ISIS Success Seen in Kansas

John T. Booker: 5 Fast Facts You Need to Know

 

Another U.S. citizen is accused of trying to perpetrate a terror attack on American soil in the name of ISIS. That man is 20-year-old Topeka, Kansas, resident John T. Booker who also likes to go by Muhammad Abdullah Hassan. Back in April 2014, Booker was first accused of having desires to carry out a terror attack in the U.S., after those accusations, his family told the media that he was in a mental health facility.

Here’s what you need to know:

1. He Wanted to Kill People With Power Using a Sword

According to the U.S. Attorney’s Office, Booker had planned to explode a car bomb at the Fort Riley army base in Kansas.This was a sting operation with the attorney’s office assuring the public there was never any real threat. He had rented a storage unit in Topeka that he used to store explosive devices. In the complaint, Booker allegedly told an FBI informant that he never intended to kill army privates but rather, people with power. He wanted to do this by using a sword or small gun. The documents state that two of Booker’s jihadist confidantes were FBI informants. He bragged to those informants about his “capture” by the FBI in 2014 for his terroristic threats. One of the FBI’s men on the inside posed as a “high ranking sheik” who wanted to commit a terrorist act in the U.S.

Booker 1

You can read the full complaint against Booker above.

2. He Had Been Scheduled to Begin His Basic Training in the Army on April 7, 2014

 

A Fox News report detailed that Hassan enlisted in the U.S. Army in February 2014 and was scheduled to begin basic training on April 7, 2014. Hassan was on a delayed entry program. According to army officials, he never displayed any anti-American sentiment during the recruitment process. He was discharged from the service last week when army officials learned of his plans. Hassan is being hunted by the FBI and the 902d Military Intelligence Group at Fort Leavenworth.

 

3. He Once Wrote on Facebook ‘I Am Going to Wage Jihad & Hope That I Die’

Booker 2

 

This photo was posted on Muhammad Abdullah Hassan’s Facebook on February 23 2014.

Through postings on Hassan’s Facebook page, beginning on February 23, he posted al-Qaida propaganda materials. There are also photos of Osama bin Laden and a video of the 9/11 mastermind reciting the Quran. On March 15, Hassan posted:

Oh those of the ummah of the Prophet Muhammad(S). I will soon be leaving you forever so goodbye! I am going to wage jihad and hope that i die. I want to be with my lord so bad that I cry but I will miss you guys I am not going to lie. I wish I could give you guys more but I am just a guy who is so very poor.

I am telling you I am so broke that my pockets are sore:) I cannot wait to go the Prophet Muhammad’s(S) door and prank Isa bin Maryam and party so hard that it will rock Jannah to its core. Only Allah knows what the future has in store so that should make you fear Allah much much more.

Booker 3

4. He Volunteered for a Children-in-Need Charity in Topeka in 2012

Booker 4

According to his Facebook page Muhammad Abdullah Hassan from Topeka, Kansas, he went to Topeka West High and the Flint Hills Job Corps. His favorite restaurant is the Orange Leaf Topeka.

John Thomas Booker Jr. graduated from Topeka West High School in 2012. A Topeka Capital Journal article from December 2011, details a group of Topeka West Army Jr. ROTC cadets who were volunteering for a children-in-need program. A Cadet Master Sgt. John Thomas Booker Jr. told the paper how much he enjoyed helping the less fortunate saying “I can’t have a good Christmas if they don’t.”

5. Yesterday, a Convicted Wisconsin Pedophile Was Arrested for Trying to Join ISIS

 

This comes a day after authorities announced the arrest of Joshua Ray Van Haften, a Wisconsin man who is accused of going to Turkey with the goal of joining ISIS in Syria. The Justice Department says 34-year-old Joshua Ray Van Haften spent over a year in Egypt touring the country’s military sites and later traveled to Turkey to find “brothers” who would funnel him into Iraq or Syria. Agents allege that he frequently spoke to his roommates about jihad and once lectured an 11-year-old boy about the coming World War III.

Federal agents arrested Van Haften on April 8 at Chicago’s O’Hare airport after he arrived “in custody” on a flight from Turkey. “We hope this arrest will serve as a deterrent for others who may be terrorist sympathizers here in Wisconsin, across the nation or abroad,” said FBI Special Agent in Charge Robert J. Shields Jr. “They will be held accountable for support of terrorism against our citizens and our international partners.”

Who is hosting the Hacker’s Servers?

