Bowe Bergdahl, Time Served

Remember, Obama approved the ransom payment to Haqqani for Bergdahl, or was it? Perhaps it was to finish the prisoner swap details with both networks, the Taliban and Haqqani.

An Army officer is recommending that Sgt. Bowe Bergdahl face a lower-level court martial and be spared the possibility of jail time for leaving his post in Afghanistan, his lawyer said Saturday.
Defense attorney Eugene Fidell said Lt. Col. Mark Visger has decided Bergdahl’s case should go to a military system similar to civilian courts that handle misdemeanor charges. It limits the maximum punishment to reduction of rank, a bad conduct discharge and a short jail term, though that isn’t being sought, Fidell said. Military prosecutors charged Bergdahl in March with desertion and misbehavior before the enemy, a charge that could carry a maximum penalty of life imprisonment.

By The Associated Press – Associated Press – Saturday, October 10, 2015

Sgt. Bowe Bergdahl was handed over to U.S. special forces in May 2014 after nearly five years in captivity in Afghanistan. Here is a look at some of the key events from his capture until Saturday, when an Army officer recommended Bergdahl’s case should go to a military system that’s similar to civilian courts that handle misdemeanors:

June 30, 2009 – Bergdahl, who is serving with an Alaska-based infantry regiment, vanishes from a base in Afghanistan’s Paktika province near the border of Pakistan.

July 2, 2009 – Two U.S. officials tell The Associated Press on condition of anonymity that Bergdahl had “just walked off” his base with three Afghans after his shift.

July 18, 2009 – Taliban posts video online showing Bergdahl saying he was “scared I won’t be able to go home.” Bergdahl also says he was lagging behind a patrol when he was captured.

July 19, 2009 – Pentagon confirms missing U.S. solider in Afghanistan is Pfc. Bowe R. Bergdahl, 23, of Ketchum, Idaho.

July 22, 2009 – More than 500 people attend a vigil in Hailey, Idaho, to show support for Bergdahl and his family.

Dec. 25, 2009 – The Taliban releases a video showing Bergdahl apparently healthy and making a lengthy statement criticizing the U.S. military operation.

June 16, 2011 – The Army announces that Bergdahl has been promoted from specialist to sergeant.

June 30, 2011 – Bergdahl’s parents mark the second anniversary of their son’s capture at hometown event.

Aug. 29, 2011 – US officials tell the AP that direct U.S. talks with the Taliban had evolved to a substantive negotiation before they were scuttled by Afghan officials who feared the talks would undercut President Hamid Karzai.

May 9, 2012 – Bergdahl’s parents say they are hopeful that negotiations or a prisoner swap could bring their son home. Bob Bergdahl tells hometown newspaper that he’s concerned the U.S. government hasn’t done enough to secure his son’s release. The AP agreed in 2010 – at the request of the Pentagon and the White House – not to report on the proposed prisoner swap and ongoing negotiations, on the grounds that public discussion would endanger Bergdahl’s life. When Bergdahl’s parents began to discuss the deal publicly, the AP and other news organizations reported the proposed swap – a plan that would allow the transfer of five Taliban prisoners held at the U.S. military prison at Guantanamo Bay, Cuba.

Weekend of May 27, 2012 – President Barack Obama calls Bergdahl’s parents to assure them that he and the U.S. Department of Defense were doing everything in their power to free Bergdahl.

June 29, 2012 – Bergdahl’s family and hometown marks the third anniversary of his capture. Parents release a statement saying they hope he’s released this year and can return home.

June 20, 2013 – The Taliban proposes a deal in which they would free Bergdahl in exchange for five of their most senior operatives at Guantanamo Bay.

July 9, 2013 – The Taliban close the office in Qatar that was serving as the site for negotiations with the U.S.

Jan. 15, 2014 – U.S. officials say they received a new video of Bergdahl that they believe was taken in the last month, showing Bergdahl is alive.

Feb. 18, 2014 – Bergdahl’s family says they are cautiously optimistic about reported renewed efforts by the Obama’s administration to win his freedom.

May 31, 2014 – Obama administration officials announce that Bergdahl was handed over to U.S. special forces by the Taliban in exchange for the release of five Guantanamo detainees. Bergdahl’s parents say they’re “joyful and relieved.” But debate quickly erupts over whether Bergdahl is a hero or a deserter.

