UN/Harvard Comprehensive WMD Programs in N Korea/ISIS

Primer:

A North Korean mining firm, reputed to be a front for Pyongyang’s weapons development programs, attempted to ship materiel to Syrian officials tied to the country’s chemical weapons program, according to a confidential United Nations assessment of international sanctions against the North.

Details of the U.N. findings, first reported by Reuters, found officials from Korea Mining Development Trading Corporation {KOMID) had sent a pair of shipments of unknown contents to members of Syria’s Scientific Studies and Research Centre or SSRC. The Syrian government organization has been responsible for developing chemical and biological weapons for regime in Damascus since the 1970’s.

The shipments never arrived in Syria after being intercepted by international authorities from U.N. partner nations, Reuters reports. “Two member states interdicted shipments destined for Syria. Another member state informed the panel that it had reasons to believe that the goods were part of a KOMID contract with Syria,” the U.N. review states.

KOMID has repeatedly trafficked in materials associated with ballistic missile development and other conventional arms programs, and was blacklisted by the U.N. security council as a result of those activities, Reuters reports.

As a result, the U.N. “is investigating reported prohibited chemical, ballistic missile and conventional arms cooperation between Syria and [North Korea],” the report states. More here.

***    photo

Quoting the South Korean Defense Ministry, it said: ‘North Korea has 13 types of biological weapons agents which it can weaponize within ten days, and anthrax and smallpox are the likely agents it would deploy.’

***

Harvard produced a report with the summary in part that reads:

Amidst the growing threat of North Korea’s nuclear program, the assas-
sination of Kim Jong-Un’s half-brother via VX nerve agent in February
2017 brought renewed interest in North Korea’s other weapons of
mass destruction (WMD) programs—chemical and biological weap-
ons. If used on a large scale, these weapons can cause not only tens of
thousands of deaths, but also create panic and paralyze societies. Nev-
ertheless, the vividness of the nuclear threat has overshadowed other
weapons programs, limiting the attention and policy input that they
deserve. This paper focuses on North Korea’s biological weapons (BW).
Accurately assessing the threat from North Korea’s biological weapons
is challenging. Whereas North Korea has publicly declared its will to
become a nuclear power many times, it has been less overt about its
intention or capability for biological weapons. BW capabilities are
inherently hard to detect and measure. While nuclear programs can
be monitored by the number of nuclear tests and the success of missile
tests, weaponizing and cultivating pathogens can stay invisible behind
closed doors. Moreover, equipment used for BW production are often
dual-use for agriculture, making external monitoring and verification
virtually impossible. Limited information on North Korea’s BW pro-
gram leads to a low threat perception that may undermine preparation
and response efforts. The full 46 page report is here.

A German newspaper reported last week that at least one European intelligence agency has already warned that the Islamic State is exploring the use of chemicals for attacks in Europe. Such an eventuality would be a radical departure from prior attacks by the Islamic State in the West. In the past, the militant group has shown a strong preference for low-tech means of dispensing violence, such as firearms, vehicles and knives. But it has utilized chemical substances in Iraq and Syria, and its technical experts have amassed significant knowledge about weaponized chemicals.

Last week, several European and American counter-terrorism experts participated in a bioterrorism preparedness exercise in Berlin. Codenamed WUNDERBAUM, the exercise was one of several anti-terrorism drills that have taken place in the German capital this year alone. But last week’s drill was the first with an exclusive focus on preparing for a bioterrorist attack. German authorities insisted that the drill was not sparked by concrete intelligence of a pending biological or chemical attack. But the Berlin-based national newspaper Die Welt claimed on Friday that it had information about at least one such warning by a European intelligence agency. The paper did not name the agency, but said that “a foreign intelligence agency” had warned European security authorities of a possible terrorist attack by the Islamic State using chemical weapons. According to Die Welt, the warning was “explicit” and cautioned that the Sunni militant group may be preparing to use improvised bombs utilizing chemicals, including toxic gasses. The warning was communicated to European intelligence agencies, including Germany’s said Die Welt.

