An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.

What? The JFK Warren Commission Report Cover-Up?

Hah….say it isn’t so….C’mon…but who ordered the CIA to protect facts and sources? At least since most of us never trusted the Warren Commission Report, some new facts are revealed. Ever wonder why the entire file is not declassified, which is law after 50 years? (Ask Barack Obama).

Perhaps we need to storm George Washington University Archives Center and see what beyond this we can dig up after 50+ years.

JFK Assassination

 

Politico: John McCone came to the CIA as an outsider. An industrialist and an engineer by training, he replaced veteran spymaster Allen Dulles as director of central intelligence in November 1961, after John F. Kennedy had forced out Dulles following the CIA’s bungled operation to oust Fidel Castro by invading Cuba’s Bay of Pigs. McCone had one overriding mission: restore order at the besieged CIA. Kennedy hoped his management skills might prevent a future debacle, even if the Californian—mostly a stranger to the clubby, blue-blooded world of the men like Dulles who had always run the spy agency—faced a steep learning curve.

After JFK’s assassination in Dallas in November 1963, President Lyndon Johnson kept McCone in place at the CIA, and the CIA director became an important witness before the Warren Commission, the panel Johnson created to investigate Kennedy’s murder. McCone pledged full cooperation with the commission, which was led by Chief Justice Earl Warren, and testified that the CIA had no evidence to suggest that Lee Harvey Oswald, the assassin, was part of any conspiracy, foreign or domestic. In its final report, the commission came to agree with McCone’s depiction of Oswald, a former Marine and self-proclaimed Marxist, as a delusional lone wolf.

But did McCone come close to perjury all those decades ago? Did the onetime Washington outsider in fact hide agency secrets that might still rewrite the history of the assassination? Even the CIA is now willing to raise these questions. Half a century after JFK’s death, in a once-secret report written in 2013 by the CIA’s top in-house historian and quietly declassified last fall, the spy agency acknowledges what others were convinced of long ago: that McCone and other senior CIA officials were “complicit” in keeping “incendiary” information from the Warren Commission.

According to the report by CIA historian David Robarge, McCone, who died in 1991, was at the heart of a “benign cover-up” at the spy agency, intended to keep the commission focused on “what the Agency believed at the time was the ‘best truth’—that Lee Harvey Oswald, for as yet undetermined motives, had acted alone in killing John Kennedy.” The most important information that McCone withheld from the commission in its 1964 investigation, the report found, was the existence, for years, of CIA plots to assassinate Castro, some of which put the CIA in cahoots with the Mafia. Without this information, the commission never even knew to ask the question of whether Oswald had accomplices in Cuba or elsewhere who wanted Kennedy dead in retaliation for the Castro plots.

While raising no question about the essential findings of the Warren Commission, including that Oswald was the gunman in Dallas, the 2013 report is important because it comes close to an official CIA acknowledgement—half a century after the fact—of impropriety in the agency’s dealings with the commission. The coverup by McCone and others may have been “benign,” in the report’s words, but it was a cover-up nonetheless, denying information to the commission that might have prompted a more aggressive investigation of Oswald’s potential Cuba ties.

Initially stamped “SECRET/NOFORN,” meaning it was not to be shared outside the agency or with foreign governments, Robarge’s report was originally published as an article in the CIA’s classified internal magazine, Studies in Intelligence, in September 2013, to mark the 50th anniversary of the Kennedy assassination. The article, drawn from a still-classified 2005 biography of McCone written by Robarge, was declassified quietly last fall and is now available on the website of The George Washington University’s National Security Archive. In a statement to POLITICO, the CIA said it decided to declassify the report “to highlight misconceptions about the CIA’s connection to JFK’s assassination,” including the still-popular conspiracy theory that the spy agency was somehow behind the assassination. (Articles in the CIA magazine are routinely declassified without fanfare after internal review.)

Robarge’s article says that McCone, quickly convinced after the assassination that Oswald had acted alone and that there was no foreign conspiracy involving Cuba or the Soviet Union, directed the agency to provide only “passive, reactive and selective” assistance to the Warren Commission. This portrait of McCone suggests that he was much more hands-on in the CIA’s dealings with the commission—and in the agency’s post-assassination scrutiny of Oswald’s past—than had previously been known. The report quotes another senior CIA official, who heard McCone say that he intended to “handle the whole (commission) business myself, directly.”

The report offers no conclusion about McCone’s motivations, including why he would go to lengths to cover-up CIA activities that mostly predated his time at the agency. But it suggests that the Johnson White House might have directed McCone to hide the information. McCone “shared the administration’s interest in avoiding disclosures about covert actions that would circumstantially implicate [the] CIA in conspiracy theories and possibly lead to calls for a tough US response against the perpetrators of the assassination,” the article reads. “If the commission did not know to ask about covert operations about Cuba, he was not going to give them any suggestions about where to look.”

In an interview, David Slawson, who was the Warren Commission’s chief staff investigator in searching for evidence of a foreign conspiracy, said he was not surprised to learn that McCone had personally withheld so much information from the investigation in 1964, especially about the Castro plots.

“I always assumed McCone must have known, because I always believed that loyalty and discipline in the CIA made any large-scale operation without the consent of the director impossible,” says Slawson, now 84 and a retired University of Southern California law professor. He says he regrets that it had taken so long for the spy agency to acknowledge that McCone and others had seriously misled the commission. After half a century, Slawson says, “The world loses interest, because the assassination becomes just a matter of history to more and more people.”

