1.0 Million Green Cards to be Issues by DHS

1M Immigrants From Muslim Countries Admitted During Obama’s Presidency

The Obama Administration is on track to issue 1 million green cards to immigrants from countries where Muslims are in the majority, according to an analysis of Department of Homeland Security data released Friday.

According to the DHS Yearbook of Immigration Statistics, green cards were issued to 832,014 people from Muslim-majority countries in the first six fiscal years of the Obama administration, from fiscal years 2009-2014, the Senate Subcommittee on Immigration and the National Interest report shows.

In addition, the numbers of green cards increased dramatically in the last two fiscal years of the report, for 2013 and 2014. The records show that 117,423 green cards were issued in fiscal year 2013, compared to 148,810 in fiscal year 2014, for an increase of nearly 27 percent.

The reports show that in the first six fiscal years President Barack has held office, the United States issued green cards to an average of 138,669 migrants from Muslim-majority countries every year, and if the trends continue, the United States will have issued green cards to at least 1.1 million migrants from such countries by the time Obama leaves office in January.  Read more here from NewsMax.

 

The vetting for migrants and refugees is performed by the UN High Commission for Refugees. The UNHCR operates in panic mode, simply rubber-stamping approval due to volume. So, let’s make a movie.

Stars ask you to stand #WithRefugees

More than 60 stars of film, TV and music have joined refugees, faith leaders and UNHCR to back a petition highlighting the plight of forcibly displaced people.

 

GENEVA, June 16 (UNHCR) – More than 60 stars from the worlds of film, TV and music joined refugees, faith leaders and UN Refugee Agency staff today to urge you to stand #WithRefugees and sign a petition on behalf of the world’s forcibly displaced.

The petition aims to gather public support for the growing number of families forced to flee conflict and persecution worldwide, who currently face heightened anti-refugee rhetoric coupled with greater restrictions to asylum.

It calls on governments to ensure every refugee child gets an education; that every refugee family has somewhere safe to live, and can work or learn skills to make a positive contribution to their community.

Despite the fact that the FBI and CIA director have said that Syrian refugees cannot be screened properly, Barack Obama has put the program to resettle Syrian refugees in the country on the fast track.

The AP reported that so far only about 1,000 Syrian families have been brought to the US but that was because the process took 18 to 24 months.  The US now has a speeded up “surge operation” in place.

“The 10,000 (figure) is a floor and not a ceiling, and it is possible to increase the number,” Kassem told reporters. High-risk groups are given priority to include unaccompanied minor, victims of torture and gender-based violence. The UNHCR insists that the US resettle 65,000 Syrian refugees. 

In part from FNC: The danger posed by people coming from terrorism-infested regions has been a hotly contested issue, as is the potentially outsized impact on the small American communities often called upon to receive them. What does not appear in doubt is the hefty price tag, which is projected to total some $644 million over those refugees’ first five years in the United States.

Unlike other classes of immigrants, refugees are immediately eligible for a full range of welfare benefits.

The figure comes from an analysis performed by the Center for Immigration Studies, which looked at processing and administrative costs of the federal agencies, money for assistance provided to refugees directly or through federally funded nonprofit organizations and consumption of government-assistance programs. Unlike other classes of immigrants, refugees are immediately eligible for a full range of welfare benefits.

Camarota, director of research for the Washington-based think tank, estimated costs of the federal welfare programs by examining five-year usage rates contained in a report by the Office of Refugee Resettlement. The most recent figures, show usage rates for welfare programs by refugees from the Middle East that are even higher for most programs than when Camarota first wrote the report.

Refugees from the Middle East use those programs at rates that far exceed participation by refugees from any other region. In five of seven programs, the percentage of Middle Eastern refugees participating are higher than those of refugees from Africa, the region with the next-highest usage rates. In some cases, the rates are substantially higher. Nearly nine in 10 were on food stamps, for instance, compared with 80 percent of African refugees.

“The Middle East really stands out,” said Camarota, who speculated that the disparity might be due to deficiencies in eduction, English proficiency or job skills. “There’s something special about Middle Easterners in the cost of these programs.”

The Office of Refugee Resettlement Report, however, indicates that Middle Easterners arrived with better English skills and more education than those from other parts of the world.

If the latest participation figures hold up for the Syrians admitted between Oct. 1 last year and Sept. 30 this year, Camarota’s five-year cost projection — $64,370 per person and $257,481 per household — may be low-ball estimates.

