ThreatCon Bravo and Background Information

Today, the military bases across the homeland have taken an extraordinary measure not seen since 2011, declaring ThreatCon Bravo.

Terrorist Threat Conditions

A Chairman of the Joint Chiefs of Staff-approved program standardizes the military services’ identification of and recommended responses to terrorist threats against U.S. personnel and facilities. This program facilitates interservice coordination and support for antiterrorism activities. Also called THREATCONs. There are four THREATCONs above normal:

THREATCON ALPHA THREATCON BRAVO THREATCON CHARLIE THREATCON DELTA
This condition applies when there is a general threat of possible terrorist activity against personnel and facilities, the nature and extent of which are unpredictable, and circumstances do not justify full implementation of THREATCON BRAVO measures. However, it may be necessary to implement certain measures from higher THREATCONS resulting from intelligence received or as a deterrent. The measures in this THREATCON must be capable of being maintained indefinitely. This condition applies when an increased and more predictable threat of terrorist activity exists. The measures in this THREATCON must be capable of being maintained for weeks without causing undue hardship, affecting operational capability, and aggravating relations with local authorities. This condition applies when an incident occurs or intelligence is received indicating some form of terrorist action against personnel and facilities is imminent. Implementation of measures in this THREATCON for more than a short period probably will create hardship and affect the peacetime activities of the unit and its personnel. This condition applies in the immediate area where a terrorist attack has occurred or when intelligence has been received that terrorist action against a specific location or person is likely. Normally, this THREATCON is declared as a localized condition. See also antiterrorism.

Texas incident fuels concern about lone-wolf terror attacks

DAVID CRARY and ERIC TUCKE, Associated Press

NEW YORK (AP) — The attempted attack on a provocative cartoon contest in Texas appears to reflect a scenario that has long troubled national security officials: a do-it-yourself terror plot, inspired by the Islamic State extremist group and facilitated through the ease of social media.

Trying to gauge which individuals in the United States pose such threats — and how vigorously they should be monitored — is a daunting challenge for counterterrorism agencies. Some experts caution that a limited number of small-scale attacks are likely to continue.

Michael McCaul, chairman of the House Homeland Security Committee, said federal authorities are aware of “thousands” of potential extremists living in the U.S., only a small portion of whom are under active surveillance.

Concerns have been intensifying since the rise of the Islamic State group and were heightened this week after two gunmen were shot dead while trying to attack the event in Garland, Texas, that featured cartoon images of the Prophet Muhammad. One of the men, Elton Simpson of Phoenix, was charged in 2010 after being the focus of a terror investigation; investigators are trying to determine the extent of any terror-related ties involving him or his accomplice, Nadir Soofi.

At the White House, Press Secretary Josh Earnest said intelligence officials would be investigating Islamic State’s claim of responsibility.

“This is consistent with what has previously been described as a lone-wolf attack,” Earnest said. “Essentially you have two individuals that don’t appear to be part of a broader conspiracy, and identifying those individuals and keeping tabs on them is difficult work.”

Terrorism experts say the spread of social media, and savvy use of it by extremist groups, has facilitated a new wave of relatively small-scale plots that are potentially easy to carry out and harder for law enforcement to anticipate.

While plots orchestrated by al-Qaida have historically involved grandiose plans designed to yield mass carnage — including airline bombings or attacks on transportation systems — the Islamic State group has endorsed less ambitious efforts that its leaders say can have the same terrorizing effect.

“If you can get your hands on a weapon, how is the state security apparatus supposed to find you?” said Will McCants, a fellow in the Center for Middle East Policy at the Brookings Institution in Washington. “It’s attractive because it gets just as much attention as a small- to mid-size bomb.”

A public forum like Twitter, with its millions of users, means those who might otherwise have had limited exposure to terrorist ideologies now have ample access to what FBI Director James Comey has described as the “siren song” of the Islamic State. Social media provides a venue for agitators to exhort each other to action, recruit followers for violence and scout locations for potential attacks.

