1.0 Million Green Cards to be Issues by DHS

1M Immigrants From Muslim Countries Admitted During Obama’s Presidency

The Obama Administration is on track to issue 1 million green cards to immigrants from countries where Muslims are in the majority, according to an analysis of Department of Homeland Security data released Friday.

According to the DHS Yearbook of Immigration Statistics, green cards were issued to 832,014 people from Muslim-majority countries in the first six fiscal years of the Obama administration, from fiscal years 2009-2014, the Senate Subcommittee on Immigration and the National Interest report shows.

In addition, the numbers of green cards increased dramatically in the last two fiscal years of the report, for 2013 and 2014. The records show that 117,423 green cards were issued in fiscal year 2013, compared to 148,810 in fiscal year 2014, for an increase of nearly 27 percent.

The reports show that in the first six fiscal years President Barack has held office, the United States issued green cards to an average of 138,669 migrants from Muslim-majority countries every year, and if the trends continue, the United States will have issued green cards to at least 1.1 million migrants from such countries by the time Obama leaves office in January.  Read more here from NewsMax.

 

The vetting for migrants and refugees is performed by the UN High Commission for Refugees. The UNHCR operates in panic mode, simply rubber-stamping approval due to volume. So, let’s make a movie.

Stars ask you to stand #WithRefugees

More than 60 stars of film, TV and music have joined refugees, faith leaders and UNHCR to back a petition highlighting the plight of forcibly displaced people.

 

GENEVA, June 16 (UNHCR) – More than 60 stars from the worlds of film, TV and music joined refugees, faith leaders and UN Refugee Agency staff today to urge you to stand #WithRefugees and sign a petition on behalf of the world’s forcibly displaced.

The petition aims to gather public support for the growing number of families forced to flee conflict and persecution worldwide, who currently face heightened anti-refugee rhetoric coupled with greater restrictions to asylum.

It calls on governments to ensure every refugee child gets an education; that every refugee family has somewhere safe to live, and can work or learn skills to make a positive contribution to their community.

Despite the fact that the FBI and CIA director have said that Syrian refugees cannot be screened properly, Barack Obama has put the program to resettle Syrian refugees in the country on the fast track.

The AP reported that so far only about 1,000 Syrian families have been brought to the US but that was because the process took 18 to 24 months.  The US now has a speeded up “surge operation” in place.

“The 10,000 (figure) is a floor and not a ceiling, and it is possible to increase the number,” Kassem told reporters. High-risk groups are given priority to include unaccompanied minor, victims of torture and gender-based violence. The UNHCR insists that the US resettle 65,000 Syrian refugees. 

In part from FNC: The danger posed by people coming from terrorism-infested regions has been a hotly contested issue, as is the potentially outsized impact on the small American communities often called upon to receive them. What does not appear in doubt is the hefty price tag, which is projected to total some $644 million over those refugees’ first five years in the United States.

Unlike other classes of immigrants, refugees are immediately eligible for a full range of welfare benefits.

The figure comes from an analysis performed by the Center for Immigration Studies, which looked at processing and administrative costs of the federal agencies, money for assistance provided to refugees directly or through federally funded nonprofit organizations and consumption of government-assistance programs. Unlike other classes of immigrants, refugees are immediately eligible for a full range of welfare benefits.

Camarota, director of research for the Washington-based think tank, estimated costs of the federal welfare programs by examining five-year usage rates contained in a report by the Office of Refugee Resettlement. The most recent figures, show usage rates for welfare programs by refugees from the Middle East that are even higher for most programs than when Camarota first wrote the report.

Refugees from the Middle East use those programs at rates that far exceed participation by refugees from any other region. In five of seven programs, the percentage of Middle Eastern refugees participating are higher than those of refugees from Africa, the region with the next-highest usage rates. In some cases, the rates are substantially higher. Nearly nine in 10 were on food stamps, for instance, compared with 80 percent of African refugees.

“The Middle East really stands out,” said Camarota, who speculated that the disparity might be due to deficiencies in eduction, English proficiency or job skills. “There’s something special about Middle Easterners in the cost of these programs.”

The Office of Refugee Resettlement Report, however, indicates that Middle Easterners arrived with better English skills and more education than those from other parts of the world.

