Should Voting Systems be Classified as Critical Infrastructure?

While members of all political party voters seem to diss the notion that Russia intruded on voting systems in 2016, the proof is there. If you watched former DHS Secretary Jeh Johnson during his congressional testimony, it was not so much his responses but more about what members of congress know, to pose questions to Johnson.

Image result for u.s. voting systems

J. Alex Halderman, a professor of computer science and engineering at the University of Michigan, contended U.S. election equipment is “vulnerable to sabotage” that “could change votes.”

“We’ve found ways for hackers to sabotage machines and steal votes. These capabilities are certainly within reach for America’s enemies,” Halderman told senators.

He said he and his team spent 10 years researching cyber vulnerabilities of election equipment. The professor said:

Some say that the fact that voting machines aren’t directly connected to the internet makes them secure. But, unfortunately, this is not true. Voting machines are not as distant from the internet as they may seem. Before every election, they need to be programmed with races and candidates. That programming is created on a desktop computer, then transferred to voting machines. If Russia infiltrated these election management computers, it could have spread a vote-stealing attack to a vast number of machines. I don’t know how far Russia got or whether they managed to interfere with equipment on Election Day. More here from Daily Signal.

Okay…still a non-believer? Let’s see what the States experiences.

Image result for voter registration database

Click here for additional video and interactive map of states using paper ballot backup systems.

Elections officials outgunned in Russia’s cyberwar against America

WASHINGTON/Charlotte Observer

Local officials consistently play down suspicions about the long lines at polling places on Election Day 2016 that led some discouraged voters in heavily Democratic Durham County, N.C., to leave without casting a ballot.

Minor glitches in the way new electronic poll books were put to use had simply gummed things up, according to local elections officials there. Elections Board Chairman William Brian Jr. assured Durham residents that “an extensive investigation” showed there was nothing to worry about with the county’s new registration software.

He was wrong.

What Brian and other election officials across eight states didn’t know until the leak of a classified intelligence is that Russian operatives hacked into the Florida headquarters of VR Systems, Inc., the vendor that sold them digital products to manage voter registrations.

A week before the election, the hackers sent emails using a VR Systems address to 122 state and local election officials across the country, inviting them to open an attachment wired with malicious software that spoofed “legitimate elections-related services,” the report said. The malware was designed to retrieve enough additional information to set the stage for serious mischief, said the National Security Agency report disclosed by the Intercept, an investigative web site.

That wasn’t the only type of attack.

The new revelations about the Kremlin’s broad and sophisticated cyber offensive targeting Democrat Hillary Clinton and aimed at seating Donald Trump in the Oval Office have set off a wave of worry about the security of the nation’s voting systems. State election officials, facing questions as to whether they ignored oddities or red flags, have responded by accusing intelligence agencies of failing to alert them of the risks.

The truth is a hodge-podge of electronic machinery that enables Americans to exercise their most sacred democratic right is weakly guarded by state and local agencies. Those officials are quick to assure the voting public that their systems are secure, but they lack the resources and technical know-how to defend against cyber intrusions, or even to perform forensic examinations to ensure nothing happened.

Election officials in Illinois, another state that VR Systems lists as a customer, did not find out they were hacked by Russian operatives late last June until a week or two later. By then, the Russian operatives had downloaded about 90,000 voter registration records, leading to an investigation by the FBI and the U.S. Department of Homeland Security, said Ken Menzel, general counsel of the Illinois Board of Elections. Menzel confirmed a Bloomberg report that the Russians appeared to have made unsuccessful attempts to alter or delete some records.

In Georgia, where a nationally watched congressional runoff race is scheduled for Tuesday, Politico magazine reported that a U.S. hacker from a national laboratory seeking to expose vulnerabilities in election systems was able to easily download millions of voter records from Kennesaw State University’s Center for Election Systems, which manages them. Election watchdog groups say subsequent warnings to the state about a hole in their system went unheeded for months.

David Jefferson, a computer scientist at the Lawrence Livermore National Laboratory in California who has acted in his personal capacity in trying to safeguard election integrity, said he believes it is “absolutely possible” that the Russians affected last year’s election.

“And we have done almost nothing to seriously examine that,” he said.

“The Russians really were engaged in a pattern of attacks against the machinery of the election, and not merely a pattern of propaganda or information warfare and selective leaking,” said Alex Halderman, a University of Michigan computer science professor. “The question is, how far did they get in that pattern of attacks, and were they successful?” Election officials across the country may not even know if they’ve been attacked, computer scientists say, pointing to the scenario that played out in Durham County.

EASY PREY

State and local voting systems appear to be easy prey for sophisticated hackers.

Five states use electronic voting machines with no paper backups, precluding audits that might verify the accuracy of their vote counts. They include Georgia, scene of Tuesday’s 6th District runoff election, Delaware, Louisiana, New Jersey and South Carolina. Parts of another nine states also are paperless, including the crucial swing state of Pennsylvania.

Although Congress has discouraged use of internet voting because of the potential for hackers to tamper with ballots, some 32 states allow military and overseas voters to transmit ballots online or via insecure fax machines. Alaska, Washington state and Hawaii have been the most permissive.

“If we don’t fix our badly broken system before the next major presidential election, we’re going to be hacked into,” said Barbara Simons, author of “Broken Ballots,” a 2012 book about election security published by Stanford University. “It might not just be Russia. It might be North Korea, China, Iran or partisans.”

