DEMOCRAT’S ISIS NARRATIVE REVEALED – ORIGINAL DOCUMENT

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM FOR EVEN MORE ABOVE TOP SECRET INFOS & ORIGINAL DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

Continue reading “DEMOCRAT’S ISIS NARRATIVE REVEALED – ORIGINAL DOCUMENT”

🚨OVER 100 PEOPLE KILLED IN SHIA MOSQUE BLAST IN KANDAHAR, AFGHANISTAN#talibanrule 🇦🇫

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM FOR MORE ABOVE TOP SECRET INFOS

https://t.me/ABOVETOPSECRETXXL

The Democratic Narrative About Isis Revealed – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Continue reading “The Democratic Narrative About Isis Revealed – Original Document”

Taliban Put Dead Bodies On Display, Hang One From Crane In Herat; Say It’s A Lesson For Others

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

The Taliban hung the bodies of alleged kidnappers from a crane parked in a city square in Herat. According to the Taliban, they had shot dead four alleged kidnappers. The body was hung with a note, “whoever kidnaps others, will end up like this,” on the chest. The gruesome display comes after Mullah Nooruddin Turabi warned that extreme punishments would resume in Afghanistan #Taliban #Herat

Taliban Says Executions, Public Punishments To Return; ‘Cutting Off Hands Necessary’

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

One of the founders of the Taliban has said that “Cutting off of hands is very necessary for security”. In an interview Mullah Nooruddin Turabi who was the chief enforcer of its harsh interpretation of Islamic law when the Taliban last ruled Afghanistan said that the extremists will once again carry out the executions and amputations of limbs, perhaps not in public. He not only dismissed the executions carried out by the hard-lined movement in the past but declared that nobody should “tell us what our laws should be.”

ISIS-K’s Dare To Taliban – 2 Talibs & 3 Civilians Killed In Jalalabad In Second Attack In A Week

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Two Taliban fighters and three civilians were reportedly killed in an attack in Afghanistan’s Jalalabad. The attack comes a week after a series of bombings killed 3 people that was claimed by ISIS-K. Since the Taliban takeover on August 15, the ISIS movement in the country has rapidly increased. ISIS, with its agenda of a global Caliphate, announced the establishment of an Afghanistan branch in 2015. #Taliban #Jalalabad #ISISKhorasan #ISKP #Afghanistan

France Says Leader Of ISIL Group In Sahel Has Been Killed

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

France says that the leader of ISIL (ISIS)-affiliated Islamic State in Greater Sahara (ISGS) group, known for its deadly attacks in the so-called tri-border region of Mali, Niger and Burkina Faso, has been killed by French forces.

Panjshir Civilians ‘Executed’, Denied Food Supply – Desperate Taliban Gets Brutal In The Valley

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

UNVEILED – THE FBI DOCS ABOUT 9/11 AND THE SAUDIS – ORIGINAL DOCUMENTS

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Continue reading “UNVEILED – THE FBI DOCS ABOUT 9/11 AND THE SAUDIS – ORIGINAL DOCUMENTS”

BREAKING NEWS – FBI Docs – Saudis Were In Contact With 9/11 Hijackers

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Rep. Tony Gonzales, R-Texas, reacts to the FBI report claiming Saudi officials were in contact with 9/11 hijackers, arguing the U.S. needs to get to the root of it and that Saudi Arabia has to be ‘held accountable’ for attacks.

Iraq Hosts An International Counterterrorism Conference

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Iraq is hosting an international conference on counterterrorism and cybersecurity. Companies and delegations from more than 50 countries are attending the event in Baghdad. Al Jazeera’s Mahmoud Abdelwahed reports from Baghdad, Iraq.

REPUBLIC SUPER EXCLUSIVE – Ahmad Massoud’s Army Releases Video From Panjshir – Exposes Taliban Claim

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Guantanamo Bay To Afghan Cabinet – Taliban Govt Includes 5 UN Listed Terrorists & FBI’s Most Wanted

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

The Taliban has announced a caretaker cabinet for their keenly awaited govt in Afghanistan. The Taliban has appointed Mohammad Hasan Akhund as head of Afghanistan’s new caretaker government. The announcement of the acting cabinet is a key step in the formation of a permanent Taliban government. The Taliban has released a list of 32 posts assigned to the armed group’s top leaders and Haqqanis. The list includes 5 UN-designated terrorists who will lead the Taliban government. Sirajuddin Haqqani, who will be the interior minister in the government, is on the FBI’s most-wanted list. #TalibanGovernment #Afghanistan #HasanAkhund

National Resistance Front Force Cleaning Up Talibans From Shatel District, Panjshir, Afganistan 🇦🇫

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

National Resistance Front Force cleaning up Talibans from Shatel district panjshir  Afganistan 🇦🇫

National Resistance Front Force cleaning up Talibans from Shatel district panjshir Afganistan 🇦🇫

Click on Link Above For Exclusive Video

Mullah Hasan Akhund, Taliban Leader On UN Terror List, Likely To Head New Afghanistan Govt

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

After weeks of disagreements between different factions, the Taliban is said to have picked its head of the state. According to sources, Mullah Mohammad Hasan Akhund is likely to head the Taliban govt in Afghanistan. Sources say that the Taliban’s supreme leader Hibatullah Akhundzada picked Hasan Akhund for the post. Mullah Mohammad Hasan Akhund heads ‘Rahbari Shura’ or the leadership council of the Taliban. Mullah Hasan Akhund is a relatively lesser-known leader of the group who hasn’t been seen in the public yet. #Taliban #Afghanistan #MullahHasanAkhund #TalibanPM

Taliban Rents Pakistan Army To Fight Massoud’s Northern Alliance – The Debate With Arnab Goswami

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Northern Alliance Spokesperson Fahim Dashty’s Last Message To Republic Before Getting Killed

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Taliban Retreatring From Panjshir – 1000 Terrorist Trapped – Northern Alliance

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

The Miracle Man Of 9/11 – How He Survived The Twin Towers’ Collapse

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

The evil that occurred on September 11, 2001 will never be forgotten. On that horrible day, the world changed forever. There was so much destruction, so much loss, that even now, 20 years on, it’s hard to comprehend the magnitude of what happened. But out of the utter despair, there were also incredible stories of heroism and survival – none more extraordinary than that of New Yorker Pasquale Buzzelli; a miracle man whose spirit continues to offer hope to us all.

Taliban Terrorists Suffer Severe Casualties As Battle With Resistance Intensifies In Panjshir Valley

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Osama Bin Laden’s Aide Amin Ul Haq Returns To Afghanistan – Al-Qaeda Commander Returns

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Ex-Afghan President’s Daughter Exposes Pak’s Role; Urges Nations To ‘End The Epicentre Of Jihad’

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

SKY – Threat Of Terrorism Is ‘Back On Our Doorstep’

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Sky News host Chris Smith says in Australia we must “make sure to sharpen our own resources here” because terrorism, and the threat of it, is “back on our doorstep”.

Breaking New – Kabul Explosion – Rocket Targets Home Near Intl Airport

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Explosion heard near Kabul airport amid attack warnings US forces fly out last evacuees from the Afghan capital amid warnings of a ‘specific, credible threat’ at the airport.

Ground Report From Panjshir Amid Afghanistan Crisis – Northern Alliance Soldier Speaks

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

‘A Taliban Takeover Is Al Qaeda 3.0’: GOP Veteran Warns Of Afghanistan Post-Withdrawal

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

US Drone Strike Killed Two ‘High-Profile’ Islamic State Members – Pentagon

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Deadly Explosions Outside Kabul Airport Kill Dozens – Islamic State Claims Responsibility

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

LIVESTREAM – Pakistan-Based Jaish-e-Mohammed Terrorists Meet Taliban – US Strikes Back

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Fox – Terrorism Is As High As It’s Ever Been: Rep. Gonzales

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Rep. Tony Gonzales calls on Pelosi to bring the House back into session amid the crisis in Afghanistan.

Four US Marines Killed, Three Wounded In Kabul Explosion: US Officials

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Former U.S. Border Chief Says Terror Networks, Cartels Are Cooperating

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Top Secret NSA Document About Mumbai Terrorist Attacks – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

26/11 Mumbai attack: 10 years of 2008 Mumbai terror attacks: All you need  to know about the 26/11 siege that shook Mumbai
Page 1 of Top-Secret N.S.A. Document

Taliban Has Promised Safe Passage To Airport, White House Negotiating Timeline Past August 31st

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

‘We Welcome Taliban’ Say China As They Begin Building ‘Good Relations’ With Terrorists

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

CHINA has made a harrowing declaration that it “welcomes” the Taliban with open arms as the new regime in Afghanistan and “wishes to develop good relations” with them moving forward. Speaking at a news conference on Monday, Chinese foreign ministry spokeswoman Hua Chunying announced China’s full support of the Taliban as the militants take control of Afghanistan.

Seth G. Jones Testimony About Terrorism Before The Senate Committee On Homeland Security – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

https://berndpulch.files.wordpress.com/2021/08/55739-12r0xqyo10dsil-d0j4xjqg.jpeg
Seth G. Jones
Continue reading “Seth G. Jones Testimony About Terrorism Before The Senate Committee On Homeland Security – Original Document”

Revealed – Iran – Qatar Hostage Deal – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Page 1 of Correspondence between minister and ambassador, 3

Qatari officials appear to agree on divvying up payments to various mediators in the hostage deal, including “Qassem” Soleimani, leader of Iran’s Islamic Revolutionary Guard Corps, and two negotiators for the Iranian-backed militia group Katai’b Hezbollah.

Bin Ladin Congratulates Pakistan In Light Of Its Successful Nuclear Weapons Tests

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Nuclear weapons limit chance of Indo-Pak war, says adviser to National  Command Authority - Pakistan - DAWN.COM
Page 1 of 1998 05 29 - Bin Ladin Congratulates Pakistan on acquiring nuclear weapons (English)
Continue reading “Bin Ladin Congratulates Pakistan In Light Of Its Successful Nuclear Weapons Tests”

Osama Bin Laden Documents – Full List Of Al-Qaeda Members And Their Fates – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back

Continue reading “Osama Bin Laden Documents – Full List Of Al-Qaeda Members And Their Fates – Original Document”

Revealed – The CIA West Europe Report – Top Secret – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back

The CIA Campus
Continue reading “Revealed – The CIA West Europe Report – Top Secret – Original Document”

Video – Das Propagandavideo Des Islamischen Staates Fördert Brandanschläge In USA – Original Dokument

Become a Patron!

