CIA Stopped From Having Clandestine Assets in Iraq?

The CIA is well known for having spies, double agents and in some cases triple agents. They are known for having ‘assets’ in all countries deemed to be adversarial to the West. Some assets were of great success while others betrayed the CIA and the West.

When came to Iraq, there were no assets and no chance of creating any with proven worth. After the Clinton administration, the CIA was operating at a profound handicap and today under Barack Obama, the CIA continues to be handicapped. Reliance on technology is no replacement for human intelligence.

Relying on walk-ins or other allied assistance in the world of espionage is not a viable objective, often it falls to scant military personnel or contractors to fill the gaps.

A senior Central Intelligence Agency official, who led the agency as its acting director before retiring in 2013, has said that not having sources in the Iraqi government’s upper echelons led to the intelligence failure of 2003. Michael Morell retired as deputy director of the CIA, after having served twice as its acting director, in 2011 and from 2012 to 2013. A Georgetown University graduate, Morell joined the agency in 1980 and rose through the ranks to lead the Asia, Pacific and Latin America divisions. In May 2015, Morell published his book, The Great War of Our Time: The CIA’s Fight against Terrorism from al Qa’ida to ISIS, which he has been promoting while working as a consultant in the private sector.

Morell spoke at the Aspen Institute earlier this month, and once again offered a public apology to former United States Secretary of State Colin Powell for the CIA’s erroneous estimates on Iraq. He was referring to the Agency’s claims prior to the 2003 US invasion that Iraq maintained an active weapons-of-mass-destruction (WMD) program. The claims formed the basis of Powell’s February 2003 speech during a meeting of the United Nations Security Council, in which he claimed that the regime of Iraqi President Saddam Hussein had “biological weapons and the capability to rapidly produce […] many more.” There was no question, said Morell, that Powell’s reputation “was tarnished” as a result of the speech, and that a public apology was in order. The same apology, said Morell, applied “to every single American.”

The retired intelligence official went on to say that the main cause of the CIA’s erroneous assessment of Iraq’s WMD program was that the Agency had failed to penetrate the highest echelons of the Hussein regime. “We were not able to come up with the right answer [because] we didn’t do our fundamental job of penetrating [Hussein’s] inner circles with a human asset,” said Morell. As a result, there was “no information to give to the [CIA] analyst to say ‘here’s what this guy is up to’,” he added. The author of The Great War of Our Time, went on to suggest that the CIA’s failure to penetrate the inner circle of the Iraqi government prior to 2003 was “quite frankly a national security failure.”

There is a feeble clandestine operation in Syria, with few results. We then must question the espionage efforts in Afghanistan with the Taliban, Daesh and al Qaida. The Taliban and the West once again have a common enemy in country in Islamic State. So are we forced to support the Taliban where they beheaded a handful of Islamic State fighters?

Who is the United States relying on when it comes to Iran? It is reported that Iran has shipped uranium out of country to Russia, but what uranium exactly? The next fight between the White House and Congress on Iran comes in January when Obama returns from his holiday vacation in Hawaii.

Obama removed spies from China in 2010, but why? The United States maintained a clandestine operation in Russia until under Barack Obama we didn’t and a few years ago swapped assets.

The question now, is what is the condition of the CIA’s espionage efforts across the globe today? How many countries need U.S. supported human intelligence and covert operations? The list is long.

2015: A Year in Review

Dramatic and a year for historical significance. This photo essay is by no means a complete 2015 diary and is not in order of occurrence.

Charlie Hebdo Attack in Paris

Terror struck in Paris one week into the New Year when a group of men with extensive ties to terrorist organizations targeted the offices of a famed satirical newspaper. Two men shot their way into the offices of Charlie Hebdo while a third waited near the getaway car. The shooters forced their way into the publication’s offices, killing a maintenance man and police bodyguard assigned to protect the editor after he received death threats. Once arriving at the office, they proceeded to kill nine others, mostly editorial staff gathered for their weekly meeting, injuring an additional 11. A faction of al Qaeda claimed responsibility.

The attacks continued in France for two more days, taking the lives of six others, including two police officers and four people held hostage at a kosher grocery store in Paris. The three perpetrators also died.