While the Netherlands opted to shift to paper ballots when alerted the Russians were trying to swing its election outcome to the right, U.S. election officials have stood pat.

But former FBI Director James Comey, in widely watched testimony to the Senate Intelligence Committee on June 8, said “there should be no fuzz” about Russia’s barrage of millions of social media messages spreading falsehoods about Clinton.

“The Russians interfered in our election during the 2016 cycle,” he said. “They did it with purpose. They did it with sophistication. They did it with overwhelming technical efforts … And it is very, very serious.”

America’s saving grace could be its decentralized system in which cities, counties and states have used federal grants to procure a wide variety of voting equipment, limiting the potential impact of a single attack.

But that doesn’t mean targeted attacks couldn’t tip the outcome of closely divided races, even for the presidency.

CRITICAL INFRASTRUCTURE

On Jan. 6, American intelligence agencies issued a declassified report accusing Russia of the cyber attack ultimately aimed at helping Trump, calling it the Kremlin’s “boldest” operation ever aimed at influencing the United States. In a brief notation, the report said that, while the Russians targeted state and local voting systems, they did not attempt to corrupt vote-tallying equipment.

On the same day the report was released, in one of his last acts as U.S. secretary of Homeland Security, Jeh Johnson proclaimed the nation’s election systems to be “Critical Infrastructure,” a designation that not only makes their security a higher priority, but improves the climate for federal-state cooperation. Because state and local officials exert total control over their operations, the agency only can investigate a vulnerability or possible breach if asked to do so – an obstacle the new designation didn’t change.

A senior Homeland Security official, in an interview with McClatchy, batted down as wildly exaggerated a Bloomberg report stating that Russian cyber operatives had made “hits” on voting systems in 39 states. Every web site is constantly scanned by “bad actors,” just as burglars might case homes in a neighborhood. That doesn’t equate to hacking, said the official, who spoke on condition of anonymity because of the sensitivity of the matter.

“The ability to manipulate the vote tally, that’s quite complicated,” the Homeland Security official said. “We didn’t see an ability to really accomplish that even in an individual voting machine. You have to have physical access to do that. It’s not as easy as you think.”

Some of the nation’s top experts in voting security disagree.

Lawrence Livermore’s Jefferson voiced frustration with the “defensive” refrain of denials from state and local election officials, including the National Association of Secretaries of State.

“Election officials do not talk about vulnerabilities,” Jefferson said, “because that would give the advantage to the attacker. And they don’t want to undermine public confidence in elections.”

Halderman said Homeland Security officials told him they were unaware of a single county in any state that had conducted post-election forensic examinations of their voting equipment.

The Homeland Security official who spoke with McClatchy said the main concern for agency cyber specialists is not about vote-tampering; it’s related to the ability of intruders to sow confusion and chaos. That could entail schemes to foul voter registration data by, for example, removing the names of voters from the rolls so they are turned away at polling stations.

“This scenario is what we witnessed on the ground in North Carolina on Election Day,” said Susan Greenhalgh, a spokeswoman for the election watchdog group Verified Voting.

“If attackers wanted to impact an election through an attack on a vendor like VR Systems,” she said, “they could manipulate or delete voter records impacting a voter’s ability to cast a regular ballot. Or, they could cause the E-Pollbooks (electronic databases of voters) to malfunction, hampering the check-in process and creating long lines.”

North Carolina was considered to be a swing state in the presidential race, and Durham County, with an African-American population of more than 37 percent, had voted more than 75 percent in favor of putting and keeping Barack Obama in the White House. Last year’s governor’s race was a dead heat entering Election Day.

The chaos in Durham County led to 90-minute delays. Some voters rang a Voter Protection Hotline to complain that their names had disappeared from the registration system or that they were told they already had voted.

The county hired a contractor to investigate the foul-up, but the inquiry never examined whether the system was hacked.

Twenty other North Carolina counties used the system, including Mecklenburg County, encompassing most of Charlotte. Though none reported problems on the scale of Durham County, release of the NSA report prompted the North Carolina Board of Elections to order a new investigation.

A former FBI agent is leading the inquiry. Critics say the three-member investigative team again lacks expertise in forensics.

Mindy Perkins, VR Systems’ president and chief executive officer, said in a statement that the company immediately notified all of its customers as soon as it was alerted “to an obviously fraudulent email purporting to come from VR Systems” and advised them not to click on the attachment.

“We are only aware of a handful of our customers who actually received the fraudulent email,” she said. “We have no indication that any of them clicked on the attachment or were compromised as a result.”

She said the company has “policies and procedures in effect to protect our customers and our company.”

Even so, Russia succeeded in sneaking up on U.S. agencies, voting system vendors and intelligence agencies.

Halderman, the University of Michigan expert, said he believes the best solution is for states to require paper trails for all voting equipment and post-election audits to ensure the vote counts are authentic.

“There’s no guarantee that we’ll know we’re under attack,” he said, “unless we do the quality control that we need by doing these audits to detect manipulation.”

 

 

 

 

Global Blackouts, Anywhere in the World, Courtesy Russia

Fitful sleep last night after reading a very long detailed piece on Russian hackers versus Ukraine. Why, well the same tools and language they use have been found on American infrastructure and systems. Last thoughts before sleep were those of life before the internet and how people get emails with attachments that should never be opened. The short summary is just below. The more detailed and terrifying truth follows. It is a long summary, must be read…it is something like a cyber Hitchcock Twilight Zone disaster thriller, but it happened and happened often.

