Law Firm, Bob Dole Behind the Taiwan Phone Call to Trump

There is always more to the story right? Yes….and this phone call that set the White House and State Department on their heads when Trump received a phone call from the President of Taiwan, President Tsai Ing-wen. What has not been answered is did anyone in the Trump operation have advanced knowledge of the call or did they understand the policy ramifications for the long term when it comes to conditions in the region?

****

Alston & Bird Central to Trump’s Taiwanese Phone Call

TAL: Former senator and Alston & Bird special counsel Bob Dole told The Wall Street Journal Monday that he and his firm helped arrange the president-elect’s taboo-breaking Friday telephone call with Taiwanese President Tsai Ing-wen. “It’s fair to say that we may have had some influence,” Dole told the paper.

Dole and Ted Schroeder, a former Senate Democratic aide who joined Alston & Bird in January as counsel in its Legislative and Public Policy Group, are on a $20,000-a-month retainer to the Taipei Economic and Cultural Representative Office, according to a lobbyist filing dated April 30. The office is Taiwan’s alternative to an embassy or consulate, handling foreign affairs and services for the Republic of China, commonly known as Taiwan.

In the lobbyist filing, Alston & Bird reported making routine diplomatic contacts on behalf of Taiwan’s U.S. representative. Awkwardly, the firm opened a three-lawyer Beijing office in January, specializing in IP, trade, tort and cyber disputes for Chinese clients in American forums.  Alston & Bird did not respond to a request for comment. Daniel Huang, a spokesman for the Taipei Economic and Cultural Representative Office, said the office had no comment.

Breaking a diplomatic taboo that dates to 1979, the U.S. call with Taiwan’s head of state roiled the chattering classes in both nations, perhaps because China has more than 1,600 ballistic and cruise missiles facing the Taiwan Strait, and dozens aimed at the U.S. A far more measured but nontrivial way for China to retaliate would be for it to return once again to cyberespionage, whose decline was an unsung Obama success. Nick Rossmann of FireEye iSIGHT Intelligence says that while he detects no new change in hacking patterns, “an economic downturn in China coupled with a deterioration in the U.S.-Chinese bilateral relationship would be key factors in a shift to ramp up operations to steal IP.”

The Taiwan call made a parlor game of guessing Trump’s motives for lightly playing with the world’s highest concentration of missiles, and tweaking a rising superpower that fights to keep its own military’s jingoists in check.

“Defensiveness, ignorance, impulsivity, considered aggressive behavior, on-going real estate negotiations?” muses Josh Marshall of Talking Points Memo. “Not having a clear idea about which of these factors is driving decisions is and will be one of the joys of the Trump years.”

Initial speculation centered on ignorance or impulsivity. “This has all the earmarks of randomness on the U.S. side,” a senior Bush diplomat told Politico. Others noted a Taiwanese newspaper report, denied by the Trump Organization, that Trump was considering a luxury development near Taipei’s airport. The New York Times reported that a sales manager overseeing Asia for Trump Hotels had visited Taiwan in October, a trip that she recorded on her Facebook page.

As the consensus shifted toward “considered aggressive behavior” (or at least considered by Trump’s aides), the first reports pointed the finger at former Dick Cheney aide and Heritage Foundation scholar Stephen Yates. But Yates denied the reports, while voicing warm support for the reckless break in protocol.

Thanks to Dole’s candor, we now know who really deserves blame for Trump’s first foreign policy blunder. And to ignorance, impulsivity, aggression and conflicts, we must add another animating factor. Even in the drained swamp of Trump’s Washington, don’t discount the power of lobbying.

Russian State, Non-State Cyber Intrusions Sway Voting/Political Decisions

In October, before the U.S. presidential election, a Russian man suspected of carrying out cyberattacks against U.S. targets was arrested in Prague and was also wanted by Interpol. What information could have been gained in this case that has provided additional evidence to government officials for further investigations? Anyone remember in 2012 when the Russian hacked LinkedIn?

Everyone appears to be in denial about the ability and reasons that Russia and or their non-state actors swayed the U.S. campaign and voting process. No one official has ever claimed actual votes were altered, but rather the argument is actual affectation of information, attitudes and decisions by candidates and voters. There is a distinct difference and words matter.

