An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation
Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.
Category Archives: Department of Homeland Security
Washington (CNN)Rep. Keith Ellison, the first Muslim elected to Congress and one of only two members in the Capitol, said Wednesday that in the wake of anti-Muslim rhetoric after the Paris attacks, Muslims are feeling a need to assert even more how patriotic they are.
The Minnesota Democrat said when he hears other lawmakers suggesting Christian Syrian refugees should be allowed into the country but Muslim Syrian refugees should not, it reminds him that the First Amendment to the Constitution establishes freedom of religion. More here.
Congressman Ellison attends the Masjid An-Nur mosque in Minneapolis and his visit to Mogadishu fulfilled a request from his constituents with ties to Somalia. Minnesota has one of the largest populations of Somali-Americans in the U.S. April of 2015, six Somali-Americans from Minneapolis were arrested for attempting to travel to Syria and link up with the Islamic State, also referred to as ISIS or ISIL. All were young men between the ages of 19 and 21. Zacharia Yusuf Abdurahman, 19, Adnan Farah, 19, Hanad Mustafe Musse, 19, and Guled Ali Omar, 20, were arrested in Minneapolis while Abdirahman Yasin Daud, 21, and Mohamed Abdihamid Farah, 21, were arrested trying to buy fake passports in San Diego. The criminal complaint is here.
Who is Keith Ellison? Left-wing congressman with past ties to Nation of Islam wants DNC job
FNC: In an attempt to stave off a civil war in the ranks, Democratic leaders are scrambling to unite behind a candidate for the party’s chairmanship – and have landed for now on a Louis Farrakhan-linked congressman who once called for Dick Cheney’s impeachment and compared George W. Bush to Hitler.
Rep. Keith Ellison, D-Minn., the first Muslim elected to Congress and a leading progressive among House Democrats, already has picked up the backing of both the Democratic Party’s left – with support from Sens. Bernie Sanders and Elizabeth Warren – and its establishment, receiving endorsements from Senate leaders Chuck Schumer, D-N.Y., and retiring Harry Reid, D-Nev.
Ellison is firmly on the party’s left – he has a fax line in his office, but his website says they will not respond to faxes “for environmental reasons.” He backed Bernie Sanders during the primaries, even introducing him at the convention.
“Bernie sparked the beginning of a revolution y’all,” Ellison said at his address during the Democratic National Convention in Philadelphia. “Together we call for climate justice, racial justice, wage justice.”
Sanders has given strong backing to Ellison in return, sending out a fundraising email saying an Ellison-led Democratic Party that will stand up to Wall Street greed and corporate America is “the Democratic Party we need.”
Ellison is expected to formally announce his bid Monday. On Sunday, Ellison hinted he would run and said the party needs to focus on middle- and working-class Americans and less on donors.
“I love the donors and we thank them, but it has to be that the guys in the barber shop, the lady at the diner, the folks who are worried about whether that plant is going to close, they’ve got to be our focus,” he said on ABC’s “This Week.”
Some strategists feel this economic message is exactly what the party needs to reach out to white working-class voters who pulled the lever for Trump.
“You can’t stand up for middle-class families if you are so closely associated with Wall Street and I think that was the issue with Clinton, her ties to Goldman Sachs, and I think that’s shown by how much money we raised from Wall Street,” Brad Bannon, Democratic strategist and CEO of Bannon Communications Research, told FoxNews.com. “We have to become more oriented to working-class families if we’re going to survive and prosper, because we blew the industrial Midwest.”
However, Ellison’s past associations and comments may trouble more moderate voters.
Ellison’s 2006 run for his seat was plunged into controversy after the conservative PowerLineBlog.com found he had once identified with Farrakhan’s Nation of Islam and in 1998 was referring to himself as Keith X Ellison and Keith Ellison-Muhammed.
The Washington Post reported that Ellison had defended Farrakhan against accusations of anti-Semitism in 1989 and in 1990 had called affirmative action a “sneaky” form of compensation for slavery, calling instead for reparations.
When the controversy erupted in 2006, Ellison acknowledged he had worked with the group, but only for 18 months to help organize Farrakhan’s 1995 Million Man March. He distanced himself from both Farrakhan and the Nation of Islam, and said he hadn’t scruitinized the group’s anti-Semitic positions appropriately.
“They were and are anti-Semitic, and I should have come to that conclusion earlier than I did,” he said.
Yet it isn’t the only controversy for Ellison. In 2007, Ellison made a comparison between Bush and 9/11 to Hitler and the 1933 Reichstag fire.
“9/11 is the juggernaut in American history and it allows… it’s almost like, you know, the Reichstag fire,” Ellison said, according to a Daily Telegraph report at the time. “After the Reichstag was burned, they blamed the Communists for it, and it put the leader of that country [Hitler] in a position where he could basically have authority to do whatever he wanted.”
He later clarified that he did indeed believe that Usama bin Laden was responsible for the terror attacks. But it wasn’t the only controversy for Ellison in 2007, as he also backed a movement to impeach then-Vice President Dick Cheney over his alleged fabrication of intelligence about weapons of mass destruction in Iraq.
However, Bannon believes that Ellison’s Muslim heritage could be a boost not a burden, especially in light of Trump’s elevation Sunday of controversial Breitbart boss Steve Bannon to chief strategist.
“[Steve] Bannon propagates Muslim conspiracy theories,” Brad Bannon, who is not related to the Breitbart head, said. “Ellison is the perfect guy to counter that. Ellison is exactly what we need to prove we aren’t the party of hate and racism.”
Ellison would have competition for the job. Former DNC chairman and ex-presidential candidate Howard Dean has put his name in the running. Former Maryland Gov. Martin O’Malle
Daily, I am asked if this is true or that is true….admittedly it is getting harder each day to vet stories for accuracy and to dissect them for what is accurate and other parts being flatly false. That is what trolls do, mix accuracy with falsehoods so the reader assumes it is all factual….ah not so much.
So, what sites to do visit often and have come to rely on them? InfoWars or Zerohedge? Well what about people that are curiously appearing to be friends with you on Facebook or new followers on Twitter? Take caution and read carefully below, you reliance on truth and accuracy just got harder. Even some in the media are being punked.
Trump isn’t the end of Russia’s information war against America. They are just getting started.
WotR: In spring 2014, a funny story crossed our social media feeds. A petition on whitehouse.gov called for“sending Alaska back to Russia,” and it quickly amassed tens of thousands of signatures. The media ran a number of amused stories on the event, and it was quickly forgotten.