If the latest participation figures hold up for the Syrians admitted between Oct. 1 last year and Sept. 30 this year, Camarota’s five-year cost projection — $64,370 per person and $257,481 per household — may be low-ball estimates.

Ira Mehlman, a spokesman for the Federation of American Immigration Reform, said it would be more cost-effective for the United States to provide financial assistance to Jordan and Turkey, which are housing the bulk of refugees who fled war-torn Syria. Those refugees also would have an easier time returning home after the fighting ends.

“In terms of helping people, you get far more for your money helping people close to where they live,” he said. Read more details here.

 

 

This is the End of Integrity for the VA

Curious, but factual, it comes down to protecting the unions at the VA. Some locations operate with four unions, while the larger VA facilities have five unions, the worst being SEIU.

This is the reason, the Department of Justice is protecting legal actions at the VA and wont allow the FBI to do deeper investigations for fraud, waste and corruption. Need more proof?

Top VA benefits official Pummill retires

636016843173538200-AP-16168610141426.jpg

AirForceTimes: Danny Pummill, who took over the post last October, said in a letter to VBA employees that he had planned to retire from his deputy post in 2015 but remained on the job after being asked to oversee the agency. The retired Army colonel has worked at VA since 2010.

The job of overseeing $90 billion in veterans benefits and dozens of regional offices nationwide now falls to acting principal deputy undersecretary Tom Murphy, who has been serving in that role since Pummill’s promotion last fall.

Pummill was suspended for two weeks in March for “lack of oversight” in a relocation scandal involving two other high-ranking VA administrators, a reprimand that irritated some lawmakers who wanted harsher punishment for what appeared to be unwarranted promotions for longtime bureaucrats. Read full summary here.

 

VA won’t use its fast-track firing powers anymore

MilitaryTimes: Veterans Affairs officials will stop using streamlined disciplinary powers to punish senior department executives after another legal challenge to the congressionally backed process, Capitol Hill officials said Friday.

The move all but resets VA accountability rules to two years ago, when the expedited removal authority was approved by lawmakers in the wake of the department’s wait times scandal.

It also provides new urgency for a series of VA-related accountability bills stalled in Congress, given elected officials’ belief that department leaders have not been aggressive enough in dealing with misbehavior and possible criminal activity among VA employees.

Senate Veterans’ Affairs Committee Chairman Johnny Isakson, R-Ga., called the department’s decision infuriating.

“It is outrageous and unconscionable that the VA is choosing to blatantly ignore all of the accountability reforms set in place by the Veterans Choice Act,” he said. “Two years ago, veterans were forced to wait far too long for care because of incompetent executives. Since then, we’ve seen scandal after scandal emerge at the department.

“While some progress has been made to hold bad actors accountable, there is still a long way to go and choosing to ignore these key reforms is a slap in the face to our veterans.”

VA leaders have long complained about the value of the new disciplinary powers, noting that as written they apply only to a small segment of department employees — senior executives — and create problematic legal questions about appeals.

Only a few individuals have been disciplined under the rules, and the Merit Systems Protection Board has overturned proposed punishment in several other cases.

Earlier this month, U.S. Attorney General Loretta Lynch said the new law speeding up executive firings is unconstitutional because it does not afford those workers proper appeals. The VA decision to dump the entire accountability process passed in 2014 comes as a direct result of that Justice Department stance.

Isakson said the announcement should be seen as a call for Congress to act quickly on new legislation.

“I am not going to stand by and watch the VA continue to look the other way while another one of its own gets away with egregious misconduct at the expense of veterans’ access to quality care and services,” he said.

Earlier this year Isakson introduced a sweeping veterans reform measure which includes new disciplinary rules, including a provision to requiring all appeals by executives to be heard by the VA secretary, and not an outside arbiter.

It would also grant other expedited firing and hiring authorities for more VA employees, and shorten the appeals process for every VA worker.

VA leaders have voiced support for the bill. Federal union officials have have objected to the provisions as too harsh, while congressional critics have labeled the plan too lenient. Isakson had hoped to move the measure through his chamber last month, but the legislation has remained stalled.

House lawmakers last summer passed a new VA accountability act along party lines, with revised whistleblower protections and different appeals provisions. That legislation has yet to move in the Senate.

