2 Congressmen Watched Voting Machines Being Hacked

Primer

33 states accepted DHS aid to secure elections

The Department of Homeland Security (DHS) provided cybersecurity assistance to 33 state election offices and 36 local election offices leading up to the 2016 presidential election, according to information released by Democratic congressional staff.

During the final weeks of the Obama administration, the DHS announced that it would designate election infrastructure as critical, following revelations about Russian interference in the 2016 election.

Since January, two states and six local governments have requested cyber hygiene scanning from the DHS, according to a memo and DHS correspondence disclosed Wednesday by the Democratic staff of the Senate Homeland Security and Governmental Affairs Committee.

The information is related to the committee’s ongoing oversight of the DHS decision to designate election infrastructure.

The intelligence community said back in January that in addition to directing cyberattacks on the Democratic National Committee and top Democratic officials, Russia also targeted state and local electoral systems not involved in vote tabulating.

In June, DHS officials told senators investigating Russian interference that there was evidence that Russia targeted election-related systems in 21 states, none of them involved in vote tallying.

Officials have previously confirmed breaches in Arizona and Illinois, though it remains unclear whether other systems were successfully breached. Lawmakers such as Sen. Mark Warner (D-Va.) have demanded more information on the specific states targeted.

Homeland Security and Government Affairs ranking member Claire McCaskill (D-Mo.) wrote then-Secretary of Homeland Security John Kelly back in March, asking for more information on his plans for the critical infrastructure designation. The information released Wednesday is drawn from his response on June 13. Kelly has since left his post to serve as President Trump’s chief of staff.

“Prior to the election, DHS offered voluntary, no-cost cybersecurity services and assistance to election officials across all 50 states. By Election Day, 33 state election offices and 36 local election offices requested and received these cyber hygiene assessments of their internet-facing infrastructure,” Kelly wrote.

“In addition, one state election office requested and received a more in-depth risk and vulnerability assessment of their election infrastructure.”

Given the critical infrastructure designation, the DHS is providing cyber hygiene assessments, which include vulnerability scanning of election-related systems excluding voting machines and tallying systems, which the department recommends being disconnected from the internet.

The department also offers risk and vulnerability assessments, which include penetration testing, social engineering, wireless discovery and identification, and database and operating systems scanning. The DHS is also responsible for sharing threat information with owners and operators of critical infrastructure, which now include state and local election officials.

“Following the establishment of election infrastructure as critical infrastructure, several state and local governments requested new or expanded cybersecurity services from DHS,” Kelly disclosed in June, according to the letter. “Specifically, an additional two states and six local governments requested to begin cyber hygiene scanning (one state has, however, ended its service agreement). DHS also received one request for the risk and vulnerability assessment service.”

Many state and local election officials have opposed the designation, saying that the DHS has not offered enough information about what it means. The department has insisted that assistance will be given only to states that request it.

In the letter, Kelly, who has acknowledged objections, said there are “no plans to make any changes to the designation of election infrastructure as a critical infrastructure subsector.”

All of the Democratic members of the Senate Homeland Security and Governmental Affairs Committee have called for a full investigation into Russian election interference. The matter is already under investigation by the House and Senate Intelligence committees. The memo issued by Democratic staff on Wednesday was sent to the full committee.

Background at a Las Vegas Convention:

LAS VEGAS—For the first time in the 25 years of the world’s largest hacker convention, DefCon, two sitting U.S. Congressmen trekked here from Washington, D.C., to discuss their cybersecurity expertise on stage.

Rep. Will Hurd, a Texas Republican, and Rep. Jim Langevin, a Rhode Island Democrat, visited hacking villages investigating vulnerabilities in cars, medical devices, and voting machines; learned about how security researchers plan to defend quantum computers from hacks; and met children learning how to hack for good.

On Sunday, the last day of the conference, Hurd and Langevin delivered their own message: We come in peace. Please help us.

During a fireside chat-style conversation moderated by Joshua Corman, director of the Cyber Statecraft Initiative at the Atlantic Council, Hurd, chairman of the House Subcommittee on Information Technology, and Langevin, co-founder and co-chair of the Congressional Cybersecurity Caucus, called for the more than 2,000 hackers in the audience to “develop a dialogue” with their local representative in Congress.

