Massive Social Security Fraud, 40 Million Americans

Last week, the Immigration Reform Law Institute (IRLI) revealed massive identity fraud by illegal aliens in the United States, potentially affecting nearly 40 million Americans.

In April of this year, IRLI filed a Freedom of Information Act (FOIA) lawsuit against the Social Security Administration (SSA) seeking records related to the Obama-era decision to halt sending “no-match” letters to employers. According to the Justice Department’s website, a “no-match” letter is a “written notice issued by the SSA to an employer, usually in response to an employee wage report, advising that the name or Social Security number (SSN) reported by the employer for one or more employees does not “match” a name or SSN combination reflected in SSA’s records.” The long-held practice of sending the letters had been used to prevent fraud through the use of stolen SSN data by illegal aliens and other criminals.

Days after former President Obama implemented the Deferred Action for Childhood Arrivals (DACA) amnesty program, his administration announced the decision to stop sending “no-match” letters to employers. This decision led to a thriving SSN black market where illegal aliens are drawn to obtain an American’s information for employment. The SSN of children have proven to be especially valuable as they can be used undetected for years. However, when these children reach adulthood and begin to apply for college, car loans, credit cards, or other needs, many learn they have criminal records attached to their identities.

Specifically, IRLI’s investigation uncovered that from 2012 to 2016, there were a whopping 39 million instances where names and SSNs on W-2 tax forms did not match the legitimate Social Security records. Additionally, over $409 billion was added to the Earnings Suspense File (ESF), which holds any uncredited wages that cannot be correctly matched in the SSA’s database.

Previously, the SSA has estimated that seventy-five percent of illegal aliens possess a SSN— either one stolen from an American citizen, or legal resident, or one that has been made up entirely. Not only is this practice troublesome from an immigration law standpoint, but can actually be quite problematic for Americans, or legal residents, who have their SSNs stolen. In addition to receiving Internal Revenue Service (IRS) letters and audits accusing them of having income they are not claiming or having their benefits blocked, reconciling a compromised identifier is estimated to cost thousands of dollars and take years of effort.

The Trump administration did announce this summer that it would begin resuming notice letters to employers and third-part providers informing them of any mismatches. However, it is truly up to Congress to rectify this situation for all parties involved.

In July, House Judiciary Committee Chairman Bob Goodlatte (R-VA) introduced the bipartisan AG and Legal Workforce Act (H.R. 6417) – legislation that would mandate E-Verify, the effective web-based program that ensures a legal workforce. Furthermore, the legislation would protect against identity theft by requiring the Social Security Commissioner to notify individuals whose SSN demonstrates a pattern of unusual use; as well as assist Americans who believe their identity may have been stolen or used fraudulently.

Congress is required to protect American citizens and their interests above all else. It would be shrewd for them to remember that before the November midterms.

Hat tip.

Meanwhile:

The Trump administration will admit no more than 30,000 refugees to the U.S. in the coming year, Secretary of State Mike Pompeo said, down from the current cap of 45,000.

Pompeo announced the lowered ceiling during a press conference Monday at the Department of State headquarters in Foggy Bottom.

Pompeo said the 30,000 cap “must be considered in the context of the many other forms of protection and assistance offered by the United States” and should not be “sole barometer” to measure the country’s humanitarian efforts.

The hawkish turn demonstrates President Donald Trump’s willingness to push hard-line immigration policies in the run-up to the November midterm elections — even after his controversial “zero tolerance” border enforcement policy led to thousands of family separations and a court order to reunify parents and children.

Trump Declassifies Text Messages and FISA Order

It is fitting, it is Constitution Day too. Fighting fire with fire as the political contest marches on with the Democrats against Brett Kavanaugh.

The text messages include those of former FBI Director James Comey, former Deputy Director fo the FBI Andrew McCabe, FBI agent Peter Strzok, former FBI lawyer Lisa Page and DoJ lawyer, Bruce Ohr.

The FISA warrant is that of former Trump advisor Carter Page.

