Clapper Breaks with Obama’s Threat Crisis Plank

North Korea has restarted plutonium reactor: US

North Korea has restarted a plutonium reactor that could fuel a nuclear bomb and is seeking missile technology that could threaten the United States, Washington’s top spy said on Tuesday.

Intel Chief Breaks From Obama Narrative On Iran Deal

DailyCaller: The head of U.S. intelligence believes that Iran’s recent actions speak loudly to its intentions, particularly given the country’s recent provocations since the Iran nuclear deal came into effect.

Testifying to the Senate Committee on Armed Services Tuesday, director of national intelligence James Clapper gave a very somber description of what he sees as Iran’s intentions toward the U.S. now that last summer’s nuclear deal has commenced. In particular, his statements offered little assurance that Iran is acting as an honest actor with the U.S. and the other states involved in last year’s negotiations, or that the nuclear deal will stop Iran from obtaining a nuclear weapon.

“Iran probably views JCPOA [Iran deal] as a means to remove sanctions while preserving nuclear capabilities, as well as the option to eventually expand its nuclear infrastructure,” said Clapper, who also noted that, so far, he sees no evidence that Iran is violating the nuclear deal.

Clapper’s statements stand in stark contrast with those made by President Barack Obama, who lauded the nuclear accord last summer, claiming it would not only stop all of Iran’s possible pathways to a nuclear weapon, but that “under its terms, Iran is never allowed to build a nuclear weapon.” More here.

***

Clapper went into all specifics on the threat matrix both at home and globally. He did not leave anything behind, from cyber wars, space wars, weapons systems, human trafficking, terror organizations, economic instability, migrants, disinformation and drug cartels.

 STATEMENT FOR THE RECORD WORLDWIDE THREAT ASSESSMENT of the US INTELLIGENCE COMMUNITY
February 9, 2016
INTRODUCTION
Chairman McCain, Vice Chairman Reed, Members of the Committee, thank you for the invitation to offer
the United States Intelligence Community’s 2016 assessment of threats to US national security. My statement reflects the collective insights of the Intelligence Community’s extraordinary men and women, whom I am privileged and honored to lead. We in the Intelligence Community are committed every day to provide the nuanced, multidisciplinary intelligence that policymakers, warfighters, and domestic law enforcement personnel need to protect American lives and America’s interests anywhere in the world.
 The order of the topics presented in this statement does not necessarily indicate the relative importance or magnitude of the threat in the view of the Intelligence Community. Information available as of February 3, 2016 was used in the preparation of this assessment.
 
TABLE OF CONTENTS
 
GLOBAL THREATS Cyber and Technology Terrorism Weapons of Mass Destruction and Proliferation Space and Counterspace
 
Counterintelligence Transnational Organized Crime
 
Economics and Natural Resources Human Security
 
REGIONAL THREATS East Asia
China Southeast Asia North Korea
Russia and Eurasia
Russia Ukraine, Belarus, and Moldova The Caucasus and Central Asia
Europe
 
Key Partners The Balkans Turkey Middle East and North Africa 
Iraq Syria Libya  Yemen Iran  Lebanon Egypt Tunisia
 
South Asia
Afghanistan Bangladesh Pakistan and India
Sub-Saharan Africa  Central Africa Somalia South Sudan Sudan Nigeria
 
Latin America and Caribbean
 
Central America Cuba Venezuela Brazil
 

 

 

 

 

McCaul’s Homeland Terror Threat Snapshot

McCaul Releases February Terror Threat Snapshot

WASHINGTON, D.C. – The February Terror Threat Snapshot was released today by Homeland Security Committee (HSC) Chairman Michael McCaul. The “snapshot” is a monthly Committee assessment of the growing threat America, the West, and the world face from ISIS and other Islamist terrorists.

Chairman McCaul: “The Islamist terror threat remains alarmingly high as recent arrests and terror plots demonstrate. ISIS recruits wage war in our communities, while thousands of deadly fighters trained in Syria stream back into the West – some of them infiltrating massive refugee flows. ISIS continues its global expansion on the shores of the Mediterranean Sea and the still-dangerous al Qaeda in the Arabian Peninsula seizes greater territory in Yemen. Meanwhile, Vladimir Putin and the revitalized Iran-Assad-Hezbollah terror axis are further destabilizing the Syrian crisis in the absence of U.S. leadership. This year is on track to be as dangerous as – if not worse than – 2015 for the American homeland and our national security.”

