Per FBI: Foreign Telecoms Likely Hacked Hillary Emails

The Justice Department officials also used the words “reckless”, “stunning,” and “unbelievable” in discussing the controversy swirling around Clinton’s use of a private, nongovernment email account.

FBN Exclusive: DOJ Officials Fear Foreign Telecoms Hacked Clinton Emails, Server

FBN: Officials close to the matter at the Department of Justice are concerned the emails Hillary Clinton sent from her personal devices while overseas on business as U.S. Secretary of State were breached by foreign telecoms in the countries she visited—a list which includes China.

“Her emails could have easily been hacked into by telecoms in these countries. They got the emails first, and then routed them back to her home server. They could have hacked into both,” one Justice Department official close to the matter says.

Another Justice Department official adds: “Those telecommunications companies over there often have government workers in there. That telecom in that foreign country could then follow the trail of emails back to her server in the U.S. and break into the server” remotely over the Internet. At various points in this process, there were multiple entry points to hack into Clinton’s server to steal information, as well as eavesdrop, the Justice Department officials say.

This is the first indication that officials at the Justice Department are concerned that foreign telecom workers may have broken into Clinton’s emails and home server. The Federal Bureau of Investigation is currently investigating the national security issues surrounding Clinton’s emails and server.

The Justice Department officials also used the words “reckless”, “stunning,” and “unbelievable” in discussing the controversy swirling around Clinton’s use of a private, nongovernment email account, as well as her use of a personal Blackberry (BBRY), an Apple (AAPL) iPad, and home server while U.S. Secretary of State. The officials did not indicate they have any knowledge of a breach at this point.

As for the effort to designate Clinton’s emails as classified or unclassified, the Justice Department officials agreed that, as one put it: “Every email she sent is classified because she herself is classified, because she is both Secretary of State and a former first lady.”

In addition, there’s a growing belief among cyber security experts at web security places like Venafi and Data Clone Labs that Clinton’s emails were unprotected in the first three months of her tenure in 2009 as the nation’s top diplomat, based on Internet scans of her server Venafi conducted at that time.

“For the first three months of Secretary Clinton’s term in office, from early January to late March, access to her home server was not encrypted or authenticated with a digital certificate,” Kevin Bocek, vice president of security strategy and threat intelligence at Venafi tells FOX Business. “That opens the risk that Clinton’s user name and password were exposed and captured, particularly in places she traveled to at this time, like China or Egypt. And that raises issues of national security,” adding “Attackers could have eavesdropped on communications, particularly in places like China, where the Internet and telecom infrastructure are built to do that.”

Digital certificates are the bedrock of Internet security. They verify the Web authenticity and legitimacy of an email server, and they let the recipient of an email know that an email is from a trusted source. Essentially, digital certificates are electronic passports attached to an email that verifies that a user sending an email is who he or she claims to be.

Because it appears Clinton’s server did not have a digital certificate in the first three months of 2009, “a direct attack on her server was likely at this time, and the odds are fairly high it was successful,” says Ira Victor, director of the digital forensic practice at Data Clone Labs.

In and around January 13, 2009, the day of Clinton’s Senate confirmation hearings, the clintonemail.com domain name was registered. An estimated 62,320 emails were sent and received on Clinton’s private email account during her tenure as U.S. Secretary of State. Later, 31,830 emails were erased from her private server because they were deemed personal.

Although Clinton previously has argued that there was no classified material on her home server in Chappaqua, N.Y., the U.S. Department of State has deemed 403 emails as classified, with three designated “top secret” (the State Dept. itself has been the subject of cyber hacking).

Clinton has maintained her home server did have “numerous safeguards,” but it’s unclear specifically what security measures were installed, and what those layers were. In September, Clinton apologized on ABC News for using a home server to manage her U.S. Department of State electronic correspondence.

Although Clinton and her team have indicated her emails were not hacked, not knowing about a breach is different from being hacked, cyber analysts tell FOX Business. Her campaign staffers did not return calls or emails for comment. “Even the NSA, the CIA, and Fortune 500 companies know they cannot make that claim that they have not been hacked. Everyone can be hacked,” says Bocek.

FOX News recently reported that an intelligence source familiar with the FBI’s probe into Clinton’s server said that the FBI is now focused on whether there were violations of the federal Espionage Act pertaining to “gross negligence” in the safeguarding of national defense information. Sets of emails released show that Clinton and top aides continuously sent information about foreign governments and sensitive conversations with world leaders, among other things, FOX News reported.

Secure communications and devices are routine in the federal government. For example, President Barack Obama received a secure Blackberry from the National Security Agency after he was elected, a former top NSA official tells FOX Business.

“I could not recall that I ever heard that a secure Blackberry was provided to Hillary Clinton.  No one else can either,” the former NSA official says, adding, “There is no way her calls were properly secured if she used her [personal] Blackberry.” Blackberry declined comment.

The former NSA official says the same issue is at play for Clinton’s iPad. “While there have been recent advances in securing iPhones and iPads, these were not available, in my opinion, when she was Secretary of State and there would have to be a record that she sought permission to use them with encryption,” the former NSA official says.

