Iran Deal, Deviled Details White House is Avoiding

Iran Inspections in 24 Days? Not Even Close

Hillel Fradkin & Lewis Libby

The Obama administration assures Americans that the Iran deal grants access within 24 days to undeclared but suspected Iranian nuclear sites. But that’s hardly how a recalcitrant Iran is likely to interpret the deal. A close examination of the Joint Comprehensive Plan of Action released by the Obama administration reveals that its terms permit Iran to hold inspectors at bay for months, likely three or more.

Paragraphs 74 to 78 govern the International Atomic Energy Agency’s access to suspect sites. First, the IAEA tells Iran “the basis” of its concerns about a particular location, requesting clarification. At this point Iran will know where the IAEA is headed. Iran then provides the IAEA with “explanations” to resolve IAEA concerns. This stage has no time limit.

Opportunities for delay abound. Iran will presumably want to know what prompted the IAEA’s concern. The suspect site identified by the IAEA is likely to be remote, and Iran will no doubt say that it must gather skilled people and equipment to responsibly allay IAEA concerns. Iran may offer explanations in stages, seeking IAEA clarifications before “completing” its response. That could take a while.

Only if Iran’s “explanations do not resolve the IAEA’s concerns” may the IAEA then “request access” to the suspect site. Oddly, the agreement doesn’t specify who judges whether the explanations resolve concerns. If Iran claims that it has a say in the matter, the process may stall here. Assuming Iran grants that the IAEA can be the judge, might Iran claim that the “great Satan” improperly influenced IAEA conclusions? Let’s assume that Tehran won’t do that.

Now the IAEA must provide written reasons for the request and “make available relevant information.” Let’s assume that even though the IAEA may resist revealing the secret sources or technical means that prompted its suspicions, Iran acknowledges that a proper request has been supplied.

Only then do the supposed 24 days begin to run. First, Iran may propose, and the IAEA must consider, alternative means of resolving concerns. This may take 14 days. Absent satisfactory “arrangements,” a new period begins.

During this period Iran, “in consultation with” the Joint Commission, will “resolve” the IAEA concerns “through necessary means agreed between Iran and the IAEA.” The Joint Commission includes China, France, Germany, Russia, the U.K, the U.S., the European Union and, of course, Iran. Not exactly a wieldy bunch.

The Iranians will likely claim that “consultation” with the Joint Commission doesn’t bind Tehran, just as the U.S. president isn’t bound by consultations with Congress. The agreement says the consultation process will not exceed seven days, but Iran can point out that the nuclear deal doesn’t specify when Iran and the IAEA must reach agreement and “resolve” IAEA concerns.

In the absence of Iran-IAEA agreement, a majority of the Joint Commission has seven days to “advise” on the “necessary means” to resolve the matter. Iran may fairly argue that the commission’s right to “advise” is not the same as a right to “determine” the “necessary means.” Lastly, the agreement provides that “Iran would implement the necessary means within 3 additional days.” But what “necessary means” are these? As noted, the agreement refers to “necessary means agreed between Iran and the IAEA.” So these additional three days don’t even begin until an agreement is reached.

Now what? Well, the U.S. may take a “Dispute” to the Joint Commission, on which Iran sits, which has 15 days to resolve the issue. Parties may or may not invoke a similar 15 days for foreign ministers to act. Parties may also request a nonbinding opinion within 15 days from an advisory board consisting of three members, one appointed by Iran, one by the complaining country and “a third independent member.”

But Iran may argue that nothing in the nuclear deal specifies how quickly a country must appoint its advisory-board member or even how the “independent member” is selected. In short, this stage may take at least 30 days and possibly 45 of consideration at the different levels, but Iran may argue that the last 15 days don’t start until an advisory board has been duly formed. Then we get another five days of Joint Commission deliberation, before a disappointed U.S. or other commission member seeking IAEA inspections can hobble off to the United Nations seeking resolutions reimposing sanctions.

In short, as Iran is free to interpret the agreement, 63 or even 78 days may pass, plus three potentially lengthy periods that Iran can stretch out: One of “explanations” before the clock starts, one to agree on necessary means and “resolve concerns,” and one for advisory-board selection near the end.

