An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.

How the Military is Defeating Hackers

Here’s how the US military is beating hackers at their own game

US Soldiers IraqStaff Sgt. Stacy L. Pearsall/USAF

TechInsiders: There’s an unseen world war that has been fought for years with no clear battle lines, few rules of engagement, and no end in sight.

But it’s not a shooting war; not a war where combatants have been killed or wounded — at least not yet.

It’s a war that pits nations against each other for dominance in cyberspace, and the United States, like other nations employing professional hackers as “cyber soldiers,” sees it as a battlefield just like any other.

“It’s like an operational domain: Sea, land, air, space, and cyber,” Charlie Stadtlander, chief spokesperson for US Army Cyber Command, told Tech Insider. “It’s a place where our presence exists. Cyber is a normal part of military operations and needs to be considered as such.”

As US military leaders warn of the growing progress of Russia, China, and North Korea in cyberspace, the Pentagon has ramped up its own efforts in what it calls the “cyber domain” after the release of a new cyber strategy in April 2015.

“This ephemeral space that’s all around us, literally, is a space where operations can be performed against us,” Frank Pound, a program manager who leads DARPA’s “Plan X” cyber warfare platform, told Tech Insider. “And how do we defend against that? How do we detect that?”

Building a cyber army

In its cyber strategy, the military proposed 133 teams for its “cyber mission force” by 2018, 27 of which were directed to support combat missions by “generating integrated cyberspace effects in support of … operations.” (Effects is a common military term used for artillery and aircraft targeting, and soldiers proclaim “good effect on target” to communicate a direct hit).

The cyber mission force will comprise some 4,300 personnel. But only about 1,600 of those would be on a “combat mission team” that would likely be considered to be taking an offensive hacking role. They are up against China’s own “specialized military network warfare forces,” North Korea’s secretive Bureau 121 hacker unit, other nation-states, hacktivists like Anonymous, and criminal enterprises alike.

They have been further tasked with breaking into the networks of adversaries like ISIS, disrupting communications channels, stopping improvised explosive devices from being triggered through cellphones, or even, as one Marine general put it, just “trying to get inside the enemy’s [head].”

Online hacks can lead to offline outcomes, and the military has become keenly aware of that power. In 2009, the US and Israel reportedly infected Iranian computers with the Stuxnet malware that destroyed roughly one-fifth of the country’s nuclear centrifuges. And as recently as February, hackers were used against ISIS as others fought on the ground, quite possibly for the first time ever.

“These are strikes that are conducted in the war zone using cyber essentially as a weapon of war,” Defense Secretary Ash Carter told NPR. “Just like we drop bombs, we’re dropping cyber bombs.”

As one Army officer said during a 2015 training exercise, the cyber war seems to just be getting started: “Future fights aren’t going to be guns and bullets. They’re going to be ones and zeroes.”

soldiers cyber commandBrian Rodan/US ArmySoldiers work together during a training exercise in 2011.

‘Prepping the battlefield’

That the Pentagon would employ specialists to defend itself in cyberspace is not surprising, since government and military systems are attacked regularly by nations trying to read soldier’s email, or others who want to uncover personal details on millions who undergo background checks for security clearances.

But the defense of networks — while still an important function — has been supplanted in some cases by an offensive strategy. That is, soldiers hacking into computers overseas for intelligence or to disrupt the enemy on the battlefield — a kind of digital tit-for-tat.

“If there’s something that you can do to prep the battlefield before a kinetic attack or to disrupt defenses during kinetic attacks, why wouldn’t a combatant commander turn to that?” Stadtlander said.

Stadtlander couldn’t talk about ongoing operations that Army Cyber Command is involved in, mainly due to the unique nature of cyber warfare. An enemy who knows the US is developing a next-generation fighter jet might develop something in response that could take years, but with a cyberattack, a fix can be developed sometimes within days.

“The unique thing about cyber activity and defense is you’re talking about building a couple thousand lines of code or having a certain electronic device, or some sort of cyber capability. And just based on the nature of this space, a lot of times it can only be used once,” he said. “Once it’s known … it’s no longer a viable tool.”

Still, some insight into what the US military is capable of can be found within its own training manuals, presentations, and the few news stories by the military’s own writers. And it’s likely that hackers with Army Cyber Command, subordinate to US Cyber Command and NSA, benefit from top secret initiatives to infect “millions” of computers with malware in an effort aimed at “owning the net.”

“Denying the ability to coordinate, communicate, and assess,” Stadtlander said. “That’s an advantage that we might be able to leverage.”

Inside the Army’s cyber warfare ‘Bible’

Perhaps one of the most important publications on cyber warfare was released with little fanfare in Feb. 2014. Known as Army Field Manual 3-38 Cyber Electromagnetic Activities, it proclaimed itself as the “first doctrinal field manual of its kind,” unifying a number of other publications on network operations, electronic warfare, and intelligence into one 96-page document.