How likely is such a scenario? Terrorist groups tend to be conservative in their use of lethal technologies. They typically opt for time-tested methods using explosives or firearms, because these have a higher of success in comparison to more sophisticated, hi-tech weapons. The latter are also more expensive to build and require scientific and technical capabilities that are not typically available to terrorist organizations. Militants are usually strapped for cash, and are not science-savvy, so exceptions to this general trend are rare. But the Islamic State is different. Ever since it made its eventful appearance in 2013, the group has experimented with a variety of chemicals, including nerve agents. It is known that it initiated a modest chemical weapons program, headed by Iraqi engineers who were trained under Iraq’s late ruler, Saddam Hussein. One of them, Abu Malik, was killed in an American airstrike in early 2015. Another, Sleiman Daoud al-Afari, who headed the Islamic State’s chemical weapons program, was captured by US Special Forces in northern Iraq in March of last year.

The Islamic State’s rapid loss of territory in the past year has delivered serious blows to the group’s military infrastructure. Its chemical weapons program, which was targeted early on by the US, Iran and other belligerents, is now almost certainly defunct. But many of its engineers and technical experts are still at large, as are those who were trained by them during the group’s heyday in Iraq and Syria. Despite its continuing retreat, the Islamic State is still capable of employing chemicals that are relatively easy to procure, such as chlorine, hydrogen sulfide, or even various fertilizers, to construct explosives or nerve agents. Last summer, members of a terrorist cell with connections to the Islamic State were arrested in Sydney, Australia. By the time they were arrested, they had already procured significant quantities of hydrogen sulfide and had even tested the chemical, in an apparent preparation for a large-scale attack.

The Australian case shows that the Islamic State is not averse to the tactical use of chemical weapons in terrorist attacks. As the militant group’s self-proclaimed caliphate is disintegrating, and its leaders feel like they have nothing left to lose, the deployment of unconventional terrorist technologies should not be excluded as a tactical option for the organization. Western counter-terrorism officials should actively and immediately prepare for such an eventuality.

***

Subpoena Tim Geithner About the Uranium One Deal for Starters

Ever wonder where any Hillary emails are with regard to this case both as Secretary of State or through the Clinton Foundation? Perhaps Huma knows all…did Obama’s OFA take any kickbacks? What else is out there that the Obama administration hid from congress and oversight? Anyway read on for context and the people line-up.
Under the Treasury Department is also the responsibility of sanctions and where waivers to those sanctions occur.

The Secretary of the Treasury is the Chairperson of CFIUS, and notices to CFIUS are received, processed, and coordinated at the staff level by the Staff Chairperson of CFIUS, who is the Director of the Office of Investment Security in the Department of the Treasury.

The members of CFIUS include the heads of the following departments and offices:

  1. Department of the Treasury (chair)
  2. Department of Justice
  3. Department of Homeland Security
  4. Department of Commerce
  5. Department of Defense
  6. Department of State
  7. Department of Energy
  8. Office of the U.S. Trade Representative
  9. Office of Science & Technology Policy

The following offices also observe and, as appropriate, participate in CFIUS’s activities:

  1. Office of Management & Budget
  2. Council of Economic Advisors
  3. National Security Council
  4. National Economic Council
  5. Homeland Security Council

The Director of National Intelligence and the Secretary of Labor are non-voting, ex-officio members of CFIUS with roles as defined by statute and regulation.

Of note for the Uranium One transaction to happen, unless there was a waiver:

What steps can be taken with respect to information required by § 800.402 to further facilitate CFIUS review?

Suggestions include:

  1. Section 800.402(j)(1) requires submission of organizational charts showing control and ownership of the foreign person that is a party to the transaction.  CFIUS’s review would be aided if the parties provide such charts for the U.S. business and if the charts for the U.S. business and the foreign person diagram the ownership chains for the acquirer and target before and after the transaction being notified to CFIUS.  These should be as extensive and detailed as possible.
  2. Sections 800.402(c)(1)(iii) and (v) require submission of information related to the foreign person and its parents.  CFIUS’s review would be aided if the notice identifies whether the actual party in interest is the party to the transaction or one of the parents of the party to the transaction.  CFIUS does not consider special purpose vehicles, wholly-owned subsidiaries established for the sole purpose of the transaction, or other shell companies to be the actual parties in interest in a transaction.
  3. Sections 800.402(c)(3)(iii) and (iv) require information regarding certain United States Government contracts.  Parties are advised to update and verify United States Government contact information for such contracts. Private sector entities not party to the notice are not acceptable points-of-contact for contracts in question.
  4. Filers should ensure that all files in the electronic version of a notice are less than five megabytes (5MB) in size.

