The Cyber Panic Begins: FBI, DHS and Defense

Update:  On his last press conference of the year, Barack Obama said that Sony made a mistake by surrendering to the threats posed by the hacks and Barack said he wished that the leadership of Sony has spoken to him personally. Well the truth is, Sony DID call the White House and explained the matter in detail to Obama’s senior staff. Obama lied.

FBI Director James Comey gave an intense interview about cyber war and the risks to America. The single most important job of government is to keep the homeland safe and to ensure national defense and national security. You can bet that real events and the depth of the cyber damage to America is not being told. So how bad could it be? That answer is left up to us. Yet the FBI did publish a statement on the Sony investigation.

FBI Beefs Up Amid Explosion of Cybercrime

Cybercrime is one of the priorities for the FBI, which has 13,260 special agents across the country, according to the agency.

Comey said he sees a “tremendous amount of cyberespionage going on — the Chinese being prominent among them, looking to steal our intellectual property.”

“I see a whole lot of hacktivists, I see a whole lot of international criminal gangs, very sophisticated thieves,” he said. “I see people hurting kids, tons of pedophiles, an explosion of child pornography.”

Cybercrime is one of the priorities for the FBI, which has 13,260 special agents across the country, including on Oahu, Maui and Hawaii island, according to the agency. The FBI had an $8.3 billion budget in fiscal 2014.

Forget the Sony Hack, This Could Be the Biggest Cyber Attack of 2015

By Patrick Tucker

On Friday, the FBI officially named North Korea as the party responsible for a cyber attack and email theft against Sony Pictures. The Sony hack saw many studio executives’ sensitive and embarrassing emails leaked online. The hackers threatened to attack theaters on the opening day of the offending film, “The Interview,” and Sony pulled the plug on the movie, effectively censoring a major Hollywood studio.

The end of “The Interview” is not the end of the world. Technology journalists were quick to point out that, even though the cyber attack could be attributable to a nation state actor, it wasn’t particularly sophisticated. Ars Technica’s Sean Gallagher likened it to a “software pipe bomb.” The fallout, of course, was limited. And while President Barack Obama vowed to respond to the attack, he also said it was a mistake for Sony to back down.

“I think all of us have to anticipate occasionally there are going to be breaches like this. They’re going to be costly. They’re going to be serious. We take them with the utmost seriousness. But we can’t start changing our patterns of behavior any more than we stop going to a football game because there might be the possibility of a terrorist attack; any more than Boston didn’t run its marathon this year because of the possibility that somebody might try to cause harm. So, let’s not get into that — that way of doing business,” he said at a White House briefing on Friday.

But according to cyber-security professionals, the Sony hack may be a prelude to a cyber attack on United States infrastructure that could occur in 2015, as a result of a very different, self-inflicted document dump from the Department of Homeland Security in July.

Important training video.  

2015: The Year of Aurora?

Here’s the background: On July 3, DHS, which plays “key role” in responding to cyber-attacks on the nation, replied to a Freedom of Information Act (FOIA) request on a malware attack on Google called “Operation Aurora.”

Unfortunately, as Threatpost writer Dennis Fisher reports, DHS officials made a grave error in their response. DHS released more than 800 pages of documents related not to Operation Aurora but rather the Aurora Project, a 2007 research effort led by Idaho National Laboratory demonstrating how easy it was to hack elements in power and water systems.

Oops.

The Aurora Project exposed a vulnerability common to many electrical generators, water pumps and other pieces of infrastructure, wherein an attacker remotely opens and closes key circuit breakers, throwing the machine’s rotating parts out of synchronization causing parts of the system to break down.

In 2007, in an effort to caste light on the vulnerability that was common to many electrical components, researchers from Idaho National Lab staged an Aurora attack live on CNN. The video is below.

How widespread is the Aurora vulnerability? In this 2013 article for Power Magazine:

“The Aurora vulnerability affects much more than rotating equipment inside power plants. It affects nearly every electricity system worldwide and potentially any rotating equipment—whether it generates power or is essential to an industrial or commercial facility.”

The article was written by Michael Swearingen, then manager for regulatory policy for Tri-County Electric Cooperative (now retired), Steven Brunasso, a technology operations manager for a municipal electric utility, Booz Allen Hamilton critical infrastructure specialist Dennis Huber and Joe Weiss, a managing partner for Applied Control Solutions.

Weiss today is a Defense Department subcontractor working with the Navy’s Mission Assurance Division. His specific focus is fixing Aurora vulnerabilities. He calls DHS’s error “breathtaking.”

The vast majority of the 800 or so pages are of no consequence, says Weiss, but a small number contain information that could be extremely useful to someone looking to perpetrate an attack. “Three of their slides constitute a hit list of critical infrastructure. They tell you by name which [Pacific Gas and Electric] substations you could use to destroy parts of grid. They give the name of all the large pumping stations in California.”

