An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.

412 Charged in $1.3 Billion in Opioid Schemes

U.S. charging 412 in health fraud, opioid schemes worth $1.3 billion

ChicagoTribune: More than 400 people have been charged with taking part in health care fraud and opioid scams that totaled $1.3 billion in false billing, Attorney General Jeff Sessions announced Thursday.

Sessions called the collective action the “largest health care fraud takedown operation in American history” and said it indicates that some doctors, nurses and pharmacists “have chosen to violate their oaths and put greed ahead of their patients.”

Among those charged are six Michigan doctors accused of a scheme to prescribe unnecessary opioids. A Florida rehab facility is alleged to have recruited addicts with gift cards and visits to strip clubs, leading to $58 million in false treatments and tests.

In the Northern District of Illinois, 15 people were charged in six cases involving an alleged $12.7 million in billing fraud of private insurers and government programs. At least two Chicago-area physicians, nurses, chiropractors and at least one physical therapist were among those indicted. In the Southern District of Illinois, five people were charged in separate alleged schemes to defraud Medicaid.

Related:

Officials said those charged in the schemes include more than 120 people involved in illegally prescribing and distributing narcotic painkillers. Such prescription opioids are behind the deadliest drug overdose epidemic in U.S. history. More than 52,000 Americans died of overdoses in 2015 — a record — and experts believe the numbers have continued to rise.

“In some cases, we had addicts packed into standing-room-only waiting rooms waiting for these prescriptions,” acting FBI director Andrew McCabe said. “They are a death sentence, plain and simple.”

Nearly 300 health care providers are being suspended or banned from participating in federal health care programs, Sessions said.

“They seem oblivious to the disastrous consequences of their greed. Their actions not only enrich themselves, often at the expense of taxpayers, but also feed addictions and cause addictions to start,” Sessions said.

Health care fraud sweeps like Thursday’s happen each year across the country, but law enforcement officials continue to grapple over the best way to fight the problem.

The people charged were illegally billing Medicare, Medicaid and the health insurance program that serves members of the armed forces, retired service members and their families, the Justice Department said. The allegations include claims that those charged billed the programs for unnecessary drugs that were never purchased or given to the patients.

Inside an FBI opioid task force:

The Dark-World with U-47700 and Bitcoin

Congress should sanction China operations due to synthetic opioid production and should also list all variants of synthetic opioids as weapons of mass destruction under the chemical and biological weapons convention. DEA now has offices in China to work with officials there and investigation trafficking patterns.

The United States consumes 85% of all the world’s natural and synthetic opiates, which in 2015 factored in 33,091 U.S. deaths, up more than 4000 from the previous year, according to the U.S. Centers for Disease Control and Prevention. Opioid overdoses have quadrupled since 1999. When average U.S. life expectancies for men and women edged downward last year, for the first time in decades, many health professionals blamed opiate abuse.

The opium poppy is no longer the starting point for many of the opiates on the street. The new compounds, often sold mixed with heroin, originate in illicit labs in China. “For the cartels, why wait for a field of poppies to grow and harvest if you can get your hands on the precursor chemicals and cook a batch of fentanyl in a lab?” says Tim Reagan, resident agent in charge of the U.S. Drug Enforcement Administration’s (DEA’s) Cincinnati office.

In late 2015, the drug agency persuaded its Chinese counterpart to add 116 synthetic drugs to its list of controlled substances; fentanyl and several analogs were included. In response, underground Chinese labs began tweaking the fentanyl molecule, which is easy to alter for anyone with basic knowledge of chemistry and lab tools. By adding chemical groups, unscrupulous chemists have created new, unregulated variants, some of them even more potent than the original.

Hoping to stem the tide of synthetic opiates, DEA has taken the fight to China, as prolific a maker of illicit drugs as it is of legitimate chemicals. According to a U.S.-China Economic and Security Review Commission report last month, “China is a global source of illicit fentanyl and other [new psychoactive substances] because the country’s vast chemical and pharmaceutical industries are weakly regulated and poorly monitored.” In response to U.S. pressure, China has scheduled fentanyl and several other derivatives. More here.

U-47700
COMMON NAMES
U-47700
EFFECTS CLASSIFICATIONS
Opioid
CHEMICAL NAME
3,4-dichloro-N-[2-(dimethylamino)cyclohexyl]-N-methylbenzamide
DESCRIPTION
U-47700 is a short-acting synthetic opioid analgesic that first became available via online vendors in late 2014. It has only a short history of human use. U-47700 has been detected in counterfeit pharmaceutical opioids and associated with deaths.BASICS EFFECTS IMAGES HEALTH DOSE CHEMISTRY
Mar-Apr 2016 – Fake oxycodone tablets containing U-47700 are seized by law enforcement in Ohio and fake Norco tablets containing U-47700 and fentanyl appear in the Sacramento, CA area.

An 18-Year-Old Girl Died From a Synthetic Opioid She Bought Online. Here’s How Portland Police Cracked the Case.

A fatal overdose in East Portland leads detectives into the Dark Web, where lab-created opioids are bought with Bitcoin.

Courtesy of Jessica Collins

Even by Portland standards, the weather was dreary on the day Aisha Zughbieh-Collins died.

It was late morning Feb. 16 when Jessica Collins drove through a 40-degree drizzle to the pink and yellow townhouse on Southeast 84th Avenue, where Aisha, her 18-year-old daughter, lived.

Collins drove gingerly down the rutted, dead-end gravel street. It’s the kind of street that’s often lined with abandoned shopping carts.

She got out of her truck, walked into Aisha’s townhouse and climbed the stairs with a sense of dread. For the past 12 hours, Collins had been unable to reach her daughter.

Just two weeks earlier, Aisha had overdosed, her life saved when a roommate called paramedics.

As Collins entered her daughter’s bedroom, Aisha was sitting lotus-style on her bed.

“Each step closer I could tell something was really wrong,” Collins recalls.

Aisha had a syringe in her right arm, and a shoelace tourniquet tied around her biceps. She wasn’t breathing. Her skin was cold.

“I know it sounds strange,” Collins says, “but a sense of peace came over me—that she’s OK now—even though she was dead in front of me.”

