{"id":110725,"date":"2017-11-30T15:28:00","date_gmt":"2017-11-30T15:28:00","guid":{"rendered":""},"modified":"2023-01-08T11:03:23","modified_gmt":"2023-01-08T11:03:23","slug":"spies-in-land","status":"publish","type":"post","link":"https:\/\/cvnextjob.com\/index.php\/2017\/11\/30\/spies-in-land\/","title":{"rendered":"Spies in the Land"},"content":{"rendered":"<div style=\"margin-top: 0px; margin-bottom: 0px;\" class=\"sharethis-inline-share-buttons\" ><\/div><h3 class=\"post-title entry-title\" itemprop=\"name\"><\/h3>\n<div class=\"post-header\"> <\/div>\n<p>It&#8217;s been a rough week for key members of the terrorist networks in Syria and Iraq.<\/p>\n<p>Last Wednesday, a U.S. airstrike successfully targeted David Drugeon,  the French defector who had emerged as one of the leading bomb makers  for Khorasan Group, a collection of Al Qaida veterans who are now  fighting in Syria.&nbsp; More from the <a href=\"http:\/\/www.longwarjournal.org\/threat-matrix\/archives\/2014\/11\/french_defector_david_drugeon.php\"><i>Long War Journal<\/i><\/a>:<\/p>\n<p><span style=\"font-size: xx-small;\">Video surfaced on Facebook late Nov. 5 alleging to show the aftermath  of a United States airstrike in Idlib. A number of recent airstrikes, <a href=\"http:\/\/www.longwarjournal.org\/archives\/2014\/11\/al_nusrah_front_twee.php\">as we now know<\/a>, were targeting the Khorasan Group, a collection of al Qaeda veterans embedded within the Al Nusrah Front<\/span>.<\/p>\n<p><span style=\"font-size: xx-small;\">US Central Command <a href=\"http:\/\/www.centcom.mil\/en\/news\/articles\/nov.-6-u.s.-military-forces-conduct-airstrikes-against-khorasan-group-terro\">announced<\/a> that &#8220;US military forces conducted airstrikes last night against five  Khorasan Group targets in the vicinity of Sarmada, Syria, using bomber,  fighter and remotely piloted aircraft&#8221; in a press release yesterday.<\/span><\/p>\n<p><span style=\"font-size: xx-small;\"> <\/span><span style=\"font-size: xx-small;\">&#8220;We are still assessing the outcome of the attack, but have initial  indications that it resulted in the intended effects by striking  terrorists and destroying or severely damaging several Khorasan Group  vehicles and buildings assessed to be meeting and staging areas,  IED-making facilities and training facilities,&#8221; the release continued.<\/span><\/p>\n<p><span style=\"font-size: xx-small;\"> <\/span><span style=\"font-size: xx-small;\"><i>Fox News<\/i> <a href=\"http:\/\/www.foxnews.com\/politics\/2014\/11\/06\/france-born-bomb-maker-for-khorasan-group-believed-killed-by-drone-strike\/\">reported<\/a> that David Drugeon, a French defector to al Qaeda and a master bomb maker, was targeted in the airstrikes.&nbsp;<\/span><\/p>\n<p><span style=\"font-size: xx-small;\"> <\/span><span style=\"font-size: xx-small;\">&#8220;The drone struck a vehicle traveling in Syria&#8217;s Idlib province that  was believed to be carrying Drugeon. The driver of the vehicle is  thought to have lost a leg and was expected to die, according to sources  with knowledge of the operation. A second person thought to be Drugeon  was killed, according to well-placed military sources,&#8221; <i>Fox News<\/i> reported.<\/span><\/p>\n<div style=\"background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;\"><span style=\"font-size: x-small;\">Drugeon was considered a particularly  high-value target due to his advanced skills with explosives.&nbsp;  Intelligence officials claim he had perfected a technique for dipping  clothing into explosive material, allowing wearers to pass undetected  through airport security checkpoints and other screening measures.&nbsp;<\/span><br \/><span style=\"font-size: x-small;\"><br \/><\/span><span style=\"font-size: x-small;\"><br \/><\/span><\/div>\n<div style=\"background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;\"><\/div>\n<div style=\"background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;\"><span style=\"font-size: x-small;\">As the Long War Journal notes, the  attack on Drugeon&#8217;s car was carried out with remarkable precision.&nbsp;  Video from the scene shows the vehicle engulfed in flames, while a  building just a few feet away appears untouched.&nbsp; According to a CENTCOM  spokesman, USAF B-1s, F-16s and drones participated in the attack; both  the &#8220;Bone&#8221; and the Viper are capable of dropping the 250-lb <a href=\"http:\/\/www.bga-aeroweb.com\/Defense\/Small-Diameter-Bomb.html\">Small Diameter Bomb (SDB)<\/a>,  which is designed to minimize collateral damage.&nbsp; A large number of  Predator and Reaper UAVs can employ Hellfire missiles, which can also be  utilized in urban environments.&nbsp; So far, the Pentagon hasn&#8217;t disclosed  the weapon used to kill Drugeon. &nbsp;<\/span><br \/><span style=\"font-size: x-small;\"><br \/><\/span><span style=\"font-size: x-small;\"><br \/><\/span><\/div>\n<div style=\"background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;\"><\/div>\n<div style=\"background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;\"><span style=\"font-size: x-small;\">Two days later, American airpower  targeted a 10-vehicle ISIS convoy in Mosul&#8211;carrying an even more  important target.&nbsp; The leader of the terror caliphate, Abu Bakr  al-Baghdadi, was among those riding in the convoy, and reportedly  wounded in the attack.&nbsp; A Twitter account belonging to an ISIS spokesman  wished al-Baghdadi a &#8220;speedy recovery&#8221; from his wounds, although that  account was difficult to verify.