An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation
Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.
TheTower: A report published Monday in Ynet that documents ties between Hamas and the Sinai-based branch of ISIS also shows Iran’s role in supporting ISIS.
Israel’s security establishment has pointed out a clear paradox in this dangerous collaboration: the bulk of Hamas’ financial support comes from Iran, which is persistently fighting ISIS in Syria and Iraq. Many Iranians have already been killed on the frontline of this battle. Furthermore, the Iranians are specifically funding the Gaza front against ISIS’s Sinai branch – via Hamas.
The Times of Israel reported in September that Iran, in expectation of the sanctions relief it would receive under terms of the nuclear deal, was smuggling “suitcases of cash” to Hamas so that the terror group could upgrade its arsenal.
Since the deal was signed, Iran has significantly increased its financial support for two of the largest terror groups in the region that have become political players, Hamas and Hezbollah. In the years before the deal was signed, the crippling sanctions limited this support, which had significantly diminished along with Iran’s economy. But Tehran’s belief that tens, or hundreds, of billions of dollars will flow into the country in the coming years as a result of sanctions relief has led to a decision to boost the cash flow to these terror organizations.
At around the same time, Major General Ataollah Salehi, the commander-in-chief of Iran’s armed forces, boasted of the support Iran was giving to terror groups such as Hamas and Hezbollah to help them fight terror wars against Israel.
The Ynet article, coming a week after the leader of ISIS’s Sinai branch was reported in Gaza, highlighted the operational cooperation between Hamas and ISIS. Hamas has been giving funds, received from Iran, to ISIS to finance its operations. Hamas has also provided training to ISIS and treated ISIS terrorists in Gaza hospitals. In return, ISIS has helped Hamas smuggle weapons into Gaza.
Because Hamas has a clear hierarchy and command structure, it is highly unlikely that funds would go to ISIS without approval from both the highest echelons of Hamas and their funders in Iran.
Hamas’ military wing in the Gaza Strip has been transferring tens of thousands of dollars a month to the Islamic State group’s Sinai branch over the past year, via one of its emissaries.
The transfer of cash is just one part of the military and strategic cooperation between the two groups. The finances of Hamas’ military arm, the Izz ad-Din al-Qassam Brigades, are independent of those of the organization’s political bureau. Hamas is paying the Islamic State militants in Egypt to secure weapons shipments being smuggled through the Sinai to Gaza. More details here.
Engadget: One of the reasons corporate users and the privacy-minded rely on VPNs is to control access to their networks and (hopefully) not expose secrets over insecure connections. Today Juniper Networks revealed that some of its products may not have been living up to that standard, after discovering “unauthorized code” in the software that runs on its NetScreen firewalls during a code review. Pointed out by security researcher “The Grugq,” the backdoor has been present since late 2012 and can only be fixed by upgrading to a new version of software just released today.
Telnet / ssh exposes a backdoor added by attackers to ScreenOS source code. This has been there since August 2012. Noted code here.
The pair of issues that created the backdoor would allow anyone who knows about it to remotely log in to the firewall as an administrator, decrypt and spy on supposedly secure traffic, and then remove any trace of their activity. Obviously this is a Very Bad Thing, although Juniper claims it has not heard of any exploitation in the wild (which would be difficult, since no one knew it existed and attackers could hide their traces) so far.
Beyond sending IT people sprinting to patch and test their setups, now we can all speculate about which friendly group of state-sponsored attackers is responsible. US government officials have recently been pushing for mandated backdoor access to secure networks and services, but the Edward Snowden saga made clear that even our own country’s personnel aren’t always going to ask permission before snooping on any information they want to check out. I contacted Juniper Networks regarding the issue, but have not received a response at this time.
Update: A Juniper Networks spokesperson told us:
During a recent internal code review, Juniper discovered unauthorized code in ScreenOS® that could allow a knowledgeable attacker to gain administrative access and if they could monitor VPN traffic to decrypt that traffic. Once we identified these vulnerabilities, we launched an investigation and worked to develop and issue patched releases for the impacted devices. We also reached out to affected customers, strongly recommending that they update their systems and apply the patched releases with the highest priority.
