Hey SEALS, Turnover your Weapons

Twisted priorities at the Pentagon, mandated by the White House and congressional budgets, then couple that with waste, fraud and abuse, ladies and gentlemen, our problems are much worse than can be defined.

Just WHOA…

SOCOM investigating Navy SEAL weapons shortages

STRIPES: WASHINGTON — The general in charge of U.S. Special Operations Command said Tuesday that he is looking into claims that Navy SEALs and other elite forces have shortages of key equipment.

Gen. Joseph Votel assured House lawmakers that the command will resolve any problems that it discovers in equipping special operators, such as a lack of service weapons, in preparation for increasingly common missions around the world.

Rep. Duncan Hunter, R-Calif., and other House lawmakers raised the alarm earlier this month on supply shortages in the special operations community, causing soldiers to dip increasingly into their own pockets to purchase basic military gear such as helmets, global positioning devices and medical supplies.

Most concerning, according to Hunter, is SEALs are now asked to hand over their personalized weapons after returning from deployment so they can be handed off to other SEALs who are deploying.

“I look forward to talking to Navy Special Warfare Command about this specific issue and make sure we understand it,” said Votel, who was testifying to members of the House Armed Services Committee. “If there is something that we are contributing to that is impacting the readiness of our operators, we’ll certainly take immediate actions to kind of correct that.”

Votel said the issue might be related to maintenance and the high usage of SEAL weapons.

“These guys do put a lot of rounds through the weapons,” he said. “What we do try to do is ensure with that many rounds going through our weapons that they do have the right level of depot maintenance when they do come back from deployments or long training periods.”

Hunter, who wrote a letter in February to the Navy Special Warfare Command about the concerns, brushed aside the general’s suggestion.

“This is not a factor of too many rounds going through the weapon barrel, and then you just change out the barrel anyway,” Hunter said.

He said the weapons are the most important pieces of equipment for the SEALs. They put time into calibrating their weapons and applying optics and lasers, then are forced to turn them over for reconfiguration.

“I’ve had multiple SEALs at multiple times over the last six months come to me in San Diego … and tell me how things have changed dramatically from five or six years ago, meaning they don’t get weapons now to work up with for two years,” Hunter said. “They get their weapon when a guy comes back and hands over the weapon.”

The military has increased its reliance greatly on special operations forces since 9/11. As such operations hit a high mark, other reports of supply shortages have come up as well.

Last month, the nonprofit group Troops Direct reported the Marine Corps Fleet Anti-Terrorism Security Team deployed to Benghazi, Libya after the embassy attack there and lacked crucial equipment including sniper supplies and batteries.

Meanwhile, troops often have to buy their own medical equipment such as tourniquets, and shell out about $1,000 each for their own helmets or $500 for GPS devices, according to the group.

The shortfalls in SEAL weapons have surfaced, as the Navy Special Warfare Command budget increased by $11 million during the past couple of years, according to Hunter.

Rep. Richard Nugent, R-Fla., a member of the House Armed Services Committee, said he could not understand why the Navy would rotate SEALs’ service weapons and that he wanted answers.

“That’s the [weapon] you sleep with, the one you work with, so I will be interested to hear from Rep. Hunter the answer you come back with,” Nugent told Votel.

****

Lacking basic gear, special operators stuck buying their own equipment

STRIPES: WASHINGTON – Sean Matson, who recently left active-duty as a Navy SEAL, said the military measured his head four times – each time before deployment – with plans to provide him a more advanced ballistic helmet.

But the new helmet never materialized. During a deployment in Africa, Matson and six of his fellow SEALs each shelled out about $900 for updated helmets that held the lights, communications devices and batteries needed for their missions.

“There was never a clear solution to it, so guys were going out spending $800-$900 on their own ballistic helmet,” said Matson, who is now CEO of the military supply company Matbock.

Elite troops such as the SEALs are more and more forced to dip into their own pockets to purchase basic military gear such as helmets, global positioning devices and medical supplies, according to Matson and others involved in the military’s unofficial civilian-side supply network who came to Capitol Hill on Thursday.

House lawmakers have taken notice and said they will request an explanation from Defense Secretary Ash Carter.

