An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.

Jeh Johnson’s State of DHS, Judge for Yourself

Remarks by Secretary of Homeland Security Jeh C. Johnson on the State of Homeland Security

Washington, D.C.
Woodrow Wilson Center
(As delivered)

Good morning everyone. Thank you Jane and the Wilson Center for hosting me again for this annual ritual. Jane is a terrific supporter of our Department and our homeland security mission, and a voice of strength and common sense in this town. Jane, for the third year in a row, I continue to appreciate your leadership and mentorship. Thank you again.

Today I will outline progress we made in 2015 and the goals the President and I have for the Department of Homeland Security in 2016. In the remaining 344 days of this Administration, there is much to do. I intend to make every day count. The former president of my alma mater, Morehouse College, used to tell his students we only have just a minute, but eternity is in it, and it’s up to us to use it. With Deputy Secretary Alejandro Mayorkas as my partner, we will push an aggressive agenda to the end.

I begin these remarks with a shout-out to the men and women of DHS, led by the terrific component heads seated before me. It’s the nature of our business in homeland security that no news is good news. But no news is very often the product of the hard work and extraordinary, courageous effort our people put in every day to keep the American public safe.

Last fiscal year, for example, TSA screened 695 million passengers (3 million more than the year before); screened 450 million pieces of checked luggage (the highest in six years), and, at the same time, seized a record number 2,500 firearms from carry-on luggage, 84 percent of which were loaded.

Last fiscal year CBP screened 26.3 million containers, 11.3 million commercial trucks, 1 million commercial and private aircraft, 436,000 buses, ferries and trains, 103 million private vehicles, and 382 million travelers at land, marine and air ports of entry to the United States. At the same time, CBP collected nearly $46 billion in duties, taxes, and fees, making it the second largest revenue collector in the U.S. government.

Last fiscal year, HSI made a record high 33,000 criminal arrests, including 3,500 alleged members of transnational criminal gangs, and 2,400 alleged child predators.

Last fiscal year the Coast Guard saved over 3,500 lives, and seized 319,000 pounds of cocaine and 78,000 pounds of marijuana worth a total of $4.3 billion wholesale. In just one mission off the coast of Central and South America, the National Security Cutter STRATTON alone seized over $1 billion in cocaine, along with two drug cartel-owned submersibles.

Last year the Secret Service successfully orchestrated what may have been the largest domestic security operation in the history of this country, by providing physical security to 160 world leaders at the UN General Assembly, and, at the same time, providing security for Pope Francis as he visited New York, Washington, and Philadelphia.

Last year FEMA provided over $6 billion in federal disaster assistance, and was there to help communities recovering from flooding in Texas and South Carolina, tornadoes in Oklahoma, and typhoons in the Western Pacific.

This past Sunday, DHS personnel from the Secret Service, TSA, CBP, HSI, FEMA, I&A, NPPD, the Coast Guard, and other components led the federal effort to provide ground, air, maritime and cyber security for Super Bowl 50.

Then there are the individual acts of good and heroic work by our people, to save lives and go above and beyond the call of duty.

In late December nine Border Patrol agents traveled miles on foot or by horseback to come to the aid of an Arizona rancher who had fallen off her horse in a remote, mountainous area.

Last March two uniformed Secret Service officers helped save the life of a journalist who suffered a heart attack in the East Room of the White House.

Last July Coast Guard Petty Officer Darren Harrity swam nearly a mile, at night, in 57-degree water and 30-mph winds, to save the lives of four stranded fishermen.

Finally, we honor those killed in the line of duty. HSI Agent Scott McGuire was killed last month by a hit and run driver in Miami. I was glad to at least have had the opportunity to visit with Scott’s wife and five-year-old son, and hold Scott’s hand before he was officially declared brain dead. His funeral was 10 days ago in New Orleans.

Our people do extraordinary work every day to protect the homeland. Please consider thanking a TSO, a Coastie, a Customs officer, or a Border agent next time you see one.

Management Reform

Though our people do extraordinary work, I know we must improve the manner in which the Department conducts business. Like last year, reforming the way in which the Department of Homeland Security functions, to more effectively and efficiently deliver our services to the American people, is my New Year’s resolution for 2016. We’ve done a lot in the last two years, but, under the leadership of our Under Secretary for Management Russ Deyo, there is still much we will do.

My overarching goal as Secretary this last year is to continue to protect the homeland, and leave the Department of Homeland Security a better place than I found it.

The centerpiece of our management reform has been the Unity of Effort initiative I announced in April 2014, which focuses on getting away from the stove pipes, in favor of more centralized programming, budgeting, and acquisition processes.

We have transformed our approach to the budget. Today, we focus Department-wide on our mission needs, rather than through component stove pipes. With the support of Congress, we are moving to a simplified budget structure, in which line items mean the same across all components.

We have transformed our approach to acquisition. Last year I established a DHS-wide Joint Requirements Council to evaluate, from the viewpoint of the Department as a whole, our components’ needs on the front end of an acquisition.

We have launched the “Acquisition Innovations in Motion” initiative, to consult with the contractor community about ways to improve the quality and timeliness of our contracting process, and the emerging skills required of our acquisition professionals. We are putting faster contracting processes in place.

We are reforming our HR process. We are making our hiring process faster and more efficient. We are using all the tools we have to recruit, retain and reward personnel.

As part of the Unity of Effort initiative, in 2014 we created the Joint Task Forces dedicated to border security along the southern border. Once again, we are getting away from the stove pipes. In 2015, these Task Forces became fully operational. In 2016, we are asking Congress to officially authorize them in legislation.

We are achieving more transparency in our operations. We have staffed up our Office of Immigration Statistics and gave it the mandate to integrate immigration data across the Department. Last year, and for the second year in a row, we reported our total number of repatriations, returns and removals on a consolidated, Department-wide basis.

The long-awaited entry/exit overstay report was published in January, providing a clearer picture of the number of individuals in this country who overstay their visitor visas. It reflects that about one percent of those who enter this country by air or sea on visitor visas or through the Visa Waiver Program overstay.

