Some voters in Germany’s capital, Berlin, may have to re-cast their ballots after the country’s federal election czar filed an official complaint over irregularities in a parliamentary vote held two months ago.

The election – which saw Berliners decide the makeup of the German parliament, the Bundestag, as well as select city representatives – was marred by irregularities at numerous polling stations, according to the official, Georg Thiel. 

Among the most common problems were ballot shortages and long lines, with waiting times of up to two hours. In some cases, voters were also seen casting their ballots past a 6pm cutoff – the time when all polling stations were supposed to have closed. Thiel, who was tasked with overseeing elections at federal level, saw all of the above as reason enough to raise an objection in the German capital, local media reported on Friday.

Read more

Workers remove a campaign poster showing Armin Laschet, the Christian Democratic Union’s candidate for chancellor, in Bad Segeberg, Germany, September 27, 2021. © Fabian Bimmer / Reuters
Conservative wing of Merkel’s bloc says party leadership must resign after ‘debacle’ in Germany’s general election

Thiel identified six Berlin constituencies where irregularities were allegedly rampant, potentially setting the stage for a re-do election in the city.  

It is now up to a special Bundestag committee to examine Thiel’s complaint and see if the reported violations ran afoul of German law or electoral procedures. For the vote to be repeated, however, at least one of those violations would have to be deemed serious enough to have affected the distribution of seats in the Bundestag.

The September 26 election saw outgoing Chancellor Angela Merkel’s conservatives take a historic beating, with the Social Democrats coming out on top. The Social Democratic Party (SPD) has been engaged in coalition talks with the Greens and the Free Democratic Party ever since, with the trio expected to announce a preliminary deal as early as next week.

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !

Planetary alignment on Friday has offered sky-gazers around the globe a chance to witness a spectacular near-total lunar eclipse, the longest since the 1440s.

The fascinating astronomical phenomenon lasted three hours and 28 minutes – the longest in centuries, according to international space agencies. On Thursday and Friday, depending on local time zones, the Earth, Sun and Moon aligned in such a way that 97.4% of our natural satellite’s surface was darkened in shadow.

When the Moon came out of the shroud, it turned bloody or rusty red in sunlight.

The dramatic celestial show was visible in those parts of the globe where the Moon appeared above the horizon during the eclipse.

Sky watchers in North and South America, parts of Eastern Asia and Australia had a chance to witness the phenomenon.

In Russia, the partial eclipse could be seen in Siberia and the Far East. Russian space agency Roscosmos also shared images of the shadowed moon as seen from the International Space Station (ISS).

Adding to the astonishment, the Moon was very low in the sky for much of the eclipse, causing an optical illusion that made it seem larger.

While the full Moon travels through Earth’s shadow roughly two times a year, lunar eclipses are usually far shorter.

The latest event, due to its rare duration, might have affected people not only visually, but also emotionally, astrologers cautioned.

Like this story? Share it with a friend!

find more fun & mates at SoShow now !

Mark Kelton, Former Deputy Director, CIA’s Counterintelligence, National Clandestine Service

Cipher Brief Expert Mark Kelton is a retired senior Central Intelligence Agency executive with 34 years of experience in intelligence operations. Before retiring, he served as CIA’s Deputy Director for Counterintelligence.  He is a partner at the FiveEyes Group and is Board Chair of Spookstock, a charity that benefits the CIA Memorial Foundation, the Special Operations Warrior Foundation and the Defense Intelligence Memorial Foundation.

EXPERT PERSPECTIVE — Winston Churchill’s 04 June 1940 speech in which he vowed that he and his countrymen would “fight on the beaches “and would “never surrender” in the face of a seemingly inevitable Nazi invasion is rightly renowned as perhaps history’s most famous address by a wartime leader.  Less well known, however, is the cautionary tone the new Prime Minister struck in that same appearance before the House of Commons, as he sought to temper the joy and relief engendered by the seemingly miraculous extraction of the British army from the beaches of Dunkirk.  “We must,” Churchill warned, “be very careful not to assign to this deliverance the attributes of a victory.”  “Wars” he admonished, “are not won by evacuations.”

Shortly before the 2011 Abbottabad operation that killed Osama bin Laden, I was asked by my HQ, my views on mounting an assault on the target we knew as Abbottabad Compound 1, (AC1) given that we were not sure it sheltered the terrorist leader.  After expressing my 95% confidence that the Al Qaeda (AQ) leader was in fact, there, I allegorically added that we must strike as ‘you cannot leave Hitler in his bunker and end the war’.  I was fortuitously, right in my assessment that the murderer of so many innocents was present within AC1.  Sadly, however, his death did not bring our war with radical Islamic terrorism to a conclusion.  As was the case after Dunkirk, our enemy was unwilling to quit the field or to limit his unbounded war aims.

Likewise, we should have no expectation that the withdrawal of our forces from the Afghan theater of combat signals an end to the conflict with terrorists who started that war by attacking us on September 11, 2001.  We cannot unilaterally declare an end to the War on Terror by leaving Afghanistan – however much we might wish to do so – for the very simple reason that our enemies do not share that desire.  As former Defense Secretary Leon E. Panetta put it, “I understand that we’re trying to get our troops out of there, but the bottom line is, we can leave a battlefield, but we can’t leave the war on terrorism, which still is a threat to our security.”

The Taliban parading of the American-made weapons and accoutrements of their defeated foes was, in a manner akin to that of ancient Rome, intended not only to celebrate victory.  It was also meant to humiliate the vanquished.   Such triumphal demonstrations – and what will be a galling celebration of the anniversary of 9/11 as their own holiday to follow – will evoke enthusiastic responses from Islamic extremists and will draw many new adherents to the cause that lies at the core of Taliban legitimacy and belief.