State report reveal 130 compromised websites used in travel-related watering hole attacks

By Bill Gertz

One hundred thirty websites are hosting malicious software on their websites in what the State Department is calling a sophisticated Russian cyber spying operation, according to security analysts.
“These websites include news services, foreign embassies and local businesses that were compromised by threat actors to serve as ‘watering holes,’” according to a report by the Overseas Security Advisory Council distributed this week. A watering hole is a hijacked website used by cyber attackers to deliver malware to unsuspecting victims.
“For example, users may navigate to one of these malicious sites with the intent of checking travel requirements or the status of a visa application and unknowingly download the embedded malware onto their computers,” the report said.
The report identified the locations of the compromised websites as the United States, South America, Europe, Asia, India and Australia.
The report appears to indicate Russian intelligence may be behind the operations. Also, none of the compromised websites are in China, an indication that Beijing’s hackers could be involved.
A total of 15 of the 130 websites used for watering holes were government embassy websites located in Washington, DC, and two were involved in passport and visa services and others are offering travel services.
The embassy targeting suggests some or all of the operations are linked to foreign intelligence services that are breaking into the networks as part of tracking and monitoring of foreign travel.
Another possibility is that the operation are part of information warfare efforts designed to influence policies and publics. Both Russia and China are engaged in significant strategic information operations targeting foreign governments and the private sector.
“The threat actors are likely attempting to gather information from entities with vested interests in international operations,” the report said. “Identified victims in this sector include embassies, defense industrial base groups, and think tanks.”
The report, based on data provided by the security firm iSight Partners, says the watering holes are likely part of cyber espionage operations.
“Analysis indicates this campaign has a global reach, continuing to target users of identified intelligence value long after the initial infection,” the report says.
The compromised websites are increasingly functioning as indirect malicious software attack tools. The compromised sites represent a different method than widely used spear phishing – the use of emails to trigger malicious software downloads.
“Rather than send a malicious email directly to a target of interest, threat actors research and compromise a high-traffic website that will likely be visited by numerous targets of interest,” the report said.
“Watering holes are effective, as they often exploit existing vulnerabilities on a user’s machine,” the report said. More sophisticated threat actors have been observed employing zero-day exploits – those which are previously unknown and evade antivirus and intrusion detection systems (IDS) to successfully compromise victims. Zero-days were used in the widely publicized Forbes.com watering hole in late 2014.”
The hijacked websites appear to be part of a campaign spanning 26 upper-level Internet domains and include affiliations with 21 nations and the European Union.
According to iSight, evidence suggests the campaign is “likely tied to cyber espionage operations with a nexus to the Russian Federation.”
The compromised government websites included those from Afghanistan, Iraq, Jordan, Namibia, Qatar and Zambia. The report recommended not visiting any of those embassy websites or risk being infected with malware.
Technically, the attackers arranged for computer users who visited the compromised websites to be infected with an embedded JavaScript that redirected users to a Google-shortened URL, and then on to websites the mapped their computer systems. This “profiling” is used by cyber spies to identify valuable targets and control that specific victims who are injected with a malware payload.
The profiling is used to identify targets that will produce “high intelligence value” returns, indicating sophisticated cyber spies are involved. The infection also employed a technique called the use of “evercookie” a derivative of the small files that are inserted on computers and can be used by remote servers to tailor information, such as advertisements, to specific user.
While normal cookies can be easily removed, evercookies store data in multiple locations, a method that makes them extremely difficult to find and removed. The use of evercookies also permits long-term exploitation by cyber attackers.
To counter watering hole attacks, users should make sure system and software security updates are applied, and avoid visiting suspicious websites.
In particular, network monitoring should be used to spot unusual activities, specifically geared toward attacks that exploit zero-day vulnerabilities.
“The threat of watering holes is likely to remain high, given their increasing popularity and success in the last year,” the report said.
The report, “Compromised Global Websites Target Unsuspecting Travelers,” was produced by OSAC’s Research & Information Support Center (RISC). It is available for OSAC members at osac.gov. *** But there is more.

SAN FRANCISCO (Reuters) – Hacking attacks that destroy rather than steal data or that manipulate equipment are far more prevalent than widely believed, according to a survey of critical infrastructure organizations throughout North and South America.

The poll by the Organization of American States, released on Tuesday, found that 40 percent of respondents had battled attempts to shut down their computer networks, 44 percent had dealt with bids to delete files and 54 percent had encountered “attempts to manipulate” their equipment through a control system.

Those figures are all the more remarkable because only 60 percent of the 575 respondents said they had detected any attempts to steal data, long considered the predominant hacking goal.

