Launch a Moratorium on Refugees NOW

There are 2 key words that make it very easy with approval for foreign nationals to enter the United States, ‘refugees and asylees’, both are very threatening conditions to our national security.

Reuters / Moayad Zaghmout

Is anyone taking notice? The call to action here is to demand your district representative in Congress to launch an immediate moratorium now. Here is your proof and platform…if it happens there, it is happening here and that too has been proven.

The United Nations is the master of the refugee and asylum program for the United States. This has been previously explained here.

Enemies of the West such as al Qaeda, al Nusra and ISIS has a brilliant plan and it is working.

UN-cleared refugees to Norway revealed as ISIS militants – report

Norwegian authorities have revealed that several Middle East refugees set to be granted asylum in Norway under a UN program have links to the Islamic State and Nusra Front extremist groups, media reported on Monday.

 

Unfortunately, there are people who try to exploit and abuse the refugee system. We have uncovered some quota refugees with links to the Nusra Front and the ISIL,” police superintendent Svein Erik Molstad said, as quoted by the Dagbladetnewspaper.

During two trips to the Middle East, Norway’s PST police intelligence unit discovered up to 10 Norway-bound refugees were members of the militant groups. The findings were discovered during background checks conducted by the agency.

The migrants are part of the so-called “quota refugees” cleared by the UN High Commissioner for Refugees (UNHCR) for resettlement in Norway.

The issue is particularly relevant at the moment, as the Norwegian Parliament is discussing how many more refugees Norway will accept from Syria. A majority are calling for 10,000 to be let into the country, although local governments say they cannot accommodate such a large number. Negotiations are underway, with a final decision expected later this month.

Around 5,000 refugees already in Norway are in asylum centers, awaiting housing.

Both the Islamic State (IS, formerly ISIS/ISIL) and Nusra Front are engaged in fighting against forces loyal to Syrian President Bashar Assad. IS now controls large swathes of Iraq and Syria, and has ambitions to form a ‘caliphate’ in the Middle East.

This is not the first time that concern has been raised regarding militants disguised as refugees. A Libyan government adviser said in May that Islamic State is smuggling “prize operatives” into Europe.

In April, IS supporters posted photographs allegedly taken in Italian cities, accompanied with messages such as: “We are in your streets.”

Surveillance State, Your Touch and Your Smartphone

There was a Rand Paul filibuster last week over the NSA broad sweep of citizen’s private affairs. Senator Paul does have a major point in his efforts to protect our privacy yet to what ends when it comes to national security? He pledges to take the matter of the vote on the NSA to see the Patriot Act end.

There is yet another piece of legislation that is important to understand. The USA Freedom Act. In part:

Uniting and Strengthening America by Fulfilling Rights and Ending Eavesdropping, Dragnet Collection, and Online Monitoring Act

H.R. 3361/ S. 1599

Purpose:  To rein in the dragnet collection of data by the National Security Agency (NSA) and other government agencies, increase transparency of the Foreign Intelligence Surveillance Court (FISC), provide businesses the ability to release information regarding FISA requests, and create an independent constitutional advocate to argue cases before the FISC.

End bulk collection of Americans’ communications records

• The USA Freedom Act ends bulk collection under Section 215 of the Patriot Act.
• The bill would strengthen the prohibition on “reverse targeting” of Americans—that is, targeting a foreigner with the goal of obtaining communications involving an American.
• The bill requires the government to more aggressively filter and discard information about Americans accidentally collected through PRISM and related programs.

Reform the Foreign Intelligence Surveillance Court

• The USA Freedom Act creates an Office of the Special Advocate (OSA) tasked with promoting privacy interests before the FISA court’s closed proceedings. The OSA will have the authority to appeal decisions of the FISA court.
• The bill creates new and more robust reporting requirements to ensure that Congress is aware of actions by the FISC and intelligence community as a whole.
• The bill would grant the Privacy and Civil Liberties Oversight  Board subpoena authority to investigate issues related to privacy and national security.

Increase Transparency

• The USA Freedom Act would end secret laws by requiring the Attorney General to publicly disclose all FISC decisions issued after July 10, 2003 that contain a significant construction or interpretation of law.
• Under the bill, Internet and telecom companies would be allowed to publicly report an estimate of (1) the number of FISA orders and national security letters received, (2) the number of such orders and letters complied with, and (3) the number of users or accounts on whom information was demanded under the orders and letters.
• The bill would require the government to make annual or semiannual public reports estimating the total number of individuals and U.S. persons that were subject to FISA orders authorizing electronic surveillance, pen/trap devices, and access to business records.

