Every Registered Voter, Personal Data Leaked

In 2014, there were 142.2 million people registered to vote in the United States, according to the U.S. Census Bureau. Forbes is reporting that a database containing 191 million voter records, which includes personal data, has been found, available for anyone to access, online by a “whitehat hacker” named Chris Vickery.

It appears that the personal details of “every registered U.S. voter” are publicly available online. When asked to pull up details on random people by Forbes, Vickery was easily and quickly able to retrieve their names, addresses, birth dates, telephone numbers, and party affiliations, with data appearing to date as early as 2000. Reportedly, no financial information or social security numbers are included in the leaked information.

Vickery has reportedly been unable to pinpoint where the data came from and who might have made it available online. Some attributes of the database led Vickery and researchers with DataBreaches.net to pursue NationBuilder, which has been said to produce similar databases in the past. NationBuilder CEO Jim Gilliam has reportedly stated that IP addresses associated with the database were not associated with the group’s customers, but that it is possible that a customer working on a “non-hosted” system could have produced it.

“From what we’ve seen, the voter information included is already publicly available from each state government so no new or private information was released in this database,” Gilliam was quoted.

A long list of potential suspected political groups have denied responsibility for the voter data leak, including NGP VAN, Political Data, L2 Political, Aristotle, and Catalist.

Vickery and DataBreaches.net were reported to have made reports with the FBI in New York. Forbes reported that the FBI recommended making a report with the Secret Service, which was said to offer no response. DataBreaches.net was said to have made reports with the California Attorney General’s office as well, according to CNET.Information contained in voter records is a matter of public record in many states. South Dakota specifies that voter information may not be placed on the Internet for “unrestricted access” or “commercial purpose.” California has some of the strictest laws protecting voter information in the country, where records are private and may only be accessed “under certain circumstances.”

“I deal with criminals every day who know my name. The thought of some vindictive criminal being able to go to this site and get my address makes me uncomfortable,” an anonymous police officer was quoted. “I’m also annoyed that people can get my voting record. Whether I vote Republican or Democratic should be my private business.”

A Twitter user pointed out that an abusive ex-spouse could use the information to locate a previous partner who does not wish to be found. For that matter, with the information available on the Internet, just about anyone can.

The exposed voter records are said not to include who the voter actually voted for, but that party affiliations are available, which may make determining who an individual likely voted for a simple task. It is noted that the information could be particularly useful during an “issues-oriented campaign.”

Just last week, Chris Vickery exposed that the personal information, including e-mail addresses, user names, and password hints of 3.3 million users registered to the website of SanrioTown.com, home to Hello Kitty, was freely available online, according to CNET. Vickery also recently found a hole allowing the personal information, including usernames and e-mail addresses, of 13 million MacKeeper users to be freely accessed online, as reported by CNET. The MacKeeper software, perhaps ironically, is a suite of security programs aimed at making Mac users safe and secure online.

*** What to be concerned with in 2016: Gartner Report

Biggest Cyber Security Threats To Watch For In 2016; Gartner Forecasts 6.8B Devices Connected To Internet Of Things In 2016

    Harriet Taylor, in a December 28, 2015 article on CNBC’s website is the latest in a series of articles on the evolving cyber threat and what may be the top cyber threats next year.  “Headless worms, machine-to-machine attacks, jailbreaking, ghostware, and two-faced malware,” top the list of key cyber threats to prepare for next year.”   In the coming year,”hackers will launch increasingly sophisticated attacks on everything from critical infrastructure, to medical devices,” said Fortinet Global Security Strategist, Derek Manky.  “We are facing an arms race in terms of security.  Every minute we sleep, we are seeing about a half a million [cyber] attack attempts that are happening in cyber space,” he added.

Here’s How The 2016 Cyber Threat Landscape Looks To Some Experts:

The rise of machine-to-machine attacks:  Research company Gartner predicts there will be 6.8B connected devices in use in 2016; a 30 percent increase over 2015.  By 2020, that number will jump to more than 20B connected devices, the company forecasts.  That would mean an average of two to three Internet-connected devices for every human being on the planet.  The sheer number of connected devices, or ‘Internet of Things (IoT), presents an unprecedented opportunity for hackers.  “We’re facing a massive problem moving forward for growing attack surface,” said Manky.

