The First Drone, bin Ladin: No Trigger to Pull

The drone was a rather experimental aircraft and used for surveillance, none at the time were armed. Why? To arm a new UAV was out of the box thinking that quickly took on a new mission, the hellfire. Furthermore, even President GW Bush had to deal with a major impediment at the time, the missile treaty.

Remember the year as you listen. America has come a very long way..

WiB: Months before the 9/11 terror attacks, U.S. Air Force captain Scott Swanson was controlling a Predator drone over Afghanistan. Swanson and his team were looking for Osama Bin Laden … and they found him.

But this was months before the Predator could fire missiles. The drone operators could only watch as the terrorist leader walked away. When the military finally gave the drones weapons, Swanson became the first Predator operator fire a Hellfire missile in combat.

This week on War College, Swanson walks us through the early history of America’s killer drone program. To learn more, Swanson recommends reading Predator: The Secret Origins of the Drone Revolution by journalist Richard Whittle.

Belgium, France, Greece, Holland, Sweden, Germany, Iraq, Syria The Network

The most chilling and terrifying summary outside of the 9/11 Commission Report.

Go slow reading this and absorb it in total then consider how it can happen here at home. Has ISIS caused real fear in America? The results are here.

The inside story of the Paris and Brussels attacks

 

Unlicensed Foreign National Drivers Kill, Major Study

There is something called the ‘victims fund’ which Barack Obama and the Department of Justice have distributed funds that will shock you. Bet none of the victims below received a dime much less any recognition.

The Office for Victims of Crime (OVC), one of the seven components within the Office of Justice Programs (OJP), U.S. Department of Justice (DOJ), administers the Crime Victims Fund established under the 1984 Victims of Crime Act (VOCA) to help victims and victim service providers with program funding in accordance with OVC’s Program Plan for the fiscal year.

Thoughts?

After His Son Was Killed by Unlicensed Immigrant Driver, Dad Spent Years Compiling Data. He ‘Was Stunned at What’ He Found. (Hallowell)

Blaze/FNC: Since Drew Rosenberg was run over and killed while riding his motorcycle in San Francisco, California, on Nov. 16, 2010, by an unlicensed immigrant who reportedly came to the U.S. illegally, Drew’s father, Don, has been looking for answers.

Considering the manner in which his 25-year-old son tragically died, Rosenberg, 63, has set out on a mission to try and find out how many people die each year as a result of unlicensed drivers, launching a nonprofit to explore the issue called Unlicensed to Kill.

“I was stunned at what I found,” Rosenberg wrote on his website. “Not only were unlicensed drivers killing people in numbers only exceeded by drunk drivers, but many times they were barely being punished and many times faced no charges at all.”

***

He continued: “There are two different kinds of unlicensed drivers. There are those who have never been issued a license and those whose licensed has been suspended, revoked or expired. Over 90% of those who have never been issued a license are in this country illegally.”

Rosenberg estimates that 7,500 Americans die each year due to unlicensed drivers and that more than half of those deaths are caused by illegal immigrants. Rosenberg published his findings on his organization’s website.

But tabulating those numbers is quite difficult and ends up yielding mere estimates due to the fact that immigration statuses aren’t reported when it comes to highway deaths. Rosenberg has spent a great deal of time going through the data in an effort to parse out the stats.

Drew Rosenberg was killed by an unlicensed immigrant in 2010 (Unlicensed to Kill/Don Rosenberg)

Drew Rosenberg was killed by an unlicensed immigrant in 2010 (Unlicensed to Kill/Don Rosenberg)

“I’ve learned over time that many jurisdictions do not cite license status or immigration status when reporting these statistics, so if anything, the numbers are understated,” he told Fox News. “For example, San Francisco doesn’t report either criteria, so Drew’s death defaults to having been killed by a licensed driver who was a citizen.”

On the Unlicensed to Kill website, Rosenberg described the circumstances surrounding his son’s tragic death, noting the immediate information that he said authorities gave his family the day after the accident back in 2010.

“The next morning we met with the police inspector on the case. He told us that the driver of the car, Roberto Galo was unlicensed, in the country illegally and after killing Drew tried to flee the scene,” Rosenberg wrote. “A few days later the inspector called to tell us there was a mistake and Galo was in the country legally.”