The report identifies other tantalizing information that McCone did not reveal to the commission, including evidence that the CIA might somehow have been in communication with Oswald before 1963 and that the spy agency had secretly monitored Oswald’s mail after he attempted to defect to the Soviet Union in 1959. The CIA mail-opening program, which was later determined to have been blatantly illegal, had the code name HTLINGUAL. “It would be surprising if the DCI [director of central intelligence] were not told about the program” after the Kennedy assassination, the report reads. “If not, his subordinates deceived him. If he did know about HTLINGUAL reporting on Oswald, he was not being forthright with the commission—presumably to protect an operation that was highly compartmented and, if disclosed, sure to arouse much controversy.”

In the 1970s, when congressional investigations exposed the Castro plots, members of the Warren Commission and its staff expressed outrage that they had been denied the information in 1964. Had they known about the plots, they said, the commission would have been much more aggressive in trying to determine whether JFK’s murder was an act of retaliation by Castro or his supporters. Weeks before the assassination, Oswald traveled to Mexico City and met there with spies for the Cuban and Soviet governments—a trip that CIA and FBI officials have long acknowledged was never adequately investigated. (Even so, Warren Commission staffers remain convinced today that Oswald was the lone gunman in Dallas, a view shared by ballistics experts who have studied the evidence.)

In congressional testimony in 1978, after public disclosures about the Castro plots, McCone claimed that he could not have shared information about the plots with the Warren Commission in 1964 because he was ignorant of the plots at the time. Other CIA officials “withheld the information from me,” he said. “I have never been satisfied as to why they withheld the information.” But the 2013 report concluded that “McCone’s testimony was neither frank nor accurate,” since it was later determined with certainty that he had been informed about the CIA-Mafia plots nine months before his appearance before the Warren Commission.

Robarge suggests the CIA is responsible for some of the harsh criticism commonly leveled at the Warren Commission for large gaps in its investigation of the president’s murder, including its failure to identify Oswald’s motive in the assassination and to pursue evidence that might have tied Oswald to accomplices outside the United States. For decades, opinion polls have shown that most Americans reject the commission’s findings and believe Oswald did not act alone. Four of the seven commissioners were members of Congress, and they spent the rest of their political careers badgered by accusations that they had been part of a coverup.

“The decision of McCone and Agency leaders in 1964 not to disclose information about CIA’s anti-Castro schemes might have done more to undermine the credibility of the commission than anything else that happened while it was conducting its investigation,” the report reads. “In that sense—and in that sense alone—McCone may be regarded as a ‘co-conspirator’ in the JFK assassination ‘cover-up.’”

If there was, indeed, a CIA “cover-up,” a member of the Warren Commission was apparently in on it: Allen Dulles, McCone’s predecessor, who ran the CIA when the spy agency hatched the plots to kill Castro. “McCone does not appear to have any explicit, special understanding with Allen Dulles,” the 2013 report says. Still, McCone could “rest assured that his predecessor would keep a dutiful watch over Agency equities and work to keep the commission from pursuing provocative lines of investigation, such as lethal anti-Castro covert actions.” (Johnson appointed Dulles to the commission at the recommendation of then-Attorney General Robert Kennedy.)

The 2013 report also draws attention to the contacts between McCone and Robert Kennedy in the days after the assassination. In the wake of the Bay of Pigs disaster in 1961, the attorney general was asked by his brother, the president, to direct the administration’s secret war against Castro, and Robert Kennedy’s friends and family acknowledged years later that he never stopped fearing that Castro was behind his brother’s death. “McCone had frequent contact with Robert Kennedy during the painful days after the assassination,” the report says. “Their communication appears to have been verbal, informal and, evidently in McCone’s estimation, highly personal; no memoranda or transcripts exist or are known to have been made.”

“Because Robert Kennedy had overseen the Agency’s anti-Castro covert actions—including some of the assassination plans—his dealings with McCone about his brother’s murder had a special gravity,” the report continues. “Did Castro kill the president because the president had tried to kill Castro? Had the administration’s obsession with Cuba inadvertently inspired a politicized sociopath to murder John Kennedy?”

The declassification of the bulk of the 2013 McCone report might suggest a new openness by the CIA in trying to resolve the lingering mysteries about the Kennedy assassination. At the same time, there are 15 places in the public version of the report where the CIA has deleted sensitive information—sometimes individual names, sometimes whole sentences. It is an acknowledgement, it seems, that there are still secrets about the Kennedy assassination hidden in the agency’s files.

Read more: http://www.politico.com/magazine/story/2015/10/jfk-assassination-john-mccone-warren-commission-cia-213197#ixzz3oCu342VO

Read more: http://www.politico.com/magazine/story/2015/10/jfk-assassination-john-mccone-warren-commission-cia-213197#ixzz3oCtt6ZKT

 

Read more: http://www.politico.com/magazine/story/2015/10/jfk-assassination-john-mccone-warren-commission-cia-213197#ixzz3oCtm9KJq

Bowe Bergdahl, Time Served

Remember, Obama approved the ransom payment to Haqqani for Bergdahl, or was it? Perhaps it was to finish the prisoner swap details with both networks, the Taliban and Haqqani.

An Army officer is recommending that Sgt. Bowe Bergdahl face a lower-level court martial and be spared the possibility of jail time for leaving his post in Afghanistan, his lawyer said Saturday.
Defense attorney Eugene Fidell said Lt. Col. Mark Visger has decided Bergdahl’s case should go to a military system similar to civilian courts that handle misdemeanor charges. It limits the maximum punishment to reduction of rank, a bad conduct discharge and a short jail term, though that isn’t being sought, Fidell said. Military prosecutors charged Bergdahl in March with desertion and misbehavior before the enemy, a charge that could carry a maximum penalty of life imprisonment.

