DoJ Official Explains the Terror and Immigration Report

Politico published an item regarding the White House press briefing on 1/17/2018 where a Justice Department official, Ed O’Callaghan explained several terror cases inside the United States had connective tissue to chain migration as well as illegal immigration in an effort to give rise to the whole debate on Capital Hill as it relates to DACA, funding the border wall and shutting down the Federal government if no deal is reached. The only paragraph that did not have some bias slant to it is:

The report’s release, part of an executive order signed by President Donald Trump last year, comes as the White House is pushing for changes in the U.S. immigration system that would end the diversity visa lottery program — through which a terrorist who killed eight people with a rented truck entered the U.S. — and chain migration, the practice of legal immigrants sponsoring family members’ entry into the country.

So, what is in this report?

 

Executive Order 13780 Section 11 Report – Final by zerohedge on Scribd

Most of the critical national security enhancements implemented and effectuated as a result of Executive Order 13780 are classified in nature, and will remain so to prevent malicious actors from  
exploiting our immigration system.
However, to “be more transparent with the American  people and to implement more effectively policies and practices that serve the national interest,” Section 11 of Executive Order 13780 requires the Secretary of Homeland Security, in consultation with the Attorney General, to collect and make publicly available the following information:
(i) Information regarding the number of foreign nationals in the United States who have been charged with terrorism-related offenses while in the United States; convicted of terrorism-related offenses while in the United States; or removed from the United States based on terrorism-related activity, affiliation with or provision of material support to a terrorism-related organization, or any other national-security-related reasons;
(ii) Information regarding the number of foreign nationals in the United States who have been radicalized after entry into the United States and who have engaged in terrorism-related acts, or who have provided material support to terrorism-related organizations in countries that pose a threat to the United States;
(iii) Information regarding the number and types of acts of gender-based violence against women, including so-called “honor killings,” in the United States by foreign nationals; and, (iv) Any other information relevant to public safety and security as determined by the Secretary of Homeland Security or the Attorney General, including information on the immigration status of foreign nationals charged with major offenses.
According to a list maintained by DOJ’s National Security Division, at least 549 individuals were convicted of international terrorism-related charges in U.S. federal courts  between September 11, 2001, and December 31, 2016. An analysis conducted by DHS determined that approximately 73 percent (402 of these 549 individuals) were foreign-born. Breaking down the 549 individuals by citizenship status at the time of their respective convictions reveals that:
1. 254 were not U.S. citizens;
2. 148 were foreign-born, naturalized and received U.S. citizenship; and,  
3. 147 were U.S. citizens by birth.
 8 specific cases were listed in the report with a summary of each case. The Boston bombers were not listed in this report. They went from a tourist visa, to asylum status, to green card and one got citizenship. We also have the San Bernardino killers that arrived on a marriage visa and a cultural visa. Both of those have stay limits. The argument here in both cases they are in the spirit of chain migration.
Diplomatic favors? How about that Christmas Day bomber? How was he granted a visa?

The Christmas Day bomber, Umar Farouk Abdulmutallab, had initially had his visa denied in 2004, four years prior to his 2008 application. In 2004, he applied again, and the initial denial was overturned because a supervisory consular officer decided Abdulmuttalab’s father was too prominent in Nigerian politics and finance to upset the U.S. diplomatic applecart in that country and deny his son a visa. Ironically, this was the same father who four years later visited the U.S. embassy in Nigeria and sought to help the U.S. keep his son out of the U.S., only subsequently to have the U.S. decide he was not important enough to listen to.

The legal kicker in this visa story is that on Abdulmuttalab’s 2008 application, he lied and said he had never received a prior denial, enough to deny him a visa under law and keep him out of the country. As the matter was “considered resolved,” State Department did not look again at the 2004 denial when the young Al Qaeda operative sought another visa in 2008. Instead, he was granted the multi-year visa he used to attend an Islamic convention in Houston in 2008 and again for airline check-in on Christmas Eve.