June 2, 2014 – Afghanistan’s Foreign Ministry criticizes the U.S. for swapping Taliban prisoners at Guantanamo Bay to secure Bergdahl’s release. American officials tell The Associated Press that the Pentagon concluded in 2012 that Bergdahl walked away from his unit, something members of his unit had said put soldiers in danger.

June 4, 2014 – Bergdahl’s Idaho hometown cancels plans to celebrate his return, citing security concerns.

June 13, 2014 – Bergdahl arrives at Brooke Army Medical Center at Fort Sam Houston in San Antonio.

June 16, 2014 – The Army says it is investigating the facts and circumstances around Bergdahl’s disappearance.

Aug. 6, 2014 – The Army begins questioning Bergdahl, who by now has returned to regular duty, about his disappearance.

Aug. 21, 2014 – The nonpartisan Government Accountability Office says the Pentagon broke the law when it swapped Bergdahl for five Taliban leaders because it didn’t notify relevant congressional committees at least 30 days in advance and used money from a wartime account to make the transfer.

Dec. 19, 2014 – The Army says it has finished its investigation.

March 25, 2015 – Bergdahl is charged with desertion and misbehavior before the enemy.

March 26, 2015 – Bergdahl’s lawyer releases a note in which Bergdahl says he was repeatedly tortured by the Taliban.

Sept. 17, 2015 – An Article 32 hearing begins to determine whether Bergdahl should face a military trial for leaving his post.

Sept. 18, 2015 – The hearing ends, and the presiding officer will forward his recommendations to the leader of the U.S. Army Forces Command, who will decide whether it should be referred to a court-martial or be resolved in another manner.

Oct. 9, 2015 – Bergdahl’s attorney says an Army officer recommends that Bergdahl face a lesser court-martial, meaning it should go to a military system that’s similar to civilian courts that handle misdemeanor, as well as not spend time in jail.

ISIS, Toyota Trucks and the U.S. State Dept

File this one under…..’shaking my head’.

 

Where did Islamic State get all those Toyota trucks?

The National Coalition for Syrian Revolutionary and Opposition Forces was founded in Doha, Qatar in 2012. It is a lobby operation in Washington DC supporting the banner of the Free Syrian Army, presently led by Oubai Shahbander, a Washington-based advisor to the Syrian National Coalition.

Sadly, while the West attempted to support the anti-Assad forces in an admittedly failed program this week with particular emphasis on Russian intervention into Syria with bombing of only an estimated 10% of Islamic State forces, the U.S. has terminated this program. Many of those trained by Special Forces and the CIA fell victim to being kidnapped, killed or defected to Islamic State and those pesky Toyota rides were seized by ISIS fighting factions.

As airspace de-confliction talks continue between Russia and the United States, a decision was made by Secretary Carter to begin to support the Kurds instead as airstrikes by the U.S. has picked up some pace in the last two days.

Heh, perhaps the targets now being watched are convoys with U.S. State Department Toyota trucks in the hands of Islamic State.

 

Mystery of ISIS’ Toyota Army Solved: Evidence Show Transferring Was Through Turkey

The US Treasury has recently opened an inquiry about the so-called “Islamic State’s” (ISIS/ISIL) use of large numbers of brand-new Toyota trucks. The issue has arisen in the wake of Russia’s air operations over Syria and growing global suspicion that the US itself has played a key role in arming, funding, and intentionally perpetuating the terrorist army across Syria and Iraq.

ABC News in their article, “US Officials Ask How ISIS Got So Many Toyota Trucks,” reports:

U.S. counter-terror officials have asked Toyota, the world’s second largest auto maker, to help them determine how ISIS has managed to acquire the large number of Toyota pick-up trucks and SUVs seen prominently in the terror group’s propaganda videos in Iraq, Syria and Libya, ABC News has learned.

Toyota says it does not know how ISIS obtained the vehicles and is “supporting” the inquiry led by the Terror Financing unit of the Treasury Department — part of a broad U.S. effort to prevent Western-made goods from ending up in the hands of the terror group.

“This is a question we’ve been asking our neighbors,” Faily said. “How could these brand new trucks… these four wheel drives, hundreds of them — where are they coming from?”

Not surprisingly, it appears the US Treasury is asking the wrong party. Instead of Toyota, the US Treasury’s inquiry should have started next door at the US State Department.

 

Mystery Solved

Just last year it was reported that the US State Department had been sending in fleets of specifically Toyota-brand trucks into Syria to whom they claimed was the “Free Syrian Army.”