By The Associated Press – Associated Press – Saturday, October 10, 2015

Sgt. Bowe Bergdahl was handed over to U.S. special forces in May 2014 after nearly five years in captivity in Afghanistan. Here is a look at some of the key events from his capture until Saturday, when an Army officer recommended Bergdahl’s case should go to a military system that’s similar to civilian courts that handle misdemeanors:

June 30, 2009 – Bergdahl, who is serving with an Alaska-based infantry regiment, vanishes from a base in Afghanistan’s Paktika province near the border of Pakistan.

July 2, 2009 – Two U.S. officials tell The Associated Press on condition of anonymity that Bergdahl had “just walked off” his base with three Afghans after his shift.

July 18, 2009 – Taliban posts video online showing Bergdahl saying he was “scared I won’t be able to go home.” Bergdahl also says he was lagging behind a patrol when he was captured.

July 19, 2009 – Pentagon confirms missing U.S. solider in Afghanistan is Pfc. Bowe R. Bergdahl, 23, of Ketchum, Idaho.

July 22, 2009 – More than 500 people attend a vigil in Hailey, Idaho, to show support for Bergdahl and his family.

Dec. 25, 2009 – The Taliban releases a video showing Bergdahl apparently healthy and making a lengthy statement criticizing the U.S. military operation.

June 16, 2011 – The Army announces that Bergdahl has been promoted from specialist to sergeant.

June 30, 2011 – Bergdahl’s parents mark the second anniversary of their son’s capture at hometown event.

Aug. 29, 2011 – US officials tell the AP that direct U.S. talks with the Taliban had evolved to a substantive negotiation before they were scuttled by Afghan officials who feared the talks would undercut President Hamid Karzai.

May 9, 2012 – Bergdahl’s parents say they are hopeful that negotiations or a prisoner swap could bring their son home. Bob Bergdahl tells hometown newspaper that he’s concerned the U.S. government hasn’t done enough to secure his son’s release. The AP agreed in 2010 – at the request of the Pentagon and the White House – not to report on the proposed prisoner swap and ongoing negotiations, on the grounds that public discussion would endanger Bergdahl’s life. When Bergdahl’s parents began to discuss the deal publicly, the AP and other news organizations reported the proposed swap – a plan that would allow the transfer of five Taliban prisoners held at the U.S. military prison at Guantanamo Bay, Cuba.

Weekend of May 27, 2012 – President Barack Obama calls Bergdahl’s parents to assure them that he and the U.S. Department of Defense were doing everything in their power to free Bergdahl.

June 29, 2012 – Bergdahl’s family and hometown marks the third anniversary of his capture. Parents release a statement saying they hope he’s released this year and can return home.

June 20, 2013 – The Taliban proposes a deal in which they would free Bergdahl in exchange for five of their most senior operatives at Guantanamo Bay.

July 9, 2013 – The Taliban close the office in Qatar that was serving as the site for negotiations with the U.S.

Jan. 15, 2014 – U.S. officials say they received a new video of Bergdahl that they believe was taken in the last month, showing Bergdahl is alive.

Feb. 18, 2014 – Bergdahl’s family says they are cautiously optimistic about reported renewed efforts by the Obama’s administration to win his freedom.

May 31, 2014 – Obama administration officials announce that Bergdahl was handed over to U.S. special forces by the Taliban in exchange for the release of five Guantanamo detainees. Bergdahl’s parents say they’re “joyful and relieved.” But debate quickly erupts over whether Bergdahl is a hero or a deserter.

June 2, 2014 – Afghanistan’s Foreign Ministry criticizes the U.S. for swapping Taliban prisoners at Guantanamo Bay to secure Bergdahl’s release. American officials tell The Associated Press that the Pentagon concluded in 2012 that Bergdahl walked away from his unit, something members of his unit had said put soldiers in danger.

June 4, 2014 – Bergdahl’s Idaho hometown cancels plans to celebrate his return, citing security concerns.

June 13, 2014 – Bergdahl arrives at Brooke Army Medical Center at Fort Sam Houston in San Antonio.

June 16, 2014 – The Army says it is investigating the facts and circumstances around Bergdahl’s disappearance.

Aug. 6, 2014 – The Army begins questioning Bergdahl, who by now has returned to regular duty, about his disappearance.

Aug. 21, 2014 – The nonpartisan Government Accountability Office says the Pentagon broke the law when it swapped Bergdahl for five Taliban leaders because it didn’t notify relevant congressional committees at least 30 days in advance and used money from a wartime account to make the transfer.

Dec. 19, 2014 – The Army says it has finished its investigation.

March 25, 2015 – Bergdahl is charged with desertion and misbehavior before the enemy.

March 26, 2015 – Bergdahl’s lawyer releases a note in which Bergdahl says he was repeatedly tortured by the Taliban.

Sept. 17, 2015 – An Article 32 hearing begins to determine whether Bergdahl should face a military trial for leaving his post.

Sept. 18, 2015 – The hearing ends, and the presiding officer will forward his recommendations to the leader of the U.S. Army Forces Command, who will decide whether it should be referred to a court-martial or be resolved in another manner.

Oct. 9, 2015 – Bergdahl’s attorney says an Army officer recommends that Bergdahl face a lesser court-martial, meaning it should go to a military system that’s similar to civilian courts that handle misdemeanor, as well as not spend time in jail.