This is incredibly embarrassing to the State Department. Despite State’s spin on this “new” fact, what this makes clear is that: (1) the intelligence community was not primarily to blame after all for failure to revoke the visa, as it should never have been issued in the first place; but (2) raises – once more – a larger issue of the State Department’s policies regarding visa issuance; and (3) whether State should continue to be responsible for the visa process. More here.

The Democrats are in a pre 9/11 mentality. After the 9/11 Commission Report, recommendations and solutions were drafted of which the congressional leaders all approved. In particular, go to page 24 of the summary as it relates to immigration.

Highlights of DHS Report to Judiciary Cmte on Immigration

Image result for secretary of dhs photo

Primer:

The Justice Department on Tuesday announced plans to appeal a judge’s ruling that blocked President Donald Trump from shuttering a program that gave protections and work permits to some people who entered the U.S. illegally as children.

In a ruling last week, San Francisco-based U.S. District Court Judge William Alsup ordered the administration to resume accepting renewal applications for the Deferred Action for Childhood Arrivals program, better known as DACA. More here from Politico.

In part, highlights:

The Department has also implemented historic efforts to step up international cooperation. For the first time ever, DHS established a clear baseline for what countries must do to help the United States confidently screen travelers and immigrants from their territory. Every country in the world is now required to meet high security standards and to help us understand who is coming into our country.
As required under President Trump’s Executive Order Protecting the Nation from Foreign Terrorist Entry into the United States (EO 13780), all foreign governments have been notified of the new standards, which include the sharing of terrorist identities, criminal
history information, and other data needed to ensure public safety and national security, as well as the requirement that countries issue secure biometric passports, report lost and stolen travel documents to INTERPOL, and take other essential actions to prevent identity fraud.
***
Visa Waiver Program
We are also looking at ways to further strengthen the Visa Waiver Program (VWP). First and foremost, the VWP is a security partnership program. It mandates high and consistent standards from partner countries in the areas of national security, law enfor
cement, and immigration enforcement to detect and prevent terrorists, criminals, and other potentially dangerous individuals from traveling to the United States —
while still facilitating legitimate travel and tourism.
Currently, 38 countries participate in the VWP, which allows their citizens to travel to the United States for business or tourism for stays of up to 90 days after applying and being approved through the Electronic System for Travel Authorization (ESTA). In return, these countries must comply with program requirements to enter into information
-sharing protocols that enable the relay of information concerning known and suspected terrorists and criminals; consistent and timely lost and stolen passport information reporting; and robust border and travel document
screening. As a result of these program requirements, countries have adopted new laws, policies, and practices that strengthen our mutual security.
The Visa Waiver Program Improvement and Terrorist Travel Prevention Act of 2015,
combined with Secretarial action, have strengthened the VWP’s security provisions over the past two years.
VWP countries are now required to issue high -security electronic passports (e-
passports); implement information sharing arrangements to exchange terrorist identity information; establish mechanisms to validate e-passports at each key port of entry; report all lost and stolen passports to INTERPOL or directly to the United States no later than 24 hours after the country becomes aware of the loss or theft; and screen international travelers against the INTERPOL Stolen and Lost Travel Documents (SLTD) database and notices. As with other operational activities of DHS, a full discussion of the privacy impact of these initiatives and how we mitigate the risk to personal privacy is available on our website.
Since enactment of the Visa Waiver Program Improvement and Terrorist Travel Prevention Act, DHS has realized an increase in the sharing of terrorist identity information. Several countries have increased the frequency of their reporting of lost and stolen passports —VWP countries account for over 70 percent of the almost 73 million lost and stolen travel documents reported to INTERPOL. All VWP countries are now issuing and using for travel to the United States fraud-resistant e-passports that meet or exceed the ICAO standards. Over 70,000 ESTA applicationshave been denied, cancelled or revoked under enforcement of the VWP Improvement Act’seligibility restrictions for VWP travel.
Border Security
In compliance with Executive Order 13767: Border Security and Immigration Enforcement
Improvements, DHS has conducted a comprehensive study of the security of the southern border that addresses all of the elements that provide an integrated solution for the Nation. Our first priority is to expand on our existing southern border wall system and close legal loopholes that encourage and enable illegal immigration and create a corresponding backlog in the courts. We currently have an immigration court backlog of more than 650,000 cases pending before the Department of Justice’s Executive Office for Immigration Review. We also have a massive asylum backlog with more than 270,000 pending cases before U.S. Citizenship and Immigration Services (USCIS).
Recognizing the unsustainability of the asylum case backlog, USCIS has implemented efficiency measures designed to reduce adjudication times. Similarly, the Department of Justice has taken action to reduce unwarranted case continuances in immigration courts, which helps reduce the backlog while affording aliens full and fair hearings. To further

