Tashfeen Malik’s Visa Application Clues to Jihad

The trained Jihad widow by al Qaeda?

In part from BusinessInsider:

Malik, who was born in Pakistan and lived in Saudi Arabia for part of her life, moved to the US after meeting Farook first online and then in person when he traveled to Mecca for a religious pilgrimage in 2013. Farook was born in the US.

Malik was allowed to enter the US on a K-1 “fiance” visa. That program is now under more scrutiny, with the US government considering stronger screening measures for applicants. The House Judiciary Committee is investigating the issuance of Malik’s visa by Homeland Security officials.

Her application lists addresses in Pakistan and Saudi Arabia, including in Punjab Province and Riyadh, where Malik has lived in the past five years.

Farook also wrote the following “intention to marry” statement as part of Malik’s visa application. In the statement, signed on January 20, 2014, Farook wrote that he and Malik “intend to marry within the first month of her arriving in the US.”

Syed Rizwan Farook marriage statementHouse Judiciary Committee

A stamp on the document shows that Malik was admitted into the US on July 27, 2014.

Malik and Farook had both reportedly been radicalized before they met.

FBI Director James Comey said at a US Senate hearing earlier this month that they discussed jihad and martyrdom before they discussed Malik coming to the US to marry Farook.

And a friend of Farook, who has since been arrested, allegedly told authorities after the attacks that he was planning other attacks with Farook in 2011 and 2012.

Malik also reportedly posted a message on Facebook pledging allegiance to the leader of the terrorist group ISIS — aka the Islamic State, ISIL, and Daesh — while the San Bernardino attack was ongoing. She and Farook died in a shootout with police later that day.

Here’s the full visa application:

Tashfeen Malik Visa Application

 

U.S. Soldiers not Allowed to Fight, Turns Deadly A’stan

Afghanistan is falling to the Taliban and ISIS has mobilized operating cells in the region.

In part NYT’s: OPERATING BASE FENTY, Afghanistan — The Islamic State is establishing “little nests” in Afghanistan, adding to the complex array of threats confronting Afghan forces and their international partners as they try to reverse a serious decline in security, Defense Secretary Ashton B. Carter said Friday. Mr. Carter was visiting this base in eastern Afghanistan, where he conferred with Gen. John F. Campbell, the American commander of the international coalition that is supporting Afghan forces, and Mohammad Masoom Stanekzai, the acting Afghan defense minister.


General Campbell painted a sobering picture of the fighting ahead, though he said the American military was trying to help the Afghan forces adapt so that they could limit their casualties.
“We just went through a very tough fighting season,” General Campbell told reporters traveling with Mr. Carter. “We don’t even talk in terms of fighting seasons anymore because it is kind of continuous fighting.”

6 US Troops Killed in Afghanistan Suicide Bombing, Official Says

A view of Bagram Airfield, Afghanistan from the Air Traffic Control Tower's catwalk after a recent rainstorm. (U.S. Air Force photo by Staff Sgt. Craig Seals)

Military.com: A suicide bombing near Bagram Airfield in Afghanistan killed six U.S. troops and wounded two other Americans and an interpreter, a senior U.S. defense official confirms to Fox News.

The Taliban claimed responsibility for the bombing, which was the largest attack on foreign troops in Afghanistan since August.

It happened at around 1.30 p.m. local time in the vicinity of Bagram, the largest U.S. military facility in Afghanistan, according to U.S. Army Brig. Gen William Shoffner.

Mohammad Asim Asim, governor of Parwan province, where Bagram is located, said the bomber rammed an explosives-laden motorcycle into a combined NATO-Afghan foot patrol as it moved through a village close to the base, which is 28 miles north of Kabul.

It is the first major attack on a NATO military convoy since August 22, when three American contractors with the RS base were killed in a suicide attack on their convoy in Kabul. On August 7 and 8, Kabul was the scene of three insurgent attacks within 24 hours that left at least 35 people dead. One of the attacks, on a U.S. special operations forces base outside Kabul left one U.S soldier and eight Afghan civilian contractors dead.

Monday’s attack came as Taliban gunmen and government forces battled for control of a strategic district in the southern province of Helmand after it was overrun by Taliban insurgents, delivering a serious blow to government forces.

Mohammad Jan Rasulyar, Helmand’s deputy governor, said insurgents took control of Sangin district on Sunday. Only Afghan army facilities in the district had not been taken by the insurgents, he said. Casualties among Afghan security forces were high, he added, though he gave no figures.

