Displaying posts categorized under

HOMELAND SECURITY

Kelly: ‘Metastasized and Decentralized’ Terror Ops Make Threat Worse Than 9/11 Era By Bridget Johnson

WASHINGTON — Homeland Security Secretary John Kelly warned today that Islamic terrorism “is threatening us today in a way that is worse than we experienced 16 years ago on 9/11” because of how terrorists’ operations have “metastasized and decentralized.”

Speaking at George Washington University, Kelly emphasized “we are under attack every single day” and “the threats against us are relentless.”

“We are under attack from criminals who think their greed justifies raping young girls at knifepoint, dealing poison to our youth, or just killing some of us for fun,” he said. “We are under attack from people who hate us, hate our freedoms, hate our laws, hate our values, hate the way we simply live our lives. We are under attack from failed states, cyber-terrorists, vicious smugglers, and sadistic radicals.”

In the years since the Sept. 11, 2001, terrorist attacks, the DHS chief said, “we’ve grown somewhat accustomed” to the terror threat and “now question all the security, all of the issues that we have put in place to secure the nation, because it’s a little bit of an inconvenience at an airport, or a little bit of an inconvenience as you pass onto an airplane.”

“The threat to our nation, our American way of life, has not diminished… As I speak these words, the FBI has opened terrorism investigations in all of our 50 states. And since 2013, there have been 37 ISIS-linked plots to attack our country.”

Kelly noted estimates that as many as 10,000 Europeans fought with ISIS in Iraq and Syria, in addition to thousands more foreign fighters representing the rest of the globe including the Western Hemisphere, and “they have learned how to make IEDs, employ drones to drop ordnance, and acquired experience on the battlefield that, by our reports, they are beginning to increasingly bring home.”

“Many of these holy warriors will survive, come back to their home countries, where they will wreak murderous havoc in Europe, Asia, the Maghreb, the Caribbean and the United States,” he added.

Because many ISIS foreign fighters hail from countries that have a visa waiver agreement with the United States, “they can more easily travel to the United States, which makes us and continues to make us the prime terrorist target.”

But, he said, “few of the challenges we face from a terrorism point of view are even close to as difficult” as homegrown terrorism, which has seen an “unprecedented spike.”

“In the past 12 months alone, there have been 36 homegrown terrorist cases opened in 18 states. These are the cases we know about,” Kelly said. “Homegrown terrorism is notoriously difficult to predict, detect, and certainly almost impossible to control… if you are a terrorist with an innocent internet connection like the one on your ever-present cell phone, you can recruit new soldiers, plan your attacks and upload a video calling for jihad with just a few clicks.” CONTINUE AT SITE

There’s a crisis in the air If a shooting war comes, the Air Force is not ready Jed Babbin

American armed forces consistently perform so well that their effectiveness is taken for granted. Complaints about military spending cuts during the Obama years are such a cliche that they have been yawned at by our political leaders and completely ignored by the media.

But those years have taken us from cliche to crisis. Three factors have combined to create an emergency in airpower. First is the wear and tear imposed by nearly 16 years of combat. Second are with the massive, reckless cuts in defense spending imposed by President Obama which, under the Budget Control Act of 2011, are scheduled to continue for at least four years. Third is the near-criminal neglect of our forces by Mr. Obama’s generals and admirals. As a result, so many of our combat aircraft are incapable of flying combat missions that the president is deprived of options that may be critical to any war, large or small.

Air power — the ability to clear the skies of enemy aircraft and destroy the enemy’s ground forces — has been a critical element of warfare for nearly a century. Offensively and defensively, air power is the sine qua non of military action.

Constant pilot training and American technological advantages have meant that every generation of American fighter pilots since World War II has inherited air supremacy — domination of the skies — as a birthright. That is no longer the case.

In February, the Navy confirmed that 74 percent of the Marines’ F/A-18s — 208 of 280 aircraft — are incapable of flying combat missions.

Two Illinois Men Charged with Conspiring to Provide Material Support to ISIS By Debra Heine

Two Illinois men were arrested Wednesday on a federal complaint charging them with conspiring and attempting to provide material support to an associate joining ISIS on the battlefield in Syria. According to the complaint, the men had pledged allegiance to the Islamic State, advocated for terrorism on social media, and even shared photos of themselves in terrorist get-ups holding the Islamic State flag at the Illinois Beach State Park in suburban Zion.

Joseph D. Jones and Edward Schimenti, both 35 and from Zion, were charged with “conspiring and attempting to provide material support and resources to the Islamic State of Iraq and al-Sham (ISIS).” Jones is also known as “Yusuf Abdulhaqq” and Schimenti goes by the name of “Abdul Wali.”

