Did you get Fired and Replaced by a Foreigner?

H1B Visa Cap is Suitable For:

Foreign students on F-1 OPT, F-1 CPT or STEM extension

Foreign professionals in specialty occupations, such as programmer analysts, physical therapists, accountants, database administrators, market research analysts, engineers, management analysts, graphic designers, pharmacists, financial analysts, and others with Bachelor’s or equivalent degree

Foreign nationals who have spent at least one year outside United States after reaching the 6-years limit on H1B, to come back and work in a specialty occupation

U.S. companies to employ qualified foreign nationals in jobs that require a bachelor’s degree and specialized skills

So this begs the question, just how deep is the collusion and are there recourses for people that were fired as you read on….

Senators seek probe of claims US workers fired, forced to train foreign replacement

A popular visa program allegedly is being misused by U.S. companies to lay off thousands of American workers and replace them with foreign labor.

And, adding insult to injury, many of the laid-off workers allegedly have been forced to train their replacements, in what one anonymous whistleblower called a “humiliating” experience.

The allegations have caught the attention of a bipartisan group of senators — including immigration hawk Sen. Jeff Sessions, R-Ala., and the No. 2 Senate Democrat, Illinois’ Dick Durbin — who are calling for a federal probe. A letter sent by 10 senators urging an investigation specifically cited reports of the firing and hiring practices at Southern California Edison, California’s second-largest utility. The incidents are concentrated in the IT field, and involve American workers being replaced by H-1B visa holders.

“A number of U.S. employers, including some large, well-known, publicly-traded corporations, have reportedly laid off thousands of American workers and replaced them with H-1B visa holders,” the senators wrote.

In the letter to Attorney General Eric Holder, Homeland Security Secretary Jeh Johnson, and Labor Secretary Thomas Perez, the senators urged the departments to “investigate the unacceptable replacement of American workers” to see whether laws were broken.

The H-1B program is supposed to be used to bring in, on a temporary basis, skilled workers with highly specialized skills not readily available in the U.S. They are often used in the technology sector to bring in engineers and computer programmers.

Further, U.S. employers can hire foreign workers for up to six years and must pay them the same rate they would pay other workers with similar qualifications, or the prevailing wage for that job and location, whichever is higher. This is done to prevent foreign workers from depressing U.S. wages and from being exploited.

But reports have surfaced that the replacements are happening at an alarming rate. And former Southern California Edison workers have complained to lawmakers that they were replaced by less-skilled workers at lower costs.

Anonymous workers who were displaced by the visa holders also submitted written testimonials to lawmakers detailing their firings. Several claimed they were forced to train their replacements, and threatened with losing their severance if they did not.

“We had no choice in this,” one anonymous worker who claimed to have been one of those let go from Southern California Edison, said in a letter. The worker described how when the two vendors were picked – Infosys and TCS, both major Indian companies – SCE employees were told to “sit with, video chat or do whatever was needed to teach them our systems.”

If they did not cooperate, according to the testimonial, “we would be fired and not receive a severance package.”

Another worker described this process as “humiliating.”

In a statement, Southern California Edison said it abides by the law and will cooperate with any investigation that concerns the issues mentioned in the senators’ letter.

The company explained that it’s reducing its information technology department from 1,400 to 860. Of those left, 97 percent are permanent California residents and 3 percent are on H-1B visas.

Southern California Edison said it’s contracting with IT vendors to fulfill certain contracts and that most of those workers are permanent U.S. residents and aren’t working under H-1B visas.

“By transitioning some IT operations to external vendors, along with SCE eliminating some customized functions it will no longer provide, the company will focus on making significant, strategic changes that can benefit our customers,” Southern California Edison’s emailed statement read.

But the senators, in their letter, raised several questions about how the replacements were being done. They said it appears the workers are often not employees of the U.S. company laying off workers – but are contractors working for foreign-owned IT consultants.

The H-1B program stipulates that applicants must have a valid “employer-employee relationship” – and the senators questioned whether that was the case here.

They also asked whether the companies “engaged in prohibited citizenship status discrimination” (against American citizens); and whether the visa petitions showed “any evidence of misrepresentation or fraud.”

Sessions said in a statement that the SCE allegations “ought to be the tipping point that finally compels Washington to take needed actions to protect American workers.”