reduce the “pull factors” and restore integrity to our immigration benefits adjudication process, we must tighten case processing standards, including the “credible
-fear” standard, impose and enforce penalties for fraud, and ensure applicants are fully vetted before they are allowed access to the United States.
In addition, visa-overstays account for roughly 40 percent of all illegal immigration in the
United States. In FY 2016, more than 628,000 aliens overstayed their visas. By increasing
overstay penalties and expanding ICE’s enforcement tools, we can help ensure that foreign
workers, students, and visitors respect the terms of their temporary visas. We need Congress to authorize the Department to raise and collect fees from immigration benefit applications to fund additional enhancements to our immigration system called for by the President’s Executive Orders.
Enforcing Immigration Laws
We are also prioritizing the enforcement of our immigration laws in the interior of our country.
There are nearly one million aliens with final orders of removal across the country
—meaning these removable aliens were afforded due process of law, had their
day in court, and were ultimately ordered removed by a judge — yet they remain in our nation and ICE only has 6,000 Deportation Officers to arrest and remove them. The Administration looks to strengthen law enforcement by hiring 10,000 more ICE officers and agents, and supports the request from the Department of Justice to hire 300 more federal prosecutors.
To further protect our communities, we must end so-called “sanctuary” jurisdictions. Hundreds of state and local jurisdictions across the country that do not honor requests from ICE to hold criminal aliens who are already in state and local custody. Instead, they allow them back into their communities, where they are allowed to commit more crimes. This also poses a greater risk of harm to ICE officers, who must locate and arrest these criminals in public places, and increases the likelihood that the criminal aliens can resist arrest or flee. Rather than enhancing public safety, sanctuary jurisdictions undermine it.
The only “sanctuary” these jurisdictions create is a safe haven for criminals. States and localities that refuse to cooperate with federal authorities should be ineligible for funding from certain grants and cooperative agreements.
Authorizing and incentivizing states and localities to enforce immigration laws would further help ICE with its mission and make all communities safer.
In FY 2017, 1,761 criminal illegal aliens were released from ICE custody because of a 2001
Supreme Court decision that generally requires ICE to release certain removable aliens with final orders of removal—including violent criminals—
within 180 days, if they have not been removed and there is no significant likelihood of removal in the reasonably foreseeable future. Legally insupportable judicial interpretations of the law regarding the detention and removability of criminal aliens have eroded ICE’s authority to keep aliens in custody pending removal.
Pursuant to this Executive Order, USCIS announced it will take a more targeted approach to combatting fraud and abuse in the employment -based visa programs, including the H-1B program. To help end H-1B petitioner fraud and abuse, USCIS has established a Targeted Site Visit and Verification Program (TSVVP). Targeted site visits allow USCIS to focus its resources where fraud and abuse of certain programs are more likely to occur. TSVVP initially focused on H-1B petitions filed by companies that are H-1B dependent (as defined by statute), employers petitioning for H-1B workers who will be placed off -site at another company’s location, or cases where USCIS cannot validate the H-1B petitioner’s business information through commercially -available data.
USCIS has also taken great strides to improve transparency with the public about employment -based immigration programs. The agency has published new data on its website to give the public more information regarding the use of nonimmigrant workers in the H-1B, H-2B, and L nonimmigrant programs. Information about the use and legal authority for employment authorization documents has also been published.
Most low-skilled immigration into the United States occurs legally through our
immigrant-visa system, which, unlike many other countries’ systems, prioritizes family
-based chain-migration. Each year, the United States grants lawful permanent resident status (greencards) to more than one million people; two-thirds of that total is based on a person having a sponsoring relative in the United States, regardless of the new immigrant’s skills, education, English language proficiency, or ability to successfully assimilate. This system of chain-migration has accounted for more than 60 percent of immigration into the United States over the past 35 years. We must end chain-migration, and limit family -based green cards to spouses and the minor children of U.S. citizens and lawful permanent residents.
We must also eliminate the “diversity visa” lottery. Every year, through this lottery, 50,000
green cards are awarded at random to foreign nationals. Many of these lottery beneficiaries have absolutely no ties to the United States, no special skills, and limited education. The random lottery program has not been adopted by other countries and does not adequately serve our national interest. Full opening summary here.

