WH Ignoring Law Banning Russian Arms to Iran

Obama Admin Under Scrutiny for Ignoring U.S. Law Banning Russian Arms Sale to Iran

White House stalls congressional inquiry into its failure to invoke law

FreeBeacon: The Obama administration is stalling a congressional inquiry into its ongoing refusal to uphold a U.S. law that would sanction Russia for selling advanced missile systems to Iran, according to recent communications between the State Department and Congress exclusively obtained by the Washington Free Beacon.

President Obama has the authority under U.S. law to designate as illegal Russia’s recent sale to Iran of the advanced S-300 missile system, a long-range weapon that would boost the Islamic Republic’s military capabilities.

 

The administration has so far declined to exercise its sanction authority under law and has been stalling attempts by Congress to discern the rationale behind this decision, prompting accusations that the administration is ignoring U.S. law and “acquiescing” to the sale in order to preserve last summer’s comprehensive nuclear deal.

Rep. Steve Chabot (R., Ohio), who first launched an inquiry challenging the administration’s reluctance to sanction the sale in early April, told the Free Beacon that the White House is continuing to punt questions from lawmakers, jeopardizing efforts by Western nations to block the arms sale.

The administration informed Chabot on June 8—more than two months after his initial request—that it has not reached a determination as to whether it will move forward with sanctions as specified under the law.

Obama administration officials reiterated this stance when contacted by the Free Beacon late last week.

“Frankly, I’m disappointed in the administration’s response to my letter requesting a quick determination that Russia’s transfer of the S-300 missile system to Iran is progressing their efforts to acquire advanced conventional weapons systems,” Chabot told the Free Beacon. “Unfortunately, the administration’s abysmal response indicates that they are more than reluctant to provide a determination on this case—which is exceptionally disconcerting considering the administration admits they have been trying to persuade Russia not to proceed with the weapon transfer.”

U.S. officials continue to avoid specifying whether the president will use current U.S. laws to designate the sale as illicit and place sanctions upon Russia.

This power, granted under the Iran-Iraq Arms Nonproliferation Act of 1992, allows the president to sanction any sale of “advanced conventional weapons” to Iran by other nations.

Obama administration officials have not explained why the law is still not being followed months after Russia announced it had made good on the multi-million dollar arms sale to Iran.

“We regret the delay in responding to your inquiry,” the State Department informed Chabot in its most recent communication, according to a copy viewed by the Free Beacon.

While the administration remains “concerned” about the S-300 sale, it is not prepared to take action, according to the State Department, which was ordered by the White House to provide Chabot’s office with a response.

“We remain concerned about this and have strongly urged Russia not to proceed with the sale of an S-300 system to Iran, as the transfer of these surface-to-air weapons systems to Iran would add to tension in the region and be clearly inconsistent with our common nonproliferation goals,” the State Department wrote to Chabot.

“The Department will continue to implement, as required, the various sanctions authorities we have to support our non-proliferation priorities,” the letter adds.

A State Department official further told the Free Beacon it has not yet decided how to react to the sale.

“We’re continuing to closely follow reports concerning the delivery of the S-300 missile system from Russia to Iran,” said the official, who was not authorized to speak on record. “We have not yet made any determination as to whether this delivery, if and when complete, would trigger any actions under U.S. authorities.”

Lawmakers, as well as reporters, have been trying for months to obtain answers from the administration about the sale. So far, U.S. officials have declined to provide a rationale as to why the administration has not exercised its sanction authority.

“These systems would significantly bolster Iran’s offensive capabilities and introduce new obstacles to our efforts to eliminate the threat of an Iranian nuclear weapon. I believe existing U.S. sanctions should be used to deter Russia from transferring this or other dangerous weapons systems to Iran,” Chabot wrote in his initial inquiry to the White House.

Obama administration officials are fighting against enforcing U.S. laws designating the sale in order to keep Iran from breaking its commitments under the nuclear agreement, according to one foreign policy adviser who works intimately with Congress on the issue.

“The Obama administration seems willing to let Iran get away with anything, up to and including acquiring destabilizing weapons that will remake the military balance in the Middle East, just to preserve the nuclear deal,” the source said. “It’s difficult to imagine what would ever trigger U.S. action, if importing these missiles that make Iran immune from outside pressure isn’t enough. Critics of the Iran deal predicted a lot of this, but the collapse on S-300s is worse than many of them imagined.”

