On November 30, 2015 the Belgian police discovered a film regarding the movements of a Belgian nuclear researcher and his family who operated in Dohel-1, one of the seven nuclear production sites in that country, four in the Dohel region and three in the Tihange region.
The long film of all the nuclear expert’s movements was found in the Auvelais house of a man linked to the network of Al Baghdadi’s Caliphate. The jihadists were interested not so much in the nuclear plant as such, but in the possibility of using radioisotopes, namely products capable of causing poisonings, diseases, various temporary or permanent disorders in those who come into contact with them for a certain period of time.Radioisotopes, also known as radionuclides, are unstable nuclei which radioactively decay, resulting in the emission of nuclear radiations. As already said, the effects may be scarcely or highly significant, depending on the dose of radiations received and/or the type of emissions absorbed.
The α radiations carry two positive charges and can be stopped by a thin aluminium foil. They strongly ionize gases (hence air) but, if produced by a source inside the human body (water, contaminated food), they can cause very severe damage.The β radiations have a negative charge only and are more penetrating than the α ones, but they ionize gases to a lesser extent.They have a greater power to penetrate the human body than α radiations, but these emissions, too, can become dangerous when given off by a source inside the human body.On the contrary the γ radiations have no electric charge but have an undulatory nature, such as electric waves.
The latter have a very high power of penetrating the human body and can cross relevant thick layers of lead and other metals.They are a hundred times more penetrating than the β radiations and are, in effect, electromagnetic wave emissions.All radioisotopes are widely used in medicine, biology, pharmacology (the “radiopharmaceuticals”), archaeology and paleontology.Not to mention industrial applications: the lasers which use the radioisotope emissions are now fundamental in telecommunications, through the “fibre optics” technology.Even the common CD players use these lasers, which are also used for cutting some metal sheets in the manufacturing industry.In all likelihood, the jihadists stationed in Belgium wanted to kidnap that nuclear expert or a member of his family so as to force him to make one or more “dirty bombs”.Here the technological issue turns into a strategic and political issue.
A team of experts is needed to make a dirty bomb, but we cannot rule out that a single “lone wolf” may be able to make it alone, with few recycled materials and using the usual homemade explosives which now characterize most of the blasts occurred so far in Europe due to the sword jihad.You only need saltpetre, sugar or normal gunpowder, which can be easily made at home.It is worth clarifying that the jihad does not want to conquer our territory, but it wants to fully subjugate it, particularly at political and cultural levels.For the jihadists, a “dirty” bomb” has the same value as a cyber attack or a demonstration against miniskirts or halal food in public schools.The important factor is intimidation, leading to hegemony and finally to dominance.This means that, at geopolitical, economic, cultural and demographic levels, the jihadist militants want to make their fight fully functional to the primary interests of the umma, namely the Islamic global community.
The strategic goal is the cultural and economic submission and subjugation of our territories to Islam, possibly with some mass conversion.
The fear, terror and social dissociation caused by the terrorist actions carried out by the men (and women) of Daesh/Isis are aimed at weakening the reactions of the “infidel”.The attacks also serve to increase the costs of our defence, up to making them economically unsustainable and finally blocking the European society so as to freeze it until the final “submission”, just to borrow the title of a smart and successful book by Michel Houellebecq.Therefore it is a long-term warfare, with strong elements of traditional war combined with a real psywar, “psychological warfare.”These actions relate to the management of the good side, the good cop, of integration up to beyond the limits allowed by our social system – which implies cultural and mental-mythical submission and subjugation – and the harsh side, the bad cop, the brutal violence of the recent massacres in Paris and Brussels.Hence a mechanism “if …. then” sets in into the victims’ minds, namely us, whereby we start to think that if we are good and keep quiet and we adapt without saying a word they will not do us harm any more.
This is not true: if we are good and keep quiet, we will be subjugated even more cruelly.Needless to explain this to current politicians in Italy and Europe; they are just canvassers and salesmen in search for foreign capital, possibly from the countries which have always funded the jihad.There are also important socio-economic factors in this psywar using all the elements of our non-orthodox warfare techniques.Again needless to explain these techniques to the above stated canvassers and salesmen who, unfortunately, have also “polluted” the intelligence services.
