Cruz: Obama ‘rolled over’ on hacking and Trump gets Advice

He is right and the proof most recently was in February of 2016, with the posted Executive Orders.

WASHINGTON — Through two executive orders signed Tuesday, President Obama put in place a structure to fortify the government’s defenses against cyber attacks and protect the personal information the government keeps about its citizens.

The orders came the same day as Obama sent to Congress a proposed 2017 budget that includes $19 billion for information technology upgrades and other cyber initiatives.

In September of 2015, Obama held a meeting on cyber with China’s Xi. Perhaps there was no formal sanction or punishment of China due in part to the U.S. debt they hold. Obama also held meetings with key Congressional leaders in 2015 on the issue of cyber. Going back to 2013, Obama held sessions with corporate CEO’s to discuss efforts to improve cybersecurity amid growing concerns within the administration over attacks from China targeting American businesses.

The president will discuss efforts to address the cyber threat facing the country and get the executives’ feedback on how the government and private sector can forge a relationship to improve cybersecurity in the United States, according to The White House. The meeting will be held in the Situation Room and attendees include AT&T CEO Randall Stephenson and Northrup Grumman CEO Wesley Bush.

Not until February of 2016, did Obama launch the Cybersecurity National Action Plan which was headed by Tom Donilon, his National Security Advisor and Sam Palmisano, former CEO of IBM. There was no traction and given the recent cyber intrusions, there is likely a LOT of ‘ooops’ coming from the White House and should. No corporation, bank, government agency or other private entity ever wants to publically announced they have been hacked or their vulnerability, as it only invites more cyber chaos but the United States including top government agencies and the White House along with the State Department have all been victim of both Russian and Chinese cyber attacks of various forms.

***

Sen. Ted Cruz says he hopes the incoming Trump administration is tougher on dealing with cyberattacks than the “weakness” he saw from President Obama on hacking by Russia and other foreign adversaries.

“One of the reasons these cyberattacks are so prevalent is that Barack Obama and his administration have rolled over for eight years,” Cruz said Thursday on “The Mike Gallagher Show.”

“They have shown nothing but weakness and appeasement in the face of those attacks. This is something I hope and believe will change with the new administration,” he said.

Cruz insisted neither Russian hacking nor WikiLeaks revelations last year about the Democratic Party significantly influenced Donald Trump’s victory in the presidential election.

“I think that there’s no evidence whatsoever that Russia’s efforts against us, which have been longstanding, did anything to affect the campaign,” said Cruz, who competed against Trump in last year’s GOP primaries.

“It’s, frankly, patently absurd,” Cruz added of claims Russia or WikiLeaks helped Trump win. “You can’t credibly argue that [WikiLeaks’] disclosures impacted the election because most voters never heard it.” More here from TheHill.

****

Task Force Issues Cybersecurity Advice to Donald Trump

‘From Awareness to Action: A Cybersecurity Agenda for the 45th President’

A task force co-chaired by two U.S. lawmakers and a former federal CIO is issuing a 34-page report recommending a cybersecurity agenda for the incoming Trump administration. The report recommends the new administration jettison outdated ways the federal government tackles cybersecurity, noting: “Once-powerful ideas have been transformed into clichés.”

The report from the CSIS Cyber Policy Task Force – From Awareness to Action: A Cybersecurity Agenda for the 45th President – will be formally unveiled on Jan. 5. It comes from the think tank Center for Strategic and International Studies, which sponsored the Commission on Cybersecurity for the 44th Presidency that made recommendations to then-President-elect Barack Obama in 2008.

“In the eight years since that report was published, there has been much activity, but despite an exponential increase in attention to cybersecurity, we are still at risk and there is much for the next administration to do,” the new report’s introduction states.

Cybersecurity Goals for Trump Administration

The task force outlined five major issues President-elect Donald Trump and his administration should address, including:

  1. Deciding on a new international strategy to account for a very different and dangerous global security environment.
  2. Making a greater effort to reduce and control cybercrime.
  3. Accelerating efforts to secure critical infrastructures and services and improving cyber hygiene across economic sectors. As part of this, the Trump administration must develop a new approach to securing government agencies and services and improve authentication of identity.
  4. Identifying where federal involvement in resource issues, such as research or workforce development, is necessary, and where such efforts are best left to the private sector.
  5. Considering how to organize the U.S. effort to defend cyberspace. Clarifying the role of the Department of Homeland Security is crucial, and the new administration must either strengthen DHS or create a new cybersecurity agency.

