Investigating U.S. Based Islamic Charities

The most famous case was the Holyland Foundation Trial where millions of dollars from the United States found the pockets of global terrorists. Not much came of this in total due in part to Eric Holder. It is imperative that readers trace money and people domestically as it still goes on. Here is a link to use as a launch pad for continues whistleblowing.

Meanwhile, it appears that the UK is beginning to do some good work in investigating charities and it is likely the same thing occurs in America. These people and charities in America have tax exempt status from the IRS.

Charity Commission: British charities investigated for terror risks

William Shawcross, the chair of the Charity Commission, warns that money donated by the British public may already have been sent to Islamic State fighters, as the watchdog opens cases on 86 aid groups at risk from extremists

By , Robert Mendick, and Andrew Gilligan

The government’s charity watchdog has launched a series of formal investigations into British aid organisations, amid concerns that they are at risk of being hijacked by terrorists in Syria and Iraq.

The head of the Charity Commission told The Telegraph he fears that groups distributing money and supplies donated by the public in Britain could be exploited by Islamists to smuggle cash, equipment and fighters to terrorists on the front line.

The regulator has begun scrutinising 86 British charities which it believes could be at risk from extremism, including 37 working to help victims of the Syria crisis, according to new figures released today.

It has launched full-scale investigations into four charities operating in the region, including the group that employed the murdered hostage Alan Henning when he was kidnapped, and another organisation allegedly infiltrated by a suicide bomber.

The number of terrorism-related cases that the regulator is examining has almost doubled since February, amid growing concerns that charities working in the region are potential targets for the so-called Islamic State in Iraq and the Levant (Isil, also known as Islamic State, and Isis).

William Shawcross, the chair of the Commission, said there was “a risk” that money donated by the British public had already been sent to Isil fighters, who have beheaded two British hostages, among many other victims, and are holding a third.

“It is absolutely terrifying to see these young British men going out to be trained in Syria and coming back here,” Mr Shawcross said.

“Most of them are not going out under the auspices of charities but, when that happens, it is absolutely our duty to come down on it.

“Even if extremist and terrorist abuse is rare, which it is, when it happens it does huge damage to public trust in charities. That’s why I take it very seriously.”

The warning comes at a critical time for global efforts to stem the flow of money to terrorists in Iraq and Syria.

The Telegraph’s Stop the Funding of Terror campaign, which has won wide support in Parliament, the military and overseas, is calling for action to cut off terrorist finance.

The Commission, which regulates charities in England and Wales, has worked with the government of Qatar as well as Kuwait and Saudi Arabia, among others, to strengthen their systems for regulating charitable groups.

However, despite these efforts, funded by British taxpayers, America warned earlier this month that Qatar and Kuwait remain “permissive” regimes in which terrorist financiers are able to operate.

Analysts fear that millions of dollars in so-called charitable donations raised inside Qatar and Kuwait have been used to buy weapons and supplies for jihadists in Iraq and Syria. In other developments this weekend:

:: The brother of David Haines, the British hostage executed by his captors, has made an impassioned plea to Gulf States to strangle the funding to terror groups operating in Syria and Iraq. Michael Haines told The Telegraph: “We have to attack their finances. We need to fight them on every front that we can find. We have to destroy them.”

:: It has emerged that the cousin of Qatar’s foreign minister has been convicted of funding international terrorism. Abdulaziz bin Khalifa al-Attiyah was found guilty in absentia by a Lebanese court for channelling financial support to al-Qaeda.

:: Lord Lamont, the former chancellor, praised the Telegraph in Parliament for “highlighting the movement of funds to terrorist groups in the Middle East” as he pressed ministers to raise the issue with Gulf rulers.

:: Foreign Office Minister Baroness Anelay promised that Britain was having “robust” talks with Qatar and other Gulf states as she called for “much greater progress” to stop terror financing. The minister revealed that Isil gets most of its money from selling oil, extortion, and hostage ransoms, as well as from foreign donations.

:: The government is facing new questions over the “extraordinary” inconsistencies in British action against terrorist financiers, after it emerged that terrorists whose assets have been frozen under Treasury sanctions may not be banned from travelling to the UK. Stephen Barclay, a Conservative MP, called on his own party leadership to “spell out” why Britain has a different sanctions regime against Qatari terror financiers from America, the UK’s closest intelligence ally.

Last Wednesday, David Cameron raised concerns that the wealthy Gulf state of Qatar had failed to act against rich Qatar-based fundraisers and “charities” that have sent millions of dollars to jihadists fighting in Iraq and Syria.

During a private, one-to-one discussion with Sheikh Tamim bin Hamad Al Thani, the Emir of Qatar, the Prime Minister urged the Gulf ruler to accelerate efforts to tackle terrorist financiers operating within the country.

Sources said the issue was also raised during a formal lunch in Number 10, which was also attended by Mr Cameron’s chief of staff, Ed Llewellyn, his national security adviser Sir Kim Darroch, and the Foreign Secretary, Philip Hammond.

In Britain, the Charity Commission had already taken action against charities linked to extremists, with the most serious cases going to court as part of terrorism prosecutions.

Speaking to The Telegraph, Mr Shawcross said the regulator was stepping up its assault on the abuse of charitable funds by terrorists, as well as other kinds of malpractice including fraud, mismanagement, and mistreatment of vulnerable adults and children.

An extra £8 million has been given to the watchdog, along with planned new powers, to enhance its ability to tackle abuse of charities by Islamists and others, he said.

However, he warned that it was “often very difficult” to ensure that aid and money sent to war zones to help the victims of violence does not end up in the wrong hands.

“Of course there is a risk [that funds raised here in Britain have been transported to Isil jihadists in Iraq and Syria].

“If we find any evidence of it happening through charities we will pursue it robustly in conjunction with the police and other law enforcement agencies.”