Image result for cyber war russia and us

Further, during a hearing in the House with former DHS Secretary, Jeh Johnson revealed a couple of key facts. One is told that during the election cycle, when the DNC hack, officials on numerous requests refused assistance, cooperation and discussions with DHS and FBI about foreign cyber intrusions. What was the DNC hiding? The other fact is Obama had the full details in intelligence briefings daily leading into November and December and refused to tell the country about Russian interference. He waited until after the elections and into December to take action. Why?

Okay, read on….

Image result for ukraine blackout CommentaryMagazine

Russia’s New Cyber Weapon Can Cause Blackouts Anywhere in the World

Hackers working with the Russian government have developed a cyber weapon that can disrupt power grids, U.S researchers claim. The cyber weapon has the potential to be absolutely disruptive if used on electronic systems necessary for the daily functioning of American cities.

The malicious software was used to shut down one-fifth of the electric power generated in Kiev, Ukraine last December. Called ‘CrashOverride’ the malware only briefly disrupted the power system but its potential was made clear.

With development, the cyber weapon could easily be used against U.S with devastating effects on transmission and distribution systems.

Sergio Caltagirone, director of threat intelligence for Dragos, a cybersecurity firm that examined the malware said, “It’s the culmination of over a decade of theory and attack scenarios, it’s a game changer.”

Dragos has dubbed the group of hackers who created the bug and used it in Ukraine, Electrum. The group and the virus have also been under scrutiny by cyber intelligence firm, FireEye, headed by John Hultquist. Hultquist’s company has nicknamed the group Sandworm and are keeping watch for clues of another attack.

The news of the malware comes in the middle of the ongoing investigation into Russia’s influence on the recent Presidential election. The Russian government is accused of trying to influence the outcome of the election by hacking hundreds of political organizations and leveraging social media.

While there is no hard evidence yet, U.S. officials believe the disruptive power hackers are closely connected to the Russian Government. U.S. based energy sector experts agree the malware is a huge concern and concede they are seeking ways to combat potential attacks.

“U.S utilities have been enhancing their cybersecurity, but attacker tools like this one pose a very real risk to reliable operation of power systems,”said Michael Assante, who worked at Idaho National Labs and is former chief security officer of the North American Electric Reliability Corporation.

CrashOverride

CrashOverride is only the second known instance of malware specifically designed to destroy or disrupt industrial control systems. The U.S. and Israel worked together to create Stuxnet, a bug designed to disrupt Iran’s nuclear enrichment program.

Robert M. Lee, chief executive of Dragos believes CrashOverride could be manipulated to attack other types of industrial control such as gas or water, though there has been no demonstration of that yet. But the sophistication of the entire operation is undeniable. The hackers had the resources to only develop the malware but to test it too.

The malware works by scanning for critical components that operate circuit breakers, then opening these breakers, which stops the flow of electricity. It continues to keep the circuit breakers open, even if a grid operator tries to close them. CrashOverride also cleverly comes with a “wiper” component that erases the existing software on the computer system that controls the circuit breakers. This forces the grid operator to revert to manual operations, which means a longer and more sustained power outage.

Potential outages could last a few hours and probably not more than a couple of days as U.S. power systems are designed to have high manual override capabilities necessary in extreme weather.

As mentioned above, you need to read the full detailed version here and just how the FBI, global cyber experts at the request of Ukraine worked diligently for accurate attribution to a Russian cyber force intruding on power systems. Hat tip to these experts and the story needs to go mainstream, as we are in a cyber war, the depths impossible to fully comprehend. Ukraine is the target and cyber incubation center for Russian cyber terrorists where they test, review, adapts and keep going without consequence.

Image result for ukraine blackout

Okay, read it all here. Hat tip for the detailed summary and the people doing quiet investigative cyber work.

 

Terror Funding, Likely Given their Names

 

21 MEN INDICTED IN MASSIVE CIGARETTE SMUGGLING SCHEME

AFTER INVESTIGATION BY BRONX DA, NYPD, NYS TAX DEPT.,

HOMELAND SECURITY INVESTIGATIONS

Nearly 10,000 Cartons Seized, Alleged Tax Fraud is $20 Million

Cheap Cigarettes Sold in Stores Citywide, Undercutting Law-Abiding Merchants (official indictment here)

Bronx cigarette smuggling could be financing more than just fancy houses and jewels; police worry about terror funding

THE BRONX — When police raided the Bronx home of cigarette smuggling suspect, Hector Rondon, on Leland Avenue recently, they didn’t find him right away.

Then, one of the agents felt something odd under a rug in Rondon’s bedroom.

It turned out to be a trap door that led to a crawl space.

That’s where Hector Rondon was found naked — his hiding spot a failure.

Rondon is one of three, accused ringleaders in a massive cigarette smuggling ring with roots in North Carolina.

That’s where cartons of cigarettes were purchased for about $50 a piece, far cheaper than the sales price in New York of $120 to $130 a carton.

The ring allegedly purchased 5,000 cartons of cigarettes every week in North Carolina and Virginia and sent them to New York.

A $5.00 pack of cigarettes down south can fetch $8.00 on the black market in New York, where heavily-taxed smokes normally sell for $13.00 a pack.

“It’s an incredibly lucrative business,” said Jean Walsh, Chief of Investigations for the Office of Bronx District Attorney, Darcel Clark. “In many ways, it’s more lucrative than drug dealing.”

