Islamic Operatives Use Soviet Tactics to Target Conservatives

Understanding the Threat, by John Guandolo, August 9, 2018:

The Islamic Movement in the United States manifests primarily as an espionage and counterintelligence threat, not merely as a “terrorist” threat.

When operatives in the Islamic Movement meet with police chiefs, elected officials, FBI Directors, business leaders, Pastors, Rabbis and others, they portray themselves as friendly, but they are working to recruit and use them, much as U.S. government counterintelligence operatives recruit foreign assets.

These jihadi operations may take months or years to develop, but the benefits of having an influential American official working for jihadis is a major victory for the Islamic Movement.

Examples of successful penetration operations include:

President Clinton’s Islamic Advisor Abdurahman Alamoudi, who created the Muslim Chaplain Program for the Department of Defense and met with Mr. Clinton more than any other muslim in America, was an Al Qaeda financier who is now in federal prison.

Senator Richard Durbin’s go-to guy for all things Islamic prior to his hearing on the civil rights of muslims in America was Mohamed Magid and the Islamic Society of North America (ISNA).  Magid was the leader of the Islamic Society of North America (ISNA) which was identified by the Department of Justice as a Muslim Brotherhood organization and a financial support arm for Hamas leaders and Hamas groups overseas.

The Islamic Movement also identifies conservative threats to their Movement and targets them for destruction, ensuring they lose their influence.

When Irving, Texas Mayor Beth Van Duyne publicly decried the Sharia Courts in Irving, she was targeted by muslim leaders.  Several months later the Clock Boy Operation was launched against her.  Democrats attacked her for her “civil rights” failures in the incident, and Republicans called for a review of the zero tolerance policy in incidents of this nature.  Mayor Van Duyne was left standing alone as Islamic leaders planned.

Most Patriots aware of Milwaukee’s Sheriff David Clarke were drawn to him for his outspoken call for law and order, strong stance on national defense, and for boldly stating America needs to police muslim communities.

Sheriff Clarke was also considered for positions inside the Trump Administration.

In walks Hedieh Mirahmadi.  A classic honey trap.

Dr. Hedieh Mirahmadi grew up a shia muslim of Iranian decent who later converted to sunni Islam.  Mirahmadi is an attorney with a degree in Islamic doctrine from the As-Sunna Foundation.  She is the founder of the World Organization for Resource and Development and Education (WORDE), and the former Secretary General of the Islamic Supreme Council of America.

Red flags about Ms. Mirahmadi include her close working relationships with Muslim Brotherhood organizations and leaders like Salam al Marayati, participation in the Muslim Brotherhood’s Countering Violent Extremism (CVE) initiative, and the fact she publishes articles about Islamic doctrine (sharia) that are patently false despite the fact she has a degree in the subject.

Most notably, Ms. Mirahmadi works with federal agencies and police organizations around the United States to discuss “extremism” and the Muslim Brotherhood.  Yet, none of the groups with whom she works have demonstrated any level of understanding of the jihadi’s doctrine – sharia – nor the Muslim Brotherhood network and their modus operandi.

In fact, the agencies with which Mirahmadi work, have a completely counter-factual understanding of sharia and the Muslim Brotherhood.

So, the Islamic Movement targeted Sheriff David Clarke and sent Mirahmadi in.  To demonstrate the effectiveness of this operation, UTT offers the following:

Sheriff Clarke went from calling for police to patrol muslim neighborhoods 18 months ago to recently calling people on social media speaking truth about Islam “racists.”

When articles written by investigative journalist Laura Loomer were published a year ago about Hedieh Mirahmadi’s questionable background, Sheriff Clarke publicly attacked and mocked Loomer.

This week Sheriff David Clarke admitted he was duped, and openly stated Hedieh Mirahmadi is a Muslim Brotherhood operative.

The lesson for everyone reading this article is that David Clarke is one of many Patriots who have been duped by Muslim Brotherhood operatives acting on behalf of our Islamic foes, even if they are not intentionally doing so.

Twenty years Abdurahman Alamoudi was the “pillar of the Islamic community in Washington, D.C.” and turned out to be an Al Qaeda operative.

After 9/11, Anwar al Awlaki was considered the “new face of Islam in America” and gave presentations at the Pentagon and the U.S. Capitol, but turned out to be an Al Qaeda operative killed in a U.S. drone strike in 2011.

In 2005, FBI Special Agent in Charge of the Washington Field Office Mike Rolince gave Mohamed Magid an award, and in 2016 FBI Director James Comey presented Magid with the FBI Director’s Award.

Mohamed Magid was the President of the Islamic Society of North America (ISNA), identified by the Department of Justice as a Muslim Brotherhood organization which seeks to overthrow the U.S. government and establish an Islamic State.  Evidence entered into the largest terrorism financing trial ever successfully prosecuted in American history (US v HLF, Northern District of Texas, 2008) reveals ISNA provides financial support to Hamas organizations and Hamas leaders overseas.

Hamas is a designated foreign terrorist organization.

The threat from the Islamic Movement in the United States manifests itself primarily as an espionage and counterintelligence threat, not merely as a “terrorist” threat.

It is high time the U.S. government treats Islamic spies working to destroy America the same way it treated the Rosenbergs.

