Approval Process for Cyberwarfare Challenged

Cyber is a real battlefield and yet it gets almost zero ink in the media. The reason is due in part to exposing vulnerabilities, forced ransoms and stolen data.

NotPetya could be the beginnings of a new kind of ... photo

Just a couple of years ago: Chet Nagle, a former CIA agent and current vice president of M-CAM, penned an article in the Daily Caller, stating, “At FBI headquarters in July, the head of FBI counterintelligence, Randall Coleman, said there has been a 53% increase in the theft of American trade secrets, thefts that have cost hundreds of billions of dollars in the past year. In an FBI survey of 165 private companies, half of them said they were victims of economic espionage or theft of trade secrets — 95% of those cases involved individuals associated with the Chinese government.”

The threats all appear to have a foreign genesis and the United States does not have a real cyber policy due in part to debates over whether cyber attacks are acts of war. Can the United States fight back with her own cyber weapons? Not really, kinda, maybe.

Tracking the theft is left to the FBI, while responding is left to the U.S. Cyber Command. Army Lt. Gen. Paul Nakasone is the head of Cyber Command facing strategic threats from Russia, China, North Korea and Iran. During his confirmation hearings, Nakasone was grilled on how he would position the agencies to confront mounting Russian aggression in cyberspace, whether through attempted interference in U.S. elections or targeting the electric grid and other critical industrial systems.

Members of the White House’s National Security Council are pushing to rescind Presidential Policy Directive 20, an important policy memorandum that currently guides the approval process for government-backed cyberattacks, three current U.S. officials familiar with the matter tell CyberScoop.

The effort is driven in part by a desire from some NSC staff to create a more streamlined channel for military leaders to get their offensive cyber operations greenlit, insiders familiar with the matter said. The sources spoke under the condition of anonymity to freely discuss sensitive national security matters.

The move comes as lawmakers openly question whether U.S. Cyber Command, the nation’s premier cyber warfare unit, is hamstrung from responding to Russian meddling due to bureaucratic red tape. CyberScoop previously reported that multiple congressional committees are considering policies that could empower the military’s cyber mission.

But the push for change faces resistance from the intelligence community and several other federal agencies involved in cybersecurity.

Senior U.S. intelligence officials have expressed concerns over what rescinding the directive will mean for their own active computer spying missions. These covert operations, which are typically pursued by intelligence agencies like the CIA or NSA, could be exposed by the launch of “louder” disruptive-style attacks from the military. The presence of multiple hacking teams simultaneously targeting a single network often makes it easier for them all to be discovered by the victim.

Prior reporting by CyberScoop has shown that a long-running turf war exists between different federal agencies regarding the proper use of hacking tools in order to protect the homeland.

Even before Trump came to office though, the framework in question was considered a source of frustration inside the Pentagon.

Signed by President Barack Obama in 2012, the directive’s critics say that it was written in a confusing manner that leaves open-ended questions. In addition, critics tell CyberScoop that too many federal agencies are allowed to weigh in on proposed cyber operations, causing “even reasonable” plans to be delayed or outright rejected.

Insiders who are resistant to eliminating the directive admit that PPD-20 is flawed, but fear change because they’ve not seen a replacement plan.

“Better the devil you know, or something like that,” a former U.S. official said. “This is such a crucial decision because whatever comes next will dictate how arguments are settled inside government … you have the military on one side and the IC on the other.”

The NSC, CIA and Office of the Director of National Intelligence declined to comment. The NSA referred CyberScoop to U.S. Cyber Command, who in turn did not respond to a request for comment.

Currently, PPD-20 requires U.S. government agencies to run approvals for offensive operations through a chain of command that stretches across the federal government. The process is largely focused on controlling those operations that go beyond the confines of everyday digital espionage, or computer exploitation, to simply collect information.

