Cottage Industry in U.S. for Refugee Resettlement

There was a time when the U.S. State Department along with associated agencies including USAID and the CIA would work to migrate countries from communism to democracies. After the rise of militant Islam and terror attacks around the world, countless gestures have been launched to destroy terror including of course war. Stable countries are now vulnerable and susceptible to radical migrant refugees and migrants.

Europe is in the worst condition and the United States is functioning in much the same manner. We constantly hear that the United States was built on immigrants and we invite legal immigration. Few conceive the notion that immigrants would not seek out America if there home countries were stable, democratic and functioning especially when the United States sends billions each year offshore for assistance and stability.

Meanwhile, America continues to budget and appropriate funds for migrants and refugees in the United States and more coming.

Image result for Reception and Placement Programphoto

For an exact sample on how the states operate, this site provided some great insight using Michigan.

Do you wonder what the total and comprehensive costs are for refugee resettlement? Well, the General Accounting Office is to report those costs, yet there seems to be no recent report. Meanwhile see pages 8-9 for the resettlement numbers by state by clicking here.

FY 2017 Notice of Funding Opportunity for Reception and Placement Program

Funding Procedures

Under current funding procedures, each agency with which the Bureau enters into a Cooperative Agreement (CA) is provided $2,025 for each refugee it sponsors who arrives in the United States during the period of the CA and is verified to have been placed and assisted by the agency. The funding is intended to supplement private resources available to the applicant and may be used at the local affiliates at which refugees are resettled and only for the direct benefit of refugees and for the delivery of services to refugees in accordance with program requirements as described in the CA. In addition, the Bureau funds national R&P Program management costs according to separately negotiated and approved budgets based on the applicant’s sponsorship capacity.

The annual ceiling for refugee admissions will be established by the President following consultations with the Congress towards the end of FY 2016. The FY 2017 appropriation and refugee ceiling have not yet been determined. For planning purposes, applicants should use the following refugee admissions projections as a baseline, although they may not necessarily be the regional or total ceilings that will be set by the President for FY 2017. Projections by region are as follows:

Africa — 30,000

East Asia — 12,000

Europe and Central Asia — 5,000

Latin America and the Caribbean — 5,000

Near East and South Asia — 44,000

Unallocated Reserve — 4,000

In addition, applicants should include 7,000 Special Immigrant Visa (SIV) recipients in their planning.

As in previous years, applicants should base their placement plans provided to PRM in response to this notice of funding opportunity on the capacity of their network of local affiliates, which will have consulted with resettlement partners in their communities in order to ensure that the placement plans are reasonable and appropriate. Should the FY 2017 Presidential Determination and appropriation processes result in ceilings that are different from the total capacity that has been proposed by all approved applicants, the Bureau will work with approved applicants, as necessary, to develop a revised plan, as it has in previous years. If you can stand it, continue the stipulations and grant procedures here.

***

It has become a cottage industry with almost zero checks and balances and your tax dollars? Well glad you asked. Check it:

Requirements to resettle refugees
To be selected as an R&P program agency, a non-governmental organization must apply to the PRM, which stipulates they meet three requirements:
1. Applicants must be “well-established social service providers with demonstrated case management expertise and experience managing a network of affiliates that provide reception and placement or similar services to refugees or other migrant populations in the United States;
2. (they must) have been in operation for at least three full years in non-profit status;
3. and document the availability of private financial resources to contribute to the program” (FY 2012 Funding Opportunity Announcement for Reception and Placement Program).

How it works 
Each agency enters into a Cooperative Agreement (CA) with the PRM and is provided $1800 per refugee it sponsors who arrives in the U.S. during the period of the CA. Resettlement agencies have voluntary agreements with the Office of Refugee Resettlement within the U.S. Department of Health and Human Services (US DHHS). The resettlement agencies generally receive seven to ten days notice prior to the arrival of a refugee so that they can assign a case manager, find housing, furniture, and purchase necessary household items. If the refugee has a relative or other tie already living in the U.S. (called an “anchor”), the resettlement agency usually establishes an agreement before the refugees arrive to determine the role the relative or tie will have in assisting the newly arrived refugee in accessing core services.

Service period & basic services
The R&P service period is thirty days long, but can be extended to up to ninety days if more time is necessary to complete delivery of R&P services, although some service agencies allow extensions of assistance based on a client’s needs. Basic support consists of the provision of:
1. Decent, safe, sanitary, and affordable housing
2. Essential furnishings
3. Appropriate food and food allowances
4. Necessary clothing
5. Assistance in applying for social security cards
6. Assistance in registering children in school
7. Transportation to job interviews and job training
8. At least two home visits
9. An initial housing orientation visit by a designated R&P representative or case manager
10. Assistance in obtaining health screening and mental health services
11. Obtaining employment services
12. Obtaining appropriate benefits
13. Referrals to social service programs
14. Enrollment in English as a Second Language instruction.
15. Pre-arrival processing & reception planning
16. Airport pickup
17. Hot meal on night of arrival
18. General case management
19. Development and implementation of a resettlement plan
20. Cultural orientation classes
21. Employment assessment and possible enrollment in UST’s employment program
22. Referrals to UST internal programs
23. Advocacy within government and social services agencies
24. Coordination of community volunteers that provide additional adjustment assistance
25. Follow up and basic needs support

If refugees are still in need of assistance after this 30-90 day period, they can seek aid from public benefit programs for up to seven years. Refugees retain their status as such for one year, and then are considered permanent residents for four years. After that, they can apply for U.S. citizenship.

