Monday, October 15, 2012

PRETRIAL HEARINGS BEGIN FOR 9/11 MASTERMIND AND OTHERS

World Trade Center After 9/11.  Photo Credit:  U.S. Navy.  


FROM: U.S. DEPARTMENT OF DEFENSE
Pretrial Hearings Kick Off for 9/11 Defendants

By Donna Miles
American Forces Press Service


FORT MEADE, Md., Oct. 15, 2012 - Khalid Sheikh Mohammed, the self-proclaimed mastermind behind the 9/11 terrorist attacks, and four co-defendants charged with planning and carrying out the attacks have the right to skip court proceedings regarding their case, Army Col. James Pohl, the judge, ruled today.

Pohl's decision kicked off a week of pretrial hearings that opened today at Naval Station Guantanamo Bay, Cuba. The court is expected to address a docket of 25 administrative and legal issues ranging from what defendants can wear in court to measures to prevent classified information from being divulged during the trial.

The judge ruled that Mohammed, Walid Muhammad Salih Mubarak bin Attash, Ramzi Binalshibh, Ali Abdul Aziz Ali and Mustafa Ahmed Adam al Hawsawi can elect not to attend their court proceedings. The caveat, Pohl said, is that they must understand their right to attend and the potential disadvantages of not doing so.

Based on the ruling, the defendants would have the right to submit a waiver request each morning that court convenes, and waivers would cover only that single day. Defendants who change their minds during the day could notify the guard force and attend court if it's possible to get them to the court facility after they make their request.

Mohammed, with a red, henna-dyed beard, wore eyeglasses, white robes, a black vest and white headpiece, sat with his defense counsel in the front row of the courtroom. His co-defendants, also dressed in white, sat quietly behind him, one in each row.

All five defendants were captured in Pakistan in 2002 and 2003 and have been confined at Guantanamo Bay since 2006.

They were charged during their arraignment in May with terrorism, conspiracy, attacking civilians, attacking civilian objects, intentionally causing serious bodily injury, murder in violation of the law of war, destruction of property in violation of the law of war, hijacking or hazarding a vessel or aircraft.

Although none answered Pohl's questions during the arraignment in May, the defendants showed more signs of cooperation today. Each responded affirmatively when Pohl asked them individually to confirm that they understood his ruling. Mohammed responded, "Yes, but I don't think there's any justice in this court."

Some of the defendants asked questions to clarify the ruling, and Binalshibh raised concerns about guards who might intentionally misrepresent a defendant's intentions. Several of the accused seemed to be puzzled or even amused when Pohl asked if they understood that their trials would proceed even in the unlikely event that they were no longer in U.S. custody at the time, such as in the event of an escape.

During discussions that dominated today's session, Army Brig. Gen. Mark S. Martins, chief prosecutor in the Office of Military Commissions, argued that the defendants should be required to attend court proceedings, particularly in a capital case. Martins cited legal precedent, saying the accused have the explicit right to be present as their cases are presented, but not necessarily the right to be absent. "Apathy or disdain for the proceedings does not qualify as good cause [for absence]," he said.

James Harrington, Binalshibh's "learned counsel" who is experienced in handling death-penalty cases, disagreed. Harrington said defendants should be able to skip court as long as they acknowledge they have voluntarily waived their right to attend and understand that their cases could suffer as a result. Denying their request not to participate in the legal process could, in fact, violate their constitutional rights, he said.

James Connell, Abdul Aziz Ali's learned counsel, echoed that argument, noting that defendants who don't want to attend court can get removed by disrupting the proceedings. In this case, they are removed from the courtroom to individual holding cells, where the proceedings are piped in through closed-circuit TV. This, Connell said, amounts to a "waiver by conduct."

In other developments during today's hearing, Hawsawi requested additional legal representation through an interpreter. His counsel, Navy Cmdr. Walter Ruiz, a Navy reservist with experience in capital cases, requested Navy Cmdr. Suzanne Lachelier as a "resource counsel" to support his legal defense.

Lachelier previously represented bin al Shibh, which Pohl noted could cause a conflict of interest as the two defendants' cases move forward. Both of the accused agreed to waive any objections.

In another motion filed today, Cheryl Bormann, bin Attash's learned counsel, asked for a larger workspace and more resources for his eight-person defense team. A second work area the team had been using was plagued by rodents and mold, but has since been sanitized and declared useable by engineers and industrial health officials at the base, officials said. However, Bormann told Pohl the space is making her staff sick.

The motion hearings originally were slated to begin in August, but were postponed when Tropical Storm Isaac forced the commander to order nonessential personnel to evacuate the base. The proceedings already had been delayed a day after a coal-train derailment near Baltimore damaged fiber-optic lines that carry Internet traffic to and from Guantanamo Bay, including the defense and prosecution teams there.

Pohl said he plans to conduct additional hearings with one-week sessions beginning in December and continuing one per month through March. The tribunals are expected to begin sometime next year.

This week's proceedings are being broadcast via closed-circuit television to a media center here.

Five family members who lost loved ones in the 9/11 attacks were selected by lottery to attend the proceedings at Guantanamo Bay, as well as five support people to accompany them, officials said. Other families have been invited to watch via closed-circuit TV at Fort Meade, Fort Dix, N.J., Fort Devens, Mass., and Fort Hamilton, N.Y. However, only four family members accepted the invitation, and are watching at Fort Hamilton.

Spectators in the courtroom are sitting behind soundproof glass, and the proceedings are being rebroadcast with a 40-second delay to ensure classified information is not inadvertently revealed.

WILLIAM SHATNER AND WILL WHEATON ON MARS LANDING OF CURIIOSITY ROVER





OBAMA ADMINISTRATION WILL ALLOW SOLAR UTILITY DEVELOPMENT ON PUBLIC LANDS


Photo Credit:  U.S. Navy  
FROM: U.S. DEPARTMENT OF THE INTERIOR
Obama Administration Approves Roadmap for Utility-Scale Solar Energy Development on Public Lands

WASHINGTON, D.C.
- As part of President Obama’s all-of-the-above energy strategy to expand domestic energy production, Secretary of the Interior Ken Salazar today finalized a program for spurring development of solar energy on public lands in six western states. The Programmatic Environmental Impact Statement (PEIS) for solar energy development provides a blueprint for utility-scale solar energy permitting in Arizona, California, Colorado, Nevada, New Mexico and Utah by establishing solar energy zones with access to existing or planned transmission, incentives for development within those zones, and a process through which to consider additional zones and solar projects.

Today’s action builds on the Administration’s historic progress to facilitate renewable energy development. On Tuesday, with the authorization of the Chokecherry and Sierra Madre Wind Energy Project site in Wyoming, Interior reached the President’s goal of authorizing 10,000 megawatts of renewable power on public lands. Since 2009, Interior has authorized 33 renewable energy projects, including 18 utility-scale solar facilities, 7 wind farms and 8 geothermal plants, with associated transmission corridors and infrastructure. When built, these projects will provide enough electricity to power more than 3.5 million homes, and support 13,000 construction and operations jobs according to project developer estimates.

"Energy from sources like wind and solar have doubled since the President took office, and with today’s milestone, we are laying a sustainable foundation to keep expanding our nation’s domestic energy resources," said Secretary Salazar, who signed today’s Record of Decision at an event in Las Vegas, Nevada with Senator Harry Reid. "This historic initiative provides a roadmap for landscape-level planning that will lead to faster, smarter utility-scale solar development on public lands and reflects President Obama’s commitment to grow American made energy and create jobs."

The Solar PEIS establishes an initial set of 17 Solar Energy Zones (SEZs), totaling about 285,000 acres of public lands, that will serve as priority areas for commercial-scale solar development, with the potential for additional zones through ongoing and future regional planning processes. If fully built out, projects in the designated areas could produce as much as 23,700 megawatts of solar energy, enough to power approximately 7 million American homes. The program also keeps the door open, on a case-by-case basis, for the possibility of carefully sited solar projects outside SEZs on about 19 million acres in "variance" areas. The program also includes a framework for regional mitigation plans, and to protect key natural and cultural resources the program excludes a little under 79 million acres that would be inappropriate for solar development based on currently available information.

"The Solar PEIS sets forth an enduring, flexible blueprint for developing utility-scale solar projects in the right way, and in the right places, on our public lands," said David J. Hayes, Deputy Secretary of the Interior. "Never before has the Interior Department worked so closely and collaboratively with the industry, conservationists and sportsmen alike to develop a sound, long-term plan for generating domestic energy from our nation’s sun-drenched public lands."