Drug overdoses now kill more people than firearms or automobile crashes in Oregon, according to state figures, and are the largest cause of accidental death in the U.S. As the country’s overdose death total continues to soar, Oregon officials have responded far more effectively than officials in most states (see chart below).

Source: Centers for Disease Control
While opioid overdose deaths nationally rose 57 percent from 2010 to 2015, they actually dropped slightly in Oregon over the same period. Source: Oregon Health Authority
While opioid overdose deaths nationally rose 57 percent from 2010 to 2015, they actually dropped slightly in Oregon over the same period. Source: Oregon Health Authority

But even in Portland, which has slowed overdose deaths resulting from heroin and prescription opioids such as oxycodone, Aisha’s death is part of a new and dangerous development.

The drug that killed her was a potent “synthetic” opioid manufactured in China—a drug so new that narcotics investigators and Portland’s public health officials had never encountered it before.

“What we don’t have a lot of here yet is the synthetics,” says Dr. Paul Lewis, the Multnomah County health officer. “That could change.”

When Portland Police Bureau detectives arrived at Aisha’s townhouse, they were initially stymied. Their investigation would eventually lead them across the country and into the deepest recesses of the internet: places where the common currency is Bitcoin, and where buyers and sellers are anonymous and far removed from each other. Bitcoin is used for a lot of other purposes though, as people find it a lot easier to buy bitcoin. It just depends on the circumstances though obviously.

The trail would take them to a condo in South Carolina, and to one of the Dark Web’s most prolific synthetic opioid sellers.

“We’d never done a case like this,” says the Police Bureau detective who led the investigation. “We weren’t familiar with the substance. And we had no idea where it came from.”

Aisha Zughbieh-Collins traveled a long way in a short life that started on the Gulf Coast of Florida.

She was petite—barely 5 feet 4 inches tall, with a quick smile. She loved animals: She used to have a cat named Bebe and a Burmese python named Applejack. She liked sushi and Thai food, root beer and cream soda. She listened to Bright Eyes and Nirvana.

In November 2015, Aisha ran away from a foster-care facility in Baltimore, where her mother says she’d been assaulted. Aisha reconnected with her mother, who was also living in Maryland but who had lost custody of Aisha three years earlier.

Rather than return Aisha to foster care, the pair decided to head west to begin new lives. They left shortly before Thanksgiving. “We didn’t know where to go, but we wanted warm weather,” Collins says.

They drove west in a sunflower-colored Nissan Xterra, using throwaway phones and paying cash at cheap motels. They feared authorities might be looking for Aisha, who was 17 years old and still a ward of the state.

They arrived in Oregon in February 2016, and Collins found work as a host in a remote campground in Mount Hood National Forest.

They liked the woods, but for Aisha, there was little in the way of entertainment—nobody her age, nowhere to eat, and no WiFi. “It was hard for Aisha to be without the internet,” Collins says.

In May of that year, Aisha found a place to live on Craigslist and moved to the Brentwood-Darlington neighborhood just east of 82nd Avenue, sharing with several housemates the townhouse where she would eventually die.

Collins says her daughter had been using hard drugs in Maryland, and had started using again when Collins moved to Portland, living near Aisha.
She told her mother she was using a drug called U-47700.

U-47700, known sometimes as U4 or “pink,” was developed by the pharmaceutical company Upjohn in 1976 as an alternative to morphine but never received U.S. Food and Drug Administration approval. As a result, it was never placed on the FDA’s schedule of illicit drugs, so for decades there was no prohibition on its manufacture or distribution. It existed in a gray zone—neither approved for use nor specifically illegal.

And while Upjohn never manufactured the drug, laboratories in China—where law enforcement officials say many synthetic opioids are made—figured out how to do so.

U-47700 is also lethal—nearly eight times more potent than heroin. Records show the feds first became aware that people were using U4 to get high in October 2015, although they weren’t sure where the drug was coming from.

In the next year, they recorded 46 overdose deaths, most on the Eastern Seaboard. In November 2016, the U.S. Drug Enforcement Administration, “responding to the imminent threat to public health and safety,” made U-47700 a schedule I substance, classifying it among the most dangerous street drugs.

“I told Aisha U4 was suicide,” Collins recalls. “You can’t choose whether you live or die. It’s like Russian roulette.”

Rising Synthetic Tide: Overdose deaths from synthetic opioids rose much faster last year than overdose deaths from heroin or prescription pain pills.

Source: Centers for Disease Control
Source: Centers for Disease Control

The day Aisha died, Portland narcotics detectives arrived at her townhouse. The lead detective is a stocky cop, with salt-and-pepper hair and, considering his job, a cheery demeanor.

The detective later spoke to WW but insisted on anonymity because he works undercover. He sees a lot of dead bodies: There are about two fatal overdoses a week in Portland, most opioid-related.

But this one stood out, the detective says, not only because he’d never heard of the drug that killed Aisha, but also because she was a woman, and so young—the average overdose victim in Oregon is a man over 35.

The house where Aisha Zughbieh-Collins died. (Hilary Sanders)
The house where Aisha Zughbieh-Collins died. (Hilary Sanders)

Portland’s approach to overdose deaths changed in 2007, when Kraig Crow, a Lincoln High School graduate, fatally overdosed.

“Our policy here is different from other jurisdictions’,” the detective says. “Before, we just walked away and let the medical examiner handle it.

“After the Lincoln case,” he continues, “we started asking, ‘What can we find at the scene that can allow us to investigate further?'”

When Portland detectives respond to an overdose death now, they are looking for witnesses, phones and the packaging in which drugs are delivered.

In the Crow case, prosecutors won convictions of six defendants, including what’s called a “Len Bias conviction” for the top dealer.

That law, named after University of Maryland basketball star Len Bias, who died of a cocaine overdose in 1986 after being picked second overall in the NBA draft, became a potent tool for prosecutors because it replaced lighter sentences with a 20-year prison term for those who deal drugs leading to a death.

Federal prosecutors in Oregon are recognized as national leaders in bringing Len Bias cases.