Other services listed on our website are also accessible to our clients.  Some services are subject to office location.

 

What the Uranium One Documents Reveal

Our Operations

Uranium One is engaged through its subsidiaries and joint ventures in uranium production, and in the exploration and development of uranium properties, in Kazakhstan, the United States, Tanzania and elsewhere. Uranium One is focused on low cost and low technical risk operations, with existing, near and medium-term production visibility in some of the world’s largest uranium resource jurisdictions.

Uranium One is a joint venture partner with JSC NAC Kazatomprom, the Kazakhstan state-owned atomic energy company, in six major producing uranium mines in Kazakhstan – Akdala, South Inkai, Karatau, Akbastau, Zarechnoye and Kharasan. The company also operates the Willow Creek uranium mine in Wyoming, and is the operator of, and owns a 13.9 percent interest in, the Mkuju River uranium development project in Tanzania.

Uranium One’s revenues are largely derived from the sale of uranium concentrates. The company sells its uranium to major nuclear utilities in Russia, Europe, North America, South America, Middle East and Asia.

***

This was an internal coup advanced by the Obama administration. What is worse, where are those Hillary, State Department of CFIUS or White House related emails?

***

William Campbell, the FBI informant, documented for his FBI handlers the first illegal activity by Russians nuclear industry officials in fall 2009, nearly a entire year before the Russian state-owned Rosatom nuclear firm won Obama administration approval for the Uranium One deal, the memos show.

Evidence gathered by an FBI undercover informant conflicts with several media reports as well as statements by Justice officials concerning the connections between a Russian nuclear bribery case and the Obama administration’s approval of the sale of uranium One to Russia’s state-owned Rosatom nuclear company. More here.

*** Image result for uranium one photo

During Campbell’s time working as a confidential informant, he was required by the Russians to launder large sums of money to financial institutions in Cyprus, Latvia and Seychelles. With Campbell’s help the FBI uncovered an extensive money Russian nuclear money laundering apparatus and Campbell was working solo. He was required to launder money, from his own salary, on particular days and times when Russian money handlers would be working at the banks. If he missed a scheduled pay time for any reason his Russian counterparts would threaten him, he told his attorney. He was also required on many occasions to deliver cash directly to those who were being paid off, most of which he recorded on hidden cameras for the FBI.

It didn’t end there. In order to keep his cover he spent many nights with his Russian counterparts drinking, collecting information and more importantly gaining their trust. He was in his early 60s and his once unblemished driving record ended with a DUI in 2008 and two other reckless driving charges in 2010 and 2012, said Toensing, who noted they were all misdemeanors.

THE PLAYERS

The cast of characters deep within the Russian nuclear agency also included another American businessman named Rod Fisk, whose company Transportation Logistics International, also known as TLI,  was the primary transport company for Russian enriched uranium sold to the United States.

Fisk passed away in 2011, and his Vice President Daren Condrey replaced him. In 2015, Daren Condrey, of Maryland, pleaded guilty to conspiring to violate the Foreign Corrupt Practices Act (FCPA) and conspiring to commit wire fraud, according to the DOJ.

Adding to the colorful array of Russian criminals the FBI was watching, was a Russian national named Vadim Mikerin. He was then a top official of the Russian nuclear arms subsidiary Tenex. Mikerin, who had close ties to elite members of the Kremlin, and who bragged in emails and documents about his families connections to current Russian President Vladimir Putin, would later become president of Tenam, the American subsidiary that began operations in 2010, according to the contract. Boris Rubizhevsky, another Russian national from New Jersey,  who was  president of the security firm NEXGEN Security, also pleaded guilty in 2015, to conspiracy to commit money laundering.  He served as a consultant to TENAM and to Mikerin. He was sentenced to prison last week along with three years of supervised release and a $26,500 fine, according to a recent Reuters report.

Mikerin was eventually arrested for a racketeering scheme that dated back to 2004, and included fraud, extortion and money laundering. But he only plead guilty to money-laundering. He was sentenced to 48 months in prison in December 2015. More here.

Vadim Mikerin (image from flickr.com by Tenam USA) / Flickr

 

Here are five revelations from those documents reviewed by The Hill:

Russia saw its purchase of Uranium One as part of a strategy to dominate global uranium markets, including making the United States more dependent on Moscow’s nuclear fuel.

