Turkey Partially Deals with Hamas, Terror

If the United States knows the top Hamas terrorist and where he is, then why not detain him? While Secretary of State, John Kerry has failed miserably at dealing with all the terrifying issues with Iran, at least some pressure was placed on Turkey to get rid of the top Hamas leader, but Hamas in general is allowed to continue operations in Turkey. It is twisted for sure.

Hamas is a terror organization and responsible for deadly conflicts and hostilities on a constant basis in Israel.

This condition as explained below, describes how convoluted diplomatic objectives are with respect to how the Obama administration functions, rather, malfunctions.

Top Hamas Terrorist Leaves Turkey After Pressure From U.S., Israel

TheTower: Saleh al-Arouri, a Hamas leader who manages the terrorist group’s operations in the West Bank, was reportedly expelled from Turkey under pressure from the United States and Israel, The Jerusalem Post reported on Monday.

According to the Post, Turkish President Recep Tayyip Erdogan, Prime Minister Ahmet Davutoglu, and Hamas leader Khaled Meshaal agreed that al-Arouri would “voluntarily” depart the country and not return, though Hamas would be allowed to continue operations on its soil. Erdogan’s ongoing support for the terror group remains a stumbling block in efforts to restore diplomatic relations between Anakara and Jerusalem.

Earlier this month, Erdogan said that reconciliation between Israel and Turkey would benefit the entire region. The two countries reached a preliminary deal to restore diplomatic relations late last week. Israel agreed to compensate the families of crew members killed during the IDF’s 2010 raid on the Mavi Marmara, which attempted to breach Israel’s blockade of the Hamas-ruled Gaza Strip, but refused to end its blockade of the territory, despite Erdogan’s demands.

In Where the Shadiest Players Find a Home, which was published in the September 2014 issue of The Tower Magazine, Jonathan Schanzer explored the extent of Turkey’s recent support for Hamas:

But Turkey’s support for Hamas remains strong. Just how strong? We don’t know. In December 2011, Palestinian news sources reported that Turkish President Recep Tayyip Erdoğan “instructed the Ministry of Finance to allocate $300 million to be sent to Hamas’ government in Gaza.” Both Turkey and Hamas denied this, but Reuters and Haaretzpublished subsequent reports citing this number. …

Then there is the presence of the aforementioned Saleh al-Arouri. The Israeli news website Ynet reported last year that Arouri “operates out of Turkey, with the backing of the Turkish government.”…

Arouri is also believed to be in charge of Hamas’ operations in the West Bank. In January, a senior Israeli military official confirmed this when he told Israel Hayom that Hamas’ recent West Bank operations are “directed from Gaza via Turkey.” More recently, in August, the Israelis announced that Arouri was at the center of a plot to bring down the Palestinian Authority government of Mahmoud Abbas in the West Bank. Arouri recruited the leader of the operation, according to reports. …

Arouri is not the only Hamas figure in Turkey. In 2011, Israel released 10 Hamas operatives to Turkey as part of the prisoner exchange deal with Hamas that secured the release of kidnapped Israel Defense Forces soldier Gilad Shalit. Among the Hamas figures believed to have gone to Turkey include Mahmoud Attoun and Taysir Suleiman. Both were sentenced to life terms in Israeli prison for murder. Both men today appear on television and lecture about the merits of Hamas in Turkey and around the Arab world.

YNet: Israel established al-Arouri’s expulsion from the country as a condition for achieving full reconciliation between Ankara and Jerusalem. Al-Arouri’s “voluntary” departure was agreed upon during the meeting between Hamas’ political chief, Khaled Mashal and Turkish President Tayyip Erdoğan and Turkish Prime Minister Ahmet Davutoğlu last Saturday.

Nevertheless, Erdogan clarified to close associates that he had no intention of closing Hamas’ offices in Turkey and would not stop his financial and moral support of Hamas, as Israel requested.

Moreover, Turkey is adamant regarding its request that Israel remove the blockade of the Gaza Strip, and Israel refuses to do this. Turkish officials claim that Israel agreed to lighten the blockade, but Israel denies this.