So from the moment the IAEA first tips its hand about what it wants to inspect, likely three or more months may pass. All along, the Joint Commission is required to act in “good faith,” and to make only “minimum necessary” requests limited to verification, not “interference.” Tehran could also cite these terms to challenge particular requests.

The description of this process is based on the English-language text of the nuclear agreement. The text lacks a provision that it is the entire agreement, so Iran may claim support in supposed side agreements or statements during negotiations.

Announcing this “comprehensive, long-term” deal, President Obama quoted President Kennedy’s 1961 call for negotiations with the Soviets. Kennedy reached two notable nuclear agreements. Mr. Obama didn’t mention that within a decade of Kennedy’s 1963 Limited Test Ban Treaty, Soviet nuclear forces—once a fraction of America’s—were at parity or had surpassed ours.

During the 1962 Cuban Missile Crisis, Kennedy reached secret agreements—undisclosed to Americans for decades—not to invade Cuba and to withdraw U.S. weapons from Turkey. By invoking Kennedy was President Obama signaling there is more to this “long-term” deal than we know?

He is a subtle man.

WH: Census to Home Surveys to HUD to Massive Database

In 2013, Congresswoman Maxine Waters appeared on television and spilled the secret.

Did you ever wonder exactly why the White House took control of the U.S. Census in 2010 from the Commerce Secretary? It was a multi-tracked mission that not only included future Gerrymandering efforts, but it was for data-mining housing, and to all patterns of personal life across the country.

The Wall Street Journal reports that the Chinese have hacked databases and has personal data.

It was just a few weeks ago that Housing and Urban Development announced a scheme to racially diversify neighborhoods across the country. Zipcodes appear to be racist and the White House with HUD is working to change that.

So understand these efforts, in 2013 the profiles of cities began where fact sheets have been created.

A sample of what they are tracking is found here.

Screen shot 2015-07-18 at 6.07.54 PM

 

 

 

So, when the NY Post publishes this by Paul Sperry, one must take real notice. We have a pattern here.

Obama collecting personal data for a secret race database

A key part of President Obama’s legacy will be the fed’s unprecedented collection of sensitive data on Americans by race. The government is prying into our most personal information at the most local levels, all for the purpose of “racial and economic justice.”

Unbeknown to most Americans, Obama’s racial bean counters are furiously mining data on their health, home loans, credit cards, places of work, neighborhoods, even how their kids are disciplined in school — all to document “inequalities” between minorities and whites.

This Orwellian-style stockpile of statistics includes a vast and permanent network of discrimination databases, which Obama already is using to make “disparate impact” cases against: banks that don’t make enough prime loans to minorities; schools that suspend too many blacks; cities that don’t offer enough Section 8 and other low-income housing for minorities; and employers who turn down African-Americans for jobs due to criminal backgrounds.

Big Brother Barack wants the databases operational before he leaves office, and much of the data in them will be posted online.

So civil-rights attorneys and urban activist groups will be able to exploit them to show patterns of “racial disparities” and “segregation,” even if no other evidence of discrimination exists.

Obama is presiding over the largest consolidation of personal data in US history.

Housing database

The granddaddy of them all is the Affirmatively Furthering Fair Housing database, which the Department of Housing and Urban Development rolled out earlier this month to racially balance the nation, ZIP code by ZIP code. It will map every US neighborhood by four racial groups — white, Asian, black or African-American, and Hispanic/Latino — and publish “geospatial data” pinpointing racial imbalances.

The agency proposes using nonwhite populations of 50% or higher as the threshold for classifying segregated areas.

Federally funded cities deemed overly segregated will be pressured to change their zoning laws to allow construction of more subsidized housing in affluent areas in the suburbs, and relocate inner-city minorities to those predominantly white areas. HUD’s maps, which use dots to show the racial distribution or density in residential areas, will be used to select affordable-housing sites.

HUD plans to drill down to an even more granular level, detailing the proximity of black residents to transportation sites, good schools, parks and even supermarkets. If the agency’s social engineers rule the distance between blacks and these suburban “amenities” is too far, municipalities must find ways to close the gap or forfeit federal grant money and face possible lawsuits for housing discrimination.