According to PPD-20, if an operation is considered “of significant consequence,” it requires the direct blessing of the president in addition to the interagency group. Hacking operations that, for example, shut down a power grid or cause equipment to explode would fit into such a description. But experts say it also includes less flashy tactics like deleting data or corrupting software in a destructive manner.

“This directive pertains to cyber operations, including those that support or enable kinetic, information, or other types of operations,” PPD-20 reads. “The United States has an abiding interest in developing and maintaining use of cyberspace as an integral part of U.S. national capabilities to collect intelligence and to deter, deny, or defeat any adversary.”

After coming under scrutiny last month, outgoing NSA Director Adm. Michael Rogers told lawmakers that there’s an “ongoing policy discussion” about redrawing the regulations looming over military cyber operations. Unlike conventional military activities, the internet makes it difficult for policymakers to draw clear cut boundaries. This challenges also runs up against longstanding laws that underpin, and therefore divide, the work of soldiers and spies.

Historically, intelligence agencies — empowered by Title 50 of the U.S. Code — have led the way on U.S.-backed hacking that occur in countries like Iran or China; where armed conflict is absent. Military operations fall under the purview of Title 10 of the U.S. Code.

It’s not clear whether giving military leaders more leeway to conduct hacking operations will ultimately make those units more effective at their missions. The details surrounding these activities are always classified, which inhibits the public from having a substantive policy debate.

Ultimately, the decision to eliminate PPD-20 falls solely to the executive branch. Sources tell CyberScoop no final decision has been made.

What makes PPD-20 difficult to analyze is the fact that it remains a classified document, despite it being leaked by NSA whistleblower Edward Snowden. The classification means current officials are barred from publicly commenting on it.

Thomas Rid, a professor of strategic studies at Johns Hopkins University, said that Snowden’s PPD-20 leak was notable because it revealed the U.S. government’s thought process behind “the rise of unwanted norms caused by escalatory cyberattacks.”

“Reading between the lines, the framework acknowledges the negative effect on global cyber norms that events like Stuxnet can cause because of escalation,” said Rid.

Rid also believes the directive was “naïvely constructed,” relying too much on the idea that cyberattacks only impact other machines, and not people.

“When you look at what’s happened in 2016, and really since then, it makes the people who wrote PPD-20 seem like they don’t understand the current threat environment where Russia, and to some degree Iran, are combining active measures with cyber to change public perception,” he told CyberScoop. “Russia is basically kicking the U.S.’ ass.”

How Israel Obtained the Iran Nuclear Documents

Note, Israel was told about the documents and the warehouse, likely by the MEK. The MEK and the Mossad often perform joint operations. For context on the MEK operations:

The MEK’s Role Was Critical in Preventing Iran From Obtaining a Nuclear Bomb

The MEK has been instrumental in exposing Iran’s nuclear weapons program. Relying on a vast network inside Iran, MEK revelations of the weapons program significantly contributed to the world peace and the national security of the United States.

These revelations triggered the International Atomic Energy Agency (IAEA) inspections of the uranium enrichment facility in Natanz and Heavy Water Facility in Arak in 2002 for the first time, and since then, the majority of the visits by the IAEA inspection teams have been to the sites first exposed by the MEK.

Senior U.S. officials including President Bush, Vice President Dick Cheney, and Secretary of State Condoleezza Rice have repeatedly pointed to the role the MEK had played in getting the world attention on Iran’s nuclear weapons program.

In March 2005, President, George W. Bush, emphasized that the MEK’s revelation of Natanz prompted an international
campaign to stop the nuclear weapons program of Iran. “Iran has concealed its — a nuclear program. That became discovered, not because of their compliance with the IAEA or NPT, but because a dissident group pointed it out to the world.”

Many of the key front companies exposed by the MEK such as Mesbah Energy, Novin Energy, Kalaye Electric, Kavoshyar Company, and Farayand Technique were eventually sanctioned by the Treasury Department. In July 2011, the MEK exposed a new nuclear organization overseeing the entire nuclear program and run by the military, known as SPND. The U.S. Government designated that entity in 2014. In addition, many companies, key nuclear experts, and military institutions exposed by the MEK have been sanctioned by the United Nations Security Council resolutions 1737, 1747, and 1803.

