DHS warns of rise in attacks by violent extremists amidst COVID-19 pandemic

Coronavirus COVID-19The Department of Homeland Security has warned law enforcement departments across the United States that violent extremists are mobilizing against health restrictions imposed to combat the novel coronavirus. This is the third warning known to have been issued by the DHS in the past month about the potential of violence by domestic violent extremists, as America continues to battle the pandemic.

The latest warning was issued on Thursday, April 23, in the form of a memorandum, which was communicated to law enforcement personnel throughout the US. The memorandum was marked ‘unclassified/law enforcement sensitive’ and was accessed by Politico, which reported on it on Thursday. It comes as a self-styled ‘Liberate’ movement is forming in several American states, which aims to pressure government officials to end lockdowns across the country.

The memorandum states that “recent incidents and arrests nationwide illustrate how the COVID-19 pandemic is driving violent actors —both non-ideologically and ideologically motivated— to threaten violence”. It goes on to cite arrests of violent extremists who have issued threats against elected and appointed government officials. There have also been threats made against government facilities, including police stations and federal buildings, by people protesting the lockdowns.

A man, described in the DHS report as an “anti-government extremist”, was arrested earlier this month after he threatened to kill the governor of New Mexico, Michelle Grisham, over her decision to impose ‘stay at home’ orders. Another man was arrested in Florida after he threatened to take action against the COVID-19 lockdown by blowing up the headquarters of the Orlando Police Department. Last month, the Federal Bureau of Investigation uncovered a plot by a white supremacist and anti-government radical to blow up a medical facility in the Kansas City, Missouri, area. On March 23, the DHS issued another report stating that American white supremacists were exploring ways to weaponize the coronavirus as early as January.

The latest DHS memorandum warns that the danger posed by domestic violent extremists will continue to escalate “until the virus is contained and the normal routine of US societal life resumes”.

Author: Ian Allen | Date: 24 April 2020 | Permalink

US Department of Homeland Security operations center relocates due to COVID-19

DHSThe National Operations Center of the United States Department of Homeland Security (DHS) is relocating to an emergency facility after a member of its staff tested positive for COVID-19, the illness caused by the novel coronavirus. The information was revealed on Monday by Yahoo News, which said it obtained the information in an internal DHS document.

The DHS National Operations Center facility is housed in the west campus of St. Elizabeths Hospital, a National Historic Landmark built in 1855, which is currently being redeveloped as the new headquarters of the DHS. It operates as the DHS’ main coordination hub for managing and sharing local- and national-level information relating to terrorist threats and other emergency incidents.

For a number of days now, the DHS has placed restrictions on access to the National Operations Center, in an attempt to limit the spread of COVID-19. However, according to Yahoo News, a member of staff who works at the National Operations Center facility has now been diagnosed with having the virus. The news website said it found the information in “an internal DHS document” that it obtained, which is dated March 30. The document is entitled “COVID-19 Placemat” and contains a daily amalgamation of data points relating to if and how various US government agencies have been affected by the pandemic.

Yahoo News said a DHS official confirmed that the National Operations Center would be relocating “to an alternate facility […] as a precaution”. In the meantime the St. Elizabeths Hospital facility would be cleaned and sanitized, said the official, and added that the relocation would “not impact operations”. The “COVID-19 Placemat” did not identify the emergency facility that the National Operations Center personnel will be relocating to, said Yahoo News. But the news website noted that all US government agencies have remote facilities for use in a national emergency, “ranging from nuclear attack to pandemic”.

Author: Joseph Fitsanakis | Date: 31 March 2020 | Permalink

American white supremacists wanted to weaponize COVID-19 in early February

Coronavirus COVID-19In early February, when most Western governments were just beginning to wake up to the COVID-19 threat, some American white supremacists were already exploring ways to weaponize the new virus. This is disclosed in an intelligence report authored by analysts in the United States Department of Homeland Security’s Federal Protective Service (FPS). The FPS is a law enforcement agency whose mission includes the physical protection of buildings and facilities used by the federal government.

The revelation is included in the FPS Weekly Intelligence Brief, which covers the week of February 17-24. Federal investigators found the information while monitoring online exchanges between what the FPS analysts describe as White Racially Motivated Violent Extremists. These exchanges took place on Telegram, an encrypted social networking application that has become popular with white supremacist groups due to its strong encryption standards.

