Operation Trident Juncture 2015 vs. Russian Aggression

Around 36,000 troops from more than 30 nations (27 NATO Allies plus partners).

• More than 230 units, more than 140 aircraft and more than 60 ships.

• More than 12 international organizations, governmental organizations and NGOs will participate, including the European Union, theOSCE, the International Committee of the Red Cross, and the African Union.

 

ArmyTimes: ZARAGOZA, Spain – Explosions, smoke and dozens upon dozens of military vehicles gradually filled a valley here on Wednesday afternoon for the latest show of force for Exercise Trident Juncture 2015.

Hundreds of military leaders, dignitaries and media watched as NATO troops maneuvered through the San Gregorio Military Training Area and, later, as hundreds of paratroopers from the 82nd Airborne Division dropped from the sky.

Despite the huge audience, leaders noticed one invitee was a no-show: Russia.

Trident Juncture 2015 — the largest NATO exercise in Europe since 2002 — is in large part a response to Russia’s recent aggression against Ukraine. More here.

NATO chief sounds alarm over Russian buildup

DailyStar; TROIA, Portugal: NATO’s secretary-general sounded the alarm Thursday over the buildup of Russian military forces from the Baltic Sea to the Mediterranean and called on the U.S.-led alliance to come up with a response.

Jens Stoltenberg said the Russians have concentrated military forces in Kaliningrad, the Black Sea and the eastern Mediterranean, where they are assisting beleaguered Syrian President Bashar Assad.

Speaking at a news conference during NATO war games in Troia, south of Lisbon, Stoltenberg experts believe the buildup of Russian military might could lead to Moscow’s ability to limit the access of the United States and its allies to certain regions.

“We have to be sure that we are able to overcome these capabilities, so we can reinforce, so we can move and we can deploy forces if needed,” Stoltenberg said.

The NATO chief said the challenge of Russia’s new capabilities in the field of what defense specialists call “anti-access/area denial” has become “the question on our agenda.”

Leaders and representatives of nine Eastern European NATO member nations meeting in the Romanian capital of Bucharest Wednesday called for an increased alliance presence in Europe in response to Russia’s annexation of Crimea from Ukraine, and threats from the ISIS group.

Until now, NATO has been cool to such requests, citing an agreement it concluded with Russia in 1997, when relations with Moscow were friendlier. Under the accord, NATO said it would refrain from any “additional permanent stationing of substantial combat forces.”

Though the alliance opened small liaison offices in capitals of its Eastern European members this year and has rotated military units in and out of countries that feel most at risk from Russia, it appears to have carefully avoided anything that might be construed by the Kremlin as the stationing of permanent reinforcements.

Stoltenberg’s comments Thursday hinted that NATO and its member nations might be rethinking their approach. “The important thing is that we have military presence,” the secretary-general said.

“To some extent,” he said, “it is artificial to distinguish between occasional military presence and other kinds that are more persistent.”

Earlier in the day, NATO put its naval and special forces capabilities on display at this naval base south of Lisbon, and also showcased the ability of armed forces from its 28 member nations to work together.

As Stoltenberg and other VIP guests looked on, British and Spanish marines riding landing craft stormed a beach. Portuguese marines fast-roped from a helicopter onto the bow of a ship, simulating the retaking of a vessel seized by terrorists or pirates. The Portuguese were reinforced by units from Polish special forces, who also checked for the presence of chemical, biological or nuclear hazards.

For the past three weeks, more than 36,000 personnel from NATO allies and partner nations have been taking part in exercises across a broad swath of Europe stretching from Portugal to Italy. The war games, code-named Trident Juncture, are being held to hone NATO’s ability to respond to a range of new security threats, including a more assertive Russia and Muslim terrorist groups active in the Middle East and North Africa.

March, 2015, ISIS Posted Job Openings for Bomb-makers

 

ISIS posts job ad for press officers, teachers and bomb makers

 

NYPost: ISIS is hiring.

A job advertisement has surfaced online aimed at supporters of the Islamic State who do not wish to fight on the front lines.

Omar Hussain, a British jihadist who fled the UK to join the Islamic State in Syria, has posted 10 positions that the terrorist organization is looking to fill.

