An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.

Hey Secret Service, Check it out While in Singapore

10 Best Things to Do in Sentosa Island - Best Attractions ... photo

So, while the United States is finding a discreet way to pay for Kim Jung Un’s travel and hotel stay in Singapore on Sentosa Island as North Korea is cash strapped…ah yeah sure, there are some other things going on in Singapore and Malaysia.

Let’s begin a few years ago. Sit back with this article, it is long but perspective and context is required.

Malaysian authorities shutter two North Korean companies ... photo

(Note, it is allegedly closed, or Singapore denies it, but Secret Service check it all out)

(Reuters) – It is in Kuala Lumpur’s “Little India” neighborhood, behind an unmarked door on the second floor of a rundown building, where a military equipment company called Glocom says it has its office.

Glocom is a front company run by North Korean intelligence agents that sells battlefield radio equipment in violation of United Nations sanctions, according to a United Nations report submitted to the Security Council seen by Reuters.

Reuters found that Glocom advertises over 30 radio systems for “military and paramilitary” organizations on its Malaysian website, glocom.com.my.

Glocom’s Malaysian website, which was taken down late last year, listed the Little India address in its contacts section. No one answers the door there and the mailbox outside is stuffed with unopened letters.

In fact, no company by that name exists in Malaysia. But two Malaysian companies controlled by North Korean shareholders and directors(also known as a Nominee Director) registered Glocom’s website in 2009, according to website and company registration documents.

And it does have a business, the unreleased U.N. report says. Last July, an air shipment of North Korean military communications equipment, sent from China and bound for Eritrea, was intercepted in an unnamed country. The seized equipment included 45 boxes of battlefield radios and accessories labeled “Glocom”, short for Global Communications Co.

Glocom is controlled by the Reconnaissance General Bureau, the North Korean intelligence agency tasked with overseas operations and weapons procurement, the report says, citing undisclosed information it obtained.

A spokesman for North Korea’s mission at the U.N. told Reuters he had no information about Glocom.

U.N. resolution 1874, adopted in 2009, expanded the arms embargo against North Korea to include military equipment and all “related materiel”.

But implementation of the sanctions “remains insufficient and highly inconsistent” among member countries, the U.N. report says, and North Korea is using “evasion techniques that are increasing in scale, scope and sophistication.”

Malaysia is one of the few countries in the world which had strong ties with North Korea. Their citizens can travel to each other’s countries without visas. But those ties have begun to sour after North Korean leader Kim Jong Un’s estranged half-brother was murdered at Kuala Lumpur’s international airport on Feb 13.

PAN SYSTEMS

According to the “WHOIS” database, which discloses website ownership, Glocom.com.my was registered in 2009 by an entity called International Global System using the “Little India” address. A similarly named company, International Golden Services is listed as the contact point on Glocom’s website.

Glocom registered a new website, glocom-corp.com, in mid-December, this one showing no Malaysian contacts. Its most recent post is dated January, 2017 and advertises new products, including a remote control system for a precision-guided missile.

Glocom is operated by the Pyongyang branch of a Singapore-based company called Pan Systems, the U.N. report says, citing an invoice and other information it obtained.

Louis Low, managing director of Pan Systems in Singapore said his company used to have an office in Pyongyang from 1996 but officially ended relations with North Korea in 2010 and was no longer in control of any business there.

“They use (the) Pan Systems (name) and say it’s a foreign company, but they operate everything by themselves,” Low told Reuters referring to the North Koreans at the Pyongyang office.

Pan Systems Pyongyang utilized bank accounts, front companies and agents mostly based in China and Malaysia to buy components and sell completed radio systems, the U.N. report says. Pan Systems Pyongyang could not be reached for comment.

One of the directors of Pan Systems Pyongyang is Ryang Su Nyo. According to a source with direct knowledge of her background, Ryang reports to “Liaison Office 519”, a department in the Reconnaissance General Bureau. Ryang is also listed as a shareholder of International Global System, the company that registered Glocom’s website.

Reuters has not been able to contact Ryang.

SMUGGLING CASH

Ryang frequently traveled to Singapore and Malaysia to meet with Pan Systems representatives, the U.N. report says.

On one such trip in February 2014, she and two other North Koreans were detained in Malaysia for attempting to smuggle $450,000 through customs at Kuala Lumpur’s budget airport terminal, two sources with direct knowledge of the situation told Reuters.

The North Korean trio told Malaysian authorities they all worked for Pan Systems and the cash belonged to the North Korean embassy in Kuala Lumpur, according to the two sources.

The Malaysian Attorney General decided not to press charges because of insufficient evidence. A week later, the trio was allowed to travel, and the North Korean embassy claimed the cash, the sources said. All three had passports assigned to government officials, the sources said.

Malaysia’s Customs Department and the Attorney General’s office did not respond to requests for comment over the weekend.

The Pan Systems representative in Kuala Lumpur is a North Korean by the name of Kim Chang Hyok, the U.N. report says.

Kim, who also goes by James Kim, was a founding director of International Golden Services, the company listed in the contacts section of the Glocom website. Kim is director and shareholder of four other companies in Malaysia operating in the fields of IT and trade, according to the Malaysian company registry.

He did not respond to requests for comment by mail or email.

The United Nations panel, which prepared the draft report, asked the Malaysian government if it would expel Kim and freeze the assets of International Golden Services and International Global System to comply with U.N. sanctions. The U.N. did not say when it made the request.

“The panel has yet to receive an answer,” the report said.

Reuters has not received a response from the Malaysian government to repeated requests for comment about Glocom.

POLITICAL CONNECTION

One of Glocom’s early partners in Malaysia was Mustapha Ya’akub, a prominent member of Malaysia’s ruling United Malays National Organisation (UMNO). Since 2014, he has been listed as a director of International Golden Services

As secretary of the UMNO youth wing’s international affairs bureau, Mustapha fostered political connections in the 1990s with countries, such as Iran, Libya and North Korea. Glocom’s Little India address once housed a company owned by UMNO Youth.