A former Minneapolis man who goes by the name Mujahid Miski on Twitter was among those urging an attack on the event in Garland. A law enforcement official familiar with the investigation confirmed to The Associated Press that Mujahid Miski is Mohamed Abdullahi Hassan, who left the U.S. in 2008 to join al-Shabab in Somalia. The official spoke on condition of anonymity because details of the investigation are not public.

Hassan has been prolific on social media in recent months — urging his Twitter followers to carry out acts of violence in the U.S., including beheadings — commending attacks elsewhere, and using protests of police activity in Ferguson, Missouri, and Baltimore, Maryland, to try to recruit others.

The phenomenon poses a challenge for investigators as they sift through countless online communications.

“Where is the threshold of saying this is more than just an avid consumer of propaganda?” asked William Braniff, executive director of a terrorism research center at the University of Maryland and a former instructor at the U.S. Military Academy‘s Combating Terrorism Center.

“It’s exceptionally difficult to estimate of the number of people who’ve considered becoming foreign fighters,” he said. “Often you’re not dealing with specific behaviors, but with expressions of belief, which are constitutionally protected.”

U.S. officials say that more than 3,400 people from Western countries — including nearly 180 from the U.S. — have gone to Syria or Iraq, or attempted to do so, to fight on behalf of Islamic State or other extremists groups.

Although there is concern that fighters returning to the U.S. might pose a terrorism threat, some experts say a more immediate danger is posed by individuals in America who are inspired by these extremist groups yet have no direct ties to them.

Such individuals “can be motivated to action, with little to no warning,” National Counterterrorism Center director Nicholas Rasmussen told the House Committee on Homeland Security in February. “Many of these so-called homegrown violent extremists are lone actors, who can potentially operate undetected and plan and execute a simple attack.”

He predicted that the threat posed by these individuals will remain stable, “resulting in fewer than 10 uncoordinated and unsophisticated plots annually from a pool of up to a few hundred individuals.”

The online propaganda can be alluring, even to U.S. residents leading comfortable lives, said Peter Bergen, director of International Security Program at the public policy institute New America.

In testimony Bergen planned to give Thursday before the Senate Homeland Security Committee, he says some Islamic State group recruits are motivated by the same level of idealism as young people who join the Marines or the Peace Corps. In their view, Bergen asserts, the extremist group “is doing something that is of cosmic importance.”

Daniel Benjamin, former coordinator for counterterrorism at the State Department and now director of a global issues center at Dartmouth College, said the lone-wolf terrorist phenomenon is not new, but has taken on a new character due to the aggressive military and propaganda activities of the group also known as ISIS.

“What is new is the level of excitement among extremists,” Benjamin said. “The feeling is that ISIS has done what al-Qaida couldn’t — it has held territory, it has damaged armies much larger than it is.”

Benjamin cautions that low-level, lone-wolf attacks may be difficult to stamp out, and said Americans should not let such attacks demoralize them.

Long before this week, the lone-wolf scenario manifested itself when Army Maj. Nidal Hasan, who had been inspired by a radical Yemen-based preacher, killed 13 people at Fort Hood in 2009.

Government officials have acknowledged that surveillance programs, however diligent, aren’t the full answer to thwarting terrorism. Among the preventive strategies is a federal program launched last fall called Countering Violent Extremism, which aims to encourage community engagement to thwart radicalization. It’s been tested in Los Angeles, Boston and Minneapolis-St. Paul.
[3:24:28 PM] The Denise Simon Experience: Bergen, in his prepared testimony for the Senate committee, said relatives of potential Islamic state group recruits might be more willing to inform authorities if the family member faced options other than a long prison term. He suggested some sort of mix of a token prison term, followed by probation and counseling services.

 

 

 

 

The Denise Simon Experience Radio Show Archive: 04/23/15


Tonight, Denise hosted a round table with Joel Arends, a 21 year active and reserve duty Iraq veteran, accomplished lawyer and Chairman of Veterans for a Strong America.

Topics covered the devastation of sequestration of the military having major implications in the near future where America cannot keep pace with global adversaries like Russia and China.

