Obama’s ASEAN Summit a Failure?

A US-ASEAN South China Sea Failure at Sunnylands?

Prashanth Parameswaran, The Diplomat:  Following the end of the historic U.S.-ASEAN summit at Sunnylands, a number of accounts have criticized Washington and Southeast Asian states for their weak stance on the South China Sea issue. In particular, much has been made of the fact that the U.S.-ASEAN joint statement issued after the summit did not contain a specific reference to China’s assertiveness in the South China Sea.

This is hardly the first time an ASEAN-related meeting has been criticized for this, and it will not be the last. And to be sure, getting ASEAN to be more forward-leaning on the South China Sea is a frustrating process well-known to U.S. and Southeast Asian diplomats. But to those who have been following the summit’s planning and execution closely, the suggestion that the United States and ASEAN have somehow failed on the South China Sea issue at Sunnylands is seriously misguided. It reflects an ignorance of how ASEAN and the United States deal with the South China Sea issue, what both sides expected going into Sunnylands, what was eventually achieved, and how the outcome fits in with other ongoing developments.

First, the extent of agreement on the South China Sea question ought to be judged on the basis of what ASEAN is rather than what it ought to be, since that is the reality that policymakers have to contend with. For various reasons, including the fact that ASEAN operates on the basis of consensus and only four of the ten members have claims in the South China Sea disputes, the organization has generally tended to adopt a lowest common denominator approach to the issue. With such a diversity of views – from the Philippines, a claimant which filed a case against China at an international tribunal, to Cambodia, a not-so-interested party and close Chinese partner which infamously blocked the issuance of a joint communique over mention of the South China Sea issue – ASEAN’s statements as a bloc have not traditionally singled out China directly irrespective of Beijing’s actions, and it is rather unrealistic to expect that to change anytime soon (See: “Does ASEAN Have a South China Sea Position?”).

While ASEAN’s critics have continued to rail on the organization for its weakness on the South China Sea question, Southeast Asian and U.S. policymakers have long internalized the structural issues that prevent a stronger ASEAN position. That explains why they tend to push only for realistic agreements on broad principles within ASEAN as a grouping to uphold basic regional cohesiveness but also pursue more forward-leaning steps on a bilateral or unilateral basis. For instance, the Philippines has independently pursued a case against China with the United Nations arbitral tribunal at The Hague, and the United States has been quietly nudging individual Southeast Asian states to support Manila’s efforts outside of ASEAN, given the unwillingness of some of the grouping’s members to do so within the group (“Does the Philippines’ South China Sea Case Against China Really Matter?”).

Hence, while some parties naturally continue to push for more and others want less each time the issue is raised, realistically U.S. and ASEAN officials generally only expect broad agreement on a set of principles that claimants (Brunei, Malaysia, the Philippines and Vietnam), interested parties (Indonesia, Singapore, Thailand) and not-so-interested parties (Cambodia, Laos and Myanmar) could all adhere to. The true test of whether ASEAN has remained united on the South China Sea issue is thus not whether it suddenly achieves an unprecedented and unrealistic level of cohesion like calling out China in a joint communique, but if it manages to maintain agreement on basic principles that govern the issue in spite of any divisions within the grouping.

If one looks at the paragraphs in the U.S.-ASEAN joint statement issued at Sunnylands relating to the South China Sea, that modest but realistic expectation – broad agreement on a set of principles – was met. The paragraphs in the joint statement relating to the South China Sea articulate all the relevant principles, including the peaceful resolution of disputes, respect for international law including the 1982 United Nations Convention of the Law of the Sea (UNCLOS), and commitment to freedom of navigation and overflight. This at the very least constitutes par for the course rather than a failure of any kind.

Second, while the language in the joint statement at Sunnylands may seem vague, it is important to contextualize what was agreed on the South China Sea question both in terms of the broader approach the Obama administration has adopted towards it as well as the nature of the summit itself.

With respect to the former, while some have tended to get lost in the weeds, barring a late start, the Obama administration has successfully framed the U.S. and ASEAN’s role in the South China Sea issue as not being just about China or how claims are resolved, but preserving the rules-based order in the Asia-Pacific (See: “Why the US-ASEAN Sunnylands Summit Matters“). That is, what both sides have in common is upholding a set of common rules that applies to all countries big and small, whether it is preserving principles governing how vessels can navigate at sea in the case of the South China Sea in the security realm; pursuing policies that lead to openness and competitiveness in the economic sphere; or promoting the rule of law, good governance, accountable institutions and universal human rights. That makes sense rhetorically even if the reality in Southeast Asia is far from the ideal suggested in those principles.

It is through this prism – a shared commitment by both sides to the regional rules-based order – that U.S. officials approached the South China Sea question in the context of the broader joint statement at Sunnylands. As one official told The Diplomat ahead of the summit, the idea was to chart out a set of agreed principles on maritime security between the United States and ASEAN in full recognition of divisions between the bloc as well as the complexities of the South China Sea issue. That would seem to make sense – if two parties are claiming that their actions are motivated by a joint commitment to certain principles rather than targeting a single country, it is worth spelling out those principles. By contrast, singling out China would only seem to undermine the case being made that this is about principles rather than a particular nation.