Ditching Outmoded Security Practices

Task force members recommend the new administration should get rid of outdated ways the federal government tackles cybersecurity. The report notes: “Statements about strengthening public-private partnerships, information sharing or innovation lead to policy dead ends. … Once-powerful ideas have been transformed into clichés. Others have become excuses for inaction.”

As an example, the task force cites the National Strategy for Trusted Identities in Cyberspace, a government initiative unveiled in 2011, which envisioned a cyber-ecosystem that promotes trust and security while performing sensitive transactions online. The task force contends NSTIC “achieved little,” asserting that such initiatives fail because they aren’t attuned to market forces. “There are few takers for a product or service for which there is no demand or for which there are commercial alternatives.”

The task force makes recommendations on dozens of policies and technologies.

On encryption, for instance, it suggests that the president develop a policy that supports the use of strong encryption for privacy and security while specifying the conditions and processes under which assistance from the private sector for lawful access to data can be required. It also states that the president should direct the National Institute of Standards and Technology to work with encryption experts, technology providers and internet service providers to develop standards and ways to protect applications and data in the cloud and provide secure methods for data resiliency and recovery.

“Ultimately,” the report says, “encryption policy requires a political decision on risk. Untrammeled use of encryption increases the risk from crime and terrorism, but societies may find this risk acceptable given the difficulty of imposing restrictions. No one in our groups believed that risk currently justifies restrictions.”

Battling Cybercrime

In battling cybercrime, the task force sees “active defense,” a term it says has become associated with vigilantism, hack back and cyber privateers, as only a stopgap measure to address the private sector’s frustration over the apparent impunity of trans-border criminals. The Trump administration should seek ways to help companies move beyond their traditional perimeter defenses and focus on identifying federal actions that could disrupt cybercriminals’ business model or expand the work of federal agencies and service providers against botnets, according to the report.

To make cybercrime less profitable, the task force recommends the new administration identify actions that would impede the monetization of stolen data and credentials. Other recommendations include accelerating the move to multifactor authentication and identifying better ways to counter and disrupt botnets, a growing risk as more devices become connected to the internet. The task force says this could be done by expanding the ability to obtain civil injunctions for use against botnets and raising the penalties for using botnets against critical infrastructure.

The role of the military to protect civilian critical infrastructure turned out to be among the most contentious issues the group debated. A few task force members said that the Defense Department should play an expanded and perhaps leading role in critical infrastructure protection, according to the report. Most members, though, believed that this mission must be assigned to a civilian agency, not to DoD or a law enforcement agency such as the FBI.

“While recognizing that the National Security Agency, an element of DoD, has unrivaled skills, we believe that the best approach is to strengthen DHS, not to make it a ‘mini-NSA,’ and to focus its mission on mitigation of threats and attacks, not on retaliation, intelligence collection or law enforcement,” the report states.

Organizing Government Cybersecurity

DHS is the focal point in cybersecurity protection among civilian agencies as well as civilian-led critical infrastructure. The task force recommends that an independent agency be established within DHS focused exclusively on cybersecurity.

The task force says Trump should quickly name a new cybersecurity coordinator and elevate the White House position two notches to assistant to the president from special assistant to the president. Also, the group says Trump should back away from his pledge to conduct a cybersecurity review, as was done at the beginning of the Obama administration.

The task force co-chairs are:

  • Rep. Michael McCaul, R-Texas, chairman of the House Homeland Security Committee and co-founder of the Congressional Cybersecurity Caucus;
  • Sen. Sheldon Whitehouse, D-R.I., sponsor of legislation to require federal law enforcement and national security agencies to account for cyberattacks;
  • Karen Evans, a cybersecurity adviser to the Trump transition team who’s national director of the U.S. Cyber Challenge and formerly served as White House administrator for e-government and information technology, a position now known as U.S. CIO; and
  • Sameer Bhalotra, co-founder and CEO of the cybersecurity startup Stackrox and a senior associate at CSIS.

CSIS Senior Vice President James Lewis, the think tank’s cybersecurity expert, served as the task force project director.

How bad is it?

USAToday:

Exhibit A: The Social Security Administration system still runs on a platform written in the 1960s in the COBOL programming language, and takes 400 people just to maintain, Obama said.