Russia is artful when it comes to practicing hybrid warfare, cyber is but one tactic, the other successful tactic is propaganda. It works.

APT 28, Russia (Advanced Persistent Threat) has been seen to have moved on from the United States political season and turned towards Germany’s political season in recent days. This is not likely to affect vote tally results but rather polling attitudes going into consideration of votes for candidates.

This site has been writing about hacking and cyber intrusions for more than two years. While government agency officials have pointed with evidence that Russia played a significant role, it is also important to remember there are thousands of outside government cyber experts that are hired by government to protect against cyber intrusions and to investigate and report that of which is otherwise unknown by government due to being in the private sector. These are generally known as ‘White Hats’. White Hats in their forensic work look for types of penetration, commonality in code or language, trace IP addresses, concepts, malware, login files, brute force, where stolen data later appeared, partitions and code based platforms.

Let’s examine some facts and history.

It was also proven last year that as part of the Russian aggression with the Ukraine, that power grid was hacked by Russian operations. Due to major sanctions applied to Russia for at least the annexation of Crimea and the invasion of Ukraine and the continued threat to East Europe and NATO, the Russian Defense Ministry launched a more aggressive cyber command. Beyond hacking the non-classified but still a protected system at the White House in 2015, there are others of note.

In the past year, researchers have also linked Russian hackers believed to be working for the government to other spying campaigns, including against NATO, the Ukrainian government, energy companies in Poland, and an academic at an American university who was targeted because he studies Ukraine.

On Tuesday, CNN reported that according to U.S. officials, Russian hackers had penetrated portions of the White House computer network by gaining access from another “perch,” at the State Department, where intruders had gotten inside the unclassified email system.

The intrusion reported by CNN is not “a new incident,” a spokesman for the National Security Council said. Rather, it was acknowledged by the White House last year after intruders accessed an unclassified network used by the Executive Office of the President. More here.

From 2014, long before the presidential election cycle was set into motion:

As reported by Heritage, according to FBI Director James Comey, “There are two kinds of big companies in the United States. There are those who’ve been hacked…and those who don’t know they’ve been hacked.”[1]

A recent survey by the Ponemon Institute showed the average cost of cyber crime for U.S. retail stores more than doubled from 2013 to an annual average of $8.6 million per company in 2014.[2] The annual average cost per company of successful cyber attacks increased to $20.8 million in financial services, $14.5 million in the technology sector, and $12.7 million in communications industries.

This paper lists known cyber attacks on private U.S. companies since the beginning of 2014. (A companion paper discussed cyber breaches in the federal government.)[3] By its very nature, a list of this sort is incomplete. The scope of many attacks is not fully known. For example, in July, the U.S. Computer Emergency Readiness Team issued an advisory that more than 1,000 U.S. businesses have been affected by the Backoff malware, which targets point-of-sale (POS) systems used by most retail industries.[4] These attacks targeted administrative and customer data and, in some cases, financial data.

This list includes only cyber attacks that have been made known to the public. Most companies encounter multiple cyber attacks every day, many unknown to the public and many unknown to the companies themselves.

The data breaches below are listed chronologically by month of public notice.

January

  • Target (retail). In January, Target announced an additional 70 million individuals’ contact information was taken during the December 2013 breach, in which 40 million customer’s credit and debit card information was stolen.[5]
  • Neiman Marcus (retail). Between July and October 2013, the credit card information of 350,000 individuals was stolen, and more than 9,000 of the credit cards have been used fraudulently since the attack.[6] Sophisticated code written by the hackers allowed them to move through company computers, undetected by company employees for months.
  • Michaels (retail). Between May 2013 and January 2014, the payment cards of 2.6 million Michaels customers were affected.[7] Attackers targeted the Michaels POS system to gain access to their systems.
  • Yahoo! Mail (communications). The e-mail service for 273 million users was reportedly hacked in January, although the specific number of accounts affected was not released.[8]

April

  • Aaron Brothers (retail). The credit and debit card information for roughly 400,000 customers of Aaron Brothers, a subsidiary of Michaels, was compromised by the same POS system malware.[9]
  • AT&T (communications). For two weeks AT&T was hacked from the inside by personnel who accessed user information, including social security information.[10]