     “That’s a very large playground for attackers, and consumer and corporate information is swimming in that playground,” he said.  In its 2016 Planning Guide for Security and Risk Management, Gartner said:  “The evolution of cloud and mobile technologies, as well as the emergence [maturation?] of the IoT,’ is elevating the importance of security and risk management foundations.”

     “Smartphones present the biggest risk category going forward,” Manky believes.  “They are particularly attractive to cyber thieves because of the sheer number in use, and multiple vectors of attack, including malicious apps and web browsing;

     “We call this drive-by-attacks — websites that will fingerprint your phone when you connect to them; and, understand what that phone is vulnerable to,” Manky said,.  “Apple devices are still the most secure,” he added.  But, he also cautioned that there is no such thing as a totally safe device connected to the IoT.

Are you nurturing a headless worm?:  “The new year will likely bring entirely new [cyber] worms and viruses able to propagate from device-to-device,” predicts Fortinet.  the new year will see the first “headless worms” — malicious code — targeting “headless devices,’ such as smartwatches, smartphones, and medical hardware;”  “These are nasty bits of code that will float through millions, and millions of computers,” Manky warns.  “The largest we’ve seen to date, is about 15 million infected machines, controlled by one network — with an attack surface of 20B devices.  Certainly that number can spike to 50M, or more.  You can suddenly have a massive outage globally, in terms of all these consumer devices just simply dying and going down [dark];”

Jailbreaking the cloud:  “Expect a proliferation of attacks on the cloud, and cloud infrastructure, including so-called virtual machines, which are software-based computers.  There will be malware specifically built to crack these cloud-based systems  “Growing reliance on virtualization; and both private and hybrid clouds — will make these kind of attacks even more fruitful for cyber criminals,” according to Fortinet.  “At the same time, because apps rely on the cloud, mobile devices running compromised apps will provide a way for hackers to remotely attack public and private clouds and gain access to corporate networks.”

Hackers will use Ghostware to conceal attacks:  “As law enforcement boosts its [cyber] forensic capabilities, hackers will adapt to evade surveillance and detection,  [Stealth] malware designed to penetrate networks, steal information, then cover up its tracks will emerge in 2016.  So-called Ghostware, will make it extremely difficult for companies to track exactly how much data has been compromised, and hinder the ability of law enforcement to prosecute cyber criminals.”  

     “The attacker and the adversaries are getting much more intelligent now,” Manky said.

     “Alongside Ghostware, cyber criminals will continue to employ so-called “blastware,” which destroys and disables a system/s when detected.  “Blastware can be used to take out things like critical infrastructure, and it’s much more of a damaging attack,” he added.

     “Because attackers may circumvent preventative controls, detection and response capabilities are becoming increasingly critical,” advises Gartner in its report.

Two-Faced malware:  “Many corporations now test software in a safe environment called a sandbox, before running it on their networks.”  “A sandbox is designed  to do deeper inspection to catch some of these different ways that they’re trying to change their behaviors,” Manky said.  “It’s a very effective way to look at these new threats as we move forward.”

     “That said,” Ms. Taylor writes, “hackers in turn, are creating malevolent software that seems benign under surveillance; but, morphs into malicious code, once it’s no longer under suspicion.  It’s called……two-faced malware.”

