ISIS Called for Ramadan Day of Terror

Day of terror: Islamist attacks around world follow ISIS’ Ramadan message

Terrorists gunned down dozens of tourists on a Tunisian beach, left a severed head atop a fence outside a French factory and blew up a Kuwaiti mosque Friday in a bloody wave of attacks that followed an ISIS leader’s call to make the month of Ramadan a time of “calamity for the infidels.”

There was no confirmation that the attacks were a coordinated effort ordered by ISIS, but the suspects who attacked a U.S.-owned gas factory in southeastern France left the terrorist army’s flags next to the severed head of their victim, and an ISIS affiliate claimed responsibility for the deadly Kuwait blast.

If the attacks were indeed an answer to ISIS spokesman Abu Muhammad al-Adnani’s recent call for savagery, it would represent a hideous perversion of Islam’s most holy period, which began June 17 and ends July 17.

“The attack was of a terrorist nature since a body was discovered, decapitated and with inscriptions.”

– French President Francois Hollande

Jihadists should make Ramadan a time of “calamity for the infidels … Shi’ites and apostate Muslims,” Al-Adnani said in a recent audio message. “Muslims everywhere, we congratulate you over the arrival of the holy month. Be keen to conquer in this holy month and to become exposed to martyrdom.”

The attack in France occurred first, Friday morning in Saint-Quentin-Fallavier, northwest of the Alpine city of Grenoble. Two suspects dressed as deliverymen crashed a car into an industrial gas plant operated by Allentown, Pa.,-based Air Products & Chemicals, stormed inside and killed at least one person. The head of the victim was left on a fence, with Arabic phrases scrawled on it and ISIS flags nearby, Sky News reported, citing French legal sources.

The unnamed victim was a businessman at a local transportation company and the boss of a man arrested in connection with the attack.

Nearly simultaneously, a gunman opened fire with an automatic rifle on a beach in Sousse– a Tunisian coastal town popular with tourists– killing at least 37 and wounding 36. The Health Ministry said the dead include Tunisians, Brits, Germans and Belgians.

A third attack killed at least 25 and wounded more than 200 in a Shia mosque in Kuwait City, the  Ministry of Interior said. A suicide bomber purportedly from ISIS affiliate Najd Province targeted Shiite worshippers after midday prayers at the Imam Sadiq Mosque in the residential neighborhood of al-Sawabir in Kuwait’s capital, Kuwait City. It was the first terrorist attack in Kuwait in more than two decades.

ISIS is comprised of Sunni Muslims, and its members have a long and bloody history with Shia Muslims, as evidenced by Al-Adnani’s call. The attack came immediately following Friday prayers. There was no claim of responsibility, but ISIS has claimed responsibility for bombings at two different Shiite mosques in Saudi Arabia in recent weeks.

French officials wasted no time labeling Friday’s attack an act of terrorism.

“The attack was of a terrorist nature since a body was discovered, decapitated and with inscriptions,” French President Francois Hollande told a news conference in Brussels, where he cut short his attendance at an EU summit to return to France.

Hollande and his Tunisian counterpart Beji Caid Essebsi expressed “solidarity in the face of terrorism,” according to a statement by Hollande’s office, France24.com reported.

Interior Minister Bernard Cazeneuve said at least one man–a 30-year-old extremist known to authorities named Yassin Sahli– was under arrest following the France attack. The suspect from Lyon was seized by an alert firefighter.

Other people, including the man’s wife, were also taken into custody after the attack, A second suspect arrested at his home in Saint-Quentin-Fallavier was reportedly seen driving back and forth past the factory before the attack, the Dauphine Libere newspaper reported. A manhunt is underway for any other suspects involved.

Minister Cazeneuve, speaking from the scene, described the attack as “barbarous” and a “terrible terrorist crime.” He said the suspect had been known to foreign intelligence services since 2006, but that police monitoring of him had ceased in 2008. The man did not have a criminal record, the minister added.

French authorities told Fox News that approximately 10 people were injured.

The factory is operated by Air Products & Chemicals, an Allentown, Pa.,-based company that makes industrial gases.

“Our priority at this stage is to take care of our employees, who have been evacuated from the site and all accounted for,” the company said in a statement. “Our crisis and emergency response teams have been activated and are working closely with all relevant authorities.”

A local official confirmed the nation is on high alert.

“The terrorism threat is at a maximum,” Alain Juppe, mayor of Bordeaux, told Fox News.

The United Nations, the U.S and other countries condemned Friday’s attacks. U.N. Secretary-General Ban Ki-moon said those “responsible for such appalling acts of violence must be swiftly brought to justice” and Interpol offered its help to all three nations.

