Cheyenne Mtn: Pentagon Went Pro-Active, EMP

Given the recent missile tests by Iran and North Korea, there is cause for attention, further, Russia is never out of the equation. Paying attention to offensive measures and completion dates is an indication of the Pentagon having clues, seeing violations of agreements and resolutions and adversarial military build up of advanced technology.

Pentagon Moves More Communications Gear into Cheyenne Mountain

The gear is being moved into Cheyenne Mountain to protect it from electromagnetic pulses, said Adm. William Gortney, commander of U.S. Northern Command and NORAD.

“[T]here is a lot of movement to put capability into Cheyenne Mountain and to be able to communicate in there,” Gortney said Tuesday during a news briefing at the Pentagon.

Electromagnetic pulses, or EMPs, can occur naturally or by manmade devices such as nuclear weapons. For years, the Pentagon has been working on building weapons that could fry the electronic equipment of an enemy during battle.

“Because of the very nature of the way that Cheyenne Mountain is built, it’s EMP-hardened,” Gortney said. “It wasn’t really designed to be that way, but the way it was constructed makes it that way.”

Being able to communicate during an EMP attack is important, Gortney said.

“My primary concern was: ‘Are we going to have the space inside the mountain for everybody that wants to move in there?’ … but we do have that capability,” he said.

Last week, the Pentagon awarded defense firm Raytheon a $700-million contract to install new equipment inside the mountain. The company said the contract, which runs through 2020, will “support threat warnings and assessments for the North American Aerospace Defense Command Cheyenne Mountain Complex.”

The Pentagon’s March 30 contract announcement said Raytheon will provide sustainment services and products supporting the Integrated Tactical Warning/Attack Assessment (ITW/AA) and Space Support Contract covered systems. “The program provides ITW/AA authorities accurate, timely and unambiguous warning and attack assessment of air, missile and space threats,” it said.

Since 2013, the Pentagon has awarded contracts worth more than $850 million for work related to Cheyenne Mountain.

The Colorado complex is the embodiment of the Cold War, an era when bunkers were built far and wide to protect people and infrastructure. Cheyenne Mountain was the mother of these fallout shelters, a command center buried deep to withstand a Soviet nuclear bombardment. The complex was locked down during the Sept. 11, 2001, attacks on New York and Washington.

Air Force Space Command runs the mountain and maintains sleeping quarters, fresh water and a power station that would be used during an attack.

Almost a decade ago, NORAD pulled most of its staff out of Cheyenne Mountain and moved its command center into the basement of a headquarters building at nearby Peterson Air Force Base. Since then, Cheyenne Mountain has served as a back-up site.

Now the Cheyenne Mountain staff is set to grow again. Still, the command center at Peterson will remain operational, Gortney said.

In June 2013, then-U.S. Defense Secretary Chuck Hagel gave a speech in front of the mammoth blastproof doors on the roadway leading into the mountain.

“These facilities and the entire complex of NORAD and NORTHCOM represent the nerve center of defense for North America,” he said at the time.

***

MissileThreat: The U.S. has no ballistic-missile early-warning radars or ground-based interceptors facing south and would be blind to a nuclear warhead orbited as a satellite from a southern trajectory. The missile defense plans were oriented during the Cold War for a northern strike from the Soviet Union, and they have not been adapted for the changing threats.

The Pentagon was wise to move Norad communications back into Cheyenne Mountain and to take measures elsewhere to survive an EMP attack. But how are the American people to survive? In the event of a yearlong nationwide blackout, tens of millions of Americans would perish from starvation and societal chaos, according to members of the Congressional EMP Commission, which published its last unclassified report in 2008.

Yet President Obama has not acted on the EMP Commission’s draft executive order to protect national infrastructure that is essential to provide for the common defense. Hardening the national electric grid would cost a few billion dollars, a trivial amount compared with the loss of electricity and lives following an EMP attack. The U.S. also should deploy one of its existing transportable radars in the Philippines to help the ground-based interceptors at California’s Vandenberg Air Force defend the country against an attack from the south.

Congress also has failed to act on the plans of its own EMP commission to protect the electric grid and other civilian infrastructure that depends on a viable electric grid—such as communications, transportation, banking—that are essential to the economy. In recent years, the GRID Act, the Shield Act, and the Critical Infrastructure Protection Act have gained bipartisan and even unanimous support in the House, yet they died in the Senate.

States are not waiting for Washington to act. Maine and Virginia have enacted legislation and undertaken serious studies to consider how to deal with an EMP attack. Florida’s governor and emergency manager are considering executive action to harden their portion of the grid. Colorado legislators are holding hearings on legislation to protect their citizens. Texas, North Carolina, South Carolina, Indiana, Idaho and New York have initiatives in various stages to deal with an EMP attack.

Muslim Brotherhood in U.S. Gets Millions in Grants

The Muslim Brotherhood in the United States document is here.

The House Intelligence Committee Testimony on the Muslim Brotherhood is here.

Mosque Linked To Muslim Brotherhood Has Received Millions In Federal Grants

DailyCaller: A Kansas City mosque owned by an Islamic umbrella organization with deep ties to the U.S. arm of the Muslim Brotherhood has received millions of dollars in federal grants over the past several years, according to a federal spending database.