 

A secret meeting was reported on last Thursday between the soon-to-be Mossad chief Yossi Cohen, Prime Minister Benjamin Netanyahu’s envoy in the contacts with Turkey, Joseph Ciechanover and Turkish under-foreign minister Feridun Sinirlioglu in Zurich.

 

The Prime Minister’s Office announced that at the meeting it was agreed upon that Turkey’s ambassador would return to Tel Aviv and Israel’s envoy would return to Ankara. Moreover, Israel agreed to establish a compensation fund for those killed in the Mavi Marmara incident, and in return Turkey will renounce any and all claims regarding it.

 

It was also agreed upon that al-Arouri would be expelled from Turkey and that talks about laying a gas pipeline between Israel and Turkey would soon begin.

 

Al-Arouri, one of the founders of Hamas’ military wing, sat in Israeli jails for 15 years before being expelled to Syria. In 2012, when Hamas’ offices in Syria were closed down, he fled to Turkey. From Turkey he was involved in orchestrating the kidnapping and murder of the three Israeli teenagers in Gush Etzion in June 2014.

 

Obama Gave Clemency to 95 Convicts, Who are They

Obama gave the warning earlier this year. He also has collaborated with an outside agency on who and why he commutes their sentences.

WASHINGTON — President Barack Obama plans to grant clemency to federal offenders “more aggressively” during the remainder of his presidency, he said in a sit-down interview with The Huffington Post on Friday.

Obama has faced criticism for rarely using his power to grant pardons and commutations. In December, he commuted the sentences of eight federal drug offenders, including four who had been sentenced to life. That brought his total number of commutations to 18.

Obama said he had granted clemency so infrequently because of problems in the Justice Department’s Office of the Pardon Attorney. The former head of that office, who was appointed during the George W. Bush administration, resigned in April amid criticism from criminal justice advocates.

“I noticed that what I was getting was mostly small-time crimes from very long ago,” Obama said. “It’d be a 65-year-old who wanted a pardon to get his gun rights back. Most of them were legitimate, but they didn’t address the broader issues that we face, particularly around nonviolent drug offenses. So we’ve revamped now the DOJ office. We’re now getting much more representative applicants.”

Many of those new applications came from what’s known as the Clemency Project 2014, announced when the head of the Office of the Pardon Attorney resigned. That project, which operates independently of the government, is intended to help DOJ sort through a huge number of applicants to figure out who meets specific criteria laid out by the administration.

4 of the 95 Prisoners Obama Just Set Free Had Nothing to Do With Drug Sentences

On Friday, President Obama granted clemency to 95 convicted prisoners. The vast majority of these individuals received harsh sentences for relatively minor drug offenses. Most of them will become free men and women on April 16, 2016.

Speaking to the press, Obama said:

“Earlier today, I commuted the sentences of 95 men and women who had served their debt to society – another step forward in upholding our fundamental ideals of justice and fairness.”

While they were referred to by the media as “drug offenders,” four of the men and women included were not punished for anything having to do with drugs. Here is some background on these “Freed Four.”

George Andre Axam

Crime: possession of a firearm by a convicted felon

Sentence: 15 years in prison

Though Axam had a history of drug abuse and felony offenses, the crime for which he was imprisoned occurred in December of 2001.

After arguing with his daughter outside his Atlanta house, Axam went back inside, retrieved a gun, then went outside and reportedly aimed it at his daughter’s boyfriend, who was sitting in a car. Axam proceeded to fire “one of two shots in [the boyfriend’s] direction,” then fled into the woods when the police came after him.

Carolyn Yvonne Butler

Crime: Three counts each of armed bank robbery and using a firearm during a violent crime

Sentence: 48 years in prison

Butler robbed three banks at gunpoint in 1991 – one on June 4, another on July 10, and the third on November 22. She reportedly purchased a .25 caliber pistol in San Antonio two days before the first crime.

Though she appealed her guilty verdicts, the U.S. Court of Appeals upheld her convictions.

Jon Dylan Girard

Crime: Counterfeiting

Sentence: Six months of home confinement and three years probation

Girard, a physician in Dayton, Ohio, was convicted of counterfeiting in 2002. He was granted a full pardon by the President.