In FM 3-38, the Army defined offensive cyberspace operations as actions “intended to project power by the application of force in or through cyberspace,” while noting they are to be carried out in support of command objectives and within legal frameworks.

But what can soldiers do in cyberspace that can affect what happens on the battlefield? Quite a bit, according to the manual.

us army cyber soldierUS Army

“A cyberspace attack may be employed in conjunction with” other methods of attack “to deceive, degrade, destroy, and disrupt a specific enemy integrated air defense system or enemy safe haven,” it says.

As an example, the manual offers an early warning radar site as a target which, if soldiers can get inside the network, could possibly be destroyed or degraded.

That’s just what students trained for during an exercise in March, according to the Fort Gordon Globe. Acting just as they would on the battlefield, cyber soldiers patrolled to their objective — a simulated enemy air defense control system — then searched for their target’s wireless network so it could be exploited or neutralized.

There’s little need for stealth coating on aircraft when a guy behind a computer can disable the radar site for you. The manual also offers other systems Army hackers may consider breaking into, such as enemy telephone networks, servers, and smartphones.

“Even if you think about the way that IEDs are triggered,” Stadtlander said, using the acronym for improvised explosive devices. “Or an adversary’s [intelligence, surveillance, and reconnaissance], a lot of these are done through electronics and with internet connections.”

Getting into the Army’s ‘hacker university’

Located just southwest of Augusta, Georgia is Fort Gordon, an Army installation that brings together most of the service’s cyber warriors under one roof. In 2013, the Army chose the site as the home base of its Cyber Command after the unit was established in 2010.

Also home to a 604,000 square foot operations center for the National Security Agency, Gordon is where cyber warriors are taught their craft at what the Army calls its Cyber Center of Excellence. But before they get to the military’s “hacker university,” enlisted soldiers need to score high technical scores on the military entrance exam, and sign on for five years of service, instead of the normal four-year tour.

army cyber commandUS ArmyInsider Fort Gordon’s Cyber Operations Center.

Due to the classified nature of their work, cyber training is often conducted in secure compartmented information facilities (SCIFs) where cell phones and other outside recording devices are not allowed, and all soldiers will have to obtain a Top Secret clearance prior to being assigned to their unit.

Soldiers go through a lengthy period of training after basic training: Six months spent at the Navy’s Center for Information Dominance in Pensacola, Florida followed by six months at Fort Gordon.

Army officers go through their own training program at the Georgia base, called Cyber Basic Officer Leader Course. The course takes nearly nine months to complete and is the longest officer training program in the Army.

Enlisted soldiers train with members of all military branches over six months at the Navy’s Cyber Analysis Course, according to Bloomberg. Since students can come from a variety of skill sets and backgrounds, the first two-thirds of classroom time focuses on basic programming, mathematics, and how networks and operating systems function. But later on they learn the steps to research and infiltrate targets, defend networks, and even hack a simulated network with Metasploit, a common tool hackers have used since its release in 2004.

Meanwhile, officers receive similar training, though their position merits other coursework in leading operations as opposed to carrying them out. Though a cyber officer can likely step in and be more than capable, given the certifications they obtain, to include Cisco’s Certified Network Associate (CCNA) and the independent Certified Information Systems Security Professional (CISSP) credential.

“They are really valuably trained after that [schooling],” Stadtlander said.

So valuable in fact that the Army is seeing a challenge in retaining its talent from heavyweights in Silicon Valley.

Is hacking considered an ‘act of war’?

Chinese Army Hackersvia Flickr

“There is no international standing or framework that is binding over any one nation-state in terms of offensive cyber operations,” Bradley P. Moss, a national security lawyer, told Tech Insider. “It’s whatever rules we put in place for ourselves.”

In essence, the US, China, Russia, and others are operating in a sort-of “digital Wild West” with few overarching guidelines outside of the Law of War that predates our interconnected world.

Cyber warfare continues unabated because there is no governing body such as the United Nations telling nations not to hack one another. Not that that would necessarily make a difference, as a 2014 UN report criticized mass surveillance programs employed by NSA and others as violating privacy rights “guaranteed by multiple treaties and conventions,” The Intercept reported.

Still, Moss explained that nations are less concerned with the legalities of hacking each other, and instead, worry about the potential diplomatic and political fallout should they be exposed.

“More or less, we all engage in some manner of warfare these days, we just don’t go to ‘war’ over it,” Moss said.

How foreign nations would likely respond to being hacked by the US is something that is considered before any offensive operation, according to a top secret presidential policy directive leaked by ex-NSA contractor Edward Snowden.

The document, made public in 2013, listed cyber attacks resulting in “loss of life, significant responsive actions against the United States, significant damage to property, serious adverse US foreign policy consequences, or serious economic impact” as requiring presidential approval.

