5G Coming with Major Risks from China

Primer: Samsung Galaxy S10 Coming with 5G Data Speeds ...

Stuart Madnick, who’s been professor of information technology at the Massachusetts Institute of Technology since 1972, tells Inverse that the FCC and ISPs are casting a double-edged sword in their rush to implement 5G.

“It’s like going from fireworks to dynamite sticks,” Madnick says. “5G encourages further evolution and expansion of Internet of Things related networks. All of the good news and bad news that comes along with this technology gets magnified.”

He’s especially concerned about the risk of denial of service attacks — or DDoS for short — becoming more powerful than ever before. One of the advertised benefits of 5G is that it will allow even more IoT devices, like refrigerators or light bulbs, to come online. This would allow users to remotely check the contents of their fridge or dim their bedroom lights using their phones, but these devices can also be harnessed for nefarious purposes.

One of the most notorious DDoS incidents in history — the 2016 Dyn cyberattack — was facilitated by unsecured IoT devices, like security cameras, printers, and baby monitors. Hacker groups Anonymous and New World Hackers allegedly took control of thousand of electronics that still had their default passwords to amass an army of zombie devices, known as a botnet.

This network was used to overwhelm the servers of internet performance management company, Dyn. Websites like Twitter, SoundCloud, Spotify, and Shopify were inaccessible for a day. Madnick believes this could happen again, to a degree that hasn’t even been imagined yet. Perhaps the biggest sites on the web will go down for days, including online blanks, or worse, the internet that controls a public utility like electricity. Perhaps the biggest sites on the web will go down for days, including online blanks, or worse, the internet that controls a public utility like electricity.

*** Related reading: Lessons Learned from WannaCry attack

How 5G will Power the Future Internet of Things - iQ by Intel

Ex-security minister Admiral Lord West calls for urgent government action after Chinese firms are banned in Australia and the US.

Security threats from Chinese companies building 5G networks could end up “putting all of us at risk” if they are not tackled quickly, according to a former security minister.

Speaking to Sky News, Admiral Lord West, a former First Sea Lord who served under Gordon Brown as a security minister, urged the government to set up a unit reporting directly to the prime minister to monitor the risk posed by Chinese equipment in 5G.

5G has been hailed as the next great leap for mobile communications, enabling everything from smart cities to hologram calls.

However, the best 5G technology comes from Chinese companies, raising the fear that China’s government could have ground-level access to – even control of – the UK’s critical data infrastructure.

“We’ve got to see there’s a risk,” Lord West said. “Yes, we want 5G, but for goodness sake we need to do all of these things to make sure it’s not putting all of us at risk.”

In April, the United States banned Chinese multinationals Huawei and ZTE – both specialists in 5G – from selling equipment to the federal government.

In August, the Australian government banned the same two firms from supplying technology for its 5G network, a decision foreign minister Marise Payne described as necessary for “the protection of Australia’s national security”.

In a statement, Huawei called the decision “politically motivated, not the result of a fact-based, transparent, or equitable decision-making process,” adding that “there is no fundamental difference between 5G and 4G network architecture… 5G has stronger guarantees around privacy and security protection than 3G and 4G”.

Robert Hannigan, former director of GCHQ, told Sky News an outright ban in the UK would not make 5G safe.

“The best companies in 5G are probably the Chinese ones and there aren’t many alternatives,” he said, before warning that new measures were needed to test the security of the network.

“We do need to find a way of scrutinising what is being installed in our network, and how it is being overseen and how it is being controlled and how it’s being upgraded in the future. And we have to find a more effective way of doing that at scale.”

In April, GCHQ’s National Cyber Security Centre warned ZTE could pose a national security risk to the UK.

Two months later, the UK’s Huawei Cyber Security Evaluation Centre, a group set up by the government to monitor the Chinese firm, announced that it had “only limited assurance” that Huawei posed no threat to national security

“It was a bit of a warning to Huawei,” said Mr Hannigan. “They needed to get better at cooperating and take this more seriously.”

The difficulty for the Huawei Cyber Security Evaluation Centre is knowing for certain that the code it vets and approves is the same code that is going into networks.

“That’s been a persistent problem,” said Mr Hannigan. “That needs more work.”

The government has put £200m into the development of 5G. Last month, the first 5G pilot centre launched in the West Midlands, testing the technology before a national roll-out.

BT, which uses Huawei to supply parts for its network, told Sky News that it would “apply the same stringent security measures and controls to 5G when we start to roll it out, in line with continued guidance from government”.

FBI Director Threat Assessment to Senate Committee

210 Billion Attacks in Q2 2018

Report Highlights Include:

  • Analysis of 151 million global cybercrime attacks and 1.6 billion bot attacks
  • 72 percent growth in mobile transactions year-on-year
  • One third of all attacks now targeting mobile
Related reading: Terrorists likely to attack U.S. with drones, says FBI director

Related reading: FBI director says bureau is investigating 5,000 terrorism cases across the world

_______________________________

Threats to the Homeland

Good morning Chairman Johnson, Ranking Member McCaskill, and members of the committee. Thank you for the opportunity to appear before you today to discuss the current threats to the United States homeland. Our nation continues to face a multitude of serious and evolving threats ranging from homegrown violent extremists (HVEs) to cyber criminals to hostile foreign intelligence services and operatives. Keeping pace with these threats is a significant challenge for the FBI. Our adversaries—terrorists, foreign intelligence services, and criminals—take advantage of modern technology to hide their communications; recruit followers; and plan and encourage espionage, cyber attacks, or terrorism to disperse information on different methods to attack the U.S. homeland, and to facilitate other illegal activities. As these threats evolve, we must adapt and confront these challenges, relying heavily on the strength of our federal, state, local, and international partnerships.