Investigators try to determine how the fatal dose moved from the original source to the consumer, establishing a chain of custody. “Every person in the chain is potentially liable for the overdose death,” says Steve Mygrant, an assistant U.S. attorney who has prosecuted several dealers in fatal overdose cases. (Local and federal officials often cooperate on Len Bias cases.)

Aisha’s mother told detectives she thought her daughter bought U4 online, and she provided them with Aisha’s email address.

The detectives also found unusual materials in Aisha’s bedroom—distinctive packaging suggested someone had carefully disguised the U-47700 to send it through the mail.

The drug Aisha bought had been hidden in a VeriQuick brand pregnancy test kit—sold only at Dollar Tree stores—and appeared to have arrived from an unknown seller in a U.S. Postal Service shipping envelope from South Carolina.
Those were clues. But the detectives couldn’t work their way up the usual chain of delivery as they do in heroin cases.

“Our calls usually come from people complaining about a neighborhood drug house,” the detective says. “This online stuff is at a completely different level.”

The next day, the detectives asked for help from federal experts who knew how to navigate the deepest recesses of the internet.

In 2013, federal agents busted Silk Road, a vast online bazaar for drugs, child pornography, illegal weapons, stolen credit cards, valuable personal information, hacking services and even contract killers.

Silk Road operated on what’s called the Dark Web. That’s the term used to describe the vast array of websites that operate out of reach of the average web surfer.

The internet is like an iceberg: Experts say less than 5 percent of websites are visible using typical browsers such as Safari, Firefox or Chrome.

Some of what’s under the surface is benign material that is simply password-protected: legitimate financial and medical records, for instance, that are shielded for privacy reasons. But it is also used by dissidents in countries where free speech isn’t allowed—and by criminals of all kinds.

Dark Web users need a couple of things to access such sites: a specialized (and easily downloadable) browser called Tor and, if they want to remain anonymous, a tool that encrypts their communications and preserves their anonymity. Aisha used what’s called a PGP (“pretty good privacy”) key to hide her activity.

And for people who wish to buy or sell goods or services on the Dark Web, using Bitcoin or another virtual currency adds another layer of anonymity. Bitcoin, which Aisha used, allowed her to purchase drugs without creating the kind of easily traceable trail that credit or debit cards leave behind.

“But once you clear the smoke,” says George Chamberlin, chief of the FBI’s Oregon Cyber Task Force, “it’s not that different from the visible internet.”
When Silk Road disappeared because of the indictment and conviction of its creator, other Dark Web marketplaces took its place. One, called AlphaBay, offers a staggering array of illicit drugs.

Sellers hawk their wares aggressively and encourage buyers to rate their experiences just as customers do on conventional sites such as Amazon, Yelp or Trip Advisor. But instead of rating tacos or hotel rooms, buyers are rating heroin, meth or the newest kind of illicit narcotic, synthetic opioids.

“The game is changing,” the FBI’s Chamberlin says, “especially because of synthetics. They are different because of their potency and because they are trafficked on the Dark Web.”

Detectives found that Aisha had written an alphanumeric code on a pad in her bedroom. That code identified her PGP key.

They determined that Aisha’s PGP key had been used to buy drugs on AlphaBay.
The detective learned that, using her PGP, Aisha had purchased U-47700 on Feb. 11, five days before her death, from a vendor who called himself “Peter the Great”—like the Russian emperor.

A U.S. postal inspector determined the envelope found in Aisha’s bedroom had a fictitious return address but was purchased at a post office in Greenville, S.C.

In April, the Portland detective bought U4 over the Dark Web from Peter the Great. The drugs arrived, wrapped in material from Dollar Tree.

The person who purchased the shipping labels—presumably Peter the Great—used secure email addresses. The investigators then filed a subpoena for all records related to those addresses.

They turned up a name: Ted Khleborod, a resident of Greenville.

Peter the Great—who detectives now believed was Khleborod—was a prolific salesman: Figures on AlphaBay showed he’d done 9,553 transactions.

The Portland detective contacted federal officials in South Carolina. “We scared the crap out the assistant U.S. attorney back there when we told him about the substance and volume of sales,” the detective says. “This guy was sending out the equivalent of bombs.”

Ted Khleborod (Spartanburg County Sheriff’s Office)
Ted Khleborod (Spartanburg County Sheriff’s Office)

Khleborod, now 28, was born in Moldova, part of the former Soviet Union. When he was in high school, records show he spent time on bodybuilder chat boards, discussing the benefits of steroid use and posting as “Arnoldismyhero,” a tribute to former California governor and champion body builder Arnold Schwarzenegger.

He later studied at the University of South Carolina, where, according to his Facebook page, he was pre-med. He graduated in 2016.

Khleborod lived well for a college student, records show, driving a BMW—with a vanity plate that read “TEDALICUS”—and a Ducati motorcycle.

In late April, Portland detectives flew to Greenville to coordinate with local police.

For three days, they staked out Khleborod at his condo. They saw his girlfriend, Ana Barrero, leave his place twice to mail dozens of parcels, with labels matching those they’d found earlier in Aisha’s room and identical to those matching labels from the drugs that investigators bought over the Dark Web from Peter the Great.

They also obtained video of Barrero buying 71 VeriQuick pregnancy test kits at a Dollar Tree in Greenville.

On April 26, officers arrested Khleborod as he left work at an urgent care clinic. “He was a quiet guy, contemplative,” says the Portland detective. “I don’t think he used his own product, and based on his numbers, he could have made a million bucks in the past couple years.”

Khleborod, who is now in custody, faces federal charges in South Carolina. (His attorney did not respond to a request for comment.)

When officers served a search warrant on Khleborod’s condo, they wore hazmat suits to guard against the toxicity of U-47700. They hauled away 9 kilos of the drug, worth $270,000.

They also found a book, written for prospective doctors, called Kill as Few Patients as Possible.

The Portland detective says Aisha’s case revealed to him a new world of synthetic opioids and the Dark Web. He says he also realized that despite all the technically sophisticated tools dealers like Peter the Great employ, they are subject to human mistakes.

“Internet privacy—even with encryption—is not as great as you think,” the detective says. “People on the Dark Web still leave breadcrumbs we can follow.”
Jessica Collins says she’s happy police arrested Khleborod. But she remains heartbroken over her daughter’s death.