If it were not for the MEK nuclear revelations, Tehran would have had the bomb by now. Congressman Brad Sherman (D-CA) told a House Foreign Affairs Committee Hearing “We all owe a debt of gratitude to the MEK for bringing this information to the world, and causing the United States and the world to focus on the problem.” More here.

Trump to Make Historic Visit to Western Wall in Jerusalem - NBC News photo

Israeli Prime minister Benjamin Netanyahu briefed President Trump two months ago on the capture of the Iranian “nuclear archive,” and decided to publicly expose the documents yesterday due to Trump’s May 12th deadline on possible U.S. withdrawal from the Iran nuclear deal.

Between the lines: An Israeli official tells me Israel wanted to publicly release the new intelligence after White House visits from French President Macron and German Chancellor Merkel, both of whom tried to convince Trump not to withdraw. “We are facing a major decision by President Trump regarding the nuclear deal. Last week was for the Europeans, and this week is our week,” the official said.

  • During a meeting at White House on March 5th, Netanyahu presented Trump and his senior cabinet members — Vice President Pence, Secretary of Defense Mattis, then-Secretary of State Tillerson and then-National Security Adviser McMaster — with an initial analysis of the “Nuclear archive,” a senior Israeli official tells me.
  • Netanyahu spoke to Trump over the phone last Saturday and told him he would publish the intelligence later in the week.
  • A day later he met in Tel-Aviv with Secretary of State Pompeo and gave him a similar update. An Israeli official said the timing of the publication was coordinated with the White House.

How the documents were seized

The Israeli Mossad discovered the existence of an Iranian “Nuclear archive” in February 2016, a short time after the nuclear deal started being implemented.

  • Israeli officials say the Mossad received intelligence that showed the Iranians were trying to hide all documents concerning the military dimensions of their nuclear program.
  • The official said that in a highly secret operation known to a handful of Iranian officials, the Iranians transferred tens of thousands of documents and CD’s from several different sites around the country to a civilian warehouse in Tehran. The Israeli official said the Iranians did all that because they were afraid IAEA inspectors would find the documents.
  • The Mossad put the warehouse under surveillance and started preparing for a possible operation to seize the documents. According to Israeli officials, more than 100 Mossad spies worked on this operation and, in January 2018, it was implemented.
  • A senior Israeli intelligence official said the Mossad managed to put its hands on most of the documents in the warehouse. “We didn’t take everything because it was too heavy”, he said.

Coordination with the U.S.

  • An Israeli official said the CIA and the White House knew about the Israeli efforts to capture the “Iranian nuclear archive,” and Israel briefed the U.S. immediately after the successful operation.
  • At the same time Netanyahu was briefing Trump and his top officials, the Mossad gave the CIA copies of all the 100,000 documents it obtained.
  • At the beginning of February, the Mossad started translating and analyzing the documents, most of were written in Persian. A special team with 50 analysts was formed in the Mossad and, according to an Israeli official, a separate team is working in the CIA. Both intelligence agencies still haven’t finished analyzing the documents.

The Israeli official said: “The documents will a very strong proof that there was a military nuclear program in Iran. Such proof that the Iranians will not be able to deny.”

So After Congressional Hearings, Facebook Changes the Rules

The rules eh? Yeah those where employees are free to remove content with no explanation or often an appeals process. What is missing from the new rules, which Facebook states can change from time to time is the whole censorship issue especially when it comes to conservatives.

It was an internal secret on how Facebook controlled and managed content, in fact it still appears to be a secret. That means lawyers are involved, lots of them.In this day and time, definition of words and terms has become slippery and subjective and that continues to be the case at Facebook. So what are ‘community standards’ and exactly who decided those standards? Well 8000 words later describing community standards, that is IF anyone takes the time to read the text, we still don’t know.