WHAT FORTINET DID NOT ADDRESS
 
     Lots to think about with these 2016 predictions in the cyber realm.  Clearly, there is no such thing as a digital Maginot Line; and, even if there were — we all know how that worked out for France.  Stealth malware, malware that goes dormant when under surveillance; and/or changes like a chameleon, infected clouds, deceptive clouds, combat clouds, hijack clouds — one is to some degree only limited by one’s imagination.  It truly is a digital wilderness of mirrors.
     Fortinet did not address encryption and the Dark Web.  What nasty surprises will the Dark Web have for us in 2016?  Will we be able to develop something akin to a router that cleans out our pipes at home — in the digital world?  How will we ever really know if our systems are ‘clean?’  How are stay-behinds, also known as the gifts that keep on giving — likely to evolve?  What about downloading, or stealing information in an encrypted and clandestine mode?  And, one must not forget the widespread practice of denial, and deception.  How will the field of digital forensic attribution evolve?  Will it get ‘easier’ to pin the tail on the donkey?; or, more complicated and difficult?  What about the purposeful; but, sophisticated corruption of data?
    Fortinet did not address the growing threat of ransomware.  Kaspersky Labs, in  its 2016 forecast, “expects to see the success of Ransomweare to spread to new frontiers.”  “Not only does Kaspersky lab expect Ransomware to gain ground on banking trojans; but, Kaspersky also expects it to transition to other platforms; i.e., cross the rubicon — to not only target Macs; but, also charge ‘Mac prices.  Then, in the longer term, there is the likelihood of the IoT ransomware — begging the question, how much would you be willing to regain acces to your TV programming?  Your fridge?  Your car?,” Kaspersky asks.  
     Kaspersky Labs also “expects the trend of cyber ‘guns-for-hire,’ to continue to evolve and grow.”  Will we see white-hat cyber mercenaries — i.e., a different version of Anonymous — or cyber militias for hire to ‘fight’ against the bad guys?  What about black-hat cyber mercenaries, and the potential emergence of a ‘Dr. No’ in the digital world. 
Will we see the emergence of lethal, offensive cyber weapons — where the objective is to cause loss of of life?  Or, will we see the emergence of a cyber weapon of mass disruption?  A Stuxnet on steroids?  
 
    What about cyber ‘bomb damage assessment?  Can we/have we achieved the ability to conduct elegant, targeted, offensive cyber offensive operations, that do not cause excessive digital collateral damage?
 
     Will 2016 finally see a larger-scale cyber attack here in the U.S. and abroad?  
 
     Will the cyber threat to our stand-alone systems become even more profound?  It has already been demonstrated by researchers at Ben Gurion University in 2014 — that stand-alone systems could be breached using the effluent heat coming off the system.
 
     Will the cyber/digital decision tree on when to respond, how, where, why, with what, come to the fore in the strategic realm?
 
     How will cyber tradecraft evolve and mature?
     Will the Islamic State, al Qaeda, other terrorist groups attempt to launch a major cyber attack on the U.S.?
  

Muslim Brotherhood, Cameron: No Obama: Yes

The topic of the Muslim Brotherhood, the mac-daddy umbrella jihad organization globally with a terror history, Cameron is right, Obama is wrong.

The United Kingdom has an epic Islamic issue in country and the United States is a close follow. The worst part for our homeland is the UK and Europe are part of the United States visa waiver program. Travel freely, no questions asked. We must now rely on U.S. Customs and Border Patrol assigned to the UK to work the issues.

Couple Guilty Of Plotting Major Terror Attack

‘Silent Bomber’ Mohammed Rehman and his wife were days from building a bomb that would have caused multiple casualties in London.

Mohammed Rehman court case

Couple Guilty Of Terror Attack Plot

SkyNews: Would-be suicide bomber Mohammed Rehman and his wife Sana Ahmed Khan have been found guilty of planning a major terror attack in London.

Rehman, 25, had stockpiled bombmaking materials at his Reading home and using the Twitter username ‘Silent Bomber’ he asked his followers which targets they thought suitable for a massive terror attack; Westfield shopping centre or the London Underground.

Rehman used a profile picture of Jihadi John’ Mohammed Emwazi, to post: “Westfield shopping centre or London underground? Any advice would be appreciated greatly,” accompanied by a link to an al Qaida media release about the 7/7 bombings.

The same day, he searched YouTube for ‘London bombings’ and ‘Shehzad Tanweer’ – one of the 7/7 bombers who he referred to as his “beloved predecessor”.

