DHS’s Office for Community Partnerships, Stonewalling

Release Date:
September 28, 2015  <– Note Jeh Johnson created this department

DHS: Violent extremism – that which is inspired by foreign terrorist groups and that which is rooted in a range of domestic-based radical ideologies – pose a persistent and unpredictable threat to our homeland. Countering violent extremism has become a key focus of DHS’s work to secure the homeland. Last year I appointed a Department-wide coordinator for our efforts to counter violent extremism. As Secretary of Homeland Security, I am also personally committed to this mission, having traveled to Boston, Chicago, Columbus, Houston, Los Angeles, Minneapolis, New York City, northern Virginia and suburban Maryland to meet with community leaders as part of this effort. We heard many strongly-held views, generated conversations, and built some bridges.

It is now time to take our efforts to the next level.

Today I announce the creation of the DHS Office for Community Partnerships. This Office will be dedicated to the mission of countering violent extremism, but its ultimate mission is as its name suggests – community partnerships. My charge to this Office, to be set forth in a more detailed plan, is to continue to build relationships and promote trust, and, in addition, find innovative ways to support communities that seek to discourage violent extremism and undercut terrorist narratives. More here.

Problem? Either DHS was told to hide documents, not cooperate, there is collusion or the Obama White House applied executive privilege to the documents.

Just before Jeh Johnson left as Secretary of DHS:

For Immediate Release
Office of the Press Secretary
Contact: 202-282-8010

In 2016, Congress answered our call for federal grants, awarded and administered by the Department of Homeland Security, to support local efforts to counter violent extremism. Today, I am pleased to announce the first round of awards of these grants.

A total of 31 proposals, from various organizations in multiple communities, have been accepted to receive some part of the $10 million appropriated by Congress last year. The funding will go for activities that include intervention, developing resilience, challenging the narrative, and building capacity. The organizations approved for grants include local governments, universities, and non-profit organizations, in locations across the country such as Boston, Minneapolis, Los Angeles, Detroit, Nebraska, Houston, Illinois, New Jersey, Texas and New York City. Among the awardees are organizations devoted specifically to countering ISIL’s recruitment efforts in our homeland, and Life After Hate, an organization devoted to the rehabilitation of former neo-Nazis and other domestic extremists in this country. More here.

The lawsuit is found here.

Background:

Philadelphia – May 1, 2017 – The Middle East Forum has filed a lawsuit against the Department of Homeland Security (DHS) to secure the release of documents related to the Obama administration’s Countering Violent Extremism (CVE) grant program.

The grant program, which began last year, is intended to assist “efforts at the community level to counter violent extremist recruitment and radicalization to violence,” but MEF was concerned about U.S. Islamist groups – themselves radicals – receiving CVE funds. Indeed, grant recipients have included the Muslim Public Affairs Council (MPAC), an organization with ties to the Muslim Brotherhood and a long history of sanitizing Islamist terrorism.

On January 10, MEF filed a detailed Freedom of Information Act (FOIA) request with DHS seeking documents about the selection criteria and specific decisions in awarding CVE grants. The request indicated that the documents are mostly located at the DHS Office for Community Partnerships (OCP), headed by George Selim.

Having failed to receive even a response to its request within the 20-day period mandated by law, MEF contacted DHS. Finally, on March 23, DHS FOIA officer Ebony Livingston informed us that the request had been routed to the Federal Emergency Management System (FEMA), which found no pertinent records.

On April 26, MEF filed a lawsuit alleging that DHS violated the law by not only failing to produce the documents, but failing even to conduct a search for the documents.

The complaint, prepared by attorney Matt Hardin, a specialist in FOIA litigation, seeks injunctive relief compelling DHS “to search for and produce all records in its possession responsive to plaintiff’s FOIA request.”

