Should Voting Systems be Classified as Critical Infrastructure?

While members of all political party voters seem to diss the notion that Russia intruded on voting systems in 2016, the proof is there. If you watched former DHS Secretary Jeh Johnson during his congressional testimony, it was not so much his responses but more about what members of congress know, to pose questions to Johnson.

Image result for u.s. voting systems

J. Alex Halderman, a professor of computer science and engineering at the University of Michigan, contended U.S. election equipment is “vulnerable to sabotage” that “could change votes.”

“We’ve found ways for hackers to sabotage machines and steal votes. These capabilities are certainly within reach for America’s enemies,” Halderman told senators.

He said he and his team spent 10 years researching cyber vulnerabilities of election equipment. The professor said:

Some say that the fact that voting machines aren’t directly connected to the internet makes them secure. But, unfortunately, this is not true. Voting machines are not as distant from the internet as they may seem. Before every election, they need to be programmed with races and candidates. That programming is created on a desktop computer, then transferred to voting machines. If Russia infiltrated these election management computers, it could have spread a vote-stealing attack to a vast number of machines. I don’t know how far Russia got or whether they managed to interfere with equipment on Election Day. More here from Daily Signal.

Okay…still a non-believer? Let’s see what the States experiences.

Image result for voter registration database

Click here for additional video and interactive map of states using paper ballot backup systems.

Elections officials outgunned in Russia’s cyberwar against America

WASHINGTON/Charlotte Observer

Local officials consistently play down suspicions about the long lines at polling places on Election Day 2016 that led some discouraged voters in heavily Democratic Durham County, N.C., to leave without casting a ballot.

Minor glitches in the way new electronic poll books were put to use had simply gummed things up, according to local elections officials there. Elections Board Chairman William Brian Jr. assured Durham residents that “an extensive investigation” showed there was nothing to worry about with the county’s new registration software.

He was wrong.

What Brian and other election officials across eight states didn’t know until the leak of a classified intelligence is that Russian operatives hacked into the Florida headquarters of VR Systems, Inc., the vendor that sold them digital products to manage voter registrations.

A week before the election, the hackers sent emails using a VR Systems address to 122 state and local election officials across the country, inviting them to open an attachment wired with malicious software that spoofed “legitimate elections-related services,” the report said. The malware was designed to retrieve enough additional information to set the stage for serious mischief, said the National Security Agency report disclosed by the Intercept, an investigative web site.

That wasn’t the only type of attack.

The new revelations about the Kremlin’s broad and sophisticated cyber offensive targeting Democrat Hillary Clinton and aimed at seating Donald Trump in the Oval Office have set off a wave of worry about the security of the nation’s voting systems. State election officials, facing questions as to whether they ignored oddities or red flags, have responded by accusing intelligence agencies of failing to alert them of the risks.

The truth is a hodge-podge of electronic machinery that enables Americans to exercise their most sacred democratic right is weakly guarded by state and local agencies. Those officials are quick to assure the voting public that their systems are secure, but they lack the resources and technical know-how to defend against cyber intrusions, or even to perform forensic examinations to ensure nothing happened.

Election officials in Illinois, another state that VR Systems lists as a customer, did not find out they were hacked by Russian operatives late last June until a week or two later. By then, the Russian operatives had downloaded about 90,000 voter registration records, leading to an investigation by the FBI and the U.S. Department of Homeland Security, said Ken Menzel, general counsel of the Illinois Board of Elections. Menzel confirmed a Bloomberg report that the Russians appeared to have made unsuccessful attempts to alter or delete some records.

In Georgia, where a nationally watched congressional runoff race is scheduled for Tuesday, Politico magazine reported that a U.S. hacker from a national laboratory seeking to expose vulnerabilities in election systems was able to easily download millions of voter records from Kennesaw State University’s Center for Election Systems, which manages them. Election watchdog groups say subsequent warnings to the state about a hole in their system went unheeded for months.

David Jefferson, a computer scientist at the Lawrence Livermore National Laboratory in California who has acted in his personal capacity in trying to safeguard election integrity, said he believes it is “absolutely possible” that the Russians affected last year’s election.

“And we have done almost nothing to seriously examine that,” he said.