Civil-rights groups will have access to the agency’s sophisticated mapping software, and will participate in city plans to re-engineer neighborhoods under new community outreach requirements.

“By opening this data to everybody, everyone in a community can weigh in,” Obama said. “If you want affordable housing nearby, now you’ll have the data you need to make your case.”

Mortgage database

Meanwhile, the Federal Housing Finance Agency, headed by former Congressional Black Caucus leader Mel Watt, is building its own database for racially balancing home loans. The so-called National Mortgage Database Project will compile 16 years of lending data, broken down by race, and hold everything from individual credit scores and employment records.

Mortgage contracts won’t be the only financial records vacuumed up by the database. According to federal documents, the repository will include “all credit lines,” from credit cards to student loans to car loans — anything reported to credit bureaus. This is even more information than the IRS collects.

The FHFA will also pry into your personal assets and debts and whether you have any bankruptcies. The agency even wants to know the square footage and lot size of your home, as well as your interest rate.

FHFA will share the info with Obama’s brainchild, the Consumer Financial Protection Bureau, which acts more like a civil-rights agency, aggressively investigating lenders for racial bias.

The FHFA has offered no clear explanation as to why the government wants to sweep up so much sensitive information on Americans, other than stating it’s for “research” and “policymaking.”

However, CFPB Director Richard Cordray was more forthcoming, explaining in a recent talk to the radical California-based Greenlining Institute: “We will be better able to identify possible discriminatory lending patterns.”

Credit database

CFPB is separately amassing a database to monitor ordinary citizens’ credit-card transactions. It hopes to vacuum up some 900 million credit-card accounts — all sorted by race — representing roughly 85% of the US credit-card market. Why? To sniff out “disparities” in interest rates, charge-offs and collections.

Employment database

CFPB also just finalized a rule requiring all regulated banks to report data on minority hiring to an Office of Minority and Women Inclusion. It will collect reams of employment data, broken down by race, to police diversity on Wall Street as part of yet another fishing expedition.

School database

Through its mandatory Civil Rights Data Collection project, the Education Department is gathering information on student suspensions and expulsions, by race, from every public school district in the country. Districts that show disparities in discipline will be targeted for reform.

Those that don’t comply will be punished. Several already have been forced to revise their discipline policies, which has led to violent disruptions in classrooms.

Obama’s educrats want to know how many blacks versus whites are enrolled in gifted-and-talented and advanced placement classes.

Schools that show blacks and Latinos under-enrolled in such curricula, to an undefined “statistically significant degree,” could open themselves up to investigation and lawsuits by the department’s Civil Rights Office.

Count on a flood of private lawsuits to piggyback federal discrimination claims, as civil-rights lawyers use the new federal discipline data in their legal strategies against the supposedly racist US school system.

Even if no one has complained about discrimination, even if there is no other evidence of racism, the numbers themselves will “prove” that things are unfair.

Such databases have never before existed. Obama is presiding over the largest consolidation of personal data in US history. He is creating a diversity police state where government race cops and civil-rights lawyers will micromanage demographic outcomes in virtually every aspect of society.

The first black president, quite brilliantly, has built a quasi-reparations infrastructure perpetually fed by racial data that will outlast his administration.

Paul Sperry is a Hoover Institution media fellow and author of “The Great American Bank Robbery,” which exposes the racial politics behind the mortgage bust.

 

Guzman’s Sinaloa, Global Narcotics Power and Violence

El Chapo Guzman, the wealthiest narcotics trafficker in the world and maintaining an empire where is personal war chest is valued into the billions, remains at large after escaping from a Mexican prison.

Factoid:

Between 1987 and 1989, Gúzman used both airplanes and ships to smuggle 20 to 24 tons of cocaine to the United States every month. Authorities believe Gúzman operated no less than ten aircraft at one time. For an interesting read on the genesis of the cartels in Mexico, the names and the inner sanctum within the Mexican government, click here.

In Mexico and beyond, what is most misunderstood is the government and law enforcement corruption that colludes the cartels. Fundamentally, the cartels runs the Mexican government through covert payroll, bribes and extortion. This is a model used throughout Latin America, the Middle East and Asia. Narco dollars worldwide is an industry well in competition for ranking with the petro-dollar.