UN Declaration, Regular, Constant Global Migration = Insurgency

Berlin A new series launched by the Global Migration Data Analysis Centre (GMDAC) of IOM, the UN Migration Agency, aims to summarize the existing evidence on migration in an accurate and accessible fashion, to support discussions and any follow-up activities of the Global Compact for Safe, Orderly and Regular Migration.

Note the words orderly and regular….if the United Nations and peacekeeping operations as well as the aid, education, construction and protection campaigns were successful, migration would not be required especially in non-war torn countries. Right? Or how about all these other global human interest organizations….they failing too? Those like the Clinton Foundation or hey how about the Gates Foundation, which is a private foundation founded by Bill and Melinda Gates. It was launched in 2000 and is said to be the largest private foundation in the US, holding $38 billion in assets, improving lives from Seattle to South Africa….ahem.

Image result for global migration

Check here for the largest 10 organizations…. if all this work and money and resources were effective, then why the migration at all?

More here.

The New York Declaration

For the first time on 19 September 2016 Heads of State and Government came together to discuss, at the global level within the UN General Assembly, issues related to migration and refugees. This sent an important political message that migration and refugee matters have become major issues in the international agenda. In adopting the New York Declaration for Refugees and Migrants, the 193 UN Member States recognized the need for a comprehensive approach to human mobility and enhanced cooperation at the global level.

What are the aims of the global compact for migration?

The global compact is framed consistent with target 10.7 of the 2030 Agenda for Sustainable Development in which member States committed to cooperate internationally to facilitate safe, orderly and regular migration and its scope is defined in Annex II of the New York Declaration. It is intended to:

  • address all aspects of international migration, including the humanitarian, developmental, human rights-related and other aspects;
  • make an important contribution to global governance and enhance coordination on international migration;
  • present a framework for comprehensive international cooperation on migrants and human mobility;
  • set out a range of actionable commitments, means of implementation and a framework for follow-up and review among Member States regarding international migration in all its dimensions;
  • be guided by the 2030 Agenda for Sustainable Development and the Addis Ababa Action Agenda; and
  • be informed by the Declaration of the 2013 High-Level Dialogue on International Migration and Development.

The development of the global compact for migration – an open, transparent and inclusive process

The Modalities Resolution for the intergovernmental negotiations of the global compact for safe, orderly and regular migration outline the key elements and timeline of the process. The global compact will be developed through an open, transparent and inclusive process of consultations and negotiations and the effective participation of all relevant stakeholders, including civil society, the private sector, academic institutions, parliaments, diaspora communities, and migrant organizations in both the intergovernmental conference and its preparatory process.