PARIS 1/11/2015

More than 40 world leaders marched in honor of the 17 victims of terrorist attacks on the satirical newspaper Charlie Hebdo and a Jewish supermarket.

Germanwings Plane Crash

PHOTO:A screengrab taken from an AFP TV video on March 24, 2015 shows search and rescue personnel making their way to the crash site of the Germanwings Airbus A320 that crashed in the French Alps above the southeastern town of Seyne.
PHOTO:A screengrab taken from an AFP TV video on March 24, 2015 shows search and rescue personnel making their way to the crash site of the Germanwings Airbus A320 that crashed in the French Alps above the southeastern town of Seyne.

A major aviation mystery in 2015 differed from the series of crashes the previous year in that the plane’s recording device led investigators to a suspect shortly after the deadly crash: the co-pilot. The recording from inside the cockpit of Germanwings Flight 9525 during the March 24 flight from Barcelona to Dusseldorf indicated that co-pilot Andreas Lubitz locked the lead pilot out of the cockpit during a break and proceeded to direct the plane toward the mountains of the French Alps, killing all 150 passengers and crew on board.

“The intention was to destroy the plane,” Brice Robin, the public prosecutor of Marseille, said during the investigation.

PAYNESVILLE, LIBERIA 1/26/2015

Benetha Coleman, a nurse’s aide and Ebola survivor, comforted an infant girl with symptoms of the disease in a high-risk treatment area.

Amtrak Train Crash

PHOTO:Emergency personnel work at the scene of a deadly train derailment, May 13, 2015, in Philadelphia.
PHOTO:Emergency personnel work at the scene of a deadly train derailment, May 13, 2015, in Philadelphia.

A train derailment in Philadelphia killed eight and injured more than 200 Amtrak passengers in May after the Northeast Regional train sped around a curve and went off the track. The train’s engineer. who survived, could not explain what caused the deadly crash. The National Transportation Safety Board led the investigation into the accident and determined that the train accelerated before the crash and had been traveling in excess of 100 mph, which was more than twice the speed limit for that area of the track.

MIRONOVKA VILLAGE, NEAR DEBALTSEVE, UKRAINE 2/17/2015

A child played cards in the local Palace of Culture, used as a bomb shelter during fighting between the Ukrainian Army and Russian-backed militants.

Prison Escape in New York

PHOTO:In this handout from New York State Police, convicted murderers David Sweat and Richard Matt are shown in this composite image.
PHOTO:In this handout from New York State Police, convicted murderers David Sweat and Richard Matt are shown in this composite image.

One of the biggest stories of the summer seemed like something straight out of a Hollywood movie. It involved two prisoners, a sexual liaison with a prison worker who smuggled tools hidden in frozen meat and a midnight escape with a smiley-faced getaway note. David Sweat and Richard Matt, both convicted murderers, escaped from the maximum security Clinton Correctional Facility in upstate New York on June 6, crawling out of sewage pipes and digging through cell walls a la “The Shawshank Redemption.”

TAIPEI, TAIWAN 2/4/2015

A picture from a video of a TransAsia Airways plane as it struck an elevated highway before plunging into a river, killing 43 people.

On-Air Shooting in Virginia

PHOTO:WDBJ-TV7 news morning anchor Kimberly McBroom, center, gets a hug from visiting anchor Steve Grant, left, as meteorologist Leo Hirsbrunner reflects after their early morning newscast at the station, Aug. 27, 2015, in Roanoke, Va.
PHOTO:WDBJ-TV7 news morning anchor Kimberly McBroom, center, gets a hug from visiting anchor Steve Grant, left, as meteorologist Leo Hirsbrunner reflects after their early morning newscast at the station, Aug. 27, 2015, in Roanoke, Va.

The gunman in another tragic shooting claimed it was the racism of the Charleston church shooting that prompted him to create a scene of carnage in the late summer. Vester Lee Flanagan, a disgruntled former news anchor, shot two of his former colleagues while they were on the air on location for a Roanoke, Virginia, TV station. The Aug. 26 shooting left reporter Alison Parker and cameraman Adam Ward dead. Flanagan later posted a video on social media of the shooting that he appeared to have filmed during the attack using a portable camera. He also sent a manifesto and called ABC News after the shooting. He shot himself to death during a car chase with police later that day.

