Russian Spy Buryakov Deported, and that is it?

You mean there was no swap or something for this spy? How about an apology for this constant problem of our U.S. diplomats around the globe? And most of the country thinks that Russia does nothing wrong or  intercepting phone calls of foreign agents that are occurring with Americans is wrong and names should not be requested to be unmasked. How about insider threats? Okay, well read on….

Russian intelligence and security services have been waging a campaign of harassment and intimidation against U.S. diplomats, embassy staff and their families in Moscow and several other European capitals that has rattled ambassadors and prompted Secretary of State John F. Kerry to ask Vladimir Putin to put a stop to it.

At a recent meeting of U.S. ambassadors from Russia and Europe in Washington, U.S. ambassadors to several European countries complained that Russian intelligence officials were constantly perpetrating acts of harassment against their diplomatic staff that ranged from the weird to the downright scary. Some of the intimidation has been routine: following diplomats or their family members, showing up at their social events uninvited or paying reporters to write negative stories about them.

But many of the recent acts of intimidation by Russian security services have crossed the line into apparent criminality. In a series of secret memos sent back to Washington, described to me by several current and former U.S. officials who have written or read them, diplomats reported that Russian intruders had broken into their homes late at night, only to rearrange the furniture or turn on all the lights and televisions, and then leave. One diplomat reported that an intruder had defecated on his living room carpet. More here.

Russian banker convicted in U.S. spy ring deported to Moscow

A Russian banker convicted last year in the United States for involvement in a spy ring operating in New York City has been deported to Moscow, a U.S. law enforcement agency said on Wednesday.

Evgeny Buryakov, a former New York banker who was convicted in federal court of conspiring to act in the United States as an agent of the Russian Federation, is shown in this handout photo sitting on a commercial flight, escorted by deportation officers and turned over to Russian authorities, April 5, 2017.    United States Immigration and Customs Enforcement (ICE)/Handout via REUTERS

Evgeny Buryakov, a former New York banker who was convicted in federal court of conspiring to act in the United States as an agent of the Russian Federation, is shown in this handout photo sitting on a commercial flight, escorted by deportation officers and turned over to… REUTERS

Evgeny Buryakov, 42, was escorted to Russia by deportation officers aboard commercial flights and turned over to Russian authorities, the U.S. Immigration and Customs Enforcement (ICE) said in a statement.

Buryakov was arrested in January 2015 and charged with two others. U.S. prosecutors said they had worked with the Russian intelligence service and conspired to gather economic intelligence on behalf of Russia, including information about U.S. sanctions against Russia, and to recruit New York City residents as intelligence sources.

Buryakov, who worked at Russian state-owned Vnesheconombank, was sentenced in May by a U.S. district judge in Manhattan to 2-1/2 years in prison after pleading guilty to having conspired to act improperly as an agent for the Russian government.

He received credit for 16 months already spent in custody and was in line to be deported after completing his sentence.

***

Department of Justice
U.S. Attorney’s Office
Southern District of New York

FOR IMMEDIATE RELEASE
Friday, March 11, 2016

Evgeny Buryakov Pleads Guilty In Manhattan Federal Court In Connection With Conspiracy To Work For Russian Intelligence

Evgeny BURYAKOV, a/k/a “Zhenya,” Worked for Russian Intelligence Under “Non-Official Cover” as a Banker in Manhattan

            Preet Bharara, the United States Attorney for the Southern District of New York, and John P. Carlin, Assistant Attorney General for National Security, announced that EVGENY BURYAKOV, a/k/a “Zhenya,” pled guilty today to conspiring to act in the United States as an agent of the Russian Federation, without providing prior notice to the Attorney General.

U.S. Attorney Preet Bharara said:  “An unregistered intelligence agent, under cover of being a legitimate banker, gathers intelligence on the streets of New York City, trading coded messages with Russian spies who send the clandestinely collected information back to Moscow.  This sounds like a plotline for a Cold War-era movie, but in reality, Evgeny Buryakov pled guilty today to a federal crime for his role in just such a scheme.  More than two decades after the end of the Cold War, Russian spies still seek to operate in our midst under the cover of secrecy.  But in New York, thanks to the work of the FBI and the prosecutors in my office, attempts to conduct unlawful espionage will not be overlooked.  They will be investigated and prosecuted.”

Assistant Attorney General John P. Carlin said: “Evgeny Buryakov pleaded guilty to covertly working as a Russian agent in the United States without notifying the Attorney General.  Foreign nations who attempt to illegally gather economic and other intelligence information through espionage pose a direct threat to U.S. national security.  The National Security Division will continue to work with our law enforcement partners to identify and hold accountable those who illegally operate as covert agents within the United States.”

According to the Complaint, the Indictment, other court filings, and statements made during court proceedings:

Beginning in 2012, bURYAKOV worked in the United States as an agent of Russia’s foreign intelligence agency, known as the “SVR.”  BURYAKOV operated under “non-official cover,” meaning he entered and remained in the United States as a private citizen, posing as an employee in the Manhattan office of a Russian bank, Vnesheconombank, also known as “VEB.”  SVR agents operating under such non-official cover – sometimes referred to as “NOCs” – typically are subject to less scrutiny by the host government, and, in many cases, are never identified as intelligence agents by the host government.  As a result, a NOC is an extremely valuable intelligence asset for the SVR.

