Tag: al-Qaeda

  • EDITORIAL: Alleged LAX Gunman And Conspiracy Theorist Paul Anthony Ciancia Becomes Author Of One Of History’s Unwanted Footnotes

    Paul Ciancia
    Paul Ciancia: Source: FBI.

    UPDATED 11:04 A.M. ET (NOV. 4, U.S.A.) Gerardo I. Hernandez, a 39-year-old Transportation Security Administration (TSA) officer described as a loving husband and father and dutiful employee, gave his life for his country Friday. In an awful and unwanted footnote, he became the first TSA officer killed in the line of duty.

    Officer Hernandez thus indelibly became linked in history to figures such as Edwin C. Shanahan, the first FBI agent to die in the line of duty (1925), and William Craig, the first member of the U.S. Secret Service killed while doing his job (1902). Shanahan was murdered by a car thief wielding an automatic pistol. Craig died in a horrific collision between a streetcar and carriage while protecting President Theodore Roosevelt. Like El Salvador-born Hernandez, Craig was not born in the United States. He was born in Scotland.

    A full fact set has not yet emerged in the death of Hernandez. What is clear is that Paul Anthony Ciancia, 23, was arrested after being shot by police Friday at Los Angeles International Airport. He initially was identified by the FBI as the suspect in a shooting death and the wounding of others at the airport. On Saturday, he was charged with Murder of a Federal Officer and Violence at International Airports.

    Ciancia used a “.223 caliber M&P 15 assault rife” he’d pulled from his bag at the TSA checkpoint inside Terminal 3, the FBI said in an affidavit filed yesterday in U.S. District Court for the Central District of California.

    Less clear is Ciancia’s full motive for making war against officers of his own country. Clues, however, are beginning to emerge.

    TSA officers flatly needed to die, according to a handwritten letter allegedly signed by Ciancia and cited in the FBI affidavit.

    The deaths at LAX would “instill fear” in the “traitorous minds” of TSA officers who survived, according to the letter cited by the FBI.

    TSA is an agency of the U.S. Department of Homeland Security (DHS). TSA officers guard passenger safety at LAX, one of the busiest airports in the world. Like many other facilities at which TSA officers protect passengers within the U.S. network of transportation and commerce, LAX is one of America’s great symbols of freedom.

    DHS was formed after the 9/11 terrorists hijacked four airliners and made prisoners of passengers engaged in the the simple act of pursuing their freedom. Three of the planes were used as weapons of mass destruction and deliberately flown into the World Trade Centers in New York and the Pentagon in Washington. The fourth plane, intended to become another weapon of mass destruction in Washington, crashed in Pennsylvania after passengers began to understand what was happening and tried to overpower their murderous al-Qaeda hijackers.

    Nearly 3,000 people were killed in the four-pronged attack, the final minutes of their lives spent in unimaginable terror.

    Similar feelings about dying in a horrifying way were experienced by passengers and workers at LAX Friday: Ciancia, an American from New Jersey living in Los Angeles, allegedly was inside the airport with a weapon that resembled a machine gun. After hearing police bark commands to get down, passengers and workers fearing for their lives hit the floor and scrambled for cover. Some people cloistered themselves in restrooms and restaurants, torturing themselves with thoughts they’d made the wrong bet in the fog of sudden war and had corralled themselves as cattle, becoming more convenient targets for the slaughter.

    In an atmosphere of panic and perhaps fearing one or more gunmen also could be packing bombs, some people stampeded for the exits. Once outdoors, they remained fixed on the danger behind them and obliviously sprinted into traffic lanes. They could have survived the initial siege, only to have been killed by an approaching taxicab or perhaps even by a taxiing plane. Chaos breeds such tortuous fates. Events at LAX on Friday were a sort of personal 9/11 for many thousands of people, a mad dash to get out of a war zone.

    Ciancia had “five magazine clips of ammunition for his assault rifle,” the FBI said, noting that the letter specifically addressed TSA employees and painted him as a man on a mission.

    And Ciancia made what appears to be a formal declaration in the letter, in which he allegedly stated he’d made “the conscious decision to try to kill” multiple TSA employees.

    He started by firing “multiple rounds” at Hernandez, who was on duty and wearing his uniform, according to the affidavit. The officer was shot at “point blank range,” with Ciancia next moving toward an escalator.

    Upon peering back from the escalator at Hernandez and perhaps noticing movement, Ciancia “returned and shot the wounded officer again,” according to the affidavit.

    “The TSA officer was fatally wounded,” according to the affidavit.