Key takeaways in this month’s Terror Threat Snapshot include:

  • The Iranian regime gained access to $100 billion in cash from the disastrous nuclear deal and is poised for further economic relief that will fuel its global network of terror.
  • An increasing number of battle-hardened fighters from Europe are returning from jihadist training grounds. Nearly 2,000 Europeans – among an estimated 6,600 Western fighters who have traveled to Syria and Iraq – have snuck back into Europe. A French counterterrorism official recently warned, “We are moving towards a European 9/11: simultaneous attacks on the same day in several countries…We know the terrorists are working on this.”
  • Islamist terrorists are exploiting global refugee flows to infiltrate and target the West. Germany’s domestic intelligence chief recently said terrorists “have slipped in camouflaged or disguised as refugees. This is a fact that the security agencies are facing.” A suspected ISIS terror plotter arrested in Germany this week snuck into Europe posing as a refugee. The European Union also recently assessed there is a “real and imminent danger” of Syrian refugees inside Europe being radicalized and recruited by Islamist extremists.
  • ISIS and al Qaeda are expanding their sanctuaries from North Africa to South Asia. ISIS is reinforcing its foothold in Libya, where it has amassed as many as 6,500 fighters and controls coastal territory on the Mediterranean Sea. Al Qaeda is making further gains in Yemen and its key ally in Afghanistan controls more territory than it has at any point since 2001.
  • The Obama Administration has surged the release of terrorists from Guantanamo Bay despite alarming rates of recidivism. The intelligence community has assessed that 30 percent of Guantanamo detainees released are either known to have or suspected of having rejoined the fight. The potential transfer of detainees to the United States, prohibited under law, would also pose a threat to the American people.
  • The United States faces the highest Islamist terror threat environment since 9/11. ISIS is waging war here in the homeland, where there have been 21 ISIS-linked plots to launch attacks. Law enforcement authorities have arrested 81 ISIS-linked suspects, including six thus far in 2016.

TerrorThreatSnapshot_February_Social Media

The complete February Terror Threat Snapshot is available, here.

View the Committee’s interactive Terror Threat Snapshot map, here.

Obama, don’t let secrecy be your legacy

Imagine what Congress does NOT know and then imagine what we, don’t know. Terrifying right?

Mr. Obama, don’t let secrecy be your legacy: Republican chairmen

Shrouding government action on everything from the environment to veterans health in darkness is a big step backwards.

USAToday: When President Obama took office, he vowed to run “the most transparent administration in history.” As his presidency draws to an end, those words would be laughable if the issue were not so serious.

At nearly every turn, this administration has blocked public disclosure and ignored almost every law intended to ensure open and accountable government.

Hillary Clinton’s private email server is just the latest, most public example. Numerous other incidents involve the concealment of documents, providing only partial information, slow-walking congressional requests and using private email accounts and secret meetings to avoid official records-keeping laws. These sorts of tactics have become common practice for this administration.

The most brazen examples occasionally get media attention: Former Environmental Protection Agency (EPA) Administrator Lisa Jackson created a fictitious email address under the alias name “Richard Windsor,” hiding official actions from public scrutiny. But more typically, the pervasive stonewalling does not make headlines.

Congress isn’t alone on the Obama administration’s enemies list. According to an analysis of federal data by the Associated Press (AP), the Obama administration set new records two years in a row for denying the media access to government files. According to the AP, “The government took longer to turn over files when it provided any, said more regularly that it couldn’t find documents and refused a record number of times to turn over files.”

Moreover, in an unprecedented letter to several congressional committees, 47 inspectors general, who are the official watchdogs of federal agencies, complained that the Justice Department, EPA and others consistently obstruct their work by blocking or delaying access to critical information. Worse yet, the White House and Secretary Clinton refused to install an Inspector General during her tenure at the State Department.

