Obama Admin Rewards China in Spite of Hacking

Primer:

Every president stays at the Waldorf Astoria in New York especially during a United Nations General Assembly. Yet, since China bought the iconic hotel, the White House has expressed real concerns over intelligence conflicts, spying and hacking, hence Obama will not use the Waldorf hotel during his stay.

The Crime, Chinese Hacking

Report: Chinese Hackers Used OPM Data To Steal US Military Intel; ‘Significant Risk To US Military’

EXCLUSIVE TO FORBES: Screen shot of directory of data stolen by Iron Tiger from U.S. Defense Contractor Source: Trend Micro

Chinese hackers used data stolen from April’s OPM breach in recent thefts of terabytes of sensitive data from U.S. defense contractors, according to Trend Micro’s Vice President of Cybersecurity Thomas Kellerman. As previously reported, Trend Micro published a report on Thursday entitled Operation Iron Tiger, detailing these extensive confirmed breaches by Chinese cyber spies.

In followup to yesterday’s article on this report, I interviewed Kellerman and had further discussions last night with Dr. Ziv Chang, Sr. Director, Cyber Safety Solutions, Core Technology at Trend Micro and lead author on the report. No contact has been made with Trend representatives since last night. Kellerman stated during that interview that he believes OPM data was used in formulating the attacks discussed in the Iron Tiger Report.

OPM data was used in formulating attacks on U.S. military interests

Kellerman said he believes that data stolen from the U.S. Office of Personnel Management in the April 2015 breach of the OPM systems has been and is being used by Chinese cyber spies, named by Trend Micro as “Iron Tiger.” He said that the OPM data enabled Iron Tiger to precisely target U.S. military contractor victims as well as to know the types of information each victim would hold, determine the best methods to use to attack them and to execute attacks.

Theft of highly-sensitive, mission critical data 

When asked to characterize the types of data that Iron Tiger targeted on contractor systems Chang commented that the following types of data were targeted and exfiltrated:

  • Base Operations Support
  • Engineering, Procurement & Construction
  • Information Technology & Systems Engineering
  • Intelligence Analytics & Training
  • Language & Cultural Analysis
  • Operations and Maintenance
  • Security Assessment & Training

 

Stolen data presents a significant and serious risk to US military interests

Both Kellerman and Chang confirmed when asked that the data stolen by Iron Tiger presented a significant and serious risk to U.S. military interests and operations. Kellerman said that appropriate representatives within the US government had been notified and provided a copy of the report as well as all relevant details not included in the report such as victim (target) names and data stolen, two days before Trend Micro made the report public on its site. The latest data hacks by Iron Tiber on U.S. military interests were observed was August 21, 2015.

Kellerman stated that he believes the attacks are ongoing but may be slowed in response to global discussions about possible sanctions for breaches on civilian entites. Trend Micro is continuing to monitor the group and will report to victims and authorities as appropriate, Kellerman said. Much more here.

The Reward for China

A computer rendering of the XpressWest train.

China, U.S. Reach Agreement on High-Speed Rail Before Xi Visit

Bloomberg: A China Railway Group-led consortium andXpressWest Enterprises LLC will form a joint venture to build a high-speed railway linking Las Vegas and Los Angeles, the first Chinese-made bullet-train project in the U.S.

Construction of the 370-kilometer (230-mile) Southwest Rail Network will begin as soon as next September, according to a statement from Shu Guozeng, an official with the Communist Party’s leading group on financial and economic affairs. The project comes after four years of negotiations and will be supported by $100 million in initial capital. The statement didn’t specify the project’s expected cost or completion date.

The agreement, signed days before PresidentXi Jinping’s state visit to the U.S., is a milestone in China’s efforts to market its high-speed rail technology in advanced economies. The country has beenpushing the technology primarily in emerging markets — often with a sales pitch from PremierLi Keqiang– as a means to project political influence. A $567 million contract last October to supply trains forBoston’s subway system was China’s first rail-related deal in the U.S.

The agreement also represents an important victory in China’s high-speed rail rivalry withJapan, as the two countries havecompeted for train contracts throughout Asia. The parent company ofJR Central, Japan’s largest bullet-train maker, hadexpressed interest in the Los Angeles-Las Vegas line several years ago, and China and Japan are both expected tobid to supply train cars for a proposed high-speed rail line in California’s Central Valley.

