What About Those Stingrays? You Cool With This?

Surveillance Nation is here today and are you good with this?

Is Microsoft reading YOUR emails? Windows 10 may threaten your privacy, watchdogs warn

Windows 10:  DailyMailUK

Within 45 pages of terms and conditions, the privacy information suggests Microsoft begins watching from when an account is created, saving customer’s basic information, passwords and credit card details, Newsweek reported.

The tech giant is also said to save Bing search queries and conversations with Cortana, as well as lists of which websites and apps users visit and the contents of private emails and files, as well as their handwriting.   The privacy statement says: ‘your typed and handwritten words are collected.’

The policy adds that Microsoft collects information about a user’s speech and handwriting to ‘help improve and personalise our ability to correctly recognise your input,’ while information from their contacts book is used, such as names and calendar events ‘to better recognise people and events when you dictate messages or documents’.

Cortana, for example, makes use of information about who a user calls on their phone, plus data from their emails and texts, calendar and contacts, as well as their web history and location.  Microsoft says that data is collected to provide users with a more personalised service and better character recognition, for example, but may also be used for targeted adverting, meaning it may share information with third parties.

The company assigns each of its users a unique advertising ID so it does not reveal what they ‘say in email, chat, video calls or voice mail, or your documents, photos or other personal files to target ads to you.’

But it has still come under fire from privacy campaigners.

Online privacy pressure group, European Digital Rights (EDRi) told The Times that Microsoft’s policy was ‘not only bad news for privacy. Your free speech rights can also be violated on an ad hoc basis.’

Microsoft ‘basically grants itself very broad rights to collect everything you do, say and write with on your devices in order to sell more targeted advertising or to sell your data to third parties.’

Kirsten Fiedler, EDRi’s Managing Director told MailOnline: ‘Unlike Microsoft’s promise, the company’s new 45 page-long terms of service are not straightforward at all.

‘Online companies should finally start explaining their terms in an understandable manner so that we can make informed choices about the services we want to use.

 

Stingray surveillance sparks privacy concerns in Congress

USAToday: WASHINGTON — Members of Congress are increasingly trying to rein in a secretive federal law enforcement program that uses devices known as Stingrays to capture cellphone data from unsuspecting Americans.

“They are spying on law-abiding citizens as we speak,” said Rep. Darrell Issa, R-Calif., who recently won House approval of a measure to end the program.

The box-shaped Stingray devices are the size of small suitcases, cost about $400,000 to buy and operate, and are usually attached to the cars of federal, state or local law enforcement agents. They mimic cellphone towers, tricking phones within a certain radius to connect to and feed data to police about users’ locations, text messages, calls and emails.

At least a half-dozen federal agencies — including the FBI, the Drug Enforcement Administration, and Immigration and Customs Enforcement — use the technology, which can penetrate the walls of a home, apartment complex or office.

Police say the technology — which can also be attached to planes — helps them catch criminals by tracking their movements and actions. But critics complain that it violates the constitutional rights of innocent citizens whose cellphone data is also seized, often without a warrant.

At least 53 law enforcement agencies in 21 states also use Stingrays or similar devices, according to research by the American Civil Liberties Union. Local police typically buy the devices with grants from the federal government and sign agreements with the FBI not to disclose their use, said ACLU attorney Nathan Wessler.

A June 2014 investigation by USA TODAY and Gannett newspapers found that an increasing number of local and state police agencies were deploying Stingrays and other technology to secretly collect cellphone data from suspected criminals and law-abiding Americans not suspected of any wrongdoing.

“It’s become clear how staggeringly widespread the use of this technology is,” Wessler said. “We’ve been heartened to see that some members of Congress are taking the privacy concerns quite seriously.”

The House this summer passed, by voice vote, a Justice Department spending bill that included Issa’s amendment to bar funding for the use of Stingrays without a warrant. Issa said he won’t stop there, in part because the Senate is unlikely to pass that measure .

“I will use additional opportunities to get it done,” Issa told USA TODAY. “Right now, law enforcement won’t even tell us how many Stingrays they have. The only way to protect the American people is to change the law.”

Sen. Ron Wyden, D-Ore., and Rep. Jason Chaffetz, R-Utah, also are targeting the Stingray program in a broader bill called the GPS Act. The legislation would require law enforcement agents to obtain warrants before tracking Americans’ locations by using Stingray-type devices or tapping into cellphones, laptops, or GPS navigation systems.

