Investigating U.S. Based Islamic Charities

The most famous case was the Holyland Foundation Trial where millions of dollars from the United States found the pockets of global terrorists. Not much came of this in total due in part to Eric Holder. It is imperative that readers trace money and people domestically as it still goes on. Here is a link to use as a launch pad for continues whistleblowing.

Meanwhile, it appears that the UK is beginning to do some good work in investigating charities and it is likely the same thing occurs in America. These people and charities in America have tax exempt status from the IRS.

Charity Commission: British charities investigated for terror risks

William Shawcross, the chair of the Charity Commission, warns that money donated by the British public may already have been sent to Islamic State fighters, as the watchdog opens cases on 86 aid groups at risk from extremists

By , Robert Mendick, and Andrew Gilligan

The government’s charity watchdog has launched a series of formal investigations into British aid organisations, amid concerns that they are at risk of being hijacked by terrorists in Syria and Iraq.

The head of the Charity Commission told The Telegraph he fears that groups distributing money and supplies donated by the public in Britain could be exploited by Islamists to smuggle cash, equipment and fighters to terrorists on the front line.

The regulator has begun scrutinising 86 British charities which it believes could be at risk from extremism, including 37 working to help victims of the Syria crisis, according to new figures released today.

It has launched full-scale investigations into four charities operating in the region, including the group that employed the murdered hostage Alan Henning when he was kidnapped, and another organisation allegedly infiltrated by a suicide bomber.

The number of terrorism-related cases that the regulator is examining has almost doubled since February, amid growing concerns that charities working in the region are potential targets for the so-called Islamic State in Iraq and the Levant (Isil, also known as Islamic State, and Isis).

William Shawcross, the chair of the Commission, said there was “a risk” that money donated by the British public had already been sent to Isil fighters, who have beheaded two British hostages, among many other victims, and are holding a third.

“It is absolutely terrifying to see these young British men going out to be trained in Syria and coming back here,” Mr Shawcross said.

“Most of them are not going out under the auspices of charities but, when that happens, it is absolutely our duty to come down on it.

“Even if extremist and terrorist abuse is rare, which it is, when it happens it does huge damage to public trust in charities. That’s why I take it very seriously.”

The warning comes at a critical time for global efforts to stem the flow of money to terrorists in Iraq and Syria.

The Telegraph’s Stop the Funding of Terror campaign, which has won wide support in Parliament, the military and overseas, is calling for action to cut off terrorist finance.

The Commission, which regulates charities in England and Wales, has worked with the government of Qatar as well as Kuwait and Saudi Arabia, among others, to strengthen their systems for regulating charitable groups.

However, despite these efforts, funded by British taxpayers, America warned earlier this month that Qatar and Kuwait remain “permissive” regimes in which terrorist financiers are able to operate.

Analysts fear that millions of dollars in so-called charitable donations raised inside Qatar and Kuwait have been used to buy weapons and supplies for jihadists in Iraq and Syria. In other developments this weekend:

:: The brother of David Haines, the British hostage executed by his captors, has made an impassioned plea to Gulf States to strangle the funding to terror groups operating in Syria and Iraq. Michael Haines told The Telegraph: “We have to attack their finances. We need to fight them on every front that we can find. We have to destroy them.”

:: It has emerged that the cousin of Qatar’s foreign minister has been convicted of funding international terrorism. Abdulaziz bin Khalifa al-Attiyah was found guilty in absentia by a Lebanese court for channelling financial support to al-Qaeda.

:: Lord Lamont, the former chancellor, praised the Telegraph in Parliament for “highlighting the movement of funds to terrorist groups in the Middle East” as he pressed ministers to raise the issue with Gulf rulers.

:: Foreign Office Minister Baroness Anelay promised that Britain was having “robust” talks with Qatar and other Gulf states as she called for “much greater progress” to stop terror financing. The minister revealed that Isil gets most of its money from selling oil, extortion, and hostage ransoms, as well as from foreign donations.

:: The government is facing new questions over the “extraordinary” inconsistencies in British action against terrorist financiers, after it emerged that terrorists whose assets have been frozen under Treasury sanctions may not be banned from travelling to the UK. Stephen Barclay, a Conservative MP, called on his own party leadership to “spell out” why Britain has a different sanctions regime against Qatari terror financiers from America, the UK’s closest intelligence ally.

Last Wednesday, David Cameron raised concerns that the wealthy Gulf state of Qatar had failed to act against rich Qatar-based fundraisers and “charities” that have sent millions of dollars to jihadists fighting in Iraq and Syria.

During a private, one-to-one discussion with Sheikh Tamim bin Hamad Al Thani, the Emir of Qatar, the Prime Minister urged the Gulf ruler to accelerate efforts to tackle terrorist financiers operating within the country.