True Information is the most valuable resource and we ask you to give back.

Edit Das Propagandavideo Des Islamischen Staates Fördert Brandanschläge In USA – Original Dokument

Check out this video: https://share.vidyard.com/watch/JXSn68Wp5pGoH975uCtDzN?

Become a Patron!

True Information is the most valuable resource and we ask you to give back.

Das Propagandavideo Des Islamischen Staates Fördert Brandanschläge In USA – Original Dokument

Become a Patron!

True Information is the most valuable resource and we ask you to give back.


Einschränkung: Nur für den offiziellen Gebrauch
Ursprungsorganisation: Maryland Coordination and Analysis Center

Continue reading “Das Propagandavideo Des Islamischen Staates Fördert Brandanschläge In USA – Original Dokument”

TOP SECRET – Commanding U.S. Insiders Report About The True Facts Of The Bin Laden Raid

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Continue reading “TOP SECRET – Commanding U.S. Insiders Report About The True Facts Of The Bin Laden Raid”

Islamic State Propaganda Video Encourages Incendiary Attacks In The Homeland

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

 On 26 July 2020, al-Hayat Media Center, a news outlet of the Islamic State of Iraq and ash-Sham (ISIS), released an English-language propaganda video entitled “Incite the Believers,” which encourages ISIS supporters to conduct incendiary attacks in the United States. The narrator acknowledges that ISIS supporters may have difficulty traveling to ISIS-controlled territory overseas and instead encourages them to conduct attacks where they live. The video also encourages ISIS supporters who are unable to obtain firearms or explosives to consider using incendiary attacks as an alternative.

Continue reading “Islamic State Propaganda Video Encourages Incendiary Attacks In The Homeland”

JOINT INTELLIGENCE – Domestic Terrorism Threat Likely Amid Political Transitions

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

The Capitol! Storm it, Take What You Want; Real Justice! - LA Progressive

This Joint Intelligence Bulletin (JIB) is intended to highlight the threat of violence from domestic violent extremists (DVEs) in the wake of the 6 January violent breach by some DVEs of the US Capitol Building in Washington, DC, following lawful protest activity related to the results of the General Election. Anti-government or anti-authority violent extremists (AGAAVE), specifically militia violent extremists (MVEs); racially or ethnically motivated violent extremists (RMVEs); and DVEs citing partisan political grievances will very likely pose the greatest domestic terrorism threats in 2021. In 2021 , threats and plotting of illegal activity, including destruction of property and violence targeting officials at all levels of the government, law enforcement, journalists, and infrastructure, as well as sporadic violence surrounding lawful protests, rallies, demonstrations, and other gatherings by DVEs will very likely increase due to renewed measures to mitigate the spread of COVID-19, socio-political conditions, and perceived government overreach. The FBI, DHS, and NCTC advise federal, state, local, tribal, and territorial government counterterrorism and law enforcement officials, and private sector security partners to remain vigilant in light of the persistent threat posed by DVEs and their unpredictable target selection in order to effectively detect. prevent. preempt. or respond to incidents and terrorist attacks in the United States.

Continue reading “JOINT INTELLIGENCE – Domestic Terrorism Threat Likely Amid Political Transitions”

2020 Global Terrorism Index: Deaths From Psychological Oppression Arrive At Five-Year Low, However New Dangers Arise

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Global Terrorism Index (GTI) – Arise News

All around the world, passings from psychological warfare succumbed to the fifth successive year in 2019, to 13,826 — a 15 percent decline from the earlier year. In North America, Western Europe and Oceania, extreme right assaults have expanded by 250 percent since 2014 – they are higher now than whenever over the most recent fifty years. 63 nations recorded in any event one demise from psychological oppression, the most reduced number since 2013. The worldwide financial effect of psychological oppression was $16.4 billion of every 2019, an abatement of 25 percent from the earlier year. IS’s focal point of gravity moves to sub-Saharan Africa with absolute passings by IS in the district expanding by 67 percent. IS and their members were likewise liable for assaults in 27 nations in 2019.

Continue reading “2020 Global Terrorism Index: Deaths From Psychological Oppression Arrive At Five-Year Low, However New Dangers Arise”

The 10 Top Secret Most Notorious Operations Of The KGB Revealed

Become a Patron!
True Information is the most valuable resource and we ask you to give back

Biggest Secret Reveal || India & The KGB - The Blunt Social - Medium

Like the CIA, the Soviet (and now Russian) spy organization known as the KGB has occupied with many years of mystery tasks over the world, extending from shakedown to capturing. The vast majority of the mysteries that we think about the KGB today are a direct result of one man—Vasili Mitrokhin. Mitrokhin was a filer for the KGB for a long time before he surrendered to the UK and gave over his 25,000-page chronicle of mystery KGB records. Here are a portion of the KGB’s generally upsetting and abnormal mystery tasks.

10 The Attacks On America’s Infrastructure

Hoover DamHoover-Damm wird zu gigantischem Energiespeicher | en:former

From 1959–72, the KGB started to photo US power plants, dams, oil pipelines, and framework for a terrible activity that would disturb the force gracefully to all of New York. When they picked focuses on that they thought were helpless, the KGB set up a protected house close to Harrisburg, Pennsylvania. From that point, KGB specialists looked to plan and complete a progression of assaults on America’s capacity systems.Hydroelectric dams, which create a huge bit of the US’s vitality gracefully, were an objective. The KGB detailed an intricate arrangement to crush two huge hydroelectric dams, the Hungry Horse Dam and Flathead Dam, in Montana. Removing the two dams from commission would injure the force gracefully of the state and encompassing district. The assault was to start 3 kilometers (2 mi) down the South Fork River from Hungry Horse Dam. The KGB wanted to have agents pulverize power arches on a tall mountain incline, which would be hard to get back on the web, inconclusively taking out force transmission from the dam. At that point, the agents were to hold onto the Hungry Horse Dam’s controls and decimate them. The assaults would have taken out the force gracefully to all of New York state.From the Soviet Union’s Canadian international safe haven, the KGB likewise intended to additionally disturb America’s vitality flexibly by assaulting oil pipelines among Canada and the United States. The plot, called Operation Cedar, was gotten ready for longer than 10 years. The KGB even looked to pulverize petroleum treatment facilities in Canada, which gracefully a lot of America’s gasoline.All of the assaults on America’s capacity framework were a piece of a bigger plan to assault New York City. When they had taken out the greater part of the force in the United States with the previous assaults, the KGB plotted to utilize the disorder and haziness to plant explosives on wharfs and distribution centers along the Port of New York, a pivotal harbor for America’s trade and imports.

9 The Hostage Crisis Retribution

Senate hostage crisis | Wookieepedia | Fandom

In 1974, the KGB made a tip top counterterrorism team with the baffling name “Alpha Group.” The Alpha Group was utilized by the KGB to do top mystery and regularly hazardous missions for the USSR—and now Russia—remembering a wicked and horrible crucial Lebanon.In 1985, the Soviet Union wound up with its first significant prisoner emergency after four Soviet representatives were grabbed in Lebanon by psychological oppressors subsidiary with an Islamic fear based oppressor gathering. The ruffians apparently kidnapped the Soviets to prevent the USSR from offering backing to Syria’s endeavors in the Lebanese common war, which the nation was then entangled in. After the Soviet ambassadors were abducted, the ruffians sent chilling photos to news organizations of the prisoners with firearms to their heads. The psychological oppressors requested that the USSR power Syria-associated powers to quit assaulting Iran-subsidiary powers battling in northern Lebanon, or the prisoners would be executed.Initially, the USSR was available to some type of arrangements with the fear based oppressors to discharge the prisoners sound. Things changed when the USSR didn’t appear to stop the Syrian powers’ inclusion in the common war, and the fear based oppressors executed one of the prisoners just two days after the underlying requests were made.That’s the point at which the USSR relinquished arranging, and the KGB made quick and wicked move. To begin with, the KGB explored what association was behind the kidnappings and seen it as crafted by Hezbollah. That is the point at which the KGB did a touch of seizing of their own, grabbing a nearby relative of a Hezbollah head. They started to dismantle him, emasculating him and sending a portion of his eviscerated body parts to the criminals of the Soviets. Before long, the KGB murdered the Hezbollah relative.Then, the KGB sent the Hezbollah head a message demonstrating that they was aware of a lot a greater amount of his family members and their whereabouts and cautioned that they would endure a similar destiny if the prisoners were not discharged. The Islamic psychological oppressors holding the Soviets paid heed and discharged the staying three Soviet ambassadors soon after, altogether sound and moving along without any more requests.

8 The Blackmail With Sex Tapes

Watch The Secret KGB Sex Files | Prime Video

In 1974, the KGB made a tip top counterterrorism team with the baffling name “Alpha Group.” The Alpha Group was utilized by the KGB to do top mystery and regularly hazardous missions for the USSR—and now Russia—remembering a wicked and horrible crucial Lebanon.In 1985, the Soviet Union wound up with its first significant prisoner emergency after four Soviet representatives were grabbed in Lebanon by psychological oppressors subsidiary with an Islamic fear based oppressor gathering. The ruffians apparently kidnapped the Soviets to prevent the USSR from offering backing to Syria’s endeavors in the Lebanese common war, which the nation was then entangled in. After the Soviet ambassadors were abducted, the ruffians sent chilling photos to news organizations of the prisoners with firearms to their heads. The psychological oppressors requested that the USSR power Syria-associated powers to quit assaulting Iran-subsidiary powers battling in northern Lebanon, or the prisoners would be executed.Initially, the USSR was available to some type of arrangements with the fear based oppressors to discharge the prisoners sound. Things changed when the USSR didn’t appear to stop the Syrian powers’ inclusion in the common war, and the fear based oppressors executed one of the prisoners just two days after the underlying requests were made.That’s the point at which the USSR relinquished arranging, and the KGB made quick and wicked move. To begin with, the KGB explored what association was behind the kidnappings and seen it as crafted by Hezbollah. That is the point at which the KGB did a touch of seizing of their own, grabbing a nearby relative of a Hezbollah head. They started to dismantle him, emasculating him and sending a portion of his eviscerated body parts to the criminals of the Soviets. Before long, the KGB murdered the Hezbollah relative.