Documents the informant gave the FBI clearly show that the purchase of Uranium One was seen by Russia and its American consultants as one tool in a strategy to “control” the uranium market worldwide. In the United States, that strategy focused on securing billions of new uranium contracts to create a new reliance on Russian nuclear fuel just as the Cold War-era Megatons to Megawatts program was ending.

Uranium One did export some of its U.S. uranium ore.

News organizations, including The Washington Post, continue to report none of Uranium One’s product left the U.S. after Russia took control. In fact, the Nuclear Regulatory Commission (NRC) approved an export license for a third party trucking firm to export Uranium One ore to Canada for enrichment, and that some of that uranium ended up in Europe, NRC memos show. Uranium One itself admits that as much as 25 percent of the uranium it exported to Canada ended up with European or Asian clients through what is know in the industry as “book transfers.”

The FBI informant Douglas Campbell does have information to share with Congress about Rosatom’s Uranium One purchase.

Justice officials have suggested in recent stories that Campbell has little on Uranium One because his work forced on nuclear bribery involving a different Rosatom subsidiary. While it’s true Campbell’s undercover work focused on criminality inside the Rosatom subsidiary Tenex, he did gather extensive documents about Rosatom’s efforts to win approval to buy Uranium One.

The FBI did have evidence that Rosatom officials were engaged in criminality well before the Obama administration approved Rosatom’s purchase of Uranium One.

Evidence that a foreign company is involved in criminality can disqualify it from Committee on Foreign Investment in the United States (CFIUS) approval to buy a sensitive U.S. asset. And Campbell helped the FBI recorded the first criminal activity by Rosatom officials inside its Tenex arm in November 2009, nearly an entire year before CFIUS approved Rosatom’s purchase of Uranium One.

Justice officials trusted the informant Campbell enough to keep him working undercover for six years and to pay him more than $51,000 once the convictions were secured.

A check obtained by The Hill shows the FBI paid Campbell an informant fee of more than $51,000 in January 2016, shortly after the last convictions in the Russian nuclear bribery case were made.

Sexual Harassment: Hollywood, Media, Government

Well, Al Franken has another accuser then we have Charlie Rose and now John Conyers…sheesh this redefines draining the swamp.

When will the Washington Post or CNN advance the Senator Menendez case?

The young woman wrote that she was recruited as an escort from an adult escort service called the Doll Palace, and that the code word “chocolate” would summon her and other girls to Melgen’s sex parties. She offered specific recollections of Melgen’s preferred pimp, the homes where she slept with his house guests for money, and the phone number her calls would come from.

Image result for senator menendez melgen photo

Her account of the sex parties Menendez allegedly attended in the Dominican Republic is the most detailed to surface since TheDC first began reporting on the story in November.

She told her story to a tipster who forwarded the email to CREW; it was not included with the cache of documents he published online on Jan. 24. TheDC was first to report on that dossier about Sen. Menendez, which included an interview transcript in which a different women claimed she was 16 when she began sleeping with him.

That young prostitute said she had sex with Menendez “three times at least” in 2009. “The first one in February, and then in May and June. I recall his visit in June so well because that month was my 17th birthday.” More here.

***

Television host Charlie Rose has been accused by a slew of women of sexual misconduct spanning decades.

The 75-year-old face of “CBS This Morning” and the PBS program “Charlie Rose” joins disgraced producer Harvey Weinstein, comedian Louis C.K., Kevin Spacey and a host of entertainers in a widening cultural sex scandal.

The news was first reported Monday by The Washington Post in an exposé involving dozens of men and women who worked on “Charlie Rose.”

The newspaper said eight women — three of them named — gave details that indicate a modus operandi for putting women in awkward sexual situations.

A trend among the women who spoke to the Post includes:

  • Mr. Rose would allegedly grab new employees by the leg to “gauge” their reactions.
  • Mr. Rose would invite women to work at his home.
  • Mr. Rose allegedly walked around naked once women entered his home.
  • Mr. Rose allegedly called women to share sexual fantasies.

Read more here.

Many have asked about what lawmakers were part of the $15-18 million payoff(s) in Congress. Okay…one name is John Conyers. What is worse is taxpayer dollars were used to pay for airfare….WHAT?

Image result for john conyers photo

She Said That A Powerful Congressman Harassed Her. Here’s Why You Didn’t Hear Her Story.

“When you make private settlements, it doesn’t warn the next woman or the next person going into that situation.”

Michigan Rep. John Conyers, a Democrat and the longest-serving member of the House of Representatives, settled a wrongful dismissal complaint in 2015 with a former employee who alleged she was fired because she would not “succumb to [his] sexual advances.”

Documents from the complaint obtained by BuzzFeed News include four signed affidavits, three of which are notarized, from former staff members who allege that Conyers, the ranking Democrat on the powerful House Judiciary Committee, repeatedly made sexual advances to female staff that included requests for sexual favors, contacting and transporting other women with whom they believed Conyers was having affairs, caressing their hands sexually, and rubbing their legs and backs in public. Four people involved with the case verified the documents are authentic.