As was the case when we left Iraq and later had to go back into the region to crush the ISIS Caliphate that metastasized in the wake of our departure, there is every prospect that the Taliban’s success will breathe new life into Islamic extremist groups.  And there is no reason to believe that the “new” and now much more heavily armed Taliban – an organization that refused to break with AQ over the course of a brutal twenty-year battle, will be any less receptive to working with Islamic terror groups than were their pre-9/11 forebears.


The Cipher Brief hosts private briefings with the world’s most experienced national and global security experts.  Become a member today.


“We are going to have to maintain very, very intense  levels of indicators and warnings and observstion and ISR [Intelligence, Surveillance, Reconnaissance] over that entire region to monitor potential terrorist threats”, said Chairman of the Joint Chiefs, General Mark Milley in a recent interview, adding it will not be easy.

As CIA Director William Burns said during Senate testimony in April, “Our ability to keep (the) threat…in check in Afghanistan from either al Qaeda or ISIS…has benefited greatly from the presence of U.S. and coalition militaries on the ground and in the air fueled by intelligence provided by the CIA and our other intelligence partners.” With the withdrawal of the American military, Burns said, “the U.S. government’s ability to collect and act on threats will diminish.”

Much discussed ‘over the horizon’ intelligence collection against Afghan terror targets will not fill the void left by the loss of our ability to monitor and attack terrorist targets from in-country bases.  With Afghanistan bordered by countries unlikely to be willing to host a significant US presence, intelligence collection missions will now have to be launched from bases well beyond the horizon with all that implies for the quantity, quality and timeliness of intelligence collected.  Such operations will also be commensurately more expensive and difficult to mount.  Moreover, the intimate knowledge of our adversaries that we have painstakingly built over the course of nearly 20 years on the ground, began aging the moment we departed Afghanistan.  Absent an intelligence presence on the ground, our ability to collect on terrorist groups operating in and from that country will only degrade further as time goes on.

After acknowledging that we “could see a resurgence of terrorism out of the region in the coming 12-36 months”, Milley went on that we will, “as opportunities present themselves… have to continue to conduct strike operations if there’s a threat to the United States.”  However, as our pre-9/11 experience showed, such remote strikes can delay our terrorist enemies’ plans, but will not deter them from their intent to strike the US homeland.

As such, Secretary Panetta is undoubtedly correct in his conclusion that US involvement in Afghanistan is not over.  “We’re going to have to go back in to get ISIS,” Panetta said.  “We’re probably going to have to go back in when al-Qaeda resurrects itself, as they will, with this Taliban.”  And, as was the case with our operations to destroy ISIS’s so-called Caliphate after we precipitously left Iraq, there can be no doubt that should we have to go back into Afghanistan, our task will be greatly complicated by the manner in which we left that country, abandoning our allies and bases there.


Go beyond the headlines with expert perspectives on today’s news with The Cipher Brief’s Daily Open-Source Podcast.  Listen here or wherever you listen to podcasts.


The US withdrawal from Afghanistan will have profound geo-strategic implications for America’s position in the region and in the world.  Our Chinese, Russian and Iranian adversaries will seize the opportunity to fill the void left in the wake of our departure.

The Taliban has already indicated it will engage with China, which covets Afghanistan’s mineral wealth.  Entry into a transactional relationship with the cash-strapped Taliban regime and granting access to Afghan mineral resources – and possibly use of Bagram Air Base – in exchange for financial aid and Chinese support for the Taliban in international organizations would suit Beijing, which would evince no concerns about human rights and the like.

For their part, Central Asian countries will look away from Washington and ever more towards their old masters in Moscow and a rising China to ensure their security and economic well-being.   Islamabad, while publicly celebrating the victory of their Taliban proxies and its role in guiding it, must at the same time worry that the extremism embodied by the victors will gain renewed traction beyond its frontier provinces with all that implies for the security of the Pakistani state.

Caught by surprise by Washington’s decision to leave and the conduct of the withdrawal, even our closest and oldest allies are questioning US resolve.  They will surely think twice before acceding to any future US request to join in joint operations.  Our decision to quit Afghanistan, and its messy execution, will also evoke questions about the validity of American assurances to other nations under threat from aggressors.  It will not have been lost on them that the withdrawal of American air, intelligence, planning expertise and logistical support ensured the collapse of an Afghan Army that was dependent on the US.

Our adversaries, too, will see the chaotic nature of our departure as well as the abandonment of Americans, allied citizens and Afghans to uncertain fates as signs of weakness and enfeeblement.   This possibility is particularly dangerous in that they could seize this moment of US distraction to engage in opportunistic adventurism that could include movement by China against Taiwan; a Russian attempt to resolve its impasse with Ukraine forcibly; stepped-up Iranian prosecution of its proxy war with Israel; or a further ramping up by North Korea of its nuclear program.  Any such eventuality would force the US to respond vigorously or risk further erosion of its international credibility.

Finally, the costs involved in remotely monitoring and trying to deter threats emanating from a Taliban-controlled Afghanistan mean that we will be unable to shift intelligence and military resources away from the War on Terror to confront the threat posed by peer competitors to the degree we had hoped.

Aristotle is said to have pronounced, “You will never do anything in this world without courage. It is the greatest quality of the mind next to honor.”  Likewise, the courage shown by so many – and the heroic conduct of US military and CIA personnel in particular – in seeking to extract American citizens from Afghanistan and to honor our obligations to Afghans who worked and fought alongside us for so long, cannot obviate the dishonor attendant to having left so many behind.  Bloody Taliban outrages and reprisals against the latter are a certainty.

It will not be long before Kabul’s new rulers recognize that the Americans now under their control, are potentially useful pawns in trying to extract diplomatic, financial and other concessions in exchange for their freedom.  The effectiveness of our efforts hereafter to extract our own people and our Afghan allies from the clutches of the Taliban and how we respond to any attempts to use them as leverage against us, will determine the depth of the stain on our national honor already attendant to the disastrous end of our Afghan campaign.

In that same famous speech, Churchill solemnly told his countrymen that: ‘The Battle of France is over: The Battle of Britain is about to begin.”  He went on that “we would be well advised to gird our loins for the continued warfare to come.”