“I don’t see how you can use a Stingray without it raising very substantial privacy issues,” Wyden told USA TODAY. “I want police to be able to track dangerous individuals and their locations, but it ought to be done with court oversight under the Fourth Amendment.”

The FBI has said it has a policy of obtaining warrants before using Stingray devices, although it has broad exceptions, including one that allows the technology to be used in public places where the agency believes people shouldn’t have an expectation of privacy.

“It’s how we find killers, it’s how we find kidnappers, it’s how we find drug dealers, it’s how we find missing children, it’s how we find pedophiles,” FBI Director James Comey told reporters in Charlotte. last fall. “It’s work you want us to be able to do.”

Chaffetz is also using his position as chairman of the House Oversight and Government Reform Committee to gather information as part of an investigation into the use of stingrays, said his spokesman, M.J. Henshaw.

At the same time, Senate Judiciary Committee Chairman Charles Grassley, R-Iowa, and Sen. Patrick Leahy of Vermont, the senior Democrat on the panel, have been pressing the Department of Justice for answers about Stingray practices and policies. Sen. Bill Nelson, R-Fla., has also called on the Federal Communications Commission to review how the devices are used.

A spokesman for the Department of Justice said the agency is reviewing its policies for the use of Stingray devices. He said he didn’t know when the review would be done.

“With regards to this technology, the Department of Justice is in the process of examining its policies to ensure they reflect our continued commitment to conducting our vital missions while according appropriate respect for privacy and civil liberties,” said spokesman Patrick Rodenbush.

While the Justice Department reviews its policies, states have begun passing their own laws to ban state and local police from using Stingrays without a warrant.

Washington Gov. Jay Inslee signed a ban in May after legislation was passed with overwhelming bipartisan support in the state Legislature. In addition to requiring police to obtain a warrant before using Stingray devices, the law says police must quickly delete any data collected on people who were not targets of a criminal investigation.

Similar laws have been passed in Virginia and Utah and are being considered in California, New York and Texas.

“The American people are looking for a balance between security and liberty,” Issa said. “After 9/11, we moved too far towards security. We need to move back toward liberty.”

Every U.S. Corporation Hacked by China

From the Former NSA Director McConnell via CNN:

“The Chinese have penetrated every major corporation of any consequence in the United States and taken information,” he said. “We’ve never, ever not found Chinese malware.”
He said the malware lets Chinese spies extract information whenever they want. McConnell, who also led the NSA from 1992 until 1996, continues to investigate hacks as a high-ranking adviser to Booz Allen Hamilton (BAH).
He listed victims he has come across during his investigations: U.S. Congress, Department of Defense, State Department (which is currently dealing with Russian hackers) and major corporations.
The U.S. government has said it has caught Chinese spies stealing blueprints and business plans. Last year, federal prosecutors took the unprecedented step of filing formal criminal charges against five Chinese government spies for breaking into Alcoa (AA), U.S. Steel Corp. (X), Westinghouse and others.

Exclusive: Secret NSA Map Shows China Cyber Attacks on U.S. Targets

A secret NSA map obtained exclusively by NBC News shows the Chinese government‘s massive cyber assault on all sectors of the U.S economy, including major firms like Google and Lockheed Martin, as well as the U.S. government and military.

The map uses red dots to mark more than 600 corporate, private or government “Victims of Chinese Cyber Espionage” that were attacked over a five-year period, with clusters in America’s industrial centers. The entire Northeast Corridor from Washington to Boston is blanketed in red, as is California’s Silicon Valley, with other concentrations in Dallas, Miami, Chicago, Seattle, L.A. and Detroit. The highest number of attacks was in California, which had almost 50.

Each dot represents a successful Chinese attempt to steal corporate and military secrets and data about America’s critical infrastructure, particularly the electrical power and telecommunications and internet backbone. And the prizes that China pilfered during its “intrusions” included everything from specifications for hybrid cars to formulas for pharmaceutical products to details about U.S. military and civilian air traffic control systems, according to intelligence sources.

The map was part of an NSA briefing prepared by the NSA Threat Operations Center (NTOC) in February 2014, an intelligence source told NBC News. The briefing highlighted China’s interest in Google and defense contractors like Lockheed Martin, and in air traffic control systems. It catalogued the documents and data Chinese government hackers have “exfiltrated” — stolen — from U.S. corporate, government and military networks, and also listed the number and origin of China’s “exploitations and attacks.”

The map suggests that NSA has been able to monitor and assess the Chinese cyber espionage operations, and knows which specific companies, government agencies and computer networks are being targeted.