Mustapha, 67, said he had been a Glocom business partner “many years back” and said it has been continuously controlled by several North Koreans, including Kim Chang Hyok, whom he said he knew. He did not divulge his role in the company, and denied any knowledge of Glocom’s current business.

“We thought at the time it might be a good idea to go into business together,” Mustapha told Reuters about his first meeting with his North Korean business contacts. He did not say who those contacts were or what they discussed. He denied any knowledge of Glocom’s current business.

Glocom advertises and exhibits its wares without disclosing its North Korean connections.

“Anywhere, Anytime in Battlefield,” reads the slogan on one of several 2017 Glocom catalogs obtained by Reuters.

An advertisement in the September 2012 edition of the Asian Military Review said Glocom develops radios and equipment for “military and paramilitary organizations”.

A spokesman for the magazine confirmed the ad had been bought by Glocom, but said the magazine was unaware of its alleged links to North Korea.

Glocom has exhibited at least three times since 2006 at Malaysia’s biennial arms show, Defence Services Asia (DSA), according to Glocom’s website.

At DSA 2016, Glocom paid 2,000 ringgit ($450) to share a table in the booth of Malaysia’s Integrated Securities Corporation, its director Hassan Masri told Reuters by email.

Hassan said he had nothing to do with Glocom’s equipment and was unaware of its alleged links to North Korea.

Aside from the North Koreans behind Glocom, clues on its website also point to its North Korean origins.

For instance, one undated photo shows a factory worker testing a Glocom radio system. A plaque nearby shows the machine he is using has won a uniquely North Korean award: The Model Machine No. 26 Prize,” named in honor of late leader Kim Jong Il, who is said to have efficiently operated “Lathe No. 26” at the Pyongyang Textile Factory when he was a student.

*** It gets worse.

Executive Summary

In April 2018, Recorded Future published research on the internet browsing behavior of North Korea’s most senior leaders and revealed stark changes in how North Korea’s ruling elite utilize the internet from our original analysis in July 2017. Utilizing a data set spanning from December to mid-April, we compiled a significant amount of information on North Korea’s technology architecture, including which types, manufacturers, and models of hardware and software North Korean leaders used to access the internet.

Our analysis reveals the overwhelming presence of American hardware and software on North Korean networks and in daily use by senior North Korean leaders. We also examined the broad legal regime that restricts U.S. trade with North Korea and discovered that it is insufficient to prevent U.S. electronics, hardware, and software from reaching North Korea.

Key Judgements

  • This failure to keep American technology from reaching North Korea has enabled North Korea’s destabilizing, disruptive, and destructive cyber operations as well as its internet-enabled circumvention of international sanctions.
  • International inconsistency in the definition of the term “luxury goods” has also facilitated the Kim regime’s acquisition of American technology.
  • For seven years, between 2002 and 2017, the United States allowed the exportation of “computer and electronic products” to North Korea, totaling more than $430,000. Our analysis demonstrates that many of the electronic devices North Korean elite utilize are older models or are running older software, and that at least some of those devices could have been legally acquired from the U.S. during these seven years.
  • All U.S. exporters are liable for any violation of the sanctions regime, but beyond the implementation of a robust compliance program, there’s relatively little that can be done to actually stop prohibited goods from reaching sanctioned countries. This is especially true for North Korea, as they have proven to be sophisticated at utilizing intermediaries or spoofing identities.

History of Export Controls Against North Korea

Since the split of North and South Korea following World War II, the United States has regarded the Democratic People’s Republic of Korea (DPRK or North Korea) as an adversary. Despite the lack of open hostilities for nearly 65 years, the U.S. has never normalized diplomatic relations with the “Hermit Kingdom.” From the 1950s to 1980s, North Korea’s status as a Communist government, and sponsorship of international terrorism, ensured that the two countries remained enemies. Then, in 1988, after the bombing of Korean Air Flight 858, North Korea was officially designated as a state sponsor of terrorism by the Reagan administration, inaugurating the modern export control regime against North Korea.

Separately, export control as a response to North Korea’s nuclear proliferation efforts dates back to 1992 when the U.S. imposed sanctions on two North Korean companies due to their missile proliferation activities. Between June 1992 and June 2000, some restrictions were lifted as a result of the U.S.-North Korea bilateral missile talks, but the respite was short lived and the U.S. ratcheted up sanctions from January 2001 through to 2006. This period included the notorious labeling of North Korea as part of the “Axis of Evil” in President Bush’s 2002 State of the Union Address.

In 2006, the first widespread international sanctions began after North Korea carried out its initial nuclear weapons test. This test prompted the UN Security Council (UNSC) to pass two resolutions imposing sanctions on North Korea — first Resolution 1695, and then Resolution 1718. These resolutions together banned a broad range of both imports and exports to North Korea by any UN member states.

While these resolutions initially focused on military materiel, they were supplemented by broader sanctions from the U.S., Australia, and Japan. After North Korea conducted its second underground nuclear test in May 2009, the UNSC adopted Resolution 1874, which further expanded the arms embargo and sought to target Pyongyang’s financial apparata. From 2009 to the present day, both the U.S. and UNSC have progressively strengthened and expanded earlier sanctions with Resolution 2087, 2094, 2270, 2371, 2375, and 2397, which covered everything from missile materiel to textiles and caps on oil trading.

Despite a perceived thaw in diplomatic relations beginning earlier this year, U.S. officials have re-emphasized numerous times that “all sanctions and maximum pressure must remain,” while denuclearization of the Korean peninsula is negotiated.

State of Current U.S. Sanctions Against North Korea

Current United States sanctions against North Korea can be split into two categories:

  1. Sanctions that specifically target North Korea.
  2. Sanctions related to “Weapons of Mass Destruction Proliferators.”