    Ciancia then opened fire on “at least two other uniformed, on-duty TSA employees and one civilian passenger, all of whom sustained gunshot wounds,” according to the affidavit.

    A “sergeant and an officer of the Los Angeles Airport Police” shot Ciancia after pursuing him, according to the affidavit.

    As worried Americans watched CNN and other networks Friday for news about the attack, they heard Los Angeles Mayor Eric Garcetti describing Ciancia as a man with enough ammunition to “have literally killed everyone in that terminal.”

    Americans also heard Leon Saryan, who was exercising his freedom at the airport Friday, tell of his chilling encounter with Ciancia. As reported by NBC News (italics added):

    . . . a witness said the shooter, calmly walking through the terminal with his weapon, approached him with a one-word question.

    “All he said was, ‘TSA?’ Just like that,” Leon Saryan told MSNBC.

    Saryan appears to have been permitted to survive for one reason and one reason only. He was not “TSA.”

    In Ciancia’s mind, this apparently meant that Saryan was not the enemy, meaning he was not the U.S. government or one of its employees. The young man apparently also had decided that he needed to kill federal officers in response to a perceived encroachment by the “New World Order.”

    Ciancia also referenced “fiat currency,” according to an AP report.

    The Southern Poverty Law Center, quoting a source, reported that Ciancia “also expressed antagonism toward the Department of Homeland Security (DHS) and its chief until she resigned in August, Janet Napolitano, the source said. Ciancia’s note called former Secretary Napolitano a ‘bull dyke’ and contained the phrase ‘FU Janet Napolitano,’ the source said.”

    The shootings occurred in Terminal 3. In mid-October, explosive devices made of dry ice were found in and around the area of Terminal 2 at LAX. Dicarlo Bennett and Miguel Angel Iniguez were arrested in that incident, which possibly was an excruciatingly mindless prank carried out by two contract workers who never got the memo that things that explode are incompatible with airport safety and the safety of millions of souls who exercise their travel freedom in the skies and at ticket counters and boarding and arrival gates on the ground.

    An actual attack allegedly carried out by Ciancia at the airport occurred just 19 days after the dry-ice incident.

    The Unwanted Footnotes Of Rogues

    In allegedly gunning down Gerardo Hernandez and wounding others, Ciancia joined Martin J. Durkin as the author of a terrible, tragic and unwanted footnote. Durkin was the car thief who shot the FBI’s Shanahan, making him the first FBI agent killed in the line of duty. Special Agent Shanhan was 27 when a Durkin bullet entered his chest and killed him.

    Although Shanahan returned fire, his death was “almost instantaneous,” the FBI said.

    Of course, what happened to Hernandez also reminded Americans of what happened to John Lennon in 1980 at the hands of Mark David Chapman, the author of Lennon’s terrible footnote: first former Beatle to die. Lennon was shot while exercising his freedom to walk in peace at his apartment building in New York City.

    And since it’s November and edging closer to the 50th anniversary (Nov. 22) of one of the greatest crimes in U.S. history, it’s hard not to recall yet-another author of an awful footnote that will live for the ages: Lee Harvey Oswald, the accused assassin of President John F. Kennedy, the first Catholic President to be elected and the first Catholic President to be assassinated. President Kennedy was killed while exercising his freedom to ride in an open convertible in Dallas. (Watch, listen, learn, remember).

    Martin Luther King Jr. left this world in 1968. The author of his terrible footnote — an assassinated winner of the Nobel Peace Prize — was James Earl Ray. King was exercising his freedom to stand on a hotel balcony in Memphis, Tenn.

    Another Senseless Death In America

    TSA officers wear uniforms and badges while conducting passenger screenings, but do not carry arms and have no power of arrest. The phrase “sitting ducks” to describe the typical TSA officer was used during television coverage of the LAX events Friday, leading to questions such as this: If the officers are sitting ducks, what are the passengers? Friday’s shooting death of Hernandez in his workplace — a workplace at which the public congregates while exercising its freedom to fly — naturally has led to questions about whether TSA officers should receive training in firearms and carry guns as a means of protecting themselves and the public.

    The PP Blog has no early answers to these questions. Nor does it understand how a gunman with a high-powered rifle somehow breached LAX security in a fashion that apparently permitted him to hunt uniform-wearing federal officers for sport in full view of the traveling public.