According to the charges, the investigation began in September 2015, “when an undercover agent posing as a motorist arrested in a traffic-related incident approached Jones at the Zion Police Department, where Jones was being interviewed about the recent slaying of a friend.”

That agent introduced Jones and Schimenti to other undercover agents posing as ISIS supporters, including an informant whom they believed was planning to travel to the Middle East to join the Islamic State. Jones and Schimenti worked out with the purported jihadist at a Zion gym to help get him into combat shape. They also bought cell phones at a local store, thinking that they would be used as bomb detonators, according to the complaint. CONTINUE AT SITE

CIA Director Pompeo Rips ‘Hostile Intelligence Service’ WikiLeaks By Bridget Johnson

WASHINGTON — In his first public remarks since taking the helm of the Central Intelligence Agency, Director Mike Pompeo assured the American public that the CIA is not spying on them and tore into WikiLeaks as a morally bankrupt “non-state hostile intelligence service” that sides with global tyrants.

Speaking today at the Center for Strategic and International Studies, Pompeo also implied that WikiLeaks founder Julian Assange would have sided with the Nazis during World War II.

Pompeo said he’s “surrounded by talented and committed patriots” in his new job at the agency, who “quietly go about their work and try not to get too worked up over the headlines, including the fanciful notion that they spy on their fellow citizens via microwave ovens” — a jab at White House senior counselor Kellyanne Conway’s interpretation of WikiLeaks’ March data dump about CIA methods.

“But they are not at liberty to stand up to these false narratives and explain our mission to the American people,” he said of his workforce, adding “it is time to call these voices out — the men and women of CIA deserve a real defense.”

“…We are a foreign intelligence agency. We focus on collecting information about foreign governments, foreign terrorist organizations, and the like — not Americans. A number of specific rules keep us centered on that mission and protect the privacy of our fellow Americans. To take just one important example, CIA is legally prohibited from spying on people through electronic surveillance in the United States. We’re not tapping anyone’s phone in Wichita.”

Pompeo, a former Kansas congressman, added that “regardless of what you see on the silver screen, we do not pursue covert action on a whim without approval or accountability… there is oversight and accountability every step of the way.”

President Trump praised WikiLeaks repeatedly on the campaign trail as stolen emails from the Democratic National Committee and Clinton campaign chairman John Podesta were published. Pompeo noted today that “we at CIA find the celebration of entities like WikiLeaks to be both perplexing and deeply troubling.”

“Because while we do our best to quietly collect information on those who pose very real threats to our country, individuals such as Julian Assange and Edward Snowden seek to use that information to make a name for themselves. As long as they make a splash, they care nothing about the lives they put at risk or the damage they cause to national security,” he said. CONTINUE AT SITE

The Industrial Internet Of Things – Potential Cyber Threats Consequences By Ludmila Morozova-Buss

Mr. Chuck Brooks – one of the world’s most known experts and the cyber security guru, shares his thoughts about Industry 4.0 and cyber threats in an interview with Ludmila Morozova-Buss.

As the capabilities and connectivity of cyber devices have grown exponentially, so have the cyber intrusions and threats from malware and hackers requiring restructuring of priorities and missions.

According to Chuck Brooks, a successful 4.0 cyber threat consequences strategy requires stepping up assessing situational awareness, information sharing, and especially resilience. Cyber resilience is an area that must be further developed both in processes and technologies because no matter what, breaches will happen.

Currently, Ransomware mostly via Phishing activities is the top threat. In the recent past, 2014 code vulnerabilities such as Heartbleed, Shellshock, Wirelurke, POODLE and other open source repositories caused chaos and harm. There is a growing understanding the seriousness and sophistication of the threats, especially denial of service and the adversarial actors that include states, organized crimes, and loosely affiliated hackers.

In the US, most (approximately 85%) of the cybersecurity critical infrastructure including defense, oil, and gas, electric power grids, healthcare, utilities, communications, transportation, banking, and finance is owned by the private sector and regulated by the public sector. DHS has recognized the importance of private sector input into cyber security requirements across these verticals and along with NIST in developing a strategy to ameliorate shortcomings.

The Strategic Grid, in the US and Europe, is in great need for enhanced security. An accelerated effort to fund and design new technologies to protect the utilities from natural or man-made electromagnetic surges; further, harden hardware and software in SCADA networks from cyber-attack, and provide enhanced physical security for the grid.