 

Demand the Pen and Phone for the Alien Enemies Act

 

   

8 Terror Attacks in Almost 8 Years: America Has Averaged One Terror Attack a Year Under Obama’s Watch

NYPost: America has now averaged one serious Islamic terrorist attack a year on President Obama’s watch, yet he still insists the threat from radical Islam is overblown and that he’s successfully protecting the nation.

If only hubris could be weaponized!

In the wake of Omar Mateen’s Orlando massacre, Obama whined about growing criticism of his terror-fighting strategy. But boy, does he deserve it. His record on terrorism is terrible, and Hillary Clinton should have a tough time defending it.

Here we are in the eighth year of his presidency, and the nation has now suffered eight significant attacks by Islamist terrorists on US soil or diplomatic property — an average of one attack a year since Obama’s been in office, with each new attack seemingly worse than the last.

And there’s six long months left to go.

Obama said Orlando “marks the most deadly shooting in American history.” Actually, it was the second-worst act of Islamic terrorism in American history, replacing in six short months the San Bernardino massacre as the deadliest terrorist attack on US soil since 9/11.

Here are the previous seven:

December 2015: Syed Farook and Tashfeen Malik, a married Pakistani couple, stormed a San Bernardino County government building with combat gear and rifles and opened fire on about 80 employees enjoying an office Christmas party. They killed 14 after pledging loyalty to ISIS. A third Muslim was charged with helping buy weapons.

July 2015:
Mohammad Abdulazeez opened fire on a military recruiting center and US Navy Reserve center in Chattanooga, Tenn., where he shot to death four Marines and a sailor. Obama refused to call it terrorism.

May 2015: ISIS-directed Muslims Nadir Soofi and Elton Simpson opened fire on the Curtis Culwell Center in Garland, Texas, shooting a security guard before police took them down.

April 2013:
Dzhokhar and Tamerlan Tsarnaev, Muslim brothers from Chechnya, exploded a pair of pressure-cooker bombs at the Boston Marathon, killing three and wounding more than 260. At least 17 people lost limbs from the shrapnel.

September 2012: Terrorists with al Qaeda in the Maghreb attacked the US Consulate in Benghazi, Libya, killing the US ambassador, a US Foreign Service officer and two CIA contractors. Obama and then-Secretary of State Clinton misled the American people, blaming the attack on an anti-Muslim video.

November 2009: Army Maj. Nidal Hasan opened fire on fellow soldiers at Fort Hood, Texas, killing 13. Obama ruled it “workplace violence,” even though Hasan was in contact with an al Qaeda leader before the strikes and praised Allah as he mowed down troops.

June 2009:
Al Qaeda-trained Abdulhakim Muhammad opened fire on an Army recruiting office in Little Rock, Ark., killing Pvt. William Long and wounding Pvt. Quinton Ezeagwula.

So there you have it — an average of one serious terror strike against the United States every year on Obama’s watch. And we’re not even counting the underwear bomber, Times Square bomber, Fed Ex bombs and other near-misses.

History will not be kind to this president’s record.

When he came into office, Obama vowed to defeat terrorism using “all elements of our power”: “My single most important responsibility as president is to keep the American people safe. It’s the first thing that I think about when I wake up in the morning. It’s the last thing that I think about when I go to sleep at night.”

But it soon became clear he wasn’t serious.

In June 2009, Obama traveled to Cairo to apologize to Muslims the world over for America’s war on terror. Then he canceled the war and released as many terrorists as he could from Gitmo, while ordering the FBI and Homeland Security to delete “jihad” and other Islamic references from their counterterrorism manuals and fire all trainers who linked terrorism to Islam, blinding investigators to the threat from homegrown jihadists like Mateen.

Obama also stopped a major investigation of terror-supporting Muslim Brotherhood front groups and radical mosques, while opening the floodgates to Muslim immigrants, importing more than 400,000 of them, many from terrorist hot spots Syria, Iraq, Somalia, Saudi Arabia and Pakistan.

Attack after attack, the president has ridiculously maintained that global warming is a bigger threat than global terrorism. Americans are fed up. Even before San Bernardino and Orlando, polls showed Obama was widely viewed as soft on Islamist terrorists. He has an absolutely awful record keeping us safe from terrorism.