The petition seemed odd to us, and so we looked at which accounts were promoting it on social media. We discovered that thousands of Russian-language bots had been repetitively tweeting links to the petition for weeks before it caught journalists’ attention.
Those were the days. Now, instead of pranking petitions, Russian influence networks online are interfering with the 2016 U.S. election. Many people, especially Hillary Clinton supporters, believe that Russia is actively trying to put Donald Trump in the White House.
But most observers are missing the point. Russia is helping Trump’s campaign, yes, but it is not doing so solely or even necessarily with the goal of placing him in the Oval Office. Rather, these efforts seek to produce a divided electorate and a president with no clear mandate to govern. The ultimate objective is to diminish and tarnish American democracy. Unfortunately, that effort is going very well indeed.
Russia’s desire to sow distrust in the American system of government is not new. It’s a goal Moscow has pursued since the beginning of the Cold War. Its strategy is not new, either. Soviet-era “active measures” called for using the “force of politics” rather than the “politics of force”to erode American democracy from within. What is new is the methods Russia uses to achieve these objectives.
We have been tracking Russian online information operations since 2014, when our interest was piqued by strange activity we observed studying online dimensions of jihadism and the Syrian civil war. When experts published content criticizing the Russian-supported Bashar al Assad regime, organized hordes of trolls would appear to attack the authors on Twitter and Facebook. Examining the troll social networks revealed dozens of accounts presenting themselves as attractive young women eager to talk politics with Americans, including some working in the national security sector. These “honeypot” social media accounts were linked to other accounts used by the Syrian Electronic Army hacker operation. All three elements were working together: the trolls to sow doubt, the honeypots to win trust, and the hackers (we believe) to exploit clicks on dubious links sent out by the first two.
The Syrian network did not stand alone. Beyond it lurked closely interconnected networks tied to Syria’s allies, Iran and Russia. Many of these networks were aimed at U.S. political dissenters and domestic extremist movements, including militia groups, white nationalists, and anarchists.
Today, that network is still hard at work, running at peak capacity to destroy Americans’ confidence in their system of government. We’ve monitored more than 7,000 social media accounts over the last 30 months and at times engaged directly with them. Trump isn’t the end of Russia’s social media and hacking campaign against America, but merely the beginning. Here is what we’ve learned.
The Russian Social Media Approach: Soviet Union’s “Active Measures” On Steroids
The United States and its European allies have always placed state-to-state relations at the forefront of their international strategies. The Soviet system’s effort to undermine those relations during the Cold War, updated now by modern Russia, were known as “active measures.”
It was often very difficult for Westerners to comprehend this fundamentally different Soviet approach to international relations and, as a result, the centrality to the Soviets (now Russians) of active measures operations was gravely underappreciated.
Active measures employ a three-pronged approach that attempts to shape foreign policy by directing influence in the following ways: state-to-people, people-to-people, and state-to-state. More often than not, active measures sidestep traditional diplomacy and normal state-to-state relationships. The Russian government today employs the state-to-people and people-to-people approaches on social media and the internet, directly engaging U.S. and European audiences ripe for an anti-American message, including the alt-right and more traditional right-wing and fascist parties. It also targets left-wing audiences, but currently at a lower tempo.
Until recently, Western governments focused on state-to-state negotiations with Putin’s regime largely missed Russian state-to-people social media approaches. Russia’s social media campaigns seek five complementary objectives to strengthen Russia’s position over Western democracies:
Undermine citizen confidence in democratic governance;
Foment and exacerbate divisive political fractures;
Erode trust between citizens and elected officials and democratic institutions;
Popularize Russian policy agendas within foreign populations;
Create general distrust or confusion over information sources by blurring the lines between fact and fiction
In sum, these influence efforts weaken Russia’s enemies without the use of force. Russian social media propaganda pushes four general themes to advance Moscow’s influence objectives and connect with foreign populations they target.
Political messages are designed to tarnish democratic leaders or undermine institutions. Examples include allegations of voter fraud, election rigging, and political corruption. Leaders can be specifically targeted, for instance by promoting unsubstantiated claims about Hillary Clinton’s health, or more obviously by leaking hacked emails.
Financial propaganda weakens citizen and investor confidence in foreign markets and posits the failure of capitalist economies. Stoking fears over the national debt, attacking institutions such as the Federal Reserve, and attempts to discredit Western financial experts and business leaders are all part of this arsenal.
In one example from August, Disneyland Paris was the site of a reported bomb scare. Social media accounts on Twitter reported that the park had been evacuated, and several news outlets — including Russian propaganda stations RT and Sputnik — published alarming stories based on the tweets, which escalated in hysteria as the afternoon stretched on. In fact, the park had not been evacuated. But that didn’t stop Disney’s stock from taking a temporary hit. This fluctuation could be exploited by someone who knew the fake scare was coming, but we do not have access to the data that would allow us to know whether this happened.
Finally, wide-ranging conspiracy theories promote fear of global calamity while questioning the expertise of anyone who might calm those fears. Russian propaganda operations since 2014 have stoked fears of martial law in the United States, for instance, by promoting chemtrails and Jade Helm conspiracy theories. More recently, Moscow turned to stoking fears of nuclear war between the United States and Russia.
For the Kremlin, this is not just focused on the outside world. Russian news organizations bombard Russian citizens with the same combination of content. Steve Rosenberg, a BBC News correspondent in Moscow, filmed the Russian domestic equivalent of this approach on November 1, showing Russian language news headlines inciting fears such as impending nuclear war, a U.S.-Russia confrontation in Syria, and the potential for an assassination of Donald Trump.
The Confluence of Information and Cyberspace
Russian active measures use a blend of overt and covert channels to distribute political, financial, social, and calamitous messages (see above). During the Soviet era, “white” active measures were overt information outlets directly attributable to the Central Committee of the Communist Party of the Soviet Union. Today, RT and Sputnik push Kremlin-approved English-language news on television and the Internet. These outlets broadcast a mix of true information (the vast majority of content), manipulated or skewed stories, and strategically chosen falsehoods. RT’s slogan, “Question More,” aptly fits their reporting style — seeding ideas of conspiracy or wrongdoing without actually proving anything.
This “white” content provides ammunition for “gray” measures, which employ less overt outlets controlled by Russia, as well as so-called useful idiots that regurgitate Russian themes and “facts” without necessarily taking direction from Russia or collaborating in a fully informed manner.