Ira Mehlman, a spokesman for the Federation of American Immigration Reform, said it would be more cost-effective for the United States to provide financial assistance to Jordan and Turkey, which are housing the bulk of refugees who fled war-torn Syria. Those refugees also would have an easier time returning home after the fighting ends.

“In terms of helping people, you get far more for your money helping people close to where they live,” he said. Read more details here.

 

 

Facts on TWO Lists, Watch List and Terror List

   

Most Wanted Terrorists

Select the images of suspected terrorists to display more information.

 

How Does the FBI Watch List Work? And Could It Have Prevented Orlando?

Wired:  OF ALL THE details investigators have uncovered about Orlando terrorist Omar Mateen, perhaps the most infuriating is the fact that he spent 10 months on a government watch list, yet had no trouble buying an assault rifle and a handgun.

Authorities placed Mateen on a watch list in May 2013 after coworkers at the Florida courthouse where he was a security guard told authorities he boasted of connections to al Qaeda and other terrorists organizations. He remained on the list for 10 months, and FBI Director James Comey told reporters this week that during that time the agency placed Mateen under surveillance and had confidential sources meet with him.

But the feds removed Mateen from the list in March 2014, after concluding that he had no significant links to terrorism beyond attending the same mosque as an American suicide bomber who died in Syria. “We don’t keep people under investigation indefinitely,” Comey said, adding that he doesn’t see anything that his agents should have done differently.

Comey didn’t identify the list Mateen was on, but an unnamed official told the Daily Beast that he was in two databases, the Terrorist Identities Datamart Environment database and the Terrorist Screening Database, more commonly called the terrorist watch list.

Here’s a look at what the lists are and how someone gets their name on one.

What is the Terrorist Watch List?
The Terrorist Screening Database was created in 2003 by order of a Homeland Security Presidential Directive. The database includes the names and aliases of anyone known to be, or reasonably suspected of being, involved in terrorism or assisting terrorists through financial aid or other ways. The federal Terrorist Screening Center maintains the database, and an array of government agencies nominate people to it through the National Counter Terrorism Center.

Some of the information in the database originates with the Terrorist Identities Datamart Environment, also called TIDE. That list contains classified data collected by intelligence agencies and militaries worldwide, but anything passed on to the terrorist watch list is first scrubbed of classified info. In 2013, TIDE had 1.1 million names in it.

The State Department checks all visa applicants against the watch list. The TSA’s No-Fly list and Selectee List, which identifies people who warrant additional screening and scrutiny at airports and border crossings, are also derived from the watch list. But it is most often used by law enforcement agencies at all levels to check the identity of anyone arrested, detained for questioning, or stopped for a traffic violation. The FBI calls it “one of the most effective counterterrorism tools for the US government.”

Entries in the database are coded according to threat level to provide law enforcement with instructions on what to do when they encounter a suspected terrorist who is on the list. According to a 2005 inspector general report (.pdf), of some 110,000 records in the database that the IG reviewed, 75 percent of them were given handling code 4, considered the lowest level, and 22 percent were given handling code 3. Only 318 records had handling codes 1 or 2. A description of what each level means is redacted in the publicly released version of the document, but a note indicates that people are usually given code 4 when they are either just an associate of a suspected terrorist and therefore may not pose a threat or if there is too little information known about the individual to categorize them at a higher level.

Appearing in the database doesn’t mean you’ll be arrested, denied a visa, or barred from entering the country. But it does mean your whereabouts and any other information gleaned from, say, a traffic stop, will be added to the file and scrutinized by authorities.

What’s the Criteria for Getting on the Watch List?
According to a 2013 watch list guideline produced by the Terrorist Screening Center and obtained by The Intercept, engaging in terrorism or having a direct connection to a terrorist organization is not necessary for inclusion on the list. Parents, spouses, siblings, children and “associates” of a suspected terrorist can appear on the list without any suspicion of terrorist involvement. “Irrefutable evidence” of terrorist activity and connections is also not necessary, the document states. Reasonable suspicion is sufficient, though this isn’t clearly defined.

“These lists are horribly imprecise,” a former federal prosecutor, who asked to remain anonymous, told WIRED. “They are based on rumor and innuendo, and it’s incredibly easy to get on the list and incredibly difficult to get off the list. There’s no due process for getting off the list.”