US foundation-funded Public Radio International (PRI) reported in a 2014 article titled, “This one Toyota pickup truck is at the top of the shopping list for the Free Syrian Army — and the Taliban,” that:

Recently, when the US State Department resumed sending non-lethal aid to Syrian rebels, the delivery list included 43 Toyota trucks.

Hiluxes were on the Free Syrian Army’s wish list. Oubai Shahbander, a Washington-based advisor to the Syrian National Coalition, is a fan of the truck.

“Specific equipment like the Toyota Hiluxes are what we refer to as force enablers for the moderate opposition forces on the ground,” he adds. Shahbander says the US-supplied pickups will be delivering troops and supplies into battle. Some of the fleet will even become battlefield weapons..

The British government has also admittedly supplied a number of vehicles to terrorists fighting inside of Syria. The British Independent’s 2013 article titled, “Revealed: What the West has given Syria’s rebels,” reported that:

So far the UK has sent around £8m of “non-lethal” aid, according to official papers seen by The Independent, comprising five 4×4 vehicles with ballistic protection; 20 sets of body armour; four trucks (three 25 tonne, one 20 tonne); six 4×4 SUVs; five non-armoured pick-ups; one recovery vehicle; four fork-lifts; three advanced “resilience kits” for region hubs, designed to rescue people in emergencies; 130 solar powered batteries; around 400 radios; water purification and rubbish collection kits; laptops; VSATs (small satellite systems for data communications) and printers.

It’s fair to say that whatever pipeline the US State Department and the British government used to supply terrorists in Syria with these trucks was likely used to send additional vehicles before and after these reports were made public.

The mystery of how hundreds of identical, brand-new ISIS-owned Toyota trucks have made it into Syria is solved. Not only has the US and British government admitted in the past to supplying them, their military forces and intelligence agencies ply the borders of Turkey, Jordan, and even Iraq where these fleets of trucks must have surely passed on their way to Syria – even if other regional actors supplied them. While previous admissions to supplying the vehicles implicates the West directly, that nothing resembling interdiction operations have been set up along any of these borders implicates the West as complicit with other parties also supplying vehicles to terrorists inside of Syria.

 

What Mystery?

Of course, much of this is not new information. So the question remains – why is the US Treasury just now carrying on with this transparent charade? Perhaps those in Washington believe that if the US government is the one asking this obvious question of how ISIS has managed to field such an impressive mechanized army in the middle of the Syrian desert, no one will suspect they had a role in it.

Of course, the trucks didn’t materialize in Syria. They originated outside of Syria and were brought in, and in great numbers, with the explicit knowledge and/or direct complicity of the US and its regional allies. Asking Toyota where the US State Department’s own trucks came from is another indication of just how lost US foreign policy, legitimacy, and credibility has become.

Russia’s intervention, and what should become a widely supported anti-terror coalition must keep in mind the criminality of the US and its partners when choosing its own partners in efforts to restore security and order across the Middle East and North Africa.

 

 

They Are Coming

Per the FBI website: Good afternoon Chairman Johnson, Ranking Member Carper, and members of the committee. Thank you for the opportunity to appear before you today to discuss the current threats to the homeland and our efforts to address new challenges, including terrorists’ use of technology to communicate—both to inspire and recruit. The widespread use of technology propagates the persistent terrorist message to attack U.S. interests whether in the homeland or abroad. As the threat to harm Western interests evolves, we must adapt and confront the challenges, relying heavily on the strength of our federal, state, local, and international partnerships. Our successes depend on interagency cooperation. We work closely with our partners within the Department of Homeland Security and the National Counterterrorism Center to address current and emerging threats.

Counterterrorism

Counterterrorism remains the FBI’s top priority, however, the threat has changed in two significant ways. First, the core al Qaeda tumor has been reduced, but the cancer has metastasized. The progeny of al Qaeda—including AQAP, al Qaeda in the Islamic Maghreb, and the Islamic State of Iraq and the Levant (ISIL)—have become our focus.

Secondly, we are confronting the explosion of terrorist propaganda and training on the Internet. It is no longer necessary to get a terrorist operative into the United States to recruit. Terrorists, in ungoverned spaces, disseminate poisonous propaganda and training materials to attract troubled souls around the world to their cause. They encourage these individuals to travel, but if they can’t travel, they motivate them to act at home. This is a significant change from a decade ago.

We continue to identify individuals who seek to join the ranks of foreign fighters traveling in support of ISIL, and also homegrown violent extremists who may aspire to attack the United States from within. These threats remain among the highest priorities for the FBI and the Intelligence Community as a whole.