He said he was particularly concerned about the large number of small, new charities that have been set up to raise money to help victims of the Syrian crisis, while “aid convoys” delivering supplies to the region were especially vulnerable.

“I think there are 500 British charities that say they operate in Syria in one form or another and 200 of them have been registered since the conflict there began. Some of them are inexperienced and obviously more vulnerable to exploitation than bigger more established charities, the household names.”

Mr Shawcross said the regulator was concerned that “there may not be adequate controls as to where the goods and supplies were being delivered” from the aid convoys. He insisted that “most Muslim charities are run by good people”, many of whom are “more horrified than anybody else by abuse of charities by Islamists”.

Mr Shawcross insisted that “most Muslim charities are run by good people”, many of whom are “more horrified than anybody else by abuse of charities by Islamists”.

“Charities can be abused, people working along the Syrian border can be abused, for Islamist or extremist purposes, there is no question about that – sometimes knowingly, sometimes unknowingly,” he said.

New figures from the Commission show there are 86 case files currently open in which officials are reviewing the operations of charities, at least in part because there are fears that they operate in countries – or for particular causes – which could be targeted by extremists or terrorists.

The regulator’s figures showed that 37 of these 86 charities under scrutiny were working in Syria, by raising money in Britain, sending humanitarian supplies, or participating directly in aid convoys to the worst hit areas.

This workload has increased significantly since February, when the Commission was working on 48 extremism-related cases, about 10 of which involved charities that focused on Syria.

Full “statutory inquiries“ – the Commission’s most serious kind of formal investigation – have begun into four British charities operating in Syria, including the Al-Fatiha Global organisation, which the beheaded hostage Alan Henning was working with when he was kidnapped.

The others are Children in Deen, Aid Convoy and Syria Aid. All four investigations are still “live”, while dozens of other charities are being monitored or scrutinised by the Commission because they are operating in Syria or raising funds for the region in Britain.

Mr Henning was driving an ambulance on behalf of Rochdale Aid 4 Syria, which raised money on behalf of Al-Fatiha Global. He was part of a convoy of 20 vehicles making the 4,000-mile journey to Idlib in north-west Syria when he was kidnapped on Boxing Day last year.

The Charity Commission launched its investigation after one of Al-Fatiha’s leaders was photographed with his arms around two hooded fighters carrying machine guns. A trustee of the charity has challenged the commission’s decision to launch the inquiry.

The investigation into Children in Deen began in April after it emerged that a participant in the Birmingham charity’s aid convoy last year, Abdul Waheed Majeed, had allegedly become Britain’s first suicide bomber in Syria.

Majeed, 41, killed dozens of civilians when he drove a truck full of explosives into the wall of Aleppo prison, enabling hundreds of prisoners to escape.

Last year, the Commission began formal inquiries into Aid Convoy, and Syria Aid, over concerns about the way their funds were being used once inside Syria.

The watchdog issued a formal warning against aid convoys to Syria and urged members of the public to donate to the larger aid agencies and major international charities to minimise the risk that their money will be stolen by extremists.

Masood Ajaib, a trustee of Children in Deen, condemned the actions of Majeed and completely dissociated himself and the charity from any links to violence. He said the commission’s investigation had already hit fundraising and made its operations more difficult.

“We had nothing to do with this and do not support violence,” he said. “All we want to do is help the women and children affected by the biggest humanitarian disaster we have seen for generations.”

The Cyber Panic Begins: FBI, DHS and Defense

Update:  On his last press conference of the year, Barack Obama said that Sony made a mistake by surrendering to the threats posed by the hacks and Barack said he wished that the leadership of Sony has spoken to him personally. Well the truth is, Sony DID call the White House and explained the matter in detail to Obama’s senior staff. Obama lied.

FBI Director James Comey gave an intense interview about cyber war and the risks to America. The single most important job of government is to keep the homeland safe and to ensure national defense and national security. You can bet that real events and the depth of the cyber damage to America is not being told. So how bad could it be? That answer is left up to us. Yet the FBI did publish a statement on the Sony investigation.

FBI Beefs Up Amid Explosion of Cybercrime

Cybercrime is one of the priorities for the FBI, which has 13,260 special agents across the country, according to the agency.

Comey said he sees a “tremendous amount of cyberespionage going on — the Chinese being prominent among them, looking to steal our intellectual property.”

“I see a whole lot of hacktivists, I see a whole lot of international criminal gangs, very sophisticated thieves,” he said. “I see people hurting kids, tons of pedophiles, an explosion of child pornography.”

Cybercrime is one of the priorities for the FBI, which has 13,260 special agents across the country, including on Oahu, Maui and Hawaii island, according to the agency. The FBI had an $8.3 billion budget in fiscal 2014.

Forget the Sony Hack, This Could Be the Biggest Cyber Attack of 2015

By Patrick Tucker

On Friday, the FBI officially named North Korea as the party responsible for a cyber attack and email theft against Sony Pictures. The Sony hack saw many studio executives’ sensitive and embarrassing emails leaked online. The hackers threatened to attack theaters on the opening day of the offending film, “The Interview,” and Sony pulled the plug on the movie, effectively censoring a major Hollywood studio.

The end of “The Interview” is not the end of the world. Technology journalists were quick to point out that, even though the cyber attack could be attributable to a nation state actor, it wasn’t particularly sophisticated. Ars Technica’s Sean Gallagher likened it to a “software pipe bomb.” The fallout, of course, was limited. And while President Barack Obama vowed to respond to the attack, he also said it was a mistake for Sony to back down.

“I think all of us have to anticipate occasionally there are going to be breaches like this. They’re going to be costly. They’re going to be serious. We take them with the utmost seriousness. But we can’t start changing our patterns of behavior any more than we stop going to a football game because there might be the possibility of a terrorist attack; any more than Boston didn’t run its marathon this year because of the possibility that somebody might try to cause harm. So, let’s not get into that — that way of doing business,” he said at a White House briefing on Friday.

