to kill or capture terrorist leaders The plan called for hunting the eight to 10senior al Qaeda leaders and operatives who had sought refuge in Chalus an Iranian resort town on theCaspian Sea where they had been detained

At the Joint Special Operations Command at Fort Bragg NC military planners drew up optionsfor Navy SEALs to sneak ashore at night using state-of-the-art mini-submarines Once they landed theSEALs would slip past Iranian guards to snatch the al Qaeda leaders Another option called for SpecialOperations helicopters to spirit American commandos into the town and whisk them out again with theirquarry The Americans went as far as conducting two or three rehearsals at an undisclosed locationalong the US Gulf Coast in early 2002 They conducted small-boat insertion exercises involving about

30 Special Operations personnel most SEALs and eventually concluded the mission was feasible if they were provided with more detailed intelligence on the locations of the al Qaeda members and thesecurity around them

The logistics of the mission were daunting Chalus sits at the edge of the Elburz coastal mountainrange about 70 miles north of Tehran and the failed rescue of the American hostages in Iran in April1980 loomed large in commanders memories Eventually Gen Richard B Myers the chairman of theJoint Chiefs of Staff rejected the mission as too risky and too politically volatile Many of the al Qaedaoperatives are reportedly still there

5 Intelligence Hauls of Unusual Size

US intelligence and military commandos have carried out tens of thousands of raids in the decade since911 The amount of material seized from terrorist and insurgent targets has grown to a massive sizeThe Defense Intelligence Agency (DIA) operates exploitation triage centers and giant warehouses forstoring intelligence products -- in war zones rear headquarters in countries like Qatar and back in theUnited States One intelligence analyst said that walking into one of the warehouses for documents andmedia exploitation reminded him of the final scene in Raiders of the Lost Ark when the captured Ark of the Covenant is crated up and rolled into a cavernous storage area that contains all the governmentsother dangerous secrets

All told more than two million individual documents and electronic files have been cataloguedby media type hard copy phone number thumb drive Each is inspected by a linguist working with acommunications analyst or computer expert

The DIA analysts are joined by specialists from other agencies including the FBI and the DrugEnforcement Administration Yet given the overwhelming volume no more than about 10 percent of thecaptured intelligence has ever been analyzed

Intelligence officers say they simply are overwhelmed and untold quality leads may still beburied in the piles of computers digital files travel documents and pocket litter

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2542

6 The Digital Counterjihad Cyberspace is the terrorists ultimate safe haven Its where they recruit raise money and even plotattacks using coded language while playing online video war games The US government fights back

One technique is called false band replacement whereby the intelligence agencies infiltratemilitants networks and post their own material to counter extremist efforts on those same jihadistwebsites The trick is to forge the onscreen trademarks -- web watermarks -- of al Qaeda media sites

This makes messages posted on these sites official and sows dissent and confusion among themilitants

This Internet spoofing can be used in support of more traditional combat missions There is atleast one case confirmed by American officials in which a jihadist website was hacked by Americancyberwarriors to lure a high-value al Qaeda to a surreptitious meeting with extremist counterparts -- onlyto find a US military team in waiting

Getty images

7 First Kill the MullahsUS counterterrorism officials have learned fighting terrorists effectively means targeting specific nodesof that network that support and enable militants who strap on suicide vests This strategy focuses onneutralizing enablers such as the financiers gun-runners and logisticians Among these terror linchpins

are religious leaders who bless attacksHeavenly reward will not await a suicide bomber unless his death and those of his victims is

deemed halal in keeping with Islams sacred sharia law Each militant network has a sharia emir usuallyat the level of a sheikh or mullah In Iraq American commanders specifically killed emirs to throw awrench in a suicide bombing networks

Take him out and suicide bombings from that network are frozen until he is replaced said onemilitary officer with command experience in Iraq hellip[Complete article is available herehttpwwwforeignpolicycomarticles201109067_things_you_didn_t_know_about_the_war_on_terror]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2642

Dick Marty Rendition Report Condemns lsquoCult of Secrecyrsquo

BBC News | 8 September 2011

A report for Europes human rights watchdog has called for greater scrutiny of secret services andsupport for whistleblowers The Council of Europe investigated how countries like Britain GermanyRomania and Lithuania assisted the US with the rendition of terror suspects It said a cult of secrecyhad helped Western governments cover up abuses Defending whistleblowers it singled out USsoldier Bradley Manning accused of passing secrets to Wikileaks He had acted as a whistleblowerand should be treated as such CoE rapporteur Dick Marty wrote in the report which was due to besubmitted to the CoEs Parliamentary Assembly The soldier is currently in a US military prisonawaiting trial for passing restricted material to the controversial website

But the report praised Mr Manning and Wikileaks itself for uncovering evidence of renditionThe CoE represents 47 member-states including both EU countries and Russia and other ex-Sovietstates Mr Martys report focused on the record of Western states explaining that it was based oninvestigations into European links to the controversial US policy of rendition for terrorism suspectsThe CIA allegedly flew terror suspects around the world for interrogation in the years after 911 holdingthem in secret prisons in Europe and elsewhere

No licence to kill

In his 48-page report - entitled Abuse of State Secrecy and National Security - Mr Marty looked at thelevel of control exercised by European states over their security services He urged all states to useindependent parliamentary committees to oversee the work of their secret services saying this was of vital importance for the rule of law and democracy Mr Marty argued that Western governments wereusing the notion of state secrecy to shield their intelligence services from accountability for seriousviolations committed during anti-terrorist operations We consider that this is simply unacceptablehe wrote

A licence to kill (or to abduct and torture) only exists in certain films and in dictatorialregimes In democratic systems parliaments as representatives of the people have a right and duty toknow what the government is doing in the name of the people Mr Marty praised investigative journalists and non-governmental organisations for their work in exposing abuses of authority Stressing

the fundamental role whistleblowers had to play in an open society he warned against a real cult of secrecy as an instrument of power

While it was up to the courts to decide if Bradley Manning had committed any crime he wrotethe CoE was indebted to him for the publication of a recording of a helicopter attack in Iraq in whichthe crew seems to have intentionally targeted and killed civilians

Thanks to Mr Manning he said a large number of embassy reports had allowed us to learnsignificant details of important recent events which are obviously of general interest We therefore join Amnesty International in expressing our worries as to the treatment he receives Mr Marty wrote inthe draft report[Article continues here httpwwwbbccouknewsworld-europe-14820145]Comment This report demonstrates that Dick Marty is not as De Gaulle would say a serious man To

suggest that Bradley Manning is a hero and intelligence agencies bent on defeating terrorists arecriminals should say it all Manning knowingly violated his oath and willfully provided enormousamounts of classified material to WikiLeaks For Marty this is a good thing in the name of transparencyMarty always injudicious and anti-American in his remarks is now moving at warp speed into crackpotterritory

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2742

Al Qarsquoida amp its Affiliates| back to top |

Al Qaeda Is Down Not Out

Los Angeles Times | By Amy Zegart 7 September 2011

US talk of defeating terrorism is dangerously prematureTalk of strategically defeating Al Qaeda is all the rage in the White House these days Defense

Secretary Leon Panetta used the D-word in July President Obama declared in his new counter-terrorism strategy We can say with growing confidence that we have put Al Qaeda on the path todefeat Compared to the woeful state of the economy terrorism has become the administrations feel-good story of the year

Defeat is a big word It is also dangerously misleading Yes the United States has made greatstrides in the last decade to harden targets improve intelligence and degrade the capabilities of violentIslamist extremists Osama bin Ladens death was a major accomplishment But the fight is nowhereclose to being won and Americas most perilous times may lie ahead Three reasons explain why

The first is that strategically defeating Al Qaeda is not nearly as important as it sounds After911 Al Qaeda morphed into a more complicated decentralized and elusive threat consisting of threeelements core Al Qaeda affiliates or franchise groups operating in places like Yemen and Somalia with

loose ties to the core group and homegrown terrorists inspired by violent extremism often through theInternet in the comfort of their own living rooms

Core Al Qaedas capabilities started degrading in 2001 when the US invaded Afghanistandismantled training camps ousted the Taliban and sent Bin Laden running The CIA has estimated thecore group remaining in the AfghanistanPakistan region to number 50 to 100 fighters The last time BinLaden oversaw a successful operation was 2005 when Al Qaeda struck the London transit system

But plots by homegrowns and franchise groups have risen dramatically in recent years The 2009Ft Hood shooting the worst terrorist attack on US soil since 911 was the work of a homegrownterrorist The mastermind of the 2010 Times Square car bomb plot was a naturalized American citizentrained by the Pakistani Taliban not Al Qaeda Another franchise group Al Qaeda in the ArabianPeninsula was behind the foiled 2009 Christmas Day underwear bomber aviation plot and the 2010

plot to explode tampered printer cartridges aboard cargo planes The Bipartisan Policy Center reported11 violent Islamist extremist terrorist incidents against the US homeland in 2009 the most since 911Nearly all involved what former CIA Director Mike Hayden calls a witches brew of radicalizedAmericans and franchise groups

The second reason why talk of defeat is premature has to do with weapons Terrorism againstAmericans is nothing new The potential for terrorist groups to acquire weapons of mass destruction isIn 1995 a Japanese cult released sarin nerve gas in the Tokyo subway killing 12 people and injuringthousands It was the first WMD terrorist attack in modern history and it sparked a wave of presidentialterrorism commissions years before Bin Laden became a household name

It is this specter of the lone fanatic or small group armed with the worlds most devastatingweapons that keeps experts up at night In 2005 60 leading nuclear scientists and terrorism experts were

asked how many believed the odds of a nuclear attack on the US were negligible Only three or fourhands went up most were far more pessimistic Today there is enough nuclear material to build120000 weapons As long as fissile material is poorly stored and rogue states like Iran and North Koreacontinue their illicit weapons programs nuclear terrorism remains a haunting possibility

The third reason is that the FBI has not yet become a first-rate domestic intelligence agencyAnalysts whose work is vital to success are still second-class citizens labeled support staff alongsidesecretaries and janitors and passed over for key jobs including running the bureaus intelligence unitsThe FBIs information technology is so antiquated it belongs in a museum And the old crime-fighting

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2842

culture still lives There is now a move afoot to shrink new classified facilities so that agents dont haveto waste time away from their cases to read intelligence documents thereStrategically defeating Al Qaeda sounds too good to be true Because it is Amy Zegart is a senior fellow at Stanfords Hoover Institution and the author of Eyes on Spies

Congress and the United States Intelligence Community

US Counterterror Chief Al-Qaida On Steady Slide

Bostoncom | 31 August 2011

White House counterterrorism chief John Brennan said al-Qaida is on a steady slide after the death of al-Qaidas latest second-in-command in Pakistan Brennan told The Associated Press on Wednesdaythat its a huge blow in the first official White House comment since Atiyah Abd al-Rahmans reportedkilling by CIA drone strike in Pakistans tribal areas last week

Al-Qaida is sort of on the ropes and taking a lot of shots to the body and the head Brennansaid This is a time not to step back and let them recover a message he says hes sending to hiscounterparts in Pakistan[Article continues herehttpwwwbostoncomnewsnationwashingtonarticles20110831us_counterterror_chief_al_qaida_on_steady_slide ]

Al-Qaeda (AKA Al-Qaida Al-Qarsquoida)

Council on Foreign Relations | 29 August 2011

ldquoAl-Qaeda an international terrorist network is considered the top terrorist threat to the United StatesThe group is wanted for its September 11 2001 attacks on the World Trade Center and the Pentagon aswell as a host of lesser attacks To escape the post-911 US-led war in Afghanistan al-Qaedas centralleadership fled eastward into Pakistan securing a safe haven in loosely governed areas there In July2007 US intelligence agencies found that the organization was regrouping and regaining strength inthese tribal areas along the border with Afghanistan though targeted killings of senior al-Qaeda leadershave since diminished the groups command and control capabilities In February 2009 Director of National Intelligence Dennis C Blair told lawmakers that the groups core is less capable and effective

than it was a year ago The killing of al-Qaedas top leader Osama bin Laden by US forces in Pakistanin May 2011 served a significant blow to the organization but analysts say al-Qaeda remains deadlywith its networks spread all over the world Plus a number of affiliated groups have gained prominencein recent years complicating the task of containing the organizationrdquo

[Article continues here httpwwwcfrorgterrorist-organizationsal-qaeda-k-al-qaida-al-qaidap9126]

Al Qaeda In The Islamic Maghreb

CSIS | 1 September 2011

ldquoAl Qaeda in the Islamic Maghreb (AQIM) emerged from a decades-long militant Islamist tradition inAlgeria In 1998 the Salafist Group for Preaching and Combat (Groupe Salafiste pour la Preacutedication etle Combat or GSPC) broke away from the Armed Islamic Group (GIA) because of the GIArsquos extensive

targeting of civilians Gradually the GSPC evolved to encompass global jihadist ideology in addition toits historical focus on overturning the Algerian state In 2006 the GSPC officially affiliated with alQaeda core soon rebranding itself as al Qaeda in the Islamic Maghreb In the following years AQIMwas able to conduct a small number of large-scale attacks most notably its 2007 bombing of the UNheadquarters in Algiers In recent years counterterrorism pressure and weak governance have combinedto shift the center of AQIMrsquos presence to the Sahara-Sahel region AQIM continues to make its presenceknown through smuggling operations kidnappings and clashes with security forces in the desert In thecoming years general instability within the region could allow AQIM to further expand its influencerdquo[Complete article is available here httpcsisorgfilespublication110901_Thornberry_AQIM_WEBpdf ]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2942

AQ Strategy

The Assynt Report | 11 August 2011

Executive Summary Al-Qaedarsquos broad objectives remain unchanged in the wake of bin Ladenrsquos death There

are nonetheless growing questions over al-Qaedarsquos capability Longstanding paranoiaover the use of electronic communications is heightened by the ongoing US dronecampaign whilst attacks against the West have generally been disrupted at an early stage

The Pakistani Talibanrsquos attack on a Karachi naval base in May 2011 was a significantmilitary success and the first major act of revenge for bin Ladenrsquos killing Furtherattempts to avenge his loss are certain

All parts of al-Qaeda are working within a cohesive framework with the ultimate aim of restoring the Islamic Caliphate (Khilafa) The strategic plan to support this aim wasdrafted by 40 of al-Qaedarsquos brightest thinkers in Kandahar Afghanistan in November1999 This plan consists of four phases each seven years long leading to the dissolutionof corrupt regimes and the union of all newly-liberated states within the Khilafa

Apart from mounting strategic operations al-Qaedarsquos role is to be the inspiration for atruly global jihadist movement It seeks to achieve this through provision of trainingbeing a role model for others to follow extending acceptance and adoption of its tactics

particularly suicide bombings and professionalising jihadist media to build a commonbrand and message between hitherto separate groups

Between the late 1990s and 2003 the organisation was primarily devoted to classicinternational terrorism Most effort is now spent fighting insurgencies from North Africato South Asia The way in which this strategy helps to spread the struggle has been seenin North-West Africa where the initial development of al-Qaeda in the Islamic Maghrebwas in part fed by men returning from fighting with al-Qaeda in Iraq

Since mid-2009 al-Qaeda and its affiliates have increasingly encouraged jihadist-sympathisers resident in Western countries to engage in violence themselves withoutcentral direction or training making surveillance more difficult

One of the keys to awakening the spirit of jihad was the success in portraying the US and

its allies as Crusaders in the Muslim world Al-Qaedarsquos strategy essentially requires thatthis process be kept running until the forces of jihad have grown large enough to launchsuccessful liberation operations

Despite its successes in Afghanistan al-Qaedarsquos credibility has suffered both from its failure to landanother strategic blow on the West on the scale of 911 and also excessive Muslim casualties in someoperations Similarly al-Qaeda in Iraq was set back by its excessive sectarian zeal and local resentmentat the foreign fighter presence In turn this affected the movementrsquos funding from the Gulf

Analysis Sub-Saharan African Leaders Media Focus On Threats Prior to 911

OSC Feature | Sub-Sahara Africa -- OSC Analysis 6 September 2011Statements by Sub-Saharan African leaders and African media reports on terrorism prior to the 10thanniversary of 911 focus on the growing threats from local extremists and Al-Qaida affiliatesparticularly in West Africa with little direct commentary on the anniversary or US counterterrorismpolicies This focus on domestic threats suggests that counterterrorism messages expressing solidaritywith African nations and acknowledging the evolving terrorist threat on the continent would have thegreatest resonance with African audiences

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3042

Leaders Stressing Determination To Counter Local Threats African leaders public statements reflect an ongoing concern about the threat of terrorism on thecontinent and a strong commitment to find ways to combat this threat

Nigerian President Goodluck Jonathan emphasized the governments commitment tovigorously combat terrorism following the 26 August bombing of the UN office inAbuja by Nigerian extremist group Boko Haram reported the Paris-based news agencyAFP President Jonathan is hosting Liberian President Ellen Johnson Sirleaf and otherforeign dignitaries for a three-day forum on terrorism and economic crimes the widelyread Lagos-based independent daily The Guardian reported on 4 September

Malian President Amadou Toumani Toure launched a Special Program for PeaceSecurity and Development on 9 August stating that development remained the mostviable solution to counter threats to the countrys stability reported Malis state-owneddaily LEssor[ 3] The program aimed to undermine support for Al-Qaida in the IslamicMaghreb (AQIM) according to Burkinabe web portal Lefasonet on 11 August

Somali Prime Minister Abdiweli Muhammad Gas stated on 23 August that theTransitional Federal Government planned to remove Al-Shabaab from the central andsouthern regions in Somalia with the goal of restoring peace within one year so the

country can hold national elections according to the Puntland-based Garowe Online

Experts Media Highlight New Capabilities Tactics

African experts and media outlets are warning about the evolving nature of terrorist organizations on thecontinent the terrorists pursuit of new targets and tactics and their potential for taking advantage of regional instability

Leading South African think tank the Institute for Security Studies stated on 29 Augustthat Boko Harams attack on the UN in Abuja completes Boko Harams metamorphosisinto an international terrorist group Since December 2010 Boko Haram had killed over600 people in over 70 attacks against Nigerian targets according to the think tank buthad not previously targeted Western or international interests

A 26 August article on the popular Malian web portal Maliweb voiced concern thatAQIM could benefit from Tuareg mercenaries many of whom were recently returningfrom fighting in Libya and could benefit from an increase in arms trafficking through theSahel during the Libyan conflict

Ugandas privately owned Daily Monitor reported on 19 August that AU forces inSomalia warned that Al-Shabaab planned to increase the number of kidnappings andbomb attacks as part of its new strategy to shift from controlling territory in Mogadishuto conducting more of an insurgent campaign

Concern Over Al-Qaida Presence Terrorist Collaboration

West African official statements and media reports reflect a growing concern over an increased Al-

Qaida presence in West Africa and collaboration with AQIM Al-Shabaab and Boko Haram

Nigerian security services reported that the suspected mastermind behind the 26 Augustbombing of the UN office in Abuja was a Boko Haram member with close links to Al-Qaida and Al-Shabaab according Nigerias privately owned Daily Sun

A 28 August report in the privately owned daily Nigerian Tribune claimed that the 26August bombing in Abuja was part of Al-Qaidas plans to mark the 10th anniversary of 911 and called Boko Haram Al-Qaidas ally in the region

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3142

An 8 August commentary in Burkina Fasos LObservateur Paalga said that reports of Boko Haram collaboration with Al-Shabaab and AQIM could indicate that Al-Qaida isextending its African tentacles Abdourahmane Dieng security division chief of theEconomic Community of West African States said the collaboration represented a veryserious threat according to Senegals progovernment Le Soleil on 5 August

Messages Likely To Resonate With African Audience

Sub-Saharan Africas increasing concern about the shifting nature and potential strengthening of theterrorist threat on the continent suggests that messages directly addressing the impact of terrorism onAfricans the increasingly complex nature of the threat and the need for multilateral cooperation againstterrorism are most likely to resonate with Africans

Messages expressing solidarity and sympathy for Africans affected by Boko Haram Al-Shabaab and AQIM would almost certainly resonate with a broad African audience

African political and military leaders would probably welcome acknowledgement of thecomplex and changing nature of terrorism on the continent and recognition of theirinitiatives and commitment to countering violent extremism

African leaders and medias concern about potential collaboration between Boko Haram

Al-Shabaab and AQIM suggest that they would be open to improving multilateral andcross-regional sharing of lessons learned and strategies to counter the intensification of terrorism within Africa

Aviation and Maritime Security| back to top |

Bomb Threats Force Jets To Land

Associated Press | 7 September 2011

Both landed safely one landed in Ankara Ataturk International Airport and the other at Kuala LumpurTwo flights operated by Pakistans state-owned airline received bombs threats on Wednesday

and both landed safely one in Turkey the other in Malaysia officials said No bombs were found The

first flight was headed for Manchester England when it was notified of the threat near the Bulgariancapital of Sofia The crew contacted the control tower in Istanbul to seek permission for the landingstate-run Anatolia news agency reported Authorities quickly evacuated all 378 passengers from theBoeing 777-300ER aircraft after it parked at a remote corner of the International Ataturk Airport andbomb squads began searching the plane with sniffer dogs Anatolia reported PIA spokesman MashoodTajwar confirmed the flight received a threat and landed All passengers were safe A police searchturned up no bomb officials said Later a second PIA flight from Islamabad to Kuala Lumpur alsoreceived a bomb threat It landed in Kuala Lumpur and all the passengers disembarked safely saidTajwar The UK-bound Pakistan International Airlines plane was forced to make an emergency landingat Ataturk Airport in Istanbul after receiving a bomb threat Malaysias airports authority said thepassengers were being screened and the plane was isolated in a parking area while being searched bypolice No bomb was found

It said the plane carried 164 passengers and 13 crew Azmi Murad senior general manager forthe authority said the Pakistani airline informed it that the warning came by email Mr Tajwar gave nodetails on the nature of the threat or how it was delivered Pakistan is home to al Qaedas top leadershipMilitants who trained there have been responsible for many of the attacks and failed plots in the USand Europe since Sept 11 2001 when planes hijacked by al Qaeda militants destroyed the World TradeCenter in New York and crashed into the Pentagon The bomb threats came four days before the 10thanniversary of 911 but there was no apparent link to Islamist militants who typically do not alertauthorities in advance The FBI and Homeland Security department issued warnings last weekend aboutal Qaeda threats to small airlines

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3242

Commentary amp Opinion| back to top |

From Terror Group Founder To Libyan Rebel Military Commander

ABCNews | 29August 2011

The same man who triumphantly led Libyan rebels into Gadhafis compound last week first came to theattention of the US intelligence community years ago - as a founder of a terror group

Abdelhakim Belhaj who was recently appointed to Tripolis rebel military council was one of the original founders of the Libyan Islamic Fighting Group an anti-Gadhafi group which was laterdesignated by the US State Department as a terrorist organization with links to al Qaeda according toUS government reports

We proudly announce the liberation of Libya and that Libya has become free and that the ruleof the tyrant and the era of oppression is behind us a victorious Belhaj told reporters after the stormingof Gadhafis Bab al-Aziziya compound last week Ousting Gadhafi had been the main objective of theLIFG since its inception in the early 1990s even if some of the fighters believed that meant puttingAmericans in the crossfire

The group carried out operations against the Libyan government including at least four suspectedassassination attempts against Gadhafi in the 1990s and was also believed to be connected to a series of suicide bombings in Casablanca Morocco in 2003 the US State Department reported As relationsbetween the US and Gadhafi improved in the mid-2000s some LIFG leaders cultivated relationshipswith top al Qaeda leaders including Osama bin Laden and were suspected of funneling fighters to Iraq tocarry out operations against US soldiers

When the LIFG was designated a terror organization in 2004 it was meant as a gesture of solidarity with the Libyan government according to a March 2011 congressional report

Contrary to several US government reports Libyan rebel ambassador to the US Ali Aujalitold ABC News that the LIFG was never connected to al Qaeda and did not carry out terrorist operations

They were only opposed to Gadhafi during his rule and paid the price for that by beingoppressed by the regime Aujali said

The CIA first publicly voiced its concerns about the connection between the LIFG and al Qaedain 2004 when then-director George Tenet testified before the Senate Select Committee on Intelligenceand listed the LIFG among groups that represented an immediate threat [that] has benefited from alQaeda links[Article continues here httpabcnewsgocomBlotterterror-group-founder-libyan-rebel-military-commanderstoryid=14405319]

Interview With Saudi Sheik Wajdi Al-Ghazawi

MemriTVcom

Sheik Wajdi al-Ghazawi owner of al-Fajr TV criticizes extremist atmosphere in Saudi Arabia and saysafter 911 They Handed Out Sweets on the Streets of Mecca

Following are excerpts from a statement by Saudi Sheik Wajdi Al-Ghazawi owner of Al-FajrTV which was posted on YouTube on August 4 2011

Wajdi Al-Ghazawi When Al-Qaeda and Osama Bin Laden were at the height of their mightthey were extremely popular in Saudi Arabia From mosque pulpits across Saudi Arabia preacherswould pray for their success Moreover from the pulpits of the most important mosques ndash the Al-HaramMosque in Mecca and the Nabawi Mosque in Al-Madina ndash direct prayers for the success of Al-Qaedawere made during the days of the bombing of Tora Bora Oh Allah help our brothers in AfghanistanThese supplications were made during evening prayers as well as Friday prayers The preachers wouldpray for them in violation of the ministrys instructions

When the twin towers in New York were attacked they handed out sweets on the streets of Mecca By Allah they did I witnessed this myself The young people bowed in prayer and hugged one

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3342

another out of joy People were in heaven because of these young men who destroyed America andbombed this idol Am I right or not Was it like that or not

Back then when the Taliban broke off a piece of the nose of the Buddha statue which was hewnin the mountain an entire sermon was dedicated to it in the mosque in Mecca and the preacher was laterreprimanded for this sermon The entire Saudi people supported and loved Al-Qaeda

This went on until our brothers in Al-Qaeda ndash and I dont know what was going through theirminds ndash began to carry out operations inside Saudi Arabia Thats when we all raised our hands andsaid Youve gone too far We wont support you in this

The atmosphere here in Saudi Arabia is one of extremism It is characterized by focusing onminor details Many things are forbidden Yes maybe they are indeed forbidden but by forcing peopleto avoid them and by acting as if these were major sins an atmosphere was created that gave rise toextremist youth who might act recklessly at the most trivial provocation

For instance we blew out of proportion the issue of music the issue of smoking or the issue of hanging pictures in public places True there are clear texts on these issues but the young peopleembraced these issues as if they were fighting usury fornication or alcohol No these are not among theseven major sins So our society has become extreme

This extremist atmosphere has given rise to people who accuse others of heresy and people whopurport to be waging Jihad It has created genes that gave rise to cells of Al-Qaeda and other terrorists

We must examine our breeding ground in which these young men were sownBy Allah what can possibly emerge from such an atmosphere Muftis who accuse others of

heresy sheiks who incite and young people who bomb Am I right or not[Complete clip is available here httpwwwmemritvorgclipen3099htm]

Legal Aspects amp Lawfare| back to top |

Revisiting A Stale Counterterrorism Law

Council on Foreign Relations | 1 September 2011

ldquoNearly a decade after 911 the United States still relies on the 2001 Authorization for the Use of Military Force (AUMF) for the killing and detention of those considered responsible for or associatedwith the terrorist attacks But CFR national security law expert John Bellinger says it is becomingincreasingly difficult for the Obama administration to justify some of its counterterrorism operationsunder this limited statutory authority It has been used in defense of actions including drone attacks onindividuals as well as the targeting of groups in Yemen and Somalia that may have only the mosttenuous affiliation or association to the 911 attack A revised AUMF should clarify those operations aswell as the issue of detention specifically which individuals can be detained for how long and subjectto what processes There also needs to be greater effort at the international level he adds to fill thegaps in the law that covers conflicts between states and non-state actorsrdquohelliprdquo[Complete article is available here httpwwwcfrorgcounterterrorismrevisiting-stale-

counterterrorism-lawp25742]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3442

Narco-Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector[Complete article is available here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Mexicos Cartels Move Into Extortion

At a construction site of an apartment building in the heart of the Mexican capital a company engineerruns through his weekly payroll sheet He has salaries written out for carpenters bricklayers andelectricians At the bottom of the sheet is a notation of $200 for ldquosecurity servicesrdquo next to a nicknameldquoEl Indiordquo mdash the Indian [Complete article is available here

httpwwwtucsonsentinelcomnationworldreport090611_mexico_cartels_bribesmexicos-cartels-move-into-extortion ]

Seven Die In Mexican Pacific Port City

Latin American Herald Tribune

Seven people died in separate shootings in Mazatlan a port city in the northwestern Mexican state of Sinaloa with some of the incidents drug-related a police spokesman told Efe [Complete article is available herehttpwwwlahtcomarticleaspCategoryId=14091ampArticleId=423061]

Tijuana Violence Slows As One Cartel Takes Control

BorderlandBeatcom

Mexicos famously seedy border city of Tijuana is enjoying a lull in drug murders as the countrys mostpowerful cartel gains the upper hand over its rivals [Complete article is available here httpwwwborderlandbeatcom201109tijuana-violence-slows-as-one-cartelhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3542

Network Notes| back to top |

Canadian data foreign threats Spying in the digital age (Suggested by a reader in Lithuania ndash thanks) Globe and Mail | By Colin Freeze 31 July 2010

A government spy agency thatrsquos prohibited from monitoring Canadian citizens is now usingldquoinformation about Canadiansrdquo to zero in on foreign threatsThe ambiguous statement found in a new government report detailing the activities of CommunicationsSecurity Establishment Canada could sanction a range of intelligence-gathering activities ndash includingthe controversial practice of mining ldquometadatardquo from digital communications

Metadata ndash often called data about data ndash are found in e-mails and their attachments and containdigital signatures that can reveal when where and by whom documents were created

The collection of metadata has caused controversy in other countries but never in Canada wherethe Communications Security Establishment Canada operates as an ultra-secretive agency About theonly thing that is known about the classified practices is that they were halted and resumed after someldquomajor changesrdquo including directives signed by Defence Minister Peter MacKay

ldquoI cannot comment on specific operational activitiesrdquo Adrian Simpson a CSEC spokesman toldThe Globe He stressed that reviews upheld that the activities in question were ldquocarried out inaccordance with the law ministerial requirements and CSECrsquos policies and proceduresrdquo

ldquoCSEC is prohibited from directing its activities at Canadians anyone in Canada or Canadiansanywhere in the worldrdquo he said

For decades signals-intelligence agencies in the West have been allowed to safeguard nationalsecurity by eavesdropping on foreignersrsquo conversations Spies can whatever phone lines and satellitesignals they can so long as they never listen in on fellow citizens

But in the digital age governments run increasingly sophisticated dragnets scooping up andscouring through millions of intercepted Internet conversations daily Such practices create legalambiguities

ldquoThe whole issue of what constitutes boundaries for signals-intelligence agencies in cyberspaceis a big debate right nowrdquo said Rafal Rohozinski a security expert affiliated with the University of Torontorsquos Munk School

A watchdog agency that reviews the CSECrsquos activities released an annual report to Parliament onJuly 20 ldquoWhen other means have been exhausted CSEC may use information about Canadians when it

has reasonable grounds to believe that using this information may assist in identifying and obtainingforeign intelligencerdquo it reads

Sometimes collecting metadata is relatively benign It can involve aggregating sets of data tospot trends much like the way meteorologists discern national forecasts from localized information

For example while CSEC canrsquot usually monitor the communications of specific Canadian terrorsuspects it can glean insights by zooming out for big-picture patterns One way to do that MrRohozinski said would be to look at data flows between Canadian cities and Yemen where an Internet-savvy al-Qaeda offshoot works to recruit Westerners

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3642

Metadata however can be more revealing Documents that circulate on the Internet travelaround like postmarked letters marked with return addresses ndash e-mails and attachments have embeddedcodes that speak to the who where and when behind their creation

The US National Security Agency found itself mired in controversy a few years go after itskirted domestic-spying bans by secretly upholding that this sort of American metadata was fair gamedistinct from communication contents

Therersquos little to suggest the CSEC would go that far The federal agencyrsquos activities are reviewedby a watchdog body now headed by a former Federal Court of Appeal judge Robert Deacutecary appointedlast year wrote in his annual report that he was satisfied the CSEC activities in question are lawful evenif his predecessors felt them borderline

ldquoThis was the first review of these activities since hellip their resumption under new policiesrdquo thewatchdogrsquos report says It concludes that the surveillance activities are ldquoin accordance with the lawrdquo andfollow ldquomajor changes to certain policies procedures and practicesrdquo

Much of the concern arises from the possibility that CSEC could hand over metadata intelligenceto domestic law-enforcement and security agencies

As it stands the RCMP and CSIS have to develop their domestic investigations before coming toCSEC ndash usually with warrants ndash if they want specific intelligence The rules guiding handovers are strictbecause even though all agencies run surveillance operations they do so under vastly different

mandates and legal standardsThe spy agency however stood by its practicesldquoCSEC is extremely diligent when it comes to the privacy of Canadiansrdquo Mr Simpson said

[complete article is available here httpwwwtheglobeandmailcomnewsnationalcanadian-data-foreign-threats-spying-in-the-digital-agearticle2113772 ]

Cyber Attacks Against NATO Then And Now

New Atlanticist | 6 September 2011

ldquoNow that NATOrsquos Operation UNIFIED PROTECTOR over Libya is winding down it is worth

noting how few cyber incidents were directed in protest against the Alliance Certainly there was a

cyber component to the liberation of Libya but it was more about content and Internet freedom (the

most newsworthy elements here were the role of social media and the Libyan government taking largeparts of the nation offline) But compared to past history NATO cyber defenders had a relatively easy

time

ldquoNATO has not however had an easy 2011 Although there were three significant incidents we

know about none seemed to have been in direct response to operations over Libyahelliprdquo

[Complete article is available here httpwwwacusorgnew_atlanticistcyber-attacks-against-nato-then-

and-now]

The Calm Before The Storm

Foreign Policy | By Joel Brenner 6 September 2011

Cyberwar is already happening -- and its about to get much much worse A veteran cyberwarriorexplains how America can prepare itself

Revelations of wholesale electronic fraud and massive data heists have become weekly evendaily affairs A multinational electronics corporation loses personal information on more than 100million customers Cyberthieves break into an international bank counterfeit credit balances and lootATMs in four countries grabbing $9 million in just a few hours International gangs spread maliciouscode that conscripts unwitting computers into zombie armies of hundreds of thousands of similarlyenslaved machines Criminals then rent these armies called botnets as easily as you can buy a time-sharing arrangement in a beach condo No wonder the vast majority of Internet traffic is spam

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3742

Yet the loss of personal information and related criminal fraud intolerable as they are are theleast threatening face of electronic insecurity The US militarys secret network is penetratedAmericans corporate pockets are being picked clean of the intellectual property that makes the UnitedStates tick And the electricity grid that keeps the lights on and makes everything move is dangerouslyinsecure

In one remote attack on the Pentagons information systems about 10 years ago the Chinesehauled away up to 20 terabytes of information If the information had been on paper theyd have neededa line of moving vans stretching from the Pentagon to freighters docked 50 miles away in Baltimoreharbor just to haul it away Had they done so the military district of Washington wouldve become anactive theater of operations for the first time since 1865 and the Navy wouldve blockaded theChesapeake Bay But the Chinese did it electronically so who noticed

Corporate espionage by both competitors and foreign intelligence services or their surrogates isalso increasing Intelligence officials see this but cant speak openly about the specifics and Im seeingit now in my law practice The victims rarely admit it for understandable reasons Oracle whichsuccessfully sued SAP for theft of its software code was a prominent exception Google was another

When the Chinese penetrated Google in late 2009 -- yes that operation was Chinese and yes itwas done with the blessing of a member of the Politburo -- they werent after customer informationThey were after the source code that makes Google unique Nor was Google the only victim Thousands

of US and Western firms were penetrated in that affair Foreign governments -- and not only theChinese -- understand that they cannot compete with the United States militarily and politically if theycannot compete with it economically so their intelligence services want to steal its corporate intellectualproperty This is the technology that gives America its competitive edge and often it has nothing to dowith defense Ordinary companies with valuable technology are now being targeted by nation-statesThis is a new era National security and economic security have converged

The danger is not limited to the loss of technology and information however The owners andoperators of the North American electricity grid are hooking up their control systems to the Internet asfast as they can Exposing the grid to the Internet makes it marginally more efficient but it also makes itdramatically more vulnerable to disruption If you can remotely penetrate an electronic system to stealinformation you can remotely penetrate it to shut it down or make it go haywire This is why there is no

longer a meaningful difference between information security and operational security And the biggestoperational risk is the grid In contemporary society nothing moves without electricity If the grid goesout the country stops

As the Stuxnet affair demonstrated remotely engineered disruption of industrial control systemsis now a reality That episode involved the successful electronic attack on the centrifuges in the Iraniannuclear program Only a first-class intelligence agency could have pulled that off but the blueprint fordoing it -- the code itself -- is now public Many American industrial control systems run on the samekind of equipment the Iranians were using but unlike the controls on the Iranian centrifuges thecontrols on the US grid are now being connected to the Internet making them easier to disrupt Stuxnetwas a watershed there will be copycats

Other industrial control systems will also be targets Some already are Air traffic control

railroad switches and water and sewage systems are all electronically controlled now and many arevulnerable If an intruder can break into the right server electronically he can remotely shut downproduction send your goods to the wrong destination and even unlock your doors -- and delete your logentries so he leaves no record of ever having been there

The United States does not lack enemies who would attack it this way Seized al Qaedacomputers contain details of US industrial control systems In 2003 a group affiliated with thePakistani terrorist organization Lashkar-e-Taiba -- the same gang that engineered the 2008 terroristassaults in Mumbai -- plotted to attack the Australian grid Other groups conspired to attack the Britishgrid in 2004 2006 and 2009 Yet the owners and operators of the North American grid continue willy-

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3842

nilly to expose their control systems to the Internet instead of isolating and hardening it This is folly of a high order

Important conclusions for public and corporate policy follow from this vulnerable state of

affairs First cyber insecurity has operational consequences In the current and foreseeable states of technology a high degree of assurance against electronic penetration of anything connected to theInternet is not achievable Large efficient electronically connected organizations and nations aretherefore vulnerable to remotely engineered disruption as well as information theft

Second this risk cannot be eliminated -- but it can be reduced and managed As a nation theUnited States should start by isolating the grids controls from the Internet Undoubtedly there aremarginal efficiencies to be gained by seamless connectivity over a publicly accessible infrastructure butthese gains are usually exaggerated and the risk this connectivity creates is staggering The governmentand the major telecommunications carriers must also make the investment required to re-create themassive redundancies that made the wired telephone network so robust Resilience and swift recoveryshould be the goal If the consequences of cyberattacks were reduced penetration would cease to matter

Third companies that wait for the government to solve their own security problems do so attheir peril The government is broke and the IT backbone is 85 percent private so the governmentdoesnt control it The governments role in altering the status quo will be limited to setting standardsusing its purchasing power to move vendors toward better security and getting its own house in order

The government can neither secure corporate intellectual property nor protect firms against operationaldisruption

Fourth in a world in which everything cannot be protected companies must determine forthemselves what intellectual property and physical assets to isolate and safeguard Those that approachthis task seriously will quickly learn that technology is only one aspect of their insecurity and in manycases the easiest to deal with Unless technology is integrated with personnel practices and operationalsecurity it opens vulnerabilities that its users rarely understand This kind of integration requires theautomated enforcement of reasonable security policies and systematic workforce training and thatoccurs only when management the lawyers and the technologists work closely together This is an old-fashioned management challenge -- not a technological one For their part corporate boards need to takeIT security seriously and launch audits that examine how their systems are actually implemented and

used not merely how they are designed Because as the techies like to put it the weakest link in anysystem is not the silicon-based unit on the desk its the carbon-based unit in the chair Joel Brenner is author of the forthcoming America the Vulnerable Inside the New Threat Matrix of

Digital Espionage Crime and Warfare He has served as the inspector general of the National Security

Agency the national counterintelligence executive and the NSAs senior counsel He now practices law

at Cooley LLP in Washington DC

Cyberattacks Decline Slightly Symantec Report Finds

Dark Reading | 1 September 2011

Organizations worldwide are suffering damages as a result of cyberattacks but interestingly there hasbeen a slight decline in these attacks during the past 12 months according to a new report from

Symantec More than 90 percent of the more than 3300 respondents across 36 countries said theyexperienced tangible losses as a result of a hack with 84 percent reporting financial loss to the cost of abreach Around one-fifth lost at least $195000 in breaches during the past 12 months

Meanwhile Symantec attributes the unexpected bright spot of a decline in breaches toorganizations employing better cybersecurity defenses More than 70 percent of organizations sawattacks in the past 12 months a decline of 5 percent from 2010 And those that experienced anincreasing frequency of attacks dropped from 29 percent in 2010 to 21 percent this year While 100percent last year reported losses from cyberattacks 92 percent did so in 2011 The trend seemscounterintuitive given the rash of high-profile breaches this year More

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 12: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1242

The blast was of at least medium intensity and created a crater between three to four feet deepAt least eleven people have died and 65 others have been injured ndash a toll that would probably have beenhigher if an international group had been responsible There were no other explosions which has thesame implication Mumbai has been placed on high alert following the attack especially as the HomeMinistry reported in August that coastal cities were under threat from pan-Islamic terror groups Noblame has yet been assigned A minor explosion occurred on 25 May (also a Wednesday) in a car-park near the Court That bomb was constructed using ammonium nitrate and is believed to havemalfunctioned causing no damage or injuries which suggests similar origins to this one

There are reports of an email from Harkat-ul-Jihadi al-Islami (HuJI) claiming responsibilityfor todayrsquos explosion but we remain sceptical about this since the group has not previously made suchclaims via email The nature of the bomb and the use of email to communicate suggest rather theinvolvement of the Indian Mujahideen (IM) Nonetheless the unverified HuJI email demands that AfzalGurursquos death sentence be repealed and this may point towards the involvement of a jihadist agendaGuru was involved in the December 2001 Parliamentary attacks in Delhi and had his mercy petitionrejected by the Home Ministry on 10 August

Todayrsquos incident indicates an increase in successful attacks by local groups A robust securityforce campaign following the 2008 Mumbai attacks diminished the capabilities of groups such as IMThey claimed responsibility for the December 2010 Varanasi bomb blast which killed one and injured

twenty people However IMrsquos likely involvement in the July 2011 blasts in Mumbai and the attack todaypoints towards the rebuilding of its capabilities and possibly also the establishment of closer ties with jihadi groups

We do not expect a spate of attacks to follow imminently but such incidents will continue tooccur possibly on a larger scale as IM continues to regroup following the security clampdownDevelopments in the cases of Afzal Guru and Ajmal Kasab (the surviving gunman from 2008) willprovide cause for further attacks Given a recent warming in relations between India and Pakistan theHigh Court attack will be unlikely to raise tensions between the two countries significantly

Indonesia

| back to top |

Islamic Groups Continue To Harass Religious Minorities Government Silence Further

Encourages Attacks Youths Beaten In East Jakarta

Assynt SEAsia Vol VIII No17 | 7 September 2011

Hard-line Islamic groups continued to intimidate religious minorities without any response from theGovernment at either a local or national level Yudhoyono relies on the support of Islamic parties inParliament and is unlikely to take any decisive action against such incidents This will further encourageradical groups and endangers the countryrsquos reputation for religious tolerance

Three youths were beaten by members of the Islamic Defenders Front (FPI) for allegedly beingdrunk The attack took place in Jakartarsquos business district but it remains unlikely that the FPI will targetforeigners and the security forces will not tolerate any threats to business interests Nonetheless such

incidents highlight a worrying trend towards increasingly hard-line behaviour that remains unchecked bythe Government

We previously reported that the light sentences handed down for the killing of three members of the Ahmadiyah sect will embolden radical groups (see our Report of 3 August) In this period theIslamic Reform Movement (Garis) coerced Ahmadi youths in Cianjur West Java to join mainstreamprayers The Ahmadiyah sect meanwhile was banned from conducting religious activities during theEid holidays by the South Sulawesi administration for fear of provoking violence

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1342

Iran

| back to top |

Two Arrested Al-Qaidah Members Iraqi Three Iranian - Iran Official

ISNA website | Tehran in Persian 7 September 2011

The public prosecutor of Irans Kerman Province Yadollah Movahhed has announced the start of aninvestigation into the case of five people arrested on charges of having links to Al-Qaidah the IranianStudents News Agency (ISNA) reported on 7 September Two of the detainees - arrested on 19 August -are Iraqis and the other three are Iranian nationals Movahhed told ISNA in an interview on 7 SeptemberThe prosecutor said the detained people are accused of carrying illegal arms and munitions and addedthat an investigation is ongoing into the possibility that they were members of a larger group

Israel

| back to top |

Israel Uncovers Planned Hamas Bombing Spree On Israelis

Xinhua | 8 September 2011

Hamas cells operating in the West Bank routed between May and AugustThe Israeli security agency Shin Bet has broken a network of Hamas cells operating in the West Bank and planning a series of attacks against Israeli targets local media reported Wednesday Dozens of

Hamas members comprising 13 militant cells were arrested throughout the West Bank between May andAugust Army Radio reported One of the groups has carried out a bombing attack at the entrance toJerusalem in March in which a British woman was killed and several dozen civilians wounded Anothercell had planned to dispatch a suicide bomber to Jerusalems Pisgat Zeev neighborhood on Aug 21 Theattack was thwarted at the last minute by Shin Bet agents assisted by the Israel Defense Forces (IDF)and police according to Army radio Other groups were in various stages of planning and preparingattacks including bombings and the kidnapping of civilians or soldiers for the release of Palestinians jailed in Israel The Shin Bet concluded based on its interrogations of the group members that theHamas military leadership in Gaza and abroad is exerting considerable efforts to rehabilitate itspresence in the West Bank with financing and weapon smuggling The West Bank has remainedrelatively quiet in recent years Israeli officials attributed the success in preventing violence in the area

to the cooperation between the IDF and the Palestinian National Authoritys security forces

Israeli Air Strike Kills One Gaza Militant

Xinhua | 8 September 2011

Strike follows more rocket launches from Gaza warnings of new battlesAn Israeli air strike killed an Islamic Jihad militant and wounded three others in the central Gaza

Strip town of Dier a-Balah witnesses and medical sources said Local witnesses said the militant diedafter his car was hit by a missile adding that three other people were also wounded The condition of theinjured is stable hospital sources said Earlier Wednesday an Israeli military spokesperson said a rocketwas launched from the Gaza Strip into south Israel adding the projectile landed in an open area and didnot cause injuries or damage None of the Palestinian armed factions has claimed responsibility for the

rocket attack Late on Tuesday a Palestinian militant was killed and two others injured when Israeliwarplanes targeted a group of gunmen east of Khanyounis City south of the Hamas-ruled Gaza Strip

The Gaza Strip witnessed an escalation of bloody violence between Israel and Gaza militantgroups in August leaving 26 Palestinians and three Israelis killed The violence was triggered after eightIsraelis were killed in well-coordinated operation in the Red Sea city of Eilat Israel accused Palestinianmilitants of plotting and carrying out the attack which started from the bordering Sinai Peninsula inEgypt

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1442

Libya

| back to top |

Libyan Extremist Britain Allowed To Stay Was Link To Al-Qaeda In Iran Papers Show

The Daily Telegraph | (London) By Richard Spencer Tripoli

The extremist Ismail Kamoka spent several years sending funds to terrorist groups across the Middle East

An Alleged Libyan extremist who sought political asylum in Britain regularly travelled to Iran from2002 to provide forged documents to extremists linked to al-Qaeda secret files found in a Tripoliintelligence service building have disclosed

The documents seen by The Daily Telegraph unearth British intelligence suspicions about linksbetween Iran and al-Qaeda dating back almost a decade Other details to come out of the documentssent by MI6 and found in the office of the former head of foreign intelligence and later foreign ministerMoussa Koussa who defected in March include the revelation that Britain had begun co-operating withthe Chinese security services on Islamic extremists The extent of Iranian co-operation with al-Qaedahas been disputed in intelligence communities though Iranians are thought to have provided weaponsand explosives to the Taliban in Afghanistan

A number of al-Qaeda operatives including members of the family of Osama bin Laden fled toTehran after the fall of the Taliban in Afghanistan and their precise status in Iran has been unclear Thepapers in Libya do not directly challenge the Iranian government but suggest that al-Qaeda operativeshad more freedom of movement there than previously thought The extremist Ismail Kamoka spent

several years sending funds to terrorist groups across the Middle East including some linked to al-Qaeda the files said Mr Kamoka who had been given indefinite leave to remain in Britain afterarriving from Saudi Arabia in 1994 and claiming asylum travelled from the UK to Iran viaSwitzerland in July 2002 according to one document[Article continues herehttpwwwtelegraphcouknewsworldnewsafricaandindianoceanlibya8740771Libyan-extremist-Britain-allowed-to-stay-was-link-to-al-Qaeda-in-Iran-papers-showhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1542

Nigeria

| back to top |

Bomb Explodes In Violence-Torn Nigerian City Residents

AFP | 6 September 2011

A bomb went off Tuesday in Nigerias northeastern city of Maiduguri disrupting a three-week lull inbombings in the violence-torn city local residents said [Article continues here httpnewsyahoocombomb-explodes-violence-torn-nigerian-city-residents-215718081html]

Pakistan

| back to top |

Pakistan Bans Foreign Travel For Those Involved In Bin-Ladin Probe

The News website | Islamabad in English 7 September 2011

A Pakistani commission investigating the circumstances surrounding the killing of Al-Qaidah chief Usamah Bin-Ladin has banned foreign travel for everyone involved in the probe Pakistani daily TheNews part of the Jang group which owns Geo TV reported on 7 September The paper recalled that thecommission had already directed the countrys interior ministry and the intelligence service ISI toensure that the Bin-Ladin family was not repatriated from Pakistan without the consent of the

commission

More Than 20 Killed In Two Suicide Blasts In Pakistans Quetta

Express247 TV | Lahore in English 5 September 2011

At least 22 people were killed and several others injured in two explosions in the south-westernPakistani city of Quetta on 7 September the website of the Dubai-based private Pakistani TV channelARY News reported According to the channel one blast went off near the residence of the FrontierConstabulary and another one near the commissioner office in Quetta According to the report around100 kilograms of explosives were used in each attack (ARY News website Dubai in English 07 Sep 11)

Private Pakistani English-language TV channel Express 247 carried a series of onscreen scrollswhich said police had confirmed that the two blasts were suicide attacks The report cited police sources

as saying that 25 people were killed and more than 40 injured in the attacks (Express247 TV Lahorein English 0654GMT 07 Sep 11)

BBCM notes that the attacks came after the Pakistani intelligence agency said on 5 August that ithad arrested Al-Qaidah commander Younis Al-Mauritani and two of his accomplices in Quetta

Taleban Say Quetta Blasts Revenge For Recent Al-Qaidah Arrests

AFP | 7 September 2011

The Pakistani Taleban have claimed responsibility for the twin suicide bombs in Quetta on 7 Septembersaying they were carried out to avenge the recent arrests of Al-Qadiah operatives in the city Wecarried out the attacks Taleban spokesman Ehsanullah Ehsan told AFP in a phone call from anundisclosed location

Twin Suicide Bombings In Pakistan Leave 23 Dead

Miami Herald

Twin suicide bombers attacked the home of a senior military officer Wednesday in the western city of Quetta injuring him and killing at least 23 people officials said in a possible revenge attack forPakistans recent arrest of a senior al Qaida commander [Article continues here httpwwwmiamiheraldcom201109072394264twin-suicide-bombings-in-pakistanhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1642

Philippines

| back to top |

Moro Splinter Group Threatens US Soldiers In Philippines But Capabilities Limited

Government-Rebel Negotiations Remain Difficult

Assynt | SEAsia Vol VIII No17 7 September 2011

Ameril Umbra Kato a former senior Moro Islamic Liberation Front (MILF) field commander whoresigned late last year because he rejects peace negotiations has threatened to attack US troops as wellas Filipino security forces and other Government targets US and Filipino troops are currentlyundertaking joint training exercises This is an annual event but the first time they have been conductedin central Mindanao However Katorsquos splinter group the Bangsamoro Islamic Freedom Fighters (BIFF)is believed to have as few as 200 members with generally unsophisticated weapons ConsequentlyBIFFrsquos ability to conduct an attack on US forces is likely to be limited

In this period Kato announced the creation of a political wing to his grouping the BangsamoroIslamic Freedom Movement emphasising his split with MILF Nevertheless he has not been expelledfrom MILF and so is protected by the current ceasefire with Manila though MILF has stronglycondemned Katorsquos threat against US troops It is possible that MILF leadership is content to allow himto operate relatively unimpeded in order to gain greater leverage in its negotiations with theGovernment since they can contrast their more compromising approach with BIFFrsquos threatened

violence Meanwhile negotiations between MILF and the Government continue MILF dismissed theGovernmentrsquos latest proposal for an autonomous region but both sides appear committed to continuingtalks

Russia

| back to top |

Suicide Bombings In Grozny Demonstrate Islamic Insurgencyrsquos Continuing Capabilities In

Chechnya

Stirling Assynt Reports | Report FSU Vol IV No17 7 September 2011

A series of suicide bombings in the Chechen capital on 31 August (which left nine casualties includingseven police officers) has severely undermined President Ramzan Karydovrsquos claims to have successfully

eradicated the Islamic insurgency in the Republic The first suicide bomber reportedly detonated hisexplosives in a densely populated area only 150 metres from a local Parliament building while twofurther jihadists targeted first-response units Significantly the attack occurred during the Muslimholiday of Eid a three day celebration which marks the end of Ramadan during which the risk of jihadist attacks is heightened Indeed in addition to this strike in Grozny jihadist militants carried outfurther attacks in Iraq Nigeria and Algeria during Eid this year

Although no group has claimed responsibility for this incident it bears the hallmark of theCaucasus Emirate and so was likely orchestrated by the grouprsquos newly appointed deputy KhuseynGakayev and his brother Vadalov Indeed the Gakayev brothers are believed to have been behind theattack on the Chechen Parliament in October 2010 demonstrating the grouprsquos capabilities and intent tocarry out such strikes Moreover the timing of these bombings ndash only two months after the

reconciliation of the Caucasus Emiratersquos leader Doku Umarov with Chechen commanders (see our 3August Report) ndash supports this assessment and suggests that further incidents and suicide bombings arelikely given this truce

Suspected Militant Killed In Russias Southern Republic

Interfax news agency | Moscow in Russian 7 September 2011 Russias National Antiterrorist Committee said on 7 September a militant had been killed in the Republicof Kabarda-Balkaria the corporate-owned Russian news agency Interfax reported

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1742

Saudi Arabia

| back to top |

Saudi Arabia Shopping Around For Nuke Technology

Haaretz | 8 September 2011

Ties with Pakistan may remain close as Riyadh seeks nuclear assistanceSynopsis This week brought news that Iran on its own has produced new advanced nuclearcentrifuges According to a report of the International Atomic Energy Agency Iran has begun to installthe centrifuges in its uranium enrichment facility in Natanz But the high-level source noted thatdevelopment and production of the new centrifuges began more than seven years ago That does notspeak of a great technological capability on Irans part Israeli intelligence like its American counterpartviews 2014 or 2015 as the date when Iran will be able to build nuclear weapons says the source - if itwants to and no one blocks it In Saudi Arabia in contrast they are a bit more disturbed by thedevelopments in Iran An American Department of Energy delegation visited Riyadh and met with DrHashim Yamani who heads the King Abdullah City for Atomic and Renewable Energy Saudi Arabiawants to equip itself with nuclear reactors to generate electricity The United States is interested inselling Riyadh reactors for two reasons - fat contracts and the ability to keep close tabs on nucleardevelopments in Saudi Arabia The American administration is concerned that with a nuclear programfor civilian uses Saudi Arabia would actually like to prepare the infrastructure so it could switch to

producing nuclear weapons relatively quickly should Iran possess such weapons Defense ministerSultan Bin Abdul Aziz and the countrys former intelligence chief Turki Bin Faisal reportedly favorthe preparation of a secret nuclear program for military uses in cooperation with a Sunni Muslim ally -Pakistan which possesses dozens of atomic bombs Saudi Arabia reportedly funded Pakistans nuclearweapons program in return for Pakistans promise to aid the monarchy in this area if need be

Serbia

| back to top |

Serbia Threatened By Terrorism Says Dacic

Tanjug | 8 September 2011

US officials warned Serbia of possible terrorist activity particularly against foreign interests

After a warning coming from USA officials Serbia will raise the level of security in all facilitiesbelieved to be a possible target of terrorists the countrys Deputy Prime Minister and Minister of InteriorIvica Dacic stated Wednesday in the Palace of Serbia He stated that the security measures will primarilyrefer to the facilities of foreign countries in Serbia and added that special attention will be paid to thesecurity of air traffic US officials assume that there is a possibility of new terrorist attacks in the USAand other countries including Serbia Dacic said following a meeting with Special Representative of the UN Secretary-General for Disaster Risk Reduction Margareta Wahlstrom in Belgrade and a sessionof the republic headquarters for emergency situations

Somalia

| back to top |

Six Killed In Mortar Attack In Somali CapitalShabeelle Media Network website | Mogadishu in Somali 7 September 2011

Six people were killed and several others injured after three mortars landed in Mogadishus Arjantiinneighbourhood in Kaaraan District on the night of 6 September the privately-owned Shabeelle websitereported It quoted an eyewitness as saying that two of the three mortars fired have caused thecasualties inflicting fear in the residents who returned to their homes after Al-Shabab vacated the areaearly last month Kaaraan District is one of the areas taken over by the government forces and AUpeacekeepers

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1842

United States

| back to top |

Post-911 Intelligence Reform Takes Root Problems Remain

Reuters | 8 September 2011

US intelligence agencies will forever be scarred by their failure to connect the dots and detect theSeptember 11 plot but a decade later efforts to break down barriers to information-sharing are takingroot Changing a culture of need-to-know to need-to-share does not come easily in spy circles Someofficials say they worry a decade later about a future attack in which it turns out that US spy agencieshad clues in their vast vaults of data but did not put them together or even know they existed

Yet significant changes both big and small have broken down barriers between agenciessmoothed information-sharing and improved coordination US intelligence experts say From issuing ablue badge to everyone working in the sprawling intelligence community to symbolize a commonidentity to larger moves of mixing employees from different agencies the goal is singular -- to preventanother attack

Were much further ahead David Shedd Defense Intelligence Agency deputy director said of the ability to connect the dots compared with 10 years ago Still signs of a plot to attack the UnitedStates could be missed again My worst fear and I suspect probably one that would come true is that inany future would-be or actual attack God forbid we will be able to find the dots again somewhere

because of simply how much data is collected Shedd said The political response to the failure to stopthe attack was the 2002 creation of the Department of Homeland Security pulling together 22 agenciesto form the third largest US Cabinet department behind the Pentagon and Veterans Affairs

That was followed by the creation in late 2004 of the Director of National Intelligence to overseeall the spy agencies as recommended by the bipartisan 911 commission Previously the CIA directorheld a dual role of also overseeing the multitude of intelligence agencies But in the aftermath of the2001 attacks policymakers decided that was too big of a job for one person to do effectively

Critics argued then and now that the reforms were the governments usual response to crises --create more bureaucracy But others see much-needed change It has been a tremendous improvementsaid Lee Hamilton who was the 911 commission vice chair Its not seamless there are problems andweve still got a ways to go The 2001 attacks involving airliners hijacked by al Qaeda operatives killed

nearly 3000 people in New York Pennsylvania and the Pentagon Various US intelligence and lawenforcement agencies had come across bits of information suggesting an impending attack but failed toput the pieces together The CIA had information about three of the 19 hijackers at least 20 monthsbefore the attacks the National Security Agency had information linking one of the hijackers with alQaeda leader Osama bin Ladens network the CIA knew one hijacker had entered the United States butdid not tell the FBI and an FBI agent warned of suspicious Middle Eastern men taking flying lessons

Have the reforms made America safer Officials say yes and point to the US operation thatkilled bin Laden in Pakistan in May that demanded coordination among intelligence agencies and themilitary But there is an inevitable caveat no one can guarantee there will never be another attack onUS soil On Christmas Day 2009 a Nigerian man linked to an al Qaeda off-shoot tried unsuccessfullyto light explosives sewn into his underwear on a flight to Detroit from Amsterdam It turned out US

authorities had pockets of information about him President Barack Obama used a familiar September 11phrase to describe the 2009 incident as a failure to connect the dots of intelligence that existed acrossour intelligence community

Roger Cressey a former White House National Security Council counterterrorism officialresurrected another September 11 phrase It was a failure of imaginationThe intelligence community had not seen al Qaeda in the Arabian Peninsula a Yemen-based al Qaedaoff-shoot as capable of striking the US homeland If the underwear bomber threat had originated inPakistan they would have gone to battle stations immediately Cressey said Some proposed changesin how authorities would respond to another successful attack still are pending For example creation of

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1942

a common communication system for police firefighters and other emergency personnel remainstangled up in political wrangling in Congress over how to implement it This is a no-brainer Hamiltonsaid The first responders at the scene of a disaster ought to be able to talk with one another Theycannot do it today in most jurisdictions

Former leaders of the 911 commission issued a report card saying nine of its 41recommendations remain unfinished The Office of the Director of National Intelligence hasexperienced growing pains as overseer of the 17 spy agencies churning through four chiefs in six yearsTensions over turf confusion about the DNIs role and problems herding agencies with very powerfulchiefs of their own all came to a crescendo when retired Admiral Dennis Blair the third DNI tried toassert authority over CIA station chiefs who represent the agency in different countries The positionof chief of station is one of the crown jewels of the CIA and they dont want anyone playing with theircrown jewels said Mark Lowenthal a former senior US intelligence official

After a dust-up with CIA Director Leon Panetta who now is defense secretary it was Blair whowas sent packing I think the mistake that some have made is to have viewed the DNI and the Directorof CIA as an eitheror proposition rather than the power of the two working together the DIAs Sheddsaid in an interview in his office There is a history of where that hasnt worked so well I believe it isworking much better today said Shedd who has worked at the DNI CIA and National SecurityCouncil

Intelligence experts say in the current administration Obamas top homeland security andcounterterrorism adviser John Brennan arguably has more power than any of them because he has thepresidents ear Its a reminder that bureaucratic reform or no personalities count in making nationalsecurity policy The improved sharing of secret data has led to yet another set of problems The delugeof bits and bytes has subjected intelligence analysts to information overload as they try to sift through itall for relevant pieces Our analysts still are spending way too much time on finding the informationrather than on the analysis of the information Shedd said There is just too much data to go find it all

The intelligence community wants a system developed that would automatically processinformation from multiple agencies and then make the connections for the analysts

But greater inroads into sharing data across agencies does not guarantee that another attack willbe averted The threat has evolved and officials now are increasingly concerned about a lone wolf plot

by an individual not tied to any militant group that may be more difficult to uncover Those threatswill not come to our attention because of an intelligence community intercept said John Cohen asenior Department of Homeland Security counterterrorism official

They will come to our attention because of an alert police officer an alert deputy sheriff analert store owner an alert member of the public sees something that is suspicious and reports it Cohensaid One measure of the success of post-911 reforms is that a decade later the United States has not hada similar attack Now that could be luck that could be skill we dont really know Hamilton said Butin all likelihood what we have done including the establishment of the Department of HomelandSecurity and the transformation in intelligence and FBI has certainly been helpful[Article continues here ]httpnewsyahoocompost-9-11-u-intelligence-reforms-root-problems-052514320html

Comment the value added provided by the Office of the DNI remains an open question for many withinthe Intelligence Community (IC) and is a favored theme of corridor discussion in IC-member agenciesOn the other hand there is broad agreement among intelligence officials that the degree of cooperationand coordination between intelligence agencies and the character of intelligence sharing has vastlyimproved The fact that there has not been a successful major attack on US soil since 911 ndash not forlack of plotting ndash is in great part testimony to this more effective cooperation

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2042

Jihadist Suggests Striking New York City Bridges

All SITE Intelligence Group | 6 September 2011

A jihadist pointed to what he found to be a weak point of suspension bridges and directed his messageto those who love blasting and explosions In a message posted on the Shumukh al-Islam forum onSeptember 6 2011 the jihadist Abu Suleiman al-Nasser gave a picture of the Verrazano Bridge inNew York on which he drew a red box and arrow on the bridges center He then gave a map on whichhe circled the various bridges in New York City and its boroughs A fellow jihadist offered his ownidea giving a picture of the Hoover Dam and explaining that there is no target more important thandams He wrote that striking a dam may lead to the submerging of cities and the killing of thousands of people and in the case of the Hoover Dam would impact Las Vegas the capital of gambling anddebauchery

Counterterror Veteran is New Deputy FBI Director

Atlanta Journal Constitution | 1September2011

A 24-year FBI veteran with extensive counterterrorism experience Sean Joyce has been named the lawenforcement agencys new deputy director Elevated to the No 2 post within the FBI by Director RobertMueller Joyce replaces Timothy Murphy who is retiring after 23 years with the bureau Since last yearJoyce has been executive assistant director of the national security branch responsible for the FBIs

national security and intelligence operations He earned the Attorney Generals Award for ExceptionalService in 2004 for work on a counterterrorism squad in Dallas In 2008 he was named chief of thecounterterrorism divisions international terrorism operations section with responsibility forinternational terrorism matters within the United States hellip[Complete article is available here httpwwwajccomnewsnation-worldcounterterror-veteran-is-new-1153018html]

Top CIA Official Obama Changed Virtually Nothing

Salon | 1 September2011

PBSs Frontline is airing an examination of Top Secret America on September 6 The show includes arare and lengthy interview with 34-year-CIA-veteran John Rizzo who is described as the most

influential lawyer in CIA historyHere is one quote they include from Rizzo With a notable exception of the lsquoenhanced

interrogationrsquo program the incoming Obama administration changed virtually nothing with respect toexisting CIA programs and operations Things continued Authorities were continued that wereoriginally granted by President Bush beginning shortly after 911 Those were all picked up reviewedand endorsed by the Obama administration hellip[Complete article is available herehttpwwwsaloncomnewspoliticsbarack_obamastory=opiniongreenwald20110901obama]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2142

General Counterterrorism News| back to top |

The Terrible Missed Chance

Newsweek | 4 September 2011

Special Agent Harry Samit of the FBIs Minneapolis field office knew he was looking into the eyes of aterrorist It was early afternoon on Friday Aug 17 2001 Across from him sat Zacarias Moussaoui a33-year-old French-born student arrested the day before for overstaying his visa Moussaoui had paidmore than $8000 in cash that summer to sit in a cockpit simulator in a flight school in the suburbs of Minneapolis and learn - in a matter of days - the basics of how to fly a 747-400 Samit a formerintelligence officer at the Navys celebrated Top Gun flight school felt sure the man across the desk from him was a Muslim extremist who was part of a plot to hijack a commercial jetliner filled withpassengers The trick Samit wrote in a soon-to-be-released excerpt of a book hes written about thecase was getting Moussaoui to admit this and reveal details and associates to allow us to stop the plot

Surely the bureau brass in Washington would share his concern Samit thought He was wrongThat same day halfway across the country in the fluorescent-lit hallways of the J Edgar Hoover

FBI headquarters building in Washington counterterrorism supervisors were treating Samits firstreports about Moussaoui with skepticism even contempt Michael Maltbie a DC counterterrorism

specialist insisted repeatedly in the days after the arrest that there was no clear link between Moussaouiand Al Qaeda - the link needed for a warrant Maltbie thought Moussaoui was a dirty bird he latertold investigators but favored deporting him to France

Believing a hijacking might be imminent Samit appealed to his boss in Minneapolis SpecialAgent Greg Jones Jones picked up the phone on Aug 27 and called Maltbie at FBI HQ

Moussaoui he said might be part of a plot to get control of an airplane and crash it into theWorld Trade Center or something like that

Maltbie scoffed You have a guy interested in this type of aircraft Maltbie replied accordingto FBI documents That is it (Maltbie declined requests for an interview)

At least Maltbie was paying attention Michael Rolince who ran the FBIs InternationalTerrorism Operations Section was arguably the bureaus most important go-between with the White

House on domestic terrorist threats in the summer of 2001 He tells Newsweek he spent less than 20seconds being briefed on the Moussaoui case that August His office was inundated with terrorismprobes he said since Moussaoui was in custody already he posed no immediate threat Did it rise tothe level of something that I would take upstairs Rolince asks The answer is no

At CIA headquarters alarm bells were ringing loudly CIA Director George Tenet was briefedon Moussaoui within days of the arrest receiving a paper with the eye-catching headline IslamicExtremist Learns to Fly But the FBIs acting director that summer and the bureaus most seniorcounterterrorism official were left in the dark[Article continues here httpwwwthedailybeastcomnewsweek20110904the-terrible-missed-chancehtml]

Pan Am Flight 103 - Lockerbie Bombing - al-Megrahi CIA FilesWebwire | 31 August2011

BACM ResearchPaperlessArchivescom has announced the publishing of CIA files related to the PanAm Flight 103 Lockerbie Bombing

The files can be downloaded at no cost at httpwwwpaperlessarchivescompanam103ciahtml The files date from 1984 to 1999 These are the most recent files on Pan Am 103 released by the

CIA This set of files is unique because it includes memos on the direct handling of an intelligencesource This type of information is exempt from the Freedom of Information Act (FOIA) and is not oftenreleased by the Agency

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2242

The files cover information received by the CIA on Abdel Basset al-Megrahi Al-Megrahi is theonly person ever convicted in the Pan AM 103 case The Scottish government in 2009 allowed al-Megrahi to be released from custody and returned to Libya because of his failing health With the recentfall of Muammar Qaddafis regime there have been renewed calls for al-Megrahi to be returned toScottish custody or extradited to the United States and put on trial[Complete article is available here httpwwwwebwirecomViewPressRelaspaId=144692]

Getting The Caucasus Emirate Right

CSIS | August 2011

ldquohellipThis report aims to set straight a rather distorted record It demonstrates the veracity of three vitallyimportant facts usually obfuscated in discussions of the subject (1) the longstanding and growing tiesbetween the CE and its predecessor organization the ChRI on the one hand and al Qaeda (AQ) and theglobal jihad on the other hand (2) the importance of the CE jihadi terrorist network as a united andorganized political and military force promoting jihad in the region and (3) the salience of local culturaland the Salifist jihadist theo-ideology and the influence of the global jihadi revolutionarymovementalliance as key if not the main factors drive the ldquoviolence in the North Caucasusrdquohelliprdquohttpcsisorgfilespublication110829_Hahn_GettingCaucasusEmirateRt_Webpdf

7 Things You Didnrsquot Know About the War on TerrorForeign Policy | By Eric Schmitt and Thomas Shanker 6 September 2011

From an attempt to negotiate with Osama bin Laden to a proposal to threaten to bomb Mecca its been awild decade for the US national security establishment

Our new book Counterstrike The Untold Story of Americas Secret Campaign Against Al Qaeda is in many ways asummary of the past decade of our reporting on the military intelligence community and domestic law enforcement as itentered a new era of Darwinian evolution to counter violent extremism

It also is our deep dive into a decade of American counterterrorism efforts -- from the work of commando trigger-pullers and spies on the ground up to senior political leaders who wanted to defendthe nation (and get re-elected) Our efforts to report and write this book allowed us to uncover many newmissions never discussed before -- and gave us an understanding of how the war on terror had changedover the last decade

Our book assesses the 10 years since 911 as the military divides the fight into tactical missionson the battlefields of modern terrorism then the operational advancements that provided the means tosuccess while not securing final victory and at the top the strategic level of policy debates about howthe nation should combat this threat to its security

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2342

Here are seven vignettes from Counterstrike that offer glimpses into the thinking of policymakers andcommanders in early days after the Sept 11 attacks and how that thinking evolved over the followingdecade into a more whole-of-government approach to combating terrorists

1 Bush Tried to Negotiate with al Qaeda

The George W Bush administration like all of its predecessors swore never to negotiate with terroristsBut it did undertake an extraordinary and extraordinarily secret outreach effort to open a line of communication with Osama bin Laden and al Qaedas senior leadership It was an attempt to replicatehow the United States tried to sustain a dialogue with the Soviet Union even during the darkest days of the Cold War when White House and Kremlin leaders described in private and in public a set of acceptable behaviors -- and described with equal clarity the swift vicious even nuclear punishment forgross violations

In the months after the Sept 11 attacks Bushs national security staff working through theintelligence agencies made several attempts to get a private message to bin Laden and his inner circleThe messages were sent through business associates of the bin Laden familys vast financial empire aswell as through some of the al Qaeda leaders closest relatives a number of whom were receptive toopening a secret dialogue to restrain and contain their terrorist kinsman whom they viewed as a blot on

their name (To be sure other relatives were openly hostile to the American entreaties)According to a senior American intelligence officer with first-hand knowledge of the effort the

response from Osama bin Laden was silence And the effort was suspended

2 Sometimes a Wedding Is Just a WeddingIn the early days after the Sept 11 attacks the CIA and FBI vied to produce the most compellingintelligence reports that tracked suspected terrorist plots The agencies often worked at cross purposessometimes unwittingly At one point in early 2002 both agencies were tracking what American analystssaid were growing preparations for a major wedding somewhere in the Midwest (In terroristvernacular the word wedding is often code for a major attack)

Dribs and drabs on this wedding planning made their way to President Bush from bothagencies independent of each other of course

Finally over the Easter holiday during a video-teleconference with top aides in Washingtonfrom his ranch in Crawford Texas Bush stopped the briefing exasperated by the discrepancies in therival agencies reporting about the suspected threat

George Bob get together and sort this out Bush told his CIA director George J Tenet andFBI director Robert S Mueller III

Bushs instincts were correct When the analysts finally untangled their clues it turned out thatthe ominous wedding really was just that the matrimony of a young man and a young woman fromtwo prominent Pakistani-American families There was no threat There was no plot

3 The Threat to Bomb MeccaAs fears of a second attack mounted following the 911 strikes US government planners franticallycast about for strategies to protect the country Even the most far-fetched ideas had a hearing howeverbriefly In one case some government planners proposed that if al Qaeda appeared ready to attack America again the United States should publicly threaten to bomb the city of Mecca in Saudi Arabiathe holiest site in all of Islam in retaliation Just nuts one Pentagon aide wrote to himself when heheard the proposal The idea was quickly and permanently shelved

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2442

4 The SEAL Raid in Iran That Didnt HappenWhen US forces routed the Taliban government in Afghanistan and forced bin Laden and his toplieutenants to flee many senior al Qaeda leaders including bin Laden and his deputy Ayman al-Zawahri escaped to neighboring Pakistan But a separate group including the al Qaeda leaders sonSaad bin Laden fled to northern Iran where American troops would not pursue them and the Iranianswould likely not detain them But the Shiite clerics running Iran placed the al Qaeda operatives and theirfamily members under virtual house arrest and they became a shield against possible attacks from theSunni-based terrorist organization

One plan in particular illustrated the bold thinking and wildly unrealistic aims of the militarysinitial approach after 911 to kill or capture terrorist leaders The plan called for hunting the eight to 10senior al Qaeda leaders and operatives who had sought refuge in Chalus an Iranian resort town on theCaspian Sea where they had been detained

At the Joint Special Operations Command at Fort Bragg NC military planners drew up optionsfor Navy SEALs to sneak ashore at night using state-of-the-art mini-submarines Once they landed theSEALs would slip past Iranian guards to snatch the al Qaeda leaders Another option called for SpecialOperations helicopters to spirit American commandos into the town and whisk them out again with theirquarry The Americans went as far as conducting two or three rehearsals at an undisclosed locationalong the US Gulf Coast in early 2002 They conducted small-boat insertion exercises involving about

30 Special Operations personnel most SEALs and eventually concluded the mission was feasible if they were provided with more detailed intelligence on the locations of the al Qaeda members and thesecurity around them

The logistics of the mission were daunting Chalus sits at the edge of the Elburz coastal mountainrange about 70 miles north of Tehran and the failed rescue of the American hostages in Iran in April1980 loomed large in commanders memories Eventually Gen Richard B Myers the chairman of theJoint Chiefs of Staff rejected the mission as too risky and too politically volatile Many of the al Qaedaoperatives are reportedly still there

5 Intelligence Hauls of Unusual Size

US intelligence and military commandos have carried out tens of thousands of raids in the decade since911 The amount of material seized from terrorist and insurgent targets has grown to a massive sizeThe Defense Intelligence Agency (DIA) operates exploitation triage centers and giant warehouses forstoring intelligence products -- in war zones rear headquarters in countries like Qatar and back in theUnited States One intelligence analyst said that walking into one of the warehouses for documents andmedia exploitation reminded him of the final scene in Raiders of the Lost Ark when the captured Ark of the Covenant is crated up and rolled into a cavernous storage area that contains all the governmentsother dangerous secrets

All told more than two million individual documents and electronic files have been cataloguedby media type hard copy phone number thumb drive Each is inspected by a linguist working with acommunications analyst or computer expert

The DIA analysts are joined by specialists from other agencies including the FBI and the DrugEnforcement Administration Yet given the overwhelming volume no more than about 10 percent of thecaptured intelligence has ever been analyzed

Intelligence officers say they simply are overwhelmed and untold quality leads may still beburied in the piles of computers digital files travel documents and pocket litter

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2542

6 The Digital Counterjihad Cyberspace is the terrorists ultimate safe haven Its where they recruit raise money and even plotattacks using coded language while playing online video war games The US government fights back

One technique is called false band replacement whereby the intelligence agencies infiltratemilitants networks and post their own material to counter extremist efforts on those same jihadistwebsites The trick is to forge the onscreen trademarks -- web watermarks -- of al Qaeda media sites

This makes messages posted on these sites official and sows dissent and confusion among themilitants

This Internet spoofing can be used in support of more traditional combat missions There is atleast one case confirmed by American officials in which a jihadist website was hacked by Americancyberwarriors to lure a high-value al Qaeda to a surreptitious meeting with extremist counterparts -- onlyto find a US military team in waiting

Getty images

7 First Kill the MullahsUS counterterrorism officials have learned fighting terrorists effectively means targeting specific nodesof that network that support and enable militants who strap on suicide vests This strategy focuses onneutralizing enablers such as the financiers gun-runners and logisticians Among these terror linchpins

are religious leaders who bless attacksHeavenly reward will not await a suicide bomber unless his death and those of his victims is

deemed halal in keeping with Islams sacred sharia law Each militant network has a sharia emir usuallyat the level of a sheikh or mullah In Iraq American commanders specifically killed emirs to throw awrench in a suicide bombing networks

Take him out and suicide bombings from that network are frozen until he is replaced said onemilitary officer with command experience in Iraq hellip[Complete article is available herehttpwwwforeignpolicycomarticles201109067_things_you_didn_t_know_about_the_war_on_terror]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2642

Dick Marty Rendition Report Condemns lsquoCult of Secrecyrsquo

BBC News | 8 September 2011

A report for Europes human rights watchdog has called for greater scrutiny of secret services andsupport for whistleblowers The Council of Europe investigated how countries like Britain GermanyRomania and Lithuania assisted the US with the rendition of terror suspects It said a cult of secrecyhad helped Western governments cover up abuses Defending whistleblowers it singled out USsoldier Bradley Manning accused of passing secrets to Wikileaks He had acted as a whistleblowerand should be treated as such CoE rapporteur Dick Marty wrote in the report which was due to besubmitted to the CoEs Parliamentary Assembly The soldier is currently in a US military prisonawaiting trial for passing restricted material to the controversial website

But the report praised Mr Manning and Wikileaks itself for uncovering evidence of renditionThe CoE represents 47 member-states including both EU countries and Russia and other ex-Sovietstates Mr Martys report focused on the record of Western states explaining that it was based oninvestigations into European links to the controversial US policy of rendition for terrorism suspectsThe CIA allegedly flew terror suspects around the world for interrogation in the years after 911 holdingthem in secret prisons in Europe and elsewhere

No licence to kill

In his 48-page report - entitled Abuse of State Secrecy and National Security - Mr Marty looked at thelevel of control exercised by European states over their security services He urged all states to useindependent parliamentary committees to oversee the work of their secret services saying this was of vital importance for the rule of law and democracy Mr Marty argued that Western governments wereusing the notion of state secrecy to shield their intelligence services from accountability for seriousviolations committed during anti-terrorist operations We consider that this is simply unacceptablehe wrote

A licence to kill (or to abduct and torture) only exists in certain films and in dictatorialregimes In democratic systems parliaments as representatives of the people have a right and duty toknow what the government is doing in the name of the people Mr Marty praised investigative journalists and non-governmental organisations for their work in exposing abuses of authority Stressing

the fundamental role whistleblowers had to play in an open society he warned against a real cult of secrecy as an instrument of power

While it was up to the courts to decide if Bradley Manning had committed any crime he wrotethe CoE was indebted to him for the publication of a recording of a helicopter attack in Iraq in whichthe crew seems to have intentionally targeted and killed civilians

Thanks to Mr Manning he said a large number of embassy reports had allowed us to learnsignificant details of important recent events which are obviously of general interest We therefore join Amnesty International in expressing our worries as to the treatment he receives Mr Marty wrote inthe draft report[Article continues here httpwwwbbccouknewsworld-europe-14820145]Comment This report demonstrates that Dick Marty is not as De Gaulle would say a serious man To

suggest that Bradley Manning is a hero and intelligence agencies bent on defeating terrorists arecriminals should say it all Manning knowingly violated his oath and willfully provided enormousamounts of classified material to WikiLeaks For Marty this is a good thing in the name of transparencyMarty always injudicious and anti-American in his remarks is now moving at warp speed into crackpotterritory

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2742

Al Qarsquoida amp its Affiliates| back to top |

Al Qaeda Is Down Not Out

Los Angeles Times | By Amy Zegart 7 September 2011

US talk of defeating terrorism is dangerously prematureTalk of strategically defeating Al Qaeda is all the rage in the White House these days Defense

Secretary Leon Panetta used the D-word in July President Obama declared in his new counter-terrorism strategy We can say with growing confidence that we have put Al Qaeda on the path todefeat Compared to the woeful state of the economy terrorism has become the administrations feel-good story of the year

Defeat is a big word It is also dangerously misleading Yes the United States has made greatstrides in the last decade to harden targets improve intelligence and degrade the capabilities of violentIslamist extremists Osama bin Ladens death was a major accomplishment But the fight is nowhereclose to being won and Americas most perilous times may lie ahead Three reasons explain why

The first is that strategically defeating Al Qaeda is not nearly as important as it sounds After911 Al Qaeda morphed into a more complicated decentralized and elusive threat consisting of threeelements core Al Qaeda affiliates or franchise groups operating in places like Yemen and Somalia with

loose ties to the core group and homegrown terrorists inspired by violent extremism often through theInternet in the comfort of their own living rooms

Core Al Qaedas capabilities started degrading in 2001 when the US invaded Afghanistandismantled training camps ousted the Taliban and sent Bin Laden running The CIA has estimated thecore group remaining in the AfghanistanPakistan region to number 50 to 100 fighters The last time BinLaden oversaw a successful operation was 2005 when Al Qaeda struck the London transit system

But plots by homegrowns and franchise groups have risen dramatically in recent years The 2009Ft Hood shooting the worst terrorist attack on US soil since 911 was the work of a homegrownterrorist The mastermind of the 2010 Times Square car bomb plot was a naturalized American citizentrained by the Pakistani Taliban not Al Qaeda Another franchise group Al Qaeda in the ArabianPeninsula was behind the foiled 2009 Christmas Day underwear bomber aviation plot and the 2010

plot to explode tampered printer cartridges aboard cargo planes The Bipartisan Policy Center reported11 violent Islamist extremist terrorist incidents against the US homeland in 2009 the most since 911Nearly all involved what former CIA Director Mike Hayden calls a witches brew of radicalizedAmericans and franchise groups

The second reason why talk of defeat is premature has to do with weapons Terrorism againstAmericans is nothing new The potential for terrorist groups to acquire weapons of mass destruction isIn 1995 a Japanese cult released sarin nerve gas in the Tokyo subway killing 12 people and injuringthousands It was the first WMD terrorist attack in modern history and it sparked a wave of presidentialterrorism commissions years before Bin Laden became a household name

It is this specter of the lone fanatic or small group armed with the worlds most devastatingweapons that keeps experts up at night In 2005 60 leading nuclear scientists and terrorism experts were

asked how many believed the odds of a nuclear attack on the US were negligible Only three or fourhands went up most were far more pessimistic Today there is enough nuclear material to build120000 weapons As long as fissile material is poorly stored and rogue states like Iran and North Koreacontinue their illicit weapons programs nuclear terrorism remains a haunting possibility

The third reason is that the FBI has not yet become a first-rate domestic intelligence agencyAnalysts whose work is vital to success are still second-class citizens labeled support staff alongsidesecretaries and janitors and passed over for key jobs including running the bureaus intelligence unitsThe FBIs information technology is so antiquated it belongs in a museum And the old crime-fighting

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2842

culture still lives There is now a move afoot to shrink new classified facilities so that agents dont haveto waste time away from their cases to read intelligence documents thereStrategically defeating Al Qaeda sounds too good to be true Because it is Amy Zegart is a senior fellow at Stanfords Hoover Institution and the author of Eyes on Spies

Congress and the United States Intelligence Community

US Counterterror Chief Al-Qaida On Steady Slide

Bostoncom | 31 August 2011

White House counterterrorism chief John Brennan said al-Qaida is on a steady slide after the death of al-Qaidas latest second-in-command in Pakistan Brennan told The Associated Press on Wednesdaythat its a huge blow in the first official White House comment since Atiyah Abd al-Rahmans reportedkilling by CIA drone strike in Pakistans tribal areas last week

Al-Qaida is sort of on the ropes and taking a lot of shots to the body and the head Brennansaid This is a time not to step back and let them recover a message he says hes sending to hiscounterparts in Pakistan[Article continues herehttpwwwbostoncomnewsnationwashingtonarticles20110831us_counterterror_chief_al_qaida_on_steady_slide ]

Al-Qaeda (AKA Al-Qaida Al-Qarsquoida)

Council on Foreign Relations | 29 August 2011

ldquoAl-Qaeda an international terrorist network is considered the top terrorist threat to the United StatesThe group is wanted for its September 11 2001 attacks on the World Trade Center and the Pentagon aswell as a host of lesser attacks To escape the post-911 US-led war in Afghanistan al-Qaedas centralleadership fled eastward into Pakistan securing a safe haven in loosely governed areas there In July2007 US intelligence agencies found that the organization was regrouping and regaining strength inthese tribal areas along the border with Afghanistan though targeted killings of senior al-Qaeda leadershave since diminished the groups command and control capabilities In February 2009 Director of National Intelligence Dennis C Blair told lawmakers that the groups core is less capable and effective

than it was a year ago The killing of al-Qaedas top leader Osama bin Laden by US forces in Pakistanin May 2011 served a significant blow to the organization but analysts say al-Qaeda remains deadlywith its networks spread all over the world Plus a number of affiliated groups have gained prominencein recent years complicating the task of containing the organizationrdquo

[Article continues here httpwwwcfrorgterrorist-organizationsal-qaeda-k-al-qaida-al-qaidap9126]

Al Qaeda In The Islamic Maghreb

CSIS | 1 September 2011

ldquoAl Qaeda in the Islamic Maghreb (AQIM) emerged from a decades-long militant Islamist tradition inAlgeria In 1998 the Salafist Group for Preaching and Combat (Groupe Salafiste pour la Preacutedication etle Combat or GSPC) broke away from the Armed Islamic Group (GIA) because of the GIArsquos extensive

targeting of civilians Gradually the GSPC evolved to encompass global jihadist ideology in addition toits historical focus on overturning the Algerian state In 2006 the GSPC officially affiliated with alQaeda core soon rebranding itself as al Qaeda in the Islamic Maghreb In the following years AQIMwas able to conduct a small number of large-scale attacks most notably its 2007 bombing of the UNheadquarters in Algiers In recent years counterterrorism pressure and weak governance have combinedto shift the center of AQIMrsquos presence to the Sahara-Sahel region AQIM continues to make its presenceknown through smuggling operations kidnappings and clashes with security forces in the desert In thecoming years general instability within the region could allow AQIM to further expand its influencerdquo[Complete article is available here httpcsisorgfilespublication110901_Thornberry_AQIM_WEBpdf ]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2942

AQ Strategy

The Assynt Report | 11 August 2011

Executive Summary Al-Qaedarsquos broad objectives remain unchanged in the wake of bin Ladenrsquos death There

are nonetheless growing questions over al-Qaedarsquos capability Longstanding paranoiaover the use of electronic communications is heightened by the ongoing US dronecampaign whilst attacks against the West have generally been disrupted at an early stage

The Pakistani Talibanrsquos attack on a Karachi naval base in May 2011 was a significantmilitary success and the first major act of revenge for bin Ladenrsquos killing Furtherattempts to avenge his loss are certain

All parts of al-Qaeda are working within a cohesive framework with the ultimate aim of restoring the Islamic Caliphate (Khilafa) The strategic plan to support this aim wasdrafted by 40 of al-Qaedarsquos brightest thinkers in Kandahar Afghanistan in November1999 This plan consists of four phases each seven years long leading to the dissolutionof corrupt regimes and the union of all newly-liberated states within the Khilafa

Apart from mounting strategic operations al-Qaedarsquos role is to be the inspiration for atruly global jihadist movement It seeks to achieve this through provision of trainingbeing a role model for others to follow extending acceptance and adoption of its tactics

particularly suicide bombings and professionalising jihadist media to build a commonbrand and message between hitherto separate groups

Between the late 1990s and 2003 the organisation was primarily devoted to classicinternational terrorism Most effort is now spent fighting insurgencies from North Africato South Asia The way in which this strategy helps to spread the struggle has been seenin North-West Africa where the initial development of al-Qaeda in the Islamic Maghrebwas in part fed by men returning from fighting with al-Qaeda in Iraq

Since mid-2009 al-Qaeda and its affiliates have increasingly encouraged jihadist-sympathisers resident in Western countries to engage in violence themselves withoutcentral direction or training making surveillance more difficult

One of the keys to awakening the spirit of jihad was the success in portraying the US and

its allies as Crusaders in the Muslim world Al-Qaedarsquos strategy essentially requires thatthis process be kept running until the forces of jihad have grown large enough to launchsuccessful liberation operations

Despite its successes in Afghanistan al-Qaedarsquos credibility has suffered both from its failure to landanother strategic blow on the West on the scale of 911 and also excessive Muslim casualties in someoperations Similarly al-Qaeda in Iraq was set back by its excessive sectarian zeal and local resentmentat the foreign fighter presence In turn this affected the movementrsquos funding from the Gulf

Analysis Sub-Saharan African Leaders Media Focus On Threats Prior to 911

OSC Feature | Sub-Sahara Africa -- OSC Analysis 6 September 2011Statements by Sub-Saharan African leaders and African media reports on terrorism prior to the 10thanniversary of 911 focus on the growing threats from local extremists and Al-Qaida affiliatesparticularly in West Africa with little direct commentary on the anniversary or US counterterrorismpolicies This focus on domestic threats suggests that counterterrorism messages expressing solidaritywith African nations and acknowledging the evolving terrorist threat on the continent would have thegreatest resonance with African audiences

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3042

Leaders Stressing Determination To Counter Local Threats African leaders public statements reflect an ongoing concern about the threat of terrorism on thecontinent and a strong commitment to find ways to combat this threat

Nigerian President Goodluck Jonathan emphasized the governments commitment tovigorously combat terrorism following the 26 August bombing of the UN office inAbuja by Nigerian extremist group Boko Haram reported the Paris-based news agencyAFP President Jonathan is hosting Liberian President Ellen Johnson Sirleaf and otherforeign dignitaries for a three-day forum on terrorism and economic crimes the widelyread Lagos-based independent daily The Guardian reported on 4 September

Malian President Amadou Toumani Toure launched a Special Program for PeaceSecurity and Development on 9 August stating that development remained the mostviable solution to counter threats to the countrys stability reported Malis state-owneddaily LEssor[ 3] The program aimed to undermine support for Al-Qaida in the IslamicMaghreb (AQIM) according to Burkinabe web portal Lefasonet on 11 August

Somali Prime Minister Abdiweli Muhammad Gas stated on 23 August that theTransitional Federal Government planned to remove Al-Shabaab from the central andsouthern regions in Somalia with the goal of restoring peace within one year so the

country can hold national elections according to the Puntland-based Garowe Online

Experts Media Highlight New Capabilities Tactics

African experts and media outlets are warning about the evolving nature of terrorist organizations on thecontinent the terrorists pursuit of new targets and tactics and their potential for taking advantage of regional instability

Leading South African think tank the Institute for Security Studies stated on 29 Augustthat Boko Harams attack on the UN in Abuja completes Boko Harams metamorphosisinto an international terrorist group Since December 2010 Boko Haram had killed over600 people in over 70 attacks against Nigerian targets according to the think tank buthad not previously targeted Western or international interests

A 26 August article on the popular Malian web portal Maliweb voiced concern thatAQIM could benefit from Tuareg mercenaries many of whom were recently returningfrom fighting in Libya and could benefit from an increase in arms trafficking through theSahel during the Libyan conflict

Ugandas privately owned Daily Monitor reported on 19 August that AU forces inSomalia warned that Al-Shabaab planned to increase the number of kidnappings andbomb attacks as part of its new strategy to shift from controlling territory in Mogadishuto conducting more of an insurgent campaign

Concern Over Al-Qaida Presence Terrorist Collaboration

West African official statements and media reports reflect a growing concern over an increased Al-

Qaida presence in West Africa and collaboration with AQIM Al-Shabaab and Boko Haram

Nigerian security services reported that the suspected mastermind behind the 26 Augustbombing of the UN office in Abuja was a Boko Haram member with close links to Al-Qaida and Al-Shabaab according Nigerias privately owned Daily Sun

A 28 August report in the privately owned daily Nigerian Tribune claimed that the 26August bombing in Abuja was part of Al-Qaidas plans to mark the 10th anniversary of 911 and called Boko Haram Al-Qaidas ally in the region

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3142

An 8 August commentary in Burkina Fasos LObservateur Paalga said that reports of Boko Haram collaboration with Al-Shabaab and AQIM could indicate that Al-Qaida isextending its African tentacles Abdourahmane Dieng security division chief of theEconomic Community of West African States said the collaboration represented a veryserious threat according to Senegals progovernment Le Soleil on 5 August

Messages Likely To Resonate With African Audience

Sub-Saharan Africas increasing concern about the shifting nature and potential strengthening of theterrorist threat on the continent suggests that messages directly addressing the impact of terrorism onAfricans the increasingly complex nature of the threat and the need for multilateral cooperation againstterrorism are most likely to resonate with Africans

Messages expressing solidarity and sympathy for Africans affected by Boko Haram Al-Shabaab and AQIM would almost certainly resonate with a broad African audience

African political and military leaders would probably welcome acknowledgement of thecomplex and changing nature of terrorism on the continent and recognition of theirinitiatives and commitment to countering violent extremism

African leaders and medias concern about potential collaboration between Boko Haram

Al-Shabaab and AQIM suggest that they would be open to improving multilateral andcross-regional sharing of lessons learned and strategies to counter the intensification of terrorism within Africa

Aviation and Maritime Security| back to top |

Bomb Threats Force Jets To Land

Associated Press | 7 September 2011

Both landed safely one landed in Ankara Ataturk International Airport and the other at Kuala LumpurTwo flights operated by Pakistans state-owned airline received bombs threats on Wednesday

and both landed safely one in Turkey the other in Malaysia officials said No bombs were found The

first flight was headed for Manchester England when it was notified of the threat near the Bulgariancapital of Sofia The crew contacted the control tower in Istanbul to seek permission for the landingstate-run Anatolia news agency reported Authorities quickly evacuated all 378 passengers from theBoeing 777-300ER aircraft after it parked at a remote corner of the International Ataturk Airport andbomb squads began searching the plane with sniffer dogs Anatolia reported PIA spokesman MashoodTajwar confirmed the flight received a threat and landed All passengers were safe A police searchturned up no bomb officials said Later a second PIA flight from Islamabad to Kuala Lumpur alsoreceived a bomb threat It landed in Kuala Lumpur and all the passengers disembarked safely saidTajwar The UK-bound Pakistan International Airlines plane was forced to make an emergency landingat Ataturk Airport in Istanbul after receiving a bomb threat Malaysias airports authority said thepassengers were being screened and the plane was isolated in a parking area while being searched bypolice No bomb was found

It said the plane carried 164 passengers and 13 crew Azmi Murad senior general manager forthe authority said the Pakistani airline informed it that the warning came by email Mr Tajwar gave nodetails on the nature of the threat or how it was delivered Pakistan is home to al Qaedas top leadershipMilitants who trained there have been responsible for many of the attacks and failed plots in the USand Europe since Sept 11 2001 when planes hijacked by al Qaeda militants destroyed the World TradeCenter in New York and crashed into the Pentagon The bomb threats came four days before the 10thanniversary of 911 but there was no apparent link to Islamist militants who typically do not alertauthorities in advance The FBI and Homeland Security department issued warnings last weekend aboutal Qaeda threats to small airlines

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3242

Commentary amp Opinion| back to top |

From Terror Group Founder To Libyan Rebel Military Commander

ABCNews | 29August 2011

The same man who triumphantly led Libyan rebels into Gadhafis compound last week first came to theattention of the US intelligence community years ago - as a founder of a terror group

Abdelhakim Belhaj who was recently appointed to Tripolis rebel military council was one of the original founders of the Libyan Islamic Fighting Group an anti-Gadhafi group which was laterdesignated by the US State Department as a terrorist organization with links to al Qaeda according toUS government reports

We proudly announce the liberation of Libya and that Libya has become free and that the ruleof the tyrant and the era of oppression is behind us a victorious Belhaj told reporters after the stormingof Gadhafis Bab al-Aziziya compound last week Ousting Gadhafi had been the main objective of theLIFG since its inception in the early 1990s even if some of the fighters believed that meant puttingAmericans in the crossfire

The group carried out operations against the Libyan government including at least four suspectedassassination attempts against Gadhafi in the 1990s and was also believed to be connected to a series of suicide bombings in Casablanca Morocco in 2003 the US State Department reported As relationsbetween the US and Gadhafi improved in the mid-2000s some LIFG leaders cultivated relationshipswith top al Qaeda leaders including Osama bin Laden and were suspected of funneling fighters to Iraq tocarry out operations against US soldiers

When the LIFG was designated a terror organization in 2004 it was meant as a gesture of solidarity with the Libyan government according to a March 2011 congressional report

Contrary to several US government reports Libyan rebel ambassador to the US Ali Aujalitold ABC News that the LIFG was never connected to al Qaeda and did not carry out terrorist operations

They were only opposed to Gadhafi during his rule and paid the price for that by beingoppressed by the regime Aujali said

The CIA first publicly voiced its concerns about the connection between the LIFG and al Qaedain 2004 when then-director George Tenet testified before the Senate Select Committee on Intelligenceand listed the LIFG among groups that represented an immediate threat [that] has benefited from alQaeda links[Article continues here httpabcnewsgocomBlotterterror-group-founder-libyan-rebel-military-commanderstoryid=14405319]

Interview With Saudi Sheik Wajdi Al-Ghazawi

MemriTVcom

Sheik Wajdi al-Ghazawi owner of al-Fajr TV criticizes extremist atmosphere in Saudi Arabia and saysafter 911 They Handed Out Sweets on the Streets of Mecca

Following are excerpts from a statement by Saudi Sheik Wajdi Al-Ghazawi owner of Al-FajrTV which was posted on YouTube on August 4 2011

Wajdi Al-Ghazawi When Al-Qaeda and Osama Bin Laden were at the height of their mightthey were extremely popular in Saudi Arabia From mosque pulpits across Saudi Arabia preacherswould pray for their success Moreover from the pulpits of the most important mosques ndash the Al-HaramMosque in Mecca and the Nabawi Mosque in Al-Madina ndash direct prayers for the success of Al-Qaedawere made during the days of the bombing of Tora Bora Oh Allah help our brothers in AfghanistanThese supplications were made during evening prayers as well as Friday prayers The preachers wouldpray for them in violation of the ministrys instructions

When the twin towers in New York were attacked they handed out sweets on the streets of Mecca By Allah they did I witnessed this myself The young people bowed in prayer and hugged one

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3342

another out of joy People were in heaven because of these young men who destroyed America andbombed this idol Am I right or not Was it like that or not

Back then when the Taliban broke off a piece of the nose of the Buddha statue which was hewnin the mountain an entire sermon was dedicated to it in the mosque in Mecca and the preacher was laterreprimanded for this sermon The entire Saudi people supported and loved Al-Qaeda

This went on until our brothers in Al-Qaeda ndash and I dont know what was going through theirminds ndash began to carry out operations inside Saudi Arabia Thats when we all raised our hands andsaid Youve gone too far We wont support you in this

The atmosphere here in Saudi Arabia is one of extremism It is characterized by focusing onminor details Many things are forbidden Yes maybe they are indeed forbidden but by forcing peopleto avoid them and by acting as if these were major sins an atmosphere was created that gave rise toextremist youth who might act recklessly at the most trivial provocation

For instance we blew out of proportion the issue of music the issue of smoking or the issue of hanging pictures in public places True there are clear texts on these issues but the young peopleembraced these issues as if they were fighting usury fornication or alcohol No these are not among theseven major sins So our society has become extreme

This extremist atmosphere has given rise to people who accuse others of heresy and people whopurport to be waging Jihad It has created genes that gave rise to cells of Al-Qaeda and other terrorists

We must examine our breeding ground in which these young men were sownBy Allah what can possibly emerge from such an atmosphere Muftis who accuse others of

heresy sheiks who incite and young people who bomb Am I right or not[Complete clip is available here httpwwwmemritvorgclipen3099htm]

Legal Aspects amp Lawfare| back to top |

Revisiting A Stale Counterterrorism Law

Council on Foreign Relations | 1 September 2011

ldquoNearly a decade after 911 the United States still relies on the 2001 Authorization for the Use of Military Force (AUMF) for the killing and detention of those considered responsible for or associatedwith the terrorist attacks But CFR national security law expert John Bellinger says it is becomingincreasingly difficult for the Obama administration to justify some of its counterterrorism operationsunder this limited statutory authority It has been used in defense of actions including drone attacks onindividuals as well as the targeting of groups in Yemen and Somalia that may have only the mosttenuous affiliation or association to the 911 attack A revised AUMF should clarify those operations aswell as the issue of detention specifically which individuals can be detained for how long and subjectto what processes There also needs to be greater effort at the international level he adds to fill thegaps in the law that covers conflicts between states and non-state actorsrdquohelliprdquo[Complete article is available here httpwwwcfrorgcounterterrorismrevisiting-stale-

counterterrorism-lawp25742]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3442

Narco-Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector[Complete article is available here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Mexicos Cartels Move Into Extortion

At a construction site of an apartment building in the heart of the Mexican capital a company engineerruns through his weekly payroll sheet He has salaries written out for carpenters bricklayers andelectricians At the bottom of the sheet is a notation of $200 for ldquosecurity servicesrdquo next to a nicknameldquoEl Indiordquo mdash the Indian [Complete article is available here

httpwwwtucsonsentinelcomnationworldreport090611_mexico_cartels_bribesmexicos-cartels-move-into-extortion ]

Seven Die In Mexican Pacific Port City

Latin American Herald Tribune

Seven people died in separate shootings in Mazatlan a port city in the northwestern Mexican state of Sinaloa with some of the incidents drug-related a police spokesman told Efe [Complete article is available herehttpwwwlahtcomarticleaspCategoryId=14091ampArticleId=423061]

Tijuana Violence Slows As One Cartel Takes Control

BorderlandBeatcom

Mexicos famously seedy border city of Tijuana is enjoying a lull in drug murders as the countrys mostpowerful cartel gains the upper hand over its rivals [Complete article is available here httpwwwborderlandbeatcom201109tijuana-violence-slows-as-one-cartelhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3542

Network Notes| back to top |

Canadian data foreign threats Spying in the digital age (Suggested by a reader in Lithuania ndash thanks) Globe and Mail | By Colin Freeze 31 July 2010

A government spy agency thatrsquos prohibited from monitoring Canadian citizens is now usingldquoinformation about Canadiansrdquo to zero in on foreign threatsThe ambiguous statement found in a new government report detailing the activities of CommunicationsSecurity Establishment Canada could sanction a range of intelligence-gathering activities ndash includingthe controversial practice of mining ldquometadatardquo from digital communications

Metadata ndash often called data about data ndash are found in e-mails and their attachments and containdigital signatures that can reveal when where and by whom documents were created

The collection of metadata has caused controversy in other countries but never in Canada wherethe Communications Security Establishment Canada operates as an ultra-secretive agency About theonly thing that is known about the classified practices is that they were halted and resumed after someldquomajor changesrdquo including directives signed by Defence Minister Peter MacKay

ldquoI cannot comment on specific operational activitiesrdquo Adrian Simpson a CSEC spokesman toldThe Globe He stressed that reviews upheld that the activities in question were ldquocarried out inaccordance with the law ministerial requirements and CSECrsquos policies and proceduresrdquo

ldquoCSEC is prohibited from directing its activities at Canadians anyone in Canada or Canadiansanywhere in the worldrdquo he said

For decades signals-intelligence agencies in the West have been allowed to safeguard nationalsecurity by eavesdropping on foreignersrsquo conversations Spies can whatever phone lines and satellitesignals they can so long as they never listen in on fellow citizens

But in the digital age governments run increasingly sophisticated dragnets scooping up andscouring through millions of intercepted Internet conversations daily Such practices create legalambiguities

ldquoThe whole issue of what constitutes boundaries for signals-intelligence agencies in cyberspaceis a big debate right nowrdquo said Rafal Rohozinski a security expert affiliated with the University of Torontorsquos Munk School

A watchdog agency that reviews the CSECrsquos activities released an annual report to Parliament onJuly 20 ldquoWhen other means have been exhausted CSEC may use information about Canadians when it

has reasonable grounds to believe that using this information may assist in identifying and obtainingforeign intelligencerdquo it reads

Sometimes collecting metadata is relatively benign It can involve aggregating sets of data tospot trends much like the way meteorologists discern national forecasts from localized information

For example while CSEC canrsquot usually monitor the communications of specific Canadian terrorsuspects it can glean insights by zooming out for big-picture patterns One way to do that MrRohozinski said would be to look at data flows between Canadian cities and Yemen where an Internet-savvy al-Qaeda offshoot works to recruit Westerners

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3642

Metadata however can be more revealing Documents that circulate on the Internet travelaround like postmarked letters marked with return addresses ndash e-mails and attachments have embeddedcodes that speak to the who where and when behind their creation

The US National Security Agency found itself mired in controversy a few years go after itskirted domestic-spying bans by secretly upholding that this sort of American metadata was fair gamedistinct from communication contents

Therersquos little to suggest the CSEC would go that far The federal agencyrsquos activities are reviewedby a watchdog body now headed by a former Federal Court of Appeal judge Robert Deacutecary appointedlast year wrote in his annual report that he was satisfied the CSEC activities in question are lawful evenif his predecessors felt them borderline

ldquoThis was the first review of these activities since hellip their resumption under new policiesrdquo thewatchdogrsquos report says It concludes that the surveillance activities are ldquoin accordance with the lawrdquo andfollow ldquomajor changes to certain policies procedures and practicesrdquo

Much of the concern arises from the possibility that CSEC could hand over metadata intelligenceto domestic law-enforcement and security agencies

As it stands the RCMP and CSIS have to develop their domestic investigations before coming toCSEC ndash usually with warrants ndash if they want specific intelligence The rules guiding handovers are strictbecause even though all agencies run surveillance operations they do so under vastly different

mandates and legal standardsThe spy agency however stood by its practicesldquoCSEC is extremely diligent when it comes to the privacy of Canadiansrdquo Mr Simpson said

[complete article is available here httpwwwtheglobeandmailcomnewsnationalcanadian-data-foreign-threats-spying-in-the-digital-agearticle2113772 ]

Cyber Attacks Against NATO Then And Now

New Atlanticist | 6 September 2011

ldquoNow that NATOrsquos Operation UNIFIED PROTECTOR over Libya is winding down it is worth

noting how few cyber incidents were directed in protest against the Alliance Certainly there was a

cyber component to the liberation of Libya but it was more about content and Internet freedom (the

most newsworthy elements here were the role of social media and the Libyan government taking largeparts of the nation offline) But compared to past history NATO cyber defenders had a relatively easy

time

ldquoNATO has not however had an easy 2011 Although there were three significant incidents we

know about none seemed to have been in direct response to operations over Libyahelliprdquo

[Complete article is available here httpwwwacusorgnew_atlanticistcyber-attacks-against-nato-then-

and-now]

The Calm Before The Storm

Foreign Policy | By Joel Brenner 6 September 2011

Cyberwar is already happening -- and its about to get much much worse A veteran cyberwarriorexplains how America can prepare itself

Revelations of wholesale electronic fraud and massive data heists have become weekly evendaily affairs A multinational electronics corporation loses personal information on more than 100million customers Cyberthieves break into an international bank counterfeit credit balances and lootATMs in four countries grabbing $9 million in just a few hours International gangs spread maliciouscode that conscripts unwitting computers into zombie armies of hundreds of thousands of similarlyenslaved machines Criminals then rent these armies called botnets as easily as you can buy a time-sharing arrangement in a beach condo No wonder the vast majority of Internet traffic is spam

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3742

Yet the loss of personal information and related criminal fraud intolerable as they are are theleast threatening face of electronic insecurity The US militarys secret network is penetratedAmericans corporate pockets are being picked clean of the intellectual property that makes the UnitedStates tick And the electricity grid that keeps the lights on and makes everything move is dangerouslyinsecure

In one remote attack on the Pentagons information systems about 10 years ago the Chinesehauled away up to 20 terabytes of information If the information had been on paper theyd have neededa line of moving vans stretching from the Pentagon to freighters docked 50 miles away in Baltimoreharbor just to haul it away Had they done so the military district of Washington wouldve become anactive theater of operations for the first time since 1865 and the Navy wouldve blockaded theChesapeake Bay But the Chinese did it electronically so who noticed

Corporate espionage by both competitors and foreign intelligence services or their surrogates isalso increasing Intelligence officials see this but cant speak openly about the specifics and Im seeingit now in my law practice The victims rarely admit it for understandable reasons Oracle whichsuccessfully sued SAP for theft of its software code was a prominent exception Google was another

When the Chinese penetrated Google in late 2009 -- yes that operation was Chinese and yes itwas done with the blessing of a member of the Politburo -- they werent after customer informationThey were after the source code that makes Google unique Nor was Google the only victim Thousands

of US and Western firms were penetrated in that affair Foreign governments -- and not only theChinese -- understand that they cannot compete with the United States militarily and politically if theycannot compete with it economically so their intelligence services want to steal its corporate intellectualproperty This is the technology that gives America its competitive edge and often it has nothing to dowith defense Ordinary companies with valuable technology are now being targeted by nation-statesThis is a new era National security and economic security have converged

The danger is not limited to the loss of technology and information however The owners andoperators of the North American electricity grid are hooking up their control systems to the Internet asfast as they can Exposing the grid to the Internet makes it marginally more efficient but it also makes itdramatically more vulnerable to disruption If you can remotely penetrate an electronic system to stealinformation you can remotely penetrate it to shut it down or make it go haywire This is why there is no

longer a meaningful difference between information security and operational security And the biggestoperational risk is the grid In contemporary society nothing moves without electricity If the grid goesout the country stops

As the Stuxnet affair demonstrated remotely engineered disruption of industrial control systemsis now a reality That episode involved the successful electronic attack on the centrifuges in the Iraniannuclear program Only a first-class intelligence agency could have pulled that off but the blueprint fordoing it -- the code itself -- is now public Many American industrial control systems run on the samekind of equipment the Iranians were using but unlike the controls on the Iranian centrifuges thecontrols on the US grid are now being connected to the Internet making them easier to disrupt Stuxnetwas a watershed there will be copycats

Other industrial control systems will also be targets Some already are Air traffic control

railroad switches and water and sewage systems are all electronically controlled now and many arevulnerable If an intruder can break into the right server electronically he can remotely shut downproduction send your goods to the wrong destination and even unlock your doors -- and delete your logentries so he leaves no record of ever having been there

The United States does not lack enemies who would attack it this way Seized al Qaedacomputers contain details of US industrial control systems In 2003 a group affiliated with thePakistani terrorist organization Lashkar-e-Taiba -- the same gang that engineered the 2008 terroristassaults in Mumbai -- plotted to attack the Australian grid Other groups conspired to attack the Britishgrid in 2004 2006 and 2009 Yet the owners and operators of the North American grid continue willy-

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3842

nilly to expose their control systems to the Internet instead of isolating and hardening it This is folly of a high order

Important conclusions for public and corporate policy follow from this vulnerable state of

affairs First cyber insecurity has operational consequences In the current and foreseeable states of technology a high degree of assurance against electronic penetration of anything connected to theInternet is not achievable Large efficient electronically connected organizations and nations aretherefore vulnerable to remotely engineered disruption as well as information theft

Second this risk cannot be eliminated -- but it can be reduced and managed As a nation theUnited States should start by isolating the grids controls from the Internet Undoubtedly there aremarginal efficiencies to be gained by seamless connectivity over a publicly accessible infrastructure butthese gains are usually exaggerated and the risk this connectivity creates is staggering The governmentand the major telecommunications carriers must also make the investment required to re-create themassive redundancies that made the wired telephone network so robust Resilience and swift recoveryshould be the goal If the consequences of cyberattacks were reduced penetration would cease to matter

Third companies that wait for the government to solve their own security problems do so attheir peril The government is broke and the IT backbone is 85 percent private so the governmentdoesnt control it The governments role in altering the status quo will be limited to setting standardsusing its purchasing power to move vendors toward better security and getting its own house in order

The government can neither secure corporate intellectual property nor protect firms against operationaldisruption

Fourth in a world in which everything cannot be protected companies must determine forthemselves what intellectual property and physical assets to isolate and safeguard Those that approachthis task seriously will quickly learn that technology is only one aspect of their insecurity and in manycases the easiest to deal with Unless technology is integrated with personnel practices and operationalsecurity it opens vulnerabilities that its users rarely understand This kind of integration requires theautomated enforcement of reasonable security policies and systematic workforce training and thatoccurs only when management the lawyers and the technologists work closely together This is an old-fashioned management challenge -- not a technological one For their part corporate boards need to takeIT security seriously and launch audits that examine how their systems are actually implemented and

used not merely how they are designed Because as the techies like to put it the weakest link in anysystem is not the silicon-based unit on the desk its the carbon-based unit in the chair Joel Brenner is author of the forthcoming America the Vulnerable Inside the New Threat Matrix of

Digital Espionage Crime and Warfare He has served as the inspector general of the National Security

Agency the national counterintelligence executive and the NSAs senior counsel He now practices law

at Cooley LLP in Washington DC

Cyberattacks Decline Slightly Symantec Report Finds

Dark Reading | 1 September 2011

Organizations worldwide are suffering damages as a result of cyberattacks but interestingly there hasbeen a slight decline in these attacks during the past 12 months according to a new report from

Symantec More than 90 percent of the more than 3300 respondents across 36 countries said theyexperienced tangible losses as a result of a hack with 84 percent reporting financial loss to the cost of abreach Around one-fifth lost at least $195000 in breaches during the past 12 months

Meanwhile Symantec attributes the unexpected bright spot of a decline in breaches toorganizations employing better cybersecurity defenses More than 70 percent of organizations sawattacks in the past 12 months a decline of 5 percent from 2010 And those that experienced anincreasing frequency of attacks dropped from 29 percent in 2010 to 21 percent this year While 100percent last year reported losses from cyberattacks 92 percent did so in 2011 The trend seemscounterintuitive given the rash of high-profile breaches this year More

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 13: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1342

Iran

| back to top |

Two Arrested Al-Qaidah Members Iraqi Three Iranian - Iran Official

ISNA website | Tehran in Persian 7 September 2011

The public prosecutor of Irans Kerman Province Yadollah Movahhed has announced the start of aninvestigation into the case of five people arrested on charges of having links to Al-Qaidah the IranianStudents News Agency (ISNA) reported on 7 September Two of the detainees - arrested on 19 August -are Iraqis and the other three are Iranian nationals Movahhed told ISNA in an interview on 7 SeptemberThe prosecutor said the detained people are accused of carrying illegal arms and munitions and addedthat an investigation is ongoing into the possibility that they were members of a larger group

Israel

| back to top |

Israel Uncovers Planned Hamas Bombing Spree On Israelis

Xinhua | 8 September 2011

Hamas cells operating in the West Bank routed between May and AugustThe Israeli security agency Shin Bet has broken a network of Hamas cells operating in the West Bank and planning a series of attacks against Israeli targets local media reported Wednesday Dozens of

Hamas members comprising 13 militant cells were arrested throughout the West Bank between May andAugust Army Radio reported One of the groups has carried out a bombing attack at the entrance toJerusalem in March in which a British woman was killed and several dozen civilians wounded Anothercell had planned to dispatch a suicide bomber to Jerusalems Pisgat Zeev neighborhood on Aug 21 Theattack was thwarted at the last minute by Shin Bet agents assisted by the Israel Defense Forces (IDF)and police according to Army radio Other groups were in various stages of planning and preparingattacks including bombings and the kidnapping of civilians or soldiers for the release of Palestinians jailed in Israel The Shin Bet concluded based on its interrogations of the group members that theHamas military leadership in Gaza and abroad is exerting considerable efforts to rehabilitate itspresence in the West Bank with financing and weapon smuggling The West Bank has remainedrelatively quiet in recent years Israeli officials attributed the success in preventing violence in the area

to the cooperation between the IDF and the Palestinian National Authoritys security forces

Israeli Air Strike Kills One Gaza Militant

Xinhua | 8 September 2011

Strike follows more rocket launches from Gaza warnings of new battlesAn Israeli air strike killed an Islamic Jihad militant and wounded three others in the central Gaza

Strip town of Dier a-Balah witnesses and medical sources said Local witnesses said the militant diedafter his car was hit by a missile adding that three other people were also wounded The condition of theinjured is stable hospital sources said Earlier Wednesday an Israeli military spokesperson said a rocketwas launched from the Gaza Strip into south Israel adding the projectile landed in an open area and didnot cause injuries or damage None of the Palestinian armed factions has claimed responsibility for the

rocket attack Late on Tuesday a Palestinian militant was killed and two others injured when Israeliwarplanes targeted a group of gunmen east of Khanyounis City south of the Hamas-ruled Gaza Strip

The Gaza Strip witnessed an escalation of bloody violence between Israel and Gaza militantgroups in August leaving 26 Palestinians and three Israelis killed The violence was triggered after eightIsraelis were killed in well-coordinated operation in the Red Sea city of Eilat Israel accused Palestinianmilitants of plotting and carrying out the attack which started from the bordering Sinai Peninsula inEgypt

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1442

Libya

| back to top |

Libyan Extremist Britain Allowed To Stay Was Link To Al-Qaeda In Iran Papers Show

The Daily Telegraph | (London) By Richard Spencer Tripoli

The extremist Ismail Kamoka spent several years sending funds to terrorist groups across the Middle East

An Alleged Libyan extremist who sought political asylum in Britain regularly travelled to Iran from2002 to provide forged documents to extremists linked to al-Qaeda secret files found in a Tripoliintelligence service building have disclosed

The documents seen by The Daily Telegraph unearth British intelligence suspicions about linksbetween Iran and al-Qaeda dating back almost a decade Other details to come out of the documentssent by MI6 and found in the office of the former head of foreign intelligence and later foreign ministerMoussa Koussa who defected in March include the revelation that Britain had begun co-operating withthe Chinese security services on Islamic extremists The extent of Iranian co-operation with al-Qaedahas been disputed in intelligence communities though Iranians are thought to have provided weaponsand explosives to the Taliban in Afghanistan

A number of al-Qaeda operatives including members of the family of Osama bin Laden fled toTehran after the fall of the Taliban in Afghanistan and their precise status in Iran has been unclear Thepapers in Libya do not directly challenge the Iranian government but suggest that al-Qaeda operativeshad more freedom of movement there than previously thought The extremist Ismail Kamoka spent

several years sending funds to terrorist groups across the Middle East including some linked to al-Qaeda the files said Mr Kamoka who had been given indefinite leave to remain in Britain afterarriving from Saudi Arabia in 1994 and claiming asylum travelled from the UK to Iran viaSwitzerland in July 2002 according to one document[Article continues herehttpwwwtelegraphcouknewsworldnewsafricaandindianoceanlibya8740771Libyan-extremist-Britain-allowed-to-stay-was-link-to-al-Qaeda-in-Iran-papers-showhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1542

Nigeria

| back to top |

Bomb Explodes In Violence-Torn Nigerian City Residents

AFP | 6 September 2011

A bomb went off Tuesday in Nigerias northeastern city of Maiduguri disrupting a three-week lull inbombings in the violence-torn city local residents said [Article continues here httpnewsyahoocombomb-explodes-violence-torn-nigerian-city-residents-215718081html]

Pakistan

| back to top |

Pakistan Bans Foreign Travel For Those Involved In Bin-Ladin Probe

The News website | Islamabad in English 7 September 2011

A Pakistani commission investigating the circumstances surrounding the killing of Al-Qaidah chief Usamah Bin-Ladin has banned foreign travel for everyone involved in the probe Pakistani daily TheNews part of the Jang group which owns Geo TV reported on 7 September The paper recalled that thecommission had already directed the countrys interior ministry and the intelligence service ISI toensure that the Bin-Ladin family was not repatriated from Pakistan without the consent of the

commission

More Than 20 Killed In Two Suicide Blasts In Pakistans Quetta

Express247 TV | Lahore in English 5 September 2011

At least 22 people were killed and several others injured in two explosions in the south-westernPakistani city of Quetta on 7 September the website of the Dubai-based private Pakistani TV channelARY News reported According to the channel one blast went off near the residence of the FrontierConstabulary and another one near the commissioner office in Quetta According to the report around100 kilograms of explosives were used in each attack (ARY News website Dubai in English 07 Sep 11)

Private Pakistani English-language TV channel Express 247 carried a series of onscreen scrollswhich said police had confirmed that the two blasts were suicide attacks The report cited police sources

as saying that 25 people were killed and more than 40 injured in the attacks (Express247 TV Lahorein English 0654GMT 07 Sep 11)

BBCM notes that the attacks came after the Pakistani intelligence agency said on 5 August that ithad arrested Al-Qaidah commander Younis Al-Mauritani and two of his accomplices in Quetta

Taleban Say Quetta Blasts Revenge For Recent Al-Qaidah Arrests

AFP | 7 September 2011

The Pakistani Taleban have claimed responsibility for the twin suicide bombs in Quetta on 7 Septembersaying they were carried out to avenge the recent arrests of Al-Qadiah operatives in the city Wecarried out the attacks Taleban spokesman Ehsanullah Ehsan told AFP in a phone call from anundisclosed location

Twin Suicide Bombings In Pakistan Leave 23 Dead

Miami Herald

Twin suicide bombers attacked the home of a senior military officer Wednesday in the western city of Quetta injuring him and killing at least 23 people officials said in a possible revenge attack forPakistans recent arrest of a senior al Qaida commander [Article continues here httpwwwmiamiheraldcom201109072394264twin-suicide-bombings-in-pakistanhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1642

Philippines

| back to top |

Moro Splinter Group Threatens US Soldiers In Philippines But Capabilities Limited

Government-Rebel Negotiations Remain Difficult

Assynt | SEAsia Vol VIII No17 7 September 2011

Ameril Umbra Kato a former senior Moro Islamic Liberation Front (MILF) field commander whoresigned late last year because he rejects peace negotiations has threatened to attack US troops as wellas Filipino security forces and other Government targets US and Filipino troops are currentlyundertaking joint training exercises This is an annual event but the first time they have been conductedin central Mindanao However Katorsquos splinter group the Bangsamoro Islamic Freedom Fighters (BIFF)is believed to have as few as 200 members with generally unsophisticated weapons ConsequentlyBIFFrsquos ability to conduct an attack on US forces is likely to be limited

In this period Kato announced the creation of a political wing to his grouping the BangsamoroIslamic Freedom Movement emphasising his split with MILF Nevertheless he has not been expelledfrom MILF and so is protected by the current ceasefire with Manila though MILF has stronglycondemned Katorsquos threat against US troops It is possible that MILF leadership is content to allow himto operate relatively unimpeded in order to gain greater leverage in its negotiations with theGovernment since they can contrast their more compromising approach with BIFFrsquos threatened

violence Meanwhile negotiations between MILF and the Government continue MILF dismissed theGovernmentrsquos latest proposal for an autonomous region but both sides appear committed to continuingtalks

Russia

| back to top |

Suicide Bombings In Grozny Demonstrate Islamic Insurgencyrsquos Continuing Capabilities In

Chechnya

Stirling Assynt Reports | Report FSU Vol IV No17 7 September 2011

A series of suicide bombings in the Chechen capital on 31 August (which left nine casualties includingseven police officers) has severely undermined President Ramzan Karydovrsquos claims to have successfully

eradicated the Islamic insurgency in the Republic The first suicide bomber reportedly detonated hisexplosives in a densely populated area only 150 metres from a local Parliament building while twofurther jihadists targeted first-response units Significantly the attack occurred during the Muslimholiday of Eid a three day celebration which marks the end of Ramadan during which the risk of jihadist attacks is heightened Indeed in addition to this strike in Grozny jihadist militants carried outfurther attacks in Iraq Nigeria and Algeria during Eid this year

Although no group has claimed responsibility for this incident it bears the hallmark of theCaucasus Emirate and so was likely orchestrated by the grouprsquos newly appointed deputy KhuseynGakayev and his brother Vadalov Indeed the Gakayev brothers are believed to have been behind theattack on the Chechen Parliament in October 2010 demonstrating the grouprsquos capabilities and intent tocarry out such strikes Moreover the timing of these bombings ndash only two months after the

reconciliation of the Caucasus Emiratersquos leader Doku Umarov with Chechen commanders (see our 3August Report) ndash supports this assessment and suggests that further incidents and suicide bombings arelikely given this truce

Suspected Militant Killed In Russias Southern Republic

Interfax news agency | Moscow in Russian 7 September 2011 Russias National Antiterrorist Committee said on 7 September a militant had been killed in the Republicof Kabarda-Balkaria the corporate-owned Russian news agency Interfax reported

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1742

Saudi Arabia

| back to top |

Saudi Arabia Shopping Around For Nuke Technology

Haaretz | 8 September 2011

Ties with Pakistan may remain close as Riyadh seeks nuclear assistanceSynopsis This week brought news that Iran on its own has produced new advanced nuclearcentrifuges According to a report of the International Atomic Energy Agency Iran has begun to installthe centrifuges in its uranium enrichment facility in Natanz But the high-level source noted thatdevelopment and production of the new centrifuges began more than seven years ago That does notspeak of a great technological capability on Irans part Israeli intelligence like its American counterpartviews 2014 or 2015 as the date when Iran will be able to build nuclear weapons says the source - if itwants to and no one blocks it In Saudi Arabia in contrast they are a bit more disturbed by thedevelopments in Iran An American Department of Energy delegation visited Riyadh and met with DrHashim Yamani who heads the King Abdullah City for Atomic and Renewable Energy Saudi Arabiawants to equip itself with nuclear reactors to generate electricity The United States is interested inselling Riyadh reactors for two reasons - fat contracts and the ability to keep close tabs on nucleardevelopments in Saudi Arabia The American administration is concerned that with a nuclear programfor civilian uses Saudi Arabia would actually like to prepare the infrastructure so it could switch to

producing nuclear weapons relatively quickly should Iran possess such weapons Defense ministerSultan Bin Abdul Aziz and the countrys former intelligence chief Turki Bin Faisal reportedly favorthe preparation of a secret nuclear program for military uses in cooperation with a Sunni Muslim ally -Pakistan which possesses dozens of atomic bombs Saudi Arabia reportedly funded Pakistans nuclearweapons program in return for Pakistans promise to aid the monarchy in this area if need be

Serbia

| back to top |

Serbia Threatened By Terrorism Says Dacic

Tanjug | 8 September 2011

US officials warned Serbia of possible terrorist activity particularly against foreign interests

After a warning coming from USA officials Serbia will raise the level of security in all facilitiesbelieved to be a possible target of terrorists the countrys Deputy Prime Minister and Minister of InteriorIvica Dacic stated Wednesday in the Palace of Serbia He stated that the security measures will primarilyrefer to the facilities of foreign countries in Serbia and added that special attention will be paid to thesecurity of air traffic US officials assume that there is a possibility of new terrorist attacks in the USAand other countries including Serbia Dacic said following a meeting with Special Representative of the UN Secretary-General for Disaster Risk Reduction Margareta Wahlstrom in Belgrade and a sessionof the republic headquarters for emergency situations

Somalia

| back to top |

Six Killed In Mortar Attack In Somali CapitalShabeelle Media Network website | Mogadishu in Somali 7 September 2011

Six people were killed and several others injured after three mortars landed in Mogadishus Arjantiinneighbourhood in Kaaraan District on the night of 6 September the privately-owned Shabeelle websitereported It quoted an eyewitness as saying that two of the three mortars fired have caused thecasualties inflicting fear in the residents who returned to their homes after Al-Shabab vacated the areaearly last month Kaaraan District is one of the areas taken over by the government forces and AUpeacekeepers

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1842

United States

| back to top |

Post-911 Intelligence Reform Takes Root Problems Remain

Reuters | 8 September 2011

US intelligence agencies will forever be scarred by their failure to connect the dots and detect theSeptember 11 plot but a decade later efforts to break down barriers to information-sharing are takingroot Changing a culture of need-to-know to need-to-share does not come easily in spy circles Someofficials say they worry a decade later about a future attack in which it turns out that US spy agencieshad clues in their vast vaults of data but did not put them together or even know they existed

Yet significant changes both big and small have broken down barriers between agenciessmoothed information-sharing and improved coordination US intelligence experts say From issuing ablue badge to everyone working in the sprawling intelligence community to symbolize a commonidentity to larger moves of mixing employees from different agencies the goal is singular -- to preventanother attack

Were much further ahead David Shedd Defense Intelligence Agency deputy director said of the ability to connect the dots compared with 10 years ago Still signs of a plot to attack the UnitedStates could be missed again My worst fear and I suspect probably one that would come true is that inany future would-be or actual attack God forbid we will be able to find the dots again somewhere

because of simply how much data is collected Shedd said The political response to the failure to stopthe attack was the 2002 creation of the Department of Homeland Security pulling together 22 agenciesto form the third largest US Cabinet department behind the Pentagon and Veterans Affairs

That was followed by the creation in late 2004 of the Director of National Intelligence to overseeall the spy agencies as recommended by the bipartisan 911 commission Previously the CIA directorheld a dual role of also overseeing the multitude of intelligence agencies But in the aftermath of the2001 attacks policymakers decided that was too big of a job for one person to do effectively

Critics argued then and now that the reforms were the governments usual response to crises --create more bureaucracy But others see much-needed change It has been a tremendous improvementsaid Lee Hamilton who was the 911 commission vice chair Its not seamless there are problems andweve still got a ways to go The 2001 attacks involving airliners hijacked by al Qaeda operatives killed

nearly 3000 people in New York Pennsylvania and the Pentagon Various US intelligence and lawenforcement agencies had come across bits of information suggesting an impending attack but failed toput the pieces together The CIA had information about three of the 19 hijackers at least 20 monthsbefore the attacks the National Security Agency had information linking one of the hijackers with alQaeda leader Osama bin Ladens network the CIA knew one hijacker had entered the United States butdid not tell the FBI and an FBI agent warned of suspicious Middle Eastern men taking flying lessons

Have the reforms made America safer Officials say yes and point to the US operation thatkilled bin Laden in Pakistan in May that demanded coordination among intelligence agencies and themilitary But there is an inevitable caveat no one can guarantee there will never be another attack onUS soil On Christmas Day 2009 a Nigerian man linked to an al Qaeda off-shoot tried unsuccessfullyto light explosives sewn into his underwear on a flight to Detroit from Amsterdam It turned out US

authorities had pockets of information about him President Barack Obama used a familiar September 11phrase to describe the 2009 incident as a failure to connect the dots of intelligence that existed acrossour intelligence community

Roger Cressey a former White House National Security Council counterterrorism officialresurrected another September 11 phrase It was a failure of imaginationThe intelligence community had not seen al Qaeda in the Arabian Peninsula a Yemen-based al Qaedaoff-shoot as capable of striking the US homeland If the underwear bomber threat had originated inPakistan they would have gone to battle stations immediately Cressey said Some proposed changesin how authorities would respond to another successful attack still are pending For example creation of

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1942

a common communication system for police firefighters and other emergency personnel remainstangled up in political wrangling in Congress over how to implement it This is a no-brainer Hamiltonsaid The first responders at the scene of a disaster ought to be able to talk with one another Theycannot do it today in most jurisdictions

Former leaders of the 911 commission issued a report card saying nine of its 41recommendations remain unfinished The Office of the Director of National Intelligence hasexperienced growing pains as overseer of the 17 spy agencies churning through four chiefs in six yearsTensions over turf confusion about the DNIs role and problems herding agencies with very powerfulchiefs of their own all came to a crescendo when retired Admiral Dennis Blair the third DNI tried toassert authority over CIA station chiefs who represent the agency in different countries The positionof chief of station is one of the crown jewels of the CIA and they dont want anyone playing with theircrown jewels said Mark Lowenthal a former senior US intelligence official

After a dust-up with CIA Director Leon Panetta who now is defense secretary it was Blair whowas sent packing I think the mistake that some have made is to have viewed the DNI and the Directorof CIA as an eitheror proposition rather than the power of the two working together the DIAs Sheddsaid in an interview in his office There is a history of where that hasnt worked so well I believe it isworking much better today said Shedd who has worked at the DNI CIA and National SecurityCouncil

Intelligence experts say in the current administration Obamas top homeland security andcounterterrorism adviser John Brennan arguably has more power than any of them because he has thepresidents ear Its a reminder that bureaucratic reform or no personalities count in making nationalsecurity policy The improved sharing of secret data has led to yet another set of problems The delugeof bits and bytes has subjected intelligence analysts to information overload as they try to sift through itall for relevant pieces Our analysts still are spending way too much time on finding the informationrather than on the analysis of the information Shedd said There is just too much data to go find it all

The intelligence community wants a system developed that would automatically processinformation from multiple agencies and then make the connections for the analysts

But greater inroads into sharing data across agencies does not guarantee that another attack willbe averted The threat has evolved and officials now are increasingly concerned about a lone wolf plot

by an individual not tied to any militant group that may be more difficult to uncover Those threatswill not come to our attention because of an intelligence community intercept said John Cohen asenior Department of Homeland Security counterterrorism official

They will come to our attention because of an alert police officer an alert deputy sheriff analert store owner an alert member of the public sees something that is suspicious and reports it Cohensaid One measure of the success of post-911 reforms is that a decade later the United States has not hada similar attack Now that could be luck that could be skill we dont really know Hamilton said Butin all likelihood what we have done including the establishment of the Department of HomelandSecurity and the transformation in intelligence and FBI has certainly been helpful[Article continues here ]httpnewsyahoocompost-9-11-u-intelligence-reforms-root-problems-052514320html

Comment the value added provided by the Office of the DNI remains an open question for many withinthe Intelligence Community (IC) and is a favored theme of corridor discussion in IC-member agenciesOn the other hand there is broad agreement among intelligence officials that the degree of cooperationand coordination between intelligence agencies and the character of intelligence sharing has vastlyimproved The fact that there has not been a successful major attack on US soil since 911 ndash not forlack of plotting ndash is in great part testimony to this more effective cooperation

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2042

Jihadist Suggests Striking New York City Bridges

All SITE Intelligence Group | 6 September 2011

A jihadist pointed to what he found to be a weak point of suspension bridges and directed his messageto those who love blasting and explosions In a message posted on the Shumukh al-Islam forum onSeptember 6 2011 the jihadist Abu Suleiman al-Nasser gave a picture of the Verrazano Bridge inNew York on which he drew a red box and arrow on the bridges center He then gave a map on whichhe circled the various bridges in New York City and its boroughs A fellow jihadist offered his ownidea giving a picture of the Hoover Dam and explaining that there is no target more important thandams He wrote that striking a dam may lead to the submerging of cities and the killing of thousands of people and in the case of the Hoover Dam would impact Las Vegas the capital of gambling anddebauchery

Counterterror Veteran is New Deputy FBI Director

Atlanta Journal Constitution | 1September2011

A 24-year FBI veteran with extensive counterterrorism experience Sean Joyce has been named the lawenforcement agencys new deputy director Elevated to the No 2 post within the FBI by Director RobertMueller Joyce replaces Timothy Murphy who is retiring after 23 years with the bureau Since last yearJoyce has been executive assistant director of the national security branch responsible for the FBIs

national security and intelligence operations He earned the Attorney Generals Award for ExceptionalService in 2004 for work on a counterterrorism squad in Dallas In 2008 he was named chief of thecounterterrorism divisions international terrorism operations section with responsibility forinternational terrorism matters within the United States hellip[Complete article is available here httpwwwajccomnewsnation-worldcounterterror-veteran-is-new-1153018html]

