Omar Terrorist Went to Saudi via NYU

The boom happened already, how long has it been going on? And what are they really teaching and how is this promoted? It is called Tablighi Jama’at.

 

Harvard? Uh huh:

The Prince Alwaleed Bin Talal Islamic Studies Program At Harvard University

The Prince Alwaleed Bin Talal Islamic Studies Program promotes the scholarly study of Islam and the Muslim world in a broadly interdisciplinary context.

Department of Middle Eastern Studies

Established in 1997, the program in Islamic Studies is undergirded by the University’s belief that Islamic religion, culture and history are important areas of inquiry, and that students should be able to pursue such inquiry as a part of their undergraduate education.  At present, the University of Texas at Austin is one of only a handful of four-year institutions in the U.S. that offer Islamic Studies as an independent major; it is the only such program in the state of Texas.

Islamic Studies in U.S. Universities

As in Europe, Islamic studies in the U.S. originated in the tradition of Orientalist scholarship and Christian theology, with its strong textual emphasis, but it has gradually expanded to overlap with Middle East area studies as well as a number of humanistic and social science disciplines, especially religious studies.1 Over the past several decades, and especially since 9/11, scholarly interest in Islamic studies has mushroomed. This interest is visible in the number of doctoral dissertations produced on Islam and Muslims over the past half-century. Read more from Charles Kurzman and Carl W. Ernst University of North Carolina at Chapel Hill.

****

Orlando Shooter Traveled to Saudi Arabia on Trip Organized By NYU Center

University spokesman says Omar Mateen and three others thought to be family members joined tour group on 2012 trip

Mateen and three others believed to be his family members joined a tour group that was organized by the Islamic Center at New York University, university spokesman John Beckman said.

International students continue to seek out the chance to enroll in Islamic universities and colleges in the US. Islamic colleges provide incredible education to international students who are looking to both advance their education while exploring deeper into their faith. Islamic universities seek to educate their students about the history of their religion as well as continue to build their faith and education for the future.

Islamic Education

The Islamic education main purpose is to educate Muslim students in the United States about the Quran as well as the deep rooted Muslim traditions, known as Sunnah. Islamic colleges are private institution based deep rooted aspects of the faith spread throughout the United States. All of these Islamic colleges share the same message and curriculum. Like most private religious colleges, Islamic universities in America instill an interdisciplinary curriculum with very challenging academic and extracurricular activities. Islamic schools also pride themselves in having incredible faculty and staff who are among the top Muslim educators and scholars in the world. Islamic universities in America follow the teachings of the Quran and their prophet Muhammad. Islamic teachings are the backbone of their universities, with values like knowledge being the upmost important. Islamic colleges seek to turn students into upstanding members of the Muslim community, preparing them for a life of leadership and devotion to their community and their religion. While not all students are expected to be practicing Muslims when they arrive at such a university, they all are expected to follow the basic teachings of the Quran as well as exploring the religion and its customs. Islamic universities seek to make the education affordable for potential students, while also being thoroughly available to all people. Though education is the main fixture for Islamic universities, improving the human experience is a very important function. Islamic colleges in America continue to educate international students and domestic students alike for decades.

Goals of Islamic Colleges and Universities in America

The goals of Islamic universities in America are much like those of any other religious university in the US. The first goal is to educate students on all aspects of the Islamic knowledge. In addition, these universities look to educate students in the proper methods of Islam in order to perform wholly as a Muslim each day. Students are also groomed to be great embers of their community and parish, while providing students with an unwavering sense of knowledge. Like most colleges, the curriculum is based on a four year plan with 120 credits. While each university differs, most Islamic universities push students to major in some sort of Islamic studies area.

Top Islamic Universities in America

There are several Islamic colleges and universities spread throughout the United States which teach a number of different students. While they contain some of the best academics of any college, finding these colleges are quite a bit more challenging. One Islamic college, the Islamic College of Minnesota educates many students. The college has both a graduate and undergraduate section, but only educate students in one major: Islamic Studies.

The Islamic American University is one of the most renowned Islamic colleges in the US. The IAU has several different campuses spread throughout the US in many different states. In addition, the university offers several different online programs for students. An important aspect for international students is to make sure that any classes they have taken transfer into the university, and as well be sure to check into the accreditation of any such college. Islamic education is exceptional in many facets. These universities regularly put out top Islamic leaders in the community and enroll top level international students.