When traveling overseas, U.S. secretaries of states use secure phones that ensure end-to-end encryption, and in some cases, mutual authentication of the parties calling, the former NSA official said. Communications are conducted via secured satellite, digital networks or Internet telephony.

“I think I can say, with some confidence, that once any decent foreign intelligence service discovered she was using her personal phone and iPad, she would be targeted and it would be a high priority operation,” the former NSA official said, adding, “if the calls were unencrypted, it would be no challenge at all while she was overseas — they just have to get to the nearest cell tower.”

The first three months of her tenure as Secretary of State would have been an ideal time for hackers to break in, cyber security experts say.

Specifically, experts point to work done by cyber security experts at Venafi, which has revealed a three-month gap in security for Clinton’s home server after the Palo Alto, Calif. firm’s team had conducted routine, “non-intrusive Internet scanning” in January 2009.

Venafi’s Bocek tells FOX Business that he and his team had picked up Clinton’s domain, clintonemail.com, at that time, and found that her home server had not been issued a digital certificate. That means email traffic to and from her server was unprotected from early January to late March 2009. During that time, Clinton traveled as U.S. Secretary of State to China, Indonesia, South Korea, Japan, Egypt, Palestine, Israel, Belgium, Switzerland, and Turkey.

“It also means anyone accessing her home server, including Clinton and other people, would have unencrypted access, including from devices and via web browsers,” says Bocek. “This means that during the first three months of Secretary Clinton’s term in office, web browser, smartphone, and tablet communications would not have been encrypted.”

Digital certificates are vital to Internet security. All “online banking, shopping, and confidential government communications wouldn’t be possible without the trust established by digital certificates,” says Bocek. “Computers in airplanes, cars, smartphones, all electronic communications, indeed trade around the world depend on the security from digital certificates.”

The Office of Management and Budget has now mandated that all federal web servers must use digital certificates by the end of 2016, Bocek notes.

If cyber hackers broke into Clinton’s server, they also could have easily tricked it into handing over usernames, passwords, or other sensitive information, Bocek noted.

“The concern is that log-on credentials could have been compromised during this time, especially given travel to China and elsewhere,” Bocek says opening the door to more lapses. “As we’ve seen with so many other breaches, to long-term, under-the-radar compromise by adversaries, hacks that Clinton and her team may not be aware of.”

Bocek adds: “Essentially, the cyber hacker would have looked to Clinton’s server like it was Secretary Clinton emailing.”

Digital forensic analyst Victor agrees. “It’s highly likely her emails sent during this time via her devices and on her server were not encrypted. More significantly, her log-on credentials, her user name and passwords, were almost certainly not encrypted,” says Victor, who has testified in cyber security cases as an expert forensic witness. “So that means emails from Clinton’s aides, like Huma Abedin, or anyone who had email accounts on her server, their communications were also likely unencrypted.”

Victor adds: “It’s highly likely all of their user names and passwords were being exposed on a regular basis to potential cyber attackers, with the high risk they were stolen by, for instance, government employees who could get the passwords for everyone Clinton was communicating with.”

Victor explains how Clinton’s emails from her devices could have been hacked, and malware could have been planted on her server. “Say Clinton emailed from her device during her Beijing trip in that 2009 period. Her emails would first get routed through the local, state-controlled Chinese telecom. The Chinese telecom captures those bits of emails that are broken up into electronic packets by the device she uses,” Victor explains.

Any device Clinton emailed from, Victor says, was constantly “polling and authenticating communications” between her device and her server. But all of the back-and-forth communication goes through, say, the Chinese telecom. When the device is polling her server with non-secure communications, it’s giving attackers repeat opportunities to breach.”

He continues: “If the connection was not protected, a state actor at the China telecom transmitting her email back to her server in the U.S. could breach both the device and the server at that point.”

Martin C. Libicki, a senior management scientist and cyber expert at Rand Corp., says that security on Clinton’s devices could have been higher than feared. But he says that, while the Blackberry device does have strong encryption, once Clinton zoomed emails from her Blackberry through the foreign telecom networks during those first three months of her tenure, “it was much easier to hack both the device and the server then.”

Venafi’s team, which included analysts Hari Nair and Gavin Hill, found Clinton and/or her team did eventually purchase digital certificates for the server and the clintonemail.com domain name starting in March 2009.

Victor added: “But the question that needed to be asked then was, once the certificate was installed, did Clinton and her team warn anyone she had emailed during those first three months about the poor security during that time, did they warn them to reset their security passwords on all their devices?”

Obama: ‘No Boots in Iraq, er…Just Kidding’

One keynote: There will be a selected coalition meeting on troop operations and most stupid and weird and perhaps expected, the White House is including Russia, who was never in the coalition but worse, the White House is including Iran…..WTH…right?

September of 2014, Islamic State taunted Barack Obama about fighting them on the ground in Iraq. The recommendation for troops was recommended today and the White House is likely to accept the request.

This will not be an easy procedure as there is only a 2 page thinly crafted AUMF, Authorization for Use of Military Force. Congress has not approved this since it was dispatched for countless reasons such as the timeline, the funding and the strategy. Another AUMF is in order to advance any operation barely defined by Secretary of Defense Carter.