The letter from senators follows a hearing last month by the Senate Judiciary Committee, which invited Southern California Edison to testify, though the company declined.

Ronil Hira, a professor at Howard University, said at the hearing that the utility outsourced work to two companies, and those companies employed H-1B staffers who were then trained by the employees they were replacing. “There could not be a clearer case of the H-1B program being used to harm American workers’ wages and working conditions,” Hira said.

Republican senators seeking the investigation are Sessions, Charles Grassley of Iowa, James Inhofe of Oklahoma, and Bill Cassidy and David Vitter of Louisiana.

Democratic senators seeking the investigation are Durbin, Richard Blumenthal of Connecticut, Sherrod Brown of Ohio and Claire McCaskill of Missouri.

Sen. Bernie Sanders, an independent from Vermont, also signed the letter.

ISIS Success Seen in Kansas

John T. Booker: 5 Fast Facts You Need to Know

 

Another U.S. citizen is accused of trying to perpetrate a terror attack on American soil in the name of ISIS. That man is 20-year-old Topeka, Kansas, resident John T. Booker who also likes to go by Muhammad Abdullah Hassan. Back in April 2014, Booker was first accused of having desires to carry out a terror attack in the U.S., after those accusations, his family told the media that he was in a mental health facility.

Here’s what you need to know:

1. He Wanted to Kill People With Power Using a Sword

According to the U.S. Attorney’s Office, Booker had planned to explode a car bomb at the Fort Riley army base in Kansas.This was a sting operation with the attorney’s office assuring the public there was never any real threat. He had rented a storage unit in Topeka that he used to store explosive devices. In the complaint, Booker allegedly told an FBI informant that he never intended to kill army privates but rather, people with power. He wanted to do this by using a sword or small gun. The documents state that two of Booker’s jihadist confidantes were FBI informants. He bragged to those informants about his “capture” by the FBI in 2014 for his terroristic threats. One of the FBI’s men on the inside posed as a “high ranking sheik” who wanted to commit a terrorist act in the U.S.

Booker 1

You can read the full complaint against Booker above.

2. He Had Been Scheduled to Begin His Basic Training in the Army on April 7, 2014

 

A Fox News report detailed that Hassan enlisted in the U.S. Army in February 2014 and was scheduled to begin basic training on April 7, 2014. Hassan was on a delayed entry program. According to army officials, he never displayed any anti-American sentiment during the recruitment process. He was discharged from the service last week when army officials learned of his plans. Hassan is being hunted by the FBI and the 902d Military Intelligence Group at Fort Leavenworth.

 

3. He Once Wrote on Facebook ‘I Am Going to Wage Jihad & Hope That I Die’

Booker 2

 

This photo was posted on Muhammad Abdullah Hassan’s Facebook on February 23 2014.

Through postings on Hassan’s Facebook page, beginning on February 23, he posted al-Qaida propaganda materials. There are also photos of Osama bin Laden and a video of the 9/11 mastermind reciting the Quran. On March 15, Hassan posted:

Oh those of the ummah of the Prophet Muhammad(S). I will soon be leaving you forever so goodbye! I am going to wage jihad and hope that i die. I want to be with my lord so bad that I cry but I will miss you guys I am not going to lie. I wish I could give you guys more but I am just a guy who is so very poor.

I am telling you I am so broke that my pockets are sore:) I cannot wait to go the Prophet Muhammad’s(S) door and prank Isa bin Maryam and party so hard that it will rock Jannah to its core. Only Allah knows what the future has in store so that should make you fear Allah much much more.

Booker 3

4. He Volunteered for a Children-in-Need Charity in Topeka in 2012

Booker 4

According to his Facebook page Muhammad Abdullah Hassan from Topeka, Kansas, he went to Topeka West High and the Flint Hills Job Corps. His favorite restaurant is the Orange Leaf Topeka.

John Thomas Booker Jr. graduated from Topeka West High School in 2012. A Topeka Capital Journal article from December 2011, details a group of Topeka West Army Jr. ROTC cadets who were volunteering for a children-in-need program. A Cadet Master Sgt. John Thomas Booker Jr. told the paper how much he enjoyed helping the less fortunate saying “I can’t have a good Christmas if they don’t.”