And for US military hackers who may be on a battlefield in Iraq, Syria, or elsewhere, their self-imposed rules for cyber attacks are clear:

“Military attacks will be directed only at military targets,” reads the Pentagon’s cyberspace operations document.

us army cyber commandUS Army

But what of cyber attacks that have potentially devastating effects on foreign nations, such as US-made worms that cause nuclear centrifuges to fall apart, or alleged Russian-made malware that knocks out power and heat to people in the dead of winter?

Are these “acts of war”?

“From a strictly legal matter, you could designate the US Army hacking the Russian Army’s [computer] system as an act of war,” Moss said. “Just as much as if we were to have infiltrated and damaged a Russian bomber, that would be an act of war.”

But, he added: “There’s nothing that necessarily stops us, except the political and diplomatic ramifications.”

With Money Infusion, Iran Funds PIJ

Iran resumes funding for Palestinian Islamic Jihad 

BTN: Iran recently decided to resume regular financial assistance to the Palestinian terrorist organization known as Islamic Jihad, Arabic-language newspaper Asharq al-Aswat reported on Wednesday.

The decision to transfer an annual sum of $70 million out of the Revolutionary Guards budget reportedly followed a visit by an Islamic Jihad delegation in Tehran last month – the first such visit in two years.

The talks resulted in an agreement to renew operations by Islamic Jihad’s military wing, the Quds Brigades. Qassem Soleimani, commander of the Revolutionary Guards’ elite Quds Force, reportedly decided to appoint Khaled Mansour, considered loyal to Iran, as commander of the Quds Brigades in the Gaza Strip.

Iran’s funding resumed in March, Asharq al-Aswat reported, and Islamic Jihad has thus been able to pay two months’ worth of salaries to members after months of financial straits.

Reports in January said that Iran had ended its funding of Islamic Jihad, according to Israeli news site Walla News.

Despite being a Sunni organization, Islamic Jihad has remained on the side of the Iranian-led Shi’ite axis in the regional power struggle with Saudi-backed elements, and members have fought alongside Syrian President Bashar al-Assad’s regime in that country’s civil war.

Islamic Jihad Secretary General Ramadan Shalah said recently in a public statement that no Arab countries has supposed “the popular uprising in Palestine”, and that only Iran “helps the martyrs’ families.”

****

The entire Obama administration confirms this:

WASHINGTON/JP — Despite facing costly obstacles from the Syrian civil war, Iran continued its arming and funding of terror proxies targeting Israel throughout 2014 largely unabated, the US government found in a report released on Friday.

The State Department report— an annual accounting of organized terrorism worldwide— asserts that Iran has continued, if not expanded, its operations beyond its historical focus on Hamas in Gaza and Hezbollah in Lebanon, to a limited number of operations in Africa, Asia and Latin America, as well as to “various groups throughout the Middle East.”

“Iran has historically provided weapons, training, and funding to Hamas and other Palestinian terrorist groups, including Palestine Islamic Jihad (PIJ) and the Popular Front for the Liberation of Palestine-General Command (PFLP-GC),” the report reads. “These Palestinian terrorist groups have been behind a number of deaths from attacks originating in Gaza and the West Bank.”

 

Much of Iran’s efforts throughout 2014 focused on maintaining its “resistance front” in Syria and Iraq, the report says, through its support for Shia governments and militias. The report notes of Islamic Revolutionary Guard Corps-Qods Force (IRGC) presence on the ground in both countries.

The report notes of an Israeli naval raid that took place in March of that year on a cargo ship traversing the Red Sea, the Klos C, off the coast of Sudan, which was found bearing 40 M-302 rockets, 180 mortars, and approximately 400,000 rounds of ammunition hidden within crates of cement labeled “Made in Iran.”

“Although Hamas’s ties to Tehran have been strained due to the Syrian civil war, in a November 25 speech, Supreme Leader Khamenei highlighted Iran’s military support to ‘Palestinian brothers’ in Gaza and called for the West Bank to be similarly armed,” the report continues. “In December, Hamas Deputy Leader Moussa Abu Marzouk announced bilateral relations with Iran and Hamas were ‘back on track.'”

In the North, Iran continues providing Hezbollah— active in the fight in Syria as well as against the Jewish state from Lebanon— with “hundreds of millions of dollars. And the report claims Tehran is training “thousands of its fighters at camps in Iran.”

“General Amir Ali Hajizadeh, head of the IRGC Aerospace Force, stated in November that ‘the IRGC and Hezbollah are a single apparatus jointed together,’ and Lebanese Hizballah Deputy Secretary General Naim Qassem boasted that Iran had provided his organization with missiles that had ‘pinpoint accuracy’ in separate November public remarks,” it states.

The State Department asserts that, in admitting its arming of Hezbollah, Iran is in open violation of UN Security Council Resolutions 1701 and 1747.

The report praises Israel’s response to terror threats throughout the year, which saw war with Hamas in Gaza over fifty days that summer.