    On this Sunday — after trying to distill all sorts of deeply disturbing information about the death of Officer Hernandez since the news broke Friday — the Blog has reached only one conclusion: Despite his lack of the power of arrest and an employment designation that likely makes him an nonpolice officer, Hernandez should be accorded full police honors, including casket watch, honor guard, funeral commander, pallbearers, flag team and firing party, if consistent with the wishes of his widow.

    It is particularly disturbing that TSA officers trying to prevent the next 9/11 and protect symbols of freedom that are the vulnerable equivalents of the toppled Twin Towers and the damaged and rebuilt/refortified Pentagon have become fodder for late-night comedians and targets of the insipid headline taunts of Matt Drudge.

    Janet Napolitano, now the president of the University of California and a former U.S. Attorney, two-term governor of Arizona and DHS Secretary, was called names that would peel paint while at DHS. The treatment she received from Drudge was a national disgrace that served to fuel animosity toward TSA officers.

    It is one thing to criticize public officials, agencies and employees; it is quite another to subject them to hysterical ridicule. Far too many Americans have been conditioned to believe the TSA consists of gropers and malingerers eager to carry out orders from their Orwellian controllers in Washington.

    Officer Gerardo I. Hernandez was exercising his freedom to be employed and not be harassed — let alone murdered — at his workplace. But this is no ordinary case of workplace violence. No, it is a case in which a self-appointed soldier went hunting for the officer and others like him.

    Hernandez met his awful fate Friday on a beautiful day in Los Angeles, which had served up a day not unlike the one experienced in New York on Sept. 11, 2001. He appears to have been murdered by a lone-wolf domestic terrorist who preemptively sought to paint himself a patriot and great defender of freedom.

    The most deeply disturbing thing about the alleged word choices of Ciancia — the rants against federal employees, “fiat currency,” the Federal Reserve and the “New World Order” — is the striking similarity to rants and conspiracy theories that often appear on the Ponzi boards by other self-styled defenders of freedom.

    Ciancia would have been a perfect recruit in that utterly corrupt universe, a young malcontent in search of an intellectually lazy philosophy that reimagines organized fraud as a noble way to make a living while reimagining federal agents as the bad guys who deserve to suffer.

    With Ciancia, the intellectual and emotional detachment appears to have become so complete that he licensed himself to kill federal agents, create widows and widowers and alter the psychological trajectories of children and thousands of other innocents — all while hijacking the blanket of patriotism and pretending he was a soldier for freedom.

    Rest in Peace, Officer Hernandez.

  • BULLETIN: Authorities In Canada Say Terror Plot Linked To Al-Qaeda Was Thwarted And That 2 Arrests Have Been Made

    breakingnews72BULLETIN: (UPDATED 4:08 P.M. EDT U.S.A.) The Royal Canadian Mounted Police says a terrorist plot against a VIA passenger train in the Toronto area was thwarted and that two suspects were arrested today after a probe that began last year.

    Arrested were Chiheb Esseghaier, 30, and Raed Jaser, 35. RCMP said they lived in the areas of Montreal and Toronto and that the plot had ties to Al-Qaeda.

    The investigation was dubbed “Project SMOOTH,” and the FBI played a role in the probe, RCMP said.

    “Each and every terrorist arrest the RCMP makes sends a message and illustrates our strong resolve to root out terrorist threats and keep Canadians and our allies safe,” said Assistant Commissioner James Malizia.

    The agency said the plot sparked a “National Security criminal investigation” coordinated by RCMP-led Integrated National Security Enforcement Teams (INSETs) in Montreal and Toronto.

    INSETs, RCMP said, are specialized multi-agency investigative teams comprised of employees of the RCMP, Canadian Security Intelligence Service (CSIS), Canada Border Service Agency (CBSA), and other law enforcement and national security partners at the federal, provincial, municipal levels who investigate all national security criminal threats.

  • SOBERING: Cyber Criminals May Be Responsible For ‘The Greatest Transfer Of Wealth In History,’ Top Justice Department Official Says At Seattle Conference

    “The Intelligence Community’s most recent Worldwide Threat Assessment confirms that U.S. networks have already been subject to ‘extensive illicit intrusions.’ The head of the National Security Agency and the Pentagon’s Cyber Command, for one, believes such intrusions may have resulted in ‘the greatest transfer of wealth in history.’”Lisa Monaco, Assistant Attorney General for National Security, Oct. 25, 2012

    EDITOR’S NOTE: These are remarks prepared for delivery by Lisa Monaco, Assistant Attorney General for National Security, at the “2012 Cybercrime Conference” today in Seattle. Monaco presides over the Justice Department’s National Security Division.