By far the best known destructive hacking attack on U.S. soil was the electronic assault last year on Sony Corp’s Sony Pictures Entertainment, which wiped data from the Hollywood fixture’s machines and rendered some of its internal networks inoperable.

The outcry over that breach, joined by President Barack Obama, heightened the perception that such destruction was an unusual extreme, albeit one that has been anticipated for years.

Destruction of data presents little technical challenge compared with penetrating a network, so the infrequency of publicized incidents has often been ascribed to a lack of motive for attackers.

Now that hacking tools are being spread more widely, however, more criminals, activists, spies and business rivals are experimenting with such methods.

“Everyone got outraged over Sony, but far more vulnerable are these services we depend on day to day,” said Adam Blackwell, secretary of multidimensional security at the Washington, D.C.-based group of 35 nations.

The survey went to companies and agencies in crucial sectors as defined by the OAS members. Almost a third of the respondents were public entities, with communications, security and finance being the most heavily represented industries.

The questions did not delve into detail, leaving the amount of typical losses from breaches and the motivations of suspected attackers as matters for speculation. The survey-takers were not asked whether the attempted hacks succeeded, and some attacks could have been carried off without their knowledge.

The survey did allow anonymous participants to provide a narrative of key events if they chose, although those will not be published.

Blackwell told Reuters that one story of destruction involved a financial institution. Hackers stole money from accounts and then deleted records to make it difficult to reconstruct which customers were entitled to what funds.

“That was a really important component” of the attack, Blackwell said.

In another case, thieves manipulated equipment in order to divert resources from a company in the petroleum industry.

Blackwell said that flat security budgets and uneven government involvement could mean that criminal thefts of resources, such as power, could force blackouts or other safety threats.

At security company Trend Micro Inc. , which compiled the report for the OAS, Chief Cybersecurity Officer Tom Kellermann said additional destructive or physical attacks came from political activists and organized crime groups.

“We are facing a clear and present danger where we have non-state actors willing to destroy things,” he said. “This is going to be the year we suffer a catastrophe in the hemisphere, and when you will see kinetic response to a threat actor.”

So-called “ransomware,” which encrypts data files and demands payment be sent to remote hackers, could also have been interpreted as destructive, since it often leaves information unrecoverable.

A spokesman for the U.S. Department of Homeland Security, SY Lee, said the department did not keep statistics on how often critical U.S. institutions are attacked or see destructive software and would not “speculate” on whether 4 out of 10 seeing deletion attempts would be alarming.

U.S. political leaders cite attacks on critical infrastructure as one of their greatest fears, and concerns about protecting essential manufacturers and service providers drove a recent executive order and proposed legislation to encourage greater information-sharing about threats between the private sector and government.

Yet actual destructive attacks or manipulation of equipment are infrequently revealed. That is in part because breach-disclosure laws in more than 40 states center on the potential risks to consumers from the theft of personal information, as with hacks of retailers including Home Depot Inc and Target Corp.

Under Securities and Exchange Commission guidelines, publicly traded companies must disclose breaches with a potential material financial impact, but many corporations can argue that even deletion of internal databases, theft and manipulation of equipment are not material.

Much more is occurring at vital facilities behind the scenes, and that is borne out by the OAS report, said Chris Blask, who chairs the public-private Information Sharing and Analysis Center for cybersecurity issues with the industrial control systems that automate power, manufacturing and other processes.

“I don’t think the public has any appreciation for the scale of attacks against industrial systems,” Blask said. “This happens all the time.”

 

Purple Hearts and the Failed VA

Victims of Fort Hood shooting receive Purple Hearts

WASHINGTON — Nearly six years after they were attacked by one of their own, the victims of the 2009 Fort Hood shooting have received the Purple Hearts that the Army previously deemed were not owed to them.

At a Friday ceremony at Fort Hood, Texas, base commander Lt. Gen. Sean MacFarland presented the medals to those who were wounded and the families of those who were killed when Army Maj. Nidal Hasan went on a shooting rampage at the installation on Nov. 5, 2009.

“It is our sincere hope that today we will in some small way help to heal the wounds that you have suffered,” said MacFarland, the commander of Army III Corps, which is based at Fort Hood.

Thirteen people were killed and 31 were wounded during the attack before Hasan was subdued. Of those killed, 12 were soldiers and one was a civilian contractor.

MacFarland noted that the carnage could have been much worse had it not been for the bravery of those who responded to the incident.

“We also remember the acts of courage and selflessness of soldiers and civilians which prevented an even greater calamity from occurring that day,” he said. “When shots rang out on Fort Hood, our soldiers and first responders ran toward the sound of gunfire” to “take down the shooter.”

