Obama, the Conductor of Chaos

Barack Obama holds the baton to an anti-American orchestra of tuned, tested, rehearsed instruments. The production is mismanaged, sour to the ears and causes people to leave the arena when the verses are not American and in cadence with allies. The entire governmental score is tyrannical and abusive.

His performance however, is well driven by inside marxist, communists and socialist operators who themselves have tuned, tested and rehearsed instruments where it is in harmony with enemies of America. How about Hugo Chavez, Mohammed Morsi or the Taliban? Then there is Iran.

Three branches of government have been reduced to one, where Conductor Obama has ruled with a pen and a phone and otherwise political extortion. Up to the point where Senate majority leader, Harry Reid lost his leadership post, he functionally stopped and paralyzed the people’s work on Congress to protect Barack Obama.

All the while, Maestro Obama had his was working his intonations on the Supreme Court with his choice picks of Elena Kagan and Sonia Sotomayor, swinging the black robe influence to a more left octave. The court is broken when one sees the real dissention between the justices when not on the bench.

Obama has led an opus where the very social and civil structure in America has been thrown into turmoil. Border Patrol has no clue how to enforce immigration laws, they abide to DHS memos written by Secretary Jeh Johnson. Historical flags and icons are to be removed and gender designated bathrooms are now without any designation.

The fundamental security of government personnel and documents of several agencies has been compromised by an epic cyber intrusion and that finale is from over as the damage will be ongoing for years.

The very personal concern of having access to healthcare has reached a crisis pitch such that insurance deductibles are financially bending and having a doctor’s appointment is a future dream. Nothing is more demonstrative of this condition than that of the Veteran’s Administration where there is a slow death waltz.

Barack Obama performed a medley of government fraud and extortion using the IRS, the EPA, the DoJ, ATF, Education, HUD and HHS to name a few.

Off our shores, conditions are much worse. Barack Obama has modulated a score of retreat while his measure of sympathy to Islam in pure nocturne. His administration led of early in 2009 with the Cairo speech where the ligature plays out today throughout the Muslim world. The retreat from Iraq and his shallow threat of a ‘red-line’ have prove deadly in the whole region, a modern day holocaust. And mostly sadly of all was allowing 4 Americans to perish in Libya with no hope of security, support or rescue.

The most grave of the Obama coda is the terror and dying of Christians.

The building crescendo of Obama will be the nuclear agreement with Iran where Israel, Saudi Arabia, Europe and America as the great Satan will be his encore.

The stretto of the Obama symphony is defined here in an excellent summary by Stephen Hayes of The Weekly Standard.

There are several months left for the conductor of chaos to work his baton and that tremolo is clearly upon us and the world.

 

 

 

 

 

ISIS Called for Ramadan Day of Terror

Day of terror: Islamist attacks around world follow ISIS’ Ramadan message

Terrorists gunned down dozens of tourists on a Tunisian beach, left a severed head atop a fence outside a French factory and blew up a Kuwaiti mosque Friday in a bloody wave of attacks that followed an ISIS leader’s call to make the month of Ramadan a time of “calamity for the infidels.”

There was no confirmation that the attacks were a coordinated effort ordered by ISIS, but the suspects who attacked a U.S.-owned gas factory in southeastern France left the terrorist army’s flags next to the severed head of their victim, and an ISIS affiliate claimed responsibility for the deadly Kuwait blast.

If the attacks were indeed an answer to ISIS spokesman Abu Muhammad al-Adnani’s recent call for savagery, it would represent a hideous perversion of Islam’s most holy period, which began June 17 and ends July 17.

“The attack was of a terrorist nature since a body was discovered, decapitated and with inscriptions.”

– French President Francois Hollande

Jihadists should make Ramadan a time of “calamity for the infidels … Shi’ites and apostate Muslims,” Al-Adnani said in a recent audio message. “Muslims everywhere, we congratulate you over the arrival of the holy month. Be keen to conquer in this holy month and to become exposed to martyrdom.”