“This is the first high-speed railway project where China and the U.S. will have systematic cooperation,” Yang Zhongmin, a deputy chief engineer with China Railway Group, said after a news conference in Beijing. “It shows the advancement of China-made high-speed railways.”

The Los Angeles-Las Vegas project will create new technology, manufacturing and construction jobs in the region, Shu’s statement said.

Through July, China had built more than 17,000 kilometers (10,565 miles) of domestic high-speed rail lines, according to the officialXinhua News Agency.

Apart from the railway project, China National Machinery Industry Corp. andGeneral Electric Co. signed a memo of understanding to invest $327 million to develop 60 wind power stations in Kenya, Shu said at the Beijing news conference.

During Xi’svisit starting next week, China and the U.S. are expected to reach agreements on trade, energy, climate, finance, aviation, defense and infrastructure construction, China Foreign MinisterWang Yi said Wednesday. Xi is due to visitBoeing Co.’s factory in Everett, Washington as China makes a push to build its own passenger planes.

“Economic and trade cooperation will be a major topic for president Xi’s visit to the U.S.,” Shu said in Beijing. “China and the U.S. share common interests and have solid foundation for cooperation.”

U.S. Confrontation, Obama Tells Navy Put Tail Between Propellers

U.S. Navy video

Obama Blocks Navy from Sailing Near Disputed Chinese islands

FreeBeacon: The Obama administration has restricted the U.S. Pacific Command from sending ships and aircraft within 12 miles of disputed Chinese-built islands in the South China Sea, bolstering Beijing’s illegal claims over the vital seaway, Pentagon leaders revealed to Congress on Thursday.

“The administration has continued to restrict our Navy ships from operating within 12 nautical miles of China’s reclaimed islands,” Senate Armed Services Committee Chairman Sen. John McCain (R., Ariz.) said in opening remarks criticizing the failure to guarantee safe passage for international commercial ships in Asia.

“This is a dangerous mistake that grants de facto recognition of China’s man-made sovereignty claims,” he said.

The South China Sea is a strategic waterway used to transport $5 trillion annually in goods, including $1.2 trillion in trade to the United States.

David Shear, assistant defense secretary for Asian and Pacific affairs, sought to play down the restrictions on Navy ship transits close to the islands. According to Shear, a regional freedom of navigation exercise took place in April and the tactic is “one tool in a larger tool box … and we’re in the process of putting together that tool box.”

Shear acknowledged that “we have not recently gone within 12 miles of a reclaimed area,” noting the last time a Navy ship sailed that close to a Chinese-built island was 2012.

The disclosure undermines statements made Wednesday by Defense Secretary Ash Carter who said the United States would not be coerced by China into not operating ships or aircraft in Asia. Carter said the United States “will continue to protect freedom of navigation and overflight.”

Shear insisted that in recent years the U.S. military has challenged “every category of Chinese claim in the South China Sea, as recently as this year.”

Blocking China from militarizing the new islands could include a range of options, including freedom of navigation operations, he said.

McCain, however, noted that the U.S. restrictions on close-in island military flights and ship visits were continuing despite the provocative dispatch of five Chinese warships in an unprecedented deployment to waters within 12 miles of Alaska’s Aleutian Islands—at the same time President Obama was concluding a recent visit to the state earlier this month.

A visibly angered McCain told Shear the best way to assert that international waters around the islands do not belong to China would be for American ships to make 12-mile passages by the disputed islands. “And we haven’t done that since 2012. I don’t find that acceptable, Mr. Secretary,” he said.

Adm. Harry Harris, commander of the U.S. Pacific Command, was asked if he is authorized to order ships to travel within 12 miles of any of the man-made islands and answered, no. Harris also said no U.S. surveillance aircraft have flown directly over any of the islands.

Asked why not, Harris stated: “I’ll just [say] that Pacom presents options, military options to the secretary. And those options come with a full range of opportunities in the South China Sea, and we’re ready to execute those options when directed.”

The restrictions appear to be an element of the Obama administration’s conciliatory policies toward China that have increased in the months leading up to the planned visit to Washington next week by Chinese President Xi Jinping.

The administration also has not taken steps to penalize China for large-scale hacking of U.S. government and private sector databases, although sanctions are planned.

China has been building islands on several reefs within the South China Sea for the past several years near the Paracels, in the northwestern sea, and near the Spratlys, near the Philippines. Several nations, including Vietnam, Philippines, and Malaysia have challenged Chinese claims to maritime sovereignty.