Sources said the issue was also raised during a formal lunch in Number 10, which was also attended by Mr Cameron’s chief of staff, Ed Llewellyn, his national security adviser Sir Kim Darroch, and the Foreign Secretary, Philip Hammond.

In Britain, the Charity Commission had already taken action against charities linked to extremists, with the most serious cases going to court as part of terrorism prosecutions.

Speaking to The Telegraph, Mr Shawcross said the regulator was stepping up its assault on the abuse of charitable funds by terrorists, as well as other kinds of malpractice including fraud, mismanagement, and mistreatment of vulnerable adults and children.

An extra £8 million has been given to the watchdog, along with planned new powers, to enhance its ability to tackle abuse of charities by Islamists and others, he said.

However, he warned that it was “often very difficult” to ensure that aid and money sent to war zones to help the victims of violence does not end up in the wrong hands.

“Of course there is a risk [that funds raised here in Britain have been transported to Isil jihadists in Iraq and Syria].

“If we find any evidence of it happening through charities we will pursue it robustly in conjunction with the police and other law enforcement agencies.”

He said he was particularly concerned about the large number of small, new charities that have been set up to raise money to help victims of the Syrian crisis, while “aid convoys” delivering supplies to the region were especially vulnerable.

“I think there are 500 British charities that say they operate in Syria in one form or another and 200 of them have been registered since the conflict there began. Some of them are inexperienced and obviously more vulnerable to exploitation than bigger more established charities, the household names.”

Mr Shawcross said the regulator was concerned that “there may not be adequate controls as to where the goods and supplies were being delivered” from the aid convoys. He insisted that “most Muslim charities are run by good people”, many of whom are “more horrified than anybody else by abuse of charities by Islamists”.

Mr Shawcross insisted that “most Muslim charities are run by good people”, many of whom are “more horrified than anybody else by abuse of charities by Islamists”.

“Charities can be abused, people working along the Syrian border can be abused, for Islamist or extremist purposes, there is no question about that – sometimes knowingly, sometimes unknowingly,” he said.

New figures from the Commission show there are 86 case files currently open in which officials are reviewing the operations of charities, at least in part because there are fears that they operate in countries – or for particular causes – which could be targeted by extremists or terrorists.

The regulator’s figures showed that 37 of these 86 charities under scrutiny were working in Syria, by raising money in Britain, sending humanitarian supplies, or participating directly in aid convoys to the worst hit areas.

This workload has increased significantly since February, when the Commission was working on 48 extremism-related cases, about 10 of which involved charities that focused on Syria.

Full “statutory inquiries“ – the Commission’s most serious kind of formal investigation – have begun into four British charities operating in Syria, including the Al-Fatiha Global organisation, which the beheaded hostage Alan Henning was working with when he was kidnapped.

The others are Children in Deen, Aid Convoy and Syria Aid. All four investigations are still “live”, while dozens of other charities are being monitored or scrutinised by the Commission because they are operating in Syria or raising funds for the region in Britain.

Mr Henning was driving an ambulance on behalf of Rochdale Aid 4 Syria, which raised money on behalf of Al-Fatiha Global. He was part of a convoy of 20 vehicles making the 4,000-mile journey to Idlib in north-west Syria when he was kidnapped on Boxing Day last year.

The Charity Commission launched its investigation after one of Al-Fatiha’s leaders was photographed with his arms around two hooded fighters carrying machine guns. A trustee of the charity has challenged the commission’s decision to launch the inquiry.

The investigation into Children in Deen began in April after it emerged that a participant in the Birmingham charity’s aid convoy last year, Abdul Waheed Majeed, had allegedly become Britain’s first suicide bomber in Syria.

Majeed, 41, killed dozens of civilians when he drove a truck full of explosives into the wall of Aleppo prison, enabling hundreds of prisoners to escape.

Last year, the Commission began formal inquiries into Aid Convoy, and Syria Aid, over concerns about the way their funds were being used once inside Syria.

The watchdog issued a formal warning against aid convoys to Syria and urged members of the public to donate to the larger aid agencies and major international charities to minimise the risk that their money will be stolen by extremists.

Masood Ajaib, a trustee of Children in Deen, condemned the actions of Majeed and completely dissociated himself and the charity from any links to violence. He said the commission’s investigation had already hit fundraising and made its operations more difficult.

“We had nothing to do with this and do not support violence,” he said. “All we want to do is help the women and children affected by the biggest humanitarian disaster we have seen for generations.”

UN Considering a Rewrite of Israel’s History

UNITED NATIONS (AP) — Arab ambassadors met Monday to discuss Palestinian amendments to a U.N. resolution that would call for an end to Israel’s occupation within three years, a move vehemently opposed by Israel.

Palestinian President Mahmoud Abbas said the revised resolution would be submitted Monday and voted on Tuesday.

