Illegal Border Crossings v. Visa Overstays

No one can get the image of the train carrying illegals out of their memory and with good reason. When anyone does a search on the internet to determine the actual and factual numbers of immigrants coming across the southern border by year, you will be disappointed, the charts and records are not there. Countless outlets and agencies report but with caveats and obscure labels. Still we are told the border is as secure as it has ever been.

Related reading: The Human Tragedy of Illegal Immigration: Greater Efforts Needed to Combat Smuggling and Violence

What is more chilling, are the reports that once again we are in a spike season of illegal entry due in part to threats of presidential candidates. Further, those already here are filing at an accelerated rate for citizenship for the exact same reason.

There is a clash however in the facts over which is worse, those coming across the border versus those coming in by air or other means possessing a vThe Visa Waiver Program (VWP) enables most citizens or nationals of participating countries* to travel to the United States for tourism or business for stays of 90 days or less without first obtaining a visa, when they meet all requirements explained below. Travelers must have a valid Electronic System for Travel Authorization (ESTA) approval prior to travel. If you prefer to have a visa in your passport, you may still apply for a visitor (B) visa.isa that has an expiration date. Take note that any international airport across the United States is a port of entry. Once a visa is issued by State Department contractors, it becomes the burden of the Department of Homeland Security to ensure compliance to dates. This is where the problem, yet another lays with fault.

One cannot overlook the Visa Waiver Program concocted by the U.S. State Department of which several in Congress are calling for a suspension.

Citizens or nationals of the following countries* are currently eligible to travel to the United States under the VWP, unless citizens of one of these countries are also a national of Iraq, Iran, Syria, or Sudan.

Andorra Hungary Norway
Australia Iceland Portugal
Austria Ireland San Marino
Belgium Italy Singapore
Brunei Japan Slovakia
Chile Latvia Slovenia
Czech Republic Liechtenstein South Korea
Denmark Lithuania Spain
Estonia Luxembourg Sweden
Finland Malta Switzerland
France Monaco Taiwan*
Germany Netherlands United Kingdom**
Greece New Zealand

There are an estimated 35 unique types of visa classifications under the management of the U.S. State Department.

 

Obama Admin Deported Less Than One Percent of Visa Overstays

Nearly half a million individuals overstayed visas in 2015, fewer than 2,500 deported

Kredo/FreeBeacon: The Obama administration deported less than one percent of the nearly half a million foreign nationals who illegally overstayed their visas in 2015, according to new statistics published by the Department of Homeland Security.

Of the 482,781 aliens who were recorded to have overstayed temporary U.S. visas in fiscal year 2015, just 2,456 were successfully deported from the United States during the same period, according to DHS’s figures, which amounts to a deportation rate of around 0.5 percent.

The sinking rate of deportations by the Obama administration is drawing criticism from Capitol Hill, where lawmakers are warning that the administration is ignoring illegal overstays and potentially opening the United States to terrorist threats.

The 482,781 figure accounts for aliens who entered the United States on a nonimmigrant visitor visa or through the Visa Waiver Program, which streamlines travel between the United States and certain other countries. The figure encompasses foreign nationals who were found to have remained in the United States after their visas expired or after the 90-day window allowed by the Visa Waiver Program.

The actual number of overstays could be higher. The latest figures published by DHS do not include overstays from other visa categories or overstays by individuals who entered the United States through land ports, such as those along the Mexican border.

Deportations by the Obama administration have decreased steadily since 2009, according to figures codified by the Senate’s Subcommittee on Immigration and the National Interest and provided to the Washington Free Beacon.

Since 2009, U.S. Immigration and Customs Enforcement has expelled 51,704 individuals who overstayed their visas. The total number of those expelled has decreased every fiscal year.

At least 12,538 illegal overstays were deported in fiscal 2009, while 11,259 were removed in 2010, 10,426 in 2011, 6,856 in 2012, 4,240 in 2013, 3,564 in 2014, and 2,456 in 2015, according to the committee.

The drop is being attributed by sources to an Obama administration policy directing DHS and ICE not to pursue visa overstays unless the offender has been convicted of major crimes or terrorism.

