Ukraine Cyber Attack on Power Grid, U.S. Warning

Ex-spy chief: Ukrainian cyberattack a warning sign for US utilities

Retired Gen. Michael Hayden, the former director of the National Security Agency and the CIA, says the US faces ‘darkening skies’ after malware linked power outages in Ukraine.

MIAMI — Former National Security Agency chief Gen. Michael Hayden warned that a recent malware attack on the Ukrainian power grid is yet another troubling sign that the US electric supply is vulnerable to hackers.

The Dec. 23 attack on utilities serving the Ivano-Frankivsk region of Ukraine appears to be the second confirmed incident of a computer-based attack to damage physical infrastructure. The attack led to blackouts throughout the region for several hours before power was restored. The Stuxnet worm that targeted the Iranian nuclear program is the only other such incident.

What happened in Ukraine is a harbinger for the kinds of cyberthreats the US faces, possibly from rival nations such as Russia and North Korea, the retired Air Force general told a crowd of critical infrastructure experts at the S4x16 security conference in Miami. General Hayden served as director of the NSA from 1999 to 2005 and served as CIA chief from 2006 to 2009.

“There a darkening sky,” he told reporters after his speech Tuesday, referring to the increasing threat of malware infections leading to physical damages. “This is another data point on an arc that we’ve long predicted,” he said, acknowledging that the Ukraine attack reinforces concerns in official circles about security of the American power grid. What’s more, he said, if early analysis of malware discovered at the Ukrainian facility that links it to Russia is accurate, the incident foreshadows a troubling uptick in the conflict between Ukraine and Russia over the disputed Crimea region.

The Department of Homeland Security has acknowledged that a version of the BlackEnergy program linked to the Ukraine attack has been discovered in US facilities. Hayden said that the link was troubling. “If they have a presence on the grid [with BlackEnergy] then they have already achieved what they need to carry out a destructive attack.”
Analysis of the malware recovered from the Ukrainian facility conducted by the security firm iSight Partners and SANS Institute revealed that a variant of BlackEnergy, dubbed “BlackEnergy3,” was present in the compromised utilities. However, security experts caution that it is premature to conclude that BlackEnergy was actually involved in the outages.

“It is possible but far too early in the technical analysis to state that,” wrote Michael Assante, who heads up industrial control system research for SANS. “Simply put, there is still evidence that has yet to be uncovered that may refute the minutia of the specific components of the malware portion of the attack.”

Hayden also remarked during his talk Friday on the general state of overall cybersecurity, calling on US lawmakers to pass legislation that will help bolster the nation’s digital defenses.

He also criticized of efforts by FBI Director James Comey, and others in the Obama administration, to weaken strong encryption on consumer devices to make it easier for law enforcement to conduct surveillance operations. “End-to-end encryption is good for America,” he said. “I know that it represents challenges for the FBI, but on balance it creates more security for Americans than the alternative – backdoors.”

Regarding the recent Office of Personnel Management hack – which US intelligence agencies and cybersecurity expert have blamed on China – Hayden said that as head of the NSA he would have absolutely stolen similar data from the Chinese government if given the opportunity. What’s more, he said, he wouldn’t have had to ask permission to carry out the operation.

“Fundamentally, the limiting factor now is a lack of legal and policy framework to do what we are capable of doing today,” Hayden said. “OPM isn’t a bad on China,” he said. “It’s a bad on us.”

What is vulnerable in the United States?

Project ‘Gridstrike’ Finds Substations To Hit For A US Power Grid Blackout

Turns out free and publicly available information can be used to determine the most critical electric substations in the US, which if attacked, could result in a nationwide blackout.

Remember that million-dollar Federal Energy Regulatory Commission (FERC) study in 2013 that found that attacks on just nine electric substations in the US could cause a blackout across the entire grid? Well, a group of researchers decided to see just what it would take for a small group of domestic terrorists to identify the US’s most critical substations — using only free and public sources of information.

While FERC relied on confidential and private information in its shocking report and spent a whopping $1 million in research, researchers at iSIGHT Partners used only so-called open-source intelligence, at a cost of just $15,000 total for 250 man-hours by their estimates. The Wall Street Journal, which obtained and first reported on the confidential FERC report, never publicly revealed the crucial substations ID’ed by FERC for obvious reasons, nor does iSIGHT plan to disclose publicly the ones it found.

Sean McBride, lead analyst for critical infrastructure at iSIGHT, says the goal of his team’s so-called “Gridstrike” project was to determine how a small local-grown terror group could sniff out the key substations to target if it were looking to cause a power blackout — either via physical means, a cyberattack, or a combination of the two. “How would an adversary go about striking at the grid?” McBride said in an interview with Dark Reading. He will speak publicly for the first time about the Gridstrike research next week at the S4x2016 ICS/SCADA conference in Miami.

The iSIGHT researchers drew from a combination of publicly available transmission substation information, maps, Google Earth, and grid congestion documentation, and drew correlations among the substations that serve the top ten cities in the US. They then were able to come up with 15 substations that serve as the backbone for much of the electric grid: knocking out those substations would result in a nationwide blackout, they say.

FERC’s report had concluded that the US could suffer a nationwide blackout if nine of the nation’s 55,000 electric transmission substations were shut down by attackers.

“We looked at maps and tried to … identify [power] generation facilities, and looked up both centers and what substations are in the middle that would make high-value targets,” for example, McBride says. “We tried to identify which substations have the highest number of transmission lines coming in and out,” as well, and weighed their significance.

The researchers shared the findings from Gridstrike with their customers as well as “organizations most interested from a defense perspective” to such attacks, says McBride, who declined to provide any further details on the specific organizations.

“We were extremely concerned about the amount of publicly available information” on the critical substations, McBride says. There were several documents available publicly that should not have been: in some cases, a sensitive document was sitting on an organization’s public website even though it specified that the report was not for public consumption.

The hope is that the findings will alert critical infrastructure and other organizations with ties to the power grid that understanding how an adversary thinks can help shore up defenses, McBride says. “They need to manage their recon exposure.”

What does all of this mean for the US power grid’s actual vulnerability to a physical or cyber-physical attack? McBride says the openly available intel is “reason for concern.” He says he worries more about the possibility of a regional, localized, grid attack targeting a city or area, than a nationwide attack.

As for the recent power blackout in the Ukraine that appears to have been due in part to a cyberattack, McBride says he’d be surprised if the attackers didn’t gather some of their reconnaissance via open source intelligence.

 

Paid Cash for Real Estate or via LLC, Read on…

Note, there are other cities where real estate money laundering occurs with frequency. They include San Diego, Los Angeles, Houston, Dallas, Las Vegas, Chicago and Atlanta.

There are guidelines for real estate professionals, click here.

Money laundering also occurs in commercial real estate, click here.

The official 21 page document on real estate money laundering is here.

Click here to see an actual case that involved a Russian.

U.S. targets money laundering in all-cash home sales in Miami, Manhattan

Reuters: The United States is hunting down international criminals who launder money through real estate deals, with the Treasury Department ordering title insurance companies to report the identities of people paying cash for high-end properties in Miami and Manhattan.

The Financial Crimes Enforcement Network, an arm of the U.S. Treasury, said on Wednesday it is concerned that individuals buy residential real estate in cash through shell companies to hide their assets and veil their identities.

“We are seeking to understand the risk that corrupt foreign officials, or transnational criminals, may be using premium U.S. real estate to secretly invest millions in dirty money,” FinCEN Director Jennifer Shasky Calvery said in a statement.

FinCEN has issued rules aimed at preventing laundering through the mortgage market, but “cash purchases present a more complex gap that we seek to address,” Calvery added.

Title insurers will have to disclose buyer identities in deals of at least $1 million in Miami and at least $3 million for Manhattan, the Miami Herald reported. FinCEN did not answer Reuters’ requests for details.

Research conducted by the Homeland Security officials suggests that the majority of real estate purchases of at least $1 million in Florida’s Miami-Dade and Broward counties are made through shell companies, said John Tobon, deputy special agent in charge at Homeland Security Investigations in Miami.

Money trails linked to drug trafficking, foreign corruption and other criminal activity often lead to luxury real estate properties, but when agents try to determine the true, or “beneficial” owners, they find only documents listing shell companies, many of which in turn are owned by other shell companies, Tobon said.

“It is a part of every single significant investigation that we have ongoing right now,” he added.

But the threshold for reporting cash purchases is so low in the two markets that it will include many mainstream buyers, said Terrence Oved, lawyer with Manhattan real estate and commercial litigation firm Oved & Oved LLP.

“You’re going to get a lot of small fish caught up in this net,” he said.

The temporary orders begin on March 1 and last 180 days, and Oved expects a surge in deals to be completed March. Buyers may turn to other major metropolitan markets such as Los Angeles, as well, he added.

In November 2015, the most recent month for which data is available, 17 percent of the 82,595 all-cash purchases of single family homes and condos went to buyers with an “LLC” in the name, according to the housing data company RealtyTrac, indicating they were purchased by companies. Altogether, a third of home purchases in the United States since 2011 were all-cash.

Meanwhile, there were about $104 billion in transactions involving foreign investors in the U.S. real estate market between April 2014 and March 2015. More than half the buyers in those deals were from China, Canada, India, Mexico, and the United Kingdom, and the majority of transactions involving overseas buyers were in cash, said Deborah Friedman, who works in the FBI’s money laundering intelligence unit, in September.

Those purchases were concentrated in Florida, Texas, Arizona and California, she said.

The Patriot Act of 2001 required the Treasury to either issue rules on anti-money laundering controls and reporting of suspicious activity by real estate professionals or grant an exemption. The exemption has been in place now for more than a decade.

The Islamic State vs. al-Qaeda

The Islamic State vs. al-Qaeda: The War within the Jihadist Movement

WotR: The post-Arab Spring period has seen extraordinary growth in the global jihadist movement. In addition to the Islamic State seizing a vast swathe of territory spanning Syria and Iraq and al-Qaeda establishing itself as a potent military force in the Syrian civil war, instability and unfulfilled expectations in numerous countries — including Egypt, Libya, Mali, Tunisia, and Yemen — have presented jihadists with unprecedented opportunities.

But even as the jihadist movement experiences rapid growth, it has also endured unprecedented internal turmoil. The Islamic State’s emergence marks the first time that leadership over the global jihadist movement has been seriously contested. Since that group’s expulsion from the al-Qaeda network in February 2014, a fierce competition between the Islamic State and al-Qaeda has defined the militant landscape. The United States has an opportunity to exploit and aggravate fissures within the jihadist community, but to do so successfully, it is essential to understand the differences in the modus operandi of these two rival jihadist groups.

Two Models of Revolutionary Warfare

Though al-Qaeda and the Islamic State share the same ultimate goal — establishing a global caliphate ruled by an austere version of sharia (Islamic law) — each group maintains a distinct approach to revolutionary warfare. Al-Qaeda has come to favor covert expansion, unacknowledged affiliates, and a relatively quiet organizational strategy designed to carefully build a larger base of support before engaging in open warfare with its foes. By contrast, the Islamic State believes that the time for a broader military confrontation has already arrived, and has loudly disseminated its propaganda to rally as many soldiers as possible to its cause. The group combines shocking violence with an effective propaganda apparatus in an effort to quickly build its base of support.

The Maoist and focoist schools of revolutionary thought provide a useful framework for understanding these groups’ differing strategies. Al-Qaeda exhibits a revolutionary strategy that is both implicitly and explicitly based on the works of Mao Tse-tung, while the Islamic State’s approach is more consonant with the focoist writings of Ernesto “Che” Guevara and Régis Debray.

Interestingly, in 2010 Kenneth Payne published an article in Studies in Conflict & Terrorism arguing that al-Qaeda’s strategy was focoist in nature, based on a review of the group’s strategic literature and operations. Though al-Qaeda has exhibited both Maoist and focoist strands of thought, the fact that Payne’s argument was published in 2010 is significant: He wrote just on the cusp of the “Arab Spring” revolutions, which, as this article details, provided al-Qaeda the opportunity to make its Maoist-style turn that focused on the population more apparent. Ryan Evans’s argument, which was published in the CTC Sentinel the same year as Payne’s piece, has held up better over time. Evans discerned a shift in strategy between the efforts of al-Qaeda in Iraq (AQI) and the later campaign of al-Qaeda in the Arabian Peninsula (AQAP), and argued that AQAP’s more population-centric approach was forged by the group’s failures in Iraq. He noted that the shift in strategy in Yemen may herald “a larger turn for al-Qaeda globally toward a more Maoist attitude.”

Mao’s theory of revolution is rooted in the primacy of politics over warfare. In Mao’s view, a steadfast political foundation is necessary to allow guerrilla forces to create bases for logistics and operations and slowly build strength and momentum for the final conventional stage of warfare. Thus, according to Mao, before guerilla forces can initiate military action, they must first focus on “arousing and organizing the people,” and “achieving internal unification politically.” This stage is followed seamlessly by a stage of progressive expansion, followed by a third and final stage of decision — the destruction of the enemy.

Maoist revolutionaries continue to emphasize the political stage of organization and consolidation even as they pursue progressive expansion. Consistent with Maoist theory, al-Qaeda and its affiliates have focused on maintaining and expanding the group’s political support. Even in areas where al-Qaeda has engaged in open warfare, it has been somewhat restrained in its approach to civilian populations since the initiation of AQAP’s campaign in 2009 that Ryan Evans noted was a departure from the group’s Iraq model of insurgency. Thereafter, the group has adopted a phased implementation of its hardline version of sharia where it enjoys control or significant influence. The only one of al-Qaeda’s branches that explicitly did not fit this new model was AQI, which later was expelled from al-Qaeda’s network and adopted the new moniker of the Islamic State. (Al-Qaeda’s approach toward civilian populations can only be considered “restrained” in very relative terms, juxtaposed with the more oppressive and publicly violent tactics of the Islamic State, and al-Qaeda’s own previous approach.) Al-Qaeda’s adherence to a largely Maoist framework was shaped by its experience of being hunted by the United States and its allies for a decade and a half, and — as Evans argued — particularly by the defeat of its Iraqi affiliate. Al-Qaeda’s use of Maoist strategy is designed to be low-risk and to yield long-term results.

The focoist approach to revolutionary war contrasts sharply with the Maoist approach. First used successfully in Cuba in the early 1950s, focoism holds that the political foundation necessary for revolution can be crafted through violence. Guevara essentially flipped Mao’s theory by arguing that the use of violence against the state would inspire the peasants to rise up. Unlike Mao’s strategy, focoism accepts great risks in order to inspire support. The Islamic State has in many ways followed the focoist model; it believes in the power of violence to forge the political opinions of the Muslim masses. The Islamic State views al-Qaeda’s more deliberate approach as too slow. It appears happy to win today and lose tomorrow, as long as today’s win creates a large enough subject for propaganda.

This framework of Maoist versus focoist models of revolutionary warfare should not be seen as a complete explanation for either al-Qaeda or the Islamic State’s behavior. Neither group is perfectly Maoist or focoist, but using these models provides a useful paradigm for interpreting the strategic competition between the groups.

Al-Qaeda’s Population-Centric Approach

Al-Qaeda has taken advantage of two major opportunities driven by the unsuccessful revolution in Syria and the successful revolutions in Tunisia, Egypt, and Libya. The first opportunity is that the regional upheaval created a growth environment for jihadism, and al-Qaeda has established a significant presence in places where it had previously been suppressed. The second opportunity is that as al-Qaeda expanded into new areas, it perceived an opening to repair its global image that had been badly damaged by AQI. Al-Qaeda has implemented a population-centric approach to increase its base of popular support by employing gradualism and cooperation with local actors. Al-Qaeda has also made use of popular front groups in its expansion. This is intended to reduce the organization’s exposure to counterinsurgent forces, including the United States and the Middle East’s Sunni regimes, and to avoid frightening or alienating local populations.

Popular support has become essential to al-Qaeda. While the group once conceptualized itself as exclusively a vanguard movement, it has come to view itself in recent years as a popular movement that needs the support or acquiescence of the populace. This transformation had begun prior to the Arab Spring. In 2005, then al-Qaeda deputy emir Ayman al-Zawahiri explained in a letter to Abu Musab al-Zarqawi, AQI’s reckless emir, that “the strongest weapon which the mujahedeen enjoy … is popular support from the Muslim masses in Iraq, and the surrounding Muslim countries. So, we must maintain this support as best we can, and we should strive to increase it.” As previously noted, AQAP’s approach in its first year of operations reflected this paradigm. But the transformation of al-Qaeda into a more broad-based movement was supercharged by the Arab Spring, which provided a critical opening for jihadism.

In the wake of those revolutions, al-Qaeda’s senior leadership pushed hard to regain the trust and support of local populations and avoid the mistakes that marred AQI’s Iraq campaign. In an undated letter that al-Qaeda’s masul aqalim (head of regions) Atiyah Abd al-Rahman wrote to Nasir al-Wuhayshi, AQAP’s emir, he noted that “the people’s support to the mujahedin is as important as the water for fish,” referencing Mao’s famous adage that “the guerrilla must move amongst the people as a fish swims in the sea.” Wuhayshi in turn transmitted a similar message to the leadership of al-Qaeda in the Islamic Maghreb, illustrating al-Qaeda’s coordinated efforts.

The most significant example of these changes came in September 2013, when Zawahiri, who became al-Qaeda’s emir following Osama bin Laden’s death in May 2011, released a document entitled “General Guidelines for Jihad” that made public al-Qaeda’s new population-centric approach. Zawahiri instructed affiliates to avoid conflict with Middle Eastern governments when possible, asserting that conflict with local regimes would distract from efforts to build bases of support. Zawahiri also instructed affiliates to minimize violent conflict with Shia and non-Muslim populations, and to abstain from attacks that could result in Muslim civilian casualties. Consonant with these changes to al-Qaeda’s operations, the organization has also launched a “rebranding” campaign (a subject we have addressed previously at War on the Rocks) designed to present the group as a more reasonable — and perhaps controllable — alternative to the Islamic State, and as a potential bulwark against Iranian encroachment.

Al-Qaeda’s strategy of covert expansion — its use of front groups and its embrace of a relatively low-key public profile — is another critical element in the group’s post-Arab Spring approach. In a letter recovered from his Abbottabad compound, bin Laden explained the rationale for preferring a low profile. He noted that when a branch’s affiliation with al-Qaeda “becomes declared and out in the open,” the group’s enemies escalate their attacks on it.

Al-Qaeda’s efforts in Tunisia exemplified its early post-Arab Spring strategy. Its expansion was spearheaded by a front organization called Ansar al-Sharia in Tunisia (AST). Several high-profile salafi jihadists who had been released from prison when the regime of dictator Zine El Abidine Ben Ali was overthrown established the group. AST initially focused its resources on dawa (evangelism) by organizing dawa events, holding public protests, and dominating physical spaces near places of worship. AST also provided services, including food, clothing, and medical care, to impoverished communities, and developed a social media apparatus to publicize its dawa activities.

AST’s emphasis on dawa was characteristic of al-Qaeda’s early post-Arab Spring strategy. The group’s ideologues understood that they would have unprecedented opportunities to disseminate salafi jihadist ideology to the public. While the old dictators placed strict restrictions on religious expression, strategists foresaw fewer restrictions in post-autocratic environments. This strategic logic was expressed by Atiyah, who in February 2011 exhorted jihadists in post-revolutionary states to “spring into action and initiate or increase their preaching, education, reformation and revitalization in light of the freedom and opportunities now available in this post revolution era.”

As AST’s dawa gained traction, the group also began to engage in hisba violence targeting those who violated salafist religious norms. AST was initially methodical in its use of violence, striking targets such as prostitutes and establishments that served alcohol — which would be widely considered acceptable by those inclined toward religious fundamentalism. Moreover, AST refrained from claiming responsibility for these hisba attacks, creating the perception that this violence was organic to the Tunisian people. Through this approach, AST ensured that its use of violence did not cross a line that would provoke a government crackdown.

As it became more entrenched, AST eventually embraced jihadist violence, first facilitating Tunisians’ travel to foreign battlefields like Syria, Libya and Mali before eventually turning its guns against the Tunisian state. AST members were implicated in the 2013 assassinations of secularist politicians Chokri Belaïd and Mohammed Brahmi. Less than a week after Brahmi’s July 2013 death, a jihadist ambush in Jebel el-Chaambi killed eight Tunisian soldiers, five of whom had their throats slit. These bloody incidents constituted a point of no return, and in August 2013 the government designated AST a terrorist organization and cracked down on the group.

It is not clear that AST’s leadership wanted the group’s violence to escalate so quickly. Indeed, it seems the group had not progressed far enough through Mao’s stages of revolutionary warfare by July 2013 to justify the initiation of open warfare. AST gave its local branches considerable autonomy, which may have contributed to violence escalating faster than the leadership wanted or anticipated. Despite this, al-Qaeda’s blueprint for Tunisia nonetheless demonstrates how its plans for the post-Arab Spring environment followed Maoist insurgent principles.

The Islamic State’s Bold, Boisterous Growth Model

The Islamic State’s strategy for supplanting al-Qaeda centers on two techniques. First, the group sought to portray al-Qaeda’s slower and more deliberate strategy as weakness and indecisiveness. Second, the Islamic State appealed to al-Qaeda’s affiliates by emphasizing its momentum and expansion with the aim of poaching groups, members, and potential recruits. In essence, the Islamic State’s approach is the opposite of al-Qaeda’s: While al-Qaeda has sought to minimize the amount of attention it receives in order to reduce its exposure to counterinsurgents, the Islamic State constantly seeks the spotlight, and touts its victories (real or invented) at every opportunity. The Islamic State is trying to transform al-Qaeda’s strategic methods into weaknesses.