“If we’re going to really secure those in a serious way, then we need to upgrade them,” Obama told reporters Tuesday after meeting with advisers on the issue. “And that is something that we should all be able to agree on. This is not an ideological issue. It doesn’t matter whether there’s a Democratic President or a Republican President. If you’ve got broken, old systems — computers, mainframes, software that doesn’t work anymore — then you can keep on putting a bunch of patches on it, but it’s not going to make it safe.”

To implement those upgrades, Obama created two new entities Tuesday: The first, a Commission on Enhancing National Cybersecurity, will be made up of business, technology, national security and law enforcement leaders who will make recommendations to strengthen online security in the public and private sectors. It will deliver a report to the president by Dec. 1.

The second, a Federal Privacy Council, will bring together chief privacy officers from 25 federal agencies to coordinate efforts to protect the vast amounts of data the federal government collects and maintains about taxpayers and citizens.

Obama’s cybersecurity adviser, Michael Daniel, said the structure allows the administration to move forward even without additional authority from Congress by “driving our executive authority to the limit.”

The administration’s plan will look at cybersecurity both inside and outside the government. There will be more training and shared resources among government agencies, 48 dedicated teams to respond to attacks, and student loan forgiveness to help recruit top technical talent.

But the will plan also promote better security practices throughout the economy, by encouraging through multi-factor authentication that uses additional information in addition to a password. The government is also looking to reduce its use of Social Security numbers the unique identifier for all Americans.

Across the government, the Obama administration wants to spend $19 billion on cybersecurity in 2017, a 35% increase over 2016. But the plan does not rely on an increase in funding. “We can do quite a bit of it even without the additional resources,” Daniel said.

The White House said it also plans to create the new position of Chief Information Security Officer to coordinate modernization efforts across the government, including a a $3.1 billion Information Technology Modernization Fund. “That’s a key role that many private-sector companies have long implemented, and it’s a good practice for the federal government,” said Tony Scott, the U.S. Chief Information Officer.

The president is expected to meet with national security advisers Tuesday morning to launch the new effort.

Game on: Eric Holder Hired to Fight Trump

So, as California is officially a sanctuary state, you can bet there will be additional states collaborating and joining the fight like Illinois. The Left has been colluding for several weeks and here is but one decision that is part of the search and destroy mission of the new Trump administration.

Immigrants and illegals are a protected class and they along with a state legislature are mobilizing for a fight that affects Americans, America, the sovereignty and standing law.

Immigrants now have an official lobby operation as they get full representation by Eric Holder and his law firm. This is likely an operation that has passed through the offices of the White House.

One must wonder if DHS Secretary Jeh Johnson or Loretta Lynch from the DoJ will join this battle-plan as well….

California Democrats hire Eric Holder to fight Trump

LOS ANGELES— Democratic lawmakers in the California legislature have retained former US Attorney General Eric Holder to help in any legal battles with President-elect Donald Trump’s administration, The New York Times reported on Wednesday.

The move is an indication that lawmakers in the nation’s most populous state, where Democrats hold two-thirds majorities in both houses of the legislature, are girding for possible court battles after Trump takes office on January 20.

Last month, leaders of both houses introduced bills to protect immigrants living in the country illegally from anticipated efforts by a Trump administration to increase deportations. In addition, Democratic Gov. Jerry Brown has made combating climate change a priority for the state.

“Having the former attorney general of the United States brings us a lot of firepower in order to prepare to safeguard the values of the people of California,” Kevin de León, the Democratic leader of the state Senate, told The Times. “This means we are very, very serious.”

A representative from de León’s office could not immediately be reached for comment early Wednesday.

“I am honored that the Legislature chose Covington to serve as its legal adviser as it considers how to respond to potential changes in federal law that could impact California’s residents and policy priorities,” Holder said in a statement, according to The Times.

California voted decisively for Democrat Hillary Clinton in the November 8 presidential election, choosing the former first lady over Trump by 28 percentage points.