The publicly available documents that DHS released do indeed contain the names and physical locations of specific Pacific Gas and Electric Substations that may be vulnerable to attack.

Defense One shared the documents with Jeffrey Carr, CEO of the cyber-security firm Taia Global and the author of Inside Cyber Warfare: Mapping the Cyber Underworld. “I’d agree…This release certainly didn’t help make our critical infrastructure any safer and for certain types of attackers, this information could save them some time in their pre-attack planning,” he said.

Perpetrating an Aurora attack is not easy, but it becomes much easier the more knowledge a would-be attacker has on the specific equipment they may want to target.

How easy is it to launch an Aurora attack?

In this 2011 paper for the Protective Relay Engineers’ 64th Annual Conference, Mark Zeller, a service provider with Schweitzer Engineering Laborites lays out—broadly—the information an attacker would have to have to execute a successful Aurora attack. “The perpetrator must have knowledge of the local power system, know and understand the power system interconnections, initiate the attack under vulnerable system load and impedance conditions and select a breaker capable of opening and closing quickly enough to operate within the vulnerability window.”

“Assuming the attack is initiated via remote electronic access, the perpetrator needs to understand and violate the electronic media, find a communications link that is not encrypted or is unknown to the operator, ensure no access alarm is sent to the operators, know all passwords, or enter a system that has no authentication.”

That sounds like a lot of hurdles to jump over. But utilities commonly rely on publicly available equipment and common communication protocols (DNP, Modbus, IEC 60870-5-103, IEC 61850, Telnet, QUIC4/QUIN, and Cooper 2179) to handle links between different parts their systems. It makes equipment easier to run, maintain, repair and replace. But in that convenience lies vulnerability.

In their Power Magazine article, the authors point out that “compromising any of these protocols would allow the malicious party to control these systems outside utility operations.”

Defense One reached out to DHS to ask them if they saw any risk in the accidental document dump. A DHS official wrote back with this response: “As part of a recent Freedom of Information Act (FOIA) request related to Operation Aurora, the Department of Homeland Security (DHS) National Programs and Protection Directorate provided several previously released documents to the requestor. It appears that those documents may not have been specifically what the requestor was seeking; however, the documents were thoroughly reviewed for sensitive or classified information prior to their release to ensure that critical infrastructure security would not be compromised.”

Weiss calls the response “nonsense.”

The risk posed by DHS accidental document release may be large, as Weiss argues, or nonexistent, as DHS would have you believe. But even if it’s the latter, Aurora vulnerabilities remain a key concern.

Perry Pederson, who was the director of Control Systems Security Program at DHS in 2007 when the Aurora vulnerability was first exposed, said as much in a blog post in July after the vulnerability was discovered. He doesn’t lay blame at the feet of DHS. But his words echo those of Weiss in their urgency.

“Fast forward to 2014. What have we learned about the protection of critical cyber-physical assets? Based on various open source media reports in just the first half of 2014, we don’t seem to be learning how to defend at the same rate as others are learning to breach.”

Aurora vs. the Sony Hack

In many ways the Aurora vulnerability is a much harder problem to defend against than the Sony hack, simply because there is no obvious incentive for any utility operator to take any of the relatively simple costs necessary to defend against it. And they are simple. Weiss says that a commonly available device installed on vulnerable equipment could effectively solve the problem, making it impossible to make the moving parts spin out of synchronization. There are two devices on the market iGR-933 rotating equipment isolation device (REID) and an SEL 751A, that purport to shield equipment from “out-of-phase” states.

To his knowledge, Weiss says, Pacific Gas and Electric has not installed any of them anywhere, even though the Defense Department will actually give them away to utility companies that want them, simply because DOD has an interest in making sure that bases don’t have to rely on backup power and water in the event of a blackout. “DOD bought several of the iGR-933, they bought them to give them away to utilities with critical substations,” Weiss said. “Even though DOD was trying to give them away, they couldn’t give them to any of the utilities because any facility they put them in would become a ‘critical facility’ and the facility would be open to NERCCIP audits.”

Aurora is not a zero-day vulnerability, an attack that exploits an entirely new vector giving the victim “zero days” to figure out a patch. The problem is that there is no way to know that they are being implemented until someone, North Korea or someone else, chooses to exploit them.

Can North Korea pull of an Aurora vulnerability? Weiss says yes. “North Korea and Iran and are capable of doing things like this.”

Would such an attack constitute an act of cyber war? The answer is maybe. Speaking to reporters at the Pentagon on Friday, Pentagon Press Secretary Rear Adm. John Kirby said “I’m also not able to lay out in any specificity for you what would be or wouldn’t be an act of war in the cyber domain. It’s not like there’s a demarcation line that exists in some sort of fixed space on what is or isn’t. The cyber domain remains challenging, it remains very fluid. Part of the reason why it’s such a challenging domain for us is because there aren’t internationally accepted norms and protocols. And that’s something that we here in the Defense Department have been arguing for.”