After ignoring the island building for several years, the Obama administration earlier this year began pressing the Chinese to halt the construction. The U.S. appeals were ignored.

A Chinese admiral recently declared that the entire South China Sea is China’s maritime territory.

“The South China Sea is no more China’s than the Gulf of Mexico is Mexico’s,” said Harris, who described himself as critic of China’s maritime behavior and large-scale military buildup.

Harris made clear implicitly during the hearing he did not agree with the restrictions on transit near the disputed islands but has been overruled by the president and secretary of defense.

“I think that we must exercise our freedom of navigation throughout the region …,” Harris said.

Pressed for his views on whether close passage of U.S. ships in the sea should be permitted, Harris said: “I believe that we should [be] allow[ed] to exercise freedom of navigation and flight—maritime and flight in the South China Sea against those islands that are not islands.”

Asked if he has requested permission for close-in island transits, Harris would not say, stating only that he has provided policy options for doing so to civilian leaders.

Harris said Pacific command surface ship commanders and crews, as well as Air Force pilots and crews, have orders when operating near China to “insist on our right to operate in international airspace and maritime space” and to respond professionally when challenged by Chinese warships or interceptor jets.

The four-star admiral warned that more incidents, such as the dangerous aerial intercept of a P-8 surveillance jet by a Chinese jet in 2014, are possible after China finishes building runways on Fiery Cross Reef and two other reefs.

With missiles, jet fighters, and warships stationed on the islands, “it creates a mechanism by which China would have de facto control over the South China Sea in any scenario short of war,” he said.

In a conflict the sites could be easily targeted, but “short of that, militarization of these features pose a threat, and certainly it poses a threat against all other countries in the region,” he said.

Shear also said the island militarization is a concern.

“The Chinese have not yet placed advanced weaponry on those features and we are going to do everything we can to ensure that they don’t,” Shear said. “This is going to be a long-term effort. There are no silver bullets in this effort. But we’re certainly complicating Chinese calculations already.”

Shear said U.S. forces are continuing to operate freely in the region and have deterred Chinese coercion of regional states.

“That we freely operate in the South China Sea is a success? It’s a pretty low bar, Mr. Secretary,” McCain said.

China’s dispatch of five warships to waters near the Bering Strait followed recent joint exercises with the Russians, after which the Chinese ships sailed near Alaska to demonstrated the ships’ ability to operate in the far north, Harris said, noting that he viewed the timing to the president’s Alaska visit as “coincidental.”

Sen. Dan Sullivan, (R., Alaska) said the Chinese action was a “provocation” and criticized the administration’s weak response. The Pentagon dismissed the Chinese ship transit as legal under international law.

“I thought it was more of a provocation and a demonstration of their interest in the Arctic,” Sullivan said. “I’m not sure that this White House would recognize a provocation if it was slapped in the face, and we need to be aware of that.”

Harris also said he is concerned by China deploying submarines, including nuclear missile submarines, further from its shores.

“We’re seeing Chinese submarine deployments extend further and further, almost with every deployment,” he said. “It has become routine for Chinese submarines to travel to the Horn of Africa region and North Arabian Sea in conjunction with their counter piracy task force operations. We’re seeing their ballistic missiles submarines travel in the Pacific at further ranges and of course all of those are of concern.”

China’s claims to have halted island construction and militarization on some 3,000 acres are false, McCain said.

“Recently released satellite images show clearly this is not true,” the senator said. “What’s more, China is rapidly militarizing this reclaimed land, building garrisons, harbors, intelligence, and surveillance infrastructure, and at least three air strips that could support military aircraft.”

Surface-to-air missiles and radars also could be added enabling China “to declare and enforce an air defense identification zone in the South China Sea, and to hold that vital region at risk,” McCain added.

Shear said the island building is nearly completed.

Meanwhile in the House, Rep. J. Randy Forbes (R., Va.), chairman of the House Armed Services subcommittee on seapower, led a group of 29 members of Congress in writing to President Obama and Carter, the defense secretary, urging the lifting of the restrictions on naval and air operations near the disputed islands.

“The longer the United States goes without challenging China’s unfounded claims to sovereignty over these artificial formations—and to territorial waters and exclusive economic rights in the surrounding water—the greater the consequences will be for regional security,” the lawmakers stated in the Sept. 17 letter.

“It is our belief that the Defense Department should act immediately to reaffirm the United States’ commitment to freedom of navigation and the rule of law.”