Conflicts in Syria and Iraq continue to serve as the most attractive overseas theaters for Western-based extremists who want to engage in violence. We estimate approximately 250 Americans have traveled or attempted to travel to Syria to participate in the conflict. While this number is lower in comparison to many of our international partners, we closely analyze and assess the influence groups like ISIL have on individuals located in the United States who are inspired to commit acts of violence. Whether or not the individuals are affiliated with a foreign terrorist organization and are willing to travel abroad to fight or are inspired by the call to arms to act in their communities, they potentially pose a significant threat to the safety of the United States and U.S. persons.

ISIL has proven relentless in its violent campaign to rule and has aggressively promoted its hateful message, attracting like-minded extremists to include Westerners. To an even greater degree than al Qaeda or other foreign terrorist organizations, ISIL has persistently used the Internet to communicate. From a homeland perspective, it is ISIL’s widespread reach through the Internet and social media which is most concerning as ISIL has aggressively employed this technology for its nefarious strategy. ISIL blends traditional media platforms, glossy photos, in-depth articles, and social media campaigns that can go viral in a matter of seconds. No matter the format, the message of radicalization spreads faster than we imagined just a few years ago.

Unlike other groups, ISIL has constructed a narrative that touches on all facets of life—from career opportunities to family life to a sense of community. The message isn’t tailored solely to those who are overtly expressing symptoms of radicalization. It is seen by many who click through the Internet every day, receive social media push notifications, and participate in social networks. Ultimately, many of these individuals are seeking a sense of belonging.

As a communication medium, social media is a critical tool for terror groups to exploit. One recent example occurred when an individual was arrested for providing material support to ISIL by facilitating an associate’s travel to Syria to join ISIL. The arrested individual had multiple connections, via a social media networking site, with other like-minded individuals.

There is no set profile for the susceptible consumer of this propaganda. However, one trend continues to rise—the inspired youth. We’ve seen certain children and young adults drawing deeper into the ISIL narrative. These individuals are often comfortable with virtual communication platforms, specifically social media networks.

ISIL continues to disseminate their terrorist message to all social media users—regardless of age. Following other groups, ISIL has advocated for lone offender attacks. In recent months ISIL released a video, via social media, reiterating the group’s encouragement of lone offender attacks in Western countries, specifically advocating for attacks against soldiers and law enforcement, intelligence community members, and government personnel. Several incidents have occurred in the United States and Europe over the last few months that indicate this “call to arms” has resonated among ISIL supporters and sympathizers.

In one case, a New York-based male was arrested in September after he systematically attempted to travel to the Middle East to join ISIL. The individual, who was inspired by ISIL propaganda, expressed his support for ISIL online and took steps to carry out acts encouraged in the ISIL call to arms.

The targeting of U.S. military personnel is also evident with the release of names of individuals serving in the U.S. military by ISIL supporters. The names continue to be posted to the Internet and quickly spread through social media, depicting ISIL’s capability to produce viral messaging. Threats to U.S. military and coalition forces continue today.

Social media has allowed groups, such as ISIL, to use the Internet to spot and assess potential recruits. With the widespread horizontal distribution of social media, terrorists can identify vulnerable individuals of all ages in the United States—spot, assess, recruit, and radicalize—either to travel or to conduct a homeland attack. The foreign terrorist now has direct access into the United States like never before.

In other examples of arrests, a group of individuals was contacted by a known ISIL supporter who had already successfully traveled to Syria and encouraged them to do the same. Some of these conversations occur in publicly accessed social networking sites, but others take place via private messaging platforms. As a result, it is imperative the FBI and all law enforcement organizations understand the latest communication tools and are positioned to identify and prevent terror attacks in the homeland.

We live in a technologically driven society and just as private industry has adapted to modern forms of communication so too have terrorists. Unfortunately, changing forms of Internet communication and the use of encryption are posing real challenges to the FBI’s ability to fulfill its public safety and national security missions. This real and growing gap, to which the FBI refers as “Going Dark,” is an area of continuing focus for the FBI; we believe it must be addressed given the resulting risks are grave both in both traditional criminal matters as well as in national security matters. The United States government is actively engaged with private companies to ensure they understand the public safety and national security risks that result from malicious actors’ use of their encrypted products and services. However, the administration is not seeking legislation at this time.