 

US Treasury to Publish Russian Oligarch Corruption Index

Image result for GRU cyber operations

In December of 2015, Obama took aggressive action expelling Russian diplomats over hacking and political intrusion.

Image result for GRU cyber operations photo

“In addition, the Russian Government has impeded our diplomatic operations by, among other actions — forcing the closure of 28 American corners which hosted cultural programs and English-language teaching; blocking our efforts to begin the construction of a new, safer facility for our Consulate General in St Petersburg; and rejecting requests to improve perimeter security at the current, outdated facility in St Petersburg.” Some additional actions and those expelled include:

Two Russian intelligence agencies, the GRU and the FSB, four GRU officers and three companies “that provided material support to the GRU’s cyber operations”.

The White House named Igor Valentinovich Korobov, the current chief of the GRU; Sergey Aleksandrovich Gizunov, deputy chief of the GRU; Igor Olegovich Kostyukov, a first deputy chief of the GRU; and Vladimir Stepanovich Alexseyev, also a first deputy chief of the GRU. The Obama Executive Order is here.

Image result for GRU cyber operations

White House Fact Sheet on Russian malicious behavior

Slide presentation on Fancy Bear, hacking

Russia’s Oligarchs Brace for U.S. List of Putin Friends

(Bloomberg) — The U.S. Treasury Department is finishing its first official list of “oligarchs” close to President Vladimir Putin’s government, setting off a flurry of moves by wealthy Russians to shield their fortunes and reputations.

Some people who think they’re likely to land on the list have stress-tested the potential impact on their investments, two people with knowledge of the matter said. Others are liquidating holdings, according to their U.S. advisers.

Russian businessmen have approached former Treasury and State Department officials with experience in sanctions for help staying off the list, said Dan Fried, who previously worked at the State Department and said he turned down such offers.

Some Russians sent proxies to Washington in an attempt to avoid lobbying disclosures, according to one person that was contacted.

The report is expected to amount to a blacklist of Russia’s elite. It was mandated by a law President Donald Trump reluctantly signed in August intended to penalize the Kremlin for its alleged meddling in the 2016 election.

A rare piece of legislation passed with a bipartisan veto-proof margin, the law gave Treasury, the State Department and intelligence agencies 180 days to identify people by “their closeness to the Russian regime and their net worth.”

That deadline is Jan. 29.

Shamed Oligarchs

The list has also become a headache within Treasury, where some officials are concerned it will be conflated with sanctions, a person familiar with the matter said.

Treasury officials are considering keeping some portions of the report classified — which the law allows — and issuing it in the form of a letter from a senior official, Sigal Mandelker, instead of releasing it through the Office of Foreign Assets Control, which issues sanctions.

That would help distinguish it from separate lists of Russians subject to U.S. economic penalties, said the person, who spoke on condition of anonymity.

“You’re going to have people getting shamed. It’s a step below a sanction because it doesn’t actually block any assets, but has the same optics as sanctions — you’re on a list of people who are engaged in doing bad things,” said Erich Ferrari, who founded Ferrari & Associates in Washington and has helped people get removed from the sanctions designation list.

Corruption Index

The report must include “indices of corruption” with the oligarch’s names and list any foreign assets they may own. Lawmakers expect the list to provide a basis for future punitive actions against Russia.

“Because of the nervousness that the Russian business community is facing, a number of oligarchs are already beginning to wind back businesses, treating them as if they are already designated, to stay ahead of it,” said Daniel Tannebaum, head of Pricewaterhousecoopers LLP’s global financial sanctions unit.

He advises a handful of wealthy Russian individuals and some businesses who he declined to identify.

Treasury’s terrorism and financial intelligence unit is working with the State Department and Office of National Intelligence to complete the report, said a spokesman who declined to elaborate on the criteria for the list or whether it would be made public.

“It should be released in the near future,” Treasury Secretary Steve Mnuchin said at a White House briefing. ‘It’s something we’re very focused on.”