Top CIA Official Obama Changed Virtually Nothing

Salon | 1 September2011

PBSs Frontline is airing an examination of Top Secret America on September 6 The show includes arare and lengthy interview with 34-year-CIA-veteran John Rizzo who is described as the most

influential lawyer in CIA historyHere is one quote they include from Rizzo With a notable exception of the lsquoenhanced

interrogationrsquo program the incoming Obama administration changed virtually nothing with respect toexisting CIA programs and operations Things continued Authorities were continued that wereoriginally granted by President Bush beginning shortly after 911 Those were all picked up reviewedand endorsed by the Obama administration hellip[Complete article is available herehttpwwwsaloncomnewspoliticsbarack_obamastory=opiniongreenwald20110901obama]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2142

General Counterterrorism News| back to top |

The Terrible Missed Chance

Newsweek | 4 September 2011

Special Agent Harry Samit of the FBIs Minneapolis field office knew he was looking into the eyes of aterrorist It was early afternoon on Friday Aug 17 2001 Across from him sat Zacarias Moussaoui a33-year-old French-born student arrested the day before for overstaying his visa Moussaoui had paidmore than $8000 in cash that summer to sit in a cockpit simulator in a flight school in the suburbs of Minneapolis and learn - in a matter of days - the basics of how to fly a 747-400 Samit a formerintelligence officer at the Navys celebrated Top Gun flight school felt sure the man across the desk from him was a Muslim extremist who was part of a plot to hijack a commercial jetliner filled withpassengers The trick Samit wrote in a soon-to-be-released excerpt of a book hes written about thecase was getting Moussaoui to admit this and reveal details and associates to allow us to stop the plot

Surely the bureau brass in Washington would share his concern Samit thought He was wrongThat same day halfway across the country in the fluorescent-lit hallways of the J Edgar Hoover

FBI headquarters building in Washington counterterrorism supervisors were treating Samits firstreports about Moussaoui with skepticism even contempt Michael Maltbie a DC counterterrorism

specialist insisted repeatedly in the days after the arrest that there was no clear link between Moussaouiand Al Qaeda - the link needed for a warrant Maltbie thought Moussaoui was a dirty bird he latertold investigators but favored deporting him to France

Believing a hijacking might be imminent Samit appealed to his boss in Minneapolis SpecialAgent Greg Jones Jones picked up the phone on Aug 27 and called Maltbie at FBI HQ

Moussaoui he said might be part of a plot to get control of an airplane and crash it into theWorld Trade Center or something like that

Maltbie scoffed You have a guy interested in this type of aircraft Maltbie replied accordingto FBI documents That is it (Maltbie declined requests for an interview)

At least Maltbie was paying attention Michael Rolince who ran the FBIs InternationalTerrorism Operations Section was arguably the bureaus most important go-between with the White

House on domestic terrorist threats in the summer of 2001 He tells Newsweek he spent less than 20seconds being briefed on the Moussaoui case that August His office was inundated with terrorismprobes he said since Moussaoui was in custody already he posed no immediate threat Did it rise tothe level of something that I would take upstairs Rolince asks The answer is no

At CIA headquarters alarm bells were ringing loudly CIA Director George Tenet was briefedon Moussaoui within days of the arrest receiving a paper with the eye-catching headline IslamicExtremist Learns to Fly But the FBIs acting director that summer and the bureaus most seniorcounterterrorism official were left in the dark[Article continues here httpwwwthedailybeastcomnewsweek20110904the-terrible-missed-chancehtml]

Pan Am Flight 103 - Lockerbie Bombing - al-Megrahi CIA FilesWebwire | 31 August2011

BACM ResearchPaperlessArchivescom has announced the publishing of CIA files related to the PanAm Flight 103 Lockerbie Bombing

The files can be downloaded at no cost at httpwwwpaperlessarchivescompanam103ciahtml The files date from 1984 to 1999 These are the most recent files on Pan Am 103 released by the

CIA This set of files is unique because it includes memos on the direct handling of an intelligencesource This type of information is exempt from the Freedom of Information Act (FOIA) and is not oftenreleased by the Agency

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2242

The files cover information received by the CIA on Abdel Basset al-Megrahi Al-Megrahi is theonly person ever convicted in the Pan AM 103 case The Scottish government in 2009 allowed al-Megrahi to be released from custody and returned to Libya because of his failing health With the recentfall of Muammar Qaddafis regime there have been renewed calls for al-Megrahi to be returned toScottish custody or extradited to the United States and put on trial[Complete article is available here httpwwwwebwirecomViewPressRelaspaId=144692]

Getting The Caucasus Emirate Right

CSIS | August 2011

ldquohellipThis report aims to set straight a rather distorted record It demonstrates the veracity of three vitallyimportant facts usually obfuscated in discussions of the subject (1) the longstanding and growing tiesbetween the CE and its predecessor organization the ChRI on the one hand and al Qaeda (AQ) and theglobal jihad on the other hand (2) the importance of the CE jihadi terrorist network as a united andorganized political and military force promoting jihad in the region and (3) the salience of local culturaland the Salifist jihadist theo-ideology and the influence of the global jihadi revolutionarymovementalliance as key if not the main factors drive the ldquoviolence in the North Caucasusrdquohelliprdquohttpcsisorgfilespublication110829_Hahn_GettingCaucasusEmirateRt_Webpdf

7 Things You Didnrsquot Know About the War on TerrorForeign Policy | By Eric Schmitt and Thomas Shanker 6 September 2011

From an attempt to negotiate with Osama bin Laden to a proposal to threaten to bomb Mecca its been awild decade for the US national security establishment

Our new book Counterstrike The Untold Story of Americas Secret Campaign Against Al Qaeda is in many ways asummary of the past decade of our reporting on the military intelligence community and domestic law enforcement as itentered a new era of Darwinian evolution to counter violent extremism

It also is our deep dive into a decade of American counterterrorism efforts -- from the work of commando trigger-pullers and spies on the ground up to senior political leaders who wanted to defendthe nation (and get re-elected) Our efforts to report and write this book allowed us to uncover many newmissions never discussed before -- and gave us an understanding of how the war on terror had changedover the last decade

Our book assesses the 10 years since 911 as the military divides the fight into tactical missionson the battlefields of modern terrorism then the operational advancements that provided the means tosuccess while not securing final victory and at the top the strategic level of policy debates about howthe nation should combat this threat to its security

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2342

Here are seven vignettes from Counterstrike that offer glimpses into the thinking of policymakers andcommanders in early days after the Sept 11 attacks and how that thinking evolved over the followingdecade into a more whole-of-government approach to combating terrorists

1 Bush Tried to Negotiate with al Qaeda

The George W Bush administration like all of its predecessors swore never to negotiate with terroristsBut it did undertake an extraordinary and extraordinarily secret outreach effort to open a line of communication with Osama bin Laden and al Qaedas senior leadership It was an attempt to replicatehow the United States tried to sustain a dialogue with the Soviet Union even during the darkest days of the Cold War when White House and Kremlin leaders described in private and in public a set of acceptable behaviors -- and described with equal clarity the swift vicious even nuclear punishment forgross violations

In the months after the Sept 11 attacks Bushs national security staff working through theintelligence agencies made several attempts to get a private message to bin Laden and his inner circleThe messages were sent through business associates of the bin Laden familys vast financial empire aswell as through some of the al Qaeda leaders closest relatives a number of whom were receptive toopening a secret dialogue to restrain and contain their terrorist kinsman whom they viewed as a blot on

their name (To be sure other relatives were openly hostile to the American entreaties)According to a senior American intelligence officer with first-hand knowledge of the effort the

response from Osama bin Laden was silence And the effort was suspended

2 Sometimes a Wedding Is Just a WeddingIn the early days after the Sept 11 attacks the CIA and FBI vied to produce the most compellingintelligence reports that tracked suspected terrorist plots The agencies often worked at cross purposessometimes unwittingly At one point in early 2002 both agencies were tracking what American analystssaid were growing preparations for a major wedding somewhere in the Midwest (In terroristvernacular the word wedding is often code for a major attack)

Dribs and drabs on this wedding planning made their way to President Bush from bothagencies independent of each other of course

Finally over the Easter holiday during a video-teleconference with top aides in Washingtonfrom his ranch in Crawford Texas Bush stopped the briefing exasperated by the discrepancies in therival agencies reporting about the suspected threat

George Bob get together and sort this out Bush told his CIA director George J Tenet andFBI director Robert S Mueller III

Bushs instincts were correct When the analysts finally untangled their clues it turned out thatthe ominous wedding really was just that the matrimony of a young man and a young woman fromtwo prominent Pakistani-American families There was no threat There was no plot

3 The Threat to Bomb MeccaAs fears of a second attack mounted following the 911 strikes US government planners franticallycast about for strategies to protect the country Even the most far-fetched ideas had a hearing howeverbriefly In one case some government planners proposed that if al Qaeda appeared ready to attack America again the United States should publicly threaten to bomb the city of Mecca in Saudi Arabiathe holiest site in all of Islam in retaliation Just nuts one Pentagon aide wrote to himself when heheard the proposal The idea was quickly and permanently shelved

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2442

4 The SEAL Raid in Iran That Didnt HappenWhen US forces routed the Taliban government in Afghanistan and forced bin Laden and his toplieutenants to flee many senior al Qaeda leaders including bin Laden and his deputy Ayman al-Zawahri escaped to neighboring Pakistan But a separate group including the al Qaeda leaders sonSaad bin Laden fled to northern Iran where American troops would not pursue them and the Iranianswould likely not detain them But the Shiite clerics running Iran placed the al Qaeda operatives and theirfamily members under virtual house arrest and they became a shield against possible attacks from theSunni-based terrorist organization

One plan in particular illustrated the bold thinking and wildly unrealistic aims of the militarysinitial approach after 911 to kill or capture terrorist leaders The plan called for hunting the eight to 10senior al Qaeda leaders and operatives who had sought refuge in Chalus an Iranian resort town on theCaspian Sea where they had been detained

At the Joint Special Operations Command at Fort Bragg NC military planners drew up optionsfor Navy SEALs to sneak ashore at night using state-of-the-art mini-submarines Once they landed theSEALs would slip past Iranian guards to snatch the al Qaeda leaders Another option called for SpecialOperations helicopters to spirit American commandos into the town and whisk them out again with theirquarry The Americans went as far as conducting two or three rehearsals at an undisclosed locationalong the US Gulf Coast in early 2002 They conducted small-boat insertion exercises involving about

30 Special Operations personnel most SEALs and eventually concluded the mission was feasible if they were provided with more detailed intelligence on the locations of the al Qaeda members and thesecurity around them

The logistics of the mission were daunting Chalus sits at the edge of the Elburz coastal mountainrange about 70 miles north of Tehran and the failed rescue of the American hostages in Iran in April1980 loomed large in commanders memories Eventually Gen Richard B Myers the chairman of theJoint Chiefs of Staff rejected the mission as too risky and too politically volatile Many of the al Qaedaoperatives are reportedly still there

5 Intelligence Hauls of Unusual Size

US intelligence and military commandos have carried out tens of thousands of raids in the decade since911 The amount of material seized from terrorist and insurgent targets has grown to a massive sizeThe Defense Intelligence Agency (DIA) operates exploitation triage centers and giant warehouses forstoring intelligence products -- in war zones rear headquarters in countries like Qatar and back in theUnited States One intelligence analyst said that walking into one of the warehouses for documents andmedia exploitation reminded him of the final scene in Raiders of the Lost Ark when the captured Ark of the Covenant is crated up and rolled into a cavernous storage area that contains all the governmentsother dangerous secrets

All told more than two million individual documents and electronic files have been cataloguedby media type hard copy phone number thumb drive Each is inspected by a linguist working with acommunications analyst or computer expert

The DIA analysts are joined by specialists from other agencies including the FBI and the DrugEnforcement Administration Yet given the overwhelming volume no more than about 10 percent of thecaptured intelligence has ever been analyzed

Intelligence officers say they simply are overwhelmed and untold quality leads may still beburied in the piles of computers digital files travel documents and pocket litter

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2542

6 The Digital Counterjihad Cyberspace is the terrorists ultimate safe haven Its where they recruit raise money and even plotattacks using coded language while playing online video war games The US government fights back

One technique is called false band replacement whereby the intelligence agencies infiltratemilitants networks and post their own material to counter extremist efforts on those same jihadistwebsites The trick is to forge the onscreen trademarks -- web watermarks -- of al Qaeda media sites

This makes messages posted on these sites official and sows dissent and confusion among themilitants

This Internet spoofing can be used in support of more traditional combat missions There is atleast one case confirmed by American officials in which a jihadist website was hacked by Americancyberwarriors to lure a high-value al Qaeda to a surreptitious meeting with extremist counterparts -- onlyto find a US military team in waiting

Getty images

7 First Kill the MullahsUS counterterrorism officials have learned fighting terrorists effectively means targeting specific nodesof that network that support and enable militants who strap on suicide vests This strategy focuses onneutralizing enablers such as the financiers gun-runners and logisticians Among these terror linchpins

are religious leaders who bless attacksHeavenly reward will not await a suicide bomber unless his death and those of his victims is

deemed halal in keeping with Islams sacred sharia law Each militant network has a sharia emir usuallyat the level of a sheikh or mullah In Iraq American commanders specifically killed emirs to throw awrench in a suicide bombing networks

Take him out and suicide bombings from that network are frozen until he is replaced said onemilitary officer with command experience in Iraq hellip[Complete article is available herehttpwwwforeignpolicycomarticles201109067_things_you_didn_t_know_about_the_war_on_terror]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2642

Dick Marty Rendition Report Condemns lsquoCult of Secrecyrsquo

BBC News | 8 September 2011

A report for Europes human rights watchdog has called for greater scrutiny of secret services andsupport for whistleblowers The Council of Europe investigated how countries like Britain GermanyRomania and Lithuania assisted the US with the rendition of terror suspects It said a cult of secrecyhad helped Western governments cover up abuses Defending whistleblowers it singled out USsoldier Bradley Manning accused of passing secrets to Wikileaks He had acted as a whistleblowerand should be treated as such CoE rapporteur Dick Marty wrote in the report which was due to besubmitted to the CoEs Parliamentary Assembly The soldier is currently in a US military prisonawaiting trial for passing restricted material to the controversial website

But the report praised Mr Manning and Wikileaks itself for uncovering evidence of renditionThe CoE represents 47 member-states including both EU countries and Russia and other ex-Sovietstates Mr Martys report focused on the record of Western states explaining that it was based oninvestigations into European links to the controversial US policy of rendition for terrorism suspectsThe CIA allegedly flew terror suspects around the world for interrogation in the years after 911 holdingthem in secret prisons in Europe and elsewhere

No licence to kill

In his 48-page report - entitled Abuse of State Secrecy and National Security - Mr Marty looked at thelevel of control exercised by European states over their security services He urged all states to useindependent parliamentary committees to oversee the work of their secret services saying this was of vital importance for the rule of law and democracy Mr Marty argued that Western governments wereusing the notion of state secrecy to shield their intelligence services from accountability for seriousviolations committed during anti-terrorist operations We consider that this is simply unacceptablehe wrote

A licence to kill (or to abduct and torture) only exists in certain films and in dictatorialregimes In democratic systems parliaments as representatives of the people have a right and duty toknow what the government is doing in the name of the people Mr Marty praised investigative journalists and non-governmental organisations for their work in exposing abuses of authority Stressing

the fundamental role whistleblowers had to play in an open society he warned against a real cult of secrecy as an instrument of power

While it was up to the courts to decide if Bradley Manning had committed any crime he wrotethe CoE was indebted to him for the publication of a recording of a helicopter attack in Iraq in whichthe crew seems to have intentionally targeted and killed civilians

Thanks to Mr Manning he said a large number of embassy reports had allowed us to learnsignificant details of important recent events which are obviously of general interest We therefore join Amnesty International in expressing our worries as to the treatment he receives Mr Marty wrote inthe draft report[Article continues here httpwwwbbccouknewsworld-europe-14820145]Comment This report demonstrates that Dick Marty is not as De Gaulle would say a serious man To

suggest that Bradley Manning is a hero and intelligence agencies bent on defeating terrorists arecriminals should say it all Manning knowingly violated his oath and willfully provided enormousamounts of classified material to WikiLeaks For Marty this is a good thing in the name of transparencyMarty always injudicious and anti-American in his remarks is now moving at warp speed into crackpotterritory

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2742

Al Qarsquoida amp its Affiliates| back to top |

Al Qaeda Is Down Not Out

Los Angeles Times | By Amy Zegart 7 September 2011

US talk of defeating terrorism is dangerously prematureTalk of strategically defeating Al Qaeda is all the rage in the White House these days Defense

Secretary Leon Panetta used the D-word in July President Obama declared in his new counter-terrorism strategy We can say with growing confidence that we have put Al Qaeda on the path todefeat Compared to the woeful state of the economy terrorism has become the administrations feel-good story of the year

Defeat is a big word It is also dangerously misleading Yes the United States has made greatstrides in the last decade to harden targets improve intelligence and degrade the capabilities of violentIslamist extremists Osama bin Ladens death was a major accomplishment But the fight is nowhereclose to being won and Americas most perilous times may lie ahead Three reasons explain why

The first is that strategically defeating Al Qaeda is not nearly as important as it sounds After911 Al Qaeda morphed into a more complicated decentralized and elusive threat consisting of threeelements core Al Qaeda affiliates or franchise groups operating in places like Yemen and Somalia with

loose ties to the core group and homegrown terrorists inspired by violent extremism often through theInternet in the comfort of their own living rooms

Core Al Qaedas capabilities started degrading in 2001 when the US invaded Afghanistandismantled training camps ousted the Taliban and sent Bin Laden running The CIA has estimated thecore group remaining in the AfghanistanPakistan region to number 50 to 100 fighters The last time BinLaden oversaw a successful operation was 2005 when Al Qaeda struck the London transit system

But plots by homegrowns and franchise groups have risen dramatically in recent years The 2009Ft Hood shooting the worst terrorist attack on US soil since 911 was the work of a homegrownterrorist The mastermind of the 2010 Times Square car bomb plot was a naturalized American citizentrained by the Pakistani Taliban not Al Qaeda Another franchise group Al Qaeda in the ArabianPeninsula was behind the foiled 2009 Christmas Day underwear bomber aviation plot and the 2010

plot to explode tampered printer cartridges aboard cargo planes The Bipartisan Policy Center reported11 violent Islamist extremist terrorist incidents against the US homeland in 2009 the most since 911Nearly all involved what former CIA Director Mike Hayden calls a witches brew of radicalizedAmericans and franchise groups

The second reason why talk of defeat is premature has to do with weapons Terrorism againstAmericans is nothing new The potential for terrorist groups to acquire weapons of mass destruction isIn 1995 a Japanese cult released sarin nerve gas in the Tokyo subway killing 12 people and injuringthousands It was the first WMD terrorist attack in modern history and it sparked a wave of presidentialterrorism commissions years before Bin Laden became a household name

It is this specter of the lone fanatic or small group armed with the worlds most devastatingweapons that keeps experts up at night In 2005 60 leading nuclear scientists and terrorism experts were

asked how many believed the odds of a nuclear attack on the US were negligible Only three or fourhands went up most were far more pessimistic Today there is enough nuclear material to build120000 weapons As long as fissile material is poorly stored and rogue states like Iran and North Koreacontinue their illicit weapons programs nuclear terrorism remains a haunting possibility

The third reason is that the FBI has not yet become a first-rate domestic intelligence agencyAnalysts whose work is vital to success are still second-class citizens labeled support staff alongsidesecretaries and janitors and passed over for key jobs including running the bureaus intelligence unitsThe FBIs information technology is so antiquated it belongs in a museum And the old crime-fighting

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2842

culture still lives There is now a move afoot to shrink new classified facilities so that agents dont haveto waste time away from their cases to read intelligence documents thereStrategically defeating Al Qaeda sounds too good to be true Because it is Amy Zegart is a senior fellow at Stanfords Hoover Institution and the author of Eyes on Spies

Congress and the United States Intelligence Community

US Counterterror Chief Al-Qaida On Steady Slide

Bostoncom | 31 August 2011

White House counterterrorism chief John Brennan said al-Qaida is on a steady slide after the death of al-Qaidas latest second-in-command in Pakistan Brennan told The Associated Press on Wednesdaythat its a huge blow in the first official White House comment since Atiyah Abd al-Rahmans reportedkilling by CIA drone strike in Pakistans tribal areas last week

Al-Qaida is sort of on the ropes and taking a lot of shots to the body and the head Brennansaid This is a time not to step back and let them recover a message he says hes sending to hiscounterparts in Pakistan[Article continues herehttpwwwbostoncomnewsnationwashingtonarticles20110831us_counterterror_chief_al_qaida_on_steady_slide ]

Al-Qaeda (AKA Al-Qaida Al-Qarsquoida)

Council on Foreign Relations | 29 August 2011

ldquoAl-Qaeda an international terrorist network is considered the top terrorist threat to the United StatesThe group is wanted for its September 11 2001 attacks on the World Trade Center and the Pentagon aswell as a host of lesser attacks To escape the post-911 US-led war in Afghanistan al-Qaedas centralleadership fled eastward into Pakistan securing a safe haven in loosely governed areas there In July2007 US intelligence agencies found that the organization was regrouping and regaining strength inthese tribal areas along the border with Afghanistan though targeted killings of senior al-Qaeda leadershave since diminished the groups command and control capabilities In February 2009 Director of National Intelligence Dennis C Blair told lawmakers that the groups core is less capable and effective

than it was a year ago The killing of al-Qaedas top leader Osama bin Laden by US forces in Pakistanin May 2011 served a significant blow to the organization but analysts say al-Qaeda remains deadlywith its networks spread all over the world Plus a number of affiliated groups have gained prominencein recent years complicating the task of containing the organizationrdquo

[Article continues here httpwwwcfrorgterrorist-organizationsal-qaeda-k-al-qaida-al-qaidap9126]

Al Qaeda In The Islamic Maghreb

CSIS | 1 September 2011

ldquoAl Qaeda in the Islamic Maghreb (AQIM) emerged from a decades-long militant Islamist tradition inAlgeria In 1998 the Salafist Group for Preaching and Combat (Groupe Salafiste pour la Preacutedication etle Combat or GSPC) broke away from the Armed Islamic Group (GIA) because of the GIArsquos extensive

targeting of civilians Gradually the GSPC evolved to encompass global jihadist ideology in addition toits historical focus on overturning the Algerian state In 2006 the GSPC officially affiliated with alQaeda core soon rebranding itself as al Qaeda in the Islamic Maghreb In the following years AQIMwas able to conduct a small number of large-scale attacks most notably its 2007 bombing of the UNheadquarters in Algiers In recent years counterterrorism pressure and weak governance have combinedto shift the center of AQIMrsquos presence to the Sahara-Sahel region AQIM continues to make its presenceknown through smuggling operations kidnappings and clashes with security forces in the desert In thecoming years general instability within the region could allow AQIM to further expand its influencerdquo[Complete article is available here httpcsisorgfilespublication110901_Thornberry_AQIM_WEBpdf ]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2942

AQ Strategy

The Assynt Report | 11 August 2011

Executive Summary Al-Qaedarsquos broad objectives remain unchanged in the wake of bin Ladenrsquos death There

are nonetheless growing questions over al-Qaedarsquos capability Longstanding paranoiaover the use of electronic communications is heightened by the ongoing US dronecampaign whilst attacks against the West have generally been disrupted at an early stage

The Pakistani Talibanrsquos attack on a Karachi naval base in May 2011 was a significantmilitary success and the first major act of revenge for bin Ladenrsquos killing Furtherattempts to avenge his loss are certain

All parts of al-Qaeda are working within a cohesive framework with the ultimate aim of restoring the Islamic Caliphate (Khilafa) The strategic plan to support this aim wasdrafted by 40 of al-Qaedarsquos brightest thinkers in Kandahar Afghanistan in November1999 This plan consists of four phases each seven years long leading to the dissolutionof corrupt regimes and the union of all newly-liberated states within the Khilafa

Apart from mounting strategic operations al-Qaedarsquos role is to be the inspiration for atruly global jihadist movement It seeks to achieve this through provision of trainingbeing a role model for others to follow extending acceptance and adoption of its tactics

particularly suicide bombings and professionalising jihadist media to build a commonbrand and message between hitherto separate groups

Between the late 1990s and 2003 the organisation was primarily devoted to classicinternational terrorism Most effort is now spent fighting insurgencies from North Africato South Asia The way in which this strategy helps to spread the struggle has been seenin North-West Africa where the initial development of al-Qaeda in the Islamic Maghrebwas in part fed by men returning from fighting with al-Qaeda in Iraq

Since mid-2009 al-Qaeda and its affiliates have increasingly encouraged jihadist-sympathisers resident in Western countries to engage in violence themselves withoutcentral direction or training making surveillance more difficult

One of the keys to awakening the spirit of jihad was the success in portraying the US and

its allies as Crusaders in the Muslim world Al-Qaedarsquos strategy essentially requires thatthis process be kept running until the forces of jihad have grown large enough to launchsuccessful liberation operations

Despite its successes in Afghanistan al-Qaedarsquos credibility has suffered both from its failure to landanother strategic blow on the West on the scale of 911 and also excessive Muslim casualties in someoperations Similarly al-Qaeda in Iraq was set back by its excessive sectarian zeal and local resentmentat the foreign fighter presence In turn this affected the movementrsquos funding from the Gulf

Analysis Sub-Saharan African Leaders Media Focus On Threats Prior to 911

OSC Feature | Sub-Sahara Africa -- OSC Analysis 6 September 2011Statements by Sub-Saharan African leaders and African media reports on terrorism prior to the 10thanniversary of 911 focus on the growing threats from local extremists and Al-Qaida affiliatesparticularly in West Africa with little direct commentary on the anniversary or US counterterrorismpolicies This focus on domestic threats suggests that counterterrorism messages expressing solidaritywith African nations and acknowledging the evolving terrorist threat on the continent would have thegreatest resonance with African audiences

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3042

Leaders Stressing Determination To Counter Local Threats African leaders public statements reflect an ongoing concern about the threat of terrorism on thecontinent and a strong commitment to find ways to combat this threat

Nigerian President Goodluck Jonathan emphasized the governments commitment tovigorously combat terrorism following the 26 August bombing of the UN office inAbuja by Nigerian extremist group Boko Haram reported the Paris-based news agencyAFP President Jonathan is hosting Liberian President Ellen Johnson Sirleaf and otherforeign dignitaries for a three-day forum on terrorism and economic crimes the widelyread Lagos-based independent daily The Guardian reported on 4 September

Malian President Amadou Toumani Toure launched a Special Program for PeaceSecurity and Development on 9 August stating that development remained the mostviable solution to counter threats to the countrys stability reported Malis state-owneddaily LEssor[ 3] The program aimed to undermine support for Al-Qaida in the IslamicMaghreb (AQIM) according to Burkinabe web portal Lefasonet on 11 August

Somali Prime Minister Abdiweli Muhammad Gas stated on 23 August that theTransitional Federal Government planned to remove Al-Shabaab from the central andsouthern regions in Somalia with the goal of restoring peace within one year so the

country can hold national elections according to the Puntland-based Garowe Online

Experts Media Highlight New Capabilities Tactics

African experts and media outlets are warning about the evolving nature of terrorist organizations on thecontinent the terrorists pursuit of new targets and tactics and their potential for taking advantage of regional instability

Leading South African think tank the Institute for Security Studies stated on 29 Augustthat Boko Harams attack on the UN in Abuja completes Boko Harams metamorphosisinto an international terrorist group Since December 2010 Boko Haram had killed over600 people in over 70 attacks against Nigerian targets according to the think tank buthad not previously targeted Western or international interests

A 26 August article on the popular Malian web portal Maliweb voiced concern thatAQIM could benefit from Tuareg mercenaries many of whom were recently returningfrom fighting in Libya and could benefit from an increase in arms trafficking through theSahel during the Libyan conflict

Ugandas privately owned Daily Monitor reported on 19 August that AU forces inSomalia warned that Al-Shabaab planned to increase the number of kidnappings andbomb attacks as part of its new strategy to shift from controlling territory in Mogadishuto conducting more of an insurgent campaign

Concern Over Al-Qaida Presence Terrorist Collaboration

West African official statements and media reports reflect a growing concern over an increased Al-

Qaida presence in West Africa and collaboration with AQIM Al-Shabaab and Boko Haram

Nigerian security services reported that the suspected mastermind behind the 26 Augustbombing of the UN office in Abuja was a Boko Haram member with close links to Al-Qaida and Al-Shabaab according Nigerias privately owned Daily Sun

A 28 August report in the privately owned daily Nigerian Tribune claimed that the 26August bombing in Abuja was part of Al-Qaidas plans to mark the 10th anniversary of 911 and called Boko Haram Al-Qaidas ally in the region

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3142

An 8 August commentary in Burkina Fasos LObservateur Paalga said that reports of Boko Haram collaboration with Al-Shabaab and AQIM could indicate that Al-Qaida isextending its African tentacles Abdourahmane Dieng security division chief of theEconomic Community of West African States said the collaboration represented a veryserious threat according to Senegals progovernment Le Soleil on 5 August

Messages Likely To Resonate With African Audience

Sub-Saharan Africas increasing concern about the shifting nature and potential strengthening of theterrorist threat on the continent suggests that messages directly addressing the impact of terrorism onAfricans the increasingly complex nature of the threat and the need for multilateral cooperation againstterrorism are most likely to resonate with Africans

Messages expressing solidarity and sympathy for Africans affected by Boko Haram Al-Shabaab and AQIM would almost certainly resonate with a broad African audience

African political and military leaders would probably welcome acknowledgement of thecomplex and changing nature of terrorism on the continent and recognition of theirinitiatives and commitment to countering violent extremism

African leaders and medias concern about potential collaboration between Boko Haram

Al-Shabaab and AQIM suggest that they would be open to improving multilateral andcross-regional sharing of lessons learned and strategies to counter the intensification of terrorism within Africa

Aviation and Maritime Security| back to top |

Bomb Threats Force Jets To Land

Associated Press | 7 September 2011

Both landed safely one landed in Ankara Ataturk International Airport and the other at Kuala LumpurTwo flights operated by Pakistans state-owned airline received bombs threats on Wednesday

and both landed safely one in Turkey the other in Malaysia officials said No bombs were found The

first flight was headed for Manchester England when it was notified of the threat near the Bulgariancapital of Sofia The crew contacted the control tower in Istanbul to seek permission for the landingstate-run Anatolia news agency reported Authorities quickly evacuated all 378 passengers from theBoeing 777-300ER aircraft after it parked at a remote corner of the International Ataturk Airport andbomb squads began searching the plane with sniffer dogs Anatolia reported PIA spokesman MashoodTajwar confirmed the flight received a threat and landed All passengers were safe A police searchturned up no bomb officials said Later a second PIA flight from Islamabad to Kuala Lumpur alsoreceived a bomb threat It landed in Kuala Lumpur and all the passengers disembarked safely saidTajwar The UK-bound Pakistan International Airlines plane was forced to make an emergency landingat Ataturk Airport in Istanbul after receiving a bomb threat Malaysias airports authority said thepassengers were being screened and the plane was isolated in a parking area while being searched bypolice No bomb was found

It said the plane carried 164 passengers and 13 crew Azmi Murad senior general manager forthe authority said the Pakistani airline informed it that the warning came by email Mr Tajwar gave nodetails on the nature of the threat or how it was delivered Pakistan is home to al Qaedas top leadershipMilitants who trained there have been responsible for many of the attacks and failed plots in the USand Europe since Sept 11 2001 when planes hijacked by al Qaeda militants destroyed the World TradeCenter in New York and crashed into the Pentagon The bomb threats came four days before the 10thanniversary of 911 but there was no apparent link to Islamist militants who typically do not alertauthorities in advance The FBI and Homeland Security department issued warnings last weekend aboutal Qaeda threats to small airlines

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3242

Commentary amp Opinion| back to top |

From Terror Group Founder To Libyan Rebel Military Commander

ABCNews | 29August 2011

The same man who triumphantly led Libyan rebels into Gadhafis compound last week first came to theattention of the US intelligence community years ago - as a founder of a terror group

Abdelhakim Belhaj who was recently appointed to Tripolis rebel military council was one of the original founders of the Libyan Islamic Fighting Group an anti-Gadhafi group which was laterdesignated by the US State Department as a terrorist organization with links to al Qaeda according toUS government reports

We proudly announce the liberation of Libya and that Libya has become free and that the ruleof the tyrant and the era of oppression is behind us a victorious Belhaj told reporters after the stormingof Gadhafis Bab al-Aziziya compound last week Ousting Gadhafi had been the main objective of theLIFG since its inception in the early 1990s even if some of the fighters believed that meant puttingAmericans in the crossfire

The group carried out operations against the Libyan government including at least four suspectedassassination attempts against Gadhafi in the 1990s and was also believed to be connected to a series of suicide bombings in Casablanca Morocco in 2003 the US State Department reported As relationsbetween the US and Gadhafi improved in the mid-2000s some LIFG leaders cultivated relationshipswith top al Qaeda leaders including Osama bin Laden and were suspected of funneling fighters to Iraq tocarry out operations against US soldiers

When the LIFG was designated a terror organization in 2004 it was meant as a gesture of solidarity with the Libyan government according to a March 2011 congressional report

Contrary to several US government reports Libyan rebel ambassador to the US Ali Aujalitold ABC News that the LIFG was never connected to al Qaeda and did not carry out terrorist operations

They were only opposed to Gadhafi during his rule and paid the price for that by beingoppressed by the regime Aujali said

The CIA first publicly voiced its concerns about the connection between the LIFG and al Qaedain 2004 when then-director George Tenet testified before the Senate Select Committee on Intelligenceand listed the LIFG among groups that represented an immediate threat [that] has benefited from alQaeda links[Article continues here httpabcnewsgocomBlotterterror-group-founder-libyan-rebel-military-commanderstoryid=14405319]

Interview With Saudi Sheik Wajdi Al-Ghazawi

MemriTVcom

Sheik Wajdi al-Ghazawi owner of al-Fajr TV criticizes extremist atmosphere in Saudi Arabia and saysafter 911 They Handed Out Sweets on the Streets of Mecca

Following are excerpts from a statement by Saudi Sheik Wajdi Al-Ghazawi owner of Al-FajrTV which was posted on YouTube on August 4 2011

Wajdi Al-Ghazawi When Al-Qaeda and Osama Bin Laden were at the height of their mightthey were extremely popular in Saudi Arabia From mosque pulpits across Saudi Arabia preacherswould pray for their success Moreover from the pulpits of the most important mosques ndash the Al-HaramMosque in Mecca and the Nabawi Mosque in Al-Madina ndash direct prayers for the success of Al-Qaedawere made during the days of the bombing of Tora Bora Oh Allah help our brothers in AfghanistanThese supplications were made during evening prayers as well as Friday prayers The preachers wouldpray for them in violation of the ministrys instructions

When the twin towers in New York were attacked they handed out sweets on the streets of Mecca By Allah they did I witnessed this myself The young people bowed in prayer and hugged one

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3342

another out of joy People were in heaven because of these young men who destroyed America andbombed this idol Am I right or not Was it like that or not

Back then when the Taliban broke off a piece of the nose of the Buddha statue which was hewnin the mountain an entire sermon was dedicated to it in the mosque in Mecca and the preacher was laterreprimanded for this sermon The entire Saudi people supported and loved Al-Qaeda

This went on until our brothers in Al-Qaeda ndash and I dont know what was going through theirminds ndash began to carry out operations inside Saudi Arabia Thats when we all raised our hands andsaid Youve gone too far We wont support you in this

The atmosphere here in Saudi Arabia is one of extremism It is characterized by focusing onminor details Many things are forbidden Yes maybe they are indeed forbidden but by forcing peopleto avoid them and by acting as if these were major sins an atmosphere was created that gave rise toextremist youth who might act recklessly at the most trivial provocation

For instance we blew out of proportion the issue of music the issue of smoking or the issue of hanging pictures in public places True there are clear texts on these issues but the young peopleembraced these issues as if they were fighting usury fornication or alcohol No these are not among theseven major sins So our society has become extreme

This extremist atmosphere has given rise to people who accuse others of heresy and people whopurport to be waging Jihad It has created genes that gave rise to cells of Al-Qaeda and other terrorists

We must examine our breeding ground in which these young men were sownBy Allah what can possibly emerge from such an atmosphere Muftis who accuse others of

heresy sheiks who incite and young people who bomb Am I right or not[Complete clip is available here httpwwwmemritvorgclipen3099htm]

Legal Aspects amp Lawfare| back to top |

Revisiting A Stale Counterterrorism Law

Council on Foreign Relations | 1 September 2011

ldquoNearly a decade after 911 the United States still relies on the 2001 Authorization for the Use of Military Force (AUMF) for the killing and detention of those considered responsible for or associatedwith the terrorist attacks But CFR national security law expert John Bellinger says it is becomingincreasingly difficult for the Obama administration to justify some of its counterterrorism operationsunder this limited statutory authority It has been used in defense of actions including drone attacks onindividuals as well as the targeting of groups in Yemen and Somalia that may have only the mosttenuous affiliation or association to the 911 attack A revised AUMF should clarify those operations aswell as the issue of detention specifically which individuals can be detained for how long and subjectto what processes There also needs to be greater effort at the international level he adds to fill thegaps in the law that covers conflicts between states and non-state actorsrdquohelliprdquo[Complete article is available here httpwwwcfrorgcounterterrorismrevisiting-stale-

counterterrorism-lawp25742]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3442

Narco-Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector[Complete article is available here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Mexicos Cartels Move Into Extortion

At a construction site of an apartment building in the heart of the Mexican capital a company engineerruns through his weekly payroll sheet He has salaries written out for carpenters bricklayers andelectricians At the bottom of the sheet is a notation of $200 for ldquosecurity servicesrdquo next to a nicknameldquoEl Indiordquo mdash the Indian [Complete article is available here

httpwwwtucsonsentinelcomnationworldreport090611_mexico_cartels_bribesmexicos-cartels-move-into-extortion ]

Seven Die In Mexican Pacific Port City

Latin American Herald Tribune

Seven people died in separate shootings in Mazatlan a port city in the northwestern Mexican state of Sinaloa with some of the incidents drug-related a police spokesman told Efe [Complete article is available herehttpwwwlahtcomarticleaspCategoryId=14091ampArticleId=423061]

Tijuana Violence Slows As One Cartel Takes Control

BorderlandBeatcom

Mexicos famously seedy border city of Tijuana is enjoying a lull in drug murders as the countrys mostpowerful cartel gains the upper hand over its rivals [Complete article is available here httpwwwborderlandbeatcom201109tijuana-violence-slows-as-one-cartelhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3542

Network Notes| back to top |

Canadian data foreign threats Spying in the digital age (Suggested by a reader in Lithuania ndash thanks) Globe and Mail | By Colin Freeze 31 July 2010

A government spy agency thatrsquos prohibited from monitoring Canadian citizens is now usingldquoinformation about Canadiansrdquo to zero in on foreign threatsThe ambiguous statement found in a new government report detailing the activities of CommunicationsSecurity Establishment Canada could sanction a range of intelligence-gathering activities ndash includingthe controversial practice of mining ldquometadatardquo from digital communications

Metadata ndash often called data about data ndash are found in e-mails and their attachments and containdigital signatures that can reveal when where and by whom documents were created

The collection of metadata has caused controversy in other countries but never in Canada wherethe Communications Security Establishment Canada operates as an ultra-secretive agency About theonly thing that is known about the classified practices is that they were halted and resumed after someldquomajor changesrdquo including directives signed by Defence Minister Peter MacKay

ldquoI cannot comment on specific operational activitiesrdquo Adrian Simpson a CSEC spokesman toldThe Globe He stressed that reviews upheld that the activities in question were ldquocarried out inaccordance with the law ministerial requirements and CSECrsquos policies and proceduresrdquo

ldquoCSEC is prohibited from directing its activities at Canadians anyone in Canada or Canadiansanywhere in the worldrdquo he said

For decades signals-intelligence agencies in the West have been allowed to safeguard nationalsecurity by eavesdropping on foreignersrsquo conversations Spies can whatever phone lines and satellitesignals they can so long as they never listen in on fellow citizens

But in the digital age governments run increasingly sophisticated dragnets scooping up andscouring through millions of intercepted Internet conversations daily Such practices create legalambiguities

ldquoThe whole issue of what constitutes boundaries for signals-intelligence agencies in cyberspaceis a big debate right nowrdquo said Rafal Rohozinski a security expert affiliated with the University of Torontorsquos Munk School

A watchdog agency that reviews the CSECrsquos activities released an annual report to Parliament onJuly 20 ldquoWhen other means have been exhausted CSEC may use information about Canadians when it

has reasonable grounds to believe that using this information may assist in identifying and obtainingforeign intelligencerdquo it reads

Sometimes collecting metadata is relatively benign It can involve aggregating sets of data tospot trends much like the way meteorologists discern national forecasts from localized information

For example while CSEC canrsquot usually monitor the communications of specific Canadian terrorsuspects it can glean insights by zooming out for big-picture patterns One way to do that MrRohozinski said would be to look at data flows between Canadian cities and Yemen where an Internet-savvy al-Qaeda offshoot works to recruit Westerners

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3642

Metadata however can be more revealing Documents that circulate on the Internet travelaround like postmarked letters marked with return addresses ndash e-mails and attachments have embeddedcodes that speak to the who where and when behind their creation

The US National Security Agency found itself mired in controversy a few years go after itskirted domestic-spying bans by secretly upholding that this sort of American metadata was fair gamedistinct from communication contents

Therersquos little to suggest the CSEC would go that far The federal agencyrsquos activities are reviewedby a watchdog body now headed by a former Federal Court of Appeal judge Robert Deacutecary appointedlast year wrote in his annual report that he was satisfied the CSEC activities in question are lawful evenif his predecessors felt them borderline

ldquoThis was the first review of these activities since hellip their resumption under new policiesrdquo thewatchdogrsquos report says It concludes that the surveillance activities are ldquoin accordance with the lawrdquo andfollow ldquomajor changes to certain policies procedures and practicesrdquo

Much of the concern arises from the possibility that CSEC could hand over metadata intelligenceto domestic law-enforcement and security agencies

As it stands the RCMP and CSIS have to develop their domestic investigations before coming toCSEC ndash usually with warrants ndash if they want specific intelligence The rules guiding handovers are strictbecause even though all agencies run surveillance operations they do so under vastly different

mandates and legal standardsThe spy agency however stood by its practicesldquoCSEC is extremely diligent when it comes to the privacy of Canadiansrdquo Mr Simpson said

[complete article is available here httpwwwtheglobeandmailcomnewsnationalcanadian-data-foreign-threats-spying-in-the-digital-agearticle2113772 ]

Cyber Attacks Against NATO Then And Now

New Atlanticist | 6 September 2011

ldquoNow that NATOrsquos Operation UNIFIED PROTECTOR over Libya is winding down it is worth

noting how few cyber incidents were directed in protest against the Alliance Certainly there was a

cyber component to the liberation of Libya but it was more about content and Internet freedom (the

most newsworthy elements here were the role of social media and the Libyan government taking largeparts of the nation offline) But compared to past history NATO cyber defenders had a relatively easy

time

ldquoNATO has not however had an easy 2011 Although there were three significant incidents we

know about none seemed to have been in direct response to operations over Libyahelliprdquo

[Complete article is available here httpwwwacusorgnew_atlanticistcyber-attacks-against-nato-then-

and-now]

The Calm Before The Storm

Foreign Policy | By Joel Brenner 6 September 2011

Cyberwar is already happening -- and its about to get much much worse A veteran cyberwarriorexplains how America can prepare itself

Revelations of wholesale electronic fraud and massive data heists have become weekly evendaily affairs A multinational electronics corporation loses personal information on more than 100million customers Cyberthieves break into an international bank counterfeit credit balances and lootATMs in four countries grabbing $9 million in just a few hours International gangs spread maliciouscode that conscripts unwitting computers into zombie armies of hundreds of thousands of similarlyenslaved machines Criminals then rent these armies called botnets as easily as you can buy a time-sharing arrangement in a beach condo No wonder the vast majority of Internet traffic is spam

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3742

Yet the loss of personal information and related criminal fraud intolerable as they are are theleast threatening face of electronic insecurity The US militarys secret network is penetratedAmericans corporate pockets are being picked clean of the intellectual property that makes the UnitedStates tick And the electricity grid that keeps the lights on and makes everything move is dangerouslyinsecure

In one remote attack on the Pentagons information systems about 10 years ago the Chinesehauled away up to 20 terabytes of information If the information had been on paper theyd have neededa line of moving vans stretching from the Pentagon to freighters docked 50 miles away in Baltimoreharbor just to haul it away Had they done so the military district of Washington wouldve become anactive theater of operations for the first time since 1865 and the Navy wouldve blockaded theChesapeake Bay But the Chinese did it electronically so who noticed

Corporate espionage by both competitors and foreign intelligence services or their surrogates isalso increasing Intelligence officials see this but cant speak openly about the specifics and Im seeingit now in my law practice The victims rarely admit it for understandable reasons Oracle whichsuccessfully sued SAP for theft of its software code was a prominent exception Google was another

When the Chinese penetrated Google in late 2009 -- yes that operation was Chinese and yes itwas done with the blessing of a member of the Politburo -- they werent after customer informationThey were after the source code that makes Google unique Nor was Google the only victim Thousands

of US and Western firms were penetrated in that affair Foreign governments -- and not only theChinese -- understand that they cannot compete with the United States militarily and politically if theycannot compete with it economically so their intelligence services want to steal its corporate intellectualproperty This is the technology that gives America its competitive edge and often it has nothing to dowith defense Ordinary companies with valuable technology are now being targeted by nation-statesThis is a new era National security and economic security have converged

The danger is not limited to the loss of technology and information however The owners andoperators of the North American electricity grid are hooking up their control systems to the Internet asfast as they can Exposing the grid to the Internet makes it marginally more efficient but it also makes itdramatically more vulnerable to disruption If you can remotely penetrate an electronic system to stealinformation you can remotely penetrate it to shut it down or make it go haywire This is why there is no

longer a meaningful difference between information security and operational security And the biggestoperational risk is the grid In contemporary society nothing moves without electricity If the grid goesout the country stops

As the Stuxnet affair demonstrated remotely engineered disruption of industrial control systemsis now a reality That episode involved the successful electronic attack on the centrifuges in the Iraniannuclear program Only a first-class intelligence agency could have pulled that off but the blueprint fordoing it -- the code itself -- is now public Many American industrial control systems run on the samekind of equipment the Iranians were using but unlike the controls on the Iranian centrifuges thecontrols on the US grid are now being connected to the Internet making them easier to disrupt Stuxnetwas a watershed there will be copycats

Other industrial control systems will also be targets Some already are Air traffic control

railroad switches and water and sewage systems are all electronically controlled now and many arevulnerable If an intruder can break into the right server electronically he can remotely shut downproduction send your goods to the wrong destination and even unlock your doors -- and delete your logentries so he leaves no record of ever having been there

The United States does not lack enemies who would attack it this way Seized al Qaedacomputers contain details of US industrial control systems In 2003 a group affiliated with thePakistani terrorist organization Lashkar-e-Taiba -- the same gang that engineered the 2008 terroristassaults in Mumbai -- plotted to attack the Australian grid Other groups conspired to attack the Britishgrid in 2004 2006 and 2009 Yet the owners and operators of the North American grid continue willy-

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3842

nilly to expose their control systems to the Internet instead of isolating and hardening it This is folly of a high order

Important conclusions for public and corporate policy follow from this vulnerable state of

affairs First cyber insecurity has operational consequences In the current and foreseeable states of technology a high degree of assurance against electronic penetration of anything connected to theInternet is not achievable Large efficient electronically connected organizations and nations aretherefore vulnerable to remotely engineered disruption as well as information theft

Second this risk cannot be eliminated -- but it can be reduced and managed As a nation theUnited States should start by isolating the grids controls from the Internet Undoubtedly there aremarginal efficiencies to be gained by seamless connectivity over a publicly accessible infrastructure butthese gains are usually exaggerated and the risk this connectivity creates is staggering The governmentand the major telecommunications carriers must also make the investment required to re-create themassive redundancies that made the wired telephone network so robust Resilience and swift recoveryshould be the goal If the consequences of cyberattacks were reduced penetration would cease to matter

Third companies that wait for the government to solve their own security problems do so attheir peril The government is broke and the IT backbone is 85 percent private so the governmentdoesnt control it The governments role in altering the status quo will be limited to setting standardsusing its purchasing power to move vendors toward better security and getting its own house in order

The government can neither secure corporate intellectual property nor protect firms against operationaldisruption

Fourth in a world in which everything cannot be protected companies must determine forthemselves what intellectual property and physical assets to isolate and safeguard Those that approachthis task seriously will quickly learn that technology is only one aspect of their insecurity and in manycases the easiest to deal with Unless technology is integrated with personnel practices and operationalsecurity it opens vulnerabilities that its users rarely understand This kind of integration requires theautomated enforcement of reasonable security policies and systematic workforce training and thatoccurs only when management the lawyers and the technologists work closely together This is an old-fashioned management challenge -- not a technological one For their part corporate boards need to takeIT security seriously and launch audits that examine how their systems are actually implemented and

used not merely how they are designed Because as the techies like to put it the weakest link in anysystem is not the silicon-based unit on the desk its the carbon-based unit in the chair Joel Brenner is author of the forthcoming America the Vulnerable Inside the New Threat Matrix of

Digital Espionage Crime and Warfare He has served as the inspector general of the National Security

Agency the national counterintelligence executive and the NSAs senior counsel He now practices law

at Cooley LLP in Washington DC

Cyberattacks Decline Slightly Symantec Report Finds

Dark Reading | 1 September 2011

Organizations worldwide are suffering damages as a result of cyberattacks but interestingly there hasbeen a slight decline in these attacks during the past 12 months according to a new report from

Symantec More than 90 percent of the more than 3300 respondents across 36 countries said theyexperienced tangible losses as a result of a hack with 84 percent reporting financial loss to the cost of abreach Around one-fifth lost at least $195000 in breaches during the past 12 months

Meanwhile Symantec attributes the unexpected bright spot of a decline in breaches toorganizations employing better cybersecurity defenses More than 70 percent of organizations sawattacks in the past 12 months a decline of 5 percent from 2010 And those that experienced anincreasing frequency of attacks dropped from 29 percent in 2010 to 21 percent this year While 100percent last year reported losses from cyberattacks 92 percent did so in 2011 The trend seemscounterintuitive given the rash of high-profile breaches this year More

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 14: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1442

Libya

| back to top |

Libyan Extremist Britain Allowed To Stay Was Link To Al-Qaeda In Iran Papers Show

The Daily Telegraph | (London) By Richard Spencer Tripoli

The extremist Ismail Kamoka spent several years sending funds to terrorist groups across the Middle East

An Alleged Libyan extremist who sought political asylum in Britain regularly travelled to Iran from2002 to provide forged documents to extremists linked to al-Qaeda secret files found in a Tripoliintelligence service building have disclosed

The documents seen by The Daily Telegraph unearth British intelligence suspicions about linksbetween Iran and al-Qaeda dating back almost a decade Other details to come out of the documentssent by MI6 and found in the office of the former head of foreign intelligence and later foreign ministerMoussa Koussa who defected in March include the revelation that Britain had begun co-operating withthe Chinese security services on Islamic extremists The extent of Iranian co-operation with al-Qaedahas been disputed in intelligence communities though Iranians are thought to have provided weaponsand explosives to the Taliban in Afghanistan

A number of al-Qaeda operatives including members of the family of Osama bin Laden fled toTehran after the fall of the Taliban in Afghanistan and their precise status in Iran has been unclear Thepapers in Libya do not directly challenge the Iranian government but suggest that al-Qaeda operativeshad more freedom of movement there than previously thought The extremist Ismail Kamoka spent

several years sending funds to terrorist groups across the Middle East including some linked to al-Qaeda the files said Mr Kamoka who had been given indefinite leave to remain in Britain afterarriving from Saudi Arabia in 1994 and claiming asylum travelled from the UK to Iran viaSwitzerland in July 2002 according to one document[Article continues herehttpwwwtelegraphcouknewsworldnewsafricaandindianoceanlibya8740771Libyan-extremist-Britain-allowed-to-stay-was-link-to-al-Qaeda-in-Iran-papers-showhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1542

Nigeria

| back to top |

Bomb Explodes In Violence-Torn Nigerian City Residents

AFP | 6 September 2011

A bomb went off Tuesday in Nigerias northeastern city of Maiduguri disrupting a three-week lull inbombings in the violence-torn city local residents said [Article continues here httpnewsyahoocombomb-explodes-violence-torn-nigerian-city-residents-215718081html]

Pakistan

| back to top |

Pakistan Bans Foreign Travel For Those Involved In Bin-Ladin Probe

The News website | Islamabad in English 7 September 2011

A Pakistani commission investigating the circumstances surrounding the killing of Al-Qaidah chief Usamah Bin-Ladin has banned foreign travel for everyone involved in the probe Pakistani daily TheNews part of the Jang group which owns Geo TV reported on 7 September The paper recalled that thecommission had already directed the countrys interior ministry and the intelligence service ISI toensure that the Bin-Ladin family was not repatriated from Pakistan without the consent of the

commission

More Than 20 Killed In Two Suicide Blasts In Pakistans Quetta

Express247 TV | Lahore in English 5 September 2011

At least 22 people were killed and several others injured in two explosions in the south-westernPakistani city of Quetta on 7 September the website of the Dubai-based private Pakistani TV channelARY News reported According to the channel one blast went off near the residence of the FrontierConstabulary and another one near the commissioner office in Quetta According to the report around100 kilograms of explosives were used in each attack (ARY News website Dubai in English 07 Sep 11)

Private Pakistani English-language TV channel Express 247 carried a series of onscreen scrollswhich said police had confirmed that the two blasts were suicide attacks The report cited police sources

as saying that 25 people were killed and more than 40 injured in the attacks (Express247 TV Lahorein English 0654GMT 07 Sep 11)

BBCM notes that the attacks came after the Pakistani intelligence agency said on 5 August that ithad arrested Al-Qaidah commander Younis Al-Mauritani and two of his accomplices in Quetta

Taleban Say Quetta Blasts Revenge For Recent Al-Qaidah Arrests

AFP | 7 September 2011

The Pakistani Taleban have claimed responsibility for the twin suicide bombs in Quetta on 7 Septembersaying they were carried out to avenge the recent arrests of Al-Qadiah operatives in the city Wecarried out the attacks Taleban spokesman Ehsanullah Ehsan told AFP in a phone call from anundisclosed location

Twin Suicide Bombings In Pakistan Leave 23 Dead

Miami Herald

Twin suicide bombers attacked the home of a senior military officer Wednesday in the western city of Quetta injuring him and killing at least 23 people officials said in a possible revenge attack forPakistans recent arrest of a senior al Qaida commander [Article continues here httpwwwmiamiheraldcom201109072394264twin-suicide-bombings-in-pakistanhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1642

Philippines

| back to top |

Moro Splinter Group Threatens US Soldiers In Philippines But Capabilities Limited

Government-Rebel Negotiations Remain Difficult

Assynt | SEAsia Vol VIII No17 7 September 2011

Ameril Umbra Kato a former senior Moro Islamic Liberation Front (MILF) field commander whoresigned late last year because he rejects peace negotiations has threatened to attack US troops as wellas Filipino security forces and other Government targets US and Filipino troops are currentlyundertaking joint training exercises This is an annual event but the first time they have been conductedin central Mindanao However Katorsquos splinter group the Bangsamoro Islamic Freedom Fighters (BIFF)is believed to have as few as 200 members with generally unsophisticated weapons ConsequentlyBIFFrsquos ability to conduct an attack on US forces is likely to be limited

In this period Kato announced the creation of a political wing to his grouping the BangsamoroIslamic Freedom Movement emphasising his split with MILF Nevertheless he has not been expelledfrom MILF and so is protected by the current ceasefire with Manila though MILF has stronglycondemned Katorsquos threat against US troops It is possible that MILF leadership is content to allow himto operate relatively unimpeded in order to gain greater leverage in its negotiations with theGovernment since they can contrast their more compromising approach with BIFFrsquos threatened

violence Meanwhile negotiations between MILF and the Government continue MILF dismissed theGovernmentrsquos latest proposal for an autonomous region but both sides appear committed to continuingtalks

Russia

| back to top |

Suicide Bombings In Grozny Demonstrate Islamic Insurgencyrsquos Continuing Capabilities In

Chechnya

Stirling Assynt Reports | Report FSU Vol IV No17 7 September 2011

A series of suicide bombings in the Chechen capital on 31 August (which left nine casualties includingseven police officers) has severely undermined President Ramzan Karydovrsquos claims to have successfully

eradicated the Islamic insurgency in the Republic The first suicide bomber reportedly detonated hisexplosives in a densely populated area only 150 metres from a local Parliament building while twofurther jihadists targeted first-response units Significantly the attack occurred during the Muslimholiday of Eid a three day celebration which marks the end of Ramadan during which the risk of jihadist attacks is heightened Indeed in addition to this strike in Grozny jihadist militants carried outfurther attacks in Iraq Nigeria and Algeria during Eid this year

Although no group has claimed responsibility for this incident it bears the hallmark of theCaucasus Emirate and so was likely orchestrated by the grouprsquos newly appointed deputy KhuseynGakayev and his brother Vadalov Indeed the Gakayev brothers are believed to have been behind theattack on the Chechen Parliament in October 2010 demonstrating the grouprsquos capabilities and intent tocarry out such strikes Moreover the timing of these bombings ndash only two months after the

reconciliation of the Caucasus Emiratersquos leader Doku Umarov with Chechen commanders (see our 3August Report) ndash supports this assessment and suggests that further incidents and suicide bombings arelikely given this truce

Suspected Militant Killed In Russias Southern Republic

Interfax news agency | Moscow in Russian 7 September 2011 Russias National Antiterrorist Committee said on 7 September a militant had been killed in the Republicof Kabarda-Balkaria the corporate-owned Russian news agency Interfax reported

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1742

Saudi Arabia

| back to top |

Saudi Arabia Shopping Around For Nuke Technology

Haaretz | 8 September 2011

Ties with Pakistan may remain close as Riyadh seeks nuclear assistanceSynopsis This week brought news that Iran on its own has produced new advanced nuclearcentrifuges According to a report of the International Atomic Energy Agency Iran has begun to installthe centrifuges in its uranium enrichment facility in Natanz But the high-level source noted thatdevelopment and production of the new centrifuges began more than seven years ago That does notspeak of a great technological capability on Irans part Israeli intelligence like its American counterpartviews 2014 or 2015 as the date when Iran will be able to build nuclear weapons says the source - if itwants to and no one blocks it In Saudi Arabia in contrast they are a bit more disturbed by thedevelopments in Iran An American Department of Energy delegation visited Riyadh and met with DrHashim Yamani who heads the King Abdullah City for Atomic and Renewable Energy Saudi Arabiawants to equip itself with nuclear reactors to generate electricity The United States is interested inselling Riyadh reactors for two reasons - fat contracts and the ability to keep close tabs on nucleardevelopments in Saudi Arabia The American administration is concerned that with a nuclear programfor civilian uses Saudi Arabia would actually like to prepare the infrastructure so it could switch to

producing nuclear weapons relatively quickly should Iran possess such weapons Defense ministerSultan Bin Abdul Aziz and the countrys former intelligence chief Turki Bin Faisal reportedly favorthe preparation of a secret nuclear program for military uses in cooperation with a Sunni Muslim ally -Pakistan which possesses dozens of atomic bombs Saudi Arabia reportedly funded Pakistans nuclearweapons program in return for Pakistans promise to aid the monarchy in this area if need be

Serbia

| back to top |

Serbia Threatened By Terrorism Says Dacic

Tanjug | 8 September 2011

US officials warned Serbia of possible terrorist activity particularly against foreign interests

After a warning coming from USA officials Serbia will raise the level of security in all facilitiesbelieved to be a possible target of terrorists the countrys Deputy Prime Minister and Minister of InteriorIvica Dacic stated Wednesday in the Palace of Serbia He stated that the security measures will primarilyrefer to the facilities of foreign countries in Serbia and added that special attention will be paid to thesecurity of air traffic US officials assume that there is a possibility of new terrorist attacks in the USAand other countries including Serbia Dacic said following a meeting with Special Representative of the UN Secretary-General for Disaster Risk Reduction Margareta Wahlstrom in Belgrade and a sessionof the republic headquarters for emergency situations

Somalia

| back to top |

Six Killed In Mortar Attack In Somali CapitalShabeelle Media Network website | Mogadishu in Somali 7 September 2011

Six people were killed and several others injured after three mortars landed in Mogadishus Arjantiinneighbourhood in Kaaraan District on the night of 6 September the privately-owned Shabeelle websitereported It quoted an eyewitness as saying that two of the three mortars fired have caused thecasualties inflicting fear in the residents who returned to their homes after Al-Shabab vacated the areaearly last month Kaaraan District is one of the areas taken over by the government forces and AUpeacekeepers

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1842

United States

| back to top |

Post-911 Intelligence Reform Takes Root Problems Remain

Reuters | 8 September 2011

US intelligence agencies will forever be scarred by their failure to connect the dots and detect theSeptember 11 plot but a decade later efforts to break down barriers to information-sharing are takingroot Changing a culture of need-to-know to need-to-share does not come easily in spy circles Someofficials say they worry a decade later about a future attack in which it turns out that US spy agencieshad clues in their vast vaults of data but did not put them together or even know they existed

Yet significant changes both big and small have broken down barriers between agenciessmoothed information-sharing and improved coordination US intelligence experts say From issuing ablue badge to everyone working in the sprawling intelligence community to symbolize a commonidentity to larger moves of mixing employees from different agencies the goal is singular -- to preventanother attack

Were much further ahead David Shedd Defense Intelligence Agency deputy director said of the ability to connect the dots compared with 10 years ago Still signs of a plot to attack the UnitedStates could be missed again My worst fear and I suspect probably one that would come true is that inany future would-be or actual attack God forbid we will be able to find the dots again somewhere

because of simply how much data is collected Shedd said The political response to the failure to stopthe attack was the 2002 creation of the Department of Homeland Security pulling together 22 agenciesto form the third largest US Cabinet department behind the Pentagon and Veterans Affairs

That was followed by the creation in late 2004 of the Director of National Intelligence to overseeall the spy agencies as recommended by the bipartisan 911 commission Previously the CIA directorheld a dual role of also overseeing the multitude of intelligence agencies But in the aftermath of the2001 attacks policymakers decided that was too big of a job for one person to do effectively

Critics argued then and now that the reforms were the governments usual response to crises --create more bureaucracy But others see much-needed change It has been a tremendous improvementsaid Lee Hamilton who was the 911 commission vice chair Its not seamless there are problems andweve still got a ways to go The 2001 attacks involving airliners hijacked by al Qaeda operatives killed

nearly 3000 people in New York Pennsylvania and the Pentagon Various US intelligence and lawenforcement agencies had come across bits of information suggesting an impending attack but failed toput the pieces together The CIA had information about three of the 19 hijackers at least 20 monthsbefore the attacks the National Security Agency had information linking one of the hijackers with alQaeda leader Osama bin Ladens network the CIA knew one hijacker had entered the United States butdid not tell the FBI and an FBI agent warned of suspicious Middle Eastern men taking flying lessons

Have the reforms made America safer Officials say yes and point to the US operation thatkilled bin Laden in Pakistan in May that demanded coordination among intelligence agencies and themilitary But there is an inevitable caveat no one can guarantee there will never be another attack onUS soil On Christmas Day 2009 a Nigerian man linked to an al Qaeda off-shoot tried unsuccessfullyto light explosives sewn into his underwear on a flight to Detroit from Amsterdam It turned out US

authorities had pockets of information about him President Barack Obama used a familiar September 11phrase to describe the 2009 incident as a failure to connect the dots of intelligence that existed acrossour intelligence community

Roger Cressey a former White House National Security Council counterterrorism officialresurrected another September 11 phrase It was a failure of imaginationThe intelligence community had not seen al Qaeda in the Arabian Peninsula a Yemen-based al Qaedaoff-shoot as capable of striking the US homeland If the underwear bomber threat had originated inPakistan they would have gone to battle stations immediately Cressey said Some proposed changesin how authorities would respond to another successful attack still are pending For example creation of

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1942

a common communication system for police firefighters and other emergency personnel remainstangled up in political wrangling in Congress over how to implement it This is a no-brainer Hamiltonsaid The first responders at the scene of a disaster ought to be able to talk with one another Theycannot do it today in most jurisdictions

Former leaders of the 911 commission issued a report card saying nine of its 41recommendations remain unfinished The Office of the Director of National Intelligence hasexperienced growing pains as overseer of the 17 spy agencies churning through four chiefs in six yearsTensions over turf confusion about the DNIs role and problems herding agencies with very powerfulchiefs of their own all came to a crescendo when retired Admiral Dennis Blair the third DNI tried toassert authority over CIA station chiefs who represent the agency in different countries The positionof chief of station is one of the crown jewels of the CIA and they dont want anyone playing with theircrown jewels said Mark Lowenthal a former senior US intelligence official

After a dust-up with CIA Director Leon Panetta who now is defense secretary it was Blair whowas sent packing I think the mistake that some have made is to have viewed the DNI and the Directorof CIA as an eitheror proposition rather than the power of the two working together the DIAs Sheddsaid in an interview in his office There is a history of where that hasnt worked so well I believe it isworking much better today said Shedd who has worked at the DNI CIA and National SecurityCouncil

Intelligence experts say in the current administration Obamas top homeland security andcounterterrorism adviser John Brennan arguably has more power than any of them because he has thepresidents ear Its a reminder that bureaucratic reform or no personalities count in making nationalsecurity policy The improved sharing of secret data has led to yet another set of problems The delugeof bits and bytes has subjected intelligence analysts to information overload as they try to sift through itall for relevant pieces Our analysts still are spending way too much time on finding the informationrather than on the analysis of the information Shedd said There is just too much data to go find it all

The intelligence community wants a system developed that would automatically processinformation from multiple agencies and then make the connections for the analysts

But greater inroads into sharing data across agencies does not guarantee that another attack willbe averted The threat has evolved and officials now are increasingly concerned about a lone wolf plot

by an individual not tied to any militant group that may be more difficult to uncover Those threatswill not come to our attention because of an intelligence community intercept said John Cohen asenior Department of Homeland Security counterterrorism official

They will come to our attention because of an alert police officer an alert deputy sheriff analert store owner an alert member of the public sees something that is suspicious and reports it Cohensaid One measure of the success of post-911 reforms is that a decade later the United States has not hada similar attack Now that could be luck that could be skill we dont really know Hamilton said Butin all likelihood what we have done including the establishment of the Department of HomelandSecurity and the transformation in intelligence and FBI has certainly been helpful[Article continues here ]httpnewsyahoocompost-9-11-u-intelligence-reforms-root-problems-052514320html

Comment the value added provided by the Office of the DNI remains an open question for many withinthe Intelligence Community (IC) and is a favored theme of corridor discussion in IC-member agenciesOn the other hand there is broad agreement among intelligence officials that the degree of cooperationand coordination between intelligence agencies and the character of intelligence sharing has vastlyimproved The fact that there has not been a successful major attack on US soil since 911 ndash not forlack of plotting ndash is in great part testimony to this more effective cooperation

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2042

Jihadist Suggests Striking New York City Bridges

All SITE Intelligence Group | 6 September 2011

A jihadist pointed to what he found to be a weak point of suspension bridges and directed his messageto those who love blasting and explosions In a message posted on the Shumukh al-Islam forum onSeptember 6 2011 the jihadist Abu Suleiman al-Nasser gave a picture of the Verrazano Bridge inNew York on which he drew a red box and arrow on the bridges center He then gave a map on whichhe circled the various bridges in New York City and its boroughs A fellow jihadist offered his ownidea giving a picture of the Hoover Dam and explaining that there is no target more important thandams He wrote that striking a dam may lead to the submerging of cities and the killing of thousands of people and in the case of the Hoover Dam would impact Las Vegas the capital of gambling anddebauchery

Counterterror Veteran is New Deputy FBI Director

Atlanta Journal Constitution | 1September2011

A 24-year FBI veteran with extensive counterterrorism experience Sean Joyce has been named the lawenforcement agencys new deputy director Elevated to the No 2 post within the FBI by Director RobertMueller Joyce replaces Timothy Murphy who is retiring after 23 years with the bureau Since last yearJoyce has been executive assistant director of the national security branch responsible for the FBIs

national security and intelligence operations He earned the Attorney Generals Award for ExceptionalService in 2004 for work on a counterterrorism squad in Dallas In 2008 he was named chief of thecounterterrorism divisions international terrorism operations section with responsibility forinternational terrorism matters within the United States hellip[Complete article is available here httpwwwajccomnewsnation-worldcounterterror-veteran-is-new-1153018html]

Top CIA Official Obama Changed Virtually Nothing

Salon | 1 September2011

PBSs Frontline is airing an examination of Top Secret America on September 6 The show includes arare and lengthy interview with 34-year-CIA-veteran John Rizzo who is described as the most

influential lawyer in CIA historyHere is one quote they include from Rizzo With a notable exception of the lsquoenhanced

interrogationrsquo program the incoming Obama administration changed virtually nothing with respect toexisting CIA programs and operations Things continued Authorities were continued that wereoriginally granted by President Bush beginning shortly after 911 Those were all picked up reviewedand endorsed by the Obama administration hellip[Complete article is available herehttpwwwsaloncomnewspoliticsbarack_obamastory=opiniongreenwald20110901obama]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2142

General Counterterrorism News| back to top |

The Terrible Missed Chance

Newsweek | 4 September 2011

Special Agent Harry Samit of the FBIs Minneapolis field office knew he was looking into the eyes of aterrorist It was early afternoon on Friday Aug 17 2001 Across from him sat Zacarias Moussaoui a33-year-old French-born student arrested the day before for overstaying his visa Moussaoui had paidmore than $8000 in cash that summer to sit in a cockpit simulator in a flight school in the suburbs of Minneapolis and learn - in a matter of days - the basics of how to fly a 747-400 Samit a formerintelligence officer at the Navys celebrated Top Gun flight school felt sure the man across the desk from him was a Muslim extremist who was part of a plot to hijack a commercial jetliner filled withpassengers The trick Samit wrote in a soon-to-be-released excerpt of a book hes written about thecase was getting Moussaoui to admit this and reveal details and associates to allow us to stop the plot

Surely the bureau brass in Washington would share his concern Samit thought He was wrongThat same day halfway across the country in the fluorescent-lit hallways of the J Edgar Hoover

FBI headquarters building in Washington counterterrorism supervisors were treating Samits firstreports about Moussaoui with skepticism even contempt Michael Maltbie a DC counterterrorism

specialist insisted repeatedly in the days after the arrest that there was no clear link between Moussaouiand Al Qaeda - the link needed for a warrant Maltbie thought Moussaoui was a dirty bird he latertold investigators but favored deporting him to France

Believing a hijacking might be imminent Samit appealed to his boss in Minneapolis SpecialAgent Greg Jones Jones picked up the phone on Aug 27 and called Maltbie at FBI HQ

Moussaoui he said might be part of a plot to get control of an airplane and crash it into theWorld Trade Center or something like that

Maltbie scoffed You have a guy interested in this type of aircraft Maltbie replied accordingto FBI documents That is it (Maltbie declined requests for an interview)

At least Maltbie was paying attention Michael Rolince who ran the FBIs InternationalTerrorism Operations Section was arguably the bureaus most important go-between with the White

House on domestic terrorist threats in the summer of 2001 He tells Newsweek he spent less than 20seconds being briefed on the Moussaoui case that August His office was inundated with terrorismprobes he said since Moussaoui was in custody already he posed no immediate threat Did it rise tothe level of something that I would take upstairs Rolince asks The answer is no

At CIA headquarters alarm bells were ringing loudly CIA Director George Tenet was briefedon Moussaoui within days of the arrest receiving a paper with the eye-catching headline IslamicExtremist Learns to Fly But the FBIs acting director that summer and the bureaus most seniorcounterterrorism official were left in the dark[Article continues here httpwwwthedailybeastcomnewsweek20110904the-terrible-missed-chancehtml]

Pan Am Flight 103 - Lockerbie Bombing - al-Megrahi CIA FilesWebwire | 31 August2011

BACM ResearchPaperlessArchivescom has announced the publishing of CIA files related to the PanAm Flight 103 Lockerbie Bombing

The files can be downloaded at no cost at httpwwwpaperlessarchivescompanam103ciahtml The files date from 1984 to 1999 These are the most recent files on Pan Am 103 released by the

CIA This set of files is unique because it includes memos on the direct handling of an intelligencesource This type of information is exempt from the Freedom of Information Act (FOIA) and is not oftenreleased by the Agency

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2242

The files cover information received by the CIA on Abdel Basset al-Megrahi Al-Megrahi is theonly person ever convicted in the Pan AM 103 case The Scottish government in 2009 allowed al-Megrahi to be released from custody and returned to Libya because of his failing health With the recentfall of Muammar Qaddafis regime there have been renewed calls for al-Megrahi to be returned toScottish custody or extradited to the United States and put on trial[Complete article is available here httpwwwwebwirecomViewPressRelaspaId=144692]

Getting The Caucasus Emirate Right

CSIS | August 2011

ldquohellipThis report aims to set straight a rather distorted record It demonstrates the veracity of three vitallyimportant facts usually obfuscated in discussions of the subject (1) the longstanding and growing tiesbetween the CE and its predecessor organization the ChRI on the one hand and al Qaeda (AQ) and theglobal jihad on the other hand (2) the importance of the CE jihadi terrorist network as a united andorganized political and military force promoting jihad in the region and (3) the salience of local culturaland the Salifist jihadist theo-ideology and the influence of the global jihadi revolutionarymovementalliance as key if not the main factors drive the ldquoviolence in the North Caucasusrdquohelliprdquohttpcsisorgfilespublication110829_Hahn_GettingCaucasusEmirateRt_Webpdf

7 Things You Didnrsquot Know About the War on TerrorForeign Policy | By Eric Schmitt and Thomas Shanker 6 September 2011

From an attempt to negotiate with Osama bin Laden to a proposal to threaten to bomb Mecca its been awild decade for the US national security establishment

Our new book Counterstrike The Untold Story of Americas Secret Campaign Against Al Qaeda is in many ways asummary of the past decade of our reporting on the military intelligence community and domestic law enforcement as itentered a new era of Darwinian evolution to counter violent extremism

It also is our deep dive into a decade of American counterterrorism efforts -- from the work of commando trigger-pullers and spies on the ground up to senior political leaders who wanted to defendthe nation (and get re-elected) Our efforts to report and write this book allowed us to uncover many newmissions never discussed before -- and gave us an understanding of how the war on terror had changedover the last decade

Our book assesses the 10 years since 911 as the military divides the fight into tactical missionson the battlefields of modern terrorism then the operational advancements that provided the means tosuccess while not securing final victory and at the top the strategic level of policy debates about howthe nation should combat this threat to its security

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2342

Here are seven vignettes from Counterstrike that offer glimpses into the thinking of policymakers andcommanders in early days after the Sept 11 attacks and how that thinking evolved over the followingdecade into a more whole-of-government approach to combating terrorists

1 Bush Tried to Negotiate with al Qaeda

The George W Bush administration like all of its predecessors swore never to negotiate with terroristsBut it did undertake an extraordinary and extraordinarily secret outreach effort to open a line of communication with Osama bin Laden and al Qaedas senior leadership It was an attempt to replicatehow the United States tried to sustain a dialogue with the Soviet Union even during the darkest days of the Cold War when White House and Kremlin leaders described in private and in public a set of acceptable behaviors -- and described with equal clarity the swift vicious even nuclear punishment forgross violations

In the months after the Sept 11 attacks Bushs national security staff working through theintelligence agencies made several attempts to get a private message to bin Laden and his inner circleThe messages were sent through business associates of the bin Laden familys vast financial empire aswell as through some of the al Qaeda leaders closest relatives a number of whom were receptive toopening a secret dialogue to restrain and contain their terrorist kinsman whom they viewed as a blot on

their name (To be sure other relatives were openly hostile to the American entreaties)According to a senior American intelligence officer with first-hand knowledge of the effort the

response from Osama bin Laden was silence And the effort was suspended

2 Sometimes a Wedding Is Just a WeddingIn the early days after the Sept 11 attacks the CIA and FBI vied to produce the most compellingintelligence reports that tracked suspected terrorist plots The agencies often worked at cross purposessometimes unwittingly At one point in early 2002 both agencies were tracking what American analystssaid were growing preparations for a major wedding somewhere in the Midwest (In terroristvernacular the word wedding is often code for a major attack)

Dribs and drabs on this wedding planning made their way to President Bush from bothagencies independent of each other of course

Finally over the Easter holiday during a video-teleconference with top aides in Washingtonfrom his ranch in Crawford Texas Bush stopped the briefing exasperated by the discrepancies in therival agencies reporting about the suspected threat

George Bob get together and sort this out Bush told his CIA director George J Tenet andFBI director Robert S Mueller III

Bushs instincts were correct When the analysts finally untangled their clues it turned out thatthe ominous wedding really was just that the matrimony of a young man and a young woman fromtwo prominent Pakistani-American families There was no threat There was no plot

3 The Threat to Bomb MeccaAs fears of a second attack mounted following the 911 strikes US government planners franticallycast about for strategies to protect the country Even the most far-fetched ideas had a hearing howeverbriefly In one case some government planners proposed that if al Qaeda appeared ready to attack America again the United States should publicly threaten to bomb the city of Mecca in Saudi Arabiathe holiest site in all of Islam in retaliation Just nuts one Pentagon aide wrote to himself when heheard the proposal The idea was quickly and permanently shelved

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2442

4 The SEAL Raid in Iran That Didnt HappenWhen US forces routed the Taliban government in Afghanistan and forced bin Laden and his toplieutenants to flee many senior al Qaeda leaders including bin Laden and his deputy Ayman al-Zawahri escaped to neighboring Pakistan But a separate group including the al Qaeda leaders sonSaad bin Laden fled to northern Iran where American troops would not pursue them and the Iranianswould likely not detain them But the Shiite clerics running Iran placed the al Qaeda operatives and theirfamily members under virtual house arrest and they became a shield against possible attacks from theSunni-based terrorist organization

One plan in particular illustrated the bold thinking and wildly unrealistic aims of the militarysinitial approach after 911 to kill or capture terrorist leaders The plan called for hunting the eight to 10senior al Qaeda leaders and operatives who had sought refuge in Chalus an Iranian resort town on theCaspian Sea where they had been detained

At the Joint Special Operations Command at Fort Bragg NC military planners drew up optionsfor Navy SEALs to sneak ashore at night using state-of-the-art mini-submarines Once they landed theSEALs would slip past Iranian guards to snatch the al Qaeda leaders Another option called for SpecialOperations helicopters to spirit American commandos into the town and whisk them out again with theirquarry The Americans went as far as conducting two or three rehearsals at an undisclosed locationalong the US Gulf Coast in early 2002 They conducted small-boat insertion exercises involving about

30 Special Operations personnel most SEALs and eventually concluded the mission was feasible if they were provided with more detailed intelligence on the locations of the al Qaeda members and thesecurity around them

The logistics of the mission were daunting Chalus sits at the edge of the Elburz coastal mountainrange about 70 miles north of Tehran and the failed rescue of the American hostages in Iran in April1980 loomed large in commanders memories Eventually Gen Richard B Myers the chairman of theJoint Chiefs of Staff rejected the mission as too risky and too politically volatile Many of the al Qaedaoperatives are reportedly still there

5 Intelligence Hauls of Unusual Size

US intelligence and military commandos have carried out tens of thousands of raids in the decade since911 The amount of material seized from terrorist and insurgent targets has grown to a massive sizeThe Defense Intelligence Agency (DIA) operates exploitation triage centers and giant warehouses forstoring intelligence products -- in war zones rear headquarters in countries like Qatar and back in theUnited States One intelligence analyst said that walking into one of the warehouses for documents andmedia exploitation reminded him of the final scene in Raiders of the Lost Ark when the captured Ark of the Covenant is crated up and rolled into a cavernous storage area that contains all the governmentsother dangerous secrets

All told more than two million individual documents and electronic files have been cataloguedby media type hard copy phone number thumb drive Each is inspected by a linguist working with acommunications analyst or computer expert

The DIA analysts are joined by specialists from other agencies including the FBI and the DrugEnforcement Administration Yet given the overwhelming volume no more than about 10 percent of thecaptured intelligence has ever been analyzed

Intelligence officers say they simply are overwhelmed and untold quality leads may still beburied in the piles of computers digital files travel documents and pocket litter

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2542

6 The Digital Counterjihad Cyberspace is the terrorists ultimate safe haven Its where they recruit raise money and even plotattacks using coded language while playing online video war games The US government fights back

One technique is called false band replacement whereby the intelligence agencies infiltratemilitants networks and post their own material to counter extremist efforts on those same jihadistwebsites The trick is to forge the onscreen trademarks -- web watermarks -- of al Qaeda media sites

This makes messages posted on these sites official and sows dissent and confusion among themilitants

This Internet spoofing can be used in support of more traditional combat missions There is atleast one case confirmed by American officials in which a jihadist website was hacked by Americancyberwarriors to lure a high-value al Qaeda to a surreptitious meeting with extremist counterparts -- onlyto find a US military team in waiting

Getty images

7 First Kill the MullahsUS counterterrorism officials have learned fighting terrorists effectively means targeting specific nodesof that network that support and enable militants who strap on suicide vests This strategy focuses onneutralizing enablers such as the financiers gun-runners and logisticians Among these terror linchpins

are religious leaders who bless attacksHeavenly reward will not await a suicide bomber unless his death and those of his victims is

deemed halal in keeping with Islams sacred sharia law Each militant network has a sharia emir usuallyat the level of a sheikh or mullah In Iraq American commanders specifically killed emirs to throw awrench in a suicide bombing networks

Take him out and suicide bombings from that network are frozen until he is replaced said onemilitary officer with command experience in Iraq hellip[Complete article is available herehttpwwwforeignpolicycomarticles201109067_things_you_didn_t_know_about_the_war_on_terror]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2642

Dick Marty Rendition Report Condemns lsquoCult of Secrecyrsquo

BBC News | 8 September 2011

A report for Europes human rights watchdog has called for greater scrutiny of secret services andsupport for whistleblowers The Council of Europe investigated how countries like Britain GermanyRomania and Lithuania assisted the US with the rendition of terror suspects It said a cult of secrecyhad helped Western governments cover up abuses Defending whistleblowers it singled out USsoldier Bradley Manning accused of passing secrets to Wikileaks He had acted as a whistleblowerand should be treated as such CoE rapporteur Dick Marty wrote in the report which was due to besubmitted to the CoEs Parliamentary Assembly The soldier is currently in a US military prisonawaiting trial for passing restricted material to the controversial website

But the report praised Mr Manning and Wikileaks itself for uncovering evidence of renditionThe CoE represents 47 member-states including both EU countries and Russia and other ex-Sovietstates Mr Martys report focused on the record of Western states explaining that it was based oninvestigations into European links to the controversial US policy of rendition for terrorism suspectsThe CIA allegedly flew terror suspects around the world for interrogation in the years after 911 holdingthem in secret prisons in Europe and elsewhere

No licence to kill

In his 48-page report - entitled Abuse of State Secrecy and National Security - Mr Marty looked at thelevel of control exercised by European states over their security services He urged all states to useindependent parliamentary committees to oversee the work of their secret services saying this was of vital importance for the rule of law and democracy Mr Marty argued that Western governments wereusing the notion of state secrecy to shield their intelligence services from accountability for seriousviolations committed during anti-terrorist operations We consider that this is simply unacceptablehe wrote

A licence to kill (or to abduct and torture) only exists in certain films and in dictatorialregimes In democratic systems parliaments as representatives of the people have a right and duty toknow what the government is doing in the name of the people Mr Marty praised investigative journalists and non-governmental organisations for their work in exposing abuses of authority Stressing

the fundamental role whistleblowers had to play in an open society he warned against a real cult of secrecy as an instrument of power

While it was up to the courts to decide if Bradley Manning had committed any crime he wrotethe CoE was indebted to him for the publication of a recording of a helicopter attack in Iraq in whichthe crew seems to have intentionally targeted and killed civilians

Thanks to Mr Manning he said a large number of embassy reports had allowed us to learnsignificant details of important recent events which are obviously of general interest We therefore join Amnesty International in expressing our worries as to the treatment he receives Mr Marty wrote inthe draft report[Article continues here httpwwwbbccouknewsworld-europe-14820145]Comment This report demonstrates that Dick Marty is not as De Gaulle would say a serious man To

suggest that Bradley Manning is a hero and intelligence agencies bent on defeating terrorists arecriminals should say it all Manning knowingly violated his oath and willfully provided enormousamounts of classified material to WikiLeaks For Marty this is a good thing in the name of transparencyMarty always injudicious and anti-American in his remarks is now moving at warp speed into crackpotterritory

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2742

Al Qarsquoida amp its Affiliates| back to top |

Al Qaeda Is Down Not Out

Los Angeles Times | By Amy Zegart 7 September 2011

US talk of defeating terrorism is dangerously prematureTalk of strategically defeating Al Qaeda is all the rage in the White House these days Defense

Secretary Leon Panetta used the D-word in July President Obama declared in his new counter-terrorism strategy We can say with growing confidence that we have put Al Qaeda on the path todefeat Compared to the woeful state of the economy terrorism has become the administrations feel-good story of the year

Defeat is a big word It is also dangerously misleading Yes the United States has made greatstrides in the last decade to harden targets improve intelligence and degrade the capabilities of violentIslamist extremists Osama bin Ladens death was a major accomplishment But the fight is nowhereclose to being won and Americas most perilous times may lie ahead Three reasons explain why

The first is that strategically defeating Al Qaeda is not nearly as important as it sounds After911 Al Qaeda morphed into a more complicated decentralized and elusive threat consisting of threeelements core Al Qaeda affiliates or franchise groups operating in places like Yemen and Somalia with

loose ties to the core group and homegrown terrorists inspired by violent extremism often through theInternet in the comfort of their own living rooms

Core Al Qaedas capabilities started degrading in 2001 when the US invaded Afghanistandismantled training camps ousted the Taliban and sent Bin Laden running The CIA has estimated thecore group remaining in the AfghanistanPakistan region to number 50 to 100 fighters The last time BinLaden oversaw a successful operation was 2005 when Al Qaeda struck the London transit system

But plots by homegrowns and franchise groups have risen dramatically in recent years The 2009Ft Hood shooting the worst terrorist attack on US soil since 911 was the work of a homegrownterrorist The mastermind of the 2010 Times Square car bomb plot was a naturalized American citizentrained by the Pakistani Taliban not Al Qaeda Another franchise group Al Qaeda in the ArabianPeninsula was behind the foiled 2009 Christmas Day underwear bomber aviation plot and the 2010

plot to explode tampered printer cartridges aboard cargo planes The Bipartisan Policy Center reported11 violent Islamist extremist terrorist incidents against the US homeland in 2009 the most since 911Nearly all involved what former CIA Director Mike Hayden calls a witches brew of radicalizedAmericans and franchise groups

The second reason why talk of defeat is premature has to do with weapons Terrorism againstAmericans is nothing new The potential for terrorist groups to acquire weapons of mass destruction isIn 1995 a Japanese cult released sarin nerve gas in the Tokyo subway killing 12 people and injuringthousands It was the first WMD terrorist attack in modern history and it sparked a wave of presidentialterrorism commissions years before Bin Laden became a household name

It is this specter of the lone fanatic or small group armed with the worlds most devastatingweapons that keeps experts up at night In 2005 60 leading nuclear scientists and terrorism experts were

asked how many believed the odds of a nuclear attack on the US were negligible Only three or fourhands went up most were far more pessimistic Today there is enough nuclear material to build120000 weapons As long as fissile material is poorly stored and rogue states like Iran and North Koreacontinue their illicit weapons programs nuclear terrorism remains a haunting possibility

The third reason is that the FBI has not yet become a first-rate domestic intelligence agencyAnalysts whose work is vital to success are still second-class citizens labeled support staff alongsidesecretaries and janitors and passed over for key jobs including running the bureaus intelligence unitsThe FBIs information technology is so antiquated it belongs in a museum And the old crime-fighting

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2842

culture still lives There is now a move afoot to shrink new classified facilities so that agents dont haveto waste time away from their cases to read intelligence documents thereStrategically defeating Al Qaeda sounds too good to be true Because it is Amy Zegart is a senior fellow at Stanfords Hoover Institution and the author of Eyes on Spies

Congress and the United States Intelligence Community

US Counterterror Chief Al-Qaida On Steady Slide

Bostoncom | 31 August 2011

White House counterterrorism chief John Brennan said al-Qaida is on a steady slide after the death of al-Qaidas latest second-in-command in Pakistan Brennan told The Associated Press on Wednesdaythat its a huge blow in the first official White House comment since Atiyah Abd al-Rahmans reportedkilling by CIA drone strike in Pakistans tribal areas last week

Al-Qaida is sort of on the ropes and taking a lot of shots to the body and the head Brennansaid This is a time not to step back and let them recover a message he says hes sending to hiscounterparts in Pakistan[Article continues herehttpwwwbostoncomnewsnationwashingtonarticles20110831us_counterterror_chief_al_qaida_on_steady_slide ]

Al-Qaeda (AKA Al-Qaida Al-Qarsquoida)

Council on Foreign Relations | 29 August 2011

ldquoAl-Qaeda an international terrorist network is considered the top terrorist threat to the United StatesThe group is wanted for its September 11 2001 attacks on the World Trade Center and the Pentagon aswell as a host of lesser attacks To escape the post-911 US-led war in Afghanistan al-Qaedas centralleadership fled eastward into Pakistan securing a safe haven in loosely governed areas there In July2007 US intelligence agencies found that the organization was regrouping and regaining strength inthese tribal areas along the border with Afghanistan though targeted killings of senior al-Qaeda leadershave since diminished the groups command and control capabilities In February 2009 Director of National Intelligence Dennis C Blair told lawmakers that the groups core is less capable and effective

than it was a year ago The killing of al-Qaedas top leader Osama bin Laden by US forces in Pakistanin May 2011 served a significant blow to the organization but analysts say al-Qaeda remains deadlywith its networks spread all over the world Plus a number of affiliated groups have gained prominencein recent years complicating the task of containing the organizationrdquo

[Article continues here httpwwwcfrorgterrorist-organizationsal-qaeda-k-al-qaida-al-qaidap9126]

Al Qaeda In The Islamic Maghreb

CSIS | 1 September 2011

ldquoAl Qaeda in the Islamic Maghreb (AQIM) emerged from a decades-long militant Islamist tradition inAlgeria In 1998 the Salafist Group for Preaching and Combat (Groupe Salafiste pour la Preacutedication etle Combat or GSPC) broke away from the Armed Islamic Group (GIA) because of the GIArsquos extensive

targeting of civilians Gradually the GSPC evolved to encompass global jihadist ideology in addition toits historical focus on overturning the Algerian state In 2006 the GSPC officially affiliated with alQaeda core soon rebranding itself as al Qaeda in the Islamic Maghreb In the following years AQIMwas able to conduct a small number of large-scale attacks most notably its 2007 bombing of the UNheadquarters in Algiers In recent years counterterrorism pressure and weak governance have combinedto shift the center of AQIMrsquos presence to the Sahara-Sahel region AQIM continues to make its presenceknown through smuggling operations kidnappings and clashes with security forces in the desert In thecoming years general instability within the region could allow AQIM to further expand its influencerdquo[Complete article is available here httpcsisorgfilespublication110901_Thornberry_AQIM_WEBpdf ]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2942

AQ Strategy

The Assynt Report | 11 August 2011

Executive Summary Al-Qaedarsquos broad objectives remain unchanged in the wake of bin Ladenrsquos death There

are nonetheless growing questions over al-Qaedarsquos capability Longstanding paranoiaover the use of electronic communications is heightened by the ongoing US dronecampaign whilst attacks against the West have generally been disrupted at an early stage

The Pakistani Talibanrsquos attack on a Karachi naval base in May 2011 was a significantmilitary success and the first major act of revenge for bin Ladenrsquos killing Furtherattempts to avenge his loss are certain

All parts of al-Qaeda are working within a cohesive framework with the ultimate aim of restoring the Islamic Caliphate (Khilafa) The strategic plan to support this aim wasdrafted by 40 of al-Qaedarsquos brightest thinkers in Kandahar Afghanistan in November1999 This plan consists of four phases each seven years long leading to the dissolutionof corrupt regimes and the union of all newly-liberated states within the Khilafa

Apart from mounting strategic operations al-Qaedarsquos role is to be the inspiration for atruly global jihadist movement It seeks to achieve this through provision of trainingbeing a role model for others to follow extending acceptance and adoption of its tactics

particularly suicide bombings and professionalising jihadist media to build a commonbrand and message between hitherto separate groups

Between the late 1990s and 2003 the organisation was primarily devoted to classicinternational terrorism Most effort is now spent fighting insurgencies from North Africato South Asia The way in which this strategy helps to spread the struggle has been seenin North-West Africa where the initial development of al-Qaeda in the Islamic Maghrebwas in part fed by men returning from fighting with al-Qaeda in Iraq

Since mid-2009 al-Qaeda and its affiliates have increasingly encouraged jihadist-sympathisers resident in Western countries to engage in violence themselves withoutcentral direction or training making surveillance more difficult

One of the keys to awakening the spirit of jihad was the success in portraying the US and

its allies as Crusaders in the Muslim world Al-Qaedarsquos strategy essentially requires thatthis process be kept running until the forces of jihad have grown large enough to launchsuccessful liberation operations

Despite its successes in Afghanistan al-Qaedarsquos credibility has suffered both from its failure to landanother strategic blow on the West on the scale of 911 and also excessive Muslim casualties in someoperations Similarly al-Qaeda in Iraq was set back by its excessive sectarian zeal and local resentmentat the foreign fighter presence In turn this affected the movementrsquos funding from the Gulf

Analysis Sub-Saharan African Leaders Media Focus On Threats Prior to 911

OSC Feature | Sub-Sahara Africa -- OSC Analysis 6 September 2011Statements by Sub-Saharan African leaders and African media reports on terrorism prior to the 10thanniversary of 911 focus on the growing threats from local extremists and Al-Qaida affiliatesparticularly in West Africa with little direct commentary on the anniversary or US counterterrorismpolicies This focus on domestic threats suggests that counterterrorism messages expressing solidaritywith African nations and acknowledging the evolving terrorist threat on the continent would have thegreatest resonance with African audiences

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3042

Leaders Stressing Determination To Counter Local Threats African leaders public statements reflect an ongoing concern about the threat of terrorism on thecontinent and a strong commitment to find ways to combat this threat

Nigerian President Goodluck Jonathan emphasized the governments commitment tovigorously combat terrorism following the 26 August bombing of the UN office inAbuja by Nigerian extremist group Boko Haram reported the Paris-based news agencyAFP President Jonathan is hosting Liberian President Ellen Johnson Sirleaf and otherforeign dignitaries for a three-day forum on terrorism and economic crimes the widelyread Lagos-based independent daily The Guardian reported on 4 September

Malian President Amadou Toumani Toure launched a Special Program for PeaceSecurity and Development on 9 August stating that development remained the mostviable solution to counter threats to the countrys stability reported Malis state-owneddaily LEssor[ 3] The program aimed to undermine support for Al-Qaida in the IslamicMaghreb (AQIM) according to Burkinabe web portal Lefasonet on 11 August

Somali Prime Minister Abdiweli Muhammad Gas stated on 23 August that theTransitional Federal Government planned to remove Al-Shabaab from the central andsouthern regions in Somalia with the goal of restoring peace within one year so the

country can hold national elections according to the Puntland-based Garowe Online

Experts Media Highlight New Capabilities Tactics

African experts and media outlets are warning about the evolving nature of terrorist organizations on thecontinent the terrorists pursuit of new targets and tactics and their potential for taking advantage of regional instability

Leading South African think tank the Institute for Security Studies stated on 29 Augustthat Boko Harams attack on the UN in Abuja completes Boko Harams metamorphosisinto an international terrorist group Since December 2010 Boko Haram had killed over600 people in over 70 attacks against Nigerian targets according to the think tank buthad not previously targeted Western or international interests

A 26 August article on the popular Malian web portal Maliweb voiced concern thatAQIM could benefit from Tuareg mercenaries many of whom were recently returningfrom fighting in Libya and could benefit from an increase in arms trafficking through theSahel during the Libyan conflict

Ugandas privately owned Daily Monitor reported on 19 August that AU forces inSomalia warned that Al-Shabaab planned to increase the number of kidnappings andbomb attacks as part of its new strategy to shift from controlling territory in Mogadishuto conducting more of an insurgent campaign

Concern Over Al-Qaida Presence Terrorist Collaboration

West African official statements and media reports reflect a growing concern over an increased Al-

Qaida presence in West Africa and collaboration with AQIM Al-Shabaab and Boko Haram

Nigerian security services reported that the suspected mastermind behind the 26 Augustbombing of the UN office in Abuja was a Boko Haram member with close links to Al-Qaida and Al-Shabaab according Nigerias privately owned Daily Sun

A 28 August report in the privately owned daily Nigerian Tribune claimed that the 26August bombing in Abuja was part of Al-Qaidas plans to mark the 10th anniversary of 911 and called Boko Haram Al-Qaidas ally in the region

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3142

An 8 August commentary in Burkina Fasos LObservateur Paalga said that reports of Boko Haram collaboration with Al-Shabaab and AQIM could indicate that Al-Qaida isextending its African tentacles Abdourahmane Dieng security division chief of theEconomic Community of West African States said the collaboration represented a veryserious threat according to Senegals progovernment Le Soleil on 5 August

Messages Likely To Resonate With African Audience

Sub-Saharan Africas increasing concern about the shifting nature and potential strengthening of theterrorist threat on the continent suggests that messages directly addressing the impact of terrorism onAfricans the increasingly complex nature of the threat and the need for multilateral cooperation againstterrorism are most likely to resonate with Africans

Messages expressing solidarity and sympathy for Africans affected by Boko Haram Al-Shabaab and AQIM would almost certainly resonate with a broad African audience

African political and military leaders would probably welcome acknowledgement of thecomplex and changing nature of terrorism on the continent and recognition of theirinitiatives and commitment to countering violent extremism

African leaders and medias concern about potential collaboration between Boko Haram

Al-Shabaab and AQIM suggest that they would be open to improving multilateral andcross-regional sharing of lessons learned and strategies to counter the intensification of terrorism within Africa

Aviation and Maritime Security| back to top |

Bomb Threats Force Jets To Land

Associated Press | 7 September 2011

Both landed safely one landed in Ankara Ataturk International Airport and the other at Kuala LumpurTwo flights operated by Pakistans state-owned airline received bombs threats on Wednesday

and both landed safely one in Turkey the other in Malaysia officials said No bombs were found The

first flight was headed for Manchester England when it was notified of the threat near the Bulgariancapital of Sofia The crew contacted the control tower in Istanbul to seek permission for the landingstate-run Anatolia news agency reported Authorities quickly evacuated all 378 passengers from theBoeing 777-300ER aircraft after it parked at a remote corner of the International Ataturk Airport andbomb squads began searching the plane with sniffer dogs Anatolia reported PIA spokesman MashoodTajwar confirmed the flight received a threat and landed All passengers were safe A police searchturned up no bomb officials said Later a second PIA flight from Islamabad to Kuala Lumpur alsoreceived a bomb threat It landed in Kuala Lumpur and all the passengers disembarked safely saidTajwar The UK-bound Pakistan International Airlines plane was forced to make an emergency landingat Ataturk Airport in Istanbul after receiving a bomb threat Malaysias airports authority said thepassengers were being screened and the plane was isolated in a parking area while being searched bypolice No bomb was found

It said the plane carried 164 passengers and 13 crew Azmi Murad senior general manager forthe authority said the Pakistani airline informed it that the warning came by email Mr Tajwar gave nodetails on the nature of the threat or how it was delivered Pakistan is home to al Qaedas top leadershipMilitants who trained there have been responsible for many of the attacks and failed plots in the USand Europe since Sept 11 2001 when planes hijacked by al Qaeda militants destroyed the World TradeCenter in New York and crashed into the Pentagon The bomb threats came four days before the 10thanniversary of 911 but there was no apparent link to Islamist militants who typically do not alertauthorities in advance The FBI and Homeland Security department issued warnings last weekend aboutal Qaeda threats to small airlines

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3242

Commentary amp Opinion| back to top |

From Terror Group Founder To Libyan Rebel Military Commander

ABCNews | 29August 2011

The same man who triumphantly led Libyan rebels into Gadhafis compound last week first came to theattention of the US intelligence community years ago - as a founder of a terror group

Abdelhakim Belhaj who was recently appointed to Tripolis rebel military council was one of the original founders of the Libyan Islamic Fighting Group an anti-Gadhafi group which was laterdesignated by the US State Department as a terrorist organization with links to al Qaeda according toUS government reports

We proudly announce the liberation of Libya and that Libya has become free and that the ruleof the tyrant and the era of oppression is behind us a victorious Belhaj told reporters after the stormingof Gadhafis Bab al-Aziziya compound last week Ousting Gadhafi had been the main objective of theLIFG since its inception in the early 1990s even if some of the fighters believed that meant puttingAmericans in the crossfire

The group carried out operations against the Libyan government including at least four suspectedassassination attempts against Gadhafi in the 1990s and was also believed to be connected to a series of suicide bombings in Casablanca Morocco in 2003 the US State Department reported As relationsbetween the US and Gadhafi improved in the mid-2000s some LIFG leaders cultivated relationshipswith top al Qaeda leaders including Osama bin Laden and were suspected of funneling fighters to Iraq tocarry out operations against US soldiers

When the LIFG was designated a terror organization in 2004 it was meant as a gesture of solidarity with the Libyan government according to a March 2011 congressional report

Contrary to several US government reports Libyan rebel ambassador to the US Ali Aujalitold ABC News that the LIFG was never connected to al Qaeda and did not carry out terrorist operations

They were only opposed to Gadhafi during his rule and paid the price for that by beingoppressed by the regime Aujali said

The CIA first publicly voiced its concerns about the connection between the LIFG and al Qaedain 2004 when then-director George Tenet testified before the Senate Select Committee on Intelligenceand listed the LIFG among groups that represented an immediate threat [that] has benefited from alQaeda links[Article continues here httpabcnewsgocomBlotterterror-group-founder-libyan-rebel-military-commanderstoryid=14405319]

Interview With Saudi Sheik Wajdi Al-Ghazawi

MemriTVcom

Sheik Wajdi al-Ghazawi owner of al-Fajr TV criticizes extremist atmosphere in Saudi Arabia and saysafter 911 They Handed Out Sweets on the Streets of Mecca

Following are excerpts from a statement by Saudi Sheik Wajdi Al-Ghazawi owner of Al-FajrTV which was posted on YouTube on August 4 2011

Wajdi Al-Ghazawi When Al-Qaeda and Osama Bin Laden were at the height of their mightthey were extremely popular in Saudi Arabia From mosque pulpits across Saudi Arabia preacherswould pray for their success Moreover from the pulpits of the most important mosques ndash the Al-HaramMosque in Mecca and the Nabawi Mosque in Al-Madina ndash direct prayers for the success of Al-Qaedawere made during the days of the bombing of Tora Bora Oh Allah help our brothers in AfghanistanThese supplications were made during evening prayers as well as Friday prayers The preachers wouldpray for them in violation of the ministrys instructions

When the twin towers in New York were attacked they handed out sweets on the streets of Mecca By Allah they did I witnessed this myself The young people bowed in prayer and hugged one

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3342

another out of joy People were in heaven because of these young men who destroyed America andbombed this idol Am I right or not Was it like that or not

Back then when the Taliban broke off a piece of the nose of the Buddha statue which was hewnin the mountain an entire sermon was dedicated to it in the mosque in Mecca and the preacher was laterreprimanded for this sermon The entire Saudi people supported and loved Al-Qaeda

This went on until our brothers in Al-Qaeda ndash and I dont know what was going through theirminds ndash began to carry out operations inside Saudi Arabia Thats when we all raised our hands andsaid Youve gone too far We wont support you in this

The atmosphere here in Saudi Arabia is one of extremism It is characterized by focusing onminor details Many things are forbidden Yes maybe they are indeed forbidden but by forcing peopleto avoid them and by acting as if these were major sins an atmosphere was created that gave rise toextremist youth who might act recklessly at the most trivial provocation

For instance we blew out of proportion the issue of music the issue of smoking or the issue of hanging pictures in public places True there are clear texts on these issues but the young peopleembraced these issues as if they were fighting usury fornication or alcohol No these are not among theseven major sins So our society has become extreme

This extremist atmosphere has given rise to people who accuse others of heresy and people whopurport to be waging Jihad It has created genes that gave rise to cells of Al-Qaeda and other terrorists

We must examine our breeding ground in which these young men were sownBy Allah what can possibly emerge from such an atmosphere Muftis who accuse others of

heresy sheiks who incite and young people who bomb Am I right or not[Complete clip is available here httpwwwmemritvorgclipen3099htm]

Legal Aspects amp Lawfare| back to top |

Revisiting A Stale Counterterrorism Law

Council on Foreign Relations | 1 September 2011

ldquoNearly a decade after 911 the United States still relies on the 2001 Authorization for the Use of Military Force (AUMF) for the killing and detention of those considered responsible for or associatedwith the terrorist attacks But CFR national security law expert John Bellinger says it is becomingincreasingly difficult for the Obama administration to justify some of its counterterrorism operationsunder this limited statutory authority It has been used in defense of actions including drone attacks onindividuals as well as the targeting of groups in Yemen and Somalia that may have only the mosttenuous affiliation or association to the 911 attack A revised AUMF should clarify those operations aswell as the issue of detention specifically which individuals can be detained for how long and subjectto what processes There also needs to be greater effort at the international level he adds to fill thegaps in the law that covers conflicts between states and non-state actorsrdquohelliprdquo[Complete article is available here httpwwwcfrorgcounterterrorismrevisiting-stale-

counterterrorism-lawp25742]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3442

Narco-Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector[Complete article is available here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Mexicos Cartels Move Into Extortion

At a construction site of an apartment building in the heart of the Mexican capital a company engineerruns through his weekly payroll sheet He has salaries written out for carpenters bricklayers andelectricians At the bottom of the sheet is a notation of $200 for ldquosecurity servicesrdquo next to a nicknameldquoEl Indiordquo mdash the Indian [Complete article is available here

httpwwwtucsonsentinelcomnationworldreport090611_mexico_cartels_bribesmexicos-cartels-move-into-extortion ]

Seven Die In Mexican Pacific Port City

Latin American Herald Tribune

Seven people died in separate shootings in Mazatlan a port city in the northwestern Mexican state of Sinaloa with some of the incidents drug-related a police spokesman told Efe [Complete article is available herehttpwwwlahtcomarticleaspCategoryId=14091ampArticleId=423061]

Tijuana Violence Slows As One Cartel Takes Control

BorderlandBeatcom

Mexicos famously seedy border city of Tijuana is enjoying a lull in drug murders as the countrys mostpowerful cartel gains the upper hand over its rivals [Complete article is available here httpwwwborderlandbeatcom201109tijuana-violence-slows-as-one-cartelhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3542

Network Notes| back to top |

Canadian data foreign threats Spying in the digital age (Suggested by a reader in Lithuania ndash thanks) Globe and Mail | By Colin Freeze 31 July 2010

A government spy agency thatrsquos prohibited from monitoring Canadian citizens is now usingldquoinformation about Canadiansrdquo to zero in on foreign threatsThe ambiguous statement found in a new government report detailing the activities of CommunicationsSecurity Establishment Canada could sanction a range of intelligence-gathering activities ndash includingthe controversial practice of mining ldquometadatardquo from digital communications

Metadata ndash often called data about data ndash are found in e-mails and their attachments and containdigital signatures that can reveal when where and by whom documents were created

The collection of metadata has caused controversy in other countries but never in Canada wherethe Communications Security Establishment Canada operates as an ultra-secretive agency About theonly thing that is known about the classified practices is that they were halted and resumed after someldquomajor changesrdquo including directives signed by Defence Minister Peter MacKay

ldquoI cannot comment on specific operational activitiesrdquo Adrian Simpson a CSEC spokesman toldThe Globe He stressed that reviews upheld that the activities in question were ldquocarried out inaccordance with the law ministerial requirements and CSECrsquos policies and proceduresrdquo

ldquoCSEC is prohibited from directing its activities at Canadians anyone in Canada or Canadiansanywhere in the worldrdquo he said

For decades signals-intelligence agencies in the West have been allowed to safeguard nationalsecurity by eavesdropping on foreignersrsquo conversations Spies can whatever phone lines and satellitesignals they can so long as they never listen in on fellow citizens

But in the digital age governments run increasingly sophisticated dragnets scooping up andscouring through millions of intercepted Internet conversations daily Such practices create legalambiguities

ldquoThe whole issue of what constitutes boundaries for signals-intelligence agencies in cyberspaceis a big debate right nowrdquo said Rafal Rohozinski a security expert affiliated with the University of Torontorsquos Munk School

A watchdog agency that reviews the CSECrsquos activities released an annual report to Parliament onJuly 20 ldquoWhen other means have been exhausted CSEC may use information about Canadians when it

has reasonable grounds to believe that using this information may assist in identifying and obtainingforeign intelligencerdquo it reads

Sometimes collecting metadata is relatively benign It can involve aggregating sets of data tospot trends much like the way meteorologists discern national forecasts from localized information

For example while CSEC canrsquot usually monitor the communications of specific Canadian terrorsuspects it can glean insights by zooming out for big-picture patterns One way to do that MrRohozinski said would be to look at data flows between Canadian cities and Yemen where an Internet-savvy al-Qaeda offshoot works to recruit Westerners

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3642

Metadata however can be more revealing Documents that circulate on the Internet travelaround like postmarked letters marked with return addresses ndash e-mails and attachments have embeddedcodes that speak to the who where and when behind their creation

The US National Security Agency found itself mired in controversy a few years go after itskirted domestic-spying bans by secretly upholding that this sort of American metadata was fair gamedistinct from communication contents

Therersquos little to suggest the CSEC would go that far The federal agencyrsquos activities are reviewedby a watchdog body now headed by a former Federal Court of Appeal judge Robert Deacutecary appointedlast year wrote in his annual report that he was satisfied the CSEC activities in question are lawful evenif his predecessors felt them borderline

ldquoThis was the first review of these activities since hellip their resumption under new policiesrdquo thewatchdogrsquos report says It concludes that the surveillance activities are ldquoin accordance with the lawrdquo andfollow ldquomajor changes to certain policies procedures and practicesrdquo

Much of the concern arises from the possibility that CSEC could hand over metadata intelligenceto domestic law-enforcement and security agencies

As it stands the RCMP and CSIS have to develop their domestic investigations before coming toCSEC ndash usually with warrants ndash if they want specific intelligence The rules guiding handovers are strictbecause even though all agencies run surveillance operations they do so under vastly different

mandates and legal standardsThe spy agency however stood by its practicesldquoCSEC is extremely diligent when it comes to the privacy of Canadiansrdquo Mr Simpson said

[complete article is available here httpwwwtheglobeandmailcomnewsnationalcanadian-data-foreign-threats-spying-in-the-digital-agearticle2113772 ]

Cyber Attacks Against NATO Then And Now

New Atlanticist | 6 September 2011

ldquoNow that NATOrsquos Operation UNIFIED PROTECTOR over Libya is winding down it is worth

noting how few cyber incidents were directed in protest against the Alliance Certainly there was a

cyber component to the liberation of Libya but it was more about content and Internet freedom (the

most newsworthy elements here were the role of social media and the Libyan government taking largeparts of the nation offline) But compared to past history NATO cyber defenders had a relatively easy

time

ldquoNATO has not however had an easy 2011 Although there were three significant incidents we

know about none seemed to have been in direct response to operations over Libyahelliprdquo

[Complete article is available here httpwwwacusorgnew_atlanticistcyber-attacks-against-nato-then-

and-now]

The Calm Before The Storm

Foreign Policy | By Joel Brenner 6 September 2011

Cyberwar is already happening -- and its about to get much much worse A veteran cyberwarriorexplains how America can prepare itself

Revelations of wholesale electronic fraud and massive data heists have become weekly evendaily affairs A multinational electronics corporation loses personal information on more than 100million customers Cyberthieves break into an international bank counterfeit credit balances and lootATMs in four countries grabbing $9 million in just a few hours International gangs spread maliciouscode that conscripts unwitting computers into zombie armies of hundreds of thousands of similarlyenslaved machines Criminals then rent these armies called botnets as easily as you can buy a time-sharing arrangement in a beach condo No wonder the vast majority of Internet traffic is spam

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3742

Yet the loss of personal information and related criminal fraud intolerable as they are are theleast threatening face of electronic insecurity The US militarys secret network is penetratedAmericans corporate pockets are being picked clean of the intellectual property that makes the UnitedStates tick And the electricity grid that keeps the lights on and makes everything move is dangerouslyinsecure

In one remote attack on the Pentagons information systems about 10 years ago the Chinesehauled away up to 20 terabytes of information If the information had been on paper theyd have neededa line of moving vans stretching from the Pentagon to freighters docked 50 miles away in Baltimoreharbor just to haul it away Had they done so the military district of Washington wouldve become anactive theater of operations for the first time since 1865 and the Navy wouldve blockaded theChesapeake Bay But the Chinese did it electronically so who noticed

Corporate espionage by both competitors and foreign intelligence services or their surrogates isalso increasing Intelligence officials see this but cant speak openly about the specifics and Im seeingit now in my law practice The victims rarely admit it for understandable reasons Oracle whichsuccessfully sued SAP for theft of its software code was a prominent exception Google was another

When the Chinese penetrated Google in late 2009 -- yes that operation was Chinese and yes itwas done with the blessing of a member of the Politburo -- they werent after customer informationThey were after the source code that makes Google unique Nor was Google the only victim Thousands

of US and Western firms were penetrated in that affair Foreign governments -- and not only theChinese -- understand that they cannot compete with the United States militarily and politically if theycannot compete with it economically so their intelligence services want to steal its corporate intellectualproperty This is the technology that gives America its competitive edge and often it has nothing to dowith defense Ordinary companies with valuable technology are now being targeted by nation-statesThis is a new era National security and economic security have converged

The danger is not limited to the loss of technology and information however The owners andoperators of the North American electricity grid are hooking up their control systems to the Internet asfast as they can Exposing the grid to the Internet makes it marginally more efficient but it also makes itdramatically more vulnerable to disruption If you can remotely penetrate an electronic system to stealinformation you can remotely penetrate it to shut it down or make it go haywire This is why there is no

longer a meaningful difference between information security and operational security And the biggestoperational risk is the grid In contemporary society nothing moves without electricity If the grid goesout the country stops

As the Stuxnet affair demonstrated remotely engineered disruption of industrial control systemsis now a reality That episode involved the successful electronic attack on the centrifuges in the Iraniannuclear program Only a first-class intelligence agency could have pulled that off but the blueprint fordoing it -- the code itself -- is now public Many American industrial control systems run on the samekind of equipment the Iranians were using but unlike the controls on the Iranian centrifuges thecontrols on the US grid are now being connected to the Internet making them easier to disrupt Stuxnetwas a watershed there will be copycats

Other industrial control systems will also be targets Some already are Air traffic control

railroad switches and water and sewage systems are all electronically controlled now and many arevulnerable If an intruder can break into the right server electronically he can remotely shut downproduction send your goods to the wrong destination and even unlock your doors -- and delete your logentries so he leaves no record of ever having been there

The United States does not lack enemies who would attack it this way Seized al Qaedacomputers contain details of US industrial control systems In 2003 a group affiliated with thePakistani terrorist organization Lashkar-e-Taiba -- the same gang that engineered the 2008 terroristassaults in Mumbai -- plotted to attack the Australian grid Other groups conspired to attack the Britishgrid in 2004 2006 and 2009 Yet the owners and operators of the North American grid continue willy-

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3842

nilly to expose their control systems to the Internet instead of isolating and hardening it This is folly of a high order

Important conclusions for public and corporate policy follow from this vulnerable state of

affairs First cyber insecurity has operational consequences In the current and foreseeable states of technology a high degree of assurance against electronic penetration of anything connected to theInternet is not achievable Large efficient electronically connected organizations and nations aretherefore vulnerable to remotely engineered disruption as well as information theft

Second this risk cannot be eliminated -- but it can be reduced and managed As a nation theUnited States should start by isolating the grids controls from the Internet Undoubtedly there aremarginal efficiencies to be gained by seamless connectivity over a publicly accessible infrastructure butthese gains are usually exaggerated and the risk this connectivity creates is staggering The governmentand the major telecommunications carriers must also make the investment required to re-create themassive redundancies that made the wired telephone network so robust Resilience and swift recoveryshould be the goal If the consequences of cyberattacks were reduced penetration would cease to matter

Third companies that wait for the government to solve their own security problems do so attheir peril The government is broke and the IT backbone is 85 percent private so the governmentdoesnt control it The governments role in altering the status quo will be limited to setting standardsusing its purchasing power to move vendors toward better security and getting its own house in order

The government can neither secure corporate intellectual property nor protect firms against operationaldisruption

Fourth in a world in which everything cannot be protected companies must determine forthemselves what intellectual property and physical assets to isolate and safeguard Those that approachthis task seriously will quickly learn that technology is only one aspect of their insecurity and in manycases the easiest to deal with Unless technology is integrated with personnel practices and operationalsecurity it opens vulnerabilities that its users rarely understand This kind of integration requires theautomated enforcement of reasonable security policies and systematic workforce training and thatoccurs only when management the lawyers and the technologists work closely together This is an old-fashioned management challenge -- not a technological one For their part corporate boards need to takeIT security seriously and launch audits that examine how their systems are actually implemented and

used not merely how they are designed Because as the techies like to put it the weakest link in anysystem is not the silicon-based unit on the desk its the carbon-based unit in the chair Joel Brenner is author of the forthcoming America the Vulnerable Inside the New Threat Matrix of

Digital Espionage Crime and Warfare He has served as the inspector general of the National Security

Agency the national counterintelligence executive and the NSAs senior counsel He now practices law

at Cooley LLP in Washington DC

Cyberattacks Decline Slightly Symantec Report Finds

Dark Reading | 1 September 2011

Organizations worldwide are suffering damages as a result of cyberattacks but interestingly there hasbeen a slight decline in these attacks during the past 12 months according to a new report from

Symantec More than 90 percent of the more than 3300 respondents across 36 countries said theyexperienced tangible losses as a result of a hack with 84 percent reporting financial loss to the cost of abreach Around one-fifth lost at least $195000 in breaches during the past 12 months

Meanwhile Symantec attributes the unexpected bright spot of a decline in breaches toorganizations employing better cybersecurity defenses More than 70 percent of organizations sawattacks in the past 12 months a decline of 5 percent from 2010 And those that experienced anincreasing frequency of attacks dropped from 29 percent in 2010 to 21 percent this year While 100percent last year reported losses from cyberattacks 92 percent did so in 2011 The trend seemscounterintuitive given the rash of high-profile breaches this year More

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 15: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1542

Nigeria

| back to top |

Bomb Explodes In Violence-Torn Nigerian City Residents

AFP | 6 September 2011

A bomb went off Tuesday in Nigerias northeastern city of Maiduguri disrupting a three-week lull inbombings in the violence-torn city local residents said [Article continues here httpnewsyahoocombomb-explodes-violence-torn-nigerian-city-residents-215718081html]

Pakistan

| back to top |

Pakistan Bans Foreign Travel For Those Involved In Bin-Ladin Probe

The News website | Islamabad in English 7 September 2011

A Pakistani commission investigating the circumstances surrounding the killing of Al-Qaidah chief Usamah Bin-Ladin has banned foreign travel for everyone involved in the probe Pakistani daily TheNews part of the Jang group which owns Geo TV reported on 7 September The paper recalled that thecommission had already directed the countrys interior ministry and the intelligence service ISI toensure that the Bin-Ladin family was not repatriated from Pakistan without the consent of the

commission

More Than 20 Killed In Two Suicide Blasts In Pakistans Quetta

Express247 TV | Lahore in English 5 September 2011

At least 22 people were killed and several others injured in two explosions in the south-westernPakistani city of Quetta on 7 September the website of the Dubai-based private Pakistani TV channelARY News reported According to the channel one blast went off near the residence of the FrontierConstabulary and another one near the commissioner office in Quetta According to the report around100 kilograms of explosives were used in each attack (ARY News website Dubai in English 07 Sep 11)

Private Pakistani English-language TV channel Express 247 carried a series of onscreen scrollswhich said police had confirmed that the two blasts were suicide attacks The report cited police sources

as saying that 25 people were killed and more than 40 injured in the attacks (Express247 TV Lahorein English 0654GMT 07 Sep 11)

BBCM notes that the attacks came after the Pakistani intelligence agency said on 5 August that ithad arrested Al-Qaidah commander Younis Al-Mauritani and two of his accomplices in Quetta

Taleban Say Quetta Blasts Revenge For Recent Al-Qaidah Arrests

AFP | 7 September 2011

The Pakistani Taleban have claimed responsibility for the twin suicide bombs in Quetta on 7 Septembersaying they were carried out to avenge the recent arrests of Al-Qadiah operatives in the city Wecarried out the attacks Taleban spokesman Ehsanullah Ehsan told AFP in a phone call from anundisclosed location

Twin Suicide Bombings In Pakistan Leave 23 Dead

Miami Herald

Twin suicide bombers attacked the home of a senior military officer Wednesday in the western city of Quetta injuring him and killing at least 23 people officials said in a possible revenge attack forPakistans recent arrest of a senior al Qaida commander [Article continues here httpwwwmiamiheraldcom201109072394264twin-suicide-bombings-in-pakistanhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1642

Philippines

| back to top |

Moro Splinter Group Threatens US Soldiers In Philippines But Capabilities Limited

Government-Rebel Negotiations Remain Difficult

Assynt | SEAsia Vol VIII No17 7 September 2011

Ameril Umbra Kato a former senior Moro Islamic Liberation Front (MILF) field commander whoresigned late last year because he rejects peace negotiations has threatened to attack US troops as wellas Filipino security forces and other Government targets US and Filipino troops are currentlyundertaking joint training exercises This is an annual event but the first time they have been conductedin central Mindanao However Katorsquos splinter group the Bangsamoro Islamic Freedom Fighters (BIFF)is believed to have as few as 200 members with generally unsophisticated weapons ConsequentlyBIFFrsquos ability to conduct an attack on US forces is likely to be limited

In this period Kato announced the creation of a political wing to his grouping the BangsamoroIslamic Freedom Movement emphasising his split with MILF Nevertheless he has not been expelledfrom MILF and so is protected by the current ceasefire with Manila though MILF has stronglycondemned Katorsquos threat against US troops It is possible that MILF leadership is content to allow himto operate relatively unimpeded in order to gain greater leverage in its negotiations with theGovernment since they can contrast their more compromising approach with BIFFrsquos threatened

violence Meanwhile negotiations between MILF and the Government continue MILF dismissed theGovernmentrsquos latest proposal for an autonomous region but both sides appear committed to continuingtalks

Russia

| back to top |

Suicide Bombings In Grozny Demonstrate Islamic Insurgencyrsquos Continuing Capabilities In

Chechnya

Stirling Assynt Reports | Report FSU Vol IV No17 7 September 2011

A series of suicide bombings in the Chechen capital on 31 August (which left nine casualties includingseven police officers) has severely undermined President Ramzan Karydovrsquos claims to have successfully

eradicated the Islamic insurgency in the Republic The first suicide bomber reportedly detonated hisexplosives in a densely populated area only 150 metres from a local Parliament building while twofurther jihadists targeted first-response units Significantly the attack occurred during the Muslimholiday of Eid a three day celebration which marks the end of Ramadan during which the risk of jihadist attacks is heightened Indeed in addition to this strike in Grozny jihadist militants carried outfurther attacks in Iraq Nigeria and Algeria during Eid this year

Although no group has claimed responsibility for this incident it bears the hallmark of theCaucasus Emirate and so was likely orchestrated by the grouprsquos newly appointed deputy KhuseynGakayev and his brother Vadalov Indeed the Gakayev brothers are believed to have been behind theattack on the Chechen Parliament in October 2010 demonstrating the grouprsquos capabilities and intent tocarry out such strikes Moreover the timing of these bombings ndash only two months after the

reconciliation of the Caucasus Emiratersquos leader Doku Umarov with Chechen commanders (see our 3August Report) ndash supports this assessment and suggests that further incidents and suicide bombings arelikely given this truce

Suspected Militant Killed In Russias Southern Republic

Interfax news agency | Moscow in Russian 7 September 2011 Russias National Antiterrorist Committee said on 7 September a militant had been killed in the Republicof Kabarda-Balkaria the corporate-owned Russian news agency Interfax reported

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1742

Saudi Arabia

| back to top |

Saudi Arabia Shopping Around For Nuke Technology

Haaretz | 8 September 2011

Ties with Pakistan may remain close as Riyadh seeks nuclear assistanceSynopsis This week brought news that Iran on its own has produced new advanced nuclearcentrifuges According to a report of the International Atomic Energy Agency Iran has begun to installthe centrifuges in its uranium enrichment facility in Natanz But the high-level source noted thatdevelopment and production of the new centrifuges began more than seven years ago That does notspeak of a great technological capability on Irans part Israeli intelligence like its American counterpartviews 2014 or 2015 as the date when Iran will be able to build nuclear weapons says the source - if itwants to and no one blocks it In Saudi Arabia in contrast they are a bit more disturbed by thedevelopments in Iran An American Department of Energy delegation visited Riyadh and met with DrHashim Yamani who heads the King Abdullah City for Atomic and Renewable Energy Saudi Arabiawants to equip itself with nuclear reactors to generate electricity The United States is interested inselling Riyadh reactors for two reasons - fat contracts and the ability to keep close tabs on nucleardevelopments in Saudi Arabia The American administration is concerned that with a nuclear programfor civilian uses Saudi Arabia would actually like to prepare the infrastructure so it could switch to

producing nuclear weapons relatively quickly should Iran possess such weapons Defense ministerSultan Bin Abdul Aziz and the countrys former intelligence chief Turki Bin Faisal reportedly favorthe preparation of a secret nuclear program for military uses in cooperation with a Sunni Muslim ally -Pakistan which possesses dozens of atomic bombs Saudi Arabia reportedly funded Pakistans nuclearweapons program in return for Pakistans promise to aid the monarchy in this area if need be

Serbia

| back to top |

Serbia Threatened By Terrorism Says Dacic

Tanjug | 8 September 2011

US officials warned Serbia of possible terrorist activity particularly against foreign interests

After a warning coming from USA officials Serbia will raise the level of security in all facilitiesbelieved to be a possible target of terrorists the countrys Deputy Prime Minister and Minister of InteriorIvica Dacic stated Wednesday in the Palace of Serbia He stated that the security measures will primarilyrefer to the facilities of foreign countries in Serbia and added that special attention will be paid to thesecurity of air traffic US officials assume that there is a possibility of new terrorist attacks in the USAand other countries including Serbia Dacic said following a meeting with Special Representative of the UN Secretary-General for Disaster Risk Reduction Margareta Wahlstrom in Belgrade and a sessionof the republic headquarters for emergency situations

Somalia

| back to top |

Six Killed In Mortar Attack In Somali CapitalShabeelle Media Network website | Mogadishu in Somali 7 September 2011

Six people were killed and several others injured after three mortars landed in Mogadishus Arjantiinneighbourhood in Kaaraan District on the night of 6 September the privately-owned Shabeelle websitereported It quoted an eyewitness as saying that two of the three mortars fired have caused thecasualties inflicting fear in the residents who returned to their homes after Al-Shabab vacated the areaearly last month Kaaraan District is one of the areas taken over by the government forces and AUpeacekeepers

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1842

United States

| back to top |

Post-911 Intelligence Reform Takes Root Problems Remain

Reuters | 8 September 2011

US intelligence agencies will forever be scarred by their failure to connect the dots and detect theSeptember 11 plot but a decade later efforts to break down barriers to information-sharing are takingroot Changing a culture of need-to-know to need-to-share does not come easily in spy circles Someofficials say they worry a decade later about a future attack in which it turns out that US spy agencieshad clues in their vast vaults of data but did not put them together or even know they existed

Yet significant changes both big and small have broken down barriers between agenciessmoothed information-sharing and improved coordination US intelligence experts say From issuing ablue badge to everyone working in the sprawling intelligence community to symbolize a commonidentity to larger moves of mixing employees from different agencies the goal is singular -- to preventanother attack

Were much further ahead David Shedd Defense Intelligence Agency deputy director said of the ability to connect the dots compared with 10 years ago Still signs of a plot to attack the UnitedStates could be missed again My worst fear and I suspect probably one that would come true is that inany future would-be or actual attack God forbid we will be able to find the dots again somewhere

because of simply how much data is collected Shedd said The political response to the failure to stopthe attack was the 2002 creation of the Department of Homeland Security pulling together 22 agenciesto form the third largest US Cabinet department behind the Pentagon and Veterans Affairs

That was followed by the creation in late 2004 of the Director of National Intelligence to overseeall the spy agencies as recommended by the bipartisan 911 commission Previously the CIA directorheld a dual role of also overseeing the multitude of intelligence agencies But in the aftermath of the2001 attacks policymakers decided that was too big of a job for one person to do effectively

Critics argued then and now that the reforms were the governments usual response to crises --create more bureaucracy But others see much-needed change It has been a tremendous improvementsaid Lee Hamilton who was the 911 commission vice chair Its not seamless there are problems andweve still got a ways to go The 2001 attacks involving airliners hijacked by al Qaeda operatives killed

nearly 3000 people in New York Pennsylvania and the Pentagon Various US intelligence and lawenforcement agencies had come across bits of information suggesting an impending attack but failed toput the pieces together The CIA had information about three of the 19 hijackers at least 20 monthsbefore the attacks the National Security Agency had information linking one of the hijackers with alQaeda leader Osama bin Ladens network the CIA knew one hijacker had entered the United States butdid not tell the FBI and an FBI agent warned of suspicious Middle Eastern men taking flying lessons

Have the reforms made America safer Officials say yes and point to the US operation thatkilled bin Laden in Pakistan in May that demanded coordination among intelligence agencies and themilitary But there is an inevitable caveat no one can guarantee there will never be another attack onUS soil On Christmas Day 2009 a Nigerian man linked to an al Qaeda off-shoot tried unsuccessfullyto light explosives sewn into his underwear on a flight to Detroit from Amsterdam It turned out US

authorities had pockets of information about him President Barack Obama used a familiar September 11phrase to describe the 2009 incident as a failure to connect the dots of intelligence that existed acrossour intelligence community

Roger Cressey a former White House National Security Council counterterrorism officialresurrected another September 11 phrase It was a failure of imaginationThe intelligence community had not seen al Qaeda in the Arabian Peninsula a Yemen-based al Qaedaoff-shoot as capable of striking the US homeland If the underwear bomber threat had originated inPakistan they would have gone to battle stations immediately Cressey said Some proposed changesin how authorities would respond to another successful attack still are pending For example creation of

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1942

a common communication system for police firefighters and other emergency personnel remainstangled up in political wrangling in Congress over how to implement it This is a no-brainer Hamiltonsaid The first responders at the scene of a disaster ought to be able to talk with one another Theycannot do it today in most jurisdictions

Former leaders of the 911 commission issued a report card saying nine of its 41recommendations remain unfinished The Office of the Director of National Intelligence hasexperienced growing pains as overseer of the 17 spy agencies churning through four chiefs in six yearsTensions over turf confusion about the DNIs role and problems herding agencies with very powerfulchiefs of their own all came to a crescendo when retired Admiral Dennis Blair the third DNI tried toassert authority over CIA station chiefs who represent the agency in different countries The positionof chief of station is one of the crown jewels of the CIA and they dont want anyone playing with theircrown jewels said Mark Lowenthal a former senior US intelligence official

After a dust-up with CIA Director Leon Panetta who now is defense secretary it was Blair whowas sent packing I think the mistake that some have made is to have viewed the DNI and the Directorof CIA as an eitheror proposition rather than the power of the two working together the DIAs Sheddsaid in an interview in his office There is a history of where that hasnt worked so well I believe it isworking much better today said Shedd who has worked at the DNI CIA and National SecurityCouncil

Intelligence experts say in the current administration Obamas top homeland security andcounterterrorism adviser John Brennan arguably has more power than any of them because he has thepresidents ear Its a reminder that bureaucratic reform or no personalities count in making nationalsecurity policy The improved sharing of secret data has led to yet another set of problems The delugeof bits and bytes has subjected intelligence analysts to information overload as they try to sift through itall for relevant pieces Our analysts still are spending way too much time on finding the informationrather than on the analysis of the information Shedd said There is just too much data to go find it all

The intelligence community wants a system developed that would automatically processinformation from multiple agencies and then make the connections for the analysts

But greater inroads into sharing data across agencies does not guarantee that another attack willbe averted The threat has evolved and officials now are increasingly concerned about a lone wolf plot

by an individual not tied to any militant group that may be more difficult to uncover Those threatswill not come to our attention because of an intelligence community intercept said John Cohen asenior Department of Homeland Security counterterrorism official

They will come to our attention because of an alert police officer an alert deputy sheriff analert store owner an alert member of the public sees something that is suspicious and reports it Cohensaid One measure of the success of post-911 reforms is that a decade later the United States has not hada similar attack Now that could be luck that could be skill we dont really know Hamilton said Butin all likelihood what we have done including the establishment of the Department of HomelandSecurity and the transformation in intelligence and FBI has certainly been helpful[Article continues here ]httpnewsyahoocompost-9-11-u-intelligence-reforms-root-problems-052514320html

Comment the value added provided by the Office of the DNI remains an open question for many withinthe Intelligence Community (IC) and is a favored theme of corridor discussion in IC-member agenciesOn the other hand there is broad agreement among intelligence officials that the degree of cooperationand coordination between intelligence agencies and the character of intelligence sharing has vastlyimproved The fact that there has not been a successful major attack on US soil since 911 ndash not forlack of plotting ndash is in great part testimony to this more effective cooperation

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2042

Jihadist Suggests Striking New York City Bridges

All SITE Intelligence Group | 6 September 2011

A jihadist pointed to what he found to be a weak point of suspension bridges and directed his messageto those who love blasting and explosions In a message posted on the Shumukh al-Islam forum onSeptember 6 2011 the jihadist Abu Suleiman al-Nasser gave a picture of the Verrazano Bridge inNew York on which he drew a red box and arrow on the bridges center He then gave a map on whichhe circled the various bridges in New York City and its boroughs A fellow jihadist offered his ownidea giving a picture of the Hoover Dam and explaining that there is no target more important thandams He wrote that striking a dam may lead to the submerging of cities and the killing of thousands of people and in the case of the Hoover Dam would impact Las Vegas the capital of gambling anddebauchery

Counterterror Veteran is New Deputy FBI Director

Atlanta Journal Constitution | 1September2011

A 24-year FBI veteran with extensive counterterrorism experience Sean Joyce has been named the lawenforcement agencys new deputy director Elevated to the No 2 post within the FBI by Director RobertMueller Joyce replaces Timothy Murphy who is retiring after 23 years with the bureau Since last yearJoyce has been executive assistant director of the national security branch responsible for the FBIs

national security and intelligence operations He earned the Attorney Generals Award for ExceptionalService in 2004 for work on a counterterrorism squad in Dallas In 2008 he was named chief of thecounterterrorism divisions international terrorism operations section with responsibility forinternational terrorism matters within the United States hellip[Complete article is available here httpwwwajccomnewsnation-worldcounterterror-veteran-is-new-1153018html]

Top CIA Official Obama Changed Virtually Nothing

Salon | 1 September2011

PBSs Frontline is airing an examination of Top Secret America on September 6 The show includes arare and lengthy interview with 34-year-CIA-veteran John Rizzo who is described as the most

influential lawyer in CIA historyHere is one quote they include from Rizzo With a notable exception of the lsquoenhanced

interrogationrsquo program the incoming Obama administration changed virtually nothing with respect toexisting CIA programs and operations Things continued Authorities were continued that wereoriginally granted by President Bush beginning shortly after 911 Those were all picked up reviewedand endorsed by the Obama administration hellip[Complete article is available herehttpwwwsaloncomnewspoliticsbarack_obamastory=opiniongreenwald20110901obama]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2142

General Counterterrorism News| back to top |

The Terrible Missed Chance

Newsweek | 4 September 2011

Special Agent Harry Samit of the FBIs Minneapolis field office knew he was looking into the eyes of aterrorist It was early afternoon on Friday Aug 17 2001 Across from him sat Zacarias Moussaoui a33-year-old French-born student arrested the day before for overstaying his visa Moussaoui had paidmore than $8000 in cash that summer to sit in a cockpit simulator in a flight school in the suburbs of Minneapolis and learn - in a matter of days - the basics of how to fly a 747-400 Samit a formerintelligence officer at the Navys celebrated Top Gun flight school felt sure the man across the desk from him was a Muslim extremist who was part of a plot to hijack a commercial jetliner filled withpassengers The trick Samit wrote in a soon-to-be-released excerpt of a book hes written about thecase was getting Moussaoui to admit this and reveal details and associates to allow us to stop the plot

Surely the bureau brass in Washington would share his concern Samit thought He was wrongThat same day halfway across the country in the fluorescent-lit hallways of the J Edgar Hoover