“Israel was hit by a record volume of rocket and mortar fire from Gaza and the Sinai in 2014, according to the Israeli government, with more than 4,660 projectiles launched, most during the July-August conflict, at Israeli territory compared to 74 launchings in 2013 and 2,557 in 2012,” it says, referring to Israel as a “committed counterterrorism partner.”

“Militants from Gaza also infiltrated Israeli territory using tunnels in six separate attacks and, for the first time, by a sea-borne operation,” it continued. The report also praises Egypt for taking aggressive counterterrorism measures against Hamas and its tunnel operations in the Sinai.

It notes, briefly, that Iranian proliferation of nuclear weapons remains a concern.

 

 

That Iran Propaganda Strategy Thing Began in 2011

Amazing what details can be uncovered and how dates and people all seem to tell a much different story when facts are compiled.

A deeper look is required into Ploughshares and the deep relationship with the White House, as the world has been punked by some well placed organizations and some money…imagine that.

Related: White House Makes the Case for Iran Diplomacy (lots of details here)

Related: Ploughshares at the White House in 2011

Related: Where did Ploughshares get the Money? (Whoa on this one)

Related: Commitments, Verification and Next Steps (Ploughshares going to do the work?)

The Secret History of the Iran-Deal ‘Echo Chamber’

By

Bloomberg: A network of advocates, experts and messaging specialists the White House says helped it sell the Iran nuclear deal in 2015 actually began to campaign for such an accord four years earlier, before the real negotiations started.

Last week I was leaked e-mails and documents from an internal listserv operated by the arms control nonprofit Ploughshares Fund. That foundation has come under scrutiny after the New York Times Magazine quoted top White House foreign policy aide Ben Rhodes boasting how the foundation amplified the White House message in 2015 on the Iran deal. Rhodes told the magazine that supporters of the deal comprised an “echo chamber,” suggesting the independent experts were tools of a White House media campaign.

But the messaging work from Ploughshares on Iran began long before there was any Iran deal and long before Rhodes convened his regular meetings with progressive groups on shaping the Iran narrative.

Beginning in August 2011, Ploughshares and its grantees formed the Iran Strategy Group. Over time this group created a sophisticated campaign to reshape the national narrative on Iran. That campaign sought to portray skeptics of diplomacy as “pro-war,” and to play down the dangers of the Iranian nuclear program before formal negotiations started in 2013 only to emphasize those dangers after there was an agreement in 2015.

The strategy group, which included representatives of the Arms Control Association, the National Security Network, the National Iranian American Council, the Federation of American Scientists, the Atlantic Council and others, sought to “develop process and mechanism to implement Iran campaign strategies, tactics and narrative,” according to an agenda for the first meeting of the group on Aug. 17, 2011.

As a nonprofit, Ploughshares discloses annually the organizations that receive its grants. But until now, the way this network of nonprofits, advocacy organizations and policy experts coordinated its media campaign has been shrouded from the public.

The members of that network had two things in common. They all received substantial grants from Ploughshares and they all sought to prevent a war with Iran. But at the time, the progressives assessed the situation was bleak. An August 2, 2011 memo from Heather Hurlburt, then executive director of the National Security Network, and Peter Ferenbach, a co-founder of ReThink Media, shared with the group an assessment of the “media environment” on Iran and concluded it was “extremely difficult.”

The problem, according to Hurlburt and Ferenbach, was that in 2011 a succession of news stories on Iran, ranging from reports of progress on the country’s nuclear program to the Treasury Department’s designations that accused Iran of colluding with al Qaeda, had put progressives on defense. “We are left in the position of responding to the news headlines and parrying the negative commentary that follows,” they wrote.

Among the authors’ recommendations was that the Iran Strategy Group attack conservatives who advocated military strikes. “On a messaging note, it would be best to describe them as ‘pro-war,’ and leave it to them to back off that characterization of their position,” they wrote.

This approach became a centerpiece of the White House’s own message four years later when Obama was selling his deal to Congress. In a speech at American University that summer he said, “The choice we face is ultimately between diplomacy or some form of war.”

And yet while the Iran Strategy Group’s message about critics of the deal was echoed by the White House, the group’s initial messaging on Iran itself was much different between 2011 and 2013 than what Ploughshares and its grantees ending up saying in 2015. When the White House and its surrogates were campaigning for the deal in 2015, they emphasized how close Iran was to producing the fissile material needed for a nuclear weapon. Joe Cirincione, the president of Ploughshares, made this point in a piece for Slate after the deal was announced when he wrote, “without the deal, Iran could use its centrifuges to purify enough uranium for one or more bombs within weeks.”

 

This is not an accident. As I reported last year the White House declassified its estimate that Iran was three months away from producing enough fuel for a weapon in April 2015, after a framework for the Iran deal was agreed in Vienna, even though the intelligence community had assessed for more than two years that Iran was three months away from weapons-grade fuel.