The patched releases also address an SSH bug in ScreenOS that could allow an attacker to conduct DoS attacks against ScreenOS devices. These two issues are independent of each other.
Washington (CNN) A major breach at computer network company Juniper Networks has U.S. officials worried that hackers working for a foreign government were able to spy on the encrypted communications of the U.S. government and private companies for the past three years.
The FBI is investigating the breach, which involved hackers installing a back door on computer equipment, U.S. officials told CNN. Juniper disclosed the issue Thursday along with an emergency security patch that it urged customers to use to update their systems “with the highest priority.”
The concern, U.S. officials said, is that sophisticated hackers who compromised the equipment could use their access to get into any company or government agency that used it.
One U.S. official described it as akin to “stealing a master key to get into any government building.”
The breach is believed to be the work of a foreign government, U.S. officials said, because of the sophistication involved. The U.S. officials said they are certain U.S. spy agencies themselves aren’t behind the back door. China and Russia are among the top suspected governments, though officials cautioned the investigation hasn’t reached conclusions.
It’s not yet clear what if any classified information could be affected, but U.S. officials said the Juniper Networks equipment is so widely used that it may take some time to determine what damage was done.
A senior administration official told CNN, “We are aware of the vulnerabilities recently announced by Juniper. The Department of Homeland Security has been and remains in close touch with the company. The administration remains committed to enhancing our national cybersecurity by raising our cyber defenses, disrupting adversary activity, and effectively responding to incidents when they occur.”
Juniper Networks’ security fix is intended to seal a back door that hackers created in order to remotely log into commonly used VPN networks to spy on communications that were supposed to be among the most secure. A free trial vpn has been helpful for those new to the VPN world to decide if it is right for them.
Juniper said that someone managed to get into its systems and write “unauthorized code” that “could allow a knowledgeable attacker to gain administrative access.”
Such access would allow the hacker to monitor encrypted traffic on the computer network and decrypt communications.
Juniper sells computer network equipment and routers to big companies and to U.S. government clients such as the Defense Department, Justice Department, FBI and Treasury Department. On its website, the company boasts of providing networks that “US intelligence agencies require.”
Its routers and network equipment are widely used by corporations, including for secure communications. Homeland Security officials are now trying to determine how many such systems are in use for U.S. government networks.
Juniper said in its security alert that it wasn’t aware of any “malicious exploitation of these vulnerabilities.” However, the alert also said that attackers would leave behind no trace of their activity by removing security logs that would show a breach.
“Note that a skilled attacker would likely remove these entries from the log file, thus effectively eliminating any reliable signature that the device had been compromised,” the Juniper security alert said. If encrypted communications were being monitored, “There is no way to detect that this vulnerability was exploited,” according to the Juniper security alert.
According to a Juniper Networks spokeswoman’s statement, “Once we identified these vulnerabilities, we launched an investigation and worked to develop and issue patched releases for the impacted devices. We also reached out to affected customers, strongly recommending that they update their systems.”
U.S. officials said it’s not clear how the Juniper source code was altered, whether from an outside attack or someone inside.
The work to alter millions of lines of source code is sophisticated. The system was compromised for three years before Juniper uncovered it in a routine review in recent weeks.
Juniper said it was also issuing a security fix for a separate bug that could allow a hacker to launch denial-of-service attacks on networks.
NDTV: London: Hackers in Britain have claimed that a number of ISIS supporters’ social media accounts are being run from internet addresses linked to the UK government’s Department for Work and Pensions (DWP).
A group of four young computer experts, who call themselves VandaSec, have unearthed evidence indicating that at least three ISIS-supporting accounts can be traced back to the DWP’s London offices, the ‘Daily Mirror’ reported.