“The Russians really were engaged in a pattern of attacks against the machinery of the election, and not merely a pattern of propaganda or information warfare and selective leaking,” said Alex Halderman, a University of Michigan computer science professor. “The question is, how far did they get in that pattern of attacks, and were they successful?” Election officials across the country may not even know if they’ve been attacked, computer scientists say, pointing to the scenario that played out in Durham County.

EASY PREY

State and local voting systems appear to be easy prey for sophisticated hackers.

Five states use electronic voting machines with no paper backups, precluding audits that might verify the accuracy of their vote counts. They include Georgia, scene of Tuesday’s 6th District runoff election, Delaware, Louisiana, New Jersey and South Carolina. Parts of another nine states also are paperless, including the crucial swing state of Pennsylvania.

Although Congress has discouraged use of internet voting because of the potential for hackers to tamper with ballots, some 32 states allow military and overseas voters to transmit ballots online or via insecure fax machines. Alaska, Washington state and Hawaii have been the most permissive.

“If we don’t fix our badly broken system before the next major presidential election, we’re going to be hacked into,” said Barbara Simons, author of “Broken Ballots,” a 2012 book about election security published by Stanford University. “It might not just be Russia. It might be North Korea, China, Iran or partisans.”

While the Netherlands opted to shift to paper ballots when alerted the Russians were trying to swing its election outcome to the right, U.S. election officials have stood pat.

But former FBI Director James Comey, in widely watched testimony to the Senate Intelligence Committee on June 8, said “there should be no fuzz” about Russia’s barrage of millions of social media messages spreading falsehoods about Clinton.

“The Russians interfered in our election during the 2016 cycle,” he said. “They did it with purpose. They did it with sophistication. They did it with overwhelming technical efforts … And it is very, very serious.”

America’s saving grace could be its decentralized system in which cities, counties and states have used federal grants to procure a wide variety of voting equipment, limiting the potential impact of a single attack.

But that doesn’t mean targeted attacks couldn’t tip the outcome of closely divided races, even for the presidency.

CRITICAL INFRASTRUCTURE

On Jan. 6, American intelligence agencies issued a declassified report accusing Russia of the cyber attack ultimately aimed at helping Trump, calling it the Kremlin’s “boldest” operation ever aimed at influencing the United States. In a brief notation, the report said that, while the Russians targeted state and local voting systems, they did not attempt to corrupt vote-tallying equipment.

On the same day the report was released, in one of his last acts as U.S. secretary of Homeland Security, Jeh Johnson proclaimed the nation’s election systems to be “Critical Infrastructure,” a designation that not only makes their security a higher priority, but improves the climate for federal-state cooperation. Because state and local officials exert total control over their operations, the agency only can investigate a vulnerability or possible breach if asked to do so – an obstacle the new designation didn’t change.

A senior Homeland Security official, in an interview with McClatchy, batted down as wildly exaggerated a Bloomberg report stating that Russian cyber operatives had made “hits” on voting systems in 39 states. Every web site is constantly scanned by “bad actors,” just as burglars might case homes in a neighborhood. That doesn’t equate to hacking, said the official, who spoke on condition of anonymity because of the sensitivity of the matter.

“The ability to manipulate the vote tally, that’s quite complicated,” the Homeland Security official said. “We didn’t see an ability to really accomplish that even in an individual voting machine. You have to have physical access to do that. It’s not as easy as you think.”

Some of the nation’s top experts in voting security disagree.

Lawrence Livermore’s Jefferson voiced frustration with the “defensive” refrain of denials from state and local election officials, including the National Association of Secretaries of State.

“Election officials do not talk about vulnerabilities,” Jefferson said, “because that would give the advantage to the attacker. And they don’t want to undermine public confidence in elections.”

Halderman said Homeland Security officials told him they were unaware of a single county in any state that had conducted post-election forensic examinations of their voting equipment.

The Homeland Security official who spoke with McClatchy said the main concern for agency cyber specialists is not about vote-tampering; it’s related to the ability of intruders to sow confusion and chaos. That could entail schemes to foul voter registration data by, for example, removing the names of voters from the rolls so they are turned away at polling stations.

“This scenario is what we witnessed on the ground in North Carolina on Election Day,” said Susan Greenhalgh, a spokeswoman for the election watchdog group Verified Voting.