“Never underestimate the value that you can bring to the table in helping to educate members and staff of what the best policies are, what’s going to work, and what’s not going to work,” Langevin said, pointing to Luta Security CEO and bug bounty expert Katie Moussouris’ ongoing advocacy for changes to the Wassenaar Arrangement, a decades-old international accord on how countries can transport “intrusion software” and other weapons across international borders.

Moussouris and Iain Mulholland of VMware have effectively convinced Wassenaar member countries to delay their adoption of proposed revisions to the agreement, as they’ve pushed for new language to better protect security researchers’ work.

The conversation between hackers and Congress has never been monosyllabic. But it has been frosty for decades, as federal prosecutors have used American antihacking laws such as the Computer Fraud and Abuse Act and Electronic Communication Privacy Act to punish people conducting legitimate security research.

As many security researchers continue to worry about how these laws might affect them, some have begun to use their expertise to influence the laws—and the lawmakers behind them.

Langevin and Hurd’s plea for hacker-legislator collaboration follows calls by hackers at last year’s DefCon for greater government regulation of software security.

“We don’t have voluntary minimum safety standards for cars; we have a mandatory minimum,” Corman told The Parallax at the time. “What tips the equation [for software] is the Internet of Things, because we now have bits and bytes meeting flesh and blood.”

Hurd said security researchers could play an important role in addressing increasingly alarming vulnerabilities in the nation’s voting apparatus. DefCon’s first voting machine-hacking village this weekend hosted a voting machine from Shelby County, Tenn., that unexpectedly contained personal information related to more than 600,000 voters. Village visitors managed to hack the machine, along with 29 others.

“We have to ensure that the American people can trust the vote-tabulating process,” Hurd said, acknowledging that DefCon attendees were able to hack each machine in the village. “The work that has been done out here is important in educating the secretaries of state all around the country, as well as the election administrators,” about secure technologies and practices.

Langevin and Hurd’s comments seemed to strike the right notes with hackers in attendance. Following Edward Snowden’s leaking of NSA documents and Apple’s refusal to create an encryption backdoor for law enforcement to the iPhone, relations between the hacking community and Washington have been strained at best, notes Herb Lin, a computer security policy expert and research fellow at Stanford University’s Center for International Security and Cooperation. But markedly improving the relationship will require more than a plea for collaboration, he warns.

“It’s better than what’s happened in the past, which is both nothing and active hostility,” he says. “One act by itself is not a game changer.”

The chat ended with assurances of more action from both sides. Corman said he’d like to see members of Congress attend more hacker conferences, such as ShmooCon in Washington, and Hurd promised that he wouldn’t let his experiences this past weekend go to waste.

“These conversations are going to lead me to hold hearings on many of these topics in the subcommittee that I chair,” Hurd said.

***  More details that were recorded at the convention:

DEF CON 2017 –  Are voting systems secure? In August 2016, the FBI issued a “flash” alert to election officials across the country confirming that foreign hackers have compromised state election systems in two states.

Although the US largely invested in electronic voting systems their level of security appears still not sufficient against a wide range of cyber attacks.

During an interesting session at the DEF CON hacking conference in Las Vegas, experts set up 30 computer-powered ballot boxes used in American elections simulating the Presidential election.  Welcome in the DEF CON Voting Village!

At the 1st ever Voting Village at , attendees tinker w/ election systems to find vulnerabilities. I’m told they found some new flaws

The organization asked the participant to physically compromise the system and hack into them, and the results were disconcerting.

“We encourage you to do stuff that if you did on election day they would probably arrest you.” John Hopkins computer scientist Matt Blaze said,

Most of the voting machines in the DEF CON Voting Village were purchased via eBay (Diebold, Sequoia and Winvote equipment), others were bought from government auctions.

voting machines hacking

In less than 90 minutes hackers succeeded in compromising the voting machines, one of them was hacker wirelessly.

“Without question, our voting systems are weak and susceptible. Thanks to the contributions of the hacker community today, we’ve uncovered even more about exactly how,” said Jake Braun, cybersecurity lecturer at the University of Chicago.

The analysis of the voting machines revealed that some of them were running outdated OS like Windows XP and Windows CE and flawed software such as unpatched versions of OpenSSL.

Some of them had physical ports open that could be used by attackers to install malicious applications to tamper with votes.

Even if physical attacks are easy to spot and stop, some voting machines were using poorly secured Wi-Fi connectivity.

