Russia Hacked the World, DoJ Suing Kremlin Operatives?

photo

FNC: The Justice Department reportedly has garnered enough evidence to charge at least six Russian government operatives with hacking the Democratic National Committee’s computers during the 2016 presidential election.

The Wall Street Journal reported Thursday that federal prosecutors could bring charges early next year. The Journal reported that dozens of others may have also played a role in the cyberattack.

Even tech companies are suing Russia.

How Russia hacked the world: Putin’s spies used ‘digital hit list’ to hunt global targets

  • 19,000 malicious links collected by Secureworks after Fancy Bear mistake.

  • 4,700 Gmail users across the globe were targeted by the state hacking team.

  • Alongside Democrats, a handful of Republican targets were also identified.

The hackers who upended the US presidential election had ambitions well beyond Hillary Clinton’s campaign, targeting the emails of Ukrainian officers, Russian opposition figures, US defence contractors and thousands of others of interest to the Kremlin, according to a previously unpublished digital hit list obtained by The Associated Press.

The list provides the most detailed forensic evidence yet of the close alignment between the hackers and the Russian government, exposing an operation that stretched back years and tried to break into the inboxes of 4,700 Gmail users across the globe — from the pope’s representative in Kiev to the punk band Pussy Riot in Moscow.

“It’s a wish list of who you’d want to target to further Russian interests,” said Keir Giles, director of the Conflict Studies Research Centre in Cambridge, England, and one of five outside experts who reviewed the AP’s findings. He said the data was “a master list of individuals whom Russia would like to spy on, embarrass, discredit or silence.”

The AP findings draw on a database of 19,000 malicious links collected by cybersecurity firm Secureworks, dozens of rogue emails, and interviews with more than 100 hacking targets.

Secureworks stumbled upon the data after a hacking group known as Fancy Bear accidentally exposed part of its phishing operation to the internet.

The list revealed a direct line between the hackers and the leaks that rocked the presidential contest in its final stages, most notably the private emails of Clinton campaign chairman John Podesta.

The issue of who hacked the Democrats is back in the national spotlight following the revelation Monday that a Donald Trump campaign official, George Papadopoulos, was briefed early last year that the Russians had “dirt” on Clinton, including “thousands of emails.”

Kremlin spokesman Dmitry Peskov called the notion that Russia interfered “unfounded.” But the list examined by AP provides powerful evidence that the Kremlin did just that.

“This is the Kremlin and the general staff,” said Andras Racz, a specialist in Russian security policy at Pazmany Peter Catholic University in Hungary, as he examined the data. “I have no doubts.”

New evidence

Secureworks’ list covers the period between March 2015 and May 2016. Most of the identified targets were in the United States, Ukraine, Russia, Georgia and Syria.

In the United States, which was Russia’s Cold War rival, Fancy Bear tried to pry open at least 573 inboxes belonging to those in the top echelons of the country’s diplomatic and security services: then-Secretary of State John Kerry, former Secretary of State Colin Powell, then-NATO Supreme Commander, US Air Force Gen. Philip Breedlove, and one of his predecessors, US Army Gen. Wesley Clark.

The list skewed toward workers for defence contractors such as Boeing, Raytheon and Lockheed Martin or senior intelligence figures, prominent Russia watchers and — especially — Democrats. More than 130 party workers, campaign staffers and supporters of the party were targeted, including Podesta and other members of Clinton’s inner circle.

The AP also found a handful of Republican targets.

Podesta, Powell, Breedlove and more than a dozen Democratic targets besides Podesta would soon find their private correspondence dumped to the web. The AP has determined that all had been targeted by Fancy Bear, most of them three to seven months before the leaks.

“They got two years of email,” Powell recently told AP. He said that while he couldn’t know for sure who was responsible, “I always suspected some Russian connection.”

In Ukraine, which is fighting a grinding war against Russia-backed separatists, Fancy Bear attempted to break into at least 545 accounts, including those of President Petro Poroshenko and his son Alexei, half a dozen current and former ministers such as Interior Minister Arsen Avakov and as many as two dozen current and former lawmakers.

The list includes Serhiy Leshchenko, an opposition parliamentarian who helped uncover the off-the-books payments allegedly made to Trump campaign chairman Paul Manafort — whose indictment was unsealed Monday in Washington.

In Russia, Fancy Bear focused on government opponents and dozens of journalists.