***

Statement from the Press Secretary

At the request of a number of committees of Congress, and for reasons of transparency, the President has directed the Office of the Director of National Intelligence and the Department of Justice (including the FBI) to provide for the immediate declassification of the following materials: (1) pages 10-12 and 17-34 of the June 2017 application to the FISA court in the matter of Carter W. Page; (2) all FBI reports of interviews with Bruce G. Ohr prepared in connection with the Russia investigation; and (3) all FBI reports of interviews prepared in connection with all Carter Page FISA applications.

In addition, President Donald J. Trump has directed the Department of Justice (including the FBI) to publicly release all text messages relating to the Russia investigation, without redaction, of James Comey, Andrew McCabe, Peter Strzok, Lisa Page, and Bruce Ohr.

 

Hey Moscow, What About the ‘neuroweapons’ Used in Cuba attacks

General view of the U.S. Embassy in Havana after the U.S. government pulled more than half of its diplomatic personnel out of Cuba in September 2017. (Photo: Ernesto Mastrascusa/Getty Images)

Primer:

Neurotechnologies as Weapons of Mass Disruption or Future Asymmetric Warfare: Putative Mechanisms, Emerging Threats, and Bad Actor Scenarios

Intelligence agencies investigating mysterious “attacks” that led to brain injuries in U.S. personnel in Cuba and China consider Russia to be the main suspect, three U.S. officials and two others briefed on the investigation tell NBC News.

The suspicion that Russia is likely behind the alleged attacks is backed up by evidence from communications intercepts, known in the spy world as signals intelligence, amassed during a lengthy and ongoing investigation involving the FBI, the CIA and other U.S. agencies. The officials declined to elaborate on the nature of the intelligence.

The evidence is not yet conclusive enough, however, for the U.S. to formally assign blame to Moscow for incidents that started in late 2016 and have continued in 2018, causing a major rupture in U.S.-Cuba relations.

Since last year, the U.S. military has been working to reverse-engineer the weapon or weapons used to harm the diplomats, according to Trump administration officials, congressional aides and others briefed on the investigation, including by testing various devices on animals. As part of that effort, the U.S. has turned to the Air Force and its directed energy research program at Kirtland Air Force Base in New Mexico, where the military has giant lasers and advanced laboratories to test high-power electromagnetic weapons, including microwaves.

Although the U.S. believes sophisticated microwaves or another type of electromagnetic weapon were likely used on the U.S. government workers, they are also exploring the possibility that one or more additional technologies were also used, possibly in conjunction with microwaves, officials and others involved in the government’s investigation say.

The U.S. has said 26 government workers were injured in unexplained attacks at their homes and hotels in Havana starting in late 2016, causing brain injuries, hearing loss and problems with cognition, balance, vision and hearing problems. Strange sounds heard by the workers initially led investigators to suspect a sonic weapon, but the FBI later determined sound waves by themselves couldn’t have caused the injuries. More here.

*** Truth be told, this investigation and the details are rather disjointed and weird.

Four scientists, including the first doctor to examine the diplomats reporting symptoms in Cuba, took part in a Pentagon-sponsored teleconference on Friday, where they announced new research results, including what they determined to be the probable use of “neuroweapons” in what they called the Havana Effect.

At issue are the more than two dozen U.S. government officials stationed in Havana, who have described hearing strange sounds, followed by a combination of medical symptoms, including dizziness, hearing loss and cognitive problems. More recently, a similar case has been reported in a U.S. embassy worker in Guangzhou, China. For months, a mix of secrecy and speculation has surrounded those incidents, including an increasingly popular theory that the diplomats were the victims of microwave weapons.

Michael Hoffer, an otolaryngologist at the University of Miami, who was the first to conduct tests on the embassy workers, said on the Friday call that the diplomats are suffering from a  “neurosensory dysfunction,” which is primarily affecting their sense of balance.

The Friday call was organized as part of a study program sponsored by the Pentagon and titled “Probable Use of a Neuroweapon to Affect Personnel of US  Embassy in Havana: Findings, Pathology, Possible Causes, and Disruptive Effects.”

A Pentagon official told Yahoo News that the briefing was offered by the scientific team for interested people in the Defense Department and was to gain “general knowledge” about their findings. “This didn’t have an operational element,” the official said.  Read on from here.