Israel’s Prime Minister Benjamin Netanyahu said Monday that if the Security Council doesn’t reject the resolution “we will.”

The Palestinian Authority is “seeking to impose on us a diktat that would undermine Israel’s security, put its future in peril,” Netanyahu said in a statement. “Israel will oppose conditions that endanger our future.”

Jordan’s U.N. Ambassador Dina Kawar, the Arab representative on the Security Council, told reporters as she headed into Monday’s closed-door meeting that Jordan would have liked more consultations among the 15 council members but respects “very much” that the Palestinian situation is difficult.

“We will be doing what the Palestinians want and in conformity with the Arab League,” she said.

The Security Council is almost certain to reject a resolution with a timetable to end Israel’s occupation. Even if the resolution musters the minimum nine required “yes” votes, the United States, Israel’s closest ally, will likely veto it. The U.S. insists there must be a negotiated solution to the Israeli-Palestinian conflict.

Netanyahu said Israel expects “the international community — at least the responsible members of that community — to oppose vigorously this U.N. diktat, this U.N. Security Council resolution because what we need always is direct negotiations and not imposed conditions.”

Palestinian U.N. Ambassador Riyad Mansour has said the Palestinians can’t return “to the same cycle of failed negotiations,” which he says Israel uses to entrench its occupation. He has urged international support for the resolution setting a deadline for a complete Israeli withdrawal.

The Palestinians circulated a draft on Oct. 1 asking the council to set a deadline of November 2016 for an Israeli withdrawal from all Palestinian territory occupied since 1967. France had been working for a U.N. resolution aimed at restarting Israeli-Palestinian peace negotiations, setting a two-year deadline for success.

Palestinian official Saeb Erakat said Sunday that the amended resolution calls for ending the Israeli occupation within three years and establishing a Palestinian independent state within the 1967 borders with East Jerusalem as its capital. He said it also calls for solving the problem of Palestinian refugees in accordance with U.N. resolutions and the release of Palestinian prisoners in Israeli jails.

In December 2011, former House Speaker and presidential candidate, Newt Gingrich made the following observation regarding the Palestinians;

Remember there was no Palestine as a state. It was part of the Ottoman Empire. And I think that we’ve had an invented Palestinian people, who are in fact Arabs, and were historically part of the Arab community…

That comment set off a firestorm of debate and criticism but is in actuality, grounded in historical fact. As noted historian Benny Morris pointed out in his acclaimed book, 1948: The First Arab-Israeli War, at the turn of the 20th century, most Arabs residing in the Land of Israel or “Palestine” considered themselves to be subjects of the Ottoman Empire. There were some Palestinian Arabs with vague nationalistic tendencies but even this minority considered itself to be part of Greater Syria. There simply was no reference to an independent Palestine for a distinct group of people calling themselves “Palestinians.”

Morris also perceptively notes that the residents of Palestinian villages routinely failed to come to the assistance of nearby villages that were under attack by Jewish forces thus reinforcing the view that Arab villagers felt little loyalty to all but clan and village. The notion of a “Palestinian people” was an alien concept to the common Palestinian villager who was not bound by any sense of duty to assist a neighboring village.

Occasionally, Palestinians themselves will acknowledge this fact. In a revealing 1977 interview with the Dutch newspaper Trouw, PLO executive committee member Zahir Muhsein stated,

The Palestinian people does not exist. The creation of a Palestinian state is only a means for continuing our struggle against the state of Israel for our Arab unity. In reality today there is no difference between Jordanians, Palestinians, Syrians and Lebanese. Only for political and tactical reasons do we speak today about the existence of a Palestinian people, since Arab national interests demand that we posit the existence of a distinct ‘Palestinian people’ to oppose Zionism.

For tactical reasons, Jordan, which is a sovereign state with defined borders, cannot raise claims to Haifa and Jaffa. While as a Palestinian, I can undoubtedly demand Haifa, Jaffa, Beer-Sheva and Jerusalem. However, the moment we reclaim our right to all of Palestine, we will not wait even a minute to unite Palestine and Jordan.

It was a rare but astonishing moment of candor. A senior PLO member was openly acknowledging what few would readily admit. But his was not an isolated admission. In a March 2012 televised address, Hamas Minister of the Interior and of National Security Fathi Hammad essentially validated Gingrich’s assessment of the Palestinians. While pleading for Egyptian fuel, Hammad let loose with a series of embarrassing admissions that were certainly not intended for Western audiences.