The signing of the Record of Decision today follows the July release of the Final PEIS, a comprehensive analysis done in partnership with the Department of Energy that identified locations on Bureau of Land Management (BLM) lands most suitable for solar energy development. These areas are characterized by excellent solar resources, access to existing or planned transmission and relatively low conflict with biological, cultural and historic resources.

"We are proud to be a part of this initiative to cut through red tape and accelerate the development of America’s clean, renewable energy," said Secretary of Energy Steven Chu. "There is a global race to develop renewable energy technologies—and this effort will help us win this race by expanding solar energy production while reducing permitting costs."

Today’s action is in line with the President’s direction to continue to expand domestic energy production, safely and responsibly. Since President Obama took office, domestic oil and gas production has increased each year, with domestic oil production at an eight-year high, natural gas production at an all-time high, and foreign oil imports now accounting for less than 50 percent of the oil consumed in America – the lowest level since 1995.

NEWS FROM AFGHANISTAN OCTOBER 15, 2012

U.S. Gen. Allen Visits Womans Baazar In Afghanistan.  Credit:  U.S. DOD Photo. 
FROM: U.S. DEPARTMENT OF DEFENSE

Combined Force Arrests Haqqani Leader in Ghazni

Compiled from International Security Assistance Force Joint Command News Releases

WASHINGTON, Oct. 15, 2012 - A combined Afghan and coalition security force arrested a Haqqani network leader in Afghanistan's Ghazni province yesterday, military officials reported.

The detained Haqqani leader is believed to be directly associated with suicide-bombing and improvised explosive device attacks, officials said.

In other Afghanistan operations yesterday:

-- Shafiullah, a Taliban leader accused of planning and executing a May 29, 2011, attack that killed three coalition service members was killed in an operation in Ghazni province.

-- An Afghan and coalition force in Paktia province arrested several insurgents during a search for a Taliban senior leader believed to oversee IED operations throughout the province.

-- In Helmand province, a combined force arrested several insurgents and seized 33 pounds of illegal narcotics during a search for a Taliban leader who operates in close coordination with Taliban senior leaders and conducts attacks against Afghan and coalition forces.

In Oct. 13 operations:
-- Taliban leader Qurashi, also known as Baz Khan and Zubair, was killed during an operation in Kunduz province. He was directly involved in planning and executing IED attacks.

-- A patrol of Afghan security forces, partnered with U.S. Special Forces soldiers, killed several insurgents when the coalition partners were ambushed in Paktia province. No civilians or security forces were killed or injured during the engagement.

-- An Afghan and coalition security force in Logar province killed Haqqani network leader Rahmatullah, also known as Qari Moktar or Mohammad Qasim Qari, who was responsible for coordinating attacks against Afghan and coalition forces.

-- In Kandahar province, an Afghan-led security force, supported by coalition troops, arrested a Taliban leader who commanded a Taliban IED cell directly responsible for attacks on Afghan and coalition forces. The security force also detained another suspected insurgent.

-- Afghan and coalition forces killed two militants engaging in insurgent activity in Helmand province.

-- An Afghan and coalition force searching for a Taliban IED expert in Laghman province killed two insurgents and seized weapons and 13 pounds of illegal narcotics.

-- In Kunduz province, an Afghan and coalition security force searching for a Taliban leader killed several insurgents and seized weapons and grenades.

In Oct. 12 operations:
-- Afghan special operations soldiers, partnered with U.S. Special Forces, were ambushed by more than a dozen insurgents during a patrol in Paktia province. The combined force returned fire and used air support to kill the insurgents. No civilians or security forces were killed or injured during the engagement.

-- Afghan and coalition forces in Helmand province killed a Taliban leader who was believed to be responsible for directing attacks targeting Afghan and coalition forces.

-- Taliban leader Qari Nasratullah was killed during an operation in Sar-e Pul province. He is believed to have commanded more than 20 Taliban fighters. The security force also seized weapons, grenades and associated gear.

-- Afghan and coalition forces killed two armed insurgents during operations in Ghazni province.

ESA Portal - Austria - ESA hilft bei Wiederentdeckung von vermisstem Asteroiden

ESA Portal - Austria - ESA hilft bei Wiederentdeckung von vermisstem Asteroiden

La ESA instala en España el primer radar de pruebas para detectar basura espacial

La ESA instala en España el primer radar de pruebas para detectar basura espacial

U.S. DEPT. OF HHS SAYS MEDICARE OFFERS MORE HIGH QUALITY CHOICES

Photo Credit:  CDC
FROM: U.S. DEPARTMENT OF HEALTH AND HUMAN SERVICES
People With Medicare Have More High Quality Choices

Health and Human Services Secretary Kathleen Sebelius announced today that people with Medicare have more high quality choices and the performance of Medicare Advantage plans is improving. HHS also released the 2013 quality ratings for Medicare health and drug plans on the web-based Medicare Plan Finder. During Medicare Open Enrollment, people with Medicare can use the star ratings to compare the quality of health and drug plan options and select the plans that are the best value for their needs for 2013.

"In 2013, people with Medicare will have access to a wide range of plan choices, including more four and five star plans than ever before," said Secretary Sebelius.

In 2013:
People with Medicare will have access to 127 four- or five-star Medicare Advantage plans. These plans currently serve 37 percent of Medicare Advantage enrollees, and may attract more with their improved quality ratings. In 2012, people with Medicare had access to 106 four or five star plans, which served only 28 percent of enrollees.
People with Medicare will have access to 26 four or five star prescription drug plans, which currently serve 18 percent of enrollees. This is an improvement from 2012, in which 13 four or five star plans are serving only 9 percent of enrollees.

Medicare plans are given an overall rating on a 1 to 5 star scale, with 1 star representing poor performance and 5 stars representing excellent performance. Users of the Plan Finder will also see a gold star icon designating the top rated 5-star plans, and a different icon for those plans who are consistently poor performers.

As a result of provisions in the Affordable Care Act, Medicare is doing more to promote enrollment in high quality plans and alert beneficiaries who are enrolled in lower quality plans. Now, persons with Medicare enrolled in consistently low performing plans (those receiving less than 3 stars for at least the past 3 years) will receive notifications to let them know how they can change to a higher quality plan if they choose to do so. In addition, 5-star plans are rewarded by being allowed to continuously market and enroll beneficiaries throughout the year. In 2012, thousands of people with Medicare took advantage of this opportunity to join a top performing plan.

The Affordable Care Act also added new benefits to Medicare, including in the Medicare Advantage program. The health care law phases out the Medicare prescription drug coverage gap also known as the "donut hole." In 2013, people with Medicare who reach the "donut hole" will receive approximately 53 percent off the cost of brand name drugs and 21 percent off the cost of generic drugs. Medicare beneficiaries will also continue to benefit from Medicare-covered preventive services at zero cost-sharing, including a yearly Wellness visit.

At the same time that quality is improving and benefits are increasing, premiums in the Medicare Advantage program are remaining steady. Since the Affordable Care Act was passed in 2010 through 2013, Medicare Advantage premiums have fallen by 10 percent and enrollment is increasing by 28 percent. The average estimated basic Medicare prescription drug plan (PDP) premium is projected to hold steady from last year, at $30 for 2013.

CIVIL ASSET FORFEITURE REFORM ACT SET TO SAVE JUSTICE DEPARTMENT MILLIONS

Aircraft Siezed By U.S. Marshals. Credit: U.S. Marshals Service





FROM: U.S. DEPARTMENT OF JUSTICE
Asset Forfeiture Notifications: More Efficient and Cost-Effective Than Ever

October 12th, 2012

Posted by Tracy Russo

Today, the Department of Justice announced a change to the Civil Asset Forfeiture Reform Act (CAFRA), effective immediately, which will allow federal law enforcement agencies to advertise certain public forfeiture notices online, at a reduced cost, at
www.forfeiture.gov. This will save approximately $6.2 million each year in administrative costs. Those savings will remain in the Justice Department’s Assets Forfeiture Fund and be used to fight fraud, drug trafficking and violent crime.

Traditionally, law enforcement agencies have published public forfeiture notices in newspapers. Starting in 2007, the department began advertising public forfeiture notices that were part of judicial proceedings on the Internet. This saved approximately $1.5 million per year.