Firstly, there is the plan already made explicit by Osama Bin Laden to hit the West – the inevitable advocate, for economic and energy reasons, of the “apostate” regimes of Islam and the Jewish State – with a war which is very cheap for the jihad that wages it, but costs a lot, even too much, to those who must defend themselves from it.Compared to the relatively scarce funds needed for the attacks of September 9, 2001, Osama Bin Laden and his Al Qaeda cost over three billion dollars in fifteen years, including the costs of wars, new security and safety standards and part of the covert operations necessary for finding and killing him.Not to mention the still high costs for supporting about 150,000 military staff and one quarter more of the normal US military budget.The jihad started by Bin Laden – a wealthy “daddy’s boy” who became radicalized at the university in Saudi Arabia, as a result of his contacts with a professor linked to the Muslim Brotherhood – is an asymmetrical war of the poor against us, the would-be “rich”.
Hence the jihadists are used as proxy warriors by the rich Muslim countries to progressively impoverish the West, make it suitable for diversified and profitable investment by the OPEC Sunni area and finally create not only an economic, but also a political dependence on the Middle East oil and gas.The terrorist attacks in Paris and Brussels, not to mention the now sadly neglected affair of mass rapes in Cologne, are the beginning of a new phase of this non-orthodox Islam war in Europe and other continents.Before Al Baghdadi’s Caliphate – which has created the territorial entity needed to the global jihad, for political mythology and as a military base – Mohammed Badie, the former Supreme Guide of the Muslim Brotherhood in Egypt and later leader of the Ikhwan International, had explicitly stated: “There is no need for the sword jihad in Europe, we will conquer it only with our growing population”.
The transition from the old to the new jihad, which came to maturity with the establishment of the Daesh-Isis Caliphate, has already changed this Islamist strategic project on Europe.This is exactly the reason why we must be very careful with nuclear “dirty bombs” that will certainly reach their political goal (which is what matters), regardless of their actual potential for nucleotide radiation.Fear is a mechanism which now increases also with small doses of violence.It is hard to estimate how many sites exist today in the world where radionuclides are produced and stored, but the best statistics now available point to over 70,000 storage systems placed in at least 13,000 facilities.The brutality of the attacks and the size of the widespread jihadist network discovered so far in Belgium may be explained by the fact that this country is one of the major world producers of radionuclides and there is at least one researcher of Islamic origin and faith who works in this facility, as we will see shortly.It is the nuclear complex called SK-CEN, a nuclear research centre located near the Bocholt-Herentals Canal, 53 miles away from Brussels.It no longer receives the periodical shipments of radioactive material from the United States, which in 2004 had reported the poor defence structures of the Belgian system in view of a possible attack by Al Qaeda.
Not to mention the fact that the two fake journalists who killed the anti-Taliban Afghan leader, Ahmad Shah Massoud, two days before the September 11 attack came from Molenbeek, the neighbourhood which hosted and still partially hosts the Caliphate’s jihadists who carried out the massacres in Paris and Brussels.In 2003 there had been reports of an attempt by one of the Belgian soccer star, Nizar Trabelsi, to put a bomb in the military area of Kleine Brogel, 18 miles away from the aforementioned nuclear research centre, a base hosting twenty US tactical nuclear weapons related to a F-16 squadron.
The base safety and security structures were later deactivated in 2010, even by a group of peace activists, who run about the military structure undisturbed for over two hours.Only in 2014, and after the renovations made by the Belgian government upon US request, did IAEA confirm that the safety and security net in SK-CEN and the nearby military base were effective and robust.It is worth noting that the Belgian nuclear plants supply over 50% of electricity in that country. Is this series of terrorist actions possibly designed to force Belgium to supply itself only with the Middle East oil and gas?In Italy, the disastrous decision to relinquish civilian nuclear energy was taken with a richly-funded referendum in June 2011, after the equally richly-funded one in 1987, cunningly held shortly after the disaster occurred at the Chernobyl power plant.No one better than the peoples who are not strategically Clausewitzian knows how to better use “psychological warfare” than Muslims.They do not believe that the war obeys strict, Kantian rules, but they think that the war confrontation is always the essence of politics, not its “polarization of extremes”.Hence there will probably be no need for terrorist actions in Italy: in this sector we have already simulated and achieved the effects of a jihad attack on our own.
Furthermore, the Belgian power plants have recently been the target of a series of accidents which have endangered the city of Antwerp, geographically close to the SK-CEN centre, and Germany has repeatedly called into question the technical and strategic safety and security nets of the Belgian nuclear system.