“The decision by the Obama administration not to enforce immigration laws by allowing those who have overstayed their visas to remain in the country has not gone unnoticed by the American people,” sources on the Senate subcommittee told the Free Beacon. “A Rasmussen Reports poll released earlier this year indicates that approximately 3 out of 4 Americans not only want the Obama administration to find these aliens who overstay their visas, but also to deport them.”

“The same poll indicates that 68 percent of Americans consider visa overstays a ‘serious national security risk,’ and 31 percent consider visa overstays a ‘very serious’ national security risk,” according to the sources.

Congress has long mandated the implementation of a biometric entry-exit system to track individuals who overstay their visas and ensure they leave the United States.

Sen. Jeff Sessions (R., Ala.), chair of the Senate’s immigration subcommittee, recently proposed an amendment aimed at speeding up implementation of this system. Senate Democrats blocked the amendment.

97d0ba07-f3c5-45eb-9b87-ba1ec93c169a

Immigration and Customs Enforcement has received substantially more taxpayer money in recent years despite the plummeting rate of deportations. At least 43 percent fewer aliens were removed from the United States from 2012 to 2015, according to DHS statistics.

Permit to Kill Eagles?

Reprehensible….sounds like a death panel for a historic American icon.

A federal depredation permit authorizes you to capture or kill birds to reduce damage caused by birds or to protect other interests such as human health and safety or personal property. A depredation permit is intended to provide short-term relief for bird damage until long-term, non-lethal measures can be implemented to eliminate or significantly reduce the problem.

You should review Title 50 parts 10, 13 and 21.41 of the Code of Federal Regulations (CFR) with your application. You are responsible for reviewing and understanding these regulations before you request and accept a permit. These regulations are on our website at: http://www.fws.gov/permits/ltr/ltr.html.

The process, conditions, text and application document is found here.

 

U.S. proposes giving wind farms 30-year permits to kill eagles

Reuters: U.S. wildlife managers on Wednesday again proposed granting 30-year permits to wind farms that would forgive them for thousands of eagle deaths expected during that time frame from collisions of the birds with turbines, towers and electrical wires.

The proposed rule, like one struck down by a federal judge last year, would greatly extend the current five-year time frame in the permits required under U.S. law for the “incidental take” of eagles, including those killed by obstacles erected in their habitat.

Wind energy companies have pressed the U.S. Fish and Wildlife Service to lengthen the terms of the eagle permits, saying a five-year duration left too much uncertainty and hampered investment in the burgeoning renewable power industry.

The agency in 2013 approved a similar plan extending eagle-take permits to 30 years. But a U.S. judge overturned it last year, agreeing with conservation groups that the Fish and Wildlife Service had failed to properly assess impacts of the rule change on federally protected eagle populations.

The revised proposal cites significant expansion within many sectors of the U.S. energy industry, particularly wind energy operations in the Western states, at a time when bald eagle numbers are growing while golden eagles appear to be in decline.

Nevertheless, the Fish and Wildlife Service concluded that the U.S. population of roughly 40,000 golden eagles could endure the loss of about 2,000 birds a year without being pushed toward extinction. And the agency suggested that bald eagles, estimated to number about 143,000 nationwide, could sustain as many as 4,200 fatalities annually without endangering the species.

The new proposal, which is open for public comment through July 5, would make wind farms and other energy developers responsible for monitoring eagle deaths from collisions with facility structures.

That arrangement was decried by the American Bird Conservancy, which led the successful legal challenge against the previous eagle permit plan.

The conservancy’s Michael Hutchins said a system that relies on industry rather than government regulators to monitor and report problems fails to protect a beloved bird of prey stamped on the great seal of the United States.

The American Wind Energy Association did not immediately respond to a request for comment.

The number of eagles killed each year at wind facilities is not precisely known, according to the Fish and Wildlife Service. An estimated 545 golden eagles are thought to perish annually from collisions with obstacles ranging from turbines to vehicles, the agency said.

Porn Scandal in Federal Govt Continues

SMH = Shaking my Head

Feds Have Found ‘Unbelievable’ Amounts of Child Porn on National Security Computers. Is This the Solution?

A top National Security Agency official wants to keep tabs on national security personnel off-the-clock, in part by tracking their online habits at home. The aim is to spot behavior that might not be in America’s best interests.

