Connect with us

Intelligence

Is the Islamic Caliphate State (Dawlat al-Khilafah al-Islamiyah) Islamic?

Published

on

The Islamic Caliphate State is the fourth stage in the development of an Islamic Jihadi terrorist group. Historically, there was the Jama’at al-Tawhid wal-Jihad (the uniqueness and Jihad group), established by Abu Mus’ab al-Zarqawi, Jordanian citizen with a Palestinian identity.

Al-Zarqawi promised once he achieve these goals, he would establish an “Islamic Emirate.” In June 2006, Abu Mus’ab al-Zarqawi was killed, and Abu Ayub al-Masri (Abu Hamzah al-Muhajir), an Egyptian citizen, took his place and established the Dawlat al-Islam fil-Iraq (the Islamic State in Iraq=ISI). Its military leader was Abu ‘Umar al-Baghdadi. In April 2010, both al-Masri and al-Baghdadi were killed, and Abu Bakr al-Baghdadi took the leadership of the Islamic State in Iraq.

In April 2013 al-Baghdadi decided to withdraw from al-Qaeda and to expand his organization’s name from the Islamic State in Iraq (ISI) to the Islamic State in Iraq and greater Syria (al-Dawlah al-Islamiyah fil-Iraq wal-Sham=Da’esh, ISIS). On June 29th 2014, al-Baghdadi has coroneted himself as Caliph Ibrahim, Amir al-Mu’minin, being a descendent of Prophet Muhammad. He also declared the establishment of the Islamic Caliphate State (ICS), with the aim to topple down Arab-Islamic regimes, as the first stage. From that date on, there is no longer ISIS or ISIL or DAESH, but ICS. Those who continue to define it with these names, prove the inability to understand the situation and the complexities posed by this organization.

Who or what is ICS?

It is a Salafi-Takfiri organization characterized by an un-selective Jihad terrorist operations with the aim of bringing back the 7th century Islamic rule of the Fourth Califs (al-Khulafa’ al-Rashidun) as the ideal Islamic rule to humanity. At the end of 2015, it has become the largest and strongest Islamic Organizations with more than fifty Islamic groupings operating under its leadership, a proto-state that has representations in at least thirty states in the Middle East, Africa and Asia. It has become the most important and influential non-state player in the entire international relations, and its political influence is perhaps more dangerous than its operational, being an attractive model of imitation for the Muslim believers.

Western political leaders, the media and the cultural-academic elite do not understand the situation. Every time there is a Jihad attack, they respond in the same routine way: Islam is the religion of peace, and Muslims are in fact not extremists. This reality is confusing and embarrassing: how does one determine this when the subject itself says he is Islamic and all his declarations, behavior, ideology and acts are Islamic? Something is really deeply odd, let alone confusing and embarrassing, relating to this issue when it comes to Islam. Western leaders are determined never to connect the dots and never to declare the obvious.

Construct and organization

ICS is an Islamic Salafī-Takfīrī organization that takes its ideology from Islam and acts exactly according to Islamic teachings. It is Islamic in its character, ideology, and objectives. Its political system and its governmental branches are purely Islamic. The flag, the anthem, and the rulings are all in accordance to Islamic teaching. They abide by Islamic commandments and they use a religious Islamic counseling. ICS has state symbols: a flag; passport; maps of political objectives; coin, and all other parameters of states. Most important is the educational system based on the Madrasah Islamic framework. It runs the political economic and social governmental machinery exactly according to the Islamic teachings.

Its uppermost religious-political institute is Majlis al-Shûra lil-Mujāhidīn, the religious Counseling Council that dictates their activity. It confirms, after studying the Islamic Scriptures, the horrific executions and slaughtering of the infidels, confirm by Fatawā, Islamic religious rulings. There is Majlis al-Sharī’ah, the Constitutional Council that deals with the constitutional, security, finance, and general administration aspects. There is also al-Majlis al-‘Askari, the Military Council, the central body of the military activity and operations.

Beheadings and massacres

Two verses from the Qur’an call to behead the Kuffār whenever and wherever they are. Sûrat Muhammad, 47:4, declares: “So when you clash with the infidels smite their necks until you overpower them… until war shall have come to an end.” Sûrat al-Anfāl, 8:12, declares: “I shall fill the hearts of the infidels with terror. So strike off their heads on their necks and every fingertips.” ICS also follows the Qur’anic teachings that terrorizing Islamic enemies brings success to the Muslims, since Allah commands acts of terror against the infidels. Sûrat al-‘Imrān, 3:151, declares: “We shall strike terror into the hearts of the infidels… Hell is their residence…” Sûrat al-Anfāl, 8:12, declares: I shall fill the hearts of the infidels with terror…” Sûrat al-Anfāl, 8:60, declares: “Prepare against them whatever arms and cavalry you can muster, that you may strike terror in the enemies of Allah and your own…” Sûrat al-Hashr, 59:2, declares: “Allah came upon the people of the Book, and filled their hearts with terror.”