They Are Coming

Per the FBI website: Good afternoon Chairman Johnson, Ranking Member Carper, and members of the committee. Thank you for the opportunity to appear before you today to discuss the current threats to the homeland and our efforts to address new challenges, including terrorists’ use of technology to communicate—both to inspire and recruit. The widespread use of technology propagates the persistent terrorist message to attack U.S. interests whether in the homeland or abroad. As the threat to harm Western interests evolves, we must adapt and confront the challenges, relying heavily on the strength of our federal, state, local, and international partnerships. Our successes depend on interagency cooperation. We work closely with our partners within the Department of Homeland Security and the National Counterterrorism Center to address current and emerging threats.

Counterterrorism

Counterterrorism remains the FBI’s top priority, however, the threat has changed in two significant ways. First, the core al Qaeda tumor has been reduced, but the cancer has metastasized. The progeny of al Qaeda—including AQAP, al Qaeda in the Islamic Maghreb, and the Islamic State of Iraq and the Levant (ISIL)—have become our focus.

Secondly, we are confronting the explosion of terrorist propaganda and training on the Internet. It is no longer necessary to get a terrorist operative into the United States to recruit. Terrorists, in ungoverned spaces, disseminate poisonous propaganda and training materials to attract troubled souls around the world to their cause. They encourage these individuals to travel, but if they can’t travel, they motivate them to act at home. This is a significant change from a decade ago.

We continue to identify individuals who seek to join the ranks of foreign fighters traveling in support of ISIL, and also homegrown violent extremists who may aspire to attack the United States from within. These threats remain among the highest priorities for the FBI and the Intelligence Community as a whole.

Conflicts in Syria and Iraq continue to serve as the most attractive overseas theaters for Western-based extremists who want to engage in violence. We estimate approximately 250 Americans have traveled or attempted to travel to Syria to participate in the conflict. While this number is lower in comparison to many of our international partners, we closely analyze and assess the influence groups like ISIL have on individuals located in the United States who are inspired to commit acts of violence. Whether or not the individuals are affiliated with a foreign terrorist organization and are willing to travel abroad to fight or are inspired by the call to arms to act in their communities, they potentially pose a significant threat to the safety of the United States and U.S. persons.

ISIL has proven relentless in its violent campaign to rule and has aggressively promoted its hateful message, attracting like-minded extremists to include Westerners. To an even greater degree than al Qaeda or other foreign terrorist organizations, ISIL has persistently used the Internet to communicate. From a homeland perspective, it is ISIL’s widespread reach through the Internet and social media which is most concerning as ISIL has aggressively employed this technology for its nefarious strategy. ISIL blends traditional media platforms, glossy photos, in-depth articles, and social media campaigns that can go viral in a matter of seconds. No matter the format, the message of radicalization spreads faster than we imagined just a few years ago.

Unlike other groups, ISIL has constructed a narrative that touches on all facets of life—from career opportunities to family life to a sense of community. The message isn’t tailored solely to those who are overtly expressing symptoms of radicalization. It is seen by many who click through the Internet every day, receive social media push notifications, and participate in social networks. Ultimately, many of these individuals are seeking a sense of belonging.

As a communication medium, social media is a critical tool for terror groups to exploit. One recent example occurred when an individual was arrested for providing material support to ISIL by facilitating an associate’s travel to Syria to join ISIL. The arrested individual had multiple connections, via a social media networking site, with other like-minded individuals.

There is no set profile for the susceptible consumer of this propaganda. However, one trend continues to rise—the inspired youth. We’ve seen certain children and young adults drawing deeper into the ISIL narrative. These individuals are often comfortable with virtual communication platforms, specifically social media networks.

ISIL continues to disseminate their terrorist message to all social media users—regardless of age. Following other groups, ISIL has advocated for lone offender attacks. In recent months ISIL released a video, via social media, reiterating the group’s encouragement of lone offender attacks in Western countries, specifically advocating for attacks against soldiers and law enforcement, intelligence community members, and government personnel. Several incidents have occurred in the United States and Europe over the last few months that indicate this “call to arms” has resonated among ISIL supporters and sympathizers.

In one case, a New York-based male was arrested in September after he systematically attempted to travel to the Middle East to join ISIL. The individual, who was inspired by ISIL propaganda, expressed his support for ISIL online and took steps to carry out acts encouraged in the ISIL call to arms.

The targeting of U.S. military personnel is also evident with the release of names of individuals serving in the U.S. military by ISIL supporters. The names continue to be posted to the Internet and quickly spread through social media, depicting ISIL’s capability to produce viral messaging. Threats to U.S. military and coalition forces continue today.

Social media has allowed groups, such as ISIL, to use the Internet to spot and assess potential recruits. With the widespread horizontal distribution of social media, terrorists can identify vulnerable individuals of all ages in the United States—spot, assess, recruit, and radicalize—either to travel or to conduct a homeland attack. The foreign terrorist now has direct access into the United States like never before.

In other examples of arrests, a group of individuals was contacted by a known ISIL supporter who had already successfully traveled to Syria and encouraged them to do the same. Some of these conversations occur in publicly accessed social networking sites, but others take place via private messaging platforms. As a result, it is imperative the FBI and all law enforcement organizations understand the latest communication tools and are positioned to identify and prevent terror attacks in the homeland.

We live in a technologically driven society and just as private industry has adapted to modern forms of communication so too have terrorists. Unfortunately, changing forms of Internet communication and the use of encryption are posing real challenges to the FBI’s ability to fulfill its public safety and national security missions. This real and growing gap, to which the FBI refers as “Going Dark,” is an area of continuing focus for the FBI; we believe it must be addressed given the resulting risks are grave both in both traditional criminal matters as well as in national security matters. The United States government is actively engaged with private companies to ensure they understand the public safety and national security risks that result from malicious actors’ use of their encrypted products and services. However, the administration is not seeking legislation at this time.