Peter Singer, in conversation with Jason Koebler at Motherboard, says that the bar for actual military engagement against North Korea is a lot higher than hacking a major Hollywood movie studio.

“We didn’t go to war with North Korea when they murdered American soldiers in the 1970s with axes. We didn’t go to war with North Korea when they fired missiles over our allies. We didn’t go to war with North Korea when one of their ships torpedoed an alliance partner and killed some of their sailors. You’re going to tell me we’re now going to go to war because a Sony exec described Angelina Jolie as a diva? It’s not happening.”

Obama said Friday that there would be some sort of response to the hack, but declined to say what. “We have been working up a range of options. They will be presented to me. I will make a decision on those based on what I believe is proportional and appropriate to the nature of this crime,” he said.

Would infrastructure vandalism causing blackouts and water shutdowns constitute an act of war? The question may be moot. Before the United States can consider what sort of response is appropriate to cyber attacks, it must first be able to attribute them.

The FBI was able to finger North Korea for the hack after looking at the malware in the same way a forensics team looks for signs of a perpetrator at the scene of the crime. “Technical analysis of the data deletion malware used in this attack revealed links to other malware that the FBI knows North Korean actors previously developed. For example, there were similarities in specific lines of code, encryption algorithms, data deletion methods, and compromised networks,” according to the FBI statement.

An Aurora vulnerability attack, conversely, leaves no fingerprints except perhaps a single IP address. Unlike the Sony hack, it doesn’t require specially written malware to be uploaded into a system, Malware that could indicate the identity of the attacker, or at least his or her affiliation. Exploiting an Aurora attack is simply a matter of gaining access, remotely, possibly because equipment is still running on factory-installed passwords, and then turning off and on a switch.

“You’re using the substations against whatever’s connected to them. Aurora uses the substations as the attack vector. This is the electric grid being the attack vector,” said Weiss, who calls it “a very, very insidious” attack.

The degree to which we are safe from that eventuality depends entirely on how well utility companies have put in place safeguards. We may know the answer to that question in 2015.

 

U.S. Schools Courtesy of Gulen

Anyone remember the Barack Obama famous Cairo speech? In April of 2009, Barack delivered a long message siding with Islam and opening the door for radicals to launch their agendas and local schools in America were included.

But setting the table for what is below is this: He is in the United States.

Turkey issues arrest warrant for cleric Gulen – state media

(Frank J.Gaffney Jr. The Wash.Times:11 Dec.2012)

It is a commonplace saying, but one that most of us ignore: If something sounds too good to be true, it probably is. This applies in spades to a proposal under active consideration by the school board in Virginia’s Loudoun County. It would use taxpayer funds to create a charter school to equip the children of that Washington exurb with enhanced skills in science, technology, engineering and mathematics disciplines. Ostensibly, they will thus be equipped to compete successfully in the fields expected to be at the cutting edge of tomorrow’s workplace.

What makes this initiative, dubbed the Loudoun Math and IT Academy, too good to be true? Let’s start with what is acknowledged about the proposed school.

The academy’s board is made up of a group of male Turkish expatriates. One of them, Fatih Kandil, was formerly the principal of the Chesapeake Science Point Public Charter School in Anne Arundel County, Md. Another is Ali Bicak, the board president of the Chesapeake Lighthouse Foundation, which owns Chesapeake Science Point and two other charter schools in Maryland. The Loudoun Math and IT Academy applicants expressly claim that Chesapeake Science Point will be the model for their school.

The taxpayers of Loudoun County and the school board elected to represent them should want no part of a school that seeks to emulate Chesapeake Science Point, let alone be run by the same people responsible for that publicly funded charter school. For one thing, Chesapeake Science Point has not proved to be the resounding academic success the applicants claim. It does not appear anywhere in the acclaimed U.S. News & World Report lists of high-performing schools in Maryland, let alone nationwide — even in the subsets of mathematics or charter schools.

What is more, according to public documents chronicling Anne Arundel County Public Schools’ dismal experience with Chesapeake Science Point, there is significant evidence of chronic violations of federal, state and local policies and regulations throughout its six years of operations, with little or inconsistent improvement, reflecting deficiencies in fiscal responsibility and organizational viability.

Why, one might ask, would applicants for a new charter school cite so deeply problematic an example as their proposed institution? This brings us to aspects of this proposal that are not acknowledged.

Chesapeake Science Point is just one of five controversial schools with which Mr. Kandil has been associated. He was previously the director at the Horizon Science Academy in Dayton, Ohio; the principal at the Wisconsin Career Academy in Milwaukee and at the Baltimore Information Technology Academy in Maryland; and one of the applicants in a failed bid to establish the First State Math and Science Academy in Delaware.

