NATO Arms up and Putin Pledges Cooperation

  • U.S. paratroopers assault opposing forces during Black Arrow on Rukla training area in Lithuania, May 17, 2014. The exercise focuses on defensive operations and interoperability between the two forces. Lithuanian Defense Ministry photo by Eugenijus ZygaitisDefense Secretary Ash Carter will travel to Germany, Estonia, and Belgium June 21 – 26 for a series of bilateral and multilateral meetings with European defense ministers and to participate in his first NATO Ministerial as secretary of defense.
  • In this important month for the alliance, Carter will hear directly from ministers, defense leaders, and service members about the progress we have made since the Wales Summit to address the new security environment, including the challenges from Russia and NATO’s southern front, and discuss what we must do in the future to enhance the effectiveness of the alliance.

NATO's Response Force and U.K., Swedish, Finnish and U.S. Marines conduct an amphibious assault during exercise Baltic Operations 2015, June 10, 2015. U.S. Marine Corps photo by Sgt. Tatum Vayavananda

For an interactive map of Operation Atlantic Resolve, click here.

 

: The European Union on Monday extended economic sanctions against Russia until January to keep pressure on Moscow over the conflict in eastern Ukraine, drawing a rebuke and a warning of retaliation from Russian officials.

An EU statement said the decision was taken without debate by the bloc’s foreign ministers at a meeting in Luxembourg, in response to “Russia’s destabilizing role in eastern Ukraine.”

The sanctions, along with U.S. and other Western measures against Russia, have contributed to a softening of the Russian economy at a time when the price of oil that is crucial to its economic output also has fallen. The sanctions have also put a pinch on some of Russia’s key EU trading partners.

Then Putin decides to moderate and cooperate?

From IB Times: Russian President Vladimir Putin has stated that Moscow is not averse to economic co-operation with the West despite the sanctions imposed on it over the Ukraine crisis. Mr Putin was addressing the Economic forum in St Petersburg and said Russia’s economy has adapted itself to face the pressures of sanctions. Significantly, Mr Putin avoided the usual anti-Western rhetoric, observers noted.

“The imposition of so-called sanctions has forced us to significantly step up efforts to replace imports with domestic products. We have made serious steps and achieved noticeable results in a number of areas”, said Mr Putin and claimed that economy has “stabilised” and its financial and banking systems are now attuned to the new conditions. He also stressed Russia’s desire to remain a key player in the world economy and desire to work with the west as well as other countries. Noting that Russia is open to the world, Mr Putin said active co-operation with new centres of global growth, implying China, it no way means that “we intend to pay less attention to our dialogue with our traditional Western partners.”

Secretary of Defense Carter, DoD and NATO step up offensive objectives.

WASHINGTON, June 22, 2015 – The challenges to NATO from Russia and on the alliance’s southern flank will be the focus of Defense Secretary Ash Carter’s trip to the continent this week.

Click photo for screen-resolution image
U.S. Defense Secretary Ash Carter talks with news reporters aboard an aircraft June 21, 2015, en route to Berlin. Carter plans to meet with European defense ministers and participate in his first NATO ministerial as defense secretary during the trip to Germany, Estonia and Belgium. DoD photo by U.S. Air Force Master Sgt. Adrian Cadiz
  

(Click photo for screen-resolution image);high-resolution image available.

Carter arrived in Berlin yesterday for talks with the German defense minister. From Germany, he will travel to Estonia and then end his trip at the NATO defense ministerial in Brussels.

Yesterday, the secretary spoke to reporters traveling with him.

NATO is Changing

The secretary said NATO must, and is, changing to confront the new threats. Russian President Vladimir Putin’s aggressive behavior in Georgia and Ukraine must be countered, and further aggression must be deterred, he said.

The secretary said he’ll explain America’s “strong but balanced approach” to dealing with Russia.

“It’s strong, in the sense that we are cognizant of the needs to deter and be prepared to respond to Russian aggression, if it occurs, around the world, but also especially in NATO and with NATO,” Carter told reporters.

