The White House and Secret Service Have Responded To Multiple Fence Jumping Incidents By Installing Steel Spikes on the Fence

police
It’s no secret that the White House’s Secret Service guards have had some trouble preventing people from climbing and jumping over the fence that surrounds the Ellipse on Pennsylvania Ave.

The obvious solution, according to the U.S. Secret Service and the National Capitol Planning Commission, was to make a plan that involves steel spikes being placed on top of the current black iron fence.

Unlike the other 90% of new fence installations in the U.S. each year, this new addition isn’t intended to increase privacy for the Obamas.

CNN and the Huffington Post report that the U.S. Secret Service presented the proposal to the National Capitol Planning Commission. On Thursday, May 7, the plan was approved.

The new spikes will be slightly over seven inches tall and will have a steel “pencil point” at the top, which protrudes in multiple angular directions (much like layers of spikes) in order to deter people from climbing the fence. Poltico states that these “pencil points” will be placed in between the “decorative spear-shaped finials” that currently adorn the fence.

As explained by Tom Dougherty, the Chief Strategy officer of the Secret Service, “The current fence is a measure that was useful for a bygone era. It has been breached many times.”

Workers will start installing the spikes during July, and it’s estimated that the installation will take about four weeks.

The “pencil points” are a temporary solution, the Secret Service stated, and the U.S. National Park Service is designing a more permanent solution.

The security (or lack thereof) of the White House first came into question during September 2014 when a war veteran climbed the fence and ran into — and through — the White House with a knife. There have been multiple subsequent incidents since then, resulting in the resignation of Julia Pierson, then Secret Service director.

In addition to the spikes, three guard booths surrounding the White House will be rearranged and the current concrete barriers on Pennsylvania Ave. will be replaced with steel plate barriers.

Iranian Hackers Targeted U.S. Military, Government and Media Over Three Years Using Social Media, Says Report

A recent report from iSIGHT Partners, a Dallas-based computer-security firm, has exposed a three-year long cyber espionage campaign coming out of Iran. The attacks affected approximately 2,000 U.S. personal computers since 2011, and they specifically targeted U.S. military members, Senators, diplomats, lobbyists, and Washington-based journalists.

The Iranian hackers used social media sites such as Facebook, Twitter, and LinkedIn to spread malware to their targets. Those who fell victim to the cyber attacks were directed to links that unleashed malware and phishing attempts with fake log-in screens used to steal usernames and passwords.

The hackers even impersonated journalists and defense contractors and set up a fake news website, NewsOnAir.org (not to be confused with India’s NewsOnAir.com). The news site used content copied from other websites, with real writer names swapped out for fake ones.

iSIGHT Partners, which dubbed the threat “NEWSCASTER,” was able to pinpoint Iran as the source of the attacks based on data collected from the attack website. The website used for the attacks was registered in Tehran, with other sites the hackers used hosted in Iran, as well. The malware contained several Persian words, and the time stamps for the hackers’ activity matched the professional working hours in Tehran, with time off on Iranian weekends and holidays.

Military and government computers typically use plenty of software protections, in addition to military-grade transit cases commonly used by the Aerospace industry and Boeing, as well, to physically protect equipment. However, when it comes to hackers, the protections are becoming more and more difficult to utilize as time goes on and Iran begins to catch up with the more complex hacking methods used in China and Russia.

The findings, according to iSIGHT Partners, reveal three “critical insights”: that social media is a powerful and covert way to lure in government leaders and others in related industries; that the hackers may have used this technology to gain knowledge to develop weapons systems; and that these attacks are becoming increasingly sophisticated by using multiple social media platforms.

It’s unclear what sort of information was taken by the hackers, but iSIGHT Partners concludes that this effort “is unprecedented in complexity, scale, and longevity,” and that any organizations that may have information of strategic or tactical interest to U.S. enemies should be concerned about threats like NEWSCASTER.