DONT APPLAUD JUST YET…this next introduction of technology is very chilling. When does it all stop with surveillance?

NSA will Track Your Smartphone Finger Strokes

Smartphone technology built by Lockheed Martin promises to verify a user’s identity based on the swiftness and shape of the individual’s finger strokes on a touch screen. The mobile device feature, created by Lockheed Martin, verifies a user’s identity based on the swiftness and shape of the individual’s finger strokes on a touch screen. The technology is but one incarnation of handwriting-motion recognition, sometimes called “dynamic signature” biometrics, that has roots in the Air Force. “Nobody else has the same strokes,” said John Mears, senior fellow for Lockheed IT and Security Solutions. “People can forge your handwriting in two dimensions, but they couldn’t forge it in three or four dimensions. Three is the pressure you put in, in addition to the two dimensions on the paper. The fourth dimension is time. The most advanced handwriting-type authentication tracks you in four dimensions.”  The biometric factors measured by Lockheed’s technology, dubbed “Mandrake,” are speed, acceleration and the curve of an individual’s strokes. “We’ve done work with the NSA with that for secure gesture authentication as a technique for using smartphones,” Mears said. “They are actually able to use it.” According to Defense One . Lockheed officials said they do not know how or if the agency has operationally deployed the Mandrake smartphone doodling-recognition tool. The company also is the architect of the FBI’s recently completed $1 billion facial, fingerprint, palm print, retina scan and tattoo image biometric ID system. That project, called the Next Generation Identification system, could tie in voice and “gait matching” (how a person walks) in the future, the bureau has said. Mandrake potentially might be useful for emergency responders who often do not have the time or capability to access an incident command website, Mears said.

Stuxnet V. 1 Success V. 2 North Korea Failed

Iran wasn’t the only country that had its nuclear ambitions targeted by a sneaky US cyberattack. It turns out the American government also tried to take down North Korea’s nuclear programs with the Stuxnet worm five years ago, Reuters reports. But there was one major difference: That attack ultimately flamed out. While the US managed to get Stuxnet into Iran’s nuclear facilities (reportedly by hacking suppliers), which ultimately led to the destruction of more than a thousand uranium enriching centrifuges, it never managed to get it into North Korea’s core systems. It turns out having an extremely isolated network worked in North Korea’s favor. That’s particularly ironic since Stuxnet quickly made its way out of Iran and wreaked havoc across the web.

The operation began in tandem with the now-famous Stuxnet attack that sabotaged Iran’s nuclear program in 2009 and 2010 by destroying a thousand or more centrifuges that were enriching uranium. Reuters and others have reported that the Iran attack was a joint effort by U.S. and Israeli forces.
According to one U.S. intelligence source, Stuxnet’s developers produced a related virus that would be activated when it encountered Korean-language settings on an infected machine.
But U.S. agents could not access the core machines that ran Pyongyang’s nuclear weapons program, said another source, a former high-ranking intelligence official who was briefed on the program.
The official said the National Security Agency-led campaign was stymied by North Korea’s utter secrecy, as well as the extreme isolation of its communications systems. A third source, also previously with U.S. intelligence, said he had heard about the failed cyber attack but did not know details.
North Korea has some of the most isolated communications networks in the world. Just owning a computer requires police permission, and the open Internet is unknown except to a tiny elite. The country has one main conduit for Internet connections to the outside world, through China.
In contrast, Iranians surfed the Net broadly and had interactions with companies from around the globe.


A spokeswoman for the NSA declined to comment for this story. The spy agency has previously declined to comment on the Stuxnet attack against Iran.
The United States has launched many cyber espionage campaigns, but North Korea is only the second country, after Iran, that the NSA is now known to have targeted with software designed to destroy equipment.
Washington has long expressed concerns about Pyongyang’s nuclear program, which it says breaches international agreements. North Korea has been hit with sanctions because of its nuclear and missile tests, moves that Pyongyang sees as an attack on its sovereign right to defend itself.
U.S. Secretary of State John Kerry said last week that Washington and Beijing were discussing imposing further sanctions on North Korea, which he said was “not even close” to taking steps to end its nuclear program.