ABC Presents Probably Fake Russian "Sex Tape" Of American Diplomat

Then, the KGB sent the Hezbollah head a message demonstrating that they was aware of a lot a greater amount of his family members and their whereabouts and cautioned that they would endure a similar destiny if the prisoners were not discharged. The Islamic psychological oppressors holding the Soviets paid heed and discharged the staying three Soviet ambassadors soon after, altogether sound and moving along without any more requests.

7 The KGB Hacker Accesses 400 US Military Computers

Disney | File 770

During the 1980s, the KGB was searching for an approach to take US military insider facts through two generally new antecedents to the Internet, ARPANET and MILNET. To do as such, they found and selected a man named Markus Hess, who might before long become a Soviet covert operative and one of the most incredible PC programmers in history.Hess started his hacking strategic the University of Bremen in Germany, far away from the US military PCs that he was attempting to get to. From that point, Hess had the option to assault 400 PCs utilized by the US military. A portion of the PCs were utilized at bases the world over in places like Germany and Japan. A portion of different PCs were utilized at MIT for look into. Another was utilized by the Pentagon. Hess had the option to figure the secret word to access the Pentagon’s Optimis database, which permitted him to access “a list of sources of Army documents.”Hess’ broad hacking activity stayed undetected until a frameworks head and stargazer named Clifford Stoll started researching a modest bookkeeping blunder in a California PC lab. Stoll found what appeared to be a little, 75-penny mistake in the PC use at Lawrence Berkeley Laboratory, which conducts logical research for the US Department of Energy. Stoll attempted to find where the 75-penny inconsistency originated from and followed it to an unapproved and obscure client who had utilized the lab’s PC frameworks for nine seconds without paying. Stoll examined further and found that this unapproved client was a talented programmer who accessed a framework control “superuser” account by misusing a security defect in the system.Stoll went through the following 10 months attempting to find the whereabouts of the programmer. In the long run, he had the option to do so when the programmer attempted to get to a safeguard temporary worker in Virginia. Stoll started to record everything the programmer was doing. He saw this strange programmer getting to PC frameworks at army installations all through the United States, scanning for documents with respect to military insider facts and atomic weapons.Stoll immediately reached specialists extending from the US military to the CIA, NSA, and FBI. Stoll and the specialists at that point followed the programmer’s physical whereabouts to a West German college. They set up a trick to get the programmer to uncover his full personality, creating a phony division at the Lawrence Berkley Laboratory made to seem as though it was working with the US military. At the point when the programmer took the lure and attempted to get to this phony office’s records, they had the option to follow him right to his home in Hannover, West Germany.West German specialists, working with the US, at that point raged Hess’ home and captured him. Little did they all realize that this world class programmer had been shrunk by the KGB and was offering military insider facts to the Soviet Union for a considerable length of time. Hess was later seen as liable of reconnaissance and condemned to as long as three years in jail however was discharged from the get-go probation.

6 The Operation RYAN

The KGB's 3 most sensational operations - Russia Beyond

In 1980s, the Cold War arrived at another blaze point. At that point chief of the USSR Leonid Brezhnev professed to have information that the US was effectively getting ready for a war against the Soviet Union and might dispatch an unexpected atomic assault whenever. Along these lines, in anticipation of this alleged looming fate, the KGB looked to dispatch Operation RYAN, one of biggest observation activities in history.Operation RYAN was intended to furnish the Soviets with early notice indications of an approaching US atomic assault. The arrangement was to direct best in class reconnaissance utilizing the USSR’s COSMOS satellite. The KGB needed to photo US army installations nonstop, observing them intently for signs that the US would dispatch atomic weapons at the USSR.The activity additionally looked to screen all employments of radar inside the United States for any sensational expands that would demonstrate groundwork for an assault. Besides, Operation RYAN was intended to screen the exercises of every American resident and military staff when they left the US. RYAN likewise put NATO under substantial reconnaissance. The activity even attempted to catch calls made all through the United States and Europe.In expansion to remote reconnaissance, Operation RYAN made a system of spies who were prepared to follow up on a second’s notification in the event that it was accepted that the US was beginning a war with the Soviet Union. The huge and expensive activity was inevitably downsized in 1984, just three years after it was set into movement.

5 The Buying Of US Banks

Big Banks Reverse Course, Stop Buying Own Shares | Global Finance ...

At the point when the KGB wasn’t attempting to utilize spies to get their hands on the privileged insights of the US government, they were attempting to utilize banks.In the mid-1970s, the KGB concocted an arrangement to clandestinely purchase three US banks in Northern California as a component of a mystery activity to secure data on cutting edge organizations in the district. The three banks were picked by the KGB since they had recently made credits to innovation organizations. A large number of these organizations were shrunk by the US military, so the KGB wanted to catch US military innovation secrets.To pull the activity off, the KGB gotten an agent from Singapore named Amos Dawe to buy the banks for them without letting the US government get wind of the USSR’s fabulous arrangement to take innovation mysteries. Be that as it may, before the KGB could assume control over the banks, their buy was impeded by the CIA. The CIA had first learned of the plan when they saw that the Singaporean specialist’s cash was originating from a Soviet bank. Dawe had acquired a $50 million credit line from a Singapore part of Moscow’s Norodny Bank.

4 The Operation PANDORA

Top 5 KGB operations on U.S. soil - Big Think

Racial pressures were intense in the US during the 1960s. Race riots encompassing the Civil Rights Movement were causing mass agitation the nation over. The KGB imagined that they could misuse this and aggravate it by initiating ill will or through and through savagery between racial gatherings in the US.The plan, called Operation PANDORA, started with the KGB spreading counterfeit flyers that had all the earmarks of being from the Jewish Defense League, a conservative Jewish political association currently characterized by the FBI as a fear based oppressor association. The flyers, which were really written by the KGB, guaranteed that dark Americans were assaulting Jews and plundering Jewish-possessed shops in New York. The phony handouts begged their perusers to battle against “dark crossbreeds.” The KGB at that point sent these enemy of dark flyers to dark activist gatherings, trusting it would mix hostile to Semitism operating at a profit associations, if not altogether violence.Concurrently, the KGB was additionally sending counterfeit letters to dark aggressor bunches which guaranteed that the Jewish Defense League had been focusing on and assaulting blacks in America. The letters beseeched the dark activists to assault the Jewish Defense League in reprisal. The Jewish Defense League’s pioneer, Meir Kahane, was killed a year later, however the demonstration was done by an Arabic man who was apparently detached to any dark activist groups.As some portion of their activity to mix racial agitation, the KGB additionally wanted to explode a dark school. After the school was besieged with a planted dangerous gadget, the KGB intended to make unknown calls to a progression of dark associations and guarantee that the Jewish Defense group had been behind the bombarding.

3 The Project To Kill Josip Broz Tito

Josip Broz Tito, a Yugoslavian leaders letter to Stalin.. Boss 100 ...

In spite of the fact that he was a socialist himself, Yugoslavia’s head of state Josip Broz Tito shockingly pulled in the rage of the Soviet Union and Joseph Stalin specifically. Looking to make Yugoslavia increasingly autonomous and confident, Tito removed himself from both the United States and the USSR in a harsh clash known as the Tito-Stalin Split.Because of this, Stalin needed Tito to be killed and gotten the ancestor to the KGB, the MGB, to proceed with it. The USSR’s best mystery specialist was doled out to do Tito’s death. He had recently killed another adversary of Stalin’s—Leon Trotsky. Tito, in any case, supernaturally endure the death endeavors unscathed.In reaction to the death plots, Tito sent an admonition to Stalin: “Quit sending individuals to slaughter me. We’ve just caught five of them, one of them with a bomb and another with a rifle.” Tito likewise kept in touch with Stalin: “On the off chance that you don’t quit sending executioners, I’ll send one to Moscow and I won’t need to send a second.”When the MGB’s progressively regular death plots neglected to kill Tito, they got devilishly imaginative. They at that point attempted to kill him with his very own plague. They exceptionally structured a dangerous microscopic organisms and intended to discharge the plague at a political gathering that Tito would join in. Everybody in the room would have been slaughtered by the plague expect for the KGB specialist who was directing it, as he would have been inoculated beforehand.The KGB additionally planned a toxic substance gem box to attempt to execute Tito. The case would have been given to Tito as a blessing, a Trojan pony of sorts, and would discharge a lethal gas that would execute any individual who opened it. Luckily, both toxic substance plans were rarely done, and Tito outlasted Stalin by about 30 years, biting the dust in 1980 at age 87.

2 The Listening Floor

Pay No Attention to the Spies on the 23rd Floor | History ...

During the Cold War, the KGB turned out to be truly adept at pestering structures and tuning in on discussions. Truth be told, they were so acceptable at such listening in that they once pester a whole floor of a lodging with sound reconnaissance receivers . . . for 20 years.In the mid 1970s, the travel industry started to thrive in the Soviet satellite nation of Estonia. The USSR considered it to be a chance to carry cash into the battling economy, and the KGB considered it to be a chance to keep an eye on outsiders. In 1972, the KGB assumed control over the highest floor of Hotel Viru in Estonia and wired the vast majority of the lodging with modern sound observation gadgets. The lodging was in a zone that was as often as possible went by universal businessmen.Sixty rooms in the inn were for all time set up with mystery mouthpieces, and different rooms could be irritated immediately. Outwardly, Hotel Viru seemed to have 22 stories. In truth, it had the mystery 23rd floor, which housed KGB specialists and the innovation that they used to keep an eye on the entirety of the visitors at the lodging. The KGB stayed there for two decades, until the breakdown of the Soviet Union shut down the reconnaissance activity in 1991.The KGB has been found to have been utilizing staggeringly advanced sound observation innovation in structures far and wide. In 1945, a gathering of Soviet kids introduced the US envoy to the USSR a blessing, a cut wooden plaque of the Great Seal of the United States, as a demonstration of companionship between the two nations. Notwithstanding, the plaque contained a mystery receiver. Indeed, this bug was one of the main sound observation gadgets to utilize inactive innovation to transmit sound signs, making it imperceptible by customary strategies and permitting it to be utilized for an all-inclusive time of time.The irritated plaque permitted the KGB to tune in on discussions in the American minister’s office for almost seven years, until it was inadvertently recognized in 1952 by a British radio administrator. The radio administrator was confounded when he heard discussions between Americans originating from a radio channel close to the international safe haven. That radio channel was being utilized by the KGB to tune in on the private discussions.