Hacking the Department of Energy, the Threat to You

The USDOEnergy is a cabinet level department and while responsibility includes power, laboratories, it includes nuclear. The agency secretary is Earnest Moniz, most notable for being at the side of John Kerry during the Iran nuclear talks.

Hacking this agency is terrifying and added into this equation, in 1999 the FBI investigated how China obtained specific specifications for a particular nuclear device from Los Alamos National Laboratory.

Records: Energy Department struck by Cyber Attacks

USAToday: Attackers successfully compromised U.S. Department of Energy computer systems more than 150 times between 2010 and 2014, a review of federal records obtained by USA TODAY finds.

Cyber attackers successfully compromised the security of U.S. Department of Energy computer systems more than 150 times between 2010 and 2014, according to a review of federal records obtained by USA TODAY.

Incident reports submitted by federal officials and contractors since late 2010 to the Energy Department’s Joint Cybersecurity Coordination Center shows a near-consistent barrage of attempts to breach the security of critical information systems that contain sensitive data about the nation’s power grid, nuclear weapons stockpile and energy labs.

The records, obtained by USA TODAY through the Freedom of Information Act, show DOE components reported a total of 1,131 cyberattacks over a 48-month period ending in October 2014. Of those attempted cyber intrusions, 159 were successful.

“The potential for an adversary to disrupt, shut down (power systems), or worse … is real here,” said Scott White, Professor of Homeland Security and Security Management and Director of the Computing Security and Technology program at Drexel University. “It’s absolutely real.”

Energy Department officials would not say whether any sensitive data related to the operation and security of the nation’s power grid or nuclear weapons stockpile was accessed or stolen in any of the attacks, or whether foreign governments are believed to have been involved.

“DOE does not comment on ongoing investigations or possible attributions of malicious activity,” Energy Department spokesman Andrew Gumbiner said in a statement.

In all cases of malicious cybersecurity activity, Gumbiner said the Energy Department “seeks to identify indicators of compromise and other cybersecurity relevant information, which it then shares broadly amongst all DOE labs, plants, and sites as well as within the entire federal government.”

The National Nuclear Security Administration, a semi-autonomous agency within the Energy Department responsible for managing and securing the nation’s nuclear weapons stockpile, experienced 19 successful attacks during the four-year period, records show.

While information on the specific nature of the attacks was redacted from the records prior to being released, numerous Energy Department cybersecurity vulnerabilities have been identified in recent years by the department’s Office of Inspector General, an independent watchdog agency.

After a cyber attack in 2013 resulted in unauthorized access to personally identifying information for more than 104,000 Energy Department employees and contractors, auditors noted “unclear lines of responsibility” and “lack of awareness by responsible officials.” In an audit report released in October of last year, the Inspector General found 41 Energy Department servers and 14 workstations “were configured with default or easily guessed passwords.”

Felicia Jones, spokeswoman for the Energy Department Office of Inspector General, said while there have been some improvements, “threats continue and the Department cannot let down its guard.”

Records show 53 of the 159 successful intrusions from October 2010 to October 2014 were “root compromises,” meaning perpetrators gained administrative privileges to Energy Department computer systems.

Manimaran Govindarasu, a professor in the Department of Electrical and Computer Engineering at Iowa State University who studies cybersecurity issues involving the power grid, said the root compromises represent instances where intruders gained “super-user” privileges.

“That means you can do anything on the computer,” he said. “So that is definitely serious. Whether that computer was critical or just a simple office computer, we don’t know.”

Govindarasu said while there could be information in Energy Department computer systems concerning security plans or investments related to the nation’s power grid, the grid’s real-time control systems are operated by utilities and are not directly connected to the Energy Department’s computer systems.

The Energy Department federal laboratories, however, sometimes pull data on the operation of the grid from utilities for research and analysis.

Records show 90 of the 153 successful cyber intrusions over the four-year period were connected to the DOE’s Office of Science, which directs scientific research and is responsible for 10 of the nation’s federal energy laboratories.

A USA TODAY Media Network report in March found a physical or cyber attack nearly once every four days on the nation’s power infrastructure, based on an analysis of reports to the U.S. Department of Energy through a separate reporting system which requires utility companies to notify the federal agency of incidents that affect power reliability.

Amid mounting concerns, the oversight and energy subcommittees of the House Committee on Science, Space and Technology will hold a joint hearing at 10 a.m. Thursday to examine vulnerabilities of the national electric grid and the severity of various threats.