ICS also follows Muhammad’s example who ordered the execution by beheading of seven hundred men of the Jewish Banu Qurayza tribe in Medina. There are also many other examples of Muhammad’s orders to behead the enemy of Islam, appear in his biography by Ibn Ishāq, The life of Muhammad. Crucifixion is another part of beheadings. ICS members love chopping the heads off while their victims are crucified. By that they follow the Qur’an (Sûrat al Mā’idah, 5:33). Muslims are to fight the infidels, as Allah heals the hearts of the believers (Sûrat al-Taubah, 9:14–6).

Khalid Ibn al-Walid is one of the uppermost heroes and models of ICS. During the first internal war, the Ridda, in 632–3, he beheaded, burned and massacred all those tribes, men, women, children and the elderly, who left Islam after Muhammad’s death. For his utmost cruelty, he received an honorary name: Sayf al-Islām, the sword of Islam. In 633 he massacred and beheaded tens of thousands of Persian prisoners in the battle of the Red River, in Southern Persia. It was him who declared at the battle of Yarmuk, year 636: “we are a people who drink blood, and we know that there is no blood more delicious than the Byzantine blood.” Following that, one of ICS members, named Khalid (!) has eaten the heart of a Syrian soldier.

There are more. The Umayyad dynasty have massacred and beheaded all the clan of Ali’s family, including little babies. The Umayyad themselves where all massacred by Abbas Dynasty in 750. The Ottoman Empire used the most horrific inhuman acts of massacres and beheadings in the occupation of Constantinople and Athens. They operate the first modern genocide of the Armenians and the Greeks. What the Muslims done to the Buddhists in India is one of the darkest chapters in human history.

ICS follows these examples by herding and marching off hundreds and thousands of male hostages each time, where they shoot them in the head and throw them into the river one by one; or when they put them on lines and in trenches the victims dig, and shoot them by machine guns. However, what the Islamic Caliphate State members love extremely most is all kind of beheadings, with small knives, and then cheerfully show the heads, play football with the heads, or pile them in the main streets and roundabouts. They also educate their youth, ordering small kids to learn the profession of beheading or shooting. It is all done while quoting verses from the Qur’an that justify the massacre and shouting “Allāhu Akbar” against the infidels.

The Islamic hostility to the Cross is an unwavering fact of life, one that is very much indicative of Islam’s innate hostility to Christianity. It has started with Muhammad’s repugnance to the Cross who called it piece of idolatry; it has continued with the “Pact of Umar” which forbade the display of the Crosses, and it has culminated to a new peak with the ICS members slaughtering men on the cross. In their “communiques to the West” ICS leaders have declared: “We will conquer Rome, break your crosses, and enslave your women… we will cast terror into the hearts of the cross worshippers.” In Libya, one of Islamic Caliphate State leaders has declared: “We will fight you until Jesus descends, breaks the cross, and kills the pig.”

ICS members are excellent narrators. The main idea is to legitimize beheadings, slavery, and gang-rape by reference to Islamic history and theology, being a powerful narrative of Jihād Fī-Sabīlillāh. Moreover, beheadings are done by the use of the most important Islamic weapon, the sword, with the symbolism of blood ritual. On February 3, 2015, ICS has released a video claiming to show horrifying burning of the captured Jordanian pilot, Maaz al-Kassasbeh. The video is entitled, “Healing the Believers Chests,” a slogan taken from the Qur’an (Sûrat al-Taubah, 9:14). The basis for this is Muhammad’s declaration from the Hadith (Sahīh Bukhārī, 1:11:626).

The problem is not with Muslims, as they clearly and utterly declare their objectives and how to obtain them. They don’t hide behind, and they reveal their world mindset openly. The problem is exactly with the West that does not wish even to discuss the situation concerning Islam and Muslims. It is not a sign of tolerance when one deliberately silences himself against reality; is it rational when one artificially differentiates between Islam as a peaceful religion and “extremists” who high-jacked Islam? Doesn’t it show that we have lost our freedoms purposely and consciously and that we are in a deep state of intimidation in front of the villain?