Every computer and mobile phone logs onto the internet using an IP address, which is a type of identification number. The hacking collective showed the newspaper details of the IP addresses used by three separate so-called “digital jihadis” to access Twitter accounts, which were then used to carry out online recruitment and propaganda campaigns.
At first glance, the IP addresses seem to be based in Saudi Arabia, but upon further inspection using specialist tools they appeared to link back to the DWP.
The newspaper learned that the British government had sold on a large number of IP addresses to two Saudi Arabian firms.
After the sale completed in October of this year, they were used by extremists to spread their message of hate.
A Cabinet Office spokesperson said: “The government owns millions of unused IP addresses which we are selling to get a good return for hardworking taxpayers.
“We have sold a number of these addresses to telecoms companies both in the UK and internationally to allow their customers to connect to the internet. We think carefully about which companies we sell addresses to, but how their customers use this internet connection is beyond our control.”
The UK government has not revealed how much money it has made from the sale of IP addresses.
Following the terrorist attacks in Paris and San Bernardino, Calif., FBI Director James Comey revealed to the Senate Judiciary Committee that one of the two Islamic State-inspired shooters in the May 3 attack in Garland, Tex., “exchanged 109 messages with an overseas terrorist” the morning of the attack. He followed up by saying that the FBI was unable to read those messages. His implication? Better regulation of message-disguising encryption technology could have revealed the shooters’ plans earlier and could help prevent attacks.
However, regulation of encryption is unlikely to provide the government with the counterterrorism benefit it says it will. Jihadists’ main tool for planning and executing attacks in recent years has been social media — to which the government has full access — not encrypted messaging. In addition, regulation of one messaging technology will lead to immediate adaptation and the creation of ways to circumvent it.
In recent years, smartphones and social media have enabled users from around the world to communicate easily, safely and free of charge. Programs facilitating such communications sprouted, and jihadists — the Islamic State in particular — quickly adopted them as their main means of communication. For over three years, Twitter has been the Islamic State’s most important platform. High-level operatives within the group have used Twitter’s unencrypted direct messaging to recruit, give instructions for donating and plan attacks. Jihadists even rely on Twitter to promote their channels on other platforms, such as Telegram, which supporters would otherwise have difficulty finding.
Jihadists’ presence on social media has also spread the Islamic State around the world, with people of all ages, sexes and ethnicities leaving their families and friends to join the group. Social media use has been linked to executed and attempted lone-wolf attacks in the United States, Canada, Australia, France, Denmark and other Western nations.
The Garland, Tex., shooting — the only example Comey used as an impetus to regulate encrypted technology — in fact makes the opposite point. Attacker Elton Simpson, who was under previous FBI terror-related investigations, used Twitter to openly follow and communicate with high-profile terrorists. His account was followed by prominent English-speaking Islamic State fighters and recruiters Abu Rahin Aziz and Junaid Hussain — both of whom for a long time were known to provide manuals on how to carry out lone-wolf attacks from Raqqa, Syria, before they were killed. Simpson also followed and communicated with Mohamed Abdullahi Hassan, a known American jihadist in Somalia who pledged allegiance to the Islamic State.
Relatedly, the incitement for the Texas shooting came from Hassan’s 31st Twitter account. Simpson, a friend and follower of Hassan, retweeted the call and later requested that Hassan send him a direct message. We at SITE, using only open-source information, reported on the call before the attack took place, and the FBI had a week to investigate the matter before the shooting. Though only nine Twitter users retweeted the call for attack, the FBI failed to prevent it.
The encrypted messages Comey mentioned before the Judiciary Committee were discovered by the FBI only after the attack took place, but Simpson’s open-source communication was available far in advance. There is in fact no evidence that this or any of these other lone-wolf attacks could have been prevented by regulation of encryption technology.
In stark contrast, a proper, targeted open-source investigation could have. Yet the FBI is reluctant to recognize open-source as an important — arguably the most important — tool to track jihadists online.