Experts in nuclear programs said there are similarities between North Korea and Iran’s operations, and the two countries continue to collaborate on military technology.
Both countries use a system with P-2 centrifuges, obtained by Pakistani nuclear scientist A.Q. Khan, who is regarded as the father of Islamabad’s nuclear bomb, they said.
Like Iran, North Korea probably directs its centrifuges with control software developed by Siemens AG that runs on Microsoft Corp’s Windows operating system, the experts said. Stuxnet took advantage of vulnerabilities in both the Siemens and Microsoft programs.
Because of the overlap between North Korea and Iran’s nuclear programs, the NSA would not have had to tinker much with Stuxnet to make it capable of destroying centrifuges in North Korea, if it could be deployed there.
Despite modest differences between the programs, “Stuxnet can deal with both of them. But you still need to get it in,” said Olli Heinonen, senior fellow at Harvard University’s Belfer Center for Science and International Affairs and former deputy director general of the International Atomic Energy Agency.
NSA Director Keith Alexander said North Korea’s strict limitations on Internet access and human travel make it one of a few nations “who can race out and do damage with relative impunity” since reprisals in cyberspace are so challenging.
When asked about Stuxnet, Alexander said he could not comment on any offensive actions taken during his time at the spy agency.
David Albright, founder of the Institute for Science and International Security and an authority on North Korea’s nuclear program, said U.S. cyber agents probably tried to get to North Korea by compromising technology suppliers from Iran, Pakistan or China.
“There was likely an attempt” to sabotage the North Korean program with software, said Albright, who has frequently written and testified on the country’s nuclear ambitions.

The Stuxnet campaign against Iran, code-named Olympic Games, was discovered in 2010. It remains unclear how the virus was introduced to the Iranian nuclear facility in Natanz, which was not connected to the Internet.
According to cybersecurity experts, Stuxnet was found inside industrial companies in Iran that were tied to the nuclear effort. As for how Stuxnet got there, a leading theory is that it was deposited by a sophisticated espionage program developed by a team closely allied to Stuxnet’s authors, dubbed the Equation Group by researchers at Kaspersky Lab.
The U.S. effort got that far in North Korea as well. Though no versions of Stuxnet have been reported as being discovered in local computers, Kaspersky Lab analyst Costin Raiu said that a piece of software related to Stuxnet had turned up in North Korea.
Kaspersky had previously reported that the software, digitally signed with one of the same stolen certificates that had been used to install Stuxnet, had been submitted to malware analysis site VirusTotal from an electronic address in China. But Raiu told Reuters his contacts had assured him that it originated in North Korea, where it infected a computer in March or April 2010.
Some experts said that even if a Stuxnet attack against North Korea had succeeded, it might not have had that big an impact on its nuclear weapons program. Iran’s nuclear sites were well known, whereas North Korea probably has at least one other facility beyond the known Yongbyon nuclear complex, former officials and inspectors said.
In addition, North Korea likely has plutonium, which does not require a cumbersome enrichment process depending on the cascading centrifuges that were a fat target for Stuxnet, they said.
Jim Lewis, an advisor to the U.S. government on cybersecurity issues and a senior fellow at the Center for Strategic and International Studies, said there are limitations to cyber offense.
A cyber attack “is not something you can release and be sure of the results,” Lewis said.

 

Follow the Nukes, Money and Death(s) to Putin?

Putin clamps down on troop-death data

Rule may hide ‘secret war’ in Ukraine

Putin signed an order Thursday making the deaths of Russian troops lost during “special operations” a secret, amending a previous decree that limited such secrecy to deaths of soldiers in wartime. Some watchers can see only one plausible reason for the change: Russia is gearing up for another military push into Ukraine.

“We’re in a pre-war situation. Right now, there’s going to be another campaign in Ukraine,” said Pavel Felgenhauer, a military analyst based in Moscow, who added that Russia was being secret about losses because “we’re fighting a secret war.” Read much more here.

Embedded image permalink

Who Took Moldovos Millions ~ The Crooks or the Kremlin

On the eve of a national election in tiny Moldova last November, $450 million — equal to 10 percent of the Eastern European country’s entire annual gross domestic product — went missing. So far, no one knows where it went.

Much was at stake in the election. Last June, Moldova’s pro-Europe government signed an association agreement with the European Union. Pro-Russia opponents favored partnership with Moscow’s Eurasian Economic Union instead. The incumbents barely won. Moscow signaled its displeasure with the EU agreement by placing an embargo on the import of Moldovan fruits, vegetables and wine.

Earlier this month, approximately 10,000 Moldovans marched in the streets of the capital, Chisinau, shouting, “Down with the thieves!” and “We want the billions back!”

Kroll, the international risk consultancy, had been engaged to do an initial private investigation. The parliament’s speaker posted this from their report: “There appears to have a deliberate plan to gain control of each of the banks and subsequently manipulate transactions to gain access to credit, whilst giving the appearance to the contrary.” Yet, the National Anti-corruption Center of Moldova claimed the report was based on rumors that leaked to local media. Read more here.