“If attackers wanted to impact an election through an attack on a vendor like VR Systems,” she said, “they could manipulate or delete voter records impacting a voter’s ability to cast a regular ballot. Or, they could cause the E-Pollbooks (electronic databases of voters) to malfunction, hampering the check-in process and creating long lines.”

North Carolina was considered to be a swing state in the presidential race, and Durham County, with an African-American population of more than 37 percent, had voted more than 75 percent in favor of putting and keeping Barack Obama in the White House. Last year’s governor’s race was a dead heat entering Election Day.

The chaos in Durham County led to 90-minute delays. Some voters rang a Voter Protection Hotline to complain that their names had disappeared from the registration system or that they were told they already had voted.

The county hired a contractor to investigate the foul-up, but the inquiry never examined whether the system was hacked.

Twenty other North Carolina counties used the system, including Mecklenburg County, encompassing most of Charlotte. Though none reported problems on the scale of Durham County, release of the NSA report prompted the North Carolina Board of Elections to order a new investigation.

A former FBI agent is leading the inquiry. Critics say the three-member investigative team again lacks expertise in forensics.

Mindy Perkins, VR Systems’ president and chief executive officer, said in a statement that the company immediately notified all of its customers as soon as it was alerted “to an obviously fraudulent email purporting to come from VR Systems” and advised them not to click on the attachment.

“We are only aware of a handful of our customers who actually received the fraudulent email,” she said. “We have no indication that any of them clicked on the attachment or were compromised as a result.”

She said the company has “policies and procedures in effect to protect our customers and our company.”

Even so, Russia succeeded in sneaking up on U.S. agencies, voting system vendors and intelligence agencies.

Halderman, the University of Michigan expert, said he believes the best solution is for states to require paper trails for all voting equipment and post-election audits to ensure the vote counts are authentic.

“There’s no guarantee that we’ll know we’re under attack,” he said, “unless we do the quality control that we need by doing these audits to detect manipulation.”

 

 

 

 

Global Blackouts, Anywhere in the World, Courtesy Russia

Fitful sleep last night after reading a very long detailed piece on Russian hackers versus Ukraine. Why, well the same tools and language they use have been found on American infrastructure and systems. Last thoughts before sleep were those of life before the internet and how people get emails with attachments that should never be opened. The short summary is just below. The more detailed and terrifying truth follows. It is a long summary, must be read…it is something like a cyber Hitchcock Twilight Zone disaster thriller, but it happened and happened often.

Image result for cyber war russia and us

Further, during a hearing in the House with former DHS Secretary, Jeh Johnson revealed a couple of key facts. One is told that during the election cycle, when the DNC hack, officials on numerous requests refused assistance, cooperation and discussions with DHS and FBI about foreign cyber intrusions. What was the DNC hiding? The other fact is Obama had the full details in intelligence briefings daily leading into November and December and refused to tell the country about Russian interference. He waited until after the elections and into December to take action. Why?

Okay, read on….

Image result for ukraine blackout CommentaryMagazine

Russia’s New Cyber Weapon Can Cause Blackouts Anywhere in the World

Hackers working with the Russian government have developed a cyber weapon that can disrupt power grids, U.S researchers claim. The cyber weapon has the potential to be absolutely disruptive if used on electronic systems necessary for the daily functioning of American cities.

The malicious software was used to shut down one-fifth of the electric power generated in Kiev, Ukraine last December. Called ‘CrashOverride’ the malware only briefly disrupted the power system but its potential was made clear.

With development, the cyber weapon could easily be used against U.S with devastating effects on transmission and distribution systems.

Sergio Caltagirone, director of threat intelligence for Dragos, a cybersecurity firm that examined the malware said, “It’s the culmination of over a decade of theory and attack scenarios, it’s a game changer.”

Dragos has dubbed the group of hackers who created the bug and used it in Ukraine, Electrum. The group and the virus have also been under scrutiny by cyber intelligence firm, FireEye, headed by John Hultquist. Hultquist’s company has nicknamed the group Sandworm and are keeping watch for clues of another attack.

The news of the malware comes in the middle of the ongoing investigation into Russia’s influence on the recent Presidential election. The Russian government is accused of trying to influence the outcome of the election by hacking hundreds of political organizations and leveraging social media.