The nature of the summit also matters for how one evaluates the outcome on the South China Sea question. Even before Sunnylands, U.S. officials had tirelessly pointed out that it would be unlike regular U.S.-ASEAN meetings, with a focus more on candid discussion among leaders rather than carefully prepared statements and tightly negotiated deliverables. Officials had also privately and publicly admitted that the outcome document would be more like a broad, short statement of principles rather than a traditional joint communique issued at ASEAN meetings or the more detailed, 14-page long U.S.-ASEAN plan of action to implement the strategic partnership issued last November (See: “US-ASEAN Sunnylands Summit: What to Expect”). Given that the outcome document was much like what the Obama administration had envisioned even before the summit, it is bizarre to label it a failure.

Furthermore, owing to the format of the summit which U.S. officials had detailed, it is rather myopic to judge what was agreed on the South China Sea by just the joint statement alone. Accounts by those present suggest that the leaders naturally dived into much more detail in the closed door session on security issues on the second day of the summit, including on China’s assertiveness in the South China Sea. As with most summits, what is said behind closed doors is as, if not more important, than what is written in a joint statement.

Third, even given these limitations and realities, judged both qualitatively and quantitatively, the specifics of what was achieved in terms of language on the South China Sea question are hardly inconsequential. Quantitatively, three of the 17 paragraphs of the entire U.S.-ASEAN joint statement addressed maritime security, more than any other single issue (See: “What Did the US-ASEAN Sunnylands Summit Achieve?”). Most other fields either got one paragraph or were squeezed in among a laundry list of other related priorities. For those used to parsing ASEAN statements, this is hardly inconsequential and demonstrates the concern both the United States and Southeast Asian states place on the issue.

Beyond numbers, the qualitative aspect of what was achieved is also notable relative to the past. For instance, while the United States and more forward-leaning ASEAN members may not have been able to get full-throated and full support within the grouping for the Philippines’ ongoing case against China, the mention in paragraph seve of “full respect for legal and diplomatic processes without resorting to the threat or use of force” is the closest possible language to asking Beijing to abide by the court’s decision expected in May. The presence of such language this time around constitutes relative progress – this was missing from the joint statement on the U.S.-ASEAN strategic partnership issued last November (See: “US, ASEAN to Ink New Strategic Partnership”).

Similarly, in paragraph eight, “non-militarization and self-restraint in the conduct of activities” was added this time to the familiar refrain about the respect for freedom of navigation and overflight. The phrase “non-militarization” was absent in similar U.S.-ASEAN statements issued in November. Its inclusion this time around reflects both growing concerns about China’s behavior in this regard as well as successful efforts by the United States and some forward-leaning ASEAN countries in translating a commitment made by Chinese president Xi Jinping last year into a clear, joint call to get Beijing to do as it had pledged (though, true to form, China appears to have once again found a way to rhetorically finesse its way out of this glaring contradiction).

To be sure, U.S. officials would prefer an even stronger stance by ASEAN on the South China Sea. The point here is simply that what was achieved within constraints was still quite significant.

Fourth and lastly, irrespective of what was said or not said about China’s assertiveness in the South China Sea, Beijing’s continued pursuit of destabilizing, unilateral actions there continue to speak for themselves. As it is, beyond joint statements, close regional observers know that it is difficult to arrive at a Southeast Asian capital today where there is not some degree of concern about China’s South China Sea behavior and its implications for regional stability, international law, and U.S.-China relations. With news this week that China has set up missile defense systems in the Paracel Islands – effectively beginning the militarization Xi had pledged not to undertake – those concerns will grow graver still. And while they may not manifest themselves in the boilerplate joint statements that are usually issued following ASEAN meetings, they will likely continue to do so in other more meaningful ways, including stronger security ties between Washington and individual Southeast Asian states as well as a louder diplomatic campaign against China following the court’s decision in May.

It is ultimately those clearer, more consequential signs – rather than communiques at multilateral meetings – that we should be looking at for indicators of the regional response to Beijing’s South China Sea assertiveness. Because contrary to the suggestion that the United States and ASEAN are failing on the South China Sea issue, it is Beijing’s determination to coerce other claimants and violate international law to secure its interests (while blaming the United States and Southeast Asian states for responding in any way) that seems to be the flawed, shortsighted approach that sacrifices long-term goodwill for short-term gain. For all China’s suggestions that the United States is seeking to contain it, with its own assertiveness abroad, it won’t be long before Beijing does a pretty good job of that itself.

Saudi Testing that Nuke?

Saudi Political Analyst Dahham Al-‘Anzi: KSA Has Obtained Nuclear Bomb. Test May Be Held Soon

Saudi political analyst Dahham Al-‘Anzi spoke on Russia Today Arabic TV channel on February 15 and claimed that Saudi Arabia has obtained a nuclear bomb. Al-‘Anzi said that the Saudis have acquired the bomb two years ago and that a nuclear test is expected soon. “The superpowers know about this,” he added.

TribuneIndia: SAUDI ARABIA’S foreign minister Adel al-Jubeir faced some difficult questions in Washington on January 20, following a meeting with Secretary of State John Kerry. The visit to Washington took place amidst reports that the desert kingdom was set to acquire nuclear weapons from Pakistan, in response to perceived threats from Iran. Just a day earlier, Kerry had warned both Pakistan and Saudi Arabia against partnering in any transfer or deployment of Pakistani nuclear weapons in Saudi Arabia. He bluntly stated that there would be “all kinds of NPT consequences” if any such transfer took place. Responding to queries on Kerry’s comments, Jubeir retorted: “I will not discuss these things in a public forum, certainly not on television.” While not ruling out a Pakistani nuclear umbrella to guarantee his country’s security, Jubeir averred: “Saudi Arabia is committed to two things. I always say two things we do not negotiate over — our faith and our security. Saudi Arabia will do what it takes in order to protect its security.”  Referring to his discussions with Kerry, Jubeir said: “I discussed the bilateral relationship with Pakistan, which is a strategic one. We discussed the regional situation and ways to promote security and stability in the region.

