U.S. Embassy in Turkey Closed due to Security but no Threat?

Sheesh….of course there was one. The first response was there was no imminent danger but U.S. personnel were to take all precautions and avoid crowded spaces.

Now, the truth comes out.

Police secure roads around U.S. Embassy in Ankara on Monday. Umit Bektas / Reuters

Turkish police foiled a planned Islamic State of Iraq and the Levant (ISIL) attack on the U.S. Embassy in Ankara on March 5, detaining suspects in the capital Ankara and the Black Sea province of Samsun.

The detentions came after the Ankara Governor’s Office stated late on March 4 that extra security measures had been taken in the city upon intelligence that “terrorist actions” could take place in areas where U.S. citizens are located.

“Upon intelligence coming to our units from U.S. sources that terrorist actions could be undertaken targeting the U.S. Embassy and where U.S. citizens are staying, security measures have been reviewed and extra measures have been taken,” the Governor’s Office said.

Image result for u.s. embassy ankara photo

Embassy closed on March 5, 6

The U.S. Embassy in Turkey announced that it has suspended operations on March 5 and 6 due to an unspecified security threat.

A statement posted on the embassy’s website on March 4 urged U.S. citizens to avoid the embassy in Ankara and large crowds, as well as to “keep a low profile.”

The statement said the embassy will be closed “due to a security threat. The Embassy will announce its reopening, once it resumes services.” It did not give details about the threat.

On March 5, Deputy Prime Minister Bekir Bozdağ said U.S. consulates in Turkey were “operating as normal.”

Four Iraqis detained in Samsun on charges of plotting attack

Meanwhile, four Iraqi nationals were detained in Samsun by the National Intelligence Agency (MİT) and local anti-terror authorities in an operation against ISIL, state-run Anadolu Agency reported on March 5.

Several digital documents were seized in the operation, the agency reported.

The suspects detained on charges of plotting an attack against the U.S. Embassy in Ankara were taken to the police station for formal legal proceedings.

Police detain 12 in Ankara over ISIL links

In addition, the Ankara Chief Prosecutor’s Office said police have detained 12 suspected ISIL militants in Ankara and are searching for eight others.

A statement from the prosecutor’s office said the suspects were detained in a police operation on March 5. It added that all the suspects are foreigners but did not provide detail on their nationalities.

According to the statement, the detained suspects are accused of trying to recruit members for ISIL and were “in contact with people in conflict zones.”

In 2013, a suicide bomber detonated an explosive in front of the U.S. Embassy in Ankara. He killed himself and one Turkish security guard on duty. Turkish officials blamed the attack on domestic leftists.

***

(Reuters) – Turkish police arrested 12 people in Ankara in an investigation targeting Islamic State jihadists, state-run Anadolu news agency said on Monday, hours after the U.S. embassy there said it would remain closed for the day due to a security threat.

The 12 suspects were among 20 people for whom detention warrants were issued by the Ankara state prosecutors’ office, Anadolu said. It said they were foreign citizens and had been seeking to recruit new members to the group.

Turkish authorities regularly detain Islamic State suspects and it was not clear whether there was any connection between the arrests and the U.S. embassy move. Anadolu said the police operation was“planned previously”.

On Sunday evening, the U.S. embassy in Ankara said it would be closed to the public on Monday due to a security threat and only emergency services will be provided.

The Ankara governor’s office said additional security measures were taken after intelligence from U.S. sources suggested there might be an attack targeting the U.S. embassy or places U.S. citizens were staying.

Turkish police increased operations against Islamic State at the end of 2017 before the first anniversary of a New Year gun attack on an Istanbul nightclub in which 39 people were killed.

Islamic State claimed responsibility for that shooting, one of a series of attacks believed to have been carried out by the jihadists in Turkey in recent years.

Cyber: ‘Our adversaries have grown more emboldened’

Primer:

Russia hasn’t been sufficiently penalized for its meddling in the 2016 U.S. elections and that has emboldened Moscow to continue interfering in American elections, Adm. Michael Rogers, Commander of the U.S. Cyber Command, told the Senate Armed Services Committee on Tuesday.

“They haven’t paid a price sufficient to change their behavior,” Rogers said under questioning by Sen. Richard Blumenthal, D-Conn. Although the United States has taken some actions, including imposing additional sanctions and Special Counsel Robert S. Mueller III has indicted more than a dozen Russians for their role in the interference, “it hasn’t changed the calculus,” Rogers said, adding that “it hasn’t generated the change in behavior that we all know we need.”

In another exchange with Sen. Elizabeth Warren, D-Mass., Rogers said that Russian President Vladimir Putin has probably come to the conclusion that “that there’s little price to pay here so I can continue the activity” of interfering in the U.S. election system. More here.