It’s also important to note that jihadists are very quick to adapt online. In the past year alone, the Islamic State and al-Qaeda fighters have moved quickly from WhatsApp to Kik, Wickr, Surespot, then to Telegram – all different encryption programs created to give smartphone users safe and free text messaging available across multiple devices. Jihadists are constantly ranking, debating and explaining which of the services is the safest and most effective. Regulation of these programs will take jihadists next to no time to circumvent; the U.S. government would be the one taking years to catch up. And even if successful, they may be able to regulate companies based in the United States, but such programs would appear everywhere else, from Russia to India to China
SITE’s leadership and continued success do not stem from access to secret databases. Our research, investigations and reporting are based on open-source information — social media, forums, websites, blogs, IP addresses — which can be immensely powerful if used wisely. Government agencies, however, seem blind to this bountiful intelligence resource, and too often rely solely on classified documents and back-end access to websites.
Rather than try to create backdoors to encrypted communication services, or use the lack thereof as an excuse to intelligence failures, the U.S. government must first know how to utilize the mass amount of data it has been collecting and to improve its monitoring of jihadist activity online. A focused approach of this sort is much more likely to lead to success in the war on terrorism.
https://www.indiegogo.com/projects/fallen-angel-shoot-down-of-seal-team-six#/ DONATE HERE
AirandSpaceMagazine: A few minutes past 2 a.m. on August 6, 2011, at a dusty forward operating base 40 miles south of Kabul, Afghanistan, the rotors of two U.S. Army CH-47D Chinooks began to turn. Operating with no lights save for the faint green glow of night vision goggles and cockpit instrument panels, the two helicopters, call signs Extortion 17 (“one-seven”) and Extortion 16, lifted into the darkness and accelerated toward a destination less than 20 miles west.
Extortion 17 and its 38 occupants would not return. A Taliban fighter shot the helicopter out of the sky with a rocket-propelled grenade and all aboard were killed—the single greatest loss of American life in the Afghan war. Those killed ranked among the world’s most highly trained and experienced commandos, including 15 men from Gold Squadron of the Naval Special Warfare Development Group, popularly called SEAL Team 6. Just three months earlier, members of a counterpart SEAL Team 6 squadron successfully raided a compound in Abbottabad, Pakistan, and killed Osama bin Laden. In light of that raid’s success, the shootdown of Extortion 17 incited a flurry of conspiracy theories: The Taliban were tipped off; it was a trap; it was retribution for the killing. No evidence has emerged to support any of these claims. Instead, two rigorous U. S. military investigations followed every moment of the mission to determine what went wrong on Extortion 17’s final flight.
The mission had begun about four hours prior to the shootdown, when the two helicopters touched down side by side in Juy Zarin, a village in the bare rock-walled Tangi Valley of Wardak Province. As two U.S. Army AH-64 Apache attack helicopters, an Air Force AC-130 gunship, and a small fleet of unmanned surveillance aircraft orbited overhead, a platoon of the 75th Ranger Regiment and members of an Afghan special operations unit stormed down the rear ramps of the Chinooks and into the night. Their target: an Afghan named Qari Tahir and his group of fighters. Intelligence had revealed Tahir to be the senior Taliban chief of the Tangi Valley region, with probable ties to upper-echelon Taliban leadership in Pakistan. As the ground assault force rushed toward Tahir’s compound, Extortion 17 and 16 sped back to base, where they were refueled, and awaited word to extract the team, evacuate wounded, or race reinforcing troops to Juy Zarin.
When the two Chinooks had first touched down in the village, a group of eight fighters armed with AK-47 rifles and RPG-7 rocket-propelled grenade launchers bolted from the compound. One AH-64 crew, after identifying the men as enemy combatants, fired on them with their gunship’s 30mm cannon, killing six. The remaining two fighters ducked into a stand of trees and disappeared from the Apaches’ infrared scanners. Three hours after disembarking from the Chinooks, the assault force had secured the compound and detained a number of Tahir’s men, but they hadn’t found Tahir himself. Through sensors on manned and unmanned aircraft, U.S. forces observing the mud walls and terraces of the village saw new groups of fighters gathering and maneuvering. Mission commanders, believing that Tahir was likely among one of the groups, deployed an Immediate Reaction Force (IRF) to interdict them while the Rangers held the compound. Planners then chose a new landing zone for the IRF, but it was large enough to accommodate only one Chinook.