The guidelines also reveal that the Assistant to the President for Homeland Security and Counterterrorism can temporarily authorize placing entire “categories” of people on to the No-Fly and Selectee lists based on “credible intelligence” that indicates a certain category of individuals may be used to conduct an act of terrorism.

“Instead of a watch list limited to actual, known terrorists, the government has built a vast system based on the unproven and flawed premise that it can predict if a person will commit a terrorist act in the future,” Hina Shamsi, head of the ACLU’s National Security Project, told The Intercept. “On that dangerous theory, the government is secretly blacklisting people as suspected terrorists and giving them the impossible task of proving themselves innocent of a threat they haven’t carried out.”

What Is the No-Fly List?
This narrower list, derived from the terrorist watch list, includes people who haven’t done anything to warrant being arrested, yet the government deems too dangerous to allow onto commercial aircraft. Mateen reportedly did not appear on this list. The list included 2,500 individuals when Homeland Security chief Michael Chertoff released the tally for the first time in 2008. Six years later, Christopher Piehota, director of the Terrorist Screening Center, told a House subcommittee it had 64,000 names on it. That sounds like a lot, but the list includes dead people and multiple versions of names.

The No-Fly list is also notorious for ensnaring the innocent whose names resemble those of suspected terrorists. Senator Ted Kennedy, for example, was repeatedly prevented from boarding planes because his name matched that of someone on the list.

What Kind of ‘Terrorist Activity’ Gets You on the Terrorist Watch List?
Obvious things like using or possessing weapons of mass destruction will land you on the terrorist watch list. So will committing violence at an international airport, or engaging in arson or other types of destruction of government property if it’s done to intimidate, coerce, or influence people or government policy. But computer hacking can also get you included if it damages a computer used for interstate or foreign commerce or ones that are used by a financial institution or the government, if the hack was intended to influence people or policy.

Just as there are those on the list who shouldn’t be, so too are there people who don’t make it onto the list who should. Umar Farouk Abdul Mutallab, the so-called “underwear bomber” who attempted to detonate explosives aboard a flight from Europe in 2009, wasn’t on the terrorist or No-Fly lists, even though his father alerted the US embassy in Nigeria to his radicalization. He did appear in the TIDE database, but because that information is classified, it didn’t make it to the No-Fly list or the Amsterdam airport where he boarded his flight.

A 2007 inspector general’s audit of the terrorist watch list found that in 15 percent of terrorism cases the inspector’s office reviewed, the FBI failed to add suspects in the cases to the list.

Can Someone on the List Buy a Gun from a Federally Licensed Seller?
Appearing on the terrorist watch list wouldn’t necessarily prevent someone from purchasing a gun; it simply means law enforcement is alerted if you apply to purchase a weapon. So even if he’d been included on the list at the time he bought his weapons, Mateen would still have had no trouble purchasing his Sig Sauer MCX rifle and Glock 17 handgun.

There are ten criteria, however, that do prevent people, whether they’re on the terrorist watch list or not, from buying firearms from a licensed seller. They include a felony conviction, being an undocumented immigrant and being deemed mentally unstable by a court.

Government Accountability Office data recently released to California Democratic Senator Dianne Feinstein indicate that 2,477 people on the watch list attempted to buy a firearm between February 2004 (when authorities started checking gun sale purchases against the list) and the end of 2015. Of those, 2,265 of the transactions were allowed.

Feinstein proposed legislation last year to prevent known or suspected terrorists on the watch list from obtaining a gun license or buying a weapon from a licensed seller. The Senate rejected the proposal one day after the San Bernadino attack, but Feinstein said she hopes the Orlando massacre will give the bill new life. This week, Senate Democrats filibustered until Republicans agreed to consider such legislation.

But barring anyone on the list from buying a gun can create a different problem. “If you prevent people on the list from buying a weapon, then an attempt to buy the weapon can alert the person that they’re on the list,” the former prosecutor told WIRED. “So you’re aiding the terrorist [with that information].”

 

How Many People Are on the Terrorist Watch List?
The exact number is unclear because the list includes many aliases and variations of names, and officials often confuse the number of names that are on the list and the number of unique individuals that are on it. In 2011, for example, more than 1 million names appeared on the list, but just 400,000 of these represented unique individuals. In 2014, the Terrorist Screening Center’s Piehota told lawmakers the list included 800,000 names.

About 99 percent of names nominated to the list each year are accepted, and the number of nominations grows annually. In 2009, authorities nominated 227,932 known or suspected terrorists. In 2013, the number reached nearly 469,000.