Until 2008, the bulk of U.S. sanctions specific to North Korea were implemented via the Trading With the Enemy Act (1917), which empowers the federal government to prohibit any and all trade with designated countries. On June 26, 2008, the Bush administration issued Executive Order (E.O.) 13466 under the authority of the International Emergency Economic Powers Act. That same year, the National Emergencies Act. E.O. 13466 was supplemented by Executive Orders 13551, 13570, 13687, 13722, and the North Korea Sanctions Regulations (31 C.F.R. part 510). These measures extended a variety of trade restrictions and blocking of interests belonging to various figures in North Korea.

Pre-dating these sanctions, E.O. 13382 was issued in 2005 targeting various entities engaged in WMD proliferation. Three North Korean entities and numerous North Korean persons were listed as blocked entities.

Today, these regulations have culminated in six prohibited categories of transactions involving North Korea:

  1. Blocked property belonging to the state of North Korea and certain North Korean nationals (E.O. 13466, 13551, 13687, 13722, and 13382).
  2. U.S. persons are prohibited from registering vessels in North Korea, flying the DPRK flag, or operating any vessel flagged by North Korea (E.O. 13466).
  3. Goods, services, and technology from North Korea may not be imported into the U.S. (E.O. 13570).
  4. No new investment in North Korea by U.S. persons is allowed (E.O. 13722).
  5. No financing by a U.S. person involving North Korea is allowed (E.O. 13722).
  6. And most importantly for our purposes, goods, services, and technology may not be exported to North Korea from the U.S., or by a U.S. person wherever located, without a license (E.O. 13722).

U.S. export enforcement responsibility falls under three executive branch agencies: the Office of Foreign Asset Control within the Department of Treasury, the Office of Export Enforcement within the Department of Commerce’s Bureau of Industry and Security, and Homeland Security Investigations within the Department of Homeland Security. These three agencies enforce the Executive Orders, U.S. sanctions, International Trafficking in Arms Regulation, Export Administration Regulation, and other laws which make up the body of export control laws in the United States. In 2010, Executive Order 13558 created the Export Enforcement Coordination Center to further strengthen the partnership between these independent agencies.

The United States is one of the only countries which enforces its export laws outside of its national boundaries. Federal agents located in foreign countries work in conjunction with local authorities to conduct end use license checks, knocking on doors to see whether the parties are still upholding their stated exporting intentions.

Currently, civil penalties of up to the greater of $284,582, or twice the amount of the transaction, can be imposed against any party that violates these sanctions. Similarly, upon conviction, criminal penalties of up to $1 million, imprisonment for up to 20 years, or both, may be imposed on any person that willfully violates the sanctions.

North Korea Leverages a Breadth of U.S. Technology Despite Export Controls

North Korea’s Technology Architecture

Numerous third-party data sources used for this analysis gave Recorded Future visibility into what types of devices North Korea’s most senior leadership use to access the global internet. As has been widely publicized over the past several years, Kim Jong Un has been photographed on several occasions with Apple devices, and North Korean-made mobile phones have been assessed as mimicking Apple technology.

While we cannot confirm the actual users behind the activity we see, our analysis indicates that numerous American and Western-manufactured devices are being used by North Korean elite to access the global internet. Several reports and accounts have documented how few North Koreans are granted access to the global internet. At most, only the inner circle of North Korea’s leadership, such as party, military, and intelligence leaders and their families, are allowed to own computers and independently utilize the global internet. This is one of the data points we use to determine with such certainty that North Korea’s ruling elite are the users of this hardware and software.

North Korea’s use of proxies and load balancers limited our ability to identify exactly how many of each device was present, but we can determine some models and versions:

  • Windows 7
  • Windows 8.1
  • Windows 2000
  • Windows XP
  • Windows 10
  • Microsoft Terminal Server
  • Samsung Galaxy S5
  • Samsung Galaxy J5
  • Samsung Galaxy S7
  • Samsung Galaxy S8 Plus
  • Huawei Mate 95c 6 v6
  • Apple iPhone 4S
  • Apple iPhone 5
  • Apple iPhone 5S
  • Apple iPhone 6
  • Apple iPhone 6S Plus
  • Apple iPhone 7 Plus
  • Apple iPhone 8 Plus
  • Apple iPhone X
  • Apple MacBook
  • IBM Tivoli Storage Manager server
  • Conexant Hasbani web servers
  • Ascend Communications1 switches
  • F5 BIG-IP load balancer

While the majority of North Korean cyber operations are likely conducted from abroad, a small minority historically have been conducted from territorial North Korea. These operations have been conducted utilizing this very same hardware and software. This means that minimally, U.S. technology has enabled North Korea’s destabilizing, disruptive, and destructive cyber operations as well as its internet-enabled circumvention of international sanctions.

Where Technology Export Control Fails

According to a Congressional Research Service study conducted in 2016, U.S. trade restrictions with North Korea are extensive, but do not amount to a comprehensive embargo.

The United States curtails trade with North Korea for reasons of regional stability, that country’s support for acts of international terrorism, lack of cooperation with U.S. antiterrorism efforts, proliferation, and its status as a Communist country and a nonmarket economy. The United States also prohibits transactions relating to trade with certain North Korean entities identified as those who procure luxury goods, launder money, smuggle bulk cash, engage in counterfeiting goods and currency, and traffic in illicit narcotics.

Further, ”a U.S. company may apply for a license to export to North Korea, but for nearly all items other than food and medicine, there is a presumption of denial.”

This is despite the fact that North Korea has been on and off the State Sponsors of Terrorism list twice in the last 10 years (President Bush rescinded the declaration in 2008 and President Trump re-applied it in November 2017). In terms of exportation of technology to North Korea, the State Sponsors of Terrorism designation has relatively little impact in and of itself because the sanctions resulting from that designation govern primarily U.S. foreign aid, defense exports, and dual-use items. There is a provision for sanctions on “miscellaneous financial and other restrictions,” however, it is not clear whether that provision goes above and beyond the existing prohibitions on technology exports to North Korea.

Most electronics, including laptop computers, digital music players, large flat-screen televisions, and “electronic entertainment software” are considered “luxury goods” and fall under the broad trade Export Administration Restrictions (EAR) for North Korea administered by the Department of Commerce.

