Russian Cyber Attacks on America

Russian cybersecurity intelligence targets critical U.S. infrastructure

By Bill Gertz

U.S. intelligence agencies recently identified a Russian cybersecurity firm, which has expertise in testing the network vulnerabilities of the electrical grid, financial markets and other critical infrastructure, as having close ties to Moscow’s Federal Security Service, the civilian intelligence service.

The relationship between the company and the FSB, as the spy agency is known, has heightened fears among U.S. cyberintelligence officials that Moscow is stepping up covert efforts to infiltrate computer networks that control critical U.S. infrastructure such as oil and gas pipelines and transportation.

The effort appears to be part of FSB and Russian military cyberwarfare reconnaissance targeting, something the Pentagon calls preparation of the battlefield for future cyberattacks. The Russian company is taking steps to open a U.S. branch office as part of the intelligence-gathering, said officials familiar with reports of the effort who spoke on background.

Officials familiar with reports about the company did not identify it by name. However, security officials are quietly alerting government security officials and industry cybersecurity chiefs about the Russian firm and its covert plans for operations in the United States.

The Russian firm is said to have extensive technical experience in security vulnerabilities of supervisory control and data acquisition systems that are used to remotely control critical infrastructure.

These systems are employed by both government and private-sector system controllers for equipment running water treatment and distribution, wastewater collection and treatment, oil and gas pipelines, electrical power grids, wind farms and large communication systems.
In September, Director of National Intelligence James R. Clapper told Congress that Russian hackers have penetrated U.S. industrial control networks operating critical infrastructure. The objective of the hackers is to develop the capability to remotely access the control systems that “might be quickly exploited for disruption if an adversary’s intent became hostile,” Mr. Clapper said.

“Unknown Russian actors successfully compromised the product-supply chains of at least three [industrial control system] vendors so that customers downloaded malicious software designed to facilitate exploitation directly from the vendors’ websites along with legitimate software updates,” Mr. Clapper stated in Sept. 10 testimony to the House Permanent Select Committee on Intelligence.

Russian hackers also were linked to cyberpenetrations of U.S. industrial control networks used for water and energy systems in 2014.

The Russian connection was identified through the use of malware called BlackEnergy that has been linked to Russian government cyberoperations dubbed Sandworm by security researchers.

Mr. Clapper also testified that the Russian Defense Ministry has created a military cybercommand for offensive attacks. Additionally, the Russian military is setting up a specialized branch for computer network attacks.
RUSSIAN GENERAL ISSUES THREAT

Gen. Valery Gerasimov, chief of the General Staff of the Armed Forces of Russia, told foreign military attaches in Moscow on Monday that increased military activities by NATO and the development of global missile defenses were “creating a threat of new conflicts and escalation of existent conflicts,” the official Interfax news agency reported.

“The NATO military policy unfriendly towards Russia is a source of concern,” Gen. Gerasimov said. “The alliance continues to expand its military presence and is stepping up the activity of the bloc’s armed forces along the perimeter of borders of the Russian Federation.”

Because of the deployment of a global missile defense network and the development of new means of armed struggle, including hypersonic weapons, “the problem of upsetting the existent strategic balance of force has been growing,” said the general, referring to high-speed strike weapons.
The Pentagon is developing a conventional rapid-attack capability called “prompt global strike,” which can target any spot on Earth in 30 minutes.

Russia has stepped up nuclear threats against the United States and NATO in response to deployment of missile defenses in Europe.

In recent months, Russian President Vladimir Putin has issued an unprecedented number of threats to use nuclear weapons, most notably after the Russian military annexation of Ukraine’s Crimea last year. On Dec. 11, Mr. Putin said he hoped nuclear weapons would not be needed during operations in Syria.

“Particular attention must be paid to the consolidation of the combat potential of the strategic nuclear forces and the execution of space-based defense programs,” Mr. Putin was quoted as saying at the meeting with his defense chiefs. “We need, as our plans specify, to equip all components of the nuclear triad with new arms.”