International students will truly enjoy the experiences at these great universities. With a strong education, a diverse and intellectual student body as well as a curriculum based on multiple disciplines and the overall educational experience, international students can find true success in these top universities. Islamic universities are committed to bringing the best education to international students so that they can seek to educate the world with their values of equality and service.

This is the End of Integrity for the VA

Curious, but factual, it comes down to protecting the unions at the VA. Some locations operate with four unions, while the larger VA facilities have five unions, the worst being SEIU.

This is the reason, the Department of Justice is protecting legal actions at the VA and wont allow the FBI to do deeper investigations for fraud, waste and corruption. Need more proof?

Top VA benefits official Pummill retires

636016843173538200-AP-16168610141426.jpg

AirForceTimes: Danny Pummill, who took over the post last October, said in a letter to VBA employees that he had planned to retire from his deputy post in 2015 but remained on the job after being asked to oversee the agency. The retired Army colonel has worked at VA since 2010.

The job of overseeing $90 billion in veterans benefits and dozens of regional offices nationwide now falls to acting principal deputy undersecretary Tom Murphy, who has been serving in that role since Pummill’s promotion last fall.

Pummill was suspended for two weeks in March for “lack of oversight” in a relocation scandal involving two other high-ranking VA administrators, a reprimand that irritated some lawmakers who wanted harsher punishment for what appeared to be unwarranted promotions for longtime bureaucrats. Read full summary here.

 

VA won’t use its fast-track firing powers anymore

MilitaryTimes: Veterans Affairs officials will stop using streamlined disciplinary powers to punish senior department executives after another legal challenge to the congressionally backed process, Capitol Hill officials said Friday.

The move all but resets VA accountability rules to two years ago, when the expedited removal authority was approved by lawmakers in the wake of the department’s wait times scandal.

It also provides new urgency for a series of VA-related accountability bills stalled in Congress, given elected officials’ belief that department leaders have not been aggressive enough in dealing with misbehavior and possible criminal activity among VA employees.

Senate Veterans’ Affairs Committee Chairman Johnny Isakson, R-Ga., called the department’s decision infuriating.

“It is outrageous and unconscionable that the VA is choosing to blatantly ignore all of the accountability reforms set in place by the Veterans Choice Act,” he said. “Two years ago, veterans were forced to wait far too long for care because of incompetent executives. Since then, we’ve seen scandal after scandal emerge at the department.

“While some progress has been made to hold bad actors accountable, there is still a long way to go and choosing to ignore these key reforms is a slap in the face to our veterans.”

VA leaders have long complained about the value of the new disciplinary powers, noting that as written they apply only to a small segment of department employees — senior executives — and create problematic legal questions about appeals.

Only a few individuals have been disciplined under the rules, and the Merit Systems Protection Board has overturned proposed punishment in several other cases.

Earlier this month, U.S. Attorney General Loretta Lynch said the new law speeding up executive firings is unconstitutional because it does not afford those workers proper appeals. The VA decision to dump the entire accountability process passed in 2014 comes as a direct result of that Justice Department stance.

Isakson said the announcement should be seen as a call for Congress to act quickly on new legislation.

“I am not going to stand by and watch the VA continue to look the other way while another one of its own gets away with egregious misconduct at the expense of veterans’ access to quality care and services,” he said.

Earlier this year Isakson introduced a sweeping veterans reform measure which includes new disciplinary rules, including a provision to requiring all appeals by executives to be heard by the VA secretary, and not an outside arbiter.

It would also grant other expedited firing and hiring authorities for more VA employees, and shorten the appeals process for every VA worker.

VA leaders have voiced support for the bill. Federal union officials have have objected to the provisions as too harsh, while congressional critics have labeled the plan too lenient. Isakson had hoped to move the measure through his chamber last month, but the legislation has remained stalled.

House lawmakers last summer passed a new VA accountability act along party lines, with revised whistleblower protections and different appeals provisions. That legislation has yet to move in the Senate.

VA leaders have repeatedly stated that they take disciplinary issues seriously, but also don’t see demotions and dismissals as the only way to improve service throughout the department.