While there is no hard evidence yet, U.S. officials believe the disruptive power hackers are closely connected to the Russian Government. U.S. based energy sector experts agree the malware is a huge concern and concede they are seeking ways to combat potential attacks.

“U.S utilities have been enhancing their cybersecurity, but attacker tools like this one pose a very real risk to reliable operation of power systems,”said Michael Assante, who worked at Idaho National Labs and is former chief security officer of the North American Electric Reliability Corporation.

CrashOverride

CrashOverride is only the second known instance of malware specifically designed to destroy or disrupt industrial control systems. The U.S. and Israel worked together to create Stuxnet, a bug designed to disrupt Iran’s nuclear enrichment program.

Robert M. Lee, chief executive of Dragos believes CrashOverride could be manipulated to attack other types of industrial control such as gas or water, though there has been no demonstration of that yet. But the sophistication of the entire operation is undeniable. The hackers had the resources to only develop the malware but to test it too.

The malware works by scanning for critical components that operate circuit breakers, then opening these breakers, which stops the flow of electricity. It continues to keep the circuit breakers open, even if a grid operator tries to close them. CrashOverride also cleverly comes with a “wiper” component that erases the existing software on the computer system that controls the circuit breakers. This forces the grid operator to revert to manual operations, which means a longer and more sustained power outage.

Potential outages could last a few hours and probably not more than a couple of days as U.S. power systems are designed to have high manual override capabilities necessary in extreme weather.

As mentioned above, you need to read the full detailed version here and just how the FBI, global cyber experts at the request of Ukraine worked diligently for accurate attribution to a Russian cyber force intruding on power systems. Hat tip to these experts and the story needs to go mainstream, as we are in a cyber war, the depths impossible to fully comprehend. Ukraine is the target and cyber incubation center for Russian cyber terrorists where they test, review, adapts and keep going without consequence.

Image result for ukraine blackout

Okay, read it all here. Hat tip for the detailed summary and the people doing quiet investigative cyber work.

 

Iran and North Korea Historically Team Up on Nukes and Missiles

Iran launched 6 missiles, striking targets in Syria. Revolutionary Guards say in retaliation for last week’s Tehran terror attacks.
Using missiles is  a major escalation of Iran’s role in the Syrian conflict. Until now it provided military advisors, volunteers, money.  The missiles were launched from western Iran, flew over Iraq striking targets in Deir ez Zor, in eastern Syria.  Iranian official Amirabdollahian says attack was  “soft revenge” for twin terror attacks in Tehran last week. 800km away. Israeli defense systems followed the missiles and deemed the operation largely a failure due to some missiles failing and others missing targets.

Image result for u.s. spy satellites north korea

Meanwhile there is some significant activity occurring at a North Korean nuclear test site.  Intelligence officials in the United States and in the region are watching and analyzing the activities including using all high tech systems including spy satellites to determine a probable action by North Korea. There have been recent upgrades and currently several tunnels have seen additional people and vehicle movements.

Image result for north korea nuclear test sites

(CNSNews.com)– Iran has intensified its development of ballistic missiles in recent years, particularly since the conclusion of the nuclear deal, and is doing so with significant collaboration with fellow pariah state North Korea, according to the exiled opposition National Council of Resistance of Iran (NCRI).

The regime has established at least 42 facilities for the production, testing and launching of ballistic missiles, the NCRI reported on Tuesday, revealing for the first time information on 12 previously-unknown sites.

The report was released by Alireza Jafarzadeh, deputy director of the NCRI’s Washington office, at a briefing in Washington.

The revelations come at a critical time, days after the Islamic Revolutionary Guard Corps (IRGC) for the first time fired ballistic missiles from Iranian territory at targets in Syria – ostensibly at ISIS terrorist positions. It’s believed to be the first time Iran has fired missiles at targets beyond its borders since the Iran-Iraq war in the 1980s.

Jafarzadeh said the missiles fired at targets in Syria were launched from an underground IRGC facility called Panj Pelleh, an older site in Kermanshah province in western Iran which he said had been the launchpad for missiles fired at targets in Iraq during the Saddam era.