5. Yesterday, a Convicted Wisconsin Pedophile Was Arrested for Trying to Join ISIS

 

This comes a day after authorities announced the arrest of Joshua Ray Van Haften, a Wisconsin man who is accused of going to Turkey with the goal of joining ISIS in Syria. The Justice Department says 34-year-old Joshua Ray Van Haften spent over a year in Egypt touring the country’s military sites and later traveled to Turkey to find “brothers” who would funnel him into Iraq or Syria. Agents allege that he frequently spoke to his roommates about jihad and once lectured an 11-year-old boy about the coming World War III.

Federal agents arrested Van Haften on April 8 at Chicago’s O’Hare airport after he arrived “in custody” on a flight from Turkey. “We hope this arrest will serve as a deterrent for others who may be terrorist sympathizers here in Wisconsin, across the nation or abroad,” said FBI Special Agent in Charge Robert J. Shields Jr. “They will be held accountable for support of terrorism against our citizens and our international partners.”

Who is hosting the Hacker’s Servers?

State report reveal 130 compromised websites used in travel-related watering hole attacks

By Bill Gertz

One hundred thirty websites are hosting malicious software on their websites in what the State Department is calling a sophisticated Russian cyber spying operation, according to security analysts.
“These websites include news services, foreign embassies and local businesses that were compromised by threat actors to serve as ‘watering holes,’” according to a report by the Overseas Security Advisory Council distributed this week. A watering hole is a hijacked website used by cyber attackers to deliver malware to unsuspecting victims.
“For example, users may navigate to one of these malicious sites with the intent of checking travel requirements or the status of a visa application and unknowingly download the embedded malware onto their computers,” the report said.
The report identified the locations of the compromised websites as the United States, South America, Europe, Asia, India and Australia.
The report appears to indicate Russian intelligence may be behind the operations. Also, none of the compromised websites are in China, an indication that Beijing’s hackers could be involved.
A total of 15 of the 130 websites used for watering holes were government embassy websites located in Washington, DC, and two were involved in passport and visa services and others are offering travel services.
The embassy targeting suggests some or all of the operations are linked to foreign intelligence services that are breaking into the networks as part of tracking and monitoring of foreign travel.
Another possibility is that the operation are part of information warfare efforts designed to influence policies and publics. Both Russia and China are engaged in significant strategic information operations targeting foreign governments and the private sector.
“The threat actors are likely attempting to gather information from entities with vested interests in international operations,” the report said. “Identified victims in this sector include embassies, defense industrial base groups, and think tanks.”
The report, based on data provided by the security firm iSight Partners, says the watering holes are likely part of cyber espionage operations.
“Analysis indicates this campaign has a global reach, continuing to target users of identified intelligence value long after the initial infection,” the report says.
The compromised websites are increasingly functioning as indirect malicious software attack tools. The compromised sites represent a different method than widely used spear phishing – the use of emails to trigger malicious software downloads.
“Rather than send a malicious email directly to a target of interest, threat actors research and compromise a high-traffic website that will likely be visited by numerous targets of interest,” the report said.
“Watering holes are effective, as they often exploit existing vulnerabilities on a user’s machine,” the report said. More sophisticated threat actors have been observed employing zero-day exploits – those which are previously unknown and evade antivirus and intrusion detection systems (IDS) to successfully compromise victims. Zero-days were used in the widely publicized Forbes.com watering hole in late 2014.”
The hijacked websites appear to be part of a campaign spanning 26 upper-level Internet domains and include affiliations with 21 nations and the European Union.
According to iSight, evidence suggests the campaign is “likely tied to cyber espionage operations with a nexus to the Russian Federation.”
The compromised government websites included those from Afghanistan, Iraq, Jordan, Namibia, Qatar and Zambia. The report recommended not visiting any of those embassy websites or risk being infected with malware.
Technically, the attackers arranged for computer users who visited the compromised websites to be infected with an embedded JavaScript that redirected users to a Google-shortened URL, and then on to websites the mapped their computer systems. This “profiling” is used by cyber spies to identify valuable targets and control that specific victims who are injected with a malware payload.
The profiling is used to identify targets that will produce “high intelligence value” returns, indicating sophisticated cyber spies are involved. The infection also employed a technique called the use of “evercookie” a derivative of the small files that are inserted on computers and can be used by remote servers to tailor information, such as advertisements, to specific user.
While normal cookies can be easily removed, evercookies store data in multiple locations, a method that makes them extremely difficult to find and removed. The use of evercookies also permits long-term exploitation by cyber attackers.
To counter watering hole attacks, users should make sure system and software security updates are applied, and avoid visiting suspicious websites.
In particular, network monitoring should be used to spot unusual activities, specifically geared toward attacks that exploit zero-day vulnerabilities.
“The threat of watering holes is likely to remain high, given their increasing popularity and success in the last year,” the report said.
The report, “Compromised Global Websites Target Unsuspecting Travelers,” was produced by OSAC’s Research & Information Support Center (RISC). It is available for OSAC members at osac.gov. *** But there is more.