SELMA, ALA. 3/7/2015

President Obama marched with thousands across the Edmund Pettus Bridge on the 50th anniversary of the Voting Rights Act of 1965.

Major Murder Trials

PHOTO:Former Marine Cpl. Eddie Ray Routh stands during his capital murder trial at the Erath County, Donald R. Jones Justice Center in Stephenville Texas, Feb. 24, 2015.
PHOTO:Former Marine Cpl. Eddie Ray Routh stands during his capital murder trial at the Erath County, Donald R. Jones Justice Center in Stephenville Texas, Feb. 24, 2015.

Four of the biggest trials of the year all resulted in guilty verdicts and one of those murderers now faces a death sentence. The first verdict came in February when Eddie Ray Routh was found guilty of killing “American Sniper” Chris Kyle and his friend Chad Littlefield. Though Kyle was well-known before the trial because of his bestselling book, the case gained even more national attention when his biopic came out just over a month before the trial started. Routh received a sentence of life without parole. He has filed a notice of appeal.

HILLAR CLINTON email scandal

A key aid to Hillary Clinton is the focus of a separate FBI investigation into the former secretary of state’s use of a private unsecured server. Bryan Pagliano, who invoked his Fifth Amendment right more than 500 times to avoid testifying before a House Committee investigating the Benghazi terrorist attack. Investigators are trying to determine more about Clinton’s use of a private server that contained highly classified material.

OFFICE OF PERSONNEL MANAGEMENT HACK

The massive hack into federal systems announced last week was far deeper and potentially more problematic than publicly acknowledged, with hackers believed to be from China moving through government databases undetected for more than a year.

MONTREUX, SWITZERLAND 3/3/2015

Secretary of State John Kerry, center, took a break during a meeting with Iran’s foreign minister, Mohammad Javad Zarif, over limiting Tehran’s nuclear program.

PHOTO:Aaron Hernandez watches as Robert Kraft entered the courtroom during the murder trial of former New England Patriots tight end at Bristol County Superior Court in Fall River, Mass., March 31, 2015.
PHOTO:Aaron Hernandez watches as Robert Kraft entered the courtroom during the murder trial of former New England Patriots tight end at Bristol County Superior Court in Fall River, Mass., March 31, 2015.

Former New England Patriots star Aaron Hernandez was found guilty in April and sentenced to life in prison without parole after killing Odin Lloyd, who was dating Hernandez’ fiancee’s sister. The case turned into a family drama as both Hernandez’s fiancee, who was granted immunity for her testimony, and her sister took turns on the witness stand. His appeal is underway.

PHOTO:In this June 24, 2015, file courtroom sketch, Boston Marathon bomber Dzhokhar Tsarnaev, right, stands before U.S. District Judge George OToole Jr. as he addresses the court during his sentencing, in federal court in Boston.
PHOTO:In this June 24, 2015, file courtroom sketch, Boston Marathon bomber Dzhokhar Tsarnaev, right, stands before U.S. District Judge George O’Toole Jr. as he addresses the court during his sentencing, in federal court in Boston.

In another case, Dzhokhar Tsarnaev, the surviving brother of a pair of siblings, was found guilty in April of all 30 charges that he faced in connection to the 2013 Boston Marathon bombing and his ensuing flight from police, which included the killing of an MIT police officer. One month later, he was sentenced to death after the conclusion of the penalty phase of his trial. The first of many expected appeals is underway.

BALTIMORE 4/28/2015

Community members formed a buffer between the police and protesters at dusk, a day after protests over the death of Freddie Gray turned violent.

EL CHAPO GUZMAN ESCAPE from prison

PLANNED PARENTHOOD VIDEOS, BABY PARTS

WASHINGTON 4/16/2015

President Obama, in the Rose Garden, signed the so-called doc-fix bill, which permanently ended automatic Medicare payment cuts to doctors.

CATHEDRAL CITY, CALIF. 4/3/2015

In California, where lush developments like this one abut bone-dry desert,  the governor imposed mandatory water restrictions after a long drought.

BHAKTAPUR, NEPAL 4/29/2015

Residents retrieved belongings from homes four days after a 7.8 magnitude earthquake rocked the country and left over 9,000 dead.