Walsh believes millions in illegal proceeds could have been transferred overseas, although her office has also accounted for millions in real estate, gold, and jewelry.

“Cash is very difficult to track,” Walsh told PIX11. “They know that. They know we know that.”

Shareef Moflehi, 30, was at the top of the hierarchy of 21 men who were indicted.

Walsh said he recently bought a Mediterranean-style villa in Mount Vernon, New York for $675,000 cash.

Now, the District Attorney’s Civil Forfeiture Unit will try to seize $15,210,000 in assets from Moflehi and his alleged cohorts.

It will seek to take $1,757,945 from another defendant, Saleh Ali Qasem of the Bronx.

The DA is looking to seize five houses, cash, jewelry, and gold.

Jean Walsh told PIX11 her office is still working to track all the money, but she and the NYPD, along with state investigators and federal agents, are well aware of how cigarette smuggling has been tied to terror funding in the past.

Going way back to 1993, financing for the first, World Trade Center bombing was directly linked to cigarette smuggling in Bay Ridge, Brooklyn.

Not long after the 9/11 terror attacks, two Lebanese-born brothers were convicted in North Carolina of sending their smuggling profits to Hezbollah, a group with a stated goal of wiping out Israel.

More recently, a 2015 cigarette smuggling ring in the Bronx was sending vast amounts of cash overseas to the Middle East and Africa.

New York smokers looking for a bargain may not be aware of all this.

But they’re very aware of the places that sell untaxed cigarettes—which they can find in 60 to 80 percent of the delis and smoke shops in New York City.

“There’s always a secret stash of the untaxed cigarettes that are just out of sight,” Tarek Rahman, Chief of the Special Investigations Bureau in the DA’s office, told PIX11.

****

DEFENDANTS

NOMAN ALBAHRI, 36, 1875 Gleason Ave, Bronx

SAMIR HOSIN, 29, 98 Ridgewood Ave, Bronx

OMAR JHURY, 26, 49 N. 10th Ave, Mount Vernon

JAMAL KARKAT, 26, 1735 Hobart Ave, Bronx

TAHIR KASTRATI, 50, 1723 Colden Ave, Bronx

HECTOR RONDON, 44, 826 A Leland Ave, Bronx

SHAREEF MOFLEHI, 30, 121 Stephens Ave, Bronx, & (recently) 369 Westchester Ave, Mount Vernon

PAZAL MOHAMMED (AKA JOHN), 30, 28 Bobwhite Plain, Hicksville, NY

ABRAHAM SHARHAN (AKA IBRAHIM), 34, 4165 Grace Ave, Bronx, 63 Sherwood Ave, Yonkers, NY

YASSER SUFYAN (AKA MALIK), 31, 191 Bennett Ave, Yonkers, NY

AMMAR SHAMAKH, 33, 101 Vincent Drive, Clifton, NJ

NAGIB MOHAMED SHARIF ALI, 39, 3746 Riverside Drive, Raleigh, NC

SHAHER DAHJAT DARI (AKA BOO BOO), 28, 1269 Waterloo Drive, Rocky Mount, NC

MAEEN M. ALSAYIDI, 34, 11 East 2nd Street, Clifton, NJ

OMAR NASSER, 22, 508 Woosdwalk Lane, Rocky Mount, NC

ILYAS MAMUN, 47, 3459 Dekalb Ave, Brooklyn, NY

ABDUL WAHED SALIM (AKA AMIGO), 32, 207 Maddux Drive, Pikesville, NC

SALEH ALI QASEM, 34, 1025 Underhill Ave, Bronx

MOHAMED SIDI AMAR, 39, 300 Addison way, Petersburg, VA

YAHI OULD CHEBIH, 36, 29 Craterwoods Court, Petersburg, VA

TAHIR OULD ELY LEMINE, 39, 169 Craterwoods Court, Petersburg, VA

 

198 Million US Voters Exposed, Vulnerable/Hearing Scheduled

Deep Root Analytics behind data breach on 198 million US voters: security firm

Anyone with an internet connection was able to access a huge database of personal information on US voters ahead of 2016 elections, a security firm says. The database helped the Republican Party’s presidential campaign.

A data analytics firm that helped US President Donald Trump’s election campaign exposed personal information on 198 million Americans, a security firm revealed on Monday.

Chris Vickery, a researcher at the consultancy Upguard, discovered a misconfigured database containing information on almost every registered US voter compiled by data analytics company Deep Root Analytics.

The information was used by the Republican National Committee to help win the 2016 presidential race.

The database contained “names, dates of birth, home addresses, phone numbers, and voter registration details,” as well as data described as predicted data about voter behavior on policy preferences and likelihood of choosing a particular candidate.

Upguard said the database “lacked any protection against access” and was available to “anyone with an internet connection.”

It described it as “a treasure trove of political data and modeled preferences used by the Trump campaign.” It said the information was used to help influence potential voters and accurately predict their behavior.

Deep Root takes responsibility

Deep Root released statements confirming that files were accessed without its knowledge. “The data that was accessed was, to the best of our knowledge, this proprietary information as well as voter data that is publicly available and readily provided by state government offices,” the statement said.

“Since this event has come to our attention, we have updated the access settings and put protocols in place to prevent further access.  We take full responsibility for this situation.”

“We do not believe that our systems have been hacked. To date, the only entity that we are aware of that had access to the data was Chris Vickery,” it added.