Historically, some illicit activity, like downloading child pornography, which is different to perfectly legal and enjoyable content from sites similar to tubev, has occurred on government computers and been prosecuted.

But today, the digital lives of employees cleared to access classified information extend beyond the office.

About 80 percent of the National Security Agency workforce has retired since Sept. 11, 2001, says Kemp Ensor, NSA director of security. When the millennial and Gen Y staff that now populate the spy agency get home, they go online.

“That is where were we need to be, that’s where we need to mine,” Ensor said.

Currently, managers only look for aberrant computer behavior on internal, agency-owned IT systems – it’s a practice known as “continuous monitoring.”

But the military and intelligence communities are beginning to broaden checks on cleared personnel in the physical and digital worlds. It used to be that national security workers were re-investigated only every five or 10 years.

Under the evolving “continuous evaluation” model, the government will periodically search for signs of problems through, for example, court records, financial transactions, and — if authorized — social media posts.

Ensor and other federal officials spoke April 28 about new trends in personnel security at an Intelligence and National Security Alliance symposium in Chantilly, Virginia.

On government devices, “the amount of child porn I see is just unbelievable,” said Daniel Payne, director of the Pentagon’s Defense Security Service. The point being, there’s a need to routinely scan agency network activity and criminal records to gauge an individual’s suitability to handle classified information.

Payne, whose 34 years of counterintelligence experience have spanned the military, CIA and National Counterintelligence and Security Center, was not referring to any specific agency or any specific timeframe, his current employer told Nextgov.

Payne just returned to the Defense Security Service in February, after starting his career there.

“Director Payne provided this example to demonstrate the range of issues identified during the personnel security process, and the range and value of different data sources that have a bearing on an individual’s ability to access sensitive information,” the Defense Security Service said in an emailed statement.

Ensor echoed his colleague’s concerns, noting he sees child pornography on NSA IT systems. In the national security space, “what people do is amazing,” he said. Ensor’s guess about the presence of explicit material is that there are many “introverts staring at computer screens” day in and day out. This is why it is so important to look at individuals holistically when determining who might be a so-called insider threat, Ensor said.

In the past, military and intelligence personnel have exploited minors online, without notice, for years or even an entire career.

The Boston Globe broke a story in 2010 that a significant number of federal employees and contractors with high-level security clearances downloaded child pornography — sometimes on government computers — at NSA and the National Reconnaissance Office, among other defense agencies.

At least one NSA contractor holding a top secret clearance told investigators in 2007 he had been spending $50 to $60 monthly fees on various sexually explicit websites similar to hdpornvideo.xxx for the past three years, according to a Defense inspector general report on the matter. After each session on the porn sites, he would wipe the browsing history of that system. The Pentagon investigation did not state who owned the computer.

More recently, a military official pleaded guilty to pedophile crimes and accessing child pornography through the Internet — but at home.

On April 15, a U.S. district judge sentenced former Army Corps of Engineers official Michael Beeman, of Virginia, to 30 years in prison for molesting minors, beginning in the 1980s while working in public affairs at Patrick Air Force Base. He later downloaded child pornography to personal devices, court records show.

Case files state the illegal online activity occurred between 2010 and 2014, which according to LinkedIn, was when Beeman served as an Army Corps of Engineers public affairs regional chief.

History and Money, Immigrants into the U.S.

Drug traffic route in the region

by: Susan Fitzpatrick Behrens

The porous 600-mile border between Guatemala and Mexico offers Central American immigrants a ready passage to “el norte“—the United States. It includes 63 uncontrolled transit points, 44 of which can be passed in a vehicle.

The same conditions attracting Central American immigrants also make the Guatemala-Mexico border region home to a thriving drug trade. Guatemala’s Prensa Libre, recently reported that Guatemala’s three departments (or states) bordering Mexico—San Marcos, Huehuetenango, and the Petén—have come under the direct control of violent drug cartels.