The chief spokesman for the self-named “Islamic State” (IS), also known as Isis, has given the clearest indication yet that his fighters would actually welcome a ground war in Iraq and Syria against US troops.

In a 42-minute audio message uploaded to the internet the group’s Syrian-born spokesman, who has taken the adopted name of Shaykh Abu Muhammad al-Adnani, mocks recent US air strikes and the moves to build an international coalition against Islamic State.

Addressing President Obama, the spokesman says: “Is this all you are capable of doing in this campaign of yours? Are America and all its allies… unable to come down to the ground?”

Statement on the U.S. Military Strategy in the Middle East and the Counter-ISIL Campaign before the Senate Armed Services Committee

10/27/2015 10:37 AM CDT

Statement on the U.S. Military Strategy in the Middle East and the Counter-ISIL Campaign before the Senate Armed Services Committee

Testimony as Delivered by Secretary of Defense Ash Carter, Washington, D.C., October 27, 2015

Thank you, Mr. Chairman, Ranking Member Reed, Members of the Committee: thanks for inviting us to come here before you to discuss our counter-ISIL campaign in Iraq and Syria, and along the way to address some of the concerns, Mr. Chairman, that you raised and to share with you, Senator Reed, some of the plans and initiatives that the Chairman [of the Joint Chiefs of Staff] and I are formulating for our campaign in both Iraq and Syria. This is the first time for me appearing before this Committee alongside Chairman Joe Dunford, who was just in the region last week, as was noted. I’m grateful to Joe for answering my and the President’s call to step down from what every Marine knows is a higher position – namely Commandant to the Marine Corps to become Chairman of the Joint Chiefs of Staff – and to this Committee for confirming Joe. Thank you. I’m glad to have you here with me today. Before I turn to the subject of today’s hearing, I want to reiterate – as I’ve said consistently since March and continue to believe – that Washington needs to come together behind a multi-year budget deal that supports our defense strategy, the troops and their families, and all elements of America’s national security and strength. I understand significant progress was made on this overnight and I am looking forward to reviewing the details, but I welcome this major positive development and applaud the members of this Committee for what you’re doing to help us get there. The Middle East presents a kaleidoscope of challenges, but there, as everywhere, our actions and strong military posture are guided by what’s in America’s interests. That’s our North Star. And amid this region’s complexity and uncertainty, those interests are to deter aggression; to bolster the security of our friends and allies, especially Israel; to ensure freedom of navigation in the Gulf; to check Iran’s malign influence even as we monitor the implementation of the Joint Comprehensive Plan of Action; and, to degrade and ultimately defeat ISIL. This last one, ISIL, poses a threat to our people and to friendly countries not only in the Middle East but around the world. Today, I will first outline the changes in the execution of our strategy that we have considered, and are now pursuing militarily, to gather battlefield momentum in the fight against ISIL. Then I will address what Russia is doing in Syria, and why we won’t let it interfere with our campaign against ISIL. When I last spoke to this committee about our counter-ISIL campaign and its nine lines of essential military and non-military effort, I made three things clear about the military aspects – first, that we will deliver ISIL a lasting defeat; second, that truly lasting success would require enabling capable, motivated local forces on the ground, recognizing that this will take time and new diplomatic energy; and, third, that our strategy’s execution can and must and will be strengthened. All of that is still true. Our determination is unchanged, even as the situation continues to evolve, and we continue to adapt to execute our campaign more effectively. And today I’d like to elaborate on the third point and explain how we’re adapting our campaign to do more – reinforcing what we know works. The changes we’re pursuing can be described by what I call the “three R’s” – Raqqa, Ramadi, and Raids. Before I explain what they mean, let me also note that I took actions to streamline command-and-control of the counter-ISIL military campaign by assigning the entire effort to a single general officer, Lieutenant General Sean MacFarland, where in the urgency of the early phase of the campaign last year several layers were added to the general officer already present in Iraq. The first “R” is Raqqa, ISIL’s stronghold and administrative capital. We have been clear for some time that we need to keep up pressure on Raqqa, and that to that end we will support moderate Syrian forces fighting ISIL that have made territorial gains near Raqqa – indeed, some of them are within 30 miles of Raqqa today. The Syrian Arab Coalition, which we plan to strengthen through our new equipping approach – more on that in a moment – will work over time with other Syrian anti-ISIL forces to push towards Raqqa. To the south, we plan to further strengthen our partner, Jordan. And from the skies above, we expect to intensify our air campaign, including with additional U.S. and coalition aircraft, to target ISIL with a higher and heavier rate of strikes. This will include more strikes against ISIL high-value targets as our intelligence improves; also its oil enterprise, which is a critical pillar of ISIL’s financial infrastructure. As I said last Friday, we’ve already begun to ramp up these deliberate strikes. Part of this pressure includes our new approach to the Syria train-and-equip program. I, like President Obama and members of this committee, was disappointed with that program’s results. We accordingly examined the program this summer, and have since changed it. I use the word change – not end – change the program. While the old approach was to train and equip completely new forces outside of Syria before sending them into the fight, the new approach is to work with vetted leaders of groups that are already fighting ISIL, and provide equipment and some training to them and support their operations with airpower. This approach builds on successes