The estimated related deaths in Mexico attributed to the cartels is difficult to estimate mostly due to lack of reporting by law enforcement and government officials yet in one year the numbers hover around 200,000. Journalist are on the hit lists for just investigating, so reporting on the ground conditions has become fleeting at best.

In Mexico, Crime Is Bigger Than a Crime Boss

From Stratfor

Summary

The July 11 escape of the notorious Sinaloa crime boss, Joaquin “El Chapo” Guzman Loera, from a maximum-security prison in Mexico has drawn considerable Mexican and international media attention. While the brazen and elaborate nature of the escape will add to the lore already surrounding Guzman, the escape itself carries little significance for organized crime in Mexico — though it will place a momentary strain on coordination between U.S. and Mexican law enforcement. The forces that drive the evolution of organized crime and their impact on society in Mexico are simply greater than any single crime boss.

Analysis

Mexico’s geography enabled drug traffickers like Guzman to operate on a global scale. As international law enforcement effectively dismantled the powerful Colombian cartels and stymied their maritime trafficking routes through the Caribbean in the 1980s and 1990s, Mexico became the lynchpin of new smuggling routes into the United States. This evolution took place just as the Mexican criminal networks that trafficked drugs broke down into smaller groups. Though crime bosses like Guzman rose in stature relative to others, all organized crime groups in Mexico are the result of a systematic decentralization in cartel structure that continues today.

In fact, by the time Guzman was arrested in February 2014, the Sinaloa Cartel was already fragmenting. Groups that operated in areas such as Chihuahua, Sonora, Sinaloa and Baja California states — areas that were once part of El Chapo’s criminal network — were already acting autonomously. Some of them were even fighting one another. The arrest of Guzman and the subsequent capture of some of his lieutenants only accelerated this trend. Now, geographic domains that were controlled by Sinaloa-based crime bosses for decades are now controlled by other groups, including the Cartel de Jalisco Nueva Generacion, which expanded from the Tierra Caliente region, and La Linea, which was once the enforcement group for the Juarez cartel.

Among the myths surrounding El Chapo were tales pertaining to his purported role as an arbiter of organized crime in Mexico. According to some of those myths, his organization preferred to expand its business operations through negotiation, rather than through violent conflict. But Guzman, in fact, was party to some of the most violent turf wars in Mexico, introducing rampant insecurity in places such as Tijuana, Nuevo Laredo and Ciudad Juarez. These conflicts had subsided by the time he was arrested but not before nationwide turf wars devolved into more localized conflicts. Guzman may attempt to re-consolidate the control he once had over Mexico’s organized crime activities, but his previous efforts to do so failed, and the task would be even tougher now that his network has become even thinner.

Since 2012, Mexican organized crime has become increasingly balkanized amid government efforts to revamp public security institutions, and nationwide levels of organized crime-related violence have gradually diminished. Though having more crime groups means there are more bosses, these leaders have not been able to sustain violent offensives against their rivals and fend off the state as well as their predecessors did. And while waves of extreme violence can still emerge in places like Tamaulipas, they typically weaken as soon as security forces move in — in contrast to past conflicts in places like Juarez, where violence continued to climb despite repeated deployments of federal troops.

For additional information on the cartels two summaries can be found in the links below.

http://web.wm.edu/so/monitor/issues/14-2/4-vinson.pdf

http://fas.org/sgp/crs/row/R41576.pdf

Cyberwar, Deeper Truth on China’s Unit 61398

The NSA has been hacking China for years, so it is a cyberwar. What the United States cyber experts have known at least since 2009 spells out that there has been no strategy to combat cyber intrusions much less a declaration that these hacks are an act of war.

The NSA Has A Secret Group Called ‘TAO’ That’s Been Hacking China For 15 Years

China hacking charges: the Chinese army’s Unit 61398
Operating out of a tower block in Shanghai, Unit 61398 allegedly hacks Western companies in support of the Chinese government’s political and economic aims.