Among the targets were oil tycoon-turned-Kremlin foe Mikhail Khodorkovsky, who spent a decade in prison and now lives in exile, and Pussy Riot’s Maria Alekhina. Along with them were 100 more civil society figures, including anti-corruption campaigner Alexei Navalny and his lieutenants.

“Everything on this list fits,” said Vasily Gatov, a Russian media analyst who was himself among the targets. He said Russian authorities would have been particularly interested in Navalny, one of the few opposition leaders with a national following.

Many of the targets have little in common except that they would have been crossing the Kremlin’s radar: an environmental activist in the remote Russian port city of Murmansk; a small political magazine in Armenia; the Vatican’s representative in Kiev; an adult education organisation in Kazakhstan.

“It’s simply hard to see how any other country would be particularly interested in their activities,” said Michael Kofman, an expert on Russian military affairs at the Woodrow Wilson International Centre in Washington.

He was also on the list.

“If you’re not Russia,” he said, “hacking these people is a colossal waste of time.”

Working 9 to 6 (Moscow Time)

Allegations that Fancy Bear works for Russia aren’t new. But raw data has been hard to come by.

Researchers have been documenting the group’s activities for more than a decade and many have accused it of being an extension of Russia’s intelligence services. The “Fancy Bear” nickname is a none-too-subtle reference to Russia’s national symbol.

In the wake of the 2016 election, US intelligence agencies publicly endorsed the consensus view, saying what American spooks had long alleged privately: Fancy Bear is a creature of the Kremlin.

But the US intelligence community provided little proof, and even media-friendly cybersecurity companies typically publish only summaries of their data.

That makes the Secureworks’ database a key piece of public evidence — all the more remarkable because it’s the result of a careless mistake.

Secureworks effectively stumbled across it when a researcher began working backward from a server tied to one of Fancy Bear’s signature pieces of malicious software.

He found a hyperactive Bitly account Fancy Bear was using to sneak thousands of malicious links past Google’s spam filter. Because Fancy Bear forgot to set the account to private, Secureworks spent the next few months hovering over the group’s shoulder, quietly copying down the details of the thousands of emails it was targeting.

The AP obtained the data recently, boiling it down to 4,700 individual email addresses, and then connecting roughly half to account holders.

The AP validated the list by running it against a sample of phishing emails obtained from people targeted and comparing it to similar rosters gathered independently by other cybersecurity companies, such as Tokyo-based Trend Micro and the Slovakian firm ESET.

The Secureworks data allowed reporters to determine that more than 95% of the malicious links were generated during Moscow office hours — between 9 am and 6 pm Monday to Friday.

The AP’s findings also track with a report that first brought Fancy Bear to the attention of American voters. In 2016, a cybersecurity company known as CrowdStrike said the Democratic National Committee had been compromised by Russian hackers, including Fancy Bear.

Secureworks’ roster shows Fancy Bear making aggressive attempts to hack into DNC technical staffers’ emails in early April 2016 — exactly when CrowdStrike says the hackers broke in.

Hacking hands
Fancy Bear have long been linked to the Russian security services iStock

And the raw data enabled the AP to speak directly to the people who were targeted, many of whom pointed the finger at the Kremlin.

“We have no doubts about who is behind these attacks,” said Artem Torchinskiy, a project coordinator with Navalny’s Anti-Corruption Fund who was targeted three times in 2015. “I am sure these are hackers controlled by Russian secret services.”

The myth if the 400-pound man

Even if only a small fraction of the 4,700 Gmail accounts targeted by Fancy Bear were hacked successfully, the data drawn from them could run into terabytes — easily rivalling the biggest known leaks in journalistic history.

For the hackers to have made sense of that mountain of messages — in English, Ukrainian, Russian, Georgian, Arabic and many other languages — they would have needed a substantial team of analysts and translators. Merely identifying and sorting the targets took six AP reporters eight weeks of work.

The AP’s effort offers “a little feel for how much labour went into this,” said Thomas Rid, a professor of strategic studies at Johns Hopkins University’s School of Advanced International Studies.

He said the investigation should put to rest any theories like the one then-candidate Donald Trump floated last year that the hacks could be the work of “someone sitting on their bed that weighs 400 pounds.”

“The notion that it’s just a lone hacker somewhere is utterly absurd,” Rid said.

***

Axios: Marathon congressional hearings on Russian election interference and social media left execs from Facebook, Google and Twitter badly bruised and with a new view of just how mad Washington is about their handling of content aiming to divide Americans.