“These are the guys we assume have the best gear all the time,” said Rep. Duncan Hunter, R-Calif., a Marine Corps combat veteran.

Hunter said special operations troops have been approaching him in his California district complaining about the inability to get needed materials and he has been investigating the issue.

Numerous individual instances point to a systemic problem in the military’s supply chain but a blind spot exists between Defense Department vendors and the troops who need the gear and supplies, Hunter said.

“It’s been impossible for me to find out how the money is getting stopped and why it is not going down to where it’s supposed to be,” he said.

Aaron Negherbon is the executive director of the nonprofit group Troops Direct, which ships needed and requested supplies – from boot laces to tablet devices — to servicemembers who cannot get it through their commands.

Less than two days after the attack on the U.S. embassy in Benghazi, Libya, Negherbon said he was contacted by the commander of a Marine Corps Fleet Anti-Terrorism Security Team that was being deployed there.

The commander told him the team lacked a variety of crucial equipment, including sniper supplies, he said.

“They came to us for…batteries because they didn’t have any of those … It is kind of like, ‘What the heck is going on?’” Negherbon said.

He said troops often have to buy their own medical equipment such as tourniquets, and shell out about $1,000 each for their own helmets or $500 for a GPS device that they need for duty during a deployment.

“The question is, why can’t you get this?” Negherbon said.

Often the answer seems to be a higher command does not have the money budgeted or the equipment was approved but not available from vendors.

“That is a good thing, we know where the problem is but [those issues] are very profound,” he said.

A small group of House Republican lawmakers gathered Thursday to hear the concerns.

Rep. Adam Kinzinger, R-Ill., an Air Force combat veteran, said the military has to weigh the concerns of supplying needed equipment with the desire of troops to always have the newest gear on the market.

Still, Kinzinger said the shortfalls in the supply chain could become a major issue if deployments ramp up again to the levels seen during the height of the Iraq and Afghanistan wars.

Rep. Chris Gibson, R-N.Y., an Army veteran, said the group should write a letter to Carter, saying they have serious concerns about supply breakdowns, including the inability of Matson and his fellow SEALs to get helmets capable of mounting lights, though the equipment was approved.

“If you’ve got a situation where unit is approved for an Ops-Core [brand ballistic] helmet and it’s not getting it, we need to understand what the problem is … that is unacceptable,” he said.

Hey Pentagon, Hiring Hackers, a Good Idea?

Personally I do see some positives, but I see more downsides….what say you?

The Department of Defense announced today that it will invite vetted hackers to test the department’s cybersecurity under a unique pilot program.  The “Hack the Pentagon” initiative is the first cyber bug bounty program in the history of the federal government.

 

Under the pilot program, the department will use commercial sector crowdsourcing to allow qualified participants to conduct vulnerability identification and analysis on the department’s public webpages.  The bug bounty program is modeled after similar competitions conducted by some of the nation’s biggest companies to improve the security and delivery of networks, products, and digital services. The pilot marks the first in a series of programs designed to test and find vulnerabilities in the department’s applications, websites, and networks.

 

Participants in the bug bounty will be required to register and submit to a background check prior to any involvement with the pilot program.  Once vetted, these hackers will participate in a controlled, limited duration program that will allow them to identify vulnerabilities on a predetermined department system.  Other networks, including the department’s critical, mission-facing systems will not be part of the bug bounty pilot program.  Participants in the competition could be eligible for monetary awards and other recognition.

This innovative project is a demonstration of Secretary Carter’s continued commitment to drive the Pentagon to identify new ways to improve the department’s security measures as our interests in cyberspace evolve.

Pentagon to Establish Defense Innovation Advisory Board

WASHINGTON, March 2, 2016 — In an effort to enhance the Defense Department’s culture, organization and processes by tapping innovators from the private sector in Silicon Valley and beyond, Defense Secretary Ash Carter announced plans today to establish a Defense Innovation Advisory Board, Pentagon Press Secretary Peter Cook said.

 Google, CEO

The initiative represents the secretary’s enduring commitment to building lasting partnerships between the public and private sectors, Cook said in a statement.