We discussed the negative and aggressive Iranian interference and the affairs of the region.” He predictably lashed out at Iran, saying: “Iran should cease support for terrorism. Iran should cease to assassinate diplomats and blow up embassies.” (This was perceived as a condemnation of alleged Iranian attacks on Israeli diplomatic missions.) For good measure, Jubeir added: “Iran should cease its negative propaganda in the region,” while adding that the nuclear deal with Iran would “release billions of dollars” for funding its “nefarious activities”.The concerns expressed by Kerry came after meetings that Saudi Arabia’s deputy crown prince and defence minister Mohammad bin Sultan had with General Raheel Sharif and Prime Minister Nawaz on January 10. After meeting Prince Salman in his office in Rawalpindi, Raheel Sharif warned that any threat to Saudi Arabia’s territorial integrity would evoke a strong response from Pakistan. Raheel Sharif’s nominal boss, Prime Minister Nawaz Sharif, was more circumspect, telling Prince Salman that the “people of Pakistan will always stand by the people of Saudi Arabia”, while holding that defence ties with Saudi Arabia were held in “high esteem”.

Saudi Arabia has, however, rejected a Pakistani offer to promote dialogue with Iran, though the Pakistani offer has been welcomed in Washington and Moscow. Saudi Arabia has been assiduously wooing Pakistan, ever since it found out that it had landed itself in a military quagmire in Yemen, where its relentless bombing campaign has led to the displacement of 2.5 million Yemenis. About 78 per cent of the Yemeni population is today in desperate need of water, food and medical assistance. Despite the fierce and unrelenting bombing, the resistance to the Saudis, spearheaded by the Shia Houthi population and former President Abdullah Saleh is resolute in preventing Yemen’s takeover by a Saudi nominee, like former President Mansur Hadi. Saudi diplomatic woes have been compounded by the US led deal to end global sanctions on Iran and stern warning by President Putin that “Saudi Arabia will be utterly destroyed and annihilated” if it falls out of line, with military intervention in Syria. Shortly after the Saudi intervention in Yemen commenced, Nawaz Sharif was welcomed personally at the Riyadh Airport on March 3, 2015, by King Salman bin Abdul Aziz, together with Crown Prince Mukri and the entire Saudi cabinet. This was rare honour, especially for a country, which has depended for decades on Saudi doles and handouts. But the Saudis obviously had high expectations from Nawaz Sharif, whom they saved from possible execution and sheltered, after the Musharraf coup, in October 1999.

More important, was a low-key visit to Riyadh, a few weeks earlier, by Pakistan’s seniormost military officer, who oversees the Strategic (Nuclear) Forces Command — the chairman of the joint chiefs of staff committee, General Rashad Mahmoud. Subsequent developments have made it clear that Pakistan will be unable to commit forces for backing the Saudi military misadventure in Yemen. But nuclear ties between Pakistan and Saudi Arabia go back decades, commencing with the Saudi financing of Pakistan’s nuclear ambitions in the 1970s. Saudi defence minister Prince Salman was given unprecedented access to the Kahuta uranium enrichment and missile facilities headed by Dr AQ Khan, popularly described as the chairman of “Pakistan’s nuclear Walmart”, just prior to Pakistan’s nuclear tests. Khan thereafter paid visits to Saudi Arabia. Significantly, just after the visits of General Mahmud and Nawaz Sharif to Riyadh, Pakistan tested its 2,750-km  range Shaheen 3 missile, which could well replace the obsolescent CSS 2 missiles supplied by Beijing to Riyadh, in the 1980s. The Chinese missiles have an adequate range to target Tehran. Pakistan’s Shaheen missiles are originally of Chinese design. The visits of President Xi Jinping to Saudi Arabia and Tehran clearly demonstrate the dexterity of Chinese diplomacy in the oil-rich Gulf region.

Saudi insecurities resulting from the virtual U-turn in American policies following the nuclear deal with Iran are being addressed by China, with Beijing’s “all-weather friend” Pakistan, signaling that it has missiles that can replace the obsolescent Chinese missiles. Differences between Iran and Pakistan over Afghanistan will likely continue, as a Wahhabi oriented, Taliban dominated, Pakistan sponsored regime in Kabul will be seen as threatening in Iran and neigbouring Central Asian republics. It remains to be seen if the Saudis return to their earlier policies of support for a Pakistan sponsored, Taliban dominated setup in Kabul. Both Iran and Saudi Arabia have pledged to treat China as their “most favoured customer” for oil supplies. This should not cause undue concern in India, given the global glut in oil supplies and the reemergence of Iraq, as a growingly significant player in world energy markets. India will, however, have to move much faster in dealing with crucial projects like the development of the Chabahar Port in Iran, and in the development of undersea gas pipelines. We have to recognise that the inexcusable delays in the implementation of projects abroad, like the Kaladan Corridor in Myanmar and the Parliament building in Kabul have tarnished our image and reputation.

