Displaying posts categorized under

HOMELAND SECURITY

Two Illinois Men Charged with Conspiring to Provide Material Support to ISIS By Debra Heine

Two Illinois men were arrested Wednesday on a federal complaint charging them with conspiring and attempting to provide material support to an associate joining ISIS on the battlefield in Syria. According to the complaint, the men had pledged allegiance to the Islamic State, advocated for terrorism on social media, and even shared photos of themselves in terrorist get-ups holding the Islamic State flag at the Illinois Beach State Park in suburban Zion.

Joseph D. Jones and Edward Schimenti, both 35 and from Zion, were charged with “conspiring and attempting to provide material support and resources to the Islamic State of Iraq and al-Sham (ISIS).” Jones is also known as “Yusuf Abdulhaqq” and Schimenti goes by the name of “Abdul Wali.”

According to the charges, the investigation began in September 2015, “when an undercover agent posing as a motorist arrested in a traffic-related incident approached Jones at the Zion Police Department, where Jones was being interviewed about the recent slaying of a friend.”

That agent introduced Jones and Schimenti to other undercover agents posing as ISIS supporters, including an informant whom they believed was planning to travel to the Middle East to join the Islamic State. Jones and Schimenti worked out with the purported jihadist at a Zion gym to help get him into combat shape. They also bought cell phones at a local store, thinking that they would be used as bomb detonators, according to the complaint. CONTINUE AT SITE

CIA Director Pompeo Rips ‘Hostile Intelligence Service’ WikiLeaks By Bridget Johnson

WASHINGTON — In his first public remarks since taking the helm of the Central Intelligence Agency, Director Mike Pompeo assured the American public that the CIA is not spying on them and tore into WikiLeaks as a morally bankrupt “non-state hostile intelligence service” that sides with global tyrants.

Speaking today at the Center for Strategic and International Studies, Pompeo also implied that WikiLeaks founder Julian Assange would have sided with the Nazis during World War II.

Pompeo said he’s “surrounded by talented and committed patriots” in his new job at the agency, who “quietly go about their work and try not to get too worked up over the headlines, including the fanciful notion that they spy on their fellow citizens via microwave ovens” — a jab at White House senior counselor Kellyanne Conway’s interpretation of WikiLeaks’ March data dump about CIA methods.

“But they are not at liberty to stand up to these false narratives and explain our mission to the American people,” he said of his workforce, adding “it is time to call these voices out — the men and women of CIA deserve a real defense.”

“…We are a foreign intelligence agency. We focus on collecting information about foreign governments, foreign terrorist organizations, and the like — not Americans. A number of specific rules keep us centered on that mission and protect the privacy of our fellow Americans. To take just one important example, CIA is legally prohibited from spying on people through electronic surveillance in the United States. We’re not tapping anyone’s phone in Wichita.”

Pompeo, a former Kansas congressman, added that “regardless of what you see on the silver screen, we do not pursue covert action on a whim without approval or accountability… there is oversight and accountability every step of the way.”

President Trump praised WikiLeaks repeatedly on the campaign trail as stolen emails from the Democratic National Committee and Clinton campaign chairman John Podesta were published. Pompeo noted today that “we at CIA find the celebration of entities like WikiLeaks to be both perplexing and deeply troubling.”

“Because while we do our best to quietly collect information on those who pose very real threats to our country, individuals such as Julian Assange and Edward Snowden seek to use that information to make a name for themselves. As long as they make a splash, they care nothing about the lives they put at risk or the damage they cause to national security,” he said. CONTINUE AT SITE

The Industrial Internet Of Things – Potential Cyber Threats Consequences By Ludmila Morozova-Buss

Mr. Chuck Brooks – one of the world’s most known experts and the cyber security guru, shares his thoughts about Industry 4.0 and cyber threats in an interview with Ludmila Morozova-Buss.