It is the job of Congress and our agency watchdogs to ensure the federal government is efficient, effective and accountable to the American people. But time and time again, this administration has dismissed Americans’ right to know.

When Department of Veterans Affairs bureaucrats place themselves ahead of the veterans they are charged with serving, it’s Congress’ job to get answers. But VA’s stonewall tactics are interfering with this vital task. It’s been more than 18 months since the House Committee on Veterans’ Affairs revealed VA’s delays in care crisis to the nation, yet the department is sitting on more than 140 requests for information from the committee regarding everything from patient wait times to disciplinary actions for failed employees. VA’s disregard for congressional oversight was on full display Oct. 21, when committee Democrats and Republicans voted unanimously to subpoena five bureaucrats VA had refused to make available to explain their role in a scheme that resulted in the misuse of more than $400,000 in taxpayer money. Later, at a Nov. 2 follow-up hearing, two of the subpoenaed VA employees invoked their Fifth Amendment right against self-incrimination.

When the Internal Revenue Service improperly targets conservative organizations, it’s Congress’ job to get answers. When the Bureau of Alcohol, Tobacco, Firearms and Explosives runs a failed and flawed sting operation intentionally providing hundreds of firearms to Mexican cartels, it’s Congress’ job to get answers. When events surrounding terrorist attacks in Benghazi on the anniversary of 9/11 are hidden from the public, it’s Congress’ job to get answers.

But Congress cannot do its job when an administration refuses to turn over information. That’s why Congress has increasingly resorted to the power of the pen and has issued numerous legally-binding subpoenas to various Obama Administration agencies, including the Department of Justice, the State Department, the Treasury Department, the Department of Homeland Security, the Federal Reserve Board, the Federal Reserve Bank of New York, the Environmental Protection Agency, the National Oceanic and Atmospheric Administration and the Office of Management and Budget, among others.

Whether it is the necessity of holding agency heads in contempt of Congress or pursuing civil litigation to gain access to clearly relevant material or the improper invocation of executive privilege or a new “confidential communications” privilege this administration made up out of whole cloth, Congress has been forced to spend far too much time and resources gaining access to documents which it is clearly entitled to.

But perhaps the honor of the least transparent agency in the federal government belongs to the EPA.

Everyone wants clean air and water. But Americans want environmental regulations to be based on sound science, not science  fiction or radical political manifestos. When the EPA refused to release the data it uses to justify its proposed air regulations, the historically bipartisan House Science Committee was compelled to issue its first subpoena in 21 years to retrieve the information.

Last year, the House passed the Secret Science Reform Act of 2015 to require the EPA to base its regulations on publicly-available data, not secret science. This allows independent scientists the opportunity to evaluate EPA’s claims and check their work.  Who could argue against using open and transparent science to support regulation? Answer: the Obama administration.

It’s not surprising that the non-partisan Center for Effective Government gave the EPA a grade of “D” in its most recent report for poor performance in providing access to information.

This administration has created an unprecedented culture of secrecy that starts at the top and extends into almost every agency. While Congress is being thwarted in its efforts at oversight, it is really the American people who lose when those entrusted to enforce the law believe and act as if they are above it. It’s time to come clean, Mr. President. Don’t let a lack of transparency be your legacy.

Obama’s Final Cyber Offense, Einstein?

Sheesh, just the name points to a misguided failure since 2008. Einstein has a price tag, $ 5 billion. There are other questions to be asked like what does the NSA have to offer or the countless cyber security professionals in the private sector?

From the White House, there has been a 12 point plan and it has not advanced at all.

In May 2009, the President accepted the recommendations of the resulting Cyberspace Policy Review, including the selection of an Executive Branch Cybersecurity Coordinator who will have regular access to the President.

Meanwhile, hacks are real, dangerous and coming at mach speed. Using old software language such as COBOL speaks volumes as to how antiquated protections are and how dysfunctional all agencies are in maintaining crack-proof.

The Department of Homeland Security appears to be the lead agency for Einstein compliance, what could go wrong and has? The fact sheet from DHS is here.

Obama makes final push to cement cyber legacy

TheHill: President Obama on Tuesday made what is likely his last major push to bolster the government’s digital defenses before leaving office.