The big takeaway: Lawmakers’ rebukes went far beyond the companies’ responses to Russia’s interference. They also repeatedly revealed a discomfort with the size, power and limited accountability of the large web platforms.

What else we learned:

  • Washington isn’t buying that Facebook, Google and Twitter aren’t media companies. Both Republicans and Democrats seemed baffled at times by an assumption that has been fundamental to Google, Facebook and Twitter’s growth: that they are neutral platforms for information, not judges of content. Multiple lawmakers questioned that argument: “That may well be a distinction that is lost on most of us, that you’re just a platform for other people to express their views as opposed to being a publisher in their own right of those views,” said Republican Sen. John Cornyn.
  • We now know what the Russian ads look like. Lawmakers released some of the Russian-bought ads, which were focused largely on divisive political issues like civil rights, immigration and religion. According to the metadata released, the ads targeted both Republicans and Democrats and were paid for in rubles. For example, one “Black Matters” ad targeted adults in Georgia, Maryland, Missouri and Virginia and received more than 200,000 impressions and more than 12,000 clicks. It cost 53,425 rubles ($915).
  • Still no backing for a regulatory fix. The only piece of concrete legislation tied to this issue is the Honest Ads Act, which would require disclosure for online political ads. While the companies all committed to improving transparency, and companies indicated that they could work with lawmakers on the bill, they did not endorse it.
  • Lawmakers felt slighted by the CEOs’ absence. “I wish your CEOs were here,” said Democratic Sen. Joe Manchin, one of many lawmakers who voiced that sentiment. “They need to answer for this.”
  • The companies are putting significant resources toward vetting content. During nine hours of hearings, they repeatedly touted how much they were investing in both money and personnel to solve the election interference issue. Facebook is doubling the people working on safety and security issues to 20,000 by the end of 2018, for example.
  • Democrats were the harshest critics. Silicon Valley has long had a strong relationship with the liberal left, but that didn’t stop California Sens. Dianne Feinstein and Kamala Harris, as well as tech ally Sen. Ron Wyden, from lacing into the witnesses. Republicans, while critical of the companies, stopped short of conceding that social media manipulation was a deciding factor in Donald Trump’s win.
  • Congressional investigators are still learning the basics. One lawmaker asked Twitter’s general counsel to explain the difference between a bot and a troll. Several inquired about the definition of “impressions.” This highlights how steep the learning curve is for elected officials to fully grasp the nuances of what went wrong online in 2016.
  • Tech made a huge political miscalculation in not moving faster. Again and again, the companies were chided for how long it took them to deliver the goods to investigators. “I hear all your words,” said Sen. Mark Warner, “but I have more than a little bit of frustration that many of us on this committee have been raising this issue since the beginning of this year, and our claims were frankly blown off by the leaderships of your companies.”
What’s next? All of the companies indicated their investigations are ongoing, so the scale of the Russian disinformation campaign could turn out to be even bigger than we know now.

Go deeper:

U.S Should Follow Europe’s Lead on Cyber

Imagine that….Europe may be more right on this issue than the United States is due to congress where decisions just cannot be made.

Going back to 2011, the Pentagon has concluded that computer sabotage coming from another country can constitute an act of war, a finding that for the first time opens the door for the U.S. to respond using traditional military force.

In 2016, Pentagon leaders are still working to determine when, exactly, a cyber-attack against the U.S. would constitute an act of war, and when, exactly, the Defense Department would respond to a cyber-attack on civilian infrastructure, a senior Defense Department official told lawmakers on Wednesday.

A cyber strike as an act of war “has not been defined,” Acting Assistant Secretary of Defense for Homeland Defense and Global Security Thomas Atkin told the House Armed Services Committee. “We’re still working toward that definition.” More here.

photo

Related reading: North Korea’s Elite Cyber Soldiers Hacked Top Secret Warship Blueprints, Seoul Lawmaker Says

So, is Europe ahead of the United States on this issue?

EU governments to warn cyber attacks can be an act of war

European Union governments will formally state that cyber attacks can be an act of war in a show of strength to countries such as Russia and North Korea.

Diplomats and ambassadors in Brussels have drafted a document, obtained by The Telegraph, that represents an unprecedented deterrent aimed at countries using hackers and cyber espionage against EU members.

The document, set to be agreed by all 28 EU members states, including Britain, in the coming weeks warns that individual member states could respond “in grave instances” to cyber attacks with conventional weapons.

