Hey Pentagon, Hiring Hackers, a Good Idea?

Personally I do see some positives, but I see more downsides….what say you?

The Department of Defense announced today that it will invite vetted hackers to test the department’s cybersecurity under a unique pilot program.  The “Hack the Pentagon” initiative is the first cyber bug bounty program in the history of the federal government.

 

Under the pilot program, the department will use commercial sector crowdsourcing to allow qualified participants to conduct vulnerability identification and analysis on the department’s public webpages.  The bug bounty program is modeled after similar competitions conducted by some of the nation’s biggest companies to improve the security and delivery of networks, products, and digital services. The pilot marks the first in a series of programs designed to test and find vulnerabilities in the department’s applications, websites, and networks.

 

Participants in the bug bounty will be required to register and submit to a background check prior to any involvement with the pilot program.  Once vetted, these hackers will participate in a controlled, limited duration program that will allow them to identify vulnerabilities on a predetermined department system.  Other networks, including the department’s critical, mission-facing systems will not be part of the bug bounty pilot program.  Participants in the competition could be eligible for monetary awards and other recognition.

This innovative project is a demonstration of Secretary Carter’s continued commitment to drive the Pentagon to identify new ways to improve the department’s security measures as our interests in cyberspace evolve.

Pentagon to Establish Defense Innovation Advisory Board

WASHINGTON, March 2, 2016 — In an effort to enhance the Defense Department’s culture, organization and processes by tapping innovators from the private sector in Silicon Valley and beyond, Defense Secretary Ash Carter announced plans today to establish a Defense Innovation Advisory Board, Pentagon Press Secretary Peter Cook said.

 Google, CEO

The initiative represents the secretary’s enduring commitment to building lasting partnerships between the public and private sectors, Cook said in a statement.

“Just as the Defense Business Board provides advice to the department on best business practices from the private sector, the Defense Innovation Advisory Board will provide advice on the best and latest practices in innovation that the department can emulate,” Cook added.

The board’s mandate is to provide department leaders independent advice on innovative and adaptive means to address future organizational and cultural challenges, the press secretary said, including the use of technology alternatives, streamlined project management processes and approaches — all with the goal of identifying quick solutions to DoD problems.

Areas Deeply Familiar in Silicon Valley

The board will seek to advise the department on areas that are deeply familiar to Silicon Valley companies, such as rapid prototyping, iterative product development, complex data analysis in business decision making, the use of mobile and cloud applications, and organizational information sharing, Cook said, and will not engage in discussion of military operations or strategy.

Alphabet Executive Chairman Eric Schmidt will chair the board, which will be composed of up to 12 people who have successfully led large private and public organizations and excelled at identifying and adopting new technology concepts, Cook said.

Carter and Schmidt will jointly select the board, Cook said. “Members will represent a cross-section of America’s most innovative industries, drawing on technical and management expertise from Silicon Valley and beyond,” he added.

As chairman of Alphabet and as the author of “How Google Works,” Schmidt has a unique perspective on the latest practices in harnessing and encouraging innovation and in the importance of technology in driving organizational behavior and business operations, Cook said.

**** Background

US spy chief James Clapper highlights cyber threats

BBC: US intelligence agencies have placed cyber attacks from foreign governments and criminals at the top of their list of threats to the country.

Online assaults would increasingly undermine US economic competitiveness and national security, said Director of National Intelligence James Clapper.

A report issued by his office said Russia’s military was setting up a cyber command to carry out attacks.

The report also describes China, Iran and North Korea as leading threats.

In testimony to a congressional committee on Thursday, Mr Clapper said he no longer believed the US faced “cyber Armageddon”.

The idea that major infrastructure such as financial networks or power grids could be disabled by hackers now looked less probable, he said.

However he warned: “We foresee an ongoing series of low-to-moderate level cyber attacks from a variety of sources over time, which will impose cumulative costs on US economic competitiveness and national security.”

Mr Clapper highlighted the case of Russia, which he said posed the greatest a cyber risk to US interests. He said that threat from the Russian government was “more severe” than previously realised.

He also said profit-minded criminals and ideologically driven hackers were also increasingly active.

Over the past year there have been a series of high-profile cyber attacks against US targets.

North Korea was accused of being behind the theft of a huge data cache from Sony Pictures in November.