Counterterrorism

The threat posed by terrorism—both international terrorism (IT) and domestic terrorism (DT)—has evolved significantly since 9/11. Preventing terrorist attacks remains the FBI’s top priority. We face persistent threats to the homeland and to U.S. interests abroad from HVEs, domestic terrorists, and foreign terrorist organizations (FTOs). The IT threat to the U.S. has expanded from sophisticated, externally directed FTO plots to include individual attacks carried out by HVEs who are inspired by designated terrorist organizations. We remain concerned that groups such as the Islamic State of Iraq and ash-Sham (ISIS) and al Qaeda have the intent to carry out large-scale attacks in the U.S.

The FBI assesses HVEs are the greatest terrorism threat to the homeland. These individuals are global jihad-inspired individuals who are in the U.S., have been radicalized primarily in the U.S., and are not receiving individualized direction from FTOs. We, along with our law enforcement partners, face significant challenges in identifying and disrupting HVEs. This is due, in part, to their lack of a direct connection with an FTO, an ability to rapidly mobilize, and the use of encrypted communications.

In recent years, prolific use of social media by FTOs has greatly increased their ability to disseminate their messages. We have also been confronting a surge in terrorist propaganda and training available via the Internet and social media. Due to online recruitment and indoctrination, FTOs are no longer dependent on finding ways to get terrorist operatives into the United States to recruit and carry out acts of terrorism. Terrorists in ungoverned spaces—both physical and cyber—readily disseminate propaganda and training materials to attract easily influenced individuals around the world to their cause. They motivate these individuals to act at home or encourage them to travel. This is a significant transformation from the terrorist threat our nation faced a decade ago.

Despite significant losses of territory, ISIS remains relentless and ruthless in its campaign of violence against the West and has aggressively promoted its hateful message, attracting like-minded extremists. Unlike other groups, ISIS has constructed a narrative that touches on all facets of life, from family life to providing career opportunities to creating a sense of community. The message is not tailored solely to those who overtly express signs of radicalization. It is seen by many who click through the Internet every day, receive social media notifications, and participate in social networks. Ultimately, many of the individuals drawn to ISIS seek a sense of belonging. Echoing other terrorist groups, ISIS has advocated for lone offender attacks in Western countries. Recent ISIS videos and propaganda have specifically advocated for attacks against soldiers, law enforcement, and intelligence community personnel.

Many foreign terrorist organizations use various digital communication platforms to reach individuals they believe may be susceptible and sympathetic to extremist messages. However, no group has been as successful at drawing people into its perverse ideology as ISIS, who has proven dangerously competent at employing such tools. ISIS uses high-quality, traditional media platforms, as well as widespread social media campaigns to propagate its extremist ideology. With the broad distribution of social media, terrorists can spot, assess, recruit, and radicalize vulnerable persons of all ages in the U.S. either to travel or to conduct an attack on the homeland. Through the Internet, terrorists overseas now have direct access to our local communities to target and recruit our citizens and spread the message of radicalization faster than was imagined just a few years ago.

The threats posed by foreign fighters, including those recruited from the U.S., are very dynamic. We will continue working to identify individuals who seek to join the ranks of foreign fighters traveling in support of ISIS, those foreign fighters who may attempt to return to the United States, and HVEs who may aspire to attack the United States from within.

ISIS is not the only terrorist group of concern. Al Qaeda maintains its desire for large-scale spectacular attacks. However, continued counterterrorism pressure has degraded the group, and in the near term al Qaeda is more likely to focus on supporting small-scale, readily achievable attacks against U.S. and allied interests in the Afghanistan/Pakistan region. Simultaneously, over the last year, propaganda from al Qaeda leaders seeks to inspire individuals to conduct their own attacks in the U.S. and the West.

In addition to FTOs, domestic extremist movements collectively pose a steady threat of violence and economic harm to the United States. Trends within individual movements may shift, but the underlying drivers for domestic extremism—such as perceptions of government or law enforcement overreach, socio-political conditions, and reactions to legislative actions—remain constant. The FBI is most concerned about lone offender attacks, primarily shootings, as they have served as the dominant mode for lethal domestic extremist violence. We anticipate law enforcement, racial minorities, and the U.S. government will continue to be significant targets for many domestic extremist movements.

As the threat to harm the U.S. and our interests evolves, we must adapt and confront these challenges, relying heavily on the strength of our federal, state, local, and international partnerships. The FBI uses all lawful investigative techniques and methods to combat these terrorist threats to the United States. Along with our domestic and foreign partners, we collect and analyze intelligence concerning the ongoing threat posed by foreign terrorist organizations and homegrown violent extremists. We continue to encourage information sharing, which is evidenced through our partnerships with many federal, state, local, and tribal agencies assigned to Joint Terrorism Task Forces around the country. The FBI continues to strive to work and share information more efficiently, and to pursue a variety of lawful methods to stay ahead of threats to the homeland.