And the documents also reveal the secret mechanism by which Congress has kept an unknown number of sexual harassment allegations secret: A grinding, closely held process that left the alleged victim feeling, she told BuzzFeed News, that she had no option other than to stay quiet and accept a settlement offered to her.

“I was basically blackballed. There was nowhere I could go,” she said in a phone interview. BuzzFeed News is withholding the woman’s name at her request, because she said she fears retribution.

Last week the Washington Post reported that the office paid out $17 million for 264 settlements with federal employees over 20 years for various violations, including sexual harassment. The Conyers documents, however, give a glimpse into the inner workings of the Office of Compliance, which has for decades concealed episodes of sexual abuse by powerful political figures

The woman who settled with Conyers launched the complaint in 2014 with Congress’s Office of Compliance alleging that she was fired for refusing his sexual advances and ended up facing a daunting process that ended with a confidentiality agreement in exchange for a settlement of more than $27,000. Her settlement, however, came from Conyers’ office budget rather than the designated fund for settlements.

Congress has no human resources department. Instead, congressional employees have 180 days to report a sexual harassment incident to the Office of Compliance, which then leads to a lengthy process involves counseling, mediation, and requires the signing of a confidentiality agreement before a complaint can go forward.

After this, an employee can choose to take the matter to federal district court, but another avenue is available: an administrative hearing, after which a negotiation and settlement may follow.

Some members of Congress have raised major concerns with the current system over the years, but the calls for an overhaul have grown louder in the post-Weinstein era. Members have argued that 90 days is too long to make a person continue working in the same environment with their harasser; that interns and fellows should be eligible to pursue complaints through this process; and that it is unfair for a victim to have to pay for legal representation while the office of the harasser is represented for free by the House’s counsel.

In this case, one of Conyers’ former employees was offered a settlement, in exchange for her silence, that would be paid out of Conyers’ taxpayer-funded office budget. His office would “rehire” the woman as a “temporary employee” despite her being directed not to come into the office or do any actual work, according to the document. The complainant would receive a total payment of $27,111.75 over the three months, after which point she would be removed from the payroll, according to the document.

The draft agreement viewed by BuzzFeed News was unsigned, but congressional employment records match the timing and amounts outlined in the document. The woman left the office and never went public with her story.

The process was “disgusting,” said Matthew Peterson, who worked as a law clerk representing the complainant, and who listed as a signatory to some of the documents.

“It is a designed cover-up,” said Peterson, who declined to discuss details of the case but agreed to characterize it in general terms. “You feel like they were betrayed by their government just for coming forward. It’s like being abused twice.”

Other lawyers named as representing the accuser could not be reached for comment. The Office of Compliance did not confirm or deny that they had dealt with the case.

“Pursuant to the Congressional Accountability Act, the OOC cannot comment on whether matters have or have not been filed with the office,” Laura Cech, publications and outreach manager of the Office of Compliance, told BuzzFeed News in an email when asked to comment on this case.

Two staffers alleged in their signed affidavits that Conyers used congressional resources to fly in women they believed he was having affairs with. Another said she was tasked with driving women to and from Conyers’ apartment and hotel rooms.

Rep. Conyers did not admit fault as part of the settlement. His office did not respond to multiple requests for comment on Monday.

The documents were first provided to BuzzFeed News by Mike Cernovich, the men’s rights figure turned pro-Trump media activist who propagated a number of false conspiracy theories including the “Pizzagate” conspiracy. Cernovich said he gave the documents to BuzzFeed News for vetting and further reporting, and because he said if he published them himself, Democrats and congressional leaders would “try to discredit the story by attacking the messenger.” He provided them without conditions. BuzzFeed News independently confirmed the authenticity of the documents with four people directly involved with the case, including the accuser.

In her complaint, the former employee said Conyers repeatedly asked her for sexual favors and often asked her to join him in a hotel room. On one occasion, she alleges that Conyers asked her to work out of his room for the evening, but when she arrived the congressman started talking about his sexual desires. She alleged he then told her she needed to “touch it,” in reference to his penis, or find him a woman who would meet his sexual demands.

She alleged Conyers made her work nights, evenings, and holidays to keep him company.

In another incident, the former employee alleged the congressman insisted she stay in his room while they traveled together for a fundraising event. When she told him that she would not stay with him, she alleged he told her to “just cuddle up with me and caress me before you go.”

“Rep. Conyers strongly postulated that the performing of personal service or favors would be looked upon favorably and lead to salary increases or promotions,” the former employee said in the documents.

Three other staff members provided affidavits submitted to the Office Of Compliance that outlined a pattern of behavior from Conyers that included touching the woman in a sexual manner and growing angry when she brought her husband around.