The new NCRI report also comes shortly after the U.S. Senate passed, by a 98-2 vote, sanctions legislation targeting both Iran’s ballistic missile programs and the IRGC. The Countering Iran’s Destabilizing Activities Act, which Jafarzadeh praised as a good step, has been sent to the House.

The information released Tuesday, based on the opposition group’s sources inside the regime and IRGC, points to Iran having established missile facilities based on North Korean models, with the help of visiting North Korean experts.

“These North Korean experts who were sent to Iran, trained the main IRGC missile experts in IRGC garrisons, including the Almehdi Garrison situated southwest of Tehran,” the report says.

The IRGC has built a special residence in Tehran for the North Korean experts, who have been involved in helping develop warhead and guidance systems for Iranian missiles.

IRGC Aerospace Force personnel regularly visit North Korea to exchange knowledge, the report says.

Defying international condemnation, North Korea’s nuclear-armed regime has carried out a series of missile launches and Kim Jong-un has threatened to soon test an intercontinental ballistic missile (ICBM).

The NCRI report includes satellite imagery and information on the locations of many of 42 identified IRGC-controlled missile-related facilities across Iran – including 12 which the group says have been hitherto-unknown.

The sites include missile manufacturing plants, launching pads, training facilities, missile storage and maintenance units. Some are located or partly located underground, or in mountainous areas.

None of the sites are in eastern Iran. Most are in the central region, or in Iran’s western and southern provinces. The locations of missile launch sites have evidently been selected taking into account potential targets in the Gulf or westward towards Israel and Europe.

“The sites that are involved with deployment, launching operations and testing are on the western side or on the southern border, here, with a clear objective of threatening the neighbors,” Jafarzadeh noted, pointing at the map, observing that Europe and the West lie in that direction too.

“Western countries as well as countries in the region, those are the countries that they threaten, and have been threatening,” he said.

Reaction to missile tests has been ‘mild’

Jafarzadeh said the objective of the ballistic missile program is two-pronged – to deploy shorter-range missiles to threaten their neighbors in the region, and to develop the capability of putting a nuclear warhead on a longer-range missile.

The Joint Comprehensive Plan of Action (JCPOA), the nuclear deal negotiated between Iran and six powers, did not touch on the missile program – at Tehran’s insistence – but the Obama administration asserted that by placing verifiable restrictions on Iran’s nuclear program it shut off all paths to developing a nuclear weapon.

In response to a question, Jafarzadeh said the NCRI does not link the expanding missile work directly to the JCPOA, but “when you lose leverage you want to make up for it somewhere else,” he said of the regime. “There is more emphasis on their missile program now than there was a few years ago.”

He pointed out that the JCPOA left Iran with a lot of “room to maneuver” when it comes to ballistic missile activity, and that international reaction to its missile tests has been “mild, to say the least.”

Of the facilities discussed on Tuesday, one extensive complex (Semnan), in a mountainous area south-east of Tehran, is actively associated with the Organization of Defensive Innovation and Research (Persian acronym SPND), which is believed to be a body tasked with the development of a nuclear weapons capability.

SPND’s existence was first unveiled by the NCRI in 2011, and in August 2014 the U.S. Treasury Department added the organization to its “specially designated nationals” list, making it subject to U.S. sanctions.

“The Iranian regime has remained in power in Iran by relying on two pillars: internal

repression and external export of Islamic fundamentalism and terrorism,” the report states, lumping the ballistic weapons program into the latter “pillar.”

“As the regime becomes more isolated domestically and its grip on Iranian society weakens,

it resorts more frantically to the second pillar of its bid to keep power,” it says.

The report noted that Iran re-asserted its intention to continue advancing its missile program after the U.S.-Arab-Islamic summit in Riyadh last month. The summit saw the U.S. and most of the world’s Sunni Muslim states take a hard line on Iran.

The NCRI called for effective and comprehensive sanctions targeting the ballistic missile program; the designation of the IRGC as a foreign terrorist organization; and for IRGC and proxy militias to be evicted from countries in the region, especially Syria and Iraq.

The NCRI and affiliated People’s Mujahedeen Organization of Iran (MEK) has in the past provided valuable intelligence to the West, including pivotal information in 2002 that exposed nuclear activities Tehran had hidden from the international community for two decades.