As part of the annual White House budget proposal, the Obama administration rolled out a sweeping plan to inject billions of extra dollars into federal cybersecurity funding, establish a new senior federal cyber official and create a presidential commission on cyber that will establish a long-term road map.

The move is likely to complete Obama’s cyber legacy, which will include an historic attention to digital security, unprecedented executive orders on the topic, and shepherding through Congress the largest-ever cyber bill, as well as numerous bruising hacks at federal agencies and allegations that government networks were woefully outdated.

In a release, the White House called the plan “the capstone of more than seven years of determined effort.”

“[Obama] is the first president that is making a big cybersecurity push and I think that’s tremendously important,” Rep. Ted Lieu (D-Calif.), one of Congress’s most prominent cyber voices, told The Hill.

The proposal aims to inject more than $5 billion in new funding across the government to strengthen network defenses that have been repeatedly infiltrated by suspected foreign government spies.

The ask is a 35-percent increase over last year’s allotment of $14 billion, and would put overall federal cyber spending at over $19 billion.

The budget request earmarks $3.1 billion for an “Information Technology Modernization Fund” that the White House described as a “down payment on the comprehensive overhaul” of federal IT systems.

Lieu said this fund could help solve one of the inherent budgeting problems when it comes to defending interconnected networks from hackers.

“What’s important about [the fund] is it can go across agencies and upgrade systems that touch more than one agency,” said Lieu, who sits on both the House Budget and Oversight committees.

Currently, each agency has its own individual cybersecurity budget that can be spent on its network, but that cannot necessarily be expended on portions of the agency’s IT infrastructure at other agencies.

Hackers have exploited this balkanized budgeting process.

Over the summer, suspected Chinese cyber spies cracked into the Office of Personnel Management (OPM), pilfering over 22 million people’s personal information in two separate hacks. The initial intrusion — which exposed roughly 4.2 federal workers’ personnel files — occurred at an OPM database that was housed at the Interior Department.

The OPM hacks also exposed the antiquated legacy systems the government relied on to run its networks.

Congress bashed OPM officials for not fully encrypting all their sensitive data. But the agency’s systems were simply too old to even accept modern encryption, they repeatedly explained.

The network also relied on the dated COBOL programming language, which initially became popular in the 1960s and is now eschewed by younger programmers.

A new federal official will oversee much of these update efforts.

As part of its proposal, the White House is establishing a federal chief information security officer, or CISO. The official will be housed within the Office of Management and Budget (OMB) and report to federal chief information officer, Tony Scott, who oversees government technology.

“This is the first time that there will be a dedicated senior official who is solely focused on developing, managing, and coordinating cybersecurity strategy, policy and operations across the entire federal domain,” the White House said.

Centralizing cybersecurity oversight is an attempt to help overcome the lack of agency-to-agency communication on the subject.

“For a while, I’ve seen the argument that there are too many lines of authority in the federal government on cybersecurity,” said Lieu. “Sometimes it’s not clear who is responsible for what.”

The CISO will also help monitor the government’s digital defense spending, which has been knocked as cost-ineffective.

Recently, a federal watchdog report concluded that the government’s main cyber defense system, known as “Einstein,” was largely ineffectual at thwarting sophisticated hackers. The report echoed long-standing criticism from security experts who say the program is a much-delayed boondoggle that is already obsolete.

Federal officials insist the system is in its final phase of implementation and will soon serve as a platform to add on leading cyber tools.

This budget infusion and new federal CISO will with these technology updates, the White House said.

The proposal also includes a robust research and public awareness component.

In a bid to build a bridge to the next administration, Obama is launching a “Commission on Enhancing National Cybersecurity.”

The administration is directing a bipartisan group of lawmakers to appoint top industry representatives and leading technologists to the commission. The group will be tasked with taking the long view.

“The commission will make recommendations on actions that can be taken over the next decade to strengthen cybersecurity in both the public and private sectors while protecting privacy,” the White House said.

Security experts almost unanimously agree that one of these actions will be eliminating the traditional online password.

Since 2011, the White House has been trying to push people away from passwords. Tuesday’s plan includes a last bid to encourage stronger people to adopt stronger login practices.