In Washington, Pentagon spokesman Col. Steve Warren said it was too soon to tell whether the three attacks were the work of Islamic State extremists but added “we unequivocally condemn these terrorist attacks.

Terrorism analysts said the attacks could be so-called “lone wolves” answering the call to attack ISIS enemies during the holy period.

“It is very likely that ISIS’ supporters acted due to the call for attacks during Ramadan,” said Ryan Mauro, of the New York-based terrorism research institute Clarion Project. “It is appealing to ISIS supporters on a personal level because it gives their attacks some more religious significance.”

France’s anti-terrorism prosecutor has opened an investigation into the incident. The country went on high alert after a series of attacks in January that left 20 people dead in and around Paris region, including the Islamic terrorists. In the Jan. 7 attack at the satirical magazine Charlie Hebdo, two radical Muslim brothers, Saïd and Chérif Kouachi, heavily armed and incensed over the publishing of caricatures of Muhammad, stormed the magazine’s offices and killed 12, including staffers and a police officer.

Authorities hunted down the Kouachi brothers for three days, until finally cornering them in a Paris printing house and killing them in a shootout. As police searched for the brothers’, a friend and fellow home grown Islamic terrorist Amedy Coulibaly, took at least 15 people hostage at a kosher supermarket in Paris. After a long standoff,  police stormed the market, killing him. Four hostages were also killed in the incident.

Ramadan is the ninth month of the Islamic lunar calendar when Muslims celebrate the Koran. They also often fast– primarily from eating and drinking– from sunrise to sunset every day of the month to teach empathy for those who have less. Fasting and reading the Koran during Ramadan should encourage charity, kindness and social justice, especially to the needy and poor.

National Preparedness is up to YOU

At no other time in American history has the United States been so vulnerable to national security threats. The text below is for you benefit, take is seriously and don’t rely on FEMA, you are your own best resource.

National Preparedness Report

Main Content

This page provides information on the 2015 National Preparedness Report, including the overarching findings on national issues, preparedness progress, and opportunities for improvement. This page is for anyone interested in seeing how preparedness can inform priorities and community actions.

National Preparedness Report

The 2015 National Preparedness Report marks the fourth iteration of this annual report. Required annually by Presidential Policy Directive 8: National Preparedness, the National Preparedness Report summarizes progress in building, sustaining, and delivering the 31 core capabilities described in the 2011 National Preparedness Goal (the Goal). Each year, the report presents an opportunity to assess gains that whole community partners—including all levels of government, private and nonprofit sectors, faith-based organizations, communities, and individuals—have made in preparedness, and to identify where challenges remain.

The intent of the National Preparedness Report is to provide the Nation with practical insights on preparedness that can inform decisions about program priorities, resource allocations, and community actions. The 2015 National Preparedness Report focuses primarily on preparedness activities undertaken or reported during 2014, and places particular emphasis on progress made in implementing the National Planning Frameworks (the Frameworks) across the Prevention, Protection, Mitigation, Response, and Recovery mission areas. The Frameworks describe how the whole community works together to achieve the goal of a secure and resilient Nation.

Overarching Findings on National Issues

In addition to key findings for each of the five preparedness mission areas, the 2015 NPR identifies overarching national trends that cut across multiple mission areas:

  • Incorporating Emergency Preparedness into Technology Platforms: Businesses and public-private partnerships are increasingly incorporating emergency preparedness into technology platforms, such as Internet and social media tools and services.
  • Challenges Assessing the Status of Corrective Actions: While Federal departments and agencies individually assess progress for corrective actions identified during national-level exercises and real-world incidents, challenges remain to comprehensively assess corrective actions with broad implications across the Federal Government.
  • Response Coordination Challenges for Events that Do Not Receive Robert T. Stafford Disaster Relief and Emergency Assistance Act (Stafford Act) Declarations: Recent events, including the epidemic of Ebola virus disease, have highlighted challenges with coordinating the response to and recovery from complex incidents that do not receive Stafford Act declarations.

The Nation Continues to Make Progress

The 2015 NPR identifies three new core capabilities – Environmental Response/Health and Safety, Intelligence and Information Sharing, and Operational Coordination – as meeting acceptable levels of performance but requiring sustained effort to maintain capability and meet emerging challenges. These capabilities join five others from the 2014 report that future National Preparedness Reports will revisit to determine if they are still meeting performance goals.