Intelligence

Incorporating intelligence in all we do remains a critical strategic pillar of the FBI strategy. The constant evolution of the FBI’s intelligence program will help us address the ever-changing threat environment. We must constantly update our intelligence apparatus to improve the way we collect, use, and share intelligence to better understand and defeat our adversaries. We cannot be content only to work the matters directly in front of us. We must also look beyond the horizon to understand the threats we face at home and abroad, and how those threats may be connected. We must also ensure we are providing our partners, whether in the public or private sectors, with actionable, relevant intelligence to help them address their own unique threats.

To that end, The FBI gathers intelligence, pursuant to legal authorities, to help us understand and prioritize identified threats, to reveal the gaps in what we know about these threats, and to fill those gaps. We do this for national security and criminal threats, on both national and local field office levels. We then compare the national and local perspectives to organize threats into priorities for each of the FBI’s 56 field offices. By categorizing threats in this way, we place the greatest focus on the gravest threats we face. This gives us a better assessment of what the dangers are, what is being done about them, and where we should prioritize our resources.

Given the fast pace of technological evolution, we must also focus on ensuring our information technology capabilities allow us to collect and assess information as quickly and thoroughly as possible. We must continue to deploy superior technological capabilities and solutions for large data sets, such as those derived from digital media.

Integrating intelligence and operations is part of the broader intelligence transformation the FBI has undertaken in the last decade to improve our understanding and mitigation of threats. Over the past few years, we have taken several steps to improve this integration. The FBI’s Intelligence Branch, created in August 2014, provides strategic direction and oversight of the FBI’s intelligence program and is responsible for intelligence strategy, resources, policies, and operations. Our special agents and intelligence analysts train together at the FBI Academy, where they engage in joint training exercises and take core courses together, prior to their field deployments. As a result, they are better prepared to integrate their skill sets in the field. To build on the Quantico-based training, the FBI now offers significant follow-on training courses that integrate special agents, intelligence analysts, staff operations specialists, and language analysts. Additionally, our training forums for executives and front-line supervisors continue to ensure our leaders are informed about our latest intelligence capabilities and allow them to share best practices for achieving intelligence integration.

Counterintelligence

The nation faces a rising threat, both traditional and asymmetric, from hostile foreign intelligence services and their proxies. Traditional espionage, often characterized by career foreign intelligence officers acting as diplomats or ordinary citizens, and asymmetric espionage, often carried out by students, researchers, or business people operating front companies, are prevalent. Foreign intelligence services not only seek our nation’s state and military secrets, but they also target commercial trade secrets, research and development, and intellectual property, as well as insider information from the federal government, U.S. corporations, and American universities. Foreign intelligence services and other state-directed actors continue to employ more creative and more sophisticated methods to steal innovative technology, critical research and development data, and intellectual property in an effort to erode America’s economic leading edge. These illicit activities pose a significant threat to national security and continue to be a priority and focus of the FBI.

Our counterintelligence efforts are also aimed at the growing scope of the insider threat—that is, when trusted employees and contractors use their legitimate access to steal secrets for personal benefit or to benefit a company or another country. This threat has been exacerbated in recent years as businesses have become more global and increasingly exposed to foreign intelligence organizations. We are also investigating media leaks, when federal employees and contractors violate the law and betray the nation’s trust by selectively leaking classified information, sometimes mixed with disinformation, to manipulate the public and advance their personal agendas.

In addition to the insider threat, the FBI has focused on a coordinated approach across divisions that leverages both our classic counterespionage tradecraft and our technical expertise to more effectively identify, pursue, and defeat hostile state actors using cyber means to penetrate or disrupt U.S. government entities or economic interests.

We have also continued our engagement with the private sector and academia on the threat of economic espionage and technology transfer. We have addressed national business and academic groups, met with individual companies and university leaders, worked with sector-specific groups, and encouraged all field offices to maintain close, ongoing liaison with entities across the country that have valuable technology, data, or other assets.

Cyber

Virtually every national security and criminal threat the FBI faces is cyber-based or technologically facilitated. We face sophisticated cyber threats from foreign intelligence agencies, hackers for hire, organized crime syndicates, and terrorists. These threat actors constantly seek to access and steal our nation’s classified information, trade secrets, technology, and ideas—all of which are of great importance to U.S. national and economic security. They seek to strike our critical infrastructure and to harm our economy.

As the committee is well aware, the frequency and impact of cyber attacks on our nation’s private sector and government networks have increased dramatically in the past decade and are expected to continue to grow. We continue to see an increase in the scale and scope of reporting on malicious cyber activity, which can be measured by the amount of corporate data stolen or deleted, personally identifiable information compromised, or remediation costs incurred by U.S. victims. Within the FBI, we are focused on the most dangerous malicious cyber activity: high-level intrusions by state-sponsored hackers and global organized crime syndicates, and other technically sophisticated attacks.