While the United Nations (UN) clarified its definition of “luxury goods” in Resolution 2321 as not including electronics, each UN member state is allowed to interpret the “luxury goods” term as including different products, “creat[ing] a situation of uneven practice” in the application of export controls. For instance:

  • The European Union bans “electrical/electronic items and appliances for domestic use of a value exceeding EUR 50 each.”
  • Australia bans all “consumer electronics.”
  • Japan prohibits “portable computing devices consisting of at least a central processing unit (CPU), a keyboard, and a display.”
  • South Korea broadly restricts and governs trade with the North including “electronic goods” as a luxury item.
    China has not made a distinction on embargoed luxury goods and does not “honor the luxury goods lists of other countries when it exports to” North Korea.

The Saga of ZTE

In March 2016, Zhongxing Telecommunications Equipment (ZTE), a Chinese cellular device and hardware manufacturer, was added to the Export Administration Regulations (EAR) Entities List. The EAR “imposes additional licensing requirements on and limits the availability of most license exceptions for, exports, reexports, and transfers (in-country) to those listed” on the Entities List. ZTE was initially placed on the Entities List for violating U.S. sanctions by selling American-made goods to Iran and North Korea. Placement on the Entities List prohibited U.S. companies from selling goods to ZTE without a license, and because nearly all ZTE-manufactured products contained U.S. goods, essentially crippled the company.

For more than two years, ZTE and the U.S. government went back and forth attempting to reach an agreement over penalties and validate that ZTE was no longer violating U.S. sanctions. In April 2018, the Department of Commerce (DOC) ended the negotiations by imposing a denial order, prohibiting American companies from selling to ZTE for seven years.

The denial order was the end of a lengthy export control enforcement process which would have bankrupted ZTE. Instead, in late May, the DOC negotiated an agreement which lifted the denial order and re-opened ZTE to U.S. exports.

The case of ZTE, a company which was placed on the Entities List and under a denial order for violating U.S. sanctions against North Korea, is a useful example of how impactful successful export control can be — if allowed to be. Had ZTE been allowed to fail, it would have sent a powerful message to companies around the world indicating how seriously the U.S. considers these violations. Instead, the message is that a company can violate U.S export controls and sanctions if it is large enough and aligned with an economically powerful nation.

Technology Exports to North Korea Were Not Always Prohibited

The question of how U.S. technology gets to North Korea is not entirely a story of failed export control or inconsistent application. According to Department of Commerce data, the U.S. has actually exported over $176 million of goods to North Korea since 2002. While this number pales in comparison to export volume with nations such as China or Canada, it is important to note that the export of “computers and electronic products” to North Korea occurred until this year.

At its peak in 2014, the U.S. exported $215,862 worth of computers and electronic products to North Korea. We do not know exactly which products or how many were exported to North Korea that year. However, based on the Department of Commerce definition of “computers and electronic products,” we have an idea of what kind of electronics these exports might have included. This category includes “computers, computer peripherals (including items like printers, monitors, and storage devices), communications equipment (such as wired and wireless telephones), and similar electronic products (including audio and video equipment and semiconductors),” as well as components for these products.

Again, while we do not know exactly which computer and electronic products were exported to North Korea over the past 15 years, that data can be useful in an exercise to demonstrate exactly how much value North Korea could have derived from that amount of money.

For example, in 2014, a decent desktop could cost around $500, while a similarly specified laptop would cost $700. Hypothetically, if North Koreans were paying the average prices for computers, they could have purchased over 350 computers from U.S. suppliers in 2014 alone. In total, since 2002, the U.S. has legally exported $483,543 worth of computers and electronics to North Korea — a sum that could have legally supplied some of the ruling elites’ electronics needs.

Our analysis demonstrates that many of the electronic devices North Korean elite utilize are older models or are running older software. These legal exports certainly do not account for all of the devices we have observed on North Korean networks, nor is $483,543 sufficient to completely build a moderately sized and proxied network. However, it presents an interesting part of the answer to the question of exactly how North Korea could have acquired all of their Western hardware and software. At least some of the computers and software we observed being used in North Korean networks today was probably acquired during these past 15 years.

Outlook

It is the responsibility of any U.S. exporters to be familiar and compliant with federal export controls, as penalties can include fines, civil or criminal charges, imprisonment, negative publicity, revocation of exporting privileges, or debarment from U.S. government contracting. As explained by the Massachusetts Export Center, “[Even if the exporter is selling only] innocuous products or selling only to ‘friendly’ countries … the exporter is ultimately responsible to have a thorough understanding of export regulations and to establish operating procedures aimed at preventing violations.

For U.S. companies and persons to avoid the risk of being found guilty of violating sanctions, it is expected that an effective export compliance program is implemented. The U.S. Department of Commerce’s Bureau of Industry and Security suggest eight elements for an effective program:

  1. Statements and commitments from management
  2. Risk assessment of potential export violations
  3. Export authorization
  4. Effective record keeping
  5. Instituting training programs for employees
  6. Auditing records
  7. Detecting and correcting export violations
  8. Maintaining an export compliance manual

Generally, all U.S. business are not expected to perfect all eight elements, but any deviation from a robust compliance program poses a risk that an entity could be found in violation of the U.S. export regime. However, while a U.S. company may have a robust program, sanctioned states often use false flags or non-national facilitators to skirt even the most advanced programs. As a recent report from Arms Control Wonk and Reuters pointed out, the North Koreans are adept at falsifying addresses and names to circumvent sanctions programs. This flow of technology is not one way, either — recent reports point out that North Korea has used shell companies and various aliases to export various technologies, including facial recognition software to U.S. allies and encryption software in Asia.

One transaction involving the DPRK shell company Glocom that was widely reported last year demonstrates the ease with which North Korea is able to avoid technology control sanctions. Glocom used a network of Asian-based front companies to purchase components from electronic resellers, and the payment was even cleared through a U.S. bank account. Glocom, the company at the center of these transactions, was tied to Pan Systems Pyongyang via invoices uncovered by the UN and International Global System via WHOIS website registration data. Ryang Su Nyo is listed as a director of Pan Systems Pyongyang and a shareholder of International Global System, and Reuters has reported that Ryang reports to “Liaison Office 519,” a department within the North Korean Reconnaissance General Bureau.