    The conference was hosted by U.S. Attorney Jenny A. Durkan of the Western District of Washington. Durkan’s name may be familiar to longtime PP Blog readers because her office is involved in the prosecution of AdSurfDaily story figure Kenneth Wayne Leaming, a purported “sovereign citizen” charged with filing false liens against five public officials who had roles in the ASD Ponzi prosecution. ASD was a Florida-based online scam that created thousands of victims. Leaming also is accused of uttering a bogus “bonded promissory note” for $1 million and passing it at U.S. Bank, harboring fugitives implicated in a separate fraud scheme and being a felon in possession of firearms.

    ** ______________________________________________ **

    Good afternoon.   Thank you for having me here today.   I am grateful to the U.S. Attorney’s Office for the Western District of Washington and to U.S. Attorney Jenny A. Durkan, for organizing a conference on this important topic.   Thank you all for taking the time out of your schedules to discuss these issues.   Events like these are critical to helping us succeed in combating cyber threats.

    The Threat

    If there is one thing we all know from the presentations today and our work in the field, it is the seriousness of the cyber threat.   The President has called it “one of the most serious economic and national security challenges we face as a nation.”   It’s hard to quibble with that.   Hardly a day goes by when cyber events don’t show up in the news.   As many of you know, over the last several weeks, financial institutions in the United States have been hit by a series of Distributed Denial of Service (or DDOS) attacks.   Such attacks are relatively easy to carry out, but they can cause serious harm by disrupting companies’ website services and preventing customer access.   Although these disruptions have been temporary, their frequency and persistence underscores recent Intelligence Community warnings about the “breadth and sophistication of computer network operations . . . by both state and nonstate actors.”   The cyber alarm bell has been rung.   The Intelligence Community’s most recent Worldwide Threat Assessment confirms that U.S. networks have already been subject to “extensive illicit intrusions.”   The head of the National Security Agency and the Pentagon’s Cyber Command, for one, believes such intrusions may have resulted in “the greatest transfer of wealth in history.”

    We often think of national security threats, like that of a catastrophic terrorist attack, as questions about prevention.   But the cyber threat is not simply looming – it is here.   It is present and growing.   Although we have not yet experienced a devastating cyber attack along the lines of the “cyber Pearl Harbor” that Defense Secretary Panetta recently mentioned – we are already facing the threat of a death by a thousand cuts.   Outside the public eye, a slow hemorrhaging is occurring; a range of cyber activities is incrementally diminishing our security and siphoning off valuable economic assets.   This present-day reality makes the threat of cyber-generated physical attacks, like those that might disrupt the power grid, appear no longer to be the stuff of science fiction.   And all of this comes against the backdrop of sobering forecasts from the highest ranks of our national security community.   FBI Director Mueller – a man not prone to overstatement – predicts that “the cyber threat will pose the number one threat to our country” in “the not too distant future.”

    Despite all we know about intrusions against U.S. businesses and government agencies, what is more sobering still is the Intelligence Community’s assessment that “many intrusions . . . are not being detected.”   Even with respect to those that are detected, identifying who is behind cyber activity can be uniquely challenging.   Technologies can obscure perpetrators’ identities, wiping away digital footprints or leaving investigative trails that are as long as the web is wide.   Cyber intrusions don’t announce themselves or their purpose at the threshold.   Depending on the circumstances, the purpose or endgame of a particular intrusion may be anyone’s guess – is it espionage?   Mere mischief?   Theft?   An act of war?

    The threats are as varied as the actors who carry them out.   A growing number of sophisticated state actors have both the desire and the capability to steal sensitive data, trade secrets, and intellectual property for military and competitive advantage.   While most of the state-sponsored intrusions we are aware of remain classified, the onslaught of network intrusions believed to be state-sponsored is widely reported in the media.   We know the Intelligence Community has noted that China and Russia are state actors of “particular concern,” and that “entities within these countries are responsible for extensive illicit intrusions into US computer networks and theft of US intellectual property.”   Indeed, “Chinese actors are,” according to a public report of our top counterintelligence officials, “the world’s most active and persistent perpetrators of economic espionage.”   And we know that Secretary of Defense Panetta has stated that “Iran has also undertaken a concerted effort to use cyberspace to its advantage.”

    In cases involving state actors and others, trusted insiders pose particular risks.   Those inside U.S. corporations and agencies may exploit their access to funnel information to foreign nation states.   In these cases, perimeter defense isn’t worth much; the enemy is already inside the gates.   The Justice Department has prosecuted a number of corporate insiders and others who obtained trade secrets or technical data from major U.S. companies and routed them to other nations via cyberspace.