We are working with outside, non-partisan experts on a project called BORDERSTAT, to develop a clear and comprehensive set of outcome metrics for measuring border security, apprehension rates, and inflow rates.

Since 2013 we’ve spearheaded something called the “DHS Data Framework” initiative. For the protection of the homeland, we are improving the collection and comparison of travel, immigration and other information against classified intelligence. We will do this consistent with laws and policies that protect privacy and civil liberties.

As we have proposed to Congress, I want to restructure the National Protection and Programs Directorate from a headquarters element to an operational component called the “Cyber and Infrastructure Protection” Agency.

I am very pleased with the 2016 DHS budget adopted by Congress and signed by the President as part of the omnibus spending deal reached in December. I’m very pleased with that. It funds all of our homeland security priorities, including, finally, the completion of the main building of the new DHS headquarters at St. Elizabeths campus in SE Washington. I will never get to work there, but perhaps they will name a courtyard or conference room after me.

The President’s budget request for 2017, released two days ago, funds our key priorities, to include aviation security, the Secret Service, recapitalization of the Coast Guard, and provides a huge increase in funding for cybersecurity.

Finally, we will improve the levels of employee satisfaction across the Department. We’ve been on an aggressive campaign to improve morale over the last two years. It takes time to turn a 22-component workforce of 240,000 people in a different direction. Though the overall results last year were still disappointing, we see signs of improvement. Employee satisfaction improved in a number of components, including at DHS headquarters.

This year we will see an improvement in employee satisfaction across DHS.

Counterterrorism

In 2016, counterterrorism will remain the cornerstone of the Department of Homeland Security’s mission. The events of 2015 reinforce this.

As I have said many times, we are in a new phase in the global terrorist threat, requiring a whole new type of response. We have moved from a world of terrorist directed attacks to a world that includes the threat of terrorist inspired attacks – in which the terrorist may have never come face to face with a single member of a terrorist organization, lives among us in the homeland, and self-radicalizes, inspired by something on the internet.

By their nature, terrorist-inspired attacks are harder to detect by our intelligence and law enforcement communities, could occur with little or no notice, and in general makes for a more complex homeland security challenge.

So, what are we doing about this?

First, our government, along with our coalition partners, continues to take the fight militarily to terrorist organizations overseas. ISIL is the terrorist organization most prominent on the world stage. Since September 2014, air strikes and special operations have in fact led to the death of a number of ISIL’s leaders and those focused on plotting external attacks in the West. At the same time, ISIL has lost about 40 percent of the populated areas it once controlled in Iraq, and thousands of square miles of territory it once controlled in Syria.

On the law enforcement side, the FBI continues to do an excellent job of detecting, investigating, preventing, and prosecuting terrorist plots here in the homeland.

As for the Department of Homeland Security, following the attacks in Ottawa, Canada in 2014, and in reaction to terrorist groups’ public calls for attacks on government installations in the western world, I directed our Federal Protective Service to enhance its presence and security at various U.S. government buildings around the country.

Given the prospect of the terrorist-inspired attack in the homeland, we have intensified our work with state and local law enforcement. Almost every day, DHS and the FBI share intelligence and information with Joint Terrorism Task Forces, fusion centers, local police chiefs and sheriffs.

In FY 2015 we provided over $2 billion in homeland security assistance to state and local governments around the country, for things such as active shooter training exercises, overtime for cops and firefighters, salaries for emergency managers, emergency vehicles, and communications and surveillance equipment. We helped to fund an active shooter training exercise that took place in the New York City subways last November and a series of these exercises just last weekend in Miami, Florida.

As I said at a graduation ceremony for 1,200 new cops in New York City in December, given the current threat environment, it is the cop on the beat who may be the first to detect the next terrorist attack in the United States.

We are enhancing information sharing with organizations that represent businesses, college and professional sports, faith-based organizations, and critical infrastructure.

We are enhancing measures to detect and prevent travel to this country by foreign terrorist fighters.

We are strengthening our Visa Waiver Program, which permits travelers from 38 different countries to come here without a visa. In 2014, we began to collect more personal information in the Electronic System for Travel Authorization, also known as the “ESTA” system, that travelers from Visa Waiver countries are required to use. As a result of these enhancements, over 3,000 additional travelers were denied travel here in FY 2015.

In August 2015, we introduced further security enhancements to the Visa Waiver Program.

Through the passage in December of the Visa Waiver Program Improvement and Terrorist Travel Prevention Act of 2015, Congress has codified into law several of these security enhancements, and placed new restrictions on eligibility for travel to the U.S. without a visa. We began to enforce these new restrictions on January 21. Waivers from these restrictions will only be granted on a case-by-case basis, when it is in the law enforcement or national security interests of the United States to do so. Those denied entry under the Visa Waiver Program as a result of this new law may still apply for a visa to travel to the U.S.

We are expanding the Department’s use of social media for various purposes. Today social media is used for over 33 different operational and investigative purposes within DHS. Beginning in 2014 we launched four pilot programs that involved consulting the social media of applicants for certain immigration benefits. USCIS now also reviews the social media of Syrian refugee applicants referred for enhanced vetting. Based upon the recent recommendation of a Social Media Task Force within DHS, I have determined that we must expand the use of social media even further, consistent with law.

CBP is deploying our Customs personnel at various airports abroad, to pre-clear air travelers before they get on flights to the United States. At present, we have this pre-clearance capability at 15 airports overseas. And, last year, through pre-clearance, we denied boarding to over 10,700 travelers (or 29 per day) seeking to enter the United States. As I said here last year, we want to build more of these. In May 2015, I announced 10 additional airports in nine countries that we’ve prioritized for preclearance.

For years Congress and others have urged us to develop a system of biometric exit – that is, to take the fingerprints or other biometric data of those who leave the country. CBP has begun testing technologies that can be deployed for this nationwide. With the passage of the omnibus bill, Congress authorized $1 billion in fee increases over a period of ten years to pay for the implementation of biometric exit. I have directed CBP begin implementing the system, starting at airports, in 2018.