“I feel like she’s with me every day,” Collins says, “and I worry about how many other families this might happen to.”

Cam Strahm, the DEA chief for Oregon, applauds the police work that led to Khleborod’s capture. But he says after 26 years of chasing drug dealers, he’s come to understand the limits of that work.

“Addiction is a treatable disease,” he says, “and we’re facing an epidemic. We can’t arrest our way out of it.”

Aisha Collins (Courtesy of Jessica Collins)
Aisha Collins (Courtesy of Jessica Collins)

The Wages of Synthetics

The new challenge from synthetic opioids marketed over the Dark Web comes at a time when the trend in overdose deaths in Oregon is relatively positive.

Opioid deaths here have declined in recent years, while the trend in the rest of the country is still sharply upward. (The New York Times recently reported deaths jumped nearly 20 percent nationally in 2016.)

“When you look at the rest of the country, flat is good,”says Multnomah County Health Officer Dr. Paul Lewis.

There are two reasons for the good news. The first is naloxone, marketed under the brand name Narcan, a nasal spray that reverses overdoses. Under the leadership of former Multnomah County Health Officer Dr. Gary Oxman, the Portland area was a national pioneer in making naloxone widely available (“Who Wants to Save a Junkie?WW, March 13, 2013).

And Oxman’s successor, Lewis, pushed large metro-area medical systems to decrease the number of opioid pain pills prescribed to patients. That number has decreased each of the past five quarters.

Together, those two developments have caused the number of overdose deaths in Oregon to decline, a result most states would envy.

But deaths such as Aisha Zughbieh-Collins’ highlight a new danger: synthetic opioids such as fentanyl, carfentanil and U-47700 that are not prescribed by physicians but instead manufactured and sold illegally.

Lewis says there have been just two confirmed deaths in the metro area in the past 18 months in which U-47700 was the primary cause. But synthetic opioids are now the nation’s fastest-growing cause of overdose deaths. The death toll in some states is extraordinary: Last year, for instance, there were 34 deaths from synthetics in Oregon in 2015—and 949 in Massachusetts.

“The synthetic thing is new to everybody,” Lewis says. “We thought heroin was the foe, but now these synthetics come along. It’s a new chapter, and we don’t know how it ends.”

Cam Strahm of the U.S. Drug Enforcement Administration notes that synthetics such as fentanyl and carfentanil are dozens or even hundreds of times stronger than heroin.

Strahm says synthetics are also less predictable than heroin, which is now fairly standard in quality and potency. The dealers who sell synthetics often mix them in nonstandard “cocktails” and also frequently misrepresent what they are selling.

“When you are making illicit purchases from anonymous sources, you can’t depend on purity or that what you think you are buying is what you actually get,” Strahm says. “You really don’t know what you are purchasing. It’s like going on a vacation without knowing your destination.”

C’mon White House, NEVER Trust China

Primer: Moscow hired thousands of North Koreans to build the infrastructure for the Sochi Olympics. Russia still uses North Korean slaves for mining and forestry. The North Koreans are hired slaves that have to send their pay checks back the the Kim regime. Not to be outdone, Qatar is doing the same with slaves from the DPRK, as they are hired to build the stadium for the FIFA World Cup Soccer games in 2020.

North Koreans are hired out to foreign corrupt governments to work 20 hours a day with a pay rate of $100 per month (US$) and 70% of that goes back to Pyongyang as a loyalty payment.

By the way, China, Kuwait, Libya, Africa, Oman and several other countries hire the slaves and their living conditions don’t even qualify as slums, they are much worse.

So, while there is much worry about the missile and nuclear program at the hands of North Korea, China is a major culprit in full assistance and cooperation in that regard. Further, China has aided North Korea and other terror regimes in skirting not only United States sanctions, but those from applied by other nations.

Over the last eight years, the Obama administration has hardly taken any aggressive stance with regard to North Korea and consequences except to shut off humanitarian exports to the country. President Trump meanwhile is trusting Russia and China to deal with North Korea? Worse mistake yet.

Deeper dive…

The Global Web That Keeps North Korea Running

Pyongyang’s ties with 164 countries help it amass money and know-how to develop nuclear weapons

WSJ: North Korea may be one of the world’s most isolated countries, but the tightening sanctions regime it has lived under for the past two decades is anything but impermeable.

An examination of North Korea’s global connections reveals that even as it becomes increasingly dependent on China, Pyongyang maintains economic and diplomatic ties with many nations. Those links—from commercial and banking relationships to scientific training, arms sales, monument-building and restaurants—have helped it amass the money and technical know-how to develop nuclear weapons and missiles.

The nature and extent of North Korea’s global ties comes from current and formal officials, researchers, North Korean defectors, U.N. decisions, NGO’s and an analysis of economic statistics.

North Korea: What Comes After the ICBM Test?

In some cases, North Korea leans on old allies, particularly those like Cuba from the former Communist bloc, or those like Syria that are similarly hostile to the U.S. In others, notably in Africa, it has more transactional relationships to supply items such as cheap weaponry or military training. In the Middle East, it supplies laborers for construction work and pockets almost all their earnings.

Sanctions against North Korea haven’t been as broad as those applied to Iran over its nuclear program, nor as rigidly enforced.

David S. Cohen, undersecretary of the Treasury for terrorism and financial intelligence during the Obama administration, wrote in an op-ed in April that “North Korea has gotten off relatively easy, especially as compared with Iran.”

Trying to crack down on North Korean business activities is like a game of Whac-A-Mole. North Korean defectors have detailed how the regime uses front companies to conceal its commercial activities in foreign countries, or adopts business names that obscure their identity by avoiding using North Korea’s full name, thereby benefiting from confusion over whether the entity is North or South Korean.

Pyongyang maintains diplomatic ties with 164 countries and has embassies in 47, according to the National Committee on North Korea, a Washington-based nongovernmental organization, and the Honolulu-based East-West Center.

Although it lags far behind China, India has been North Korea’s second biggest trade partner in the past couple of years, buying commodities including silver and selling it chemicals among other goods. Russia has exported petroleum products to North Korea and imported items such as garments and frozen fish. Last year, North Korea attempted to export military communications equipment to Eritrea via front companies in Malaysia, according to a recent U.N. report.