And in hour 2, Kyle Orton, a Counter-terrorism expert from the United Kingdom spoke to conditions in the Middle East, the threat matrix and estimates for what may come in the near future with regard to hostilities around the globe.

BROADCAST LIVE WORLDWIDE:  THURSDAYS – 9:00PM (eastern) / 6:00pm (pacific) on the following networks:

WDFP – Restoring America Radio
Red State Talk Radio
Nightside Radio Studios

TalkStreamLive

The Leading Edge Radio Network

Talk 92.1 WDDQ
American Agenda Radio
UNIR1 Radio
TuneIn Radio
Stand Up America US Radio
Streema Radio

There is Spying, Espionage and Stupidity

The Virginia-based cyber security firm Mandiant recently released a report detailing one source of persistent cyber attacks, the Chinese People’s Liberation Army. Mandiant estimates that since 2006, a single Chinese army cyberattack unit has compromised “141 companies spanning 20 major industries, from information technology and telecommunications to aerospace and energy,” using a “well-defined attack methodology, honed over years and designed to steal large volumes of valuable intellectual property.”

Mandiant explains that once these hackers have infiltrated an organization’s system, they “periodically revisit the victim’s network … and steal broad categories of intellectual property, including technology blueprints, proprietary manufacturing processes, test results, business plans, pricing documents, partnership agreements, and emails and contact lists”. On average, access to a victimized network is maintained for nearly a year.

Now for the Chinese human operatives….

State Dept. contractor allegedly paid by Chinese agent to spy on Americans – yet no charges filed 

Newly unsealed court documents obtained by Fox News show a State Department contractor allegedly was paid thousands by an individual thought to be a Chinese agent in exchange for information on Americans — but despite an FBI probe, the Justice Department declined to prosecute.

A November 2014 FBI affidavit, filed in the U.S. District Court for the District of Maryland, shows the bureau investigated the contractor for her admitted contact with individuals she believed to be Chinese intelligence officers.

The affidavit from agent Timothy S. Pappa states the translator, Xiaoming Gao, was paid “thousands of dollars to provide information on U.S. persons and a U.S. government employee.”

According to the documents, she admitted these meetings took place in hotel rooms in China for years, where she reported on her “social contacts” in the U.S. to an individual who went by the name of “Teacher Zhao.”

The detailed affidavit even goes on to say the translator briefly lived, “for free,” with a State Department employee — who held a top-secret clearance and designed high-security embassies, including the U.S. compound in Islamabad, Pakistan.

The State Department employee, who was not named, initially told the FBI he didn’t discuss his job with Gao, but later changed his statement.

According to the documents, Gao also told the FBI — during interviews in 2013 — that she once told “Teacher Zhao” about the travel plans of an American and ethnic Tibetan. This person told the FBI he ended up being interrogated by Chinese intelligence officers during a trip to Tibet, and a member of his family was imprisoned.

Yet the U.S. attorney’s office in Washington, D.C., which oversaw the case, recently declined to prosecute, allowing the documents to be unsealed. The office offered no further comment. The FBI also is saying nothing beyond the court documents that were filed to search a storage unit in suburban Washington, D.C.

On its face, a former senior Justice Department official said the decision not to prosecute is perplexing, because the case was unlikely to reveal investigative sources and methods.

“It’s not clear to me, based on the court files that were unsealed, how a prosecution of this person could possibly have compromised U.S. intelligence gathering,” Thomas Dupree, former deputy assistant attorney general under the George W. Bush administration, told Fox News. “If it jeopardizes or threatens to disrupt relations with another country, so be it. That you have to draw the line somewhere, and that we need to send a message that this sort of conduct and activity simply will not be tolerated.”

The State Department confirmed Xiaoming Gao worked for the Office of Language Services over a four-year period beginning in June 2010. This would have covered the tenures of former Secretary of State Hillary Clinton and sitting Secretary John Kerry.

“She was employed as a contract interpreter until February 2014, is not employed here anymore. And so any additional questions on this, I’d refer you to the FBI,” spokeswoman Marie Harf said.