The FBI is utilizing all lawful investigative techniques and methods to combat the threat these individuals may pose to the United States. In conjunction with our domestic and foreign partners, we are rigorously collecting and analyzing intelligence information as it pertains to the ongoing threat posed by foreign terrorist organizations and homegrown violent extremists. We continue to encourage robust information sharing; in partnership with our many federal, state, and local agencies assigned to Joint Terrorism Task Forces around the country, we remain vigilant to ensure the safety of the American public. Be assured, the FBI continues to pursue increased efficiencies and information sharing processes as well as pursue technological and other methods to help stay ahead of threats to the homeland.

Intelligence

Integrating intelligence and operations is part of the broader intelligence transformation the FBI has undertaken in the last decade. We are making progress, but have more work to do. We have taken two steps to improve this integration. First, we have established an Intelligence Branch within the FBI headed by an executive assistant director (EAD). The EAD looks across the entire enterprise and drives integration. Second, we now have special agents and new intelligence analysts at the FBI Academy engaged in practical training exercises and taking core courses together. As a result, they are better prepared to work well together in the field. Our goal every day is to get better at using, collecting and sharing intelligence to better understand and defeat our adversaries.

The FBI cannot be content to just work what is directly in front of us. We must also be able to understand the threats we face at home and abroad and how those threats may be connected. Towards that end, intelligence is gathered, consistent with our authorities, to help us understand and prioritize identified threats and to determine where there are gaps in what we know about these threats. We then seek to fill those gaps and learn as much as we can about the threats we are addressing and others on the threat landscape. We do this for national security and criminal threats, on both a national and local field office level. We then compare the national and local perspectives to organize threats into priority for each of the FBI’s 56 field offices. By categorizing threats in this way, we strive to place the greatest focus on the gravest threats we face. This gives us a better assessment of what the dangers are, what’s being done about them, and where we should prioritize our resources.

Cyber

An element of virtually every national security threat and crime problem the FBI faces is cyber-based or facilitated. We face sophisticated cyber threats from state-sponsored hackers, hackers for hire, organized cyber syndicates, and terrorists. On a daily basis, cyber-based actors seek our state secrets, our trade secrets, our technology, and our ideas—things of incredible value to all of us and of great importance to the conduct of our government business and our national security. They seek to strike our critical infrastructure and to harm our economy.

We continue to see an increase in the scale and scope of reporting on malicious cyber activity that can be measured by the amount of corporate data stolen or deleted, personally identifiable information compromised, or remediation costs incurred by U.S. victims. For example, as the committee is aware, the Office of Personnel Management (OPM) discovered earlier this year that a number of its systems were compromised. These systems included those that contain information related to the background investigations of current, former, and prospective Federal government employees, as well as other individuals for whom a federal background investigation was conducted. The FBI is working with our interagency partners to investigate this matter.

FBI agents, analysts, and computer scientists are using technical capabilities and traditional investigative techniques—such as sources, court-authorized electronic surveillance, physical surveillance, and forensics—to fight cyber threats. We are working side-by-side with our federal, state, and local partners on Cyber Task Forces in each of our 56 field offices and through the National Cyber Investigative Joint Task Force (NCIJTF), which serves as a coordination, integration, and information sharing center for 19 U.S. agencies and several key international allies for cyber threat investigations. Through CyWatch, our 24-hour cyber command center, we combine the resources of the FBI and NCIJTF, allowing us to provide connectivity to federal cyber centers, government agencies, FBI field offices and legal attachés, and the private sector in the event of a cyber intrusion.

We take all potential threats to public and private sector systems seriously and will continue to investigate and hold accountable those who pose a threat in cyberspace.

* * *

Finally, the strength of any organization is its people. The threats we face as a nation have never been greater or more diverse and the expectations placed on the Bureau have never been higher. Our fellow citizens look to us to protect the United States from all of those threats and the men and women of the Bureau continue to meet—and exceed—those expectations, every day. I want to thank them for their dedication and their service.

Chairman Johnson, Ranking Member Carper, and committee members, I thank you for the opportunity to testify concerning the threats to the homeland and terrorists’ use of the Internet and social media as a platform for spreading ISIL propaganda and inspiring individuals to target the homeland, and the impact of the Going Dark problem on mitigating their efforts. I am happy to answer any questions you might have.