***

2013 ~ BBC: Saudi Arabia has invested in Pakistani nuclear weapons projects, and believes it could obtain atomic bombs at will, a variety of sources have told BBC Newsnight.

While the kingdom’s quest has often been set in the context of countering Iran’s atomic programme, it is now possible that the Saudis might be able to deploy such devices more quickly than the Islamic republic.

Earlier this year, a senior Nato decision maker told me that he had seen intelligence reporting that nuclear weapons made in Pakistan on behalf of Saudi Arabia are now sitting ready for delivery.

Last month Amos Yadlin, a former head of Israeli military intelligence, told a conference in Sweden that if Iran got the bomb, “the Saudis will not wait one month. They already paid for the bomb, they will go to Pakistan and bring what they need to bring.”

Since 2009, when King Abdullah of Saudi Arabia warned visiting US special envoy to the Middle East Dennis Ross that if Iran crossed the threshold, “we will get nuclear weapons”, the kingdom has sent the Americans numerous signals of its intentions.

Joint Chiefs, ‘NO’ on Closing Gitmo

Obama tweets: I’m going to Cuba

BI: President Barack Obama announced Thursday on Twitter that he was going to Cuba next month, which will be the first time a sitting president has visited the country since 1928.

The US recently restored diplomatic relations with the communist country after a 54-year break.

“14 months ago, I announced that we would begin normalizing relations with Cuba — and we’ve already made significant progress,” Obama tweeted.

In subsequent tweets, he said:

Our flag flies over our Embassy in Havana once again. More Americans are traveling to Cuba than at any time in the last 50 years. We still have differences with the Cuban government that I will raise directly. America will always stand for human rights around the world. Next month, I’ll travel to Cuba to advance our progress and efforts that can improve the lives of the Cuban people.

Obama also tweeted a link to a post on the website Medium that explained the thinking behind his trip.

Ben Rhodes, a national security adviser to Obama, wrote that the president would “have the opportunity to meet with President [Raúl] Castro, and with Cuban civil society and people from different walks of life” on the trip.

“Yes, we have a complicated and difficult history,” Rhodes wrote. “But we need not be defined by it. Indeed, the extraordinary success of the Cuban-American community demonstrates that when we engage Cuba, it is not simply foreign policy  —  for many Americans, it’s family.”

JW: As President Obama frees droves of terrorists—including five Yemenis this week—from the U.S. military prison in Guantanamo news reports confirm that a Gitmo alum who once led a Taliban unit has established the first Islamic State of Iraq and Syria (ISIS) base in Afghanistan.

His name is Mullah Abdul Rauf and international and domestic media reports say he’s operating in Helmand province, actively recruiting fighters for ISIS. Citing local sources, a British newspaper writes that Rauf set up a base and is offering good wages to anyone willing to fight for the Islamic State. Rauf was a corps commander during the Taliban’s 1996-2001 rule of Afghanistan, according to intelligence reports. After getting captured by U.S. forces, he was sent to Gitmo in southeast Cuba but was released in 2007. More here.

*** The Obama administration is in somewhat of a panic over the most recent development of Ibrahim al Qosi.

FNC: When Ibrahim al Qosi was released from Guantanamo Bay in 2012, a lawyer for the former Usama bin Laden aide said he looked forward to living a life of peace in his native Sudan.

Three years later, Qosi has emerged as a prominent voice of Al Qaeda in the Arabian Peninsula, appearing in a number of AQAP propaganda videos — including a 50-minute lecture calling for the takeover of Saudi Arabia.

The 56-year-old Qosi delivered a scathing critique of the Saudi monarchy — which appeared online on Feb. 6 — denouncing the Saudi government’s execution of more than 40 “mujahedeen” in January, according to the Long War Journal.

Joint Chiefs Issue Resounding ‘No’ to Obama on Gitmo Closure

Granger – TheBlaze: Just in case it couldn’t be more clear, the Joint Chiefs of Staff of the armed forces of the United States said “no, we won’t help” to the president in a letter regarding his possible use of an executive order to close the U.S. military detention facility at Guantanamo Bay, Cuba, and then bring the remaining detainees to the United States.

Quoting the law, Lt. Gen. William Mayville Jr., the director of the Joint Chiefs of Staff, wrote:

“Current law prohibits the use of funds to ‘transfer, release or assist in the transfer or release’ of detainees of Guantanamo Bay to or within the United States, and prohibits the construction, modification or acquisition of any facility within the United States to house any Guantanamo detainee. The Joint Staff will not take any action contrary to those restrictions.”

Sixteen members of the U.S. House of Representatives with military experience had written to the Joint Chiefs regarding the legal question of whether or not they would follow an executive order by President Barack Obama to close Gitmo by relocating the remaining detainees to the U.S.

Getty Images

The president is now alone in his fantasy of bringing detainees to U.S. shores.

Without the cooperation of the military, no physical transfer of Gitmo detainees can take place.

The president said in his end-of-year press conference, “We will wait until Congress has definitively said no to a well-thought-out plan with numbers attached to it before we say anything definitive about my executive authority here.”

Apparently, the Joint Chiefs beat Congress to the punch. There is no authority of the president to move anybody anywhere against the law.