FBI headquarters building in Washington counterterrorism supervisors were treating Samits firstreports about Moussaoui with skepticism even contempt Michael Maltbie a DC counterterrorism

specialist insisted repeatedly in the days after the arrest that there was no clear link between Moussaouiand Al Qaeda - the link needed for a warrant Maltbie thought Moussaoui was a dirty bird he latertold investigators but favored deporting him to France

Believing a hijacking might be imminent Samit appealed to his boss in Minneapolis SpecialAgent Greg Jones Jones picked up the phone on Aug 27 and called Maltbie at FBI HQ

Moussaoui he said might be part of a plot to get control of an airplane and crash it into theWorld Trade Center or something like that

Maltbie scoffed You have a guy interested in this type of aircraft Maltbie replied accordingto FBI documents That is it (Maltbie declined requests for an interview)

At least Maltbie was paying attention Michael Rolince who ran the FBIs InternationalTerrorism Operations Section was arguably the bureaus most important go-between with the White

House on domestic terrorist threats in the summer of 2001 He tells Newsweek he spent less than 20seconds being briefed on the Moussaoui case that August His office was inundated with terrorismprobes he said since Moussaoui was in custody already he posed no immediate threat Did it rise tothe level of something that I would take upstairs Rolince asks The answer is no

At CIA headquarters alarm bells were ringing loudly CIA Director George Tenet was briefedon Moussaoui within days of the arrest receiving a paper with the eye-catching headline IslamicExtremist Learns to Fly But the FBIs acting director that summer and the bureaus most seniorcounterterrorism official were left in the dark[Article continues here httpwwwthedailybeastcomnewsweek20110904the-terrible-missed-chancehtml]

Pan Am Flight 103 - Lockerbie Bombing - al-Megrahi CIA FilesWebwire | 31 August2011

BACM ResearchPaperlessArchivescom has announced the publishing of CIA files related to the PanAm Flight 103 Lockerbie Bombing

The files can be downloaded at no cost at httpwwwpaperlessarchivescompanam103ciahtml The files date from 1984 to 1999 These are the most recent files on Pan Am 103 released by the

CIA This set of files is unique because it includes memos on the direct handling of an intelligencesource This type of information is exempt from the Freedom of Information Act (FOIA) and is not oftenreleased by the Agency

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2242

The files cover information received by the CIA on Abdel Basset al-Megrahi Al-Megrahi is theonly person ever convicted in the Pan AM 103 case The Scottish government in 2009 allowed al-Megrahi to be released from custody and returned to Libya because of his failing health With the recentfall of Muammar Qaddafis regime there have been renewed calls for al-Megrahi to be returned toScottish custody or extradited to the United States and put on trial[Complete article is available here httpwwwwebwirecomViewPressRelaspaId=144692]

Getting The Caucasus Emirate Right

CSIS | August 2011

ldquohellipThis report aims to set straight a rather distorted record It demonstrates the veracity of three vitallyimportant facts usually obfuscated in discussions of the subject (1) the longstanding and growing tiesbetween the CE and its predecessor organization the ChRI on the one hand and al Qaeda (AQ) and theglobal jihad on the other hand (2) the importance of the CE jihadi terrorist network as a united andorganized political and military force promoting jihad in the region and (3) the salience of local culturaland the Salifist jihadist theo-ideology and the influence of the global jihadi revolutionarymovementalliance as key if not the main factors drive the ldquoviolence in the North Caucasusrdquohelliprdquohttpcsisorgfilespublication110829_Hahn_GettingCaucasusEmirateRt_Webpdf

7 Things You Didnrsquot Know About the War on TerrorForeign Policy | By Eric Schmitt and Thomas Shanker 6 September 2011

From an attempt to negotiate with Osama bin Laden to a proposal to threaten to bomb Mecca its been awild decade for the US national security establishment

Our new book Counterstrike The Untold Story of Americas Secret Campaign Against Al Qaeda is in many ways asummary of the past decade of our reporting on the military intelligence community and domestic law enforcement as itentered a new era of Darwinian evolution to counter violent extremism

It also is our deep dive into a decade of American counterterrorism efforts -- from the work of commando trigger-pullers and spies on the ground up to senior political leaders who wanted to defendthe nation (and get re-elected) Our efforts to report and write this book allowed us to uncover many newmissions never discussed before -- and gave us an understanding of how the war on terror had changedover the last decade

Our book assesses the 10 years since 911 as the military divides the fight into tactical missionson the battlefields of modern terrorism then the operational advancements that provided the means tosuccess while not securing final victory and at the top the strategic level of policy debates about howthe nation should combat this threat to its security

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2342

Here are seven vignettes from Counterstrike that offer glimpses into the thinking of policymakers andcommanders in early days after the Sept 11 attacks and how that thinking evolved over the followingdecade into a more whole-of-government approach to combating terrorists

1 Bush Tried to Negotiate with al Qaeda

The George W Bush administration like all of its predecessors swore never to negotiate with terroristsBut it did undertake an extraordinary and extraordinarily secret outreach effort to open a line of communication with Osama bin Laden and al Qaedas senior leadership It was an attempt to replicatehow the United States tried to sustain a dialogue with the Soviet Union even during the darkest days of the Cold War when White House and Kremlin leaders described in private and in public a set of acceptable behaviors -- and described with equal clarity the swift vicious even nuclear punishment forgross violations

In the months after the Sept 11 attacks Bushs national security staff working through theintelligence agencies made several attempts to get a private message to bin Laden and his inner circleThe messages were sent through business associates of the bin Laden familys vast financial empire aswell as through some of the al Qaeda leaders closest relatives a number of whom were receptive toopening a secret dialogue to restrain and contain their terrorist kinsman whom they viewed as a blot on

their name (To be sure other relatives were openly hostile to the American entreaties)According to a senior American intelligence officer with first-hand knowledge of the effort the

response from Osama bin Laden was silence And the effort was suspended

2 Sometimes a Wedding Is Just a WeddingIn the early days after the Sept 11 attacks the CIA and FBI vied to produce the most compellingintelligence reports that tracked suspected terrorist plots The agencies often worked at cross purposessometimes unwittingly At one point in early 2002 both agencies were tracking what American analystssaid were growing preparations for a major wedding somewhere in the Midwest (In terroristvernacular the word wedding is often code for a major attack)

Dribs and drabs on this wedding planning made their way to President Bush from bothagencies independent of each other of course

Finally over the Easter holiday during a video-teleconference with top aides in Washingtonfrom his ranch in Crawford Texas Bush stopped the briefing exasperated by the discrepancies in therival agencies reporting about the suspected threat

George Bob get together and sort this out Bush told his CIA director George J Tenet andFBI director Robert S Mueller III

Bushs instincts were correct When the analysts finally untangled their clues it turned out thatthe ominous wedding really was just that the matrimony of a young man and a young woman fromtwo prominent Pakistani-American families There was no threat There was no plot

3 The Threat to Bomb MeccaAs fears of a second attack mounted following the 911 strikes US government planners franticallycast about for strategies to protect the country Even the most far-fetched ideas had a hearing howeverbriefly In one case some government planners proposed that if al Qaeda appeared ready to attack America again the United States should publicly threaten to bomb the city of Mecca in Saudi Arabiathe holiest site in all of Islam in retaliation Just nuts one Pentagon aide wrote to himself when heheard the proposal The idea was quickly and permanently shelved

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2442

4 The SEAL Raid in Iran That Didnt HappenWhen US forces routed the Taliban government in Afghanistan and forced bin Laden and his toplieutenants to flee many senior al Qaeda leaders including bin Laden and his deputy Ayman al-Zawahri escaped to neighboring Pakistan But a separate group including the al Qaeda leaders sonSaad bin Laden fled to northern Iran where American troops would not pursue them and the Iranianswould likely not detain them But the Shiite clerics running Iran placed the al Qaeda operatives and theirfamily members under virtual house arrest and they became a shield against possible attacks from theSunni-based terrorist organization

One plan in particular illustrated the bold thinking and wildly unrealistic aims of the militarysinitial approach after 911 to kill or capture terrorist leaders The plan called for hunting the eight to 10senior al Qaeda leaders and operatives who had sought refuge in Chalus an Iranian resort town on theCaspian Sea where they had been detained

At the Joint Special Operations Command at Fort Bragg NC military planners drew up optionsfor Navy SEALs to sneak ashore at night using state-of-the-art mini-submarines Once they landed theSEALs would slip past Iranian guards to snatch the al Qaeda leaders Another option called for SpecialOperations helicopters to spirit American commandos into the town and whisk them out again with theirquarry The Americans went as far as conducting two or three rehearsals at an undisclosed locationalong the US Gulf Coast in early 2002 They conducted small-boat insertion exercises involving about

30 Special Operations personnel most SEALs and eventually concluded the mission was feasible if they were provided with more detailed intelligence on the locations of the al Qaeda members and thesecurity around them

The logistics of the mission were daunting Chalus sits at the edge of the Elburz coastal mountainrange about 70 miles north of Tehran and the failed rescue of the American hostages in Iran in April1980 loomed large in commanders memories Eventually Gen Richard B Myers the chairman of theJoint Chiefs of Staff rejected the mission as too risky and too politically volatile Many of the al Qaedaoperatives are reportedly still there

5 Intelligence Hauls of Unusual Size

US intelligence and military commandos have carried out tens of thousands of raids in the decade since911 The amount of material seized from terrorist and insurgent targets has grown to a massive sizeThe Defense Intelligence Agency (DIA) operates exploitation triage centers and giant warehouses forstoring intelligence products -- in war zones rear headquarters in countries like Qatar and back in theUnited States One intelligence analyst said that walking into one of the warehouses for documents andmedia exploitation reminded him of the final scene in Raiders of the Lost Ark when the captured Ark of the Covenant is crated up and rolled into a cavernous storage area that contains all the governmentsother dangerous secrets

All told more than two million individual documents and electronic files have been cataloguedby media type hard copy phone number thumb drive Each is inspected by a linguist working with acommunications analyst or computer expert

The DIA analysts are joined by specialists from other agencies including the FBI and the DrugEnforcement Administration Yet given the overwhelming volume no more than about 10 percent of thecaptured intelligence has ever been analyzed

Intelligence officers say they simply are overwhelmed and untold quality leads may still beburied in the piles of computers digital files travel documents and pocket litter

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2542

6 The Digital Counterjihad Cyberspace is the terrorists ultimate safe haven Its where they recruit raise money and even plotattacks using coded language while playing online video war games The US government fights back

One technique is called false band replacement whereby the intelligence agencies infiltratemilitants networks and post their own material to counter extremist efforts on those same jihadistwebsites The trick is to forge the onscreen trademarks -- web watermarks -- of al Qaeda media sites

This makes messages posted on these sites official and sows dissent and confusion among themilitants

This Internet spoofing can be used in support of more traditional combat missions There is atleast one case confirmed by American officials in which a jihadist website was hacked by Americancyberwarriors to lure a high-value al Qaeda to a surreptitious meeting with extremist counterparts -- onlyto find a US military team in waiting

Getty images

7 First Kill the MullahsUS counterterrorism officials have learned fighting terrorists effectively means targeting specific nodesof that network that support and enable militants who strap on suicide vests This strategy focuses onneutralizing enablers such as the financiers gun-runners and logisticians Among these terror linchpins

are religious leaders who bless attacksHeavenly reward will not await a suicide bomber unless his death and those of his victims is

deemed halal in keeping with Islams sacred sharia law Each militant network has a sharia emir usuallyat the level of a sheikh or mullah In Iraq American commanders specifically killed emirs to throw awrench in a suicide bombing networks

Take him out and suicide bombings from that network are frozen until he is replaced said onemilitary officer with command experience in Iraq hellip[Complete article is available herehttpwwwforeignpolicycomarticles201109067_things_you_didn_t_know_about_the_war_on_terror]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2642

Dick Marty Rendition Report Condemns lsquoCult of Secrecyrsquo

BBC News | 8 September 2011

A report for Europes human rights watchdog has called for greater scrutiny of secret services andsupport for whistleblowers The Council of Europe investigated how countries like Britain GermanyRomania and Lithuania assisted the US with the rendition of terror suspects It said a cult of secrecyhad helped Western governments cover up abuses Defending whistleblowers it singled out USsoldier Bradley Manning accused of passing secrets to Wikileaks He had acted as a whistleblowerand should be treated as such CoE rapporteur Dick Marty wrote in the report which was due to besubmitted to the CoEs Parliamentary Assembly The soldier is currently in a US military prisonawaiting trial for passing restricted material to the controversial website

But the report praised Mr Manning and Wikileaks itself for uncovering evidence of renditionThe CoE represents 47 member-states including both EU countries and Russia and other ex-Sovietstates Mr Martys report focused on the record of Western states explaining that it was based oninvestigations into European links to the controversial US policy of rendition for terrorism suspectsThe CIA allegedly flew terror suspects around the world for interrogation in the years after 911 holdingthem in secret prisons in Europe and elsewhere

No licence to kill

In his 48-page report - entitled Abuse of State Secrecy and National Security - Mr Marty looked at thelevel of control exercised by European states over their security services He urged all states to useindependent parliamentary committees to oversee the work of their secret services saying this was of vital importance for the rule of law and democracy Mr Marty argued that Western governments wereusing the notion of state secrecy to shield their intelligence services from accountability for seriousviolations committed during anti-terrorist operations We consider that this is simply unacceptablehe wrote

A licence to kill (or to abduct and torture) only exists in certain films and in dictatorialregimes In democratic systems parliaments as representatives of the people have a right and duty toknow what the government is doing in the name of the people Mr Marty praised investigative journalists and non-governmental organisations for their work in exposing abuses of authority Stressing

the fundamental role whistleblowers had to play in an open society he warned against a real cult of secrecy as an instrument of power

While it was up to the courts to decide if Bradley Manning had committed any crime he wrotethe CoE was indebted to him for the publication of a recording of a helicopter attack in Iraq in whichthe crew seems to have intentionally targeted and killed civilians

Thanks to Mr Manning he said a large number of embassy reports had allowed us to learnsignificant details of important recent events which are obviously of general interest We therefore join Amnesty International in expressing our worries as to the treatment he receives Mr Marty wrote inthe draft report[Article continues here httpwwwbbccouknewsworld-europe-14820145]Comment This report demonstrates that Dick Marty is not as De Gaulle would say a serious man To

suggest that Bradley Manning is a hero and intelligence agencies bent on defeating terrorists arecriminals should say it all Manning knowingly violated his oath and willfully provided enormousamounts of classified material to WikiLeaks For Marty this is a good thing in the name of transparencyMarty always injudicious and anti-American in his remarks is now moving at warp speed into crackpotterritory

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2742

Al Qarsquoida amp its Affiliates| back to top |

Al Qaeda Is Down Not Out

Los Angeles Times | By Amy Zegart 7 September 2011

US talk of defeating terrorism is dangerously prematureTalk of strategically defeating Al Qaeda is all the rage in the White House these days Defense

Secretary Leon Panetta used the D-word in July President Obama declared in his new counter-terrorism strategy We can say with growing confidence that we have put Al Qaeda on the path todefeat Compared to the woeful state of the economy terrorism has become the administrations feel-good story of the year

Defeat is a big word It is also dangerously misleading Yes the United States has made greatstrides in the last decade to harden targets improve intelligence and degrade the capabilities of violentIslamist extremists Osama bin Ladens death was a major accomplishment But the fight is nowhereclose to being won and Americas most perilous times may lie ahead Three reasons explain why

The first is that strategically defeating Al Qaeda is not nearly as important as it sounds After911 Al Qaeda morphed into a more complicated decentralized and elusive threat consisting of threeelements core Al Qaeda affiliates or franchise groups operating in places like Yemen and Somalia with

loose ties to the core group and homegrown terrorists inspired by violent extremism often through theInternet in the comfort of their own living rooms

Core Al Qaedas capabilities started degrading in 2001 when the US invaded Afghanistandismantled training camps ousted the Taliban and sent Bin Laden running The CIA has estimated thecore group remaining in the AfghanistanPakistan region to number 50 to 100 fighters The last time BinLaden oversaw a successful operation was 2005 when Al Qaeda struck the London transit system

But plots by homegrowns and franchise groups have risen dramatically in recent years The 2009Ft Hood shooting the worst terrorist attack on US soil since 911 was the work of a homegrownterrorist The mastermind of the 2010 Times Square car bomb plot was a naturalized American citizentrained by the Pakistani Taliban not Al Qaeda Another franchise group Al Qaeda in the ArabianPeninsula was behind the foiled 2009 Christmas Day underwear bomber aviation plot and the 2010

plot to explode tampered printer cartridges aboard cargo planes The Bipartisan Policy Center reported11 violent Islamist extremist terrorist incidents against the US homeland in 2009 the most since 911Nearly all involved what former CIA Director Mike Hayden calls a witches brew of radicalizedAmericans and franchise groups

The second reason why talk of defeat is premature has to do with weapons Terrorism againstAmericans is nothing new The potential for terrorist groups to acquire weapons of mass destruction isIn 1995 a Japanese cult released sarin nerve gas in the Tokyo subway killing 12 people and injuringthousands It was the first WMD terrorist attack in modern history and it sparked a wave of presidentialterrorism commissions years before Bin Laden became a household name

It is this specter of the lone fanatic or small group armed with the worlds most devastatingweapons that keeps experts up at night In 2005 60 leading nuclear scientists and terrorism experts were

asked how many believed the odds of a nuclear attack on the US were negligible Only three or fourhands went up most were far more pessimistic Today there is enough nuclear material to build120000 weapons As long as fissile material is poorly stored and rogue states like Iran and North Koreacontinue their illicit weapons programs nuclear terrorism remains a haunting possibility

The third reason is that the FBI has not yet become a first-rate domestic intelligence agencyAnalysts whose work is vital to success are still second-class citizens labeled support staff alongsidesecretaries and janitors and passed over for key jobs including running the bureaus intelligence unitsThe FBIs information technology is so antiquated it belongs in a museum And the old crime-fighting

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2842

culture still lives There is now a move afoot to shrink new classified facilities so that agents dont haveto waste time away from their cases to read intelligence documents thereStrategically defeating Al Qaeda sounds too good to be true Because it is Amy Zegart is a senior fellow at Stanfords Hoover Institution and the author of Eyes on Spies

Congress and the United States Intelligence Community

US Counterterror Chief Al-Qaida On Steady Slide

Bostoncom | 31 August 2011

White House counterterrorism chief John Brennan said al-Qaida is on a steady slide after the death of al-Qaidas latest second-in-command in Pakistan Brennan told The Associated Press on Wednesdaythat its a huge blow in the first official White House comment since Atiyah Abd al-Rahmans reportedkilling by CIA drone strike in Pakistans tribal areas last week

Al-Qaida is sort of on the ropes and taking a lot of shots to the body and the head Brennansaid This is a time not to step back and let them recover a message he says hes sending to hiscounterparts in Pakistan[Article continues herehttpwwwbostoncomnewsnationwashingtonarticles20110831us_counterterror_chief_al_qaida_on_steady_slide ]

Al-Qaeda (AKA Al-Qaida Al-Qarsquoida)

Council on Foreign Relations | 29 August 2011

ldquoAl-Qaeda an international terrorist network is considered the top terrorist threat to the United StatesThe group is wanted for its September 11 2001 attacks on the World Trade Center and the Pentagon aswell as a host of lesser attacks To escape the post-911 US-led war in Afghanistan al-Qaedas centralleadership fled eastward into Pakistan securing a safe haven in loosely governed areas there In July2007 US intelligence agencies found that the organization was regrouping and regaining strength inthese tribal areas along the border with Afghanistan though targeted killings of senior al-Qaeda leadershave since diminished the groups command and control capabilities In February 2009 Director of National Intelligence Dennis C Blair told lawmakers that the groups core is less capable and effective

than it was a year ago The killing of al-Qaedas top leader Osama bin Laden by US forces in Pakistanin May 2011 served a significant blow to the organization but analysts say al-Qaeda remains deadlywith its networks spread all over the world Plus a number of affiliated groups have gained prominencein recent years complicating the task of containing the organizationrdquo

[Article continues here httpwwwcfrorgterrorist-organizationsal-qaeda-k-al-qaida-al-qaidap9126]

Al Qaeda In The Islamic Maghreb

CSIS | 1 September 2011

ldquoAl Qaeda in the Islamic Maghreb (AQIM) emerged from a decades-long militant Islamist tradition inAlgeria In 1998 the Salafist Group for Preaching and Combat (Groupe Salafiste pour la Preacutedication etle Combat or GSPC) broke away from the Armed Islamic Group (GIA) because of the GIArsquos extensive

targeting of civilians Gradually the GSPC evolved to encompass global jihadist ideology in addition toits historical focus on overturning the Algerian state In 2006 the GSPC officially affiliated with alQaeda core soon rebranding itself as al Qaeda in the Islamic Maghreb In the following years AQIMwas able to conduct a small number of large-scale attacks most notably its 2007 bombing of the UNheadquarters in Algiers In recent years counterterrorism pressure and weak governance have combinedto shift the center of AQIMrsquos presence to the Sahara-Sahel region AQIM continues to make its presenceknown through smuggling operations kidnappings and clashes with security forces in the desert In thecoming years general instability within the region could allow AQIM to further expand its influencerdquo[Complete article is available here httpcsisorgfilespublication110901_Thornberry_AQIM_WEBpdf ]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2942

AQ Strategy

The Assynt Report | 11 August 2011

Executive Summary Al-Qaedarsquos broad objectives remain unchanged in the wake of bin Ladenrsquos death There

are nonetheless growing questions over al-Qaedarsquos capability Longstanding paranoiaover the use of electronic communications is heightened by the ongoing US dronecampaign whilst attacks against the West have generally been disrupted at an early stage

The Pakistani Talibanrsquos attack on a Karachi naval base in May 2011 was a significantmilitary success and the first major act of revenge for bin Ladenrsquos killing Furtherattempts to avenge his loss are certain

All parts of al-Qaeda are working within a cohesive framework with the ultimate aim of restoring the Islamic Caliphate (Khilafa) The strategic plan to support this aim wasdrafted by 40 of al-Qaedarsquos brightest thinkers in Kandahar Afghanistan in November1999 This plan consists of four phases each seven years long leading to the dissolutionof corrupt regimes and the union of all newly-liberated states within the Khilafa

Apart from mounting strategic operations al-Qaedarsquos role is to be the inspiration for atruly global jihadist movement It seeks to achieve this through provision of trainingbeing a role model for others to follow extending acceptance and adoption of its tactics

particularly suicide bombings and professionalising jihadist media to build a commonbrand and message between hitherto separate groups

Between the late 1990s and 2003 the organisation was primarily devoted to classicinternational terrorism Most effort is now spent fighting insurgencies from North Africato South Asia The way in which this strategy helps to spread the struggle has been seenin North-West Africa where the initial development of al-Qaeda in the Islamic Maghrebwas in part fed by men returning from fighting with al-Qaeda in Iraq

Since mid-2009 al-Qaeda and its affiliates have increasingly encouraged jihadist-sympathisers resident in Western countries to engage in violence themselves withoutcentral direction or training making surveillance more difficult

One of the keys to awakening the spirit of jihad was the success in portraying the US and

its allies as Crusaders in the Muslim world Al-Qaedarsquos strategy essentially requires thatthis process be kept running until the forces of jihad have grown large enough to launchsuccessful liberation operations

Despite its successes in Afghanistan al-Qaedarsquos credibility has suffered both from its failure to landanother strategic blow on the West on the scale of 911 and also excessive Muslim casualties in someoperations Similarly al-Qaeda in Iraq was set back by its excessive sectarian zeal and local resentmentat the foreign fighter presence In turn this affected the movementrsquos funding from the Gulf

Analysis Sub-Saharan African Leaders Media Focus On Threats Prior to 911

OSC Feature | Sub-Sahara Africa -- OSC Analysis 6 September 2011Statements by Sub-Saharan African leaders and African media reports on terrorism prior to the 10thanniversary of 911 focus on the growing threats from local extremists and Al-Qaida affiliatesparticularly in West Africa with little direct commentary on the anniversary or US counterterrorismpolicies This focus on domestic threats suggests that counterterrorism messages expressing solidaritywith African nations and acknowledging the evolving terrorist threat on the continent would have thegreatest resonance with African audiences

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3042

Leaders Stressing Determination To Counter Local Threats African leaders public statements reflect an ongoing concern about the threat of terrorism on thecontinent and a strong commitment to find ways to combat this threat

Nigerian President Goodluck Jonathan emphasized the governments commitment tovigorously combat terrorism following the 26 August bombing of the UN office inAbuja by Nigerian extremist group Boko Haram reported the Paris-based news agencyAFP President Jonathan is hosting Liberian President Ellen Johnson Sirleaf and otherforeign dignitaries for a three-day forum on terrorism and economic crimes the widelyread Lagos-based independent daily The Guardian reported on 4 September

Malian President Amadou Toumani Toure launched a Special Program for PeaceSecurity and Development on 9 August stating that development remained the mostviable solution to counter threats to the countrys stability reported Malis state-owneddaily LEssor[ 3] The program aimed to undermine support for Al-Qaida in the IslamicMaghreb (AQIM) according to Burkinabe web portal Lefasonet on 11 August

Somali Prime Minister Abdiweli Muhammad Gas stated on 23 August that theTransitional Federal Government planned to remove Al-Shabaab from the central andsouthern regions in Somalia with the goal of restoring peace within one year so the

country can hold national elections according to the Puntland-based Garowe Online

Experts Media Highlight New Capabilities Tactics

African experts and media outlets are warning about the evolving nature of terrorist organizations on thecontinent the terrorists pursuit of new targets and tactics and their potential for taking advantage of regional instability

Leading South African think tank the Institute for Security Studies stated on 29 Augustthat Boko Harams attack on the UN in Abuja completes Boko Harams metamorphosisinto an international terrorist group Since December 2010 Boko Haram had killed over600 people in over 70 attacks against Nigerian targets according to the think tank buthad not previously targeted Western or international interests

A 26 August article on the popular Malian web portal Maliweb voiced concern thatAQIM could benefit from Tuareg mercenaries many of whom were recently returningfrom fighting in Libya and could benefit from an increase in arms trafficking through theSahel during the Libyan conflict

Ugandas privately owned Daily Monitor reported on 19 August that AU forces inSomalia warned that Al-Shabaab planned to increase the number of kidnappings andbomb attacks as part of its new strategy to shift from controlling territory in Mogadishuto conducting more of an insurgent campaign

Concern Over Al-Qaida Presence Terrorist Collaboration

West African official statements and media reports reflect a growing concern over an increased Al-

Qaida presence in West Africa and collaboration with AQIM Al-Shabaab and Boko Haram

Nigerian security services reported that the suspected mastermind behind the 26 Augustbombing of the UN office in Abuja was a Boko Haram member with close links to Al-Qaida and Al-Shabaab according Nigerias privately owned Daily Sun

A 28 August report in the privately owned daily Nigerian Tribune claimed that the 26August bombing in Abuja was part of Al-Qaidas plans to mark the 10th anniversary of 911 and called Boko Haram Al-Qaidas ally in the region

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3142

An 8 August commentary in Burkina Fasos LObservateur Paalga said that reports of Boko Haram collaboration with Al-Shabaab and AQIM could indicate that Al-Qaida isextending its African tentacles Abdourahmane Dieng security division chief of theEconomic Community of West African States said the collaboration represented a veryserious threat according to Senegals progovernment Le Soleil on 5 August

Messages Likely To Resonate With African Audience

Sub-Saharan Africas increasing concern about the shifting nature and potential strengthening of theterrorist threat on the continent suggests that messages directly addressing the impact of terrorism onAfricans the increasingly complex nature of the threat and the need for multilateral cooperation againstterrorism are most likely to resonate with Africans

Messages expressing solidarity and sympathy for Africans affected by Boko Haram Al-Shabaab and AQIM would almost certainly resonate with a broad African audience

African political and military leaders would probably welcome acknowledgement of thecomplex and changing nature of terrorism on the continent and recognition of theirinitiatives and commitment to countering violent extremism

African leaders and medias concern about potential collaboration between Boko Haram

Al-Shabaab and AQIM suggest that they would be open to improving multilateral andcross-regional sharing of lessons learned and strategies to counter the intensification of terrorism within Africa

Aviation and Maritime Security| back to top |

Bomb Threats Force Jets To Land

Associated Press | 7 September 2011

Both landed safely one landed in Ankara Ataturk International Airport and the other at Kuala LumpurTwo flights operated by Pakistans state-owned airline received bombs threats on Wednesday

and both landed safely one in Turkey the other in Malaysia officials said No bombs were found The

first flight was headed for Manchester England when it was notified of the threat near the Bulgariancapital of Sofia The crew contacted the control tower in Istanbul to seek permission for the landingstate-run Anatolia news agency reported Authorities quickly evacuated all 378 passengers from theBoeing 777-300ER aircraft after it parked at a remote corner of the International Ataturk Airport andbomb squads began searching the plane with sniffer dogs Anatolia reported PIA spokesman MashoodTajwar confirmed the flight received a threat and landed All passengers were safe A police searchturned up no bomb officials said Later a second PIA flight from Islamabad to Kuala Lumpur alsoreceived a bomb threat It landed in Kuala Lumpur and all the passengers disembarked safely saidTajwar The UK-bound Pakistan International Airlines plane was forced to make an emergency landingat Ataturk Airport in Istanbul after receiving a bomb threat Malaysias airports authority said thepassengers were being screened and the plane was isolated in a parking area while being searched bypolice No bomb was found

It said the plane carried 164 passengers and 13 crew Azmi Murad senior general manager forthe authority said the Pakistani airline informed it that the warning came by email Mr Tajwar gave nodetails on the nature of the threat or how it was delivered Pakistan is home to al Qaedas top leadershipMilitants who trained there have been responsible for many of the attacks and failed plots in the USand Europe since Sept 11 2001 when planes hijacked by al Qaeda militants destroyed the World TradeCenter in New York and crashed into the Pentagon The bomb threats came four days before the 10thanniversary of 911 but there was no apparent link to Islamist militants who typically do not alertauthorities in advance The FBI and Homeland Security department issued warnings last weekend aboutal Qaeda threats to small airlines

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3242

Commentary amp Opinion| back to top |

From Terror Group Founder To Libyan Rebel Military Commander

ABCNews | 29August 2011

The same man who triumphantly led Libyan rebels into Gadhafis compound last week first came to theattention of the US intelligence community years ago - as a founder of a terror group

Abdelhakim Belhaj who was recently appointed to Tripolis rebel military council was one of the original founders of the Libyan Islamic Fighting Group an anti-Gadhafi group which was laterdesignated by the US State Department as a terrorist organization with links to al Qaeda according toUS government reports

We proudly announce the liberation of Libya and that Libya has become free and that the ruleof the tyrant and the era of oppression is behind us a victorious Belhaj told reporters after the stormingof Gadhafis Bab al-Aziziya compound last week Ousting Gadhafi had been the main objective of theLIFG since its inception in the early 1990s even if some of the fighters believed that meant puttingAmericans in the crossfire

The group carried out operations against the Libyan government including at least four suspectedassassination attempts against Gadhafi in the 1990s and was also believed to be connected to a series of suicide bombings in Casablanca Morocco in 2003 the US State Department reported As relationsbetween the US and Gadhafi improved in the mid-2000s some LIFG leaders cultivated relationshipswith top al Qaeda leaders including Osama bin Laden and were suspected of funneling fighters to Iraq tocarry out operations against US soldiers

When the LIFG was designated a terror organization in 2004 it was meant as a gesture of solidarity with the Libyan government according to a March 2011 congressional report

Contrary to several US government reports Libyan rebel ambassador to the US Ali Aujalitold ABC News that the LIFG was never connected to al Qaeda and did not carry out terrorist operations

They were only opposed to Gadhafi during his rule and paid the price for that by beingoppressed by the regime Aujali said

The CIA first publicly voiced its concerns about the connection between the LIFG and al Qaedain 2004 when then-director George Tenet testified before the Senate Select Committee on Intelligenceand listed the LIFG among groups that represented an immediate threat [that] has benefited from alQaeda links[Article continues here httpabcnewsgocomBlotterterror-group-founder-libyan-rebel-military-commanderstoryid=14405319]

Interview With Saudi Sheik Wajdi Al-Ghazawi

MemriTVcom

Sheik Wajdi al-Ghazawi owner of al-Fajr TV criticizes extremist atmosphere in Saudi Arabia and saysafter 911 They Handed Out Sweets on the Streets of Mecca

Following are excerpts from a statement by Saudi Sheik Wajdi Al-Ghazawi owner of Al-FajrTV which was posted on YouTube on August 4 2011

Wajdi Al-Ghazawi When Al-Qaeda and Osama Bin Laden were at the height of their mightthey were extremely popular in Saudi Arabia From mosque pulpits across Saudi Arabia preacherswould pray for their success Moreover from the pulpits of the most important mosques ndash the Al-HaramMosque in Mecca and the Nabawi Mosque in Al-Madina ndash direct prayers for the success of Al-Qaedawere made during the days of the bombing of Tora Bora Oh Allah help our brothers in AfghanistanThese supplications were made during evening prayers as well as Friday prayers The preachers wouldpray for them in violation of the ministrys instructions

When the twin towers in New York were attacked they handed out sweets on the streets of Mecca By Allah they did I witnessed this myself The young people bowed in prayer and hugged one

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3342

another out of joy People were in heaven because of these young men who destroyed America andbombed this idol Am I right or not Was it like that or not

Back then when the Taliban broke off a piece of the nose of the Buddha statue which was hewnin the mountain an entire sermon was dedicated to it in the mosque in Mecca and the preacher was laterreprimanded for this sermon The entire Saudi people supported and loved Al-Qaeda

This went on until our brothers in Al-Qaeda ndash and I dont know what was going through theirminds ndash began to carry out operations inside Saudi Arabia Thats when we all raised our hands andsaid Youve gone too far We wont support you in this

The atmosphere here in Saudi Arabia is one of extremism It is characterized by focusing onminor details Many things are forbidden Yes maybe they are indeed forbidden but by forcing peopleto avoid them and by acting as if these were major sins an atmosphere was created that gave rise toextremist youth who might act recklessly at the most trivial provocation

For instance we blew out of proportion the issue of music the issue of smoking or the issue of hanging pictures in public places True there are clear texts on these issues but the young peopleembraced these issues as if they were fighting usury fornication or alcohol No these are not among theseven major sins So our society has become extreme

This extremist atmosphere has given rise to people who accuse others of heresy and people whopurport to be waging Jihad It has created genes that gave rise to cells of Al-Qaeda and other terrorists

We must examine our breeding ground in which these young men were sownBy Allah what can possibly emerge from such an atmosphere Muftis who accuse others of

heresy sheiks who incite and young people who bomb Am I right or not[Complete clip is available here httpwwwmemritvorgclipen3099htm]

Legal Aspects amp Lawfare| back to top |

Revisiting A Stale Counterterrorism Law

Council on Foreign Relations | 1 September 2011

ldquoNearly a decade after 911 the United States still relies on the 2001 Authorization for the Use of Military Force (AUMF) for the killing and detention of those considered responsible for or associatedwith the terrorist attacks But CFR national security law expert John Bellinger says it is becomingincreasingly difficult for the Obama administration to justify some of its counterterrorism operationsunder this limited statutory authority It has been used in defense of actions including drone attacks onindividuals as well as the targeting of groups in Yemen and Somalia that may have only the mosttenuous affiliation or association to the 911 attack A revised AUMF should clarify those operations aswell as the issue of detention specifically which individuals can be detained for how long and subjectto what processes There also needs to be greater effort at the international level he adds to fill thegaps in the law that covers conflicts between states and non-state actorsrdquohelliprdquo[Complete article is available here httpwwwcfrorgcounterterrorismrevisiting-stale-

counterterrorism-lawp25742]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3442

Narco-Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector[Complete article is available here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Mexicos Cartels Move Into Extortion

At a construction site of an apartment building in the heart of the Mexican capital a company engineerruns through his weekly payroll sheet He has salaries written out for carpenters bricklayers andelectricians At the bottom of the sheet is a notation of $200 for ldquosecurity servicesrdquo next to a nicknameldquoEl Indiordquo mdash the Indian [Complete article is available here

httpwwwtucsonsentinelcomnationworldreport090611_mexico_cartels_bribesmexicos-cartels-move-into-extortion ]

Seven Die In Mexican Pacific Port City

Latin American Herald Tribune

Seven people died in separate shootings in Mazatlan a port city in the northwestern Mexican state of Sinaloa with some of the incidents drug-related a police spokesman told Efe [Complete article is available herehttpwwwlahtcomarticleaspCategoryId=14091ampArticleId=423061]

Tijuana Violence Slows As One Cartel Takes Control

BorderlandBeatcom

Mexicos famously seedy border city of Tijuana is enjoying a lull in drug murders as the countrys mostpowerful cartel gains the upper hand over its rivals [Complete article is available here httpwwwborderlandbeatcom201109tijuana-violence-slows-as-one-cartelhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3542

Network Notes| back to top |

Canadian data foreign threats Spying in the digital age (Suggested by a reader in Lithuania ndash thanks) Globe and Mail | By Colin Freeze 31 July 2010

A government spy agency thatrsquos prohibited from monitoring Canadian citizens is now usingldquoinformation about Canadiansrdquo to zero in on foreign threatsThe ambiguous statement found in a new government report detailing the activities of CommunicationsSecurity Establishment Canada could sanction a range of intelligence-gathering activities ndash includingthe controversial practice of mining ldquometadatardquo from digital communications

Metadata ndash often called data about data ndash are found in e-mails and their attachments and containdigital signatures that can reveal when where and by whom documents were created

The collection of metadata has caused controversy in other countries but never in Canada wherethe Communications Security Establishment Canada operates as an ultra-secretive agency About theonly thing that is known about the classified practices is that they were halted and resumed after someldquomajor changesrdquo including directives signed by Defence Minister Peter MacKay

ldquoI cannot comment on specific operational activitiesrdquo Adrian Simpson a CSEC spokesman toldThe Globe He stressed that reviews upheld that the activities in question were ldquocarried out inaccordance with the law ministerial requirements and CSECrsquos policies and proceduresrdquo

ldquoCSEC is prohibited from directing its activities at Canadians anyone in Canada or Canadiansanywhere in the worldrdquo he said

For decades signals-intelligence agencies in the West have been allowed to safeguard nationalsecurity by eavesdropping on foreignersrsquo conversations Spies can whatever phone lines and satellitesignals they can so long as they never listen in on fellow citizens

But in the digital age governments run increasingly sophisticated dragnets scooping up andscouring through millions of intercepted Internet conversations daily Such practices create legalambiguities

ldquoThe whole issue of what constitutes boundaries for signals-intelligence agencies in cyberspaceis a big debate right nowrdquo said Rafal Rohozinski a security expert affiliated with the University of Torontorsquos Munk School

A watchdog agency that reviews the CSECrsquos activities released an annual report to Parliament onJuly 20 ldquoWhen other means have been exhausted CSEC may use information about Canadians when it

has reasonable grounds to believe that using this information may assist in identifying and obtainingforeign intelligencerdquo it reads

Sometimes collecting metadata is relatively benign It can involve aggregating sets of data tospot trends much like the way meteorologists discern national forecasts from localized information

For example while CSEC canrsquot usually monitor the communications of specific Canadian terrorsuspects it can glean insights by zooming out for big-picture patterns One way to do that MrRohozinski said would be to look at data flows between Canadian cities and Yemen where an Internet-savvy al-Qaeda offshoot works to recruit Westerners

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3642

Metadata however can be more revealing Documents that circulate on the Internet travelaround like postmarked letters marked with return addresses ndash e-mails and attachments have embeddedcodes that speak to the who where and when behind their creation

The US National Security Agency found itself mired in controversy a few years go after itskirted domestic-spying bans by secretly upholding that this sort of American metadata was fair gamedistinct from communication contents

Therersquos little to suggest the CSEC would go that far The federal agencyrsquos activities are reviewedby a watchdog body now headed by a former Federal Court of Appeal judge Robert Deacutecary appointedlast year wrote in his annual report that he was satisfied the CSEC activities in question are lawful evenif his predecessors felt them borderline

ldquoThis was the first review of these activities since hellip their resumption under new policiesrdquo thewatchdogrsquos report says It concludes that the surveillance activities are ldquoin accordance with the lawrdquo andfollow ldquomajor changes to certain policies procedures and practicesrdquo

Much of the concern arises from the possibility that CSEC could hand over metadata intelligenceto domestic law-enforcement and security agencies

As it stands the RCMP and CSIS have to develop their domestic investigations before coming toCSEC ndash usually with warrants ndash if they want specific intelligence The rules guiding handovers are strictbecause even though all agencies run surveillance operations they do so under vastly different

mandates and legal standardsThe spy agency however stood by its practicesldquoCSEC is extremely diligent when it comes to the privacy of Canadiansrdquo Mr Simpson said

[complete article is available here httpwwwtheglobeandmailcomnewsnationalcanadian-data-foreign-threats-spying-in-the-digital-agearticle2113772 ]

Cyber Attacks Against NATO Then And Now

New Atlanticist | 6 September 2011

ldquoNow that NATOrsquos Operation UNIFIED PROTECTOR over Libya is winding down it is worth

noting how few cyber incidents were directed in protest against the Alliance Certainly there was a

cyber component to the liberation of Libya but it was more about content and Internet freedom (the

most newsworthy elements here were the role of social media and the Libyan government taking largeparts of the nation offline) But compared to past history NATO cyber defenders had a relatively easy

time

ldquoNATO has not however had an easy 2011 Although there were three significant incidents we

know about none seemed to have been in direct response to operations over Libyahelliprdquo

[Complete article is available here httpwwwacusorgnew_atlanticistcyber-attacks-against-nato-then-

and-now]

The Calm Before The Storm

Foreign Policy | By Joel Brenner 6 September 2011

Cyberwar is already happening -- and its about to get much much worse A veteran cyberwarriorexplains how America can prepare itself

Revelations of wholesale electronic fraud and massive data heists have become weekly evendaily affairs A multinational electronics corporation loses personal information on more than 100million customers Cyberthieves break into an international bank counterfeit credit balances and lootATMs in four countries grabbing $9 million in just a few hours International gangs spread maliciouscode that conscripts unwitting computers into zombie armies of hundreds of thousands of similarlyenslaved machines Criminals then rent these armies called botnets as easily as you can buy a time-sharing arrangement in a beach condo No wonder the vast majority of Internet traffic is spam

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3742

Yet the loss of personal information and related criminal fraud intolerable as they are are theleast threatening face of electronic insecurity The US militarys secret network is penetratedAmericans corporate pockets are being picked clean of the intellectual property that makes the UnitedStates tick And the electricity grid that keeps the lights on and makes everything move is dangerouslyinsecure

In one remote attack on the Pentagons information systems about 10 years ago the Chinesehauled away up to 20 terabytes of information If the information had been on paper theyd have neededa line of moving vans stretching from the Pentagon to freighters docked 50 miles away in Baltimoreharbor just to haul it away Had they done so the military district of Washington wouldve become anactive theater of operations for the first time since 1865 and the Navy wouldve blockaded theChesapeake Bay But the Chinese did it electronically so who noticed

Corporate espionage by both competitors and foreign intelligence services or their surrogates isalso increasing Intelligence officials see this but cant speak openly about the specifics and Im seeingit now in my law practice The victims rarely admit it for understandable reasons Oracle whichsuccessfully sued SAP for theft of its software code was a prominent exception Google was another

When the Chinese penetrated Google in late 2009 -- yes that operation was Chinese and yes itwas done with the blessing of a member of the Politburo -- they werent after customer informationThey were after the source code that makes Google unique Nor was Google the only victim Thousands

of US and Western firms were penetrated in that affair Foreign governments -- and not only theChinese -- understand that they cannot compete with the United States militarily and politically if theycannot compete with it economically so their intelligence services want to steal its corporate intellectualproperty This is the technology that gives America its competitive edge and often it has nothing to dowith defense Ordinary companies with valuable technology are now being targeted by nation-statesThis is a new era National security and economic security have converged

The danger is not limited to the loss of technology and information however The owners andoperators of the North American electricity grid are hooking up their control systems to the Internet asfast as they can Exposing the grid to the Internet makes it marginally more efficient but it also makes itdramatically more vulnerable to disruption If you can remotely penetrate an electronic system to stealinformation you can remotely penetrate it to shut it down or make it go haywire This is why there is no

longer a meaningful difference between information security and operational security And the biggestoperational risk is the grid In contemporary society nothing moves without electricity If the grid goesout the country stops

As the Stuxnet affair demonstrated remotely engineered disruption of industrial control systemsis now a reality That episode involved the successful electronic attack on the centrifuges in the Iraniannuclear program Only a first-class intelligence agency could have pulled that off but the blueprint fordoing it -- the code itself -- is now public Many American industrial control systems run on the samekind of equipment the Iranians were using but unlike the controls on the Iranian centrifuges thecontrols on the US grid are now being connected to the Internet making them easier to disrupt Stuxnetwas a watershed there will be copycats

Other industrial control systems will also be targets Some already are Air traffic control

railroad switches and water and sewage systems are all electronically controlled now and many arevulnerable If an intruder can break into the right server electronically he can remotely shut downproduction send your goods to the wrong destination and even unlock your doors -- and delete your logentries so he leaves no record of ever having been there

The United States does not lack enemies who would attack it this way Seized al Qaedacomputers contain details of US industrial control systems In 2003 a group affiliated with thePakistani terrorist organization Lashkar-e-Taiba -- the same gang that engineered the 2008 terroristassaults in Mumbai -- plotted to attack the Australian grid Other groups conspired to attack the Britishgrid in 2004 2006 and 2009 Yet the owners and operators of the North American grid continue willy-

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3842

nilly to expose their control systems to the Internet instead of isolating and hardening it This is folly of a high order

Important conclusions for public and corporate policy follow from this vulnerable state of

affairs First cyber insecurity has operational consequences In the current and foreseeable states of technology a high degree of assurance against electronic penetration of anything connected to theInternet is not achievable Large efficient electronically connected organizations and nations aretherefore vulnerable to remotely engineered disruption as well as information theft

Second this risk cannot be eliminated -- but it can be reduced and managed As a nation theUnited States should start by isolating the grids controls from the Internet Undoubtedly there aremarginal efficiencies to be gained by seamless connectivity over a publicly accessible infrastructure butthese gains are usually exaggerated and the risk this connectivity creates is staggering The governmentand the major telecommunications carriers must also make the investment required to re-create themassive redundancies that made the wired telephone network so robust Resilience and swift recoveryshould be the goal If the consequences of cyberattacks were reduced penetration would cease to matter

Third companies that wait for the government to solve their own security problems do so attheir peril The government is broke and the IT backbone is 85 percent private so the governmentdoesnt control it The governments role in altering the status quo will be limited to setting standardsusing its purchasing power to move vendors toward better security and getting its own house in order

The government can neither secure corporate intellectual property nor protect firms against operationaldisruption

Fourth in a world in which everything cannot be protected companies must determine forthemselves what intellectual property and physical assets to isolate and safeguard Those that approachthis task seriously will quickly learn that technology is only one aspect of their insecurity and in manycases the easiest to deal with Unless technology is integrated with personnel practices and operationalsecurity it opens vulnerabilities that its users rarely understand This kind of integration requires theautomated enforcement of reasonable security policies and systematic workforce training and thatoccurs only when management the lawyers and the technologists work closely together This is an old-fashioned management challenge -- not a technological one For their part corporate boards need to takeIT security seriously and launch audits that examine how their systems are actually implemented and

used not merely how they are designed Because as the techies like to put it the weakest link in anysystem is not the silicon-based unit on the desk its the carbon-based unit in the chair Joel Brenner is author of the forthcoming America the Vulnerable Inside the New Threat Matrix of

Digital Espionage Crime and Warfare He has served as the inspector general of the National Security

Agency the national counterintelligence executive and the NSAs senior counsel He now practices law

at Cooley LLP in Washington DC

Cyberattacks Decline Slightly Symantec Report Finds

Dark Reading | 1 September 2011

Organizations worldwide are suffering damages as a result of cyberattacks but interestingly there hasbeen a slight decline in these attacks during the past 12 months according to a new report from

Symantec More than 90 percent of the more than 3300 respondents across 36 countries said theyexperienced tangible losses as a result of a hack with 84 percent reporting financial loss to the cost of abreach Around one-fifth lost at least $195000 in breaches during the past 12 months

Meanwhile Symantec attributes the unexpected bright spot of a decline in breaches toorganizations employing better cybersecurity defenses More than 70 percent of organizations sawattacks in the past 12 months a decline of 5 percent from 2010 And those that experienced anincreasing frequency of attacks dropped from 29 percent in 2010 to 21 percent this year While 100percent last year reported losses from cyberattacks 92 percent did so in 2011 The trend seemscounterintuitive given the rash of high-profile breaches this year More

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 16: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1642

Philippines

| back to top |

Moro Splinter Group Threatens US Soldiers In Philippines But Capabilities Limited

Government-Rebel Negotiations Remain Difficult

Assynt | SEAsia Vol VIII No17 7 September 2011

Ameril Umbra Kato a former senior Moro Islamic Liberation Front (MILF) field commander whoresigned late last year because he rejects peace negotiations has threatened to attack US troops as wellas Filipino security forces and other Government targets US and Filipino troops are currentlyundertaking joint training exercises This is an annual event but the first time they have been conductedin central Mindanao However Katorsquos splinter group the Bangsamoro Islamic Freedom Fighters (BIFF)is believed to have as few as 200 members with generally unsophisticated weapons ConsequentlyBIFFrsquos ability to conduct an attack on US forces is likely to be limited

In this period Kato announced the creation of a political wing to his grouping the BangsamoroIslamic Freedom Movement emphasising his split with MILF Nevertheless he has not been expelledfrom MILF and so is protected by the current ceasefire with Manila though MILF has stronglycondemned Katorsquos threat against US troops It is possible that MILF leadership is content to allow himto operate relatively unimpeded in order to gain greater leverage in its negotiations with theGovernment since they can contrast their more compromising approach with BIFFrsquos threatened

violence Meanwhile negotiations between MILF and the Government continue MILF dismissed theGovernmentrsquos latest proposal for an autonomous region but both sides appear committed to continuingtalks

Russia

| back to top |

Suicide Bombings In Grozny Demonstrate Islamic Insurgencyrsquos Continuing Capabilities In

Chechnya

Stirling Assynt Reports | Report FSU Vol IV No17 7 September 2011

A series of suicide bombings in the Chechen capital on 31 August (which left nine casualties includingseven police officers) has severely undermined President Ramzan Karydovrsquos claims to have successfully

eradicated the Islamic insurgency in the Republic The first suicide bomber reportedly detonated hisexplosives in a densely populated area only 150 metres from a local Parliament building while twofurther jihadists targeted first-response units Significantly the attack occurred during the Muslimholiday of Eid a three day celebration which marks the end of Ramadan during which the risk of jihadist attacks is heightened Indeed in addition to this strike in Grozny jihadist militants carried outfurther attacks in Iraq Nigeria and Algeria during Eid this year

Although no group has claimed responsibility for this incident it bears the hallmark of theCaucasus Emirate and so was likely orchestrated by the grouprsquos newly appointed deputy KhuseynGakayev and his brother Vadalov Indeed the Gakayev brothers are believed to have been behind theattack on the Chechen Parliament in October 2010 demonstrating the grouprsquos capabilities and intent tocarry out such strikes Moreover the timing of these bombings ndash only two months after the

reconciliation of the Caucasus Emiratersquos leader Doku Umarov with Chechen commanders (see our 3August Report) ndash supports this assessment and suggests that further incidents and suicide bombings arelikely given this truce

Suspected Militant Killed In Russias Southern Republic

Interfax news agency | Moscow in Russian 7 September 2011 Russias National Antiterrorist Committee said on 7 September a militant had been killed in the Republicof Kabarda-Balkaria the corporate-owned Russian news agency Interfax reported

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1742

Saudi Arabia

| back to top |

Saudi Arabia Shopping Around For Nuke Technology

Haaretz | 8 September 2011

Ties with Pakistan may remain close as Riyadh seeks nuclear assistanceSynopsis This week brought news that Iran on its own has produced new advanced nuclearcentrifuges According to a report of the International Atomic Energy Agency Iran has begun to installthe centrifuges in its uranium enrichment facility in Natanz But the high-level source noted thatdevelopment and production of the new centrifuges began more than seven years ago That does notspeak of a great technological capability on Irans part Israeli intelligence like its American counterpartviews 2014 or 2015 as the date when Iran will be able to build nuclear weapons says the source - if itwants to and no one blocks it In Saudi Arabia in contrast they are a bit more disturbed by thedevelopments in Iran An American Department of Energy delegation visited Riyadh and met with DrHashim Yamani who heads the King Abdullah City for Atomic and Renewable Energy Saudi Arabiawants to equip itself with nuclear reactors to generate electricity The United States is interested inselling Riyadh reactors for two reasons - fat contracts and the ability to keep close tabs on nucleardevelopments in Saudi Arabia The American administration is concerned that with a nuclear programfor civilian uses Saudi Arabia would actually like to prepare the infrastructure so it could switch to

producing nuclear weapons relatively quickly should Iran possess such weapons Defense ministerSultan Bin Abdul Aziz and the countrys former intelligence chief Turki Bin Faisal reportedly favorthe preparation of a secret nuclear program for military uses in cooperation with a Sunni Muslim ally -Pakistan which possesses dozens of atomic bombs Saudi Arabia reportedly funded Pakistans nuclearweapons program in return for Pakistans promise to aid the monarchy in this area if need be

Serbia

| back to top |

Serbia Threatened By Terrorism Says Dacic

Tanjug | 8 September 2011

US officials warned Serbia of possible terrorist activity particularly against foreign interests

After a warning coming from USA officials Serbia will raise the level of security in all facilitiesbelieved to be a possible target of terrorists the countrys Deputy Prime Minister and Minister of InteriorIvica Dacic stated Wednesday in the Palace of Serbia He stated that the security measures will primarilyrefer to the facilities of foreign countries in Serbia and added that special attention will be paid to thesecurity of air traffic US officials assume that there is a possibility of new terrorist attacks in the USAand other countries including Serbia Dacic said following a meeting with Special Representative of the UN Secretary-General for Disaster Risk Reduction Margareta Wahlstrom in Belgrade and a sessionof the republic headquarters for emergency situations

Somalia

| back to top |

Six Killed In Mortar Attack In Somali CapitalShabeelle Media Network website | Mogadishu in Somali 7 September 2011

Six people were killed and several others injured after three mortars landed in Mogadishus Arjantiinneighbourhood in Kaaraan District on the night of 6 September the privately-owned Shabeelle websitereported It quoted an eyewitness as saying that two of the three mortars fired have caused thecasualties inflicting fear in the residents who returned to their homes after Al-Shabab vacated the areaearly last month Kaaraan District is one of the areas taken over by the government forces and AUpeacekeepers

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1842

United States

| back to top |

Post-911 Intelligence Reform Takes Root Problems Remain

Reuters | 8 September 2011

US intelligence agencies will forever be scarred by their failure to connect the dots and detect theSeptember 11 plot but a decade later efforts to break down barriers to information-sharing are takingroot Changing a culture of need-to-know to need-to-share does not come easily in spy circles Someofficials say they worry a decade later about a future attack in which it turns out that US spy agencieshad clues in their vast vaults of data but did not put them together or even know they existed

Yet significant changes both big and small have broken down barriers between agenciessmoothed information-sharing and improved coordination US intelligence experts say From issuing ablue badge to everyone working in the sprawling intelligence community to symbolize a commonidentity to larger moves of mixing employees from different agencies the goal is singular -- to preventanother attack

Were much further ahead David Shedd Defense Intelligence Agency deputy director said of the ability to connect the dots compared with 10 years ago Still signs of a plot to attack the UnitedStates could be missed again My worst fear and I suspect probably one that would come true is that inany future would-be or actual attack God forbid we will be able to find the dots again somewhere

because of simply how much data is collected Shedd said The political response to the failure to stopthe attack was the 2002 creation of the Department of Homeland Security pulling together 22 agenciesto form the third largest US Cabinet department behind the Pentagon and Veterans Affairs

That was followed by the creation in late 2004 of the Director of National Intelligence to overseeall the spy agencies as recommended by the bipartisan 911 commission Previously the CIA directorheld a dual role of also overseeing the multitude of intelligence agencies But in the aftermath of the2001 attacks policymakers decided that was too big of a job for one person to do effectively

Critics argued then and now that the reforms were the governments usual response to crises --create more bureaucracy But others see much-needed change It has been a tremendous improvementsaid Lee Hamilton who was the 911 commission vice chair Its not seamless there are problems andweve still got a ways to go The 2001 attacks involving airliners hijacked by al Qaeda operatives killed

nearly 3000 people in New York Pennsylvania and the Pentagon Various US intelligence and lawenforcement agencies had come across bits of information suggesting an impending attack but failed toput the pieces together The CIA had information about three of the 19 hijackers at least 20 monthsbefore the attacks the National Security Agency had information linking one of the hijackers with alQaeda leader Osama bin Ladens network the CIA knew one hijacker had entered the United States butdid not tell the FBI and an FBI agent warned of suspicious Middle Eastern men taking flying lessons

Have the reforms made America safer Officials say yes and point to the US operation thatkilled bin Laden in Pakistan in May that demanded coordination among intelligence agencies and themilitary But there is an inevitable caveat no one can guarantee there will never be another attack onUS soil On Christmas Day 2009 a Nigerian man linked to an al Qaeda off-shoot tried unsuccessfullyto light explosives sewn into his underwear on a flight to Detroit from Amsterdam It turned out US

authorities had pockets of information about him President Barack Obama used a familiar September 11phrase to describe the 2009 incident as a failure to connect the dots of intelligence that existed acrossour intelligence community

Roger Cressey a former White House National Security Council counterterrorism officialresurrected another September 11 phrase It was a failure of imaginationThe intelligence community had not seen al Qaeda in the Arabian Peninsula a Yemen-based al Qaedaoff-shoot as capable of striking the US homeland If the underwear bomber threat had originated inPakistan they would have gone to battle stations immediately Cressey said Some proposed changesin how authorities would respond to another successful attack still are pending For example creation of

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1942

a common communication system for police firefighters and other emergency personnel remainstangled up in political wrangling in Congress over how to implement it This is a no-brainer Hamiltonsaid The first responders at the scene of a disaster ought to be able to talk with one another Theycannot do it today in most jurisdictions

Former leaders of the 911 commission issued a report card saying nine of its 41recommendations remain unfinished The Office of the Director of National Intelligence hasexperienced growing pains as overseer of the 17 spy agencies churning through four chiefs in six yearsTensions over turf confusion about the DNIs role and problems herding agencies with very powerfulchiefs of their own all came to a crescendo when retired Admiral Dennis Blair the third DNI tried toassert authority over CIA station chiefs who represent the agency in different countries The positionof chief of station is one of the crown jewels of the CIA and they dont want anyone playing with theircrown jewels said Mark Lowenthal a former senior US intelligence official

After a dust-up with CIA Director Leon Panetta who now is defense secretary it was Blair whowas sent packing I think the mistake that some have made is to have viewed the DNI and the Directorof CIA as an eitheror proposition rather than the power of the two working together the DIAs Sheddsaid in an interview in his office There is a history of where that hasnt worked so well I believe it isworking much better today said Shedd who has worked at the DNI CIA and National SecurityCouncil

Intelligence experts say in the current administration Obamas top homeland security andcounterterrorism adviser John Brennan arguably has more power than any of them because he has thepresidents ear Its a reminder that bureaucratic reform or no personalities count in making nationalsecurity policy The improved sharing of secret data has led to yet another set of problems The delugeof bits and bytes has subjected intelligence analysts to information overload as they try to sift through itall for relevant pieces Our analysts still are spending way too much time on finding the informationrather than on the analysis of the information Shedd said There is just too much data to go find it all

The intelligence community wants a system developed that would automatically processinformation from multiple agencies and then make the connections for the analysts

But greater inroads into sharing data across agencies does not guarantee that another attack willbe averted The threat has evolved and officials now are increasingly concerned about a lone wolf plot

by an individual not tied to any militant group that may be more difficult to uncover Those threatswill not come to our attention because of an intelligence community intercept said John Cohen asenior Department of Homeland Security counterterrorism official

They will come to our attention because of an alert police officer an alert deputy sheriff analert store owner an alert member of the public sees something that is suspicious and reports it Cohensaid One measure of the success of post-911 reforms is that a decade later the United States has not hada similar attack Now that could be luck that could be skill we dont really know Hamilton said Butin all likelihood what we have done including the establishment of the Department of HomelandSecurity and the transformation in intelligence and FBI has certainly been helpful[Article continues here ]httpnewsyahoocompost-9-11-u-intelligence-reforms-root-problems-052514320html

Comment the value added provided by the Office of the DNI remains an open question for many withinthe Intelligence Community (IC) and is a favored theme of corridor discussion in IC-member agenciesOn the other hand there is broad agreement among intelligence officials that the degree of cooperationand coordination between intelligence agencies and the character of intelligence sharing has vastlyimproved The fact that there has not been a successful major attack on US soil since 911 ndash not forlack of plotting ndash is in great part testimony to this more effective cooperation

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2042

Jihadist Suggests Striking New York City Bridges

All SITE Intelligence Group | 6 September 2011

A jihadist pointed to what he found to be a weak point of suspension bridges and directed his messageto those who love blasting and explosions In a message posted on the Shumukh al-Islam forum onSeptember 6 2011 the jihadist Abu Suleiman al-Nasser gave a picture of the Verrazano Bridge inNew York on which he drew a red box and arrow on the bridges center He then gave a map on whichhe circled the various bridges in New York City and its boroughs A fellow jihadist offered his ownidea giving a picture of the Hoover Dam and explaining that there is no target more important thandams He wrote that striking a dam may lead to the submerging of cities and the killing of thousands of people and in the case of the Hoover Dam would impact Las Vegas the capital of gambling anddebauchery

Counterterror Veteran is New Deputy FBI Director

Atlanta Journal Constitution | 1September2011

A 24-year FBI veteran with extensive counterterrorism experience Sean Joyce has been named the lawenforcement agencys new deputy director Elevated to the No 2 post within the FBI by Director RobertMueller Joyce replaces Timothy Murphy who is retiring after 23 years with the bureau Since last yearJoyce has been executive assistant director of the national security branch responsible for the FBIs

national security and intelligence operations He earned the Attorney Generals Award for ExceptionalService in 2004 for work on a counterterrorism squad in Dallas In 2008 he was named chief of thecounterterrorism divisions international terrorism operations section with responsibility forinternational terrorism matters within the United States hellip[Complete article is available here httpwwwajccomnewsnation-worldcounterterror-veteran-is-new-1153018html]

Top CIA Official Obama Changed Virtually Nothing

Salon | 1 September2011

PBSs Frontline is airing an examination of Top Secret America on September 6 The show includes arare and lengthy interview with 34-year-CIA-veteran John Rizzo who is described as the most

influential lawyer in CIA historyHere is one quote they include from Rizzo With a notable exception of the lsquoenhanced

interrogationrsquo program the incoming Obama administration changed virtually nothing with respect toexisting CIA programs and operations Things continued Authorities were continued that wereoriginally granted by President Bush beginning shortly after 911 Those were all picked up reviewedand endorsed by the Obama administration hellip[Complete article is available herehttpwwwsaloncomnewspoliticsbarack_obamastory=opiniongreenwald20110901obama]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2142

General Counterterrorism News| back to top |

The Terrible Missed Chance

Newsweek | 4 September 2011

Special Agent Harry Samit of the FBIs Minneapolis field office knew he was looking into the eyes of aterrorist It was early afternoon on Friday Aug 17 2001 Across from him sat Zacarias Moussaoui a33-year-old French-born student arrested the day before for overstaying his visa Moussaoui had paidmore than $8000 in cash that summer to sit in a cockpit simulator in a flight school in the suburbs of Minneapolis and learn - in a matter of days - the basics of how to fly a 747-400 Samit a formerintelligence officer at the Navys celebrated Top Gun flight school felt sure the man across the desk from him was a Muslim extremist who was part of a plot to hijack a commercial jetliner filled withpassengers The trick Samit wrote in a soon-to-be-released excerpt of a book hes written about thecase was getting Moussaoui to admit this and reveal details and associates to allow us to stop the plot

Surely the bureau brass in Washington would share his concern Samit thought He was wrongThat same day halfway across the country in the fluorescent-lit hallways of the J Edgar Hoover

FBI headquarters building in Washington counterterrorism supervisors were treating Samits firstreports about Moussaoui with skepticism even contempt Michael Maltbie a DC counterterrorism

specialist insisted repeatedly in the days after the arrest that there was no clear link between Moussaouiand Al Qaeda - the link needed for a warrant Maltbie thought Moussaoui was a dirty bird he latertold investigators but favored deporting him to France

Believing a hijacking might be imminent Samit appealed to his boss in Minneapolis SpecialAgent Greg Jones Jones picked up the phone on Aug 27 and called Maltbie at FBI HQ

Moussaoui he said might be part of a plot to get control of an airplane and crash it into theWorld Trade Center or something like that

Maltbie scoffed You have a guy interested in this type of aircraft Maltbie replied accordingto FBI documents That is it (Maltbie declined requests for an interview)

At least Maltbie was paying attention Michael Rolince who ran the FBIs InternationalTerrorism Operations Section was arguably the bureaus most important go-between with the White

House on domestic terrorist threats in the summer of 2001 He tells Newsweek he spent less than 20seconds being briefed on the Moussaoui case that August His office was inundated with terrorismprobes he said since Moussaoui was in custody already he posed no immediate threat Did it rise tothe level of something that I would take upstairs Rolince asks The answer is no

At CIA headquarters alarm bells were ringing loudly CIA Director George Tenet was briefedon Moussaoui within days of the arrest receiving a paper with the eye-catching headline IslamicExtremist Learns to Fly But the FBIs acting director that summer and the bureaus most seniorcounterterrorism official were left in the dark[Article continues here httpwwwthedailybeastcomnewsweek20110904the-terrible-missed-chancehtml]

Pan Am Flight 103 - Lockerbie Bombing - al-Megrahi CIA FilesWebwire | 31 August2011

BACM ResearchPaperlessArchivescom has announced the publishing of CIA files related to the PanAm Flight 103 Lockerbie Bombing

The files can be downloaded at no cost at httpwwwpaperlessarchivescompanam103ciahtml The files date from 1984 to 1999 These are the most recent files on Pan Am 103 released by the

CIA This set of files is unique because it includes memos on the direct handling of an intelligencesource This type of information is exempt from the Freedom of Information Act (FOIA) and is not oftenreleased by the Agency

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2242

The files cover information received by the CIA on Abdel Basset al-Megrahi Al-Megrahi is theonly person ever convicted in the Pan AM 103 case The Scottish government in 2009 allowed al-Megrahi to be released from custody and returned to Libya because of his failing health With the recentfall of Muammar Qaddafis regime there have been renewed calls for al-Megrahi to be returned toScottish custody or extradited to the United States and put on trial[Complete article is available here httpwwwwebwirecomViewPressRelaspaId=144692]

Getting The Caucasus Emirate Right

CSIS | August 2011

ldquohellipThis report aims to set straight a rather distorted record It demonstrates the veracity of three vitallyimportant facts usually obfuscated in discussions of the subject (1) the longstanding and growing tiesbetween the CE and its predecessor organization the ChRI on the one hand and al Qaeda (AQ) and theglobal jihad on the other hand (2) the importance of the CE jihadi terrorist network as a united andorganized political and military force promoting jihad in the region and (3) the salience of local culturaland the Salifist jihadist theo-ideology and the influence of the global jihadi revolutionarymovementalliance as key if not the main factors drive the ldquoviolence in the North Caucasusrdquohelliprdquohttpcsisorgfilespublication110829_Hahn_GettingCaucasusEmirateRt_Webpdf

7 Things You Didnrsquot Know About the War on TerrorForeign Policy | By Eric Schmitt and Thomas Shanker 6 September 2011

From an attempt to negotiate with Osama bin Laden to a proposal to threaten to bomb Mecca its been awild decade for the US national security establishment

Our new book Counterstrike The Untold Story of Americas Secret Campaign Against Al Qaeda is in many ways asummary of the past decade of our reporting on the military intelligence community and domestic law enforcement as itentered a new era of Darwinian evolution to counter violent extremism

It also is our deep dive into a decade of American counterterrorism efforts -- from the work of commando trigger-pullers and spies on the ground up to senior political leaders who wanted to defendthe nation (and get re-elected) Our efforts to report and write this book allowed us to uncover many newmissions never discussed before -- and gave us an understanding of how the war on terror had changedover the last decade

Our book assesses the 10 years since 911 as the military divides the fight into tactical missionson the battlefields of modern terrorism then the operational advancements that provided the means tosuccess while not securing final victory and at the top the strategic level of policy debates about howthe nation should combat this threat to its security

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2342

Here are seven vignettes from Counterstrike that offer glimpses into the thinking of policymakers andcommanders in early days after the Sept 11 attacks and how that thinking evolved over the followingdecade into a more whole-of-government approach to combating terrorists

1 Bush Tried to Negotiate with al Qaeda

The George W Bush administration like all of its predecessors swore never to negotiate with terroristsBut it did undertake an extraordinary and extraordinarily secret outreach effort to open a line of communication with Osama bin Laden and al Qaedas senior leadership It was an attempt to replicatehow the United States tried to sustain a dialogue with the Soviet Union even during the darkest days of the Cold War when White House and Kremlin leaders described in private and in public a set of acceptable behaviors -- and described with equal clarity the swift vicious even nuclear punishment forgross violations

In the months after the Sept 11 attacks Bushs national security staff working through theintelligence agencies made several attempts to get a private message to bin Laden and his inner circleThe messages were sent through business associates of the bin Laden familys vast financial empire aswell as through some of the al Qaeda leaders closest relatives a number of whom were receptive toopening a secret dialogue to restrain and contain their terrorist kinsman whom they viewed as a blot on

their name (To be sure other relatives were openly hostile to the American entreaties)According to a senior American intelligence officer with first-hand knowledge of the effort the

response from Osama bin Laden was silence And the effort was suspended

2 Sometimes a Wedding Is Just a WeddingIn the early days after the Sept 11 attacks the CIA and FBI vied to produce the most compellingintelligence reports that tracked suspected terrorist plots The agencies often worked at cross purposessometimes unwittingly At one point in early 2002 both agencies were tracking what American analystssaid were growing preparations for a major wedding somewhere in the Midwest (In terroristvernacular the word wedding is often code for a major attack)

Dribs and drabs on this wedding planning made their way to President Bush from bothagencies independent of each other of course

Finally over the Easter holiday during a video-teleconference with top aides in Washingtonfrom his ranch in Crawford Texas Bush stopped the briefing exasperated by the discrepancies in therival agencies reporting about the suspected threat

George Bob get together and sort this out Bush told his CIA director George J Tenet andFBI director Robert S Mueller III

Bushs instincts were correct When the analysts finally untangled their clues it turned out thatthe ominous wedding really was just that the matrimony of a young man and a young woman fromtwo prominent Pakistani-American families There was no threat There was no plot

3 The Threat to Bomb MeccaAs fears of a second attack mounted following the 911 strikes US government planners franticallycast about for strategies to protect the country Even the most far-fetched ideas had a hearing howeverbriefly In one case some government planners proposed that if al Qaeda appeared ready to attack America again the United States should publicly threaten to bomb the city of Mecca in Saudi Arabiathe holiest site in all of Islam in retaliation Just nuts one Pentagon aide wrote to himself when heheard the proposal The idea was quickly and permanently shelved

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2442

4 The SEAL Raid in Iran That Didnt HappenWhen US forces routed the Taliban government in Afghanistan and forced bin Laden and his toplieutenants to flee many senior al Qaeda leaders including bin Laden and his deputy Ayman al-Zawahri escaped to neighboring Pakistan But a separate group including the al Qaeda leaders sonSaad bin Laden fled to northern Iran where American troops would not pursue them and the Iranianswould likely not detain them But the Shiite clerics running Iran placed the al Qaeda operatives and theirfamily members under virtual house arrest and they became a shield against possible attacks from theSunni-based terrorist organization

One plan in particular illustrated the bold thinking and wildly unrealistic aims of the militarysinitial approach after 911 to kill or capture terrorist leaders The plan called for hunting the eight to 10senior al Qaeda leaders and operatives who had sought refuge in Chalus an Iranian resort town on theCaspian Sea where they had been detained

At the Joint Special Operations Command at Fort Bragg NC military planners drew up optionsfor Navy SEALs to sneak ashore at night using state-of-the-art mini-submarines Once they landed theSEALs would slip past Iranian guards to snatch the al Qaeda leaders Another option called for SpecialOperations helicopters to spirit American commandos into the town and whisk them out again with theirquarry The Americans went as far as conducting two or three rehearsals at an undisclosed locationalong the US Gulf Coast in early 2002 They conducted small-boat insertion exercises involving about

30 Special Operations personnel most SEALs and eventually concluded the mission was feasible if they were provided with more detailed intelligence on the locations of the al Qaeda members and thesecurity around them

The logistics of the mission were daunting Chalus sits at the edge of the Elburz coastal mountainrange about 70 miles north of Tehran and the failed rescue of the American hostages in Iran in April1980 loomed large in commanders memories Eventually Gen Richard B Myers the chairman of theJoint Chiefs of Staff rejected the mission as too risky and too politically volatile Many of the al Qaedaoperatives are reportedly still there

5 Intelligence Hauls of Unusual Size

US intelligence and military commandos have carried out tens of thousands of raids in the decade since911 The amount of material seized from terrorist and insurgent targets has grown to a massive sizeThe Defense Intelligence Agency (DIA) operates exploitation triage centers and giant warehouses forstoring intelligence products -- in war zones rear headquarters in countries like Qatar and back in theUnited States One intelligence analyst said that walking into one of the warehouses for documents andmedia exploitation reminded him of the final scene in Raiders of the Lost Ark when the captured Ark of the Covenant is crated up and rolled into a cavernous storage area that contains all the governmentsother dangerous secrets

All told more than two million individual documents and electronic files have been cataloguedby media type hard copy phone number thumb drive Each is inspected by a linguist working with acommunications analyst or computer expert

The DIA analysts are joined by specialists from other agencies including the FBI and the DrugEnforcement Administration Yet given the overwhelming volume no more than about 10 percent of thecaptured intelligence has ever been analyzed

Intelligence officers say they simply are overwhelmed and untold quality leads may still beburied in the piles of computers digital files travel documents and pocket litter

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2542

6 The Digital Counterjihad Cyberspace is the terrorists ultimate safe haven Its where they recruit raise money and even plotattacks using coded language while playing online video war games The US government fights back

One technique is called false band replacement whereby the intelligence agencies infiltratemilitants networks and post their own material to counter extremist efforts on those same jihadistwebsites The trick is to forge the onscreen trademarks -- web watermarks -- of al Qaeda media sites

This makes messages posted on these sites official and sows dissent and confusion among themilitants

This Internet spoofing can be used in support of more traditional combat missions There is atleast one case confirmed by American officials in which a jihadist website was hacked by Americancyberwarriors to lure a high-value al Qaeda to a surreptitious meeting with extremist counterparts -- onlyto find a US military team in waiting

Getty images

7 First Kill the MullahsUS counterterrorism officials have learned fighting terrorists effectively means targeting specific nodesof that network that support and enable militants who strap on suicide vests This strategy focuses onneutralizing enablers such as the financiers gun-runners and logisticians Among these terror linchpins

are religious leaders who bless attacksHeavenly reward will not await a suicide bomber unless his death and those of his victims is

deemed halal in keeping with Islams sacred sharia law Each militant network has a sharia emir usuallyat the level of a sheikh or mullah In Iraq American commanders specifically killed emirs to throw awrench in a suicide bombing networks

Take him out and suicide bombings from that network are frozen until he is replaced said onemilitary officer with command experience in Iraq hellip[Complete article is available herehttpwwwforeignpolicycomarticles201109067_things_you_didn_t_know_about_the_war_on_terror]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2642

Dick Marty Rendition Report Condemns lsquoCult of Secrecyrsquo

BBC News | 8 September 2011

A report for Europes human rights watchdog has called for greater scrutiny of secret services andsupport for whistleblowers The Council of Europe investigated how countries like Britain GermanyRomania and Lithuania assisted the US with the rendition of terror suspects It said a cult of secrecyhad helped Western governments cover up abuses Defending whistleblowers it singled out USsoldier Bradley Manning accused of passing secrets to Wikileaks He had acted as a whistleblowerand should be treated as such CoE rapporteur Dick Marty wrote in the report which was due to besubmitted to the CoEs Parliamentary Assembly The soldier is currently in a US military prisonawaiting trial for passing restricted material to the controversial website

But the report praised Mr Manning and Wikileaks itself for uncovering evidence of renditionThe CoE represents 47 member-states including both EU countries and Russia and other ex-Sovietstates Mr Martys report focused on the record of Western states explaining that it was based oninvestigations into European links to the controversial US policy of rendition for terrorism suspectsThe CIA allegedly flew terror suspects around the world for interrogation in the years after 911 holdingthem in secret prisons in Europe and elsewhere

No licence to kill

In his 48-page report - entitled Abuse of State Secrecy and National Security - Mr Marty looked at thelevel of control exercised by European states over their security services He urged all states to useindependent parliamentary committees to oversee the work of their secret services saying this was of vital importance for the rule of law and democracy Mr Marty argued that Western governments wereusing the notion of state secrecy to shield their intelligence services from accountability for seriousviolations committed during anti-terrorist operations We consider that this is simply unacceptablehe wrote

A licence to kill (or to abduct and torture) only exists in certain films and in dictatorialregimes In democratic systems parliaments as representatives of the people have a right and duty toknow what the government is doing in the name of the people Mr Marty praised investigative journalists and non-governmental organisations for their work in exposing abuses of authority Stressing

the fundamental role whistleblowers had to play in an open society he warned against a real cult of secrecy as an instrument of power

While it was up to the courts to decide if Bradley Manning had committed any crime he wrotethe CoE was indebted to him for the publication of a recording of a helicopter attack in Iraq in whichthe crew seems to have intentionally targeted and killed civilians

Thanks to Mr Manning he said a large number of embassy reports had allowed us to learnsignificant details of important recent events which are obviously of general interest We therefore join Amnesty International in expressing our worries as to the treatment he receives Mr Marty wrote inthe draft report[Article continues here httpwwwbbccouknewsworld-europe-14820145]Comment This report demonstrates that Dick Marty is not as De Gaulle would say a serious man To

suggest that Bradley Manning is a hero and intelligence agencies bent on defeating terrorists arecriminals should say it all Manning knowingly violated his oath and willfully provided enormousamounts of classified material to WikiLeaks For Marty this is a good thing in the name of transparencyMarty always injudicious and anti-American in his remarks is now moving at warp speed into crackpotterritory

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2742

Al Qarsquoida amp its Affiliates| back to top |

Al Qaeda Is Down Not Out

Los Angeles Times | By Amy Zegart 7 September 2011

US talk of defeating terrorism is dangerously prematureTalk of strategically defeating Al Qaeda is all the rage in the White House these days Defense

Secretary Leon Panetta used the D-word in July President Obama declared in his new counter-terrorism strategy We can say with growing confidence that we have put Al Qaeda on the path todefeat Compared to the woeful state of the economy terrorism has become the administrations feel-good story of the year

Defeat is a big word It is also dangerously misleading Yes the United States has made greatstrides in the last decade to harden targets improve intelligence and degrade the capabilities of violentIslamist extremists Osama bin Ladens death was a major accomplishment But the fight is nowhereclose to being won and Americas most perilous times may lie ahead Three reasons explain why

The first is that strategically defeating Al Qaeda is not nearly as important as it sounds After911 Al Qaeda morphed into a more complicated decentralized and elusive threat consisting of threeelements core Al Qaeda affiliates or franchise groups operating in places like Yemen and Somalia with

loose ties to the core group and homegrown terrorists inspired by violent extremism often through theInternet in the comfort of their own living rooms

Core Al Qaedas capabilities started degrading in 2001 when the US invaded Afghanistandismantled training camps ousted the Taliban and sent Bin Laden running The CIA has estimated thecore group remaining in the AfghanistanPakistan region to number 50 to 100 fighters The last time BinLaden oversaw a successful operation was 2005 when Al Qaeda struck the London transit system

But plots by homegrowns and franchise groups have risen dramatically in recent years The 2009Ft Hood shooting the worst terrorist attack on US soil since 911 was the work of a homegrownterrorist The mastermind of the 2010 Times Square car bomb plot was a naturalized American citizentrained by the Pakistani Taliban not Al Qaeda Another franchise group Al Qaeda in the ArabianPeninsula was behind the foiled 2009 Christmas Day underwear bomber aviation plot and the 2010

plot to explode tampered printer cartridges aboard cargo planes The Bipartisan Policy Center reported11 violent Islamist extremist terrorist incidents against the US homeland in 2009 the most since 911Nearly all involved what former CIA Director Mike Hayden calls a witches brew of radicalizedAmericans and franchise groups

The second reason why talk of defeat is premature has to do with weapons Terrorism againstAmericans is nothing new The potential for terrorist groups to acquire weapons of mass destruction isIn 1995 a Japanese cult released sarin nerve gas in the Tokyo subway killing 12 people and injuringthousands It was the first WMD terrorist attack in modern history and it sparked a wave of presidentialterrorism commissions years before Bin Laden became a household name

It is this specter of the lone fanatic or small group armed with the worlds most devastatingweapons that keeps experts up at night In 2005 60 leading nuclear scientists and terrorism experts were

asked how many believed the odds of a nuclear attack on the US were negligible Only three or fourhands went up most were far more pessimistic Today there is enough nuclear material to build120000 weapons As long as fissile material is poorly stored and rogue states like Iran and North Koreacontinue their illicit weapons programs nuclear terrorism remains a haunting possibility

The third reason is that the FBI has not yet become a first-rate domestic intelligence agencyAnalysts whose work is vital to success are still second-class citizens labeled support staff alongsidesecretaries and janitors and passed over for key jobs including running the bureaus intelligence unitsThe FBIs information technology is so antiquated it belongs in a museum And the old crime-fighting

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2842

culture still lives There is now a move afoot to shrink new classified facilities so that agents dont haveto waste time away from their cases to read intelligence documents thereStrategically defeating Al Qaeda sounds too good to be true Because it is Amy Zegart is a senior fellow at Stanfords Hoover Institution and the author of Eyes on Spies

Congress and the United States Intelligence Community

US Counterterror Chief Al-Qaida On Steady Slide

Bostoncom | 31 August 2011

White House counterterrorism chief John Brennan said al-Qaida is on a steady slide after the death of al-Qaidas latest second-in-command in Pakistan Brennan told The Associated Press on Wednesdaythat its a huge blow in the first official White House comment since Atiyah Abd al-Rahmans reportedkilling by CIA drone strike in Pakistans tribal areas last week

Al-Qaida is sort of on the ropes and taking a lot of shots to the body and the head Brennansaid This is a time not to step back and let them recover a message he says hes sending to hiscounterparts in Pakistan[Article continues herehttpwwwbostoncomnewsnationwashingtonarticles20110831us_counterterror_chief_al_qaida_on_steady_slide ]

Al-Qaeda (AKA Al-Qaida Al-Qarsquoida)

Council on Foreign Relations | 29 August 2011

ldquoAl-Qaeda an international terrorist network is considered the top terrorist threat to the United StatesThe group is wanted for its September 11 2001 attacks on the World Trade Center and the Pentagon aswell as a host of lesser attacks To escape the post-911 US-led war in Afghanistan al-Qaedas centralleadership fled eastward into Pakistan securing a safe haven in loosely governed areas there In July2007 US intelligence agencies found that the organization was regrouping and regaining strength inthese tribal areas along the border with Afghanistan though targeted killings of senior al-Qaeda leadershave since diminished the groups command and control capabilities In February 2009 Director of National Intelligence Dennis C Blair told lawmakers that the groups core is less capable and effective

than it was a year ago The killing of al-Qaedas top leader Osama bin Laden by US forces in Pakistanin May 2011 served a significant blow to the organization but analysts say al-Qaeda remains deadlywith its networks spread all over the world Plus a number of affiliated groups have gained prominencein recent years complicating the task of containing the organizationrdquo

[Article continues here httpwwwcfrorgterrorist-organizationsal-qaeda-k-al-qaida-al-qaidap9126]

Al Qaeda In The Islamic Maghreb

CSIS | 1 September 2011

ldquoAl Qaeda in the Islamic Maghreb (AQIM) emerged from a decades-long militant Islamist tradition inAlgeria In 1998 the Salafist Group for Preaching and Combat (Groupe Salafiste pour la Preacutedication etle Combat or GSPC) broke away from the Armed Islamic Group (GIA) because of the GIArsquos extensive

targeting of civilians Gradually the GSPC evolved to encompass global jihadist ideology in addition toits historical focus on overturning the Algerian state In 2006 the GSPC officially affiliated with alQaeda core soon rebranding itself as al Qaeda in the Islamic Maghreb In the following years AQIMwas able to conduct a small number of large-scale attacks most notably its 2007 bombing of the UNheadquarters in Algiers In recent years counterterrorism pressure and weak governance have combinedto shift the center of AQIMrsquos presence to the Sahara-Sahel region AQIM continues to make its presenceknown through smuggling operations kidnappings and clashes with security forces in the desert In thecoming years general instability within the region could allow AQIM to further expand its influencerdquo[Complete article is available here httpcsisorgfilespublication110901_Thornberry_AQIM_WEBpdf ]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2942

AQ Strategy

The Assynt Report | 11 August 2011

Executive Summary Al-Qaedarsquos broad objectives remain unchanged in the wake of bin Ladenrsquos death There

are nonetheless growing questions over al-Qaedarsquos capability Longstanding paranoiaover the use of electronic communications is heightened by the ongoing US dronecampaign whilst attacks against the West have generally been disrupted at an early stage

The Pakistani Talibanrsquos attack on a Karachi naval base in May 2011 was a significantmilitary success and the first major act of revenge for bin Ladenrsquos killing Furtherattempts to avenge his loss are certain

All parts of al-Qaeda are working within a cohesive framework with the ultimate aim of restoring the Islamic Caliphate (Khilafa) The strategic plan to support this aim wasdrafted by 40 of al-Qaedarsquos brightest thinkers in Kandahar Afghanistan in November1999 This plan consists of four phases each seven years long leading to the dissolutionof corrupt regimes and the union of all newly-liberated states within the Khilafa

Apart from mounting strategic operations al-Qaedarsquos role is to be the inspiration for atruly global jihadist movement It seeks to achieve this through provision of trainingbeing a role model for others to follow extending acceptance and adoption of its tactics

particularly suicide bombings and professionalising jihadist media to build a commonbrand and message between hitherto separate groups

Between the late 1990s and 2003 the organisation was primarily devoted to classicinternational terrorism Most effort is now spent fighting insurgencies from North Africato South Asia The way in which this strategy helps to spread the struggle has been seenin North-West Africa where the initial development of al-Qaeda in the Islamic Maghrebwas in part fed by men returning from fighting with al-Qaeda in Iraq

Since mid-2009 al-Qaeda and its affiliates have increasingly encouraged jihadist-sympathisers resident in Western countries to engage in violence themselves withoutcentral direction or training making surveillance more difficult

One of the keys to awakening the spirit of jihad was the success in portraying the US and

its allies as Crusaders in the Muslim world Al-Qaedarsquos strategy essentially requires thatthis process be kept running until the forces of jihad have grown large enough to launchsuccessful liberation operations

Despite its successes in Afghanistan al-Qaedarsquos credibility has suffered both from its failure to landanother strategic blow on the West on the scale of 911 and also excessive Muslim casualties in someoperations Similarly al-Qaeda in Iraq was set back by its excessive sectarian zeal and local resentmentat the foreign fighter presence In turn this affected the movementrsquos funding from the Gulf

Analysis Sub-Saharan African Leaders Media Focus On Threats Prior to 911

OSC Feature | Sub-Sahara Africa -- OSC Analysis 6 September 2011Statements by Sub-Saharan African leaders and African media reports on terrorism prior to the 10thanniversary of 911 focus on the growing threats from local extremists and Al-Qaida affiliatesparticularly in West Africa with little direct commentary on the anniversary or US counterterrorismpolicies This focus on domestic threats suggests that counterterrorism messages expressing solidaritywith African nations and acknowledging the evolving terrorist threat on the continent would have thegreatest resonance with African audiences

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3042

Leaders Stressing Determination To Counter Local Threats African leaders public statements reflect an ongoing concern about the threat of terrorism on thecontinent and a strong commitment to find ways to combat this threat

Nigerian President Goodluck Jonathan emphasized the governments commitment tovigorously combat terrorism following the 26 August bombing of the UN office inAbuja by Nigerian extremist group Boko Haram reported the Paris-based news agencyAFP President Jonathan is hosting Liberian President Ellen Johnson Sirleaf and otherforeign dignitaries for a three-day forum on terrorism and economic crimes the widelyread Lagos-based independent daily The Guardian reported on 4 September

Malian President Amadou Toumani Toure launched a Special Program for PeaceSecurity and Development on 9 August stating that development remained the mostviable solution to counter threats to the countrys stability reported Malis state-owneddaily LEssor[ 3] The program aimed to undermine support for Al-Qaida in the IslamicMaghreb (AQIM) according to Burkinabe web portal Lefasonet on 11 August

Somali Prime Minister Abdiweli Muhammad Gas stated on 23 August that theTransitional Federal Government planned to remove Al-Shabaab from the central andsouthern regions in Somalia with the goal of restoring peace within one year so the

country can hold national elections according to the Puntland-based Garowe Online

Experts Media Highlight New Capabilities Tactics

African experts and media outlets are warning about the evolving nature of terrorist organizations on thecontinent the terrorists pursuit of new targets and tactics and their potential for taking advantage of regional instability

Leading South African think tank the Institute for Security Studies stated on 29 Augustthat Boko Harams attack on the UN in Abuja completes Boko Harams metamorphosisinto an international terrorist group Since December 2010 Boko Haram had killed over600 people in over 70 attacks against Nigerian targets according to the think tank buthad not previously targeted Western or international interests

A 26 August article on the popular Malian web portal Maliweb voiced concern thatAQIM could benefit from Tuareg mercenaries many of whom were recently returningfrom fighting in Libya and could benefit from an increase in arms trafficking through theSahel during the Libyan conflict

Ugandas privately owned Daily Monitor reported on 19 August that AU forces inSomalia warned that Al-Shabaab planned to increase the number of kidnappings andbomb attacks as part of its new strategy to shift from controlling territory in Mogadishuto conducting more of an insurgent campaign

Concern Over Al-Qaida Presence Terrorist Collaboration

West African official statements and media reports reflect a growing concern over an increased Al-

Qaida presence in West Africa and collaboration with AQIM Al-Shabaab and Boko Haram

Nigerian security services reported that the suspected mastermind behind the 26 Augustbombing of the UN office in Abuja was a Boko Haram member with close links to Al-Qaida and Al-Shabaab according Nigerias privately owned Daily Sun

A 28 August report in the privately owned daily Nigerian Tribune claimed that the 26August bombing in Abuja was part of Al-Qaidas plans to mark the 10th anniversary of 911 and called Boko Haram Al-Qaidas ally in the region

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3142

An 8 August commentary in Burkina Fasos LObservateur Paalga said that reports of Boko Haram collaboration with Al-Shabaab and AQIM could indicate that Al-Qaida isextending its African tentacles Abdourahmane Dieng security division chief of theEconomic Community of West African States said the collaboration represented a veryserious threat according to Senegals progovernment Le Soleil on 5 August

Messages Likely To Resonate With African Audience

Sub-Saharan Africas increasing concern about the shifting nature and potential strengthening of theterrorist threat on the continent suggests that messages directly addressing the impact of terrorism onAfricans the increasingly complex nature of the threat and the need for multilateral cooperation againstterrorism are most likely to resonate with Africans

Messages expressing solidarity and sympathy for Africans affected by Boko Haram Al-Shabaab and AQIM would almost certainly resonate with a broad African audience

African political and military leaders would probably welcome acknowledgement of thecomplex and changing nature of terrorism on the continent and recognition of theirinitiatives and commitment to countering violent extremism

African leaders and medias concern about potential collaboration between Boko Haram

Al-Shabaab and AQIM suggest that they would be open to improving multilateral andcross-regional sharing of lessons learned and strategies to counter the intensification of terrorism within Africa

Aviation and Maritime Security| back to top |

Bomb Threats Force Jets To Land

Associated Press | 7 September 2011

Both landed safely one landed in Ankara Ataturk International Airport and the other at Kuala LumpurTwo flights operated by Pakistans state-owned airline received bombs threats on Wednesday

and both landed safely one in Turkey the other in Malaysia officials said No bombs were found The

first flight was headed for Manchester England when it was notified of the threat near the Bulgariancapital of Sofia The crew contacted the control tower in Istanbul to seek permission for the landingstate-run Anatolia news agency reported Authorities quickly evacuated all 378 passengers from theBoeing 777-300ER aircraft after it parked at a remote corner of the International Ataturk Airport andbomb squads began searching the plane with sniffer dogs Anatolia reported PIA spokesman MashoodTajwar confirmed the flight received a threat and landed All passengers were safe A police searchturned up no bomb officials said Later a second PIA flight from Islamabad to Kuala Lumpur alsoreceived a bomb threat It landed in Kuala Lumpur and all the passengers disembarked safely saidTajwar The UK-bound Pakistan International Airlines plane was forced to make an emergency landingat Ataturk Airport in Istanbul after receiving a bomb threat Malaysias airports authority said thepassengers were being screened and the plane was isolated in a parking area while being searched bypolice No bomb was found

It said the plane carried 164 passengers and 13 crew Azmi Murad senior general manager forthe authority said the Pakistani airline informed it that the warning came by email Mr Tajwar gave nodetails on the nature of the threat or how it was delivered Pakistan is home to al Qaedas top leadershipMilitants who trained there have been responsible for many of the attacks and failed plots in the USand Europe since Sept 11 2001 when planes hijacked by al Qaeda militants destroyed the World TradeCenter in New York and crashed into the Pentagon The bomb threats came four days before the 10thanniversary of 911 but there was no apparent link to Islamist militants who typically do not alertauthorities in advance The FBI and Homeland Security department issued warnings last weekend aboutal Qaeda threats to small airlines

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3242

Commentary amp Opinion| back to top |

From Terror Group Founder To Libyan Rebel Military Commander

ABCNews | 29August 2011

The same man who triumphantly led Libyan rebels into Gadhafis compound last week first came to theattention of the US intelligence community years ago - as a founder of a terror group

Abdelhakim Belhaj who was recently appointed to Tripolis rebel military council was one of the original founders of the Libyan Islamic Fighting Group an anti-Gadhafi group which was laterdesignated by the US State Department as a terrorist organization with links to al Qaeda according toUS government reports

We proudly announce the liberation of Libya and that Libya has become free and that the ruleof the tyrant and the era of oppression is behind us a victorious Belhaj told reporters after the stormingof Gadhafis Bab al-Aziziya compound last week Ousting Gadhafi had been the main objective of theLIFG since its inception in the early 1990s even if some of the fighters believed that meant puttingAmericans in the crossfire

The group carried out operations against the Libyan government including at least four suspectedassassination attempts against Gadhafi in the 1990s and was also believed to be connected to a series of suicide bombings in Casablanca Morocco in 2003 the US State Department reported As relationsbetween the US and Gadhafi improved in the mid-2000s some LIFG leaders cultivated relationshipswith top al Qaeda leaders including Osama bin Laden and were suspected of funneling fighters to Iraq tocarry out operations against US soldiers

When the LIFG was designated a terror organization in 2004 it was meant as a gesture of solidarity with the Libyan government according to a March 2011 congressional report

Contrary to several US government reports Libyan rebel ambassador to the US Ali Aujalitold ABC News that the LIFG was never connected to al Qaeda and did not carry out terrorist operations

They were only opposed to Gadhafi during his rule and paid the price for that by beingoppressed by the regime Aujali said

The CIA first publicly voiced its concerns about the connection between the LIFG and al Qaedain 2004 when then-director George Tenet testified before the Senate Select Committee on Intelligenceand listed the LIFG among groups that represented an immediate threat [that] has benefited from alQaeda links[Article continues here httpabcnewsgocomBlotterterror-group-founder-libyan-rebel-military-commanderstoryid=14405319]

Interview With Saudi Sheik Wajdi Al-Ghazawi

MemriTVcom

Sheik Wajdi al-Ghazawi owner of al-Fajr TV criticizes extremist atmosphere in Saudi Arabia and saysafter 911 They Handed Out Sweets on the Streets of Mecca

Following are excerpts from a statement by Saudi Sheik Wajdi Al-Ghazawi owner of Al-FajrTV which was posted on YouTube on August 4 2011

Wajdi Al-Ghazawi When Al-Qaeda and Osama Bin Laden were at the height of their mightthey were extremely popular in Saudi Arabia From mosque pulpits across Saudi Arabia preacherswould pray for their success Moreover from the pulpits of the most important mosques ndash the Al-HaramMosque in Mecca and the Nabawi Mosque in Al-Madina ndash direct prayers for the success of Al-Qaedawere made during the days of the bombing of Tora Bora Oh Allah help our brothers in AfghanistanThese supplications were made during evening prayers as well as Friday prayers The preachers wouldpray for them in violation of the ministrys instructions

When the twin towers in New York were attacked they handed out sweets on the streets of Mecca By Allah they did I witnessed this myself The young people bowed in prayer and hugged one

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3342

another out of joy People were in heaven because of these young men who destroyed America andbombed this idol Am I right or not Was it like that or not

Back then when the Taliban broke off a piece of the nose of the Buddha statue which was hewnin the mountain an entire sermon was dedicated to it in the mosque in Mecca and the preacher was laterreprimanded for this sermon The entire Saudi people supported and loved Al-Qaeda

This went on until our brothers in Al-Qaeda ndash and I dont know what was going through theirminds ndash began to carry out operations inside Saudi Arabia Thats when we all raised our hands andsaid Youve gone too far We wont support you in this

The atmosphere here in Saudi Arabia is one of extremism It is characterized by focusing onminor details Many things are forbidden Yes maybe they are indeed forbidden but by forcing peopleto avoid them and by acting as if these were major sins an atmosphere was created that gave rise toextremist youth who might act recklessly at the most trivial provocation

For instance we blew out of proportion the issue of music the issue of smoking or the issue of hanging pictures in public places True there are clear texts on these issues but the young peopleembraced these issues as if they were fighting usury fornication or alcohol No these are not among theseven major sins So our society has become extreme

This extremist atmosphere has given rise to people who accuse others of heresy and people whopurport to be waging Jihad It has created genes that gave rise to cells of Al-Qaeda and other terrorists

We must examine our breeding ground in which these young men were sownBy Allah what can possibly emerge from such an atmosphere Muftis who accuse others of

heresy sheiks who incite and young people who bomb Am I right or not[Complete clip is available here httpwwwmemritvorgclipen3099htm]

Legal Aspects amp Lawfare| back to top |

Revisiting A Stale Counterterrorism Law

Council on Foreign Relations | 1 September 2011

ldquoNearly a decade after 911 the United States still relies on the 2001 Authorization for the Use of Military Force (AUMF) for the killing and detention of those considered responsible for or associatedwith the terrorist attacks But CFR national security law expert John Bellinger says it is becomingincreasingly difficult for the Obama administration to justify some of its counterterrorism operationsunder this limited statutory authority It has been used in defense of actions including drone attacks onindividuals as well as the targeting of groups in Yemen and Somalia that may have only the mosttenuous affiliation or association to the 911 attack A revised AUMF should clarify those operations aswell as the issue of detention specifically which individuals can be detained for how long and subjectto what processes There also needs to be greater effort at the international level he adds to fill thegaps in the law that covers conflicts between states and non-state actorsrdquohelliprdquo[Complete article is available here httpwwwcfrorgcounterterrorismrevisiting-stale-

counterterrorism-lawp25742]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3442

Narco-Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector[Complete article is available here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Mexicos Cartels Move Into Extortion

At a construction site of an apartment building in the heart of the Mexican capital a company engineerruns through his weekly payroll sheet He has salaries written out for carpenters bricklayers andelectricians At the bottom of the sheet is a notation of $200 for ldquosecurity servicesrdquo next to a nicknameldquoEl Indiordquo mdash the Indian [Complete article is available here

httpwwwtucsonsentinelcomnationworldreport090611_mexico_cartels_bribesmexicos-cartels-move-into-extortion ]

Seven Die In Mexican Pacific Port City

Latin American Herald Tribune

Seven people died in separate shootings in Mazatlan a port city in the northwestern Mexican state of Sinaloa with some of the incidents drug-related a police spokesman told Efe [Complete article is available herehttpwwwlahtcomarticleaspCategoryId=14091ampArticleId=423061]

Tijuana Violence Slows As One Cartel Takes Control

BorderlandBeatcom

Mexicos famously seedy border city of Tijuana is enjoying a lull in drug murders as the countrys mostpowerful cartel gains the upper hand over its rivals [Complete article is available here httpwwwborderlandbeatcom201109tijuana-violence-slows-as-one-cartelhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3542

Network Notes| back to top |

Canadian data foreign threats Spying in the digital age (Suggested by a reader in Lithuania ndash thanks) Globe and Mail | By Colin Freeze 31 July 2010

A government spy agency thatrsquos prohibited from monitoring Canadian citizens is now usingldquoinformation about Canadiansrdquo to zero in on foreign threatsThe ambiguous statement found in a new government report detailing the activities of CommunicationsSecurity Establishment Canada could sanction a range of intelligence-gathering activities ndash includingthe controversial practice of mining ldquometadatardquo from digital communications

Metadata ndash often called data about data ndash are found in e-mails and their attachments and containdigital signatures that can reveal when where and by whom documents were created

The collection of metadata has caused controversy in other countries but never in Canada wherethe Communications Security Establishment Canada operates as an ultra-secretive agency About theonly thing that is known about the classified practices is that they were halted and resumed after someldquomajor changesrdquo including directives signed by Defence Minister Peter MacKay

ldquoI cannot comment on specific operational activitiesrdquo Adrian Simpson a CSEC spokesman toldThe Globe He stressed that reviews upheld that the activities in question were ldquocarried out inaccordance with the law ministerial requirements and CSECrsquos policies and proceduresrdquo

ldquoCSEC is prohibited from directing its activities at Canadians anyone in Canada or Canadiansanywhere in the worldrdquo he said

For decades signals-intelligence agencies in the West have been allowed to safeguard nationalsecurity by eavesdropping on foreignersrsquo conversations Spies can whatever phone lines and satellitesignals they can so long as they never listen in on fellow citizens

But in the digital age governments run increasingly sophisticated dragnets scooping up andscouring through millions of intercepted Internet conversations daily Such practices create legalambiguities

ldquoThe whole issue of what constitutes boundaries for signals-intelligence agencies in cyberspaceis a big debate right nowrdquo said Rafal Rohozinski a security expert affiliated with the University of Torontorsquos Munk School

A watchdog agency that reviews the CSECrsquos activities released an annual report to Parliament onJuly 20 ldquoWhen other means have been exhausted CSEC may use information about Canadians when it

has reasonable grounds to believe that using this information may assist in identifying and obtainingforeign intelligencerdquo it reads

Sometimes collecting metadata is relatively benign It can involve aggregating sets of data tospot trends much like the way meteorologists discern national forecasts from localized information

For example while CSEC canrsquot usually monitor the communications of specific Canadian terrorsuspects it can glean insights by zooming out for big-picture patterns One way to do that MrRohozinski said would be to look at data flows between Canadian cities and Yemen where an Internet-savvy al-Qaeda offshoot works to recruit Westerners

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3642

Metadata however can be more revealing Documents that circulate on the Internet travelaround like postmarked letters marked with return addresses ndash e-mails and attachments have embeddedcodes that speak to the who where and when behind their creation

The US National Security Agency found itself mired in controversy a few years go after itskirted domestic-spying bans by secretly upholding that this sort of American metadata was fair gamedistinct from communication contents

Therersquos little to suggest the CSEC would go that far The federal agencyrsquos activities are reviewedby a watchdog body now headed by a former Federal Court of Appeal judge Robert Deacutecary appointedlast year wrote in his annual report that he was satisfied the CSEC activities in question are lawful evenif his predecessors felt them borderline

ldquoThis was the first review of these activities since hellip their resumption under new policiesrdquo thewatchdogrsquos report says It concludes that the surveillance activities are ldquoin accordance with the lawrdquo andfollow ldquomajor changes to certain policies procedures and practicesrdquo

Much of the concern arises from the possibility that CSEC could hand over metadata intelligenceto domestic law-enforcement and security agencies

As it stands the RCMP and CSIS have to develop their domestic investigations before coming toCSEC ndash usually with warrants ndash if they want specific intelligence The rules guiding handovers are strictbecause even though all agencies run surveillance operations they do so under vastly different

mandates and legal standardsThe spy agency however stood by its practicesldquoCSEC is extremely diligent when it comes to the privacy of Canadiansrdquo Mr Simpson said

[complete article is available here httpwwwtheglobeandmailcomnewsnationalcanadian-data-foreign-threats-spying-in-the-digital-agearticle2113772 ]

Cyber Attacks Against NATO Then And Now

New Atlanticist | 6 September 2011

ldquoNow that NATOrsquos Operation UNIFIED PROTECTOR over Libya is winding down it is worth

noting how few cyber incidents were directed in protest against the Alliance Certainly there was a

cyber component to the liberation of Libya but it was more about content and Internet freedom (the

most newsworthy elements here were the role of social media and the Libyan government taking largeparts of the nation offline) But compared to past history NATO cyber defenders had a relatively easy

time

ldquoNATO has not however had an easy 2011 Although there were three significant incidents we

know about none seemed to have been in direct response to operations over Libyahelliprdquo

[Complete article is available here httpwwwacusorgnew_atlanticistcyber-attacks-against-nato-then-

and-now]

The Calm Before The Storm

Foreign Policy | By Joel Brenner 6 September 2011

Cyberwar is already happening -- and its about to get much much worse A veteran cyberwarriorexplains how America can prepare itself

Revelations of wholesale electronic fraud and massive data heists have become weekly evendaily affairs A multinational electronics corporation loses personal information on more than 100million customers Cyberthieves break into an international bank counterfeit credit balances and lootATMs in four countries grabbing $9 million in just a few hours International gangs spread maliciouscode that conscripts unwitting computers into zombie armies of hundreds of thousands of similarlyenslaved machines Criminals then rent these armies called botnets as easily as you can buy a time-sharing arrangement in a beach condo No wonder the vast majority of Internet traffic is spam

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3742

Yet the loss of personal information and related criminal fraud intolerable as they are are theleast threatening face of electronic insecurity The US militarys secret network is penetratedAmericans corporate pockets are being picked clean of the intellectual property that makes the UnitedStates tick And the electricity grid that keeps the lights on and makes everything move is dangerouslyinsecure

In one remote attack on the Pentagons information systems about 10 years ago the Chinesehauled away up to 20 terabytes of information If the information had been on paper theyd have neededa line of moving vans stretching from the Pentagon to freighters docked 50 miles away in Baltimoreharbor just to haul it away Had they done so the military district of Washington wouldve become anactive theater of operations for the first time since 1865 and the Navy wouldve blockaded theChesapeake Bay But the Chinese did it electronically so who noticed

Corporate espionage by both competitors and foreign intelligence services or their surrogates isalso increasing Intelligence officials see this but cant speak openly about the specifics and Im seeingit now in my law practice The victims rarely admit it for understandable reasons Oracle whichsuccessfully sued SAP for theft of its software code was a prominent exception Google was another

When the Chinese penetrated Google in late 2009 -- yes that operation was Chinese and yes itwas done with the blessing of a member of the Politburo -- they werent after customer informationThey were after the source code that makes Google unique Nor was Google the only victim Thousands

of US and Western firms were penetrated in that affair Foreign governments -- and not only theChinese -- understand that they cannot compete with the United States militarily and politically if theycannot compete with it economically so their intelligence services want to steal its corporate intellectualproperty This is the technology that gives America its competitive edge and often it has nothing to dowith defense Ordinary companies with valuable technology are now being targeted by nation-statesThis is a new era National security and economic security have converged

The danger is not limited to the loss of technology and information however The owners andoperators of the North American electricity grid are hooking up their control systems to the Internet asfast as they can Exposing the grid to the Internet makes it marginally more efficient but it also makes itdramatically more vulnerable to disruption If you can remotely penetrate an electronic system to stealinformation you can remotely penetrate it to shut it down or make it go haywire This is why there is no

longer a meaningful difference between information security and operational security And the biggestoperational risk is the grid In contemporary society nothing moves without electricity If the grid goesout the country stops

As the Stuxnet affair demonstrated remotely engineered disruption of industrial control systemsis now a reality That episode involved the successful electronic attack on the centrifuges in the Iraniannuclear program Only a first-class intelligence agency could have pulled that off but the blueprint fordoing it -- the code itself -- is now public Many American industrial control systems run on the samekind of equipment the Iranians were using but unlike the controls on the Iranian centrifuges thecontrols on the US grid are now being connected to the Internet making them easier to disrupt Stuxnetwas a watershed there will be copycats

Other industrial control systems will also be targets Some already are Air traffic control

railroad switches and water and sewage systems are all electronically controlled now and many arevulnerable If an intruder can break into the right server electronically he can remotely shut downproduction send your goods to the wrong destination and even unlock your doors -- and delete your logentries so he leaves no record of ever having been there

The United States does not lack enemies who would attack it this way Seized al Qaedacomputers contain details of US industrial control systems In 2003 a group affiliated with thePakistani terrorist organization Lashkar-e-Taiba -- the same gang that engineered the 2008 terroristassaults in Mumbai -- plotted to attack the Australian grid Other groups conspired to attack the Britishgrid in 2004 2006 and 2009 Yet the owners and operators of the North American grid continue willy-

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3842

nilly to expose their control systems to the Internet instead of isolating and hardening it This is folly of a high order

Important conclusions for public and corporate policy follow from this vulnerable state of

affairs First cyber insecurity has operational consequences In the current and foreseeable states of technology a high degree of assurance against electronic penetration of anything connected to theInternet is not achievable Large efficient electronically connected organizations and nations aretherefore vulnerable to remotely engineered disruption as well as information theft

Second this risk cannot be eliminated -- but it can be reduced and managed As a nation theUnited States should start by isolating the grids controls from the Internet Undoubtedly there aremarginal efficiencies to be gained by seamless connectivity over a publicly accessible infrastructure butthese gains are usually exaggerated and the risk this connectivity creates is staggering The governmentand the major telecommunications carriers must also make the investment required to re-create themassive redundancies that made the wired telephone network so robust Resilience and swift recoveryshould be the goal If the consequences of cyberattacks were reduced penetration would cease to matter

Third companies that wait for the government to solve their own security problems do so attheir peril The government is broke and the IT backbone is 85 percent private so the governmentdoesnt control it The governments role in altering the status quo will be limited to setting standardsusing its purchasing power to move vendors toward better security and getting its own house in order

The government can neither secure corporate intellectual property nor protect firms against operationaldisruption

Fourth in a world in which everything cannot be protected companies must determine forthemselves what intellectual property and physical assets to isolate and safeguard Those that approachthis task seriously will quickly learn that technology is only one aspect of their insecurity and in manycases the easiest to deal with Unless technology is integrated with personnel practices and operationalsecurity it opens vulnerabilities that its users rarely understand This kind of integration requires theautomated enforcement of reasonable security policies and systematic workforce training and thatoccurs only when management the lawyers and the technologists work closely together This is an old-fashioned management challenge -- not a technological one For their part corporate boards need to takeIT security seriously and launch audits that examine how their systems are actually implemented and

used not merely how they are designed Because as the techies like to put it the weakest link in anysystem is not the silicon-based unit on the desk its the carbon-based unit in the chair Joel Brenner is author of the forthcoming America the Vulnerable Inside the New Threat Matrix of

Digital Espionage Crime and Warfare He has served as the inspector general of the National Security

Agency the national counterintelligence executive and the NSAs senior counsel He now practices law

at Cooley LLP in Washington DC

Cyberattacks Decline Slightly Symantec Report Finds

Dark Reading | 1 September 2011

Organizations worldwide are suffering damages as a result of cyberattacks but interestingly there hasbeen a slight decline in these attacks during the past 12 months according to a new report from

Symantec More than 90 percent of the more than 3300 respondents across 36 countries said theyexperienced tangible losses as a result of a hack with 84 percent reporting financial loss to the cost of abreach Around one-fifth lost at least $195000 in breaches during the past 12 months

Meanwhile Symantec attributes the unexpected bright spot of a decline in breaches toorganizations employing better cybersecurity defenses More than 70 percent of organizations sawattacks in the past 12 months a decline of 5 percent from 2010 And those that experienced anincreasing frequency of attacks dropped from 29 percent in 2010 to 21 percent this year While 100percent last year reported losses from cyberattacks 92 percent did so in 2011 The trend seemscounterintuitive given the rash of high-profile breaches this year More

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 17: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1742

Saudi Arabia

| back to top |

Saudi Arabia Shopping Around For Nuke Technology

Haaretz | 8 September 2011

Ties with Pakistan may remain close as Riyadh seeks nuclear assistanceSynopsis This week brought news that Iran on its own has produced new advanced nuclearcentrifuges According to a report of the International Atomic Energy Agency Iran has begun to installthe centrifuges in its uranium enrichment facility in Natanz But the high-level source noted thatdevelopment and production of the new centrifuges began more than seven years ago That does notspeak of a great technological capability on Irans part Israeli intelligence like its American counterpartviews 2014 or 2015 as the date when Iran will be able to build nuclear weapons says the source - if itwants to and no one blocks it In Saudi Arabia in contrast they are a bit more disturbed by thedevelopments in Iran An American Department of Energy delegation visited Riyadh and met with DrHashim Yamani who heads the King Abdullah City for Atomic and Renewable Energy Saudi Arabiawants to equip itself with nuclear reactors to generate electricity The United States is interested inselling Riyadh reactors for two reasons - fat contracts and the ability to keep close tabs on nucleardevelopments in Saudi Arabia The American administration is concerned that with a nuclear programfor civilian uses Saudi Arabia would actually like to prepare the infrastructure so it could switch to

producing nuclear weapons relatively quickly should Iran possess such weapons Defense ministerSultan Bin Abdul Aziz and the countrys former intelligence chief Turki Bin Faisal reportedly favorthe preparation of a secret nuclear program for military uses in cooperation with a Sunni Muslim ally -Pakistan which possesses dozens of atomic bombs Saudi Arabia reportedly funded Pakistans nuclearweapons program in return for Pakistans promise to aid the monarchy in this area if need be

Serbia

| back to top |

Serbia Threatened By Terrorism Says Dacic

Tanjug | 8 September 2011

US officials warned Serbia of possible terrorist activity particularly against foreign interests

After a warning coming from USA officials Serbia will raise the level of security in all facilitiesbelieved to be a possible target of terrorists the countrys Deputy Prime Minister and Minister of InteriorIvica Dacic stated Wednesday in the Palace of Serbia He stated that the security measures will primarilyrefer to the facilities of foreign countries in Serbia and added that special attention will be paid to thesecurity of air traffic US officials assume that there is a possibility of new terrorist attacks in the USAand other countries including Serbia Dacic said following a meeting with Special Representative of the UN Secretary-General for Disaster Risk Reduction Margareta Wahlstrom in Belgrade and a sessionof the republic headquarters for emergency situations

Somalia

| back to top |

Six Killed In Mortar Attack In Somali CapitalShabeelle Media Network website | Mogadishu in Somali 7 September 2011

Six people were killed and several others injured after three mortars landed in Mogadishus Arjantiinneighbourhood in Kaaraan District on the night of 6 September the privately-owned Shabeelle websitereported It quoted an eyewitness as saying that two of the three mortars fired have caused thecasualties inflicting fear in the residents who returned to their homes after Al-Shabab vacated the areaearly last month Kaaraan District is one of the areas taken over by the government forces and AUpeacekeepers

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1842

United States

| back to top |

Post-911 Intelligence Reform Takes Root Problems Remain

Reuters | 8 September 2011

US intelligence agencies will forever be scarred by their failure to connect the dots and detect theSeptember 11 plot but a decade later efforts to break down barriers to information-sharing are takingroot Changing a culture of need-to-know to need-to-share does not come easily in spy circles Someofficials say they worry a decade later about a future attack in which it turns out that US spy agencieshad clues in their vast vaults of data but did not put them together or even know they existed

Yet significant changes both big and small have broken down barriers between agenciessmoothed information-sharing and improved coordination US intelligence experts say From issuing ablue badge to everyone working in the sprawling intelligence community to symbolize a commonidentity to larger moves of mixing employees from different agencies the goal is singular -- to preventanother attack

Were much further ahead David Shedd Defense Intelligence Agency deputy director said of the ability to connect the dots compared with 10 years ago Still signs of a plot to attack the UnitedStates could be missed again My worst fear and I suspect probably one that would come true is that inany future would-be or actual attack God forbid we will be able to find the dots again somewhere

because of simply how much data is collected Shedd said The political response to the failure to stopthe attack was the 2002 creation of the Department of Homeland Security pulling together 22 agenciesto form the third largest US Cabinet department behind the Pentagon and Veterans Affairs

That was followed by the creation in late 2004 of the Director of National Intelligence to overseeall the spy agencies as recommended by the bipartisan 911 commission Previously the CIA directorheld a dual role of also overseeing the multitude of intelligence agencies But in the aftermath of the2001 attacks policymakers decided that was too big of a job for one person to do effectively

Critics argued then and now that the reforms were the governments usual response to crises --create more bureaucracy But others see much-needed change It has been a tremendous improvementsaid Lee Hamilton who was the 911 commission vice chair Its not seamless there are problems andweve still got a ways to go The 2001 attacks involving airliners hijacked by al Qaeda operatives killed

nearly 3000 people in New York Pennsylvania and the Pentagon Various US intelligence and lawenforcement agencies had come across bits of information suggesting an impending attack but failed toput the pieces together The CIA had information about three of the 19 hijackers at least 20 monthsbefore the attacks the National Security Agency had information linking one of the hijackers with alQaeda leader Osama bin Ladens network the CIA knew one hijacker had entered the United States butdid not tell the FBI and an FBI agent warned of suspicious Middle Eastern men taking flying lessons

Have the reforms made America safer Officials say yes and point to the US operation thatkilled bin Laden in Pakistan in May that demanded coordination among intelligence agencies and themilitary But there is an inevitable caveat no one can guarantee there will never be another attack onUS soil On Christmas Day 2009 a Nigerian man linked to an al Qaeda off-shoot tried unsuccessfullyto light explosives sewn into his underwear on a flight to Detroit from Amsterdam It turned out US

authorities had pockets of information about him President Barack Obama used a familiar September 11phrase to describe the 2009 incident as a failure to connect the dots of intelligence that existed acrossour intelligence community

Roger Cressey a former White House National Security Council counterterrorism officialresurrected another September 11 phrase It was a failure of imaginationThe intelligence community had not seen al Qaeda in the Arabian Peninsula a Yemen-based al Qaedaoff-shoot as capable of striking the US homeland If the underwear bomber threat had originated inPakistan they would have gone to battle stations immediately Cressey said Some proposed changesin how authorities would respond to another successful attack still are pending For example creation of

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1942

a common communication system for police firefighters and other emergency personnel remainstangled up in political wrangling in Congress over how to implement it This is a no-brainer Hamiltonsaid The first responders at the scene of a disaster ought to be able to talk with one another Theycannot do it today in most jurisdictions

Former leaders of the 911 commission issued a report card saying nine of its 41recommendations remain unfinished The Office of the Director of National Intelligence hasexperienced growing pains as overseer of the 17 spy agencies churning through four chiefs in six yearsTensions over turf confusion about the DNIs role and problems herding agencies with very powerfulchiefs of their own all came to a crescendo when retired Admiral Dennis Blair the third DNI tried toassert authority over CIA station chiefs who represent the agency in different countries The positionof chief of station is one of the crown jewels of the CIA and they dont want anyone playing with theircrown jewels said Mark Lowenthal a former senior US intelligence official

After a dust-up with CIA Director Leon Panetta who now is defense secretary it was Blair whowas sent packing I think the mistake that some have made is to have viewed the DNI and the Directorof CIA as an eitheror proposition rather than the power of the two working together the DIAs Sheddsaid in an interview in his office There is a history of where that hasnt worked so well I believe it isworking much better today said Shedd who has worked at the DNI CIA and National SecurityCouncil

Intelligence experts say in the current administration Obamas top homeland security andcounterterrorism adviser John Brennan arguably has more power than any of them because he has thepresidents ear Its a reminder that bureaucratic reform or no personalities count in making nationalsecurity policy The improved sharing of secret data has led to yet another set of problems The delugeof bits and bytes has subjected intelligence analysts to information overload as they try to sift through itall for relevant pieces Our analysts still are spending way too much time on finding the informationrather than on the analysis of the information Shedd said There is just too much data to go find it all

The intelligence community wants a system developed that would automatically processinformation from multiple agencies and then make the connections for the analysts

But greater inroads into sharing data across agencies does not guarantee that another attack willbe averted The threat has evolved and officials now are increasingly concerned about a lone wolf plot

by an individual not tied to any militant group that may be more difficult to uncover Those threatswill not come to our attention because of an intelligence community intercept said John Cohen asenior Department of Homeland Security counterterrorism official

They will come to our attention because of an alert police officer an alert deputy sheriff analert store owner an alert member of the public sees something that is suspicious and reports it Cohensaid One measure of the success of post-911 reforms is that a decade later the United States has not hada similar attack Now that could be luck that could be skill we dont really know Hamilton said Butin all likelihood what we have done including the establishment of the Department of HomelandSecurity and the transformation in intelligence and FBI has certainly been helpful[Article continues here ]httpnewsyahoocompost-9-11-u-intelligence-reforms-root-problems-052514320html

Comment the value added provided by the Office of the DNI remains an open question for many withinthe Intelligence Community (IC) and is a favored theme of corridor discussion in IC-member agenciesOn the other hand there is broad agreement among intelligence officials that the degree of cooperationand coordination between intelligence agencies and the character of intelligence sharing has vastlyimproved The fact that there has not been a successful major attack on US soil since 911 ndash not forlack of plotting ndash is in great part testimony to this more effective cooperation

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2042

Jihadist Suggests Striking New York City Bridges

All SITE Intelligence Group | 6 September 2011

A jihadist pointed to what he found to be a weak point of suspension bridges and directed his messageto those who love blasting and explosions In a message posted on the Shumukh al-Islam forum onSeptember 6 2011 the jihadist Abu Suleiman al-Nasser gave a picture of the Verrazano Bridge inNew York on which he drew a red box and arrow on the bridges center He then gave a map on whichhe circled the various bridges in New York City and its boroughs A fellow jihadist offered his ownidea giving a picture of the Hoover Dam and explaining that there is no target more important thandams He wrote that striking a dam may lead to the submerging of cities and the killing of thousands of people and in the case of the Hoover Dam would impact Las Vegas the capital of gambling anddebauchery

Counterterror Veteran is New Deputy FBI Director

Atlanta Journal Constitution | 1September2011

A 24-year FBI veteran with extensive counterterrorism experience Sean Joyce has been named the lawenforcement agencys new deputy director Elevated to the No 2 post within the FBI by Director RobertMueller Joyce replaces Timothy Murphy who is retiring after 23 years with the bureau Since last yearJoyce has been executive assistant director of the national security branch responsible for the FBIs

national security and intelligence operations He earned the Attorney Generals Award for ExceptionalService in 2004 for work on a counterterrorism squad in Dallas In 2008 he was named chief of thecounterterrorism divisions international terrorism operations section with responsibility forinternational terrorism matters within the United States hellip[Complete article is available here httpwwwajccomnewsnation-worldcounterterror-veteran-is-new-1153018html]

Top CIA Official Obama Changed Virtually Nothing

Salon | 1 September2011

PBSs Frontline is airing an examination of Top Secret America on September 6 The show includes arare and lengthy interview with 34-year-CIA-veteran John Rizzo who is described as the most

influential lawyer in CIA historyHere is one quote they include from Rizzo With a notable exception of the lsquoenhanced

interrogationrsquo program the incoming Obama administration changed virtually nothing with respect toexisting CIA programs and operations Things continued Authorities were continued that wereoriginally granted by President Bush beginning shortly after 911 Those were all picked up reviewedand endorsed by the Obama administration hellip[Complete article is available herehttpwwwsaloncomnewspoliticsbarack_obamastory=opiniongreenwald20110901obama]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2142

General Counterterrorism News| back to top |

The Terrible Missed Chance

Newsweek | 4 September 2011

Special Agent Harry Samit of the FBIs Minneapolis field office knew he was looking into the eyes of aterrorist It was early afternoon on Friday Aug 17 2001 Across from him sat Zacarias Moussaoui a33-year-old French-born student arrested the day before for overstaying his visa Moussaoui had paidmore than $8000 in cash that summer to sit in a cockpit simulator in a flight school in the suburbs of Minneapolis and learn - in a matter of days - the basics of how to fly a 747-400 Samit a formerintelligence officer at the Navys celebrated Top Gun flight school felt sure the man across the desk from him was a Muslim extremist who was part of a plot to hijack a commercial jetliner filled withpassengers The trick Samit wrote in a soon-to-be-released excerpt of a book hes written about thecase was getting Moussaoui to admit this and reveal details and associates to allow us to stop the plot

Surely the bureau brass in Washington would share his concern Samit thought He was wrongThat same day halfway across the country in the fluorescent-lit hallways of the J Edgar Hoover

FBI headquarters building in Washington counterterrorism supervisors were treating Samits firstreports about Moussaoui with skepticism even contempt Michael Maltbie a DC counterterrorism

specialist insisted repeatedly in the days after the arrest that there was no clear link between Moussaouiand Al Qaeda - the link needed for a warrant Maltbie thought Moussaoui was a dirty bird he latertold investigators but favored deporting him to France

Believing a hijacking might be imminent Samit appealed to his boss in Minneapolis SpecialAgent Greg Jones Jones picked up the phone on Aug 27 and called Maltbie at FBI HQ

Moussaoui he said might be part of a plot to get control of an airplane and crash it into theWorld Trade Center or something like that

Maltbie scoffed You have a guy interested in this type of aircraft Maltbie replied accordingto FBI documents That is it (Maltbie declined requests for an interview)

At least Maltbie was paying attention Michael Rolince who ran the FBIs InternationalTerrorism Operations Section was arguably the bureaus most important go-between with the White

House on domestic terrorist threats in the summer of 2001 He tells Newsweek he spent less than 20seconds being briefed on the Moussaoui case that August His office was inundated with terrorismprobes he said since Moussaoui was in custody already he posed no immediate threat Did it rise tothe level of something that I would take upstairs Rolince asks The answer is no

At CIA headquarters alarm bells were ringing loudly CIA Director George Tenet was briefedon Moussaoui within days of the arrest receiving a paper with the eye-catching headline IslamicExtremist Learns to Fly But the FBIs acting director that summer and the bureaus most seniorcounterterrorism official were left in the dark[Article continues here httpwwwthedailybeastcomnewsweek20110904the-terrible-missed-chancehtml]

Pan Am Flight 103 - Lockerbie Bombing - al-Megrahi CIA FilesWebwire | 31 August2011

BACM ResearchPaperlessArchivescom has announced the publishing of CIA files related to the PanAm Flight 103 Lockerbie Bombing

The files can be downloaded at no cost at httpwwwpaperlessarchivescompanam103ciahtml The files date from 1984 to 1999 These are the most recent files on Pan Am 103 released by the

CIA This set of files is unique because it includes memos on the direct handling of an intelligencesource This type of information is exempt from the Freedom of Information Act (FOIA) and is not oftenreleased by the Agency

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2242

The files cover information received by the CIA on Abdel Basset al-Megrahi Al-Megrahi is theonly person ever convicted in the Pan AM 103 case The Scottish government in 2009 allowed al-Megrahi to be released from custody and returned to Libya because of his failing health With the recentfall of Muammar Qaddafis regime there have been renewed calls for al-Megrahi to be returned toScottish custody or extradited to the United States and put on trial[Complete article is available here httpwwwwebwirecomViewPressRelaspaId=144692]

Getting The Caucasus Emirate Right

CSIS | August 2011

ldquohellipThis report aims to set straight a rather distorted record It demonstrates the veracity of three vitallyimportant facts usually obfuscated in discussions of the subject (1) the longstanding and growing tiesbetween the CE and its predecessor organization the ChRI on the one hand and al Qaeda (AQ) and theglobal jihad on the other hand (2) the importance of the CE jihadi terrorist network as a united andorganized political and military force promoting jihad in the region and (3) the salience of local culturaland the Salifist jihadist theo-ideology and the influence of the global jihadi revolutionarymovementalliance as key if not the main factors drive the ldquoviolence in the North Caucasusrdquohelliprdquohttpcsisorgfilespublication110829_Hahn_GettingCaucasusEmirateRt_Webpdf

7 Things You Didnrsquot Know About the War on TerrorForeign Policy | By Eric Schmitt and Thomas Shanker 6 September 2011

From an attempt to negotiate with Osama bin Laden to a proposal to threaten to bomb Mecca its been awild decade for the US national security establishment

Our new book Counterstrike The Untold Story of Americas Secret Campaign Against Al Qaeda is in many ways asummary of the past decade of our reporting on the military intelligence community and domestic law enforcement as itentered a new era of Darwinian evolution to counter violent extremism

It also is our deep dive into a decade of American counterterrorism efforts -- from the work of commando trigger-pullers and spies on the ground up to senior political leaders who wanted to defendthe nation (and get re-elected) Our efforts to report and write this book allowed us to uncover many newmissions never discussed before -- and gave us an understanding of how the war on terror had changedover the last decade

Our book assesses the 10 years since 911 as the military divides the fight into tactical missionson the battlefields of modern terrorism then the operational advancements that provided the means tosuccess while not securing final victory and at the top the strategic level of policy debates about howthe nation should combat this threat to its security

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2342

Here are seven vignettes from Counterstrike that offer glimpses into the thinking of policymakers andcommanders in early days after the Sept 11 attacks and how that thinking evolved over the followingdecade into a more whole-of-government approach to combating terrorists

1 Bush Tried to Negotiate with al Qaeda

The George W Bush administration like all of its predecessors swore never to negotiate with terroristsBut it did undertake an extraordinary and extraordinarily secret outreach effort to open a line of communication with Osama bin Laden and al Qaedas senior leadership It was an attempt to replicatehow the United States tried to sustain a dialogue with the Soviet Union even during the darkest days of the Cold War when White House and Kremlin leaders described in private and in public a set of acceptable behaviors -- and described with equal clarity the swift vicious even nuclear punishment forgross violations

In the months after the Sept 11 attacks Bushs national security staff working through theintelligence agencies made several attempts to get a private message to bin Laden and his inner circleThe messages were sent through business associates of the bin Laden familys vast financial empire aswell as through some of the al Qaeda leaders closest relatives a number of whom were receptive toopening a secret dialogue to restrain and contain their terrorist kinsman whom they viewed as a blot on

their name (To be sure other relatives were openly hostile to the American entreaties)According to a senior American intelligence officer with first-hand knowledge of the effort the

response from Osama bin Laden was silence And the effort was suspended

2 Sometimes a Wedding Is Just a WeddingIn the early days after the Sept 11 attacks the CIA and FBI vied to produce the most compellingintelligence reports that tracked suspected terrorist plots The agencies often worked at cross purposessometimes unwittingly At one point in early 2002 both agencies were tracking what American analystssaid were growing preparations for a major wedding somewhere in the Midwest (In terroristvernacular the word wedding is often code for a major attack)

Dribs and drabs on this wedding planning made their way to President Bush from bothagencies independent of each other of course

Finally over the Easter holiday during a video-teleconference with top aides in Washingtonfrom his ranch in Crawford Texas Bush stopped the briefing exasperated by the discrepancies in therival agencies reporting about the suspected threat

George Bob get together and sort this out Bush told his CIA director George J Tenet andFBI director Robert S Mueller III

Bushs instincts were correct When the analysts finally untangled their clues it turned out thatthe ominous wedding really was just that the matrimony of a young man and a young woman fromtwo prominent Pakistani-American families There was no threat There was no plot

3 The Threat to Bomb MeccaAs fears of a second attack mounted following the 911 strikes US government planners franticallycast about for strategies to protect the country Even the most far-fetched ideas had a hearing howeverbriefly In one case some government planners proposed that if al Qaeda appeared ready to attack America again the United States should publicly threaten to bomb the city of Mecca in Saudi Arabiathe holiest site in all of Islam in retaliation Just nuts one Pentagon aide wrote to himself when heheard the proposal The idea was quickly and permanently shelved

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2442

4 The SEAL Raid in Iran That Didnt HappenWhen US forces routed the Taliban government in Afghanistan and forced bin Laden and his toplieutenants to flee many senior al Qaeda leaders including bin Laden and his deputy Ayman al-Zawahri escaped to neighboring Pakistan But a separate group including the al Qaeda leaders sonSaad bin Laden fled to northern Iran where American troops would not pursue them and the Iranianswould likely not detain them But the Shiite clerics running Iran placed the al Qaeda operatives and theirfamily members under virtual house arrest and they became a shield against possible attacks from theSunni-based terrorist organization

One plan in particular illustrated the bold thinking and wildly unrealistic aims of the militarysinitial approach after 911 to kill or capture terrorist leaders The plan called for hunting the eight to 10senior al Qaeda leaders and operatives who had sought refuge in Chalus an Iranian resort town on theCaspian Sea where they had been detained

At the Joint Special Operations Command at Fort Bragg NC military planners drew up optionsfor Navy SEALs to sneak ashore at night using state-of-the-art mini-submarines Once they landed theSEALs would slip past Iranian guards to snatch the al Qaeda leaders Another option called for SpecialOperations helicopters to spirit American commandos into the town and whisk them out again with theirquarry The Americans went as far as conducting two or three rehearsals at an undisclosed locationalong the US Gulf Coast in early 2002 They conducted small-boat insertion exercises involving about

30 Special Operations personnel most SEALs and eventually concluded the mission was feasible if they were provided with more detailed intelligence on the locations of the al Qaeda members and thesecurity around them

The logistics of the mission were daunting Chalus sits at the edge of the Elburz coastal mountainrange about 70 miles north of Tehran and the failed rescue of the American hostages in Iran in April1980 loomed large in commanders memories Eventually Gen Richard B Myers the chairman of theJoint Chiefs of Staff rejected the mission as too risky and too politically volatile Many of the al Qaedaoperatives are reportedly still there

5 Intelligence Hauls of Unusual Size

US intelligence and military commandos have carried out tens of thousands of raids in the decade since911 The amount of material seized from terrorist and insurgent targets has grown to a massive sizeThe Defense Intelligence Agency (DIA) operates exploitation triage centers and giant warehouses forstoring intelligence products -- in war zones rear headquarters in countries like Qatar and back in theUnited States One intelligence analyst said that walking into one of the warehouses for documents andmedia exploitation reminded him of the final scene in Raiders of the Lost Ark when the captured Ark of the Covenant is crated up and rolled into a cavernous storage area that contains all the governmentsother dangerous secrets

All told more than two million individual documents and electronic files have been cataloguedby media type hard copy phone number thumb drive Each is inspected by a linguist working with acommunications analyst or computer expert

The DIA analysts are joined by specialists from other agencies including the FBI and the DrugEnforcement Administration Yet given the overwhelming volume no more than about 10 percent of thecaptured intelligence has ever been analyzed

Intelligence officers say they simply are overwhelmed and untold quality leads may still beburied in the piles of computers digital files travel documents and pocket litter

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2542

6 The Digital Counterjihad Cyberspace is the terrorists ultimate safe haven Its where they recruit raise money and even plotattacks using coded language while playing online video war games The US government fights back

One technique is called false band replacement whereby the intelligence agencies infiltratemilitants networks and post their own material to counter extremist efforts on those same jihadistwebsites The trick is to forge the onscreen trademarks -- web watermarks -- of al Qaeda media sites

This makes messages posted on these sites official and sows dissent and confusion among themilitants

This Internet spoofing can be used in support of more traditional combat missions There is atleast one case confirmed by American officials in which a jihadist website was hacked by Americancyberwarriors to lure a high-value al Qaeda to a surreptitious meeting with extremist counterparts -- onlyto find a US military team in waiting

Getty images

7 First Kill the MullahsUS counterterrorism officials have learned fighting terrorists effectively means targeting specific nodesof that network that support and enable militants who strap on suicide vests This strategy focuses onneutralizing enablers such as the financiers gun-runners and logisticians Among these terror linchpins

are religious leaders who bless attacksHeavenly reward will not await a suicide bomber unless his death and those of his victims is

deemed halal in keeping with Islams sacred sharia law Each militant network has a sharia emir usuallyat the level of a sheikh or mullah In Iraq American commanders specifically killed emirs to throw awrench in a suicide bombing networks

Take him out and suicide bombings from that network are frozen until he is replaced said onemilitary officer with command experience in Iraq hellip[Complete article is available herehttpwwwforeignpolicycomarticles201109067_things_you_didn_t_know_about_the_war_on_terror]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2642