The experts Carsten Schurmann at the DEF CON Voting Village hacked a WinVote system used in previous county elections via Wi-Fi, he exploited the MS03-026 vulnerability in Windows XP to access the voting machine using RDP.

Greetings from the Defcon voting village where it took 1:40 for Carsten Schurmann to get remote access to this WinVote machine.

Another system could be potentially cracked remotely via OpenSSL bug CVE-2011-4109, it is claimed.

huge cheer just went up in @votingvilllagedc as hackers managed to load Rick Astley video onto a voting machine

The good news is that most of the hacked equipment is no longer used in today’s election.

 

North Korea Kim Jung un, Cyber Theft of Currency

Going back to the 1970’s, North Korea was counterfeiting U.S. currency. In 2006, it was the super note, a perfect $100 dollar bill.

Training for such skills as counterfeiting, illicit drugs, weapons, cyber warfare and bootleg merchandise comes out of Office 39. Clandestine and fraudulent transactions including management operations flowing through Office 39 is estimate in the $6-8 billion range.

In 2014, one defector fleeing to Russia had $5 million of the Office 39 funds money with him.

Those highly selected North Koreans assigned to Office 39 arrive from having received an education in these specialties from elite universities or academies in China and Russia. Other highly selected North Koreans are also required to attend an in country school known as Mirim College. This school was founded by Kim Jong Il in 1986.

According to a defector:

this college has a highly confidential mission—education of world-class IT warriors—its security is so exhaustively kept that individual guard units are dispatched to the college solely for security. The security manual distributed to guards indicates that, “Without the permission of the college commander, no car should be allowed entrance to college grounds except for that of Kim Jong Il.”

Students of the college wear the same uniform as military officials, but on their shoulders they brandish special stars, on which hak (meaning is learning) is printed. A “Kim Il Political Military University” badge is worn on the left side of the chest.

Kim Jung Il lived the high life while his own people suffered to not only beatings but to death by starvation. His son, Kim Jung Un, taking over the country lives much the same yet due to sanctions and isolation by the international community, illicit activities continue.

Counterfeiting of currency is not so much a common practice in North Korea and the country has been dabbling in bitcoin fraud and now through cyber activity, they steal currency.

Just recently, Reuters published an item referring to a report analyzed suspected cyber attacks between 2015 and 2017 on South Korean government and commercial institutions, identified another Lazarus spinoff named Andariel.

“Bluenoroff and Andariel share their common root, but they have different targets and motives,” the report said. “Andariel focuses on attacking South Korean businesses and government agencies using methods tailored for the country.”

Pyongyang has been stepping up its online hacking capabilities as one way of earning hard currency under the chokehold of international sanctions imposed to stop the development of its nuclear weapons program.

North Korea has cooperated with China, Russia and Iran to improve their cyber capabilities. China is especially complicit in that cooperation by providing the communications network inside the DPRK and inside China. Additionally, China has provided hardware, servers, routers. Russia is not without major blame and shares the guilt by dispatching Russian professors from Frunze Military Academy to train North Koreans to be professional hackers.

Additionally, Russia has sold to North Korea GPS jamming equipment in the area of sea navigation and also provides financial aid to North Korea supporting it’s abilities to interfere and disrupt command and control systems.

North Korea operates yet another location known as Office 91. It has four units:

110= Technology Reconnaissance Team for DDoS attacks

35= External Offensive Cyber Operations

121= Strictly assigned for cyber attacks on South Korea

204= Enemy Secret Cyber Psychological Warfare Unit

In total, it is estimated that North Korea has close to 10,000 people assigned the the cyber and hacking operations in country. Additionally, North Korea maintains a force of up to 1000 in China performing cyber warfare.

While it is common for headlines to refer to Kim Jung Un as a nutcase, that is hardly a fitting description for him. While he may be militant and spontaneous, he is well educated. He attended Liebefeld-Steinhölzli Schule, a Swiss state school gaining access to Western culture, but had lousy grades. He has two degrees, one in physics from Kim il Sung University and another as an Army officer obtained from the Kim Il Sung Military University.

He does maintain an asymmetrical military strategy that has astounded the West and countries in the region with his advanced missile systems and launch abilities. All this is funded by cyber theft of currency and information and cooperation with Iran, China and Russia. North Korea does have IP proxy locations for operations that include New Zealand, Malaysia, Indonesia an several others. The ‘darknet’ is full of countries co-opting servers and jump points all doing the same thing.