May

  • eBay (retail). Cyber attacks in late February and early March led to the compromise of eBay employee log-ins, allowing access to the contact and log-in information for 233 million eBay customers.[11] eBay issued a statement asking all users to change their passwords.
  • Five Chinese hackers indicted. Five Chinese nationals were indicted for computer hacking and economic espionage of U.S. companies between 2006 and 2014. The targeted companies included Westinghouse Electric (energy and utilities), U.S. subsidiaries of SolarWorld AG (industrial), United States Steel (industrial), Allegheny Technologies (technology), United Steel Workers Union (services), and Alcoa (industrial).[12]
  • Unnamed public works (energy and utilities). According to the Department of Homeland Security, an unnamed public utility’s control systems were accessed by hackers through a brute-force attack[13] on employee’s log-in passwords.[14]

June

  • Feedly (communications). Feedly’s 15 million users were temporarily affected by three distributed denial-of-service attacks.[15]
  • Evernote (technology). In the same week as the Feedly cyber attack, Evernote and its 100 million users faced a similar denial-of-service attack.[16]
  • P.F. Chang’s China Bistro (restaurant). Between September 2013 and June 2014, credit and debit card information from 33 P.F. Chang’s restaurants was compromised and reportedly sold online.[17]

August

  • U.S. Investigations Services (services). U.S. Investigations Services, a subcontractor for federal employee background checks, suffered a data breach in August, which led to the theft of employee personnel information.[18] Although no specific origin of attack was reported, the company believes the attack was state-sponsored.
  • Community Health Services (health care). At Community Health Service (CHS), the personal data for 4.5 million patients were compromised between April and June.[19] CHS warns that any patient who visited any of its 206 hospital locations over the past five years may have had his or her data compromised. The sophisticated malware used in the attack reportedly originated in China. The FBI warns that other health care firms may also have been attacked.
  • UPS (services). Between January and August, customer information from more than 60 UPS stores was compromised, including financial data,[20] reportedly as a result of the Backoff malware attacks.
  • Defense Industries (defense). Su Bin, a 49-year-old Chinese national, was indicted for hacking defense companies such as Boeing.[21] Between 2009 and 2013, Bin reportedly worked with two other hackers in an attempt to steal manufacturing plans for defense programs, such as the F-35 and F-22 fighter jets.

September

  • Home Depot (retail). Cyber criminals reportedly used malware to compromise the credit card information for roughly 56 million shoppers in Home Depot’s 2,000 U.S. and Canadian outlets.[22]
  • Google (communications). Reportedly, 5 million Gmail usernames and passwords were compromised.[23] About 100,000 were released on a Russian forum site.
  • Apple iCloud (technology). Hackers reportedly used passwords hacked with brute-force tactics and third-party applications to access Apple user’s online data storage, leading to the subsequent posting of celebrities’ private photos online.[24] It is uncertain whether users or Apple were at fault for the attack.
  • Goodwill Industries International (retail). Between February 2013 and August 2014, information for roughly 868,000 credit and debit cards was reportedly stolen from 330 Goodwill stores.[25] Malware infected the chain store through infected third-party vendors.
  • SuperValu (retail). SuperValu was attacked between June and July, and suffered another malware attack between late August and September.[26] The first theft included customer and payment card information from some of its Cub Foods, Farm Fresh, Shop ‘n Save, and Shoppers stores. The second attack reportedly involved only payment card data.
  • Bartell Hotels (hotel). The information for up to 55,000 customers was reportedly stolen between February and May.[27]
  • U.S. Transportation Command contractors (transportation). A Senate report revealed that networks of the U.S. Transportation Command’s contractors were successfully breached 50 times between June 2012 and May 2013.[28] At least 20 of the breaches were attributed to attacks originating from China.