The NSA did not immediately respond to repeated requests for comment.

 

 

The China Hack of United Airlines, Electronic Insurgency

Warning corporations, industry and government entities is one thing, action and protection and or declaration of a cyber war is yet another.

July 2015:

Aspen Institute: Cyber warfare is one of the most potent security threats the United States faces, National Security Agency Director and Commander of the US Cyber Command General Keith Alexander told the crowd at the Aspen Security Forum in Aspen, discussing in conversation with NBC News Correspondent Pete Williams the nature of the threat and how his department is working to address it.
With the Stuxnet, Duqu, and Flame viruses in the fore of the public consciousness, Alexander took pains to point out that nation-states were not the only potential cyber actors. Citing power and water grids as his chief concerns, he said, “Somebody who finds vulnerability in our infrastructure could cause tremendous problems. They could erase the Input/output of a system so it can’t boot, and would have to be replaced. And these capabilities are not only nation-state-only capabilities.”

Alexander assessed the US’ readiness to confront such an attack as a three on a scale of ten, calling lack of adequately trained cyber defense forces the critical impediment to greater preparedness. “Our issue isn’t [having the tools] to address the threat,” he said. “It’s having the capacity, and building and training cyber forces. We have a big requirement, and a small force that is growing steadily.”

China-Tied Hackers That Hit U.S. Said to Breach United Airlines

Bloomberg:

The hackers who stole data on tens of millions of U.S. insurance holders and government employees in recent months breached another big target at around the same time — United Airlines.

United, the world’s second-largest airline, detected an incursion into its computer systems in May or early June, said several people familiar with the probe. According to three of these people, investigators working with the carrier have linked the attack to a group of China-backed hackers they say are behind several other large heists — including the theft of security-clearance records from the U.S. Office of Personnel Management and medical data from health insurer Anthem Inc.

The previously unreported United breach raises the possibility that the hackers now have data on the movements of millions of Americans, adding airlines to a growing list of strategic U.S. industries and institutions that have been compromised. Among the cache of data stolen from United are manifests — which include information on flights’ passengers, origins and destinations — according to one person familiar with the carrier’s investigation.

 

It’s increasingly clear, security experts say, that China’s intelligence apparatus is amassing a vast database. Files stolen from the federal personnel office by this one China-based group could allow the hackers to identify Americans who work in defense and intelligence, including those on the payrolls of contractors. U.S. officials believe the group has links to the Chinese government, people familiar with the matter have said.

That data could be cross-referenced with stolen medical and financial records, revealing possible avenues for blackmailing or recruiting people who have security clearances. In all, the China-backed team has hacked at least 10 companies and organizations, which include other travel providers and health insurers, says security firm FireEye Inc.

Tracking Travelers

The theft of airline records potentially offers another layer of information that would allow China to chart the travel patterns of specific government or military officials.

United is one of the biggest contractors with the U.S. government among the airlines, making it a rich depository of data on the travel of American officials, military personnel and contractors. The hackers could match international flights by Chinese officials or industrialists with trips taken by U.S. personnel to the same cities at the same time, said James Lewis, a senior fellow in cybersecurity at the Center for Strategic and International Studies in Washington.

“You’re suspicious of some guy; you happen to notice that he flew to Papua New Guinea on June 23 and now you can see that the Americans have flown there on June 22 or 23,” Lewis said. “If you’re China, you’re looking for those things that will give you a better picture of what the other side is up to.”

Computer Glitches

The timing of the United breach also raises questions about whether it’s linked to computer faults that stranded thousands of the airline’s passengers in two incidents over the past couple of months. Two additional people close to the probe, who like the others asked not to be identified when discussing the investigation, say the carrier has found no connection between the hack and a July 8 systems failure that halted flights for two hours. They didn’t rule out a possible, tangential connection to an outage on June 2.

Luke Punzenberger, a spokesman for Chicago-based United, a unit of United Continental Holdings Inc., declined to comment on the breach investigation.

Zhu Haiquan, a spokesman for the Chinese embassy in Washington, said in a statement: “The Chinese government and the personnel in its institutions never engage in any form of cyberattack. We firmly oppose and combat any forms of cyberattacks.”

Embedded Names

United may have gotten help identifying the breach from U.S. investigators working on the OPM hack. The China-backed hackers that cybersecurity experts have linked to that attack have embedded the name of targets in web domains, phishing e-mails and other attack infrastructure, according to one of the people familiar with the investigation.