Opportunities for Improvement

The 2015 National Preparedness Report also highlights key preparedness challenges remaining for the Nation. Three core capabilities—Cybersecurity, Housing, and Infrastructure Systems—have persisted as areas for improvement across all four National Preparedness Reports. A fourth core capability, Long-term Vulnerability Reduction, repeats as an area for improvement from last year, due in part to questions surrounding the long-term solvency of the National Flood Insurance Program and nascent national efforts for climate change adaptation and green infrastructure. Preparedness data further revealed that the Federal Government, states, and territories are also struggling to build capacity for the Access Control and Identity Verification and Economic Recovery core capabilities. These areas for improvement are a reminder that preparedness gains are gradual and that solutions to complex challenges will not materialize without sustained support from the whole community.

Key Factors for Future Progress

The 2015 NPR represents the fourth opportunity for the Nation to reflect on progress in strengthening national preparedness and to identify where preparedness gaps remain. Looking across all five mission areas, the NPR provides a national perspective on critical preparedness trends for whole community partners to use to inform program priorities, to allocate resources, and to communicate with stakeholders about issues of shared concern.

Resources

Core Capabilities

Main Content

The National Preparedness Goal identified 31 core capabilities—these are the distinct critical elements needed to achieve the goal.

These capabilities are referenced in many national preparedness efforts, including the National Planning Frameworks. The Goal grouped the capabilities into five mission areas, based on where they most logically fit. Some fall into only one mission area, while some others apply to several mission areas.

Download the capabilities crosswalk to see how the legacy Target Capabilities List compares with the new core capabilities.

Planning

  • Mission Areas: All
  • Description: Conduct a systematic process engaging the whole community as appropriate in the development of executable strategic, operational, and/or community-based approaches to meet defined objectives.

Public Information and Warning

  • Mission Areas: All
  • Description: Deliver coordinated, prompt, reliable, and actionable information to the whole community through the use of clear, consistent, accessible, and culturally and linguistically appropriate methods to effectively relay information regarding any threat or hazard, as well as the actions being taken and the assistance being made available, as appropriate.

Operational Coordination

  • Mission Areas: All
  • Description: Establish and maintain a unified and coordinated operational structure and process that appropriately integrates all critical stakeholders and supports the execution of core capabilities.

Forensics and Attribution

  • Mission Area: Prevention
  • Description: Conduct forensic analysis and attribute terrorist acts (including the means and methods of terrorism) to their source, to include forensic analysis as well as attribution for an attack and for the preparation for an attack in an effort to prevent initial or follow-on acts and/or swiftly develop counter-options.

Intelligence and Information Sharing

  • Mission Areas: Prevention, Protection
  • Description: Provide timely, accurate, and actionable information resulting from the planning, direction, collection, exploitation, processing, analysis, production, dissemination, evaluation, and feedback of available information concerning threats to the United States, its people, property, or interests; the development, proliferation, or use of WMDs; or any other matter bearing on U.S. national or homeland security by Federal, state, local, and other stakeholders. Information sharing is the ability to exchange intelligence, information, data, or knowledge among Federal, state, local, or private sector entities, as appropriate.

Interdiction and Disruption

  • Mission Areas: Prevention, Protection
  • Description: Delay, divert, intercept, halt, apprehend, or secure threats and/or hazards.

Screening, Search, and Detection

  • Mission Areas: Prevention, Protection
  • Description: Identify, discover, or locate threats and/or hazards through active and passive surveillance and search procedures. This may include the use of systematic examinations and assessments, sensor technologies, or physical investigation and intelligence.

Access Control and Identity Verification

  • Mission Area: Protection
  • Description: Apply a broad range of physical, technological, and cyber measures to control admittance to critical locations and systems, limiting access to authorized individuals to carry out legitimate activities.

Cybersecurity

  • Mission Area: Protection
  • Description: Protect against damage to, the unauthorized use of, and/or the exploitation of (and, if needed, the restoration of) electronic communications systems and services (and the information contained therein).

Physical Protective Measures

  • Mission Area: Protection
  • Description: Reduce or mitigate risks, including actions targeted at threats, vulnerabilities, and/or consequences, by controlling movement and protecting borders, critical infrastructure, and the homeland.

Risk Management for Protection Programs and Activities

  • Mission Area: Protection
  • Description: Identify, assess, and prioritize risks to inform Protection activities and investments.

Supply Chain Integrity and Security

  • Mission Area: Protection
  • Description: Strengthen the security and resilience of the supply chain.

Community Resilience

  • Mission Area: Mitigation
  • Description: Lead the integrated effort to recognize, understand, communicate, plan, and address risks so that the community can develop a set of actions to accomplish Mitigation and improve resilience.