Prosecutors claimed Rehman proved he was “intent on martyrdom” when he also tweeted: “Now I just make explosives in preparation for kuffar lol and when I’ve made the required amount I’ll be wearing them on my chest.” More details here.

So for Prime Minister David Cameron, he has work to do starting with the Muslim Brotherhood, an organization that Barack Obama remains supportive of and quite loyal.

Statement by David Cameron on the findings of the internal review to improve the government’s understanding of the Muslim Brotherhood.

I have today laid before both Houses the main findings of the internal review I commissioned in the last Parliament to improve the government’s understanding of the Muslim Brotherhood; establish whether the Muslim Brotherhood’s ideology or activities, or those of individual members or affiliates, put at risk, damaged, or risked damaging the UK’s national interests; and where appropriate inform policy.

The review involved substantial research and wide consultation including Muslim Brotherhood representatives in the UK and overseas, and an open invitation to other interested parties to submit written contributions.

It is a complex subject: the Muslim Brotherhood comprises both a transnational network, with links in the UK, and national organisations in and outside the Islamic world. The movement is deliberately opaque, and habitually secretive.

Since the authors completed their initial research in 2014, and during the course of the government’s examination of the findings, further allegations of violence carried out by supporters of the Muslim Brotherhood have surfaced, which the government will continue to investigate, taking action as appropriate.

As the Muslim Brotherhood continues to evolve, so must our understanding of it. The findings have revealed much that we did not know but work will continue to ensure we keep up to date with developments.

The government considers the following the most important findings.

The Muslim Brotherhood’s foundational texts call for the progressive moral purification of individuals and Muslim societies and their eventual political unification in a Caliphate under Sharia law. To this day the Muslim Brotherhood characterises Western societies and liberal Muslims as decadent and immoral. It can be seen primarily as a political project.

Parts of the Muslim Brotherhood have a highly ambiguous relationship with violent extremism. Both as an ideology and as a network it has been a rite of passage for some individuals and groups who have gone on to engage in violence and terrorism. It has stated its opposition to al-Qaida (AQ) but it has never credibly denounced the use made by terrorist organisations of the work of Sayyid Qutb, one of the Brotherhood’s most prominent ideologues. Individuals closely associated with the Muslim Brotherhood in the UK have supported suicide bombing and other attacks in Israel by Hamas, an organisation whose military wing has been proscribed in the UK since 2001 as a terrorist organisation, and which describes itself as the Palestinian chapter of the Muslim Brotherhood.

Moreover, despite the Egyptian Muslim Brotherhood’s public condemnation of violence in 2012/13 and afterwards, some of their supporters have been involved in violent exchanges with the security forces and other groups. Media reports and credible academic studies indicate that in the past 12 months a minority of Muslim Brotherhood supporters in Egypt have engaged alongside other Islamists in violent acts. Some senior leaders have publicly reiterated the Muslim Brotherhood’s commitment to non-violence, but others have failed to renounce the calls for retribution in some recent Muslim Brotherhood statements.

Muslim Brotherhood-associated and influenced groups in the UK have at times had a significant influence on national organisations which have claimed to represent Muslim communities (and on that basis have had a dialogue with government), charities and some mosques. But they have also sometimes characterised the UK as fundamentally hostile to Muslim faith and identity; and expressed support for terrorist attacks conducted by Hamas.

Aspects of the Muslim Brotherhood’s ideology and activities therefore run counter to British values of democracy, the rule of law, individual liberty, equality and the mutual respect and tolerance of different faiths and beliefs. The Muslim Brotherhood is not the only movement that promotes values which appear intolerant of equality and freedom of faith and belief. Nor is it the only movement or group dedicated in theory to revolutionising societies and changing existing ways of life. But I have made clear this government’s determination to reject intolerance, and to counter not just violent Islamist extremism, but also to tackle those who create the conditions for it to flourish.

The main findings of the review support the conclusion that membership of, association with, or influence by the Muslim Brotherhood should be considered as a possible indicator of extremism.

