A Wide Look at North Korea’s WMD Operations

Image result for north korea defector shot

photo

Primer:

South Korean surgeons operating on a North Korean defector who escaped across the Demilitarized Zone between the two countries under a hail of gunfire on Nov. 13 have found a parasite in the man’s stomach unlike any other they had seen.

The defector, who was shot five times, remained in critical condition after hours in two rounds of surgery, according to an article in the Korea Biomedical Review published on Nov. 15.

North Korean Cyber Operations: Weapons of Mass Disruption

Over the past 10 years, the escapades of various nation-state actors in the cyber realm have exploded onto the pages of top-tier media, and into prime time network news.

Russian espionage against political targets during the 2016 US presidential election, wide reaching Chinese espionage against Western commercial targets, disruptive attacks against the US financial sector associated with Iran, and the destructive attacks against Sony Pictures Entertainment (SPE) are some of the premier examples of mainstream coverage of ‘cyber.’

Behind every single offensive cyber action conducted in the interest of the capable nation-states is a doctrine,[1] and North Korea, like many other nation-states, has incorporated cyber operations within their own broader military doctrine and has conducted numerous offensive operations in the furtherance of their national agenda. What is particularly alarming about DPRK operations is their willingness to initiate escalatory actions, such as their likely connections to the now infamous WannaCry ransomware, and their targeting of the global financial system.

North Korea’s disregard for the consequences of its actions sets them apart from other nation-states, and is particularly dangerous.

North Korean offensive cyber operations have been conducted to collect sensitive political and military intelligence information, to lash out at enemies who threaten their beliefs and interests, and most interestingly, to generate revenue.

This revenue generation aspect of North Korean operations was thrust into the international spotlight when, in early 2016, unauthorized transfers of funds from the Bangladesh Central Bank were issued using the Society for Worldwide Interbank Financial Telecommunication (SWIFT) network for global banking. The attempted transfers amounting to over $950 million USD sought to move funds to entities in locations such as Sri Lanka and the Philippines; ultimately $81 million USD in funds disappeared into the ether.

The subsequent investigation revealed that the perpetrators of the attack used tools to securely delete records from the SWIFT terminals that would alert Bangladesh Central Bank employees of the transfers. Commonly referred to as a “wiper,” this secure deletion tool contained code that was linked by many in the computer security industry to one used in attacks associated with North Korea, notably the attack on SPE through a US Computer Emergency Response Team (USCERT) alert. The revelation that a state would engage in such a flagrant violation of international norms came as a surprise to many in the information security arena. North Korea watchers were, of course, not surprised as the currency generation activities benefiting the Kim family and their isolated nation have been well understood for some time.

The 2016 SWIFT attacks associated with North Korea are part of the broader currency generation operations of DPRK cyber actors and intelligence organizations. Botnets associated with espionage activity targeting South Korea have been used to generate revenue through a variety of schemes for almost 10 years. Recent DPRK activity suggests an interest in obtaining cryptocurrency, such as bitcoin, through extortion and targeting of cryptocurrency exchanges.

In the third quarter of 2017, for instance, malicious emails containing weaponized documents were used to target international financial organizations, as well as bitcoin exchanges. The ultimate goal of these attacks, which were tracked by the information security community under names such as Stardust Chollima and BlueNoroff, is yet unknown, however theft and sabotage are likely.

Bitcoin provides attractive benefits to the isolated nation due to a lack of regulation and the ability to subvert international sanctions. In May 2017, ‘WannaCry’ exploded across the internet, encrypting sensitive material and holding the keys to decrypt the files for a ransom to be paid in bitcoin. This attack, too, had North Korean fingerprints embedded in the code used to execute the attack, as did the tools that were used to develop that code.

Attribution is a particularly sensitive subject in the cyber domain. Technical artifacts from the executable code that was used to conduct the WannaCry attack overlaps with code used in attacks against South Korean nuclear power plants and the SPE attack of 2014. While the technical artifacts can provide some measurable connections between the attacks, they require deep technical understanding to interpret. Other linkages, such as targeting and operational procedures, are the product of intelligence assessments and have been disputed by various parties muddying the water surrounding the assigning of attribution.