Mobile management that involves securing millions of BYOD devices is currently a challenge for information security both in government and in the private sector. Cloud computing has also taken center stage and securing cloud applications. There is always a need for better encryption, biometrics, smarter analytics and automated network security in all categories.

Supercomputing, machine learning, and quantum computing technologies are an exciting area of current exploration that may remedy many of the threats.

Chuck’s Brooks list of future cyber security 4.0 priorities includes:

Internet of Things (society on new verge of exponential interconnectivity)
Wearables
Drones and Robots
Artificial intelligence
Smart Cities
Connected transportation

The full interview by Ludmila Morozova-Buss can be read here.

Editor’s Note: This Article originally appeared on IIOT World, and is featured here with Author permission.

Syrian in South Carolina Busted in 2nd Islamic Terror Plot Daniel Greenfield

If at first you don’t succeed, the authorities will let you try, try again.

A South Carolina teenager plead guilty to gun charges after officials say he plotted to attack a US military base in hopes of joining ISIS.

“It wasn’t like some fantasy he was acting out and then was nothing to bear out,” says 16th Circuit Solicitor Kevin Brackett. “This was a legitimate and sincere desire and effort on his part to accomplish these things.”

The 16-year-old boy, whose name is not being released, lived in York County but his family is originally from Syria.

Authorities said the investigation shows he was involved in “some radical Islamic activities” and associated with people in “radical Islamic groups.” They say the teen had expressed some of these thoughts publicly for a while, but no one came forward.

Of course they didn’t. It’s the Great Green Wall of Silence of Islam.

He was sentenced to be held by the Department of Juvenile Justice and was to attend counseling.

Brackett says the teen, in court, said he had changed his ways and no long believed the ideas he held before, but Brackett is skeptical. He says the teen appeared to hold the ideas fairly closely when he was first interviewed about them.

You can guess the sequel to the story two years later.

Brackett said Abdin told the court he was troubled, that his father had died, and swore this was an isolated incident, adding he had just been confused. He promised they wouldn’t hear from him again, Brackett said.

The judge sentenced Abdin to the maximum punishment, an indeterminate sentence that would keep him behind bars until his 21st birthday, Brackett said.

Abdin served time at the juvenile justice facility in Columbia but was paroled a few months ago, Brackett said. He said he and York Police Chief Andy Robinson had strong objections to Abdin’s parole.

“Given nature of allegations and the incident here, and evidence I saw in 2015, I’m not terribly surprised. I always thought these beliefs were much more deeply rooted,” Brackett said. “I’m grateful that the federal authorities were keeping close tabs on him and able to intervene before anyone got hurt.”

The Muslim Brotherhood: Peddling Sharia as Social Justice by Judith Bergman

Human Rights Watch, an organization that is supposed to look out for victims of human rights abuses, not abusers of human rights is begging US decision makers not to designate the Muslim Brotherhood — which, if it had its way, would take away everyone’s human rights and substitute them with sharia law — a foreign terrorist organization.

“Allah is our objective; the Prophet is our leader; the Quran is our law; Jihad is our way; dying in the way of Allah is our highest hope”. — Muslim Brotherhood motto.

Conveniently, Hamas — which according to article two of its charter, is “one of the wings of Moslem Brotherhood in Palestine” — is, it seems, working on a new charter. The new charter would declare that Hamas is not a part of the Muslim Brotherhood, despite its always having been so. That way, is the Muslim Brotherhood’s “narrative” of newfound “nonviolence” suddenly supposed to become believable?

Gehad el-Haddad, official spokesman for the Muslim Brotherhood (MB), is on a mission to rewrite the terrorist and radical history of the MB. He seems to be doing this for the consumption of naïve Americans. These seem only too willing to believe — in the name of tolerance, diversity and trying to be non-judgmental — that an organization whose ultimate goal is the supreme reign of Islamic sharia law everywhere — if necessary through violent jihad — could possibly value anything even approximating equality and the rule of (non-sharia) law.

“We are not terrorists,” wrote a political activist for the MB, Gehad el-Haddad, in a recent article in the New York Times.

“The Muslim Brotherhood’s philosophy is inspired by an understanding of Islam that emphasizes the values of social justice, equality and the rule of law… We believe that our faith is inherently pluralistic and comprehensive and that no one has a divine mandate or the right to impose a single vision on society… Nothing speaks more to our unequivocal commitment to nonviolence than our continued insistence on peaceful resistance, despite unprecedented state violence”.