October

  • J.P. Morgan Chase (financial). An attack in June was not noticed until August.[29] The contact information for 76 million households and 7 million small businesses was compromised. The hackers may have originated in Russia and may have ties to the Russian government.
  • Dairy Queen International (restaurant). Credit and debit card information from 395 Dairy Queen and Orange Julius stores was compromised by the Backoff malware.[30]
  • Snapsave (communications). Reportedly, the photos of 200,000 users were hacked from Snapsave, a third-party app for saving photos from Snapchat, an instant photo-sharing app.[31]

Securing Information

As cyber attacks on retail, technology, and industrial companies increase so does the importance of cybersecurity. From brute-force attacks on networks to malware compromising credit card information to disgruntled employees sabotaging their companies’ networks from the inside, companies and their customers need to secure their data. To improve the private sector’s ability to defend itself, Congress should:

  • Create a safe legal environment for sharing information. As the leaders of technological growth, private companies are in most ways at the forefront of cyber security. Much like government agencies, companies must share information that concerns cyber threats and attack among themselves and with appropriate private-public organizations.[32] Congress needs to create a safe environment in which companies can voluntarily share information without fear of legal or regulatory backlash.
  • Work with international partners. As with the Backoff malware attacks, attacks can affect hundreds if not thousands of individual networks. These infected networks can then infect companies outside the U.S. and vice versa. U.S. and foreign companies and governments need to work together to increase overall cybersecurity and to enable action against individual cyber criminals and known state-sponsored cyber aggressors.[33]
  • Encourage cyber insurance. Successful cyber attacks are inevitable because no security is perfect. With the number of breaches growing daily, a cybersecurity insurance market is developing to mitigate the cost of breaches. Congress and the Administration should encourage the proper allocation of liability and the establishment of a cyber insurance system to mitigate faulty cyber practices and human error.[34]

***

Denial or refusing the argument and examination of evidence is malfeasance and exacerbating a cyber criminal act.

 

 

 

 

Foreign Threats Causing U.S. to Convert to Armored Battalions

Army to transition Fort Stewart infantry brigade to heavy armor

A soldier with the 3rd Armored Brigade Combat Team, 4th Infantry Division, guides his vehicle onto the rail platform at Fort Carson, Colorado, Nov. 15, 2016. The 3rd Infantry Division’s 2nd Infantry Brigade Combat Team, based at Fort Stewart in Georgia, is scheduled to officially become the 2nd Armored Brigade Combat Team in October 2017. Ange Desinor/U.S. Army

***

WASHINGTON — The Army will transition one of its light infantry brigades into a heavy armored brigade in the summer as it looks to bolster its ability to respond to potential military threats posed by other nations, the service announced Wednesday.

The 3rd Infantry Division’s 2nd Infantry Brigade Combat Team, based at Fort Stewart in Georgia, will begin exchanging its light infantry equipment in mid-2017 for tanks, infantry fighting vehicles with upgraded armor and self-propelled howitzer cannons, according to an Army statement. The unit is scheduled to officially become the 2nd Armored Brigade Combat Team in October.

The transition will give the Army a total of 15 armored brigades across its force. It will boast 10 armored brigades on active duty and five in the reserves.

That will give the Army more firepower to respond to the potential for full-spectrum combat operations. Top Pentagon officials, including Defense Secretary Ash Carter, have listed potential conflicts with Russia, China, Iran and North Korea as major threats for the United States.

Maj. Gen. Andrew Poppas, the Army’s force management director, said the conversion will help the Army retain its ability to “overmatch” such rivals, who in some cases have narrowed the military power gap with the United States.

The 2nd Brigade will actually be re-converting into an armored unit, after spending only about two years as an infantry brigade. The Spartan Brigade, as it is nicknamed, was an armored unit when it participated in the initial invasion of Iraq in 2003, and played a major role in the capture of Baghdad, known as the “Thunder Runs.” It transitioned into an infantry unit in May 2015, as part of the Army’s drawdown that included cutting an entire brigade from Fort Stewart.

Col. Brian Ellis, the force management division chief for Army operations, said global security challenges have changed drastically since the Army decided to convert 2nd Brigade into a lighter unit.

“As part of our Army processes, we’re always reviewing requirements based on strategic guidance to provide the right mix of capabilities to support geographic combatant commanders,” he said.

The conversion will give Fort Stewart two identical heavy armored brigades able to serve rotational deployments to areas including Eastern Europe, where the 3rd Infantry Division’s 1st Armored Brigade Combat Team has already served tours to train with NATO allies and deter Russian aggression in the region.