Long-term Vulnerability Reduction

  • Mission Area: Mitigation
  • Description: Build and sustain resilient systems, communities, and critical infrastructure and key resources lifelines so as to reduce their vulnerability to natural, technological, and human-caused incidents by lessening the likelihood, severity, and duration of the adverse consequences related to these incidents.

Risk and Disaster Resilience Assessment

  • Mission Area: Mitigation
  • Description: Assess risk and disaster resilience so that decision makers, responders, and community members can take informed action to reduce their entity’s risk and increase their resilience.

Threats and Hazard Identification

  • Mission Area: Mitigation
  • Description: Identify the threats and hazards that occur in the geographic area; determine the frequency and magnitude; and incorporate this into analysis and planning processes so as to clearly understand the needs of a community or entity.

Critical Transportation

  • Mission Area: Response
  • Description: Provide transportation (including infrastructure access and accessible transportation services) for response priority objectives, including the evacuation of people and animals, and the delivery of vital response personnel, equipment, and services into the affected areas.

Environmental Response/Health and Safety

  • Mission Area: Response
  • Description: Ensure the availability of guidance and resources to address all hazards including hazardous materials, acts of terrorism, and natural disasters in support of the responder operations and the affected communities.

Fatality Management Services

  • Mission Area: Response
  • Description: Provide fatality management services, including body recovery and victim identification, working with state and local authorities to provide temporary mortuary solutions, sharing information with mass care services for the purpose of reunifying family members and caregivers with missing persons/remains, and providing counseling to the bereaved.

Infrastructure Systems

  • Mission Area: Response, Recovery
  • Description: Stabilize critical infrastructure functions, minimize health and safety threats, and efficiently restore and revitalize systems and services to support a viable, resilient community.

Mass Care Services

  • Mission Area: Response
  • Description: Provide life-sustaining services to the affected population with a focus on hydration, feeding, and sheltering to those who have the most need, as well as support for reunifying families.

Mass Search and Rescue Operations

  • Mission Area: Response
  • Description: Deliver traditional and atypical search and rescue capabilities, including personnel, services, animals, and assets to survivors in need, with the goal of saving the greatest number of endangered lives in the shortest time possible.

On-scene Security and Protection

  • Mission Area: Response
  • Description: Ensure a safe and secure environment through law enforcement and related security and protection operations for people and communities located within affected areas and also for all traditional and atypical response personnel engaged in lifesaving and life-sustaining operations.

Operational Communications

  • Mission Area: Response
  • Description: Ensure the capacity for timely communications in support of security, situational awareness, and operations by any and all means available, among and between affected communities in the impact area and all response forces.

Public and Private Services and Resources

  • Mission Area: Response
  • Description: Provide essential public and private services and resources to the affected population and surrounding communities, to include emergency power to critical facilities, fuel support for emergency responders, and access to community staples (e.g., grocery stores, pharmacies, and banks) and fire and other first response services.

Public Health and Medical Services

  • Mission Area: Response
  • Description: Provide lifesaving medical treatment via emergency medical services and related operations and avoid additional disease and injury by providing targeted public health and medical support and products to all people in need within the affected area.

Situational Assessment

  • Mission Area: Response
  • Description: Provide all decision makers with decision-relevant information regarding the nature and extent of the hazard, any cascading effects, and the status of the response.

Economic Recovery

  • Mission Area: Recovery
  • Description: Return economic and business activities (including food and agriculture) to a healthy state and develop new business and employment opportunities that result in a sustainable and economically viable community.

Health and Social Services

  • Mission Area: Recovery
  • Description: Restore and improve health and social services networks to promote the resilience, independence, health (including behavioral health), and well-being of the whole community.

Housing

  • Mission Area: Recovery
  • Description: Implement housing solutions that effectively support the needs of the whole community and contribute to its sustainability and resilience.

Natural and Cultural Resources

  • Mission Area: Recovery
  • Description: Protect natural and cultural resources and historic properties through appropriate planning, mitigation, response, and recovery actions to preserve, conserve, rehabilitate, and restore them consistent with post-disaster community priorities and best practices and in compliance with appropriate environmental and historical preservation laws and executive orders.

Truck Hijacked in Mexico, Visas Stolen

Sheesh, can it get worse?

MEXICO CITY (AP) — The U.S. Embassy in Mexico says a truck carrying visas was hijacked in northern Mexico and the visas stolen.

The embassy says in a statement Wednesday that the theft occurred on June 7 “in northern Mexico,” without specifying where.