Faced with the possibility of confronting nine or 10 Taliban fighters, planners increased the reinforcement team from 17 to 32 men, formed around the 15-man SEAL group. The IRF also included two SEALs from another team, five Navy special operations support personnel, three Air Force special tactics airmen, seven Afghan National Army commandos, a translator, and a combat assault dog. The IRF commander then made a critical decision: In order to get everyone on the ground as quickly as possible and deny the Taliban time to react, he ordered the entire force to fly in Extortion 17. Extortion 16 flew empty.
Commanders frequently request CH-47 Chinooks to insert troops. The helicopters are capacious and fast, and they can perform well in Afghanistan’s performance-degrading high altitudes and heat. U.S. Special Operations Command possesses its own specialized Chinooks—MH-47s—flown by the ultra-secretive 160th Special Operations Aviation Regiment, the “Night Stalkers.” The MH-47s’ modifications include inflight refueling probes, additional and upgraded sensors, more powerful engines, and more powerful defensive weapons than their conventional counterparts. Night Stalker pilots and crew rigorously train for nighttime raids, like the one in Juy Zarin.
Extortion 17 and 16 weren’t MH-47s and their crews were not Night Stalkers. The mission was flown by conventional pilots flying unmodified CH-47Ds. “It’s a math problem. There are more operations than can be supported by the 160th at any given time,” says Major Matthew Brady, a former 160th pilot and company commander.
The pilots and crew of Extortion 17, however, had ideal experience and abilities for the mission that night. At the flight controls were David R. Carter of the Colorado Army National Guard and copilot Bryan J. Nichols, a Kansas-based Army reservist. Nichols had deployed three times to combat zones, and Carter, with more than 4,000 hours of flight time, was one of the most experienced helicopter pilots in the U.S. military. He was also an instructor at the High Altitude Army National Guard Aviation Training Site (see “Triple Threat: High, Hot, and Heavy,” Aug. 2014), where many U.S. and foreign helicopter pilots train for mountainous and high-altitude flying, often before deployment to Afghanistan.
During a previous deployment to Iraq, Carter’s unit flew dozens of similar raids, which he often planned and led, and gained a reputation for working well with special operations troops. “Our area of operation was the entire country of Iraq, and every mission was at night,” says David “Pat” Gates, a pilot with Carter’s unit , the 2nd Battalion, 135th Aviation Regiment (2-135th), a Colorado Army National Guard unit based in Aurora, Colorado. “We were on goggles the whole time. We were supporting special operations, but not to the degree of the 160th. We didn’t do fast-rope inserts, building insertions, or anything like that.” Subsequent to their Iraq deployment, the unit flew the SEALs of Team 6 on practice raids around Fort Carson, Colorado, and during nighttime urban training in Denver, further cementing the 2-135th’s reputation with special operations units. At the time of the Juy Zarin raid, the battalion had been flying in Afghanistan for about two weeks.
Flying to the Tangi Valley for the second time, Extortion 17 and 16 took a different route, approaching from the northwest instead of the south. Six minutes from their estimated landing time, Extortion 16 broke away from the lead Chinook and orbited at a location close enough to help if needed. Extortion 17 sped alone toward the landing zone.
For helicopter crews in Afghanistan, the most dangerous times are landing and taking off. Approaching to land or having just taken off, the craft is flying slow and low, so it presents a tempting target. But even a precisely aimed shot fired from an unguided weapon by a seasoned fighter is subject to the ballistics-altering whims of atmospheric variation, subtle and undetected flaws in launcher or projectile, and uncontrollable environmental factors such as wind gusts, large temperature variations, or even particulates in the air.