“Every Palestinian…throughout Palestine can prove his Arab roots, whether from Saudi Arabia or Yemen or anywhere.” He went on to say that “personally, half my family is Egyptian, we are all like that.” And further buries himself deeper by stating, “Brothers, half the Palestinians are Egyptian and the other half are Saudis…Who are the Palestinians?” he asks rhetorically. “We have families called al-Masri whose roots are Egyptian, Egyptian! We are Egyptian! We are Arab! We are Muslim!” He concludes his rant with the obligatory Muslim battle cry, “Allahuakbar!” Curiously absent from his long diatribe is any recognition of an independent Palestinian identity and that’s precisely because there simply isn’t any.

Lacking their own independent history, culture and identity, Palestinians have adopted a strategy of denying Jewish history. Arafat, for example, flat out denied the fact that great Jewish Temples, built first by king Solomon and then by Herod, once stood where the Al-Aqsa Mosque currently stands. So ridiculous were his comments that they earned a swift rebuke from President Clinton. Arafat’s successor, Mahmoud Abbas taking cue from his boss also adopted this odious position. It should therefore come as no surprise that Abbas is also a confirmed Holocaust denier, despite his transparent efforts to rehabilitate his image for his gullible Western audience.

Palestinian Arabs have also attempted to recruit Western “experts” and academics to their cause. In his insightful book The Fight for Jerusalem: Radical Islam, the West, and the Future of the Holy City, veteran Israeli diplomat Dore Gold chronicles the length to which Arab-Muslims and their Western lackeys will go to deny the Jewish nexus to the Land of Israel. They argued that much of ancient Jewish history was nothing but mythology including the Kingdoms of David and Solomon.

From the Arab perspective, the tactic was a sound one. Sever the ancient historical Jewish nexus with Israel and you severely undermine claims of indigenousness. But archeology does not lie and those very Western academics (at least the intellectually honest ones) were forced to retract their findings and conclusions after the dramatic 1993 discovery of a 9th century stele at Tel Dan in northern Israel that clearly referenced the “House of David.” Additional discoveries since then, including finds in Jerusalem, Tel Zayit and at the Fortress of Elah have further eroded claims by skeptics and naysayers.

Not content with denying Jewish history, Palestinian Arabs have actually attempted to co-opt it by absurdly claiming that Moses as well as King Saul were Palestinian Muslims who conquered and claimed “Palestine” for the benefit of Palestinians. These risible comments were spewed forth by “Dr.” Omar Ja’ara, a lecturer at Al-Najah University in Nablus and broadcast on Palestinian Authority TV. He notes further that the actions of Moses and Saul represented “the first Palestinian liberation through armed struggle to liberate Palestine… this is our logic and this is our culture.”

Incidentally, Al-Najah University boasts on its website that it is “the first Palestinian University to obtain the EFQM European Certificate of Excellence.” Something to bear in mind next time any parent contemplates sending their child off to Europe for higher education.

Of course it doesn’t matter that Saul lived approximately 1,700 years before Muhammad was zygote. Facts play absolutely no role in Palestinian academia. Empirical data and evidence is ignored. Precedence is given to upholding a false, pernicious and viscerally anti-Semitic narrative that either denies historical fact or co-opts it.

As PLO bigwig Zahir Muhsein candidly noted, the claim of a Palestinian identity is a myth whose aim is not designed to achieve liberation or advancement for any particular people but rather to subjugate and destroy another people. For those of you, who still remain unconvinced; consider the recent comments made by a prominent sheikh during a religious sermon at the Al-Aqsa Mosque. During his tirade, which included the usual dose of anti-Semitic vitriol, the sheikh never once uttered a desire or longing for Palestinian statehood. Instead he expresses the desire to join with ISIS in its quest for an Islamic caliphate and asks the large crowd of acolytes surrounding him to, “pledge allegiance to the Muslim Caliph,” and they in turn respond with chants of “amen!”

Few in the West have faced up to this malevolent reality. They continue to adhere to the harmful, dogmatic formula of a two-state solution. What they willfully fail to realize is that such a solution poses an existential threat to the Mideast’s only democracy and will most certainly have grave negative consequences for the region at large.

Ari Lieberman is an attorney and former prosecutor who has authored numerous articles and publications on matters concerning the Middle East and is considered an authority on geo-political and military developments affecting the region.

Islamist Recruiting in U.S. Prisons

Has an overcrowded prison system which provides little in the way of rehabilitation, and ample idle time for inmates to embrace radical ideologies, become a breeding ground for homegrown terrorists?

The film traces the men charged with this 2005 plot in Los Angeles, a group calling itself Jam’iyyat Ul-Islam Is-Saheech, which translates to Assembly of Authentic Islam, shortened to JIS by law enforcement.   The group plotted to strike U.S. military facilities, Israeli national interests and synagogues in the Los Angeles area around the Jewish high holidays. The leader of the group was Kevin Lamar James, imprisoned for robbery. One of the group’s pivotal adherents, Levar Haney Washington, swore an oath of allegiance to James and JIS just prior to his release on parole from Folsom State Prison outside Sacramento, California in November 2004. Allegedly, Washington recruited two others to his cause once he was released.