Back in 2011, the Iran Strategy Group drafted a set of talking points called “Key Points on Iran and Nuclear Weapons.” Joel Rubin, the director of policy and government affairs for Ploughshares between 2011 and 2014, wrote in an e-mail to the strategy group, “We believe that this paper will help each of you to clearly enunciate, with confidence, a consensus view on how to argue for a sound U.S. policy towards Iran.”

The talking points — drafted by Paul Pillar, the intelligence analyst who was the lead author on the 2002 National Intelligence Estimate shared with Congress before the Iraq war — stressed that diplomacy was the best way to decrease the likelihood Iran went nuclear and that bombing Iran’s facilities would be counterproductive. But the talking points also included “An Iranian nuclear program is not imminent”; “An Iranian nuclear weapon is not inevitable”; and most controversial “If Iran develops a nuclear weapon, the United States and the West could live with it, without important compromise to U.S. interests.” Obama himself has contradicted that last line for years, arguing that he would be prepared to use military force to destroy Iran’s nuclear program if diplomacy did not work.

The Iran Strategy Group sought to play down Iran’s nuclear program as late as 2013. E-mails between strategy group members in August of that year in anticipation of the International Atomic Energy Agency’s report on Iran’s nuclear program that was released at the end of that month show that the network was already in campaign mode.  In an Aug. 20, 2013, e-mail to the Iran Strategy Group, Cirincione encouraged the Ploughshares grantees to “create a social media, web, expert push that carries our main points into the media and policy discussions in the first 12-24 hours.” He recommended that the points the group pushed in the media should include the argument that making enough highly enriched uranium for a single bomb “is just one step in a long weaponization process,” and that while Iran’s decision to start the Arak plutonium reactor was not good, it was “also just one step in a long alternative path to nuclear material for a weapon.”

The timing here is important. In September 2013, Iran and six other great powers including the U.S. announced the beginning of nuclear talks that ultimately produced the agreement in 2015.

Rubin, who is now president of the Washington Strategy Group, told me that the difference in talking points for the Ploughshares network between 2011 and 2013 and then in 2015 reflected the state of diplomacy with Iran and the real concern for progressives that Israel or the U.S. would bomb Iran’s nuclear facilities. “The difference between 2011 and 2015 was that there was a different reality of what was taking place on the ground in terms of the negotiations and the process,” he said. “Ahmadinejad was the president in Iran, there was no negotiation process, and much of the chattering class was talking about when will Israel or the U.S. drop the bomb on Iran in 2011.”

When asked for comment on the story, Ploughshares communications director Jennifer Abrahamson said, “As a nonpartisan public foundation dedicated to reducing nuclear threats, Ploughshares Fund is proud to have supported a network of longstanding experts that helped stop Iran from building a bomb without starting another war in the Middle East.”

That pride is apparent. After a critical story from the AP last week on Ploughshares grants to National Public Radio, Cirincione went on the attack. In a column for Huffington Post suggesting the AP story was part of a campaign from opponents of the Iran deal to discredit him and his organization, he wrote, “Neoconservatives are furious that their efforts to trick the country into another unnecessary war in the Middle East failed.”

Don’t be surprised if you hear Ploughshares grantees repeating that. It sounds like a talking point.

Khamenei: U.S. Cant Touch the Missiles

Khamenei: US ‘can’t do a damn thing’ about our missile programSupreme leader:

West ‘extremely sad’ about failure to curb Iran’s military development; Guards chief: US forced to back down in region

Iranian supreme leader Ali Khamenei on Monday said the United States cannot “do a damn thing” about the Islamic Republic’s ballistic missile program.

“They have engaged in a lot of hue and cry over Iran’s missile capabilities, but they should know that this ballyhoo does not have any influence and they cannot do a damn thing,” Khamenei said, according to the semi-official Fars News Agency.

A missile launched from the Alborz mountains in Iran on March 9, 2016, reportedly inscribed in Hebrew, 'Israel must be wiped out.' (Fars News)

A missile launched from the Alborz mountains in Iran on March 9, 2016, reportedly inscribed in Hebrew, ‘Israel must be wiped out.’ (Fars News)

Iran in March tested ballistic missiles, including two with the words “Israel must be wiped off the earth” emblazoned on them, according to the US and other Western powers. Under a nuclear deal signed last year between world powers and Iran, ballistic missile tests are not forbidden outright but are “not consistent” with a United Nations Security Council resolution from July 2015, US officials say.

According to the UN decision, “Iran is called upon not to undertake any activity related to ballistic missiles designed to be capable of delivering nuclear weapons, including launches using such ballistic missile technology,” until October 2023.

“The US and other powers are extremely sad at this issue and they have no other option; that is why they made huge efforts in order to bring the country’s decision-making and decision-taking centers under their control, but they failed and God willing, they will continue to fail,” Khamanei said on Monday.

The supreme leader, who has final say on state matters, lambasted the “arrogant” Western powers, arguing that efforts to shut down its nuclear program and missile tests were a pretext to meddle in Iran’s affairs.