Most North Koreans abroad are involved in providing funds for the state, defectors say. One of the primary roles of North Korean diplomats is to help develop and maintain cash flows for the regime, according to former embassy officials. North Korea missions typically have to be self-financed to maximize revenue for the state, these people say.

In recent months, under pressure from the Trump administration, there are signs more countries have begun to clamp down on North Korea. In February, Bulgaria had Pyongyang send home two diplomats in its embassy in Sofia, in line with U.N. Security Council resolutions passed in September calling on countries to reduce the number of North Korean diplomats abroad.

Italy this year moved four North Koreans studying at the International Center for Theoretical Physics in Trieste to switch to less-sensitive majors in line with a Security Council resolution calling for member nations not to provide education that could aid Pyongyang’s weapons program.

In March, Senegal said it suspended issuing visas for artisans from North Korea’s Mansudae Art Studio, a state-run organization that has erected monumental sculptures across Africa.

This image, from North Korea's KRT, shows what it said was the launch of a Hwasong-14 intercontinental ballistic missile.

This image, from North Korea’s KRT, shows what it said was the launch of a Hwasong-14 intercontinental ballistic missile. Photo: /Associated Press

More than 50,000 North Korean workers are employed abroad, according to the Asan Institute for Policy Studies, a Seoul-based think tank, many in construction or factory jobs. For these workers, wages are paid directly to North Korean officials, raising hundreds of millions of dollars a year for the state, human-rights groups say.

These ties are under scrutiny as Pyongyang’s success at launching a missile that could reach Alaska is escalating the crisis over its weapons program. This week’s missile test took place on the back of a Chinese truck imported to North Korea for logging purposes, according to analysts.

U.N. sanctions are primarily intended to block North Korea’s illegitimate trade and revenue streams that have a suspected link to its weapons programs. The U.N. doesn’t target all of Pyongyang’s business activities abroad, such as the chain of restaurants it operates in Asia and the Middle East, or its dispatch of laborers.

U.S. sanctions go further in trying to disrupt North Korea’s trade and revenue, including a recent move to block access to the U.S. financial system for a bank in China on which Pyongyang relied. The U.S. has sanctioned North Korean leader Kim Jong Un, a move that would freeze any of his assets in America.

Secretary of State Rex Tillerson on Tuesday called on the global community to stop doing business with Pyongyang.

Video from a North Korean state news bulletin Tuesday was said to show leader Kim Jong Un applauding after the launch.

Video from a North Korean state news bulletin Tuesday was said to show leader Kim Jong Un applauding after the launch. Photo: Yonhap News/Zuma Press

This week, Sen. Cory Gardner (R., Colo.), chairman of the Senate Foreign Relations Committee’s subpanel on East Asia, said he was drafting legislation that he says would create a “global embargo” on North Korea.

“We need to shut off North Korea’s access to oil, to trade, to currency, to financial institutions,” he said in an interview Thursday, calling for “Iran-style” sanctions. “They are far from being ‘sanctioned out.’ They are certainly isolated, but they have to recognize they ain’t seen nothing yet.”

China has had close ties to North Korea since the 1950s when it sent troops to fight U.S.-led forces backing the South in the Korean War.

In 2001, China accounted for around 18% of North Korea’s exports and 20% of its imports, ranking behind Japan on both measures, according to customs figures compiled by Harvard University’s Atlas of Economic Complexity.

Since U.N. sanctions on North Korea were tightened in 2009, Japan and other countries have curtailed commercial ties with Pyongyang, leaving China as by far its biggest trade partner.

For the past five years, China has accounted for more than 80% of North Korea’s imports and exports, providing an economic lifeline even as political relations between Beijing and Pyongyang have deteriorated.

During that period, China has imported mostly industrial raw materials from North Korea, especially coal, but also seafood and clothing such as men’s suits and overcoats.

In recent days, President Donald Trump has expressed frustration with China for expanding trade with North Korea despite U.S. appeals to exert more pressure.

China says it enforces U.N. sanctions and since February it has banned imports of North Korean coal—one of Pyongyang’s main sources of hard currency.

However, U.N. sanctions still allow trade that isn’t deemed to benefit North Korea’s nuclear and missile programs, and China’s customs figures show that its exports to North Korea have increased this year. Crucially, China continues to be North Korea’s biggest source of crude oil, according to diplomats and experts on the region.

Much of North Korea’s trade takes place over the 880-mile land border with China, which is porous and sparsely guarded. Small Chinese and North Korean companies quietly ferry coal, iron ore and other resources over the border, far from checkpoints.

U.N. sanctions introduced in March 2016 banned exports of North Korean iron ore unless they were exclusively for “livelihood purposes”—a loophole China continues to exploit.

While North Korea gained notoriety in the early 2000s for state-backed exports of illegal drugs and counterfeit U.S. dollars, Pyongyang has mostly shifted its strategy to allow private North Korean enterprises to take the lead, with the regime collecting bribes from these enterprises in a primitive system of taxation, says Justin Hastings, a lecturer at the University of Sydney who has researched North Korea’s overseas smuggling networks.

The shift in strategy means that North Korea can outsource some of the risk involved in the trade while continuing to fill its coffers.

“North Korea is not infinitely adaptable, but it’s far more adaptable than people have thought and its ability to adapt to sanctions has not been reached yet,” Mr. Hastings said.

One informal Chinese trader that Mr. Hastings interviewed for a soon-to-be-published academic paper was importing truckloads and boatloads of North Korean iron ore and other minerals across the river into China for resale as recently as a year ago, when the interview took place.

 

 

WannaCry Hacking Bad, but This is Terrifying

WASHINGTON — CIA Director Mike Pompeo says he thinks disclosure of America’s secret intelligence is on the rise, fueled partly by the “worship” of leakers like Edward Snowden.

“In some ways, I do think it’s accelerated,” Pompeo told MSNBC in an interview that aired Saturday. “I think there is a phenomenon, the worship of Edward Snowden, and those who steal American secrets for the purpose of self-aggrandizement or money or for whatever their motivation may be, does seem to be on the increase.”

Pompeo said the United States needs to redouble its efforts to stem leaks of classified information. More here.