Last month I announced the schedule for the final two phases of implementation of the REAL ID law, which goes into effect two and then four years from now. At present 23 states are compliant with this law, 27 have extensions, and 6 states or territories are out of compliance. Now that the final timetable for implementation of this law is in place, we will urge all states, for the good of their residents, to start issuing REAL ID-complaint drivers’ licenses as soon as possible.

In the current threat environment, there is a role for the public too. “If You See Something, Say Something™” must be more than a slogan. We continue to stress this. DHS has now established partnerships with the NFL, Major League Baseball and NASCAR, to raise public awareness at sporting events. An informed and vigilant public contributes to national security.

In December we reformed “NTAS,” the National Terrorism Advisory System. In 2011, we replaced the color-coded alerts with NTAS. But, the problem with NTAS was we never used it. It consisted of just two types of Alerts: “Elevated” and “Imminent,” and depended on the presence of a known specific and credible threat. This does not work in the current environment, which includes the threat of homegrown, self-radicalized, terrorist-inspired attacks.

So, in December we added a new form of advisory – the NTAS “Bulletin” – to the existing Alerts. The Bulletin we issued in December advises the public of the current threat environment, and how the public can help.

Finally, given the nature of the evolving terrorist threat, building bridges to diverse communities has become a homeland security imperative. Well informed families and communities are the best defense against terrorist ideologies. Al Qaeda and the Islamic State are targeting Muslim communities in this country. We must respond. In my view, this is as important as any of our other homeland security missions.

In 2015 we took these efforts to new levels. We created the DHS Office for Community Partnerships, headed by George Selim. George and this office are now the central hub of the Department’s efforts to counter violent extremism in this country, and the lead for a new interagency CVE Task Force that includes DHS, DOJ, the FBI, NCTC and other agencies.

Aviation Security

We are taking aggressive steps to improve aviation and airport security. The traveling public should be aware that, because of this and increased traveler volume, overall wait times have increased somewhat at airports, but we believe this is necessary for the public’s own safety.

Since 2014 we have enhanced security at overseas last-point-of-departure airports, and a number of foreign governments have replicated these enhancements.

As many of you know, in May of last year a certain classified DHS Inspector General’s test of TSA screening at eight airports, reflected a dismal fail rate and was leaked to the press. I directed a 10-point plan to fix the problems identified by the IG. Under the new leadership of Admiral Pete Neffenger over the last six months, TSA has aggressively implemented this plan. This has included “back to basics” retraining of the entire TSO force, increased use of random explosive trace detectors, testing and re-evaluating the screening equipment that was the subject of the IG’s test, a rewrite of the standard operating procedures manual, increased manual screening, and less managed inclusion. These measures were implemented on or ahead of schedule.

We are also focused on airport security. In April of last year TSA issued guidelines to domestic airports to reduce access to secure areas, to require that all airport and airline personnel pass through TSA screening if they board a flight, to conduct more frequent screening of airport and airline personnel, and to conduct continuous criminal background checks of airport and airline personnel. Since then employee access points have been reduced, and random screening of personnel within secure areas has increased four-fold. We are continuing these efforts in 2016. Two days ago TSA issued guidelines to further enhance the screening of aviation workers in the secure area of airports.

Cybersecurity

While counterterrorism remains a cornerstone of our Department’s mission, I have concluded that cybersecurity must be another. Making tangible improvements to our Nation’s cybersecurity is a top priority for me and President Obama before we leave office.

Two days ago the President announced his “Cybersecurity National Action Plan,” which is the culmination of seven years of effort by his Administration. The Plan includes a call for the creation of a Commission on Enhancing National Cybersecurity, additional investments in technology, federal cybersecurity, cyber education, new cyber talent in the federal workforce, and improved cyber incident response.

DHS has a role in almost every aspect of this plan.

As reflected in the President’s 2017 budget request, we want to expand our cyber response teams from 10 to 48.

We are doubling the number of cybersecurity advisors to in effect make “house calls,” to assist private sector organizations with in-person, customized cybersecurity assessments and best practices.

Building on DHS’s Stop.Think.Connect campaign, we will help promote public awareness on multi-factor authentication.

We will collaborate with Underwriters Laboratory and others to develop a Cybersecurity Assurance Program to test and certify networked devices within the “Internet of Things” — such as your home alarm system, your refrigerator, or even your pacemaker.

Last year we greatly expanded the capability of DHS’s National Cybersecurity Communications Integration Center, or “NCCIC.” The NCCIC increased its distribution of information, the number of vulnerability assessments conducted, and the number of incident responses.

At the NCCIC, last year we built a system to automate the receipt and distribution of cyber threat indicators in near real-time speed. We built this in a way that also includes privacy protections. We did this ahead of schedule.

I have issued an aggressive timetable for improving federal civilian cybersecurity, principally through two DHS programs:

The first is called EINSTEIN. EINSTEIN 1 and 2 have the ability to detect and monitor cybersecurity threats in our federal civilian systems, and are now in place across all federal civilian departments and agencies.

EINSTEIN 3A is the newest iteration of the system, and has the ability to actually block potential cyber attacks on our federal systems. Thus far E3A has actually blocked 700,000 cyber threats, and we are rapidly expanding this capability. About a year ago, E3A covered only about 20 percent of our federal civilian networks. In the wake of the OPM attack, in May of last year I directed our cybersecurity team to make at least some aspects of E3A available to all federal departments and agencies by the end of last year. They met that deadline. Now that the system is available to everyone, 50 percent are actually on line, including OPM, and we are working to get all federal departments and agencies on board by the end of this year.

The second program, called Continuous Diagnostics and Mitigation, helps agencies detect and prioritize vulnerabilities in their networks. In 2015, we provided CDM sensors to 97 percent of the federal civilian government. Next year, DHS will provide the second phase of CDM to 100 percent of the federal civilian government.