Writing on behalf of the group under the name Abu Sa’eed Al-Britani, the devout ISIS member explains that while not wanting to be a soldier is a “sign of weak faith,” there is still much work to be done even if you’re afraid to kill or wage jihad, the Independent reports.

Number one on the list of available occupations is press officer, needed for the so-called ISIS “media center.” This “internal media” position would provide support from the masses as Western news outlets continue to release loads of “negative propaganda” against the group, Al-Britani said.

Another post that he said needed to be filled is the role of schoolteacher. This person would ultimately be in charge of instructing the “next generation … the correct Islamic teachings.”

“Imagine the reward in nurturing a child upon tawheed (oneness with God) and jihad (holy struggle)!” Al-Britani said. “All his efforts and deeds he does due to you teaching him will earn you huge rewards. And many of these children are the sons and daughters of Mujahedeen and martyrs.”

ISIS Forum Features Manual On How To Build Bombs, Blow Up Planes

A guide with detailed instructions about how to make bombs and sneak them past airport security is featured on a prominent forum

A manual explaining how to build bombs and slip them past airport security was posted on a main ISIS forum several months before the recent downing of a Russian passenger plane.

“Any security system, be it human or mechanical, has weak points that can be breached as long as you know their details and mechanisms,” said the guide, which Vocativ discovered using our deep web technology.

The manual was originally published in Al-Qaeda’s “Inspire” English-language magazine in December, then posted to the ISIS forum, in Arabic, in March. A forum administrator deliberately made the guide the lead post in a forum section dedicated to technical know-how for jihadists seeking to commit acts of violence. It remains unclear, however, if the manual was placed in the section’s top spot before or after the Metrojet plane came down over Egypt’s Sinai Peninsula on Saturday.

But as of Thursday, the guide was prominently positioned on the ISIS forum, and discussion about the manual was active — showing just how easy it is for ISIS-affiliated jihadists to access information about building and using homemade explosives to blow up an aircraft.

The guide is thorough, listing what is says are every measure and action needed to blow up a plane. It details how to make homemade explosives using acetone, potassium chlorate and other chemicals. It explains how to carry a bomb successfully through airport security, including past metal detectors, scent detectors and frisking and screening machines. It gives specifics about the “best” place to put a bomb on plane.

It also includes information about American, British and French airlines, and offers final instructions for jihadists after they board a plane with a bomb. “Relax, do not become tense,” it says. “At this stage you have achieved a great success even if the plane is not blown up.”

ISIS has insisted for days that it is responsible for taking down the Metrojet flight flying over the Sinai, killing all 224 people on board. It has not provided details on how it might have carried out such a devastating operation.

U.S. and British officials have said the aircraft may have been downed by an explosive device. On Thursday, Britain said there was a “significant possibility” that ISIS’ branch in Egypt was behind a suspected bomb attack, Reuters reported.

Senator Cruz Lights the Fuse Against Terrorism

Cruz joins fight to label Muslim B’hood ‘terrorist organization’

Sen. Ted Cruz and several House Republicans are leading a new legislative effort aimed at compelling the U.S. government to label Egypt’s Muslim Brotherhood a “foreign terrorist organization.”

“This bill recognizes the simple fact that the Muslim Brotherhood is a radical Islamic terrorist group,” Cruz said upon the introduction of his Senate version of the bill. “A number of our Muslim allies have taken this common sense step, including Egypt, Saudi Arabia, and the [United Arab Emirates].”

“The group supports and stands behind numerous terrorist organizations that are responsible for acts of violence and aggression,” said Rep. Mario Diaz-Balart, R-Fla., the lead House sponsor. “It is time for Congress and the Department of State to recognize and sanction them as they deserve, as a foreign terrorist organization.”

The bill, the Muslim Brotherhood Terrorist Designation Act, asks Secretary of State John Kerry to label the organization a foreign terrorist organization within 60 days, or to present a report to Congress detailing why he opted against doing so. Much more here. To read the proposed Senate legislation titled:   To require the Secretary of State to submit a report to Congress on the designation of the Muslim Brotherhood as a foreign terrorist organization, and for other purposes.