1 The Financing Of Terrorism

ENERGY AS A FINANCIAL SOURCE FOR TERRORISM | Energy Policy Turkey

After Yasir Arafat rose to control at the leader of the Palestine Liberation Organization (PLO), he built up a coalition with the KGB. The KGB at that point started to give mystery preparing to the PLO’s aggressors, who were waging war to savagely accomplish Palestinian statehood. Notwithstanding preparing, the KGB started to dispatch arms to the PLO guerrillas disregarding the ban put upon the Palestinian territories.Around this time, the PLO was completing numerous demonstrations of psychological warfare. In 1969 alone, they performed 82 carrier hijackings around the globe. The head of outside knowledge for the KGB, Aleksandr Sakharovsky, asserted that “plane seizing is my own invention.”The KGB likewise financed another Palestinian aggressor gathering, the Popular Front for the Liberation of Palestine (PLPF), providing them with rocket washes and automatic rifles. A pioneer of the PLPF, Wadie Haddad, was uncovered to be a KGB operator. While Haddad was accountable for the PLPF, he did different hijackings of regular citizen planes. One of those hijackings, the Dawson’s Field Hijackings of 1970, incited what’s known as Black September in Jordan, a wicked common war that kept going from September 1970 until July 1971.The KGB purportedly gave 100 assault rifles, programmed rifles, guns, and ammo to the Official Irish Republican Army (IRA) in 1972. The Irish paramilitary gathering introduced probably the most savage demonstrations of viciousness and psychological warfare in the Northern Irish clash known as the Troubles. One explanation that the KGB and USSR looked into the IRA was on the grounds that they had turned Marxist and had started to help transforming Ireland into a socialist state.

Become a Patron!
True Information is the most valuable resource and we ask you to give back

Kid’s shows, Erotica And Other Odd Diversions Of History’s Most Ruthless Men – Mao Zedong Was A Classical Poet

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Mao Zedong is listed (or ranked) 7 on the list Cartoons, Erotica And Other Bizarre Hobbies Of History's Most Brutal Leaders

Mao Zedong, founder of the People’s Republic of China, is technically the greatest mass murderer in history. In 1958, Mao brought forth (and ruthlessly enforced) “The Great Leap Forward,” which was a plan to catch China up to the economy of the western world. Unfortunately, this plan came with mass famine, starvation, torture, and systematic violence, which included making people work nude in the dead of winter, and parents burying their own children alive. All told, 45 million people died during Mao’s reign, a body count that remains unmatched by any other historical despot.

But the guy just loved poetry. Chairman Mao – though he persecuted many Chinese writers and had countless books burned – was an avid reader, as well as a bit of a writer. He wrote over 30 poems, usually in the format of the ancient Chinese style. Ironically, he would have forbidden one billion people from every reading his work, due to his principles, but who isn’t self-conscious about their poetry?

Kid’s shows, Erotica And Other Odd Diversions Of History’s Most Ruthless Men – Idi Amin Loved Children’s Cartoons

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Idi Amin is listed (or ranked) 6 on the list Cartoons, Erotica And Other Bizarre Hobbies Of History's Most Brutal Leaders

In 1971, Idi Amin overthrew the Ugandan government and installed himself as leader. During his eight-year reign, he would massacre over 400,000 civilians, often by forcing them to bludgeon one another to death with sledgehammers at the hands of his death squads. In 1979, Amin fled to Saudi Arabia, where he lived the rest of his days in exile – never facing any consequences for his crimes against humanity – before passing away in 2003.

But there was another side to Idi Amin. More than a tyrant, more than a mad man, Idi Amin was a guy who just loved slapstick comedy. He was apparently an avid fan of children’s cartoons, most specifically Tom and Jerry – you know, the one where the larger, menacing figure seeks to destroy the smaller, ostensibly defenseless one?

Kid’s shows, Erotica And Other Odd Diversions Of History’s Most Ruthless Men – Osama bin Laden Loved Beach Volleyball

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Osama bin Laden is listed (or ranked) 2 on the list Cartoons, Erotica And Other Bizarre Hobbies Of History's Most Brutal Leaders

 

Architect of the 9/11 attacks, the worst instance of terrorism ever on American soil, Osama bin Laden knew how to let his hair down and blow off some steam after a long day at Al-Qaeda HQ.

But when the 5 o’clock whistle blew, bin Laden didn’t dash to the nearest happy hour for wings and tall boys – he hit the sand for an intense match of beach volleyball.

The 6’4″ bin Laden was a force on the court, according to his associate Mohammed Atef. Atef, the former chief of Al-Qaeda, also enjoyed the game, but the two never played on the same team, citing the fact that they were so good it was an unfair advantage over other players.

Kid’s shows, Erotica And Other Odd Diversions Of History’s Most Ruthless Men – Saddam Hussein Wrote Steamy Romance Novels

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

 

Saddam Hussein's daughter now designs jewellery inspired ...

Indeed, even severe despots need time to loosen up. While overbearing maniacs have persecuted, starved, abused, tormented, and killed millions they’ve additionally set aside some effort to watch kid’s shows, play sea shore volleyball and even pen hot erotica.

While ordinarily a side interest refines somebody, these pastimes of the merciless despots on this rundown just make them progressively outsider and strange. This is what the absolute cruelest individuals in history got up to when they were off the clock.

Previous Leader of Iraq Saddam Hussein was a heartless pioneer who managed with an iron clench hand. The genuine degree of his monstrosities is obscure, as murders completed at his command are countless, yet there is proof of more than 250 mass graves from his rule. At the end of the day, preceding his hanging in 2003, Saddam was not a very chill fellow.

He was, in any case, horny.

Saddam had a propensity for composing romance books. Composing under the vigorously encoded nom de plume of “S. Hussein,” Saddam distributed a book called Zabibah and the Ruler, which was a ham-fisted and sensual personal novel set in antiquated Iraq. The revelation of this sappy, explicitly charged tome was additionally entirely arbitrary: CIA authorities discovered it by chance in an Arabic book shop in London in 2001.

TOP SECRET – Financing of ISIL Foreign Terrorist Fighters

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Worldwide Terrorist Operations Linked to Lebanese Hizballah or Iran

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

This Reference Help analyzes strategies and targets gathered from an audit of assaults or upset psychological oppressor activities from 2012-2018 connected to either Lebanese Hizballah (LH) or Iran. It recognizes practices and pointers that may ascend to the level for suspicious movement detailing in zones, for example, enlistment, procurement of mastery, materiel and weapons stockpiling, target type, and operational safety efforts, which could help bureaucratic, state, nearby, inborn, and regional government counterterrorism organizations, law requirement authorities, and private division accomplices in identifying, forestalling, acquiring, and disturbing potential psychological oppressor action in the Country. This Reference Help doesn’t suggest these pointers would fundamentally be watched or distinguished in each circumstance or that LH and Iran essentially utilize similar strategies or exhibit similar markers. A portion of these identification openings may come throughout typical examinations concerning criminal operations in the US, for example, unlawful travel or sneaking of medications, weapons, or money, and lead to the revelation of pre-operational action. An adaptation of this Reference Help’s infographic was additionally included as a supplement to a recently distributed Insight Evaluation. Data in this Reference Help is present starting at 16 May 2019.

Worldwide Terrorist Operations Connected to Lebanese Hizballah or Iran

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

This Reference Aid analyzes strategies and targets earned from a survey of assaults or disturbed fear based oppressor activities from 2012-2018 connected to either Lebanese Hizballah (LH) or Iran. It recognizes practices and pointers that may ascend to the level for suspicious movement announcing in regions, for example, enrollment, obtaining of ability, materiel and weapons stockpiling, target type, and operational safety efforts, which could help administrative, state, neighborhood, inborn, and regional government counterterrorism offices, law requirement authorities, and private area accomplices in distinguishing, counteracting, seizing, and disturbing potential fear monger action in the Homeland. This Reference Aid doesn’t suggest these pointers would fundamentally be watched or recognized in each circumstance or that LH and Iran essentially utilize similar strategies or exhibit similar markers. A portion of these identification openings may come over the span of ordinary examinations concerning criminal operations in the United States, for example, unlawful travel or carrying of medications, weapons, or money, and lead to the disclosure of pre-operational movement. A rendition of this Reference Aid’s infographic was additionally included as a supplement to a recently distributed Intelligence Assessment. Data in this Reference Aid is present starting at 16 May 2019.

DHS & FBI about ISIS Leader Baghdadi’s current Situation

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Image result for baghdadi video

Executive Summary:
(U//FOUO) This Joint Intelligence Bulletin (JIB) is intended to provide information on the recent video appearance by the Islamic State of Iraq and ash-Sham (ISIS) leader Abu Bakr al-Baghdadi. The video addresses the group’s territorial defeat in Syria, discusses the acceptance of pledges of allegiance from ISIS supporters, and praises recent attacks in Sri Lanka and Saudi Arabia. This JIB is provided by the FBI, DHS, and NCTC to support their respective activities and to assist federal, state, local, tribal, and territorial government counterterrorism and law enforcement officials and private sector security partners in deterring, preventing, or disrupting terrorist attacks against the United States. All video details described in this JIB are taken from the translated transcript of Baghdadi’s speech. The information cutoff date is 1 May 2019.

(U) Details of ISIS Leader Abu Bakr al-Baghdadi’s Video Message

(U//FOUO) On 29 April 2019, ISIS’s al-Furqan Media Establishment publicly released an 18-minute video message in Arabic titled “In the Company of the Amir of the Believers”, which shows ISIS leader Abu Bakr al-Baghdadi sitting on a carpet in an undisclosed location with an assault rifle at his side. This is Baghdadi’s first public statement since his August 2018 audio message, and his first video appearance since July 2014, when Baghdadi was filmed introducing himself as “caliph” of the newly-declared caliphate at the Grand Mosque in Mosul, Iraq.