We have worked with OMB and DNI to identify the government’s high value systems, and we are working aggressively with the owners of these systems to increase their security.

In September, DHS awarded a grant to the University of Texas San Antonio to work with industry to identify a common set of best practices for the development of Information Sharing and Analysis Organizations, or “ISAOs.”

Finally, I thank Congress for passing the Cybersecurity Act of 2015. This new law is a huge assist to DHS and our cybersecurity mission. We are in the process of implementing this new law now.

Immigration/Border Security

Turning to immigration and border security:

As I explain it to both Democrats and Republicans, immigration policy must be two sides of the same coin. The resources we have to enforce immigration laws are finite, and they must be used wisely. This is true of every aspect of law enforcement. It’s referred to as “prosecutorial discretion.”

With the immigration enforcement resources we have, ICE is focused more sharply on public safety and border security. Those who are convicted of serious crimes or who are apprehended at the border are top priorities for removal. And we will enforce the law in accordance with these priorities.

Accordingly, over the last several years deportations by ICE have gone down, but an increasing percentage of those deported are convicted criminals. And, an increased percentage of those in immigration detention, around 85 percent, are in the top priority for removal. We will continue to focus our resources on the most significant threats to public safety and border security.

In furtherance of our public safety efforts, in 2014 we did away with the controversial Secure Communities program and replaced it with the new Priority Enforcement Program, or “PEP.” PEP fixes the political and legal controversies, in my judgment, associated with Secure Communities and enables us to take directly into custody from local law enforcement the most dangerous, removable criminals. Since PEP was created, cities and counties that previously refused to work with Secure Communities are coming back to the table. Of the 25 largest counties that refused to work with ICE before, 16 are now participating in PEP. In 2016, we want to get more to participate.

And, because we are asking ICE immigration enforcement officers to focus on convicted criminals and do a job that’s more in line with law enforcement, last year we reformed their pay scale accordingly. Now these immigration officers are paid on the same scale as the rest of federal law enforcement.

We have also prioritized the removal of those apprehended at the border. We cannot allow our borders to be open to illegal migration.

southwest border u s b p apprehensions f y 2000 - f y 2015

Over the last 15 years, our Nation – across multiple administrations — has invested a lot in border security, and this investment has yielded positive results. Apprehensions – which are an indicator of total attempts to cross the border illegally – are a fraction of what they used to be.

southwest border u s b p apprehensions f y 2000 - f y 2015 - noting numbers rose in 2014

In FY 2014, overall apprehensions increased, as we saw a spike in the number of families and unaccompanied children from Central America during the spring and summer of 2014. That year the overall number of apprehensions was 479,000. Across the government, we responded aggressively to this surge and the numbers fell sharply within a short period of time.

southwest border u s b p apprehensions f y 2000 - f y 2015 noting numbers fell in 2015

In FY 2015, the number of those apprehended on the southwest border was 331,000 – with the exception of one year, this was the lowest number since 1972.

From July to December 2015 the numbers of migrants from Central America began to climb again.

In January I announced a series of focused enforcement actions to take into custody and remove those who had been apprehended at the border in 2014 or later and then ordered removed by an immigration court. I know this made a lot of people I respect very unhappy. But, as I said, we must respect the law in accordance with our priorities and enforce it.

In January overall apprehensions on the southwest border dropped 36 percent from the month before. At the same time, the number of unaccompanied children apprehended dropped 54 percent, and the number of those in families dropped 65 percent. So far in February, the numbers have remained at this decreased level. This six-week decline is encouraging, but it does not mean we can dial back our efforts. We will continue to enforce the law consistent with our priorities for enforcement, which includes those apprehended at the border in 2014 or later.

Then there is the other side of the coin. The new enforcement policy the President and I announced in November 2014 makes clear that our limited resources will not be focused on the removal of those who have committed no serious crimes, have been in this country for years, and have families here. Under our new policy, these people are not priorities for removal, nor should they be.

In fact, the President and I want to offer, to those who have lived here for at least five years, are parents of U.S. citizens or lawful permanents residents, and who have committed no serious crimes, the opportunity to request deferred action on a case-by-case basis, to come out of the shadows, get on the books, and be held accountable. We are pleased that the Supreme Court has agreed to hear the case of Texas v. United States, which involves the new deferred action policies we announced in November 2014.

Our immigration enforcement priorities, the ending of Secure Communities, and the new deferred action policy now in the courts are among 10 executive actions the President and I announced in November 2014 to fix our broken immigration system.

We also issued a proposed rule to expand eligibility for “provisional” extreme hardship waivers of the 3- and 10-year bars to all persons who statutorily qualify for a waiver. The comment period is closed, and we are now preparing to issue the final rule on provisional waivers.

We published new guidance for public comment on the “extreme hardship” requirement. The comment period is closed and we plan to issue final guidance on extreme hardship very soon.

We are about to publish a final rule to strengthen the program that provides Optional Practical Training for students in STEM fields studying at U.S. universities.

We finalized a new rule that allows spouses of high-skilled H-1B workers who are here in the United States under H-4 visas to apply for work authorization.

We are working with the Department of Labor and other agencies to ensure, for the protection of workers, the consistent enforcement of federal labor, employment and immigration laws.

We are promoting and increasing access to citizenship through the new White House Task Force on New Americans. The week of September 14-21 we celebrated the “Stand Stronger Commit to Citizenship Campaign.” In that one week, USCIS naturalized 40,000 people.

We now permit credit cards as a payment option for naturalization fees.

Our overall policy is to focus our immigration resources more effectively on threats to public safety and border security, and, within our existing legal authority, do as much as we can to fix the broken immigration system. We’re disappointed that Congress has not been our partner in this effort, by passing comprehensive immigration reform legislation.