**** Covington and Burling has been a legal lobby operation for corrupt entities for a while. Please note this particular example below:

Western SaharaResource Watch (WSRW) has been writing since 2008 about Covington & Burling’s collusion with OCP. In particular, WSRW has investigated a secret “independent opinion,” written by Covington that has “been used by phosphate importing firms to defend their unethical trade.” Despite repeated attempts to get a copy of that opinion, WSRW has reported: “the opinion has never been released to the public. The law firm consistently refuses to reply to requests from civil society or Saharawis.” An April 2012 paper from one of the U.S. importers, PotashCorp, titled “PhosphateRock from Western Sahara,” gives us, however, a pretty good picture of Covington’s point of view.  Acknowledging that they had “recently received, on a confidential basis” two legal analyses by Covington & Burling and DLA Piper, they tell us that those opinions “concluded that OCP’s operations in the region directly benefit the people of the region and are consistent with international legal obligations.” This conclusion is directly contradicted by any number of reports and analyses that the indigenous Sahrawi benefit little from the phosphate trade, hold few of the phosphate industry jobs, and have never been consulted on or acquiesced in the exploitation. While it would certainly be enlightening to see a copy of Covington’s opinion, they are obviously basing their conclusion on the condition of the several hundred thousand illegal settlers who have been lured to the territory with subsidies and jobs. The Fourth Geneva Convention specifically prohibits colonizing occupied territories. This is directly akin to concluding that life on the West Bank is lovely, based on the living conditions of the illegal Israeli settlers. WSRW supplies us with a good list of Recommended Reading on all this.

Covington lobbying on behalf of OCP has been hard to trace, specifically because they have chosen to register their work under the LDA, which does not require the registrant to list contacts or activities (see more on this below). All we really learn from the listings is their intention to lobby several governmental agencies and Congress on “Promoting economic integration in the Maghreb and enhanced economic relations between the Maghreb and the United States.” It does not appear to be a coincidence, however, that two of Covington’s registered OCP lobbyists, Stuart Eizenstat and Marney Cheek, should turn up in 2009 as participants in a thing called the North Africa Policy Paper Project that produced the seriously flawed and thoroughly biased policy paper, Why the Maghreb Matters: Threats, Opportunities, & Options for Effective US Engagement in North Africa. Eizenstat is listed as co-chair (along with I.William Zartman) and Cheek as staff. In a nutshell, the report identifies resolution of the stalemate over the Western Sahara as the key to unlocking the potential of greater Maghrebian integration and controversially endorses “the [Moroccan] formula of autonomy/sovereignty now before the UN” as “a basis for a viable solution.” The Moroccan autonomy plan has been widely condemned by international legal scholars – including our foremost self-determination authority, Hurst Hannum – as illegal under international law because it doesn’t provide for an expression of the will of the original inhabitants of the territory. More details here.

FBI: 7,700 Terrorist Encounters in USA in 2015

In a wide-ranging request for documents and analysis, President-elect Donald Trump’s transition team asked the Department of Homeland Security last month to assess all assets available for border wall and barrier construction.

Reuters: The team also asked about the department’s capacity for expanding immigrant detention and about an aerial surveillance program that was scaled back by the Obama administration but remains popular with immigration hardliners. And it asked whether federal workers have altered biographic information kept by the department about immigrants out of concern for their civil liberties.

The requests were made in a Dec. 5 meeting between Trump’s transition team and Department of Homeland Security officials, according to an internal agency memo reviewed by Reuters. The document offers a glimpse into the president-elect’s strategy for securing the U.S. borders and reversing polices

The requests were made in a Dec. 5 meeting between Trump’s transition team and Department of Homeland Security officials, according to an internal agency memo reviewed by Reuters. The document offers a glimpse into the president-elect’s strategy for securing the U.S. borders and reversing polices

The requests were made in a Dec. 5 meeting between Trump’s transition team and Department of Homeland Security officials, according to an internal agency memo reviewed by Reuters. The document offers a glimpse into the president-elect’s strategy for securing the U.S. borders and reversing policesput in place by the Obama administration. 

Trump’s transition team did not comment in response to Reuters inquiries. A spokeswoman for the Department of Homeland Security and U.S. Customs and Border Protection declined to comment.

In response to the transition team request, U.S. Customs and Border Protection staffers identified more than 400 miles along the U.S.-Mexico border, and about the same distance along the U.S.-Canada border, where new fencing could be erected, according to a document seen by Reuters.

Reuters could not determine whether the Trump team is considering a northern border barrier. During the campaign, Trump pledged to build a wall and expand fencing on parts of the U.S.-Mexico border but said he sees no need to build a wall on the border with Canada.

One program the transition team asked about, according to the email summary, was Operation Phalanx, an aerial surveillance program that authorizes 1,200 Army National Guard airmen to monitor the southern border for drug trafficking and illegal migration. Much more here from Reuters.