(U) Baghdadi Vows a “Long Battle Ahead” Despite Defeat in Syria

• (U//FOUO) Baghdadi emphasizes that ISIS’s fight is not over, stating, “In truth, the battle between Islam and its people with the Cross and its people is long.” He further explains that ISIS is engaged in a multigenerational struggle and they plan to wear down their enemies with attrition, emphasizing that “jihad will continue until Judgement Day” and that “God Almighty ordered us to wage jihad and did not order us to achieve victory.”

• (U//FOUO) Baghdadi acknowledges that ISIS lost the war in Baghuz, Syria, but emphasizes that the “bravery, steadfastness, and endurance of the Ummah of Islam was evident.” He states that ISIS’s soldiers did not abandon their faith during the battle, and sacrificed their lives rather than giving away land to ISIS’s enemies.

• (U//FOUO) Baghdadi praises the members in all of ISIS’s provinces for their “unified raid to avenge their brothers in Syria, which amounted to 92 operations in eight countries.” He states these attacks indicate the cohesion and steadfastness of the “mujahedeen.” Baghdadi praises and thanks the now-deceased emirs, provincial governors, military personnel, and media members from various countries for their support to ISIS.

(U) Baghdadi Praised the Attacks in Sri Lanka and Saudi Arabia and Calls for Additional Operations

• (U//FOUO) Video footage displays the Sri Lanka attackers—who conducted a series of suicide bombings against luxury hotels and Christian churches in Sri Lanka on 21 April, killing approximately 250 people—pledging allegiance to Baghdadi, while audio of purportedly Baghdadi’s voice is heard stating, “You brothers in Sri Lanka have pleased the monotheists by their commando operations that unsettled the Crusaders in their Easter celebrate to avenge their brothers in Baghuz.” Baghdadi continues with “praise be to God, for among those killed were some Americans and Europeans.” Baghdadi congratulates the Sri Lanka attackers on their pledge of allegiance to join the “caliphate,” and asked God to accept them as martyrs.

• (U//FOUO) Baghdadi acknowledges the attack in Saudi Arabia—where ISIS fighters attacked a Saudi security building in Az Zulfi on 21 April—and asked God that it be “followed by another one.” He calls on members in Saudi Arabia “to continue down the path of jihad” against the Saudi regime.

• (U//FOUO) While Baghdadi appears in discussion with unidentified men, text on the screen indicates he was giving directives to “double the effort and intensify the blows against the Crusaders, apostates, and their supporters.”

(U) Baghdadi Accepts Pledges of Allegiance and Praises Global Network

• (U//FOUO) The video shows Baghdadi being handed booklets by one of the unidentified men which are labeled with the names of ISIS provinces, including Libya, Khorasan, Somalia, Yemen, Caucasus, West Africa, Central Africa, and Turkey, as well as Tunisia, which is not publicly identified as a province. This is the first time ISIS has referred to Turkey as an official province, or “wilayah,” in its media releases.

• (U//FOUO) Additionally, Baghdadi accepts pledges of allegiance from ISIS members in Burkina Faso and Mali, and congratulates them for joining the “caliphate.” He recommends they intensify their attacks against France and its allies and to avenge their brothers in Iraq and Syria.

• (U//FOUO) Baghdadi congratulates ISIS members in Libya for their resoluteness and their raid on the town of Al Fugaha, Libya. He states that despite their withdrawal from it, they have shown their enemies that they are capable of taking the initiative, knowing their battle today is a battle of attrition.

(U) Baghdadi’s Image Starkly Contrasts with Last Appearance in 2014

(U//FOUO) The video’s presentation of Baghdadi as an insurgent leader—similar to the images of now-deceased al-Qa‘ida (AQ) leader Usama Bin Laden and now-deceased AQ in Iraq leader Abu Musab al-Zarqawi from prior videos—contrasts with Baghdadi’s July 2014 appearance at the Grand Mosque in Mosul, Iraq, where he delivered a formal address from the mosque’s pulpit wearing a black turban and robe probably to evoke images of the last caliphs who ruled from Baghdad.

(U) Outlook

(U//FOUO) The FBI, DHS, and NCTC assess Baghdadi’s appearance almost certainly will bolster the morale for ISIS’s existing supporters around the world, including those in the United States, by indicating Baghdadi is alive and in control of the group as of late April 2019. Most homegrown violent extremists (HVEs) generally do not mobilize to violence in response to specific events and instead are usually influenced by a confluence of sociopolitical, ideological, and personal factors.a However, those wavering in their commitment to ISIS might feel a sense of renewed devotion to the group as Baghdadi is alive and apparently still managing ISIS.

NCC – Sunni Extremist Attacks in the USA before 9/11

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

(U//FOUO) NCTC (National Counterterrorism) assesses that the Sunni extremist threat to the US before 9/11 was characterized by diverse extremist organizations and lone actors motivated by multiple ideological narratives and other factors, including Salafi jihadism, Palestinian nationalism, theological disputes within Islam, anti-Semitism, and anti-Hindu sentiments. We have identified a dozen successful attacks, four disrupted plots, and one attempt to set up an extremist training camp in the US between 1973 and 2001, underscoring the persistent threat from al-Qa‘ida–associated extremists, Palestinian terrorist groups, and Sunni extremist lone actors in the decades leading up to 9/11.

 

 

These extremists chose a wide array of targets, with the majority of their attacks before 1993 focused on Hindu, Jewish, or Muslim individuals or institutions. Most attacks after that date were against civilian or US Government targets, because of al-Qa‘ida–associated extremists’ focus on indiscriminate mass casualty attacks. In some cases, we lack clear insight into the attackers’ motivations because of information gaps, and FBI disagrees about the motivations underlying two of these attacks.

 

 

Radicalization to Terrorism in the USA

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Executive Summary

Since its founding in 2012, the National Institute of Justice’s Domestic Radicalization to Terrorism program has sponsored research on how radicalization to terrorism occurs in the United States in order to support prevention and intervention efforts. These projects have taken a variety of approaches to examining the process of radicalization to terrorism, but in spite of this there is substantial overlap in their findings, which collectively provide evidence of the importance of several facilitators of radicalization and the need to take into account how this process unfolds within individuals over time.

Facilitators of Radicalization to Terrorism
Terrorist belief systems or narratives
Identity processes
Activities that demonstrate commitment to a terrorist group or cause
Connections with terrorists in one’s offline social network
Connections with terrorists via the internet and/or social media
Group dynamics
Grievances
Triggering events

At the individual level, the radicalization process often involves embracing a terrorist belief system or narrative that identifies particular others or groups as “enemies” and justifies engaging in violence against them. Individuals may also begin to identify themselves as terrorists, as well as to engage in activities that highlight their commitments to their new beliefs, identities, and/or others who hold them. It is, however, important to note that while these beliefs and behaviors may facilitate the movement to terrorism, this outcome is not inevitable. Those close to these individuals may become aware of the changes that their friends and family members are undergoing and attempt to address them or seek help from others who can. An important implication of this is that trusted information and resources need to be available to assist in this effort. Another is that prevention and intervention efforts may benefit from addressing beliefs that justify violence and helping individuals to develop identities in which these beliefs are not central.

Testing Two Theoretical Perspectives on Radicalization to Terrorism

In their completed NIJ-sponsored research, a team led by the University of Arkansas tested whether role identity theory and framing theory help to explain how individuals and groups radicalize to terrorism (Smith et al., 2016). In doing so, the researchers built on previous research conducted using the American Terrorism Study (ATS) database (e.g., Smith & Damphousse, 2009; Smith, Damphousse, & Roberts, 2006; Smith, Roberts, & Damphousse, 2013) and focused not on testing a complete model of the radicalization process but rather on testing what they viewed to be a crucial component of it: the construction of a terrorist identity. This process is outlined in Figure 2 on page 11.

Several concepts displayed in the figure are central to understanding the analyses the team conducted. The first two are identity salience and identity pervasiveness — both of which are based on the premise that everyone has multiple identities (e.g., as a parent, teacher, musician). If an identity is salient, it is more likely to be brought to bear in a particular situation. If an identity is pervasive, it is more likely to be brought to bear in numerous situations. The researchers hypothesized that individuals with more salient and pervasive terrorist identities would be more likely to engage in terrorism.

Christchurch May Inspire Other Terrorists – DHS-FBI

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

This Joint Intelligence Bulletin (JIB) is intended to provide information on Australian national and violent extremist Brenton Tarrant’s 15 March 2019 attacks on two mosques in Christchurch, New Zealand. These attacks underscore the enduring nature of violent threats posed to faith-based communities. FBI, DHS, and NCTC advise federal, state, local, tribal, and territorial government counterterrorism and law enforcement officials and private sector security partners responsible for securing faith-based communities in the Homeland to remain vigilant in light of the enduring threat to faith-based communities posed by domestic extremists (DEs), as well as by homegrown violent extremists (HVEs) who may seek retaliation. This JIB is provided to assist federal, state, local, tribal, and territorial counterterrorism and law enforcement officials and private sector security partners to effectively deter, prevent, preempt, or respond to incidents and terrorist attacks in the United States.

(U) Attack Details

(U//FOUO) On 15 March 2019, New Zealand police arrested an Australian national who appeared to be inspired by a white supremacist ideology and who allegedly conducted a shooting attack on two mosques in Christchurch, New Zealand. This attack highlights the enduring threat of violence posed to faith-based communities. There are currently 49 victims deceased, and 20 others are listed as being in critical condition following the attack.

» (U//FOUO) On 15 March 2019, at about 1:40 PM local time, Australian national Brenton Tarrant used firearms to attack the Masjid Al Noor Mosque in the city of Christchurch, New Zealand, before conducting a similar shooting attack at the Linwood Masjid Mosque, approximately four miles away. Tarrant drove to the attack sites and livestreamed a video of the attack. Police also discovered improvised explosive devices in a vehicle connected with the attack. Tarrant is currently the only known perpetrator; however, investigation of his movements and associates continues.

» (U//FOUO) Tarrant disseminated a manifesto prior to the shooting which detailed his concerns of perceived “white genocide.” The manifesto contains a wide range of anti-immigrant and anti-Muslim views. One reason listed as to why he carried out the attack was “to create conflict…within the United States on the ownership of firearms in order to further the social, cultural, political, and racial divide within the United states [sic].”