Recent Testimonies
10.08.15

Threats to the Homeland James B. Comey, Director, Federal Bureau of Investigation, Statement Before the Senate Committee on Homeland Security and Governmental Affairs, Washington, D.C.
08.05.15

Inspector General Access Kevin L. Perkins, Associate Deputy Director, Federal Bureau of Investigation, Joint Statement with Department of Justice Associate Deputy Attorney General Carlos Uriarte Before the Senate Judiciary Committee , Washington, D.C.
07.08.15

Counterterrorism, Counterintelligence, and the Challenges of Going Dark James B. Comey, Director, Federal Bureau of Investigation, Statement Before the Senate Select Committee on Intelligence, Washington, D.C.
07.08.15

Going Dark: Encryption, Technology, and the Balances Between Public Safety … James B. Comey, Director, Federal Bureau of Investigation, Joint Statement with Deputy Attorney General Sally Quillian Yates Before the Senate Judiciary Committee, Washington, D.C.
06.18.15

FBI’s Plans for the Use of Rapid DNA Technology in CODIS Amy S. Hess, Executive Assistant Director, Science and Technology Branch, Federal Bureau of Investigation, Statement Before the House Judiciary Committee, Subcommittee on Crime, Terrorism, Homeland Security, and Investigations, Washington, D.C.
06.03.15

Terrorism Gone Viral: The Attack in Garland, Texas and Beyond Michael B. Steinbach, Assistant Director, Counterterrorism Division, Federal Bureau of Investigation, Statement Before the House Homeland Security Committee, Washington, D.C.
04.29.15

Encryption and Cyber Security for Mobile Electronic Communication Devices Amy Hess, Executive Assistant Director, Science and Technology Branch, Federal Bureau of Investigation, Statement Before the House Oversight and Government Reform Committee, Subcommittee on Information Technology, Washington, D.C.
04.14.15

FBI’s Handling of Sexual Harassment and Misconduct Allegations Kevin L. Perkins, Associate Deputy Director, Federal Bureau of Investigation, Statement Before the House Committee on Oversight and Government Reform, Washington, D.C.
03.25.15

FBI Budget Request for Fiscal Year 2016 James B. Comey, Director, Federal Bureau of Investigation, Statement Before the House Appropriations Committee, Subcommittee on Commerce, Justice, Science, and Related Agencies, Washington, D.C.
03.12.15

FBI Budget Request for Fiscal Year 2016 James B. Comey, Director, Federal Bureau of Investigation, Statement Before the Senate Appropriations Committee, Subcommittee on Commerce, Justice, Science, and Related Agencies, Washington, D.C.
More

LinkedIn Infiltrated by Iranian Hackers

Going back to 2012, Congress held hearings on how the United States is losing the cyber espionage war. To date, there has been no ground gained outside of the scope of creating more task forces and adding cyber personnel. To stop the intrusions by China, Russia and Iran has been a failure.

For a report on the major hacks in 2014, go here. This is by no means a complete list of corporations but it does give a view into the depth of the cyber threat.

WASHINGTON: The United States is “losing the cyber espionage war” against China, Russia and other countries, but even in the face of such a grave threat the country cannot agree on how to protect its precious intellectual seed capital from these predations, the chairman of the House Intelligence Committee says.

“We are running out of time on this,” Rep. Mike Rogers, respected for working closely with his ranking member, said in a speech at today’s Intelligence and National Security Alliance‘s (INSA) cyber conference here.

China is stealing intellectual property on a massive scale, as Gen. Keith Alexander, head of both the National Security Agency and Cyber Command, has made clear with his estimates of such thefts topping $1 trillion. While China is not alone, U.S government officials have made clear that no country engages in cyber espionage as systematically, as thoroughly or as broadly as does the People’s Republic of China.

“China is investing hugely in this technology,” Rogers notes. And the impact of that investment is felt not only in the economic sphere, important as that is. Cyber is now an integral of military planning and operations, as the Russians have demonstrated several times.

To help stem those thefts and to protect critical infrastructure such as power grids, Rogers and Rep. Dutch Ruppersberger, his Democratic colleague on the HPSCI, met with hundreds of business leaders, civil rights and privacy groups over several months as they began to craft what became their 13-page bill. It would have offered businesses liabliity insurance in return for their agreeing to share threat information with the government. The government also would have shared threat information with the businesses.

But there was a catch. Because of how sensitive sources and methods are in the cyber world, the businesses would have to get top secret clearance for senior officials, build and maintain a Sensitive Compartmented Information Facility (SCIF), and maintain the physical and bureaucratic complex required of anyone dealing with classified information.