North Korea is an exception to the classical understanding of how most nations implement offensive cyber operations in that they incorporate espionage, disruptive/destructive attacks and financially motivated operations using the same computer code and infrastructure.

The value of cyber operations is likely recognized by North Korea’s most senior leadership through the State Affairs Commission (SAC), the General Staff of the Korean People’s Army, and Kim Jong Un himself. Subordinate units, notably the Reconnaissance General Bureau (RGB), Bureau 121, and the Command Automation Bureau (CAB), are likely responsible for executing the specific operations. The individual units may have a charter to self- finance their operations, or to contribute financial gains back to the regime, but it seems clear that various offensive operations are conducted by differing groups with their own approach and missions. For example, one group may have a primary focus on revenue generation, targeting South Korean banks and SWIFT and conducting extortive attacks, while another group might focus on intelligence collection, while a third conducts sabotage and destructive attacks.

Finally, the maturity of North Korean offensive cyber operations has been demonstrated through the integration of destructive attacks by cyber units during military exercises executed in the midst of escalating tension with South Korea. For instance, following the December 2012 launch of the Kwangmyongsong-3 satellite via the Unha-3 satellite launch vehicle, tensions on the Korean peninsula were high. That March, following the passing of UN Security Council Resolution (UNSCR 2087) and B-52 strategic bomber overflights in South Korea, North Korea responded with a particularly aggressive disruptive attack against South Korea.

This massive wiper attack targeted South Korea’s financial and media sectors and coincided with provocations by North Korean military and escalating political rhetoric. This pairing allowed for maximum psychological impact, while demonstrating North Korea’s ability to integrate offensive cyber activities into well-developed military doctrine. During these attacks, the Korea Broadcasting System (KBS), Munhwa Broadcasting Corporation (MBC), Yonhap Television News (YTN) and several Korean financial institutions reported disruptions. With the threat of military escalation on the table, many in South Korea would have depended on the media outlets for breaking news. Disruption of ATM networks and financial institutions would further add to the chaos as word of media disruptions began to spread.

As tensions are once again escalating between North Korea and the international community, more attacks perpetrated by DPRK cyber actors are likely. The recent increase in financial sector targeting associated with these actors may illustrate the potential for disruptive attacks to demonstrate both the capability of the North Korean actors, as well to achieve objectives in line with their broader military doctrine. While North Korea’s isolation may be detrimental to its economy and international relations, it is an effective shield from which to launch offensive cyber operations against a connected and delicate global system.


  1. [1]

    In order to establish some common definitions, we can look to the United States Department of Defense, who established Computer Network Operations (CNO) as a component of the broader Information Operations (Information Warfare) arena. CNO is further categorized into Computer Network Exploitation (CNE), Computer Network Attack (CNA), and Computer Network Defense (CND). Offensive cyber operations conducted by nation-states using this model would be considered CNE and CNA. The use of CNE can be roughly characterized as espionage, whereas CNA would be used to degrade, deny, disrupt, or destroy the network based systems of an adversary. This model can help provide a clear delineation of how various military, intelligence community, and law enforcement agencies with their authorities are able to conduct operations. China, Russia, Iran and virtually every nation-state in the world conduct CNE/CNA operations in accordance with their legal authorities and national interests.

    ***

    There are other weapons few discuss.

    Pyongyang has already achieved partial coverage of US territories. Last June, in a hearing before the US House Armed Services Committee, the head of the US Missile Defense Agency, Vice Admiral James Syring, said: “The advancement and demonstration of technology of ballistic missiles from North Korea in the last six months have caused great concern to me and others. It is incumbent on us to assume that North Korea today can range the US with an ICBM carrying a nuclear warhead.”