In San Marcos, a single drug lord, Juan Ortiz Chamalé, owns virtually all of the properties on the frontier. Huehuetenango is the site of an increasingly violent conflict between Mexican and Guatemalan drug lords. The latest incident there involved a wholesale massacre of 17 to 40 people (estimates vary) at a horserace organized by narcos. While in the Petén, drug mafias, supported by the police, have forced small and large landowners to sell their lands.

Violence, promoted by the drug trade, delinquency, and death squads has become a part of daily life in these Guatemalan departments. Bodies riddled with bullet holes regularly appear by the sides of roads, along riverbeds, and in open fields. Well-documented evidence demonstrates that police and military forces are directly engaged in this violence through their links to drug cartels, the maras (gangs), and death squads.

Undocumented Central American immigrants, fleeing the struggling economies of their respective countries, are often victimized by this violence. And their plight is about to get worse. The recently implemented U.S.-Central American Free Trade Agreement (CAFTA) will surely devastate what is left of rural livelihoods. And, what’s more, the conditions that make the Guatemala-Mexico border an immigrant corridor and a Mecca for drug trafficking also make it a central target of Plan Mexico, the U.S.-financed anti-drug militarization program, pushed through the U.S. Congress by President George Bush in June 2008.

Undocumented Central American immigrants, already subjected to subhuman conditions in their search for viable livelihoods, now face the oppressive confluence of these powerful transnational forces—the drug trade, militarization, and free trade.

Plan Mexico

The U.S.-backed Plan Mexico, known as the “Mérida Initiative” in policy circles, provides $1.6 billion of U.S. taxpayer money to Mexico, Central America, and the Caribbean. The stated intention of the program involves “security aid to design and carry out counter-narcotics, counter-terrorism, and border security measures.”

U.S. Congressional leaders complained about the secrecy of negotiations for Plan Mexico and the absence of human rights guarantees, but they did nothing more than demand the paltry sum of $1 million in additional funding to support human rights groups in Mexico.

Researcher Laura Carlsen has noted that Plan Mexico is the “securitized” extension of trade agreements such as the North American Free Trade Agreement and CAFTA. Indeed, Plan Mexico is the successor project to the Security and Prosperity Partnership (SPP), a post-9/11 initiative negotiated by the NAFTA countries. The State Department’s Thomas Shannon made the link between free trade and security explicit: “We have worked through the Security and Prosperity Partnership to improve our commercial and trading relationship, we have also worked to improve our security cooperation. To a certain extent, we’re armoring NAFTA.”

Evidently, neoconservative policy framers have purposefully coupled free trade and security. Free trade agreements promote the free circulation of goods, while prohibiting the same circulation by workers. Since neoliberal trade deals eliminate agricultural subsidies and open poor countries to a flood of cheap imported goods, economically displaced workers will naturally seek new sources of income—even if that means crossing borders.

Militarizing borders and identifying undocumented workers who cross them as criminals (“illegal”) are the logical—though sordid—next steps in anticipating and “guarding against” the effects of free trade. The militarization of borders has done nothing to stop immigration, which provides an essential labor force to the United States. But the criminalization of undocumented mobile immigrant workers has deprived them of basic rights of citizenship, thereby making them vulnerable to increasing levels of violence and human rights violations.

The U.S.-driven designation of “internal enemies”—in this case immigrants—as a rationale for building an already mushrooming security apparatus and militarizing societies is, of course, nothing new, especially in Latin America. What is new is that this militarization has become nearly void of any social content. Even during the Cold War, U.S. “national security” doctrines were generally accompanied by social programs, such as the Alliance for Progress and the Peace Corps, which in small measure alleviated poverty and explicitly recognized economic conditions as a root of “the problem.”

The end of the Cold War eliminated an even token emphasis on poverty and with it, all but the most minimal efforts to offer social assistance. The Washington Office on Latin America (WOLA) found that the Bush administration granted $874 million in military and police assistance to Latin America in 2004 an amount almost equal to the $946 million provided in economic and social programs. WOLA reported that with the exception of Colombia, military and police aid has historically been less than half of the total provided for economic and social aid. Moreover, military and police aid used to be directed by the U.S. State Department, assuring a degree of congressional oversight. Now, this aid is increasingly managed by the Department of Defense, thereby eliminating this oversight and effectively making militarization the predominant rationale of U.S. foreign policy.