These schools have something in common besides their ties to the peripatetic Fatih Kandil. They have all been “inspired” by and in other ways are associated with Fethullah Gulen, a Turkish supremacist and imam with a cultlike following of up to 6 million Muslims in Turkey and elsewhere around the world. More to the point, Imam Gulen is the reclusive and highly autocratic leader of a global media, business, “interfaith dialogue” and education empire said to be worth many billions that is run from a compound in the Poconos.

This empire — including its roughly 135 charter schools in this country and another 1,000 abroad — and its adherents have come to be known as the Gulen Movement. Those associated with it, in this country at least, are assiduously secretive about their connections to Imam Gulen and his enterprise. For example, the Loudoun Math and IT Academy applicants, their spokeswoman and other apologists have repeatedly misled the Loudoun school board, claiming that these Turkish gentlemen and their proposed school have nothing to do with Imam Gulen.

There are several possible reasons for such professions. For one, the Gulen schools are reported to be under investigation by the FBI. A growing number of them — including Chesapeake Science Point — have also come under critical scrutiny from school boards and staff around the country. In some cases, they have actually lost their charters for, among other reasons, chronic financial and other mismanagement and outsourcing U.S. teachers’ jobs to Turks.

The decisive reason for the Gulenist lack of transparency, however, may be due to their movement’s goals and modus operandi. These appear aligned with those of another secretive international organization that also adheres to the Islamic doctrine known as Shariah and seeks to impose it worldwide — the Muslim Brotherhood. Both seek to accomplish this objective by stealth in what the Brotherhood calls “civilization jihad” and Imam Gulen’s movement describes as “jihad of the word.”

This practice enabled the Gulenists to help transform Turkey from a reliable, secular Muslim NATO ally to an Islamist state deeply hostile to the United States — one aligned with other Islamic supremacists, from Iran to the Muslim Brotherhood to Hamas to al Qaeda. Fethullah Gulen’s followers clearly don’t want us aware of the obvious dangers posed by their penetration of our educational system and influence over our kids.

The good news is that members of the Loudoun County school board have a code of conduct that reads in part: “I have a moral and civic obligation to the nation which can remain strong and free only so long as public schools in the United States of America are kept free and strong.” If the board members adhere to this duty, they will reject a seductive Loudoun Math and IT Academy proposal that is way too “good” to be true.

So what has happened since the launch of these schools around the country?

FBI raids Concept Schools in Illinois, 2 other states

The FBI and two other federal agencies conducted raids in Illinois and two other states at charter schools run by Des Plaines-based Concept Schools, FBI officials said Tuesday.

Search warrants were executed at 19 Concept schools in connection with an “ongoing white-collar crime matter,” said Vicki Anderson, a special agent in the Cleveland FBI office that’s leading the probe.

The U.S. Department of Education and the Federal Communications Commission also were involved in the June 4 raids, but officials said the warrants remain under seal, and they wouldn’t give any details about the investigation. 

The raids targeted Concept schools in Illinois — where Concept has three schools in Chicago and one in Peoria — as well as in Indiana and Ohio.

FBI RAIDS TURKISH GULEN CHARTER SCHOOL IN LA

Dec 14, 2013 by

fbi_raid“Finally FBI Raids Turkish Gulen Charter School in Louisiana”

by Donna Garner 12.13.13   

12.12.13 — To view the FBI raid of the Gulen charter school in East Baton Rouge, please go to the following link on WBRZ.com. The Gulen charter schools are tied to Fethullah Gulen who is an Islamist imam.  Kenilworth Science and Technology School is connected to the Pelican Foundation, Cosmos Foundation in Texas, Atlas Texas Construction and Trading (a Houston-based contractor), Harmony Charters in Texas, and to other Gulen/Turkish entities around the United States and Turkey:  http://www.wbrz.com/videos/fbi-raid-another-scandal-for-charter-school-company/   

===========  

12.11.13 — To read the full story about the FBI raid on the Gulen charter school, please read further: “FBI Raid Another Scandal for Gulen Charter School Company”

http://www.wbrz.com/news/fbi-raid-another-scandal-for-charter-school-company/   

EXCERPTS FROM THIS ARTICLE:

BATON ROUGE- Wednesday evening’s FBI raid on a charter school in East Baton Rouge is the latest item in a list of scandals involving the organization that holds the charter for the Kenilworth Science and Technology School.

Pelican Educational Foundation runs the school [and also Abramson] and has ties to a family from Turkey. The organization lost its school in New Orleans amid allegations of sexual misconduct among students that prompted a state investigation on campuses in the Crescent City and in Baton Rouge. It has also faced lawsuits and allegations from teachers about bad learning environments.