“We filed a detailed FOIA request, specifying the documents we were looking for and where they likely were,” said MEF Director Gregg Roman. “DHS not only failed to produce the documents, it failed even to conduct a search and closed our case without bothering to tell us. This is not just unacceptable but illegal.”

The case has been assigned to Judge Royce C. Lamberth of the United States District Court for the District of Columbia. It bears noting that Judge Lamberth previously handled FOIA litigation concerning former Secretary of State Hillary Clinton’s emails.

“The CVE program should be canceled altogether,” said Sam Westrop, director of MEF’s Islamist Watch project. “And guidelines should be put in place to make sure that extremist groups like MPAC never receive taxpayer money to counter extremism.”

Military Prepping for Major Power Grid Hack

Image result for u.s. power grid

Military Is Ramping Up Preparation For Major U.S. Power Grid Hack

By 2020, the Pentagon hopes to be able to repair our power grid within a week of a massive attack

The U.S. Department of Defense is growing increasingly concerned about hackers taking down our power grid and crippling the nation, which is why the Pentagon has created a $77-million security plan that it hopes will be up and running by 2020.

The U.S. power grid is threatened every few days. While these physical and cyber attacks have never led to wide-scale outages, attacks are getting more sophisticated. According to a 494-page report released by the Department of Energy in January, the nation’s grid “faces imminent danger from cyber attacks.” Such a major, sweeping attack could threaten “U.S. lifeline networks, critical defense infrastructure, and much of the economy; it could also endanger the health and safety of millions of citizens.” If it were to happen today, America could be powered-down and vulnerable for weeks.

The DoD is working on an automated system to speed up recovery time to a week or less — what it calls the Rapid Attack Detection, Isolation, and Characterization (RADICS) program. DARPA, the Pentagon’s research arm, originally solicited proposals in late 2015, asking for technology that did three things. Primarily, it had to detect early warning signs and distinguish between attacks and normal outages, but it also had to pinpoint the access point of the attack and determine what malicious software was used. Finally, it must include an emergency system that can rapidly connect various power-supply centers, without any human coordination. This would allow emergency and military responders to have an ad hoc communication system in place moments after an attack.

“If a well-coordinated cyberattack on the nation’s power grid were to occur today, the time it would take to restore power would pose daunting national security challenges,” said DARPA program manager John Everett, in a statement, at the time. “Beyond the severe domestic impacts, including economic and human costs, prolonged disruption of the grid would hamper military mobilization and logistics, impairing the government’s ability to project force or pursue solutions to international crises.”

DARPA plans to spend $77 million on RADICS. Last November, SRI International announced it had received $7.3 million from the program. In December, Raython was granted $9 million. The latest addition is BAE Systems, which received $8.6 million last month to develop technology that detects and contains power-grid threats, and creates a secure emergency provisional system that restores some power and communication in the wake of an attack — what is being called a secure emergency network.

According to the military news site Defense Systems, BAE’s SEN would rely on radio, satellite, or wireless internet — whatever is available that allows the grid to continue working. The SEN would serve as a wireless connection between separate power grid stations.

While the ultimate goal of the RADICS program will be the restoration of civilian power and communications, the SEN will prioritize communication networks that would be used for defense or combat, so the U.S. government can still wage war while the rest of us are in the dark.

Image result for u.s. power grid Called the “largest interconnected machine,” the U.S. electricity grid is a complex digital and physical system crucial to life and commerce in this country. Today, it is made up of more than 7,000 power plants, 55,000 substations, 160,000 miles of high-voltage transmission lines and millions of miles of low-voltage distribution lines. This web of generators, substations and power lines is organized into three major interconnections, operated by 66 balancing authorities and 3,000 different utilities. That’s a lot of power, and many possible vulnerabilities. More here from USNews.

*** Last year from the Department of Energy:

Today’s electric grid increasingly uses “smart” devices that can be controlled remotely — letting operators manage the grid better and more efficiently. But as the electric grid becomes smarter, it also becomes more vulnerable to hackers. That’s why a new initiative underway at the National Renewable Energy Laboratory (NREL) aims to prevent hackers from gaining control of parts of the nation’s power grid, which could damage electrical equipment and cause localized power outages.