“Just as the Defense Business Board provides advice to the department on best business practices from the private sector, the Defense Innovation Advisory Board will provide advice on the best and latest practices in innovation that the department can emulate,” Cook added.

The board’s mandate is to provide department leaders independent advice on innovative and adaptive means to address future organizational and cultural challenges, the press secretary said, including the use of technology alternatives, streamlined project management processes and approaches — all with the goal of identifying quick solutions to DoD problems.

Areas Deeply Familiar in Silicon Valley

The board will seek to advise the department on areas that are deeply familiar to Silicon Valley companies, such as rapid prototyping, iterative product development, complex data analysis in business decision making, the use of mobile and cloud applications, and organizational information sharing, Cook said, and will not engage in discussion of military operations or strategy.

Alphabet Executive Chairman Eric Schmidt will chair the board, which will be composed of up to 12 people who have successfully led large private and public organizations and excelled at identifying and adopting new technology concepts, Cook said.

Carter and Schmidt will jointly select the board, Cook said. “Members will represent a cross-section of America’s most innovative industries, drawing on technical and management expertise from Silicon Valley and beyond,” he added.

As chairman of Alphabet and as the author of “How Google Works,” Schmidt has a unique perspective on the latest practices in harnessing and encouraging innovation and in the importance of technology in driving organizational behavior and business operations, Cook said.

**** Background

US spy chief James Clapper highlights cyber threats

BBC: US intelligence agencies have placed cyber attacks from foreign governments and criminals at the top of their list of threats to the country.

Online assaults would increasingly undermine US economic competitiveness and national security, said Director of National Intelligence James Clapper.

A report issued by his office said Russia’s military was setting up a cyber command to carry out attacks.

The report also describes China, Iran and North Korea as leading threats.

In testimony to a congressional committee on Thursday, Mr Clapper said he no longer believed the US faced “cyber Armageddon”.

The idea that major infrastructure such as financial networks or power grids could be disabled by hackers now looked less probable, he said.

However he warned: “We foresee an ongoing series of low-to-moderate level cyber attacks from a variety of sources over time, which will impose cumulative costs on US economic competitiveness and national security.”

Mr Clapper highlighted the case of Russia, which he said posed the greatest a cyber risk to US interests. He said that threat from the Russian government was “more severe” than previously realised.

He also said profit-minded criminals and ideologically driven hackers were also increasingly active.

Over the past year there have been a series of high-profile cyber attacks against US targets.

North Korea was accused of being behind the theft of a huge data cache from Sony Pictures in November.

Mr Clapper also mentioned the example of an alleged Iranian attack on the Las Vegas Sands Casino Corporation last year.

Meanwhile in January the Twitter and YouTube accounts of the US military command were hacked by a group claiming to back Islamic State (IS).

During the hearing, Mr Clapper acknowledged that the US had its own “offensive capabilities”.

In 2010 Iran experienced a cyber attack on its nuclear program. Tehran accused Israel and the US of planting malware.

The Court Telling Texas NO on Barring Refugees

Federal Court Declines to Bar the Resettlement of

Syrian Refugees in Texas

02/26/2016

FAS: In a decision issued on February 8, 2016, a federal district court denied the State of Texas’s request that the federal

government and a private refugee relief organization be temporarily barred from resettling Syrian refugees within the

state pending resolution of Texas’s challenge to such resettlement. Texas had filed this suit in December 2015, after

terrorist attacks in Paris, France and San Bernardino, California, perpetrated by persons with ties or allegiance to the

Islamic State, due to concerns that terrorists could enter the United States through the refugee resettlement program.

The court’s decision focused on the standards that plaintiffs must meet to obtain a preliminary injunction, discussed

below. However, in so doing, the court construed language in Section 412 of the Immigration and Nationality Act

(INA) requiring the federal government to “consult regularly … with State and local governments” about refugee

placement. The court’s reading of this provision could have implications for certain congressional proposals to give

states greater control over refugee resettlement.