‘Allows Mischief’

The list’s impact will depend on how it’s released, said Adam Smith, a former senior adviser in Treasury’s sanctions unit and now a partner at Gibson, Dunn & Crutcher LLP in Washington.

The law is “written in a way that it allows mischief if the administration wanted to go a different way,” Smith said. “If the president wanted to provide little or a lot and be very selective, he has the ability to do that.”

That discretion partly flows from the criteria used to assemble the list, which Congress left up to Treasury.

Senator Ben Cardin of Maryland, the ranking Democrat on the committee on foreign relations, said he would like to see “as much transparency as possible” from Treasury when it finishes the list.

Russia has sought to defend its elites. Putin warned of worsening U.S. sanctions last month and introduced a capital amnesty program to encourage wealthy nationals to repatriate some of their overseas assets.

He also approved a plan to issue special bonds designed to give the wealthy a way to hold their dollar assets out of reach of the U.S. Treasury.

‘Disgusting’ Relations

While compilation of the list doesn’t mean there’ll be a new round of tit-for-tat sanctions, Russia will react to any punitive measures against its business people, Kremlin spokesman Dmitry Peskov told reporters on a conference call Friday.

“The principle of reciprocity remains,” and it would be for Putin to decide on the best response, he said.

Prime Minister Dmitry Medvedev, a Putin lieutenant for two decades, called the state of the relationship “disgusting” in November.

Congress has also requested that Treasury submit an impact analysis of potential sanctions on Russian sovereign bonds. A Treasury spokesman said its international affairs office is working on the analysis.

U.S. sanctions on the bonds would deal a major blow to Russia’s finances, raising the prospect of a selloff in the bond market, posing a risk to the ruble and the potential for higher borrowing costs.

The Russian Finance Ministry relies on debt to cover budget shortfalls and is seeking to borrow $18 billion domestically in 2018.

Iran’s Cyber Forces under IRGC Target Dissenters/Enemies

NIN is not Nine Inch Nails but rather the Supreme Leader’s tightly controlled internet platform known as the National Internet Network. It operates somewhat like an fee based system, those that can afford and pay more for access and usage get the best speed and less government oversight. The poorer class and the dissenters are controlled by the regime and not only vulnerable to the throttling of service but are subject to phishing operations, hacks and DDoS outages, all at the direction of the regime.

Image result for iran cyber unit irgc photo

It almost sounds like a marriage between the U.S. version/marriage of Google, Facebook and NSA, right? Well it is.

The NIN can filter key words and phrases and send users only to the sites it approved, according to the CHRI report. The government has also limited access to thousands of sites and platforms, including Facebook and YouTube. It is attempting to replace search engines like Google with its own state-approved versions.

Iran has also been able to influence how people use the internet through pricing. While there are private internet service providers (ISPs), they are still under government control, allowing state-run infrastructure companies to set up a tiered plan where access to international internet sites costs more than domestic. This drives traffic away from the global internet and to the NIN.

It’s not just internet censorship that Iranians are facing. The report also highlights state-sponsored cyberattacks and phishing schemes. State security agencies like the Islamic Revolutionary Guard Corps, a branch of the armed forces meant to protect the Islamic system, have hacked into individual and private online communications and arrested people on the basis of their content, which is technically illegal under Iranian law.

DDoS attacks, which aim to make specific websites unavailable or limit access to information by flooding them with illegitimate traffic, have become more prominent during politically sensitive times as well, according to the report. During the election in 2016, reformist and centrist candidates like Gaam-e Dovvom faced multiple attacks. The report said many of these are also internal attacks through the government.

Meanwhile, Iranians are not blind to the extensive surveillance they are facing online. As we’ve reported, many internet users use VPNs and other apps to try and circumvent the censorship. And millions of Iranians have turned to the Toronto-born Psiphon app to use the internet during the protests in December and this month. More here.

