Displaying posts categorized under

HOMELAND SECURITY

The Industrial Internet Of Things – Potential Cyber Threats Consequences By Ludmila Morozova-Buss

Mr. Chuck Brooks – one of the world’s most known experts and the cyber security guru, shares his thoughts about Industry 4.0 and cyber threats in an interview with Ludmila Morozova-Buss.

As the capabilities and connectivity of cyber devices have grown exponentially, so have the cyber intrusions and threats from malware and hackers requiring restructuring of priorities and missions.

According to Chuck Brooks, a successful 4.0 cyber threat consequences strategy requires stepping up assessing situational awareness, information sharing, and especially resilience. Cyber resilience is an area that must be further developed both in processes and technologies because no matter what, breaches will happen.

Currently, Ransomware mostly via Phishing activities is the top threat. In the recent past, 2014 code vulnerabilities such as Heartbleed, Shellshock, Wirelurke, POODLE and other open source repositories caused chaos and harm. There is a growing understanding the seriousness and sophistication of the threats, especially denial of service and the adversarial actors that include states, organized crimes, and loosely affiliated hackers.

In the US, most (approximately 85%) of the cybersecurity critical infrastructure including defense, oil, and gas, electric power grids, healthcare, utilities, communications, transportation, banking, and finance is owned by the private sector and regulated by the public sector. DHS has recognized the importance of private sector input into cyber security requirements across these verticals and along with NIST in developing a strategy to ameliorate shortcomings.

The Strategic Grid, in the US and Europe, is in great need for enhanced security. An accelerated effort to fund and design new technologies to protect the utilities from natural or man-made electromagnetic surges; further, harden hardware and software in SCADA networks from cyber-attack, and provide enhanced physical security for the grid.

Mobile management that involves securing millions of BYOD devices is currently a challenge for information security both in government and in the private sector. Cloud computing has also taken center stage and securing cloud applications. There is always a need for better encryption, biometrics, smarter analytics and automated network security in all categories.

Supercomputing, machine learning, and quantum computing technologies are an exciting area of current exploration that may remedy many of the threats.

Chuck’s Brooks list of future cyber security 4.0 priorities includes:

Internet of Things (society on new verge of exponential interconnectivity)
Wearables
Drones and Robots
Artificial intelligence
Smart Cities
Connected transportation

The full interview by Ludmila Morozova-Buss can be read here.

Editor’s Note: This Article originally appeared on IIOT World, and is featured here with Author permission.

Syrian in South Carolina Busted in 2nd Islamic Terror Plot Daniel Greenfield

If at first you don’t succeed, the authorities will let you try, try again.

A South Carolina teenager plead guilty to gun charges after officials say he plotted to attack a US military base in hopes of joining ISIS.

“It wasn’t like some fantasy he was acting out and then was nothing to bear out,” says 16th Circuit Solicitor Kevin Brackett. “This was a legitimate and sincere desire and effort on his part to accomplish these things.”

The 16-year-old boy, whose name is not being released, lived in York County but his family is originally from Syria.

Authorities said the investigation shows he was involved in “some radical Islamic activities” and associated with people in “radical Islamic groups.” They say the teen had expressed some of these thoughts publicly for a while, but no one came forward.

Of course they didn’t. It’s the Great Green Wall of Silence of Islam.

He was sentenced to be held by the Department of Juvenile Justice and was to attend counseling.

Brackett says the teen, in court, said he had changed his ways and no long believed the ideas he held before, but Brackett is skeptical. He says the teen appeared to hold the ideas fairly closely when he was first interviewed about them.

You can guess the sequel to the story two years later.

Brackett said Abdin told the court he was troubled, that his father had died, and swore this was an isolated incident, adding he had just been confused. He promised they wouldn’t hear from him again, Brackett said.

The judge sentenced Abdin to the maximum punishment, an indeterminate sentence that would keep him behind bars until his 21st birthday, Brackett said.

Abdin served time at the juvenile justice facility in Columbia but was paroled a few months ago, Brackett said. He said he and York Police Chief Andy Robinson had strong objections to Abdin’s parole.

“Given nature of allegations and the incident here, and evidence I saw in 2015, I’m not terribly surprised. I always thought these beliefs were much more deeply rooted,” Brackett said. “I’m grateful that the federal authorities were keeping close tabs on him and able to intervene before anyone got hurt.”

The Muslim Brotherhood: Peddling Sharia as Social Justice by Judith Bergman

Human Rights Watch, an organization that is supposed to look out for victims of human rights abuses, not abusers of human rights is begging US decision makers not to designate the Muslim Brotherhood — which, if it had its way, would take away everyone’s human rights and substitute them with sharia law — a foreign terrorist organization.