Federal law prohibits individuals from acting as agents of foreign governments within the United States without prior notification to the United States Attorney General.  Department of Justice records indicate that BURYAKOV never notified the United States Attorney General that he was, in fact, an agent of the Russian Federation.

BURYAKOV worked in New York with at least two other SVR agents, Igor Sporyshev and Victor Podobnyy.  From November 22, 2010, to November 21, 2014, Sporyshev officially served as a trade representative of the Russian Federation in New York.  From December 13, 2012, to September 12, 2013, Podobnyy officially served as an attaché to the Permanent Mission of the Russian Federation to the United Nations.  The investigation, however, showed that Sporyshev and Podobnyy also worked as officers of the SVR.  For their roles in the charged conspiracy, Sporyshev and Podobnyy were charged along with BURYAKOV in January 2015.  However, Sporyshev and Podbonyy no longer lived in the United States and thus were not arrested.

BURYAKOV’s Co-Conspirators Are Recorded Inside the SVR’s New York “Residentura”

During the course of the investigation, the FBI recorded Sporyshev and Podobnyy speaking inside the SVR’s offices in New York, known as the “Residentura.”

The FBI obtained the recordings after Sporyshev attempted to recruit an FBI undercover employee (“UCE-1”), who was posing as an analyst from a New York-based energy company.  In response to requests from Sporyshev, UCE-1 provided Sporyshev with binders containing purported industry analysis written by UCE-1 and supporting documentation relating to UCE-1’s reports, as well as covertly placed recording devices.  Sporyshev then took the binders to, among other places, the Residentura.

During subsequent recorded conversations, Sporyshev and Podobnyy discussed, among other things, Sporyshev’s SVR employment contract and his official cover position, their work as SVR officers, and the FBI’s July 2010 arrests of 10 SVR agents in the United States, known as the “Illegals.”

Sporyshev and Podobnyy also discussed BURYAKOV’s prior service with the SVR in South Africa.  BURYAKOV worked in South Africa between approximately 2004 and 2009, officially as a representative of VEB.  During a conversation about Sporyshev’s cover position in New York, Podobnyy related that, when BURYAKOV was working in South Africa, he had dinner with an SVR official and BURYAKOV’s supervisor at VEB and that, during the dinner, the SVR official told the VEB official that BURYAKOV was an “employee of the Service,” i.e., the SVR.

Further, Sporyshev and Podobnyy were recorded discussing, among other things, their (i) attempting to recruit New York City residents as intelligence sources for Russia; (ii) tasking BURYAKOV to gather intelligence; and (iii) transmitting intelligence reports prepared by BURYAKOV back to SVR headquarters in Moscow.

The directives from the SVR to BURYAKOV, Sporyshev, and Podobnyy, as well as to other covert SVR agents acting within the United States, included requests to gather intelligence on, among other subjects, potential United States sanctions against Russian banks and the United States’ efforts to develop alternative energy resources.

BURYAKOV’s Intelligence Taskings

Sporyshev was responsible for relaying intelligence assignments from the SVR to BURYAKOV.

BURYAKOV Drafts a Proposal for the SVR’s “Active Measures Directorate”

In May 2013, Sporyshev and Podbonyy were recorded discussing a proposal that BURYAKOV had drafted about a planned deal in which Bombardier Aircraft Company (“Bombadier”) in Canada would manufacture certain airplanes in Russia.  Sporyshev noted that Canadian “unions were resisting” and that BURYAKOV’s “proposal [was] for MS” – the SVR’s Active Measures Directorate – to “pressur[e] the unions and secur[e] from the company a solution that is beneficial to us.”  Other evidence developed during the investigation showed that, around the time of this conversation, BURYAKOV had conducted Internet searches relating to Bombardier and labor unions and, earlier, had obtained news articles regarding the planned deal and also attended a conference in Canada that Bombardier personnel also attended.

BURYAKOV Assists Sporyshev in Attempting to Obtain Sensitive Information About the New York Stock Exchange

Also, on May 21, 2013, Sporyshev called BURYAKOV, greeted him, and then described a tasking from “top sources” relating to three questions that ITAR-TASS, a Russian news agency, could put to the New York Stock Exchange.  Sporyshev called the defendant back approximately 20 minutes later.  During the call, BURYAKOV proposed questions regarding (i) exchange traded funds (ETFs), including the “mechanisms of their use to destabilize the market;” (ii) “curbing of trading robot activities;” and (iii) “technical parameters” and “other regulations directly related to the exchange.”  On July 8, 2013, a purported “bureau chief” for ITAR-TASS sent an email to an employee of the New York Stock Exchange that parroted the questions that BURYAKOV proposed to Sporyshev.