From DarkReading:

According to the DOJ indictment, Huang Zhenyu was hired between 2006 and 2009 or later to do programming work for one of the companies (referred to as “SOE-2” in the indictment). Huang was allegedly tasked with constructing a “secret” database to store intelligence about the iron and steel industry, as well as information about US companies.

“Chinese firms hired the same PLA Unit where the defendants worked to provide information technology services,” according to the indictment, which the US Department of Justice unsealed Monday. “For example, one SOE involved in trade litigation against some of the American victims herein hired the Unit, and one of the co-conspirators charged herein, to hold a ‘secret’ database to hold corporate ‘intelligence.'”

The for-hire database project sheds some light on the operations of China’s most prolific hacking unit, Unit 61398 of the Third Department of China’s People’s Liberation Army (also known as APT1), where the alleged hackers work. US Attorney General Eric Holder announced an unprecedented move Monday: The Justice Department had indicted the five men with the military unit for allegedly hacking and stealing trade secrets of major American steel, solar energy, and other manufacturing companies, including Alcoa, Allegheny Technologies Inc., SolarWorld AG, Westinghouse Electric, and US Steel, as well as the United Steel Workers Union.

It has never been a secret, it has only been a topic debated with no resolutions behind closed doors. China has a database on Americans and is filling it with higher details, growing their intelligence on everything America.

China has launched a strategic plan when one examines the order of hacks of American companies, the timing and the data. A full report was published on Unit 61398.

New York Times report

Hacked in the U.S.A.: China’s Not-So-Hidden Infiltration Op

From Bloomberg: The vast cyber-attack in Washington began with, of all things, travel reservations.

More than two years ago, troves of personal data were stolen from U.S. travel companies. Hackers subsequently made off with health records at big insurance companies and infiltrated federal computers where they stole personnel records on 21.5 million people — in what apparently is the largest such theft of U.S. government records in history.

Those individual attacks, once believed to be unconnected, now appear to be part of a coordinated campaign by Chinese hackers to collect sensitive details on key people that went on far longer — and burrowed far deeper — than initially thought.

 

But time and again, U.S. authorities missed clues connecting one incident to the next. Interviews with federal investigators and cybersecurity experts paint a troubling portrait of what many are calling a serious failure of U.S. intelligence agencies to spot the pattern or warn potential victims. Moreover, the problems in Washington add new urgency to calls for vigilance in the private sector.

In revealing the scope of stolen government data on Thursday, Obama administration officials declined to identify a perpetrator. Investigators say the Chinese government was almost certainly behind the effort, an allegation China has vehemently denied.

‘Facebook of Intelligence’

Some investigators suspect the attacks were part of a sweeping campaign to create a database on Americans that could be used to obtain commercial and government secrets.

“China is building the Facebook of human intelligence capabilities,” said Adam Meyers, vice president of intelligence for cybersecurity company CrowdStrike Inc. “This appears to be a real maturity in the way they are using cyber to enable broader intelligence goals.”

The most serious breach of records occurred at the U.S. Office of Personnel Management, where records for every person given a government background check for the past 15 years may have been compromised. The head of the government personnel office, Katherine Archuleta, resigned Friday as lawmakers demanded to know what went wrong.

The campaign began in early 2013 with the travel records, said Laura Galante, manager of threat intelligence for FireEye Inc., a private security company that has been investigating the cyber-attacks.

Stockpiling Records

By mid-2014, it became clear that the hackers were stockpiling health records, Social Security numbers and other personal information on Americans -– a departure from the country’s traditional espionage operations focusing on the theft of military and civilian technology.

“There was a clear and apparent shift,” said Jordan Berry, an analyst at FireEye.

Recognition came too late for many of the victims. Vendors of security devices say health-care companies are spending tens of millions of dollars this year to upgrade their computer systems but much of the data is already gone.

U.S. intelligence agencies were collecting information on the theft of personal data but failed to understand the scope and potential damage from the aggressive Chinese operation, according to one person familiar with the government assessment of what went wrong.

In the last two years, much of the attention of U.S. national security agencies was focused on defending against cyber-attacks aimed at disrupting critical infrastructure like power grids.