“Allah is our objective; the Prophet is our leader; the Quran is our law; Jihad is our way; dying in the way of Allah is our highest hope”. — Muslim Brotherhood motto.

Conveniently, Hamas — which according to article two of its charter, is “one of the wings of Moslem Brotherhood in Palestine” — is, it seems, working on a new charter. The new charter would declare that Hamas is not a part of the Muslim Brotherhood, despite its always having been so. That way, is the Muslim Brotherhood’s “narrative” of newfound “nonviolence” suddenly supposed to become believable?

Gehad el-Haddad, official spokesman for the Muslim Brotherhood (MB), is on a mission to rewrite the terrorist and radical history of the MB. He seems to be doing this for the consumption of naïve Americans. These seem only too willing to believe — in the name of tolerance, diversity and trying to be non-judgmental — that an organization whose ultimate goal is the supreme reign of Islamic sharia law everywhere — if necessary through violent jihad — could possibly value anything even approximating equality and the rule of (non-sharia) law.

“We are not terrorists,” wrote a political activist for the MB, Gehad el-Haddad, in a recent article in the New York Times.

“The Muslim Brotherhood’s philosophy is inspired by an understanding of Islam that emphasizes the values of social justice, equality and the rule of law… We believe that our faith is inherently pluralistic and comprehensive and that no one has a divine mandate or the right to impose a single vision on society… Nothing speaks more to our unequivocal commitment to nonviolence than our continued insistence on peaceful resistance, despite unprecedented state violence”.

The “faith”, which el-Haddad avoids naming, is Islam. The very essence of Islam, as sanctioned in the Quran and the hadiths, however, seems to be the belief in a divine mandate to impose the single vision of Islam on the world — if necessary, through violent jihad. Its motto is:

“Allah is our objective; the Prophet is our leader; the Quran is our law; Jihad is our way; dying in the way of Allah is our highest hope”.

Even dawa, the Islamic call to conversion, or proselytizing — as explained by the Muslim Brotherhood’s spiritual leader, Yusuf al-Qaradawi, host of one of Al Jazeera’s most popular programs, Sharia and Life, which reaches an estimated 60 million viewers worldwide — is an Islamic summons for the non-violent conquest of non-Muslim lands. As Qaradawi told a Muslim Arab Youth Association convention in Toledo, Ohio, in 1995, “We will conquer Europe, we will conquer America! Not through sword but through Da’wa.”

Qaradawi, in a recording from 2007, says that the aim of this “peaceful” conquest consists mainly of the introduction of Islamic law, sharia. According to Qaradawi, sharia should be introduced in a new country gradually, over a five-year period, before implementing it in full. Sharia includes the end of free speech under “blasphemy laws”; the oppression of women, including women being worth half as much as a man in court and inheritance; polygamy, and the persecution of Jews (Qaradawi advocates killing all of them). Qaradawi has explained in TV recordings how sharia also includes chopping off hands for theft, killing apostates and homosexuals, as well as beating women as a means of “disciplining” them.

The New York Times, ostensibly concerned with “fake news”, evidently has no qualms about lending its pages to such straightforward propaganda as El-Haddad’s piece on behalf of the Muslim Brotherhood.

According to a recent report by the Middle East Media Research Institute (MEMRI), the MB recently launched a lobbying offensive in the United States to charm decision-makers in the Trump administration and Congress to give up on the Muslim Brotherhood Terrorist Designation Act of 2017, re-introduced on January 9, 2017, by Senator Ted Cruz.

According to the MEMRI report, the Muslim Brotherhood’s lobbying efforts include:

“Launching a widespread informational media campaign, including the hiring of U.S. lobbying and legal firms, outreach to the press in the U.S., and dissemination of informational content aimed at improving its image in the West, particularly in the U.S.”

Muslim IT Hackers in Congress Had Access to Everything Daniel Greenfield

It really speaks to the level of corruption and disorganization that this situation was able to go on for so long. Or that a clearly corrupt bunch that seemed willing to do anything had such access.

I’m not sure if that last sentence should be taken to refer to Congressional Democrats or the Pakistani Muslim IT brothers in their employ who are at the center of an access scandal. And a bunch of other scandals.

Awan ran technology for multiple House Democrats, and soon four of his relatives — including brothers Abid and Jamal — appeared on the payroll of dozens of other members, collecting $4 million in taxpayer funds since 2010.