The department will now begin also advertising administrative forfeiture notices online as well. These are notices that do not require judicial involvement. Because of the volume of administrative forfeiture notices, the department expects savings to increase fivefold, for a combined total savings of $7.7 million per year.

Taxpayers deserve to know that we’re using their money responsibly, and by lowering administrative costs, the department can focus more resources towards protecting Americans and upholding our nation’s laws. Today’s change simplifies the notification process and increases the availability of information, ensuring that more of the ill-gotten gains from criminal activities will be available to fight crime.

The department currently offers the benefits of this online platform to other federal law enforcement agencies, including the U.S. Postal Inspection Service and the Secret Service. By expanding this program to even more agencies, including Customs and Border Protection and Immigration and Customs Enforcement, we can save additional taxpayer dollars.

This initiative is part of Attorney General Eric Holder’s SAVE Council, which was established in July 2010 to direct and oversee efforts to identify and implement best practices for saving taxpayer money, realizing efficiencies and monitoring the department’s savings progress.

FIRST HUMANOID ROBOT IN SPACE

FROM: NASA
Commander Dan Burbank works with Robonaut 2. The robot humanoid demonstrated its dexterity performing sign language. Credit-NASA TV

Robonaut 2 is one step closer to earning its keep on the International Space Station.

R2 – as the robot is called – got its first taste of real work on Wednesday. The crew and ground team had completed all its initial checkouts, and Tuesday installed heat sinks in both of the robot’s forearms to allow it to better dissipate heat and work for longer periods of time.

The first humanoid robot in space was sent to the space station with the intention of eventually taking over tasks too dangerous or mundane for astronauts, and the first such task identified for it was monitoring air velocity. Astronauts onboard the space station generally have to measure the air flow in front of vents inside the station to ensure that none of the ventilation ductwork gets clogged or blocked. The task involves holding a gauge in front of vents in five different locations on the station and taking several measurements of the air flow every 90 days or so.

It’s not exactly a job that requires a rocket scientist – or astronaut – to accomplish, but there are a few things that make it difficult. For one, the gauge has to be held very steady – a challenge for a human being bobbing up and down in microgravity. And the samples can be misleading if there’s another source of air flow in the area – such as a human being’s breath.


FORMER OWNERS OF MEDICAL SUPPLY COMPANY ARRESTED FOR MEDICARE FRAUD

Photo Credit:  U.S. DOD.
FROM: U.S. DEPARTMENT OF JUSTICE
Thursday, October 11, 2012

Former Owners of Los Angeles DME Wholesale Company Arrested and Charged with Participating in $16.6 Million Medicare Fraud Scheme

WASHINGTON – The former owners of a durable medical equipment (DME) wholesale company located in Ontario, Calif., were arrested late yesterday at Los Angeles International Airport in connection with a DME fraud scheme that resulted in the submission of over $16.6 million in false claims to Medicare and are expected to appear this afternoon in Los Angeles federal court.


The arrest was announced by Assistant Attorney General Lanny A. Breuer of the Justice Department’s Criminal Division; U.S. Attorney André Birotte Jr. of the Central District of California; Glenn R. Ferry, Special Agent-in-Charge for the Los Angeles Region of the U.S. Department of Health and Human Services Office of Inspector General (HHS-OIG); and Timothy Delaney, Special Agent in Charge of the FBI’s Los Angeles Field Office.

Rajinder Singh Paul, 69, and his wife, Baljit Kaur Paul, 65, were arrested on conspiracy and health care fraud charges at the airport as they returned from a trip abroad. According to the indictment unsealed upon their arrests, Rajinder and Baljit Paul owned and operated a DME wholesale supply company called Major’s Wholesale Medical Supply Inc., which was located in Ontario. Between 2002 and 2009, according to the indictment, when they were terminated from Major’s after selling its assets to a new owner, Rajinder and Baljit Paul sold primarily high-end power wheelchairs to DME supply companies for approximately $850 to $1,000 per wheelchair. The DME companies, many of which were allegedly fraudulent, billed these power wheelchairs to Medicare at a cost of $3,000 to $6,000 per wheelchair.

According to the indictment, in order to attract and keep the DME companies’ business and prevent Medicare from withholding money that the companies would use to pay Major’s, Rajinder and Baljit Paul provided over 170 DME companies with backdated, altered, and fabricated invoices which reflected that the companies had purchased power wheelchairs and DME from Major’s earlier than they had. Rajinder and Baljit Paul also allegedly provided the DME companies with false invoices for DME that the companies never purchased from Major’s. Rajinder Paul, Baljit Paul, or employees acting at their direction, allegedly created these false invoices using invoice numbers from old invoices or serial numbers from DME that Major’s had already sold or not yet received from its manufacturers. The DME companies then allegedly used these backdated, altered, and fabricated invoices to defraud Medicare or thwart Medicare audits.

In addition, the indictment alleges that the Pauls provided the DME companies with false inventory purchase agreements that showed the companies had credit limits with Major’s which were higher than the credit limits that Major’s actually extended to the companies. The DME companies then submitted these false inventory purchase agreements to Medicare to meet one of the Medicare regulations necessary for the companies to obtain and maintain their Medicare billing privileges, namely, that the companies had contracts with DME wholesalers and other parties to purchase the DME that they billed to Medicare.

The indictment alleges that as a result of this scheme, the Pauls and the owners and operators of certain of the companies that Rajinder and Baljit Paul provided with fraudulent invoices submitted approximately $16,662,143 in false claims to Medicare, and received approximately $9,743,609 on those claims.

Rajinder and Baljit Paul are each charged with one count of conspiracy to commit health care fraud and one count of making false statements. The conspiracy count carries a maximum potential penalty of 10 years in prison, and the false statements count carries a maximum potential penalty of five years in prison. Each count also carries a maximum $250,000 fine.

The case is being prosecuted by Trial Attorney Jonathan T. Baum of the Criminal Division’s Fraud Section. The case is being investigated by the FBI, HHS-OIG, and the California Department of Justice, and was brought as part of the Medicare Fraud Strike Force, supervised by the Criminal Division’s Fraud Section and the U.S. Attorney’s Office for the Central District of California.


The charges and allegations contained in the indictment are merely accusations, and the defendants are presumed innocent unless and until proven guilty.

Since its inception in March 2007, strike force operations in nine locations have charged more than 1,480 defendants who collectively have billed the Medicare program for more than $4.8 billion. In addition, HHS’s Centers for Medicare and Medicaid Services, working in conjunction with the HHS-OIG, are taking steps to increase accountability and decrease the presence of fraudulent providers.

ISS UPDATE: WEEKLY RECAP FOR OCT. 12, 2012

U.S. MILITARY PRESENCE IN AFRICA

Map Credit:  CIA World Factbook.
FROM: U.S. DEPARTMENT OF DEFENSE

Official: DOD Seeks 'Small Footprint' in Africa
By Jim Garamone
American Forces Press Service


WASHINGTON, Oct. 12, 2012 - For Djibouti, location is everything.

The small African nation hosts the one forward operating base the United States maintains on the African continent, and that is due to its unique location, said Amanda J. Dory, deputy assistant secretary of defense for African affairs.

Djibouti hosts about 3,000 U.S. service members at Camp Lemonier -- a former French base adjacent to the capital of Djibouti City. The U.S. service members work to build military capabilities with Djibouti and neighboring nations. The base also is a training and logistics hub.

Yet, it is not a model for how the United States will interact on the African continent, Dory said. "The DOD strategy in Africa has moved toward flexible operating concepts," she said in a recent interview. "[We will] focus on maintaining a small footprint on the continent that is flexible and low cost."

The U.S. military footprint will be different in each African nation, the deputy assistant secretary said.

"Each country will work with us to see what capabilities they need, how much they can commit to developing, and how fast they want to work," she said. "They will also work with us to determine the process of working with us."

U.S. troops, she said, will visit these nations for short periods of time for specific tasks or training cycles.

"We do not want permanent bases," Dory said.

The U.S. military effort on the continent is being accepted by many African leaders, she said. When U.S. Africa Command first stood up, there was concern among some leaders that it signified a "militarization" of U.S. foreign policy and a sort of creeping colonialism. Those fears have subsided, she said.

"Most [African] nations welcome our contributions," Dory said.

Djibouti is unique because it lies on the seam between U.S. Africa Command and U.S. Central Command, officials said, and it is situated at the southern entrance to the Red Sea. Vessels transiting through the Suez Canal to the Gulf of Aden and the Indian Ocean sail close to Djibouti, which boasts a natural harbor and roads that link the interior with the coast.