It is worth noting that Ilyass Boughalab, a Moroccan expert linked to the old information network, though still operational but today silent, known as Sharia4Belgium, works in Dohel-1.Today, globally, the components (and not the finished products of the radioisotopes, about which we have already spoken) are found in approximately 3,500 sites located in 110 countries.
In Iraq, Al Baghdadi’s Caliphate has already reached the nuclear sites of the former regime of Saddam Hussein and is supposed to already have such a quantity of radioactive material as to build a “dirty” bomb which could “infect” a small city, thus making it uninhabitable (and this is the tactical goal pursued).Moreover, the IAEA countries adhering to the international safety and security net for the storage and use of radioactive materials are only 23, accounting for 14% of the total 168 IAEA members.
Statistically, in 2013 and 2014, at least 325 nuclear accidents were reported officially in the IAEA databases, with heavy losses of radioactive materials.85% of those accidents regarded non-nuclear radioactive material – hence nucleotides.According to the most reliable estimates, the non-reported accidents are supposed to be over 753 in the two-year period under consideration, already used as statistical basis.Conversely, highly enriched uranium (HEU) is stored in sites located in 25 countries while, as already seen, the radioactive substances are much more widespread.Moreover, “dirty bombs” certainly cause less damage than nuclear ones, but they can cost a huge amount of money for “cleaning up” the area, as well as for displacing and protecting the population.According to the rule of asymmetric economic war started by Bin Laden and today continued by Al Baghdadi’s Caliphate, this is exactly what is needed.
“Dirty bombs” have been called weapons of mass disruption and not weapons of mass destruction.
This is the reason why they are suited to reach two goals at the same time: the psycho-political crushing of the enemy, namely us, as well as the increase in costs for defending ourselves from the jihad – costs which could force some European governments (the aforementioned canvassers and salesmen) into a strategic or anyway political surrender.Not to mention the area interdiction which could be generated by a radiological dispersal device (RDD) so as to later act undisturbed, with traditional terrorism, in areas close to those hit by the dirty bomb.Technically, the most easily available and used radionuclides among the 16 theoretically available include Cobalt-60, with a half-life of 5.3 years, which appears as a hard metal. It is used for anti-cancer therapies.They also include Cesium-137, with a half-life of 30.1 years, which appears as powder salt and is used for blood transfusions in specific therapies.The same holds true for Iridium-192, which appears as a metal and is still used for X-rays.
Finally they include Americium-124 and Beryllium, with a half-life of 432.2 years, showing the consistence of a metal oxide and mainly used for stratigraphic analysis in geology and archaeology.
Out of the total number of nations adhering to the IAEA rules for radionuclides, only 19 have a specific strategy to monitor or recover the illegally extorted material; 8 of them are developing a procedure for notifying neighbouring countries of any illegal release or transfer of radioactive material, while the others are studying new safer storage and monitoring systems.The Code of Conduct currently in force for all the countries adhering to the special IAEA system for radionuclides is inevitably vague and full of “shortcomings” at procedural and penalty levels.Moreover only 130 IAEA countries have accepted the Code of Conduct.So far many thefts of radioactive material have occurred, apart from those carried out by the so-called Syrian-Iraqi Caliphate (two, as far as we know).In 1993, the Russian mafia placed small pieces of radioactive material in the office of a Russian businessman, causing him to die in a few minutes.In 1995, the jihadist Chechen rebels buried a container full of Cesium-137 in Moscow’s Ismailovsky Park.
The terrorists let the police know where it was before it could cause too much damage.In 1998, 19 tubes containing Cesium-137 were stolen from a hospital in Greensboro, North Carolina.Again in 1998, the secret services of the pro-Russian Chechen government discovered a container hidden under a railroad, already connected to an explosive ignition device.Others thefts were recorded, often not even reported by “open sources”.Hence, on the basis of logical inferences, how many Chechens are hosted as foreign fighters by Daesh/Isis? A number ranging between 200 and 700 – an amount exceeded only by militants from Afghanistan, Bosnia and Somalia.Just to make an example of costs and damage which may be caused, a dirty bomb charged with an average quantity of Cesium-137 could “pollute” and contaminate 250 square meters at a certain minimum cost of decontamination/ repopulation equal to over 81 billion euro, obviously depending on the infrastructure existing in the RDD detonation area.