Mr Clapper also mentioned the example of an alleged Iranian attack on the Las Vegas Sands Casino Corporation last year.

Meanwhile in January the Twitter and YouTube accounts of the US military command were hacked by a group claiming to back Islamic State (IS).

During the hearing, Mr Clapper acknowledged that the US had its own “offensive capabilities”.

In 2010 Iran experienced a cyber attack on its nuclear program. Tehran accused Israel and the US of planting malware.

China to lay off five to six million workers

Hank Paulson: China needs to let ‘failing companies fail’

Former U.S. Treasury Secretary Henry Paulson, who oversaw bank bailouts during the global financial crisis, has different advice for China: Let companies fail.

“They can show right now they’re very serious about dealing with inefficient state-owned enterprises as they take capacity out of the steel industry, coal industry and others by letting some failing companies fail,” Paulson, who was Treasury secretary from 2006-2009, told CNBC’s Squawk Box on the sidelines of an Institute of International Finance event organized in conjunction with the G20 meeting in Shanghai.

As Treasury secretary, Paulson oversaw a $700 billion government-funded bailout of U.S. financial institutions that were seen as “too big to fail” in the global financial crisis.

Paulson, who is also a former chairman and CEO of Goldman Sachs, added that China needed to move faster to promote competition.

“Competition is about opening up to the private sector, which is the future, and it’s about putting the state-owned enterprises on a level playing field,” said Paulson,, who earlier this decade founded the independent think tank Paulson Institute promoting sustainable and environmental projects. “There’s clearly room to move faster.”

Last year, China issued guidance on reforming often-inefficient state enterprises, such as introducing mixed public-private ownership as well as pushing for mergers and share sales, but the market isn’t always certain of progress on this front.

Exclusive: China to lay off five to six million workers, earmarks at least $23 billion

Reuters: China aims to lay off 5-6 million state workers over the next two to three years as part of efforts to curb industrial overcapacity and pollution, two reliable sources said, Beijing’s boldest retrenchment program in almost two decades.

China’s leadership, obsessed with maintaining stability and making sure redundancies do not lead to unrest, will spend nearly 150 billion yuan ($23 billion) to cover layoffs in just the coal and steel sectors in the next 2-3 years.

The overall figure is likely to rise as closures spread to other industries and even more funding will be required to handle the debt left behind by “zombie” state firms.

The term refers to companies that have shut down some of their operations but keep staff on their rolls since local governments are worried about the social and economic impact of bankruptcies and unemployment.

Shutting down “zombie firms” has been identified as one of the government’s priorities this year, with China’s Premier Li Keqiang promising in December that they would soon “go under the knife”..

The government plans to lay off five million workers in industries suffering from a supply glut, one source with ties to the leadership said.

A second source with leadership ties put the number of layoffs at six million. Both sources requested anonymity because they were not authorized to speak to media about the politically sensitive subject for fear of sparking social unrest.

The ministry of industry did not immediately respond when asked for comment on the reports.

The hugely inefficient state sector employed around 37 million people in 2013 and accounts for about 40 percent of the country’s industrial output and nearly half of its bank lending.

It is China’s most significant nationwide retrenchment since the restructuring of state-owned enterprises from 1998 to 2003 led to around 28 million redundancies and cost the central government about 73.1 billion yuan ($11.2 billion) in resettlement funds.

On Monday, Yin Weimin, the minister for human resources and social security, said China expects to lay off 1.8 million workers in the coal and steel industries, but he did not give a timeframe.

China aims to cut capacity gluts in as many as seven sectors, including cement, glassmaking and shipbuilding, but the oversupplied solar power industry is likely to be spared any large-scale restructuring because it still has growth potential, the first source said.

DEBT OVERHANG

The government has already drawn up plans to cut as much as 150 million tonnes of crude steel capacity and 500 million tonnes of surplus coal production in the next three to five years.

It has earmarked 100 billion yuan in central government funds to deal directly with the layoffs from steel and coal over the next two years, vice-industry minister Feng Fei said last week.

The Ministry of Finance said in January it would also collect 46 billion yuan from surcharges on coal-fired power over the coming three years in order to resettle workers. In addition, an assortment of local government matching funds will also be made available.

However, the funds currently being offered will do little to resolve the problems of debts held by zombie firms, which could overwhelm local banks if they are not handled correctly.