The country has interest from four U.S. combatant commands -- U.S. Africa Command, U.S. Special Operations Command, U.S. Central Command and U.S. Transportation Command, officials said. In addition, other nations work with the Djiboutian government to ensure security in the area.

Djibouti and Camp Lemonier represent a strategic gold mine, Dory said. But Camp Lemonier, she added, will remain an expeditionary base.

"It will remain an austere base. "We will make improvements for force protection, but you will not see a golf course at Camp Lemonier, ever," she said.

RECENT U.S. DEPARTMENT OF DEFENSE PHOTOS






FROM: U.S. DEPARTMENT OF DEFENSE
U.S. Army Sgt. Adam Serella bonds with his military working dog, Nero, as children look on during Operation Clean Sweep in Kandahar City in Afghanistan's Kandahar province, Oct. 3, 2012. Serella, a narcotics patrol detector dog handler, is assigned to the 3rd Infantry Division. U.S. Army photo by Spc. Tyler Meiste
 


    U.S. Navy Lt. Collin Korenek, front, provides security during a key leader engagement with district leaders in the Noorgul district center in Afghanistan's Kunar province, Oct. 1, 2012. Korenek is assigned to Provincial Reconstruction Team Kunar. U.S. Air Force photo by Tech. Sgt. Christopher Marasky
-

Weekly Address: One Million American Jobs Saved and a Stronger American Auto Industry | The White House

Weekly Address: One Million American Jobs Saved and a Stronger American Auto Industry | The White House

Sunday, October 14, 2012

THE OSPREY IN AFGHANISTAN





FROM: U.S. NAVY, V-22 OSPREY
091106-N-8132M-120 U.S. 5TH FLEET AREA OF RESPONSIBILITY (Nov. 6, 2009) An MV-22B Osprey from Marine Medium Tiltrotor Squadron 263 (Reinforced), 22nd Marine Expeditionary Unit, takes off from the amphibious assault ship USS Bataan (LHD 5). The aircraft were flown to Camp Bastion, Afghanistan, where they will be transferred to VMM-261 and used to support the 2nd Marine Expeditionary Brigade. This is the first time the aircraft will be used in Afghanistan. The 22nd MEU is serving as the theater reserve force for U.S. Central Command. (U.S. Navy photo by Mass Communication Specialist 2nd Class Kiona Miller/Released)




101217-N-5549O-295 NAWA, Afghanistan (Dec. 17, 2010) A V-22 Osprey prepares to land at forward operating base Nawa. Secretary of the Navy (SECNAV) the Honorable Ray Mabus is in the area visiting with Marines and Sailors. (U.S. Navy photo by Mass Communication Specialist 2nd Class Kevin S. O'Brien/Released)




120515-N-UH337-059 FARAH PROVINCE, Afghanistan (May 15, 2012) Rear Adm. Mark A. Handley, Commander of 1st Naval Construction Division (NCD) and his staff disembark a V-22 Osprey in the Bakwa District of Farah Province, Afghanistan, during a visit to Naval Mobile Construction Battalion (NMCB) 11. With Handley are Capt. Kathryn A. Donovan, commodore of the 22nd Naval Construction Regiment (NCR); Cmdr. Lore Aguayo, commander of NMCB-11; 1st NCD Command Master Chief John F. Mulholland; 22nd NCR Command Master Chief Mark E. Kraninger; and NMCB-11 Command Master Chief Christopher Levesque. NMCB-11 is deployed to Afghanistan to conduct general, mobility, survivability engineering operations, defensive operations, Afghan National Army partnering and detachement of units in combined and joint operations area-Afghanistan in order to enable the neutralization of the insurgency and support improved governance and stability operations. (U.S. Navy photo by Mass Communication Specialist 1st Class Jonathan Carmichael/Released)

SPACE SHUTTLE ENDEAVOUR HEADS TO CALIFORNIA SCIENCE CENTER


Shuttle Endeavour Crossing

The space shuttle Endeavour is seen atop the Over Land Transporter (OLT) after exiting the Los Angeles International Airport on its way to its new home at the California Science Center in Los Angeles, Friday, Oct. 12, 2012.

Endeavour, built as a replacement for space shuttle Challenger, completed 25 missions, spent 299 days in orbit, and orbited Earth 4,671 times while traveling 122,883,151 miles. Beginning Oct. 30, the shuttle will be on display in the CSC’s Samuel Oschin Space Shuttle Endeavour Display Pavilion, embarking on its new mission to commemorate past achievements in space and educate and inspire future generations of explorers.

Photo Credit-NASA-Bill Ingalls

U.S. MILITARY RECRUITING GOALS MET THROUGH AUGUST

MARINES TRAINING.  CREDIT:  U.S. DOD

FROM: U.S. DEPARTMENT OF DEFENSE,
All Active Services Meet Recruiting Goals Through August

American Forces Press Service

WASHINGTON, Oct. 9, 2012 - All four active services met or exceeded their numerical accession goals for fiscal 2012 through August, Defense Department officials announced today.

Here are the services' accessions for the first 11 months of the fiscal year:

-- Army: 51,333 accessions, 100 percent of its goal of 51,889;

-- Navy: 33,579 accessions, 102 percent of its goal of 33,035;

-- Marine Corps: 31,996 accessions, 100 percent of its goal of 31,681; and

-- Air Force: 26,738 accessions, 100 percent of its goal of 26,738.

All four services have exhibited strong retention for the fiscal year through August, officials said.

Meanwhile, five of the six reserve components met or exceeded their numerical accession goals for fiscal 2012 through August. Though the Army Reserve is down 567 for the year, this was intentional to rebalance the force, officials explained.

Here are the reserve component accession figures for the first 11 months of the fiscal year:

-- Army National Guard: 44,067 accessions, 104 percent of its goal of 42,503;

-- Army Reserve: 23,783 accessions, 98 percent of its goal of 24,350;

-- Navy Reserve: 7,471 accessions, 100 percent of its goal of 7,471;

-- Marine Corps Reserve: 8,606 accessions, 102 percent of its goal of 8,423;

-- Air National Guard: 8,294 accessions, 107 percent of its goal of 7,753; and

-- Air Force Reserve: 7,839 accessions, 100 percent of its goal of 7,839.

All reserve components are on target to achieve their fiscal year attrition goals, officials said.

TWO WOUNDED WARRIORS HONORED AT PURPLE HEART CEREMONY


FROM: U.S. DEPARTMENT OF DEFENSE
Navy Adm. James A. Winnefeld Jr., vice chairman of the Joint Chiefs of Staff, pins the Purple Heart medal on Army Spc. Jason Smith during a ceremony at the Warrior and Family Support Center on Fort Sam Houston in San Antonio, Oct. 12, 2012. U.S. Army photo by Robert Shields

Vice Chairman Visits Wounded Warriors in San Antonio

By Maria Gallegos
Brooke Army Medical Center Public Affairs


FORT SAM HOUSTON, Texas, Oct. 12, 2012 - The nation's second-highest ranking military officer honored two wounded warriors during a Purple Heart ceremony at the Warrior and Family Support Center here today.

Navy Adm. James A. Winnefeld Jr., vice chairman of Joint Chiefs of Staff, also visited with patients at the Center for the Intrepid and San Antonio Military Medical Center.

Army Maj. Gen. M. Ted Wong, commander of Brooke Army Medical Center and Southern Regional Medical Command, opened the Purple Heart ceremony followed by Winnefeld, who presented the Purple Heart medals and certificates.

"It is great to be back in Texas," the vice chairman said during the ceremony. "There is no place other than Texas that truly supports our airmen, soldiers, sailors, and Marines like the way they do here.

Winnefeld welcomed the Purple Heart recipients, Army Sgt. Paul T. Roberts and Army Spc. Jason Smith, with words of praise for their courage, dedication and sacrifices they made to defend the nation.

Roberts was assigned to Company D, 7th Battalion, 158th Aviation Regiment, serving as a water treatment specialist in Afghanistan when an improvised explosive device detonated, resulting in his combat injuries on Nov. 24, 2011. Smith, an infantryman, was assigned to Company B, 1st Battalion, 23rd Infantry, 3rd Stryker Brigade Combat Team when he stepped on a pressure plate IED on July 25, 2012, in Afghanistan, resulting in his combat injuries.

The vice chairman also recognized and acknowledged the wounded warriors whose injuries are not as visible.