The attack in France occurred first, Friday morning in Saint-Quentin-Fallavier, northwest of the Alpine city of Grenoble. Two suspects dressed as deliverymen crashed a car into an industrial gas plant operated by Allentown, Pa.,-based Air Products & Chemicals, stormed inside and killed at least one person. The head of the victim was left on a fence, with Arabic phrases scrawled on it and ISIS flags nearby, Sky News reported, citing French legal sources.

The unnamed victim was a businessman at a local transportation company and the boss of a man arrested in connection with the attack.

Nearly simultaneously, a gunman opened fire with an automatic rifle on a beach in Sousse– a Tunisian coastal town popular with tourists– killing at least 37 and wounding 36. The Health Ministry said the dead include Tunisians, Brits, Germans and Belgians.

A third attack killed at least 25 and wounded more than 200 in a Shia mosque in Kuwait City, the  Ministry of Interior said. A suicide bomber purportedly from ISIS affiliate Najd Province targeted Shiite worshippers after midday prayers at the Imam Sadiq Mosque in the residential neighborhood of al-Sawabir in Kuwait’s capital, Kuwait City. It was the first terrorist attack in Kuwait in more than two decades.

ISIS is comprised of Sunni Muslims, and its members have a long and bloody history with Shia Muslims, as evidenced by Al-Adnani’s call. The attack came immediately following Friday prayers. There was no claim of responsibility, but ISIS has claimed responsibility for bombings at two different Shiite mosques in Saudi Arabia in recent weeks.

French officials wasted no time labeling Friday’s attack an act of terrorism.

“The attack was of a terrorist nature since a body was discovered, decapitated and with inscriptions,” French President Francois Hollande told a news conference in Brussels, where he cut short his attendance at an EU summit to return to France.

Hollande and his Tunisian counterpart Beji Caid Essebsi expressed “solidarity in the face of terrorism,” according to a statement by Hollande’s office, France24.com reported.

Interior Minister Bernard Cazeneuve said at least one man–a 30-year-old extremist known to authorities named Yassin Sahli– was under arrest following the France attack. The suspect from Lyon was seized by an alert firefighter.

Other people, including the man’s wife, were also taken into custody after the attack, A second suspect arrested at his home in Saint-Quentin-Fallavier was reportedly seen driving back and forth past the factory before the attack, the Dauphine Libere newspaper reported. A manhunt is underway for any other suspects involved.

Minister Cazeneuve, speaking from the scene, described the attack as “barbarous” and a “terrible terrorist crime.” He said the suspect had been known to foreign intelligence services since 2006, but that police monitoring of him had ceased in 2008. The man did not have a criminal record, the minister added.

French authorities told Fox News that approximately 10 people were injured.

The factory is operated by Air Products & Chemicals, an Allentown, Pa.,-based company that makes industrial gases.

“Our priority at this stage is to take care of our employees, who have been evacuated from the site and all accounted for,” the company said in a statement. “Our crisis and emergency response teams have been activated and are working closely with all relevant authorities.”

A local official confirmed the nation is on high alert.

“The terrorism threat is at a maximum,” Alain Juppe, mayor of Bordeaux, told Fox News.

The United Nations, the U.S and other countries condemned Friday’s attacks. U.N. Secretary-General Ban Ki-moon said those “responsible for such appalling acts of violence must be swiftly brought to justice” and Interpol offered its help to all three nations.

In Washington, Pentagon spokesman Col. Steve Warren said it was too soon to tell whether the three attacks were the work of Islamic State extremists but added “we unequivocally condemn these terrorist attacks.

Terrorism analysts said the attacks could be so-called “lone wolves” answering the call to attack ISIS enemies during the holy period.

“It is very likely that ISIS’ supporters acted due to the call for attacks during Ramadan,” said Ryan Mauro, of the New York-based terrorism research institute Clarion Project. “It is appealing to ISIS supporters on a personal level because it gives their attacks some more religious significance.”