How to control your data on Facebook like Mark Zuckerberg ... photo

Oh yeah, one other item….that fake news thing…..crickets….further Mark Zuckerberg himself is quite naive about the ugliness around the world…connecting people to talk about rainbows and bunnies will make it all better?

Facebook Terms and Policies

Facebook Terms of Service, still from 2015

MENLO PARK, Calif. (Reuters) – Facebook Inc (FB.O) on Tuesday released a rule book for the types of posts it allows on its social network, giving far more detail than ever before on what is permitted on subjects ranging from drug use and sex work to bullying, hate speech and inciting violence.

Facebook for years has had “community standards” for what people can post. But only a relatively brief and general version was publicly available, while it had a far more detailed internal document to decide when individual posts or accounts should be removed.

Now, the company is providing the longer document on its website to clear up confusion and be more open about its operations, said Monika Bickert, Facebook’s vice president of product policy and counter-terrorism.

“You should, when you come to Facebook, understand where we draw these lines and what’s OK and what’s not OK,” Bickert told reporters in a briefing at Facebook’s headquarters.

Facebook has faced fierce criticism from governments and rights groups in many countries for failing to do enough to stem hate speech and prevent the service from being used to promote terrorism, stir sectarian violence and broadcast acts including murder and suicide.

At the same time, the company has also been accused of doing the bidding of repressive regimes by aggressively removing content that crosses governments and providing too little information on why certain posts and accounts are removed.

New policies will, for the first time, allow people to appeal a decision to take down an individual piece of content. Previously, only the removal of accounts, Groups and Pages could be appealed.

Facebook is also beginning to provide the specific reason why content is being taken down for a wider variety of situations.

Facebook, the world’s largest social network, has become a dominant source of information in many countries around the world. It uses both automated software and an army of moderators that now numbers 7,500 to take down text, pictures and videos that violate its rules. Under pressure from several governments, it has been beefing up its moderator ranks since last year.

Bickert told Reuters in an interview that the standards are constantly evolving, based in part on feedback from more than 100 outside organizations and experts in areas such as counter-terrorism and child exploitation.

“Everybody should expect that these will be updated frequently,” she said.

The company considers changes to its content policy every two weeks at a meeting called the “Content Standards Forum,” led by Bickert. A small group of reporters was allowed to observe the meeting last week on the condition that they could describe process, but not substance.

At the April 17 meeting, about 25 employees sat around a conference table while others joined by video from New York, Dublin, Mexico City, Washington and elsewhere.

Attendees included people who specialize in public policy, legal matters, product development, communication and other areas. They heard reports from smaller working groups, relayed feedback they had gotten from civil rights groups and other outsiders and suggested ways that a policy or product could go wrong in the future. There was little mention of what competitors such as Alphabet Inc’s Google (GOOGL.O) do in similar situations.

Bickert, a former U.S. federal prosecutor, posed questions, provided background and kept the discussion moving. The meeting lasted about an hour.

Facebook is planning a series of public forums in May and June in different countries to get more feedback on its rules, said Mary deBree, Facebook’s head of content policy.

FROM CURSING TO MURDER

The longer version of the community standards document, some 8,000 words long, covers a wide array of words and images that Facebook sometimes censors, with detailed discussion of each category.

Videos of people wounded by cannibalism are not permitted, for instance, but such imagery is allowed with a warning screen if it is “in a medical setting.”

Facebook has long made clear that it does not allow people to buy and sell prescription drugs, marijuana or firearms on the social network, but the newly published document details what other speech on those subjects is permitted.

Content in which someone “admits to personal use of non-medical drugs” should not be posted on Facebook, the rule book says.

The document elaborates on harassment and bullying, barring for example “cursing at a minor.” It also prohibits content that comes from a hacked source, “except in limited cases of newsworthiness.”

The new community standards do not incorporate separate procedures under which governments can demand the removal of content that violates local law.