"We are going to take care of them [wounded warriors] for many decades to come," he said.

After the ceremony, Winnefeld visited with about 15 wounded warriors at the Center for the Intrepid, a state-of-the art outpatient rehabilitation facility. The admiral said he was impressed with the wounded warriors who were participating in sports with their leg brace called the IDEO–Intrepid Dynamic Exoskeletal Orthosis.

"This is what I came to see," he said.

SWIFT MONITORS A MASSIVE BINARY'S CLASHING WINDS

CYBERSPACE AND CHANGE

Army Gen. Keith B. Alexander
FROM: U.S. DEPARTMENT OF DEFENSE

Cybercom Chief: Culture, Commerce Changing Through Technology

By Claudette Roulo
American Forces Press Service

WASHINGTON, Oct. 12, 2012 – Over the past six or seven years, cyberspace has undergone a tremendous transformation, the commander of U.S. Cyber Command said Oct. 11 at the United States Geospatial Intelligence Foundation’s GEOINT 2012 conference in Orlando, Fla.

Network convergence -- the consolidation of analog networks into a digital network -- is driving cultural change and commercial innovation, Army Gen. Keith B. Alexander, also the director of the National Security Agency, said.

Everyone is connected to the network, Alexander said, even his two-year-old grandson, who on his own has figured out how to turn on an iPad and use Skype to call his grandmother.

"Now think about that," the general said. "Think about the tremendous change and the opportunities."

Commerce and communications are increasingly reliant on the digital network, he said, noting global mobile traffic has already reached 20 petabytes of data sent this year. A petabyte is equal to one quadrillion [1 followed by 15 zeroes] bytes.

"The opportunities are endless," Alexander said. "This is something we should welcome with open arms."

But with these opportunities come some "huge" vulnerabilities, he said.

According to a study by Symantec Corp., maker of Norton anti-virus products, 72 percent of Americans have been hacked, Alexander said.

"My assessment is it’s actually higher," he added. "That’s what we know about. What we see is most companies don’t know that they’re hacked."

Companies that have been hacked in the past two years include Master Card, Visa, Symantec, Google, Citi and Sony, Alexander said. The intellectual property being stolen amounts to the greatest transfer of wealth in history, he added.

The costs of cybercrime are huge, Alexander said, averaging about $290 per victim and resulting in billions of dollars in losses a year.

Malware, or malicious software, is on the rise, he said, noting a study by the McAfee Co. that reported 1.5 million new pieces of malware since the first quarter of 2012.

Botnets send approximately 89 billion spam emails every day, Alexander continued. Botnets are collections of computers whose firewalls have been breached by malware and are being controlled by a third party for malicious purposes.

"Roughly 25 percent of what we see on the network is spam," he said.

Mobile malware also is on the increase, Alexander said. In one four-month period, the number of exploits for Google Android phones increased 500 percent, Alexander said.

Government and industry need to join together to combat the ongoing theft of personal data, intellectual property and other resources, he said.

"Ninety percent of cyberspace is owned and operated by industry," Alexander said. "But the government depends on that space to operate."

Hackers are shifting from theft to destruction, he said, and this represents a serious threat for which the U.S. needs to prepare.

The first step in preparing the country is better training for the people who defend the network, Alexander said. The second is defensible architecture.

"That starts out with a thin-virtual [-client] cloud environment," the general said. The NSA, he added, has built a cloud system called Accumulo using a hybrid of both open-source and encrypted software.

"[When] you have a patch, you push it out to the cloud and ... at network speed you can essentially patch the network," Alexander said. "You have erased that vulnerability from your system. That’s huge."

The speed with which patches are applied is crucial to ensuring network security, he said, because hackers use news about vulnerabilities to exploit unpatched computers and networks.

"We need to close that window," Alexander said.

To do that there needs to be a way of sharing information between the government and industry, he said.

"That’s a problem," Alexander said. "How do you do that? The answer is, ‘Well, we can’t do that easily.’ So, we need legislation."

There are ongoing efforts to obtain such legislation, he said, adding, "noting that he expects Congress to address cybersecurity legislation again next year.

An attempt to develop national cybersecurity legislation failed in Congress earlier this year, he said. The failure was due, in part, Alexander said, to Congressional concerns revolving around the roles of the Department of Homeland Security and the NSA.

The government doesn’t want to hamper industry, Alexander said, noting it just makes sense for government and industry to work together because "everybody’s being hacked." The issue comes down to the role of business and the role of government, he said.

"We need to solve this before there’s a big problem," the general said, "because after there’s a big problem, we’re going to race to the wrong solution."


U.S.-CHINA LOGISTICAL SHARING DURING JOINT MILITARY EXERCISES

U.S.-CHINA COOPERATE DURING JOINT ANTI-PIRACY EXERCISE.  CREDIT:  U.S. NAVY 
FROM: U.S. DEPARTMENT OF DEFENSE

China, U.S. to Consider Sharing Resources during Joint Missions

By Donna Miles
American Forces Press Service

WASHINGTON, Oct. 12, 2012 - In what U.S. Pacific Command's logistics chief calls a groundbreaking development, officials from the United States and China plan to meet to discuss sharing logistical resources, including fuel, as they operate together during counter-piracy and humanitarian assistance and disaster response missions.

The United States has officially extended the invitation for a team of senior Chinese logisticians to visit Washington in early 2013 to discuss the possibility of a first-ever logistics cooperation agreement between the two countries, Air Force Brig. Gen. Mark M. McLeod told American Forces Press Service.

If adopted, the arrangement would enable the United States and China to share fuel, food, supplies, and even vessel parts to support their joint operations, he said.

Pacom officials pitched the idea last month during the 41st Pacific Area Senior Officer Logistics Seminar in Perth, Australia.

The forum of senior logistics and national security officers from Pacific, Asian and Indian Ocean area nations meets annually to exchange information, pursue bilateral and multilateral initiatives and encourage closer regional cooperation. This year, PASOLS participants focused on ways to promote multinational and multiagency logistics collaboration.

Navy Rear Adm. Yang Jianyong of the People's Liberation Army, who led the Chinese delegation at this year's seminar, called the U.S. proposal "a good area for future discussion [and] cooperation," McLeod reported.

Such an arrangement was floated in the past, but didn't get traction because of strained U.S.-Chinese relations.

But the timing could now be right, McLeod said, as both countries begin looking for ways to strengthen their military-to-military relationship. Defense Secretary Leon E. Panetta and Pacom commander Navy Adm. Samuel J. Locklear III recently visited China to promote closer cooperation and collaboration.

Logistics cooperation with China provides a perfect forum for that relationship-building, McLeod said, particularly as China assumes a growing global role. For example, in addition to counter-piracy operations, China periodically deploys its naval hospital ship, the Peace Ark, to provide medical services in other nations.

"As they go from an internal defense-focused military and begin to push off their shores and take on more regional security roles, they are finding that their logistics chains are kind of strained," McLeod said.

PASOLS, and a potential logistics agreement with the United States, offer China an opportunity to learn from the experience of the regional partners it now operates with, he said.

"Based on them reaching out and starting to perform some of these more joint missions that other nations are doing," he said, "we thought this was an opportunity for us to enter into an agreement with them to share resources."

McLeod called the potential agreement a great foundation for other military-to-military cooperation that supports both the United States' and China's national security strategies.

"Obviously, both militaries are interested in regional security. Both militaries are interested in freedom of passage through areas. There are a lot of things going where we share common interests," he said.

"But this is the first time, at least from a logistics standpoint, that we have reached out and they have been very receptive to those ideas," McLeod said. "That is pretty groundbreaking for us."

McLeod called these developments important building blocks toward closer logistics collaboration that enables regional nations to partner together and respond more effectively to natural disasters and other contingencies.

Responses to regional natural disasters and other contingencies will be far better, he said, if the nations understand how each other's operations, share basic principles and learn from each other's experiences. "There are things that each of us can bring to the fight that ultimately helps all of us provide support," he said.

McLeod said he will share the lessons from PASOLS with the Association of Southeast Asian Nations and other regional organizations. "What we are trying to do is operationalize what we do in the theater by branching out to some of these other large organizations," he said.

Ultimately, he hopes to promote sharing arrangements that enable more countries to participate in regional operations. "Many nations have difficulty when they reach beyond their logistics chains and have to go about gathering supplies and equipment," he said.