“They have proposed this dedicated fund only to pay the workers, but there is no money for the bad debts, and if the bad debts are too big the banks will have problems and there will be panic,” said Xu Zhongbo, head of Beijing Metal Consulting, who advises Chinese steel mills.

Factories shut down would have to repay bank loans to avoid saddling state banks with a mountain of non-performing loans, the sources said. “Triangular debt”, or money owed by firms to other enterprises, would also have to be resolved, they added.

Although China has promised to help local banks transfer the bad debts of zombie steel mills to asset management firms, local governments are not expected to gain access to the worker lay-off funds until the zombie firms have actually been shut down and debt issues settled.

($1 = 6.5476 Chinese yuan)

Wall Street to Clinton Foundation: $40 Million

For what exactly? A question likely to never fully be answered…Unless we get the rest of ‘those’ emails.

Clinton Foundation Discloses $40 Million in Wall Street Donations

Hillary Clinton is facing more questions about her close ties to Wall Street financial institutions. Last week, the New York Times urged Clinton to release transcripts of her highly-compensated speeches to Wall Street firm Goldman Sachs.

Breitbart: The paid speeches are just a slim chapter of her relationship with financial titans. According to Clinton Foundation records, Wall Street financial institutions have donated around $40 million to the eponymous family foundation.

As a non-profit, the Clinton Foundation isn’t legally required to disclose its donors or contributions. The Foundation has publicly disclosed some contributions on its website. It only provides ranges for contributions, e.g. $1-5 million, and doesn’t detail when the contribution was made or for what purpose, if any.

Here’s the chart of contributions from Wall Street to the Clinton Foundation.

Four major Wall Street institutions stand out; Barclays, Barclays Capitol, Goldman Sachs and Citi. Each are listed as given between $1 million and $5 million to the Foundation. Citigroup, UBS, Banc of California and Bank of America are listed as giving up to $1 million to the Foundation.

All together, contributions from readily identifiable Wall Street institutions to the Foundation total somewhere between $11 million and $41 million in contributions. If we assume the donations fall in the middle of the ranges disclosed by the Clinton Foundation, the contributions would total just under $30 million.

As with most things involving the Clintons, the devil is in the details. This total of contributions does not include those made by individuals with strong Wall Street ties. It also does not necessarily represent the total amounts contributed to the Foundation from those donors listed. It only accounts for the donations which the Foundation has chosen to disclose.

The failure of the Foundation to include any information on the timing of the donations is especially worrisome. In terms of donor relationships, there is a real difference between a one-time gift of $1 million and an ongoing gift of $200,000 for 5 straight years. The total dollar amount may be the same, but an ongoing gift usually requires a more substantive relationship between the Foundation and the donor.

There is, of course, an added dimension to the timing issue with the Clintons. During the life of the Foundation, Hillary Clinton has been a US Senator, Secretary of State and two-time candidate for President.

When the Clinton Foundation discloses that the “Friends of Saudi Arabia” contributed $1-5 million, it begs the obvious question of when that donation was made. The specific date of that donation is particularly important, given Clinton’s considerable focus on the Middle East while she was Secretary of State.

It is also important to note that these contributions are completely seperate from the paid speeches made by Bill and Hillary Clinton. In 2013 alone, Hillary earned just over $3 million in paid speeches to financial firms and institutions.

These contributions, obviously, also don’t include direct contributions made by Wall Street institutions and individuals to either of Clinton’s Presidential campaigns.

In a recent Democrat debate, Clinton’s sole challenger, Sen. Bernie Sanders (I-VT) challenged her, “Can you really reform Wall Street when they are spending millions and millions of dollars on campaign contributions…And when they are providing speaking fees to individuals?”

He should have added that Wall Street has showered Clinton’s family foundation with millions in contributions.

Wall Street, and the financial industry generally, is not simply a special interest contributing to Clinton’s political ambitions. It is woven into the very fabric of the Clinton’s lives. It fuels her politial ambitions, provides employment to Bill and Hillary through generous speaking fees, and it underwrites a significant amount of the work undertaken by the family’s Clinton Foundation.

If the Clintons were any closer to Wall Street and financial firms, they would probably have to file SEC disclosures. They could very well be the first American family with their own Dodd-Frank regulation.