The FBI is utilizing all lawful investigative techniques and methods to combat the threat these individuals may pose to the United States. In conjunction with our domestic and foreign partners, we are rigorously collecting and analyzing intelligence information as it pertains to the ongoing threat posed by foreign terrorist organizations and homegrown violent extremists. We continue to encourage robust information sharing; in partnership with our many federal, state, and local agencies assigned to Joint Terrorism Task Forces around the country, we remain vigilant to ensure the safety of the American public. Be assured, the FBI continues to pursue increased efficiencies and information sharing processes as well as pursue technological and other methods to help stay ahead of threats to the homeland.

Intelligence

Integrating intelligence and operations is part of the broader intelligence transformation the FBI has undertaken in the last decade. We are making progress, but have more work to do. We have taken two steps to improve this integration. First, we have established an Intelligence Branch within the FBI headed by an executive assistant director (EAD). The EAD looks across the entire enterprise and drives integration. Second, we now have special agents and new intelligence analysts at the FBI Academy engaged in practical training exercises and taking core courses together. As a result, they are better prepared to work well together in the field. Our goal every day is to get better at using, collecting and sharing intelligence to better understand and defeat our adversaries.

The FBI cannot be content to just work what is directly in front of us. We must also be able to understand the threats we face at home and abroad and how those threats may be connected. Towards that end, intelligence is gathered, consistent with our authorities, to help us understand and prioritize identified threats and to determine where there are gaps in what we know about these threats. We then seek to fill those gaps and learn as much as we can about the threats we are addressing and others on the threat landscape. We do this for national security and criminal threats, on both a national and local field office level. We then compare the national and local perspectives to organize threats into priority for each of the FBI’s 56 field offices. By categorizing threats in this way, we strive to place the greatest focus on the gravest threats we face. This gives us a better assessment of what the dangers are, what’s being done about them, and where we should prioritize our resources.

Cyber

An element of virtually every national security threat and crime problem the FBI faces is cyber-based or facilitated. We face sophisticated cyber threats from state-sponsored hackers, hackers for hire, organized cyber syndicates, and terrorists. On a daily basis, cyber-based actors seek our state secrets, our trade secrets, our technology, and our ideas—things of incredible value to all of us and of great importance to the conduct of our government business and our national security. They seek to strike our critical infrastructure and to harm our economy.

We continue to see an increase in the scale and scope of reporting on malicious cyber activity that can be measured by the amount of corporate data stolen or deleted, personally identifiable information compromised, or remediation costs incurred by U.S. victims. For example, as the committee is aware, the Office of Personnel Management (OPM) discovered earlier this year that a number of its systems were compromised. These systems included those that contain information related to the background investigations of current, former, and prospective Federal government employees, as well as other individuals for whom a federal background investigation was conducted. The FBI is working with our interagency partners to investigate this matter.

FBI agents, analysts, and computer scientists are using technical capabilities and traditional investigative techniques—such as sources, court-authorized electronic surveillance, physical surveillance, and forensics—to fight cyber threats. We are working side-by-side with our federal, state, and local partners on Cyber Task Forces in each of our 56 field offices and through the National Cyber Investigative Joint Task Force (NCIJTF), which serves as a coordination, integration, and information sharing center for 19 U.S. agencies and several key international allies for cyber threat investigations. Through CyWatch, our 24-hour cyber command center, we combine the resources of the FBI and NCIJTF, allowing us to provide connectivity to federal cyber centers, government agencies, FBI field offices and legal attachés, and the private sector in the event of a cyber intrusion.

We take all potential threats to public and private sector systems seriously and will continue to investigate and hold accountable those who pose a threat in cyberspace.

* * *

Finally, the strength of any organization is its people. The threats we face as a nation have never been greater or more diverse and the expectations placed on the Bureau have never been higher. Our fellow citizens look to us to protect the United States from all of those threats and the men and women of the Bureau continue to meet—and exceed—those expectations, every day. I want to thank them for their dedication and their service.

Chairman Johnson, Ranking Member Carper, and committee members, I thank you for the opportunity to testify concerning the threats to the homeland and terrorists’ use of the Internet and social media as a platform for spreading ISIL propaganda and inspiring individuals to target the homeland, and the impact of the Going Dark problem on mitigating their efforts. I am happy to answer any questions you might have.

Recent Testimonies
10.08.15

Threats to the Homeland James B. Comey, Director, Federal Bureau of Investigation, Statement Before the Senate Committee on Homeland Security and Governmental Affairs, Washington, D.C.
08.05.15

Inspector General Access Kevin L. Perkins, Associate Deputy Director, Federal Bureau of Investigation, Joint Statement with Department of Justice Associate Deputy Attorney General Carlos Uriarte Before the Senate Judiciary Committee , Washington, D.C.
07.08.15

Counterterrorism, Counterintelligence, and the Challenges of Going Dark James B. Comey, Director, Federal Bureau of Investigation, Statement Before the Senate Select Committee on Intelligence, Washington, D.C.
07.08.15

Going Dark: Encryption, Technology, and the Balances Between Public Safety … James B. Comey, Director, Federal Bureau of Investigation, Joint Statement with Deputy Attorney General Sally Quillian Yates Before the Senate Judiciary Committee, Washington, D.C.
06.18.15