One affidavit from a former female employee states that she was tasked with flying in women for the congressman. “One of my duties while working for Rep. Conyers was to keep a list of women that I assumed he was having affairs with and call them at his request and, if necessary, have them flown in using Congressional resources,” said her affidavit. (A second staffer alleged in an interview that Conyers used taxpayer resources to fly women to him.)

The employee said in her affidavit that Conyers also made sexual advances toward her: “I was driving the Congressman in my personal car and was resting my hand on the stick shift. Rep. Conyers reached over and began to caress my hand in a sexual manner.”

The woman said she told Conyers she was married and not interested in pursuing a sexual relationship, according to the affidavit. She said she was told many times by constituents that it was well-known that Conyers had sexual relationships with his staff, and said she and other female staffers felt this undermined their credibility.

“I am personally aware of several women who have experienced the same or similar sexual advances made towards them by Rep[.] John Conyers,” she said in her affidavit.

A male employee wrote that he witnessed Rep. Conyers rub the legs and other body parts of the complainant “in what appeared to be a sexual manner” and saw the congressman rub and touch other women “in an inappropriate manner.” The employee said he confronted Conyers about this behavior.

“Rep. Conyers said he needed to be ‘more careful’ because bad publicity would not be helpful as he runs for re-election. He ended the conversation with me by saying he would ‘work on’ his behavior,” the male staffer said in his affidavit.

The male employee said that in 2011 Conyers complained a female staffer was “too old” and said he wanted to let her go. The employee said he set up a meeting in December 2011 to discuss “mistreatment of staff and his misuse of federal resources.” The affidavit says that Conyers “agreed that he would work on making improvements as long as I worked directly with him and stopped writing memos and emails about concerns.”

Another female employee also attested that she witnessed Conyer’s advances, and said she was asked to transport women to him. “I was asked on multiple occasions to pick up women and bring them to Mr. Conyers[‘] apartment, hotel rooms, etc.”

BuzzFeed News reached out to several former Conyers staffers, all of whom did not want to speak on the record. One former staffer, who did not want to be named, said she was frustrated by the secretive complaint process.

“I don’t think any allegations should be buried…and that’s for anyone, not just for this particular office, because it doesn’t really allow other people to see who these individuals are,” said the former staffer. “When you make private settlements, it doesn’t warn the next woman or the next person going into that situation.”

Another staffer said that Conyers’ reputation made people fearful to speak out against him. Aside from being the longest-serving House member and the ranking member of a powerful committee, Conyers is a civil rights icon. He was lauded by Martin Luther King Jr. and is a founding member of the Congressional Black Caucus.

“Your story won’t do shit to him,” said the staffer. “He’s untouchable.”

In a statement to BuzzFeed News, House Democratic Leader Nancy Pelosi said she was not aware of the settlement.

“The current process includes the signing of non-disclosure agreements by the parties involved. Congresswoman Jackie Speier has introduced legislation that will provide much-needed transparency on these agreements and make other critical reforms,” Pelosi said in the statement. “I strongly support her efforts.”

BuzzFeed News; Source: Office of Compliance

A spokesperson for John Boehner, who was the speaker of the House when the settlement was made, did not respond to a BuzzFeed News request for comment on Monday.

The documents also show that there was a belief among at least some staffers that the office was a jealous environment. Some of the documents allege Conyers offered his protection when staff would complain to him about management in the office.

California Democrat Rep. Speier and colleagues in the House and Senate have introduced legislation that would overhaul the complaint process, including requiring OOC to publicly name the office of any member who enters into a settlement. The bill would also allow complainants to waive mediation and counseling, set up a victims’ counsel, and require all congressional offices to go through harassment training every year.

Conyers’ office has a history of ethical run-ins. In 2016, his former chief of staff Cynthia Martin pleaded guilty to receiving stolen property after she refused to reimburse $16,500 that was mistakenly deposited in her account. A preliminary investigation by the Office of Congressional Ethics found that Conyers continued to pay Martin more than $13,000 per month when she was supposedly on unpaid leave.

In 2006, two former aides complained that Conyers made them babysit his children, run errands, and work on his reelection campaign while drawing their congressional salaries. There was also a bizarre incident in 2005 when 60 Thanksgiving turkeys, given to his staff to disperse to people, may have gone missing.

Conyers’ wife, former Detroit city councilor Monica Conyers, was sentenced to three years in prison over bribery charges in 2010. (One of the documents alleged Conyers began “aggressively acting out his sexual harassment behavior” following this.) Last year the couple renewed their vows. ●

 

 

A Wide Look at North Korea’s WMD Operations

Image result for north korea defector shot

photo

Primer:

South Korean surgeons operating on a North Korean defector who escaped across the Demilitarized Zone between the two countries under a hail of gunfire on Nov. 13 have found a parasite in the man’s stomach unlike any other they had seen.

The defector, who was shot five times, remained in critical condition after hours in two rounds of surgery, according to an article in the Korea Biomedical Review published on Nov. 15.

