Trump: America First, Foreign Policy Presentation

Good for Donald Trump, America should be first when it comes to policy and diplomacy. Applause to the Donald for that standard. Well said.

Tell us again how to pronounce Tanzania or San Bernardino.

What was not said however is disturbing for those who have a keen interest in foreign policy. Of particular note, the Ambassador of Russia was sitting on the front row. Perhaps this is but one reason, Trump never mentioned Russia or Vladimir Putin.

Remember it was only recently that Russia has been more than provocative in reckless actions against a U.S. destroyer and U.S. military aircraft. This is a violation of the IncSea Treaty. This is not the first time either, noting Russian bombers off the West Coast and the same with our European allies. What about the Baltic States, Crimea or Ukraine? Anything?

What about the constant war in the cyber realm? Trump did mention artificial intelligence, does he know what that is? What about electronic or economic warfare?

al Qaeda, Boko Harem, Haqqani, Jabhat al-Nusra, Houthis? Nah….the plight of Jews and Christians, Yazidis, Peshmerga? Standing with France on their recent attacks? Nothing about China’s aggression with the new islands and fighter jets there?

Well said Donald on the destruction of Islamic State, high marks for that. Additional high marks for the IRGC and kidnapping our sailors.

Trump made a mere simple reference to Iran and their nuclear program, stating they will never have a nuclear weapon and the Joint Plan of Action was a bad deal. How come no reference to Iran being a violator of conventions, a rogue state sponsor of terror? Nothing about the Iranian Revolutionary Guard Corp or Hezbollah or IED’s made by Iran that killed and maimed our soldiers? What about Iran’s collusion with North Korea? Anything on that? No…

Does Trump approve of John Kerry’s work as the current Secretary of State? Humm, perhaps as Trump never mentioned Kerry.

Syria unleashed Islamic State? Really? Trump blames China for North Korea. Does Donald think that China is fully, exclusively responsible and accountable for Kim Jung Un?

Why no mention of foreign aid? There is likely a bailout coming for Puerto Rico. Does Trump have a clue on that? When it comes to NATO, Trump backed off and merely mentioned that only four member countries pay the 2% of GDP. Never a mention that countries do pay the United States for bases and protection like Philippines and Japan. Did Trump slight Israel by not stating nurturing and restoring the relationship or is he still in a neutral position when it comes to the Palestinians? Hamas? Anything on human rights violations? What about the corruption of the United Nations?

When referencing Cuba, Trump correctly stated that Obama was slighted at the airport with no Cuban official being on the formal reception. Is Trump cool with normalizing relations with Cuba considering the treatment of dissidents or U.S. criminals that have receive safe haven on the island or the debt Cuba owes to U.S. domestic corporations for nationalizing them? What about Guantanamo as a whole?

Forgotten is a war we are currently fighting against the Taliban in Afghanistan…not a word at all by Trump.

Trump did layout his policy on foreign matters stating diplomacy, caution and restraint. That is always the standard. Did Trump mention he was going to revisit or retool those approaches? No….

Most disturbing, included in Trump’s foreign policy speech was the feeble condition of our own nuclear program and the military as a whole. Why explain any weakness at all where adversaries are listening with a keen ear? The U.S. military is still today the most advanced power on the globe while new technologies and weapons systems are in the future pipelines. Hey Donald, how about making a positive declaration about the military condition and the work of the Pentagon and the military collaboration with allies that does demonstrate strength?

Well, here is the text of his speech for your reference.

For additional reference, those included on Trump’s foreign policy team are:

Zalmay Khalilzad, the former Ambassador to Iraq and Afghanistan. He is under investigation. Trump only met Khalilzad earlier in the day. Further, the Ambassador stated that if Hillary had asked him to be part of her team, he would gladly do so.

Walid Phares, a Lebanese Christian and commentator on Middle East Affairs.

George Papadopoulos, energy consultant

Carter Page, energy consultant and lobbyist for Gazprom, a Russian energy company

Joe Schmitz, fired as former Inspector General, Department of Defense, formerly of Blackwater and his sister is Mary Kay Letourneau gained infamy after having a sexual relationship with her 12-year-old student, to whom she is now married.