Tackling the challenge is Erfan Ibrahim and his team at NREL’s Cyber Physical Systems Security and Resilience Center. Ibrahim’s team launched an effort to build the Test Bed for Secure Distributed Grid Management. It’s a hardware system that mimics the communications, power systems, and cybersecurity layers for a utility’s power distribution system, the part of the power grid that carries power from substations to homes and businesses.

The test bed incorporates a lot of brand-new cybersecurity technologies that need to be tested in order to make the system as secure as possible. So, naturally, they tried to break it. Specifically, they tried to hack the system.

Approaching the system from three different angles, they found a single vulnerability, which was due to a misconfigured cybersecurity device. Through that one cyber vulnerability, a designated white hat hacker was able to get into the system, gain administrator rights, and launch a denial of service attack that disabled the entire testbed. That’s the type of insight the test bed is designed to provide. One of the cybersecurity firms actually refined its product after seeing how it performed on the test bed.

Jeff Sessions/FBI and MS-13

Four members of the violent, foreign MS-13 gang were convicted on federal racketeering charges, some of which involved murder.

Miguel Zelaya, 20-years-old, Luis Ordonez-Vega, 36-years-old, Jorge Sosa, 24-years-old and William Gavidia, 23-years-old, were all convicted on a count of conspiracy to commit racketeering, according to the Charlotte Observer:

Zelaya, who also goes by “Most Wanted” and “Ne Ne” is a member of MS-13’s “Coronados Little Cycos Salvatrucha” clique. On Dec. 18, 2013, he shot and killed Jose Orlando Ibarra, an associate of The Latin Kings, a rival gang, the release said.

Ordonez-Vega, also known as “Big Boy,” is a member of the Brentwood Locos Salvatrucha” clique, according to the news release. On June 6, 2013, Ordonez-Vega shot and killed Noel Navarro Hernandez in a strip mall parking lot in Charlotte, believing the victim was a member of a rival gang.

Sosa, who goes by “Koki” and “Loco” is a member of the “Charlotte Locotes Salvatrucha” clique. Prosecutors say he’s been involved in multiple gang-related crimes. In Feb. 2008, he flashed MS-13 gang signs at a rival gang member’s mother and pointed a gun at her while they were stopped in traffic. In June, 2013, he was involved in a gang-related shooting where he and another person followed victims in a neighborhood in Charlotte and opened fire with a high-caliber rifle, the release said.

All of the gang members are either immigrants or the children of immigrants in the U.S. and they are also facing state charges for their crimes.

“Today’s guilty verdicts underscore that even though gang membership may in some ways ‘protect’ gangsters from outsiders, it certainly won’t protect them from the vast reach of the US. Attorney’s Office and our law enforcement partners,” U.S. Attorney for the Western District of North Carolina Jill Westmoreland Rose said in a statement.

The MS-13 gang members were four of 37 who were charged with racketeering after an investigation into the criminal activity by the Organized Crime Drug Enforcement Task Force. Thirty of the other gang members charged with racketeering are either awaiting sentencing or have pleaded guilty to the charges.

According to the U.S. District Attorney, Ordonez-Vega and Zelaya were convicted on charges to murder in aid of racketeering. Those charges are connected to two separate murders. Meanwhile, Sosa was convicted for attempted murder in the aid of racketeering.

***

Image result for ms-13  InSightCrime

In 2015 the U.S. Treasury Department froze the assets of three members of the gang who were funneling funds back to higher-ups in El Salvador from prison. These actions were an attempt “disrupt” MS-13’s financial network by cutting off profits from illegal activities in the United States, the Treasury Department said. In 2012 the Obama administration designated MS-13 a transnational crime organization and implemented sanctions against six members in 2013.