“There are a lot of bullets out there that say ‘To whom it may concern,’ ”says Major Doug Glover, a U.S. Marine F/A-18D weapons and sensors operator who was a senior watch officer for the Marine air operations center in southern Afghanistan. “The RPG is not a laser. It does not fly in a straight line, and there is no way to know what exact path it will take—just a fairly good idea of its trajectory.”
Sometimes the enemy succeeds in delivering one of these “To whom it may concern” projectiles. In July 2010, an RPG-wielding fighter put a round into the tail boom of a Marine AH-1W Super Cobra, downing it and killing both pilots. In June 2005, a rocket-propelled grenade connected with the rear transmission of a 160th MH-47E Chinook as it attempted to come to a hover, downing it; all 16 on board were killed. In March 2002, two MH-47s were downed by machine gun and rocket-propelled grenade fire while close to ground level. “What we saw is that if the enemy knew where you were going to attack, they would back some guys with RPGs off 500 meters or so, to shoot during an ingress,” Glover explains.
***
Now deep in the Tangi Valley, their night vision goggles showing the world around them in greenish hues, the IRF team members readied to hit the ground running as the pilots slowed Extortion 17 and descended toward the village. At 2:36 a.m., Extortion 17 requested an infrared spotlight, visible only through night vision goggles, to illuminate the landing zone. The crew of Slasher 02, the AC-130 circling above, flipped the switch on their powerful light. “Burn is on,” they radioed. Through the goggles, the landing zone shone brilliantly. Carter and Nichols continued the descent. “LZ is ice,” transmitted one of the Rangers on the ground, indicating the landing zone was free of enemy activity.
Seconds later, with the Chinook just over 100 feet off the ground and traveling at 58 mph, two or three previously unseen fighters emerged from the tower of a two-story building roughly 220 yards south of the helicopter, shouldering RPG launchers. They may have seen Extortion 17 and its landing zone through their own night vision goggles or simply aimed by sound alone. Two fired at roughly the same time. The first round sailed past the helicopter. The second slammed into one of the Chinook’s rear rotor blades and exploded, severing 10 feet of it. The torque of the spinning rotor assembly, now catastrophically imbalanced, ripped the rear pylon off the Chinook’s fuselage. The forward rotor system then tore off, stressed by the imbalance and the strain of carrying what would normally be a shared load. Less than five seconds after the RPG round hit, the helicopter spun uncontrollably, plummeting into a dry creek bed and erupting in a ball of fire that killed all on board.
The United States military continually works to improve protection for transport helicopters and their occupants, according to Glover and Brady. One of the most significant tactical evolutions of the Afghanistan conflict is the ever-heavier use of unmanned aerial systems and other airborne intelligence-gathering systems. Capable of loitering overhead for hours undetected, small fleets of unmanned craft passed imagery to mission planners before and during the raid at Juy Zarin, allowing them to recognize individual fighters, learn their habits, pinpoint where they slept, and identify the types of weapons they carried.
But U.S. forces didn’t know about every fighter during the raid, and they lost track of at least two—one of whom fired the deadly shot. Since the shootdown of Extortion 17, the military has continued to gain vital experience and equipment to enable an ever greater understanding of an enemy force, aiming to know every combatant and potential combatant and his weapon system before a raid. According to Glover, improved systems in place enable U.S. forces to monitor a target for days or even weeks prior to an operation, so they theoretically will know of even well-hidden potential RPG shooters throughout a village before transport helicopters first touch down.
The military has worked diligently to more tightly integrate gunship escorts with transport craft, according to Brady. While classification veils the specifics of these tactics, particularly for special operations raids, manned gunships can detect potential threats through a range of sensors and immediately attack if needed. Another tactic sometimes employed by gunships, according to Glover, is a show of force, in which pilots and crew fire into an empty field or stand of trees just before a transport helicopter prepares to land, using the sound of a gun alone to keep enemy heads down and fingers off triggers.