As the capabilities and connectivity of cyber devices have grown exponentially, so have the cyber intrusions and threats from malware and hackers requiring restructuring of priorities and missions.

According to Chuck Brooks, a successful 4.0 cyber threat consequences strategy requires stepping up assessing situational awareness, information sharing, and especially resilience. Cyber resilience is an area that must be further developed both in processes and technologies because no matter what, breaches will happen.

Currently, Ransomware mostly via Phishing activities is the top threat. In the recent past, 2014 code vulnerabilities such as Heartbleed, Shellshock, Wirelurke, POODLE and other open source repositories caused chaos and harm. There is a growing understanding the seriousness and sophistication of the threats, especially denial of service and the adversarial actors that include states, organized crimes, and loosely affiliated hackers.

In the US, most (approximately 85%) of the cybersecurity critical infrastructure including defense, oil, and gas, electric power grids, healthcare, utilities, communications, transportation, banking, and finance is owned by the private sector and regulated by the public sector. DHS has recognized the importance of private sector input into cyber security requirements across these verticals and along with NIST in developing a strategy to ameliorate shortcomings.

The Strategic Grid, in the US and Europe, is in great need for enhanced security. An accelerated effort to fund and design new technologies to protect the utilities from natural or man-made electromagnetic surges; further, harden hardware and software in SCADA networks from cyber-attack, and provide enhanced physical security for the grid.

Mobile management that involves securing millions of BYOD devices is currently a challenge for information security both in government and in the private sector. Cloud computing has also taken center stage and securing cloud applications. There is always a need for better encryption, biometrics, smarter analytics and automated network security in all categories.

Supercomputing, machine learning, and quantum computing technologies are an exciting area of current exploration that may remedy many of the threats.

Chuck’s Brooks list of future cyber security 4.0 priorities includes:

Internet of Things (society on new verge of exponential interconnectivity)
Wearables
Drones and Robots
Artificial intelligence
Smart Cities
Connected transportation

The full interview by Ludmila Morozova-Buss can be read here.

Editor’s Note: This Article originally appeared on IIOT World, and is featured here with Author permission.

Syrian in South Carolina Busted in 2nd Islamic Terror Plot Daniel Greenfield

If at first you don’t succeed, the authorities will let you try, try again.

A South Carolina teenager plead guilty to gun charges after officials say he plotted to attack a US military base in hopes of joining ISIS.

“It wasn’t like some fantasy he was acting out and then was nothing to bear out,” says 16th Circuit Solicitor Kevin Brackett. “This was a legitimate and sincere desire and effort on his part to accomplish these things.”

The 16-year-old boy, whose name is not being released, lived in York County but his family is originally from Syria.

Authorities said the investigation shows he was involved in “some radical Islamic activities” and associated with people in “radical Islamic groups.” They say the teen had expressed some of these thoughts publicly for a while, but no one came forward.

Of course they didn’t. It’s the Great Green Wall of Silence of Islam.

He was sentenced to be held by the Department of Juvenile Justice and was to attend counseling.

Brackett says the teen, in court, said he had changed his ways and no long believed the ideas he held before, but Brackett is skeptical. He says the teen appeared to hold the ideas fairly closely when he was first interviewed about them.

You can guess the sequel to the story two years later.

Brackett said Abdin told the court he was troubled, that his father had died, and swore this was an isolated incident, adding he had just been confused. He promised they wouldn’t hear from him again, Brackett said.

The judge sentenced Abdin to the maximum punishment, an indeterminate sentence that would keep him behind bars until his 21st birthday, Brackett said.

Abdin served time at the juvenile justice facility in Columbia but was paroled a few months ago, Brackett said. He said he and York Police Chief Andy Robinson had strong objections to Abdin’s parole.

“Given nature of allegations and the incident here, and evidence I saw in 2015, I’m not terribly surprised. I always thought these beliefs were much more deeply rooted,” Brackett said. “I’m grateful that the federal authorities were keeping close tabs on him and able to intervene before anyone got hurt.”