Today, the varied interpretation of the term “luxury goods,” a sophisticated sanctions evasion operation, and lax enforcement of technology and electronics as a subcategory has created a situation where the Kim regime can acquire U.S. electronics, software, and hardware virtually at will. Technology resellers, North Koreans abroad, and the Kim regime’s extensive criminal networks all facilitate the transfer of American technology for daily use by one of the world’s most repressive governments. Unless there’s a globally unified effort to impose comprehensive sanctions on the DPRK, and multilateral cooperation to ensure that these sanctions cannot be thwarted by a web of shell companies, North Korea will be able to continue its cyberwarfare operations unabated with the aid of Western technology.

 

More Slime from The SWAMP

Mitch McConnell cancels Senate’s traditional August recess

In a brief written statement, he said: “Senators should expect to remain in session in August to pass legislation, including appropriations bills, and to make additional progress on the president’s nominees.” More here.

At least that is something right?

All of us are mad, no furious with members of Congress. Imagine when some of those members are more angry than YOU at the system?

Leadership works with lobbyists and then leaks to the media. And then you think you have the whole story. Ah, not at all.

Just a teaser for Episode 3 is below.

The Swamp from Daniel Lippman on Vimeo.

In 2017, Congressman Ken Buck of Colorado wrote a book titled Drain The Swamp. 

It is a great primer and a book that can be read in a day. What does go on behind closed doors in Congress? Yep, you will learn it fast. What about those committee assignments and chairmanships? Yep, they are bought. Have you considered discretionary spending? It is illegal. A large handful of congressional members are in fact on our side. Some are so disgusted they are leaving Congress.

Run out and buy the book: Drain the Swamp: How Washington Corruption is Worse than You ThinkCongressman Buck is hardly a rebel but there are those colleagues that say he is. BARTELS: Secretary Wayne Williams’ Denver Broncos shirt ... Yes due to the weapon on the wall for which he was investigated a few years ago.

Remember that shooting at the ballfield? Well, as an aside, prior to that these congressional members packed heat. Likely more are doing the same now.

Here are the members of the House Freedom Caucus who say they currently carry, or did as of 2013 (all are Republicans):

  • Alabama Rep. Gary Palmer
  • Alabama Rep. Mo Brooks
  • Arizona Rep. Paul Gosar
  • Arizona Rep. Matt Salmon
  • Arizona Rep. David Schweikert
  • Arizona Rep. Trent Franks
  • Colorado Rep. Ken Buck
  • Florida Rep. Ted Yoho
  • Florida Rep. Bill Posey
  • Indiana Rep. Marlin Stutzman
  • Louisiana Rep. John Fleming
  • Ohio Rep. Jim Jordan
  • South Carolina Rep. Jeff Duncan
  • South Carolina Rep. Mick Mulvaney
  • Tennessee Rep. Scott Desjarlais
  • Texas Rep. Randy Weber
  • Virginia Rep. Dave Brat

Brooks said the Second Amendment is the “bedrock” of all other amendments, and the pro gun-control argument that the Second Amendment only applies to a militia-owning firearms is preposterous.

“The purpose of the Second Amendment was to ensure that the citizenry could protect itself from a dictatorial and out-of-control government,” Brooks told TheDCNF.

“It has long been a primary goal of kings, dictators, communists, fascists and the like to disarm the citizenry so that there is minimal risk of opposition to centralized government, dictating to the citizenry that is unarmed and defenseless, and unable to assert their rights,” he said. (some of them have already left congress)

***

Fed Gov Spent $76 Billion in 2017 for Cyber Security, Fail v Success

Go here for the Forum Part One

Go here for the Forum Part Two

Fascinating speakers from private industry, state government and the Federal government describe where we are, the history on cyber threats and how fast, meaning hour by hour the speed at which real hacks, intrusions or compromise happen.

David Hoge of NSA’s Threat Security Operations Center for non-classified hosts worldwide describes the global reach of NSA including the FBI, DHS and the Department of Defense.

NSA Built Own 'Google-Like' Search Engine To Share ... photo

When the Federal government spent $76 billion in 2017 and we are in much the same condition, Hoge stays awake at night.

With North Korea in the constant news, FireEye published a report in 2017 known as APT37 (Reaper): The Overlooked North Korea Actor. North Korea is hardly the worst actor. Others include Russia, China, Iran and proxies.

Targeting: With North Korea primarily South Korea – though also Japan, Vietnam and the Middle East – in various industry verticals, including chemicals, electronics, manufacturing, aerospace, automotive, and healthcare.
Initial Infection Tactics: Social engineering tactics tailored specifically to desired targets, strategic web compromises typical of targeted cyber espionage operations, and the use of torrent file-sharing sites to distribute malware more indiscriminately.
Exploited Vulnerabilities: Frequent exploitation of vulnerabilities in Hangul Word Processor (HWP), as well as Adobe Flash. The group has demonstrated access to zero-day vulnerabilities (CVE-2018-0802), and the ability to incorporate them into operations.
Command and Control Infrastructure: Compromised servers, messaging platforms, and cloud service providers to avoid detection. The group has shown increasing sophistication by improving their operational security over time.
Malware: A diverse suite of malware for initial intrusion and exfiltration. Along with custom malware used for espionage purposes, APT37 also has access to destructive malware.

More information on this threat actor is found in our report, APT37 (Reaper): The Overlooked North Korean Actor.