When told the FBI was referring Fox News’ questions back to State, Harf responded: “I’m referring you back to them.”

The documents do not fully explain Gao’s side of the story.

Emails and phone calls to the consulting firm, which the translator listed on the web as her employer, have gone unanswered. Fox News extended an invitation to discuss the allegations. No attorney of record was filed with the court.

 

Clinton Foundation(s) Collusion

From their website:

Creating Partnerships of Purpose We convene businesses, governments, NGOs, and individuals to improve global health and wellness, increase opportunity for women and girls, reduce childhood obesity

New Book, ‘Clinton Cash,’ Questions Foreign Donations to Foundation

The book does not hit shelves until May 5, but already the Republican Rand Paul has called its findings “big news” that will “shock people” and make voters “question” the candidacy of Hillary Rodham Clinton.

“Clinton Cash: The Untold Story of How and Why Foreign Governments and Businesses Helped Make Bill and Hillary Rich,” by Peter Schweizer — a 186-page investigation of donations made to the Clinton Foundation by foreign entities — is proving the most anticipated and feared book of a presidential cycle still in its infancy.

The book, a copy of which was obtained by The New York Times, asserts that foreign entities who made payments to the Clinton Foundation and to Mr. Clinton through high speaking fees received favors from Mrs. Clinton’s State Department in return.

“We will see a pattern of financial transactions involving the Clintons that occurred contemporaneous with favorable U.S. policy decisions benefiting those providing the funds,” Mr. Schweizer writes.

His examples include a free-trade agreement in Colombia that benefited a major foundation donor’s natural resource investments in the South American nation, development projects in the aftermath of the Haitian earthquake in 2010, and more than $1 million in payments to Mr. Clinton by a Canadian bank and major shareholder in the Keystone XL oil pipeline around the time the project was being debated in the State Department.

In the long lead up to Mrs. Clinton’s campaign announcement, aides proved adept in swatting down critical books as conservative propaganda, including Edward Klein’s “Blood Feud,” about tensions between the Clintons and the Obamas, and Daniel Halper’s “Clinton Inc.: The Audacious Rebuilding of a Political Machine.”

But “Clinton Cash” is potentially more unsettling, both because of its focused reporting and because major news organizations including The Times, The Washington Post and Fox News have exclusive agreements with the author  to pursue the story lines found in the book.

Members of the Senate Foreign Relations Committee, which includes Mr. Paul and Senator Marco Rubio of Florida, have been briefed on the book’s findings, and its contents have already made their way into several of the Republican presidential candidates’ campaigns.

Conservative “super PACs” plan to seize on “Clinton Cash,” and a pro-Democrat super PAC has already assembled a dossier on Mr. Schweizer, a speechwriting consultant to former President George W. Bush and a fellow at the conservative Hoover Institution who has contributed to the conservative website Breitbart.com, to make the case that he has a bias against Mrs. Clinton.

And the newly assembled Clinton campaign team is planning a full-court press to diminish the book as yet another conservative hit job.

A campaign spokesman, Brian Fallon, called the book part of the Republicans’ coordinated attack strategy on Mrs. Clinton “twisting previously known facts into absurd conspiracy theories,” and he said “it will not be the first work of partisan-fueled fiction about the Clintons’ record, and we know it will not be the last.”

The timing is problematic for Mrs. Clinton as she begins a campaign to position herself as a “champion for everyday Americans.”

From 2001 to 2012, the Clintons’ income was at least $136.5 million, Mr. Schweizer writes, using a figure previously reported in The Post. “During Hillary’s years of public service, the Clintons have conducted or facilitated hundreds of large transactions” with foreign governments and individuals, he writes. “Some of these transactions have put millions in their own pockets.”

The Clinton Foundation has come under scrutiny for accepting foreign donations while Mrs. Clinton served as secretary of state. Last week, the foundation revised its policy to allow donations from countries like Germany, Canada, the Netherlands and Britain but prohibit giving by other nations in the Middle East.