The British government has now said it was all but certain that North Korea was behind the “WannaCry” malware attack that hit NHS IT systems in May. Work on the EU paper began among fears that Russia would attempt to influence this year’s German elections and over hybrid warfare employed in Ukraine. More here.

This could be a pretext for what is a probable threat.

photo

Banks fearing North Korea hacking prepare defenses: cyber experts

WASHINGTON/TORONTO (Reuters) – Global banks are preparing to defend themselves against North Korea potentially intensifying a years-long hacking spree by seeking to cripple financial networks as Pyongyang weighs the threat of U.S. military action over its nuclear program, cyber security experts said.

North Korean hackers have stolen hundreds of millions of dollars from banks during the past three years, including a heist in 2016 at Bangladesh Bank that yielded $81 million, according to Dmitri Alperovitch, chief technology officer at cyber security firm CrowdStrike.

Alperovitch told the Reuters Cyber Security Summit on Tuesday that banks were concerned Pyongyang’s hackers may become more destructive by using the same type of “wiper” viruses they deployed across South Korea and at Sony Corp’s (6758.T) Hollywood studio.

The North Korean government has repeatedly denied accusations by security researchers and the U.S. government that it has carried out cyber attacks.

North Korean hackers could leverage knowledge about financial networks gathered during cyber heists to disrupt bank operations, according to Alperovitch, who said his firm has conducted “war game” exercises for several banks.

“The difference between theft and destruction is often a few keystrokes,” Alperovitch said.

Security teams at major U.S. banks have shared information on the North Korean cyber threat in recent months, said a second cyber security expert familiar with those talks.

“We know they attacked South Korean banks,” said the source, who added that fears have grown that banks in the United States will be targeted next.

Tensions between Washington and Pyongyang have been building after a series of nuclear and missile tests by North Korea and bellicose verbal exchanges between U.S. President Donald Trump and North Korean leader Kim Jong Un.

John Carlin, a former U.S. assistant attorney general, told the Reuters summit that other firms, among them defense contractors, retailers and social media companies, were also concerned.

“They are thinking ‘Are we going to see an escalation in attacks from North Korea?’” said Carlin, chair of Morrison & Foerster international law firm’s global risk and crisis management team.

Jim Lewis, a cyber expert with Washington’s Center for Strategic and International Studies, said it is unlikely that North Korea would launch destructive attacks on American banks because of concerns about U.S. retaliation.

Representatives of the U.S. Federal Reserve and the Office of the Comptroller of the Currency, the top U.S. banking regulators, declined to comment. Both have ramped up cyber security oversight in recent years.

For other Reuters Cyber Summit news click on www.reuters.com/cyberrisk

WH and State Dept Slowed Walked Russian Sanctions

While many are questioning Robert Mueller’s role into the Russian investigation, be sure to understand Russian operatives had an open door for at least 8 years and earlier than that there were clandestine Russian spy rings functioning across the country.

Much less there are dead Russians in the UK as well as in the United States, the risks are extraordinary.

Thanks to the Democrats and the greed of money where Russia was happy to comply for agreements to all their requests, the Russian probe goes beyond that common term of collusion.

The Obama administration launched the back channels for nuclear talks with Iran in 2009 in Oman. Obama needed the Russian vote, so all things concocted by the Kremlin were given a wink and nod by the Obama White House as well as the Hillary and John Kerry State Department.

So, we now have the Trump White House which has been slow and measured to take additional actions regarding Russia. The ‘why’ has a convoluted answer. There is/was Russian hacking. There were/are Russian trolls and bots in social media. There is Russian involvement in Silicon Valley known as Skolkovo. There is conflicted military airspace in Syria. There is Russian support of the Taliban. There are Russian operations in Cuba, Latin America, Libya, Iraq, Ukraine (…)

photo

Medvedev and Putin have a master plan and they are calculating and effective. One action results in unknown global consequences.

So, finally the Tillerson State Department provided approval of additional sanctions on Russia and Congress has the list. Is it enough or complete? Too early to know. However, the Magnitsky Act is gaining approval in countries allied to United States and Putin is seeking revenge by any means necessary including through Interpol.

  photo

Read on:

WASHINGTON The State Department gave Congress a list Thursday of 39 Russian individuals and entities it says support the Russian government’s intelligence and defense sectors. Early next year, anyone in the U.S. doing business with entities on that list will be hit with sanctions by the Trump administration.