According to the FPS, white supremacists discussed methods of using COVID-19 as a weapon to target members of local and federal law enforcement, as well as “nonwhite” individuals. Methods of attack reportedly included “saliva” or “spray bottles” containing bodily fluids of COVID-19 patients. Some members of the Telegram forum suggested smearing “saliva on door handles” at FBI field offices or smearing other bodily fluids on elevator buttons of apartment buildings located in “nonwhite neighborhoods”. Some white supremacists suggested that, should one of them contract the virus, they had an “obligation” to pass it on to members of law enforcement or non-whites.

Author: Ian Allen | Date: 23 March 2020 | Permalink

Far-right terrorism a transnational threat backed by state actors, says US official

Slavic UnionThreats posed by white supremacist and other far-right groups are now global in nature and are increasingly backed by state actors, according to a Congressional testimony by an American former counterterrorism official. The testimony was delivered by Joshua Geltzer, former senior director for counterterrorism at the United States National Security Council. Geltzer, who now directs the Institute for Constitutional Advocacy and Protection at Georgetown University in Washington, DC, testified on Friday before two subcommittees of the US House of Representatives. The Subcommittee on National Security and the Subcommittee on Civil Rights and Civil Liberties held a joint hearing entitled “Confronting Violent White Supremacy”.

Geltzer said in his testimony [.pdf] that the type of violence perpetrated by white supremacist groups in America cannot any more be characterized as “domestic”, because it is quickly becoming transnational in character. White supremacist violence in America is part of a “global surge” that is “increasingly interlinked and internationalized”. In fact, the attackers themselves internationalize their role in this global movement by referencing white supremacist violence in other parts of the world to justify the use of violence in the US, said Geltzer. He added that the emerging center of this global surge of white supremacist violence appears to be located in Ukraine and Russia. It is there that funds provided by the Russian government are being used to train and educate white supremacist leaders in guerrilla warfare, social media propaganda and various forms of ideological training.

It is therefore imperative, said Geltzer, that the US Intelligence Community begins to examine white supremacist violence within this new transnational context. For instance, it would be helpful if the mission of the National Counterterrorism Center (NCTC) of the Office of the Director of National Intelligence was changed to include a concentration in so-called “domestic terrorism”, including white supremacist violence, he argued.

Also on Friday, the US Department of Homeland Security (DHS) unveiled its new strategy report. The report views “domestic terrorism and mass attacks” as a growing threat to the United States that is equal in magnitude to the threat posed by Islamist terrorists. The report identifies what it describes as “a disturbing rise in attacks motivated by domestic terrorist ideologies”. One of the most powerful drivers of this new wave of domestic violence is “white supremacy”, according to the DHS.

Author: Ian Allen | Date: 23 September 2019 | Permalink

Analysis: Are US border security officials ignoring terrorism threat from Canada?

Canada borderSince the election of President Donald Trump, the issue of border security between the United States and Mexico has been a major topic of national debate. But is the incessant focus on America’s southern border by the news media and politicians ignoring security concerns emanating from the country’s northern neighbor, Canada? In a thought-provoking editorial in the English-language Emirati newspaper The National, Stephen Starr employs statistics to argue that the flow of extremism from Canada into the US may represent a greater security concern for Washington than immigration flows from Mexico.

According to US government sources, six foreigners whose names featured on the Terrorist Screening Database (TSDB) —the central terrorist watchlist maintained by the Federal Bureau of Investigation’s Terrorist Screening Center— attempted to enter the US from Mexico in the first half of 2018. Starr points out that during that same period no fewer than 41 foreigners who were on the TSDB tried to enter the US from Canada. In the past three and a half years, four Canadian residents have been charged with carrying out or conspiring to carry out terrorist attacks on US soil. They include a Palestinian living in Toronto and a Tunisian living in Montreal, who planned to derail a passenger train making the journey from Ontario to New York. Both were jailed for life. Another resident of Canada, Abdulrahman el-Bahnasawy, was sentenced to 40 years in prison for trying to plant bombs in New York’s Times Square and on a New York subway train. El-Bahnasawy, who was 20 when he was sentenced, was directly guided by Islamic State handlers in the Philippines and Pakistan. Starr notes that nearly 200 Canadian citizens and residents are thought to have traveled abroad to fight for the Islamic State, and that around 60 of those are now back in Canada.