SAN FRANCISCO (Reuters) – Hacking attacks that destroy rather than steal data or that manipulate equipment are far more prevalent than widely believed, according to a survey of critical infrastructure organizations throughout North and South America.

The poll by the Organization of American States, released on Tuesday, found that 40 percent of respondents had battled attempts to shut down their computer networks, 44 percent had dealt with bids to delete files and 54 percent had encountered “attempts to manipulate” their equipment through a control system.

Those figures are all the more remarkable because only 60 percent of the 575 respondents said they had detected any attempts to steal data, long considered the predominant hacking goal.

By far the best known destructive hacking attack on U.S. soil was the electronic assault last year on Sony Corp’s Sony Pictures Entertainment, which wiped data from the Hollywood fixture’s machines and rendered some of its internal networks inoperable.

The outcry over that breach, joined by President Barack Obama, heightened the perception that such destruction was an unusual extreme, albeit one that has been anticipated for years.

Destruction of data presents little technical challenge compared with penetrating a network, so the infrequency of publicized incidents has often been ascribed to a lack of motive for attackers.

Now that hacking tools are being spread more widely, however, more criminals, activists, spies and business rivals are experimenting with such methods.

“Everyone got outraged over Sony, but far more vulnerable are these services we depend on day to day,” said Adam Blackwell, secretary of multidimensional security at the Washington, D.C.-based group of 35 nations.

The survey went to companies and agencies in crucial sectors as defined by the OAS members. Almost a third of the respondents were public entities, with communications, security and finance being the most heavily represented industries.

The questions did not delve into detail, leaving the amount of typical losses from breaches and the motivations of suspected attackers as matters for speculation. The survey-takers were not asked whether the attempted hacks succeeded, and some attacks could have been carried off without their knowledge.

The survey did allow anonymous participants to provide a narrative of key events if they chose, although those will not be published.

Blackwell told Reuters that one story of destruction involved a financial institution. Hackers stole money from accounts and then deleted records to make it difficult to reconstruct which customers were entitled to what funds.

“That was a really important component” of the attack, Blackwell said.

In another case, thieves manipulated equipment in order to divert resources from a company in the petroleum industry.

Blackwell said that flat security budgets and uneven government involvement could mean that criminal thefts of resources, such as power, could force blackouts or other safety threats.

At security company Trend Micro Inc. , which compiled the report for the OAS, Chief Cybersecurity Officer Tom Kellermann said additional destructive or physical attacks came from political activists and organized crime groups.

“We are facing a clear and present danger where we have non-state actors willing to destroy things,” he said. “This is going to be the year we suffer a catastrophe in the hemisphere, and when you will see kinetic response to a threat actor.”

So-called “ransomware,” which encrypts data files and demands payment be sent to remote hackers, could also have been interpreted as destructive, since it often leaves information unrecoverable.

A spokesman for the U.S. Department of Homeland Security, SY Lee, said the department did not keep statistics on how often critical U.S. institutions are attacked or see destructive software and would not “speculate” on whether 4 out of 10 seeing deletion attempts would be alarming.

U.S. political leaders cite attacks on critical infrastructure as one of their greatest fears, and concerns about protecting essential manufacturers and service providers drove a recent executive order and proposed legislation to encourage greater information-sharing about threats between the private sector and government.

Yet actual destructive attacks or manipulation of equipment are infrequently revealed. That is in part because breach-disclosure laws in more than 40 states center on the potential risks to consumers from the theft of personal information, as with hacks of retailers including Home Depot Inc and Target Corp.

Under Securities and Exchange Commission guidelines, publicly traded companies must disclose breaches with a potential material financial impact, but many corporations can argue that even deletion of internal databases, theft and manipulation of equipment are not material.