FBI’s Plans for the Use of Rapid DNA Technology in CODIS Amy S. Hess, Executive Assistant Director, Science and Technology Branch, Federal Bureau of Investigation, Statement Before the House Judiciary Committee, Subcommittee on Crime, Terrorism, Homeland Security, and Investigations, Washington, D.C.
06.03.15

Terrorism Gone Viral: The Attack in Garland, Texas and Beyond Michael B. Steinbach, Assistant Director, Counterterrorism Division, Federal Bureau of Investigation, Statement Before the House Homeland Security Committee, Washington, D.C.
04.29.15

Encryption and Cyber Security for Mobile Electronic Communication Devices Amy Hess, Executive Assistant Director, Science and Technology Branch, Federal Bureau of Investigation, Statement Before the House Oversight and Government Reform Committee, Subcommittee on Information Technology, Washington, D.C.
04.14.15

FBI’s Handling of Sexual Harassment and Misconduct Allegations Kevin L. Perkins, Associate Deputy Director, Federal Bureau of Investigation, Statement Before the House Committee on Oversight and Government Reform, Washington, D.C.
03.25.15

FBI Budget Request for Fiscal Year 2016 James B. Comey, Director, Federal Bureau of Investigation, Statement Before the House Appropriations Committee, Subcommittee on Commerce, Justice, Science, and Related Agencies, Washington, D.C.
03.12.15

FBI Budget Request for Fiscal Year 2016 James B. Comey, Director, Federal Bureau of Investigation, Statement Before the Senate Appropriations Committee, Subcommittee on Commerce, Justice, Science, and Related Agencies, Washington, D.C.
More

More TPP, Transpacific Partnership Pact Facts

During Hillary Clinton’s time as Secretary of State, she was for the TPP and now, well she has flipped on that position.

This is yet another shot across the bow of the White House where she is separating herself from Barack Obama, but is she really?

Hillary Clinton announced Wednesday that she opposes the Trans-Pacific Partnership trade deal.

“I’m continuing to learn about the details of the new Trans-Pacific Partnership, including looking hard at what’s in there to crack down on currency manipulation, which kills American jobs, and to make sure we’re not putting the interests of drug companies ahead of patients and consumers,” she said in a statement. “But based on what I know so far, I can’t support this agreement.”

At the end of the segment of Senator Rand Paul this week with Bret Baier on Fox, Paul describes some of the classified maneuvers of the TPP.

One particular group, left leaning for sure is WikiLeaks, who has been an interesting champion of trying to get all the details on the Transpacific Partnership Part.

TPP leaked: Wikileaks releases intellectual property chapter of controversial internet and medicine-regulating trade agreement

Bolton of Independent:

Wikileaks has released the Intellectual Property Rights chapter of the controversial Trans-Pacific Partnership (TPP) agreement, which they claim contains rules and regulations that would have “wide-ranging effects on internet services, medicines, publishers, civil liberties and biological patents.”

The idea behind the TPP is free trade – amongst the member states, it aims to lower trade barriers, create a common standard for intellectual property, enforce labour and environmental law standards and promote economic growth.

The agreement has come under severe criticism and scrutiny, however, for the policy of total secrecy during the years-long negotiations.

Others have criticised the more stringent intellectual property laws it would introduce, which could extend copyright terms and mean harsher penalties for file-sharers.

A number of trade unions and economists, such as Joseph Stiglitz, have said the agreement “serves the interest of the wealthiest”, and caters to the needs of corporations rather than the citizens of member nations.

Concerns have also been raised over the effect it could have on the cost of medicines – by extending the intellectual property rights of certain branded drugs, delays in the development of cheaper, ‘generic’ versions of these drugs could ensue, potentially leading to poorer people having to wait much longer than the wealthy to get access to the newest medicines.

The chapter on these intellectual property issues is what has been leaked by Wikileaks, and is one of the more controversial chapters in the whole agreement.

Peter Maybarduk, the program director at Public Citizen’s Global Access to Medicines, said that if the TPP is ratified, “people in the Pacific-Rim countries would have to live by the rules of this leaked text.”

“The new monopoly rights for big pharmaceutical firms would compromise access to medicines in TPP countries. The TPP would cost lives.”

The document, dated 5 October, was apparently produced on the day it was announced that the 12 member states to the treaty had reached an agreement after five and a half years of negotiations.

The nations of Vietnam, Peru, Mexico, Malaysia, Japan, Canada, Australia, USA, Singapore, New Zealand, Chile and Brunei are all prospective member states to the free-trade agreement, between them representing over 40 per cent of the world economy.

Despite the leak, the final text of the TPP is reportedly being held until after the Canadian general election, on 19 October.

While, as Wikileaks says, there still needs to a be a final “legal scrub” of the document before it is finished, negotiations on the document between signatories have now ended.

 

Iran deal violates federal law

What does it look like when the president of the United States is a desperate man for a deal? Does he have a platoon of legal eagles searching law and then writing executive orders to finesse the law? The order from the White House is ‘FIND A LOOPHOLE’.

EXCLUSIVE: U.S. officials conclude Iran deal violates federal law

FNC:James Rosen >  Some senior U.S. officials involved in the implementation of the Iran nuclear deal have privately concluded that a key sanctions relief provision – a concession to Iran that will open the doors to tens of billions of dollars in U.S.-backed commerce with the Islamic regime – conflicts with existing federal statutes and cannot be implemented without violating those laws, Fox News has learned.