As we approach the 20th anniversary of 9/11, we should honor our sacred dead from that horrible day.  But we should likewise prepare ourselves for the battles with Al Qaeda and its murderous kindred of Cain that will surely come.

Recent polls would indicate that Americans support the decision to withdraw from Afghanistan, if not the way in which it was conducted.  One wonders how those polled would have responded if the question had been ‘Do you support a withdrawal from Afghanistan even if it markedly increases the chance of terror attacks and atrocities directed at your fellow citizens at home and abroad?’  I fear we will find out soon enough.

Read more expert-driven national security insights, perspective and analysis in The Cipher Brief

The post Wars are not Won by Evacuations appeared first on The Cipher Brief.

find more fun & mates at SoShow now !

A large settlement of migrants in the suburbs of Dunkirk in northern France has been dismantled, in the wake of yet another wave of tensions with the UK over the growing number of illegal crossings.

Read more

FILE PHOTO. ©REUTERS/Peter Cziborra
London & Paris trade barbs over Channel crossings

At my instruction, the security forces are evacuating the illegal migrant camp in Grande-Synthe this morning,” French Interior Minister Gerald Darmanin said on Twitter on Tuesday. He added that state services in the region would provide shelter for the group.

Government spokesman Gabriel Attal said the decision to dismantle the camp was primarily based on the intention to put people into shelters ahead of the winter season.

Around 1,500 migrants were evacuated from the site via buses and their tents removed. According to Utopia 56, one of the charities monitoring the process of dismantling the camp, people “were forced to board buses, without being informed of their destination, and some of their personal belongings have been destroyed.” 

In a separate tweet, Darmanin announced the arrest of 13 alleged migrant smugglers, “bringing the total to 1,308 since January.

These smugglers are criminals who exploit human misery, responsible for irregular immigration,” the minister wrote.

Tuesday’s actions by French authorities came in the wake of a phone call between Darmanin and his British counterpart Priti Patel. The two discussed the increasing number of illegal migrants attempting to cross the English Channel, and reiterated the importance of cooperation in making this route “unviable,” Patel said afterwards. 

The UK and France have a history of mutual accusations when it comes to illegal migration. While British officials have claimed that French authorities do not do enough to prevent migrants from embarking for the dangerous trip, France’s government has said that the UK should reform its labor market rules in order to become less attractive to migrants.

More than 23,000 people have crossed the Channel by boat this year, compared to 8,404 in 2020, according to Press Association figures.

If you like this story, share it with a friend!

find more fun & mates at SoShow now !

Covid-19 variants keep emerging in different parts of the world, causing experts to ask how long the pandemic will last, and how effective the current methods of protection really are.

Since the pandemic started in 2019, people have referred to the disease which has paralyzed the world simply as ‘coronavirus’. Now, in 2021, when we talk about it, we mean not just the original variant, but also its numerous mutations. 

Read more

© Getty Images / sasacvetkovic33
Drastic drop in Covid vaccine effectiveness – study

In May, the WHO decided to label the key variants with Greek letters. Since then, the Delta variant has been proclaimed the predominant strain across the world, and now we have titles that look like codes to detail the differences between variants. Last month, the UK was put on high alert over a fast-spreading Delta AY.4.2 variant. This week, Norway reported finding one more version of the Delta strain – AY. 63. The country’s experts suggest it’s not more dangerous than the Delta mutation itself. Meanwhile, another Covid variant, discovered in France (B.1.640), brought the researchers an unpleasant surprise: they said they’d never seen mutations like it. 

Professor David Dockrell, from the Center for Inflammation Research of the University of Edinburgh, described to RT the reasons for the constant mutation of the coronavirus. “The areas in the virus that are most likely to change are those that come into contact with what we call ‘selective pressures’ – or factors that make them need to change,” he explains. “So, a version of the virus which mutates and changes to give it a selective advantage to escape from the immune system is more likely to prosper and become a dominant strain.” 

That’s how it works: The part of the virus many of the immune responses (or antibodies, T-cells etc.) are responding to is called the spike protein (or the S-protein). So, the virus tries to change it in order to survive. 

“We know that a variety of different viruses are able to mutate and change when exposed to the selective pressure of the immune system, whether it would be the human immune system or other species in which these viruses have evolved,” Prof. Dockrell says. “And of course, we’ve seen it most clearly with HIV, which is particularly good at changing and evolving. It does something called ‘reverse transcription’ – it copies material in the reversed direction from DNA to RNA.” 

Covid is still seemingly running faster than humanity’s efforts to curb it, but Prof. Dockrell has some good news. “The coronavirus – and viruses like it – are not as able to make these changes. They are going to do it to some extent, but they are not going to be as successful as retroviruses and HIV.” 

And the other major thing to say: When the viruses make changes, there’s always what we call ‘a fitness cost’. Many of the potential changes that the virus could make will actually not favor its survival. So there are only a certain number, potentially, of changes that the virus can make, before it starts affecting its fitness. 

Now, unfortunately, we are still in a phase where Covid19 can continue to evolve and change. It’s not time to panic, though, because across the world various ways to adapt the current anti-Covid strategies are already in place. First of all, people should keep getting vaccines – maybe receiving slightly altered booster doses, Prof. Dockrell suggests, “in a way, that we, after all, have to do with influenza, by providing a seasonal influenza vaccine and changing it every year.” 

Read more

RT
WHO sounds alarm over looming Covid-19 catastrophe in Europe

“And maybe we have to keep changing some of the treatments like these new monoclonal antibodies against the virus, because they also may be limited by the emergence of a mutation of the virus evolving the S-protein,” he adds. 

Sounds promising – but won’t it become a never-ending race against constantly emerging mutations? 