Slavery and rape

The enslavement of infidel women for sexual purposes is central aspect of Islamic civilization, from the Qur’an, the highest scriptural authority, to Muhammad, the ultimate role model for all Muslims. It constitutes a central part in Islamic history as much as to current events in “Islamic Tribal Anarchic Winter,” mistakenly called “Arab Spring.” Islamic sex slavery is religiously sanctioned by the Sharī’ah. The mainstream of Islamic jurisprudence has justified and supported this practice on the basis of Islam’s canonical sources, including Muhammad’s own example and teaching.

The Sharī’ah, permits the enslavement, selling, and rape of infidel women captured during Jihad wars, being legitimately gained booty, “what your right hand possess” (Sûrat al-Nisā’, 4:3). Sex-rape of captive women was very common during Islamic history and it was performed frequently, as these slave-concubines were considered equivalent to animals. The grammar use of the word “Ma” in this context relate to things or animals, not to human beings. Muslim exegetes agree that once a true Islamic State is established, those living in Dār al-Harb have no rights to their life or their wealth. Therefore, Muslims are allowed to go to these nations and take their wealth and to keep their women as slaves.

As it is against Islam to rape Muslim women, it is permitted, even encouraged to rape all others captured. In the battle of Hunain, the Muslims were reluctant to have intercourse with the female captives in the presence of their husbands who were infidels. So Allah sent down the Qur’anic verse (Sûrat al-Nisā’, 4:24). This verse relieved the Muslims of this restraint by giving them permission to have sex with captive women, at all conditions, even if the women were already married. Abd-al-Hamid Siddiqui, the translator of Sahīh Muslim (8:3433), commented on this tradition, saying: When women are taken captive, their previous marriages are automatically annulled. Sexual intercourse with these women is lawful. The women of the Banu Mustaliq were sold into slavery following their rape. They were “excellent Arab women, and we desired them” (Sahīh Muslim, 8:3371). The prophet of Islam, his companions, and the Muslims used war to collect women for personal sexual use and for slave trading.

An article published in Foreign Policy in September 2014, begins with: “Of the many terrifying stories emerging from Islamic State-occupied Iraq and Syria, the violence directed toward women is perhaps the most difficult to contemplate.” This perhaps sums up the entire issue. It is arguable whether it is more horrifying than beheadings and mutilations in public with sadistic pictures of the victims posted online. It is arguable whether it is more intimidating than herding thousands of infidels and cold-bloodedly shooting them just for the fun of it, while shouting “Allāhu Akbar.” It is arguable whether it is more abhorring than forcing religious minorities to convert to Islam, while showing crucified men. Still, the reality of women, tortured, raped, sold to slavery of very short miserable life is humiliating.

Although sexual violence, enslavement, and rape were the most generic atrocity committed during wars in history, common to all cultures and civilizations, ICS wholly based its activities on Islamic law. These women being desired spoils of war are treated not only like animals, but their short living miserable life is worth less than animals, when the slavery marketplace is full of fresh flesh.

Islamic law makes crystal clear that conquered infidel sex slaves are one of the rewards for those waging Jihad. It is in the Sharī’ah, whom Muslims are ordered to totally emulate, and it is a common fixture of Islamic history. Majid Khadduri explained the idea of “spoils:”

The term spoil (Ghanīma) is applied specifically to property acquired by force from non-Muslims. It includes, however, not only property (movable and immovable) but also persons, whether in the capacity of asra (prisoners of war) or sabi (women and children), If the slave were a woman, the master was permitted to have sexual connection with her as a concubine.

In the fourth edition of the magazine Dabiq, ICS promotes sex slavery as an Islamic practice that conforms to the teaching and example of Muhammad and his companions, and in fact Islamic history. Slavery and young girls’ sex-trade is common now in its occupied territories. It is recorded that the price of each Captured Yazidi girl is $12. An investigation done by Clarion Project reveals that forty-two Yazidi girls were sold by the ICS in Syria for 2000 dollars. At the end of 2014 the slave market in Iraq was by age: A woman aged thirty to forty cost $63; girls aged ten to twenty were priced at $126; girls from one to nine were sold for $168. As ICS members take new towns also in Syria, the market of sex-slavery girls is routine and commonplace.