 

 

 

The Frunze Military Academy Panorama

Putin’s Expulsion of Americans in Moscow, St. Petersburg, Yekaterinburg and Vladivostok

After Tuesday, they will be locked out.

The order — which affects the US Embassy in Moscow and consulates in St. Petersburg, Yekaterinburg and Vladivostok — would reduce US diplomatic and technical staff to 455, the same number Russia has in the United States, by September 1.
Russia’s state television, First Channel, reported Saturday that 745 of 1,200 people employed at the US embassy and consulates would have to leave the country.
US embassy dacha, Serebryany Bor, 28 Jul 17
 Image copyrightEPAImage captionRussia has banned US diplomats from this dacha at Serebryany Bor on Moscow’s outskirts  
A US diplomatic source told CNN on Saturday they are seeking to clarify who will be affected by the order.
“We’re evaluating the Russian notification and considering various options at this time,” a State Department official told CNN.
Russia also is suspending the use of a US storage facility in Moscow and a country house, or dacha, outside Moscow by Tuesday.

In December of 2016, Obama expelled more than three dozen Russians and closed two dachas from the United States due to Russian intrusion into the U.S.election system. Further, Obama set a limit of 455 Russians as the cap allowed in the United States.

During the G20, Trump and Putin covered the topic of returning the two dachas to Russian possession where the response was fine but with conditions. Those conditions are unknown. Russia has sent a delegation to the State Department to resolve the matter and to date there has been no solution.

Meanwhile, Congress had been in committee drafting a sanctions architecture legislative process that included not only Russia but Iran and North Korea were also contained in the legislation which passed with overwhelming approval in both houses.

Putin watched this cautiously and due to the bill sitting on the Trump desk in the Oval Office waiting for his signature, Putin took action over the weekend with closing at least three facilities. They include a home, a country retreat and a warehouse. 25 U.S. Marines also stand guard at the U.S. embassy.

Warehouse used by US embassy in Moscow, 28 Jul 17Image copyrightEPAImage captionAnd Russia is seizing this US diplomatic warehouse in Moscow

The State Department refuses to list or quantify how many Americans or local employees are on the U.S. diplomatic payroll, the number is close to 2000 including an estimate 80 working for USAID.

MOSCOW (Reuters) – The U.S. embassy in Moscow accused Russian authorities on Monday of barring diplomatic staff from a property on the outskirts of Moscow, after having earlier granted access until midday on Tuesday for them to retrieve belongings.

The Russian foreign ministry did not immediately respond to requests for comment.

The property, in a picturesque spot on a bend in the Moskva river north-west of the Russian capital, is leased by the U.S. embassy for its staff to use for recreation.

Moscow has said it is taking it back as part of retaliatory measures after Washington approved a fresh round of sanctions against Russia.

A Reuters TV cameraman outside the country residence, known in Russian as a dacha, saw five vehicles with diplomatic license plates, including a truck, arrive at the site. He said they were denied entry.

An embassy spokeswoman said: “In line with the Russian government notification, the U.S. Mission to Russia was supposed to have access to our dacha until noon on Aug. 1.

“We have not had access all day today or yesterday,” she said. “We refer you to the Russian government to explain why not.”

 

The Military Spooling of Countries Due to N. Korea

At present, there are 8 B-1B bombers at the Andersen AFB, Guam (6 from Dyess AFB). This includes in theater 192 conventional 1,200-km range JASSM-ER cruise missiles for as many aim points. In addition deployed are Tomahawk SLCMs on ships, SSNs, SSGNs.

At the UN, Nikki Haley said that China must now condemn North Korea for its repeated missile tests.

“China must decide whether it is finally willing to take this vital step,” she said.

“The time for talk is over. The danger the North Korean regime poses to international peace is now clear to all.”

Earlier on Saturday the US flew two supersonic bombers over the Korean Peninsula.

The B-1 bombers were escorted by South Korean fighter jets as they performed a low-pass over an air base near the South Korean capital of Seoul before returning to Andersen Air Force Base in Guam.

Admiral Scott Swift of the Pacific fleets says he would launch a nuclear attack if ordered to do so.