<\/span><\/p>\n<p><span style=\"font-size: x-small;\">According to various press accounts and  claims by Iraqi officials, the ISIS leader was either seriously wounded  in the attack, or not traveling in the convoy.&nbsp; U.S. officials believe  that one of al-Baghdadi&#8217;s senior aides&#8211;who normally travels with  him&#8211;was killed in the airstrike, increasing the odds that the ISIS  kingpin may have been riding in one of the targeted vehicles.<\/span><br \/><span style=\"font-size: x-small;\">&nbsp;&nbsp;<\/span><\/div>\n<div style=\"background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;\"><\/div>\n<div style=\"background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;\"><span style=\"font-size: x-small;\">The convoy target reflected poor  operational security on the part of ISIS leadership, and suggested they  weren&#8217;t particularly concerned about limited American airstrikes, or  intelligence collection capabilities.&nbsp; That thinking will probably  change, especially if rumors about al-Baghdadi prove true.&nbsp;&nbsp;<\/span><\/div>\n<div style=\"background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;\"><\/div>\n<div style=\"background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;\"><span style=\"font-size: x-small;\">Convoys of ISIS fighters, usually riding  in Toyota pick-up trucks, have been a standard part of the group&#8217;s  operating procedures for many years.&nbsp; And while that image may be  frightening to local villagers or poorly-prepared Iraqi soldiers, they  present a both a signature and a target from 20,000 feet.&nbsp; If  al-Baghdadi survives, his future movements will become much more  discrete, as will his communications. &nbsp;<\/span><\/div>\n<div style=\"background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;\"><\/div>\n<div style=\"background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;\"><span style=\"font-size: x-small;\">In reality, the Friday air strike in  Mosul was more than the product of air supremacy and persistent  surveillance by various drone aircraft.&nbsp; Tracking down&#8211;and taking  down&#8211;terrorist leaders is often the product of months of careful  intelligence collection and analysis, used to identify cells, larger  networks and the individuals who lead them. &nbsp;<\/span><\/div>\n<div style=\"background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;\"><\/div>\n<div style=\"background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;\"><span style=\"font-size: x-small;\">Shane Harris of <i>The Daily Beast<\/i>  has a new book coming out that details how such techniques were  successfully used by the National Security Agency (and its military  partners) during the Iraqi surge six years ago.&nbsp; Here&#8217;s a brief excerpt  that explains the overall concept:<\/span><\/div>\n<div style=\"background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;\"><\/div>\n<p><\/p>\n<div style=\"background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;\"><\/div>\n<div style=\"background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;\"><span style=\"font-size: xx-small;\">The Iraqi cell phone network was a potential intelligence gold mine.  Cell phone contracts were among the first business deals struck in Iraq  after Saddam Hussein was driven from power. Wireless was cheaper than  wired communications, and cell phones were proliferating. The NSA had  access to foreign telecommunications networks through agreements struck  with the United States\u2014based carriers that operated them. These  companies were paid handsomely\u2014each receiving tens of millions of  dollars annually, according to one former company executive\u2014to give the  spy agencies privileged access to their networks and the data coursing  through them.&nbsp;<\/span><\/div>\n<p><\/p>\n<div style=\"background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;\"><\/div>\n<div style=\"background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;\"><span style=\"font-size: xx-small;\">After Bush gave his order, daily strikes in Iraq were being carried  about by a hybrid military and intelligence unit that brought together  soldiers and spies. Their center of operations was a concrete hangar at  the Balad Air Base, north of Baghdad, which had once housed Iraqi  fighter jets. Most of the planes here now were unmanned drones. Their  pilots worked alongside NSA hackers, FBI cyber forensics investigators,  and special operations forces\u2014the military\u2019s elite commando squads. They  all broke off into clusters, working with a seamless, almost organic  precision. The hackers stole information from the enemy\u2019s electronic  devices and passed it to the analysts, who drew up target lists for the  troops. As they went off on raids, the drone pilots watched overhead,  giving eye-in-the-sky warning to the troops on the ground, thanks to  sophisticated cameras and other sensors developed by the CIA. Sometimes  the drone pilots themselves made the kill with a missile shot.<\/span><\/div>\n<div style=\"background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;\"><\/div>\n<div style=\"background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;\"><span style=\"font-size: xx-small;\">When an attack was finished, the troops gathered more intelligence from  the site or from the fighters they captured\u2014cell phones, laptop  computers, thumb drives, address books, scraps of paper called \u201cpocket  litter\u201d that might contain nothing more than a name, a phone number, or a  physical or e-mail address. The troops brought the information back to  the base and gave it to the analysts, who fed it into their databases  and used data-mining software to look for connections to other fighters  either in custody or at large. They paid close attention to how the  fighters were getting money for their operations, including sources  outside Iraq\u2014in Syria, Iran, and Saudi Arabia.