***

A Cyberattack ‘the World Isn’t Ready For’

Golan Ben-Oni, of the IDT Corporation, which was attacked in April with two cyberweapons stolen from the National Security Agency.  Justin T. Gellerson for The New York Times

NEWARK — There have been times over the last two months when Golan Ben-Oni has felt like a voice in the wilderness.

On April 29, someone hit his employer, IDT Corporation, with two cyberweapons that had been stolen from the National Security Agency. Mr. Ben-Oni, the global chief information officer at IDT, was able to fend them off, but the attack left him distraught.

In 22 years of dealing with hackers of every sort, he had never seen anything like it. Who was behind it? How did they evade all of his defenses? How many others had been attacked but did not know it?

Since then, Mr. Ben-Oni has been sounding alarm bells, calling anyone who will listen at the White House, the Federal Bureau of Investigation, the New Jersey attorney general’s office and the top cybersecurity companies in the country to warn them about an attack that may still be invisibly striking victims undetected around the world.

And he is determined to track down whoever did it.

“I don’t pursue every attacker, just the ones that piss me off,” Mr. Ben-Oni told me recently over lentils in his office, which was strewn with empty Red Bull cans. “This pissed me off and, more importantly, it pissed my wife off, which is the real litmus test.”

Two weeks after IDT was hit, the cyberattack known as WannaCry ravaged computers at hospitals in England, universities in China, rail systems in Germany, even auto plants in Japan. No doubt it was destructive. But what Mr. Ben-Oni had witnessed was much worse, and with all eyes on the WannaCry destruction, few seemed to be paying attention to the attack on IDT’s systems — and most likely others around the world.

The strike on IDT, a conglomerate with headquarters in a nondescript gray building here with views of the Manhattan skyline 15 miles away, was similar to WannaCry in one way: Hackers locked up IDT data and demanded a ransom to unlock it.

But the ransom demand was just a smoke screen for a far more invasive attack that stole employee credentials. With those credentials in hand, hackers could have run free through the company’s computer network, taking confidential information or destroying machines.

Worse, the assault, which has never been reported before, was not spotted by some of the nation’s leading cybersecurity products, the top security engineers at its biggest tech companies, government intelligence analysts or the F.B.I., which remains consumed with the WannaCry attack.

Were it not for a digital black box that recorded everything on IDT’s network, along with Mr. Ben-Oni’s tenacity, the attack might have gone unnoticed.

Scans for the two hacking tools used against IDT indicate that the company is not alone. In fact, tens of thousands of computer systems all over the world have been “backdoored” by the same N.S.A. weapons. Mr. Ben-Oni and other security researchers worry that many of those other infected computers are connected to transportation networks, hospitals, water treatment plants and other utilities.

An attack on those systems, they warn, could put lives at risk. And Mr. Ben-Oni, fortified with adrenaline, Red Bull and the house beats of Deadmau5, the Canadian record producer, said he would not stop until the attacks had been shut down and those responsible were behind bars.

“The world is burning about WannaCry, but this is a nuclear bomb compared to WannaCry,” Mr. Ben-Oni said. “This is different. It’s a lot worse. It steals credentials. You can’t catch it, and it’s happening right under our noses.”

And, he added, “The world isn’t ready for this.”

Targeting the Nerve Center

Mr. Ben-Oni, 43, a Hasidic Jew, is a slight man with smiling eyes, a thick beard and a hacker’s penchant for mischief. He grew up in the hills of Berkeley, Calif., the son of Israeli immigrants.

Even as a toddler, Mr. Ben-Oni’s mother said, he was not interested in toys. She had to take him to the local junkyard to scour for typewriters that he would eventually dismantle on the living room floor. As a teenager, he aspired to become a rabbi but spent most of his free time hacking computers at the University of California, Berkeley, where his exploits once accidentally took down Belgium’s entire phone system for 15 minutes.

To his parents’ horror, he dropped out of college to pursue his love of hacking full time, starting a security company to help the city of Berkeley and two nearby communities, Alameda and Novato, set up secure computer networks.

He had a knack for the technical work, but not the marketing, and found it difficult to get new clients. So at age 19, he crossed the country and took a job at IDT, back when the company was a low-profile long-distance service provider.

As IDT started acquiring and spinning off an eclectic list of ventures, Mr. Ben-Oni found himself responsible for securing shale oil projects in Mongolia and the Golan Heights, a “Star Trek” comic books company, a project to cure cancer, a yeshiva university that trains underprivileged students in cybersecurity, and a small mobile company that Verizon recently acquired for $3.1 billion.

Which is to say he has encountered hundreds of thousands of hackers of every stripe, motivation and skill level. He eventually started a security business, IOSecurity, under IDT, to share some of the technical tools he had developed to keep IDT’s many businesses secure. By Mr. Ben-Oni’s estimate, IDT experiences hundreds of attacks a day on its businesses, but perhaps only four each year give him pause.

Nothing compared to the attack that struck in April. Like the WannaCry attack in May, the assault on IDT relied on cyberweapons developed by the N.S.A. that were leaked online in April by a mysterious group of hackers calling themselves the Shadow Brokers — alternately believed to be Russia-backed cybercriminals, an N.S.A. mole, or both.

The WannaCry attack — which the N.S.A. and security researchers have tied to North Korea — employed one N.S.A. cyberweapon; the IDT assault used two.

Both WannaCry and the IDT attack used a hacking tool the agency had code-named EternalBlue. The tool took advantage of unpatched Microsoft servers to automatically spread malware from one server to another, so that within 24 hours North Korea’s hackers had spread their ransomware to more than 200,000 servers around the globe.

The attack on IDT went a step further with another stolen N.S.A. cyberweapon, called DoublePulsar. The N.S.A. used DoublePulsar to penetrate computer systems without tripping security alarms. It allowed N.S.A. spies to inject their tools into the nerve center of a target’s computer system, called the kernel, which manages communications between a computer’s hardware and its software.

In the pecking order of a computer system, the kernel is at the very top, allowing anyone with secret access to it to take full control of a machine. It is also a dangerous blind spot for most security software, allowing attackers to do what they want and go unnoticed. In IDT’s case, attackers used DoublePulsar to steal an IDT contractor’s credentials. Then they deployed ransomware in what appears to be a cover for their real motive: broader access to IDT’s businesses.