Lt. Gen. Ben Hodges, commander of U.S. Army forces in Europe, told reporters last week that Russian nuclear threats are troubling in the current security environment.

“The way that senior Russian officials have talked about Denmark as a nuclear target, Sweden as a nuclear target, Romania as a nuclear target, sort of an irresponsible use of the nuclear word, if you will, you can understand why our allies on the eastern flank of NATO — particularly in the Baltic region — are nervous, are uneasy,” Gen. Hodges said.

Additionally, the Russian military has conducted “large snap exercises without announcement,” which also has increased fears of a Moscow threat, he said.

***

Since the FSB (KGB) company is un-named could it be: (RecordedFuture)

What is SORM?

Russia’s SORM (Система Оперативно-Розыскных Мероприятий, literally “System for Operative Investigative Activities”) is a lawful intercept system operated by the Federal Security Service (or FSB – the Russian successor to the KGB).

Russia SORM Timeline

SORM came to light recently during the Sochi Olympic Games where reports claimed that “all communications” were monitored. SORM differs from the US lawful intercept system, as once the FSB receives approval for access to a target’s communications they are able to unilaterally tap into the system without provider awareness.

Further, SORM is also lawfully used to target opposition parties within Russia. According to the World Policy Institute, on November 12, 2012, Russia’s Supreme Court upheld the right of authorities to eavesdrop on the opposition.

  • SORM-1 intercepts telephone traffic (including both landline (analog) and mobile networks).
  • SORM-2 targets internet traffic (including VoIP calls).
  • SORM-3 has the ability to target all forms of communication providing long-term storage of all information and data on subscribers, including actual recordings and locations.

Former Soviet States (Kazakhstan, Belarus, Uzbekistan and Ukraine) have installed SORM-standard equipment. According to research by Wired Magazine, Ukraine’s SORM is more advanced as the SBU (Ukraine’s Security Service) has the ability to interrupt a target’s communications.

In April 2011, Iskratel – which provides Ukraine’s sole telephone company Ukrtelekom with broadband equipment – announced its SORM device was tested successfully under the new requirements and had been approved by the SBU.

Analyzing SORM manufacturers within Recorded Future identified equipment suppliers including Juniper Networks (US), Cisco Systems (US), Huawei (China) and Alcatel-Lucent (France).

 

102,000 Syrian Refugees on Elm Street, USA

ISIS seeks many small attacks, crowdsources terrorism – FBI director

Addressing the NYPD Shield conference in New York City on Wednesday, Comey compared the Islamic State (IS, formerly ISIS/ISIL) to a hydra, a mythic monster that grew two new heads for every one that was cut off.

.@FBI Director Comey at the NYPD Shield Conference now thanking the NYPD for being good partners.pic.twitter.com/Jkpo2MpTkD

— NYPD NEWS (@NYPDnews)

Unlike Al-Qaeda, which was more centralized and focused on major acts of terrorism, IS has “has become the leader in global jihad by this crowdsourcing of terrorism” through social media platforms, the FBI chief said.

Comey also used the speech as an opportunity to push his anti-encryption agenda, telling the audience that encrypted messaging makes terrorist “go dark” to law enforcement.

Encryption is “at the center of terrorist tradecraft,” he said, urging for more surveillance capability in the name of fighting terrorism.

Echoing his remarks in the wake of the San Bernardino attack, Comey said that Americans should not live in a “disabling state of fear” but should channel their anxiety into a “healthy awareness” of their surroundings.

Asked about the San Bernardino attackers, Comey said the FBI was still trying to understand where they were in the four hours between the holiday party shooting and the shootout with police, if there was anything else they were planning to do, and if anyone else was helping them.

“We still have not seen evidence… that they were part of an organized cell of some sort, or that there were other parts to this plan,” the FBI chief said.