In May, the OPM investigators began drawing up a list of possible victims in the private sector and provided the companies with digital signatures that would indicate their systems had been breached. United Airlines was on that list.

Safety Concerns

In contrast to the theft of health records or financial data, the breach of airlines raises concerns of schedule disruptions or transportation gridlock. Mistakes by hackers or defenders could bring down sensitive systems that control the movement of millions of passengers annually in the U.S. and internationally.

Even if their main goal was data theft, state-sponsored hackers might seek to preserve access to airline computers for later use in more disruptive attacks, according to security experts. One of the chief tasks of the investigators in the United breach is ensuring that the hackers have no hidden backdoors that could be used to re-enter the carrier’s computer systems later, one of the people familiar with the probe said.

United spokesman Punzenberger said the company remains “vigilant in protecting against unauthorized access” and is focused on protecting its customers’ personal information.

There is evidence the hackers were in the carrier’s network for months. One web domain apparently set up for the attack — UNITED-AIRLINES.NET — was established in April 2014. The domain was registered by a James Rhodes, who provided an address in American Samoa.

James Rhodes is also the alias of the character War Machine in Marvel Comics’ Iron Man. Security companies tracking the OPM hackers say they often use Marvel comic book references as a way to “sign” their attack.

Targeting Pentagon

This isn’t the first time such an attack has been documented. Chinese military hackers have repeatedly targeted the U.S. Transportation Command, the Pentagon agency that coordinates defense logistics and travel.

A report last year from the Senate Armed Services Committee documented at least 50 successful hacks of the command’s contractors from June 2012 through May 2013. Hacks against the agency’s contractors have led to the theft of flight plans, shipping routes and other data from organizations working with the military, according to the report.

“The Chinese have been trying to get flight information from the government; now it looks as if they’re trying to do the same in the commercial sector,” said Tony Lawrence, a former Army sergeant and founder and chief executive officer of VOR Technology, a Columbia, Maryland-based cybersecurity firm.

It’s unclear whether United is considering notifying customers that data may have been compromised. Punzenberger said United “would abide by notification requirements if a situation warranted” it.

The airline is still trying to determine exactly which data was removed from the network, said two of the people familiar with the probe. That assessment took months in the OPM case, which was discovered in April and made public in June.

M&A Strategy

Besides passenger lists and other flight-related data, the hackers may also have taken information related to United’s mergers and acquisitions strategy, one of the people familiar with the investigation said.

Flight manifests usually contain the names and birthdates of passengers, but even if those files were taken, experts say that would be unlikely to trigger disclosure requirements in any of the 47 states with breach-notification laws.

Those disclosure laws are widely seen as outdated. The theft by hackers of corporate secrets usually goes unreported, while the stealing of customer records such as Social Security numbers and credit cards is required in most states.

“In most states, this is not going to trigger a notification,” said Srini Subramanian, state government leader for Deloitte cyber risk services.

Immigrants Globally a Boon to Mafia and Gangs

Given civil wars, drug cartels, failed states, lawlessness and financial crises, refugees, asylum seekers and those fleeing their home countries for countless reasons are falling prey to gangs and organized crime operations like the Mafia.

This is a building phenomenon not only globally but here in the United States. Consider Libya, Syria, Sudan, Iraq, Yemen, Honduras, Guatemala, El Salvador and Mexico are noted to be failed states.

Every action has a reaction and the Obama administration is not facing any conditions or consequences here at home.

Italy’s Mafia is Profiting From the Immigration Crisis
The Mafia in Italy have demonstrated devious ingenuity in everything from drug trafficking to counterfeiting. Now they’re exploiting the immigration crisis.

The care and feeding of such migrants may end up costing the Italian government as much as €800m per year, with it offering private individuals, companies and non-profit organisations up to €35 a day per person to host them. That includes a daily pocket money allowance of €2.50 that hosts are supposed to pay directly to the refugees.

Those funds have proven irresistible to the Mafia, according to Italian prosecutors and watchdog groups, who say criminal groups have succeeded at rigging the awarding of the contracts for the management of migrant reception centres in several high-profile cases.

Then here at home, let us look no farther than Long Island.

Gangs on LI trying to recruit newly arrived Central American children

Latino street gangs led by MS-13 have tried to lure Long Island’s newest child immigrants into their ranks, police said, causing concern among local investigators as well as immigrant advocacy groups.

The violent, drug-dealing gangs have been vying for new members among the more than 3,000 children younger than 18 who resettled in Nassau and Suffolk counties between September 2013 and September 2014.