The NCRI/MEK was designated a foreign terrorist organization under U.S. law until 2012, and is reviled by the clerical regime in Tehran, not least because it supported Saddam Hussein in his bloody eight year-long war against Iran in the 1980s.

It enjoys strong support from some current and former policymakers from both parties in Washington, as evidenced by the list of confirmed speakers at the NCRI’s annual convention, scheduled for July 1 in Paris.

Among them are former U.S. Ambassador to the U.N. John Bolton, former House Speaker Newt Gingrich, former Homeland Security Secretary Tom Ridge, former FBI Director Louis Freeh, former Attorney General Michael Mukasey, former Sen. Joe Lieberman, former New Mexico Gov. Bill Richardson and former Marine Corps commander Gen. (Ret.) James Conway.

Kushner in Israel, with ‘Allen Plan’ in Hand?

President Trump’s son-in-law Jared Kushner meets with Israeli Prime Minister Netanyahu hoping for a breakthrough on peace talks between Israel and the Palestinians. After this session, Kushner goes to Ramallah to meet with Palestinian Mahmoud Abbas. This is the 50th anniversary of the 1967 Mideast war where Israel captured the West Bank, East Jerusalem and Gaza.

One of the big issues with the Palestinians is the construction of ‘settlements’ which this site takes extreme exception to that term. The other term used by the Palestinians which should never be accepted is ‘occupation’.

So, as the title of the article includes the ‘Allen Plan’….exactly what is that?

It refers to General Allen and 1967 lines, proposed during Obama’s term as president. Israel is always prepared for these types of meetings and had already formally rejected any re-proposal for The Allen Plan.

Does this look like Israel can defend itself reverting to 1967 lines? Further, that proposal demands Israel to relinquish the most sacred historical territory.

Image result for israel 1967 lines map

Image result for general john allen john kerry

EXECUTIVE SUMMARY: The Trump White House is currently reexamining the Allen Plan, an Obama-era proposal that calls for a Palestinian state in the 1967 borders with no IDF presence whatsoever. This plan is dangerous. If it is implemented, Israel will have to rely on foreign forces for its security, a situation that has not worked in the past. More than that, it is antithetical to the Israeli ethos of self-defense and self-preservation in the Jewish homeland.

Col. Kris Bauman’s appointment as Israel adviser to the US National Security Council is a noteworthy event. He assisted Gen. John Allen in formulating recommendations for security arrangements for Israel in the context of a permanent settlement, to which then-Secretary of State John Kerry aspired. This set of recommendations came to be known as the Allen Plan.

Gen. Allen’s vision was detailed in a comprehensive document prepared at a US research institute by two Israelis and two Americans: Gen. (res.) Gadi Shamni and Nimrod Novik, along with Ilan Goldenberg and Col. Kris Bauman.

The plan envisages a Palestinian state with full sovereignty inside the 1967 borders, its capital in east Jerusalem, with minor modifications for settlement blocs. The plan is based on complete acceptance of the Palestinian demand for full sovereignty. This means no IDF soldiers anywhere in their state, which would extend from the Jordan River to the 1967 line.

In lieu of Israel’s demands regarding defensible borders, which include an Israeli military presence in the Jordan Valley to ensure the Palestinian state’s demilitarization, the plan proposes a varied and complex security solution. One element would be a US military force that would operate in the Jordan Valley. As the document’s Executive Summary states,

The purpose of this study is to demonstrate that well-thought-through security measures in the context of the two-state solution can provide Israelis and Palestinians with a degree of security equal or greater to that provided today by Israel’s deployment into the West Bank…

The basic problem is the notion that Israel will rely for its security on foreign forces. Not only is it difficult to ensure that such forces would fulfill their duty successfully, but it is uncertain whether or not they would stay in place – particularly after they have suffered casualties like those they have suffered in Afghanistan and Iraq over the past decade.

Recall that during the waiting period before the Six-Day War, the security guarantee given by President Eisenhower to Ben-Gurion after the 1956 Sinai Campaign evaporated. When he demanded that Israel withdraw unconditionally from the Sinai Peninsula, Eisenhower promised that if the Straits of Tiran were ever again closed to Israeli shipping, the US would intervene. Yet when Israeli foreign minister Abba Eban came to Washington in May 1967, President Johnson candidly explained to him that Eisenhower’s promise – however estimable – was no longer a practical proposition. With his army bogged down in Vietnam, Johnson apparently could not have gained the nation’s or Congress’s support for an intervention in the Straits of Tiran even if he had wanted to.