IN THE ANDAMAN SEA OFF THAILAND 5/14/2015

Rohingya migrants on a fishing boat, part of an exodus in which thousands of people took to the sea to flee ethnic persecution in Myanmar.

ROOSEVELT ISLAND, N.Y. 6/13/2015

Hillary Clinton was joined onstage by her husband, former President Bill Clinton, at a rally to kick off her presidential campaign.

SANA, YEMEN 6/12/2015

Yemenis searched for survivors at a Unesco World Heritage Site after an explosion that witnesses said was caused by Saudi airstrikes. Saudi Arabia denied responsibility.

COLUMBIA, S.C. 7/10/2015

The massacre of nine black churchgoers in Charleston was a catalyst for the permanent removal of the Confederate flag from South Carolina’s state house.

ATHENS 7/10/2015

A pensioner waited to withdraw money from Greece’s national bank.  The country implemented more austerity measures to address its debt crisis.

MANHATTAN 7/10/2015

The United States women’s soccer team celebrated at a ticker-tape parade after winning the World Cup.

KOS, GREECE 8/15/2015

Laith Majid, an Iraqi, broke out in tears of joy, holding his son and daughter, after they arrived safely in Kos on a flimsy rubber boat.

HORGOS, SERBIA 8/31/2015

A mother rested with her daughter and other relatives in a field during their almost two-month journey to escape violence in Syria.

JPOA IRAN NUCLEAR DEAL

European Refugee Crisis

PHOTO:A refugee holding a boy react as they are stuck between Macedonian riot police officers and refugees during a clash near the border train station of Idomeni, northern Greece, Aug. 21, 2015.
PHOTO:A refugee holding a boy react as they are stuck between Macedonian riot police officers and refugees during a clash near the border train station of Idomeni, northern Greece, Aug. 21, 2015.

Tens of thousands of people fleeing war-torn Syria and other areas in the Middle East and Africa spent much of this summer making the laborious, and dangerous, trek through Europe toward countries including Germany and Sweden in hopes of finding asylum. The influx of refugee families prompted international disputes and policy shifts as countries such as Hungary started to close some of their borders and put up fences with razor wire to prevent people from entering. President Obama’s plan to allow 10,000 Syrian refugees into the United States met with stiff resistance from some House Republicans who have called for stricter certifications that none of the immigrants poses a security risk.

Same-Sex Marriage Debate

PHOTO:The front of the White House is lit in the color of the rainbow, June 26, 2015, after the United States Supreme Court issued the decision in the case of Obergefell v. Hodges ruling that same-sex marriage is legal in all states.
PHOTO:The front of the White House is lit in the color of the rainbow, June 26, 2015, after the United States Supreme Court issued the decision in the case of Obergefell v. Hodges ruling that same-sex marriage is legal in all states.

The Supreme Court made a landmark decision in June, voting to allow same-sex couples to marry nationwide. The 5-4 decision was praised by many, including President Obama, who called it a “victory for America.” But not everyone was pleased with the decision. A county clerk in Kentucky became a touchstone for the national debate after she claimed it was against her religious beliefs to issue marriage licenses to same-sex couples. Kim Davis was jailed for nearly a week for defying a judge’s order to issue any marriage licenses in Rowan County.

Pope Francis Visits the US

PHOTO:Pope Francis places a white rose on the names of the September 11 victims at the edge of the South Pool of the 9/11 memorial in New York, Sept. 25, 2015.
PHOTO:Pope Francis places a white rose on the names of the September 11 victims at the edge of the South Pool of the 9/11 memorial in New York, Sept. 25, 2015.

One of the biggest moments of national excitement came when Pope Francis made his inaugural visit to the United States, sweeping the country up in a serious case of Pope-mania. His visit started in Washington, D.C., after a trip to Cuba, and he went on to visit New York and Philadelphia before returning to the Vatican. Some of the highlights of the trip included a historic address to Congress, frequent rides in his Fiat and a particularly memorable moment shared with a baby girl dressed up like a pope.

WASHINGTON 9/23/2015

President Obama welcomed Pope Francis to the White House during the pope’s first visit to the United States.