During the Cold War, gray measures used semi-covert Communist parties, friendship societies, and non-governmental organizations to engage in party-to-party and people-to-people campaigns. Today, gray measures on social media include conspiracy websites, data dump websites, and seemingly credible news aggregators that amplify disinformation and misinformation.
Conspiracy sites include outlets such as InfoWars and Zero Hedge, along with a host of lesser-known sites that repeat and repackage the same basic content for both right- and left-wing consumers. Sometimes, these intermediaries will post the same stories on sites with opposite political orientations.
Data dump websites, such as Wikileaks and DC Leaks, overtly claim to be exposing corruption and promoting transparency by uploading private information stolen during hacks. But the timing and targets of their efforts help guide pro-Russian themes and shape messages by publishing compromising information on selected adversaries.
The people who run these sites do not necessarily know they are participants in Russian agitprop, or at least it is very difficult to prove conclusively that they do. Some sites likely receive direct financial or operational backing, while others may be paid only with juicy information.
Sincere conspiracy theorists can get vacuumed up into the social networks that promote this material. In at least one case, a site described by its creator as parody was thoroughly adopted by Russian influence operators online and turned into an unironic component of their promoted content stream, at least as far as the network’s targeted “news” consumers are concerned.
A small army of social media operatives — a mix of Russian-controlled accounts, useful idiots, and innocent bystanders— are deployed to promote all of this material to unknowing audiences. Some of these are real people, others are bots, and some present themselves as innocent news aggregators, providing “breaking news alerts” to happenings worldwide or in specific cities. The latter group is a key tool for moving misinformation and disinformation from primarily Russian-influenced circles into the general social media population. We saw this phenomenon at play in recent reports of a second military coup in Turkey and unsubstantiated reports of an active shooter that led to the shutdown of JFK Airport. Some news aggregators may be directly controlled by Russia, while other aggregators that use algorithmic collection may be the victims of manipulation.
“Black” active measures are now easier to execute than they were for the Soviets. During the Cold War, according to the 1992 USIA report, these included:
… the use of agents of influence, forgeries, covert media placements and controlled media to covertly introduce carefully crafted arguments, information, disinformation, and slogans into the discourse in government, media, religious, business, economic, and public arenas in targeted countries.
Black active measures create both risks and costs. Agents deployed into the West must avoid detection or risk state-to-state consequences. The KGB’s Cold War efforts to keep these operations secret bore significant financial costs while producing little quantifiable benefit. Stories were difficult to place in mainstream media outlets, and the slow process made it challenging to create momentum behind any one theme.
On social media, this process is far easier, more effective, and relatively difficult to attribute. Without stepping foot in America, Russia’s coordinated hackers, honeypots, and hecklers influence Americans through people-to-people engagement.
The most notorious Russian-linked hacker, using the handle Guccifer2.0, targets current and former U.S. government officials, American security experts, and media personalities by seeking access to their private communications and records. Former Secretary of State Colin Powell and Clinton campaign chairman John Podesta provide two current examples, but there will be many more to come. Today, Guccifer2.0 posts threats of election meddling this coming Tuesday.
Guccifer 2.0 Warning on Election Posted to Social Media
In addition to phishing and cracking attacks, these hackers are aided by honeypots, a Cold War term of art referring to an espionage operative who sexually seduced or compromised targets. Today’s honeypots may include a component of sexual appeal or attraction, but they just as often appear to be people who share a target’s political views, obscure personal hobbies, or issues related to family history. Through direct messaging or email conversations, honeypots seek to engage the target in conversations seemingly unrelated to national security or political influence.
These honeypots often appear as friends on social media sites, sending direct messages to their targets to lower their defenses through social engineering. After winning trust, honeypots have been observed taking part in a range of behaviors, including sharing content from white and gray active measures websites, attempting to compromise the target with sexual exchanges, and most perilously, inducing targets to click on malicious links or download attachments infected with malware.
One of us directly experienced how social media direct messages from hackers or influencers seek to compromise or sway a target by using social engineering to build a rapport. Operators may engage the target’s friends or acquaintances, drawing them into conversations to encourage trust. Once conversations are started, an agent of influence will be introduced into the group and will subsequently post on Russian themes from grey outlets or introduce malicious links.
When targets click on malicious links, Fancy Bear and Cozy Bear extract personal information from public officials, media personalities, and American experts and selectively dump the content obtained at opportune times. The goal is to increase popular mistrust of political leaders and people with expertise or influence in specific circles of interest to Russia, such as national security. In some cases, experts criticizing Russia have had their computers mysteriously compromised by destructive malware and their research destroyed.
Online hecklers, commonly referred to as trolls, energize Russia’s active measures. Ringleader accounts designed to look like real people push organized harassment — including threats of violence — designed to discredit or silence people who wield influence in targeted realms, such as foreign policy or the Syrian civil war. Once the organized hecklers select a target, a variety of volunteers will join in, often out of simple antisocial tendencies. Sometimes, they join in as a result of the target’s gender, religion, or ethnic background, with anti-Semitic and misogynistic trolling particularly prevalent at the moment. Our family members and colleagues have been targeted and trolled in this manner via Facebook and other social media.
Hecklers and honeypots can also overlap. For instance, we identified hundreds of accounts of ostensibly American anti-government extremists that are actually linked to Russian influence operations. These accounts create noise and fear, but may also draw actual anti-government extremists into compromising situations. Based on our observations, the latter effort has not been widely successful so far among anti-government extremists, who tend to stay in their own social networks and are less likely to interact with Russian influence accounts, but our analysis points to greater overlap with networks involving American white nationalists.
Russia’s honeypots, hecklers, and hackers have run amok for at least two years, achieving unprecedented success in poisoning America’s body politic and creating deep dissent, including a rise in violent extremist activity and visibility. Posting hundreds of times a day on social media, thousands of Russian bots and human influence operators pump massive amounts of disinformation and harassment into public discourse.
This “computational propaganda,” a term coined by Philip Howard, has the cumulative effect of creating Clayton A. Davis at Indiana University calls a“majority illusion, where many people appear to believe something ….which makes that thing more credible.” The net result is an American information environment where citizens and even subject-matter experts are hard-pressed to distinguish fact from fiction. They are unsure who to trust and thus more willing to believe anything that supports their personal biases and preferences.