LTG Keith Kellogg (ret), Chief Operating Officer of the Coalition Provisional Authority in Baghdad, Iraq

 

 

 

 

Need to Know Facts on EB-5 Visa Program

In 1999, yes under President Bill Clinton and selling out sovereignty under a globalist agenda:

   

FAS: The immigrant investor visa was created in 1990 to benefit the U.S. economy through employment creation and an influx of foreign capital into the United States. The visa is also referred to as the EB-5 visa because it is the fifth employment preference immigrant visa category. The EB-5 visa provides lawful permanent residence (i.e., LPR status) to foreign nationals who invest a specified amount of capital in a new commercial enterprise in the United States and create at least 10 jobs. The foreign nationals must invest $1,000,000, or $500,000 if they invest in a rural area or an area with high unemployment (referred to as targeted employment areas or TEAs).

There are approximately 10,000 visas available annually for foreign national investors and their family members (7.1% of the worldwide employment-based visas are allotted to immigrant investors and their derivatives). In FY2015, there were 9,764 EB-5 visas used, with 93% going to investors from Asia. More specifically, 84% were granted to investors from China and 3% were granted to those from Vietnam.

In general, an individual receiving an EB-5 visa is granted conditional residence status. After approximately two years the foreign national must apply to remove the conditionality (i.e., convert to full-LPR status). If the foreign national has met the visa requirements (i.e., invested and sustained the required money and created the required jobs), the foreign national receives full LPR status. If the foreign national investor has not met the requirements or does not apply to have the conditional status removed, his or her conditional LPR status is terminated, and, generally, the foreign national is required to leave the United States, or will be placed in removal proceedings.

In 1992, Congress established the Regional Center (Pilot) Program, which created an additional pathway to LPR status through the EB-5 visa category. Regional centers are “any economic unit, public or private, which [are] involved with the promotion of economic growth, including increased export sales, improved regional productivity, job creation, and increased domestic capital investment.” The program allows foreign national investors to pool their investment in a regional center to fund a broad range of projects within a specific geographic area. The investment requirement for regional center investors is the same as for standard EB-5 investors. As the use of EB-5 visas has grown, so has the use of the Regional Center Program. In FY2014, 97% of all EB-5 visas were issued based on investments in regional centers. Unlike the standard EB-5 visa category, which does not expire, the Regional Center Program is set to expire on September 30, 2016.

Different policy issues surrounding the EB-5 visa have been debated. Proponents of the EB-5 visa contend that providing visas to foreign investors benefits the U.S. economy, in light of the potential economic growth and job creation it can create. Others argue that the EB-5 visa allows wealthy individuals to buy their way into the United States.

In addition, some EB-5 stakeholders have voiced concerns over the delays in processing EB-5 applications and possible effects on investors and time sensitive projects. Furthermore, some have questioned whether U.S. Citizen and Immigration Services (USCIS) has the expertise to administer the EB-5 program, given its embedded business components. The Department of Homeland Security’s Office of the Inspector General (DHS OIG) has recommended that USCIS work with other federal agencies that do have such expertise, while USCIS has reported that it has taken steps internally to address this issue. USCIS has also struggled to measure the efficacy of the EB-5 category (e.g., its economic impact). USCIS methodology for reporting investments and jobs created has been called into question by both the DHS OIG and the U.S. Government Accountability Office (GAO).

 

Furthermore, some have highlighted possible fraud and threats to national security that the visa category presents. In comparison to other immigrant visas, the EB-5 visa faces additional risks of fraud that stem from its investment components. Such risks are associated with the difficulty in verifying that investors’ funds are obtained lawfully and the visa’s potential for large monetary gains, which could motivate individuals to take advantage of investors and can make the visa susceptible to the appearance of favoritism. USCIS has reported improvements in its fraud detection but also feels certain statutory limitations have restricted what it can do. Additionally, GAO believes that improved data collection by USCIS could assist in detecting fraud and keeping visa holders and regional centers accountable.

Lastly, the authority of states to designate TEAs has raised concerns. Some have pointed to the inconsistency in TEA designation practices across states and how it could allow for possible gerrymandering (i.e., all development occurs in an area that by itself would not be considered a TEA). Others contend that the current regulations allow states to determine what area fits their economic needs and allow for the accommodation of commuting patterns.