At issue is a passage tucked away in ancillary paperwork attached to the Joint Comprehensive Plan of Action, or JCPOA, as the Iran nuclear deal is formally known. Specifically, Section 5.1.2 of Annex II provides that in exchange for Iranian compliance with the terms of the deal, the U.S. “shall…license non-U.S. entities that are owned or controlled by a U.S. person to engage in activities with Iran that are consistent with this JCPOA.”

In short, this means that foreign subsidiaries of U.S. parent companies will, under certain conditions, be allowed to do business with Iran. The problem is that the Iran Threat Reduction and Syria Human Rights Act (ITRA), signed into law by President Obama in August 2012, was explicit in closing the so-called “foreign sub” loophole.

Indeed, ITRA also stipulated, in Section 218, that when it comes to doing business with Iran, foreign subsidiaries of U.S. parent firms shall in all cases be treated exactly the same as U.S. firms: namely, what is prohibited for U.S. parent firms has to be prohibited for foreign subsidiaries, and what is allowed for foreign subsidiaries has to be allowed for U.S. parent firms.

What’s more, ITRA contains language, in Section 605, requiring that the terms spelled out in Section 218 shall remain in effect until the president of the United States certifies two things to Congress: first, that Iran has been removed from the State Department’s list of nations that sponsor terrorism, and second, that Iran has ceased the pursuit, acquisition, and development of weapons of mass destruction.

Additional executive orders and statutes signed by President Obama, such as the Iran Nuclear Agreement Review Act, have reaffirmed that all prior federal statutes relating to sanctions on Iran shall remain in full effect.

For example, the review act – sponsored by Sens. Bob Corker (R-Tennessee) and Ben Cardin (D-Maryland), the chairman and ranking member, respectively, of the Foreign Relations Committee, and signed into law by President Obama in May – stated that “any measure of statutory sanctions relief” afforded to Iran under the terms of the nuclear deal may only be “taken consistent with existing statutory requirements for such action.” The continued presence of Iran on the State Department’s terror list means that “existing statutory requirements” that were set forth in ITRA, in 2012, have not been met for Iran to receive the sanctions relief spelled out in the JCPOA.

As the Iran deal is an “executive agreement” and not a treaty – and has moreover received no vote of ratification from the Congress, explicit or symbolic – legal analysts inside and outside of the Obama administration have concluded that the JCPOA is vulnerable to challenge in the courts, where federal case law had held that U.S. statutes trump executive agreements in force of law.

Administration sources told Fox News it is the intention of Secretary of State John Kerry, who negotiated the nuclear deal with Iran’s foreign minister and five other world powers, that the re-opening of the “foreign sub” loophole by the JCPOA is to be construed as broadly as possible by lawyers for the State Department, the Treasury Department and other agencies involved in the deal’s implementation.

But the apparent conflict between the re-opening of the loophole and existing U.S. law leaves the Obama administration with only two options going forward. The first option is to violate ITRA, and allow foreign subsidiaries to be treated differently than U.S. parent firms. The second option is to treat both categories the same, as ITRA mandated – but still violate the section of ITRA that required Iran’s removal from the State Department terror list as a pre-condition of any such licensing.

It would also renege on the many promises of senior U.S. officials to keep the broad array of American sanctions on Iran in place. Chris Backemeyer, who served as Iran director for the National Security Council from 2012 to 2014 and is now the State Department’s deputy coordinator for sanctions policy, told POLITICO last month “there will be no real sanctions relief of our primary embargo….We are still going to have sanctions on Iran that prevent most Americans from…engaging in most commercial activities.”

Likewise, in a speech at the Washington Institute for Near East Policy last month, Adam Szubin, the acting under secretary of Treasury for terrorism and financial crimes, described Iran as “the world’s foremost sponsor of terrorism” and said existing U.S. sanctions on the regime “will continue to be enforced….U.S. investment in Iran will be prohibited across the board.”

Nominated to succeed his predecessor at Treasury, Szubin appeared before the Senate Banking Committee for a confirmation hearing the day after his speech to the Washington Institute. At the hearing, Sen. Tom Cotton (R-Arkansas) asked the nominee where the Obama administration finds the “legal underpinnings” for using the JCPOA to re-open the “foreign sub” loophole.

Szubin said the foreign subsidiaries licensed to do business with Iran will have to meet “some very difficult conditions,” and he specifically cited ITRA, saying the 2012 law “contains the licensing authority that Treasury would anticipate using…to allow for certain categories of activity for those foreign subsidiaries.”

Elsewhere, in documents obtained by Fox News, Szubin has maintained that a different passage of ITRA, Section 601, contains explicit reference to an earlier law – the International Emergency Economic Powers Act, or IEEPA, on the books since 1977 – and states that the president “may exercise all authorities” embedded in IEEPA, which includes licensing authority for the president.

However, Section 601 is also explicit on the point that the president must use his authorities from IEEPA to “carry out” the terms and provisions of ITRA itself, including Section 218 – which mandated that, before this form of sanctions relief can be granted, Iran must be removed from the State Department’s terror list. Nothing in the Congressional Record indicates that, during debate and passage of ITRA, members of Congress intended for the chief executive to use Section 601 to overturn, rather than “carry out,” the key provisions of his own law.

One administration lawyer contacted by Fox News said the re-opening of the loophole reflects circular logic with no valid legal foundation. “It would be Alice-in-Wonderland bootstrapping to say that [Section] 601 gives the president the authority to restore the foreign subsidiary loophole – the exact opposite of what the statute ordered,” said the attorney, who requested anonymity to discuss sensitive internal deliberations over implementation of the Iran deal.

At the State Department on Thursday, spokesman John Kirby told reporters Secretary Kerry is “confident” that the administration “has the authority to follow through on” the commitment to re-open the foreign subsidiary loophole.