The Islamic Center of Greater Kansas City has received $2,739,891 from the Department of Agriculture since 2010, a Daily Caller analysis has found. The money largely went to the mosque’s Crescent Clinic to provide services through the Women, Infant and Children nutrition program, known as WIC.

The most recent federal payment — in the amount of $327,436 — was handed out Oct. 1.

Property records show the mosque is owned by the North American Islamic Trust (NAIT), which acts as a financial holding company for Islamic organizations. It offers sharia-compliant financial products to Muslim investors, operates Islamic schools and owns more than 300 other mosques throughout the U.S.

Founded in 1973 as an offshoot of the Muslim Brotherhood-backed Muslim Students Association, NAIT’s most controversial connection is to the 2007 and 2008 Holy Land Foundation terror financing cases. Along with other Muslim Brotherhood-linked organizations like the Islamic Society of North America (ISNA) and the Council on American-Islamic Relations (CAIR), NAIT was named a co-conspirator in the federal case but was not indicted.

At the Holy Land Foundation trial, evidence was presented that ISNA diverted funds from the accounts it held with NAIT to institutions linked to Hamas and to Mousa Abu Marzook, a senior Hamas leader.

Federal prosecutors introduced evidence in the case that “established that ISNA and NAIT were among those organizations created by the U.S.-Muslim Brotherhood.” Hundreds of thousands of dollars worth of checks drawn from ISNA’s account and deposited in the Holy Land Foundation’s account with NAIT were made payable to “the Palestinian Mujahadeen,” which is the original name for Hamas’ military wing.

While Hamas was designated as a foreign terrorist organization by the U.S. government in 1997 and is considered the Palestinian branch of the Muslim Brotherhood, the larger Muslim Brotherhood is not itself designated as a terrorist group.

NAIT has other ties to the Holy Land Foundation case. Its newly-appointed executive director, Salah Obeidallah, was a founding member and former president of the Islamic Center of Passaic County in Paterson, N.J.

In the 1990s, the imam at that mosque was Mohammad El-Mezain, a founding member of the Holy Land Foundation who was sentenced to 15 years in prison for helping fund Hamas. Obeidallah has said that he was not aware of El-Mezain’s terror funding activities.

In being owned by NAIT, the Kansas City organization is in company with numerous mosques with ties to known terrorists, terror sympathizers and fundamentalist Islamists.

Purportedly backed by money from Saudi Arabia and supporting a fundamentalist branch of Sunni Islam known as Wahhabism, NAIT holds the deed to the Islamic Society of Boston, which operates the mosque attended by Dzhokhar and Tamerlan Tsarnaev, the so-called Boston Marathon bombers.

It also controls the Islamic Center of San Diego, which was attended by Khalid al-Mihdhar and Nawaf al-Hazmi, two al-Qaeda members who helped fly American Flight 77 into the Pentagon on Sept. 11, 2001.

According to a 2002 Newsweek investigation, members of the San Diego mosque helped the two terrorists obtain housing, driver’s licences and social security numbers. They claimed not to have known about the men’s terror plans.

NAIT also owns the Dar Al-Hijrah mosque in Fairfax Co., Va. — a known hotbed of terrorist activity. Al-Qaeda recruiter Anwar al-Awlaki served as imam at that location in 2001 and 2002. He was killed by an American drone in Yemen in 2011.

The Islamic Center of Greater Kansas City has its own loose links to terrorist activities. The mosque made news earlier this year when it held the funeral for Nadir Soofi, one of the two jihadis who attempted to pull off a terrorist attack in Garland, Tex. Soofi, who was 34, and his accomplice, 30-year-old Elton Simpson, opened fire outside of an art exhibit featuring cartoons of Muhammad, but were killed by a security guard.

Both Soofi and Simpson attended the Islamic Community Center in Phoenix, which land deeds show is owned by NAIT.

That particular mosque posted $100,000 bond for Simpson following his 2010 arrest for lying to FBI agents about his plans to travel to Somalia to join a terrorist group. Simpson was given three years probation in that case.

The Islamic Center of Greater Kansas City has also hosted Imam Khalid Yasin, an American-born convert to Islam, who has publicly supported sharia law and claimed that homosexuals should receive the death penalty.

As a May 2010 Yahoo! message board post shows, Yasin visited the Islamic Center of Greater Kansas City and other area mosques that month to hold a series of lectures and workshops about Islam.

That was nearly two years after Yasin touted the virtues of sharia law and capital punishment in a speech at a British mosque. Full article here.

 

 

 

 

 

 

Afghanistan is a Growing Festering War, Again

WASHINGTON —Afghanistan’s security situation is so tenuous that the top U.S. commander there wants to keep as many U.S. troops there as possible through 2016 to boost beleaguered Afghan soldiers and may seek additional American forces to assist them.

Army Gen. John Campbell said in an interview with USA TODAY that maintaining the current force of 9,800 U.S. troops to train Afghan forces and conduct counter-terrorism raids is vital, and that the scheduled reduction to 5,500 by Jan. 1, 2017, should be put off as long as possible.

“My intent would be to keep as much as I could for as long as I could,” Campbell said by telephone from Kabul. “At some point it becomes physics. I’m going to have to get them out.”