In addition to the issues discussed above, Congress may consider whether the Regional Center Program should be allowed to expire, be reauthorized, or made permanent, given its expiration on September 30, 2016. In addition, Congress may consider whether any modifications should be made to the EB-5 visa category or the Regional Center Program. Legislation has been introduced in the 114th Congress that would, among other provisions, amend the program to try to address concerns about fraud, and change the manner in which TEAs are determined. Other bills would create an EB-5-like visa category for foreign national entrepreneurs who do not have their own capital but have received capital from qualified sources, such as venture capitalists. Read more here.

 

China’s Cyber Attack on Pentagon Missile Defense Daily

So, where are the strongly worded letters, the condemnation, the sanctions the counter-measures?

Cyber-warfare, industrial espionage, economic warfare.

 

November 2015:

WASHINGTON (Reuters) – The U.S. military on Sunday hailed the success of a complex $230 million test of the U.S. missile defense system that it said showed the ability of the Aegis and THAAD weapons systems to identify and destroy ballistic and cruise missiles at once.

The test was conducted near Wake Island in the western Pacific Ocean around 11:05 p.m. EDT by the U.S. Missile Defense Agency, U.S. European Command, U.S. Pacific Command, the Ballistic Missile Defense System Operational Test Agency and the Joint Functional Component Command for Integrated Missile Defense.

“This was a highly complex operational test of the BMDS which required all elements to work together in an integrated layered defense design to detect, track, discriminate, engage, and negate the ballistic missile threats,” MDA said in a statement released late Sunday.

The Missile Defense Agency website.

Admiral: China Launching Cyber Attacks on Missile Defense Nets ‘Every Day’

Cyber threat comparable to Iranian, North Korean missile danger

FreeBeacon: Chinese military hackers are conducting cyber attacks on the Pentagon’s Missile Defense Agency networks on a daily basis and will soon shift to hacking into networks of missile defense contractors, the admiral in charge of the agency told Congress on Thursday.

Vice Adm. James D. Syring, the MDA chief who is in charge of building multi-billion dollar anti-missile defenses, told a House hearing that while his networks are successfully fighting off the cyber attacks, missile defense contractors need to improve their network security.

The three-star admiral said the threat of Chinese cyber attacks was equal to North Korean and Iranian missile threats.

“I view the cyber threat that I specifically face with MDA and the systems we are fielding on par with any ballistic missile threat that either Iran or North Korea possess,” Syring said.

Asked by Rep. Mike Rogers (R., Ala.), the chairman of the House Armed Services subcommittee on strategic forces, if he is fighting off cyber attacks from Chinese military hackers, Syring answered: “Yes, sir.” He limited his comments and said he would provide details of the cyber threats during a later closed-door session of the subcommittee.

“We have taken inordinate steps to protect both our classified and unclassified networks from attack, [with] constant 24/7 monitoring with teams in place plus good material protections of those systems,” he said.

“My biggest concern remains in our cleared defense contractor base and their protections,” Syring added, noting that Chinese efforts to break into missile defense networks are relentless.

“They are continuing to try and attack my government networks, every day, classified and unclassified,” he said. “But where they’re going next and we’ve gotten examples of this is to my cleared defense contractors with the unclassified controlled technical information.”

Bolstering the network security of contractors is a high priority across the entire ballistic missile defense system, he said.

Foreign states are seeking to penetrate missile defenses and other weapons systems to steal technology and data for use in their own weapons. They also seek to disrupt or destroy the systems in the event of a crisis or conflict.

A report by the Defense Science Board warned in 2013 that critical U.S. weapons and other military systems are vulnerable to cyber attack.

“The United States cannot be confident that our critical Information Technology (IT) systems will work under attack from a sophisticated and well-resourced opponent utilizing cyber capabilities in combination with all of their military and intelligence capabilities (a ‘full spectrum’ adversary,” the report concluded.

Syring said in prepared testimony his agency is deploying upgraded command and control systems with better security against cyber attacks. Missile defense personnel also are being trained to prevent cyber intrusions.

“We know that malicious cyber actors are constantly attempting to exfiltrate information from U.S Industry,” Syring stated. “We will continue to work with the defense industrial base, the FBI, and other partners to identify these issues and raise the costs of this behavior to those responsible, in coordination with national authorities and in accordance with national policy.”