Botnets used by cyber criminals are one example of this trend and have been responsible for billions of dollars in damages over the past several years. The widespread availability of malicious software (malware) that can create botnets allows individuals to leverage the combined bandwidth of thousands, if not millions, of compromised computers, servers, or network-ready devices to conduct attacks. Cyber threat actors have also increasingly conducted ransomware attacks against U.S. systems by encrypting data and rendering systems unusable, thereby victimizing individuals, businesses, and even public health providers.

Cyber threats are not only increasing in scope and scale, but are also becoming increasingly difficult to investigate. Cyber criminals often operate through online forums, selling illicit goods and services, including tools that can be used to facilitate cyber attacks. These criminals have also increased the sophistication of their schemes, which are more difficult to detect and more resilient. Additionally, many cyber actors are based abroad or obfuscate their identities by using foreign infrastructure, making coordination with international law enforcement partners essential.

The FBI is engaged in a myriad of efforts to combat cyber threats, from improving threat identification and information sharing inside and outside of government, to developing and retaining new talent, to examining the way we operate to disrupt and defeat these threats. We take all potential threats to public and private sector systems seriously and will continue to investigate and hold accountable those who pose a threat in cyberspace.

Going Dark

“Going Dark” describes circumstances where law enforcement is unable to obtain critical information in an intelligible and usable form (or at all), despite having a court order authorizing the government’s access to that information. As a technical matter, this challenge extends across several products and platforms, whether it involves “data at rest,” such as on a physical device, or “data in motion,” as with real-time electronic communications.

Going Dark remains a serious problem for the FBI across our investigative areas, from counterterrorism to child exploitation, gangs, drug traffickers, and white-collar crimes. The inability to access evidence or intelligence despite the lawful authority to do so significantly impacts the FBI’s ability to identify, investigate, prosecute, or otherwise deter criminals, terrorists, and other offenders.

Our federal, state, local, and international law enforcement partners face similar challenges in maintaining access to electronic evidence despite having legal authorization to do so. Indeed, within the last few months, the nation’s sheriffs called for “the U.S. Congress to exercise leadership in the nation’s public safety interest” to address the Going Dark challenge. Several of our closest law enforcement and intelligence partners (the United Kingdom, Canada, Australia, and New Zealand) similarly described this as a “pressing international concern that requires urgent, sustained attention and informed discussion.”

The FBI recognizes the complexity of the issue, but we believe there is a tremendous opportunity for responsible stakeholders to work together to find sustainable solutions that preserve cybersecurity and promote public safety.

Weapons of Mass Destruction

The FBI, along with its U.S. government partners, is committed to countering the weapons of mass destruction (WMD) threat (e.g., chemical, biological, radiological, nuclear, and explosives) by preventing terrorist groups and lone offenders from acquiring these materials either domestically or internationally through preventing nation state proliferation of WMD sensitive technologies and expertise.

Domestically, the FBI’s counter-WMD threat program, in collaboration with our U.S. government partners, prepares for and responds to WMD threats (e.g., investigate, detect, search, locate, diagnose, stabilize, and render safe WMD threats). Internationally, the FBI, in cooperation with our U.S. partners, provides investigative and technical assistance as well as capacity-building programs to enhance our foreign partners’ ability to detect, investigate, and prosecute WMD threats.

Countering Unmanned Aircraft Systems (UAS)

The threat from unmanned aircraft systems in the U.S. is steadily escalating. While we are working with FAA and other agencies to safely integrate UAS into the national airspace system, the FBI assesses with high confidence that terrorists overseas will continue to use small UAS to advance nefarious activities and exploit physical protective measures. While there has been no successful malicious use of UAS by terrorists in the United States to date, terrorist groups could easily export their battlefield experiences to use weaponized UAS outside the conflict zone. We have seen repeated and dedicated efforts to use UAS as weapons, not only by terrorist organizations, such as ISIS and al Qaeda, but also by transnational criminal organizations such as MS-13 and Mexican drug cartels, which may encourage use of this technique in the U.S. to conduct attacks. The FBI assesses that, given their retail availability, lack of verified identification requirement to procure, general ease of use, and prior use overseas, UAS will be used to facilitate an attack in the United States against a vulnerable target, such as a mass gathering. This risk has only increased in light of the publicity associated with the apparent attempted assassination of Venezuelan President Maduro using explosives-laden UAS.

The FBI recently disrupted a plan in the United States to use drones to attack the Pentagon and the Capitol building. On November 1, 2012, Rezwan Ferdaus was sentenced to 17 years in federal prison for attempting to conduct a terrorist attack and providing support to al Qaeda. Ferdaus, who held a degree in physics, obtained multiple jet-powered, remote-controlled model aircraft capable of flying 100 miles per hour. He planned to fill the aircraft with explosives and crash them into the Pentagon and the Capitol using a GPS system in each aircraft. Fortunately, the FBI interrupted the plot after learning of it and deploying an undercover agent.

Last week, thanks in large part to the outstanding leadership of this Committee, the FBI and DOJ received new authorities to deal with the UAS threat in the FAA Reauthorization Act of 2018. That legislation enables the FBI to counter UAS threats while safeguarding privacy and promoting the safety and efficiency of the national airspace system. The FBI is grateful to the chairman, the ranking member, and other members of this committee for championing this critical authority.