Finally, we recognize that more border security and deportations may deter illegal migration, but they do nothing to overcome the “push factors” that prompt desperate people to flee Central America in the first place. We are preparing to offer vulnerable individuals fleeing the violence in Central America a safe and legal alternate path to a better life. We are expanding our Refugee Admissions Program to help vulnerable men, women and children in Central America who qualify as refugees. We are partnering with the UN High Commissioner for Refugees and non-governmental organizations in the region to do this as soon as possible. This approach builds on our recently established Central American Minors program, which is now providing an in-country refugee processing option for certain children with lawfully present parents in the United States.

Refugees

We are doing our part to address the Syrian refugee crisis. USCIS, in conjunction with the Department of State, is working hard to meet our commitment to admit at least 10,000 Syrian refugees by the end of this fiscal year. We will do this carefully, screening refugees in a multi-layered and intense screening process involving multiple law enforcement, national security, and intelligence agencies across the Federal Government.

U.S. Secret Service

Over the last year, Director Joe Clancy of the Secret Service has done a tremendous job reforming his agency, including hiring a chief operating officer from outside the Secret Service, altering the structure and management of the agency, ramping up efforts to hire new members of its workforce, and expanding training opportunities. In 2016 we will continue to work on areas that still need improvement.

The U.S. Coast Guard

With the help of Congress, in 2016 we will continue to rebuild the Coast Guard fleet. This year Congress provided funding for a ninth National Security Cutter, design funding for the Offshore Patrol Cutter, and funding to continue production of our Fast Response Cutter. As reflected in the President’s 2017 Budget Request, we will also seek $150 million for the design of a new heavy icebreaker, in recognition of the expanding commercial activity in the Arctic.

FLETC

Since 2012, our Federal Law Enforcement Training Centers (FLETC) has trained more than a quarter million federal, state and local officers and agents. At the same time, FLETC continually updates its curriculum to address the biggest challenges facing law enforcement, to include training for active shooter situations, in cyber forensics, and in human trafficking.

FEMA

In 2016 FEMA will continue to do its extraordinary job of supporting the American people and communities to prepare for, respond to, and recover from various disasters. FEMA will continue to focus on efforts to enhance resilience and mitigation measures before disaster strikes, to prevent loss and save lives.

Lawful Trade and Travel

We continue to promote lawful trade and travel. We will continue to pursue the President’s U.S.-Mexico High Level Economic Dialogue and his Beyond the Border Initiative with Canada. We are implementing the “Single Window,” which, by December 2016, will enable the private sector to use just one portal to transmit information to 47 government agencies about exports and imports, thereby eliminating over 200 different forms and streamlining the trade process.

Last week the Secretary of Commerce and I joined the President of Mexico to open a new six-lane bridge near El Paso that will replace a 78-year-old two-lane one. Next week I will join the Mexican Secretary of Finance to inaugurate a pre-inspection pilot in Laredo, Texas.

Conclusion

In conclusion, according to Time Magazine, I have “probably the hardest job in America.” That’s not true. The President has the hardest job in America. But I may rank in the top ten. I have a lot of challenges, a lot of problems and a lot of headaches. There is also far too much partisanship in Washington, and, especially during an election year, politics has become a blood-sport in this town. Too often it is more important to score political points than achieve smart, sound government policy on behalf of the American people.

Through it all, I still love public service, and I am dedicated to serving the American people, protecting our homeland, and serving our President.

I find inspiration in the amazing stories of our workforce that I told you about at the beginning of this speech. I also find inspiration and strength in the weekly batch of letters I receive from the American people we serve, particularly from the school kids. Here’s one from a young man named Brett Shepard, handwritten in pencil:

“To Jeh Johnson…I just wanted to say I think you’re doing a good job… I ran for class president in my government class. I ended up becoming the Secretary of Homeland Security which honestly I would rather be … [president is] not all it’s cracked up to be.”

Like Brett, at this moment in the life of our Nation, there’s nothing I’d rather be than Secretary of Homeland Security. It is and always will be the highlight of my professional life. In the time left to me in office, I pledge all my energy to continue to protect the homeland and leave the Department of Homeland Security a better place than I found it.

Thank you very much.

China Stealing Land, Exploiting it

In part, JapanTimes: It’s the first time the leaders of Indonesia, Malaysia, the Philippines, Singapore, Thailand, Brunei, Vietnam, Laos, Myanmar and Cambodia have held a stand-alone meeting in the U.S. China is not an ASEAN member, but its territorial claims over disputed waters have raised international concerns and heightened tensions with some member countries.

Obama said trade between the U.S. and ASEAN had increased 55 percent since he took office. The region is now the U.S.’s fourth-largest goods trade partner. U.S. companies are also the largest source of foreign investment in its member nations, he said.

Obama said he wants to build on that progress “so that growth and development is sustainable and inclusive and benefits all people.” More here.

China Reclaimed Land for South China Sea Anti-Submarine Helicopter Base Near Vietnam

PLAN Chinese Z-18F Anti-Submarine Helicopter

PLAN Chinese Z-18F Anti-Submarine Helicopter

The People’s Liberation Army is building a South China Sea helicopter base that could be a key node in a Chinese anti-submarine warfare (ASW) network across the region, according to new satellite images and analysis shared with USNI News on Friday.

The imagery — first published on news site The Diplomat — show what appears to be extensive reclamation work to build could easily be an ASW helicopter base on Duncan Island, about 200 miles from the coast of Vietnam in the disputed Paracel Islands.

The base “could signal a step-up in China’s ASW capabilities across the South China Sea. A network of helicopter bases and refueling stops scattered across the South China Sea, using no more than the bases China is already known to be building, would make almost any coordinate in the sea reachable,” read the analysis by Victor Robert Lee.
“By hopscotching between bases, the [ASW] helicopter fleet would be unconstrained by fuel range or limited numbers of ship-borne landing berths, creating a continuous and contiguous web of surveillance and response capability.”

thediplomat_2016-02-12_15-55-05The analysis went on to say “such a web would have utility beyond anti-submarine warfare, and would probably reshape surface ship and aerial combat strategies in the region,” Lee wrote.