U.S. soldiers in Stryker armored vehicles arrive at Smardan Training Area, Romania, March 24, 2015. The soldiers, assigned to 2nd Squadron, 2nd Cavalry Regiment, participated in Saber Junction 15, which included 5,000 troops from 17 nations that are NATO allies and partners. U.S. Army photo by Staff Sgt. Opal Vaughn

NATO is countering Russian behavior with the Spearhead Force designed to move quickly and powerfully to the scene of an incident, the secretary said.

“Another part of that is helping the states, both NATO members and non-NATO members, at the periphery of Russia … to harden themselves to malign influence or destabilization of the kind that Russia has fomented in eastern Ukraine,” he said.

Adapting to Challenges

The balance comes from needing to work with Russia on other issues, Carter said. Russia is a part of the P5-plus-1 talks with Iran. Russia also has a role in countering terrorism.

In short, Russia’s interests do in some areas align with those of the rest of the world, the secretary said.

“The United States, at least, continues to hold out the prospect that Russia — maybe not under Vladimir Putin, but maybe some time in the future — will return to a forward-moving course rather than a backward-looking course,” Carter said.

Southern Europe is threatened by extremism, the secretary said, noting that NATO defense ministers will discuss this threat. The dangers of extremism in the Middle East, he said, is manifested by increasing streams of refugees seeking to escape ungoverned or poorly governed areas of North Africa, sub-Saharan Africa and the Middle East.

“In both of those areas NATO needs to, and is, adapting,” Carter said. “These are challenges that are different in kind from the old Fulda Gap, Cold War challenge. They are different in their own ways from Afghanistan and the kinds of things that we’ve been doing there. So it’s new, but NATO … is adapting for both of them.”

Largest Ever Criminal Medical Fraud Takedown

Great job, now how about doing the same at the IRS, at the Export-Import Bank, the SNAP (food-stamp program) and a host of other fraudulent operations throughout government.

Feds Announce Largest Ever Criminal Medical Fraud Takedown

By Serena Elavia at Fox Business

Attorney General Loretta E. Lynch and the Department of Health and Human Services (HHS) Secretary Sylvia Matthew Burwell announced yesterday the largest ever healthcare fraud takedown.

The government claimed that those involved billed Medicare and Medicaid for medically unnecessary treatments, or treatments never provided. A total of 243 individuals were charged including 46 doctors, nurses and other licensed medical professionals for a total of $712 million in fraudulent billing.

Over 44 of the defendants were charged with fraud related to the Medicare prescription drug benefit program, also known as Part D.

Here’s a by the numbers breakdown of where Medicare and Medicaid fraud occurred.

  • 1Miami, FL

    Reuters

    Number of Individuals Charged: 73

    Total Fraudulent Amount: $263 million

    Miami had the highest number of offenses of false billings for mental health services, pharmacy fraud and home health care.

  • 2Texas

    Number of Individuals Charged: 22

    Total Fraudulent Amount: $38 million

    Texas had the next highest number of individuals charged for cases in Houston, McAllen and Dallas. For example, one physician house call company submitted approximately $43 million in claims for one doctor regardless of whether or not the service was provided by him or her.

  • 3Los Angeles, CA

    Reuters

    Number of Individuals Charged: 8

    Total Fraudulent Amount: $66 million

    In Los Angeles, one case involved a doctor who allegedly caused $23 million in losses to Medicare because of fraudulent billing.

     

  • 4Detroit, MI

    Number of Individuals Charged: 16

    Total Fraudulent Amount: $122 million

    In Detroit, numerous individuals face charges for alleged roles in fraud and money laundering. For instance, owners of a hospice service allegedly paid kickbacks for referrals made by doctors who defrauded Part D by prescribing unnecessary prescriptions.

  • 5Tampa, FL

    Reuters

    Number of Individuals Charged: 5

    Total Fraudulent Amount: $ 1 million

    Alleged healthcare fraud schemes in Tampa included false physical therapy bills and billing for medical tests that never happened.

  • 6Brooklyn, NY

    Reuters

    Number of Individuals Charged: 9

    Total Fraudulent Amount: $58 million

    Two separate cases in Brooklyn involve physical and occupational therapy schemes.

  • 7New Orleans, LA

    Reuters

    Number of Individuals Charged: 11

    Total Fraudulent Amount: $110 million

    And in New Orleans, individuals were charged in a home health care and psychotherapy scheme for allegedly sending talking glucose monitors to individuals regardless of whether they needed them or not.