Overview of the Court’s Decision

The court denied the preliminary injunction, in part, because it found that Texas had failed to establish a substantial

threat of irreparable injury if the federal government and the private refugee relief organization were allowed to resettle

Syrian refugees in Texas. Such a showing is required for a preliminary injunction, along with a showing that (A) the

party seeking the injunction has a substantial likelihood of success on the merits; (B) the alleged injury, if the injunction

is denied, outweighs any harm that would result if the injunction is granted; and (C) the grant of an injunction will not

disserve the public interest.

In finding that Texas failed to meet its burden of showing irreparable injury, the court noted that the evidence produced

by Texas showed only that “Syrian refugees pose some risk.” Texas did not, in the court’s view, demonstrate that

terrorists have infiltrated the refugee program, or that the particular individuals whose settlement Texas sought to block

are refugees “intent on causing harm.” It thus found the evidence “insufficient” to establish a substantial risk of

irreparable injury. The court similarly rejected Texas’s argument that it was irreparably harmed because the defendants’

failure to provide Texas with detailed information about any refugees settled in Texas deprived Texas of an alleged

statutory right to foreknowledge” of refugees’ backgrounds that had been created by INA §412’s requirement that

federal agencies consult with state and local governments about refugee placement. The court further found that a

clause in Texas’s contract with the relief organization, which purported to establish a presumption of irreparable harm

if the organization were to breach the contract was immaterial, since the clause is not binding on the court and does not,

in itself, justify the “extraordinary relief” of a preliminary injunction.

The court also found that Texas was unlikely to succeed on the merits of its challenge to the refugee resettlement plans

because “it has no viable cause of action” against the federal government. Texas’s argument here had been based, in

part, on its view that the federal government’s actions in resettling refugees in Texas run afoul of INA § 412, which, in

relevant part, provides that federal officials:

shall consult regularly (not less often than quarterly) with State and local government and private nonprofit

voluntary agencies concerning the [refugee] sponsorship process and the intended distribution of refugees among

the States and localities before their placement in those States and localities.

In particular, Texas took the view that this provision, along with the terms of its contract with private relief

organization, required it to receive detailed demographic, medical, security, and other information about individual

refugees before they are resettled in Texas.

The court did not reach the merits of this argument, instead finding that Texas cannot sue to enforce INA § 412 because

this provision does not create a private right of action. The court based this conclusion on Supreme Court precedents

finding that private rights of action to enforce federal law must be created by Congress, and the “judicial task is to

interpret the statute Congress passed to determine whether it displays an intent to create” such a right. In INA § 412,

the court found no such intent since the provisions of this section do not “confer any rights directly on the States.”

Instead, they are framed as a “general … command to a federal agency” to federal officials to consult with their state

counterparts. Such general prohibitions or commands have been seen as insufficient to create private rights of action in

other cases.

Implications of the Court’s Decision

The court’s finding that INA § 412 does not create a private right of action could have implications for certain proposals

in the 114th Congress to give states and localities greater input in the refugee resettlement process. Many proposed bills

would expressly authorize state officials to decline the resettlement of particular refugees within their jurisdictions, a

power which they lack under current law, as discussed in an earlier Sidebar posting. However, some bills take a

different approach and instead require that the federal government give state and local officials certain notices before

placing refugees within their jurisdiction. If Congress wants to ensure that states and localities can enforce such notice

requirements, it may wish to draft the latter type of measures in such a way that the statute can be seen as conferring

rights directly on the states and local governments, rather than imposing general commands on federal agencies. Only if

measures are so drafted would states and localities potentially be able to enforce the notice requirements (and even then

other limits on the federal courts’ jurisdiction could apply, such as the mootness doctrine, if for example, the refugees

are already settled within the state).

 

The Muslim Brotherhood, Then, Now and Hillary

Wonder if Hillary or Anne Patterson received and read the full Great Britain document on the investigation into the Muslim Brotherhood? The scrubbed UK investigation report is here.

Misguided diplomacy at the White House and the U.S. State department is mission objectives and investment over terror facts and names, of this there is no dispute.

 

Hillary Emails: State Discussed ‘Cooperating,’ ‘Increased Investment’ With Egypt’s Muslim Brotherhood Government

TEL AVIV – 1,500 pages of former Secretary of State Hillary Clinton’s emails provide insight into the level of support the U.S. was considering in 2012 for Egypt’s newly elected Muslim Brotherhood government.