Earlier this year, VA Secretary Bob McDonald told lawmakers that more than 2,600 department employees have been dismissed since he assumed office in August 2014, but lawmakers have questioned whether that figure shows an increase in accountability or normal turnover for the 300,000-plus-person bureaucracy.

51 Revolting at the State Dept over Assad/Syria

Dozens of US officials call for military action against Syria’s Assad

FNC: Dozens of U.S. officials have called on the Obama administration to order “targeted military strikes” against the regime of Bashar al-Assad in Syria, with the aim of pressuring Damascus to accept a binding cease-fire and engage in peace talks.

The Wall Street Journal reported that 51 State Department officials advising Syria policy signed the so-called “dissent channel cable”.

State Department spokesman John Kirby confirmed the cable’s existence Thursday, but said he would not comment further until officials have reviewed its contents.

The cable expresses clear frustration with America’s inability to halt a civil war that has killed perhaps a half-million people and contributed to a worldwide refugee crisis, and goes to the heart of Obama’s reluctance to enter the fray.

“It’s embarrassing for the administration to have so many rank-and-file members break on Syria,” a former State Department official told the Journal.

Obama called for regime change early on in the conflict and threatened military strikes against Syrian forces after blaming President Bashar Assad for using chemical weapons in 2013. But Obama only has authorized strikes against the Islamic State (ISIS) and other U.S.-designated terror groups in Syria.

While Washington has provided military assistance to some anti-Assad rebels, it has favored diplomacy over armed intervention as a means of ushering Syria’s leader out of power. A series of partial cease-fires in recent months have only made the war slightly less deadly, and offered little hope of a peace settlement.

The U.S. does have military assets available in the region, including two aircraft carriers in the Mediterranean Sea and a number of Air Force jets based at Incirlik Air Force Base in Turkey.

However, Assad has enjoyed the protection of his Russian allies in recent months, and any action against the Syrian regime would likely bring U.S. and Russian forces into direct conflict.

Moscow has deployed an advanced S-400 surface-to-air missile system to Syria, as well as dozens of air-to-air interceptors and strike fighters such as the Su-35 and Su-24.

Navy Vice-Admiral James Foggo III, commander of the U.S. Sixth Fleet, told Fox News Thursday that Russia also has two Kilo-class submarines in the Black Sea armed with state-of-the art Kalibr cruise missiles. One kilo boat launched one of these cruise missiles into Syria from the Mediterranean Sea this past December.

Since September, Russia has deployed dozens of jets and helicopter gunships to Syria, which are now spread out among four bases. Russia also has dispatched bombers on missions from Engels and Mozdok, in southern Russia, which have launched cruise missiles and dozens of unguided bombs in the last year.

Republican and even some Democratic lawmakers have been urging Obama to take greater military action in Syria for years, from air strikes to the establishment of a no-fly zone over rebel-held areas. As secretary of state, Hillary Clinton pushed some of these steps, too.

But Obama has resisted, fearful of leading America into another war in the Muslim world after finding it impossible to withdraw U.S. forces from Afghanistan and keep forces out of Iraq. Military commanders have been similarly reticent, given the lack of a clear alternative to Assad that might unify Syria and advance U.S. national security interests.

Nevertheless, Obama has said Assad must relinquish control if there is to be peace. And Kerry, Clinton’s successor as the chief U.S. diplomat, has repeatedly said that to defeat ISIS, the U.S. must be able to assure Syria’s many other rebel groups that there will be a post-Assad future for their country.

The dissent document echoes these sentiments, calling the government’s barrel bomb attacks on civilians “the root cause of the instability that continues to grip Syria and the broader region.”

“Failure to stem Assad’s flagrant abuses will only bolster the ideological appeal of groups such as (ISIS),” the document continued, “even as they endure tactical setbacks on the battlefield.” More here including graphs.