The Center for Immigration Studies, a think tank, identified Galo as being from Honduras in a 2013 article on the matter, noting that the man was eventually arrested by U.S. Immigration and Customs enforcement.

***

“Galo is an illegal immigrant who has been living here legally since the late 1990s under a grant of Temporary Protected Status (TPS). Beneficiaries of TPS may apply for driver’s licenses; but Galo could not get one because he failed the driving test three times,” wrote Jessica Vaughan, director of policy studies for the Center for Immigration Studies.

TPS allows for some immigrants to remain in the U.S. “due to conditions in the country that temporarily prevent the country’s nationals from returning safely, or in certain circumstances, where the country is unable to handle the return of its nationals adequately.” The status is granted to some nationals of those countries “who are already in the United States.”

The situation surrounding Galo’s purported immigration status was complex, though Fox News reported that he was eventually deported in 2013 following years of legal wrangling.

ISIS Caliphate Cyber Army Next Soft Targets

 

Companies could be the next ISIS target

MarketWatch: Companies could become larger targets of pro-Islamic State hackers, according to a security company that analyzes the group’s online activity.

The hacking capabilities of ISIS, which has spread propaganda through online channels such as Facebook and Twitter, remain nascent and relatively unsophisticated, according to researchers at the New York-based intelligence company Flashpoint. But the group has gained supporters with hacking skills who are helping propel the group’s online campaigns, the researchers say.

“These are individuals that are hackers first, ISIS supporters second,” says Laith Alkhouri, cofounder and director of research and analysis for the Middle East and North Africa at Flashpoint. “This is definitely a problem in the U.S. for individual businesses, especially individually businesses that are catering to customers digitally.”

Alkhouri says the pro-ISIS hackers typically deface websites to post messages in support of the group to gain notoriety and spread their propaganda. Flashpoint tracked one pro-ISIS hacking group by the end of 2014 and since then, at least five different groups have emerged, typically by defacing their websites. It’s difficult to know the full scope and number of ISIS-backing hackers because they’re behind computers, he says.

Pro-ISIS hackers have in the last year targeted government agencies, universities, businesses and media outlets of all sizes, according to a report released in August by the Middle East Media Research Institute, a Washington, D.C.-based nonprofit. While ISIS hacking capabilities have been considered relatively unsophisticated and focused on companies that may not have a large security apparatus, some still worry the group could bring on more skilled hackers.

For example, on Aug. 8, ISIS supporters posted messages saying “i love you Islamic State & Jihad” on the website of a Cincinnati restaurant, according to the Middle East Media Research Institute. French media outlets held an emergency meeting after hack attacks on TV5Monde’s website in April 2015, according to The Guardian.

Small or medium-sized companies with amateur websites should monitor each page to ensure a subsection of the website hasn’t been defaced with pro-ISIS messages, Alkhouri says. Often, he says, companies may not immediately realize a subsection of their website has been taken over by ISIS supporters, and the message could hurt the brand among customers. Alkhouri says the group’s attacks could escalate as the hackers seek more notoriety and publicity for their acts.

One pro-ISIS hacking group claimed it planned to take down Google, according to Newsweek, but instead posted its messages on the website of an Indian company called Add Google Online.

The Pentagon has launched an online offensive against ISIS, according to reports, in an attempt to frustrate the group’s computer and phone networks.

A prominent ISIS hacker was killed in a drone strike last year, The Wall Street Journal reported, after U.S. and British officials determined he played a key role in sharpening the group’s computer skills.

*****

Meanwhile, the FBI is on the trail stemming from the attacks in Belgium where investigations of internet and electronic communications could reveal more on the cyberwar, soft targets.

FBI examining laptops linked to Belgian militants: source

Reuters: The Federal Bureau of Investigation is examining laptop computers linked to suspects in last week’s deadly Brussels bombings as investigators work to unravel the militant network behind the attacks.

The laptops arrived in the U.S. on Friday and now are being examined by FBI experts, a U.S. government source familiar with the matter said on Tuesday.

The Wall Street Journal reported on Monday that Belgian authorities had provided copies of laptop hard drives to the FBI. It is not yet clear whether FBI technicians have recovered any significant data from the equipment the Belgians turned over, the source told Reuters.

U.S. officials have pledged support for Belgian efforts to crack down on militants behind the March 22 suicide bomb attacks at a Brussels Metro station and the city’s Zaventem Airport and other recent attacks.