Far from just an opinion, the Joint Chiefs are factually correct in their decision. Unless an order, even coming from the commander in chief, is legal, ethical and moral, the nation’s most responsible generals may not carry it out.

The letter is a first response in what could be a legal argument that could reach the attorney general and/or the Supreme Court.

With the balance of power in the highest court tilting slightly to the left now that conservative Antonin Scalia has passed away and his seat is vacant for the foreseeable future, any decision made by that body in question of the president’s Constitutional authority would probably side with him.

Without reaction to the letter, the Obama administration is surely scrambling for ideas on what next to do.

The really disappointing aspect of Obama’s obsession with closing Gitmo is the fact that he has forgotten the reason for the facility in the first place.

Sept. 11, 2001, is the reason for Gitmo. It is the reason for detaining as many potential sources of important information (that could save many lives) as possible. It is the reason so many lives have been lost and others changed forever.

Why has Obama forsaken the safety and security of the American people by releasing unlawful combatant Islamists who want to kill Americans before the Global War on Terror is won?

Thirty percent of all released Gitmo detainees are known or are suspected of returning to the fight. If that isn’t bad enough, there is NO information on the other 70 percent. Where are they; your neighborhood?

The president’s reckless behavior, from releasing dangerous enemies to wanting to bring others to the U.S. is proof that his priorities are confused. Thankfully, the Joint Chiefs of Staff have just reminded him that even he is bound by law, and they will not help him break it.

Montgomery Granger is a three-times mobilized U.S. Army major (Ret.) and author of “Saving Grace at Guantanamo Bay: A Memoir of a Citizen Warrior.” Amazon, Blog, Facebook

Ooops, What Hillary and her Aide did NOT Sign

EXCLUSIVE: Hillary Clinton And Cheryl Mills Did Not Sign Mandatory Agreement to Return Classified Materials

Howley – Breitbart:

Breitbart News has obtained confirmation on State Department letterhead that Hillary Clinton did NOT sign a mandatory OF-109 “Separation Statement” when she left the State Department.

That statement would have required her to affirm that she had returned all classified materials in her possession. Clinton’s top aide Cheryl Mills also avoided signing a separation statement.

Additionally, Clinton never certified that she went through a mandatory security debriefing to learn how to handle classified information. State Department officials, meanwhile, admitted that they “mistakenly” mailed out sensitive information involving the Clinton case.

Citizen researcher Larry Kawa has provided to Breitbart News the most clear-cut evidence to date that Clinton avoided going through mandatory channels to return classified government information.

Clinton failed to sign a separation agreement when she left the State Department, around the time she was required to give back all of her classified materials. Clinton signed a “Classified Information Nondisclosure Agreement” on January 22, 2009. This document is known as an SF-312. It is standard for government employees to sign an SF-312 when they begin working in a role that gives them access to classified information. But she was also required to sign an OF-109, or “Separation Statement,” when she left the job.

That OF-109 document would have required her to affirm the following:

I have surrendered to responsible officials all classified or administratively controlled documents and material with which I was charged or which I had in my possession. I am not retaining in my possession, custody, or control, documents or material containing classified or administratively controlled information furnished to me during the course of such employment or developed as a consequence thereof…

But Clinton never signed an OF-109, even though the State Department Foreign Affairs Manual requires all employees to do so. The office of the Speaker of the House and others have been desperately trying to figure out if Clinton signed an OF-109. Now we know.

On September 11, 2015, researcher Larry Kawa received a letter from State Department official Clarence N. Finney Jr. from the Office of Executive Secretariat Staff (S/ES-S). Finney claimed that, “Departing secretaries of state do not complete an OF-109 due to their continued need for a security clearance after their resignation.”

***  Hillary signature

In other words, the State Department claimed that Clinton, as Secretary of State, was exempt from the requirement in the Foreign Affairs Manual. But Kawa was not satisfied.

Kawa wrote to State Department Office of Information Programs and Services director John Hackett on November 19 and asked, “Can you please forward me written documentation that allows for the exemption of the Secretary of State?”

“Mr. Kawa, I do not have this information at hand. I recommend that you submit an additional FOIA request,” Hackett replied. Kawa submitted another FOIA request two days later seeking evidence for the exemption, but his FOIA request was never returned.

The State Department’s Foreign Affairs Manual Volume 12 Section 564.4 is crystal clear that all employees must sign a separation agreement and undergo a security debriefing:

a. A security debriefing will be conducted and a separation statement will be completed whenever an employee is terminating employment or is otherwise to be separated for a continuous period of 60 days or more.The debriefing is mandatory to ensure that separating personnel are aware of the requirement to return all classified material and of a continuing responsibility to safeguard their knowledge of any classified information. The separating employee must be advised of the applicable laws on the protection and disclosure of classified information (see 12FAM 557 Exhibit 557.3) before signing Form OF-109, Separation Statement (see 12 FAM 564 Exhibit 564.4).

b. AID’s Office of Security, IG/SEC, will conduct a security debriefing upon the separation of AID employees.

Kawa asked State Department Office of Information Programs and Services litigation and appeals branch chief Brandi Garrett for the “pertinent exemption” that would have allowed Clinton to skip out on signing a separation statement, but Garrett did not provide any evidence to show that Clinton was exempt. 

Cheryl Mills also skipped the exit procedure.

A Separation Statement exists for top Clinton aide Cheryl Mills, and a copy of it was quietly released by the State Department.