Conclusion

Finally, the strength of any organization is its people. The threats we face as a nation have never been greater or more diverse and the expectations placed on the Bureau have never been higher. Our fellow citizens look to the FBI to protect the United States from all of those threats, and the men and women of the FBI continue to meet and exceed those expectations, every day. I want to thank them for their dedicated service.

The Soros Working Group Spreadsheet

Soros working group spread sheet.

This is quite the research product and will demonstrate just how pervasive chaos and activism really is. Asra Nomani of the Wall Street Journal performed intensive investigations and her work was published by the WSJ with the title ‘George Soros’s March on Washington. Now the question becomes, does this information get some cultivation by the FBI, the IRS or the Justice Department to see what laws were broken or consequence should apply? No answer at this point.

But let’s check out just one of the Soros organizations shall we? Not only is money spread around in grant form but people are too….sheesh

Anti government, anti Trump activism is here to stay. It is political insurgency…maybe even terrorism. At least those like Senator Paul and Congresman Scalise are victims of physical harm. Hillary, what about that civility thing again?

How about Ultra Violet?

Kat Barr

Chief Operating Officer

Kat is the Chief Operating Officer at UltraViolet, overseeing the organization’s internal strategy and operations. Prior to UltraViolet, Kat worked as a Campaign Director at MoveOn.org, running efforts around health care reform, women’s rights, civil liberties, and LGBTQ equality. In addition, she helped launch MoveOn’s first text message organizing program and played a role in recruiting progressives interested in running for office. Before MoveOn, Kat was the Communications Director and then the Director of Political Outreach at Rock the Vote, where she helped increase young voter turnout to record levels in 2006 and 2008. After nine years in DC, Kat relocated to Colorado, where she lives with her husband and two dogs in a beautiful small town in the Rocky Mountains. Aside from work, most of her time is spent mountain biking, doing yoga, volunteering with a local dog rescue, and taking hundreds of photographs of the amazing local wilderness.

Emma Boorboor

Deputy Organizing Director

Emma Boorboor is the Deputy Organizing Director at UltraViolet. She works closely with the Chief Campaigns Officer to manage the day to day operations of UV’s campaigns team. Emma also leads UltraViolet’s campaigns related to ending violence against women.

Prior to joining the team, Emma ran national and state level campaigns for voting rights and campaign finance reform with U.S. PIRG. She has been hooked on organizing since her first job as a field organizer with Green Corps, the Field School for Environmental Organizing. She currently lives in Philadelphia where she enjoys lots of live music and biking around the city.

Lindsay Budzynski

Executive Administrator

Lindsay is the Executive Administrator at UltraViolet. She is a long-time clinic escort  and serves on the board of directors of Chicago Abortion Fund. Prior to joining the UV team she spent over eight years in fund administration. In her free time Lindsay can be found working in her art studio, hassling her cats, and poking around flea markets.

Nita Chaudhary

Co-Founder

Nita Chaudhary is a co-founder of UltraViolet. Before founding UltraViolet, Nita was the National Campaigns and Organizing Director at MoveOn.org Political Action. As a part of that role she oversaw and managed MoveOn’s national campaigns department, including the organization’s work on health care reform, the economy and Social Security, and she supervised MoveOn’s team of Campaign Directors. During her tenure at MoveOn, Nita oversaw the fundraising program for the 2008 election, and led some of the organization’s largest campaigns including MoveOn’s work to end the Iraq war, protect constitutional liberties, and address climate change. Prior to that she was the Democratic National Committee’s first Director of Online during the 2004 cycle. She started her career at People for the American Way where she held several positions, including Media Research Analyst, Web Editor, and Online Organizer. Nita’s a native New Yorker who loves the Yankees, the Knicks and cooking Indian food.

Anathea Chino

Advancement Director

Anathea Chino is the Advancement Director at UltraViolet and leads the development team for the organization. Anathea has more than 13 years of experience in politics and fundraising at the state and national level. In Washington, D.C., she served as an Investment Advisor at Democracy Alliance and prior to that, she was the Development Director at NARAL New Mexico and a Regional Field Director for the Democratic National Committee and Democratic Party of New Mexico. Anathea currently serves on the Board of Directors and Advisory Boards of Inclusv, Americans for Indian Opportunity, and PowerPac+. She is also a co-founder of Indigenous Women Rise and a senior advisor to a Women Donors Network-funded reflective democracy project called Advance Native Political Leaders. She was also a founding board member and President of Emerge New Mexico. Anathea is an enrolled tribal member of Acoma Pueblo, NM and divides her time between Texas and New Mexico.

Pam Bradshaw Fujii

Senior Grant Writer

Pam is the Senior Grant Writer at UltraViolet. Prior to joining the team at UV, she was the Grant Writer at the Center for Constitutional Rights. Pam has a decade of experience working in human rights and social justice, where she’s done everything from fundraising to video advocacy to media relations. Pam holds a MA in Media Studies from The New School and a BA in English Literature and Film Studies from Mount Holyoke College. If Pam could be anywhere, you’d find her by the ocean with her partner, their spirited toddler and teenage dachshund.