France’s anti-terrorism prosecutor has opened an investigation into the incident. The country went on high alert after a series of attacks in January that left 20 people dead in and around Paris region, including the Islamic terrorists. In the Jan. 7 attack at the satirical magazine Charlie Hebdo, two radical Muslim brothers, Saïd and Chérif Kouachi, heavily armed and incensed over the publishing of caricatures of Muhammad, stormed the magazine’s offices and killed 12, including staffers and a police officer.

Authorities hunted down the Kouachi brothers for three days, until finally cornering them in a Paris printing house and killing them in a shootout. As police searched for the brothers’, a friend and fellow home grown Islamic terrorist Amedy Coulibaly, took at least 15 people hostage at a kosher supermarket in Paris. After a long standoff,  police stormed the market, killing him. Four hostages were also killed in the incident.

Ramadan is the ninth month of the Islamic lunar calendar when Muslims celebrate the Koran. They also often fast– primarily from eating and drinking– from sunrise to sunset every day of the month to teach empathy for those who have less. Fasting and reading the Koran during Ramadan should encourage charity, kindness and social justice, especially to the needy and poor.

National Preparedness is up to YOU

At no other time in American history has the United States been so vulnerable to national security threats. The text below is for you benefit, take is seriously and don’t rely on FEMA, you are your own best resource.

National Preparedness Report

Main Content

This page provides information on the 2015 National Preparedness Report, including the overarching findings on national issues, preparedness progress, and opportunities for improvement. This page is for anyone interested in seeing how preparedness can inform priorities and community actions.

National Preparedness Report

The 2015 National Preparedness Report marks the fourth iteration of this annual report. Required annually by Presidential Policy Directive 8: National Preparedness, the National Preparedness Report summarizes progress in building, sustaining, and delivering the 31 core capabilities described in the 2011 National Preparedness Goal (the Goal). Each year, the report presents an opportunity to assess gains that whole community partners—including all levels of government, private and nonprofit sectors, faith-based organizations, communities, and individuals—have made in preparedness, and to identify where challenges remain.

The intent of the National Preparedness Report is to provide the Nation with practical insights on preparedness that can inform decisions about program priorities, resource allocations, and community actions. The 2015 National Preparedness Report focuses primarily on preparedness activities undertaken or reported during 2014, and places particular emphasis on progress made in implementing the National Planning Frameworks (the Frameworks) across the Prevention, Protection, Mitigation, Response, and Recovery mission areas. The Frameworks describe how the whole community works together to achieve the goal of a secure and resilient Nation.

Overarching Findings on National Issues

In addition to key findings for each of the five preparedness mission areas, the 2015 NPR identifies overarching national trends that cut across multiple mission areas:

  • Incorporating Emergency Preparedness into Technology Platforms: Businesses and public-private partnerships are increasingly incorporating emergency preparedness into technology platforms, such as Internet and social media tools and services.
  • Challenges Assessing the Status of Corrective Actions: While Federal departments and agencies individually assess progress for corrective actions identified during national-level exercises and real-world incidents, challenges remain to comprehensively assess corrective actions with broad implications across the Federal Government.
  • Response Coordination Challenges for Events that Do Not Receive Robert T. Stafford Disaster Relief and Emergency Assistance Act (Stafford Act) Declarations: Recent events, including the epidemic of Ebola virus disease, have highlighted challenges with coordinating the response to and recovery from complex incidents that do not receive Stafford Act declarations.

The Nation Continues to Make Progress

The 2015 NPR identifies three new core capabilities – Environmental Response/Health and Safety, Intelligence and Information Sharing, and Operational Coordination – as meeting acceptable levels of performance but requiring sustained effort to maintain capability and meet emerging challenges. These capabilities join five others from the 2014 report that future National Preparedness Reports will revisit to determine if they are still meeting performance goals.