Mr. Ben-Oni learned of the attack only when a contractor, working from home, switched on her computer to find that all her data had been encrypted and that attackers were demanding a ransom to unlock it. He might have assumed that this was a simple case of ransomware.

But the attack struck Mr. Ben-Oni as unique. For one thing, it was timed perfectly to the Sabbath. Attackers entered IDT’s network at 6 p.m. on Saturday on the dot, two and a half hours before the Sabbath would end and when most of IDT’s employees — 40 percent of whom identify as Orthodox Jews — would be off the clock. For another, the attackers compromised the contractor’s computer through her home modem — strange.

The black box of sorts, a network recording device made by the Israeli security company Secdo, shows that the ransomware was installed after the attackers had made off with the contractor’s credentials. And they managed to bypass every major security detection mechanism along the way. Finally, before they left, they encrypted her computer with ransomware, demanding $130 to unlock it, to cover up the more invasive attack on her computer.

Mr. Ben-Oni estimates that he has spoken to 107 security experts and researchers about the attack, including the chief executives of nearly every major security company and the heads of threat intelligence at Google, Microsoft and Amazon.

With the exception of Amazon, which found that some of its customers’ computers had been scanned by the same computer that hit IDT, no one had seen any trace of the attack before Mr. Ben-Oni notified them. The New York Times confirmed Mr. Ben-Oni’s account via written summaries provided by Palo Alto Networks, Intel’s McAfee and other security firms he used and asked to investigate the attack.

“I started to get the sense that we were the canary,” he said. “But we recorded it.”

Since IDT was hit, Mr. Ben-Oni has contacted everyone in his Rolodex to warn them of an attack that could still be worming its way, undetected, through victims’ systems.

“Time is burning,” Mr. Ben-Oni said. “Understand, this is really a war — with offense on one side, and institutions, organizations and schools on the other, defending against an unknown adversary.”

‘No One Is Running Point’

Since the Shadow Brokers leaked dozens of coveted attack tools in April, hospitals, schools, cities, police departments and companies around the world have largely been left to fend for themselves against weapons developed by the world’s most sophisticated attacker: the N.S.A.

A month earlier, Microsoft had issued a software patch to defend against the N.S.A. hacking tools — suggesting that the agency tipped the company off to what was coming. Microsoft regularly credits those who point out vulnerabilities in its products, but in this case the company made no mention of the tipster. Later, when the WannaCry attack hit hundreds of thousands of Microsoft customers, Microsoft’s president, Brad Smith, slammed the government in a blog post for hoarding and stockpiling security vulnerabilities.

For his part, Mr. Ben-Oni said he had rolled out Microsoft’s patches as soon as they became available, but attackers still managed to get in through the IDT contractor’s home modem.

Six years ago, Mr. Ben-Oni had a chance meeting with an N.S.A. employee at a conference and asked him how to defend against modern-day cyberthreats. The N.S.A. employee advised him to “run three of everything”: three firewalls, three antivirus solutions, three intrusion detection systems. And so he did.

But in this case, modern-day detection systems created by Cylance, McAfee and Microsoft and patching systems by Tanium did not catch the attack on IDT. Nor did any of the 128 publicly available threat intelligence feeds that IDT subscribes to. Even the 10 threat intelligence feeds that his organization spends a half-million dollars on annually for urgent information failed to report it. He has since threatened to return their products.

“Our industry likes to work on known problems,” Mr. Ben-Oni said. “This is an unknown problem. We’re not ready for this.”

No one he has spoken to knows whether they have been hit, but just this month, restaurants across the United States reported being hit with similar attacks that were undetected by antivirus systems. There are now YouTube videos showing criminals how to attack systems using the very same N.S.A. tools used against IDT, and Metasploit, an automated hacking tool, now allows anyone to carry out these attacks with the click of a button.

Worse still, Mr. Ben-Oni said, “No one is running point on this.”

Last month, he personally briefed the F.B.I. analyst in charge of investigating the WannaCry attack. He was told that the agency had been specifically tasked with WannaCry, and that even though the attack on his company was more invasive and sophisticated, it was still technically something else, and therefore the F.B.I. could not take on his case.

The F.B.I. did not respond to requests for comment.

So Mr. Ben-Oni has largely pursued the case himself. His team at IDT was able to trace part of the attack to a personal Android phone in Russia and has been feeding its findings to Europol, the European law enforcement agency based in The Hague.

The chances that IDT was the only victim of this attack are slim. Sean Dillon, a senior analyst at RiskSense, a New Mexico security company, was among the first security researchers to scan the internet for the N.S.A.’s DoublePulsar tool. He found tens of thousands of host computers are infected with the tool, which attackers can use at will.

“Once DoublePulsar is on the machine, there’s nothing stopping anyone else from coming along and using the back door,” Mr. Dillon said.

More distressing, Mr. Dillon tested all the major antivirus products against the DoublePulsar infection and a demoralizing 99 percent failed to detect it.

“We’ve seen the same computers infected with DoublePulsar for two months and there is no telling how much malware is on those systems,” Mr. Dillon said. “Right now we have no idea what’s gotten into these organizations.”

In the worst case, Mr. Dillon said, attackers could use those back doors to unleash destructive malware into critical infrastructure, tying up rail systems, shutting down hospitals or even paralyzing electrical utilities.

Could that attack be coming? The Shadow Brokers resurfaced last month, promising a fresh load of N.S.A. attack tools, even offering to supply them for monthly paying subscribers — like a wine-of-the-month club for cyberweapon enthusiasts.

In a hint that the industry is taking the group’s threats seriously, Microsoft issued a new set of patches to defend against such attacks. The company noted in an ominously worded message that the patches were critical, citing an “elevated risk for destructive cyberattacks.”

Mr. Ben-Oni is convinced that IDT is not the only victim, and that these tools can and will be used to do far worse.

“I look at this as a life-or-death situation,” he said. “Today it’s us, but tomorrow it might be someone else.”