Dick Marty Rendition Report Condemns lsquoCult of Secrecyrsquo

BBC News | 8 September 2011

A report for Europes human rights watchdog has called for greater scrutiny of secret services andsupport for whistleblowers The Council of Europe investigated how countries like Britain GermanyRomania and Lithuania assisted the US with the rendition of terror suspects It said a cult of secrecyhad helped Western governments cover up abuses Defending whistleblowers it singled out USsoldier Bradley Manning accused of passing secrets to Wikileaks He had acted as a whistleblowerand should be treated as such CoE rapporteur Dick Marty wrote in the report which was due to besubmitted to the CoEs Parliamentary Assembly The soldier is currently in a US military prisonawaiting trial for passing restricted material to the controversial website

But the report praised Mr Manning and Wikileaks itself for uncovering evidence of renditionThe CoE represents 47 member-states including both EU countries and Russia and other ex-Sovietstates Mr Martys report focused on the record of Western states explaining that it was based oninvestigations into European links to the controversial US policy of rendition for terrorism suspectsThe CIA allegedly flew terror suspects around the world for interrogation in the years after 911 holdingthem in secret prisons in Europe and elsewhere

No licence to kill

In his 48-page report - entitled Abuse of State Secrecy and National Security - Mr Marty looked at thelevel of control exercised by European states over their security services He urged all states to useindependent parliamentary committees to oversee the work of their secret services saying this was of vital importance for the rule of law and democracy Mr Marty argued that Western governments wereusing the notion of state secrecy to shield their intelligence services from accountability for seriousviolations committed during anti-terrorist operations We consider that this is simply unacceptablehe wrote

A licence to kill (or to abduct and torture) only exists in certain films and in dictatorialregimes In democratic systems parliaments as representatives of the people have a right and duty toknow what the government is doing in the name of the people Mr Marty praised investigative journalists and non-governmental organisations for their work in exposing abuses of authority Stressing

the fundamental role whistleblowers had to play in an open society he warned against a real cult of secrecy as an instrument of power

While it was up to the courts to decide if Bradley Manning had committed any crime he wrotethe CoE was indebted to him for the publication of a recording of a helicopter attack in Iraq in whichthe crew seems to have intentionally targeted and killed civilians

Thanks to Mr Manning he said a large number of embassy reports had allowed us to learnsignificant details of important recent events which are obviously of general interest We therefore join Amnesty International in expressing our worries as to the treatment he receives Mr Marty wrote inthe draft report[Article continues here httpwwwbbccouknewsworld-europe-14820145]Comment This report demonstrates that Dick Marty is not as De Gaulle would say a serious man To

suggest that Bradley Manning is a hero and intelligence agencies bent on defeating terrorists arecriminals should say it all Manning knowingly violated his oath and willfully provided enormousamounts of classified material to WikiLeaks For Marty this is a good thing in the name of transparencyMarty always injudicious and anti-American in his remarks is now moving at warp speed into crackpotterritory

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2742

Al Qarsquoida amp its Affiliates| back to top |

Al Qaeda Is Down Not Out

Los Angeles Times | By Amy Zegart 7 September 2011

US talk of defeating terrorism is dangerously prematureTalk of strategically defeating Al Qaeda is all the rage in the White House these days Defense

Secretary Leon Panetta used the D-word in July President Obama declared in his new counter-terrorism strategy We can say with growing confidence that we have put Al Qaeda on the path todefeat Compared to the woeful state of the economy terrorism has become the administrations feel-good story of the year

Defeat is a big word It is also dangerously misleading Yes the United States has made greatstrides in the last decade to harden targets improve intelligence and degrade the capabilities of violentIslamist extremists Osama bin Ladens death was a major accomplishment But the fight is nowhereclose to being won and Americas most perilous times may lie ahead Three reasons explain why

The first is that strategically defeating Al Qaeda is not nearly as important as it sounds After911 Al Qaeda morphed into a more complicated decentralized and elusive threat consisting of threeelements core Al Qaeda affiliates or franchise groups operating in places like Yemen and Somalia with

loose ties to the core group and homegrown terrorists inspired by violent extremism often through theInternet in the comfort of their own living rooms

Core Al Qaedas capabilities started degrading in 2001 when the US invaded Afghanistandismantled training camps ousted the Taliban and sent Bin Laden running The CIA has estimated thecore group remaining in the AfghanistanPakistan region to number 50 to 100 fighters The last time BinLaden oversaw a successful operation was 2005 when Al Qaeda struck the London transit system

But plots by homegrowns and franchise groups have risen dramatically in recent years The 2009Ft Hood shooting the worst terrorist attack on US soil since 911 was the work of a homegrownterrorist The mastermind of the 2010 Times Square car bomb plot was a naturalized American citizentrained by the Pakistani Taliban not Al Qaeda Another franchise group Al Qaeda in the ArabianPeninsula was behind the foiled 2009 Christmas Day underwear bomber aviation plot and the 2010

plot to explode tampered printer cartridges aboard cargo planes The Bipartisan Policy Center reported11 violent Islamist extremist terrorist incidents against the US homeland in 2009 the most since 911Nearly all involved what former CIA Director Mike Hayden calls a witches brew of radicalizedAmericans and franchise groups

The second reason why talk of defeat is premature has to do with weapons Terrorism againstAmericans is nothing new The potential for terrorist groups to acquire weapons of mass destruction isIn 1995 a Japanese cult released sarin nerve gas in the Tokyo subway killing 12 people and injuringthousands It was the first WMD terrorist attack in modern history and it sparked a wave of presidentialterrorism commissions years before Bin Laden became a household name

It is this specter of the lone fanatic or small group armed with the worlds most devastatingweapons that keeps experts up at night In 2005 60 leading nuclear scientists and terrorism experts were

asked how many believed the odds of a nuclear attack on the US were negligible Only three or fourhands went up most were far more pessimistic Today there is enough nuclear material to build120000 weapons As long as fissile material is poorly stored and rogue states like Iran and North Koreacontinue their illicit weapons programs nuclear terrorism remains a haunting possibility

The third reason is that the FBI has not yet become a first-rate domestic intelligence agencyAnalysts whose work is vital to success are still second-class citizens labeled support staff alongsidesecretaries and janitors and passed over for key jobs including running the bureaus intelligence unitsThe FBIs information technology is so antiquated it belongs in a museum And the old crime-fighting

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2842

culture still lives There is now a move afoot to shrink new classified facilities so that agents dont haveto waste time away from their cases to read intelligence documents thereStrategically defeating Al Qaeda sounds too good to be true Because it is Amy Zegart is a senior fellow at Stanfords Hoover Institution and the author of Eyes on Spies

Congress and the United States Intelligence Community

US Counterterror Chief Al-Qaida On Steady Slide

Bostoncom | 31 August 2011

White House counterterrorism chief John Brennan said al-Qaida is on a steady slide after the death of al-Qaidas latest second-in-command in Pakistan Brennan told The Associated Press on Wednesdaythat its a huge blow in the first official White House comment since Atiyah Abd al-Rahmans reportedkilling by CIA drone strike in Pakistans tribal areas last week

Al-Qaida is sort of on the ropes and taking a lot of shots to the body and the head Brennansaid This is a time not to step back and let them recover a message he says hes sending to hiscounterparts in Pakistan[Article continues herehttpwwwbostoncomnewsnationwashingtonarticles20110831us_counterterror_chief_al_qaida_on_steady_slide ]

Al-Qaeda (AKA Al-Qaida Al-Qarsquoida)

Council on Foreign Relations | 29 August 2011

ldquoAl-Qaeda an international terrorist network is considered the top terrorist threat to the United StatesThe group is wanted for its September 11 2001 attacks on the World Trade Center and the Pentagon aswell as a host of lesser attacks To escape the post-911 US-led war in Afghanistan al-Qaedas centralleadership fled eastward into Pakistan securing a safe haven in loosely governed areas there In July2007 US intelligence agencies found that the organization was regrouping and regaining strength inthese tribal areas along the border with Afghanistan though targeted killings of senior al-Qaeda leadershave since diminished the groups command and control capabilities In February 2009 Director of National Intelligence Dennis C Blair told lawmakers that the groups core is less capable and effective

than it was a year ago The killing of al-Qaedas top leader Osama bin Laden by US forces in Pakistanin May 2011 served a significant blow to the organization but analysts say al-Qaeda remains deadlywith its networks spread all over the world Plus a number of affiliated groups have gained prominencein recent years complicating the task of containing the organizationrdquo

[Article continues here httpwwwcfrorgterrorist-organizationsal-qaeda-k-al-qaida-al-qaidap9126]

Al Qaeda In The Islamic Maghreb

CSIS | 1 September 2011

ldquoAl Qaeda in the Islamic Maghreb (AQIM) emerged from a decades-long militant Islamist tradition inAlgeria In 1998 the Salafist Group for Preaching and Combat (Groupe Salafiste pour la Preacutedication etle Combat or GSPC) broke away from the Armed Islamic Group (GIA) because of the GIArsquos extensive

targeting of civilians Gradually the GSPC evolved to encompass global jihadist ideology in addition toits historical focus on overturning the Algerian state In 2006 the GSPC officially affiliated with alQaeda core soon rebranding itself as al Qaeda in the Islamic Maghreb In the following years AQIMwas able to conduct a small number of large-scale attacks most notably its 2007 bombing of the UNheadquarters in Algiers In recent years counterterrorism pressure and weak governance have combinedto shift the center of AQIMrsquos presence to the Sahara-Sahel region AQIM continues to make its presenceknown through smuggling operations kidnappings and clashes with security forces in the desert In thecoming years general instability within the region could allow AQIM to further expand its influencerdquo[Complete article is available here httpcsisorgfilespublication110901_Thornberry_AQIM_WEBpdf ]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2942

AQ Strategy

The Assynt Report | 11 August 2011

Executive Summary Al-Qaedarsquos broad objectives remain unchanged in the wake of bin Ladenrsquos death There

are nonetheless growing questions over al-Qaedarsquos capability Longstanding paranoiaover the use of electronic communications is heightened by the ongoing US dronecampaign whilst attacks against the West have generally been disrupted at an early stage

The Pakistani Talibanrsquos attack on a Karachi naval base in May 2011 was a significantmilitary success and the first major act of revenge for bin Ladenrsquos killing Furtherattempts to avenge his loss are certain

All parts of al-Qaeda are working within a cohesive framework with the ultimate aim of restoring the Islamic Caliphate (Khilafa) The strategic plan to support this aim wasdrafted by 40 of al-Qaedarsquos brightest thinkers in Kandahar Afghanistan in November1999 This plan consists of four phases each seven years long leading to the dissolutionof corrupt regimes and the union of all newly-liberated states within the Khilafa

Apart from mounting strategic operations al-Qaedarsquos role is to be the inspiration for atruly global jihadist movement It seeks to achieve this through provision of trainingbeing a role model for others to follow extending acceptance and adoption of its tactics

particularly suicide bombings and professionalising jihadist media to build a commonbrand and message between hitherto separate groups

Between the late 1990s and 2003 the organisation was primarily devoted to classicinternational terrorism Most effort is now spent fighting insurgencies from North Africato South Asia The way in which this strategy helps to spread the struggle has been seenin North-West Africa where the initial development of al-Qaeda in the Islamic Maghrebwas in part fed by men returning from fighting with al-Qaeda in Iraq

Since mid-2009 al-Qaeda and its affiliates have increasingly encouraged jihadist-sympathisers resident in Western countries to engage in violence themselves withoutcentral direction or training making surveillance more difficult

One of the keys to awakening the spirit of jihad was the success in portraying the US and

its allies as Crusaders in the Muslim world Al-Qaedarsquos strategy essentially requires thatthis process be kept running until the forces of jihad have grown large enough to launchsuccessful liberation operations

Despite its successes in Afghanistan al-Qaedarsquos credibility has suffered both from its failure to landanother strategic blow on the West on the scale of 911 and also excessive Muslim casualties in someoperations Similarly al-Qaeda in Iraq was set back by its excessive sectarian zeal and local resentmentat the foreign fighter presence In turn this affected the movementrsquos funding from the Gulf

Analysis Sub-Saharan African Leaders Media Focus On Threats Prior to 911

OSC Feature | Sub-Sahara Africa -- OSC Analysis 6 September 2011Statements by Sub-Saharan African leaders and African media reports on terrorism prior to the 10thanniversary of 911 focus on the growing threats from local extremists and Al-Qaida affiliatesparticularly in West Africa with little direct commentary on the anniversary or US counterterrorismpolicies This focus on domestic threats suggests that counterterrorism messages expressing solidaritywith African nations and acknowledging the evolving terrorist threat on the continent would have thegreatest resonance with African audiences

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3042

Leaders Stressing Determination To Counter Local Threats African leaders public statements reflect an ongoing concern about the threat of terrorism on thecontinent and a strong commitment to find ways to combat this threat

Nigerian President Goodluck Jonathan emphasized the governments commitment tovigorously combat terrorism following the 26 August bombing of the UN office inAbuja by Nigerian extremist group Boko Haram reported the Paris-based news agencyAFP President Jonathan is hosting Liberian President Ellen Johnson Sirleaf and otherforeign dignitaries for a three-day forum on terrorism and economic crimes the widelyread Lagos-based independent daily The Guardian reported on 4 September

Malian President Amadou Toumani Toure launched a Special Program for PeaceSecurity and Development on 9 August stating that development remained the mostviable solution to counter threats to the countrys stability reported Malis state-owneddaily LEssor[ 3] The program aimed to undermine support for Al-Qaida in the IslamicMaghreb (AQIM) according to Burkinabe web portal Lefasonet on 11 August

Somali Prime Minister Abdiweli Muhammad Gas stated on 23 August that theTransitional Federal Government planned to remove Al-Shabaab from the central andsouthern regions in Somalia with the goal of restoring peace within one year so the

country can hold national elections according to the Puntland-based Garowe Online

Experts Media Highlight New Capabilities Tactics

African experts and media outlets are warning about the evolving nature of terrorist organizations on thecontinent the terrorists pursuit of new targets and tactics and their potential for taking advantage of regional instability

Leading South African think tank the Institute for Security Studies stated on 29 Augustthat Boko Harams attack on the UN in Abuja completes Boko Harams metamorphosisinto an international terrorist group Since December 2010 Boko Haram had killed over600 people in over 70 attacks against Nigerian targets according to the think tank buthad not previously targeted Western or international interests

A 26 August article on the popular Malian web portal Maliweb voiced concern thatAQIM could benefit from Tuareg mercenaries many of whom were recently returningfrom fighting in Libya and could benefit from an increase in arms trafficking through theSahel during the Libyan conflict

Ugandas privately owned Daily Monitor reported on 19 August that AU forces inSomalia warned that Al-Shabaab planned to increase the number of kidnappings andbomb attacks as part of its new strategy to shift from controlling territory in Mogadishuto conducting more of an insurgent campaign

Concern Over Al-Qaida Presence Terrorist Collaboration

West African official statements and media reports reflect a growing concern over an increased Al-

Qaida presence in West Africa and collaboration with AQIM Al-Shabaab and Boko Haram

Nigerian security services reported that the suspected mastermind behind the 26 Augustbombing of the UN office in Abuja was a Boko Haram member with close links to Al-Qaida and Al-Shabaab according Nigerias privately owned Daily Sun

A 28 August report in the privately owned daily Nigerian Tribune claimed that the 26August bombing in Abuja was part of Al-Qaidas plans to mark the 10th anniversary of 911 and called Boko Haram Al-Qaidas ally in the region

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3142

An 8 August commentary in Burkina Fasos LObservateur Paalga said that reports of Boko Haram collaboration with Al-Shabaab and AQIM could indicate that Al-Qaida isextending its African tentacles Abdourahmane Dieng security division chief of theEconomic Community of West African States said the collaboration represented a veryserious threat according to Senegals progovernment Le Soleil on 5 August

Messages Likely To Resonate With African Audience

Sub-Saharan Africas increasing concern about the shifting nature and potential strengthening of theterrorist threat on the continent suggests that messages directly addressing the impact of terrorism onAfricans the increasingly complex nature of the threat and the need for multilateral cooperation againstterrorism are most likely to resonate with Africans

Messages expressing solidarity and sympathy for Africans affected by Boko Haram Al-Shabaab and AQIM would almost certainly resonate with a broad African audience

African political and military leaders would probably welcome acknowledgement of thecomplex and changing nature of terrorism on the continent and recognition of theirinitiatives and commitment to countering violent extremism

African leaders and medias concern about potential collaboration between Boko Haram

Al-Shabaab and AQIM suggest that they would be open to improving multilateral andcross-regional sharing of lessons learned and strategies to counter the intensification of terrorism within Africa

Aviation and Maritime Security| back to top |

Bomb Threats Force Jets To Land

Associated Press | 7 September 2011

Both landed safely one landed in Ankara Ataturk International Airport and the other at Kuala LumpurTwo flights operated by Pakistans state-owned airline received bombs threats on Wednesday

and both landed safely one in Turkey the other in Malaysia officials said No bombs were found The

first flight was headed for Manchester England when it was notified of the threat near the Bulgariancapital of Sofia The crew contacted the control tower in Istanbul to seek permission for the landingstate-run Anatolia news agency reported Authorities quickly evacuated all 378 passengers from theBoeing 777-300ER aircraft after it parked at a remote corner of the International Ataturk Airport andbomb squads began searching the plane with sniffer dogs Anatolia reported PIA spokesman MashoodTajwar confirmed the flight received a threat and landed All passengers were safe A police searchturned up no bomb officials said Later a second PIA flight from Islamabad to Kuala Lumpur alsoreceived a bomb threat It landed in Kuala Lumpur and all the passengers disembarked safely saidTajwar The UK-bound Pakistan International Airlines plane was forced to make an emergency landingat Ataturk Airport in Istanbul after receiving a bomb threat Malaysias airports authority said thepassengers were being screened and the plane was isolated in a parking area while being searched bypolice No bomb was found

It said the plane carried 164 passengers and 13 crew Azmi Murad senior general manager forthe authority said the Pakistani airline informed it that the warning came by email Mr Tajwar gave nodetails on the nature of the threat or how it was delivered Pakistan is home to al Qaedas top leadershipMilitants who trained there have been responsible for many of the attacks and failed plots in the USand Europe since Sept 11 2001 when planes hijacked by al Qaeda militants destroyed the World TradeCenter in New York and crashed into the Pentagon The bomb threats came four days before the 10thanniversary of 911 but there was no apparent link to Islamist militants who typically do not alertauthorities in advance The FBI and Homeland Security department issued warnings last weekend aboutal Qaeda threats to small airlines

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3242

Commentary amp Opinion| back to top |

From Terror Group Founder To Libyan Rebel Military Commander

ABCNews | 29August 2011

The same man who triumphantly led Libyan rebels into Gadhafis compound last week first came to theattention of the US intelligence community years ago - as a founder of a terror group

Abdelhakim Belhaj who was recently appointed to Tripolis rebel military council was one of the original founders of the Libyan Islamic Fighting Group an anti-Gadhafi group which was laterdesignated by the US State Department as a terrorist organization with links to al Qaeda according toUS government reports

We proudly announce the liberation of Libya and that Libya has become free and that the ruleof the tyrant and the era of oppression is behind us a victorious Belhaj told reporters after the stormingof Gadhafis Bab al-Aziziya compound last week Ousting Gadhafi had been the main objective of theLIFG since its inception in the early 1990s even if some of the fighters believed that meant puttingAmericans in the crossfire

The group carried out operations against the Libyan government including at least four suspectedassassination attempts against Gadhafi in the 1990s and was also believed to be connected to a series of suicide bombings in Casablanca Morocco in 2003 the US State Department reported As relationsbetween the US and Gadhafi improved in the mid-2000s some LIFG leaders cultivated relationshipswith top al Qaeda leaders including Osama bin Laden and were suspected of funneling fighters to Iraq tocarry out operations against US soldiers

When the LIFG was designated a terror organization in 2004 it was meant as a gesture of solidarity with the Libyan government according to a March 2011 congressional report

Contrary to several US government reports Libyan rebel ambassador to the US Ali Aujalitold ABC News that the LIFG was never connected to al Qaeda and did not carry out terrorist operations

They were only opposed to Gadhafi during his rule and paid the price for that by beingoppressed by the regime Aujali said

The CIA first publicly voiced its concerns about the connection between the LIFG and al Qaedain 2004 when then-director George Tenet testified before the Senate Select Committee on Intelligenceand listed the LIFG among groups that represented an immediate threat [that] has benefited from alQaeda links[Article continues here httpabcnewsgocomBlotterterror-group-founder-libyan-rebel-military-commanderstoryid=14405319]

Interview With Saudi Sheik Wajdi Al-Ghazawi

MemriTVcom

Sheik Wajdi al-Ghazawi owner of al-Fajr TV criticizes extremist atmosphere in Saudi Arabia and saysafter 911 They Handed Out Sweets on the Streets of Mecca

Following are excerpts from a statement by Saudi Sheik Wajdi Al-Ghazawi owner of Al-FajrTV which was posted on YouTube on August 4 2011

Wajdi Al-Ghazawi When Al-Qaeda and Osama Bin Laden were at the height of their mightthey were extremely popular in Saudi Arabia From mosque pulpits across Saudi Arabia preacherswould pray for their success Moreover from the pulpits of the most important mosques ndash the Al-HaramMosque in Mecca and the Nabawi Mosque in Al-Madina ndash direct prayers for the success of Al-Qaedawere made during the days of the bombing of Tora Bora Oh Allah help our brothers in AfghanistanThese supplications were made during evening prayers as well as Friday prayers The preachers wouldpray for them in violation of the ministrys instructions

When the twin towers in New York were attacked they handed out sweets on the streets of Mecca By Allah they did I witnessed this myself The young people bowed in prayer and hugged one

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3342

another out of joy People were in heaven because of these young men who destroyed America andbombed this idol Am I right or not Was it like that or not

Back then when the Taliban broke off a piece of the nose of the Buddha statue which was hewnin the mountain an entire sermon was dedicated to it in the mosque in Mecca and the preacher was laterreprimanded for this sermon The entire Saudi people supported and loved Al-Qaeda

This went on until our brothers in Al-Qaeda ndash and I dont know what was going through theirminds ndash began to carry out operations inside Saudi Arabia Thats when we all raised our hands andsaid Youve gone too far We wont support you in this

The atmosphere here in Saudi Arabia is one of extremism It is characterized by focusing onminor details Many things are forbidden Yes maybe they are indeed forbidden but by forcing peopleto avoid them and by acting as if these were major sins an atmosphere was created that gave rise toextremist youth who might act recklessly at the most trivial provocation

For instance we blew out of proportion the issue of music the issue of smoking or the issue of hanging pictures in public places True there are clear texts on these issues but the young peopleembraced these issues as if they were fighting usury fornication or alcohol No these are not among theseven major sins So our society has become extreme

This extremist atmosphere has given rise to people who accuse others of heresy and people whopurport to be waging Jihad It has created genes that gave rise to cells of Al-Qaeda and other terrorists

We must examine our breeding ground in which these young men were sownBy Allah what can possibly emerge from such an atmosphere Muftis who accuse others of

heresy sheiks who incite and young people who bomb Am I right or not[Complete clip is available here httpwwwmemritvorgclipen3099htm]

Legal Aspects amp Lawfare| back to top |

Revisiting A Stale Counterterrorism Law

Council on Foreign Relations | 1 September 2011

ldquoNearly a decade after 911 the United States still relies on the 2001 Authorization for the Use of Military Force (AUMF) for the killing and detention of those considered responsible for or associatedwith the terrorist attacks But CFR national security law expert John Bellinger says it is becomingincreasingly difficult for the Obama administration to justify some of its counterterrorism operationsunder this limited statutory authority It has been used in defense of actions including drone attacks onindividuals as well as the targeting of groups in Yemen and Somalia that may have only the mosttenuous affiliation or association to the 911 attack A revised AUMF should clarify those operations aswell as the issue of detention specifically which individuals can be detained for how long and subjectto what processes There also needs to be greater effort at the international level he adds to fill thegaps in the law that covers conflicts between states and non-state actorsrdquohelliprdquo[Complete article is available here httpwwwcfrorgcounterterrorismrevisiting-stale-

counterterrorism-lawp25742]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3442

Narco-Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector[Complete article is available here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Mexicos Cartels Move Into Extortion

At a construction site of an apartment building in the heart of the Mexican capital a company engineerruns through his weekly payroll sheet He has salaries written out for carpenters bricklayers andelectricians At the bottom of the sheet is a notation of $200 for ldquosecurity servicesrdquo next to a nicknameldquoEl Indiordquo mdash the Indian [Complete article is available here

httpwwwtucsonsentinelcomnationworldreport090611_mexico_cartels_bribesmexicos-cartels-move-into-extortion ]

Seven Die In Mexican Pacific Port City

Latin American Herald Tribune

Seven people died in separate shootings in Mazatlan a port city in the northwestern Mexican state of Sinaloa with some of the incidents drug-related a police spokesman told Efe [Complete article is available herehttpwwwlahtcomarticleaspCategoryId=14091ampArticleId=423061]

Tijuana Violence Slows As One Cartel Takes Control

BorderlandBeatcom

Mexicos famously seedy border city of Tijuana is enjoying a lull in drug murders as the countrys mostpowerful cartel gains the upper hand over its rivals [Complete article is available here httpwwwborderlandbeatcom201109tijuana-violence-slows-as-one-cartelhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3542

Network Notes| back to top |

Canadian data foreign threats Spying in the digital age (Suggested by a reader in Lithuania ndash thanks) Globe and Mail | By Colin Freeze 31 July 2010

A government spy agency thatrsquos prohibited from monitoring Canadian citizens is now usingldquoinformation about Canadiansrdquo to zero in on foreign threatsThe ambiguous statement found in a new government report detailing the activities of CommunicationsSecurity Establishment Canada could sanction a range of intelligence-gathering activities ndash includingthe controversial practice of mining ldquometadatardquo from digital communications

Metadata ndash often called data about data ndash are found in e-mails and their attachments and containdigital signatures that can reveal when where and by whom documents were created

The collection of metadata has caused controversy in other countries but never in Canada wherethe Communications Security Establishment Canada operates as an ultra-secretive agency About theonly thing that is known about the classified practices is that they were halted and resumed after someldquomajor changesrdquo including directives signed by Defence Minister Peter MacKay

ldquoI cannot comment on specific operational activitiesrdquo Adrian Simpson a CSEC spokesman toldThe Globe He stressed that reviews upheld that the activities in question were ldquocarried out inaccordance with the law ministerial requirements and CSECrsquos policies and proceduresrdquo

ldquoCSEC is prohibited from directing its activities at Canadians anyone in Canada or Canadiansanywhere in the worldrdquo he said

For decades signals-intelligence agencies in the West have been allowed to safeguard nationalsecurity by eavesdropping on foreignersrsquo conversations Spies can whatever phone lines and satellitesignals they can so long as they never listen in on fellow citizens

But in the digital age governments run increasingly sophisticated dragnets scooping up andscouring through millions of intercepted Internet conversations daily Such practices create legalambiguities

ldquoThe whole issue of what constitutes boundaries for signals-intelligence agencies in cyberspaceis a big debate right nowrdquo said Rafal Rohozinski a security expert affiliated with the University of Torontorsquos Munk School

A watchdog agency that reviews the CSECrsquos activities released an annual report to Parliament onJuly 20 ldquoWhen other means have been exhausted CSEC may use information about Canadians when it

has reasonable grounds to believe that using this information may assist in identifying and obtainingforeign intelligencerdquo it reads

Sometimes collecting metadata is relatively benign It can involve aggregating sets of data tospot trends much like the way meteorologists discern national forecasts from localized information

For example while CSEC canrsquot usually monitor the communications of specific Canadian terrorsuspects it can glean insights by zooming out for big-picture patterns One way to do that MrRohozinski said would be to look at data flows between Canadian cities and Yemen where an Internet-savvy al-Qaeda offshoot works to recruit Westerners

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3642

Metadata however can be more revealing Documents that circulate on the Internet travelaround like postmarked letters marked with return addresses ndash e-mails and attachments have embeddedcodes that speak to the who where and when behind their creation

The US National Security Agency found itself mired in controversy a few years go after itskirted domestic-spying bans by secretly upholding that this sort of American metadata was fair gamedistinct from communication contents

Therersquos little to suggest the CSEC would go that far The federal agencyrsquos activities are reviewedby a watchdog body now headed by a former Federal Court of Appeal judge Robert Deacutecary appointedlast year wrote in his annual report that he was satisfied the CSEC activities in question are lawful evenif his predecessors felt them borderline

ldquoThis was the first review of these activities since hellip their resumption under new policiesrdquo thewatchdogrsquos report says It concludes that the surveillance activities are ldquoin accordance with the lawrdquo andfollow ldquomajor changes to certain policies procedures and practicesrdquo

Much of the concern arises from the possibility that CSEC could hand over metadata intelligenceto domestic law-enforcement and security agencies

As it stands the RCMP and CSIS have to develop their domestic investigations before coming toCSEC ndash usually with warrants ndash if they want specific intelligence The rules guiding handovers are strictbecause even though all agencies run surveillance operations they do so under vastly different

mandates and legal standardsThe spy agency however stood by its practicesldquoCSEC is extremely diligent when it comes to the privacy of Canadiansrdquo Mr Simpson said

[complete article is available here httpwwwtheglobeandmailcomnewsnationalcanadian-data-foreign-threats-spying-in-the-digital-agearticle2113772 ]

Cyber Attacks Against NATO Then And Now

New Atlanticist | 6 September 2011

ldquoNow that NATOrsquos Operation UNIFIED PROTECTOR over Libya is winding down it is worth

noting how few cyber incidents were directed in protest against the Alliance Certainly there was a

cyber component to the liberation of Libya but it was more about content and Internet freedom (the

most newsworthy elements here were the role of social media and the Libyan government taking largeparts of the nation offline) But compared to past history NATO cyber defenders had a relatively easy

time

ldquoNATO has not however had an easy 2011 Although there were three significant incidents we

know about none seemed to have been in direct response to operations over Libyahelliprdquo

[Complete article is available here httpwwwacusorgnew_atlanticistcyber-attacks-against-nato-then-

and-now]

The Calm Before The Storm

Foreign Policy | By Joel Brenner 6 September 2011

Cyberwar is already happening -- and its about to get much much worse A veteran cyberwarriorexplains how America can prepare itself

Revelations of wholesale electronic fraud and massive data heists have become weekly evendaily affairs A multinational electronics corporation loses personal information on more than 100million customers Cyberthieves break into an international bank counterfeit credit balances and lootATMs in four countries grabbing $9 million in just a few hours International gangs spread maliciouscode that conscripts unwitting computers into zombie armies of hundreds of thousands of similarlyenslaved machines Criminals then rent these armies called botnets as easily as you can buy a time-sharing arrangement in a beach condo No wonder the vast majority of Internet traffic is spam

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3742

Yet the loss of personal information and related criminal fraud intolerable as they are are theleast threatening face of electronic insecurity The US militarys secret network is penetratedAmericans corporate pockets are being picked clean of the intellectual property that makes the UnitedStates tick And the electricity grid that keeps the lights on and makes everything move is dangerouslyinsecure

In one remote attack on the Pentagons information systems about 10 years ago the Chinesehauled away up to 20 terabytes of information If the information had been on paper theyd have neededa line of moving vans stretching from the Pentagon to freighters docked 50 miles away in Baltimoreharbor just to haul it away Had they done so the military district of Washington wouldve become anactive theater of operations for the first time since 1865 and the Navy wouldve blockaded theChesapeake Bay But the Chinese did it electronically so who noticed

Corporate espionage by both competitors and foreign intelligence services or their surrogates isalso increasing Intelligence officials see this but cant speak openly about the specifics and Im seeingit now in my law practice The victims rarely admit it for understandable reasons Oracle whichsuccessfully sued SAP for theft of its software code was a prominent exception Google was another

When the Chinese penetrated Google in late 2009 -- yes that operation was Chinese and yes itwas done with the blessing of a member of the Politburo -- they werent after customer informationThey were after the source code that makes Google unique Nor was Google the only victim Thousands

of US and Western firms were penetrated in that affair Foreign governments -- and not only theChinese -- understand that they cannot compete with the United States militarily and politically if theycannot compete with it economically so their intelligence services want to steal its corporate intellectualproperty This is the technology that gives America its competitive edge and often it has nothing to dowith defense Ordinary companies with valuable technology are now being targeted by nation-statesThis is a new era National security and economic security have converged

The danger is not limited to the loss of technology and information however The owners andoperators of the North American electricity grid are hooking up their control systems to the Internet asfast as they can Exposing the grid to the Internet makes it marginally more efficient but it also makes itdramatically more vulnerable to disruption If you can remotely penetrate an electronic system to stealinformation you can remotely penetrate it to shut it down or make it go haywire This is why there is no

longer a meaningful difference between information security and operational security And the biggestoperational risk is the grid In contemporary society nothing moves without electricity If the grid goesout the country stops

As the Stuxnet affair demonstrated remotely engineered disruption of industrial control systemsis now a reality That episode involved the successful electronic attack on the centrifuges in the Iraniannuclear program Only a first-class intelligence agency could have pulled that off but the blueprint fordoing it -- the code itself -- is now public Many American industrial control systems run on the samekind of equipment the Iranians were using but unlike the controls on the Iranian centrifuges thecontrols on the US grid are now being connected to the Internet making them easier to disrupt Stuxnetwas a watershed there will be copycats

Other industrial control systems will also be targets Some already are Air traffic control

railroad switches and water and sewage systems are all electronically controlled now and many arevulnerable If an intruder can break into the right server electronically he can remotely shut downproduction send your goods to the wrong destination and even unlock your doors -- and delete your logentries so he leaves no record of ever having been there

The United States does not lack enemies who would attack it this way Seized al Qaedacomputers contain details of US industrial control systems In 2003 a group affiliated with thePakistani terrorist organization Lashkar-e-Taiba -- the same gang that engineered the 2008 terroristassaults in Mumbai -- plotted to attack the Australian grid Other groups conspired to attack the Britishgrid in 2004 2006 and 2009 Yet the owners and operators of the North American grid continue willy-

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3842

nilly to expose their control systems to the Internet instead of isolating and hardening it This is folly of a high order

Important conclusions for public and corporate policy follow from this vulnerable state of

affairs First cyber insecurity has operational consequences In the current and foreseeable states of technology a high degree of assurance against electronic penetration of anything connected to theInternet is not achievable Large efficient electronically connected organizations and nations aretherefore vulnerable to remotely engineered disruption as well as information theft

Second this risk cannot be eliminated -- but it can be reduced and managed As a nation theUnited States should start by isolating the grids controls from the Internet Undoubtedly there aremarginal efficiencies to be gained by seamless connectivity over a publicly accessible infrastructure butthese gains are usually exaggerated and the risk this connectivity creates is staggering The governmentand the major telecommunications carriers must also make the investment required to re-create themassive redundancies that made the wired telephone network so robust Resilience and swift recoveryshould be the goal If the consequences of cyberattacks were reduced penetration would cease to matter

Third companies that wait for the government to solve their own security problems do so attheir peril The government is broke and the IT backbone is 85 percent private so the governmentdoesnt control it The governments role in altering the status quo will be limited to setting standardsusing its purchasing power to move vendors toward better security and getting its own house in order

The government can neither secure corporate intellectual property nor protect firms against operationaldisruption

Fourth in a world in which everything cannot be protected companies must determine forthemselves what intellectual property and physical assets to isolate and safeguard Those that approachthis task seriously will quickly learn that technology is only one aspect of their insecurity and in manycases the easiest to deal with Unless technology is integrated with personnel practices and operationalsecurity it opens vulnerabilities that its users rarely understand This kind of integration requires theautomated enforcement of reasonable security policies and systematic workforce training and thatoccurs only when management the lawyers and the technologists work closely together This is an old-fashioned management challenge -- not a technological one For their part corporate boards need to takeIT security seriously and launch audits that examine how their systems are actually implemented and

used not merely how they are designed Because as the techies like to put it the weakest link in anysystem is not the silicon-based unit on the desk its the carbon-based unit in the chair Joel Brenner is author of the forthcoming America the Vulnerable Inside the New Threat Matrix of

Digital Espionage Crime and Warfare He has served as the inspector general of the National Security

Agency the national counterintelligence executive and the NSAs senior counsel He now practices law

at Cooley LLP in Washington DC

Cyberattacks Decline Slightly Symantec Report Finds

Dark Reading | 1 September 2011

Organizations worldwide are suffering damages as a result of cyberattacks but interestingly there hasbeen a slight decline in these attacks during the past 12 months according to a new report from

Symantec More than 90 percent of the more than 3300 respondents across 36 countries said theyexperienced tangible losses as a result of a hack with 84 percent reporting financial loss to the cost of abreach Around one-fifth lost at least $195000 in breaches during the past 12 months

Meanwhile Symantec attributes the unexpected bright spot of a decline in breaches toorganizations employing better cybersecurity defenses More than 70 percent of organizations sawattacks in the past 12 months a decline of 5 percent from 2010 And those that experienced anincreasing frequency of attacks dropped from 29 percent in 2010 to 21 percent this year While 100percent last year reported losses from cyberattacks 92 percent did so in 2011 The trend seemscounterintuitive given the rash of high-profile breaches this year More

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 18: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1842

United States

| back to top |

Post-911 Intelligence Reform Takes Root Problems Remain

Reuters | 8 September 2011

US intelligence agencies will forever be scarred by their failure to connect the dots and detect theSeptember 11 plot but a decade later efforts to break down barriers to information-sharing are takingroot Changing a culture of need-to-know to need-to-share does not come easily in spy circles Someofficials say they worry a decade later about a future attack in which it turns out that US spy agencieshad clues in their vast vaults of data but did not put them together or even know they existed

Yet significant changes both big and small have broken down barriers between agenciessmoothed information-sharing and improved coordination US intelligence experts say From issuing ablue badge to everyone working in the sprawling intelligence community to symbolize a commonidentity to larger moves of mixing employees from different agencies the goal is singular -- to preventanother attack

Were much further ahead David Shedd Defense Intelligence Agency deputy director said of the ability to connect the dots compared with 10 years ago Still signs of a plot to attack the UnitedStates could be missed again My worst fear and I suspect probably one that would come true is that inany future would-be or actual attack God forbid we will be able to find the dots again somewhere

because of simply how much data is collected Shedd said The political response to the failure to stopthe attack was the 2002 creation of the Department of Homeland Security pulling together 22 agenciesto form the third largest US Cabinet department behind the Pentagon and Veterans Affairs

That was followed by the creation in late 2004 of the Director of National Intelligence to overseeall the spy agencies as recommended by the bipartisan 911 commission Previously the CIA directorheld a dual role of also overseeing the multitude of intelligence agencies But in the aftermath of the2001 attacks policymakers decided that was too big of a job for one person to do effectively

Critics argued then and now that the reforms were the governments usual response to crises --create more bureaucracy But others see much-needed change It has been a tremendous improvementsaid Lee Hamilton who was the 911 commission vice chair Its not seamless there are problems andweve still got a ways to go The 2001 attacks involving airliners hijacked by al Qaeda operatives killed

nearly 3000 people in New York Pennsylvania and the Pentagon Various US intelligence and lawenforcement agencies had come across bits of information suggesting an impending attack but failed toput the pieces together The CIA had information about three of the 19 hijackers at least 20 monthsbefore the attacks the National Security Agency had information linking one of the hijackers with alQaeda leader Osama bin Ladens network the CIA knew one hijacker had entered the United States butdid not tell the FBI and an FBI agent warned of suspicious Middle Eastern men taking flying lessons

Have the reforms made America safer Officials say yes and point to the US operation thatkilled bin Laden in Pakistan in May that demanded coordination among intelligence agencies and themilitary But there is an inevitable caveat no one can guarantee there will never be another attack onUS soil On Christmas Day 2009 a Nigerian man linked to an al Qaeda off-shoot tried unsuccessfullyto light explosives sewn into his underwear on a flight to Detroit from Amsterdam It turned out US

authorities had pockets of information about him President Barack Obama used a familiar September 11phrase to describe the 2009 incident as a failure to connect the dots of intelligence that existed acrossour intelligence community

Roger Cressey a former White House National Security Council counterterrorism officialresurrected another September 11 phrase It was a failure of imaginationThe intelligence community had not seen al Qaeda in the Arabian Peninsula a Yemen-based al Qaedaoff-shoot as capable of striking the US homeland If the underwear bomber threat had originated inPakistan they would have gone to battle stations immediately Cressey said Some proposed changesin how authorities would respond to another successful attack still are pending For example creation of

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1942

a common communication system for police firefighters and other emergency personnel remainstangled up in political wrangling in Congress over how to implement it This is a no-brainer Hamiltonsaid The first responders at the scene of a disaster ought to be able to talk with one another Theycannot do it today in most jurisdictions

Former leaders of the 911 commission issued a report card saying nine of its 41recommendations remain unfinished The Office of the Director of National Intelligence hasexperienced growing pains as overseer of the 17 spy agencies churning through four chiefs in six yearsTensions over turf confusion about the DNIs role and problems herding agencies with very powerfulchiefs of their own all came to a crescendo when retired Admiral Dennis Blair the third DNI tried toassert authority over CIA station chiefs who represent the agency in different countries The positionof chief of station is one of the crown jewels of the CIA and they dont want anyone playing with theircrown jewels said Mark Lowenthal a former senior US intelligence official

After a dust-up with CIA Director Leon Panetta who now is defense secretary it was Blair whowas sent packing I think the mistake that some have made is to have viewed the DNI and the Directorof CIA as an eitheror proposition rather than the power of the two working together the DIAs Sheddsaid in an interview in his office There is a history of where that hasnt worked so well I believe it isworking much better today said Shedd who has worked at the DNI CIA and National SecurityCouncil

Intelligence experts say in the current administration Obamas top homeland security andcounterterrorism adviser John Brennan arguably has more power than any of them because he has thepresidents ear Its a reminder that bureaucratic reform or no personalities count in making nationalsecurity policy The improved sharing of secret data has led to yet another set of problems The delugeof bits and bytes has subjected intelligence analysts to information overload as they try to sift through itall for relevant pieces Our analysts still are spending way too much time on finding the informationrather than on the analysis of the information Shedd said There is just too much data to go find it all

The intelligence community wants a system developed that would automatically processinformation from multiple agencies and then make the connections for the analysts

But greater inroads into sharing data across agencies does not guarantee that another attack willbe averted The threat has evolved and officials now are increasingly concerned about a lone wolf plot

by an individual not tied to any militant group that may be more difficult to uncover Those threatswill not come to our attention because of an intelligence community intercept said John Cohen asenior Department of Homeland Security counterterrorism official

They will come to our attention because of an alert police officer an alert deputy sheriff analert store owner an alert member of the public sees something that is suspicious and reports it Cohensaid One measure of the success of post-911 reforms is that a decade later the United States has not hada similar attack Now that could be luck that could be skill we dont really know Hamilton said Butin all likelihood what we have done including the establishment of the Department of HomelandSecurity and the transformation in intelligence and FBI has certainly been helpful[Article continues here ]httpnewsyahoocompost-9-11-u-intelligence-reforms-root-problems-052514320html

Comment the value added provided by the Office of the DNI remains an open question for many withinthe Intelligence Community (IC) and is a favored theme of corridor discussion in IC-member agenciesOn the other hand there is broad agreement among intelligence officials that the degree of cooperationand coordination between intelligence agencies and the character of intelligence sharing has vastlyimproved The fact that there has not been a successful major attack on US soil since 911 ndash not forlack of plotting ndash is in great part testimony to this more effective cooperation

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2042

Jihadist Suggests Striking New York City Bridges

All SITE Intelligence Group | 6 September 2011

A jihadist pointed to what he found to be a weak point of suspension bridges and directed his messageto those who love blasting and explosions In a message posted on the Shumukh al-Islam forum onSeptember 6 2011 the jihadist Abu Suleiman al-Nasser gave a picture of the Verrazano Bridge inNew York on which he drew a red box and arrow on the bridges center He then gave a map on whichhe circled the various bridges in New York City and its boroughs A fellow jihadist offered his ownidea giving a picture of the Hoover Dam and explaining that there is no target more important thandams He wrote that striking a dam may lead to the submerging of cities and the killing of thousands of people and in the case of the Hoover Dam would impact Las Vegas the capital of gambling anddebauchery

Counterterror Veteran is New Deputy FBI Director

Atlanta Journal Constitution | 1September2011

A 24-year FBI veteran with extensive counterterrorism experience Sean Joyce has been named the lawenforcement agencys new deputy director Elevated to the No 2 post within the FBI by Director RobertMueller Joyce replaces Timothy Murphy who is retiring after 23 years with the bureau Since last yearJoyce has been executive assistant director of the national security branch responsible for the FBIs

national security and intelligence operations He earned the Attorney Generals Award for ExceptionalService in 2004 for work on a counterterrorism squad in Dallas In 2008 he was named chief of thecounterterrorism divisions international terrorism operations section with responsibility forinternational terrorism matters within the United States hellip[Complete article is available here httpwwwajccomnewsnation-worldcounterterror-veteran-is-new-1153018html]

Top CIA Official Obama Changed Virtually Nothing

Salon | 1 September2011

PBSs Frontline is airing an examination of Top Secret America on September 6 The show includes arare and lengthy interview with 34-year-CIA-veteran John Rizzo who is described as the most

influential lawyer in CIA historyHere is one quote they include from Rizzo With a notable exception of the lsquoenhanced

interrogationrsquo program the incoming Obama administration changed virtually nothing with respect toexisting CIA programs and operations Things continued Authorities were continued that wereoriginally granted by President Bush beginning shortly after 911 Those were all picked up reviewedand endorsed by the Obama administration hellip[Complete article is available herehttpwwwsaloncomnewspoliticsbarack_obamastory=opiniongreenwald20110901obama]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2142

General Counterterrorism News| back to top |

The Terrible Missed Chance

Newsweek | 4 September 2011

Special Agent Harry Samit of the FBIs Minneapolis field office knew he was looking into the eyes of aterrorist It was early afternoon on Friday Aug 17 2001 Across from him sat Zacarias Moussaoui a33-year-old French-born student arrested the day before for overstaying his visa Moussaoui had paidmore than $8000 in cash that summer to sit in a cockpit simulator in a flight school in the suburbs of Minneapolis and learn - in a matter of days - the basics of how to fly a 747-400 Samit a formerintelligence officer at the Navys celebrated Top Gun flight school felt sure the man across the desk from him was a Muslim extremist who was part of a plot to hijack a commercial jetliner filled withpassengers The trick Samit wrote in a soon-to-be-released excerpt of a book hes written about thecase was getting Moussaoui to admit this and reveal details and associates to allow us to stop the plot

Surely the bureau brass in Washington would share his concern Samit thought He was wrongThat same day halfway across the country in the fluorescent-lit hallways of the J Edgar Hoover

FBI headquarters building in Washington counterterrorism supervisors were treating Samits firstreports about Moussaoui with skepticism even contempt Michael Maltbie a DC counterterrorism

specialist insisted repeatedly in the days after the arrest that there was no clear link between Moussaouiand Al Qaeda - the link needed for a warrant Maltbie thought Moussaoui was a dirty bird he latertold investigators but favored deporting him to France

Believing a hijacking might be imminent Samit appealed to his boss in Minneapolis SpecialAgent Greg Jones Jones picked up the phone on Aug 27 and called Maltbie at FBI HQ

Moussaoui he said might be part of a plot to get control of an airplane and crash it into theWorld Trade Center or something like that

Maltbie scoffed You have a guy interested in this type of aircraft Maltbie replied accordingto FBI documents That is it (Maltbie declined requests for an interview)

At least Maltbie was paying attention Michael Rolince who ran the FBIs InternationalTerrorism Operations Section was arguably the bureaus most important go-between with the White

House on domestic terrorist threats in the summer of 2001 He tells Newsweek he spent less than 20seconds being briefed on the Moussaoui case that August His office was inundated with terrorismprobes he said since Moussaoui was in custody already he posed no immediate threat Did it rise tothe level of something that I would take upstairs Rolince asks The answer is no

At CIA headquarters alarm bells were ringing loudly CIA Director George Tenet was briefedon Moussaoui within days of the arrest receiving a paper with the eye-catching headline IslamicExtremist Learns to Fly But the FBIs acting director that summer and the bureaus most seniorcounterterrorism official were left in the dark[Article continues here httpwwwthedailybeastcomnewsweek20110904the-terrible-missed-chancehtml]

Pan Am Flight 103 - Lockerbie Bombing - al-Megrahi CIA FilesWebwire | 31 August2011

BACM ResearchPaperlessArchivescom has announced the publishing of CIA files related to the PanAm Flight 103 Lockerbie Bombing

The files can be downloaded at no cost at httpwwwpaperlessarchivescompanam103ciahtml The files date from 1984 to 1999 These are the most recent files on Pan Am 103 released by the

CIA This set of files is unique because it includes memos on the direct handling of an intelligencesource This type of information is exempt from the Freedom of Information Act (FOIA) and is not oftenreleased by the Agency

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2242

The files cover information received by the CIA on Abdel Basset al-Megrahi Al-Megrahi is theonly person ever convicted in the Pan AM 103 case The Scottish government in 2009 allowed al-Megrahi to be released from custody and returned to Libya because of his failing health With the recentfall of Muammar Qaddafis regime there have been renewed calls for al-Megrahi to be returned toScottish custody or extradited to the United States and put on trial[Complete article is available here httpwwwwebwirecomViewPressRelaspaId=144692]

Getting The Caucasus Emirate Right

CSIS | August 2011

ldquohellipThis report aims to set straight a rather distorted record It demonstrates the veracity of three vitallyimportant facts usually obfuscated in discussions of the subject (1) the longstanding and growing tiesbetween the CE and its predecessor organization the ChRI on the one hand and al Qaeda (AQ) and theglobal jihad on the other hand (2) the importance of the CE jihadi terrorist network as a united andorganized political and military force promoting jihad in the region and (3) the salience of local culturaland the Salifist jihadist theo-ideology and the influence of the global jihadi revolutionarymovementalliance as key if not the main factors drive the ldquoviolence in the North Caucasusrdquohelliprdquohttpcsisorgfilespublication110829_Hahn_GettingCaucasusEmirateRt_Webpdf

7 Things You Didnrsquot Know About the War on TerrorForeign Policy | By Eric Schmitt and Thomas Shanker 6 September 2011

From an attempt to negotiate with Osama bin Laden to a proposal to threaten to bomb Mecca its been awild decade for the US national security establishment

Our new book Counterstrike The Untold Story of Americas Secret Campaign Against Al Qaeda is in many ways asummary of the past decade of our reporting on the military intelligence community and domestic law enforcement as itentered a new era of Darwinian evolution to counter violent extremism

It also is our deep dive into a decade of American counterterrorism efforts -- from the work of commando trigger-pullers and spies on the ground up to senior political leaders who wanted to defendthe nation (and get re-elected) Our efforts to report and write this book allowed us to uncover many newmissions never discussed before -- and gave us an understanding of how the war on terror had changedover the last decade

Our book assesses the 10 years since 911 as the military divides the fight into tactical missionson the battlefields of modern terrorism then the operational advancements that provided the means tosuccess while not securing final victory and at the top the strategic level of policy debates about howthe nation should combat this threat to its security

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2342

Here are seven vignettes from Counterstrike that offer glimpses into the thinking of policymakers andcommanders in early days after the Sept 11 attacks and how that thinking evolved over the followingdecade into a more whole-of-government approach to combating terrorists

1 Bush Tried to Negotiate with al Qaeda

The George W Bush administration like all of its predecessors swore never to negotiate with terroristsBut it did undertake an extraordinary and extraordinarily secret outreach effort to open a line of communication with Osama bin Laden and al Qaedas senior leadership It was an attempt to replicatehow the United States tried to sustain a dialogue with the Soviet Union even during the darkest days of the Cold War when White House and Kremlin leaders described in private and in public a set of acceptable behaviors -- and described with equal clarity the swift vicious even nuclear punishment forgross violations

In the months after the Sept 11 attacks Bushs national security staff working through theintelligence agencies made several attempts to get a private message to bin Laden and his inner circleThe messages were sent through business associates of the bin Laden familys vast financial empire aswell as through some of the al Qaeda leaders closest relatives a number of whom were receptive toopening a secret dialogue to restrain and contain their terrorist kinsman whom they viewed as a blot on

their name (To be sure other relatives were openly hostile to the American entreaties)According to a senior American intelligence officer with first-hand knowledge of the effort the

response from Osama bin Laden was silence And the effort was suspended

2 Sometimes a Wedding Is Just a WeddingIn the early days after the Sept 11 attacks the CIA and FBI vied to produce the most compellingintelligence reports that tracked suspected terrorist plots The agencies often worked at cross purposessometimes unwittingly At one point in early 2002 both agencies were tracking what American analystssaid were growing preparations for a major wedding somewhere in the Midwest (In terroristvernacular the word wedding is often code for a major attack)

Dribs and drabs on this wedding planning made their way to President Bush from bothagencies independent of each other of course

Finally over the Easter holiday during a video-teleconference with top aides in Washingtonfrom his ranch in Crawford Texas Bush stopped the briefing exasperated by the discrepancies in therival agencies reporting about the suspected threat

George Bob get together and sort this out Bush told his CIA director George J Tenet andFBI director Robert S Mueller III

Bushs instincts were correct When the analysts finally untangled their clues it turned out thatthe ominous wedding really was just that the matrimony of a young man and a young woman fromtwo prominent Pakistani-American families There was no threat There was no plot

3 The Threat to Bomb MeccaAs fears of a second attack mounted following the 911 strikes US government planners franticallycast about for strategies to protect the country Even the most far-fetched ideas had a hearing howeverbriefly In one case some government planners proposed that if al Qaeda appeared ready to attack America again the United States should publicly threaten to bomb the city of Mecca in Saudi Arabiathe holiest site in all of Islam in retaliation Just nuts one Pentagon aide wrote to himself when heheard the proposal The idea was quickly and permanently shelved

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2442

4 The SEAL Raid in Iran That Didnt HappenWhen US forces routed the Taliban government in Afghanistan and forced bin Laden and his toplieutenants to flee many senior al Qaeda leaders including bin Laden and his deputy Ayman al-Zawahri escaped to neighboring Pakistan But a separate group including the al Qaeda leaders sonSaad bin Laden fled to northern Iran where American troops would not pursue them and the Iranianswould likely not detain them But the Shiite clerics running Iran placed the al Qaeda operatives and theirfamily members under virtual house arrest and they became a shield against possible attacks from theSunni-based terrorist organization

One plan in particular illustrated the bold thinking and wildly unrealistic aims of the militarysinitial approach after 911 to kill or capture terrorist leaders The plan called for hunting the eight to 10senior al Qaeda leaders and operatives who had sought refuge in Chalus an Iranian resort town on theCaspian Sea where they had been detained

At the Joint Special Operations Command at Fort Bragg NC military planners drew up optionsfor Navy SEALs to sneak ashore at night using state-of-the-art mini-submarines Once they landed theSEALs would slip past Iranian guards to snatch the al Qaeda leaders Another option called for SpecialOperations helicopters to spirit American commandos into the town and whisk them out again with theirquarry The Americans went as far as conducting two or three rehearsals at an undisclosed locationalong the US Gulf Coast in early 2002 They conducted small-boat insertion exercises involving about

30 Special Operations personnel most SEALs and eventually concluded the mission was feasible if they were provided with more detailed intelligence on the locations of the al Qaeda members and thesecurity around them

The logistics of the mission were daunting Chalus sits at the edge of the Elburz coastal mountainrange about 70 miles north of Tehran and the failed rescue of the American hostages in Iran in April1980 loomed large in commanders memories Eventually Gen Richard B Myers the chairman of theJoint Chiefs of Staff rejected the mission as too risky and too politically volatile Many of the al Qaedaoperatives are reportedly still there

5 Intelligence Hauls of Unusual Size

US intelligence and military commandos have carried out tens of thousands of raids in the decade since911 The amount of material seized from terrorist and insurgent targets has grown to a massive sizeThe Defense Intelligence Agency (DIA) operates exploitation triage centers and giant warehouses forstoring intelligence products -- in war zones rear headquarters in countries like Qatar and back in theUnited States One intelligence analyst said that walking into one of the warehouses for documents andmedia exploitation reminded him of the final scene in Raiders of the Lost Ark when the captured Ark of the Covenant is crated up and rolled into a cavernous storage area that contains all the governmentsother dangerous secrets

All told more than two million individual documents and electronic files have been cataloguedby media type hard copy phone number thumb drive Each is inspected by a linguist working with acommunications analyst or computer expert

The DIA analysts are joined by specialists from other agencies including the FBI and the DrugEnforcement Administration Yet given the overwhelming volume no more than about 10 percent of thecaptured intelligence has ever been analyzed

Intelligence officers say they simply are overwhelmed and untold quality leads may still beburied in the piles of computers digital files travel documents and pocket litter

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2542

6 The Digital Counterjihad Cyberspace is the terrorists ultimate safe haven Its where they recruit raise money and even plotattacks using coded language while playing online video war games The US government fights back

One technique is called false band replacement whereby the intelligence agencies infiltratemilitants networks and post their own material to counter extremist efforts on those same jihadistwebsites The trick is to forge the onscreen trademarks -- web watermarks -- of al Qaeda media sites

This makes messages posted on these sites official and sows dissent and confusion among themilitants

This Internet spoofing can be used in support of more traditional combat missions There is atleast one case confirmed by American officials in which a jihadist website was hacked by Americancyberwarriors to lure a high-value al Qaeda to a surreptitious meeting with extremist counterparts -- onlyto find a US military team in waiting

Getty images

7 First Kill the MullahsUS counterterrorism officials have learned fighting terrorists effectively means targeting specific nodesof that network that support and enable militants who strap on suicide vests This strategy focuses onneutralizing enablers such as the financiers gun-runners and logisticians Among these terror linchpins

are religious leaders who bless attacksHeavenly reward will not await a suicide bomber unless his death and those of his victims is

deemed halal in keeping with Islams sacred sharia law Each militant network has a sharia emir usuallyat the level of a sheikh or mullah In Iraq American commanders specifically killed emirs to throw awrench in a suicide bombing networks

Take him out and suicide bombings from that network are frozen until he is replaced said onemilitary officer with command experience in Iraq hellip[Complete article is available herehttpwwwforeignpolicycomarticles201109067_things_you_didn_t_know_about_the_war_on_terror]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2642

Dick Marty Rendition Report Condemns lsquoCult of Secrecyrsquo

BBC News | 8 September 2011

A report for Europes human rights watchdog has called for greater scrutiny of secret services andsupport for whistleblowers The Council of Europe investigated how countries like Britain GermanyRomania and Lithuania assisted the US with the rendition of terror suspects It said a cult of secrecyhad helped Western governments cover up abuses Defending whistleblowers it singled out USsoldier Bradley Manning accused of passing secrets to Wikileaks He had acted as a whistleblowerand should be treated as such CoE rapporteur Dick Marty wrote in the report which was due to besubmitted to the CoEs Parliamentary Assembly The soldier is currently in a US military prisonawaiting trial for passing restricted material to the controversial website

But the report praised Mr Manning and Wikileaks itself for uncovering evidence of renditionThe CoE represents 47 member-states including both EU countries and Russia and other ex-Sovietstates Mr Martys report focused on the record of Western states explaining that it was based oninvestigations into European links to the controversial US policy of rendition for terrorism suspectsThe CIA allegedly flew terror suspects around the world for interrogation in the years after 911 holdingthem in secret prisons in Europe and elsewhere

No licence to kill

In his 48-page report - entitled Abuse of State Secrecy and National Security - Mr Marty looked at thelevel of control exercised by European states over their security services He urged all states to useindependent parliamentary committees to oversee the work of their secret services saying this was of vital importance for the rule of law and democracy Mr Marty argued that Western governments wereusing the notion of state secrecy to shield their intelligence services from accountability for seriousviolations committed during anti-terrorist operations We consider that this is simply unacceptablehe wrote

A licence to kill (or to abduct and torture) only exists in certain films and in dictatorialregimes In democratic systems parliaments as representatives of the people have a right and duty toknow what the government is doing in the name of the people Mr Marty praised investigative journalists and non-governmental organisations for their work in exposing abuses of authority Stressing

the fundamental role whistleblowers had to play in an open society he warned against a real cult of secrecy as an instrument of power

While it was up to the courts to decide if Bradley Manning had committed any crime he wrotethe CoE was indebted to him for the publication of a recording of a helicopter attack in Iraq in whichthe crew seems to have intentionally targeted and killed civilians

Thanks to Mr Manning he said a large number of embassy reports had allowed us to learnsignificant details of important recent events which are obviously of general interest We therefore join Amnesty International in expressing our worries as to the treatment he receives Mr Marty wrote inthe draft report[Article continues here httpwwwbbccouknewsworld-europe-14820145]Comment This report demonstrates that Dick Marty is not as De Gaulle would say a serious man To

suggest that Bradley Manning is a hero and intelligence agencies bent on defeating terrorists arecriminals should say it all Manning knowingly violated his oath and willfully provided enormousamounts of classified material to WikiLeaks For Marty this is a good thing in the name of transparencyMarty always injudicious and anti-American in his remarks is now moving at warp speed into crackpotterritory

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2742

Al Qarsquoida amp its Affiliates| back to top |

Al Qaeda Is Down Not Out

Los Angeles Times | By Amy Zegart 7 September 2011

US talk of defeating terrorism is dangerously prematureTalk of strategically defeating Al Qaeda is all the rage in the White House these days Defense

Secretary Leon Panetta used the D-word in July President Obama declared in his new counter-terrorism strategy We can say with growing confidence that we have put Al Qaeda on the path todefeat Compared to the woeful state of the economy terrorism has become the administrations feel-good story of the year

Defeat is a big word It is also dangerously misleading Yes the United States has made greatstrides in the last decade to harden targets improve intelligence and degrade the capabilities of violentIslamist extremists Osama bin Ladens death was a major accomplishment But the fight is nowhereclose to being won and Americas most perilous times may lie ahead Three reasons explain why

The first is that strategically defeating Al Qaeda is not nearly as important as it sounds After911 Al Qaeda morphed into a more complicated decentralized and elusive threat consisting of threeelements core Al Qaeda affiliates or franchise groups operating in places like Yemen and Somalia with

loose ties to the core group and homegrown terrorists inspired by violent extremism often through theInternet in the comfort of their own living rooms

Core Al Qaedas capabilities started degrading in 2001 when the US invaded Afghanistandismantled training camps ousted the Taliban and sent Bin Laden running The CIA has estimated thecore group remaining in the AfghanistanPakistan region to number 50 to 100 fighters The last time BinLaden oversaw a successful operation was 2005 when Al Qaeda struck the London transit system

But plots by homegrowns and franchise groups have risen dramatically in recent years The 2009Ft Hood shooting the worst terrorist attack on US soil since 911 was the work of a homegrownterrorist The mastermind of the 2010 Times Square car bomb plot was a naturalized American citizentrained by the Pakistani Taliban not Al Qaeda Another franchise group Al Qaeda in the ArabianPeninsula was behind the foiled 2009 Christmas Day underwear bomber aviation plot and the 2010

plot to explode tampered printer cartridges aboard cargo planes The Bipartisan Policy Center reported11 violent Islamist extremist terrorist incidents against the US homeland in 2009 the most since 911Nearly all involved what former CIA Director Mike Hayden calls a witches brew of radicalizedAmericans and franchise groups

The second reason why talk of defeat is premature has to do with weapons Terrorism againstAmericans is nothing new The potential for terrorist groups to acquire weapons of mass destruction isIn 1995 a Japanese cult released sarin nerve gas in the Tokyo subway killing 12 people and injuringthousands It was the first WMD terrorist attack in modern history and it sparked a wave of presidentialterrorism commissions years before Bin Laden became a household name

It is this specter of the lone fanatic or small group armed with the worlds most devastatingweapons that keeps experts up at night In 2005 60 leading nuclear scientists and terrorism experts were

asked how many believed the odds of a nuclear attack on the US were negligible Only three or fourhands went up most were far more pessimistic Today there is enough nuclear material to build120000 weapons As long as fissile material is poorly stored and rogue states like Iran and North Koreacontinue their illicit weapons programs nuclear terrorism remains a haunting possibility

The third reason is that the FBI has not yet become a first-rate domestic intelligence agencyAnalysts whose work is vital to success are still second-class citizens labeled support staff alongsidesecretaries and janitors and passed over for key jobs including running the bureaus intelligence unitsThe FBIs information technology is so antiquated it belongs in a museum And the old crime-fighting

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2842

culture still lives There is now a move afoot to shrink new classified facilities so that agents dont haveto waste time away from their cases to read intelligence documents thereStrategically defeating Al Qaeda sounds too good to be true Because it is Amy Zegart is a senior fellow at Stanfords Hoover Institution and the author of Eyes on Spies

Congress and the United States Intelligence Community

US Counterterror Chief Al-Qaida On Steady Slide

Bostoncom | 31 August 2011

White House counterterrorism chief John Brennan said al-Qaida is on a steady slide after the death of al-Qaidas latest second-in-command in Pakistan Brennan told The Associated Press on Wednesdaythat its a huge blow in the first official White House comment since Atiyah Abd al-Rahmans reportedkilling by CIA drone strike in Pakistans tribal areas last week

Al-Qaida is sort of on the ropes and taking a lot of shots to the body and the head Brennansaid This is a time not to step back and let them recover a message he says hes sending to hiscounterparts in Pakistan[Article continues herehttpwwwbostoncomnewsnationwashingtonarticles20110831us_counterterror_chief_al_qaida_on_steady_slide ]

Al-Qaeda (AKA Al-Qaida Al-Qarsquoida)

Council on Foreign Relations | 29 August 2011

ldquoAl-Qaeda an international terrorist network is considered the top terrorist threat to the United StatesThe group is wanted for its September 11 2001 attacks on the World Trade Center and the Pentagon aswell as a host of lesser attacks To escape the post-911 US-led war in Afghanistan al-Qaedas centralleadership fled eastward into Pakistan securing a safe haven in loosely governed areas there In July2007 US intelligence agencies found that the organization was regrouping and regaining strength inthese tribal areas along the border with Afghanistan though targeted killings of senior al-Qaeda leadershave since diminished the groups command and control capabilities In February 2009 Director of National Intelligence Dennis C Blair told lawmakers that the groups core is less capable and effective

than it was a year ago The killing of al-Qaedas top leader Osama bin Laden by US forces in Pakistanin May 2011 served a significant blow to the organization but analysts say al-Qaeda remains deadlywith its networks spread all over the world Plus a number of affiliated groups have gained prominencein recent years complicating the task of containing the organizationrdquo

[Article continues here httpwwwcfrorgterrorist-organizationsal-qaeda-k-al-qaida-al-qaidap9126]

Al Qaeda In The Islamic Maghreb

CSIS | 1 September 2011

ldquoAl Qaeda in the Islamic Maghreb (AQIM) emerged from a decades-long militant Islamist tradition inAlgeria In 1998 the Salafist Group for Preaching and Combat (Groupe Salafiste pour la Preacutedication etle Combat or GSPC) broke away from the Armed Islamic Group (GIA) because of the GIArsquos extensive

targeting of civilians Gradually the GSPC evolved to encompass global jihadist ideology in addition toits historical focus on overturning the Algerian state In 2006 the GSPC officially affiliated with alQaeda core soon rebranding itself as al Qaeda in the Islamic Maghreb In the following years AQIMwas able to conduct a small number of large-scale attacks most notably its 2007 bombing of the UNheadquarters in Algiers In recent years counterterrorism pressure and weak governance have combinedto shift the center of AQIMrsquos presence to the Sahara-Sahel region AQIM continues to make its presenceknown through smuggling operations kidnappings and clashes with security forces in the desert In thecoming years general instability within the region could allow AQIM to further expand its influencerdquo[Complete article is available here httpcsisorgfilespublication110901_Thornberry_AQIM_WEBpdf ]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2942

AQ Strategy

The Assynt Report | 11 August 2011

Executive Summary Al-Qaedarsquos broad objectives remain unchanged in the wake of bin Ladenrsquos death There

are nonetheless growing questions over al-Qaedarsquos capability Longstanding paranoiaover the use of electronic communications is heightened by the ongoing US dronecampaign whilst attacks against the West have generally been disrupted at an early stage

The Pakistani Talibanrsquos attack on a Karachi naval base in May 2011 was a significantmilitary success and the first major act of revenge for bin Ladenrsquos killing Furtherattempts to avenge his loss are certain

All parts of al-Qaeda are working within a cohesive framework with the ultimate aim of restoring the Islamic Caliphate (Khilafa) The strategic plan to support this aim wasdrafted by 40 of al-Qaedarsquos brightest thinkers in Kandahar Afghanistan in November1999 This plan consists of four phases each seven years long leading to the dissolutionof corrupt regimes and the union of all newly-liberated states within the Khilafa

Apart from mounting strategic operations al-Qaedarsquos role is to be the inspiration for atruly global jihadist movement It seeks to achieve this through provision of trainingbeing a role model for others to follow extending acceptance and adoption of its tactics

particularly suicide bombings and professionalising jihadist media to build a commonbrand and message between hitherto separate groups

Between the late 1990s and 2003 the organisation was primarily devoted to classicinternational terrorism Most effort is now spent fighting insurgencies from North Africato South Asia The way in which this strategy helps to spread the struggle has been seenin North-West Africa where the initial development of al-Qaeda in the Islamic Maghrebwas in part fed by men returning from fighting with al-Qaeda in Iraq

Since mid-2009 al-Qaeda and its affiliates have increasingly encouraged jihadist-sympathisers resident in Western countries to engage in violence themselves withoutcentral direction or training making surveillance more difficult

One of the keys to awakening the spirit of jihad was the success in portraying the US and

its allies as Crusaders in the Muslim world Al-Qaedarsquos strategy essentially requires thatthis process be kept running until the forces of jihad have grown large enough to launchsuccessful liberation operations

Despite its successes in Afghanistan al-Qaedarsquos credibility has suffered both from its failure to landanother strategic blow on the West on the scale of 911 and also excessive Muslim casualties in someoperations Similarly al-Qaeda in Iraq was set back by its excessive sectarian zeal and local resentmentat the foreign fighter presence In turn this affected the movementrsquos funding from the Gulf

Analysis Sub-Saharan African Leaders Media Focus On Threats Prior to 911

OSC Feature | Sub-Sahara Africa -- OSC Analysis 6 September 2011Statements by Sub-Saharan African leaders and African media reports on terrorism prior to the 10thanniversary of 911 focus on the growing threats from local extremists and Al-Qaida affiliatesparticularly in West Africa with little direct commentary on the anniversary or US counterterrorismpolicies This focus on domestic threats suggests that counterterrorism messages expressing solidaritywith African nations and acknowledging the evolving terrorist threat on the continent would have thegreatest resonance with African audiences

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3042

Leaders Stressing Determination To Counter Local Threats African leaders public statements reflect an ongoing concern about the threat of terrorism on thecontinent and a strong commitment to find ways to combat this threat

Nigerian President Goodluck Jonathan emphasized the governments commitment tovigorously combat terrorism following the 26 August bombing of the UN office inAbuja by Nigerian extremist group Boko Haram reported the Paris-based news agencyAFP President Jonathan is hosting Liberian President Ellen Johnson Sirleaf and otherforeign dignitaries for a three-day forum on terrorism and economic crimes the widelyread Lagos-based independent daily The Guardian reported on 4 September

Malian President Amadou Toumani Toure launched a Special Program for PeaceSecurity and Development on 9 August stating that development remained the mostviable solution to counter threats to the countrys stability reported Malis state-owneddaily LEssor[ 3] The program aimed to undermine support for Al-Qaida in the IslamicMaghreb (AQIM) according to Burkinabe web portal Lefasonet on 11 August

Somali Prime Minister Abdiweli Muhammad Gas stated on 23 August that theTransitional Federal Government planned to remove Al-Shabaab from the central andsouthern regions in Somalia with the goal of restoring peace within one year so the

country can hold national elections according to the Puntland-based Garowe Online

Experts Media Highlight New Capabilities Tactics

African experts and media outlets are warning about the evolving nature of terrorist organizations on thecontinent the terrorists pursuit of new targets and tactics and their potential for taking advantage of regional instability

Leading South African think tank the Institute for Security Studies stated on 29 Augustthat Boko Harams attack on the UN in Abuja completes Boko Harams metamorphosisinto an international terrorist group Since December 2010 Boko Haram had killed over600 people in over 70 attacks against Nigerian targets according to the think tank buthad not previously targeted Western or international interests

A 26 August article on the popular Malian web portal Maliweb voiced concern thatAQIM could benefit from Tuareg mercenaries many of whom were recently returningfrom fighting in Libya and could benefit from an increase in arms trafficking through theSahel during the Libyan conflict

Ugandas privately owned Daily Monitor reported on 19 August that AU forces inSomalia warned that Al-Shabaab planned to increase the number of kidnappings andbomb attacks as part of its new strategy to shift from controlling territory in Mogadishuto conducting more of an insurgent campaign

Concern Over Al-Qaida Presence Terrorist Collaboration

West African official statements and media reports reflect a growing concern over an increased Al-

Qaida presence in West Africa and collaboration with AQIM Al-Shabaab and Boko Haram

Nigerian security services reported that the suspected mastermind behind the 26 Augustbombing of the UN office in Abuja was a Boko Haram member with close links to Al-Qaida and Al-Shabaab according Nigerias privately owned Daily Sun

A 28 August report in the privately owned daily Nigerian Tribune claimed that the 26August bombing in Abuja was part of Al-Qaidas plans to mark the 10th anniversary of 911 and called Boko Haram Al-Qaidas ally in the region

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3142

An 8 August commentary in Burkina Fasos LObservateur Paalga said that reports of Boko Haram collaboration with Al-Shabaab and AQIM could indicate that Al-Qaida isextending its African tentacles Abdourahmane Dieng security division chief of theEconomic Community of West African States said the collaboration represented a veryserious threat according to Senegals progovernment Le Soleil on 5 August

Messages Likely To Resonate With African Audience

Sub-Saharan Africas increasing concern about the shifting nature and potential strengthening of theterrorist threat on the continent suggests that messages directly addressing the impact of terrorism onAfricans the increasingly complex nature of the threat and the need for multilateral cooperation againstterrorism are most likely to resonate with Africans

Messages expressing solidarity and sympathy for Africans affected by Boko Haram Al-Shabaab and AQIM would almost certainly resonate with a broad African audience

African political and military leaders would probably welcome acknowledgement of thecomplex and changing nature of terrorism on the continent and recognition of theirinitiatives and commitment to countering violent extremism

African leaders and medias concern about potential collaboration between Boko Haram

Al-Shabaab and AQIM suggest that they would be open to improving multilateral andcross-regional sharing of lessons learned and strategies to counter the intensification of terrorism within Africa

Aviation and Maritime Security| back to top |

Bomb Threats Force Jets To Land

Associated Press | 7 September 2011

Both landed safely one landed in Ankara Ataturk International Airport and the other at Kuala LumpurTwo flights operated by Pakistans state-owned airline received bombs threats on Wednesday

and both landed safely one in Turkey the other in Malaysia officials said No bombs were found The

first flight was headed for Manchester England when it was notified of the threat near the Bulgariancapital of Sofia The crew contacted the control tower in Istanbul to seek permission for the landingstate-run Anatolia news agency reported Authorities quickly evacuated all 378 passengers from theBoeing 777-300ER aircraft after it parked at a remote corner of the International Ataturk Airport andbomb squads began searching the plane with sniffer dogs Anatolia reported PIA spokesman MashoodTajwar confirmed the flight received a threat and landed All passengers were safe A police searchturned up no bomb officials said Later a second PIA flight from Islamabad to Kuala Lumpur alsoreceived a bomb threat It landed in Kuala Lumpur and all the passengers disembarked safely saidTajwar The UK-bound Pakistan International Airlines plane was forced to make an emergency landingat Ataturk Airport in Istanbul after receiving a bomb threat Malaysias airports authority said thepassengers were being screened and the plane was isolated in a parking area while being searched bypolice No bomb was found

It said the plane carried 164 passengers and 13 crew Azmi Murad senior general manager forthe authority said the Pakistani airline informed it that the warning came by email Mr Tajwar gave nodetails on the nature of the threat or how it was delivered Pakistan is home to al Qaedas top leadershipMilitants who trained there have been responsible for many of the attacks and failed plots in the USand Europe since Sept 11 2001 when planes hijacked by al Qaeda militants destroyed the World TradeCenter in New York and crashed into the Pentagon The bomb threats came four days before the 10thanniversary of 911 but there was no apparent link to Islamist militants who typically do not alertauthorities in advance The FBI and Homeland Security department issued warnings last weekend aboutal Qaeda threats to small airlines

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3242

Commentary amp Opinion| back to top |

From Terror Group Founder To Libyan Rebel Military Commander

ABCNews | 29August 2011

The same man who triumphantly led Libyan rebels into Gadhafis compound last week first came to theattention of the US intelligence community years ago - as a founder of a terror group

Abdelhakim Belhaj who was recently appointed to Tripolis rebel military council was one of the original founders of the Libyan Islamic Fighting Group an anti-Gadhafi group which was laterdesignated by the US State Department as a terrorist organization with links to al Qaeda according toUS government reports

We proudly announce the liberation of Libya and that Libya has become free and that the ruleof the tyrant and the era of oppression is behind us a victorious Belhaj told reporters after the stormingof Gadhafis Bab al-Aziziya compound last week Ousting Gadhafi had been the main objective of theLIFG since its inception in the early 1990s even if some of the fighters believed that meant puttingAmericans in the crossfire

The group carried out operations against the Libyan government including at least four suspectedassassination attempts against Gadhafi in the 1990s and was also believed to be connected to a series of suicide bombings in Casablanca Morocco in 2003 the US State Department reported As relationsbetween the US and Gadhafi improved in the mid-2000s some LIFG leaders cultivated relationshipswith top al Qaeda leaders including Osama bin Laden and were suspected of funneling fighters to Iraq tocarry out operations against US soldiers

When the LIFG was designated a terror organization in 2004 it was meant as a gesture of solidarity with the Libyan government according to a March 2011 congressional report

Contrary to several US government reports Libyan rebel ambassador to the US Ali Aujalitold ABC News that the LIFG was never connected to al Qaeda and did not carry out terrorist operations

They were only opposed to Gadhafi during his rule and paid the price for that by beingoppressed by the regime Aujali said

The CIA first publicly voiced its concerns about the connection between the LIFG and al Qaedain 2004 when then-director George Tenet testified before the Senate Select Committee on Intelligenceand listed the LIFG among groups that represented an immediate threat [that] has benefited from alQaeda links[Article continues here httpabcnewsgocomBlotterterror-group-founder-libyan-rebel-military-commanderstoryid=14405319]

Interview With Saudi Sheik Wajdi Al-Ghazawi

MemriTVcom

Sheik Wajdi al-Ghazawi owner of al-Fajr TV criticizes extremist atmosphere in Saudi Arabia and saysafter 911 They Handed Out Sweets on the Streets of Mecca

Following are excerpts from a statement by Saudi Sheik Wajdi Al-Ghazawi owner of Al-FajrTV which was posted on YouTube on August 4 2011

Wajdi Al-Ghazawi When Al-Qaeda and Osama Bin Laden were at the height of their mightthey were extremely popular in Saudi Arabia From mosque pulpits across Saudi Arabia preacherswould pray for their success Moreover from the pulpits of the most important mosques ndash the Al-HaramMosque in Mecca and the Nabawi Mosque in Al-Madina ndash direct prayers for the success of Al-Qaedawere made during the days of the bombing of Tora Bora Oh Allah help our brothers in AfghanistanThese supplications were made during evening prayers as well as Friday prayers The preachers wouldpray for them in violation of the ministrys instructions

When the twin towers in New York were attacked they handed out sweets on the streets of Mecca By Allah they did I witnessed this myself The young people bowed in prayer and hugged one

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3342

another out of joy People were in heaven because of these young men who destroyed America andbombed this idol Am I right or not Was it like that or not

Back then when the Taliban broke off a piece of the nose of the Buddha statue which was hewnin the mountain an entire sermon was dedicated to it in the mosque in Mecca and the preacher was laterreprimanded for this sermon The entire Saudi people supported and loved Al-Qaeda

This went on until our brothers in Al-Qaeda ndash and I dont know what was going through theirminds ndash began to carry out operations inside Saudi Arabia Thats when we all raised our hands andsaid Youve gone too far We wont support you in this

The atmosphere here in Saudi Arabia is one of extremism It is characterized by focusing onminor details Many things are forbidden Yes maybe they are indeed forbidden but by forcing peopleto avoid them and by acting as if these were major sins an atmosphere was created that gave rise toextremist youth who might act recklessly at the most trivial provocation

For instance we blew out of proportion the issue of music the issue of smoking or the issue of hanging pictures in public places True there are clear texts on these issues but the young peopleembraced these issues as if they were fighting usury fornication or alcohol No these are not among theseven major sins So our society has become extreme

This extremist atmosphere has given rise to people who accuse others of heresy and people whopurport to be waging Jihad It has created genes that gave rise to cells of Al-Qaeda and other terrorists

We must examine our breeding ground in which these young men were sownBy Allah what can possibly emerge from such an atmosphere Muftis who accuse others of

heresy sheiks who incite and young people who bomb Am I right or not[Complete clip is available here httpwwwmemritvorgclipen3099htm]

Legal Aspects amp Lawfare| back to top |

Revisiting A Stale Counterterrorism Law

Council on Foreign Relations | 1 September 2011

ldquoNearly a decade after 911 the United States still relies on the 2001 Authorization for the Use of Military Force (AUMF) for the killing and detention of those considered responsible for or associatedwith the terrorist attacks But CFR national security law expert John Bellinger says it is becomingincreasingly difficult for the Obama administration to justify some of its counterterrorism operationsunder this limited statutory authority It has been used in defense of actions including drone attacks onindividuals as well as the targeting of groups in Yemen and Somalia that may have only the mosttenuous affiliation or association to the 911 attack A revised AUMF should clarify those operations aswell as the issue of detention specifically which individuals can be detained for how long and subjectto what processes There also needs to be greater effort at the international level he adds to fill thegaps in the law that covers conflicts between states and non-state actorsrdquohelliprdquo[Complete article is available here httpwwwcfrorgcounterterrorismrevisiting-stale-

counterterrorism-lawp25742]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3442

Narco-Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector[Complete article is available here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Mexicos Cartels Move Into Extortion

At a construction site of an apartment building in the heart of the Mexican capital a company engineerruns through his weekly payroll sheet He has salaries written out for carpenters bricklayers andelectricians At the bottom of the sheet is a notation of $200 for ldquosecurity servicesrdquo next to a nicknameldquoEl Indiordquo mdash the Indian [Complete article is available here

httpwwwtucsonsentinelcomnationworldreport090611_mexico_cartels_bribesmexicos-cartels-move-into-extortion ]

Seven Die In Mexican Pacific Port City

Latin American Herald Tribune

Seven people died in separate shootings in Mazatlan a port city in the northwestern Mexican state of Sinaloa with some of the incidents drug-related a police spokesman told Efe [Complete article is available herehttpwwwlahtcomarticleaspCategoryId=14091ampArticleId=423061]

Tijuana Violence Slows As One Cartel Takes Control

BorderlandBeatcom

Mexicos famously seedy border city of Tijuana is enjoying a lull in drug murders as the countrys mostpowerful cartel gains the upper hand over its rivals [Complete article is available here httpwwwborderlandbeatcom201109tijuana-violence-slows-as-one-cartelhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3542

Network Notes| back to top |

Canadian data foreign threats Spying in the digital age (Suggested by a reader in Lithuania ndash thanks) Globe and Mail | By Colin Freeze 31 July 2010

A government spy agency thatrsquos prohibited from monitoring Canadian citizens is now usingldquoinformation about Canadiansrdquo to zero in on foreign threatsThe ambiguous statement found in a new government report detailing the activities of CommunicationsSecurity Establishment Canada could sanction a range of intelligence-gathering activities ndash includingthe controversial practice of mining ldquometadatardquo from digital communications

Metadata ndash often called data about data ndash are found in e-mails and their attachments and containdigital signatures that can reveal when where and by whom documents were created

The collection of metadata has caused controversy in other countries but never in Canada wherethe Communications Security Establishment Canada operates as an ultra-secretive agency About theonly thing that is known about the classified practices is that they were halted and resumed after someldquomajor changesrdquo including directives signed by Defence Minister Peter MacKay

ldquoI cannot comment on specific operational activitiesrdquo Adrian Simpson a CSEC spokesman toldThe Globe He stressed that reviews upheld that the activities in question were ldquocarried out inaccordance with the law ministerial requirements and CSECrsquos policies and proceduresrdquo

ldquoCSEC is prohibited from directing its activities at Canadians anyone in Canada or Canadiansanywhere in the worldrdquo he said

For decades signals-intelligence agencies in the West have been allowed to safeguard nationalsecurity by eavesdropping on foreignersrsquo conversations Spies can whatever phone lines and satellitesignals they can so long as they never listen in on fellow citizens

But in the digital age governments run increasingly sophisticated dragnets scooping up andscouring through millions of intercepted Internet conversations daily Such practices create legalambiguities

ldquoThe whole issue of what constitutes boundaries for signals-intelligence agencies in cyberspaceis a big debate right nowrdquo said Rafal Rohozinski a security expert affiliated with the University of Torontorsquos Munk School

A watchdog agency that reviews the CSECrsquos activities released an annual report to Parliament onJuly 20 ldquoWhen other means have been exhausted CSEC may use information about Canadians when it

has reasonable grounds to believe that using this information may assist in identifying and obtainingforeign intelligencerdquo it reads

Sometimes collecting metadata is relatively benign It can involve aggregating sets of data tospot trends much like the way meteorologists discern national forecasts from localized information

For example while CSEC canrsquot usually monitor the communications of specific Canadian terrorsuspects it can glean insights by zooming out for big-picture patterns One way to do that MrRohozinski said would be to look at data flows between Canadian cities and Yemen where an Internet-savvy al-Qaeda offshoot works to recruit Westerners

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3642

Metadata however can be more revealing Documents that circulate on the Internet travelaround like postmarked letters marked with return addresses ndash e-mails and attachments have embeddedcodes that speak to the who where and when behind their creation

The US National Security Agency found itself mired in controversy a few years go after itskirted domestic-spying bans by secretly upholding that this sort of American metadata was fair gamedistinct from communication contents

Therersquos little to suggest the CSEC would go that far The federal agencyrsquos activities are reviewedby a watchdog body now headed by a former Federal Court of Appeal judge Robert Deacutecary appointedlast year wrote in his annual report that he was satisfied the CSEC activities in question are lawful evenif his predecessors felt them borderline

ldquoThis was the first review of these activities since hellip their resumption under new policiesrdquo thewatchdogrsquos report says It concludes that the surveillance activities are ldquoin accordance with the lawrdquo andfollow ldquomajor changes to certain policies procedures and practicesrdquo

Much of the concern arises from the possibility that CSEC could hand over metadata intelligenceto domestic law-enforcement and security agencies

As it stands the RCMP and CSIS have to develop their domestic investigations before coming toCSEC ndash usually with warrants ndash if they want specific intelligence The rules guiding handovers are strictbecause even though all agencies run surveillance operations they do so under vastly different

mandates and legal standardsThe spy agency however stood by its practicesldquoCSEC is extremely diligent when it comes to the privacy of Canadiansrdquo Mr Simpson said

[complete article is available here httpwwwtheglobeandmailcomnewsnationalcanadian-data-foreign-threats-spying-in-the-digital-agearticle2113772 ]

Cyber Attacks Against NATO Then And Now

New Atlanticist | 6 September 2011

ldquoNow that NATOrsquos Operation UNIFIED PROTECTOR over Libya is winding down it is worth

noting how few cyber incidents were directed in protest against the Alliance Certainly there was a

cyber component to the liberation of Libya but it was more about content and Internet freedom (the

most newsworthy elements here were the role of social media and the Libyan government taking largeparts of the nation offline) But compared to past history NATO cyber defenders had a relatively easy

time

ldquoNATO has not however had an easy 2011 Although there were three significant incidents we

know about none seemed to have been in direct response to operations over Libyahelliprdquo

[Complete article is available here httpwwwacusorgnew_atlanticistcyber-attacks-against-nato-then-

and-now]

The Calm Before The Storm

Foreign Policy | By Joel Brenner 6 September 2011

Cyberwar is already happening -- and its about to get much much worse A veteran cyberwarriorexplains how America can prepare itself

Revelations of wholesale electronic fraud and massive data heists have become weekly evendaily affairs A multinational electronics corporation loses personal information on more than 100million customers Cyberthieves break into an international bank counterfeit credit balances and lootATMs in four countries grabbing $9 million in just a few hours International gangs spread maliciouscode that conscripts unwitting computers into zombie armies of hundreds of thousands of similarlyenslaved machines Criminals then rent these armies called botnets as easily as you can buy a time-sharing arrangement in a beach condo No wonder the vast majority of Internet traffic is spam

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3742

Yet the loss of personal information and related criminal fraud intolerable as they are are theleast threatening face of electronic insecurity The US militarys secret network is penetratedAmericans corporate pockets are being picked clean of the intellectual property that makes the UnitedStates tick And the electricity grid that keeps the lights on and makes everything move is dangerouslyinsecure

In one remote attack on the Pentagons information systems about 10 years ago the Chinesehauled away up to 20 terabytes of information If the information had been on paper theyd have neededa line of moving vans stretching from the Pentagon to freighters docked 50 miles away in Baltimoreharbor just to haul it away Had they done so the military district of Washington wouldve become anactive theater of operations for the first time since 1865 and the Navy wouldve blockaded theChesapeake Bay But the Chinese did it electronically so who noticed

Corporate espionage by both competitors and foreign intelligence services or their surrogates isalso increasing Intelligence officials see this but cant speak openly about the specifics and Im seeingit now in my law practice The victims rarely admit it for understandable reasons Oracle whichsuccessfully sued SAP for theft of its software code was a prominent exception Google was another

When the Chinese penetrated Google in late 2009 -- yes that operation was Chinese and yes itwas done with the blessing of a member of the Politburo -- they werent after customer informationThey were after the source code that makes Google unique Nor was Google the only victim Thousands

of US and Western firms were penetrated in that affair Foreign governments -- and not only theChinese -- understand that they cannot compete with the United States militarily and politically if theycannot compete with it economically so their intelligence services want to steal its corporate intellectualproperty This is the technology that gives America its competitive edge and often it has nothing to dowith defense Ordinary companies with valuable technology are now being targeted by nation-statesThis is a new era National security and economic security have converged

The danger is not limited to the loss of technology and information however The owners andoperators of the North American electricity grid are hooking up their control systems to the Internet asfast as they can Exposing the grid to the Internet makes it marginally more efficient but it also makes itdramatically more vulnerable to disruption If you can remotely penetrate an electronic system to stealinformation you can remotely penetrate it to shut it down or make it go haywire This is why there is no

longer a meaningful difference between information security and operational security And the biggestoperational risk is the grid In contemporary society nothing moves without electricity If the grid goesout the country stops

As the Stuxnet affair demonstrated remotely engineered disruption of industrial control systemsis now a reality That episode involved the successful electronic attack on the centrifuges in the Iraniannuclear program Only a first-class intelligence agency could have pulled that off but the blueprint fordoing it -- the code itself -- is now public Many American industrial control systems run on the samekind of equipment the Iranians were using but unlike the controls on the Iranian centrifuges thecontrols on the US grid are now being connected to the Internet making them easier to disrupt Stuxnetwas a watershed there will be copycats

Other industrial control systems will also be targets Some already are Air traffic control

railroad switches and water and sewage systems are all electronically controlled now and many arevulnerable If an intruder can break into the right server electronically he can remotely shut downproduction send your goods to the wrong destination and even unlock your doors -- and delete your logentries so he leaves no record of ever having been there

The United States does not lack enemies who would attack it this way Seized al Qaedacomputers contain details of US industrial control systems In 2003 a group affiliated with thePakistani terrorist organization Lashkar-e-Taiba -- the same gang that engineered the 2008 terroristassaults in Mumbai -- plotted to attack the Australian grid Other groups conspired to attack the Britishgrid in 2004 2006 and 2009 Yet the owners and operators of the North American grid continue willy-

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3842

nilly to expose their control systems to the Internet instead of isolating and hardening it This is folly of a high order

Important conclusions for public and corporate policy follow from this vulnerable state of

affairs First cyber insecurity has operational consequences In the current and foreseeable states of technology a high degree of assurance against electronic penetration of anything connected to theInternet is not achievable Large efficient electronically connected organizations and nations aretherefore vulnerable to remotely engineered disruption as well as information theft

Second this risk cannot be eliminated -- but it can be reduced and managed As a nation theUnited States should start by isolating the grids controls from the Internet Undoubtedly there aremarginal efficiencies to be gained by seamless connectivity over a publicly accessible infrastructure butthese gains are usually exaggerated and the risk this connectivity creates is staggering The governmentand the major telecommunications carriers must also make the investment required to re-create themassive redundancies that made the wired telephone network so robust Resilience and swift recoveryshould be the goal If the consequences of cyberattacks were reduced penetration would cease to matter

Third companies that wait for the government to solve their own security problems do so attheir peril The government is broke and the IT backbone is 85 percent private so the governmentdoesnt control it The governments role in altering the status quo will be limited to setting standardsusing its purchasing power to move vendors toward better security and getting its own house in order

The government can neither secure corporate intellectual property nor protect firms against operationaldisruption

Fourth in a world in which everything cannot be protected companies must determine forthemselves what intellectual property and physical assets to isolate and safeguard Those that approachthis task seriously will quickly learn that technology is only one aspect of their insecurity and in manycases the easiest to deal with Unless technology is integrated with personnel practices and operationalsecurity it opens vulnerabilities that its users rarely understand This kind of integration requires theautomated enforcement of reasonable security policies and systematic workforce training and thatoccurs only when management the lawyers and the technologists work closely together This is an old-fashioned management challenge -- not a technological one For their part corporate boards need to takeIT security seriously and launch audits that examine how their systems are actually implemented and

used not merely how they are designed Because as the techies like to put it the weakest link in anysystem is not the silicon-based unit on the desk its the carbon-based unit in the chair Joel Brenner is author of the forthcoming America the Vulnerable Inside the New Threat Matrix of

Digital Espionage Crime and Warfare He has served as the inspector general of the National Security

Agency the national counterintelligence executive and the NSAs senior counsel He now practices law

at Cooley LLP in Washington DC

Cyberattacks Decline Slightly Symantec Report Finds

Dark Reading | 1 September 2011

Organizations worldwide are suffering damages as a result of cyberattacks but interestingly there hasbeen a slight decline in these attacks during the past 12 months according to a new report from

Symantec More than 90 percent of the more than 3300 respondents across 36 countries said theyexperienced tangible losses as a result of a hack with 84 percent reporting financial loss to the cost of abreach Around one-fifth lost at least $195000 in breaches during the past 12 months

Meanwhile Symantec attributes the unexpected bright spot of a decline in breaches toorganizations employing better cybersecurity defenses More than 70 percent of organizations sawattacks in the past 12 months a decline of 5 percent from 2010 And those that experienced anincreasing frequency of attacks dropped from 29 percent in 2010 to 21 percent this year While 100percent last year reported losses from cyberattacks 92 percent did so in 2011 The trend seemscounterintuitive given the rash of high-profile breaches this year More

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 19: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 1942

a common communication system for police firefighters and other emergency personnel remainstangled up in political wrangling in Congress over how to implement it This is a no-brainer Hamiltonsaid The first responders at the scene of a disaster ought to be able to talk with one another Theycannot do it today in most jurisdictions

Former leaders of the 911 commission issued a report card saying nine of its 41recommendations remain unfinished The Office of the Director of National Intelligence hasexperienced growing pains as overseer of the 17 spy agencies churning through four chiefs in six yearsTensions over turf confusion about the DNIs role and problems herding agencies with very powerfulchiefs of their own all came to a crescendo when retired Admiral Dennis Blair the third DNI tried toassert authority over CIA station chiefs who represent the agency in different countries The positionof chief of station is one of the crown jewels of the CIA and they dont want anyone playing with theircrown jewels said Mark Lowenthal a former senior US intelligence official

After a dust-up with CIA Director Leon Panetta who now is defense secretary it was Blair whowas sent packing I think the mistake that some have made is to have viewed the DNI and the Directorof CIA as an eitheror proposition rather than the power of the two working together the DIAs Sheddsaid in an interview in his office There is a history of where that hasnt worked so well I believe it isworking much better today said Shedd who has worked at the DNI CIA and National SecurityCouncil

Intelligence experts say in the current administration Obamas top homeland security andcounterterrorism adviser John Brennan arguably has more power than any of them because he has thepresidents ear Its a reminder that bureaucratic reform or no personalities count in making nationalsecurity policy The improved sharing of secret data has led to yet another set of problems The delugeof bits and bytes has subjected intelligence analysts to information overload as they try to sift through itall for relevant pieces Our analysts still are spending way too much time on finding the informationrather than on the analysis of the information Shedd said There is just too much data to go find it all

The intelligence community wants a system developed that would automatically processinformation from multiple agencies and then make the connections for the analysts

But greater inroads into sharing data across agencies does not guarantee that another attack willbe averted The threat has evolved and officials now are increasingly concerned about a lone wolf plot

by an individual not tied to any militant group that may be more difficult to uncover Those threatswill not come to our attention because of an intelligence community intercept said John Cohen asenior Department of Homeland Security counterterrorism official

They will come to our attention because of an alert police officer an alert deputy sheriff analert store owner an alert member of the public sees something that is suspicious and reports it Cohensaid One measure of the success of post-911 reforms is that a decade later the United States has not hada similar attack Now that could be luck that could be skill we dont really know Hamilton said Butin all likelihood what we have done including the establishment of the Department of HomelandSecurity and the transformation in intelligence and FBI has certainly been helpful[Article continues here ]httpnewsyahoocompost-9-11-u-intelligence-reforms-root-problems-052514320html

Comment the value added provided by the Office of the DNI remains an open question for many withinthe Intelligence Community (IC) and is a favored theme of corridor discussion in IC-member agenciesOn the other hand there is broad agreement among intelligence officials that the degree of cooperationand coordination between intelligence agencies and the character of intelligence sharing has vastlyimproved The fact that there has not been a successful major attack on US soil since 911 ndash not forlack of plotting ndash is in great part testimony to this more effective cooperation

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2042

Jihadist Suggests Striking New York City Bridges

All SITE Intelligence Group | 6 September 2011

A jihadist pointed to what he found to be a weak point of suspension bridges and directed his messageto those who love blasting and explosions In a message posted on the Shumukh al-Islam forum onSeptember 6 2011 the jihadist Abu Suleiman al-Nasser gave a picture of the Verrazano Bridge inNew York on which he drew a red box and arrow on the bridges center He then gave a map on whichhe circled the various bridges in New York City and its boroughs A fellow jihadist offered his ownidea giving a picture of the Hoover Dam and explaining that there is no target more important thandams He wrote that striking a dam may lead to the submerging of cities and the killing of thousands of people and in the case of the Hoover Dam would impact Las Vegas the capital of gambling anddebauchery

Counterterror Veteran is New Deputy FBI Director

Atlanta Journal Constitution | 1September2011

A 24-year FBI veteran with extensive counterterrorism experience Sean Joyce has been named the lawenforcement agencys new deputy director Elevated to the No 2 post within the FBI by Director RobertMueller Joyce replaces Timothy Murphy who is retiring after 23 years with the bureau Since last yearJoyce has been executive assistant director of the national security branch responsible for the FBIs

national security and intelligence operations He earned the Attorney Generals Award for ExceptionalService in 2004 for work on a counterterrorism squad in Dallas In 2008 he was named chief of thecounterterrorism divisions international terrorism operations section with responsibility forinternational terrorism matters within the United States hellip[Complete article is available here httpwwwajccomnewsnation-worldcounterterror-veteran-is-new-1153018html]

Top CIA Official Obama Changed Virtually Nothing

Salon | 1 September2011

PBSs Frontline is airing an examination of Top Secret America on September 6 The show includes arare and lengthy interview with 34-year-CIA-veteran John Rizzo who is described as the most

influential lawyer in CIA historyHere is one quote they include from Rizzo With a notable exception of the lsquoenhanced

interrogationrsquo program the incoming Obama administration changed virtually nothing with respect toexisting CIA programs and operations Things continued Authorities were continued that wereoriginally granted by President Bush beginning shortly after 911 Those were all picked up reviewedand endorsed by the Obama administration hellip[Complete article is available herehttpwwwsaloncomnewspoliticsbarack_obamastory=opiniongreenwald20110901obama]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2142

General Counterterrorism News| back to top |

The Terrible Missed Chance

Newsweek | 4 September 2011

Special Agent Harry Samit of the FBIs Minneapolis field office knew he was looking into the eyes of aterrorist It was early afternoon on Friday Aug 17 2001 Across from him sat Zacarias Moussaoui a33-year-old French-born student arrested the day before for overstaying his visa Moussaoui had paidmore than $8000 in cash that summer to sit in a cockpit simulator in a flight school in the suburbs of Minneapolis and learn - in a matter of days - the basics of how to fly a 747-400 Samit a formerintelligence officer at the Navys celebrated Top Gun flight school felt sure the man across the desk from him was a Muslim extremist who was part of a plot to hijack a commercial jetliner filled withpassengers The trick Samit wrote in a soon-to-be-released excerpt of a book hes written about thecase was getting Moussaoui to admit this and reveal details and associates to allow us to stop the plot

Surely the bureau brass in Washington would share his concern Samit thought He was wrongThat same day halfway across the country in the fluorescent-lit hallways of the J Edgar Hoover

FBI headquarters building in Washington counterterrorism supervisors were treating Samits firstreports about Moussaoui with skepticism even contempt Michael Maltbie a DC counterterrorism

specialist insisted repeatedly in the days after the arrest that there was no clear link between Moussaouiand Al Qaeda - the link needed for a warrant Maltbie thought Moussaoui was a dirty bird he latertold investigators but favored deporting him to France

Believing a hijacking might be imminent Samit appealed to his boss in Minneapolis SpecialAgent Greg Jones Jones picked up the phone on Aug 27 and called Maltbie at FBI HQ

Moussaoui he said might be part of a plot to get control of an airplane and crash it into theWorld Trade Center or something like that

Maltbie scoffed You have a guy interested in this type of aircraft Maltbie replied accordingto FBI documents That is it (Maltbie declined requests for an interview)

At least Maltbie was paying attention Michael Rolince who ran the FBIs InternationalTerrorism Operations Section was arguably the bureaus most important go-between with the White

House on domestic terrorist threats in the summer of 2001 He tells Newsweek he spent less than 20seconds being briefed on the Moussaoui case that August His office was inundated with terrorismprobes he said since Moussaoui was in custody already he posed no immediate threat Did it rise tothe level of something that I would take upstairs Rolince asks The answer is no

At CIA headquarters alarm bells were ringing loudly CIA Director George Tenet was briefedon Moussaoui within days of the arrest receiving a paper with the eye-catching headline IslamicExtremist Learns to Fly But the FBIs acting director that summer and the bureaus most seniorcounterterrorism official were left in the dark[Article continues here httpwwwthedailybeastcomnewsweek20110904the-terrible-missed-chancehtml]

Pan Am Flight 103 - Lockerbie Bombing - al-Megrahi CIA FilesWebwire | 31 August2011

BACM ResearchPaperlessArchivescom has announced the publishing of CIA files related to the PanAm Flight 103 Lockerbie Bombing

The files can be downloaded at no cost at httpwwwpaperlessarchivescompanam103ciahtml The files date from 1984 to 1999 These are the most recent files on Pan Am 103 released by the

CIA This set of files is unique because it includes memos on the direct handling of an intelligencesource This type of information is exempt from the Freedom of Information Act (FOIA) and is not oftenreleased by the Agency

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2242

The files cover information received by the CIA on Abdel Basset al-Megrahi Al-Megrahi is theonly person ever convicted in the Pan AM 103 case The Scottish government in 2009 allowed al-Megrahi to be released from custody and returned to Libya because of his failing health With the recentfall of Muammar Qaddafis regime there have been renewed calls for al-Megrahi to be returned toScottish custody or extradited to the United States and put on trial[Complete article is available here httpwwwwebwirecomViewPressRelaspaId=144692]

Getting The Caucasus Emirate Right

CSIS | August 2011

ldquohellipThis report aims to set straight a rather distorted record It demonstrates the veracity of three vitallyimportant facts usually obfuscated in discussions of the subject (1) the longstanding and growing tiesbetween the CE and its predecessor organization the ChRI on the one hand and al Qaeda (AQ) and theglobal jihad on the other hand (2) the importance of the CE jihadi terrorist network as a united andorganized political and military force promoting jihad in the region and (3) the salience of local culturaland the Salifist jihadist theo-ideology and the influence of the global jihadi revolutionarymovementalliance as key if not the main factors drive the ldquoviolence in the North Caucasusrdquohelliprdquohttpcsisorgfilespublication110829_Hahn_GettingCaucasusEmirateRt_Webpdf

7 Things You Didnrsquot Know About the War on TerrorForeign Policy | By Eric Schmitt and Thomas Shanker 6 September 2011

From an attempt to negotiate with Osama bin Laden to a proposal to threaten to bomb Mecca its been awild decade for the US national security establishment

Our new book Counterstrike The Untold Story of Americas Secret Campaign Against Al Qaeda is in many ways asummary of the past decade of our reporting on the military intelligence community and domestic law enforcement as itentered a new era of Darwinian evolution to counter violent extremism

It also is our deep dive into a decade of American counterterrorism efforts -- from the work of commando trigger-pullers and spies on the ground up to senior political leaders who wanted to defendthe nation (and get re-elected) Our efforts to report and write this book allowed us to uncover many newmissions never discussed before -- and gave us an understanding of how the war on terror had changedover the last decade

Our book assesses the 10 years since 911 as the military divides the fight into tactical missionson the battlefields of modern terrorism then the operational advancements that provided the means tosuccess while not securing final victory and at the top the strategic level of policy debates about howthe nation should combat this threat to its security

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2342

Here are seven vignettes from Counterstrike that offer glimpses into the thinking of policymakers andcommanders in early days after the Sept 11 attacks and how that thinking evolved over the followingdecade into a more whole-of-government approach to combating terrorists

1 Bush Tried to Negotiate with al Qaeda

The George W Bush administration like all of its predecessors swore never to negotiate with terroristsBut it did undertake an extraordinary and extraordinarily secret outreach effort to open a line of communication with Osama bin Laden and al Qaedas senior leadership It was an attempt to replicatehow the United States tried to sustain a dialogue with the Soviet Union even during the darkest days of the Cold War when White House and Kremlin leaders described in private and in public a set of acceptable behaviors -- and described with equal clarity the swift vicious even nuclear punishment forgross violations

In the months after the Sept 11 attacks Bushs national security staff working through theintelligence agencies made several attempts to get a private message to bin Laden and his inner circleThe messages were sent through business associates of the bin Laden familys vast financial empire aswell as through some of the al Qaeda leaders closest relatives a number of whom were receptive toopening a secret dialogue to restrain and contain their terrorist kinsman whom they viewed as a blot on

their name (To be sure other relatives were openly hostile to the American entreaties)According to a senior American intelligence officer with first-hand knowledge of the effort the

response from Osama bin Laden was silence And the effort was suspended

2 Sometimes a Wedding Is Just a WeddingIn the early days after the Sept 11 attacks the CIA and FBI vied to produce the most compellingintelligence reports that tracked suspected terrorist plots The agencies often worked at cross purposessometimes unwittingly At one point in early 2002 both agencies were tracking what American analystssaid were growing preparations for a major wedding somewhere in the Midwest (In terroristvernacular the word wedding is often code for a major attack)

Dribs and drabs on this wedding planning made their way to President Bush from bothagencies independent of each other of course

Finally over the Easter holiday during a video-teleconference with top aides in Washingtonfrom his ranch in Crawford Texas Bush stopped the briefing exasperated by the discrepancies in therival agencies reporting about the suspected threat

George Bob get together and sort this out Bush told his CIA director George J Tenet andFBI director Robert S Mueller III

Bushs instincts were correct When the analysts finally untangled their clues it turned out thatthe ominous wedding really was just that the matrimony of a young man and a young woman fromtwo prominent Pakistani-American families There was no threat There was no plot

3 The Threat to Bomb MeccaAs fears of a second attack mounted following the 911 strikes US government planners franticallycast about for strategies to protect the country Even the most far-fetched ideas had a hearing howeverbriefly In one case some government planners proposed that if al Qaeda appeared ready to attack America again the United States should publicly threaten to bomb the city of Mecca in Saudi Arabiathe holiest site in all of Islam in retaliation Just nuts one Pentagon aide wrote to himself when heheard the proposal The idea was quickly and permanently shelved

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2442

4 The SEAL Raid in Iran That Didnt HappenWhen US forces routed the Taliban government in Afghanistan and forced bin Laden and his toplieutenants to flee many senior al Qaeda leaders including bin Laden and his deputy Ayman al-Zawahri escaped to neighboring Pakistan But a separate group including the al Qaeda leaders sonSaad bin Laden fled to northern Iran where American troops would not pursue them and the Iranianswould likely not detain them But the Shiite clerics running Iran placed the al Qaeda operatives and theirfamily members under virtual house arrest and they became a shield against possible attacks from theSunni-based terrorist organization

One plan in particular illustrated the bold thinking and wildly unrealistic aims of the militarysinitial approach after 911 to kill or capture terrorist leaders The plan called for hunting the eight to 10senior al Qaeda leaders and operatives who had sought refuge in Chalus an Iranian resort town on theCaspian Sea where they had been detained

At the Joint Special Operations Command at Fort Bragg NC military planners drew up optionsfor Navy SEALs to sneak ashore at night using state-of-the-art mini-submarines Once they landed theSEALs would slip past Iranian guards to snatch the al Qaeda leaders Another option called for SpecialOperations helicopters to spirit American commandos into the town and whisk them out again with theirquarry The Americans went as far as conducting two or three rehearsals at an undisclosed locationalong the US Gulf Coast in early 2002 They conducted small-boat insertion exercises involving about

30 Special Operations personnel most SEALs and eventually concluded the mission was feasible if they were provided with more detailed intelligence on the locations of the al Qaeda members and thesecurity around them

The logistics of the mission were daunting Chalus sits at the edge of the Elburz coastal mountainrange about 70 miles north of Tehran and the failed rescue of the American hostages in Iran in April1980 loomed large in commanders memories Eventually Gen Richard B Myers the chairman of theJoint Chiefs of Staff rejected the mission as too risky and too politically volatile Many of the al Qaedaoperatives are reportedly still there

5 Intelligence Hauls of Unusual Size

US intelligence and military commandos have carried out tens of thousands of raids in the decade since911 The amount of material seized from terrorist and insurgent targets has grown to a massive sizeThe Defense Intelligence Agency (DIA) operates exploitation triage centers and giant warehouses forstoring intelligence products -- in war zones rear headquarters in countries like Qatar and back in theUnited States One intelligence analyst said that walking into one of the warehouses for documents andmedia exploitation reminded him of the final scene in Raiders of the Lost Ark when the captured Ark of the Covenant is crated up and rolled into a cavernous storage area that contains all the governmentsother dangerous secrets

All told more than two million individual documents and electronic files have been cataloguedby media type hard copy phone number thumb drive Each is inspected by a linguist working with acommunications analyst or computer expert

The DIA analysts are joined by specialists from other agencies including the FBI and the DrugEnforcement Administration Yet given the overwhelming volume no more than about 10 percent of thecaptured intelligence has ever been analyzed

Intelligence officers say they simply are overwhelmed and untold quality leads may still beburied in the piles of computers digital files travel documents and pocket litter

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2542

6 The Digital Counterjihad Cyberspace is the terrorists ultimate safe haven Its where they recruit raise money and even plotattacks using coded language while playing online video war games The US government fights back

One technique is called false band replacement whereby the intelligence agencies infiltratemilitants networks and post their own material to counter extremist efforts on those same jihadistwebsites The trick is to forge the onscreen trademarks -- web watermarks -- of al Qaeda media sites

This makes messages posted on these sites official and sows dissent and confusion among themilitants

This Internet spoofing can be used in support of more traditional combat missions There is atleast one case confirmed by American officials in which a jihadist website was hacked by Americancyberwarriors to lure a high-value al Qaeda to a surreptitious meeting with extremist counterparts -- onlyto find a US military team in waiting

Getty images

7 First Kill the MullahsUS counterterrorism officials have learned fighting terrorists effectively means targeting specific nodesof that network that support and enable militants who strap on suicide vests This strategy focuses onneutralizing enablers such as the financiers gun-runners and logisticians Among these terror linchpins

are religious leaders who bless attacksHeavenly reward will not await a suicide bomber unless his death and those of his victims is

deemed halal in keeping with Islams sacred sharia law Each militant network has a sharia emir usuallyat the level of a sheikh or mullah In Iraq American commanders specifically killed emirs to throw awrench in a suicide bombing networks

Take him out and suicide bombings from that network are frozen until he is replaced said onemilitary officer with command experience in Iraq hellip[Complete article is available herehttpwwwforeignpolicycomarticles201109067_things_you_didn_t_know_about_the_war_on_terror]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2642

Dick Marty Rendition Report Condemns lsquoCult of Secrecyrsquo

BBC News | 8 September 2011

A report for Europes human rights watchdog has called for greater scrutiny of secret services andsupport for whistleblowers The Council of Europe investigated how countries like Britain GermanyRomania and Lithuania assisted the US with the rendition of terror suspects It said a cult of secrecyhad helped Western governments cover up abuses Defending whistleblowers it singled out USsoldier Bradley Manning accused of passing secrets to Wikileaks He had acted as a whistleblowerand should be treated as such CoE rapporteur Dick Marty wrote in the report which was due to besubmitted to the CoEs Parliamentary Assembly The soldier is currently in a US military prisonawaiting trial for passing restricted material to the controversial website

But the report praised Mr Manning and Wikileaks itself for uncovering evidence of renditionThe CoE represents 47 member-states including both EU countries and Russia and other ex-Sovietstates Mr Martys report focused on the record of Western states explaining that it was based oninvestigations into European links to the controversial US policy of rendition for terrorism suspectsThe CIA allegedly flew terror suspects around the world for interrogation in the years after 911 holdingthem in secret prisons in Europe and elsewhere

No licence to kill

In his 48-page report - entitled Abuse of State Secrecy and National Security - Mr Marty looked at thelevel of control exercised by European states over their security services He urged all states to useindependent parliamentary committees to oversee the work of their secret services saying this was of vital importance for the rule of law and democracy Mr Marty argued that Western governments wereusing the notion of state secrecy to shield their intelligence services from accountability for seriousviolations committed during anti-terrorist operations We consider that this is simply unacceptablehe wrote

A licence to kill (or to abduct and torture) only exists in certain films and in dictatorialregimes In democratic systems parliaments as representatives of the people have a right and duty toknow what the government is doing in the name of the people Mr Marty praised investigative journalists and non-governmental organisations for their work in exposing abuses of authority Stressing

the fundamental role whistleblowers had to play in an open society he warned against a real cult of secrecy as an instrument of power

While it was up to the courts to decide if Bradley Manning had committed any crime he wrotethe CoE was indebted to him for the publication of a recording of a helicopter attack in Iraq in whichthe crew seems to have intentionally targeted and killed civilians

Thanks to Mr Manning he said a large number of embassy reports had allowed us to learnsignificant details of important recent events which are obviously of general interest We therefore join Amnesty International in expressing our worries as to the treatment he receives Mr Marty wrote inthe draft report[Article continues here httpwwwbbccouknewsworld-europe-14820145]Comment This report demonstrates that Dick Marty is not as De Gaulle would say a serious man To

suggest that Bradley Manning is a hero and intelligence agencies bent on defeating terrorists arecriminals should say it all Manning knowingly violated his oath and willfully provided enormousamounts of classified material to WikiLeaks For Marty this is a good thing in the name of transparencyMarty always injudicious and anti-American in his remarks is now moving at warp speed into crackpotterritory

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2742

Al Qarsquoida amp its Affiliates| back to top |

Al Qaeda Is Down Not Out

Los Angeles Times | By Amy Zegart 7 September 2011

US talk of defeating terrorism is dangerously prematureTalk of strategically defeating Al Qaeda is all the rage in the White House these days Defense

Secretary Leon Panetta used the D-word in July President Obama declared in his new counter-terrorism strategy We can say with growing confidence that we have put Al Qaeda on the path todefeat Compared to the woeful state of the economy terrorism has become the administrations feel-good story of the year

Defeat is a big word It is also dangerously misleading Yes the United States has made greatstrides in the last decade to harden targets improve intelligence and degrade the capabilities of violentIslamist extremists Osama bin Ladens death was a major accomplishment But the fight is nowhereclose to being won and Americas most perilous times may lie ahead Three reasons explain why

The first is that strategically defeating Al Qaeda is not nearly as important as it sounds After911 Al Qaeda morphed into a more complicated decentralized and elusive threat consisting of threeelements core Al Qaeda affiliates or franchise groups operating in places like Yemen and Somalia with

loose ties to the core group and homegrown terrorists inspired by violent extremism often through theInternet in the comfort of their own living rooms

Core Al Qaedas capabilities started degrading in 2001 when the US invaded Afghanistandismantled training camps ousted the Taliban and sent Bin Laden running The CIA has estimated thecore group remaining in the AfghanistanPakistan region to number 50 to 100 fighters The last time BinLaden oversaw a successful operation was 2005 when Al Qaeda struck the London transit system

But plots by homegrowns and franchise groups have risen dramatically in recent years The 2009Ft Hood shooting the worst terrorist attack on US soil since 911 was the work of a homegrownterrorist The mastermind of the 2010 Times Square car bomb plot was a naturalized American citizentrained by the Pakistani Taliban not Al Qaeda Another franchise group Al Qaeda in the ArabianPeninsula was behind the foiled 2009 Christmas Day underwear bomber aviation plot and the 2010

plot to explode tampered printer cartridges aboard cargo planes The Bipartisan Policy Center reported11 violent Islamist extremist terrorist incidents against the US homeland in 2009 the most since 911Nearly all involved what former CIA Director Mike Hayden calls a witches brew of radicalizedAmericans and franchise groups

The second reason why talk of defeat is premature has to do with weapons Terrorism againstAmericans is nothing new The potential for terrorist groups to acquire weapons of mass destruction isIn 1995 a Japanese cult released sarin nerve gas in the Tokyo subway killing 12 people and injuringthousands It was the first WMD terrorist attack in modern history and it sparked a wave of presidentialterrorism commissions years before Bin Laden became a household name

It is this specter of the lone fanatic or small group armed with the worlds most devastatingweapons that keeps experts up at night In 2005 60 leading nuclear scientists and terrorism experts were

asked how many believed the odds of a nuclear attack on the US were negligible Only three or fourhands went up most were far more pessimistic Today there is enough nuclear material to build120000 weapons As long as fissile material is poorly stored and rogue states like Iran and North Koreacontinue their illicit weapons programs nuclear terrorism remains a haunting possibility

The third reason is that the FBI has not yet become a first-rate domestic intelligence agencyAnalysts whose work is vital to success are still second-class citizens labeled support staff alongsidesecretaries and janitors and passed over for key jobs including running the bureaus intelligence unitsThe FBIs information technology is so antiquated it belongs in a museum And the old crime-fighting

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2842

culture still lives There is now a move afoot to shrink new classified facilities so that agents dont haveto waste time away from their cases to read intelligence documents thereStrategically defeating Al Qaeda sounds too good to be true Because it is Amy Zegart is a senior fellow at Stanfords Hoover Institution and the author of Eyes on Spies

Congress and the United States Intelligence Community

US Counterterror Chief Al-Qaida On Steady Slide

Bostoncom | 31 August 2011

White House counterterrorism chief John Brennan said al-Qaida is on a steady slide after the death of al-Qaidas latest second-in-command in Pakistan Brennan told The Associated Press on Wednesdaythat its a huge blow in the first official White House comment since Atiyah Abd al-Rahmans reportedkilling by CIA drone strike in Pakistans tribal areas last week

Al-Qaida is sort of on the ropes and taking a lot of shots to the body and the head Brennansaid This is a time not to step back and let them recover a message he says hes sending to hiscounterparts in Pakistan[Article continues herehttpwwwbostoncomnewsnationwashingtonarticles20110831us_counterterror_chief_al_qaida_on_steady_slide ]

Al-Qaeda (AKA Al-Qaida Al-Qarsquoida)

Council on Foreign Relations | 29 August 2011

ldquoAl-Qaeda an international terrorist network is considered the top terrorist threat to the United StatesThe group is wanted for its September 11 2001 attacks on the World Trade Center and the Pentagon aswell as a host of lesser attacks To escape the post-911 US-led war in Afghanistan al-Qaedas centralleadership fled eastward into Pakistan securing a safe haven in loosely governed areas there In July2007 US intelligence agencies found that the organization was regrouping and regaining strength inthese tribal areas along the border with Afghanistan though targeted killings of senior al-Qaeda leadershave since diminished the groups command and control capabilities In February 2009 Director of National Intelligence Dennis C Blair told lawmakers that the groups core is less capable and effective

than it was a year ago The killing of al-Qaedas top leader Osama bin Laden by US forces in Pakistanin May 2011 served a significant blow to the organization but analysts say al-Qaeda remains deadlywith its networks spread all over the world Plus a number of affiliated groups have gained prominencein recent years complicating the task of containing the organizationrdquo

[Article continues here httpwwwcfrorgterrorist-organizationsal-qaeda-k-al-qaida-al-qaidap9126]

Al Qaeda In The Islamic Maghreb

CSIS | 1 September 2011

ldquoAl Qaeda in the Islamic Maghreb (AQIM) emerged from a decades-long militant Islamist tradition inAlgeria In 1998 the Salafist Group for Preaching and Combat (Groupe Salafiste pour la Preacutedication etle Combat or GSPC) broke away from the Armed Islamic Group (GIA) because of the GIArsquos extensive

targeting of civilians Gradually the GSPC evolved to encompass global jihadist ideology in addition toits historical focus on overturning the Algerian state In 2006 the GSPC officially affiliated with alQaeda core soon rebranding itself as al Qaeda in the Islamic Maghreb In the following years AQIMwas able to conduct a small number of large-scale attacks most notably its 2007 bombing of the UNheadquarters in Algiers In recent years counterterrorism pressure and weak governance have combinedto shift the center of AQIMrsquos presence to the Sahara-Sahel region AQIM continues to make its presenceknown through smuggling operations kidnappings and clashes with security forces in the desert In thecoming years general instability within the region could allow AQIM to further expand its influencerdquo[Complete article is available here httpcsisorgfilespublication110901_Thornberry_AQIM_WEBpdf ]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2942

AQ Strategy

The Assynt Report | 11 August 2011

Executive Summary Al-Qaedarsquos broad objectives remain unchanged in the wake of bin Ladenrsquos death There

are nonetheless growing questions over al-Qaedarsquos capability Longstanding paranoiaover the use of electronic communications is heightened by the ongoing US dronecampaign whilst attacks against the West have generally been disrupted at an early stage

The Pakistani Talibanrsquos attack on a Karachi naval base in May 2011 was a significantmilitary success and the first major act of revenge for bin Ladenrsquos killing Furtherattempts to avenge his loss are certain

All parts of al-Qaeda are working within a cohesive framework with the ultimate aim of restoring the Islamic Caliphate (Khilafa) The strategic plan to support this aim wasdrafted by 40 of al-Qaedarsquos brightest thinkers in Kandahar Afghanistan in November1999 This plan consists of four phases each seven years long leading to the dissolutionof corrupt regimes and the union of all newly-liberated states within the Khilafa

Apart from mounting strategic operations al-Qaedarsquos role is to be the inspiration for atruly global jihadist movement It seeks to achieve this through provision of trainingbeing a role model for others to follow extending acceptance and adoption of its tactics

particularly suicide bombings and professionalising jihadist media to build a commonbrand and message between hitherto separate groups

Between the late 1990s and 2003 the organisation was primarily devoted to classicinternational terrorism Most effort is now spent fighting insurgencies from North Africato South Asia The way in which this strategy helps to spread the struggle has been seenin North-West Africa where the initial development of al-Qaeda in the Islamic Maghrebwas in part fed by men returning from fighting with al-Qaeda in Iraq

Since mid-2009 al-Qaeda and its affiliates have increasingly encouraged jihadist-sympathisers resident in Western countries to engage in violence themselves withoutcentral direction or training making surveillance more difficult

One of the keys to awakening the spirit of jihad was the success in portraying the US and

its allies as Crusaders in the Muslim world Al-Qaedarsquos strategy essentially requires thatthis process be kept running until the forces of jihad have grown large enough to launchsuccessful liberation operations

Despite its successes in Afghanistan al-Qaedarsquos credibility has suffered both from its failure to landanother strategic blow on the West on the scale of 911 and also excessive Muslim casualties in someoperations Similarly al-Qaeda in Iraq was set back by its excessive sectarian zeal and local resentmentat the foreign fighter presence In turn this affected the movementrsquos funding from the Gulf

Analysis Sub-Saharan African Leaders Media Focus On Threats Prior to 911

OSC Feature | Sub-Sahara Africa -- OSC Analysis 6 September 2011Statements by Sub-Saharan African leaders and African media reports on terrorism prior to the 10thanniversary of 911 focus on the growing threats from local extremists and Al-Qaida affiliatesparticularly in West Africa with little direct commentary on the anniversary or US counterterrorismpolicies This focus on domestic threats suggests that counterterrorism messages expressing solidaritywith African nations and acknowledging the evolving terrorist threat on the continent would have thegreatest resonance with African audiences

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3042

Leaders Stressing Determination To Counter Local Threats African leaders public statements reflect an ongoing concern about the threat of terrorism on thecontinent and a strong commitment to find ways to combat this threat

Nigerian President Goodluck Jonathan emphasized the governments commitment tovigorously combat terrorism following the 26 August bombing of the UN office inAbuja by Nigerian extremist group Boko Haram reported the Paris-based news agencyAFP President Jonathan is hosting Liberian President Ellen Johnson Sirleaf and otherforeign dignitaries for a three-day forum on terrorism and economic crimes the widelyread Lagos-based independent daily The Guardian reported on 4 September

Malian President Amadou Toumani Toure launched a Special Program for PeaceSecurity and Development on 9 August stating that development remained the mostviable solution to counter threats to the countrys stability reported Malis state-owneddaily LEssor[ 3] The program aimed to undermine support for Al-Qaida in the IslamicMaghreb (AQIM) according to Burkinabe web portal Lefasonet on 11 August

Somali Prime Minister Abdiweli Muhammad Gas stated on 23 August that theTransitional Federal Government planned to remove Al-Shabaab from the central andsouthern regions in Somalia with the goal of restoring peace within one year so the

country can hold national elections according to the Puntland-based Garowe Online

Experts Media Highlight New Capabilities Tactics

African experts and media outlets are warning about the evolving nature of terrorist organizations on thecontinent the terrorists pursuit of new targets and tactics and their potential for taking advantage of regional instability

Leading South African think tank the Institute for Security Studies stated on 29 Augustthat Boko Harams attack on the UN in Abuja completes Boko Harams metamorphosisinto an international terrorist group Since December 2010 Boko Haram had killed over600 people in over 70 attacks against Nigerian targets according to the think tank buthad not previously targeted Western or international interests

A 26 August article on the popular Malian web portal Maliweb voiced concern thatAQIM could benefit from Tuareg mercenaries many of whom were recently returningfrom fighting in Libya and could benefit from an increase in arms trafficking through theSahel during the Libyan conflict

Ugandas privately owned Daily Monitor reported on 19 August that AU forces inSomalia warned that Al-Shabaab planned to increase the number of kidnappings andbomb attacks as part of its new strategy to shift from controlling territory in Mogadishuto conducting more of an insurgent campaign

Concern Over Al-Qaida Presence Terrorist Collaboration

West African official statements and media reports reflect a growing concern over an increased Al-

Qaida presence in West Africa and collaboration with AQIM Al-Shabaab and Boko Haram

Nigerian security services reported that the suspected mastermind behind the 26 Augustbombing of the UN office in Abuja was a Boko Haram member with close links to Al-Qaida and Al-Shabaab according Nigerias privately owned Daily Sun

A 28 August report in the privately owned daily Nigerian Tribune claimed that the 26August bombing in Abuja was part of Al-Qaidas plans to mark the 10th anniversary of 911 and called Boko Haram Al-Qaidas ally in the region

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3142

An 8 August commentary in Burkina Fasos LObservateur Paalga said that reports of Boko Haram collaboration with Al-Shabaab and AQIM could indicate that Al-Qaida isextending its African tentacles Abdourahmane Dieng security division chief of theEconomic Community of West African States said the collaboration represented a veryserious threat according to Senegals progovernment Le Soleil on 5 August

Messages Likely To Resonate With African Audience

Sub-Saharan Africas increasing concern about the shifting nature and potential strengthening of theterrorist threat on the continent suggests that messages directly addressing the impact of terrorism onAfricans the increasingly complex nature of the threat and the need for multilateral cooperation againstterrorism are most likely to resonate with Africans

Messages expressing solidarity and sympathy for Africans affected by Boko Haram Al-Shabaab and AQIM would almost certainly resonate with a broad African audience

African political and military leaders would probably welcome acknowledgement of thecomplex and changing nature of terrorism on the continent and recognition of theirinitiatives and commitment to countering violent extremism

African leaders and medias concern about potential collaboration between Boko Haram

Al-Shabaab and AQIM suggest that they would be open to improving multilateral andcross-regional sharing of lessons learned and strategies to counter the intensification of terrorism within Africa

Aviation and Maritime Security| back to top |

Bomb Threats Force Jets To Land

Associated Press | 7 September 2011

Both landed safely one landed in Ankara Ataturk International Airport and the other at Kuala LumpurTwo flights operated by Pakistans state-owned airline received bombs threats on Wednesday

and both landed safely one in Turkey the other in Malaysia officials said No bombs were found The

first flight was headed for Manchester England when it was notified of the threat near the Bulgariancapital of Sofia The crew contacted the control tower in Istanbul to seek permission for the landingstate-run Anatolia news agency reported Authorities quickly evacuated all 378 passengers from theBoeing 777-300ER aircraft after it parked at a remote corner of the International Ataturk Airport andbomb squads began searching the plane with sniffer dogs Anatolia reported PIA spokesman MashoodTajwar confirmed the flight received a threat and landed All passengers were safe A police searchturned up no bomb officials said Later a second PIA flight from Islamabad to Kuala Lumpur alsoreceived a bomb threat It landed in Kuala Lumpur and all the passengers disembarked safely saidTajwar The UK-bound Pakistan International Airlines plane was forced to make an emergency landingat Ataturk Airport in Istanbul after receiving a bomb threat Malaysias airports authority said thepassengers were being screened and the plane was isolated in a parking area while being searched bypolice No bomb was found

It said the plane carried 164 passengers and 13 crew Azmi Murad senior general manager forthe authority said the Pakistani airline informed it that the warning came by email Mr Tajwar gave nodetails on the nature of the threat or how it was delivered Pakistan is home to al Qaedas top leadershipMilitants who trained there have been responsible for many of the attacks and failed plots in the USand Europe since Sept 11 2001 when planes hijacked by al Qaeda militants destroyed the World TradeCenter in New York and crashed into the Pentagon The bomb threats came four days before the 10thanniversary of 911 but there was no apparent link to Islamist militants who typically do not alertauthorities in advance The FBI and Homeland Security department issued warnings last weekend aboutal Qaeda threats to small airlines

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3242

Commentary amp Opinion| back to top |

From Terror Group Founder To Libyan Rebel Military Commander

ABCNews | 29August 2011

The same man who triumphantly led Libyan rebels into Gadhafis compound last week first came to theattention of the US intelligence community years ago - as a founder of a terror group

Abdelhakim Belhaj who was recently appointed to Tripolis rebel military council was one of the original founders of the Libyan Islamic Fighting Group an anti-Gadhafi group which was laterdesignated by the US State Department as a terrorist organization with links to al Qaeda according toUS government reports

We proudly announce the liberation of Libya and that Libya has become free and that the ruleof the tyrant and the era of oppression is behind us a victorious Belhaj told reporters after the stormingof Gadhafis Bab al-Aziziya compound last week Ousting Gadhafi had been the main objective of theLIFG since its inception in the early 1990s even if some of the fighters believed that meant puttingAmericans in the crossfire

The group carried out operations against the Libyan government including at least four suspectedassassination attempts against Gadhafi in the 1990s and was also believed to be connected to a series of suicide bombings in Casablanca Morocco in 2003 the US State Department reported As relationsbetween the US and Gadhafi improved in the mid-2000s some LIFG leaders cultivated relationshipswith top al Qaeda leaders including Osama bin Laden and were suspected of funneling fighters to Iraq tocarry out operations against US soldiers

When the LIFG was designated a terror organization in 2004 it was meant as a gesture of solidarity with the Libyan government according to a March 2011 congressional report

Contrary to several US government reports Libyan rebel ambassador to the US Ali Aujalitold ABC News that the LIFG was never connected to al Qaeda and did not carry out terrorist operations

They were only opposed to Gadhafi during his rule and paid the price for that by beingoppressed by the regime Aujali said

The CIA first publicly voiced its concerns about the connection between the LIFG and al Qaedain 2004 when then-director George Tenet testified before the Senate Select Committee on Intelligenceand listed the LIFG among groups that represented an immediate threat [that] has benefited from alQaeda links[Article continues here httpabcnewsgocomBlotterterror-group-founder-libyan-rebel-military-commanderstoryid=14405319]

Interview With Saudi Sheik Wajdi Al-Ghazawi

MemriTVcom

Sheik Wajdi al-Ghazawi owner of al-Fajr TV criticizes extremist atmosphere in Saudi Arabia and saysafter 911 They Handed Out Sweets on the Streets of Mecca

Following are excerpts from a statement by Saudi Sheik Wajdi Al-Ghazawi owner of Al-FajrTV which was posted on YouTube on August 4 2011

Wajdi Al-Ghazawi When Al-Qaeda and Osama Bin Laden were at the height of their mightthey were extremely popular in Saudi Arabia From mosque pulpits across Saudi Arabia preacherswould pray for their success Moreover from the pulpits of the most important mosques ndash the Al-HaramMosque in Mecca and the Nabawi Mosque in Al-Madina ndash direct prayers for the success of Al-Qaedawere made during the days of the bombing of Tora Bora Oh Allah help our brothers in AfghanistanThese supplications were made during evening prayers as well as Friday prayers The preachers wouldpray for them in violation of the ministrys instructions

When the twin towers in New York were attacked they handed out sweets on the streets of Mecca By Allah they did I witnessed this myself The young people bowed in prayer and hugged one

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3342

another out of joy People were in heaven because of these young men who destroyed America andbombed this idol Am I right or not Was it like that or not

Back then when the Taliban broke off a piece of the nose of the Buddha statue which was hewnin the mountain an entire sermon was dedicated to it in the mosque in Mecca and the preacher was laterreprimanded for this sermon The entire Saudi people supported and loved Al-Qaeda

This went on until our brothers in Al-Qaeda ndash and I dont know what was going through theirminds ndash began to carry out operations inside Saudi Arabia Thats when we all raised our hands andsaid Youve gone too far We wont support you in this

The atmosphere here in Saudi Arabia is one of extremism It is characterized by focusing onminor details Many things are forbidden Yes maybe they are indeed forbidden but by forcing peopleto avoid them and by acting as if these were major sins an atmosphere was created that gave rise toextremist youth who might act recklessly at the most trivial provocation

For instance we blew out of proportion the issue of music the issue of smoking or the issue of hanging pictures in public places True there are clear texts on these issues but the young peopleembraced these issues as if they were fighting usury fornication or alcohol No these are not among theseven major sins So our society has become extreme

This extremist atmosphere has given rise to people who accuse others of heresy and people whopurport to be waging Jihad It has created genes that gave rise to cells of Al-Qaeda and other terrorists

We must examine our breeding ground in which these young men were sownBy Allah what can possibly emerge from such an atmosphere Muftis who accuse others of

heresy sheiks who incite and young people who bomb Am I right or not[Complete clip is available here httpwwwmemritvorgclipen3099htm]

Legal Aspects amp Lawfare| back to top |

Revisiting A Stale Counterterrorism Law

Council on Foreign Relations | 1 September 2011

ldquoNearly a decade after 911 the United States still relies on the 2001 Authorization for the Use of Military Force (AUMF) for the killing and detention of those considered responsible for or associatedwith the terrorist attacks But CFR national security law expert John Bellinger says it is becomingincreasingly difficult for the Obama administration to justify some of its counterterrorism operationsunder this limited statutory authority It has been used in defense of actions including drone attacks onindividuals as well as the targeting of groups in Yemen and Somalia that may have only the mosttenuous affiliation or association to the 911 attack A revised AUMF should clarify those operations aswell as the issue of detention specifically which individuals can be detained for how long and subjectto what processes There also needs to be greater effort at the international level he adds to fill thegaps in the law that covers conflicts between states and non-state actorsrdquohelliprdquo[Complete article is available here httpwwwcfrorgcounterterrorismrevisiting-stale-

counterterrorism-lawp25742]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3442

Narco-Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector[Complete article is available here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Mexicos Cartels Move Into Extortion