In the wake of the attack, the Army said the Fort Hood casualties were not eligible for the Purple Heart or its civilian equivalent, the Defense of Freedom Medal, because they were not killed or wounded in combat or in an attack by a foreign terrorist organization.

Families of the victims lobbied Congress to change the wording of the law to make their loved ones eligible for the Purple Heart and the recognition of sacrifice that goes along with it.

In the 2015 National Defense Authorization Act, lawmakers loosened the criteria by redefining what should be considered an attack by a “foreign terrorist organization” for purposes of determining award eligibility.

The legislation dictated that an act of violence should now be considered an attack by a foreign terrorist organization if the perpetrator of the attack “was in communication with the foreign terrorist organization before the attack” and the attack was “inspired or motivated by the foreign terrorist organization.”

In a review of the incident and the new provisions of law, the Army determined both these criteria had been met.

“Now that Congress has changed the criteria, we believe there is sufficient reason to allow these men and women to be awarded and recognized with either the Purple Heart or, in the case of civilians, the Defense of Freedom medal. It’s an appropriate recognition of their service and sacrifice,” Army Secretary John McHugh said in a statement in February when the decision to award the medals was announced.

John Bircher, a spokesman for the Military Order of the Purple Heart, a veterans service organization, said he’s glad to see that the soldiers who were killed and wounded were finally given the medal.

“I think it’s something that we all felt was due to them but the [old] criteria of the award just didn’t allow for it,” he said. “For the families of those who were killed in the incident, I think this is a nice closure for them.”

The change in the criteria for the medals has implications beyond the Fort Hood shooting. As the ability of overseas terrorist organizations to conduct attacks against the homeland has been diminished by American military action and other measures, U.S. officials have become increasingly worried about the threat of “lone wolf” attacks that could be conducted by individuals who are inspired to commit violence by overseas extremist groups but are not members of those organizations.

In 2013, after being court-martialed, Hasan was found guilty on 13 counts of premeditated murder and 32 counts of attempted premeditated murder. He is on death row at Fort Leavenworth, Kansas, while post-trial and appellate processes continue.

*** Are the Purple Hearts merely a gesture? Has there been any significant improvement in treatment, waiting times or quality of care? Not so much. Even with complaints, investigations or whistleblowers, veterans see no measured advancement. A change in leadership, more Congressional hearings and an additional $11 billion dollars, there has been no successful breakthroughs.

Agency Says VA Whistleblower Cases Have Surged

U.S. Office of Special Counsel has settled 45 claims, examining another 110 since start of fiscal year

A federal agency charged with protecting the rights of government workers said Thursday it has seen a surge in claims from Department of Veterans Affairs whistleblowers over the past year.

Claims began to increase after details emerged in April last year of long delays in treatment throughout the VA system, the U.S. Office of Special Counsel said. The national scandal led to the resignation of then-Secretary Eric Shinseki in May.

The agency said that since October 2013, when the 2014 fiscal year started, it has settled claims or secured temporary relief for 45 VA employees who say they were punished for reporting problems in both administration and medical care. The agency said it is examining another 110 similar claims.

“Right now, about 40% of our casework is VA-related. In prior years it provided about 20% of casework,” said Nick Schwellenbach a spokesman for the agency. The agency handled 5,200 total cases last year, including whistleblower retaliation claims and other forms of employment discrimination.

In the 2014 fiscal year, VA employees submitted more claims to the Office of Special Counsel than any federal department, including the Department of Defense, which has roughly twice the employees as the VA and had the most claims in 2013.

Mr. Schwellenbach said claims increased, in part, because the VA has done a better job of informing employees of worker protections. The department has also streamlined the process for investigating whistleblower claims.

A VA spokeswoman said the department doesn’t tolerate retaliation against whistleblowers and disciplines employees when claims are substantiated.

 

 

A True Englishman, Tommy Robinson Speaks

 

It was a privilege to speak with Tommy Robinson from the United Kingdom on the matter of jihad in the streets on England. Hearing truths is rare and having the courage to do so is even more profound.
To better understand the proven history of what Robinson has endured see this video:

 

 

Slight (White) House Mocks Netanyahu

The Iranian Supreme Leader, Khamenei is throwing sand in the gear of the P5+1 framework agreement lead by U.S. Secretary of State, John Kerry.

He is not only non-committal on the matter but what is worse he has taken the same posture as the Iranian Foreign Minister, Mohammad Zarif, stating that ALL sanctions must be lifted before anything will go forward. This is a morning after additional dynamic, putting John Kerry and the White House in damage control.