And this is the security mantle Hillary is so proud to inherit? Good luck with that.

Paul Sperry is author of “Infiltration: How Muslim Spies and Subversives Have Penetrated Washington” and “Muslim Mafia: Inside the Secret Underworld That’s Conspiring to Islamize America.”

***** Now for the human dimension to protect the homeland.

Obama has the authority to use his pen and phone on two options, declare a presidential proclamation or apply the law, The Alien Enemies Act. This can only be done during a time of war, such that the United States remains in a war since 2001. There is no question that the battlefields have remained the same while additional areas of hostilities have been added. The enemy is dynamic and has moved for at least a decade and the terror soldiers wear no flag patch of loyalty to a country but rather to a militant Islamic doctrine. Former President George W. Bush using all the legal and historical experts was correct in using the term ‘enemy combatant’.

As noted above, in the last 8 years, enemy combatants have brought the war, the hostilities and death to the homeland. This is the time for the sitting president to apply his authority which would provide more aggressive actions be taken by all law enforcement and investigative agencies in the United States asserting a higher level of protection. To not do so, is reckless, antithetical to his oath and to all the others that pledge the same oath. The United States is in a national security crisis and it must be declared. Consider, this is not just about the homeland, all foreign locations such as diplomatic posts or embassies are part of U.S. sovereign land where any location that is attack would also require presidential action.

The Alien Enemies Act is still on the books today, such that it is extraordinary that no one in Congress has in fact demanded it be applied. There are those that walk among us in this nation that are from and loyal to hostile nations.

Related reading:  Proclamation 2685–Removal of alien enemies

Related reading: Truman, Proclamation 2685

Related reading: Executive Order 9066

While this summary could be considered rhetorical, nonetheless it is real and this is our mission, our battle to win or lose.

SECTION 1. Be it enacted by the Senate and the House of Representatives of the United States of America in Congress assembled, That it shall be lawful for the President of the United States at any time during the continuance of this act, to order all such aliens as he shall judge dangerous to the peace and safety of the United States, or shall have reasonable grounds to suspect are concerned in any treasonable or secret machinations against the government thereof, to depart out of the territory of the United Slates, within such time as shall be expressed in such order, which order shall be served on such alien by delivering him a copy thereof, or leaving the same at his usual abode, and returned to the office of the Secretary of State, by the marshal or other person to whom the same shall be directed. And in case any alien, so ordered to depart, shall be found at large within the United States after the time limited in such order for his departure, and not having obtained a license from the President to reside therein, or having obtained such license shall not have conformed thereto, every such alien shall, on conviction thereof, be imprisoned for a term not exceeding three years, and shall never after be admitted to become a citizen of the United States. Read the full Act here.

How Terrorists use Encryption

 

How Terrorists Use Encryption

June 16, 2016

CTC: Abstract: As powerful encryption increasingly becomes embedded in electronic devices and online messaging apps, Islamist terrorists are exploiting the technology to communicate securely and store information. Legislative efforts to help law enforcement agencies wrestle with the phenomenon of “going dark” will never lead to a return to the status quo ante, however. With the code underlying end-to-end encryption now widely available, unbreakable encryption is here to stay. However, the picture is not wholly bleak. While end-to-end encryption itself often cannot be broken, intelligence agencies have been able to hack the software on the ends and take advantage of users’ mistakes.

Counterterrorism officials have grown increasingly concerned about terrorist groups using encryption in order to communicate securely. As encryption increasingly becomes a part of electronic devices and online messaging apps, a range of criminal actors including Islamist terrorists are exploiting the technology to communicate and store information, thus avoiding detection and incrimination, a phenomenon law enforcement officials refer to as “going dark.”

Despite a vociferous public debate on both sides of the Atlantic that has pitted government agencies against tech companies, civil liberties advocates, and even senior figures in the national security establishment who have argued that creation of “backdoors”[1] for law enforcement agencies to retrieve communications would do more harm than good, there remains widespread confusion about how encryption actually works.[a]

Technologists have long understood that regulatory measures stand little chance of rolling back the tide. Besides software being written in other countries (and beyond local laws), what has not been fully understood in the public debate is that the “source code” itself behind end-to-end encryption is now widely available online, which means that short of shutting down the internet, there is nothing that can be done to stop individuals, including terrorists, from creating and customizing their own encryption software.