 

Nearly 200 U.S. troops have been killed and nearly 1,000 injured by Iranian-made explosives in Iraq, according to new disclosures from a partially declassified report conducted by U.S. Central Command and described by sources to the Washington Free Beacon.

The number of U.S. deaths resulting from Iranian terrorism were revealed for the first time on Wednesday by Sen. Ted Cruz (R., Texas) during a hearing focusing on the Obama administration’s failure to prosecute terrorists directly responsible for the deaths of Americans.

At least 196 U.S. service members fighting in Iraq were killed directly as a result of Iranian-made explosively formed penetrators, or EFPs, according to Cruz and congressional sources familiar with Centcom’s mostly classified report.

The deaths took place between 2003 and 2011. The Iranian explosive devices wounded another 861 U.S. soldiers, and a total of 1,534 attacks were carried out on U.S. military members over this period, according to sources familiar with the report, which was provided to Cruz’s office.

The explosive devices are a “hallmark weapon” of Iran’s Quds force, a paramilitary group that operates outside of Iran’s borders, according to sources familiar with the report. It has been determined that only Iranian-backed operatives use these weapons in Iraq.

U.S. military leaders disclosed in testimony before the Senate that Iranian terror activities have claimed the lives of around 500 U.S. soldiers, which accounts for at least 14 percent of all American casualties in Iraq from 2003 to 2011.

“That blood is on Iran’s hands,” Cruz said Wednesday afternoon during a hearing on the Obama administration’s decision to not prosecute terrorists who have murdered American citizens and troops abroad.

“Iran has been and still is at war with the U.S.,” Cruz said. “Yet despite the slaughter and maiming of an untold number of America citizens … the U.S. government has rather shockingly failed time and time again to fulfill its sovereign duty to obtain justice for its citizens. Our government has failed terror victims in a number of ways.”

Palestinian terrorists, many of them supported by Iran, have killed more than 53 Americans. The Department of Justice has not prosecuted a single person, Cruz said.

Those testifying at the hearing said they were alarmed by the government’s hesitation to prosecute terror cases.

“The greatest pain that victims and their families have is watching another incident take place, watching another death,” said Aegis Industries CEO Kenneth Stethem, whose brother, Robert, was killed during the 1985 hijacking of a TWA flight by Iranian-backed Hezbollah terrorists.

“I would like to know if the administration has asked Iran if they’re still at jihad,” Stethem said, adding that separating Iran from terrorism is “like separating light from a flame and heat from a fire.”

“Is it sound policy to give money to a terrorist nation that is at war with us?” Stethem asked, referring to the more than $150 billion in cash assets that will be released to Iran as a result of the recent nuclear accord.

Stethem also said he was concerned by the Obama administration’s failure to hold Iran accountable for recent violations of the accord, which include the testing of ballistic missiles.

“I’d just like to see some accountability,” he said. “And Congress must do it because the administration isn’t.”

Daniel Miller, a victim of Hamas terrorism, recalled how suicide bombers destroyed the Jerusalem café that he and his friends were dining at.

Miller said that he and other victims of Iran-sponsored terrorism attempted to sue the Islamic Republic. After winning more than $70 million in damages, the U.S. government stepped in to argue on Iran’s behalf.

“I expected a battle from Iran” to get the money legally owed, Miller said. “What I didn’t expect was the battle we faced from my own government.”

Lawyers from the Department of Justice filed a brief during one legal processing to protect Iran from having to pay the victims.

“On one side [of the courtroom] was my legal team representing victims of terrorism, and on the other side was the U.S. sitting with its newfound ally Iran,” Miller said.

He also said Obama administration “cares more about protecting Iranian assets than protecting its own terror victims.”

Cruz called the story “disgusting,” “shameful,” and “unacceptable.”

Others at the hearing criticized the Obama administration for interceding in a legal case in which American victims of Palestinian terrorists were awarded billions of dollars in damages. The administration argued in an unprecedented briefing to the court earlier this year that this money should not be paid out to the victims because it would financially cripple the Palestinian government.

 

Shake Your Head at This DoJ Case, Netcracker

Ever wonder where the NSA was on this? Ever wonder where the background check was for Netcracker as a bona fide government contractor? More fleecing that several people in the decision chain approved this.