“Secretary of State Rex Tillerson has authorized the department to issue guidance to the public specifying the persons or entities that are part of or operating on behalf of the defense or intelligence sectors of the government of the Russian Federation,” said State Department spokesperson Heather Nauert.

After President Trump signed sanctions legislation in August, the administration gave the State and Treasury Departments the authority to draw up a list of entities that enable Moscow’s intelligence and defense sectors. The State Department had a deadline of October 1 to send the list to Congress. Now, nearly a month late, State has done so.

There had been growing criticism that the administration was slow-walking the process. The State Department cited the complexity of the process when asked about the delay. Nauert also explained that Secretary of State Rex Tillerson is “very hands-on in these types of things.”

Experts on Russia who reviewed the list, which was obtained by CBS News, say it covers most of the Russian defense sector.

“This seems to be a comprehensive list that broadly covers a significant portion of the Russian defense industry,” said Mark Simakovsky, a former Defense Department official and Atlantic Council fellow. “The administration likely took very seriously the review, required of the legislation, and has sought to abide by the terms.”

Five of the six Russian defense contractors listed on the State and Treasury list are among the 100 biggest defense companies worldwide.

Rosoboronexport OJSC, which is on the list, is one of Russia’s largest exporters of defense products. Its partner company, Rostec, promotes technology products in both the civil and defense sectors and is also on the list. On the intelligence side, the Federal Security Service (FSB) and the Foreign Intelligence Service (SVR) are included.

The State Department is making the entire list public in advance of actual sanctions implementation in order to alert U.S. stakeholders, primarily those who do business with these companies, early notice, so they can draw down those transactions. If they don’t, they, too, will face sanctions.

“These are the types of entities that they can no longer do business with,” State Department Spokeswoman Heather Nauert said. “So it helps them to at least make their business decisions and be able to decide on the best course of action going forward,” she said.”

Making the list public before sanctions go into effect is a departure from the usual State Department policy of waiting for the sanctions to be announced. Congressional aides acknowledged that this caveat, which essentially enables both U.S. companies and the Russian companies to prepare, was a concern as the legislation was nearing its final hours before passage. In the end, there was no major effort to change this.

Once the Senate passed its sanctions legislation with an overwhelming majority, it put pressure on the House to pass it as well. Democrats applied intense pressure not to change anything because they did not want to water down the bill.

Senator Bob Corker, R-Tennessee, the chairman of the Senate Foreign Relations Committee, called the list a “good first step in responsibly implementing a very complex piece of legislation.” Senators Ben Cardin, D-Maryland, and John McCain, R-Arizona also welcomed the list as part of the effort to hold Russia accountable for interfering in the 2016 U.S. presidential election.

The two senators noted that questions remain about the implementation of the sanctions. Under the current plan, beginning Jan. 29, individuals involved in “significant” transactions with entities on the list will also be sanctioned. It’s still up to the State Department to determine how the sanctions are applied. McCain and Cardin are concerned about how the agency will come up with the staffing and resources to carry out the sanctions. In their statement they pointed out reports that say the sanctions office has been closed and “a number of its staff have resigned.” The policy planning staff, which doesn’t usually play a role in operations, is being tasked with implementing the sanctions.

Providing dedicated staffing and resources within the State Department will demonstrate the administration’s commitment to carrying out this vitally important law,” wrote McCain and Cardin.

The sanctions law signed by Mr. Trump in August targeted Iran and North Korea, in addition to Russia. It maintains and expands sanctions against the Russian government, Russian crude oil projects and also targets those who evade foreign sanctions and entities that abuse human rights. The legislation also prevents the president from unilaterally easing or lifting sanctions against Russia, a provision that came after Mr. Trump had consistently espoused the idea of a warming of relations with Russia, even in the face of the intelligence community’s conclusion that Russia had meddled in the 2016 elections.

Uranium One Goes Back to ‘Senator’ Hillary Clinton

The Clinton’s were masters at cunning operations for power, money and access. Along the way, they exploited people for help and threw others under the bus. The Clinton’s were crafty and cunning enough to ensure their fingerprints were never on the evidence and deferred to loyal lawyers due to the ability to apply attorney client privileges.

Going back in time and space with Hillary takes us to at least as far back as when she was a New York senator, the foundation and her craft in politics. Conspiracy and connivance were and are a daily action by Hillary. Not all the blame with Uranium One belongs to Hillary. There are her lawyers and powerbrokers globally that belong to this network.

Russia has intruded into all things America because at least Hillary and the Obama administration allowed them in.