The “faith”, which el-Haddad avoids naming, is Islam. The very essence of Islam, as sanctioned in the Quran and the hadiths, however, seems to be the belief in a divine mandate to impose the single vision of Islam on the world — if necessary, through violent jihad. Its motto is:

“Allah is our objective; the Prophet is our leader; the Quran is our law; Jihad is our way; dying in the way of Allah is our highest hope”.

Even dawa, the Islamic call to conversion, or proselytizing — as explained by the Muslim Brotherhood’s spiritual leader, Yusuf al-Qaradawi, host of one of Al Jazeera’s most popular programs, Sharia and Life, which reaches an estimated 60 million viewers worldwide — is an Islamic summons for the non-violent conquest of non-Muslim lands. As Qaradawi told a Muslim Arab Youth Association convention in Toledo, Ohio, in 1995, “We will conquer Europe, we will conquer America! Not through sword but through Da’wa.”

Qaradawi, in a recording from 2007, says that the aim of this “peaceful” conquest consists mainly of the introduction of Islamic law, sharia. According to Qaradawi, sharia should be introduced in a new country gradually, over a five-year period, before implementing it in full. Sharia includes the end of free speech under “blasphemy laws”; the oppression of women, including women being worth half as much as a man in court and inheritance; polygamy, and the persecution of Jews (Qaradawi advocates killing all of them). Qaradawi has explained in TV recordings how sharia also includes chopping off hands for theft, killing apostates and homosexuals, as well as beating women as a means of “disciplining” them.

The New York Times, ostensibly concerned with “fake news”, evidently has no qualms about lending its pages to such straightforward propaganda as El-Haddad’s piece on behalf of the Muslim Brotherhood.

According to a recent report by the Middle East Media Research Institute (MEMRI), the MB recently launched a lobbying offensive in the United States to charm decision-makers in the Trump administration and Congress to give up on the Muslim Brotherhood Terrorist Designation Act of 2017, re-introduced on January 9, 2017, by Senator Ted Cruz.

According to the MEMRI report, the Muslim Brotherhood’s lobbying efforts include:

“Launching a widespread informational media campaign, including the hiring of U.S. lobbying and legal firms, outreach to the press in the U.S., and dissemination of informational content aimed at improving its image in the West, particularly in the U.S.”

Muslim IT Hackers in Congress Had Access to Everything Daniel Greenfield

It really speaks to the level of corruption and disorganization that this situation was able to go on for so long. Or that a clearly corrupt bunch that seemed willing to do anything had such access.

I’m not sure if that last sentence should be taken to refer to Congressional Democrats or the Pakistani Muslim IT brothers in their employ who are at the center of an access scandal. And a bunch of other scandals.

Awan ran technology for multiple House Democrats, and soon four of his relatives — including brothers Abid and Jamal — appeared on the payroll of dozens of other members, collecting $4 million in taxpayer funds since 2010.

“They had access to EVERYTHING. Correspondence, emails, confidential files — if it was stored on the Member system, they had access to it,” the former House Information Resources (HIR) technology worker with first-hand knowledge of Imran’s privileges told The Daily Caller News Foundation.

“There were some things – like access to the House email system that were totally controlled by the technicians at HIR. In order for certain permissions to be granted, a form was required to ensure that there was a paper trail for the requested changes. Imran was constantly complaining that he had to go through this process and trying to get people to process his access requests without the proper forms. Some of the permissions he wanted would give him total access to the Members’ stuff.”

“IT staff at HIR can be tracked for every keystroke they make,” the worker said. But by comparison, “when these guys were granted access to the Member’s computer systems there is no oversight or tracking of what they may be doing on the Member’s system. For example they could make a copy of anything on the Member’s computer system to a thumb drive or have it sent to a private server they had set up and no one would know.”

So we have some rather dubious people with access to everything on the system of Dems working on high level committees. And it’s a safe bet that they were no more secure about it than Hillary. On top of that you have Capitol Police, a sinecure position, investigating this, instead of the FBI or the Secret Service.

The central IT staffer said any suggestion that the brothers’ access didn’t span the full gamut of congressional intrigue was silly because they were the ones giving out permissions.

“When a new Member begins, they guide them on everything from which computer system to purchase to which constituent management system to go with and all other related hardware purchases. Then they install everything and set up all the accounts AND grant all the required permissions and restrictions,” the staffer said.

“In effect, they are given administrative control of the Members’ computer operations. They then set up a remote access so they can connect from wherever they are and have full access to everything on the Member’s system.”

You had Pakistanis with a backdoor to the systems of key figures who oversaw national security agencies. This is really bad. And yet keeping the investigation out of sight will bury it.