VA leaders have repeatedly stated that they take disciplinary issues seriously, but also don’t see demotions and dismissals as the only way to improve service throughout the department.

Earlier this year, VA Secretary Bob McDonald told lawmakers that more than 2,600 department employees have been dismissed since he assumed office in August 2014, but lawmakers have questioned whether that figure shows an increase in accountability or normal turnover for the 300,000-plus-person bureaucracy.

States Complying with DOJ/FBI Facial Recognition Database

 

 

GAO: The Department of Justice’s (DOJ) Federal Bureau of Investigation (FBI) operates the Next Generation Identification-Interstate Photo System (NGI-IPS)— a face recognition service that allows law enforcement agencies to search a database of over 30 million photos to support criminal investigations. NGI-IPS users include the FBI and selected state and local law enforcement agencies, which can submit search requests to help identify an unknown person using, for example, a photo from a surveillance camera. When a state or local agency submits such a photo, NGI-IPS uses an automated process to return a list of 2 to 50 possible candidate photos from the database, depending on the user’s specification. As of December 2015, the FBI has agreements with 7 states to search NGI-IPS, and is working with more states to grant access. In addition to the NGI-IPS, the FBI has an internal unit called Facial Analysis, Comparison and Evaluation (FACE) Services that provides face recognition capabilities, among other things, to support active FBI investigations. FACE Services not only has access to NGI-IPS, but can search or request to search databases owned by the Departments of State and Defense and 16 states, which use their own face recognition systems. Biometric analysts manually review photos before returning at most the top 1 or 2 photos as investigative leads to FBI agents.

DOJ developed a privacy impact assessment (PIA) of NGI-IPS in 2008, as required under the E-Government Act whenever agencies develop technologies that collect personal information. However, the FBI did not update the NGI-IPS PIA in a timely manner when the system underwent significant changes or publish a PIA for FACE Services before that unit began supporting FBI agents. DOJ ultimately approved PIAs for NGI-IPS and FACE Services in September and May 2015, respectively. The timely publishing of PIAs would provide the public with greater assurance that the FBI is evaluating risks to privacy when implementing systems. Similarly, NGI-IPS has been in place since 2011, but DOJ did not publish a System of Records Notice (SORN) that addresses the FBI’s use of face recognition capabilities, as required by law, until May 5, 2016, after completion of GAO’s review. The timely publishing of a SORN would improve the public’s understanding of how NGI uses and protects personal information.

Prior to deploying NGI-IPS, the FBI conducted limited testing to evaluate whether face recognition searches returned matches to persons in the database (the detection rate) within a candidate list of 50, but has not assessed how often errors occur. FBI officials stated that they do not know, and have not tested, the detection rate for candidate list sizes smaller than 50, which users sometimes request from the FBI. By conducting tests to verify that NGI-IPS is accurate for all allowable candidate list sizes, the FBI would have more reasonable assurance that NGI-IPS provides leads that help enhance, rather than hinder, criminal investigations. Additionally, the FBI has not taken steps to determine whether the face recognition systems used by external partners, such as states and federal agencies, are sufficiently accurate for use by FACE Services to support FBI investigations. By taking such steps, the FBI could better ensure the data received from external partners is sufficiently accurate and do not unnecessarily include photos of innocent people as investigative leads.

*** The Privacy Act of 1974 places limitations on agencies’ collection, disclosure, and use of personal information maintained in systems of records.3 The Privacy Act requires agencies to publish a notice—known as a System of Records Notice (SORN)—in the Federal Register identifying, among other things, the categories of individuals whose information is in the system of records, and the type of data collected.4 Also, the E-Government Act of 2002 requires agencies to conduct Privacy Impact Assessments (PIA) that analyze how personal information is collected, stored, shared, and managed in a federal system.5 Agencies are required to make their PIAs publicly available if practicable.  See the entire report here from the General Accounting Office.

 

How Terrorists use Encryption

 

How Terrorists Use Encryption

June 16, 2016

CTC: Abstract: As powerful encryption increasingly becomes embedded in electronic devices and online messaging apps, Islamist terrorists are exploiting the technology to communicate securely and store information. Legislative efforts to help law enforcement agencies wrestle with the phenomenon of “going dark” will never lead to a return to the status quo ante, however. With the code underlying end-to-end encryption now widely available, unbreakable encryption is here to stay. However, the picture is not wholly bleak. While end-to-end encryption itself often cannot be broken, intelligence agencies have been able to hack the software on the ends and take advantage of users’ mistakes.