But according to cyber-security professionals, the Sony hack may be a prelude to a cyber attack on United States infrastructure that could occur in 2015, as a result of a very different, self-inflicted document dump from the Department of Homeland Security in July.

Important training video.  

2015: The Year of Aurora?

Here’s the background: On July 3, DHS, which plays “key role” in responding to cyber-attacks on the nation, replied to a Freedom of Information Act (FOIA) request on a malware attack on Google called “Operation Aurora.”

Unfortunately, as Threatpost writer Dennis Fisher reports, DHS officials made a grave error in their response. DHS released more than 800 pages of documents related not to Operation Aurora but rather the Aurora Project, a 2007 research effort led by Idaho National Laboratory demonstrating how easy it was to hack elements in power and water systems.

Oops.

The Aurora Project exposed a vulnerability common to many electrical generators, water pumps and other pieces of infrastructure, wherein an attacker remotely opens and closes key circuit breakers, throwing the machine’s rotating parts out of synchronization causing parts of the system to break down.

In 2007, in an effort to caste light on the vulnerability that was common to many electrical components, researchers from Idaho National Lab staged an Aurora attack live on CNN. The video is below.

How widespread is the Aurora vulnerability? In this 2013 article for Power Magazine:

“The Aurora vulnerability affects much more than rotating equipment inside power plants. It affects nearly every electricity system worldwide and potentially any rotating equipment—whether it generates power or is essential to an industrial or commercial facility.”

The article was written by Michael Swearingen, then manager for regulatory policy for Tri-County Electric Cooperative (now retired), Steven Brunasso, a technology operations manager for a municipal electric utility, Booz Allen Hamilton critical infrastructure specialist Dennis Huber and Joe Weiss, a managing partner for Applied Control Solutions.

Weiss today is a Defense Department subcontractor working with the Navy’s Mission Assurance Division. His specific focus is fixing Aurora vulnerabilities. He calls DHS’s error “breathtaking.”

The vast majority of the 800 or so pages are of no consequence, says Weiss, but a small number contain information that could be extremely useful to someone looking to perpetrate an attack. “Three of their slides constitute a hit list of critical infrastructure. They tell you by name which [Pacific Gas and Electric] substations you could use to destroy parts of grid. They give the name of all the large pumping stations in California.”

The publicly available documents that DHS released do indeed contain the names and physical locations of specific Pacific Gas and Electric Substations that may be vulnerable to attack.

Defense One shared the documents with Jeffrey Carr, CEO of the cyber-security firm Taia Global and the author of Inside Cyber Warfare: Mapping the Cyber Underworld. “I’d agree…This release certainly didn’t help make our critical infrastructure any safer and for certain types of attackers, this information could save them some time in their pre-attack planning,” he said.

Perpetrating an Aurora attack is not easy, but it becomes much easier the more knowledge a would-be attacker has on the specific equipment they may want to target.

How easy is it to launch an Aurora attack?

In this 2011 paper for the Protective Relay Engineers’ 64th Annual Conference, Mark Zeller, a service provider with Schweitzer Engineering Laborites lays out—broadly—the information an attacker would have to have to execute a successful Aurora attack. “The perpetrator must have knowledge of the local power system, know and understand the power system interconnections, initiate the attack under vulnerable system load and impedance conditions and select a breaker capable of opening and closing quickly enough to operate within the vulnerability window.”

“Assuming the attack is initiated via remote electronic access, the perpetrator needs to understand and violate the electronic media, find a communications link that is not encrypted or is unknown to the operator, ensure no access alarm is sent to the operators, know all passwords, or enter a system that has no authentication.”

That sounds like a lot of hurdles to jump over. But utilities commonly rely on publicly available equipment and common communication protocols (DNP, Modbus, IEC 60870-5-103, IEC 61850, Telnet, QUIC4/QUIN, and Cooper 2179) to handle links between different parts their systems. It makes equipment easier to run, maintain, repair and replace. But in that convenience lies vulnerability.

In their Power Magazine article, the authors point out that “compromising any of these protocols would allow the malicious party to control these systems outside utility operations.”

Defense One reached out to DHS to ask them if they saw any risk in the accidental document dump. A DHS official wrote back with this response: “As part of a recent Freedom of Information Act (FOIA) request related to Operation Aurora, the Department of Homeland Security (DHS) National Programs and Protection Directorate provided several previously released documents to the requestor. It appears that those documents may not have been specifically what the requestor was seeking; however, the documents were thoroughly reviewed for sensitive or classified information prior to their release to ensure that critical infrastructure security would not be compromised.”

Weiss calls the response “nonsense.”

The risk posed by DHS accidental document release may be large, as Weiss argues, or nonexistent, as DHS would have you believe. But even if it’s the latter, Aurora vulnerabilities remain a key concern.

Perry Pederson, who was the director of Control Systems Security Program at DHS in 2007 when the Aurora vulnerability was first exposed, said as much in a blog post in July after the vulnerability was discovered. He doesn’t lay blame at the feet of DHS. But his words echo those of Weiss in their urgency.

“Fast forward to 2014. What have we learned about the protection of critical cyber-physical assets? Based on various open source media reports in just the first half of 2014, we don’t seem to be learning how to defend at the same rate as others are learning to breach.”

Aurora vs. the Sony Hack

In many ways the Aurora vulnerability is a much harder problem to defend against than the Sony hack, simply because there is no obvious incentive for any utility operator to take any of the relatively simple costs necessary to defend against it. And they are simple. Weiss says that a commonly available device installed on vulnerable equipment could effectively solve the problem, making it impossible to make the moving parts spin out of synchronization. There are two devices on the market iGR-933 rotating equipment isolation device (REID) and an SEL 751A, that purport to shield equipment from “out-of-phase” states.