that local Syrian Arab and Syrian Kurdish forces have made along Syria’s northern border to retake and hold ground from ISIL with the help of U.S. airstrikes and equipment resupplies. If done in concert as we intend, all these actions on the ground and from the air should help shrink ISIL’s territory into a smaller and smaller area and create new opportunities for targeting ISIL – ultimately denying this evil movement any safe haven in its supposed heartland. The second “R” is Ramadi, the capital of Iraq’s Anbar province, which serves as a critical example of the Abadi government’s commitment to work with local Sunni communities with our help to retake and hold ground from ISIL and in turn to build momentum to eventually go northward to Mosul. Under Prime Minister Abadi’s leadership, the Iraqis have begun to use American-made F-16s to support counter-ISIL operations, and have empowered capable battlefield commanders to step forward. As we see more progress towards assembling capable and motivated Iraqi forces under Baghdad’s control and including Sunni elements, we are willing to continue to provide more enabling capabilities and fire support to help them succeed. However, the Iraqi government and security forces will have to take certain steps militarily to make sure our progress sticks. We need to see more in the direction of multi-sectarian governance and defense leadership. For example, we’ve given the Iraqi government two battalions’ worth of equipment for mobilizing Sunni tribal forces; as we continue to provide this support, the Iraqi government must ensure it is distributed effectively. If local Sunni forces aren’t sufficiently equipped, regularly paid, and empowered as co-equal members of the Iraqi Security Forces, ISIL’s defeats in Anbar will only be temporary. The third and final “R” is raids, signaling that we won’t hold back from supporting capable partners in opportunistic attacks against ISIL, or conducting such missions directly, whether by strikes from the air or direct action on the ground. Last week’s rescue operation was led by Iraqi Kurdish forces, with U.S. advisers in support. One of those accompanying advisors, Master Sergeant Joshua Wheeler, heroically acted to ensure the overall success of the mission and lost his life in the process. The death of any service member is a tragedy, and as I told his family and teammates this weekend, we offer our condolences to Master Sergeant Wheeler’s loved ones for their loss. While our mission in Iraq is to train, advise, and assist our Iraqi partners, in situations such as that operation – where we have actionable intelligence and a capable partner force – we want to support our partners and we will. At the same time, the raid on Abu Sayyaf’s home, and strikes against Junaid Hussain and most recently Sanafi al-Nasr, should all serve notice to ISIL and other terrorist leaders that once we locate them, no target is beyond our reach As we’ve looked at how to gather momentum and adapt to the changing battlefield, some have discussed putting a buffer zone, humanitarian zone, or no-fly zone in Syria. We have analyzed various options and the political and military requirements of each. These options are complex and raise some challenges, which I am prepared to discuss in answer to your questions. Let me now turn to Russia’s involvement in Syria. To be clear, we are not cooperating with Russia, and we’re not letting Russia impact the pace or scope of our campaign against ISIL in Iraq and Syria. While we negotiated a document on safety of flight with the Russian Ministry of Defense, we do not align ourselves more broadly with their military actions, because instead of singularly attacking ISIL, as they said they were going to do, they are primarily attacking the Syrian opposition, as the Chairman has noted, which further fuels the tragic civil war there. Their actions suggest a doubling-down on their longstanding relationship with Assad – sending advisers, artillery, and aviation to enable and support the Assad regime and Iranian forces in attacking moderates who oppose the regime and are essential to Syria’s political transition. And it appears the vast majority of their strikes – by some estimates as high as 85 to 90 percent – use dumb bombs, which obviously increases the possibility of civilian casualties. So, as Russia acts in a coalition of two with Iran at its side, the United States will continue to strengthen our 65-nation global coalition. Even as we’ve reached an understanding with the Russians on safety protocols for coalition pilots over Syria, we will keep prosecuting our counter-ISIL campaign unabated. We will keep supporting the moderate Syrian opposition, along with our other commitments to friends and allies in the region. And, consistent with our strong and balanced approach towards Russian aggression elsewhere in the world, including NATO and Ukraine, we will keep the door open for Russia to contribute to efforts toward a political solution, in which – which in the final answer – analysis – is the only answer to the Syrian conflict. I have discussed the military strategy and accompanying campaign, but before I conclude, I remind the Committee that defeating ISIL and protecting America requires coordinated efforts across all of the so-called nine lines of effort – to include supporting effective governance in Iraq, enhancing intelligence collection, disrupting ISIL’s financing, countering ISIL’s messaging, stopping the flow of foreign fighters, providing humanitarian support, and protecting our homeland – where other departments and agencies of our government have the lead. Thank you.

U.S. Spy vs. Israeli Spy on Iran

Some back story events leading up to the broken relationship between the Obama White House and Israel.

Spy vs. Spy, the Fraying U.S Israel Ties

WSJ: The U.S. closely monitored Israel’s military bases and eavesdropped on secret communications in 2012, fearing its longtime ally might try to carry out a strike on Fordow, Iran’s most heavily fortified nuclear facility.

Nerves frayed at the White House after senior officials learned Israeli aircraft had flown in and out of Iran in what some believed was a dry run for a commando raid on the site. Worried that Israel might ignite a regional war, the White House sent a second aircraft carrier to the region and readied attack aircraft, a senior U.S. official said, “in case all hell broke loose.”