“They had access to EVERYTHING. Correspondence, emails, confidential files — if it was stored on the Member system, they had access to it,” the former House Information Resources (HIR) technology worker with first-hand knowledge of Imran’s privileges told The Daily Caller News Foundation.

“There were some things – like access to the House email system that were totally controlled by the technicians at HIR. In order for certain permissions to be granted, a form was required to ensure that there was a paper trail for the requested changes. Imran was constantly complaining that he had to go through this process and trying to get people to process his access requests without the proper forms. Some of the permissions he wanted would give him total access to the Members’ stuff.”

“IT staff at HIR can be tracked for every keystroke they make,” the worker said. But by comparison, “when these guys were granted access to the Member’s computer systems there is no oversight or tracking of what they may be doing on the Member’s system. For example they could make a copy of anything on the Member’s computer system to a thumb drive or have it sent to a private server they had set up and no one would know.”

So we have some rather dubious people with access to everything on the system of Dems working on high level committees. And it’s a safe bet that they were no more secure about it than Hillary. On top of that you have Capitol Police, a sinecure position, investigating this, instead of the FBI or the Secret Service.

The central IT staffer said any suggestion that the brothers’ access didn’t span the full gamut of congressional intrigue was silly because they were the ones giving out permissions.

“When a new Member begins, they guide them on everything from which computer system to purchase to which constituent management system to go with and all other related hardware purchases. Then they install everything and set up all the accounts AND grant all the required permissions and restrictions,” the staffer said.

“In effect, they are given administrative control of the Members’ computer operations. They then set up a remote access so they can connect from wherever they are and have full access to everything on the Member’s system.”

You had Pakistanis with a backdoor to the systems of key figures who oversaw national security agencies. This is really bad. And yet keeping the investigation out of sight will bury it.

The US Government Again Fails to Protect Sensitive Personal Information By Stephen Bryen

Once again the U.S. government has failed to protect sensitive personal information, this time highly sensitive information on 4,000 Air Force officers. This information, contained in extensive 127-page individual security questionnaires known as SF-86 were found on a backup hard drive that was neither password protected or encrypted. In addition, extensive information on high-profile visitors to sites in Afghanistan was also on the same drive along with gigabytes of Outlook emails whose content has yet to be assessed.

This follows a number of other similar cases, the most notorious was the highly successful penetration of SF-86 files and other data held by the Office of Personnel Management (OPM) in June, 2015. In that case, 21.5 million American’s personal data was compromised, again involving the SF-86 security questionnaire. On top of that, 5.6 million fingerprints were also stolen. In applying for a security clearance, the government collects fingerprint data and photos.

Full disclosure: my personal data was also compromised in the OPM hack and I received an OPM letter and some worthless “free for a year” coverage of my personal data going forward.

Does the government have any responsibility to protect sensitive information?

Apparently, anyone who believes that the government has this responsibility is sadly misguided. Not only does the government not protect personal information, it hands it around to other agencies routinely and gives it to private contractors for “processing.”

Like your passport! You go to a passport office, fill out all the information, provide a birth certificate and all the requisite contact information, and you give the passport office photos, one of which will wind up embossed into your passport. Then the Passport Office sends all that (how, by mail?) to a private contractor to “process.” Who has access to it is anyone’s guess. The information is not classified and therefore is not formally protected in any manner.

The same holds true for your tax return, which you send in to the IRS. nowadays electronically. Maybe it is semi-encrypted when you electronically transmit the form, or your accountant does it for you, but when it arrives at the IRS it is stored as an ordinary file with no protection.

The SF-86 form is an especially pernicious example because it contains a vast amount of information, everything from every place you may have worked, who your friends and colleagues are, to your business involvements and who your family members and relatives may be. All of this provides hugely valuable information to potential adversaries who may be nation-states, but who also could be terrorist organizations.

Any Secrets Left to Steal? By Rachel Ehrenfeld

Everyone is shocked, shocked by WikiLeaks’ latest exposé that the Central Intelligence Agency (CIA) has been exploiting software vulnerabilities in our digital and electronic devices. All those “shocked” should have known better by now.

After the publications of files stolen by former National Security Agency’s contractor, Edward Snowden, on U.S. military capabilities, operations, tactics, techniques and procedures, and surveillance details, President Obama announced, “Nobody is listening to your telephone calls.”

In the spring of 2016 — months before Hillary Clinton’s and John Podesta’s emails were published by WikiLeaks — the Pew Research Center survey showed that many Americans “do not trust modern institutions to protect their personal data — even as they frequently neglect cybersecurity best practices in their own personal lives.”