Living on the Border

The situation of Central American immigrants on Mexico’s southern border illustrates the central problems and contradictions of Washington’s emphasis on free trade and militarization. And the situation is certain to get worse as thousands of immigrants are deported by the United States to their countries of origin in Central America.

Immigrants are fully aware of the risks they take, but economic conditions leave them few alternatives. With a look of desperation following a three-day journey from his home, one Honduran immigrant in the Mexican border town of Tapachula explained, “We don’t do this by choice. We don’t want to leave our families. But imagine a man looking at his children and seeing them hungry.” Back home, he faces wages averaging $6 per day in Honduras and a scarcity of opportunities.

When asked about the dangers they anticipate on their journey north, Central American immigrants offer a catalog of terrors: beatings, sexual assaults, robberies, kidnappings, and murders. Ademar Barilli, a Catholic priest and director of the Casa del Migrante in Guatemala’s border town of Tecún Umán, observed, “Immigrants almost expect that their rights will be violated in every sense because they are from another country and are undocumented.”

Heyman Vasquez, a Catholic priest who directs a shelter for migrants in the town of Arriaga in Chiapas, Mexico, maintains detailed records of the violations suffered by migrants passing through his shelter. In a five-month period in 2008, a third of the men and 40% of the women he serves reported assault or some other form of abuse in their 160-mile journey from the Mexico-Guatemala region to Arriaga.

Police are often the perpetrators of these violations. In Guatemala, Father Barilli and others described cases of police forcing Salvadoran and Honduran immigrants to disembark from buses, where they take their documents and demand money. Once they make it into Mexico, immigrants are subject to abuse by Los Zetas, a notorious drug-trafficking network composed of former law enforcement and military agents linked with the Gulf Cartel.

Los Zetas are known to work with Mexican police in the kidnapping of immigrants to demand money from their family members in the United States. Immigrants also report robberies, beatings, and rapes at the hands of Los Zetas. Recently, in Puebla, Mexico, 32 undocumented Central Americans were kidnapped and tortured by the Zetas with the support of municipal police. In this case, after the migrants escaped, local community members captured a number of the responsible police agents and held them until Federal authorities arrived.

A U.S. State Department report on human rights in Mexico from 2007 concluded, “Many police were involved in kidnapping, extortion, or providing protection for, or acting directly on behalf of organized crime and drug traffickers. Impunity was pervasive to an extent that victims often refused to file complaints.”

That impunity means abused migrants have few places to turn is painfully obvious to one Salvadoran immigrant in the Mexican border town of Tapachula. He had just been deported from the United States, where his wife, a legal resident, and two U.S.-born children live in Los Angeles. “The police are involved. You can’t file complaints,” he said. Besides, the wheels of Mexican justice turn notoriously slow—if at all.

Despite the dire scenario, it is not uncommon for many Central American immigrants to receive a helping hand along the way in their journey to El Norte, whether its food, water, money, or shelter. As one undocumented Honduran explained in Tapachula, “Almost everyone has someone in their family who has migrated. Most understand the need.”

“Security” and Violence

Security initiatives in Central America are notoriously violent and further militarize societies still recovering from decades of brutal civil wars. And, historically, when the Pentagon gets involved, repressive tactics increase.

The Bush administration’s principle security concerns in Central America of drug trafficking and “transnational gangs” have led to a series of “security cooperation” agreements. The first regional conference on “joint security” was chaired by El Salvador’s president, Tony Saca, who first introduced the “Mano Dura” (Iron Fist) initiative—a package of authoritarian militarized policing methods aimed at youth gangs adopted throughout the region. In attendance was then-U.S. Attorney General Alberto Gonzales, responsible for advocating torture of prisoners in Guantánamo.

The conference took place in El Salvador in February 2007 and resulted in the creation of a transnational anti-gang unit (TAG), which El Salvador’s justice and security minister, René Figueroa described as “an organized offensive at a regional level,” with the US State Department and the FBI coordinating with national police forces. Gonzales, promised Washington would finance a new program to train regional police forces and this promise has been fulfilled partially with the establishment of a highly controversial police-training academy in El Salvador, which is closed to public scrutiny and includes little support for human rights.