News from Afghanistan in 2015, when American troops ended their daily combat mission after 14 years, has been grim. Taliban insurgents stormed the northern provincial capital of Kunduz in October and were pushed out after fierce fighting that included an inadvertent attack by a U.S. warplane on hospital that killed 42 civilians. In the south, Taliban insurgents have battered Afghan troops in Helmand province; an al-Qaeda training camp was also discovered there and destroyed. Islamic State fighters have set up outposts in the east. Last week, six U.S. airmen were killed by a suicide bomber outside Bagram Air Base.

The Pentagon’s own quarterly assessment of security in Afghanistan this month noted that in “the second half of 2015, the overall security situation in Afghanistan deteriorated with an increase in effective insurgent attacks and higher (Afghan security force) and Taliban casualties.”

Campbell will be Washington soon to brief senior leaders on the security situation in Afghanistan and troop levels required for their missions. He declined to offer specifics on his recommendations, saying they were classified. More here from USAToday.

Report: Russia Signals Readiness to Ease UN Sanctions Against Taliban

A senior Russian diplomat reportedly said Moscow is ready “to show flexibility” on possibly easing United Nations Security Council sanctions imposed on Afghanistan’s Taliban, which has intensified attacks against U.S. service members and American-trained Afghan security forces.

Breitbart: The Taliban recently claimed responsibility for killing six U.S. troops, and the group has been behind a record number of casualties incurred by the Afghan National Defense and Security Forces (ANDSF), which includes army, police, and militia units.

“He appeared to be suggesting that major powers should consider an accommodation with the Taliban to stop the spread of rival Islamic State [ISIS/ISIL] militants, deemed a much bigger, international menace by the West,” Reuters reports, referring to Zamir Kabulov, a department chief at Russia’s Foreign Ministry and President Vladimir Putin’s special envoy on Afghanistan.

“We are ready to approach in a flexible way the issues of a possible easing of the regime of sanctions under Security Council Resolution 1988 on the Taliban, if this does not contradict Afghanistan’s national interests,” the Tass news agency quoted Kabulov as saying, according to Reuters.

“No one is talking today about achieving a victory by military means over the Taliban, while the implementation of the national reconciliation policy would in practice mean their return to power,” he added.

Kabulov noted that Russia supports the U.S.-backed Afghanistan government police aimed at achieving national reconciliation.

In 2011, the UN Security Council Resolution 1988 was passed, designating the Taliban insurgency as a threat to international peace and imposing a freezing of assets, bans on travel, and other restrictions on individuals deemed to be associated with the terrorist group.

Although the Taliban branch in Pakistan—Tehrik-e Taliban Pakistan (TTP)—is listed as a foreign terrorist organization by the United States, the Afghan Taliban is not. TTP is also known to carry out attacks on the Afghanistan side of the country’s border with Pakistan.

ISIS terrorists, which have seized swaths of Iraq and Syria, have established a presence in eastern Afghanistan and have been engaged in turf battles with the Taliban, which has labeled ISIS as “barbaric” in the Afghan territory it has captured.

Last week, Kabulov said that Russian interests in Afghanistan “objectively coincide” with those of the Taliban movement in the fight against ISIS.

He noted that Russia had established communication channels to exchange information on ISIS with the Taliban.

“Moscow, currently conducting a bombing campaign in Syria it says is aimed at Islamic State forces, has been concerned about the possible spread of Islamic State from Afghanistan into neighboring ex-Soviet states like Tajikistan, Uzbekistan and Turkmenistan,” points out Reuters.

U.S. Gen. John Campbell, the top commander of U.S. and NATO forces in Afghanistan, and the Pentagon have acknowledged that ISIS is growing in Afghanistan.

“Groups associated with Islamic State have made growing inroads in Afghanistan, attracting fighters and support away from disenchanted members of the Taliban,” reports Reuters.

“They have been battling government forces and the Taliban in a challenge for supremacy of the Islamist insurgency, and its rise has caused alarm outside Afghanistan, with U.S. commanders citing the movement as a reason to delay troop withdrawals,” it adds.

Militants from the ethnic Uzbek minority in Afghanistan have been linked to the Islamic State.

Russian is reportedly helping to strengthen the Afghan security forces.

In September, a United Nations report revealed that ISIS is actively recruiting supporters in nearly three-quarters (25) of the country’s 34 provinces.

Kabulov estimated in October that there were nearly 3,500 ISIS-linked jihadists in Afghanistan, adding that the number was growing.

Gen. Campbell recently said that between 1,000 to 3,000 ISIS-linked militants were operating in Afghanistan.

 

Obama Spied on Congress/Israel, Contempt/Disdain

U.S. Spy Net on Israel Snares Congress
National Security Agency’s targeting of Israeli leaders also swept up the content of private conversations with U.S. lawmakers

WSJ: President Barack Obama announced two years ago he would curtail eavesdropping on friendly heads of state after the world learned the reach of long-secret U.S. surveillance programs.

But behind the scenes, the White House decided to keep certain allies under close watch, current and former U.S. officials said. Topping the list was Israeli Prime Minister Benjamin Netanyahu.
The U.S., pursuing a nuclear arms agreement with Iran at the time, captured communications between Mr. Netanyahu and his aides that inflamed mistrust between the two countries and planted a political minefield at home when Mr. Netanyahu later took his campaign against the deal to Capitol Hill.