 

 

After Ukraine, DHS Warns Domestic Utility Companies

Feds advise utilities to pull plug on Internet after Ukraine attack

WashingtonExaminer: The Department of Homeland Security advised electric utilities Thursday that they may need to stop using the Internet altogether, after the agency found that a cyberattack that brought down Ukraine’s power grid in December could have been far more devastating than reported.

The Dec. 23 cyberattack forced U.S. regulators to place utilities on alert after unknown attackers caused thousands of Ukrainian residents to lose power for hours by installing malicious software, or malware, on utility computers. But the Department of Homeland Security said Thursday that the attack may have been directed at more than just the country’s electricity sector, suggesting the attackers were looking to cause more harm than was reported.

In response, federal investigators are recommending that U.S. utilities and other industries “take defensive measures.” To start with, they need to best practices “to minimize the risk from similar malicious cyber activity,” according to an investigative report issued Thursday by Homeland Security’s Industrial Control Systems Cyber Emergency Response Team.

But the team is also recommending more drastic action, such as keep control-system computers away from the Internet.

“Organizations should isolate [industrial control system] networks from any untrusted networks, especially the Internet,” the report says. “All unused ports should be locked down and all unused services turned off. If a defined business requirement or control function exists, only allow real-time connectivity to external networks. If one-way communication can accomplish a task, use optical separation.”

The findings show that the power outages were caused by three attacks using cyberintrusion software to attack electric power distribution companies, affecting about 225,000 customers. It also reveals that once power was restored, the utilities continued “to run under constrained operations,” implying that the damage to grid control systems was profound.

The team also learned that “three other organizations, some from other critical infrastructure sectors, were also intruded upon but did not experience operational impacts.” That suggests the attackers were going after more than just the power grid, and may have been planning a much more economy-wide attack. The team does not disclose what other sectors of the country were targeted.

The team said the attack was well-planned, “probably following extensive reconnaissance of the victim networks,” the report says. “According to company personnel, the cyberattacks at each company occurred within 30 minutes of each other and impacted multiple central and regional facilities.”

The attackers were attempting to make the damage permanent. The report says the attackers installed “KillDisk” malware onto company computers that would erase data necessary to reboot operations after a cyberattack.

There is also a mystery to the attackers’ actions.

“Each company also reported that they had been infected with BlackEnergy malware; however, we do not know whether the malware played a role in the cyberattacks,” the report says. The malware was delivered using an email embedded hacking technique known as “spear phishing” that contained a number of malicious Microsoft Office attachments.

“It is suspected that BlackEnergy may have been used as an initial access vector to acquire legitimate credentials; however, this information is still being evaluated,” the team says.

The investigation was done with Ukraine authorities and involved the FBI, Department of Energy and the North American Electric Reliability Corporation.

*** 

New research is shining a light on the ongoing evolution of the BlackEnergy malware, which has been spotted recently targeting government institutions in the Ukraine.

Security researchers at ESET and F-Secure each have dived into the malware’s evolution. BlackEnergy was first identified several years ago. Originally a DDoS Trojan, it has since morphed into “a sophisticated piece of malware with a modular architecture, making it a suitable tool for sending spam and for online bank fraud,” blogged ESET’s Robert Lipovsky.

“The targeted attacks recently discovered are proof that the Trojan is still alive and kicking in 2014,” wrote Lipovsky, a malware researcher at ESET.

ESET has nicknamed the BlackEnergy modifications first spotted at the beginning of the year ‘BlackEnergyLite’ due to the lack of a kernel-mode driver component. It also featured less support for plug-ins and a lighter overall footprint.

“The omission of the kernel mode driver may appear as a step back in terms of malware complexity: however it is a growing trend in the malware landscape nowadays,” he blogged. “The threats that were among the highest-ranked malware in terms of technical sophistication (e.g., rootkits and bootkits, such as Rustock, Olmarik/TDL4, Rovnix, and others) a few years back are no longer as common.”

The malware variants ESET has tracked in 2014 – both of BlackEnergy and of BlackEnergy Lite – have been used in targeted attacks. This was underscored by the presence of plugins meant for network discovery, remote code execution and data collection, Lipovsky noted.

“We have observed over a hundred individual victims of these campaigns during our monitoring of the botnets,” he blogged. “Approximately half of these victims are situated in Ukraine and half in Poland, and include a number of state organizations, various businesses, as well as targets which we were unable to identify. The spreading campaigns that we have observed have used either technical infection methods through exploitation of software vulnerabilities, social engineering through spear-phishing emails and decoy documents, or a combination of both.”