BURYAKOV Assists Sporyshev in Analyzing the Effect of Sanctions

Another example of an intelligence tasking occurred in late March 2014.  Specifically, on March 28, 2014, Sporyshev was recorded telling BURYAKOV that Sporyshev needed help researching the “effects of economic sanctions on our country,” among other things.  A few days later, on April 2, 2014, Sporyshev called BURYAKOV and stated, in an intercepted conversation, that he had not seen BURYAKOV in a while, and asked to meet BURYAKOV outside VEB’s office in Manhattan in 20 minutes.  A court-authorized search of BURYAKOV’s computer at VEB revealed that, at around the time of this telephone call, BURYAKOV conducted the following internet searches: “sanctions Russia consiquences” [sic] and “sanctions Russia impact.”

Two days later, on April 4, 2014, BURYAKOV called Sporyshev and, in an intercepted conversation, stated that he (BURYAKOV) “wrote you an order list,” and suggested that they meet.  Approximately 20 minutes later, Sporyshev met BURYAKOV in the driveway of BURYAKOV’s home.  Their encounter, which was captured by a video surveillance camera located near BURYAKOV’s residence, lasted approximately two minutes.  On the video footage, the defendants appeared to exchange a small object.

Clandestine Meetings and Communications

During the course of their work as covert SVR agents in the United States, BURYAKOV, Sporyshev, and Podobnyy regularly met and communicated using clandestine methods and coded messages, in order to exchange intelligence-related information while shielding their associations with one another as SVR agents.  These efforts were designed, among other things, to preserve their respective covers as an employee of VEB (BURYAKOV), a trade representative of the Russian Federation in New York (Sporyshev), and an attaché to the Permanent Mission of the Russian Federation to the United Nations (Podobnyy).

During the investigation, the FBI intercepted numerous calls between BURYAKOV and Sporyshev in which one of the men told the other that he needed to meet for some purpose, such as to transfer an item (such as a “ticket,” “book,” or “list,”) or for a purported social purpose.  In fact, BURYAKOV and Sporyshev used this coded language to signal that they needed to exchange intelligence information.

FBI surveillance revealed that, at some of these meetings between BURYAKOV and Sporyshev, they exchanged documents or other small items.  Notably, despite discussing on approximately a dozen occasions the need to meet to transfer “tickets,” BURYAKOV and Sporyshev were – other than one occasion where they discussed going to a movie – never observed attending, or discussing in any detail, events that would typically require tickets, such as a sporting event or concert.

BURYAKOV’s Receipt of Purported Official United States Government Documents

In the summer of 2014, BURYAKOV met multiple times with a confidential source working for the FBI (“CS-1”) and an FBI undercover employee (“UCE-2”).  Both CS-1 and UCE-2 purported to be working on a casino development project in Russia.

During a conversation recorded on July 22, 2014, Sporyshev warned BURYAKOV that meeting with UCE-2 might be a “trap” but authorized BURYAKOV to go ahead so he could make a better assessment.

During the course of the subsequent meetings, and consistent with his interests as a Russian intelligence agent, BURYAKOV demonstrated his strong desire to obtain information about subjects far outside the scope of his work as a bank employee.  During these meetings, BURYAKOV also accepted documents that were purportedly obtained from a U.S. government agency and which purportedly contained information potentially useful to Russia, including information about United States sanctions against Russia.

*                *                *

            BURYAKOV, 41, pled guilty to one count of conspiring to act in the United States as an agent of the Russian Federation without providing notice to the Attorney General, which carries a maximum sentence of five years.  This statutory maximum sentence is prescribed by Congress and is provided here for informational purposes only, as any sentence imposed on the defendant will be determined by the judge.

BURYAKOV will be sentenced on May 25, 2016, at 11:00 a.m.

U.S. Attorney Bharara praised the investigative work of the FBI’s Counterintelligence Division.

The prosecution is being handled by Assistant U.S. Attorneys Emil J. Bove III, Brendan F. Quigley, and Stephen J. Ritchin of the Terrorism and International Narcotics Unit of the U.S. Attorney’s Office for the Southern District of New York, with assistance provided by Senior Trial Attorney Heather Schmidt of the National Security Division’s Counterintelligence and Export Control Section.

From Space, China’s Cyber-Warriors, PLA

Image result for pla china cyber  PLA Unit 61398  Operation Shady Rat

Primer: Xi Jinping to visit president Trump, hum…..will this be a topic?

China’s external strategies in cyberspace – as distinct from its internal social control policies – can be divided into two parts: the first, before late 2015; the second, after that point. The most notable transition, from the U.S. perspective, has been the agreement to foreswear commercial cyberespionage.

Less well noted, but of comparable importance, has been the formation of its Strategic Support Force, which has combined the cyber warriors of the Chinese People’s Liberation Army (PLA), its electronic warriors, and a large chunk of those conducting intelligence, surveillance, and reconnaissance, notably from space.

  FreeBeacon

China Pivots its Hackers from Industrial Spies to Cyber Warriors

Levi Maxey:

China continues to deploy military equipment to contested islands in the South China Sea, raising concerns among regional players and U.S. forces stationed in the Pacific.

A Chinese government strategy document published last month by China’s state-owned news agency Xinhua signals that Beijing is building up its military cyber capabilities. It says that China will “expedite the development of a cyber force and enhance capabilities… to prevent major cyber crisis, safeguard cyberspace security and maintain national security and social stability.”