***  Image result for iran cyber unit irgc photo

Tehran has become increasingly adept at conducting cyber espionage and disruptive attacks against opponents at home and abroad, ranging from Iranian civil society organizations to governmental and commercial institutions in Israel, Saudi Arabia, and the United States.

A new report by carnegiendowment.org evaluates Iran’s Cyber threat environment. Just as Iran uses proxies to project its regional power, Tehran often masks its cyber operations using proxies to maintain plausible deniability. Yet such operations can frequently be linked to the country’s security apparatus, namely the Ministry of Intelligence and Islamic Revolutionary Guard Corps.

While Iran does not have a public strategic policy with respect to cyberspace, its history demonstrates a rationale for when and why it will engage in attacks. Iran uses its capabilities in response to domestic and international events. As conflict between Tehran and Washington subsided after the 2015 nuclear deal, so too did the cycle of disruptive attacks. However, Iran’s decisionmaking process is obscured and its cyber capabilities are not controlled by the presidency, as evident in cases of intragovernmental hacking.

The report claims that the United States is reliant on an inadequately guarded cyberspace and should anticipate that future conflicts, online or offline, could trigger cyber attacks on U.S. infrastructure. The first priority should be to extend efforts to protect infrastructure and the public, including increased collaboration with regional partners and nongovernmental organizations targeted by Iran. More details here.

The U.S. Army War College recently included this concern: In late-2011, the executive chairman of Google stated, “The Iranians are unusually talented in cyber war for some reason we don’t fully understand.”3 Stopping a cyber adversary from disrupting activity or stealing intellectual property has been the primary concern of government and private sector organizations, but in the military and intelligence communities, there are other concerns about Iran.

Prior to 2009, much of Iran’s cyber efforts were focused internally on countering government dissidence. The influential Iranian Revolutionary Guard Corp (IRGC) proposed the development of an Iranian Cyber Army in 2005 to combat internal threats. It sought out professional hackers through voluntary means or by using blackmail and threats to boost its ranks. In early March 2012, Supreme Leader of Iran Ayatollah Ali Khameni publicly announced to state media the creation by decree of a new Supreme Council of Cyberspace charged “to oversee the defense of the Islamic Republic’s computer networks and develop new ways of infiltrating or attacking the computer networks of its enemies.”7 It included heads of intelligence, militia, security, media chiefs, and the IRGC. It has its own budget and offices along with the power to enact laws. Additionally, the IRGC stated that a secure internal network for high-level command and control called “Basir” (Persian for perceptive) was created to counter outside threats to online activities.8 However, it is clear from its actions against opposition influences and dissident groups that the regime continues internal censorship and monitoring as well. Furthermore, Reporters Without Borders, in its 2012 annual report of countries that restrict internet access, filter content, and imprison bloggers, “ranked Iran the number one enemy of the Internet…ahead of 11 other countries—including Saudi Arabia, Bahrain, Syria, China, and Belarus.”9

In late-2011, Iran invested at least $1 billion dollars in cyber technology, infrastructure, and expertise.10 In March 2012, the IRGC claimed it had recruited around 120,000 personnel over the past 3 years to combat “a soft cyber war against Iran.”11 In early-2013, an IRGC general publically claimed Iran had the “fourth biggest cyber power among the world’s cyber armies.”12 Regardless of the numbers, the fact is that Iran’s cyber capability continues to mature. The IRGC has its own Cyber Defense Command which recruits and trains cyber warriors to spy on dissidents on the internet and spread Iranian government propaganda.13 The IRGC also now owns and controls Iran’s largest communication company and manages the skilled cyber technicians and specialists of Iran’s Cyber Army trained to hack into opposition websites and conduct other types of offensive cyber operations. On the law enforcement side, the FETA police (in Persian it literally means Police of the Space of Creating and Exchanging Information) handle typical internet crimes as well as more opaque enforcement activities such as political and security crimes. There are other Iranian organizations and companies recruited and/or affiliated with Iran’s cyber capabilities, either knowingly or by loose association. The full summary is here.