Decertify the Iran Nuclear Deal or Not, Such Questions

We know that the Trump administration has already certified Iranian compliance once, yet now there is a question as to whether it will be certified again or the White House will move to terminate the whole JCPOA.

Is Iran complying with the ‘spirit’ of the agreement? Hardly, yet should it be ended completely? There are implications and Iran for sure is not a partner that can be trusted as it continues to export terror throughout the Middle East and has it hands in other regions of the globe including Latin America.

photo

Arab News reports in part:

Through its military forces, the Islamic Republic is actively engaged in intervening in the domestic affairs of other nations in the Middle East. For example, in Syria, Iranian leaders have admitted that their Islamic Revolutionary Guard Corps (IRGC) and its elite branch, the Quds Force, are fighting on the ground alongside Bashar Assad’s forces. In addition, Iran is providing financial, weapons, advisory and intelligence assistance to the Syrian regime apparatus.
Putting their direct military intervention aside, Iranian leaders have successfully formed powerful proxies and Shiite militias in Syria in order to serve the revolutionary and geopolitical interests of Iran’s Supreme Leader Ayatollah Ali Khamenei and his gilded circle.
The Iranian leaders’ plan is a long-term one — to make political realities out of these militias, ensuring Iran’s infiltration and domination of the nation in case Assad falls. In other words, Iran’s plan is to make itself a winner whether the Syrian president is toppled or remains in power, as Tehran would continue to have influence and control in the security, political and intelligence infrastructure of Syria. Furthermore, under the aegis of the IRGC, Iran’s leaders believe they have ensured their presence in Iraq for decades to come, as well as being capable of dictating Iraq’s future policies by setting up the People’s Mobilization Forces (PMF). The PMF is a conglomerate of more than 40 Iraqi militia groups, which act in favor of the Iranian regime’s interests and enjoy close ties with the head of the Quds Force, Qassem Soleimani. More here.

As for compliance to the JCPOA, how about violations? Seems there are indeed violations as reported by a segment of German Intelligence.

Iran tried to obtain illicit technology that could be used for military nuclear and ballistic missile programs, raising questions about a possible violation of the 2015 agreement intended to stop Tehran’s drive to become an atomic armed power, according to three German intelligence reports obtained by Fox News.

The new intelligence, detailing reports from September and October and disclosed just ahead of President Trump’s planned announcement Thursday on whether the U.S. will recertify the Iran deal, reveals that Iran’s regime made “32 procurement attempts … that definitely or with high likelihood were undertaken for the benefit of proliferation programs.”

According to the document, the 32 attempts took place in the German state of North Rhine-Westphalia. The report lists Iran as a nation that engages in proliferation, which is defined as “spreading atomic, biological or chemical weapons of mass destruction.”

Missile delivery systems are also included in the definition of illicit proliferation activity in the report.

The North Rhine-Westphalia agency accused Iran of using front companies in the United Arab Emirates, Turkey and China to circumvent international restrictions on its nuclear and missile programs.

The intelligence report, which covered the year 2016 — the Iran deal was implemented on Jan. 16, 2016 — calls further into question Iran’s compliance with the agreement, formally known as the Joint Comprehensive Plan of Action, or JCPOA.

In a second intelligence report obtained by Fox News, the German state of Hessen said Iran, Pakistan, North Korea and Sudan use “guest academics” for illegal activities related to nuclear and other weapons programs. “An example for this type of activity occurred in the sector of electronic technology in connection with the implementation of the enrichment of uranium,” the document reads.

The intelligence officials also cited an example of foreign intelligence services using “research exchanges at universities in the sector of biological and chemical procedures.”More here.

Most will say the JCPOA should be decertified or terminated. Yet, as a matter for consideration, if that action is taken rather than to work to amend the deal, such that if that fails then terminate, the United States’s reputation will be such that it cannot be trusted failing other attempts….just consider….frankly, this site is fine with termination given aggressive repercussions.

Perhaps Israel should get a voice this time around.

DoJ Investigates Harvard U, How About other Universities?