    Earlier this year, in the first indictment of foreign state-owned entities for economic espionage, several companies controlled by the government of China were charged in San Francisco for their alleged roles in stealing a proprietary chemical compound developed by a U.S. company for China’s benefit.   While this particular theft was not cyber-enabled, cyberspace makes economic espionage that much easier.   In an Internet age, it is no longer necessary to sneak goods out of the country in a suitcase; a single click of a mouse can transmit volumes of data overseas.   Indeed, the Department has secured convictions of individuals who stole corporate trade secrets by simply e-mailing them overseas.   In one recent case, a chemist downloaded a breakthrough chemical process just developed by his company in the United States and e-mailed it to a university in China where he had secretly accepted a new job.

    The other major national security threat in cyberspace is cyber-enabled terrorism.   Although we have not yet encountered terrorist organizations using the Internet to launch a full-scale cyber attack against the United States, we believe it is a question of when, not if, they will attempt to do so.   Individuals affiliated with or sympathetic to terrorist organizations are seeking such capabilities. We have already seen terrorists exhorting their followers to engage in cyber attacks on America.   Just this year, an al-Qaeda video released publicly by the Senate Homeland Security Committee encouraged al-Qaeda followers to engage in “electronic jihad” by carrying out cyber attacks against the West.

    Terrorists have already begun using cyberspace to facilitate bomb plots and other operations.   These activities go beyond the use of cyberspace to spread propaganda and recruit followers.   For example, the individuals who planned the attempted Times Square bombing in May 2010 used public web cameras for reconnaissance, file sharing sites to share operational details, and remote conferencing software to communicate.   Najibullah Zazi attempted to carry out suicide bomb attacks against the New York subways around the anniversary of 9/11 three years ago.   After returning to the United States from terrorist travel, he used the Internet to access the bomb-making instructions he had received in Pakistan and tried to communicate via the Internet in code with his al-Qaeda handlers in Pakistan just prior to the planned attack.   Khalid Aldawsari, who was convicted in June of this year in the Northern District of Texas, used the Internet extensively to research U.S. targets and to purchase chemicals and other bomb-making materials.

    Evolving To Meet the Threat — Learning from the Counterterrorism Model

    The threats we face in cyberspace are changing, and we must change with them.   Of course, we have faced similar challenges before.   After the devastating attacks eleven years ago, we learned some hard lessons.   We have since put those lessons into practice:   working across agencies to share information, and bringing down legal, structural, and cultural barriers.   Law enforcement’s approach to terrorism has become intelligence-led and threat-driven.   We have erected new structures, including the National Security Division, which I am privileged to lead.   As the first new litigating division at the Justice Department in nearly fifty years, the National Security Division was created to bring together intelligence lawyers and operators on the one hand, and prosecutors and law enforcement agents on the other, to focus all talent on the threats before us.

    Since September 11, we have made great progress against terrorism by developing effective partnerships that help us identify threats and choose the best tools available to disrupt them.   Much of our success is attributable to the all-hands-on-deck approach we have adopted for countering terrorism.   From where I sit, I can see this change reflected in our day-to-day operations.   In our investigations, for instance, we actively seek to preserve the ability to prosecute even while using intelligence tools and vice versa.   We must bring the same approach, a whole-of-government approach, an all-tools approach, to combat cyber threats to our national security.   Investigations and prosecutions will be critical tools for deterrence and disruption, ones that we have a responsibility to use.   But they are not the only options available.   The diversity of cyber threats and cyber threat actors demands a diverse response.   This nation has many tools – intelligence, law enforcement, military, diplomatic, and economic – at its collective disposal as well as deep, and diverse, expertise.   The trick is in harnessing our collective resources to work effectively together.

    Those of us charged with investigating and disrupting cyber threats to national security and advising operators and agents must be creative and forward-looking in our approach.   First, we must consider – in conjunction with our partners – what cyber threats will look like in the coming years.   Only by knowing what is on the horizon can we ensure that the right tools exist to address cyber threats before they materialize.   Second, we must be vigilant to prevent the formation of what the WMD Commission after 9/11 called “legal myths” that have led to “uncertainty” in the past “about real legal prohibitions” among operators.   And, together with operators, we must consider what kinds of tools, investigations, and outreach we can launch now to lay the groundwork for future cyber efforts.   These may be relatively simple things, like standardized protocols and established points of contact to make reporting intrusions easier. Or they may take the form of institutional relationships between the government and the private sector for sharing information.