Opportunities for Improvement

The 2015 National Preparedness Report also highlights key preparedness challenges remaining for the Nation. Three core capabilities—Cybersecurity, Housing, and Infrastructure Systems—have persisted as areas for improvement across all four National Preparedness Reports. A fourth core capability, Long-term Vulnerability Reduction, repeats as an area for improvement from last year, due in part to questions surrounding the long-term solvency of the National Flood Insurance Program and nascent national efforts for climate change adaptation and green infrastructure. Preparedness data further revealed that the Federal Government, states, and territories are also struggling to build capacity for the Access Control and Identity Verification and Economic Recovery core capabilities. These areas for improvement are a reminder that preparedness gains are gradual and that solutions to complex challenges will not materialize without sustained support from the whole community.

Key Factors for Future Progress

The 2015 NPR represents the fourth opportunity for the Nation to reflect on progress in strengthening national preparedness and to identify where preparedness gaps remain. Looking across all five mission areas, the NPR provides a national perspective on critical preparedness trends for whole community partners to use to inform program priorities, to allocate resources, and to communicate with stakeholders about issues of shared concern.

Resources

Core Capabilities

Main Content

The National Preparedness Goal identified 31 core capabilities—these are the distinct critical elements needed to achieve the goal.

These capabilities are referenced in many national preparedness efforts, including the National Planning Frameworks. The Goal grouped the capabilities into five mission areas, based on where they most logically fit. Some fall into only one mission area, while some others apply to several mission areas.

Download the capabilities crosswalk to see how the legacy Target Capabilities List compares with the new core capabilities.

Planning

  • Mission Areas: All
  • Description: Conduct a systematic process engaging the whole community as appropriate in the development of executable strategic, operational, and/or community-based approaches to meet defined objectives.

Public Information and Warning

  • Mission Areas: All
  • Description: Deliver coordinated, prompt, reliable, and actionable information to the whole community through the use of clear, consistent, accessible, and culturally and linguistically appropriate methods to effectively relay information regarding any threat or hazard, as well as the actions being taken and the assistance being made available, as appropriate.

Operational Coordination

  • Mission Areas: All
  • Description: Establish and maintain a unified and coordinated operational structure and process that appropriately integrates all critical stakeholders and supports the execution of core capabilities.

Forensics and Attribution

  • Mission Area: Prevention
  • Description: Conduct forensic analysis and attribute terrorist acts (including the means and methods of terrorism) to their source, to include forensic analysis as well as attribution for an attack and for the preparation for an attack in an effort to prevent initial or follow-on acts and/or swiftly develop counter-options.

Intelligence and Information Sharing

  • Mission Areas: Prevention, Protection
  • Description: Provide timely, accurate, and actionable information resulting from the planning, direction, collection, exploitation, processing, analysis, production, dissemination, evaluation, and feedback of available information concerning threats to the United States, its people, property, or interests; the development, proliferation, or use of WMDs; or any other matter bearing on U.S. national or homeland security by Federal, state, local, and other stakeholders. Information sharing is the ability to exchange intelligence, information, data, or knowledge among Federal, state, local, or private sector entities, as appropriate.

Interdiction and Disruption

  • Mission Areas: Prevention, Protection
  • Description: Delay, divert, intercept, halt, apprehend, or secure threats and/or hazards.

Screening, Search, and Detection

  • Mission Areas: Prevention, Protection
  • Description: Identify, discover, or locate threats and/or hazards through active and passive surveillance and search procedures. This may include the use of systematic examinations and assessments, sensor technologies, or physical investigation and intelligence.

Access Control and Identity Verification

  • Mission Area: Protection
  • Description: Apply a broad range of physical, technological, and cyber measures to control admittance to critical locations and systems, limiting access to authorized individuals to carry out legitimate activities.

Cybersecurity

  • Mission Area: Protection
  • Description: Protect against damage to, the unauthorized use of, and/or the exploitation of (and, if needed, the restoration of) electronic communications systems and services (and the information contained therein).

Physical Protective Measures

  • Mission Area: Protection
  • Description: Reduce or mitigate risks, including actions targeted at threats, vulnerabilities, and/or consequences, by controlling movement and protecting borders, critical infrastructure, and the homeland.