As lawmakers clash over refugees, Syrian immigration quietly tops 100,000 since 2012

FNC: A proposal to admit 10,000 Syrian refugees to the United States has ignited a bitter debate in Washington, but more than 10 times that number of people from the embattled country have quietly come to America since 2012, according to figures obtained by FoxNews.com.

Some 102,313 Syrians were granted admission to the U.S. as legal permanent residents or through programs including work, study and tourist visas from 2012 through August of this year, a period which roughly coincides with the devastating civil war that still engulfs the Middle Eastern country. Experts say any fears that terrorists might infiltrate the proposed wave of refugees from United Nations-run camps should be dwarfed by the potential danger already here.

“The sheer number of people arriving on all kinds of visas and with green cards, and possibly U.S. citizenship, makes it impossible for our counterterrorism authorities to keep track of them all, much less prevent them from carrying out attacks or belatedly try to deport them,” said Jessica Vaughan of the Center for Immigration Studies.

“I think it’s reasonable to assume that the U.S. Government ran the minimum intelligence traces required at the time of entry.”

– Fred Burton, Stratfor

Numbers obtained from the U.S. Customs and Border Protection show 60,010 Syrian visa holders have entered the U.S. since 2012, including 16,245 this year through August. Additional numbers provided by a Congressional source showed another 42,303 Syrians were granted citizenship or green cards during the same period.

“It is highly unlikely that the 102,313 Syrians who were admitted over the past three years were effectively vetted,” said spokesman Ira Mehlman, of the Federation for American Immigration Reform. “Even in countries where we have a strong diplomatic presence, the sheer volume of background checks being carried out precludes the kind of thorough vetting that is necessary.”

The Syrians being admitted are coming directly from their homeland, usually through the U.S. visa program, as opposed to the refugees President Obama is seeking to take in through U.N.-run refugee camps. Most have secured legal entry before they arrive.

“Refugees are part of the admitted category,” said Jaime Ruiz, spokesman for the U.S. Customs and Border Protection. “Their cases are approved prior to arriving into the U.S.”

Those who escaped Syria’s grinding civil war, which has killed an estimated 300,000, and made it to the U.S. are more likely to be those with the money and means to access the U.S. immigration bureaucracy, say experts. But even that system is susceptible to fraud.

President Obama’s proposal raised immediate concerns that ISIS, which vowed to infiltrate refugee camps, could use forged documents to enter the U.S. White House assurances that refugees would be carefully screened met with renewed skepticism after it was revealed that terrorist Tashfeen Malik obtained a fiancée visa despite notable red flags. Malik, who together with her husband killed 14 and wounded 21 in a terror attack in San Bernardino, Calif., Dec. 2, listed a phony Pakistani address and reportedly had a history of posting jihadist messages on social media platforms.

Malik’s entry into the U.S., combined with so many Syrians already here, is even more concerning than the proposed refugees, according to Fred Burton, of the global intelligence firm Stratfor.

“I’m more fearful of those currently inside the U.S. predisposed to strike locally as with the San Bernardino model,” Burton said. “I think it’s reasonable to assume that the U.S. government ran the minimum intelligence traces required at the time of entry.”

Mehlman said the same concerns raised in regard to the refugees – mainly that no reliable documents can be issued in a country in complete meltdown – apply to the Syrians already here.

“All civil order has collapsed, and meaningful background checks are impossible,” Mehlman said. “Instead, we rely on cross-checking databases. However, many people with ties to terrorist groups are not in any databases, which means there is no way we can identify them before they arrive here.”

A government official who expressed astonishment at such large immigration numbers from a relatively small country, said approximately half are legal permanent residents and the remainder came here on visas, the latter of which remains a point of contentious concern.

Screening of all immigrants and refugees must be tightened, said Rep. Mike McCaul, chairman of the House Homeland Security Committee.

“This administration has forbid our front line security professionals from more broadly incorporating social media information into the visa application process, something that might have kept this attacker out of our country,” said McCaul, R-Texas. “We need more robust vetting and screening of all visa applicants.”