We keep hearing the term ‘class warfare’ meaning the population in the United States has been officially divided into groups where the left has applied labels. This essentially translates to breaking down the profiles of people into segmented minority groups such as LGBT, color, religion, culture, country of origin and economic status. Hence the divisions manifest.

College campuses are the incubation hubs for where the defined groups are most notable and Harvard is being investigated by the Department of Justice on the matter of admissions related to exacerbating division and class warfare.

Investigating Harvard is a good start and may provide a model for what is occurring at other universities such as Berkeley, Columbia, Georgetown and hundreds more.

Related reading: Since 1978

Newsweek published a summary which itself appears to endorse the affirmative action via admissions not only at Harvard but any college across the country. The debate begins…

Harvard’s Affirmative Action Program is Now the Subject of a DOJ Investigation

The Trump administration is investigating Harvard University over whether the elite university is favoring particular racial groups in its admissions policies — a probe that critics say is an attack on affirmative action on campus.

The Department of Justice confirmed its investigation, which follows reports that the agency was hiring lawyers to begin a probe into whether Harvard was exercising “intentional race-based discrimination” to pick its student body, the New York Times reported in August.

Supporters of affirmative action, which allows colleges to use race as a factor in their selection process, said such an investigation would undermine educational opportunities for students of color.

“The Department of Justice has launched an unprecedented assault on efforts to promote racial diversity in higher education,” said Kristen Clarke, president and executive director of the Lawyers’ Committee for Civil Rights Under Law, a national watchdog group.

The Justice Department has not outlined which racial groups it believes are being favored at Harvard or, potentially, other universities. But the department’s actions under Attorney General Jeff Sessions are aligning with an argument popular in right-wing circles that affirmative action is reverse discrimination that hurts white students. Critics say the Justice Department investigation is a big by the Trump administration to energize its base.

The Justice Department’s move arrives when for the first time the majority of Harvard’s incoming class was made up of minorities, with 50.8 percent of the Class of 2021 from racial minorities, up from 47.3 percent last year.

“When you think about what the top priorities for the Department of Justice should be at this time when it comes to civil rights, I can’t imagine that chiming in for the first time against affirmative action policies should be at the top of the list,” Austin Evers, executive director of American Oversight, told Newsweek.

Evers’s group had filed a freedom-of-information request that led to the Justice Department revelation that it was indeed investigating Harvard.

Officially, the Justice Department has it was following up on a 2015 federal complaint filed by more than 60 Asian-American associations.

Harvard officials declined to comment on the investigation.

The alleged attack on affirmative action comes after Eric Dreiband, Trump’s pick to lead the Civil Rights Division, once defended the University of North Carolina when it was accused of discriminating against transgender people. Civil rights group protested his nomination to the position.

“The fact that Mr. Dreiband failed to separate himself from or condemn the politically charged investigations into affirmative action policies at colleges and universities makes his nomination even more concerning in light of this new information regarding the Department’s efforts,” Clarke said.

In 2016, the Supreme Court upheld the basic ideals of affirmative action, asserting that race could remain a factor considering a student’s admittance into a university. The court also cautioned universities to continually review their affirmative action programs and suggested that not all programs could stand up against “reverse racism” challenges. Supporters of affirmative action were frustrated that the High Court did not use the case to end all challenges to using race as a factor in selecting students.

Indeed, Harvard’s frustration was apparent in a statement issued to Newsweek with its no comment on Thursday: “To become leaders in our diverse society, students must have the ability to work with people from different backgrounds, life experiences and perspectives,” the school said. “Harvard remains committed to enrolling diverse classes of students. Harvard’s admissions process considers each applicant as a whole person, and we review many factors, consistent with the legal standards established by the U.S. Supreme Court.”

Not an Inch of the US is Safe, Consider This…

Equifax hacked, NSA hacked, active shooters, stolen identity, bad legislation being signed by presidents, townhalls being disrupted by activists, leaked classified material, nefarious people roaming Elm Street and violence on college campuses…..not a complete list but even top people in Washington DC are not protected either.