What steps, though not required for a notice to be determined complete, may facilitate CFIUS review?

  1. CFIUS agencies have found it very helpful in the past for filing companies to provide the following additional information, even if the activity is not the primary focus of their commercial operations.  CFIUS often requests this information after a voluntary notice has been accepted if it was not included in the initial filing.
    1. Cyber systems, products, services:  Identify whether the U.S. business being acquired develops or provides cyber systems, products, or services, including:
      • Business systems used to manage or support common business processes and operations (for example, enterprise resource planning, e-commerce, email, and database systems); control systems used to monitor, assess, and control sensitive processes and physical functions (for example, supervisory control, data acquisition, process and distributed control systems); safety, security, support, and other specialty systems (for example, fire, intrusion detection, access control, people mover, and heating, ventilating, and air conditioning systems); or
      • (ii) Telecommunications and/or Internet or similar systems, products or services.
    2. Natural resources:  Identify whether the U.S. business being acquired processes natural resources and material or produces and transports energy, and the amount processed, produced, or transported annually.
  2. Discussion in the notice of the business rationale for the transaction may be useful.
  3. The regulations require parties to provide information regarding any other applicable national security-related regulatory authorities, such as the ITAR, EAR, and NISPOM.  Some of the regulatory review processes under these authorities may have longer deadlines than the CFIUS process, and parties to transactions affected by these other reviews may wish to start or complete these processes prior to submitting a voluntary notice to CFIUS under section 721.

The FBI has a network of informants domestically and it did the job it is tasked to do, that is until the Holder Justice Department ensured it could no longer do the job with regard to the Uranium One Case.

Before the Obama administration approved a controversial deal in 2010 giving Moscow control of a large swath of American uranium, the FBI had gathered substantial evidence that Russian nuclear industry officials were engaged in bribery, kickbacks, extortion and money laundering designed to grow Vladimir Putin’s atomic energy business inside the United States, according to government documents and interviews.

Federal agents used a confidential U.S. witness working inside the Russian nuclear industry to gather extensive financial records, make secret recordings and intercept emails as early as 2009 that showed Moscow had compromised an American uranium trucking firm with bribes and kickbacks in violation of the Foreign Corrupt Practices Act, FBI and court documents show.

They also obtained an eyewitness account — backed by documents — indicating Russian nuclear officials had routed millions of dollars to the U.S. designed to benefit former President Bill Clinton’s charitable foundation during the time Secretary of State Hillary Clinton served on a government body that provided a favorable decision to Moscow, sources told The Hill.

The racketeering scheme was conducted “with the consent of higher level officials” in Russia who “shared the proceeds” from the kickbacks, one agent declared in an affidavit years later.

When this sale was used by Trump on the campaign trail last year, Hillary Clinton’s spokesman said she was not involved in the committee review and noted the State Department official who handled it said she “never intervened … on any [Committee on Foreign Investment in the United States] matter.”

In 2011, the administration gave approval for Rosatom’s Tenex subsidiary to sell commercial uranium to U.S. nuclear power plants in a partnership with the United States Enrichment Corp. Before then, Tenex had been limited to selling U.S. nuclear power plants reprocessed uranium recovered from dismantled Soviet nuclear weapons under the 1990s Megatons to Megawatts peace program.

Vadim Mikerin was a director of Rosatom’s Tenex in Moscow since the early 2000s, where he oversaw Rosatom’s nuclear collaboration with the United States under the Megatons to Megwatts program and its commercial uranium sales to other countries. In 2010, Mikerin was dispatched to the U.S. on a work visa approved by the Obama administration to open Rosatom’s new American arm called Tenam.

The kickbacks were known by the FBI, they had to happen to advance the case and to allow them as evidence of wrong-doing.

His, Mikerin’s, illegal conduct was captured with the help of a confidential witness, an American businessman, who began making kickback payments at Mikerin’s direction and with the permission of the FBI. The first kickback payment recorded by the FBI through its informant was dated Nov. 27, 2009, the records show.