Hence what must be done to prevent “dirty bomb” attacks?
Meanwhile, many specific sensors can be placed and monitored often and very carefully in “sensitive” facilities and densely populated areas.As already happened in the United States, a government committee should select a number of critical points for RDD attacks and then proceed to the ongoing computerized monitoring of the most important sites which may be targeted by a jihad attack.This holds true also for parks, cities’ central areas, schools and universities, but this shall be decided by the relevant committee, when it is established.Furthermore we shall also significantly improve the storage and destruction, after use, of such materials, coming from hospitals, research centres or other structures – a practice to be certified and be entrusted to the police, not to garbage collectors.How many sites of radionuclide production or storage are there in Italy?A huge amount: suffice to list – and it would be virtually impossible – all the hospitals, private radiology medical centres, as well as biological, archaeological, physical, chemical and paleontological research centres.Radioactive waste and, in any case, the waste coming directly from nuclear power plants, have the size of 30,000 square metres, for a quantity of waste produced over 30 years.Less than a quarter of France and less than a sixth of Germany.
In Italy approximately 140,000 tons of special waste, including radionuclides, are produced every year, while hazardous waste (including some specific radionuclides) has a size of 9 tons/year.In Italy the management of such radioactive waste, mainly coming from hospitals, is currently regulated by Article 4 of Legislative Decree No. 230/95.The legislation governs the management of such waste, but mainly defines stringent criteria for notifications, requirements and regulations, also in the event of a transfer of such waste abroad.Even with the very dangerous rule of tacit consent.Hence is the registration of radionuclide transport companies with the Ministry sufficient?We do not think so, particularly because said waste thefts occur precisely during transfers and by staff who may not be registered with the relevant Authority.
Article 17 of EU Directive 2006/EURATOM, transposed in Italy in 2007, envisages specific criminal offences for those who abandon or carry out illicit trafficking of radioactive materials in addition to mandatory confiscation of the material seized – where possible.Better, but not enough, because there are no indications, apart from criminal penalties, specifically protecting from an RDD, of which we will never know the origin of the radionuclide used in the blast.Once again, little can be done, except for quick management and processing of information in the EU area and careful intelligence prevention on the radicalization of Islamic subjects from communities near the radionuclide production or storage sites.
The likelihood of an RDD explosion is statistically not measurable.
Nevertheless, it will be good to think about it in time.
9-11 Terrorist Attack: Defensive countermeasures of deter and detect
On September 11, 2001 at 8:46 a.m. an airliner slammed into the North Tower of the World Trade Center in New York City. At 9:03 a.m. a 2nd airliner slammed into the South Tower. The planes carried thousands of gallons of jet-fuel aboard in effect making them lethal weapons. Tens of thousands of people worked in these buildings daily and both buildings fell to the ground within 90 minutes. More than 2,600 people died in the World Trade Center tower attacks. Then at 9:37 a.m. a 3rd airliner rammed into the western side of the Pentagon. 125 people died in the Pentagon attack. And a 4thairliner was intended for attack in either the U.S. Capitol or White House but the heroics of passengers crashed the plane, hence thwarting the attack. A total of 256 people died in the four planes. The death toll even surpassed the Pearl Harbor attacks of 1941.
Those responsible for the horrific attack were 19 Arabs carrying out Islamist extremists plans. Their headquarters were located in Afghanistan. They were resourceful and some had lived in the United States for some time and four of them had trained to be pilots. They were not well educated. They carried out the terrible attacks with knives, cutters, mace, etc. And they had tried to bring down the World Trade Center in 1993 but failed however in the result killed six people and wounded a thousand. It was an effort led by Ramzi Yousef. Others including Omar Abdel Rahman who had plans to blow up the Lincoln and Holland tunnels and other New York City landmarks, but they were arrested. Ramzi Yousef and others had various other terror plans of which some succeeded and some fortunately did not.