    This particular endeavor was likely assisted by Tehran. A February 2016 report by the Congressional Research Service concluded, “Iran has likely exceeded North Korea’s ability to develop, test, and build ballistic missiles.” Tehran might be, and probably is, helpful to Pyongyang with respect to technological aspects of the nuclear sphere as well.

    The nuclear component within the spectrum of North Korea’s weapons of mass destruction (WMDs) is evidently growing. The big question is whether the country’s despot, Kim Jong-un, will be the first person to use nuclear weapons since 1945.

    Quite recently, Kim elected to employ a highly lethal chemical weapon, the nerve agent VX, for a political assassination. This weapon was used last February by two female operatives, one Indonesian and the other Vietnamese, to murder Kim Jong-un’s estranged half-brother, Kim Jong-nam, in Malaysia. The victim died shortly after being assaulted by the two women, who wiped VX on his face as he prepared to board a flight to the Chinese territory of Macau. Traces of VX were revealed on swabs taken from his eyes and face.

    This deadly chemical agent was probably smuggled from North Korea to Malaysia, which in and of itself was an intriguing and risky move. Six of eight potential suspects were from Pyongyang’s Ministries of State Security and Foreign Affairs. The suspects flew from Kuala Lumpur on the day of the assassination, passing through Vladivostok on their way back to Pyongyang. South Korea’s request to detain four of the suspects was rejected by Russian officials on the grounds of lack of evidence.

    It can be assumed that Kim Jong-un was in on the plot from its inception. Symbolically, at least, this political assassination by VX can be regarded as an indication of Pyongyang’s chemical weapons (CW) capabilities. Whether the regime intended it to or not, the assassination signaled the readiness, usability, and deployability of North Korea’s VX, which can be used for guerrilla warfare, chemical terrorism, or wide-scale chemical attack.

    VX is also weaponized within warheads carried by ballistic missiles in Pyongyang’s  vast CW arsenal. The North Korean ballistic program constitutes the principal, though not the only, vehicle for all three WMD programs. The CW and biological weapons (BW) programs are fully matured and have marked operational offensive capabilities. Inadequate attention is being paid to Pyongyang’s large-scale offensive capacities in terms of CW and BW, but the VX political assassination incident was a wake-up call (if unintentional). More here.

Top Progressives/Dark Money Meeting at Cali Resort

Beyond Resistance it is called….watch that hashtag through 2020. Meanwhile, if Kamala Harris is there with Van Jones and George Soros with Nancy Pelosi, you know the agenda is being crafted.

Image result for beyond resistance soros photo

Resistance Royalty: Pelosi, Soros Headline Left’s Biggest Dark Money Conference

Private memo gives inside look at Democracy Alliance’s latest secret donor meeting

CARLSBAD, Calif.—A secretive three-day conference where big money liberal donors are plotting the next steps of the “resistance” will be headlined by Friday speeches by billionaire George Soros and Democratic House Minority Leader Nancy Pelosi, according to internal documents obtained by the Washington Free Beacon.

The Democracy Alliance, a donor club of deep-pocketed liberal donors that each pledge to direct hundreds of thousands of dollars in funding to approved left-wing groups, descended on California’s posh La Costa Resort on Wednesday morning for its fall donor summit. The group continued its tradition of secrecy, promising all members and guests of the summit their participation would “remain confidential.”

The 38 page conference program is found here.

The first page of the conference agenda, which was obtained by the Washington Free Beacon and can be viewed in its entirety below, lays out “participation guidelines,” explaining that the Democracy Alliance is a “safe place” for donors and activists to meet. Guests are instructed not to share members’ names with the press and not to post to any social media sites, to contact Democracy Alliance if “the media or a blogger” contacts them, and to “refrain from leaving sensitive materials out where others may find them.”

This latter directive was ignored.

The agenda for the meeting, titled “Beyond #Resistance: Reclaiming our Progressive Future,” lays out three full days of events culminating in a Friday night dinner headlined by Pelosi.