Much more is occurring at vital facilities behind the scenes, and that is borne out by the OAS report, said Chris Blask, who chairs the public-private Information Sharing and Analysis Center for cybersecurity issues with the industrial control systems that automate power, manufacturing and other processes.

“I don’t think the public has any appreciation for the scale of attacks against industrial systems,” Blask said. “This happens all the time.”

 

Slight (White) House Mocks Netanyahu

The Iranian Supreme Leader, Khamenei is throwing sand in the gear of the P5+1 framework agreement lead by U.S. Secretary of State, John Kerry.

He is not only non-committal on the matter but what is worse he has taken the same posture as the Iranian Foreign Minister, Mohammad Zarif, stating that ALL sanctions must be lifted before anything will go forward. This is a morning after additional dynamic, putting John Kerry and the White House in damage control.

But it is actually worse.

Iran: We’ll Start Using Advanced Centrifuges After Deal Signed

Iran’s negotiator in the nuclear negotiations and its nuclear chief revealed on Tuesday that after a final deal is signed by a June 30 deadline on the framework reached last week, Iran will unleash its most advanced centrifuges for uranium enrichment, threatening a quick turnover in producing a nuclear weapon.

Iran’s semi-official FARS news agency reported on a closed meeting held Tuesday by Foreign Minister Javad Zarif and Atomic Energy Organization of Iran (AEOI) chief Ali Akbar Salehi, in which they briefed members of Iran’s parliament on the deal being finalized.

In their statements, they said Iran’s most advanced IR-8 centrifuges will be used as soon as the deal removing world sanctions against Iran begins.

The report noted the two said the advanced centrifuges enrich uranium 20 times faster than the current IR-1 models, meaning they would radically reduce the breakout time needed for Iran to obtain a nuclear arsenal.

In the meeting Zarif and Salehi told the parliament “that the country would inject UF6 gas into the latest generation of its centrifuge machines as soon as a final nuclear deal goes into effect by Tehran and the six world powers,” according to the report.

“The AEOI chief and the foreign minister presented hopeful remarks about nuclear technology R&D which, they said, have been agreed upon during the talks, and informed that gas will be injected into IR-8 (centrifuges) with the start of the (implementation of the) agreement,” Iranian MP Javad Karimi Qoddousi was quoted as saying by the site.

Qoddousi also said the Iranian foreign ministry will present a “fact sheet” showing Iran’s version of the agreement to parliamentarians in the next few days.

Iranian and US versions of the framework have shown numerous contradictions, with the issue of advanced centrifuges being primary among them.

The US version claims Iran agreed to not use its advanced centrifuges, including IR-2, IR-4, IR-5, IR-6 or IR-8. However, the Iranian text says “on the basis of solutions found, work on advanced centrifuges shall continue on the basis of a 10-year plan,” apparently contradicting the American version.

This point is crucial, as experts have anticipated that under the deal Iran will be able to develop its centrifuge technology and reach a point where it can make a three week dash to obtain a nuclear weapon.

Israel has pointed out that of the 17 states with peaceful nuclear programs, none enrich uranium as Iran is being allowed to continue doing by the deal.

The statements come after US President Barack Obama admitted in an interview that as a result of the deal, Iran will be able to reach a “zero” breakout time by 2028, meaning it could produce nuclear weapons immediately whenever it wanted to.

Some interesting notes:

1. Iran collectively owes an estimated $119 billion in restitution for past terror acts and refuses to pay it stating the Foreign Sovereignty Act.

2. Iran also states that there will be no monitoring of their facilities.

3. The base line standard on the Iranian nuclear program performed by the IAEA was so long ago that a current report on the uranium enrichment and centrifuges is impossible to report.

4. The inspections mentioned in the recent framework are to be performed by the United Nations Security Council, who are not only not qualified, but Russia has a veto vote on that council.

Meanwhile, the White House has taken to a satire agenda, mocking Israel. This does not make for good policy, good governance or good relationships. Shame on the Slight (White) House.

White House tweet pokes fun at Israel on Iran nuke deal

The White House is taking another swipe at Israeli Prime Minister Benjamin Netanyahu, defending the Iran nuclear deal by posting a diagram of a nuclear bomb on Twitter similar to one used by the Israeli leader to warn against an agreement.