To his knowledge, Weiss says, Pacific Gas and Electric has not installed any of them anywhere, even though the Defense Department will actually give them away to utility companies that want them, simply because DOD has an interest in making sure that bases don’t have to rely on backup power and water in the event of a blackout. “DOD bought several of the iGR-933, they bought them to give them away to utilities with critical substations,” Weiss said. “Even though DOD was trying to give them away, they couldn’t give them to any of the utilities because any facility they put them in would become a ‘critical facility’ and the facility would be open to NERCCIP audits.”

Aurora is not a zero-day vulnerability, an attack that exploits an entirely new vector giving the victim “zero days” to figure out a patch. The problem is that there is no way to know that they are being implemented until someone, North Korea or someone else, chooses to exploit them.

Can North Korea pull of an Aurora vulnerability? Weiss says yes. “North Korea and Iran and are capable of doing things like this.”

Would such an attack constitute an act of cyber war? The answer is maybe. Speaking to reporters at the Pentagon on Friday, Pentagon Press Secretary Rear Adm. John Kirby said “I’m also not able to lay out in any specificity for you what would be or wouldn’t be an act of war in the cyber domain. It’s not like there’s a demarcation line that exists in some sort of fixed space on what is or isn’t. The cyber domain remains challenging, it remains very fluid. Part of the reason why it’s such a challenging domain for us is because there aren’t internationally accepted norms and protocols. And that’s something that we here in the Defense Department have been arguing for.”

Peter Singer, in conversation with Jason Koebler at Motherboard, says that the bar for actual military engagement against North Korea is a lot higher than hacking a major Hollywood movie studio.

“We didn’t go to war with North Korea when they murdered American soldiers in the 1970s with axes. We didn’t go to war with North Korea when they fired missiles over our allies. We didn’t go to war with North Korea when one of their ships torpedoed an alliance partner and killed some of their sailors. You’re going to tell me we’re now going to go to war because a Sony exec described Angelina Jolie as a diva? It’s not happening.”

Obama said Friday that there would be some sort of response to the hack, but declined to say what. “We have been working up a range of options. They will be presented to me. I will make a decision on those based on what I believe is proportional and appropriate to the nature of this crime,” he said.

Would infrastructure vandalism causing blackouts and water shutdowns constitute an act of war? The question may be moot. Before the United States can consider what sort of response is appropriate to cyber attacks, it must first be able to attribute them.

The FBI was able to finger North Korea for the hack after looking at the malware in the same way a forensics team looks for signs of a perpetrator at the scene of the crime. “Technical analysis of the data deletion malware used in this attack revealed links to other malware that the FBI knows North Korean actors previously developed. For example, there were similarities in specific lines of code, encryption algorithms, data deletion methods, and compromised networks,” according to the FBI statement.

An Aurora vulnerability attack, conversely, leaves no fingerprints except perhaps a single IP address. Unlike the Sony hack, it doesn’t require specially written malware to be uploaded into a system, Malware that could indicate the identity of the attacker, or at least his or her affiliation. Exploiting an Aurora attack is simply a matter of gaining access, remotely, possibly because equipment is still running on factory-installed passwords, and then turning off and on a switch.

“You’re using the substations against whatever’s connected to them. Aurora uses the substations as the attack vector. This is the electric grid being the attack vector,” said Weiss, who calls it “a very, very insidious” attack.

The degree to which we are safe from that eventuality depends entirely on how well utility companies have put in place safeguards. We may know the answer to that question in 2015.

 

U.S. Schools Courtesy of Gulen

Anyone remember the Barack Obama famous Cairo speech? In April of 2009, Barack delivered a long message siding with Islam and opening the door for radicals to launch their agendas and local schools in America were included.

But setting the table for what is below is this: He is in the United States.

Turkey issues arrest warrant for cleric Gulen – state media

(Frank J.Gaffney Jr. The Wash.Times:11 Dec.2012)

It is a commonplace saying, but one that most of us ignore: If something sounds too good to be true, it probably is. This applies in spades to a proposal under active consideration by the school board in Virginia’s Loudoun County. It would use taxpayer funds to create a charter school to equip the children of that Washington exurb with enhanced skills in science, technology, engineering and mathematics disciplines. Ostensibly, they will thus be equipped to compete successfully in the fields expected to be at the cutting edge of tomorrow’s workplace.

What makes this initiative, dubbed the Loudoun Math and IT Academy, too good to be true? Let’s start with what is acknowledged about the proposed school.

The academy’s board is made up of a group of male Turkish expatriates. One of them, Fatih Kandil, was formerly the principal of the Chesapeake Science Point Public Charter School in Anne Arundel County, Md. Another is Ali Bicak, the board president of the Chesapeake Lighthouse Foundation, which owns Chesapeake Science Point and two other charter schools in Maryland. The Loudoun Math and IT Academy applicants expressly claim that Chesapeake Science Point will be the model for their school.

The taxpayers of Loudoun County and the school board elected to represent them should want no part of a school that seeks to emulate Chesapeake Science Point, let alone be run by the same people responsible for that publicly funded charter school. For one thing, Chesapeake Science Point has not proved to be the resounding academic success the applicants claim. It does not appear anywhere in the acclaimed U.S. News & World Report lists of high-performing schools in Maryland, let alone nationwide — even in the subsets of mathematics or charter schools.

What is more, according to public documents chronicling Anne Arundel County Public Schools’ dismal experience with Chesapeake Science Point, there is significant evidence of chronic violations of federal, state and local policies and regulations throughout its six years of operations, with little or inconsistent improvement, reflecting deficiencies in fiscal responsibility and organizational viability.

Why, one might ask, would applicants for a new charter school cite so deeply problematic an example as their proposed institution? This brings us to aspects of this proposal that are not acknowledged.