Mr. Schweizer’s book will be released the same day former President Bill Clinton and the Clintons’ daughter, Chelsea, will host the Clinton Global Initiative gathering with donors in Morocco, the culmination of a foundation trip to several African nations. (A chapter in the book is titled “Warlord Economics: The Clintons Do Africa.”)

There is a robust market for books critical of the Clintons. The thinly sourced “Blood Feud,” by Mr. Klein, at one point overtook Mrs. Clinton’s memoir “Hard Choices” on the best-seller list.

But whether Mr. Schweizer’s book can deliver the same sales is not clear. He writes mainly in the voice of a neutral journalist and meticulously documents his sources, including tax records and government documents, while leaving little doubt about his view of the Clintons.

His reporting largely focuses on payments made to Mr. Clinton for speeches, which increased while his wife served as secretary of state, writing that “of the 13 Clinton speeches that fetched $500,000 or more, only two occurred during the years his wife was not secretary of state.”

In 2011, Mr. Clinton made $13.3 million in speaking fees for 54 speeches, the majority of which were made overseas, the author writes.

*** Now the questions that need to be asked include what policies did the State Department, the NSC and the White House take covertly with regard to diplomacy and those affects on strategies.

The Cyber-Threats to SCADA Increasing

Dell has reached out to this site with updated/corrected links for the item below:

Please refer to https://www.quest.com and https://www.quest.com/solutions/network-security/

What is SCADA? A computerized system that controls all national infrastructure. This includes water, power grids, transportation and supply chains.

In 2012:

The last “INTERNET SECURITY THREAT REPORT published by Symantec reports that in 2012, there were eighty-five public SCADA vulnerabilities, a massive decrease over the 129 vulnerabilities in 2011. Since the emergence of the Stuxnet worm in 2010, SCADA systems have attracted more attention from security researchers.

Today, 2015 there is a significantly more chilling condition.

 

A recent report published by Dell revealed a 100 percent increase in the number of attacks on industrial control (SCADA) systems.

The new Dell Annual Threat Report revealed that the number of attacks against supervisory control and data acquisition (SCADA) systems doubled in 2014 respect the previous year. Unfortunately, the majority of incidents occurred in SCADA systems is not reported. The experts confirmed that in the majority of cases the APT are politically motivated.

“Attacks against SCADA systems are on the rise, and tend to be political in nature as they target operational capabilities within power plants, factories, and refineries,” the researchers explained. “We saw worldwide SCADA attacks increase from 91,676 in January 2012 to 163,228 in January 2013, and 675,186 in January 2014.”

The countries with the greatest number of attacks are the Finland, the United Kingdom, and the United States, where online SCADA systems are widespread.

“In 2014, Dell saw 202,322 SCADA attacks in Finland, 69,656 in the UK, and 51,258 in the US” continues the report.

The experts noticed that buffer overflow is the vulnerability in SCADA system most exploited by hackers (25%), among other key attack methods there are the lack of input validation (9%) and Information Exposure (9%).

SCADA Attack methods Dell Report

 

Security experts speculate that the number of the attacks will continue to increase in the next years.

“This lack of information sharing combined with the vulnerability of industrial machinery due to its advanced age means that we can likely expect more SCADA attacks to occur in the coming months and years.” states the report.

 

The data published by Dell are aligned with the findings included in a report recently published by the ICS-CERT. The CERT responded to 245 incidents in Fiscal Year 2014, more than half of the incidents reported by asset owners and industry partners involved sophisticated APT.

Let’s closed with the suggestions provided by Dell experts to protect SCADA systems from attacks:

  • Make sure all software and systems are up to date. Too often with industrial companies, systems that are not used every day remain installed and untouched as long as they are not actively causing problems. However, should an employee one day connect that system to the Internet, it could become a threat vector for SCADA attacks.
  • Make sure your network only allows connections with approved IPs.
  • Follow operational best practices for limiting exposure, such as restricting USB ports if they aren’t necessary and ensuring Bluetooth is disabled.
  • In addition, reporting and sharing information about SCADA attacks can help ensure the industrial community as a whole is appropriately aware of emerging threats.