Bin Ladin was known and thought to be a financier but not thought of as a terrorist leader until later. In 1998 Bin Ladin and four others issued a fatwa in which it was publicly declaring it was God’s order that Muslims should try to kill any American they could. Bin Ladin was a wealthy Saudi and had conducted jihadist activities against the Soviet Union. But he also held grievances against the United States such as a U.S. troop presence in Saudi Arabia. He recruited and trained followers in Afghanistan and continued carrying out acts of terror, including on the United States. His people attacked embassies, hotels, and even attempted to sink the USS Cole Navy Ship by a terrorist attack. His rhetoric is derived from Islam, history and the economic and political disorder in the area. He formed an alliance between the al Qaeda group he led and the Taliban. The Clinton administration had tried cruise missile strikes against al Qaeda in Afghanistan and tried to get the Taliban to force Bin Ladin to leave Afghanistan. The U.S. unsuccessfully utilized CIA paid foreign agents to try to capture or kill Bin Ladin and his group.
As early as 1998 or 1999 Bin Ladin had been contacted by Khalid Sheikh Mohammed with an idea of using the planes as a method of attacking the World Trade Center and other targets. The original plans were for 10 planes to target both east and west coasts of the United States. The CIA did uncover some reports of Bin Ladin’s intent on attacks. The U.S. continued its disruption attempts globally and also utilized diplomacy with countries. The “predator drone” was eventually fitted with a missile should an attack on Bin Ladin provide an opportunity. Some of the reasons and connections to the actions of the perpetrators of the planned 9-11 terrorist attack became apparent after the attack. Unrest had come to the surface in the time before the attack as the Taliban leader opposed attacking the United States, in contrast to Bin Ladin’s wishes.
On 9/11 the terrorists were successful in hijacking the four planes. The planes were being used as terrorist weapons and confusion was present with air control. But eventually the FAA and NORAD who controlled airspace did receive a “shoot down order” but it was after the plane in Pennsylvania had been forced down by passengers in the only way to stop the plane from being used as a weapon.
The enactment of the United States “Patriot Act” removed barriers that had impeded terrorism investigations in their outlay, scope and means. And in effect sped up the investigation and prosecution of the defendants. The FBI was point on the investigation that followed the attack and the operation was named Operation PENTTBOM. At one time more than half of the FBI’s personnel worked on the case. They followed through on more than one-half million leads. It was the largest crime scene in the FBI’s history. Also in the time period following the 9/11 attack the Department of Homeland Security was created in March 2003, which brought together 22 separate agencies and offices into a Cabinet level department. The 9/11 Commission had made several recommendations and in this report some details are brought forward. These would be included under the defensive counterintelligence support mode of operation and include the principles of deter and detect within the countermeasures. It included recognizing 72 fusion centers throughout the country which acts as a focal point for receipt, analysis and sharing of threat related information. Also establishing related training and informational programs to deal with threats. One such example is the National Terrorism Advisory System. And the DHS developed and implemented a risk-based transportation security strategy. An action taken such as strengthening airline passenger’s pre-screening and targeting terrorist travel will deter terrorists as they become aware of increased security measures and thwart terrorists from attempting to board airlines for terrorist activities. The airliner’s cabin cockpit doors have been hardened post-911 and Air Marshalls are used appropriately as well as some flight crew being eligible to carry firearms. The TSA behavior detection officers use non-intrusive behavior observation to identify people who may be high risk. The TSA also utilizes detection methods such as canine teams to sniff for explosives on passengers and in luggage. Post 9/11 all cargo on U.S. planes is screened commensurate with their checked luggage. The flights coming into the U.S. from foreign countries are required to provide information prior to departure and checks all passengers against watch lists the government utilizes such as the Secure Flight Program. It also increases efficiency by allowing those cross-checked with biometrics to have expedited travel.
Today a significant defensive countermeasure post-911 is that airlines now screen all checked and carry-on baggage for explosives. The U.S. has increased security of U.S. borders and identification documents. Certain areas are closely watched and critical security improvements along the Northern and maritime are emplaced. The Dept. Of Homeland Security has taken aggressive action to enhance the security of the nation’s infrastructure and also cyber infrastructure and networks. There in a federal government system cyber intrusion detection system which includes EINSTEIN and the National Cybersecurity and communications integration center is the nation’s hub for organizing cyber response efforts. DHS and DOD are working together to protect against threats to military and civilian computer systems and networks. This is another example of defensive countermeasures. DNDO is affiliated with nuclear detection and back in 2003 only 68% of arriving trucks and passenger vehicles were scanned along the northern border with no system on the southwest border. But today the systems scan 100% of all containerized cargo and personal vehicles arriving in the U.S. through land port of entries and up to 99% of sea containers. Counter-proliferation of nuclear and biological threats is a high priority of the DHS. The tragic occurrence of 9-11 has brought about real focus on the danger of leaving vulnerabilities open to exploitation. The DHS also has importantly increased efforts to track and disrupt terrorist financing through programs such as ECTF or Electronic Crimes Task Force.