“It was an atmosphere where there was a double standard,” one former teacher told WBRZ News 2 in an investigation into the school in EBR. Former teachers were not happy with how things were handled when they spoke with a station reporter two years ago.

No one was ever charged in the sex allegations a school spokesperson pointed out Wednesday as federal investigators moved through the campus collecting items, putting them in boxes and then loading them into a van.

The school receives about $5,000,000 in local, state, and federal tax money. In 2012, the Pelican group was accused of improperly handling money by the Legislative Auditor. A report found about $8600 was improperly used to buy gifts for students who scored high on LEAP tests.

About the same time as allegations and lawsuits began dealing with Pelican charter schools, a BESE member took an improper trip on behalf of another Turkish organization. Linda Johnson, who is no longer on BESE, was fined for breaking the law by the ethics board. She got an all expenses paid trip to Turkey.

Kenilworth Science and Technology School will be open Thursday.

 

U.S. Boots in Iraq, Fire Fight

A number of militants have been killed in Islamic State’s very first battle with U.S. ground troops after the extremists attempted to overrun an Iraqi military base.

The militants attacked Ein al-Asad military base on Sunday where more than 100 U.S. military support troops are based.

Despite launching the surprise attack just after midnight, ISIS’s offensive was swiftly repelled when U.S. troops and F18 jets joined in the skirmish in support of the Iraqi Army.

Facing both Iraqi and US troops supported by F18 jets, an unknown number of ISIS attackers were killed during the two hour firefight before being forced to retreat.

Ein al-Asad came under repeated attack by ISIS troops in October, however, now bolstered by the U.S. assistance, it poses a much more formidable target.

A fighter from the Kurdish People’s Protection Unit, or YPG, told CNN’s Arwa Damon that the battle in Kobani concerned the main border crossing into Turkey. If ISIS took control, he said, “it’s over.”

The fighter said the Kurdish fighters had pushed back an attempted advance by ISIS on Monday morning but that it would be “impossible” for them to hold their ground if current conditions continued.

Watch this video

Kurds prepare for final battle with ISIS

Should they take Kobani, the militants would control three official border crossings between Turkey and Syria and a stretch of the border about 60 miles (97 kilometers) long.

Monday has been one of the most violent days in Kobani since ISIS launched its assault on the Syrian city, with sounds of fierce fighting, including gunfire and explosions, CNN staff on the Syria-Turkey border said.

CNN’s Nick Paton Walsh described seeing a mushroom cloud rising about 100 meters (nearly 330 feet) above the city in an area targeted by at least four blasts, generally after the sound of jets overhead.

“However, it remains unclear who is gaining the upper hand,” Walsh said. “Distribution of the airstrikes does not immediately suggest the Kurds are retaking the center so far.”

Several Top Islamic State Leaders Have Been Killed in Iraq, U.S. Says

Three Key Islamic State Figures Were Killed in Recent Weeks, Chairman of Joint Chiefs Says

WASHINGTON—U.S. airstrikes have killed several very senior military leaders of Islamic State forces in Iraq, the Pentagon’s top uniformed officer disclosed Thursday.

Gen. Martin Dempsey, the chairman of the Joint Chiefs of Staff, said in an interview with The Wall Street Journal that three key Islamic State military leaders in Iraq were killed there in recent weeks during operations that are part of an expanding coalition effort ahead of a planned offensive next year.

The strikes in which the Islamic State leaders were killed were designed to hamper the group’s ability to conduct its own attacks, supply its fighters and finance its operations, Gen. Dempsey said.

“It is disruptive to their planning and command and control,” Gen. Dempsey said. “These are high-value targets, senior leadership.”

***

Some progress is being made. Certain intelligence gathering has proven to be productive.

One ISIS thug suspected of killing 150 girls, women

One Islamic State militant is alone responsible for killing 150 women, including pregnant women and young teenagers, because they refused to marry members of the barbaric militant army, according to Iraqi officials.

Abu Anas Al-Libi is suspected of mercilessly gunning down the women,most of whom were Yazidi, because they refused to enter into sham temporary marriages with Islamic State fighters simply to have sex in what the terrorists believe to be a Koranic loophole.

“Abu Anas Al-Libi killed more than 150 women and girls, some of whom were pregnant after refusing to accept Jihad marriage,” the Iraqi Ministry of Human Rights said in a statement.

The forced relationships are being pushed on captives in cities like Fallujah and surrounding villages. The statement added that Islamic State militias carried out mass executions in the city, then buried the dead in two mass graves in Al-Zaghareed and Al-Saqlawiya areas. The terror group then turned a mosque in Fallujah into a big prison, holding hundreds of men and women, the statement said.

Al- Libi is not the terrorist with the same name who is alleged to have helped carry out East Africa’s embassy bombings back in 1998 that killed 224 people in Kenya and Tanzania.