A few hours earlier guests can attend “A Talk with George Soros,” who will be introduced with a “special videotaped message” by Democratic senator Kamala Harris (Calif.).

All of the events are scheduled to take place at the La Costa Resort, which features 17 tennis courts of both clay and hard surfaces including one with 1,000 seats for spectators, 36 holes of golf on the Legends Course and the Champions Course, an array of pools including three hot tubs that overlook said golf courses, a spa building, and the Deepak Chopra Center, where guests can do yoga or receive mind-body medical consultations.

Pelosi and Harris are not the only two politicians to have a presence at the swanky conference—Pennsylvania governor Tom Wolf (D.) held a Thursday event on his reelection efforts, Sen. Amy Klobuchar (D., Minn.) will speak on Friday about “Russian interference in the 2016 election,” and Rep. Ben Ray Lujan (D., Minn.), who chairs the DCCC, will attend a “festive brunch” on Saturday morning. Also making a “special appearance” on Friday will be Virginia’s governor-elect Ralph Northam.

The agenda also lists “special guests” at the conference, some more famous than others. Attendees showcased in the agenda range from failed California politician Sandra Fluke to liberal CNN contributor Van Jones to Center for American Progress CEO Neera Tanden.

Jones was headlining a Thursday dinner on “going outside the bubble” and learning from Trump voters.

Not all events and prominent guests are listed in the conference agenda.

Not listed, for example, was a Thursday night happy hour hosted by Planned Parenthood president Cecile Richards, who was spotted in attendance.

Also not listed as a special guest at the conference was David Brock, who checked in early Wednesday afternoon and has made himself highly visible at La Costa—slowly strolling around the sprawling property and staying up at the hotel bar till past midnight.

Brock is not a “partner” of Democracy Alliance—in fact, he has worked to create his own liberal donor network—but groups he controls, such as Media Matters for America, are among the many groups Democracy Alliance directs funding to.

Not listed in the agenda or spotted at the resort has been billionaire Tom Steyer, one of Democracy Alliance’s most prominent members in the past. Pelosi publicly reprimanded Steyer earlier this month for running a $10 million ad calling for President Trump’s impeachment.

Also not listed in the Democracy Alliance program was a meeting held by Patriotic Millionaires, who gave a Thursday morning briefing on the “tax fight” and “what is at stake.” The briefing was delivered by Larry Mishel of Americans for Tax Fairness, Thea Lee of Economic Policy Institute, and Jacob Leibenluft, a member of the Obama administration’s National Economic Council who is now with the Centeron Budget and Policy Priorities.

Not all meetings at the conference are open to all guests. Some meetings are “by invitation only,” “for prospective partners only,” or for “partners only.”

Right before Pelosi’s speech, for example, will be a “Partners only” forum dedicated to “committing resources.” The Democracy Alliance has never made its commitment decisions available to the public.

Democracy Alliance president Gara LaMarche wrote in a letter to attendees included in the agenda that President Trump’s November victory was “the most cataclysmic election of modern history.”

They are show a film by Heather Booth….the founding director of Midwest Academy. Just a few minutes into this video, you can see that child care is a social issue….other people need to pay for it…setting the table as child care turned into political power.

The Midwest Academy has been the go-to training school for turning social justice organizing into practical lessons for social justice organizers. Trainers from the Academy will join CTCP-funded staff for a three-day training that will cover the essentials of community organizing and developing strategies to build organizational power.

In the 1980s, MA was indirectly responsible for funding Barack Obama’s early organizing work, which began in June of 1985 in Chicago. At the time, Obama received key support from the Catholic Campaign for Human Development (CCHD) and the Woods Fund of Chicago. In both cases, Ken Rolling — who was a high official with the Midwest Academy, a Woods Fund board member, and a longtime member of CCHD’s national committee — likely played a major role in dispensing this money.

To this day, MA continues to indoctrinate its students in “us-versus-them” ideology, thereby producing an ever-growing cadre of radicalized activists. One prominent MA graduate is Service Employees International Union (SEIU) president Andrew Stern.