You might notice something fairly jarring: the statement was never signed, by Mills or anyone else. It was left blank.

Cheryl Mills, like Clinton, avoided having to affirm that she “surrendered to responsible officials all classified or administratively controlled documents and material with which I was charged or which I had in my possession.”

Unlike Mills, Clinton aide Huma Abedin signed a separation statement and security debriefing acknowledgment in February 2013.

Citizen researcher Larry Kawa found the information during a series of exchanges with State Department officials in which the Department admitted to “mistakenly” mailing out sensitive information on the Clinton case.

On the evening of Friday November 13, 2015, Kawa received an email from Deputy Assistant Secretary of State Martha Grafeld. That same night, he received a voicemail message from State Department information officer John Hackett. Both Grafeld and Hackett told Kawa that he had been mailed sensitive information about Clinton and her aides. Even though Kawa had not received any information, the State Department officials seemed panicked.

They both asked him to return the sensitive information as soon as he gets it in the mail. They also both warned him not to disclose any of the information they thought he’d been sent.

Audio of Hackett’s voice mail message, reviewed by Breitbart News, referred to information that was “mistakenly” sent out:

Mr. Kawa, this is John Hackett with the Department of State. Area code [redacted]. The documents we recently mailed you relating to your FOIA request, um, these documents were mistakenly mailed to you without proper processing. They may contain, um, information that is exempt from public disclosure including Social Security numbers. We ask that you not distribute or disseminate these documents. We’ll be sending you an email to ask you to return these documents. Um, also we’ll be sending you a link where these documents that have been properly processed may be found. We regret any inconvenience. If you have any questions, please don’t hesitate to give me a call. Thanks a lot. Bye now.

Grafeld wrote:

I am writing to follow up on a phone call you received today.  In that call, our staff informed you that documents you recently received in the mail from the Department of State were mistakenly mailed to you without proper processing, as they include information that is exempt from disclosure, potentially including Social Security numbers.  The Department asked that you not distribute or disseminate these documents or copies of these documents.  Substitute documents that have been properly processed are posted at:  https://foia.state.gov/Search/Results.aspx?collection=HRC_NDAS.

We will forward to you a prepaid envelope to return to us the documents that were mistakenly sent and any copies you may have made. This return will be at no cost to you.

As you may know, many states have enacted privacy laws that prohibit the disclosure of the Social Security number of another person. With that in mind, we appreciate your safeguarding the Social Security numbers on the documents mistakenly sent to you.

We regret any inconvenience that this may cause you and appreciate your cooperation.

Clinton’s lack of an OF-109 is especially relevant in light of her SF-312, a sworn agreement in 2009 that she made to return all classified materials “upon the conclusion of my employment”:

7…I agree that I shall return all classified materials which have, or may come into my possession or for which I am responsible because of such access: (a) upon demand by an authorized representative of the United States Government; (b) upon the conclusion of my employment or other relationship with the Department or Agency that last granted me a security clearance or that provided me access to classified information; or (c) upon the conclusion of my employment or other relationship that requires access to classified information. If I do not return such materials upon request, I understand that this may be a violation of Sections 793 and/or 1924, Title 18, United States Code, a United States criminal law.

But Clinton did not return her private server, with classified information on it, when she left the State Department in January 2013. She only gave her private server to an inter-agency task force led by the FBI in August 2015, more than two years after her employment with the State Department came to an end.

Thus, Clinton violated her sworn SF-312 statement and could have violated the Title 18 sections cited in the agreement: Section 793, on “Gathering, transmitting, or losing defense information,” and Section 1924, on “Unauthorized removal and retention of classified documents or material.” If she is convicted of violating either of those sections, she could face prison time.

Clinton did not sign the second line on the bottom of the SF-312 document, the “Security Debriefing Acknowledgment.” The signature line was left blank. Thus, Clinton did not certify that she was debriefed on her security obligations regarding classified information.

The Hillary Clinton campaign and the State Department did not return requests for comment for this report.

 

Apple vs. FBI, Try the iCloud or iTunes

In all fairness, General Michael Hayden, former head of the NSA actually disagrees with FBI Director James Comey and sides with Apple. The reason is fascinating.

Apple’s formal statement is here.

Zetter – Wired:

The news this week that a magistrate ordered Apple to help the FBI hack an iPhone used by one of the San Bernardino shooter suspects has polarized the nation—and also generated some misinformation.

Those who support the government say Apple has cooperated in the past to unlock dozens of phones in other cases—so why can’t it help the FBI unlock this one?

But this isn’t about unlocking a phone; rather, it’s about ordering Apple to create a new software tool to eliminate specific security protections the company built into its phone software to protect customer data. Opponents of the court’s decision say this is no different than the controversial backdoor the FBI has been trying to force Apple and other companies to build into their software—except in this case, it’s an after-market backdoor to be used selectively on phones the government is investigating.

The stakes in the case are high because it draws a target on Apple and other companies embroiled in the ongoing encryption/backdoor debate that has been swirling in Silicon Valley and on Capitol Hill for the last two years. Briefly, the government wants a way to access data on gadgets, even when those devices use secure encryption to keep it private.