In many ways, Plan Mexico, is a mano dura campaign writ large. For 2008, Plan Mexico will provide $400 million to Mexico and $65 million to Central America. More than half of the total funds will go directly to providing police and military weapons and training, even though the police and military in these countries have been implicated in crime and human rights violations.

As Plan Mexico arms and trains military and police forces implicated in violent crime, it also provides millions of dollars for an immigration institute responsible for tightening Mexico’s southern borders through monitoring, bio-data collection, a Guatemalan guest-worker program, and border control.

Undocumented immigrants will be caught in the web of this violence, particularly since Plan Mexico also continues the trend toward the criminalization of migrants. As Laura Carlsen, observes, “By including ‘border security’ and explicitly targeting ‘flows of illicit goods and persons,’ the initiative equates migrant workers with illegal contraband and terrorist threats.”

The dehumanization of undocumented immigrants in the United States, and elsewhere, and the growing infringement of their basic rights should serve as a dire warning to all “citizens.” The undocumented are the canaries in the coalmine: the violation of their rights signals a growing repressive climate that jeopardizes everyone’s liberties.

Fire on the Border

Free trade agreements create the conditions that force people to migrate to the United States as an underpaid, politically disenfranchised, and therefore unprotected labor force. Now the economic crisis in the United States has increased pressure to expel undocumented workers, violating a host of human rights standards in the process. Deportations also increase labor pressure in immigrants’ countries of origin, where the global economic crisis stands to further decrease the already limited opportunities for work in “legitimate” industries.

From a purely humanitarian perspective, the governments of the United States, Mexico, and Central America need to address this crisis by developing policies that improve the conditions of poverty that cause immigration. Throwing guns at the problem will only make things worse.

Sure, drug lords are firmly entrenched in the Guatemala-Mexico border region. But Plan Mexico will no more eliminate their presence, than the Mano Dura campaigns eliminated the gangs. Or, for that matter, any more than the militarization of borders has eliminated immigration. Instead, Plan Mexico, like its predecessors, will increase the level of violence in the region by providing more weapons to corrupt police and military forces.

As more and more resources shift toward militarization, policing and surveillance, fewer resources are available for programs that ease pressure to emigrate—namely, education, jobs, medical care, food subsidies, housing, and legal recourse. Meanwhile, governments are increasingly ceding responsibility for protection of even narrowly defined human rights to under-funded non-governmental organizations.

Repressive immigration policies, narcotrafficking, and free trade all combined to form a combustible situation along the Mexico-Guatemala border. Plan Mexico is the spark, and once the flames start, no one will be able to put out the fire. And it’s the undocumented migrants who will continue to get burned.

Obama/Kerry Cant Modify Iran, Cyber Army

Iran’s cyber army – the latest in a series of maleficence

TheHill: In July, when the P5+1 struck a nuclear deal with Iran dubbed as “historic,” administration officials spun it as a first step on a path toward improving Tehran’s behavior. That path hit yet another bump in recent weeks, when Iran launched nuclear-capable missiles in defiance of a United Nations Security Council resolution that endorsed the nuclear deal.

In a letter to the U.N., the U.S., France, Great Britain and Germany decried the missile tests. Secretary of State John Kerry speaking on a visit to Bahrain on April 7, 2016, condemned “the destabilising actions of Iran.”

Iran’s Minister of Defense Brig. Gen. Hossein Dehghan shot back: “If John Kerry actually thought about these subjects, he would no longer utter nonsense and foolish words.” The U.S., he said, should “leave the region and stop supporting terrorists.”

The Iranian regime, in contrast, clearly has no plans to curtail its regional meddling. According to reports from inside the Iranian regime, Supreme Leader Ali Khamenei has dispatched hordes of Islamic Revolutionary Guard Corps (IRGC), mercenary militias, as well as groups of regular army forces to Syria in anticipation of new attacks against the opposition and Free Syrian Army (FSA).

In a move unparalleled since the Iran-Iraq war, Khamenei has deployed his military on a large scale abroad.

