Podcasts > Shawn Ryan Show > #149 Sarah Adams - Is the Pentagon Ignoring the Most Dangerous Threat of All?

#149 Sarah Adams - Is the Pentagon Ignoring the Most Dangerous Threat of All?

By Shawn Ryan Show

On this episode of the Shawn Ryan Show, the hosts cover alarming intelligence regarding Al-Qaeda's planned terrorist attacks against the U.S. and Europe. They discuss details about the thousands of trained operatives involved, potential tactics like suicide bombings and sophisticated explosives, and the unification of groups like Al-Qaeda, ISIS, and the Taliban under the "Islamic Army."

The discussion delves into how foreign entities, including Iran's Revolutionary Guard and Russia, are supporting and enabling these plots. The hosts examine concerning failures in U.S. counterterrorism efforts, including the government's alleged disregard for actionable intelligence and the deterioration of assets following the Afghanistan withdrawal.

#149 Sarah Adams - Is the Pentagon Ignoring the Most Dangerous Threat of All?

This is a preview of the Shortform summary of the Dec 12, 2024 episode of the Shawn Ryan Show

Sign up for Shortform to access the whole episode summary along with additional materials like counterarguments and context.

#149 Sarah Adams - Is the Pentagon Ignoring the Most Dangerous Threat of All?

1-Page Summary

Al-Qaeda's Planned Attacks

Trained Terrorists Ready to Strike

According to Shawn Ryan and Sarah Adams, Al-Qaeda has trained around 1,000 terrorists each for attacks in the U.S. and Europe. The U.S. attack is expected to involve suicide bombers, "Fadeian" fighters willing to die, and coordinated strikes across multiple cities, similar to the 2008 Mumbai model.

Timing, Targets, and Tactics

While timing and specific targets remain unclear, Al-Qaeda aims for maximum impact by potentially targeting symbolic sites, transportation, and large gatherings. Adams warns of sophisticated tactics like advanced suicide vests evading detection.

Coordinated Timing

Al-Qaeda is attempting to coordinate the timing of the U.S. and European attacks, with October 7th, marking the Afghanistan War anniversary, as a potential date.

Al-Qaeda's Terrorist Partnerships

The "Islamic Army" Alliance

Hamza bin Laden has formed the Islamic Army, uniting groups like Hamas, Hezbollah, ISIS, and the Taliban. The Haqqani Network within the Taliban plays a key role, and around 120,000 recruits have been trained under this banner.

Resource Consolidation

According to Adams, this alliance allows Al-Qaeda to leverage the resources and capabilities of diverse groups for its operations.

Hamza bin Laden's Oversight

Hamza personally oversees the Islamic Army, appointing commanders and strategizing with ISIS affiliates like Sana'a Ulughafari on joint attacks.

Misattribution Strategy

Adams notes Al-Qaeda deliberately avoids claiming responsibility to maintain the Islamic Army's secrecy, instead arranging for affiliates like ISIS to claim attacks.

Foreign Support

Iran's IRGC Harbors Al-Qaeda

Adams states Iran's Islamic Revolutionary Guard Corps (IRGC) has actively harbored and supported Al-Qaeda operatives, providing safe haven and resources. The IRGC's intelligence wing has facilitated attacks like the October 2022 Hamas strikes and the planned U.S. attack.

Russian Aid for U.S. Infiltration

Russia has allegedly used pipelines and channels to transport supplies for Al-Qaeda's planned U.S. homeland attack, aiming to undermine and destabilize America according to Adams.

U.S. Counterterrorism Failures

Ignoring Intelligence Warnings

Adams criticizes the U.S. government for failing to act on actionable intelligence from private sources about Al-Qaeda plotting, ignoring embassy attack warnings and suppressing reports on Hamza bin Laden's survival.

Crippled Intelligence after Afghanistan

Shawn Ryan highlights the near-total loss of U.S. intelligence assets and collection capabilities in Afghanistan following the withdrawal, now relying on the Taliban. Afghan allies have been abandoned and killed.

1-Page Summary

Additional Materials

Actionables

  • You can enhance your personal safety by staying informed about potential threats and developing a basic emergency plan. Start by subscribing to reliable news sources and government alerts that provide updates on security threats. Create a simple plan that includes evacuation routes from places you frequent, a communication strategy with family members, and a go-bag with essential items in case of an emergency.
  • Improve your situational awareness in public spaces to better protect yourself in the event of an incident. Practice observing your surroundings and identifying exits whenever you enter new buildings or attend large gatherings. Take note of any unusual behavior and trust your instincts; if something feels off, don't hesitate to leave the area and report your concerns to authorities.
  • Support community resilience by participating in local safety workshops or first aid training. Look for opportunities offered by community centers, local health departments, or the Red Cross that teach skills like CPR, wound care, and emergency response. These skills not only prepare you for potential crises but also enable you to assist others in need.