Data breach hunter

Analyst Chris Vickery, a self-described “data-breach hunter,” last year discovered a breach of 191 million voter records in Mexico. Upguard said the latest leak was the largest known breach of voter data in history, with the equivalent of 10 billion pages of text.

It said the database modeled voters’ position on almost 50 different issues with the files offering insights into the algorithmic strategy used by Trump’s campaign to target voters.

The exposure “raises significant questions about the privacy and security Americans can expect for their most privileged information,” the researchers said.

“It also comes at a time when the integrity of the US electoral process has been tested by a series of cyberassaults against state voter databases, sparking concern that cyber risk could increasingly pose a threat to our most important democratic and governmental institutions.”

Meanwhile:  Image result for electronic voting

A research group in New Jersey has taken a fresh look at postelection polling data and concluded that the number of noncitizens voting illegally in U.S. elections is likely far greater than previous estimates.

As many as 5.7 million noncitizens may have voted in the 2008 election, which put Barack Obama in the White House.

The research organization Just Facts, a widely cited, independent think tank led by self-described conservatives and libertarians, revealed its number-crunching in a report on national immigration.

Just Facts President James D. Agresti and his team looked at data from an extensive Harvard/YouGov study that every two years questions a sample size of tens of thousands of voters. Some acknowledge they are noncitizens and are thus ineligible to vote.

Just Facts’ conclusions confront both sides in the illegal voting debate: those who say it happens a lot and those who say the problem nonexistent.

In one camp, there are groundbreaking studies by professors at Old Dominion University in Virginia who attempted to compile scientifically derived illegal voting numbers using the Harvard data, called the Cooperative Congressional Election Study.

On the other side are the professors who conducted the study and contended that “zero” noncitizens of about 18 million adults in the U.S. voted. The liberal mainstream media adopted this position and proclaimed the Old Dominion work was “debunked.”

The ODU professors, who stand by their work in the face of attacks from the left, concluded that in 2008 as few as 38,000 and as many as 2.8 million noncitizens voted.

Mr. Agresti’s analysis of the same polling data settled on much higher numbers. He estimated that as many as 7.9 million noncitizens were illegally registered that year and 594,000 to 5.7 million voted.

These numbers are more in line with the unverified estimates given by President Trump, who said the number of ballots cast by noncitizens was the reason he lost the popular vote to Hillary Clinton.

Last month, the president signed an executive order setting up a commission to try to find on-the-ground truth in illegal voting. Headed by Vice President Mike Pence, the panel also will look at outdated voter lists across the nation with names of dead people and multiple registrants.

For 2012, Just Facts said, 3.2 million to 5.6 million noncitizens were registered to vote and 1.2 million to 3.6 million of them voted.

Mr. Agresti lays out his reasoning in a series of complicated calculations, which he compares to U.S. Census Bureau figures for noncitizen residents. Polls show noncitizens vote overwhelmingly Democratic.

“The details are technical, but the figure I calculated is based on a more conservative margin of sampling error and a methodology that I consider to be more accurate,” Mr. Agresti told The Washington Times.

He believes the Harvard/YouGov researchers based their “zero” claim on two flawed assumptions. First, they assumed that people who said they voted and identified a candidate did not vote unless their names showed up in a database.

“This is illogical, because such databases are unlikely to verify voters who use fraudulent identities, and millions of noncitizens use them,” Mr. Agresti said.

He cites government audits that show large numbers of noncitizens use false IDs and Social Security numbers in order to function in the U.S., which could include voting.

Second, Harvard assumed that respondent citizens sometimes misidentified themselves as noncitizens but also concluded that noncitizens never misidentified themselves as citizens, Mr. Agresti said.

“This is irrational, because illegal immigrants often claim they are citizens in order to conceal the fact that they are in the U.S. illegally,” he said.

Some of the polled noncitizens denied they were registered to vote when publicly available databases show that they were, he said.

This conclusion, he said, is backed by the Harvard/YouGov study’s findings of consumer and vote data matches for 90 percent of participants but only 41 percent of noncitizen respondents.

As to why his numbers are higher than the besieged ODU professors’ study, Mr. Agresti said: “I calculated the margin of sampling error in a more cautious way to ensure greater confidence in the results, and I used a slightly different methodology that I think is more accurate.”

There is hard evidence outside of polling that noncitizens do vote. Conservative activists have conducted limited investigations in Maryland and Virginia that found thousands of aliens were registered.

These inquiries, such as comparing noncitizen jury pool rejections to voter rolls, captured just a snapshot. But conservatives say they show there is a much broader problem that a comprehensive probe by the Pence commission could uncover.

The Public Interest Legal Foundation, which fights voter fraud, released one of its most comprehensive reports last month.

Its investigation found that Virginia removed more than 5,500 noncitizens from voter lists, including 1,852 people who had cast more than 7,000 ballots. The people volunteered their status, most likely when acquiring driver’s licenses. The Public Interest Legal Foundation said there are likely many more illegal voters on Virginia’s rolls who have never admitted to being noncitizens.

Here comes the Congressional hearing: Image result for electronic voting NYTimes

The Senate Intelligence Committee will hold a hearing on U.S. election security Wednesday.

Sen. Mark Warner (D-Va.), who is a part of that probe into alleged Russian meddling, will be playing a leading role. Warner says there are states that have not publicly come forward to share that the Russians tried to hack their elections in 2016.