The United States disbanded the U.S. Information Agency after the Cold War and currently fields no apparatus to detect and mitigate Russia’s social media influence campaign. As seen in America’s disjointed counter narratives against the Islamic State, efforts to create any kind of U.S. information strategy are plagued by disparate and uncoordinated efforts strewn among many military, diplomatic, and intelligence commands. American cyber operations and hacking reside separately with the National Security Agency. Russia, on the other hand, seamlessly integrates the two efforts to devastating effect.
After Election Day: What to do about Russia’s Active Measures?
The most overwhelming element of Russia’s online active measures over the last year relate to the presidential campaign of Donald Trump. Russian promotion of Trump not only plagues Clinton, but likely helped sideline other GOP candidates in early 2016 with a more traditional anti-Russia view of foreign policy. It is impossible to assess whether Donald Trump is even fully aware of these efforts, let alone complicit. Setting aside that question for a moment, some readers will immediately ask how we are so sure all this activity goes back to Russia?
There are a number of technical indicators, most tellingly the synchronization of messaging and disinformation with “white” outlets such as RT and Sputnik, as well as the shocking consistency of messaging through specific social networks we have identified.
Dmitri Alperovich of the cyber-security firm Crowdstrike first attributed the DNC hacks to Russia. He explained in a recent War on the Rocks podcast:
The important thing about attribution…is that it’s not that much different from the physical world. Just like someone can plan a perfect bank heist and get away with it, you can do that in the cyber-domain, but you can almost never actually execute a series of bank heists over the course of many years and get away with it. In fact, the probability of you not getting caught is miniscule. And the same thing is true in cyber-space because eventually you make mistakes. Eventually you repeat tradecraft. It’s hard to sort of hide the targets you’re going after…
There are other, less subtle indications as well, for instance, a notification from Google: “We believe we detected government backed attackers trying to steal your password. This happens to less than 0.1% of all Gmail users.” When one of us receives these messages, we feel confident we’re on the right trail.
The Joint Worldwide Intelligence Communications System, is a Top Secret/SCI network run by the United States’ Defense Intelligence Agency and used across the Department of Defense, Department of State, Department of Homeland Security and Department of Justice to transmit especially sensitive classified information.
FNC/EXCLUSIVE: Two State Department contractors, with decades of experience protecting the United States’ most sensitive secrets, are speaking out for the first time about Hillary Clinton’s tenure as secretary of state and how the rules for government security clearance holders did not seem to apply to Clinton and her team.
“The State Department was her oyster and it was great for the [Clinton] foundation and great for the Clintons to be able to have such a great position,” Dave Whitnah told Fox News.
Whitnah said he worked within the State Department’s Office of Security Technology which is responsible for cameras and alarms and sweeping for bugs. Whitnah said everyone understood the secretary of state is the primary target of foreign intelligence services.
“The number one person would be the secretary of state and their communications,” Whitnah explained. “You can think of the Iran negotiations, nuclear negotiation, negotiations with Russia, talks with Russia. You know, anything to do with foreign policy.”
Whitnah emphasized that tens of millions of dollars were spent on technical security for Clinton that apparently was disregarded as her team traveled around the world on official U.S. government business.
“It was unfathomable that [her BlackBerry] would be used for anything other than just unclassified communication,” Whitnah said. Clinton’s devices were not certified as secure by the State Department. As for her use of a non-secure BlackBerry, Whitnah stressed that email can be intercepted and, “Even if turned off, it’s still a listening device so that’s why you take out the batteries.”
As Clinton was sworn in as secretary in January 2009, government contractor Amel Smith said he was also working at the department and: “State Department rules are clear. I helped write those rules.”
Smith says his 30 years of experience includes serving in the U.S. Army’s 82nd Airborne, before becoming a counter-intelligence and counter-espionage investigator at State tracking down breaches of classified materials. He reviewed some of the FBI witness interviews from the Clinton email investigation with Fox News, and questioned those who claimed not to have the proper training in handling sensitive information.
“I hear things like, well, I forgot, um, I don’t know that I was trained, I don’t know this. You know — every single person that had access to that information when it was sent is in violation,” Smith emphasized.
The FBI witness interviews also show secure facilities for classified information — known as SCIFs — were specially built for Clinton in her in Washington, D.C., and Chappaqua, N.Y., homes. Doors that were supposed to be locked were left open.
“If you’ve got an uncleared person in there, it’s automatically a compromise,” Smith said.
Another FBI interview summary said there were personally owned desktop computers in the secure facilities at Clinton’s homes, yet she told the FBI that she did not have a computer of any kind in these facilities.
“If somebody said they’re there, then they probably were there, and you know, the reason you would deny it was because you probably didn’t have approval,” Smith said.
Having unapproved computers in a SCIF would automatically call for a security investigation.
Asked for his reaction to Clinton’s claim that nothing she sent or received was marked classified, Whitnah called that assertion a “misrepresentation.” Fox News was first to report in June that at least one of the emails contained a classified information portion marking for “c” which is confidential. FBI Director James Comey later said in July when he recommended against criminal charges that a handful of Clinton emails contained classified markings.
But more than 2,100 emails with classified information, and at least 22 at the “top secret” level, passed through Clinton’s unsecured private server. Asked how it happened, Smith said, “Personally, there had to have been somebody moving classified information from C-LAN, C-LAN again is Secret, Confidential only, and JWICS. JWICS is where all top secret information is.”
After new emails were found in the Anthony Weiner sexting case belonging to his estranged wife Clinton aide Huma Abedin, the FBI reopened the Clinton email investigation. On Sunday, Comey said the emails did not change his recommendation against criminal charges because his investigators did not find intent to move classified materials outside secure government channels
“Whether it’s the private email server, whether it’s this private laptop. If there’s classified — one document on there — that’s classified, it’s a violation. Somebody violated [the] law,” Smith said. “Throw all the politics out the window, what we’re talking about is the defense of this nation.”
Asked about Smith and Whitnah, who filed a complaint against the State Department, a department spokesman said they were not direct hires — adding that the head of diplomatic security told the FBI that Clinton was “very responsive to security issues.”
****
And her State Department approved that security team in Benghazi
Benghazi guards turned on US diplomats in 2012 attack, sources say
Expand / Contract
Stevens, shown in rear wearing black, with several of the guards sources say turned on him. (Special to Fox News)
FNC: An obscure private firm hired by the State Department over internal objections to protect U.S. diplomats in Benghazi just months before the American ambassador and three others were killed was staffed with hastily recruited locals with terror ties who helped carry out the attack, multiple sources told Fox News.