The first part of this article provides a primer on the various forms of encryption, including end-to-end encryption, full device encryption, anonymization, and various secure communication (operational security or opsec) methods that are used on top of or instead of encryption. Part two then looks at some examples of how terrorist actors are using these methods.

Part 1: Encryption 101 

End-to-End Encryption
A cell phone already uses encryption to talk to the nearest cell tower. This is because hackers could otherwise eavesdrop on radio waves to listen in on phone calls. However, after the cell tower, phone calls are not encrypted as they traverse copper wires and fiber optic cables. It is considered too hard for nefarious actors to dig up these cables and tap into them.

In a similar manner, older chat apps only encrypted messages as far as the servers, using what is known as SSL.[b] That was to defeat hackers who would be able to eavesdrop on internet traffic to the servers going over the Wi-Fi at public places. But once the messages reached the servers, they were stored in an unencrypted format because at that point they were considered “safe” from hackers. Law enforcement could still obtain the messages with a court order.

Newer chat apps, instead of encrypting the messages only as far as the server, encrypt the message all the way to the other end, to the recipient’s phone. Only the recipients, with a private key, are able to decrypt the message. Service providers can still provide the “metadata” to police (who sent messages to whom), but they no longer have access to the content of the messages.

The online messaging app Telegram was one of the earliest systems to support end-to-end encryption, and terrorists groups such as the Islamic State took advantage.[2] These days, the feature has been added to most messaging apps, such as Signal, Wickr, and even Apple’s own iMessage. Recently, Facebook’s WhatsApp[3] and Google[4] announced they will be supporting Signal’s end-to-end encryption protocol.

On personal computers, the software known as PGP,[c] first created in the mid-1990s, reigns supreme for end-to-end encryption. It converts a message (or even entire files) into encrypted text that can be copy/pasted anywhere, such as email messages, Facebook posts, or forum posts. There is no difference between “military grade encryption” and the “consumer encryption” that is seen in PGP. That means individuals can post these encrypted messages publicly and even the NSA is unable to access them. There is a misconception that intelligence agencies like the NSA are able to crack any encryption. This is not true. Most encryption that is done correctly cannot be overcome unless the user makes a mistake.

Such end-to-end encryption relies upon something called public-key cryptography. Two mathematically related keys are created, such that a message encrypted by one key can only be decrypted by the other. This allows one key to be made public so that one’s interlocutor can use it to encrypt messages that the intended recipient can decrypt through the private-key.[d] Al-Qa`ida’s Inspire magazine, for example, publishes its public-key[5] so that anyone using PGP can use it to encrypt a message that only the publishers of the magazine can read.

Full Device Encryption
If an individual loses his iPhone, for example, his data should be safe from criminals.[e] Only governments are likely to have the resources to crack the phone by finding some strange vulnerability. The FBI reportedly paid a private contractor close to $1 million to unlock the iPhone of San Bernardino terrorist Syed Rizwan Farook.[6]

The reason an iPhone is secure from criminals is because of full device encryption, also full disk encryption. Not only is all of the data encrypted, it is done in a way that is combined or entangled[7] with the hardware. Thus, the police cannot clone the encrypted data, then crack it offline using supercomputers to “brute-force” guess all possible combinations of the passcode. Instead, they effectively have to ask the phone to decrypt itself, which it will do but slowly, defeating cracking.[f]

Android phones work in much the same manner. However, most manufacturers put less effort into securing their phones than Apple. Exceptions are companies like Blackphone, which explicitly took extra care to secure their devices.

Full disk encryption is also a feature of personal computers. Microsoft Windows comes with BitLocker, Macintosh comes with FileVault, and Linux comes with LUKS. The well-known disk encryption software TrueCrypt works with all three operating systems as does a variation of PGP called PGPdisk. Some computers come with a chip called a TPM[g] that can protect the password from cracking, but most owners do not use a TPM. This means that unless they use long/complex passwords, adversaries will be able to crack their passwords.

Disgusting: Democrats Walk During Moment of Silence

 

6 victims remain in intensive care.

Democrats shout down Paul Ryan after Orlando shooting moment of silence

CBS: Shouting erupted Monday evening on the House floor after a moment of silence for the victims of the Orlando massacre as Democrats demanded that the House consider gun control legislation.