The two countries, nursing a mutual distrust, each had something to hide. U.S. officials hoped to restrain Israel long enough to advance negotiations on a nuclear deal with Iran that the U.S. had launched in secret. U.S. officials saw Israel’s strike preparations as an attempt to usurp American foreign policy.

Instead of talking to each other, the allies kept their intentions secret. To figure out what they weren’t being told, they turned to their spy agencies to fill gaps. They employed deception, not only against Iran, but against each other. After working in concert for nearly a decade to keep Iran from an atomic bomb, the U.S. and Israel split over the best means: diplomacy, covert action or military strikes.

Personal strains between President Barack Obama and Israeli Prime Minister Benjamin Netanyahu erupted at their first Oval Office meeting in 2009, and an accumulation of grievances in the years since plunged relations between the two countries into crisis.

This Wall Street Journal account of the souring of U.S.-Israel relations over Iran is based on interviews with nearly two dozen current and former senior U.S. and Israeli officials.

U.S. and Israeli officials say they want to rebuild trust but acknowledge it won’t be easy. Mr. Netanyahu reserves the right to continue covert action against Iran’s nuclear program, said current and former Israeli officials, which could put the spy services of the U.S. and Israel on a collision course.

A shaky start

Messrs. Obama and Netanyahu shared common ground on Iran when they first met in 2007. Mr. Netanyahu, then the leader of Israel’s opposition party, the right-wing Likud, discussed with Mr. Obama, a Democratic senator, how to discourage international investment in Iran’s energy sector. Afterward, Mr. Obama introduced legislation to that end.

Suspicions grew during the 2008 presidential race after Mr. Netanyahu spoke with some congressional Republicans who described Mr. Obama as pro-Arab, Israeli officials said. The content of the conversations later found its way back to the White House, senior Obama administration officials said.

Soon after taking office in January 2009, Mr. Obama took steps to allay Israeli concerns, including instructing the Pentagon to develop military options against Iran’s Fordow facility, which was built into a mountain. The president also embraced an existing campaign of covert action against Iran, expanding cooperation between the Central Intelligence Agency and Mossad, the Israeli spy agency.

Mossad leaders compared the covert campaign to a 10-floor building: The higher the floor, they said, the more invasive the operation. CIA and Mossad worked together on operations on the lower floors. But the Americans made clear they had no interest in moving higher—Israeli proposals to bring down Iran’s financial system, for example, or even its regime.

Some covert operations were run unilaterally by Mossad, such as the assassination of Iranian nuclear scientists, according to U.S. officials.

The first Oval Office meeting between Messrs. Obama and Netanyahu, in May 2009—weeks after Mr. Netanyahu became prime minister—was difficult for both sides. After the meeting, Mr. Obama’s aides called Ron Dermer, Mr. Netanyahu’s adviser, to coordinate their statements. Mr. Dermer told them it was too late; Mr. Netanyahu was already briefing reporters. “We kind of looked at each other and said, ‘I guess we’re not coordinating our messages,’ ” said Tommy Vietor, a former administration official who was there.

In 2010, the risk of covert action became clear. A computer virus dubbed Stuxnet, deployed jointly by the U.S. and Israel to destroy Iranian centrifuges used to process uranium, had inadvertently spread across the Internet. The Israelis wanted to launch cyberattacks against a range of Iranian institutions, according to U.S. officials. But the breach made Mr. Obama more cautious, officials said, for fear of triggering Iranian retaliation, or damaging the global economy if a virus spread uncontrollably.

Israel questioned whether its covert operations were enough, said aides to Mr. Netanyahu. Stuxnet had only temporarily slowed Tehran’s progress. “Cyber and other covert operations had their inherent limitations,” a senior Israeli official said, “and we reached those limitations.”

Mr. Netanyahu pivoted toward a military strike, raising anxiety levels in the White House.

The U.S. Air Force analyzed the arms and aircraft needed to destroy Iran’s nuclear facilities and concluded Israel didn’t have the right equipment. The U.S. shared the findings, in part, to steer the Israelis from a military strike.

The Israelis weren’t persuaded and briefed the U.S. on an attack plan: Cargo planes would land in Iran with Israeli commandos on board who would “blow the doors, and go in through the porch entrance” of Fordow, a senior U.S. official said. The Israelis planned to sabotage the nuclear facility from inside.

Pentagon officials thought it was a suicide mission. They pressed the Israelis to give the U.S. advance warning. The Israelis were noncommittal.

“Whether this was all an effort to try to pressure Obama, or whether Israel was really getting close to a decision, I don’t know,” said Michéle Flournoy, who at the time was undersecretary of defense for policy.

Mr. Obama, meanwhile, was moving toward diplomacy. In December 2011, the White House secretly used then-Sen. John Kerry to sound out Omani leaders about opening a back channel to the Iranians.

At the same time, the White House pressed the Israelis to scale back their assassination campaign and turned down their requests for more aggressive covert measures, U.S. officials said.

The president spoke publicly about his willingness to use force as a last resort to prevent Iran from getting a nuclear weapon—“I don’t bluff,” Mr. Obama said in March 2012—but some of Mr. Netanyahu’s advisers weren’t convinced.