Afghan Army commandoes and special forces had arrived in Sangin to push a counter-offensive, the Defense Ministry spokesman, Dawlat Waziri, said. He told reporters the Afghan air force had conducted 160 combat and transport flights over Sangin in the past 48 hours.

Among the insurgent forces in Helmand, “three out of 10 are foreign fighters,” he said, adding that they included Pakistanis, Chechens, Uzbeks, Arabs and Chinese Uighurs. “The presence of the foreigners in this imposed war complicates the sitaution in Helmand,” he said, echoing the government line that the war is run by a Taliban leadership believed to be based in Pakistan with official protection.

Helmand is an important Taliban base as it produces most of the world’s opium, a crop that helps fund the insurgency.

Sangin district has bounced in and out of Taliban control for some years, and fighting there has produced high casualties among both Afghan and international forces. British forces in particular saw intensive fighting there at the height of the war in 2006 and 2007. Britain lost more than 450 troops during its combat mission in Afghanistan, more than 100 of them in Sangin.

Helmand’s deputy governor Rasulyar on Sunday took the unusual step of using his Facebook page to warn President Ashraf Ghani that the entire province of Helmand was in danger of falling to the insurgents if central authorities failed to send help.

In Helmand, more than 90 members of the Afghan security forces died fighting in the two days before his Facebook plea, with hundreds killed in the past six months, he said in his open letter to Ghani.

The head of Helmand’s provincial council, Muhammad Kareem Atal, said that 28 members of the Afghan security forces — usually a reference to army and police who also fight on the front lines across the country — were killed fighting on Sunday. Another 15 were critically wounded, he said.

“Around 65 percent of Helmand is now under Taliban control,” Atal said. “In every district either we are stepping back or we are handing territory over to Taliban, but still, until now, no serious action has been taken,” he said, echoing Rasulyar’s plea to the central authorities for help.

Important districts across Helmand province, including Nad Ali, Kajaki, Musa Qala, Naw Zad, Gereshk and Garmser, have all been threatened by Taliban takeover in recent months. Insurgents are also believed to be dug in on the outskirts of the provincial capital, Lashkar Gah.

Taliban fighters, sometimes working with other insurgent groups like the Islamic Movement of Uzbekistan, have managed to overrun many districts across the country this year, as well as staging a three-day takeover of the major northern city of Kunduz. They rarely hold territory for more than a few hours or days, but the impact on the morale of Afghan forces is substantial.

Atal said more than 2,000 members of the security forces had been killed fighting in Helmand in 2015.

He said a major reason “that our forces are losing” was that many soldiers and police were deserting their posts in the face of the Taliban onslaught.

“There is a big difference between the number of both soldiers and police recorded as on duty, and the real number,” he said, saying the official record was stuffed with “ghost police and soldiers.”

The Taliban insurgency has spread across the country this year, following the withdrawal of international combat forces at the end of 2014. This has stretched government resources thin, as the traditional winter lull in fighting has so far failed to take place in the warmer, southern provinces.

The war has intensified since the announcement in late July that the founder and leader of the Taliban, Mullah Mohammad Omar, had been dead for more than two years. His deputy, Mullah Akhtar Mansoor, succeeded him, causing internal ructions and delaying the likelihood that a peace dialogue with the Afghan government, halted after the announcement of Mullah Omar’s death, will restart in the foreseeable future.

The Pentagon released a report last week warning that the security situation in Afghanistan would deteriorate as a “resilient Taliban-led insurgency remains an enduring threat to U.S., coalition, and Afghan forces, as well as to the Afghan people.”

The U.S. now has about 9,800 troops in Afghanistan, some of which are involved in counterterrorism missions. With NATO contributions, there are about 13,000 foreign troops in Afghanistan.

Iran Swapping Nuclear Material with Russia

Sheesh, what could go wrong and what uranium and why to Russia?

In part from FreeBeacon: Russia and Iran are beginning to trade sensitive nuclear materials, an activity that is at least in part condoned by the Obama administration and permissible under the tenets of the recent nuclear accord, according to U.S. and Iranian officials.

Russian-made yellow cake, a type of uranium powder that helps turn it into a nuclear fuel, “is in Iran and Iran’s enriched uranium cargo will be sent to Russia” within the next several days, according to top Iranian officials quoted this week in the country’s state-run press.