The administration’s tweet of a cartoon bomb is accompanied by a list of consequences of not striking a deal, including “resumed production of highly enriched uranium” and “no limits on stockpile of enriched uranium.” The supposed benefits of a deal include “no production or stockpile of highly enriched uranium.”

The sketch closely resembles one held up by Mr. Netanyahu during a speech in 2012 at the United Nations, when he warned that Iran’s push to develop a nuclear weapon must be stopped at all costs. His drawing of a bomb included a red line at the top to show how close Iran was to completing a nuclear device.

The White House diagram also includes a red line and proclaims, “Under the framework for an Iran nuclear deal, Iran uranium enrichment pathway to a weapon will be shut down.”

Mr. Netanyahu is an outspoken opponent of the framework agreement announced last week, in which sanctions against Iran will be lifted in exchange for scaling back Tehran’s nuclear program. President Obama’s push for an agreement with Iran has raised tensions in what was already an uneasy relationship with Mr. Netanyahu.

 

 

 

Russian Aggression Noticed Globally

The West has gone back to the future, Cold War conditions when it comes to Russia. When it comes to Ukraine, the media refers to the conflict as coming from Russian separatists, this is a misnomer, they are ‘Soviet’ loyalists.

US aerospace command moving comms gear back to Cold War bunker

Washington (AFP) – The US military command that scans North America’s skies for enemy missiles and aircraft plans to move its communications gear to a Cold War-era mountain bunker, officers said.

 

The shift to the Cheyenne Mountain base in Colorado is designed to safeguard the command’s sensitive sensors and servers from a potential electromagnetic pulse (EMP) attack, military officers said.

The Pentagon last week announced a $700 million contract with Raytheon Corporation to oversee the work for North American Aerospace Command (NORAD) and US Northern Command.

Admiral William Gortney, head of NORAD and Northern Command, said that “because of the very nature of the way that Cheyenne Mountain’s built, it’s EMP-hardened.”

“And so, there’s a lot of movement to put capability into Cheyenne Mountain and to be able to communicate in there,” Gortney told reporters.

“My primary concern was… are we going to have the space inside the mountain for everybody who wants to move in there, and I’m not at liberty to discuss who’s moving in there,” he said.

The Cheyenne mountain bunker is a half-acre cavern carved into a mountain in the 1960s that was designed to withstand a Soviet nuclear attack. From inside the massive complex, airmen were poised to send warnings that could trigger the launch of nuclear missiles.

But in 2006, officials decided to move the headquarters of NORAD and US Northern Command from Cheyenne to Petersen Air Force base in Colorado Springs. The Cheyenne bunker was designated as an alternative command center if needed.

That move was touted a more efficient use of resources but had followed hundreds of millions of dollars worth of modernization work at Cheyenne carried out after the attacks of September 11, 2001.

Now the Pentagon is looking at shifting communications gear to the Cheyenne bunker, officials said.

“A lot of the back office communications is being moved there,” said one defense official.

Officials said the military’s dependence on computer networks and digital communications makes it much more vulnerable to an electromagnetic pulse, which can occur naturally or result from a high-altitude nuclear explosion.

Under the 10-year contract, Raytheon is supposed to deliver “sustainment” services to help the military perform “accurate, timely and unambiguous warning and attack assessment of air, missile and space threats” at the Cheyenne and Petersen bases.

Raytheon’s contract also involves unspecified work at Vandenberg Air Force Base in California and Offutt Air Force Base in Nebraska.

***

Russia is so close that the F-16 fighter pilots can see it on the horizon as they swoop down over a training range in Estonia in the biggest ever show of U.S. air power in the Baltic countries.

The simulated bombs release smoke on impact, but the M-61 cannon fires live ammunition, rattling the aircraft with a deafening tremor and shattering targets on the ground.

 

The four-week drill is part of a string of non-stop exercises by U.S. land, sea and air forces in Europe — from Estonia in the north to Bulgaria in the south — scaled up since last year to reassure nervous NATO allies after Russia’s military intervention in Ukraine. U.S. and Russian forces are now essentially back in a Cold War-style standoff, flexing their muscles along NATO’s eastern flank.

The saber-rattling raises the specter that either side could misinterpret a move by the other, triggering a conflict between two powers with major nuclear arsenals despite a sharp reduction from the Cold War era.