** NSA 'building quantum computer to crack security codes ...  photo

Beyond NSA, DHS as with other agencies have cyber divisions. The DHS cyber strategy is found here. The fact sheet has 5 pillars:

DHS CYBERSECURITY GOALS
Goal 1: Assess Evolving
Cybersecurity Risks.
We will understand the evolving
national cybersecurity risk posture
to inform and prioritize risk management activities.
Goal 2: Protect Federal Government
Information Systems.
We will reduce vulnerabilities of federal agencies to ensure they achieve
an adequate level of cybersecurity.
Goal 3: Protect Critical
Infrastructure.
We will partner with key stakeholders
to ensure that national cybersecurity
risks are adequately managed.
Goal 4: Prevent and Disrupt Criminal
Use of Cyberspace.
We will reduce cyber threats by
countering transnational criminal
organizations and sophisticated cyber
criminals.
Goal 5: Respond Effectively to Cyber
Incidents.
We will minimize consequences from
potentially significant cyber incidents
through coordinated community-wide
response efforts.
Goal 6: Strengthen the Security and
Reliability of the Cyber Ecosystem.
We will support policies and activities
that enable improved global cybersecurity risk management.
Goal 7: Improve Management of
DHS Cybersecurity Activities.
We will execute our departmental
cybersecurity efforts in an integrated
and prioritized way.

Related reading:National Protection and Programs Directorate

NPPD’s vision is a safe, secure, and resilient infrastructure where the American way of life can thrive.  NPPD leads the national effort to protect and enhance the resilience of the nation’s physical and cyber infrastructure.

*** Going forward as devices are invented and added to the internet and rogue nations along with criminal actors, the industry is forecasted to expand with experts and costs.

Research reveals in its new report that organizations are expected to increase spending on IT security by almost 9% by 2018 to safeguard their cyberspaces, leading to big growth rates in the global markets for cyber security.

The cyber security market comprises companies that provide products and services to improve security measures for IT assets, data and privacy across different domains such as IT, telecom and industrial sectors.

The global cyber security market should reach $85.3 billion and $187.1 billion in 2016 and 2021, respectively, reflecting a five-year compound annual growth rate (CAGR) of 17.0%. The American market, the largest segment, should grow from $39.5 billion in 2016 to $78.0 billion by 2021, demonstrating a five-year CAGR of 14.6%. The Asia-Pacific region is expected to grow the fastest among all major regions at a five-year CAGR of 21.4%, due to stringent government policies to mitigate cyber threats, and a booming IT industry.

Factors such as the growing complexity and frequency of threats, increasing severity of cyber security, stringent government regulations and compliance requirements, ubiquity of online communication, digital data and social media cumulatively should drive the market. Moreover, organizations are expected to increase IT spending on security solutions and services, as well. Rising adoption of technologies such as Internet of things, evolution of big data and cloud computing, increasing smartphone penetration and the developing market for mobile and web platforms should provide ample opportunities for vendors.

By solution type, the banking and financial segment generated the most revenue in 2015 at $22.2 billion. However, the defense and intelligence segment should generate revenues of $50.7 billion in 2021 to lead all segments. The healthcare sector should experience substantial growth with an anticipated 16.2% five-year CAGR.

Network security, which had the highest market revenue in 2015 based on solution type, should remain dominant through the analysis period. Substantial growth is anticipated in the cloud security market, as the segment is expected to have a 27.2% five-year CAGR, owing to increasing adoption of cloud-based services across different applications.

“IT security is a priority in the prevailing highly competitive environment,” says BCC Research analyst Basudeo Singh. “About $100 billion will be spent globally on information security in 2018, as compared with $76.7 billion in 2015.”

Crimes or War, the Body Collectors in Mosul

Imagine the other cities in Iraq and Syria. Mosul was part of Assyria as early as the 25th century BC. Of note, in 2008, there was a sizeable exodus of Assyrian Christians. They sought sanctuary in Syria and Turkey due to threats of murder unless they converted to Islam.

Related reading: Aleppo: Tell Our Story After we are Gone

Turkish Airlines New Flight Route to Mosul photo

Iraq Mosul picture, Iraq Mosul photo, Iraq Mosul wallpaper photo

Inside the killing rooms of Mosul

Warning: Graphic images

MOSUL, Iraq — In March, VICE News returned to Mosul for the first time since the war against ISIS was declared over eight months ago.

While life may be returning to normal in the eastern half of the city, on the other side of the river — where the fighting was most intense — the scale of rebuilding that needs to be done is monumental. It’s estimated there are still 8 million tons of conflict debris that need to be moved before reconstruction can start, equivalent to three times the size of the Great Pyramid of Egypt. About 75 percent of that rubble is in West Mosul, and it’s mixed with so much unexploded ordnance that experts say this is now one of the most contaminated spots on the planet.

In the Old City, where ISIS made its last stand, residents have slowly started to come back – a few business owners hoping to repair shops, and families who have no other option but to live in their damaged homes. Some water tanks have been trucked in, and electricity cables have been temporarily patched together along some streets, but the place feels deserted, and in some ways the scene was not that different from how it looked shortly after the fighting.

Eight months on, there are hundreds or perhaps thousands of bodies still under the rubble, making life unbearable for the families who have returned.

The putrefied corpses are mainly Islamic State fighters or their families, since many of the non-ISIS civilian bodies have been dug out and reclaimed by family members or civil defense workers. The bodies that remain are a severe health hazard, but there’s little political will to deal with them, and removing them is risky given the unexploded munitions littering the area. Nevertheless, teams of citizen volunteers are going house-to-house carrying out this gruesome, dangerous work on a daily basis.

**

One volunteer team is led by Sroor al-Hosayni, a 23-year-old former nurse. Many of her group are even younger; some are medical students, but most have no formal training in handling corpses. So far, they say they’ve pulled and bagged more than 350 bodies that no one else was willing to deal with. They laid them in white plastic body bags where municipal trucks can easily collect them, labeling them for any potential explosives found with the corpse.

“We saw that there were bodies everywhere, in the alleys and inside the houses,” Hosayni said. “I took my team and started implementing this idea by going to help municipality and government workers in removing these bodies before summer comes and disease spreads in the city.”

At first the authorities complained, telling her: “‘You don’t have to move ISIS bodies. Leave them there; the dogs will eat them.”

Hosayni replied, “But one or two dogs can’t eat them; there are thousands of bodies.”