Syring said a key objective is hardening U.S. missiles defenses for future conflicts, which will likely involve cyber attacks against its networks.

“We must build resilient cyber defenses that are capable of detecting and mitigating threats without impeding operations in order to ‘fight through’ the cyber threat,” he said.

Two exercises simulating cyber attacks on missile defense networks were held last year. Another exercise is set for next month.

To prevent cyber attacks through equipment and parts, MDA is tightening the security of its suppliers.

“We also have a rigorous cyber and supply chain risk management inspection program to examine everything about our systems, from the truck to supply chain, to the fielded operational ability,” Syring said.

Chinese agents were detected spying on the U.S. missile defense interceptor base at Fort Greely, Alaska, several years ago, according to defense officials.

Barry Pike, executive officer for the U.S. Army’s missiles and space program, said during the House hearing that foreign military threats are growing with the emergence of synchronized air, missile, cyber, and electronic warfare attacks.

“Across all Army [air and missile defense] programs, we are improving our resilience and ability to mitigate cyber and electronic warfare attacks,” he stated in prepared testimony.

Rogers, the subcommittee chairman, said in opening remarks at the hearing that after eight years of President Obama’s administration “our nation’s security is in more jeopardy than any time in recent memory.”

“North Korea, Iran, Pakistan, Russia, and China are all advancing their ballistic and cruise missile programs, along with weapons of mass destruction programs, to put our military, our allies, and our homeland at risk,” Rogers said.

“At the same time, President Obama has cut missile defense practically every year he’s been in office,” he added. “America’s enemies know an opportunity when they see one; our allies see they are on their own.”

Disclosure of the Chinese hacking against missile defenses comes as Syring and other military leaders revealed the Pentagon is working on its own cyber weapons that could be used to disable or destroy missiles prior to launch.

Details about what the Pentagon calls “left-of-launch” measures remain classified but are said to include cyber attacks and other electronic warfare measures against missile launch controls and other information systems.

Pre-launch cyber attacks against missiles are designed to bolster other missile defenses, including lasers and anti-missile interceptors, that can attack enemy missiles in the early, middle, and late stages of flight, while decreasing costs.

China is developing both missile defenses and anti-satellite missiles that employ similar technologies and are known to be targeting U.S. and allied computer networks to steal technical information useful in developing its weapons.

China also has targeted U.S. and foreign suppliers that provide equipment and material used in missile defenses.

A briefing in 2014 by Joyce Corell, a senior U.S. counterintelligence official, identified numerous pathways used by foreign states to penetrate the U.S. supply chain.

“We have more than enough evidence to know the threat is real and dangerous, but we will inevitably have difficulty predicting targets and assessing impacts,” she stated in a briefing slide.

U.S. Deploys Commandos to the Philippines

Why? Well as both Barack Obama and John Kerry tell us that Islamic State has lost territory, which may only be barely accurate in Iraq or Syria, they have gained a larger footprint globally and that includes the Philippines.

The Philippines-based jihadi group Abu Sayyaf Group released a new video with its Canadian, Filipino, and Norwegian hostages, giving a final deadline for their ransoms to be met and threatening to behead one of the four on April 25.

So we are deploying special forces to the region.

MANILA, Philippines— In a military buildup certain to inflame tensions with China, the United States said Thursday it will send troops and combat aircraft to the Philippines for regular, more frequent rotations, and will conduct more joint sea and air patrols with Philippine forces in the South China Sea.

In fact, Defense Secretary Ash Carter is in the region on has taken some time to board the carrier battle group the USS Stennis.

ABOARD THE USS JOHN C. STENNIS —U.S. Secretary of Defense Ash Carter on Friday made a second sail of the South China Sea, underscoring the U.S. commitment to its Asia-Pacific allies amid increasing tensions with China.

Carter said his presence on the aircraft carrier USS John C. Stennis, which was sailing about 60 to 70 miles West of the Philippines’ main island, Luzon Island, was to send “a message to the region.”

“The United States intends to continue to play a role in keeping peace and stability in this region’” said Carter, who was accompanied by Philippines defense minister Voltaire Gazmin.