Hopefully not. According to Prof. Dockrell, there are parts of viruses that scientists call ‘conserved areas’. With time, vaccines and monoclonal antibodies will target these areas, which the virus finds very hard to change. “Clearly, the direction of travel is to develop either vaccine responses that affect more different kinds of virus, or these ‘monoclonal antibodies’ that we could use to prevent or treat infection, that they will target more conserved areas and therefore will be less limited by the ability of these virus to evolve and change,” he concludes.

Think your friends would be interested? Share this story!

 

find more fun & mates at SoShow now !

Chris Inglis’ new White House office has a startup feel to it. There are desks, a few chairs, a coffee maker and a poster hanging on the wall.  But as the head of the newly established Office of the National Cyber Director, Inglis has to make due with what he has while still advising President Joe Biden on the smartest ways for the US to prevent and respond to cyberattacks.

Inglis has already had numerous conversations with the president, who has made clear that the government has a role to play in the defense of the private sector and in assisting the private sector in defending critical infrastructure.  And the president knows, says Inglis, that means the government needs to get its own cyber house in order. 

But like any real startup, Inglis’ resources are scarce.  More than three months after being confirmed by the Senate, he still doesn’t have the full staff he needs to take on his timely and critical mission.  That’s because the funding for his office – some $21 million, part of the $1 trillion infrastructure bill making its way through Congress – is still stuck in the political spin cycle.  Why does it matter?

“The threat is greater than I can ever remember,” Inglis told me during last month’s AFCEA and INSA Intelligence & National Security Summit in National Harbor, Maryland. “The audacity, the brazenness, the thresholds that have been crossed at every turn; we’re in a difficult place.”

While he’s waiting for Congress to act, he says he’s spending about fifty percent of his time defining his role, being careful not to duplicate the work already being done by other agencies and departments, while spending another fifty percent building relationships that will be important later.  Eventually, he’s expected to have a staff of some 75 people who will be expected to work hand in glove with CISA, the National Security Council’s cyber staff, the OMB and others.  The remaining fifty percent of his time, Inglis jokes, is spent figuring out how to attract the country’s best talent.   

“People are starting to flow into the organization. I’m confident that we’re coming up to a breakout moment, not for the National Cyber Director, but the contribution that we can and should make. I’m sobered by the nature of the challenge, I’m optimistic we can make a difference.”

Optimistic he is.  And he’s not even complaining about being given a critical task for US national security and then having to wait for politics to play out before being able to act on it.

“It has been a semi-silver lining in that we would not have had time to think about how we want to apply the resources coming our way.”

While Inglis has been waiting, he and his small team have had time to think about the four things they’d like to focus on right away. 

First, is streamlining the roles and responsibilities in government of who handles what when it comes to protecting the public and private sectors from cyberattacks.  He also spoke during his confirmation hearing about the importance of allocation of resources and while the Office of the National Cyber Director doesn’t have the authority to move money, it does have what Inglis calls the responsibility to account for cyber money.

“One of the most critical gaps in cyber is that the physical digital infrastructure is not built to a common standard. The executive order related to this requires that within a certain amount of time we have to install basic procedures like multifactor authentication and encryption of stored material. That is a challenge and a potential vulnerability for us. We need to make sure that we make these investments necessary to buy down the lack of investment for years.

The second gap is in talent related to number of people required to occupy these jobs. It’s not simply the folks with IT or cyber in their name, but general cyber awareness. There is some expenditure of resources of time, attention, and money to get awareness right on the part of the truly accountable parties like agency and department heads. We have to make sure they don’t see cyber as a cost center, but an enabler on the part of all the users as they understand what their roles are and what the accountability is.

He admits there is still a level of education needed within government to get there.

That is usually the case in both the government and the private sector,” he said.  “We need to think this way about cyber and invest in cyber so that we can enable the mission, not hold it back. I think that education is the most important and effective way to handle this. Then, it is to make sure that the accountability is aligned and harmonized. We tend to take risk in one place and expect someone in another place to be the mitigator of a risk they don’t understand was taken in the first place. We need to operate in a collaborative fashion and get away from divisions of effort which are an agreement not to collaborate and allow adversaries to pick us off one at a time.”

Inglis says that unity of effort must start at home.  “The executive order issued in May has begun to lay out common expectations about the hardware, software, and practices that we need to begin in those spaces,” he said.  “Externally, if we have sector risk management agencies who engage the private sector for the purposes of supporting and engaging the critical components of that infrastructure, we need to make sure you don’t need a Ph.D. in government to know who to deal with and what you’re going to get from them.”

He is arguing for the government to also put ‘valuable material’ on the table.  “That could be our convening power,” said Inglis. “We could perhaps address and reduce liability or give companies a clue as to what might be around the corner because the government has access to exquisite intelligence. If that setup is possible, we also need a venue where collaboration takes place. Information doesn’t collaborate, people do.”

Inglis likes to point to the example of CISA and the Joint Cyber Collaborative.  “They put people from the private sector and the public sector side by side to co-discover threats that hold us at common risk. That project sets up the possibility of implicit collaboration in what we then do with that common operational picture. The government could take ideas that private sector companies turn into proprietary systems and enrich and classify them to deal with it in their system.”

Using what he calls “all the tools in the toolkit,” Inglis also notes the importance of international relationships, which fits nicely into the White House’s International Summit on Ransomware last week in Washington, which zeroed in on tighter cryptocurrency standards, among other things. “Beyond the Five Eyes, what do other like-minded nations think about what is expected behavior in this? What are governmental actions that are appropriate,” he asked.  

Inglis has been an active participant in the president’s recent actions in cyber.  He took part in a White House meeting with tech leaders in August that was hosted by President Biden, who Inglis says, spent the first hour sharing his vision about how the country should focus on collaborative integration.  “The companies represented weren’t only companies like Microsoft and Apple, but people who operate in the critical infrastructure space,” said Inglis.  “The people component, educators, were represented reflecting the president’s view that cyberspace is not just technology, it is also the people component. They are a major link in the chain, and we need to get the roles and responsibilities right.”

