Student Visas Equal Terror and Spies?

US student visa program’s ‘many vulnerabilities’ raise spying, terror fears

FNC: From potential terrorists who enroll at phony schools only to melt into the U.S. population, to foreign scientists who come to study weapons technology at America’s top schools, the student visa program is allowing dangerous enemies into the country, a former top federal official told FoxNews.com.

Recent attention has been focused on refugee programs and illegal border crossings, but the Achilles heel in America’s immigration system may be the program that invites 1.2 million foreigners into the U.S. each year, according to Claude Arnold, retired special agent in charge for Immigration and Customs Enforcement’s Los Angeles bureau of Homeland Security Investigations. Once here on student visas, immigrants are barely monitored and tens of thousands don’t show up for classes and fall off the government radar.

“Our legal immigration system has many vulnerabilities and the student visa program is no different,” Arnold said. “It is only a matter of time before there is either some horrible criminal act, or some act of terrorism, and there is absolutely no information available that would have caused [authorities] to go out and pick that person up.”

“It is only a matter of time before there is either some horrible criminal act, or some act of terrorism, and there is absolutely no information available that would have caused [authorities] to go out and pick that person up.”

– Claude Arnold, retired ICE special agent in charge

Most of student visa recipients do exactly what they said they would do when they applied – take advantage of America’s vaunted system of higher education and leave when the terms expire. But every year, approximately 58,000 overstay their visas and drop out of contact with authorities. While the vast majority of those are not terrorists or spies, some are, said Arnold.

ICE’s 7,000 agents simply don’t have the ability to monitor all of them, Arnold said. By the time a red flag goes up, it may be too late.

“You have to conduct a threat assessment and go after those who are a threat to national security,” Arnold said. “But within that universe of people who are visa overstays, there could be people who are radicalized, and we just don’t know it because there is no intelligence on them,” he added.

Foreign enemies know how to exploit the student visa program, Arnold said. Iran, in particular, has sent scientists to the U.S., ostensibly to study other subjects, but really to gain knowledge to benefit Iran’s weapons program.

“My concern was we had Iranian students who studied at Iran’s big physics school and were essentially nuclear physicists working on their bomb project,” Arnold said. “We had cases where they would register for a mechanical engineering class in the U.S., but really all they were trying to do is get access to an aeronautical engineering program, so they could work on the delivery system for Iran’s nuclear program.”

The State Department and the Department of Homeland Security share responsibility for screening applicants and monitoring them once they arrive.

ICE officials told FoxNews.com each school that takes in visa recipients has a designated official who serves as a point of contact between students, the school and the government’s Student and Exchange Visitor Program to ensure the federal computer tracking system is updated. In addition, 58 field representatives visit approved schools twice a year to ensure compliance.

The State Department, which oversees part of the student visa program, told FoxNews.com in an emailed statement it is committed to a “transparent and efficient visa application process,” and maintains extensive programs to vigorously combat and investigate visa fraud.

Fraud prevention managers engage in public outreach, training, detailed review of cases, statistical analysis and other activities, including communicating with host government officials and U.S. law enforcement authorities, the statement said.

Applicants are screened by a host of federal agency databases and personnel against databases of fingerprints of known and suspected terrorists, wanted persons, immigration law violators, and more than 75.5 million criminal history records.

ICE statistics show countries sending their students include several considered by the U.S. as State Sponsors of Terrorism, including Syria and Iran, as well as Saudi Arabia, China and Pakistan. More than 700 Syrians came to the U.S. via the student visa program in 2014, and another 3,700 came from Iran the same year.

“We don’t really know if State’s efforts are effective or if they are helping reduce fraud and abuse of visa programs, because Department of Homeland Security refuses to release a report detailing the number of overstays in each visa category and from each country, even though Congress has mandated this report since at least 2004,” said Jessica Vaughan, a former State Department consular officer who now is the director of Policy Studies for the Center for Immigration Studies, a Washington, DC-based research institute.

“What I am worried about is students who are allowed to get a student visa to attend some nondescript school and then they disappear,” said Vaughan, who noted that Hani Hanjour, the 9/11 hijacker who flew Flight 77 into the Pentagon, had obtained a student visa but never showed up for class.

Too often, schools play along. ICE has cracked down in recent years on “visa mills,” or facilities that help foreigners get a student visa for a fee, but never hold classes or ensure students attend class. Three California residents pleaded guilty last March in a “pay-to-stay” scheme involving three sham schools in Los Angeles.