Chesapeake Science Point is just one of five controversial schools with which Mr. Kandil has been associated. He was previously the director at the Horizon Science Academy in Dayton, Ohio; the principal at the Wisconsin Career Academy in Milwaukee and at the Baltimore Information Technology Academy in Maryland; and one of the applicants in a failed bid to establish the First State Math and Science Academy in Delaware.

These schools have something in common besides their ties to the peripatetic Fatih Kandil. They have all been “inspired” by and in other ways are associated with Fethullah Gulen, a Turkish supremacist and imam with a cultlike following of up to 6 million Muslims in Turkey and elsewhere around the world. More to the point, Imam Gulen is the reclusive and highly autocratic leader of a global media, business, “interfaith dialogue” and education empire said to be worth many billions that is run from a compound in the Poconos.

This empire — including its roughly 135 charter schools in this country and another 1,000 abroad — and its adherents have come to be known as the Gulen Movement. Those associated with it, in this country at least, are assiduously secretive about their connections to Imam Gulen and his enterprise. For example, the Loudoun Math and IT Academy applicants, their spokeswoman and other apologists have repeatedly misled the Loudoun school board, claiming that these Turkish gentlemen and their proposed school have nothing to do with Imam Gulen.

There are several possible reasons for such professions. For one, the Gulen schools are reported to be under investigation by the FBI. A growing number of them — including Chesapeake Science Point — have also come under critical scrutiny from school boards and staff around the country. In some cases, they have actually lost their charters for, among other reasons, chronic financial and other mismanagement and outsourcing U.S. teachers’ jobs to Turks.

The decisive reason for the Gulenist lack of transparency, however, may be due to their movement’s goals and modus operandi. These appear aligned with those of another secretive international organization that also adheres to the Islamic doctrine known as Shariah and seeks to impose it worldwide — the Muslim Brotherhood. Both seek to accomplish this objective by stealth in what the Brotherhood calls “civilization jihad” and Imam Gulen’s movement describes as “jihad of the word.”

This practice enabled the Gulenists to help transform Turkey from a reliable, secular Muslim NATO ally to an Islamist state deeply hostile to the United States — one aligned with other Islamic supremacists, from Iran to the Muslim Brotherhood to Hamas to al Qaeda. Fethullah Gulen’s followers clearly don’t want us aware of the obvious dangers posed by their penetration of our educational system and influence over our kids.

The good news is that members of the Loudoun County school board have a code of conduct that reads in part: “I have a moral and civic obligation to the nation which can remain strong and free only so long as public schools in the United States of America are kept free and strong.” If the board members adhere to this duty, they will reject a seductive Loudoun Math and IT Academy proposal that is way too “good” to be true.

So what has happened since the launch of these schools around the country?

FBI raids Concept Schools in Illinois, 2 other states

The FBI and two other federal agencies conducted raids in Illinois and two other states at charter schools run by Des Plaines-based Concept Schools, FBI officials said Tuesday.

Search warrants were executed at 19 Concept schools in connection with an “ongoing white-collar crime matter,” said Vicki Anderson, a special agent in the Cleveland FBI office that’s leading the probe.

The U.S. Department of Education and the Federal Communications Commission also were involved in the June 4 raids, but officials said the warrants remain under seal, and they wouldn’t give any details about the investigation. 

The raids targeted Concept schools in Illinois — where Concept has three schools in Chicago and one in Peoria — as well as in Indiana and Ohio.

FBI RAIDS TURKISH GULEN CHARTER SCHOOL IN LA

Dec 14, 2013 by

fbi_raid“Finally FBI Raids Turkish Gulen Charter School in Louisiana”

by Donna Garner 12.13.13   

12.12.13 — To view the FBI raid of the Gulen charter school in East Baton Rouge, please go to the following link on WBRZ.com. The Gulen charter schools are tied to Fethullah Gulen who is an Islamist imam.  Kenilworth Science and Technology School is connected to the Pelican Foundation, Cosmos Foundation in Texas, Atlas Texas Construction and Trading (a Houston-based contractor), Harmony Charters in Texas, and to other Gulen/Turkish entities around the United States and Turkey:  http://www.wbrz.com/videos/fbi-raid-another-scandal-for-charter-school-company/   

===========  

12.11.13 — To read the full story about the FBI raid on the Gulen charter school, please read further: “FBI Raid Another Scandal for Gulen Charter School Company”

http://www.wbrz.com/news/fbi-raid-another-scandal-for-charter-school-company/   

EXCERPTS FROM THIS ARTICLE:

BATON ROUGE- Wednesday evening’s FBI raid on a charter school in East Baton Rouge is the latest item in a list of scandals involving the organization that holds the charter for the Kenilworth Science and Technology School.

Pelican Educational Foundation runs the school [and also Abramson] and has ties to a family from Turkey. The organization lost its school in New Orleans amid allegations of sexual misconduct among students that prompted a state investigation on campuses in the Crescent City and in Baton Rouge. It has also faced lawsuits and allegations from teachers about bad learning environments.

“It was an atmosphere where there was a double standard,” one former teacher told WBRZ News 2 in an investigation into the school in EBR. Former teachers were not happy with how things were handled when they spoke with a station reporter two years ago.

No one was ever charged in the sex allegations a school spokesperson pointed out Wednesday as federal investigators moved through the campus collecting items, putting them in boxes and then loading them into a van.

The school receives about $5,000,000 in local, state, and federal tax money. In 2012, the Pelican group was accused of improperly handling money by the Legislative Auditor. A report found about $8600 was improperly used to buy gifts for students who scored high on LEAP tests.

About the same time as allegations and lawsuits began dealing with Pelican charter schools, a BESE member took an improper trip on behalf of another Turkish organization. Linda Johnson, who is no longer on BESE, was fined for breaking the law by the ethics board. She got an all expenses paid trip to Turkey.