Melody Eileen Homa (née Childress)

Crime: Aiding and abetting bank fraud

Sentence: Thirty days of home confinement, three years probation, 200 hours of community service

Homa committed her crime way back in 1991. Like Girard, the presidential pardon expunged the bank fraud charges from her record.

It’s unclear why these four individuals were tapped for sentence commutation or pardon. Obama has now granted clemency to a total of 163 prisoners in 2015.

Iran Behind the Bombing of the Jews in Argentina

In Secret Recordings, Former Argentine FM Admits Iran Behind Massive 1994 Terror Attack

TheTower: Former Argentine Foreign Minister Héctor Timerman knew that Iran was responsible for the 1994 bombing of the AMIA Jewish center in Buenos Aires even as he negotiated with the regime in Tehran, secretly-recorded telephone conversations released on Friday reveal.

The previously unknown recordings of conversations between Timerman and leaders of the Argentine Jewish community confirm what has long been suspected. While negotiating the infamous “Memorandum of Understanding” in 2013 aimed at setting up a joint commission with Iran to supposedly investigate the bombing, Timerman had no doubt that Tehran was behind the atrocity that claimed the lives of 85 people and injured hundreds more.

The conversations took place in 2012. In the first recording, Timerman is speaking with Guillermo Borger, the then president of the AMIA Jewish community organization. He attempts to persuade Borger to support the negotiations with Iran that would in due course lead to the signing of the Memorandum.

Borger: We don’t regard Iran as valid [as a negotiating partner].

Timerman: And who do you want me to negotiate with, Switzerland?

Borger: I will just say that Iran lies, is not credible and denies the Holocaust.

Timerman: But we don’t have anyone else to negotiate with […] Well, tell me who you want me to negotiate with?

Borger: I understand, I wish there was someone else to negotiate with.

Timerman: If there was someone else, they [the Iranians] wouldn’t have planted the bomb. So we are back to the beginning. Do you have someone else for me to negotiate with?

The second conversation is between Timerman and José Scaliter, the Vice President of the AMIA at the time:

Timerman: Eighteen years ago they [the Iranians] planted the bomb. You don’t tell me who I should negotiate with, you tell me who I shouldn’t negotiate with. What a smartass you are, so who do you want me to negotiate with?

Scaliter: The Prosecutor [Alberto Nisman, found dead in suspicious circumstances in January 2015] working on this case, who wasn’t appointed by us, carried out a serious and important investigation and says Iran did it.

Timerman: Great! Fantastic! So how do you want me to bring them [the Iranian fugitives to Argentina]. You never know what should be done.

It’s not clear who made the recordings or why they were leaked just now. Timerman himself just made a sudden reappearance on Twitter to complain that they were made in secret by Borger and that indeed seems the likeliest explanation. (Timerman did not, notably, claim that the recordings were fake, or that they distorted his views.) By the sound of the recordings, it seems that Borger and Scaliter simply put Timerman on the speaker in their office and recorded the conversations without mentioning that they were doing so.

Considering the track record of the previous government of President Cristina Fernández de Kirchner, whom Timerman served, in publicly hounding those who crossed it, Borger and Scaliter may have wished to have a guarantee that their conversation was recorded faithfully. The recent election of Mauricio Macri as President, a completely unexpected outcome for Fernández de Kirchner and her allies, may have emboldened the AMIA leaders to leak the recordings now.

There may be others with secrets to reveal, now that they can do so without harassment from Fernández de Kirchner’s government. The mother of Alberto Nisman, the late federal prosecutor investigating the AMIA bombing, told a journalist in recent days that she has a digital copy of “all” of her son’s formal complaint against Timerman and Fernández de Kirchner over their deal with Iran, along with “all” the evidence he collected to support it.

It’s not clear whether Nisman, who was found dead in January 2015 hours before he was to present his complaint, would have had access to the recordings. As Scaliter pointed out in his conversation with Timerman, Nisman was working for the government and not AMIA, and in any case had access to other sources of information about the negotiations with Iran.