 

Iran Deal, Deviled Details and $300 Billion

Both sides are saying the others are throwing sand in the gears to publishing a final document of the Joint Plan of Action with Iran and the P5+1.

In part from FarsNews: “We have reached a stage now that the other side should decide if it is seeking an agreement or pressure; we have said many times that agreement and pressure cannot come together and one of them should be chosen,” Zarif told reporters in Vienna.

He reiterated that if the other side shows political will and inclination for a balanced and good deal it will be achievable.

Zarif, however, said that unfortunately the other side is showing change in stances and raising excessive demands which make the conditions difficult, adding, “We are doing our best as Supreme Leader (of the Islamic Revolution Ayatollah Seyed Ali Khamenei) and other Iranian officials have said many times we are looking for a good deal and we will continue the negotiations; we have never left the negotiations and we will not in future.”

The Geneva interim deal envisaged the removal of all the UN and unilateral US and EU sanctions against Iran under a final comprehensive deal.

Also, in a framework agreement approved by the six powers and Iran in April known as the Lausanne Statement, the seven nations agreed that a final deal would include removal of all sanctions as well as a UN Security Council resolution which would call all the five UNSC sanctions resolutions imposed against Iran’s nuclear activities as “null and void”.

The first two UNSC resolutions boycotted export of military, specially missile, hardware and software to Iran, a sanction that – along with all the other embargoes imposed against Iran under the five UNSC resolutions – would be automatically removed under the new UNSC resolution that, according to the Lausanne framework agreement, should be issued on the same day that the final deal is endorsed.

Hence, the debate over the removal of the UN Security Council arms embargoes against Iran means US defiance of both agreements.

From the WSJ: If no deal is reached by Monday night, the two sides must again agree to extend the terms of their November 2013 interim nuclear deal or risk seeing two years of high-stakes diplomacy unravel. That accord offered modest sanctions relief for Iran in exchange for Tehran freezing parts of its nuclear program.

Among the final issues to be resolved are disagreements about the timing and sequencing of sanctions relief for Iran and the continuation of a ban on sales of arms and ballistic-missile parts to Iran. Officials have also been toiling over the text of a new U.N. Security Council resolution that would keep some restrictions on Iran and outline steps the country would take to detail its past nuclear activities.

One European official said Sunday there was “no way” negotiations could continue beyond Monday.

“Everything can fail still, but we are really near the end,” said a German official late Sunday. “With the willingness of Tehran to take the final steps, it could now go quickly. We are ready to negotiate all night.”

The matter of lifting sanctions, suspending other over 15 years funds future terrorism by infusing Iran with $300 billion.

From Foreign Policy Magazine: Barack Obama’s administration and the other parties to the interim nuclear deal with Iran now seem to be saying they are willing to release to Iran between a third and a half a trillion dollars over the next 15 years in order for Iran not to give up the program, but to freeze it. In other words, we are not restoring Iran’s assets and income sources in exchange for permanently and irreversibly accepting international standards; we are just renting the country’s restraint, offering it access to hundreds of billions of dollars to make any future nuclear program development the problem of the next U.S. president — or the one after that.

The problem is compounded by the fact that Iran’s nuclear program is not viewed by its neighbors as the main threat the country poses. A systematic, 35-year campaign of regional meddling, destabilization, and extension of Iranian influence is seen as a much bigger issue. And restoring cash flows and assets to Iran, as well as giving the country greater international standing, clearly exacerbates that threat. It gives Tehran the wherewithal to continue to underwrite terrorists like Hezbollah and Hamas, prop up dictators like Syria’s Bashar al-Assad, and buy ever greater influence in places like Iraq and Yemen.

The consequences of Iran’s regional strategy were on display this week in Washington when Iraqi Prime Minister Haider al-Abadi essentially read from Iranian talking points when addressing the conflict in Yemen. He took a stance against Saudi intervention to stop Iranian-backed Houthis, suggested Iran’s role in Yemen was overstated, and even went so far as to suggest Obama had told him that he was not supportive of the Saudis. The White House immediately denied the last accusation but can’t have been too happy with the rest of the statement that came from the leader of a country the United States had spent hundreds of billions to “liberate.”