Kenilworth Science and Technology School will be open Thursday.

 

CyberWar on America Costs Close to a $Trillion

It is not just North Korea, the cyber warriors are also in Ukraine, China, Syria, Russian and Iran. America has some defenses, but normal users and the business industry has few robust and intolerant choices against cyber attacks.

We need to challenge Congress to declare cyber attacks as an act of war given the heavy costs to theft, risk and attacks on harden targets including the power grid systems, transportation, food, banks, water, yet most of all intelligence and military secrets.

The most recent attack on Sony intranet system is pointing to North Korea as having the cyber-soldiers and that brigade is called Unit 121.

Defense News: Military planners and security experts have intensified their shouts of concern about the development of cyber weapons and the distinct possibility of a cyber war. Cyber warfare is not new. It has been in modern military doctrine for the past decade not to mention the number of terrorist groups who have threatened the use of cyber weapons against the west. However, what has changed is the number of countries that posess these capabilities today.
The North Korean military created a new unit that focuses solely on cyber warfare. The unit, dubbed Unit 121, was first created in 1998 and has steadily grown in size and capability since then. Interest in establishing cyber war forces shouldn’t come as a surprise to anyone, but North Koreas intense effort stands out among the top ten nations developing cyber weapons.
Unit 121 Capabilities Assessment:
Force Size: Originally 1,000 — Current Estimate:17,000
Budget: Total military budget $6 billion USD. Cyber Budget $70+ million. North Koreas military budget is estimated to be the 25th largest in the world.
Goal: To increase their military standing by advancing their asymmetric and cyber warfare.
Ambition: To dominate their enemys information infrastructure, create social unrest and inflict monetary damage.
Strategy: Integrate their cyber forces into an overall battle strategy as part of a combined arms campaign. Additionally they wish to use cyber weapons as a limited non-war time method to project their power and influence.
Experience: Hacked into the South Korea and caused substantial damage; hacked into the U.S. Defense Department Systems.
Threat Rating: North Korea is ranked 8th on the Spy-Ops cyber capabilities threat matrix developed in August of 2007.
Capabilities
Cyber Intelligence/Espionage: Basic to moderately advanced
weapons with significant ongoing development into cyber intelligence.
Offensive Cyber Weapons: Moderately advanced distributed
denial of service (DDoS) capabilities with moderate virus and malicious code capabilities.
North Korea now has the technical capability to construct and deploy an array of cyber weapons as well as battery-driven EMP (electro magnetic pulse) devices that could disrupt electronics and computers at a limited range.
In the late spring of 2007, North Korea conducted another test of one of the cyber weapons in their current arsenal. In October, the North Koreans tested its first logic bomb. A logic bomb is a computer program that contains a piece of malicious code that is designed to execute or be triggered should certain events occur or at a predetermined point of time. Once triggered, the logic bomb can take the computer down, delete data of trigger a denial of service attack by generating bogus transactions.
For example, a programmer might write some software for his employer that includes a logic bomb to disable the software if his contract is terminated.
The N Korean test led to a UN Security Council resolution banning sales of mainframe computers and laptop PCs to the East Asian nation. The action of the United Nations has had little impact and has not deterred the North Korean military for continuing their cyber weapons development program.
Keeping dangerous cyber weapons out of the hands of terrorists or outlaw regimes is next to impossible. As far back as 2002, White House technology adviser Richard Clarke told a congressional panel that North Korea, Iraq and Iran were training people for internet warfare. Most information security experts believe that it is just a matter of time before the world sees a significant cyber attack targeted at one specific country. Many suggest the danger posed by cyber weapons rank along side of nuclear weapons, but without the physical damage. The signs are there. We need to take action and prepare for the impact of a cyber war.

North Korea’s Elite Hackers Who Live Like Stars In Luxury Hotel 

Unit 121 is known to have two distinct functions: to carry out disruptive attacks against systems primarily in the United States and South Korea, both for purposes of sabotage and intelligence gathering, and to defend North Korea from incoming cyber attacks.

North Korea, however, has very little internet infrastructure, which analysts say actually gives the country an advantage. While North Korea can launch massive attacks against the West — the Sony attack being just the latest — outside nations can do little to damage North Korea’s own internal digital systems because they largely don’t exist.

Inside North Korea, use of the internet is strictly limited to government approved personnel. Ordinary citizens may utilize only an intranet run by Kim Jong Un regime, which allows access to government approved sites and state-operated media, but no access to what the rest of the world knows as the internet and the World Wide Web.

Instead, according to a report prepared in 2009 by a U.S. military intelligence analyst, Steve Sin, the Unit 121 hackers operate mostly from the luxurious Chilbosan in Shenyang, China, pictured below, a facility with amenities that would be unknown to all but the top level government elites inside North Korea, an impoverished country racked by famine.

The hotel is located in a military-controlled region of China just three hours from the border with North Korea. The central headquarters of Unit 121 is located in Pyongyang, in a district called Moonshin-dong, near the Taedong River

In fact, by North Korean standards, the cyber hackers of Unit 121 (also referred to as “Bureau 121″) are treated like superstars, afforded high-class lifestyles inconceivable to the vast majority of North Korean citizens.

In addition to Sin’s report, the Hewlett-Packard corporation conducted its own investigation into the threat posed by Unit 121 — which was created in 1998 and operates with a budget of more than $6 billion. Much of the information known about the highly-secretive unit comes from those reports, and from North Korean defectors who have passed information to U.S. and South Korean intelligence.

According to those accounts, the hackers who comprise the unit are the cream of North Korea’s academic crop in math and computer science, hand-picked from high schools around the country, who are then sent to study at Keumseong, the top high school in the North Korea capital of Pyongyang.

From there, the candidates who pass a rigorous series of tests and trials are sent to study at top universities — and then sent to Russia and China for an additional year of specialized training in computer hacking and cyberwar techniques.