In evidentiary affidavits signed in 2014and 2015, an Energy Department agent assigned to assist the FBI in the case testified that Mikerin supervised a “racketeering scheme” that involved extortion, bribery, money laundering and kickbacks that were both directed by and provided benefit to more senior officials back in Russia. More here.

Mikerin indictment document here.

The plea deal and 2 associated cases here.

Mikerin was sentenced to 4 years and forfeited $2,126,622.36  :

According to court documents, Mikerin was the director of the Pan American Department of JSC Techsnabexport (TENEX), a subsidiary of Russia’s State Atomic Energy Corporation and the sole supplier and exporter of Russian Federation uranium and uranium enrichment services to nuclear power companies worldwide, and the president of TENAM Corporation, a wholly owned subsidiary and the official representative of TENEX. Court documents show that between 2004 and October 2014, conspirators agreed to make corrupt payments to influence Mikerin and to secure improper business advantages for U.S. companies that did business with TENEX, in violation of the Foreign Corrupt Practices Act (FCPA). Mikerin admitted that he conspired with Daren Condrey, Boris Rubizhevsky and others to transmit approximately $2,126,622 from Maryland and elsewhere in the United States to offshore shell company bank accounts located in Cyprus, Latvia and Switzerland with the intent to promote the FCPA violations. Mikerin further admitted that the conspirators used consulting agreements and code words to disguise the corrupt payments.

Condrey, 50, of Glenwood, Maryland, pleaded guilty on June 17, 2015, to conspiracy to violate the FCPA and conspiracy to commit wire fraud. Rubizhevsky, 64, of Closter, New Jersey, pleaded guilty on June 15, 2015, to conspiracy to commit money laundering. Condrey and Rubizhevsky await sentencing.

***

Mikerin

 

Officials Potentially Influenced (Name; Title; Organization): 

  • Vadim Mikerin; President; TENAM Corporation
  • Vadim Mikerin; Director of the Pan American Department; JSC Techsnabexport (“TENEX”)

Defendant-Related Entities Involved in the Misconduct:    N/A

Third-Party Intermediary:   

  • Cypriot shell company , Shell Company
  • Latvian shell company , Shell Company
  • Swiss shell company , Shell Company
  • Vadim Mikerin , Agent/Consultant/Broker

 

For the FBI Haters, Check out Operation Cross Country

FBI Announces Results of Operation Cross Country XI

Underage Sex Trafficking Crackdown Leads to Recovery of 84 Minors

The Federal Bureau of Investigation, along with the National Center for Missing & Exploited Children (NCMEC), announced today that 84 minors were recovered and 120 traffickers were arrested as part of Operation Cross Country XI, a nationwide effort focusing on underage human trafficking that ran from October 12-15, 2017.

This is the 11th iteration of the FBI-led Operation Cross Country (OCC), which took place this year in 55 FBI field offices and involved 78 state and local task forces, consisting of hundreds of law enforcement partners. This year’s coordinated operations took place with several international partners, including Canada (Operation Northern Spotlight), the United Kingdom (Aident 8), Thailand, Cambodia, and the Philippines.

“We at the FBI have no greater mission than to protect our nation’s children from harm. Unfortunately, the number of traffickers arrested—and the number of children recovered—reinforces why we need to continue to do this important work,” said FBI Director Christopher Wray. “This operation isn’t just about taking traffickers off the street. It’s about making sure we offer help and a way out to these young victims who find themselves caught in a vicious cycle of abuse.”

Operation Cross Country XI

Story and Videos

Operation Cross Country XI

The 11th iteration of Operation Cross Country, the FBI’s annual law enforcement action focused on recovering underage victims of prostitution, concluded with the recovery of 84 sexually exploited juveniles.

As part of Operation Cross Country XI, FBI agents and task force officers staged operations in hotels, casinos, and truck stops, as well as on street corners and Internet websites. The youngest victim recovered during this year’s operation was 3 months old, and the average age of victims recovered during the operation was 15 years old. Minors recovered during Cross Country Operations are offered assistance from state protective services and the FBI’s Victim Services Division. Depending on the level of need, victims are offered medical and mental health counseling, as well as a number of other services.