Most of the people on the watch list are not US citizens; placing a citizen or permanent US resident on the list is supposed to require a higher standard, such information “from sources of known reliability or where there exists additional corroboration or context supporting reasonable suspicion,” according to the guidelines The Intercept obtained.

How Do You Get Off the Terrorist Watch List or No-Fly List?
This remains a source of great controversy. People on these lists rarely know how or why they landed there, and the process of removal can be convoluted. In 2007, the Department of Homeland Security created a redress program through which people can challenge their inclusion on the No-Fly list. It works well enough for anyone mistakenly added to the list, but provides little help to those whom the government says are on the list for legitimate reasons but won’t disclose the reasons.

The FBI will remove people from the terrorist watch list after closing an investigation that failed to uncover terrorist activity or connections. This is exactly what happened to Mateen, which has angered some officials. “The only way you should get off the list is if they no longer believe you’re a threat,” Senator Lindsey Graham said during a Capitol Hill briefing after the Orlando shooting. “It should have nothing to do with not being able to prove a crime.”

But the FBI was simply following procedure when it dropped Mateen from the watch list, after being criticized in the past for not promptly removing people when cases get closed. An inspector general’s report in 2007 found that the FBI failed to remove names in a timely manner in 72 percent of the cases the Bureau closed for lack of evidence. A 2009 audit found that the situation had not improved, prompting lawmakers like Vermont Democratic Senator Patrick Leahy to criticize the Bureau.

 

The bigger question then, is not why was Mateen removed from the list, but why did the FBI close its investigation of him prematurely? “To me, there was enough here to keep it in some sort of a status,” New York Republican Representative Peter King said during the Capitol Hill briefing this week.

But with so many suspects on the watch list, authorities must be judicious in choosing which ones to pursue. “Our work is very challenging,” Comey said this week. “We are looking for needles in a nationwide haystack. But we’re also called upon to figure out which pieces of hay might someday become needles.”

There is no specific criteria guiding when to close a case related to the terrorist watch list. “It’s a judgment call,” says the former prosecutor. “It depends on the seriousness of the allegations and the result of the investigation. It’s [a matter of whether an] investigator is convinced, more than anything else, that ‘We better keep looking at this guy.’”

In the case of Mateen, investigators surveilled him, looked into his background, and performed a “dangle,” the former prosecutor says. That’s when a confidential informant meets with a suspect. “They feel the guy out to try to figure out if he’s real or if he’s just all talk,” he says. They may do this by asking if he’s interested in purchasing weapons or materials to make a bomb. “They may try the dangle operation two or three times, and if he shows no genuine interest in activity, if he doesn’t take the bait, then they say after a period of time, we’ve got no reason to believe this person is something other than an angry young man … and they close the investigation.”

Still, a case is never truly closed. Authorities can re-open it if something piques their interest—like say, a suspect buying weapons. That would have been sufficient to get Mateen back on the FBI’s radar. But because he wasn’t on the watch list, the FBI didn’t know what he was up to. And that’s what lawmakers are saying they want to fix.

 

 

 

Omar Terrorist Went to Saudi via NYU

The boom happened already, how long has it been going on? And what are they really teaching and how is this promoted? It is called Tablighi Jama’at.

 

Harvard? Uh huh:

The Prince Alwaleed Bin Talal Islamic Studies Program At Harvard University

The Prince Alwaleed Bin Talal Islamic Studies Program promotes the scholarly study of Islam and the Muslim world in a broadly interdisciplinary context.

Department of Middle Eastern Studies

Established in 1997, the program in Islamic Studies is undergirded by the University’s belief that Islamic religion, culture and history are important areas of inquiry, and that students should be able to pursue such inquiry as a part of their undergraduate education.  At present, the University of Texas at Austin is one of only a handful of four-year institutions in the U.S. that offer Islamic Studies as an independent major; it is the only such program in the state of Texas.

Islamic Studies in U.S. Universities

As in Europe, Islamic studies in the U.S. originated in the tradition of Orientalist scholarship and Christian theology, with its strong textual emphasis, but it has gradually expanded to overlap with Middle East area studies as well as a number of humanistic and social science disciplines, especially religious studies.1 Over the past several decades, and especially since 9/11, scholarly interest in Islamic studies has mushroomed. This interest is visible in the number of doctoral dissertations produced on Islam and Muslims over the past half-century. Read more from Charles Kurzman and Carl W. Ernst University of North Carolina at Chapel Hill.