    On an operational level, both public and private sector attorneys need to be able to tell clients what options they have available to deal with cyber threats.   If cyberspace is an “information super-highway,” then lawyers are the GPS system in a client’s car:   It is our job to tell the client how to get there.   When obstacles get in the way, we should tell the client how to avoid them.   We must look ahead, anticipate jams, and route clients around them.

    This metaphor is particularly applicable in the cyber realm.   As cyber events unfold in real time, we learn more about our adversary, the means available to him or her, and the vulnerabilities in our own systems.   Our advice must adapt accordingly.   For those of us in government who act as operational lawyers, it is important in this environment to be clear about where the legal debate stops and the policy debate begins.   For those of you in the private sector, I imagine one concern is that your clients not be left vulnerable in a shifting legal landscape.   And for those of you in academia, we need your help testing boundaries and pushing forward with questions that need to be asked and answered by all of us as we navigate this legal space together.

    One of the significant operational challenges we face is the same one the Intelligence Community confronted in reorganizing itself after the attacks of September 11.   The cyber threat demands ready and fluid means of sharing information and coordinating our actions.   At the National Security Division, we have made this evolution, and combating this threat, a top priority.   Working with our partners – including the FBI, the U.S. Attorney community, and the Computer Crime and Intellectual Property Section (one of their leaders, Richard Downing is here today) – we are ensuring that all resources are brought to bear against national security cyber threats.

    To help accomplish these goals, the National Security Division established earlier this year a National Security Cyber Specialists’ Network to serve as a one-stop shop in the Justice Department for national security-related cyber matters.   The network brings together experts from across the National Security Division and the Criminal Division and serves as a centralized resource for the private sector, prosecutors, and agents around the country when they learn of national security-related computer intrusions.   Each U.S. Attorney’s office around the country has designated a point of contact for the network.   These skilled Assistant U.S. Attorneys will act as force multipliers, broadening the network’s reach and ensuring a link back to their counterparts at headquarters.   Drawing upon the Joint Terrorism Task Force model, which has been successful in the terrorism realm, the network seeks to improve the flow of national security cyber information to offices throughout the country.   This means more information, earlier on, in national security cyber incidents.   Thanks to the contribution of other parts of the Department, especially CCIPS, the FBI, and the U.S. Attorney’s offices, the network has helped us to focus nationwide on bringing more national security cyber investigations.   Through this nationwide network, we are consolidating and deepening the Department’s expertise, institutionalizing information sharing, ensuring coordination, and pursuing investigations.

    We have also trained our attention on the diverse cyber capabilities that reside throughout the government.   The U.S. Secret Service, the Department of Commerce, and the Department of Defense, not to mention the FBI, are all common partners in this fight, each using their distinct tools to achieve a common goal.   We have enhanced our joint work with the FBI’s National Cyber Investigative Joint Task Force, where we now have a dedicated National Security Division liaison.

    Within DOJ, we are putting more prosecutors against the threat and focusing on how to best equip and educate our cyber cadre.   Through the National Security Cyber Specialists’ Network, we are training prosecutors around the country.   Next month, more than 100 prosecutors will gather in Washington, D.C. to share expertise on everything from digital evidence to the Foreign Intelligence Surveillance Act.   No matter who the perpetrator is, being an effective adviser today requires an understanding of the technologies at hand.   Perhaps we should all take a page from Estonia—where I understand they’re beginning a system of teaching first graders how to program!   As courts confront these technologies, we also have a role in helping them grapple with what these changes mean for the development of the law and interpretations of existing legal authorities.

    Partnership with the Private Sector

    Of course, the need for collaboration does not end there.   While interaction with the private sector is something that does not always come easily to the national security community, which is accustomed to operating in secrecy, it is absolutely necessary here.   The Intelligence Community has noted the considerable portion of U.S. companies that report they have been the victims of cybersecurity breaches as well as the increased volume of malware on U.S. networks.   Private companies are on the front lines.   Individual defenses, as well as broader efforts to reform – like the legislation proposed by the Administration last year – will require our joint efforts.