To be sure, the Chinese document acknowledges that its activities in cyberspace could aggravate tensions with the U.S. and other major powers. It says that “the tendency of militarization and deterrence buildup in cyberspace is not conducive to international security and mutual trust” – seemingly a direct response to the April 2015 Pentagon strategy report strongly emphasizing that the U.S. must build up its offensive capabilities to deter adversaries from engaging in malicious activity in cyberspace.

Given China’s past espionage in cyberspace, its move from economic theft towards militarization in the virtual domain represents a pivot that Washington could regard as threatening. While issues of trade and North Korea are likely to consume much of the discussion during this week’s summit between Chinese President Xi Jinping and President Donald Trump, the growth of cyberspace as a battlefield domain could also be a point of focus. What is China’s history in cyberspace in relation to the United States, and what has led to this change in policy?

Chinese leaders perceive cyberspace as a means of advancing economic growth, preserving the Chinese Communist Party, and maintaining stability and national security. Adam Segal, director of the digital and cyberspace policy program at the Council on Foreign Relations, argues that Chinese state-sponsored hackers seek to steal foreign technology via cyber espionage, weaken domestic opposition to the regime, and offset U.S. conventional military supremacy.

Despite some instances of political and counter-intelligence collection – such as the 2015 breach of the U.S. Office of Personnel Management and the alleged hacking into the 2008 presidential campaigns of former President Barack Obama and Sen. John McCain (R-Az) – Chinese cyber espionage has focused largely on the theft of intellectual property, trade secrets, and other sensitive commercial information. Its chief aim has been to boost Chinese economic competitiveness.

In 2010, Gen. Keith Alexander, then U.S. Cyber Commander and director of the National Security Agency, said that, “our intellectual property here is about $5 trillion. Of that, approximately $300 billion is stolen over the networks per year.” He called this theft “the greatest transfer of wealth in history.” By 2013, U.S. officials had begun publically decrying China’s economic espionage, only to be faced with denial from Beijing. In 2014, the Department of Justice obtained indictments against five members of the Chinese People’s Liberation Army (PLA), charging them with using computer network operations to commit commercial espionage.

Not long after, the U.S. threated China with sanctions and potential cancellation of a planned summit in September 2015 between President Xi and then-President Obama. Negotiators were quickly dispatched and the event went forward. During the summit both countries announced an accord, commonly referred to as the Xi Agreement, in which they agreed that “neither country’s government will conduct or knowingly support cyber-enabled theft of intellectual property, including trade secrets or other confidential business information, with the intent of providing competitive advantages to companies or commercial sectors.”

The Xi Agreement was shocking in that China implicitly acknowledged having conducted economic espionage in the past and agreed to stop doing it. Many observers were skeptical that the Chinese would abide by the pact, but a report by Mandiant, now a branch of the American cyber security firm FireEye, found a notable decline in Chinese hackers targeting U.S. companies – which suggests that the Chinese were taking the accord seriously.

However, according to Chris Porter, manager of FireEye’s Horizons team, “while appearing as a significant diplomatic victory for the Obama administration, in reality China simply agreed to stop doing operations that it didn’t want to continue anyway.” He notes that Chinese hackers were often moonlighting as for-hire-hackers, sometimes even targeting Chinese companies. At the time, President Xi was in the midst of a robust anti-corruption campaign while also centralizing power, including in cyberspace, under his control.

Porter argues that “Chinese leaders are heeding a lesson about the limitations of cyber espionage that stems from the fall of the Soviet Union: you cannot steal your way to innovation.” China hopes eventually to become a world leader in cutting-edge research, he says, so it “wants to live in a world where patents are respected and its own claims are viewed as legitimate and untainted by accusations of intellectual property theft.”

Martin Libicki, the Keyser Chair of cybersecurity studies at the U.S. Naval Academy, says that ultimately, “A combination of declining returns and increasing risks on the one hand and the prospects of U.S. sanctions on the other led Chinese President Xi Jinping to agree to end Chinese commercial cyber espionage against first the United States, then the United Kingdom, and finally the other G-20 nations.” Chinese hackers are still conducting some business-focused espionage and recently have intensified their targeting of Russian officials and institutions. But they seem focused on gleaning intelligence on military capabilities and on government officials who interact with business executives.

Furthermore, the Chinese People’s Liberation Army (PLA) elevated cyber operations under the Strategic Support Force in December 2015, placing the virtual domain on par with other branches of the military. “The best guess,” Libicki says, “is that Chinese cyber warfare will be focused on supporting conventional military operations as opposed to assuming an independent role in strategic warfare, as U.S. Cyber Command seems to be doing, or to bolster information operations, as Russia seems to be doing.”

The U.S. may use its cyber capabilities for “left-of-launch” missile defense against North Korea – meaning, sabotaging planned missile launches before they happen – and to disrupt ISIS communications.

By contrast, China is consumed by fears of a massive U.S. military intervention in Asia. Beijing is building up its anti-access and area-denial (A2/AD) military strategy in the South China Sea by adding cyber and electronic warfare capabilities meshed into what is referred to as “Integrated Network-Electronic Warfare.” A report published by the NATO Cooperative Cyber Defence Centre of Excellence in Tallinn maintains that PLA units responsible for electronic warfare are taking on the role of running computer network operations as well.