The horrific thing is that ICS has openly established, organized, and institutionalized a state-sanctioned system of sexual slavery. It is not intended to be a temporary war-time tactics, but a peace-time Islamic institution. It is to recall that contrary to historical evidence, this is not the “usual” women-rape and abuse perpetrated during wars all along history. This is exactly the Islamic tradition to take booty from the vanquished, and it is a deliberate tactic to demolish and degrade the enemy, the infidels, through organized slavery and women rape.

Members of ICS regularly declare that according to Islam they are allowed to rape the Kuffār. This is ‘Ibādah, a way of worshipping Allah. The systematic rape of women and girls has become deeply enmeshed in the organization and the radical theology of the Islamic State. Yazidi women and girls who escaped the Islamic State, and the examination of the group’s official communications, illuminate how the practice has been enshrined in the group’s core tenets. It has developed a detailed bureaucracy of sex slavery and trade slavery. This is a “theology of rape,” an integral part of the doctrine and practice of all along the Islamic history and reproduced in the ICS. One has also to recall, there is no male rapist in Islam but seducing woman, whose penalty is death by stoning.

Sheikh Yasir al-‘Ajlawni states that Muslims fighting to topple the regime of the infidel, Bashar Assad in Syria are permitted to capture and have sex with all non-Sunni women, including Shia Muslims, Alawites, Christians, Druze, and Yazidis. The same approach comes from Boko Haram, the Nigerian Islamic organization that performs horrific atrocities like the ICS. Its leader also believes that Allah permits the Mujāhidīn to enjoy free sex slavery, after abducting three hundred “infidel” schoolgirls to be sold in the sex slave market.

One can also relates to the issues of crime and punishment to examine the similarities between ICS and the law of Islam, according to the Sharī’ah. The punishment for blasphemy (insulting Allah, Muhammad, and the religion of Islam) is death. The punishment of adultery (if marries) is death by stoning, and if not married 100 lashes. The punishment of slender and drinking alcohol is 80 lashes. The Punishment of stealing is amputation of hand. The punishment of banditry (theft) is amputation of hand and foot. The punishment of murder in banditry is death by crucifixion.  

Summary

One can conclude the issue in one sentence: ICS is the top model of Islam and Islamic teachings. So ingrained in violence in the religion that Islam has never really stopped being at war either with other religions or with itself. Muhammad inspired the Muslims to battle the infidels promising all desires in this world and the Hereafter, and threatened them with Hell if they did not. Muslims were laying siege to towns; massacring its men, raping and enslaving their women; enslaving and converting their children; and taking the property of others. Fighting, violence booty, women enslavement, and rape is the main of Arab-Islamic political culture through history. This is exactly how ICS acts and behaves.

The refusal of Western political leaders, the media, and the cultural elite to open their eyes to reality and protect Western nations from ICS is one of the biggest betrayal. Boko Haram leader also believes that Allah permits the Mujāhidin to slaughter and behead all the infidels, and to enjoy free sex slavery.

Indeed, the Islamic Caliphate State is Islamic. It follows Islam and acts according to Islam. To say it is not Islam is exactly to say the Nazi ideology was not Germany, or the Shinto was not Japanese, or that Islam does not exist as a political religion. ICS is the great winner in contemporary international relations, and the free world contributes the lion’s share to this success by denying its connection to Islam and by not willing to fight it seriously.

Continue Reading
Comments

Intelligence

9-11 Terrorist Attack: Defensive countermeasures of deter and detect

Bob Budahl

Published

on

On September 11, 2001 at 8:46 a.m. an airliner slammed into the North Tower of the World Trade Center in New York City. At 9:03 a.m. a 2nd airliner slammed into the South Tower. The planes carried thousands of gallons of jet-fuel aboard in effect making them lethal weapons. Tens of thousands of people worked in these buildings daily and both buildings fell to the ground within 90 minutes. More than 2,600 people died in the World Trade Center tower attacks. Then at 9:37 a.m. a 3rd airliner rammed into the western side of the Pentagon. 125 people died in the Pentagon attack. And a 4thairliner was intended for attack in either the U.S. Capitol or White House but the heroics of passengers crashed the plane, hence thwarting the attack. A total of 256 people died in the four planes. The death toll even surpassed the Pearl Harbor attacks of 1941.

Those responsible for the horrific attack were 19 Arabs carrying out Islamist extremists plans. Their headquarters were located in Afghanistan. They were resourceful and some had lived in the United States for some time and four of them had trained to be pilots. They were not well educated. They carried out the terrible attacks with knives, cutters, mace, etc. And they had tried to bring down the World Trade Center in 1993 but failed however in the result killed six people and wounded a thousand. It was an effort led by Ramzi Yousef. Others including Omar Abdel Rahman who had plans to blow up the Lincoln and Holland tunnels and other New York City landmarks, but they were arrested. Ramzi Yousef and others had various other terror plans of which some succeeded and some fortunately did not.