Chinese Intelligence at Center of OPM Hack

First reported there was Anthem, one of the largest healthcare providers that was hacked. 80 million personal records were compromised. What is notable is Anthem is part of the Blue Cross Blue Shield health coverage network and even more concerning is BCBS provides coverage to more that half of the federal government workforce.

Take note of the following fro Threatconnect.com:

“Anthem Themed Infrastructure & Signed Malware:
In September 2014, the ThreatConnect Intelligence Research Team (TCIRT) observed a variant of the Derusbi APT malware family, MD5: 0A9545F9FC7A6D8596CF07A59F400FD3, which was signed by a valid digital signature from the Korean company DTOPTOOLZ Co. Derusbi is a family of malware used by multiple actor groups but associated exclusively with Chinese APT. TCIRT began tracking the DTOPTOOLZ signature for additional signed malware samples and memorialized them within our Threat Intelligence Platform over time.
Analyst Comment: The DTOPTOOLZ signature has also been observed in association with Korean Adware that is affiliated with the actual DTOPTOOLZ Co. This adware should not be confused with the APT malware that is abusing the same digital signature.
Later, in mid-November we discovered another implant that was digitally signed with the DTOPTOOLZ signature. This implant, MD5: 98721c78dfbf8a45d152a888c804427c, was from the “Sakula” (aka. Sakurel) family of malware, a known variant of the Derusbi backdoor, and was configured to communicate with the malicious command and control (C2) domains extcitrix.we11point[.]com and www.we11point[.]com. Through our Farsight  Security passive DNS integration, we uncovered that this malicious infrastructure was likely named in such a way to impersonate the legitimate Wellpoint IT infrastructure.”

This brings us to the hack or rather simply sign-on as a root user of the 14 million personnel records of Office of Personnel Management (OPM) located in Colorado.

From Reuters:

U.S. employee data breach tied to Chinese intelligence

The Chinese hacking group suspected of stealing sensitive information about millions of current and former U.S. government employees has a different mission and organizational structure than the military hackers who have been accused of other U.S. data breaches, according to people familiar with the matter.

While the Chinese People’s Liberation Army typically goes after defense and trade secrets, this hacking group has repeatedly accessed data that could be useful to Chinese counter-intelligence and internal stability, said two people close to the U.S. investigation.

Washington has not publicly accused Beijing of orchestrating the data breach at the U.S. Office of Personnel Management (OPM), and China has dismissed as “irresponsible and unscientific” any suggestion that it was behind the attack.

Sources told Reuters that the hackers employed a rare tool to take remote control of computers, dubbed Sakula, that was also used in the data breach at U.S. health insurer Anthem Inc last year.

The Anthem attack, in turn, has been tied to a group that security researchers said is affiliated with China’s Ministry of State Security, which is focused on government stability, counter-intelligence and dissidents. The ministry could not immediately be reached for comment.

In addition, U.S. investigators believe the hackers registered the deceptively named OPM-Learning.org website to try to capture employee names and passwords, in the same way that Anthem, formerly known as Wellpoint, was subverted with spurious websites such as We11point.com, which used the number “1” instead of the letter “l”.

Both the Anthem and OPM breaches used malicious software electronically signed as safe with a certificate stolen from DTOPTOOLZ Co, a Korean software company, the people close to the inquiry said. DTOPTOOLZ said it had no involvement in the data breaches.

The FBI did not respond to requests for comment. People familiar with its investigation said Sakula had only been seen in use by a small number of Chinese hacking teams.

“Chinese law prohibits hacking attacks and other such behaviors which damage Internet security,” China’s Foreign Ministry said in a statement. “The Chinese government takes resolute strong measures against any kind of hacking attack. We oppose baseless insinuations against China.”

MANY UNKNOWNS

Most of the biggest U.S. cyber attacks blamed on China have been attributed, with varying degrees of certitude, to elements of the Chinese army. In the most dramatic case two years ago, the U.S. Justice Department indicted five PLA officers for alleged economic espionage.

Far less is known about the OPM hackers, and security researchers have differing views about the size of the group and what other attacks it is responsible for.