****

Orlando Shooter Traveled to Saudi Arabia on Trip Organized By NYU Center

University spokesman says Omar Mateen and three others thought to be family members joined tour group on 2012 trip

Mateen and three others believed to be his family members joined a tour group that was organized by the Islamic Center at New York University, university spokesman John Beckman said.

International students continue to seek out the chance to enroll in Islamic universities and colleges in the US. Islamic colleges provide incredible education to international students who are looking to both advance their education while exploring deeper into their faith. Islamic universities seek to educate their students about the history of their religion as well as continue to build their faith and education for the future.

Islamic Education

The Islamic education main purpose is to educate Muslim students in the United States about the Quran as well as the deep rooted Muslim traditions, known as Sunnah. Islamic colleges are private institution based deep rooted aspects of the faith spread throughout the United States. All of these Islamic colleges share the same message and curriculum. Like most private religious colleges, Islamic universities in America instill an interdisciplinary curriculum with very challenging academic and extracurricular activities. Islamic schools also pride themselves in having incredible faculty and staff who are among the top Muslim educators and scholars in the world. Islamic universities in America follow the teachings of the Quran and their prophet Muhammad. Islamic teachings are the backbone of their universities, with values like knowledge being the upmost important. Islamic colleges seek to turn students into upstanding members of the Muslim community, preparing them for a life of leadership and devotion to their community and their religion. While not all students are expected to be practicing Muslims when they arrive at such a university, they all are expected to follow the basic teachings of the Quran as well as exploring the religion and its customs. Islamic universities seek to make the education affordable for potential students, while also being thoroughly available to all people. Though education is the main fixture for Islamic universities, improving the human experience is a very important function. Islamic colleges in America continue to educate international students and domestic students alike for decades.

Goals of Islamic Colleges and Universities in America

The goals of Islamic universities in America are much like those of any other religious university in the US. The first goal is to educate students on all aspects of the Islamic knowledge. In addition, these universities look to educate students in the proper methods of Islam in order to perform wholly as a Muslim each day. Students are also groomed to be great embers of their community and parish, while providing students with an unwavering sense of knowledge. Like most colleges, the curriculum is based on a four year plan with 120 credits. While each university differs, most Islamic universities push students to major in some sort of Islamic studies area.

Top Islamic Universities in America

There are several Islamic colleges and universities spread throughout the United States which teach a number of different students. While they contain some of the best academics of any college, finding these colleges are quite a bit more challenging. One Islamic college, the Islamic College of Minnesota educates many students. The college has both a graduate and undergraduate section, but only educate students in one major: Islamic Studies.

The Islamic American University is one of the most renowned Islamic colleges in the US. The IAU has several different campuses spread throughout the US in many different states. In addition, the university offers several different online programs for students. An important aspect for international students is to make sure that any classes they have taken transfer into the university, and as well be sure to check into the accreditation of any such college. Islamic education is exceptional in many facets. These universities regularly put out top Islamic leaders in the community and enroll top level international students.

International students will truly enjoy the experiences at these great universities. With a strong education, a diverse and intellectual student body as well as a curriculum based on multiple disciplines and the overall educational experience, international students can find true success in these top universities. Islamic universities are committed to bringing the best education to international students so that they can seek to educate the world with their values of equality and service.

How Terrorists use Encryption

 

How Terrorists Use Encryption

June 16, 2016

CTC: Abstract: As powerful encryption increasingly becomes embedded in electronic devices and online messaging apps, Islamist terrorists are exploiting the technology to communicate securely and store information. Legislative efforts to help law enforcement agencies wrestle with the phenomenon of “going dark” will never lead to a return to the status quo ante, however. With the code underlying end-to-end encryption now widely available, unbreakable encryption is here to stay. However, the picture is not wholly bleak. While end-to-end encryption itself often cannot be broken, intelligence agencies have been able to hack the software on the ends and take advantage of users’ mistakes.

Counterterrorism officials have grown increasingly concerned about terrorist groups using encryption in order to communicate securely. As encryption increasingly becomes a part of electronic devices and online messaging apps, a range of criminal actors including Islamist terrorists are exploiting the technology to communicate and store information, thus avoiding detection and incrimination, a phenomenon law enforcement officials refer to as “going dark.”