In reaction to the revelation, Pentagon officials reiterated their call for all South China Sea nations to island reclamation work, in a Sunday statement to USNI News

“The United Sates continues to call on all claimants to halt land reclamation, construction and militarization of features in the South China Sea,” spokesman Cmdr. Bill Urban told USNI News. “While the United States does not take a position on sovereignty claims to land features, we have growing concerns about China’s pattern of assertive behavior, which creates uncertainties about China’s strategic intentions.”

Naval analyst Eric Wertheim told USNI News last week, if the analysis holds up, it would give the Chinese more military options regionally.

“If it turns out to be true. It’s another example of China excreting its effort to control the South China Sea,” the author of the U.S. Naval Institute’s Combat Fleets of the World said.
“From a military perspective it certainly has an impact as these bases can serve as unsinkable aircraft carriers.”

According to Wertheim, the bases could sustain and act as lily pads for the PLAN’s new Changhe Z-18F ASW variant – based on the French SA 321 Super Frelon heavy lift helicopter – which have a range of 450 nautical miles. The Duncan Island installation would put the helicopters easily in range of Vietnam’s maritime territory.

thediplomat_2016-02-12_15-55-13In September, Pacific Command commander Adm. Harry Harris told the Senate how he viewed the expanded installations across the entire region.

“If you look at all of these facilities — and you could imagine a network of missiles sites, runways for their fifth generation fighters and surveillance sites and all that — it creates a mechanism in which China would have de facto control over the South China Sea in any scenario short of war,” Harris said.
“These are obviously easy targets in war, it’s what we call in the military, “grapes” if you will, but short of that, the militarization of these features pose a threat against all other countries in the region.”

News of the base comes as Vietnam is in the midst of modernizing its submarine force to include six Russian-built improved Kilo-class diesel electric attack submarines. The submarines, acquired for the maritime defense of Vietnam’s substantial coastline, are part of a Hanoi naval expansion that would assert Vietnam claims in the region.

The disparity between the Vietnamese Navy and the PLAN and China’s heavily armed coast guard ships, was highlighted in 2014. That May, China sent a $1 billion offshore oil platform inside Vietnam’s disputed economic exclusion zone (EEZ) and had ringed it with ships to prevent challenges. If China, for example, made a similar attempt in the future, it could make it riskier for Vietnams reconstituted submarine force to intercede with closer ASW helicopters.

While the reclamation work in the Paracels – where last month the U.S. sent the guided missile destroyer USS Curtis Wilbur (DDG-54) on a freedom of navigation operation – is not as controversial as the ongoing work the Chinese have done to build artificial islands in the Spratly Islands near the Philippines.

In the last two years China has turned low tide elevations into military-style installations – though China insists they aren’t for military use.

Victor Robert Lee image.The Chinese controlled territories in the Paracels – on the other hand – are recognized land features that China has controlled since the mid-1970s while Vietnam and Taiwan also have claims.

In addition expanding the territory on Duncan Island by more than 50 percent in the last year, China has also expanded its Paracel holdings at its airbase at Woody Island, North Island and Tree Island.

“The recent developments at Tree, North, and Duncan islands indicate that Beijing is augmenting its position in the Paracels, which have been overshadowed of late by China’s epic construction projects in the Spratlys,” Lee wrote.
The changes in progress will in the Paracels “probably reshape surface ship and aerial combat strategies in the region.”

It was not a Hardware Issue, it was a Cyber Intrusion, IRS

IRS Confirms It Was a Victim of an Automated Attack

The attack, which occurred in January, targeted the electronic filing PIN application form on the IRS.gov Website. Experts said there are lessons to be learned.

eWeek: The U.S. Internal Revenue Service (IRS) is gearing up for another busy tax season, and it appears that hackers are getting ready, too. On Feb. 9, the IRS confirmed that it was the victim of an automated attack in January that targeted the electronic filing PIN application form on the IRS.gov Website.According to the IRS, attackers made use of personal information, including Social Security numbers, that was stolen from other non-IRS Websites. The attackers then used that information in an attempt to generate fraudulent E-File PIN numbers on IRS.gov. With a PIN number, an attacker could have potentially been able to file a tax return or gain access to other taxpayer information.The IRS investigation has found that 464,000 unique Social Security numbers (SSNs) were used in the attack, with 101,000 being successfully able to access the E-File PIN. The IRS is emphasizing that it has halted the attack and is contacting those who are affected.”No personal taxpayer data was compromised or disclosed by IRS systems,” the agency stated. “The IRS also is taking immediate steps to notify affected taxpayers by mail that their personal information was used in an attempt to access the IRS application.”

In May 2015, the IRS reported that its Get Transcript service was attacked. Get Transcript enables users to get information about their tax account transactions. As is the case with the new attack against the E-File PIN, the Get Transcript service attack involved user information that was stolen from third-party sites. The success rate for the Get Transcript attackers, however, was higher than it was for the E-File PIN attackers, where 100,000 out of 200,000 hack attempts were successful.

Security experts contacted by eWEEK are not surprised that the IRS is once again reporting an attack against its systems. The fact that the IRS.gov site was attacked with SSNs stolen from other third-party sites is, however, somewhat ironic.”One of the most successful ways hackers steal citizens’ Social Security numbers is through fraudulent phishing emails or phone calls that appear to be from the IRS,” Darren Guccione, CEO and co-founder of Keeper Security, told eWEEK.

Hackers know the public is terrified of being identity-theft victims and exploit this fear well, often by telling someone they’ve been a victim already and asking for their Social Security number, Guccione noted.Lance James, chief scientist at Flashpoint, commented that one of the big concerns he sees with the latest IRS attack is the continued reliance on Social Security numbers. “We need to rethink what a Social Security number means these days when it comes to accessing data,” James told eWEEK. “It should not be the administrator password for a person’s life.”Andy Hayter, security evangelist at G DATA Software, also commented on the risks associated with SSN disclosure. Every bit of an individual’s personally identifiable information that is collected via a breach is one more piece of information that can, and someday will, be used against a person, he said.
“As long as information such as Social Security numbers is used as identification, we will have bad actors trying to collect as much information about individuals to do harm, either through theft or worse,” Hayter told eWEEK.Inga Goddijn, executive vice president at Risk Based Security, noted that taxpayers should be concerned that questionable security practices at organizations completely unrelated to the IRS have the potential of affecting their tax returns.