“Child sex trafficking is happening in every community across America, and at the National Center for Missing & Exploited Children, we’re working to combat this problem every day,” said NCMEC President and CEO John Clark. “We’re proud to work with the FBI on Operation Cross Country to help find and recover child victims. We hope OCC generates more awareness about this crisis impacting our nation’s children.”

Operation Cross Country XI is part of the FBI’s Innocence Lost National Initiative, which began in 2003 and has yielded more than 6,500 child identifications and locations. For additional information on Operation Cross Country XI and the Innocence Lost initiative, please visit www.fbi.gov.

Examples of stories from various cities that took part in Operation Cross Country XI:

  • On October 13, FBI Denver recovered two minor girls—one 3-month-old and one five-year-old. The subject, a friend of the children’s family, offered an undercover officer access to the two children for sexual purposes in exchange for $600. The FBI is working with Child Protective Services to conduct a forensic interview and secure safe placement of the children. The subject was placed under arrest.
  • Also on October 13, a 16-year old female victim was recovered by FBI El Paso after an undercover agent called an online advertisement for entertainment. Shortly thereafter, the agent met with a 21-year-old female, who offered a fee of $200 to engage in sexual intercourse with her and another female, the 16-year-old victim. Further investigations revealed that a second adult female drove the minor and the 21-year-old to the undercover agent’s location. Both female subjects have been arrested on federal charges.

Note to Editors: B-Roll and interviews associated with Operation Cross Country can be downloaded at www.fbi.gov.

Scope of Russian Troll Operation Explained

Information warfare = Troll warfare

Russian journalists publish massive investigation into St. Petersburg troll factory’s U.S. operations

A day after Dozhd television published an interview with a former member of Russia’s infamous Internet Research Agency, the magazine RBC released a new detailed report on the same organization’s efforts to meddle in U.S. domestic politics. Meduza summarizes RBC’s new report here.

photo

The Internet Research Agency, Russia’s infamous “troll farm,” reportedly devoted up to a third of its entire staff to meddling in U.S. politics during the 2016 presidential election. At the peak of the campaign, as many as 90 people were working for the IRA’s U.S. desk, sources told RBC, revealing that the entire agency employs upwards of 250 people. Salaries for staff working in the U.S. department apparently range from 80,000 to 120,000 rubles ($1,400 to $2,100) per month.

The head of the IRA’s U.S. desk is apparently a man originally from Azerbaijan named Dzheikhun Aslanov (though he denies any involvement with the troll factory).

In August and September this year, Facebook, Instagram, and Twitter suspended 118 communities and accounts run by the St. Petersburg “troll factory,” disabling a network capable of reaching 6 million subscribers. In 2016, at the height of the U.S. presidential campaign, this network reportedly produced content that reached 30 million people each week.

A source also told RBC that the Internet Research Agency spent almost $80,000 over two years, hiring roughly 100 local American activists to stage about 40 rallies in different cities across the United States. The activists were hired over the Internet, communicating in English, without their knowledge that they were accepting money or organizing support from a Russian organization. According to RBC, internal records from the IRA verify its role in these activities.

The main activity in the troll factory’s U.S. desk was to incite racial animosity (playing both sides of the issue), and promoting the secession of Texas, objections to illegal immigration, and gun rights.

RBC estimates that the Internet Research Agency’s total salary expenses approach $1 million per year, with another $200,000 allocated to buying ads on social media and hiring local activists in the U.S.

According to RBC, the IRA still has a U.S. desk, though its staff has apparently dropped to 50 employees.

Note: Formally, the Internet Research Agency ceased to exist roughly two years ago, rebranding itself under different names, but sources say the organization continues to operate as before.

***

One part of the factory had a particularly intriguing name and mission: a “Department of Provocations” dedicated to sowing fake news and social divisions in the West, according to internal company documents obtained by CNN.