While all this is happening, the US Customs and Border Protection (CBP) agency, America’s main border control organization, which operates under the Department of Homeland Security, appears to be ignoring the country’s northern border. It is worth noting that the 5,525 mile-long border is the longest in the world, but is monitored by no more than about 2,000 CBP agents. In contrast, over 16,000 CBP agents keep tabs on America’s border with Mexico. Responding to political pressure from the White House, the CBP keeps stationing more agents to the southern border. In the meantime, requests by CBP supervisors along the Canadian border to increase their force by 200 agents remain unfulfilled. This is despite the fact that the number of people detained while trying to enter the US illegally from the Canadian province of Quebec has nearly trebled since 2015, notes Starr.

Author: Ian Allen | Date: 22 July 2019 | Permalink

US Homeland Security Department accused of disbanding homegrown terrorism unit

Department of Homeland Security DHSSome employees of the United States Department of Homeland Security claim that a unit specializing on homegrown and domestic terrorism was inexplicably disbanded, leaving America vulnerable to attack. The allegations were published on Tuesday on the website of The Daily Beast, an investigative news and opinion website. In a leading article published on the site, reporter Betsy Woodruff cites “current and former DHS officials” with knowledge about the Office of Intelligence and Analysis (I&A), which is the intelligence wing of the DHS.

Woodruff claims that, until recently, I&A employoed a team of analysts that worked on potential threats from domestic terrorism activity and homegrown violent extremist individuals or groups. They then shared their reports with law enforcement on the state and local level, which is DHS’s mission. But in August of 2017, when David Glawe assumed the post of Under Secretary of Homeland Security for Intelligence and Analysis, I&A experienced a major reorganization. The article alleges that Glawe —who was appointed by President Donald Trump— did away with the I&A unit that monitors domestic militancy, including far-right radicalization. Ever since that move, I&A have “significantly reduced their production [of analysis] on homegrown violent extremism and domestic terrorism”, according to a DHS official quoted in The Daily Beast piece. The I&A’s reduction in output has “generated significant concern at headquarters given the growth in right-wing extremism and domestic terrorism we are seeing in the US and abroad”, said another DHS official.

But in a written response to the website’s allegations, Glawe dismissed the claims as “patently false and the exact opposite of what we have done”. He went on to state that I&A has “significantly increased tactical intelligence reporting on domestic terrorists and homegrown violent extremists since 2016”. Referring to The Daily Beast’s claims, Glawe said that “those pushing such a narrative either do not understand intelligence collection efforts or don’t care about the truth”.

Author: Ian Allen | Date: 04 April 2019 | Permalink

US government publicly admits existence of rogue phone-tapping devices in DC

Embassy RowThe United States government has for the first time admitted publicly that it has detected devices known to be used by foreign intelligence services to spy on cellular communications in the nation’s capital. Known commonly as Stingrays, after a leading hardware brand, these devices are primarily used by government agencies, including law enforcement. But they can be purchased by anyone with anywhere from $1,000 to $200,000 to spare. They work by simulating the activity of legitimate cell towers and tricking cell phones into communicating with them. That allows the users of these cellphone-site simulators to monitor the physical whereabouts of targeted cell phones. Some of the more expensive Stingray models can intercept the actual content of telephone conversations and can even plant Trojans on the compromised phones of unsuspecting users.

Many governments have expressed concerns about the use of these devices, which are known to be used by intelligence agencies to monitor cellular communications on foreign soil. Major cities around the world, including Washington, are major targets of cellphone-site simulators, which are frequently located inside foreign embassies. However, the US government has never publicly commented on this issue, despite intense rumors that government agencies headquartered in Washington are major targets of Stingray devices. This changed recently, however, after Senator Ron Wyden (D-OR) wrote a letter to the Department of Homeland Security seeking information about the use of such devices in Washington. Wyden received a written response from Christopher Krebs, who heads the DHS’ National Protection and Programs Directorate. In the letter, dated March 26, Krebs confirmed that the DHS detected a number of active Stingrays in the DC area in 2017, which he referred to as “anomalous activity consistent with Stingrays”. But he added that the DHS lacks both funding and equipment needed to detect the full number of the devices and the full spectrum of Stingrays that are active in the nation’s capital.

The Associated Press, which published Krebs’ letter, said it acquired it from Wyden’s office in the US Senate. The news agency noted that the letter from DHS did not provide the technical specifications of the cellphone-site simulators, and did not enter into speculation about who might be employing them. Additionally the letter did not provide the exact number of Stingrays detected in DC in 2017, nor did it provide the exact locations in DC where Stingray activity was traced. In response to Krebs’ letter, Senator Wyden’s office released a statement blaming the US Federal Communications Commission for having failed to hold the cellular telecommunications industry accountable for the lack of security against Stingrays. “Leaving security to the phone companies has proven to be disastrous”, Senator Wyden’s statement concluded.