The explosive charge against Wales-based Blue Mountain Group comes from several sources, including an independent security specialist who has implemented training programs at U.S. Consulates around the world, including in Benghazi, where he trained a local militia that preceded Blue Mountain. The source, who spoke on condition of anonymity, said Blue Mountain used local newspaper ads to assemble a team of 20 guards, many of whom had terror ties, after securing a $9.2 million annual contract.
“The guards who were hired were locals who were part of the Ansar al-Sharia and Al Qaeda groups operating in Benghazi,” said the source, whose assignment in Benghazi had ended in November 2011. “Whoever approved contracts at the State Department hired Blue Mountain Group and then allowed Blue Mountain Group to hire local Libyans who were not vetted.”
Many were members of the Libyan government-financed February 17th Martyrs Brigade, an Islamist militia that had previously guarded Americans before being replaced by Blue Mountain.
John “Tig” Tiegen, one of the CIA contractors that responded to the Sept. 11, 2012 attack and co-author of “13 Hours: The Inside Account of What Really Happened in Benghazi,” confirmed to Fox News that the local Libyans who attacked the consulate that night included guards working for Blue Mountain.
“Many of the local Libyans who attacked the consulate on the night of Sept. 11, 2012, were the actual guards that the State Department under Hillary Clinton hired to protect the Consulate in Benghazi,” Tiegen told Fox News. “The guards were unvetted and were locals with basically no background at all in providing security. Most of them never had held a job in security in the past.
“Blue Mountain Libya, at the time of being awarded the contract by our State Department, had no employees so they quickly had to find people to work, regardless of their backgrounds,” he said.
One former guard who witnessed the attack, Weeam Mohamed, confirmed in an email sent to the Citizens Commission on Benghazi and obtained by Fox News, that at least four of the guards hired by Blue Mountain took part in the attack after opening doors to allow their confederates in.
“In the U.S. Mission, there were four people [who] belonged to the battalion February 17,” Mohamed wrote to the Commission, an independent body formed with Accuracy in Media to investigate the attack and the administration’s handling of it.
“Always armed. And they are free to move anywhere inside a building mission.
“And therefore, they had a chance to do an attack on the mission’s headquarters. They have all the details about the place. At the same time they have given the United States a painful blow,” Mohamed wrote.
Blue Mountain officials did not return multiple requests for comment. The State Department acknowledged in internal emails obtained by FoxNews.com the local recruits fell short of their duty, but discounted the claim any took an active role in the attack that resulted in the deaths of Ambassador Christopher Stevens, Foreign Service Information Officer Sean Smith and CIA contractors and former Navy SEALs Tyrone Woods and Glen Doherty.
“While the Accountability Review Board report and other reports were critical of our local guards’ performance, we are not aware of any evidence that they participated in the attacks themselves,” said State Department spokesman John Kirby.
Blue Mountain was hired in February 2012, following an uprising that ended Col. Muammar Gaddafi’s 42-year rule and plunged Libya into violent chaos. Congressional testimony in the wake of the attack on a consular office in Benghazi revealed that Stevens and his staff had made hundreds of requests for security upgrades but had been ignored by officials in Washington.
“We kept asking for additional support, including a 50-caliber mounted machine gun, but the State Department would not give it to us, because they said it would upset the locals,” the source told Fox News. “Instead, the State Department hired a company that doesn’t have employees, which then hired terrorists.”
Clare Lopez, a member of Citizens’ Commission on Benghazi, said the Clinton State Department bears blame for the security situation.
“Think about it: Hillary Clinton’s State Department actually hired the very people who, along with their jihadist allies in Benghazi, attacked us and killed U.S. Ambassador Chris Stevens and Sean Smith as well as CIA contractors Glen Doherty and Ty Woods,” Lopez said.
According to government records obtained by the Washington-based Judicial Watch, the State Department was in a “rush” to hire Blue Mountain UK, and its affiliate, Blue Mountain Libya, which together formed The Blue Mountain Group to secure the Benghazi contract.
“I understand there was a tremendous rush to get the original contract awarded, and the Service level agreement was most likely overlooked in the rush,” wrote State Department contracting officer Jan Visintainer, in a June 6, 2012, email. Emails obtained from [missing word] after the attack showed Visintainer urged Blue Mountain officials not to talk to the media.
Blue Mountain UK was formed in 2008 by David Nigel Thomas, a former Special Air Service official. Charles Tiefer, a commissioner at the Commission on Wartime Contracting, told Reuters the company was not well known.
“Blue Mountain was virtually unknown to the circles that studied private security contractors working for the United States, before the events in Benghazi,” Tiefer said.
Despite the size of the operation, and having no staff or track record with the State Department, Blue Mountain Group landed the $767,767-per-month contract to protect the Benghazi consular office, beginning on Feb. 17, 2012.
The company solicited applications in local newspapers and on websites, and very little, if any, screening of guards was done, the security specialist told Fox News. The lack of vetting led to several potentially dangerous hires beginning in March of 2012, he said.
“One of those guards hired by Blue Mountain was the younger brother of the leader of Al Qaeda of Benghazi,” he said.
In an email obtained by Judicial Watch, Jairo Saravia of the Regional Security office for the U.S. Embassy in Tripoli, told his superiors in Washington that Blue Mountain had held and lost security contracts in Tripoli, with the Corinthian Hotel and Palm City complex.
“The latest information is Blue Mountain is not licensed by the GOL (Government of Libya) to provide security services in Libya,” Saravia wrote. “I would advise not to use their services to provide security for any of our annexes and/or offices due to the sensitivity this issue has with the current GOL.”
Prior to Blue Mountain, security for Americans in Benghazi had been provided by the February 17th Martyrs Brigade under a direct agreement with the State Department. Despite its Islamist orientation, the militia included dozens of locals who had been carefully cultivated and trained by the U.S., according to the source. The majority of the February 17 Militia guards were fired without warning when Blue Mountain was hired, leading some members to turn against the Americans, he said. The State Department kept on at least three February 17 employees for patrol.
Eric Nordstrom, the regional security officer in Libya who has vast, first-hand knowledge of some 600 security requests denied to the U.S. diplomatic mission in Libya, testified on May 8, 2013, before the Congressional Committee On Oversight & Government Reform that he was aware that employees with both February 17 Martyrs Brigade and Blue Mountain had ties to Islamist terrorists.
“I had met with some of my agents and then also with some annex personnel. We discussed that,” Nordstrom told lawmakers.