While he’s waiting for the funding he needs to get his office fully staffed, Inglis said he’s also putting thought into reconciling resources with aspirations.  Managing expectations is going to be important.  Frustration has been growing for years over what some see as a lack of government response to some of the largest hacks in history.  The phrase ‘time and place of our choosing’ as a definition of response has grown old and some Americans are weary of a government that isn’t responding in a more public way to the beating it sees the US taking in cyberspace.

So, I asked Inglis whether there should be red lines in cyber.

“Red lines are both good and bad,” he answered.  “They are clear and crisp, and everybody knows what they are. The downside is that because of that, an adversary knows exactly how far they can go. It means that you set up a somewhat permissive environment. Red lines also don’t have context; sometimes there is a reason that a defender would make the ransomware payment. As a matter of policy, the U.S. government does not pay ransomware, but I imagine there will be a situation at some point where a hospital is against the Russian state and actual life and safety is at risk. If there is no other way to get the material back, in order to get back in the business of saving lives, they would want to rethink if a red line is a red line in that particular situation. I think the right thing to do here is not to establish hard thresholds of things with scripted responses, but outline what we are prepared to defend and what principles we will exercise in defense of those things. We commit to defending the private sector when it is held at risk by a nation state in cyberspace as much as in the kinetic space and make that clear to adversaries. I think that would be more helpful in changing decision calculus and creating a useful ambiguity about when and where we will come in.”

Inglis said he’s also thinking a lot about present and future resilience.  It’s a worthwhile focus, given that the White House estimates that nearly half a million public and private sector cybersecurity jobs are currently unfilled. 

“That is a massive problem,” said Inglis. “However, the more insidious problem is that the 320 million people in the United States who use the internet who have no idea how to properly take their place on the front lines of this issue. There is an awareness issue that requires us not to make Python programmers out of them but to make sure they understand the nature of this space.”

Everyone has heard the old saying that time is money, but in Inglis’ case, time is security so I asked him point blank whether he thought government was moving has quickly as it should on the cyber problem.

“Government is moving at speed; the question is if it is at the necessary speed. I don’t think anyone is moving at the necessary speed. Some are moving at light speed, but at the end of the day, we need an integrated, collaborative approach. While we won’t have unity of command, I think there needs to be a universally felt sense of urgency so that we will all get our heads in the game.”

Congress, are you listening?  Oh, and by the way, that poster in Inglis’ office? It reads, ‘Hours Since the Last Surprise.”

As a startup with maybe too few resources at the start and who often didn’t understand how all the wickets are run, we have our occasional surprise,” said Inglis.  “When we encounter those surprises and go to someone with the deep and sharp expertise to help us navigate that, we get what we need. However, we are not a full functioning, full featured, fully capable organization yet. We’re trying to build somebody else’s airplane while we’re free falling from our own. We have a parachute, and we can land safely, but it is a bit of a challenge at times.”

Find out more about why experts like former NSA Director General Keith Alexander (Ret.), Mandiant CEO Kevin Mandia and others have joined The Cyber Initiatives Group, powered by The Cipher Brief

Read more expert national security insights, perspective and analysis in The Cipher Brief

The post Chris Inglis and the Gathering Cyber Storm appeared first on The Cipher Brief.

find more fun & mates at SoShow now !

An object lurking in the outer region of our solar system may well be the elusive Planet 9, a leading British astronomer has suggested after digging through the telescope archives of 250,000 point sources.

Possible evidence of a mysterious planet up to 10 times bigger than Earth, with a distant orbit around the Sun, has been unveiled by professor of astrophysics at Imperial College of London, Michael Rowan-Robinson. Aiming to prove – or rule out – the existence of another big planet beyond Neptune, the UK scientist decided to conduct a new analysis of data collected by the Infrared Astronomical Satellite (IRAS) in 1983.

Read more

Courtesy NASA TV
NASA’s Lucy mission blasted into outer solar system to study Trojan asteroids & planetary evolution (VIDEO)

The astronomer has looked through some 250,000 point sources detected by the telescope, which took a far-infrared survey of 96% of the sky. Having analyzed the data, keeping in mind the hypothetical planet’s size and distance, “at the very limit of the survey,” he singled out a moving object that the satellite picked out on three occasions.

The candidate for Planet 9 would be up to five times the mass of Earth, according to the IRAS data. Its orbital distance would be some 225 times farther than that of our planet, equaling about 33.7 billion kilometers (20.9 billion miles) from the Sun. 

READ MORE: Astronomers find exoplanet with unusual orbit

If the enigmatic object is indeed rotating around the Sun at such a distance, it would be extremely cold and not much sunlight would be reflected by it, making it even more elusive and harder to find. While the latest study is not a clear detection, it could be valuable as guidance for where exactly to search for the new planet, the astronomer concluded. 

Given the great interest of the Planet 9 hypothesis, it would be worthwhile to check whether an object with the proposed parameters and in the region of sky proposed, is inconsistent with the planetary ephemerides,” he wrote in the preprint paper, accepted for publication in the Monthly Notices of the Royal Astronomical Society. 

A debate on the possible existence of an undiscovered planet in our solar system has been ongoing for decades. With no concrete evidence found, there has been speculation about its presence, mainly based on the gravitational clustering of objects in the system’s outer reaches. Several years ago, a suggestion was put forward that a group of icy objects that lie beyond the orbit of Neptune in the Kuiper Belt are possibly under the gravitational influence of a larger mysterious body, possibly Planet 9. The claim was based not on observation, but on modeling. 

Currently, the eighth and farthest known planet from the Sun is Neptune. In the last century, Pluto, discovered in 1930, was regarded as the ninth planet, but a controversial vote at the International Astronomical Union (IAU) in 2006 formally excluded it from the solar system’s ‘planets’, and reclassified it as a dwarf planet.

Like this story? Share it with a friend!

find more fun & mates at SoShow now !

Covid-battered global supply chains are being threatened by organized criminals, including drug cartels and con artists posing as legit suppliers, a new study has found, warning that the situation is set to get worse.

The international supply chain woes amid the Covid-19 pandemic are highlighted in a new annual report, released this week by the British Standards Institution (BSI).

The document, titled the ‘Supply Chain Risk Insights Report’, highlights Covid’s impact on supply chains, with the experts also warning that organized crime has increasingly preyed on this crucial area during the pandemic. On multiple instances, criminals were posing as legitimate logistics providers, stealing goods during shipment.

“I’m seeing a significant number of false suppliers acting as genuine potential suppliers in supply chain logistics provision – warehousing distribution, distribution centres, transportation companies – and actually, they are criminal groups trying to infiltrate the logistics supply chain,” said David Fairnie, BSI’s principal consultant in supply chain security. He urged producers to “continuously monitor” the supply chain and to not immediately trust new logistics providers – especially those contacted only remotely.

So, arguably today more than ever, you do need to know your suppliers. So far in 2021, BSI has noted this issue of fake carriers in an increasing number of countries in both the Americas and Europe.

Criminals have apparently been trying to steal goods in various ways, with phony truck drivers loading up items and taking off with them, while conmen “posing as legitimate employees” have reportedly been observed lurking around delivery destinations to steal cargo.

Read more

FILE PHOTO: Migrants walk towards the Bosnia-Croatia border in attempt to cross. © Reuters / Marko Djurica
Human trafficker explains migrant smuggling business

At the same time, the report found that trade in illicit goods has also been on the rise lately, with the illegal drug industry in particular appearing to flourish. While the supply chain for drug cartels, which require large amounts of assorted chemicals to produce narcotics, was disrupted due to the pandemic lockdowns and border closures impacted trafficking routes, organized crime quickly overcame these problems, the BSI noted.

“Drug cartels around the world did not miss a beat,” Chris Tomas, BSI lead intelligence analyst, said.

While many cartels shifted their production towards synthetic drugs, namely amphetamine, amid the pandemic, the apparent “lack of eradication of coca crops in Latin American countries” also remains an issue, the BSI said. The flow of cocaine has grown over the past year and is expected to increase even further, the organization warned.

“The numbers and quantities of cocaine seizures in Europe increased steadily in 2020 and 2021 and are expected to continue to rise in 2022,” the report reads.

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !

The International Criminal Court has halted an investigation into alleged rights abuses carried out by Philippines authorities as part of a harsh crackdown on the drug trade, saying it is reviewing a deferral request from Manila.

The ICC’s chief prosecutor Karim Khan said the probe was suspended after the Philippines government filed a request to defer the case earlier this month, according to court documents cited by Reuters on Friday. 

“The prosecution has temporarily suspended its investigative activities while it assesses the scope and effect of the deferral request,” he wrote, adding that the court is seeking more information from the government in Manila.

Based in The Hague, the ICC allows states to ask for postponements if they conduct their own investigations into the charges in question. President Rodrigo Duterte’s administration filed its deferral request on November 10, while the country’s Justice Ministry announced its own investigation into the alleged abuses late last month.

Read more

Relatives of drug war victims hold photographs of their slain loved ones with placards calling for justice (FILE PHOTO) © REUTERS/Eloisa Lopez
Philippines announces probe into thousands of killings during Duterte’s war on drugs as initial review suggests abuses took place

The court initially opened the probe in September over allegations that Philippines police had carried out thousands of extrajudicial executions and used other brutal tactics against suspected drug dealers, and that Duterte gave implicit backing to those actions. Activists have accused authorities of killing innocent people, including children, though the police insist they only use violence in self-defense.

While Duterte has declined to cooperate with the ICC probe, saying it has no authority on the island nation, and even pulled the Philippines out of the international body in 2019, the court has jurisdiction to investigate alleged violations committed by the country while it was still a member.

The president’s chief legal counsel, Salvador Panelo, confirmed the deferral request in brief comments to Reuters, saying “There is no inconsistency with the request for suspension of action,” though he did not elaborate.

Since its founding some 20 years ago, the ICC has successfully convicted just five people of war crimes or crimes against humanity – all leaders of armed movements in Africa, including in Mali, Uganda and the Democratic Republic of the Congo.

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !

Cipher Brief Expert Tim Willasey-Wilsey is a Visiting Professor at King’s College, London and a former senior British diplomat. From 1996 to 1999 he was senior advisor to the British government on overseas counterterrorism.  This piece was first published by RUSI in London.  The views do not represent those of RUSI.


Analysis of openly available sources indicates that a British report shared with the US in December 1998 described an early stage of the 9/11 plot.


EXPERT PERSPECTIVE — Two extracts from Presidential Daily Briefs (PDB) are given some prominence in the 9/11 Commission report into the terrorist attacks in New York and Washington on 11 September 2001. One is from a PDB delivered to President Bill Clinton on 4 December 1998, and the other is from a PDB given to President George W Bush on 6 August 2001. Both are presented inside a textbox and both contain intelligence ‘from a friendly government’ which provided the first and only significant suggestion that Al-Qa’ida (AQ) planned to hijack aircraft in the US.

Eight months after the attacks, under Congressional pressure, the Bush administration was obliged to reveal some details of the PDBs, and on 17 May 2002 the New York Times disclosed that ‘the report provided to the president on Aug. 6, which warned him that Mr. bin Laden’s followers might hijack airplanes, was based on 1998 intelligence data drawn from a single British source, government officials said today’. The British government was obliged to acknowledge that the intelligence came from British sources. The Guardian reported on 18 May that ‘The memo received by Bush on 6 August contained unconfirmed information passed on by British intelligence in 1998’. The Independent ran much the same story with additional detail.

Both PDBs quoted from one British report from December 1998. The key question is whether this report, with its significant deviations from what actually happened on the day, actually referred to the 9/11 operation. Subsequently published evidence points compellingly to this indeed being an early version of the 9/11 plan.