While the U.S. government attempts to target MS-13’s earnings, targeting its culture is proving more difficult. The fierce loyalty among members is unique, Ron Hosko, former assistant director of the FBI’s Criminal Investigative Division, told FOX Business.

“They’re very cohesive and often directed by imprisoned bosses in El Salvador to recruit and expand in American communities. That tends to mean there’s an aggressive internal enforcement mechanism which equates to internal discipline involving physical violence and murder for disrespect or betrayal,” he said.

The FBI in El Salvador Because of MS-13:

CNN Reported Dossier Basis for Trump Surveillance, But…

The FBI last year used a dossier of allegations of Russian ties to Donald Trump’s campaign as part of the justification to win approval to secretly monitor a Trump associate, according to US officials briefed on the investigation.

The dossier has also been cited by FBI Director James Comey in some of his briefings to members of Congress in recent weeks, as one of the sources of information the bureau has used to bolster its investigation, according to US officials briefed on the probe.
This includes approval from the secret court that oversees the Foreign Intelligence Surveillance Act (FISA) to monitor the communications of Carter Page, two of the officials said. Last year, Page was identified by the Trump campaign as an adviser on national security. More here from CNN.
Okay, so everyone remains angry with James Comey right? Okay, well hold on….this could get complicated. We cant dismiss the notion that Obama and Susan Rice had a valid reason for their surveillance
actions, at least some as the below case was provided to the White House.
Enter Evigeniy Mikhailovich Bogachev.
Image result for evgeniy mikhailovich bogachev

U.S. v Evgeniy Mikhailovich Bogachev et al by Brian Ries on Scribd

Bogachev was a case from 2014 investigated by CrowdStrike and then later offered help to the FBI office in Omaha and later the FBI office in Pittsburgh finally after countless months, ran a global cyber operation and succeeded in stopping international bank thefts in the millions of dollars. Many Russian immigrants located in Brighton Beach were recruited to be mules going to domestic banks, opening accounts and later withdrawing funds, cleaning all traces of the stolen millions. It should be noted that CrowdStrike was the same firm the Hillary campaign hired to investigate intrusions.

Image result for evgeniy mikhailovich bogachev

Now it gets even more interesting.

The matter of Bogachev with his named operation of ‘Business Club’ and his global cyber operatives hacking with sophisticated bots, malware and remote servers came to the attention of the Russian Federation. They liked what the Bogachev Zeus operation had the ability to do. So, top Kremlin officials allowed the operation to continue without prosecution if they would work to gather intelligence on the global reaction to Putin annexing Crimea and moving in on Ukraine.

All of this came to the attention also of U.S. based private cyber professional where they studied the code, the IP addresses, the servers, the patterns, names and other common cyber traits. The DNC hack attributions are a dovetail to the ‘Business Club’ operation due to style, coding, networks, language and server locations.

In 2015, the Obama State Department issued sanctions and a $3 million dollar bounty on Bogachev who operated with the alias of ‘Slavik’. Russia of course is not only not cooperating but refuses to admit any such action was real and the evidence is not vetted. This is a usual response by top Russian officials.

An estimated $100 million was stolen via cyber operations by Slavik and computers infected with various versions of Zeus still exist while the FBI was able to seized all those known to their sting operation.

The FBI described the cyber sting operation as hand to hand combat with Bogachev and his operation on the Zeus case was deemed successful. It is unknown at this time who and where is he still operating. The summary of this operation was taken from the full article published by ‘Wired’ under the title ‘The Hunt for Russia’s Most Notorious Hacker’

Late last year, the DHS released a joint statement which read in part:

This activity by Russian intelligence services is part of a decade-long campaign of cyber-enabled operations directed at the U.S. Government and its citizens. These cyber operations have included spearphishing, campaigns targeting government organizations, critical infrastructure, think tanks, universities, political organizations, and corporations; theft of information from these organizations; and the recent public release of some of this stolen information.  In other countries, Russian intelligence services have also undertaken damaging and disruptive cyber-attacks, including on critical infrastructure, in some cases masquerading as third parties or hiding behind false online personas designed to cause victim to misattribute the source of the attack.  The Joint Analysis Report provides technical indicators related to many of these operations, recommended mitigations and information on how to report such incidents to the U.S. Government.