It will take time for the brigade to transition back into a war-ready armored combat brigade, Ellis said. The unit will not begin its initial training regimen with the heavy equipment until 2018.

 

****

Related reading: Europe Spooling up Military Activities vs. Russia

U.S. Sens. Johnny Isakson (R-GA) and David Perdue (R-GA) and U.S. Rep. Buddy Carter (R-GA) lauded the move.

“The Army’s announcement is great news and exhibits a continued commitment to our nation’s defense capabilities in Georgia,” Perdue said in a statement. “The additional armored brigade at Fort Stewart provides us with a more lethal army, increasing our ability to counter the rise of Russian aggression against our European allies as well as other threats around the globe. This is a testament to the proficiency and growing capability of all the dedicated military and civilian personnel at Fort Stewart.” More here.

 

Trump Plans/Prepares for a 2 Ocean War

Maybe new keels are soon to be laid and a draft could be in the future of the military.

As for the Army, the numbers are noted below but do not include the other branches of service.

ArmyTimes: Endstrength for March was 479,172 soldiers, which is 154 fewer troopers than were on active duty when the Army halted the post-Cold War drawdown in 1999 with 479,424 soldiers, the smallest force since 1940, when the active component numbered 269,023 soldiers.

Barring unexpected delays, the Army is well-positioned to achieve, or exceed, its budgeted end-strength of 475,000 soldiers by Sept. 30, the end of fiscal 2016.

Without congressional or Defense Department intervention, the drawdown will continue for two more years, with end strength hitting 460,000 soldiers in 2017, and 450,000 in 2018.

The United States Navy is a powerhouse. The fleet consists of roughly 430 ships in active service or reserve. The vessels run the gamut from the massive Nimitz-class aircraft carrier, which stretches more than 1,000 feet, to the Los Angeles-class submarine that slithers 900 feet below the ocean surface. The graphic below shows all the commissioned and noncommissioned ships of every size as of April 2015. The ships are organized by size, from the humongous aircraft carriers at the top to the smaller ships at the bottom.

2015-u-s-navy-fleet

 

Donald Trump wants to increase America’s military force in the Asia-Pacific

DONALD Trump’s administration has given its strongest indication yet that the United States will increase America’s military force against China.

Rudy Giuliani, the president-elect’s frontrunner for secretary of state, has revealed Mr Trump intends to prioritise building a “gigantic” military force to overthrow China’s ambitions in the Pacific.

Speaking to global business leaders in Washington yesterday, Mr Giuliani said the United States would raise its number of troops to 550,000, instead of shrinking it to 420,000.

He also said they intended to take their navy up to 350 ships, instead of going down to 247. It currently has around 280.

“At 350, China can’t match us in the Pacific. At 247 ships, we can’t fight a two-ocean war; we gave up the Pacific. If you face them with a military that is modern, gigantic, overwhelming and unbelievably good at conventional and asymmetric warfare, they may challenge it, but I doubt it.”

He said the expansion would allow the US to fight a “two-ocean war”.

This presents a more assertive foreign policy than the world ever heard from Mr Trump in the lead-up to election with regards to China.

While the South China Sea remains one of the world’s most tense geopolitical regions, the celebrity billionaire was careful to keep his remarks on it to a minimum in the lead-up to the US election.

Experts have told news.com.au Mr Trump has always been set on building the US’s military presence.

“It’s likely that America will have a lot more military muscle under his presidency,” said Macquarie University Security Studies analyst Adam Lockyer. “While we can’t get ahead of ourselves, much of that will likely go into the Asia-Pacific region, because China’s a major challenger.

“On one hand they’re paying less diplomatic and critical attention to the region, but on the other they’re building more military presence in the region.”

That said, Mr Giuliani’s remarks suggest Mr Trump’s administration will be more hawkish than expected.

It was expected that Mr Trump would retreat from the disputed region, in line with his pledge to prioritise domestic issues and retreat from foreign affairs.

“Trump has a far more isolationist outlook than Clinton or Obama, but at the same time, if he had his own way, he’d be far more focused on domestic policy and domestic security, including things like terrorism and immigration,” Dr Lockyer said.