At a construction site of an apartment building in the heart of the Mexican capital a company engineerruns through his weekly payroll sheet He has salaries written out for carpenters bricklayers andelectricians At the bottom of the sheet is a notation of $200 for ldquosecurity servicesrdquo next to a nicknameldquoEl Indiordquo mdash the Indian [Complete article is available here

httpwwwtucsonsentinelcomnationworldreport090611_mexico_cartels_bribesmexicos-cartels-move-into-extortion ]

Seven Die In Mexican Pacific Port City

Latin American Herald Tribune

Seven people died in separate shootings in Mazatlan a port city in the northwestern Mexican state of Sinaloa with some of the incidents drug-related a police spokesman told Efe [Complete article is available herehttpwwwlahtcomarticleaspCategoryId=14091ampArticleId=423061]

Tijuana Violence Slows As One Cartel Takes Control

BorderlandBeatcom

Mexicos famously seedy border city of Tijuana is enjoying a lull in drug murders as the countrys mostpowerful cartel gains the upper hand over its rivals [Complete article is available here httpwwwborderlandbeatcom201109tijuana-violence-slows-as-one-cartelhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3542

Network Notes| back to top |

Canadian data foreign threats Spying in the digital age (Suggested by a reader in Lithuania ndash thanks) Globe and Mail | By Colin Freeze 31 July 2010

A government spy agency thatrsquos prohibited from monitoring Canadian citizens is now usingldquoinformation about Canadiansrdquo to zero in on foreign threatsThe ambiguous statement found in a new government report detailing the activities of CommunicationsSecurity Establishment Canada could sanction a range of intelligence-gathering activities ndash includingthe controversial practice of mining ldquometadatardquo from digital communications

Metadata ndash often called data about data ndash are found in e-mails and their attachments and containdigital signatures that can reveal when where and by whom documents were created

The collection of metadata has caused controversy in other countries but never in Canada wherethe Communications Security Establishment Canada operates as an ultra-secretive agency About theonly thing that is known about the classified practices is that they were halted and resumed after someldquomajor changesrdquo including directives signed by Defence Minister Peter MacKay

ldquoI cannot comment on specific operational activitiesrdquo Adrian Simpson a CSEC spokesman toldThe Globe He stressed that reviews upheld that the activities in question were ldquocarried out inaccordance with the law ministerial requirements and CSECrsquos policies and proceduresrdquo

ldquoCSEC is prohibited from directing its activities at Canadians anyone in Canada or Canadiansanywhere in the worldrdquo he said

For decades signals-intelligence agencies in the West have been allowed to safeguard nationalsecurity by eavesdropping on foreignersrsquo conversations Spies can whatever phone lines and satellitesignals they can so long as they never listen in on fellow citizens

But in the digital age governments run increasingly sophisticated dragnets scooping up andscouring through millions of intercepted Internet conversations daily Such practices create legalambiguities

ldquoThe whole issue of what constitutes boundaries for signals-intelligence agencies in cyberspaceis a big debate right nowrdquo said Rafal Rohozinski a security expert affiliated with the University of Torontorsquos Munk School

A watchdog agency that reviews the CSECrsquos activities released an annual report to Parliament onJuly 20 ldquoWhen other means have been exhausted CSEC may use information about Canadians when it

has reasonable grounds to believe that using this information may assist in identifying and obtainingforeign intelligencerdquo it reads

Sometimes collecting metadata is relatively benign It can involve aggregating sets of data tospot trends much like the way meteorologists discern national forecasts from localized information

For example while CSEC canrsquot usually monitor the communications of specific Canadian terrorsuspects it can glean insights by zooming out for big-picture patterns One way to do that MrRohozinski said would be to look at data flows between Canadian cities and Yemen where an Internet-savvy al-Qaeda offshoot works to recruit Westerners

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3642

Metadata however can be more revealing Documents that circulate on the Internet travelaround like postmarked letters marked with return addresses ndash e-mails and attachments have embeddedcodes that speak to the who where and when behind their creation

The US National Security Agency found itself mired in controversy a few years go after itskirted domestic-spying bans by secretly upholding that this sort of American metadata was fair gamedistinct from communication contents

Therersquos little to suggest the CSEC would go that far The federal agencyrsquos activities are reviewedby a watchdog body now headed by a former Federal Court of Appeal judge Robert Deacutecary appointedlast year wrote in his annual report that he was satisfied the CSEC activities in question are lawful evenif his predecessors felt them borderline

ldquoThis was the first review of these activities since hellip their resumption under new policiesrdquo thewatchdogrsquos report says It concludes that the surveillance activities are ldquoin accordance with the lawrdquo andfollow ldquomajor changes to certain policies procedures and practicesrdquo

Much of the concern arises from the possibility that CSEC could hand over metadata intelligenceto domestic law-enforcement and security agencies

As it stands the RCMP and CSIS have to develop their domestic investigations before coming toCSEC ndash usually with warrants ndash if they want specific intelligence The rules guiding handovers are strictbecause even though all agencies run surveillance operations they do so under vastly different

mandates and legal standardsThe spy agency however stood by its practicesldquoCSEC is extremely diligent when it comes to the privacy of Canadiansrdquo Mr Simpson said

[complete article is available here httpwwwtheglobeandmailcomnewsnationalcanadian-data-foreign-threats-spying-in-the-digital-agearticle2113772 ]

Cyber Attacks Against NATO Then And Now

New Atlanticist | 6 September 2011

ldquoNow that NATOrsquos Operation UNIFIED PROTECTOR over Libya is winding down it is worth

noting how few cyber incidents were directed in protest against the Alliance Certainly there was a

cyber component to the liberation of Libya but it was more about content and Internet freedom (the

most newsworthy elements here were the role of social media and the Libyan government taking largeparts of the nation offline) But compared to past history NATO cyber defenders had a relatively easy

time

ldquoNATO has not however had an easy 2011 Although there were three significant incidents we

know about none seemed to have been in direct response to operations over Libyahelliprdquo

[Complete article is available here httpwwwacusorgnew_atlanticistcyber-attacks-against-nato-then-

and-now]

The Calm Before The Storm

Foreign Policy | By Joel Brenner 6 September 2011

Cyberwar is already happening -- and its about to get much much worse A veteran cyberwarriorexplains how America can prepare itself

Revelations of wholesale electronic fraud and massive data heists have become weekly evendaily affairs A multinational electronics corporation loses personal information on more than 100million customers Cyberthieves break into an international bank counterfeit credit balances and lootATMs in four countries grabbing $9 million in just a few hours International gangs spread maliciouscode that conscripts unwitting computers into zombie armies of hundreds of thousands of similarlyenslaved machines Criminals then rent these armies called botnets as easily as you can buy a time-sharing arrangement in a beach condo No wonder the vast majority of Internet traffic is spam

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3742

Yet the loss of personal information and related criminal fraud intolerable as they are are theleast threatening face of electronic insecurity The US militarys secret network is penetratedAmericans corporate pockets are being picked clean of the intellectual property that makes the UnitedStates tick And the electricity grid that keeps the lights on and makes everything move is dangerouslyinsecure

In one remote attack on the Pentagons information systems about 10 years ago the Chinesehauled away up to 20 terabytes of information If the information had been on paper theyd have neededa line of moving vans stretching from the Pentagon to freighters docked 50 miles away in Baltimoreharbor just to haul it away Had they done so the military district of Washington wouldve become anactive theater of operations for the first time since 1865 and the Navy wouldve blockaded theChesapeake Bay But the Chinese did it electronically so who noticed

Corporate espionage by both competitors and foreign intelligence services or their surrogates isalso increasing Intelligence officials see this but cant speak openly about the specifics and Im seeingit now in my law practice The victims rarely admit it for understandable reasons Oracle whichsuccessfully sued SAP for theft of its software code was a prominent exception Google was another

When the Chinese penetrated Google in late 2009 -- yes that operation was Chinese and yes itwas done with the blessing of a member of the Politburo -- they werent after customer informationThey were after the source code that makes Google unique Nor was Google the only victim Thousands

of US and Western firms were penetrated in that affair Foreign governments -- and not only theChinese -- understand that they cannot compete with the United States militarily and politically if theycannot compete with it economically so their intelligence services want to steal its corporate intellectualproperty This is the technology that gives America its competitive edge and often it has nothing to dowith defense Ordinary companies with valuable technology are now being targeted by nation-statesThis is a new era National security and economic security have converged

The danger is not limited to the loss of technology and information however The owners andoperators of the North American electricity grid are hooking up their control systems to the Internet asfast as they can Exposing the grid to the Internet makes it marginally more efficient but it also makes itdramatically more vulnerable to disruption If you can remotely penetrate an electronic system to stealinformation you can remotely penetrate it to shut it down or make it go haywire This is why there is no

longer a meaningful difference between information security and operational security And the biggestoperational risk is the grid In contemporary society nothing moves without electricity If the grid goesout the country stops

As the Stuxnet affair demonstrated remotely engineered disruption of industrial control systemsis now a reality That episode involved the successful electronic attack on the centrifuges in the Iraniannuclear program Only a first-class intelligence agency could have pulled that off but the blueprint fordoing it -- the code itself -- is now public Many American industrial control systems run on the samekind of equipment the Iranians were using but unlike the controls on the Iranian centrifuges thecontrols on the US grid are now being connected to the Internet making them easier to disrupt Stuxnetwas a watershed there will be copycats

Other industrial control systems will also be targets Some already are Air traffic control

railroad switches and water and sewage systems are all electronically controlled now and many arevulnerable If an intruder can break into the right server electronically he can remotely shut downproduction send your goods to the wrong destination and even unlock your doors -- and delete your logentries so he leaves no record of ever having been there

The United States does not lack enemies who would attack it this way Seized al Qaedacomputers contain details of US industrial control systems In 2003 a group affiliated with thePakistani terrorist organization Lashkar-e-Taiba -- the same gang that engineered the 2008 terroristassaults in Mumbai -- plotted to attack the Australian grid Other groups conspired to attack the Britishgrid in 2004 2006 and 2009 Yet the owners and operators of the North American grid continue willy-

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3842

nilly to expose their control systems to the Internet instead of isolating and hardening it This is folly of a high order

Important conclusions for public and corporate policy follow from this vulnerable state of

affairs First cyber insecurity has operational consequences In the current and foreseeable states of technology a high degree of assurance against electronic penetration of anything connected to theInternet is not achievable Large efficient electronically connected organizations and nations aretherefore vulnerable to remotely engineered disruption as well as information theft

Second this risk cannot be eliminated -- but it can be reduced and managed As a nation theUnited States should start by isolating the grids controls from the Internet Undoubtedly there aremarginal efficiencies to be gained by seamless connectivity over a publicly accessible infrastructure butthese gains are usually exaggerated and the risk this connectivity creates is staggering The governmentand the major telecommunications carriers must also make the investment required to re-create themassive redundancies that made the wired telephone network so robust Resilience and swift recoveryshould be the goal If the consequences of cyberattacks were reduced penetration would cease to matter

Third companies that wait for the government to solve their own security problems do so attheir peril The government is broke and the IT backbone is 85 percent private so the governmentdoesnt control it The governments role in altering the status quo will be limited to setting standardsusing its purchasing power to move vendors toward better security and getting its own house in order

The government can neither secure corporate intellectual property nor protect firms against operationaldisruption

Fourth in a world in which everything cannot be protected companies must determine forthemselves what intellectual property and physical assets to isolate and safeguard Those that approachthis task seriously will quickly learn that technology is only one aspect of their insecurity and in manycases the easiest to deal with Unless technology is integrated with personnel practices and operationalsecurity it opens vulnerabilities that its users rarely understand This kind of integration requires theautomated enforcement of reasonable security policies and systematic workforce training and thatoccurs only when management the lawyers and the technologists work closely together This is an old-fashioned management challenge -- not a technological one For their part corporate boards need to takeIT security seriously and launch audits that examine how their systems are actually implemented and

used not merely how they are designed Because as the techies like to put it the weakest link in anysystem is not the silicon-based unit on the desk its the carbon-based unit in the chair Joel Brenner is author of the forthcoming America the Vulnerable Inside the New Threat Matrix of

Digital Espionage Crime and Warfare He has served as the inspector general of the National Security

Agency the national counterintelligence executive and the NSAs senior counsel He now practices law

at Cooley LLP in Washington DC

Cyberattacks Decline Slightly Symantec Report Finds

Dark Reading | 1 September 2011

Organizations worldwide are suffering damages as a result of cyberattacks but interestingly there hasbeen a slight decline in these attacks during the past 12 months according to a new report from

Symantec More than 90 percent of the more than 3300 respondents across 36 countries said theyexperienced tangible losses as a result of a hack with 84 percent reporting financial loss to the cost of abreach Around one-fifth lost at least $195000 in breaches during the past 12 months

Meanwhile Symantec attributes the unexpected bright spot of a decline in breaches toorganizations employing better cybersecurity defenses More than 70 percent of organizations sawattacks in the past 12 months a decline of 5 percent from 2010 And those that experienced anincreasing frequency of attacks dropped from 29 percent in 2010 to 21 percent this year While 100percent last year reported losses from cyberattacks 92 percent did so in 2011 The trend seemscounterintuitive given the rash of high-profile breaches this year More

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 20: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2042

Jihadist Suggests Striking New York City Bridges

All SITE Intelligence Group | 6 September 2011

A jihadist pointed to what he found to be a weak point of suspension bridges and directed his messageto those who love blasting and explosions In a message posted on the Shumukh al-Islam forum onSeptember 6 2011 the jihadist Abu Suleiman al-Nasser gave a picture of the Verrazano Bridge inNew York on which he drew a red box and arrow on the bridges center He then gave a map on whichhe circled the various bridges in New York City and its boroughs A fellow jihadist offered his ownidea giving a picture of the Hoover Dam and explaining that there is no target more important thandams He wrote that striking a dam may lead to the submerging of cities and the killing of thousands of people and in the case of the Hoover Dam would impact Las Vegas the capital of gambling anddebauchery

Counterterror Veteran is New Deputy FBI Director

Atlanta Journal Constitution | 1September2011

A 24-year FBI veteran with extensive counterterrorism experience Sean Joyce has been named the lawenforcement agencys new deputy director Elevated to the No 2 post within the FBI by Director RobertMueller Joyce replaces Timothy Murphy who is retiring after 23 years with the bureau Since last yearJoyce has been executive assistant director of the national security branch responsible for the FBIs

national security and intelligence operations He earned the Attorney Generals Award for ExceptionalService in 2004 for work on a counterterrorism squad in Dallas In 2008 he was named chief of thecounterterrorism divisions international terrorism operations section with responsibility forinternational terrorism matters within the United States hellip[Complete article is available here httpwwwajccomnewsnation-worldcounterterror-veteran-is-new-1153018html]

Top CIA Official Obama Changed Virtually Nothing

Salon | 1 September2011

PBSs Frontline is airing an examination of Top Secret America on September 6 The show includes arare and lengthy interview with 34-year-CIA-veteran John Rizzo who is described as the most

influential lawyer in CIA historyHere is one quote they include from Rizzo With a notable exception of the lsquoenhanced

interrogationrsquo program the incoming Obama administration changed virtually nothing with respect toexisting CIA programs and operations Things continued Authorities were continued that wereoriginally granted by President Bush beginning shortly after 911 Those were all picked up reviewedand endorsed by the Obama administration hellip[Complete article is available herehttpwwwsaloncomnewspoliticsbarack_obamastory=opiniongreenwald20110901obama]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2142

General Counterterrorism News| back to top |

The Terrible Missed Chance

Newsweek | 4 September 2011

Special Agent Harry Samit of the FBIs Minneapolis field office knew he was looking into the eyes of aterrorist It was early afternoon on Friday Aug 17 2001 Across from him sat Zacarias Moussaoui a33-year-old French-born student arrested the day before for overstaying his visa Moussaoui had paidmore than $8000 in cash that summer to sit in a cockpit simulator in a flight school in the suburbs of Minneapolis and learn - in a matter of days - the basics of how to fly a 747-400 Samit a formerintelligence officer at the Navys celebrated Top Gun flight school felt sure the man across the desk from him was a Muslim extremist who was part of a plot to hijack a commercial jetliner filled withpassengers The trick Samit wrote in a soon-to-be-released excerpt of a book hes written about thecase was getting Moussaoui to admit this and reveal details and associates to allow us to stop the plot

Surely the bureau brass in Washington would share his concern Samit thought He was wrongThat same day halfway across the country in the fluorescent-lit hallways of the J Edgar Hoover

FBI headquarters building in Washington counterterrorism supervisors were treating Samits firstreports about Moussaoui with skepticism even contempt Michael Maltbie a DC counterterrorism

specialist insisted repeatedly in the days after the arrest that there was no clear link between Moussaouiand Al Qaeda - the link needed for a warrant Maltbie thought Moussaoui was a dirty bird he latertold investigators but favored deporting him to France

Believing a hijacking might be imminent Samit appealed to his boss in Minneapolis SpecialAgent Greg Jones Jones picked up the phone on Aug 27 and called Maltbie at FBI HQ

Moussaoui he said might be part of a plot to get control of an airplane and crash it into theWorld Trade Center or something like that

Maltbie scoffed You have a guy interested in this type of aircraft Maltbie replied accordingto FBI documents That is it (Maltbie declined requests for an interview)

At least Maltbie was paying attention Michael Rolince who ran the FBIs InternationalTerrorism Operations Section was arguably the bureaus most important go-between with the White

House on domestic terrorist threats in the summer of 2001 He tells Newsweek he spent less than 20seconds being briefed on the Moussaoui case that August His office was inundated with terrorismprobes he said since Moussaoui was in custody already he posed no immediate threat Did it rise tothe level of something that I would take upstairs Rolince asks The answer is no

At CIA headquarters alarm bells were ringing loudly CIA Director George Tenet was briefedon Moussaoui within days of the arrest receiving a paper with the eye-catching headline IslamicExtremist Learns to Fly But the FBIs acting director that summer and the bureaus most seniorcounterterrorism official were left in the dark[Article continues here httpwwwthedailybeastcomnewsweek20110904the-terrible-missed-chancehtml]

Pan Am Flight 103 - Lockerbie Bombing - al-Megrahi CIA FilesWebwire | 31 August2011

BACM ResearchPaperlessArchivescom has announced the publishing of CIA files related to the PanAm Flight 103 Lockerbie Bombing

The files can be downloaded at no cost at httpwwwpaperlessarchivescompanam103ciahtml The files date from 1984 to 1999 These are the most recent files on Pan Am 103 released by the

CIA This set of files is unique because it includes memos on the direct handling of an intelligencesource This type of information is exempt from the Freedom of Information Act (FOIA) and is not oftenreleased by the Agency

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2242

The files cover information received by the CIA on Abdel Basset al-Megrahi Al-Megrahi is theonly person ever convicted in the Pan AM 103 case The Scottish government in 2009 allowed al-Megrahi to be released from custody and returned to Libya because of his failing health With the recentfall of Muammar Qaddafis regime there have been renewed calls for al-Megrahi to be returned toScottish custody or extradited to the United States and put on trial[Complete article is available here httpwwwwebwirecomViewPressRelaspaId=144692]

Getting The Caucasus Emirate Right

CSIS | August 2011

ldquohellipThis report aims to set straight a rather distorted record It demonstrates the veracity of three vitallyimportant facts usually obfuscated in discussions of the subject (1) the longstanding and growing tiesbetween the CE and its predecessor organization the ChRI on the one hand and al Qaeda (AQ) and theglobal jihad on the other hand (2) the importance of the CE jihadi terrorist network as a united andorganized political and military force promoting jihad in the region and (3) the salience of local culturaland the Salifist jihadist theo-ideology and the influence of the global jihadi revolutionarymovementalliance as key if not the main factors drive the ldquoviolence in the North Caucasusrdquohelliprdquohttpcsisorgfilespublication110829_Hahn_GettingCaucasusEmirateRt_Webpdf

7 Things You Didnrsquot Know About the War on TerrorForeign Policy | By Eric Schmitt and Thomas Shanker 6 September 2011

From an attempt to negotiate with Osama bin Laden to a proposal to threaten to bomb Mecca its been awild decade for the US national security establishment

Our new book Counterstrike The Untold Story of Americas Secret Campaign Against Al Qaeda is in many ways asummary of the past decade of our reporting on the military intelligence community and domestic law enforcement as itentered a new era of Darwinian evolution to counter violent extremism

It also is our deep dive into a decade of American counterterrorism efforts -- from the work of commando trigger-pullers and spies on the ground up to senior political leaders who wanted to defendthe nation (and get re-elected) Our efforts to report and write this book allowed us to uncover many newmissions never discussed before -- and gave us an understanding of how the war on terror had changedover the last decade

Our book assesses the 10 years since 911 as the military divides the fight into tactical missionson the battlefields of modern terrorism then the operational advancements that provided the means tosuccess while not securing final victory and at the top the strategic level of policy debates about howthe nation should combat this threat to its security

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2342

Here are seven vignettes from Counterstrike that offer glimpses into the thinking of policymakers andcommanders in early days after the Sept 11 attacks and how that thinking evolved over the followingdecade into a more whole-of-government approach to combating terrorists

1 Bush Tried to Negotiate with al Qaeda

The George W Bush administration like all of its predecessors swore never to negotiate with terroristsBut it did undertake an extraordinary and extraordinarily secret outreach effort to open a line of communication with Osama bin Laden and al Qaedas senior leadership It was an attempt to replicatehow the United States tried to sustain a dialogue with the Soviet Union even during the darkest days of the Cold War when White House and Kremlin leaders described in private and in public a set of acceptable behaviors -- and described with equal clarity the swift vicious even nuclear punishment forgross violations

In the months after the Sept 11 attacks Bushs national security staff working through theintelligence agencies made several attempts to get a private message to bin Laden and his inner circleThe messages were sent through business associates of the bin Laden familys vast financial empire aswell as through some of the al Qaeda leaders closest relatives a number of whom were receptive toopening a secret dialogue to restrain and contain their terrorist kinsman whom they viewed as a blot on

their name (To be sure other relatives were openly hostile to the American entreaties)According to a senior American intelligence officer with first-hand knowledge of the effort the

response from Osama bin Laden was silence And the effort was suspended

2 Sometimes a Wedding Is Just a WeddingIn the early days after the Sept 11 attacks the CIA and FBI vied to produce the most compellingintelligence reports that tracked suspected terrorist plots The agencies often worked at cross purposessometimes unwittingly At one point in early 2002 both agencies were tracking what American analystssaid were growing preparations for a major wedding somewhere in the Midwest (In terroristvernacular the word wedding is often code for a major attack)

Dribs and drabs on this wedding planning made their way to President Bush from bothagencies independent of each other of course

Finally over the Easter holiday during a video-teleconference with top aides in Washingtonfrom his ranch in Crawford Texas Bush stopped the briefing exasperated by the discrepancies in therival agencies reporting about the suspected threat

George Bob get together and sort this out Bush told his CIA director George J Tenet andFBI director Robert S Mueller III

Bushs instincts were correct When the analysts finally untangled their clues it turned out thatthe ominous wedding really was just that the matrimony of a young man and a young woman fromtwo prominent Pakistani-American families There was no threat There was no plot

3 The Threat to Bomb MeccaAs fears of a second attack mounted following the 911 strikes US government planners franticallycast about for strategies to protect the country Even the most far-fetched ideas had a hearing howeverbriefly In one case some government planners proposed that if al Qaeda appeared ready to attack America again the United States should publicly threaten to bomb the city of Mecca in Saudi Arabiathe holiest site in all of Islam in retaliation Just nuts one Pentagon aide wrote to himself when heheard the proposal The idea was quickly and permanently shelved

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2442

4 The SEAL Raid in Iran That Didnt HappenWhen US forces routed the Taliban government in Afghanistan and forced bin Laden and his toplieutenants to flee many senior al Qaeda leaders including bin Laden and his deputy Ayman al-Zawahri escaped to neighboring Pakistan But a separate group including the al Qaeda leaders sonSaad bin Laden fled to northern Iran where American troops would not pursue them and the Iranianswould likely not detain them But the Shiite clerics running Iran placed the al Qaeda operatives and theirfamily members under virtual house arrest and they became a shield against possible attacks from theSunni-based terrorist organization

One plan in particular illustrated the bold thinking and wildly unrealistic aims of the militarysinitial approach after 911 to kill or capture terrorist leaders The plan called for hunting the eight to 10senior al Qaeda leaders and operatives who had sought refuge in Chalus an Iranian resort town on theCaspian Sea where they had been detained

At the Joint Special Operations Command at Fort Bragg NC military planners drew up optionsfor Navy SEALs to sneak ashore at night using state-of-the-art mini-submarines Once they landed theSEALs would slip past Iranian guards to snatch the al Qaeda leaders Another option called for SpecialOperations helicopters to spirit American commandos into the town and whisk them out again with theirquarry The Americans went as far as conducting two or three rehearsals at an undisclosed locationalong the US Gulf Coast in early 2002 They conducted small-boat insertion exercises involving about

30 Special Operations personnel most SEALs and eventually concluded the mission was feasible if they were provided with more detailed intelligence on the locations of the al Qaeda members and thesecurity around them

The logistics of the mission were daunting Chalus sits at the edge of the Elburz coastal mountainrange about 70 miles north of Tehran and the failed rescue of the American hostages in Iran in April1980 loomed large in commanders memories Eventually Gen Richard B Myers the chairman of theJoint Chiefs of Staff rejected the mission as too risky and too politically volatile Many of the al Qaedaoperatives are reportedly still there

5 Intelligence Hauls of Unusual Size

US intelligence and military commandos have carried out tens of thousands of raids in the decade since911 The amount of material seized from terrorist and insurgent targets has grown to a massive sizeThe Defense Intelligence Agency (DIA) operates exploitation triage centers and giant warehouses forstoring intelligence products -- in war zones rear headquarters in countries like Qatar and back in theUnited States One intelligence analyst said that walking into one of the warehouses for documents andmedia exploitation reminded him of the final scene in Raiders of the Lost Ark when the captured Ark of the Covenant is crated up and rolled into a cavernous storage area that contains all the governmentsother dangerous secrets

All told more than two million individual documents and electronic files have been cataloguedby media type hard copy phone number thumb drive Each is inspected by a linguist working with acommunications analyst or computer expert

The DIA analysts are joined by specialists from other agencies including the FBI and the DrugEnforcement Administration Yet given the overwhelming volume no more than about 10 percent of thecaptured intelligence has ever been analyzed

Intelligence officers say they simply are overwhelmed and untold quality leads may still beburied in the piles of computers digital files travel documents and pocket litter

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2542

6 The Digital Counterjihad Cyberspace is the terrorists ultimate safe haven Its where they recruit raise money and even plotattacks using coded language while playing online video war games The US government fights back

One technique is called false band replacement whereby the intelligence agencies infiltratemilitants networks and post their own material to counter extremist efforts on those same jihadistwebsites The trick is to forge the onscreen trademarks -- web watermarks -- of al Qaeda media sites

This makes messages posted on these sites official and sows dissent and confusion among themilitants

This Internet spoofing can be used in support of more traditional combat missions There is atleast one case confirmed by American officials in which a jihadist website was hacked by Americancyberwarriors to lure a high-value al Qaeda to a surreptitious meeting with extremist counterparts -- onlyto find a US military team in waiting

Getty images

7 First Kill the MullahsUS counterterrorism officials have learned fighting terrorists effectively means targeting specific nodesof that network that support and enable militants who strap on suicide vests This strategy focuses onneutralizing enablers such as the financiers gun-runners and logisticians Among these terror linchpins

are religious leaders who bless attacksHeavenly reward will not await a suicide bomber unless his death and those of his victims is

deemed halal in keeping with Islams sacred sharia law Each militant network has a sharia emir usuallyat the level of a sheikh or mullah In Iraq American commanders specifically killed emirs to throw awrench in a suicide bombing networks

Take him out and suicide bombings from that network are frozen until he is replaced said onemilitary officer with command experience in Iraq hellip[Complete article is available herehttpwwwforeignpolicycomarticles201109067_things_you_didn_t_know_about_the_war_on_terror]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2642

Dick Marty Rendition Report Condemns lsquoCult of Secrecyrsquo

BBC News | 8 September 2011

A report for Europes human rights watchdog has called for greater scrutiny of secret services andsupport for whistleblowers The Council of Europe investigated how countries like Britain GermanyRomania and Lithuania assisted the US with the rendition of terror suspects It said a cult of secrecyhad helped Western governments cover up abuses Defending whistleblowers it singled out USsoldier Bradley Manning accused of passing secrets to Wikileaks He had acted as a whistleblowerand should be treated as such CoE rapporteur Dick Marty wrote in the report which was due to besubmitted to the CoEs Parliamentary Assembly The soldier is currently in a US military prisonawaiting trial for passing restricted material to the controversial website

But the report praised Mr Manning and Wikileaks itself for uncovering evidence of renditionThe CoE represents 47 member-states including both EU countries and Russia and other ex-Sovietstates Mr Martys report focused on the record of Western states explaining that it was based oninvestigations into European links to the controversial US policy of rendition for terrorism suspectsThe CIA allegedly flew terror suspects around the world for interrogation in the years after 911 holdingthem in secret prisons in Europe and elsewhere

No licence to kill

In his 48-page report - entitled Abuse of State Secrecy and National Security - Mr Marty looked at thelevel of control exercised by European states over their security services He urged all states to useindependent parliamentary committees to oversee the work of their secret services saying this was of vital importance for the rule of law and democracy Mr Marty argued that Western governments wereusing the notion of state secrecy to shield their intelligence services from accountability for seriousviolations committed during anti-terrorist operations We consider that this is simply unacceptablehe wrote

A licence to kill (or to abduct and torture) only exists in certain films and in dictatorialregimes In democratic systems parliaments as representatives of the people have a right and duty toknow what the government is doing in the name of the people Mr Marty praised investigative journalists and non-governmental organisations for their work in exposing abuses of authority Stressing

the fundamental role whistleblowers had to play in an open society he warned against a real cult of secrecy as an instrument of power

While it was up to the courts to decide if Bradley Manning had committed any crime he wrotethe CoE was indebted to him for the publication of a recording of a helicopter attack in Iraq in whichthe crew seems to have intentionally targeted and killed civilians

Thanks to Mr Manning he said a large number of embassy reports had allowed us to learnsignificant details of important recent events which are obviously of general interest We therefore join Amnesty International in expressing our worries as to the treatment he receives Mr Marty wrote inthe draft report[Article continues here httpwwwbbccouknewsworld-europe-14820145]Comment This report demonstrates that Dick Marty is not as De Gaulle would say a serious man To

suggest that Bradley Manning is a hero and intelligence agencies bent on defeating terrorists arecriminals should say it all Manning knowingly violated his oath and willfully provided enormousamounts of classified material to WikiLeaks For Marty this is a good thing in the name of transparencyMarty always injudicious and anti-American in his remarks is now moving at warp speed into crackpotterritory

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2742

Al Qarsquoida amp its Affiliates| back to top |

Al Qaeda Is Down Not Out

Los Angeles Times | By Amy Zegart 7 September 2011

US talk of defeating terrorism is dangerously prematureTalk of strategically defeating Al Qaeda is all the rage in the White House these days Defense

Secretary Leon Panetta used the D-word in July President Obama declared in his new counter-terrorism strategy We can say with growing confidence that we have put Al Qaeda on the path todefeat Compared to the woeful state of the economy terrorism has become the administrations feel-good story of the year

Defeat is a big word It is also dangerously misleading Yes the United States has made greatstrides in the last decade to harden targets improve intelligence and degrade the capabilities of violentIslamist extremists Osama bin Ladens death was a major accomplishment But the fight is nowhereclose to being won and Americas most perilous times may lie ahead Three reasons explain why

The first is that strategically defeating Al Qaeda is not nearly as important as it sounds After911 Al Qaeda morphed into a more complicated decentralized and elusive threat consisting of threeelements core Al Qaeda affiliates or franchise groups operating in places like Yemen and Somalia with

loose ties to the core group and homegrown terrorists inspired by violent extremism often through theInternet in the comfort of their own living rooms

Core Al Qaedas capabilities started degrading in 2001 when the US invaded Afghanistandismantled training camps ousted the Taliban and sent Bin Laden running The CIA has estimated thecore group remaining in the AfghanistanPakistan region to number 50 to 100 fighters The last time BinLaden oversaw a successful operation was 2005 when Al Qaeda struck the London transit system

But plots by homegrowns and franchise groups have risen dramatically in recent years The 2009Ft Hood shooting the worst terrorist attack on US soil since 911 was the work of a homegrownterrorist The mastermind of the 2010 Times Square car bomb plot was a naturalized American citizentrained by the Pakistani Taliban not Al Qaeda Another franchise group Al Qaeda in the ArabianPeninsula was behind the foiled 2009 Christmas Day underwear bomber aviation plot and the 2010

plot to explode tampered printer cartridges aboard cargo planes The Bipartisan Policy Center reported11 violent Islamist extremist terrorist incidents against the US homeland in 2009 the most since 911Nearly all involved what former CIA Director Mike Hayden calls a witches brew of radicalizedAmericans and franchise groups

The second reason why talk of defeat is premature has to do with weapons Terrorism againstAmericans is nothing new The potential for terrorist groups to acquire weapons of mass destruction isIn 1995 a Japanese cult released sarin nerve gas in the Tokyo subway killing 12 people and injuringthousands It was the first WMD terrorist attack in modern history and it sparked a wave of presidentialterrorism commissions years before Bin Laden became a household name

It is this specter of the lone fanatic or small group armed with the worlds most devastatingweapons that keeps experts up at night In 2005 60 leading nuclear scientists and terrorism experts were

asked how many believed the odds of a nuclear attack on the US were negligible Only three or fourhands went up most were far more pessimistic Today there is enough nuclear material to build120000 weapons As long as fissile material is poorly stored and rogue states like Iran and North Koreacontinue their illicit weapons programs nuclear terrorism remains a haunting possibility

The third reason is that the FBI has not yet become a first-rate domestic intelligence agencyAnalysts whose work is vital to success are still second-class citizens labeled support staff alongsidesecretaries and janitors and passed over for key jobs including running the bureaus intelligence unitsThe FBIs information technology is so antiquated it belongs in a museum And the old crime-fighting

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2842

culture still lives There is now a move afoot to shrink new classified facilities so that agents dont haveto waste time away from their cases to read intelligence documents thereStrategically defeating Al Qaeda sounds too good to be true Because it is Amy Zegart is a senior fellow at Stanfords Hoover Institution and the author of Eyes on Spies

Congress and the United States Intelligence Community

US Counterterror Chief Al-Qaida On Steady Slide

Bostoncom | 31 August 2011

White House counterterrorism chief John Brennan said al-Qaida is on a steady slide after the death of al-Qaidas latest second-in-command in Pakistan Brennan told The Associated Press on Wednesdaythat its a huge blow in the first official White House comment since Atiyah Abd al-Rahmans reportedkilling by CIA drone strike in Pakistans tribal areas last week

Al-Qaida is sort of on the ropes and taking a lot of shots to the body and the head Brennansaid This is a time not to step back and let them recover a message he says hes sending to hiscounterparts in Pakistan[Article continues herehttpwwwbostoncomnewsnationwashingtonarticles20110831us_counterterror_chief_al_qaida_on_steady_slide ]

Al-Qaeda (AKA Al-Qaida Al-Qarsquoida)

Council on Foreign Relations | 29 August 2011

ldquoAl-Qaeda an international terrorist network is considered the top terrorist threat to the United StatesThe group is wanted for its September 11 2001 attacks on the World Trade Center and the Pentagon aswell as a host of lesser attacks To escape the post-911 US-led war in Afghanistan al-Qaedas centralleadership fled eastward into Pakistan securing a safe haven in loosely governed areas there In July2007 US intelligence agencies found that the organization was regrouping and regaining strength inthese tribal areas along the border with Afghanistan though targeted killings of senior al-Qaeda leadershave since diminished the groups command and control capabilities In February 2009 Director of National Intelligence Dennis C Blair told lawmakers that the groups core is less capable and effective

than it was a year ago The killing of al-Qaedas top leader Osama bin Laden by US forces in Pakistanin May 2011 served a significant blow to the organization but analysts say al-Qaeda remains deadlywith its networks spread all over the world Plus a number of affiliated groups have gained prominencein recent years complicating the task of containing the organizationrdquo

[Article continues here httpwwwcfrorgterrorist-organizationsal-qaeda-k-al-qaida-al-qaidap9126]

Al Qaeda In The Islamic Maghreb

CSIS | 1 September 2011

ldquoAl Qaeda in the Islamic Maghreb (AQIM) emerged from a decades-long militant Islamist tradition inAlgeria In 1998 the Salafist Group for Preaching and Combat (Groupe Salafiste pour la Preacutedication etle Combat or GSPC) broke away from the Armed Islamic Group (GIA) because of the GIArsquos extensive

targeting of civilians Gradually the GSPC evolved to encompass global jihadist ideology in addition toits historical focus on overturning the Algerian state In 2006 the GSPC officially affiliated with alQaeda core soon rebranding itself as al Qaeda in the Islamic Maghreb In the following years AQIMwas able to conduct a small number of large-scale attacks most notably its 2007 bombing of the UNheadquarters in Algiers In recent years counterterrorism pressure and weak governance have combinedto shift the center of AQIMrsquos presence to the Sahara-Sahel region AQIM continues to make its presenceknown through smuggling operations kidnappings and clashes with security forces in the desert In thecoming years general instability within the region could allow AQIM to further expand its influencerdquo[Complete article is available here httpcsisorgfilespublication110901_Thornberry_AQIM_WEBpdf ]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2942

AQ Strategy

The Assynt Report | 11 August 2011

Executive Summary Al-Qaedarsquos broad objectives remain unchanged in the wake of bin Ladenrsquos death There

are nonetheless growing questions over al-Qaedarsquos capability Longstanding paranoiaover the use of electronic communications is heightened by the ongoing US dronecampaign whilst attacks against the West have generally been disrupted at an early stage

The Pakistani Talibanrsquos attack on a Karachi naval base in May 2011 was a significantmilitary success and the first major act of revenge for bin Ladenrsquos killing Furtherattempts to avenge his loss are certain

All parts of al-Qaeda are working within a cohesive framework with the ultimate aim of restoring the Islamic Caliphate (Khilafa) The strategic plan to support this aim wasdrafted by 40 of al-Qaedarsquos brightest thinkers in Kandahar Afghanistan in November1999 This plan consists of four phases each seven years long leading to the dissolutionof corrupt regimes and the union of all newly-liberated states within the Khilafa

Apart from mounting strategic operations al-Qaedarsquos role is to be the inspiration for atruly global jihadist movement It seeks to achieve this through provision of trainingbeing a role model for others to follow extending acceptance and adoption of its tactics

particularly suicide bombings and professionalising jihadist media to build a commonbrand and message between hitherto separate groups

Between the late 1990s and 2003 the organisation was primarily devoted to classicinternational terrorism Most effort is now spent fighting insurgencies from North Africato South Asia The way in which this strategy helps to spread the struggle has been seenin North-West Africa where the initial development of al-Qaeda in the Islamic Maghrebwas in part fed by men returning from fighting with al-Qaeda in Iraq

Since mid-2009 al-Qaeda and its affiliates have increasingly encouraged jihadist-sympathisers resident in Western countries to engage in violence themselves withoutcentral direction or training making surveillance more difficult

One of the keys to awakening the spirit of jihad was the success in portraying the US and

its allies as Crusaders in the Muslim world Al-Qaedarsquos strategy essentially requires thatthis process be kept running until the forces of jihad have grown large enough to launchsuccessful liberation operations

Despite its successes in Afghanistan al-Qaedarsquos credibility has suffered both from its failure to landanother strategic blow on the West on the scale of 911 and also excessive Muslim casualties in someoperations Similarly al-Qaeda in Iraq was set back by its excessive sectarian zeal and local resentmentat the foreign fighter presence In turn this affected the movementrsquos funding from the Gulf

Analysis Sub-Saharan African Leaders Media Focus On Threats Prior to 911

OSC Feature | Sub-Sahara Africa -- OSC Analysis 6 September 2011Statements by Sub-Saharan African leaders and African media reports on terrorism prior to the 10thanniversary of 911 focus on the growing threats from local extremists and Al-Qaida affiliatesparticularly in West Africa with little direct commentary on the anniversary or US counterterrorismpolicies This focus on domestic threats suggests that counterterrorism messages expressing solidaritywith African nations and acknowledging the evolving terrorist threat on the continent would have thegreatest resonance with African audiences

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3042

Leaders Stressing Determination To Counter Local Threats African leaders public statements reflect an ongoing concern about the threat of terrorism on thecontinent and a strong commitment to find ways to combat this threat

Nigerian President Goodluck Jonathan emphasized the governments commitment tovigorously combat terrorism following the 26 August bombing of the UN office inAbuja by Nigerian extremist group Boko Haram reported the Paris-based news agencyAFP President Jonathan is hosting Liberian President Ellen Johnson Sirleaf and otherforeign dignitaries for a three-day forum on terrorism and economic crimes the widelyread Lagos-based independent daily The Guardian reported on 4 September

Malian President Amadou Toumani Toure launched a Special Program for PeaceSecurity and Development on 9 August stating that development remained the mostviable solution to counter threats to the countrys stability reported Malis state-owneddaily LEssor[ 3] The program aimed to undermine support for Al-Qaida in the IslamicMaghreb (AQIM) according to Burkinabe web portal Lefasonet on 11 August

Somali Prime Minister Abdiweli Muhammad Gas stated on 23 August that theTransitional Federal Government planned to remove Al-Shabaab from the central andsouthern regions in Somalia with the goal of restoring peace within one year so the

country can hold national elections according to the Puntland-based Garowe Online

Experts Media Highlight New Capabilities Tactics

African experts and media outlets are warning about the evolving nature of terrorist organizations on thecontinent the terrorists pursuit of new targets and tactics and their potential for taking advantage of regional instability

Leading South African think tank the Institute for Security Studies stated on 29 Augustthat Boko Harams attack on the UN in Abuja completes Boko Harams metamorphosisinto an international terrorist group Since December 2010 Boko Haram had killed over600 people in over 70 attacks against Nigerian targets according to the think tank buthad not previously targeted Western or international interests

A 26 August article on the popular Malian web portal Maliweb voiced concern thatAQIM could benefit from Tuareg mercenaries many of whom were recently returningfrom fighting in Libya and could benefit from an increase in arms trafficking through theSahel during the Libyan conflict

Ugandas privately owned Daily Monitor reported on 19 August that AU forces inSomalia warned that Al-Shabaab planned to increase the number of kidnappings andbomb attacks as part of its new strategy to shift from controlling territory in Mogadishuto conducting more of an insurgent campaign

Concern Over Al-Qaida Presence Terrorist Collaboration

West African official statements and media reports reflect a growing concern over an increased Al-

Qaida presence in West Africa and collaboration with AQIM Al-Shabaab and Boko Haram

Nigerian security services reported that the suspected mastermind behind the 26 Augustbombing of the UN office in Abuja was a Boko Haram member with close links to Al-Qaida and Al-Shabaab according Nigerias privately owned Daily Sun

A 28 August report in the privately owned daily Nigerian Tribune claimed that the 26August bombing in Abuja was part of Al-Qaidas plans to mark the 10th anniversary of 911 and called Boko Haram Al-Qaidas ally in the region

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3142

An 8 August commentary in Burkina Fasos LObservateur Paalga said that reports of Boko Haram collaboration with Al-Shabaab and AQIM could indicate that Al-Qaida isextending its African tentacles Abdourahmane Dieng security division chief of theEconomic Community of West African States said the collaboration represented a veryserious threat according to Senegals progovernment Le Soleil on 5 August

Messages Likely To Resonate With African Audience

Sub-Saharan Africas increasing concern about the shifting nature and potential strengthening of theterrorist threat on the continent suggests that messages directly addressing the impact of terrorism onAfricans the increasingly complex nature of the threat and the need for multilateral cooperation againstterrorism are most likely to resonate with Africans

Messages expressing solidarity and sympathy for Africans affected by Boko Haram Al-Shabaab and AQIM would almost certainly resonate with a broad African audience

African political and military leaders would probably welcome acknowledgement of thecomplex and changing nature of terrorism on the continent and recognition of theirinitiatives and commitment to countering violent extremism

African leaders and medias concern about potential collaboration between Boko Haram

Al-Shabaab and AQIM suggest that they would be open to improving multilateral andcross-regional sharing of lessons learned and strategies to counter the intensification of terrorism within Africa

Aviation and Maritime Security| back to top |

Bomb Threats Force Jets To Land

Associated Press | 7 September 2011

Both landed safely one landed in Ankara Ataturk International Airport and the other at Kuala LumpurTwo flights operated by Pakistans state-owned airline received bombs threats on Wednesday

and both landed safely one in Turkey the other in Malaysia officials said No bombs were found The

first flight was headed for Manchester England when it was notified of the threat near the Bulgariancapital of Sofia The crew contacted the control tower in Istanbul to seek permission for the landingstate-run Anatolia news agency reported Authorities quickly evacuated all 378 passengers from theBoeing 777-300ER aircraft after it parked at a remote corner of the International Ataturk Airport andbomb squads began searching the plane with sniffer dogs Anatolia reported PIA spokesman MashoodTajwar confirmed the flight received a threat and landed All passengers were safe A police searchturned up no bomb officials said Later a second PIA flight from Islamabad to Kuala Lumpur alsoreceived a bomb threat It landed in Kuala Lumpur and all the passengers disembarked safely saidTajwar The UK-bound Pakistan International Airlines plane was forced to make an emergency landingat Ataturk Airport in Istanbul after receiving a bomb threat Malaysias airports authority said thepassengers were being screened and the plane was isolated in a parking area while being searched bypolice No bomb was found

It said the plane carried 164 passengers and 13 crew Azmi Murad senior general manager forthe authority said the Pakistani airline informed it that the warning came by email Mr Tajwar gave nodetails on the nature of the threat or how it was delivered Pakistan is home to al Qaedas top leadershipMilitants who trained there have been responsible for many of the attacks and failed plots in the USand Europe since Sept 11 2001 when planes hijacked by al Qaeda militants destroyed the World TradeCenter in New York and crashed into the Pentagon The bomb threats came four days before the 10thanniversary of 911 but there was no apparent link to Islamist militants who typically do not alertauthorities in advance The FBI and Homeland Security department issued warnings last weekend aboutal Qaeda threats to small airlines

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3242

Commentary amp Opinion| back to top |

From Terror Group Founder To Libyan Rebel Military Commander

ABCNews | 29August 2011

The same man who triumphantly led Libyan rebels into Gadhafis compound last week first came to theattention of the US intelligence community years ago - as a founder of a terror group

Abdelhakim Belhaj who was recently appointed to Tripolis rebel military council was one of the original founders of the Libyan Islamic Fighting Group an anti-Gadhafi group which was laterdesignated by the US State Department as a terrorist organization with links to al Qaeda according toUS government reports

We proudly announce the liberation of Libya and that Libya has become free and that the ruleof the tyrant and the era of oppression is behind us a victorious Belhaj told reporters after the stormingof Gadhafis Bab al-Aziziya compound last week Ousting Gadhafi had been the main objective of theLIFG since its inception in the early 1990s even if some of the fighters believed that meant puttingAmericans in the crossfire

The group carried out operations against the Libyan government including at least four suspectedassassination attempts against Gadhafi in the 1990s and was also believed to be connected to a series of suicide bombings in Casablanca Morocco in 2003 the US State Department reported As relationsbetween the US and Gadhafi improved in the mid-2000s some LIFG leaders cultivated relationshipswith top al Qaeda leaders including Osama bin Laden and were suspected of funneling fighters to Iraq tocarry out operations against US soldiers

When the LIFG was designated a terror organization in 2004 it was meant as a gesture of solidarity with the Libyan government according to a March 2011 congressional report

Contrary to several US government reports Libyan rebel ambassador to the US Ali Aujalitold ABC News that the LIFG was never connected to al Qaeda and did not carry out terrorist operations

They were only opposed to Gadhafi during his rule and paid the price for that by beingoppressed by the regime Aujali said

The CIA first publicly voiced its concerns about the connection between the LIFG and al Qaedain 2004 when then-director George Tenet testified before the Senate Select Committee on Intelligenceand listed the LIFG among groups that represented an immediate threat [that] has benefited from alQaeda links[Article continues here httpabcnewsgocomBlotterterror-group-founder-libyan-rebel-military-commanderstoryid=14405319]

Interview With Saudi Sheik Wajdi Al-Ghazawi

MemriTVcom

Sheik Wajdi al-Ghazawi owner of al-Fajr TV criticizes extremist atmosphere in Saudi Arabia and saysafter 911 They Handed Out Sweets on the Streets of Mecca

Following are excerpts from a statement by Saudi Sheik Wajdi Al-Ghazawi owner of Al-FajrTV which was posted on YouTube on August 4 2011

Wajdi Al-Ghazawi When Al-Qaeda and Osama Bin Laden were at the height of their mightthey were extremely popular in Saudi Arabia From mosque pulpits across Saudi Arabia preacherswould pray for their success Moreover from the pulpits of the most important mosques ndash the Al-HaramMosque in Mecca and the Nabawi Mosque in Al-Madina ndash direct prayers for the success of Al-Qaedawere made during the days of the bombing of Tora Bora Oh Allah help our brothers in AfghanistanThese supplications were made during evening prayers as well as Friday prayers The preachers wouldpray for them in violation of the ministrys instructions

When the twin towers in New York were attacked they handed out sweets on the streets of Mecca By Allah they did I witnessed this myself The young people bowed in prayer and hugged one

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3342

another out of joy People were in heaven because of these young men who destroyed America andbombed this idol Am I right or not Was it like that or not

Back then when the Taliban broke off a piece of the nose of the Buddha statue which was hewnin the mountain an entire sermon was dedicated to it in the mosque in Mecca and the preacher was laterreprimanded for this sermon The entire Saudi people supported and loved Al-Qaeda

This went on until our brothers in Al-Qaeda ndash and I dont know what was going through theirminds ndash began to carry out operations inside Saudi Arabia Thats when we all raised our hands andsaid Youve gone too far We wont support you in this

The atmosphere here in Saudi Arabia is one of extremism It is characterized by focusing onminor details Many things are forbidden Yes maybe they are indeed forbidden but by forcing peopleto avoid them and by acting as if these were major sins an atmosphere was created that gave rise toextremist youth who might act recklessly at the most trivial provocation

For instance we blew out of proportion the issue of music the issue of smoking or the issue of hanging pictures in public places True there are clear texts on these issues but the young peopleembraced these issues as if they were fighting usury fornication or alcohol No these are not among theseven major sins So our society has become extreme

This extremist atmosphere has given rise to people who accuse others of heresy and people whopurport to be waging Jihad It has created genes that gave rise to cells of Al-Qaeda and other terrorists

We must examine our breeding ground in which these young men were sownBy Allah what can possibly emerge from such an atmosphere Muftis who accuse others of

heresy sheiks who incite and young people who bomb Am I right or not[Complete clip is available here httpwwwmemritvorgclipen3099htm]

Legal Aspects amp Lawfare| back to top |

Revisiting A Stale Counterterrorism Law

Council on Foreign Relations | 1 September 2011

ldquoNearly a decade after 911 the United States still relies on the 2001 Authorization for the Use of Military Force (AUMF) for the killing and detention of those considered responsible for or associatedwith the terrorist attacks But CFR national security law expert John Bellinger says it is becomingincreasingly difficult for the Obama administration to justify some of its counterterrorism operationsunder this limited statutory authority It has been used in defense of actions including drone attacks onindividuals as well as the targeting of groups in Yemen and Somalia that may have only the mosttenuous affiliation or association to the 911 attack A revised AUMF should clarify those operations aswell as the issue of detention specifically which individuals can be detained for how long and subjectto what processes There also needs to be greater effort at the international level he adds to fill thegaps in the law that covers conflicts between states and non-state actorsrdquohelliprdquo[Complete article is available here httpwwwcfrorgcounterterrorismrevisiting-stale-

counterterrorism-lawp25742]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3442

Narco-Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector[Complete article is available here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Mexicos Cartels Move Into Extortion

At a construction site of an apartment building in the heart of the Mexican capital a company engineerruns through his weekly payroll sheet He has salaries written out for carpenters bricklayers andelectricians At the bottom of the sheet is a notation of $200 for ldquosecurity servicesrdquo next to a nicknameldquoEl Indiordquo mdash the Indian [Complete article is available here

httpwwwtucsonsentinelcomnationworldreport090611_mexico_cartels_bribesmexicos-cartels-move-into-extortion ]

Seven Die In Mexican Pacific Port City

Latin American Herald Tribune

Seven people died in separate shootings in Mazatlan a port city in the northwestern Mexican state of Sinaloa with some of the incidents drug-related a police spokesman told Efe [Complete article is available herehttpwwwlahtcomarticleaspCategoryId=14091ampArticleId=423061]

Tijuana Violence Slows As One Cartel Takes Control

BorderlandBeatcom

Mexicos famously seedy border city of Tijuana is enjoying a lull in drug murders as the countrys mostpowerful cartel gains the upper hand over its rivals [Complete article is available here httpwwwborderlandbeatcom201109tijuana-violence-slows-as-one-cartelhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3542

Network Notes| back to top |

Canadian data foreign threats Spying in the digital age (Suggested by a reader in Lithuania ndash thanks) Globe and Mail | By Colin Freeze 31 July 2010

A government spy agency thatrsquos prohibited from monitoring Canadian citizens is now usingldquoinformation about Canadiansrdquo to zero in on foreign threatsThe ambiguous statement found in a new government report detailing the activities of CommunicationsSecurity Establishment Canada could sanction a range of intelligence-gathering activities ndash includingthe controversial practice of mining ldquometadatardquo from digital communications

Metadata ndash often called data about data ndash are found in e-mails and their attachments and containdigital signatures that can reveal when where and by whom documents were created

The collection of metadata has caused controversy in other countries but never in Canada wherethe Communications Security Establishment Canada operates as an ultra-secretive agency About theonly thing that is known about the classified practices is that they were halted and resumed after someldquomajor changesrdquo including directives signed by Defence Minister Peter MacKay

ldquoI cannot comment on specific operational activitiesrdquo Adrian Simpson a CSEC spokesman toldThe Globe He stressed that reviews upheld that the activities in question were ldquocarried out inaccordance with the law ministerial requirements and CSECrsquos policies and proceduresrdquo

ldquoCSEC is prohibited from directing its activities at Canadians anyone in Canada or Canadiansanywhere in the worldrdquo he said

For decades signals-intelligence agencies in the West have been allowed to safeguard nationalsecurity by eavesdropping on foreignersrsquo conversations Spies can whatever phone lines and satellitesignals they can so long as they never listen in on fellow citizens

But in the digital age governments run increasingly sophisticated dragnets scooping up andscouring through millions of intercepted Internet conversations daily Such practices create legalambiguities

ldquoThe whole issue of what constitutes boundaries for signals-intelligence agencies in cyberspaceis a big debate right nowrdquo said Rafal Rohozinski a security expert affiliated with the University of Torontorsquos Munk School

A watchdog agency that reviews the CSECrsquos activities released an annual report to Parliament onJuly 20 ldquoWhen other means have been exhausted CSEC may use information about Canadians when it

has reasonable grounds to believe that using this information may assist in identifying and obtainingforeign intelligencerdquo it reads

Sometimes collecting metadata is relatively benign It can involve aggregating sets of data tospot trends much like the way meteorologists discern national forecasts from localized information

For example while CSEC canrsquot usually monitor the communications of specific Canadian terrorsuspects it can glean insights by zooming out for big-picture patterns One way to do that MrRohozinski said would be to look at data flows between Canadian cities and Yemen where an Internet-savvy al-Qaeda offshoot works to recruit Westerners

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3642

Metadata however can be more revealing Documents that circulate on the Internet travelaround like postmarked letters marked with return addresses ndash e-mails and attachments have embeddedcodes that speak to the who where and when behind their creation

The US National Security Agency found itself mired in controversy a few years go after itskirted domestic-spying bans by secretly upholding that this sort of American metadata was fair gamedistinct from communication contents

Therersquos little to suggest the CSEC would go that far The federal agencyrsquos activities are reviewedby a watchdog body now headed by a former Federal Court of Appeal judge Robert Deacutecary appointedlast year wrote in his annual report that he was satisfied the CSEC activities in question are lawful evenif his predecessors felt them borderline

ldquoThis was the first review of these activities since hellip their resumption under new policiesrdquo thewatchdogrsquos report says It concludes that the surveillance activities are ldquoin accordance with the lawrdquo andfollow ldquomajor changes to certain policies procedures and practicesrdquo

Much of the concern arises from the possibility that CSEC could hand over metadata intelligenceto domestic law-enforcement and security agencies

As it stands the RCMP and CSIS have to develop their domestic investigations before coming toCSEC ndash usually with warrants ndash if they want specific intelligence The rules guiding handovers are strictbecause even though all agencies run surveillance operations they do so under vastly different

mandates and legal standardsThe spy agency however stood by its practicesldquoCSEC is extremely diligent when it comes to the privacy of Canadiansrdquo Mr Simpson said

[complete article is available here httpwwwtheglobeandmailcomnewsnationalcanadian-data-foreign-threats-spying-in-the-digital-agearticle2113772 ]

Cyber Attacks Against NATO Then And Now

New Atlanticist | 6 September 2011

ldquoNow that NATOrsquos Operation UNIFIED PROTECTOR over Libya is winding down it is worth

noting how few cyber incidents were directed in protest against the Alliance Certainly there was a

cyber component to the liberation of Libya but it was more about content and Internet freedom (the

most newsworthy elements here were the role of social media and the Libyan government taking largeparts of the nation offline) But compared to past history NATO cyber defenders had a relatively easy

time

ldquoNATO has not however had an easy 2011 Although there were three significant incidents we

know about none seemed to have been in direct response to operations over Libyahelliprdquo

[Complete article is available here httpwwwacusorgnew_atlanticistcyber-attacks-against-nato-then-

and-now]

The Calm Before The Storm

Foreign Policy | By Joel Brenner 6 September 2011

Cyberwar is already happening -- and its about to get much much worse A veteran cyberwarriorexplains how America can prepare itself

Revelations of wholesale electronic fraud and massive data heists have become weekly evendaily affairs A multinational electronics corporation loses personal information on more than 100million customers Cyberthieves break into an international bank counterfeit credit balances and lootATMs in four countries grabbing $9 million in just a few hours International gangs spread maliciouscode that conscripts unwitting computers into zombie armies of hundreds of thousands of similarlyenslaved machines Criminals then rent these armies called botnets as easily as you can buy a time-sharing arrangement in a beach condo No wonder the vast majority of Internet traffic is spam

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3742

Yet the loss of personal information and related criminal fraud intolerable as they are are theleast threatening face of electronic insecurity The US militarys secret network is penetratedAmericans corporate pockets are being picked clean of the intellectual property that makes the UnitedStates tick And the electricity grid that keeps the lights on and makes everything move is dangerouslyinsecure

In one remote attack on the Pentagons information systems about 10 years ago the Chinesehauled away up to 20 terabytes of information If the information had been on paper theyd have neededa line of moving vans stretching from the Pentagon to freighters docked 50 miles away in Baltimoreharbor just to haul it away Had they done so the military district of Washington wouldve become anactive theater of operations for the first time since 1865 and the Navy wouldve blockaded theChesapeake Bay But the Chinese did it electronically so who noticed

Corporate espionage by both competitors and foreign intelligence services or their surrogates isalso increasing Intelligence officials see this but cant speak openly about the specifics and Im seeingit now in my law practice The victims rarely admit it for understandable reasons Oracle whichsuccessfully sued SAP for theft of its software code was a prominent exception Google was another

When the Chinese penetrated Google in late 2009 -- yes that operation was Chinese and yes itwas done with the blessing of a member of the Politburo -- they werent after customer informationThey were after the source code that makes Google unique Nor was Google the only victim Thousands

of US and Western firms were penetrated in that affair Foreign governments -- and not only theChinese -- understand that they cannot compete with the United States militarily and politically if theycannot compete with it economically so their intelligence services want to steal its corporate intellectualproperty This is the technology that gives America its competitive edge and often it has nothing to dowith defense Ordinary companies with valuable technology are now being targeted by nation-statesThis is a new era National security and economic security have converged

The danger is not limited to the loss of technology and information however The owners andoperators of the North American electricity grid are hooking up their control systems to the Internet asfast as they can Exposing the grid to the Internet makes it marginally more efficient but it also makes itdramatically more vulnerable to disruption If you can remotely penetrate an electronic system to stealinformation you can remotely penetrate it to shut it down or make it go haywire This is why there is no

longer a meaningful difference between information security and operational security And the biggestoperational risk is the grid In contemporary society nothing moves without electricity If the grid goesout the country stops

As the Stuxnet affair demonstrated remotely engineered disruption of industrial control systemsis now a reality That episode involved the successful electronic attack on the centrifuges in the Iraniannuclear program Only a first-class intelligence agency could have pulled that off but the blueprint fordoing it -- the code itself -- is now public Many American industrial control systems run on the samekind of equipment the Iranians were using but unlike the controls on the Iranian centrifuges thecontrols on the US grid are now being connected to the Internet making them easier to disrupt Stuxnetwas a watershed there will be copycats

Other industrial control systems will also be targets Some already are Air traffic control

railroad switches and water and sewage systems are all electronically controlled now and many arevulnerable If an intruder can break into the right server electronically he can remotely shut downproduction send your goods to the wrong destination and even unlock your doors -- and delete your logentries so he leaves no record of ever having been there

The United States does not lack enemies who would attack it this way Seized al Qaedacomputers contain details of US industrial control systems In 2003 a group affiliated with thePakistani terrorist organization Lashkar-e-Taiba -- the same gang that engineered the 2008 terroristassaults in Mumbai -- plotted to attack the Australian grid Other groups conspired to attack the Britishgrid in 2004 2006 and 2009 Yet the owners and operators of the North American grid continue willy-

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3842

nilly to expose their control systems to the Internet instead of isolating and hardening it This is folly of a high order

Important conclusions for public and corporate policy follow from this vulnerable state of

affairs First cyber insecurity has operational consequences In the current and foreseeable states of technology a high degree of assurance against electronic penetration of anything connected to theInternet is not achievable Large efficient electronically connected organizations and nations aretherefore vulnerable to remotely engineered disruption as well as information theft

Second this risk cannot be eliminated -- but it can be reduced and managed As a nation theUnited States should start by isolating the grids controls from the Internet Undoubtedly there aremarginal efficiencies to be gained by seamless connectivity over a publicly accessible infrastructure butthese gains are usually exaggerated and the risk this connectivity creates is staggering The governmentand the major telecommunications carriers must also make the investment required to re-create themassive redundancies that made the wired telephone network so robust Resilience and swift recoveryshould be the goal If the consequences of cyberattacks were reduced penetration would cease to matter

Third companies that wait for the government to solve their own security problems do so attheir peril The government is broke and the IT backbone is 85 percent private so the governmentdoesnt control it The governments role in altering the status quo will be limited to setting standardsusing its purchasing power to move vendors toward better security and getting its own house in order

The government can neither secure corporate intellectual property nor protect firms against operationaldisruption

Fourth in a world in which everything cannot be protected companies must determine forthemselves what intellectual property and physical assets to isolate and safeguard Those that approachthis task seriously will quickly learn that technology is only one aspect of their insecurity and in manycases the easiest to deal with Unless technology is integrated with personnel practices and operationalsecurity it opens vulnerabilities that its users rarely understand This kind of integration requires theautomated enforcement of reasonable security policies and systematic workforce training and thatoccurs only when management the lawyers and the technologists work closely together This is an old-fashioned management challenge -- not a technological one For their part corporate boards need to takeIT security seriously and launch audits that examine how their systems are actually implemented and

used not merely how they are designed Because as the techies like to put it the weakest link in anysystem is not the silicon-based unit on the desk its the carbon-based unit in the chair Joel Brenner is author of the forthcoming America the Vulnerable Inside the New Threat Matrix of

Digital Espionage Crime and Warfare He has served as the inspector general of the National Security

Agency the national counterintelligence executive and the NSAs senior counsel He now practices law

at Cooley LLP in Washington DC

Cyberattacks Decline Slightly Symantec Report Finds

Dark Reading | 1 September 2011

Organizations worldwide are suffering damages as a result of cyberattacks but interestingly there hasbeen a slight decline in these attacks during the past 12 months according to a new report from

Symantec More than 90 percent of the more than 3300 respondents across 36 countries said theyexperienced tangible losses as a result of a hack with 84 percent reporting financial loss to the cost of abreach Around one-fifth lost at least $195000 in breaches during the past 12 months

Meanwhile Symantec attributes the unexpected bright spot of a decline in breaches toorganizations employing better cybersecurity defenses More than 70 percent of organizations sawattacks in the past 12 months a decline of 5 percent from 2010 And those that experienced anincreasing frequency of attacks dropped from 29 percent in 2010 to 21 percent this year While 100percent last year reported losses from cyberattacks 92 percent did so in 2011 The trend seemscounterintuitive given the rash of high-profile breaches this year More

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 21: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2142

General Counterterrorism News| back to top |

The Terrible Missed Chance

Newsweek | 4 September 2011

Special Agent Harry Samit of the FBIs Minneapolis field office knew he was looking into the eyes of aterrorist It was early afternoon on Friday Aug 17 2001 Across from him sat Zacarias Moussaoui a33-year-old French-born student arrested the day before for overstaying his visa Moussaoui had paidmore than $8000 in cash that summer to sit in a cockpit simulator in a flight school in the suburbs of Minneapolis and learn - in a matter of days - the basics of how to fly a 747-400 Samit a formerintelligence officer at the Navys celebrated Top Gun flight school felt sure the man across the desk from him was a Muslim extremist who was part of a plot to hijack a commercial jetliner filled withpassengers The trick Samit wrote in a soon-to-be-released excerpt of a book hes written about thecase was getting Moussaoui to admit this and reveal details and associates to allow us to stop the plot

Surely the bureau brass in Washington would share his concern Samit thought He was wrongThat same day halfway across the country in the fluorescent-lit hallways of the J Edgar Hoover

FBI headquarters building in Washington counterterrorism supervisors were treating Samits firstreports about Moussaoui with skepticism even contempt Michael Maltbie a DC counterterrorism

specialist insisted repeatedly in the days after the arrest that there was no clear link between Moussaouiand Al Qaeda - the link needed for a warrant Maltbie thought Moussaoui was a dirty bird he latertold investigators but favored deporting him to France

Believing a hijacking might be imminent Samit appealed to his boss in Minneapolis SpecialAgent Greg Jones Jones picked up the phone on Aug 27 and called Maltbie at FBI HQ

Moussaoui he said might be part of a plot to get control of an airplane and crash it into theWorld Trade Center or something like that

Maltbie scoffed You have a guy interested in this type of aircraft Maltbie replied accordingto FBI documents That is it (Maltbie declined requests for an interview)

At least Maltbie was paying attention Michael Rolince who ran the FBIs InternationalTerrorism Operations Section was arguably the bureaus most important go-between with the White

House on domestic terrorist threats in the summer of 2001 He tells Newsweek he spent less than 20seconds being briefed on the Moussaoui case that August His office was inundated with terrorismprobes he said since Moussaoui was in custody already he posed no immediate threat Did it rise tothe level of something that I would take upstairs Rolince asks The answer is no

At CIA headquarters alarm bells were ringing loudly CIA Director George Tenet was briefedon Moussaoui within days of the arrest receiving a paper with the eye-catching headline IslamicExtremist Learns to Fly But the FBIs acting director that summer and the bureaus most seniorcounterterrorism official were left in the dark[Article continues here httpwwwthedailybeastcomnewsweek20110904the-terrible-missed-chancehtml]

Pan Am Flight 103 - Lockerbie Bombing - al-Megrahi CIA FilesWebwire | 31 August2011

BACM ResearchPaperlessArchivescom has announced the publishing of CIA files related to the PanAm Flight 103 Lockerbie Bombing

The files can be downloaded at no cost at httpwwwpaperlessarchivescompanam103ciahtml The files date from 1984 to 1999 These are the most recent files on Pan Am 103 released by the

CIA This set of files is unique because it includes memos on the direct handling of an intelligencesource This type of information is exempt from the Freedom of Information Act (FOIA) and is not oftenreleased by the Agency

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2242

The files cover information received by the CIA on Abdel Basset al-Megrahi Al-Megrahi is theonly person ever convicted in the Pan AM 103 case The Scottish government in 2009 allowed al-Megrahi to be released from custody and returned to Libya because of his failing health With the recentfall of Muammar Qaddafis regime there have been renewed calls for al-Megrahi to be returned toScottish custody or extradited to the United States and put on trial[Complete article is available here httpwwwwebwirecomViewPressRelaspaId=144692]

Getting The Caucasus Emirate Right

CSIS | August 2011

ldquohellipThis report aims to set straight a rather distorted record It demonstrates the veracity of three vitallyimportant facts usually obfuscated in discussions of the subject (1) the longstanding and growing tiesbetween the CE and its predecessor organization the ChRI on the one hand and al Qaeda (AQ) and theglobal jihad on the other hand (2) the importance of the CE jihadi terrorist network as a united andorganized political and military force promoting jihad in the region and (3) the salience of local culturaland the Salifist jihadist theo-ideology and the influence of the global jihadi revolutionarymovementalliance as key if not the main factors drive the ldquoviolence in the North Caucasusrdquohelliprdquohttpcsisorgfilespublication110829_Hahn_GettingCaucasusEmirateRt_Webpdf

7 Things You Didnrsquot Know About the War on TerrorForeign Policy | By Eric Schmitt and Thomas Shanker 6 September 2011

From an attempt to negotiate with Osama bin Laden to a proposal to threaten to bomb Mecca its been awild decade for the US national security establishment

Our new book Counterstrike The Untold Story of Americas Secret Campaign Against Al Qaeda is in many ways asummary of the past decade of our reporting on the military intelligence community and domestic law enforcement as itentered a new era of Darwinian evolution to counter violent extremism

It also is our deep dive into a decade of American counterterrorism efforts -- from the work of commando trigger-pullers and spies on the ground up to senior political leaders who wanted to defendthe nation (and get re-elected) Our efforts to report and write this book allowed us to uncover many newmissions never discussed before -- and gave us an understanding of how the war on terror had changedover the last decade

Our book assesses the 10 years since 911 as the military divides the fight into tactical missionson the battlefields of modern terrorism then the operational advancements that provided the means tosuccess while not securing final victory and at the top the strategic level of policy debates about howthe nation should combat this threat to its security

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2342

Here are seven vignettes from Counterstrike that offer glimpses into the thinking of policymakers andcommanders in early days after the Sept 11 attacks and how that thinking evolved over the followingdecade into a more whole-of-government approach to combating terrorists

1 Bush Tried to Negotiate with al Qaeda

The George W Bush administration like all of its predecessors swore never to negotiate with terroristsBut it did undertake an extraordinary and extraordinarily secret outreach effort to open a line of communication with Osama bin Laden and al Qaedas senior leadership It was an attempt to replicatehow the United States tried to sustain a dialogue with the Soviet Union even during the darkest days of the Cold War when White House and Kremlin leaders described in private and in public a set of acceptable behaviors -- and described with equal clarity the swift vicious even nuclear punishment forgross violations

In the months after the Sept 11 attacks Bushs national security staff working through theintelligence agencies made several attempts to get a private message to bin Laden and his inner circleThe messages were sent through business associates of the bin Laden familys vast financial empire aswell as through some of the al Qaeda leaders closest relatives a number of whom were receptive toopening a secret dialogue to restrain and contain their terrorist kinsman whom they viewed as a blot on

their name (To be sure other relatives were openly hostile to the American entreaties)According to a senior American intelligence officer with first-hand knowledge of the effort the

response from Osama bin Laden was silence And the effort was suspended

2 Sometimes a Wedding Is Just a WeddingIn the early days after the Sept 11 attacks the CIA and FBI vied to produce the most compellingintelligence reports that tracked suspected terrorist plots The agencies often worked at cross purposessometimes unwittingly At one point in early 2002 both agencies were tracking what American analystssaid were growing preparations for a major wedding somewhere in the Midwest (In terroristvernacular the word wedding is often code for a major attack)

Dribs and drabs on this wedding planning made their way to President Bush from bothagencies independent of each other of course

Finally over the Easter holiday during a video-teleconference with top aides in Washingtonfrom his ranch in Crawford Texas Bush stopped the briefing exasperated by the discrepancies in therival agencies reporting about the suspected threat

George Bob get together and sort this out Bush told his CIA director George J Tenet andFBI director Robert S Mueller III

Bushs instincts were correct When the analysts finally untangled their clues it turned out thatthe ominous wedding really was just that the matrimony of a young man and a young woman fromtwo prominent Pakistani-American families There was no threat There was no plot

3 The Threat to Bomb MeccaAs fears of a second attack mounted following the 911 strikes US government planners franticallycast about for strategies to protect the country Even the most far-fetched ideas had a hearing howeverbriefly In one case some government planners proposed that if al Qaeda appeared ready to attack America again the United States should publicly threaten to bomb the city of Mecca in Saudi Arabiathe holiest site in all of Islam in retaliation Just nuts one Pentagon aide wrote to himself when heheard the proposal The idea was quickly and permanently shelved

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2442

4 The SEAL Raid in Iran That Didnt HappenWhen US forces routed the Taliban government in Afghanistan and forced bin Laden and his toplieutenants to flee many senior al Qaeda leaders including bin Laden and his deputy Ayman al-Zawahri escaped to neighboring Pakistan But a separate group including the al Qaeda leaders sonSaad bin Laden fled to northern Iran where American troops would not pursue them and the Iranianswould likely not detain them But the Shiite clerics running Iran placed the al Qaeda operatives and theirfamily members under virtual house arrest and they became a shield against possible attacks from theSunni-based terrorist organization

One plan in particular illustrated the bold thinking and wildly unrealistic aims of the militarysinitial approach after 911 to kill or capture terrorist leaders The plan called for hunting the eight to 10senior al Qaeda leaders and operatives who had sought refuge in Chalus an Iranian resort town on theCaspian Sea where they had been detained

At the Joint Special Operations Command at Fort Bragg NC military planners drew up optionsfor Navy SEALs to sneak ashore at night using state-of-the-art mini-submarines Once they landed theSEALs would slip past Iranian guards to snatch the al Qaeda leaders Another option called for SpecialOperations helicopters to spirit American commandos into the town and whisk them out again with theirquarry The Americans went as far as conducting two or three rehearsals at an undisclosed locationalong the US Gulf Coast in early 2002 They conducted small-boat insertion exercises involving about

30 Special Operations personnel most SEALs and eventually concluded the mission was feasible if they were provided with more detailed intelligence on the locations of the al Qaeda members and thesecurity around them

The logistics of the mission were daunting Chalus sits at the edge of the Elburz coastal mountainrange about 70 miles north of Tehran and the failed rescue of the American hostages in Iran in April1980 loomed large in commanders memories Eventually Gen Richard B Myers the chairman of theJoint Chiefs of Staff rejected the mission as too risky and too politically volatile Many of the al Qaedaoperatives are reportedly still there

5 Intelligence Hauls of Unusual Size

US intelligence and military commandos have carried out tens of thousands of raids in the decade since911 The amount of material seized from terrorist and insurgent targets has grown to a massive sizeThe Defense Intelligence Agency (DIA) operates exploitation triage centers and giant warehouses forstoring intelligence products -- in war zones rear headquarters in countries like Qatar and back in theUnited States One intelligence analyst said that walking into one of the warehouses for documents andmedia exploitation reminded him of the final scene in Raiders of the Lost Ark when the captured Ark of the Covenant is crated up and rolled into a cavernous storage area that contains all the governmentsother dangerous secrets

All told more than two million individual documents and electronic files have been cataloguedby media type hard copy phone number thumb drive Each is inspected by a linguist working with acommunications analyst or computer expert

The DIA analysts are joined by specialists from other agencies including the FBI and the DrugEnforcement Administration Yet given the overwhelming volume no more than about 10 percent of thecaptured intelligence has ever been analyzed

Intelligence officers say they simply are overwhelmed and untold quality leads may still beburied in the piles of computers digital files travel documents and pocket litter

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2542

6 The Digital Counterjihad Cyberspace is the terrorists ultimate safe haven Its where they recruit raise money and even plotattacks using coded language while playing online video war games The US government fights back

One technique is called false band replacement whereby the intelligence agencies infiltratemilitants networks and post their own material to counter extremist efforts on those same jihadistwebsites The trick is to forge the onscreen trademarks -- web watermarks -- of al Qaeda media sites

This makes messages posted on these sites official and sows dissent and confusion among themilitants

This Internet spoofing can be used in support of more traditional combat missions There is atleast one case confirmed by American officials in which a jihadist website was hacked by Americancyberwarriors to lure a high-value al Qaeda to a surreptitious meeting with extremist counterparts -- onlyto find a US military team in waiting

Getty images

7 First Kill the MullahsUS counterterrorism officials have learned fighting terrorists effectively means targeting specific nodesof that network that support and enable militants who strap on suicide vests This strategy focuses onneutralizing enablers such as the financiers gun-runners and logisticians Among these terror linchpins

are religious leaders who bless attacksHeavenly reward will not await a suicide bomber unless his death and those of his victims is

deemed halal in keeping with Islams sacred sharia law Each militant network has a sharia emir usuallyat the level of a sheikh or mullah In Iraq American commanders specifically killed emirs to throw awrench in a suicide bombing networks

Take him out and suicide bombings from that network are frozen until he is replaced said onemilitary officer with command experience in Iraq hellip[Complete article is available herehttpwwwforeignpolicycomarticles201109067_things_you_didn_t_know_about_the_war_on_terror]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2642

Dick Marty Rendition Report Condemns lsquoCult of Secrecyrsquo

BBC News | 8 September 2011

A report for Europes human rights watchdog has called for greater scrutiny of secret services andsupport for whistleblowers The Council of Europe investigated how countries like Britain GermanyRomania and Lithuania assisted the US with the rendition of terror suspects It said a cult of secrecyhad helped Western governments cover up abuses Defending whistleblowers it singled out USsoldier Bradley Manning accused of passing secrets to Wikileaks He had acted as a whistleblowerand should be treated as such CoE rapporteur Dick Marty wrote in the report which was due to besubmitted to the CoEs Parliamentary Assembly The soldier is currently in a US military prisonawaiting trial for passing restricted material to the controversial website

But the report praised Mr Manning and Wikileaks itself for uncovering evidence of renditionThe CoE represents 47 member-states including both EU countries and Russia and other ex-Sovietstates Mr Martys report focused on the record of Western states explaining that it was based oninvestigations into European links to the controversial US policy of rendition for terrorism suspectsThe CIA allegedly flew terror suspects around the world for interrogation in the years after 911 holdingthem in secret prisons in Europe and elsewhere

No licence to kill

In his 48-page report - entitled Abuse of State Secrecy and National Security - Mr Marty looked at thelevel of control exercised by European states over their security services He urged all states to useindependent parliamentary committees to oversee the work of their secret services saying this was of vital importance for the rule of law and democracy Mr Marty argued that Western governments wereusing the notion of state secrecy to shield their intelligence services from accountability for seriousviolations committed during anti-terrorist operations We consider that this is simply unacceptablehe wrote

A licence to kill (or to abduct and torture) only exists in certain films and in dictatorialregimes In democratic systems parliaments as representatives of the people have a right and duty toknow what the government is doing in the name of the people Mr Marty praised investigative journalists and non-governmental organisations for their work in exposing abuses of authority Stressing

the fundamental role whistleblowers had to play in an open society he warned against a real cult of secrecy as an instrument of power

While it was up to the courts to decide if Bradley Manning had committed any crime he wrotethe CoE was indebted to him for the publication of a recording of a helicopter attack in Iraq in whichthe crew seems to have intentionally targeted and killed civilians

Thanks to Mr Manning he said a large number of embassy reports had allowed us to learnsignificant details of important recent events which are obviously of general interest We therefore join Amnesty International in expressing our worries as to the treatment he receives Mr Marty wrote inthe draft report[Article continues here httpwwwbbccouknewsworld-europe-14820145]Comment This report demonstrates that Dick Marty is not as De Gaulle would say a serious man To

suggest that Bradley Manning is a hero and intelligence agencies bent on defeating terrorists arecriminals should say it all Manning knowingly violated his oath and willfully provided enormousamounts of classified material to WikiLeaks For Marty this is a good thing in the name of transparencyMarty always injudicious and anti-American in his remarks is now moving at warp speed into crackpotterritory

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2742

Al Qarsquoida amp its Affiliates| back to top |

Al Qaeda Is Down Not Out

Los Angeles Times | By Amy Zegart 7 September 2011

US talk of defeating terrorism is dangerously prematureTalk of strategically defeating Al Qaeda is all the rage in the White House these days Defense

Secretary Leon Panetta used the D-word in July President Obama declared in his new counter-terrorism strategy We can say with growing confidence that we have put Al Qaeda on the path todefeat Compared to the woeful state of the economy terrorism has become the administrations feel-good story of the year

Defeat is a big word It is also dangerously misleading Yes the United States has made greatstrides in the last decade to harden targets improve intelligence and degrade the capabilities of violentIslamist extremists Osama bin Ladens death was a major accomplishment But the fight is nowhereclose to being won and Americas most perilous times may lie ahead Three reasons explain why

The first is that strategically defeating Al Qaeda is not nearly as important as it sounds After911 Al Qaeda morphed into a more complicated decentralized and elusive threat consisting of threeelements core Al Qaeda affiliates or franchise groups operating in places like Yemen and Somalia with

loose ties to the core group and homegrown terrorists inspired by violent extremism often through theInternet in the comfort of their own living rooms

Core Al Qaedas capabilities started degrading in 2001 when the US invaded Afghanistandismantled training camps ousted the Taliban and sent Bin Laden running The CIA has estimated thecore group remaining in the AfghanistanPakistan region to number 50 to 100 fighters The last time BinLaden oversaw a successful operation was 2005 when Al Qaeda struck the London transit system

But plots by homegrowns and franchise groups have risen dramatically in recent years The 2009Ft Hood shooting the worst terrorist attack on US soil since 911 was the work of a homegrownterrorist The mastermind of the 2010 Times Square car bomb plot was a naturalized American citizentrained by the Pakistani Taliban not Al Qaeda Another franchise group Al Qaeda in the ArabianPeninsula was behind the foiled 2009 Christmas Day underwear bomber aviation plot and the 2010

plot to explode tampered printer cartridges aboard cargo planes The Bipartisan Policy Center reported11 violent Islamist extremist terrorist incidents against the US homeland in 2009 the most since 911Nearly all involved what former CIA Director Mike Hayden calls a witches brew of radicalizedAmericans and franchise groups

The second reason why talk of defeat is premature has to do with weapons Terrorism againstAmericans is nothing new The potential for terrorist groups to acquire weapons of mass destruction isIn 1995 a Japanese cult released sarin nerve gas in the Tokyo subway killing 12 people and injuringthousands It was the first WMD terrorist attack in modern history and it sparked a wave of presidentialterrorism commissions years before Bin Laden became a household name

It is this specter of the lone fanatic or small group armed with the worlds most devastatingweapons that keeps experts up at night In 2005 60 leading nuclear scientists and terrorism experts were

asked how many believed the odds of a nuclear attack on the US were negligible Only three or fourhands went up most were far more pessimistic Today there is enough nuclear material to build120000 weapons As long as fissile material is poorly stored and rogue states like Iran and North Koreacontinue their illicit weapons programs nuclear terrorism remains a haunting possibility

The third reason is that the FBI has not yet become a first-rate domestic intelligence agencyAnalysts whose work is vital to success are still second-class citizens labeled support staff alongsidesecretaries and janitors and passed over for key jobs including running the bureaus intelligence unitsThe FBIs information technology is so antiquated it belongs in a museum And the old crime-fighting

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2842

culture still lives There is now a move afoot to shrink new classified facilities so that agents dont haveto waste time away from their cases to read intelligence documents thereStrategically defeating Al Qaeda sounds too good to be true Because it is Amy Zegart is a senior fellow at Stanfords Hoover Institution and the author of Eyes on Spies

Congress and the United States Intelligence Community

US Counterterror Chief Al-Qaida On Steady Slide

Bostoncom | 31 August 2011

White House counterterrorism chief John Brennan said al-Qaida is on a steady slide after the death of al-Qaidas latest second-in-command in Pakistan Brennan told The Associated Press on Wednesdaythat its a huge blow in the first official White House comment since Atiyah Abd al-Rahmans reportedkilling by CIA drone strike in Pakistans tribal areas last week

Al-Qaida is sort of on the ropes and taking a lot of shots to the body and the head Brennansaid This is a time not to step back and let them recover a message he says hes sending to hiscounterparts in Pakistan[Article continues herehttpwwwbostoncomnewsnationwashingtonarticles20110831us_counterterror_chief_al_qaida_on_steady_slide ]

Al-Qaeda (AKA Al-Qaida Al-Qarsquoida)

Council on Foreign Relations | 29 August 2011

ldquoAl-Qaeda an international terrorist network is considered the top terrorist threat to the United StatesThe group is wanted for its September 11 2001 attacks on the World Trade Center and the Pentagon aswell as a host of lesser attacks To escape the post-911 US-led war in Afghanistan al-Qaedas centralleadership fled eastward into Pakistan securing a safe haven in loosely governed areas there In July2007 US intelligence agencies found that the organization was regrouping and regaining strength inthese tribal areas along the border with Afghanistan though targeted killings of senior al-Qaeda leadershave since diminished the groups command and control capabilities In February 2009 Director of National Intelligence Dennis C Blair told lawmakers that the groups core is less capable and effective

than it was a year ago The killing of al-Qaedas top leader Osama bin Laden by US forces in Pakistanin May 2011 served a significant blow to the organization but analysts say al-Qaeda remains deadlywith its networks spread all over the world Plus a number of affiliated groups have gained prominencein recent years complicating the task of containing the organizationrdquo

[Article continues here httpwwwcfrorgterrorist-organizationsal-qaeda-k-al-qaida-al-qaidap9126]

Al Qaeda In The Islamic Maghreb

CSIS | 1 September 2011

ldquoAl Qaeda in the Islamic Maghreb (AQIM) emerged from a decades-long militant Islamist tradition inAlgeria In 1998 the Salafist Group for Preaching and Combat (Groupe Salafiste pour la Preacutedication etle Combat or GSPC) broke away from the Armed Islamic Group (GIA) because of the GIArsquos extensive

targeting of civilians Gradually the GSPC evolved to encompass global jihadist ideology in addition toits historical focus on overturning the Algerian state In 2006 the GSPC officially affiliated with alQaeda core soon rebranding itself as al Qaeda in the Islamic Maghreb In the following years AQIMwas able to conduct a small number of large-scale attacks most notably its 2007 bombing of the UNheadquarters in Algiers In recent years counterterrorism pressure and weak governance have combinedto shift the center of AQIMrsquos presence to the Sahara-Sahel region AQIM continues to make its presenceknown through smuggling operations kidnappings and clashes with security forces in the desert In thecoming years general instability within the region could allow AQIM to further expand its influencerdquo[Complete article is available here httpcsisorgfilespublication110901_Thornberry_AQIM_WEBpdf ]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2942

AQ Strategy

The Assynt Report | 11 August 2011

Executive Summary Al-Qaedarsquos broad objectives remain unchanged in the wake of bin Ladenrsquos death There

are nonetheless growing questions over al-Qaedarsquos capability Longstanding paranoiaover the use of electronic communications is heightened by the ongoing US dronecampaign whilst attacks against the West have generally been disrupted at an early stage

The Pakistani Talibanrsquos attack on a Karachi naval base in May 2011 was a significantmilitary success and the first major act of revenge for bin Ladenrsquos killing Furtherattempts to avenge his loss are certain

All parts of al-Qaeda are working within a cohesive framework with the ultimate aim of restoring the Islamic Caliphate (Khilafa) The strategic plan to support this aim wasdrafted by 40 of al-Qaedarsquos brightest thinkers in Kandahar Afghanistan in November1999 This plan consists of four phases each seven years long leading to the dissolutionof corrupt regimes and the union of all newly-liberated states within the Khilafa

Apart from mounting strategic operations al-Qaedarsquos role is to be the inspiration for atruly global jihadist movement It seeks to achieve this through provision of trainingbeing a role model for others to follow extending acceptance and adoption of its tactics

particularly suicide bombings and professionalising jihadist media to build a commonbrand and message between hitherto separate groups

Between the late 1990s and 2003 the organisation was primarily devoted to classicinternational terrorism Most effort is now spent fighting insurgencies from North Africato South Asia The way in which this strategy helps to spread the struggle has been seenin North-West Africa where the initial development of al-Qaeda in the Islamic Maghrebwas in part fed by men returning from fighting with al-Qaeda in Iraq

Since mid-2009 al-Qaeda and its affiliates have increasingly encouraged jihadist-sympathisers resident in Western countries to engage in violence themselves withoutcentral direction or training making surveillance more difficult

One of the keys to awakening the spirit of jihad was the success in portraying the US and

its allies as Crusaders in the Muslim world Al-Qaedarsquos strategy essentially requires thatthis process be kept running until the forces of jihad have grown large enough to launchsuccessful liberation operations

Despite its successes in Afghanistan al-Qaedarsquos credibility has suffered both from its failure to landanother strategic blow on the West on the scale of 911 and also excessive Muslim casualties in someoperations Similarly al-Qaeda in Iraq was set back by its excessive sectarian zeal and local resentmentat the foreign fighter presence In turn this affected the movementrsquos funding from the Gulf

Analysis Sub-Saharan African Leaders Media Focus On Threats Prior to 911

OSC Feature | Sub-Sahara Africa -- OSC Analysis 6 September 2011Statements by Sub-Saharan African leaders and African media reports on terrorism prior to the 10thanniversary of 911 focus on the growing threats from local extremists and Al-Qaida affiliatesparticularly in West Africa with little direct commentary on the anniversary or US counterterrorismpolicies This focus on domestic threats suggests that counterterrorism messages expressing solidaritywith African nations and acknowledging the evolving terrorist threat on the continent would have thegreatest resonance with African audiences

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3042

Leaders Stressing Determination To Counter Local Threats African leaders public statements reflect an ongoing concern about the threat of terrorism on thecontinent and a strong commitment to find ways to combat this threat

Nigerian President Goodluck Jonathan emphasized the governments commitment tovigorously combat terrorism following the 26 August bombing of the UN office inAbuja by Nigerian extremist group Boko Haram reported the Paris-based news agencyAFP President Jonathan is hosting Liberian President Ellen Johnson Sirleaf and otherforeign dignitaries for a three-day forum on terrorism and economic crimes the widelyread Lagos-based independent daily The Guardian reported on 4 September

Malian President Amadou Toumani Toure launched a Special Program for PeaceSecurity and Development on 9 August stating that development remained the mostviable solution to counter threats to the countrys stability reported Malis state-owneddaily LEssor[ 3] The program aimed to undermine support for Al-Qaida in the IslamicMaghreb (AQIM) according to Burkinabe web portal Lefasonet on 11 August

Somali Prime Minister Abdiweli Muhammad Gas stated on 23 August that theTransitional Federal Government planned to remove Al-Shabaab from the central andsouthern regions in Somalia with the goal of restoring peace within one year so the

country can hold national elections according to the Puntland-based Garowe Online

Experts Media Highlight New Capabilities Tactics

African experts and media outlets are warning about the evolving nature of terrorist organizations on thecontinent the terrorists pursuit of new targets and tactics and their potential for taking advantage of regional instability

Leading South African think tank the Institute for Security Studies stated on 29 Augustthat Boko Harams attack on the UN in Abuja completes Boko Harams metamorphosisinto an international terrorist group Since December 2010 Boko Haram had killed over600 people in over 70 attacks against Nigerian targets according to the think tank buthad not previously targeted Western or international interests

A 26 August article on the popular Malian web portal Maliweb voiced concern thatAQIM could benefit from Tuareg mercenaries many of whom were recently returningfrom fighting in Libya and could benefit from an increase in arms trafficking through theSahel during the Libyan conflict

Ugandas privately owned Daily Monitor reported on 19 August that AU forces inSomalia warned that Al-Shabaab planned to increase the number of kidnappings andbomb attacks as part of its new strategy to shift from controlling territory in Mogadishuto conducting more of an insurgent campaign

Concern Over Al-Qaida Presence Terrorist Collaboration

West African official statements and media reports reflect a growing concern over an increased Al-

Qaida presence in West Africa and collaboration with AQIM Al-Shabaab and Boko Haram

Nigerian security services reported that the suspected mastermind behind the 26 Augustbombing of the UN office in Abuja was a Boko Haram member with close links to Al-Qaida and Al-Shabaab according Nigerias privately owned Daily Sun

A 28 August report in the privately owned daily Nigerian Tribune claimed that the 26August bombing in Abuja was part of Al-Qaidas plans to mark the 10th anniversary of 911 and called Boko Haram Al-Qaidas ally in the region

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3142

An 8 August commentary in Burkina Fasos LObservateur Paalga said that reports of Boko Haram collaboration with Al-Shabaab and AQIM could indicate that Al-Qaida isextending its African tentacles Abdourahmane Dieng security division chief of theEconomic Community of West African States said the collaboration represented a veryserious threat according to Senegals progovernment Le Soleil on 5 August

Messages Likely To Resonate With African Audience

Sub-Saharan Africas increasing concern about the shifting nature and potential strengthening of theterrorist threat on the continent suggests that messages directly addressing the impact of terrorism onAfricans the increasingly complex nature of the threat and the need for multilateral cooperation againstterrorism are most likely to resonate with Africans

Messages expressing solidarity and sympathy for Africans affected by Boko Haram Al-Shabaab and AQIM would almost certainly resonate with a broad African audience

African political and military leaders would probably welcome acknowledgement of thecomplex and changing nature of terrorism on the continent and recognition of theirinitiatives and commitment to countering violent extremism

African leaders and medias concern about potential collaboration between Boko Haram

Al-Shabaab and AQIM suggest that they would be open to improving multilateral andcross-regional sharing of lessons learned and strategies to counter the intensification of terrorism within Africa

Aviation and Maritime Security| back to top |

Bomb Threats Force Jets To Land

Associated Press | 7 September 2011

Both landed safely one landed in Ankara Ataturk International Airport and the other at Kuala LumpurTwo flights operated by Pakistans state-owned airline received bombs threats on Wednesday

and both landed safely one in Turkey the other in Malaysia officials said No bombs were found The

first flight was headed for Manchester England when it was notified of the threat near the Bulgariancapital of Sofia The crew contacted the control tower in Istanbul to seek permission for the landingstate-run Anatolia news agency reported Authorities quickly evacuated all 378 passengers from theBoeing 777-300ER aircraft after it parked at a remote corner of the International Ataturk Airport andbomb squads began searching the plane with sniffer dogs Anatolia reported PIA spokesman MashoodTajwar confirmed the flight received a threat and landed All passengers were safe A police searchturned up no bomb officials said Later a second PIA flight from Islamabad to Kuala Lumpur alsoreceived a bomb threat It landed in Kuala Lumpur and all the passengers disembarked safely saidTajwar The UK-bound Pakistan International Airlines plane was forced to make an emergency landingat Ataturk Airport in Istanbul after receiving a bomb threat Malaysias airports authority said thepassengers were being screened and the plane was isolated in a parking area while being searched bypolice No bomb was found

It said the plane carried 164 passengers and 13 crew Azmi Murad senior general manager forthe authority said the Pakistani airline informed it that the warning came by email Mr Tajwar gave nodetails on the nature of the threat or how it was delivered Pakistan is home to al Qaedas top leadershipMilitants who trained there have been responsible for many of the attacks and failed plots in the USand Europe since Sept 11 2001 when planes hijacked by al Qaeda militants destroyed the World TradeCenter in New York and crashed into the Pentagon The bomb threats came four days before the 10thanniversary of 911 but there was no apparent link to Islamist militants who typically do not alertauthorities in advance The FBI and Homeland Security department issued warnings last weekend aboutal Qaeda threats to small airlines

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3242

Commentary amp Opinion| back to top |

From Terror Group Founder To Libyan Rebel Military Commander

ABCNews | 29August 2011

The same man who triumphantly led Libyan rebels into Gadhafis compound last week first came to theattention of the US intelligence community years ago - as a founder of a terror group

Abdelhakim Belhaj who was recently appointed to Tripolis rebel military council was one of the original founders of the Libyan Islamic Fighting Group an anti-Gadhafi group which was laterdesignated by the US State Department as a terrorist organization with links to al Qaeda according toUS government reports

We proudly announce the liberation of Libya and that Libya has become free and that the ruleof the tyrant and the era of oppression is behind us a victorious Belhaj told reporters after the stormingof Gadhafis Bab al-Aziziya compound last week Ousting Gadhafi had been the main objective of theLIFG since its inception in the early 1990s even if some of the fighters believed that meant puttingAmericans in the crossfire

The group carried out operations against the Libyan government including at least four suspectedassassination attempts against Gadhafi in the 1990s and was also believed to be connected to a series of suicide bombings in Casablanca Morocco in 2003 the US State Department reported As relationsbetween the US and Gadhafi improved in the mid-2000s some LIFG leaders cultivated relationshipswith top al Qaeda leaders including Osama bin Laden and were suspected of funneling fighters to Iraq tocarry out operations against US soldiers

When the LIFG was designated a terror organization in 2004 it was meant as a gesture of solidarity with the Libyan government according to a March 2011 congressional report

Contrary to several US government reports Libyan rebel ambassador to the US Ali Aujalitold ABC News that the LIFG was never connected to al Qaeda and did not carry out terrorist operations

They were only opposed to Gadhafi during his rule and paid the price for that by beingoppressed by the regime Aujali said

The CIA first publicly voiced its concerns about the connection between the LIFG and al Qaedain 2004 when then-director George Tenet testified before the Senate Select Committee on Intelligenceand listed the LIFG among groups that represented an immediate threat [that] has benefited from alQaeda links[Article continues here httpabcnewsgocomBlotterterror-group-founder-libyan-rebel-military-commanderstoryid=14405319]

Interview With Saudi Sheik Wajdi Al-Ghazawi

MemriTVcom

Sheik Wajdi al-Ghazawi owner of al-Fajr TV criticizes extremist atmosphere in Saudi Arabia and saysafter 911 They Handed Out Sweets on the Streets of Mecca

Following are excerpts from a statement by Saudi Sheik Wajdi Al-Ghazawi owner of Al-FajrTV which was posted on YouTube on August 4 2011

Wajdi Al-Ghazawi When Al-Qaeda and Osama Bin Laden were at the height of their mightthey were extremely popular in Saudi Arabia From mosque pulpits across Saudi Arabia preacherswould pray for their success Moreover from the pulpits of the most important mosques ndash the Al-HaramMosque in Mecca and the Nabawi Mosque in Al-Madina ndash direct prayers for the success of Al-Qaedawere made during the days of the bombing of Tora Bora Oh Allah help our brothers in AfghanistanThese supplications were made during evening prayers as well as Friday prayers The preachers wouldpray for them in violation of the ministrys instructions

When the twin towers in New York were attacked they handed out sweets on the streets of Mecca By Allah they did I witnessed this myself The young people bowed in prayer and hugged one

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3342

another out of joy People were in heaven because of these young men who destroyed America andbombed this idol Am I right or not Was it like that or not

Back then when the Taliban broke off a piece of the nose of the Buddha statue which was hewnin the mountain an entire sermon was dedicated to it in the mosque in Mecca and the preacher was laterreprimanded for this sermon The entire Saudi people supported and loved Al-Qaeda

This went on until our brothers in Al-Qaeda ndash and I dont know what was going through theirminds ndash began to carry out operations inside Saudi Arabia Thats when we all raised our hands andsaid Youve gone too far We wont support you in this

The atmosphere here in Saudi Arabia is one of extremism It is characterized by focusing onminor details Many things are forbidden Yes maybe they are indeed forbidden but by forcing peopleto avoid them and by acting as if these were major sins an atmosphere was created that gave rise toextremist youth who might act recklessly at the most trivial provocation

For instance we blew out of proportion the issue of music the issue of smoking or the issue of hanging pictures in public places True there are clear texts on these issues but the young peopleembraced these issues as if they were fighting usury fornication or alcohol No these are not among theseven major sins So our society has become extreme

This extremist atmosphere has given rise to people who accuse others of heresy and people whopurport to be waging Jihad It has created genes that gave rise to cells of Al-Qaeda and other terrorists

We must examine our breeding ground in which these young men were sownBy Allah what can possibly emerge from such an atmosphere Muftis who accuse others of

heresy sheiks who incite and young people who bomb Am I right or not[Complete clip is available here httpwwwmemritvorgclipen3099htm]

Legal Aspects amp Lawfare| back to top |

Revisiting A Stale Counterterrorism Law

Council on Foreign Relations | 1 September 2011

ldquoNearly a decade after 911 the United States still relies on the 2001 Authorization for the Use of Military Force (AUMF) for the killing and detention of those considered responsible for or associatedwith the terrorist attacks But CFR national security law expert John Bellinger says it is becomingincreasingly difficult for the Obama administration to justify some of its counterterrorism operationsunder this limited statutory authority It has been used in defense of actions including drone attacks onindividuals as well as the targeting of groups in Yemen and Somalia that may have only the mosttenuous affiliation or association to the 911 attack A revised AUMF should clarify those operations aswell as the issue of detention specifically which individuals can be detained for how long and subjectto what processes There also needs to be greater effort at the international level he adds to fill thegaps in the law that covers conflicts between states and non-state actorsrdquohelliprdquo[Complete article is available here httpwwwcfrorgcounterterrorismrevisiting-stale-

counterterrorism-lawp25742]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3442

Narco-Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector[Complete article is available here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Mexicos Cartels Move Into Extortion

At a construction site of an apartment building in the heart of the Mexican capital a company engineerruns through his weekly payroll sheet He has salaries written out for carpenters bricklayers andelectricians At the bottom of the sheet is a notation of $200 for ldquosecurity servicesrdquo next to a nicknameldquoEl Indiordquo mdash the Indian [Complete article is available here

httpwwwtucsonsentinelcomnationworldreport090611_mexico_cartels_bribesmexicos-cartels-move-into-extortion ]

Seven Die In Mexican Pacific Port City

Latin American Herald Tribune

Seven people died in separate shootings in Mazatlan a port city in the northwestern Mexican state of Sinaloa with some of the incidents drug-related a police spokesman told Efe [Complete article is available herehttpwwwlahtcomarticleaspCategoryId=14091ampArticleId=423061]

Tijuana Violence Slows As One Cartel Takes Control

BorderlandBeatcom

Mexicos famously seedy border city of Tijuana is enjoying a lull in drug murders as the countrys mostpowerful cartel gains the upper hand over its rivals [Complete article is available here httpwwwborderlandbeatcom201109tijuana-violence-slows-as-one-cartelhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3542

Network Notes| back to top |

Canadian data foreign threats Spying in the digital age (Suggested by a reader in Lithuania ndash thanks) Globe and Mail | By Colin Freeze 31 July 2010

A government spy agency thatrsquos prohibited from monitoring Canadian citizens is now usingldquoinformation about Canadiansrdquo to zero in on foreign threatsThe ambiguous statement found in a new government report detailing the activities of CommunicationsSecurity Establishment Canada could sanction a range of intelligence-gathering activities ndash includingthe controversial practice of mining ldquometadatardquo from digital communications

Metadata ndash often called data about data ndash are found in e-mails and their attachments and containdigital signatures that can reveal when where and by whom documents were created

The collection of metadata has caused controversy in other countries but never in Canada wherethe Communications Security Establishment Canada operates as an ultra-secretive agency About theonly thing that is known about the classified practices is that they were halted and resumed after someldquomajor changesrdquo including directives signed by Defence Minister Peter MacKay

ldquoI cannot comment on specific operational activitiesrdquo Adrian Simpson a CSEC spokesman toldThe Globe He stressed that reviews upheld that the activities in question were ldquocarried out inaccordance with the law ministerial requirements and CSECrsquos policies and proceduresrdquo

ldquoCSEC is prohibited from directing its activities at Canadians anyone in Canada or Canadiansanywhere in the worldrdquo he said

For decades signals-intelligence agencies in the West have been allowed to safeguard nationalsecurity by eavesdropping on foreignersrsquo conversations Spies can whatever phone lines and satellitesignals they can so long as they never listen in on fellow citizens

But in the digital age governments run increasingly sophisticated dragnets scooping up andscouring through millions of intercepted Internet conversations daily Such practices create legalambiguities

ldquoThe whole issue of what constitutes boundaries for signals-intelligence agencies in cyberspaceis a big debate right nowrdquo said Rafal Rohozinski a security expert affiliated with the University of Torontorsquos Munk School

A watchdog agency that reviews the CSECrsquos activities released an annual report to Parliament onJuly 20 ldquoWhen other means have been exhausted CSEC may use information about Canadians when it

has reasonable grounds to believe that using this information may assist in identifying and obtainingforeign intelligencerdquo it reads

Sometimes collecting metadata is relatively benign It can involve aggregating sets of data tospot trends much like the way meteorologists discern national forecasts from localized information

For example while CSEC canrsquot usually monitor the communications of specific Canadian terrorsuspects it can glean insights by zooming out for big-picture patterns One way to do that MrRohozinski said would be to look at data flows between Canadian cities and Yemen where an Internet-savvy al-Qaeda offshoot works to recruit Westerners

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3642

Metadata however can be more revealing Documents that circulate on the Internet travelaround like postmarked letters marked with return addresses ndash e-mails and attachments have embeddedcodes that speak to the who where and when behind their creation

The US National Security Agency found itself mired in controversy a few years go after itskirted domestic-spying bans by secretly upholding that this sort of American metadata was fair gamedistinct from communication contents

Therersquos little to suggest the CSEC would go that far The federal agencyrsquos activities are reviewedby a watchdog body now headed by a former Federal Court of Appeal judge Robert Deacutecary appointedlast year wrote in his annual report that he was satisfied the CSEC activities in question are lawful evenif his predecessors felt them borderline

ldquoThis was the first review of these activities since hellip their resumption under new policiesrdquo thewatchdogrsquos report says It concludes that the surveillance activities are ldquoin accordance with the lawrdquo andfollow ldquomajor changes to certain policies procedures and practicesrdquo

Much of the concern arises from the possibility that CSEC could hand over metadata intelligenceto domestic law-enforcement and security agencies

As it stands the RCMP and CSIS have to develop their domestic investigations before coming toCSEC ndash usually with warrants ndash if they want specific intelligence The rules guiding handovers are strictbecause even though all agencies run surveillance operations they do so under vastly different

mandates and legal standardsThe spy agency however stood by its practicesldquoCSEC is extremely diligent when it comes to the privacy of Canadiansrdquo Mr Simpson said

[complete article is available here httpwwwtheglobeandmailcomnewsnationalcanadian-data-foreign-threats-spying-in-the-digital-agearticle2113772 ]

Cyber Attacks Against NATO Then And Now

New Atlanticist | 6 September 2011

ldquoNow that NATOrsquos Operation UNIFIED PROTECTOR over Libya is winding down it is worth

noting how few cyber incidents were directed in protest against the Alliance Certainly there was a

cyber component to the liberation of Libya but it was more about content and Internet freedom (the

most newsworthy elements here were the role of social media and the Libyan government taking largeparts of the nation offline) But compared to past history NATO cyber defenders had a relatively easy

time

ldquoNATO has not however had an easy 2011 Although there were three significant incidents we

know about none seemed to have been in direct response to operations over Libyahelliprdquo

[Complete article is available here httpwwwacusorgnew_atlanticistcyber-attacks-against-nato-then-

and-now]

The Calm Before The Storm

Foreign Policy | By Joel Brenner 6 September 2011

Cyberwar is already happening -- and its about to get much much worse A veteran cyberwarriorexplains how America can prepare itself

Revelations of wholesale electronic fraud and massive data heists have become weekly evendaily affairs A multinational electronics corporation loses personal information on more than 100million customers Cyberthieves break into an international bank counterfeit credit balances and lootATMs in four countries grabbing $9 million in just a few hours International gangs spread maliciouscode that conscripts unwitting computers into zombie armies of hundreds of thousands of similarlyenslaved machines Criminals then rent these armies called botnets as easily as you can buy a time-sharing arrangement in a beach condo No wonder the vast majority of Internet traffic is spam

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3742

Yet the loss of personal information and related criminal fraud intolerable as they are are theleast threatening face of electronic insecurity The US militarys secret network is penetratedAmericans corporate pockets are being picked clean of the intellectual property that makes the UnitedStates tick And the electricity grid that keeps the lights on and makes everything move is dangerouslyinsecure

In one remote attack on the Pentagons information systems about 10 years ago the Chinesehauled away up to 20 terabytes of information If the information had been on paper theyd have neededa line of moving vans stretching from the Pentagon to freighters docked 50 miles away in Baltimoreharbor just to haul it away Had they done so the military district of Washington wouldve become anactive theater of operations for the first time since 1865 and the Navy wouldve blockaded theChesapeake Bay But the Chinese did it electronically so who noticed

Corporate espionage by both competitors and foreign intelligence services or their surrogates isalso increasing Intelligence officials see this but cant speak openly about the specifics and Im seeingit now in my law practice The victims rarely admit it for understandable reasons Oracle whichsuccessfully sued SAP for theft of its software code was a prominent exception Google was another

When the Chinese penetrated Google in late 2009 -- yes that operation was Chinese and yes itwas done with the blessing of a member of the Politburo -- they werent after customer informationThey were after the source code that makes Google unique Nor was Google the only victim Thousands

of US and Western firms were penetrated in that affair Foreign governments -- and not only theChinese -- understand that they cannot compete with the United States militarily and politically if theycannot compete with it economically so their intelligence services want to steal its corporate intellectualproperty This is the technology that gives America its competitive edge and often it has nothing to dowith defense Ordinary companies with valuable technology are now being targeted by nation-statesThis is a new era National security and economic security have converged

The danger is not limited to the loss of technology and information however The owners andoperators of the North American electricity grid are hooking up their control systems to the Internet asfast as they can Exposing the grid to the Internet makes it marginally more efficient but it also makes itdramatically more vulnerable to disruption If you can remotely penetrate an electronic system to stealinformation you can remotely penetrate it to shut it down or make it go haywire This is why there is no

longer a meaningful difference between information security and operational security And the biggestoperational risk is the grid In contemporary society nothing moves without electricity If the grid goesout the country stops

As the Stuxnet affair demonstrated remotely engineered disruption of industrial control systemsis now a reality That episode involved the successful electronic attack on the centrifuges in the Iraniannuclear program Only a first-class intelligence agency could have pulled that off but the blueprint fordoing it -- the code itself -- is now public Many American industrial control systems run on the samekind of equipment the Iranians were using but unlike the controls on the Iranian centrifuges thecontrols on the US grid are now being connected to the Internet making them easier to disrupt Stuxnetwas a watershed there will be copycats

Other industrial control systems will also be targets Some already are Air traffic control

railroad switches and water and sewage systems are all electronically controlled now and many arevulnerable If an intruder can break into the right server electronically he can remotely shut downproduction send your goods to the wrong destination and even unlock your doors -- and delete your logentries so he leaves no record of ever having been there

The United States does not lack enemies who would attack it this way Seized al Qaedacomputers contain details of US industrial control systems In 2003 a group affiliated with thePakistani terrorist organization Lashkar-e-Taiba -- the same gang that engineered the 2008 terroristassaults in Mumbai -- plotted to attack the Australian grid Other groups conspired to attack the Britishgrid in 2004 2006 and 2009 Yet the owners and operators of the North American grid continue willy-

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3842

nilly to expose their control systems to the Internet instead of isolating and hardening it This is folly of a high order

Important conclusions for public and corporate policy follow from this vulnerable state of

affairs First cyber insecurity has operational consequences In the current and foreseeable states of technology a high degree of assurance against electronic penetration of anything connected to theInternet is not achievable Large efficient electronically connected organizations and nations aretherefore vulnerable to remotely engineered disruption as well as information theft

Second this risk cannot be eliminated -- but it can be reduced and managed As a nation theUnited States should start by isolating the grids controls from the Internet Undoubtedly there aremarginal efficiencies to be gained by seamless connectivity over a publicly accessible infrastructure butthese gains are usually exaggerated and the risk this connectivity creates is staggering The governmentand the major telecommunications carriers must also make the investment required to re-create themassive redundancies that made the wired telephone network so robust Resilience and swift recoveryshould be the goal If the consequences of cyberattacks were reduced penetration would cease to matter

Third companies that wait for the government to solve their own security problems do so attheir peril The government is broke and the IT backbone is 85 percent private so the governmentdoesnt control it The governments role in altering the status quo will be limited to setting standardsusing its purchasing power to move vendors toward better security and getting its own house in order

The government can neither secure corporate intellectual property nor protect firms against operationaldisruption

Fourth in a world in which everything cannot be protected companies must determine forthemselves what intellectual property and physical assets to isolate and safeguard Those that approachthis task seriously will quickly learn that technology is only one aspect of their insecurity and in manycases the easiest to deal with Unless technology is integrated with personnel practices and operationalsecurity it opens vulnerabilities that its users rarely understand This kind of integration requires theautomated enforcement of reasonable security policies and systematic workforce training and thatoccurs only when management the lawyers and the technologists work closely together This is an old-fashioned management challenge -- not a technological one For their part corporate boards need to takeIT security seriously and launch audits that examine how their systems are actually implemented and

used not merely how they are designed Because as the techies like to put it the weakest link in anysystem is not the silicon-based unit on the desk its the carbon-based unit in the chair Joel Brenner is author of the forthcoming America the Vulnerable Inside the New Threat Matrix of

Digital Espionage Crime and Warfare He has served as the inspector general of the National Security

Agency the national counterintelligence executive and the NSAs senior counsel He now practices law

at Cooley LLP in Washington DC

Cyberattacks Decline Slightly Symantec Report Finds

Dark Reading | 1 September 2011

Organizations worldwide are suffering damages as a result of cyberattacks but interestingly there hasbeen a slight decline in these attacks during the past 12 months according to a new report from

Symantec More than 90 percent of the more than 3300 respondents across 36 countries said theyexperienced tangible losses as a result of a hack with 84 percent reporting financial loss to the cost of abreach Around one-fifth lost at least $195000 in breaches during the past 12 months

Meanwhile Symantec attributes the unexpected bright spot of a decline in breaches toorganizations employing better cybersecurity defenses More than 70 percent of organizations sawattacks in the past 12 months a decline of 5 percent from 2010 And those that experienced anincreasing frequency of attacks dropped from 29 percent in 2010 to 21 percent this year While 100percent last year reported losses from cyberattacks 92 percent did so in 2011 The trend seemscounterintuitive given the rash of high-profile breaches this year More

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 22: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2242

The files cover information received by the CIA on Abdel Basset al-Megrahi Al-Megrahi is theonly person ever convicted in the Pan AM 103 case The Scottish government in 2009 allowed al-Megrahi to be released from custody and returned to Libya because of his failing health With the recentfall of Muammar Qaddafis regime there have been renewed calls for al-Megrahi to be returned toScottish custody or extradited to the United States and put on trial[Complete article is available here httpwwwwebwirecomViewPressRelaspaId=144692]

Getting The Caucasus Emirate Right

CSIS | August 2011

ldquohellipThis report aims to set straight a rather distorted record It demonstrates the veracity of three vitallyimportant facts usually obfuscated in discussions of the subject (1) the longstanding and growing tiesbetween the CE and its predecessor organization the ChRI on the one hand and al Qaeda (AQ) and theglobal jihad on the other hand (2) the importance of the CE jihadi terrorist network as a united andorganized political and military force promoting jihad in the region and (3) the salience of local culturaland the Salifist jihadist theo-ideology and the influence of the global jihadi revolutionarymovementalliance as key if not the main factors drive the ldquoviolence in the North Caucasusrdquohelliprdquohttpcsisorgfilespublication110829_Hahn_GettingCaucasusEmirateRt_Webpdf

7 Things You Didnrsquot Know About the War on TerrorForeign Policy | By Eric Schmitt and Thomas Shanker 6 September 2011

From an attempt to negotiate with Osama bin Laden to a proposal to threaten to bomb Mecca its been awild decade for the US national security establishment

Our new book Counterstrike The Untold Story of Americas Secret Campaign Against Al Qaeda is in many ways asummary of the past decade of our reporting on the military intelligence community and domestic law enforcement as itentered a new era of Darwinian evolution to counter violent extremism

It also is our deep dive into a decade of American counterterrorism efforts -- from the work of commando trigger-pullers and spies on the ground up to senior political leaders who wanted to defendthe nation (and get re-elected) Our efforts to report and write this book allowed us to uncover many newmissions never discussed before -- and gave us an understanding of how the war on terror had changedover the last decade

Our book assesses the 10 years since 911 as the military divides the fight into tactical missionson the battlefields of modern terrorism then the operational advancements that provided the means tosuccess while not securing final victory and at the top the strategic level of policy debates about howthe nation should combat this threat to its security

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2342

Here are seven vignettes from Counterstrike that offer glimpses into the thinking of policymakers andcommanders in early days after the Sept 11 attacks and how that thinking evolved over the followingdecade into a more whole-of-government approach to combating terrorists

1 Bush Tried to Negotiate with al Qaeda

The George W Bush administration like all of its predecessors swore never to negotiate with terroristsBut it did undertake an extraordinary and extraordinarily secret outreach effort to open a line of communication with Osama bin Laden and al Qaedas senior leadership It was an attempt to replicatehow the United States tried to sustain a dialogue with the Soviet Union even during the darkest days of the Cold War when White House and Kremlin leaders described in private and in public a set of acceptable behaviors -- and described with equal clarity the swift vicious even nuclear punishment forgross violations

In the months after the Sept 11 attacks Bushs national security staff working through theintelligence agencies made several attempts to get a private message to bin Laden and his inner circleThe messages were sent through business associates of the bin Laden familys vast financial empire aswell as through some of the al Qaeda leaders closest relatives a number of whom were receptive toopening a secret dialogue to restrain and contain their terrorist kinsman whom they viewed as a blot on

their name (To be sure other relatives were openly hostile to the American entreaties)According to a senior American intelligence officer with first-hand knowledge of the effort the

response from Osama bin Laden was silence And the effort was suspended

2 Sometimes a Wedding Is Just a WeddingIn the early days after the Sept 11 attacks the CIA and FBI vied to produce the most compellingintelligence reports that tracked suspected terrorist plots The agencies often worked at cross purposessometimes unwittingly At one point in early 2002 both agencies were tracking what American analystssaid were growing preparations for a major wedding somewhere in the Midwest (In terroristvernacular the word wedding is often code for a major attack)

Dribs and drabs on this wedding planning made their way to President Bush from bothagencies independent of each other of course

Finally over the Easter holiday during a video-teleconference with top aides in Washingtonfrom his ranch in Crawford Texas Bush stopped the briefing exasperated by the discrepancies in therival agencies reporting about the suspected threat

George Bob get together and sort this out Bush told his CIA director George J Tenet andFBI director Robert S Mueller III

Bushs instincts were correct When the analysts finally untangled their clues it turned out thatthe ominous wedding really was just that the matrimony of a young man and a young woman fromtwo prominent Pakistani-American families There was no threat There was no plot

3 The Threat to Bomb MeccaAs fears of a second attack mounted following the 911 strikes US government planners franticallycast about for strategies to protect the country Even the most far-fetched ideas had a hearing howeverbriefly In one case some government planners proposed that if al Qaeda appeared ready to attack America again the United States should publicly threaten to bomb the city of Mecca in Saudi Arabiathe holiest site in all of Islam in retaliation Just nuts one Pentagon aide wrote to himself when heheard the proposal The idea was quickly and permanently shelved

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2442

4 The SEAL Raid in Iran That Didnt HappenWhen US forces routed the Taliban government in Afghanistan and forced bin Laden and his toplieutenants to flee many senior al Qaeda leaders including bin Laden and his deputy Ayman al-Zawahri escaped to neighboring Pakistan But a separate group including the al Qaeda leaders sonSaad bin Laden fled to northern Iran where American troops would not pursue them and the Iranianswould likely not detain them But the Shiite clerics running Iran placed the al Qaeda operatives and theirfamily members under virtual house arrest and they became a shield against possible attacks from theSunni-based terrorist organization

One plan in particular illustrated the bold thinking and wildly unrealistic aims of the militarysinitial approach after 911 to kill or capture terrorist leaders The plan called for hunting the eight to 10senior al Qaeda leaders and operatives who had sought refuge in Chalus an Iranian resort town on theCaspian Sea where they had been detained

At the Joint Special Operations Command at Fort Bragg NC military planners drew up optionsfor Navy SEALs to sneak ashore at night using state-of-the-art mini-submarines Once they landed theSEALs would slip past Iranian guards to snatch the al Qaeda leaders Another option called for SpecialOperations helicopters to spirit American commandos into the town and whisk them out again with theirquarry The Americans went as far as conducting two or three rehearsals at an undisclosed locationalong the US Gulf Coast in early 2002 They conducted small-boat insertion exercises involving about

30 Special Operations personnel most SEALs and eventually concluded the mission was feasible if they were provided with more detailed intelligence on the locations of the al Qaeda members and thesecurity around them

The logistics of the mission were daunting Chalus sits at the edge of the Elburz coastal mountainrange about 70 miles north of Tehran and the failed rescue of the American hostages in Iran in April1980 loomed large in commanders memories Eventually Gen Richard B Myers the chairman of theJoint Chiefs of Staff rejected the mission as too risky and too politically volatile Many of the al Qaedaoperatives are reportedly still there

5 Intelligence Hauls of Unusual Size

US intelligence and military commandos have carried out tens of thousands of raids in the decade since911 The amount of material seized from terrorist and insurgent targets has grown to a massive sizeThe Defense Intelligence Agency (DIA) operates exploitation triage centers and giant warehouses forstoring intelligence products -- in war zones rear headquarters in countries like Qatar and back in theUnited States One intelligence analyst said that walking into one of the warehouses for documents andmedia exploitation reminded him of the final scene in Raiders of the Lost Ark when the captured Ark of the Covenant is crated up and rolled into a cavernous storage area that contains all the governmentsother dangerous secrets

All told more than two million individual documents and electronic files have been cataloguedby media type hard copy phone number thumb drive Each is inspected by a linguist working with acommunications analyst or computer expert

The DIA analysts are joined by specialists from other agencies including the FBI and the DrugEnforcement Administration Yet given the overwhelming volume no more than about 10 percent of thecaptured intelligence has ever been analyzed

Intelligence officers say they simply are overwhelmed and untold quality leads may still beburied in the piles of computers digital files travel documents and pocket litter

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2542

6 The Digital Counterjihad Cyberspace is the terrorists ultimate safe haven Its where they recruit raise money and even plotattacks using coded language while playing online video war games The US government fights back

One technique is called false band replacement whereby the intelligence agencies infiltratemilitants networks and post their own material to counter extremist efforts on those same jihadistwebsites The trick is to forge the onscreen trademarks -- web watermarks -- of al Qaeda media sites

This makes messages posted on these sites official and sows dissent and confusion among themilitants

This Internet spoofing can be used in support of more traditional combat missions There is atleast one case confirmed by American officials in which a jihadist website was hacked by Americancyberwarriors to lure a high-value al Qaeda to a surreptitious meeting with extremist counterparts -- onlyto find a US military team in waiting

Getty images

7 First Kill the MullahsUS counterterrorism officials have learned fighting terrorists effectively means targeting specific nodesof that network that support and enable militants who strap on suicide vests This strategy focuses onneutralizing enablers such as the financiers gun-runners and logisticians Among these terror linchpins

are religious leaders who bless attacksHeavenly reward will not await a suicide bomber unless his death and those of his victims is

deemed halal in keeping with Islams sacred sharia law Each militant network has a sharia emir usuallyat the level of a sheikh or mullah In Iraq American commanders specifically killed emirs to throw awrench in a suicide bombing networks

Take him out and suicide bombings from that network are frozen until he is replaced said onemilitary officer with command experience in Iraq hellip[Complete article is available herehttpwwwforeignpolicycomarticles201109067_things_you_didn_t_know_about_the_war_on_terror]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2642

Dick Marty Rendition Report Condemns lsquoCult of Secrecyrsquo

BBC News | 8 September 2011

A report for Europes human rights watchdog has called for greater scrutiny of secret services andsupport for whistleblowers The Council of Europe investigated how countries like Britain GermanyRomania and Lithuania assisted the US with the rendition of terror suspects It said a cult of secrecyhad helped Western governments cover up abuses Defending whistleblowers it singled out USsoldier Bradley Manning accused of passing secrets to Wikileaks He had acted as a whistleblowerand should be treated as such CoE rapporteur Dick Marty wrote in the report which was due to besubmitted to the CoEs Parliamentary Assembly The soldier is currently in a US military prisonawaiting trial for passing restricted material to the controversial website

But the report praised Mr Manning and Wikileaks itself for uncovering evidence of renditionThe CoE represents 47 member-states including both EU countries and Russia and other ex-Sovietstates Mr Martys report focused on the record of Western states explaining that it was based oninvestigations into European links to the controversial US policy of rendition for terrorism suspectsThe CIA allegedly flew terror suspects around the world for interrogation in the years after 911 holdingthem in secret prisons in Europe and elsewhere

No licence to kill

In his 48-page report - entitled Abuse of State Secrecy and National Security - Mr Marty looked at thelevel of control exercised by European states over their security services He urged all states to useindependent parliamentary committees to oversee the work of their secret services saying this was of vital importance for the rule of law and democracy Mr Marty argued that Western governments wereusing the notion of state secrecy to shield their intelligence services from accountability for seriousviolations committed during anti-terrorist operations We consider that this is simply unacceptablehe wrote

A licence to kill (or to abduct and torture) only exists in certain films and in dictatorialregimes In democratic systems parliaments as representatives of the people have a right and duty toknow what the government is doing in the name of the people Mr Marty praised investigative journalists and non-governmental organisations for their work in exposing abuses of authority Stressing

the fundamental role whistleblowers had to play in an open society he warned against a real cult of secrecy as an instrument of power

While it was up to the courts to decide if Bradley Manning had committed any crime he wrotethe CoE was indebted to him for the publication of a recording of a helicopter attack in Iraq in whichthe crew seems to have intentionally targeted and killed civilians

Thanks to Mr Manning he said a large number of embassy reports had allowed us to learnsignificant details of important recent events which are obviously of general interest We therefore join Amnesty International in expressing our worries as to the treatment he receives Mr Marty wrote inthe draft report[Article continues here httpwwwbbccouknewsworld-europe-14820145]Comment This report demonstrates that Dick Marty is not as De Gaulle would say a serious man To

suggest that Bradley Manning is a hero and intelligence agencies bent on defeating terrorists arecriminals should say it all Manning knowingly violated his oath and willfully provided enormousamounts of classified material to WikiLeaks For Marty this is a good thing in the name of transparencyMarty always injudicious and anti-American in his remarks is now moving at warp speed into crackpotterritory

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2742

Al Qarsquoida amp its Affiliates| back to top |

Al Qaeda Is Down Not Out

Los Angeles Times | By Amy Zegart 7 September 2011

US talk of defeating terrorism is dangerously prematureTalk of strategically defeating Al Qaeda is all the rage in the White House these days Defense

Secretary Leon Panetta used the D-word in July President Obama declared in his new counter-terrorism strategy We can say with growing confidence that we have put Al Qaeda on the path todefeat Compared to the woeful state of the economy terrorism has become the administrations feel-good story of the year

Defeat is a big word It is also dangerously misleading Yes the United States has made greatstrides in the last decade to harden targets improve intelligence and degrade the capabilities of violentIslamist extremists Osama bin Ladens death was a major accomplishment But the fight is nowhereclose to being won and Americas most perilous times may lie ahead Three reasons explain why

The first is that strategically defeating Al Qaeda is not nearly as important as it sounds After911 Al Qaeda morphed into a more complicated decentralized and elusive threat consisting of threeelements core Al Qaeda affiliates or franchise groups operating in places like Yemen and Somalia with

loose ties to the core group and homegrown terrorists inspired by violent extremism often through theInternet in the comfort of their own living rooms

Core Al Qaedas capabilities started degrading in 2001 when the US invaded Afghanistandismantled training camps ousted the Taliban and sent Bin Laden running The CIA has estimated thecore group remaining in the AfghanistanPakistan region to number 50 to 100 fighters The last time BinLaden oversaw a successful operation was 2005 when Al Qaeda struck the London transit system

But plots by homegrowns and franchise groups have risen dramatically in recent years The 2009Ft Hood shooting the worst terrorist attack on US soil since 911 was the work of a homegrownterrorist The mastermind of the 2010 Times Square car bomb plot was a naturalized American citizentrained by the Pakistani Taliban not Al Qaeda Another franchise group Al Qaeda in the ArabianPeninsula was behind the foiled 2009 Christmas Day underwear bomber aviation plot and the 2010

plot to explode tampered printer cartridges aboard cargo planes The Bipartisan Policy Center reported11 violent Islamist extremist terrorist incidents against the US homeland in 2009 the most since 911Nearly all involved what former CIA Director Mike Hayden calls a witches brew of radicalizedAmericans and franchise groups

The second reason why talk of defeat is premature has to do with weapons Terrorism againstAmericans is nothing new The potential for terrorist groups to acquire weapons of mass destruction isIn 1995 a Japanese cult released sarin nerve gas in the Tokyo subway killing 12 people and injuringthousands It was the first WMD terrorist attack in modern history and it sparked a wave of presidentialterrorism commissions years before Bin Laden became a household name

It is this specter of the lone fanatic or small group armed with the worlds most devastatingweapons that keeps experts up at night In 2005 60 leading nuclear scientists and terrorism experts were

asked how many believed the odds of a nuclear attack on the US were negligible Only three or fourhands went up most were far more pessimistic Today there is enough nuclear material to build120000 weapons As long as fissile material is poorly stored and rogue states like Iran and North Koreacontinue their illicit weapons programs nuclear terrorism remains a haunting possibility

The third reason is that the FBI has not yet become a first-rate domestic intelligence agencyAnalysts whose work is vital to success are still second-class citizens labeled support staff alongsidesecretaries and janitors and passed over for key jobs including running the bureaus intelligence unitsThe FBIs information technology is so antiquated it belongs in a museum And the old crime-fighting

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2842

culture still lives There is now a move afoot to shrink new classified facilities so that agents dont haveto waste time away from their cases to read intelligence documents thereStrategically defeating Al Qaeda sounds too good to be true Because it is Amy Zegart is a senior fellow at Stanfords Hoover Institution and the author of Eyes on Spies

Congress and the United States Intelligence Community

US Counterterror Chief Al-Qaida On Steady Slide

Bostoncom | 31 August 2011

White House counterterrorism chief John Brennan said al-Qaida is on a steady slide after the death of al-Qaidas latest second-in-command in Pakistan Brennan told The Associated Press on Wednesdaythat its a huge blow in the first official White House comment since Atiyah Abd al-Rahmans reportedkilling by CIA drone strike in Pakistans tribal areas last week

Al-Qaida is sort of on the ropes and taking a lot of shots to the body and the head Brennansaid This is a time not to step back and let them recover a message he says hes sending to hiscounterparts in Pakistan[Article continues herehttpwwwbostoncomnewsnationwashingtonarticles20110831us_counterterror_chief_al_qaida_on_steady_slide ]

Al-Qaeda (AKA Al-Qaida Al-Qarsquoida)

Council on Foreign Relations | 29 August 2011

ldquoAl-Qaeda an international terrorist network is considered the top terrorist threat to the United StatesThe group is wanted for its September 11 2001 attacks on the World Trade Center and the Pentagon aswell as a host of lesser attacks To escape the post-911 US-led war in Afghanistan al-Qaedas centralleadership fled eastward into Pakistan securing a safe haven in loosely governed areas there In July2007 US intelligence agencies found that the organization was regrouping and regaining strength inthese tribal areas along the border with Afghanistan though targeted killings of senior al-Qaeda leadershave since diminished the groups command and control capabilities In February 2009 Director of National Intelligence Dennis C Blair told lawmakers that the groups core is less capable and effective

than it was a year ago The killing of al-Qaedas top leader Osama bin Laden by US forces in Pakistanin May 2011 served a significant blow to the organization but analysts say al-Qaeda remains deadlywith its networks spread all over the world Plus a number of affiliated groups have gained prominencein recent years complicating the task of containing the organizationrdquo

[Article continues here httpwwwcfrorgterrorist-organizationsal-qaeda-k-al-qaida-al-qaidap9126]

Al Qaeda In The Islamic Maghreb

CSIS | 1 September 2011

ldquoAl Qaeda in the Islamic Maghreb (AQIM) emerged from a decades-long militant Islamist tradition inAlgeria In 1998 the Salafist Group for Preaching and Combat (Groupe Salafiste pour la Preacutedication etle Combat or GSPC) broke away from the Armed Islamic Group (GIA) because of the GIArsquos extensive

targeting of civilians Gradually the GSPC evolved to encompass global jihadist ideology in addition toits historical focus on overturning the Algerian state In 2006 the GSPC officially affiliated with alQaeda core soon rebranding itself as al Qaeda in the Islamic Maghreb In the following years AQIMwas able to conduct a small number of large-scale attacks most notably its 2007 bombing of the UNheadquarters in Algiers In recent years counterterrorism pressure and weak governance have combinedto shift the center of AQIMrsquos presence to the Sahara-Sahel region AQIM continues to make its presenceknown through smuggling operations kidnappings and clashes with security forces in the desert In thecoming years general instability within the region could allow AQIM to further expand its influencerdquo[Complete article is available here httpcsisorgfilespublication110901_Thornberry_AQIM_WEBpdf ]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2942

AQ Strategy

The Assynt Report | 11 August 2011

Executive Summary Al-Qaedarsquos broad objectives remain unchanged in the wake of bin Ladenrsquos death There

are nonetheless growing questions over al-Qaedarsquos capability Longstanding paranoiaover the use of electronic communications is heightened by the ongoing US dronecampaign whilst attacks against the West have generally been disrupted at an early stage

The Pakistani Talibanrsquos attack on a Karachi naval base in May 2011 was a significantmilitary success and the first major act of revenge for bin Ladenrsquos killing Furtherattempts to avenge his loss are certain

All parts of al-Qaeda are working within a cohesive framework with the ultimate aim of restoring the Islamic Caliphate (Khilafa) The strategic plan to support this aim wasdrafted by 40 of al-Qaedarsquos brightest thinkers in Kandahar Afghanistan in November1999 This plan consists of four phases each seven years long leading to the dissolutionof corrupt regimes and the union of all newly-liberated states within the Khilafa

Apart from mounting strategic operations al-Qaedarsquos role is to be the inspiration for atruly global jihadist movement It seeks to achieve this through provision of trainingbeing a role model for others to follow extending acceptance and adoption of its tactics

particularly suicide bombings and professionalising jihadist media to build a commonbrand and message between hitherto separate groups

Between the late 1990s and 2003 the organisation was primarily devoted to classicinternational terrorism Most effort is now spent fighting insurgencies from North Africato South Asia The way in which this strategy helps to spread the struggle has been seenin North-West Africa where the initial development of al-Qaeda in the Islamic Maghrebwas in part fed by men returning from fighting with al-Qaeda in Iraq

Since mid-2009 al-Qaeda and its affiliates have increasingly encouraged jihadist-sympathisers resident in Western countries to engage in violence themselves withoutcentral direction or training making surveillance more difficult

One of the keys to awakening the spirit of jihad was the success in portraying the US and

its allies as Crusaders in the Muslim world Al-Qaedarsquos strategy essentially requires thatthis process be kept running until the forces of jihad have grown large enough to launchsuccessful liberation operations

Despite its successes in Afghanistan al-Qaedarsquos credibility has suffered both from its failure to landanother strategic blow on the West on the scale of 911 and also excessive Muslim casualties in someoperations Similarly al-Qaeda in Iraq was set back by its excessive sectarian zeal and local resentmentat the foreign fighter presence In turn this affected the movementrsquos funding from the Gulf

Analysis Sub-Saharan African Leaders Media Focus On Threats Prior to 911

OSC Feature | Sub-Sahara Africa -- OSC Analysis 6 September 2011Statements by Sub-Saharan African leaders and African media reports on terrorism prior to the 10thanniversary of 911 focus on the growing threats from local extremists and Al-Qaida affiliatesparticularly in West Africa with little direct commentary on the anniversary or US counterterrorismpolicies This focus on domestic threats suggests that counterterrorism messages expressing solidaritywith African nations and acknowledging the evolving terrorist threat on the continent would have thegreatest resonance with African audiences

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3042

Leaders Stressing Determination To Counter Local Threats African leaders public statements reflect an ongoing concern about the threat of terrorism on thecontinent and a strong commitment to find ways to combat this threat

Nigerian President Goodluck Jonathan emphasized the governments commitment tovigorously combat terrorism following the 26 August bombing of the UN office inAbuja by Nigerian extremist group Boko Haram reported the Paris-based news agencyAFP President Jonathan is hosting Liberian President Ellen Johnson Sirleaf and otherforeign dignitaries for a three-day forum on terrorism and economic crimes the widelyread Lagos-based independent daily The Guardian reported on 4 September

Malian President Amadou Toumani Toure launched a Special Program for PeaceSecurity and Development on 9 August stating that development remained the mostviable solution to counter threats to the countrys stability reported Malis state-owneddaily LEssor[ 3] The program aimed to undermine support for Al-Qaida in the IslamicMaghreb (AQIM) according to Burkinabe web portal Lefasonet on 11 August