Setting up an infrastructure so nations can share resources, water, even cybersecurity expertise could help eliminate that roadblock, he said.

But McLeod said he sees particular promise in operationalizing fuel across the theater. "That is an interest area that many, many nations have, from our high-end partners all the way down to our developing partners that are expanding their capabilities as they go forward," he said.

"That helps you not only during operations, when transiting vessels or operating equipment in that [particular] nation, but it [also] can be important when there is a supply interruption because of a typhoon or some other natural disaster," McLeod said. "In essence, you diversify your fuel capabilities so, no matter where you go, you have that capacity."

THE CENTRAL VIRGINIA SEISMIC ZONE CAN BE A MOVER AND A SHAKER

Pentagon Gets Jolt In 2011 Earthquake.  Credit:  Wikimedia Commons.
FROM: NATIONAL SCIENCE FOUNDATION

What Will You Do If an Earthquake Hits?

The Central Virginia Seismic Zone, it's called, and it sometimes shakes everything in sight.

As long ago as 1774, people in central Virginia felt small earthquakes and suffered damage from intermittent larger ones. A magnitude 4.8 quake happened in 1875.

Then last year, on August 23, 2011, a magnitude 5.8 quake hit the same region. Several aftershocks, ranging up to magnitude 4.5, occurred after the main tremor.

Will there be another such quake in the mid-Atlantic region?

Whether you live in that part of the U.S., or elsewhere around the country or the world, would you know what to do in an earthquake?

An event on October 18, 2012, provides some answers.

The Great ShakeOut is a series of earthquake drills that will be held in California and many other western states, along with southeast states and Washington D.C., several U.S. territories, and Canada and other countries.

Great ShakeOut drills encourage people to practice how to "Drop, Cover and Hold On" to protect themselves during earthquakes. Other preparedness actions are also recommended.

The first ShakeOut drill was held in southern California in 2008, based on the "ShakeOut Scenario," a study of a large earthquake on the San Andreas fault.

The Southern California Earthquake Center (SCEC) at the University of Southern California, funded by the National Science Foundation (NSF) and U.S. Geological Survey (USGS), developed advanced simulations of the quake to estimate potential losses and casualties, and to show the public how shaking would be felt throughout the region.

SCEC staff members coordinate the research of hundreds of geologists and other scientists across the country, and communicate important information to reduce earthquake risks.

SCEC created a registration system where participants in the Great ShakeOut could be counted in the overall total.

The Great ShakeOut
website provides a basis for motivating earthquake preparedness activities that may be adapted for use by states, regions and countries worldwide, each of which have developed new materials and concepts.

"ShakeOut is a great example of the public benefit from long-term NSF investments in basic scientific research and education," says Greg Anderson, program director in NSF's Division of Earth Sciences.

"Long-term support for SCEC has advanced our fundamental understanding of earthquakes and the threats they pose. ShakeOut will help people nationwide learn to respond to earthquakes safely, and to protect their families and themselves."

Part of the appeal of the ShakeOut is its simplicity.

At a minimum, participants practice "Drop, Cover, and Hold On," the recommended procedure for self-protection in an earthquake. Many schools and other organizations also practice additional aspects of their preparedness plans.

The 2012 Great ShakeOut will be held on October 18, 2012, at 10:18 a.m. local time in each participating state or region, with more than 12 million people in businesses, government offices, neighborhoods, schools and households expected to take part.

"ShakeOut participation continues to grow, with new regions involved each year," says Mark Benthien, SCEC education and outreach director. "For example, the California drill is already larger than last year's record 8.6 million participants and still growing."

Registering allows SCEC to know what people are planning for their drills, and how many are involved. Once registered, participants receive updates and preparedness information.

Because of the success of the ShakeOut in California, SCEC has worked with other regions to create ShakeOut drills, complete with websites and registration systems all managed by SCEC.

In addition to the areas already mentioned that are holding drills on October 18th, the central U.S. region, which held drills in February, 2012, will do so again in February, 2013.

Utah held its first ShakeOut in April, 2012; New Zealand held the first nationwide ShakeOut in September, 2012; and ShakeOut drills are being organized across Japan.

"ShakeOut is changing the way people and organizations are approaching community-wide earthquake preparedness," says Benthien. "Our goal is to make it easy for them to get better prepared so they survive, and recover quickly."

If you live in central Virginia, anywhere along the East Coast, or, in fact, anywhere around the world, participating in the Great ShakeOut could save your property--and your life.

U.S. SECRETARY OF DEFENSE PANETTA'S SPEECH ON DEFENDING NATION AGAINST CYBER ATTACKS

FROM: U.S. DEFENSE DEPARTMENT

"Defending the Nation from Cyber Attack" (Business Executives for National Security)

As Delivered by Secretary of Defense Leon E. Panetta, New York, New York, Thursday, October 11, 2012
Thank you. Thank you very much.

Thank you so much for this wonderful evening and the chance to enjoy such terrific company and be able to express my deepest gratitude to this organization for all of the great things that it does on behalf of those that serve in our military.

Bruce, my greatest thanks to you for your kind remarks and for your leadership here.

And I -- I accept this award, not so much for myself but I accept it on behalf of the men and women in uniform who are putting their lives on the line every night, every day in order to protect this country.

I want to congratulate the troops from the 82nd, they're -- they're the very best.

I also want to congratulate Frank for receiving this reward, the great service that he does in helping to -- to find jobs for those that are returning so that they can be part of -- of their community after serving this country, to protect their community is outstanding. And besides that, and perhaps most importantly, he's Italian. It's nice to have another Italian honored this evening.

I also want to thank Fran Townsend. She's a great friend and, obviously, a tremendous Master of Ceremonies this evening. And the reason I -- the reason I asked Fran to serve on the board is because she is bright. She is capable. She's dedicated. She -- she's a straight talker, she knows what she's talking about. She's dedicated to this country and in a room of a lot of ugly old guys, she's not bad to look at.

General Meigs, thank you for your leadership as well and for your distinguished service to this country.

I am truly honored to be with you this evening. We gather in the midst of a very important national contest. It's one that will continue to play out over the coming weeks in unpredictable ways before a final decision is reached. And in fact, some of the key players are dueling tonight.

So I want to be very clear about where my loyalties lie in this contest, I have always been and always will be for the New York Yankees.

And I think the score is 1-to-1. Right?

In all seriousness, I really do appreciate the opportunity to come back to this great city. This is -- New York is a special place for me and I'll tell you why. I am -- I'm the son of Italian immigrants and both of my parents came through New York, came through Ellis Island like so many millions of others. That made this a special place for me.

I also had the opportunity to be here and work as an Executive Assistant to the Mayor of New York City, a guy named John Lindsay at the time.

I also had the opportunity to work very closely with the delegation in Congress. As a matter of fact, in Washington.

I lived with Chuck Schumer and a group of other members of Congress in what was well known as Animal House in Washington. And you can't live with Schumer and not develop an appreciation for New York City.

I also served on the Board of the New York Stock Exchange for six years. And I was on the board when 9/11 took place and I want you to know how much at that time I appreciated the great courage of the people of New York in the face of that attack. And I remembered that courage when I had a chance to lead the operation that went after Bin Laden.

We sent a very clear message to the world. We sent a very clear message to terrorists that in fact, don't ever attack this country because you will not get away with it.


U.S. CYBER BRIGADE


I've long appreciated, from my own experience, New York's role as the center of gravity for our nation's economy. This is where it's at. And for that reason, it's an honor to be able to speak before this kind of distinguished audience of business leaders and innovators because you understand what a strong national defense is all about and you understand that a strong national defense and a strong economy go hand in hand.

With that in mind, tonight I'd like to discuss with you an issue that I think is at the very nexus of business and national security: the threats facing the United States in cyberspace and the role that the Defense Department must play in defending this country from those kinds of threats.

We're on an aircraft carrier, a famous and great aircraft carrier and it's a fitting and appropriate venue to have this discussion. This ship and the technology that's on display at this museum, attests to one of the central achievements of the United States in the 20th century, our ability to project power and strength across the land, across the high seas, across the skies and across outer space.

We secured those domains. Securing them helped ensure that they were used to advance peace and prosperity and were not used to promote war and aggression.

It is with that same goal in mind, today we have to address a new domain that we must secure to have peace and prosperity in the world of tomorrow.

Cyberspace has fundamentally transformed the global economy. It's transformed our way of life, providing two billion people across the world with instant access to information to communication, to economic opportunities.