Meanwhile: U.S.-South Korea Conduct Training in Response to North Korean Missile Launch

Eighth Army Public Affairs

HUMPHREYS GARRISON, Pyeongtaek, South Korea, July 28, 2017 — U.S. Eighth Army and South Korean army personnel today conducted a second combined training event to exercise assets in view of today’s North Korea’s intercontinental ballistic missile launch, Eighth Army officials here announced today.

This exercise once again utilized the Army Tactical Missile System and South Korea’s Hyunmoo Missile II, which fired missiles into territorial waters of South Korea along the country’s eastern coast July 5.

The ATACMS can be rapidly deployed and engaged and provides deep-strike precision capability, enabling the U.S.-South Korean alliance to engage a full array of time-critical targets under all weather conditions.

We must also be watching China. Just in the last few days, they too have been spooling for military conflict. It was reported on July 25th that China displayed a Dongfeng 31 AG ICBM.
It is scheduled that one more operational test launch of an AFGSC Minuteman III IBM is slated for Aug. 2 – Aug. 4 from Vandenberg AFB.

WASHINGTON, July 30, 2017 — The Missile Defense Agency and soldiers of the 11th Air Defense Artillery Brigade from Fort Bliss, Texas, conducted a successful missile defense test today using the Terminal High Altitude Area Defense system, according to a Missile Defense Agency news release.

A medium-range target ballistic missile was air-launched by an Air Force C-17 Globemaster III over the Pacific Ocean. The THAAD weapon system, located at Pacific Spaceport Complex Alaska in Kodiak, detected, tracked and intercepted the target.

The test, designated Flight Experiment THAAD (FET)-01, was conducted to gather threat data from a THAAD interceptor in flight, the release said.

“In addition to successfully intercepting the target, the data collected will allow MDA to enhance the THAAD weapon system, our modeling and simulation capabilities, and our ability to stay ahead of the evolving threat,” said Air Force Lt. Gen. Sam Greaves, Missile Defense Agency director.

Soldiers from the 11th Air Defense Artillery Brigade conducted launcher, fire control and radar operations using the same procedures they would use in an actual combat scenario.  Soldiers operating the equipment were not aware of the actual target launch time, the release said.

15th Successful Intercept

This was the 15th successful intercept in 15 tests for the THAAD weapon system.

The THAAD element provides a globally-transportable, rapidly-deployable capability to intercept ballistic missiles inside or outside the atmosphere during their final, or terminal, phase of flight. THAAD is strictly a defensive weapon system. The system uses hit-to-kill technology where kinetic energy destroys the incoming target, according to the release.

The mission of the Missile Defense Agency is to develop and deploy a layered ballistic missile defense system to defend the United States, its deployed forces, allies and friends from ballistic missile attacks of all ranges in all phases of flight, the release said.

***

Additionally, the U.S. Delivered Two C-208B Aircraft to Philippine Air Force. They are ntelligence, surveillance and reconnaissance aircraft. The delivery of the aircraft is part of a $33 million package through the U.S. National Defense Authorization Act Building Partnership Capacity Program to provide equipment and training to improve Philippine counterterrorism response capability. The Philippines has been fighting for months a terror group known as Abu Sayyaf.

It is Qatar Again and Again

Back it 2014, this site attempted to sound the alarm on Qatar. So, it is coming out of the shadows again and causing huge diplomatic chaos domestically and throughout the Middle East.

Related reading: The al Jazeera bin Ladin Dossier

Related reading: The chairman of the channel is Hamad bin Thamer Al Thani. Barack Obama hosted him at the White House.

Additionally, Obama attended a West Point Academy graduation, where al Thani’s son was graduating, the very same weekend that the Taliban 5 were swapped for Bowe Bergdahl. Side note: the largest U.S. military base outside the country is in Qatar.

(Merci à Guizmo – Copyright photos Qna)

AEI: As the current crisis between Qatar and many moderate Arab states approaches its second month, one of the key complaints which the anti-Qatar coalition has voiced is about Al Jazeera, the Qatar-based satellite channel which was once the most watched Arabic station. Al Jazeera and its supporters argue that the station’s hard-hitting reporting is simply the manifestation of press freedom in a region sorely lacking it. Al Jazeera’s detractors, however, say it is an engine of extremism which fans the flames of terrorism and actively seeks to destabilize regional states.