Though the IRS has stated that no personal taxpayer data was compromised or disclosed in the new attack, JP Bourget, CEO of Syncurity, noted that there is still a real risk.”While maybe the IRS can in the end prevent any bad outcomes for taxpayers, I can imagine a few scenarios where a bad guy attempts to file a tax return for a refund that then holds up a valid refund to someone who is owed a refund, and even depending on that refund,” Bourget told eWEEK. “There’s also the angle of now your account is flagged and the uncertainty of how that affects a taxpayer over time and what hidden costs may arise from that.”One potentially positive outcome that could result from the IRS attack is that lessons learned could help prevent the next attack. Goddijn said that it would be helpful if the IRS can share more detail as to how the agency detected the attack and ideas for preventing these types of enumeration attacks in the future. She added that the U.S. government has been pushing for more threat intelligence sharing and improved security practices for all organizations.”Why not take this opportunity to lead the charge and share more about the attack with the security community,” Goddijn said. “That may help stop the next, similar assault on a high-value target.”

In 2015:

USAToday: Criminals hacked into an Internal Revenue Service website and gained access to approximately 100,000 tax accounts, the agency said Tuesday. Another 100,000 attempts were made but were not successful.

The attack appears to have first begun in February, the agency said.

The hackers got in by taking information about taxpayers they’d acquired from other sources and using it to correctly answer several personal identity verification questions in the IRS’ “Get Transcript” application, the IRS said in a statement.

This allowed them to get information about tax accounts through the application. The information stolen included Social Security information, date of birth and street address.

The Get Transcript application allows users to view their tax account transactions, line-by-line tax return information or wage and income reported to the IRS for a specific tax year. It was used to securely retrieve approximately 23 million taxpayer transcripts last year, the IRS said.

The information the hackers used to get in was probably previously stolen by other hackers who then sold it on the open market, said Rob Roy, chief technology officer of HP Enterprise Security Products.

The hackers who bought it “appear to have hired an army of people to submit over 200,000 queries into the IRS site over a period of four months. Not exactly a quick and easy operation,” he said.

“The matter is under review by the Treasury Inspector General for Tax Administration as well as the IRS’ Criminal Investigation unit, and the ‘Get Transcript’ application has been shut down temporarily,” the IRS said.

The agency will provide free credit monitoring services for the approximately 100,000 taxpayers whose accounts were accessed.

The theft was discovered late last week when IRS staff noticed unusual activity on the application. Further investigation showed that attempts were made beginning in February.

The breach does not involve the main IRS computer system that handles tax filing submissions. “That system remains secure,” the IRS said.

“The IRS historically has been very security, it has to be by virtue of the data it collects. But it just goes to show that even the most secure system can be attacked,” said Larry Ponemon of the Ponemon Institute, a data security research group.

NYPD Covertly Tracked Cell Phones

New York police have covertly tracked cell phones, group says

Reuters: New York City’s police have made extensive use of covert devices to track cell phones without obtaining warrants since 2008, a civil liberties group said on Thursday, revealing how frequently law enforcement in the largest U.S. city has employed the technology.

The New York Civil Liberties Union released files that showed the New York Police Department used “cell site simulators” to track nearby cell phones more than a 1,000 times over the past eight years.

The American Civil Liberties Union has identified 60 local, state and federal agencies that have adopted the devices in recent years, but the group has said there are likely far more. The extent of the devices has largely been shrouded in secrecy, as departments and private manufacturers such as Harris Corp have refused to disclose information about their use.

U.S. Representative Jason Chaffetz of Utah, a Republican, has introduced a bill to require warrants for the use of cell site simulators.

The documents released on Thursday were obtained by the NYCLU through a Freedom of Information Law request.

The NYPD does not have a written policy on using the surveillance devices and does not obtain warrants when doing so, according to the NYCLU.

Instead, the department seeks “pen register” orders, which have been used for decades to gather information on specific phone numbers. The orders are issued by judges but require a lower standard than the probable cause needed for warrants.

The NYPD’s practice is less stringent than the one adopted last year by the U.S. Department of Justice, which calls for warrants except in emergency situations.

“We still have concerns that this military equipment is being used in a civilian context,” said Mariko Hirose, an NYCLU attorney. “At the very least, they should be using warrants and with a strict privacy policy that is written.”

The NYPD did not immediately respond to a request for comment.

The devices mimic cell towers and intercept signals from nearby phones to gather information. That data can include locations of calls, numbers that are called or texted and even the content of communications, the NYCLU said.

The simulators can also sweep up information from nearby “bystander” phones.

The documents do not indicate what data police collected. The simulators were used to investigate a wide range of crimes, including murder, rape and drug trafficking.

No New York court has yet tackled the question of whether the warrantless use of such devices is constitutional, Hirose said.

She said the NYCLU could have difficulty establishing the legal standing to bring such a challenge, which would probably have to come from a criminal defendant specifically targeted by a simulator.

Yikes, there is more:

Intercept: The NYPD has used cell-site simulators, commonly known as Stingrays, more than 1,000 times since 2008, according to documents turned over to the New York Civil Liberties Union. The documents represent the first time the department has acknowledged using the devices.

The NYPD also disclosed that it does not get a warrant before using a Stingray, which sweeps up massive amounts of data. Instead, the police obtain a “pen register order” from a court, more typically used to collect call data for a specific phone. Those orders do not require the police to establish probable cause. Additionally, the NYPD has no written policy guidelines on the use of Stingrays.