Cyberspace is the new frontier, full of possibilities to advance security and prosperity in the 21st century. And yet, with these possibilities, also come new perils and new dangers.

The Internet is open. It's highly accessible, as it should be. But that also presents a new terrain for warfare. It is a battlefield of the future where adversaries can seek to do harm to our country, to our economy, and to our citizens.

I know that when people think of cybersecurity today, they worry about hackers and criminals who prowl the Internet, steal people's identities, steal sensitive business information, steal even national security secrets. Those threats are real and they exist today.

But the even greater danger -- the greater danger facing us in cyberspace goes beyond crime and it goes beyond harassment. A cyber attack perpetrated by nation states are violent extremists groups could be as destructive as the terrorist attack on 9/11. Such a destructive cyber-terrorist attack could virtually paralyze the nation.

Let me give you some examples of the kinds of attacks that we have already experienced.

In recent weeks, as many of you know, some large U.S. financial institutions were hit by so-called Distributed Denial of Service attacks. These attacks delayed or disrupted services on customer websites. While this kind of tactic isn't new, the scale and speed with which it happened was unprecedented.

But even more alarming is an attack that happened two months ago when a very sophisticated virus called Shamoon infected computers in the Saudi Arabian State Oil Company Aramco. Shamoon included a routine called a 'wiper', coded to self-execute. This routine replaced crucial systems files with an image of a burning U.S. flag. But it also put additional garbage data that overwrote all the real data on the machine. More than 30,000 computers that it infected were rendered useless and had to be replaced. It virtually destroyed 30,000 computers.

Then just days after this incident, there was a similar attack on RasGas of Qatar, a major energy company in the region. All told, the Shamoon virus was probably the most destructive attack that the private sector has seen to date.

Imagine the impact an attack like that would have on your company or your business.

These attacks mark a significant escalation of the cyber threat and they have renewed concerns about still more destructive scenarios that could unfold.

For example, we know that foreign cyber actors are probing America's critical infrastructure networks. They are targeting the computer control systems that operate chemical, electricity and water plants and those that guide transportation throughout this country.

We know of specific instances where intruders have successfully gained access to these control systems.

We also know that they are seeking to create advanced tools to attack these systems and cause panic and destruction and even the loss of life.

Let me explain how this could unfold. An aggressor nation or extremist group could use these kinds of cyber tools to gain control of critical switches. They could, for example, derail passenger trains or even more dangerous, derail trains loaded with lethal chemicals.

They could contaminate the water supply in major cities or shutdown the power grid across large parts of the country.

The most destructive scenarios involve cyber actors launching several attacks on our critical infrastructure at one time, in combination with a physical attack on our country. Attackers could also seek to disable or degrade critical military systems and communication networks.

The collective result of these kinds of attacks could be a "cyber Pearl Harbor:" an attack that would cause physical destruction and the loss of life. In fact, it would paralyze and shock the nation and create a new, profound sense of vulnerability.

As director of the CIA and now Secretary of Defense, I have understood that cyber attacks are every bit as real as the more well-known threats like terrorism, nuclear weapons proliferation and the turmoil that we see in the Middle East.

And the cyber threats facing this country are growing. With dramatic advances, this is an area of dramatic developments in cyber technology. With that happening, potential aggressors are exploiting vulnerabilities in our security. But the good news is this, we are aware of this potential. Our eyes are wide open to these kinds of threats and we are a nation that, thank God, is on the cutting edge of this new technology. We are the best and we have to stay there.

The Department of Defense, in large part through the capabilities of the National Security Agency, NSA, has develop the world's most sophisticated system to detect cyber intruders and attackers.

We are acting aggressively to get ahead of this problem, putting in place measures to stop cyber attacks dead in their tracks. We are doing this as part of a broad whole of government effort to confront cyber threats.

The Department of Homeland Security has the lead for domestic cybersecurity, the FBI also has a key part to play and investigating and preventing cyber-attacks. And our intelligence agencies, of course, are focused on this potential threat as well.

The State Department is trying to forge international consensus on the roles and responsibilities of nations to help secure cyberspace.

The Department of Defense also has a role. It is a supporting role but it is an essential role. And tonight I want to explain what that means. But first let me make clear what it does not mean.

It does not mean that the Department of Defense will monitor citizens' personal computers. We're not interested in personal communication or in e-mails or in providing the day to day security of private and commercial networks. That is not our goal. That is not our job. That is not our mission.

Our mission is to defend the nation. We defend. We deter, and if called upon, we take decisive action to protect our citizens. In the past, we have done so thorough operations on land and at sea, in the skies and in space. In this century, the United States military must help defend the nation in cyberspace as well.

If a foreign adversary attacked U.S. soil, the American people have every right to expect their national defense forces to respond.

If a crippling cyber attack were launched against our nation, the American people must be protected. And if the Commander in Chief orders a response, the Defense Department must be ready to obey that order and to act.

To ensure that we fulfill our role to defend the nation in cyberspace, the department is focusing on three main tracks.

One, developing new capabilities.

Two, putting in place the policies and organizations we need to execute our mission.

And three, building much more effective cooperation with industry and with our international partners.

Let me briefly talk about each of these.

First, developing new capabilities. DoD is investing more than $3 billion annually in cybersecurity because we have to retain that cutting edge capability in the field.

Following our new defense strategy, the department is continuing to increase key investments in cybersecurity even in an era of fiscal restraint.

Our most important investment is in skilled cyber warriors needed to conduct operations in cyberspace.

Just as DoD developed the world's finest counterterrorism force over the past decade, we need to build and maintain the finest cyber force and operations. We're recruiting, we're training, we're retaining the best and the brightest in order to stay ahead of other nations.

It's no secret that Russia and China have advanced cyber capabilities. Iran has also undertaken a concerted effort to use cyberspace to its advantage.

Moreover, DoD is already in an intense daily struggle against thousands of cyber actors who probe the Defense Department's networks, millions of time a day. Throughout the innovative efforts of our cyber operators, we've been trying to enhance the department's cyber-defense programs.

These systems rely on sensors; they rely on software to hunt down the malicious code before it harms our systems. We actively share our own experience defending our systems with those running the nation's critical private sector networks.

In addition to defending the department's networks, we also help deter attacks. Our cyber adversaries will be far less likely to hit us if they know that we will be able to link to the attack or that their effort will fail against our strong defenses.

The department has made significant advances in solving a problem that makes deterring cyber adversaries more complex: the difficulty of identifying the origins of that attack.

Over the last two years, DoD has made significant investments in forensics to address this problem of attribution and we're seeing the returns on that investment.

Potential aggressors should be aware that the United States has the capacity to locate them and to hold them accountable for their actions that may try to harm America.

But we won't succeed in preventing a cyber attack through improved defenses alone. If we detect an imminent threat of attack that will cause significant, physical destruction in the United States or kill American citizens, we need to have the option to take action against those who would attack us to defend this nation when directed by the president.

For these kinds of scenarios, the department has developed that capability to conduct effective operations to counter threats to our national interests in cyberspace.

Let me clear that we will only do so to defend our nation, to defend our interests, to defend our allies and we will only do so in a manner that is consistent with the policy principles and legal frameworks that the department follows for other domains including the law of armed conflict.

Which brings me to the second area of focus, policies and organization. Responding to the cyber threat requires the right policies and organizations across the federal government.

For the past year, the Department of Defense has been working very closely with other agencies to understand where are the lines of responsibility when it comes to cyber defense. Where do we draw those lines? And how do those responsibilities get executed?

As part of that effort, the department is now finalizing the most comprehensive change to our rules of engagement in cyberspace in seven years. The new rules will make clear that the department has a responsibility, not only to defend DoD's networks, but also to be prepared to defend the nation and our national interests against an attack in or through cyberspace.

These new rules make the department more agile and provide us with the ability to confront major threats quickly.

To execute these responsibilities, we must have strong organization structures in place.

Three years ago, the department took a major step forward by establishing the United States Cyber Command. Under the leadership of General Keith Alexander, a four-star officer who also serves as the director of the National Security Agency.

Cyber Command has matured into what I believe is a world-class organization.

It has the capacity to conduct a full range of missions inside cyberspace. And it's also working to develop a common, real-time understanding of the threats in cyberspace. The threat picture could be quickly shared with DoD's geographic and functional combatant commanders, with DHS, with FBI and with other agencies in government. After all, we need to see an attack coming in order to defend against that attack.