Al Jazeera runs several different channels. Saudi Arabia, the United Arab Emirates, Egypt, and Bahrain object to Al Jazeera in Arabic which promotes the Muslim Brotherhood line and often seems to cross the line between news reporting and incitement. According to a State Department cable describing conversations between Qatari authorities and US diplomats, Qatar acknowledged that policy role and “leverage” which Al Jazeera represented for the Qatari state. The US military had significant experience with Al Jazeera Arabic in Iraq. It was not uncommon for an anonymous tip to direct US soldiers to an insurgent den which was empty of insurgents but rigged with explosives. When American forces would arrive on the scene, they would find Al Jazeera cameramen nearby and on neighboring rooftops, waiting to film the ambush.

Al Jazeera English is more familiar to many in Europe and the United States, but it would be wrong to assume the content between the two channels is equivalent. The English-language Al Jazeera launders the image of its Arabic sibling. Al Jazeera English, for example, dedicates far greater time to minorities, social issues, and women. Al Jazeera’s experiment with a separate American channel, meanwhile, sputtered and died.

If Al Jazeera English isn’t Qatar’s main means to influence the Western media environment beyond serving to obfuscate the truth about Al Jazeera, then, what is? Here, Middle East Eye (MEE) — an increasingly prominent web portal — often obscures its finances, but it increasingly fills the gap as Qatar’s chief agent of influence. Groups like Human Rights Watch and Amnesty International incorporate MEE stories, as do newspapers like the New York Times and the Washington Post.

Delving into the details of MEE, however, show that it acts far less as a traditional journalistic outlet and far more as an English-language front for Qatari-supported groups like the Muslim Brotherhood and Hamas. British corporate records, for example, show that Jamal Awn Jamal Bessasso, a former official for both Al Jazeera in Qatar and the Hamas-affiliated al-Quds TV in Lebanon, owns and operates MEE through M.E.E. Ltd. A CV for Jamal Bessasso, since scrubbed from the internet, shows previous stints as director of planning and human resources for the Al Jazeera satellite network in Qatar and director of Human Resources for the Samalink Television Production Company in Lebanon.  Samalink is the registered agent for Al Quds TV’s website.  While David Hearst, MEE editor-in-chief, told the United Arab Emirates’ The National paper that Bessasso was “a colleague and the head of human resources and the legal director,” he denied that Bessasso was the MEE owner, despite his listings on corporate records. Neither Hearst, former news editor Rori Donaghy (in a tweet now deleted), nor other MEE employees, however, would identify who owned MEE if not Bessasso.

There are other links between MEE and Al Jazeera. Jonathan Powell, an Al Jazeera employee in charge of special projects in the chairman’s office and close associate of former Al-Jazeera Media Network chief Wadah Khanfar, acknowledged serving as launch consultant for MEE in an earlier version of his Linkedin profile (which he altered after an Emirati newspaper highlighted his role). Arwa Ibrahim and Jacob Powell also transitioned from Al Jazeera to work as MEE news editors, and Graeme Baker and Larry Johnson moved from Al Jazeera to MEE to become senior editors. At the very least, it appears that MEE recruited heavily from Al Jazeera.

The Hamas links run as deep. A former official of Interpal, a United Kingdom-based charity designated by the US Treasury Department as a financial supporter of Hamas, registered the Middle East Eye website. Prior to joining MEE, Donaghy worked for organizations founded by Hamas (such as the House of Wisdom in Gaza) and the Muslim Brotherhood (Emirates Center for Human Rights, which was set up with financing and assistance from the Cordoba Foundation, a Muslim Brotherhood entity).

Bessasso, meanwhile, has openly supported radical groups. In 2012, he shared a Facebook post praising Hamas. The following year, he shared a quote from Muslim Brotherhood theologian Yusuf Qaradawi encouraging followers to utilize “violence against those who deserve it.” Over the years, the MEE has bolstered its content with “exclusiveaccess to Hamas, seemingly acting as the terrorist group’s preferred outlet to the English-speaking world. Hearst has penned editorials praising and defending the Muslim Brotherhood and political Islam.

Long ago, political radicals and terrorists discovered that — so long as they called themselves human rights activists — journalists, other human rights activists, and even diplomats would accept their polemics at face value. It seems that the Qatari government and its Hamas and Muslim Brotherhood networks have discovered the same principle applies to news outlets and portals. Al Jazeera may be the most prominent example, but it seems that Al Jazeera’s managers now seek to seed other networks as well, and that Qatari funds mandate an agenda.