The truck was making a trip from the United States to U.S. Consulates in the cities of Monterrey and Guadalajara.

Some approved border crossing cards also were stolen. An electronic alert has been issued so that the stolen cards cannot be used to cross the border.

The cards were re-issued for the intended holders, but they have also been advised of the robbery in case the cards are used in attempts at identity theft.

***

The Vice Admiral of the Coast Guard delivered testimony on drug interdiction on the waterways. In part:

Emerging Threats: Transnational Organized Crime, Violence, and Instability
One of the goals of the Coast Guard’s drug interdiction program is to interdict illicit traffic as close to the source zone1 as possible. This helps to keep the drugs from reaching the shores of Central America where it is transported over land into Mexico, and then to the United States, where the proceeds from the sale of drugs fuel TOC networks. These nefarious organizations operate with impunity throughout Central America while vying for power through drug-fueled violence and corruption of government officials; in fact, eight out of the ten most violent nations in the world are along these trafficking routes in the Western Hemisphere. Traffickers have also increasingly moved product through the Central and Eastern Caribbean vector. Corresponding with this movement, the homicide rate in Puerto Rico is five times that of the rest of the United States. Drug trafficking has destabilized regional states, undermined the rule of law, terrorized citizens, and driven both families and unaccompanied children to migrate to the United States. To be clear, the flow of illicit drugs funds TOC networks which pose a significant and growing threat to national and international security.

Then Border Patrol has their terrifying summary. Yes, it can get worse and Border Patrol is telling the media just how bad it is, but who is really listening, who will address the issues and how is this breaking national security policy? The clarion call is being made, but is there a busy signal?

From the LA Times in full:

Rank-and-file Border Patrol agents are furious that they have lost some of their favorite enforcement tools and say that intense public criticism of border shootings has led to a morale crisis.

“We lack the political will to enforce the law and allow our agency to be effective,” said National Border Patrol Council spokesman Shawn Moran in a conference call with reporters Wednesday. The call was coordinated by the union that represents the agents.

Among the most far-reaching and damning accusations from agents working entry points in Arizona, Texas and California was that the U.S. Customs and Border Patrol administration in Washington does not want agents to make drug busts and has taken away their ability to do so.

Shane Gallagher, an agent in the San Diego sector, said roving interdiction patrols — in which agents would stop suspicious vehicles north of the border — were extraordinarily successful at nabbing border crossers with drugs. But those patrols would then create uncomfortable questions for the ports through which the vehicles had just passed, he said.

“Now the port of entry has to explain who was in the primary lane, what actions were taken, if the vehicle was inspected, so you can see there’s a whole host of implications,” he said.

Though rank-and-file agents saw the value in drug interdictions, Gallagher said, agency leadership did not and drastically reduced the number of agents doing such work.

“There was a lot of pressure for us to get out of the [drug] interdiction game,” Gallagher said.

The decision to speak with reporters comes as rank-and-file agents have come under intense criticism for their involvement in fatal cross-border shootings – including the slaying of a 15-year-old boy who was walking home from a basketball game in Nogales, Mexico, when he was hit by a bullet fired by an agent on the Arizona side of the border.

According to records released last month, only 13 out of 809 abuse complaints sent to Customs and Border Protection’s office of internal affairs between January 2009 and January 2012 led to disciplinary action, and last week, the agency’s head of internal affairs was removed from his post.

A Customs and Border Protection spokesman declined to comment Wednesday when reached by the Los Angeles Times.

The agency also handcuffed agents by instituting civil liberties protections for potential targets of investigations at public transit stations or on agricultural land, colloquially known as a “farm and ranch check,” Moran said.

For such checks, Moran said, agents are required to create an “operations plan” and be able to show supervisors some kind of intelligence that connects targets of investigations to potential criminal activity. No longer, he said, can Border Patrol agents simply question random people.

Amid a flood of women and children turning themselves in at the border, agents also criticized administration directives to lend help to neighboring agencies.

The Border Patrol “grew but other agencies didn’t grow,” said Tucson sector Agent Art Del Cueto. “They’ve been butchering our agency to assist other agencies.”

According to Agent Chris Cabrera of the Rio Grande Valley sector in southern Texas, in one hour last week, 80 people, mostly women and children, turned themselves in to the Border Patrol in the Rincon Village area of his sector.

Overall, the agency finds itself holding 500 people in the Rio Grande Valley sector each day, he said, down from 700 people each day last year, when a flood of women and children from Central America overwhelmed the U.S. immigration sector.

