Islamic State Militant Beheads U.S. Journalist Steven Sotloff in Video, Group Says

Supporters take part in a candle light vigil at the University of Central Florida, Sept. 3, 2014, in Orlando, Fla., to honor Steven Sotloff, a UCF former student and the second American journalist to be beheaded by the Islamic State group in two weeks.

John Raoux/AP

AA Font size + Print

Supporters take part in a candle light vigil at the University of Central Florida, Sept. 3, 2014, in Orlando, Fla., to honor Steven Sotloff, a UCF former student and the second American journalist to be beheaded by the Islamic State group in two weeks.

As they warned they would, Islamic State fighters beheaded American Steven Sotloff, says intel group. By Kevin Baron

This story has been updated.

American journalist Steven Sotloff has been executed and beheaded by the Islamic State group, according to a new video posted on Monday. 

The killing fulfills the Islamic State’s threat to President Barack Obama that Sotloff also would be killed as journalist Jim Foley was two weeks ago unless the U.S. ceased air strikes against them.

“I am Steven Joel Sotloff. I’m sure you know exactly who I am by now and why I am appearing before you,” he says, according to a transcript posted by SITE Intelligence Group, which has posted a still photo and portions of a video showing Sotloff on his knees in an orange jumpsuit next to a masked Islamic State fighter. The video is cut short before Sotloff’s execution. 

“The United States, as you know, has dedicated significant time and resources to try and rescue Mr. Sotloff,” said White House spokesman Josh Earnest, who sent the president’s thoughts and prayers to the Sotloff family in a short statement in the briefing room, and promised the U.S. would analyze the video closely.

According to SITE Intelligence group, in the new video the same executioner of Foley says, “I’m back, Obama, and I’m back because of your arrogant foreign policy towards the Islamic State, because of your insistence on continuing your bombings and [unclear] on Mosul Dam, despite our serious warnings. You, Obama, have but to gain from your actions but another American citizen. So just as your missiles continue to strike our people, our knife will continue to strike the necks of your people.”

U.S. officials appeared surprised by the video’s Monday release. “If the video is genuine, we are sickened by this brutal act taking the life of another innocent American citizen. Our hearts go out to the Sotloff family,” said State Department spokeswoman Jen Psaki.

Just like you, we’re trying to find out ground truths here,” said Pentagon press secretary Rear Adm. John Kirby, declining to offer further details about it’s timing or authenticity.  

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • GBC Issue Brief: Supply Chain Insecurity

    Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.