The congressional committee’s charter for Thursday’s meeting, citing USA TODAY’s report in March, notes the growing vulnerability of the nation’s increasingly sophisticated bulk electric system.

“As the electric grid continues to be modernized and become more interconnected,” the charter states, “the threat of a potential cybersecurity breach significantly increases.”

Example: Depths of Chinese Hacking the U.S.

Former Top FBI Lawyer and Counterintelligence Official Admits Chinese Hacked His Home Computer

September 8, 2015

China Allegedly Hacked Top Former FBI Lawyer 

Jeff Stein, Newsweek

Marion “Spike” Bowman, a top former FBI lawyer and U.S. counterintelligence official who heads an influential organization of retired American spies, says a hacker from China penetrated his home computer, beginning with an innocent-looking email last spring.

“It was an email supposedly from a woman in China, and I exchanged correspondence with her a couple of times,” says Bowman, who was deputy general counsel to three FBI directors between 1995 and 2006. “She sent me a document that a friend of hers had supposedly written, in English, and wanted my opinion on it,” he tells Newsweek. She also sent him her picture.

“I never got around to replying, so I never heard from her again,” says Bowman, who went on to become deputy director of the National Counterintelligence Executive, which is tasked with developing policies to thwart foreign spies and terrorists.

But then, a week ago, he says, he got another message from China via his email account at George Washington University, where he has lectured on national security law since 2003.

“It was apparently from a university in China asking me come to speak at a conference on the environment”—not even remotely one of his areas of expertise, Bowman says. He called the FBI.

After a forensic examination of his machine, the FBI told him “they had found a malware type that’s designed to find out what’s on my computer,” Bowman says. “It wasn’t anything to infect it.” Still, just being able to read the contents of a target’s computer can reveal lots of valuable information like emails and documents, contact files with phone numbers and other personal data, like home addresses.

“Somebody who really knows what they’re doing” can wreak havoc, he says.

The FBI didn’t tell him exactly who was behind the hack, he says, “but they think they identified the woman” in a picture she sent along with one of her emails last spring. “It was somebody that they knew,” Bowman says. “I didn’t inquire any further.”

Before joining the FBI, Bowman was a Navy lawyer assigned to advise SEAL teams on clandestine operations, among other sensitive matters. His portfolio at the FBI gave him intimate knowledge of the details of operations to counter threats from foreign spy agencies.

“I still carry lots of deep Cold War secrets in my head,” he says, although not on his computer. But he is still very active in national security circles as chairman of the board of directors of the Association of Former Intelligence Officers, an organization with several thousand members nationwide, about half of them former CIA personnel.

Bowman’s revelation follows several months of bad news about the vulnerability of government computers to foreign hackers, the latest being a report published Monday saying that Chinese and Russian intelligence agencies are “aggressively aggregating and cross-indexing hacked U.S. computer databases” to catch American spies working overseas. China-based hackers breached about 22 million files held by the federal Office of Personnel Management, officials say.

“At least one clandestine network of American engineers and scientists who provide technical assistance to U.S. undercover operatives and agents overseas has been compromised as a result” of the Russian and Chinese exploitation of the files, the Los Angeles Times reported, citing two U.S. officials.

The story, Bowman says, was “pretty much on target.”

*** It obviously is much worse than we know for the Obama administration to sign off on a sanction and or other consequence ahead of the Xi’s visit to the United States next week.

U.S. may punish Chinese hacking before Xi’s visit

Imposing sanctions before this month’s summit could derail other priorities.

Top government officials are floating the idea of retaliating within the next week to Chinese cyberattacks, possibly by imposing targeted sanctions on some officials and firms, people familiar with the discussions say. But outside experts say it would be wiser to wait until after this month’s White House summit with Chinese President Xi Jinping.

“I heard from one person that it could be as early as next week,” Jim Lewis, director of the Center for Strategic and International Studies’ Strategic Technologies Program, told POLITICO. He added, “I still think it would be best to wait for the summit.”

Calls for U.S. retalation to Chinese hacking have risen to a furor since the China-linked breach of highly sensitive security clearance forms from 21.5 million current and former federal employees, disclosed in June.

But imposing sanctions before the late-September summit would risk derailing a serious conversation on cyber issues along with myriad other topics, including China’s economic troubles, Chinese belligerence in the South China Sea and cooperation on climate change.