North Korean Cyber Operations: Weapons of Mass Disruption

Over the past 10 years, the escapades of various nation-state actors in the cyber realm have exploded onto the pages of top-tier media, and into prime time network news.

Russian espionage against political targets during the 2016 US presidential election, wide reaching Chinese espionage against Western commercial targets, disruptive attacks against the US financial sector associated with Iran, and the destructive attacks against Sony Pictures Entertainment (SPE) are some of the premier examples of mainstream coverage of ‘cyber.’

Behind every single offensive cyber action conducted in the interest of the capable nation-states is a doctrine,[1] and North Korea, like many other nation-states, has incorporated cyber operations within their own broader military doctrine and has conducted numerous offensive operations in the furtherance of their national agenda. What is particularly alarming about DPRK operations is their willingness to initiate escalatory actions, such as their likely connections to the now infamous WannaCry ransomware, and their targeting of the global financial system.

North Korea’s disregard for the consequences of its actions sets them apart from other nation-states, and is particularly dangerous.

North Korean offensive cyber operations have been conducted to collect sensitive political and military intelligence information, to lash out at enemies who threaten their beliefs and interests, and most interestingly, to generate revenue.

This revenue generation aspect of North Korean operations was thrust into the international spotlight when, in early 2016, unauthorized transfers of funds from the Bangladesh Central Bank were issued using the Society for Worldwide Interbank Financial Telecommunication (SWIFT) network for global banking. The attempted transfers amounting to over $950 million USD sought to move funds to entities in locations such as Sri Lanka and the Philippines; ultimately $81 million USD in funds disappeared into the ether.

The subsequent investigation revealed that the perpetrators of the attack used tools to securely delete records from the SWIFT terminals that would alert Bangladesh Central Bank employees of the transfers. Commonly referred to as a “wiper,” this secure deletion tool contained code that was linked by many in the computer security industry to one used in attacks associated with North Korea, notably the attack on SPE through a US Computer Emergency Response Team (USCERT) alert. The revelation that a state would engage in such a flagrant violation of international norms came as a surprise to many in the information security arena. North Korea watchers were, of course, not surprised as the currency generation activities benefiting the Kim family and their isolated nation have been well understood for some time.

The 2016 SWIFT attacks associated with North Korea are part of the broader currency generation operations of DPRK cyber actors and intelligence organizations. Botnets associated with espionage activity targeting South Korea have been used to generate revenue through a variety of schemes for almost 10 years. Recent DPRK activity suggests an interest in obtaining cryptocurrency, such as bitcoin, through extortion and targeting of cryptocurrency exchanges.

In the third quarter of 2017, for instance, malicious emails containing weaponized documents were used to target international financial organizations, as well as bitcoin exchanges. The ultimate goal of these attacks, which were tracked by the information security community under names such as Stardust Chollima and BlueNoroff, is yet unknown, however theft and sabotage are likely.

Bitcoin provides attractive benefits to the isolated nation due to a lack of regulation and the ability to subvert international sanctions. In May 2017, ‘WannaCry’ exploded across the internet, encrypting sensitive material and holding the keys to decrypt the files for a ransom to be paid in bitcoin. This attack, too, had North Korean fingerprints embedded in the code used to execute the attack, as did the tools that were used to develop that code.

Attribution is a particularly sensitive subject in the cyber domain. Technical artifacts from the executable code that was used to conduct the WannaCry attack overlaps with code used in attacks against South Korean nuclear power plants and the SPE attack of 2014. While the technical artifacts can provide some measurable connections between the attacks, they require deep technical understanding to interpret. Other linkages, such as targeting and operational procedures, are the product of intelligence assessments and have been disputed by various parties muddying the water surrounding the assigning of attribution.

North Korea is an exception to the classical understanding of how most nations implement offensive cyber operations in that they incorporate espionage, disruptive/destructive attacks and financially motivated operations using the same computer code and infrastructure.

The value of cyber operations is likely recognized by North Korea’s most senior leadership through the State Affairs Commission (SAC), the General Staff of the Korean People’s Army, and Kim Jong Un himself. Subordinate units, notably the Reconnaissance General Bureau (RGB), Bureau 121, and the Command Automation Bureau (CAB), are likely responsible for executing the specific operations. The individual units may have a charter to self- finance their operations, or to contribute financial gains back to the regime, but it seems clear that various offensive operations are conducted by differing groups with their own approach and missions. For example, one group may have a primary focus on revenue generation, targeting South Korean banks and SWIFT and conducting extortive attacks, while another group might focus on intelligence collection, while a third conducts sabotage and destructive attacks.