As Rogers put it, his committee had offered industry a “carrot and a stick.” But his colleagues in the Senate wanted to chart a different path, so the Rogers-Ruppersberger bill is on life support. I asked him today what he planned to do with his “dead” bill. “All is not lost. I am reaching out to members of the Senate just to see what our options are,” as is Ruppersberger. “We are not giving up.”

LinkedIn profiles said to be part of Iranian cyber-espionage campaign


WashingtonTimes: Iranian hackers are suspected of operating a network of bogus LinkedIn accounts that security researchers believe is part of a campaign targeting employees of corporations in the Middle East.

By creating phony profiles containing fabricated job histories and endorsements from other concocted accounts, researchers at Dell said this week that a group of hackers, likely acting on behalf of Iran, attempted to collect intelligence from legitimate LinkedIn users employed in the Arabian and African telecommunications and defense industries.  Twenty-five fake LinkedIn accounts have been identified by researchers working for the company’s SecureWorks Counter Threat Unit, including those of supposed recruitment consultants with hundreds of connections apiece, Dell said on Wednesday.

“CTU researchers assess with high confidence the purpose of this network is to target potential victims through social engineering,” Dell said in the latest report, referring to a tactic in which sensitive data becomes compromised when an individual reveals information to an attacker, often under false pretenses.

Dell has named the actors “Threat Group-2889” and said it’s likely the same organization dubbed “Operation Cleaver” in a report released last year by Cylance, a security firm that linked the group to Iran and claimed it was working to undermine the security of over 50 companies across 15 industries in the region, possibly as retaliation for the U.S.-led Stuxnet campaign.

“Creating a network of seemingly genuine and established LinkedIn personas helps TG-2889 identify and research potential victims. The threat actors can establish a relationship with targets by contacting them directly, or by contacting one of the target’s connections. It may be easier to establish a direct relationship if one of the fake personas is already in the target’s LinkedIn network,” Dell said.

“The level of detail in the profiles suggests that the threat actors invested substantial time and effort into creating and maintaining these personas.”

According to the findings published by Cylance in December, the “Operation Cleaver” hackers used social engineering to trick targets into installing malware that would allow data to then be stolen from infected computers.

Cylance’s report had linked the group to attacks across the world, but Dell’s CTU team said the LinkedIn campaign seems to largely target account holders in the Middle East and northern Africa, a quarter of which work in telecommunications.

“Updates to profile content such as employment history suggest that TG-2889 regularly maintains these fake profiles. The persona changes and job alterations could suggest preparations for a new campaign, and the decision to reference Northrup Grumman and Airbus Group may indicate that the threat actors plan to target the aerospace vertical,” Dell said.

Last month, Director of National Intelligence James Clapper told a congressional committee that Iran uses its cyber program to carry out “asymmetric but proportional retaliation against political foes, as well as a sophisticated means of collecting intelligence.” He went on to blame Iranian hackers for cyberattacks against American banks in 2012 and 2013, as well as an assault last year on the Las Vegas Sands casino company.

Obama Does Gun Control, Putin Does Hockey, No Phone Calls

Scary with all this going on…no one is talking to each other especially when Defense Secretary Ash Carter says we will not cooperate or coordinate with Russia.

Carter: “Now, the Russians originally said they were going in to fight ISIL and al-Nusra and other terrorist organizations. However, within days of deploying their forces, the Russians began striking targets that are not any of these groups. I have said repeatedly over the last week that we, the United States, believed this is a fundamental strategic mistake and that it will inflame and prolong the Syrian civil war. We have not and will not agree to cooperate with Russia so long as they continue to pursue this misguided strategy. We’ve seen increasingly unprofessional behavior from Russian forces. They violated Turkish airspace, which as all of us here made clear earlier this week, and strongly affirmed today here in Brussels, is NATO airspace.” The full remarks by Carter while in Belgium are here.

Confluence or Conflating

Kearsarge ARG Deploys for Europe, Middle East Operations

The Kearsarge Amphibious Ready Group and 26th Marine Expeditionary Unit departed Oct. 6 from the East Coast for a deployment to the Middle East.

The more than 4,000 sailors and Marines will support theater security cooperation and maritime security operations and provide an added crisis response capability to U.S. 5th and 6th Fleet areas of operations.