Another Terror Attack in Paris

PHOTO:A photo shows a makeshift memorial for a tribute to the victims of a series of deadly attacks in Paris, in front of the Carillon cafe in Paris, Nov. 23, 2015.
PHOTO:A photo shows a makeshift memorial for a tribute to the victims of a series of deadly attacks in Paris, in front of the Carillon cafe in Paris, Nov. 23, 2015.

A series of coordinated terror attacks struck fear through the heart of the French capital on Friday Nov. 13. A combination of shooters and men wearing explosive vests targeted a football stadium, restaurants and a concert venue that evening, leaving 130 people dead.

French officials determined that the attackers had ties to ISIS, which has claimed responsibility. The alleged ringleader of the attacks was killed five days later when authorities raided his apartment in the northern Paris suburb of Saint-Denis. An international manhunt is still underway at this time for at least one other suspect.

GREECE-MACEDONIA BORDER, NEAR IDOMENI, GREECE 8/26/2015

A child stood near police controlling a rush of refugees into Macedonia.

CLEARLAKE, CALIF. 8/3/2015

A firefighter was silhouetted by his headlamp as he battled the Rocky Fire, a wildfire that spread over three counties and burned over 60,000 acres.

HAVANA 8/14/2015

Workers hanging the seal of the United States at the reopened American Embassy.

TIANJIN, CHINA 8/15/2015

Rows of motor vehicles were destroyed in chemical explosions that killed 160 people and were strong enough to register on earthquake scales.

Russia’s air campaign in Syria has killed hundreds of civilians and caused massive destruction in residential areas, according to a report released Wednesday by Amnesty International.

SHANKSVILLE, PA. 9/3/2015

A new visitor center and museum told the story of Flight 93, forced down by passengers after it was hijacked by terrorists on Sept. 11, 2001.

BUDAPEST, HUNGARY 9/5/2015

A Syrian father, center, slept with his son and other family members on the floor of a bus driving from Budapest to Vienna.

HUNGARY-SERBIA BORDER, NEAR HORGOS, SERBIA 9/16/2015

A man tried to save his child as Hungarian police officers fired tear gas, pepper spray and water cannons at migrants trying to cross into the country.

BODRUM, TURKEY 9/2/2015

Aylan Kurdi, the Syrian toddler whose drowning off the coast of Turkey drew public sympathy to the refugee crisis.

KOBANI, SYRIA 10/27/2015

Nine months after coalition airstrikes and Kurdish fighters repelled an invasion by the Islamic State, the city was still in ruins.

MANHATTAN 10/21/2015

New York City police officers stood at attention as the remains of Officer Randolph Holder, who was killed on the job, were taken from a Harlem hospital.

WASHINGTON 10/29/2015

Representative John A. Boehner hoisted a box of tissues to laughter during his farewell remarks before the House elected Paul D. Ryan to replace him as speaker.

The Metrojet Airbus 321, bound for St Petersburg and carrying mostly Russian citizens, crashed in Egypt’s Sinai desert just 23 minutes after take-off from Sharm el-Sheikh.

PARIS 11/13/2015

A victim outside the Bataclan theater, where 90 people were killed during coordinated terrorist attacks that left 40 more dead across the city and in a northern suburb.

SAN BERNARDINO, CALIF. 12/7/2015

A candlelight vigil commemorated the 14 victims of a mass shooting by a radicalized Muslim couple.

BEIJING 12/8/2015

Schools were closed, driving restricted and factories shut down after China’s capital issued its first ever “red alert” for air pollution.

WASHINGTON 12/12/2015

The lectern in the Cabinet Room of the White House where President Obama announced a historic agreement among 195 nations to reduce greenhouse gas emissions.

RAMADI, Iraq 12/27/2015

Iraqi forces with U.S air support are taking back ‘some’ neighborhoods in the Anbar Province.

DALLAS, Texas 12/27/2015

Tornado devastation in Texas killing 48.

Photo essay taken in part from the two websites below, that offer additional text and photos.

http://abcnews.go.com/US/year-review-13-biggest-news-stories-2015/story?id=35852690 and http://www.nytimes.com/interactive/2015/12/27/sunday-review/2015-year-in-pictures.html?_r=0

 

 

 

 

 

Forget the EMP, It’s the Hack, You’re at Risk

Iranian hackers infiltrated computers of small dam in NY

WASHINGTON (Reuters) – Iranian hackers breached the control system of a dam near New York City in 2013, an infiltration that raised concerns about the security of the country’s infrastructure, the Wall Street Journal reported on Monday, citing former and current U.S. officials.