What is the problem there you ask? Islamic State….the terror operation that is spreading to other regions in the world.

From Time magazine:

ISIS Is Making Inroads in the Southern Philippines and the Implications for Asia Are Alarming

Counter-terrorism operation in Philippines Anadolu Agency/Getty ImagesPhilippine army soldiers stage a counterterrorism operation against Maute terrorists, who are allegedly linked with ISIS, in Butig, the Philippine province of Lanao Del Sur, in Mindanao Island, on March 1, 2016

Islamist extremism is growing in Mindanao, with serious security implications for the region and beyond

Musa Muhammad stands at the site where 400 Islamist militants launched an invasion of the southern Philippine city of Zamboanga little over two years ago, sparking 20 days of heavy fighting with security forces. The ruins of his old house can be found there, amid several hundred other razed homes. Since then his family has lived in a sports stadium, refusing to move to a newly built house in another part of town.

“This has been our home for 50 years,” he says. “We’re afraid, but we’ll never leave.”

The Moros (“Moors”), as the Muslims of the southern Philippine region of Mindanao are called, are known for their intransigence. For centuries, they fought the Spanish, Americans and Japanese for their independence. Today, they are fighting Manila too. Some 120,000 people have died, and millions have been displaced, in the past 40 years of insurgency. (Muddying the picture, a separate communist insurgency is also sporadically waged in parts of Mindanao by the New People’s Army, which is thought to consist of some 3,200 fighters.)

Yet many Moros, like Musa, are not victims of a heavy-handed central government but the casualties of infighting among their own kin. The battle at Zamboanga, which led to the destruction of Musa’s home, started off when factions of one rebel group, the Moro National Liberation Front, wanted to signal their displeasure with the peace negotiations with Manila then being carried out by another rebel group, Moro Islamic Liberation Front. It took 3,000 troops to end the rebel occupation of several districts of the city, in an operation that saw 51 insurgents killed and drove 70,000 people from their homes.

Now those talks have stalled and, in the frustrated void that has followed their collapse, extremism has taken root. Several Moro outfits have pledged allegiance to terrorist group Islamic State of Iraq and Greater Syria (ISIS) and carried out attacks in its name.

One of those groups is the Abu Sayyaf militia, whose head Isnilon Hapilon — now styled Sheik Mujahid Abu Abdullah al-Filipini — has been appointed ISIS’s leader in the Philippines. Presently, the Philippine army is attempting to strike at the group’s jungle stronghold on the island of Basilan. In one of the bloodiest days for the armed forces in years, 18 soldiers were killed and over 50 wounded on April 9. ISIS claimed responsibility for the killings. Shortly after, Abu Sayyaf beheaded two Filipino hostages. (The group is also holding 10 Indonesians, two Canadians and a Norwegian captive.)

“It’s very likely that [Abu Sayyaf] will declare a satellite of the caliphate in the coming year,” says Rohan Gunaratna, an international terrorism expert at S. Rajaratnam School of Security Studies in Singapore. “Once that is done, it will be much more difficult to dismantle these groups.”

Already, up to 1,200 Southeast Asians have joined ISIS in the Middle East. Experts now worry that an ISIS stronghold in the southern Philippines will act as a regional lure, providing extremists from across Asia with a place to gain combat experience, before they set act to attack Asian targets or even targets further afield. The Jakarta attack in January that killed four civilians is just a taste of what could come, says Greg Barton, chair in global Islamic politics at Deakin University in Melbourne.

“Next time they won’t mess around with pistols but bring assault rifles,” says Barton. “That’s all it takes to turn amateurs into a lethal bunch of killers.”

Some claim that the biggest threat currently is that competing, ISIS-inspired groups would seek to upstage each other with small-scale attacks. However, organized, international networks still exist, even if the influence of al-Qaeda, which once funded training camps in the southern Philippines, has waned, along with that of its affiliates.