Oppose Putin?

Putin opponent near death in suspected poisoning

An outspoken opponent of Russian President Vladimir Putin was near death Friday from an apparent poisoning just three months after his close political ally was gunned down near the Kremlin, and supporters want him evacuated to Europe or Israel to determine what sickened him.

Vladimir Kara-Murza Jr., who has long been based in Washington, was in a hotel in Moscow when he suddenly lost consciousness May 26 and was hospitalized with what his wife called “symptoms of poisoning.” The 33-year-old is a coordinator for Open Russia, a nongovernmental organization which on the previous day released a documentary film accusing close Putin crony and Chechen strongman Ramzan Kadyrov of human rights abuses including torture and murder.

“Doctors have just confirmed that he was poisoned,” Andrei Bystrov, an opposition activist and friend of the Kara-Murza family, told The Telegraph. “As to what with, they can’t say yet. It could be anything.”

Kara-Murza, a dual Russian-British citizen, was a close associate of opposition leader Boris Nemtsov, who was assassinated in February.

“I am deeply concerned about the mysterious illness of Vladimir Kara-Murza, especially given the recent murder of Boris Nemtsov and the number of Putin’s opponents who have been poisoned,” Rep. Chris Smith, R-N.J., said in a statement

Kara-Murza’s family was trying to get him evacuated to Europe or Israel for toxicology tests after hemodialysis failed to stop complete kidney failure. Read more here.

Nuclear Aggression

NATO Leader Sees Dangerous Trend in Russia’s Nuclear Activities

Russia’s recent use of nuclear rhetoric, exercises and operations are deeply troubling. As are concerns regarding its compliance with the Intermediate Nuclear Forces Treaty.

President Putin’s admission that he considered putting Russia’s nuclear forces on alert while Russia was annexing Crimea is but one example.

Russia has also significantly increased the scale, number and range of provocative flights by nuclear-capable bombers across much of the globe. From Japan to Gibraltar. From Crete to California. And from the Baltic Sea to the Black Sea.

Russian officials announced plans to base modern nuclear-capable missile systems in Kaliningrad. And they claim that Russia has the right to deploy nuclear forces to Crimea.

 

U.S. Declares Cuba Normal Despite Terror History

As you read this short notice, consider that now that relations with Cuba have been formally normalized, will the next step be to turn Guantanamo over to Cuba and terminate the lease, which was designed in perpetuity?

Kerry signed the order on Cuba today placing Cuba back to a pre-Cold War status. Only 3 countries left that carry the distinction of a state sponsor of terror .

The step comes as officials from the countries continue to hash out details of restoring full diplomatic relations, including opening embassies in Washington and Havana and returning ambassadors to the two countries. Friday’s removal of Cuba from the terrorism list had been a key Cuban demand.

President Barack Obama recommended to Congress last month that Cuba be removed from the U.S. list, triggering a 45-day congressional notification period.

State Sponsors of Terrorism

 

Countries determined by the Secretary of State to have repeatedly provided support for acts of international terrorism are designated pursuant to three laws: section 6(j) of the Export Administration Act, section 40 of the Arms Export Control Act, and section 620A of the Foreign Assistance Act. Taken together, the four main categories of sanctions resulting from designation under these authorities include restrictions on U.S. foreign assistance; a ban on defense exports and sales; certain controls over exports of dual use items; and miscellaneous financial and other restrictions.

Designation under the above-referenced authorities also implicates other sanctions laws that penalize persons and countries engaging in certain trade with state sponsors. Currently there are three countries designated under these authorities: Iran, Sudan, and Syria.

Country Designation Date
Iran January 19, 1984
Sudan August 12, 1993
Syria December 29, 1979

Recommendation to Rescind Cuba’s Designation as a State Sponsor of Terrorism

(Apr. 14): In December 2014, as a critical component of establishing a new direction for U.S.–Cuba relations, the President directed the State Department to launch a review of Cuba’s designation as a State Sponsor of Terrorism and provide a report to him within six months. Last week, the State Department submitted a report to the White House recommending, based on the facts and the statutory standard, that President Obama rescind Cuba’s designation as a State Sponsor of Terrorism.

Country Reports on Terrorism


U.S. law requires the Secretary of State to provide Congress, by April 30 of each year, a full and complete report on terrorism with regard to those countries and groups meeting criteria set forth in the legislation. This annual report is entitled Country Reports on Terrorism. Beginning with the report for 2004, it replaced the previously published Patterns of Global Terrorism.

The U.S. State Department keeps a summary and classification on countries. To read further on those go here.