    To succeed in these efforts, we must develop a greater understanding of the concerns and pressures under which our private sector partners operate.   A home computer user, whose machine is used in a botnet attack might not have much incentive to remove or check for malware.   But a company targeted by such an attack has considerable incentive to do so.   When dealing with corporate victims, the government must understand the competing interests at play.   Companies may have shareholders, reputational concerns, and sometimes legal limitations.   Yet we cannot fight the current or the future threat with old mindsets on either side.   My colleague, the U.S. Attorney for the Southern District of New York, has spoken compellingly about the need for a “culture of security” and a “culture of disclosure” in industry.   For our part, we need to understand the private sector’s concerns; we need to understand that it is not just the red tape of government that industry fears.   They also fear that the disclosure of computer intrusions will bring yellow tape as well – that it will disrupt business by converting the corporate suite into a crime scene.   Reporting breaches and thefts of information is the first step toward preventing future harm.   For our part, we will work with industry.   We will share information where we can and use protective orders and other tools to protect confidential and proprietary information.

    Conclusion

    How we respond to cyber intrusions and attacks, and how we organize and equip ourselves going forward, will have lasting effects on our government and its relationship with the private sector.   Particularly in these early moments, in what will no doubt be a sustained endeavor, it is incumbent upon us to take notes – to identify impediments, legal questions, technical challenges, and address them together.   All the while we must bear in mind the great potential of these technologies and the importance of not stifling them as we find better ways to make them secure.

    We have heard the warnings about the potential for a cyber 9/11, but we are, for the moment, in a position to do something to prevent it.   The cyber threat poses the next test of the imperative that we see law enforcement and national security as joint endeavors.   Our work offers an opportunity to demonstrate the strength and adaptability of the lessons we have learned over the last eleven years in the fight against terrorism.   U.S. Attorney’s Offices – and all of you sitting in this room – are at the forefront of these issues.   I look forward to pursuing the threats we face in partnership.   Thank you for being with us today.

  • BULLETIN: Suspect Whose Aim Was To Carry Out Suicide Bombing At U.S. Capitol Building In Washington Arrested; Man Also Proposed Attacks On U.S. Military Offices, Army Generals, Restaurant And Synagogue, FBI Says

    BULLETIN: The FBI and federal prosecutors in Virginia have confirmed the arrest of Amine El Khalifi, describing him as a Moroccan national living in the United States illegally and saying he planned a suicide bombing with a vest strapped to his body today at the U.S. Capitol building in Washington.

    El Khalifi, 29, resided in Alexandria, Va., and represents “the continuing threat we face from homegrown violent extremists,” said Lisa Monaco, assistant attorney general for national security.

    “[He] allegedly believed he was working with al Qaeda and devised the plot, the targets, and the methods on his own,” said U.S. Attorney Neil MacBride of the Eastern District of Virginia.

    A “confidential human source” told the FBI more than  a year ago — in January 2011 — that  El Khalifi had met with other individuals at a residence in Arlington.

    During the meeting, U.S. officials said, “one individual produced what appeared to be an AK-47, two revolvers and ammunition. El Khalifi allegedly expressed agreement with a statement by this individual that the ‘war on terrorism’ was a ‘war on Muslims’ and said that the group needed to be ready for war.”

    By Dec. 1, 2011 — with El Khalifi under surveillance — “he was introduced by a man he knew as ‘Hussien’ to an individual named ‘Yusuf,’ who was, in reality, an undercover law enforcement officer,” prosecutors said.  “Throughout December 2011 and January 2012, El Khalifi allegedly proposed to carry out a bombing attack. His proposed targets included a building that contained U.S. military offices, as well as a synagogue, U.S. Army generals and a restaurant frequented by military officials.”

    After witnessing a staged explosion purportedly triggered through a cell phone at a West Virgina quarry last month, “El Khalifi expressed a desire for a larger explosion in his attack. He also selected Feb. 17, 2012, as the day of the operation,” prosecutors said.

    “El Khalifi dialed a cell phone number that he believed would detonate a bomb placed in the quarry,” prosecutors said.

    Over the next month, El Khalifi repeatedly traveled to the Capitol building to conduct surveillance, prosecutors said.

    He also asked for a gun that “he could use during the attack to shoot any officers who might attempt to stop him,” prosecutors said.

    El Khalifi was arrested today a short distance from the Capitol after traveling there to conduct the suicide bombing. But it was a sting in which equipment given to him had been rendered inert, prosecutors said.

    “This individual allegedly followed a twisted, radical ideology that is not representative of the Muslim community in the United States,” said James W. McJunkin, assistant director in charge of the FBI Washington Field Office.