The ARG/MEU includes amphibious assault ship USS Kearsarge (LHD-3), amphibious transport dock ship USS Arlington (LPD-24), amphibious dock landing ship USS Oak Hill (LSD-51),

The amphibious assault ship USS Kearsarge (LHD-3) as the ship departs for deploymentOct. 6, 2015. US Navy Photo

Kearsarge and the 26th MEU last deployed from March to November 2013, during a time of great unrest in the region. Kearsarge and USS San Antonio (LPD-17) spent a lot of time in the northern part of the region – operating in the Mediterranean out of Rota, Spain, and in the northern Red Sea – while USS Carter Hall (LSD-50) spent time operating independently near Bahrain and Djibouti.

Upon returning home, Kearsarge spent five months in maintenance at BAE Systems Norfolk Ship Repair before beginning sea trials last summer. Kearsarge served as the flagship in the Bold Alligator 2014 amphibious exercise last fall.

Rocket Launch with Secret Payload

United Launch Alliance aims to launch its second Atlas V rocket in less than a week with a blastoff planned Thursday morning from California’s Central Coast.

The rocket is targeting a liftoff at 5:49 a.m. PT from Vandenberg Air Force Base, carrying a classified mission for the National Reconnaissance Office.

There’s a 70% chance of acceptable weather at Vandenberg’s Space Launch Complex-3. The full launch window has not been disclosed.

“We are excited and ready to take on our first Atlas launch of 2015,” said Col. J. Christopher Moss, commander of the 30th Space Wing, in a statement Wednesday. “Our team and mission partners have put a lot of hard work into preparing for this important mission for our nation.”
Amateur spacecraft observers speculate that the rocket is carrying a pair of satellites updating the Naval Ocean Surveillance System, or NOSS.

In addition to the primary mission, the rocket’s Centaur upper stage will deliver a group of 13 experimental and student-developed CubeSats to orbit.

The tiny spacecraft include nine missions sponsored by the NRO and four by NASA. Kennedy Space Center’s Launch Services Program was responsible for securing the ride for the NASA-sponsored payloads known as ElaNA-12.

A successful launch would keep ULA on track to return to Cape Canaveral for an Oct. 30 launch of the Air Force’s next Global Positioning System satellite on an Atlas V. The booster for that mission was delivered to the Cape on Tuesday.
An Atlas V last Friday successfully delivered Mexico’s Morelos-3 communications satellite to orbit, completing ULA’s 100th launch since Boeing and Lockheed Martin formed the joint venture in December 2006.

And Wednesday, in the first launch since an Antares rocket exploded shortly after takeoff on Oct. 29, 2014, a sounding rocket successfully blasted off from NASA’s Wallops Space Facility in Virginia.

 

“It wasn’t an easy decision,” an Iranian official source said when asked about Russia’s intervention in Syria. “The Russians were certain that if they did not move now, the next war they would fight would be inside their borders; this is about Russia’s national security before being about Syria. Therefore, a decision to start this pre-emptive war was taken by the Kremlin.”

For decades, Syria has been one of Russia’s main allies in the Middle East. The collapse of the Soviet Union didn’t change anything in this regard. Moscow continued to support Damascus with whatever necessary to keep the old empire’s last balcony on the warm waters of the Mediterranean Sea.

Russian President Vladimir Putin arrives to speak at a Presidential Council for Civil Society and Human Rights meeting in the Grand Kremlin Palace on Oct. 1, 2015, in Moscow, Russia.

Russia Gets Back in the Game

In 2011, amid the eruption of the revolution in Syria, the Russians started feeling the heat. It was almost obvious to them that the fall of the regime in Damascus would lead to serious changes in Russia’s status in the Middle East; thus this wasn’t an option to even think about, and everything possible should be done to maintain the regime and keep it breathing, should this be using the veto in the UN Security Council, sending arms and ammunitions, or as we are witnessing today, intervening militarily and fighting to keep the status quo. Russia is not the only ally of the Syrian government; Iran also has been supporting President Bashar al-Assad.

Russia and Iran have not previously been allies. They share common interests, common allies and common rivals; however, this doesn’t necessarily mean they act as allies. In Syria, their common interest has been — and still is — keeping their common ally, the regime, alive. Even within the Syrian regime, there are different views among the ranks on how to deal with both countries; there are officials who are seen as “Iranians” and others as “Russians.” This is prompted by fears among one wing that the Islamic Republic’s agenda in Syria involves Islamization of society, while the other wing that prefers the Iranians sees them as very reliable since they were the first to roll their sleeves up in the fight for the regime’s existence. Yet, this is only a matter of preferences, and nothing more.