<\/span><\/div>\n<div style=\"background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;\"><\/div>\n<div style=\"background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;\"><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">As Mr.  Harris details, there was another, important element to this operation:  offensive cyber ops.&nbsp; With detailed knowledge of how the terrorists  communicated, NSA hackers sometimes sent fake messages to particular Al  Qaida operatives, instructing them to meet at a certain location, or  plant a bomb at a particular point.&nbsp; In many cases, the terrorists  complied and were captured by U.S. troops, or on other occasions,  dispatched by a Hellfire missile.&nbsp; U.S. cyber warriors also planted  malware in the computers and servers used by enemy fighters, gaining  detailed information on everything from operational plans, to expense  accounts for individual operatives. &nbsp;&nbsp;<\/span><\/span><\/div>\n<div style=\"background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;\"><\/div>\n<div style=\"background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;\"><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">The  enterprise illuminated scores of terrorist networks and led directly to  their elimination.&nbsp; And, there is little doubt the same techniques are  being used against ISIS.&nbsp; The fight is more difficult this time around.&nbsp;  Al-Baghdadi has reportedly &#8220;absorbed&#8221; the lessons of the surge and is  determined not to repeat the mistakes made back in 2007 and 2008.&nbsp; But  his near-elimination last Friday suggests he still has some lessons to  learn, and that ISIS has underestimated its foes. &nbsp;&nbsp;<\/span><\/span><\/div>\n<div style=\"background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;\"><\/div>\n<div style=\"background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;\"><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">From  the terrorists&#8217; perspective, the good news is that the U.S. doesn&#8217;t have  a massive ground presence to instantly exploit information developed by  the spooks.&nbsp; The bad news is our collection and analytical capabilities  have improved since the days of the surge and we can still pinpoint the  bad guys amid all the electronic clutter.&nbsp; Al-Baghdadi will probably  adopt a lower profile in the future; that increases the difficulty of  targeting him, but it also degrades his ability to run the ISIS empire.&nbsp;  Put another way: that convoy ride in Mosul was probably his last,  figuratively if not literally. &nbsp;<\/span><\/span><\/div>\n<div style=\"background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;\"><\/div>\n<div style=\"background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;\"><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">***ADDENDUM***<\/span><\/span><\/div>\n<div style=\"background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;\"><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">Along  with electronic surveillance, ISIS is also facing a threat from eyes on  the ground.&nbsp; Human intelligence (HUMINT) has never been our strong suit,  but we are quite adept at paying money for information.&nbsp; The Kurds have  a decent intel network in northern Iraq, and it&#8217;s probably being used  to spread the intel equivalent of &#8220;walking around money,&#8221; with the  promise of a much larger payday for anyone who can lead us to  al-Baghdadi and his senior aides.&nbsp; As he recovers from his wounds, the  ISIS leader must be wondering if he was exposed by his cell phone, his  computer or even someone inside his organization. &nbsp;&nbsp; &nbsp; <\/span><\/span><br \/><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\"><br \/><\/span><\/span><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">Late  Monday, a Pentagon spokesman said the convoy raid did not target  senior-level terrorists, but rather, was aimed at operational  commanders. &nbsp;That suggests we somehow got lucky (assuming al-Baghdadi  was present), or the statement was aimed at concealing our ability to  identify terror networks and their leaders. <\/span><\/span><\/div>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s been a rough week for key members of the terrorist networks in Syria and Iraq. Last Wednesday, a U.S. airstrike successfully targeted David Drugeon, the French defector who had emerged as one of the leading bomb makers for Khorasan Group, a collection of Al Qaida veterans who are now fighting in Syria.&nbsp; More from [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/posts\/110725"}],"collection":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/comments?post=110725"}],"version-history":[{"count":0,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/posts\/110725\/revisions"}],"wp:attachment":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/media?parent=110725"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/categories?post=110725"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/tags?post=110725"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}