Risk Management for Protection Programs and Activities

  • Mission Area: Protection
  • Description: Identify, assess, and prioritize risks to inform Protection activities and investments.

Supply Chain Integrity and Security

  • Mission Area: Protection
  • Description: Strengthen the security and resilience of the supply chain.

Community Resilience

  • Mission Area: Mitigation
  • Description: Lead the integrated effort to recognize, understand, communicate, plan, and address risks so that the community can develop a set of actions to accomplish Mitigation and improve resilience.

Long-term Vulnerability Reduction

  • Mission Area: Mitigation
  • Description: Build and sustain resilient systems, communities, and critical infrastructure and key resources lifelines so as to reduce their vulnerability to natural, technological, and human-caused incidents by lessening the likelihood, severity, and duration of the adverse consequences related to these incidents.

Risk and Disaster Resilience Assessment

  • Mission Area: Mitigation
  • Description: Assess risk and disaster resilience so that decision makers, responders, and community members can take informed action to reduce their entity’s risk and increase their resilience.

Threats and Hazard Identification

  • Mission Area: Mitigation
  • Description: Identify the threats and hazards that occur in the geographic area; determine the frequency and magnitude; and incorporate this into analysis and planning processes so as to clearly understand the needs of a community or entity.

Critical Transportation

  • Mission Area: Response
  • Description: Provide transportation (including infrastructure access and accessible transportation services) for response priority objectives, including the evacuation of people and animals, and the delivery of vital response personnel, equipment, and services into the affected areas.

Environmental Response/Health and Safety

  • Mission Area: Response
  • Description: Ensure the availability of guidance and resources to address all hazards including hazardous materials, acts of terrorism, and natural disasters in support of the responder operations and the affected communities.

Fatality Management Services

  • Mission Area: Response
  • Description: Provide fatality management services, including body recovery and victim identification, working with state and local authorities to provide temporary mortuary solutions, sharing information with mass care services for the purpose of reunifying family members and caregivers with missing persons/remains, and providing counseling to the bereaved.

Infrastructure Systems

  • Mission Area: Response, Recovery
  • Description: Stabilize critical infrastructure functions, minimize health and safety threats, and efficiently restore and revitalize systems and services to support a viable, resilient community.

Mass Care Services

  • Mission Area: Response
  • Description: Provide life-sustaining services to the affected population with a focus on hydration, feeding, and sheltering to those who have the most need, as well as support for reunifying families.

Mass Search and Rescue Operations

  • Mission Area: Response
  • Description: Deliver traditional and atypical search and rescue capabilities, including personnel, services, animals, and assets to survivors in need, with the goal of saving the greatest number of endangered lives in the shortest time possible.

On-scene Security and Protection

  • Mission Area: Response
  • Description: Ensure a safe and secure environment through law enforcement and related security and protection operations for people and communities located within affected areas and also for all traditional and atypical response personnel engaged in lifesaving and life-sustaining operations.

Operational Communications

  • Mission Area: Response
  • Description: Ensure the capacity for timely communications in support of security, situational awareness, and operations by any and all means available, among and between affected communities in the impact area and all response forces.

Public and Private Services and Resources

  • Mission Area: Response
  • Description: Provide essential public and private services and resources to the affected population and surrounding communities, to include emergency power to critical facilities, fuel support for emergency responders, and access to community staples (e.g., grocery stores, pharmacies, and banks) and fire and other first response services.

Public Health and Medical Services

  • Mission Area: Response
  • Description: Provide lifesaving medical treatment via emergency medical services and related operations and avoid additional disease and injury by providing targeted public health and medical support and products to all people in need within the affected area.

Situational Assessment

  • Mission Area: Response
  • Description: Provide all decision makers with decision-relevant information regarding the nature and extent of the hazard, any cascading effects, and the status of the response.

Economic Recovery

  • Mission Area: Recovery
  • Description: Return economic and business activities (including food and agriculture) to a healthy state and develop new business and employment opportunities that result in a sustainable and economically viable community.