Finally, the maturity of North Korean offensive cyber operations has been demonstrated through the integration of destructive attacks by cyber units during military exercises executed in the midst of escalating tension with South Korea. For instance, following the December 2012 launch of the Kwangmyongsong-3 satellite via the Unha-3 satellite launch vehicle, tensions on the Korean peninsula were high. That March, following the passing of UN Security Council Resolution (UNSCR 2087) and B-52 strategic bomber overflights in South Korea, North Korea responded with a particularly aggressive disruptive attack against South Korea.

This massive wiper attack targeted South Korea’s financial and media sectors and coincided with provocations by North Korean military and escalating political rhetoric. This pairing allowed for maximum psychological impact, while demonstrating North Korea’s ability to integrate offensive cyber activities into well-developed military doctrine. During these attacks, the Korea Broadcasting System (KBS), Munhwa Broadcasting Corporation (MBC), Yonhap Television News (YTN) and several Korean financial institutions reported disruptions. With the threat of military escalation on the table, many in South Korea would have depended on the media outlets for breaking news. Disruption of ATM networks and financial institutions would further add to the chaos as word of media disruptions began to spread.

As tensions are once again escalating between North Korea and the international community, more attacks perpetrated by DPRK cyber actors are likely. The recent increase in financial sector targeting associated with these actors may illustrate the potential for disruptive attacks to demonstrate both the capability of the North Korean actors, as well to achieve objectives in line with their broader military doctrine. While North Korea’s isolation may be detrimental to its economy and international relations, it is an effective shield from which to launch offensive cyber operations against a connected and delicate global system.


  1. [1]

    In order to establish some common definitions, we can look to the United States Department of Defense, who established Computer Network Operations (CNO) as a component of the broader Information Operations (Information Warfare) arena. CNO is further categorized into Computer Network Exploitation (CNE), Computer Network Attack (CNA), and Computer Network Defense (CND). Offensive cyber operations conducted by nation-states using this model would be considered CNE and CNA. The use of CNE can be roughly characterized as espionage, whereas CNA would be used to degrade, deny, disrupt, or destroy the network based systems of an adversary. This model can help provide a clear delineation of how various military, intelligence community, and law enforcement agencies with their authorities are able to conduct operations. China, Russia, Iran and virtually every nation-state in the world conduct CNE/CNA operations in accordance with their legal authorities and national interests.

    ***

    There are other weapons few discuss.

    Pyongyang has already achieved partial coverage of US territories. Last June, in a hearing before the US House Armed Services Committee, the head of the US Missile Defense Agency, Vice Admiral James Syring, said: “The advancement and demonstration of technology of ballistic missiles from North Korea in the last six months have caused great concern to me and others. It is incumbent on us to assume that North Korea today can range the US with an ICBM carrying a nuclear warhead.”

    This particular endeavor was likely assisted by Tehran. A February 2016 report by the Congressional Research Service concluded, “Iran has likely exceeded North Korea’s ability to develop, test, and build ballistic missiles.” Tehran might be, and probably is, helpful to Pyongyang with respect to technological aspects of the nuclear sphere as well.

    The nuclear component within the spectrum of North Korea’s weapons of mass destruction (WMDs) is evidently growing. The big question is whether the country’s despot, Kim Jong-un, will be the first person to use nuclear weapons since 1945.

    Quite recently, Kim elected to employ a highly lethal chemical weapon, the nerve agent VX, for a political assassination. This weapon was used last February by two female operatives, one Indonesian and the other Vietnamese, to murder Kim Jong-un’s estranged half-brother, Kim Jong-nam, in Malaysia. The victim died shortly after being assaulted by the two women, who wiped VX on his face as he prepared to board a flight to the Chinese territory of Macau. Traces of VX were revealed on swabs taken from his eyes and face.

    This deadly chemical agent was probably smuggled from North Korea to Malaysia, which in and of itself was an intriguing and risky move. Six of eight potential suspects were from Pyongyang’s Ministries of State Security and Foreign Affairs. The suspects flew from Kuala Lumpur on the day of the assassination, passing through Vladivostok on their way back to Pyongyang. South Korea’s request to detain four of the suspects was rejected by Russian officials on the grounds of lack of evidence.

    It can be assumed that Kim Jong-un was in on the plot from its inception. Symbolically, at least, this political assassination by VX can be regarded as an indication of Pyongyang’s chemical weapons (CW) capabilities. Whether the regime intended it to or not, the assassination signaled the readiness, usability, and deployability of North Korea’s VX, which can be used for guerrilla warfare, chemical terrorism, or wide-scale chemical attack.

    VX is also weaponized within warheads carried by ballistic missiles in Pyongyang’s  vast CW arsenal. The North Korean ballistic program constitutes the principal, though not the only, vehicle for all three WMD programs. The CW and biological weapons (BW) programs are fully matured and have marked operational offensive capabilities. Inadequate attention is being paid to Pyongyang’s large-scale offensive capacities in terms of CW and BW, but the VX political assassination incident was a wake-up call (if unintentional). More here.