Indonesian operatives are already trading Syria-hardened tutors for weapons and training grounds in Mindanao, reports the ISIS Study Group, an intelligence collective run by the Washington, D.C., think tank Center for a New American Security. The area is evidently attracting insurgents from further afield too. Mohammad Khattab, an alleged bombmaking instructor from Morocco, was reportedly among the five killed militants on Basilan earlier in April. There have been rumors of Muslim Uighurs from China in the area. And in January last year, Zulkifli bin Hir — a Malaysian described as a key facilitator between Indonesian and Filipino extremist groups — was cornered and killed in Mamasapano in central Mindanao, but at the cost of 44 deaths among the Philippine army’s Special Action Force. Five civilians also lost their lives in an operation that turned the tide of support against President Benigno Aquino III’s peace negotiations with the Moro separatists.

“Before the Mamasapano tragedy, it looked really promising,” says Richard Javad Heydarian, a security expert at De La Salle University in Manila. “There were even rumors that Aquino would be nominated for the Nobel Peace Prize. Unfortunately a lot of journalists sensationalized the story, fanning anti-Muslim sentiment. Politicians running for office have then been trying to score political points on this.”

Further talk of a new, autonomous province within the Philippines for the Moro — it would be called Bangsamoro — has now been suspended until the general elections in May. In the meantime, says terrorism expert Gunaratna, intolerance is putting down deeper roots. As an example, he points to the March 1 assassination attempt on a Saudi cleric, Aaidh al-Qarni. The preacher, who has been on ISIS hit lists, was shot while visiting Western Mindanao State University in Zamboanga for a two-day symposium.

“Recent arrests in Malaysia and Indonesia clearly show that a new terror attack from ISIS in the region is imminent,” Gunaratna warns. “And the next one will be bloodier.”

Dept of Energy Computers, ah Really Nuclear Management

We often wonder just what kind of work the Department of Justice is doing if so many of the cases and crimes in the news never seem to have real consequences for the criminal…ahem Holder and Hillary.

Anyway, we will never know the scope of crimes that really do occur across the country and for sure those against the homeland from a foreign power or rogue actors.

There was the recent posting on this site about the industrial espionage or rather agricultural espionage by China against our farmers. Then there is the matter of drug cartels and money laundering.  For sure you can think of other cases and your comments are welcome.

Rarely do we understand the matter of cyber intrusions or attacks. The case noted below is but one such case.

Justice News

Department of Justice
U.S. Attorney’s Office
District of Columbia

Former U.S. Nuclear Regulatory Commission Employee Sentenced To Prison for Attempted Spear-Phishing Cyber-Attack On Department of Energy Computers

            WASHINGTON – Charles Harvey Eccleston, 62, a former employee of the U.S. Department of Energy (DOE) and the U.S. Nuclear Regulatory Commission (NRC), was sentenced today to 18 months in prison on a federal charge stemming from an attempted e-mail “spear-phishing” attack in January 2015 that targeted dozens of DOE employee e-mail accounts.

The sentencing was announced by Assistant Attorney General for National Security John P. Carlin, U.S. Attorney Channing D. Phillips of the District of Columbia, and Assistant Director in Charge Paul M. Abbate of the FBI’s Washington Field Office.

Eccleston pleaded guilty on Feb. 2, 2016, in the U.S. District Court for the District of Columbia, to one count of attempted unauthorized access and intentional damage to a protected computer.  In his guilty plea, Eccleston admitted scheming to cause damage to the computer network of the DOE through e-mails that he believed would deliver a computer virus to particular employees.  An e-mail spear-phishing attack involves crafting a convincing e-mail for selected recipients that appears to be from a trusted source and that, when opened, infects the recipient’s computer with a virus.

In addition to the prison time, U.S. District Judge Randolph D. Moss ordered Eccleston to forfeit $9,000, an amount equal to the sum the FBI provided to Eccleston during the course of the undercover investigation. Following his prison term, Eccleston will be placed on three years of supervised release.

“Eccleston’s sentence holds him accountable for his attempt to compromise, exploit and damage U.S. government computer systems that contained sensitive nuclear weapon-related information with the intent of allowing foreign nations to gain access to that information or to damage essential systems,” said Assistant Attorney General Carlin.  “One of our highest priorities in the National Security Division remains protecting our national assets from cyber intrusions.  We must continue to evolve and remain vigilant in our efforts and capabilities to confront cyber-enabled threats and aggressively detect, disrupt and deter them.”