Senior U.S. officials confirmed on Thursday that the Obama administration backs the opening of commercial nuclear trade between Moscow and Tehran.

“Commercial contracts are in place for Iran to ship its enriched uranium stockpiles to Russia,” Stephen Mull, a State Department official who is leading the administration’s charge to implement the nuclear deal, told lawmakers. More details here.

This condition is quite familiar especially with regard to Iran.

Bishkek (AKIpress)nuke plant Russia and Kazakhstan are preparing an intergovernmental agreement on construction of a nuclear power plant, Presidential aide Yuri Ushakov told TASS on Friday.

“An intergovernmental cooperation agreement is being prepared for construction of a Russia-designed nuclear power plant within the territory of Kazakhstan,” he said, adding that the issue may be touched upon on December 21 at the meeting of presidents of Russia and Kazakhstan “on the sidelines” of the CSTO (Collective Security Treaty Organization) and the SEEC (Supreme Eurasian Economic Council) summit.

“The leaders of the two countries are expected to dwell upon the problem of boosting trade and economic cooperation,” Ushakov said.

Then there is India:

BusinessInsider: India is expected to offer Russia land in Andhra Pradesh to set up units five and six of Kudankulam nuclear power plant. This is in line with the ‘Make in India‘ initiative. The decision would be finalised during Prime Minister Narendra Modi‘s visit to Moscow this week.

“We will follow principles of ‘localisation’ as per Make in India initiative for setting up Kudankulam nuclear power plant five and six,” sources told PTI.

Russia is working a deal in Jordan but back to Iran:

Back in 2013-14: WASHINGTON — Russia has agreed to build Iran two additional nuclear power plants, Iran’s state-run Press TV announced on Wednesday.

Russia will construct the new facilities next to Iran’s sole existing nuclear power plant in the city of Bushehr.

That plant was also built with Russian assistance, and was fueled for operation in 2011. The reactor was put under full Iranian control in 2013.

The deal includes two desalination plants and is reportedly in exchange for oil; Russia built first and only reactor at Bushehr.

Iran To Ship Enriched Uranium To Russia

 RFEL: Iranian nuclear officials say Tehran will export most of its enriched uranium stockpile to Russia in the coming days as it implements a nuclear deal to secure relief from international sanctions.

The Iranian news agency IRNA quotes nuclear chief Ali Akbar Salehi as saying on December 19 that “around nine tons of Iran’s enriched uranium will be exported to Russia.”

That is roughly the amount that Iran must export to bring its stockpile down to the required level under the sanctions-relief deal.

Salehi did not give a precise timetable for what he meant by “in the coming days.”

Under the terms of the deal it reached in July with world powers, Iran must reduce its stockpile of enriched uranium to around 300 kilograms. It must also deactivate and store most of its centrifuges, and remove the core of a heavy water reactor in Arak so it cannot be used to produce plutonium.

On December 16, Tehran said it was working to complete the requirements in the next two to three weeks, after the International Atomic Energy Agency (IAEA) closed its investigation of Iran’s past nuclear activities.

The 35-nation governing board of the IAEA passed a resolution on December 15 ending the UN nuclear watchdog agency’s 12-year-long inquiry into suspicions of “possible military dimensions” to Iran’s nuclear work.

IAEA chief Yukiya Amano said afterward that Tehran has taken the necessary steps to cooperate with the agency and that it was “not impossible” that sanctions could be lifted in January.

Iran has shown a strong apparent desire in recent weeks to build on the momentum of the nuclear deal and restore international economic links after years of sanctions.

Iranian Industry Minister Mohammad Reza Nematzadeh said on December 17 that Tehran is prepared to begin negotiations for membership in the World Trade Organization (WTO).

Iran first applied for WTO membership in July 1996, but progress had been minimal since then due to tensions over the Iranian nuclear crisis.

Forget the EMP, It’s the Hack, You’re at Risk

Iranian hackers infiltrated computers of small dam in NY

WASHINGTON (Reuters) – Iranian hackers breached the control system of a dam near New York City in 2013, an infiltration that raised concerns about the security of the country’s infrastructure, the Wall Street Journal reported on Monday, citing former and current U.S. officials.

Two people familiar with the breach told the newspaper it occurred at the Bowman Avenue Dam in Rye, New York. The small structure about 20 miles from New York City is used for flood control.