Additional data obtained from CBP found that while five Syrians have been apprehended in 2014 and another five in 2015 attempting to cross over the southern border from Mexico, the northern border escapes public and political scrutiny. In 2014 eight Syrians were apprehended by Border Patrol attempting to cross into the U.S. from Canada. Given the visa waiver agreement with Canada, there is no reason to sneak across the border. Since 2011, 1,229 Syrians have been granted entry from Canada.

The Terror of Hackers

U.S. arrests three men over hacking scheme targeting 60 million people

Cybersecurity researcher Billy Rios points to a computer line reading ''Gods Password,'' a password he was able to uncover by analyzing the software in a Pyxis medical supply dispenser that he says he purchased on Ebay for a few hundred dollars, in Redwood City, California October 10, 2014. REUTERS/Robert Galbraith

Reuters: Three men were arrested on Monday for engaging in a wide-ranging hacking and spamming scheme that targeted personal information of 60 million people including Comcast customers, U.S. prosecutors announced Tuesday.

Timothy Livingston, 30, Tomasz Chmielarz, 32, and Devin McArthur, 27, were named in an indictment filed in federal court in Newark, New Jersey that charged them with conspiracy to commit fraud and related activity among other offenses.

Prosecutors said Livingston, a Boca Raton, Florida, resident, was the leader of a series of computer hacking and illegal spamming schemes that targeted multiple companies and generated illegal profits exceeding $2 million.

The three men were arrested at their respective residences on Tuesday morning, a spokesman for U.S. Attorney Paul Fishman in New Jersey said.

Michael Koribanics, Chmielarz’s lawyer, said his client would plead not guilty at a court hearing on Tuesday. A lawyer for Livingston did not immediately respond to a request for comment, and an attorney for McArthur could not be identified.

Prosecutors said Livingston, who owned a spam company called “A Whole Lot of Nothing LLC,” hired Chmielarz of Rutherford, New Jersey to author hacking tools and other programs that facilitated the hacking and spamming schemes.

Among the companies they targeted was a Pennsylvania-based telecommunications company that employed McArthur, a resident of Ellicott City, Maryland, who installed hacking tools in company networks to gain access to records for 50 million people, prosecutors said.

The company was not identified by name in court papers. But McArthur’s LinkedIn page says he worked at Comcast Corp during the period in question. A Comcast spokeswoman had no immediate comment.

Livingston and Chmielarz also compromised tens of thousands of peoples’ email accounts, including customers of a New York telecommunications company, which they then used to send spam, the indictment said.

Other companies targeted in the schemes included a New York-based technology and consulting company whose website was compromised and a Texas-based credit monitoring firm that was hacked, the indictment said.

In the case of the unnamed credit monitoring firm, the indictment said Livingston paid Chmielarz to write a program to steal a database containing 10 million records.

When law enforcement seized Livingston’s computer in July, they discovered a database with 7 million of that company’s records, the indictment said.

New OPM Cyber Chief Is Bracing for an ISIS Hack

The new cybersecurity adviser hired by the Office of Personnel Management after a Chinese-originated hack says he expects ISIS may ultimately pierce the agency’s systems, too.

The historic data breach exposed the professional and private lives of 21.5 million individuals applying for clearances to handle classified information, plus their families. That kind of information, drawn from background investigations, would be perfect for blackmail attempts.

But Clifton Triplett—named OPM’s first-ever senior cyber and information technology adviser last month—says forthcoming access controls will blunt the severity of any future hack.

I think what I have to do is … assume that, at some point in time, they may be successful,” Triplett said when asked about the ISIS cyber threat during a webcast hosted by Bloomberg Government on Monday.

Going forward, OPM will “make it more of a need-to-know kind of access control,” he said, “so if we do have a compromise, it is far more contained than, for example, our last incident.”

The agency, he explained, will institute the equivalent of tear lines on network data to grant as little information as possible to authorized personnel.

Right now, I think, in some of our situations, the access control is broader than perhaps needs to be,” Triplett said, because OPM computer programs were developed before data security became a governmentwide priority.