MA’s training sessions — titled “Organizing for Social Change” — are typically five days long. They teach techniques of “direct-action organizing,” whereby people are made “aware of their own power” to “take collective action on their own behalf” and address such societal issues as “rising inequalty in income and wealth.” MA’s openly confrontational modus operandi is reflected in a quote, attributed to Frederick Douglass, which appeared on the Academy website’s homepage as of January 2011: “Power concedes nothing without a demand. It never did and never will.” The chief objectives of MA’s tactics are interrelated: “electing our people to office” and “changing laws and regulations.”

MA training sessions cover such topics as “choosing problems and issues” on which to focus, “understanding preconditions for social change movements,” and obtaining “good media coverage.” Role-play techniques are used in order to help students determine what tactics work best in various situations: e.g., “stand or sit, shout or remain calm, make threats or try to reach consensus.”

An inviolable core principle undergirding all of MA’s tactics is that in every case, activists must “target” a “decision maker”; i.e., a “person or persons” who can be “forced” to “give you what you want.” Observing a central tenet of Saul Alinsky’s community-organizing doctrines, MA emphasizes: “The decision maker is always a person, never as institution.” (Alinsky taught that the people’s discontent must be directed, without exception, at an identifiable face — “a personification, not something general and abstract like a corporation or City Hall.”)

Toward this end, MA activists commonly employ a technique known as the “accountability session,” whereby they target a specific person — e.g., a government official or corporate CEO who possesses the authority necessary to make a decision vis a vis a matter of concern to MA. The activists arrange to meet with this person, telling him or her that they merely wish to have a certain existing policy or plan explained to them. At the meeting, however, the official is confronted by a large number of angry protesters; their activities are directed by an experienced organizer who has analyzed the official’s personal and family life, political connections, and career to find vulnerabilities where pressure can be applied.

To provide an overall structure for its training programs, MA has produced a 425-page manual titled Organizing for Social Change, co-authored by former MA trainer Kim Bobo, MA co-founder Steve Max, and current MA executive director Jackie Kendall. This publication is widely used by radicals and community organizations around the world as a textbook on how to conduct direct-action organizing. Such groups as the Children’s Defense Fund, NARAL, the Sierra Club, and the United States Student Organization have used the manual for training purposes. The AFL-CIO has incorporated the manual’s teachings into its “Union Summer” training camp for labor organizers. Former AFL-CIO president John Sweeney and the Rev. Jesse Jackson have highly encouraged their supporters to read it.

In December 2005, MA announced its establishment of an annual “Heather Award,” in honor of Heather Booth’s decades of work as an activist leader.
To view a list of this award’s past recipients, click here.

In 2008, MA executive director Jackie Kendall served on the team that developed the first volunteer-training program for “Camp Obama,” a two-to-four day intensive course — run in conjunction with Barack Obama’s presidential campaign — designed to cultivate political activists who could help the Illinois senator win the White House.

MA endorsed the October 2, 2010 “March on Washington” organized by One Nation Working Together, an event whose purpose was to inspire “an intensive voter-mobilization program for Election Day 2010.”
For a list of other notable endorsers, click here.

Image result for midwest academy chicago

 

Senate Judiciary and Ethics Cmte call for Several Reviews

Investigate, review, examine… no wonder nothing is advancing inside the beltway.

Abbe Lowell is Senator Menendez’s lawyer by the way, who case was declared a mistrial.

Menendez’s bribery and corruption trial ended with the judge declaring a mistrial on Thursday after jurors were unable to come to a consensus on the felony charges after days of deliberating.

The decision is largely considered a win for Menendez, with 10 jurors favoring acquitting him on the charges, while two did not.

But McConnell said the months-long trial “shed light on serious accusations of violating the public’s trust as an elected official, as well as potential violations of the Senate’s Code of Conduct.”