N Korean, Park Jin hyok Charged with Global Cyber Attacks

U.S. CHARGES NORTH KOREAN HACKER

Federal prosecutors charged a North Korean man, Park Jin-hyok, with crimes in connection with a series of costly cyberattacks around the globe, including the WannaCry ransomware attack in 2018, the heist of Bangladesh’s central bank in 2017, and the hack of Sony Pictures in 2014. It is the first time the Justice Department has explicitly charged a North Korean hacker backed by the government. Park was allegedly working as a programmer for a North Korean front company in China called Chosun Expo, which had ties to North Korea’s military intelligence.

Legal analysts say the complaint is the most detailed public accounting yet of North Korea’s cyberattacks against foreign adversaries. The Justice Department has now brought hacking-related charges against North Korea, China, Iran, and Russia. (WSJ, NYT, Reuters, DOJ)

Park Jin Hyok, named by officials as a member of the so-called Lazarus Group hacking team behind last year’s WannaCry global ransomware attack and the 2014 digital attack on Sony, apparently used not only advanced technology, but elaborate reconnaissance work to digitally steal money and sensitive information.

First, Park would obtain a number of email addresses of people affiliated with target businesses from traders dealing in large amounts of personal information. Then he would use the emails to gain an understanding of company employees’ fields of interest and personal relationships.

That would let him craft emails that could pass as genuine messages from major companies in content and style, a tactic known as spear phishing. After spending some time building trust, he would send the malicious links to websites that would infect a target’s computer.

In one case, Park apparently masqueraded as a human resources official at a U.S. defense-linked company to exchange messages with workers at one of the company’s competitors.

Last week’s charges were said to be the first in years against a North Korean hacker related to high-profile attacks linked to the state. The attack on Sony came as the company was preparing to release a movie called “The Interview,” which depicted the assassination of a character resembling North Korean leader Kim Jong Un. The group also allegedly stole $81 million from the central bank of Bangladesh in 2016.

A North Korean suspect is wanted by U.S. authorities on suspicion of hacking. (Courtesy of the U.S. Federal Bureau of Investigation)

“We stand with our partners to name the North Korean government as the force behind this destructive global cyber campaign,” Christopher Wray, director of the Federal Bureau of Investigation, said in a statement on Sept. 6.

The U.S. Treasury also imposed sanctions on Park and a Chinese business he was affiliated with. “We will not allow North Korea to undermine global cybersecurity to advance its interests and generate illicit revenues in violation of our sanctions,” Treasury Secretary Steven Mnuchin said in his own statement.

Under Kim, the North has consolidated its cyber forces under its Reconnaissance General Bureau, which handles overseas spying. The state has a team of 6,800, according to the South Korean government, and is counted as one of the five cyber powers along with the U.S., Russia, China and Israel.

The core of cyber operations is a team known as “Bureau 121,” established in 1998 by Kim’s father, then-leader Kim Jong Il. Bureau 121 is known for its willingness to commit crimes for the sake of bringing in cash.

“The technology behind North Korea’s cybercrimes is some of the most advanced in the world,” said a source with the U.S. State Department.

Governments and businesses around the world are hurrying to guard themselves from the North’s attacks even as its methods grow more sophisticated. Further cooperation between countries’ cyberdefense authorities may be key to finding effective solutions.

British Airways: The airline said a “very sophisticated” hacker stole credit card details of hundreds of thousands of its customers in recent days. Anyone who lost out financially as a result of the breach would be compensated, BA officials said. (Reuters)

JPMorgan Hacker: A Russian man, Andrei Tyurin, has been extradited by Georgia to the United States on charges that he participated in the 2014 hack of JPMorgan Chase and other U.S. companies. (Reuters)

Is that Russian Submarine Threat Still out There?

It is not just the U.S. Navy that is on alert. Europe’s top Navy Commander:

NAPLES, Italy — Russia is deploying more submarines to the Mediterranean, the Black Sea and North Atlantic than at any time since the Cold War as part of a growing power game driving the U.S. to revive a decommissioned fleet and NATO to strengthen its naval defenses, the Navy’s top commander in the theater said.