The Muslim Brotherhood: Peddling Sharia as Social Justice by Judith Bergman

Human Rights Watch, an organization that is supposed to look out for victims of human rights abuses, not abusers of human rights is begging US decision makers not to designate the Muslim Brotherhood — which, if it had its way, would take away everyone’s human rights and substitute them with sharia law — a foreign terrorist organization.

“Allah is our objective; the Prophet is our leader; the Quran is our law; Jihad is our way; dying in the way of Allah is our highest hope”. — Muslim Brotherhood motto.

Conveniently, Hamas — which according to article two of its charter, is “one of the wings of Moslem Brotherhood in Palestine” — is, it seems, working on a new charter. The new charter would declare that Hamas is not a part of the Muslim Brotherhood, despite its always having been so. That way, is the Muslim Brotherhood’s “narrative” of newfound “nonviolence” suddenly supposed to become believable?

Gehad el-Haddad, official spokesman for the Muslim Brotherhood (MB), is on a mission to rewrite the terrorist and radical history of the MB. He seems to be doing this for the consumption of naïve Americans. These seem only too willing to believe — in the name of tolerance, diversity and trying to be non-judgmental — that an organization whose ultimate goal is the supreme reign of Islamic sharia law everywhere — if necessary through violent jihad — could possibly value anything even approximating equality and the rule of (non-sharia) law.

“We are not terrorists,” wrote a political activist for the MB, Gehad el-Haddad, in a recent article in the New York Times.

“The Muslim Brotherhood’s philosophy is inspired by an understanding of Islam that emphasizes the values of social justice, equality and the rule of law… We believe that our faith is inherently pluralistic and comprehensive and that no one has a divine mandate or the right to impose a single vision on society… Nothing speaks more to our unequivocal commitment to nonviolence than our continued insistence on peaceful resistance, despite unprecedented state violence”.

The “faith”, which el-Haddad avoids naming, is Islam. The very essence of Islam, as sanctioned in the Quran and the hadiths, however, seems to be the belief in a divine mandate to impose the single vision of Islam on the world — if necessary, through violent jihad. Its motto is:

“Allah is our objective; the Prophet is our leader; the Quran is our law; Jihad is our way; dying in the way of Allah is our highest hope”.

Even dawa, the Islamic call to conversion, or proselytizing — as explained by the Muslim Brotherhood’s spiritual leader, Yusuf al-Qaradawi, host of one of Al Jazeera’s most popular programs, Sharia and Life, which reaches an estimated 60 million viewers worldwide — is an Islamic summons for the non-violent conquest of non-Muslim lands. As Qaradawi told a Muslim Arab Youth Association convention in Toledo, Ohio, in 1995, “We will conquer Europe, we will conquer America! Not through sword but through Da’wa.”

Qaradawi, in a recording from 2007, says that the aim of this “peaceful” conquest consists mainly of the introduction of Islamic law, sharia. According to Qaradawi, sharia should be introduced in a new country gradually, over a five-year period, before implementing it in full. Sharia includes the end of free speech under “blasphemy laws”; the oppression of women, including women being worth half as much as a man in court and inheritance; polygamy, and the persecution of Jews (Qaradawi advocates killing all of them). Qaradawi has explained in TV recordings how sharia also includes chopping off hands for theft, killing apostates and homosexuals, as well as beating women as a means of “disciplining” them.

The New York Times, ostensibly concerned with “fake news”, evidently has no qualms about lending its pages to such straightforward propaganda as El-Haddad’s piece on behalf of the Muslim Brotherhood.

According to a recent report by the Middle East Media Research Institute (MEMRI), the MB recently launched a lobbying offensive in the United States to charm decision-makers in the Trump administration and Congress to give up on the Muslim Brotherhood Terrorist Designation Act of 2017, re-introduced on January 9, 2017, by Senator Ted Cruz.