Unit 121 is believed responsible for an attack on 30,000 computers inside South Korean banks and media companies in 2013, an attack that security experts say bore strong similarities to the Sony hack.

Against South Korea, North Korea allegedly has already carried out a series of disruptive and destructive operations in the past few years. Discounting previous distributed denial-of-service (DDoS) attacks on websites, the first major cyber-attack attributed to North Korea was on April 12, 2011, which paralyzed online banking and credit card services of Nonghyup Agricultural Bank for its 30 million customers. This is the first instance where North Korea used a disc wiping tool. While its ATMs were fixed within a couple days, some of the online services had taken more than two weeks to return to normal operating status, with 273 out of 587 servers destroyed. The second incident occurred in March 20, 2013, which used similar but improved tactics from April 2011. It was timed to simultaneously target multiple banks and broadcasting agencies with disc wiping tools and was preceded by an extensive advanced persistent threat campaign. The scale of the March 20 attack demonstrated that North Korea has at least one dedicated, permanent cyber unit directed against carefully selected targets and that they have the means to penetrate, exploit, and disrupt target systems and networks with sufficient secrecy.

Congress Blind-Sided on Cuba Shift is False

First the White House said no to Cuba and the prisoner swap.  Alan Gross was a top asset sent to Cuba to investigate and impede the Cuba/Russian spy network designed to infiltrate United States Southern Command. There was some great success is the Cuban spies providing intelligence back to the island and then far beyond.

The White House going back to 2009 has announced a series of policy changes regarding Cuba. These objectives were in cadence with the State Department, the U.S. Treasury and the Commerce Secretary as well as the U.S. Chamber of Commerce. Several congressional committees were well aware of the epic shift of appeasement to the Communist country. Congress was hardly blind-sided including a prisoner swap as this has been a tactic of the White House.

It seems to grow the economy and to increase trade, the White House policy wonks think it is a prudent move to open diplomacy with a communist country after-all it works with China.

U.S. Policy
Congress has played an active role in shaping policy toward Cuba, including the enactment of legislation strengthening and at times easing various U.S. economic sanctions. While U.S. policy has consisted largely of isolating Cuba through economic sanctions, a second policy component has consisted of support measures for the Cuban people, including U.S. government-sponsored broadcasting (Radio and TV Martí) and support for human rights and democracy projects. The Obama Administration has continued this similar dual-track approach. While the Administration has lifted all restrictions on family travel and remittances, eased restrictions on other types of purposeful travel, and moved to reengage Cuba on several bilateral issues, it has also maintained most U.S. economic sanctions in place. On human rights, the Administration welcomed the release of many political prisoners in 2010 and 2011, but it has also criticized Cuba’s continued harsh repression of political dissidents through thousands of short-term detentions and targeted violence. The Administration has continued to call for the release of U.S. government subcontractor Alan Gross, detained in 2009 and sentenced to 15 years in prison in 2011, and maintains that Gross’s detention remains an impediment to more constructive relations.
Legislative Activity
Strong interest in Cuba is continuing in the 113th Congress with attention focused on economic and political developments, especially the human rights situation, and U.S. policy toward the island nation, including sanctions. The continued imprisonment of Alan Gross remains a key concern for many Members. In March 2013, Congress completed action on full-year FY2013 appropriations with the approval of H.R. 933 (P.L. 113-6), and in January 2014, it completed action on an FY2014 omnibus appropriations measure, H.R. 3547 (P.L. 113-76)—both of these measures continued funding for Cuba democracy and human rights projects and Cuba broadcasting (Radio and TV Martí). Both the House and Senate versions of the FY2014 Financial Services and General Government appropriations measure, H.R. 2786 and S. 1371, had provisions that would have tightened and eased travel restrictions respectively, but none of these provisions were included in the FY2014 omnibus appropriations measure (P.L. 113-76).
For FY2015, the Administration is requesting $20 million for Cuba democracy projects (the same being provided for FY2014) and $23.130 million for Cuba broadcasting.


Congressional Research Service
Cuba: U.S. Policy and Issues for the 113th Congress FY2014)

The House Appropriation Committee reported out H.R. 5013 (H.Rept. 113-499), the FY2015 State Department, Foreign Operations, and Related Programs Act, on June 27, 2014, which would make available $20 million “to promote democracy and strengthen civil society in Cuba,” and provide not less than $28.266 million for Cuba broadcasting. The Senate Appropriations Committee reported out its version of the appropriations measure, S. 2499 (S.Rept. 113-195), on June 19, 2014, which would provide up to $10 million for Cuba democracy programs and an additional $5 million for programs to provide technical and other assistance to support the development of private businesses in Cuba; the Senate measure would also provide $23.130 million for Cuba broadcasting.
With regard to U.S. sanctions on Cuba, the House version of the FY2015 Financial Services and General Government Appropriation bill, H.R. 5016 (H.Rept. 113-508), approved July 16, 2014, has a provision that would prohibit the use of any funds in the Act “to approve, license, facilitate, authorize or otherwise allow” people-to-people travel.
Several other initiatives on Cuba have been introduced in the 113th Congress. Several would lift or ease U.S. economic sanctions on Cuba: H.R. 214 and H.R. 872 (overall embargo); H.R. 871 (travel); and H.R. 873 (travel and agricultural exports). H.R. 215 would allow Cubans to play organized professional baseball in the United States. H.R. 1917 would lift the embargo and extend nondiscriminatory trade treatment to the products of Cuba after Cuba releases Alan Gross from prison. Identical initiatives, H.R. 778/S. 647 would modify a 1998 trademark sanction; in contrast, H.R. 214, H.R. 872, H.R. 873, and H.R. 1917 each have a provision that would repeal the sanction. H.Res. 121 would honor the work of Cuban blogger Yoani Sánchez. H.Res. 262 would call for the immediate extradition or rendering of all U.S. fugitives from justices in Cuba.