There were several members of congress that had various depths of knowledge regarding selling uranium to Russia and expressed concerns including documents to Obama administration officials only to get nothing. Assigned FBI agents admitted being stonewalled due to ‘politics’ as well to the informant.

So, what did the media know and did they report? Yes, some of them for sure, yet there were so many scandals running concurrently, it was hardly noticed if at all. Even the New York Times reported.

As a refresher:

2015/The story involves a Canadian company called Uranium One, a Russian investor, the State Department, and The Clinton Foundation.

“As the Russians gradually assumed control of Uranium One in three separate transactions from 2009 to 2013, Canadian records show, a flow of cash made its way to the Clinton Foundation,” The Times reports.

Here’s the high-level summary. There are more details below.

• Canadian company Uranium One owned uranium mines in the US and Kazakhstan.

• Uranium One’s mines account for 20% of the uranium mined in the US. Uranium is used for nuclear weapons, and it’s considered a strategic asset to the US.

• Russia’s state-owned atomic agency, Rosatom, bought a 17% stake in Uranium One in June 2009.

• The Russian atomic agency decided it wanted to own 51% of Uranium One in June 2010. To take a majority stake in Uranium One, it needed approval from a special committee that included the State Department, which Hillary Clinton led at the time.

• Investors in Uranium One gave money to the Clinton Foundation starting in 2005 and through 2011. On June 29, 2010, Bill Clinton was paid $500,000 to speak in Russia by an investment bank with ties to Russia’s government that had a buy rating on Uranium One’s stock.

• In January 2013, despite assurances to the contrary, a subsidiary of Rosatom took over 100% of the company and delisted it from the Toronto Stock Exchange.

• Clinton was required to disclose all of her foundation’s contributors before she became secretary of state, but the Clintons did not disclose millions of dollars donated by the chairman of Uranium One while the review of the deal was ongoing.

“Uranium One’s chairman used his family foundation to make four donations totaling $2.35 million,” The Times reports. “Those contributions were not publicly disclosed by the Clintons, despite an agreement Mrs. Clinton had struck with the Obama White House to publicly identify all donors. Other people with ties to the company made donations as well.”

The Times’ revelations appear to have originated from reporting in “Clinton Cash,” a forthcoming book by conservative author Peter Schweizer, which was provided to the newspaper for advance reporting. The report said The Times “scrutinized his information and built upon it with its own reporting.”

The Clinton campaign and its allies have aggressively dismissed the book as partisan conspiracy-mongering. In a statement to The Times, Clinton spokesman Brian Fallon said the State Department was only one of multiple US government bodies that approved the transaction.

“[No one] has produced a shred of evidence supporting the theory that Hillary Clinton ever took action as secretary of state to support the interests of donors to the Clinton Foundation,” Fallon told The Times. “To suggest the State Department, under then-Secretary Clinton, exerted undue influence in the US government’s review of the sale of Uranium One is utterly baseless.”

Here are some key points from the Times report:

  • According to The Times, Uranium One’s involvement with the Clintons stretches back to 2005, when former President Bill Clinton accompanied Canadian mining financier Frank Giustra to Kazakhstan, where they met with authoritarian president Nursultan Nazarbayev. Going against American foreign policy at the time, Bill Clinton expressed support for Nazarbayev’s bid to lead an international elections monitoring group.
  • Soon after, Giustra’s company, UrAsia Energy (the predecessor to Uranium One) won stakes in three uranium mines controlled by Kazakhstan’s state-run uranium agency. Months after the deal, Giustra reportedly donated $31.3 million to Clinton’s foundation.

Kazakh President Nursultan Nazarbayev greets former U.S. president Bill ClintonKazakh President Nursultan Nazarbayev with former US President Bill Clinton in Almaty in 2005. Clinton traveled to the ex-Soviet Central Asian state to sign an agreement with the government, admitting Kazakhstan into the Clinton Foundation HIV/AIDS Initiative Procurement Consortium.REUTERS/Shamil Zhumatov SZH/DH