Despite a vociferous public debate on both sides of the Atlantic that has pitted government agencies against tech companies, civil liberties advocates, and even senior figures in the national security establishment who have argued that creation of “backdoors”[1] for law enforcement agencies to retrieve communications would do more harm than good, there remains widespread confusion about how encryption actually works.[a]

Technologists have long understood that regulatory measures stand little chance of rolling back the tide. Besides software being written in other countries (and beyond local laws), what has not been fully understood in the public debate is that the “source code” itself behind end-to-end encryption is now widely available online, which means that short of shutting down the internet, there is nothing that can be done to stop individuals, including terrorists, from creating and customizing their own encryption software.

The first part of this article provides a primer on the various forms of encryption, including end-to-end encryption, full device encryption, anonymization, and various secure communication (operational security or opsec) methods that are used on top of or instead of encryption. Part two then looks at some examples of how terrorist actors are using these methods.

Part 1: Encryption 101 

End-to-End Encryption
A cell phone already uses encryption to talk to the nearest cell tower. This is because hackers could otherwise eavesdrop on radio waves to listen in on phone calls. However, after the cell tower, phone calls are not encrypted as they traverse copper wires and fiber optic cables. It is considered too hard for nefarious actors to dig up these cables and tap into them.

In a similar manner, older chat apps only encrypted messages as far as the servers, using what is known as SSL.[b] That was to defeat hackers who would be able to eavesdrop on internet traffic to the servers going over the Wi-Fi at public places. But once the messages reached the servers, they were stored in an unencrypted format because at that point they were considered “safe” from hackers. Law enforcement could still obtain the messages with a court order.

Newer chat apps, instead of encrypting the messages only as far as the server, encrypt the message all the way to the other end, to the recipient’s phone. Only the recipients, with a private key, are able to decrypt the message. Service providers can still provide the “metadata” to police (who sent messages to whom), but they no longer have access to the content of the messages.

The online messaging app Telegram was one of the earliest systems to support end-to-end encryption, and terrorists groups such as the Islamic State took advantage.[2] These days, the feature has been added to most messaging apps, such as Signal, Wickr, and even Apple’s own iMessage. Recently, Facebook’s WhatsApp[3] and Google[4] announced they will be supporting Signal’s end-to-end encryption protocol.

On personal computers, the software known as PGP,[c] first created in the mid-1990s, reigns supreme for end-to-end encryption. It converts a message (or even entire files) into encrypted text that can be copy/pasted anywhere, such as email messages, Facebook posts, or forum posts. There is no difference between “military grade encryption” and the “consumer encryption” that is seen in PGP. That means individuals can post these encrypted messages publicly and even the NSA is unable to access them. There is a misconception that intelligence agencies like the NSA are able to crack any encryption. This is not true. Most encryption that is done correctly cannot be overcome unless the user makes a mistake.

Such end-to-end encryption relies upon something called public-key cryptography. Two mathematically related keys are created, such that a message encrypted by one key can only be decrypted by the other. This allows one key to be made public so that one’s interlocutor can use it to encrypt messages that the intended recipient can decrypt through the private-key.[d] Al-Qa`ida’s Inspire magazine, for example, publishes its public-key[5] so that anyone using PGP can use it to encrypt a message that only the publishers of the magazine can read.

Full Device Encryption
If an individual loses his iPhone, for example, his data should be safe from criminals.[e] Only governments are likely to have the resources to crack the phone by finding some strange vulnerability. The FBI reportedly paid a private contractor close to $1 million to unlock the iPhone of San Bernardino terrorist Syed Rizwan Farook.[6]

The reason an iPhone is secure from criminals is because of full device encryption, also full disk encryption. Not only is all of the data encrypted, it is done in a way that is combined or entangled[7] with the hardware. Thus, the police cannot clone the encrypted data, then crack it offline using supercomputers to “brute-force” guess all possible combinations of the passcode. Instead, they effectively have to ask the phone to decrypt itself, which it will do but slowly, defeating cracking.[f]

Android phones work in much the same manner. However, most manufacturers put less effort into securing their phones than Apple. Exceptions are companies like Blackphone, which explicitly took extra care to secure their devices.

Full disk encryption is also a feature of personal computers. Microsoft Windows comes with BitLocker, Macintosh comes with FileVault, and Linux comes with LUKS. The well-known disk encryption software TrueCrypt works with all three operating systems as does a variation of PGP called PGPdisk. Some computers come with a chip called a TPM[g] that can protect the password from cracking, but most owners do not use a TPM. This means that unless they use long/complex passwords, adversaries will be able to crack their passwords.