After the brief moment of silence that Speaker Paul Ryan, R-Wisconsin, called for, Democrats began shouting from one side of the chamber, interrupting Ryan. Ryan’s office only tweeted out a clip of the moment of silence, but not the shouting that followed.

The House just observed a moment of silence in memory of those killed in the terrorist attack in #Orlando.https://t.co/MqS94hk68V

— Paul Ryan (@SpeakerRyan) June 13, 2016

“Where’s the bill?” Democrats shouted, referring to gun control legislation.

Amid the shouting, Assistant Democratic Leader Jim Clyburn, D-South Carolina, tried to seek recognition.

“I am really concerned that we have just today had a moment of silence and later this week the 17th…,” Clyburn said, as he was interrupted by Ryan who then asked if he was a posing a parliamentary inquiry.

“Yes, Mr. Speaker,” Clyburn said. “I am particularly interested about three pieces of legislation that have been filed in response to Charleston.”

Clyburn was referring to the anniversary this Saturday of the Charleston shooting massacre that left nine parishioners dead in a South Carolina church last year. One of the bills Democrats want the House to consider would close the “Charleston loophole, which is how the shooter in Charleston obtained a gun. The FBI performs background checks on gun buyers on South Carolina and if the check isn’t denied or completed in three days, the gun seller can sell the guy to the prospective buyer. The other pieces of legislation would prevent people who are on the FBI’s no-fly list from purchasing guns and one would ban anyone convicted of a hate crime from buying firearms, according to a leadership aide.

Ryan, however, ignored Clyburn and called for the House to continue voting. According to the speaker’s office, Clyburn was out of order under House rules and was not making a proper motion or inquiry.

“It’s shameful that anyone would try to use a moment of silence honoring victims of a brutal terrorist attack to advance their own political agenda,” Ryan spokeswoman AshLee Strong said.

We just observed a moment of silence for the #Orlando victims. Then @SpeakerRyan refused to act to keep guns out of the hands of terrorists.

— Rep. Ted Deutch (@RepTedDeutch) June 13, 2016

Some Democrats said that they didn’t want to participate in the moment of silence at all.

Why I’m refusing the moment of silence. #NoMoreSilence Read: https://t.co/pSKUie0jVkpic.twitter.com/NTnFEokK3r

— Katherine Clark (@RepKClark) June 13, 2016

The victims of #Orlando deserve more than a moment of silence from Congress. They deserve moments of courage & action. #WheresTheBill

— Rep. Eric Swalwell (@RepSwalwell) June 13, 2016

Jim HimesVerified account @jahimes Jun 12

I will not attend one more”Moment of Silence” on the Floor. Our silence does not honor the victims, it mocks them.

Seth MoultonVerified account @sethmoulton 14h14 hours ago

So I’m joining in not attending any more House “Moments of Silence” for mass shooting victims. Walked out of my first one tonight.

***** Tuesday, Obama holds a large national security council meeting to discuss terror attacks.

Taking part in the NSC meeting now underway at per WH:

 
#RedNationRising

Militant Islam, Obama Admin Forbidden Terms

A distinction needs to be made. Radical extremists are for the force multipliers, those like Anwar al Awlaki. The militants like Mohammed Emwazi are born from the radicals and they are the deadly enforcers of the Islamic doctrine and Sharia.

Don’t blame the FBI for failures, with particular regard to the worst terror attack in American by a gunman, Orlando. Blame the White House. All the Q&A sessions, congressional testimony and press briefings by FBI Director James Comey have had an underlying message, a cry for help, attention and support.

Don’t blame the intelligence community including CENTCOM and the Pentagon for battlefield or rules of engagement failures. That belongs to the entire White House national security team. The Office of National Intelligence has also been affected.

This is not political correctness at all, it is a Barak Obama edict, sensitivity to Islam across our homeland and across the globe. Obama has had a strident mission since he assumed the Oval Office to create a Muslim protective shield. This is beyond dispute.

While not in any chronological order, there are some very key decisions that were made and continue to be made by the Obama administration that affect our national security and this generational war titled the Overseas Contingency Operation.

In April of 2009, Barak Obama delivered ‘The New Beginnings’ speech. In this presentation he spelled out his full agenda in what was to become the long-term mission to elevate Muslims and their organizations at home and globally. The White House objectives have been successful and consequential.