Check this out…

photo

John Kelly’s personal phone has been compromised for months

White House tech support discovered the suspected breach after Kelly turned his phone in to tech support staff this summer.

White House officials believe that chief of staff John Kelly’s personal cell phone was compromised, potentially as long ago as December, according to three U.S. government officials.

The discovery raises concerns that hackers or foreign governments may have had access to data on Kelly’s phone while he was secretary of the Department of Homeland Security and after he joined the West Wing.

Tech support staff discovered the suspected breach after Kelly turned his phone in to White House tech support this summer complaining that it wasn’t working or updating software properly.

Kelly told the staffers the phone hadn’t been working properly for months, according to the officials.

White House aides prepared a one-page September memo summarizing the incident, which was circulated through the administration.

A White House official, speaking for the administration, said Kelly hadn’t used the personal phone often since joining the administration. This person said Kelly relied on his government-issued phone for most communications.

The official, who did not dispute any of POLITICO’s reporting on the timeline of events or the existence of the memo, said Kelly no longer had possession of the device but declined to say where the phone is now.

Kelly has since begun using a different phone, one of the officials said, though he relies on his government phone when he’s inside the White House.

Several government officials said it was unclear when – or where – Kelly’s phone was first compromised. It is unclear what data may have been accessed, if any.

Kelly’s travel schedule prior to joining the administration in January is under review. The former Marine general retired in 2016 as chief of U.S. Southern Command.

Staffers reviewed the cell phone for several days and tried to decipher what had happened to it, the officials said. Many functions on the phone were not working.

The IT department concluded the phone had been compromised and should not be used further, according to the memo.

The document triggered concern throughout the West Wing about what information may have been exposed, one of the officials said.

The revelation comes amid an internal probe at the White House into personal email use. Senior officials, including Jared Kushner and Ivanka Trump, have at times used personal email for government business, POLITICO has reported.

Additional storage lockers were recently added in the West Wing for personal devices and aides have been warned to limit personal cell phone use in the building.

Bill Marczak, a senior research fellow with the Citizen Lab at the University of Toronto’s Munk School of Global Affairs, said the worst-case scenario would be “full access,” where an attacker would be able to essentially control a device, including its microphone and camera.

“The [attackers] I would be most worried about are nation-states or other actors who may have access to resale of commercial spyware sold to nation-states,” he said.

“The average user won’t notice anything at all. Really the only way to pick up on that is to do forensics on the phone,” he added.

This article was reported in coordination with the Project On Government Oversight, a nonprofit investigative watchdog organization.

Active Shooter Education and Detail

Primer: Active Shooter Workshop Participant

Related Reading: Active Shooter: How to Respond Educational Booklet

Review of active shooter resources and training
The scope of the Las Vegas shooting this week is disturbing and brings the worry of
copycats. It is a good time to review active shooter or mass violence incident plans
and hold training or drills to run through them. It’s also a good time to re-establish
inter- and cross-jurisdictional partnerships with other responding agencies. Good
interagency cooperation doesn’t happen accidentally.

The Department of Homeland Security (DHS) has a dedicated site with active shooter
response resources, documents and training available for first responders and the
public. The resources for the public are translated into eight languages. They also
have information specifically for those in the human resources and security fields.
The FBI has a similar site with resources and training, including the “Run. Hide.
Fight.” video training and an overview of the FBI’s roles in an active shooter incident.
In addition, they have a section of studies on past active shooter incidents and
guides to developing emergency operations plans for schools, institutions of higher
learning and houses of worship.

Firefighters played a significant role in the response. Firefighters and EMTs should
have working knowledge of their role in violent incidents well before being in
the middle of one. The U.S. Fire Administration (USFA) published a report on
operational considerations for fire and EMS during such incidents and the National
Fire Protection Association (NFPA) is currently working on a standard. FireRescue1
and EMS1 both have numerous articles on this topic.