The National Security Agency’s targeting of Israeli leaders and officials also swept up the contents of some of their private conversations with U.S. lawmakers and American-Jewish groups. That raised fears—an “Oh-s— moment,” one senior U.S. official said—that the executive branch would be accused of spying on Congress.

White House officials believed the intercepted information could be valuable to counter Mr. Netanyahu’s campaign. They also recognized that asking for it was politically risky. So, wary of a paper trail stemming from a request, the White House let the NSA decide what to share and what to withhold, officials said. “We didn’t say, ‘Do it,’ ” a senior U.S. official said. “We didn’t say, ‘Don’t do it.’ ”

Stepped-up NSA eavesdropping revealed to the White House how Mr. Netanyahu and his advisers had leaked details of the U.S.-Iran negotiations—learned through Israeli spying operations—to undermine the talks; coordinated talking points with Jewish-American groups against the deal; and asked undecided lawmakers what it would take to win their votes, according to current and former officials familiar with the intercepts.

Before former NSA contractor Edward Snowden exposed much of the agency’s spying operations in 2013, there was little worry in the administration about the monitoring of friendly heads of state because it was such a closely held secret. After the revelations and a White House review, Mr. Obama announced in a January 2014 speech he would curb such eavesdropping.

In closed-door debate, the Obama administration weighed which allied leaders belonged on a so-called protected list, shielding them from NSA snooping. French President François Hollande, German Chancellor Angela Merkel and other North Atlantic Treaty Organization leaders made the list, but the administration permitted the NSA to target the leaders’ top advisers, current and former U.S. officials said. Other allies were excluded from the protected list, including Recep Tayyip Erdogan, president of NATO ally Turkey, which allowed the NSA to spy on their communications at the discretion of top officials.

Privately, Mr. Obama maintained the monitoring of Mr. Netanyahu on the grounds that it served a “compelling national security purpose,” according to current and former U.S. officials. Mr. Obama mentioned the exception in his speech but kept secret the leaders it would apply to.

Israeli, German and French government officials declined to comment on NSA activities. Turkish officials didn’t respond to requests Tuesday for comment. The Office of the Director of National Intelligence and the NSA declined to comment on communications provided to the White House.

This account, stretching over two terms of the Obama administration, is based on interviews with more than two dozen current and former U.S. intelligence and administration officials and reveals for the first time the extent of American spying on the Israeli prime minister.

Taking office
After Mr. Obama’s 2008 presidential election, U.S. intelligence officials gave his national-security team a one-page questionnaire on priorities. Included on the form was a box directing intelligence agencies to focus on “leadership intentions,” a category that relies on electronic spying to monitor world leaders.

The NSA was so proficient at monitoring heads of state that it was common for the agency to deliver a visiting leader’s talking points to the president in advance. “Who’s going to look at that box and say, ‘No, I don’t want to know what world leaders are saying,’ ” a former Obama administration official said.

In early intelligence briefings, Mr. Obama and his top advisers were told what U.S. spy agencies thought of world leaders, including Mr. Netanyahu, who at the time headed the opposition Likud party.

Michael Hayden, who led the NSA and the Central Intelligence Agency during the George W. Bush administration, described the intelligence relationship between the U.S. and Israel as “the most combustible mixture of intimacy and caution that we have.”

The NSA helped Israel expand its electronic spy apparatus—known as signals intelligence—in the late 1970s. The arrangement gave Israel access to the communications of its regional enemies, information shared with the U.S. Israel’s spy chiefs later suspected the NSA was tapping into their systems.

When Mr. Obama took office, the NSA and its Israeli counterpart, Unit 8200, worked together against shared threats, including a campaign to sabotage centrifuges for Iran’s nuclear program. At the same time, the U.S. and Israeli intelligence agencies targeted one another, stoking tensions.

“Intelligence professionals have a saying: There are no friendly intelligence services,” said Mike Rogers, former Republican chairman of the House Intelligence Committee.

Early in the Obama presidency, for example, Unit 8200 gave the NSA a hacking tool the NSA later discovered also told Israel how the Americans used it. It wasn’t the only time the NSA caught Unit 8200 poking around restricted U.S. networks. Israel would say intrusions were accidental, one former U.S. official said, and the NSA would respond, “Don’t worry. We make mistakes, too.”

In 2011 and 2012, the aims of Messrs. Netanyahu and Obama diverged over Iran. Mr. Netanyahu prepared for a possible strike against an Iranian nuclear facility, as Mr. Obama pursued secret talks with Tehran without telling Israel.

Convinced Mr. Netanyahu would attack Iran without warning the White House, U.S. spy agencies ramped up their surveillance, with the assent of Democratic and Republican lawmakers serving on congressional intelligence committees.

By 2013, U.S. intelligence agencies determined Mr. Netanyahu wasn’t going to strike Iran. But they had another reason to keep watch. The White House wanted to know if Israel had learned of the secret negotiations. U.S. officials feared Iran would bolt the talks and pursue an atomic bomb if news leaked.

The NSA had, in some cases, spent decades placing electronic implants in networks around the world to collect phone calls, text messages and emails. Removing them or turning them off in the wake of the Snowden revelations would make it difficult, if not impossible, to re-establish access in the future, U.S. intelligence officials warned the White House.

Instead of removing the implants, Mr. Obama decided to shut off the NSA’s monitoring of phone numbers and email addresses of certain allied leaders—a move that could be reversed by the president or his successor.