For well over a decade, cyber experts have been testifying in open and closed Congressional hearings on the escalation of hacking into United States government agencies and private industries, communication, websites, and email. All without exception issued warnings on the short-term damages and the long-term threat posed by such hacking to U.S. national security and interests, and the American people by Chinese, Iranian, Russian, and other cybersavvy intelligence agencies, criminal and terrorist organizations. All the while very few, if any, warned of the proliferation of ground-based jammers and their growing interference with GPS timing and locations services, or data corruption and insertion.

In 2010, then Former Under Secretary of Defense for Policy Jim Miller lamented, “The scale of compromise, including the loss of sensitive and unclassified data, is staggering. We’re talking about terabytes of data, equivalent to multiple libraries of Congress.” (The Library of Congress is the world’s largest library, archiving millions of books, photographs, maps, and recordings.)

Successive governments and the private sector have failed to secure our communications, exposing our personal and national secrets, costing untold economic damage to individuals, companies, and our national security.

While the Obama administration oversaw the accelerated pace of moving to wireless communications — leaving very few alternatives, if any, for a time when those will be unavailable due to attack or natural disaster — it has adopted a slow knee-jerk cybersecurity policy. In 2014, the Obama administration was tasked by Congress to develop cyber countermeasure policies. But in response to Sen. John McCain’s (R-AZ) question “Is it correct that these are policy-decisions that have not been made?” U.S. Cyber Command Commander Admiral Michael S. Rogers responded: “The way I would describe it is, we clearly still are focused more on” an “event-by-event” approach to cyber incidents.” He urged to “accelerate debate on how to balance security and privacy in the ever-changing digital realm.” Otherwise, Rogers warned, “an enemy could change and manipulate data — rather than enter a computer system and steal — that action would be a threat to national security.”

The Arabs Know that the Moslem Brotherhood are Terrorists By James Lewis

Conservatives see the threat of aggressive Islam, which puts us far ahead of liberals, who merely live in stupefied denial. But conservatives tend to treat Islam as monolithic, which it is not.

Right now the Trump administration is considering whether to designate the Muslim Brotherhood as a terrorist organization, which sounds to Arab ears like “Is the Pope Catholic?” Do the Saudis play double games?” “Are the mullahs of Iran really genocidal?”

The answer is Yes! Yes! and Yes!

Which is why even Saudi Arabia, Russia, Syria, Bahrain, and the UAE have officially designated the Muslim Brotherhood as a terror group. One of biggest on the Sunni side of the street.

A new article in Cairo’s Al Ahram this week gives an explanation even the New York Times could understand (if it wanted to). The MBs promote violent Jihad, and carry it on themselves in their civil war against Egypt. They sponsor Hamas terror against Israel. They follow radical doctrines. Most of all (and here comes a new word), the MB’s are taqfiri. (TAHK-fear-ey). They regularly declare other Muslim groups to be infidels, which means they will kill other Muslims unless they submit to the MB version of Islam. From its most basic belief, the Ikhwan is at war with all Muslims who do not follow its militant war doctrine. The doctrine of taqfir is basic, and deviation puts you outside of the circle.

And yes, there are peaceful Muslim sects, like the Ahmadiyya. But they are small minorities in constant trouble from the violence-supporting majority.

There are also rational Muslims like Egypt’s President Abdel Fattah al-Sisi, who has said in a famous speech:

It’s inconceivable that the thinking that we hold most sacred should cause the entire umma [Islamic world] to be a source of anxiety, danger, killing and destruction for the rest of the world. Impossible! …

Is it possible that 1.6 billion people [Muslims] should want to kill the rest of the world’s inhabitants — that is 7 billion — so that they themselves may live? Impossible!

Those may be the most important words any Muslim leader has said since 9/11/01.

Yet Obama chose to ignore Sisi and supported the Muslim Brotherhood instead. What does that tell you?

Hillary’s closest confidante, Huma Abedin, comes from an MB family, was indoctrinated from childhood onward, and is paid by a family “charity” who are all MBs. Hillary and Bill know all that, of course, but the Moobs bring in huge amounts of money to the Democrats, and that’s what counts for the Clintons. (It should also matter to the rest of us.)

Justice Department Enlists ‘Reformed’ ISIS Fighter in Risky Deradicalization Scheme By Patrick Poole

The Justice Department has enlisted a former Islamic State fighter in what they say is an effort to combat radicalization.

But the program, centered around Brooklyn native Mohimanul Alam Bhuiya, is fraught with considerable risks as so-called “deradicalization” efforts around the globe have failed spectacularly, and recent high-profile cases of former terrorists-turned-therapists experiments have not ended well.