So far, ISIS sympathizers have been hacking more for show, than for spying.

In early 2015, the self-described Cyber Caliphate group reportedly took control of the social network accounts of U.S. Central Command.

Then, global television network TV5Monde was disabled for hours in April, when the hacktivists apparently replaced the company’s channels, websites and social media accounts with pro-ISIS messaging.

ISIS’ online propaganda often directs followers to kill U.S. and allied troops and supplies the necessary contact information. But much of the data released has turned out to have already been in the public domain.

Still, America viewed at least one ISIS hacker as enough of a threat to kill him in a targeted attack.

The Justice Department claims Ardit Ferizi breached a server to retrieve identifying details on about 1,350 military and other government personnel. He then allegedly passed the data on to Islamic State member and Cyber Caliphate ringleader Junaid Hussain, a British citizen. Hussain is accused of beckoning adherents to target U.S. personnel, posting links on Twitter to their names, email addresses, passwords, locations and phone numbers. Hussain was reportedly killed in a U.S. drone strike this summer.

But what really frightens Triplett is that OPM’s records sit beside smart toasters and air conditioners in the Internet of Things, he said.

We’re too interconnected. Not enough air gaps in our systems” that physically decouple networks from the Internet, he said. “We are trying to automate and connect one more thing to one more thing.”

Today, background check records are one of those things.

Eventually, Triplett said he fears, “I’ll have a reasonably minor event that will turn into a catastrophic event, and I won’t be able to find out where the root cause was because of the ripple potential.”

Currently, “there’s no way” to cut off the systems from the Internet, OPM’s IT security officer, Jeff Wagner, told Nextgov in October.

Wagner said, “even clearance data” must be online, because the only other option is to exchange paper folders with agency partners like the Social Security Administration.

Adversaries, however, would have to circumvent multiple identity checks and firewalled systems to peer at the personnel records, Wagner said.

 

 

Paris Attack Weapon Came From Florida

Gun linked to Paris Attack came through South Florida dealer

One of the guns linked to Islamic militants in the Paris attacks that killed 130 people was exported to the United States in 2013, the head of a Serbian arms factory said Thursday.

Milojko Brzakovic of the Zastava arms factory told The Associated Press that the M92 semi-automatic pistol’s serial number matched one his company delivered to an American online arms dealer in May 2013. It was not clear how the gun got back to Europe.

At least seven of the weapons used or discovered after the Nov. 13 attacks in Paris have been identified as being produced by the Serbian factory located in Kragujevac, in central Serbia. Most were manufactured before Yugoslavia broke up in a civil war in the 1990s and most of those are modified versions of the Soviet AK-47, or Kalashnikov.

Brzakovic said all the guns were delivered legally but could have later found their way into illegal channels.

“One was delivered to Bosnia in 1983, one to Skopje, Macedonia in December 1987, one to Golubici, near Knin (Croatia) in 1988, one to Zagreb (Croatia) 1987,” he said.

He said the M92 pistol “is a semi-automatic weapon, a hunting and sporting weapon … it cannot fire barrage fire, only single shots … which are legal in America.”

He said it was exported to an online arms seller in the United States, the Florida-based Century Arms, to which his factory exports up to 25,000 hunting and sports guns every year. He said the gun was delivered as a semi-automatic, but he did not know whether someone turned it into an automatic after delivery. The so-called “shortened Kalashnikov” is listed by U.S. arms dealers as selling for about $460 apiece.

In a video posted online in December 2013, Century Arms advertised they were selling the AK-style pistol PAP M92, “a brand new firearm from the Zastava factory in Serbia” and demonstrated its attributes.

The AP left messages seeking comment on the gun with Century Arms, the FBI and another U.S. government agency, the Bureau of Alcohol, Tobacco, Firearms and Explosives.

Brzakovic insisted that all arms exports from Serbia are under strict government control.

“We submit a request to our government to give consent and authorize the export. Until we receive that, we make no contract. Once we get a permission to export, we make a contract and arrange the dynamics,” he said.