There was little debate over Israel. “Going dark on Bibi? Of course we wouldn’t do that,” a senior U.S. official said, using Mr. Netanyahu’s nickname.

One tool was a cyber implant in Israeli networks that gave the NSA access to communications within the Israeli prime minister’s office.

Given the appetite for information about Mr. Netanyahu’s intentions during the U.S.-Iran negotiations, the NSA tried to send updates to U.S. policy makers quickly, often in less than six hours after a notable communication was intercepted, a former official said.

Emerging deal
NSA intercepts convinced the White House last year that Israel was spying on negotiations under way in Europe. Israeli officials later denied targeting U.S. negotiators, saying they had won access to U.S. positions by spying only on the Iranians.

By late 2014, White House officials knew Mr. Netanyahu wanted to block the emerging nuclear deal but didn’t know how.

On Jan. 8, John Boehner, then the Republican House Speaker, and incoming Republican Senate Majority Leader Mitch McConnell agreed on a plan. They would invite Mr. Netanyahu to deliver a speech to a joint session of Congress. A day later, Mr. Boehner called Ron Dermer, the Israeli ambassador, to get Mr. Netanyahu’s agreement.

Despite NSA surveillance, Obama administration officials said they were caught off guard when Mr. Boehner announced the invitation on Jan. 21.

Soon after, Israel’s lobbying campaign against the deal went into full swing on Capitol Hill, and it didn’t take long for administration and intelligence officials to realize the NSA was sweeping up the content of conversations with lawmakers.

The message to the NSA from the White House amounted to: “You decide” what to deliver, a former intelligence official said.

NSA rules governing intercepted communications “to, from or about” Americans date back to the Cold War and require obscuring the identities of U.S. individuals and U.S. corporations. An American is identified only as a “U.S. person” in intelligence reports; a U.S. corporation is identified only as a “U.S. organization.” Senior U.S. officials can ask for names if needed to understand the intelligence information.

The rules were tightened in the early 1990s to require that intelligence agencies inform congressional committees when a lawmaker’s name was revealed to the executive branch in summaries of intercepted communications.

A 2011 NSA directive said direct communications between foreign intelligence targets and members of Congress should be destroyed when they are intercepted. But the NSA director can issue a waiver if he determines the communications contain “significant foreign intelligence.”

The NSA has leeway to collect and disseminate intercepted communications involving U.S. lawmakers if, for example, foreign ambassadors send messages to their foreign ministries that recount their private meetings or phone calls with members of Congress, current and former officials said.

“Either way, we got the same information,” a former official said, citing detailed reports prepared by the Israelis after exchanges with lawmakers.

During Israel’s lobbying campaign in the months before the deal cleared Congress in September, the NSA removed the names of lawmakers from intelligence reports and weeded out personal information. The agency kept out “trash talk,” officials said, such as personal attacks on the executive branch.

Administration and intelligence officials said the White House didn’t ask the NSA to identify any lawmakers during this period.

“From what I can tell, we haven’t had a problem with how incidental collection has been handled concerning lawmakers,” said Rep. Adam Schiff, a California Democrat and the ranking member of the House Permanent Select Committee on Intelligence. He declined to comment on any specific communications between lawmakers and Israel.

The NSA reports allowed administration officials to peer inside Israeli efforts to turn Congress against the deal. Mr. Dermer was described as coaching unnamed U.S. organizations—which officials could tell from the context were Jewish-American groups—on lines of argument to use with lawmakers, and Israeli officials were reported pressing lawmakers to oppose the deal.

“These allegations are total nonsense,” said a spokesman for the Embassy of Israel in Washington.

A U.S. intelligence official familiar with the intercepts said Israel’s pitch to undecided lawmakers often included such questions as: “How can we get your vote? What’s it going to take?”

NSA intelligence reports helped the White House figure out which Israeli government officials had leaked information from confidential U.S. briefings. When confronted by the U.S., Israel denied passing on the briefing materials.

The agency’s goal was “to give us an accurate illustrative picture of what [the Israelis] were doing,” a senior U.S. official said.

Just before Mr. Netanyahu’s address to Congress in March, the NSA swept up Israeli messages that raised alarms at the White House: Mr. Netanyahu’s office wanted details from Israeli intelligence officials about the latest U.S. positions in the Iran talks, U.S. officials said.

A day before the speech, Secretary of State John Kerry made an unusual disclosure. Speaking to reporters in Switzerland, Mr. Kerry said he was concerned Mr. Netanyahu would divulge “selective details of the ongoing negotiations.”

The State Department said Mr. Kerry was responding to Israeli media reports that Mr. Netanyahu wanted to use his speech to make sure U.S. lawmakers knew the terms of the Iran deal.

Intelligence officials said the media reports allowed the U.S. to put Mr. Netanyahu on notice without revealing they already knew his thinking. The prime minister mentioned no secrets during his speech to Congress.

In the final months of the campaign, NSA intercepts yielded few surprises. Officials said the information reaffirmed what they heard directly from lawmakers and Israeli officials opposed to Mr. Netanyahu’s campaign—that the prime minister was focused on building opposition among Democratic lawmakers.

The NSA intercepts, however, revealed one surprise. Mr. Netanyahu and some of his allies voiced confidence they could win enough votes.