The schools had legitimate-sounding names, like Walter Jay M.D. Institute and the American College of Forensic Studies, and took in millions of dollars in tuition fees. But investigators found classes that were supposed to hold 30 students had just few, if any students. According to Arnold, who oversaw the investigation, the schools existed only to facilitate foreign students’ purchase of visas under the guise of studying.

“This is an example where the system worked,” said Arnold.

In addition to better screening and monitoring, Arnold believes overstaying a visa should be a misdemeanor. That might make visa holders less likely to violate the terms, and would also trigger alarms if they were stopped for a traffic violation or arrested for another reason.

Arnold and Vaughan also want tighter controls on the kinds of schools that can accept foreign students. Some trade school programs that teach subjects like massage, baking and horseshoeing could invite fraud. And courses that teach material with military applications invite something even more sinister, Arnold said.

“Why do we want people who are our enemies, whether it is potentially ISIS or Iran, here learning technical skills they are going to use against us?” he said. “It is insane.”

State Dept Covered up Hillary’s Email Server for Years

State Department covered up Hillary’s private email server for years even though ‘dozens of senior officials’ knew about it, says scathing inspector general report

  • Critical report from State Department’s own internal watchdog details abuse of Freedom of Information Act while Clinton ran the agency
  • 177 of the 240 FOIA requests lodged for information about Hillary while she was secretary of state are still pending three years after she left office
  • State told a liberal group it had no information about Hillary’s emails in 2013 even though many senior officials were emailing her on her private server 
  • The U.S. State Department told a watchdog group in 2013 that it didn’t have any information about former secretary Hillary Clinton’s emails, even though ‘dozens of senior officials’ knew she was using a private server for all her electronic communications.
  • A report released Thursday by the agency’s inspector general – a powerful and impartial internal investigator – described a cavalier culture about transparency inside Clinton’s agency, saying that 177 requests for documents about Clinton are still ‘pending’ nearly three years after she left office.
  • The Freedom of Information Act requires federal agencies to respond to requests for information within 20 business days.
  • The botched FOIA request, filed in December 2012 just before Clinton left office, specifically asked whether or not Clinton used an email account other than one hosted at state.gov.
  • Citizens for Responsibility and Ethics in Washington, a liberal group, was reacting to news that former Environmental Protection Agency administrator Lisa Jackson had used an alias – ‘Richard Windsor’ – to send and receive emails in a way that couldn’t be tied to her when FOIA requests came in.
  • In May 2013 the State Department responded to CREW’s request, saying it had ‘no records’ related to what the group asked for.
  • By then, Clinton had spent four years emailing department employees from her private home-brew account, but had never turned the messages over to the State Department.
  • That CREW request was filed in December 2012, just before Mrs. Clinton left office, and specifically asked whether Mrs. Clinton used anon-State.gov email account for government business.
  • ‘At the time the request was received, dozens of senior officials throughout the Department, including members of Secretary Clinton’s immediate staff, exchanged emails with the Secretary using the personal accounts she used to conduct official business,’ the Office of Inspector General concluded.
  • ‘OIG found evidence that the Secretary’s then-Chief of Staff was informed of the request at the time it was received and subsequently tasked staff to follow up. However, OIG found no evidence to indicate that any of these senior officials reviewed the search results or approved the response to CREW.’
  • The employees responsible for searching the State Department’s records, the report says, never ‘searched any email records, even though the request clearly encompassed emails.’
  • State has received an unprecedented crush of requests for Clinton-related documents – 240 in all, a number bigger than those related to secretaries Madeline Albright, Colin Powell, Condoleeza Rice and John Kerry combined.
  • But the inspector general found that the agency cut the number of people processing those FOIA requests as they poured in.
  • Clinton’s emails sat on her private server for years until the State Department asked her in 2014 to turn them over. She deleted more than half of the messages, calling them ‘personal’ in nature, before complying.
  • In the meantime, however, her emails were out of reach when federal employees searched for records that might satisfy FOIA requests.

 

 

Sen. Charles Grassley, an Iowa Republican, said Thursday in a statement that ‘the FOIA process at the State Department is broken, and has been for several years.’