In early 2012, U.S. spy agencies told the White House about a flurry of meetings that Mr. Netanyahu convened with top security advisers. The meetings covered everything from mission logistics to the political implications of a military strike, Israeli officials said.

Warning signs

U.S. spy agencies stepped up satellite surveillance of Israeli aircraft movements. They detected when Israeli pilots were put on alert and identified moonless nights, which would give the Israelis better cover for an attack. They watched the Israelis practice strike missions and learned they were probing Iran’s air defenses, looking for ways to fly in undetected, U.S. officials said.

New intelligence poured in every day, much of it fragmentary or so highly classified that few U.S. officials had a complete picture. Officials now say many jumped to the mistaken conclusion that the Israelis had made a dry run.

At the time, concern and confusion over Israel’s intentions added to the sense of urgency inside the White House for a diplomatic solution.

The White House decided to keep Mr. Netanyahu in the dark about the secret Iran talks, believing he would leak word to sabotage them. There was little goodwill for Mr. Netanyahu among Mr. Obama’s aides who perceived the prime minister as supportive of Republican challenger Mitt Romney in the 2012 campaign.

Mr. Netanyahu would get briefed on the talks, White House officials concluded, only if it looked like a deal could be reached.

The first secret meeting between U.S. and Iranian negotiators, held in July 2012, was a bust. But “nobody was willing to throw it overboard by greenlighting Israeli strikes just when the process was getting started,” a former senior Obama administration official said.

Israeli officials approached their U.S. counterparts over the summer about obtaining military hardware useful for a strike, U.S. officials said.

At the top of the list were V-22 Ospreys, aircraft that take off and land like helicopters but fly like fixed-wing planes. Ospreys don’t need runways, making them ideal for dropping commandos behind enemy lines.

The Israelis also sounded out officials about obtaining the Massive Ordnance Penetrator, the U.S. military’s 30,000-pound bunker-busting bomb, which was designed to destroy Fordow.

Mr. Netanyahu wanted “somebody in the administration to show acquiescence, if not approval” for a military strike, said Gary Samore, who served for four years as Mr. Obama’s White House coordinator for arms control and weapons of mass destruction. “The message from the Obama administration was: ‘We think this is a big mistake.’ ”

White House officials decided not to provide the equipment.

Messrs. Obama and Netanyahu spoke in September 2012, and Mr. Obama emerged convinced Israel wouldn’t strike on the eve of the U.S. presidential election.

By the following spring, senior U.S. officials concluded the Israelis weren’t serious about a commando raid on Fordow and may have been bluffing. When the U.S. offered to sell the Ospreys, Israel said it didn’t have the money.

Former Israeli Defense Minister Ehud Barak, who championed a strike, said Mr. Netanyahu had come close to approving a military operation against Iran. But Israel’s military chiefs and cabinet members were reluctant, according to Israeli officials.

While keeping the Omani talks secret, U.S. officials briefed the Israelis on the parallel international negotiations between Iran and major world powers under way in early 2013. Those talks, which made little headway, were led on the U.S. side by State Department diplomat Wendy Sherman.

Robert Einhorn, at the time an arms control adviser at the State Department, said that during the briefings, Mr. Netanyahu’s advisers wouldn’t say what concessions they could live with. “It made us feel like nothing was going to be good enough for them,” Mr. Einhorn said.

U.S. spy agencies were monitoring Israeli communications to see if the Israelis had caught wind of the secret talks. In September 2013, the U.S. learned the answer.

Yaakov Amidror, Mr. Netanyahu’s national security adviser at the time, had come to Washington in advance of a Sept. 30 meeting between Messrs. Netanyahu and Obama.

On Sept. 27, Mr. Amidror huddled with White House national security adviser Susan Rice in her office when she told him that Mr. Obama was on the phone in a groundbreaking call with Iran’s president, Hassan Rouhani.

Mr. Amidror had his own surprise. During a separate meeting in the Roosevelt Room, he told several of Mr. Obama’s top advisers that Israel had identified the tail numbers of the unmarked U.S. government planes that ferried negotiators to Muscat, Oman, the site of the secret talks, U.S. officials said.

Mr. Amidror, who declined to comment on the White House discussions, said that it was insulting for Obama administration officials to think “they could go to Oman without taking our intelligence capabilities into account.” He called the decision to hide the Iran talks from Israel a big mistake.

U.S. officials said they were getting ready to tell the Israelis about the talks, which advanced only after Mr. Rouhani came to office. During the Sept. 30 meeting with Mr. Netanyahu, the president acknowledged the secret negotiations. The secrecy cemented Israel’s distrust of Mr. Obama’s intentions, Israeli officials said.

Mr. Samore, the former White House official, said he believed it was a mistake to keep Israel in the dark for so long. Mr. Einhorn said: “The lack of early transparency reinforced Israel’s suspicions and had an outsize negative impact on Israeli thinking about the talks.”

Israel pushed for the U.S. to be more open about the Iran negotiations. Ms. Rice, however, pulled back on consultations with her new Israeli counterpart, Yossi Cohen, who took over as Mr. Netanyahu’s national security adviser, according to U.S. and Israeli officials.
In exchanges with the White House, U.S. officials said, Mr. Cohen wouldn’t budge from demanding Iran give up its centrifuges and uranium-enrichment program. Israeli officials said they feared any deviation would be taken by the U.S. as a green light for more concessions.