***

Enter Speaker Boehner and Senate Majority Leader

The Phone Call that Upended U.S.-Israel Relations

WSJ: It started off as a routine call between then-House Speaker John Boehner and the incoming Senate majority leader, Mitch McConnell, about ways Republicans in Congress could put the brakes on the nuclear pact President Barack Obama was negotiating with Iran.

Then Messrs. Boehner and McConnell had a light-bulb moment: They could undercut Mr. Obama by extending an invitation to Israeli Prime Minister Benjamin Netanyahu to deliver a speech to a joint session of Congress opposing the emerging deal.

The initiative set in motion by Messrs. Boehner and McConnell during the Jan. 8 phone call not only would inflame hostilities between the White House and Republicans in Congress but exacerbate the biggest breakdown in relations between U.S. and Israeli heads of state in decades, as detailed in this Wall Street Journal piece.

Mr. Boehner (R., Ohio) and Mr. McConnell (R., Ky.) knew secrecy was key. If word leaked out, they believed the White House would pressure Mr. Netanyahu to decline. To ensure the invitation would come as a surprise, the leaders decided to tell only their closest aides.

“We knew this would be a poke in the eye,” a person close to the Republican leaders said of the invitation.

The immediate concern was whether Mr. Netanyahu would agree to accept the invitation. Mr. Netanyahu’s relationship with Mr. Obama was already deeply troubled. Initially, the two Republicans weren’t sure the prime minister would be eager to make that situation even worse by entering into a direct political fight with the president in Congress.

When Mr. Boehner called Israeli Ambassador Ron Dermer on Jan. 9, the ambassador said he liked the idea and would sound out the prime minister, according to a person familiar with the call.

From the beginning, Mr. Boehner wasn’t entirely comfortable with what was a clear breach of protocol. Typically, only the White House would extend such an invitation in consultations with Congress. He and Mr. McConnell did not tell the White House about their discussions at any point during the planning, congressional officials said.

(Ironically, the Obama administration had already broken the precedent by inviting the South Korean president to address Congress without first consulting Mr. Boehner.)

Mr. Boehner tapped his chief of staff, Mike Sommers, to serve as the main point of contact for Mr. Dermer in the negotiations. No one else on Mr. Boehner’s staff was told.

This was not the first time Mr. Boehner had invited the Israeli prime minister to address Congress. Early in his tenure as speaker, the Ohio Republican approached the White House about inviting Mr. Netanyahu to speak to a joint session of House and Senate members. The White House dragged its feet before eventually giving Mr. Boehner the green light to extend an invite.

In waiting on the White House, tension developed between Mr. Boehner and his no. 2, former House Majority Leader Eric Cantor (R., Va.). Mr. Cantor, for years the only Jewish Republican in the House, pushed the speaker to demand an answer from the Obama administration, but Mr. Boehner wanted to give the president and his team time to digest the idea.

In the end, Mr. Netanyahu declined the invitation.

The second time, the Republicans knew they would be stirring a partisan hornets’ nest, given the controversy about the Iranian talks.

The Boehner and McConnell teams had decided they would send a formal letter inviting Mr. Netanyahu on Jan. 21, one day after Mr. Obama’s State of the Union address.

On Jan. 20, Secretary of State John Kerry, who led the negotiations with Iran, held a 45-minute meeting with Mr. Dermer, who didn’t say a word about the pending announcement, U.S. officials said.

That afternoon, Mr. Boehner sent final word to Mr. Dermer finalizing plans to made the announcement the next day.

An Israeli official in Washington said the ambassador “felt it would be inappropriate for him to raise the issue with the administration, including in his meeting with the secretary of state, until the speaker notified them.”

In the State of the Union, the president hailed the prospects for a nuclear deal with Iran and warned Congress not to throw obstacles in the way.

“New sanctions passed by this Congress, at this moment in time, will all but guarantee that diplomacy fails, alienating America from its allies, making it harder to maintain sanctions and ensuring that Iran starts up its nuclear program again,” Mr. Obama said.

On Jan. 21, as planned, Mr. Boehner’s office formally sent the invitation to Mr. Netanyahu. A few hours before Mr. Boehner’s office released the invitation letter to the press, Mr. Boehner’s chief of staff, Mr. Sommers, called Katie Fallon, Mr. Obama’s top congressional liaison, to inform her. The initial call was cordial. Mrs. Fallon said she appreciated the heads up. The White House had yet to digest the news.

At the White House National Security Council, then-coordinator for the Middle East, Philip Gordon, reacted with disbelief when told Mr. Netanyahu would address a joint session of Congress on the Iran deal. “No he’s not,” Mr. Gordon said in response. “I talk to Dermer all the time.” In those discussions, Mr. Dermer never mentioned an impending speech, Mr. Gordon said.

An hour after Mr. Sommers told the White House, Mrs. Fallon called Mr. Boehner’s chief of staff back. This time she was not as understanding and scolded Mr. Sommers for going around the Obama administration’s back.

Senior officials demanded answers from their Israeli counterparts. Administration officials thought the idea was cooked up by Messrs. Dermer and Netanyahu, and then proposed to the Republicans in Congress. In fact, it was the other way around, congressional officials said.

Mr. Dermer told his American counterparts it was his impression the speaker’s office would “take care of” informing the White House, according to a former U.S. official.