In those cases, Bickert said, formal written requests are required and are reviewed by Facebook’s legal team and outside attorneys. Content deemed to be permissible under community standards but in violation of local law – such as a prohibition in Thailand on disparaging the royal family – are then blocked in that country, but not globally.

The community standards also do not address false information – Facebook does not prohibit it but it does try to reduce its distribution – or other contentious issues such as use of personal data.

 

The DNC Sues, Counter Suits in the Making

Tom Perez, Chairman of the Democrat National Committee has filed a lawsuit against 15 entities/people including John Does (which could be 10 or more people). The question is who is funding this lawsuit as the DNC is at least $6.1 million in debt. Oh wait, the DNC is also fundraising off this lawsuit….okay…moving on. The DNC has also requested a jury trial.

Levin: 'The Democrat Party just made a massive mistake' photo

Lawsuits require something called discovery which would be a long process and you can bet the Russian Federation will not even bother with any kind of compliance. Ah yes, we cannot overlook that Julian Assange of WikiLeaks fame is also funding raising to file a counter suit against the DNC. Will any of this go anywhere even if a judge accepts the case? Likely no….it is a collective fundraising gesture and a matter of dragging out the hacking scandals for years to come.

Meanwhile, TechDirt has an interesting summary of this legal warfare.

Most of the time when we see these laws used, they’re indications of pretty weak lawsuits, and going through this one, that definitely seems to be the case here. Indeed, some of the claims made by the DNC here are so outrageous that they would effectively make some fairly basic reporting illegal. One would have hoped that the DNC wouldn’t seek to set a precedent that reporting on leaked documents is against the law — especially given how reliant the DNC now is on leaks being reported on in their effort to bring down the existing president. I’m not going to go through the whole lawsuit, but let’s touch on a few of the more nutty claims here.

The crux of the complaint is that these groups / individuals worked together in a conspiracy to leak DNC emails and documents. And, there’s little doubt at this point that the Russians were behind the hack and leak of the documents, and that Wikileaks published them. Similarly there’s little doubt that the Trump campaign was happy about these things, and that a few Trump-connected people had some contacts with some Russians. Does that add up to a conspiracy? My gut reaction is to always rely on Ken “Popehat” White’s IT’S NOT RICO, DAMMIT line, but I’ll leave that analysis to folks who are more familiar with RICO.

But let’s look at parts we are familiar with, starting with the DMCA claim, since that’s the one that caught my eye first. A DMCA claim? What the hell does copyright have to do with any of this? Well…

Plaintiff’s computer networks and files contained information subject to protection under the copyright laws of the United States, including campaign strategy documents and opposition research that were illegally accessed without authorization by Russia and the GRU.

Access to copyrighted material contained on Plaintiff’s computer networks and email was controlled by technological measures, including measures restricting remote access, firewalls, and measures restricting acess to users with valid credentials and passwords.

In violation of 17 U.S.C. § 1201(a), Russia, the GRU, and GRU Operative #1 circumvented these technological protection measures by stealing credentials from authorized users, condcting a “password dump” to unlawfully obtain passwords to the system controlling access to the DNC’s domain, and installing malware on Plaintiff’s computer systems.

Holy shit. This is the DNC trying to use DMCA 1201 as a mini-CFAA. They’re not supposed to do that. 1201 is the anti-circumvention part of the DMCA and is supposed to be about stopping people from hacking around DRM to free copyright-covered material. Of course, 1201 has been used in all sorts of other ways — like trying to stop the sale of printer cartridges and garage door openers — but this seems like a real stretch. Russia hacking into the DNC had literally nothing to do with copyright or DRM. Squeezing a copyright claim in here is just silly and could set an awful precedent about using 1201 as an alternate CFAA (we’ll get to the CFAA claims in a moment). If this holds, nearly any computer break-in to copy content would also lead to DMCA claims. That’s just silly.