Nordstrom testified that the “ferocity and intensity” of the 13-hour, four-phase attack, on the 11th anniversary of 9/11, was nothing that they had seen in Libya, or that he had seen in his time in the Diplomatic Security Service, with as many as 60 attackers in the consulate.
“I am stunned that the State Department was relying on [locals] with extremist ties to protect American diplomats,” U.S. Rep. Blake Farenthold, R-Texas, told Fox News. “That doesn’t make any sense. How does that happen?”
Fox News was able to verify through a former Libyan guard the identities of several February 17 employees hired despite terrorist ties, who he said participated in the attack. While their identities have been provided to federal authorizes, none have been prosecuted.
Bishop/CB: The idyllic American university campus conjures the image of a safe and open academic environment where students spend four or more years learning new ideas and preparing for future careers. Professors challenge eager students to open their minds to old and new perspectives in science, mathematics, business, and of course, the arts and humanities. Universities nurture an atmosphere where academics and scientists can engage in groundbreaking research, make advances in technology, and publish on novel theories and discoveries.
For many students, college may be the first time they are living on their own, allowing them to explore not only academic freedom but personal freedom. For parents coping with their children leaving home, some comfort is found in the expectation that while students are on campus the university will be actively taking measures to protect them from physical harm and risks that could affect their future. Parents don’t realize that for some students, college may be the first time students are exposed to the clandestine world of international espionage.
Espionage knows no boundaries. Foreign intelligence officers and spies lurk wherever there is information of value to be had or people with access to it. Information does not have to be a government secret for a foreign intelligence service to want to steal it. Nation states play the Great Game to gain an advantage, whether political or economic, over their adversaries. And there is plenty of information of value on American college campuses to attract the attention of adversary nations. From advanced research in sciences and technology to professors with access to U.S. government officials, American universities are a target-rich environment for intelligence collection, intellectual property theft, and the illicit transfer of research and technology. The welcoming nature of American universities—from unlocked entrances to university facilities, minimal investigation into the backgrounds of students enrolling in classes, and open admission to conferences, seminars, and other campus events—creates the perfect opportunity for undercover foreign intelligence officers or their human sources to slip onto campus and search for students who have potential for entering sensitive positions in the U.S. government or landing jobs with American companies engaged in the development and production of emerging and advanced technologies.
While the threat of espionage may not be apparent to parents and students, American universities have little excuse for not knowing about it. Federal law enforcement agencies like the FBI regularly attempt to advise universities of the potential espionage threats on campus, and the media also has reported extensively on them. The risks are real, knowable, and preventable, and universities that ignore the threats could face potentially devastating consequences to their reputations, relationships, and financial well being. For students who do not fully appreciate the risk and get wrapped up on the wrong side of the clandestine world, the impact on their futures can be tremendous and irreversible. Espionage on campus and the often-related illicit transfer of research and technology from school laboratories also contribute to immediate and long-term decline of U.S. national security interests and the competitive advantage the United States possesses in sciences and technology. The university campus has been part of the Great Game chessboard for years. This is nothing new and not much has changed.
In 1930s Great Britain, five college students with communist sympathies came under the spell of espionage at the University of Cambridge. Donald MacLean, Guy Burgess, Anthony Blunt, John Cairncross, and Kim Philby were in their undergraduate years when the NKVD, the Soviet precursor to the KGB, recruited them to serve the communist cause. At the time, none of the students had access to information of value or persons of interest, but the NKVD believed these men, who came from the right social class, would find their way into positions of influence and access. They all did.
MacLean landed key positions in the UK’s foreign office, the equivalent of the U.S. Department of State. Burgess held positions with the foreign office, the BBC, and MI6. Blunt spent some time in MI5, served as the Surveyor of the King’s Pictures, and used his standing in academic and social circles to spot other potential Soviet spies. Cairncross made the rounds at MI6 and Bletchley Park, the precursor to the UK’s Government Communication Headquarters (GCHQ). Kim Philby was the prize of the five. While starting his espionage as a freelance journalist in the Spanish Civil War, which gave him access to pro-Franco forces—the ideological enemies of the Soviet Union—Philby returned to the UK and entered MI6. There, he steadily rose through the ranks, eventually overseeing MI6’s counterintelligence operations against the Soviet Union. The Cambridge spies, most notably Philby, are still considered to be some of the most damaging spies in UK espionage history. The notoriety of these men is well known in England, and their association with the University of Cambridge as the Cambridge Ring or Cambridge Five will forever be remembered.
American universities have not been immune to the espionage efforts of foreign intelligence services. In 1984, a student-spy working for the Cuban intelligence service and studying at Johns Hopkins University “spotted” Ana Montes as a potential Cuban recruit. After being introduced to Cuban intelligence officers, Montes agreed to spy for Cuba while still a graduate student at Johns Hopkins. She later became an intelligence analyst at the Defense Intelligence Agency (DIA), focusing on Cuban issues. She was arrested in 2001 and sentenced to 20 years in prison.
Other known espionage or technology/research theft cases affecting the American university community include:
In 2002, Qingqiang Yin, a former Cornell University researcher was arrested before boarding a flight to Shanghai from New York. He was carrying numerous bacteria samples and yeast cultures belonging to the university. The FBI investigation revealed Yin was seeking a job with a research facility in China and offered to bring the bacteria and yeast cultures to China for commercial enzyme production. He was sentenced to 12 months’ imprisonment for conspiracy to defraud the U.S. government.
In 2006, Carlos Alvarez, a psychology professor at Florida International University, admitted during a plea hearing that he had been a Cuban spy for nearly 30 years, gathering and transmitting information about Cuban exile groups to Cuban intelligence agents. His wife Elsa, also a professor, admitted knowing of her husband’s conduct. They were sentenced to five and three years’ imprisonment, respectively.
In 2012, the FBI arrested 12 deep-cover Russian SVR intelligence officers who were engaged in espionage against various American targets. One of the SVR officers was Cynthia Murphy, a.k.a. Lydia Guryeva, who while studying for a master’s degree at Columbia University, was tasked by the SVR to develop relationships with classmates and professors who have or will acquire access to secret information and to report on their backgrounds and characteristics, providing assessments on their vulnerability for recruitment as spies. The SVR also directed Guryeva to collect information on students seeking employment with the CIA. After pleading guilty to failing to register as an agent of a foreign government, the United States returned Guryeva (and the other deep-cover officers) to Russia in exchange for prisoners held there.