We will therefore keep under review the views that are promoted and activities that are undertaken by Muslim Brotherhood associates in the UK, in Arabic as well as English. We will consider whether any action under the Counter-Extremism Strategy or as part of our wider work may be appropriate, including action in line with the new engagement policy the government will develop to ensure central and local government does not inadvertently provide legitimacy or a platform for extremists. We will challenge extremists’ poisonous narratives and promote positive alternatives that show vulnerable people that there are better ways to get on in life.

We will continue to:

  • refuse visas to members and associates of the Muslim Brotherhood who are on record as having made extremist comments, where this would be conducive to the public good and in line with our existing policy guidelines and approach to extremism in all forms
  • seek to ensure charities that have links to the Muslim Brotherhood are not misused to support or finance the Muslim Brotherhood instead of their lawful charitable purpose
  • strengthen liaison arrangements with international partners to ensure that allegations of illicit funding or other misuse of charities are robustly investigated and appropriate action taken
  • enforce the EU asset freeze on Hamas
  • keep under review whether the views and activities of the Muslim Brotherhood meet the legal test for proscription

We will also intensify scrutiny of the views and activities that Muslim Brotherhood members, associates and affiliates (whether based in the UK or elsewhere) promote overseas. As our Counter-Extremism Strategy makes clear, insights from our overseas posts will help the government better understand drivers, networks and ideologies. We will continue to consult, and share information and analysis with, governments in the Middle East and North Africa as appropriate. We will then take further decisions and actions as needed.

 

Normalized Cuba Relations Forces 8000 Cubans on U.S.

Fusion: Sidestepping Nicaraguan intransigence, Costa Rica and five other countries have announced a secret deal to airlift some 8,000 Cuban immigrants out of Costa Rica and into El Salvador, where they’ll be put on buses and transported up to Mexico in the last leg of their harrowing 5,000-mile journey to the United States.

The decision to leapfrog Nicaragua comes nearly six weeks after the Sandinista government decided to militarize its southern border and prevent Cubans from continuing their journey north through Central America. Cuban immigrants have been piling up on the border ever since, as their numbers swelled from 1,500 to some 8,000, according to the number of temporary visas issued by Costa Rican authorities.

More details:

FoxLatino:

Central American nations have reached a deal to let the first of thousands of stranded Cuban migrants continue their journey north toward the United States next month, officials said Monday.

The humanitarian transfer will airlift an unspecified number of Cubans the first week of January from Costa Rica to El Salvador, from where they will continue by bus toward Mexico, Costa Rica’s Foreign Ministry said in a statement.

The Guatemalan government, which hosted a diplomatic meeting earlier in the day to consider the issue, described it as a “pilot” program and said a work group has been tasked with coordinating logistics.

The two governments did not immediately release further details, citing some nations’ desire for discretion on what has become a diplomatic flashpoint between Costa Rica and neighboring Nicaragua.

The number of Cubans stranded in Costa Rica has reached at least 8,000 since Nicaragua closed its border to them weeks ago. The islanders say they are trying to reach the United States, where favorable migratory policies toward Cubans mean nearly all are allowed to stay and apply for residency.

On Sunday, Pope Francis called for their plight to be resolved.

Costa Rican Foreign Minister Manuel Gonzalez said the measure will be available only to Cubans who are already in Costa Rica. Ministry spokeswoman Melissa Duran told The Associated Press it will be up to the migrants to pay the costs of their travel, but did not give more specifics.

On Dec. 18, Costa Rica stopped issuing transit visas for Cuban migrants and announced that any who arrived after that without a visa would be deported.

Cuba has seen a spike in outward migration in the year since it and Washington announced they would re-establish diplomatic ties after more than five decades of open hostility. Many Cuban migrants say they chose now to emigrate out of fear that detente could bring about an end to the U.S. policies that benefit them — although U.S. officials say no change is in the works.

Cuba and its close ally Nicaragua argue that the U.S. policies toward Cubans encourage them to attempt dangerous migratory routes and cause a brain drain on the island.