The revelation of these recordings confirms Nisman’s thesis that the Memorandum was a sham, designed to protect those guilty of the AMIA Massacre. The Argentine government, despite knowing that Iran’s responsibility was beyond doubt, agreed to let the murderers “investigate” themselves through an Orwellian “Truth Commission,” and led Iran to believe that simply signing the Memorandum would lead to Interpol dropping the arrest warrants against its citizens, which seems to have been Tehran’s initial if not principal motivation in negotiating the pact. As a result, trade relations between the two countries would flourish, allowing enormous sums to be made by Argentine officials in state-body-to-state-body deals free from market pressures or scrutiny, the preferred kirchnerista business model. Elsewhere on the recordings, Timerman speaks of the negotiations being a “great opportunity for Argentina.” It’s not difficult to imagine what kind of opportunity he had in mind and which Argentines he thought might benefit.

Every word spoken by the former Argentine government and its supporters in defense of the Memorandum has now been proven to be a lie – not that there was ever much doubt about that. As soon as her husband and predecessor Nestor Kirchner died in October 2010, Cristina Fernández de Kirchner could not wait to launch negotiations with Iran, hoping to bury the AMIA issue once and for all.

And the worst of it is that none of this should come as a shock. Shortly after Timerman’s appointment as Foreign Minister in 2010, I wrote this satire on his complaisant attitude to the Iranians on a blog sponsored by the American Jewish Committee. Looking back, it’s clear that Cristina Fernández de Kirchner’s handling of the AMIA case was, in fact, far worse than I imagined it was going to be. Deeper details on the Iranian mission to kill Jews in Argentina.

Forget the EMP, It’s the Hack, You’re at Risk

Iranian hackers infiltrated computers of small dam in NY

WASHINGTON (Reuters) – Iranian hackers breached the control system of a dam near New York City in 2013, an infiltration that raised concerns about the security of the country’s infrastructure, the Wall Street Journal reported on Monday, citing former and current U.S. officials.

Two people familiar with the breach told the newspaper it occurred at the Bowman Avenue Dam in Rye, New York. The small structure about 20 miles from New York City is used for flood control.

The hackers gained access to the dam through a cellular modem, the Journal said, citing an unclassified Department of Homeland Security summary of the incident that did not specify the type of infrastructure.

The dam is a 20-foot-tall concrete slab across Blind Brook, about five miles from Long Island Sound.

“It’s very, very small,” Rye City Manager Marcus Serrano told the newspaper. He said FBI agents visited in 2013 to ask the city’s information-technology manager about a hacking incident.

The dam breach was difficult to pin down, and federal investigators at first thought the target was a much larger dam in Oregon, the Journal said.

The breach came as hackers linked to the Iranian government were attacking U.S. bank websites after American spies damaged an Iranian nuclear facility with the Stuxnet computer worm.

It illustrated concerns about many of the old computers controlling industrial systems, and the White House was notified of the infiltration, the Journal said.

The newspaper said the United States had more than 57,000 industrial control systems connected to the Internet, citing Shodan, a search engine that catalogs each machine.

Homeland Security spokesman S.Y. Lee would not confirm the breach to Reuters. He said the department’s 24-hour cybersecurity information-sharing hub and an emergency response team coordinate responses to threats to and vulnerabilities in critical infrastructure.

***

Cant Sleep, You are at Risk

In part from Wired: If you want to keep yourself up at night, spend some time reading about the latest developments in cybersecurity. Airplanes hacked, cars hacked, vulnerabilities in a breathtaking range of sensitive equipment from TSA locks to voting booths to medical devices.

The big picture is even scarier. Former NSA Director Mike McConnell suspects China has hacked “every major corporation” in the US. Edward Snowden’s NSA leaks revealed the US government has its own national and international hacking to account for. And the Ponemon Institute says 110 million Americans saw their identities compromised in 2014. That’s one in two American adults.

The system is broken. It isn’t keeping us, our companies, or our government safe. Worse yet, no one seems to know how to fix it.

How Did We Get Here?

One deceptive truth seems to drive much of the cybersecurity industry down a rabbit hole: If you keep bad actors and bad software out of your system, you have nothing to worry about.

Malicious actors target “endpoints”—any device or sensor connected to a network—to break into that network. Network security seeks to protect those endpoints with firewalls, certificates, passwords, and the like, creating a secure perimeter to keep the whole system safe.