The main concern is that the existence of the Greater Tel Aviv area – indeed, the daily routine of the State of Israel – will come to be dependent on the goodwill of foreign forces. That is the heart of the matter. Do we want Israel to be no more than a haven for persecuted Jews where they can subsist under foreign protection? Or do we want Israel to be a place of freedom, a homeland, in which we alone are responsible for our own security and sovereignty?

The authors of the Allen document emphasize that Israel’s security would continue to be based on the IDF’s power. But it is hard to imagine under what circumstances Israel would attain the international legitimacy to pursue an offensive deep within the Palestinian state, should the need arise. Regarding the conditions that could justify an IDF operation in Palestinian territory, the document says:

The Palestinians will never agree to an Israeli right of re-entry, but there could be a side agreement between Israel and the United States on the conditions under which the United States would support unilateral Israeli action. Ultimately, Israel is a sovereign state that enjoys the right of self-defense. Thus, it can unilaterally violate the sovereignty of another state, but with the attendant risks that would have to be weighed by Israeli leadership.

Should the IDF evacuate the territories completely, as envisaged by this plan, the Palestinians would certainly employ their carefully honed tactical and strategic talent for nonaccountability and ambiguity. They would take care to ensure that the Palestinian state cannot be defined as a hostile entity against which a “just war” can be declared. Whether deliberately or not, they would be able to let “rogue,” non-state forces do their work for them, and avoid taking responsibility. What then?

There is also good reason to doubt whether conditions for demilitarization can be maintained. In an era of global arms proliferation, and of forms of smuggling that elude surveillance (as in the flow of weapons to Hamas in Gaza and to Hezbollah in Lebanon), along with increasingly sophisticated local arms manufacture, there is no way to guarantee real demilitarization without a constant effort to keep the territory fully isolated and to operate within it.

We must also take into account the possibility that war could erupt in more than one arena at at a time. If war were to break out with the state of Palestine in the West Bank, it could happen simultaneously in Lebanon, Gaza, and so on. The IDF would be unable to concentrate its efforts in the West Bank arena – which, because of its geographic proximity to Israel’s population centers, could inflict a heavy blow. Under the new conditions of war, which are fundamentally different from those that prevailed in June 1967, reconquering the territory would be incomparably more difficult.

And what of the document’s validity under changing conditions? The security solution the document proposes must be weighed in terms of the time dimension, and in circumstantial contexts that are subject to change. If a solution is responsible and workable, what time span is envisaged? Who knows under what evolving circumstances the solution will be required to provide protection to a state of Israel that has been trimmed down to the coastal plain? Is there not also a need for responsible risk management regarding contingencies that are still beyond the horizon?

We must ask to what extent we ourselves, with the excessive emphasis we have placed on security concerns in recent decades as a key criterion by which to assess any prospective solution, have laid the groundwork for Gen. Allen’s plan. His security document is, after all, intended expressly to offer a technical solution to all the familiar security issues. It would leave the Israeli leadership without the faintest possibility of invoking a security pretext to ward off the “peace solution.”

In describing Kerry’s efforts, Thomas Friedman asserted (The New York Times, February 17, 2013) that in light of Gen. Allen’s solution for Israel’s security concerns, the Israeli government had reached a juncture where it would have to choose between peace and ideology.

Perhaps we have forgotten that protecting the national existence, in terms of how the IDF defines national security, does not pertain solely to ensuring the physical existence of the citizens of the country but also to safeguarding national interests. A national interest – such as the sovereignty of the people of Israel in their capital, Jerusalem – can go far beyond the technical contents of a plan for security arrangements, however worthy. Security is only a means, not an end in itself.

From a practical, professional standpoint, Gen. Allen’s plan leaves much to be desired. But on a deeper level, it completely ignores the possibility that the people of Israel, in renewing their life in their homeland, are motivated by something much greater than the need for a technical solution to security concerns.

Illinois is Broke, Don’t Bother with a Lottery Ticket

No wonder the Obama’s chose not to move back….seems that community organizing resulted in a financial collapse…Rahm? You have a call holding on line 3.