*** In context however, where is Senator(s) Warren and Blumenthal’s proposed legislation on sanctions or punishment toward Russia for cyber and active measures interference? It was political posturing by Warren and Blumenthal when they can introduce multi-faceted legislation as Russia, China and North Korea continue to attack the United States via layered cyber operations including espionage.

Meanwhile…. Image result for admiral rogers nsa photo

Although competitors such as China and Russia remain the greatest threat to U.S. security, rogue regimes such as Iran and North Korea have increased in capabilities and have begun using aggressive methods to conduct malicious cyberspace activities, the military’s top cyber officer told Congress today.

Navy Adm. Michael S. Rogers, director of the National Security Agency, commander of U.S. Cyber Command and chief of the Central Security Service, testified at a Senate Armed Services Committee hearing.

“Our adversaries have grown more emboldened, conducting increasingly aggressive activities to extend their influence without fear of significant consequence,” Rogers said. “We must change our approaches and responses here if we are to change this dynamic.”

But as the cyber domain has evolved, Rogers told the senators, Cybercom’s three major mission areas endure: protecting the Department of Defense Information Network; enabling other joint force commanders by delivering effects in and through cyberspace; and defending the nation against cyber threats through support to the Department of Homeland Security and others when directed to do so by the president or secretary of defense.

Cybercom Milestones

Rogers highlighted milestones in Cybercom’s growth.

Joint Force Headquarters DODIN, the subordinate headquarters responsible for securing, operating and defending the Defense Department’s complex information technology infrastructure, has achieved full operational capability, he said.

Joint Task Force Ares, created to lead the fight in cyber against the Islamic State of Iraq and Syria, has successfully integrated cyberspace operations into broader military campaigns, has achieved some “excellent results,” and will continue to pursue ISIS in support of the nation’s objectives, the admiral told the Senate panel.

Cybercom also has significantly enhanced training in cyber operation platforms to prepare the battlespace against key adversaries, he said.

Milestones expected to be achieved this year include Cyber Command’s elevation to a combatant command responsible for providing mission-ready cyberspace operations forces to other combatant commanders, Rogers said.

New Facility

In addition, the admiral said, Cybercom will be moving into a state-of-the-art integrated cyber center and joint operations facility at Fort Meade, Maryland, enhancing the coordination and planning of operations against cyber threats.

“Without cyberspace superiority in today’s battlefield, risk to mission increases across all domains and endangers our security,” Rogers said.

Cybercom’s focus on innovation and rapid tech development has extended all the way to small businesses and working with the private sector while maintaining cybersecurity, Rogers told the committee.

“We intend in the coming year to create an unclassified collaboration venue where businesses and academia can help us tackle tough problems without needing to jump over clearance hurdles, for example, which for many are very difficult barriers,” Rogers explained.

After serving more than four years as a commander of Cybercom and after nearly 37 years of service as a naval officer, Rogers is set to retire this spring.

“I will do all I can during the intervening period to ensure the mission continues, that our men and women remain ever motivated, and that we have a smooth transition,” he said.

N Korea Linked to Syrian Chemical Weapons

While there has been some chatter that the United States would consider talks with North Korea, that likelihood appears rather dim.

Ambassador Joseph Yun, the special representative for North Korea Policy, is retiring this week after more than 30 years in the Foreign Service.

Yun is yet another member of the Senior Foreign Service who is leaving while the department is still under a hiring freeze and many top roles have not been filled.

There has been growing frustration among the diplomatic ranks over the Trump administration’s handling of foreign policy and Secretary of State Rex Tillerson’s “redesign” plan of the department. Spokesperson Heather Nauert said in a statement Yun was retiring for “personal reasons and the Secretary has reluctantly accepted his decision and wished him well.” More here.

Meanwhile….as more sanctions have been applied to North Korea, the Trump administration’s biggest national security challenge, the U.S. Treasury sanctioned one person, 27 companies and 28 ships, according to a statement on the U.S. Treasury Department’s website.

The United States also proposed a list of entities to be blacklisted under separate U.N. sanctions, a move “aimed at shutting down North Korea’s illicit maritime smuggling activities to obtain oil and sell coal.”

 photo

UNITED NATIONS — North Korea has been shipping supplies to the Syrian government that could be used in the production of chemical weapons, United Nations experts contend.

The evidence of a North Korean connection comes as the United States and other countries have accused the Syrian government of using chemical weapons on civilians, including recent attacks on civilians in the Damascus suburb of eastern Ghouta using what appears to have been chlorine gas.