Breitbart: On August 30, 2012, Robert D. Hormats, the under-secretary of state for economic affairs, wrote to Clinton’s then-Deputy Chief of Staff Jake Sullivan to update him on a meeting he held with .

Shater was later sentenced to life imprisonment and then to death for multiple alleged crimes, including inciting violence and financial improprieties.

The email reveals Hormats and other U.S. diplomats discussed  methods of cooperation with Shater, including an increase in American direct foreign investment.

Hormats wrote:

Anne Patterson, Bill Taylor, and I met with Muslim Brotherhood Deputy Supreme Guide Khairat al-Shater. He discussed broad principles of economic development based on 100 large infrastructure projects (over a billion dollars each) as part of Morsi’s Nadah (Renaissance Plan) Plan; ways of cooperating with the US to obtain support for these projects and for SMEs; and his hope for an IMF agreement and increased foreign direct investment from the US, the West, and the Arab world. He also noted that it was a priority for the GOE to build a true democratic system based on human rights and the rule of law.

Patterson, the U.S. Ambassador to Egypt at the time, was known for her repeated engagement with the Muslim Brotherhood. Taylor was the U.S. Special Coordinator for Middle East Transitions; that is, the U.S. envoy to the new leadership that emerged in the wake of the so-called Arab Spring.

Hormats’ meetings with the Muslim Brotherhood were not secret. But the emails reveal the scope of his discussions with the group about possible future investment.

In September 2012, the New York Timesreported that Hormats had led a delegation of businesses to Egypt to discuss possible private investment.

That same month, the State Department published a document that received little news media attention. It revealed that in August and September 2012, “Hormats visited Egypt to negotiate possible bilateral debt relief,”but the document did not provide further details.

After the toppling of Egypt’s longtime president Hosni Mubarak, the Muslim Brotherhood’s Muhammad Morsi served as president from June 30, 2012 to July 3, 2013, when he was removed from office amidst widespread protests and a military coup. After Mubarak was removed from office, the Obama administration pledged $1 billion in assistance to bolster Egypt’s transition to democracy.

Clinton and Secretary of Defense Leon Panetta each visited Cairo and met with Morsi during his tenure as president.

The meeting that Hormats describes in the email took place while the U.S. was negotiating an aid package to help relieve Egypt’s debt crisis amid concerns from U.S. lawmakers about funding the Muslim Brotherhood.

The email was sent a week and a half before protesters besieged the U.S. Embassy in Cairo on September 11, 2012, the same day the U.S. Special Mission in Benghazi came under attack.

Following the attacks, Obama stated of Morsi’s government, “I don’t think that we would consider them an ally, but we don’t consider them an enemy.”

***

Back in November of 2015, Senator Cruz was leading a charge in the Senate to list the Muslim Brotherhood as a terror organization. The Muslim Brotherhood is part of several proven terror organizations. Going back to 2014, Saudi Arabia joined the United Arab Emirates and Bahrain in withdrawing its ambassadors from Qatar, which it sees as an important supporter of the Muslim Brotherhood.

in 2014, Prime Minister David Cameron ordered an investigation into the Muslim Brotherhood as a terror organization and the results were conclusive they were, however due to internal pressure from Islamists all over Europe and especially the UK, Cameron pulled the report.

 

U.S. 133 Cyber Teams Under Construction

Is this a change and an approval by Obama from 2012? (Note this is only a defensive strategy)

Presidential Cyberwar Authority

 

In October 2012, President Obama signed the top-secret Presidential Policy Directive 20, which enabled the military to aggressively initiate and thwart cyber­attacks related our nation’s security. While most of the cyber attack targets are network systems or infrastructure-based, an elite Psychological Operations (PsyOps) team has focused its efforts on secretly defacing the public websites of our adversaries. Due to the high visibility and sensitive nature of this activity, only President Obama has the authority to target and launch these types of attacks.

The President authorizes these attacks using the global Cyber Warfare Command and Control System (CWCCS), which is accessible from this web page only from the President’s authorized computer.