According to the MEMRI report, the Muslim Brotherhood’s lobbying efforts include:

“Launching a widespread informational media campaign, including the hiring of U.S. lobbying and legal firms, outreach to the press in the U.S., and dissemination of informational content aimed at improving its image in the West, particularly in the U.S.”

Muslim IT Hackers in Congress Had Access to Everything Daniel Greenfield

It really speaks to the level of corruption and disorganization that this situation was able to go on for so long. Or that a clearly corrupt bunch that seemed willing to do anything had such access.

I’m not sure if that last sentence should be taken to refer to Congressional Democrats or the Pakistani Muslim IT brothers in their employ who are at the center of an access scandal. And a bunch of other scandals.

Awan ran technology for multiple House Democrats, and soon four of his relatives — including brothers Abid and Jamal — appeared on the payroll of dozens of other members, collecting $4 million in taxpayer funds since 2010.

“They had access to EVERYTHING. Correspondence, emails, confidential files — if it was stored on the Member system, they had access to it,” the former House Information Resources (HIR) technology worker with first-hand knowledge of Imran’s privileges told The Daily Caller News Foundation.

“There were some things – like access to the House email system that were totally controlled by the technicians at HIR. In order for certain permissions to be granted, a form was required to ensure that there was a paper trail for the requested changes. Imran was constantly complaining that he had to go through this process and trying to get people to process his access requests without the proper forms. Some of the permissions he wanted would give him total access to the Members’ stuff.”

“IT staff at HIR can be tracked for every keystroke they make,” the worker said. But by comparison, “when these guys were granted access to the Member’s computer systems there is no oversight or tracking of what they may be doing on the Member’s system. For example they could make a copy of anything on the Member’s computer system to a thumb drive or have it sent to a private server they had set up and no one would know.”

So we have some rather dubious people with access to everything on the system of Dems working on high level committees. And it’s a safe bet that they were no more secure about it than Hillary. On top of that you have Capitol Police, a sinecure position, investigating this, instead of the FBI or the Secret Service.

The central IT staffer said any suggestion that the brothers’ access didn’t span the full gamut of congressional intrigue was silly because they were the ones giving out permissions.

“When a new Member begins, they guide them on everything from which computer system to purchase to which constituent management system to go with and all other related hardware purchases. Then they install everything and set up all the accounts AND grant all the required permissions and restrictions,” the staffer said.

“In effect, they are given administrative control of the Members’ computer operations. They then set up a remote access so they can connect from wherever they are and have full access to everything on the Member’s system.”

You had Pakistanis with a backdoor to the systems of key figures who oversaw national security agencies. This is really bad. And yet keeping the investigation out of sight will bury it.

The US Government Again Fails to Protect Sensitive Personal Information By Stephen Bryen

Once again the U.S. government has failed to protect sensitive personal information, this time highly sensitive information on 4,000 Air Force officers. This information, contained in extensive 127-page individual security questionnaires known as SF-86 were found on a backup hard drive that was neither password protected or encrypted. In addition, extensive information on high-profile visitors to sites in Afghanistan was also on the same drive along with gigabytes of Outlook emails whose content has yet to be assessed.

This follows a number of other similar cases, the most notorious was the highly successful penetration of SF-86 files and other data held by the Office of Personnel Management (OPM) in June, 2015. In that case, 21.5 million American’s personal data was compromised, again involving the SF-86 security questionnaire. On top of that, 5.6 million fingerprints were also stolen. In applying for a security clearance, the government collects fingerprint data and photos.

Full disclosure: my personal data was also compromised in the OPM hack and I received an OPM letter and some worthless “free for a year” coverage of my personal data going forward.

Does the government have any responsibility to protect sensitive information?

Apparently, anyone who believes that the government has this responsibility is sadly misguided. Not only does the government not protect personal information, it hands it around to other agencies routinely and gives it to private contractors for “processing.”