USDOJ: Netcracker Technology Corp. and Computer Sciences Corp. Agree to Settle Civil False Claims Act Allegations  (The spin in this statement is in full testimony of how things operate in the Federal government, meanwhile the risk, well frankly the treasonous decision is epic.

 

Pentagon Farmed Out Its Coding to Russia

By Patrick Malone, Center for Public Integrity

The Pentagon was tipped off in 2011 by a longtime Army contractor that Russian computer programmers were helping to write computer software for sensitive U.S. military communications systems, setting in motion a four-year federal investigation that ended this week with a multimillion-dollar fine against two firms involved in the work.

The contractor, John C. Kingsley, said in court documents filed in the case that he discovered the Russians’ role after he was appointed to run one of the firms in 2010. He said the software they wrote had made it possible for the Pentagon’s communications systems to be infected with viruses.

Greed drove the contractor to employ the Russian programmers, he said in his March 2011 complaint, which was sealed until late last week. He said they worked for one-third the rate that American programmers with the requisite security clearances could command. His accusations were denied by the firms that did the programming work.

“On at least one occasion, numerous viruses were loaded onto the DISA [Defense Information Systems Agency] network as a result of code written by the Russian programmers and installed on servers in the DISA secure system,” Kingsley said in his complaint, filed under the federal False Claims Act in U.S. District Court in Washington, D.C., on March 18, 2011.

Asked to confirm that the Russians’ involvement in the software work led to the presence of viruses in the U.S. military’s communications systems, Alana Johnson, a spokeswoman for the Defense Information Systems Agency, declined to answer on the grounds that doing so could compromise the agency’s “national security posture.”

“It’s something that we take very seriously,” Johnson said in a telephone interview on Tuesday. “The Department of Defense’s posture on cybersecurity ultimately affects national security.”

Kingsley first told a Defense Information Systems Agency official on Jan. 10, 2011, that Russians had been doing computer programming for Massachusetts-based NetCracker Technology Corporation under a federal contract, through an arrangement that corporate officials referred to as its “Back Office,” he said in his complaint. He said the work had been done in Moscow and elsewhere in Russia.

The DISA official confirmed that the practice of outsourcing the work to employees in Russia violated both the company’s contract and federal regulations that mandate only U.S. citizens with approved security clearances work on classified systems, Kingsley’s complaint said.

On Monday, NetCracker and the much larger Virginia-based Computer Sciences Corporation—which had subcontracted the work—agreed to pay a combined $12.75 million in civil penalties to close a four-year-long Justice Department investigation into the security breach. They each denied Kingsley’s accusations in settlement documents filed with the court.

The agency’s inspector general, Col. Bill Eger, who had investigated Kingsley’s allegations, said the case was a good example of how his office combats fraud. In a separate statement released Monday, Channing D. Phillips, the U.S. Attorney for the District of Columbia, said that “in addition to holding these two companies accountable for their contracting obligations, this settlement shows that the U.S. Attorney’s Office will take appropriate measures necessary to ensure the integrity of government communications systems.”

The $22 million contract the companies were working on dates from 2008, when the Pentagon first asked Computer Sciences Corporation to fortify and administer the computer networks of the Defense Information Systems Agency. The agency supports battlefield operations by running communication systems that enable soldiers, officers, and coalition partners to communicate in secret.

Computer Sciences Corporation collected a total of $1.5 billion from the Pentagon in fiscal year 2014, according to the Federal Procurement Data System. The work at the heart of this case was part of a $613 million contract between the Defense Information Systems Agency and the corporation. Netcracker, which has done direct work for the Air Force and the General Services Administration, worked as a subcontractor on the deal.

In his complaint, Kingsley asserted that Computer Sciences Corporation executives knew about Netcracker’s work in Russia. But a corporation spokeswoman, in a written statement, denied it. “[Computer Sciences Corporation] believes it is as much a victim of NetCracker’s conduct as is our [Defense Information Systems Agency] customer and agreed to settle this case because the litigation costs outweigh those of the settlement,” Heather Williams wrote. “Security is of the utmost importance” to the corporation, she wrote.