“I’m not trying to embarrass any state. I just want to make sure that Americans realize how serious this threat is,” Warner said.

Warner is working with Sen. Richard Burr (R-N.C.) this week to learn more about the nation’s election systems.

Hearings this week on Capitol Hill will cover Russia’s cyber efforts during the 2016 race, America’s response efforts, and potential threats to future elections.

“We have elections obviously this year in Virginia. I want to make sure that the integrity of our election system is safe from hacking and I’m not sure we’re fully prepared,” Warner said.

While Warner says Russia was not able to change any vote totals, more steps must be taken.

“If you can get into the overall statewide voter file, you could do some mischief. So I just want to make sure that we’re on guard,” Warner said.

One issue Warner raises is that if states faced hacking attempts in 2016, the federal government views them as a victim, and it’s up to the state to come forward.

“It’s up to the state to be willing to volunteer that. I don’t think that’s smart, is it in our country’s security to keep secret the fact that it was literally many many more states?” Warner said.

Virginia just held primaries last week, and now it’s time for the commonwealth to prepare for the general election in the fall.

“We’ve got to redouble our efforts to make sure that our most critical democratic process of free and fair elections continue to be free, fair and non-disputable,” Warner said.

Wednesday’s hearing is set to begin at 9:30 a.m. in Washington, D.C.

 

 

Are we Forgetting about bin Laden’s Son, Hamza?

Primer: Hamza bin Ladin was added to the U.S. terror list with Barack Obama amending a George W. Bush Executive Order # 13224.

In this image made from video broadcast by the Qatari-based satellite television station Al-Jazeera Wednesday, Nov. 7, 2001, a young boy, left, identified as Hamza bin Laden holds what the Taliban says is a piece of U.S. helicopter wreckage in Ghazni, Afghanistan on Monday, Nov. 5, 2001.

Newsweek: The foothills of the Spin Ghar mountain range, two dozen miles south of Jalalabad in the borderland between Afghanistan and Pakistan, were once home to hundreds of olive plantations. For tens of thousands of acres, there used to be farms clustered along the banks of the Nangarhar Canal, a monumental hydroelectric irrigation project completed in the 1960s, when Afghanistan was safe and liberal enough to form a regular stop on the hippie trail from Europe to India and the Far East. By the turn of the new millennium, however, more than 20 years of continuous warfare had almost destroyed the canal’s capacity to pump water to the groves, all but killing what had once been a flourishing business.

One day in the fall of 2001, with yet another foreign invasion brewing, a father sat with three of his young sons in the shade of one of the few remaining olive trees. Together, they performed a simple farewell ceremony. To each of the three boys, the father gave a misbaha—a set of prayer beads symbolizing the 99 names of God in classical Arabic. Then the father took his leave and disappeared into the mountains, heading for a familiar redoubt known as the Black Cave—or, in the local Pashto language, Tora Bora. “It was as if we pulled out our livers and left them there,” one of the sons recalled in a letter in 2009.

The boy who wrote that letter was Hamza bin Laden, a son of Osama bin Laden, who was then the leader of Al-Qaeda. Hamza was to spend most of the next decade in captivity. He grew up behind bars, missing his father deeply. “How many times, from the depths of my heart, I wished to be beside you,” Hamza wrote to him in the letter. “I remember every smile that you smiled at me, every word that you spoke to me and every look that you gave me.”

Hamza grew up with a fervor for jihad and a determination to follow in the footsteps of his notorious father. And toward the end of his life, the older bin Laden began grooming Hamza for a leadership role. He even made plans for Hamza to join him in his secret compound in Abbottabad—the place where Navy SEALs ultimately shot him dead. But 16 years after their farewell under that olive tree, Hamza’s emergence as a jihadi leader, along with several of his father’s most trusted and competent lieutenants, portends an Al-Qaeda resurgence.

Today, it might seem like the Islamic State group is strong, as its followers attack and kill innocents in London and Manchester. But its power is dwindling, as it loses men and territory in Iraq and Syria thanks to an assault by Iraqi, Kurdish and American forces. Meanwhile, Hamza’s story—based on books, court documents, open-source intelligence, Al-Qaeda videos and records seized from his father’s compound after his death in 2011, among other things—shows how ISIS’s parent organization, Al-Qaeda, is making a comeback—one with potentially deadly consequences for the West and the rest of the world.

Three Jihadi Muskateers

In the months after 9/11 and the fall of the Taliban, as the U.S. invaded Afghanistan, bin Laden family members and high-ranking Al-Qaeda figures escaped to the Shiite stronghold of Iran. That may seem like a surprising destination for some of the world’s most fervent Sunni extremists—men who pepper their public utterances with slurs about their Shiite rivals. But in the wake of the attacks on New York City and Washington, D.C., Iran was the one place in the Muslim world where America’s military and law enforcement apparatus could not apprehend them. The Iranian authorities deported most of the Al-Qaeda members they captured, but they held on to a few high-value detainees to use as bargaining chips in hostage negotiations and other sticky situations. Among these valuable hostages were Hamza and his mother, Khayria, as well as three key figures: Abu Khayr al-Masri, the head of the Al-Qaeda’s political committee, Abu Mohammed al-Masri, the head of its training camps, and Saif al-Adel, its chief of security and tactician.