In a whitepaper, researchers at F-Secure noted that in the summer of 2014, the firm saw samples of BlackEnergy targeting Ukrainian government organizations for the purposes of stealing information. These samples were nicknamed BlackEnergy 3 by F-Secure and identified as the work of a group the company refers to as “Quedagh.” According to F-Secure, the group is suspected to have been involved in cyber-attacks launched against Georgia during that country’s conflict with Russia in 2008.

“The Quedagh-related customizations to the BlackEnergy malware include support for proxy servers and use of techniques to bypass User Account Control and driver signing features in 64-bit Windows systems,” according to the F-Secure whitepaper. “While monitoring BlackEnergy samples, we also uncovered a new variant used by this group. We named this new variant BlackEnergy 3.”

Only Quedagh is believed to be using BlackEnergy 3, and it is not available for sale on the open market, noted Sean Sullivan, security advisor at F-Secure.

“The name [of the group] is based on a ship taken by Captain Kidd, an infamous privateer,” he said. “It is our working theory that the group has previous crimeware experience. Its goals appear to be political but they operate like a crimeware gang. There have been several cases this year of which BlackEnergy is the latest. The trend is one of off-the-shelf malware being used in an APT [advanced persistent threat] kind of way. The tech isn’t currently worthy of being called APT, but its evolving and scaling in that direction.”

Within a month of Windows 8.1’s release, the group added support for 64-bit systems. They also used a technique to bypass the driver-signing requirement on 64-bit Windows systems.

In the case of BlackEnergy 3, the malware will only attempt to infect a system if the current user is a member of the local administration group. If not, it will re-launch itself as Administrator on Vista. This will trigger a User Account Control (UAC) prompt. However, on Windows 7 and later, the malware will look to bypass the default UAC settings.  

“The use of BlackEnergy for a politically-oriented attack is an intriguing convergence of criminal activity and espionage,” F-Secure notes in the paper. “As the kit is being used by multiple groups, it provides a greater measure of plausible deniability than is afforded by a custom-made piece of code.”

In 2014 from the Department of Interior and DHS:

Summary: Investigation of NPS-GCNP SCADA SYSTEM

Report Date: August 7, 2014

OIG investigated allegations that the Supervisory Control and Data Acquisition (SCADA) system at Grand Canyon National Park (Park) may be obsolete and prone to failure. In addition, it was alleged only one Park employee controlled the system, increasing the potential for the system to fail or become unusable.

The SCADA system is a private utilities network that monitors and controls critical infrastructure elements at the Park. Failure of the system could pose a health and safety risk to millions of Park visitors. Due to potential risks that system failure posed, we consulted with the U.S. Department of Homeland Security Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) and asked that they assess the overall architecture and cybersecurity of the Park’s SCADA system.

ICS-CERT conducted an onsite review and issued a report outlining the weaknesses it found at the Park’s SCADA system, including obsolete hardware and software, inadequate system documentation and policies, insufficient logging and data retention. We provided a copy of ICS-CERT’s assessment report to the National Park Service for review and action.

 

 

Genocide Label for ISIS? Kerry Unsure

What happened to Bashir al Assad and the genocide happening to Syrians?

Kerry weighs ‘genocide’ label for Islamic State

Secretary of State John Kerry signaled today that he plans to decide soon whether to formally accuse the Islamic State of genocide amid what sources describe as an intense debate within the Obama administration about how such a declaration should be worded and what it might mean for U.S. strategy against the terrorist group.

“None of us have ever seen anything like it in our lifetimes,” Kerry said during a House subcommittee hearing Wednesday about beheadings and atrocities committed by the Islamic State.

But in response to questioning by Rep. Jeff Fortenberry, a Nebraska Republican who has been spearheading a resolution in Congress demanding the administration invoke an international treaty against genocide, Kerry was careful not to tip his hand on what has turned into a thorny internal legal debate with political and potentially military consequences.

Saying the department was reviewing “very carefully the legal standards and precedents” for a declaration of genocide against the Islamic State, Kerry added that he had received “initial recommendations” on the issue but had then asked for “further evaluations.”

In his first public comments on the issue, Kerry said he “will make a decision on this” as soon as he receives those evaluations. He didn’t elaborate on when that might occur.