But it is actually worse.

Iran: We’ll Start Using Advanced Centrifuges After Deal Signed

Iran’s negotiator in the nuclear negotiations and its nuclear chief revealed on Tuesday that after a final deal is signed by a June 30 deadline on the framework reached last week, Iran will unleash its most advanced centrifuges for uranium enrichment, threatening a quick turnover in producing a nuclear weapon.

Iran’s semi-official FARS news agency reported on a closed meeting held Tuesday by Foreign Minister Javad Zarif and Atomic Energy Organization of Iran (AEOI) chief Ali Akbar Salehi, in which they briefed members of Iran’s parliament on the deal being finalized.

In their statements, they said Iran’s most advanced IR-8 centrifuges will be used as soon as the deal removing world sanctions against Iran begins.

The report noted the two said the advanced centrifuges enrich uranium 20 times faster than the current IR-1 models, meaning they would radically reduce the breakout time needed for Iran to obtain a nuclear arsenal.

In the meeting Zarif and Salehi told the parliament “that the country would inject UF6 gas into the latest generation of its centrifuge machines as soon as a final nuclear deal goes into effect by Tehran and the six world powers,” according to the report.

“The AEOI chief and the foreign minister presented hopeful remarks about nuclear technology R&D which, they said, have been agreed upon during the talks, and informed that gas will be injected into IR-8 (centrifuges) with the start of the (implementation of the) agreement,” Iranian MP Javad Karimi Qoddousi was quoted as saying by the site.

Qoddousi also said the Iranian foreign ministry will present a “fact sheet” showing Iran’s version of the agreement to parliamentarians in the next few days.

Iranian and US versions of the framework have shown numerous contradictions, with the issue of advanced centrifuges being primary among them.

The US version claims Iran agreed to not use its advanced centrifuges, including IR-2, IR-4, IR-5, IR-6 or IR-8. However, the Iranian text says “on the basis of solutions found, work on advanced centrifuges shall continue on the basis of a 10-year plan,” apparently contradicting the American version.

This point is crucial, as experts have anticipated that under the deal Iran will be able to develop its centrifuge technology and reach a point where it can make a three week dash to obtain a nuclear weapon.

Israel has pointed out that of the 17 states with peaceful nuclear programs, none enrich uranium as Iran is being allowed to continue doing by the deal.

The statements come after US President Barack Obama admitted in an interview that as a result of the deal, Iran will be able to reach a “zero” breakout time by 2028, meaning it could produce nuclear weapons immediately whenever it wanted to.

Some interesting notes:

1. Iran collectively owes an estimated $119 billion in restitution for past terror acts and refuses to pay it stating the Foreign Sovereignty Act.

2. Iran also states that there will be no monitoring of their facilities.

3. The base line standard on the Iranian nuclear program performed by the IAEA was so long ago that a current report on the uranium enrichment and centrifuges is impossible to report.

4. The inspections mentioned in the recent framework are to be performed by the United Nations Security Council, who are not only not qualified, but Russia has a veto vote on that council.

Meanwhile, the White House has taken to a satire agenda, mocking Israel. This does not make for good policy, good governance or good relationships. Shame on the Slight (White) House.

White House tweet pokes fun at Israel on Iran nuke deal

The White House is taking another swipe at Israeli Prime Minister Benjamin Netanyahu, defending the Iran nuclear deal by posting a diagram of a nuclear bomb on Twitter similar to one used by the Israeli leader to warn against an agreement.

The administration’s tweet of a cartoon bomb is accompanied by a list of consequences of not striking a deal, including “resumed production of highly enriched uranium” and “no limits on stockpile of enriched uranium.” The supposed benefits of a deal include “no production or stockpile of highly enriched uranium.”

The sketch closely resembles one held up by Mr. Netanyahu during a speech in 2012 at the United Nations, when he warned that Iran’s push to develop a nuclear weapon must be stopped at all costs. His drawing of a bomb included a red line at the top to show how close Iran was to completing a nuclear device.

The White House diagram also includes a red line and proclaims, “Under the framework for an Iran nuclear deal, Iran uranium enrichment pathway to a weapon will be shut down.”

Mr. Netanyahu is an outspoken opponent of the framework agreement announced last week, in which sanctions against Iran will be lifted in exchange for scaling back Tehran’s nuclear program. President Obama’s push for an agreement with Iran has raised tensions in what was already an uneasy relationship with Mr. Netanyahu.