Prigozhin is one of the Kremlin’s inner circle. His company is believed to be a main backer of the St. Petersburg-based “Internet Research Agency” (IRA), a secretive technology firm, according to US officials and the documents reviewed by CNN. Prigozhin was sanctioned by the US Treasury Department in December of 2016 for providing financial support for Russia’s military occupation of Ukraine. Two of his companies, including his catering business, were also sanctioned by Treasury this year.
CNN has examined scores of documents leaked from Prigozhin’s companies that show further evidence of his links to the troll factory.
One contract provided IRA with ways to monitor social media and a “system of automized promotion in search engines.”
Prigozhin has a colorful past. He spent nine years in prison in the 1980s for fraud and robbery, according to Russian media reports. After his release, he went into the catering business — renovating a boat and opening New Island, one of a half-dozen upscale restaurants he owns in St. Petersburg. Putin turned to him to cater his birthday parties as well as dinners with visiting leaders, including President Bush and Jacques Chirac of France. A headline in The Moscow Times referred to Prigozhin as Putin’s “Personal Chef.”
Prigozhin subsequently won lucrative catering contracts for schools and Russia’s armed forces. He escorted Putin around his new food-processing factory in 2010. By then he was very much a Kremlin insider with a growing commercial empire. More here.
***
Trolling NATO? Yuppers

Seventy percent of Russian-language tweets targeting NATO military activities in Eastern Europe are generated by automated Russian trolls, according to a survey done by the military alliance.

“Two in three Twitter users who write in Russian about the NATO presence in Eastern Europe are robotic or ‘bot’ accounts,” the NATO Strategic Communications Centre of Excellence stated in a report made public this week.

The Russian bots sent 84 percent of all Russian language messages. English language tweets against the alliance also were found to be automated, with some 46 percent generated by automated Twitter accounts.

The report criticized the global social media platform for not doing enough to counter Russian bot activities on Twitter. “Our impression is that Twitter in Russian is policed less effectively than it is in English,” the report said.

A Twitter spokesman could not be reached for comment. Colin Crowell, Twitter’s vice president for public policy, stated in a recent post on the company website that “we strictly prohibit the use of bots and other networks of manipulation to undermine the core functionality of our service.” Read more here.

Trump vs. Iran vs. Europe

Primer: From BBC/

Iran has been blamed for a major cyber-attack on Parliamentary email accounts, including those of cabinet ministers.

Whitehall officials say Iran was behind a “sustained” cyber-attack on 23 June with hackers making repeated attempts to guess passwords of 9,000 accounts.

Up to 30 accounts are thought to have been compromised.

Security sources now believe the attackers came from Iran, although none of the information appears to have been used and the motive remains unclear.

BBC security correspondent Gordon Corera described the June attack as “not especially sophisticated” but told BBC Radio 4 it was a sign that Iran was becoming “more aggressive and capable as a cyber power”.

***  photo

And Britain still stands with the JCPOA?

Source: President Trump’s decision to decertify does not withdraw the U.S. from the Joint Comprehensive Plan of Action (JPCOA). Congress will now debate whether the U.S. should continue sanctions relief. Trump’s strategy also promised that the U.S. would focus more broadly on addressing Iran’s destabilizing behavior in the region, among other aspects.

President Hassan Rouhani slammed Trump’s speech and new strategy, and claimed that Trump has only distanced himself from his European allies and unified Iran. UK Prime Minister Theresa May, German Chancellor Angela Merkel, and French President Emmanuel Macron stressed their commitment to upholding the JCPOA in a statement following Trump’s speech.

  • European leaders issue statement following Trump’s speech. UK Prime Minister Theresa May, German Chancellor Angela Merkel, and French President Emmanuel Macron issued a joint statement conveying their commitment to the JCPOA following President Trump’s announcement that he will not certify that the deal is in the national security interests of the U.S. The European leaders cautioned President Donald Trump and U.S. lawmakers to carefully consider the implications of taking actions that could undermine the JCPOA, such as “re-imposing sanctions [that were] lifted under the [JCPOA].” They also expressed their concern about Iran’s ballistic missile program and disruptive regional activities, stating that they “stand ready to take further appropriate measures to address these issues.” European leaders have voiced their continuous support for the JCPOA. Several European countries have signed a myriad of financial deals with Iran since the implementation of the JCPOA in January 2016. The imposition of new sanctions or the reintroduction of previously lifted sanctions could imperil existing and future deals reached between Europe and Iran. (GOV.uk)