Somali Prime Minister Abdiweli Muhammad Gas stated on 23 August that theTransitional Federal Government planned to remove Al-Shabaab from the central andsouthern regions in Somalia with the goal of restoring peace within one year so the

country can hold national elections according to the Puntland-based Garowe Online

Experts Media Highlight New Capabilities Tactics

African experts and media outlets are warning about the evolving nature of terrorist organizations on thecontinent the terrorists pursuit of new targets and tactics and their potential for taking advantage of regional instability

Leading South African think tank the Institute for Security Studies stated on 29 Augustthat Boko Harams attack on the UN in Abuja completes Boko Harams metamorphosisinto an international terrorist group Since December 2010 Boko Haram had killed over600 people in over 70 attacks against Nigerian targets according to the think tank buthad not previously targeted Western or international interests

A 26 August article on the popular Malian web portal Maliweb voiced concern thatAQIM could benefit from Tuareg mercenaries many of whom were recently returningfrom fighting in Libya and could benefit from an increase in arms trafficking through theSahel during the Libyan conflict

Ugandas privately owned Daily Monitor reported on 19 August that AU forces inSomalia warned that Al-Shabaab planned to increase the number of kidnappings andbomb attacks as part of its new strategy to shift from controlling territory in Mogadishuto conducting more of an insurgent campaign

Concern Over Al-Qaida Presence Terrorist Collaboration

West African official statements and media reports reflect a growing concern over an increased Al-

Qaida presence in West Africa and collaboration with AQIM Al-Shabaab and Boko Haram

Nigerian security services reported that the suspected mastermind behind the 26 Augustbombing of the UN office in Abuja was a Boko Haram member with close links to Al-Qaida and Al-Shabaab according Nigerias privately owned Daily Sun

A 28 August report in the privately owned daily Nigerian Tribune claimed that the 26August bombing in Abuja was part of Al-Qaidas plans to mark the 10th anniversary of 911 and called Boko Haram Al-Qaidas ally in the region

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3142

An 8 August commentary in Burkina Fasos LObservateur Paalga said that reports of Boko Haram collaboration with Al-Shabaab and AQIM could indicate that Al-Qaida isextending its African tentacles Abdourahmane Dieng security division chief of theEconomic Community of West African States said the collaboration represented a veryserious threat according to Senegals progovernment Le Soleil on 5 August

Messages Likely To Resonate With African Audience

Sub-Saharan Africas increasing concern about the shifting nature and potential strengthening of theterrorist threat on the continent suggests that messages directly addressing the impact of terrorism onAfricans the increasingly complex nature of the threat and the need for multilateral cooperation againstterrorism are most likely to resonate with Africans

Messages expressing solidarity and sympathy for Africans affected by Boko Haram Al-Shabaab and AQIM would almost certainly resonate with a broad African audience

African political and military leaders would probably welcome acknowledgement of thecomplex and changing nature of terrorism on the continent and recognition of theirinitiatives and commitment to countering violent extremism

African leaders and medias concern about potential collaboration between Boko Haram

Al-Shabaab and AQIM suggest that they would be open to improving multilateral andcross-regional sharing of lessons learned and strategies to counter the intensification of terrorism within Africa

Aviation and Maritime Security| back to top |

Bomb Threats Force Jets To Land

Associated Press | 7 September 2011

Both landed safely one landed in Ankara Ataturk International Airport and the other at Kuala LumpurTwo flights operated by Pakistans state-owned airline received bombs threats on Wednesday

and both landed safely one in Turkey the other in Malaysia officials said No bombs were found The

first flight was headed for Manchester England when it was notified of the threat near the Bulgariancapital of Sofia The crew contacted the control tower in Istanbul to seek permission for the landingstate-run Anatolia news agency reported Authorities quickly evacuated all 378 passengers from theBoeing 777-300ER aircraft after it parked at a remote corner of the International Ataturk Airport andbomb squads began searching the plane with sniffer dogs Anatolia reported PIA spokesman MashoodTajwar confirmed the flight received a threat and landed All passengers were safe A police searchturned up no bomb officials said Later a second PIA flight from Islamabad to Kuala Lumpur alsoreceived a bomb threat It landed in Kuala Lumpur and all the passengers disembarked safely saidTajwar The UK-bound Pakistan International Airlines plane was forced to make an emergency landingat Ataturk Airport in Istanbul after receiving a bomb threat Malaysias airports authority said thepassengers were being screened and the plane was isolated in a parking area while being searched bypolice No bomb was found

It said the plane carried 164 passengers and 13 crew Azmi Murad senior general manager forthe authority said the Pakistani airline informed it that the warning came by email Mr Tajwar gave nodetails on the nature of the threat or how it was delivered Pakistan is home to al Qaedas top leadershipMilitants who trained there have been responsible for many of the attacks and failed plots in the USand Europe since Sept 11 2001 when planes hijacked by al Qaeda militants destroyed the World TradeCenter in New York and crashed into the Pentagon The bomb threats came four days before the 10thanniversary of 911 but there was no apparent link to Islamist militants who typically do not alertauthorities in advance The FBI and Homeland Security department issued warnings last weekend aboutal Qaeda threats to small airlines

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3242

Commentary amp Opinion| back to top |

From Terror Group Founder To Libyan Rebel Military Commander

ABCNews | 29August 2011

The same man who triumphantly led Libyan rebels into Gadhafis compound last week first came to theattention of the US intelligence community years ago - as a founder of a terror group

Abdelhakim Belhaj who was recently appointed to Tripolis rebel military council was one of the original founders of the Libyan Islamic Fighting Group an anti-Gadhafi group which was laterdesignated by the US State Department as a terrorist organization with links to al Qaeda according toUS government reports

We proudly announce the liberation of Libya and that Libya has become free and that the ruleof the tyrant and the era of oppression is behind us a victorious Belhaj told reporters after the stormingof Gadhafis Bab al-Aziziya compound last week Ousting Gadhafi had been the main objective of theLIFG since its inception in the early 1990s even if some of the fighters believed that meant puttingAmericans in the crossfire

The group carried out operations against the Libyan government including at least four suspectedassassination attempts against Gadhafi in the 1990s and was also believed to be connected to a series of suicide bombings in Casablanca Morocco in 2003 the US State Department reported As relationsbetween the US and Gadhafi improved in the mid-2000s some LIFG leaders cultivated relationshipswith top al Qaeda leaders including Osama bin Laden and were suspected of funneling fighters to Iraq tocarry out operations against US soldiers

When the LIFG was designated a terror organization in 2004 it was meant as a gesture of solidarity with the Libyan government according to a March 2011 congressional report

Contrary to several US government reports Libyan rebel ambassador to the US Ali Aujalitold ABC News that the LIFG was never connected to al Qaeda and did not carry out terrorist operations

They were only opposed to Gadhafi during his rule and paid the price for that by beingoppressed by the regime Aujali said

The CIA first publicly voiced its concerns about the connection between the LIFG and al Qaedain 2004 when then-director George Tenet testified before the Senate Select Committee on Intelligenceand listed the LIFG among groups that represented an immediate threat [that] has benefited from alQaeda links[Article continues here httpabcnewsgocomBlotterterror-group-founder-libyan-rebel-military-commanderstoryid=14405319]

Interview With Saudi Sheik Wajdi Al-Ghazawi

MemriTVcom

Sheik Wajdi al-Ghazawi owner of al-Fajr TV criticizes extremist atmosphere in Saudi Arabia and saysafter 911 They Handed Out Sweets on the Streets of Mecca

Following are excerpts from a statement by Saudi Sheik Wajdi Al-Ghazawi owner of Al-FajrTV which was posted on YouTube on August 4 2011

Wajdi Al-Ghazawi When Al-Qaeda and Osama Bin Laden were at the height of their mightthey were extremely popular in Saudi Arabia From mosque pulpits across Saudi Arabia preacherswould pray for their success Moreover from the pulpits of the most important mosques ndash the Al-HaramMosque in Mecca and the Nabawi Mosque in Al-Madina ndash direct prayers for the success of Al-Qaedawere made during the days of the bombing of Tora Bora Oh Allah help our brothers in AfghanistanThese supplications were made during evening prayers as well as Friday prayers The preachers wouldpray for them in violation of the ministrys instructions

When the twin towers in New York were attacked they handed out sweets on the streets of Mecca By Allah they did I witnessed this myself The young people bowed in prayer and hugged one

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3342

another out of joy People were in heaven because of these young men who destroyed America andbombed this idol Am I right or not Was it like that or not

Back then when the Taliban broke off a piece of the nose of the Buddha statue which was hewnin the mountain an entire sermon was dedicated to it in the mosque in Mecca and the preacher was laterreprimanded for this sermon The entire Saudi people supported and loved Al-Qaeda

This went on until our brothers in Al-Qaeda ndash and I dont know what was going through theirminds ndash began to carry out operations inside Saudi Arabia Thats when we all raised our hands andsaid Youve gone too far We wont support you in this

The atmosphere here in Saudi Arabia is one of extremism It is characterized by focusing onminor details Many things are forbidden Yes maybe they are indeed forbidden but by forcing peopleto avoid them and by acting as if these were major sins an atmosphere was created that gave rise toextremist youth who might act recklessly at the most trivial provocation

For instance we blew out of proportion the issue of music the issue of smoking or the issue of hanging pictures in public places True there are clear texts on these issues but the young peopleembraced these issues as if they were fighting usury fornication or alcohol No these are not among theseven major sins So our society has become extreme

This extremist atmosphere has given rise to people who accuse others of heresy and people whopurport to be waging Jihad It has created genes that gave rise to cells of Al-Qaeda and other terrorists

We must examine our breeding ground in which these young men were sownBy Allah what can possibly emerge from such an atmosphere Muftis who accuse others of

heresy sheiks who incite and young people who bomb Am I right or not[Complete clip is available here httpwwwmemritvorgclipen3099htm]

Legal Aspects amp Lawfare| back to top |

Revisiting A Stale Counterterrorism Law

Council on Foreign Relations | 1 September 2011

ldquoNearly a decade after 911 the United States still relies on the 2001 Authorization for the Use of Military Force (AUMF) for the killing and detention of those considered responsible for or associatedwith the terrorist attacks But CFR national security law expert John Bellinger says it is becomingincreasingly difficult for the Obama administration to justify some of its counterterrorism operationsunder this limited statutory authority It has been used in defense of actions including drone attacks onindividuals as well as the targeting of groups in Yemen and Somalia that may have only the mosttenuous affiliation or association to the 911 attack A revised AUMF should clarify those operations aswell as the issue of detention specifically which individuals can be detained for how long and subjectto what processes There also needs to be greater effort at the international level he adds to fill thegaps in the law that covers conflicts between states and non-state actorsrdquohelliprdquo[Complete article is available here httpwwwcfrorgcounterterrorismrevisiting-stale-

counterterrorism-lawp25742]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3442

Narco-Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector[Complete article is available here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Mexicos Cartels Move Into Extortion

At a construction site of an apartment building in the heart of the Mexican capital a company engineerruns through his weekly payroll sheet He has salaries written out for carpenters bricklayers andelectricians At the bottom of the sheet is a notation of $200 for ldquosecurity servicesrdquo next to a nicknameldquoEl Indiordquo mdash the Indian [Complete article is available here

httpwwwtucsonsentinelcomnationworldreport090611_mexico_cartels_bribesmexicos-cartels-move-into-extortion ]

Seven Die In Mexican Pacific Port City

Latin American Herald Tribune

Seven people died in separate shootings in Mazatlan a port city in the northwestern Mexican state of Sinaloa with some of the incidents drug-related a police spokesman told Efe [Complete article is available herehttpwwwlahtcomarticleaspCategoryId=14091ampArticleId=423061]

Tijuana Violence Slows As One Cartel Takes Control

BorderlandBeatcom

Mexicos famously seedy border city of Tijuana is enjoying a lull in drug murders as the countrys mostpowerful cartel gains the upper hand over its rivals [Complete article is available here httpwwwborderlandbeatcom201109tijuana-violence-slows-as-one-cartelhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3542

Network Notes| back to top |

Canadian data foreign threats Spying in the digital age (Suggested by a reader in Lithuania ndash thanks) Globe and Mail | By Colin Freeze 31 July 2010

A government spy agency thatrsquos prohibited from monitoring Canadian citizens is now usingldquoinformation about Canadiansrdquo to zero in on foreign threatsThe ambiguous statement found in a new government report detailing the activities of CommunicationsSecurity Establishment Canada could sanction a range of intelligence-gathering activities ndash includingthe controversial practice of mining ldquometadatardquo from digital communications

Metadata ndash often called data about data ndash are found in e-mails and their attachments and containdigital signatures that can reveal when where and by whom documents were created

The collection of metadata has caused controversy in other countries but never in Canada wherethe Communications Security Establishment Canada operates as an ultra-secretive agency About theonly thing that is known about the classified practices is that they were halted and resumed after someldquomajor changesrdquo including directives signed by Defence Minister Peter MacKay

ldquoI cannot comment on specific operational activitiesrdquo Adrian Simpson a CSEC spokesman toldThe Globe He stressed that reviews upheld that the activities in question were ldquocarried out inaccordance with the law ministerial requirements and CSECrsquos policies and proceduresrdquo

ldquoCSEC is prohibited from directing its activities at Canadians anyone in Canada or Canadiansanywhere in the worldrdquo he said

For decades signals-intelligence agencies in the West have been allowed to safeguard nationalsecurity by eavesdropping on foreignersrsquo conversations Spies can whatever phone lines and satellitesignals they can so long as they never listen in on fellow citizens

But in the digital age governments run increasingly sophisticated dragnets scooping up andscouring through millions of intercepted Internet conversations daily Such practices create legalambiguities

ldquoThe whole issue of what constitutes boundaries for signals-intelligence agencies in cyberspaceis a big debate right nowrdquo said Rafal Rohozinski a security expert affiliated with the University of Torontorsquos Munk School

A watchdog agency that reviews the CSECrsquos activities released an annual report to Parliament onJuly 20 ldquoWhen other means have been exhausted CSEC may use information about Canadians when it

has reasonable grounds to believe that using this information may assist in identifying and obtainingforeign intelligencerdquo it reads

Sometimes collecting metadata is relatively benign It can involve aggregating sets of data tospot trends much like the way meteorologists discern national forecasts from localized information

For example while CSEC canrsquot usually monitor the communications of specific Canadian terrorsuspects it can glean insights by zooming out for big-picture patterns One way to do that MrRohozinski said would be to look at data flows between Canadian cities and Yemen where an Internet-savvy al-Qaeda offshoot works to recruit Westerners

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3642

Metadata however can be more revealing Documents that circulate on the Internet travelaround like postmarked letters marked with return addresses ndash e-mails and attachments have embeddedcodes that speak to the who where and when behind their creation

The US National Security Agency found itself mired in controversy a few years go after itskirted domestic-spying bans by secretly upholding that this sort of American metadata was fair gamedistinct from communication contents

Therersquos little to suggest the CSEC would go that far The federal agencyrsquos activities are reviewedby a watchdog body now headed by a former Federal Court of Appeal judge Robert Deacutecary appointedlast year wrote in his annual report that he was satisfied the CSEC activities in question are lawful evenif his predecessors felt them borderline

ldquoThis was the first review of these activities since hellip their resumption under new policiesrdquo thewatchdogrsquos report says It concludes that the surveillance activities are ldquoin accordance with the lawrdquo andfollow ldquomajor changes to certain policies procedures and practicesrdquo

Much of the concern arises from the possibility that CSEC could hand over metadata intelligenceto domestic law-enforcement and security agencies

As it stands the RCMP and CSIS have to develop their domestic investigations before coming toCSEC ndash usually with warrants ndash if they want specific intelligence The rules guiding handovers are strictbecause even though all agencies run surveillance operations they do so under vastly different

mandates and legal standardsThe spy agency however stood by its practicesldquoCSEC is extremely diligent when it comes to the privacy of Canadiansrdquo Mr Simpson said

[complete article is available here httpwwwtheglobeandmailcomnewsnationalcanadian-data-foreign-threats-spying-in-the-digital-agearticle2113772 ]

Cyber Attacks Against NATO Then And Now

New Atlanticist | 6 September 2011

ldquoNow that NATOrsquos Operation UNIFIED PROTECTOR over Libya is winding down it is worth

noting how few cyber incidents were directed in protest against the Alliance Certainly there was a

cyber component to the liberation of Libya but it was more about content and Internet freedom (the

most newsworthy elements here were the role of social media and the Libyan government taking largeparts of the nation offline) But compared to past history NATO cyber defenders had a relatively easy

time

ldquoNATO has not however had an easy 2011 Although there were three significant incidents we

know about none seemed to have been in direct response to operations over Libyahelliprdquo

[Complete article is available here httpwwwacusorgnew_atlanticistcyber-attacks-against-nato-then-

and-now]

The Calm Before The Storm

Foreign Policy | By Joel Brenner 6 September 2011

Cyberwar is already happening -- and its about to get much much worse A veteran cyberwarriorexplains how America can prepare itself

Revelations of wholesale electronic fraud and massive data heists have become weekly evendaily affairs A multinational electronics corporation loses personal information on more than 100million customers Cyberthieves break into an international bank counterfeit credit balances and lootATMs in four countries grabbing $9 million in just a few hours International gangs spread maliciouscode that conscripts unwitting computers into zombie armies of hundreds of thousands of similarlyenslaved machines Criminals then rent these armies called botnets as easily as you can buy a time-sharing arrangement in a beach condo No wonder the vast majority of Internet traffic is spam

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3742

Yet the loss of personal information and related criminal fraud intolerable as they are are theleast threatening face of electronic insecurity The US militarys secret network is penetratedAmericans corporate pockets are being picked clean of the intellectual property that makes the UnitedStates tick And the electricity grid that keeps the lights on and makes everything move is dangerouslyinsecure

In one remote attack on the Pentagons information systems about 10 years ago the Chinesehauled away up to 20 terabytes of information If the information had been on paper theyd have neededa line of moving vans stretching from the Pentagon to freighters docked 50 miles away in Baltimoreharbor just to haul it away Had they done so the military district of Washington wouldve become anactive theater of operations for the first time since 1865 and the Navy wouldve blockaded theChesapeake Bay But the Chinese did it electronically so who noticed

Corporate espionage by both competitors and foreign intelligence services or their surrogates isalso increasing Intelligence officials see this but cant speak openly about the specifics and Im seeingit now in my law practice The victims rarely admit it for understandable reasons Oracle whichsuccessfully sued SAP for theft of its software code was a prominent exception Google was another

When the Chinese penetrated Google in late 2009 -- yes that operation was Chinese and yes itwas done with the blessing of a member of the Politburo -- they werent after customer informationThey were after the source code that makes Google unique Nor was Google the only victim Thousands

of US and Western firms were penetrated in that affair Foreign governments -- and not only theChinese -- understand that they cannot compete with the United States militarily and politically if theycannot compete with it economically so their intelligence services want to steal its corporate intellectualproperty This is the technology that gives America its competitive edge and often it has nothing to dowith defense Ordinary companies with valuable technology are now being targeted by nation-statesThis is a new era National security and economic security have converged

The danger is not limited to the loss of technology and information however The owners andoperators of the North American electricity grid are hooking up their control systems to the Internet asfast as they can Exposing the grid to the Internet makes it marginally more efficient but it also makes itdramatically more vulnerable to disruption If you can remotely penetrate an electronic system to stealinformation you can remotely penetrate it to shut it down or make it go haywire This is why there is no

longer a meaningful difference between information security and operational security And the biggestoperational risk is the grid In contemporary society nothing moves without electricity If the grid goesout the country stops

As the Stuxnet affair demonstrated remotely engineered disruption of industrial control systemsis now a reality That episode involved the successful electronic attack on the centrifuges in the Iraniannuclear program Only a first-class intelligence agency could have pulled that off but the blueprint fordoing it -- the code itself -- is now public Many American industrial control systems run on the samekind of equipment the Iranians were using but unlike the controls on the Iranian centrifuges thecontrols on the US grid are now being connected to the Internet making them easier to disrupt Stuxnetwas a watershed there will be copycats

Other industrial control systems will also be targets Some already are Air traffic control

railroad switches and water and sewage systems are all electronically controlled now and many arevulnerable If an intruder can break into the right server electronically he can remotely shut downproduction send your goods to the wrong destination and even unlock your doors -- and delete your logentries so he leaves no record of ever having been there

The United States does not lack enemies who would attack it this way Seized al Qaedacomputers contain details of US industrial control systems In 2003 a group affiliated with thePakistani terrorist organization Lashkar-e-Taiba -- the same gang that engineered the 2008 terroristassaults in Mumbai -- plotted to attack the Australian grid Other groups conspired to attack the Britishgrid in 2004 2006 and 2009 Yet the owners and operators of the North American grid continue willy-

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3842

nilly to expose their control systems to the Internet instead of isolating and hardening it This is folly of a high order

Important conclusions for public and corporate policy follow from this vulnerable state of

affairs First cyber insecurity has operational consequences In the current and foreseeable states of technology a high degree of assurance against electronic penetration of anything connected to theInternet is not achievable Large efficient electronically connected organizations and nations aretherefore vulnerable to remotely engineered disruption as well as information theft

Second this risk cannot be eliminated -- but it can be reduced and managed As a nation theUnited States should start by isolating the grids controls from the Internet Undoubtedly there aremarginal efficiencies to be gained by seamless connectivity over a publicly accessible infrastructure butthese gains are usually exaggerated and the risk this connectivity creates is staggering The governmentand the major telecommunications carriers must also make the investment required to re-create themassive redundancies that made the wired telephone network so robust Resilience and swift recoveryshould be the goal If the consequences of cyberattacks were reduced penetration would cease to matter

Third companies that wait for the government to solve their own security problems do so attheir peril The government is broke and the IT backbone is 85 percent private so the governmentdoesnt control it The governments role in altering the status quo will be limited to setting standardsusing its purchasing power to move vendors toward better security and getting its own house in order

The government can neither secure corporate intellectual property nor protect firms against operationaldisruption

Fourth in a world in which everything cannot be protected companies must determine forthemselves what intellectual property and physical assets to isolate and safeguard Those that approachthis task seriously will quickly learn that technology is only one aspect of their insecurity and in manycases the easiest to deal with Unless technology is integrated with personnel practices and operationalsecurity it opens vulnerabilities that its users rarely understand This kind of integration requires theautomated enforcement of reasonable security policies and systematic workforce training and thatoccurs only when management the lawyers and the technologists work closely together This is an old-fashioned management challenge -- not a technological one For their part corporate boards need to takeIT security seriously and launch audits that examine how their systems are actually implemented and

used not merely how they are designed Because as the techies like to put it the weakest link in anysystem is not the silicon-based unit on the desk its the carbon-based unit in the chair Joel Brenner is author of the forthcoming America the Vulnerable Inside the New Threat Matrix of

Digital Espionage Crime and Warfare He has served as the inspector general of the National Security

Agency the national counterintelligence executive and the NSAs senior counsel He now practices law

at Cooley LLP in Washington DC

Cyberattacks Decline Slightly Symantec Report Finds

Dark Reading | 1 September 2011

Organizations worldwide are suffering damages as a result of cyberattacks but interestingly there hasbeen a slight decline in these attacks during the past 12 months according to a new report from

Symantec More than 90 percent of the more than 3300 respondents across 36 countries said theyexperienced tangible losses as a result of a hack with 84 percent reporting financial loss to the cost of abreach Around one-fifth lost at least $195000 in breaches during the past 12 months

Meanwhile Symantec attributes the unexpected bright spot of a decline in breaches toorganizations employing better cybersecurity defenses More than 70 percent of organizations sawattacks in the past 12 months a decline of 5 percent from 2010 And those that experienced anincreasing frequency of attacks dropped from 29 percent in 2010 to 21 percent this year While 100percent last year reported losses from cyberattacks 92 percent did so in 2011 The trend seemscounterintuitive given the rash of high-profile breaches this year More

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 23: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2342

Here are seven vignettes from Counterstrike that offer glimpses into the thinking of policymakers andcommanders in early days after the Sept 11 attacks and how that thinking evolved over the followingdecade into a more whole-of-government approach to combating terrorists

1 Bush Tried to Negotiate with al Qaeda

The George W Bush administration like all of its predecessors swore never to negotiate with terroristsBut it did undertake an extraordinary and extraordinarily secret outreach effort to open a line of communication with Osama bin Laden and al Qaedas senior leadership It was an attempt to replicatehow the United States tried to sustain a dialogue with the Soviet Union even during the darkest days of the Cold War when White House and Kremlin leaders described in private and in public a set of acceptable behaviors -- and described with equal clarity the swift vicious even nuclear punishment forgross violations

In the months after the Sept 11 attacks Bushs national security staff working through theintelligence agencies made several attempts to get a private message to bin Laden and his inner circleThe messages were sent through business associates of the bin Laden familys vast financial empire aswell as through some of the al Qaeda leaders closest relatives a number of whom were receptive toopening a secret dialogue to restrain and contain their terrorist kinsman whom they viewed as a blot on

their name (To be sure other relatives were openly hostile to the American entreaties)According to a senior American intelligence officer with first-hand knowledge of the effort the

response from Osama bin Laden was silence And the effort was suspended

2 Sometimes a Wedding Is Just a WeddingIn the early days after the Sept 11 attacks the CIA and FBI vied to produce the most compellingintelligence reports that tracked suspected terrorist plots The agencies often worked at cross purposessometimes unwittingly At one point in early 2002 both agencies were tracking what American analystssaid were growing preparations for a major wedding somewhere in the Midwest (In terroristvernacular the word wedding is often code for a major attack)

Dribs and drabs on this wedding planning made their way to President Bush from bothagencies independent of each other of course

Finally over the Easter holiday during a video-teleconference with top aides in Washingtonfrom his ranch in Crawford Texas Bush stopped the briefing exasperated by the discrepancies in therival agencies reporting about the suspected threat

George Bob get together and sort this out Bush told his CIA director George J Tenet andFBI director Robert S Mueller III

Bushs instincts were correct When the analysts finally untangled their clues it turned out thatthe ominous wedding really was just that the matrimony of a young man and a young woman fromtwo prominent Pakistani-American families There was no threat There was no plot

3 The Threat to Bomb MeccaAs fears of a second attack mounted following the 911 strikes US government planners franticallycast about for strategies to protect the country Even the most far-fetched ideas had a hearing howeverbriefly In one case some government planners proposed that if al Qaeda appeared ready to attack America again the United States should publicly threaten to bomb the city of Mecca in Saudi Arabiathe holiest site in all of Islam in retaliation Just nuts one Pentagon aide wrote to himself when heheard the proposal The idea was quickly and permanently shelved

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2442

4 The SEAL Raid in Iran That Didnt HappenWhen US forces routed the Taliban government in Afghanistan and forced bin Laden and his toplieutenants to flee many senior al Qaeda leaders including bin Laden and his deputy Ayman al-Zawahri escaped to neighboring Pakistan But a separate group including the al Qaeda leaders sonSaad bin Laden fled to northern Iran where American troops would not pursue them and the Iranianswould likely not detain them But the Shiite clerics running Iran placed the al Qaeda operatives and theirfamily members under virtual house arrest and they became a shield against possible attacks from theSunni-based terrorist organization

One plan in particular illustrated the bold thinking and wildly unrealistic aims of the militarysinitial approach after 911 to kill or capture terrorist leaders The plan called for hunting the eight to 10senior al Qaeda leaders and operatives who had sought refuge in Chalus an Iranian resort town on theCaspian Sea where they had been detained

At the Joint Special Operations Command at Fort Bragg NC military planners drew up optionsfor Navy SEALs to sneak ashore at night using state-of-the-art mini-submarines Once they landed theSEALs would slip past Iranian guards to snatch the al Qaeda leaders Another option called for SpecialOperations helicopters to spirit American commandos into the town and whisk them out again with theirquarry The Americans went as far as conducting two or three rehearsals at an undisclosed locationalong the US Gulf Coast in early 2002 They conducted small-boat insertion exercises involving about

30 Special Operations personnel most SEALs and eventually concluded the mission was feasible if they were provided with more detailed intelligence on the locations of the al Qaeda members and thesecurity around them

The logistics of the mission were daunting Chalus sits at the edge of the Elburz coastal mountainrange about 70 miles north of Tehran and the failed rescue of the American hostages in Iran in April1980 loomed large in commanders memories Eventually Gen Richard B Myers the chairman of theJoint Chiefs of Staff rejected the mission as too risky and too politically volatile Many of the al Qaedaoperatives are reportedly still there

5 Intelligence Hauls of Unusual Size

US intelligence and military commandos have carried out tens of thousands of raids in the decade since911 The amount of material seized from terrorist and insurgent targets has grown to a massive sizeThe Defense Intelligence Agency (DIA) operates exploitation triage centers and giant warehouses forstoring intelligence products -- in war zones rear headquarters in countries like Qatar and back in theUnited States One intelligence analyst said that walking into one of the warehouses for documents andmedia exploitation reminded him of the final scene in Raiders of the Lost Ark when the captured Ark of the Covenant is crated up and rolled into a cavernous storage area that contains all the governmentsother dangerous secrets

All told more than two million individual documents and electronic files have been cataloguedby media type hard copy phone number thumb drive Each is inspected by a linguist working with acommunications analyst or computer expert

The DIA analysts are joined by specialists from other agencies including the FBI and the DrugEnforcement Administration Yet given the overwhelming volume no more than about 10 percent of thecaptured intelligence has ever been analyzed

Intelligence officers say they simply are overwhelmed and untold quality leads may still beburied in the piles of computers digital files travel documents and pocket litter

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2542

6 The Digital Counterjihad Cyberspace is the terrorists ultimate safe haven Its where they recruit raise money and even plotattacks using coded language while playing online video war games The US government fights back

One technique is called false band replacement whereby the intelligence agencies infiltratemilitants networks and post their own material to counter extremist efforts on those same jihadistwebsites The trick is to forge the onscreen trademarks -- web watermarks -- of al Qaeda media sites

This makes messages posted on these sites official and sows dissent and confusion among themilitants

This Internet spoofing can be used in support of more traditional combat missions There is atleast one case confirmed by American officials in which a jihadist website was hacked by Americancyberwarriors to lure a high-value al Qaeda to a surreptitious meeting with extremist counterparts -- onlyto find a US military team in waiting

Getty images

7 First Kill the MullahsUS counterterrorism officials have learned fighting terrorists effectively means targeting specific nodesof that network that support and enable militants who strap on suicide vests This strategy focuses onneutralizing enablers such as the financiers gun-runners and logisticians Among these terror linchpins

are religious leaders who bless attacksHeavenly reward will not await a suicide bomber unless his death and those of his victims is

deemed halal in keeping with Islams sacred sharia law Each militant network has a sharia emir usuallyat the level of a sheikh or mullah In Iraq American commanders specifically killed emirs to throw awrench in a suicide bombing networks

Take him out and suicide bombings from that network are frozen until he is replaced said onemilitary officer with command experience in Iraq hellip[Complete article is available herehttpwwwforeignpolicycomarticles201109067_things_you_didn_t_know_about_the_war_on_terror]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2642

Dick Marty Rendition Report Condemns lsquoCult of Secrecyrsquo

BBC News | 8 September 2011

A report for Europes human rights watchdog has called for greater scrutiny of secret services andsupport for whistleblowers The Council of Europe investigated how countries like Britain GermanyRomania and Lithuania assisted the US with the rendition of terror suspects It said a cult of secrecyhad helped Western governments cover up abuses Defending whistleblowers it singled out USsoldier Bradley Manning accused of passing secrets to Wikileaks He had acted as a whistleblowerand should be treated as such CoE rapporteur Dick Marty wrote in the report which was due to besubmitted to the CoEs Parliamentary Assembly The soldier is currently in a US military prisonawaiting trial for passing restricted material to the controversial website

But the report praised Mr Manning and Wikileaks itself for uncovering evidence of renditionThe CoE represents 47 member-states including both EU countries and Russia and other ex-Sovietstates Mr Martys report focused on the record of Western states explaining that it was based oninvestigations into European links to the controversial US policy of rendition for terrorism suspectsThe CIA allegedly flew terror suspects around the world for interrogation in the years after 911 holdingthem in secret prisons in Europe and elsewhere

No licence to kill

In his 48-page report - entitled Abuse of State Secrecy and National Security - Mr Marty looked at thelevel of control exercised by European states over their security services He urged all states to useindependent parliamentary committees to oversee the work of their secret services saying this was of vital importance for the rule of law and democracy Mr Marty argued that Western governments wereusing the notion of state secrecy to shield their intelligence services from accountability for seriousviolations committed during anti-terrorist operations We consider that this is simply unacceptablehe wrote

A licence to kill (or to abduct and torture) only exists in certain films and in dictatorialregimes In democratic systems parliaments as representatives of the people have a right and duty toknow what the government is doing in the name of the people Mr Marty praised investigative journalists and non-governmental organisations for their work in exposing abuses of authority Stressing

the fundamental role whistleblowers had to play in an open society he warned against a real cult of secrecy as an instrument of power

While it was up to the courts to decide if Bradley Manning had committed any crime he wrotethe CoE was indebted to him for the publication of a recording of a helicopter attack in Iraq in whichthe crew seems to have intentionally targeted and killed civilians

Thanks to Mr Manning he said a large number of embassy reports had allowed us to learnsignificant details of important recent events which are obviously of general interest We therefore join Amnesty International in expressing our worries as to the treatment he receives Mr Marty wrote inthe draft report[Article continues here httpwwwbbccouknewsworld-europe-14820145]Comment This report demonstrates that Dick Marty is not as De Gaulle would say a serious man To

suggest that Bradley Manning is a hero and intelligence agencies bent on defeating terrorists arecriminals should say it all Manning knowingly violated his oath and willfully provided enormousamounts of classified material to WikiLeaks For Marty this is a good thing in the name of transparencyMarty always injudicious and anti-American in his remarks is now moving at warp speed into crackpotterritory

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2742

Al Qarsquoida amp its Affiliates| back to top |

Al Qaeda Is Down Not Out

Los Angeles Times | By Amy Zegart 7 September 2011

US talk of defeating terrorism is dangerously prematureTalk of strategically defeating Al Qaeda is all the rage in the White House these days Defense

Secretary Leon Panetta used the D-word in July President Obama declared in his new counter-terrorism strategy We can say with growing confidence that we have put Al Qaeda on the path todefeat Compared to the woeful state of the economy terrorism has become the administrations feel-good story of the year

Defeat is a big word It is also dangerously misleading Yes the United States has made greatstrides in the last decade to harden targets improve intelligence and degrade the capabilities of violentIslamist extremists Osama bin Ladens death was a major accomplishment But the fight is nowhereclose to being won and Americas most perilous times may lie ahead Three reasons explain why

The first is that strategically defeating Al Qaeda is not nearly as important as it sounds After911 Al Qaeda morphed into a more complicated decentralized and elusive threat consisting of threeelements core Al Qaeda affiliates or franchise groups operating in places like Yemen and Somalia with

loose ties to the core group and homegrown terrorists inspired by violent extremism often through theInternet in the comfort of their own living rooms

Core Al Qaedas capabilities started degrading in 2001 when the US invaded Afghanistandismantled training camps ousted the Taliban and sent Bin Laden running The CIA has estimated thecore group remaining in the AfghanistanPakistan region to number 50 to 100 fighters The last time BinLaden oversaw a successful operation was 2005 when Al Qaeda struck the London transit system

But plots by homegrowns and franchise groups have risen dramatically in recent years The 2009Ft Hood shooting the worst terrorist attack on US soil since 911 was the work of a homegrownterrorist The mastermind of the 2010 Times Square car bomb plot was a naturalized American citizentrained by the Pakistani Taliban not Al Qaeda Another franchise group Al Qaeda in the ArabianPeninsula was behind the foiled 2009 Christmas Day underwear bomber aviation plot and the 2010

plot to explode tampered printer cartridges aboard cargo planes The Bipartisan Policy Center reported11 violent Islamist extremist terrorist incidents against the US homeland in 2009 the most since 911Nearly all involved what former CIA Director Mike Hayden calls a witches brew of radicalizedAmericans and franchise groups

The second reason why talk of defeat is premature has to do with weapons Terrorism againstAmericans is nothing new The potential for terrorist groups to acquire weapons of mass destruction isIn 1995 a Japanese cult released sarin nerve gas in the Tokyo subway killing 12 people and injuringthousands It was the first WMD terrorist attack in modern history and it sparked a wave of presidentialterrorism commissions years before Bin Laden became a household name

It is this specter of the lone fanatic or small group armed with the worlds most devastatingweapons that keeps experts up at night In 2005 60 leading nuclear scientists and terrorism experts were

asked how many believed the odds of a nuclear attack on the US were negligible Only three or fourhands went up most were far more pessimistic Today there is enough nuclear material to build120000 weapons As long as fissile material is poorly stored and rogue states like Iran and North Koreacontinue their illicit weapons programs nuclear terrorism remains a haunting possibility

The third reason is that the FBI has not yet become a first-rate domestic intelligence agencyAnalysts whose work is vital to success are still second-class citizens labeled support staff alongsidesecretaries and janitors and passed over for key jobs including running the bureaus intelligence unitsThe FBIs information technology is so antiquated it belongs in a museum And the old crime-fighting

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2842

culture still lives There is now a move afoot to shrink new classified facilities so that agents dont haveto waste time away from their cases to read intelligence documents thereStrategically defeating Al Qaeda sounds too good to be true Because it is Amy Zegart is a senior fellow at Stanfords Hoover Institution and the author of Eyes on Spies

Congress and the United States Intelligence Community

US Counterterror Chief Al-Qaida On Steady Slide

Bostoncom | 31 August 2011

White House counterterrorism chief John Brennan said al-Qaida is on a steady slide after the death of al-Qaidas latest second-in-command in Pakistan Brennan told The Associated Press on Wednesdaythat its a huge blow in the first official White House comment since Atiyah Abd al-Rahmans reportedkilling by CIA drone strike in Pakistans tribal areas last week

Al-Qaida is sort of on the ropes and taking a lot of shots to the body and the head Brennansaid This is a time not to step back and let them recover a message he says hes sending to hiscounterparts in Pakistan[Article continues herehttpwwwbostoncomnewsnationwashingtonarticles20110831us_counterterror_chief_al_qaida_on_steady_slide ]

Al-Qaeda (AKA Al-Qaida Al-Qarsquoida)

Council on Foreign Relations | 29 August 2011

ldquoAl-Qaeda an international terrorist network is considered the top terrorist threat to the United StatesThe group is wanted for its September 11 2001 attacks on the World Trade Center and the Pentagon aswell as a host of lesser attacks To escape the post-911 US-led war in Afghanistan al-Qaedas centralleadership fled eastward into Pakistan securing a safe haven in loosely governed areas there In July2007 US intelligence agencies found that the organization was regrouping and regaining strength inthese tribal areas along the border with Afghanistan though targeted killings of senior al-Qaeda leadershave since diminished the groups command and control capabilities In February 2009 Director of National Intelligence Dennis C Blair told lawmakers that the groups core is less capable and effective

than it was a year ago The killing of al-Qaedas top leader Osama bin Laden by US forces in Pakistanin May 2011 served a significant blow to the organization but analysts say al-Qaeda remains deadlywith its networks spread all over the world Plus a number of affiliated groups have gained prominencein recent years complicating the task of containing the organizationrdquo

[Article continues here httpwwwcfrorgterrorist-organizationsal-qaeda-k-al-qaida-al-qaidap9126]

Al Qaeda In The Islamic Maghreb

CSIS | 1 September 2011

ldquoAl Qaeda in the Islamic Maghreb (AQIM) emerged from a decades-long militant Islamist tradition inAlgeria In 1998 the Salafist Group for Preaching and Combat (Groupe Salafiste pour la Preacutedication etle Combat or GSPC) broke away from the Armed Islamic Group (GIA) because of the GIArsquos extensive

targeting of civilians Gradually the GSPC evolved to encompass global jihadist ideology in addition toits historical focus on overturning the Algerian state In 2006 the GSPC officially affiliated with alQaeda core soon rebranding itself as al Qaeda in the Islamic Maghreb In the following years AQIMwas able to conduct a small number of large-scale attacks most notably its 2007 bombing of the UNheadquarters in Algiers In recent years counterterrorism pressure and weak governance have combinedto shift the center of AQIMrsquos presence to the Sahara-Sahel region AQIM continues to make its presenceknown through smuggling operations kidnappings and clashes with security forces in the desert In thecoming years general instability within the region could allow AQIM to further expand its influencerdquo[Complete article is available here httpcsisorgfilespublication110901_Thornberry_AQIM_WEBpdf ]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2942

AQ Strategy

The Assynt Report | 11 August 2011

Executive Summary Al-Qaedarsquos broad objectives remain unchanged in the wake of bin Ladenrsquos death There

are nonetheless growing questions over al-Qaedarsquos capability Longstanding paranoiaover the use of electronic communications is heightened by the ongoing US dronecampaign whilst attacks against the West have generally been disrupted at an early stage

The Pakistani Talibanrsquos attack on a Karachi naval base in May 2011 was a significantmilitary success and the first major act of revenge for bin Ladenrsquos killing Furtherattempts to avenge his loss are certain

All parts of al-Qaeda are working within a cohesive framework with the ultimate aim of restoring the Islamic Caliphate (Khilafa) The strategic plan to support this aim wasdrafted by 40 of al-Qaedarsquos brightest thinkers in Kandahar Afghanistan in November1999 This plan consists of four phases each seven years long leading to the dissolutionof corrupt regimes and the union of all newly-liberated states within the Khilafa

Apart from mounting strategic operations al-Qaedarsquos role is to be the inspiration for atruly global jihadist movement It seeks to achieve this through provision of trainingbeing a role model for others to follow extending acceptance and adoption of its tactics

particularly suicide bombings and professionalising jihadist media to build a commonbrand and message between hitherto separate groups

Between the late 1990s and 2003 the organisation was primarily devoted to classicinternational terrorism Most effort is now spent fighting insurgencies from North Africato South Asia The way in which this strategy helps to spread the struggle has been seenin North-West Africa where the initial development of al-Qaeda in the Islamic Maghrebwas in part fed by men returning from fighting with al-Qaeda in Iraq

Since mid-2009 al-Qaeda and its affiliates have increasingly encouraged jihadist-sympathisers resident in Western countries to engage in violence themselves withoutcentral direction or training making surveillance more difficult

One of the keys to awakening the spirit of jihad was the success in portraying the US and

its allies as Crusaders in the Muslim world Al-Qaedarsquos strategy essentially requires thatthis process be kept running until the forces of jihad have grown large enough to launchsuccessful liberation operations

Despite its successes in Afghanistan al-Qaedarsquos credibility has suffered both from its failure to landanother strategic blow on the West on the scale of 911 and also excessive Muslim casualties in someoperations Similarly al-Qaeda in Iraq was set back by its excessive sectarian zeal and local resentmentat the foreign fighter presence In turn this affected the movementrsquos funding from the Gulf

Analysis Sub-Saharan African Leaders Media Focus On Threats Prior to 911

OSC Feature | Sub-Sahara Africa -- OSC Analysis 6 September 2011Statements by Sub-Saharan African leaders and African media reports on terrorism prior to the 10thanniversary of 911 focus on the growing threats from local extremists and Al-Qaida affiliatesparticularly in West Africa with little direct commentary on the anniversary or US counterterrorismpolicies This focus on domestic threats suggests that counterterrorism messages expressing solidaritywith African nations and acknowledging the evolving terrorist threat on the continent would have thegreatest resonance with African audiences

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3042

Leaders Stressing Determination To Counter Local Threats African leaders public statements reflect an ongoing concern about the threat of terrorism on thecontinent and a strong commitment to find ways to combat this threat

Nigerian President Goodluck Jonathan emphasized the governments commitment tovigorously combat terrorism following the 26 August bombing of the UN office inAbuja by Nigerian extremist group Boko Haram reported the Paris-based news agencyAFP President Jonathan is hosting Liberian President Ellen Johnson Sirleaf and otherforeign dignitaries for a three-day forum on terrorism and economic crimes the widelyread Lagos-based independent daily The Guardian reported on 4 September

Malian President Amadou Toumani Toure launched a Special Program for PeaceSecurity and Development on 9 August stating that development remained the mostviable solution to counter threats to the countrys stability reported Malis state-owneddaily LEssor[ 3] The program aimed to undermine support for Al-Qaida in the IslamicMaghreb (AQIM) according to Burkinabe web portal Lefasonet on 11 August

Somali Prime Minister Abdiweli Muhammad Gas stated on 23 August that theTransitional Federal Government planned to remove Al-Shabaab from the central andsouthern regions in Somalia with the goal of restoring peace within one year so the

country can hold national elections according to the Puntland-based Garowe Online

Experts Media Highlight New Capabilities Tactics

African experts and media outlets are warning about the evolving nature of terrorist organizations on thecontinent the terrorists pursuit of new targets and tactics and their potential for taking advantage of regional instability

Leading South African think tank the Institute for Security Studies stated on 29 Augustthat Boko Harams attack on the UN in Abuja completes Boko Harams metamorphosisinto an international terrorist group Since December 2010 Boko Haram had killed over600 people in over 70 attacks against Nigerian targets according to the think tank buthad not previously targeted Western or international interests

A 26 August article on the popular Malian web portal Maliweb voiced concern thatAQIM could benefit from Tuareg mercenaries many of whom were recently returningfrom fighting in Libya and could benefit from an increase in arms trafficking through theSahel during the Libyan conflict

Ugandas privately owned Daily Monitor reported on 19 August that AU forces inSomalia warned that Al-Shabaab planned to increase the number of kidnappings andbomb attacks as part of its new strategy to shift from controlling territory in Mogadishuto conducting more of an insurgent campaign

Concern Over Al-Qaida Presence Terrorist Collaboration

West African official statements and media reports reflect a growing concern over an increased Al-

Qaida presence in West Africa and collaboration with AQIM Al-Shabaab and Boko Haram

Nigerian security services reported that the suspected mastermind behind the 26 Augustbombing of the UN office in Abuja was a Boko Haram member with close links to Al-Qaida and Al-Shabaab according Nigerias privately owned Daily Sun

A 28 August report in the privately owned daily Nigerian Tribune claimed that the 26August bombing in Abuja was part of Al-Qaidas plans to mark the 10th anniversary of 911 and called Boko Haram Al-Qaidas ally in the region

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3142

An 8 August commentary in Burkina Fasos LObservateur Paalga said that reports of Boko Haram collaboration with Al-Shabaab and AQIM could indicate that Al-Qaida isextending its African tentacles Abdourahmane Dieng security division chief of theEconomic Community of West African States said the collaboration represented a veryserious threat according to Senegals progovernment Le Soleil on 5 August

Messages Likely To Resonate With African Audience

Sub-Saharan Africas increasing concern about the shifting nature and potential strengthening of theterrorist threat on the continent suggests that messages directly addressing the impact of terrorism onAfricans the increasingly complex nature of the threat and the need for multilateral cooperation againstterrorism are most likely to resonate with Africans

Messages expressing solidarity and sympathy for Africans affected by Boko Haram Al-Shabaab and AQIM would almost certainly resonate with a broad African audience

African political and military leaders would probably welcome acknowledgement of thecomplex and changing nature of terrorism on the continent and recognition of theirinitiatives and commitment to countering violent extremism

African leaders and medias concern about potential collaboration between Boko Haram

Al-Shabaab and AQIM suggest that they would be open to improving multilateral andcross-regional sharing of lessons learned and strategies to counter the intensification of terrorism within Africa

Aviation and Maritime Security| back to top |

Bomb Threats Force Jets To Land

Associated Press | 7 September 2011

Both landed safely one landed in Ankara Ataturk International Airport and the other at Kuala LumpurTwo flights operated by Pakistans state-owned airline received bombs threats on Wednesday

and both landed safely one in Turkey the other in Malaysia officials said No bombs were found The

first flight was headed for Manchester England when it was notified of the threat near the Bulgariancapital of Sofia The crew contacted the control tower in Istanbul to seek permission for the landingstate-run Anatolia news agency reported Authorities quickly evacuated all 378 passengers from theBoeing 777-300ER aircraft after it parked at a remote corner of the International Ataturk Airport andbomb squads began searching the plane with sniffer dogs Anatolia reported PIA spokesman MashoodTajwar confirmed the flight received a threat and landed All passengers were safe A police searchturned up no bomb officials said Later a second PIA flight from Islamabad to Kuala Lumpur alsoreceived a bomb threat It landed in Kuala Lumpur and all the passengers disembarked safely saidTajwar The UK-bound Pakistan International Airlines plane was forced to make an emergency landingat Ataturk Airport in Istanbul after receiving a bomb threat Malaysias airports authority said thepassengers were being screened and the plane was isolated in a parking area while being searched bypolice No bomb was found

It said the plane carried 164 passengers and 13 crew Azmi Murad senior general manager forthe authority said the Pakistani airline informed it that the warning came by email Mr Tajwar gave nodetails on the nature of the threat or how it was delivered Pakistan is home to al Qaedas top leadershipMilitants who trained there have been responsible for many of the attacks and failed plots in the USand Europe since Sept 11 2001 when planes hijacked by al Qaeda militants destroyed the World TradeCenter in New York and crashed into the Pentagon The bomb threats came four days before the 10thanniversary of 911 but there was no apparent link to Islamist militants who typically do not alertauthorities in advance The FBI and Homeland Security department issued warnings last weekend aboutal Qaeda threats to small airlines

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3242

Commentary amp Opinion| back to top |

From Terror Group Founder To Libyan Rebel Military Commander

ABCNews | 29August 2011

The same man who triumphantly led Libyan rebels into Gadhafis compound last week first came to theattention of the US intelligence community years ago - as a founder of a terror group

Abdelhakim Belhaj who was recently appointed to Tripolis rebel military council was one of the original founders of the Libyan Islamic Fighting Group an anti-Gadhafi group which was laterdesignated by the US State Department as a terrorist organization with links to al Qaeda according toUS government reports

We proudly announce the liberation of Libya and that Libya has become free and that the ruleof the tyrant and the era of oppression is behind us a victorious Belhaj told reporters after the stormingof Gadhafis Bab al-Aziziya compound last week Ousting Gadhafi had been the main objective of theLIFG since its inception in the early 1990s even if some of the fighters believed that meant puttingAmericans in the crossfire

The group carried out operations against the Libyan government including at least four suspectedassassination attempts against Gadhafi in the 1990s and was also believed to be connected to a series of suicide bombings in Casablanca Morocco in 2003 the US State Department reported As relationsbetween the US and Gadhafi improved in the mid-2000s some LIFG leaders cultivated relationshipswith top al Qaeda leaders including Osama bin Laden and were suspected of funneling fighters to Iraq tocarry out operations against US soldiers

When the LIFG was designated a terror organization in 2004 it was meant as a gesture of solidarity with the Libyan government according to a March 2011 congressional report

Contrary to several US government reports Libyan rebel ambassador to the US Ali Aujalitold ABC News that the LIFG was never connected to al Qaeda and did not carry out terrorist operations

They were only opposed to Gadhafi during his rule and paid the price for that by beingoppressed by the regime Aujali said

The CIA first publicly voiced its concerns about the connection between the LIFG and al Qaedain 2004 when then-director George Tenet testified before the Senate Select Committee on Intelligenceand listed the LIFG among groups that represented an immediate threat [that] has benefited from alQaeda links[Article continues here httpabcnewsgocomBlotterterror-group-founder-libyan-rebel-military-commanderstoryid=14405319]

Interview With Saudi Sheik Wajdi Al-Ghazawi

MemriTVcom

Sheik Wajdi al-Ghazawi owner of al-Fajr TV criticizes extremist atmosphere in Saudi Arabia and saysafter 911 They Handed Out Sweets on the Streets of Mecca

Following are excerpts from a statement by Saudi Sheik Wajdi Al-Ghazawi owner of Al-FajrTV which was posted on YouTube on August 4 2011

Wajdi Al-Ghazawi When Al-Qaeda and Osama Bin Laden were at the height of their mightthey were extremely popular in Saudi Arabia From mosque pulpits across Saudi Arabia preacherswould pray for their success Moreover from the pulpits of the most important mosques ndash the Al-HaramMosque in Mecca and the Nabawi Mosque in Al-Madina ndash direct prayers for the success of Al-Qaedawere made during the days of the bombing of Tora Bora Oh Allah help our brothers in AfghanistanThese supplications were made during evening prayers as well as Friday prayers The preachers wouldpray for them in violation of the ministrys instructions

When the twin towers in New York were attacked they handed out sweets on the streets of Mecca By Allah they did I witnessed this myself The young people bowed in prayer and hugged one

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3342

another out of joy People were in heaven because of these young men who destroyed America andbombed this idol Am I right or not Was it like that or not

Back then when the Taliban broke off a piece of the nose of the Buddha statue which was hewnin the mountain an entire sermon was dedicated to it in the mosque in Mecca and the preacher was laterreprimanded for this sermon The entire Saudi people supported and loved Al-Qaeda

This went on until our brothers in Al-Qaeda ndash and I dont know what was going through theirminds ndash began to carry out operations inside Saudi Arabia Thats when we all raised our hands andsaid Youve gone too far We wont support you in this

The atmosphere here in Saudi Arabia is one of extremism It is characterized by focusing onminor details Many things are forbidden Yes maybe they are indeed forbidden but by forcing peopleto avoid them and by acting as if these were major sins an atmosphere was created that gave rise toextremist youth who might act recklessly at the most trivial provocation

For instance we blew out of proportion the issue of music the issue of smoking or the issue of hanging pictures in public places True there are clear texts on these issues but the young peopleembraced these issues as if they were fighting usury fornication or alcohol No these are not among theseven major sins So our society has become extreme

This extremist atmosphere has given rise to people who accuse others of heresy and people whopurport to be waging Jihad It has created genes that gave rise to cells of Al-Qaeda and other terrorists

We must examine our breeding ground in which these young men were sownBy Allah what can possibly emerge from such an atmosphere Muftis who accuse others of

heresy sheiks who incite and young people who bomb Am I right or not[Complete clip is available here httpwwwmemritvorgclipen3099htm]

Legal Aspects amp Lawfare| back to top |

Revisiting A Stale Counterterrorism Law

Council on Foreign Relations | 1 September 2011

ldquoNearly a decade after 911 the United States still relies on the 2001 Authorization for the Use of Military Force (AUMF) for the killing and detention of those considered responsible for or associatedwith the terrorist attacks But CFR national security law expert John Bellinger says it is becomingincreasingly difficult for the Obama administration to justify some of its counterterrorism operationsunder this limited statutory authority It has been used in defense of actions including drone attacks onindividuals as well as the targeting of groups in Yemen and Somalia that may have only the mosttenuous affiliation or association to the 911 attack A revised AUMF should clarify those operations aswell as the issue of detention specifically which individuals can be detained for how long and subjectto what processes There also needs to be greater effort at the international level he adds to fill thegaps in the law that covers conflicts between states and non-state actorsrdquohelliprdquo[Complete article is available here httpwwwcfrorgcounterterrorismrevisiting-stale-

counterterrorism-lawp25742]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3442

Narco-Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector[Complete article is available here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Mexicos Cartels Move Into Extortion

At a construction site of an apartment building in the heart of the Mexican capital a company engineerruns through his weekly payroll sheet He has salaries written out for carpenters bricklayers andelectricians At the bottom of the sheet is a notation of $200 for ldquosecurity servicesrdquo next to a nicknameldquoEl Indiordquo mdash the Indian [Complete article is available here

httpwwwtucsonsentinelcomnationworldreport090611_mexico_cartels_bribesmexicos-cartels-move-into-extortion ]

Seven Die In Mexican Pacific Port City

Latin American Herald Tribune

Seven people died in separate shootings in Mazatlan a port city in the northwestern Mexican state of Sinaloa with some of the incidents drug-related a police spokesman told Efe [Complete article is available herehttpwwwlahtcomarticleaspCategoryId=14091ampArticleId=423061]

Tijuana Violence Slows As One Cartel Takes Control

BorderlandBeatcom

Mexicos famously seedy border city of Tijuana is enjoying a lull in drug murders as the countrys mostpowerful cartel gains the upper hand over its rivals [Complete article is available here httpwwwborderlandbeatcom201109tijuana-violence-slows-as-one-cartelhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3542

Network Notes| back to top |

Canadian data foreign threats Spying in the digital age (Suggested by a reader in Lithuania ndash thanks) Globe and Mail | By Colin Freeze 31 July 2010

A government spy agency thatrsquos prohibited from monitoring Canadian citizens is now usingldquoinformation about Canadiansrdquo to zero in on foreign threatsThe ambiguous statement found in a new government report detailing the activities of CommunicationsSecurity Establishment Canada could sanction a range of intelligence-gathering activities ndash includingthe controversial practice of mining ldquometadatardquo from digital communications

Metadata ndash often called data about data ndash are found in e-mails and their attachments and containdigital signatures that can reveal when where and by whom documents were created

The collection of metadata has caused controversy in other countries but never in Canada wherethe Communications Security Establishment Canada operates as an ultra-secretive agency About theonly thing that is known about the classified practices is that they were halted and resumed after someldquomajor changesrdquo including directives signed by Defence Minister Peter MacKay

ldquoI cannot comment on specific operational activitiesrdquo Adrian Simpson a CSEC spokesman toldThe Globe He stressed that reviews upheld that the activities in question were ldquocarried out inaccordance with the law ministerial requirements and CSECrsquos policies and proceduresrdquo

ldquoCSEC is prohibited from directing its activities at Canadians anyone in Canada or Canadiansanywhere in the worldrdquo he said

For decades signals-intelligence agencies in the West have been allowed to safeguard nationalsecurity by eavesdropping on foreignersrsquo conversations Spies can whatever phone lines and satellitesignals they can so long as they never listen in on fellow citizens

But in the digital age governments run increasingly sophisticated dragnets scooping up andscouring through millions of intercepted Internet conversations daily Such practices create legalambiguities

ldquoThe whole issue of what constitutes boundaries for signals-intelligence agencies in cyberspaceis a big debate right nowrdquo said Rafal Rohozinski a security expert affiliated with the University of Torontorsquos Munk School

A watchdog agency that reviews the CSECrsquos activities released an annual report to Parliament onJuly 20 ldquoWhen other means have been exhausted CSEC may use information about Canadians when it

has reasonable grounds to believe that using this information may assist in identifying and obtainingforeign intelligencerdquo it reads

Sometimes collecting metadata is relatively benign It can involve aggregating sets of data tospot trends much like the way meteorologists discern national forecasts from localized information

For example while CSEC canrsquot usually monitor the communications of specific Canadian terrorsuspects it can glean insights by zooming out for big-picture patterns One way to do that MrRohozinski said would be to look at data flows between Canadian cities and Yemen where an Internet-savvy al-Qaeda offshoot works to recruit Westerners

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3642

Metadata however can be more revealing Documents that circulate on the Internet travelaround like postmarked letters marked with return addresses ndash e-mails and attachments have embeddedcodes that speak to the who where and when behind their creation

The US National Security Agency found itself mired in controversy a few years go after itskirted domestic-spying bans by secretly upholding that this sort of American metadata was fair gamedistinct from communication contents

Therersquos little to suggest the CSEC would go that far The federal agencyrsquos activities are reviewedby a watchdog body now headed by a former Federal Court of Appeal judge Robert Deacutecary appointedlast year wrote in his annual report that he was satisfied the CSEC activities in question are lawful evenif his predecessors felt them borderline

ldquoThis was the first review of these activities since hellip their resumption under new policiesrdquo thewatchdogrsquos report says It concludes that the surveillance activities are ldquoin accordance with the lawrdquo andfollow ldquomajor changes to certain policies procedures and practicesrdquo

Much of the concern arises from the possibility that CSEC could hand over metadata intelligenceto domestic law-enforcement and security agencies

As it stands the RCMP and CSIS have to develop their domestic investigations before coming toCSEC ndash usually with warrants ndash if they want specific intelligence The rules guiding handovers are strictbecause even though all agencies run surveillance operations they do so under vastly different

mandates and legal standardsThe spy agency however stood by its practicesldquoCSEC is extremely diligent when it comes to the privacy of Canadiansrdquo Mr Simpson said

[complete article is available here httpwwwtheglobeandmailcomnewsnationalcanadian-data-foreign-threats-spying-in-the-digital-agearticle2113772 ]

Cyber Attacks Against NATO Then And Now

New Atlanticist | 6 September 2011

ldquoNow that NATOrsquos Operation UNIFIED PROTECTOR over Libya is winding down it is worth

noting how few cyber incidents were directed in protest against the Alliance Certainly there was a

cyber component to the liberation of Libya but it was more about content and Internet freedom (the

most newsworthy elements here were the role of social media and the Libyan government taking largeparts of the nation offline) But compared to past history NATO cyber defenders had a relatively easy

time

ldquoNATO has not however had an easy 2011 Although there were three significant incidents we

know about none seemed to have been in direct response to operations over Libyahelliprdquo

[Complete article is available here httpwwwacusorgnew_atlanticistcyber-attacks-against-nato-then-

and-now]

The Calm Before The Storm

Foreign Policy | By Joel Brenner 6 September 2011

Cyberwar is already happening -- and its about to get much much worse A veteran cyberwarriorexplains how America can prepare itself

Revelations of wholesale electronic fraud and massive data heists have become weekly evendaily affairs A multinational electronics corporation loses personal information on more than 100million customers Cyberthieves break into an international bank counterfeit credit balances and lootATMs in four countries grabbing $9 million in just a few hours International gangs spread maliciouscode that conscripts unwitting computers into zombie armies of hundreds of thousands of similarlyenslaved machines Criminals then rent these armies called botnets as easily as you can buy a time-sharing arrangement in a beach condo No wonder the vast majority of Internet traffic is spam

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3742

Yet the loss of personal information and related criminal fraud intolerable as they are are theleast threatening face of electronic insecurity The US militarys secret network is penetratedAmericans corporate pockets are being picked clean of the intellectual property that makes the UnitedStates tick And the electricity grid that keeps the lights on and makes everything move is dangerouslyinsecure

In one remote attack on the Pentagons information systems about 10 years ago the Chinesehauled away up to 20 terabytes of information If the information had been on paper theyd have neededa line of moving vans stretching from the Pentagon to freighters docked 50 miles away in Baltimoreharbor just to haul it away Had they done so the military district of Washington wouldve become anactive theater of operations for the first time since 1865 and the Navy wouldve blockaded theChesapeake Bay But the Chinese did it electronically so who noticed

Corporate espionage by both competitors and foreign intelligence services or their surrogates isalso increasing Intelligence officials see this but cant speak openly about the specifics and Im seeingit now in my law practice The victims rarely admit it for understandable reasons Oracle whichsuccessfully sued SAP for theft of its software code was a prominent exception Google was another

When the Chinese penetrated Google in late 2009 -- yes that operation was Chinese and yes itwas done with the blessing of a member of the Politburo -- they werent after customer informationThey were after the source code that makes Google unique Nor was Google the only victim Thousands

of US and Western firms were penetrated in that affair Foreign governments -- and not only theChinese -- understand that they cannot compete with the United States militarily and politically if theycannot compete with it economically so their intelligence services want to steal its corporate intellectualproperty This is the technology that gives America its competitive edge and often it has nothing to dowith defense Ordinary companies with valuable technology are now being targeted by nation-statesThis is a new era National security and economic security have converged

The danger is not limited to the loss of technology and information however The owners andoperators of the North American electricity grid are hooking up their control systems to the Internet asfast as they can Exposing the grid to the Internet makes it marginally more efficient but it also makes itdramatically more vulnerable to disruption If you can remotely penetrate an electronic system to stealinformation you can remotely penetrate it to shut it down or make it go haywire This is why there is no

longer a meaningful difference between information security and operational security And the biggestoperational risk is the grid In contemporary society nothing moves without electricity If the grid goesout the country stops

As the Stuxnet affair demonstrated remotely engineered disruption of industrial control systemsis now a reality That episode involved the successful electronic attack on the centrifuges in the Iraniannuclear program Only a first-class intelligence agency could have pulled that off but the blueprint fordoing it -- the code itself -- is now public Many American industrial control systems run on the samekind of equipment the Iranians were using but unlike the controls on the Iranian centrifuges thecontrols on the US grid are now being connected to the Internet making them easier to disrupt Stuxnetwas a watershed there will be copycats

Other industrial control systems will also be targets Some already are Air traffic control

railroad switches and water and sewage systems are all electronically controlled now and many arevulnerable If an intruder can break into the right server electronically he can remotely shut downproduction send your goods to the wrong destination and even unlock your doors -- and delete your logentries so he leaves no record of ever having been there

The United States does not lack enemies who would attack it this way Seized al Qaedacomputers contain details of US industrial control systems In 2003 a group affiliated with thePakistani terrorist organization Lashkar-e-Taiba -- the same gang that engineered the 2008 terroristassaults in Mumbai -- plotted to attack the Australian grid Other groups conspired to attack the Britishgrid in 2004 2006 and 2009 Yet the owners and operators of the North American grid continue willy-

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3842

nilly to expose their control systems to the Internet instead of isolating and hardening it This is folly of a high order

Important conclusions for public and corporate policy follow from this vulnerable state of

affairs First cyber insecurity has operational consequences In the current and foreseeable states of technology a high degree of assurance against electronic penetration of anything connected to theInternet is not achievable Large efficient electronically connected organizations and nations aretherefore vulnerable to remotely engineered disruption as well as information theft

Second this risk cannot be eliminated -- but it can be reduced and managed As a nation theUnited States should start by isolating the grids controls from the Internet Undoubtedly there aremarginal efficiencies to be gained by seamless connectivity over a publicly accessible infrastructure butthese gains are usually exaggerated and the risk this connectivity creates is staggering The governmentand the major telecommunications carriers must also make the investment required to re-create themassive redundancies that made the wired telephone network so robust Resilience and swift recoveryshould be the goal If the consequences of cyberattacks were reduced penetration would cease to matter

Third companies that wait for the government to solve their own security problems do so attheir peril The government is broke and the IT backbone is 85 percent private so the governmentdoesnt control it The governments role in altering the status quo will be limited to setting standardsusing its purchasing power to move vendors toward better security and getting its own house in order

The government can neither secure corporate intellectual property nor protect firms against operationaldisruption

Fourth in a world in which everything cannot be protected companies must determine forthemselves what intellectual property and physical assets to isolate and safeguard Those that approachthis task seriously will quickly learn that technology is only one aspect of their insecurity and in manycases the easiest to deal with Unless technology is integrated with personnel practices and operationalsecurity it opens vulnerabilities that its users rarely understand This kind of integration requires theautomated enforcement of reasonable security policies and systematic workforce training and thatoccurs only when management the lawyers and the technologists work closely together This is an old-fashioned management challenge -- not a technological one For their part corporate boards need to takeIT security seriously and launch audits that examine how their systems are actually implemented and

used not merely how they are designed Because as the techies like to put it the weakest link in anysystem is not the silicon-based unit on the desk its the carbon-based unit in the chair Joel Brenner is author of the forthcoming America the Vulnerable Inside the New Threat Matrix of

Digital Espionage Crime and Warfare He has served as the inspector general of the National Security

Agency the national counterintelligence executive and the NSAs senior counsel He now practices law

at Cooley LLP in Washington DC

Cyberattacks Decline Slightly Symantec Report Finds

Dark Reading | 1 September 2011

Organizations worldwide are suffering damages as a result of cyberattacks but interestingly there hasbeen a slight decline in these attacks during the past 12 months according to a new report from

Symantec More than 90 percent of the more than 3300 respondents across 36 countries said theyexperienced tangible losses as a result of a hack with 84 percent reporting financial loss to the cost of abreach Around one-fifth lost at least $195000 in breaches during the past 12 months

Meanwhile Symantec attributes the unexpected bright spot of a decline in breaches toorganizations employing better cybersecurity defenses More than 70 percent of organizations sawattacks in the past 12 months a decline of 5 percent from 2010 And those that experienced anincreasing frequency of attacks dropped from 29 percent in 2010 to 21 percent this year While 100percent last year reported losses from cyberattacks 92 percent did so in 2011 The trend seemscounterintuitive given the rash of high-profile breaches this year More

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 24: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2442

4 The SEAL Raid in Iran That Didnt HappenWhen US forces routed the Taliban government in Afghanistan and forced bin Laden and his toplieutenants to flee many senior al Qaeda leaders including bin Laden and his deputy Ayman al-Zawahri escaped to neighboring Pakistan But a separate group including the al Qaeda leaders sonSaad bin Laden fled to northern Iran where American troops would not pursue them and the Iranianswould likely not detain them But the Shiite clerics running Iran placed the al Qaeda operatives and theirfamily members under virtual house arrest and they became a shield against possible attacks from theSunni-based terrorist organization

One plan in particular illustrated the bold thinking and wildly unrealistic aims of the militarysinitial approach after 911 to kill or capture terrorist leaders The plan called for hunting the eight to 10senior al Qaeda leaders and operatives who had sought refuge in Chalus an Iranian resort town on theCaspian Sea where they had been detained

At the Joint Special Operations Command at Fort Bragg NC military planners drew up optionsfor Navy SEALs to sneak ashore at night using state-of-the-art mini-submarines Once they landed theSEALs would slip past Iranian guards to snatch the al Qaeda leaders Another option called for SpecialOperations helicopters to spirit American commandos into the town and whisk them out again with theirquarry The Americans went as far as conducting two or three rehearsals at an undisclosed locationalong the US Gulf Coast in early 2002 They conducted small-boat insertion exercises involving about

30 Special Operations personnel most SEALs and eventually concluded the mission was feasible if they were provided with more detailed intelligence on the locations of the al Qaeda members and thesecurity around them

The logistics of the mission were daunting Chalus sits at the edge of the Elburz coastal mountainrange about 70 miles north of Tehran and the failed rescue of the American hostages in Iran in April1980 loomed large in commanders memories Eventually Gen Richard B Myers the chairman of theJoint Chiefs of Staff rejected the mission as too risky and too politically volatile Many of the al Qaedaoperatives are reportedly still there

5 Intelligence Hauls of Unusual Size

US intelligence and military commandos have carried out tens of thousands of raids in the decade since911 The amount of material seized from terrorist and insurgent targets has grown to a massive sizeThe Defense Intelligence Agency (DIA) operates exploitation triage centers and giant warehouses forstoring intelligence products -- in war zones rear headquarters in countries like Qatar and back in theUnited States One intelligence analyst said that walking into one of the warehouses for documents andmedia exploitation reminded him of the final scene in Raiders of the Lost Ark when the captured Ark of the Covenant is crated up and rolled into a cavernous storage area that contains all the governmentsother dangerous secrets

All told more than two million individual documents and electronic files have been cataloguedby media type hard copy phone number thumb drive Each is inspected by a linguist working with acommunications analyst or computer expert

The DIA analysts are joined by specialists from other agencies including the FBI and the DrugEnforcement Administration Yet given the overwhelming volume no more than about 10 percent of thecaptured intelligence has ever been analyzed

Intelligence officers say they simply are overwhelmed and untold quality leads may still beburied in the piles of computers digital files travel documents and pocket litter

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2542

6 The Digital Counterjihad Cyberspace is the terrorists ultimate safe haven Its where they recruit raise money and even plotattacks using coded language while playing online video war games The US government fights back

One technique is called false band replacement whereby the intelligence agencies infiltratemilitants networks and post their own material to counter extremist efforts on those same jihadistwebsites The trick is to forge the onscreen trademarks -- web watermarks -- of al Qaeda media sites

This makes messages posted on these sites official and sows dissent and confusion among themilitants

This Internet spoofing can be used in support of more traditional combat missions There is atleast one case confirmed by American officials in which a jihadist website was hacked by Americancyberwarriors to lure a high-value al Qaeda to a surreptitious meeting with extremist counterparts -- onlyto find a US military team in waiting

Getty images

7 First Kill the MullahsUS counterterrorism officials have learned fighting terrorists effectively means targeting specific nodesof that network that support and enable militants who strap on suicide vests This strategy focuses onneutralizing enablers such as the financiers gun-runners and logisticians Among these terror linchpins

are religious leaders who bless attacksHeavenly reward will not await a suicide bomber unless his death and those of his victims is

deemed halal in keeping with Islams sacred sharia law Each militant network has a sharia emir usuallyat the level of a sheikh or mullah In Iraq American commanders specifically killed emirs to throw awrench in a suicide bombing networks

Take him out and suicide bombings from that network are frozen until he is replaced said onemilitary officer with command experience in Iraq hellip[Complete article is available herehttpwwwforeignpolicycomarticles201109067_things_you_didn_t_know_about_the_war_on_terror]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2642

Dick Marty Rendition Report Condemns lsquoCult of Secrecyrsquo

BBC News | 8 September 2011

A report for Europes human rights watchdog has called for greater scrutiny of secret services andsupport for whistleblowers The Council of Europe investigated how countries like Britain GermanyRomania and Lithuania assisted the US with the rendition of terror suspects It said a cult of secrecyhad helped Western governments cover up abuses Defending whistleblowers it singled out USsoldier Bradley Manning accused of passing secrets to Wikileaks He had acted as a whistleblowerand should be treated as such CoE rapporteur Dick Marty wrote in the report which was due to besubmitted to the CoEs Parliamentary Assembly The soldier is currently in a US military prisonawaiting trial for passing restricted material to the controversial website

But the report praised Mr Manning and Wikileaks itself for uncovering evidence of renditionThe CoE represents 47 member-states including both EU countries and Russia and other ex-Sovietstates Mr Martys report focused on the record of Western states explaining that it was based oninvestigations into European links to the controversial US policy of rendition for terrorism suspectsThe CIA allegedly flew terror suspects around the world for interrogation in the years after 911 holdingthem in secret prisons in Europe and elsewhere

No licence to kill

In his 48-page report - entitled Abuse of State Secrecy and National Security - Mr Marty looked at thelevel of control exercised by European states over their security services He urged all states to useindependent parliamentary committees to oversee the work of their secret services saying this was of vital importance for the rule of law and democracy Mr Marty argued that Western governments wereusing the notion of state secrecy to shield their intelligence services from accountability for seriousviolations committed during anti-terrorist operations We consider that this is simply unacceptablehe wrote

A licence to kill (or to abduct and torture) only exists in certain films and in dictatorialregimes In democratic systems parliaments as representatives of the people have a right and duty toknow what the government is doing in the name of the people Mr Marty praised investigative journalists and non-governmental organisations for their work in exposing abuses of authority Stressing

the fundamental role whistleblowers had to play in an open society he warned against a real cult of secrecy as an instrument of power

While it was up to the courts to decide if Bradley Manning had committed any crime he wrotethe CoE was indebted to him for the publication of a recording of a helicopter attack in Iraq in whichthe crew seems to have intentionally targeted and killed civilians

Thanks to Mr Manning he said a large number of embassy reports had allowed us to learnsignificant details of important recent events which are obviously of general interest We therefore join Amnesty International in expressing our worries as to the treatment he receives Mr Marty wrote inthe draft report[Article continues here httpwwwbbccouknewsworld-europe-14820145]Comment This report demonstrates that Dick Marty is not as De Gaulle would say a serious man To

suggest that Bradley Manning is a hero and intelligence agencies bent on defeating terrorists arecriminals should say it all Manning knowingly violated his oath and willfully provided enormousamounts of classified material to WikiLeaks For Marty this is a good thing in the name of transparencyMarty always injudicious and anti-American in his remarks is now moving at warp speed into crackpotterritory

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2742

Al Qarsquoida amp its Affiliates| back to top |

Al Qaeda Is Down Not Out

Los Angeles Times | By Amy Zegart 7 September 2011

US talk of defeating terrorism is dangerously prematureTalk of strategically defeating Al Qaeda is all the rage in the White House these days Defense

Secretary Leon Panetta used the D-word in July President Obama declared in his new counter-terrorism strategy We can say with growing confidence that we have put Al Qaeda on the path todefeat Compared to the woeful state of the economy terrorism has become the administrations feel-good story of the year

Defeat is a big word It is also dangerously misleading Yes the United States has made greatstrides in the last decade to harden targets improve intelligence and degrade the capabilities of violentIslamist extremists Osama bin Ladens death was a major accomplishment But the fight is nowhereclose to being won and Americas most perilous times may lie ahead Three reasons explain why

The first is that strategically defeating Al Qaeda is not nearly as important as it sounds After911 Al Qaeda morphed into a more complicated decentralized and elusive threat consisting of threeelements core Al Qaeda affiliates or franchise groups operating in places like Yemen and Somalia with

loose ties to the core group and homegrown terrorists inspired by violent extremism often through theInternet in the comfort of their own living rooms

Core Al Qaedas capabilities started degrading in 2001 when the US invaded Afghanistandismantled training camps ousted the Taliban and sent Bin Laden running The CIA has estimated thecore group remaining in the AfghanistanPakistan region to number 50 to 100 fighters The last time BinLaden oversaw a successful operation was 2005 when Al Qaeda struck the London transit system

But plots by homegrowns and franchise groups have risen dramatically in recent years The 2009Ft Hood shooting the worst terrorist attack on US soil since 911 was the work of a homegrownterrorist The mastermind of the 2010 Times Square car bomb plot was a naturalized American citizentrained by the Pakistani Taliban not Al Qaeda Another franchise group Al Qaeda in the ArabianPeninsula was behind the foiled 2009 Christmas Day underwear bomber aviation plot and the 2010

plot to explode tampered printer cartridges aboard cargo planes The Bipartisan Policy Center reported11 violent Islamist extremist terrorist incidents against the US homeland in 2009 the most since 911Nearly all involved what former CIA Director Mike Hayden calls a witches brew of radicalizedAmericans and franchise groups

The second reason why talk of defeat is premature has to do with weapons Terrorism againstAmericans is nothing new The potential for terrorist groups to acquire weapons of mass destruction isIn 1995 a Japanese cult released sarin nerve gas in the Tokyo subway killing 12 people and injuringthousands It was the first WMD terrorist attack in modern history and it sparked a wave of presidentialterrorism commissions years before Bin Laden became a household name

It is this specter of the lone fanatic or small group armed with the worlds most devastatingweapons that keeps experts up at night In 2005 60 leading nuclear scientists and terrorism experts were

asked how many believed the odds of a nuclear attack on the US were negligible Only three or fourhands went up most were far more pessimistic Today there is enough nuclear material to build120000 weapons As long as fissile material is poorly stored and rogue states like Iran and North Koreacontinue their illicit weapons programs nuclear terrorism remains a haunting possibility

The third reason is that the FBI has not yet become a first-rate domestic intelligence agencyAnalysts whose work is vital to success are still second-class citizens labeled support staff alongsidesecretaries and janitors and passed over for key jobs including running the bureaus intelligence unitsThe FBIs information technology is so antiquated it belongs in a museum And the old crime-fighting

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2842

culture still lives There is now a move afoot to shrink new classified facilities so that agents dont haveto waste time away from their cases to read intelligence documents thereStrategically defeating Al Qaeda sounds too good to be true Because it is Amy Zegart is a senior fellow at Stanfords Hoover Institution and the author of Eyes on Spies

Congress and the United States Intelligence Community

US Counterterror Chief Al-Qaida On Steady Slide

Bostoncom | 31 August 2011

White House counterterrorism chief John Brennan said al-Qaida is on a steady slide after the death of al-Qaidas latest second-in-command in Pakistan Brennan told The Associated Press on Wednesdaythat its a huge blow in the first official White House comment since Atiyah Abd al-Rahmans reportedkilling by CIA drone strike in Pakistans tribal areas last week

Al-Qaida is sort of on the ropes and taking a lot of shots to the body and the head Brennansaid This is a time not to step back and let them recover a message he says hes sending to hiscounterparts in Pakistan[Article continues herehttpwwwbostoncomnewsnationwashingtonarticles20110831us_counterterror_chief_al_qaida_on_steady_slide ]

Al-Qaeda (AKA Al-Qaida Al-Qarsquoida)

Council on Foreign Relations | 29 August 2011

ldquoAl-Qaeda an international terrorist network is considered the top terrorist threat to the United StatesThe group is wanted for its September 11 2001 attacks on the World Trade Center and the Pentagon aswell as a host of lesser attacks To escape the post-911 US-led war in Afghanistan al-Qaedas centralleadership fled eastward into Pakistan securing a safe haven in loosely governed areas there In July2007 US intelligence agencies found that the organization was regrouping and regaining strength inthese tribal areas along the border with Afghanistan though targeted killings of senior al-Qaeda leadershave since diminished the groups command and control capabilities In February 2009 Director of National Intelligence Dennis C Blair told lawmakers that the groups core is less capable and effective

than it was a year ago The killing of al-Qaedas top leader Osama bin Laden by US forces in Pakistanin May 2011 served a significant blow to the organization but analysts say al-Qaeda remains deadlywith its networks spread all over the world Plus a number of affiliated groups have gained prominencein recent years complicating the task of containing the organizationrdquo

[Article continues here httpwwwcfrorgterrorist-organizationsal-qaeda-k-al-qaida-al-qaidap9126]

Al Qaeda In The Islamic Maghreb

CSIS | 1 September 2011

ldquoAl Qaeda in the Islamic Maghreb (AQIM) emerged from a decades-long militant Islamist tradition inAlgeria In 1998 the Salafist Group for Preaching and Combat (Groupe Salafiste pour la Preacutedication etle Combat or GSPC) broke away from the Armed Islamic Group (GIA) because of the GIArsquos extensive

targeting of civilians Gradually the GSPC evolved to encompass global jihadist ideology in addition toits historical focus on overturning the Algerian state In 2006 the GSPC officially affiliated with alQaeda core soon rebranding itself as al Qaeda in the Islamic Maghreb In the following years AQIMwas able to conduct a small number of large-scale attacks most notably its 2007 bombing of the UNheadquarters in Algiers In recent years counterterrorism pressure and weak governance have combinedto shift the center of AQIMrsquos presence to the Sahara-Sahel region AQIM continues to make its presenceknown through smuggling operations kidnappings and clashes with security forces in the desert In thecoming years general instability within the region could allow AQIM to further expand its influencerdquo[Complete article is available here httpcsisorgfilespublication110901_Thornberry_AQIM_WEBpdf ]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2942

AQ Strategy

The Assynt Report | 11 August 2011

Executive Summary Al-Qaedarsquos broad objectives remain unchanged in the wake of bin Ladenrsquos death There

are nonetheless growing questions over al-Qaedarsquos capability Longstanding paranoiaover the use of electronic communications is heightened by the ongoing US dronecampaign whilst attacks against the West have generally been disrupted at an early stage

The Pakistani Talibanrsquos attack on a Karachi naval base in May 2011 was a significantmilitary success and the first major act of revenge for bin Ladenrsquos killing Furtherattempts to avenge his loss are certain

All parts of al-Qaeda are working within a cohesive framework with the ultimate aim of restoring the Islamic Caliphate (Khilafa) The strategic plan to support this aim wasdrafted by 40 of al-Qaedarsquos brightest thinkers in Kandahar Afghanistan in November1999 This plan consists of four phases each seven years long leading to the dissolutionof corrupt regimes and the union of all newly-liberated states within the Khilafa

Apart from mounting strategic operations al-Qaedarsquos role is to be the inspiration for atruly global jihadist movement It seeks to achieve this through provision of trainingbeing a role model for others to follow extending acceptance and adoption of its tactics

particularly suicide bombings and professionalising jihadist media to build a commonbrand and message between hitherto separate groups

Between the late 1990s and 2003 the organisation was primarily devoted to classicinternational terrorism Most effort is now spent fighting insurgencies from North Africato South Asia The way in which this strategy helps to spread the struggle has been seenin North-West Africa where the initial development of al-Qaeda in the Islamic Maghrebwas in part fed by men returning from fighting with al-Qaeda in Iraq

Since mid-2009 al-Qaeda and its affiliates have increasingly encouraged jihadist-sympathisers resident in Western countries to engage in violence themselves withoutcentral direction or training making surveillance more difficult

One of the keys to awakening the spirit of jihad was the success in portraying the US and

its allies as Crusaders in the Muslim world Al-Qaedarsquos strategy essentially requires thatthis process be kept running until the forces of jihad have grown large enough to launchsuccessful liberation operations

Despite its successes in Afghanistan al-Qaedarsquos credibility has suffered both from its failure to landanother strategic blow on the West on the scale of 911 and also excessive Muslim casualties in someoperations Similarly al-Qaeda in Iraq was set back by its excessive sectarian zeal and local resentmentat the foreign fighter presence In turn this affected the movementrsquos funding from the Gulf

Analysis Sub-Saharan African Leaders Media Focus On Threats Prior to 911

OSC Feature | Sub-Sahara Africa -- OSC Analysis 6 September 2011Statements by Sub-Saharan African leaders and African media reports on terrorism prior to the 10thanniversary of 911 focus on the growing threats from local extremists and Al-Qaida affiliatesparticularly in West Africa with little direct commentary on the anniversary or US counterterrorismpolicies This focus on domestic threats suggests that counterterrorism messages expressing solidaritywith African nations and acknowledging the evolving terrorist threat on the continent would have thegreatest resonance with African audiences

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3042

Leaders Stressing Determination To Counter Local Threats African leaders public statements reflect an ongoing concern about the threat of terrorism on thecontinent and a strong commitment to find ways to combat this threat

Nigerian President Goodluck Jonathan emphasized the governments commitment tovigorously combat terrorism following the 26 August bombing of the UN office inAbuja by Nigerian extremist group Boko Haram reported the Paris-based news agencyAFP President Jonathan is hosting Liberian President Ellen Johnson Sirleaf and otherforeign dignitaries for a three-day forum on terrorism and economic crimes the widelyread Lagos-based independent daily The Guardian reported on 4 September

Malian President Amadou Toumani Toure launched a Special Program for PeaceSecurity and Development on 9 August stating that development remained the mostviable solution to counter threats to the countrys stability reported Malis state-owneddaily LEssor[ 3] The program aimed to undermine support for Al-Qaida in the IslamicMaghreb (AQIM) according to Burkinabe web portal Lefasonet on 11 August

Somali Prime Minister Abdiweli Muhammad Gas stated on 23 August that theTransitional Federal Government planned to remove Al-Shabaab from the central andsouthern regions in Somalia with the goal of restoring peace within one year so the

country can hold national elections according to the Puntland-based Garowe Online

Experts Media Highlight New Capabilities Tactics

African experts and media outlets are warning about the evolving nature of terrorist organizations on thecontinent the terrorists pursuit of new targets and tactics and their potential for taking advantage of regional instability

Leading South African think tank the Institute for Security Studies stated on 29 Augustthat Boko Harams attack on the UN in Abuja completes Boko Harams metamorphosisinto an international terrorist group Since December 2010 Boko Haram had killed over600 people in over 70 attacks against Nigerian targets according to the think tank buthad not previously targeted Western or international interests

A 26 August article on the popular Malian web portal Maliweb voiced concern thatAQIM could benefit from Tuareg mercenaries many of whom were recently returningfrom fighting in Libya and could benefit from an increase in arms trafficking through theSahel during the Libyan conflict

Ugandas privately owned Daily Monitor reported on 19 August that AU forces inSomalia warned that Al-Shabaab planned to increase the number of kidnappings andbomb attacks as part of its new strategy to shift from controlling territory in Mogadishuto conducting more of an insurgent campaign

Concern Over Al-Qaida Presence Terrorist Collaboration

West African official statements and media reports reflect a growing concern over an increased Al-

Qaida presence in West Africa and collaboration with AQIM Al-Shabaab and Boko Haram

Nigerian security services reported that the suspected mastermind behind the 26 Augustbombing of the UN office in Abuja was a Boko Haram member with close links to Al-Qaida and Al-Shabaab according Nigerias privately owned Daily Sun

A 28 August report in the privately owned daily Nigerian Tribune claimed that the 26August bombing in Abuja was part of Al-Qaidas plans to mark the 10th anniversary of 911 and called Boko Haram Al-Qaidas ally in the region

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3142

An 8 August commentary in Burkina Fasos LObservateur Paalga said that reports of Boko Haram collaboration with Al-Shabaab and AQIM could indicate that Al-Qaida isextending its African tentacles Abdourahmane Dieng security division chief of theEconomic Community of West African States said the collaboration represented a veryserious threat according to Senegals progovernment Le Soleil on 5 August

Messages Likely To Resonate With African Audience

Sub-Saharan Africas increasing concern about the shifting nature and potential strengthening of theterrorist threat on the continent suggests that messages directly addressing the impact of terrorism onAfricans the increasingly complex nature of the threat and the need for multilateral cooperation againstterrorism are most likely to resonate with Africans

Messages expressing solidarity and sympathy for Africans affected by Boko Haram Al-Shabaab and AQIM would almost certainly resonate with a broad African audience

African political and military leaders would probably welcome acknowledgement of thecomplex and changing nature of terrorism on the continent and recognition of theirinitiatives and commitment to countering violent extremism

African leaders and medias concern about potential collaboration between Boko Haram

Al-Shabaab and AQIM suggest that they would be open to improving multilateral andcross-regional sharing of lessons learned and strategies to counter the intensification of terrorism within Africa

Aviation and Maritime Security| back to top |

Bomb Threats Force Jets To Land

Associated Press | 7 September 2011

Both landed safely one landed in Ankara Ataturk International Airport and the other at Kuala LumpurTwo flights operated by Pakistans state-owned airline received bombs threats on Wednesday

and both landed safely one in Turkey the other in Malaysia officials said No bombs were found The

first flight was headed for Manchester England when it was notified of the threat near the Bulgariancapital of Sofia The crew contacted the control tower in Istanbul to seek permission for the landingstate-run Anatolia news agency reported Authorities quickly evacuated all 378 passengers from theBoeing 777-300ER aircraft after it parked at a remote corner of the International Ataturk Airport andbomb squads began searching the plane with sniffer dogs Anatolia reported PIA spokesman MashoodTajwar confirmed the flight received a threat and landed All passengers were safe A police searchturned up no bomb officials said Later a second PIA flight from Islamabad to Kuala Lumpur alsoreceived a bomb threat It landed in Kuala Lumpur and all the passengers disembarked safely saidTajwar The UK-bound Pakistan International Airlines plane was forced to make an emergency landingat Ataturk Airport in Istanbul after receiving a bomb threat Malaysias airports authority said thepassengers were being screened and the plane was isolated in a parking area while being searched bypolice No bomb was found

It said the plane carried 164 passengers and 13 crew Azmi Murad senior general manager forthe authority said the Pakistani airline informed it that the warning came by email Mr Tajwar gave nodetails on the nature of the threat or how it was delivered Pakistan is home to al Qaedas top leadershipMilitants who trained there have been responsible for many of the attacks and failed plots in the USand Europe since Sept 11 2001 when planes hijacked by al Qaeda militants destroyed the World TradeCenter in New York and crashed into the Pentagon The bomb threats came four days before the 10thanniversary of 911 but there was no apparent link to Islamist militants who typically do not alertauthorities in advance The FBI and Homeland Security department issued warnings last weekend aboutal Qaeda threats to small airlines

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3242

Commentary amp Opinion| back to top |

From Terror Group Founder To Libyan Rebel Military Commander

ABCNews | 29August 2011

The same man who triumphantly led Libyan rebels into Gadhafis compound last week first came to theattention of the US intelligence community years ago - as a founder of a terror group

Abdelhakim Belhaj who was recently appointed to Tripolis rebel military council was one of the original founders of the Libyan Islamic Fighting Group an anti-Gadhafi group which was laterdesignated by the US State Department as a terrorist organization with links to al Qaeda according toUS government reports

We proudly announce the liberation of Libya and that Libya has become free and that the ruleof the tyrant and the era of oppression is behind us a victorious Belhaj told reporters after the stormingof Gadhafis Bab al-Aziziya compound last week Ousting Gadhafi had been the main objective of theLIFG since its inception in the early 1990s even if some of the fighters believed that meant puttingAmericans in the crossfire

The group carried out operations against the Libyan government including at least four suspectedassassination attempts against Gadhafi in the 1990s and was also believed to be connected to a series of suicide bombings in Casablanca Morocco in 2003 the US State Department reported As relationsbetween the US and Gadhafi improved in the mid-2000s some LIFG leaders cultivated relationshipswith top al Qaeda leaders including Osama bin Laden and were suspected of funneling fighters to Iraq tocarry out operations against US soldiers

When the LIFG was designated a terror organization in 2004 it was meant as a gesture of solidarity with the Libyan government according to a March 2011 congressional report

Contrary to several US government reports Libyan rebel ambassador to the US Ali Aujalitold ABC News that the LIFG was never connected to al Qaeda and did not carry out terrorist operations

They were only opposed to Gadhafi during his rule and paid the price for that by beingoppressed by the regime Aujali said

The CIA first publicly voiced its concerns about the connection between the LIFG and al Qaedain 2004 when then-director George Tenet testified before the Senate Select Committee on Intelligenceand listed the LIFG among groups that represented an immediate threat [that] has benefited from alQaeda links[Article continues here httpabcnewsgocomBlotterterror-group-founder-libyan-rebel-military-commanderstoryid=14405319]

Interview With Saudi Sheik Wajdi Al-Ghazawi

MemriTVcom

Sheik Wajdi al-Ghazawi owner of al-Fajr TV criticizes extremist atmosphere in Saudi Arabia and saysafter 911 They Handed Out Sweets on the Streets of Mecca

Following are excerpts from a statement by Saudi Sheik Wajdi Al-Ghazawi owner of Al-FajrTV which was posted on YouTube on August 4 2011

Wajdi Al-Ghazawi When Al-Qaeda and Osama Bin Laden were at the height of their mightthey were extremely popular in Saudi Arabia From mosque pulpits across Saudi Arabia preacherswould pray for their success Moreover from the pulpits of the most important mosques ndash the Al-HaramMosque in Mecca and the Nabawi Mosque in Al-Madina ndash direct prayers for the success of Al-Qaedawere made during the days of the bombing of Tora Bora Oh Allah help our brothers in AfghanistanThese supplications were made during evening prayers as well as Friday prayers The preachers wouldpray for them in violation of the ministrys instructions

When the twin towers in New York were attacked they handed out sweets on the streets of Mecca By Allah they did I witnessed this myself The young people bowed in prayer and hugged one

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3342

another out of joy People were in heaven because of these young men who destroyed America andbombed this idol Am I right or not Was it like that or not

Back then when the Taliban broke off a piece of the nose of the Buddha statue which was hewnin the mountain an entire sermon was dedicated to it in the mosque in Mecca and the preacher was laterreprimanded for this sermon The entire Saudi people supported and loved Al-Qaeda

This went on until our brothers in Al-Qaeda ndash and I dont know what was going through theirminds ndash began to carry out operations inside Saudi Arabia Thats when we all raised our hands andsaid Youve gone too far We wont support you in this

The atmosphere here in Saudi Arabia is one of extremism It is characterized by focusing onminor details Many things are forbidden Yes maybe they are indeed forbidden but by forcing peopleto avoid them and by acting as if these were major sins an atmosphere was created that gave rise toextremist youth who might act recklessly at the most trivial provocation

For instance we blew out of proportion the issue of music the issue of smoking or the issue of hanging pictures in public places True there are clear texts on these issues but the young peopleembraced these issues as if they were fighting usury fornication or alcohol No these are not among theseven major sins So our society has become extreme

This extremist atmosphere has given rise to people who accuse others of heresy and people whopurport to be waging Jihad It has created genes that gave rise to cells of Al-Qaeda and other terrorists

We must examine our breeding ground in which these young men were sownBy Allah what can possibly emerge from such an atmosphere Muftis who accuse others of

heresy sheiks who incite and young people who bomb Am I right or not[Complete clip is available here httpwwwmemritvorgclipen3099htm]

Legal Aspects amp Lawfare| back to top |

Revisiting A Stale Counterterrorism Law

Council on Foreign Relations | 1 September 2011

ldquoNearly a decade after 911 the United States still relies on the 2001 Authorization for the Use of Military Force (AUMF) for the killing and detention of those considered responsible for or associatedwith the terrorist attacks But CFR national security law expert John Bellinger says it is becomingincreasingly difficult for the Obama administration to justify some of its counterterrorism operationsunder this limited statutory authority It has been used in defense of actions including drone attacks onindividuals as well as the targeting of groups in Yemen and Somalia that may have only the mosttenuous affiliation or association to the 911 attack A revised AUMF should clarify those operations aswell as the issue of detention specifically which individuals can be detained for how long and subjectto what processes There also needs to be greater effort at the international level he adds to fill thegaps in the law that covers conflicts between states and non-state actorsrdquohelliprdquo[Complete article is available here httpwwwcfrorgcounterterrorismrevisiting-stale-

counterterrorism-lawp25742]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3442

Narco-Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector[Complete article is available here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Mexicos Cartels Move Into Extortion

At a construction site of an apartment building in the heart of the Mexican capital a company engineerruns through his weekly payroll sheet He has salaries written out for carpenters bricklayers andelectricians At the bottom of the sheet is a notation of $200 for ldquosecurity servicesrdquo next to a nicknameldquoEl Indiordquo mdash the Indian [Complete article is available here

httpwwwtucsonsentinelcomnationworldreport090611_mexico_cartels_bribesmexicos-cartels-move-into-extortion ]

Seven Die In Mexican Pacific Port City

Latin American Herald Tribune

Seven people died in separate shootings in Mazatlan a port city in the northwestern Mexican state of Sinaloa with some of the incidents drug-related a police spokesman told Efe [Complete article is available herehttpwwwlahtcomarticleaspCategoryId=14091ampArticleId=423061]

Tijuana Violence Slows As One Cartel Takes Control

BorderlandBeatcom

Mexicos famously seedy border city of Tijuana is enjoying a lull in drug murders as the countrys mostpowerful cartel gains the upper hand over its rivals [Complete article is available here httpwwwborderlandbeatcom201109tijuana-violence-slows-as-one-cartelhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3542

Network Notes| back to top |

Canadian data foreign threats Spying in the digital age (Suggested by a reader in Lithuania ndash thanks) Globe and Mail | By Colin Freeze 31 July 2010

A government spy agency thatrsquos prohibited from monitoring Canadian citizens is now usingldquoinformation about Canadiansrdquo to zero in on foreign threatsThe ambiguous statement found in a new government report detailing the activities of CommunicationsSecurity Establishment Canada could sanction a range of intelligence-gathering activities ndash includingthe controversial practice of mining ldquometadatardquo from digital communications

Metadata ndash often called data about data ndash are found in e-mails and their attachments and containdigital signatures that can reveal when where and by whom documents were created

The collection of metadata has caused controversy in other countries but never in Canada wherethe Communications Security Establishment Canada operates as an ultra-secretive agency About theonly thing that is known about the classified practices is that they were halted and resumed after someldquomajor changesrdquo including directives signed by Defence Minister Peter MacKay

ldquoI cannot comment on specific operational activitiesrdquo Adrian Simpson a CSEC spokesman toldThe Globe He stressed that reviews upheld that the activities in question were ldquocarried out inaccordance with the law ministerial requirements and CSECrsquos policies and proceduresrdquo

ldquoCSEC is prohibited from directing its activities at Canadians anyone in Canada or Canadiansanywhere in the worldrdquo he said

For decades signals-intelligence agencies in the West have been allowed to safeguard nationalsecurity by eavesdropping on foreignersrsquo conversations Spies can whatever phone lines and satellitesignals they can so long as they never listen in on fellow citizens

But in the digital age governments run increasingly sophisticated dragnets scooping up andscouring through millions of intercepted Internet conversations daily Such practices create legalambiguities

ldquoThe whole issue of what constitutes boundaries for signals-intelligence agencies in cyberspaceis a big debate right nowrdquo said Rafal Rohozinski a security expert affiliated with the University of Torontorsquos Munk School

A watchdog agency that reviews the CSECrsquos activities released an annual report to Parliament onJuly 20 ldquoWhen other means have been exhausted CSEC may use information about Canadians when it

has reasonable grounds to believe that using this information may assist in identifying and obtainingforeign intelligencerdquo it reads

Sometimes collecting metadata is relatively benign It can involve aggregating sets of data tospot trends much like the way meteorologists discern national forecasts from localized information

For example while CSEC canrsquot usually monitor the communications of specific Canadian terrorsuspects it can glean insights by zooming out for big-picture patterns One way to do that MrRohozinski said would be to look at data flows between Canadian cities and Yemen where an Internet-savvy al-Qaeda offshoot works to recruit Westerners

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3642

Metadata however can be more revealing Documents that circulate on the Internet travelaround like postmarked letters marked with return addresses ndash e-mails and attachments have embeddedcodes that speak to the who where and when behind their creation

The US National Security Agency found itself mired in controversy a few years go after itskirted domestic-spying bans by secretly upholding that this sort of American metadata was fair gamedistinct from communication contents

Therersquos little to suggest the CSEC would go that far The federal agencyrsquos activities are reviewedby a watchdog body now headed by a former Federal Court of Appeal judge Robert Deacutecary appointedlast year wrote in his annual report that he was satisfied the CSEC activities in question are lawful evenif his predecessors felt them borderline

ldquoThis was the first review of these activities since hellip their resumption under new policiesrdquo thewatchdogrsquos report says It concludes that the surveillance activities are ldquoin accordance with the lawrdquo andfollow ldquomajor changes to certain policies procedures and practicesrdquo

Much of the concern arises from the possibility that CSEC could hand over metadata intelligenceto domestic law-enforcement and security agencies

As it stands the RCMP and CSIS have to develop their domestic investigations before coming toCSEC ndash usually with warrants ndash if they want specific intelligence The rules guiding handovers are strictbecause even though all agencies run surveillance operations they do so under vastly different

mandates and legal standardsThe spy agency however stood by its practicesldquoCSEC is extremely diligent when it comes to the privacy of Canadiansrdquo Mr Simpson said

[complete article is available here httpwwwtheglobeandmailcomnewsnationalcanadian-data-foreign-threats-spying-in-the-digital-agearticle2113772 ]

Cyber Attacks Against NATO Then And Now

New Atlanticist | 6 September 2011

ldquoNow that NATOrsquos Operation UNIFIED PROTECTOR over Libya is winding down it is worth

noting how few cyber incidents were directed in protest against the Alliance Certainly there was a

cyber component to the liberation of Libya but it was more about content and Internet freedom (the

most newsworthy elements here were the role of social media and the Libyan government taking largeparts of the nation offline) But compared to past history NATO cyber defenders had a relatively easy

time

ldquoNATO has not however had an easy 2011 Although there were three significant incidents we

know about none seemed to have been in direct response to operations over Libyahelliprdquo

[Complete article is available here httpwwwacusorgnew_atlanticistcyber-attacks-against-nato-then-

and-now]

The Calm Before The Storm

Foreign Policy | By Joel Brenner 6 September 2011

Cyberwar is already happening -- and its about to get much much worse A veteran cyberwarriorexplains how America can prepare itself

Revelations of wholesale electronic fraud and massive data heists have become weekly evendaily affairs A multinational electronics corporation loses personal information on more than 100million customers Cyberthieves break into an international bank counterfeit credit balances and lootATMs in four countries grabbing $9 million in just a few hours International gangs spread maliciouscode that conscripts unwitting computers into zombie armies of hundreds of thousands of similarlyenslaved machines Criminals then rent these armies called botnets as easily as you can buy a time-sharing arrangement in a beach condo No wonder the vast majority of Internet traffic is spam

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3742

Yet the loss of personal information and related criminal fraud intolerable as they are are theleast threatening face of electronic insecurity The US militarys secret network is penetratedAmericans corporate pockets are being picked clean of the intellectual property that makes the UnitedStates tick And the electricity grid that keeps the lights on and makes everything move is dangerouslyinsecure

In one remote attack on the Pentagons information systems about 10 years ago the Chinesehauled away up to 20 terabytes of information If the information had been on paper theyd have neededa line of moving vans stretching from the Pentagon to freighters docked 50 miles away in Baltimoreharbor just to haul it away Had they done so the military district of Washington wouldve become anactive theater of operations for the first time since 1865 and the Navy wouldve blockaded theChesapeake Bay But the Chinese did it electronically so who noticed

Corporate espionage by both competitors and foreign intelligence services or their surrogates isalso increasing Intelligence officials see this but cant speak openly about the specifics and Im seeingit now in my law practice The victims rarely admit it for understandable reasons Oracle whichsuccessfully sued SAP for theft of its software code was a prominent exception Google was another

When the Chinese penetrated Google in late 2009 -- yes that operation was Chinese and yes itwas done with the blessing of a member of the Politburo -- they werent after customer informationThey were after the source code that makes Google unique Nor was Google the only victim Thousands

of US and Western firms were penetrated in that affair Foreign governments -- and not only theChinese -- understand that they cannot compete with the United States militarily and politically if theycannot compete with it economically so their intelligence services want to steal its corporate intellectualproperty This is the technology that gives America its competitive edge and often it has nothing to dowith defense Ordinary companies with valuable technology are now being targeted by nation-statesThis is a new era National security and economic security have converged

The danger is not limited to the loss of technology and information however The owners andoperators of the North American electricity grid are hooking up their control systems to the Internet asfast as they can Exposing the grid to the Internet makes it marginally more efficient but it also makes itdramatically more vulnerable to disruption If you can remotely penetrate an electronic system to stealinformation you can remotely penetrate it to shut it down or make it go haywire This is why there is no

longer a meaningful difference between information security and operational security And the biggestoperational risk is the grid In contemporary society nothing moves without electricity If the grid goesout the country stops

As the Stuxnet affair demonstrated remotely engineered disruption of industrial control systemsis now a reality That episode involved the successful electronic attack on the centrifuges in the Iraniannuclear program Only a first-class intelligence agency could have pulled that off but the blueprint fordoing it -- the code itself -- is now public Many American industrial control systems run on the samekind of equipment the Iranians were using but unlike the controls on the Iranian centrifuges thecontrols on the US grid are now being connected to the Internet making them easier to disrupt Stuxnetwas a watershed there will be copycats

Other industrial control systems will also be targets Some already are Air traffic control

railroad switches and water and sewage systems are all electronically controlled now and many arevulnerable If an intruder can break into the right server electronically he can remotely shut downproduction send your goods to the wrong destination and even unlock your doors -- and delete your logentries so he leaves no record of ever having been there

The United States does not lack enemies who would attack it this way Seized al Qaedacomputers contain details of US industrial control systems In 2003 a group affiliated with thePakistani terrorist organization Lashkar-e-Taiba -- the same gang that engineered the 2008 terroristassaults in Mumbai -- plotted to attack the Australian grid Other groups conspired to attack the Britishgrid in 2004 2006 and 2009 Yet the owners and operators of the North American grid continue willy-

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3842

nilly to expose their control systems to the Internet instead of isolating and hardening it This is folly of a high order

Important conclusions for public and corporate policy follow from this vulnerable state of

affairs First cyber insecurity has operational consequences In the current and foreseeable states of technology a high degree of assurance against electronic penetration of anything connected to theInternet is not achievable Large efficient electronically connected organizations and nations aretherefore vulnerable to remotely engineered disruption as well as information theft

Second this risk cannot be eliminated -- but it can be reduced and managed As a nation theUnited States should start by isolating the grids controls from the Internet Undoubtedly there aremarginal efficiencies to be gained by seamless connectivity over a publicly accessible infrastructure butthese gains are usually exaggerated and the risk this connectivity creates is staggering The governmentand the major telecommunications carriers must also make the investment required to re-create themassive redundancies that made the wired telephone network so robust Resilience and swift recoveryshould be the goal If the consequences of cyberattacks were reduced penetration would cease to matter

Third companies that wait for the government to solve their own security problems do so attheir peril The government is broke and the IT backbone is 85 percent private so the governmentdoesnt control it The governments role in altering the status quo will be limited to setting standardsusing its purchasing power to move vendors toward better security and getting its own house in order

The government can neither secure corporate intellectual property nor protect firms against operationaldisruption

Fourth in a world in which everything cannot be protected companies must determine forthemselves what intellectual property and physical assets to isolate and safeguard Those that approachthis task seriously will quickly learn that technology is only one aspect of their insecurity and in manycases the easiest to deal with Unless technology is integrated with personnel practices and operationalsecurity it opens vulnerabilities that its users rarely understand This kind of integration requires theautomated enforcement of reasonable security policies and systematic workforce training and thatoccurs only when management the lawyers and the technologists work closely together This is an old-fashioned management challenge -- not a technological one For their part corporate boards need to takeIT security seriously and launch audits that examine how their systems are actually implemented and

used not merely how they are designed Because as the techies like to put it the weakest link in anysystem is not the silicon-based unit on the desk its the carbon-based unit in the chair Joel Brenner is author of the forthcoming America the Vulnerable Inside the New Threat Matrix of

Digital Espionage Crime and Warfare He has served as the inspector general of the National Security

Agency the national counterintelligence executive and the NSAs senior counsel He now practices law

at Cooley LLP in Washington DC

Cyberattacks Decline Slightly Symantec Report Finds

Dark Reading | 1 September 2011

Organizations worldwide are suffering damages as a result of cyberattacks but interestingly there hasbeen a slight decline in these attacks during the past 12 months according to a new report from

Symantec More than 90 percent of the more than 3300 respondents across 36 countries said theyexperienced tangible losses as a result of a hack with 84 percent reporting financial loss to the cost of abreach Around one-fifth lost at least $195000 in breaches during the past 12 months

Meanwhile Symantec attributes the unexpected bright spot of a decline in breaches toorganizations employing better cybersecurity defenses More than 70 percent of organizations sawattacks in the past 12 months a decline of 5 percent from 2010 And those that experienced anincreasing frequency of attacks dropped from 29 percent in 2010 to 21 percent this year While 100percent last year reported losses from cyberattacks 92 percent did so in 2011 The trend seemscounterintuitive given the rash of high-profile breaches this year More

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 25: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2542

6 The Digital Counterjihad Cyberspace is the terrorists ultimate safe haven Its where they recruit raise money and even plotattacks using coded language while playing online video war games The US government fights back

One technique is called false band replacement whereby the intelligence agencies infiltratemilitants networks and post their own material to counter extremist efforts on those same jihadistwebsites The trick is to forge the onscreen trademarks -- web watermarks -- of al Qaeda media sites

This makes messages posted on these sites official and sows dissent and confusion among themilitants

This Internet spoofing can be used in support of more traditional combat missions There is atleast one case confirmed by American officials in which a jihadist website was hacked by Americancyberwarriors to lure a high-value al Qaeda to a surreptitious meeting with extremist counterparts -- onlyto find a US military team in waiting

Getty images

7 First Kill the MullahsUS counterterrorism officials have learned fighting terrorists effectively means targeting specific nodesof that network that support and enable militants who strap on suicide vests This strategy focuses onneutralizing enablers such as the financiers gun-runners and logisticians Among these terror linchpins

are religious leaders who bless attacksHeavenly reward will not await a suicide bomber unless his death and those of his victims is

deemed halal in keeping with Islams sacred sharia law Each militant network has a sharia emir usuallyat the level of a sheikh or mullah In Iraq American commanders specifically killed emirs to throw awrench in a suicide bombing networks

Take him out and suicide bombings from that network are frozen until he is replaced said onemilitary officer with command experience in Iraq hellip[Complete article is available herehttpwwwforeignpolicycomarticles201109067_things_you_didn_t_know_about_the_war_on_terror]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2642

Dick Marty Rendition Report Condemns lsquoCult of Secrecyrsquo

BBC News | 8 September 2011

A report for Europes human rights watchdog has called for greater scrutiny of secret services andsupport for whistleblowers The Council of Europe investigated how countries like Britain GermanyRomania and Lithuania assisted the US with the rendition of terror suspects It said a cult of secrecyhad helped Western governments cover up abuses Defending whistleblowers it singled out USsoldier Bradley Manning accused of passing secrets to Wikileaks He had acted as a whistleblowerand should be treated as such CoE rapporteur Dick Marty wrote in the report which was due to besubmitted to the CoEs Parliamentary Assembly The soldier is currently in a US military prisonawaiting trial for passing restricted material to the controversial website

But the report praised Mr Manning and Wikileaks itself for uncovering evidence of renditionThe CoE represents 47 member-states including both EU countries and Russia and other ex-Sovietstates Mr Martys report focused on the record of Western states explaining that it was based oninvestigations into European links to the controversial US policy of rendition for terrorism suspectsThe CIA allegedly flew terror suspects around the world for interrogation in the years after 911 holdingthem in secret prisons in Europe and elsewhere

No licence to kill

In his 48-page report - entitled Abuse of State Secrecy and National Security - Mr Marty looked at thelevel of control exercised by European states over their security services He urged all states to useindependent parliamentary committees to oversee the work of their secret services saying this was of vital importance for the rule of law and democracy Mr Marty argued that Western governments wereusing the notion of state secrecy to shield their intelligence services from accountability for seriousviolations committed during anti-terrorist operations We consider that this is simply unacceptablehe wrote

A licence to kill (or to abduct and torture) only exists in certain films and in dictatorialregimes In democratic systems parliaments as representatives of the people have a right and duty toknow what the government is doing in the name of the people Mr Marty praised investigative journalists and non-governmental organisations for their work in exposing abuses of authority Stressing

the fundamental role whistleblowers had to play in an open society he warned against a real cult of secrecy as an instrument of power

While it was up to the courts to decide if Bradley Manning had committed any crime he wrotethe CoE was indebted to him for the publication of a recording of a helicopter attack in Iraq in whichthe crew seems to have intentionally targeted and killed civilians

Thanks to Mr Manning he said a large number of embassy reports had allowed us to learnsignificant details of important recent events which are obviously of general interest We therefore join Amnesty International in expressing our worries as to the treatment he receives Mr Marty wrote inthe draft report[Article continues here httpwwwbbccouknewsworld-europe-14820145]Comment This report demonstrates that Dick Marty is not as De Gaulle would say a serious man To

suggest that Bradley Manning is a hero and intelligence agencies bent on defeating terrorists arecriminals should say it all Manning knowingly violated his oath and willfully provided enormousamounts of classified material to WikiLeaks For Marty this is a good thing in the name of transparencyMarty always injudicious and anti-American in his remarks is now moving at warp speed into crackpotterritory

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2742

Al Qarsquoida amp its Affiliates| back to top |

Al Qaeda Is Down Not Out

Los Angeles Times | By Amy Zegart 7 September 2011

US talk of defeating terrorism is dangerously prematureTalk of strategically defeating Al Qaeda is all the rage in the White House these days Defense

Secretary Leon Panetta used the D-word in July President Obama declared in his new counter-terrorism strategy We can say with growing confidence that we have put Al Qaeda on the path todefeat Compared to the woeful state of the economy terrorism has become the administrations feel-good story of the year

Defeat is a big word It is also dangerously misleading Yes the United States has made greatstrides in the last decade to harden targets improve intelligence and degrade the capabilities of violentIslamist extremists Osama bin Ladens death was a major accomplishment But the fight is nowhereclose to being won and Americas most perilous times may lie ahead Three reasons explain why

The first is that strategically defeating Al Qaeda is not nearly as important as it sounds After911 Al Qaeda morphed into a more complicated decentralized and elusive threat consisting of threeelements core Al Qaeda affiliates or franchise groups operating in places like Yemen and Somalia with

loose ties to the core group and homegrown terrorists inspired by violent extremism often through theInternet in the comfort of their own living rooms

Core Al Qaedas capabilities started degrading in 2001 when the US invaded Afghanistandismantled training camps ousted the Taliban and sent Bin Laden running The CIA has estimated thecore group remaining in the AfghanistanPakistan region to number 50 to 100 fighters The last time BinLaden oversaw a successful operation was 2005 when Al Qaeda struck the London transit system

But plots by homegrowns and franchise groups have risen dramatically in recent years The 2009Ft Hood shooting the worst terrorist attack on US soil since 911 was the work of a homegrownterrorist The mastermind of the 2010 Times Square car bomb plot was a naturalized American citizentrained by the Pakistani Taliban not Al Qaeda Another franchise group Al Qaeda in the ArabianPeninsula was behind the foiled 2009 Christmas Day underwear bomber aviation plot and the 2010

plot to explode tampered printer cartridges aboard cargo planes The Bipartisan Policy Center reported11 violent Islamist extremist terrorist incidents against the US homeland in 2009 the most since 911Nearly all involved what former CIA Director Mike Hayden calls a witches brew of radicalizedAmericans and franchise groups

The second reason why talk of defeat is premature has to do with weapons Terrorism againstAmericans is nothing new The potential for terrorist groups to acquire weapons of mass destruction isIn 1995 a Japanese cult released sarin nerve gas in the Tokyo subway killing 12 people and injuringthousands It was the first WMD terrorist attack in modern history and it sparked a wave of presidentialterrorism commissions years before Bin Laden became a household name

It is this specter of the lone fanatic or small group armed with the worlds most devastatingweapons that keeps experts up at night In 2005 60 leading nuclear scientists and terrorism experts were

asked how many believed the odds of a nuclear attack on the US were negligible Only three or fourhands went up most were far more pessimistic Today there is enough nuclear material to build120000 weapons As long as fissile material is poorly stored and rogue states like Iran and North Koreacontinue their illicit weapons programs nuclear terrorism remains a haunting possibility

The third reason is that the FBI has not yet become a first-rate domestic intelligence agencyAnalysts whose work is vital to success are still second-class citizens labeled support staff alongsidesecretaries and janitors and passed over for key jobs including running the bureaus intelligence unitsThe FBIs information technology is so antiquated it belongs in a museum And the old crime-fighting

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2842

culture still lives There is now a move afoot to shrink new classified facilities so that agents dont haveto waste time away from their cases to read intelligence documents thereStrategically defeating Al Qaeda sounds too good to be true Because it is Amy Zegart is a senior fellow at Stanfords Hoover Institution and the author of Eyes on Spies

Congress and the United States Intelligence Community

US Counterterror Chief Al-Qaida On Steady Slide

Bostoncom | 31 August 2011

White House counterterrorism chief John Brennan said al-Qaida is on a steady slide after the death of al-Qaidas latest second-in-command in Pakistan Brennan told The Associated Press on Wednesdaythat its a huge blow in the first official White House comment since Atiyah Abd al-Rahmans reportedkilling by CIA drone strike in Pakistans tribal areas last week

Al-Qaida is sort of on the ropes and taking a lot of shots to the body and the head Brennansaid This is a time not to step back and let them recover a message he says hes sending to hiscounterparts in Pakistan[Article continues herehttpwwwbostoncomnewsnationwashingtonarticles20110831us_counterterror_chief_al_qaida_on_steady_slide ]

Al-Qaeda (AKA Al-Qaida Al-Qarsquoida)

Council on Foreign Relations | 29 August 2011

ldquoAl-Qaeda an international terrorist network is considered the top terrorist threat to the United StatesThe group is wanted for its September 11 2001 attacks on the World Trade Center and the Pentagon aswell as a host of lesser attacks To escape the post-911 US-led war in Afghanistan al-Qaedas centralleadership fled eastward into Pakistan securing a safe haven in loosely governed areas there In July2007 US intelligence agencies found that the organization was regrouping and regaining strength inthese tribal areas along the border with Afghanistan though targeted killings of senior al-Qaeda leadershave since diminished the groups command and control capabilities In February 2009 Director of National Intelligence Dennis C Blair told lawmakers that the groups core is less capable and effective

than it was a year ago The killing of al-Qaedas top leader Osama bin Laden by US forces in Pakistanin May 2011 served a significant blow to the organization but analysts say al-Qaeda remains deadlywith its networks spread all over the world Plus a number of affiliated groups have gained prominencein recent years complicating the task of containing the organizationrdquo

[Article continues here httpwwwcfrorgterrorist-organizationsal-qaeda-k-al-qaida-al-qaidap9126]

Al Qaeda In The Islamic Maghreb

CSIS | 1 September 2011

ldquoAl Qaeda in the Islamic Maghreb (AQIM) emerged from a decades-long militant Islamist tradition inAlgeria In 1998 the Salafist Group for Preaching and Combat (Groupe Salafiste pour la Preacutedication etle Combat or GSPC) broke away from the Armed Islamic Group (GIA) because of the GIArsquos extensive

targeting of civilians Gradually the GSPC evolved to encompass global jihadist ideology in addition toits historical focus on overturning the Algerian state In 2006 the GSPC officially affiliated with alQaeda core soon rebranding itself as al Qaeda in the Islamic Maghreb In the following years AQIMwas able to conduct a small number of large-scale attacks most notably its 2007 bombing of the UNheadquarters in Algiers In recent years counterterrorism pressure and weak governance have combinedto shift the center of AQIMrsquos presence to the Sahara-Sahel region AQIM continues to make its presenceknown through smuggling operations kidnappings and clashes with security forces in the desert In thecoming years general instability within the region could allow AQIM to further expand its influencerdquo[Complete article is available here httpcsisorgfilespublication110901_Thornberry_AQIM_WEBpdf ]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2942

AQ Strategy

The Assynt Report | 11 August 2011

Executive Summary Al-Qaedarsquos broad objectives remain unchanged in the wake of bin Ladenrsquos death There

are nonetheless growing questions over al-Qaedarsquos capability Longstanding paranoiaover the use of electronic communications is heightened by the ongoing US dronecampaign whilst attacks against the West have generally been disrupted at an early stage

The Pakistani Talibanrsquos attack on a Karachi naval base in May 2011 was a significantmilitary success and the first major act of revenge for bin Ladenrsquos killing Furtherattempts to avenge his loss are certain

All parts of al-Qaeda are working within a cohesive framework with the ultimate aim of restoring the Islamic Caliphate (Khilafa) The strategic plan to support this aim wasdrafted by 40 of al-Qaedarsquos brightest thinkers in Kandahar Afghanistan in November1999 This plan consists of four phases each seven years long leading to the dissolutionof corrupt regimes and the union of all newly-liberated states within the Khilafa

Apart from mounting strategic operations al-Qaedarsquos role is to be the inspiration for atruly global jihadist movement It seeks to achieve this through provision of trainingbeing a role model for others to follow extending acceptance and adoption of its tactics

particularly suicide bombings and professionalising jihadist media to build a commonbrand and message between hitherto separate groups

Between the late 1990s and 2003 the organisation was primarily devoted to classicinternational terrorism Most effort is now spent fighting insurgencies from North Africato South Asia The way in which this strategy helps to spread the struggle has been seenin North-West Africa where the initial development of al-Qaeda in the Islamic Maghrebwas in part fed by men returning from fighting with al-Qaeda in Iraq

Since mid-2009 al-Qaeda and its affiliates have increasingly encouraged jihadist-sympathisers resident in Western countries to engage in violence themselves withoutcentral direction or training making surveillance more difficult

One of the keys to awakening the spirit of jihad was the success in portraying the US and

its allies as Crusaders in the Muslim world Al-Qaedarsquos strategy essentially requires thatthis process be kept running until the forces of jihad have grown large enough to launchsuccessful liberation operations

Despite its successes in Afghanistan al-Qaedarsquos credibility has suffered both from its failure to landanother strategic blow on the West on the scale of 911 and also excessive Muslim casualties in someoperations Similarly al-Qaeda in Iraq was set back by its excessive sectarian zeal and local resentmentat the foreign fighter presence In turn this affected the movementrsquos funding from the Gulf

Analysis Sub-Saharan African Leaders Media Focus On Threats Prior to 911

OSC Feature | Sub-Sahara Africa -- OSC Analysis 6 September 2011Statements by Sub-Saharan African leaders and African media reports on terrorism prior to the 10thanniversary of 911 focus on the growing threats from local extremists and Al-Qaida affiliatesparticularly in West Africa with little direct commentary on the anniversary or US counterterrorismpolicies This focus on domestic threats suggests that counterterrorism messages expressing solidaritywith African nations and acknowledging the evolving terrorist threat on the continent would have thegreatest resonance with African audiences

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3042

Leaders Stressing Determination To Counter Local Threats African leaders public statements reflect an ongoing concern about the threat of terrorism on thecontinent and a strong commitment to find ways to combat this threat

Nigerian President Goodluck Jonathan emphasized the governments commitment tovigorously combat terrorism following the 26 August bombing of the UN office inAbuja by Nigerian extremist group Boko Haram reported the Paris-based news agencyAFP President Jonathan is hosting Liberian President Ellen Johnson Sirleaf and otherforeign dignitaries for a three-day forum on terrorism and economic crimes the widelyread Lagos-based independent daily The Guardian reported on 4 September

Malian President Amadou Toumani Toure launched a Special Program for PeaceSecurity and Development on 9 August stating that development remained the mostviable solution to counter threats to the countrys stability reported Malis state-owneddaily LEssor[ 3] The program aimed to undermine support for Al-Qaida in the IslamicMaghreb (AQIM) according to Burkinabe web portal Lefasonet on 11 August

Somali Prime Minister Abdiweli Muhammad Gas stated on 23 August that theTransitional Federal Government planned to remove Al-Shabaab from the central andsouthern regions in Somalia with the goal of restoring peace within one year so the

country can hold national elections according to the Puntland-based Garowe Online

Experts Media Highlight New Capabilities Tactics

African experts and media outlets are warning about the evolving nature of terrorist organizations on thecontinent the terrorists pursuit of new targets and tactics and their potential for taking advantage of regional instability

Leading South African think tank the Institute for Security Studies stated on 29 Augustthat Boko Harams attack on the UN in Abuja completes Boko Harams metamorphosisinto an international terrorist group Since December 2010 Boko Haram had killed over600 people in over 70 attacks against Nigerian targets according to the think tank buthad not previously targeted Western or international interests

A 26 August article on the popular Malian web portal Maliweb voiced concern thatAQIM could benefit from Tuareg mercenaries many of whom were recently returningfrom fighting in Libya and could benefit from an increase in arms trafficking through theSahel during the Libyan conflict

Ugandas privately owned Daily Monitor reported on 19 August that AU forces inSomalia warned that Al-Shabaab planned to increase the number of kidnappings andbomb attacks as part of its new strategy to shift from controlling territory in Mogadishuto conducting more of an insurgent campaign

Concern Over Al-Qaida Presence Terrorist Collaboration

West African official statements and media reports reflect a growing concern over an increased Al-

Qaida presence in West Africa and collaboration with AQIM Al-Shabaab and Boko Haram

Nigerian security services reported that the suspected mastermind behind the 26 Augustbombing of the UN office in Abuja was a Boko Haram member with close links to Al-Qaida and Al-Shabaab according Nigerias privately owned Daily Sun

A 28 August report in the privately owned daily Nigerian Tribune claimed that the 26August bombing in Abuja was part of Al-Qaidas plans to mark the 10th anniversary of 911 and called Boko Haram Al-Qaidas ally in the region

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3142

An 8 August commentary in Burkina Fasos LObservateur Paalga said that reports of Boko Haram collaboration with Al-Shabaab and AQIM could indicate that Al-Qaida isextending its African tentacles Abdourahmane Dieng security division chief of theEconomic Community of West African States said the collaboration represented a veryserious threat according to Senegals progovernment Le Soleil on 5 August

Messages Likely To Resonate With African Audience

Sub-Saharan Africas increasing concern about the shifting nature and potential strengthening of theterrorist threat on the continent suggests that messages directly addressing the impact of terrorism onAfricans the increasingly complex nature of the threat and the need for multilateral cooperation againstterrorism are most likely to resonate with Africans

Messages expressing solidarity and sympathy for Africans affected by Boko Haram Al-Shabaab and AQIM would almost certainly resonate with a broad African audience

African political and military leaders would probably welcome acknowledgement of thecomplex and changing nature of terrorism on the continent and recognition of theirinitiatives and commitment to countering violent extremism

African leaders and medias concern about potential collaboration between Boko Haram

Al-Shabaab and AQIM suggest that they would be open to improving multilateral andcross-regional sharing of lessons learned and strategies to counter the intensification of terrorism within Africa

Aviation and Maritime Security| back to top |

Bomb Threats Force Jets To Land

Associated Press | 7 September 2011

Both landed safely one landed in Ankara Ataturk International Airport and the other at Kuala LumpurTwo flights operated by Pakistans state-owned airline received bombs threats on Wednesday

and both landed safely one in Turkey the other in Malaysia officials said No bombs were found The

first flight was headed for Manchester England when it was notified of the threat near the Bulgariancapital of Sofia The crew contacted the control tower in Istanbul to seek permission for the landingstate-run Anatolia news agency reported Authorities quickly evacuated all 378 passengers from theBoeing 777-300ER aircraft after it parked at a remote corner of the International Ataturk Airport andbomb squads began searching the plane with sniffer dogs Anatolia reported PIA spokesman MashoodTajwar confirmed the flight received a threat and landed All passengers were safe A police searchturned up no bomb officials said Later a second PIA flight from Islamabad to Kuala Lumpur alsoreceived a bomb threat It landed in Kuala Lumpur and all the passengers disembarked safely saidTajwar The UK-bound Pakistan International Airlines plane was forced to make an emergency landingat Ataturk Airport in Istanbul after receiving a bomb threat Malaysias airports authority said thepassengers were being screened and the plane was isolated in a parking area while being searched bypolice No bomb was found

It said the plane carried 164 passengers and 13 crew Azmi Murad senior general manager forthe authority said the Pakistani airline informed it that the warning came by email Mr Tajwar gave nodetails on the nature of the threat or how it was delivered Pakistan is home to al Qaedas top leadershipMilitants who trained there have been responsible for many of the attacks and failed plots in the USand Europe since Sept 11 2001 when planes hijacked by al Qaeda militants destroyed the World TradeCenter in New York and crashed into the Pentagon The bomb threats came four days before the 10thanniversary of 911 but there was no apparent link to Islamist militants who typically do not alertauthorities in advance The FBI and Homeland Security department issued warnings last weekend aboutal Qaeda threats to small airlines

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3242

Commentary amp Opinion| back to top |

From Terror Group Founder To Libyan Rebel Military Commander

ABCNews | 29August 2011

The same man who triumphantly led Libyan rebels into Gadhafis compound last week first came to theattention of the US intelligence community years ago - as a founder of a terror group

Abdelhakim Belhaj who was recently appointed to Tripolis rebel military council was one of the original founders of the Libyan Islamic Fighting Group an anti-Gadhafi group which was laterdesignated by the US State Department as a terrorist organization with links to al Qaeda according toUS government reports

We proudly announce the liberation of Libya and that Libya has become free and that the ruleof the tyrant and the era of oppression is behind us a victorious Belhaj told reporters after the stormingof Gadhafis Bab al-Aziziya compound last week Ousting Gadhafi had been the main objective of theLIFG since its inception in the early 1990s even if some of the fighters believed that meant puttingAmericans in the crossfire

The group carried out operations against the Libyan government including at least four suspectedassassination attempts against Gadhafi in the 1990s and was also believed to be connected to a series of suicide bombings in Casablanca Morocco in 2003 the US State Department reported As relationsbetween the US and Gadhafi improved in the mid-2000s some LIFG leaders cultivated relationshipswith top al Qaeda leaders including Osama bin Laden and were suspected of funneling fighters to Iraq tocarry out operations against US soldiers

When the LIFG was designated a terror organization in 2004 it was meant as a gesture of solidarity with the Libyan government according to a March 2011 congressional report

Contrary to several US government reports Libyan rebel ambassador to the US Ali Aujalitold ABC News that the LIFG was never connected to al Qaeda and did not carry out terrorist operations

They were only opposed to Gadhafi during his rule and paid the price for that by beingoppressed by the regime Aujali said

The CIA first publicly voiced its concerns about the connection between the LIFG and al Qaedain 2004 when then-director George Tenet testified before the Senate Select Committee on Intelligenceand listed the LIFG among groups that represented an immediate threat [that] has benefited from alQaeda links[Article continues here httpabcnewsgocomBlotterterror-group-founder-libyan-rebel-military-commanderstoryid=14405319]

Interview With Saudi Sheik Wajdi Al-Ghazawi

MemriTVcom

Sheik Wajdi al-Ghazawi owner of al-Fajr TV criticizes extremist atmosphere in Saudi Arabia and saysafter 911 They Handed Out Sweets on the Streets of Mecca

Following are excerpts from a statement by Saudi Sheik Wajdi Al-Ghazawi owner of Al-FajrTV which was posted on YouTube on August 4 2011

Wajdi Al-Ghazawi When Al-Qaeda and Osama Bin Laden were at the height of their mightthey were extremely popular in Saudi Arabia From mosque pulpits across Saudi Arabia preacherswould pray for their success Moreover from the pulpits of the most important mosques ndash the Al-HaramMosque in Mecca and the Nabawi Mosque in Al-Madina ndash direct prayers for the success of Al-Qaedawere made during the days of the bombing of Tora Bora Oh Allah help our brothers in AfghanistanThese supplications were made during evening prayers as well as Friday prayers The preachers wouldpray for them in violation of the ministrys instructions

When the twin towers in New York were attacked they handed out sweets on the streets of Mecca By Allah they did I witnessed this myself The young people bowed in prayer and hugged one

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3342

another out of joy People were in heaven because of these young men who destroyed America andbombed this idol Am I right or not Was it like that or not

Back then when the Taliban broke off a piece of the nose of the Buddha statue which was hewnin the mountain an entire sermon was dedicated to it in the mosque in Mecca and the preacher was laterreprimanded for this sermon The entire Saudi people supported and loved Al-Qaeda

This went on until our brothers in Al-Qaeda ndash and I dont know what was going through theirminds ndash began to carry out operations inside Saudi Arabia Thats when we all raised our hands andsaid Youve gone too far We wont support you in this

The atmosphere here in Saudi Arabia is one of extremism It is characterized by focusing onminor details Many things are forbidden Yes maybe they are indeed forbidden but by forcing peopleto avoid them and by acting as if these were major sins an atmosphere was created that gave rise toextremist youth who might act recklessly at the most trivial provocation

For instance we blew out of proportion the issue of music the issue of smoking or the issue of hanging pictures in public places True there are clear texts on these issues but the young peopleembraced these issues as if they were fighting usury fornication or alcohol No these are not among theseven major sins So our society has become extreme

This extremist atmosphere has given rise to people who accuse others of heresy and people whopurport to be waging Jihad It has created genes that gave rise to cells of Al-Qaeda and other terrorists

We must examine our breeding ground in which these young men were sownBy Allah what can possibly emerge from such an atmosphere Muftis who accuse others of

heresy sheiks who incite and young people who bomb Am I right or not[Complete clip is available here httpwwwmemritvorgclipen3099htm]

Legal Aspects amp Lawfare| back to top |

Revisiting A Stale Counterterrorism Law

Council on Foreign Relations | 1 September 2011

ldquoNearly a decade after 911 the United States still relies on the 2001 Authorization for the Use of Military Force (AUMF) for the killing and detention of those considered responsible for or associatedwith the terrorist attacks But CFR national security law expert John Bellinger says it is becomingincreasingly difficult for the Obama administration to justify some of its counterterrorism operationsunder this limited statutory authority It has been used in defense of actions including drone attacks onindividuals as well as the targeting of groups in Yemen and Somalia that may have only the mosttenuous affiliation or association to the 911 attack A revised AUMF should clarify those operations aswell as the issue of detention specifically which individuals can be detained for how long and subjectto what processes There also needs to be greater effort at the international level he adds to fill thegaps in the law that covers conflicts between states and non-state actorsrdquohelliprdquo[Complete article is available here httpwwwcfrorgcounterterrorismrevisiting-stale-

counterterrorism-lawp25742]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3442

Narco-Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector[Complete article is available here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Mexicos Cartels Move Into Extortion

At a construction site of an apartment building in the heart of the Mexican capital a company engineerruns through his weekly payroll sheet He has salaries written out for carpenters bricklayers andelectricians At the bottom of the sheet is a notation of $200 for ldquosecurity servicesrdquo next to a nicknameldquoEl Indiordquo mdash the Indian [Complete article is available here

httpwwwtucsonsentinelcomnationworldreport090611_mexico_cartels_bribesmexicos-cartels-move-into-extortion ]

Seven Die In Mexican Pacific Port City

Latin American Herald Tribune

Seven people died in separate shootings in Mazatlan a port city in the northwestern Mexican state of Sinaloa with some of the incidents drug-related a police spokesman told Efe [Complete article is available herehttpwwwlahtcomarticleaspCategoryId=14091ampArticleId=423061]

Tijuana Violence Slows As One Cartel Takes Control

BorderlandBeatcom

Mexicos famously seedy border city of Tijuana is enjoying a lull in drug murders as the countrys mostpowerful cartel gains the upper hand over its rivals [Complete article is available here httpwwwborderlandbeatcom201109tijuana-violence-slows-as-one-cartelhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3542

Network Notes| back to top |

Canadian data foreign threats Spying in the digital age (Suggested by a reader in Lithuania ndash thanks) Globe and Mail | By Colin Freeze 31 July 2010

A government spy agency thatrsquos prohibited from monitoring Canadian citizens is now usingldquoinformation about Canadiansrdquo to zero in on foreign threatsThe ambiguous statement found in a new government report detailing the activities of CommunicationsSecurity Establishment Canada could sanction a range of intelligence-gathering activities ndash includingthe controversial practice of mining ldquometadatardquo from digital communications

Metadata ndash often called data about data ndash are found in e-mails and their attachments and containdigital signatures that can reveal when where and by whom documents were created

The collection of metadata has caused controversy in other countries but never in Canada wherethe Communications Security Establishment Canada operates as an ultra-secretive agency About theonly thing that is known about the classified practices is that they were halted and resumed after someldquomajor changesrdquo including directives signed by Defence Minister Peter MacKay

ldquoI cannot comment on specific operational activitiesrdquo Adrian Simpson a CSEC spokesman toldThe Globe He stressed that reviews upheld that the activities in question were ldquocarried out inaccordance with the law ministerial requirements and CSECrsquos policies and proceduresrdquo

ldquoCSEC is prohibited from directing its activities at Canadians anyone in Canada or Canadiansanywhere in the worldrdquo he said