Apple specifically introduced security features in 2014 to ensure that it would not be able to unlock customer phones and decrypt the data on them; but it turns out it overlooked a loophole in those security features that the government is now trying to exploit. The loophole is not about Apple unlocking the phone but about making it easier for the FBI to attempt to unlock it on its own. If the controversy over the San Bernardino phone causes Apple to take further steps to close that loophole so that it can’t assist the FBI in this way in the future, it could be seen as excessive obstinance and obstruction by Capitol Hill. And that could be the thing that causes lawmakers to finally step in with federal legislation that prevents Apple and other companies from locking the government out of devices.

If the FBI is successful in forcing Apply to comply with its request, it would also set a precedent for other countries to follow and ask Apple to provide their authorities with the same software tool.

In the interest of clarifying the facts and correcting some misinformation, we’ve pulled together a summary of the issues at hand.

What Kind of Phone Are We Talking About?

The phone in question is an iPhone 5c running the iOS9 version of Apple’s software. The phone is owned by the San Bernardino Department of Public Health, which gave it to Syed Rizwan Farook, the shooter suspect, to use for work.

What Is the Issue?

Farook created a password to lock his phone, and due to security features built into the software on his device, the FBI can’t unlock the phone and access the data on it using the method it wants to use—a bruteforce password-guessing technique wherein they enter different passcodes repeatedly until they guess the right one—without running the risk that the device will lock them out permanently.

How Would It Do That?

Apple’s operating system uses two factors to secure and decrypt data on the phone–the password the user chooses and a unique 256-bit AES secret key that’s embedded in the phone when it’s manufactured. As cryptographer Matthew Green explains in a blog post, the user’s password gets “tangled” with the secret key to create a passcode key that both secures and unlocks data on the device. When the user enters the correct password, the phone performs a calculation that combines these two codes and if the result is the correct passcode, the device and data are unlocked.

To prevent someone from brute-forcing the password, the device has a user-enabled function that limits the number of guesses someone can try before the passcode key gets erased. Although the data remains on the device, it cannot be decrypted and therefore becomes permanently inaccessible. The number of password tries allowed before this happens is unclear. Apple says on its web site that the data becomes inaccessible after six failed password attempts. The government’s motion to the court (.pdf) says it happens after 10 failed guesses.

The government says it does not know for certain if Farook’s device has the auto-erase feature enabled, but notes in its motion that San Bernardino County gave the device to Farook with it enabled, and the most recent backup of data from his phone to iCloud “showed the function turned on.”

A reasonable person might ask why, if the phone was backing data up to iCloud the government can just get everything it needs from iCloud instead of breaking into the phone. The government did obtain some data backed up to iCloud from the phone, but authorities allege in their court document that he may have disabled iCloud backups at some point. They obtained data backed up to iCloud a month before the shootings, but none closer to the date of the shooting when they say he is most likely to have used the phone to coordinate the attack.

Is This Auto-Erase the Only Security Protection Apple Has in Place?

No. In addition to the auto-erase function, there’s another protection against brute force attacks: time delays. Each time a password is entered on the phone, it takes about 80 milliseconds for the system to process that password and determine if it’s correct. This helps prevent someone from quickly entering a new password to try again, because they can only guess a password every 80 milliseconds. This might not seem like a lot of time, but according to Dan Guido, CEO of Trail of Bits, a company that does extensive consulting on iOS security, it can be prohibitively long depending on the length of the password.

“In terms of cracking passwords, you usually want to crack or attempt to crack hundreds or thousands of them per second. And with 80 milliseconds, you really can only crack eight or nine per second. That’s incredibly slow,” he said in a call to reporters this week.

With a four-digit passcode, he says, there are only about 10,000 different combinations a password-cracker has to try. But with a simple six-digit passcode, there are about one million different combinations a password cracker would have to try to guess the correct one—Apple says would take more than five-and-a-half-years to try all combinations of a six-character alpha-numeric password. The iOS9 software, which appears to be the software on the San Bernardino phone, asks you to create a six-digit password by default, though you can change this requirement to four digits if you want a shorter one.

Later models of phones use a different chip than the iPhone 5c and have what’s called a “secure enclave” that adds even more time delays to the password-guessing process. Guido describes the secure enclave as a “separate computer inside the iPhone that brokers access to encryption keys” increasing the security of those keys.

With the secure enclave, after each wrong password guess, the amount of time you have to wait before trying another password grows with each try; by the ninth failed password you have to wait an hour before you can enter a tenth password. The government mentioned this in its motion to the court, as if the San Bernardino phone has this added delay. But the iPhone 5c does not have secure enclave on it, so the delay would really only be the usual 80 milliseconds in this case.

Why None of This Is an Issue With Older iPhones

With older versions of Apple’s phone operating system—that is, phones using software prior to iOS8—Apple has the ability to bypass the user’s passcode to unlock the device. It has done so in dozens of cases over the years, pursuant to a court order. But beginning with iOS8, Apple changed this so that it can no longer bypass the user’s passcode.

According to the motion filed by the government in the San Bernardino case, the phone in question is using a later version of Apple’s operating system—which appears to be iOS9. We’re basing this on a statement in the motion that reads: “While Apple has publicized that it has written the software differently with respect to iPhones such as the SUBJECT DEVICE with operating system (“iOS”)9, Apple yet retains the capacity to provide the assistance sought herein that may enable the government to access the SUBJECT DEVICE pursuant to the search warrant.”

The government is referring to the changes that Apple initially made with iOS8, that exist in iOS9 as well. Apple released iOS9 in September 2015, three months before the San Bernardino attacks occurred, so it’s very possible this is indeed the version installed on the San Bernardino phone.