So this begs the question, who really benefits on the Cuban side, when the benefits to America are in the zero category?

From Fox Business: There is a price that the Cuban regime will exact from American companies to do business there if U.S.-Cuba relations are fully normalized, a price that likely won’t benefit the country’s lower classes, but will instead line the pockets of Castro & Co., experts on Cuba warn.

Because of its tight grip, the Castro regime has kept Cuba’s GDP hamstrung. It’s economy is now at a tiny $72.3 billion, less than half that of the state of Iowa, notes Richard J. Peterson, senior director at S&P Capital IQ. In fact, the average worker earns less than $25 a month.

Cuba is in crisis, it needs a bailout. Its crony communism has failed, it is steeped in debt, and its money is running low. Historically, Cuba has enjoyed lifelines in the form of money and oil from Venezuela, which had been generously supplying 100,000 free barrels of oil a day, estimates show, nearly two-thirds of Cuba’s consumption needs.

But Venezuela is on the brink of financial collapse as oil continues to plunge toward $60 a barrel, according to sources there, and it cannot supply Cuba the oil it needs. Plus Venezuela is now enduring three health epidemics: Malaria, dengue fever and chikungunya. Russia has also subsidized Cuba’s economy, but it, too, faces a severe economic contraction as oil nosedives.

Cuba needs tourism dollars, it needs trade and bank credits to save itself from bankruptcy. But it wants all that even while it keeps its failed government model in place. But it wants all that even while it keeps its failed government model in place. Cuba is run by a Soviet-style nomenklatura filled with party elites who call the shots behind the scenes, and who have gotten spectacularly wealthy in the process, all while abusing its people and business partners. Critics of the government, perceived enemies of the state, even those calling for basic human rights continue to be arbitrarily imprisoned without charge or due process, many beaten, even killed.

The Cuban power elite are the Castro brothers and their families, their party chieftains and army leaders. The Cuban economy has changed little since the collapse of the Soviet Union. Unchecked by a probing, independent media or Congress, the Cuban power elite enjoy rich salaries, vacations overseas, yachts, Internet access, beach compounds and satellite dishes to see U.S. movies, notes Cuban émigré and lawyer Nelson Carbonell, author of “And the Russians Stayed: The Sovietization of Cuba” (William Morrow & Co., 1989). The communists in Cuba routinely expropriate the assets of foreign investors, and have seized and control everything of value, including hotels, car distributors, banks, the sugar industry, resorts.

Just as Friedrich Engel, co-author of the Communist Manifesto, once said holds true of Cuba today, that “once in the saddle,” a new ruling class “has never failed to consolidate its rule at the expense of the working class and to transform social leadership into exploitation.”

If relations are fully normalized, American tourist dollars would pour into companies owned by the Castro regime, since tourism is controlled by both the military and General Raul Castro, warns the Cuba Transition Project (CTP).

That means rum, tobacco, hotels and resorts are all owned and operated by the regime and its security forces. Cuba’s dominant company is the Grupo Gaesa, founded by Raul Castro in the nineties and controlled and operated by the Cuban military, which oversees all investments. Cuba’s Gaviota, run by the Cuban military, operates Cuba’s tourism trade, its hotels, resorts, car rentals, nightclubs, retail stores and restaurants. Gaesa is run by Raul’s son-in-law, Colonel Luis Alberto Rodriguez Lopez-Callejas.

The number of foreign companies doing business in Cuba have been cut by more than half since the 1990s, to 190 from some 400. Reasons include: Being forced to partner with army-controlled groups; hire workers through state agencies; and the freezing of bank deposits. Complaints have poured in from former senior executives at Dow Chemical, General Mills, Bristol-Myers Squibb, Colgate-Palmolive, Bacardi, American Express Bank, PepsiCo, Warner Communications, Martin Marietta Aluminum and Amex Nickel Corporation. Iberia, Spain’s national airline which at one time accounted for 10% of foreign commerce with Cuba, killed its Havana routes because they were unprofitable.

If U.S.-Cuba relations are normalized, fresh, new American dollars will only enrich the elite, “dollars will trickle down to the Cuban poor in only small quantities, while state and foreign enterprises will benefit most,” warns CTP, adding U.S. travelers to Cuba could still be “subject to harassment and imprisonment.” Over the decades, tourists visiting Cuba from Canada, Europe and Latin America and spending money there have only strengthened Cuba’s totalitarian state, it notes. There is a chance the free-flow of information from free trade could spark change long-term, but that could trigger an immediate, violent crackdown from the Cuban government, much like what occurred during the Arab spring.

Another significant factor: Corruption is rampant in Cuba, it has no independent, transparent, legal system, Cuba appoints its judges and licenses lawyers, and it repeatedly arrests peaceful pro-democracy activists.

Plus it is a debtor nation with a long history of defaulting on its loans. U.S. businesses risk having their operations confiscated by the government, and/or never seeing their loans repaid.

Cuba exports nickel, but that is largely controlled by Canadian interests, and its sugar industry is on the ropes. About 600 European suppliers have had over $1 billion arbitrarily frozen by the government since 2009, “and several investments have been confiscated,” CTP says.

In fact, Cuban law lets the government confiscate foreign assets for “public utility” or “social interest,” CTP says. Three CEOs of companies doing hundreds of millions of dollars’ worth of business in Cuba were arrested and stuck in jail without charges or due process: Cy Tokmakjian of the Tokmakjian Group, Sarkis Yacoubian of Tri-Star Caribbean, from Canada, and Amado Fakhre of Coral Capital of Great Britain.

All of this is why Cuba is ranked 176th out of 177 countries on the index of economic freedom put out by the Heritage Foundation, beating North Korea at dead last, but ranking worse than Iran and Zimbabwe.