Onto the CFAA part. As we’ve noted over the years, the Computer Fraud and Abuse Act is quite frequently abused. Written in response to the movie War Games to target “hacking,” the law has been used for basically any “this person did something we dislike on a computer” type issues. It’s been dubbed “the law that sticks” because in absence of any other claims that one always sticks because of how broad it is.

At least this case does involve actual hacking. I mean, someone hacked into the DNC’s network, so it actually feels (amazingly) that this may be one case where the CFAA claims are legit. Those claims are just targeting the Russians, who were the only ones who actually hacked the DNC. So, I’m actually fine with those claims. Other than the fact that they’re useless. It’s not like the Russian Federation or the GRU is going to show up in court to defend this. And they’re certainly not going to agree to discovery. I doubt they’ll acknowledge the lawsuit at all, frankly. So… reasonable claims, impossible target.

Then there’s the Stored Communications Act (SCA), which is a part of ECPA, the Electronic Communications Privacy Act, which we’ve written about a ton and it does have lots of its own problems. These claims are also just against Russia, the GRU and Guccifer 2.0, and like the DMCA claims appear to be highly repetitive with the CFAA claims. Instead of just unauthorized access, it’s now unauthorized access… to communications.

It’s then when we get into the trade secrets part where things get… much more problematic. These claims are brought against not just the Russians, but also Wikileaks and Julian Assange. Even if you absolutely hate and / or distrust Assange, these claims are incredibly problematic against Wikileaks.

Defendants Russia, the GRU, GRU Operative #1, WikiLeaks, and Assange disclosed Plaintiff’s trade secrets without consent, on multiple dates, discussed herein, knowing or having reason to know that trade secrets were acquired by improper means.

If that violates the law, then the law is unconstitutional. The press regularly publishes trade secrets that may have been acquired by improper means by others and handed to the press (as is the case with this content being handed to Wikileaks). Saying that merely disclosing the information is a violation of the law raises serious First Amendment issues for the press.

I mean, what’s to stop President Trump from using the very same argument against the press for revealing, say, his tax returns? Or reports about business deals gone bad, or the details of secretive contracts? These could all be considered “trade secrets” and if the press can’t publish them that would be a huge, huge problem.

In a later claim (under DC’s specific trade secrets laws), the claims are extended to all defendants, which again raises serious First Amendment issues. Donald Trump Jr. may be a jerk, but it’s not a violation of trade secrets if someone handed him secret DNC docs and he tweeted them or emailed them around.

There are also claims under Virginia’s version of the CFAA. The claims against the Russians may make sense, but the complaint also makes claims against everyone else by claiming they “knowingly aided, abetted, encouraged, induced, instigated, contributed to and assisted Russia.” Those seem like fairly extreme claims for many of the defendants, and again feel like the DNC very, very broadly interpreting a law to go way beyond what it should cover.

As noted above, there are some potentially legit claims in here around Russia hacking into the DNC’s network (though, again, it’s a useless defendant). But some of these other claims seem like incredible stretches, twisting laws like the DMCA for ridiculous purposes. And the trade secret claims against the non-Russians is highly suspect and almost certainly not a reasonable interpretation of the law under the First Amendment.

 

DNC Lawsuit by Zerohedge on Scribd

End of the Castro Era, yet Communism Prevails Under new Leader

In February of 2013, the 600 members of the National Assembly of People’s Power and the 1600 provincial government representatives voted for Miguel Diaz Canal to be vice president. As of April 2018, Miguel Diaz Canal will reign supreme over Cuba as Raul Castro steps down.

While the Cuban military runs most of the operations in Cuba including all tourism, it is predicted under Miguel Diaz Canal, the junta will expand in Cuba. Cuba remains on the U.S. State Department Tier 2 Watchlist because of human trafficking.

For a historic slide show on Cuba, go here.