Stingrays work by imitating cellphone towers. They force all nearby phones to connect to them, revealing the owners’ locations. That means they collect data on potentially hundreds of people. They are small enough to fit in a suitcase, or be mounted on a plane.

When they were originally developed in 2003, Stingrays were designed for military use. But in the past decade, they have increasingly been purchased by law enforcement agencies. According to the ACLU, Stingrays are used by at least 59 police departments in 23 states, and at least 13 federal agencies, including the DEA, FBI, and the IRS. Because most departments withhold information about Stingrays, these numbers likely underrepresent the total.

In December, The Intercept published a secret U.S. government catalogue of cellphone surveillance technology, including Stingrays and “dirt-boxes.” The advertisements boast that many of the items can spy on “up to 10,000 targets.”

Stingrays have long been a topic of concern for privacy activists. “Cell-site simulators are powerful surveillance devices that can track people, including in their homes, and collect information on innocent bystanders,” said Mariko Hirose, a senior staff attorney at the NYCLU.  “If they are going to be used in communities the police should at minimum obtain a warrant and follow written policies.”

Instead, law enforcement agencies have fought to keep Stingrays secret, even dropping criminal cases to avoid disclosing anything about them. The FBI has forced local police agencies to sign Stingray-related non-disclosure agreements, claiming that criminals and terrorists who know about Stingrays could take countermeasures against them.

The increasing use of Stingrays, coupled with the lack of transparency, has alarmed civil liberties groups. “I think it’s critical to have transparency about the use of technology like Stingrays,” said Faiza Patel, an attorney with the Brennan Center for Justice. “That’s what allows courts, the public, and our elected officials to weigh in on the proper rules.”

In September, the Department of Justice issued guidelines requiring its officers to seek probable cause warrants before using a Stingray. But the guidelines only applied to federal law enforcement agencies, not to state and local police, who have fought such a change. In one ongoing court case, the state of Maryland has argued that anyone who turns on their phone consents to having his or her location tracked.

In November, Senator Ron Wyden, D-Ore., and Rep. Jason Chaffetz, R-Utah, introduced the GPS Act, a bill that would extend the Department of Justice’s guidelines to all law enforcement agencies. “Buying a smartphone shouldn’t be interpreted as giving the government a free pass to track your movements,” Wyden said.

See the government catalogue here:

Top photo: “nypd” by Nick Allen, used under CC BY 2.0/ cropped and color corrected from original.

Contact the author:

ISIS, Islamic State has a Help Desk

The Islamic State in Iraq and Syria (ISIS) uses a 34-page manual to instruct its followers on how to stay invisible on the Internet.

The Arabic document was translated and released this week by analysts at the Combating Terrorism Center, an independent research group at the U.S. Military Academy at West Point. It includes warnings to avoid Instagram because it is owned by Facebook, and Dropbox because former secretary of State Condoleezza Rice sits on its board of investors. Famous government leaker Edward Snowden has also criticized Dropbox over its privacy, the document notes.

Users are also directed to use Apple’s encrypted FaceTime and iMessage features over regular unencrypted text and chat features. More here.

New ISIS ‘help desk’ to aid hiding from authorities

TheHill: The Islamic State in Iraq and Syria (ISIS) has opened up a new technical “help desk” that instructs terrorists on how to hide from Western authorities, according to researchers.

The Electronic Horizon Foundation (EHF) was launched on Jan. 30 as a joint effort of several of the top ISIS cybersecurity experts, the Middle East Media Research Institute (MEMRI) said in a new report.

While researchers have previously uncovered an ISIS “help desk” and 34-page manual that help extremists encrypt their communications, MEMRI said the EHF takes these services to an “alarming” new level.

“Jihadis have long sought technical information, which has been confined in the past to various password-protected jihadi forums,” said the MEMRI report, shared exclusively with The Hill. “However, the freedom and ease by which they can now obtain that information is alarming, especially when such information is shared over private and secure channels.”

The EHF operates on the encrypted messaging platform Telegram but also maintains a Twitter account that disseminates information and directs followers to its secure Telegram channel.

The group’s self-stated goal is clear: “Spreading security and technical awareness among the monotheists.”

According to an announcement celebrating the EHF launch, ISIS has spent a year establishing the group with the goal of “unifying the technical and security efforts, and uniting the ranks of the mujahideen’s supporters.”

It brings together several technical support entities, such as the Information Security channel on Telegram and the “Islamic State Technician,” an ISIS security specialist thought to be behind a leading password-protected technical forum.

The announcement, which the MEMRI translated, was also direct that the EHF had been formed “due to the electronic war and tight surveillance imposed by the Western intelligence apparatuses over Internet users, and their tracking and following of the mujahideen and their supporters, and targeting them based on their data and information, which they share over the Internet.”

EHF pledged to provide resources to help combat this surveillance.

“It is time to face the electronic surveillance, educate the mujahideen about the dangers of the Internet, and support them with the tools, directives and security explanations to protect their electronic security, so that they don’t commit security mistakes that can lead to their bombardment and killing,” the announcement said.

As of early this week, the EHF Telegram account had over 2,200 members.

MEMRI said EHF has not posted much yet, “but it is expected to take the lead nonetheless in content posted as time goes by.”

If the group follows in the footsteps of its creators, its content will be “defensively-oriented,” such as tutorials on mobile phone security, instead of “offensively-oriented,” such as instructions on launching cyberattacks, MEMRI said.

In the wake of the terror attacks in Paris and San Bernardino, Calif., law enforcement officials have cautioned that potential terrorists are increasingly using encryption to hide from investigators, a phenomenon they call “going dark.”

The warnings have led to some calling for legislation that would guarantee government access to encrypted data, although momentum on Capitol Hill for such a bill has cooled in recent months.

“I don’t think we’re any closer to a consensus on that than we were, I think, six months ago,” Rep. Adam Schiff (D-Calif.), the House Intelligence Committee’s top Democrat, said last week. “Or if there is a consensus, it is that a legislative solution, I think, is very unlikely.”

 

IS Encryption Guide by AlyssaBereznak