Natalie Green

Communications Manager and Spokesperson

Natalie Green is the Communications Manager and Spokesperson at UltraViolet. Prior to joining UltraViolet, Natalie was a campaigner at Change.org where she worked with petition starters to develop national campaigns around police accountability, human rights, and political prisoners. Natalie previously worked on digital rights and technology policy issues at Public Knowledge and the Open Technology Institute.

Natalie is a New Jersey native and currently lives in Washington DC.

Susan Hildebrand

National Field Director

Susan Hildebrand is the National Field Director at UltraViolet. Prior to joining the team they acted as a consultant to Thoughtwork Inc. where they worked with developers and organizers to build tech for campaigns. Susan cut their teeth in online to offline organizing as a National Field Organizer at MoveOn.org where they built teams of activists across the Midwest to take action on issues from the election to fair taxes to stopping the foreclosure crisis. They have a B.A. in Political Science from Grinnell College and are a graduate of Green Corps: The Field School for Environmental Organizing. Outside of work, Susan enjoys rock climbing and circus arts. They are based in Chicago.

Pilar Martinez

Director of Finance

Pilar Martinez is the Director of Finance at UltraViolet, managing daily accounting functions and staff.  Pilar has more than 23 years of progressive experience in finance and management, including 20 years in the non-profit sector.  She has been with Media Matters for America since 2008 and is the Chief Financial Officer.  Prior to Media Matters for America, Pilar worked as the Finance and Administrative Director at the Center for Clean Air Policy (CCAP), served as the Controller at the National Park Foundation, and worked as the Revenue Accountant at the U.S. Holocaust Memorial Museum.  Her accounting educational background includes M.A. from George Washington University, B.A. from Strayer University, and A.A.S from Northern Virginia Community College.

Kathy Plate

Senior Online Communications Director

Kathy is the Senior Online Communications Director at Ultraviolet. Prior to joining the team, she was Digital Strategies Director at the National Gay and Lesbian Task Force. While at the Task Force, Kathy grew and strengthened the organization’s online presence around issues including marriage equality, workplace discrimination, and access to healthcare. Kathy helped revolutionize online participation with the organization’s largest annual event, the National Conference on LGBT Equality: Creating Change by introducing livestreaming, developing a conference mobile app and facilitating more robust conversations on social media. Kathy previously managed online communications for Alliance for Justice, where she worked to engage progressives in the fight for a fair judiciary. She currently lives in Southern California where she loves to take advantage of the mountain biking, rock climbing, and hiking opportunities.

Ryan Rastegar

Associate Field Director

Ryan is the Associate Field Director at UltraViolet. He engages, trains, and mobilizes UltraViolet members to take offline action on our most pressing campaigns. Throughout his career, Ryan has worked on many different progressive issues – climate change, ecological restoration, eliminating nuclear weapons, LGBTQ rights, and more – always with a concentration on grassroots organizing and mobilization. He has dedicated his professional life to helping individuals to realize their political might and training them to take collective action in ways that shifts the balance of power from the very few to many. He also sits on the advisory board of UnKoch My Campus, a national campaign to end the Koch Brothers’ unethical corporate influence within academia, where he provides mentorship and strategic digital organizing guidance. He got his start as a field organizer in Green Corps in 2008 and has been organizing ever since.

Karin Roland

Chief Campaigns Officer

Karin Roland is the Chief Campaigns Officer at UltraViolet, a powerful and rapidly growing community of people who work to expand women’s rights. She oversees campaigns and programs on issues including economic security, preventing violence against women, and women’s reproductive rights and access to health care.

Previously, Karin spent a decade working in progressive politics and campaigns. She helped fight the Iraq war and advocate for the Affordable Care Act at MoveOn.org, campaigned for marriage equality in Maine, and used online tools to help Representative Chellie Pingree (D-Maine) make her Congressional office transparent and responsive, among other endeavors. Throughout her career, she has focused on using digital media and tools to advance progressive causes.

Audine Tayag

Campaign Director

Audine is a Campaign Director at UltraViolet. Audine leads campaigns related to economic security and immigration.

Prior to joining the team, she worked for the Alliance for Citizenship in its 2013 and 2014 Comprehensive Immigration Reform campaign. As a Communications Organizer for the Alliance, she helped organizers build a year’s worth of online and offline actions and worked on high-profile campaign, “Fast for Families: A Call for Immigration Reform and Citizenship.” Audine currently lives in Los Angeles where she also spends her time organizing for Filipino migrant rights.

Shaunna Thomas

Co-Founder & Executive Director

Shaunna Thomas is co-founder and Executive Director of UltraViolet. Shaunna has had a fifteen year career in progressive organizing, building progressive infrastructure projects and winning critical policy fights at the national level. Shaunna has appeared numerous times on network and cable TV including NBC, MSNBC, CNN, and CNBC as a political commentator. Before founding UltraViolet, Shaunna was the Executive Director of the P Street Project, a 501c4 nonprofit dedicated to organizing progressive members of Congress and connecting federal legislative strategy with online grassroots mobilization efforts. Prior to that, Shaunna was the COO of Progressive Congress, a nonprofit supporting the policy and organizing work of the Congressional Progressive Caucus. Shaunna was introduced to organizing and advocacy through the 2004 presidential election, which inspired the next five years of her work at Young People For, a Project of People For the American Way Foundation dedicated to identifying, engaging and empowering the next generation of progressive leaders. Shaunna–originally from Los Angeles–is a resident of Washington, D.C.