The National Security Agency was spying on Israeli communications but didn’t pick up on the discussions between Messrs. Boehner and Dermer, nor on the deliberations that followed between Messrs. Dermer and Netanyahu on accepting the invitation.

Every Registered Voter, Personal Data Leaked

In 2014, there were 142.2 million people registered to vote in the United States, according to the U.S. Census Bureau. Forbes is reporting that a database containing 191 million voter records, which includes personal data, has been found, available for anyone to access, online by a “whitehat hacker” named Chris Vickery.

It appears that the personal details of “every registered U.S. voter” are publicly available online. When asked to pull up details on random people by Forbes, Vickery was easily and quickly able to retrieve their names, addresses, birth dates, telephone numbers, and party affiliations, with data appearing to date as early as 2000. Reportedly, no financial information or social security numbers are included in the leaked information.

Vickery has reportedly been unable to pinpoint where the data came from and who might have made it available online. Some attributes of the database led Vickery and researchers with DataBreaches.net to pursue NationBuilder, which has been said to produce similar databases in the past. NationBuilder CEO Jim Gilliam has reportedly stated that IP addresses associated with the database were not associated with the group’s customers, but that it is possible that a customer working on a “non-hosted” system could have produced it.

“From what we’ve seen, the voter information included is already publicly available from each state government so no new or private information was released in this database,” Gilliam was quoted.

A long list of potential suspected political groups have denied responsibility for the voter data leak, including NGP VAN, Political Data, L2 Political, Aristotle, and Catalist.

Vickery and DataBreaches.net were reported to have made reports with the FBI in New York. Forbes reported that the FBI recommended making a report with the Secret Service, which was said to offer no response. DataBreaches.net was said to have made reports with the California Attorney General’s office as well, according to CNET.Information contained in voter records is a matter of public record in many states. South Dakota specifies that voter information may not be placed on the Internet for “unrestricted access” or “commercial purpose.” California has some of the strictest laws protecting voter information in the country, where records are private and may only be accessed “under certain circumstances.”

“I deal with criminals every day who know my name. The thought of some vindictive criminal being able to go to this site and get my address makes me uncomfortable,” an anonymous police officer was quoted. “I’m also annoyed that people can get my voting record. Whether I vote Republican or Democratic should be my private business.”

A Twitter user pointed out that an abusive ex-spouse could use the information to locate a previous partner who does not wish to be found. For that matter, with the information available on the Internet, just about anyone can.

The exposed voter records are said not to include who the voter actually voted for, but that party affiliations are available, which may make determining who an individual likely voted for a simple task. It is noted that the information could be particularly useful during an “issues-oriented campaign.”

Just last week, Chris Vickery exposed that the personal information, including e-mail addresses, user names, and password hints of 3.3 million users registered to the website of SanrioTown.com, home to Hello Kitty, was freely available online, according to CNET. Vickery also recently found a hole allowing the personal information, including usernames and e-mail addresses, of 13 million MacKeeper users to be freely accessed online, as reported by CNET. The MacKeeper software, perhaps ironically, is a suite of security programs aimed at making Mac users safe and secure online.

*** What to be concerned with in 2016: Gartner Report

Biggest Cyber Security Threats To Watch For In 2016; Gartner Forecasts 6.8B Devices Connected To Internet Of Things In 2016

    Harriet Taylor, in a December 28, 2015 article on CNBC’s website is the latest in a series of articles on the evolving cyber threat and what may be the top cyber threats next year.  “Headless worms, machine-to-machine attacks, jailbreaking, ghostware, and two-faced malware,” top the list of key cyber threats to prepare for next year.”   In the coming year,”hackers will launch increasingly sophisticated attacks on everything from critical infrastructure, to medical devices,” said Fortinet Global Security Strategist, Derek Manky.  “We are facing an arms race in terms of security.  Every minute we sleep, we are seeing about a half a million [cyber] attack attempts that are happening in cyber space,” he added.

Here’s How The 2016 Cyber Threat Landscape Looks To Some Experts:

The rise of machine-to-machine attacks:  Research company Gartner predicts there will be 6.8B connected devices in use in 2016; a 30 percent increase over 2015.  By 2020, that number will jump to more than 20B connected devices, the company forecasts.  That would mean an average of two to three Internet-connected devices for every human being on the planet.  The sheer number of connected devices, or ‘Internet of Things (IoT), presents an unprecedented opportunity for hackers.  “We’re facing a massive problem moving forward for growing attack surface,” said Manky.

     “That’s a very large playground for attackers, and consumer and corporate information is swimming in that playground,” he said.  In its 2016 Planning Guide for Security and Risk Management, Gartner said:  “The evolution of cloud and mobile technologies, as well as the emergence [maturation?] of the IoT,’ is elevating the importance of security and risk management foundations.”

     “Smartphones present the biggest risk category going forward,” Manky believes.  “They are particularly attractive to cyber thieves because of the sheer number in use, and multiple vectors of attack, including malicious apps and web browsing;

     “We call this drive-by-attacks — websites that will fingerprint your phone when you connect to them; and, understand what that phone is vulnerable to,” Manky said,.  “Apple devices are still the most secure,” he added.  But, he also cautioned that there is no such thing as a totally safe device connected to the IoT.