People close to the OPM investigation said the same group was behind Anthem and other insurance breaches. But they are not yet sure which part of the Chinese government is responsible.

“We are seeing a group that is only targeting personal information,” said Laura Gigante, manager of threat intelligence at FireEye Inc, which has worked on a number of the high-profile network intrusions.

CrowdStrike and other security companies, however, say the Anthem hackers also engaged in stealing defense and industry trade secrets. CrowdStrike calls the group “Deep Panda,” EMC Corp’s RSA security division dubs it “Shell Crew,” and other firms have picked different names.

The OPM breach gave hackers access to U.S. government job applicants’ security clearance forms detailing past drug use, love affairs, and foreign contacts that officials fear could be used for blackmail or recruiting.

In contrast to hacking outfits associated with the Chinese army, “Deep Panda” appears to be affiliated with the Ministry of State Security, said CrowdStrike co-founder Dmitri Alperovitch.

Information about U.S. spies in China would logically be a top priority for the ministry, Alperovitch said, adding that “Deep Panda’s” tools and techniques have also been used to monitor democracy protesters in Hong Kong.

An executive at one of the first companies to connect the Anthem and OPM compromises, ThreatConnect, said the disagreements about the boundaries of “Deep Panda” could reflect a different structure than that in top-down military units.

“We think it’s likely a cohort of Chinese actors, a bunch of mini-groups that are handled by one main benefactor,” said Rich Barger, co-founder of ThreatConnect, adding that the group could get software tools and other resources from a common supplier.

“We think this series of activity over time is a little more distributed, and that is why there is not a broad consensus as to the beginning and end of this group.”

Mexican Gulf Cartels Surveillance Systems

From Breitbart:

The former Tamaulipas governor Eugenio Hernandez Flores was charged on May 27, 2015 on two counts, money laundering and crimes against the United States.

MCALLEN, Texas — The U.S. federal government has formally announced that yet another former governor from Mexico has now become a fugitive sought by the U.S. Drug Enforcement Administration.
The U.S. Attorney’s Office for the Southern District Of Texas announced Friday morning that former Tamaulipas governor Eugenio Hernandez Flores has been charged with money laundering and money laundering conspiracy charges.

As previously reported by Breitbart Texas, Hernandez has been implicated in money laundering through a series of civil forfeiture cases accusing him of laundering bribe money that he received for government favors, as well as from Mexican drug traffickers including Los Zetas.

Hernandez, who was the governor from 2005 to 2010, is the second Tamaulipas governor to be criminally charged in the U.S. on money laundering charges connected to taking money from Mexican drug cartels. Tomas Yarrington Ruvalcaba, who served as governor before Hernandez, is currently facing money laundering and drug trafficking charges for his alleged role in helping the Gulf Cartel, Los Zetas and other Mexican cartels.

It gets worse as Breitbart publishes the following:

Mexican authorities take down a complex surveillance system made up of a range of <a href=home security cameras, set up by the Gulf Cartel in the border city of Reynosa” width=”398″ height=”359″ />

REYNOSA, Tamaulipas – Once again, Mexican authorities have dismantled a complex video surveillance system set up by the Gulf Cartel in order to keep tabs on authorities, their rivals and their future victims.  Breitbart Texas reported on the discovery and destruction of a similar system in May.

This time, authorities seized 39 video surveillance cameras set up around the city under orders from the criminal organization, information provided to Breitbart Texas by the Tamaulipas government revealed.

The seizure began on Tuesday evening, when state police officers spotted two men setting up one of the cameras in the Doctores (Doctor’s) neighborhood. Once in police custody, the two men told authorities that they had just finished setting up another 38 cameras around the city, the information provided by authorities revealed.

Under police guard, the two men took the authorities to the various spots where they had set up the cameras so that officers could take them down. The police did not release the names of the two suspects because the investigation into the cameras remains ongoing.

As previously reported by Breitbart Texas, last month Mexican authorities had discovered a sophisticated surveillance network in which the Gulf cartel placed video cameras in at least 52 different spots around the city. Some of the cameras worked wirelessly and would be controlled remotely.

At the time, Mexican officials confirmed to Breitbart Texas that the Gulf Cartel used the surveillance network in an effort to try to stay one step ahead of law enforcement, as well as to track their victims.