For perspective:

FBI: 7,700 Terrorist Encounters in USA Last Year

The jihad is crossing the southern border: a majority of encounters in Arizona were with Islamist groups.

From 9/2016: Breitbart news has received a collection of leaked documents from the Federal Bureau of Investigation that show a massive number of terrorist encounters, especially in border states.  The documents are not classified, though they are marked sensitive.  7,712 terrorist encounters occurred from July 20, 2015 and the same date a year later — last year, in short.

Some of the documents pertain to the entire U.S., while others focus specifically on the state of Arizona.  The states with the highest encounters are all border states. Texas, California, and Arizona–all states with a shared border with Mexico–rank high in encounters…. Most significantly, the map shows that many of the encounters occurred near the border outside of ports-of-entry, indicating that persons were attempting to sneak into the U.S.

Page Six shows a pie chart indicating that the majority of encounters in Arizona were with Islamic known or suspected terrorists, both Sunni and Shi’a.

 

That last is surprising, as one would expect drug cartels to make up the majority of such encounters.  The leak comes at a time when the FBI’s crime reporting shows an increase in violent crime across the country.

The Shiite terrorist organization Hezbollah has developed connections with the Latin American drug cartels because of its prominent role in heroin.  Iran’s Revolutionary Guards Corps (IRGC) controls the opium trade from the poppy fields in Afghanistan to the Levant, and they provide a great deal of opium to Hezbollah.  Hezbollah has a refining capacity in Lebanon that allows them to provide a substantial part of the world’s heroin.  They trade heroin to the Latin American drug cartels for other illegal money-making opportunities, forged documents, and access to the Americas.  Hezbollah’s operations produce between ten and twenty million dollars in revenue for its American operations, which are based out of a large Lebanese immigrant community in what is called the “Tri-border region,” an area between Paraguay, Brazil, and Argentina.

In addition to its money-making ventures, Hezbollah provides the cartels with military training.  As one of the world’s foremost guerrilla organizations, Hezbollah finds that its military trainers are sought after commodities.  They are able to parley those connections in order to perform operations in Mexico.  Their ability to infiltrate the United States, in order to conduct terrorist violence in service to Iran, is highlighted by these leaked FBI documents.

Sunni extremists are infiltrating the United States with the help of alien smugglers in South America and are crossing U.S. borders with ease, according to a U.S. South Command intelligence report.  The Command’s J-2 intelligence directorate reported recently in internal channels that “special interest aliens” are working with a known alien smuggling network in Latin America to reach the United States….  Army Col. Lisa A. Garcia, a Southcom spokeswoman, did not address the intelligence report directly but said Sunni terrorist infiltration is a security concern.

“Networks that specialize in smuggling individuals from regions of terrorist concern, mainly from the Afghanistan-Pakistan region, the Middle East, and East Africa, are indeed a concern for Southcom and other interagency security partners who support our country’s national security,” Garcia told theWashington Free Beacon….  “In 2015, we saw a total of 331,000 migrants enter the southwestern border between the U.S. and Mexico, of that we estimate more than 30,000 of those were from countries of terrorist concern,” she said….

[T]he Southcom intelligence report revealed that the threat of Islamist terror infiltration is no longer theoretical. “This makes the case for Trump’s wall,” said one American security official of the Southcom report. “These guys are doing whatever they want to get in the country.”

Here at CounterJihad, we reported on Southern Command’s commander, Admiral Kurt Tidd, and his testimony before Congress on the threat.  Tidd reported that a number of terrorists were transiting the region who had gone to Syria and fought for the Islamic State (ISIS) and other radical groups.  Their ability to return to Latin America was smooth, given that they actually had legal travel documents.

Whether they can then pass into the United States is an open question.  The leaked FBI documents only talk about actual law enforcement encounters with people on terrorist lists.  How many are infiltrating without encountering law enforcement?

He Was Deported 19 Times, Raped her on a Bus

Seems we may have a district attorney or two that need to be sued, disbarred and jailed as accomplices. In fact this could have been done under edict by the White House and the Department of Justice.

WICHITA, Kan. (AP)— A Mexican man accused of raping a 13-year-old girl on a Greyhound bus that traveled through Kansas had been deported 10 times and voluntarily removed from the U.S. another nine times since 2003, records obtained by The Associated Press show.