Get access to the context and additional materials

So you can understand the full picture and form your own opinion.
Get access for free
#149 Sarah Adams - Is the Pentagon Ignoring the Most Dangerous Threat of All?

Al-Qaeda's planned terrorist attacks against the U.S. and Europe

Al-Qaeda has trained and deployed approximately 1,000 terrorists each for attacks in the U.S. and Europe

Shawn Ryan and Sarah Adams discuss the imminent threat posed by Al-Qaeda to the U.S. and Europe. They mention that Al-Qaeda has trained approximately 1,000 individuals for an attack on U.S. soil, targeting symbolic locations to cause mass casualties and gain significant press. An equal number of terrorists have been prepared for attacks in Europe. Abdullah bin Laden runs the terrorist camps where these homeland attackers are trained. Some terrorists use legal immigration channels to enter the U.S., including tourist visas, and they are said to include ISIS members to shift blame onto the group.

The U.S. homeland attack is expected to involve suicide bombers, "Fadeian" attackers who will fight to the death, and coordinated swarming attacks across multiple cities, modeled after the 2008 Mumbai attacks

The hosts detail that the planned attacks are expected to utilize autonomous "Fadeian" attackers willing to fight to the death, reminiscent of the 2008 Mumbai attacks. The swarming attack tactics give assailants the autonomy to change their targets and methods during the operation. Similar autonomy was noted in the Mumbai attacks, where attackers switched from a bombing to shooting to maximize casualties. Adams discusses Al-Qaeda's desire for innovation, such as advanced suicide vests that could go undetected by metal detectors and bomb-sniffing dogs and warns that the U.S. might not be prepared for such sophisticated attacks.

The timing and targets of the attacks are still unclear, but Al-Qaeda is said to be aiming for maximum impact and economic disruption, potentially targeting symbolic locations, public transportation, and large gatherings

Although the specific timing and targets are unclear, Al-Qaeda is aiming for maximum impact and economic disruption, potentially targeting the U.S. Capitol, public transportation, and large gatherings at universities, churches, and ...

Here’s what you’ll find in our full summary

Registered users get access to the Full Podcast Summary and Additional Materials. It’s easy and free!
Start your free trial today

Al-Qaeda's planned terrorist attacks against the U.S. and Europe

Additional Materials

Actionables

  • You can enhance your personal safety by staying informed about local events and avoiding large gatherings on dates with historical significance, such as October 7th. By keeping track of significant anniversaries and events that might attract attention, you can plan your activities to minimize risk. For example, if you know a certain date is historically significant, consider altering your routine or choosing less crowded places to visit.
  • Develop a habit of being observant in public spaces, especially in locations mentioned as potential targets like transportation hubs or symbolic sites. Pay attention to unattended bags, individuals acting suspiciously, and emergency exits. If you regularly commute through a major train station, take a few moments each trip to note the nearest exits and any security personnel, which can prepare you to act quickly in an emergency.
  • Encourage a culture of vigilance and prepar ...

Get access to the context and additional materials

So you can understand the full picture and form your own opinion.
Get access for free
#149 Sarah Adams - Is the Pentagon Ignoring the Most Dangerous Threat of All?

Al-Qaeda's coordination and partnerships with other terrorist groups

Al-Qaeda has been developing close coordination and partnerships with various other terrorist organizations, enhancing their global threat potential.

Al-Qaeda has formed an "Islamic Army" that unites various Sunni and Shia terrorist organizations, including Hamas, Hezbollah, ISIS, and the Taliban

Hamza bin Laden, the leader of Al-Qaeda, has established the Islamic Army, an alliance that transcends the traditional Sunni and Shia divide, and includes a myriad of groups such as Hamas, Hezbollah, ISIS, and the Taliban. The Haqqani Network is involved as a senior leadership component within the Taliban, with Sirajuddin Haqqani—a part of this network—having significant influence and receiving substantial funds. The Islamic Army involves complex negotiations and has trained about 120,000 individuals. Recruits are trained under the Islamic Army umbrella, creating a unified identity that obfuscates specific group affiliations such as Al-Qaeda or ISIS when deployed or if detained.