China, Russia, Iran Engaged in Aggressive Economic Cyber Spying

Russian President Vladimir Putin and Chinese President Xi Jinping / Getty Images

Counterintelligence report details foreign spies theft of advanced U.S. technology

Washington Free Beacon, by Bill Gertz, July 27, 2018:

Foreign spies from China, Russia, and Iran are conducting aggressive cyber operations to steal valuable U.S. technology and economic secrets, according to a U.S. counterintelligence report.

The report by the National Counterintelligence and Security Center, a DNI counterspy unit, concludes China is among the most aggressive states engaged in stealing U.S. proprietary information as part of a government-directed program.

Artificial intelligence and the internet of things are giving adversaries new tools for cyber spying, the report said.

Key technologies under cyber attack from foreign economic spies are related to the energy, biotechnology, defense, environmental protection, high-end manufacturing, and information and communications industries.

“China’s cyberspace operations are part of a complex, multipronged technology development strategy that uses licit and illicit methods to achieve its goals,” the report says.

“Chinese companies and individuals often acquire U.S. technology for commercial and scientific purposes,” the report states. “At the same time, the Chinese government seeks to enhance its collection of U.S. technology by enlisting the support of a broad range of actors spread throughout its government and industrial base.”

The report warned that the problem is continuing and urged greater efforts to counter Chinese cyber economic spying.

“We believe that China will continue to be a threat to U.S. proprietary technology and intellectual property through cyber-enabled means or other methods,” the report said. “If this threat is not addressed, it could erode America’s long-term competitive economic advantage.”

Among the methods used for the Chinese economic espionage program are traditional spies attached to the Ministry of State Security and military intelligence offices as well as a wide range of non-traditional spies.

Those include some of the 350,000 Chinese students currently studying in the United States, along with Chinese engaged in business.

Beijing also uses joint ventures between Chinese and U.S. companies, research partnerships with laboratories and other research centers, the purchase of American companies, front companies, and the use of Chinese laws that seek to force American companies operating in China to provide trade secrets.

Chinese economic spying is continuing despite a promise by Chinese leader Xi Jinping in September 2015 not to engage in commercial spying. The level of cyber economic espionage, however, by China has been lower since the accord, the report said.

Security experts have identified Chinese economic espionage targeting of engineering, telecommunications, and aerospace companies.

Beijing cyber spies also hacked the popular CCleaner app that was used by China to target Google, Microsoft, Intel, and VMwar.

A Chinese hacker dubbed KeyBoy last year began conducting cyber spying operations against western corporations, and another group, TEMP.Periscope conducted cyber attacks on the maritime industry and research and academic organizations.

The security firm FireEye said “sharp increases” in Chinese cyber attacks were detected in early 2018.

“Most Chinese cyber operations against U.S. private industry that have been detected are focused on cleared defense contractors or IT and communications firms whose products and services support government and private sector networks worldwide,” the report said.

The report concluded the economic spying poses a strategic threat to the United States advanced research and technology.

“China, Russia, and Iran stand out as three of the most capable and active cyber actors tied to economic espionage and the potential theft of U.S. trade secrets and proprietary information,” says the 20-page report, noting that other states with closer U.S. ties also are using cyber espionage.

“Despite advances in cybersecurity, cyber espionage continues to offer threat actors a relatively low-cost, high-yield avenue of approach to a wide spectrum of intellectual property.”

Russian economic espionage also threatens U.S. technology as Moscow seeks to bolster an economy hit hard by international sanctions and what the report said is “endemic corruption, state control, and a loss of talent departing for jobs abroad.”

“An aggressive and capable collector of sensitive U.S. technologies, Russia uses cyberspace as one of many methods for obtaining the necessary know-how and technology to grow and modernize its economy,” the report said.

Russia uses intelligence penetrations of public and private enterprises to obtain sensitive technical secrets. Commercial and academic exchanges also are used for spying, along with recruitment of Russian immigrants in the United States who have technical skills.

“Russian intelligence services have conducted sophisticated and large-scale hacking operations to collect sensitive U.S. business and technology information,” the report said.

The report said the Department of Homeland Security in September 2017 ordered federal agencies to remove security software from Russia’s Kaspersky Lab over concerns the software could be used by cyber espionage.

The Iranians are a growing cyber economic espionage threat, according to the report.

“The loss of sensitive information and technologies not only presents a significant threat to U.S. national security,” the report said. “It also enables Tehran to develop advanced technologies to boost domestic economic growth, modernize its military forces, and increase its foreign sales.”

Under a section on emerging threats, the report states that cyber spies are infiltrating software supply chain networks and using the compromised software for spying operations.

“Our goal in releasing this document is simple: to provide U.S. industry and the public with the latest unclassified information on foreign efforts to steal U.S. trade secrets through cyberspace,” said the center director, William R. Evanina.

“Building an effective response to this tremendous challenge demands understanding economic espionage as a worldwide, multi-vector threat to the integrity of both the U.S. economy and global trade.”

***

BILL GERTZ, Senior editor at the Washington Free Beacon, Inside the Ring columnist at the Washington Times, Author of iWar: War and Peace in the Information Age (2016):

  • What is the benign China policy?
  • Implications of the massive Chinese intelligence collection in the United States

Also see: