2015: a Year of U.S. Warriors

http://www.defense.gov//News/Special-Reports/1215_yip?source=GovDelivery

Impeach John Kerry over Allegiance to Iran

Incredible…..John Kerry with the Obama administration’s approval proves more loyalty to Iran than to the United States. It is no longer deniable that Iran’s best partner is John Kerry with Barack Obama’s approval. It is all about the waiver, meaning agreements, treaties and accords have no teeth, the pen is mighty when waivers unwind objectives and our own Congress.

In part from Politico: “Has anybody in the West been targeted by any Iranian national, anybody of Iranian origin, or anyone traveling to Iran?” Zarif asked. “Whereas many people have been targeted by the nationals of your allies, people visiting your allies, and people transiting the territory of, again, your allies. So you’re looking at the wrong address.”

Zarif mentioned the 9/11 attacks, as well as the recent San Bernardino and Paris attacks. His remarks were veiled references to Saudi Arabia and Pakistan, whose citizens have been implicated in those and other lethal strikes. Neither nation is singled out in the new visa law.

Despite Kerry’s letter, the National Iranian American Council remained wary of the visa law. “It remains unclear how these steps will ensure that dual citizens are not discriminated against solely on the basis of their nationality,” the group said Sunday.

Read more: http://www.politico.com/story/2015/12/iran-visa-waivers-kerry-nuclear-deal-217014#ixzz3v93uDvMt

Iran Nuclear Deal Restricts U.S. More Than Congress Knew

By &

Members of Congress knew the Iran nuclear deal came with strings attached. They just didn’t know how many.

When the administration presented the agreement to Congress, lawmakers were told that new sanctions on Iran would violate the deal. Now the administration is trying to sidestep a recently passed provision to tighten rules on visas for those who have visited Iran.

Since the accord was struck last summer, the U.S. emphasis on complying with its end of the deal has publicly eclipsed its efforts to pressure Iran. In that time, Iranian authorities have detained two American dual nationals and sentenced a third on what most observers say are trumped up espionage charges. Iran’s military has conducted two missile tests, one of which the U.N. said violated sanctions, and engaged in a new offensive with Russia in Syria to shore up the country’s dictator, Bashar al-Assad.

In the latest example of the U.S. effort to reassure Iran, the State Department is scrambling to confirm to Iran that it won’t enforce new rules that would increase screening of Europeans who have visited Iran and plan to come to America. There is concern the new visa waiver provisions, included in the omnibus budget Congress passed last week, would hinder business people seeking to open up new ventures in Iran once sanctions are lifted.

U.S. officials confirmed over the weekend that Secretary of State John Kerry sent his Iranian counterpart, Javad Zarif, a letter promising to use executive powers to waive the new restrictions on those who have visited Iran but are citizens of countries in the Visa Waiver Program. These officials also told us that they have told Iranian diplomats that, because they are not specific to Iran, the new visa waiver provisions do not violate the detailed sequence of steps Iran and other countries committed to taking as part of the agreement. Even so, the State Department is promising to sidestep the new rule.

At issue is a provision that would require travelers who visit certain countries — including Iran, Sudan, Syria and Iraq — to apply at a U.S. Embassy for a visa before coming to the U.S., even if they are from a country for which such visas would normally be waived.

House staffers who spoke with us say Iran was included for good reason, because it remains on the U.S. list of state of sponsors of terrorism for its open support for Hezbollah and Hamas. The White House did not object until the Iranian government told the administration last week that the bill would violate the nuclear agreement, according to correspondence on these negotiations shared with us.

Since 2013, when the open negotiations with Iran began, the Obama administration has repeatedly told Congress that additional sanctions on the Islamic Republic would wreck negotiations. The resulting agreement obligates the West to lift sanctions in exchange for more transparency and limitations on Iran’s nuclear program. Iran and the White House seem to be interpreting “lift sanctions” more broadly than others expected.

“If the United States Congress cannot implement a more secure visa procedure for those who travel to state sponsors of terrorism like Iran, then the Iran deal ties the hands of lawmakers to a greater extent than even deal critics feared,” Mark Dubowitz, the executive director of the Foundation for Defense of Democracies and an expert in Iran sanctions, told us.

Over the weekend, Zarif said in an interview with al-Monitor that Iran’s inclusion on the list might violate the agreement. Zarif called the new restrictions “absurd” because no one connected to Iran was involved in the attacks in San Bernardino and Paris. He also said the provision “sends a very bad signal to the Iranians that the U.S. is bent on hostile policy toward Iran, no matter what.”

The issue is particularly sensitive for the State Department because Iran has yet to implement its side of the deal: The new transparency and limitations on the nuclear program are to begin in the coming weeks. State Department officials have said they fear more hardline elements of the regime in Tehran are trying to scuttle the deal for political advantage over President Hassan Rouhani, whose administration negotiated the accord.

In February, Iran will have parliamentary elections and elections for the powerful assembly of experts, the committee of clerics that would choose the next supreme leader of Iran after Ayatollah Ali Khamenei dies. If anti-deal elements win those elections, the future of the nuclear deal will be dim.

These factors explain why Kerry has been willing to overlook Iran’s own provocations while trying to mitigate what Iran sees as provocations from the U.S. Congress. They also explain why Iran seems so intent to provoke the U.S. at the moment it’s supposed to implement the deal to which it just agreed.

Obama Gave Clemency to 95 Convicts, Who are They

Obama gave the warning earlier this year. He also has collaborated with an outside agency on who and why he commutes their sentences.

WASHINGTON — President Barack Obama plans to grant clemency to federal offenders “more aggressively” during the remainder of his presidency, he said in a sit-down interview with The Huffington Post on Friday.

Obama has faced criticism for rarely using his power to grant pardons and commutations. In December, he commuted the sentences of eight federal drug offenders, including four who had been sentenced to life. That brought his total number of commutations to 18.

Obama said he had granted clemency so infrequently because of problems in the Justice Department’s Office of the Pardon Attorney. The former head of that office, who was appointed during the George W. Bush administration, resigned in April amid criticism from criminal justice advocates.

“I noticed that what I was getting was mostly small-time crimes from very long ago,” Obama said. “It’d be a 65-year-old who wanted a pardon to get his gun rights back. Most of them were legitimate, but they didn’t address the broader issues that we face, particularly around nonviolent drug offenses. So we’ve revamped now the DOJ office. We’re now getting much more representative applicants.”

Many of those new applications came from what’s known as the Clemency Project 2014, announced when the head of the Office of the Pardon Attorney resigned. That project, which operates independently of the government, is intended to help DOJ sort through a huge number of applicants to figure out who meets specific criteria laid out by the administration.

4 of the 95 Prisoners Obama Just Set Free Had Nothing to Do With Drug Sentences

On Friday, President Obama granted clemency to 95 convicted prisoners. The vast majority of these individuals received harsh sentences for relatively minor drug offenses. Most of them will become free men and women on April 16, 2016.

Speaking to the press, Obama said:

“Earlier today, I commuted the sentences of 95 men and women who had served their debt to society – another step forward in upholding our fundamental ideals of justice and fairness.”

While they were referred to by the media as “drug offenders,” four of the men and women included were not punished for anything having to do with drugs. Here is some background on these “Freed Four.”

George Andre Axam

Crime: possession of a firearm by a convicted felon

Sentence: 15 years in prison

Though Axam had a history of drug abuse and felony offenses, the crime for which he was imprisoned occurred in December of 2001.

After arguing with his daughter outside his Atlanta house, Axam went back inside, retrieved a gun, then went outside and reportedly aimed it at his daughter’s boyfriend, who was sitting in a car. Axam proceeded to fire “one of two shots in [the boyfriend’s] direction,” then fled into the woods when the police came after him.

Carolyn Yvonne Butler

Crime: Three counts each of armed bank robbery and using a firearm during a violent crime

Sentence: 48 years in prison

Butler robbed three banks at gunpoint in 1991 – one on June 4, another on July 10, and the third on November 22. She reportedly purchased a .25 caliber pistol in San Antonio two days before the first crime.

Though she appealed her guilty verdicts, the U.S. Court of Appeals upheld her convictions.

Jon Dylan Girard

Crime: Counterfeiting

Sentence: Six months of home confinement and three years probation

Girard, a physician in Dayton, Ohio, was convicted of counterfeiting in 2002. He was granted a full pardon by the President.

Melody Eileen Homa (née Childress)

Crime: Aiding and abetting bank fraud

Sentence: Thirty days of home confinement, three years probation, 200 hours of community service

Homa committed her crime way back in 1991. Like Girard, the presidential pardon expunged the bank fraud charges from her record.

It’s unclear why these four individuals were tapped for sentence commutation or pardon. Obama has now granted clemency to a total of 163 prisoners in 2015.

Tashfeen Malik’s Visa Application Clues to Jihad

The trained Jihad widow by al Qaeda?

In part from BusinessInsider:

Malik, who was born in Pakistan and lived in Saudi Arabia for part of her life, moved to the US after meeting Farook first online and then in person when he traveled to Mecca for a religious pilgrimage in 2013. Farook was born in the US.

Malik was allowed to enter the US on a K-1 “fiance” visa. That program is now under more scrutiny, with the US government considering stronger screening measures for applicants. The House Judiciary Committee is investigating the issuance of Malik’s visa by Homeland Security officials.

Her application lists addresses in Pakistan and Saudi Arabia, including in Punjab Province and Riyadh, where Malik has lived in the past five years.

Farook also wrote the following “intention to marry” statement as part of Malik’s visa application. In the statement, signed on January 20, 2014, Farook wrote that he and Malik “intend to marry within the first month of her arriving in the US.”

Syed Rizwan Farook marriage statementHouse Judiciary Committee

A stamp on the document shows that Malik was admitted into the US on July 27, 2014.

Malik and Farook had both reportedly been radicalized before they met.

FBI Director James Comey said at a US Senate hearing earlier this month that they discussed jihad and martyrdom before they discussed Malik coming to the US to marry Farook.

And a friend of Farook, who has since been arrested, allegedly told authorities after the attacks that he was planning other attacks with Farook in 2011 and 2012.

Malik also reportedly posted a message on Facebook pledging allegiance to the leader of the terrorist group ISIS — aka the Islamic State, ISIL, and Daesh — while the San Bernardino attack was ongoing. She and Farook died in a shootout with police later that day.

Here’s the full visa application:

Tashfeen Malik Visa Application

 

Softest Target, Powergrid: Hacked Often

Report: U.S. electrical grid hacked repeatedly over past decade

WashingtonExaminer: State-backed hackers have probed and gained control of networks in parts of the electrical grid at least a dozen times over the last decade, according to officials.

“The grid is a tough target, but a lucrative target,” Keith Alexander, a former director of the National Security Agency, told the Associated Press. “The number of sophisticated attacks is growing. There is a constant, steady upbeat.”

Intrusions have come from China, Russia and Iran. Rather than trying to inflict immediate damage, officials say, the perpetrators have been trying to probe for vulnerabilities and stow away in critical systems.

“If the geopolitical situation changes and Iran wants to target these facilities, if they have this kind of information it will make it a lot easier,” Robert Lee, a former U.S. Air Force cyberwarfare operations officer, told the AP. “It will also help them stay quiet and stealthy inside.”

One specific incident cited by the AP involved Calpine Corp., a power producer with 100 power plants operating in 18 states and Canada. Experts say that information stolen from one of Calpine’s contractors was used to gain access to the company’s systems in 2013, and added that to the best of their knowledge, the perpetrator may still have access to Calpine’s systems today.

Citing another incident, the Wall Street Journal reported on Sunday that Iranian hackers gained control over the operating system of a small dam less than 20 miles from New York City. Officials from the FBI looked into the incident at the Bowman Avenue Dam in Rye, New York, in 2013.

The Department of Homeland Security would not confirm that event, but said in a statement that it was continuing “to coordinate national efforts to strengthen the security and resilience of critical infrastructure” and “working to raise awareness about evolving threats and promote measures to reduce risks.”

Part of the problem is that the technology powering critical infrastructure is often decades old.

“Some of the control systems boot off of floppy disks,” said Patrick Miller, who formerly performed hydroelectric dam cybersecurity for the U.S. Bureau of Reclamation and Army Corps of Engineers. “Some dams have modeling systems that run on something that looks like a washing machine hooked up to tape spools. It looks like the early NASA stuff that went to the moon.”

Intelligence officials have consistently cited the nation’s critical infrastructure as its most significant modern vulnerability in cyberspace. “My No. 1 threat that I see here is the threat to our critical infrastructure,” National Counterintelligence Executive William Evanina told the Washington Examiner in November.

Adm. Mike Rogers, the director of the National Security Agency and head of U.S. Cyber Command, has expressed the same sentiment.

“It is only a matter of ‘when’ that someone uses cyber as a tool to do damage to the critical infrastructure of our nation,” Rogers said in October. “I’m watching nation-states, groups within some of that infrastructure.

“At the moment, it seems to be really focused on reconnaissance and attempting to understand the characteristics of the structure, but it’s only a matter of time I believe until someone actually does something destructive,” Rogers added.

***

How it was found?

SAN JOSE, California (AP) — Security researcher Brian Wallace was on the trail of hackers who had snatched a California university’s housing files when he stumbled into a larger nightmare: Cyberattackers had opened a pathway into the networks running the United States’ power grid.

 

Digital clues pointed to Iranian hackers. And Wallace found that they had already taken passwords, as well as engineering drawings of dozens of power plants, at least one with the title “Mission Critical.” The drawings were so detailed that experts say skilled attackers could have used them, along with other tools and malicious code, to knock out electricity flowing to millions of homes.

Wallace was astonished. But this breach, The Associated Press has found, was not unique.

About a dozen times in the last decade, sophisticated foreign hackers have gained enough remote access to control the operations networks that keep the lights on, according to top experts who spoke only on condition of anonymity due to the sensitive nature of the subject matter.

The public almost never learns the details about these types of attacks — they’re rarer but also more intricate and potentially dangerous than data theft. Information about the government’s response to these hacks is often protected and sometimes classified; many are never even reported to the government.

These intrusions have not caused the kind of cascading blackouts that are feared by the intelligence community. But so many attackers have stowed away in the largely investor-owned systems that run the U.S. electric grid that experts say they likely have the capability to strike at will.

And that’s what worries Wallace and other cybersecurity experts most.

“If the geopolitical situation changes and Iran wants to target these facilities, if they have this kind of information it will make it a lot easier,” said Robert M. Lee, a former U.S. Air Force cyberwarfare operations officer.

In 2012 and 2013, in well-publicized attacks, Russian hackers successfully sent and received encrypted commands to U.S. public utilities and power generators; some private firms concluded this was an effort to position interlopers to act in the event of a political crisis. And the Department of Homeland Security announced about a year ago that a separate hacking campaign, believed by some private firms to have Russian origins, had injected software with malware that allowed the attackers to spy on U.S. energy companies.

“You want to be stealth,” said Lillian Ablon, a cybersecurity expert at the RAND Corporation. “That’s the ultimate power, because when you need to do something you are already in place.”

The hackers have gained access to an aging, outdated power system. Many of the substations and equipment that move power across the U.S. are decrepit and were never built with network security in mind; hooking them up to the Internet over the last decade has given hackers new backdoors in. Distant wind farms, home solar panels, smart meters and other networked devices must be remotely monitored and controlled, which opens up the broader system to fresh points of attack.

Hundreds of contractors sell software and equipment to energy companies, and attackers have successfully used those outside companies as a way to get inside networks tied to the grid.

Attributing attacks is notoriously tricky. Neither U.S. officials nor cybersecurity experts would or could say if the Islamic Republic of Iran was involved in the attack Wallace discovered involving Calpine Corp., a power producer with 82 plants operating in 18 states and Canada.

Private firms have alleged other recent hacks of networks and machinery tied to the U.S. power grid were carried out by teams from within Russia and China, some with governmental support.

Even the Islamic State group is trying to hack American power companies, a top Homeland Security official told industry executives in October.

The attack involving Calpine is particularly disturbing because the cyberspies grabbed so much, according to previously unreported documents and interviews.

Cybersecurity experts say the breach began at least as far back as August 2013.

Calpine spokesman Brett Kerr said the company’s information was stolen from a contractor that does business with Calpine. He said the stolen diagrams and passwords were old — some diagrams dated to 2002 — and presented no threat, though some outside experts disagree.

Kerr would not say whether the configuration of the power plants’ operations networks — also valuable information — remained the same as when the intrusion occurred, or whether it was possible the attackers still had a foothold.

The hackers stole user names and passwords that could be used to connect remotely to Calpine’s networks, which were being maintained by a data security company. Even if some of the information was outdated, experts say skilled hackers could have found a way to update the passwords and slip past firewalls to get into the operations network. Eventually, they say, the intruders could have shut down generating stations, fouled communications networks and possibly caused a blackout near the plants.

They also took detailed engineering drawings of networks and power stations from New York to California — 71 in all — showing the precise location of devices that communicate with gas turbines, boilers and other crucial equipment attackers would need to hack specific plants.

Cylance researchers said the intruders stored their stolen goods on seven unencrypted FTP servers requiring no authentication to access details about Calpine’s plants. Jumbled in the folders was code that could be used to spread malware to other companies without being traced back to the attackers’ computers, as well as handcrafted software designed to mask that the Internet Protocol addresses they were using were in Iran.

Calpine didn’t know its information had been compromised until it was informed by Cylance, Kerr said.

Iranian U.N. Mission spokesman Hamid Babaei did not return calls or address questions emailed by AP.

Cylance notified the FBI, which warned the U.S. energy sector in an unclassified bulletin last December that a group using Iran-based IP addresses had targeted the industry.

Homeland Security spokesman SY Lee said that his agency is coordinating efforts to strengthen grid cybersecurity nationwide and to raise awareness about evolving threats to the electric sector through industry trainings and risk assessments. As Deputy Secretary Alejandro Mayorkas acknowledged in an interview, however, “we are not where we need to be” on cybersecurity.

That’s partly because the grid is largely privately owned and has entire sections that fall outside federal regulation, which experts argue leaves the sector poorly defended against a growing universe of hackers seeking to access its networks.

As Deputy Energy Secretary Elizabeth Sherwood Randall said in a speech earlier this year, “If we don’t protect the energy sector, we are putting every other sector of the economy in peril.”