The supplies from North Korea include acid-resistant tiles, valves and thermometers, according to a report by United Nations investigators. North Korean missile technicians have also been spotted working at known chemical weapons and missile facilities inside Syria, according to the report, which was written by a panel of experts who looked at North Korea’s compliance with United Nations sanctions.

The report highlights the potential danger posed by any such trade between Syria and North Korea, which could allow Syria to maintain its chemical weapons while also providing North Korea with cash for its nuclear and missile programs.

The possible chemical weapons components were part of at least 40 previously unreported shipments by North Korea to Syria between 2012 and 2017 of prohibited ballistic missile parts and materials that could be used for both military and civilian purposes, according to the report, which has not been publicly released but which was reviewed by The New York Times.

The eight experts who make up the panel all come from different countries and possess specific expertise in areas like weapons of mass destruction, maritime transport and customs controls. Since 2010 the panel has had a mandate from the Security Council to investigate possible sanctions violations by North Korea and present its findings in an annual report.

Though experts who viewed the report said the evidence it cited did not prove definitively that there was current, continuing collaboration between North Korea and Syria on chemical weapons, they said it did provide the most detailed account to date of efforts to circumvent sanctions intended to curtail the military advancement of both countries.

William Newcomb, who was chairman of the United Nations panel of experts on North Korea from 2011 to 2014, called the report “an important breakthrough.”

Since the start of the Syrian civil war in 2011, there have been suspicions that North Korea was providing equipment and expertise to maintain the chemical weapons program of Syria’s president, Bashar al-Assad. Those suspicions were not assuaged when in 2013 Syria signed onto the Chemical Weapons Convention and claimed to give up its chemical weapons stocks.

“We knew stuff was going on,” Mr. Newcomb said. “We really wanted to up the game on chemical weapons programs, and we just weren’t able to get what we needed to do so.”

The report, which is more than 200 pages long, includes copies of contracts between North Korean and Syrian companies as well as bills of lading indicating the types of materials shipped. Much information was provided by unidentified United Nations member states. More here.

Estimating the Costs of Cyber Attacks Against the U.S., Billions

Image result for cyber attacks against the united states 2018

photo

Cyberattacks cost the United States between $57 billion and $109 billion in 2016

The report published by the White House Council of Economic Advisers examines the cyberattacks cost that malicious cyber activities cause to the U.S. economy.

The report analyzed the impact of malicious cyber activities on public and private entities, including DoS attacks, sabotage, business disruption, and theft of proprietary data, intellectual property, and sensitive financial and strategic information.

Damages and losses caused by a cyber attack may spill over from the initial target to economically linked organizations. More exposed are critical infrastructure sectors, at attack against companies and organization in this industry could have a severe impact on the US economy.

The document warns of nation-state actors such as Russia, China, Iran, and North Korea, that are well funded and often conduct sophisticated targeted attacks for both sabotage and cyber espionage.

***

The forecast of the cost damage in coming years….

In part from Forbes: In 2015, the British insurance company Lloyd’s estimated that cyber attacks cost businesses as much as $400 billion a year, which includes direct damage plus post-attack disruption to the normal course of business. Some vendor and media forecasts over the past year put the cybercrime figure as high as $500 billion and more.

From 2013 to 2015 the cyber crime costs quadrupled, and it looks like there will be another quadrupling from 2015 to 2019. Juniper research recently predicted that the rapid digitization of consumers’ lives and enterprise records will increase the cost of data breaches to $2.1 trillion globally by 2019, increasing to almost four times the estimated cost of breaches in 2015.

The World Economic Forum (WEF) says a significant portion of cybercrime goes undetected, particularly industrial espionage where access to confidential documents and data is difficult to spot. Those crimes would arguably move the needle on the cyber crime numbers much higher.

Large banks, retailers, and federal agencies make the headlines when they are hacked – but all businesses are at risk. According to Microsoft, 20% of small to mid sized businesses have been cyber crime targets.

For anyone who wants to tally their own bill from cyber crime, check out Cyber Tab from Booz Allen. It is an anonymous, free tool that helps information security and other senior executives understand the damage to companies inflicted by cyber crime and attacks. More here.

 

List of Companies, Amicus Brief Against Trump’s Sanctuary City Policy

The Senate defeated a GOP proposal based on President Donald Trump’s immigration framework.
The plan would have offered a path to citizenship for “Dreamers” and increased border security while also cutting legal immigration.
The vote was 39-60, with 60 votes needed for approval.

I say GOOD. It was fraught with loopholes and the actual number of illegals in question remained unknown.

Meanwhile, there is more going on with the whole sanctuary city thing. Hold on, you wont like this.