Bin Ladin was known and thought to be a financier but not thought of as a terrorist leader until later. In 1998 Bin Ladin and four others issued a fatwa in which it was publicly declaring it was God’s order that Muslims should try to kill any American they could. Bin Ladin was a wealthy Saudi and had conducted jihadist activities against the Soviet Union. But he also held grievances against the United States such as a U.S. troop presence in Saudi Arabia. He recruited and trained followers in Afghanistan and continued carrying out acts of terror, including on the United States. His people attacked embassies, hotels, and even attempted to sink the USS Cole Navy Ship by a terrorist attack. His rhetoric is derived from Islam, history and the economic and political disorder in the area. He formed an alliance between the al Qaeda group he led and the Taliban. The Clinton administration had tried cruise missile strikes against al Qaeda in Afghanistan and tried to get the Taliban to force Bin Ladin to leave Afghanistan. The U.S. unsuccessfully utilized CIA paid foreign agents to try to capture or kill Bin Ladin and his group.

As early as 1998 or 1999 Bin Ladin had been contacted by Khalid Sheikh Mohammed with an idea of using the planes as a method of attacking the World Trade Center and other targets. The original plans were for 10 planes to target both east and west coasts of the United States. The CIA did uncover some reports of Bin Ladin’s intent on attacks. The U.S. continued its disruption attempts globally and also utilized diplomacy with countries. The “predator drone” was eventually fitted with a missile should an attack on Bin Ladin provide an opportunity. Some of the reasons and connections to the actions of the perpetrators of the planned 9-11 terrorist attack became apparent after the attack. Unrest had come to the surface in the time before the attack as the Taliban leader opposed attacking the United States, in contrast to Bin Ladin’s wishes.

On 9/11 the terrorists were successful in hijacking the four planes. The planes were being used as terrorist weapons and confusion was present with air control. But eventually the FAA and NORAD who controlled airspace did receive a “shoot down order” but it was after the plane in Pennsylvania had been forced down by passengers in the only way to stop the plane from being used as a weapon.      

The enactment of the United States “Patriot Act” removed barriers that had impeded terrorism investigations in their outlay, scope and means. And in effect sped up the investigation and prosecution of the defendants. The FBI was point on the investigation that followed the attack and the operation was named Operation PENTTBOM. At one time more than half of the FBI’s personnel worked on the case. They followed through on more than one-half million leads. It was the largest crime scene in the FBI’s history.  Also in the time period following the 9/11 attack the Department of Homeland Security was created in March 2003, which brought together 22 separate agencies and offices into a Cabinet level department. The 9/11 Commission had made several recommendations and in this report some details are brought forward. These would be included under the defensive counterintelligence support mode of operation and include the principles of deter and detect within the countermeasures. It included recognizing 72 fusion centers throughout the country which acts as a focal point for receipt, analysis and sharing of threat related information. Also establishing related training and informational programs to deal with threats. One such example is the National Terrorism Advisory System. And the DHS developed and implemented a risk-based transportation security strategy. An action taken such as strengthening airline passenger’s pre-screening and targeting terrorist travel will deter terrorists as they become aware of increased security measures and thwart terrorists from attempting to board airlines for terrorist activities. The airliner’s cabin cockpit doors have been hardened post-911 and Air Marshalls are used appropriately as well as some flight crew being eligible to carry firearms. The TSA behavior detection officers use non-intrusive behavior observation to identify people who may be high risk. The TSA also utilizes detection methods such as canine teams to sniff for explosives on passengers and in luggage. Post 9/11 all cargo on U.S. planes is screened commensurate with their checked luggage. The flights coming into the U.S. from foreign countries are required to provide information prior to departure and checks all passengers against watch lists the government utilizes such as the Secure Flight Program. It also increases efficiency by allowing those cross-checked with biometrics to have expedited travel.