Judging by this announcement, the Trump administration may take a more hawkish approach after all.

WILL THIS ACTUALLY HAPPEN?

The Trump administration will face significant financial hurdles if it does take on this ambitious military program.

Asia-Pacific security expert Jingdong Yuan from the Centre For International Security Studies told news.com.au said it was achievable. He said Mr Trump will be able to work with the Republican-controlled Congress to do away with the sequester process that automatically cut $500 billion in defence over a decade.

But it could be relatively difficult for the incoming government to direct too much of its financial focus to defence.

“US defence spending as a percentage of GDP and government spending is at a historical low, especially after the wars in Afghanistan and Iraq,” said Dr Yuan.

“At the same time, entitlement spending, such as social security and medicare cannot be cut, and increase year by year, and federal government deficits of over $18-19 trillion make it difficult to spend more in discretionary areas such as defence.

“So Trump need to find the money to support his ambitious military programs. We will see.”

He also said that neither the United States nor China are being realistic when it comes down to it.

“Beijing and Washington will have to work on their differences while at the same time work together on things they both agree.

“This is a very complex relationship and neither America’s will to remain predominant nor China’s desire for a Sino-centric order in Asia are realistic.

“Indeed, if they both pursue these extreme goals, conflict will become more likely and it will be deeply destabilising for the region — Australia included.”

WHAT DOES ALL THIS MEAN FOR AUSTRALIA?

Defence Industries Minister Christopher Pyne says the planned expansion would create “remarkable opportunities” for Australia’s defence industry.

In a speech to be given at a Submarine Institute of Australia conference today, Mr Pyne will announce that the US expansion could offer a historic opportunity for Australia’s defence industry.

“To give you an understanding of the scale of this increase, it ­includes 50,000 more army troops, 70 new naval warships, 100 air force planes and a dozen new marine battalions,” Mr Pyne will say. “This represents around half a trillion US dollar increase to the US defence budget over the next decade.

“This result could bring with it remarkable opportunities for the Australian defence industry and, thanks to the foresight of the Turnbull government, Australia is well positioned to grasp those opportunities.”

Yesterday, Mr Pyne told The Australian the country will take a “similar focus” to the United States in terms of its defence policy.

“At a time when the US is expanding capability, we are similarly focused. As we have demonstrated throughout the year, the government is putting defence at the very centre of our national policy agenda.”

Mr Giuliani acknowledged the Trump administration hopes to engage with China on economic issues, such as trade.

Yesterday, he told The Wall Street Journal the team wants to reset relations with both China and Russia.

But Mr Trump intends to label China a “currency manipulator” after taking office, which economic analysts say will likely contribute to rising tensions between the two countries.

Chinese media has taken a hostile response to Mr Trump’s more outlandish comments on the country during his campaign.

In May this year, the then-presidential candidate accused China of “raping” the United States economically, and vowed to impose a 45 per cent tariff on Chinese imports.

An article published in the country’s nationalistic newspaper The Global Times this week warned the Chinese government will be forced to “take a tit-for-tat approach” if the president-elect persisted with the trade war.

“If Trump wrecks Sino-US trade, a number of US industries will be impaired. Finally the new president will be condemned for his recklessness, ignorance and incompetence and bear all the consequences.”

This trade war may also present problems for Australia. China and the United States are our first and third largest trading partners respectively, and such an action could trigger a trade war if Beijing were to retaliate, which would directly impact these relationships.

All this said, Dr Yuan says it’s still too soon to panic over what the Trump administration may or may not do.

“The election fog is still here and we need time and information to get more realistic and accurate assessments,” he said.

“I remain cautiously optimistic.”

****

At issue with China is the waterway dispute instigated by China.

 CNN

Thanksgiving Day Terror. Black Swan Exercise

Related reading: Predicting Future Military Threats: Implications of the Black Swan

Donald Trump’s transition team is getting a helping hand from the Obama administration on national security matters.

The administration is giving the president-elect and a select few of his top advisers sensitive intelligence briefings.

And, in addition, Trump and his team will take part in two so-called ‘black swan’ exercises that simulate a domestic or national security emergency.