And we're looking at ways to strengthen Cyber Command as well. We must ensure that hit has the resources, that it has the authorities, that it has the capabilities required to perform this growing mission. And it must also be able to react quickly to events unfolding in cyberspace and help fully integrate cyber into all of the department's plans and activities.

And finally, the third area is to build stronger partnerships.

As I've made clear, securing cyberspace is not the sole responsibility of the United States military or even the sole responsibility of the United States government. The private sector, government, military, our allies - all share the same global infrastructure and we all share the responsibility to protect it.

Therefore, we are deepening cooperation with our closest allies with the goal of sharing threat information, maximizing shared capabilities and determining malicious activities. The president, the vice president, Secretary of State and I have made cyber a major topic of discussion in nearly all of our bilateral meetings with foreign counterparts.

I recently met with our Chinese military counterparts just a few weeks ago. As I mentioned earlier, China is rapidly growing its cyber capabilities.

In my visit to Beijing, I underscored the need to increase communication and transparency with each other so that we could avoid a misunderstanding or a miscalculation in cyberspace. This is in the interest of the United States, but it's also in the interest of China.

Ultimately, no one has a greater interest in cybersecurity than the businesses that depend on a safe, secure and resilient global, digital infrastructure.

Particularly those who operate the critical networks that we must help defend. To defend those networks more effectively, we must share information between the government and the private sector about threats in cyberspace.

We've made real progress in sharing information with the private sector. But very frankly, we need Congress to act to ensure that this sharing is timely and comprehensive.

Companies should be able to share specific threat information with the government, without the prospect of lawsuits hanging over their head. And a key principle must be to protect the fundamental liberties and privacy in cyberspace that we are all duty bound to uphold.

Information sharing alone is not sufficient. We've got to work with the business community to develop baseline standards for our most critical private-sector infrastructure, our power plants, our water treatment facilities, our gas pipelines. This would help ensure that companies take proactive measures to secure themselves against sophisticated threats, but also take common sense steps against basic threats. Although awareness is growing, the reality is that too few companies have invested in even basic cybersecurity.

The fact is that to fully provide the necessary protection in our democracy, cybersecurity legislation must be passed by the Congress. Without it, we are and we will be vulnerable.

Congress must act and it must act now on a comprehensive bill such as the bipartisan Cybersecurity Act of 2012 co-sponsored by Senators Lieberman, Collins, Rockefeller and Feinstein.

This legislation has bipartisan support, but is victim to legislative and political gridlock like so much else in Washington. That frankly is unacceptable and it should be unacceptable not just to me, but to you and to anyone concerned with safeguarding our national security.

While we wait for Congress to act, the administration is looking to enhance cybersecurity measures under existing authorities, by working with the private sector to promote best practices, increase information sharing.

They are considering issuing an Executive Order as one option to try to deal with the situation, but very frankly there is no substitute for comprehensive legislation and we need to move as far as we can in the meantime. We have no choice because the threat that we face, as I've said, is already here.

Congress has a responsibility to act and the President of the United States has constitutional responsibility to defend our country.

I want to urge each of you to add your voice to those who support stronger cyber defenses for our country.

In closing, let me say something that I know the people of New York, along with all Americans, will appreciate.

Before September 11, 2001, the warning signs were there. We weren't organized. We weren't ready and we suffered terribly for that lack of attention.

JUSTICE DEPARTMENT DESCRIBES POLICY ON EAGLE FEATHER USE BY TRIBAL MEMBERS

Photo:  Bald Eagle.  Credit:  Wikimedia.
FROM: U.S. DEPARTMENTOFJUJSTICE
Friday, October 12, 2012

Justice Department Announces Policy on Tribal Member Use of Eagle Feathers

The Department of Justice announced today a policy addressing the ability of members of federally recognized Indian tribes to possess or use eagle feathers, an issue of great cultural significance to many tribes and their members. Attorney General Eric Holder signed the new policy after extensive department consultation with tribal leaders and tribal groups. The policy covers all federally protected birds, bird feathers and bird parts.

Federal wildlife laws such as the Bald and Golden Eagle Protection Act generally criminalize the killing of eagles and other migratory birds and the possession or commercialization of the feathers and other parts of such birds. These important laws are enforced by the Department of Justice and the Department of the Interior and help ensure that eagle and other bird populations remain healthy and sustainable.

At the same time, the Department of Justice recognizes that eagles play a unique and important role in the religious and cultural life of many Indian tribes. Many Indian tribes and tribal members have historically used, and today continue to use federally protected birds, bird feathers or other bird parts for their tribal cultural and religious expression.

"This policy will help ensure a consistent and uniform approach across the nation to protecting and preserving eagles, and to honoring their cultural and spiritual significance to American Indians," said Attorney General Holder. "The Department of Justice is committed to striking the right balance in enforcing our nation’s wildlife laws by respecting the cultural and religious practices of federally recognized Indian tribes with whom the United States shares a unique government-to-government relationship."

The department is issuing this policy to address the concerns of tribal members who are unsure of how they may be affected by federal wildlife law enforcement efforts, and because of a concern that this uncertainty may hinder or inhibit tribal religious and cultural practices. The department first announced it was considering formalizing a policy on eagle feathers in October 2011 and sought tribal input at that time. The department held formal consultations with tribal leaders in June, July and August 2012.

"From time immemorial, many Native Americans have viewed eagle feathers and other bird parts as sacred elements of their religious and cultural traditions," said Ignacia S. Moreno, Assistant Attorney General of the Justice Department’s Environment and Natural Resources Division. "The Department of Justice has taken a major step forward by establishing a consistent and transparent policy to guide federal enforcement of the nation’s wildlife laws in a manner that respects the cultural and religious practices of federally recognized Indian tribes and their members."

"The Justice Department’s policy balances the needs of the federally recognized tribes and their members to be able to obtain, possess and use eagle feathers for their religious and cultural practices with the need to protect and preserve these magnificent birds," said Donald E. "Del" Laverdure, Principal Deputy Assistant Secretary for Indian Affairs. "Its reasoned approach reflects a greater understanding and respect for cultural beliefs and spiritual practices of Indian people while also providing much-needed clarity for those responsible for enforcing federal migratory bird protection laws."

"This policy helps to clarify how federal law enforcement goes about protecting these special birds and also should reassure federally recognized tribal members that they do not have to fear prosecution for possessing or using eagle feathers for their religious and cultural purposes," said Brendan V. Johnson, U.S. Attorney for the District of South Dakota and the Chairman of the Native American Issues Subcommittee of the Attorney General’s Advisory Committee.


"Eagles and other native migratory bird species are a vital part of our nation’s natural heritage, and we remain dedicated to providing every American with the opportunity to experience them in the wild," said U.S. Fish and Wildlife Service Director Dan Ashe. "This new policy honors the past while looking to the future, contributing to the preservation of these species and ensuring that tribal members can continue their religious and cultural practices for generations to come."


The policy provides that, consistent with the Department of Justice’s traditional exercise of its discretion, a member of a federally recognized tribe engaged only in the following types of conduct will not be subject to prosecution:

· Possessing, using, wearing or carrying federally protected birds, bird feathers or other bird parts (federally protected bird parts);

· Traveling domestically with federally protected bird parts or, if tribal members obtain and comply with necessary permits, traveling internationally with such items;

· Picking up naturally molted or fallen feathers found in the wild, without molesting or disturbing federally protected birds or their nests;

· Giving or loaning federally protected bird parts to other members of federally recognized tribes, without compensation of any kind;

· Exchanging federally protected bird parts for federally protected bird parts with other members of federally recognized tribes, without compensation of any kind;

· Providing the feathers or other parts of federally protected birds to craftspersons who are members of federally recognized tribes to be fashioned into objects for eventual use in tribal religious or cultural activities.

The Department of Justice will continue to prosecute tribal members and non-members alike for violating federal laws that prohibit the killing of eagles and other migratory birds or the buying or selling of the feathers or other parts of such birds.


The policy expands upon longstanding Department of Justice practice and Department of the Interior policy. It was developed in close coordination with the Department of the Interior. The Department of Justice’s Environment and Natural Resources Division (ENRD) and United States Attorneys’ Offices work closely with the Department of the Interior’s U.S. Fish and Wildlife Service and Bureau of Indian Affairs on enforcement of federal laws protecting birds.

The view the policy and a fact sheet on the policy, visit: www.justice.gov/tribal .

Search This Blog

Translate

White House.gov Press Office Feed