After today, technology vendors need to consider that they might be the adversary they’re trying to protect their customers from.

What Does the Government Want?

A lot of people have misconstrued the government’s request and believe it asked the court to order Apple to unlock the phone, as Apple has done in many cases before. But as noted, the particular operating system installed on this phone does not allow Apple to bypass the passcode and unlock the phone. So the government wants to try bruteforcing the password without having the system auto-erase the decryption key and without additional time delays. To do this, it wants Apple to create a special version of its operating system, a crippled version of the firmware that essentially eliminates the bruteforcing protections, and install it on the San Bernardino phone. It also wants Apple to make it possible to enter password guesses electronically rather than through the touchscreen so that the FBI can run a password-cracking script that races through the password guesses automatically. It wants Apple to design this crippled software to be loaded into memory instead of on disk so that the data on the phone remains forensically sound and won’t be altered.

Note that even after Apple does all of this, the phone will still be locked, unless the government’s bruteforcing operation works to guess the password. And if Farook kept the iOS9 default requirement for a six-character password, and chose a complex alpha-numeric combination for his password, the FBI might never be able to crack it even with everything it has asked Apple to do.

Apple CEO Tim Cook described the government’s request as “asking Apple to hack our own users and undermine decades of security advancements that protect our customers—including tens of millions of American citizens—from sophisticated hackers and cybercriminals. The same engineers who built strong encryption into the iPhone to protect our users would, ironically, be ordered to weaken those protections and make our users less safe.”

What Exactly Is the Loophole You Said the Government Is Exploiting?

The loophole is the fact that Apple even has the ability to run crippled firmware on a device like this without requiring the user to approve it, the way software updates usually work. If this required user approval, Apple would not be able to do what the government is requesting.

How Doable Is All of This?

Guido says the government’s request is completely doable and reasonable.

“They have to make a couple of modifications. They have to make it so that the operating system boots inside of a RAM disk…[and] they need to delete a bunch of code—there’s a lot of code that protects the passcode that they just need to trash,” he said.

Making it possible for the government to test passwords with a script instead of typing them in would take a little more effort he says. “[T]hat would require a little bit of extra development time, but again totally possible. Apple can load a new kernel driver that allows you to plug something in over the Thunderbolt port… It wouldn’t be trivial but it wouldn’t be massive.”

Could This Same Technique Be Used to Undermine Newer, More Secure Phones?

There has been some debate online about whether Apple would be able to do this for later phones that have newer chips and the secure enclave. It’s an important question because these are the phones that most users will have in the next one or two years as they replace their old phones. Though the secure enclave has additional security features, Guido says that Apple could indeed also write crippled firmware for the secure enclave that achieves exactly what the FBI is asking for in the San Bernardino case.

“It is absolutely within the realm of possibility for Apple themselves to tamper with a lot of the functionality of the secure enclave. They can’t read the secure private keys out of it, but they can eliminate things like the passcode delay,” he said. “That means the solution that they might implement for the 5c would not port over directly to the 5s, the 6 or the 6s, but they could create a separate solution for [these] that includes basically crippled firmware for the secure enclave.”

If Apple eliminates the added time delays that the secure enclave introduces, then such phones would only have the standard 80-millisecond delay that older phones have.

“It requires more work to do so with the secure enclave. You have to develop more software; you have to test it a lot better,” he said. “There may be some other considerations that Apple has to work around. [But] as far as I can tell, if you issue a software update to the secure enclave, you can eliminate the passcode delay and you can eliminate the other device-erase [security feature]. And once both of those are gone, you can query for passcodes as fast as 80 milliseconds per request.”

What Hope Is There for Your Privacy?

You can create a strong alpha-numeric password for your device that would make bruteforcing it essentially infeasible for the FBI or anyone else. “If you have letters and numbers and it’s six, seven or eight digits long, then the potential combinations there are really too large for anyone to bruteforce,” Guido said.

And What Can Apple Do Going Forward?

Guido says Apple could and should make changes to its system so that what the FBI is asking it to do can’t be done in future models. “There are changes that Apple can make to the secure enclave to further secure their phones,” he said. “For instance, they may be able to require some kind of user confirmation, before that firmware gets updated, by entering their PIN code … or they could burn the secure enclave into the chip as read-only memory and lose the ability to update it [entirely].”

These would prevent Apple in the future from having the ability to either upload crippled firmware to the device without the phone owner’s approval or from uploading new firmware to the secure enclave at all.

“There’s a couple of different options that they have; I think all of them, though, are going to require either a new major version of iOS or new chips on the actual phones,” Guido said. “But for the moment, what you have to fall back on is that it takes 80 milliseconds to try every single password guess. And if you have a complex enough password then you’re safe.”

Is the Ability to Upload Crippled Firmware a Vulnerability Apple Should Have Foreseen?

Guido says no.

“It wasn’t until very recently that companies had to consider: What does it look like if we attack our own customers? What does it look like if we strip out and remove the security mitigations we put in specifically to protect customers?”

He adds: “Apple did all the right things to make sure the iPhone is safe from remote intruders, or people trying to break into the iPhone.… But certainly after today, technology vendors need to consider that they might be the adversary they’re trying to protect their customers from. And that’s quite a big shift.” (Great job on this Kim)