1.8 Million Exchange Students Part of Security Investigation Review

Primer: Chinese spies target US intellectual property (important due to universities relationships with government operations) Further is 2015, U.S. diplomats previously warned China to stop using covert law enforcement agents on U.S. soil. CNN reported that the agents pressure Chinese citizens to return to the country to face justice, often on corruption charges, United States officials confirmed to CNN. The agents have successfully coerced several Chinese nationals to return to China from the U.S., they said.

So, between India and China we have more than a million foreign nationals at the student level. Are they really students? This is a number too, where American students are eliminated from college acceptance due to favorable foreign student policy.

The Student and Exchange Visitor Program (SEVP) is a part of the National Security Investigations Division and acts as a bridge for government organizations that have an interest in information on nonimmigrants whose primary reason for coming to the United States is to be students.

On behalf of the Department of Homeland Security (DHS), SEVP manages schools, nonimmigrant students in the F and M visa classifications and their dependents. The Department of State (DoS) manages Exchange Visitor Programs, nonimmigrant exchange visitors in the J visa classification and their dependents. Both SEVP and DoS use the Student and Exchange Visitor Information System (SEVIS) to track and monitor schools; exchange visitor programs; and F, M and J nonimmigrants while they visit the United States and participate in the U.S. education system.

WASHINGTON — There are 1.18 million international students with F (academic) or M (vocational) status studying at 8,774 schools in the United States according to the latest “SEVIS by the Numbers.” The biannual report on international student data, which includes a new section on regional data trends, is prepared by the Student and Exchange Visitor Program (SEVP), part of U.S. Immigration and Customs Enforcement’s (ICE) Homeland Security Investigations (HSI).

The report, released Thursday by SEVP, highlights May 2017 data from the Student and Exchange Visitor Information System (SEVIS), a web-based system that includes information about international students, exchange visitors and their dependents while they are in the United States.

Based on data extracted from SEVIS May 5, the international student population increased 2 percent compared to May 2016, with 76 percent of students enrolled in higher education programs of study.

Seventy-seven percent of international students hailed from Asia. Among continents, South America had the largest percentage increase (6.5 percent) in international students studying in the United States when compared to May 2016.  

China and India continue to send the largest number of students to study in the United States, at 362,368 students and 206,698 students, respectively. And even with a 19 percent decline – the steepest percentage decline among the top 10 Asian countries – Saudi Arabia still had 55,806 students studying in the United States in May 2017, ranking fourth among Asian countries. With an 18 percent increase, Nepal saw the largest proportional growth in students coming to the United States.

Nearly 514,000 international students pursued science, technology engineering or mathematics (STEM) degrees in May 2017, marking an 8 percent increase from May 2016. Thirty-nine percent of those students pursued engineering degrees. India not only had the largest number of STEM students, but also the largest proportional STEM student population; 84 percent of Indian students in the United States studied STEM.

In May 2017, 10 U.S. universities certified to enroll only F international students accounted for 10 percent of the entire international student population. New York University (15,386 students), the University of Southern California (13,365 students) and Northeastern University (12,372 students) – all certified to enroll F students – had the highest international student enrollment numbers among U.S. schools.

Nine percent of schools can enroll both F and M international students. The top three schools in this category included: Cornell University (5,716 students), the Houston Community College System (4,768 students) and Santa Monica College (3,554 students).

The international student population in the Northeast increased 4 percent when compared to May 2016, marking the highest proportional growth of the four U.S. regions. Rhode Island was the only state in the region to experience a dip in the number of international students compared to the previous year, while New York and Massachusetts added the largest number of international students during that same period, 4,490 students and 2,770 students, respectively. New Jersey saw an increase of 10 percent in international students pursuing bachelor’s degrees.

In the South, the international student population grew 3 percent since May 2016. Florida, Georgia and Texas all saw significant increases in the number of international students studying in those states.  While Louisiana, Tennessee and Oklahoma saw decreases in the number of international students studying there..

Arkansas, Kentucky and Maryland all saw major growth in international students taking part in their higher education system. Maryland saw a 10 percent increase in the number of students earning a bachelor’s degree. However, the southern region saw the largest growth at the graduate degree level. The number of international students pursuing master’s degrees increased 25 percent in Arkansas and 35 percent in Kentucky.

The Midwest saw minimal growth of 1 percent. Illinois added 1,331 students to its international student population, marking the largest increase in the region, while Nebraska experienced the largest proportional growth of 7 percent. Missouri experienced the largest decrease in international students, both in terms of student numbers and proportional decline, 763 students and 3 percent, respectively.

In the western part of the United States, international student enrollment stayed relatively static in California, other than an 8 percent increase in the number of students earning bachelor’s degrees. Idaho saw a 14 percent drop in the total number of international students studying in the state, with a 16 percent decrease in the number of students earning a bachelor’s degree. But, Nevada’s international student population grew by 5 percent, marking the largest proportional growth in the region.

The full “SEVIS by the Numbers” report can be viewed here. Report data was extracted from SEVIS May 5. The report captures a point-in-time snapshot of data related to international students studying in the United States. Data for the previous “SEVIS by the Numbers” report was extracted from SEVIS in November 2016.

Individuals can explore more international student data from current and previous “SEVIS by the Numbers” reports by visiting the Study in the States interactive mapping tool. This information is accessible at the continent, region and country level and includes information on gender and education levels, as well as international student populations by state, broken down by geographical areas across the globe.

SEVP monitors the more than one million international students pursuing academic or vocational studies (F and M visa holders) in the United States and their dependents. It also certifies the schools and programs that enroll these students. The U.S. Department of State monitors exchange visitors (J visa holders) and their dependents, and oversees exchange visitor programs.

Both SEVP and the Department of State use SEVIS to protect national security by ensuring that students, visitors and schools comply with U.S. laws. SEVP also collects and shares SEVIS information with government partners, including U.S. Customs and Border Protection and U.S. Citizenship and Immigration Services, so only legitimate international students and exchange visitors gain entry into the United States.

HSI reviews SEVIS records for potential violations and refers cases with possible national security risks or public safety concerns to its field offices for further investigation. Additionally, SEVP’s Analysis and Operations Center reviews student and school records for administrative compliance with federal regulations related to studying in the United States.