The JIS episode is a case study for the larger question of Islam and its influence in the American prison system.  Leaders at all levels of government and society are wrestling with these questions: can correctional officials restrict an inmate’s access to religious teachings and services without violating the inmate’s Constitutional right to freedom of religion? Do the allegations in the JIS case outweigh the many instances of positive Islamic conversion in prison? And should prison reform become integral to overall U.S. national security policy? Or are the actions of this small isolated JIS group just a blip on the radar?

U.S. Prisons Churning Out Thousands Of Radicalized Inmates
By Joy Brighton

Back in 2006, then FBI director Robert Mueller prophetically described the radical Islamist conversion machine operating throughout U.S. prisons, to a Senate committee. He said that prisons were a “fertile ground” for Islamic extremists, and that they targeted inmates for introduction to the militant Wahhabi and Salafist strains of Islam.

The recent so-called “lone wolf” terrorist attacks in Oklahoma City, New York, and just over our northern border in the Canadian capital of Ottawa, may be the product of such radicalization.

In April 2010, Larry James murdered his mother, pregnant wife, 7-month-old son, 3-year-old niece and 16-year-old niece for refusing to convert to Islam. James converted in 2007, while in a U.S. prison.

Then two months ago Colleen Hufford, a 54-year-old grandmother and factory worker in Oklahoma, was beheaded with a produce knife by Alton Nolen who likely converted to Islam in a U.S. prison. Nolen is being charged with workplace violence.

Last month NYPD officer Kenneth Healey, 25, was axed to death with a hatchet to the side of the head. He was not attacked by a “lone wolf,” but by ex-con Zale Thompson. New York City Police Commissioner William Bratton has called it a terrorist attack, and the NYPD might want to look at Thompson’s record in California where he did two brief terms in California prisons.

The statistics are staggering, and woefully out of date. One out of three African-American inmates in U.S. prisons convert to Islam while incarcerated.

This statistic is no longer limited to African-Americans in prison. The Huffington Post reported an estimated 35,000 — 40,000 inmates convert to Islam each year, and that 15 percent of the total U.S. prison population or 350,000 inmates are Muslim.

This is more than 18 times the national representation of Muslims in America, reported to be 0.8 percent. Prisons are churning out converts to Islam who are taught they are righteously entitled to control the religion, speech, and dress of family, co-workers and strangers.

The key to conversion success is clear. Our government has been contracting and paying Muslim Brotherhood front groups, such as GSISS (The Graduate School of Islamic and Social Sciences) and ISNA (Islamic Society of North America) to screen and assign Muslim prison chaplains for at least 8 years.

While Egypt and Saudi Arabia have banned the Muslim Brotherhood, classifying it as a terror group, the White House, U.S. prisons, and the Departments of Justice and Homeland Security continue to work with Muslim Brotherhood groups.

For example, Paul Pitts served 14 years in prison for murder, where he converted to Islam and became Imam Abdu-Shahid. He was paroled in 2001 and hired as a prison chaplain in 2007 with an annual salary of $49,471. In Feb 2010, he was caught trying to bring scissors and razor blades into the Manhattan Detention Complex.

A New York City corrections department source told the New York Post: “It’s a disgrace that taxpayers are funding Muslim chaplains who not only have criminal records, but also are promoting violence.”

Abdu-Shahid’s boss — head chaplain Umar Abdul-Jalil — was hired at an annual salary of $76, 602 even though he served 14 years for dealing drugs. In 2006, he was suspended for two weeks without pay after declaring that “the greatest terrorists in the world occupy the White House.” He continues to oversee 40 prison chaplains.

According to the Wall Street Journal, Wallace Gene Marks converted under Imam Umar while in prison for weapon possession. He was hired as a one of the first paid Muslim chaplains in 1975 and has hired nearly 45 chaplains. Imam Umar says that prison “is the perfect recruitment and training grounds for radicalism and the Islamic religion” and that 9/11 hijackers should be honored as martyrs. “Funded by the Saudi government he traveled often to Saudi Arabia and brought that country’s harsh form of Islam to New York’s expanding ranks of Muslim prisoners.”

U.S. Flag Down in Kabul, Taliban’s Rises

KABUL, Afghanistan — The war in Afghanistan, fought for 13 bloody years and still raging, came to a formal end Sunday with a quiet flag-lowering ceremony in Kabul.

The event marked the transition of the fighting from U.S.-led combat troops to the country’s own security forces.

In front of a small, hand-picked audience at the headquarters of the NATO mission, the green-and-white flag of the International Security Assistance Force was ceremonially rolled up and sheathed, and the flag of the new international mission called Resolute Support was hoisted.