“Under the International Emergency Economic Powers Act, the president has broad authorities, which have been delegated to the secretary of the Treasury, to license activities under our various sanctions regimes, and the Iran sanctions program is no different,” Kirby said.

Sen. Ted Cruz (R-Texas), the G.O.P. presidential candidate who is a Harvard-trained lawyer and ardent critic of the Iran deal, said the re-opening of the loophole fits a pattern of the Obama administration enforcing federal laws selectively.

“It’s a problem that the president doesn’t have the ability wave a magic wand and make go away,” Cruz told Fox News in an interview. “Any U.S. company that follows through on this, that allows their foreign-owned subsidiaries to do business with Iran, will very likely face substantial civil liability, litigation and potentially even criminal prosecution. The obligation to follow federal law doesn’t go away simply because we have a lawless president who refuses to acknowledge or follow federal law.”

A spokesman for the Senate Banking Committee could not offer any time frame as to when the committee will vote on Szubin’s nomination.

For more details and reading:

Sanctions on Foreign Subsidiaries Implemented Under Iran Threat Reduction Act

In the months since the signing of the Iran Threat Reduction and Syria Human Rights Act (which we will stubbornly continue to refer to here as “ITRA”), the Obama administration has worked to implement tougher sanctions against Iran.  Although many of the ITRA regulations are not expected until early November, an Executive Order issued last week marked the beginning of a much stricter era of sanctions pursuant to ITRA, the Iran Sanctions Act of 1996 (ISA), and the Comprehensive Iran Sanctions, Accountability, and Divestment Act of 2010 (CISADA).

On October 9, 2012, sixty days after President Obama signed ITRA into law, he issued Executive Order No. 13,628, extending U.S. Iran sanctions to cover foreign subsidiaries of U.S. parent companies, a prohibition that did not exist until promulgated in ITRA.[1] The Executive Order implements ITRA Section 218,[2] which we highlighted in our August 17, 2012 post, by providing that:

No entity owned or controlled by a United States person and established or maintained outside the United States may knowingly engage in any transaction, directly or indirectly, with the Government of Iran or any person subject to the jurisdiction of the Government of Iran, if that transaction would be prohibited by [the pre-existing Iran sanctions].

The Executive Order defines the term “entity” to mean “a partnership, association, trust, joint venture, corporation, group, subgroup, or other organization.” This is a slight expansion of the definition provided by Congress in Section 218, which does not include the words “group” or “subgroup.” The resulting definition appears to authorize sanctions where any group “controlled by” a U.S. person, regardless of whether the group is formally incorporated, conducts prohibited Iran-related business.

The Executive Order gives no quarter for existing contracts, and authorizes standard Office of Foreign Assets Control (OFAC) penalties against the U.S. person controlling the foreign entity. However, Subsection 4(c) of the Order provides that civil penalties shall not apply if the U.S. person divests or terminates its business with the foreign subsidiary not later than February 6, 2013.

The Order also directs that Secretaries of Treasury and State to issue regulations to implement several other provisions of ITRA (though the ITRA itself also directed the issuance of such regulations within 90 days of the effective date of the statute). Thus, Treasury regulations may be expected by around November 8, 2012 regarding several ITRA provisions, including the following:

  • Section 202, which requires the imposition of at least five ISA sanctions on any person who, on or after November 8, 2012, beneficially owns, operates, or controls a vessel that is used to transport crude oil from Iran to another country.  This provision applies, however, only if the President determines under the National Defense Authorization Act that there is a sufficient supply of petroleum from countries other than Iran to permit petroleum purchasers to significantly reduce purchases from Iran;
  • Section 214, which increases the availability of sanctions on subsidiaries and agents of UN-sanctioned persons;
  • Section 215, which extends the availability of sanctions against persons connected to Iran’s weapons of mass destruction to any foreign financial institution who aids that person; and
  • Section 216 adds a new section to CISADA, expanding sanctions to apply to financial institutions connected to certain proliferation or terrorism activities of Iran or its National Guard.

In addition to the forthcoming regulations, the President is required to provide a great deal of information to Congress on and after November 8.  Under section 211, the President must  report to Congress on the identity of operators of vessels and persons that conduct or facilitate significant financial transactions that manage Iranian ports designated for sanctions under the International Emergency Economic Powers Act.  Furthermore, the President must provide the identity of and the restrictions on individuals, including senior Iranian officials, Iranian Revolutionary Guard Corps Officials, foreign persons supporting the Iranian Revolutionary Guard, and foreign government agencies carrying out transactions with certain Iran-affiliated persons.[3]

The Secretaries of Treasury and State also are required to report to the relevant Congressional committees on certain aspects of the implementation of ITRA. Under Section 206, the Secretary of State must brief Congress on the implementation of the ISA by November 8, 2012, and every 120 days thereafter. The Secretary of Treasury, pursuant to sections 216 and 220, must report to Congress on the implementation of sanctions on persons and entities who provide financial assistance to proliferation and terrorism activities.

The pace of Iran sanctions has accelerated rapidly in recent months and should be expected to continue to increase over the near and medium term. We will continue to provide our analysis of new developments here.


[1] On the same day the Executive Order was issued, OFAC issued a “Frequently Asked Questions” document providing guidance with regard to the Order.

[2] Sec. 218 – Liability of Parent Companies for Violations of Sanctions by Foreign Subsidiaries (requiring the President and the Secretary of Treasury to promulgate regulations within 60 days of enactment).

[3] ITRA §§ 221, 301-303.