Author: Joseph Fitsanakis | Date: 4 April 2018 | Permalink

Israel reportedly behind discovery of Russian antivirus company’s spy links

Computer hackingIsraeli spy services were reportedly behind the United States government’s recent decision to purge Kaspersky Lab antivirus software from its computers, citing possible collusion with Russian intelligence. Last month, the US Department of Homeland Security issued a directive ordering that all government computers should be free of software products designed by Kaspersky Lab. Formed in the late 1990s by Russian cybersecurity expert Eugene Kaspersky, the multinational antivirus software provider operates out of Moscow but is technically based in the United Kingdom. Its antivirus and cybersecurity products are installed on tens of millions of computers around the world, including computers belonging to government agencies in the US and elsewhere. But last month’s memorandum by the US government’s domestic security arm alarmed the cybersecurity community by alleging direct operational links between the antivirus company and the Kremlin.

On Tuesday, The New York Times reported that the initial piece of intelligence that alerted the US government to the alleged links between Kaspersky Lab and Moscow was provided by Israel. The American paper said that Israeli cyber spies managed to hack into Kaspersky’s systems and confirm the heavy presence of Russian government operatives there. The Times’ report stated that the Israelis documented real-time cyber espionage operations by the Russians, which targeted the government computer systems of foreign governments, including the United States’. The Israeli spies then reportedly approached their American counterparts and told them that Kaspersky Lab software was being used by Russian intelligence services as a backdoor to millions of computers worldwide. The Israelis also concluded that Kaspersky’s antivirus software was used to illegally steal files from these computers, which were essentially infected by spy software operated by the Russian government.

It was following the tip by the Israelis that he Department of Homeland Security issued its memorandum saying that it was “concerned about the ties between certain Kaspersky [Lab] officials and Russian intelligence and other government agencies”. The memorandum resulted in a decision by the US government —overwhelmingly supported by Congress— to scrap all Kaspersky software from its computer systems. Kaspersky Lab has rejected allegations that it works with Russian intelligence. In a statement issued in May of this year, the company said it had “never helped, nor will help, any government in the world with its cyberespionage efforts”.

Author: Joseph Fitsanakis | Date: 11 October 2017 | Pemalink

ISIS now has the ability to issue official-looking Syrian passports

Syrian passportThe Islamic State in Iraq and Syria (ISIS) is now able to produce authentic-looking Syrian passports using machines that are typically available only to governments, according to an American intelligence report. The report was accessed by the New York-based station ABC News, which said it was issued by Homeland Security Investigations (HSI), the investigative wing of the United States Department of Homeland Security. According to ABC News, the 17-page report was issued in early December to law enforcement departments across the US. It warns that ISIS is most likely able to print government-quality travel documents using Syrian passport templates.

According HSI, the militant group was first able to access passport-issuing technology when it conquered Raqqa, the Syrian city that today serves as the capital of the so-called Islamic State. The city has a passport office with at least one passport-issuing machine, said the report. A few months later, ISIS came in possession of a second passport-issuing machine when it captured the eastern Syrian city of Deir al-Zour. The HSI report states that the city’s passport office, which contained “boxes of blank passports” and at least one passport-printing machine, came into the hands of ISIS militants undamaged. Currently, the whereabouts of the Raqqa and Deir al-Zour passport machines “remain fluid”, says the report, pointing out that both machines are believed to be portable.

The intelligence report goes on to state “with moderate confidence” that ISIS has issued authentic-looking Syrian passports to individuals, and that some of them may have traveled to Europe and the US. Further on, the report says that Syria is virtually awash with fake documents; it cites an unnamed source who says that high-quality fake Syrian passports can be purchased in the black market in Syria for less than $400, and that some government employees will backdate passport stamps in exchange for a fee. IntelNews readers will recall that two of the suicide bombers who attacked Paris in November were carrying fake Syrian passports.