Counterterrorism officials have grown increasingly concerned about terrorist groups using encryption in order to communicate securely. As encryption increasingly becomes a part of electronic devices and online messaging apps, a range of criminal actors including Islamist terrorists are exploiting the technology to communicate and store information, thus avoiding detection and incrimination, a phenomenon law enforcement officials refer to as “going dark.”

Despite a vociferous public debate on both sides of the Atlantic that has pitted government agencies against tech companies, civil liberties advocates, and even senior figures in the national security establishment who have argued that creation of “backdoors”[1] for law enforcement agencies to retrieve communications would do more harm than good, there remains widespread confusion about how encryption actually works.[a]

Technologists have long understood that regulatory measures stand little chance of rolling back the tide. Besides software being written in other countries (and beyond local laws), what has not been fully understood in the public debate is that the “source code” itself behind end-to-end encryption is now widely available online, which means that short of shutting down the internet, there is nothing that can be done to stop individuals, including terrorists, from creating and customizing their own encryption software.

The first part of this article provides a primer on the various forms of encryption, including end-to-end encryption, full device encryption, anonymization, and various secure communication (operational security or opsec) methods that are used on top of or instead of encryption. Part two then looks at some examples of how terrorist actors are using these methods.

Part 1: Encryption 101 

End-to-End Encryption
A cell phone already uses encryption to talk to the nearest cell tower. This is because hackers could otherwise eavesdrop on radio waves to listen in on phone calls. However, after the cell tower, phone calls are not encrypted as they traverse copper wires and fiber optic cables. It is considered too hard for nefarious actors to dig up these cables and tap into them.

In a similar manner, older chat apps only encrypted messages as far as the servers, using what is known as SSL.[b] That was to defeat hackers who would be able to eavesdrop on internet traffic to the servers going over the Wi-Fi at public places. But once the messages reached the servers, they were stored in an unencrypted format because at that point they were considered “safe” from hackers. Law enforcement could still obtain the messages with a court order.

Newer chat apps, instead of encrypting the messages only as far as the server, encrypt the message all the way to the other end, to the recipient’s phone. Only the recipients, with a private key, are able to decrypt the message. Service providers can still provide the “metadata” to police (who sent messages to whom), but they no longer have access to the content of the messages.

The online messaging app Telegram was one of the earliest systems to support end-to-end encryption, and terrorists groups such as the Islamic State took advantage.[2] These days, the feature has been added to most messaging apps, such as Signal, Wickr, and even Apple’s own iMessage. Recently, Facebook’s WhatsApp[3] and Google[4] announced they will be supporting Signal’s end-to-end encryption protocol.

On personal computers, the software known as PGP,[c] first created in the mid-1990s, reigns supreme for end-to-end encryption. It converts a message (or even entire files) into encrypted text that can be copy/pasted anywhere, such as email messages, Facebook posts, or forum posts. There is no difference between “military grade encryption” and the “consumer encryption” that is seen in PGP. That means individuals can post these encrypted messages publicly and even the NSA is unable to access them. There is a misconception that intelligence agencies like the NSA are able to crack any encryption. This is not true. Most encryption that is done correctly cannot be overcome unless the user makes a mistake.

Such end-to-end encryption relies upon something called public-key cryptography. Two mathematically related keys are created, such that a message encrypted by one key can only be decrypted by the other. This allows one key to be made public so that one’s interlocutor can use it to encrypt messages that the intended recipient can decrypt through the private-key.[d] Al-Qa`ida’s Inspire magazine, for example, publishes its public-key[5] so that anyone using PGP can use it to encrypt a message that only the publishers of the magazine can read.