More from NPR:

A U.S. Coast Guard crew (foreground) with six Cubans who were picked up in the Florida Straits in May. A larger Coast Guard vessel is in the background. The number of Cubans trying to reach the U.S. has soared in the past year. Many Cubans believe it will be more difficult to enter the U.S. as relations improve, though U.S. officials say there will be no rule changes in the near term.

Covert Monitoring of Mosque Members Pays Off

UK Muslim ‘Disneyland Family’ Linked to Mosque of San Bernardino Terrorists

by Raheem Kassam and Liam Deacon  •  Dec 25, 2015
Cross-posted from Breitbart

The British Muslim family banned from entering the U.S. this week was on its way to meet relatives in California who prayed at the same mosque as terrorists Syed Rizwan Farook and Tashfeen Malik, who murdered 14 people in San Bernardino this month.

On Tuesday, Mohammad Tariq Mahmood, his brother, and nine of their children were pulled from a queue at Gatwick airport by British Border Agency guards and barred from traveling to the U.S. on the instruction of the country’s Homeland Security agency.

Mahmood has claimed that they were stopped from traveling to California to visit family and Disneyland merely “because they were Muslim.”

It has now been revealed that his relative in California, Muhammad Mahmood, prayed at the same mosque as U.S.-born terrorist Syed Farook and his Pakistani born wife Tashfeen – believed to be the Tablighi Jamaat-run Dar Al Uloom Islamiyah mosque.

The mosque – linked to the “Army of Darkness” group Tablighi Jamaat [TJ], which itself has historical, indirect links to multiple terrorism cases – became the centre of the investigation surrounding the San Bernardino terrorist attacks, as Breitbart News reported from the scene early in December, revealing an extraordinary refusal of the mosque’s elders to co-operate with journalists.

Muhammad Mahmood (the relative) is a U.S. citizen who runs an auto repair shop in San Bernardino. He told the BBC that he “did not know him [Syed Farook] personally” and would not have recognised the terrorist and could not recall ever speaking to him.

A comment from a Muhammad Mahmood from the same mosque just days after the attack in the Sacramento Beereads: “It’s a sad thing… There will be a backlash, of course… Guess why: I’m a brown-skinned guy with a beard who is named Muhammad.”

Tablighi Jamaat is a Deobandi revivalist movement whose mandate is, according to its leading advocate Ebrahim Rangooni, to save the Muslim world “from the culture and civilisation of the Jews and the Christians…” To this end, he has suggested cultivating “such hatred for their ways as human beings have to urine and excrement.”

On Wednesday, a British, Labour Party Member of Parliament wrote to Prime Minister David Cameron accusing Homeland Security of widespread discrimination. A spokesman for the prime minister then confirmed he was considering the issues and would respond in due course.

However, it was reported yesterday how a Facebook account, set up at the London address of the family in the name of Hamza Hussain, has listed job titles such as “supervisor at Taliban and leader at al-Qaeda.”

Furthermore, on Wednesday it was revealed that Mr. Mahmood’s brother, also traveling, had been denied entry into Israel and detained eight years ago on a “lads” trip to Middle East with a “group of older gentlemen.”

American security agencies have also confirmed the brothers “hit positive for terror checks.” A U.S. Customs and Border Protection spokesman said that currently the “religion, faith or spiritual beliefs of an international traveler are not determining factors” when deciding if a person can travel to the U.S. However, the spokesman explained, people can be denied entry for a variety of reasons including health-related issues, prior criminal convictions, security concerns, or miscellaneous grounds.

Breitbart London has previously reported on Tablighi Jamaat members performing orchestrated public relations stunts that claim institutional “Islamophobia.” In June of this year, a TJ member claimed he had been discriminated against for his Muslim name. In turned out he had hidden his affiliation with the terror-linked Markazi Masjid mosque from his curriculum vitae (resume).

***   Cleric denies ties to San Bernardino killers as phone records surface

The cleric acting as spokesman for the San Bernardino mosque where terrorist Syed Rizwan Farook worshipped claims he barely knew Farook and didn’t know his terrorist wife at all. But phone records and other evidence uncovered by federal investigators cast doubt on his story.