A web of rules and a large U.S. bureaucracy oversee the legal import and export of weapons like the Serbian M92 semi-automatic pistol.

American government approval is required to import firearms into the U.S.

To legally ship firearms back out, the individual or company would have to be registered with the State Department, which controls items covered by the U.S. Munitions List. An export request is submitted to State and a decision to grant the request is based on a variety of factors, including the type of weapon and its eventual destination.

Individual weapons are not tracked by serial numbers unless a single weapon is being exported, according to the State Department. The U.S. does not make publicly available the names of licensed weapons exporters as that information is considered proprietary.

Brzakovic said it would be wrong to accuse Zastava of selling weapons to terrorists.

“Here’s where the weapons ended, there’s the data. Zastava cannot be blamed for where it went afterward,” Brzakovic said.

But he agreed that an illicit gun deal could have taken place even after arms were delivered legally.

“Wherever there are wars, there are bigger possibilities for abuse and to hide the channels for guns. They end up where they shouldn’t,” he said, adding: “We have a data base in the factory for the last 50 years, we know where a gun has been delivered.”

***

Zastava Arms (Serbian Cyrillic: Застава oружје) is a Serbian manufacturer of firearms and artillery, based in Kragujevac, Serbia. It was founded in 1853 when it cast its first cannons. It is the leading producer of firearms in Serbia and is a large contributor to the local defense industry. Zastava Arms produces and exports a wide variety of products to over forty countries.

Zastava Arms was heavily damaged during World War II. When Kragujevac was liberated in October 21, 1944, the weapons factory was put back into working order within months and production began shortly after, with the 9mm M 1944 B2 submachine gun developed during the same year. The next postwar production rifle was the 7.92×57mm Mauser Model 1948 on the basis of Model 24. The production of air rifles and sporting rifles on the basis of rifle M48 started in 1953. In 1954 the Zastava started the production of shotguns and small bore rifles, as well as machine gun 7,9 mm M42 ¨Sarac¨. Batch production of semi-automatic rifle PAP M59 7.62×39mm started in 1964. In the 1964, the factory started the development of automatic rifle, of Kalashnikov system, which was named M67 in 1967. On the basis of rifle M67, the factory developed automatic rifle in caliber 7.62×39mm, which was named Zastava M70 in the following year. Yugoslav People’s Army included assault rifle M70 in calibre 7.62 x 39 mm into its armament in 1970. Small arms derivatives of the M70 produced rifles chambered in Western bloc ammunition such as 7.62×51mm NATO and 5.56×45mm NATO. In 1988, the factory developed a compact design pistol in 9 mm Parabellum model M88.

PAP M59/66 (Yugo SKS) with a rifle grenade launcher and folding bayonet.

In the 1980s, the plant for action of machine guns M84, M86 in 7.62×54mmR and heavy machine gun in 12.7 NSV M87 was set to operation as well. In July 1989 Zastava started the development of the double-action pistol in calibre 9mm PARA CZ 99. In 1992, the factory finished the development and testing and started batch production of 7.62 mm submachine gun M92, based on submachine gun M85. Using the Mauser mechanism, the factory developed 12.7 mm long range rifle Black Arrow M93. During the Yugoslav Wars of 1991 to 1995, the United Nations placed economic sanctions on the import and export of weapons from Yugoslavia, production slowed as a result. In 1999 the factory was damaged by NATO bombing. In 2005 Zastava Arms underwent restructuring. The same year, a memorandum of understanding was signed with Remington Arms to export hunting and sporting guns to the United States, Canada and Mexico.

Ollie North with the Peshmerga vs. Islamic State

By the way, the Peshmerga are Muslims.

Obama’s non-war and the consequence on humanity versus Islamic State:

TheHill: A U.S. aircraft carrier passed through the Suez Canal on Tuesday, creating a presence that will allow the U.S. to ramp up airstrikes against the Islamic State in Iraq and Syria (ISIS). The USS Harry S. Truman is due to arrive in the Persian Gulf right around Christmas, where it will begin striking the terrorist group, a Navy official told The Hill.