“Charles Harvey Eccleston is a scientist and former government employee who was willing to betray his country and his former employer out of spite,” said U.S. Attorney Phillips.  “His attempts to sell access to sensitive computer networks demonstrate why the government must be so vigilant to prevent cyber-attacks. Thanks to the FBI, this defendant was apprehended before he could do any damage. Together with our law enforcement partners, we will continue to make the detection and prevention of cyber-crimes a top priority.”

“Today’s sentencing sends a powerful message that no one will be allowed to sabotage the U.S. Government’s cyber infrastructure or threaten our national security through the illicit sale of information to a foreign intelligence service,” said Assistant Director in Charge Abbate.  “The FBI will continue to investigate and pursue those who attempt to disclose sensitive knowledge about our nation’s information systems and bring them to justice.”

Eccleston, a U.S. citizen who had been living in Davao City in the Philippines since 2011, was terminated from his employment at the NRC in 2010.  He was detained by Philippine authorities in Manila, Philippines, on March 27, 2015, and deported to the United States to face U.S. criminal charges.  He has been in custody ever since.

According to court documents, Eccleston initially came to the attention of the FBI in 2013 after he entered a foreign embassy in Manila and offered to sell a list of over 5,000 e-mail accounts of all officials, engineers and employees of a U.S. government energy agency.  He said that he was able to retrieve this information because he was an employee of a U.S. government agency, held a top secret security clearance and had access to the agency’s network.  He asked for $18,800 for the accounts, stating they were “top secret.”  When asked what he would do if that foreign country was not interested in obtaining the U.S. government information the defendant was offering, the defendant stated he would offer the information to China, Iran or Venezuela, as he believed these countries would be interested in the information.

Thereafter, Eccleston met and corresponded with FBI undercover employees who were posing as representatives of the foreign country.  During a meeting on Nov. 7, 2013, he showed one of the undercover employees a list of approximately 5,000 e-mail addresses that he said belonged to NRC employees.  He offered to sell the information for $23,000 and said it could be used to insert a virus onto NRC computers, which could allow the foreign country access to agency information or could be used to otherwise shut down the NRC’s servers.  The undercover employee agreed to purchase a thumb drive containing approximately 1,200 e-mail addresses of NRC employees; an analysis later determined that these e-mail addresses were publicly available.  The undercover employee provided Eccleston with $5,000 in exchange for the e-mail addresses and an additional $2,000 for travel expenses.

Over the next several months, Eccleston corresponded regularly by e-mail with the undercover employees.  A follow-up meeting with a second undercover employee took place on June 24, 2014, in which Eccleston was paid $2,000 to cover travel-related expenses.  During this meeting, Eccleston discussed having a list of 30,000 e-mail accounts of DOE employees.  He offered to design and send spear-phishing e-mails that could be used in a cyber-attack to damage the computer systems used by his former employer.

Over the next several months, the defendant identified specific conferences related to nuclear energy to use as a lure for the cyber-attack, then drafted emails advertising the conference.  The emails were designed to induce the recipients to click on a link which the defendant believed contained a computer virus that would allow the foreign government to infiltrate or damage the computers of the recipients.  The defendant identified several dozen DOE employees whom he claimed had access to information related to nuclear weapons or nuclear materials as targets for the attack.

On Jan. 15, 2015, Eccleston sent the e-mails he drafted to the targets he had identified.  The e-mail contained the link supplied by the FBI undercover employee which Eccleston believed contained a computer virus, but was, in fact, inert.  Altogether, the defendant sent the e-mail he believed to be infected to approximately 80 DOE employees located at various facilities throughout the country, including laboratories associated with nuclear materials.

Eccleston was detained after a meeting with the FBI undercover employee, during which Eccleston believed he would be paid approximately $80,000 for sending the e-mails.

The investigation was conducted by the FBI’s Washington Field Office with assistance from the NRC and DOE.  The case is being prosecuted by Assistant U.S. Attorney Thomas A. Gillice of the District of Columbia and Trial Attorney Julie A. Edelstein of the National Security Division’s Counterintelligence and Export Control Section.  Trial Attorney Scott Ferber of the National Security Division’s Counterintelligence and Export Control Section assisted in the investigation of this matter.  The Department of Justice’s Office of International Affairs and the government of the Philippines also provided significant assistance.