McConnell’s request came hours after he also called on the Ethics Committee to review allegations of sexual misconduct against Democratic Sen. Al Franken (Minn.). McConnell has also warned GOP Senate candidate Roy Moore that he will face an ethics investigation if he wins the special election in Alabama next month. More here.

Foreign Agent Registry, in U.S. and Russia for Media

FARA is the most broken system we have when it comes to checks and balances…we cant begin to determine foreign media operations in the U.S. that are really espionage networks much less ad agencies or lobbyists. Scary right? How about foreign students that are operatives or foreign workers with jobs in government roles or in government contractor positions…we dont even know what we dont know….

Senator Chuck Grassley has called for some changes to FARA.

This is getting testier by the day….the United States is requiring RT to register as a foreign agent. Likewise, Moscow is requiring the same…so thinking about WikiLeaks or Fusion GPS, is there enough evidence they should be registered as foreign agents? Sheesh…here is the rub…

Russian Lawmakers: 9 US-Funded News Outlets Could Be Forced to Register as ‘Foreign Agents’

Russia said Thursday it has warned nine United States government-funded news operations they will probably be designated “foreign agents” under new legislation in retaliation to a U.S. demand that Kremlin-supported television station RT register as such in the United States.

The Russian Justice Ministry said Thursday it had notified the Voice of America (VOA), Radio Free Europe/Radio Liberty (RFE/RL) and seven separate regional outlets active in Russia they could be affected.

The ministry published a list of the outlets on its website, including a statement that said the changes were likely to become law “in the near future.”

Expands 2012 law

Russia’s lower house of parliament approved amendments Wednesday to expand a 2012 law that targets non-governmental organizations to include foreign media. A declaration as a foreign agent would require foreign media to regularly disclose their objectives, full details of finances, funding sources and staffing.

Media outlets also may be required to disclose on their social platforms and internet sites visible in Russia that they are “foreign agents.” The amendments also would allow the extrajudicial blocking of websites the Kremlin considers undesirable.

“We can’t say at this time what effect this will have on our news gathering operations within Russia,” said VOA Director Amanda Bennett. “All we can say is that Voice of America is, by law, an independent, unbiased, fact-based newsorganization, and we remain committed to those principles.”

RFE/RL President Tom Kent said until the legislation becomes law, “we do not know how the Ministry of Justice will use this law in the context of our work.”

No access to cable in Russia

Kent said unlike Sputnik and other Russian media operating in the U.S., U.S. media outlets operating in Russia do not have access to cable television and radio frequencies.

“Russian media in the U.S. are distributing their programs on American cable television. Sputnik has its own radio frequency in Washington. This means that even at the moment there is no equality,” he said.

The speaker of Russia’s lower house, the Duma, said Tuesday that foreign-funded media outlets that refused to register as foreign agents under the proposed legislation would be prohibited from operating in the country.

However, since the law’s language is so broad, it potentially could be used to target any foreign media group, especially if it is in conflict with the Kremlin. Comparatively, the U.S. law targets only state-funded groups. The privately owned American television channel CNN and the German public broadcaster Deutsche Welle also have been mentioned as potential targets.

The amendments, which Amnesty International said would inflict a “serious blow” to media freedom in Russia if they become law, were approved in response to a U.S. accusation that RT executed a Russian-mandated influence campaign on U.S. citizens during the 2016 presidential election, a charge the television channel denies.

Putin has last word

The amendments must next be approved by the Russian Senate and then signed into law by President Vladimir Putin.

RT, which is funded by the Kremlin to provide Russia’s perspective on global issues, confirmed Monday it met the Justice Department’s deadline by registering as a foreign agent in the U.S.

The United States considers RT a propaganda arm of Russia, and told it to register its foreign operation under the Foreign Agents Registration Act aimed at attorneys and lobbyists representing political interests.

About that FBI Uranium One Informant, Mr. Campbell

His name is William Douglas Campbell and he was a former lobbyist for Tenex, the US-based arm of Rosatom, the Russian government’s nuclear agency. Guy Benson had it right on Tucker Carlson’s show…this Uranium One deal is not quite what the conservative media is telling you.