China’s “strategy consists of neutralizing the logistics and communications infrastructure that permits U.S. forces to operate so far from home,” Libicki says, and is “pursuing the ability to corrupt U.S. information systems – notably, those for military logistics – and disrupt the information links associated with command and control.”

Such network and electronic attacks could target the U.S. military or regional allies’ early warning radar systems and could cause blind spots in U.S. command and control systems. The PLA could use these blind spots to deploy sorties or launch ballistic missile strikes. It could deliver these capabilities early in hostilities, integrated with technologies that could sabotage U.S. weapons systems, or even U.S. critical infrastructure, so that U.S. forces could not respond in a timely way.

To accomplish effective cyber attacks on U.S. command, control and communications platforms, or any advanced systems, the PLA would have to conduct cyber reconnaissance ahead of time. China has already begun to probe some potential targets, including elements of the U.S. power grid and review the designs of weapons systems such as the F-35 combat aircraft, the Patriot missile defense system, and U.S. Navy littoral combat ships.

“Because China, like other nations, has had far less practice at cyber warfare than cyber espionage, it is harder to anticipate its intentions and plans,” says Libicki. China’s efforts to augment kinetic assaults with cyber and electronic warfare could escalate a conflict by setting up a scenario in which adversaries might view espionage as a step toward war.

 

Unmasker/Leaker, was it Susan Rice?

Primer: On Septmber 12, 1992, Susan Rice married her Stanford romantic interest, Ian Cameron, who was working as a television producer in Toronto for the Canadian Broadcasting Corporation. The couple lived in Canada until 1993, when Rice took a job with the National Security Council in Washington, D.C., under President Clinton.

The 5 Sunday talk shows, Benghazi was due to an video lady, who also told us that Bowe Bergdahl served with honor and distinction…yeah that was Susan Rice….

    

Social media blew up late Sunday night with the notion that Susan Rice was the leaker. Okay, so is there evidence? Well, no smoking gun yet…but where are the dots leading us?

Mike Cernovich is a journalist, documentary filmmaker, wrote a piece that pointed to Ambassador Rice, who was also on president Obama’s national security council at the White House.

Susan Rice, who served as the National Security Adviser under President Obama, has been identified as the official who requested unmasking of incoming Trump officials, Cernovich Media can exclusively report.

The White House Counsel’s office identified Rice as the person responsible for the unmasking after examining Rice’s document log requests. The reports Rice requested to see are kept under tightly-controlled conditions. Each person must log her name before being granted access to them. Upon learning of Rice’s actions, H. R. McMaster dispatched his close aide Derek Harvey to Capitol Hill to brief Chairman Nunes.

 ***

The U.S. intelligence official who “unmasked,” or exposed, the names of multiple private citizens affiliated with the Trump team is someone “very well known, very high up, very senior in the intelligence world,” a source told Fox News on Friday.

Intelligence and House sources with direct knowledge of the disclosure of classified names told Fox News that House Intelligence Committee Chairman Devin Nunes, R-Calif., now knows who is responsible — and that person is not in the FBI.

***

Resurgent writes for us: Susan Rice Sought Trump Data From Intelligence Reports. Is This Why The CIA Wanted Ezra Cohen-Watnick Ousted?

Eli Lake has an explosive report on who in the Obama Administration was seeking Trump staffers’ names in intelligence reports. Turns out it was Susan Rice.

White House lawyers last month discovered that the former national security adviser Susan Rice requested the identities of U.S. persons in raw intelligence reports on dozens of occasions that connect to the Donald Trump transition and campaign, according to U.S. officials familiar with the matter.

The pattern of Rice’s requests was discovered in a National Security Council review of the government’s policy on “unmasking” the identities of individuals in the U.S. who are not targets of electronic eavesdropping, but whose communications are collected incidentally. Normally those names are redacted from summaries of monitored conversations and appear in reports as something like “U.S. Person One.”

Now, there is an interesting other nugget in Lake’s report.

The person charged with investigating the unmasking was Ezra Cohen-Watnick, the National Security Council’s senior director of intelligence. This is relevant because of this report from the Politico.

President Donald Trump has overruled a decision by his national security adviser, Lt. Gen. H.R. McMaster, to sideline a key intelligence operative who fell out of favor with some at the Central Intelligence Agency, two sources told POLITICO. On Friday, McMaster told the National Security Council’s senior director for intelligence programs, Ezra Cohen-Watnick, that he would be moved to another position in the organization.

So the guy who uncovers Rice’s connection suddenly falls out of favor with the CIA, which pressures McMaster to remove him?

Hmmmm . . .

What are the odds of that?

*** More from Bloomberg:

Rice’s requests to unmask the names of Trump transition officials does not vindicate Trump’s own tweets from March 4 in which he accused Obama of illegally tapping Trump Tower. There remains no evidence to support that claim.