A great deal of analysis and forensic information related to Russian government activity has been published by a wide range of security companies.  The U.S. Government can confirm that the Russian government, including Russia’s civilian and military intelligence services, conducted many of the activities generally described by a number of these security companies.  The Joint Analysis Report recognizes the excellent work undertaken by security companies and private sector network owners and operators, and provides new indicators of compromise and malicious infrastructure identified during the course of investigations and incident response.  The U.S. Government seeks to arm network defenders with the tools they need to identify,, detect and disrupt Russian malicious cyber activity that is targeting our country’s and our allies’ networks.

 

Putin’s Think Tank Crafted 2016 U.S. election Interference – documents

Image result for Russian Institute for Strategic Studies  Image result for Russian Institute for Strategic Studies

Reuters: A Russian government think tank controlled by Vladimir Putin developed a plan to swing the 2016 U.S. presidential election to Donald Trump and undermine voters’ faith in the American electoral system, three current and four former U.S. officials told Reuters.

They described two confidential documents from the think tank as providing the framework and rationale for what U.S. intelligence agencies have concluded was an intensive effort by Russia to interfere with the Nov. 8 election. U.S. intelligence officials acquired the documents, which were prepared by the Moscow-based Russian Institute for Strategic Studies [en.riss.ru/], after the election.

The institute is run by retired senior Russian foreign intelligence officials appointed by Putin’s office.

The first Russian institute document was a strategy paper written last June that circulated at the highest levels of the Russian government but was not addressed to any specific individuals.

It recommended the Kremlin launch a propaganda campaign on social media and Russian state-backed global news outlets to encourage U.S. voters to elect a president who would take a softer line toward Russia than the administration of then-President Barack Obama, the seven officials said.

A second institute document, drafted in October and distributed in the same way, warned that Democratic presidential candidate Hillary Clinton was likely to win the election. For that reason, it argued, it was better for Russia to end its pro-Trump propaganda and instead intensify its messaging about voter fraud to undermine the U.S. electoral system’s legitimacy and damage Clinton’s reputation in an effort to undermine her presidency, the seven officials said.

The current and former U.S. officials spoke on the condition of anonymity due to the Russian documents’ classified status. They declined to discuss how the United States obtained them. U.S. intelligence agencies also declined to comment on them.

Putin has denied interfering in the U.S. election. Putin’s spokesman and the Russian institute did not respond to requests for comment.

The documents were central to the Obama administration’s conclusion that Russia mounted a “fake news” campaign and launched cyber attacks against Democratic Party groups and Clinton’s campaign, the current and former officials said.

“Putin had the objective in mind all along, and he asked the institute to draw him a road map,” said one of the sources, a former senior U.S. intelligence official.

Trump has said Russia’s activities had no impact on the outcome of the race. Ongoing congressional and FBI investigations into Russian interference have so far produced no public evidence that Trump associates colluded with the Russian effort to change the outcome of the election.

Four of the officials said the approach outlined in the June strategy paper was a broadening of an effort the Putin administration launched in March 2016. That month the Kremlin instructed state-backed media outlets, including international platforms Russia Today and Sputnik news agency, to start producing positive reports on Trump’s quest for the U.S. presidency, the officials said.

Russia Today did not respond to a request for comment. A spokesperson for Sputnik dismissed the assertions by the U.S. officials that it participated in a Kremlin campaign as an “absolute pack of lies.” “And by the way, it’s not the first pack of lies we’re hearing from ‘sources in U.S. official circles’,” the spokesperson said in an email.