Some China watchers even suspect that the White House is trying to improve its bargaining position in advance of the summit by floating the possibility of sanctions in a serious way.

“My sense is that they’re floating the idea to try to create some kind of leverage in the meetings,” said Adam Segal, a China scholar and director of the Digital and Cyberspace Policy Program at the Council on Foreign Relations.

If the White House did impose sanctions before the meeting, it would be deeply embarrassing to the Chinese and to Xi personally and risk the Chinese doing something to downgrade the summit’s importance, Segal said. “I think if they’re going to do it before the summit, they’ve got to be prepared for the summit to really take a downward turn,” he said.

Business leaders are also dubious about imposing sanctions before Xi’s visit.

The White House should use the summit “as an opportunity to engage in effective dialogue on the cyber issue. If sanctions jeopardize that opportunity, we’d rather see them put it off,” the leader of a major industry organization said in an interview, speaking without attribution because he was speculating about government policy.

If the White House ultimately imposes targeted sanctions, the association leader added, the sanctions should be “based on transparent, credible evidence that’s legally sound.” They should also be designed with a clear path forward that, ultimately, leads to fewer China-linked cyberattacks, he said.

“Most business executives we’ve spoke with felt the indictments against Chinese PLA officers didn’t meet that test,” he added, referring to the May 2014 U.S. indictments of five hackers employed by China’s People’s Liberation Army. That was the Obama administration’s most significant diplomatic strike against Chinese hacking to date.

“[The indictments] didn’t seem to advance anything and they seemed to increase tension rather than reduce it around the issue,” the official said.

In the wake of the OPM hacks, some political leaders have called for much more belligerent responses to Chinese hacking. They include GOP White House contenders Mike Huckabee, who has urged the U.S. to hack back against the communist nation, and Wisconsin Gov. Scott Walker, who has suggested canceling the Obama-Xi summit entirely.

But even cyber hawks warned that aggressive action could backfire in advance of the summit.

“I think everything is going to basically be on hold until the Iran deal goes through and until after President Xi comes to meet with [President Obama],” said Rep. Dutch Ruppersberger (D-Md.), who was formerly ranking member on the House Intelligence Committee.

Ruppersberger added that “we have to eventually draw a line on cyberattacks,” and that the U.S. bargaining position relative to China may be improved now because of the tailspin in the Chinese stock market and other financial difficulties.

The White House has routinely declined to speak publicly about the possibility of sanctioning China for cyberattacks or any more forceful follow-up to the PLA indictments. Press secretary Josh Earnest has said several times that Obama plans to raise cyber concerns with Xi during their summit.

“There’s no doubt that the president will certainly raise, as he has in every previous meeting with his Chinese counterpart, concerns about China’s behavior in cyberspace,” Earnest said during an Aug. 26 news conference.

White House officials have determined they must respond to China’s hacking of OPM, but have been debating for months what the appropriate response should be and when to impose it, Lewis said.

The option of targeted cyber sanctions, which Obama created by executive order in April, has long been on the table along with additional indictments or some form of diplomatic protest, he said.

White House officials have fingered China for the OPM hack anonymously but have not done so, thus far, on the record.

A forceful response to the OPM hack and to Chinese theft of U.S. companies’ intellectual property and trade secrets has also been delayed by more pressing diplomatic priorities, Lewis said, including securing Chinese cooperation for a deal to halt Iran’s nuclear weapons program

“This administration has done more than any other on cybersecurity, but, in a lot of cases, it ends up being No. 2 because of the need to get agreement on other things,” Lewis said. “Cyber always ends up coming in second place, particularly when it comes to China.”

 

 

 

 

 

Congress: Islamist Terror Threat Matrix

U.S. Terror Matrix

 

 

 

The full House of Representatives 8 page report is here.

 

KEY TAKEAWAYS

The jihadist threat in the U.S. homeland is high and has escalated dramatically this year. There have been more U.S.-based jihadist terror cases in 2015 than in any full year since 9/11. The number of U.S. terrorist cases involving homegrown violent jihadists has gone from 38 in July 2010 to 124 today—more than a three-fold increase in just five years.

ISIS is fueling the Islamist terror wildfire across the globe at unprecedented speed. As of the end of August, the group has inspired or directed 57 terror attack plots against Western targets, including 15 in the United States. A recent train attack in France would have been a mass-casualty attack had it not been for an alert group of Americans. There have now been nearly twice as many ISIS-linked attack plots against the West this year (37) as there were in all of 2014 (20).