The exercises are intended to help an incoming administration learn how to manage a crisis in real time in case there is some kind of global or domestic emergency in the first days of a Trump presidency.

A black swan exercise would, for example, ensure that a fledgling Trump administration knows how to activate the proper federal agencies to maintain stability.

According to a briefing book from the nonpartisan Center for Presidential Transition, in 2008 the Bush administration hosted two black swan exercises for then president-elect Obama’s national security team. More here from ABC.

Black Swan operations and exercises have been practiced also in the United Kingdom.

**** What is on the horizon regarding terror?

Islamic State is urging its followers to carry out acts of terrorism in New York City during the upcoming, Macy’s Thanksgiving Day Parade.  Jamie Schram writes in this morning’s (Nov. 14, 2016) New York Post, that “ISIS is offering a detailed how-to on using trucks as weapons of mass destruction — noting that the Macy’s Thanksgiving Parade would be an ‘excellent target.”

Rumiyah2(1).jpg

MEMRI: On November 11, 2016, Al-Hayat, one of the media centers of the Islamic State (ISIS), released the third issue of its monthly magazine Rumiyah featuring an article calling on lone wolves in the U.S. and Europe to use trucks to target large outdoor conventions, crowded streets, outdoor markets, festivals, parades, and political rallies. The article also emphasized the importance of using trucks in terrorist attacks, and provided suggestions on “ideal vehicles” to use and tactical tips for the preparation and planning of attacks.

Rumiyah3.jpg

The article, titled “Just Terror Tactics,” features images of rental trucks from companies such as Hertz and U-Haul, as well as a picture showing the Macy’s Thanksgiving Day Parade in New York City. It begins by highlighting the “destructive capability” of motor vehicles and referring to the Bastille Day attack in Nice, France on July 14, 2016. While praising the Nice attacker, the article states: “This was superbly demonstrated in the attack launched by the brother Mohamed Lahouaiej-Bouhlel who, while traveling at the speed of approximately 90 kilometers per hour, plowed his 19-ton load-bearing truck into crowds celebrating Bastille Day in Nice, France, harvesting through his attack the slaughter of 86 Crusader citizens and injuring 434 more.”

Rumiyah4(1).jpg

The article stresses the importance of using a vehicle that can inflict maximum damage, and describes the “ideal” vehicles for lone wolf attacks as “load-bearing trucks, large in size, reasonably fast in speed or rate of acceleration, heavy in weight, double-wheeled, possessing a slightly raised chassis.” The article continued: “If accessible, [vehicles] with a metal outer frame which are usually found in older cars [should be used], as the stronger outer frame allows for more damage to be caused when the vehicle is slammed into crowds, contrary to newer cars that are usually made of plastics and other weaker materials.”

Providing suggestions on how to acquire the vehicle, the article noted that buying it is the “easiest” option; however, it also mentioned renting, borrowing from relatives and acquaintances, hotwiring, and carjacking as additional options. Under “applicable targets” the article listed: “Large outdoor conventions and celebrations, pedestrian-congested streets, outdoor markets, festivals, parades and political rallies.”

The article further emphasized that in order to inflict maximum damage, attackers should consider targeting “any outdoor attraction that draws large crowds,” stating that “it is not conditional to target gatherings restricted to government or military personnel only. All so-called ‘civilian’ (and low-security) parades and gatherings are fair game and more devastating to Crusader nations.”

As for “preparation and planning,” the article recommended “assessing vehicle for roadworthiness, filling vehicle with a sufficient amount of fuel, mapping out the route of the attack, surveying the route for obstacles, such as posts, signs, barriers, humps, bus stops, dumpsters, and if accessible, a secondary weapon should be attained.”

The article also provided ideas for attackers to use in order to declare their affiliation to ISIS to “have their motives acknowledged” such as writing “ISIS will remain” or “I am a soldier of the Islamic State” on pieces of papers and throwing them out of the vehicle’s window during the attack.

The article concludes by instructing attackers to stay inside their vehicles until they are no longer movable and then to start shooting pedestrians, first responders and security forces until they are killed.

****

Black Swan exercises are those that prepare for the unexpected and several events worldwide have been part of these operations.