One way the Islamic State has tried to distinguish itself from al-Qaeda is its approach to governance, particularly its implementation of sharia. The Islamic State’s ability to impose governance where it enjoys military power is essential to the caliphate’s legitimacy. Following its capture of territory in Iraq and Syria, the organization quickly set up governance structures and showcased its efforts to provide social services to local populations. Rather than building public support prior to fully enforcing its austere version of sharia, the Islamic State quickly implemented hudud punishments (sharia-prescribed corporal punishment). As such, coercive violence is a major component of the Islamic State’s governance. The organization has thrown people suspected of being gay off of roofs, beheaded those it deems traitors or apostates, cut off the hands of thieves, and stoned to death women accused of adultery.

By contrast, al-Qaeda and its affiliates have chosen a slower, more methodical imposition of sharia. The group’s guidelines emphasize a somewhat pragmatic approach aimed at winning over the population. Al-Qaeda leaders have instructed affiliates to tailor the implementation of sharia to local conditions, taking into consideration local customs and religious practices, and to implement sharia flexibly in its initial phases, forgiving minor transgressions during that period. Al-Qaeda’s gradualist approach has been on display in Syria, where its affiliate Jabhat al-Nusra has repealed bans on cigarette smoking, and has made public displays of punishing fighters who unjustly harm local residents. This approach should not be mistaken for moderation on Nusra’s part — there are compelling reports of the group’s continuing extremism, especially in its treatment of religious minorities — but Nusra has done a masterful job of concealing its atrocities and maintaining its local image as a populist entity.

Al-Qaeda’s population-centric approach has been a major target of derision for the Islamic State, which accuses al-Qaeda of abandoning true Islamic principles by giving “preference to popularity and rationalization.”

Overt and Covert Expansion

Military strategy is another area where the Islamic State and al-Qaeda differ. The Islamic State employs an aggressive approach to territorial conquest. The group’s willingness to employ force-on-force warfare enabled it to take major territory quickly: Overall, this tactic has borne fruit for the organization, but has also increased the Islamic State’s rate of attrition. As the Islamic State has experienced military setbacks, it has moved toward greater use of irregular warfare, a strategic shift that illustrates the group’s capacity for adaptation.

The Islamic State’s hybrid warfare strategy does not necessarily distinguish it from al-Qaeda, which has employed similar tactics in some theaters. What makes the Islamic State unique is the way it showcases its military operations, using virtually all of them as propaganda pieces. While one function of the Islamic State’s military actions is to showcase the group’s strength, al-Qaeda has systematically sought to conceal the size of its network and downplay its capabilities. The group has masked its involvement in emerging theatres of conflict and established covert relationships with unacknowledged affiliate organizations like AST.

Consequently, many analysts underestimate al-Qaeda’s strength, and counterinsurgent forces have allowed al-Qaeda front groups to thrive in some theaters. Concealing affiliates’ relationships with al-Qaeda allows these groups to gain public support and attract resources from individuals and entities that might otherwise be wary of assisting an overt al-Qaeda entity.

Al-Qaeda’s military approach and preference for more covert activities is shaped by its patient worldview. Ostentatious, tactical victories that expose the network to attack and undermine its long-term prospects are of little value to the organization from a strategic perspective. In an article published in al-Qaeda’s online magazine Resurgence, jihadist strategist Abu Ubaydah al-Maqdisi explained the rationale behind this policy of restraint:

A guerilla force may possess the capacity of inflicting huge blows on the enemy, but it may be better for it to restrain from doing so in situations when the reaction of the enemy may be overwhelming.

Essentially, al-Qaeda’s senior leadership wants the organization to slowly develop its capabilities and resources in preparation for a longer campaign. At the same time, al-Qaeda leadership instructs its affiliates to begin destabilizing state regimes. This two-pronged strategy of enhancing its capabilities and destabilizing enemy regimes positions al-Qaeda to capitalize on state weakness and collapse in the long term.

A New Jihadist Era

The Islamic State’s rise has reshaped the global jihadist landscape, which for nearly two decades was dominated by al-Qaeda. With the Islamic State seizing the world’s attention, the age of unipolarity within the jihadist movement is over, replaced by intense internal conflict. Each group is firm in the belief that its organizational model is superior to that of its opponent.

The transnational jihadist movement is likely to be shaped in the coming years by this competition. It is essential that the United States understand the two groups’ strategies and pay close attention as their approaches continue to evolve. The United States has tremendous opportunities to exploit the cleavages between the Islamic State and al-Qaeda. But if we fail to understand the two organizations’ strengths, weaknesses, and strategic and tactical postures, the jihadist movement may emerge from this period of competition stronger than before.