The two military investigations, one conducted by United States Central Command and one by the multi-service Joint Combat Assessment Team, pored over the details of the crash with excruciating focus and concluded that no planners or participants bore any fault regarding the circumstances leading to the shootdown of Extortion 17. Though both noted that airborne sensor coverage and closer AH-64 gunship escort should be considered in future operations, nothing could have kept the shooters from firing their RPGs that night. The Joint Combat Assessment Team report further noted that despite a robust deck of intelligence, surveillance, and reconnaissance assets, none identified the location from which the shooters fired prior to the helicopter downing.
The shooters’ origin remains a mystery. The two may have been those who escaped Apache cannon fire, or they may have split away from either of the groups that formed after the start of the raid. The duo may also have had no ties to Tahir or any of his suspected fighters, and attacked the helicopter on their own. Should the Apache pilots have fired into the stand of trees after the two fighters ducked out of sight? Should the Apaches, or the AC-130 overhead, have fired upon the groups of suspected Taliban that gathered in the village after the raid began?
Restrained by strict rules of engagement in force at the time, the helicopter crews could not have fired without a strong indication of hostile intent. Afghanistan has long been a counter-insurgency campaign: The United States’ strategy has been to win Afghan trust through cooperation and aid. Having studied and directly observed the counter-insurgency campaign in Afghanistan, I’ve watched commanders and individual American troops consistently lean far to the side of restraint to encourage Afghans to side with American interests long after U.S. forces have left. Because unarmed villagers, unaffiliated with the Taliban, could also have been in those trees and among the groups milling about the village, the gunships could not have fired. Following a “scorched earth” tactic may have killed the two shooters—and possibly a greater number of innocents—prior to Extortion 17’s return that night, but counterinsurgency doctrine dictates that such tactics lead to potentially far worse long-term consequences.
With a keen understanding of the propaganda value of downing Coalition helicopters, the Taliban single them out as targets. Classified reports, published by Wikileaks, teem with notes from pilots and crew of all types of military helicopters who saw RPG attacks throughout the war. According to one Army report, in the three months prior to the Juy Zarin raid, as many as 17 RPGs were fired at helicopters over Wardak and Logar provinces, a relatively small part of the country. And while all military helicopters carry countermeasures for guided missiles, nothing can interdict the dumb luck of an unguided RPG round sailing through the air. The vast majority miss. “Chance is still part of the battlefield,” says Brady. “For every one that gets lucky, there are hundreds, even thousands, that zip by you.”
“As we’ve seen a number of times, there’s a point that a lucky shot is going to get you and there is only so much you can do to mitigate it,” says Glover, the Marine aviator. “To remove the risk of rocket-propelled grenades downing helicopters in Afghanistan 100 percent, you’d have to remove the opposable thumbs of every fighting-age male in the objective area, and that’s not how we win a counter-insurgency.”
FNC: The Obama administration cannot be sure of the whereabouts of thousands of foreigners in the U.S. who had their visas revoked over terror concerns and other reasons, a State Department official acknowledged Thursday.
The admission, made at a House oversight hearing examining immigrant vetting in the wake of major terror attacks, drew a sharp rebuke from the committee chairman.
“You don’t have a clue do you?” Rep. Jason Chaffetz, R-Utah, told Michele Thoren Bond, assistant secretary for the Bureau of Consular Affairs.
Bond initially said the U.S. has revoked more than 122,000 visas since 2001, including 9,500 because of the threat of terrorism.
But Chaffetz quickly pried at that stat, pressing the witness about the present location of those individuals.
“I don’t know,” she said.
The startling admission came as members of the committee pressed administration officials on what safeguards are in place to reduce the risk from would-be extremists.
At issue is how closely the U.S. government examines the background of people seeking entry to the country, including reviews of their social media postings.
Leon Rodriguez, director of U.S. Citizenship and Immigration Services, told committee members that such checks aren’t being done in an abundant manner, and he was not specific about when or how it would occur.