With the new beginning announced, Obama extended his same purpose throughout government agencies, law enforcement and policies as a mandatory doctrine.

‘Just before that Christmas Day attack, in early November 2009, I was ordered by my superiors at the Department of Homeland Security to delete or modify several hundred records of individuals tied to designated Islamist terror groups like Hamas from the important federal database, the Treasury Enforcement Communications System (TECS). These types of records are the basis for any ability to “connect dots.”  Every day, DHS Customs and Border Protection officers watch entering and exiting many individuals associated with known terrorist affiliations, then look for patterns. Enforcing a political scrubbing of records of Muslims greatly affected our ability to do that. Even worse, going forward, my colleagues and I were prohibited from entering pertinent information into the database.’ Philip Haney, The Hill.

Directly after the 9/11 attack, the Bush administration did reach out to the Muslim communities to determine who was with peace and national security and who perhaps gave clues of a larger and hidden condition that could be festering that would prove clues to more domestic security challenges.

Then came the Holyland Foundation trial in 2007/2008. The material facts and conditions of the domestic threat, people, money, collaboration and global consequence all converged in a courtroom in Texas.

During the Holy Land trial, FBI Agent Lara Burns testified in court that CAIR was a front for HAMAS. One trial exhibit submitted by federal prosecutors – and stipulated to by the defense in the case – explained that these organizations were dedicated to a “civilizational-jihadist process” to destroy America from within and replace the Constitution with sharia (Islamic law):

The Ikhwah [Muslim Brotherhood] must understand that their work in America is a kind of grand Jihad in eliminating and destroying the Western civilization from within and “sabotaging” its miserable house by their hands and the hands of the believers so that it is eliminated and God’s religion [Islam] is made victorious over all other religions. (p. 21)

Federal prosecutors specifically cited this internal Muslim Brotherhood planning document as the strategic goal of these U.S.-based Islamic groups – the very same group advising the Obama Administration. The federal judge in the Holy Foundation case agreed with the case presented by the federal prosecutors had made regarding these organizations, stating in one ruling that “the Government has produced ample evidence to establish the associations with CAIR, ISNA and NAIT with HLF…and with HAMAS.” (p. 14-15) More important details here from the CounterjihadReport.

The Department of Justice under Eric Holder was included in the full protection of the terror networks and associated people. Congressman Gohmert of Texas challenged AG Holder to no avail in a chilling exchange.

Here is where the ‘words matter’ material documentation began. The Obama administration took this agenda to new standard.

In 2009, DHS published via the Office of Intelligence and Analysis Assessment a ‘Rightwing Extremism’ document, pinpointing those that may challenge the Obama Muslim doctrine. Additionally, DHS posted The Department of Homeland Security launched a ‘Do’s and Dont’s bulletin.

The entire complexion of the Department of Homeland Security began to change with new personnel and outreach under Secretary Janet Napolitano. The outreach extended to law enforcement agencies of which LAPD demonstrates.

The order to purge documents, training materials and database was made. The proof is here.

Barak Obama was not finished. In 2015, the White House introduced a strategy for CVE, Counter Violent Extremism.

Then comes the foreign policy of Obama. All deference to Iran began before Obama assumed the White House in 2009 and continues today. Secret back channels to Iran using Ambassador Burns began in 2008. Further, there is Iraq and Syria with Islamic State. Documents here on ISIS prove the intelligence and forecasts were known, available and delivered.

This would not be complete without mentioning China, Russia or North Korea where policies are non-existent.

The Paris attack was a slaughter and Obama found it wise to snub the solidarity march with other world leaders.

Obama touted Yemen as one of his successes but the country collapsed. Finally, the Obama policy doctrine crumbled and the cause was fully explained here. Obama wilfully recoiled as he and Hillary did on Benghazi.

It really no longer matters that Barak Obama, Hillary Clinton or John Kerry refuse to use key terms to describe militant Islam, the entire well verse and informed world have defined it for them. What does matter beyond the words are the policies and refusals of missions, strategies and conditions to keep America, her interests and allies safe.

It is no wonder there is no global respect for the Obama administration and there is much less to fear from her.

In summary, Obama owns this terror, owns this jihad and owns the death as well as the genocide. This is his legacy, he owns it as his own scarlet letter.