The heavily redacted British contribution was shown on pages 127 and 128 of the 9/11 Commission’s report. It reads:

‘On Friday December 4 1998 the CIA included an article in the Presidential Daily Brief (PDB) describing intelligence received from a friendly government about a hijacking in the United States.

‘SUBJECT. Bin Laden preparing to hijack US aircraft. Reporting [passage redacted] suggests bin Laden and his allies are preparing for attacks in the US including an aircraft hijacking to obtain the release of Sheikh Omar Abdal Rahman,  Ramzi Yousef and Muhammad Sadiq Awda. One source quoted a senior member of the Gamaat Al-Islamiya (GI) saying that “as of late October the GI had completed planning for an operation in the US on behalf of bin Laden but that the operation was on hold. A senior bin Laden operative from Saudi Arabia was to visit GI counterparts in the US soon thereafter to discuss options – perhaps including an aircraft hijacking. GI leader Islambouli in late September was planning to hijack a US airliner during “the next couple of weeks” to free Abdal Rahman and the other prisoners according to what may be another source. The same source late last month said that bin Laden might implement plans to hijack aircraft before the beginning of Ramadan on 20 December and that two members of the operational team had evaded security checks during a recent trial run at an unidentified New York airport.’


The Cipher Brief hosts private briefings with the world’s most experienced national and global security experts.  Become a member today.


In May 2002 the US National Security Advisor Condoleezza Rice issued a statement observing (correctly) that the report had mentioned ‘hijacking in the traditional sense’ with no indication that aircraft would be used as weapons of mass destruction. Her testimony to the 9/11 Commission made broadly the same point.

Indeed, even in late 1998, there was a profusion of threat reports of which the aviation strand was just one. The MI5 official history comments aptly that the Service was puzzled as to why there were so many more reports of threats than actual attacks: ‘Even the most reliably sourced intelligence received on this question usually consists of a snapshot of a proposed plan being discussed. Most of the reporting does not make clear how far advanced the plan is’ (Christopher Andrew, The Defence of the Realm, pp. 802–806). What MI5 did not realise at the time was that AQ operations could take up to three years from inception to execution.

Steve Coll writes that ‘Within the morass of intelligence lay ominous patterns. One was an interest by bin Laden’s operatives in the use of aircraft … yet at the counter terrorism security group meetings and at the CIA’s counter terrorist centre there was no special emphasis placed on bin Laden’s threat to civil aviation or on the several exposed plots where his followers had considered turning hijacked airplanes into cruise missiles’ (Steve Coll, Ghost Wars, pp. 419–420).

Although the December 1998 report appears fragmentary, there were a number of aspects of particular interest. The first was the name Ramzi Yousef. Yousef had studied electrical engineering at Swansea Institute from 1986 to 1990 before exploding a massive bomb under the World Trade Centre in February 1993 and then planning the Bojinka Plot against airliners in the Philippines in 1994. Yousef had been arrested in Islamabad in February 1995 and sent to the US, where he was tried and imprisoned for life. He was an energetic and imaginative terrorist, and his uncle Khalid Sheikh Mohammed was also known to move in terrorist circles.

The aviation link must have struck a chord, too. The British were also interested in Hussain Kherchtou, who had been in Kenya at the time of the Embassy bombings and was himself a pilot. He later provided a debrief to the FBI. His story and his courtship by the British came into the public domain because of a subsequent US court case and a talkative FBI officer.

The Egyptian angle also would have provoked little surprise. On 19 November 1995 Egyptian terrorists had blown up the Egyptian Embassy in Islamabad, killing 13 – only yards from the British High Commission compound with its exposed staff housing and kindergarten. The British had a miraculous escape that day.

The concern for the release of Sheikh Abdal Rahman, ‘the Blind Sheikh’, was consistent with the widespread devotion which the preacher inspired among Islamist radicals and particularly Egyptians. His imprisonment in New York for his part in Yousef’s attack on the World Trade Centre had caused significant distress among his many adherents, who all wanted his release.

The idea that AQ would strike the US had first surfaced in 1997 and felt like the logical next step. Only a month beforehand (in November 1998), AQ had attacked two US Embassies in Kenya and Tanzania, killing 224 people including 12 US citizens. These operations had served as a wake-up call for those who thought the AQ threat was being exaggerated, and some who even conceived of Osama bin Laden himself as a benign figure who had somehow got out of his depth.

There were also some puzzling elements in the report. The first was the rather outdated idea of hijacking an aircraft to demand the release of the Blind Sheikh. It felt more in tune with Palestinian terrorist methods of the 1970s, and it was already known that Ramzi Yousef had developed the idea of exploding full airliners in flight.

The involvement of Gama’at Islamiya (GI) seemed odd. Bin Laden was known to be close to Ayman Al-Zawahiri of Egyptian Islamic Jihad (EIJ), with whom GI were usually at daggers drawn. At the time GI were conceived of more as domestic Egyptian terrorists compared to the internationalist EIJ. Indeed, GI’s most recent operation had been the Luxor Massacre of November 1997, which killed 56 foreign tourists.


Go beyond the headlines with expert perspectives on today’s news with The Cipher Brief’s Daily Open-Source Podcast.  Listen here or wherever you listen to podcasts.


The name Islambouli carried great resonance. This was Mohammed Shawqi Islambouli, who had tried to assassinate Egyptian President Hosni Mubarak in Addis Ababa in 1995. His brother Khalid had been one of the assassins of President Anwar Sadat in October 1981 and had been tried and executed in Cairo. However, although Mohammed was thought to be in Afghanistan, he was not then known to be close to bin Laden, let alone Al-Zawahiri.

The dates made little sense. On the one hand an attack seemed imminent, but on the other hand it was ‘on hold’. But such is the nature of counterterrorist reporting: small fragments of a much bigger jigsaw.