Typically, one or two agents are stationed near Rincon Village to get people into a shelter and check them for weapons. Those agents can handle 10 or 15 people at once, Cabrera said. But when scores arrive, the agency must call on other agents to respond.

“You’re leaving large swaths of the area unprotected,” Cabrera said. “You take a few agents from the field, then you take a few more, and before you know it, you’re down to five agents covering a 53-mile stretch of river.”

Agents criticized the Border Patrol as top-heavy, with a ratio of four or five agents per each supervisor, a ratio that the agents said should be closer to 10 agents per supervisor.

Cabrera said the issue isn’t a lack of resources, but the way in which they’re used.

“We do not have what we need,” he said, “to do the job we need done.”

Illegal Immigrants, the DOJ Protected Class

Just the facts as reported to Fox News:

‘Not only are illegal immigrant women and children continuing to cross the border in large numbers, but the majority charged with crimes aren’t even showing up for court.

“That strategy is obviously a complete failure because such a high percentage of these people who were not detained have simply melted into the larger illegal population and have no fear of immigration enforcement,” said Jessica Vaughan, director of policy studies for the Center for Immigration Studies.

Statistics released by the Department of Justice Executive Office of Immigration Review show 84 percent of those adults with children who were allowed to remain free pending trial absconded, and fewer than 4 percent deported themselves voluntarily.

Since then, ICE detained 83,385 adults and children, and immigration courts completed 24,842 cases. Of those, more than 64 percent, or 16,136, didn’t show up for court, and fewer than 4 percent, or 908, agreed to leave voluntarily.

Among adults with children not detained, 25,000 have had their initial appearance; 13,000 are still in the system, and 12,000 have had their cases completed. Of the cases completed, 10,000 failed to appear.’

Yes…there is more.

We have this 2011 memo, rather edict from the Department of Homeland Security stating the new guidance for ‘failure to appear’ is not a reason for continued detention or prosecution.

Then there is the November 2014 memo, stating that Secure Communities program has been terminated due to complaints by local legislative bodies, governors and mayors and this will take its place:

‘Accordingly, I am directing U.S. Immigration and Customs Enforcement (ICE) to discontinue Secure Communities. ICE should put in its place a program that will continue to rely on fingerprint-based biometric data submitted during bookings by state and local law enforcement agencies to the Federal Bureau of Investigation for criminal background checks. However, ICE should only seek the transfer of an alien in the custody of state or local law enforcement through the new program when the alien has been convicted of an offense listed in Priority 1 (a), (c), (d), and (e) and Priority 2 (a) and

(b) of the November 20, 2014 Policies for the Apprehension, Detention and Removal of Undocumented Immigrants Memorandum, or when, in the judgment of an ICE Field Office Director, the alien otherwise poses a danger to national security. In other words, unless the alien poses a demonstrable risk to national security, enforcement actions through the new program will only be taken against aliens who are convicted of specifically enumerated crimes.’ The full memo is here.

So, when it comes to a protected class, there are countless free programs full of advise on how to take advantage of the system and benefits.

 

U.S. Citizenship and Immigration Services (USCIS)

U.S. Citizenship and Immigration Services (USCIS) is the government agency that oversees lawful immigration to the United States. USCIS will secure America’s promise as a nation of immigrants by providing accurate and useful information to our customers, granting immigration and citizenship benefits, promoting an awareness and understanding of citizenship, and ensuring the integrity of our immigration system. www.uscis.gov

USCIS Asylum Program resources include an information guide for prospective asylum applicants available in a number of languages, “How Do I” Guides for Refugees and Asylees, and the Asylum Officer Basic Training Course Lesson Plan. For more information, visit www.uscis.gov/asylum.

E-Verify is an Internet-based system that allows an employer, using information reported on an employee’s Form I-9, to determine the eligibility of an employee to work in the United States. For most employers, the use of E-Verify is voluntary and limited to determining the employment eligibility of new hires only. There is no charge to employers to use E-Verify. Available resources include searchable web pages, demonstration videos, guides on employee rights and employer responsibilities, fact sheets, weekly webinars, an overview presentation, brochures and posters for employers and employees. USCIS also has speakers and trainers available to give live presentations at conferences and meetings across the country. See http://www.dhs.gov/everify. Contact [email protected], (888) 464-4218 with any questions or comments.

Civics and Citizenship Toolkit – A Collection of Educational Resources for Immigrants contains a variety of educational materials designed to help permanent residents learn more about the U.S. and prepare for the naturalization process. For more information, visit http://www.citizenshiptoolkit.gov.

