recommended reading

Intercepted Al Qaeda Conference Call Triggered U.S. Embassy Closures

The U.S. embassy in Amman, Jordan is one of the shuttered embassies.

The U.S. embassy in Amman, Jordan is one of the shuttered embassies. // AP

The continued closure of embassies and the travel alerts across the Middle East was apparently prompted not by a simple conversation between two top Al Qaeda leaders, but by an intercepted conference call between top leadership and affiliates across the region. That's been followed by a noticeable uptick in drone strikes over the past few days. 

The U.S. and Britain evacuated their embassies in Yemen yesterday and urged nationals to leave the country as soon as possible over their fears of an imminent al-Qaeda attack. It had previously been reported that U.S. intelligence picked up a conversation between al-Qaeda leader Ayman al-Zawahiri and Nasser al-Wuhayshi, his top counterpart in Yemen, discussing Zawahiri's wish to see a terrorist attack launched from the region. 

But apparently the intelligence that was intercepted was much more than that. "This was like a meeting of the Legion of Doom," an intelligence source told The Daily Beast's Josh Rogin and Eli Lake. U.S. intelligence intercepted a major conference call between up to 20 al-Qaeda affiliates across the Middle East during which Zawahiri promoted Wuhayushi to a "general manager" position, giving him control over most of the group's smaller operations in the region. The top al-Qaeda leaders said teams were already in place for an attack, though they were vague when discussing the target, which prompted the swift and wide-ranging response from the U.S. 

In the wake of the attacks, the drone operation in Yemen has also been taken up a notch. There have been five drone strikes over the last five days targeting suspected al-Qaeda operatives, breaking a seven week stretch of drone silence in the area. The BBC also reports that Yemeni officials claim to have broken up an al-Qaeda plot to take over the country's oil pipelines. Whether or not that was the attack U.S. officials have been planning against is unclear. 

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

    Download
  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download

When you download a report, your information may be shared with the underwriters of that document.