“The nuclear issue and missiles are excuses and of course excuses are useless and they can do no damn thing,” Khamenei said. “The point is Iran doesn’t follow arrogant powers.”

“In this war, willpowers are fighting. The stronger willpower will win,” Khamenei added.

Also Monday, Iranian Revolutionary Guards general Qassem Soleimani maintained that without the Islamic Republic, the Islamic State would now control all of Syria. The United States has been forced to back down in the region, he said, according to Iranian reports.

Last week, a senior Iranian military commander boasted that the Islamic Republic could “raze the Zionist regime in less than eight minutes.” Ahmad Karimpour, a senior adviser to the Iranian Revolutionary Guards’ elite unit al-Quds Force, said if Khamenei gave the order to destroy Israel, the Iranian military had the capacity to do so quickly.

“If the Supreme Leader’s orders [are] to be executed, with the abilities and the equipment at our disposal, we will raze the Zionist regime in less than eight minutes,” Karimpour said Thursday, according to the semi-official Fars News Agency.
A senior Iranian general on May 9 announced that the country’s armed forces successfully tested a precision-guided, medium-range ballistic missile two weeks earlier that could reach Israel, the state-run Tasnim agency reported.

Iranian Supreme Leader Ali Khamenei meets the Iranian Revolutionary Guards Corps (IRGC) Navy unit that detained US sailors earlier in January, in a photo released by Iran on January 24, 2016.

“We test-fired a missile with a range of 2,000 kilometers and a margin of error of eight meters,” Brigadier General Ali Abdollahi was quoted as saying at a Tehran science conference. The eight-meter margin means the “missile enjoys zero error,” he told conference participants.

****

Iran’s Missile Program/Iran Primer

  • Iran has the largest and most diverse ballistic missile arsenal in the Middle East. (Israel has more capable ballistic missiles, but fewer in number and type.) Most were acquired from foreign sources, notably North Korea. The Islamic Republic is the only country to develop a 2,000-km missile without first having a nuclear weapons capability.
  • Iran is still dependent on foreign suppliers for key ingredients, components and equipment, but it should eventually be able to develop long-range missiles over time, including an Intercontinental Ballistic Missile or ICBM.
  • The military utility of Iran’s current ballistic missiles is limited because of poor accuracy, so missiles are not likely to be decisive if armed with conventional, chemical or biological warheads. But Tehran could use its missiles as a political or psychological weapon to terrorize an adversary’s cities and pressure its government.
  • Iran should not be able to strike Western Europe before 2017 or the United States before 2020—at the earliest.
  • Iran’s space program, which includes the successful launch of a small, crude satellite into low earth orbit using the Safir carrier rocket, proves the country’s growing ambitions and technical prowess.
Overview
Iran’s pursuit of ballistic missiles pre-dates the Islamic revolution. Ironically, the shah teamed with Israel to develop a short-range system after Washington denied his request for Lance missiles. Known as Project Flower, Iran provided the funds and Israel the technology. The monarchy also pursued nuclear technologies, suggesting an interest in a delivery system for nuclear weapons. Both programs collapsed after the revolution.
Under the shah, Iran had the largest air force in the Gulf, including more than 400 combat aircraft. But Iran’s deep-strike capability degraded rapidly after the break in ties with the West limited access to spare parts, maintenance, pilot training and advanced armaments. So Tehran turned to missiles to deal with an immediate war-time need after Iraq’s 1980 invasion. Iran acquired Soviet-made Scud-Bs, first from Libya, then from Syria and North Korea. It used these 300-km missiles against Iraq from 1985 until the war ended in 1988.
Since the war, Tehran has steadily expanded its missile arsenal. It has also invested heavily in its own industries and infrastructure to lessen dependence on unreliable foreign sources. It is now able to produce its own missiles, although some key components still need to be imported. Iran has demonstrated that it can also significantly expand the range of acquired missiles, as it has done with Nodong missiles from North Korea, which it then renamed. Iran’s missiles can already hit any part of the Middle East, including Israel. Over time, Tehran has established the capacity to create missiles to address a full range of strategic objectives.
 