Health and Social Services

  • Mission Area: Recovery
  • Description: Restore and improve health and social services networks to promote the resilience, independence, health (including behavioral health), and well-being of the whole community.

Housing

  • Mission Area: Recovery
  • Description: Implement housing solutions that effectively support the needs of the whole community and contribute to its sustainability and resilience.

Natural and Cultural Resources

  • Mission Area: Recovery
  • Description: Protect natural and cultural resources and historic properties through appropriate planning, mitigation, response, and recovery actions to preserve, conserve, rehabilitate, and restore them consistent with post-disaster community priorities and best practices and in compliance with appropriate environmental and historical preservation laws and executive orders.

The Lost Tea Party Invitation to Dinner at WH

Do you ever ask yourself where the invitation is inviting the Tea Party to the White House for dinner? How about the invitation for Family Security Matters or the Center for Security Policy to attend a State dinner? Will the Concerned Veterans for America organization be invited to the White House anytime soon?

Nah….but look who did just have dinner at the White House.

Expected Attendees at the White House Iftar Dinner

This evening, President Obama will continue a White House tradition by hosting an Iftar in observance of the Muslim holy month of Ramadan in the East Room. This is the seventh Iftar, the traditional breaking of the fast at sunset, hosted by the President. This year’s dinner will have a special focus on young leaders and women, some of whom will be seated at the President’s table this evening.

Below is a list of some of the expected attendees at tonight’s White House dinner recognizing Ramadan:

Guests Seated at the President’s Table

  •          Ms. Batoul Abuharb, Houston, TX
  •          Mr. Ziad Ahmed, Princeton, NJ
  •          Ms. Samantha Elauf, Tulsa, OK
  •          Ms. Munira Khalif, Fridley, MN
  •          Ms. Kadra Mohamed, Saint Paul, MN
  •          Ms. Riham Osman, Houston, TX
  •          Mr. Wayne Rucker, Philadelphia, PA
  •          Ms. Wai Wai Nu, Rangoon, Burma

Members of Congress:

  •          The Honorable Andre Carson, United States Representative, Indiana
  •          The Honorable Richard Durbin, United States Senator, Illinois
  •          The Honorable Keith Ellison, United States Representative, Minnesota

Diplomatic Corps:

  •          His Excellency Michael Moussa Adamo, Ambassador of the Gabonese Republic
  •          His Excellency Lukman Al Faily, Ambassador of the Republic of Iraq
  •          Her Excellency Hunaina Al Mughairy, Ambassador of the Sultanate of Oman
  •          His Excellency Yousif Mana Saeed Al Otaiba, Ambassador of the United Arab Emirates
  •          Mr. Sami Alsadhan, Deputy Chief of Mission and Charge d’Affaires a.i., Embassy of Saudi Arabia (Guest of His Excellency Adel Ahmed Al-Jubeir)
  •          His Excellency Sheikh Salem Al-Sabah, Ambassador of the State of Kuwait
  •          Her Excellency Hassana Alidou, Ambassador of the Republic of Niger
  •          His Excellency Abudlla Mohamed Alkhalifa, Ambassador of the Kingdom of Bahrain
  •          Mr. Adel Ali Ahmed Alsunaini, Charge d’Affaires a.i., Embassy of Yemen
  •          Chief Representative Maen Areikat, PLO Delegation to the United States
  •          His Excellency Madjid Bouguerra, Ambassador of People’s Democratic Republic of Algeria
  •          His Excellency Rachad Bouhlal, Ambassador of the Kingdom of Morocco
  •          Her Excellency Alia Bouran, Ambassador of the Hashemite Kingdom of Jordan
  •          His Excellency Budi Bowoleksono, Ambassador of the Republic of Indonesia
  •          Her Excellency Wafa Bughaighis, Charge d’Affaires, Embassy of Libya
  •          His Excellency Antoine Chedid, Ambassador of the Lebanese Republic
  •          His Excellency Tiena Coulibaly, Ambassador of the Republic of Mali
  •          His Excellency Daouda Diabate, Ambassador of the Republic of Cote d’Ivoire
  •          His Excellency Mohamed El Haycen, Ambassador of the Islamic Republic of Mauritania
  •          Her Excellency Floreta Faber, Ambassador of the Republic of Albania
  •          The Honorable Sheikh Faye, Ambassador of the Republic of The Gambia
  •          His Excellency Ufuk Gokcen, Ambassador and Permanent Observer of the Organization of the Islamic Cooperation to the United Nations
  •          His Excellency Faycal Gouia, Ambassador of the Republic of Tunisia
  •          His Excellency Bakhtiyar Gulyamov, Ambassador of the Republic of Uzbekistan
  •          His Excellency Mahamat Hassane, Ambassador of the Republic of Chad
  •          His Excellency Awang Adek Bin Hussin, Ambassador of Malaysia
  •          His Excellency Akan Ismaili, Ambassador of the Republic of Kosovo
  •          His Excellency Jalil Abbas Jilani, Ambassador of the Islamic Republic of Pakistan
  •          His Excellency Serdar Kilic, Ambassador of the Republic of Turkey
  •          His Excellency Subhas Mungra, Ambassador of the Republic of Suriname
  •          Her Excellency Jadranka Negodic, Ambassador of Bosnia and Herzegovina
  •          His Excellency Meret Orazov, Ambassador of Turkmenistan
  •          His Excellency Farhod Salim, Ambassador of the Republic of Tajikistan
  •          His Excellency Ahmed Sareer, Ambassador of the Republic of Maldives
  •          Mr. Seydou Sinka, Charge d’Affaires a.i., Embassy of Burkina Faso
  •          His Excellency Bockari Stevens, Ambassador of the Republic of Sierra Leone
  •          His Excellency Elin Emin Oglu Suleymanov, Ambassador of the Republic of Azerbaijan
  •          Her Excellency Amelia Sumbana, Ambassador of the Republic of Mozambique
  •          His Excellency Mohamed Mostafa Mohamed Tawfik, Ambassador of the Arab Republic of Egypt
  •          His Excellency Kadyr Toktogulov, Ambassador of the Kyrgyz Republic
  •          His Excellency Kairat Umarov, Ambassador of the Republic of Kazakhstan
  •          His Excellency Mohammad Ziauddin, Bangladesh – Ambassador of Bangladesh

Cyber Security on the Skids, Blinking RED

Recorded Future is a real time open source intelligence collection company that determines trends and predictions of emerging threats.

Recorded Future identified the possible exposures of login credentials for 47 United States government agencies across 89 unique domains.

As of early 2015, 12 of these agencies, including the Departments of State and Energy, allowed some of their users access to computer networks with no form of two-factor authentication. The presence of these credentials on the open Web leaves these agencies vulnerable to espionage, socially engineered attacks, and tailored spear-phishing attacks against their workforce.

The damage has yet to be fully realized and cannot be overstated. Where is the White House? Where are the protections? Where is a policy? Major alarm bells as you read on.

From Associated Press:

Tech company finds stolen government log-ins all over Web

WASHINGTON (AP) — A CIA-backed technology company has found logins and passwords for 47 government agencies strewn across the Web – available for hackers, spies and thieves.

Recorded Future, a social media data mining firm backed by the CIA’s venture capital arm, says in a report that login credentials for nearly every federal agency have been posted on open Internet sites for those who know where to look.

According to the company, at least 12 agencies don’t require authentication beyond passwords to access their networks, so those agencies are vulnerable to espionage and cyberattacks.

The company says logins and passwords were found connected with the departments of Defense, Justice, Treasury and Energy, as well as the CIA and the Director of National Intelligence.

From the WSJ: Obama’s Cyber Meltdown

“While Russia and Islamic State are advancing abroad, the Obama Administration may have allowed a cyber 9/11 at home.”

If you thought Edward Snowden damaged U.S. security, evidence is building that the hack of federal Office of Personnel Management (OPM) files may be even worse.