Nonetheless, the report was taken very seriously on its receipt in the US. President Bill Clinton’s counterterrorism advisor Richard Clarke summoned his Counterterrorism Security Group. ‘To address the hijacking warning, the group agreed that New York airports should go to maximum security starting that weekend. They agreed to boost security at other East coast airports. The CIA agreed to distribute versions of the report to the FBI and FAA to pass to the New York Police Department and the airlines. The FAA issued a security directive on December 8, with specific requirements for more intensive air carrier screening of passengers and more oversight of the screening process, at all three New York City area airports.’

Of course, when 9/11 happened nearly three years later, there were two very significant differences. Although aircraft were indeed hijacked, they were used as missiles rather than as bargaining chips, and the terrorists were mainly Saudi and not Egyptian. So what happened between December 1998 and September 2001 which could explain these changes?

The 9/11 Commission report (drawing on material from the interrogation of Khalid Sheikh Mohammed) provides a fascinating section on AQ’s development of aviation methodology. Even before bin Laden had left Sudan in mid-1996, he had allegedly discussed the use of aircraft with Mohammed Atef: ‘(1) they rejected hijackings aimed at gaining the release of imprisoned comrades as too complex, because al Qaeda had no friendly countries in which to land a plane and then negotiate; (2) they considered the bombing of commercial flights in midair, as carried out against Pan Am Flight 103 over Lockerbie, Scotland, a promising means to inflict massive casualties; and (3) they did not yet consider using hijacked aircraft as weapons against other targets.’

So, why was the idea of a traditional hijacking still being discussed as late as December 1998? The answer must lie in the Egyptian jihadists’ determination to win the release of the Blind Sheikh. Mustafa Hamid, a journalist who was with bin Laden in Afghanistan, provides illuminating insight into the wrangling between EIJ and GI in Afghanistan. Hamid documents the tortuous process by which GI, with some reluctance, formed a union (‘The World Islamic Front against Jews and Crusaders’) with AQ, EIJ and others, but recounts how GI insisted on secrecy about their involvement. Hamid also describes GI’s determination to obtain the Blind Sheikh’s release and the involvement of one of their operatives in the African Embassy bombings (Mustafa Hamid and Leah Farrall, The Arabs at War in Afghanistan, p. 241 and pp. 263–266). So GI was indeed part of bin Laden’s group in Afghanistan and was involved in operations at the time of the December 1998 report.

However, bin Laden became increasingly irritated by the endless squabbling among the two Egyptian groups. Lawrence Wright, drawing upon a variety of sources, chronicles the disastrous attack on Luxor, which had the effect of alienating the Egyptian population from both groups. When on 23 February 1998 bin Laden’s second fatwa announcing the ‘World Islamic Front’ was published in an Arabic newspaper in London, GI were appalled, and some members tried to have Rahman pronounced emir instead of bin Laden. No wonder that Wright concludes that ‘bin Laden had had enough of the in-fighting between the Egyptian factions. He told both groups that their operations in Egypt were ineffectual and too expensive and that it was time for them to turn their guns on the United States and Israel’ (Lawrence Wright, The Looming Tower, pp. 290–296). This may explain why the December 1998 report mentions the operation being ‘on hold’. Between December and the spring of 1999, the GI team and Islambouli must have been stood down.

According to the 9/11 Commission report, in March or April 1999, Khalid Sheikh Mohammed (KSM) – who had hitherto allegedly been on the fringes of AQ – was summoned to Kandahar, where he discussed the aircraft plan with bin Laden and Mohammed Atef. Four operatives were chosen to begin work on the US project. However, ‘travel issues … played a part in al Qaeda’s operational planning from the very start. During the spring and summer of 1999, KSM realized that Khallad and Abu Bara, both of whom were Yemenis, would not be able to obtain US visas as easily as Saudi operatives like Mihdhar and Hazmi’. And so, the 9/11 plot developed with 15 of the 19 terrorists being Saudi nationals. Only Mohammed Atta was Egyptian.

KSM’s key involvement in the 9/11 plot makes it evident that there could not have been a second GI plot running in parallel, because KSM and Islambouli were close associates. Robert Baer and the 9/11 Commission report agree that KSM and Islambouli were working together in Qatar in the mid-1990s. For KSM it must have been difficult to abandon the rescue of his nephew, but he would have known that a traditional hostage release operation had none of the ambition or scale of bin Laden’s new thinking.

On 6 August 2001, only five weeks before the attacks, the December 1998 report featured once again in the PDB given to George W Bush at Crawford, Texas, entitled ‘Bin Laden determined to strike in US’. It began: ‘Clandestine foreign government and media reports indicate bin Laden since 1997 has wanted to conduct terrorist attacks in the US’, and concluded: ‘We have not been able to corroborate some of the more sensational threat reporting such as that from a [redacted] Service in 1998 saying that bin Laden wanted to hijack a US aircraft to gain the release of “blind Sheikh” Omar Abdal Rahman and other US-held extremists … Nevertheless, FBI information since that time indicates patterns of suspicious activity in this country consistent with preparations for hijackings or other types of attacks.’

The PDB of 6 August caused some discomfort to the Bush administration and led to a National Security Archive page devoted to that one PDB (of which the December 1998 British report was just one constituent part).

The CIA Director George Tenet, who had been a tireless pursuer of the AQ threat before 9/11 and a regular correspondent with and visitor to London, regretted that more had not been done ‘to protect the United States against the threat. To cite two obvious and tragic failures, only after 9/11 were cockpit doors hardened and passengers forbidden from carrying box-cutters aboard US commercial airliners’ (George Tenet, At the Centre of the Storm, p. 205).

The British report of December 1998 was fragmentary, and while it was certainly ‘sensational’, it was not half as sensational as the actual events of that unforgettable and tragic day.

The views expressed in this Commentary are the authors, and do not represent those of RUSI or any other institution.

Read more expert-driven national security insights, perspective and analysis in The Cipher Brief

The post The British and 9/11 appeared first on The Cipher Brief.

find more fun & mates at SoShow now !