Kingsley also said in his whistleblower complaint that when he questioned NetCracker’s general counsel about the propriety of the arrangement, the counsel assured him nothing was wrong. When he asked the company’s board of directors for permission to discuss the Russians’ participation with the Defense Information Systems Agency, his “requests were rebuffed,” he said in the complaint.

The next day, in an email to the board of directors at NetCracker Government Services, the company’s general counsel characterized Kingsley’s conversation with the government official as an “unscheduled, one-on-one meeting” that ended with a “vitriolic rampage” and left the Defense Information Systems Agency officer with the impression that Kingsley was a “lunatic,” according to Kingsley’s complaint. Kingsley said in his complaint that this description of the meeting was incorrect and intended to hurt Kingsley’s reputation with the company’s other board members.

Joanna Larivee, a spokeswoman for Netcracker, responded with a written statement that it “has cooperated fully with the Department of Justice throughout its review of this matter and explicitly denies liability for any wrongdoing. We have always taken responsible steps to ensure that best practices are deployed when managing client information and that NetCracker is compliant with the terms of our contracts. We have decided that it is in the best interest of all stakeholders to settle the matter.”

Of the total fines, NetCracker agreed to pay $11.4 million while the Computer Sciences Corporation agreed to pay $1.35 million. Under the False Claims Act, Kingsley’s share of the settlement is $2.3 million, according to the Justice Department.

Kingsley did not respond to a phone message left at his home in Fairfax, Virginia, on Tuesday. His lawyer, Paul Schleifman, said Kingsley spoke up about the Back Office in Russia because he was worried that it could harm national security. “[Kingsley] believes that his obligation is to the United States first,” Schleifman said, “not to his pocket.”

The settlement agreement leaves the door open for the Justice Department to pursue criminal charges based on Kingsley’s allegations. A Justice Department spokeswoman did not respond before deadline when asked whether any such charges are expected.

 

Iran: Death to America, Back ‘Atcha’ Iran

 Iran’s hardliners mark hostage anniversary with ‘infiltration’ warning

Reuters: Thousands of Iranians rallied to celebrate the anniversary of the 1979 hostage-taking at the U.S. embassy on Wednesday, as hardliners alleged Western “infiltration” following a landmark nuclear deal with world powers.

President Hassan Rouhani, however, in remarks highlighting division between moderates and hardliners, criticised the arrest of at least two journalists, the latest in a series of detentions also including dissident writers and artists.

“We should not arrest people without reason, making up cases against them and say they are a part of an infiltration network,” Rouhani told a cabinet meeting.

Demonstrators gathered in front of the abandoned U.S. Embassy in Tehran chanting “death to America” and urging Iran’s foreign minister and chief nuclear negotiator, Mohammad Javad Zarif, “Don’t trust the Americans.”

The U.S. embassy was sacked by students in the early days of the Islamic Revolution in 1979. The ensuing U.S. hostage crisis lasted 444 days and Washington and Tehran have yet to restore diplomatic ties.

Some protesters dragged a coffin marked “Obama” through the street while others carrying long balloons representing Iran’s latest ballistic missile, which was tested in October in defiance of a United Nations ban.

It is about time to terminate the Iran nuclear agreement and to declare a new adversarial front against Iran. The reasons are countless, one reason is above and the other is below.

U.S. Officials: Iranian Cyber-Attacks, Arrest of Americans May Be Linked

U.S. officials believe that the increasing number of hacking attacks carried out this past month by Iran’s Islamic Revolutionary Guard Corps (IRGC) against American government personnel may be linked to the arrests of American-Iranian citizens by the regime, The Wall Street Journal reported (Google link) Thursday.

The Islamic Revolutionary Guard Corps, or IRGC, has routinely conducted cyberwarfare against American government agencies for years. But the U.S. officials said there has been a surge in such attacks coinciding with the arrest last month of Siamak Namazi, an energy industry executive and business consultant who has pushed for stronger U.S.-Iranian economic and diplomatic ties.

Obama administration personnel are among a larger group of people who have had their computer systems hacked in recent weeks, including journalists and academics, the officials said. Those attacked in the administration included officials working at the State Department’s Office of Iranian Affairs and its Bureau of Near Eastern Affairs.