MS-13 has gone international as their syndicate is appearing in Australia.

FreeBeacon: Vice President of the National Border Patrol Council Shawn Moran told Fox News that the violent MS-13 gang is exploiting the chaos on the U.S. border to recruit new juvenile members.

“We know the cartels were exploiting this and continue to exploit this crisis in south Texas, it makes sense that MS-13 and other gangs would do the same,” said Moran.

According to Moran, the gang has been using a Red Cross phone bank on the border, originally intended for unaccompanied minors to use to contact relatives: “These phones are being utilized by gang members to recruit, to enlist, to pressure people, other juveniles into joining the MS-13 gang.”

And, Moran explained, border security is unable to isolate these gang members because they are juveniles, and they are required to treat all juveniles a certain way. “We’re being told we have to look the other way. If we see gang tattoos, we’re not allowed to treat them any differently than anybody else applying to be allowed to stay here or to apply for asylum.”

“It’s a security issue that we feel could really snowball out of control and it would put agents at risk. It puts the other detainees at risk,” Moran said.

Moran described MS-13 as “one of the biggest threats we face on our southern border. They do not hesitate to use extreme violence if necessary. They are considered one of the top threats to border patrol agents.”

Iran Leader’s Nephew To Obama: They’re Lying To You

When Washington DC is full discussions due to the Iran deal and hearings have occurred almost every day since the agreement was signed, there is reason to escalate real concerns for what the White House and John Kerry are attempting to sell.

TEHRAN (FNA)- Iranian Defense Minister Brigadier General Hossein Dehqan underlined that Tehran will not allow any foreigner to discover Iran’s defensive and missile capabilities by inspecting the country’s military sites.

“Missile-related issues have never been on agenda of the nuclear talks and the Islamic system will resolutely implement its programs in this field,” Brigadier General Dehqan said at a meeting with a group of Defense Ministry managers and employees on Monday, commenting on the nuclear agreement recent struck between Iran and the six world powers (the US, Russia, China, France, Britain and Germany).

He pointed to the recent statements of the US officials on Iran, and said, “The US officials make boastful remarks and imagine that they can impose anything on the Iranian nation because they lack a proper knowledge of the Iranian nation.”

The Iranian Defense Minister reiterated that the time has come now for the Americans to realize that they are not the world’s super power and no one recognizes them as such any longer.

Brigadier General Dehqan pointed to the recent nuclear tests conducted by the US concurrent with nuclear talks in Vienna, and said, “Such measures indicate their lack of commitment to international peace and security and it is for the same reason that independent nations and governments can never trust the US.”

On Saturday, Commander of the Islamic Revolution Guards Corps (IRGC) Major General Mohammad Ali Jafari underlined that there are still some concerns lingering about the sum-up agreement reached between Tehran and the Group 5+1 (the US, Russia, China, France and Britain plus Germany) and the relevant draft resolution to be adopted by the UN Security Council.

***
Then the nephew of the Supreme leader wrote a letter to Barack Obama about the lies from the Iranian regime.
PJ Media reports that an open letter to President Obama from the nephew of Iranian Supreme Leader Ayatollah Ali Khamenei, Dr. Mahmoud Moradkhani, was posted on an Iranian website this past Tuesday.
The extraordinary letter states in no uncertain terms that Khamenei is lying in his negotiations with the West, relying on taqiyya, (the Shia doctrine which allows Muslims to lie to infidels in order to further Islam’s goals). Moradkhani clearly states that the Islamic regime has deceived the Iranian people, compares their deception to Hitler’s actions, accuses some of the West’s media of censoring remarks made by Iranian opponents of the regime, calls for Obama to reject the nuclear deal and pleads for the end of the Islamic regime in Iran.The full text follows:

Dear Mr. President

I am presenting this open letter as one of the serious opponents of the Islamic republic of Iran on behalf of the like-minded opposition groups and myself. Because of my knowledge of this regime, especially of Ali Khamenei who is my uncle (my mother’s brother), I see it as my duty to inform you about this regime and the issue of nuclear negotiations with the Islamic regime of Iran.

Let me at first inform you that the regime that falsely calls itself a republic came to power in 1979 by deceiving Iranian people and the world through provoking Iranian people against the regime of Mohammad Reza Pahlavi and gaining the support of the world community.