Author: Joseph Fitsanakis | Date: 14 December 2015 | Permalink

News you may have missed #889

Malcolm RifkindBy IAN ALLEN | intelNews.org
►►US agency warns of domestic right-wing terror threat. A new intelligence assessment, circulated by the US Department of Homeland Security this month, focuses on the domestic terror threat from right-wing so-called “sovereign citizen” extremists and comes as the Obama administration holds a White House conference to focus efforts to fight violent extremism. Some federal and local law enforcement groups view the domestic terror threat from sovereign citizen groups as equal to —and in some cases greater than—the threat from foreign Islamic terror groups, such as ISIS, that garner more public attention.​
►►Chair of UK parliament’s spy watchdog resigns over corruption scandal. Sir Malcolm Rifkind, a British parliamentarian who chaired the Intelligence and Security Committee, has announced that he will stand down, after a video emerged showing him discussing with what he thought were representatives of a Chinese company, who asked him to help them buy influence in the British parliament. Rifkind offered to get them access to British officials in exchange for money. The people he was talking to, however, turned out to be journalists for The Daily Telegraph and Channel 4 News who recorded the conversations.
►►The case of the sleepy CIA spy. Although a federal judge ruled in favor of the CIA last week in a discrimination suit brought by an employee who claimed he was harassed out of his job because of his narcolepsy and race, the African-American man is back in court with another complaint. On December 4, “Jacob Abilt”, the pseudonym for the CIA technical operations officer who sued the CIA, filed a second, until now unreported suit, complaining that he was unjustly denied a temporary duty assignment to a war zone due to a combination of his race and narcolepsy.

Are militant groups interested in weaponizing Ebola?

Ebola suffererBy IAN ALLEN | intelNews.org
Does the Ebola epidemic present militant groups, such as the Islamic State or al-Qaeda, with the opportunity to weaponize viruses and direct them against Western targets? Earlier this month, United States Homeland Security Secretary Jeh Johnson dismissed in strong terms the possibility that Ebola would be used by Islamic State militants to attack American targets. Speaking to the Association of the United States Army, Johnson acknowledged that the Islamic State is a “very, very dangerous terrorist organization”, but added that his Department had seen “no specific credible evidence that [the Islamic State] is attempting to use any sort of disease or virus to attack” the US. A few days earlier, however, Forbes magazine had quoted Al Shimkus, Professor of National Security Affairs at the US Naval War College, as saying that the Ebola outbreak presented Islamist groups with the opportunity to use a low-tech bioterrorist weapon “to attempt to wreak strategic global infection”. Shimkus added that a group like the Islamic State wouldn’t even have to weaponize the virus’ it could “simply use human carriers to intentionally infect themselves in West Africa, then disseminate the deadly virus via the world’s air transportation system”, he said. On Wednesday, a senior Spanish official told a parliamentary committee in Madrid that the government of Spain was “taking seriously” discussions in Internet forums linked to the Islamic State about using biological weapons against the West. Francisco Martínez, who is Spain’s State Secretary for Security, told the Committee of the Interior in the Spanish Congress that online commentators connected to the Islamic State have been discussing the possibility of using Ebola as a weapon against America and its Western allies. He told Committee members that the discussions had been taking place on Internet forums as recently as mid-September. He also cited “a series of tweets” from last July, in which another Islamist group, Ansar al-Islam, with roots in Iraqi Kurdistan, proposed using “deadly chemical products from laboratories” as means of launching attacks against the West. Martínez did not provide further details on the allegations.

Are Israeli arms merchants selling weapons to Iran?

F-4 aircraftBy JOSEPH FITSANAKIS | intelNews.org
A leaked report by American and Greek investigators suggests that an intercepted shipment of military hardware intended for Iran probably originated in Israel. Greek broadsheet Kathimerini said on Sunday it had in its possession a copy of the classified report, which describes the interception of a large shipment of spare parts for military use. The parts are believed to have been intended for use by the Islamic Republic of Iran Air Force (IRIAF). The shipment allegedly contained spare parts for F-4 Phantom aircraft, which were originally built in the United States in the 1960s for use by the US Navy. The Islamic Republic still maintains a sizable fleet of F-4s, which Iran bought from the US in the 1970s, when the two countries were close allies. But a US-imposed embargo on Iran, which has been in effect since the 1979 Islamic Revolution, has prevented Tehran from easily acquiring spare parts for its aging fleet of F-4s. The Kathimerini report said that the intercepted shipment had been detected following a joint operation by the Greek Financial Crimes Squad and the US Department of Homeland Security. According to the paper, the secret operation began was underway in late 2012 and concluded in April of 2013. But the most shocking part of the report is that the illegal shipment appears to have originated from Binyamina-Giv’at Ada, a small Israeli town located 30 miles south of Haifa. Investigators said the illicit transfer had been facilitated via a Greek firm registered in the Athens district of Votanikos, called “Tassos Karras SA”, which appears to be a front company. Is it possible that Israeli arms merchants are supplying military spare parts to Iran? The Israeli government has refused comment on the case. Read more of this post