1. Electromagnetic Pulse (EMP) or Solar Burst

As The Heritage Foundation highlighted in the documentary 33 Minutes,[3] an EMP attack could throw America back to the pre-Industrial Revolution era. A powerful solar burst would have the same impact. Should either event occur, people would have little time to react, and the damage would be incalculable.

If the U.S. were to lose power for any prolonged period of time, given the sheer number of people located in the interior of the country, mass starvation and death would become a reality. Most experts consider these events as highly unlikely ones, so little investment or planning is done related to them.

2. Pandemic Virus

Although the U.S. has prepared for a pandemic influenza outbreak, little preparation has gone into other potential viruses. More importantly, it is the unknown virus or “super virus” that represents a Black Swan for America. Recall that it was less than 30 years ago that AIDS first began embedding itself in North America. If a far more deadly and communicable virus hits America, the U.S. would quickly expend its existing resources.

3. Nuclear or Radiological Event

The U.S. has extensive knowledge of what would happen if a nuclear or radiological explosion occurred in a major American city. Theory, however, is a poor replacement for the reality of large numbers of deaths, burn victims, and physical debris. As former Vice President Dick Cheney wisely concluded, because of the sheer consequences, even a 1 percent chance of such an event occurring requires the nation to expend the necessary resources to prevent it.

4. Super-Volcanic Eruption

Seismic activity around the Yellowstone caldera is monitored, but tectonic shifts miles below the surface could result in the buildup of pressure and a super-volcanic eruption. The volcano beneath Yellowstone previously erupted, causing destruction as far away as California, Iowa, and Louisiana. An eruption, though unlikely given current readings, could have truly catastrophic consequences.

5. Nor’Easter/Hurricane

Hurricanes strike America with a fair degree of frequency. A Black Swan event would be a Nor’easter combined with a powerful hurricane that strikes New York City in the same manner as Hurricane Katrina struck New Orleans. Between the massive flooding and wind damage, New York City could sustain casualties and physical destruction well in excess of Katrina.

How Prepared Is the U.S.?

The honest and unfortunate answer to that question is unknown and, despite attempts to ascertain that answer, will not be known if existing policy remains in place. A Black Swan by definition becomes a Black Swan because it results in catastrophic outcomes. This “delicate” balance between preparing for events and not being able to prepare adequately for all events represents the ultimate risk-based decision making.

From 2003 to 2011, the U.S. Department of Homeland Security (DHS) distributed roughly $40 billion in funding to states and localities across America. Despite years of reporting requirements, DHS is fundamentally unable to state with any degree of certainty which capabilities exist, where those capabilities exist, the level of those capabilities, and the remaining capability needs. DHS knows it has funded the acquisition of many things, but specifics beyond that are unquantifiable.

Specifically, to gain a full accounting, Congress should:

  • Be fiscally responsible. Rather than continue to spread federal funds using an “inch thick and a mile wide” mentality, Congress should target federal funds at the highest-risk states, cities, and counties where the funds could meaningfully increase the security of Americans, including reducing the number of high-risk cities that are eligible for special funding.
  • Examine cooperative agreements. The need for equality downplays the need for the grant structure and invites another approach—such as the use of cooperative agreements, where the federal government and the states can sit down as true and equal partners and negotiate outcomes at the beginning and then direct funds to achieve those desired outcomes without the need for yearly applications.
  • Appoint a Black Swan commission. Rather than wait until after a catastrophic event has occurred, Congress should appoint an independent commission for the express purpose of analyzing the threats of a potential Black Swan, identifying existing capabilities, and making recommendations on how best to correct errors made thus far and accelerate closing the gap between where the nation stands today and where it needs to be tomorrow. The commission must have the independence and resources to quickly do its job after a full review of the status quo.

Expect the Unexpected

If the catastrophe in Japan has taught any lessons, it is that America must prepare for the unexpected with as much vigor as it prepares for the expected. Because a Black Swan can be so catastrophic, in many ways the ideal role for the federal government is to lead an effort surrounding those events. With the nation’s current fiscal challenges, conserving resources for catastrophic events is more vital than ever. More here from Heritage.