Like your passport! You go to a passport office, fill out all the information, provide a birth certificate and all the requisite contact information, and you give the passport office photos, one of which will wind up embossed into your passport. Then the Passport Office sends all that (how, by mail?) to a private contractor to “process.” Who has access to it is anyone’s guess. The information is not classified and therefore is not formally protected in any manner.

The same holds true for your tax return, which you send in to the IRS. nowadays electronically. Maybe it is semi-encrypted when you electronically transmit the form, or your accountant does it for you, but when it arrives at the IRS it is stored as an ordinary file with no protection.

The SF-86 form is an especially pernicious example because it contains a vast amount of information, everything from every place you may have worked, who your friends and colleagues are, to your business involvements and who your family members and relatives may be. All of this provides hugely valuable information to potential adversaries who may be nation-states, but who also could be terrorist organizations.

Any Secrets Left to Steal? By Rachel Ehrenfeld

Everyone is shocked, shocked by WikiLeaks’ latest exposé that the Central Intelligence Agency (CIA) has been exploiting software vulnerabilities in our digital and electronic devices. All those “shocked” should have known better by now.

After the publications of files stolen by former National Security Agency’s contractor, Edward Snowden, on U.S. military capabilities, operations, tactics, techniques and procedures, and surveillance details, President Obama announced, “Nobody is listening to your telephone calls.”

In the spring of 2016 — months before Hillary Clinton’s and John Podesta’s emails were published by WikiLeaks — the Pew Research Center survey showed that many Americans “do not trust modern institutions to protect their personal data — even as they frequently neglect cybersecurity best practices in their own personal lives.”

For well over a decade, cyber experts have been testifying in open and closed Congressional hearings on the escalation of hacking into United States government agencies and private industries, communication, websites, and email. All without exception issued warnings on the short-term damages and the long-term threat posed by such hacking to U.S. national security and interests, and the American people by Chinese, Iranian, Russian, and other cybersavvy intelligence agencies, criminal and terrorist organizations. All the while very few, if any, warned of the proliferation of ground-based jammers and their growing interference with GPS timing and locations services, or data corruption and insertion.

In 2010, then Former Under Secretary of Defense for Policy Jim Miller lamented, “The scale of compromise, including the loss of sensitive and unclassified data, is staggering. We’re talking about terabytes of data, equivalent to multiple libraries of Congress.” (The Library of Congress is the world’s largest library, archiving millions of books, photographs, maps, and recordings.)

Successive governments and the private sector have failed to secure our communications, exposing our personal and national secrets, costing untold economic damage to individuals, companies, and our national security.

While the Obama administration oversaw the accelerated pace of moving to wireless communications — leaving very few alternatives, if any, for a time when those will be unavailable due to attack or natural disaster — it has adopted a slow knee-jerk cybersecurity policy. In 2014, the Obama administration was tasked by Congress to develop cyber countermeasure policies. But in response to Sen. John McCain’s (R-AZ) question “Is it correct that these are policy-decisions that have not been made?” U.S. Cyber Command Commander Admiral Michael S. Rogers responded: “The way I would describe it is, we clearly still are focused more on” an “event-by-event” approach to cyber incidents.” He urged to “accelerate debate on how to balance security and privacy in the ever-changing digital realm.” Otherwise, Rogers warned, “an enemy could change and manipulate data — rather than enter a computer system and steal — that action would be a threat to national security.”

The Arabs Know that the Moslem Brotherhood are Terrorists By James Lewis

Conservatives see the threat of aggressive Islam, which puts us far ahead of liberals, who merely live in stupefied denial. But conservatives tend to treat Islam as monolithic, which it is not.

Right now the Trump administration is considering whether to designate the Muslim Brotherhood as a terrorist organization, which sounds to Arab ears like “Is the Pope Catholic?” Do the Saudis play double games?” “Are the mullahs of Iran really genocidal?”