Daveed Gartenstein-Ross is a senior fellow at the Foundation for Defense of Democracies (FDD) and the chief executive officer of Valens Global, a consulting firm that focuses on violent non-state actors. Nathaniel Barr is the research manager at Valens Global, where Bridget Moreng is an analyst. This article was adapted from their report (co-authored with War on the Rocks senior editor Jason Fritz) Islamic State vs. Al-Qaeda: Strategic Dimensions of a Patricidal Conflict, which was published by the New America Foundation in December 2015.

RapeFugee Operation Coordinated on Social Media

It is a game and it has a name: ‘Taharrush gamea’

German Justice Minister: Cologne attacks planned in advance

Minister of Justice Heiko Maas has said he believes the sexual assaults in Cologne were ‘coordinated and prepared’ ahead of time. He also accused xenophobic groups of using the crimes to stir up hatred.

DW: Germany’s Justice Minister Heiko Maas was the latest high-profile politician to speak out about the string of sexual assaults in Cologne on Sunday. In an interview with the popular “Bild am Sonntag” newspaper, Maas voiced his suspicions that the crimes which have the whole country reeling were not the result of an opportunistic mob mentality but a thought-out, planned attack on the city’s women.

“No one can tell me that it wasn’t coordinated and prepared,” the minister said. “My suspicion is that this specific date was picked, and a certain number of people expected. This would again add another dimension [to the crimes].”

The newspaper provided details from official police reports citing the use of social networks by some north African migrant communities to encourage their fellows to join them in the square between the Cologne train station and the cathedral, where the now hundreds of incidents of molestation and pick-pocketing took place.

Maas was careful to echo his colleagues, however, when it came to warning the public against placing blame on the country’s immigrants, saying “to assume from somebody’s origin whether or not they are delinquent is quite reckless.” The minister added that it is “complete nonsense” to take these crimes as evidence that foreigners cannot be integrated into German society.

Maas lashes out at PEGIDA, AfD

In the interview, Maas also accused the far-right populists of the Alternative for Germany (AfD) party, along with the organizers of the xenophobic PEGIDA marches, of using Cologne for propaganda purposes.

“There is the only way they can explain how shamelessly they operate their sweeping campaign against foreigners,” Maas said, referring to Saturday’s PEGIDA demonstration at the Cologne train station, which was itself met with a flashmob of counter-protesters condemning racism and sexism.

All that being said, Maas added that “cultural background justifies or excuses nothing. There is no acceptable explanation [for the assaults]. For us, men and women have equal rights in all matters. Everyone who lives here must accept that.”

In the coming days, Maas’ Social Democrats (SPD) are expected to join coalition partners, Chancellor Angela Merkel’s (CDU) in presenting new laws to the Bundestag that would expedite the deportation of asylum seekers and migrants who commit crimes . The administration has received a hefty amount of criticism for ill-preparedness when dealing with the open-door policy it has adopted towards Europe’s migrant crisis.

Istanbul Suicide Bomber Entered Country as Syrian Refugee, Officials Say

Bomber identified as Nabil Fadli was fingerprinted, but information didn’t set off security alerts

WSJ: ISTANBUL—The Islamic State suicide bomber who killed 10 German tourists in the heart of Istanbul entered the country as a Syrian refugee without setting off security alerts, Turkish officials said Wednesday, highlighting concerns that extremists are using the migrant crisis to move around and carry out terrorist attacks.

Just to our North, comes 10,000 Syrian refugees in Canada.

Canada welcomes 10,000th Syrian refugee

Ottawa (AFP) – Canada has welcomed its 10,000th Syrian refugee, the government announced Wednesday, although almost two weeks behind schedule and far fewer than it had originally planned to resettle by now.

A planeload landed in Toronto late Tuesday, putting the number of arrivals of asylum seekers at 10,121 since November when Prime Minister Justin Trudeau’s Liberals took office.

In a statement, Immigration Minister John McCallum called it a “significant milestone” on the way to meeting the Liberal’s overall pledge to take in 25,000 Syrians.

“Many people have worked day and night to bring these refugees to Canada,” he said, “and Canadians have opened their communities and their hearts to welcome them.

“Canada continues to set an international example with its response to the worst refugee crisis of our time.”

Trudeau had promised during an election campaign last year to resettle 25,000 Syrian refugees by December 31.