» (U//FOUO) Tarrant claimed to have been planning the attack for two years and recently relocated to New Zealand to live temporarily while he “planned and trained.” He claimed to have chosen to conduct his attack in Christchurch three months prior to show such attacks could happen anywhere.

(U) Mosque Attacks Could Incite Like-Minded and Retaliatory Attacks

(U//FOUO) We are concerned online sharing of Tarrant’s livestreamed footage could amplify viewer reaction to the violent attack and possibly incite similar attacks by those adhering to violent extremist ideologies in the United States and abroad, as well as retaliatory attacks from HVEs and individuals otherwise affiliated with foreign terrorist organizations. Tarrant appeared to have been influenced by prior attacks by violent extremists in the United States and other countries, and we remain concerned that US-based DEs of similar ideologies could become inspired by this attack. Although most HVEs generally do not mobilize to violence in response to specific events and instead are usually influenced by a confluence of sociopolitical, ideological, and personal factors, exceptions may occur and we remain concerned for the potential of retaliatory attacks by some HVEs, as we have already seen calls for attacks by violent extremists online.

» (U//FOUO) Tarrant claimed Norwegian mass attacker Anders Brevik gave his “blessing” for the attack. Tarrant’s ammunition cases also displayed handwritten names of violent extremists in Canada and elsewhere who previously conducted violent attacks on Muslims or in support of violent extremist ideologies.

» (U//FOUO) An examination of online jihadist media following the mosque attacks indicates various al-Qa‘ida and ISIS supporters are posting attack images to express outrage and are calling upon all Muslims to respond to the New Zealand attacks by launching their own near-term attacks in retaliation.

Ambulances used as Bombs in Afghanistan

Become a Patron!
True Information is the most valuable resource and we ask you to give back.


(U//FOUO) On January 27, 2019 at approximately 12:15pm local time, a vehicle resembling an ambulance and laden with explosives detonated after it passed through a police checkpoint in Kabul, Afghanistan. The explosion killed more than 100 people and wounded approximately 235 others. According to the deputy spokesperson for the Afghanistan Interior Ministry, the vehicle was painted to resemble an ambulance and had successfully passed through a checkpoint after the attacker allegedly told police he was transporting a patient to a nearby hospital. While stopped at a second checkpoint farther inside the city limits, the attacker detonated the explosives concealed in the vehicle. The explosion occurred in an area known as Chicken Street, which includes a prominent shopping zone and is in close proximity to foreign embassies and government buildings. A Taliban spokesman released a statement claiming responsibility and alleged the attack was in retaliation to an increased presence of U.S. troops and an increase in airstrikes throughout Afghanistan.

(U//FOUO) Individuals may consider using a variety of official vehicles or altering vehicles to look like official vehicles to further their terrorist objectives. The use of ambulances, law enforcement vehicles, fire vehicles, or other government vehicles could enable attackers to enter into secure areas to access sensitive sites or carry attackers, weapons, and/or explosives to an intended target location. Individuals may clone first responder vehicles by modifying unofficial vehicles with paint and decals to make them appear to be official; steal vehicles from residences, vulnerable vehicle lots, or while first responders are at a scene; or purchase retired, official vehicles and potentially re-equip them with equipment that was removed prior to sale to make them appear more legitimate. Incidents involving stealing or cloning first responder vehicles in the United States have often been associated with criminal activity, but individuals in the United States could also gain insight from international attacks to attempt similar tactical use of emergency response and government vehicles in terrorist attacks in the United States.

(U//FOUO) First responders should follow agency protocols for responding to suspicious incidents and safeguarding equipment and vehicles. The following non-exhaustive list identifies potential indicators of misuse or misrepresentation of first responder vehicles.

(U//FOUO) Drivers of government vehicles who are not knowledgeable or who become increasingly nervous when questioned about the organization represented on the vehicle they are driving
(U//FOUO) Incorrect vehicle decals, verbiage, colors, word font, and size
(U//FOUO) Visible identifiers, such as phone number or license plates, that are inconsistent with the vehicle’s operating area or mission are very suspicous.
(U//FOUO) Heavily loaded vehicles, possibly beyond capacity must be considered as dangerous.

 

Counterterrorism Weekly – A New Media Presented

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Image result for counterterrorism center

NATIONAL COUNTERTERRORISM CENTER
(U//FOUO) NCTC Counterterrorism Weekly Open Source Digest December 2018
December 24, 2018

Counterterrorism Weekly 6-18 December 2018
Page Count: 18 pages
Date: December 12, 2018
Restriction: For Official Use Only
Originating Organization: National Counterterrorism Center
File Type: pdf
File Size: 1,684,886 bytes
File Hash (SHA-256): 5DB3EF6875E67FA136A736986BC4F476BD2DA0DBCDC4DD30A0DB7241449EC7B1

Download File

https://info.publicintelligence.net/NCTC-CounterterrorismWeekly-121218.pdf

(U) Terrorist Profile: Former Jordanian ISIS Official Sa’d Al-Hunayti

(U) Jordanian national Sa’d al-Hunayti was a leading member of the Jihadist Salafi movement in Jordan before he traveled to Syria and joined Nusrah Front then ISIS. Hunayti was ultimately arrested by Hayat Tahrir al-Sham (HTS) for reportedly being a leader in ISIS-run secret cells in Idlib Province, Syria, that planted IEDs and conducted kidnappings and assassinations in northwest Syria.

Related image

 

(U) During the 1980s, Hunayti studied history at Yarmouk University in north Jordan and was suspended twice for “his political positions.” During this period, he was influenced by Sayyid Qutb’s idea of “governance,” according to Dr. Muhammad Abu-Rumman, a Jordanian researcher who specializes in Political Thought and Islamic Movements. (Sayyid Qutb was the Spotlight topic in the 23 May 2018 issue of this publication.)

(U) In 2011, Hunayti was arrested by Jordanian security forces after demonstrations in Al Zarqa that called for governmental and constitutional reforms. The protests were led by the Islamist movement, which dominated the political opposition, and by the popular protest movement, which encompassed numerous pro-reform organizations. Hunayti was released from Jordanian custody in October 2013.

(U) In April 2014, Hunayti traveled to Syria at the behest of senior Salafi Jihadi ideologue Abu-Muhammad al-Maqdisi to mediate between Nusrah Front and ISIS during their clashes in Deir az-Zour. Bassam al-Nu’aymi, an activist in the Jihadist Salafi movement in Jordan, said that after the failure of his reconciliation initiative, Hunayti received an offer from Nusrah Front leader Abu-Muhammad al-Jawlani to become a Sharia judge and head of the courthouse in northern Syria. The judicial branch faced controversy due to suspicious verdicts, leading to tensions with the Nusrah Front leadership that Hunayti viewed as hindering his “implementation of sharia.”

(U) Telegram Suspends Thousands of Violent Jihadist Accounts

Related image

(U) On 6 December, the Telegram messaging app suspended over 3,000 “terrorist” accounts. Telegram’s daily report on the “terrorist” accounts it blocks usually cites an average of 200-300 take-downs per day, but this rose to 507 on 5 December and significantly jumped to 3,276 on 6 December.

■ (U) Telegram’s “ISIS Watch” initiative to block channels with “terrorist content” was launched in 2016 after the company came under pressure over the number of violent jihadists operating on its platform. The ISIS Watch channel provided daily and monthly totals for its account suspensions.

■ (U) The Telegram cull followed a recent effort by ISIS to beef up its presence on the platform. ISIS operated a network of multiple channels and groups on Telegram under the “Nashir news agency” brand.

■ (U) Since 12 November, Nashir started advertising a flurry of new Telegram groups to complement its already swelling number of channels, enhancing the overall number of ISIS outlets on the platform.

■ (U) The measure of having dozens of mirror accounts, so far unique to ISIS, was designed to mitigate the impact of take-downs on the group’s media operation. So when 10 or 50 accounts are suspended, other duplicate accounts are still active.

■ (U) In November 2017, Nashir claimed to be operating 600 duplicate channels and groups. While this might have been an exaggerated figure, the group indeed has dozens of active accounts on Telegram. (BBC)

JCAT: (U//FOUO) The desire for and reliance on terrorists and their supporters to communicate electronically with like-minded individuals provides potential investigative avenues through human operations, outreach, and targeting analysis. While a subject’s communications can be anonymized or encrypted, often their participation in online forums, chat rooms, and initial contact with others may not be, providing a window for discovering trends and methods in terrorist COMSEC. (JCAT)

CIA released Bin Laden’s Secrets

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

In an effort to further enhance public understanding of al-Qa’ida, the Central Intelligence Agency (CIA) on 1 November 2017 released additional materials recovered in the 2 May 2011 raid on Usama Bin Ladin’s compound in Abbottabad, Pakistan.

With the release of these materials, the information remaining in the collection that has not been released publicly includes materials that are protected by copyright; sensitive such that their release would directly damage efforts to keep the nation secure; pornography; malware; blank, corrupted, and duplicate files. The entire collection has been available to the US Intelligence Community and Department of Defense organizations for years.

The Office of the Director of National Intelligence (ODNI) previously released documents from the collection on 20 May 2015, 1 March 2016, and 19 January 2017 after an interagency review spearheaded by the CIA. The releases align with ODNI initiatives for increased transparency – consistent with national security prerogatives – and the 2014 Intelligence Authorization Act, which required the ODNI to conduct a review of the documents for release.

CIA’s 1 November 2017 release includes additional al-Qa’ida letters, videos, audio files, and communications, as well as routine family correspondence. As a result, it builds on the ODNI releases that provided material relevant to understanding the plans and workings of terrorist organizations. The material is posted in its original Arabic format and in as close to the original form as possible, modified only so the files cannot be edited.

All of the material, which includes audio, document, image, video, and software operating system files, can be found on the All Original Filessection of this page. To view material by category, refer to the Audio, Documents, Images, and Video pages. To view the material by the device from which it originated, refer to the Devices page. Lastly, to view Microsoft Office files of various ages and formats that CIA has converted to Portable Document Format (PDF) for ease of viewing, refer to the Converted Material page.

Follow this link to access CIA’s press release.