The proposal creates a new public awareness campaign that includes leading tech firms such as Google, Facebook and Microsoft.

“By judiciously combining a strong password with additional factors, such as a fingerprint or a single-use code delivered in a text message, Americans can make their accounts even more secure,” the White House said.

The proposal is likely Obama’s concluding statement on cybersecurity.

During his presidency, cybersecurity has gone from a fringe issue to one that most leaders acknowledge is vital to national and economic security. The topic received an increasing amount of attention in all but Obama’s final State of the Union address.

In recent years, the U.S. has seen the dramatic rise of global cyber crime syndicates that have pillaged banks, department stores and hotels.

According to an October report from Hewlett Packard and the Ponemon Institute, cyber crime costs the average American firm $15.4 million annually, up 82 percent over the last six years. By 2019, it’s believed the cost of data breaches will reach $2.1 trillion globally.

Digital adversaries such as China, Russia, Iran and North Korea have also swooped in unexpectedly, plundering health insurers, airlines, nuclear plants, government agencies and, most memorably, a major movie studio.

Even terrorist groups such as the Islamic State in Iraq and Syria (ISIS) are causing fears by hijacking high-profile twitter accounts and digitally defacing websites around the world.

These trends are bound to continue after Obama leaves the White House, but this ultimate cyber thrust could help cement his reputation as the first president to actively address the digital security challenge.

“If we can get this through, the funding, I think that would be very positive for his legacy,” Lieu said. “This is not just a federal government problem, it’s endemic in the private sector.”

Official FBI letter on Hillary’s Server Investigation

Politico: Hillary and Bill Clinton are so dissatisfied with their campaign’s messaging and digital operations they are considering staffing and strategy changes after what’s expected to be a loss in Tuesday’s primary in New Hampshire, according to a half-dozen people with direct knowledge of the situation.

The Clintons — stung by her narrow victory in Iowa — had been planning to reassess staffing at the campaign’s Brooklyn headquarters after the first four primaries, but the Clintons have become increasingly caustic in their criticism of aides and demanded the reassessment sooner, a source told Politico. More here.

*** Perhaps the real reason for the shake-up is noted below and Michael Bloomberg is looming yet again. ”

Former New York City Mayor Michael Bloomberg said he is considering running for U.S. president in 2016, the Financial Times reported on Monday.

The billionaire media mogul said he was “looking at all the options” when asked whether he was considering a run, the newspaper said.”

 

TheHill: The FBI formally confirmed that its investigation connected to Hillary Clinton’s private email server remains ongoing in a letter released on Monday.

The letter from FBI general counsel James Baker comes one day before the New Hamshire primary.

The message does not offer new details about the probe, which the bureau has been reluctant to discuss. However, it represents the FBI’s formal notification to the State Department that it is investigating the issue.
Since last September, “in public statements and testimony, the Bureau has acknowledged generally that it is working on matters related to former Secretary Clinton’s use of a private e-mail server,” Baker wrote to the State Department.

“The FBI has not, however, publicly acknowledged the specific focus, scope, or potential targets of any such proceedings.

“Thus … we remain unable [to] provide [details about the case] without adversely affecting on-going law enforcement efforts,” he concluded.

The letter was sent on Feb. 2 but released on Monday as part of an ongoing lawsuit related to the disclosure of Clinton’s emails from conservative watchdog Judicial Watch.

FBI Director James Comey has previously referenced the FBI probe, which the bureau had previously declined to confirm or deny in court filings last year.

Key details about the probe remain unclear, such as whether it is tied to a possible criminal case or whether it has expanded beyond an initial security review.

Comey has previously said that bureau investigators “don’t give a rip about politics,” and would not be put off by the looming presidential campaign. Clinton, for her part, has downplayed the server issue.

“I am 100 percent confident [that the probe will not become criminal],” the former secretary of State said in a Democratic presidential debate last week. “This is a security review requested and carried out that will be resolved.”

The State Department has classified more than 1,500 emails from Clinton’s “homebrew” server before releasing them to the public, including 22 at the highest level of “top secret.” None of the messages were marked as classified at the time they were sent, the department has claimed.

 

show_temp by Julian Hattem