Three U.S. Republican senators — including Kansas’ Jerry Moran and Pat Roberts — demanded this month that the Department of Homeland Security provide immigration records for 38-year-old Tomas Martinez-Maldonado, who is charged with a felony in the alleged Sept. 27 attack aboard a bus in Geary County. He is being held in the Geary County jail in Junction City, which is about 120 miles west of Kansas City.

U.S. Sen. Charles Grassley, from Iowa and chairman of the judiciary committee, co-signed a Dec. 9 letter with Moran and Roberts to Homeland Security Secretary Jeh Johnson, calling it “an extremely disturbing case” and questioning how Martinez-Maldonado was able to re-enter and remain in the country.

U.S. Immigration and Customs Enforcement said it has placed a detainer — a request to turn Martinez-Maldonado over to ICE custody before he is released — with Geary County. ICE declined to discuss his specific case beyond its October statement regarding the 10 deportations.

Court filings show Martinez-Maldonado has two misdemeanor convictions for entering without legal permission in cases prosecuted in 2013 and 2015 in U.S. District Court of Arizona, where he was sentenced to serve 60 days and 165 days respectively.

A status hearing in the rape case is scheduled for Jan. 10. Defense attorney Lisa Hamer declined to comment on the charge, but said, “criminal law and immigration definitely intersect and nowadays it should be the responsibility of every criminal defense attorney to know the possible ramifications in the immigration courts.”

Nationwide, 52 percent of all federal prosecutions in the fiscal year that ended Sept. 30 were for entry or re-entry without legal permission and similar immigration violations, according to Transactional Records Access Clearinghouse at Syracuse University.

It’s not unusual to see immigrants with multiple entries without legal permission, said David Trevino, a Topeka immigration attorney also representing Martinez-Maldonado. Most of Martinez-Maldonado’s family lives in Mexico, but he also has family in the United States, and the family is “devastated,” Trevino said.

“(President-elect Donald Trump) can build a wall 100 feet high and 50 feet deep, but it is not going to keep family members separated. So if someone is deported and they have family members here … they will find a way back — whether it is through the air, under a wall, through the coast of the United States,” Trevino said.

He declined to comment on his client’s criminal history and pending charge.

Records obtained by AP show Martinez-Maldonado had eight voluntary removals before his first deportation in 2010, which was followed by another voluntary removal that same year. He was deported five more times between 2011 and 2013.

In 2013, Martinez-Maldonado was charged with entering without legal permission, a misdemeanor, and subsequently deported in early 2014 after serving his sentence. He was deported again a few months later, as well as twice in 2015 — including the last one in October 2015 after he had served his second sentence, the records show.

ICE said in an emailed statement when it encounters a person who’s been deported multiple times or has a significant criminal history and was removed, it routinely presents those cases to the U.S. attorney’s office for possible criminal charges.

Cosme Lopez, spokesman for the U.S. attorney’s office for the District of Arizona, declined comment on why prosecutors twice dismissed felony re-entry after deportation charges against Martinez-Maldonado in 2013 and 2015 in exchange for guilty pleas on misdemeanor entry charges.

Arizona ranks third in the nation — behind only the Southern District of Texas and the Western District of Texas — for the number of immigration prosecutions among the nation’s 94 federal judicial districts for the fiscal year that ended Sept. 30, TRAC records show.

Moran told the AP in an emailed statement that the immigration system is “broken.”

“There must be serious legislative efforts to address U.S. immigration policy, and we must have the ability to identify, prosecute and deport illegal aliens who display violent tendencies before they have an opportunity to perpetrate these crimes in the United States,” he said.

**** And the FBI is putting out a warning: Hear the FBI podcast here.

Mollie Halpern: During this busy holiday travel season and beyond, the FBI is asking those who cross our nation’s borders, use airports, and other ports of entry to keep an eye out for border corruption.

Teresa Tampubolon: You just have to keep your eyes open and be situationally aware. And if you see a screener doing something they shouldn’t be, you see an official taking money—if you see something that’s suspicious, then you have to report it.

Halpern: That was Supervisory Special Agent Teresa Tampubolon, who says not only does border corruption lead to drug, weapon, and sex trafficking, it can jeopardize our country’s national security.

Tampubolon: National security is border security, it really is. To protect our nation, we’ve got to protect our borders, everything. National security is border security, and the threat is real.

Halpern: Don’t turn a blind eye. Report border corruption to the FBI at tips.fbi.gov. Support the effort on social media using #ReportBorderCorruption. With FBI, This Week, I’m Mollie Halpern of the Bureau.