In one meeting, Mr. Cohen indicated Mr. Netanyahu could accept a deal allowing Iran to keep thousands of centrifuges, U.S. officials said. Soon after, Mr. Cohen called to say he had misspoken. Neither side was prepared to divulge their bottom line.

In November 2013, when the interim agreement was announced, Mr. Samore was in Israel, where, he said, the Israelis “felt blindsided” by the terms. U.S. officials said the details came together so quickly that Ms. Sherman and her team didn’t have enough time to convey them all. Israeli officials said the Americans intentionally withheld information to prevent them from influencing the outcome.

Listening in

As talks began in 2014 on a final accord, U.S. intelligence agencies alerted White House officials that Israelis were spying on the negotiations. Israel denied any espionage against the U.S. Israeli officials said they could learn details, in part, by spying on Iran, an explanation U.S. officials didn’t believe.

Earlier this year, U.S. officials clamped down on what they shared with Israel about the talks after, they allege, Mr. Netanyahu’s aides leaked confidential information about the emerging deal.

When U.S. officials confronted the Israelis over the matter in a meeting, Israel’s then-minister of intelligence said he didn’t disclose anything from Washington’s briefings. The information, the minister said, came from “other means,” according to meeting participants.

Ms. Sherman told Mr. Cohen, Israel’s national security adviser: “You’re putting us in a very difficult position. We understand that you will find out what you can find out by your own means. But how can we tell you every single last thing when we know you’re going to use it against us?” according to U.S. officials who were there.

Mr. Netanyahu turned to congressional Republicans, one of his remaining allies with the power to affect the deal, Israeli officials said, but he couldn’t muster enough votes to block it.

U.S. officials now pledge to work closely with their Israeli counterparts to monitor Iran’s compliance with the international agreement.

But it is unclear how the White House will respond to any covert Israeli actions against Iran’s nuclear program, which current and former Israeli officials said were imperative to safeguard their country.

One clause in the agreement says the major powers will help the Iranians secure their facilities against sabotage. State Department officials said the clause wouldn’t protect Iranian nuclear sites from Israel.

Michael Hayden, a former director of the CIA, said the U.S. and Israel could nonetheless end up at odds.

“If we become aware of any Israeli efforts, do we have a duty to warn Iran?” Mr. Hayden said. “Given the intimacy of the U.S.-Israeli relationship, it’s going to be more complicated than ever.”

Skreemr vs. the Boneyard

Courtesy of DailyMail: It’s 12 years since Concorde made its last supersonic flight at Mach 2.04, or 1,354 mph (2,179 km/h).  For the full article go here.

But the future of flight could be much faster, with a transatlantic journey taking as little as half an hour.

The designers say scramjet engines could then be used to propel Skreemr to speeds of over 10 times the speed of sound. Scramjets are set to be smaller, lighter and faster, because oxygen needed for engine combustion would be taken from air passing through a vehicle, instead of from a tank on board

A concept aircraft named Skreemr could reach speeds exceeding Mach 10 – that’s 10 times the speed of sound.

Designers Charles Bombardier and Ray Mattison envisage the craft could be launched using a magnetic railgun system to catapult it into the sky at high speed.

Using such a launch system, the craft would be positioned on a pair of conductive parallel rails and accelerated along them using a powerful electromagnetic field.

Liquid-oxygen or kerosene rockets would be fired to enable the plane to rapidly climb higher in the sky and reach Mach 4, which is around twice the speed of Concorde, The Globe and Mail reported.

The designers say scramjet engines could then be used to propel it to speeds of over 10 times the speed of sound, which is around 7,673mph (12,349km/h)

While scramjet engines are under development for drones and military planes, it could be years until they are used for consumer jets and there is no suggestion the designs for Skreemr will ever become reality.

Craft using scramjet propulsion systems are set to be smaller, lighter and faster, because oxygen needed for engine combustion would be taken from air passing through a vehicle, instead of from a tank on board, Nasa explains.

It’s predicted scramjets could reach 15 times the speed of sound.

Bombardier Skreemr’s sleek design, with four wings and two large rockets on the rear, is intended to be used as a commercial aircraft to carry 75 passengers in luxury.

While Bombardier came up with the idea, Mattison, from Design Eye-Q in Minnesota, created the renderings of the concept.

Earlier this month, illustrations emerged for ‘Concorde 2,’ based on a patent awarded to Airbus in July, which describes a craft that climbs vertically into the air before breaking the sound barrier as it travels horizontally across the sky.

It’s been dubbed Concorde 2 because it would be much faster and quieter than the retired supersonic jet, having been designed to have a top speed of Mach 4.5, meaning a journey from New York to London would take just one hour.

Airbus hopes its planned hypersonic jet, which would travel at 4.5 times the speed of sound, could take people between two major cities faster than most daily commutes.

Its proposed one-hour journey time between New York and London would be more than three times faster than the original Concorde, which made its final flight in 2003.

Standard airliners take around eight hours to complete the journey.