The death toll from the attack on the airport, and the subsequent bombing of a rush-hour metro train, rose to 35 on Monday, excluding the three men who blew themselves up.

On Saturday, President Barack Obama said the a team of FBI agents was helping investigators on the ground in Belgium.

U.S. officials have said that Belgium’s security and intelligence agencies are overstretched and also hampered by internal political, financial and cultural problems, including a linguistic divide between French and Flemish speaking investigators.

 

Another Judge Piles onto the Hillary Discovery

Judicial Watch: Second Federal Court Grants Discovery in Clinton Email Case

(Washington, DC) – Judicial Watch announced today that U.S. District Court Judge Royce Lamberth granted “limited discovery” to Judicial Watch into former Secretary of State Hillary Clinton’s email matter.  Lamberth ruled that “where there is evidence of government wrong-doing and bad faith, as here, limited discovery is appropriate, even though it is exceedingly rare in FOIA cases.”

The court’s ruling comes in a July 2014 Freedom of Information (FOIA) lawsuit seeking records related to the drafting and use of the Benghazi talking points (Judicial Watch v. U.S. Department of State (No. 1:14-cv-01242)).  The lawsuit seeks records specifically from Hillary Clinton and her top State Department staff:

Copies of any updates and/or talking points given to Ambassador Rice by the White House or any federal agency concerning, regarding, or related to the September 11, 2012 attack on the U.S. consulate in Benghazi, Libya.

Any and all records or communications concerning, regarding, or relating to talking points or updates on the Benghazi attack given to Ambassador Rice by the White House or any federal agency

Judge Lamberth granted Judicial Watch’s Motion for Discovery, which was filed in opposition to the State Department’s Motion for Summary Judgement.  The court ruled:

An understanding of the facts and circumstances surrounding Secretary Clinton’s extraordinary and exclusive use of her “clintonemail.com” account to conduct official government business, as well as other officials’ use of this account and their own personal e-mail accounts to conduct official government business is required before the Court can determine whether the search conducted here reasonably produced all responsive documents. Plaintiff is certainly entitled to dispute the State Department’s position that it has no obligation to produce these documents because it did not “possess” or “control” them at the time the FOIA request was made. The State Department’s willingness to now search documents voluntarily turned over to the Department by Secretary Clinton and other officials hardly transforms such a search into an “adequate” or “reasonable” one.  Plaintiff is not relying on “speculation” or “surmise” as the State Department claims.  Plaintiff is relying on constantly shifting admissions by the Government and the former government officials.  Whether the State Department’s actions will ultimately be determined by the Court to not be “acting in good faith” remains to be seen at this time, but plaintiff is clearly entitled to discovery and a record before this Court rules on that issue.

The Court must observe that the Government argues in its opposition memorandum that “the fact that State did not note that it had not searched Secretary Clinton’s e-mails when it responded to Plaintiffs FOIA request … was neither a misrepresentation nor material omission, because these documents were not in its possession and control when the original search was completed.”  The Government argues that this does not show a lack of good faith, but that is what remains to be seen, and the factual record must be developed appropriately in order for this Court to make that determination.

Today’s ruling refers to U.S. District Court Emmett Sullivan’s decision to grant Judicial Watch discovery on the Clinton email matter in separate litigation:

Briefing is ongoing before Judge Sullivan.  When Judge Sullivan issues a discovery order, the plaintiff shall — within ten days thereafter–file its specific proposed order detailing what additional proposed discovery, tailored to this case, it seeks to have this Court order. Defendant shall respond ten days after plaintiff’s submission.

Judge Sullivan is expected to rule on Judicial Watch’s discovery plan after April 15.  Judicial Watch’s discovery plan seeks the testimony of eight current and former State Department officials, including top State Department official Patrick Kennedy, former State IT employee Bryan Pagliano, and Clinton’s two top aides at the State Department:  Cheryl Mills and Huma Abedin.

“This remarkable decision will allow Judicial Watch to explore the shifting stories and misrepresentations made by the Obama State Department and its current and former employees,” stated Judicial Watch President Tom Fitton.  “This Benghazi litigation first uncovered the Clinton email scandal, so it is good to have discovery in this lawsuit which may help the American people find out why our efforts to get Benghazi answers was thwarted by Clinton’s email games.”

###