Another action taken post-9/11 was the creation of the National Counterterrorism Center or NCTC which was to serve 5 functions which were; Threat Analysis, Identity Management, Information sharing, Strategic Operational Planning and National Intelligence Management.
The U.S. Department of Justice charged ZACARIAS MOUSSAOUI with numerous terrorism charges and indicates others involved in the terrorist acts. The United States Department of Defense obtained a video tape of Bin Ladin basically accepting responsibility of the 9-11 attacks and the DOD has a transcript of the video and a portion I will quote is as follows. UBL refers to Osama Bin Ladin: “UBL: The brothers, who conducted the operation, all they knew was that they have a martyrdom operation and we asked each of them to go to America but they didn’t know anything about the operation, not even one letter. But they were trained and we did not reveal the operation to them until they are there and just before they boarded the planes.UBL: (…inaudible…) then he said: Those who were trained to fly didn’t know the others.”
Bin Ladin, America’s most wanted terrorist was killed by United States Special Forces in a compound in Pakistan on May 2, 2011. The CIA had been involved in investigating Bin Ladin for years.
Counterintelligence Threat Brief for Turkey
I will provide a Counterintelligence threat brief on traditional and non-traditional Counterintelligence threats to non-security cleared individuals who are traveling to Turkey as business travelers or for personal reasons. MIT, the official Turkey intelligence agency is active. And non-traditional threats also exist as Turkey includes diverse elements of persons from different Muslim nations. Some of which include terrorist groups with their main base of operation located in a different country but also operating within Turkey. As seen in EurAsia Review, conflicts that were usually based on national interests today are based typically on non-national interests such as ethnicity, religion and culture. Asymmetric warfare rather than having a clear issue now has several. And a weaker enemy will use it strengths against a superior adversaries weaknesses.
Using OSINT (Open Source Intelligence) to conduct my research I uncovered motive for Turkey seeking intelligence from the United States. Turkey is a NATO ally and an American ally. However, that is the crux of their relationship. It has never encompassed social and economic theology. They are predominately a Muslim country and have disagreements about many aspects of wars and conflicts that the US had interests in such as Iraq and Syria. Turkey targets Kurd fighters in Syria while we support them. And they opposed the action President Trump put in place of recognizing Jerusalem as Israel’s Capitol. There is a great amount of suspicion and mistrust regarding the failed coup of President Erdoğan. And Fethullah Gülen, the suspected leader of the attempted coup resides in the United States and refuses to extradite him. They believe Gulen is responsible for the assassination of Russian ambassador Andrey Karlov. They have typically bought US military products and technology but have made a deal with Russia to purchase an advanced missile defense system. Andrew Brunson who is an American Pastor is being held and faces spying charges and thus far efforts to release him are unsuccessful. They are suspicious of everyone. They will not hesitate to leverage information acquired through their intelligence services from the United States or any source. Turkey has long been thought of as torn between the East and West. In Turkey if you access the internet via a local ISP they can install spyware on your computer that can control it. Charter Schools are being targeted by Turkey since Gulen was instrumental in them and that tie is enough for Erdogan to lash out. MIT-Turkey’s intelligence agency places agents in journalist positions as cover which often leads to someone divulging information that is considered private.
If Turkey has decided to spy on you it probably originates from passport screening. Some things that a US visitor should be aware of are to self-assess if you could be thought of as a terrorist, narcotics trafficker or criminal. Black market activity. Do not be caught with suspicious or incriminating luggage. Do not identify known associations that Turkey may find incriminating. They may utilize any of these ways to recruit you as an asset of theirs. Usually direct and indirect activities used in conducting their intelligence operations are non-threatening and unobtrusive. Beware of local laws and customs as one example is in Turkey derogatory comments regarding government and its leaders are prohibited. It may be illegal to use insulting language.