Illinois careens into financial meltdown – and not even the lottery is safe

Illinois is grappling with a full-fledged financial crisis and not even the lottery is safe – with Republican Gov. Bruce Rauner warning the state is entering “banana republic” territory.

Facing billions in unpaid bills and pension obligations, the state is hitting a cash crunch that is rare even by Illinois standards.

A top financial official just warned 100 percent of the state’s monthly revenue will be eaten up by court-ordered payments. Rauner is calling a special session of the Democrat-led General Assembly in a bid to pass what he hopes will be the first full budget package in almost three years.

And Illinois will – literally – lose the lottery if the budget fails.

The state lotto requires a payment from the legislature each year. The current appropriation expires June 30, meaning no authority to pay prizes. In anticipation of a budget deadlock, the state already is planning to halt Powerball and Mega Millions sales.

“It is disappointing that the legislature’s inability to pass a budget has led to this development and will result in Illinois lottery players being denied the opportunity to play these popular games,” Illinois Lottery Acting Director Greg Smith told Fox News.

“We’re like a banana republic,” Rauner said earlier this month, after the General Assembly failed, yet again, to pass a budget package by the regular session deadline. “We can’t manage our money.”

Image result for headlines illinois bankrupt

The governor has called for a special session starting Wednesday. The state so far is operating on a series of stopgap spending packages.

But the problems are years in the making, caused in large in part by the state’s poorly funded pension system— which led Moody’s Investors Services to downgrade the credit rating to the lowest of any state. The state currently has $130 billion in unfunded pension obligations, and a backlog of unpaid bills worth $13 billion.

Reports have suggested the state could be the first to attempt to declare Chapter 9 bankruptcy — but under the law, that’s impossible unless Congress gets involved.

“Nobody here in Illinois is considering bankruptcy—first of all, it’s not allowed,” said Steve Brown, press secretary for Illinois House Speaker Michael Madigan. “Second of all, it would damage the reputation of the state and it’s just not necessary.”

U.S. Sens. Dick Durbin and Tammy Duckworth, both Democrats from Illinois, declined to respond to Fox News’ request for comment on whether they would consider getting involved in introducing a measure allowing state bankruptcy.

“Illinois is the fiscal model of what not to do,” Rep. Peter Roskam, R-Ill., told Fox News, while not commenting on the bankruptcy question. “This avoidance in behavior toward dealing with our challenges is what leads to the devastating impacts we are seeing today.”

Just last week, the Illinois comptroller, who is responsible for paying the state’s bills, warned the office would be paying out 100 percent of Illinois’ monthly revenue, leaving negative funds for “discretionary spending. ”

But Rauner claims the Republicans have a new plan that could remedy the state’s crippling financial situation.

“Republicans in the General Assembly have laid out a compromise budget that I can sign,” Rauner said, calling it a “true compromise.”

The plan incorporates reforms like property tax relief, term limits, and spending caps, which have caused an “ongoing confrontation” between Madigan and the governor, one Republican leader told Fox News, adding that the two have been in a “stalemate” since Rauner took office two years ago.

“Gov. Rauner inherited this financial mess when he took office, and his proposals have been met by resentment from the speaker,” Deputy House Republican Leader Dan Brady said.

Brady added, “we are asking that the speaker allow for a date and a vote before June 30.”

But Brown told Fox News  the governor isn’t making enough concessions.

“He’s not walking many back—the financial issues are serious enough, and he’s forcing things that have nothing to do with state government,” Brown said. “The biggest problem here is that the governor keeps associating a lot of things that do not have anything to do with the budget.”

Rauner has pushed for structural reforms, government consolidation and pension reform—some components that were able to pass on the Senate side.

“The people and businesses of Illinois deserve stability, not this ongoing chaos,” Senate President John J. Cullerton, a Democrat, told Fox News. The Illinois State Senate approved a balanced budget before the initial May 31 deadline that “matches” the governor’s spending proposal.

If the General Assembly fails to pass a budget package, they do have an option to pass another stopgap package, which lawmakers say is an option, but “not a good one.”

“We have a very real deadline looming,” Senate Republican Leader Christine Radogno told Fox News. “The alternative to not finding a compromise will be devastating to Illinois.”

The Associated Press contributed to this report.