Top House Republican Michael McCaul Fears Terror-Linked Individuals Targeting …

8 Dec 2015 | Author: | No comments yet »

Almost impossible to stop all terrorism: Homeland Security chair.

WASHINGTON — ISIS terrorists have tried to exploit the Syrian refugee program to get into the United States, the House Homeland Security Committee chairman claimed Monday. “Now we have direct evidence and intelligence that they not only tried to infiltrate Europe, which is easier to do, but to infiltrate it to get into the United States.WORK IN PROGRESS — House-Senate talks continued over the weekend on finalizing a cybersecurity information sharing bill. “Good progress made today at the staff level,” one aide said Friday. Robert Bentley said as much as his heart goes out to Syrian refugees he decided his duty to keep Alabamians safe was his first first obligation as governor (Hadi Mizban) Citing intelligence officials, Rep. But one of the key sticking points remains, MC hears, namely Section 407 of the Senate-passed bill — a provision that makes many industry executives recoil like a vampire sniffing garlic.

McCaul said his committee will examine whether there was an intelligence failure in spotting the looming threat posed by the San Bernardino, Calif., murderers, Syed Rizwan Farook and his wife, Tashfeen Malik, specifically the visa granted to Malik, whom McCaul calls the “wild card” in the case. “There’s a serious investigation ongoing into what she was doing in Pakistan and in Saudi, including if she attended the red mosque in Islamabad, which is a very radicalized mosque,” McCaul said. “We think that she had a lot to do with the radicalization process and perhaps with Mr. The fears increased in the wake of deadly attacks in Paris last month followed by last week’s massacre in San Bernadino, California, in which two ISIS supporters killed 14 people at a Christmas party. Additionally, McCaul called the intelligence officials’ decision to come forward “very courageous … given the political debate on the Hill,” which would indicate the information was not meant for his consumption.

That section of the legislation requires the Department of Homeland Security and other federal agencies to develop a strategy for responding to a cyber catastrophe affecting critical computer systems. The events have shaped the conversation on Capitol Hill and spilled over into the 2016 presidential race, where businessman Donald Trump called Monday for banning all Muslims from coming to the U.S. Business groups view it as a gateway to onerous regulation; backers say it’s the bare minimum needed to prepare for the most destructive attacks imaginable. Meanwhile, US Attorney General Loretta Lynch said Sunday that authorities were working with their counterparts overseas to gather information about the couple. “We are trying to learn everything we can about both of these individuals,” Lynch said on NBC’s “Meet the Press.” “It will be a long process. In his Thanksgiving address, he stated that, “nearly four centuries after the Mayflower set sail, the world is still full of pilgrims” seeking asylum in America.

The House wants to add a requirement that the Homeland Security secretary, along with the head of the FBI and the Director of National Intelligence, must certify each refugee being admitted poses no security threat. McCaul said Monday he hopes to build on those efforts by introducing legislation to create a national commission on security and technology that will be tasked with coming up with recommendation on how best to handle the threat of encrypted terrorist communications. “No longer do terrorists plot by using couriers and caves,” Mr.

Jeff Sessions, the most outspoken critic of the Obama administration’s immigration proposal, said the issue with Syrian refugees is just the tip of the iceberg. The current patchwork of state-by-state laws gives industry heartburn; a fresh stab at consistency comes Tuesday in the House Financial Services Committee. He said the Obama administration plans to issue an additional 700,000 green cards to migrants from Muslim nations over the next five years, just as it has done in the last five years. “Terror groups have demonstrated that they will recruit from among this inflow. When the administration says there are no known credible threats to the homeland, it means less today than it once did because we cannot stop what we cannot see.” The commission, Mr. Randy Neugebauer would require entities that handle sensitive information — like retailers and merchants — to meet data security standards similar to those of financial institutions.

McCaul said, will include members of the technology and defense communities, privacy and civil liberty groups, as well as members of law enforcement and academia. A hammer may not be the best tool to destroy your digital trail, but it’s likely to get you at least part of the way there, said Amber Schroader, CEO of Paraben Corp., a mobile device forensics firm. “It makes the process for doing recovery much longer than if it’s not destroyed, but not impossible,” Schroader said. “There are specialized techniques that can still pull that data, but it’s a good method for most people.” Those specialized techniques involve pulling data directly from a circuit board, rather than from the phone itself, she said. How destroyed is too destroyed for forensics experts to pull something valuable off a phone? “I’ve never measured how many hammer hits it takes,” Schroader said. “The best way to destroy electronics is to melt it together so the parts don’t exist separately, but that’s not something most people can do.

In his nationally televised speech Sunday, President Barack Obama again said he would ask “high-tech and law enforcement leaders to make it harder for terrorists to use technology to escape from justice.” But like almost everyone who talks about encrypted communications and other technologies, he offered no specific proposals. AMASH, POLIS IN ANTI-SURVEILLANCE PUSH — The bipartisan pair of privacy advocates is pushing House leaders to bake a gaggle of already-approved privacy provisions into the end-of-year government spending bill, according to a letter they circulated on Friday, our friends at Morning Tech report. BAKER’S CRYSTAL BALL — The next half decade will see a major U.S. company sue a foreign competitor over its use of stolen intellectual property, predicted national security attorney Stewart Baker during a Friday American Bar Association breakfast.

The latter is especially the case following September’s pledge from Chinese President Xi Jinping not to support computer hacking for the purpose of obtaining a competitive advantage. Still, making a case will require U.S. government assistance, Stewart said, in the form of evidence taken directly from the guilty parties’ computers.

The NSA and the CIA “are probably going to have to hack the companies that are suspected of benefiting from the stolen secrets.” True, spy agencies hate disclosing sources and methods, but merely acknowledging an ability to hack computers isn’t tantamount to disclosing the exact method of network penetration. Maybe that’s why his imagining of a possible 2016 cyber heist is so compelling. “You could well see a bunch of short sellers teaming up with hackers and betting short on a stock,” he told MC, “causing a defect, then causing the stock price to drop just to make a couple million dollars, just on a one-day stock price drop.” It wouldn’t be the first time crooks tried to hack their way to market riches. The Securities and Exchange Commission in August charged two Ukrainian men with fraud for allegedly hacking into newswire computers, grabbing corporate press releases and trading on the information before it became public.

Friedberg, co-founder of New York-based Stroz Friedberg, a computer consulting and technical services firm, focuses now on protecting companies from such nightmares. The cascade of high-profile hacks over the past two years — hitting targets from the federal government’s central personnel office to Sony Pictures — represents a “watershed moment” for corporate risk managers, said Friedberg.

Our partners
Follow us
Contact us
Our contacts

About this site