In 2013, Hua Jun Zhao, a Chinese research assistant at the Medical College of Wisconsin, was arrested and charged with economic espionage after stealing cancer research compounds and shipping them to China, where he allegedly planned to take them to a Chinese university for further development. He pleaded guilty to the lesser charge of illegally downloading research data and was sentenced to time served (four-and-a-half months).
Since 2004, the Chinese government has opened numerous Confucius Institutes at universities across the world, including approximately 64 institutes at American universities. While the stated mission of the institutes is to promote the study of Chinese language and culture abroad, concerns have been raised about the ulterior motives of these institutes. Allegations have also surfaced that the institutes may be Trojan Horses used by the Chinese government to conduct espionage activities. Regardless of the public evidence available on the alleged intelligence function of these institutes, from this former intelligence officer’s perspective, they are the perfect front for penetrating American universities and targeting their students.
Again, these are only examples of the espionage threats facing American universities. These incidents and others have been well documented in the public domain, and American universities dedicated to risk management should know about them, if not for their own protection, then for the benefit of their donors and students and U.S. national security.
Today’s American university receives funding from a variety of sources, including alumni, businesses, philanthropic organizations, and federal and state governments. Research grants from the public and private sectors are a significant source of income for universities, and donors want the university to reap the benefits of their contributions. No donor wants to see years of research and funding illegally diverted to a foreign government or competitor. A university that does not take this risk seriously could begin to see expected research grants and contributions being provided to other schools or facilities, especially when the U.S. government is the funding source.
Universities should also consider the disruption a law enforcement investigation into espionage on campus can have on its day-to-day operations, reputation, and ability to maintain investor (philanthropic) confidence. The media will undoubtedly provide thorough coverage of an espionage investigation, the accuracy of which is not guaranteed.
Investigators will be removing and combing through files and records. Computers may be seized, and electronic files of all kinds will be requested. Interviews of those with knowledge of the incident or perpetrators will be required, and if a public trial takes place, there will be more disruption and publicity. A university wanting to maintain or salvage its reputation after the uncovering of espionage on its campus will find it advantageous if it can truthfully state it has been cooperating with law enforcement on the investigation rather than have a story surface that the university was one of the obstacles law enforcement had to overcome in order to put an end to the espionage. Having the university’s name negatively associated with a foreign espionage investigation is not the kind of publicity a university will find easy to overcome.
For students, the consequences of becoming entangled in espionage could be severe. Students make easy targets, and their idealism and naiveté can often get in the way of their judgment. Once a student is recruited as a spy, his opportunities for reversing course without consequence are limited. One only needs to look at the choices made by Glenn Duffie Shriver, an American just out of college and living in China, who was slowly manipulated by Chinese intelligence to seek employment with the CIA. Shriver was arrested and sentenced to four years’ imprisonment after pleading guilty to conspiracy to commit unlawful conveyance of national defense information. Shriver was released from prison in 2013, but he will be forever remembered as a Chinese spy. Not a great resume builder.
From a national security perspective, espionage on campus also contributes to the perpetual and long-term decline of the United States’ competitive advantage over its adversaries. The technology and research lost to other countries through espionage and theft robs the American economy of the commercial and economic benefits it would have derived in terms of jobs, profits, and scientific and technological advancement. The stolen knowledge increases the commercial and economic standing of the countries that committed the theft to the detriment of the United States. If the stolen technologies and research have military, defense, or security applications, then the losses also contribute to the threats the United States faces from countries and adversaries who seek to challenge or harm its national security interests.
Universities are a soft target for espionage and offer potentially lucrative rewards for our adversaries’ intelligence targeting efforts. Every loss resulting from espionage or foreign theft at an American university is a gain for the adversaries of the United States. These risks and potential consequences transcend the inerrant concept of the open, academic environment.
U.S. Govt. Hackers Ready to Hit Back If Russia Tries to Disrupt Election
byKen Dilanian, William M. ArkinandCynthia McFadden
NBC: U.S. military hackers have penetrated Russia’s electric grid, telecommunications networks and the Kremlin’s command systems, making them vulnerable to attack by secret American cyber weapons should the U.S. deem it necessary, according to a senior intelligence official and top-secret documents reviewed by NBC News.
American officials have long said publicly that Russia, China and other nations have probed and left hidden malware on parts of U.S critical infrastructure, “preparing the battlefield,” in military parlance, for cyber attacks that could turn out the lights or turn off the internet across major cities.
It’s been widely assumed that the U.S. has done the same thing to its adversaries. The documents reviewed by NBC News — along with remarks by a senior U.S. intelligence official — confirm that, in the case of Russia.
U.S. officials continue to express concern that Russia will use its cyber capabilities to try to disrupt next week’s presidential election. U.S. intelligence officials do not expect Russia to attack critical infrastructure — which many believe would be an act of war — but they do anticipate so-called cyber mischief, including the possible release of fake documents and the proliferation of bogus social media accounts designed to spread misinformation.
On Friday the hacker known as “Guccifer 2.0” — which U.S. officials say is a front for Russian intelligence — tweeted a threat to monitor the U.S. elections “from inside the system.”
As NBC News reported Thursday, the U.S. government is marshaling resources to combat the threat in a way that is without precedent for a presidential election.
The cyber weapons would only be deployed in the unlikely event the U.S. was attacked in a significant way, officials say.
***
U.S. military officials often say in general terms that the U.S. possesses the world’s most advanced cyber capabilities, but they will not discuss details of highly classified cyber weapons.
James Lewis, a cyber expert at the Center for Strategic and International Studies, says that U.S. hacks into the computer infrastructure of adversary nations such as China, Russia, Iran and North Korea — something he says he presumes has gone on for years — is akin to the kind of military scouting that is as old as human conflict.
“This is just the cyber version of that,” he said.
In 2014, National Security Agency chief Adm. Mike Rogers told Congress that U.S. adversaries are performing electronic “reconnaissance” on a regular basis so that they can be in a position to disrupt the industrial control systems that run everything from chemical facilities to water treatment plants.
“All of that leads me to believe it is only a matter of when, not if, we are going to see something dramatic,” he said at the time.
Rogers didn’t discuss the U.S.’s own penetration of adversary networks. But the hacking undertaken by the NSA, which regularly penetrates foreign networks to gather intelligence, is very similar to the hacking needed to plant precursors for cyber weapons, said Gary Brown, a retired colonel and former legal adviser to U.S. Cyber Command, the military’s digital war fighting arm.
“You’d gain access to a network, you’d establish your presence on the network and then you’re poised to do what you would like to do with the network,” he told NBC News. “Most of the time you might use that to collect information, but that same access could be used for more aggressive activities too.”