The US Government Again Fails to Protect Sensitive Personal Information By Stephen Bryen

Once again the U.S. government has failed to protect sensitive personal information, this time highly sensitive information on 4,000 Air Force officers. This information, contained in extensive 127-page individual security questionnaires known as SF-86 were found on a backup hard drive that was neither password protected or encrypted. In addition, extensive information on high-profile visitors to sites in Afghanistan was also on the same drive along with gigabytes of Outlook emails whose content has yet to be assessed.

This follows a number of other similar cases, the most notorious was the highly successful penetration of SF-86 files and other data held by the Office of Personnel Management (OPM) in June, 2015. In that case, 21.5 million American’s personal data was compromised, again involving the SF-86 security questionnaire. On top of that, 5.6 million fingerprints were also stolen. In applying for a security clearance, the government collects fingerprint data and photos.

Full disclosure: my personal data was also compromised in the OPM hack and I received an OPM letter and some worthless “free for a year” coverage of my personal data going forward.

Does the government have any responsibility to protect sensitive information?

Apparently, anyone who believes that the government has this responsibility is sadly misguided. Not only does the government not protect personal information, it hands it around to other agencies routinely and gives it to private contractors for “processing.”

Like your passport! You go to a passport office, fill out all the information, provide a birth certificate and all the requisite contact information, and you give the passport office photos, one of which will wind up embossed into your passport. Then the Passport Office sends all that (how, by mail?) to a private contractor to “process.” Who has access to it is anyone’s guess. The information is not classified and therefore is not formally protected in any manner.

The same holds true for your tax return, which you send in to the IRS. nowadays electronically. Maybe it is semi-encrypted when you electronically transmit the form, or your accountant does it for you, but when it arrives at the IRS it is stored as an ordinary file with no protection.

The SF-86 form is an especially pernicious example because it contains a vast amount of information, everything from every place you may have worked, who your friends and colleagues are, to your business involvements and who your family members and relatives may be. All of this provides hugely valuable information to potential adversaries who may be nation-states, but who also could be terrorist organizations.

Any Secrets Left to Steal? By Rachel Ehrenfeld

Everyone is shocked, shocked by WikiLeaks’ latest exposé that the Central Intelligence Agency (CIA) has been exploiting software vulnerabilities in our digital and electronic devices. All those “shocked” should have known better by now.

After the publications of files stolen by former National Security Agency’s contractor, Edward Snowden, on U.S. military capabilities, operations, tactics, techniques and procedures, and surveillance details, President Obama announced, “Nobody is listening to your telephone calls.”

In the spring of 2016 — months before Hillary Clinton’s and John Podesta’s emails were published by WikiLeaks — the Pew Research Center survey showed that many Americans “do not trust modern institutions to protect their personal data — even as they frequently neglect cybersecurity best practices in their own personal lives.”

For well over a decade, cyber experts have been testifying in open and closed Congressional hearings on the escalation of hacking into United States government agencies and private industries, communication, websites, and email. All without exception issued warnings on the short-term damages and the long-term threat posed by such hacking to U.S. national security and interests, and the American people by Chinese, Iranian, Russian, and other cybersavvy intelligence agencies, criminal and terrorist organizations. All the while very few, if any, warned of the proliferation of ground-based jammers and their growing interference with GPS timing and locations services, or data corruption and insertion.

In 2010, then Former Under Secretary of Defense for Policy Jim Miller lamented, “The scale of compromise, including the loss of sensitive and unclassified data, is staggering. We’re talking about terabytes of data, equivalent to multiple libraries of Congress.” (The Library of Congress is the world’s largest library, archiving millions of books, photographs, maps, and recordings.)

Successive governments and the private sector have failed to secure our communications, exposing our personal and national secrets, costing untold economic damage to individuals, companies, and our national security.

While the Obama administration oversaw the accelerated pace of moving to wireless communications — leaving very few alternatives, if any, for a time when those will be unavailable due to attack or natural disaster — it has adopted a slow knee-jerk cybersecurity policy. In 2014, the Obama administration was tasked by Congress to develop cyber countermeasure policies. But in response to Sen. John McCain’s (R-AZ) question “Is it correct that these are policy-decisions that have not been made?” U.S. Cyber Command Commander Admiral Michael S. Rogers responded: “The way I would describe it is, we clearly still are focused more on” an “event-by-event” approach to cyber incidents.” He urged to “accelerate debate on how to balance security and privacy in the ever-changing digital realm.” Otherwise, Rogers warned, “an enemy could change and manipulate data — rather than enter a computer system and steal — that action would be a threat to national security.”