“A dangerous game of military brinkmanship is now being played in Europe,” said Ian Kearns, director of the European Leadership Network, a London-based think-tank. “If one commander or one pilot makes a mistake or a bad decision in this situation, we may have casualties and a high-stakes cycle of escalation that is difficult to stop.”

With memories of five decades of Soviet occupation still fresh, many in the Baltic countries find the presence of U.S. forces a comfort rather than a risk.

In recent months, Estonia, Latvia and Lithuania have seen hundreds of U.S. armored vehicles, tanks and helicopters arrive on their soil. With a combined population of just over 6 million, tiny armies and no combat aircraft or vehicles, the last time tanks rumbled through their streets was just over 20 years ago, when remnants of the Soviet army pulled out of the region.

The commander of Estonia’s tiny air force, Col. Jaak Tarien, described the roar of American F-16s taking off from Amari — a former Soviet air base — as “the sound of freedom.”

Normally based in Aviano, Italy, 14 fighter jets and about 300 personnel from the 510th Fighter Squadron are training together with the Estonians — but also the Swedish and Finnish air forces. Meanwhile, Spain’s air force is in charge of NATO’s rotating air patrols over the Baltic countries.

“A month-long air exercise with a full F-16 squadron and, at the same time, a Spanish detachment doing air policing; that is unprecedented in the Baltics,” said Tarien, who studied at the U.S. Air Force Academy in Colorado Springs.

In Moscow the U.S. Air Force drills just 60 miles from the Russian border are seen in a different light.

“It takes F-16 fighters just a few minutes to reach St. Petersburg,” Foreign Ministry spokesman Alexander Lukashevich said, referring to the major Russian port city on the Baltic Sea. He expressed concern that the ongoing exercise could herald plans to “permanently deploy strike aircraft capable of carrying nuclear weapons at the Russian border.”

Moscow also says the U.S. decision to deploy armored vehicles in Eastern Europe violates an earlier agreement between Russia and NATO.

American officials say their troop deployments are on a rotational basis.

Russia has substantially increased its own military activity in the Baltic Sea region over the past year, prompting complaints of airspace violations in Estonia, Finland and Sweden, and staged large maneuvers near the borders of Estonia and Latvia.

“Russia is threatening nearly everybody; it is their way,” said Mac Thornberry, the Republican chairman of the U.S. House Armed Services Committee, during a recent visit to Vilnius, the Lithuanian capital.

“They want to intimidate the Baltic states, Poland, Ukraine and Romania, country after country. And the question is, do you let the bully get away with that or do you stand up and say ‘no, you can threaten, but we will not allow you to run over us,'” Thornberry said.

The Pentagon has said that some 3,000 U.S. troops will be conducting training exercises in Eastern Europe this year. That’s a small number compared to the hundreds of thousands of U.S. troops that have been withdrawn from Europe since the days when the Iron Curtain divided the continent. But the fact that they are carrying out exercises in what used to be Moscow’s backyard makes it all the more sensitive; the Kremlin sees NATO’s eastward expansion as a top security threat.

During a symbolic visit to Estonia in September, U.S. President Barack Obama said that the defense of the Baltic capitals of Tallinn, Riga and Vilnius is just as important as defending Berlin, Paris and London — a statement warmly received in Estonia, a nation of 1.3 million and with a mere 5,500 soldiers on active duty.

Welcoming the U.S. fighter squadron to Estonia, U.S. Ambassador Jeffrey D. Levine said the air drill was needed “to deter any power that might question our commitment to Article 5” — NATO’s key principle of collective defense of its members.

On Wednesday, The Associated Press observed bombing and strafing drills at the Tapa training ground both from the ground and from the back seat of one of the two F-16s taking part.

On board the fighter jet, the pull of the G-force was excruciating as the pilot swooped down onto his target before brutally ascending to circle the range.

After dropping six practice bombs each, the two jets returned to Amari air base, flying so low over the flat Estonian countryside that they frequently had to gain altitude to avoid radio towers.

On the ground, Lt. Col. Christopher Austin, commander of the 510th Squadron, dismissed the risk of his pilots making any rash moves that could provoke a reaction from the Russians.

“We stay far enough away so that we don’t have to worry about any (border) zones or anything like that,” he said. “We don’t even think about it.”