  • After the legality of the Kazakhstan deal was called into question, Uranium One asked the American embassy in Kazakhstan for help. Uranium One’s executive vice president copied then-Secretary of State Hillary Clinton on a cable saying he wanted an official written confirmation that the company’s licenses in Kazakhstan were still valid, according to The Times. Soon after, the embassy’s energy officer met with Kazakh officials.
  • In June 2009 ARMZ, a subsidiary of Russia’s atomic energy agency Rosatom, finalized a deal for a 17% stake in Uranium One. In June 2010, the Russian government sought a 51% controlling stake in the company that would have to be approved by the American government. Rosatom also said that after that, the agency “did not plan to increase its stake in Uranium One or to take the company private,” The Times noted in a timeline of the events.
  • Investors with ties to Uranium One and UrAsia donated millions to the foundation in 2010 and 2011. These donations were disclosed. In addition to this, Bill Clinton was paid $500,000 to speak in Moscow in June 2010, the same month that the Russians closed the deal for the majority stake in Uranium One. The speaking fee was one of Clinton’s highest, according to The Times.
  • The US Committee on Foreign Investment, which includes the attorney general, the secretaries of the Treasury, Defense, Homeland Security, Commerce and Energy, and the secretary of state, were charged with reviewing the deal that would give Rosatom a majority stake because uranium is “considered a strategic asset with implications for national security,” according to The Times.
  • The concern was American dependence on foreign uranium. The Times notes that while the US “gets one-fifth of its electrical power from nuclear plants, it produces only around 20% of the uranium it needs, and most plants have only 18 to 36 months of reserves.”
  • Four members of Congress signed a letter expressing concern over the deal, and two others drafted legislation to kill it. One senator contended that the deal “would give the Russian government control over a sizable portion of America’s uranium production capacity” as well as “a significant stake in uranium mines in Kazakhstan.” The Nuclear Regulatory Commission made assurances that the US uranium would be preserved for domestic use regardless of the deal.
  • Final say over the deal rested with the foreign investment committee, “including Mrs. Clinton — whose husband was collecting millions of dollars in donations from people associated with Uranium One,” The Times notes.
  • After the deal was approved in October 2010, Rosatom’s chief executive, Sergei Kiriyenko, said in an interview with Russian President Vladimir Putin: “Few could have imagined in the past that we would own 20% of US reserves.”
    • A source with knowledge of the Clintons’ fundraising pointed out to The Times that people donate because they hope that money will buy influence. The source said: “Why do you think they are doing it — because they love them?”
    • Despite claims by Russia that the country didn’t intend to increase its stake in Uranium One or take the company private, ARMZ — the subsidiary of Russia’s atomic energy agency — took over 100% of the company and delisted it from the Toronto Stock Exchange in January 2013.

    “Whether the donations played any role in the approval of the uranium deal is unknown,” The Times concluded. “But the episode underscores the special ethical challenges presented by the Clinton Foundation, headed by a former president who relied heavily on foreign cash to accumulate $250 million in assets even as his wife helped steer American foreign policy as secretary of state, presiding over decisions with the potential to benefit the foundation’s donors.”

    Now that Hillary Clinton formally announced a presidential run, her foundation has come under increasing scrutiny.

    Her family’s charities are refiling at least five tax returns after Reuters found errors in how the foundations reported donations from governments, the news wire reported this week.

 

 

UN/Harvard Comprehensive WMD Programs in N Korea/ISIS

Primer:

A North Korean mining firm, reputed to be a front for Pyongyang’s weapons development programs, attempted to ship materiel to Syrian officials tied to the country’s chemical weapons program, according to a confidential United Nations assessment of international sanctions against the North.

Details of the U.N. findings, first reported by Reuters, found officials from Korea Mining Development Trading Corporation {KOMID) had sent a pair of shipments of unknown contents to members of Syria’s Scientific Studies and Research Centre or SSRC. The Syrian government organization has been responsible for developing chemical and biological weapons for regime in Damascus since the 1970’s.

The shipments never arrived in Syria after being intercepted by international authorities from U.N. partner nations, Reuters reports. “Two member states interdicted shipments destined for Syria. Another member state informed the panel that it had reasons to believe that the goods were part of a KOMID contract with Syria,” the U.N. review states.

KOMID has repeatedly trafficked in materials associated with ballistic missile development and other conventional arms programs, and was blacklisted by the U.N. security council as a result of those activities, Reuters reports.

As a result, the U.N. “is investigating reported prohibited chemical, ballistic missile and conventional arms cooperation between Syria and [North Korea],” the report states. More here.

***    photo

Quoting the South Korean Defense Ministry, it said: ‘North Korea has 13 types of biological weapons agents which it can weaponize within ten days, and anthrax and smallpox are the likely agents it would deploy.’