This wasn’t difficult in the early days of the Internet and online threats. But today, most private networks have far too many endpoints to properly secure. In an age of “Bring Your Own Device,” the cloud, remote access, and the Internet of Things, there are too many vulnerabilities hackers can exploit. As Ajay Arora, CEO of file security company Vera, notes, there is no perimeter anymore. It’s a dream of the past.

But the security paradigm remains focused on perimeter defense because, frankly, no one knows what else to do. To address threats, security experts should assume compromise – that hackers and malware already have breached their defenses, or soon will – and instead classify and mitigate threats.

The CIA Triad

The information security community has a model to assess and respond to threats, at least as a starting point. It breaks information security into three essential components: confidentiality, integrity, and availability.

Confidentiality means protecting and keeping your secrets. Espionage and data theft are threats to confidentiality.

Availability means keeping your services running, and giving administrators access to key networks and controls. Denial of service and data deletion attacks threaten availability.

Integrity means assessing whether the software and critical data within your networks and systems are compromised with malicious or unauthorized code or bugs. Viruses and malware compromise the integrity of the systems they infect.

The Biggest Threat

Of these, integrity is the least understood and most nebulous. And what many people don’t realize is it’s the greatest threat to businesses and governments today.

Meanwhile, the cybersecurity industry remains overwhelmingly focused on confidentiality. Its mantra is “encrypt everything.” This is noble, and essential to good security. But without integrity protection, the keys that protect encrypted data are themselves vulnerable to malicious alteration. This is true even of authenticated encryption algorithms like AES-GCM.

In the bigger picture, as cybercrime evolves, it will become clear that loss of integrity is a bigger danger than loss of confidentiality. One merely has to compare different kinds of breaches to see the truth of this:

A confidentiality breach in your car means someone learns your driving habits. An integrity breach means they could take over your brakes. In a power grid, a confidentiality breach exposes system operating information. An integrity breach would compromise critical systems, risking failure or shutdown. And a confidentiality breach in the military would mean hackers could obtain data about sensitive systems. If they made an integrity beach, they could gain control over these weapons systems. Full details and actions you can take to protect yourself, go here.

FBI Prevented from Using Open Source?

‘ISIS Supporters’ Twitter Accounts Traced To UK Government Department’: Report

NDTV: London:  Hackers in Britain have claimed that a number of ISIS supporters’ social media accounts are being run from internet addresses linked to the UK government’s Department for Work and Pensions (DWP).

A group of four young computer experts, who call themselves VandaSec, have unearthed evidence indicating that at least three ISIS-supporting accounts can be traced back to the DWP’s London offices, the ‘Daily Mirror’ reported.

Every computer and mobile phone logs onto the internet using an IP address, which is a type of identification number. The hacking collective showed the newspaper details of the IP addresses used by three separate so-called “digital jihadis” to access Twitter accounts, which were then used to carry out online recruitment and propaganda campaigns.

At first glance, the IP addresses seem to be based in Saudi Arabia, but upon further inspection using specialist tools they appeared to link back to the DWP.

The newspaper learned that the British government had sold on a large number of IP addresses to two Saudi Arabian firms.

After the sale completed in October of this year, they were used by extremists to spread their message of hate.

A Cabinet Office spokesperson said: “The government owns millions of unused IP addresses which we are selling to get a good return for hardworking taxpayers.

“We have sold a number of these addresses to telecoms companies both in the UK and internationally to allow their customers to connect to the internet. We think carefully about which companies we sell addresses to, but how their customers use this internet connection is beyond our control.”

The UK government has not revealed how much money it has made from the sale of IP addresses.

Now we have learned that DHS has an edit to not use social media or open source for reasons of profiling, which likely has handicapped the FBI from sourcing and connecting intelligence when it comes to cultivating data on would-be jihadists.

Jihadists are making their plans public. Why hasn’t the FBI caught on?

Each week, In Theory takes on a big idea in the news and explores it from a range of perspectives. This week we’re talking about Internet encryption. Need a primer? Catch up here.

WaPo: Rita Katz is the director of the SITE Intelligence Group and has spent nearly two decades tracking, studying and reporting on jihadists. She has testified before Congress and in terrorism trials, briefed the White House, and is the author of the book “Terrorist Hunter: The Extraordinary Story of a Woman who Went Undercover to Infiltrate the Radical Islamic Groups Operating in America.”