A suspected execution room inside the basement of a collapsed building Al Maydan, the district of the Old City where ISIS made its last stand. Hosayni and her team say there are more than 100 rotting corpses here. So far they have pulled more than 30 bodies from this room n the last few weeks. (Adam Desiderio/VICE News)

After filming Hosayni’s team at work near the destroyed Al Nuri mosque, we followed them to Al Maydan — the Old City neighborhood where ISIS made its last stand — where they had been working on one particular site for weeks.

Bulldozers have started clearing a path where Souk Al-Samak Street once ran along the river, but almost nothing else has changed since the air bombardment flattened this district.

The ruins of arched and intricately carved stone doorways open onto inner courtyards like dioramas of the war, frozen in time: Human corpses in varying degrees of decay lying amid stray ordnance, broken china, plastic toy trucks, and discarded military apparel.

Two hundred yards up the street and on the right, the team pointed us to a building on the banks of the Tigris River. Scrambling through the collapsed masonry, we emerged into two mostly intact basement rooms with barred windows looking out onto the river. In the far room, buzzing with flies and inescapable stench, were dozens and dozens of corpses, stacked too deep to count, one on top of another. It seemed to be the remains of a mass execution.

The body collectors told us there were at least 100 bodies in here; the team had already cleared more than 30 but had barely made a dent in the mound of corpses.

23 year-old Sroor al-Hosayni, a former nurse, leads a team of volunteer body collectors pulling corpses out of a collapsed building in Al Maydan, the district of the Old City where ISIS made its last stand. Hosayni and her team of volunteers have been pulling bodies from what they say is an execution room in the basement of this building. (Adam Desiderio/VICE News)

We saw what appeared to be the bodies of children, though it was difficult to verify given the level of decay. We saw no weapons or military gear on the bodies. The team told us they could see bullet wounds to their heads.

There are reports that ISIS locked large numbers of people in rooms like this, using them as human shields during the final days of the conflict. Many of those families died in coalition airstrikes — but this room was intact. It’s possible they could have been executed by ISIS fighters as government forces closed in. But it’s not clear why ISIS would kill or dispose of civilians in this way.

There are also reports of Iraqi forces executing captured ISIS members in this exact neighborhood. Beards and long hair were still visible on some of the corpses, leading the body collectors to believe some could be men who may have been affiliated with ISIS. But speaking to VICE, a senior Iraqi military official rejected any notion that Iraqi forces may have been responsible for the killings and told us that the site had already been investigated, without providing further details.

One international organization that has documented instances where Iraqi security forces have been accused of carrying out executions is Human Rights Watch.

Belkis Wille, the lead Iraq investigator at Human Rights Watch, visited the site soon after we did. She told us she was unaware of any investigation having been done at this particular site, and that — whoever was responsible for the deaths — the removal of evidence was troubling given that this was potentially the site of a war crime.

**

“Sites like that need the proper forensic teams securing the site and conducting the analysis needed to determine whether this is indeed the site of a crime,” Wille told VICE News. “Despite promises by the prime minister at the end of the battle to investigate abuses, we haven’t seen any sign of that leading to teams coming in and doing the investigations necessary. And the question really is, at what point do these sites potentially lose their forensic value and lose the evidence?”

Inside the remains of Great Mosque of al-Nuri in Mosul, Iraq where ISIS leader Abu Bakr al-Baghdadi declared an Islamic State caliphate in 2014. (Adam Desiderio/VICE News)

But for the body collectors — and for many residents of Mosul — with the heat of summer approaching, the overwhelming priority right now is to clean up this city and begin rebuilding. The need to properly document and investigate potential war crimes isn’t at the top of the agenda.

“It’s time to focus on the living, not the dead,” was the mantra we heard from authorities and from many families trying to rebuild their shattered lives.

Nevertheless, the question of what happened in neighborhoods like Al Maydan and others in those final stages before victory was announced, and in the days shortly afterward, refuses to disappear.

In the ultimate stages of the battle to extinguish the last pockets of ISIS from Mosul last summer, access to the “fight zone” became increasingly restricted.

Baghdad declared the conflict officially over on July 10. The announcement, broadcast live on state television, came as a surprise to many, since there were explosions and gunfire still echoing out from the Old City where the last dregs of the Islamic State terrorist group were refusing to surrender.

Just a day before that, VICE News was one of the few outlets that managed to get past the cordon to join a general from Iraq’s elite counterterrorism brigade and an advance team of his men as they carefully picked their way across the booby-trapped rooftops of collapsed buildings in the district of Al Maydan to plant an Iraqi flag on the banks of the Tigris.

It was a journey through hell. The neighborhood had been pulverized by airstrikes and shelling throughout the campaign, but the intensity had grown as ISIS fell back to these ancient, narrow streets lined with buildings dating back to the 12th century. There was hardly a structure still intact, ordnance and bodies lined the route, some fresh, some bloated and badly decomposed from days or weeks in the sun.

Reaching the river was a symbol of having decisively broken through ISIS defensive lines, a long-awaited moment of triumph for the soldiers. But as the flag was raised and the soldiers took selfies, gunfire from a sniper still alive among the rubble sent the party scattering for cover. In those final days, as different units of Iraq’s security forces held impromptu victory celebrations after liberating neighborhoods, the question lingered of what the end of hostilities actually looks like when the enemy is hell-bent on fighting to the death.

We will likely never know who killed the people in the basement room of the house on Al-Samak Street — but as long as claims persist that extrajudicial killings by Iraqi security forces may have taken place, the stakes of not investigating those could be high. While there is little sympathy for ISIS right now in the devastated neighborhoods of Mosul, a culture of impunity for any abuses that were committed could set the stage for the same kinds of grievances that contributed to the group’s rise in the first place.

Cover image: The basement of a collapsed building in Al Maydan, the district of the Old City where ISIS made its last stand. Volunteers have been pulling bodies from what they say is an execution room filled with more than 100 corpses in the basement of this building. (Adam Desiderio/VICE News)

 

What is the Magnitsky Act Anyway

The Global Magnitsky Act enables the United States to sanction the world’s worst human rights abusers and most corrupt oligarchs and foreign officials, freezing their U.S. assets and preventing them from traveling to the United States. Sanctioned individuals become financial pariahs and the international financial system wants nothing to do with them.