Islamist terrorists are intent on killing American law enforcement and military personnel, in addition to innocent civilians. Radicals are increasingly targeting men and women in uniform here in the United States. In August, ISIS supporters released another “hit list” of American government personnel, including service members. Since early 2014, the majority of Islamist terror plots on U.S. soil have featured plans to kill police or U.S. service members.

ISIS has largely maintained its terror safe havens in Syria and Iraq while expanding globally more than a year after the U.S. and its allies launched operations against it. Al Qaeda affiliates from Syria to Yemen have also carved out sanctuary and seized additional terrain. ISIS retained control over its major strongholds in Syria and Iraq while undertaking disruption attacks and offensives in key territory; ISIS-affiliated militants have simultaneously consolidated control in Libya. Foreign fighters continue to swell the ranks of Islamist extremist groups looking to recruit foot soldiers and activate followers to launch attacks in their home countries.

HOMEGROWN ISLAMIST EXTREMISM

The jihadist threat in the U.S. homeland is high and has escalated dramatically this year.

By the numbers

Since September 11, 2001, there have been 124 U.S. terrorist cases involving homegrown violent jihadists. Over 80 percent of these cases—which include plotted attacks and attempts to join foreign terrorist organizations—have occurred or been disrupted since 2009.1

 

• Authorities have arrested or charged at least 52 individuals in the United States this year – 67 since 2014 – in ISIS-related cases. The cases involve individuals: plotting attacks; attempting to travel to join ISIS overseas; sending money, equipment and weapons to terrorists; falsifying statements to federal authorities; and failing to report a felony.2

• FBI Director James Comey has said authorities have hundreds of open investigations of potential ISIS-inspired extremists that cover all 56 of the bureau’s field offices in all 50 states. He stated there may be hundreds or thousands of Americans who are taking in recruitment propaganda over social media applications: “It’s like the devil sitting on their shoulders, saying ‘kill, kill, kill.”

Recent Developments

August 24: Ahmed Mohammed El Gammal, 42, was arrested in Avondale, Arizona, for helping a 24-year-old New York City resident travel to Syria to receive military training from ISIS. El Gammal was an avid ISIS supporter online and engaged the recruit through social media before in-person meetings. El Gammal and the recruit communicated with an unnamed co-conspirator based in Turkey.

TERROR PLOTS AGAINST THE WEST

ISIS is fueling the Islamist terror wildfire across the globe at unprecedented speed.

By the numbers

• Since early 2014, there have been 57 planned or executed ISIS-linked terror plots against Western targets, including 15 inside in the United States.3

• There have been nearly twice as many ISIS-linked plots against Western targets in the first seven months of this year (37) than in all of 2014 (20).4

Recent Developments

• August 21: A 25-year-old Moroccan national, Ayoub El Khazzani, attacked passengers on a train in Thalys, France, before a group led by three Americans, including two service members on vacation, subdued him. Khazzani was armed with an arsenal of weapons and 270 rounds of ammunition. He watched a jihadist propaganda video before attempting to launch his attack. He had lived in and attended a radical mosque in Spain before relocating to France. He had also lived in Belgium and traveled from Germany to Turkey in early May before returning to Europe in June. This trip was reportedly part of a plot to fight with ISIS in Syria.

• August 13: ISIS’s “hacking division” released information regarding 1,400 American government personnel, including service members, and encouraged supporters to track down and attack them. The list included names, e-mail addresses, and phone numbers. ISIS operative and hacker Junaid Hussain had been central to similar plots targeting servicemembers; Hussain was eliminated in an August 24th drone strike in Syria.

FOREIGN FIGHTERS

Undeterred by airstrikes, foreign fighters continue to pour into the conflict zone in Syria and Iraq, bolstering ISIS and representing a potential threat to their home countries—including America—upon return.

By the numbers

• More than 25,000 fighters from 100 countries have traveled to Syria and Iraq to join extremists—the largest convergence of Islamist terrorists in world history. U.S. estimates reportedly put its current manpower at 20,000-30,000 members. “We’ve seen no meaningful degradation in their numbers” since last August, according to a defense official.

• Approximately 4,500 Western fighters have traveled to Syria and Iraq.5 Europol recently assessed that the high-end estimate of EU citizens who left to fight in Syria may have been as high as 5,000 at the beginning of this year.

• An estimated 550 Western women have traveled to the conflict zone.

Read the whole report here.