In a separate report released on Monday, the ministry said that Islamic State distributed an eight-page pamphlet to mosques in the Iraqi city of Mosul and nearby towns on the topic of female captives and slaves.

According to the Middle East Media Research Institute, the pamphlet titled “Questions & Answers on Taking Captives & Slaves” clarifies what the terror group believes permissible for its militants to do with their captives, including having sexual intercourse, beating and trading them.

“This is a cheap ‘Fatwa’ that is far from what Islam really stands for and is in violation of human rights,” the Iraqi ministry said. “It is a portrayal of these murderers’ devilish-like behavior and low moral standing.”

Hamas, Terror Designation, Yes-No-Maybe

There are countless militant terror organizations globally and there is a movement to re-look at designations such that enemies are being legitimized and are offered seats at negotiations and peace tables.  Hamas has a deep history of terror and is very integrated with other nation states without consequence to the detriment of Europe, Israel and the United States.

In the case of legal representation, Hamas has a nefarious lawyer who was recently sentenced to 18 months in prison for tax evasion.

The EU General Court has ordered that the Palestinian militant group Hamas be removed from the bloc’s terror blacklist. The move comes over four years after Hamas appealed its terror designation before the EU.  The lawyer for Hamas, Liliane Glock, told AFP she was “satisfied with the decision.”

Hamas official Izzat al-Rishq lauded the decision, saying the court had righted an injustice done to the organization, which he said is a “national freedom movement,” and not a terrorist organization, the Jerusalem Post reports.

But a deputy from Israel’s major right-wing Likud party, Danny Danon, said, “The Europeans must believe that there blood is more sacred than the blood of the Jews which they see as unimportant. That is the only way to explain the EU court’s decision to remove Hamas from the terror blacklist.”

“In Europe they must have forgotten that Hamas kidnapped three boys and fired thousands of rockets last summer at Israeli citizens,” he added.

Shortly after the ruling, Israeli Prime Minister Benjamin Netanyahu called on the EU to keep Hamas on its list of terrorist organizations.

“We expect them to immediately put Hamas back on the list,” Reuters cites Netanyahu as saying in a statement. “Hamas is a murderous terrorist organization which in its charter states its goal is to destroy Israel.”

The EU and Israel have attempted to downplay the ruling, saying that groups standing within Europe as terror organizations will not change. Israeli and European officials say the court will be given a few months to rebuild its file against Hamas with evidence of the group’s activities, which will enable it to be placed back on the list of terror organizations, the Israeli news portal Ynet reports.

According to RT’s Paula Slier, Israeli politicians “across the political spectrum” have unanimously condemned what they call a “temporary” removal.

HAMAS BUOYED

Hamas says it is a legitimate resistance movement and contested the European Union’s decision in 2001 to include it on the terrorist list. It welcomed Wednesday’s verdict.

“The decision is a correction of a historical mistake the European Union had made,” Deputy Hamas chief Moussa Abu Marzouk said. “Hamas is a resistance movement and it has a natural right according to all international laws and standards to resist the occupation.”

The EU court did not ponder the merits of whether Hamas should be classified as a terror group, but reviewed the original decision-making process. This, it said, did not include the considered opinion of competent authorities, but rather relied on media and Internet reports.

It said if an appeal was brought before the EU’s top court, the European Court of Justice, the freeze of Hamas funds should continue until the legal process was complete.

In a similar ruling, an EU court said in October the 2006 decision to place Sri Lanka’s Tamil Tigers on the EU list was procedurally flawed. As with Hamas, it also said the group’s assets should remain frozen pending further legal action and the European Union subsequently filed an appeal.

The European Parliament has approved a non-binding resolution supporting Palestinian statehood. The text was a compromise, representing divisions within the EU over how far to blame Israel for failing to agree peace terms.

***

Enter France…

Middle East/Hamas/European Union – Statement by the Ministry of Foreign Affairs and International Development Spokesman

Paris, 17 December 2014

On 17 December the European Union’s [General] Court cancelled the inclusion of Hamas on the European list of terrorist organizations, where it had been since 2001.

This cancellation is based on procedural reasons alone.

In no way does it imply any questioning of the European Union’s determination to combat all forms of terrorism.

It does not alter our appreciation of the basic fact: Hamas was described as a terrorist group by the Council of the European Union on 27 December 2001. The European Union [General] Court has also decided to maintain the effects of the inclusion, such as the freezing of Hamas funds.

France will act to ensure that Hamas is included on the list again as soon as possible

For One Syrian Militant Group, “Pick-Up Lines” Have a Texas Twang

For One Syrian Militant Group, “Pick-Up Lines” Have a Texas Twang

 

A pick-up truck that belonged to a Texas plumber a year ago wound up in jihadi hands. How did it get there? Here is what we know – and what the mainstream media and a handful of angry, completely confounded Americans do not know.  