Before proceeding, ask yourself: is Global Magnitsky right for my case? The language of the Global Magnitsky Act as passed by Congress was ex-panded by Executive Order 13818, which is now the implementing authority for Global Magnitsky sanctions. EO 13818 stipulates that sanctions may be considered for individuals who are engaging or have engaged in “serious human rights abuse” against any person, or are engaging or have en-gaged in “corruption.” Individuals who, by virtue of their rank, have ordered others to engage or have facilitated these acts also are liable to be sanctioned.

Keep in mind that prior to the EO’s expansion of the language, human rights sanctions were limited to “gross violations of internationally recognized human rights” as codified in 22 USC § 2304(d)(1). The original language also stipulates that any victim must be working “to expose illegal activity car-ried out by government officials” or to “obtain, exercise, defend, or promote internationally recognized human rights and freedoms.” As for sanctions for corruption, it identifies “acts of significant corruption” as sanctionable offenses. This is generally thought to be a stricter standard than the EO’s term “corruption.” It may be worthwhile to aim for this higher standard to make the tightest case possible for sanctions.

As a rule, reach out to other NGOs and individuals working in the human rights and anti-corruption field, especially those who are advocating for their own Global Magnitsky sanctions. Doing so at the beginning of the process will enable you to build strong relationships, develop a robust network, and speak with a stronger voice.

Download the full guide to learn more.

***  And harass they did. Bill Browder is a distant buddy and I watched his communications this morning as he was arrested in Spain. The warrant:

  It was about 40 minutes later, he was released. He was in Madrid is to give evidence to senior Spanish anti Russian mafia prosecutor Jose Grinda about the huge amount of money from the Magnitsky case that flowed to Spain. Now that I’m released my mission carries on. Meeting with Prosector Grinda now. This was the SIXTH Russian arrest warrant using Interpol channels. It was NOT an expired warrant, but a live one. Interpol is incapable of stopping Russian abuse of their systems. He is right.

 

***

United States citizens are outraged about the Kremlin’s incursion into the U.S. electoral system, but that is unfortunately just the tip of the iceberg. Russia is also trying to hijack the U.S. judiciary for corrupt purposes, expropriation and political repression, which has received little attention.

Unlawful seizure of private assets and private companies by the Kremlin has been the norm since Vladimir Putin became president in 2000. Russia’s law enforcement agencies and courts are regularly used for the enrichment of the ruling elite.

Annual State Department and Freedom House reports underscore that the Russian judicial system lacks independence from the country’s powerful executive branch.

The Sergei Magnitsky case is the best-known example of the Russian state’s co-opting of the courts to support its kleptocracy. A cabal of Russian tax and law enforcement officers conspired to defraud Russian taxpayers of $230 million, the largest tax fraud in Russian history, by targeting Bill Browder’s company, Hermitage Capital.

When Magnitsky, Browder’s tax attorney, discovered the fraud and notified authorities, Hermitage and Magnitsky were charged with their own fraud. Magnitsky was then arrested and died in pre-trial detention at the age of 37.

Since then, Russian authorities have repeatedly called on Interpol to disseminate red notices to harass Browder and other victims. Interpol, which is meant to facilitate cross-border coordination among law enforcement agencies, is susceptible to abuse as it passes on requests and notices from states without much scrutiny.

Russia misuses Interpol’s red notices to gain the support of international law enforcement agencies, including U.S. law enforcement, in pursuing political dissidents and victims of corporate raiding.

Russian legal authorities also abuse the U.S. court system by exploiting U.S. federal discovery laws. Under these laws, a foreign party can use the U.S. federal courts to compel discovery from any person under U.S. jurisdiction.

The Russian authorities used this law repeatedly against Yukos and its affiliates, after confiscating the oil giant from Mikhail Khodorkovsky and other shareholders.

More recently, agents of the Russian state have engaged in two federal court cases in New York: a 2016 attempt to loot the assets of Janna Bullock and her real estate investment firm RIGroup, and a 2018 effort to plunder the personal property of banker Sergei Leontiev, a former shareholder of Probusinessbank.

The Russian state is using the discovery process to extract information to further criminal charges and extortion schemes against individuals who fled to the U.S. seeking the protection, safety and rule of law now being undermined.

The Russian government and its associates have developed similar strategies to use federal and state courts to recognize and validate bogus decisions from Russian courts, exploit the U.S. Bankruptcy Code on behalf of sham creditors aligned with the Russian state and enforce illegitimate claims and orders issued by corrupt Russian judges.

Although U.S. judges are permitted to consider evidence questioning the legitimacy of a foreign judicial decision, they are rightly hesitant to speculate on whether another country upholds the rule of law.

Such a determination requires significant analysis beyond the scope and ability of most courts and therefore leaves the U.S. judiciary ill-equipped to defend itself against Russian incursion.

The U.S. is slowly beginning to fight back against Russian intrusion into our courts. In 2017, the United States sanctioned two Russian private-sector lawyers, Yulia Mayorova and Andrei Pavlov, who repeatedly represented Russian government agencies in the United States.

After passage by Congress of the “Global Magnitsky Human Rights Accountability Act,” the U.S. sanctioned Artem Chaika, the son of Russia’s prosecutor general, who used his father’s position to extort bribes and win contracts for himself and his cronies, while driving out competition.

More needs to be done to keep Russian lawlessness abroad at bay. The House and Senate judiciary committees should investigate the hacking of U.S. courts and hold hearings to examine the threat they pose, with an eye toward developing legislation that will help block future attacks.

The Department of Justice and the State Department should consider establishing a joint task force to coordinate with U.S. courts, where victims of abuse by corrupt governments could submit their evidence.

The State Department already produces annual reports that opine on the state of foreign judiciaries, which can be put to good use to protect the integrity of U.S. courts.