Information Turkey may covet and target from a target such as a defense contractor non-intelligence employee may include customer data, employee data, vendor information, pricing strategies, propriety information, technical plans, corporate strategies, financials, computer access protocols, acquisition strategies, investment date, business directories of phone and emails. They may be subtle and use elicitation to gain information slowly and by gaining your trust. Be alert for tips. Throw them off their own game by asking why they ask. Refer them to public sources if specifically targeted questions are posed. Or say you cannot discuss it or just do not know. Examples of things I would consider for combating their intelligence collection efforts are to use rental electronic devices. Disable the Wi-Fi. And on the flight travel with the device as carry-on luggage. Do not use foreign storage devices in your devices. Do not leave documents and information in your hotel room. Do not use the hotel safe. Select your own cab.
But sometimes harassment incidents are utilized and obviously are meant to intimidate or test a US citizen’s reactions. If harassment is selected to be used on a prospective recruit it can be used in a variety of means.
Yom Kippur War Intelligence Failure
The Yom Kippur War intelligence failures were broad and to the highest level of government and military within Israel. They misperceived themselves as being free and safe of attack from the Arabs, at least in the near and current future. The Israelis were confidant an attack would only occur along the perimeters in which they themselves perceived the Arabs may attack, which they believed to be in the distant future. Israel felt that such an attack was bound to fail and thus preventing the Arabs from initiating an attack. Israel had let down their guard and therefore were surprised by the timing of the attack, the method of attack and also the place of the attack. Few military parallels are found as great as the strategic surprise Egypt and Syria enjoyed on October 6, 1973.
Information divulged years later is that King Hussein of Jordan made a visit September 25, 1973 to Israel and met with the Prime Minister and gave his assessment that Egypt and Syria were about to attack Israel. Warning was not heeded as the attack took place October 6, 1973. And importantly Jordan itself had been involved in former wars itself with Israel so their motivation for informing them of an impending attack was suspicious from the Israelis’ view. Skeptics argue that Hussein disavowed giving warning to Israel during this visit. Hussein had hoped that the warning would influence the Israeli Prime Minister to make changes and progress with the Arabs and avoid a costly war. Israel’s intelligence officer dismissed Hussein’s claim and believed that the Arabs were too weak to attack. Also believed by the Israelis is that the Arabs would not fight a war they knew they would lose. This may be a key point as to misperception as the Arab’s initially in the war obtained their objectives and possibly in their view set the course right from the “1967 War” in which they lost territory. Egypt’s Sadat even made a trip to Saudi Arabia before the war and made a plea that if the United States resupplied Israel during the war for Saudi Arabia to emplace an oil embargo on the United States to exert influence. The CIA passed a report on September 30th to the Israelis which was sourced to King Hussein which elaborated on what he had previously told the Prime Minister. By September Syria had received Soviet SAM’s and other equipment and were ready for war. The Soviets removed dependents of advisors and diplomats from Egypt and Syria October 5th.Israel suffered 2,656 dead and 7,250 wounded in the battle.
The Israeli armed forces were reliant on reservists which made up a large portion of Israel’s armed forces. In order to prove successful time was needed in times of attack to mobilize and move them from civilian life and emplace these personnel into a war-time theater of operation. As such, Israel put much effort into developing their intelligence services into the elite force for which much trust was given by the country to provide the warning it needs to prepare for war.With the failure of fore-warning to Israelis’ the Arab’s controlled the early moves in the war and brought initial success which they desired and in effect changed the balance of power within the Middle East away from Israel’s advantage.
Egypt and Syria’s attack on October 6, 1973 occurred at 14:00 hours which caught the IDF off guard and Israel’s military and political leaders did not understand a war was about to break out until 18:00, which was too late. The Commission investigating the intelligence failure indicated three reasons for the mistake. The first reason involved two assumptions in which Egypt would conduct air strikes deep into Israel against its air force before starting a war and the other assumption was Syria would not go full-scale war unless Egypt was in action against the Israelis already. The 2ndreasonwas a major mistake as Military Intelligence had guaranteed that they would be able to provide adequate advance warning of any attack and they did not do so. The 3rd reason is the intelligence services basically dismissed the adversaries’ forces buildups as either defensive or an exercise. Prime Minister Gold Meir and the Defense Minister Moshe Dayan concluded full mobilization was not necessary early on and they only placed the standing army on full alert.