States Complying with DOJ/FBI Facial Recognition Database

 

 

GAO: The Department of Justice’s (DOJ) Federal Bureau of Investigation (FBI) operates the Next Generation Identification-Interstate Photo System (NGI-IPS)— a face recognition service that allows law enforcement agencies to search a database of over 30 million photos to support criminal investigations. NGI-IPS users include the FBI and selected state and local law enforcement agencies, which can submit search requests to help identify an unknown person using, for example, a photo from a surveillance camera. When a state or local agency submits such a photo, NGI-IPS uses an automated process to return a list of 2 to 50 possible candidate photos from the database, depending on the user’s specification. As of December 2015, the FBI has agreements with 7 states to search NGI-IPS, and is working with more states to grant access. In addition to the NGI-IPS, the FBI has an internal unit called Facial Analysis, Comparison and Evaluation (FACE) Services that provides face recognition capabilities, among other things, to support active FBI investigations. FACE Services not only has access to NGI-IPS, but can search or request to search databases owned by the Departments of State and Defense and 16 states, which use their own face recognition systems. Biometric analysts manually review photos before returning at most the top 1 or 2 photos as investigative leads to FBI agents.

DOJ developed a privacy impact assessment (PIA) of NGI-IPS in 2008, as required under the E-Government Act whenever agencies develop technologies that collect personal information. However, the FBI did not update the NGI-IPS PIA in a timely manner when the system underwent significant changes or publish a PIA for FACE Services before that unit began supporting FBI agents. DOJ ultimately approved PIAs for NGI-IPS and FACE Services in September and May 2015, respectively. The timely publishing of PIAs would provide the public with greater assurance that the FBI is evaluating risks to privacy when implementing systems. Similarly, NGI-IPS has been in place since 2011, but DOJ did not publish a System of Records Notice (SORN) that addresses the FBI’s use of face recognition capabilities, as required by law, until May 5, 2016, after completion of GAO’s review. The timely publishing of a SORN would improve the public’s understanding of how NGI uses and protects personal information.

Prior to deploying NGI-IPS, the FBI conducted limited testing to evaluate whether face recognition searches returned matches to persons in the database (the detection rate) within a candidate list of 50, but has not assessed how often errors occur. FBI officials stated that they do not know, and have not tested, the detection rate for candidate list sizes smaller than 50, which users sometimes request from the FBI. By conducting tests to verify that NGI-IPS is accurate for all allowable candidate list sizes, the FBI would have more reasonable assurance that NGI-IPS provides leads that help enhance, rather than hinder, criminal investigations. Additionally, the FBI has not taken steps to determine whether the face recognition systems used by external partners, such as states and federal agencies, are sufficiently accurate for use by FACE Services to support FBI investigations. By taking such steps, the FBI could better ensure the data received from external partners is sufficiently accurate and do not unnecessarily include photos of innocent people as investigative leads.

*** The Privacy Act of 1974 places limitations on agencies’ collection, disclosure, and use of personal information maintained in systems of records.3 The Privacy Act requires agencies to publish a notice—known as a System of Records Notice (SORN)—in the Federal Register identifying, among other things, the categories of individuals whose information is in the system of records, and the type of data collected.4 Also, the E-Government Act of 2002 requires agencies to conduct Privacy Impact Assessments (PIA) that analyze how personal information is collected, stored, shared, and managed in a federal system.5 Agencies are required to make their PIAs publicly available if practicable.  See the entire report here from the General Accounting Office.

 

How Terrorists use Encryption

 

How Terrorists Use Encryption

June 16, 2016

CTC: Abstract: As powerful encryption increasingly becomes embedded in electronic devices and online messaging apps, Islamist terrorists are exploiting the technology to communicate securely and store information. Legislative efforts to help law enforcement agencies wrestle with the phenomenon of “going dark” will never lead to a return to the status quo ante, however. With the code underlying end-to-end encryption now widely available, unbreakable encryption is here to stay. However, the picture is not wholly bleak. While end-to-end encryption itself often cannot be broken, intelligence agencies have been able to hack the software on the ends and take advantage of users’ mistakes.

Counterterrorism officials have grown increasingly concerned about terrorist groups using encryption in order to communicate securely. As encryption increasingly becomes a part of electronic devices and online messaging apps, a range of criminal actors including Islamist terrorists are exploiting the technology to communicate and store information, thus avoiding detection and incrimination, a phenomenon law enforcement officials refer to as “going dark.”

Despite a vociferous public debate on both sides of the Atlantic that has pitted government agencies against tech companies, civil liberties advocates, and even senior figures in the national security establishment who have argued that creation of “backdoors”[1] for law enforcement agencies to retrieve communications would do more harm than good, there remains widespread confusion about how encryption actually works.[a]

Technologists have long understood that regulatory measures stand little chance of rolling back the tide. Besides software being written in other countries (and beyond local laws), what has not been fully understood in the public debate is that the “source code” itself behind end-to-end encryption is now widely available online, which means that short of shutting down the internet, there is nothing that can be done to stop individuals, including terrorists, from creating and customizing their own encryption software.