But Rice’s multiple requests to learn the identities of Trump officials discussed in intelligence reports during the transition period does highlight a longstanding concern for civil liberties advocates about U.S. surveillance programs. The standard for senior officials to learn the names of U.S. persons incidentally collected is that it must have some foreign intelligence value, a standard that can apply to almost anything. This suggests Rice’s unmasking requests were likely within the law.

The news about Rice also sheds light on the strange behavior of Nunes in the last two weeks. It emerged last week that he traveled to the White House last month, the night before he made an explosive allegation about Trump transition officials caught up in incidental surveillance. At the time he said he needed to go to the White House because the reports were only on a database for the executive branch. It now appears that he needed to view computer systems within the National Security Council that would include the logs of Rice’s requests to unmask U.S. persons.

The ranking Democrat on the committee Nunes chairs, Representative Adam Schiff, viewed these reports on Friday. In comments to the press over the weekend he declined to discuss the contents of these reports, but also said it was highly unusual for the reports to be shown only to Nunes and not himself and other members of the committee.

Indeed, much about this is highly unusual: if not how the surveillance was collected, then certainly how and why it was disseminated.

Bomb in Briefcase, Train Station, Russia, Multiple Deaths

Reuters is reporting:

General view of emergency services attending the scene outside Sennaya Ploshchad metro station. REUTERS/Anton Vaganov

Surveillance cameras in St Petersburg’s metro system may have captured images of the person suspected of organizing Monday’s deadly train blast, Russian news agency Interfax quoted a source as saying.

“Images of the suspected organizer of the metro blast were captured on metro station cameras,” the source said.

The explosive device may have been left in a briefcase in a metro train carriage, the source added. Russian President Vladimir Putin said on Monday the government was considering all possible causes for the blasts in St Petersburg’s metro system, including terrorism. Russian security agencies found an explosive device at a metro station in central St Petersburg and made it safe, the National Anti-Terrorist Committee said in a statement on Monday.

 The Committee also said that nine people were killed and 20 injured in the blast, which took place as a train traveled between the “Sennaya Ploshchad” and “Tekhnologichesky Institut” stations.

At least nine people were killed and 20 were injured when an explosion tore through a train carriage in the St.Petersburg metro system on Monday, the Russian National Anti-Terrorist Committee said.

Interfax news agency quoted an unnamed source as saying the blast, which occurred when the train was between two stations, was caused by a bomb filled with shrapnel.

President Vladimir Putin, who was in the city for a meeting with Belarus’s leader, said he was considering all possible causes for the blast, including terrorism and was consulting with security services.

Ambulances and fire engines descended on the concrete-and-glass Sennaya Ploshchad metro station. A helicopter hovered overhead as crowds gathered to observe rescue operations.

“I appeal to you citizens of St. Petersburg and guests of our city to be alert, attentive and cautious and to behave in a responsible matter in light of events,” St Petersburg Governor Georgy Poltavchenko said in an address.

An attack on St Petersburg, Russia’s old imperial capital, would have some symbolic force for any militant group, especially Islamic State or Chechen secessionist rebels. Attacks in the past have largely concentrated on Moscow, including an attack on an airport, a theatre and in 2010 a metro train.

Video showed injured people lying bleeding on a platform, some being treated by emergency services and fellow passengers. Others ran away from the platform amid clouds of smoke, some screaming or holding their hands to their faces.

A huge hole was blown open in the side of a carriage with metal wreckage strewn across the platform. Passengers were seen hammering at the windows of one closed carriage. Russian TV said many had suffered lacerations from glass shards and metal.

Russia has been the target of attacks by separatist Islamist Chechen militants in past years. Islamic State, which has drawn recruits from the ranks of Chechen rebels, has also threatened attacks across Russia in retaliation for Russian military intervention in Syria.

The Russian air force and special forces have been supporting President Bashar al-Assad in fighting rebel groups and Islamic State fighters now being driven out of their Syrian strongholds.

ALL STATIONS CLOSED

St. Petersburg emergency services at first said that there had been two explosions. But a source in the emergency services later said that there had been only one but that the explosion had occurred in a tunnel between stations.

The blast occurred at 2.40 p.m., well shy of the evening rush hour.

Authorities closed all St. Petersburg metro stations. The Moscow metro said it was taking unspecified additional security measures in case of an attack there.

Russia has been on particular alert against Chechen rebels returning from Syria and wary of any attempts to resume attacks that dogged the country several years ago.

At least 38 people were killed in 2010 when two female suicide bombers detonated bombs on packed Moscow metro trains.

Over 330 people, half of them children, were killed in 2004 when police stormed a school in southern Russia after a hostage taking by Islamist militants. In 2002, 120 hostages were killed when police stormed a Moscow theatre to end another hostage-taking.

Putin, as prime minister, launched a 1999 campaign to crush a separatist government in the Muslim southern region of Chechnya, and as president continued a hard line in suppressing rebellion.

*** Update:

Photo of the person looking for criminal investigation in connection with the bombing […] One of the blasts came from a device filled with shrapnel, Sky News reported. An unexploded device turned up at a different subway station rigged with shrapnel and up to 2.2 pounds of explosives, according to the Interfax news agency.