PRO-KREMLIN BLOGGERS

Russia Today and Sputnik published anti-Clinton stories while pro-Kremlin bloggers prepared a Twitter campaign calling into question the fairness of an anticipated Clinton victory, according to a report by U.S. intelligence agencies on Russian interference in the election made public in January. [bit.ly/2kMiKSA]

Russia Today’s most popular Clinton video – “How 100% of the 2015 Clintons’ ‘charity’ went to … themselves” – accumulated 9 millions views on social media, according to the January report. [bit.ly/2os8wIt]

The report said Russia Today and Sputnik “consistently cast president elect-Trump as the target of unfair coverage from traditional media outlets.”

The report said the agencies did not assess whether Moscow’s effort had swung the outcome of the race in Trump’s favor, because American intelligence agencies do not “analyze U.S. political processes or U.S. public opinion.” [bit.ly/2kMiKSA]

CYBER ATTACKS

Neither of the Russian institute documents mentioned the release of hacked Democratic Party emails to interfere with the U.S. election, according to four of the officials. The officials said the hacking was a covert intelligence operation run separately out of the Kremlin.

The overt propaganda and covert hacking efforts reinforced each other, according to the officials. Both Russia Today and Sputnik heavily promoted the release of the hacked Democratic Party emails, which often contained embarrassing details.

Five of the U.S. officials described the institute as the Kremlin’s in-house foreign policy think tank.

The institute’s director when the documents were written, Leonid Reshetnikov, rose to the rank of lieutenant general during a 33-year-career in Russia’s foreign intelligence service, according to the institute’s website [bit.ly/2oVhiCF]. After Reshetnikov retired from the institute in January, Putin named as his replacement Mikhail Fradkov. The institute says he served as the director of Russia’s foreign intelligence service from 2007 to 2016. [bit.ly/2os4tvz]

Reuters was unable to determine if either man was directly involved in the drafting of the documents. Reshetnikov’s office referred questions to the Russian institute.

On its website, the Russian institute describes itself as providing “expert appraisals,” “recommendations,” and “analytical materials” to the Russian president’s office, cabinet, National Security Council, ministries and parliament. [bit.ly/2pCBGpR]

On Jan. 31, the websites of Putin’s office [bit.ly/2os9wMr] and the institute [bit.ly/2oLn9Kd] posted a picture and transcript of Reshetnikov and his successor Fradkov meeting with Putin in the Kremlin. Putin thanked Reshetnikov for his service and told Fradkov he wanted the institute to provide objective information and analysis.

“We did our best for nearly eight years to implement your foreign policy concept,” Reshetnikov told Putin. “The policy of Russia and the policy of the President of Russia have been the cornerstone of our operation.”

(Reporting by Ned Parker and Jonathan Landay, additional reporting by Warren Strobel and Arshad Mohammed; Editing by David Rohde and Ross Colvin)

*** In part:

The wide range of scientific work is ensured by the structural subdivision of the

RISS into the Research Center of CIS countries, Center for Asia and the Middle

East Research, the Center for Euro-Atlantic Studies (‘geographical departments’),

Center for Economic Research, Centre for Defense Studies as well as the Humanitarian

Research Center (functional departments).8 The latter represents a

new department, introduced almost simultaneously with the Presidential Decree

of 2009 and it is preoccupied with “the contentious issues of the foreign relations

history and the role of the religious factor.”9 Its introduction has added a new task

of “counteracting the falsification of history in the post-Soviet space”10 to RISS

scientific activities which are determined by the need of the Russian government

to provide strategic interests in the post-Soviet space. Here, there is a serious element

of propaganda for Russian state interests. Upon the whole, we can conclude

that the Presidential Decree of 2009 has turned the RISS into a useful tool providing

abundant data and research for an appropriate “articulation of the strategic

directions of the state policy in the sphere of national security.”  Read more here.