CIA Brennan’s Chilling Statements in Testimony

Update, Jo Cox died of her injuries from the terror attack. See below.

NYPost: CIA Director John Brennan told Congress on Thursday that the Islamic State remains “formidable” and “resilient,” is training and attempting to deploy operatives for further attacks on the West and will rely more on guerrilla-style tactics to compensate for its territorial losses in the Middle East.

Giving the Senate intelligence committee an update on the threat from extremists, Brennan said IS has been working to build an apparatus to direct and inspire attacks against its foreign enemies, as in the recent attacks in Paris and Brussels — ones the CIA believes were directed by IS leaders.

“ISIL has a large cadre of Western fighters who could potentially serve as operatives for attacks in the West,” Brennan said, using another acronym for the group. He said IS probably is working to smuggle them into countries, perhaps among refugee flows or through legitimate means of travel.

Brennan also noted the group’s call for followers to conduct so-called lone-wolf attacks in their home countries. He called the attack in Orlando a “heinous act of wanton violence” and an “assault on the values of openness and tolerance” that define the United States as a nation.

Brennan said the CIA is sharing intelligence with the FBI to help identify potential lone-wolf attackers, but the CIA’s responsibility is to gather information about operations overseas.

More Islamic State fighters worldwide than al Qaeda at its height: CIA director

Reuters: The director of the U.S. Central Intelligence Agency, John Brennan, said on Thursday there were tens of thousands of Islamic State fighters around the world, more than al Qaeda at its height.

He also told a Senate Intelligence Committee hearing that the agency was concerned about the growth of Libya as a base of operations for Islamic State militants, who had 5,000-8,000 fighters there, although the group’s fighters in Iraq and Syria had dropped to 18,000 to 22,000 from 19,000 to 25,000.

“I am concerned about the growth of Libya as another area that could serve as the basis for ISIL to carry out attacks inside of Europe… that is very concerning,” Brennan said, using an alternative acronym for the Islamic State militant group.

Questioned about the broader crisis, Brennan told lawmakers he believed the government of Syrian President Bashar al-Assad had been strengthened with Russia’s support.

“A year ago, (Assad) was on his back foot as the opposition forces were carrying out operations that were really degrading the Syrian military. He is in a stronger position than he was in June of last year” as a result of Russian support, Brennan said.

Just two days ago, Obama held a national security team meeting and then a presser stating the major gains being made against Islamic State. When the same day, MSNBC questions that statement from an on the ground in Turkey, we know we are being oversold on this national security threat.

***** Meanwhile, during this ridiculous gun control debate as a solution to terrorists, it seems that a knife and a gun was used in an attack on a member of the UK Parliament. Europe has exceptionally tight gun control laws.

Labour MP Jo Cox in critical condition after being shot and stabbed

Guardian: Jo Cox, the MP for Batley and Spen, is in a critical condition after being shot and stabbed multiple times in her West Yorkshire constituency.

Armed officers responded to the attack near a library in Birstall on Thursday afternoon, and a 52-year-old man was arrested in the area, police confirmed.

Jo Cox, the Labour MP for Batley and Spen.

They added that the Labour politician had suffered “serious injuries and is in a critical condition”. She has been taken by helicopter to Leeds general infirmary.

Police also confirmed a man in his late 40s to early 50s nearby suffered slight injuries in the incident.

Witnesses said the attack was launched after the MP became involved in an altercation involving two men near her weekly advice surgery. A Labour source confirmed Cox was shot and stabbed after she had concluded the drop-in session for constituents at around 1pm.

The scene pictures in Birstall, West Yorkshire.

The shopkeeper in a greengrocer opposite Birstall Library, Golden D’Licious, told the Guardian that he believed the attacker had been waiting for the MP outside the library.

“I was inside the shop and all I heard was a scream and then the gunshot,” he said, without giving his name. “I went out and everyone was dispersing. I couldn’t see because it happened behind a car.”

But witness Hithem Ben Abdallah, 56, who was in the cafe next door to the library shortly after 1pm, said he the MP involved in an altercation between two arguing men.

He told PA a man in a baseball cap “suddenly pulled a gun from his bag” and after a brief scuffle with another man the MP became involved.

He added: “He was fighting with her and wrestling with her and then the gun went off twice and then she fell between two cars and I came and saw her bleeding on the floor.”

 

Police close to the scene in Birstall, Yorkshire.