The Wall Street Journal reports:

Mo, a U.S. citizen whose full name is under seal, left New York City in the summer of 2014 to join Islamic State in Syria.

Mo, now 28 years old, quickly became disillusioned, he says now. Four months in, he sent an email to the Federal Bureau of Investigation. “Please help me get home,” he wrote, according to court documents. “I’m fed up with this evil.”

[…]

Authorities in November 2014 deported Mo back to Brooklyn, where he pleaded guilty to two terrorism charges. He told the FBI that he acted as a building guard for Islamic State and taught other recruits how to use computer software.

Since then, Mo’s work with the U.S. government has included an unusual form of cooperation: conducting an intervention with a 15-year-old boy from Brooklyn who was posting tweets that appeared to support violence and Islamic State, also known as ISIS. The intervention so far has successfully dissuaded the teenager from joining the terrorist group.

It turns out that the Justice Department program is intended to reduce the sentences of U.S. terror supporters:

Under the new initiative, Brooklyn federal prosecutors will also use more discretion before charging someone with providing “material support” to terrorists, a broad violation that carries a maximum of 20 years in prison. Prosecutors may try to arrest some individuals on a lesser charge without the terrorism stigma, such as wire fraud.

For suspects already in custody, prosecutors will give more consideration to a shorter prison sentence in exchange for a longer period of supervised release that includes counseling or treatment.

There’s certainly no reason to question the motives of federal prosecutors backing this program, but there is evidence that calls into question their judgment.

Muslim Activist Detained After Refusing Staten Island Ferry Bag Check, Predictability Ensues By Patrick Poole

Self-styled “community organizer” and “civil rights activist” Hesham El-Meligy was detained earlier today by the NYPD after refusing a bag search while attempting to board the Staten Island Ferry.

Predictably, El-Meligy is claiming racial profiling and “Islamophobia,” and insisting his rights were denied. But fellow Staten Islanders are pushing back on his claims.

A religious and political activist on Staten Island claims he was placed in handcuffs, frisked and issued two summonses by NYPD officers based on the way he looks.

Hesham El-Meligy, a Muslim who was born in Egypt, was temporarily detained and searched by police at about 8 a.m. Wednesday at the Staten Island Ferry terminal in St. George, after he refused a random bag check.

After a search of his backpack, he was issued summonses for trespassing and disorderly conduct and allowed on to the ferry, police said Thursday.

El-Meligy, founder of the Islamic Civic Association on Staten Island and chairman of the Staten Island Libertarian Party, said he believes the bag check wasn’t so random.

He took to Facebook hours after the incident, saying he felt singled out because his Egyptian heritage.

“I have no doubt that many (people) are in fact stopped randomly, but the manner this was done in my particular case made it feel different,” said El-Meligy.

But at least one eyewitness to El-Meligy’s detention disputes his account:

Could You Prevent Big Brother Watching? By Rachel Ehrenfeld and Stephen Bryen

In Nineteen Eighty-Four, George Orwell described the protagonist, Winston Smith’s efforts to find a way to prevent Big Brother from watching his expressions:

“The telescreen received and transmitted simultaneously. Any sound that Winston made, above the level of a very low whisper, would be picked up by it, moreover, so long as he remained within the field of vision which the metal plaque commanded, he could be seen as well as heard. There was of course no way of knowing whether you were being watched at any given moment. How often, or on what system, the Thought Police plugged in on any individual wire was guesswork. It was even conceivable that they watched everybody all the time. But at any rate they could plug in your wire whenever they wanted to. You had to live — did live, from habit that became instinct — in the assumption that every sound you made was overheard, and, except in darkness, every movement scrutinized.”

Winston kept his back turned to the telescreen. It was safer, though, as he well knew, even a back can be revealing.”

In 1949, when Orwell’s Nineteen Eighty-Four was first published, one could have evaded Big Brother’s watchful camera under the cover of darkness. Today, however, “Night Vision” technologies can penetrate darkness.

Today, according to Wikileaks latest stolen documents release, the United States Intelligence Agency (CIA) together with the British domestic Intelligence agency- MI5, joined in developing televisions (especially Samsung’s Smart TV), smartphones, cars, and other computerized devices into spying machines.

So, what do you do to stop any Big Brother from invading your privacy, spying on all your activities everywhere? Watching you and listing to your conversations? Even to your snoring?

Stephen Bryen offers the following:

What do you do if all your devices are open to hacking? –Android and iPhone phones and watches, Bluetooth, WiFi, “Smart” TVs, laptops, tablets, GPS, car stereo, computers, Alexa and Google Home, home alarm systems –in other words, everything?