Iran’s expanding arsenal
The Islamic Republic’s arsenal now includes several types of short-range and medium-range missiles. Estimates vary on specifics, and Iran has exaggerated its capabilities in the past. But there is widespread consensus that Tehran has acquired and creatively adapted foreign technology to continuously increase the quality and quantity of its arsenal. It has also launched an ambitious space program that works on some of the same technology. The arsenal includes:
Shahab missiles: Since the late 1980s, Iran has purchased additional short- and medium-range missiles from foreign suppliers and adapted them to its strategic needs. The Shahabs, Persian for “meteors,” were long the core of Iran’s program. They use liquid fuel, which involves a time-consuming launch. They include:
The Shahab-1 is based on the Scud-B. (The Scud series was originally developed by the Soviet Union). It has a range of about 300 kms or 185 miles.
The Shahab-2 is based on the Scud-C. It has a range of about 500 kms, or 310 miles. In mid-2010, Iran is widely estimated to have between 200 and 300 Shahab-1 and Shahab-2 missiles capable of reaching targets in neighboring countries.
The Shahab-3 is based on the Nodong, which is a North Korean missile. It has a range of about 900 km or 560 miles. It has a nominal payload of 1,000 kg. A modified version of the Shahab-3, renamed the Ghadr-1, began flight tests in 2004. It theoretically extends Iran’s reach to about 1,600 km or 1,000 miles, which qualifies as a medium-range missile. But it carries a smaller, 750-kg warhead.
Although the Ghadr-1 was built with key North Korean components, Defense Minister Ali Shamkhani boasted at the time, “Today, by relying on our defense industry capabilities, we have been able to increase our deterrent capacity against the military expansion of our enemies.”
Sajjil missiles: Sajjil means “baked clay” in Persian. These are a class of medium-range missiles that use solid fuel, which offer many strategic advantages. They are less vulnerable to preemption because the launch requires shorter preparation – minutes rather than hours. Iran is the only country to have developed missiles of this range without first having developed nuclear weapons.
This family of missiles centers on the Sajjil-2, a domestically produced surface-to-surface missile. It has a medium-range of about 2,000 km or 1,200 miles when carrying a 750-kg warhead. It was test fired in 2008 under the name, Sajjil. The Sajjil-2, which is probably a slightly modified version, began test flights in 2009. This missile would allow Iran to “target any place that threatens Iran,” according to Brig. Gen. Abdollah Araghi, a Revolutionary Guard commander.
The Sajjil-2, appears to have encountered technical issues and its full development has slowed. No flight tests have been conducted since 2011. If Sajjil-2 flight testing resumes, the missile’s performance and reliability could be proven within a year or two. The missile, which is unlikely to become operational before 2017, is the most likely nuclear delivery vehicle—if Iran decides to develop an atomic bomb. But it would need to build a bomb small enough to fit on the top of this missile, which would be a major challenge.
The Sajjil program’s success indicates that Iran’s long-term missile acquisition plans are likely to focus on solid-fuel systems. They are more compact and easier to deploy on mobile launchers. They require less time to prepare for launch, making them less vulnerable to preemption by aircraft or other missile defense systems.
Iran could attempt to use Sajjil technologies to produce a three-stage missile capable of flying 3,700 km or 2,200 miles. But it is unlikely to be developed and actually fielded before 2017.
Space program: Iran’s ambitious space program provides engineers with critical experience developing powerful booster rockets and other skills that could be used in developing longer-range missiles, including ICBMs.
The Safir, which means “messenger” or “ambassador” in Persian, is the name of the carrier rocket that launched Iran’s first satellite into space in 2009. It demonstrated a new sophistication in multistage separation and propulsion systems.
 
The Simorgh, which is the Persian name of a benevolent, mythical flying creature, is another carrier rocket to launch satellites. A mock-up was unveiled in 2010. It has a cluster of four engines and indicates that Iran’s space program is making progress in its long-term goals.
Development of larger, more powerful launchers could also provide Iran with an ability to place communication and reconnaissance satellites into orbit, independent of foreign powers.
Factoids
  • Iran has invested at least $1 billion in its missile programs since 2000, according to “Iran’s Ballistic Missile Capabilities: A Net Assessment.”
  • Iran’s space program aspires to place an astronaut into earth’s orbit. Development of the Simorgh launcher is a key step towards this objective.
  • Iran’s universities and other technical centers are conducting basic and applied research in support of the missile and space launcher development programs.
Limitations
Iran’s ballistic missiles have poor accuracy. The successful destruction of a single fixed military target, for example, would probably require Iran to use a significant percentage of its missile inventory. Against large military targets, such as an airfield or seaport, Iran could conduct harassment attacks aimed at disrupting operations or damaging fuel-storage depots. But the missiles would probably be unable to shut down critical military activities. The number of transporter-erector-launchers (TELs) available and the delays to reload them would also limit the impact of even a massive attack.
Without a nuclear warhead, Iran’s ballistic missiles are likely to be more effective as a political tool to intimidate or terrorize an adversary’s urban areas, increasing pressure for resolution or concessions. Such attacks might trigger fear, but the casualties would probably be low – probably less than a few hundred, even if Iran unleashed its entire ballistic missile arsenal and a majority succeeded in penetrating missile defenses.
Iran is also likely to face difficulties if it decides to develop a “second-generation” intermediate-range missile of 4,000 km to 5,000 km, or 2,500 miles to 3,100 miles, using solid-fuel technology. Its engineers would have to design, develop and test a much larger rocket motor. There is little reason to believe that the Islamic Republic could field such a missile before 2018. Moreover, Iran would still have to rely on imported technologies, components and technical assistance, and carry out a lengthy flight-test program.
Finally, Iran’s past missile and space-launcher efforts suggest that Tehran would probably develop and field an intermediate-range missile before trying to develop an intercontinental ballistic missile capable of reaching the United States more than 9,000 km or 5,600 miles away. So an Iranian ICBM seems unlikely before 2020.
Trendlines
  • Although Iran’s ballistic missiles are too inaccurate to be militarily effective when armed with conventional warheads, the regime likely believes that the missiles can deter and possibly intimidate its regional adversaries, regardless of warhead type.
  • Iran’s advanced engineering capabilities and commitment to missile and space launcher programs are likely, over time, to lead to development of additional missile systems. Export controls will slow, but not stop progress.
  • There is no strong evidence that Iran is actively developing an intermediate-range or intercontinental ballistic missile. And a new system can’t be deployed out of the blue. If Iran decides to pursue an intermediate-range capability, the necessary flight testing will provide a three-to-five year window for developing countermeasures.