Airbus’ jet is described as ‘an air vehicle including a fuselage, a gothic delta wing distributed on either side of the fuselage, and a system of motors able to propel the air vehicle’.

The Boneyard:

Check Out This Awesome Aerial 360º Image Of The Department Of Defense's Boneyard

Check Out This Awesome Aerial 360º Image Of The Department Of Defense’s Boneyard

Aerial Sphere, a company that uses 360 degree photography in an aerial format, took this awesome image high over Davis Monthan Air Force Base and its sprawling boneyard ran by the 309th Aerospace Maintenance and Regeneration Group (AMARG). You can spin the image in every direction and zoom in wherever you like, it’s pretty awesome.

Check out AerialSphere here, as they already have the majority of Phoenix mapped with 360º images like these and they seem to be expanding. 360 photography and video has become increasingly popular in the aviation community, providing virtual tours of cockpits and even virtual ride-alongs in fighter aircraft. Once Virtual Reality headsets become just another fixture in most people’s homes, this technology should really, well, takeoff.

Those 2 Defense Contractors and Manpads in Benghazi

In part from CBSNews: The U.S. has been unable to secure thousands of potentially dangerous shoulder-fired missiles known as “MANPADS” that were leftover from the Qaddafi regime in Libya, CBS News has learned.

MANPADS stands for “Man-portable air-defense systems.” According to a well-placed source, hundreds of the missiles have been tracked as having gone to Al Qaeda Islamic Maghreb (AQIM), an Algeria-based Sunni Muslim terrorist group fighting for control in Mali.

“I would imagine they’re trying to get their hands on as many weapons such as MANPADS as they can,” says CBS News national security consultant Juan Zarate. “It’s a danger both to the military conflict underway in Mali and a real threat to civilian aircraft if, in fact, terrorists have their hands on these MANPADS.”

Before his overthrow and death in the fall of 2011, Libyan dictator Muammar Qaddafi was believed to have purchased 15,000-20,000 Soviet MANPADS. Concern over the whereabouts of the missiles – and the possibility that terrorists could buy them on the black market and even use them to shoot down American passenger jets – drove a U.S. effort to recover as many as possible. But only about 2,000 were accounted for prior to the Sept. 11, 2012 terrorist attacks on Benghazi, Libya, according to the source. He describes those working to locate the missiles as “beside themselves” and “frustrated.”

The program to recover MANPADS in Libya was funded by the U.S. and said to have been run by South African contractors. The contractors attempted to appeal to Libyans, many of them ex-Gaddafi loyalists, to turn over or destroy the MANPADS as a matter of patriotism and pride.

“We told them that ‘if planes start dropping out of the sky, it will trace back to you and you’ll have the international reputation for terrorism,'” says the source. “We offered them money, we tried talking them out of it … The only successes they had were in western Libya, the Tripoli area. In the eastern half toward Benghazi, they were getting nowhere.”

The full emails are here from Judicial Watch regarding the 2 Defense contractors hired by the State Department to collect weapons in Benghazi, specifically manpads.

In part, 2 pages are below, the interaction between the State Dept. OpsCenter and Benghazi

Sent:

To:

Subject:

Classification:

SensitivityCode:

Tuesday, September 11, 2012 7:27 PM

DSCC_Watch Team; DSCC_Management_ Team

Benghazi Contractors

UNCLASSIFIED

Sensitive

Further regarding Contractors on the ground in Benghazi

SBU

This email is UNCLASSIFIED.

From: Operations Center

Sent: Tuesday. Seotember 11. 2012 7;26 P:

To:l.__ __________ _,j

Cc: SES-0

Subject: RE: proposed teleconference call – PM/WRALibya Thursday

‘c:!llo gentlemen,

~—–~ RELEASE IN PART

B7(C),B6

~-i (..• .. \ ‘”‘ ;1 J

86

B7(C)

rhe Operations Center spoke with! ~arlier this evening ~nd has noted that he and [ [are in the

hotel in Benghazi. Please let us know if there are any further updates, and do not hesitate to call the Operations Center

if you need anything at all.

Take care,

Esther

Esther Pan Sloane

From:I

To

Subject: proposed teleconference call – PM/WRA- Libya Thursday

Date: Tue, 11 Sep 2012 20:35 :06 +0000

Hello All,

PM/WRA, led by Jim Lawrence, would like to host a conference call to discuss our current and future work on the ground

in Easf and West Libya, as well as other relevant issues regarding the coordination with our Libyan and UN partners.

I liave scheduled the call for 1000 EST (Washington) on Thursday, September 13. I am waiting for details to ·pass on to

the participants to .call in. I should have those shortly.

I just wanted to give you a heads up and we hope you can participate. For participants in our o~ce CC’d on this mail,

this call will be held in WRA’s Conference Room. ·

Thanks,

D

SBU

This email is UNCLASSIFIED.

***  Taken in part from page 7 of the journal marking the retirement of Jim Lawrence.

His quiet brand of leadership has been as effective in waging peace as his father’s efforts were in waging war; consequently, PM/WRA and the Department of State are prepared as never before to face the evolving challenges in the fields of humanitarian demining and the destruction/disposition of MANPADS [man-portable air-defense systems] and other conventional weapons.