**
Brown and others have noted that the Obama administration has been extremely reluctant to take action in cyberspace, even in the face of what it says is a series of Russian hacks and leaks designed to manipulate the U.S. presidential election.
Administration officials did, however, deliver a back channel warning to Russian against any attempt to influence next week’s vote, officials told NBC News.
The senior U.S. intelligence official said that, if Russia initiated a significant cyber attack against critical infrastructure, the U.S. could take action to shut down some Russian systems — a sort of active defense.
Retired Adm. James Stavridis, who served as NATO commander of Europe, told NBC News’ Cynthia McFadden that the U.S. is well equipped to respond to any cyber attack.
“I think there’s three things we should do if we see a significant cyber-attack,” he said. “The first obviously is defending against it. The second is reveal: We should be publicizing what has happened so that any of this kind of cyber trickery can be unmasked. And thirdly, we should respond. Our response should be proportional.”
**
The U.S. use of cyber attacks in the military context — or for covert action — is not without precedent.
During the 2003 Iraq invasion, U.S spies penetrated Iraqi networks and sent tailored messages to Iraqi generals, urging them to surrender, and temporarily cut electronic power in Baghdad.
In 2009 and 2010, the U.S., working with Israel, is believed to have helped deploy what became known as Stuxnet, a cyber weapon designed to destroy Iranian nuclear centrifuges.
Today, U.S. Cyber Command is engaged in cyber operations against the Islamic State, including using social media to expose the location of militants and sending spoof orders to sow confusion, current and former officials tell NBC News.
One problem, officials say, is that the doctrine around cyber conflict — what is espionage, what is theft, what is war — is not well developed.
“Cyber war is undefined,” Brown said. “There are norms of behavior that we try to encourage, but people violate those.”
*****
UK Announces New Policy on Cyber Attacks: ‘We Will Strike Back in Kind’
In recognition of the risk cyber attacks pose, the government’s 2015 Strategic Defence and Security Review classified cyber as a Tier One threat to the UK – that’s the same level as terrorism, or international military conflict. …
AtlanticCouncil: [W]e must keep up with the scale and pace of the threat we face. So today I am launching the government’s National Cyber Security Strategy for the next 5 years. The new strategy is built on three core pillars: defend, deter and develop, underpinned by £1.9 billion of transformational investment.
First of all Defend. We will strengthen the defences of government, our critical national infrastructure sectors like energy and transport, and our wider economy. We will work in partnership with industry to apply technologies that reduce the impact of cyber-attacks, while driving up security standards across both public and private sectors. We will ensure that our most sensitive information and networks, on which our government and security depend, are protected.
In practice, that means government taking a more active cyber defence approach – supporting industry’s use of automated defence techniques to block, disrupt and neutralise malicious activity before it reaches the user. The public have much to gain from active cyber defence and, with the proper safeguards in place to protect privacy, these measures have the potential to be transformational in ensuring that UK internet users are secure by default.
We are already deploying active cyber defence in government and we know it works: we’ve already successfully reduced the ability of attackers to spoof government e-mails as a key example. Until 6 weeks ago we were seeing faking of some @gov.uk addresses, such as ‘[email protected] ’. Criminals have been using these fake addresses to defraud people, by impersonating government departments. 50,000 spoof emails using the [email protected] address were being sent a everyday – now, thanks to our interventions, there are none.
The second pillar is deterrence. We will deter those who seek to steal from us, threaten us or otherwise harm our interests in cyberspace. We’re strengthening our law enforcement capabilities to raise the cost and reduce the reward of cyber criminality – ensuring we can track, apprehend and prosecute those who commit cyber crimes. And we will continue to invest in our offensive cyber capabilities, because the ability to detect, trace and retaliate in kind is likely to be the best deterrent. A small number of hostile foreign actors have developed and deployed offensive cyber capabilities, including destructive ones. These capabilities threaten the security of the UK’s critical national infrastructure and our industrial control systems.
If we do not have the ability to respond in cyberspace to an attack which takes down our power networks leaving us in darkness, or hits our air traffic control system, grounding our planes, we would be left with the impossible choice of turning the other cheek and ignoring the devastating consequences, or resorting to a military response. That is a choice that we do not want to face – and a choice we do not want to leave as a legacy to our successors. That is why we need to develop a fully functioning and operational cyber counter-attack capability. There is no doubt in my mind that the precursor to any future state-on-state conflict would be a campaign of escalating cyber-attacks, to break down our defences and test our resolve before the first shot is fired. Kinetic attacks carry huge risk of retaliation and may breach international law.
But in cyber space those who want to harm us appear to think they can act both scalably and deniably. It is our duty to demonstrate that they cannot act with impunity. So we will not only defend ourselves in cyberspace; we will strike back in kind when we are attacked.
And thirdly development. We will develop the capabilities we need in our economy and society to keep pace with the threat in the future. To make sure we’ve got a pipeline talented of people with the cyber skills we need, we will increase investment in the next generation of students, experts and companies.
I can announce we’re creating our latest cyber security research institute – a virtual network of UK universities dedicated to technological research and supported by government funding. The new virtual institute will focus on hardware and will look to improve the security of smart phone, tablets and laptops through innovative use of novel technology. We’re building cyber security into our education systems and are committed to providing opportunities for young people to pursue a career in this dynamic and exciting sector. And we’re also making sure that every young person learns the cyber life-skills they need to use the internet safely, confidently and successfully.
These three pillars that I’ve outlined – deter, defend and develop – are all supported by our new National Cyber Security Centre, based in Victoria in central London.
For the first time the government will have a dedicated, outward-facing authority on cyber – making it much simpler for business to get advice on cyber security and to interact with government on cyber security issues. Allowing us to deploy the high level skills that government has, principally in GCHQ, to support the development of commercial applications to enhance cyber security.
The Centre subsumes CERT UK and will provide the next generation of cyber security incident management. This means that when businesses or government bodies, or academic organisations report a significant incident, the Centre will bring together the full range of technical skills from across government and beyond to respond immediately. They will link up with law enforcement, help mitigate the impact of the incident, seek to repair the damage and assist in the tracing and prosecution of those responsible.
Across all its strands, the National Cyber Security Strategy we’re publishing today represents a major step forward in the fight against cyber attack.
Excerpts from “Speech Launching the National Cyber Security Strategy,” by Chancellor of the Exchequer Philip Hammond, Nov. 1, 2016.