The tragedy of Cinema Rex*, believing in Khomeini’s words and then establishing a backward regime that is violent, medieval and against all international laws are all results of Iranian people and the world community being deceived. We are witnessing that not only a rich and cultured country like Iran has become a victim of this regime but also the Middle East and the whole free world. The intervention of Ali Khamenei’s regime (following Khomeini’s footsteps who had no other intention other that domination of Iraq) in Lebanon, Palestine, Afghanistan, Iraq, and Syria is more than obvious. As if these were not enough, he has now added the Arabian Peninsula to that list.

In any case, this regime has done great damage to Iranians and to the international community.

We can find a historical example of this kind of deception prior to the Second World War. Hitler manipulated and deceived German people and European countries and the hesitation in addressing the problem with Hitler led to a great disaster.

Due to the changes in time, the domain of the disaster might become limited now but breach of human rights is the same, regardless of the number of people who become victimized in the process.

Ali Khamenei and his collaborators know very well that they will never become a nuclear power. They certainly do not have the national interest of Iranian in their mind; they just use the nuclear issue to bully the countries in the region and export their revolution and middle-aged culture to other countries. Obviously, you and European countries do not give the Islamic regime any concession unless you are certain that they comply with the agreement. The Islamic regime of Iran will certainly prolong the verification period the same way that they have delayed and prolonged the nuclear talks. It is in this period that the wounded regime will retaliate with its destructive policies.

The countless breaches of human rights violations, spreading of Islamic fundamentalism, intervention and creating crisis in the Middle East are all unacceptable and contrary to democratic and humane beliefs of yours and ours.

While we can, with some measure of decisiveness and courage, uproot the wicked tree of the Islamic regime of Iran, just settling for cutting its branches is nothing more than avoiding responsibility.

It is clear that the eradication of the Islamic regime of Iran is the responsibility and mission of Iranian people and specially the opposition abroad; however, by putting obstacles in front of Iranian people and the Iranian opposition abroad one prevents them from doing their task.

The Islamic regime of Iran, based on their deceptive nature have sent their mercenaries abroad and even managed to recruit and manipulate some American-Iranians. Individuals who out of self-interest are lobbying for the Islamic regime of Iran and hiding its true nature and giving a false picture of its intentions; in the same manner that while Khomeini was in France, the so-called Iranian intellectuals did not let people of Iran and the world, realize the true meaning “the Islamic republic”. Those so-called intellectuals polished the remarks of Khomeini and converted them to positive, popular, strong and victorious ones.

We see that unfortunately in your country and your state media (the Persian section of Voice of America) and especially in UK (the Persian section of BBC) the remarks of the opposition of Islamic regime of Iran are being censored and instead the indecent habit of analyzing and relaying statements of the Islamic regime of Iran have become a norm.

I have a deep understanding and insight of the habits, morals and true indentions of this regime and I find it necessary to let you and the world know that the true evil of the Islamic regime of Iran is far more damaging and dangerous to be resolved by just signing an agreement.

People who have always lied, deceived and believe in Taqiya**, people whose main goal is supremacy and domination over others can never be trusted.

Instead they should be confronted with the very basic principles that have led to their criminality

and

  • To put an end on breaching of human rights violations; in other words, an end to Qisas***, random executions, discrimination, suppression of dissent, media repression, religious and ideological hegemony.
  • Devolving power to the people and the abolition of restrictive laws, such as mandatory supervision in elections.
  • Giving freedom to religious minorities and repealing laws limiting the choice of thought and religion.
  • Non-interfere policy toward governments of countries such as Afghanistan, Iraq, Lebanon, Syria and Yemen.
  • Cancelling the assassination orders of dissidents in the world that have resulted in the killing of journalists, writers and even cartoonists.

I believe that any agreement or concession that is not associated with these basic conditions in reality will only be assisting this regime in achieving its indecent goals.

The possible disaster following this kind of hesitation will be similar to the historical mistake made prior to the Second World War.

Ali Khamenei will not be satisfied with the little that he has today and surely, and in all secrecy, at the first possible moment will attempt to bully and dominate.

Removing the crippling sanctions without fundamental changes in this regime will not be in Iran’s interest and will only facilitates the Islamic regime of Iran in reaching its objectives.

United States of America and Europe should not jeopardize their long-term interests due to short-term ones.

There are powerful and pro-active forces in the Iranian opposition and if the censorship of the media that are supporting the Islamic regime of Iran were to be removed, the opposition can easily organize and assist the powerful civil disobedience of Iranian people.

Iranian people want peace and freedom; without this regime not only can they ensure the resurrection of a civilized country but also a peaceful region.

Yours respectfully

Dr.Mahmoud Moradkhani