Today a significant defensive countermeasure post-911 is that airlines now screen all checked and carry-on baggage for explosives. The U.S. has increased security of U.S. borders and identification documents. Certain areas are closely watched and critical security improvements along the Northern and maritime are emplaced. The Dept. Of Homeland Security has taken aggressive action to enhance the security of the nation’s infrastructure and also cyber infrastructure and networks. There in a federal government system cyber intrusion detection system which includes EINSTEIN and the National Cybersecurity and communications integration center is the nation’s hub for organizing cyber response efforts. DHS and DOD are working together to protect against threats to military and civilian computer systems and networks. This is another example of defensive countermeasures. DNDO is affiliated with nuclear detection and back in 2003 only 68% of arriving trucks and passenger vehicles were scanned along the northern border with no system on the southwest border. But today the systems scan 100% of all containerized cargo and personal vehicles arriving in the U.S. through land port of entries and up to 99% of sea containers. Counter-proliferation of nuclear and biological threats is a high priority of the DHS. The tragic occurrence of 9-11 has brought about real focus on the danger of leaving vulnerabilities open to exploitation. The DHS also has importantly increased efforts to track and disrupt terrorist financing through programs such as ECTF or Electronic Crimes Task Force.

Another action taken post-9/11 was the creation of the National Counterterrorism Center or NCTC which was to serve 5 functions which were; Threat Analysis, Identity Management, Information sharing, Strategic Operational Planning and National Intelligence Management.

The U.S. Department of Justice charged ZACARIAS MOUSSAOUI with numerous terrorism charges and indicates others involved in the terrorist acts. The United States Department of Defense obtained a video tape of Bin Ladin basically accepting responsibility of the 9-11 attacks and the DOD has a transcript of the video and a portion I will quote is as follows. UBL refers to Osama Bin Ladin: “UBL: The brothers, who conducted the operation, all they knew was that they have a martyrdom operation and we asked each of them to go to America but they didn’t know anything about the operation, not even one letter.  But they were trained and we did not reveal the operation to them until they are there and just before they boarded the planes.UBL: (…inaudible…) then he said: Those who were trained to fly didn’t know the others.”

Bin Ladin, America’s most wanted terrorist was killed by United States Special Forces in a compound in Pakistan on May 2, 2011. The CIA had been involved in investigating Bin Ladin for years.      

Continue Reading

Intelligence

Counterintelligence Threat Brief for Turkey

Bob Budahl

Published

on

I will provide a Counterintelligence threat brief on traditional and non-traditional Counterintelligence threats to non-security cleared individuals who are traveling to Turkey as business travelers or for personal reasons. MIT, the official Turkey intelligence agency is active. And non-traditional threats also exist as Turkey includes diverse elements of persons from different Muslim nations. Some of which include terrorist groups with their main base of operation located in a different country but also operating within Turkey. As seen in EurAsia Review, conflicts that were usually based on national interests today are based typically on non-national interests such as ethnicity, religion and culture. Asymmetric warfare rather than having a clear issue now has several. And a weaker enemy will use it strengths against a superior adversaries weaknesses.

Using OSINT (Open Source Intelligence) to conduct my research I uncovered motive for Turkey seeking intelligence from the United States. Turkey is a NATO ally and an American ally. However, that is the crux of their relationship. It has never encompassed social and economic theology. They are predominately a Muslim country and have disagreements about many aspects of wars and conflicts that the US had interests in such as Iraq and Syria. Turkey targets Kurd fighters in Syria while we support them. And they opposed the action President Trump put in place of recognizing Jerusalem as Israel’s Capitol. There is a great amount of suspicion and mistrust regarding the failed coup of President Erdoğan. And Fethullah Gülen, the suspected leader of the attempted coup resides in the United States and refuses to extradite him. They believe Gulen is responsible for the assassination of Russian ambassador Andrey Karlov. They have typically bought US military products and technology but have made a deal with Russia to purchase an advanced missile defense system. Andrew Brunson who is an American Pastor is being held and faces spying charges and thus far efforts to release him are unsuccessful. They are suspicious of everyone. They will not hesitate to leverage information acquired through their intelligence services from the United States or any source. Turkey has long been thought of as torn between the East and West. In Turkey if you access the internet via a local ISP they can install spyware on your computer that can control it. Charter Schools are being targeted by Turkey since Gulen was instrumental in them and that tie is enough for Erdogan to lash out. MIT-Turkey’s intelligence agency places agents in journalist positions as cover which often leads to someone divulging information that is considered private.

If Turkey has decided to spy on you it probably originates from passport screening. Some things that a US visitor should be aware of are to self-assess if you could be thought of as a terrorist, narcotics trafficker or criminal. Black market activity. Do not be caught with suspicious or incriminating luggage. Do not identify known associations that Turkey may find incriminating. They may utilize any of these ways to recruit you as an asset of theirs. Usually direct and indirect activities used in conducting their intelligence operations are non-threatening and unobtrusive. Beware of local laws and customs as one example is in Turkey derogatory comments regarding government and its leaders are prohibited. It may be illegal to use insulting language.