Expanding ESL, Civics, and Citizenship Education in Your Community: A Start-Up Guide provides an overview and recommendations to help organizations design and offer ESL and civics/citizenship classes for immigrants. See http://www.uscis.gov/USCIS/Office%20of%20Citizenship/Citizenship%20Resource%20Center%20Site/Publications/PDFs/M-677.pdf.

Form I-9, Employment Eligibility Verification, is a form that U.S. employers and their new hires have been required to complete since November 6, 1986. Completion of the form shows that the employer has examined documentation from each newly hired employee to verify his or her identify and eligibility to work in the U.S. Available resources include a Form I-9 web page, the M-274, Handbook for Employers, Instructions for Completing Form I-9, and the How Do I Complete Form I-9, Employment Eligibility Verification? (M-584) brochure. See http://www.uscis.gov. Call (888) 464-4218 with any questions or comments.

USCIS Genealogy Program is a fee-for-service program providing family historians and other researchers with timely access to historical immigration and naturalization records. The USCIS Genealogy Program offers two services: Index Search using biographical information provided by the researcher and a Record Copy Request where researchers with valid record citations (USCIS file numbers), gained through a USCIS Genealogy Program index search or through independent research, may request copies of historical immigration and naturalization records. Questions about the USCIS Genealogy Program may be sent to [email protected]. For more information, see http://www.uscis.gov/portal/site/uscis/menuitem.eb1d4c2a3e5b9ac89243c6a7543f6d1a/?vgnextoid=d21f3711ca5ca110VgnVCM1000004718190aRCRD&vgnextchannel=d21f3711ca5ca110VgnVCM1000004718190aRCRD.

Guide to Naturalization contains information about the naturalization process, laws and regulations. See http://www.uscis.gov/files/article/M-476.pdf.

If You Have the Right to Work, Don’t Let Anyone Take it Away Poster is a poster with Department of Justice information regarding discrimination in the workplace. See http://www.uscis.gov/files/nativedocuments/e-verify-swa-right-to-work.pdf.

USCIS Citizenship Resource Center USCIS officially launched the Citizenship Resource Center – a Web-based portal that centralizes citizenship resources for immigrants, educators and organizations. This free, easy-to-use website will help users understand the naturalization process and gain the necessary skills to be successful during the naturalization interview and test. To visit the Citizenship Resource Center, see http://www.uscis.gov/citizenship.

USCIS Information for Employers and Employees on the employment authorization verification process and the immigration petition process. See http://www.uscis.gov/portal/site/uscis/menuitem.eb1d4c2a3e5b9ac89243c6a7543f6d1a/?vgnextoid=ff1d83453d4a3210VgnVCM100000b92ca60aRCRD&vgnextchannel=ff1d83453d4a3210VgnVCM100000b92ca60aRCRD. For more information contact [email protected].

USCIS Information for Prospective Adoptive Parents provides information about adopting a child from overseas and the process by which to do so, dependent on the country chosen to adopt from. See http://www.uscis.gov/portal/site/uscis/menuitem.eb1d4c2a3e5b9ac89243c6a7543f6d1a/?vgnextoid=8d5e901bf9873210VgnVCM100000082ca60aRCRD&vgnextchannel=8d5e901bf9873210VgnVCM100000082ca60aRCRD

See all 3 pages here. In summary, if foreign policy was effective, no country would have a fleeing class of people from a failed state. There are many to blame of this one.

 

Cyber Conflict, Chaos and Calamity

There have been several Congressional hearings on cyber-terrorism, yet with such an emergency and threat, no solution is forthcoming.

From AEI: “America’s intelligence leaders have made clear the biggest threat today is cyber and counterintelligence. Who are the largest perpetrators of these types of attacks? The intelligence report singles out Russia and China as first examples. These nations have “highly sophisticated cyber programs” and are regularly conducting “politically motivated” attacks. What are they up to exactly? Countries such as China are “reconnoitering and developing access to US critical infrastructure systems, which might be quickly exploited for disruption if an adversary’s intent became hostile.” Back in 2013, Verizon released a report detailing Chinese hackers lurking around inside American industrial control systems—the cyber equivalent to casing a robbery target. In 2014 alone, the FBI investigated a likely Russian hacking campaign against American banking backbone JP Morgan, while two cybersecurity firms blamed Iran for a major campaign against US critical infrastructure like major airliners, medical universities, and energy companies. As the year ended, the US government publicly accused North Korea of a devastating cyberattack against Sony.”

When of Office of National Intelligence produced a report, the first chapter is on cyber threats.