What has Stopped Detention and Deportation

Barack Obama has selectively issued waivers on countless laws, one with real consequences is deportations. Then in August of 2013, the federal court, noted the 9th circuit ruled in a case Rodrigues v. Robbins that long-term detention without due process required immediate bond hearings. As a result, detention and deportations laws and procedures have been turned upside down.

Enforcement? What Enforcement?

by Mark Krikorian
Three recent items highlight the continuing collapse of interior immigration enforcement under Obama.
The first is information pried out of DHS by Senators Grassley and Sessions: One hundred twenty-one convicted criminals who faced deportation orders between 2010 and 2014 were never removed from the country and now face murder charges, according to Immigration and Customs Enforcement (ICE). Just to be clear, these were convicted criminals, in ICE custody, who had been ordered deported but were instead released back into U.S. communities, and then went on to murder Americans. Most were released simply because the administration didn’t want to detain them. Only for two dozen does the administration have any excuse at all, saying that they had to be released because their home countries wouldn’t take them back. And even that’s no excuse, for two reasons: the Supreme Court decision Obama’s people point to (Zadvydas v. Davis) limiting open-ended detention beyond six months of any criminal aliens whose countries won’t take them back has significant wiggle room in it – wiggle room the administration refuses, in this one and only instance, to take advantage of.
And second, the law requires the State Department to impose visa sanctions on countries that won’t take their own citizens back, a requirement Secretaries Clinton and Kerry have simply ignored. Some of the blood of these 121 murdered Americans (whose names we don’t know, presumably because ICE is protecting their murders’ privacy rights) is on the hands of this administration, which chose to release the convicted criminal aliens back into the United States rather than keep them in detention.
If that’s not depressing enough, Maria Sachetti at the Boston Globe has done yeoman’s work in uncovering hundreds of immigrant sex criminals whom ICE let go because of the same Supreme Court ruling – without even making sure they were registered with local authorities as sex offenders. Here’s what happened in several instances after their release by ICE: Immigration officials tried to deport Luis-Leyva Vargas, 47, to Cuba after he served three years in a Florida prison for unlawful sex with a teen. In 2008, officials released him. Two years later, he kidnapped an 18-year-old in Rockingham County, Va., at knifepoint and raped her. Now he is serving a 55-year prison sentence. Felix Rodriguez, a 67-year-old sex offender convicted of raping children as young as 4 in the 1990s, was freed in 2009, also because Cuba would not take him back. Months later, he fatally shot his girlfriend in Kansas City. He pleaded guilty and is serving 10 years in a Missouri prison. Andrew Rui Stanley, convicted in 2000 of multiple counts of sodomizing a child when Stanley was 14, was released in 2009 after Brazil failed to provide a passport needed to send him home. For the next two years, he viciously abused three children in St. Louis and now, at age 31, will be in prison for the rest of his life. None of these sickening crimes should have been allowed to occur. An administration that took public safety seriously would find ways to detain criminals until they could be deported, and apply whatever pressure was needed to get their native countries to comply. But this is not that administration. And finally, on a less grisly note, my colleague Jessica Vaughan has uncovered data showing a collapse in worksite enforcement.
In effect, as the Washington Times headline put it, “Obama gives free pass to businesses that hire illegals.” From 2013 to 2015, the number of ICE audits of employer records (to check the work eligibility of employees) dropped 86 percent; arrests of crooked employers dropped 73 percent; and fines collected dropped 51 percent. It seems that once it became clear that Sen. Rubio’s amnesty/immigration-surge bill was not going to reach his desk, Obama called a halt to the (limited) show of worksite enforcement he had ordered up to persuade skeptical Republican House members that he could be trusted to enforce the provisions of Rubio’s amnesty/immigration-surge bill. The fact that he cut back so drastically on enforcement when it was no longer politically useful is proof that such skepticism was warranted.
And finally, as evidence of this administration’s true priorities, USCIS is broadcasting “DACA Renewal Tips” out of a concern that some recipients of Obama’s lawless version of the DREAM Act amnesty may not renew their two-year work permits (presumably to avoid paying the fee, since they that there won’t be any enforcement consequences from reverting to illegal status).