The agency’s breakdowns in performance, he said, ‘are particularly troubling in light of the report’s revelation that former Secretary Clinton’s exclusive use of a non-government email server was known to senior staff at the department, but unknown to the FOIA office, thus causing the FOIA office to provide false information about the Secretary’s use of email.’

The FOIA law, first enacted in 1966 before the advent of personal computers, ‘neither authorizes nor requires agencies to search for Federal records in personal email accounts maintained on private servers or through commercial providers,’ the inspector general report explained.

State Department employees have ‘no way to independently locate Federal records from such accounts unless employees take steps to preserve official emails in Department recordkeeping systems.’

Current law requires State Department employees to forward work-related personal emails to their official accounts within 20 days of sending or receiving them, so the agency has a record of them.

But Clinton never had a ‘state.gov’ account where her emails could be sent.

A federal judge ultimately ordered the State Department to collect her emails, vet them for classified material, and release them on a monthly schedule.

So far intelligence officials have had to block the release of portions of more than 1,200 emails because they contained classified information.

Who’s Calling the Shots in State Politics?

Exactly what else do voters need to be aware of? Who is winning the liberal-progressive agendas at the state level? Do you pay attention to the language on ballot initiatives? Do you know the background and the money and players behind them?

Read on….

National liberal groups to push ‘record’ number of 2016 ballot measures

Efforts to circumvent legislative logjam counter grassroots origins

PublicIntegrity: Paul Spencer, a teacher and part-time pecan farmer in Arkansas, drafted a ballot measure for 2016 to reform the state’s campaign finance laws so his fellow voters could know who paid for election ads on TV.

But he and fellow activists there knew they couldn’t do it alone. They sought the help of national election-reform groups because in Arkansas, as in many other states, initiatives can cost millions of dollars to pass.

Liberal groups working at the national level are using state ballot initiatives as their weapon of choice for 2016, but given the costs, they’re carefully planning exactly where to push these measures. And Spencer’s Arkansas proposal didn’t make the cut for 2016.

That top-down approach seems ironic. The initiative process was put in place at the beginning of the 20th century as a way for local citizens such as Spencer to band together to pass laws. And voters on the ground may not be aware that national groups are helping fuel the ballot fights in their backyards.

Still, national liberal leaders see state ballot measures as their best option for winning on some issues. Dismayed at their prospects in Congress and in Republican-dominated state legislatures, national liberal groups plan to use ballot initiatives to push raising the minimum wage in Maine, legalizing marijuana in Massachusetts, closing gun sale loopholes in Nevada, guarding endangered species in Oregon — and other campaigns in at least eight additional states.

National conservative groups, meanwhile, seem poised to play defense, setting up a battle of outsiders on state playing fields. In March, Republican-linked politicos launched the Center for Conservative Initiatives in Washington, D.C., to counter the liberal ballot measures they anticipate will arrive in record numbers nationwide in 2016.

“Liberal groups have been forced to spend heavily on ballot initiatives in an effort to circumvent elected representatives because in states around the country the public has overwhelmingly rejected their out-of-touch candidates and messages,” said the Center’s leader, Matt Walter, in an email.

The push from outsiders to pass pet policies via the ballot has occurred before, on everything from land conservation in North Dakota to how to cage chickens in California, sometimes leading to big-money fights between corporations, advocacy groups and others.

“There’s this perception out there that the initiative process is all about the little guy,” said Jennie Bowser, a consultant who for many years studied ballot measures for the bipartisan National Conference of State Legislatures. “But the truth of the matter is that it’s a big business. It’s really well organized, and it’s really well funded. And it is very, very rarely a group of local citizens who get together and try to make a difference.”

Passing popular ideas

In 2014, when a Republican wave gave conservatives more U.S. Senate seats and governors’ mansions, left-leaning activists still managed to notch victories for the minimum wage, gun control and marijuana legalization through ballot measures in Nebraska, South Dakota, Illinois, Arkansas, Washington, Oregon, Alaska and the District of Columbia.

In 2015, they followed with wins for campaign-finance reform in Seattle and Maine.

Those successes, as well as the chance to draw more left-leaning voters to the polls, are encouraging liberal activists to push hard on the 2016 ballot.

 

Russia’s Cyber Warfare, Threat Matrix to USA

Cyber Warfare

The Russian government is considered to be one of the most advanced cyber actors globally, with highly sophisticated cyber capabilities on par with the other major cyber powers. Open source information about Russian cyber programs and funding is scarce, but an ultimate goal of the government is to gain information superiority, both in peacetime and in military conflicts.