“Risk. Despite ever-improving network defenses, the diverse possibilities for remote hacking intrusions, supply chain operations to insert compromised hardware or software, and malevolent activities by human insiders will hold nearly all ICT systems at risk for years to come. In short, the cyber threat cannot be eliminated; rather, cyber risk must be managed. Moreover, the risk calculus employed by some private sector entities does not adequately account for foreign cyber threats or the systemic interdependencies between different critical infrastructure sectors.

Costs. During 2014, we saw an increase in the scale and scope of reporting on malevolent cyber activity that can be measured by the amount of corporate data stolen or deleted, personally identifiable information (PII) compromised, or remediation costs incurred by US victims. “

The stakes are higher than anyone will admit, most of all the White House. The Office of Personnel Management hack of personnel files now appears to exceed 18 million individuals. “FBI Director James Comey gave the 18 million estimate in a closed-door briefing to Senators in recent weeks, using the OPM’s own internal data, according to U.S. officials briefed on the matter. Those affected could include people who applied for government jobs, but never actually ended up working for the government.”

Just announced as a possible additional agency falling victim to hacking is the National Archives and Records Administration (NARA). What is chilling about this probability is all government reports, records and communications are by law to be maintained by NARA., even classified material.

EXCLUSIVE: Signs of OPM Hack Turn Up at Another Federal Agency

The National Archives and Records Administration recently detected unauthorized activity on three desktops indicative of the same hack that extracted sensitive details on millions of current and former federal employees, government officials said Monday. The revelation suggests the breadth of one of the most damaging cyber assaults known is wider than officials have disclosed.

The National Archives’ own intrusion-prevention technology successfully spotted the so-called indicators of compromise during a scan this spring, said a source involved in the investigation, who was not authorized to speak publicly about the incident. The discovery was made soon after the Department of Homeland Security’s U.S. Computer Emergency Readiness Team published signs of the wider attack — which targeted the Office of Personnel Management — to look for at agencies, according to NARA.

It is unclear when NARA computers were breached. Suspected Chinese-sponsored cyberspies reportedly had been inside OPM’s networks for a year before the agency discovered what happened in April. Subsequently, the government uncovered a related attack against OPM that mined biographical information on individuals who have filed background investigation forms to access classified secrets.

The National Archives has found no evidence intruders obtained “administrative access,” or took control, of systems, but files were found in places they did not belong, the investigator said.

NARA “systems” and “applications” were not compromised, National Archives spokeswoman Laura Diachenko emphasized to Nextgov,  “but we detected IOCs,” indicators of compromise, “on three workstations, which were cleaned and re-imaged,” or reinstalled.

“Other files found seemed to be legitimate,” such as those from a Microsoft website, she said. “We have requested further guidance from US-CERT on how to deal with these” and are still awaiting guidance on how to proceed.

It will take additional forensics assessments to determine whether attackers ever “owned” the National Archives computers, the investigator said.

Diachenko said, “Continued analysis with our monitoring and forensic tools has not detected any activity associated with a hack,” including alerts from the latest version of a governmentwide network-monitoring tool called EINSTEIN 3A.

EINSTEIN, like NARA’s own intrusion-prevention tool, is now configured to detect the tell-tale signs of the OPM attack.

“OPM isn’t the only agency getting probed by this group,” said John Prisco, president of security provider Triumphant, the company that developed the National Archives’ tool. “It could be happening in lots of other agencies.”

Prisco said he learned of the incident at a security industry conference June 9, from an agency official the company has worked with for years.

“They told us that they were really happy because we stopped the OPM attack in their agency,” Prisco said.

The malicious operation tries to open up ports to the Internet, so it can excise information, Prisco said.

“It’s doing exploration work laterally throughout the network and then it’s looking for a way to communicate what it finds back to its server,” he added.

Homeland Security officials on Monday would not confirm or deny the situation at the National Archives. DHS spokesman S.Y. Lee referred to the department’s earlier statement about the OPM hack: “DHS has shared information regarding the potential incident with all federal chief information officers to ensure that all agencies have the knowledge they need to defend against this cybersecurity incident.”

The assault on OPM represents the seventh raid on national security-sensitive or federal personnel information over the past year.

Well-funded hackers penetrated systems at the State Department, the White House, U.S. Postal Service and, previously in March 2014, OPM. Intruders also broke into networks twice at KeyPoint Government Solutions, an OPM background check provider, and once at USIS, which conducted most of OPM’s employee investigations until last summer.

On Wednesday, the House Oversight and Government Reform Committee is scheduled to hold a hearing on the OPM incident that, among other things, will examine the possibility that hackers got into the agency’s systems by using details taken from the contractors.