 

U.S. Israel Facing Down Iran in Syria, Golan, Yemen

Over the past six years, Iran has played a key role in propping up the embattled regime of Bashar al-Assad in Syria, by sending Islamic Revolution Guards Corps (I.R.G.C.) military personnel as well as recruiting, funding, training and leading an extensive network of Iraqi, Lebanese, Pakistani and Afghan Shiite militia forces. Now that Iran’s ally in Damascus is in control of Syria’s key population centers, the Islamic Republic and its regional proxies are already planning to consolidate their presence in Syria for the long haul to secure Tehran’s geopolitical interests in the broader region. This has alarmed the United States and regional countries – particularly Israel, which is increasingly worried about the presence and influence of the Lebanese Hezbollah and other Iran-backed forces along its northern border with Syria. One prominent Iran-controlled militia group, for example, announced earlier this month that it had created a new brigade of well-trained combatants to fight Israel and reclaim the strategic Golan Heights from the Jewish state.

Israel, the real enemy 

On March 29, Harakat al-Nujaba, an Iraqi militia group that fights under the I.R.G.C.’s leadership in both Iraq and Syria, said that Israel, not Sunni militants, is the real enemy and sought Damascus’s permission to fight Israeli forces stationed in the Golan region. “The Golan Liberation Brigade will fight shoulder to shoulder with its brothers in the Syrian Army. The axis of resistance is working on the main goal, which is the Palestinian issue. And these efforts have a great impact on reshaping the regional map by annihilating the occupying Zionist regime,” Nasr al-Shammari, the Nujaba’s deputy military chief said in an interview with Iran’s Mehr News Agency. “The weapons of the resistance and Islamic and Arab armies should target this regime. With this in mind, the Harakat al-Nujaba announced that a brigade should be set up to liberate Golan,” he added. “If this regime is destroyed, regional problems will be resolved completely.”

Shammari also claimed that Shiite militia groups forced the “occupying” U.S. forces to withdraw from Iraq and are able to replicate that success against Israel. “We are waiting to confront the Zionist regime instead of combating Takfiri groups in the region and their evil arms.”

Golan Liberation Brigade 

The Nujaba movement announced three weeks ago that it had established a new brigade to seize the Golan Heights – claiming that “latest victories” against the Islamic State and Sunni rebels in Iraq and Syria have allowed the group and its allies to focus on Israel. Leaders of the group claimed that members of the new brigade are highly-trained, well-equipped and capable of fighting the Jewish state. “Israel is weaker than a spider web. Islamic resistance is capable of confronting the axis of evil and annihilating the occupying Zionist regime,” Nujaba’s Secretary-General Akram al-Kaabi told Lebanon-based Arabic-language al-Mayadeen news network.

Image result for Golan Liberation Brigade

The creation of the Golan Liberation Brigade further alarmed Israeli leaders about the increasing presence and influence of the Lebanese Hezbollah and other I.R.G.C.-supported groups in southwestern Syria. Israeli Prime Minister Benjamin Netanyahu during his recent trip to Moscow sought assurances from Russian President Vladimir Putin to prevent Iran from taking advantage of the conflict in Syria to station its proxies permanently on Israel’s northern border. “I made it clear to President Putin our resolute opposition to the consolidation of Iran and its proxies in Syria,” he told reporters after the meeting. “We see Iran trying to build a military force, military infrastructure, with the intention to be based in Syria, including the attempt by Iran to build a seaport. All this has serious implications in terms of Israel’s security.”

Given Israel’s military superiority in the region, Iranian proxies cannot seize the strategic Golan region. Also, the regime of Bashar al-Assad is still fighting for its survival against a wide range of Sunni rebel groups and is unlikely to engage in a self-defeating war with Israel. But Israeli leaders are worried that Iran and its proxies are expanding the Southern Lebanon front to the Golan Heights – threatening Israel’s security and stability. The fact that Iranian-sponsored Iraqi militia groups and the Afghan Fatemiyoun Division fighting in Syria have close operational links with Hezbollah, has added to Israeli concerns. Moreover, senior I.R.G.C. commanders have recently visited the Syrian-controlled regions of the Golan Heights on military and reconnaissance missions.

I.R.G.C. commanders have talked about helping Damascus reclaim the Golan region from Israel for almost three decades. Last year, Brigadier General Ali Asghar Gorjizadeh, a senior I.R.G.C. commander and a veteran of the Iran-Iraq war, claimed that the Syrian government had refused Tehran’s offer in the 1980s to send an I.R.G.C. battalion to help the Syrian Army to “liberate” the Golan Heights. But he explained that the I.R.G.C. has, over the past decades, used the Syrian territory to train anti-Israel “resistance forces,” particularly the Lebanese Hezbollah. And now that the six-year Syrian civil war has allowed the I.R.G.C. to gain a significant military footprint inside Syria, it is no surprise that the I.R.G.C. will seek to use its powerful Shiite proxies such as the Nujaba group to threaten the Israeli security.