Are you nurturing a headless worm?:  “The new year will likely bring entirely new [cyber] worms and viruses able to propagate from device-to-device,” predicts Fortinet.  the new year will see the first “headless worms” — malicious code — targeting “headless devices,’ such as smartwatches, smartphones, and medical hardware;”  “These are nasty bits of code that will float through millions, and millions of computers,” Manky warns.  “The largest we’ve seen to date, is about 15 million infected machines, controlled by one network — with an attack surface of 20B devices.  Certainly that number can spike to 50M, or more.  You can suddenly have a massive outage globally, in terms of all these consumer devices just simply dying and going down [dark];”

Jailbreaking the cloud:  “Expect a proliferation of attacks on the cloud, and cloud infrastructure, including so-called virtual machines, which are software-based computers.  There will be malware specifically built to crack these cloud-based systems  “Growing reliance on virtualization; and both private and hybrid clouds — will make these kind of attacks even more fruitful for cyber criminals,” according to Fortinet.  “At the same time, because apps rely on the cloud, mobile devices running compromised apps will provide a way for hackers to remotely attack public and private clouds and gain access to corporate networks.”

Hackers will use Ghostware to conceal attacks:  “As law enforcement boosts its [cyber] forensic capabilities, hackers will adapt to evade surveillance and detection,  [Stealth] malware designed to penetrate networks, steal information, then cover up its tracks will emerge in 2016.  So-called Ghostware, will make it extremely difficult for companies to track exactly how much data has been compromised, and hinder the ability of law enforcement to prosecute cyber criminals.”  

     “The attacker and the adversaries are getting much more intelligent now,” Manky said.

     “Alongside Ghostware, cyber criminals will continue to employ so-called “blastware,” which destroys and disables a system/s when detected.  “Blastware can be used to take out things like critical infrastructure, and it’s much more of a damaging attack,” he added.

     “Because attackers may circumvent preventative controls, detection and response capabilities are becoming increasingly critical,” advises Gartner in its report.

Two-Faced malware:  “Many corporations now test software in a safe environment called a sandbox, before running it on their networks.”  “A sandbox is designed  to do deeper inspection to catch some of these different ways that they’re trying to change their behaviors,” Manky said.  “It’s a very effective way to look at these new threats as we move forward.”

     “That said,” Ms. Taylor writes, “hackers in turn, are creating malevolent software that seems benign under surveillance; but, morphs into malicious code, once it’s no longer under suspicion.  It’s called……two-faced malware.”

WHAT FORTINET DID NOT ADDRESS
 
     Lots to think about with these 2016 predictions in the cyber realm.  Clearly, there is no such thing as a digital Maginot Line; and, even if there were — we all know how that worked out for France.  Stealth malware, malware that goes dormant when under surveillance; and/or changes like a chameleon, infected clouds, deceptive clouds, combat clouds, hijack clouds — one is to some degree only limited by one’s imagination.  It truly is a digital wilderness of mirrors.
     Fortinet did not address encryption and the Dark Web.  What nasty surprises will the Dark Web have for us in 2016?  Will we be able to develop something akin to a router that cleans out our pipes at home — in the digital world?  How will we ever really know if our systems are ‘clean?’  How are stay-behinds, also known as the gifts that keep on giving — likely to evolve?  What about downloading, or stealing information in an encrypted and clandestine mode?  And, one must not forget the widespread practice of denial, and deception.  How will the field of digital forensic attribution evolve?  Will it get ‘easier’ to pin the tail on the donkey?; or, more complicated and difficult?  What about the purposeful; but, sophisticated corruption of data?
    Fortinet did not address the growing threat of ransomware.  Kaspersky Labs, in  its 2016 forecast, “expects to see the success of Ransomweare to spread to new frontiers.”  “Not only does Kaspersky lab expect Ransomware to gain ground on banking trojans; but, Kaspersky also expects it to transition to other platforms; i.e., cross the rubicon — to not only target Macs; but, also charge ‘Mac prices.  Then, in the longer term, there is the likelihood of the IoT ransomware — begging the question, how much would you be willing to regain acces to your TV programming?  Your fridge?  Your car?,” Kaspersky asks.  
     Kaspersky Labs also “expects the trend of cyber ‘guns-for-hire,’ to continue to evolve and grow.”  Will we see white-hat cyber mercenaries — i.e., a different version of Anonymous — or cyber militias for hire to ‘fight’ against the bad guys?  What about black-hat cyber mercenaries, and the potential emergence of a ‘Dr. No’ in the digital world. 
Will we see the emergence of lethal, offensive cyber weapons — where the objective is to cause loss of of life?  Or, will we see the emergence of a cyber weapon of mass disruption?  A Stuxnet on steroids?  
 
    What about cyber ‘bomb damage assessment?  Can we/have we achieved the ability to conduct elegant, targeted, offensive cyber offensive operations, that do not cause excessive digital collateral damage?
 
     Will 2016 finally see a larger-scale cyber attack here in the U.S. and abroad?  
 
     Will the cyber threat to our stand-alone systems become even more profound?  It has already been demonstrated by researchers at Ben Gurion University in 2014 — that stand-alone systems could be breached using the effluent heat coming off the system.
 
     Will the cyber/digital decision tree on when to respond, how, where, why, with what, come to the fore in the strategic realm?
 
     How will cyber tradecraft evolve and mature?
     Will the Islamic State, al Qaeda, other terrorist groups attempt to launch a major cyber attack on the U.S.?