Immediately following their arrest in Shiraz in April 2003, those three men were hauled off to Tehran and jailed for around 20 months in the dungeons of a building belonging to Iran’s feared intelligence apparatus. The top tier of Al-Qaeda and their families were held incommunicado and without charge. Around the beginning of 2005, they were moved to a spacious military compound with an apartment complex, a soccer field and a mosque, adjacent to a training camp for one of the many Shiite militant groups on Tehran’s payroll. Their families were allowed to join them, though at least one of the detainees suspected this was a ruse to allow the Iranians to keep tabs on potentially troublesome family members.

But the prisoners were restive. For these hardy mujahedeen, suburban comforts only heightened their humiliation. One of them told his captors he would sooner be extradited to Israel than spend any more time in Iran’s gilded cage. In March 2010, the prisoners staged what one detainee later described as “a huge act of disturbance.” Masked, black-clad Iranian troops were ordered to storm the compound. The soldiers beat the men and some of the children and hauled off the senior detainees to solitary confinement, where they stewed for 101 days.

The detainees’ ability to communicate with the outside world seems to have varied over time. At first, they were held, as one U.S. official puts it, “under virtual house arrest, not able to do much of anything.” Phone calls to family members were strictly limited. But the strictures gradually loosened, just as the detainees’ living conditions slowly improved. The Iranian authorities eventually set up a system permitting prisoners to send emails and browse the web, albeit with limited access.

There were other ways of communicating with the outside too. Adel’s father-in-law, Mustafa Hamid, who was held in Iran under looser conditions, visited the main group of detainees every few months. With his greater liberty, Hamid was in a position to serve as courier, and this may be how Adel was able to publish a column on security and intelligence in the house magazine of Al-Qaeda in the Arabian Peninsula, Muaskar al-Battar (Camp of the Sword). Other detainees escaped and brought manuscripts with them, written by the detainees; bin Laden’s daughter Iman smuggled out a text called Twenty Guidelines on the Path of Jihad—a book highly critical of ISIS founder Abu Musab al-Zarqawi’s violence against civilians in Iraq—and eventually had it published. (The book presaged the conflict that split ISIS from Al-Qaeda years later.)

Despite their restlessness, the detainees managed to create elements of their previous lives behind bars. The men came together five times a day for prayers and conversation at the mosque. The prisoners asked that their children be allowed to attend school—and the authorities said no— but Hamza’s mother, who is well-educated, urged him to pursue learning as best he could, and a group of senior detainees took it upon themselves to educate him in Koranic study, Islamic jurisprudence and the Hadith, a collection of sayings attributed to the Prophet Muhammad. While in custody, Hamza married a daughter of Abu Mohammed al-Masri and had children.

He would never see his father again, but soon he would become just like him—an advocate of violent, radical jihad.

A ‘Lion’ Emerges From His Den

By 2014, Al-Qaeda and ISIS had officially split. ISIS had not only conquered territory in Iraq and Syria but shocked the world, beheading Americans on tape and broadcasting its brutality. In the eyes of the West, Al-Qaeda was no longer the most dangerous extremist group, and ISIS leader Abu Bakr al-Baghdadi had become a new bin Laden. To some jihadis, however, Baghdadi was much more: He was the leader prophesized to bring about a worldwide Islamic caliphate.

Baghdadi’s rise came at the expense of Ayman al-Zawahiri, Al-Qaeda’s leader. The Egyptian may have inherited bin Laden’s portfolio and job title, but from his grave under the Indian Ocean, the sheikh could not pass on his aura. In July 2014, as the feud between ISIS and Al-Qaeda grew, Zawahiri renewed his group’s bayat , or loyalty oath, to Mullah Omar, the Taliban leader. At the time, it seemed a smart symbolic move to underline the illegitimacy of Baghdadi’s claim to supremacy. A year later, however, it emerged that Omar had succumbed to tuberculosis in April 2013; Zawahiri and Al-Qaeda had pledged allegiance to a man who had been dead for 15 months. This looked bad for Zawahiri; either he had known Omar was dead and sworn fealty to a cadaver—a grave transgression in Al-Qaeda’s Salafi-jihadi version of Islam—or he had not known and was therefore too far out of the loop to call himself a true emir. The gaffe provoked ridicule from some jihadis, dismay from others. At a time when Zawahiri was already struggling to show his relevance in the age of ISIS, it seemed to confirm the worst fears about his leadership.

But Zawahiri does not stand alone at the prow of Al-Qaeda, and his crew has recently grown stronger—at a time when war with the West and its allies has weakened ISIS. In an audio message recorded in May or June 2015, Zawahiri triumphantly introduced a man he called “a lion from the den of Al-Qaeda.” After four years of silence following his father’s death, Hamza bin Laden’s voice was heard once again, and his words remained faithful to Al-Qaeda’s message. He praised the leaders of Al-Qaeda’s various spinoffs, insulted President Barack Obama as “the black chief of [a] criminal gang,” lauded the attacks on Fort Hood and the Boston Marathon, and called for jihadis to “take the battlefield from Kabul, Baghdad and Gaza to Washington, London, Paris and Tel Aviv.”

In his 2015 statement, Hamza called for the release of imprisoned Al-Qaeda members, singling out the “sheikhs” whom he credits with his education while in captivity, including the Shura big three—Abu Khayr al-Masri, Saif al-Adel and Abu Mohammed al-Masri. “May God release them all,” Hamza entreated.