The answer is Yes! Yes! and Yes!

Which is why even Saudi Arabia, Russia, Syria, Bahrain, and the UAE have officially designated the Muslim Brotherhood as a terror group. One of biggest on the Sunni side of the street.

A new article in Cairo’s Al Ahram this week gives an explanation even the New York Times could understand (if it wanted to). The MBs promote violent Jihad, and carry it on themselves in their civil war against Egypt. They sponsor Hamas terror against Israel. They follow radical doctrines. Most of all (and here comes a new word), the MB’s are taqfiri. (TAHK-fear-ey). They regularly declare other Muslim groups to be infidels, which means they will kill other Muslims unless they submit to the MB version of Islam. From its most basic belief, the Ikhwan is at war with all Muslims who do not follow its militant war doctrine. The doctrine of taqfir is basic, and deviation puts you outside of the circle.

And yes, there are peaceful Muslim sects, like the Ahmadiyya. But they are small minorities in constant trouble from the violence-supporting majority.

There are also rational Muslims like Egypt’s President Abdel Fattah al-Sisi, who has said in a famous speech:

It’s inconceivable that the thinking that we hold most sacred should cause the entire umma [Islamic world] to be a source of anxiety, danger, killing and destruction for the rest of the world. Impossible! …

Is it possible that 1.6 billion people [Muslims] should want to kill the rest of the world’s inhabitants — that is 7 billion — so that they themselves may live? Impossible!

Those may be the most important words any Muslim leader has said since 9/11/01.

Yet Obama chose to ignore Sisi and supported the Muslim Brotherhood instead. What does that tell you?

Hillary’s closest confidante, Huma Abedin, comes from an MB family, was indoctrinated from childhood onward, and is paid by a family “charity” who are all MBs. Hillary and Bill know all that, of course, but the Moobs bring in huge amounts of money to the Democrats, and that’s what counts for the Clintons. (It should also matter to the rest of us.)

Justice Department Enlists ‘Reformed’ ISIS Fighter in Risky Deradicalization Scheme By Patrick Poole

The Justice Department has enlisted a former Islamic State fighter in what they say is an effort to combat radicalization.

But the program, centered around Brooklyn native Mohimanul Alam Bhuiya, is fraught with considerable risks as so-called “deradicalization” efforts around the globe have failed spectacularly, and recent high-profile cases of former terrorists-turned-therapists experiments have not ended well.

The Wall Street Journal reports:

Mo, a U.S. citizen whose full name is under seal, left New York City in the summer of 2014 to join Islamic State in Syria.

Mo, now 28 years old, quickly became disillusioned, he says now. Four months in, he sent an email to the Federal Bureau of Investigation. “Please help me get home,” he wrote, according to court documents. “I’m fed up with this evil.”

[…]

Authorities in November 2014 deported Mo back to Brooklyn, where he pleaded guilty to two terrorism charges. He told the FBI that he acted as a building guard for Islamic State and taught other recruits how to use computer software.

Since then, Mo’s work with the U.S. government has included an unusual form of cooperation: conducting an intervention with a 15-year-old boy from Brooklyn who was posting tweets that appeared to support violence and Islamic State, also known as ISIS. The intervention so far has successfully dissuaded the teenager from joining the terrorist group.

It turns out that the Justice Department program is intended to reduce the sentences of U.S. terror supporters:

Under the new initiative, Brooklyn federal prosecutors will also use more discretion before charging someone with providing “material support” to terrorists, a broad violation that carries a maximum of 20 years in prison. Prosecutors may try to arrest some individuals on a lesser charge without the terrorism stigma, such as wire fraud.

For suspects already in custody, prosecutors will give more consideration to a shorter prison sentence in exchange for a longer period of supervised release that includes counseling or treatment.

There’s certainly no reason to question the motives of federal prosecutors backing this program, but there is evidence that calls into question their judgment.