The first part of this article provides a primer on the various forms of encryption, including end-to-end encryption, full device encryption, anonymization, and various secure communication (operational security or opsec) methods that are used on top of or instead of encryption. Part two then looks at some examples of how terrorist actors are using these methods.

Part 1: Encryption 101 

End-to-End Encryption
A cell phone already uses encryption to talk to the nearest cell tower. This is because hackers could otherwise eavesdrop on radio waves to listen in on phone calls. However, after the cell tower, phone calls are not encrypted as they traverse copper wires and fiber optic cables. It is considered too hard for nefarious actors to dig up these cables and tap into them.

In a similar manner, older chat apps only encrypted messages as far as the servers, using what is known as SSL.[b] That was to defeat hackers who would be able to eavesdrop on internet traffic to the servers going over the Wi-Fi at public places. But once the messages reached the servers, they were stored in an unencrypted format because at that point they were considered “safe” from hackers. Law enforcement could still obtain the messages with a court order.

Newer chat apps, instead of encrypting the messages only as far as the server, encrypt the message all the way to the other end, to the recipient’s phone. Only the recipients, with a private key, are able to decrypt the message. Service providers can still provide the “metadata” to police (who sent messages to whom), but they no longer have access to the content of the messages.

The online messaging app Telegram was one of the earliest systems to support end-to-end encryption, and terrorists groups such as the Islamic State took advantage.[2] These days, the feature has been added to most messaging apps, such as Signal, Wickr, and even Apple’s own iMessage. Recently, Facebook’s WhatsApp[3] and Google[4] announced they will be supporting Signal’s end-to-end encryption protocol.

On personal computers, the software known as PGP,[c] first created in the mid-1990s, reigns supreme for end-to-end encryption. It converts a message (or even entire files) into encrypted text that can be copy/pasted anywhere, such as email messages, Facebook posts, or forum posts. There is no difference between “military grade encryption” and the “consumer encryption” that is seen in PGP. That means individuals can post these encrypted messages publicly and even the NSA is unable to access them. There is a misconception that intelligence agencies like the NSA are able to crack any encryption. This is not true. Most encryption that is done correctly cannot be overcome unless the user makes a mistake.

Such end-to-end encryption relies upon something called public-key cryptography. Two mathematically related keys are created, such that a message encrypted by one key can only be decrypted by the other. This allows one key to be made public so that one’s interlocutor can use it to encrypt messages that the intended recipient can decrypt through the private-key.[d] Al-Qa`ida’s Inspire magazine, for example, publishes its public-key[5] so that anyone using PGP can use it to encrypt a message that only the publishers of the magazine can read.

Full Device Encryption
If an individual loses his iPhone, for example, his data should be safe from criminals.[e] Only governments are likely to have the resources to crack the phone by finding some strange vulnerability. The FBI reportedly paid a private contractor close to $1 million to unlock the iPhone of San Bernardino terrorist Syed Rizwan Farook.[6]

The reason an iPhone is secure from criminals is because of full device encryption, also full disk encryption. Not only is all of the data encrypted, it is done in a way that is combined or entangled[7] with the hardware. Thus, the police cannot clone the encrypted data, then crack it offline using supercomputers to “brute-force” guess all possible combinations of the passcode. Instead, they effectively have to ask the phone to decrypt itself, which it will do but slowly, defeating cracking.[f]

Android phones work in much the same manner. However, most manufacturers put less effort into securing their phones than Apple. Exceptions are companies like Blackphone, which explicitly took extra care to secure their devices.

Full disk encryption is also a feature of personal computers. Microsoft Windows comes with BitLocker, Macintosh comes with FileVault, and Linux comes with LUKS. The well-known disk encryption software TrueCrypt works with all three operating systems as does a variation of PGP called PGPdisk. Some computers come with a chip called a TPM[g] that can protect the password from cracking, but most owners do not use a TPM. This means that unless they use long/complex passwords, adversaries will be able to crack their passwords.