The administration’s plans to invoke the powerfully evocative genocide label — an extremely rare move — was first reported by Yahoo News last November. But at the time, the State Department was focused on restricting the designation to the Islamic State’s mass killings, beheadings and enslavement of the Yazidis — a relatively small minority group of about 500,000 in northern Iraq that the terrorist group has vowed to wipe out on the grounds they are “devil worshipers.”

The disclosure set off a strong backlash among members of Congress and Christian groups who argued that Islamic State atrocities against Iraqi and Syrian Christians and other smaller minority groups also deserved the genocide label. Some conservatives even chastised the administration for displaying a “politically correct bias that views Christians … never as victims but always as Inquisition-style oppressors.”

The issue has since made its way into the presidential campaign; Sen. Marco Rubio has signed a Senate version of a House resolution, co-sponsored by Fortenberry and Rep. Anna Eshoo, for a broader genocide designation that incorporates Christians, Turkmen, Kurds and other groups. Hillary Clinton has also endorsed such as move. In response to a question from a voter at a New Hampshire town hall last December about whether she believes Christians as well as Yazidis should be declared victims of genocide, she said, “I will, because we now have enough evidence.”

A Iraqi Yazidi woman and her children took refuge at the Bajid Kandala camp in Dohuk, Iraq, after fleeing Islamic State jihadists. (Photo: Ahmad Al-Rubaye/AFP)

But administration sources and others intimately familiar with the internal debate say the issue has proven more complicated. While ISIS has openly declared its intention of destroying the Yazidis, they argue, the terrorist group’s leaders have not made equally explicit statements about Christians even while committing killings, kidnappings, forced removals and the confiscation and destruction of churches aimed at Christian groups. As a result, administration officials and State Department lawyers have weighed labeling those acts “crimes against humanity” — a step that critics have said doesn’t go far enough. “We’ve been trying to tell them, crimes against humanity are not a bronze medal,” said one administration official, contending that it should not be viewed as a less serious designation.

Kerry seemed to hint as much in his responses to Fortenberry at Wednesday’s hearing, noting that Christians in Syria “and other places” have been forcibly removed from their homes. “There have been increased, forced evacuations,” he said. “No, its not — they are killing them in that case — but it’s a removal and a cleansing, ethnically and religiously, that is equally disturbing.”

At the same time, two sources familiar with the debate said, Pentagon officials have expressed concerns that a genocide designation would morally obligate the U.S. military to take steps — such as protecting endangered populations or using drones to identify enslaved women — that could divert resources from the campaign to defeat the Islamic State. (An administration official told Yahoo News Wednesday that any such concerns have not been raised in “interagency” discussions over the genocide issue. “There is no resource issue,” the official said.)

In fact, many legal scholars say, there is considerable debate about just what practical impact a genocide designation would have. It would be made under a loosely worded 1948 international treaty that compels signatory nations, including the United States, “to prevent and to punish” the “odious scourge” of genocide defined as acts “committed with intent to destroy, in whole or in part, a national, ethnical (sic), racial or religious group.” As documented by Samantha Power, now the U.S. ambassador to the United Nations, in her 2002 book, “A Problem from Hell,” President Clinton’s Secretary of State Warren Christopher, resisted labeling the mass murder of the Tutsis in Rwanda in 1994 as genocide for fear, as one State Department memo put it at the time, “it could commit [the U.S. government] to actually do something.”

But 10 years later, Secretary of State Colin Powell declared the killings of non-Arab people in Darfur to be genocide — the first time the U.S. invoked such a declaration during an ongoing conflict. But he did so only after receiving a secret State Department memo concluding the designation “has no immediate legal — as opposed to moral, political or policy consequences for the United States.”

Administration officials have argued they are already taking extraordinary steps to protect threatened minorities in Iraq, pointing to, for example, the 2014 evacuation of Yazidis from Mount Sinjar — and that a genocide designation wouldn’t change that. White House press secretary Josh Earnest said as much when he was pressed on the issue during a recent White House briefing during which he said a genocide designation is “an open question that continues to be considered by administration lawyers.”

“The decision to apply this term to this situation is an important one,” Earnest said during a Feb. 4 briefing. “It has significant consequences, and it matters for a whole variety of reasons, both legal and moral. But it doesn’t change our response. And the fact is that this administration has been aggressive, even though that term has not been applied, in trying to protect religious minorities who are victims or potential victims of violence.”