***

Harvard produced a report with the summary in part that reads:

Amidst the growing threat of North Korea’s nuclear program, the assas-
sination of Kim Jong-Un’s half-brother via VX nerve agent in February
2017 brought renewed interest in North Korea’s other weapons of
mass destruction (WMD) programs—chemical and biological weap-
ons. If used on a large scale, these weapons can cause not only tens of
thousands of deaths, but also create panic and paralyze societies. Nev-
ertheless, the vividness of the nuclear threat has overshadowed other
weapons programs, limiting the attention and policy input that they
deserve. This paper focuses on North Korea’s biological weapons (BW).
Accurately assessing the threat from North Korea’s biological weapons
is challenging. Whereas North Korea has publicly declared its will to
become a nuclear power many times, it has been less overt about its
intention or capability for biological weapons. BW capabilities are
inherently hard to detect and measure. While nuclear programs can
be monitored by the number of nuclear tests and the success of missile
tests, weaponizing and cultivating pathogens can stay invisible behind
closed doors. Moreover, equipment used for BW production are often
dual-use for agriculture, making external monitoring and verification
virtually impossible. Limited information on North Korea’s BW pro-
gram leads to a low threat perception that may undermine preparation
and response efforts. The full 46 page report is here.

A German newspaper reported last week that at least one European intelligence agency has already warned that the Islamic State is exploring the use of chemicals for attacks in Europe. Such an eventuality would be a radical departure from prior attacks by the Islamic State in the West. In the past, the militant group has shown a strong preference for low-tech means of dispensing violence, such as firearms, vehicles and knives. But it has utilized chemical substances in Iraq and Syria, and its technical experts have amassed significant knowledge about weaponized chemicals.

Last week, several European and American counter-terrorism experts participated in a bioterrorism preparedness exercise in Berlin. Codenamed WUNDERBAUM, the exercise was one of several anti-terrorism drills that have taken place in the German capital this year alone. But last week’s drill was the first with an exclusive focus on preparing for a bioterrorist attack. German authorities insisted that the drill was not sparked by concrete intelligence of a pending biological or chemical attack. But the Berlin-based national newspaper Die Welt claimed on Friday that it had information about at least one such warning by a European intelligence agency. The paper did not name the agency, but said that “a foreign intelligence agency” had warned European security authorities of a possible terrorist attack by the Islamic State using chemical weapons. According to Die Welt, the warning was “explicit” and cautioned that the Sunni militant group may be preparing to use improvised bombs utilizing chemicals, including toxic gasses. The warning was communicated to European intelligence agencies, including Germany’s said Die Welt.

How likely is such a scenario? Terrorist groups tend to be conservative in their use of lethal technologies. They typically opt for time-tested methods using explosives or firearms, because these have a higher of success in comparison to more sophisticated, hi-tech weapons. The latter are also more expensive to build and require scientific and technical capabilities that are not typically available to terrorist organizations. Militants are usually strapped for cash, and are not science-savvy, so exceptions to this general trend are rare. But the Islamic State is different. Ever since it made its eventful appearance in 2013, the group has experimented with a variety of chemicals, including nerve agents. It is known that it initiated a modest chemical weapons program, headed by Iraqi engineers who were trained under Iraq’s late ruler, Saddam Hussein. One of them, Abu Malik, was killed in an American airstrike in early 2015. Another, Sleiman Daoud al-Afari, who headed the Islamic State’s chemical weapons program, was captured by US Special Forces in northern Iraq in March of last year.

The Islamic State’s rapid loss of territory in the past year has delivered serious blows to the group’s military infrastructure. Its chemical weapons program, which was targeted early on by the US, Iran and other belligerents, is now almost certainly defunct. But many of its engineers and technical experts are still at large, as are those who were trained by them during the group’s heyday in Iraq and Syria. Despite its continuing retreat, the Islamic State is still capable of employing chemicals that are relatively easy to procure, such as chlorine, hydrogen sulfide, or even various fertilizers, to construct explosives or nerve agents. Last summer, members of a terrorist cell with connections to the Islamic State were arrested in Sydney, Australia. By the time they were arrested, they had already procured significant quantities of hydrogen sulfide and had even tested the chemical, in an apparent preparation for a large-scale attack.

The Australian case shows that the Islamic State is not averse to the tactical use of chemical weapons in terrorist attacks. As the militant group’s self-proclaimed caliphate is disintegrating, and its leaders feel like they have nothing left to lose, the deployment of unconventional terrorist technologies should not be excluded as a tactical option for the organization. Western counter-terrorism officials should actively and immediately prepare for such an eventuality.

***