 

This VA Secretary STILL Does NOT Get it

In fact Disney does care about wait lines, apparently he has not been to the theme park. While the FBI is overworked, it is high time to open criminal investigations into the Veterans Administration and the FOIA requests need to be flying, this is shameful and disgusting.

VA Secretary: Disney Doesn’t Care About Wait Times, Why Should the VA?

Mediaite: Secretary for Veterans Affairs Robert McDonald had an interesting take on the criticism of long wait times at VA facilities, arguing Monday that Disney theme parks aren’t judged based on their wait times.

McDonald’s remarks, which were made during a breakfast event held by The Christian Science Monitor, started to gain attention after they were tweeted out by attendee Washington Examiner reporter Sarah Westwood.

“When you got to Disney, do they measure the number of hours you wait in line? Or what’s important? What’s important is, what’s your satisfaction with the experience?” McDonald said in the full quote. “And what I would like to move to, eventually, is that kind of measure.”

McDonald continued to say that the “create date” metric, which measures how long a veteran has to wait from the moment they first ask for care, is not a “valid measure” of wait time. Instead, he supports measuring wait times from how long veterans have to wait past their “preferred date” for care.

In 2014, an internal VA investigation found that at least 35 veterans in the Phoenix area died as a result of the long waiting times at the local VA hospital or after being secretly removed from the list entirely.

****

Examiner/Westwood: McDonald’s comments angered House Speaker Paul Ryan, who tweeted out Monday afternoon, “This is not make-believe, Mr. Secretary. Veterans have died waiting in those lines.”

McDonald faced questions at the breakfast about the VA’s lack of transparency surrounding how long veterans must wait to receive care at VA facilities around the country. The agency has weathered controversy over the past several years due to its struggle to provide timely care for many patients.

The VA secretary said most veterans report being satisfied with their care and argued that the average wait time for a veteran seeking VA treatment is only a matter of days.

He said he did not believe a measure called the “create date,” which gauges a veteran’s wait time by counting from the day the veteran first requests care, was a “valid measure” of a veteran’s VA experience.

The Government Accountability Office released a report in April exploring the metric used to count a veterans’ wait time, called the “preferred date.” The measure does not count from the time a veteran first calls to make an appointment.

****

Related: VA bosses in 7 states falsified vets’ wait times for care

The newly released findings of those probes show that supervisors instructed schedulers to manipulate wait times in Arkansas, California, Delaware, Illinois, New York, Texas and Vermont, giving the false impression facilities there were meeting VA performance measures for shorter wait times.

In some cases, the system encouraged manipulation even without explicit instruction from supervisors. A manager in West Palm Beach, Fla., sent out laudatory emails touting the shorter wait times the system showed. Schedulers in Harlingen, Texas, reported being berated by supervisors when they booked appointments showing longer wait times for veterans. (It was “not pretty,” one employee said.) More here.

******

Meanwhile, there is this heartwarming story:

Dying veteran’s horses visit him at hospital to say goodbye

Dying veteran's horses visit him at hospital to say goodbye

Quadrangle: We would like to thank Roberto Gonzales for his service and sacrifice.

As he lay dying in a Veterans Administration hospital he had one wish, to see his beloved horses Sugar and Ringo one last time.

Roberto Gonzales was wounded in battle on May 21, 1970. “He was in Vietnam for a few months when he was shot an injured”, explains his wife, Rosario Gonzalez.

Now, Gonzalez is paralyzed, restricted to a hospital bed and suffering from organ failure.

He recently went to the hospital for a wound on his back, which is when it was discovered he also needed treatment for liver problems and that his kidneys were starting to shut down.

“Horses are his life”, Rosario Gonzales told CNN affiliate KABB.

A paralysed and dying Vietnam War veteran has been reunited with his favourite horses in an emotional final wish.

The visit was also a testament to Roberto’s love of the animals, as both he and his wife trained and raised horses for almost 40 years together.

Two of those animals are Sugar and Ringo, a pair of horses that have become some of Gonzalez’s closest friends. “They came up to him and I think they were actually kissing him”.