According to U.S. intelligence, Russia is a top nation state threat to American interests. Russian armed forces have been establishing a cyber command and a specialized branch to carry out computer network operations. It is likely that Russia aspires to integrate cyber into all military services. For example, the Russian government news agency TASS has reported that strategic missile forces are establishing special cyber units, and according to Russian general Yuri Kuznetsov, cyber defense units in the Russian armed forces will acquire operational capabilities by 2017.

Researchers from China have observed that Russian armed forces have rehearsed both attacking an adversary’s cyber targets and defending themselves against cyber attacks. It is believed that Russia, in addition to its espionage over the last decade against Western governments, is conducting its own active research and development of cyber weapons. It has also been alleged that FSB develops sophisticated computer malware programs.

However, despite a belief shared by many that Russia possesses capabilities to conduct cyber network attacks with physical effects equivalent to a kinetic attack, in the recent hybrid conflicts in Georgia and Ukraine, only a limited use of cyber attacks has been recorded. No physical damage, or disruption of critical infrastructure or weapons has been reported, but there is evidence that Russian actors are capable of taking down services. For example, Russian APT28 (Pawn Storm/Sofacy/Tsar Team) shut off transmissions of French TV5 Monde for 18 hours, and its cyber attacks allegedly resulted in significant damage to the channel’s infrastructure. Moreover, the Ukrainian security service (SBU) reported in December 2015 that Russian security services have planted malware into the networks of Ukrainian regional power companies. Power outages are reported to have occurred shortly thereafter. However, due to the lack of investigation and evidence, it is not possible to attribute these outages to any actors.

The majority of analysts concede that Russian cyber attacks have been closely coordinated with military operations both in Georgia and Ukraine. As part of their information warfare campaign, Russians used electronic warfare (EW) and signals intelligence in both theatres. Much less known is the fact that in March 2014, Russian EW forces rerouted internet traffic from Crimean servers to Russian servers, most likely for eavesdropping purposes. There is also consensus that the effects of Russian cyber attacks have been limited – in Georgia, cyber attacks created a military advantage only at the operational and tactical levels, and in Ukraine, Russian cyber attacks had only a short term tactical effect. Hence in both theatres, strategic effects (diminishing opponent’s will or capacity to resist) and military effects (degrading performance of opponent’s military) were not achieved.

The most sophisticated cyber capabilities used in these conflicts have been cyber espionage campaigns sponsored or supported by the Russian government. For example, security companies have gathered evidence indicating that APT28 (which targeted the Georgian government), and APT29 (whose targets are consistent with Russian government interests in regards to the Ukrainian conflict) were both sponsored by the Russian government. Russian APTs possess sophisticated cyber capabilities (e.g. ability to exploit zero-day vulnerabilities, target mobile devices, evade detection, and hide operational command and control). Furthermore, a prominent cyber espionage campaign against the Ukrainian military and government officials, Operation Armageddon, has been attributed by SBU to the Russian Federal Security Service (FSB). This has been corroborated by technical evidence from an independent security company.

In addition to gathering intelligence, some Russian APTs are able to remotely access industrial control systems (ICS). A cyber espionage group Sandworm (that has been active in Ukraine) uses BlackEnergy malware that is believed to also be embedded into critical infrastructure in the U.S. It is interesting to note that four Russian APTs have been using particular types of malware, which suggests links between these actors.

Russia is developing asymmetric measures to offset the West’s technological and conventional edge. While total information superiority has not been attained, the final outcome of the cyber build up is uncertain, and it will continue to be a topic of concern for businesses and nations for the foreseeable future.

Qaddafi did NOT have to Go, But….

He did and there was a larger agenda underway between the UK and the USA. He was behaving, he was trying to keep al Qaida out and what is more he was fighting hard against the Muslim Brotherhood knowing it was festering and growing in power to over-take his own rule.

But but but…..Obama and Hillary are loyal to the Muslim Brotherhood. Well yes they are and Tony Blair was too until late last year and he finally got the memo and then issued a report on the Muslim Brotherhood. Meanwhile several countries in the Middle East have formally declared the Muslim Brotherhood a terror organization, when during the early 2000’s in the United States with the Holyland Foundation trial, the Muslim Brotherhood was proven to be a terror organization.