 

GW Bush Doing the Work Kerry Should on N. Korea

Sometimes when a panel is mobilized that includes media, negotiators, diplomats and legislators, interesting facts emerge. Such is the case where President George W. Bush convened a panel at the George W. Bush Institute on the matter of North Korea. Going beyond the proven human rights violations by the Kims, there is more to understand when it comes to relationships including the DPRK, China, Japan, S. Korea, Taiwan, Iran, Syria and more.

There is a U.S. citizen currently in prison doing slave labor in N. Korea but John Kerry voids his failure to get Otto Warmbier released. Kerry deferred the process to former governor Bill Richardson and there has been no progress.

The DPRK is in fact developing technology and weapons systems that are not only being tested but being sold to rogue nations for revenue purposes.

GW Bush has reached out to North Koreans that have escaped and made their way to the United States in a manner where they provide information and continued work for the benefit of Congress, the State Department, diplomatic objectives and policy to address the Kim regime going forward.

This is a fascinating discussion where real truths are revealed pointing to labor, human rights violations, military and nuclear operations, trade and more. North Korea is stacking missiles on launch pads and working on miniaturized nuclear weapons. The objective is to reach the United States. What has John Kerry done for deterrents? Nothing….

****

North Korea’s Rockets and Missiles

Space/2013: North Korea’s missile program is shrouded in secrecy, which helps the outlaw nation keep the rest of the world guessing.Still, Western experts have learned a fair bit about Pyongyang’s stable of rockets and missiles over the years by analyzing test flights, satellite photos and other data. Here are five of the most interesting things they’ve figured out.

FIRST STOP: Soviet Origins of Missiles

Soviet Origins

The Hermit Kingdom’s missile program is based primarily on Soviet Scuds, which apparently entered the country via Egypt in the 1970s. North Korea was building its own Scud version, called the Hwasong-5, by the mid-1980s, and moved onto bigger and more powerful missiles after that. [North Korea’s Missile Capabilities Explained]NEXT: Poor Accuracy

Poor Accuracy

North Korea’s missiles have lousy accuracy compared to those developed by the United States, experts say. Pyongyang’s Hwasong line, for example, can reach targets a few hundred miles away, but with an accuracy of just 0.3 miles to 0.6 miles (0.5 to 1 kilometer).A missile called the Nodong can fly 620 miles to 800 miles (1,000 to 1,300 km), but its estimated accuracy is even worse — 1.8 to 2.5 miles (3 to 4 km). Such missiles can’t reliably hit military targets, but they can certainly strike larger targets such as cities.

NEXT: Iran’s Help

Cooperation with Iran

North Korea has apparently cooperated extensively with fellow pariah nation Iran on rocket and missile technology. For example, the third stage of Pyongyang’s Unha-2 rocket is very similar to the upper stage of Iran’s Safir-2 launcher, physicists David Wright and Theodore Postol noted in a 2009 report.NEXT: Satellite Success

Satellite Launch Success

North Korea joined the ranks of satellite-launching nations last December, when its Unha-3 rocket launched a small satellite to Earth orbit.This breakthrough came after three consecutive failures — one in 1998, one in 2009 and another in April 2012. North Korean officials didn’t always admit to these mishaps, however. For example, they claimed that the Kwangmyongsong-1 (“Bright Star 1”) satellite reached orbit in 1998 and broadcast patriotic songs into space. [Unha-3 Rocket Explained (Infographic)]

NEXT: Nuclear Warheads Possible

Nuclear Warheads Possible

North Korea has been ratcheting up its bellicose rhetoric lately, threatening to launch nuclear strikes against Washington, D.C. and other American cities.While the rogue nation’s nuclear-weapons program is thought to be at a relatively primitive stage, Pyongyang may indeed already possess warheads small enough to be carried large distances by a ballistic missile, experts say. “Having something that’s around 1,000 kilograms, or maybe somewhat smaller than that, unfortunately does not seem impossible,” Wright told SPACE.com. “We don’t really know, but I think you have to take seriously that they could well be there.”

Most analysts doubt, however, that North Korean missiles are powerful enough to deliver a nuclear weapon to the American mainland. The tough talk from Pyongyang is primarily bluster aimed at wringing concessions out of the international community and building support for young leader Kim Jong-Un at home, they say.