Two people familiar with the breach told the newspaper it occurred at the Bowman Avenue Dam in Rye, New York. The small structure about 20 miles from New York City is used for flood control.

The hackers gained access to the dam through a cellular modem, the Journal said, citing an unclassified Department of Homeland Security summary of the incident that did not specify the type of infrastructure.

The dam is a 20-foot-tall concrete slab across Blind Brook, about five miles from Long Island Sound.

“It’s very, very small,” Rye City Manager Marcus Serrano told the newspaper. He said FBI agents visited in 2013 to ask the city’s information-technology manager about a hacking incident.

The dam breach was difficult to pin down, and federal investigators at first thought the target was a much larger dam in Oregon, the Journal said.

The breach came as hackers linked to the Iranian government were attacking U.S. bank websites after American spies damaged an Iranian nuclear facility with the Stuxnet computer worm.

It illustrated concerns about many of the old computers controlling industrial systems, and the White House was notified of the infiltration, the Journal said.

The newspaper said the United States had more than 57,000 industrial control systems connected to the Internet, citing Shodan, a search engine that catalogs each machine.

Homeland Security spokesman S.Y. Lee would not confirm the breach to Reuters. He said the department’s 24-hour cybersecurity information-sharing hub and an emergency response team coordinate responses to threats to and vulnerabilities in critical infrastructure.

***

Cant Sleep, You are at Risk

In part from Wired: If you want to keep yourself up at night, spend some time reading about the latest developments in cybersecurity. Airplanes hacked, cars hacked, vulnerabilities in a breathtaking range of sensitive equipment from TSA locks to voting booths to medical devices.

The big picture is even scarier. Former NSA Director Mike McConnell suspects China has hacked “every major corporation” in the US. Edward Snowden’s NSA leaks revealed the US government has its own national and international hacking to account for. And the Ponemon Institute says 110 million Americans saw their identities compromised in 2014. That’s one in two American adults.

The system is broken. It isn’t keeping us, our companies, or our government safe. Worse yet, no one seems to know how to fix it.

How Did We Get Here?

One deceptive truth seems to drive much of the cybersecurity industry down a rabbit hole: If you keep bad actors and bad software out of your system, you have nothing to worry about.

Malicious actors target “endpoints”—any device or sensor connected to a network—to break into that network. Network security seeks to protect those endpoints with firewalls, certificates, passwords, and the like, creating a secure perimeter to keep the whole system safe.

This wasn’t difficult in the early days of the Internet and online threats. But today, most private networks have far too many endpoints to properly secure. In an age of “Bring Your Own Device,” the cloud, remote access, and the Internet of Things, there are too many vulnerabilities hackers can exploit. As Ajay Arora, CEO of file security company Vera, notes, there is no perimeter anymore. It’s a dream of the past.

But the security paradigm remains focused on perimeter defense because, frankly, no one knows what else to do. To address threats, security experts should assume compromise – that hackers and malware already have breached their defenses, or soon will – and instead classify and mitigate threats.

The CIA Triad

The information security community has a model to assess and respond to threats, at least as a starting point. It breaks information security into three essential components: confidentiality, integrity, and availability.

Confidentiality means protecting and keeping your secrets. Espionage and data theft are threats to confidentiality.

Availability means keeping your services running, and giving administrators access to key networks and controls. Denial of service and data deletion attacks threaten availability.

Integrity means assessing whether the software and critical data within your networks and systems are compromised with malicious or unauthorized code or bugs. Viruses and malware compromise the integrity of the systems they infect.

The Biggest Threat

Of these, integrity is the least understood and most nebulous. And what many people don’t realize is it’s the greatest threat to businesses and governments today.

Meanwhile, the cybersecurity industry remains overwhelmingly focused on confidentiality. Its mantra is “encrypt everything.” This is noble, and essential to good security. But without integrity protection, the keys that protect encrypted data are themselves vulnerable to malicious alteration. This is true even of authenticated encryption algorithms like AES-GCM.