Melody Varjavand

Senior Accountant

Melody has over 13 years of progressive experience in finance and accounting, including over 6 years in the non-profit sector. She has worked as an auditor in public accounting, and has worked on the accounting teams of Planned Parenthood of Illinois and the Adler Planetarium in Chicago. She has successfully led initiatives to develop financial processes and improve financial reporting to end users. Melody is a graduate of the University of Illinois at Urbana–Champaign and is a CPA. In her free time, she enjoys seeking out great restaurants, biking, crafting, and travel, with a goal of visiting all the national parks someday.

Holly Witherington

Director of Human Resources & Organizational Development

Holly oversees organizational operations at UltraViolet, with a primary focus on human resources, organizational culture, and staff training and development.

Prior to working at UltraViolet, Holly worked at MoveOn.org as a lead organizer on the field team. She managed staff and created programs that trained MoveOn members across the country as organizers and helped them build council structures to carry out various strategies in the field. Before MoveOn, Holly was an internal organizer with the Service Employees International Union in San Francisco, CA and Portland, OR. Holly began her organizing career in New Orleans, after Hurricane Katrina, working with communities living on the fence line of oil refineries and chemical plants.

 

 

Syrian FM Calls for Volunteer Return of Refugees

Syria’s Foreign Minister, Walid al-Moualem, told the United Nations General Assembly on Saturday that the country was ready for the voluntary return of refugees who fled during the conflict.

“We welcome any assistance with reconstruction from those countries that were not part of the aggression on Syria,” said al-Moualem, who is also the Deputy Prime Minister.

“The countries that offer only conditional assistance or continue to support terrorism, they are neither invited nor welcome to help.”

He said the conditions were fine for them to return, and he blamed “some western countries” for “spreading irrational fears” that prompted refugees to stay away.

“We have called upon the international community and humanitarian organizations to facilitate these returns,” he said. “They are politicizing what should be a purely humanitarian issue.”

The United States and the European Union have warned that there will be no reconstruction aid for Syria until there is a political agreement between Assad and the opposition to end the war.

UN diplomats say a recent agreement between Russia and Turkey to set up a buffer zone in the last major rebel stronghold of Idlib has created an opportunity to press ahead with political talks.

The Russian-Turkish deal averted a large-scale assault by Russian-backed Syrian forces on the province, where three million people live.

Moualem however stressed that the agreement had “clear deadlines” and expressed hope that military action will target jihadists including fighters from the Al-Qaeda-linked Nusra Front, who “will be eradicated.”

UN envoy Staffan de Mistura is hoping to soon convene the first meetings of a new committee comprised of government and opposition members to draft a post-war constitution for Syria and pave the way to elections.

Moualem laid out conditions for the Syrian government’s participation in the committee, saying the panel’s work should be restricted “to reviewing the articles of the current constitution,” and warned against interference.

Syria calls on US, French, Turkish forces to withdraw immediately

Syria’s foreign minister also denounced US, French and Turkish forces operating in his country as “occupying forces” and demanded that they leave immediately.

Moualem said the foreign forces were on Syrian soil illegally, under the pretext of fighting terrorism, and “will be dealt with accordingly.”

“They must withdraw immediately and without any conditions,” he told the assembly.

Meanwhile, as we don’t know the real number of Syrian refugees in the United States, it is estimated to be in the 20-30,000 range. But then there is the matter of Iran…. the fear of return remains. What is there to go to after 7 years of civil war?

Resettled refugee: 'I want to go back to Syria' - CNN Video

Iran’s Islamic Revolutionary Guard Corps fired six ballistic missiles into eastern Syria on Monday. The strike — whose efficacy is debatable — was in response to a Sept. 22 terrorist attack on a military parade in the city of Ahvaz in southwestern Iran. Both the Islamic State, or ISIS, and a local Arab resistance group took responsibility for the attack.

Why it matters: The missile strike — allegedly coupled with bombardments from unmanned aerial vehicles — targeted the town of Hajin, near the Iraqi border. Likely because of the proximity of the strike to U.S. and coalition forces in the region fighting ISIS, a U.S. military official reportedly called the strikes, “reckless, unsafe and escalatory.” According to the spokesperson for the U.S.-led coalition against ISIS, Iran also did not issue advance warning.

The background: This is the second time Iran has fired ballistic missiles at ISIS positions in Syria. In June 2017, Iran fired six short-range ballistic missiles — the same types, in fact — in response to terror attacks in Tehran. In the past year and a half, Iran has used ballistic missiles on at least three occasions to project force abroad, with Iranian Kurdish dissidents in Iraq serving as the target last month. Prior to this recent uptick, the last time Iran fired ballistic missiles outside of its territory was in 2001.

Counting all reported flight tests and military operations, Iran has launched as many as 39 ballistic missiles since agreeing to the nuclear deal in July 2015.