The FBI has questioned the cleric, Roshan Zamir Abbassi, about his phone communications with Farook — including a flurry of at least 38 messages over a two-week span in June, coinciding with the deadly Muslim terrorist attack on two military sites in Chattanooga, Tenn.

Abbassi, a Pakistani, insists he had nothing to do with the shooting at a San Bernardino County government building five miles from the mosque. While he confirms the text messages with Farook, he claims they were merely discussing food donations for his Dar-al-Uloom al-Islamiya of America mosque.

Abbassi maintained at a press conference that he didn’t know Farook any better than he knew the reporters in the room. But members of the mosque say Farook was a fixture there. He had been coming to pray and study at least three times a week for two years. In fact, he memorized the Koran there, something you cannot do without learning Arabic, a subject Abbassi teaches.

His other assertion that he never even saw Farook’s wife, Tashfeen Malik, also strains credulity. Malik joined her husband in shooting 35 of his government co-workers at a Christmas party.

“No one knows anything about his wife,” assistant imam Mahmood Nadvi agreed. “She never came to prayer.”

But longtime mosque member Gasser Shehata, who claimed to have prayed “shoulder to shoulder” with Farook, said Dar-al-Uloom prepared a chicken-and-rice dinner to celebrate the couple’s wedding last year. Reportedly, hundreds of congregants attended the walima reception, including the mosque leadership.

Asked if Farook was radicalized at the mosque, Abbassi snapped, “Never.” He said the mosque teaches only peace, insisting no one has even an “extremist idea.”

“In Islam,” he said, “we are against innocent killing.”

Abbassi recently posted a message on Facebook condemning the United States and other Western nations for their Mideast policies, arguing they are equally guilty of violence to achieve political and religious goals. His mosque’s Web page features a video claiming that the San Bernardino shooting was carried out by the US government in a “false flag conspiracy,” and that Farook and Malik were “patsies” assassinated “by government-sponsored perpetrators.”

Another person of interest is Abbassi’s brother, Mohammad Sabir Abbassi, a Muslim activist who serves as a trustee and English teacher at the San Diego mosque once headed by the late al Qaeda cleric Anwar al-Awlaki.

FBI Agent Joel Anderson said in court filings that Farook indicated he was a big fan of Awlaki and listened to a series of sermons about jihad and martyrdom called “The Hereafter.”

In his filing, Anderson says Farook studied the ultra-orthodox Islamic sect Tablighi Jamaat. US officials say the cult, with 50,000 members, is rife with jihadists, and jihadi groomers are recruiting at mosques in at least 10 states.

“We have significant presence of Tablighi Jamaat in the United States,” said Assistant FBI Director Michael Heimbach, “and we have found that al Qaeda used them for recruiting.”

Homeland Security Department veteran Philip Haney said Dar-al-Uloom was among the mosques his agency was investigating as part of a probe of the Tablighi movement.

“Individuals who were already in the case in 2012 went to that mosque,” Haney claimed in a Fox News interview.

He said he ID’d some 300 jihadists and terrorists tied to the movement in the United States before the Obama regime pulled the plug on the investigation in 2012. Known Tablighi alumni include the Lackwanna Six, the American Taliban John Walker Lindh, shoe bomber Richard Reid, dirty bomber José Padilla and would-be Brooklyn Bridge bomber Iyman Faris.

“We have nothing to hide,” Roshan Abbassi asserted.

Investigators shouldn’t take his word for it.

Retired Adm. Kirby Needs Another Day Job

Admiral John Kirby is the official spokesperson for the State Department under Secretary John Kerry. Things are real twisted in this agency and Adm. Kirby knows enough to question the media talking points and yet has joined the ranks of unsupervised liberals at the State Department with weird descriptions of achievements especially when it comes to Syria.

There are 60 million people displaced in the Middle East from their home countries especially when it comes to Syria. Russia is using old cluster bombs and hitting civilians, Bashir al Assad is using chemical weapons and Islamic State in addition to other al Qaida factions are in control of countless regions.