In the bigger picture, as cybercrime evolves, it will become clear that loss of integrity is a bigger danger than loss of confidentiality. One merely has to compare different kinds of breaches to see the truth of this:

A confidentiality breach in your car means someone learns your driving habits. An integrity breach means they could take over your brakes. In a power grid, a confidentiality breach exposes system operating information. An integrity breach would compromise critical systems, risking failure or shutdown. And a confidentiality breach in the military would mean hackers could obtain data about sensitive systems. If they made an integrity beach, they could gain control over these weapons systems. Full details and actions you can take to protect yourself, go here.

A Money Trail: Iran to Hamas to Islamic State

For Hamas and Islamic State, the common enemy is Egypt. Prime Minister Netanyahu of Israel spoke truth to power on this relationship months ago.

Analysis: Money Trail Leads From Iran to ISIS, by Way of Hamas

TheTower: A report published Monday in Ynet that documents ties between Hamas and the Sinai-based branch of ISIS also shows Iran’s role in supporting ISIS.

Israel’s security establishment has pointed out a clear paradox in this dangerous collaboration: the bulk of Hamas’ financial support comes from Iran, which is persistently fighting ISIS in Syria and Iraq. Many Iranians have already been killed on the frontline of this battle. Furthermore, the Iranians are specifically funding the Gaza front against ISIS’s Sinai branch – via Hamas.

The Times of Israel reported in September that Iran, in expectation of the sanctions relief it would receive under terms of the nuclear deal, was smuggling “suitcases of cash” to Hamas so that the terror group could upgrade its arsenal.

Since the deal was signed, Iran has significantly increased its financial support for two of the largest terror groups in the region that have become political players, Hamas and Hezbollah. In the years before the deal was signed, the crippling sanctions limited this support, which had significantly diminished along with Iran’s economy. But Tehran’s belief that tens, or hundreds, of billions of dollars will flow into the country in the coming years as a result of sanctions relief has led to a decision to boost the cash flow to these terror organizations.

At around the same time, Major General Ataollah Salehi, the commander-in-chief of Iran’s armed forces, boasted of the support Iran was giving to terror groups such as Hamas and Hezbollah to help them fight terror wars against Israel.

The Ynet article, coming a week after the leader of ISIS’s Sinai branch was reported in Gaza, highlighted the operational cooperation between Hamas and ISIS. Hamas has been giving funds, received from Iran, to ISIS to finance its operations. Hamas has also provided training to ISIS and treated ISIS terrorists in Gaza hospitals. In return, ISIS has helped Hamas smuggle weapons into Gaza.

Because Hamas has a clear hierarchy and command structure, it is highly unlikely that funds would go to ISIS without approval from both the highest echelons of Hamas and their funders in Iran.

  • Hamas’ military wing in the Gaza Strip has been transferring tens of thousands of dollars a month to the Islamic State group’s Sinai branch over the past year, via one of its emissaries.
  • The transfer of cash is just one part of the military and strategic cooperation between the two groups. The finances of Hamas’ military arm, the Izz ad-Din al-Qassam Brigades, are independent of those of the organization’s political bureau. Hamas is paying the Islamic State militants in Egypt to secure weapons shipments being smuggled through the Sinai to Gaza. More details here.

Juniper Hacked, Several Govt Agencies at Risk

Backdoor Code Found in Firewall

Engadget: One of the reasons corporate users and the privacy-minded rely on VPNs is to control access to their networks and (hopefully) not expose secrets over insecure connections. Today Juniper Networks revealed that some of its products may not have been living up to that standard, after discovering “unauthorized code” in the software that runs on its NetScreen firewalls during a code review. Pointed out by security researcher “The Grugq,” the backdoor has been present since late 2012 and can only be fixed by upgrading to a new version of software just released today.

Telnet / ssh exposes a backdoor added by attackers to ScreenOS source code. This has been there since August 2012. Noted code here.

The pair of issues that created the backdoor would allow anyone who knows about it to remotely log in to the firewall as an administrator, decrypt and spy on supposedly secure traffic, and then remove any trace of their activity. Obviously this is a Very Bad Thing, although Juniper claims it has not heard of any exploitation in the wild (which would be difficult, since no one knew it existed and attackers could hide their traces) so far.