But after assuming power the target date was pushed to the end of February, following criticism that the government was moving too fast amid security concerns in the aftermath of deadly attacks in Paris, as well as due to logistical issues.

A new interim target of taking in 10,000 by December 31 was set, but only 6,000 Syrians travelling from camps in Jordan, Lebanon, and Turkey made it onto Canadian soil by year’s end.

The UN refugee agency estimates that more than four million Syrians have fled the civil war ravaging their country. The Britain-based Syrian Observatory for Human Rights puts the total number of dead at more than 260,000 people.

 

ODNI Chief Clapper, Hacked Again

Teen Who Hacked CIA Email Is Back to Prank US Spy Chief

Motherboard: One of the “teenage hackers” who broke into the CIA director’s AOL email account last year hasn’t given up targeting government intelligence officials. His latest victim is the Director of National Intelligence James Clapper, Motherboard has learned.

A group of hackers calling themselves “Crackas With Attitude” or CWA made headlines in October, hacking into CIA Director John Brennan’s email account and apparently getting access to several online tools and portals used by US law enforcement agencies.The hackers’ exploits prompted the FBI to issue an alert warning government officials of their attacks.

One of the group’s hackers, who’s known as “Cracka,” contacted me on Monday, claiming to have broken into a series of accounts connected to Clapper, including his home telephone and internet, his personal email, and his wife’s Yahoo email. While in control of Clapper’s Verizon FiOS account, Cracka claimed to have changed the settings so that every call to his house number would get forwarded to the Free Palestine Movement. When they gained notoriety last year, Cracka and CWA claimed their actions were all in support of the Palestine cause.

“I’m pretty sure they don’t even know they’ve been hacked,” Cracka told me in an online chat.

But Brian Hale, a spokesperson for the Office of the Director of National Intelligence, confirmed the hack to Motherboard on Tuesday.

“We’re aware of the matter and we reported it to the appropriate authorities,” Hale said, declining to answer any other questions on the record. (The FBI declined to comment.)

Cracka, or whoever is pretending to be him, taunted authorities on Twitter (the hacker used a new Twitter account, not the same one he used at the time of the Brennan hack. But the hacker also is in control of a chat app account who’s been using to communicate with me since last October).
Cracka provided me with what he claimed to be Clapper’s home number. When I called it on Monday evening, I got an answer from Paul Larudee, the co-founder of the Free Palestine Movement. Larudee told me that he had been getting calls for Clapper for the last hour, after an anonymous caller told him that he had set Clapper’s number to forward calls to him. Larudee said that one of the callers said he was sitting in Clapper’s house next to his wife.

According to public records, the phone number does belong to James Clapper’s household. Cracka also provided another number, a cellphone, which he said belonged to either Clapper or Clapper’s wife, Susan. When I called, a woman picked up and I asked if this was Susan Clapper. The woman responded that Susan wasn’t there, but that she’d tell her to call me back. But nobody ever did.

Cracka also claimed to have gotten into Susan’s Yahoo email account, as well as Clapper’s email account. He provided a series of screenshots to prove he had control of their Verizon FiOS account, as well as Susan’s Yahoo account. Motherboard couldn’t independently verify the authenticity of the screenshots.

The hacker also sent me a list of call logs to Clapper’s home number. In the log, there was a number listed as belonging to Vonna Heaton, an executive at Ball Aerospace and a former senior executive at the National Geospatial-Intelligence Agency. When I called that number, the woman who picked up identified as Vonna Heaton. When I told her who I was, she declined to answer any questions.

“A journalist? Oh my gosh” she said, laughing uncomfortably. “I have somebody on the line, I’m sorry, I have no insight into that. But that’s really unfortunate, have a great day.”

“I just wanted the gov to know people aren’t fucking around, people know what they’re doing and people don’t agree #FreePalestine.”
Michael Adams, an information security expert who served more than two decades in the US Special Operations Command, said that this looks “more of a social engineering hack than a real hack,” but also added that “every serious hack starts with social engineering.”

Adams also said that it’s “insane” that Clapper doesn’t do more to hide his home address and phone number (both can be found with a Google search).

“If I’m the Director of National Intelligence of the United States of America nobody is going to know where the fuck I live, nobody is going to have my goddamn phone number or address,” Adams told me in a phone interview.

On Tuesday, Cracka asked me not to name him in the article, saying he “doesn’t like the attention.”

“You Asked why I did it,” he added. “I just wanted the gov to know people aren’t fucking around, people know what they’re doing and people don’t agree #FreePalestine.”