The Islamic Army allows Al-Qaeda to leverage the resources, fighters, and capabilities of these disparate groups to carry out its operations

The formation of the Islamic Army has enabled Al-Qaeda to consolidate resources and fighters across different organizations. This conglomerate force supports joint operations, such as Joulani's blitzkrieg, and contributes to Al-Qaeda's grand strategy. The Islamic Army's extensive training prepares recruits to operate under a single banner, bolstering Al-Qaeda's operational capacity significantly.

Al-Qaeda's leader, Hamza bin Laden, is overseeing and coordinating the activities of the Islamic Army

Hamza bin Laden is an active and hands-on leader who personally oversees and coordinates the activities of the Islamic Army, furthering the vision set by his father, Osama bin Laden. He holds regular meetings and, in a distinct leadership style, has appointed one of his father's former bodyguards, Hamza Alghamdi, as the commander of the Islamic Army. Hamza personally engages in strategic dealings, such as making an agreement with Sana'a Ulughafari of ISIS Khorasan province about ISIS fighters participating in Al-Qaeda-led attacks.

Al-Qaeda is d ...

Here’s what you’ll find in our full summary

Registered users get access to the Full Podcast Summary and Additional Materials. It’s easy and free!
Start your free trial today

Al-Qaeda's coordination and partnerships with other terrorist groups

Additional Materials

Actionables

  • You can enhance your awareness of global events by following diverse news sources, including international outlets and independent journalists, to get a broader perspective on how terrorist organizations might be reported differently across various platforms. This helps you understand the nuances in reporting and the importance of looking beyond the surface to see the bigger picture, similar to how complex networks like the Islamic Army operate.
  • Develop critical thinking skills by practicing analyzing news articles and social media posts related to global security issues, looking for potential biases, misattributions, or oversimplifications. This exercise can help you discern the complexity behind global events and understand strategies like deliberate misattribution, which organizations might use to manipulate public perception.
  • Enga ...

Get access to the context and additional materials

So you can understand the full picture and form your own opinion.
Get access for free
#149 Sarah Adams - Is the Pentagon Ignoring the Most Dangerous Threat of All?

Involvement and support of foreign nations for al-Qaeda's activities

Al-Qaeda's activities have been sustained over the years, in part due to the involvement and clandestine support of certain foreign nations. This support has varied from providing safe havens and resources to complex covert operations.

Iran's Islamic Revolutionary Guard Corps (IRGC) has actively harbored and supported Al-Qaeda operatives, including providing a safe haven and resources

While specific examples of the Islamic Revolutionary Guard Corps's (IRGC) direct involvement in facilitating and planning Al-Qaeda attacks are not detailed in the transcript, it is clear that Al-Qaeda has found shelter and strategic partnership with Iran's IRGC. Sarah Adams points out that after the US entered Afghanistan post-9/11, Al-Qaeda operatives fled to Iran and Pakistan, finding safer haven in Iran and establishing close relationships with the government there.

IRGC intelligence officials have been linked to the planning of major terrorist activities, including Hangman attacks, and have formed a deep relationship with Al-Qaeda. Mohammed Kazemi, for instance, a friend of the late IRGC Quds Force leader Qasem Soleimani, played a significant role in keeping key Al-Qaeda figures safe. This partnership was solidified with intelligence sharing and the use of an intelligence base situated in an Al-Qaeda camp in Kandahar, indicating an operational alliance for shared terroristic goals.

IRGC intelligence officials have been directly involved in facilitating and planning Al-Qaeda attacks, including the October 2022 Hamas attacks and the planned U.S. homeland attack

The collaboration between IRGC and Al-Qaeda extends to organizing and executing terrorist attacks. Details revealed from the transcript suggest joint operations, with specific references to the involvement of both the Taliban and Hamas in certain attacks. The IRGC and other branches of the Iranian military have had direct communications over Telegram, with planning meetings held in regions such as Kandahar and Kabul. Moreover, the relationship between these organizations is linked to various forms of support, ranging from logistical to financial, with sums as substantial as $145 million a month mentioned.

Furthermore, following Qasem Soleimani's death, Al-Qaeda's distrust of their security under Iran's protection prompted movements of operatives. Al-Qaeda's presence even extends to uranium mines in the south of Afghanistan which are controlled by China, with the IRGC reportedly assisting Al-Qaeda in the dangerous task of potentially using uranium, which evokes the grim threat of dirty bombs.

Russia has also allegedly aided Al-Qaeda's efforts, with Russian pipel ...