The Truman and its accompanying carrier strike group will join the French aircraft carrier Charles De Gaulle in the Gulf, which reportedly arrived earlier this month.

The U.S. has steadily increased airstrikes against ISIS, with November hitting a high of 3,271 bombs, according to U.S. Central Command statistics.

Twisted logic designed by the Obama White House and the new ISIS Czar:

    President Obama’s new ISIS czar said yesterday that resolving the Israel Palestine conflict is necessary to defeating Islamist extremists. Rob Malley, senior advisor to Obama “for the Counter-ISIL Campaign in Iraq and Syria” and White House Coordinator for the Middle East and North Africa, said at a New York conference that the conflict enables ISIS in two ways. Extremists “refer constantly” to the situation of Palestinians. So they would lose a recruiting tool if the matter were resolved. And the failure to resolve the conflict makes it “very difficult” to get “the kind of open cooperation that we really need to get changes on the ground”– because Saudi Arabia and other states can’t work openly with Israel as matters stand. Malley said that resolving the conflict was not a “magic wand” to ending problems in the Middle East, but asked if ISIS’s next stop was going to be Gaza or the West Bank, he went on: I don’t know where the next stop will be but I think there’s a more basic point, which is that the absence of a resolution is fueling extremism. If you want to go to Gaza that’s self-evident. Whether ISIS is going to have a foothold there.. that’s a separate question. But I think it stands to reason that resolving this conflict would at least help, it wouldn’t resolve– but it would be a major contribution to stemming the rise of extremism, and to allow the kind of cooperation that is needed [to take on] what should be a common challenge, which is the challenge of ISIS, and of other extremist organizations.

As Oliver North described in the video above, the Baghdad government is directed by Iran, a rogue nation sponsor of terror of which Obama and John Kerry have normalized relations forcing the world to accept the whole Tehran regime.

But what about our own hemisphere?

Iran Taking Over Latin America

  • “This is a matter of life or death. I need you to be an intermediary with Argentina to get help for my country’s nuclear program. We need Argentina to share its nuclear technology with us. It will be impossible to advance with our program without Argentina’s cooperation.” – Iran’s former President Mahmoud Ahmadinejad to the late Venezuelan President Hugo Chávez.
  • According to Venezuelan informants, whitewashing Iran’s accused from the AMIA attack was only a secondary objective in its outreach to Argentina. The primary objective was to gain access to Argentina’s nuclear technology and materials — a goal Iran has for more than three decades.
  • During the last 32 years, Iran has achieved a resounding success in promoting an anti-US and anti-Israel message in Latin America. Its state-owned television network, HispanTV, broadcasts in Spanish 24 hours a day, seven days a week in at least 16 countries throughout the region.
  • The lifting of sanctions and influx of billions of dollars as a result of Iran’s nuclear deal will undoubtedly help Iran in Latin America, where many countries face economic turmoil and can use an Iranian “stimulus.”
  • While Latin America is often regarded as a foreign policy backwater for the United States, it is the geopolitical prize for the Islamic Republic of Iran.

During the last couple months, Iran and Saudi Arabia have been playing a political tug of war over Latin America. On November 10, 2015, Iran’s deputy foreign minister held a private meeting with ambassadors from nine Latin American countries to reaffirm the Islamic Republic’s desire to “enhance and deepen ties” with the region. This was followed by similar statements from Iranian President Hassan Rouhani and Supreme Leader Ayatollah Ali Khamenei at the Gas Exporting Countries Forum (GECF) in Tehran later that month.

The same day, the Saudi Foreign Minister, Adel al-Jubeir, presided over a South American-Arab world summit in Riyadh. FM al-Jubeir, while Ambassador to the United States in 2011, had himself been the target of an Iranian-Latin American assassination plot. Read the full summary complete with citations here.