What’s next: A high-ranking Iranian military official claimed the missile strikes were only the “first phase” of Tehran’s broader response to the attacks. Despite pointing a finger at the U.S. and its regional partners, Iran has thus far chosen to target only ISIS.

The bottom line: In addition to displaying Iran’s missile capabilities and confidence in its missile force, these strikes indicate that Iran’s threshold for the use of ballistic missiles in military operations against foreign targets is decreasing. This means ballistic missiles will likely play a greater role in Iran’s engagements in the Middle East, making it harder to contain and deter Tehran in the region. Hat tip.

Trump Admin Trying to Get a Cyber Doctrine

October is national cyber awareness month, frankly every month and every day should be an awareness day.

octo | Office of the Chief Technology Officer

So, back in late 2017, the House passed by a voice vote H.R. 3559 – Cybersecurity and Infrastructure Security Agency Act of 2017. As you may guess, it is stalled in the Senate.

Meanwhile, in an effort to mobilize and consolidate cyber operations for the United States, there is no consensus within Congress. Should every government agency has a cyber division? Should the United States be able to perform counter cyber attacks? What kind of a cyber attack on the United States constitutes an act of war?

Just last month, Politico published a piece stating in part:

Recent reports that Russia has been attempting to install malware in our electrical grid and that its hackers have infiltrated utility-control rooms across America should constitute a significant wakeup call. Our most critical infrastructure systems are vulnerable to malicious foreign cyberactivity and, despite considerable effort, the collective response has been inadequate. As Director of National Intelligence Dan Coats ominously warned, “The warning lights are blinking red.”

A successful attack on our critical infrastructure — power grids, water supplies, communications systems, transportation and financial networks — could be devastating. Each of these is vital to our economy, health and security. One recent study found that a single coordinated attack on the East Coast power grid could leave parts of the region without power for months, cause thousands of deaths due to the failure of health and safety systems, and cost the U.S. economy almost $250 billion. Cyberattacks could also undermine our elections, either by altering our voter registration rolls or by tampering with the voting systems or results themselves.

The op-ed was written by retired General and former CIA Director David Petraeus who is arguing: “Our grab-bag approach isn’t working. Gen. David Petraeus says it’s time to go big.”

Actually, I agree with General Petraeus on his position. Last month also, John Bolton on the White House National Security Council declared that the U.S. is going on the offensive. Yet in an interesting article, Forbes offers a point and counter-point to that argument.

Last week, President Trump spoke to world leaders about how China is interfering in U.S. elections via the cyber realm. While no evidence has been offered, that is not to say there is no evidence, it is a common tactic of China. Additionally, the United States is offering robust assistance to NATO allies.

Acting to counter Russia’s aggressive use of cyberattacks across Europe and around the world, the U.S. is expected to announce that, if asked, it will use its formidable cyberwarfare capabilities on NATO’s behalf, according to a senior U.S. official.

The announcement is expected in the coming days as U.S. Defense Secretary Jim Mattis attends a meeting of NATO defense ministers on Wednesday and Thursday.

Katie Wheelbarger, the principal deputy assistant defense secretary for international security affairs, said the U.S. is committing to use offensive and defensive cyber operations for NATO allies, but America will maintain control over its own personnel and capabilities.

The decision comes on the heels of the NATO summit in July, when members agreed to allow the alliance to use cyber capabilities that are provided voluntarily by allies to protect networks and respond to cyberattacks. It reflects growing concerns by the U.S. and its allies over Moscow’s use of cyber operations to influence elections in America and elsewhere.

“Russia is constantly pushing its cyber and information operations,” said Wheelbarger, adding that this is a way for the U.S. to show its continued commitment to NATO.

Wheelbarger told reporters traveling to NATO with Mattis that the move is a signal to other nations that NATO is prepared to counter cyberattacks waged against the alliance or its members.

Much like America’s nuclear capabilities, the formal declaration of cyber support can help serve as a military deterrent to other nations and adversaries.

The U.S. has, for some time, considered cyber as a warfighting domain, much like air, sea, space and ground operations. In recent weeks the Pentagon released a new cybersecurity strategy that maps out a more aggressive use of military cyber capabilities. And it specifically calls out Russia and China for their use of cyberattacks.

China, it said, has been “persistently” stealing data from the public and private sector to gain an economic advantage. And it said Russia has use cyber information operations to “influence our population and challenge our diplomatic processes.” U.S. officials have repeatedly accused Moscow of interfering in the 2016 elections, including through online social media.

“We will conduct cyberspace operations to collect intelligence and prepare military cyber capabilities to be used in the event of a crisis or conflict,” the new strategy states, adding that the U.S. is prepared to use cyberwarfare along with other military weapons against its enemies when needed, including to counter malicious cyber activities targeting the country. Read more here.

Not to be left out is North Korea.

The Department of Homeland Security, the Department of the Treasury, and the Federal Bureau of Investigation have identified malware and other indicators of compromise used by the North Korean government in an ATM cash-out scheme—referred to by the U.S. Government as “FASTCash.” The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA.

For more information, see:

Yup, in closing…..we agree with General Petraeus….it is long overdue to go big and go NOW.