In 2017, State Atty. Gen. Xavier Becerra on Wednesday filed a brief in support of a Santa Clara County lawsuit challenging President Trump’s executive order targeting “sanctuary” cities that refuse to help federal authorities enforce immigration laws.

The amicus brief cites Trump’s threat to withhold federal funds from sanctuary cities and counties as well as the state’s interest in protecting state laws and policies that promote public safety and protect the constitutional rights of residents, Becerra said.

*** It gets worse… to read how the brief is cherry-picked on facts, go here.

So, there is a pile of companies that have filed an amicus brief against the Trump administration position on sanctuary cities.

The full list of tech companies (and a few others) that signed the amicus brief opposing President Trump’s executive order on immigration.

The full brief is available online.

1. AdRoll, Inc.

2. Aeris Communications, Inc.

3. Airbnb, Inc.

4. AltSchool, PBC

5. Ancestry.com, LLC

6. Appboy, Inc.

7. Apple Inc.

8. AppNexus Inc.

9. Asana, Inc.

10. Atlassian Corp Plc

11. Autodesk, Inc.

12. Automattic Inc.

13. Box, Inc.

14. Brightcove Inc.

15. Brit + Co

16. CareZone Inc.

17. Castlight Health

18. Checkr, Inc.

19. Chobani, LLC

20. Citrix Systems, Inc.

21. Cloudera, Inc.

22. Cloudflare, Inc.

23. Copia Institute

24. DocuSign, Inc.

25. DoorDash, Inc.

26. Dropbox, Inc.

27. Dynatrace LLC

28. eBay Inc.

29. Engine Advocacy

30. Etsy Inc.

31. Facebook, Inc.

32. Fastly, Inc.

33. Flipboard, Inc.

34. Foursquare Labs, Inc.

35. Fuze, Inc.

36. General Assembly

37. GitHub

38. Glassdoor, Inc.

39. Google Inc.

40. GoPro, Inc.

41. Harmonic Inc.

42. Hipmunk, Inc.

43. Indiegogo, Inc.

44. Intel Corporation

45. JAND, Inc. d/b/a Warby Parker

46. Kargo Global, Inc.

47. Kickstarter, PBC

48. KIND, LLC

49. Knotel

50. Levi Strauss & Co.

51. LinkedIn Corporation

52. Lithium Technologies, Inc.

53. Lyft, Inc.

54. Mapbox, Inc.

55. Maplebear Inc. d/b/a Instacart

56. Marin Software Incorporated

57. Medallia, Inc.

58. A Medium Corporation

59. Meetup, Inc.

60. Microsoft Corporation

61. Motivate International Inc.

62. Mozilla Corporation

63. Netflix, Inc.

64. NETGEAR, Inc.

65. NewsCred, Inc.

66. Patreon, Inc.

67. PayPal Holdings, Inc.

68. Pinterest, Inc.

69. Quora, Inc.

70. Reddit, Inc.

71. Rocket Fuel Inc.

72. SaaStr Inc.

73. Salesforce.com, Inc.

74. Scopely, Inc.

75. Shutterstock, Inc.

76. Snap Inc.

77. Spokeo, Inc.

78. Spotify USA Inc.

79. Square, Inc.

80. Squarespace, Inc.

81. Strava, Inc.

82. Stripe, Inc.

83. SurveyMonkey Inc.

84. TaskRabbit, Inc

85. Tech:NYC

86. Thumbtack, Inc.

87. Turn Inc.

88. Twilio Inc.

89. Twitter Inc.

90. Uber Technologies, Inc.

91. Via

92. Wikimedia Foundation, Inc.

93. Workday

94. Y Combinator Management, LLC

95. Yelp Inc.

96. Zynga Inc.

ADDED Feb. 6, 2017

97. Adobe Systems Inc.

98. Affirm, Inc.

99. Ampush LLC

100. Brocade Communications Systems Inc.

101. Bungie, Inc.

102. Casper Sleep, Inc.

103. Cavium, Inc.

104. Chegg, Inc.

105. ClassPass Inc.

106. Coursera

107. EquityZen Inc.

108. Evernote

109. Gusto

110. Handy Technologies, Inc.

111. HP Inc.

112. IAC/InterActive Corp.

113. Linden Lab

114. Managed by Q Inc.

115. MobileIron

116. New Relic, Inc.

117. Pandora Media, Inc.

118. Planet Labs Inc.

119. RPX Corporation

120. Shift Technologies, Inc.

121. Slack Technologies, Inc.

122. SpaceX

123. Tesla, Inc.

124. TripAdvisor, Inc.

125. Udacity, Inc.

126. Zendesk, Inc.

127. Zenefits