By Tom Wyld

For the past week, #HiveInt, the league of strategists and intelligence analysts on Twitter, have been digging deeper into a report, first written by Caleb Weiss, on the appearance of a pick-up truck on the internet.

But this was no ordinary pick-up truck advertised on E-Bay.

The Ford F-250 photo was posted on the website of a self-identified Syria-based militant alliance, and the men onboard were members of a largely Chechen anti-Assad militant group.

And mounted on the truck bed: a Russian-made heavy machine gun.

The truck’s logo captured everyone’s attention – including press here and abroad. The logo was not that of the Chechen fighters’ Jaish al-Muhajireen wal-Ansar (“Army of Emigrants and Supporters”). It was not the sign of the alliance to which this particular Jaish or Army belongs, namely Jabhat Ansar al-Din (“Partisans of the Religion Front”).

The logo was that of Mark-1 Plumbing of Texas City, Texas – complete with the small business’ phone number.

According to the militant posting, the photo was taken in Aleppo, Syria’s largest city ravaged by violence, jihadi infighting and the war against dictator Bashar Al-Assad. Aleppo is also 20 miles west of Al-Safirah, site of Assad’s largest chemical weapons compound. A writer with the blog Line of Steel and a contributor to the warrior-favorite Long War Journal, Caleb Weiss was first to break the story. Bravo Zulu to this young political science student who studies security policy and militant trends. (Unmarked photo from a militant site.)  

I telephoned the Texas firm. Many rings, no answer, no voice mail. Caleb Weiss was more fortunate. He reached a “very nice woman” who was “happy” to answer his questions about the pick-up. When he said he had called about a photo, the woman knew which one. After all, she had received many phone inquiries about it before Caleb’s call.

Not surprisingly, those calls included “about six” that were “threatening” and voiced by people the employee “couldn’t understand.” The woman said the firm had notified the authorities about the photo and the threats. Read Caleb’s post for details here.  Keep in mind his was the first report on the incident posted on Monday, 15 December. Since then, the story has garnered major media attention, has undergone many twists and turns and prompted outraged, threatening phone calls – and the employee understood all to0 well those additional angry calls.

The Fabled Truck – Sold, But By Whom? 

By Tuesday, CBS News reported that the firm had brought an attorney aboard. Presumably this was the small business’ “representative” who told CBS the pick-up was sold in October 2013 to Auto Nation. An Auto Nation representative refused to provide the network the vehicle’s sales history over the phone and hung up.

 

Also on Tuesday, ABC News reported the truck was driven to Auto Nation and traded “last fall.” The truck was then sent to auction and subsequently sold to a “Southwest Houston” company. It may have been sold many times since. A source describes the area in SW Houston as a “heavy immigrant and auto trading” hub – a motor-mecca, if you will.

Today (Wednesday, 17 December), the Galveston County Daily News wrote that the truck was sold to Auto Nation “three years ago,” attributing the statement to Mark-1 owner Mark Oberholtzer. The businessman said he usually takes his firm’s decals off the truck when they are sold, but reckoned Auto Nation would do that for him.

Among the decals on the F-250 in question? A state inspection sticker that expired September 2013. But state inspections must be conducted annually in Texas, casting doubt on the claim by the Galveston County Daily News that the truck was sold “three years ago.”

Also in support of a transaction occurring last year, USA Today reported today that Mr. Oberholtzer drove the truck to Auto Nation and traded it in November 2013. 

In short, give or take a month or two, Mark-1’s pick-up truck was sold legitimately about a year ago to a dealer and, from there, to an auctioneer.

So How Did a Texas Truck Get to a Battlefield in Syria? 

Aboard ship, obviously. But how did the truck get aboard ship? That is the trickier question.

“Technicals” – intelligence parlance for pick-up trucks modified for combat use – are the vehicles-of-choice for militants worldwide. Conflicts and hot zones are expanding, not contracting, and that creates a burgeoning demand and, therefore, a black market, for plain vanilla pick-ups, even from the U.S. Only upon arrival in an area controlled by jihadis are the pick-ups converted to “technicals.”

From the dealership to an auction in Southwest Houston, the truck was likely loaded into a container that was ultimately lifted aboard a container ship (a.k.a. “box ship” among mariners) moored pier-side at the Port of Galveston or Port of Houston. The Port of Galveston accommodates about 1,000 ships and handles 10 million short tons of cargo annually. Much of that cargo is inside containers. The sort of boxes motorists see aboard trains and trucks on the highway, these containers are measured in “Twenty-Foot Equivalent units” or TEUs.

The world’s largest box ship, EMMA MAERSK, can carry more than 18,000 TEUs. If every container aboard EMMA MAERSK held cars or trucks, that would equate to 36,000 vehicles. (Promotional photo from The Maersk Group.) 