The hackers gained access to the dam through a cellular modem, the Journal said, citing an unclassified Department of Homeland Security summary of the incident that did not specify the type of infrastructure.

The dam is a 20-foot-tall concrete slab across Blind Brook, about five miles from Long Island Sound.

“It’s very, very small,” Rye City Manager Marcus Serrano told the newspaper. He said FBI agents visited in 2013 to ask the city’s information-technology manager about a hacking incident.

The dam breach was difficult to pin down, and federal investigators at first thought the target was a much larger dam in Oregon, the Journal said.

The breach came as hackers linked to the Iranian government were attacking U.S. bank websites after American spies damaged an Iranian nuclear facility with the Stuxnet computer worm.

It illustrated concerns about many of the old computers controlling industrial systems, and the White House was notified of the infiltration, the Journal said.

The newspaper said the United States had more than 57,000 industrial control systems connected to the Internet, citing Shodan, a search engine that catalogs each machine.

Homeland Security spokesman S.Y. Lee would not confirm the breach to Reuters. He said the department’s 24-hour cybersecurity information-sharing hub and an emergency response team coordinate responses to threats to and vulnerabilities in critical infrastructure.

***

Cant Sleep, You are at Risk

In part from Wired: If you want to keep yourself up at night, spend some time reading about the latest developments in cybersecurity. Airplanes hacked, cars hacked, vulnerabilities in a breathtaking range of sensitive equipment from TSA locks to voting booths to medical devices.

The big picture is even scarier. Former NSA Director Mike McConnell suspects China has hacked “every major corporation” in the US. Edward Snowden’s NSA leaks revealed the US government has its own national and international hacking to account for. And the Ponemon Institute says 110 million Americans saw their identities compromised in 2014. That’s one in two American adults.

The system is broken. It isn’t keeping us, our companies, or our government safe. Worse yet, no one seems to know how to fix it.

How Did We Get Here?

One deceptive truth seems to drive much of the cybersecurity industry down a rabbit hole: If you keep bad actors and bad software out of your system, you have nothing to worry about.

Malicious actors target “endpoints”—any device or sensor connected to a network—to break into that network. Network security seeks to protect those endpoints with firewalls, certificates, passwords, and the like, creating a secure perimeter to keep the whole system safe.

This wasn’t difficult in the early days of the Internet and online threats. But today, most private networks have far too many endpoints to properly secure. In an age of “Bring Your Own Device,” the cloud, remote access, and the Internet of Things, there are too many vulnerabilities hackers can exploit. As Ajay Arora, CEO of file security company Vera, notes, there is no perimeter anymore. It’s a dream of the past.

But the security paradigm remains focused on perimeter defense because, frankly, no one knows what else to do. To address threats, security experts should assume compromise – that hackers and malware already have breached their defenses, or soon will – and instead classify and mitigate threats.

The CIA Triad

The information security community has a model to assess and respond to threats, at least as a starting point. It breaks information security into three essential components: confidentiality, integrity, and availability.

Confidentiality means protecting and keeping your secrets. Espionage and data theft are threats to confidentiality.

Availability means keeping your services running, and giving administrators access to key networks and controls. Denial of service and data deletion attacks threaten availability.

Integrity means assessing whether the software and critical data within your networks and systems are compromised with malicious or unauthorized code or bugs. Viruses and malware compromise the integrity of the systems they infect.

The Biggest Threat

Of these, integrity is the least understood and most nebulous. And what many people don’t realize is it’s the greatest threat to businesses and governments today.

Meanwhile, the cybersecurity industry remains overwhelmingly focused on confidentiality. Its mantra is “encrypt everything.” This is noble, and essential to good security. But without integrity protection, the keys that protect encrypted data are themselves vulnerable to malicious alteration. This is true even of authenticated encryption algorithms like AES-GCM.

In the bigger picture, as cybercrime evolves, it will become clear that loss of integrity is a bigger danger than loss of confidentiality. One merely has to compare different kinds of breaches to see the truth of this:

A confidentiality breach in your car means someone learns your driving habits. An integrity breach means they could take over your brakes. In a power grid, a confidentiality breach exposes system operating information. An integrity breach would compromise critical systems, risking failure or shutdown. And a confidentiality breach in the military would mean hackers could obtain data about sensitive systems. If they made an integrity beach, they could gain control over these weapons systems. Full details and actions you can take to protect yourself, go here.