Lawmakers are trying to ascertain which safeguards are in place to ensure that extremists are not exploiting a variety of legal paths to travel to the United States.
One of the San Bernardino, Calif., shooters came to the U.S. on a K-1 fiancee visa last year despite the fact that the FBI believed she was already radicalized.
Tashfeen Malik came to the U.S. on a K-1 fiance visa in July 2014 and passed multiple background checks and at least two in-person interviews, one in Pakistan and another after she married Syed Farook. FBI Director James Comey has said Malik and Farook communicated privately online about jihad and martyrdom before they married.
Lawmakers at times angrily pressed officials on why even public social media wouldn’t routinely be looked at for vetting those trying to enter the country.
“If half the employers are doing it in the United States of America, if colleges are doing it for students, why wouldn’t Homeland Security do it?” said Rep. Stephen Lynch, D-Mass. “We don’t even look at their public stuff, that’s what kills me.”
DHS did launch three pilot programs specifically aimed at reviewing social media postings as part of the immigration vetting process.
“There is less there that is actually of screening value than you would expect, at least in small early samples, some things seem more ambiguous than clear,” Rodriguez told lawmakers Thursday. He said foreign alphabets frequently used in social media posts were a challenge to translate.
“We all continue to believe there’s a potential for there to be information of screening value … particularly in high risk environments,” he added.
Both DHS and the State Department are reviewing the process for vetting visa applications, including the K-1 program, and have been directed by the White House to create specific recommendations for improvements.
DHS is specifically reviewing policies on when authorities at U.S. Citizenship and Immigration Services can look at social media posts as part of the process for evaluating applications for certain visas.
“There are some legal limits to what we can do,” Homeland Security Secretary Jeh Johnson said Wednesday. He added that he thinks reviews of social media should be done more often, but did not provide specifics.
During his opening remarks Chaffetz, said: “It is unclear how someone who so openly discussed her hatred of our country and way of life could easily pass three background checks. We need to understand how the breakdown happened with Malik and what we are doing to make sure it doesn’t happen again.”
Lawmakers have also pressed for changes to the Visa Waiver Program, which allows many citizens from 38 countries to travel to the United States without being subjected to the in-person interview required to receive a visa. Many fear that foreign fighters who carry western passports will be able to exploit that system to travel freely to the United States.
Earlier this month the House voted overwhelmingly to tighten controls on that program and require visas for anyone who has been to Iraq or Syria in the last five years. Security changes to the program were also included in the Senate version of a massive spending bill expected to be approved later this week.
• To review the screening process for foreign nationals entering the United States, including the ability to review social media as part of the vetting process.
• To assess the likelihood of foreign nationals exploiting the U.S. immigration system and examine vulnerabilities within that system.
• This hearing is a follow-up to an Oversight Subcommittee hearing last week, where a Department of Homeland Security (DHS) official was unable to answer basic questions on the Agency’s ability to vet, track, and screen individuals who arrive in the United States.
BACKGROUND:
• Foreign nationals seeking to enter the U.S. must ordinarily obtain either an immigrant visa or a nonimmigrant visa. A third category of foreign nationals seeking entry into the U.S. are refugees, who enter under refugee status.
• An exception to the rule is the Visa Waiver Program (VWP), where an individual who seeks entry to the U.S. must apply for, and receive, a visa before entering the country. Currently, nationals of 38 countries can enter the U.S. without first obtaining a visa under the VWP.
• Under current law, two departments—the Department of State and DHS—play roles in administering the law and policies on immigration visas.
• In light of the attacks in San Bernardino, CA, Committee Chairman Jason Chaffetz (R-UT) and Subcommittee Chairman Ron DeSantis (R-FL) sent a letter to DHS seeking information relating Tashfeen Malik’s entry into the U.S. on a fiancée visa.
Witnesses and testimonies
Name
Title
Organization
Panel
Document
The Honorable Anne C. Richards
Assistant Secretary, Bureau of Population, Refugees, and Migration