     

  • Attorney General Visits U.S. Attorney’s Office In District Of Columbia To Commemorate 10th Anniversary Of 9/11 Attack; Justice Department Dedicates National Security Conference Room In Memory Of Barbara Olson, Terrorist Victim And Former AUSA

    EDITOR’S NOTE: The U.S. Attorney’s Office for the District of Columbia brought both the civil and criminal prosecutions in the AdSurfDaily Ponzi case. In 2008, ASD President Andy Bowdoin compared prosecutors in the office to “Satan,” saying that what happened to ASD was “30 times worse” in some ways than what happened on Sept. 11, 2001. The 9/11 attacks killed nearly 3,000 people.

    Barbara Olson, a former assistant U.S. Attorney (AUSA) in the District of Columbia office, was killed on 9/11 when American Airlines Flight 77 — the plane she was aboard — slammed into the Pentagon. Today the Justice Department dedicated a national-security conference room in the D.C. office in her memory.

    Olson was 45 at the time of her death. She was the wife of former U.S. Solicitor General Theodore Olson.

    Here are the remarks U.S. Attorney General Eric Holder delivered today in the office of U.S. Attorney Ronald C. Machen Jr. in the District of Columbia. Holder once was U.S. Attorney for the District of Columbia.

    Attorney General Eric Holder

    Thank you, Ron [Machen], for your kind words, and for your outstanding leadership of an office that is very special to me – and an essential part of our nation’s Department of Justice.

    As Ron just mentioned – and as many of you remember firsthand – I once had the privilege of leading this office. I understand the unique jurisdiction, and the vital national security prosecutions, that place you at the center of the Justice Department’s efforts to protect the safety of the American people. In a very real sense, you serve on the front lines of this fight. You’re helping to advance our most critical priorities. And you’re doing extraordinary work.

    Let me assure you – Ron never misses an opportunity to brag about his team, and to tell me just how much you’re accomplishing. Especially as we commemorate the tenth anniversary of the most devastating terrorist attacks ever carried out against the United States, it’s clear that this work – your work – has never been more important, or more urgent.

    That is one of the lessons of September 11th, 2001 – a day that transformed our entire nation and touched each of our lives. And I know that many of you experienced the human cost of 9/11 in a deeply personal – and painful – way.

    The nearly 3,000 innocent victims of 9/11 included a remarkable, and cherished, alumna of this office. Some of us had the chance to work with Barbara Olson – to learn from her example, and to count her as a friend. She reached many others with her professional commentary, her bestselling books, and the enduring impact of her contributions.

    Barbara was a wonderful woman – a dedicated public servant, a brilliant attorney, and a loving wife. As an AUSA in this office, and throughout her career, Barbara proved that her convictions ran deep, and that her fidelity – to the values she held dear, the principles she fought to defend, and the countless people whose lives she touched – was unshakeable.

    On the morning of September 11th, 2001, Barbara boarded American Airlines Flight 77 – which soon was hijacked by five al-Qaeda terrorists, and plunged into the western side of the Pentagon.

    Like so many others on that fateful day – in Arlington, Virginia; in my hometown of New York; and in a field outside of Shanksville, Pennsylvania – Barbara’s life was cut tragically short.  But – one decade later – as we gather to reflect on the events of 9/11, and to remember those who were taken from us so suddenly, I believe that – thanks to the heroic efforts of so many law enforcement officers and military service members; the vigilance of dedicated public servants like you; and the extraordinary resilience that the American people – today, our nation is not only safer, but stronger, than ever before.

    Despite the best efforts of our enemies, our resolve has never wavered or weakened. Our commitment to doing not just what is necessary, but what is right – to protect the safety and the civil liberties of those we serve – remains certain. And, over the last 10 years, we have proven this nation’s ability to respond to terror threats, but never – never – to submit to them.

    That’s why, at its core, the anniversary we observe every September 11th is about far more than the buildings that our enemies brought down, or the damage that they inflicted on our fellow citizens. It’s about honoring the heroism we witnessed. It’s about offering our strongest support to law enforcement officers, military service members, and the families of every victim. And it’s about renewing our commitment to upholding the uniquely American values that have always defined and strengthened this great nation.

    In this spirit – and in honor of our fallen colleague – I am proud to join you in dedicating a national security conference room to Barbara’s memory, here in the critical office where she once served.

    As we carry on her work – and build on the record of achievement that each of you has helped to establish – let us draw inspiration from all those who have dedicated their lives to the service of others, and whose memories remind us of the quiet power of compassion, patriotism, and selflessness that shone through the smoke and the wreckage of 9/11.

    These values have always given our nation strength – even in our darkest moments. Let us continue to honor them. And let us continue our work to ensure that – in our own time and in the work of future generations – the lessons of September 11th, and the rich legacies of those we lost, will never be forgotten.

    Thank you.