The missile launches, coupled with the Iranian regime’s expanding role in wreaking havoc in Syria, naturally grabbed the headlines, overshadowing a no less disturbing report by the U.S. Justice Department that Iran was behind a series of cyber attacks against the U.S., targeting at least 46 companies and a dam by 2013. Now, new and stunning intelligence about the scope and depth of the Iranian regime’s investment in a cyber war against the U.S. are widening the anti-terror focus.

According to the U.S. indictment, between 2011 and 2013, hackers linked to the IRGC attacked U.S. financial institutions as well as a flood-control dam 25 miles north of New York City. Other targets included the New York Stock Exchange, Bank of America, and AT&T.

The hackers broke into the command and control system of the dam in 2013, according to Washington, and may have been able to release water from behind the dam if not for the fact that the sluice gate had been manually disconnected at the time of intrusion.

This is an unequivocal warning that the Iranian regime is preparing to mount a larger cyber attack against American infrastructure.

According to new reports from inside the Iranian regime, IRGC commander Mohammad-Ali Jafari has thrown his weight behind designating a “Cyber Force” to act as the IRGC’s “sixth force” – alongside its ground forces, navy, aerospace, extraterritorial Qods (Jerusalem) Force, and domestic Bassij militia.

The IRGC has been deeply involved in cyber warfare aimed at domestic suppression and supporting terrorists abroad since 2007. IRGC Brigadier General Hossein Hamedani (killed in late 2015 leading the charge in Syria) announced in 2010, “The Bassij cyber council has trained over 1,500 active ‘cyber jihadis,’” promising that their activities would increase in the near future.

When the IRGC’s Intelligence Organization was formed following the 2009 nationwide uprisings against the theocracy, the Cyber Army was placed under it. In November 2010, the Cyber Army claimed that it had hacked 500 sites simultaneously, while disrupting the intelligence networks and private websites of other counties.

Tehran has no intention of getting “right with the world,” as President Obama once suggested. The Iranian regime is committed to pursuing a strategic war against the U.S. and its allies. Any hopes of change in behavior are illusory at best.

Washington needs to develop a more comprehensive strategy to confront this threat before it’s too late. Since the regime’s cyber force, now targeting U.S. sites was formed to counter social protests and political activism inside Iran, America’s natural allies in this war are the Iranian people and the organized opposition.

Related: 2013: The Iranian Cyber Threat, Revisited

Statement before the U.S. House of Representatives Committee on Homeland Security/Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies

******

In 2014: As international scrutiny remains focused on the Islamic Republic of Iran’s nuclear program, a capability is developing in the shadows inside Iran that could pose an even greater threat to the United States. The 2010 National Security Strategy discusses Iran in the context of its nuclear program, support of terrorism, its influence in regional activities, and its internal problems. There was no mention of Iran’s cyber capability or of that ability to pose a threat to U.S. interests. This is understandable, considering Iran has not been a major concern in the cyber realm. Furthermore, Russia and China’s cyber activities have justifiably garnered a majority of attention and been widely reported in the media over the past decade. Iran’s cyber capabilities have been considered third-tier at best. That is rapidly changing. This report discusses the growing cyber capability of Iran and why it poses a new threat to U.S. national interests.

Iran in a Cyber Context.
      Just as computing power grows exponentially each year, so can an adversary’s cyber capabilities. When one considers the origins of world-class cyber threats to the United States, two countries immediately come to mind—Russia and China. Yet with its growing cyber capabilities and intent to use them, Iran is rapidly striving to earn a position among the ranks of this nefariously elite group. For decades, the U.S. Government has publicly acknowledged concern over Iran’s efforts to develop a nuclear program to counter U.S. military capabilities. Recently, the 2014 Quadrennial Defense Review stated that, “Over the past 5 years, a top Administration priority in the Middle East has been preventing Iran from acquiring a nuclear weapon.”2 This focus on Iran’s nuclear ambitions has distracted many from Iran’s other developing capability. In the last few years, Iran’s cyber proficiency has garnered the attention of a select few government officials and private industry leaders. In late-2011, the executive chairman of Google stated, “The Iranians are unusually talented in cyber war for some reason we don’t fully understand.”3 Stopping a cyber adversary from disrupting activity or stealing intellectual property has been the primary concern of government and private sector organizations, but in the military and intelligence communities, there are other concerns about Iran. More here.