Following the terrorist attacks in Paris and San Bernardino, Calif., FBI Director James Comey revealed to the Senate Judiciary Committee that one of the two Islamic State-inspired shooters in the May 3 attack in Garland, Tex., “exchanged 109 messages with an overseas terrorist” the morning of the attack. He followed up by saying that the FBI was unable to read those messages. His implication? Better regulation of message-disguising encryption technology could have revealed the shooters’ plans earlier and could help prevent attacks.

However, regulation of encryption is unlikely to provide the government with the counterterrorism benefit it says it will.  Jihadists’ main tool for planning and executing attacks in recent years has been social media — to which the government has full access — not encrypted messaging. In addition, regulation of one messaging technology will lead to immediate adaptation and the creation of ways to circumvent it.

In recent years, smartphones and social media have enabled users from around the world to communicate easily, safely and free of charge. Programs facilitating such communications sprouted, and jihadists — the Islamic State in particular — quickly adopted them as their main means of communication. For over three years, Twitter has been the Islamic State’s most important platform. High-level operatives within the group have used Twitter’s unencrypted direct messaging to recruit, give instructions for donating and plan attacks. Jihadists even rely on Twitter to promote their channels on other platforms, such as Telegram, which supporters would otherwise have difficulty finding.

Jihadists’ presence on social media has also spread the Islamic State around the world, with people of all ages, sexes and ethnicities leaving their families and friends to join the group. Social media use has been linked to executed and attempted lone-wolf attacks in the United StatesCanadaAustraliaFranceDenmark and other Western nations.

The Garland, Tex., shooting — the only example Comey used  as an impetus to regulate encrypted technology — in fact makes the opposite point. Attacker Elton Simpson, who was under previous FBI terror-related investigations, used Twitter to openly follow and communicate with high-profile terrorists. His account was followed by prominent English-speaking Islamic State fighters and recruiters Abu Rahin Aziz and Junaid Hussain — both of whom for a long time were known to provide manuals on how to carry out lone-wolf attacks from Raqqa, Syria, before they were killed. Simpson also followed and communicated with Mohamed Abdullahi Hassan, a known American jihadist in Somalia who pledged allegiance to the Islamic State.

Relatedly, the incitement for the Texas shooting came from Hassan’s 31st Twitter account. Simpson, a friend and follower of Hassan, retweeted the call and later requested that Hassan send him a direct message. We at SITE, using only open-source information, reported on the call before the attack took place, and the FBI had a week to investigate the matter before the shooting. Though only nine Twitter users retweeted the call for attack, the FBI failed to prevent it.

The encrypted messages Comey mentioned before the Judiciary Committee were discovered by the FBI only after the attack took place, but Simpson’s open-source communication was available far in advance. There is in fact no evidence that this or any of these other lone-wolf attacks could have been prevented by regulation of encryption technology.

In stark contrast, a proper, targeted open-source investigation could have. Yet the FBI is reluctant to recognize open-source as an important — arguably the most important — tool to track jihadists online.

It’s also important to note that jihadists are very quick to adapt online. In the past year alone, the Islamic State and al-Qaeda fighters have moved quickly from WhatsApp to Kik, Wickr, Surespot, then to Telegram – all different encryption programs created to give smartphone users safe and free text messaging available across multiple devices.  Jihadists are constantly ranking, debating and explaining which of the services is the safest and most effective. Regulation of these programs will take jihadists next to no time to circumvent; the U.S. government would be the one taking years to catch up. And even if successful, they may be able to regulate companies based in the United States, but such programs would appear everywhere else, from Russia to India to China

SITE’s leadership and continued success do not stem from access to secret databases. Our research, investigations and reporting are based on open-source information — social media, forums, websites, blogs, IP addresses — which can be immensely powerful if used wisely. Government agencies, however, seem blind to this bountiful intelligence resource, and too often rely solely on classified documents and back-end access to websites.

Rather than try to create backdoors to encrypted communication services, or use the lack thereof as an excuse to intelligence failures, the U.S. government must first know how to utilize the mass amount of data it has been collecting and to improve its monitoring of jihadist activity online. A focused approach of this sort is much more likely to lead to success in the war on terrorism.