Russia is upgrading its submarine forces and improving their missile capabilities, all while relations between Moscow and NATO remain tense over Russia’s annexation of Ukraine’s Crimean Peninsula in 2014, Adm. James Foggo, commander of U.S. Naval Forces Europe and Africa, said in an interview earlier this month.

“The illegal annexation of Crimea … that certainly has put a strain on our relationship,” Foggo told Stars and Stripes. “It’s their bad behavior, not ours. It’s the things they are doing.”

The Navy is reviving 2nd Fleet, though on a smaller scale than the one deactivated in 2011, to supply more ships in what Foggo described as growing competition between Russia and NATO in the Atlantic Ocean.

The renewed 2nd Fleet will be a Norfolk, Va.-based joint forces command, with many details yet to be worked out, Foggo said, adding that Navy leaders will know more after NATO’s July summit in Brussels. More here.

***

This is not really a new condition, it has been going on for a few years without any real U.S. response that is until the Omnibus was passed where monies were allocated for air-dropped sonobuoys that can detect submarines and transmit data back to motherships. The warnings began with Russia, operating in the Mediterranean where missiles were fired into Syria on several occasions.

The United States and Britain have been playing cat and mouse with Russia in several locations. Under Exercise Dynamic Mongoose, 10 NATO countries have been practicing hunting tactics of stealth submarines off Norway’s coast.

This past April, Lockheed Martin was awarded a $1 billion contract for a hypersonic cruise missile.

The Hypersonic Conventional Strike Weapon program is one of two hypersonic weapon prototyping efforts being pursued by the Air Force, and comes in addition to the Tactical Boost Glide program, which the Air Force is working on with DARPA and Raytheon. The service plans to have a prototype ready by 2023.

The Tactical Boost Glide is designed to operate at 5 times the speed of sound to enhance current military systems.

The United States has 70 nuclear powered submarines and 52 attack submarines along with 4 cruise missile armed submarines and 14 ballistic missile submarines. They all patrol bodies of water across the globe.

Russian Subs Are Reheating a Cold War Chokepoint - Defense One  photo

Adm. John Richardson, Chief of Naval Operations has confirmed increased foreign submarine operations.

According to GlobalFirePower.com, North Korea has the world’s largest submarine fleet by raw numbers with 76, though most of Pyongyang’s fleet consists of shorter-range, electric-diesel coastal patrol craft. China and Russia, both with modern nuclear-powered fleets that rival the U.S. fleet, have 68 subs and 63 subs, respectively.

NATO Secretary-General Jens Stoltenberg, in an interview with the Frankfurt Allgemeine and other news outlets in December, said the Kremlin is investing heavily in its submarine fleet, with 13 delivered since 2013. NATO countries, he said, have let their underwater firepower lag. “We have practiced less and lost skills,” the NATO chief said.

A particular point of concern, said one former high-level U.S. Navy official, is that Moscow may be attempting to tap into or sever some of the 550,000 miles of underwater fiber-optic cables that span the Atlantic and Arctic sea lanes.

“Russians have had a capability … to do things with these cables for the last 20 to 30 years,” said Tom Callender, who once served as head of capabilities for the Navy’s deputy undersecretary office and is now a senior defense fellow at The Heritage Foundation.

“Russians have had a capability … to do things with these cables for the last 20 to 30 years,” said Tom Callender, who once served as head of capabilities for the Navy’s deputy undersecretary office and is now a senior defense fellow at The Heritage Foundation.More than 95 percent of the global internet traffic — military and civilian, classified and unclassified — is transmitted across the network of submerged cables along the ocean floor, according to Washington-based tech firm TeleGeography. The quantity is massive compared with just a decade ago, when just 1 percent of all online traffic went through the cables.

Seabed vulnerability

The majority of the 285 underwater cables in place crisscross beneath heavily trafficked sea lanes of the Atlantic and Arctic regions. According to TeleGeography, the longest single cable stretches 24,000 miles and relays internet traffic and other electronic communications from Europe, Asia and Africa.

The scale and scope of global communications moving through the network of cables — some of which are only 2 inches thick — present a lucrative target that is vulnerable to attack by U.S. adversaries. It also poses a significant challenge to U.S. forces defending the lines. Read more detail here.