The files underwent interagency review, and an effort was made to remove copyrighted material. However, the files may still contain some copyrighted works. Further reproduction, distribution, public performance, or public display of any copyrighted work is generally prohibited without the permission of the copyright owner. Copyright owners may request the removal of their content by submitting a notice via mail to Central Intelligence Agency, Office of Public Affairs, Washington, DC, 20505; via fax to 571-204-3800; or via the contact button on the CIA.gov homepage.

A notice must include:

  • A sufficient description of the copyrighted content to locate and remove it;
  • The copyright owner’s contact information or that of an authorized agent;
  • A statement of good faith belief that the use of the content at issue is not permitted by the copyright owner, an authorized agent, or the law; and
  • A statement that the information in the notice is accurate, including that it is submitted by the copyright owner of the content at issue or an authorized agent.

Bin Ladin’s Journal

1 November 2017

In addition to the computer files and digital media recovered in the May 2011 raid on Usama Bin Ladin’s compound in Abbottabad, Pakistan, CIA recovered Bin Ladin’s journal. As part of the 1 November 2017 release, CIA made available photographs of the journal, which includes an entry the day before Bin Ladin’s death. Please note the photographs were taken in the urgent hours after the raid as the US Intelligence Community analysts reviewed the material in search of clues that would reveal ongoing al-Qa’ida plots, as well as the identities and locations of al-Qa’ida personnel, and other information of immediate importance.

Journal Download Links (118 MB): [pdf] [zip] [tgz]     [zip md5] [tgz md5]

File Downloads

The material in this file collection may contain content that is offensive and/or emotionally disturbing. This material may not be suitable for all ages. Please view it with discretion.
Prior to accessing this file collection, please understand that this material was seized from a terrorist organization. Out of an abundance of caution we took the site down to resolve technical issues associated with the initial posting – and to remove additional detected malware – but we cannot guarantee that all malware has been removed.
Prior to accessing this file collection, please note the large file sizes of some of the material.
File Types File Index File Bundles File Size MD5 Hash
 
All Original Files
Various File Index [zip] [tgz] 258 GB [zip md5] [tgz md5]
 
Original Files by Content Type
Audio File Index [zip] [tgz] 30 GB [zip md5] [tgz md5]
Documents File Index [zip] [tgz] 16 GB [zip md5] [tgz md5]
Images File Index [zip] [tgz] 7 GB [zip md5] [tgz md5]
Video File Index [zip] [tgz] 162 GB [zip md5] [tgz md5]
 
Original Files by Device
Device List
 
MS Office Files Converted to PDF
PDF File Index [zip] [tgz] 12 GB [zip md5] [tgz md5]

Countering Terrorist Narratives

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

This investigation, dispatched by the European Parliament’s Arrangement Division for Subjects’ Rights and Sacred Issues at the demand of the LIBE Panel, gives a review of current ways to deal with countering psychological oppressor stories. The first and second segments layout the distinctive reactions created at the worldwide and European Union levels. The third segment introduces an investigation of four distinctive ways to deal with reacting to fear based oppressor stories: disturbance of publicity conveyance, divert technique, crusade and message outline, and government correspondences and synchronization of message and activity. The last area offers various arrangement proposals, featuring five interrelated ‘lines of exertion’ basic to amplifying the proficiency and viability of counterterrorism and countering fierce fanaticism key correspondence.

1. Worldwide activities to counter fear based oppressor accounts are completed by various distinctive on-screen characters on the supranational, global, local, national and sub-national levels. The UN has set up itself as a key player in the field of counter-stories, rousing related organizations, for example, the Worldwide Counterterrorism Gathering (GCTF) and Hedayah, to help states in building solid designs of activity in this field. Other worldwide associations, for example, NATO and OSCE, have executed activities that attention on vital interchanges and counter-stories. States have likewise expanded endeavors in countering fear based oppressor stories through participation with different states or non-state institutional accomplices. At last, tech organizations have found a way to counteract manhandle of their stages by fear based oppressor on-screen characters.

2. The EU has expected a main part in counter-account endeavors through its own particular offices and projects and in addition through supporting outside activities. Europol assumes a key part in expelling illicit psychological militant substance from the Web while the EU Web Gathering gives a stage to disturb fear monger content and open up counter-accounts. The EU likewise encourages a system of cutting edge specialists, the Radicalisation Mindfulness System, which gives investigations of existing counter-account endeavors. At last, there are various establishments working at the European level, frequently in association with either the EU or Part States, which encourage the making of counter-accounts between governments, industry, and common society.

3. There are four key patterns in current endeavors to handle fear monger purposeful publicity:

I. Interruption of promulgation circulation – The key goal is to meddle with the conveyance of publicity, to put it plainly, to attempt and stop purposeful publicity at the source by keeping it from achieving its intended interest group. Specifically, this has focussed on bringing down promulgation from web-based social networking and erasing affronting accounts.

ii. Divert technique – Instead of eradicating promulgation, this approach looks to divert watchers to various messages trying to ‘bump’ their conduct. Spearheaded by Jigsaw and ISD, this venture diverts those scanning for jihadist material to counter-informing.

iii. Crusade and message outline – These tasks look to give data and aptitudes to Common Society Associations (CSOs) to create correspondence battles, normally in light of counter-story or option account approaches. While interruption looks to stop the spread of purposeful publicity, this approach tries to empower CSOs with the aptitudes to stand up to and undermine the promulgation.

iv. Government correspondences and synchronization of message and activity – There is a propensity for correspondence crusades to be composed in a vacuum, detached from occasions, in actuality. Synchronization approaches take a thorough point of view and intend to connect messages and activities, and to arrange informing crosswise over government and with global accomplices. The quality of these methodologies is to keep the undermining of a story by uncovering its ‘say-do-hole’, through guaranteeing message and activities are adjusted, and through constraining opposing informing.

4. In spite of the fact that counter-accounts is broadly bolstered by governments, think tanks and NGOs, the idea itself is somewhat immature and does not have an exhaustive establishing in observational research. There is little proof to help the adequacy of counternarratives and a significant number of its hidden presumptions have been raised doubt about. There is a requirement for more noteworthy research here and, specifically, compelling observing and assessment of flow counter-account extends keeping in mind the end goal to have the capacity to guarantee that lessons are found out.

5. Counter-psychological oppression (CT) and countering vicious radicalism (CVE) vital correspondences endeavors crosswise over different projects and activities can be educated by the accompanying suggestions:

I. Interruption of fierce fanatic material should be connected extensively and over various stages, keeping in mind the end goal to abstain from dislodging fear monger informing movement between channels. The vacuum made by interruption should be loaded with a progression of messages intended to use a scope of motivational drivers, keeping in mind the end goal to resound with an intended interest group subject to changing inspirations and so as to have a strengthening total impact on that gathering of people.

ii. To guarantee cognizant informing over the short, medium and long haul, battle and message plan standards should be synchronized through the foundation of a reasonable and easy to-comprehend, larger focal account, which is upheld by a specifically assorted exhibit of messages.

iii. An unmistakable recognizable proof of the intended interest group is essential to successful key correspondences, considering a range of potential customers of the message (expected, unintended, supporters, enemies and neutrals). A nuanced behavioral and attitudinal comprehension of that group of onlookers is expected to powerfully shape mentalities and practices.

iv. Measuring the viability of vital interchanges requires appraisals that emphasis on measures of key education, specialized proficiency and target gathering of people. These appraisals should be at first performed preceding the beginning of a key interchanges exertion to build up a standard measure. Once the benchmark measurements are set up, these evaluations should be consistently executed as a way to check the viability and proficiency of the battle after some time.

v. So as to pick up put stock in, believability and authenticity according to an intended interest group, informing should be synchronized with exercises on the ground, in this manner diminishing the apparent uniqueness between what one says and does (the ‘say-do hole’). The focal necessity for enhancing the synchronization of informing and activity crosswise over organizations is to a great extent social. Antiquated states of mind that ‘activities talk louder than words’ add to a hierarchical culture, frequently strengthened by principle, which bears vital interchanges an ex post facto part in operations, procedure and arrangement. Vital correspondences ought to be a key thought in arranging from the earliest starting point of the

iii. A reasonable distinguishing proof of the intended interest group is key to viable vital correspondences, considering a range of potential buyers of the message (planned, unintended, supporters, foes and neutrals). A nuanced behavioral and attitudinal comprehension of that gathering of people is expected to powerfully shape mentalities and practices.

iv. Measuring the adequacy of key correspondences requires evaluations that emphasis on measures of vital education, specialized proficiency and target group of onlookers. These evaluations should be at first performed preceding the beginning of a key interchanges exertion with a specific end goal to build up a benchmark measure. Once the benchmark measurements are built up, these appraisals should be frequently executed as a way to check the adequacy and productivity of the battle after some time.

v. Keeping in mind the end goal to pick up put stock in, believability and authenticity according to an intended interest group, informing should be synchronized with exercises on the ground, in this manner lessening the apparent dissimilarity between what one says and does (the ‘say-do hole’). The focal prerequisite for enhancing the synchronization of informing and activity crosswise over administrations is to a great extent social. Antiquated states of mind that ‘activities talk louder than words’ add to a hierarchical culture, regularly strengthened by precept, which bears key interchanges an ex post facto part in operations, procedure and arrangement. Key correspondences ought to be a key thought in arranging from the earliest starting point of the

 

Attack on German Christmas Market underscores Threat to Mass Gatherings

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Germany: Vehicular Assault at Christmas Market Underscores Threat to Mass Gatherings and Open-Access Venues

Page Count: 4 pages
Date: December 21, 2016
Restriction: For Official Use Only
Originating Organization: Department of Homeland Security, Office of Intelligence and Analysis
File Type: pdf
File Size: 298,161 bytes
File Hash (SHA-256): ED0FA815C6477AA7CF193FB8C1972FE0D727BD52F7599F39FF9C7893C7A86807

Download File

(U) A 25-ton commercial truck transporting steel beams from Poland to Germany plowed into crowds at a Christmas market in Berlin at about 2000 local time on 19 December, killing at least 12 people and injuring 48 others, several critically, according to media reporting citing public security officials involved in the investigation. The truck was reportedly traveling at approximately 40 miles per hour when it rammed the Christmas market stands. Police estimate the vehicle traveled 80 yards into the Christmas market before coming to a halt.