Assessment: Jihadi Sympathizers Love East Coast Seaports 

Assessment number one: Alarmingly, citing Mr. Oberholtzer, USA Today reported that recent threats are being conveyed from people across the USA. “We have a secretary here,” he said. “She’s scared to death. We have families. We don’t want no problems.” Presumably, some of those American callers are making the outrageous leap that, by selling the truck last year, he was aiding jihadis.

Here’s an assessment from a former Navy commander in his sixth year of intelligence and counterterrorism analysis – namely, me: Neither Mr. Oberholtzer, his firm nor his employees have anything whatsoever to do with Islamic militants, and Americans have no right or foundation to assert same, much less place angry, threatening phone calls. Basing those angry calls on reports by mainstream media (which those same callers uniformly mistrust) only serves to double their shameful behavior. Knock it off.

Assessment number two: The Ports of Galveston and Houston are not alone. I assess that used car dealers in close proximity to east coast seaports are shipping pick-up trucks to all sorts of legitimate buyers overseas. Some find their way to recipients in, say, Turkey and the Middle East. Most are legit. Some are not.

Shipping is a simple affair. The shipper completes a manifest or cargo declaration (“1 pick-up truck, brand ABC, worth X dollars”), signs the form, seals and locks the container, and off it goes. On arrival, only the recipient listed on the manifest may open the container, and the truck rolls to its final destination.

What about inspecting all containers? Impossible, impractical and wholly disruptive of an extremely time-sensitive business. And also fruitless. The top 25 U.S. ports that accommodate container ships handle 11 million TEUs annually.

What if authorities opened the container that held the Texas truck? What would they find? Why, they’d find a truck – the very one lawfully owned and accurately listed on the manifest. To get a handle on this, law enforcement and port security must look ashore – upstream from the seaport, not along the waterfront.

In closing, I have only one source for the following piece of evidence, but that source has proven impeccable.

In the case of the truck that took to sea from a Galveston or Houston seaport, the shipper was not a plumber in Texas.

He is a Syrian.

[SIDEBAR IS BELOW—–]

Are the New F-250 Owners Al Qaeda?  

Not according to research by Aymenn Jawad Al-Tamimi, an Oxford graduate and analyst with the Middle East Forum, a think-tank devoted to promoting American interests in the region. That said, Chechen jihadis in Syria vs. Al Qaeda may be a difference without a distinction.

The new truck owners’ group, Jaish al-Muhajireen wal-Ansar (JMWA) belongs to an alliance of three other groups formed in July 2013. The alliance is called Jabhat Ansar al-Din (JAD). The pick-up photo was found on the JAD website.

In November 2013, JMWA transformed when its previous leader and a cadre of his followers joined Ad-Dawlah Al-Islamiyya (“The Islamic State” or IS, now mislabeled by the White House, the Pentagon and mainstream media as “ISIS” or “ISIL”). Made up largely of Chechen jihadis, JMWA can best be viewed as the Syria-based wing of the Caucasus Emirate, designated a foreign terrorist organization by the U.S. and many other nations.

Fighters in Syria from the largely Chechen Jaish al-Muhajireen wal-Ansar (JMWA). (Photo from a jihadi site, courtesy of Caleb Weiss) 

JAD and its 4 member-groups advocate Shari’a Law and the formation of a caliphate and oppose the U.S.-led coalition operating above, if not in, Syria and Iraq. The alliance opposes the U.S. and the West for all the usual reasons that prompt militants to kill Westerners: from Afghanistan and Gitmo to the fuel rod of Islamist rage: “the Jews’ occupation of Al-Aqsa” mosque in Jerusalem. So, JAD hardly consists of the “moderate Syrian rebels” Congress has just voted to arm.

So JAD is akin to IS and the Al-Qaeda-linked Jabhat al-Nusra (“Victory Front” or JAN). JAD, however, will not join JAN and wants nothing at all to do with IS. Their fighters don’t even refer to IS by name. Reasons: fierce competition among the groups, persistent enmity between leaders and perhaps a non-aggression pact, however tacit. Said one JAD spokesman to analyst Aymenn Al-Tamimi: “We don’t fight [IS], and they don’t fight us. Anyone who says [JAD] is affiliated with [IS] is lying.”

Thus, the new owners of a Texas plumber’s old pick-up truck hate us for the same reasons IS and JAN hate us. All are driving hard toward the same destination. Each just prefers to travel alone and via a different route.

__________

A former Navy Commander, Tom Wyld served nearly 5 years as director of intelligence for a private security firm specializing in training and operational support of U.S. Navy SEALs. He continues to provide intelligence, investigative and counterterrorism support to former SEALs. Prior assignments include Communications Coordinator, Swift Boat Veterans & POWs for Truth; lobbyist for State Motorcyclists’ Rights Organizations (e.g., ABATEs); and Chief of Staff and PR Director for the Institute for Legislative Action, the lobbying and political arm of the NRA.