****

 

WASHINGTON (AP) — Not long after Defense Secretary Ash Carter prodded his cyber commanders to be more aggressive in the fight against Islamic State, the U.S. ramped up its offensive cyberattacks on the militant group.

According to several U.S. officials, the attacks are targeting the group’s abilities to use social media and the Internet to recruit fighters and inspire followers, U.S. officials told The Associated Press.

U.S. officials confirmed that operations launched out of Fort Meade, Maryland, where the U.S. Cyber Command is based, have focused on disrupting the group’s online activities. The officials said the effort is getting underway as operators try a range of attacks to see what works and what doesn’t. They declined to discuss details, other than to say that the attacks include efforts to prevent the group from distributing propaganda, videos or other types of recruiting and messaging on social media sites such as Twitter, and across the Internet in general.

Other attacks could include attempts to stop insurgents from conducting financial or logistical transactions online.

The surge of computer-based military operations by U.S. Cyber Command began shortly after Carter met with commanders at Fort Meade last month.

Several U.S. officials spoke about the cyber campaign on condition of anonymity because they were not authorized to discuss it publicly. Much of the effort is classified.

Carter mentioned the operations briefly Thursday, telling a House Appropriations subcommittee only that Cyber Command is beginning to conduct operations against the Islamic State group. He declined to say more in a public setting.

The more aggressive attacks come after months of pressure from Carter, who has been frustrated with the belief that the Pentagon — and particularly Cyber Command — was losing the war in the cyber domain.

Late last year Carter told cyber commanders they had 30 days to bring him options for how the military could use its cyberwarfare capabilities against the group’s deadly insurgency across Iraq and Syria, and spreading to Libya and Afghanistan. Officials said he told commanders that beefing up cyberwarfare against the Islamic State group was a test for them, and that they should have both the capability and the will to wage the online war.

 

But the military cyber fight is limited by concerns within the intelligence agencies that blocking the group’s Internet access could hurt intelligence gathering.

Officials said Carter told commanders that he the U.S. to be able to impact Islamic State operations without diminishing the indications or warnings U.S. intelligence officers can glean about what the group is doing. On Jan. 27, Carter and Marine Gen. Joseph Dunford, chairman of the Joint Chiefs of Staff, went to Fort Meade for an update.

Officials familiar with Carter’s meetings said the secretary was frustrated that as Cyber Command has grown and developed over the past several years, it was still focused on the cyberthreats from nations, such as Iran, Russia and China, rather than building a force to block the communications and propaganda campaigns of Internet-savvy insurgents.

 

“He was right to say they could be more forward leaning about what they could possibly do against ISIS,” said James Lewis, a cybersecurity expert at the Center for Strategic and International Studies. “You could disrupt their support networks, their business networks, their propaganda and recruitment networks.” However, Lewis added, the U.S. needs to be careful about disrupting the Internet to insure that attacks don’t also affect civilian networks or systems needed for critical infrastructure and other public necessities. U.S. officials have long been stymied by militants’ ability to use the Internet as a vehicle for inspiring so-called lone wolf attackers in Western nations, radicalized after reading propaganda easily available online.

“Why should they be able to communicate? Why should they be using the Internet?” Carter said during testimony before the defense appropriations subcommittee. “The Internet shouldn’t be used for that purpose.” He added that the U.S. can conduct cyber operations under the legal authorities associated with the ongoing war against the Islamic State group. The U.S. has also struggled to defeat high-tech encryption techniques used by Islamic State and other groups to communicate. Experts have been working to find ways to defeat those programs.

Cyber Command is relatively new. Created in 2009, it did not begin operating until October 2010.

Early on, its key focus was on defending military networks, which are probed and attacked millions of times a day. But defense leaders also argued at length over the emerging issues surrounding cyberwarfare and how it should be incorporated.

 

The Pentagon is building 133 cyber teams by 2018, including 27 that are designed for combat and will work with regional commands to support warfighting operations. There will be 68 teams assigned to defend Defense Department networks and systems, 13 that would respond to major cyberattacks against the U.S. and 25 support teams.