“U.S. officials were among many who were targeted by recent cyberattacks,” said an administration official, adding that the U.S. is still investigating possible links to the Namazi case. “U.S. officials believe some of the more recent attacks may be linked to reports of detained dual citizens and others.”

At the time of his arrest, the IRGC seized Namazi’s computer.

According to the Journal, friends and associates of Washington Post reporter Jason Rezaian were similarly targeted following his arrest last year.

Associates of Namazi say that the IRGC, which is believed to be responsible for his arrest and which reports directly to Iranian Supreme Leader Ayatollah Ali Khamenei, is using the cyber-attacks to help “build a false espionage case” against him.

Last month, the Journal reported that a cyber-security company, Dell Secureworks, had identified a scheme where Iranian hackers had set up false LinkedIn accounts in order to learn sensitive information from the defense and telecommunications sectors. In August, it was reported that Iran was targeting political dissidents living abroad with cyber-attacks.

Earlier this year, The New York Times revealed that the United States had enlisted the help of its allies, including Britain and Israel, to confront the escalating Iranian cyber-attacks.

A report released in 2014 by cyber-security firm Cylance highlighted Iran’s growing cyber-terror capabilities, including “bone-chilling evidence” that its hackers had taken control of gates and security systems at airports in South Korea, Saudi Arabia, and Pakistan.

Iran’s cyber-attacks are not just directed at other countries and individuals abroad, but also its own citizens. Massive attacks on Iranian Google accounts were detected prior to the presidential election two years ago as part of a broader crackdown on dissent.

In Iran Has Built an Army of Cyber-Proxies, published in the August 2015 issue of The Tower Magazine, Jordan Brunner examined how Iran became one of the world’s leading forces in cyber-warfare:

Iran is adept at building terrorist and other illicit networks around the world. Its cyber-capabilities are no different. It uses the inexpensive method of training and collaborating with proxies in the art of cyber-war. It may also have collaborated with North Korea, which infamously attacked Sony in response to the film The Interview. It is possible that Iran assisted North Korea in developing the cyber-capability necessary to carry out the Sony hack. While acknowledging that there is no definite proof of this, Claudia Rosett of the Foundation for Defense of Democracies raised the question in The Tower earlier this year.

More importantly, Iran is sponsoring the cyber-capabilities of terrorist organizations in Lebanon, Yemen, and Syria. The first indication of this was from Hezbollah. The group’s cyber-activity came to the attention of the U.S. in early 2008, and it has only become more powerful in cyberspace since then. An attack that had “all the markings” of a campaign orchestrated by Hezbollah was carried out against Israeli businesses in 2012.

Lebanon’s neighbor, Syria, is home to the Syrian Electronic Army (SEA), which employs cyber-warfare in support of the Assad regime. There are rumors that indicate it is trained and financed by Iran. The SEA’s mission is to embarrass media organizations in the West that publicize the atrocities of the Assad regime, as well as track down and monitor the activities of Syrian rebels. It has been very successful at both. The SEA has attacked media outlets such as The Washington Post, the Chicago Tribune, the Financial Times, Forbes, and others. It has also hacked the software of companies like Dell, Microsoft, Ferrari, and even the humanitarian program UNICEF.

The group has carried out its most devastating cyber-attacks against the Syrian opposition, often using the anonymity of online platforms to its advantage. For example, its hackers pose as girls in order to lure opposition fighters into giving up seemingly harmless information that can lead to lethal crackdowns. The SEA’s sophisticated use of cyberspace developed in a very short time, and it is reasonable to infer that this was due to Iranian training. Iran has long supported the ruling Assad regime in Syria and would be happy to support those who support him.

In recent months, a group called the Yemen Cyber Army (YCA) has arisen, hacking into systems that belong to Saudi Arabia. The YCA supports the Houthi militia, which is fighting the Yemenite government and the Saudis; the Houthis are, in turn, supported by Iran. Thus far, the YCA has attacked Saudi Arabia’s Foreign, Interior, and Defense Ministries. They have also hacked the website of the Saudi-owned newspaper Al-Hayat. Messages from the group indicate that they are sponsored by Iran, and might even be entirely composed of Iranians.