News you may have missed #689: NSA edition

Michael HaydenBy IAN ALLEN| intelNews.org |
►►Ex-NSA Director calls Stuxnet a ‘good idea’. General Michael Hayden, once head of the NSA and CIA, who was no longer in office when the Stuxnet attack on Iran occurred, but who would have been around when the computer virus was created, denies knowing who was behind it. He calls Stuxnet “a good idea”. But he also admits “this was a big idea, too. The rest of the world is looking at this and saying, ‘clearly, someone has legitimated this kind of activity as acceptable'”.
►►NSA develops secure Android phones. The US National Security Agency has developed and published details of an encrypted VoIP communications system using commercial off-the-shelf components and an Android operating system. A hundred US government employees participated in a pilot of Motorola hardware running hardened VoIP called ‘Project FISHBOWL’, NSA Information Assurance Directorate technical director Margaret Salter told the RSA Conference in San Francisco on Wednesday. “The beauty of our strategy is that we looked at all of the components, and took stuff out of the operating system we didn’t need”, said Salter. “This makes the attack surface very small”.
►►Senior US Defense official says DHS should lead cybersecurity. In the midst of an ongoing turf battle over how big a role the National Security Agency should play in securing America’s critical infrastructure, Eric Rosenbach, deputy assistant secretary of Defense for Cyber Policy in the Department of Defense, said on Wednesday that the NSA should take a backseat to the Department of Homeland Security in this regard. “Obviously, there are amazing resources at NSA, a lot of magic that goes on there”, he said. “But it’s almost certainly not the right approach for the United States of America to have a foreign intelligence focus on domestic networks, doing something that throughout history has been a domestic function”.

News you may have missed #670: Analysis edition

Michael ChertoffBy IAN ALLEN | intelNews.org |
►►Some argue US DHS should change intelligence mission. A decade after Congress created the Department of Homeland Security, the Aspen Homeland Security Group, which is co-chaired by former Homeland Security Secretary Michael Chertoff (pictured), says it is time for the agency to shift its focus from foreign threats to working with local governments and the private sector. Aspen pushes for even more intelligence outsourcing —no surprises there.
►►Not-so-covert Iran war buys West time but raises tension. “Ten out of 10. They hit the target and nobody got caught”, former US intelligence officer Robert Ayers told Reuters of the January 11 killing of Iranian nuclear scientist Mostafa Ahmadi-Roshan. “What makes these things so impressive is they gather a lot of information and do their ‘on the ground’ homework, which can take months”. Sidney Alford, a British explosives expert, says the hit was technically “professional. It worked and it worked very well”.
►►Inside Mossad’s war on Tehran. “In the five attacks on nuclear scientists, the hit squad has used a motorbike every time. The motorcyclist is ubiquitous in the capital’s traffic jams, often wearing a surgical mask for protection against the heavy pollution and able to move close to the target between the lines of stationary cars without attracting attention”.

News you may have missed #565 (United States edition)

DHS seal

DHS seal

►►Secret watch-list proposal causes US privacy groups protests. The US Department of Homeland Security (DHS) is planning to duplicate the FBI’s Terrorist Screening Database to expand an extensive database called Watchlist Service. The proposed database will include names, birthdays, photos and biometrics of targeted individuals. But the DHS has proposed to exempt the database from Privacy Act provisions, which means that a person can never know if they are on it.
►►US blacklists Syrian banks over WMD ties. The Obama administration unveiled punitive measures on Wednesday against two Syrian financial institutions for their alleged ties to nuclear proliferation in Syria and North Korea. The government-run Commercial Bank of Syria and a subsidiary, the Syrian-Lebanese Commercial Bank, are now prohibited from engaging in transactions with US individuals and from accessing any assets under US control. The US Department of the Treasury alleges that the banks have carried out transactions on behalf of the Scientific Studies and Research Center in Syria and the Tanchon Commercial Bank in North Korea, both of which the US blacklisted several years ago for supporting “WMD proliferation activities”.
►►FBI revises surveillance exam after cheating revelations. About a year ago, the US Federal Bureau of Investigation revealed that hundreds of its agents were caught having cheated on an examination about new surveillance guidelines (known as Read more of this post