So when AG Jeff Sessions says he will have the Justice Department look at ‘certain aspects’ of the case, reading below, you will be to understand why his words matter.

We have this trucking company that was hired. Transport Logistics International, Inc. provides transportation management services to front-end and back-end sectors of the nuclear power industry. The company manages domestic and international movements of radioactive materials between North America, South America, Europe, Asia, Africa, and Australia. It also offers DOT-compliant training and consulting services associated with transportation feasibility studies, export licensing activities, package validations, and antidumping order compliance. In addition, the company provides professional support for the packaging and transportation of isotopes and related products for commercial and research sectors, as well as for spent fuel transportation. Key executives include:

Co-President and Managing Partner
Co-President and Managing Partner
Director of Operations
Director of TLI Russia
Consultant

Anyway, moving on….

The full criminal complaint is here.

The U.S., meaning Obama and Hillary did not exactly selling 20% of the U.S. inventory of uranium to Russia. Actually, Uranium One USA, LLC, a wholly owned subsidiary to Uranium One, Inc. actually owned the rights to a uranium mine in Casper, Wyoming. And while Hillary is being blamed, she never cast a vote on the transaction at the CFIUS committee. The real question is not selling the uranium but selling the mining location to Uranium One…who authorized that?

Uranium One, at the time the deal was made, controlled land equal to about 20 percent of the United States’ uranium capacity.

 ***
At the time of the sale, Campbell was a confidential source for the FBI in a Maryland bribery and kickback investigation of the head of a U.S. unit of Rosatom, the Russian state-owned nuclear power company. Campbell was identified as an FBI informant by prosecutors in open court and by himself in a publicly available lawsuit he filed last year.
 Also, although both Uranium One and the bribery cases involved Rosatom, the two cases involved different business units, executives and allegations, with little other apparent overlap, Reuters found in a review of the court records of the bribery case.
Campbell countered those who dismiss his knowledge of the Uranium One deal. “I have worked with the Justice Department undercover for several years, and documentation relating to Uranium One and political influence does exist and I have it,” Campbell said. He declined to give details of those documents.

BRIBERY SCHEME

Campbell worked as an informant for federal authorities investigating Vadim Mikerin, a Russian official in charge of U.S. operations for Tenex, a unit of Rosatom. Authorities later accused Mikerin of taking bribes from a shipping company in exchange for contracts to transport Russian uranium into the United States. He pleaded guilty in federal court in Maryland and was sentenced to prison for four years.

The Justice Department had also initially charged Mikerin with extorting kickbacks from Campbell after hiring him as a $50,000-a-month lobbyist.

Prosecutors alleged Mikerin had demanded Campbell pay between one-third and half of that money back to him each month under threat of losing the contract and veiled warnings of violence from the Russians. The demand prompted Campbell to turn to the FBI in 2010, which gave its blessing for him to remain part of the scheme.

Federal prosecutors were ready to use Campbell as a star witness against Mikerin, but they backed away after defense attorneys raised questions about Campbell’s credibility and whether he was a victim or had “entered into a business arrangement with eyes wide open,” according to court records.

Before it was taken down last year, the website of Campbell’s company, Sigma Transnational, did not suggest his firm was a lobbying powerhouse. The website listed four other employees and advisers, although one had died years earlier. A second employee listed said in a court document that she never worked for the company but had agreed in 2014 to pay Campbell to list her as an employee and allow her to use the Sigma name in a business deal. Campbell declined to comment on the staffing or his lobbying contract with Tenex.

Prosecutors dropped the extortion charges against Mikerin and never mentioned Campbell again in any charging documents. A Justice Department spokeswoman declined to comment on the case. Campbell also declined to comment on the issue.

Reuters has been unable to learn why Tenex chose Campbell as its lobbyist. He acknowledged in lawsuit he filed in 2016 that he was hired despite the fact he “had no experience with nuclear fuel sales.” More here from Reuters.