Meanwhile, Qaddafi was aiding the U.S. intelligence community and was indeed behaving. Obama, Hillary and Blair all had different missions for Libya post Qaddafi. That did not work out well, and all the predictions of Qaddafi have in fact come to pass.

Fail….

Gaddafi warned Blair his ousting would ‘open door’ to jihadis

Transcripts of 2011 calls reveal Libyan dictator predicted extremists would use his departure to start war in Mediterranean

Guardian: Muammar Gaddafi warned Tony Blair in two fraught phone conversations in 2011 that his removal from the Libyan leadership would open a space for al-Qaida to seize control of the country and even launch an invasion of Europe.

The transcripts of the conversations have been published with Blair’s agreement by the UK foreign affairs select committee, which is conducting an inquiry into the western air campaign that led to the ousting and killing of Gaddafi in October 2011.

In the two calls the former British prime minister pleaded with Gaddafi to stand aside or end the violence. The transcripts reveal the gulf in understanding between Gaddafi and the west over what was occurring in his country and the nature of the threat he was facing.

In the first call, at 11.15am on 25 February 2011, Gaddafi gave a warning in part borne out by future events: “They [jihadis] want to control the Mediterranean and then they will attack Europe.”

In the second call, at 3.25pm the same day, the Libyan leader said: “We are not fighting them, they are attacking us. I want to tell you the truth. It is not a difficult situation at all. The story is simply this: an organisation has laid down sleeping cells in north Africa. Called the al-Qaida organisation in north Africa … The sleeping cells in Libya are similar to dormant cells in America before 9/11.”

Gaddafi added: “I will have to arm the people and get ready for a fight. Libyan people will die, damage will be on the Med, Europe and the whole world. These armed groups are using the situation [in Libya] as a justification – and we shall fight them.”

Three weeks after the calls, a Nato-led coalition that included Britain began bombing raids that led to the overthrow of Gaddafi. He was finally deposed in August and murdered by opponents of his regime in October.

At one point in the conversations Gaddafi urged Blair to go to Libya to see the lack of violence in Tripoli, and held the telephone to a TV screen so Blair could hear people voicing their support for Gaddafi in the streets.

Blair said he had decided to act as an intermediary due to the contact he had with Gaddafi when he was prime minister. Both Washington and London knew of his phone calls to Gaddafi, he said.

During the calls Blair suggested he could engineer a peaceful exit for Gaddafi if he agreed to leave. Referring to him as the leader, Blair also insisted there was no attempt to colonise Libya. Gaddafi said he had to defy colonisation, insisting: “There is nothing here. No fight, no bloodshed. Come see yourself.”

Blair urged Gaddafi to give him a phone number so he could contact him urgently, and beseeched him to “do something that allows the process to start, end the bloodshed, start a new constitution”.

He told Gaddafi that if he made the right statements, ended violence, and lowered the political temperature, it might be possible to get the US and the EU to hold back from interfering.

“If you have a safe place to go, you should go there because this will not end peacefully and there has to be a process of change; that process of change can be managed and we have to find a way of managing it,” Blair said. “The US and the EU are in a tough position right now and I need to take something back to them which ensures this ends peacefully. If people saw the leader stand aside people would be content with that. If this goes on for another day or two days, we will go past that point. I am saying this because I believe it deeply. If we cannot find a way out very quickly, we will be past the point of no return. If this does not happen very fast the people of Libya will make this very destructive.”

Blair ended the call by saying: “ I would like to offer a way out that is peaceful … keep the lines open.”

Commenting on the exchanges on Thursday, the foreign select committee chair, Crispin Blunt, said: “The transcripts supplied by Mr Blair provide a new insight into the private views of Colonel Gaddafi as his dictatorship began to crumble around him. The failure to follow Mr Blair’s calls to ‘keep the lines open’ and for these early conversations to initiate any peaceful compromise continue to reverberate.

“The committee will want to consider whether Gaddafi’s prophetic warning of the rise of extremist militant groups following the collapse of the regime was wrongly ignored because of Gaddafi’s otherwise delusional take on international affairs. The evidence that the committee has taken so far in this inquiry suggests that western policymakers were rather less perceptive than Gaddafi about the risks of intervention for both the Libyan people and the western interests.”

In one of the deadliest attacks since the fall of Gaddafi, dozens of people were killed on Thursday in an apparent suicide bombing at a police training centre in the Libyan town of Zliten.