El ALBA: Trece años de "una poderosa esperanza" | Cubadebate photo

Cuba remains in an economic crisis and has been patching this crisis with oil agreements with Venezuela, attempting to increase agriculture production and applying some reforms. Meanwhile Cuba has asked Australia, Austria, Belgium, Canada, Denmark, Finland, Italy, Japan, the Netherlands, Spain, Sweden, Switzerland and the United Kingdom for debt forgiveness which in total is estimated in the $11 billion range. Russia wrote off $32 billion in Soviet era debt of Cuba in 2014.

As a continued threat to the United States, Russia re-opened a signals intelligence facility at Lourdes and two Russian oil companies, Gazprom and Zarubezhneft have continued offshore oil drilling exploration operations. In 2014, President Xi of China visited Cuba to sign 29 trade agreements along with debt and  credit cooperation concessions.

Putin in Cuba, hopes for more trade with Latin America ... photo

In 2013, a weapons shipment on board a North Korea ship that left Cuba bound for the return to North Korea was discovered raising additional concerns for sanctions violations of both countries. The ship’s cargo was discovered in Panama due to suspicions of carrying illicit narcotics.

In 2009, the Obama administration began a significant shift in policy toward Cuba launching a new beginning which led to the reopening of the U.S. embassy in Havana. Yet nothing in Cuba changed with regard to human rights violations but some dissident prisoners were released and there were some Cuba spies released from the United States back to Cuba. U.S. citizen Alan Gross was also released from prison by Cuba and returned to the United States. In at least four rounds of talks with Cuba to reestablish diplomatic relations with the United States, Barack Obama sent a resolution to Congress to removed Cuba from the designation of a State Sponsor of International Terrorism. There were no objections by Congress and the rescission of this designation was removed.

Further, under Barack Obama many other initiatives were launched including law enforcement cooperation, smuggling prevention, technical exchanges, environmental, banking, maritime issues, counter-narcotics, trade, travel and cyber-crime. Continued health cooperation, direct mail services and oil spill preparedness were all part of the Obama new era policies.

The Trump administration has made statements indicating a reversal to some of the policy changes made during the Obama administration. This also includes operations at Guantanamo Bay.Meanwhile, Cuba still protects fugitives from justice including Assata Shakur also known as Joanne Chesimard that killed a New Jersey State police officer when she was a member of the Black Liberation Army. Another fugitive is William Guillermo Morales, a member of FALN that a domestic terror group convicted in New York for bomb production and weapons charges in cases going back to 1978.

There are continued property claims totaling 5911 where private property and that of U.S. corporations were confiscated by the Cuban government. The value of these claims is in the $10.9 billion and no resolution is in sight.

So, as Raul Castro passe power to a younger groomed and mentored communist, there is no reason to consider that relations and conditions will improve or move closer to a democratic process in Cuba. Not to be overlooked, the matter of a still unclear health attack of U.S. and Canadian diplomats assigned to the embassy in Havana has not been resolved. Both the United States and Canada have removed personnel as a result of debilitating health issues where Cuba has not protected or mitigated these acoustic attacks in and around the homes of diplomatic housing quarters.

Miguel Diaz Canal will continue to carry on the Castro regime and communist party platform. In fact, it is said that Miguel Diaz Canal will in fact be much more of a hardliner than that of the previous Castro regime.

In a videotaped private meeting with Communist Party members, Cuban Vice President Miguel Díaz-Canel — often portrayed as a moderate politician with a quiet disposition — took on an all too familiar hardline tone that offered a rare glimpse into his ideology.

In the video, which has quickly spread across social media platforms, Díaz-Canel lashed out against Cuban dissidents, independent media and embassies of several European countries, accusing them all of supporting subversive projects.

For the United States, he had this message: Cuba will not make any concessions.

“The U.S. government… invaded Cuba, put the blockade [embargo] in place, imposed restrictive measures. Cuba did not do any of that, so in return for nothing they have to solve those asymmetries if they want relations and if they want normalization of the relations,” Díaz-Canel said in the February meeting captured on video and published by Cuban dissident Antonio Rodiles on YouTube this week.