Full Device Encryption
If an individual loses his iPhone, for example, his data should be safe from criminals.[e] Only governments are likely to have the resources to crack the phone by finding some strange vulnerability. The FBI reportedly paid a private contractor close to $1 million to unlock the iPhone of San Bernardino terrorist Syed Rizwan Farook.[6]

The reason an iPhone is secure from criminals is because of full device encryption, also full disk encryption. Not only is all of the data encrypted, it is done in a way that is combined or entangled[7] with the hardware. Thus, the police cannot clone the encrypted data, then crack it offline using supercomputers to “brute-force” guess all possible combinations of the passcode. Instead, they effectively have to ask the phone to decrypt itself, which it will do but slowly, defeating cracking.[f]

Android phones work in much the same manner. However, most manufacturers put less effort into securing their phones than Apple. Exceptions are companies like Blackphone, which explicitly took extra care to secure their devices.

Full disk encryption is also a feature of personal computers. Microsoft Windows comes with BitLocker, Macintosh comes with FileVault, and Linux comes with LUKS. The well-known disk encryption software TrueCrypt works with all three operating systems as does a variation of PGP called PGPdisk. Some computers come with a chip called a TPM[g] that can protect the password from cracking, but most owners do not use a TPM. This means that unless they use long/complex passwords, adversaries will be able to crack their passwords.

Disgusting: Democrats Walk During Moment of Silence

 

6 victims remain in intensive care.

Democrats shout down Paul Ryan after Orlando shooting moment of silence

CBS: Shouting erupted Monday evening on the House floor after a moment of silence for the victims of the Orlando massacre as Democrats demanded that the House consider gun control legislation.

After the brief moment of silence that Speaker Paul Ryan, R-Wisconsin, called for, Democrats began shouting from one side of the chamber, interrupting Ryan. Ryan’s office only tweeted out a clip of the moment of silence, but not the shouting that followed.

The House just observed a moment of silence in memory of those killed in the terrorist attack in #Orlando.https://t.co/MqS94hk68V

— Paul Ryan (@SpeakerRyan) June 13, 2016

“Where’s the bill?” Democrats shouted, referring to gun control legislation.

Amid the shouting, Assistant Democratic Leader Jim Clyburn, D-South Carolina, tried to seek recognition.

“I am really concerned that we have just today had a moment of silence and later this week the 17th…,” Clyburn said, as he was interrupted by Ryan who then asked if he was a posing a parliamentary inquiry.

“Yes, Mr. Speaker,” Clyburn said. “I am particularly interested about three pieces of legislation that have been filed in response to Charleston.”

Clyburn was referring to the anniversary this Saturday of the Charleston shooting massacre that left nine parishioners dead in a South Carolina church last year. One of the bills Democrats want the House to consider would close the “Charleston loophole, which is how the shooter in Charleston obtained a gun. The FBI performs background checks on gun buyers on South Carolina and if the check isn’t denied or completed in three days, the gun seller can sell the guy to the prospective buyer. The other pieces of legislation would prevent people who are on the FBI’s no-fly list from purchasing guns and one would ban anyone convicted of a hate crime from buying firearms, according to a leadership aide.

Ryan, however, ignored Clyburn and called for the House to continue voting. According to the speaker’s office, Clyburn was out of order under House rules and was not making a proper motion or inquiry.

“It’s shameful that anyone would try to use a moment of silence honoring victims of a brutal terrorist attack to advance their own political agenda,” Ryan spokeswoman AshLee Strong said.

We just observed a moment of silence for the #Orlando victims. Then @SpeakerRyan refused to act to keep guns out of the hands of terrorists.

— Rep. Ted Deutch (@RepTedDeutch) June 13, 2016

Some Democrats said that they didn’t want to participate in the moment of silence at all.

Why I’m refusing the moment of silence. #NoMoreSilence Read: https://t.co/pSKUie0jVkpic.twitter.com/NTnFEokK3r

— Katherine Clark (@RepKClark) June 13, 2016

The victims of #Orlando deserve more than a moment of silence from Congress. They deserve moments of courage & action. #WheresTheBill

— Rep. Eric Swalwell (@RepSwalwell) June 13, 2016

Jim HimesVerified account @jahimes Jun 12

I will not attend one more”Moment of Silence” on the Floor. Our silence does not honor the victims, it mocks them.

Seth MoultonVerified account @sethmoulton 14h14 hours ago

So I’m joining in not attending any more House “Moments of Silence” for mass shooting victims. Walked out of my first one tonight.

***** Tuesday, Obama holds a large national security council meeting to discuss terror attacks.

Taking part in the NSC meeting now underway at per WH:

 
#RedNationRising