When the Administration disclosed the OPM hack in early June, they said Chinese hackers had stolen the personal information of up to four million current and former federal employees. The suspicion was that this was another case of hackers (presumably sanctioned by China’s government) stealing data to use in identity theft and financial fraud. Which is bad enough.

Yet in recent days Obama officials have quietly acknowledged to Congress that the hack was far bigger, and far more devastating. It appears OPM was subject to two breaches of its system in mid-to-late 2014, and the hackers appear to have made off with millions of security-clearance background check files.

These include reports on Americans who work for, did work for, or attempted to work for the Administration, the military and intelligence agencies. They even include Congressional staffers who left government—since their files are also sent to OPM.

This means the Chinese now possess sensitive information on everyone from current cabinet officials to U.S. spies. Background checks are specifically done to report personal histories that might put federal employees at risk for blackmail. The Chinese now hold a blackmail instruction manual for millions of targets.

These background checks are also a treasure trove of names, containing sensitive information on an applicant’s spouse, children, extended family, friends, neighbors, employers, landlords. Each of those people is also now a target, and in ways they may not contemplate. In many instances the files contain reports on applicants compiled by federal investigators, and thus may contain information that the applicant isn’t aware of.

Of particular concern are federal contractors and subcontractors, who rarely get the same security training as federal employees, and in some scenarios don’t even know for what agency they are working. These employees are particularly ripe targets for highly sophisticated phishing emails that attempt to elicit sensitive corporate or government information.

The volume of data also allows the Chinese to do what the intell pros call “exclusionary analysis.” We’re told, for instance, that some highly sensitive agencies don’t send their background checks to OPM. So imagine a scenario in which the Chinese look through the names of 30 State Department employees in a U.S. embassy. Thanks to their hack, they’ve got information on 27 of them. The other three they can now assume are working, undercover, for a sensitive agency. Say, the CIA.

Or imagine a scenario in which the Chinese cross-match databases, running the names of hacked U.S. officials against, say, hotel logs. They discover that four Americans on whom they have background data all met at a hotel on a certain day in Cairo, along with a fifth American for whom they don’t have data. The point here is that China now has more than enough information to harass U.S. agents around the world.

And not only Americans. Background checks require Americans to list their contacts with foreign nationals. So the Chinese may now have the names of thousands of dissidents and foreigners who have interacted with the U.S. government. China’s rogue allies would no doubt also like this list.

This is a failure of extraordinary proportions, yet even Congress doesn’t know its extent. The Administration is still refusing to say, even in classified briefings, which systems were compromised, which files were taken, or how much data was at risk.

***
While little noticed, the IRS admitted this spring it was also the subject of a Russian hack, in which thieves grabbed 100,000 tax returns and requested 15,000 fraudulent refunds. Officials have figured out that the hackers used names and Social Security data to pretend to be the taxpayers and break through weak IRS cyber-barriers. As Wisconsin Senator Ron Johnson has noted, the Health and Human Services Department and Social Security Administration use the same weak security wall to guard ObamaCare files and retirement information. Yet the Administration is hardly rushing to fix the problem.

Way back in March 2014, OPM knew that Chinese hackers had accessed its system without having downloaded files. So the agency was on notice as a target. It nonetheless failed to stop the two subsequent successful breaches. If this were a private federal contractor that had lost sensitive data, the Justice Department might be contemplating indictments.

Yet OPM director Katherine Archuleta and chief information officer Donna Seymour are still on the job. Mr. Obama has defended Ms. Archuleta, and the Administration is trying to change the subject by faulting Congress for not passing a cybersecurity bill. But that legislation concerns information sharing between business and government. It has nothing to do with OPM and the Administration’s failure to protect itself from cyber attack.

Ms. Archuleta appears before Congress this week, and she ought to remain seated until she explains the extent of this breach. While Russia and Islamic State are advancing abroad, the Obama Administration may have allowed a cyber 9/11 at home.