To lend support to Israelis’ perception that attack was not probable at least not in the near future there is evidence and facts that the Arab’s did successfully employ deception methods on Israel as well as on the United States. The Arabs had been open to Dr. Kissinger’s peace negotiation in September 1973 and even planted items in a Lebanese newspaper about neglect and deterioration of equipment from the Soviet Union within the Suez Canal area. A very good synopsis which perhaps lends Israeli a sympathetic path is that estimating intentions are one of the most difficult and yet crucial element within intelligence. One may use hard evidence. If the evidence is incomplete it is more difficult to determine intention. Technology has advanced greatly in later years which makes a surprise attack much more difficult to achieve with the presence of advanced IMINT and SIGINT.
Is the current state of counterintelligence in the Intelligence Community adequate?
In regard to whether the state of counterintelligence within the Intelligence Community is adequate today one can best assume counterintelligence is a forever changing, evolving, assessment and reactive process of making sure our capabilities are up to date with the current world intelligence threat that exists in the world today. I do believe that counterintelligence is adequate as of today but that does not mean we do not need to improve. Much can be derived as to pre-9/11 or post-9/11 scenario. The intelligence officials and decision makers have to make sure that the IC is able to function strategically and operationally. Post 9/11 there exists “old” and “new” threats but clearly now we are primarily and immediately faced with “new” threats such as prevention of individual or small group acts rather than State actors. And because of this emphasis is placed upon utilizing human sources or spies, and interrogations of suspects or informants. The “old” threats still require IC collection, analysis and operations regarding State actors and these services are still intact and operating fully. The intelligence community may involve two ways in which it adapts to its external demands and when a perceived intelligence failure occurs then it reinvents itself to deal effectively. Or it may change proactively because of anticipating or observing environment changes.
There still exist threats from State actors in regard to our intelligence community and national decision makers and counterintelligence needs to be vigilant to deter, detect, exploit, neutralize and disrupt these attacks on an ongoing basis. National Security information as well as the US companies’ proprietary information will be targeted for collection. Some industries that may experience activity directed against them include the defense, finance, energy, dual-use technology, etc. Insider threats will continue to be a closely surveilled item of interest of the counterintelligence agencies. And Russia is believed to remain a threat through cyber operations meant to influence or convey misleading information to encourage public opinion towards Russia’s best interests. Elections have been targeted and efforts are believed to continue. Increased and vigilant counter-cyber terrorism programs need to be fully conducted and expanded to the utmost ability the United States can exhibit and emplace.
Transnational criminal groups as well as terrorists are learning and utilizing advanced intelligence capabilities in technical, physical and cyber means. And “insider threats”, which is the oldest form of spying still exist in today’s world.
The Election Agenda
Akin to the last Big Collapse, currently, the gatekeepers of the world economy are in deep silence as the new...
The Likely Outcome of Narendra Modi’s Unconstitutional Seizure of Kashmir
An independent fact-finding mission into the now military-ruled constitutionally autonomous Indian state of Jammu-Kashmir (commonly referred to simply as “Kashmir”)...
Expert tips for a better night’s sleep
When was the last time you had a good night’s sleep? For many, sleep doesn’t come easy. Up to 70...
Top 4 Drives around Beverly Hills and L.A. to Experience in a 2019 Maserati Levante SUV
With a deep history of more than 100 years of Italian craftsmanship, Maserati’s DNA is a balance of luxurious, sophisticated...
Indian Subcontinent Independence and Economies Lagging Counterparts
Mid-August is when the subcontinent celebrates independence from Britain. Born in a cauldron of hate 72 years ago, India today...
UN Security Council discusses Kashmir- China urges India and Pakistan to ease tensions
The Security Council considered the volatile situation surrounding Kashmir on Friday, addressing the issue in a meeting focused solely on the dispute,...
Business and boxing: two sides of the same coin
What do a planned US$15 billion Saudi investment in petroleum-related Indian businesses and a controversial boxing championship have in common?...
Terrorism3 days ago
Does Kenya Really Want To End Terrorism?
Intelligence3 days ago
9-11 Terrorist Attack: Defensive countermeasures of deter and detect
Southeast Asia2 days ago
Being Wealthy Helps Singapore’s Naval Ambition
Newsdesk2 days ago
World Bank Issues Second Tranche of Blockchain Bond Via Bond-i
Russia2 days ago
Battle for the Arctic: Friends and foes
Southeast Asia1 day ago
South-East Asia youth survey: Skills prized over salary
Health & Wellness3 days ago
Expert tips to reduce workplace stress for better health
New Social Compact3 days ago
Young women learn government fundamentals in nationwide leadership program