Here’s what you’ll find in our full summary

Registered users get access to the Full Podcast Summary and Additional Materials. It’s easy and free!
Start your free trial today

Involvement and support of foreign nations for al-Qaeda's activities

Additional Materials

Actionables

  • You can enhance your digital security to protect against potential cyber threats linked to international conflicts by updating your software regularly, using strong, unique passwords for different accounts, and enabling two-factor authentication wherever possible. This helps mitigate the risk of your personal information being compromised if cyber warfare tactics are employed as part of broader geopolitical strategies.
  • Stay informed about global events and their local implications by subscribing to a diverse range of news sources, including international outlets, to gain a broader perspective on how international relations might affect your community. This can help you understand the ripple effects of foreign policy decisions and prepare for any indirect impacts they may have on your local environment.
  • Support legitimate cha ...

Get access to the context and additional materials

So you can understand the full picture and form your own opinion.
Get access for free
#149 Sarah Adams - Is the Pentagon Ignoring the Most Dangerous Threat of All?

Failures and gaps in the U.S. government's counterterrorism efforts

The U.S. government's counterterrorism initiatives are under heavy scrutiny, revealing serious gaps in the system, ranging from overlooking actionable intelligence to the loss of critical networks in Afghanistan.

The U.S. government has failed to heed warnings and actionable intelligence provided by private investigators and sources regarding Al-Qaeda's plotting

Sarah Adams, at the crux of this discussion, criticizes the U.S. for not taking adequate measures based on information from private sources about Al-Qaeda's plotting. Adams and others shared intelligence on ISIS and warnings of potential Al-Qaeda attacks to government organizations, which were met with no response. Significant lapses in oversight were showcased when U.S. counter-terrorism dollars were found to be funding the Taliban's Supreme Leader and U.S humanitarian aid being repurposed to finance Al-Qaeda training camps.

The Pentagon disregarded Adams' collection of information regarding Al-Qaeda's plans to attack U.S. embassies. The U.S. government's reticence was also evident in the case of Hamza bin Laden. Despite international coverage on his survival, the CIA directed U.S. press not to report this fact. British intelligence, frustrated with CIA's suppression, leaked information to counter the American narrative. Adams also exposed that Mohammed Kazemi, despite being a mastermind behind plots against a former U.S. president, is not on the FBI’s most-wanted list. Concerning designations, she noted the U.S.'s slow response in listing key Benghazi attackers on most-wanted lists, contrasting it with actions taken by General Haftar in Libya.

Furthermore, Florida Governor DeSantis did not receive terrorism threat reporting from the federal government, revealing a lack of intelligence-sharing with state governments.

The U.S. has lost much of its intelligence collection and asset network in Afghanistan, leaving it increasingly blind to terrorist activi ...

Here’s what you’ll find in our full summary

Registered users get access to the Full Podcast Summary and Additional Materials. It’s easy and free!
Start your free trial today

Failures and gaps in the U.S. government's counterterrorism efforts

Additional Materials

Counterarguments

  • The U.S. government receives vast amounts of intelligence, and not all can be acted upon due to prioritization and resource constraints.
  • Counter-terrorism funding is complex, and sometimes funds can inadvertently end up in the wrong hands despite safeguards.
  • The Pentagon may have had strategic reasons for not acting on certain intelligence, such as the potential for false information or broader security considerations.
  • Information suppression by the CIA could be due to operational security concerns and the need to protect ongoing intelligence operations.
  • The absence of individuals like Mohammed Kazemi from the FBI’s most-wanted list could be due to a variety of factors, including ongoing covert operations or lack of sufficient evidence.
  • Delays in listing terrorists on most-wanted lists can sometimes be attributed to the need for thorough investigation and legal processes.
  • Intelligence-sharing with state governments may be subject to classification issues, and not all threat reporting may be relevant or actionable at the state level.
  • The loss of intelligence capabilities in Afghanistan is a complex issue, and the U.S. may have other means of collecting intelligence that are not publicly disclosed. ...

Actionables

  • You can enhance your personal data security to protect against identity theft by regularly updating passwords, using two-factor authentication, and being cautious about sharing personal information online. Given the concerns about biometric data and personal information being compromised, taking these steps can help safeguard your identity from similar vulnerabilities.
  • Engage in community awareness programs to better understand local emergency response plans and how to react in crisis situations. By participating in or even initiating neighborhood watch programs, you can contribute to a more secure environment and be better prepared for potential threats, reflecting the importance of actionable intelligence at a community level.
  • Support reputabl ...

Get access to the context and additional materials

So you can understand the full picture and form your own opinion.
Get access for free

Create Summaries for anything on the web

Download the Shortform Chrome extension for your browser

Shortform Extension CTA