Information Turkey may covet and target from a target such as a defense contractor non-intelligence employee may include customer data, employee data, vendor information, pricing strategies, propriety information, technical plans, corporate strategies, financials, computer access protocols, acquisition strategies, investment date, business directories of phone and emails. They may be subtle and use elicitation to gain information slowly and by gaining your trust. Be alert for tips. Throw them off their own game by asking why they ask. Refer them to public sources if specifically targeted questions are posed. Or say you cannot discuss it or just do not know. Examples of things I would consider for combating their intelligence collection efforts are to use rental electronic devices. Disable the Wi-Fi. And on the flight travel with the device as carry-on luggage. Do not use foreign storage devices in your devices. Do not leave documents and information in your hotel room. Do not use the hotel safe. Select your own cab.

But sometimes harassment incidents are utilized and obviously are meant to intimidate or test a US citizen’s reactions. If harassment is selected to be used on a prospective recruit it can be used in a variety of means.

Continue Reading

Intelligence

Yom Kippur War Intelligence Failure

Bob Budahl

Published

on

The Yom Kippur War intelligence failures were broad and to the highest level of government and military within Israel. They misperceived themselves as being free and safe of attack from the Arabs, at least in the near and current future. The Israelis were confidant an attack would only occur along the perimeters in which they themselves perceived the Arabs may attack, which they believed to be in the distant future. Israel felt that such an attack was bound to fail and thus preventing the Arabs from initiating an attack. Israel had let down their guard and therefore were surprised by the timing of the attack, the method of attack and also the place of the attack. Few military parallels are found as great as the strategic surprise Egypt and Syria enjoyed on October 6, 1973.

Information divulged years later is that King Hussein of Jordan made a visit September 25, 1973 to Israel and met with the Prime Minister and gave his assessment that Egypt and Syria were about to attack Israel. Warning was not heeded as the attack took place October 6, 1973. And importantly Jordan itself had been involved in former wars itself with Israel so their motivation for informing them of an impending attack was suspicious from the Israelis’ view. Skeptics argue that Hussein disavowed giving warning to Israel during this visit. Hussein had hoped that the warning would influence the Israeli Prime Minister to make changes and progress with the Arabs and avoid a costly war. Israel’s intelligence officer dismissed Hussein’s claim and believed that the Arabs were too weak to attack. Also believed by the Israelis is that the Arabs would not fight a war they knew they would lose. This may be a key point as to misperception as the Arab’s initially in the war obtained their objectives and possibly in their view set the course right from the “1967 War” in which they lost territory. Egypt’s Sadat even made a trip to Saudi Arabia before the war and made a plea that if the United States resupplied Israel during the war for Saudi Arabia to emplace an oil embargo on the United States to exert influence. The CIA passed a report on September 30th to the Israelis which was sourced to King Hussein which elaborated on what he had previously told the Prime Minister. By September Syria had received Soviet SAM’s and other equipment and were ready for war. The Soviets removed dependents of advisors and diplomats from Egypt and Syria October 5th.Israel suffered 2,656 dead and 7,250 wounded in the battle.

The Israeli armed forces were reliant on reservists which made up a large portion of Israel’s armed forces. In order to prove successful time was needed in times of attack to mobilize and move them from civilian life and emplace these personnel into a war-time theater of operation. As such, Israel put much effort into developing their intelligence services into the elite force for which much trust was given by the country to provide the warning it needs to prepare for war.With the failure of fore-warning to Israelis’ the Arab’s controlled the early moves in the war and brought initial success which they desired and in effect changed the balance of power within the Middle East away from Israel’s advantage.

Egypt and Syria’s attack on October 6, 1973 occurred at 14:00 hours which caught the IDF off guard and Israel’s military and political leaders did not understand a war was about to break out until 18:00, which was too late. The Commission investigating the intelligence failure indicated three reasons for the mistake. The first reason involved two assumptions in which Egypt would conduct air strikes deep into Israel against its air force before starting a war and the other assumption was Syria would not go full-scale war unless Egypt was in action against the Israelis already. The 2ndreasonwas a major mistake as Military Intelligence had guaranteed that they would be able to provide adequate advance warning of any attack and they did not do so. The 3rd reason is the intelligence services basically dismissed the adversaries’ forces buildups as either defensive or an exercise. Prime Minister Gold Meir and the Defense Minister Moshe Dayan concluded full mobilization was not necessary early on and they only placed the standing army on full alert.