U.S. Gen. John Campbell, commander of ISAF, commemorated the 3,500 international soldiers killed on Afghan battlefields and praised the country’s army for giving him confidence that they are able to take on the fight alone.

“Resolute Support will serve as the bedrock of an enduring partnership” between NATO and Afghanistan, Campbell told an audience of Afghan and international military officers and officials, as well as diplomats and journalists.

“The road before us remains challenging, but we will triumph,” he added.

Beginning Jan. 1, the new mission will provide training and support for Afghanistan’s military, with the U.S. accounting for almost 11,000 of the 13,500 members of the residual force.

“Thanks to the extraordinary sacrifices of our men and women in uniform, our combat mission in Afghanistan is ending, and the longest war in American history is coming to a responsible conclusion,” President Obama said in a statement issued in Hawaii, where he is on vacation with his family.

Afghan President Ashraf Ghani, who took office in September, signed bilateral security agreements with Washington and NATO allowing the ongoing military presence.

ISAF was set up after the 2001 U.S.-led invasion as an umbrella for the coalition of around 50 nations that provided troops and took responsibility for security across the country. It ends with 2,224 American soldiers killed, according to an Associated Press tally.

Taliban spokesman Zabihullah Mujahid called Sunday’s event a “defeat ceremony” and said the insurgents’ fight would continue.

Taliban Claims America ‘Defeated’ in Afghanistan

Reuters is reporting that:

Taliban insurgents in Afghanistan on Monday declared the “defeat” of the U.S. and its allies in the 13-year-old war, a day after the coalition officially marked the end of its combat mission.

Meanwhile, as the AP reports:

Thousands of Afghans are pouring into makeshift camps in the capital where they face a harsh winter as the Taliban return to areas once cleared by foreign forces, who this week are marking the end of their combat mission.

And, as Heath Druzin of Stars and Stripes reports, some U.S. troops will remain in Afghanistan in what their commander describes as:

“… a non-combat mission in a combat environment.”

***

At the end of President Obama’s sixth year in office, the commander in chief who once vowed to end America’s longest period of war still maintains thousands of troops in Afghanistan and Iraq — conflicts that refuse to conform to neat White House timetables.

The end of this year marks an end to the official combat role for the U.S. in Afghanistan. As 2015 dawns, U.S. troops transition to a training and support role, even as the Taliban is increasing its attacks. And in Iraq, more U.S. troops will be on the way to a war that was supposed to be over, at least as far as the U.S. goes.

Read more here.

 

 

The Cyber Panic Begins: FBI, DHS and Defense

Update:  On his last press conference of the year, Barack Obama said that Sony made a mistake by surrendering to the threats posed by the hacks and Barack said he wished that the leadership of Sony has spoken to him personally. Well the truth is, Sony DID call the White House and explained the matter in detail to Obama’s senior staff. Obama lied.

FBI Director James Comey gave an intense interview about cyber war and the risks to America. The single most important job of government is to keep the homeland safe and to ensure national defense and national security. You can bet that real events and the depth of the cyber damage to America is not being told. So how bad could it be? That answer is left up to us. Yet the FBI did publish a statement on the Sony investigation.

FBI Beefs Up Amid Explosion of Cybercrime

Cybercrime is one of the priorities for the FBI, which has 13,260 special agents across the country, according to the agency.

Comey said he sees a “tremendous amount of cyberespionage going on — the Chinese being prominent among them, looking to steal our intellectual property.”

“I see a whole lot of hacktivists, I see a whole lot of international criminal gangs, very sophisticated thieves,” he said. “I see people hurting kids, tons of pedophiles, an explosion of child pornography.”

Cybercrime is one of the priorities for the FBI, which has 13,260 special agents across the country, including on Oahu, Maui and Hawaii island, according to the agency. The FBI had an $8.3 billion budget in fiscal 2014.

Forget the Sony Hack, This Could Be the Biggest Cyber Attack of 2015

By Patrick Tucker

On Friday, the FBI officially named North Korea as the party responsible for a cyber attack and email theft against Sony Pictures. The Sony hack saw many studio executives’ sensitive and embarrassing emails leaked online. The hackers threatened to attack theaters on the opening day of the offending film, “The Interview,” and Sony pulled the plug on the movie, effectively censoring a major Hollywood studio.

The end of “The Interview” is not the end of the world. Technology journalists were quick to point out that, even though the cyber attack could be attributable to a nation state actor, it wasn’t particularly sophisticated. Ars Technica’s Sean Gallagher likened it to a “software pipe bomb.” The fallout, of course, was limited. And while President Barack Obama vowed to respond to the attack, he also said it was a mistake for Sony to back down.