In July, Lexipol hosted three chief fire officers from Prince George’s County, Maryland,
West Webster, New York, and Dallas, Texas, to learn about their tragic active shooter
incidents first hand. The hour-long webinar includes information and downloads.
Finally, concertgoers were very instrumental in initial patient care, hemorrhage
control and moving victims to ambulances and other transport. These actions
can be highlighted as part of an effort to educate the public in your jurisdiction
on rendering aid to a bleeding victim, whether from violence or other means. See
BleedingControl.org for more information and resources.
(Source: DHS)

TRACIE resources page for mass violence incidents
The Las Vegas shooting is in some ways a worst-case scenario many agencies have
feared for years. After action reviews will not be done for some time, but we know
hospitals were taxed beyond capacity in response to this mass casualty incident.
The Technical Resource, Assistance Center, and Information Exchange (TRACIE)
site put together a page of information and resources related to mass violence.
As mentioned above, it would be a good idea to review your jurisdiction’s mass
casualty incident plans, run some drills, and make changes as needed.
One featured topic collection is Patient Movement and Tracking. Patient tracking
and transportation is chaotic without proper coordination and communication,
and those looking to strengthen their plans should find this information helpful.
Other featured topic collections include Emergency Public Information; Explosives and Mass Shooting; Hospital Surge Capacity; Trauma Care and Triage; Fatality
Management; Family Reunification and Support; and Responder Safety and Health.
TRACIE is managed by the Department of Health and Human Services. It has many
Topic Collections (PDF, 105 KB) currently available and many more planned.
(Source: TRACIE)

NSA Data Stolen via Russian Anti-Virus Software

photo

The Department of Homeland Security recently barred federal agencies from using Kaspersky Lab products due to security concerns but has been tight-lipped about what intelligence linked the popular, Moscow-based computer security firm to specific intelligence operations.

Kaspersky Lab denied any knowledge of any role in the attack, but decried “news coverage of unproven claims continu[ing] to perpetuate accusations about the company” in a written statement.

“As a private company, Kaspersky Lab does not have inappropriate ties to any government, including Russia, and the only conclusion seems to be that Kaspersky Lab is caught in the middle of a geopolitical fight,” the company said. More here.

photo with more detail at this link

Russian hackers stole classified data from NSA contractor

Russian government hackers stole data about how the US penetrates foreign computer networks and defends against cyberattacks after a National Security Agency contractor removed highly classified material and stashed it on his home computer, a new report said Thursday.

The hackers apparently targeted the contractor after identifying the files through the contractor’s use of an anti-virus software made by the Russia-based Kaspersky Lab, The Wall Street Journal reported, citing sources familiar with the hacking.

Experts told the paper the hack was one of the most serious security breaches in years, and that it provided insight into how Russian intelligence exploits commercial software products to spy on the US.

The incident occurred in 2015 but wasn’t discovered until spring of last year, the sources told the WSJ.

The stolen material included details about how the NSA penetrates foreign computer networks, the computer code it uses for that kind of spying and how it defends American networks, the sources said.

The information could help the Russians guard their own networks, making it more difficult for American spooks to surveil Russia.

The breach was believed to be the first time that Kaspersky software, which is sold in the US, was exploited by Russian hackers as they spied on the US.

The revelation comes as special counsel Robert Mueller is investigating Russian meddling in the US election and possible collusion with the Trump campaign.

The president has called Russian hacking a “hoax” and “fake news” and slammed Mueller’s probe as a “witch hunt.”

A spokesman for the NSA would not comment on the security breach.

“Whether the information is credible or not, NSA’s policy is never to comment on affiliate or personnel matters,” the spokseman told the paper.

In a statement, Kaspersky said it “has not been provided any information or evidence substantiating this alleged incident, and as a result, we must assume that this is another example of a false accusation.”

The NSA contractor in the Kaspersky incident was not known, and the company he worked for was not identified.

Sources told The Journal he is believed to have taken home numerous documents and other materials from NSA headquarters, possibly to continue working beyond his normal office hours.

The man apparently did not knowingly work for a foreign government, but knew that removing classified information without authorization was a violation of NSA policies and potentially a criminal act, the sources said.