(U) German authorities are calling the attack a terrorist incident, with the attacker still at large. German authorities are warning that it is unclear if the attacker was a lone offender, acted as part of a cell, or if he received any sort of direction by a FTO, and expressed concern that additional attacks are possible. An individual who was initially detained on 19 December was released on 20 December, and is no longer considered a suspect, according to German police. The truck may have been stolen or hijacked with the original driver overpowered or murdered. The original driver, found dead in the truck cab, appears to have died from stabbing and shooting wounds, according to media reporting citing law enforcement officials. The truck tracking location system indicated repeated engine stalls in the time leading up to the attack, leading the owner of the vehicle to speculate this was unlikely if a veteran driver was operating the truck, unless there was some sort of mechanical trouble. In response to the incident, German authorities, as part of their heightened security posture, will place concrete barriers around access points at Christmas markets across Germany.

(U//FOUO) Vehicle Ramming Featured in Recent Terrorist Messaging

(U//FOUO) I&A assesses that the 19 December likely terrorist attack at one of the largest Christmas markets in Berlin highlights terrorists’ continued use of simple tactics and is consistent with recent calls by the self-proclaimed Islamic State of Iraq and the Levant (ISIL) for attacks in the West using “all available means.” In an early December audio statement, ISIL spokesman Abu Hassan al-Muhajir called for attacks in “their homes, markets, street gatherings and anywhere they do not think of.” Vehicle ramming has been featured in recent violent extremist publications and messaging—including in ISIL’s al Rumiyah magazine and al-Qaʻida in the Arabian Peninsula’s (AQAP) Inspire magazine—especially since the mid-July vehicle ramming attack in Nice, France. The early-November third issue of Rumiyah highlighted applicable targets for vehicle ramming attacks such as “large outdoor conventions and celebrations, pedestrian-congested streets, outdoor markets, festivals, parades, and political rallies.” The most recent Homeland attack featuring this tactic occurred at Ohio State University in Columbus on 28 November, where Abdul Razak Ali Artan ran over pedestrians and then continued the attack with an edged weapon after the vehicle came to a stop.

(U//FOUO) On 20 December, ISIL’s A’maq News Agency called the attacker “an Islamic State soldier” consistent with previous instances of quickly posting claims of credit for operations. While the attack bears the hallmarks of ISIL’s tactics and targets, we have not been able to determine a definitive link to the group at this time.

(U//FOUO) I&A has no information indicating a specific or credible threat against individuals, locations or events in the Homeland, but several recent plots and attacks in the United States and overseas involving shopping malls, mass transit, and mass gatherings, including sporting events, have shown that homegrown violent extremists (HVEs) and terrorist groups are interested in attacking these types of targets. I&A assesses that commercial facilities—such as festivals, concerts, outdoor events, and other mass gatherings—remain a potential target for terrorists or HVEs, as they often pursue simple, achievable attacks with an emphasis on economic impact and mass casualties. The most likely tactics in a hypothetical terrorist attack against such events likely would involve edged weapons, small arms, vehicular assaults, and possibly improvised explosive devices. The 19 December events underscore the difficulties the private sector and law enforcement face in securing venues that are pedestrian-friendly, particularly in light of the large number of such aereas.

Isis Attack On Paris, Isis Attack In Us, Isis Attack Israel, Isis Attack In Syria, Isis Attack In France, Isis Attack In Philippines, Isis Attack 2017, Isis Attack In London, Isis Attack In Iran, Isis Attack In America, Isis Attack America, Isis Attack Afghanistan, Isis Attack April 2017, Isis Attack At Concert, Isis Attack Australia, Isis Attack Airport, Isis Attack Asia, Isis Attack Ariana Concert, Isis Attack Ariana, Isis Attack Articles, Isis Attack Brussels, Isis Attack Bangladesh, Isis Attack Britain, Isis Attack Base In Syria, Isis Attack Bus, Isis Attack By Pigs, Isis Attack By Boars, Isis Attack Baghdad, Isis Attack Bohol, Isis Attack Base, Isis Attack China, Isis Attack Church, Isis Attack Concert, Isis Attack Chicago, Isis Attack California, Isis Attack Cnn, Isis Attack Chemical, Isis Attack Catholic, Isis Attack Copenhagen, Isis Attack Churches In Egypt, Isis Attack Dubai, Isis Attack Dates, Isis Attack Drone, Isis Attack During Ramadan, Isis Attack Disney World, Isis Attack Dates 22nd, Isis Attack Dublin, Isis Attack Dates Pattern, Isis Attack Dates 22, Isis Attack Dates Uk, Isis Attack Egypt, Isis Attack Europe, Isis Attack Edc, Isis Attack England, Isis Attack Edinburgh 2016, Isis Attack Edc Las Vegas, Isis Attack Egypt Video, Isis Attack Egypt Palm Sunday, Isis Attack Egypt Church, Isis Attack Egypt Bus, Isis Attack France, Isis Attack Fresno, Isis Attack Fresno Ca, Isis Attack France 2016, Isis Attack Fox News, Isis Attack France 2015, Isis Attack France 2017, Isis Attack Footage, Isis Attack Florida, Isis Attack Facts, Isis Attack Germany, Isis Attack Garland Texas, Isis Attack Great Britain, Isis Attack Greece, Isis Attack Graphic, Isis Attack Glasgow, Isis Attack Geelong, Isis Attack Georgia, Isis Attack Guildford, Isis Attack Gaza, Isis Attack Helicopter, Isis Attack History, Isis Attack Hospital Kabul, Isis Attack Hotel, Isis Attack Hong Kong, Isis Attack Hama, Isis Attack Homs, Isis Attack Homes, Isis Attack Houston, Isis Attack Hastings, Isis Attack In Paris, Isis Attack In Us, Isis Attack Israel, Isis Attack In Syria, Isis Attack In France, Isis Attack In Philippines, Isis Attack In London, Isis Attack In Iran, Isis Attack In America, Isis Attack In Russia, Isis Attack Japan, Isis Attack Jordan, Isis Attack Jakarta, Isis Attack Jerusalem, Isis Attack July 4th, Isis Attack June 2015, Isis Attack July 4th 2015, Isis Attack January 2016, Isis Attack Jamaica, Isis Attack June 26, Isis Attack Kabul, Isis Attack Kuwait, Isis Attack Kirkuk, Isis Attack Kansas City, Isis Attack Kuala Lumpur, Isis Attack Kabul Hospital, Isis Attack Kaaba, Isis Attack Kenya, Isis Attack Kobani, Isis Attack Kitchener, Isis Attack List, Isis Attack Las Vegas, Isis Attack London, Isis Attack Locations, Isis Attack Liveleak, Isis Attack London 2017, Isis Attack Lebanon, Isis Attack Last Night, Isis Attack London 2015, Isis Attack Live, Isis Attack Map, Isis Attack Manchester, Isis Attack Marawi, Isis Attack May 2017, Isis Attack Military Base, Isis Attack Methods, Isis Attack Mosul, Isis Attack Malaysia, Isis Attack Mecca, Isis Attack Manila, Isis Attack News, Isis Attack New Orleans, Isis Attack New York, Isis Attack Nice France, Isis Attack Nice, Isis Attack North Korea, Isis Attack Northern Ireland, Isis Attack New Zealand, Isis Attack Next, Isis Attack Now, Isis Attack On Paris, Isis Attack On Us, Isis Attack On Israel, Isis Attack On France, Isis Attack On Russia, Isis Attack On Syria, Isis Attack On London, Isis Attack On Mosul, Isis Attack On Las Vegas, Isis Attack On Palm Sunday, Isis Attack Paris, Isis Attack Philippines, Isis Attack Palm Sunday, Isis Attack Pakistan, Isis Attack Pictures, Isis Attack Parliament, Isis Attack Pope, Isis Attack Paris 2017, Isis Attack Philippines 2017, Isis Attack Pattern, Isis Attack Queanbeyan, Isis Attack Qaraqosh, Isis Attack Quiapo, Isis Attack Queen, Isis Attack Qatar, Isis Attack Quebec, Isis Attack Quotes, Isis Attack Quaragosh Iraq, Isis Attack Al Qaeda, Isis Plan To Attack Queen, Isis Attack Russia, Isis Attack Recent, Isis Attack Russian Plane, Isis Attack Ramadan, Isis Attack Records, Isis Attack Refugee Camp, Isis Attack Resort World, Isis Attack Resorts World Manila, Isis Attack Rome, Isis Attack Russia 2017, Isis Attack Syria, Isis Attack Seattle, Isis Attack Saudi Arabia, Isis Attack Statistics, Isis Attack Spain, Isis Attack Sweden, Isis Attack Syrian Army, Isis Attack Strategy, Isis Attack St Petersburg, Isis Attack Syria 2017, Isis Attack Timeline, Isis Attack Texas, Isis Attack Today, Isis Attack Turkey, Isis Attack Today In Syria, Isis Attack This Morning, Isis Attack The Philippines, Isis Attack Tikrit, Isis Attack Today In Egypt, Isis Attack Techniques, Isis Attack Us, Isis Attack Usa, Isis Attack Uk, Isis Attack United States, Isis Attack Us Base, Isis Attack Usa 2017, Isis Attack Uae, Isis Attack Us Helicopter, Isis Attack Us Base In Syria, Isis Attack Uk 2017, Isis Attack Videos, Isis Attack Vegas, Isis Attack Vatican, Isis Attack Videos Liveleak, Isis Attack Vietnam, Isis Attack Venice, Isis Attack Virginia, Isis Attack Vancouver, Isis Attack Valparaiso, Isis Attack Vienna, Isis Attack Wiki, Isis Attack Westminster, Isis Attack Warning, Isis Attack World, Isis Attack Wicklow, Isis Attack Wigan, Isis Attack Washington, Isis Attack Wwe, Isis Attack Wolverhampton, Isis Attack Westfield, Isis Xmas Attack, Isis Attack Yesterday, Isis Attack Youtube, Isis Attack Yemen, Isis Attack Yazidi, Isis Attack Yyc, Isis Attack Yarmouk, Isis Attack Yarmouk Camp, Isis Attack Yorkshire, Isis Attack Ypg, Isis Attack Us, Isis Attack Zones, Isis Attack Zurich, Isis Attack New Zealand