“I think all of us have to anticipate occasionally there are going to be breaches like this. They’re going to be costly. They’re going to be serious. We take them with the utmost seriousness. But we can’t start changing our patterns of behavior any more than we stop going to a football game because there might be the possibility of a terrorist attack; any more than Boston didn’t run its marathon this year because of the possibility that somebody might try to cause harm. So, let’s not get into that — that way of doing business,” he said at a White House briefing on Friday.

But according to cyber-security professionals, the Sony hack may be a prelude to a cyber attack on United States infrastructure that could occur in 2015, as a result of a very different, self-inflicted document dump from the Department of Homeland Security in July.

Important training video.  

2015: The Year of Aurora?

Here’s the background: On July 3, DHS, which plays “key role” in responding to cyber-attacks on the nation, replied to a Freedom of Information Act (FOIA) request on a malware attack on Google called “Operation Aurora.”

Unfortunately, as Threatpost writer Dennis Fisher reports, DHS officials made a grave error in their response. DHS released more than 800 pages of documents related not to Operation Aurora but rather the Aurora Project, a 2007 research effort led by Idaho National Laboratory demonstrating how easy it was to hack elements in power and water systems.

Oops.

The Aurora Project exposed a vulnerability common to many electrical generators, water pumps and other pieces of infrastructure, wherein an attacker remotely opens and closes key circuit breakers, throwing the machine’s rotating parts out of synchronization causing parts of the system to break down.

In 2007, in an effort to caste light on the vulnerability that was common to many electrical components, researchers from Idaho National Lab staged an Aurora attack live on CNN. The video is below.

How widespread is the Aurora vulnerability? In this 2013 article for Power Magazine:

“The Aurora vulnerability affects much more than rotating equipment inside power plants. It affects nearly every electricity system worldwide and potentially any rotating equipment—whether it generates power or is essential to an industrial or commercial facility.”

The article was written by Michael Swearingen, then manager for regulatory policy for Tri-County Electric Cooperative (now retired), Steven Brunasso, a technology operations manager for a municipal electric utility, Booz Allen Hamilton critical infrastructure specialist Dennis Huber and Joe Weiss, a managing partner for Applied Control Solutions.

Weiss today is a Defense Department subcontractor working with the Navy’s Mission Assurance Division. His specific focus is fixing Aurora vulnerabilities. He calls DHS’s error “breathtaking.”

The vast majority of the 800 or so pages are of no consequence, says Weiss, but a small number contain information that could be extremely useful to someone looking to perpetrate an attack. “Three of their slides constitute a hit list of critical infrastructure. They tell you by name which [Pacific Gas and Electric] substations you could use to destroy parts of grid. They give the name of all the large pumping stations in California.”

The publicly available documents that DHS released do indeed contain the names and physical locations of specific Pacific Gas and Electric Substations that may be vulnerable to attack.

Defense One shared the documents with Jeffrey Carr, CEO of the cyber-security firm Taia Global and the author of Inside Cyber Warfare: Mapping the Cyber Underworld. “I’d agree…This release certainly didn’t help make our critical infrastructure any safer and for certain types of attackers, this information could save them some time in their pre-attack planning,” he said.

Perpetrating an Aurora attack is not easy, but it becomes much easier the more knowledge a would-be attacker has on the specific equipment they may want to target.

How easy is it to launch an Aurora attack?

In this 2011 paper for the Protective Relay Engineers’ 64th Annual Conference, Mark Zeller, a service provider with Schweitzer Engineering Laborites lays out—broadly—the information an attacker would have to have to execute a successful Aurora attack. “The perpetrator must have knowledge of the local power system, know and understand the power system interconnections, initiate the attack under vulnerable system load and impedance conditions and select a breaker capable of opening and closing quickly enough to operate within the vulnerability window.”

“Assuming the attack is initiated via remote electronic access, the perpetrator needs to understand and violate the electronic media, find a communications link that is not encrypted or is unknown to the operator, ensure no access alarm is sent to the operators, know all passwords, or enter a system that has no authentication.”

That sounds like a lot of hurdles to jump over. But utilities commonly rely on publicly available equipment and common communication protocols (DNP, Modbus, IEC 60870-5-103, IEC 61850, Telnet, QUIC4/QUIN, and Cooper 2179) to handle links between different parts their systems. It makes equipment easier to run, maintain, repair and replace. But in that convenience lies vulnerability.

In their Power Magazine article, the authors point out that “compromising any of these protocols would allow the malicious party to control these systems outside utility operations.”

Defense One reached out to DHS to ask them if they saw any risk in the accidental document dump. A DHS official wrote back with this response: “As part of a recent Freedom of Information Act (FOIA) request related to Operation Aurora, the Department of Homeland Security (DHS) National Programs and Protection Directorate provided several previously released documents to the requestor. It appears that those documents may not have been specifically what the requestor was seeking; however, the documents were thoroughly reviewed for sensitive or classified information prior to their release to ensure that critical infrastructure security would not be compromised.”