For decades signals-intelligence agencies in the West have been allowed to safeguard nationalsecurity by eavesdropping on foreignersrsquo conversations Spies can whatever phone lines and satellitesignals they can so long as they never listen in on fellow citizens

But in the digital age governments run increasingly sophisticated dragnets scooping up andscouring through millions of intercepted Internet conversations daily Such practices create legalambiguities

ldquoThe whole issue of what constitutes boundaries for signals-intelligence agencies in cyberspaceis a big debate right nowrdquo said Rafal Rohozinski a security expert affiliated with the University of Torontorsquos Munk School

A watchdog agency that reviews the CSECrsquos activities released an annual report to Parliament onJuly 20 ldquoWhen other means have been exhausted CSEC may use information about Canadians when it

has reasonable grounds to believe that using this information may assist in identifying and obtainingforeign intelligencerdquo it reads

Sometimes collecting metadata is relatively benign It can involve aggregating sets of data tospot trends much like the way meteorologists discern national forecasts from localized information

For example while CSEC canrsquot usually monitor the communications of specific Canadian terrorsuspects it can glean insights by zooming out for big-picture patterns One way to do that MrRohozinski said would be to look at data flows between Canadian cities and Yemen where an Internet-savvy al-Qaeda offshoot works to recruit Westerners

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3642

Metadata however can be more revealing Documents that circulate on the Internet travelaround like postmarked letters marked with return addresses ndash e-mails and attachments have embeddedcodes that speak to the who where and when behind their creation

The US National Security Agency found itself mired in controversy a few years go after itskirted domestic-spying bans by secretly upholding that this sort of American metadata was fair gamedistinct from communication contents

Therersquos little to suggest the CSEC would go that far The federal agencyrsquos activities are reviewedby a watchdog body now headed by a former Federal Court of Appeal judge Robert Deacutecary appointedlast year wrote in his annual report that he was satisfied the CSEC activities in question are lawful evenif his predecessors felt them borderline

ldquoThis was the first review of these activities since hellip their resumption under new policiesrdquo thewatchdogrsquos report says It concludes that the surveillance activities are ldquoin accordance with the lawrdquo andfollow ldquomajor changes to certain policies procedures and practicesrdquo

Much of the concern arises from the possibility that CSEC could hand over metadata intelligenceto domestic law-enforcement and security agencies

As it stands the RCMP and CSIS have to develop their domestic investigations before coming toCSEC ndash usually with warrants ndash if they want specific intelligence The rules guiding handovers are strictbecause even though all agencies run surveillance operations they do so under vastly different

mandates and legal standardsThe spy agency however stood by its practicesldquoCSEC is extremely diligent when it comes to the privacy of Canadiansrdquo Mr Simpson said

[complete article is available here httpwwwtheglobeandmailcomnewsnationalcanadian-data-foreign-threats-spying-in-the-digital-agearticle2113772 ]

Cyber Attacks Against NATO Then And Now

New Atlanticist | 6 September 2011

ldquoNow that NATOrsquos Operation UNIFIED PROTECTOR over Libya is winding down it is worth

noting how few cyber incidents were directed in protest against the Alliance Certainly there was a

cyber component to the liberation of Libya but it was more about content and Internet freedom (the

most newsworthy elements here were the role of social media and the Libyan government taking largeparts of the nation offline) But compared to past history NATO cyber defenders had a relatively easy

time

ldquoNATO has not however had an easy 2011 Although there were three significant incidents we

know about none seemed to have been in direct response to operations over Libyahelliprdquo

[Complete article is available here httpwwwacusorgnew_atlanticistcyber-attacks-against-nato-then-

and-now]

The Calm Before The Storm

Foreign Policy | By Joel Brenner 6 September 2011

Cyberwar is already happening -- and its about to get much much worse A veteran cyberwarriorexplains how America can prepare itself

Revelations of wholesale electronic fraud and massive data heists have become weekly evendaily affairs A multinational electronics corporation loses personal information on more than 100million customers Cyberthieves break into an international bank counterfeit credit balances and lootATMs in four countries grabbing $9 million in just a few hours International gangs spread maliciouscode that conscripts unwitting computers into zombie armies of hundreds of thousands of similarlyenslaved machines Criminals then rent these armies called botnets as easily as you can buy a time-sharing arrangement in a beach condo No wonder the vast majority of Internet traffic is spam

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3742

Yet the loss of personal information and related criminal fraud intolerable as they are are theleast threatening face of electronic insecurity The US militarys secret network is penetratedAmericans corporate pockets are being picked clean of the intellectual property that makes the UnitedStates tick And the electricity grid that keeps the lights on and makes everything move is dangerouslyinsecure

In one remote attack on the Pentagons information systems about 10 years ago the Chinesehauled away up to 20 terabytes of information If the information had been on paper theyd have neededa line of moving vans stretching from the Pentagon to freighters docked 50 miles away in Baltimoreharbor just to haul it away Had they done so the military district of Washington wouldve become anactive theater of operations for the first time since 1865 and the Navy wouldve blockaded theChesapeake Bay But the Chinese did it electronically so who noticed

Corporate espionage by both competitors and foreign intelligence services or their surrogates isalso increasing Intelligence officials see this but cant speak openly about the specifics and Im seeingit now in my law practice The victims rarely admit it for understandable reasons Oracle whichsuccessfully sued SAP for theft of its software code was a prominent exception Google was another

When the Chinese penetrated Google in late 2009 -- yes that operation was Chinese and yes itwas done with the blessing of a member of the Politburo -- they werent after customer informationThey were after the source code that makes Google unique Nor was Google the only victim Thousands

of US and Western firms were penetrated in that affair Foreign governments -- and not only theChinese -- understand that they cannot compete with the United States militarily and politically if theycannot compete with it economically so their intelligence services want to steal its corporate intellectualproperty This is the technology that gives America its competitive edge and often it has nothing to dowith defense Ordinary companies with valuable technology are now being targeted by nation-statesThis is a new era National security and economic security have converged

The danger is not limited to the loss of technology and information however The owners andoperators of the North American electricity grid are hooking up their control systems to the Internet asfast as they can Exposing the grid to the Internet makes it marginally more efficient but it also makes itdramatically more vulnerable to disruption If you can remotely penetrate an electronic system to stealinformation you can remotely penetrate it to shut it down or make it go haywire This is why there is no

longer a meaningful difference between information security and operational security And the biggestoperational risk is the grid In contemporary society nothing moves without electricity If the grid goesout the country stops

As the Stuxnet affair demonstrated remotely engineered disruption of industrial control systemsis now a reality That episode involved the successful electronic attack on the centrifuges in the Iraniannuclear program Only a first-class intelligence agency could have pulled that off but the blueprint fordoing it -- the code itself -- is now public Many American industrial control systems run on the samekind of equipment the Iranians were using but unlike the controls on the Iranian centrifuges thecontrols on the US grid are now being connected to the Internet making them easier to disrupt Stuxnetwas a watershed there will be copycats

Other industrial control systems will also be targets Some already are Air traffic control

railroad switches and water and sewage systems are all electronically controlled now and many arevulnerable If an intruder can break into the right server electronically he can remotely shut downproduction send your goods to the wrong destination and even unlock your doors -- and delete your logentries so he leaves no record of ever having been there

The United States does not lack enemies who would attack it this way Seized al Qaedacomputers contain details of US industrial control systems In 2003 a group affiliated with thePakistani terrorist organization Lashkar-e-Taiba -- the same gang that engineered the 2008 terroristassaults in Mumbai -- plotted to attack the Australian grid Other groups conspired to attack the Britishgrid in 2004 2006 and 2009 Yet the owners and operators of the North American grid continue willy-

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3842

nilly to expose their control systems to the Internet instead of isolating and hardening it This is folly of a high order

Important conclusions for public and corporate policy follow from this vulnerable state of

affairs First cyber insecurity has operational consequences In the current and foreseeable states of technology a high degree of assurance against electronic penetration of anything connected to theInternet is not achievable Large efficient electronically connected organizations and nations aretherefore vulnerable to remotely engineered disruption as well as information theft

Second this risk cannot be eliminated -- but it can be reduced and managed As a nation theUnited States should start by isolating the grids controls from the Internet Undoubtedly there aremarginal efficiencies to be gained by seamless connectivity over a publicly accessible infrastructure butthese gains are usually exaggerated and the risk this connectivity creates is staggering The governmentand the major telecommunications carriers must also make the investment required to re-create themassive redundancies that made the wired telephone network so robust Resilience and swift recoveryshould be the goal If the consequences of cyberattacks were reduced penetration would cease to matter

Third companies that wait for the government to solve their own security problems do so attheir peril The government is broke and the IT backbone is 85 percent private so the governmentdoesnt control it The governments role in altering the status quo will be limited to setting standardsusing its purchasing power to move vendors toward better security and getting its own house in order

The government can neither secure corporate intellectual property nor protect firms against operationaldisruption

Fourth in a world in which everything cannot be protected companies must determine forthemselves what intellectual property and physical assets to isolate and safeguard Those that approachthis task seriously will quickly learn that technology is only one aspect of their insecurity and in manycases the easiest to deal with Unless technology is integrated with personnel practices and operationalsecurity it opens vulnerabilities that its users rarely understand This kind of integration requires theautomated enforcement of reasonable security policies and systematic workforce training and thatoccurs only when management the lawyers and the technologists work closely together This is an old-fashioned management challenge -- not a technological one For their part corporate boards need to takeIT security seriously and launch audits that examine how their systems are actually implemented and

used not merely how they are designed Because as the techies like to put it the weakest link in anysystem is not the silicon-based unit on the desk its the carbon-based unit in the chair Joel Brenner is author of the forthcoming America the Vulnerable Inside the New Threat Matrix of

Digital Espionage Crime and Warfare He has served as the inspector general of the National Security

Agency the national counterintelligence executive and the NSAs senior counsel He now practices law

at Cooley LLP in Washington DC

Cyberattacks Decline Slightly Symantec Report Finds

Dark Reading | 1 September 2011

Organizations worldwide are suffering damages as a result of cyberattacks but interestingly there hasbeen a slight decline in these attacks during the past 12 months according to a new report from

Symantec More than 90 percent of the more than 3300 respondents across 36 countries said theyexperienced tangible losses as a result of a hack with 84 percent reporting financial loss to the cost of abreach Around one-fifth lost at least $195000 in breaches during the past 12 months

Meanwhile Symantec attributes the unexpected bright spot of a decline in breaches toorganizations employing better cybersecurity defenses More than 70 percent of organizations sawattacks in the past 12 months a decline of 5 percent from 2010 And those that experienced anincreasing frequency of attacks dropped from 29 percent in 2010 to 21 percent this year While 100percent last year reported losses from cyberattacks 92 percent did so in 2011 The trend seemscounterintuitive given the rash of high-profile breaches this year More

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 26: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2642

Dick Marty Rendition Report Condemns lsquoCult of Secrecyrsquo

BBC News | 8 September 2011

A report for Europes human rights watchdog has called for greater scrutiny of secret services andsupport for whistleblowers The Council of Europe investigated how countries like Britain GermanyRomania and Lithuania assisted the US with the rendition of terror suspects It said a cult of secrecyhad helped Western governments cover up abuses Defending whistleblowers it singled out USsoldier Bradley Manning accused of passing secrets to Wikileaks He had acted as a whistleblowerand should be treated as such CoE rapporteur Dick Marty wrote in the report which was due to besubmitted to the CoEs Parliamentary Assembly The soldier is currently in a US military prisonawaiting trial for passing restricted material to the controversial website

But the report praised Mr Manning and Wikileaks itself for uncovering evidence of renditionThe CoE represents 47 member-states including both EU countries and Russia and other ex-Sovietstates Mr Martys report focused on the record of Western states explaining that it was based oninvestigations into European links to the controversial US policy of rendition for terrorism suspectsThe CIA allegedly flew terror suspects around the world for interrogation in the years after 911 holdingthem in secret prisons in Europe and elsewhere

No licence to kill

In his 48-page report - entitled Abuse of State Secrecy and National Security - Mr Marty looked at thelevel of control exercised by European states over their security services He urged all states to useindependent parliamentary committees to oversee the work of their secret services saying this was of vital importance for the rule of law and democracy Mr Marty argued that Western governments wereusing the notion of state secrecy to shield their intelligence services from accountability for seriousviolations committed during anti-terrorist operations We consider that this is simply unacceptablehe wrote

A licence to kill (or to abduct and torture) only exists in certain films and in dictatorialregimes In democratic systems parliaments as representatives of the people have a right and duty toknow what the government is doing in the name of the people Mr Marty praised investigative journalists and non-governmental organisations for their work in exposing abuses of authority Stressing

the fundamental role whistleblowers had to play in an open society he warned against a real cult of secrecy as an instrument of power

While it was up to the courts to decide if Bradley Manning had committed any crime he wrotethe CoE was indebted to him for the publication of a recording of a helicopter attack in Iraq in whichthe crew seems to have intentionally targeted and killed civilians

Thanks to Mr Manning he said a large number of embassy reports had allowed us to learnsignificant details of important recent events which are obviously of general interest We therefore join Amnesty International in expressing our worries as to the treatment he receives Mr Marty wrote inthe draft report[Article continues here httpwwwbbccouknewsworld-europe-14820145]Comment This report demonstrates that Dick Marty is not as De Gaulle would say a serious man To

suggest that Bradley Manning is a hero and intelligence agencies bent on defeating terrorists arecriminals should say it all Manning knowingly violated his oath and willfully provided enormousamounts of classified material to WikiLeaks For Marty this is a good thing in the name of transparencyMarty always injudicious and anti-American in his remarks is now moving at warp speed into crackpotterritory

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2742

Al Qarsquoida amp its Affiliates| back to top |

Al Qaeda Is Down Not Out

Los Angeles Times | By Amy Zegart 7 September 2011

US talk of defeating terrorism is dangerously prematureTalk of strategically defeating Al Qaeda is all the rage in the White House these days Defense

Secretary Leon Panetta used the D-word in July President Obama declared in his new counter-terrorism strategy We can say with growing confidence that we have put Al Qaeda on the path todefeat Compared to the woeful state of the economy terrorism has become the administrations feel-good story of the year

Defeat is a big word It is also dangerously misleading Yes the United States has made greatstrides in the last decade to harden targets improve intelligence and degrade the capabilities of violentIslamist extremists Osama bin Ladens death was a major accomplishment But the fight is nowhereclose to being won and Americas most perilous times may lie ahead Three reasons explain why

The first is that strategically defeating Al Qaeda is not nearly as important as it sounds After911 Al Qaeda morphed into a more complicated decentralized and elusive threat consisting of threeelements core Al Qaeda affiliates or franchise groups operating in places like Yemen and Somalia with

loose ties to the core group and homegrown terrorists inspired by violent extremism often through theInternet in the comfort of their own living rooms

Core Al Qaedas capabilities started degrading in 2001 when the US invaded Afghanistandismantled training camps ousted the Taliban and sent Bin Laden running The CIA has estimated thecore group remaining in the AfghanistanPakistan region to number 50 to 100 fighters The last time BinLaden oversaw a successful operation was 2005 when Al Qaeda struck the London transit system

But plots by homegrowns and franchise groups have risen dramatically in recent years The 2009Ft Hood shooting the worst terrorist attack on US soil since 911 was the work of a homegrownterrorist The mastermind of the 2010 Times Square car bomb plot was a naturalized American citizentrained by the Pakistani Taliban not Al Qaeda Another franchise group Al Qaeda in the ArabianPeninsula was behind the foiled 2009 Christmas Day underwear bomber aviation plot and the 2010

plot to explode tampered printer cartridges aboard cargo planes The Bipartisan Policy Center reported11 violent Islamist extremist terrorist incidents against the US homeland in 2009 the most since 911Nearly all involved what former CIA Director Mike Hayden calls a witches brew of radicalizedAmericans and franchise groups

The second reason why talk of defeat is premature has to do with weapons Terrorism againstAmericans is nothing new The potential for terrorist groups to acquire weapons of mass destruction isIn 1995 a Japanese cult released sarin nerve gas in the Tokyo subway killing 12 people and injuringthousands It was the first WMD terrorist attack in modern history and it sparked a wave of presidentialterrorism commissions years before Bin Laden became a household name

It is this specter of the lone fanatic or small group armed with the worlds most devastatingweapons that keeps experts up at night In 2005 60 leading nuclear scientists and terrorism experts were

asked how many believed the odds of a nuclear attack on the US were negligible Only three or fourhands went up most were far more pessimistic Today there is enough nuclear material to build120000 weapons As long as fissile material is poorly stored and rogue states like Iran and North Koreacontinue their illicit weapons programs nuclear terrorism remains a haunting possibility

The third reason is that the FBI has not yet become a first-rate domestic intelligence agencyAnalysts whose work is vital to success are still second-class citizens labeled support staff alongsidesecretaries and janitors and passed over for key jobs including running the bureaus intelligence unitsThe FBIs information technology is so antiquated it belongs in a museum And the old crime-fighting

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2842

culture still lives There is now a move afoot to shrink new classified facilities so that agents dont haveto waste time away from their cases to read intelligence documents thereStrategically defeating Al Qaeda sounds too good to be true Because it is Amy Zegart is a senior fellow at Stanfords Hoover Institution and the author of Eyes on Spies

Congress and the United States Intelligence Community

US Counterterror Chief Al-Qaida On Steady Slide

Bostoncom | 31 August 2011

White House counterterrorism chief John Brennan said al-Qaida is on a steady slide after the death of al-Qaidas latest second-in-command in Pakistan Brennan told The Associated Press on Wednesdaythat its a huge blow in the first official White House comment since Atiyah Abd al-Rahmans reportedkilling by CIA drone strike in Pakistans tribal areas last week

Al-Qaida is sort of on the ropes and taking a lot of shots to the body and the head Brennansaid This is a time not to step back and let them recover a message he says hes sending to hiscounterparts in Pakistan[Article continues herehttpwwwbostoncomnewsnationwashingtonarticles20110831us_counterterror_chief_al_qaida_on_steady_slide ]

Al-Qaeda (AKA Al-Qaida Al-Qarsquoida)

Council on Foreign Relations | 29 August 2011

ldquoAl-Qaeda an international terrorist network is considered the top terrorist threat to the United StatesThe group is wanted for its September 11 2001 attacks on the World Trade Center and the Pentagon aswell as a host of lesser attacks To escape the post-911 US-led war in Afghanistan al-Qaedas centralleadership fled eastward into Pakistan securing a safe haven in loosely governed areas there In July2007 US intelligence agencies found that the organization was regrouping and regaining strength inthese tribal areas along the border with Afghanistan though targeted killings of senior al-Qaeda leadershave since diminished the groups command and control capabilities In February 2009 Director of National Intelligence Dennis C Blair told lawmakers that the groups core is less capable and effective

than it was a year ago The killing of al-Qaedas top leader Osama bin Laden by US forces in Pakistanin May 2011 served a significant blow to the organization but analysts say al-Qaeda remains deadlywith its networks spread all over the world Plus a number of affiliated groups have gained prominencein recent years complicating the task of containing the organizationrdquo

[Article continues here httpwwwcfrorgterrorist-organizationsal-qaeda-k-al-qaida-al-qaidap9126]

Al Qaeda In The Islamic Maghreb

CSIS | 1 September 2011

ldquoAl Qaeda in the Islamic Maghreb (AQIM) emerged from a decades-long militant Islamist tradition inAlgeria In 1998 the Salafist Group for Preaching and Combat (Groupe Salafiste pour la Preacutedication etle Combat or GSPC) broke away from the Armed Islamic Group (GIA) because of the GIArsquos extensive

targeting of civilians Gradually the GSPC evolved to encompass global jihadist ideology in addition toits historical focus on overturning the Algerian state In 2006 the GSPC officially affiliated with alQaeda core soon rebranding itself as al Qaeda in the Islamic Maghreb In the following years AQIMwas able to conduct a small number of large-scale attacks most notably its 2007 bombing of the UNheadquarters in Algiers In recent years counterterrorism pressure and weak governance have combinedto shift the center of AQIMrsquos presence to the Sahara-Sahel region AQIM continues to make its presenceknown through smuggling operations kidnappings and clashes with security forces in the desert In thecoming years general instability within the region could allow AQIM to further expand its influencerdquo[Complete article is available here httpcsisorgfilespublication110901_Thornberry_AQIM_WEBpdf ]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2942

AQ Strategy

The Assynt Report | 11 August 2011

Executive Summary Al-Qaedarsquos broad objectives remain unchanged in the wake of bin Ladenrsquos death There

are nonetheless growing questions over al-Qaedarsquos capability Longstanding paranoiaover the use of electronic communications is heightened by the ongoing US dronecampaign whilst attacks against the West have generally been disrupted at an early stage

The Pakistani Talibanrsquos attack on a Karachi naval base in May 2011 was a significantmilitary success and the first major act of revenge for bin Ladenrsquos killing Furtherattempts to avenge his loss are certain

All parts of al-Qaeda are working within a cohesive framework with the ultimate aim of restoring the Islamic Caliphate (Khilafa) The strategic plan to support this aim wasdrafted by 40 of al-Qaedarsquos brightest thinkers in Kandahar Afghanistan in November1999 This plan consists of four phases each seven years long leading to the dissolutionof corrupt regimes and the union of all newly-liberated states within the Khilafa

Apart from mounting strategic operations al-Qaedarsquos role is to be the inspiration for atruly global jihadist movement It seeks to achieve this through provision of trainingbeing a role model for others to follow extending acceptance and adoption of its tactics

particularly suicide bombings and professionalising jihadist media to build a commonbrand and message between hitherto separate groups

Between the late 1990s and 2003 the organisation was primarily devoted to classicinternational terrorism Most effort is now spent fighting insurgencies from North Africato South Asia The way in which this strategy helps to spread the struggle has been seenin North-West Africa where the initial development of al-Qaeda in the Islamic Maghrebwas in part fed by men returning from fighting with al-Qaeda in Iraq

Since mid-2009 al-Qaeda and its affiliates have increasingly encouraged jihadist-sympathisers resident in Western countries to engage in violence themselves withoutcentral direction or training making surveillance more difficult

One of the keys to awakening the spirit of jihad was the success in portraying the US and

its allies as Crusaders in the Muslim world Al-Qaedarsquos strategy essentially requires thatthis process be kept running until the forces of jihad have grown large enough to launchsuccessful liberation operations

Despite its successes in Afghanistan al-Qaedarsquos credibility has suffered both from its failure to landanother strategic blow on the West on the scale of 911 and also excessive Muslim casualties in someoperations Similarly al-Qaeda in Iraq was set back by its excessive sectarian zeal and local resentmentat the foreign fighter presence In turn this affected the movementrsquos funding from the Gulf

Analysis Sub-Saharan African Leaders Media Focus On Threats Prior to 911

OSC Feature | Sub-Sahara Africa -- OSC Analysis 6 September 2011Statements by Sub-Saharan African leaders and African media reports on terrorism prior to the 10thanniversary of 911 focus on the growing threats from local extremists and Al-Qaida affiliatesparticularly in West Africa with little direct commentary on the anniversary or US counterterrorismpolicies This focus on domestic threats suggests that counterterrorism messages expressing solidaritywith African nations and acknowledging the evolving terrorist threat on the continent would have thegreatest resonance with African audiences

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3042

Leaders Stressing Determination To Counter Local Threats African leaders public statements reflect an ongoing concern about the threat of terrorism on thecontinent and a strong commitment to find ways to combat this threat

Nigerian President Goodluck Jonathan emphasized the governments commitment tovigorously combat terrorism following the 26 August bombing of the UN office inAbuja by Nigerian extremist group Boko Haram reported the Paris-based news agencyAFP President Jonathan is hosting Liberian President Ellen Johnson Sirleaf and otherforeign dignitaries for a three-day forum on terrorism and economic crimes the widelyread Lagos-based independent daily The Guardian reported on 4 September

Malian President Amadou Toumani Toure launched a Special Program for PeaceSecurity and Development on 9 August stating that development remained the mostviable solution to counter threats to the countrys stability reported Malis state-owneddaily LEssor[ 3] The program aimed to undermine support for Al-Qaida in the IslamicMaghreb (AQIM) according to Burkinabe web portal Lefasonet on 11 August

Somali Prime Minister Abdiweli Muhammad Gas stated on 23 August that theTransitional Federal Government planned to remove Al-Shabaab from the central andsouthern regions in Somalia with the goal of restoring peace within one year so the

country can hold national elections according to the Puntland-based Garowe Online

Experts Media Highlight New Capabilities Tactics

African experts and media outlets are warning about the evolving nature of terrorist organizations on thecontinent the terrorists pursuit of new targets and tactics and their potential for taking advantage of regional instability

Leading South African think tank the Institute for Security Studies stated on 29 Augustthat Boko Harams attack on the UN in Abuja completes Boko Harams metamorphosisinto an international terrorist group Since December 2010 Boko Haram had killed over600 people in over 70 attacks against Nigerian targets according to the think tank buthad not previously targeted Western or international interests

A 26 August article on the popular Malian web portal Maliweb voiced concern thatAQIM could benefit from Tuareg mercenaries many of whom were recently returningfrom fighting in Libya and could benefit from an increase in arms trafficking through theSahel during the Libyan conflict

Ugandas privately owned Daily Monitor reported on 19 August that AU forces inSomalia warned that Al-Shabaab planned to increase the number of kidnappings andbomb attacks as part of its new strategy to shift from controlling territory in Mogadishuto conducting more of an insurgent campaign

Concern Over Al-Qaida Presence Terrorist Collaboration

West African official statements and media reports reflect a growing concern over an increased Al-

Qaida presence in West Africa and collaboration with AQIM Al-Shabaab and Boko Haram

Nigerian security services reported that the suspected mastermind behind the 26 Augustbombing of the UN office in Abuja was a Boko Haram member with close links to Al-Qaida and Al-Shabaab according Nigerias privately owned Daily Sun

A 28 August report in the privately owned daily Nigerian Tribune claimed that the 26August bombing in Abuja was part of Al-Qaidas plans to mark the 10th anniversary of 911 and called Boko Haram Al-Qaidas ally in the region

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3142

An 8 August commentary in Burkina Fasos LObservateur Paalga said that reports of Boko Haram collaboration with Al-Shabaab and AQIM could indicate that Al-Qaida isextending its African tentacles Abdourahmane Dieng security division chief of theEconomic Community of West African States said the collaboration represented a veryserious threat according to Senegals progovernment Le Soleil on 5 August

Messages Likely To Resonate With African Audience

Sub-Saharan Africas increasing concern about the shifting nature and potential strengthening of theterrorist threat on the continent suggests that messages directly addressing the impact of terrorism onAfricans the increasingly complex nature of the threat and the need for multilateral cooperation againstterrorism are most likely to resonate with Africans

Messages expressing solidarity and sympathy for Africans affected by Boko Haram Al-Shabaab and AQIM would almost certainly resonate with a broad African audience

African political and military leaders would probably welcome acknowledgement of thecomplex and changing nature of terrorism on the continent and recognition of theirinitiatives and commitment to countering violent extremism

African leaders and medias concern about potential collaboration between Boko Haram

Al-Shabaab and AQIM suggest that they would be open to improving multilateral andcross-regional sharing of lessons learned and strategies to counter the intensification of terrorism within Africa

Aviation and Maritime Security| back to top |

Bomb Threats Force Jets To Land

Associated Press | 7 September 2011

Both landed safely one landed in Ankara Ataturk International Airport and the other at Kuala LumpurTwo flights operated by Pakistans state-owned airline received bombs threats on Wednesday

and both landed safely one in Turkey the other in Malaysia officials said No bombs were found The

first flight was headed for Manchester England when it was notified of the threat near the Bulgariancapital of Sofia The crew contacted the control tower in Istanbul to seek permission for the landingstate-run Anatolia news agency reported Authorities quickly evacuated all 378 passengers from theBoeing 777-300ER aircraft after it parked at a remote corner of the International Ataturk Airport andbomb squads began searching the plane with sniffer dogs Anatolia reported PIA spokesman MashoodTajwar confirmed the flight received a threat and landed All passengers were safe A police searchturned up no bomb officials said Later a second PIA flight from Islamabad to Kuala Lumpur alsoreceived a bomb threat It landed in Kuala Lumpur and all the passengers disembarked safely saidTajwar The UK-bound Pakistan International Airlines plane was forced to make an emergency landingat Ataturk Airport in Istanbul after receiving a bomb threat Malaysias airports authority said thepassengers were being screened and the plane was isolated in a parking area while being searched bypolice No bomb was found

It said the plane carried 164 passengers and 13 crew Azmi Murad senior general manager forthe authority said the Pakistani airline informed it that the warning came by email Mr Tajwar gave nodetails on the nature of the threat or how it was delivered Pakistan is home to al Qaedas top leadershipMilitants who trained there have been responsible for many of the attacks and failed plots in the USand Europe since Sept 11 2001 when planes hijacked by al Qaeda militants destroyed the World TradeCenter in New York and crashed into the Pentagon The bomb threats came four days before the 10thanniversary of 911 but there was no apparent link to Islamist militants who typically do not alertauthorities in advance The FBI and Homeland Security department issued warnings last weekend aboutal Qaeda threats to small airlines

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3242

Commentary amp Opinion| back to top |

From Terror Group Founder To Libyan Rebel Military Commander

ABCNews | 29August 2011

The same man who triumphantly led Libyan rebels into Gadhafis compound last week first came to theattention of the US intelligence community years ago - as a founder of a terror group

Abdelhakim Belhaj who was recently appointed to Tripolis rebel military council was one of the original founders of the Libyan Islamic Fighting Group an anti-Gadhafi group which was laterdesignated by the US State Department as a terrorist organization with links to al Qaeda according toUS government reports

We proudly announce the liberation of Libya and that Libya has become free and that the ruleof the tyrant and the era of oppression is behind us a victorious Belhaj told reporters after the stormingof Gadhafis Bab al-Aziziya compound last week Ousting Gadhafi had been the main objective of theLIFG since its inception in the early 1990s even if some of the fighters believed that meant puttingAmericans in the crossfire

The group carried out operations against the Libyan government including at least four suspectedassassination attempts against Gadhafi in the 1990s and was also believed to be connected to a series of suicide bombings in Casablanca Morocco in 2003 the US State Department reported As relationsbetween the US and Gadhafi improved in the mid-2000s some LIFG leaders cultivated relationshipswith top al Qaeda leaders including Osama bin Laden and were suspected of funneling fighters to Iraq tocarry out operations against US soldiers

When the LIFG was designated a terror organization in 2004 it was meant as a gesture of solidarity with the Libyan government according to a March 2011 congressional report

Contrary to several US government reports Libyan rebel ambassador to the US Ali Aujalitold ABC News that the LIFG was never connected to al Qaeda and did not carry out terrorist operations

They were only opposed to Gadhafi during his rule and paid the price for that by beingoppressed by the regime Aujali said

The CIA first publicly voiced its concerns about the connection between the LIFG and al Qaedain 2004 when then-director George Tenet testified before the Senate Select Committee on Intelligenceand listed the LIFG among groups that represented an immediate threat [that] has benefited from alQaeda links[Article continues here httpabcnewsgocomBlotterterror-group-founder-libyan-rebel-military-commanderstoryid=14405319]

Interview With Saudi Sheik Wajdi Al-Ghazawi

MemriTVcom

Sheik Wajdi al-Ghazawi owner of al-Fajr TV criticizes extremist atmosphere in Saudi Arabia and saysafter 911 They Handed Out Sweets on the Streets of Mecca

Following are excerpts from a statement by Saudi Sheik Wajdi Al-Ghazawi owner of Al-FajrTV which was posted on YouTube on August 4 2011

Wajdi Al-Ghazawi When Al-Qaeda and Osama Bin Laden were at the height of their mightthey were extremely popular in Saudi Arabia From mosque pulpits across Saudi Arabia preacherswould pray for their success Moreover from the pulpits of the most important mosques ndash the Al-HaramMosque in Mecca and the Nabawi Mosque in Al-Madina ndash direct prayers for the success of Al-Qaedawere made during the days of the bombing of Tora Bora Oh Allah help our brothers in AfghanistanThese supplications were made during evening prayers as well as Friday prayers The preachers wouldpray for them in violation of the ministrys instructions

When the twin towers in New York were attacked they handed out sweets on the streets of Mecca By Allah they did I witnessed this myself The young people bowed in prayer and hugged one

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3342

another out of joy People were in heaven because of these young men who destroyed America andbombed this idol Am I right or not Was it like that or not

Back then when the Taliban broke off a piece of the nose of the Buddha statue which was hewnin the mountain an entire sermon was dedicated to it in the mosque in Mecca and the preacher was laterreprimanded for this sermon The entire Saudi people supported and loved Al-Qaeda

This went on until our brothers in Al-Qaeda ndash and I dont know what was going through theirminds ndash began to carry out operations inside Saudi Arabia Thats when we all raised our hands andsaid Youve gone too far We wont support you in this

The atmosphere here in Saudi Arabia is one of extremism It is characterized by focusing onminor details Many things are forbidden Yes maybe they are indeed forbidden but by forcing peopleto avoid them and by acting as if these were major sins an atmosphere was created that gave rise toextremist youth who might act recklessly at the most trivial provocation

For instance we blew out of proportion the issue of music the issue of smoking or the issue of hanging pictures in public places True there are clear texts on these issues but the young peopleembraced these issues as if they were fighting usury fornication or alcohol No these are not among theseven major sins So our society has become extreme

This extremist atmosphere has given rise to people who accuse others of heresy and people whopurport to be waging Jihad It has created genes that gave rise to cells of Al-Qaeda and other terrorists

We must examine our breeding ground in which these young men were sownBy Allah what can possibly emerge from such an atmosphere Muftis who accuse others of

heresy sheiks who incite and young people who bomb Am I right or not[Complete clip is available here httpwwwmemritvorgclipen3099htm]

Legal Aspects amp Lawfare| back to top |

Revisiting A Stale Counterterrorism Law

Council on Foreign Relations | 1 September 2011

ldquoNearly a decade after 911 the United States still relies on the 2001 Authorization for the Use of Military Force (AUMF) for the killing and detention of those considered responsible for or associatedwith the terrorist attacks But CFR national security law expert John Bellinger says it is becomingincreasingly difficult for the Obama administration to justify some of its counterterrorism operationsunder this limited statutory authority It has been used in defense of actions including drone attacks onindividuals as well as the targeting of groups in Yemen and Somalia that may have only the mosttenuous affiliation or association to the 911 attack A revised AUMF should clarify those operations aswell as the issue of detention specifically which individuals can be detained for how long and subjectto what processes There also needs to be greater effort at the international level he adds to fill thegaps in the law that covers conflicts between states and non-state actorsrdquohelliprdquo[Complete article is available here httpwwwcfrorgcounterterrorismrevisiting-stale-

counterterrorism-lawp25742]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3442

Narco-Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector[Complete article is available here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Mexicos Cartels Move Into Extortion

At a construction site of an apartment building in the heart of the Mexican capital a company engineerruns through his weekly payroll sheet He has salaries written out for carpenters bricklayers andelectricians At the bottom of the sheet is a notation of $200 for ldquosecurity servicesrdquo next to a nicknameldquoEl Indiordquo mdash the Indian [Complete article is available here

httpwwwtucsonsentinelcomnationworldreport090611_mexico_cartels_bribesmexicos-cartels-move-into-extortion ]

Seven Die In Mexican Pacific Port City

Latin American Herald Tribune

Seven people died in separate shootings in Mazatlan a port city in the northwestern Mexican state of Sinaloa with some of the incidents drug-related a police spokesman told Efe [Complete article is available herehttpwwwlahtcomarticleaspCategoryId=14091ampArticleId=423061]

Tijuana Violence Slows As One Cartel Takes Control

BorderlandBeatcom

Mexicos famously seedy border city of Tijuana is enjoying a lull in drug murders as the countrys mostpowerful cartel gains the upper hand over its rivals [Complete article is available here httpwwwborderlandbeatcom201109tijuana-violence-slows-as-one-cartelhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3542

Network Notes| back to top |

Canadian data foreign threats Spying in the digital age (Suggested by a reader in Lithuania ndash thanks) Globe and Mail | By Colin Freeze 31 July 2010

A government spy agency thatrsquos prohibited from monitoring Canadian citizens is now usingldquoinformation about Canadiansrdquo to zero in on foreign threatsThe ambiguous statement found in a new government report detailing the activities of CommunicationsSecurity Establishment Canada could sanction a range of intelligence-gathering activities ndash includingthe controversial practice of mining ldquometadatardquo from digital communications

Metadata ndash often called data about data ndash are found in e-mails and their attachments and containdigital signatures that can reveal when where and by whom documents were created

The collection of metadata has caused controversy in other countries but never in Canada wherethe Communications Security Establishment Canada operates as an ultra-secretive agency About theonly thing that is known about the classified practices is that they were halted and resumed after someldquomajor changesrdquo including directives signed by Defence Minister Peter MacKay

ldquoI cannot comment on specific operational activitiesrdquo Adrian Simpson a CSEC spokesman toldThe Globe He stressed that reviews upheld that the activities in question were ldquocarried out inaccordance with the law ministerial requirements and CSECrsquos policies and proceduresrdquo

ldquoCSEC is prohibited from directing its activities at Canadians anyone in Canada or Canadiansanywhere in the worldrdquo he said

For decades signals-intelligence agencies in the West have been allowed to safeguard nationalsecurity by eavesdropping on foreignersrsquo conversations Spies can whatever phone lines and satellitesignals they can so long as they never listen in on fellow citizens

But in the digital age governments run increasingly sophisticated dragnets scooping up andscouring through millions of intercepted Internet conversations daily Such practices create legalambiguities

ldquoThe whole issue of what constitutes boundaries for signals-intelligence agencies in cyberspaceis a big debate right nowrdquo said Rafal Rohozinski a security expert affiliated with the University of Torontorsquos Munk School

A watchdog agency that reviews the CSECrsquos activities released an annual report to Parliament onJuly 20 ldquoWhen other means have been exhausted CSEC may use information about Canadians when it

has reasonable grounds to believe that using this information may assist in identifying and obtainingforeign intelligencerdquo it reads

Sometimes collecting metadata is relatively benign It can involve aggregating sets of data tospot trends much like the way meteorologists discern national forecasts from localized information

For example while CSEC canrsquot usually monitor the communications of specific Canadian terrorsuspects it can glean insights by zooming out for big-picture patterns One way to do that MrRohozinski said would be to look at data flows between Canadian cities and Yemen where an Internet-savvy al-Qaeda offshoot works to recruit Westerners

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3642

Metadata however can be more revealing Documents that circulate on the Internet travelaround like postmarked letters marked with return addresses ndash e-mails and attachments have embeddedcodes that speak to the who where and when behind their creation

The US National Security Agency found itself mired in controversy a few years go after itskirted domestic-spying bans by secretly upholding that this sort of American metadata was fair gamedistinct from communication contents

Therersquos little to suggest the CSEC would go that far The federal agencyrsquos activities are reviewedby a watchdog body now headed by a former Federal Court of Appeal judge Robert Deacutecary appointedlast year wrote in his annual report that he was satisfied the CSEC activities in question are lawful evenif his predecessors felt them borderline

ldquoThis was the first review of these activities since hellip their resumption under new policiesrdquo thewatchdogrsquos report says It concludes that the surveillance activities are ldquoin accordance with the lawrdquo andfollow ldquomajor changes to certain policies procedures and practicesrdquo

Much of the concern arises from the possibility that CSEC could hand over metadata intelligenceto domestic law-enforcement and security agencies

As it stands the RCMP and CSIS have to develop their domestic investigations before coming toCSEC ndash usually with warrants ndash if they want specific intelligence The rules guiding handovers are strictbecause even though all agencies run surveillance operations they do so under vastly different

mandates and legal standardsThe spy agency however stood by its practicesldquoCSEC is extremely diligent when it comes to the privacy of Canadiansrdquo Mr Simpson said

[complete article is available here httpwwwtheglobeandmailcomnewsnationalcanadian-data-foreign-threats-spying-in-the-digital-agearticle2113772 ]

Cyber Attacks Against NATO Then And Now

New Atlanticist | 6 September 2011

ldquoNow that NATOrsquos Operation UNIFIED PROTECTOR over Libya is winding down it is worth

noting how few cyber incidents were directed in protest against the Alliance Certainly there was a

cyber component to the liberation of Libya but it was more about content and Internet freedom (the

most newsworthy elements here were the role of social media and the Libyan government taking largeparts of the nation offline) But compared to past history NATO cyber defenders had a relatively easy

time

ldquoNATO has not however had an easy 2011 Although there were three significant incidents we

know about none seemed to have been in direct response to operations over Libyahelliprdquo

[Complete article is available here httpwwwacusorgnew_atlanticistcyber-attacks-against-nato-then-

and-now]

The Calm Before The Storm

Foreign Policy | By Joel Brenner 6 September 2011

Cyberwar is already happening -- and its about to get much much worse A veteran cyberwarriorexplains how America can prepare itself

Revelations of wholesale electronic fraud and massive data heists have become weekly evendaily affairs A multinational electronics corporation loses personal information on more than 100million customers Cyberthieves break into an international bank counterfeit credit balances and lootATMs in four countries grabbing $9 million in just a few hours International gangs spread maliciouscode that conscripts unwitting computers into zombie armies of hundreds of thousands of similarlyenslaved machines Criminals then rent these armies called botnets as easily as you can buy a time-sharing arrangement in a beach condo No wonder the vast majority of Internet traffic is spam

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3742

Yet the loss of personal information and related criminal fraud intolerable as they are are theleast threatening face of electronic insecurity The US militarys secret network is penetratedAmericans corporate pockets are being picked clean of the intellectual property that makes the UnitedStates tick And the electricity grid that keeps the lights on and makes everything move is dangerouslyinsecure

In one remote attack on the Pentagons information systems about 10 years ago the Chinesehauled away up to 20 terabytes of information If the information had been on paper theyd have neededa line of moving vans stretching from the Pentagon to freighters docked 50 miles away in Baltimoreharbor just to haul it away Had they done so the military district of Washington wouldve become anactive theater of operations for the first time since 1865 and the Navy wouldve blockaded theChesapeake Bay But the Chinese did it electronically so who noticed

Corporate espionage by both competitors and foreign intelligence services or their surrogates isalso increasing Intelligence officials see this but cant speak openly about the specifics and Im seeingit now in my law practice The victims rarely admit it for understandable reasons Oracle whichsuccessfully sued SAP for theft of its software code was a prominent exception Google was another

When the Chinese penetrated Google in late 2009 -- yes that operation was Chinese and yes itwas done with the blessing of a member of the Politburo -- they werent after customer informationThey were after the source code that makes Google unique Nor was Google the only victim Thousands

of US and Western firms were penetrated in that affair Foreign governments -- and not only theChinese -- understand that they cannot compete with the United States militarily and politically if theycannot compete with it economically so their intelligence services want to steal its corporate intellectualproperty This is the technology that gives America its competitive edge and often it has nothing to dowith defense Ordinary companies with valuable technology are now being targeted by nation-statesThis is a new era National security and economic security have converged

The danger is not limited to the loss of technology and information however The owners andoperators of the North American electricity grid are hooking up their control systems to the Internet asfast as they can Exposing the grid to the Internet makes it marginally more efficient but it also makes itdramatically more vulnerable to disruption If you can remotely penetrate an electronic system to stealinformation you can remotely penetrate it to shut it down or make it go haywire This is why there is no

longer a meaningful difference between information security and operational security And the biggestoperational risk is the grid In contemporary society nothing moves without electricity If the grid goesout the country stops

As the Stuxnet affair demonstrated remotely engineered disruption of industrial control systemsis now a reality That episode involved the successful electronic attack on the centrifuges in the Iraniannuclear program Only a first-class intelligence agency could have pulled that off but the blueprint fordoing it -- the code itself -- is now public Many American industrial control systems run on the samekind of equipment the Iranians were using but unlike the controls on the Iranian centrifuges thecontrols on the US grid are now being connected to the Internet making them easier to disrupt Stuxnetwas a watershed there will be copycats

Other industrial control systems will also be targets Some already are Air traffic control

railroad switches and water and sewage systems are all electronically controlled now and many arevulnerable If an intruder can break into the right server electronically he can remotely shut downproduction send your goods to the wrong destination and even unlock your doors -- and delete your logentries so he leaves no record of ever having been there

The United States does not lack enemies who would attack it this way Seized al Qaedacomputers contain details of US industrial control systems In 2003 a group affiliated with thePakistani terrorist organization Lashkar-e-Taiba -- the same gang that engineered the 2008 terroristassaults in Mumbai -- plotted to attack the Australian grid Other groups conspired to attack the Britishgrid in 2004 2006 and 2009 Yet the owners and operators of the North American grid continue willy-

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3842

nilly to expose their control systems to the Internet instead of isolating and hardening it This is folly of a high order

Important conclusions for public and corporate policy follow from this vulnerable state of

affairs First cyber insecurity has operational consequences In the current and foreseeable states of technology a high degree of assurance against electronic penetration of anything connected to theInternet is not achievable Large efficient electronically connected organizations and nations aretherefore vulnerable to remotely engineered disruption as well as information theft

Second this risk cannot be eliminated -- but it can be reduced and managed As a nation theUnited States should start by isolating the grids controls from the Internet Undoubtedly there aremarginal efficiencies to be gained by seamless connectivity over a publicly accessible infrastructure butthese gains are usually exaggerated and the risk this connectivity creates is staggering The governmentand the major telecommunications carriers must also make the investment required to re-create themassive redundancies that made the wired telephone network so robust Resilience and swift recoveryshould be the goal If the consequences of cyberattacks were reduced penetration would cease to matter

Third companies that wait for the government to solve their own security problems do so attheir peril The government is broke and the IT backbone is 85 percent private so the governmentdoesnt control it The governments role in altering the status quo will be limited to setting standardsusing its purchasing power to move vendors toward better security and getting its own house in order

The government can neither secure corporate intellectual property nor protect firms against operationaldisruption

Fourth in a world in which everything cannot be protected companies must determine forthemselves what intellectual property and physical assets to isolate and safeguard Those that approachthis task seriously will quickly learn that technology is only one aspect of their insecurity and in manycases the easiest to deal with Unless technology is integrated with personnel practices and operationalsecurity it opens vulnerabilities that its users rarely understand This kind of integration requires theautomated enforcement of reasonable security policies and systematic workforce training and thatoccurs only when management the lawyers and the technologists work closely together This is an old-fashioned management challenge -- not a technological one For their part corporate boards need to takeIT security seriously and launch audits that examine how their systems are actually implemented and

used not merely how they are designed Because as the techies like to put it the weakest link in anysystem is not the silicon-based unit on the desk its the carbon-based unit in the chair Joel Brenner is author of the forthcoming America the Vulnerable Inside the New Threat Matrix of

Digital Espionage Crime and Warfare He has served as the inspector general of the National Security

Agency the national counterintelligence executive and the NSAs senior counsel He now practices law

at Cooley LLP in Washington DC

Cyberattacks Decline Slightly Symantec Report Finds

Dark Reading | 1 September 2011

Organizations worldwide are suffering damages as a result of cyberattacks but interestingly there hasbeen a slight decline in these attacks during the past 12 months according to a new report from

Symantec More than 90 percent of the more than 3300 respondents across 36 countries said theyexperienced tangible losses as a result of a hack with 84 percent reporting financial loss to the cost of abreach Around one-fifth lost at least $195000 in breaches during the past 12 months

Meanwhile Symantec attributes the unexpected bright spot of a decline in breaches toorganizations employing better cybersecurity defenses More than 70 percent of organizations sawattacks in the past 12 months a decline of 5 percent from 2010 And those that experienced anincreasing frequency of attacks dropped from 29 percent in 2010 to 21 percent this year While 100percent last year reported losses from cyberattacks 92 percent did so in 2011 The trend seemscounterintuitive given the rash of high-profile breaches this year More

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 27: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2742

Al Qarsquoida amp its Affiliates| back to top |

Al Qaeda Is Down Not Out

Los Angeles Times | By Amy Zegart 7 September 2011

US talk of defeating terrorism is dangerously prematureTalk of strategically defeating Al Qaeda is all the rage in the White House these days Defense

Secretary Leon Panetta used the D-word in July President Obama declared in his new counter-terrorism strategy We can say with growing confidence that we have put Al Qaeda on the path todefeat Compared to the woeful state of the economy terrorism has become the administrations feel-good story of the year

Defeat is a big word It is also dangerously misleading Yes the United States has made greatstrides in the last decade to harden targets improve intelligence and degrade the capabilities of violentIslamist extremists Osama bin Ladens death was a major accomplishment But the fight is nowhereclose to being won and Americas most perilous times may lie ahead Three reasons explain why

The first is that strategically defeating Al Qaeda is not nearly as important as it sounds After911 Al Qaeda morphed into a more complicated decentralized and elusive threat consisting of threeelements core Al Qaeda affiliates or franchise groups operating in places like Yemen and Somalia with

loose ties to the core group and homegrown terrorists inspired by violent extremism often through theInternet in the comfort of their own living rooms

Core Al Qaedas capabilities started degrading in 2001 when the US invaded Afghanistandismantled training camps ousted the Taliban and sent Bin Laden running The CIA has estimated thecore group remaining in the AfghanistanPakistan region to number 50 to 100 fighters The last time BinLaden oversaw a successful operation was 2005 when Al Qaeda struck the London transit system

But plots by homegrowns and franchise groups have risen dramatically in recent years The 2009Ft Hood shooting the worst terrorist attack on US soil since 911 was the work of a homegrownterrorist The mastermind of the 2010 Times Square car bomb plot was a naturalized American citizentrained by the Pakistani Taliban not Al Qaeda Another franchise group Al Qaeda in the ArabianPeninsula was behind the foiled 2009 Christmas Day underwear bomber aviation plot and the 2010

plot to explode tampered printer cartridges aboard cargo planes The Bipartisan Policy Center reported11 violent Islamist extremist terrorist incidents against the US homeland in 2009 the most since 911Nearly all involved what former CIA Director Mike Hayden calls a witches brew of radicalizedAmericans and franchise groups

The second reason why talk of defeat is premature has to do with weapons Terrorism againstAmericans is nothing new The potential for terrorist groups to acquire weapons of mass destruction isIn 1995 a Japanese cult released sarin nerve gas in the Tokyo subway killing 12 people and injuringthousands It was the first WMD terrorist attack in modern history and it sparked a wave of presidentialterrorism commissions years before Bin Laden became a household name

It is this specter of the lone fanatic or small group armed with the worlds most devastatingweapons that keeps experts up at night In 2005 60 leading nuclear scientists and terrorism experts were

asked how many believed the odds of a nuclear attack on the US were negligible Only three or fourhands went up most were far more pessimistic Today there is enough nuclear material to build120000 weapons As long as fissile material is poorly stored and rogue states like Iran and North Koreacontinue their illicit weapons programs nuclear terrorism remains a haunting possibility

The third reason is that the FBI has not yet become a first-rate domestic intelligence agencyAnalysts whose work is vital to success are still second-class citizens labeled support staff alongsidesecretaries and janitors and passed over for key jobs including running the bureaus intelligence unitsThe FBIs information technology is so antiquated it belongs in a museum And the old crime-fighting

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2842

culture still lives There is now a move afoot to shrink new classified facilities so that agents dont haveto waste time away from their cases to read intelligence documents thereStrategically defeating Al Qaeda sounds too good to be true Because it is Amy Zegart is a senior fellow at Stanfords Hoover Institution and the author of Eyes on Spies

Congress and the United States Intelligence Community

US Counterterror Chief Al-Qaida On Steady Slide

Bostoncom | 31 August 2011

White House counterterrorism chief John Brennan said al-Qaida is on a steady slide after the death of al-Qaidas latest second-in-command in Pakistan Brennan told The Associated Press on Wednesdaythat its a huge blow in the first official White House comment since Atiyah Abd al-Rahmans reportedkilling by CIA drone strike in Pakistans tribal areas last week

Al-Qaida is sort of on the ropes and taking a lot of shots to the body and the head Brennansaid This is a time not to step back and let them recover a message he says hes sending to hiscounterparts in Pakistan[Article continues herehttpwwwbostoncomnewsnationwashingtonarticles20110831us_counterterror_chief_al_qaida_on_steady_slide ]

Al-Qaeda (AKA Al-Qaida Al-Qarsquoida)

Council on Foreign Relations | 29 August 2011

ldquoAl-Qaeda an international terrorist network is considered the top terrorist threat to the United StatesThe group is wanted for its September 11 2001 attacks on the World Trade Center and the Pentagon aswell as a host of lesser attacks To escape the post-911 US-led war in Afghanistan al-Qaedas centralleadership fled eastward into Pakistan securing a safe haven in loosely governed areas there In July2007 US intelligence agencies found that the organization was regrouping and regaining strength inthese tribal areas along the border with Afghanistan though targeted killings of senior al-Qaeda leadershave since diminished the groups command and control capabilities In February 2009 Director of National Intelligence Dennis C Blair told lawmakers that the groups core is less capable and effective

than it was a year ago The killing of al-Qaedas top leader Osama bin Laden by US forces in Pakistanin May 2011 served a significant blow to the organization but analysts say al-Qaeda remains deadlywith its networks spread all over the world Plus a number of affiliated groups have gained prominencein recent years complicating the task of containing the organizationrdquo

[Article continues here httpwwwcfrorgterrorist-organizationsal-qaeda-k-al-qaida-al-qaidap9126]

Al Qaeda In The Islamic Maghreb

CSIS | 1 September 2011

ldquoAl Qaeda in the Islamic Maghreb (AQIM) emerged from a decades-long militant Islamist tradition inAlgeria In 1998 the Salafist Group for Preaching and Combat (Groupe Salafiste pour la Preacutedication etle Combat or GSPC) broke away from the Armed Islamic Group (GIA) because of the GIArsquos extensive

targeting of civilians Gradually the GSPC evolved to encompass global jihadist ideology in addition toits historical focus on overturning the Algerian state In 2006 the GSPC officially affiliated with alQaeda core soon rebranding itself as al Qaeda in the Islamic Maghreb In the following years AQIMwas able to conduct a small number of large-scale attacks most notably its 2007 bombing of the UNheadquarters in Algiers In recent years counterterrorism pressure and weak governance have combinedto shift the center of AQIMrsquos presence to the Sahara-Sahel region AQIM continues to make its presenceknown through smuggling operations kidnappings and clashes with security forces in the desert In thecoming years general instability within the region could allow AQIM to further expand its influencerdquo[Complete article is available here httpcsisorgfilespublication110901_Thornberry_AQIM_WEBpdf ]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2942

AQ Strategy

The Assynt Report | 11 August 2011

Executive Summary Al-Qaedarsquos broad objectives remain unchanged in the wake of bin Ladenrsquos death There

are nonetheless growing questions over al-Qaedarsquos capability Longstanding paranoiaover the use of electronic communications is heightened by the ongoing US dronecampaign whilst attacks against the West have generally been disrupted at an early stage

The Pakistani Talibanrsquos attack on a Karachi naval base in May 2011 was a significantmilitary success and the first major act of revenge for bin Ladenrsquos killing Furtherattempts to avenge his loss are certain

All parts of al-Qaeda are working within a cohesive framework with the ultimate aim of restoring the Islamic Caliphate (Khilafa) The strategic plan to support this aim wasdrafted by 40 of al-Qaedarsquos brightest thinkers in Kandahar Afghanistan in November1999 This plan consists of four phases each seven years long leading to the dissolutionof corrupt regimes and the union of all newly-liberated states within the Khilafa

Apart from mounting strategic operations al-Qaedarsquos role is to be the inspiration for atruly global jihadist movement It seeks to achieve this through provision of trainingbeing a role model for others to follow extending acceptance and adoption of its tactics

particularly suicide bombings and professionalising jihadist media to build a commonbrand and message between hitherto separate groups

Between the late 1990s and 2003 the organisation was primarily devoted to classicinternational terrorism Most effort is now spent fighting insurgencies from North Africato South Asia The way in which this strategy helps to spread the struggle has been seenin North-West Africa where the initial development of al-Qaeda in the Islamic Maghrebwas in part fed by men returning from fighting with al-Qaeda in Iraq

Since mid-2009 al-Qaeda and its affiliates have increasingly encouraged jihadist-sympathisers resident in Western countries to engage in violence themselves withoutcentral direction or training making surveillance more difficult

One of the keys to awakening the spirit of jihad was the success in portraying the US and

its allies as Crusaders in the Muslim world Al-Qaedarsquos strategy essentially requires thatthis process be kept running until the forces of jihad have grown large enough to launchsuccessful liberation operations

Despite its successes in Afghanistan al-Qaedarsquos credibility has suffered both from its failure to landanother strategic blow on the West on the scale of 911 and also excessive Muslim casualties in someoperations Similarly al-Qaeda in Iraq was set back by its excessive sectarian zeal and local resentmentat the foreign fighter presence In turn this affected the movementrsquos funding from the Gulf

Analysis Sub-Saharan African Leaders Media Focus On Threats Prior to 911

OSC Feature | Sub-Sahara Africa -- OSC Analysis 6 September 2011Statements by Sub-Saharan African leaders and African media reports on terrorism prior to the 10thanniversary of 911 focus on the growing threats from local extremists and Al-Qaida affiliatesparticularly in West Africa with little direct commentary on the anniversary or US counterterrorismpolicies This focus on domestic threats suggests that counterterrorism messages expressing solidaritywith African nations and acknowledging the evolving terrorist threat on the continent would have thegreatest resonance with African audiences

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3042

Leaders Stressing Determination To Counter Local Threats African leaders public statements reflect an ongoing concern about the threat of terrorism on thecontinent and a strong commitment to find ways to combat this threat

Nigerian President Goodluck Jonathan emphasized the governments commitment tovigorously combat terrorism following the 26 August bombing of the UN office inAbuja by Nigerian extremist group Boko Haram reported the Paris-based news agencyAFP President Jonathan is hosting Liberian President Ellen Johnson Sirleaf and otherforeign dignitaries for a three-day forum on terrorism and economic crimes the widelyread Lagos-based independent daily The Guardian reported on 4 September

Malian President Amadou Toumani Toure launched a Special Program for PeaceSecurity and Development on 9 August stating that development remained the mostviable solution to counter threats to the countrys stability reported Malis state-owneddaily LEssor[ 3] The program aimed to undermine support for Al-Qaida in the IslamicMaghreb (AQIM) according to Burkinabe web portal Lefasonet on 11 August

Somali Prime Minister Abdiweli Muhammad Gas stated on 23 August that theTransitional Federal Government planned to remove Al-Shabaab from the central andsouthern regions in Somalia with the goal of restoring peace within one year so the

country can hold national elections according to the Puntland-based Garowe Online

Experts Media Highlight New Capabilities Tactics

African experts and media outlets are warning about the evolving nature of terrorist organizations on thecontinent the terrorists pursuit of new targets and tactics and their potential for taking advantage of regional instability

Leading South African think tank the Institute for Security Studies stated on 29 Augustthat Boko Harams attack on the UN in Abuja completes Boko Harams metamorphosisinto an international terrorist group Since December 2010 Boko Haram had killed over600 people in over 70 attacks against Nigerian targets according to the think tank buthad not previously targeted Western or international interests

A 26 August article on the popular Malian web portal Maliweb voiced concern thatAQIM could benefit from Tuareg mercenaries many of whom were recently returningfrom fighting in Libya and could benefit from an increase in arms trafficking through theSahel during the Libyan conflict

Ugandas privately owned Daily Monitor reported on 19 August that AU forces inSomalia warned that Al-Shabaab planned to increase the number of kidnappings andbomb attacks as part of its new strategy to shift from controlling territory in Mogadishuto conducting more of an insurgent campaign

Concern Over Al-Qaida Presence Terrorist Collaboration

West African official statements and media reports reflect a growing concern over an increased Al-

Qaida presence in West Africa and collaboration with AQIM Al-Shabaab and Boko Haram

Nigerian security services reported that the suspected mastermind behind the 26 Augustbombing of the UN office in Abuja was a Boko Haram member with close links to Al-Qaida and Al-Shabaab according Nigerias privately owned Daily Sun

A 28 August report in the privately owned daily Nigerian Tribune claimed that the 26August bombing in Abuja was part of Al-Qaidas plans to mark the 10th anniversary of 911 and called Boko Haram Al-Qaidas ally in the region

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3142

An 8 August commentary in Burkina Fasos LObservateur Paalga said that reports of Boko Haram collaboration with Al-Shabaab and AQIM could indicate that Al-Qaida isextending its African tentacles Abdourahmane Dieng security division chief of theEconomic Community of West African States said the collaboration represented a veryserious threat according to Senegals progovernment Le Soleil on 5 August

Messages Likely To Resonate With African Audience

Sub-Saharan Africas increasing concern about the shifting nature and potential strengthening of theterrorist threat on the continent suggests that messages directly addressing the impact of terrorism onAfricans the increasingly complex nature of the threat and the need for multilateral cooperation againstterrorism are most likely to resonate with Africans

Messages expressing solidarity and sympathy for Africans affected by Boko Haram Al-Shabaab and AQIM would almost certainly resonate with a broad African audience

African political and military leaders would probably welcome acknowledgement of thecomplex and changing nature of terrorism on the continent and recognition of theirinitiatives and commitment to countering violent extremism

African leaders and medias concern about potential collaboration between Boko Haram

Al-Shabaab and AQIM suggest that they would be open to improving multilateral andcross-regional sharing of lessons learned and strategies to counter the intensification of terrorism within Africa

Aviation and Maritime Security| back to top |

Bomb Threats Force Jets To Land

Associated Press | 7 September 2011

Both landed safely one landed in Ankara Ataturk International Airport and the other at Kuala LumpurTwo flights operated by Pakistans state-owned airline received bombs threats on Wednesday

and both landed safely one in Turkey the other in Malaysia officials said No bombs were found The

first flight was headed for Manchester England when it was notified of the threat near the Bulgariancapital of Sofia The crew contacted the control tower in Istanbul to seek permission for the landingstate-run Anatolia news agency reported Authorities quickly evacuated all 378 passengers from theBoeing 777-300ER aircraft after it parked at a remote corner of the International Ataturk Airport andbomb squads began searching the plane with sniffer dogs Anatolia reported PIA spokesman MashoodTajwar confirmed the flight received a threat and landed All passengers were safe A police searchturned up no bomb officials said Later a second PIA flight from Islamabad to Kuala Lumpur alsoreceived a bomb threat It landed in Kuala Lumpur and all the passengers disembarked safely saidTajwar The UK-bound Pakistan International Airlines plane was forced to make an emergency landingat Ataturk Airport in Istanbul after receiving a bomb threat Malaysias airports authority said thepassengers were being screened and the plane was isolated in a parking area while being searched bypolice No bomb was found

It said the plane carried 164 passengers and 13 crew Azmi Murad senior general manager forthe authority said the Pakistani airline informed it that the warning came by email Mr Tajwar gave nodetails on the nature of the threat or how it was delivered Pakistan is home to al Qaedas top leadershipMilitants who trained there have been responsible for many of the attacks and failed plots in the USand Europe since Sept 11 2001 when planes hijacked by al Qaeda militants destroyed the World TradeCenter in New York and crashed into the Pentagon The bomb threats came four days before the 10thanniversary of 911 but there was no apparent link to Islamist militants who typically do not alertauthorities in advance The FBI and Homeland Security department issued warnings last weekend aboutal Qaeda threats to small airlines

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3242

Commentary amp Opinion| back to top |

From Terror Group Founder To Libyan Rebel Military Commander

ABCNews | 29August 2011

The same man who triumphantly led Libyan rebels into Gadhafis compound last week first came to theattention of the US intelligence community years ago - as a founder of a terror group

Abdelhakim Belhaj who was recently appointed to Tripolis rebel military council was one of the original founders of the Libyan Islamic Fighting Group an anti-Gadhafi group which was laterdesignated by the US State Department as a terrorist organization with links to al Qaeda according toUS government reports

We proudly announce the liberation of Libya and that Libya has become free and that the ruleof the tyrant and the era of oppression is behind us a victorious Belhaj told reporters after the stormingof Gadhafis Bab al-Aziziya compound last week Ousting Gadhafi had been the main objective of theLIFG since its inception in the early 1990s even if some of the fighters believed that meant puttingAmericans in the crossfire

The group carried out operations against the Libyan government including at least four suspectedassassination attempts against Gadhafi in the 1990s and was also believed to be connected to a series of suicide bombings in Casablanca Morocco in 2003 the US State Department reported As relationsbetween the US and Gadhafi improved in the mid-2000s some LIFG leaders cultivated relationshipswith top al Qaeda leaders including Osama bin Laden and were suspected of funneling fighters to Iraq tocarry out operations against US soldiers

When the LIFG was designated a terror organization in 2004 it was meant as a gesture of solidarity with the Libyan government according to a March 2011 congressional report

Contrary to several US government reports Libyan rebel ambassador to the US Ali Aujalitold ABC News that the LIFG was never connected to al Qaeda and did not carry out terrorist operations

They were only opposed to Gadhafi during his rule and paid the price for that by beingoppressed by the regime Aujali said

The CIA first publicly voiced its concerns about the connection between the LIFG and al Qaedain 2004 when then-director George Tenet testified before the Senate Select Committee on Intelligenceand listed the LIFG among groups that represented an immediate threat [that] has benefited from alQaeda links[Article continues here httpabcnewsgocomBlotterterror-group-founder-libyan-rebel-military-commanderstoryid=14405319]

Interview With Saudi Sheik Wajdi Al-Ghazawi

MemriTVcom

Sheik Wajdi al-Ghazawi owner of al-Fajr TV criticizes extremist atmosphere in Saudi Arabia and saysafter 911 They Handed Out Sweets on the Streets of Mecca

Following are excerpts from a statement by Saudi Sheik Wajdi Al-Ghazawi owner of Al-FajrTV which was posted on YouTube on August 4 2011

Wajdi Al-Ghazawi When Al-Qaeda and Osama Bin Laden were at the height of their mightthey were extremely popular in Saudi Arabia From mosque pulpits across Saudi Arabia preacherswould pray for their success Moreover from the pulpits of the most important mosques ndash the Al-HaramMosque in Mecca and the Nabawi Mosque in Al-Madina ndash direct prayers for the success of Al-Qaedawere made during the days of the bombing of Tora Bora Oh Allah help our brothers in AfghanistanThese supplications were made during evening prayers as well as Friday prayers The preachers wouldpray for them in violation of the ministrys instructions

When the twin towers in New York were attacked they handed out sweets on the streets of Mecca By Allah they did I witnessed this myself The young people bowed in prayer and hugged one

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3342

another out of joy People were in heaven because of these young men who destroyed America andbombed this idol Am I right or not Was it like that or not

Back then when the Taliban broke off a piece of the nose of the Buddha statue which was hewnin the mountain an entire sermon was dedicated to it in the mosque in Mecca and the preacher was laterreprimanded for this sermon The entire Saudi people supported and loved Al-Qaeda

This went on until our brothers in Al-Qaeda ndash and I dont know what was going through theirminds ndash began to carry out operations inside Saudi Arabia Thats when we all raised our hands andsaid Youve gone too far We wont support you in this

The atmosphere here in Saudi Arabia is one of extremism It is characterized by focusing onminor details Many things are forbidden Yes maybe they are indeed forbidden but by forcing peopleto avoid them and by acting as if these were major sins an atmosphere was created that gave rise toextremist youth who might act recklessly at the most trivial provocation

For instance we blew out of proportion the issue of music the issue of smoking or the issue of hanging pictures in public places True there are clear texts on these issues but the young peopleembraced these issues as if they were fighting usury fornication or alcohol No these are not among theseven major sins So our society has become extreme

This extremist atmosphere has given rise to people who accuse others of heresy and people whopurport to be waging Jihad It has created genes that gave rise to cells of Al-Qaeda and other terrorists

We must examine our breeding ground in which these young men were sownBy Allah what can possibly emerge from such an atmosphere Muftis who accuse others of

heresy sheiks who incite and young people who bomb Am I right or not[Complete clip is available here httpwwwmemritvorgclipen3099htm]

Legal Aspects amp Lawfare| back to top |

Revisiting A Stale Counterterrorism Law

Council on Foreign Relations | 1 September 2011

ldquoNearly a decade after 911 the United States still relies on the 2001 Authorization for the Use of Military Force (AUMF) for the killing and detention of those considered responsible for or associatedwith the terrorist attacks But CFR national security law expert John Bellinger says it is becomingincreasingly difficult for the Obama administration to justify some of its counterterrorism operationsunder this limited statutory authority It has been used in defense of actions including drone attacks onindividuals as well as the targeting of groups in Yemen and Somalia that may have only the mosttenuous affiliation or association to the 911 attack A revised AUMF should clarify those operations aswell as the issue of detention specifically which individuals can be detained for how long and subjectto what processes There also needs to be greater effort at the international level he adds to fill thegaps in the law that covers conflicts between states and non-state actorsrdquohelliprdquo[Complete article is available here httpwwwcfrorgcounterterrorismrevisiting-stale-

counterterrorism-lawp25742]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3442

Narco-Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector[Complete article is available here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Mexicos Cartels Move Into Extortion

At a construction site of an apartment building in the heart of the Mexican capital a company engineerruns through his weekly payroll sheet He has salaries written out for carpenters bricklayers andelectricians At the bottom of the sheet is a notation of $200 for ldquosecurity servicesrdquo next to a nicknameldquoEl Indiordquo mdash the Indian [Complete article is available here

httpwwwtucsonsentinelcomnationworldreport090611_mexico_cartels_bribesmexicos-cartels-move-into-extortion ]

Seven Die In Mexican Pacific Port City

Latin American Herald Tribune

Seven people died in separate shootings in Mazatlan a port city in the northwestern Mexican state of Sinaloa with some of the incidents drug-related a police spokesman told Efe [Complete article is available herehttpwwwlahtcomarticleaspCategoryId=14091ampArticleId=423061]

Tijuana Violence Slows As One Cartel Takes Control

BorderlandBeatcom

Mexicos famously seedy border city of Tijuana is enjoying a lull in drug murders as the countrys mostpowerful cartel gains the upper hand over its rivals [Complete article is available here httpwwwborderlandbeatcom201109tijuana-violence-slows-as-one-cartelhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3542

Network Notes| back to top |

Canadian data foreign threats Spying in the digital age (Suggested by a reader in Lithuania ndash thanks) Globe and Mail | By Colin Freeze 31 July 2010

A government spy agency thatrsquos prohibited from monitoring Canadian citizens is now usingldquoinformation about Canadiansrdquo to zero in on foreign threatsThe ambiguous statement found in a new government report detailing the activities of CommunicationsSecurity Establishment Canada could sanction a range of intelligence-gathering activities ndash includingthe controversial practice of mining ldquometadatardquo from digital communications

Metadata ndash often called data about data ndash are found in e-mails and their attachments and containdigital signatures that can reveal when where and by whom documents were created

The collection of metadata has caused controversy in other countries but never in Canada wherethe Communications Security Establishment Canada operates as an ultra-secretive agency About theonly thing that is known about the classified practices is that they were halted and resumed after someldquomajor changesrdquo including directives signed by Defence Minister Peter MacKay

ldquoI cannot comment on specific operational activitiesrdquo Adrian Simpson a CSEC spokesman toldThe Globe He stressed that reviews upheld that the activities in question were ldquocarried out inaccordance with the law ministerial requirements and CSECrsquos policies and proceduresrdquo

ldquoCSEC is prohibited from directing its activities at Canadians anyone in Canada or Canadiansanywhere in the worldrdquo he said

For decades signals-intelligence agencies in the West have been allowed to safeguard nationalsecurity by eavesdropping on foreignersrsquo conversations Spies can whatever phone lines and satellitesignals they can so long as they never listen in on fellow citizens

But in the digital age governments run increasingly sophisticated dragnets scooping up andscouring through millions of intercepted Internet conversations daily Such practices create legalambiguities

ldquoThe whole issue of what constitutes boundaries for signals-intelligence agencies in cyberspaceis a big debate right nowrdquo said Rafal Rohozinski a security expert affiliated with the University of Torontorsquos Munk School

A watchdog agency that reviews the CSECrsquos activities released an annual report to Parliament onJuly 20 ldquoWhen other means have been exhausted CSEC may use information about Canadians when it

has reasonable grounds to believe that using this information may assist in identifying and obtainingforeign intelligencerdquo it reads

Sometimes collecting metadata is relatively benign It can involve aggregating sets of data tospot trends much like the way meteorologists discern national forecasts from localized information

For example while CSEC canrsquot usually monitor the communications of specific Canadian terrorsuspects it can glean insights by zooming out for big-picture patterns One way to do that MrRohozinski said would be to look at data flows between Canadian cities and Yemen where an Internet-savvy al-Qaeda offshoot works to recruit Westerners

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3642

Metadata however can be more revealing Documents that circulate on the Internet travelaround like postmarked letters marked with return addresses ndash e-mails and attachments have embeddedcodes that speak to the who where and when behind their creation

The US National Security Agency found itself mired in controversy a few years go after itskirted domestic-spying bans by secretly upholding that this sort of American metadata was fair gamedistinct from communication contents

Therersquos little to suggest the CSEC would go that far The federal agencyrsquos activities are reviewedby a watchdog body now headed by a former Federal Court of Appeal judge Robert Deacutecary appointedlast year wrote in his annual report that he was satisfied the CSEC activities in question are lawful evenif his predecessors felt them borderline

ldquoThis was the first review of these activities since hellip their resumption under new policiesrdquo thewatchdogrsquos report says It concludes that the surveillance activities are ldquoin accordance with the lawrdquo andfollow ldquomajor changes to certain policies procedures and practicesrdquo

Much of the concern arises from the possibility that CSEC could hand over metadata intelligenceto domestic law-enforcement and security agencies

As it stands the RCMP and CSIS have to develop their domestic investigations before coming toCSEC ndash usually with warrants ndash if they want specific intelligence The rules guiding handovers are strictbecause even though all agencies run surveillance operations they do so under vastly different

mandates and legal standardsThe spy agency however stood by its practicesldquoCSEC is extremely diligent when it comes to the privacy of Canadiansrdquo Mr Simpson said

[complete article is available here httpwwwtheglobeandmailcomnewsnationalcanadian-data-foreign-threats-spying-in-the-digital-agearticle2113772 ]

Cyber Attacks Against NATO Then And Now

New Atlanticist | 6 September 2011

ldquoNow that NATOrsquos Operation UNIFIED PROTECTOR over Libya is winding down it is worth

noting how few cyber incidents were directed in protest against the Alliance Certainly there was a

cyber component to the liberation of Libya but it was more about content and Internet freedom (the

most newsworthy elements here were the role of social media and the Libyan government taking largeparts of the nation offline) But compared to past history NATO cyber defenders had a relatively easy

time

ldquoNATO has not however had an easy 2011 Although there were three significant incidents we

know about none seemed to have been in direct response to operations over Libyahelliprdquo

[Complete article is available here httpwwwacusorgnew_atlanticistcyber-attacks-against-nato-then-

and-now]

The Calm Before The Storm

Foreign Policy | By Joel Brenner 6 September 2011

Cyberwar is already happening -- and its about to get much much worse A veteran cyberwarriorexplains how America can prepare itself

Revelations of wholesale electronic fraud and massive data heists have become weekly evendaily affairs A multinational electronics corporation loses personal information on more than 100million customers Cyberthieves break into an international bank counterfeit credit balances and lootATMs in four countries grabbing $9 million in just a few hours International gangs spread maliciouscode that conscripts unwitting computers into zombie armies of hundreds of thousands of similarlyenslaved machines Criminals then rent these armies called botnets as easily as you can buy a time-sharing arrangement in a beach condo No wonder the vast majority of Internet traffic is spam

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3742

Yet the loss of personal information and related criminal fraud intolerable as they are are theleast threatening face of electronic insecurity The US militarys secret network is penetratedAmericans corporate pockets are being picked clean of the intellectual property that makes the UnitedStates tick And the electricity grid that keeps the lights on and makes everything move is dangerouslyinsecure

In one remote attack on the Pentagons information systems about 10 years ago the Chinesehauled away up to 20 terabytes of information If the information had been on paper theyd have neededa line of moving vans stretching from the Pentagon to freighters docked 50 miles away in Baltimoreharbor just to haul it away Had they done so the military district of Washington wouldve become anactive theater of operations for the first time since 1865 and the Navy wouldve blockaded theChesapeake Bay But the Chinese did it electronically so who noticed

Corporate espionage by both competitors and foreign intelligence services or their surrogates isalso increasing Intelligence officials see this but cant speak openly about the specifics and Im seeingit now in my law practice The victims rarely admit it for understandable reasons Oracle whichsuccessfully sued SAP for theft of its software code was a prominent exception Google was another

When the Chinese penetrated Google in late 2009 -- yes that operation was Chinese and yes itwas done with the blessing of a member of the Politburo -- they werent after customer informationThey were after the source code that makes Google unique Nor was Google the only victim Thousands

of US and Western firms were penetrated in that affair Foreign governments -- and not only theChinese -- understand that they cannot compete with the United States militarily and politically if theycannot compete with it economically so their intelligence services want to steal its corporate intellectualproperty This is the technology that gives America its competitive edge and often it has nothing to dowith defense Ordinary companies with valuable technology are now being targeted by nation-statesThis is a new era National security and economic security have converged

The danger is not limited to the loss of technology and information however The owners andoperators of the North American electricity grid are hooking up their control systems to the Internet asfast as they can Exposing the grid to the Internet makes it marginally more efficient but it also makes itdramatically more vulnerable to disruption If you can remotely penetrate an electronic system to stealinformation you can remotely penetrate it to shut it down or make it go haywire This is why there is no

longer a meaningful difference between information security and operational security And the biggestoperational risk is the grid In contemporary society nothing moves without electricity If the grid goesout the country stops

As the Stuxnet affair demonstrated remotely engineered disruption of industrial control systemsis now a reality That episode involved the successful electronic attack on the centrifuges in the Iraniannuclear program Only a first-class intelligence agency could have pulled that off but the blueprint fordoing it -- the code itself -- is now public Many American industrial control systems run on the samekind of equipment the Iranians were using but unlike the controls on the Iranian centrifuges thecontrols on the US grid are now being connected to the Internet making them easier to disrupt Stuxnetwas a watershed there will be copycats

Other industrial control systems will also be targets Some already are Air traffic control

railroad switches and water and sewage systems are all electronically controlled now and many arevulnerable If an intruder can break into the right server electronically he can remotely shut downproduction send your goods to the wrong destination and even unlock your doors -- and delete your logentries so he leaves no record of ever having been there

The United States does not lack enemies who would attack it this way Seized al Qaedacomputers contain details of US industrial control systems In 2003 a group affiliated with thePakistani terrorist organization Lashkar-e-Taiba -- the same gang that engineered the 2008 terroristassaults in Mumbai -- plotted to attack the Australian grid Other groups conspired to attack the Britishgrid in 2004 2006 and 2009 Yet the owners and operators of the North American grid continue willy-

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3842

nilly to expose their control systems to the Internet instead of isolating and hardening it This is folly of a high order

Important conclusions for public and corporate policy follow from this vulnerable state of

affairs First cyber insecurity has operational consequences In the current and foreseeable states of technology a high degree of assurance against electronic penetration of anything connected to theInternet is not achievable Large efficient electronically connected organizations and nations aretherefore vulnerable to remotely engineered disruption as well as information theft

Second this risk cannot be eliminated -- but it can be reduced and managed As a nation theUnited States should start by isolating the grids controls from the Internet Undoubtedly there aremarginal efficiencies to be gained by seamless connectivity over a publicly accessible infrastructure butthese gains are usually exaggerated and the risk this connectivity creates is staggering The governmentand the major telecommunications carriers must also make the investment required to re-create themassive redundancies that made the wired telephone network so robust Resilience and swift recoveryshould be the goal If the consequences of cyberattacks were reduced penetration would cease to matter

Third companies that wait for the government to solve their own security problems do so attheir peril The government is broke and the IT backbone is 85 percent private so the governmentdoesnt control it The governments role in altering the status quo will be limited to setting standardsusing its purchasing power to move vendors toward better security and getting its own house in order

The government can neither secure corporate intellectual property nor protect firms against operationaldisruption

Fourth in a world in which everything cannot be protected companies must determine forthemselves what intellectual property and physical assets to isolate and safeguard Those that approachthis task seriously will quickly learn that technology is only one aspect of their insecurity and in manycases the easiest to deal with Unless technology is integrated with personnel practices and operationalsecurity it opens vulnerabilities that its users rarely understand This kind of integration requires theautomated enforcement of reasonable security policies and systematic workforce training and thatoccurs only when management the lawyers and the technologists work closely together This is an old-fashioned management challenge -- not a technological one For their part corporate boards need to takeIT security seriously and launch audits that examine how their systems are actually implemented and

used not merely how they are designed Because as the techies like to put it the weakest link in anysystem is not the silicon-based unit on the desk its the carbon-based unit in the chair Joel Brenner is author of the forthcoming America the Vulnerable Inside the New Threat Matrix of

Digital Espionage Crime and Warfare He has served as the inspector general of the National Security

Agency the national counterintelligence executive and the NSAs senior counsel He now practices law

at Cooley LLP in Washington DC

Cyberattacks Decline Slightly Symantec Report Finds

Dark Reading | 1 September 2011

Organizations worldwide are suffering damages as a result of cyberattacks but interestingly there hasbeen a slight decline in these attacks during the past 12 months according to a new report from

Symantec More than 90 percent of the more than 3300 respondents across 36 countries said theyexperienced tangible losses as a result of a hack with 84 percent reporting financial loss to the cost of abreach Around one-fifth lost at least $195000 in breaches during the past 12 months

Meanwhile Symantec attributes the unexpected bright spot of a decline in breaches toorganizations employing better cybersecurity defenses More than 70 percent of organizations sawattacks in the past 12 months a decline of 5 percent from 2010 And those that experienced anincreasing frequency of attacks dropped from 29 percent in 2010 to 21 percent this year While 100percent last year reported losses from cyberattacks 92 percent did so in 2011 The trend seemscounterintuitive given the rash of high-profile breaches this year More

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 28: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2842

culture still lives There is now a move afoot to shrink new classified facilities so that agents dont haveto waste time away from their cases to read intelligence documents thereStrategically defeating Al Qaeda sounds too good to be true Because it is Amy Zegart is a senior fellow at Stanfords Hoover Institution and the author of Eyes on Spies

Congress and the United States Intelligence Community

US Counterterror Chief Al-Qaida On Steady Slide

Bostoncom | 31 August 2011

White House counterterrorism chief John Brennan said al-Qaida is on a steady slide after the death of al-Qaidas latest second-in-command in Pakistan Brennan told The Associated Press on Wednesdaythat its a huge blow in the first official White House comment since Atiyah Abd al-Rahmans reportedkilling by CIA drone strike in Pakistans tribal areas last week

Al-Qaida is sort of on the ropes and taking a lot of shots to the body and the head Brennansaid This is a time not to step back and let them recover a message he says hes sending to hiscounterparts in Pakistan[Article continues herehttpwwwbostoncomnewsnationwashingtonarticles20110831us_counterterror_chief_al_qaida_on_steady_slide ]

Al-Qaeda (AKA Al-Qaida Al-Qarsquoida)

Council on Foreign Relations | 29 August 2011

ldquoAl-Qaeda an international terrorist network is considered the top terrorist threat to the United StatesThe group is wanted for its September 11 2001 attacks on the World Trade Center and the Pentagon aswell as a host of lesser attacks To escape the post-911 US-led war in Afghanistan al-Qaedas centralleadership fled eastward into Pakistan securing a safe haven in loosely governed areas there In July2007 US intelligence agencies found that the organization was regrouping and regaining strength inthese tribal areas along the border with Afghanistan though targeted killings of senior al-Qaeda leadershave since diminished the groups command and control capabilities In February 2009 Director of National Intelligence Dennis C Blair told lawmakers that the groups core is less capable and effective

than it was a year ago The killing of al-Qaedas top leader Osama bin Laden by US forces in Pakistanin May 2011 served a significant blow to the organization but analysts say al-Qaeda remains deadlywith its networks spread all over the world Plus a number of affiliated groups have gained prominencein recent years complicating the task of containing the organizationrdquo

[Article continues here httpwwwcfrorgterrorist-organizationsal-qaeda-k-al-qaida-al-qaidap9126]

Al Qaeda In The Islamic Maghreb

CSIS | 1 September 2011

ldquoAl Qaeda in the Islamic Maghreb (AQIM) emerged from a decades-long militant Islamist tradition inAlgeria In 1998 the Salafist Group for Preaching and Combat (Groupe Salafiste pour la Preacutedication etle Combat or GSPC) broke away from the Armed Islamic Group (GIA) because of the GIArsquos extensive

targeting of civilians Gradually the GSPC evolved to encompass global jihadist ideology in addition toits historical focus on overturning the Algerian state In 2006 the GSPC officially affiliated with alQaeda core soon rebranding itself as al Qaeda in the Islamic Maghreb In the following years AQIMwas able to conduct a small number of large-scale attacks most notably its 2007 bombing of the UNheadquarters in Algiers In recent years counterterrorism pressure and weak governance have combinedto shift the center of AQIMrsquos presence to the Sahara-Sahel region AQIM continues to make its presenceknown through smuggling operations kidnappings and clashes with security forces in the desert In thecoming years general instability within the region could allow AQIM to further expand its influencerdquo[Complete article is available here httpcsisorgfilespublication110901_Thornberry_AQIM_WEBpdf ]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2942

AQ Strategy

The Assynt Report | 11 August 2011

Executive Summary Al-Qaedarsquos broad objectives remain unchanged in the wake of bin Ladenrsquos death There

are nonetheless growing questions over al-Qaedarsquos capability Longstanding paranoiaover the use of electronic communications is heightened by the ongoing US dronecampaign whilst attacks against the West have generally been disrupted at an early stage

The Pakistani Talibanrsquos attack on a Karachi naval base in May 2011 was a significantmilitary success and the first major act of revenge for bin Ladenrsquos killing Furtherattempts to avenge his loss are certain

All parts of al-Qaeda are working within a cohesive framework with the ultimate aim of restoring the Islamic Caliphate (Khilafa) The strategic plan to support this aim wasdrafted by 40 of al-Qaedarsquos brightest thinkers in Kandahar Afghanistan in November1999 This plan consists of four phases each seven years long leading to the dissolutionof corrupt regimes and the union of all newly-liberated states within the Khilafa

Apart from mounting strategic operations al-Qaedarsquos role is to be the inspiration for atruly global jihadist movement It seeks to achieve this through provision of trainingbeing a role model for others to follow extending acceptance and adoption of its tactics

particularly suicide bombings and professionalising jihadist media to build a commonbrand and message between hitherto separate groups

Between the late 1990s and 2003 the organisation was primarily devoted to classicinternational terrorism Most effort is now spent fighting insurgencies from North Africato South Asia The way in which this strategy helps to spread the struggle has been seenin North-West Africa where the initial development of al-Qaeda in the Islamic Maghrebwas in part fed by men returning from fighting with al-Qaeda in Iraq

Since mid-2009 al-Qaeda and its affiliates have increasingly encouraged jihadist-sympathisers resident in Western countries to engage in violence themselves withoutcentral direction or training making surveillance more difficult

One of the keys to awakening the spirit of jihad was the success in portraying the US and

its allies as Crusaders in the Muslim world Al-Qaedarsquos strategy essentially requires thatthis process be kept running until the forces of jihad have grown large enough to launchsuccessful liberation operations

Despite its successes in Afghanistan al-Qaedarsquos credibility has suffered both from its failure to landanother strategic blow on the West on the scale of 911 and also excessive Muslim casualties in someoperations Similarly al-Qaeda in Iraq was set back by its excessive sectarian zeal and local resentmentat the foreign fighter presence In turn this affected the movementrsquos funding from the Gulf

Analysis Sub-Saharan African Leaders Media Focus On Threats Prior to 911

OSC Feature | Sub-Sahara Africa -- OSC Analysis 6 September 2011Statements by Sub-Saharan African leaders and African media reports on terrorism prior to the 10thanniversary of 911 focus on the growing threats from local extremists and Al-Qaida affiliatesparticularly in West Africa with little direct commentary on the anniversary or US counterterrorismpolicies This focus on domestic threats suggests that counterterrorism messages expressing solidaritywith African nations and acknowledging the evolving terrorist threat on the continent would have thegreatest resonance with African audiences

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3042

Leaders Stressing Determination To Counter Local Threats African leaders public statements reflect an ongoing concern about the threat of terrorism on thecontinent and a strong commitment to find ways to combat this threat

Nigerian President Goodluck Jonathan emphasized the governments commitment tovigorously combat terrorism following the 26 August bombing of the UN office inAbuja by Nigerian extremist group Boko Haram reported the Paris-based news agencyAFP President Jonathan is hosting Liberian President Ellen Johnson Sirleaf and otherforeign dignitaries for a three-day forum on terrorism and economic crimes the widelyread Lagos-based independent daily The Guardian reported on 4 September

Malian President Amadou Toumani Toure launched a Special Program for PeaceSecurity and Development on 9 August stating that development remained the mostviable solution to counter threats to the countrys stability reported Malis state-owneddaily LEssor[ 3] The program aimed to undermine support for Al-Qaida in the IslamicMaghreb (AQIM) according to Burkinabe web portal Lefasonet on 11 August

Somali Prime Minister Abdiweli Muhammad Gas stated on 23 August that theTransitional Federal Government planned to remove Al-Shabaab from the central andsouthern regions in Somalia with the goal of restoring peace within one year so the

country can hold national elections according to the Puntland-based Garowe Online

Experts Media Highlight New Capabilities Tactics

African experts and media outlets are warning about the evolving nature of terrorist organizations on thecontinent the terrorists pursuit of new targets and tactics and their potential for taking advantage of regional instability

Leading South African think tank the Institute for Security Studies stated on 29 Augustthat Boko Harams attack on the UN in Abuja completes Boko Harams metamorphosisinto an international terrorist group Since December 2010 Boko Haram had killed over600 people in over 70 attacks against Nigerian targets according to the think tank buthad not previously targeted Western or international interests

A 26 August article on the popular Malian web portal Maliweb voiced concern thatAQIM could benefit from Tuareg mercenaries many of whom were recently returningfrom fighting in Libya and could benefit from an increase in arms trafficking through theSahel during the Libyan conflict

Ugandas privately owned Daily Monitor reported on 19 August that AU forces inSomalia warned that Al-Shabaab planned to increase the number of kidnappings andbomb attacks as part of its new strategy to shift from controlling territory in Mogadishuto conducting more of an insurgent campaign

Concern Over Al-Qaida Presence Terrorist Collaboration

West African official statements and media reports reflect a growing concern over an increased Al-

Qaida presence in West Africa and collaboration with AQIM Al-Shabaab and Boko Haram

Nigerian security services reported that the suspected mastermind behind the 26 Augustbombing of the UN office in Abuja was a Boko Haram member with close links to Al-Qaida and Al-Shabaab according Nigerias privately owned Daily Sun

A 28 August report in the privately owned daily Nigerian Tribune claimed that the 26August bombing in Abuja was part of Al-Qaidas plans to mark the 10th anniversary of 911 and called Boko Haram Al-Qaidas ally in the region

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3142

An 8 August commentary in Burkina Fasos LObservateur Paalga said that reports of Boko Haram collaboration with Al-Shabaab and AQIM could indicate that Al-Qaida isextending its African tentacles Abdourahmane Dieng security division chief of theEconomic Community of West African States said the collaboration represented a veryserious threat according to Senegals progovernment Le Soleil on 5 August

Messages Likely To Resonate With African Audience

Sub-Saharan Africas increasing concern about the shifting nature and potential strengthening of theterrorist threat on the continent suggests that messages directly addressing the impact of terrorism onAfricans the increasingly complex nature of the threat and the need for multilateral cooperation againstterrorism are most likely to resonate with Africans

Messages expressing solidarity and sympathy for Africans affected by Boko Haram Al-Shabaab and AQIM would almost certainly resonate with a broad African audience

African political and military leaders would probably welcome acknowledgement of thecomplex and changing nature of terrorism on the continent and recognition of theirinitiatives and commitment to countering violent extremism

African leaders and medias concern about potential collaboration between Boko Haram

Al-Shabaab and AQIM suggest that they would be open to improving multilateral andcross-regional sharing of lessons learned and strategies to counter the intensification of terrorism within Africa

Aviation and Maritime Security| back to top |

Bomb Threats Force Jets To Land

Associated Press | 7 September 2011

Both landed safely one landed in Ankara Ataturk International Airport and the other at Kuala LumpurTwo flights operated by Pakistans state-owned airline received bombs threats on Wednesday

and both landed safely one in Turkey the other in Malaysia officials said No bombs were found The

first flight was headed for Manchester England when it was notified of the threat near the Bulgariancapital of Sofia The crew contacted the control tower in Istanbul to seek permission for the landingstate-run Anatolia news agency reported Authorities quickly evacuated all 378 passengers from theBoeing 777-300ER aircraft after it parked at a remote corner of the International Ataturk Airport andbomb squads began searching the plane with sniffer dogs Anatolia reported PIA spokesman MashoodTajwar confirmed the flight received a threat and landed All passengers were safe A police searchturned up no bomb officials said Later a second PIA flight from Islamabad to Kuala Lumpur alsoreceived a bomb threat It landed in Kuala Lumpur and all the passengers disembarked safely saidTajwar The UK-bound Pakistan International Airlines plane was forced to make an emergency landingat Ataturk Airport in Istanbul after receiving a bomb threat Malaysias airports authority said thepassengers were being screened and the plane was isolated in a parking area while being searched bypolice No bomb was found

It said the plane carried 164 passengers and 13 crew Azmi Murad senior general manager forthe authority said the Pakistani airline informed it that the warning came by email Mr Tajwar gave nodetails on the nature of the threat or how it was delivered Pakistan is home to al Qaedas top leadershipMilitants who trained there have been responsible for many of the attacks and failed plots in the USand Europe since Sept 11 2001 when planes hijacked by al Qaeda militants destroyed the World TradeCenter in New York and crashed into the Pentagon The bomb threats came four days before the 10thanniversary of 911 but there was no apparent link to Islamist militants who typically do not alertauthorities in advance The FBI and Homeland Security department issued warnings last weekend aboutal Qaeda threats to small airlines

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3242

Commentary amp Opinion| back to top |

From Terror Group Founder To Libyan Rebel Military Commander

ABCNews | 29August 2011

The same man who triumphantly led Libyan rebels into Gadhafis compound last week first came to theattention of the US intelligence community years ago - as a founder of a terror group

Abdelhakim Belhaj who was recently appointed to Tripolis rebel military council was one of the original founders of the Libyan Islamic Fighting Group an anti-Gadhafi group which was laterdesignated by the US State Department as a terrorist organization with links to al Qaeda according toUS government reports

We proudly announce the liberation of Libya and that Libya has become free and that the ruleof the tyrant and the era of oppression is behind us a victorious Belhaj told reporters after the stormingof Gadhafis Bab al-Aziziya compound last week Ousting Gadhafi had been the main objective of theLIFG since its inception in the early 1990s even if some of the fighters believed that meant puttingAmericans in the crossfire

The group carried out operations against the Libyan government including at least four suspectedassassination attempts against Gadhafi in the 1990s and was also believed to be connected to a series of suicide bombings in Casablanca Morocco in 2003 the US State Department reported As relationsbetween the US and Gadhafi improved in the mid-2000s some LIFG leaders cultivated relationshipswith top al Qaeda leaders including Osama bin Laden and were suspected of funneling fighters to Iraq tocarry out operations against US soldiers

When the LIFG was designated a terror organization in 2004 it was meant as a gesture of solidarity with the Libyan government according to a March 2011 congressional report

Contrary to several US government reports Libyan rebel ambassador to the US Ali Aujalitold ABC News that the LIFG was never connected to al Qaeda and did not carry out terrorist operations

They were only opposed to Gadhafi during his rule and paid the price for that by beingoppressed by the regime Aujali said

The CIA first publicly voiced its concerns about the connection between the LIFG and al Qaedain 2004 when then-director George Tenet testified before the Senate Select Committee on Intelligenceand listed the LIFG among groups that represented an immediate threat [that] has benefited from alQaeda links[Article continues here httpabcnewsgocomBlotterterror-group-founder-libyan-rebel-military-commanderstoryid=14405319]

Interview With Saudi Sheik Wajdi Al-Ghazawi

MemriTVcom

Sheik Wajdi al-Ghazawi owner of al-Fajr TV criticizes extremist atmosphere in Saudi Arabia and saysafter 911 They Handed Out Sweets on the Streets of Mecca

Following are excerpts from a statement by Saudi Sheik Wajdi Al-Ghazawi owner of Al-FajrTV which was posted on YouTube on August 4 2011

Wajdi Al-Ghazawi When Al-Qaeda and Osama Bin Laden were at the height of their mightthey were extremely popular in Saudi Arabia From mosque pulpits across Saudi Arabia preacherswould pray for their success Moreover from the pulpits of the most important mosques ndash the Al-HaramMosque in Mecca and the Nabawi Mosque in Al-Madina ndash direct prayers for the success of Al-Qaedawere made during the days of the bombing of Tora Bora Oh Allah help our brothers in AfghanistanThese supplications were made during evening prayers as well as Friday prayers The preachers wouldpray for them in violation of the ministrys instructions

When the twin towers in New York were attacked they handed out sweets on the streets of Mecca By Allah they did I witnessed this myself The young people bowed in prayer and hugged one

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3342

another out of joy People were in heaven because of these young men who destroyed America andbombed this idol Am I right or not Was it like that or not

Back then when the Taliban broke off a piece of the nose of the Buddha statue which was hewnin the mountain an entire sermon was dedicated to it in the mosque in Mecca and the preacher was laterreprimanded for this sermon The entire Saudi people supported and loved Al-Qaeda

This went on until our brothers in Al-Qaeda ndash and I dont know what was going through theirminds ndash began to carry out operations inside Saudi Arabia Thats when we all raised our hands andsaid Youve gone too far We wont support you in this

The atmosphere here in Saudi Arabia is one of extremism It is characterized by focusing onminor details Many things are forbidden Yes maybe they are indeed forbidden but by forcing peopleto avoid them and by acting as if these were major sins an atmosphere was created that gave rise toextremist youth who might act recklessly at the most trivial provocation

For instance we blew out of proportion the issue of music the issue of smoking or the issue of hanging pictures in public places True there are clear texts on these issues but the young peopleembraced these issues as if they were fighting usury fornication or alcohol No these are not among theseven major sins So our society has become extreme

This extremist atmosphere has given rise to people who accuse others of heresy and people whopurport to be waging Jihad It has created genes that gave rise to cells of Al-Qaeda and other terrorists

We must examine our breeding ground in which these young men were sownBy Allah what can possibly emerge from such an atmosphere Muftis who accuse others of

heresy sheiks who incite and young people who bomb Am I right or not[Complete clip is available here httpwwwmemritvorgclipen3099htm]

Legal Aspects amp Lawfare| back to top |

Revisiting A Stale Counterterrorism Law

Council on Foreign Relations | 1 September 2011

ldquoNearly a decade after 911 the United States still relies on the 2001 Authorization for the Use of Military Force (AUMF) for the killing and detention of those considered responsible for or associatedwith the terrorist attacks But CFR national security law expert John Bellinger says it is becomingincreasingly difficult for the Obama administration to justify some of its counterterrorism operationsunder this limited statutory authority It has been used in defense of actions including drone attacks onindividuals as well as the targeting of groups in Yemen and Somalia that may have only the mosttenuous affiliation or association to the 911 attack A revised AUMF should clarify those operations aswell as the issue of detention specifically which individuals can be detained for how long and subjectto what processes There also needs to be greater effort at the international level he adds to fill thegaps in the law that covers conflicts between states and non-state actorsrdquohelliprdquo[Complete article is available here httpwwwcfrorgcounterterrorismrevisiting-stale-

counterterrorism-lawp25742]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3442

Narco-Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector[Complete article is available here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Mexicos Cartels Move Into Extortion

At a construction site of an apartment building in the heart of the Mexican capital a company engineerruns through his weekly payroll sheet He has salaries written out for carpenters bricklayers andelectricians At the bottom of the sheet is a notation of $200 for ldquosecurity servicesrdquo next to a nicknameldquoEl Indiordquo mdash the Indian [Complete article is available here

httpwwwtucsonsentinelcomnationworldreport090611_mexico_cartels_bribesmexicos-cartels-move-into-extortion ]

Seven Die In Mexican Pacific Port City

Latin American Herald Tribune

Seven people died in separate shootings in Mazatlan a port city in the northwestern Mexican state of Sinaloa with some of the incidents drug-related a police spokesman told Efe [Complete article is available herehttpwwwlahtcomarticleaspCategoryId=14091ampArticleId=423061]

Tijuana Violence Slows As One Cartel Takes Control

BorderlandBeatcom

Mexicos famously seedy border city of Tijuana is enjoying a lull in drug murders as the countrys mostpowerful cartel gains the upper hand over its rivals [Complete article is available here httpwwwborderlandbeatcom201109tijuana-violence-slows-as-one-cartelhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3542

Network Notes| back to top |

Canadian data foreign threats Spying in the digital age (Suggested by a reader in Lithuania ndash thanks) Globe and Mail | By Colin Freeze 31 July 2010

A government spy agency thatrsquos prohibited from monitoring Canadian citizens is now usingldquoinformation about Canadiansrdquo to zero in on foreign threatsThe ambiguous statement found in a new government report detailing the activities of CommunicationsSecurity Establishment Canada could sanction a range of intelligence-gathering activities ndash includingthe controversial practice of mining ldquometadatardquo from digital communications

Metadata ndash often called data about data ndash are found in e-mails and their attachments and containdigital signatures that can reveal when where and by whom documents were created

The collection of metadata has caused controversy in other countries but never in Canada wherethe Communications Security Establishment Canada operates as an ultra-secretive agency About theonly thing that is known about the classified practices is that they were halted and resumed after someldquomajor changesrdquo including directives signed by Defence Minister Peter MacKay

ldquoI cannot comment on specific operational activitiesrdquo Adrian Simpson a CSEC spokesman toldThe Globe He stressed that reviews upheld that the activities in question were ldquocarried out inaccordance with the law ministerial requirements and CSECrsquos policies and proceduresrdquo

ldquoCSEC is prohibited from directing its activities at Canadians anyone in Canada or Canadiansanywhere in the worldrdquo he said

For decades signals-intelligence agencies in the West have been allowed to safeguard nationalsecurity by eavesdropping on foreignersrsquo conversations Spies can whatever phone lines and satellitesignals they can so long as they never listen in on fellow citizens

But in the digital age governments run increasingly sophisticated dragnets scooping up andscouring through millions of intercepted Internet conversations daily Such practices create legalambiguities

ldquoThe whole issue of what constitutes boundaries for signals-intelligence agencies in cyberspaceis a big debate right nowrdquo said Rafal Rohozinski a security expert affiliated with the University of Torontorsquos Munk School

A watchdog agency that reviews the CSECrsquos activities released an annual report to Parliament onJuly 20 ldquoWhen other means have been exhausted CSEC may use information about Canadians when it

has reasonable grounds to believe that using this information may assist in identifying and obtainingforeign intelligencerdquo it reads

Sometimes collecting metadata is relatively benign It can involve aggregating sets of data tospot trends much like the way meteorologists discern national forecasts from localized information

For example while CSEC canrsquot usually monitor the communications of specific Canadian terrorsuspects it can glean insights by zooming out for big-picture patterns One way to do that MrRohozinski said would be to look at data flows between Canadian cities and Yemen where an Internet-savvy al-Qaeda offshoot works to recruit Westerners

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3642

Metadata however can be more revealing Documents that circulate on the Internet travelaround like postmarked letters marked with return addresses ndash e-mails and attachments have embeddedcodes that speak to the who where and when behind their creation

The US National Security Agency found itself mired in controversy a few years go after itskirted domestic-spying bans by secretly upholding that this sort of American metadata was fair gamedistinct from communication contents

Therersquos little to suggest the CSEC would go that far The federal agencyrsquos activities are reviewedby a watchdog body now headed by a former Federal Court of Appeal judge Robert Deacutecary appointedlast year wrote in his annual report that he was satisfied the CSEC activities in question are lawful evenif his predecessors felt them borderline

ldquoThis was the first review of these activities since hellip their resumption under new policiesrdquo thewatchdogrsquos report says It concludes that the surveillance activities are ldquoin accordance with the lawrdquo andfollow ldquomajor changes to certain policies procedures and practicesrdquo

Much of the concern arises from the possibility that CSEC could hand over metadata intelligenceto domestic law-enforcement and security agencies

As it stands the RCMP and CSIS have to develop their domestic investigations before coming toCSEC ndash usually with warrants ndash if they want specific intelligence The rules guiding handovers are strictbecause even though all agencies run surveillance operations they do so under vastly different

mandates and legal standardsThe spy agency however stood by its practicesldquoCSEC is extremely diligent when it comes to the privacy of Canadiansrdquo Mr Simpson said

[complete article is available here httpwwwtheglobeandmailcomnewsnationalcanadian-data-foreign-threats-spying-in-the-digital-agearticle2113772 ]

Cyber Attacks Against NATO Then And Now

New Atlanticist | 6 September 2011

ldquoNow that NATOrsquos Operation UNIFIED PROTECTOR over Libya is winding down it is worth

noting how few cyber incidents were directed in protest against the Alliance Certainly there was a

cyber component to the liberation of Libya but it was more about content and Internet freedom (the

most newsworthy elements here were the role of social media and the Libyan government taking largeparts of the nation offline) But compared to past history NATO cyber defenders had a relatively easy

time

ldquoNATO has not however had an easy 2011 Although there were three significant incidents we

know about none seemed to have been in direct response to operations over Libyahelliprdquo

[Complete article is available here httpwwwacusorgnew_atlanticistcyber-attacks-against-nato-then-

and-now]

The Calm Before The Storm

Foreign Policy | By Joel Brenner 6 September 2011

Cyberwar is already happening -- and its about to get much much worse A veteran cyberwarriorexplains how America can prepare itself

Revelations of wholesale electronic fraud and massive data heists have become weekly evendaily affairs A multinational electronics corporation loses personal information on more than 100million customers Cyberthieves break into an international bank counterfeit credit balances and lootATMs in four countries grabbing $9 million in just a few hours International gangs spread maliciouscode that conscripts unwitting computers into zombie armies of hundreds of thousands of similarlyenslaved machines Criminals then rent these armies called botnets as easily as you can buy a time-sharing arrangement in a beach condo No wonder the vast majority of Internet traffic is spam

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3742

Yet the loss of personal information and related criminal fraud intolerable as they are are theleast threatening face of electronic insecurity The US militarys secret network is penetratedAmericans corporate pockets are being picked clean of the intellectual property that makes the UnitedStates tick And the electricity grid that keeps the lights on and makes everything move is dangerouslyinsecure

In one remote attack on the Pentagons information systems about 10 years ago the Chinesehauled away up to 20 terabytes of information If the information had been on paper theyd have neededa line of moving vans stretching from the Pentagon to freighters docked 50 miles away in Baltimoreharbor just to haul it away Had they done so the military district of Washington wouldve become anactive theater of operations for the first time since 1865 and the Navy wouldve blockaded theChesapeake Bay But the Chinese did it electronically so who noticed

Corporate espionage by both competitors and foreign intelligence services or their surrogates isalso increasing Intelligence officials see this but cant speak openly about the specifics and Im seeingit now in my law practice The victims rarely admit it for understandable reasons Oracle whichsuccessfully sued SAP for theft of its software code was a prominent exception Google was another

When the Chinese penetrated Google in late 2009 -- yes that operation was Chinese and yes itwas done with the blessing of a member of the Politburo -- they werent after customer informationThey were after the source code that makes Google unique Nor was Google the only victim Thousands

of US and Western firms were penetrated in that affair Foreign governments -- and not only theChinese -- understand that they cannot compete with the United States militarily and politically if theycannot compete with it economically so their intelligence services want to steal its corporate intellectualproperty This is the technology that gives America its competitive edge and often it has nothing to dowith defense Ordinary companies with valuable technology are now being targeted by nation-statesThis is a new era National security and economic security have converged

The danger is not limited to the loss of technology and information however The owners andoperators of the North American electricity grid are hooking up their control systems to the Internet asfast as they can Exposing the grid to the Internet makes it marginally more efficient but it also makes itdramatically more vulnerable to disruption If you can remotely penetrate an electronic system to stealinformation you can remotely penetrate it to shut it down or make it go haywire This is why there is no

longer a meaningful difference between information security and operational security And the biggestoperational risk is the grid In contemporary society nothing moves without electricity If the grid goesout the country stops

As the Stuxnet affair demonstrated remotely engineered disruption of industrial control systemsis now a reality That episode involved the successful electronic attack on the centrifuges in the Iraniannuclear program Only a first-class intelligence agency could have pulled that off but the blueprint fordoing it -- the code itself -- is now public Many American industrial control systems run on the samekind of equipment the Iranians were using but unlike the controls on the Iranian centrifuges thecontrols on the US grid are now being connected to the Internet making them easier to disrupt Stuxnetwas a watershed there will be copycats

Other industrial control systems will also be targets Some already are Air traffic control

railroad switches and water and sewage systems are all electronically controlled now and many arevulnerable If an intruder can break into the right server electronically he can remotely shut downproduction send your goods to the wrong destination and even unlock your doors -- and delete your logentries so he leaves no record of ever having been there

The United States does not lack enemies who would attack it this way Seized al Qaedacomputers contain details of US industrial control systems In 2003 a group affiliated with thePakistani terrorist organization Lashkar-e-Taiba -- the same gang that engineered the 2008 terroristassaults in Mumbai -- plotted to attack the Australian grid Other groups conspired to attack the Britishgrid in 2004 2006 and 2009 Yet the owners and operators of the North American grid continue willy-

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3842

nilly to expose their control systems to the Internet instead of isolating and hardening it This is folly of a high order

Important conclusions for public and corporate policy follow from this vulnerable state of

affairs First cyber insecurity has operational consequences In the current and foreseeable states of technology a high degree of assurance against electronic penetration of anything connected to theInternet is not achievable Large efficient electronically connected organizations and nations aretherefore vulnerable to remotely engineered disruption as well as information theft

Second this risk cannot be eliminated -- but it can be reduced and managed As a nation theUnited States should start by isolating the grids controls from the Internet Undoubtedly there aremarginal efficiencies to be gained by seamless connectivity over a publicly accessible infrastructure butthese gains are usually exaggerated and the risk this connectivity creates is staggering The governmentand the major telecommunications carriers must also make the investment required to re-create themassive redundancies that made the wired telephone network so robust Resilience and swift recoveryshould be the goal If the consequences of cyberattacks were reduced penetration would cease to matter

Third companies that wait for the government to solve their own security problems do so attheir peril The government is broke and the IT backbone is 85 percent private so the governmentdoesnt control it The governments role in altering the status quo will be limited to setting standardsusing its purchasing power to move vendors toward better security and getting its own house in order

The government can neither secure corporate intellectual property nor protect firms against operationaldisruption

Fourth in a world in which everything cannot be protected companies must determine forthemselves what intellectual property and physical assets to isolate and safeguard Those that approachthis task seriously will quickly learn that technology is only one aspect of their insecurity and in manycases the easiest to deal with Unless technology is integrated with personnel practices and operationalsecurity it opens vulnerabilities that its users rarely understand This kind of integration requires theautomated enforcement of reasonable security policies and systematic workforce training and thatoccurs only when management the lawyers and the technologists work closely together This is an old-fashioned management challenge -- not a technological one For their part corporate boards need to takeIT security seriously and launch audits that examine how their systems are actually implemented and

used not merely how they are designed Because as the techies like to put it the weakest link in anysystem is not the silicon-based unit on the desk its the carbon-based unit in the chair Joel Brenner is author of the forthcoming America the Vulnerable Inside the New Threat Matrix of

Digital Espionage Crime and Warfare He has served as the inspector general of the National Security

Agency the national counterintelligence executive and the NSAs senior counsel He now practices law

at Cooley LLP in Washington DC

Cyberattacks Decline Slightly Symantec Report Finds

Dark Reading | 1 September 2011

Organizations worldwide are suffering damages as a result of cyberattacks but interestingly there hasbeen a slight decline in these attacks during the past 12 months according to a new report from

Symantec More than 90 percent of the more than 3300 respondents across 36 countries said theyexperienced tangible losses as a result of a hack with 84 percent reporting financial loss to the cost of abreach Around one-fifth lost at least $195000 in breaches during the past 12 months

Meanwhile Symantec attributes the unexpected bright spot of a decline in breaches toorganizations employing better cybersecurity defenses More than 70 percent of organizations sawattacks in the past 12 months a decline of 5 percent from 2010 And those that experienced anincreasing frequency of attacks dropped from 29 percent in 2010 to 21 percent this year While 100percent last year reported losses from cyberattacks 92 percent did so in 2011 The trend seemscounterintuitive given the rash of high-profile breaches this year More

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 29: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 2942

AQ Strategy

The Assynt Report | 11 August 2011

Executive Summary Al-Qaedarsquos broad objectives remain unchanged in the wake of bin Ladenrsquos death There

are nonetheless growing questions over al-Qaedarsquos capability Longstanding paranoiaover the use of electronic communications is heightened by the ongoing US dronecampaign whilst attacks against the West have generally been disrupted at an early stage

The Pakistani Talibanrsquos attack on a Karachi naval base in May 2011 was a significantmilitary success and the first major act of revenge for bin Ladenrsquos killing Furtherattempts to avenge his loss are certain

All parts of al-Qaeda are working within a cohesive framework with the ultimate aim of restoring the Islamic Caliphate (Khilafa) The strategic plan to support this aim wasdrafted by 40 of al-Qaedarsquos brightest thinkers in Kandahar Afghanistan in November1999 This plan consists of four phases each seven years long leading to the dissolutionof corrupt regimes and the union of all newly-liberated states within the Khilafa

Apart from mounting strategic operations al-Qaedarsquos role is to be the inspiration for atruly global jihadist movement It seeks to achieve this through provision of trainingbeing a role model for others to follow extending acceptance and adoption of its tactics

particularly suicide bombings and professionalising jihadist media to build a commonbrand and message between hitherto separate groups

Between the late 1990s and 2003 the organisation was primarily devoted to classicinternational terrorism Most effort is now spent fighting insurgencies from North Africato South Asia The way in which this strategy helps to spread the struggle has been seenin North-West Africa where the initial development of al-Qaeda in the Islamic Maghrebwas in part fed by men returning from fighting with al-Qaeda in Iraq

Since mid-2009 al-Qaeda and its affiliates have increasingly encouraged jihadist-sympathisers resident in Western countries to engage in violence themselves withoutcentral direction or training making surveillance more difficult

One of the keys to awakening the spirit of jihad was the success in portraying the US and

its allies as Crusaders in the Muslim world Al-Qaedarsquos strategy essentially requires thatthis process be kept running until the forces of jihad have grown large enough to launchsuccessful liberation operations

Despite its successes in Afghanistan al-Qaedarsquos credibility has suffered both from its failure to landanother strategic blow on the West on the scale of 911 and also excessive Muslim casualties in someoperations Similarly al-Qaeda in Iraq was set back by its excessive sectarian zeal and local resentmentat the foreign fighter presence In turn this affected the movementrsquos funding from the Gulf

Analysis Sub-Saharan African Leaders Media Focus On Threats Prior to 911

OSC Feature | Sub-Sahara Africa -- OSC Analysis 6 September 2011Statements by Sub-Saharan African leaders and African media reports on terrorism prior to the 10thanniversary of 911 focus on the growing threats from local extremists and Al-Qaida affiliatesparticularly in West Africa with little direct commentary on the anniversary or US counterterrorismpolicies This focus on domestic threats suggests that counterterrorism messages expressing solidaritywith African nations and acknowledging the evolving terrorist threat on the continent would have thegreatest resonance with African audiences

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3042

Leaders Stressing Determination To Counter Local Threats African leaders public statements reflect an ongoing concern about the threat of terrorism on thecontinent and a strong commitment to find ways to combat this threat

Nigerian President Goodluck Jonathan emphasized the governments commitment tovigorously combat terrorism following the 26 August bombing of the UN office inAbuja by Nigerian extremist group Boko Haram reported the Paris-based news agencyAFP President Jonathan is hosting Liberian President Ellen Johnson Sirleaf and otherforeign dignitaries for a three-day forum on terrorism and economic crimes the widelyread Lagos-based independent daily The Guardian reported on 4 September

Malian President Amadou Toumani Toure launched a Special Program for PeaceSecurity and Development on 9 August stating that development remained the mostviable solution to counter threats to the countrys stability reported Malis state-owneddaily LEssor[ 3] The program aimed to undermine support for Al-Qaida in the IslamicMaghreb (AQIM) according to Burkinabe web portal Lefasonet on 11 August

Somali Prime Minister Abdiweli Muhammad Gas stated on 23 August that theTransitional Federal Government planned to remove Al-Shabaab from the central andsouthern regions in Somalia with the goal of restoring peace within one year so the

country can hold national elections according to the Puntland-based Garowe Online

Experts Media Highlight New Capabilities Tactics

African experts and media outlets are warning about the evolving nature of terrorist organizations on thecontinent the terrorists pursuit of new targets and tactics and their potential for taking advantage of regional instability

Leading South African think tank the Institute for Security Studies stated on 29 Augustthat Boko Harams attack on the UN in Abuja completes Boko Harams metamorphosisinto an international terrorist group Since December 2010 Boko Haram had killed over600 people in over 70 attacks against Nigerian targets according to the think tank buthad not previously targeted Western or international interests

A 26 August article on the popular Malian web portal Maliweb voiced concern thatAQIM could benefit from Tuareg mercenaries many of whom were recently returningfrom fighting in Libya and could benefit from an increase in arms trafficking through theSahel during the Libyan conflict

Ugandas privately owned Daily Monitor reported on 19 August that AU forces inSomalia warned that Al-Shabaab planned to increase the number of kidnappings andbomb attacks as part of its new strategy to shift from controlling territory in Mogadishuto conducting more of an insurgent campaign

Concern Over Al-Qaida Presence Terrorist Collaboration

West African official statements and media reports reflect a growing concern over an increased Al-

Qaida presence in West Africa and collaboration with AQIM Al-Shabaab and Boko Haram

Nigerian security services reported that the suspected mastermind behind the 26 Augustbombing of the UN office in Abuja was a Boko Haram member with close links to Al-Qaida and Al-Shabaab according Nigerias privately owned Daily Sun

A 28 August report in the privately owned daily Nigerian Tribune claimed that the 26August bombing in Abuja was part of Al-Qaidas plans to mark the 10th anniversary of 911 and called Boko Haram Al-Qaidas ally in the region

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3142

An 8 August commentary in Burkina Fasos LObservateur Paalga said that reports of Boko Haram collaboration with Al-Shabaab and AQIM could indicate that Al-Qaida isextending its African tentacles Abdourahmane Dieng security division chief of theEconomic Community of West African States said the collaboration represented a veryserious threat according to Senegals progovernment Le Soleil on 5 August

Messages Likely To Resonate With African Audience

Sub-Saharan Africas increasing concern about the shifting nature and potential strengthening of theterrorist threat on the continent suggests that messages directly addressing the impact of terrorism onAfricans the increasingly complex nature of the threat and the need for multilateral cooperation againstterrorism are most likely to resonate with Africans

Messages expressing solidarity and sympathy for Africans affected by Boko Haram Al-Shabaab and AQIM would almost certainly resonate with a broad African audience

African political and military leaders would probably welcome acknowledgement of thecomplex and changing nature of terrorism on the continent and recognition of theirinitiatives and commitment to countering violent extremism

African leaders and medias concern about potential collaboration between Boko Haram

Al-Shabaab and AQIM suggest that they would be open to improving multilateral andcross-regional sharing of lessons learned and strategies to counter the intensification of terrorism within Africa

Aviation and Maritime Security| back to top |

Bomb Threats Force Jets To Land

Associated Press | 7 September 2011

Both landed safely one landed in Ankara Ataturk International Airport and the other at Kuala LumpurTwo flights operated by Pakistans state-owned airline received bombs threats on Wednesday

and both landed safely one in Turkey the other in Malaysia officials said No bombs were found The

first flight was headed for Manchester England when it was notified of the threat near the Bulgariancapital of Sofia The crew contacted the control tower in Istanbul to seek permission for the landingstate-run Anatolia news agency reported Authorities quickly evacuated all 378 passengers from theBoeing 777-300ER aircraft after it parked at a remote corner of the International Ataturk Airport andbomb squads began searching the plane with sniffer dogs Anatolia reported PIA spokesman MashoodTajwar confirmed the flight received a threat and landed All passengers were safe A police searchturned up no bomb officials said Later a second PIA flight from Islamabad to Kuala Lumpur alsoreceived a bomb threat It landed in Kuala Lumpur and all the passengers disembarked safely saidTajwar The UK-bound Pakistan International Airlines plane was forced to make an emergency landingat Ataturk Airport in Istanbul after receiving a bomb threat Malaysias airports authority said thepassengers were being screened and the plane was isolated in a parking area while being searched bypolice No bomb was found

It said the plane carried 164 passengers and 13 crew Azmi Murad senior general manager forthe authority said the Pakistani airline informed it that the warning came by email Mr Tajwar gave nodetails on the nature of the threat or how it was delivered Pakistan is home to al Qaedas top leadershipMilitants who trained there have been responsible for many of the attacks and failed plots in the USand Europe since Sept 11 2001 when planes hijacked by al Qaeda militants destroyed the World TradeCenter in New York and crashed into the Pentagon The bomb threats came four days before the 10thanniversary of 911 but there was no apparent link to Islamist militants who typically do not alertauthorities in advance The FBI and Homeland Security department issued warnings last weekend aboutal Qaeda threats to small airlines

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3242

Commentary amp Opinion| back to top |

From Terror Group Founder To Libyan Rebel Military Commander

ABCNews | 29August 2011

The same man who triumphantly led Libyan rebels into Gadhafis compound last week first came to theattention of the US intelligence community years ago - as a founder of a terror group

Abdelhakim Belhaj who was recently appointed to Tripolis rebel military council was one of the original founders of the Libyan Islamic Fighting Group an anti-Gadhafi group which was laterdesignated by the US State Department as a terrorist organization with links to al Qaeda according toUS government reports

We proudly announce the liberation of Libya and that Libya has become free and that the ruleof the tyrant and the era of oppression is behind us a victorious Belhaj told reporters after the stormingof Gadhafis Bab al-Aziziya compound last week Ousting Gadhafi had been the main objective of theLIFG since its inception in the early 1990s even if some of the fighters believed that meant puttingAmericans in the crossfire

The group carried out operations against the Libyan government including at least four suspectedassassination attempts against Gadhafi in the 1990s and was also believed to be connected to a series of suicide bombings in Casablanca Morocco in 2003 the US State Department reported As relationsbetween the US and Gadhafi improved in the mid-2000s some LIFG leaders cultivated relationshipswith top al Qaeda leaders including Osama bin Laden and were suspected of funneling fighters to Iraq tocarry out operations against US soldiers

When the LIFG was designated a terror organization in 2004 it was meant as a gesture of solidarity with the Libyan government according to a March 2011 congressional report

Contrary to several US government reports Libyan rebel ambassador to the US Ali Aujalitold ABC News that the LIFG was never connected to al Qaeda and did not carry out terrorist operations

They were only opposed to Gadhafi during his rule and paid the price for that by beingoppressed by the regime Aujali said

The CIA first publicly voiced its concerns about the connection between the LIFG and al Qaedain 2004 when then-director George Tenet testified before the Senate Select Committee on Intelligenceand listed the LIFG among groups that represented an immediate threat [that] has benefited from alQaeda links[Article continues here httpabcnewsgocomBlotterterror-group-founder-libyan-rebel-military-commanderstoryid=14405319]

Interview With Saudi Sheik Wajdi Al-Ghazawi

MemriTVcom

Sheik Wajdi al-Ghazawi owner of al-Fajr TV criticizes extremist atmosphere in Saudi Arabia and saysafter 911 They Handed Out Sweets on the Streets of Mecca

Following are excerpts from a statement by Saudi Sheik Wajdi Al-Ghazawi owner of Al-FajrTV which was posted on YouTube on August 4 2011

Wajdi Al-Ghazawi When Al-Qaeda and Osama Bin Laden were at the height of their mightthey were extremely popular in Saudi Arabia From mosque pulpits across Saudi Arabia preacherswould pray for their success Moreover from the pulpits of the most important mosques ndash the Al-HaramMosque in Mecca and the Nabawi Mosque in Al-Madina ndash direct prayers for the success of Al-Qaedawere made during the days of the bombing of Tora Bora Oh Allah help our brothers in AfghanistanThese supplications were made during evening prayers as well as Friday prayers The preachers wouldpray for them in violation of the ministrys instructions

When the twin towers in New York were attacked they handed out sweets on the streets of Mecca By Allah they did I witnessed this myself The young people bowed in prayer and hugged one

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3342

another out of joy People were in heaven because of these young men who destroyed America andbombed this idol Am I right or not Was it like that or not

Back then when the Taliban broke off a piece of the nose of the Buddha statue which was hewnin the mountain an entire sermon was dedicated to it in the mosque in Mecca and the preacher was laterreprimanded for this sermon The entire Saudi people supported and loved Al-Qaeda

This went on until our brothers in Al-Qaeda ndash and I dont know what was going through theirminds ndash began to carry out operations inside Saudi Arabia Thats when we all raised our hands andsaid Youve gone too far We wont support you in this

The atmosphere here in Saudi Arabia is one of extremism It is characterized by focusing onminor details Many things are forbidden Yes maybe they are indeed forbidden but by forcing peopleto avoid them and by acting as if these were major sins an atmosphere was created that gave rise toextremist youth who might act recklessly at the most trivial provocation

For instance we blew out of proportion the issue of music the issue of smoking or the issue of hanging pictures in public places True there are clear texts on these issues but the young peopleembraced these issues as if they were fighting usury fornication or alcohol No these are not among theseven major sins So our society has become extreme

This extremist atmosphere has given rise to people who accuse others of heresy and people whopurport to be waging Jihad It has created genes that gave rise to cells of Al-Qaeda and other terrorists

We must examine our breeding ground in which these young men were sownBy Allah what can possibly emerge from such an atmosphere Muftis who accuse others of

heresy sheiks who incite and young people who bomb Am I right or not[Complete clip is available here httpwwwmemritvorgclipen3099htm]

Legal Aspects amp Lawfare| back to top |

Revisiting A Stale Counterterrorism Law

Council on Foreign Relations | 1 September 2011

ldquoNearly a decade after 911 the United States still relies on the 2001 Authorization for the Use of Military Force (AUMF) for the killing and detention of those considered responsible for or associatedwith the terrorist attacks But CFR national security law expert John Bellinger says it is becomingincreasingly difficult for the Obama administration to justify some of its counterterrorism operationsunder this limited statutory authority It has been used in defense of actions including drone attacks onindividuals as well as the targeting of groups in Yemen and Somalia that may have only the mosttenuous affiliation or association to the 911 attack A revised AUMF should clarify those operations aswell as the issue of detention specifically which individuals can be detained for how long and subjectto what processes There also needs to be greater effort at the international level he adds to fill thegaps in the law that covers conflicts between states and non-state actorsrdquohelliprdquo[Complete article is available here httpwwwcfrorgcounterterrorismrevisiting-stale-

counterterrorism-lawp25742]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3442

Narco-Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector[Complete article is available here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Mexicos Cartels Move Into Extortion

At a construction site of an apartment building in the heart of the Mexican capital a company engineerruns through his weekly payroll sheet He has salaries written out for carpenters bricklayers andelectricians At the bottom of the sheet is a notation of $200 for ldquosecurity servicesrdquo next to a nicknameldquoEl Indiordquo mdash the Indian [Complete article is available here

httpwwwtucsonsentinelcomnationworldreport090611_mexico_cartels_bribesmexicos-cartels-move-into-extortion ]

Seven Die In Mexican Pacific Port City

Latin American Herald Tribune

Seven people died in separate shootings in Mazatlan a port city in the northwestern Mexican state of Sinaloa with some of the incidents drug-related a police spokesman told Efe [Complete article is available herehttpwwwlahtcomarticleaspCategoryId=14091ampArticleId=423061]

Tijuana Violence Slows As One Cartel Takes Control

BorderlandBeatcom

Mexicos famously seedy border city of Tijuana is enjoying a lull in drug murders as the countrys mostpowerful cartel gains the upper hand over its rivals [Complete article is available here httpwwwborderlandbeatcom201109tijuana-violence-slows-as-one-cartelhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3542

Network Notes| back to top |

Canadian data foreign threats Spying in the digital age (Suggested by a reader in Lithuania ndash thanks) Globe and Mail | By Colin Freeze 31 July 2010

A government spy agency thatrsquos prohibited from monitoring Canadian citizens is now usingldquoinformation about Canadiansrdquo to zero in on foreign threatsThe ambiguous statement found in a new government report detailing the activities of CommunicationsSecurity Establishment Canada could sanction a range of intelligence-gathering activities ndash includingthe controversial practice of mining ldquometadatardquo from digital communications

Metadata ndash often called data about data ndash are found in e-mails and their attachments and containdigital signatures that can reveal when where and by whom documents were created

The collection of metadata has caused controversy in other countries but never in Canada wherethe Communications Security Establishment Canada operates as an ultra-secretive agency About theonly thing that is known about the classified practices is that they were halted and resumed after someldquomajor changesrdquo including directives signed by Defence Minister Peter MacKay

ldquoI cannot comment on specific operational activitiesrdquo Adrian Simpson a CSEC spokesman toldThe Globe He stressed that reviews upheld that the activities in question were ldquocarried out inaccordance with the law ministerial requirements and CSECrsquos policies and proceduresrdquo

ldquoCSEC is prohibited from directing its activities at Canadians anyone in Canada or Canadiansanywhere in the worldrdquo he said

For decades signals-intelligence agencies in the West have been allowed to safeguard nationalsecurity by eavesdropping on foreignersrsquo conversations Spies can whatever phone lines and satellitesignals they can so long as they never listen in on fellow citizens

But in the digital age governments run increasingly sophisticated dragnets scooping up andscouring through millions of intercepted Internet conversations daily Such practices create legalambiguities

ldquoThe whole issue of what constitutes boundaries for signals-intelligence agencies in cyberspaceis a big debate right nowrdquo said Rafal Rohozinski a security expert affiliated with the University of Torontorsquos Munk School

A watchdog agency that reviews the CSECrsquos activities released an annual report to Parliament onJuly 20 ldquoWhen other means have been exhausted CSEC may use information about Canadians when it

has reasonable grounds to believe that using this information may assist in identifying and obtainingforeign intelligencerdquo it reads

Sometimes collecting metadata is relatively benign It can involve aggregating sets of data tospot trends much like the way meteorologists discern national forecasts from localized information

For example while CSEC canrsquot usually monitor the communications of specific Canadian terrorsuspects it can glean insights by zooming out for big-picture patterns One way to do that MrRohozinski said would be to look at data flows between Canadian cities and Yemen where an Internet-savvy al-Qaeda offshoot works to recruit Westerners

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3642

Metadata however can be more revealing Documents that circulate on the Internet travelaround like postmarked letters marked with return addresses ndash e-mails and attachments have embeddedcodes that speak to the who where and when behind their creation

The US National Security Agency found itself mired in controversy a few years go after itskirted domestic-spying bans by secretly upholding that this sort of American metadata was fair gamedistinct from communication contents

Therersquos little to suggest the CSEC would go that far The federal agencyrsquos activities are reviewedby a watchdog body now headed by a former Federal Court of Appeal judge Robert Deacutecary appointedlast year wrote in his annual report that he was satisfied the CSEC activities in question are lawful evenif his predecessors felt them borderline

ldquoThis was the first review of these activities since hellip their resumption under new policiesrdquo thewatchdogrsquos report says It concludes that the surveillance activities are ldquoin accordance with the lawrdquo andfollow ldquomajor changes to certain policies procedures and practicesrdquo

Much of the concern arises from the possibility that CSEC could hand over metadata intelligenceto domestic law-enforcement and security agencies

As it stands the RCMP and CSIS have to develop their domestic investigations before coming toCSEC ndash usually with warrants ndash if they want specific intelligence The rules guiding handovers are strictbecause even though all agencies run surveillance operations they do so under vastly different

mandates and legal standardsThe spy agency however stood by its practicesldquoCSEC is extremely diligent when it comes to the privacy of Canadiansrdquo Mr Simpson said

[complete article is available here httpwwwtheglobeandmailcomnewsnationalcanadian-data-foreign-threats-spying-in-the-digital-agearticle2113772 ]

Cyber Attacks Against NATO Then And Now

New Atlanticist | 6 September 2011

ldquoNow that NATOrsquos Operation UNIFIED PROTECTOR over Libya is winding down it is worth

noting how few cyber incidents were directed in protest against the Alliance Certainly there was a

cyber component to the liberation of Libya but it was more about content and Internet freedom (the

most newsworthy elements here were the role of social media and the Libyan government taking largeparts of the nation offline) But compared to past history NATO cyber defenders had a relatively easy

time

ldquoNATO has not however had an easy 2011 Although there were three significant incidents we

know about none seemed to have been in direct response to operations over Libyahelliprdquo

[Complete article is available here httpwwwacusorgnew_atlanticistcyber-attacks-against-nato-then-

and-now]

The Calm Before The Storm

Foreign Policy | By Joel Brenner 6 September 2011

Cyberwar is already happening -- and its about to get much much worse A veteran cyberwarriorexplains how America can prepare itself

Revelations of wholesale electronic fraud and massive data heists have become weekly evendaily affairs A multinational electronics corporation loses personal information on more than 100million customers Cyberthieves break into an international bank counterfeit credit balances and lootATMs in four countries grabbing $9 million in just a few hours International gangs spread maliciouscode that conscripts unwitting computers into zombie armies of hundreds of thousands of similarlyenslaved machines Criminals then rent these armies called botnets as easily as you can buy a time-sharing arrangement in a beach condo No wonder the vast majority of Internet traffic is spam

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3742

Yet the loss of personal information and related criminal fraud intolerable as they are are theleast threatening face of electronic insecurity The US militarys secret network is penetratedAmericans corporate pockets are being picked clean of the intellectual property that makes the UnitedStates tick And the electricity grid that keeps the lights on and makes everything move is dangerouslyinsecure

In one remote attack on the Pentagons information systems about 10 years ago the Chinesehauled away up to 20 terabytes of information If the information had been on paper theyd have neededa line of moving vans stretching from the Pentagon to freighters docked 50 miles away in Baltimoreharbor just to haul it away Had they done so the military district of Washington wouldve become anactive theater of operations for the first time since 1865 and the Navy wouldve blockaded theChesapeake Bay But the Chinese did it electronically so who noticed

Corporate espionage by both competitors and foreign intelligence services or their surrogates isalso increasing Intelligence officials see this but cant speak openly about the specifics and Im seeingit now in my law practice The victims rarely admit it for understandable reasons Oracle whichsuccessfully sued SAP for theft of its software code was a prominent exception Google was another

When the Chinese penetrated Google in late 2009 -- yes that operation was Chinese and yes itwas done with the blessing of a member of the Politburo -- they werent after customer informationThey were after the source code that makes Google unique Nor was Google the only victim Thousands

of US and Western firms were penetrated in that affair Foreign governments -- and not only theChinese -- understand that they cannot compete with the United States militarily and politically if theycannot compete with it economically so their intelligence services want to steal its corporate intellectualproperty This is the technology that gives America its competitive edge and often it has nothing to dowith defense Ordinary companies with valuable technology are now being targeted by nation-statesThis is a new era National security and economic security have converged

The danger is not limited to the loss of technology and information however The owners andoperators of the North American electricity grid are hooking up their control systems to the Internet asfast as they can Exposing the grid to the Internet makes it marginally more efficient but it also makes itdramatically more vulnerable to disruption If you can remotely penetrate an electronic system to stealinformation you can remotely penetrate it to shut it down or make it go haywire This is why there is no

longer a meaningful difference between information security and operational security And the biggestoperational risk is the grid In contemporary society nothing moves without electricity If the grid goesout the country stops

As the Stuxnet affair demonstrated remotely engineered disruption of industrial control systemsis now a reality That episode involved the successful electronic attack on the centrifuges in the Iraniannuclear program Only a first-class intelligence agency could have pulled that off but the blueprint fordoing it -- the code itself -- is now public Many American industrial control systems run on the samekind of equipment the Iranians were using but unlike the controls on the Iranian centrifuges thecontrols on the US grid are now being connected to the Internet making them easier to disrupt Stuxnetwas a watershed there will be copycats

Other industrial control systems will also be targets Some already are Air traffic control

railroad switches and water and sewage systems are all electronically controlled now and many arevulnerable If an intruder can break into the right server electronically he can remotely shut downproduction send your goods to the wrong destination and even unlock your doors -- and delete your logentries so he leaves no record of ever having been there

The United States does not lack enemies who would attack it this way Seized al Qaedacomputers contain details of US industrial control systems In 2003 a group affiliated with thePakistani terrorist organization Lashkar-e-Taiba -- the same gang that engineered the 2008 terroristassaults in Mumbai -- plotted to attack the Australian grid Other groups conspired to attack the Britishgrid in 2004 2006 and 2009 Yet the owners and operators of the North American grid continue willy-