Where is the peace John Kerry?

State Dept.: We Brought ‘Peace’ to Syria

State Dept. counts ‘bringing peace’ to Syria as a 2015 win

The State Department is counting “bringing peace” to Syria as one of its wins in 2015.

A boastful recap of the State Department’s accomplishments, written by spokesman John Kirby, includes the bold subheadline of “Bringing Peace, Security to Syria” above a more modest entry talking about U.S. aid for those affected by the country’s turmoil and the U.S. push for a political transition from President Bashar Assad.

While Secretary of State John Kerry has played an integral role in the Syrian peace talks, the country remains embroiled in a nasty civil war and terrorized by the Islamic State.

“The United States and many members of the international community have stepped up to aid the Syrian people during their time of need — the United States has led the world in humanitarian aid contributions since the crisis began in 2011,” Kirby said.

Kirby wrote that the Syrians have “borne a heavy load” but that under Kerry’s stewardship the United Nations passed a U.S.-sponsored resolution to create a road map for Syria going forward.

The apparent declaration of a win echoes comments from President Barack Obama, who has been heavily criticized for calling the Islamic State a “JV team” in a January 2014 article and for calling the group’s territorial expansion efforts “contained,” just days before the Paris attacks.

Kirby also explicitly touched on the Islamic State, also called ISIL, saying that the U.S. is “winning [the] fight against violent extremists.”

“Although challenges remain, we have made positive strides over the last year, including in our fight against ISIL,” Kirby said. “This forward progress will only continue as more countries pledge resources to the anti-ISIL effort and as citizens around the world increasingly reject ISIL’s misguided ideology.”

Kirby cited the White House Summit on Countering Violent Extremism, hosted in February, which he called “monumental.”

Other things the State Department is counting as wins: re-establishing ties with Cuba, protecting the Arctic, clinching the Iran nuclear agreement, stopping the Ebola outbreak, committing to U.N. development goals, securing a free trade deal, preserving ocean health, and reaching the climate agreement.

How about the ‘Rape Handbook’ just published by Islamic State fighters?

New Rules:

It is not permissible for the owner of a female captive to have intercourse with her until after she has had menstrual cycle and becomes clean.
If she does not menstruate and is pregnant, he is not allowed to have intercourse with her until after she has given birth.
It is not permissible to cause her to abort if she is pregnant.
If the owner of a female captive releases her, only he can have intercourse with her and he cannot allow someone else to have intercourse with her.
If the owner of a female captive, who has a daughter suitable for intercourse, has sexual relations with the latter, he is not permitted to have intercourse with her mother and she is permanently off limits to him. Should he have intercourse with her mother then he is not permitted to have intercourse with her daughter and she is to be off-limits to him.
The owner of two sisters is not allowed to have intercourse with both of them; rather he may only have intercourse with just one. The other sister is to be had by him, if he were to relinquish ownership of the first sister by selling her, giving her away or releasing her.
If the female captive is owned by a father, his son cannot have intercourse with her and vice-versa. Moreover, intercourse with his wife’s female captive is also not permissible.
If a father had intercourse with his female captive then gave her away or sold her to his son, he is no longer permitted to have intercourse with her.
If the female captive becomes pregnant by her owner, he cannot sell her and she is released after his death.
If the owner releases his female captive then he is not permitted to have intercourse with her afterwards because she has become free and is no longer his property.
If two or more individuals are involved in purchasing a female captive, none of them are permitted to have sex with her because she is part of a joint ownership.
It is not permissible to have intercourse with a female captive during her menstrual cycle.
It is not permissible top have anal sex with a female captive.
The owner of a female captive should show compassion towards her, be kind to her, not humiliate her and not assign her work she is unable to perform.
The owner of a female captive should not sell her to an individual whom he knows will treat her badly or do unto her what Allah has forbidden.
Professor Abdel Fattah Alawari, dean of Islamic Theology at Al-Azhar University, said Islamic State has “nothing to do with Islam”.