Weiss calls the response “nonsense.”

The risk posed by DHS accidental document release may be large, as Weiss argues, or nonexistent, as DHS would have you believe. But even if it’s the latter, Aurora vulnerabilities remain a key concern.

Perry Pederson, who was the director of Control Systems Security Program at DHS in 2007 when the Aurora vulnerability was first exposed, said as much in a blog post in July after the vulnerability was discovered. He doesn’t lay blame at the feet of DHS. But his words echo those of Weiss in their urgency.

“Fast forward to 2014. What have we learned about the protection of critical cyber-physical assets? Based on various open source media reports in just the first half of 2014, we don’t seem to be learning how to defend at the same rate as others are learning to breach.”

Aurora vs. the Sony Hack

In many ways the Aurora vulnerability is a much harder problem to defend against than the Sony hack, simply because there is no obvious incentive for any utility operator to take any of the relatively simple costs necessary to defend against it. And they are simple. Weiss says that a commonly available device installed on vulnerable equipment could effectively solve the problem, making it impossible to make the moving parts spin out of synchronization. There are two devices on the market iGR-933 rotating equipment isolation device (REID) and an SEL 751A, that purport to shield equipment from “out-of-phase” states.

To his knowledge, Weiss says, Pacific Gas and Electric has not installed any of them anywhere, even though the Defense Department will actually give them away to utility companies that want them, simply because DOD has an interest in making sure that bases don’t have to rely on backup power and water in the event of a blackout. “DOD bought several of the iGR-933, they bought them to give them away to utilities with critical substations,” Weiss said. “Even though DOD was trying to give them away, they couldn’t give them to any of the utilities because any facility they put them in would become a ‘critical facility’ and the facility would be open to NERCCIP audits.”

Aurora is not a zero-day vulnerability, an attack that exploits an entirely new vector giving the victim “zero days” to figure out a patch. The problem is that there is no way to know that they are being implemented until someone, North Korea or someone else, chooses to exploit them.

Can North Korea pull of an Aurora vulnerability? Weiss says yes. “North Korea and Iran and are capable of doing things like this.”

Would such an attack constitute an act of cyber war? The answer is maybe. Speaking to reporters at the Pentagon on Friday, Pentagon Press Secretary Rear Adm. John Kirby said “I’m also not able to lay out in any specificity for you what would be or wouldn’t be an act of war in the cyber domain. It’s not like there’s a demarcation line that exists in some sort of fixed space on what is or isn’t. The cyber domain remains challenging, it remains very fluid. Part of the reason why it’s such a challenging domain for us is because there aren’t internationally accepted norms and protocols. And that’s something that we here in the Defense Department have been arguing for.”

Peter Singer, in conversation with Jason Koebler at Motherboard, says that the bar for actual military engagement against North Korea is a lot higher than hacking a major Hollywood movie studio.

“We didn’t go to war with North Korea when they murdered American soldiers in the 1970s with axes. We didn’t go to war with North Korea when they fired missiles over our allies. We didn’t go to war with North Korea when one of their ships torpedoed an alliance partner and killed some of their sailors. You’re going to tell me we’re now going to go to war because a Sony exec described Angelina Jolie as a diva? It’s not happening.”

Obama said Friday that there would be some sort of response to the hack, but declined to say what. “We have been working up a range of options. They will be presented to me. I will make a decision on those based on what I believe is proportional and appropriate to the nature of this crime,” he said.

Would infrastructure vandalism causing blackouts and water shutdowns constitute an act of war? The question may be moot. Before the United States can consider what sort of response is appropriate to cyber attacks, it must first be able to attribute them.

The FBI was able to finger North Korea for the hack after looking at the malware in the same way a forensics team looks for signs of a perpetrator at the scene of the crime. “Technical analysis of the data deletion malware used in this attack revealed links to other malware that the FBI knows North Korean actors previously developed. For example, there were similarities in specific lines of code, encryption algorithms, data deletion methods, and compromised networks,” according to the FBI statement.

An Aurora vulnerability attack, conversely, leaves no fingerprints except perhaps a single IP address. Unlike the Sony hack, it doesn’t require specially written malware to be uploaded into a system, Malware that could indicate the identity of the attacker, or at least his or her affiliation. Exploiting an Aurora attack is simply a matter of gaining access, remotely, possibly because equipment is still running on factory-installed passwords, and then turning off and on a switch.

“You’re using the substations against whatever’s connected to them. Aurora uses the substations as the attack vector. This is the electric grid being the attack vector,” said Weiss, who calls it “a very, very insidious” attack.

The degree to which we are safe from that eventuality depends entirely on how well utility companies have put in place safeguards. We may know the answer to that question in 2015.