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3842

nilly to expose their control systems to the Internet instead of isolating and hardening it This is folly of a high order

Important conclusions for public and corporate policy follow from this vulnerable state of

affairs First cyber insecurity has operational consequences In the current and foreseeable states of technology a high degree of assurance against electronic penetration of anything connected to theInternet is not achievable Large efficient electronically connected organizations and nations aretherefore vulnerable to remotely engineered disruption as well as information theft

Second this risk cannot be eliminated -- but it can be reduced and managed As a nation theUnited States should start by isolating the grids controls from the Internet Undoubtedly there aremarginal efficiencies to be gained by seamless connectivity over a publicly accessible infrastructure butthese gains are usually exaggerated and the risk this connectivity creates is staggering The governmentand the major telecommunications carriers must also make the investment required to re-create themassive redundancies that made the wired telephone network so robust Resilience and swift recoveryshould be the goal If the consequences of cyberattacks were reduced penetration would cease to matter

Third companies that wait for the government to solve their own security problems do so attheir peril The government is broke and the IT backbone is 85 percent private so the governmentdoesnt control it The governments role in altering the status quo will be limited to setting standardsusing its purchasing power to move vendors toward better security and getting its own house in order

The government can neither secure corporate intellectual property nor protect firms against operationaldisruption

Fourth in a world in which everything cannot be protected companies must determine forthemselves what intellectual property and physical assets to isolate and safeguard Those that approachthis task seriously will quickly learn that technology is only one aspect of their insecurity and in manycases the easiest to deal with Unless technology is integrated with personnel practices and operationalsecurity it opens vulnerabilities that its users rarely understand This kind of integration requires theautomated enforcement of reasonable security policies and systematic workforce training and thatoccurs only when management the lawyers and the technologists work closely together This is an old-fashioned management challenge -- not a technological one For their part corporate boards need to takeIT security seriously and launch audits that examine how their systems are actually implemented and

used not merely how they are designed Because as the techies like to put it the weakest link in anysystem is not the silicon-based unit on the desk its the carbon-based unit in the chair Joel Brenner is author of the forthcoming America the Vulnerable Inside the New Threat Matrix of

Digital Espionage Crime and Warfare He has served as the inspector general of the National Security

Agency the national counterintelligence executive and the NSAs senior counsel He now practices law

at Cooley LLP in Washington DC

Cyberattacks Decline Slightly Symantec Report Finds

Dark Reading | 1 September 2011

Organizations worldwide are suffering damages as a result of cyberattacks but interestingly there hasbeen a slight decline in these attacks during the past 12 months according to a new report from

Symantec More than 90 percent of the more than 3300 respondents across 36 countries said theyexperienced tangible losses as a result of a hack with 84 percent reporting financial loss to the cost of abreach Around one-fifth lost at least $195000 in breaches during the past 12 months

Meanwhile Symantec attributes the unexpected bright spot of a decline in breaches toorganizations employing better cybersecurity defenses More than 70 percent of organizations sawattacks in the past 12 months a decline of 5 percent from 2010 And those that experienced anincreasing frequency of attacks dropped from 29 percent in 2010 to 21 percent this year While 100percent last year reported losses from cyberattacks 92 percent did so in 2011 The trend seemscounterintuitive given the rash of high-profile breaches this year More

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 30: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3042

Leaders Stressing Determination To Counter Local Threats African leaders public statements reflect an ongoing concern about the threat of terrorism on thecontinent and a strong commitment to find ways to combat this threat

Nigerian President Goodluck Jonathan emphasized the governments commitment tovigorously combat terrorism following the 26 August bombing of the UN office inAbuja by Nigerian extremist group Boko Haram reported the Paris-based news agencyAFP President Jonathan is hosting Liberian President Ellen Johnson Sirleaf and otherforeign dignitaries for a three-day forum on terrorism and economic crimes the widelyread Lagos-based independent daily The Guardian reported on 4 September

Malian President Amadou Toumani Toure launched a Special Program for PeaceSecurity and Development on 9 August stating that development remained the mostviable solution to counter threats to the countrys stability reported Malis state-owneddaily LEssor[ 3] The program aimed to undermine support for Al-Qaida in the IslamicMaghreb (AQIM) according to Burkinabe web portal Lefasonet on 11 August

Somali Prime Minister Abdiweli Muhammad Gas stated on 23 August that theTransitional Federal Government planned to remove Al-Shabaab from the central andsouthern regions in Somalia with the goal of restoring peace within one year so the

country can hold national elections according to the Puntland-based Garowe Online

Experts Media Highlight New Capabilities Tactics

African experts and media outlets are warning about the evolving nature of terrorist organizations on thecontinent the terrorists pursuit of new targets and tactics and their potential for taking advantage of regional instability

Leading South African think tank the Institute for Security Studies stated on 29 Augustthat Boko Harams attack on the UN in Abuja completes Boko Harams metamorphosisinto an international terrorist group Since December 2010 Boko Haram had killed over600 people in over 70 attacks against Nigerian targets according to the think tank buthad not previously targeted Western or international interests

A 26 August article on the popular Malian web portal Maliweb voiced concern thatAQIM could benefit from Tuareg mercenaries many of whom were recently returningfrom fighting in Libya and could benefit from an increase in arms trafficking through theSahel during the Libyan conflict

Ugandas privately owned Daily Monitor reported on 19 August that AU forces inSomalia warned that Al-Shabaab planned to increase the number of kidnappings andbomb attacks as part of its new strategy to shift from controlling territory in Mogadishuto conducting more of an insurgent campaign

Concern Over Al-Qaida Presence Terrorist Collaboration

West African official statements and media reports reflect a growing concern over an increased Al-

Qaida presence in West Africa and collaboration with AQIM Al-Shabaab and Boko Haram

Nigerian security services reported that the suspected mastermind behind the 26 Augustbombing of the UN office in Abuja was a Boko Haram member with close links to Al-Qaida and Al-Shabaab according Nigerias privately owned Daily Sun

A 28 August report in the privately owned daily Nigerian Tribune claimed that the 26August bombing in Abuja was part of Al-Qaidas plans to mark the 10th anniversary of 911 and called Boko Haram Al-Qaidas ally in the region

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3142

An 8 August commentary in Burkina Fasos LObservateur Paalga said that reports of Boko Haram collaboration with Al-Shabaab and AQIM could indicate that Al-Qaida isextending its African tentacles Abdourahmane Dieng security division chief of theEconomic Community of West African States said the collaboration represented a veryserious threat according to Senegals progovernment Le Soleil on 5 August

Messages Likely To Resonate With African Audience

Sub-Saharan Africas increasing concern about the shifting nature and potential strengthening of theterrorist threat on the continent suggests that messages directly addressing the impact of terrorism onAfricans the increasingly complex nature of the threat and the need for multilateral cooperation againstterrorism are most likely to resonate with Africans

Messages expressing solidarity and sympathy for Africans affected by Boko Haram Al-Shabaab and AQIM would almost certainly resonate with a broad African audience

African political and military leaders would probably welcome acknowledgement of thecomplex and changing nature of terrorism on the continent and recognition of theirinitiatives and commitment to countering violent extremism

African leaders and medias concern about potential collaboration between Boko Haram

Al-Shabaab and AQIM suggest that they would be open to improving multilateral andcross-regional sharing of lessons learned and strategies to counter the intensification of terrorism within Africa

Aviation and Maritime Security| back to top |

Bomb Threats Force Jets To Land

Associated Press | 7 September 2011

Both landed safely one landed in Ankara Ataturk International Airport and the other at Kuala LumpurTwo flights operated by Pakistans state-owned airline received bombs threats on Wednesday

and both landed safely one in Turkey the other in Malaysia officials said No bombs were found The

first flight was headed for Manchester England when it was notified of the threat near the Bulgariancapital of Sofia The crew contacted the control tower in Istanbul to seek permission for the landingstate-run Anatolia news agency reported Authorities quickly evacuated all 378 passengers from theBoeing 777-300ER aircraft after it parked at a remote corner of the International Ataturk Airport andbomb squads began searching the plane with sniffer dogs Anatolia reported PIA spokesman MashoodTajwar confirmed the flight received a threat and landed All passengers were safe A police searchturned up no bomb officials said Later a second PIA flight from Islamabad to Kuala Lumpur alsoreceived a bomb threat It landed in Kuala Lumpur and all the passengers disembarked safely saidTajwar The UK-bound Pakistan International Airlines plane was forced to make an emergency landingat Ataturk Airport in Istanbul after receiving a bomb threat Malaysias airports authority said thepassengers were being screened and the plane was isolated in a parking area while being searched bypolice No bomb was found

It said the plane carried 164 passengers and 13 crew Azmi Murad senior general manager forthe authority said the Pakistani airline informed it that the warning came by email Mr Tajwar gave nodetails on the nature of the threat or how it was delivered Pakistan is home to al Qaedas top leadershipMilitants who trained there have been responsible for many of the attacks and failed plots in the USand Europe since Sept 11 2001 when planes hijacked by al Qaeda militants destroyed the World TradeCenter in New York and crashed into the Pentagon The bomb threats came four days before the 10thanniversary of 911 but there was no apparent link to Islamist militants who typically do not alertauthorities in advance The FBI and Homeland Security department issued warnings last weekend aboutal Qaeda threats to small airlines

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3242

Commentary amp Opinion| back to top |

From Terror Group Founder To Libyan Rebel Military Commander

ABCNews | 29August 2011

The same man who triumphantly led Libyan rebels into Gadhafis compound last week first came to theattention of the US intelligence community years ago - as a founder of a terror group

Abdelhakim Belhaj who was recently appointed to Tripolis rebel military council was one of the original founders of the Libyan Islamic Fighting Group an anti-Gadhafi group which was laterdesignated by the US State Department as a terrorist organization with links to al Qaeda according toUS government reports

We proudly announce the liberation of Libya and that Libya has become free and that the ruleof the tyrant and the era of oppression is behind us a victorious Belhaj told reporters after the stormingof Gadhafis Bab al-Aziziya compound last week Ousting Gadhafi had been the main objective of theLIFG since its inception in the early 1990s even if some of the fighters believed that meant puttingAmericans in the crossfire

The group carried out operations against the Libyan government including at least four suspectedassassination attempts against Gadhafi in the 1990s and was also believed to be connected to a series of suicide bombings in Casablanca Morocco in 2003 the US State Department reported As relationsbetween the US and Gadhafi improved in the mid-2000s some LIFG leaders cultivated relationshipswith top al Qaeda leaders including Osama bin Laden and were suspected of funneling fighters to Iraq tocarry out operations against US soldiers

When the LIFG was designated a terror organization in 2004 it was meant as a gesture of solidarity with the Libyan government according to a March 2011 congressional report

Contrary to several US government reports Libyan rebel ambassador to the US Ali Aujalitold ABC News that the LIFG was never connected to al Qaeda and did not carry out terrorist operations

They were only opposed to Gadhafi during his rule and paid the price for that by beingoppressed by the regime Aujali said

The CIA first publicly voiced its concerns about the connection between the LIFG and al Qaedain 2004 when then-director George Tenet testified before the Senate Select Committee on Intelligenceand listed the LIFG among groups that represented an immediate threat [that] has benefited from alQaeda links[Article continues here httpabcnewsgocomBlotterterror-group-founder-libyan-rebel-military-commanderstoryid=14405319]

Interview With Saudi Sheik Wajdi Al-Ghazawi

MemriTVcom

Sheik Wajdi al-Ghazawi owner of al-Fajr TV criticizes extremist atmosphere in Saudi Arabia and saysafter 911 They Handed Out Sweets on the Streets of Mecca

Following are excerpts from a statement by Saudi Sheik Wajdi Al-Ghazawi owner of Al-FajrTV which was posted on YouTube on August 4 2011

Wajdi Al-Ghazawi When Al-Qaeda and Osama Bin Laden were at the height of their mightthey were extremely popular in Saudi Arabia From mosque pulpits across Saudi Arabia preacherswould pray for their success Moreover from the pulpits of the most important mosques ndash the Al-HaramMosque in Mecca and the Nabawi Mosque in Al-Madina ndash direct prayers for the success of Al-Qaedawere made during the days of the bombing of Tora Bora Oh Allah help our brothers in AfghanistanThese supplications were made during evening prayers as well as Friday prayers The preachers wouldpray for them in violation of the ministrys instructions

When the twin towers in New York were attacked they handed out sweets on the streets of Mecca By Allah they did I witnessed this myself The young people bowed in prayer and hugged one

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3342

another out of joy People were in heaven because of these young men who destroyed America andbombed this idol Am I right or not Was it like that or not

Back then when the Taliban broke off a piece of the nose of the Buddha statue which was hewnin the mountain an entire sermon was dedicated to it in the mosque in Mecca and the preacher was laterreprimanded for this sermon The entire Saudi people supported and loved Al-Qaeda

This went on until our brothers in Al-Qaeda ndash and I dont know what was going through theirminds ndash began to carry out operations inside Saudi Arabia Thats when we all raised our hands andsaid Youve gone too far We wont support you in this

The atmosphere here in Saudi Arabia is one of extremism It is characterized by focusing onminor details Many things are forbidden Yes maybe they are indeed forbidden but by forcing peopleto avoid them and by acting as if these were major sins an atmosphere was created that gave rise toextremist youth who might act recklessly at the most trivial provocation

For instance we blew out of proportion the issue of music the issue of smoking or the issue of hanging pictures in public places True there are clear texts on these issues but the young peopleembraced these issues as if they were fighting usury fornication or alcohol No these are not among theseven major sins So our society has become extreme

This extremist atmosphere has given rise to people who accuse others of heresy and people whopurport to be waging Jihad It has created genes that gave rise to cells of Al-Qaeda and other terrorists

We must examine our breeding ground in which these young men were sownBy Allah what can possibly emerge from such an atmosphere Muftis who accuse others of

heresy sheiks who incite and young people who bomb Am I right or not[Complete clip is available here httpwwwmemritvorgclipen3099htm]

Legal Aspects amp Lawfare| back to top |

Revisiting A Stale Counterterrorism Law

Council on Foreign Relations | 1 September 2011

ldquoNearly a decade after 911 the United States still relies on the 2001 Authorization for the Use of Military Force (AUMF) for the killing and detention of those considered responsible for or associatedwith the terrorist attacks But CFR national security law expert John Bellinger says it is becomingincreasingly difficult for the Obama administration to justify some of its counterterrorism operationsunder this limited statutory authority It has been used in defense of actions including drone attacks onindividuals as well as the targeting of groups in Yemen and Somalia that may have only the mosttenuous affiliation or association to the 911 attack A revised AUMF should clarify those operations aswell as the issue of detention specifically which individuals can be detained for how long and subjectto what processes There also needs to be greater effort at the international level he adds to fill thegaps in the law that covers conflicts between states and non-state actorsrdquohelliprdquo[Complete article is available here httpwwwcfrorgcounterterrorismrevisiting-stale-

counterterrorism-lawp25742]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3442

Narco-Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector[Complete article is available here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Mexicos Cartels Move Into Extortion

At a construction site of an apartment building in the heart of the Mexican capital a company engineerruns through his weekly payroll sheet He has salaries written out for carpenters bricklayers andelectricians At the bottom of the sheet is a notation of $200 for ldquosecurity servicesrdquo next to a nicknameldquoEl Indiordquo mdash the Indian [Complete article is available here

httpwwwtucsonsentinelcomnationworldreport090611_mexico_cartels_bribesmexicos-cartels-move-into-extortion ]

Seven Die In Mexican Pacific Port City

Latin American Herald Tribune

Seven people died in separate shootings in Mazatlan a port city in the northwestern Mexican state of Sinaloa with some of the incidents drug-related a police spokesman told Efe [Complete article is available herehttpwwwlahtcomarticleaspCategoryId=14091ampArticleId=423061]

Tijuana Violence Slows As One Cartel Takes Control

BorderlandBeatcom

Mexicos famously seedy border city of Tijuana is enjoying a lull in drug murders as the countrys mostpowerful cartel gains the upper hand over its rivals [Complete article is available here httpwwwborderlandbeatcom201109tijuana-violence-slows-as-one-cartelhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3542

Network Notes| back to top |

Canadian data foreign threats Spying in the digital age (Suggested by a reader in Lithuania ndash thanks) Globe and Mail | By Colin Freeze 31 July 2010

A government spy agency thatrsquos prohibited from monitoring Canadian citizens is now usingldquoinformation about Canadiansrdquo to zero in on foreign threatsThe ambiguous statement found in a new government report detailing the activities of CommunicationsSecurity Establishment Canada could sanction a range of intelligence-gathering activities ndash includingthe controversial practice of mining ldquometadatardquo from digital communications

Metadata ndash often called data about data ndash are found in e-mails and their attachments and containdigital signatures that can reveal when where and by whom documents were created

The collection of metadata has caused controversy in other countries but never in Canada wherethe Communications Security Establishment Canada operates as an ultra-secretive agency About theonly thing that is known about the classified practices is that they were halted and resumed after someldquomajor changesrdquo including directives signed by Defence Minister Peter MacKay

ldquoI cannot comment on specific operational activitiesrdquo Adrian Simpson a CSEC spokesman toldThe Globe He stressed that reviews upheld that the activities in question were ldquocarried out inaccordance with the law ministerial requirements and CSECrsquos policies and proceduresrdquo

ldquoCSEC is prohibited from directing its activities at Canadians anyone in Canada or Canadiansanywhere in the worldrdquo he said

For decades signals-intelligence agencies in the West have been allowed to safeguard nationalsecurity by eavesdropping on foreignersrsquo conversations Spies can whatever phone lines and satellitesignals they can so long as they never listen in on fellow citizens

But in the digital age governments run increasingly sophisticated dragnets scooping up andscouring through millions of intercepted Internet conversations daily Such practices create legalambiguities

ldquoThe whole issue of what constitutes boundaries for signals-intelligence agencies in cyberspaceis a big debate right nowrdquo said Rafal Rohozinski a security expert affiliated with the University of Torontorsquos Munk School

A watchdog agency that reviews the CSECrsquos activities released an annual report to Parliament onJuly 20 ldquoWhen other means have been exhausted CSEC may use information about Canadians when it

has reasonable grounds to believe that using this information may assist in identifying and obtainingforeign intelligencerdquo it reads

Sometimes collecting metadata is relatively benign It can involve aggregating sets of data tospot trends much like the way meteorologists discern national forecasts from localized information

For example while CSEC canrsquot usually monitor the communications of specific Canadian terrorsuspects it can glean insights by zooming out for big-picture patterns One way to do that MrRohozinski said would be to look at data flows between Canadian cities and Yemen where an Internet-savvy al-Qaeda offshoot works to recruit Westerners

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3642

Metadata however can be more revealing Documents that circulate on the Internet travelaround like postmarked letters marked with return addresses ndash e-mails and attachments have embeddedcodes that speak to the who where and when behind their creation

The US National Security Agency found itself mired in controversy a few years go after itskirted domestic-spying bans by secretly upholding that this sort of American metadata was fair gamedistinct from communication contents

Therersquos little to suggest the CSEC would go that far The federal agencyrsquos activities are reviewedby a watchdog body now headed by a former Federal Court of Appeal judge Robert Deacutecary appointedlast year wrote in his annual report that he was satisfied the CSEC activities in question are lawful evenif his predecessors felt them borderline

ldquoThis was the first review of these activities since hellip their resumption under new policiesrdquo thewatchdogrsquos report says It concludes that the surveillance activities are ldquoin accordance with the lawrdquo andfollow ldquomajor changes to certain policies procedures and practicesrdquo

Much of the concern arises from the possibility that CSEC could hand over metadata intelligenceto domestic law-enforcement and security agencies

As it stands the RCMP and CSIS have to develop their domestic investigations before coming toCSEC ndash usually with warrants ndash if they want specific intelligence The rules guiding handovers are strictbecause even though all agencies run surveillance operations they do so under vastly different

mandates and legal standardsThe spy agency however stood by its practicesldquoCSEC is extremely diligent when it comes to the privacy of Canadiansrdquo Mr Simpson said

[complete article is available here httpwwwtheglobeandmailcomnewsnationalcanadian-data-foreign-threats-spying-in-the-digital-agearticle2113772 ]

Cyber Attacks Against NATO Then And Now

New Atlanticist | 6 September 2011

ldquoNow that NATOrsquos Operation UNIFIED PROTECTOR over Libya is winding down it is worth

noting how few cyber incidents were directed in protest against the Alliance Certainly there was a

cyber component to the liberation of Libya but it was more about content and Internet freedom (the

most newsworthy elements here were the role of social media and the Libyan government taking largeparts of the nation offline) But compared to past history NATO cyber defenders had a relatively easy

time

ldquoNATO has not however had an easy 2011 Although there were three significant incidents we

know about none seemed to have been in direct response to operations over Libyahelliprdquo

[Complete article is available here httpwwwacusorgnew_atlanticistcyber-attacks-against-nato-then-

and-now]

The Calm Before The Storm

Foreign Policy | By Joel Brenner 6 September 2011

Cyberwar is already happening -- and its about to get much much worse A veteran cyberwarriorexplains how America can prepare itself

Revelations of wholesale electronic fraud and massive data heists have become weekly evendaily affairs A multinational electronics corporation loses personal information on more than 100million customers Cyberthieves break into an international bank counterfeit credit balances and lootATMs in four countries grabbing $9 million in just a few hours International gangs spread maliciouscode that conscripts unwitting computers into zombie armies of hundreds of thousands of similarlyenslaved machines Criminals then rent these armies called botnets as easily as you can buy a time-sharing arrangement in a beach condo No wonder the vast majority of Internet traffic is spam

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3742

Yet the loss of personal information and related criminal fraud intolerable as they are are theleast threatening face of electronic insecurity The US militarys secret network is penetratedAmericans corporate pockets are being picked clean of the intellectual property that makes the UnitedStates tick And the electricity grid that keeps the lights on and makes everything move is dangerouslyinsecure

In one remote attack on the Pentagons information systems about 10 years ago the Chinesehauled away up to 20 terabytes of information If the information had been on paper theyd have neededa line of moving vans stretching from the Pentagon to freighters docked 50 miles away in Baltimoreharbor just to haul it away Had they done so the military district of Washington wouldve become anactive theater of operations for the first time since 1865 and the Navy wouldve blockaded theChesapeake Bay But the Chinese did it electronically so who noticed

Corporate espionage by both competitors and foreign intelligence services or their surrogates isalso increasing Intelligence officials see this but cant speak openly about the specifics and Im seeingit now in my law practice The victims rarely admit it for understandable reasons Oracle whichsuccessfully sued SAP for theft of its software code was a prominent exception Google was another

When the Chinese penetrated Google in late 2009 -- yes that operation was Chinese and yes itwas done with the blessing of a member of the Politburo -- they werent after customer informationThey were after the source code that makes Google unique Nor was Google the only victim Thousands

of US and Western firms were penetrated in that affair Foreign governments -- and not only theChinese -- understand that they cannot compete with the United States militarily and politically if theycannot compete with it economically so their intelligence services want to steal its corporate intellectualproperty This is the technology that gives America its competitive edge and often it has nothing to dowith defense Ordinary companies with valuable technology are now being targeted by nation-statesThis is a new era National security and economic security have converged

The danger is not limited to the loss of technology and information however The owners andoperators of the North American electricity grid are hooking up their control systems to the Internet asfast as they can Exposing the grid to the Internet makes it marginally more efficient but it also makes itdramatically more vulnerable to disruption If you can remotely penetrate an electronic system to stealinformation you can remotely penetrate it to shut it down or make it go haywire This is why there is no

longer a meaningful difference between information security and operational security And the biggestoperational risk is the grid In contemporary society nothing moves without electricity If the grid goesout the country stops

As the Stuxnet affair demonstrated remotely engineered disruption of industrial control systemsis now a reality That episode involved the successful electronic attack on the centrifuges in the Iraniannuclear program Only a first-class intelligence agency could have pulled that off but the blueprint fordoing it -- the code itself -- is now public Many American industrial control systems run on the samekind of equipment the Iranians were using but unlike the controls on the Iranian centrifuges thecontrols on the US grid are now being connected to the Internet making them easier to disrupt Stuxnetwas a watershed there will be copycats

Other industrial control systems will also be targets Some already are Air traffic control

railroad switches and water and sewage systems are all electronically controlled now and many arevulnerable If an intruder can break into the right server electronically he can remotely shut downproduction send your goods to the wrong destination and even unlock your doors -- and delete your logentries so he leaves no record of ever having been there

The United States does not lack enemies who would attack it this way Seized al Qaedacomputers contain details of US industrial control systems In 2003 a group affiliated with thePakistani terrorist organization Lashkar-e-Taiba -- the same gang that engineered the 2008 terroristassaults in Mumbai -- plotted to attack the Australian grid Other groups conspired to attack the Britishgrid in 2004 2006 and 2009 Yet the owners and operators of the North American grid continue willy-

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3842

nilly to expose their control systems to the Internet instead of isolating and hardening it This is folly of a high order

Important conclusions for public and corporate policy follow from this vulnerable state of

affairs First cyber insecurity has operational consequences In the current and foreseeable states of technology a high degree of assurance against electronic penetration of anything connected to theInternet is not achievable Large efficient electronically connected organizations and nations aretherefore vulnerable to remotely engineered disruption as well as information theft

Second this risk cannot be eliminated -- but it can be reduced and managed As a nation theUnited States should start by isolating the grids controls from the Internet Undoubtedly there aremarginal efficiencies to be gained by seamless connectivity over a publicly accessible infrastructure butthese gains are usually exaggerated and the risk this connectivity creates is staggering The governmentand the major telecommunications carriers must also make the investment required to re-create themassive redundancies that made the wired telephone network so robust Resilience and swift recoveryshould be the goal If the consequences of cyberattacks were reduced penetration would cease to matter

Third companies that wait for the government to solve their own security problems do so attheir peril The government is broke and the IT backbone is 85 percent private so the governmentdoesnt control it The governments role in altering the status quo will be limited to setting standardsusing its purchasing power to move vendors toward better security and getting its own house in order

The government can neither secure corporate intellectual property nor protect firms against operationaldisruption

Fourth in a world in which everything cannot be protected companies must determine forthemselves what intellectual property and physical assets to isolate and safeguard Those that approachthis task seriously will quickly learn that technology is only one aspect of their insecurity and in manycases the easiest to deal with Unless technology is integrated with personnel practices and operationalsecurity it opens vulnerabilities that its users rarely understand This kind of integration requires theautomated enforcement of reasonable security policies and systematic workforce training and thatoccurs only when management the lawyers and the technologists work closely together This is an old-fashioned management challenge -- not a technological one For their part corporate boards need to takeIT security seriously and launch audits that examine how their systems are actually implemented and

used not merely how they are designed Because as the techies like to put it the weakest link in anysystem is not the silicon-based unit on the desk its the carbon-based unit in the chair Joel Brenner is author of the forthcoming America the Vulnerable Inside the New Threat Matrix of

Digital Espionage Crime and Warfare He has served as the inspector general of the National Security

Agency the national counterintelligence executive and the NSAs senior counsel He now practices law

at Cooley LLP in Washington DC

Cyberattacks Decline Slightly Symantec Report Finds

Dark Reading | 1 September 2011

Organizations worldwide are suffering damages as a result of cyberattacks but interestingly there hasbeen a slight decline in these attacks during the past 12 months according to a new report from

Symantec More than 90 percent of the more than 3300 respondents across 36 countries said theyexperienced tangible losses as a result of a hack with 84 percent reporting financial loss to the cost of abreach Around one-fifth lost at least $195000 in breaches during the past 12 months

Meanwhile Symantec attributes the unexpected bright spot of a decline in breaches toorganizations employing better cybersecurity defenses More than 70 percent of organizations sawattacks in the past 12 months a decline of 5 percent from 2010 And those that experienced anincreasing frequency of attacks dropped from 29 percent in 2010 to 21 percent this year While 100percent last year reported losses from cyberattacks 92 percent did so in 2011 The trend seemscounterintuitive given the rash of high-profile breaches this year More

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 31: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3142

An 8 August commentary in Burkina Fasos LObservateur Paalga said that reports of Boko Haram collaboration with Al-Shabaab and AQIM could indicate that Al-Qaida isextending its African tentacles Abdourahmane Dieng security division chief of theEconomic Community of West African States said the collaboration represented a veryserious threat according to Senegals progovernment Le Soleil on 5 August

Messages Likely To Resonate With African Audience

Sub-Saharan Africas increasing concern about the shifting nature and potential strengthening of theterrorist threat on the continent suggests that messages directly addressing the impact of terrorism onAfricans the increasingly complex nature of the threat and the need for multilateral cooperation againstterrorism are most likely to resonate with Africans

Messages expressing solidarity and sympathy for Africans affected by Boko Haram Al-Shabaab and AQIM would almost certainly resonate with a broad African audience

African political and military leaders would probably welcome acknowledgement of thecomplex and changing nature of terrorism on the continent and recognition of theirinitiatives and commitment to countering violent extremism

African leaders and medias concern about potential collaboration between Boko Haram

Al-Shabaab and AQIM suggest that they would be open to improving multilateral andcross-regional sharing of lessons learned and strategies to counter the intensification of terrorism within Africa

Aviation and Maritime Security| back to top |

Bomb Threats Force Jets To Land

Associated Press | 7 September 2011

Both landed safely one landed in Ankara Ataturk International Airport and the other at Kuala LumpurTwo flights operated by Pakistans state-owned airline received bombs threats on Wednesday

and both landed safely one in Turkey the other in Malaysia officials said No bombs were found The

first flight was headed for Manchester England when it was notified of the threat near the Bulgariancapital of Sofia The crew contacted the control tower in Istanbul to seek permission for the landingstate-run Anatolia news agency reported Authorities quickly evacuated all 378 passengers from theBoeing 777-300ER aircraft after it parked at a remote corner of the International Ataturk Airport andbomb squads began searching the plane with sniffer dogs Anatolia reported PIA spokesman MashoodTajwar confirmed the flight received a threat and landed All passengers were safe A police searchturned up no bomb officials said Later a second PIA flight from Islamabad to Kuala Lumpur alsoreceived a bomb threat It landed in Kuala Lumpur and all the passengers disembarked safely saidTajwar The UK-bound Pakistan International Airlines plane was forced to make an emergency landingat Ataturk Airport in Istanbul after receiving a bomb threat Malaysias airports authority said thepassengers were being screened and the plane was isolated in a parking area while being searched bypolice No bomb was found

It said the plane carried 164 passengers and 13 crew Azmi Murad senior general manager forthe authority said the Pakistani airline informed it that the warning came by email Mr Tajwar gave nodetails on the nature of the threat or how it was delivered Pakistan is home to al Qaedas top leadershipMilitants who trained there have been responsible for many of the attacks and failed plots in the USand Europe since Sept 11 2001 when planes hijacked by al Qaeda militants destroyed the World TradeCenter in New York and crashed into the Pentagon The bomb threats came four days before the 10thanniversary of 911 but there was no apparent link to Islamist militants who typically do not alertauthorities in advance The FBI and Homeland Security department issued warnings last weekend aboutal Qaeda threats to small airlines

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3242

Commentary amp Opinion| back to top |

From Terror Group Founder To Libyan Rebel Military Commander

ABCNews | 29August 2011

The same man who triumphantly led Libyan rebels into Gadhafis compound last week first came to theattention of the US intelligence community years ago - as a founder of a terror group

Abdelhakim Belhaj who was recently appointed to Tripolis rebel military council was one of the original founders of the Libyan Islamic Fighting Group an anti-Gadhafi group which was laterdesignated by the US State Department as a terrorist organization with links to al Qaeda according toUS government reports

We proudly announce the liberation of Libya and that Libya has become free and that the ruleof the tyrant and the era of oppression is behind us a victorious Belhaj told reporters after the stormingof Gadhafis Bab al-Aziziya compound last week Ousting Gadhafi had been the main objective of theLIFG since its inception in the early 1990s even if some of the fighters believed that meant puttingAmericans in the crossfire

The group carried out operations against the Libyan government including at least four suspectedassassination attempts against Gadhafi in the 1990s and was also believed to be connected to a series of suicide bombings in Casablanca Morocco in 2003 the US State Department reported As relationsbetween the US and Gadhafi improved in the mid-2000s some LIFG leaders cultivated relationshipswith top al Qaeda leaders including Osama bin Laden and were suspected of funneling fighters to Iraq tocarry out operations against US soldiers

When the LIFG was designated a terror organization in 2004 it was meant as a gesture of solidarity with the Libyan government according to a March 2011 congressional report

Contrary to several US government reports Libyan rebel ambassador to the US Ali Aujalitold ABC News that the LIFG was never connected to al Qaeda and did not carry out terrorist operations

They were only opposed to Gadhafi during his rule and paid the price for that by beingoppressed by the regime Aujali said

The CIA first publicly voiced its concerns about the connection between the LIFG and al Qaedain 2004 when then-director George Tenet testified before the Senate Select Committee on Intelligenceand listed the LIFG among groups that represented an immediate threat [that] has benefited from alQaeda links[Article continues here httpabcnewsgocomBlotterterror-group-founder-libyan-rebel-military-commanderstoryid=14405319]

Interview With Saudi Sheik Wajdi Al-Ghazawi

MemriTVcom

Sheik Wajdi al-Ghazawi owner of al-Fajr TV criticizes extremist atmosphere in Saudi Arabia and saysafter 911 They Handed Out Sweets on the Streets of Mecca

Following are excerpts from a statement by Saudi Sheik Wajdi Al-Ghazawi owner of Al-FajrTV which was posted on YouTube on August 4 2011

Wajdi Al-Ghazawi When Al-Qaeda and Osama Bin Laden were at the height of their mightthey were extremely popular in Saudi Arabia From mosque pulpits across Saudi Arabia preacherswould pray for their success Moreover from the pulpits of the most important mosques ndash the Al-HaramMosque in Mecca and the Nabawi Mosque in Al-Madina ndash direct prayers for the success of Al-Qaedawere made during the days of the bombing of Tora Bora Oh Allah help our brothers in AfghanistanThese supplications were made during evening prayers as well as Friday prayers The preachers wouldpray for them in violation of the ministrys instructions

When the twin towers in New York were attacked they handed out sweets on the streets of Mecca By Allah they did I witnessed this myself The young people bowed in prayer and hugged one

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3342

another out of joy People were in heaven because of these young men who destroyed America andbombed this idol Am I right or not Was it like that or not

Back then when the Taliban broke off a piece of the nose of the Buddha statue which was hewnin the mountain an entire sermon was dedicated to it in the mosque in Mecca and the preacher was laterreprimanded for this sermon The entire Saudi people supported and loved Al-Qaeda

This went on until our brothers in Al-Qaeda ndash and I dont know what was going through theirminds ndash began to carry out operations inside Saudi Arabia Thats when we all raised our hands andsaid Youve gone too far We wont support you in this

The atmosphere here in Saudi Arabia is one of extremism It is characterized by focusing onminor details Many things are forbidden Yes maybe they are indeed forbidden but by forcing peopleto avoid them and by acting as if these were major sins an atmosphere was created that gave rise toextremist youth who might act recklessly at the most trivial provocation

For instance we blew out of proportion the issue of music the issue of smoking or the issue of hanging pictures in public places True there are clear texts on these issues but the young peopleembraced these issues as if they were fighting usury fornication or alcohol No these are not among theseven major sins So our society has become extreme

This extremist atmosphere has given rise to people who accuse others of heresy and people whopurport to be waging Jihad It has created genes that gave rise to cells of Al-Qaeda and other terrorists

We must examine our breeding ground in which these young men were sownBy Allah what can possibly emerge from such an atmosphere Muftis who accuse others of

heresy sheiks who incite and young people who bomb Am I right or not[Complete clip is available here httpwwwmemritvorgclipen3099htm]

Legal Aspects amp Lawfare| back to top |

Revisiting A Stale Counterterrorism Law

Council on Foreign Relations | 1 September 2011

ldquoNearly a decade after 911 the United States still relies on the 2001 Authorization for the Use of Military Force (AUMF) for the killing and detention of those considered responsible for or associatedwith the terrorist attacks But CFR national security law expert John Bellinger says it is becomingincreasingly difficult for the Obama administration to justify some of its counterterrorism operationsunder this limited statutory authority It has been used in defense of actions including drone attacks onindividuals as well as the targeting of groups in Yemen and Somalia that may have only the mosttenuous affiliation or association to the 911 attack A revised AUMF should clarify those operations aswell as the issue of detention specifically which individuals can be detained for how long and subjectto what processes There also needs to be greater effort at the international level he adds to fill thegaps in the law that covers conflicts between states and non-state actorsrdquohelliprdquo[Complete article is available here httpwwwcfrorgcounterterrorismrevisiting-stale-

counterterrorism-lawp25742]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3442

Narco-Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector[Complete article is available here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Mexicos Cartels Move Into Extortion

At a construction site of an apartment building in the heart of the Mexican capital a company engineerruns through his weekly payroll sheet He has salaries written out for carpenters bricklayers andelectricians At the bottom of the sheet is a notation of $200 for ldquosecurity servicesrdquo next to a nicknameldquoEl Indiordquo mdash the Indian [Complete article is available here

httpwwwtucsonsentinelcomnationworldreport090611_mexico_cartels_bribesmexicos-cartels-move-into-extortion ]

Seven Die In Mexican Pacific Port City

Latin American Herald Tribune

Seven people died in separate shootings in Mazatlan a port city in the northwestern Mexican state of Sinaloa with some of the incidents drug-related a police spokesman told Efe [Complete article is available herehttpwwwlahtcomarticleaspCategoryId=14091ampArticleId=423061]

Tijuana Violence Slows As One Cartel Takes Control

BorderlandBeatcom

Mexicos famously seedy border city of Tijuana is enjoying a lull in drug murders as the countrys mostpowerful cartel gains the upper hand over its rivals [Complete article is available here httpwwwborderlandbeatcom201109tijuana-violence-slows-as-one-cartelhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3542

Network Notes| back to top |

Canadian data foreign threats Spying in the digital age (Suggested by a reader in Lithuania ndash thanks) Globe and Mail | By Colin Freeze 31 July 2010

A government spy agency thatrsquos prohibited from monitoring Canadian citizens is now usingldquoinformation about Canadiansrdquo to zero in on foreign threatsThe ambiguous statement found in a new government report detailing the activities of CommunicationsSecurity Establishment Canada could sanction a range of intelligence-gathering activities ndash includingthe controversial practice of mining ldquometadatardquo from digital communications

Metadata ndash often called data about data ndash are found in e-mails and their attachments and containdigital signatures that can reveal when where and by whom documents were created

The collection of metadata has caused controversy in other countries but never in Canada wherethe Communications Security Establishment Canada operates as an ultra-secretive agency About theonly thing that is known about the classified practices is that they were halted and resumed after someldquomajor changesrdquo including directives signed by Defence Minister Peter MacKay

ldquoI cannot comment on specific operational activitiesrdquo Adrian Simpson a CSEC spokesman toldThe Globe He stressed that reviews upheld that the activities in question were ldquocarried out inaccordance with the law ministerial requirements and CSECrsquos policies and proceduresrdquo

ldquoCSEC is prohibited from directing its activities at Canadians anyone in Canada or Canadiansanywhere in the worldrdquo he said

For decades signals-intelligence agencies in the West have been allowed to safeguard nationalsecurity by eavesdropping on foreignersrsquo conversations Spies can whatever phone lines and satellitesignals they can so long as they never listen in on fellow citizens

But in the digital age governments run increasingly sophisticated dragnets scooping up andscouring through millions of intercepted Internet conversations daily Such practices create legalambiguities

ldquoThe whole issue of what constitutes boundaries for signals-intelligence agencies in cyberspaceis a big debate right nowrdquo said Rafal Rohozinski a security expert affiliated with the University of Torontorsquos Munk School

A watchdog agency that reviews the CSECrsquos activities released an annual report to Parliament onJuly 20 ldquoWhen other means have been exhausted CSEC may use information about Canadians when it

has reasonable grounds to believe that using this information may assist in identifying and obtainingforeign intelligencerdquo it reads

Sometimes collecting metadata is relatively benign It can involve aggregating sets of data tospot trends much like the way meteorologists discern national forecasts from localized information

For example while CSEC canrsquot usually monitor the communications of specific Canadian terrorsuspects it can glean insights by zooming out for big-picture patterns One way to do that MrRohozinski said would be to look at data flows between Canadian cities and Yemen where an Internet-savvy al-Qaeda offshoot works to recruit Westerners

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3642

Metadata however can be more revealing Documents that circulate on the Internet travelaround like postmarked letters marked with return addresses ndash e-mails and attachments have embeddedcodes that speak to the who where and when behind their creation

The US National Security Agency found itself mired in controversy a few years go after itskirted domestic-spying bans by secretly upholding that this sort of American metadata was fair gamedistinct from communication contents

Therersquos little to suggest the CSEC would go that far The federal agencyrsquos activities are reviewedby a watchdog body now headed by a former Federal Court of Appeal judge Robert Deacutecary appointedlast year wrote in his annual report that he was satisfied the CSEC activities in question are lawful evenif his predecessors felt them borderline

ldquoThis was the first review of these activities since hellip their resumption under new policiesrdquo thewatchdogrsquos report says It concludes that the surveillance activities are ldquoin accordance with the lawrdquo andfollow ldquomajor changes to certain policies procedures and practicesrdquo

Much of the concern arises from the possibility that CSEC could hand over metadata intelligenceto domestic law-enforcement and security agencies

As it stands the RCMP and CSIS have to develop their domestic investigations before coming toCSEC ndash usually with warrants ndash if they want specific intelligence The rules guiding handovers are strictbecause even though all agencies run surveillance operations they do so under vastly different

mandates and legal standardsThe spy agency however stood by its practicesldquoCSEC is extremely diligent when it comes to the privacy of Canadiansrdquo Mr Simpson said

[complete article is available here httpwwwtheglobeandmailcomnewsnationalcanadian-data-foreign-threats-spying-in-the-digital-agearticle2113772 ]

Cyber Attacks Against NATO Then And Now

New Atlanticist | 6 September 2011

ldquoNow that NATOrsquos Operation UNIFIED PROTECTOR over Libya is winding down it is worth

noting how few cyber incidents were directed in protest against the Alliance Certainly there was a

cyber component to the liberation of Libya but it was more about content and Internet freedom (the

most newsworthy elements here were the role of social media and the Libyan government taking largeparts of the nation offline) But compared to past history NATO cyber defenders had a relatively easy

time

ldquoNATO has not however had an easy 2011 Although there were three significant incidents we

know about none seemed to have been in direct response to operations over Libyahelliprdquo

[Complete article is available here httpwwwacusorgnew_atlanticistcyber-attacks-against-nato-then-

and-now]

The Calm Before The Storm

Foreign Policy | By Joel Brenner 6 September 2011

Cyberwar is already happening -- and its about to get much much worse A veteran cyberwarriorexplains how America can prepare itself

Revelations of wholesale electronic fraud and massive data heists have become weekly evendaily affairs A multinational electronics corporation loses personal information on more than 100million customers Cyberthieves break into an international bank counterfeit credit balances and lootATMs in four countries grabbing $9 million in just a few hours International gangs spread maliciouscode that conscripts unwitting computers into zombie armies of hundreds of thousands of similarlyenslaved machines Criminals then rent these armies called botnets as easily as you can buy a time-sharing arrangement in a beach condo No wonder the vast majority of Internet traffic is spam

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3742

Yet the loss of personal information and related criminal fraud intolerable as they are are theleast threatening face of electronic insecurity The US militarys secret network is penetratedAmericans corporate pockets are being picked clean of the intellectual property that makes the UnitedStates tick And the electricity grid that keeps the lights on and makes everything move is dangerouslyinsecure

In one remote attack on the Pentagons information systems about 10 years ago the Chinesehauled away up to 20 terabytes of information If the information had been on paper theyd have neededa line of moving vans stretching from the Pentagon to freighters docked 50 miles away in Baltimoreharbor just to haul it away Had they done so the military district of Washington wouldve become anactive theater of operations for the first time since 1865 and the Navy wouldve blockaded theChesapeake Bay But the Chinese did it electronically so who noticed

Corporate espionage by both competitors and foreign intelligence services or their surrogates isalso increasing Intelligence officials see this but cant speak openly about the specifics and Im seeingit now in my law practice The victims rarely admit it for understandable reasons Oracle whichsuccessfully sued SAP for theft of its software code was a prominent exception Google was another

When the Chinese penetrated Google in late 2009 -- yes that operation was Chinese and yes itwas done with the blessing of a member of the Politburo -- they werent after customer informationThey were after the source code that makes Google unique Nor was Google the only victim Thousands

of US and Western firms were penetrated in that affair Foreign governments -- and not only theChinese -- understand that they cannot compete with the United States militarily and politically if theycannot compete with it economically so their intelligence services want to steal its corporate intellectualproperty This is the technology that gives America its competitive edge and often it has nothing to dowith defense Ordinary companies with valuable technology are now being targeted by nation-statesThis is a new era National security and economic security have converged

The danger is not limited to the loss of technology and information however The owners andoperators of the North American electricity grid are hooking up their control systems to the Internet asfast as they can Exposing the grid to the Internet makes it marginally more efficient but it also makes itdramatically more vulnerable to disruption If you can remotely penetrate an electronic system to stealinformation you can remotely penetrate it to shut it down or make it go haywire This is why there is no

longer a meaningful difference between information security and operational security And the biggestoperational risk is the grid In contemporary society nothing moves without electricity If the grid goesout the country stops

As the Stuxnet affair demonstrated remotely engineered disruption of industrial control systemsis now a reality That episode involved the successful electronic attack on the centrifuges in the Iraniannuclear program Only a first-class intelligence agency could have pulled that off but the blueprint fordoing it -- the code itself -- is now public Many American industrial control systems run on the samekind of equipment the Iranians were using but unlike the controls on the Iranian centrifuges thecontrols on the US grid are now being connected to the Internet making them easier to disrupt Stuxnetwas a watershed there will be copycats

Other industrial control systems will also be targets Some already are Air traffic control

railroad switches and water and sewage systems are all electronically controlled now and many arevulnerable If an intruder can break into the right server electronically he can remotely shut downproduction send your goods to the wrong destination and even unlock your doors -- and delete your logentries so he leaves no record of ever having been there

The United States does not lack enemies who would attack it this way Seized al Qaedacomputers contain details of US industrial control systems In 2003 a group affiliated with thePakistani terrorist organization Lashkar-e-Taiba -- the same gang that engineered the 2008 terroristassaults in Mumbai -- plotted to attack the Australian grid Other groups conspired to attack the Britishgrid in 2004 2006 and 2009 Yet the owners and operators of the North American grid continue willy-

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3842

nilly to expose their control systems to the Internet instead of isolating and hardening it This is folly of a high order

Important conclusions for public and corporate policy follow from this vulnerable state of

affairs First cyber insecurity has operational consequences In the current and foreseeable states of technology a high degree of assurance against electronic penetration of anything connected to theInternet is not achievable Large efficient electronically connected organizations and nations aretherefore vulnerable to remotely engineered disruption as well as information theft

Second this risk cannot be eliminated -- but it can be reduced and managed As a nation theUnited States should start by isolating the grids controls from the Internet Undoubtedly there aremarginal efficiencies to be gained by seamless connectivity over a publicly accessible infrastructure butthese gains are usually exaggerated and the risk this connectivity creates is staggering The governmentand the major telecommunications carriers must also make the investment required to re-create themassive redundancies that made the wired telephone network so robust Resilience and swift recoveryshould be the goal If the consequences of cyberattacks were reduced penetration would cease to matter

Third companies that wait for the government to solve their own security problems do so attheir peril The government is broke and the IT backbone is 85 percent private so the governmentdoesnt control it The governments role in altering the status quo will be limited to setting standardsusing its purchasing power to move vendors toward better security and getting its own house in order

The government can neither secure corporate intellectual property nor protect firms against operationaldisruption

Fourth in a world in which everything cannot be protected companies must determine forthemselves what intellectual property and physical assets to isolate and safeguard Those that approachthis task seriously will quickly learn that technology is only one aspect of their insecurity and in manycases the easiest to deal with Unless technology is integrated with personnel practices and operationalsecurity it opens vulnerabilities that its users rarely understand This kind of integration requires theautomated enforcement of reasonable security policies and systematic workforce training and thatoccurs only when management the lawyers and the technologists work closely together This is an old-fashioned management challenge -- not a technological one For their part corporate boards need to takeIT security seriously and launch audits that examine how their systems are actually implemented and

used not merely how they are designed Because as the techies like to put it the weakest link in anysystem is not the silicon-based unit on the desk its the carbon-based unit in the chair Joel Brenner is author of the forthcoming America the Vulnerable Inside the New Threat Matrix of

Digital Espionage Crime and Warfare He has served as the inspector general of the National Security

Agency the national counterintelligence executive and the NSAs senior counsel He now practices law

at Cooley LLP in Washington DC

Cyberattacks Decline Slightly Symantec Report Finds

Dark Reading | 1 September 2011

Organizations worldwide are suffering damages as a result of cyberattacks but interestingly there hasbeen a slight decline in these attacks during the past 12 months according to a new report from

Symantec More than 90 percent of the more than 3300 respondents across 36 countries said theyexperienced tangible losses as a result of a hack with 84 percent reporting financial loss to the cost of abreach Around one-fifth lost at least $195000 in breaches during the past 12 months

Meanwhile Symantec attributes the unexpected bright spot of a decline in breaches toorganizations employing better cybersecurity defenses More than 70 percent of organizations sawattacks in the past 12 months a decline of 5 percent from 2010 And those that experienced anincreasing frequency of attacks dropped from 29 percent in 2010 to 21 percent this year While 100percent last year reported losses from cyberattacks 92 percent did so in 2011 The trend seemscounterintuitive given the rash of high-profile breaches this year More

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 32: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3242

Commentary amp Opinion| back to top |

From Terror Group Founder To Libyan Rebel Military Commander

ABCNews | 29August 2011

The same man who triumphantly led Libyan rebels into Gadhafis compound last week first came to theattention of the US intelligence community years ago - as a founder of a terror group

Abdelhakim Belhaj who was recently appointed to Tripolis rebel military council was one of the original founders of the Libyan Islamic Fighting Group an anti-Gadhafi group which was laterdesignated by the US State Department as a terrorist organization with links to al Qaeda according toUS government reports

We proudly announce the liberation of Libya and that Libya has become free and that the ruleof the tyrant and the era of oppression is behind us a victorious Belhaj told reporters after the stormingof Gadhafis Bab al-Aziziya compound last week Ousting Gadhafi had been the main objective of theLIFG since its inception in the early 1990s even if some of the fighters believed that meant puttingAmericans in the crossfire

The group carried out operations against the Libyan government including at least four suspectedassassination attempts against Gadhafi in the 1990s and was also believed to be connected to a series of suicide bombings in Casablanca Morocco in 2003 the US State Department reported As relationsbetween the US and Gadhafi improved in the mid-2000s some LIFG leaders cultivated relationshipswith top al Qaeda leaders including Osama bin Laden and were suspected of funneling fighters to Iraq tocarry out operations against US soldiers

When the LIFG was designated a terror organization in 2004 it was meant as a gesture of solidarity with the Libyan government according to a March 2011 congressional report

Contrary to several US government reports Libyan rebel ambassador to the US Ali Aujalitold ABC News that the LIFG was never connected to al Qaeda and did not carry out terrorist operations

They were only opposed to Gadhafi during his rule and paid the price for that by beingoppressed by the regime Aujali said

The CIA first publicly voiced its concerns about the connection between the LIFG and al Qaedain 2004 when then-director George Tenet testified before the Senate Select Committee on Intelligenceand listed the LIFG among groups that represented an immediate threat [that] has benefited from alQaeda links[Article continues here httpabcnewsgocomBlotterterror-group-founder-libyan-rebel-military-commanderstoryid=14405319]

Interview With Saudi Sheik Wajdi Al-Ghazawi

MemriTVcom

Sheik Wajdi al-Ghazawi owner of al-Fajr TV criticizes extremist atmosphere in Saudi Arabia and saysafter 911 They Handed Out Sweets on the Streets of Mecca

Following are excerpts from a statement by Saudi Sheik Wajdi Al-Ghazawi owner of Al-FajrTV which was posted on YouTube on August 4 2011

Wajdi Al-Ghazawi When Al-Qaeda and Osama Bin Laden were at the height of their mightthey were extremely popular in Saudi Arabia From mosque pulpits across Saudi Arabia preacherswould pray for their success Moreover from the pulpits of the most important mosques ndash the Al-HaramMosque in Mecca and the Nabawi Mosque in Al-Madina ndash direct prayers for the success of Al-Qaedawere made during the days of the bombing of Tora Bora Oh Allah help our brothers in AfghanistanThese supplications were made during evening prayers as well as Friday prayers The preachers wouldpray for them in violation of the ministrys instructions

When the twin towers in New York were attacked they handed out sweets on the streets of Mecca By Allah they did I witnessed this myself The young people bowed in prayer and hugged one

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3342

another out of joy People were in heaven because of these young men who destroyed America andbombed this idol Am I right or not Was it like that or not

Back then when the Taliban broke off a piece of the nose of the Buddha statue which was hewnin the mountain an entire sermon was dedicated to it in the mosque in Mecca and the preacher was laterreprimanded for this sermon The entire Saudi people supported and loved Al-Qaeda

This went on until our brothers in Al-Qaeda ndash and I dont know what was going through theirminds ndash began to carry out operations inside Saudi Arabia Thats when we all raised our hands andsaid Youve gone too far We wont support you in this

The atmosphere here in Saudi Arabia is one of extremism It is characterized by focusing onminor details Many things are forbidden Yes maybe they are indeed forbidden but by forcing peopleto avoid them and by acting as if these were major sins an atmosphere was created that gave rise toextremist youth who might act recklessly at the most trivial provocation

For instance we blew out of proportion the issue of music the issue of smoking or the issue of hanging pictures in public places True there are clear texts on these issues but the young peopleembraced these issues as if they were fighting usury fornication or alcohol No these are not among theseven major sins So our society has become extreme

This extremist atmosphere has given rise to people who accuse others of heresy and people whopurport to be waging Jihad It has created genes that gave rise to cells of Al-Qaeda and other terrorists

We must examine our breeding ground in which these young men were sownBy Allah what can possibly emerge from such an atmosphere Muftis who accuse others of

heresy sheiks who incite and young people who bomb Am I right or not[Complete clip is available here httpwwwmemritvorgclipen3099htm]

Legal Aspects amp Lawfare| back to top |

Revisiting A Stale Counterterrorism Law

Council on Foreign Relations | 1 September 2011

ldquoNearly a decade after 911 the United States still relies on the 2001 Authorization for the Use of Military Force (AUMF) for the killing and detention of those considered responsible for or associatedwith the terrorist attacks But CFR national security law expert John Bellinger says it is becomingincreasingly difficult for the Obama administration to justify some of its counterterrorism operationsunder this limited statutory authority It has been used in defense of actions including drone attacks onindividuals as well as the targeting of groups in Yemen and Somalia that may have only the mosttenuous affiliation or association to the 911 attack A revised AUMF should clarify those operations aswell as the issue of detention specifically which individuals can be detained for how long and subjectto what processes There also needs to be greater effort at the international level he adds to fill thegaps in the law that covers conflicts between states and non-state actorsrdquohelliprdquo[Complete article is available here httpwwwcfrorgcounterterrorismrevisiting-stale-

counterterrorism-lawp25742]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3442

Narco-Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector[Complete article is available here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Mexicos Cartels Move Into Extortion

At a construction site of an apartment building in the heart of the Mexican capital a company engineerruns through his weekly payroll sheet He has salaries written out for carpenters bricklayers andelectricians At the bottom of the sheet is a notation of $200 for ldquosecurity servicesrdquo next to a nicknameldquoEl Indiordquo mdash the Indian [Complete article is available here

httpwwwtucsonsentinelcomnationworldreport090611_mexico_cartels_bribesmexicos-cartels-move-into-extortion ]

Seven Die In Mexican Pacific Port City

Latin American Herald Tribune

Seven people died in separate shootings in Mazatlan a port city in the northwestern Mexican state of Sinaloa with some of the incidents drug-related a police spokesman told Efe [Complete article is available herehttpwwwlahtcomarticleaspCategoryId=14091ampArticleId=423061]

Tijuana Violence Slows As One Cartel Takes Control

BorderlandBeatcom

Mexicos famously seedy border city of Tijuana is enjoying a lull in drug murders as the countrys mostpowerful cartel gains the upper hand over its rivals [Complete article is available here httpwwwborderlandbeatcom201109tijuana-violence-slows-as-one-cartelhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3542

Network Notes| back to top |

Canadian data foreign threats Spying in the digital age (Suggested by a reader in Lithuania ndash thanks) Globe and Mail | By Colin Freeze 31 July 2010

A government spy agency thatrsquos prohibited from monitoring Canadian citizens is now usingldquoinformation about Canadiansrdquo to zero in on foreign threatsThe ambiguous statement found in a new government report detailing the activities of CommunicationsSecurity Establishment Canada could sanction a range of intelligence-gathering activities ndash includingthe controversial practice of mining ldquometadatardquo from digital communications

Metadata ndash often called data about data ndash are found in e-mails and their attachments and containdigital signatures that can reveal when where and by whom documents were created

The collection of metadata has caused controversy in other countries but never in Canada wherethe Communications Security Establishment Canada operates as an ultra-secretive agency About theonly thing that is known about the classified practices is that they were halted and resumed after someldquomajor changesrdquo including directives signed by Defence Minister Peter MacKay

ldquoI cannot comment on specific operational activitiesrdquo Adrian Simpson a CSEC spokesman toldThe Globe He stressed that reviews upheld that the activities in question were ldquocarried out inaccordance with the law ministerial requirements and CSECrsquos policies and proceduresrdquo

ldquoCSEC is prohibited from directing its activities at Canadians anyone in Canada or Canadiansanywhere in the worldrdquo he said

For decades signals-intelligence agencies in the West have been allowed to safeguard nationalsecurity by eavesdropping on foreignersrsquo conversations Spies can whatever phone lines and satellitesignals they can so long as they never listen in on fellow citizens

But in the digital age governments run increasingly sophisticated dragnets scooping up andscouring through millions of intercepted Internet conversations daily Such practices create legalambiguities

ldquoThe whole issue of what constitutes boundaries for signals-intelligence agencies in cyberspaceis a big debate right nowrdquo said Rafal Rohozinski a security expert affiliated with the University of Torontorsquos Munk School

A watchdog agency that reviews the CSECrsquos activities released an annual report to Parliament onJuly 20 ldquoWhen other means have been exhausted CSEC may use information about Canadians when it

has reasonable grounds to believe that using this information may assist in identifying and obtainingforeign intelligencerdquo it reads

Sometimes collecting metadata is relatively benign It can involve aggregating sets of data tospot trends much like the way meteorologists discern national forecasts from localized information

For example while CSEC canrsquot usually monitor the communications of specific Canadian terrorsuspects it can glean insights by zooming out for big-picture patterns One way to do that MrRohozinski said would be to look at data flows between Canadian cities and Yemen where an Internet-savvy al-Qaeda offshoot works to recruit Westerners

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3642

Metadata however can be more revealing Documents that circulate on the Internet travelaround like postmarked letters marked with return addresses ndash e-mails and attachments have embeddedcodes that speak to the who where and when behind their creation

The US National Security Agency found itself mired in controversy a few years go after itskirted domestic-spying bans by secretly upholding that this sort of American metadata was fair gamedistinct from communication contents

Therersquos little to suggest the CSEC would go that far The federal agencyrsquos activities are reviewedby a watchdog body now headed by a former Federal Court of Appeal judge Robert Deacutecary appointedlast year wrote in his annual report that he was satisfied the CSEC activities in question are lawful evenif his predecessors felt them borderline

ldquoThis was the first review of these activities since hellip their resumption under new policiesrdquo thewatchdogrsquos report says It concludes that the surveillance activities are ldquoin accordance with the lawrdquo andfollow ldquomajor changes to certain policies procedures and practicesrdquo

Much of the concern arises from the possibility that CSEC could hand over metadata intelligenceto domestic law-enforcement and security agencies

As it stands the RCMP and CSIS have to develop their domestic investigations before coming toCSEC ndash usually with warrants ndash if they want specific intelligence The rules guiding handovers are strictbecause even though all agencies run surveillance operations they do so under vastly different

mandates and legal standardsThe spy agency however stood by its practicesldquoCSEC is extremely diligent when it comes to the privacy of Canadiansrdquo Mr Simpson said

[complete article is available here httpwwwtheglobeandmailcomnewsnationalcanadian-data-foreign-threats-spying-in-the-digital-agearticle2113772 ]

Cyber Attacks Against NATO Then And Now

New Atlanticist | 6 September 2011

ldquoNow that NATOrsquos Operation UNIFIED PROTECTOR over Libya is winding down it is worth

noting how few cyber incidents were directed in protest against the Alliance Certainly there was a

cyber component to the liberation of Libya but it was more about content and Internet freedom (the

most newsworthy elements here were the role of social media and the Libyan government taking largeparts of the nation offline) But compared to past history NATO cyber defenders had a relatively easy

time

ldquoNATO has not however had an easy 2011 Although there were three significant incidents we

know about none seemed to have been in direct response to operations over Libyahelliprdquo

[Complete article is available here httpwwwacusorgnew_atlanticistcyber-attacks-against-nato-then-

and-now]

The Calm Before The Storm

Foreign Policy | By Joel Brenner 6 September 2011

Cyberwar is already happening -- and its about to get much much worse A veteran cyberwarriorexplains how America can prepare itself

Revelations of wholesale electronic fraud and massive data heists have become weekly evendaily affairs A multinational electronics corporation loses personal information on more than 100million customers Cyberthieves break into an international bank counterfeit credit balances and lootATMs in four countries grabbing $9 million in just a few hours International gangs spread maliciouscode that conscripts unwitting computers into zombie armies of hundreds of thousands of similarlyenslaved machines Criminals then rent these armies called botnets as easily as you can buy a time-sharing arrangement in a beach condo No wonder the vast majority of Internet traffic is spam

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3742

Yet the loss of personal information and related criminal fraud intolerable as they are are theleast threatening face of electronic insecurity The US militarys secret network is penetratedAmericans corporate pockets are being picked clean of the intellectual property that makes the UnitedStates tick And the electricity grid that keeps the lights on and makes everything move is dangerouslyinsecure

In one remote attack on the Pentagons information systems about 10 years ago the Chinesehauled away up to 20 terabytes of information If the information had been on paper theyd have neededa line of moving vans stretching from the Pentagon to freighters docked 50 miles away in Baltimoreharbor just to haul it away Had they done so the military district of Washington wouldve become anactive theater of operations for the first time since 1865 and the Navy wouldve blockaded theChesapeake Bay But the Chinese did it electronically so who noticed

Corporate espionage by both competitors and foreign intelligence services or their surrogates isalso increasing Intelligence officials see this but cant speak openly about the specifics and Im seeingit now in my law practice The victims rarely admit it for understandable reasons Oracle whichsuccessfully sued SAP for theft of its software code was a prominent exception Google was another

When the Chinese penetrated Google in late 2009 -- yes that operation was Chinese and yes itwas done with the blessing of a member of the Politburo -- they werent after customer informationThey were after the source code that makes Google unique Nor was Google the only victim Thousands

of US and Western firms were penetrated in that affair Foreign governments -- and not only theChinese -- understand that they cannot compete with the United States militarily and politically if theycannot compete with it economically so their intelligence services want to steal its corporate intellectualproperty This is the technology that gives America its competitive edge and often it has nothing to dowith defense Ordinary companies with valuable technology are now being targeted by nation-statesThis is a new era National security and economic security have converged

The danger is not limited to the loss of technology and information however The owners andoperators of the North American electricity grid are hooking up their control systems to the Internet asfast as they can Exposing the grid to the Internet makes it marginally more efficient but it also makes itdramatically more vulnerable to disruption If you can remotely penetrate an electronic system to stealinformation you can remotely penetrate it to shut it down or make it go haywire This is why there is no

longer a meaningful difference between information security and operational security And the biggestoperational risk is the grid In contemporary society nothing moves without electricity If the grid goesout the country stops

As the Stuxnet affair demonstrated remotely engineered disruption of industrial control systemsis now a reality That episode involved the successful electronic attack on the centrifuges in the Iraniannuclear program Only a first-class intelligence agency could have pulled that off but the blueprint fordoing it -- the code itself -- is now public Many American industrial control systems run on the samekind of equipment the Iranians were using but unlike the controls on the Iranian centrifuges thecontrols on the US grid are now being connected to the Internet making them easier to disrupt Stuxnetwas a watershed there will be copycats

Other industrial control systems will also be targets Some already are Air traffic control

railroad switches and water and sewage systems are all electronically controlled now and many arevulnerable If an intruder can break into the right server electronically he can remotely shut downproduction send your goods to the wrong destination and even unlock your doors -- and delete your logentries so he leaves no record of ever having been there

The United States does not lack enemies who would attack it this way Seized al Qaedacomputers contain details of US industrial control systems In 2003 a group affiliated with thePakistani terrorist organization Lashkar-e-Taiba -- the same gang that engineered the 2008 terroristassaults in Mumbai -- plotted to attack the Australian grid Other groups conspired to attack the Britishgrid in 2004 2006 and 2009 Yet the owners and operators of the North American grid continue willy-

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3842

nilly to expose their control systems to the Internet instead of isolating and hardening it This is folly of a high order

Important conclusions for public and corporate policy follow from this vulnerable state of

affairs First cyber insecurity has operational consequences In the current and foreseeable states of technology a high degree of assurance against electronic penetration of anything connected to theInternet is not achievable Large efficient electronically connected organizations and nations aretherefore vulnerable to remotely engineered disruption as well as information theft

Second this risk cannot be eliminated -- but it can be reduced and managed As a nation theUnited States should start by isolating the grids controls from the Internet Undoubtedly there aremarginal efficiencies to be gained by seamless connectivity over a publicly accessible infrastructure butthese gains are usually exaggerated and the risk this connectivity creates is staggering The governmentand the major telecommunications carriers must also make the investment required to re-create themassive redundancies that made the wired telephone network so robust Resilience and swift recoveryshould be the goal If the consequences of cyberattacks were reduced penetration would cease to matter

Third companies that wait for the government to solve their own security problems do so attheir peril The government is broke and the IT backbone is 85 percent private so the governmentdoesnt control it The governments role in altering the status quo will be limited to setting standardsusing its purchasing power to move vendors toward better security and getting its own house in order

The government can neither secure corporate intellectual property nor protect firms against operationaldisruption

Fourth in a world in which everything cannot be protected companies must determine forthemselves what intellectual property and physical assets to isolate and safeguard Those that approachthis task seriously will quickly learn that technology is only one aspect of their insecurity and in manycases the easiest to deal with Unless technology is integrated with personnel practices and operationalsecurity it opens vulnerabilities that its users rarely understand This kind of integration requires theautomated enforcement of reasonable security policies and systematic workforce training and thatoccurs only when management the lawyers and the technologists work closely together This is an old-fashioned management challenge -- not a technological one For their part corporate boards need to takeIT security seriously and launch audits that examine how their systems are actually implemented and

used not merely how they are designed Because as the techies like to put it the weakest link in anysystem is not the silicon-based unit on the desk its the carbon-based unit in the chair Joel Brenner is author of the forthcoming America the Vulnerable Inside the New Threat Matrix of

Digital Espionage Crime and Warfare He has served as the inspector general of the National Security

Agency the national counterintelligence executive and the NSAs senior counsel He now practices law

at Cooley LLP in Washington DC

Cyberattacks Decline Slightly Symantec Report Finds

Dark Reading | 1 September 2011

Organizations worldwide are suffering damages as a result of cyberattacks but interestingly there hasbeen a slight decline in these attacks during the past 12 months according to a new report from

Symantec More than 90 percent of the more than 3300 respondents across 36 countries said theyexperienced tangible losses as a result of a hack with 84 percent reporting financial loss to the cost of abreach Around one-fifth lost at least $195000 in breaches during the past 12 months

Meanwhile Symantec attributes the unexpected bright spot of a decline in breaches toorganizations employing better cybersecurity defenses More than 70 percent of organizations sawattacks in the past 12 months a decline of 5 percent from 2010 And those that experienced anincreasing frequency of attacks dropped from 29 percent in 2010 to 21 percent this year While 100percent last year reported losses from cyberattacks 92 percent did so in 2011 The trend seemscounterintuitive given the rash of high-profile breaches this year More

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 33: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3342

another out of joy People were in heaven because of these young men who destroyed America andbombed this idol Am I right or not Was it like that or not

Back then when the Taliban broke off a piece of the nose of the Buddha statue which was hewnin the mountain an entire sermon was dedicated to it in the mosque in Mecca and the preacher was laterreprimanded for this sermon The entire Saudi people supported and loved Al-Qaeda

This went on until our brothers in Al-Qaeda ndash and I dont know what was going through theirminds ndash began to carry out operations inside Saudi Arabia Thats when we all raised our hands andsaid Youve gone too far We wont support you in this

The atmosphere here in Saudi Arabia is one of extremism It is characterized by focusing onminor details Many things are forbidden Yes maybe they are indeed forbidden but by forcing peopleto avoid them and by acting as if these were major sins an atmosphere was created that gave rise toextremist youth who might act recklessly at the most trivial provocation

For instance we blew out of proportion the issue of music the issue of smoking or the issue of hanging pictures in public places True there are clear texts on these issues but the young peopleembraced these issues as if they were fighting usury fornication or alcohol No these are not among theseven major sins So our society has become extreme

This extremist atmosphere has given rise to people who accuse others of heresy and people whopurport to be waging Jihad It has created genes that gave rise to cells of Al-Qaeda and other terrorists

We must examine our breeding ground in which these young men were sownBy Allah what can possibly emerge from such an atmosphere Muftis who accuse others of

heresy sheiks who incite and young people who bomb Am I right or not[Complete clip is available here httpwwwmemritvorgclipen3099htm]

Legal Aspects amp Lawfare| back to top |

Revisiting A Stale Counterterrorism Law

Council on Foreign Relations | 1 September 2011

ldquoNearly a decade after 911 the United States still relies on the 2001 Authorization for the Use of Military Force (AUMF) for the killing and detention of those considered responsible for or associatedwith the terrorist attacks But CFR national security law expert John Bellinger says it is becomingincreasingly difficult for the Obama administration to justify some of its counterterrorism operationsunder this limited statutory authority It has been used in defense of actions including drone attacks onindividuals as well as the targeting of groups in Yemen and Somalia that may have only the mosttenuous affiliation or association to the 911 attack A revised AUMF should clarify those operations aswell as the issue of detention specifically which individuals can be detained for how long and subjectto what processes There also needs to be greater effort at the international level he adds to fill thegaps in the law that covers conflicts between states and non-state actorsrdquohelliprdquo[Complete article is available here httpwwwcfrorgcounterterrorismrevisiting-stale-

counterterrorism-lawp25742]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3442

Narco-Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector[Complete article is available here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Mexicos Cartels Move Into Extortion

At a construction site of an apartment building in the heart of the Mexican capital a company engineerruns through his weekly payroll sheet He has salaries written out for carpenters bricklayers andelectricians At the bottom of the sheet is a notation of $200 for ldquosecurity servicesrdquo next to a nicknameldquoEl Indiordquo mdash the Indian [Complete article is available here

httpwwwtucsonsentinelcomnationworldreport090611_mexico_cartels_bribesmexicos-cartels-move-into-extortion ]

Seven Die In Mexican Pacific Port City

Latin American Herald Tribune

Seven people died in separate shootings in Mazatlan a port city in the northwestern Mexican state of Sinaloa with some of the incidents drug-related a police spokesman told Efe [Complete article is available herehttpwwwlahtcomarticleaspCategoryId=14091ampArticleId=423061]

Tijuana Violence Slows As One Cartel Takes Control

BorderlandBeatcom

Mexicos famously seedy border city of Tijuana is enjoying a lull in drug murders as the countrys mostpowerful cartel gains the upper hand over its rivals [Complete article is available here httpwwwborderlandbeatcom201109tijuana-violence-slows-as-one-cartelhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3542

Network Notes| back to top |

Canadian data foreign threats Spying in the digital age (Suggested by a reader in Lithuania ndash thanks) Globe and Mail | By Colin Freeze 31 July 2010

A government spy agency thatrsquos prohibited from monitoring Canadian citizens is now usingldquoinformation about Canadiansrdquo to zero in on foreign threatsThe ambiguous statement found in a new government report detailing the activities of CommunicationsSecurity Establishment Canada could sanction a range of intelligence-gathering activities ndash includingthe controversial practice of mining ldquometadatardquo from digital communications

Metadata ndash often called data about data ndash are found in e-mails and their attachments and containdigital signatures that can reveal when where and by whom documents were created

The collection of metadata has caused controversy in other countries but never in Canada wherethe Communications Security Establishment Canada operates as an ultra-secretive agency About theonly thing that is known about the classified practices is that they were halted and resumed after someldquomajor changesrdquo including directives signed by Defence Minister Peter MacKay

ldquoI cannot comment on specific operational activitiesrdquo Adrian Simpson a CSEC spokesman toldThe Globe He stressed that reviews upheld that the activities in question were ldquocarried out inaccordance with the law ministerial requirements and CSECrsquos policies and proceduresrdquo

ldquoCSEC is prohibited from directing its activities at Canadians anyone in Canada or Canadiansanywhere in the worldrdquo he said

For decades signals-intelligence agencies in the West have been allowed to safeguard nationalsecurity by eavesdropping on foreignersrsquo conversations Spies can whatever phone lines and satellitesignals they can so long as they never listen in on fellow citizens

But in the digital age governments run increasingly sophisticated dragnets scooping up andscouring through millions of intercepted Internet conversations daily Such practices create legalambiguities

ldquoThe whole issue of what constitutes boundaries for signals-intelligence agencies in cyberspaceis a big debate right nowrdquo said Rafal Rohozinski a security expert affiliated with the University of Torontorsquos Munk School

A watchdog agency that reviews the CSECrsquos activities released an annual report to Parliament onJuly 20 ldquoWhen other means have been exhausted CSEC may use information about Canadians when it

has reasonable grounds to believe that using this information may assist in identifying and obtainingforeign intelligencerdquo it reads

Sometimes collecting metadata is relatively benign It can involve aggregating sets of data tospot trends much like the way meteorologists discern national forecasts from localized information

For example while CSEC canrsquot usually monitor the communications of specific Canadian terrorsuspects it can glean insights by zooming out for big-picture patterns One way to do that MrRohozinski said would be to look at data flows between Canadian cities and Yemen where an Internet-savvy al-Qaeda offshoot works to recruit Westerners

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3642

Metadata however can be more revealing Documents that circulate on the Internet travelaround like postmarked letters marked with return addresses ndash e-mails and attachments have embeddedcodes that speak to the who where and when behind their creation

The US National Security Agency found itself mired in controversy a few years go after itskirted domestic-spying bans by secretly upholding that this sort of American metadata was fair gamedistinct from communication contents

Therersquos little to suggest the CSEC would go that far The federal agencyrsquos activities are reviewedby a watchdog body now headed by a former Federal Court of Appeal judge Robert Deacutecary appointedlast year wrote in his annual report that he was satisfied the CSEC activities in question are lawful evenif his predecessors felt them borderline

ldquoThis was the first review of these activities since hellip their resumption under new policiesrdquo thewatchdogrsquos report says It concludes that the surveillance activities are ldquoin accordance with the lawrdquo andfollow ldquomajor changes to certain policies procedures and practicesrdquo

Much of the concern arises from the possibility that CSEC could hand over metadata intelligenceto domestic law-enforcement and security agencies

As it stands the RCMP and CSIS have to develop their domestic investigations before coming toCSEC ndash usually with warrants ndash if they want specific intelligence The rules guiding handovers are strictbecause even though all agencies run surveillance operations they do so under vastly different

mandates and legal standardsThe spy agency however stood by its practicesldquoCSEC is extremely diligent when it comes to the privacy of Canadiansrdquo Mr Simpson said

[complete article is available here httpwwwtheglobeandmailcomnewsnationalcanadian-data-foreign-threats-spying-in-the-digital-agearticle2113772 ]

Cyber Attacks Against NATO Then And Now

New Atlanticist | 6 September 2011

ldquoNow that NATOrsquos Operation UNIFIED PROTECTOR over Libya is winding down it is worth

noting how few cyber incidents were directed in protest against the Alliance Certainly there was a

cyber component to the liberation of Libya but it was more about content and Internet freedom (the

most newsworthy elements here were the role of social media and the Libyan government taking largeparts of the nation offline) But compared to past history NATO cyber defenders had a relatively easy

time

ldquoNATO has not however had an easy 2011 Although there were three significant incidents we

know about none seemed to have been in direct response to operations over Libyahelliprdquo

[Complete article is available here httpwwwacusorgnew_atlanticistcyber-attacks-against-nato-then-

and-now]

The Calm Before The Storm

Foreign Policy | By Joel Brenner 6 September 2011

Cyberwar is already happening -- and its about to get much much worse A veteran cyberwarriorexplains how America can prepare itself

Revelations of wholesale electronic fraud and massive data heists have become weekly evendaily affairs A multinational electronics corporation loses personal information on more than 100million customers Cyberthieves break into an international bank counterfeit credit balances and lootATMs in four countries grabbing $9 million in just a few hours International gangs spread maliciouscode that conscripts unwitting computers into zombie armies of hundreds of thousands of similarlyenslaved machines Criminals then rent these armies called botnets as easily as you can buy a time-sharing arrangement in a beach condo No wonder the vast majority of Internet traffic is spam

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3742

Yet the loss of personal information and related criminal fraud intolerable as they are are theleast threatening face of electronic insecurity The US militarys secret network is penetratedAmericans corporate pockets are being picked clean of the intellectual property that makes the UnitedStates tick And the electricity grid that keeps the lights on and makes everything move is dangerouslyinsecure

In one remote attack on the Pentagons information systems about 10 years ago the Chinesehauled away up to 20 terabytes of information If the information had been on paper theyd have neededa line of moving vans stretching from the Pentagon to freighters docked 50 miles away in Baltimoreharbor just to haul it away Had they done so the military district of Washington wouldve become anactive theater of operations for the first time since 1865 and the Navy wouldve blockaded theChesapeake Bay But the Chinese did it electronically so who noticed

Corporate espionage by both competitors and foreign intelligence services or their surrogates isalso increasing Intelligence officials see this but cant speak openly about the specifics and Im seeingit now in my law practice The victims rarely admit it for understandable reasons Oracle whichsuccessfully sued SAP for theft of its software code was a prominent exception Google was another

When the Chinese penetrated Google in late 2009 -- yes that operation was Chinese and yes itwas done with the blessing of a member of the Politburo -- they werent after customer informationThey were after the source code that makes Google unique Nor was Google the only victim Thousands

of US and Western firms were penetrated in that affair Foreign governments -- and not only theChinese -- understand that they cannot compete with the United States militarily and politically if theycannot compete with it economically so their intelligence services want to steal its corporate intellectualproperty This is the technology that gives America its competitive edge and often it has nothing to dowith defense Ordinary companies with valuable technology are now being targeted by nation-statesThis is a new era National security and economic security have converged

The danger is not limited to the loss of technology and information however The owners andoperators of the North American electricity grid are hooking up their control systems to the Internet asfast as they can Exposing the grid to the Internet makes it marginally more efficient but it also makes itdramatically more vulnerable to disruption If you can remotely penetrate an electronic system to stealinformation you can remotely penetrate it to shut it down or make it go haywire This is why there is no

longer a meaningful difference between information security and operational security And the biggestoperational risk is the grid In contemporary society nothing moves without electricity If the grid goesout the country stops

As the Stuxnet affair demonstrated remotely engineered disruption of industrial control systemsis now a reality That episode involved the successful electronic attack on the centrifuges in the Iraniannuclear program Only a first-class intelligence agency could have pulled that off but the blueprint fordoing it -- the code itself -- is now public Many American industrial control systems run on the samekind of equipment the Iranians were using but unlike the controls on the Iranian centrifuges thecontrols on the US grid are now being connected to the Internet making them easier to disrupt Stuxnetwas a watershed there will be copycats

Other industrial control systems will also be targets Some already are Air traffic control

railroad switches and water and sewage systems are all electronically controlled now and many arevulnerable If an intruder can break into the right server electronically he can remotely shut downproduction send your goods to the wrong destination and even unlock your doors -- and delete your logentries so he leaves no record of ever having been there

The United States does not lack enemies who would attack it this way Seized al Qaedacomputers contain details of US industrial control systems In 2003 a group affiliated with thePakistani terrorist organization Lashkar-e-Taiba -- the same gang that engineered the 2008 terroristassaults in Mumbai -- plotted to attack the Australian grid Other groups conspired to attack the Britishgrid in 2004 2006 and 2009 Yet the owners and operators of the North American grid continue willy-

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3842

nilly to expose their control systems to the Internet instead of isolating and hardening it This is folly of a high order

Important conclusions for public and corporate policy follow from this vulnerable state of

affairs First cyber insecurity has operational consequences In the current and foreseeable states of technology a high degree of assurance against electronic penetration of anything connected to theInternet is not achievable Large efficient electronically connected organizations and nations aretherefore vulnerable to remotely engineered disruption as well as information theft

Second this risk cannot be eliminated -- but it can be reduced and managed As a nation theUnited States should start by isolating the grids controls from the Internet Undoubtedly there aremarginal efficiencies to be gained by seamless connectivity over a publicly accessible infrastructure butthese gains are usually exaggerated and the risk this connectivity creates is staggering The governmentand the major telecommunications carriers must also make the investment required to re-create themassive redundancies that made the wired telephone network so robust Resilience and swift recoveryshould be the goal If the consequences of cyberattacks were reduced penetration would cease to matter

Third companies that wait for the government to solve their own security problems do so attheir peril The government is broke and the IT backbone is 85 percent private so the governmentdoesnt control it The governments role in altering the status quo will be limited to setting standardsusing its purchasing power to move vendors toward better security and getting its own house in order

The government can neither secure corporate intellectual property nor protect firms against operationaldisruption

Fourth in a world in which everything cannot be protected companies must determine forthemselves what intellectual property and physical assets to isolate and safeguard Those that approachthis task seriously will quickly learn that technology is only one aspect of their insecurity and in manycases the easiest to deal with Unless technology is integrated with personnel practices and operationalsecurity it opens vulnerabilities that its users rarely understand This kind of integration requires theautomated enforcement of reasonable security policies and systematic workforce training and thatoccurs only when management the lawyers and the technologists work closely together This is an old-fashioned management challenge -- not a technological one For their part corporate boards need to takeIT security seriously and launch audits that examine how their systems are actually implemented and

used not merely how they are designed Because as the techies like to put it the weakest link in anysystem is not the silicon-based unit on the desk its the carbon-based unit in the chair Joel Brenner is author of the forthcoming America the Vulnerable Inside the New Threat Matrix of

Digital Espionage Crime and Warfare He has served as the inspector general of the National Security

Agency the national counterintelligence executive and the NSAs senior counsel He now practices law

at Cooley LLP in Washington DC

Cyberattacks Decline Slightly Symantec Report Finds

Dark Reading | 1 September 2011

Organizations worldwide are suffering damages as a result of cyberattacks but interestingly there hasbeen a slight decline in these attacks during the past 12 months according to a new report from

Symantec More than 90 percent of the more than 3300 respondents across 36 countries said theyexperienced tangible losses as a result of a hack with 84 percent reporting financial loss to the cost of abreach Around one-fifth lost at least $195000 in breaches during the past 12 months

Meanwhile Symantec attributes the unexpected bright spot of a decline in breaches toorganizations employing better cybersecurity defenses More than 70 percent of organizations sawattacks in the past 12 months a decline of 5 percent from 2010 And those that experienced anincreasing frequency of attacks dropped from 29 percent in 2010 to 21 percent this year While 100percent last year reported losses from cyberattacks 92 percent did so in 2011 The trend seemscounterintuitive given the rash of high-profile breaches this year More

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 34: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3442

Narco-Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector[Complete article is available here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Mexicos Cartels Move Into Extortion

At a construction site of an apartment building in the heart of the Mexican capital a company engineerruns through his weekly payroll sheet He has salaries written out for carpenters bricklayers andelectricians At the bottom of the sheet is a notation of $200 for ldquosecurity servicesrdquo next to a nicknameldquoEl Indiordquo mdash the Indian [Complete article is available here

httpwwwtucsonsentinelcomnationworldreport090611_mexico_cartels_bribesmexicos-cartels-move-into-extortion ]

Seven Die In Mexican Pacific Port City

Latin American Herald Tribune

Seven people died in separate shootings in Mazatlan a port city in the northwestern Mexican state of Sinaloa with some of the incidents drug-related a police spokesman told Efe [Complete article is available herehttpwwwlahtcomarticleaspCategoryId=14091ampArticleId=423061]

Tijuana Violence Slows As One Cartel Takes Control

BorderlandBeatcom

Mexicos famously seedy border city of Tijuana is enjoying a lull in drug murders as the countrys mostpowerful cartel gains the upper hand over its rivals [Complete article is available here httpwwwborderlandbeatcom201109tijuana-violence-slows-as-one-cartelhtml]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3542

Network Notes| back to top |

Canadian data foreign threats Spying in the digital age (Suggested by a reader in Lithuania ndash thanks) Globe and Mail | By Colin Freeze 31 July 2010

A government spy agency thatrsquos prohibited from monitoring Canadian citizens is now usingldquoinformation about Canadiansrdquo to zero in on foreign threatsThe ambiguous statement found in a new government report detailing the activities of CommunicationsSecurity Establishment Canada could sanction a range of intelligence-gathering activities ndash includingthe controversial practice of mining ldquometadatardquo from digital communications

Metadata ndash often called data about data ndash are found in e-mails and their attachments and containdigital signatures that can reveal when where and by whom documents were created

The collection of metadata has caused controversy in other countries but never in Canada wherethe Communications Security Establishment Canada operates as an ultra-secretive agency About theonly thing that is known about the classified practices is that they were halted and resumed after someldquomajor changesrdquo including directives signed by Defence Minister Peter MacKay

ldquoI cannot comment on specific operational activitiesrdquo Adrian Simpson a CSEC spokesman toldThe Globe He stressed that reviews upheld that the activities in question were ldquocarried out inaccordance with the law ministerial requirements and CSECrsquos policies and proceduresrdquo

ldquoCSEC is prohibited from directing its activities at Canadians anyone in Canada or Canadiansanywhere in the worldrdquo he said

For decades signals-intelligence agencies in the West have been allowed to safeguard nationalsecurity by eavesdropping on foreignersrsquo conversations Spies can whatever phone lines and satellitesignals they can so long as they never listen in on fellow citizens

But in the digital age governments run increasingly sophisticated dragnets scooping up andscouring through millions of intercepted Internet conversations daily Such practices create legalambiguities

ldquoThe whole issue of what constitutes boundaries for signals-intelligence agencies in cyberspaceis a big debate right nowrdquo said Rafal Rohozinski a security expert affiliated with the University of Torontorsquos Munk School

A watchdog agency that reviews the CSECrsquos activities released an annual report to Parliament onJuly 20 ldquoWhen other means have been exhausted CSEC may use information about Canadians when it

has reasonable grounds to believe that using this information may assist in identifying and obtainingforeign intelligencerdquo it reads

Sometimes collecting metadata is relatively benign It can involve aggregating sets of data tospot trends much like the way meteorologists discern national forecasts from localized information

For example while CSEC canrsquot usually monitor the communications of specific Canadian terrorsuspects it can glean insights by zooming out for big-picture patterns One way to do that MrRohozinski said would be to look at data flows between Canadian cities and Yemen where an Internet-savvy al-Qaeda offshoot works to recruit Westerners

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3642

Metadata however can be more revealing Documents that circulate on the Internet travelaround like postmarked letters marked with return addresses ndash e-mails and attachments have embeddedcodes that speak to the who where and when behind their creation

The US National Security Agency found itself mired in controversy a few years go after itskirted domestic-spying bans by secretly upholding that this sort of American metadata was fair gamedistinct from communication contents

Therersquos little to suggest the CSEC would go that far The federal agencyrsquos activities are reviewedby a watchdog body now headed by a former Federal Court of Appeal judge Robert Deacutecary appointedlast year wrote in his annual report that he was satisfied the CSEC activities in question are lawful evenif his predecessors felt them borderline

ldquoThis was the first review of these activities since hellip their resumption under new policiesrdquo thewatchdogrsquos report says It concludes that the surveillance activities are ldquoin accordance with the lawrdquo andfollow ldquomajor changes to certain policies procedures and practicesrdquo

Much of the concern arises from the possibility that CSEC could hand over metadata intelligenceto domestic law-enforcement and security agencies

As it stands the RCMP and CSIS have to develop their domestic investigations before coming toCSEC ndash usually with warrants ndash if they want specific intelligence The rules guiding handovers are strictbecause even though all agencies run surveillance operations they do so under vastly different

mandates and legal standardsThe spy agency however stood by its practicesldquoCSEC is extremely diligent when it comes to the privacy of Canadiansrdquo Mr Simpson said

[complete article is available here httpwwwtheglobeandmailcomnewsnationalcanadian-data-foreign-threats-spying-in-the-digital-agearticle2113772 ]

Cyber Attacks Against NATO Then And Now

New Atlanticist | 6 September 2011

ldquoNow that NATOrsquos Operation UNIFIED PROTECTOR over Libya is winding down it is worth

noting how few cyber incidents were directed in protest against the Alliance Certainly there was a

cyber component to the liberation of Libya but it was more about content and Internet freedom (the

most newsworthy elements here were the role of social media and the Libyan government taking largeparts of the nation offline) But compared to past history NATO cyber defenders had a relatively easy

time

ldquoNATO has not however had an easy 2011 Although there were three significant incidents we

know about none seemed to have been in direct response to operations over Libyahelliprdquo

[Complete article is available here httpwwwacusorgnew_atlanticistcyber-attacks-against-nato-then-

and-now]

The Calm Before The Storm

Foreign Policy | By Joel Brenner 6 September 2011

Cyberwar is already happening -- and its about to get much much worse A veteran cyberwarriorexplains how America can prepare itself

Revelations of wholesale electronic fraud and massive data heists have become weekly evendaily affairs A multinational electronics corporation loses personal information on more than 100million customers Cyberthieves break into an international bank counterfeit credit balances and lootATMs in four countries grabbing $9 million in just a few hours International gangs spread maliciouscode that conscripts unwitting computers into zombie armies of hundreds of thousands of similarlyenslaved machines Criminals then rent these armies called botnets as easily as you can buy a time-sharing arrangement in a beach condo No wonder the vast majority of Internet traffic is spam

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3742

Yet the loss of personal information and related criminal fraud intolerable as they are are theleast threatening face of electronic insecurity The US militarys secret network is penetratedAmericans corporate pockets are being picked clean of the intellectual property that makes the UnitedStates tick And the electricity grid that keeps the lights on and makes everything move is dangerouslyinsecure

In one remote attack on the Pentagons information systems about 10 years ago the Chinesehauled away up to 20 terabytes of information If the information had been on paper theyd have neededa line of moving vans stretching from the Pentagon to freighters docked 50 miles away in Baltimoreharbor just to haul it away Had they done so the military district of Washington wouldve become anactive theater of operations for the first time since 1865 and the Navy wouldve blockaded theChesapeake Bay But the Chinese did it electronically so who noticed

Corporate espionage by both competitors and foreign intelligence services or their surrogates isalso increasing Intelligence officials see this but cant speak openly about the specifics and Im seeingit now in my law practice The victims rarely admit it for understandable reasons Oracle whichsuccessfully sued SAP for theft of its software code was a prominent exception Google was another

When the Chinese penetrated Google in late 2009 -- yes that operation was Chinese and yes itwas done with the blessing of a member of the Politburo -- they werent after customer informationThey were after the source code that makes Google unique Nor was Google the only victim Thousands

of US and Western firms were penetrated in that affair Foreign governments -- and not only theChinese -- understand that they cannot compete with the United States militarily and politically if theycannot compete with it economically so their intelligence services want to steal its corporate intellectualproperty This is the technology that gives America its competitive edge and often it has nothing to dowith defense Ordinary companies with valuable technology are now being targeted by nation-statesThis is a new era National security and economic security have converged

The danger is not limited to the loss of technology and information however The owners andoperators of the North American electricity grid are hooking up their control systems to the Internet asfast as they can Exposing the grid to the Internet makes it marginally more efficient but it also makes itdramatically more vulnerable to disruption If you can remotely penetrate an electronic system to stealinformation you can remotely penetrate it to shut it down or make it go haywire This is why there is no

longer a meaningful difference between information security and operational security And the biggestoperational risk is the grid In contemporary society nothing moves without electricity If the grid goesout the country stops

As the Stuxnet affair demonstrated remotely engineered disruption of industrial control systemsis now a reality That episode involved the successful electronic attack on the centrifuges in the Iraniannuclear program Only a first-class intelligence agency could have pulled that off but the blueprint fordoing it -- the code itself -- is now public Many American industrial control systems run on the samekind of equipment the Iranians were using but unlike the controls on the Iranian centrifuges thecontrols on the US grid are now being connected to the Internet making them easier to disrupt Stuxnetwas a watershed there will be copycats

Other industrial control systems will also be targets Some already are Air traffic control

railroad switches and water and sewage systems are all electronically controlled now and many arevulnerable If an intruder can break into the right server electronically he can remotely shut downproduction send your goods to the wrong destination and even unlock your doors -- and delete your logentries so he leaves no record of ever having been there

The United States does not lack enemies who would attack it this way Seized al Qaedacomputers contain details of US industrial control systems In 2003 a group affiliated with thePakistani terrorist organization Lashkar-e-Taiba -- the same gang that engineered the 2008 terroristassaults in Mumbai -- plotted to attack the Australian grid Other groups conspired to attack the Britishgrid in 2004 2006 and 2009 Yet the owners and operators of the North American grid continue willy-

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3842

nilly to expose their control systems to the Internet instead of isolating and hardening it This is folly of a high order

Important conclusions for public and corporate policy follow from this vulnerable state of

affairs First cyber insecurity has operational consequences In the current and foreseeable states of technology a high degree of assurance against electronic penetration of anything connected to theInternet is not achievable Large efficient electronically connected organizations and nations aretherefore vulnerable to remotely engineered disruption as well as information theft

Second this risk cannot be eliminated -- but it can be reduced and managed As a nation theUnited States should start by isolating the grids controls from the Internet Undoubtedly there aremarginal efficiencies to be gained by seamless connectivity over a publicly accessible infrastructure butthese gains are usually exaggerated and the risk this connectivity creates is staggering The governmentand the major telecommunications carriers must also make the investment required to re-create themassive redundancies that made the wired telephone network so robust Resilience and swift recoveryshould be the goal If the consequences of cyberattacks were reduced penetration would cease to matter

Third companies that wait for the government to solve their own security problems do so attheir peril The government is broke and the IT backbone is 85 percent private so the governmentdoesnt control it The governments role in altering the status quo will be limited to setting standardsusing its purchasing power to move vendors toward better security and getting its own house in order

The government can neither secure corporate intellectual property nor protect firms against operationaldisruption

Fourth in a world in which everything cannot be protected companies must determine forthemselves what intellectual property and physical assets to isolate and safeguard Those that approachthis task seriously will quickly learn that technology is only one aspect of their insecurity and in manycases the easiest to deal with Unless technology is integrated with personnel practices and operationalsecurity it opens vulnerabilities that its users rarely understand This kind of integration requires theautomated enforcement of reasonable security policies and systematic workforce training and thatoccurs only when management the lawyers and the technologists work closely together This is an old-fashioned management challenge -- not a technological one For their part corporate boards need to takeIT security seriously and launch audits that examine how their systems are actually implemented and

used not merely how they are designed Because as the techies like to put it the weakest link in anysystem is not the silicon-based unit on the desk its the carbon-based unit in the chair Joel Brenner is author of the forthcoming America the Vulnerable Inside the New Threat Matrix of

Digital Espionage Crime and Warfare He has served as the inspector general of the National Security

Agency the national counterintelligence executive and the NSAs senior counsel He now practices law

at Cooley LLP in Washington DC

Cyberattacks Decline Slightly Symantec Report Finds

Dark Reading | 1 September 2011

Organizations worldwide are suffering damages as a result of cyberattacks but interestingly there hasbeen a slight decline in these attacks during the past 12 months according to a new report from

Symantec More than 90 percent of the more than 3300 respondents across 36 countries said theyexperienced tangible losses as a result of a hack with 84 percent reporting financial loss to the cost of abreach Around one-fifth lost at least $195000 in breaches during the past 12 months

Meanwhile Symantec attributes the unexpected bright spot of a decline in breaches toorganizations employing better cybersecurity defenses More than 70 percent of organizations sawattacks in the past 12 months a decline of 5 percent from 2010 And those that experienced anincreasing frequency of attacks dropped from 29 percent in 2010 to 21 percent this year While 100percent last year reported losses from cyberattacks 92 percent did so in 2011 The trend seemscounterintuitive given the rash of high-profile breaches this year More

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 35: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3542

Network Notes| back to top |

Canadian data foreign threats Spying in the digital age (Suggested by a reader in Lithuania ndash thanks) Globe and Mail | By Colin Freeze 31 July 2010

A government spy agency thatrsquos prohibited from monitoring Canadian citizens is now usingldquoinformation about Canadiansrdquo to zero in on foreign threatsThe ambiguous statement found in a new government report detailing the activities of CommunicationsSecurity Establishment Canada could sanction a range of intelligence-gathering activities ndash includingthe controversial practice of mining ldquometadatardquo from digital communications

Metadata ndash often called data about data ndash are found in e-mails and their attachments and containdigital signatures that can reveal when where and by whom documents were created

The collection of metadata has caused controversy in other countries but never in Canada wherethe Communications Security Establishment Canada operates as an ultra-secretive agency About theonly thing that is known about the classified practices is that they were halted and resumed after someldquomajor changesrdquo including directives signed by Defence Minister Peter MacKay

ldquoI cannot comment on specific operational activitiesrdquo Adrian Simpson a CSEC spokesman toldThe Globe He stressed that reviews upheld that the activities in question were ldquocarried out inaccordance with the law ministerial requirements and CSECrsquos policies and proceduresrdquo

ldquoCSEC is prohibited from directing its activities at Canadians anyone in Canada or Canadiansanywhere in the worldrdquo he said

For decades signals-intelligence agencies in the West have been allowed to safeguard nationalsecurity by eavesdropping on foreignersrsquo conversations Spies can whatever phone lines and satellitesignals they can so long as they never listen in on fellow citizens

But in the digital age governments run increasingly sophisticated dragnets scooping up andscouring through millions of intercepted Internet conversations daily Such practices create legalambiguities

ldquoThe whole issue of what constitutes boundaries for signals-intelligence agencies in cyberspaceis a big debate right nowrdquo said Rafal Rohozinski a security expert affiliated with the University of Torontorsquos Munk School

A watchdog agency that reviews the CSECrsquos activities released an annual report to Parliament onJuly 20 ldquoWhen other means have been exhausted CSEC may use information about Canadians when it

has reasonable grounds to believe that using this information may assist in identifying and obtainingforeign intelligencerdquo it reads

Sometimes collecting metadata is relatively benign It can involve aggregating sets of data tospot trends much like the way meteorologists discern national forecasts from localized information

For example while CSEC canrsquot usually monitor the communications of specific Canadian terrorsuspects it can glean insights by zooming out for big-picture patterns One way to do that MrRohozinski said would be to look at data flows between Canadian cities and Yemen where an Internet-savvy al-Qaeda offshoot works to recruit Westerners

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3642

Metadata however can be more revealing Documents that circulate on the Internet travelaround like postmarked letters marked with return addresses ndash e-mails and attachments have embeddedcodes that speak to the who where and when behind their creation

The US National Security Agency found itself mired in controversy a few years go after itskirted domestic-spying bans by secretly upholding that this sort of American metadata was fair gamedistinct from communication contents

Therersquos little to suggest the CSEC would go that far The federal agencyrsquos activities are reviewedby a watchdog body now headed by a former Federal Court of Appeal judge Robert Deacutecary appointedlast year wrote in his annual report that he was satisfied the CSEC activities in question are lawful evenif his predecessors felt them borderline

ldquoThis was the first review of these activities since hellip their resumption under new policiesrdquo thewatchdogrsquos report says It concludes that the surveillance activities are ldquoin accordance with the lawrdquo andfollow ldquomajor changes to certain policies procedures and practicesrdquo

Much of the concern arises from the possibility that CSEC could hand over metadata intelligenceto domestic law-enforcement and security agencies

As it stands the RCMP and CSIS have to develop their domestic investigations before coming toCSEC ndash usually with warrants ndash if they want specific intelligence The rules guiding handovers are strictbecause even though all agencies run surveillance operations they do so under vastly different

mandates and legal standardsThe spy agency however stood by its practicesldquoCSEC is extremely diligent when it comes to the privacy of Canadiansrdquo Mr Simpson said

[complete article is available here httpwwwtheglobeandmailcomnewsnationalcanadian-data-foreign-threats-spying-in-the-digital-agearticle2113772 ]

Cyber Attacks Against NATO Then And Now

New Atlanticist | 6 September 2011

ldquoNow that NATOrsquos Operation UNIFIED PROTECTOR over Libya is winding down it is worth

noting how few cyber incidents were directed in protest against the Alliance Certainly there was a

cyber component to the liberation of Libya but it was more about content and Internet freedom (the

most newsworthy elements here were the role of social media and the Libyan government taking largeparts of the nation offline) But compared to past history NATO cyber defenders had a relatively easy

time

ldquoNATO has not however had an easy 2011 Although there were three significant incidents we

know about none seemed to have been in direct response to operations over Libyahelliprdquo

[Complete article is available here httpwwwacusorgnew_atlanticistcyber-attacks-against-nato-then-

and-now]

The Calm Before The Storm

Foreign Policy | By Joel Brenner 6 September 2011

Cyberwar is already happening -- and its about to get much much worse A veteran cyberwarriorexplains how America can prepare itself

Revelations of wholesale electronic fraud and massive data heists have become weekly evendaily affairs A multinational electronics corporation loses personal information on more than 100million customers Cyberthieves break into an international bank counterfeit credit balances and lootATMs in four countries grabbing $9 million in just a few hours International gangs spread maliciouscode that conscripts unwitting computers into zombie armies of hundreds of thousands of similarlyenslaved machines Criminals then rent these armies called botnets as easily as you can buy a time-sharing arrangement in a beach condo No wonder the vast majority of Internet traffic is spam

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3742

Yet the loss of personal information and related criminal fraud intolerable as they are are theleast threatening face of electronic insecurity The US militarys secret network is penetratedAmericans corporate pockets are being picked clean of the intellectual property that makes the UnitedStates tick And the electricity grid that keeps the lights on and makes everything move is dangerouslyinsecure

In one remote attack on the Pentagons information systems about 10 years ago the Chinesehauled away up to 20 terabytes of information If the information had been on paper theyd have neededa line of moving vans stretching from the Pentagon to freighters docked 50 miles away in Baltimoreharbor just to haul it away Had they done so the military district of Washington wouldve become anactive theater of operations for the first time since 1865 and the Navy wouldve blockaded theChesapeake Bay But the Chinese did it electronically so who noticed

Corporate espionage by both competitors and foreign intelligence services or their surrogates isalso increasing Intelligence officials see this but cant speak openly about the specifics and Im seeingit now in my law practice The victims rarely admit it for understandable reasons Oracle whichsuccessfully sued SAP for theft of its software code was a prominent exception Google was another

When the Chinese penetrated Google in late 2009 -- yes that operation was Chinese and yes itwas done with the blessing of a member of the Politburo -- they werent after customer informationThey were after the source code that makes Google unique Nor was Google the only victim Thousands

of US and Western firms were penetrated in that affair Foreign governments -- and not only theChinese -- understand that they cannot compete with the United States militarily and politically if theycannot compete with it economically so their intelligence services want to steal its corporate intellectualproperty This is the technology that gives America its competitive edge and often it has nothing to dowith defense Ordinary companies with valuable technology are now being targeted by nation-statesThis is a new era National security and economic security have converged

The danger is not limited to the loss of technology and information however The owners andoperators of the North American electricity grid are hooking up their control systems to the Internet asfast as they can Exposing the grid to the Internet makes it marginally more efficient but it also makes itdramatically more vulnerable to disruption If you can remotely penetrate an electronic system to stealinformation you can remotely penetrate it to shut it down or make it go haywire This is why there is no

longer a meaningful difference between information security and operational security And the biggestoperational risk is the grid In contemporary society nothing moves without electricity If the grid goesout the country stops

As the Stuxnet affair demonstrated remotely engineered disruption of industrial control systemsis now a reality That episode involved the successful electronic attack on the centrifuges in the Iraniannuclear program Only a first-class intelligence agency could have pulled that off but the blueprint fordoing it -- the code itself -- is now public Many American industrial control systems run on the samekind of equipment the Iranians were using but unlike the controls on the Iranian centrifuges thecontrols on the US grid are now being connected to the Internet making them easier to disrupt Stuxnetwas a watershed there will be copycats

Other industrial control systems will also be targets Some already are Air traffic control

railroad switches and water and sewage systems are all electronically controlled now and many arevulnerable If an intruder can break into the right server electronically he can remotely shut downproduction send your goods to the wrong destination and even unlock your doors -- and delete your logentries so he leaves no record of ever having been there

The United States does not lack enemies who would attack it this way Seized al Qaedacomputers contain details of US industrial control systems In 2003 a group affiliated with thePakistani terrorist organization Lashkar-e-Taiba -- the same gang that engineered the 2008 terroristassaults in Mumbai -- plotted to attack the Australian grid Other groups conspired to attack the Britishgrid in 2004 2006 and 2009 Yet the owners and operators of the North American grid continue willy-

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3842

nilly to expose their control systems to the Internet instead of isolating and hardening it This is folly of a high order

Important conclusions for public and corporate policy follow from this vulnerable state of

affairs First cyber insecurity has operational consequences In the current and foreseeable states of technology a high degree of assurance against electronic penetration of anything connected to theInternet is not achievable Large efficient electronically connected organizations and nations aretherefore vulnerable to remotely engineered disruption as well as information theft

Second this risk cannot be eliminated -- but it can be reduced and managed As a nation theUnited States should start by isolating the grids controls from the Internet Undoubtedly there aremarginal efficiencies to be gained by seamless connectivity over a publicly accessible infrastructure butthese gains are usually exaggerated and the risk this connectivity creates is staggering The governmentand the major telecommunications carriers must also make the investment required to re-create themassive redundancies that made the wired telephone network so robust Resilience and swift recoveryshould be the goal If the consequences of cyberattacks were reduced penetration would cease to matter

Third companies that wait for the government to solve their own security problems do so attheir peril The government is broke and the IT backbone is 85 percent private so the governmentdoesnt control it The governments role in altering the status quo will be limited to setting standardsusing its purchasing power to move vendors toward better security and getting its own house in order

The government can neither secure corporate intellectual property nor protect firms against operationaldisruption

Fourth in a world in which everything cannot be protected companies must determine forthemselves what intellectual property and physical assets to isolate and safeguard Those that approachthis task seriously will quickly learn that technology is only one aspect of their insecurity and in manycases the easiest to deal with Unless technology is integrated with personnel practices and operationalsecurity it opens vulnerabilities that its users rarely understand This kind of integration requires theautomated enforcement of reasonable security policies and systematic workforce training and thatoccurs only when management the lawyers and the technologists work closely together This is an old-fashioned management challenge -- not a technological one For their part corporate boards need to takeIT security seriously and launch audits that examine how their systems are actually implemented and

used not merely how they are designed Because as the techies like to put it the weakest link in anysystem is not the silicon-based unit on the desk its the carbon-based unit in the chair Joel Brenner is author of the forthcoming America the Vulnerable Inside the New Threat Matrix of

Digital Espionage Crime and Warfare He has served as the inspector general of the National Security

Agency the national counterintelligence executive and the NSAs senior counsel He now practices law

at Cooley LLP in Washington DC

Cyberattacks Decline Slightly Symantec Report Finds

Dark Reading | 1 September 2011

Organizations worldwide are suffering damages as a result of cyberattacks but interestingly there hasbeen a slight decline in these attacks during the past 12 months according to a new report from

Symantec More than 90 percent of the more than 3300 respondents across 36 countries said theyexperienced tangible losses as a result of a hack with 84 percent reporting financial loss to the cost of abreach Around one-fifth lost at least $195000 in breaches during the past 12 months

Meanwhile Symantec attributes the unexpected bright spot of a decline in breaches toorganizations employing better cybersecurity defenses More than 70 percent of organizations sawattacks in the past 12 months a decline of 5 percent from 2010 And those that experienced anincreasing frequency of attacks dropped from 29 percent in 2010 to 21 percent this year While 100percent last year reported losses from cyberattacks 92 percent did so in 2011 The trend seemscounterintuitive given the rash of high-profile breaches this year More

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 36: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3642

Metadata however can be more revealing Documents that circulate on the Internet travelaround like postmarked letters marked with return addresses ndash e-mails and attachments have embeddedcodes that speak to the who where and when behind their creation

The US National Security Agency found itself mired in controversy a few years go after itskirted domestic-spying bans by secretly upholding that this sort of American metadata was fair gamedistinct from communication contents

Therersquos little to suggest the CSEC would go that far The federal agencyrsquos activities are reviewedby a watchdog body now headed by a former Federal Court of Appeal judge Robert Deacutecary appointedlast year wrote in his annual report that he was satisfied the CSEC activities in question are lawful evenif his predecessors felt them borderline

ldquoThis was the first review of these activities since hellip their resumption under new policiesrdquo thewatchdogrsquos report says It concludes that the surveillance activities are ldquoin accordance with the lawrdquo andfollow ldquomajor changes to certain policies procedures and practicesrdquo

Much of the concern arises from the possibility that CSEC could hand over metadata intelligenceto domestic law-enforcement and security agencies

As it stands the RCMP and CSIS have to develop their domestic investigations before coming toCSEC ndash usually with warrants ndash if they want specific intelligence The rules guiding handovers are strictbecause even though all agencies run surveillance operations they do so under vastly different

mandates and legal standardsThe spy agency however stood by its practicesldquoCSEC is extremely diligent when it comes to the privacy of Canadiansrdquo Mr Simpson said

[complete article is available here httpwwwtheglobeandmailcomnewsnationalcanadian-data-foreign-threats-spying-in-the-digital-agearticle2113772 ]

Cyber Attacks Against NATO Then And Now

New Atlanticist | 6 September 2011

ldquoNow that NATOrsquos Operation UNIFIED PROTECTOR over Libya is winding down it is worth

noting how few cyber incidents were directed in protest against the Alliance Certainly there was a

cyber component to the liberation of Libya but it was more about content and Internet freedom (the

most newsworthy elements here were the role of social media and the Libyan government taking largeparts of the nation offline) But compared to past history NATO cyber defenders had a relatively easy

time

ldquoNATO has not however had an easy 2011 Although there were three significant incidents we

know about none seemed to have been in direct response to operations over Libyahelliprdquo

[Complete article is available here httpwwwacusorgnew_atlanticistcyber-attacks-against-nato-then-

and-now]

The Calm Before The Storm

Foreign Policy | By Joel Brenner 6 September 2011

Cyberwar is already happening -- and its about to get much much worse A veteran cyberwarriorexplains how America can prepare itself

Revelations of wholesale electronic fraud and massive data heists have become weekly evendaily affairs A multinational electronics corporation loses personal information on more than 100million customers Cyberthieves break into an international bank counterfeit credit balances and lootATMs in four countries grabbing $9 million in just a few hours International gangs spread maliciouscode that conscripts unwitting computers into zombie armies of hundreds of thousands of similarlyenslaved machines Criminals then rent these armies called botnets as easily as you can buy a time-sharing arrangement in a beach condo No wonder the vast majority of Internet traffic is spam

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3742

Yet the loss of personal information and related criminal fraud intolerable as they are are theleast threatening face of electronic insecurity The US militarys secret network is penetratedAmericans corporate pockets are being picked clean of the intellectual property that makes the UnitedStates tick And the electricity grid that keeps the lights on and makes everything move is dangerouslyinsecure

In one remote attack on the Pentagons information systems about 10 years ago the Chinesehauled away up to 20 terabytes of information If the information had been on paper theyd have neededa line of moving vans stretching from the Pentagon to freighters docked 50 miles away in Baltimoreharbor just to haul it away Had they done so the military district of Washington wouldve become anactive theater of operations for the first time since 1865 and the Navy wouldve blockaded theChesapeake Bay But the Chinese did it electronically so who noticed

Corporate espionage by both competitors and foreign intelligence services or their surrogates isalso increasing Intelligence officials see this but cant speak openly about the specifics and Im seeingit now in my law practice The victims rarely admit it for understandable reasons Oracle whichsuccessfully sued SAP for theft of its software code was a prominent exception Google was another

When the Chinese penetrated Google in late 2009 -- yes that operation was Chinese and yes itwas done with the blessing of a member of the Politburo -- they werent after customer informationThey were after the source code that makes Google unique Nor was Google the only victim Thousands

of US and Western firms were penetrated in that affair Foreign governments -- and not only theChinese -- understand that they cannot compete with the United States militarily and politically if theycannot compete with it economically so their intelligence services want to steal its corporate intellectualproperty This is the technology that gives America its competitive edge and often it has nothing to dowith defense Ordinary companies with valuable technology are now being targeted by nation-statesThis is a new era National security and economic security have converged

The danger is not limited to the loss of technology and information however The owners andoperators of the North American electricity grid are hooking up their control systems to the Internet asfast as they can Exposing the grid to the Internet makes it marginally more efficient but it also makes itdramatically more vulnerable to disruption If you can remotely penetrate an electronic system to stealinformation you can remotely penetrate it to shut it down or make it go haywire This is why there is no

longer a meaningful difference between information security and operational security And the biggestoperational risk is the grid In contemporary society nothing moves without electricity If the grid goesout the country stops

As the Stuxnet affair demonstrated remotely engineered disruption of industrial control systemsis now a reality That episode involved the successful electronic attack on the centrifuges in the Iraniannuclear program Only a first-class intelligence agency could have pulled that off but the blueprint fordoing it -- the code itself -- is now public Many American industrial control systems run on the samekind of equipment the Iranians were using but unlike the controls on the Iranian centrifuges thecontrols on the US grid are now being connected to the Internet making them easier to disrupt Stuxnetwas a watershed there will be copycats

Other industrial control systems will also be targets Some already are Air traffic control

railroad switches and water and sewage systems are all electronically controlled now and many arevulnerable If an intruder can break into the right server electronically he can remotely shut downproduction send your goods to the wrong destination and even unlock your doors -- and delete your logentries so he leaves no record of ever having been there

The United States does not lack enemies who would attack it this way Seized al Qaedacomputers contain details of US industrial control systems In 2003 a group affiliated with thePakistani terrorist organization Lashkar-e-Taiba -- the same gang that engineered the 2008 terroristassaults in Mumbai -- plotted to attack the Australian grid Other groups conspired to attack the Britishgrid in 2004 2006 and 2009 Yet the owners and operators of the North American grid continue willy-

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3842

nilly to expose their control systems to the Internet instead of isolating and hardening it This is folly of a high order

Important conclusions for public and corporate policy follow from this vulnerable state of

affairs First cyber insecurity has operational consequences In the current and foreseeable states of technology a high degree of assurance against electronic penetration of anything connected to theInternet is not achievable Large efficient electronically connected organizations and nations aretherefore vulnerable to remotely engineered disruption as well as information theft

Second this risk cannot be eliminated -- but it can be reduced and managed As a nation theUnited States should start by isolating the grids controls from the Internet Undoubtedly there aremarginal efficiencies to be gained by seamless connectivity over a publicly accessible infrastructure butthese gains are usually exaggerated and the risk this connectivity creates is staggering The governmentand the major telecommunications carriers must also make the investment required to re-create themassive redundancies that made the wired telephone network so robust Resilience and swift recoveryshould be the goal If the consequences of cyberattacks were reduced penetration would cease to matter

Third companies that wait for the government to solve their own security problems do so attheir peril The government is broke and the IT backbone is 85 percent private so the governmentdoesnt control it The governments role in altering the status quo will be limited to setting standardsusing its purchasing power to move vendors toward better security and getting its own house in order

The government can neither secure corporate intellectual property nor protect firms against operationaldisruption

Fourth in a world in which everything cannot be protected companies must determine forthemselves what intellectual property and physical assets to isolate and safeguard Those that approachthis task seriously will quickly learn that technology is only one aspect of their insecurity and in manycases the easiest to deal with Unless technology is integrated with personnel practices and operationalsecurity it opens vulnerabilities that its users rarely understand This kind of integration requires theautomated enforcement of reasonable security policies and systematic workforce training and thatoccurs only when management the lawyers and the technologists work closely together This is an old-fashioned management challenge -- not a technological one For their part corporate boards need to takeIT security seriously and launch audits that examine how their systems are actually implemented and

used not merely how they are designed Because as the techies like to put it the weakest link in anysystem is not the silicon-based unit on the desk its the carbon-based unit in the chair Joel Brenner is author of the forthcoming America the Vulnerable Inside the New Threat Matrix of

Digital Espionage Crime and Warfare He has served as the inspector general of the National Security

Agency the national counterintelligence executive and the NSAs senior counsel He now practices law

at Cooley LLP in Washington DC

Cyberattacks Decline Slightly Symantec Report Finds

Dark Reading | 1 September 2011

Organizations worldwide are suffering damages as a result of cyberattacks but interestingly there hasbeen a slight decline in these attacks during the past 12 months according to a new report from

Symantec More than 90 percent of the more than 3300 respondents across 36 countries said theyexperienced tangible losses as a result of a hack with 84 percent reporting financial loss to the cost of abreach Around one-fifth lost at least $195000 in breaches during the past 12 months

Meanwhile Symantec attributes the unexpected bright spot of a decline in breaches toorganizations employing better cybersecurity defenses More than 70 percent of organizations sawattacks in the past 12 months a decline of 5 percent from 2010 And those that experienced anincreasing frequency of attacks dropped from 29 percent in 2010 to 21 percent this year While 100percent last year reported losses from cyberattacks 92 percent did so in 2011 The trend seemscounterintuitive given the rash of high-profile breaches this year More

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 37: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3742

Yet the loss of personal information and related criminal fraud intolerable as they are are theleast threatening face of electronic insecurity The US militarys secret network is penetratedAmericans corporate pockets are being picked clean of the intellectual property that makes the UnitedStates tick And the electricity grid that keeps the lights on and makes everything move is dangerouslyinsecure

In one remote attack on the Pentagons information systems about 10 years ago the Chinesehauled away up to 20 terabytes of information If the information had been on paper theyd have neededa line of moving vans stretching from the Pentagon to freighters docked 50 miles away in Baltimoreharbor just to haul it away Had they done so the military district of Washington wouldve become anactive theater of operations for the first time since 1865 and the Navy wouldve blockaded theChesapeake Bay But the Chinese did it electronically so who noticed

Corporate espionage by both competitors and foreign intelligence services or their surrogates isalso increasing Intelligence officials see this but cant speak openly about the specifics and Im seeingit now in my law practice The victims rarely admit it for understandable reasons Oracle whichsuccessfully sued SAP for theft of its software code was a prominent exception Google was another

When the Chinese penetrated Google in late 2009 -- yes that operation was Chinese and yes itwas done with the blessing of a member of the Politburo -- they werent after customer informationThey were after the source code that makes Google unique Nor was Google the only victim Thousands

of US and Western firms were penetrated in that affair Foreign governments -- and not only theChinese -- understand that they cannot compete with the United States militarily and politically if theycannot compete with it economically so their intelligence services want to steal its corporate intellectualproperty This is the technology that gives America its competitive edge and often it has nothing to dowith defense Ordinary companies with valuable technology are now being targeted by nation-statesThis is a new era National security and economic security have converged

The danger is not limited to the loss of technology and information however The owners andoperators of the North American electricity grid are hooking up their control systems to the Internet asfast as they can Exposing the grid to the Internet makes it marginally more efficient but it also makes itdramatically more vulnerable to disruption If you can remotely penetrate an electronic system to stealinformation you can remotely penetrate it to shut it down or make it go haywire This is why there is no

longer a meaningful difference between information security and operational security And the biggestoperational risk is the grid In contemporary society nothing moves without electricity If the grid goesout the country stops

As the Stuxnet affair demonstrated remotely engineered disruption of industrial control systemsis now a reality That episode involved the successful electronic attack on the centrifuges in the Iraniannuclear program Only a first-class intelligence agency could have pulled that off but the blueprint fordoing it -- the code itself -- is now public Many American industrial control systems run on the samekind of equipment the Iranians were using but unlike the controls on the Iranian centrifuges thecontrols on the US grid are now being connected to the Internet making them easier to disrupt Stuxnetwas a watershed there will be copycats

Other industrial control systems will also be targets Some already are Air traffic control

railroad switches and water and sewage systems are all electronically controlled now and many arevulnerable If an intruder can break into the right server electronically he can remotely shut downproduction send your goods to the wrong destination and even unlock your doors -- and delete your logentries so he leaves no record of ever having been there

The United States does not lack enemies who would attack it this way Seized al Qaedacomputers contain details of US industrial control systems In 2003 a group affiliated with thePakistani terrorist organization Lashkar-e-Taiba -- the same gang that engineered the 2008 terroristassaults in Mumbai -- plotted to attack the Australian grid Other groups conspired to attack the Britishgrid in 2004 2006 and 2009 Yet the owners and operators of the North American grid continue willy-

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3842

nilly to expose their control systems to the Internet instead of isolating and hardening it This is folly of a high order

Important conclusions for public and corporate policy follow from this vulnerable state of

affairs First cyber insecurity has operational consequences In the current and foreseeable states of technology a high degree of assurance against electronic penetration of anything connected to theInternet is not achievable Large efficient electronically connected organizations and nations aretherefore vulnerable to remotely engineered disruption as well as information theft

Second this risk cannot be eliminated -- but it can be reduced and managed As a nation theUnited States should start by isolating the grids controls from the Internet Undoubtedly there aremarginal efficiencies to be gained by seamless connectivity over a publicly accessible infrastructure butthese gains are usually exaggerated and the risk this connectivity creates is staggering The governmentand the major telecommunications carriers must also make the investment required to re-create themassive redundancies that made the wired telephone network so robust Resilience and swift recoveryshould be the goal If the consequences of cyberattacks were reduced penetration would cease to matter

Third companies that wait for the government to solve their own security problems do so attheir peril The government is broke and the IT backbone is 85 percent private so the governmentdoesnt control it The governments role in altering the status quo will be limited to setting standardsusing its purchasing power to move vendors toward better security and getting its own house in order

The government can neither secure corporate intellectual property nor protect firms against operationaldisruption

Fourth in a world in which everything cannot be protected companies must determine forthemselves what intellectual property and physical assets to isolate and safeguard Those that approachthis task seriously will quickly learn that technology is only one aspect of their insecurity and in manycases the easiest to deal with Unless technology is integrated with personnel practices and operationalsecurity it opens vulnerabilities that its users rarely understand This kind of integration requires theautomated enforcement of reasonable security policies and systematic workforce training and thatoccurs only when management the lawyers and the technologists work closely together This is an old-fashioned management challenge -- not a technological one For their part corporate boards need to takeIT security seriously and launch audits that examine how their systems are actually implemented and

used not merely how they are designed Because as the techies like to put it the weakest link in anysystem is not the silicon-based unit on the desk its the carbon-based unit in the chair Joel Brenner is author of the forthcoming America the Vulnerable Inside the New Threat Matrix of

Digital Espionage Crime and Warfare He has served as the inspector general of the National Security

Agency the national counterintelligence executive and the NSAs senior counsel He now practices law

at Cooley LLP in Washington DC

Cyberattacks Decline Slightly Symantec Report Finds

Dark Reading | 1 September 2011

Organizations worldwide are suffering damages as a result of cyberattacks but interestingly there hasbeen a slight decline in these attacks during the past 12 months according to a new report from

Symantec More than 90 percent of the more than 3300 respondents across 36 countries said theyexperienced tangible losses as a result of a hack with 84 percent reporting financial loss to the cost of abreach Around one-fifth lost at least $195000 in breaches during the past 12 months

Meanwhile Symantec attributes the unexpected bright spot of a decline in breaches toorganizations employing better cybersecurity defenses More than 70 percent of organizations sawattacks in the past 12 months a decline of 5 percent from 2010 And those that experienced anincreasing frequency of attacks dropped from 29 percent in 2010 to 21 percent this year While 100percent last year reported losses from cyberattacks 92 percent did so in 2011 The trend seemscounterintuitive given the rash of high-profile breaches this year More

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 38: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3842

nilly to expose their control systems to the Internet instead of isolating and hardening it This is folly of a high order

Important conclusions for public and corporate policy follow from this vulnerable state of

affairs First cyber insecurity has operational consequences In the current and foreseeable states of technology a high degree of assurance against electronic penetration of anything connected to theInternet is not achievable Large efficient electronically connected organizations and nations aretherefore vulnerable to remotely engineered disruption as well as information theft

Second this risk cannot be eliminated -- but it can be reduced and managed As a nation theUnited States should start by isolating the grids controls from the Internet Undoubtedly there aremarginal efficiencies to be gained by seamless connectivity over a publicly accessible infrastructure butthese gains are usually exaggerated and the risk this connectivity creates is staggering The governmentand the major telecommunications carriers must also make the investment required to re-create themassive redundancies that made the wired telephone network so robust Resilience and swift recoveryshould be the goal If the consequences of cyberattacks were reduced penetration would cease to matter

Third companies that wait for the government to solve their own security problems do so attheir peril The government is broke and the IT backbone is 85 percent private so the governmentdoesnt control it The governments role in altering the status quo will be limited to setting standardsusing its purchasing power to move vendors toward better security and getting its own house in order

The government can neither secure corporate intellectual property nor protect firms against operationaldisruption

Fourth in a world in which everything cannot be protected companies must determine forthemselves what intellectual property and physical assets to isolate and safeguard Those that approachthis task seriously will quickly learn that technology is only one aspect of their insecurity and in manycases the easiest to deal with Unless technology is integrated with personnel practices and operationalsecurity it opens vulnerabilities that its users rarely understand This kind of integration requires theautomated enforcement of reasonable security policies and systematic workforce training and thatoccurs only when management the lawyers and the technologists work closely together This is an old-fashioned management challenge -- not a technological one For their part corporate boards need to takeIT security seriously and launch audits that examine how their systems are actually implemented and

used not merely how they are designed Because as the techies like to put it the weakest link in anysystem is not the silicon-based unit on the desk its the carbon-based unit in the chair Joel Brenner is author of the forthcoming America the Vulnerable Inside the New Threat Matrix of

Digital Espionage Crime and Warfare He has served as the inspector general of the National Security

Agency the national counterintelligence executive and the NSAs senior counsel He now practices law

at Cooley LLP in Washington DC

Cyberattacks Decline Slightly Symantec Report Finds

Dark Reading | 1 September 2011

Organizations worldwide are suffering damages as a result of cyberattacks but interestingly there hasbeen a slight decline in these attacks during the past 12 months according to a new report from

Symantec More than 90 percent of the more than 3300 respondents across 36 countries said theyexperienced tangible losses as a result of a hack with 84 percent reporting financial loss to the cost of abreach Around one-fifth lost at least $195000 in breaches during the past 12 months

Meanwhile Symantec attributes the unexpected bright spot of a decline in breaches toorganizations employing better cybersecurity defenses More than 70 percent of organizations sawattacks in the past 12 months a decline of 5 percent from 2010 And those that experienced anincreasing frequency of attacks dropped from 29 percent in 2010 to 21 percent this year While 100percent last year reported losses from cyberattacks 92 percent did so in 2011 The trend seemscounterintuitive given the rash of high-profile breaches this year More

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 39: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 3942

Hackers Steal SSL Certificates for CIA MI6 Mossad

ComputerWorld | 4 September 2011

The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500including ones for intelligence services like the CIA the UKs MI6 and Israels Mossad a Mozilladeveloper said Sunday

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at531 said Gervase Markham a Mozilla developer who is part of the team that has been working tomodify Firefox to block all sites signed with the purloined certificates

Among the affected domains said Markham are those for the CIA MI6 Mossad MicrosoftYahoo Skype Facebook Twitter and Microsofts Windows Update service

Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIAgov Iwonder if the US gov will pay attention to this mess Christopher Soghoian a Washington DC-basedresearcher noted for his work on online privacy said in a tweet Saturday[Article continues herehttpwwwcomputerworldcomsarticle9219727Hackers_steal_SSL_certificates_for_CIA_MI6_MossadtaxonomyId=85]

DOD Works To Boost Smartphone Security

AFPS | 29 August 2011As the Defense Department seeks innovation made possible by smartphones and other mobilecomputing platforms its also working to ensure DOD users of those devices employ them securely adefense official said

Because of the pervasiveness of the [mobile computing] market everyone has one everyonewants one but we often dont look at how the device works - we take it home and start loading pictureson it Robert E Young division chief of outreach and communications for the Defense-wideInformation Assurance Program said during a recent interview with the Pentagon Channel andAmerican Forces Press Service

We do want this innovation in the Department of Defense so we dont want to say no he addedbut we want to do it safely and securely

Issues that concern the department Young said include the huge memory capacities of some of the new smart devices and users general lack of knowledge about how smartphones and tablets work and how they could be compromised

With all the different operating systems out there Young said every patch every updatechanges each device and the vulnerabilities within [and users] are going to have to weigh that risk

Young said the department is evaluating how people are really using the devices - whethertheyre using smartphones to check email or tablets to read memorandums or policies

What are you doing with the device Is the camera disabled are you taking pictures of people Itake a picture of you I upload it and now youre tagged and all of a sudden everyone knows where youare So it leads to a digital footprint that connects to the device - anywhere anytime any device he said

In a split-second its up and online he added And once on the net - always on the net

Part of the answer is to educate and raise mobile technology awareness for military membersDODs civilian workforce and their families Young said

As part of this effort he added the department is taking a cohesive approach to adopting mobiletechnology

We have a Commercial Mobile Device Working Group and we take best practices from [theDefense Advanced Research Projects Agency] the [Intelligence Advanced Research Projects Activity]and from our intelligence community partners and share information Young said[Article continues here httpwwwdefensegovnewsnewsarticleaspxid=65182]

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 40: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4042

Science and Technology| back to top |

Stealth Boat Could Revolutionize Naval Warfare

NBCDFW | 30 August 2011

A stealth boat that moves through water at high speeds and with near invisibility could revolutionize theNavys ability to carry out special operations on water

The craft called The Ghost moves by generating a layer of gas around submerged surfacesgreatly reducing friction Its unique design makes it ideal for special operations according toDiscoveryNews The ship can reach speeds of 60 miles per hour and has a shape designed to reduce itsvisibility to radar similar to the Navys Sea Shadow project of the 1980s

Gregory Sancoff president and chief executive officer of Juliet Marine said the USgovernment is interested and his company is working with a defense contractor to build a 150-footmodel The friction reducing gas technology called supercavitation works by generating a low-pressurezone around the ships surface

The Ghost keeps a low radar profile the same way stealth planes do by making the radar wavesbounce off of its surface

Sancoff said The Ghost is ideal for missions close to coasts such as getting special operationsteams into and out of areas quickly It could also be deployed against pirates and even used to attack onaircraft carriers and destroyers[Article continues here httpwwwnbcdfwcomnewstechStealth-Boat-Could-Revolutionize-Naval-Warfare-128682913html]

WMD Terrorism| back to top |

FARC Step Up Extortion Multinationals Targeted

InsightCrimeorg

The recent arrest of the FARCs alleged extortion mastermind is shows that the guerrillas are intent onexpanding a revenue stream which will make Colombias government very nervous the extortion of multinational companies with a special focus on the oil sector [Article continues here httpwwwinsightcrimeorginsight-latest-newsitem1515-farc-step-up-extortion-multinationals-targeted]

Education| back to top |

To Defeat Terrorists Start Using The Library Scott Helfstein

Scott Helfstein - Aug 30 2011The information glut that marks the 21st century is evidenced in some unexpected places Last

month my organization the Combating Terrorism Center at West Point released a report that sharplydisputed conventional wisdom about terrorism along the Afghanistan-Pakistani frontier

The report argued that the Haqqani Network a border- spanning tribal group with deep ties toPakistanrsquos government had been more influential than the Taliban in aiding al-Qaedarsquos rise How didwe support this thesis which has vast implications for reconciliation efforts in the region as well as forthe distribution of US military aid Not with data culled from clandestine operations in Pakistanrsquostribal areas or from Osama bin Ladenrsquos computer hard drive The report was based on the publicstatements and writings of individual extremists over the past 30 years Rather than ferreting out secretinformation researchers merely took extremists at their voluminous word

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 41: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4142

It seems terrorists too are susceptible to the syndrome known as Too Much InformationThe revolution in information technology has opened a new vein of intelligence collection and

analysis that in many instances can prove more useful than traditional forms of spycraft In the world of espionage information and the clandestine means of gathering it are both treasured ldquoOpen sourcerdquointelligence by contrast is a commodity with little inherent value Instead the capacity to organize andanalyze these public streams of information becomes a key asset This represents a drastic shift with far-reaching implications for intelligence agencies

Google Intelligence

In another recent effort the Combating Terrorism Center used Google Trends -- hardly a cloak-and-dagger operation -- to assess the popularity of the Muslim Brotherhood in the midst of the Egyptianuprisings In the US fears of the Brotherhoodrsquos Islamist agenda dominated public discussion Not so inEgypt where Google Trends indicated that during the revolution Internet searches for non-Brotherhoodpolitical figures dwarfed those for the Brotherhood

Do such open-source data provide scientific proof of public consciousness No but theychallenge hard-baked conventional wisdom and provide a corrective to guesswork By tapping the opensource of Google Trends we threw light on a complex mass phenomenon for which traditionalintelligence gathering was ill- suited

Google Trends is just one tool available to open-source analysts with new information cachesconstantly emerging Technological platforms such as search engines and social networks receive atremendous amount of attention but they are among a multitude of sources Newspapers magazinesblogs news websites radio and television interviews can be just as valuable

In 2009 we surveyed Arabic-language news to produce a report on victims of al-Qaeda violenceThe results showed that 85 percent of the casualties were citizens of Muslim-majority nations Thatsimple exercise in data collection and analysis sparked a valuable debate in Muslim countries about thetactics goals and morality of the terrorist organization In a battle for hearts and minds thatrsquos a powerfuleffect Al-Qaeda spokesman Adam Gadahn took the report seriously enough to respond publiclydefending his organization

Capturing and organizing thousands of Twitter messages or conversation streams from hundreds

of social networks requires language competency and the analytical skills to draw conclusions fromlarge unstructured data sources The report on al-Qaedarsquos violence was coded and analyzed by just threepeople Some open-source collection and analysis can be very labor- intensive though there is anincreasing array of technological tools to help They havenrsquot surpassed the capacity of trainedindividuals but they do represent a new frontier of intelligence gathering one that is worthy of investment

Understanding Libya

In some cases open source may be the only means of gathering intelligence particularly in closedsocieties where repressive governments rely on networks of informants to cultivate fear and stiflecommunication When civil violence broke out in Libya the intelligence community struggled to keep

pace with the complex political cross-currents of secular Islamic and radical factions In many cases thelocal and international news media became the best real-time information sources

Open-source analysis has its limits A few years back a team of mathematical and computermodelers used such data to predict the location of Bin Laden Their analysis placed him far from hisactual compound in Abbottabad Pakistan In such tactical and operational matters secret intelligenceplays a far more important role In the future however as digital media social networking and cameraphones proliferate leveraging open-source channels will grow even more important US intelligenceagencies should reorient their budgets personnel and operations to properly exploit them The world istelling us much Itrsquos wise to listen

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t

Page 42: 2011 September 8 - PTSS Journal

832019 2011 September 8 - PTSS Journal

httpslidepdfcomreaderfull2011-september-8-ptss-journal 4242

Scott Helfstein is director of research for the Combating Terrorism Center at West Point and provides

advice on international affairs in the public and private sectors The opinions expressed are his own

and not those of the US Military Academy the Army or the Department of Defense )

[Complete report is available here httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020Haqqani20httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-2020httpwwwctcusmaedupoststhe-haqqani-nexus-and-the-evolution-of-al-qaidaTo contact the author of this article Scott Helfstein at scotthelfsteingmailcom]

Events| back to top |

NNootthhiinngg ttoo rreeppoorrtt ttooddaayy

Counterterrorism Humor Who Would Have Guessed| back to top |

FAIR USE NOTICE All original content andor articles and graphics in this message are copyrighted unless specifically noted otherwise All rights to thesecopyrighted items are reserved Articles and graphics have been placed within for educational and discussion purposes only in compliance with Fair Usecriteria established in Section 107 of the Copyright Act of 1976 The principle of Fair Use was established as law by Section 107 of The Copyright Act of 1976 Fair Use legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of displayinclude criticism comment news reporting teaching scholarship and research Section 107 establishes four criteria for determining whether the use of awork in any particular case qualifies as a fair use A work used does not necessarily have to satisfy all four criteria to qualify as an instance of fair useR th f i i d t i d b th ll t t t hi h th it d k d d t b t ti ll ti f th it i i th i t t lit If i h t