Regional Threat 

The remarks by Nujaba leaders also indicate that the mission of Iran-sponsored Shiite militia groups will not remain limited to Iraq and Syria. Nor will the group only threaten the security of Israel in the future. I.R.G.C.-affiliated militia commanders in Iraq, for example, have already turned attention to their Iraqi rivals as the Islamic State is on the verge of collapse in Mosul. They have also made threats against regional Sunni states, particularly Saudi Arabia. Recent reports also suggest that the I.R.G.C. and Hezbollah are increasingly training and deploying Afghan and Arab Shiite militiamen to support Houthi rebels in Yemen. Iraqi Popular Mobilization (P.M.F) units with close ties with Iran have also stepped up anti-American propaganda in Mosul and across Iraq – posing threat to the safety of American military advisers that are helping the Iraqi security forces on the ground.

Image result for Harakat al-Nujaba SouthFront

Harakat al-Nujaba 

Harakat al-Nujaba – also known as Harakat Hezbollah al-Nujaba – is a prominent Iraqi sectarian group that operates under the leadership of I.R.G.C. Quds Force commander Qassem Soleimani. It has been fighting in Syria since 2013. The leader of the group, Akram al-Kaabi, makes no secret of his allegiance to Iran’s Supreme Leader Ali Khamenei or his close relationship with Soleimani. The I.R.G.C. uses the Nujaba group and other powerful Shiite units within Iraq’s Popular Mobilization Forces (P.M.F.) not just to fight the Islamic State, but also as a pressure tool against the Baghdad government, regional Sunni states, and the United States. Kaabi once famously stated that his forces would topple the Baghdad government if ordered by Khamenei. Unlike some other P.M.F. units that receive their political and religious guidance from Iraq’s top cleric Grand Ayatollah Ali Sistani, Kaabi has repeatedly made it clear that he only emulates Khamenei. Kaabi has recently declared that he will deploy more forces Syria to fight alongside the I.R.G.C. forces and Syrian Army once the Islamic State is defeated in Mosul.

Anti-American, anti-Israeli propaganda 

Recently, the I.R.G.C.-affiliated media outlets have raised the profile of the Nujaba group, and senior Iranian leaders have held meetings with its top commanders. Indeed, the press conference in which Nujaba announced the creation of  the Golan Liberation Brigade was organized by the Tasnim News Agency, which is a prominent I.R.G.C. media outlet. By focusing their propaganda against the U.S. and describing Israel as the “real enemy,” Iranian leaders are trying to justify their involvement in foreign conflicts and to convince the Iranian people and Muslims around the world that the Islamic Republic is the standard-bearer and true defender of Islam. But such claims ring hollow when most victims of the I.R.G.C.’s military adventurism and proxy wars are Muslims.

***

‘Al-Sharq Al-Awsat’ Report Specifies Locations Of Foreign Military Bases In Syria, Says Syria Is Turning Into Brittle Federation That Can Fall Apart At Any Moment

MEMRI: On March 14, 2017, the London-based daily Al-Sharq Al-Awsat published a report giving the location of military bases of various foreign forces in Syria, including the U.S., Russian and Turkish forces. According to the report, the locations of the bases reflect the influence-zone of each country, and that Syria is gradually becoming a loose federation of ethnic states that can fall apart at any moment.

The following are excerpts from the report:

Source: infopls.com

“In the lost time between the Geneva and Astana conferences, the superpowers turned to expand their influence-zones in Syria by establishing numerous military bases which, according to experts, effectively pave the way towards a political solution based on a federation and the division [of Syria]. Until now Moscow and Washington were the major players in this theatre alongside Iran, but recently Ankara decided to establish many military bases of its own in the region known as the Shield of the Euphrates, in order to ensure itself a front-row seat at the international negotiation table…

“Russia is the only [country] that has [openly] announced more than once that it has two bases [in Syria]: an airbase in Khmeimim in the Latakia area and a naval base in Tartus, which is its only [base] on the Mediterranean and is planned to be its biggest naval base… According to various sources, Moscow  recently expanded its presence in Damascus, in the rural area east of Homs and in the rural area [near] Aleppo, and there are [also] Russian headquarters in the Kurdish-held areas in northern Syria that are part of the American influence-zone.

“Washington is keeping mum about the location of [its forces] in Syria [that number] over 900 troops. Last week it announced it was dispatching 400 Marines to Syria in order to support local forces in the battle for Al-Raqqa, the stronghold of the ISIS organization. According to reports, the [U.S.] troops that arrived began establishing a military base from which artillery attacks will be made on ISIS positions 32 km away. The U.S. has established its military bases in northern Syria, mostly in the areas controlled by their allies, the Kurdish People’s Protection Units. The most prominent of these bases are Rmeilan Base in the northeastern tip [of the country], near the Iraqi border, and a base that has been established in the city of ‘Ain Al-Arab (Kobane). According to Kurdish sources, the Americans have other bases in Syria, one of them in Hassakah.

“The single British base in Syria is in near Al-Tanf on Syria’s border with Jordan and Iraq, in the Al-Hamad desert region in the southeast of Homs district, 240 km from Palmyra.

“Iran has two military bases [in Syria], one in the Damascus international airport, which is the headquarters of Iran’s Islamic Revolutionary  Guards Corps (IRGC) [in Syria], and another in the Azzan Mountain [area] near Aleppo.”