To lend support to Israelis’ perception that attack was not probable at least not in the near future there is evidence and facts that the Arab’s did successfully employ deception methods on Israel as well as on the United States. The Arabs had been open to Dr. Kissinger’s peace negotiation in September 1973 and even planted items in a Lebanese newspaper about neglect and deterioration of equipment from the Soviet Union within the Suez Canal area. A very good synopsis which perhaps lends Israeli a sympathetic path is that estimating intentions are one of the most difficult and yet crucial element within intelligence. One may use hard evidence. If the evidence is incomplete it is more difficult to determine intention. Technology has advanced greatly in later years which makes a surprise attack much more difficult to achieve with the presence of advanced IMINT and SIGINT.

Is the current state of counterintelligence in the Intelligence Community adequate?

In regard to whether the state of counterintelligence within the Intelligence Community is adequate today one can best assume counterintelligence is a forever changing, evolving, assessment and reactive process of making sure our capabilities are up to date with the current world intelligence threat that exists in the world today. I do believe that counterintelligence is adequate as of today but that does not mean we do not need to improve. Much can be derived as to pre-9/11 or post-9/11 scenario. The intelligence officials and decision makers have to make sure that the IC is able to function strategically and operationally. Post 9/11 there exists “old” and “new” threats but clearly now we are primarily and immediately faced with “new” threats such as prevention of individual or small group acts rather than State actors. And because of this emphasis is placed upon utilizing human sources or spies, and interrogations of suspects or informants. The “old” threats still require IC collection, analysis and operations regarding State actors and these services are still intact and operating fully. The intelligence community may involve two ways in which it adapts to its external demands and when a perceived intelligence failure occurs then it reinvents itself to deal effectively. Or it may change proactively because of anticipating or observing environment changes.

There still exist threats from State actors in regard to our intelligence community and national decision makers and counterintelligence needs to be vigilant to deter, detect, exploit, neutralize and disrupt these attacks on an ongoing basis. National Security information as well as the US companies’ proprietary information will be targeted for collection. Some industries that may experience activity directed against them include the defense, finance, energy, dual-use technology, etc.  Insider threats will continue to be a closely surveilled item of interest of the counterintelligence agencies. And Russia is believed to remain a threat through cyber operations meant to influence or convey misleading information to encourage public opinion towards Russia’s best interests. Elections have been targeted and efforts are believed to continue. Increased and vigilant counter-cyber terrorism programs need to be fully conducted and expanded to the utmost ability the United States can exhibit and emplace.

Transnational criminal groups as well as terrorists are learning and utilizing advanced intelligence capabilities in technical, physical and cyber means. And “insider threats”, which is the oldest form of spying still exist in today’s world.

Continue Reading

Latest

South Asia2 hours ago

The Likely Outcome of Narendra Modi’s Unconstitutional Seizure of Kashmir

An independent fact-finding mission into the now military-ruled constitutionally autonomous Indian state of Jammu-Kashmir (commonly referred to simply as “Kashmir”)...

Health & Wellness4 hours ago

Expert tips for a better night’s sleep

When was the last time you had a good night’s sleep? For many, sleep doesn’t come easy. Up to 70...

Travel & Leisure8 hours ago

Top 4 Drives around Beverly Hills and L.A. to Experience in a 2019 Maserati Levante SUV

With a deep history of more than 100 years of Italian craftsmanship, Maserati’s DNA is a balance of luxurious, sophisticated...

South Asia12 hours ago

Indian Subcontinent Independence and Economies Lagging Counterparts

Mid-August is when the subcontinent celebrates independence from Britain.  Born in a cauldron of hate 72 years ago, India today...

Newsdesk14 hours ago

UN Security Council discusses Kashmir- China urges India and Pakistan to ease tensions

The Security Council considered the volatile situation surrounding Kashmir on Friday, addressing the issue in a meeting focused solely on the dispute,...

Middle East16 hours ago

Business and boxing: two sides of the same coin

What do a planned US$15 billion Saudi investment in petroleum-related Indian businesses and a controversial boxing championship have in common?...

Defense19 hours ago

Kashmir: A Nuclear Flash Point

India has challenged the whole world with nuclear war, the Defense Minister announced to review its policy of no first...

Trending

Copyright © 2019 Modern Diplomacy