His prayers were soon answered. Al-Qaeda in the Arabian Peninsula, in the middle of its ascendancy in Yemen, had bombed the Iranian ambassador’s residence in Sanaa in December 2014. Later, it had shot dead an Iranian diplomat who was resisting a kidnapping attempt. The group had also successfully taken two Iranian diplomats alive. Sometime in 2015, it swapped them for Al-Qaeda’s three top leaders in Iran, who got a hero’s welcome in Waziristan.

The returning trio brought with them a combined century of experience in jihad. Abu Mohammed al-Masri had worked with Adel to train Somali militants in the early 1990s and plan the 1998 U.S. Embassy bombings in East Africa. American intelligence officials have called him Al-Qaeda’s “most experienced and capable operational planner not in U.S. or allied custody.” And then there is Adel, whose long career has included serving in the Egyptian armed forces, helping found Al-Qaeda, precipitating the Black Hawk Down incident in Somalia, acting as a mentor to Zarqawi and serving as Al-Qaeda’s head of security, with intimate involvement in virtually all the organization’s attacks up to and including 9/11. All three men were closely involved in Al-Qaeda’s first major blow against the United States, the embassy bombings of 1998. And after a long absence, all three were now involved in global jihad. (Abu Khayr was killed in a U.S. airstrike in Idlib, Syria, earlier this year.)

Their return came at a time when Al-Qaeda’s main global affiliates had gained in strength, bolstered by the ongoing turmoil in Syria, Yemen and Libya. They have pushed back against ISIS, and in response to ISIS’s recruitment around the world, Zawahiri even announced the formation of a new affiliate. Al-Qaeda in the Indian Subcontinent, led by a former commander in the Pakistani Taliban, aims to unify Sunni extremist jihadis across the region and “rescue” Muslims living in Bangladesh, Myanmar, Assam, Gujarat and Kashmir. Meanwhile, Al-Qaeda’s Waziristani nerve center, Khorasan, continues to enjoy the protection of the Pakistani Taliban and the powerful Haqqani Network, which has ties to the Pakistani security services.

On May 9, 2016, one day after Zawahiri issued his latest call for unity among the jihadi groups fighting in Syria, Al-Qaeda posted a second audio message from Hamza. Entitled “Jerusalem Is but a Bride Whose Dowry Is Our Blood,” the statement reiterated Zawahiri’s plea for unity and urged jihadis to think of the Syrian conflict as a springboard to the “liberation” of the Palestinian territories. “The road to liberating Palestine,” he said, “is today much shorter compared to before the blessed Syrian revolution.” And as in his previous message, he encouraged “lone wolf” attacks on Jews and Jewish interests around the world.

The implication was clear: Zawahiri was preparing Hamza, the sheikh’s son, to lead. And if ever Al-Qaeda wants to reunite with its own wayward progeny, Hamza embodies that chance.

The B-Movie Vampire

For 20 years, the world has been infected with a virulent disease. The name of this malady is bin Ladenism, and ISIS is merely its most recent symptom. As its impetuous behavior makes clear, the group thinks and acts exclusively in the short term. It succeeded in conquering large swathes of Iraq and Syria because, at first, nobody tried hard to stop it. Within weeks of the advent of American airstrikes, it became clear that ISIS had already reached its high-water mark. As presently conceived, it lacks a long-term future, although some of its members can no doubt look forward to long careers in terrorism.

By contrast, many powerful interests have been trying for a long time to destroy Al-Qaeda, and the group has outflanked them all. Since 9/11, it has increased its membership and its geographic reach. This stateless new Al-Qaeda possesses distinct advantages over ISIS. Its decentralized structure makes it almost impossible to pin down; like a B-movie vampire, try to drive a stake through its heart, and it transforms into a thousand bats and flies somewhere else. Contrast this with ISIS, now forced to defend its self-styled caliphate at high cost. When the world eventually summons the will to rid itself of this criminal movement, it knows where to find it. Not so with Al-Qaeda, whose subgroups stretch out in a loose band across the breadth of two continents, and whose sympathizers pepper the globe. The organization’s fanatic patience, its insistence on playing the long game, has made it far more resilient than anyone expected.

For today’s Al-Qaeda, there is little profit in antagonizing the West with spectacular terrorist attacks. Instead, its strategy for the present involves building up resources and territory in places like Syria, Yemen and North Africa while the world is distracted by the Syria conflict. When ISIS finally crumbles, however, the spotlight will return to Al-Qaeda. At that point, they will strike, and strike hard. With bin Laden’s filial heir and ideological successors firmly back in the fold, and the group’s affiliates making territorial gains in Yemen and elsewhere, Al-Qaeda once again has the means and the opportunity to attack.

Hamza is just waiting for the right time.

Ali Soufan was an FBI supervisory special agent from 1997 to 2005. He now runs the Soufan Group, a private intelligence firm. This story has been adapted from his new book, Anatomy of Terror.

***

Hamza was held under house arrest in Iran, which means, he was being protected until a recent release. Another brother, of an estimated 20-26 children, was Saad, He too was being protected by Iran until 2009 when he left for Pakistan and was killed in a drone strike. It seems the other children/siblings have not taken up the baton of al Qaeda, in fact Omar, the fourth son rejected his father completely. Omar wrote a book about his family and father. Married to a British wife, Zaina, she and Omar live in Jeddah, Saudi Arabia after escaping Iran during a plotted shopping trip. It is alleged that six other siblings remain in Iran. More details here.

Image result for hamza bin laden photos

Not too sure any of this is comforting at all regarding any part of the bin Ladin family and where they currently live….you?