Beyond sending IT people sprinting to patch and test their setups, now we can all speculate about which friendly group of state-sponsored attackers is responsible. US government officials have recently been pushing for mandated backdoor access to secure networks and services, but the Edward Snowden saga made clear that even our own country’s personnel aren’t always going to ask permission before snooping on any information they want to check out. I contacted Juniper Networks regarding the issue, but have not received a response at this time.

Update: A Juniper Networks spokesperson told us:

During a recent internal code review, Juniper discovered unauthorized code in ScreenOS® that could allow a knowledgeable attacker to gain administrative access and if they could monitor VPN traffic to decrypt that traffic. Once we identified these vulnerabilities, we launched an investigation and worked to develop and issue patched releases for the impacted devices. We also reached out to affected customers, strongly recommending that they update their systems and apply the patched releases with the highest priority.

The patched releases also address an SSH bug in ScreenOS that could allow an attacker to conduct DoS attacks against ScreenOS devices. These two issues are independent of each other.

Newly discovered hack has U.S. fearing foreign infiltration

Washington (CNN) A major breach at computer network company Juniper Networks has U.S. officials worried that hackers working for a foreign government were able to spy on the encrypted communications of the U.S. government and private companies for the past three years.

The FBI is investigating the breach, which involved hackers installing a back door on computer equipment, U.S. officials told CNN. Juniper disclosed the issue Thursday along with an emergency security patch that it urged customers to use to update their systems “with the highest priority.”

The concern, U.S. officials said, is that sophisticated hackers who compromised the equipment could use their access to get into any company or government agency that used it.

One U.S. official described it as akin to “stealing a master key to get into any government building.”

The breach is believed to be the work of a foreign government, U.S. officials said, because of the sophistication involved. The U.S. officials said they are certain U.S. spy agencies themselves aren’t behind the back door. China and Russia are among the top suspected governments, though officials cautioned the investigation hasn’t reached conclusions.

It’s not yet clear what if any classified information could be affected, but U.S. officials said the Juniper Networks equipment is so widely used that it may take some time to determine what damage was done.

A senior administration official told CNN, “We are aware of the vulnerabilities recently announced by Juniper. The Department of Homeland Security has been and remains in close touch with the company. The administration remains committed to enhancing our national cybersecurity by raising our cyber defenses, disrupting adversary activity, and effectively responding to incidents when they occur.”

Juniper Networks’ security fix is intended to seal a back door that hackers created in order to remotely log into commonly used VPN networks to spy on communications that were supposed to be among the most secure. A free trial vpn has been helpful for those new to the VPN world to decide if it is right for them.

Juniper said that someone managed to get into its systems and write “unauthorized code” that “could allow a knowledgeable attacker to gain administrative access.”

Such access would allow the hacker to monitor encrypted traffic on the computer network and decrypt communications.

Juniper sells computer network equipment and routers to big companies and to U.S. government clients such as the Defense Department, Justice Department, FBI and Treasury Department. On its website, the company boasts of providing networks that “US intelligence agencies require.”

Its routers and network equipment are widely used by corporations, including for secure communications. Homeland Security officials are now trying to determine how many such systems are in use for U.S. government networks.

Juniper said in its security alert that it wasn’t aware of any “malicious exploitation of these vulnerabilities.” However, the alert also said that attackers would leave behind no trace of their activity by removing security logs that would show a breach.

“Note that a skilled attacker would likely remove these entries from the log file, thus effectively eliminating any reliable signature that the device had been compromised,” the Juniper security alert said. If encrypted communications were being monitored, “There is no way to detect that this vulnerability was exploited,” according to the Juniper security alert.

According to a Juniper Networks spokeswoman’s statement, “Once we identified these vulnerabilities, we launched an investigation and worked to develop and issue patched releases for the impacted devices. We also reached out to affected customers, strongly recommending that they update their systems.”

U.S. officials said it’s not clear how the Juniper source code was altered, whether from an outside attack or someone inside.

The work to alter millions of lines of source code is sophisticated. The system was compromised for three years before Juniper uncovered it in a routine review in recent weeks.

Juniper said it was also issuing a security fix for a separate bug that could allow a hacker to launch denial-of-service attacks on networks.