Top Progressives/Dark Money Meeting at Cali Resort

Beyond Resistance it is called….watch that hashtag through 2020. Meanwhile, if Kamala Harris is there with Van Jones and George Soros with Nancy Pelosi, you know the agenda is being crafted.

Image result for beyond resistance soros photo

Resistance Royalty: Pelosi, Soros Headline Left’s Biggest Dark Money Conference

Private memo gives inside look at Democracy Alliance’s latest secret donor meeting

CARLSBAD, Calif.—A secretive three-day conference where big money liberal donors are plotting the next steps of the “resistance” will be headlined by Friday speeches by billionaire George Soros and Democratic House Minority Leader Nancy Pelosi, according to internal documents obtained by the Washington Free Beacon.

The Democracy Alliance, a donor club of deep-pocketed liberal donors that each pledge to direct hundreds of thousands of dollars in funding to approved left-wing groups, descended on California’s posh La Costa Resort on Wednesday morning for its fall donor summit. The group continued its tradition of secrecy, promising all members and guests of the summit their participation would “remain confidential.”

The 38 page conference program is found here.

The first page of the conference agenda, which was obtained by the Washington Free Beacon and can be viewed in its entirety below, lays out “participation guidelines,” explaining that the Democracy Alliance is a “safe place” for donors and activists to meet. Guests are instructed not to share members’ names with the press and not to post to any social media sites, to contact Democracy Alliance if “the media or a blogger” contacts them, and to “refrain from leaving sensitive materials out where others may find them.”

This latter directive was ignored.

The agenda for the meeting, titled “Beyond #Resistance: Reclaiming our Progressive Future,” lays out three full days of events culminating in a Friday night dinner headlined by Pelosi.

A few hours earlier guests can attend “A Talk with George Soros,” who will be introduced with a “special videotaped message” by Democratic senator Kamala Harris (Calif.).

All of the events are scheduled to take place at the La Costa Resort, which features 17 tennis courts of both clay and hard surfaces including one with 1,000 seats for spectators, 36 holes of golf on the Legends Course and the Champions Course, an array of pools including three hot tubs that overlook said golf courses, a spa building, and the Deepak Chopra Center, where guests can do yoga or receive mind-body medical consultations.

Pelosi and Harris are not the only two politicians to have a presence at the swanky conference—Pennsylvania governor Tom Wolf (D.) held a Thursday event on his reelection efforts, Sen. Amy Klobuchar (D., Minn.) will speak on Friday about “Russian interference in the 2016 election,” and Rep. Ben Ray Lujan (D., Minn.), who chairs the DCCC, will attend a “festive brunch” on Saturday morning. Also making a “special appearance” on Friday will be Virginia’s governor-elect Ralph Northam.

The agenda also lists “special guests” at the conference, some more famous than others. Attendees showcased in the agenda range from failed California politician Sandra Fluke to liberal CNN contributor Van Jones to Center for American Progress CEO Neera Tanden.

Jones was headlining a Thursday dinner on “going outside the bubble” and learning from Trump voters.

Not all events and prominent guests are listed in the conference agenda.

Not listed, for example, was a Thursday night happy hour hosted by Planned Parenthood president Cecile Richards, who was spotted in attendance.

Also not listed as a special guest at the conference was David Brock, who checked in early Wednesday afternoon and has made himself highly visible at La Costa—slowly strolling around the sprawling property and staying up at the hotel bar till past midnight.

Brock is not a “partner” of Democracy Alliance—in fact, he has worked to create his own liberal donor network—but groups he controls, such as Media Matters for America, are among the many groups Democracy Alliance directs funding to.

Not listed in the agenda or spotted at the resort has been billionaire Tom Steyer, one of Democracy Alliance’s most prominent members in the past. Pelosi publicly reprimanded Steyer earlier this month for running a $10 million ad calling for President Trump’s impeachment.

Also not listed in the Democracy Alliance program was a meeting held by Patriotic Millionaires, who gave a Thursday morning briefing on the “tax fight” and “what is at stake.” The briefing was delivered by Larry Mishel of Americans for Tax Fairness, Thea Lee of Economic Policy Institute, and Jacob Leibenluft, a member of the Obama administration’s National Economic Council who is now with the Centeron Budget and Policy Priorities.

Not all meetings at the conference are open to all guests. Some meetings are “by invitation only,” “for prospective partners only,” or for “partners only.”

Right before Pelosi’s speech, for example, will be a “Partners only” forum dedicated to “committing resources.” The Democracy Alliance has never made its commitment decisions available to the public.

Democracy Alliance president Gara LaMarche wrote in a letter to attendees included in the agenda that President Trump’s November victory was “the most cataclysmic election of modern history.”

They are show a film by Heather Booth….the founding director of Midwest Academy. Just a few minutes into this video, you can see that child care is a social issue….other people need to pay for it…setting the table as child care turned into political power.

The Midwest Academy has been the go-to training school for turning social justice organizing into practical lessons for social justice organizers. Trainers from the Academy will join CTCP-funded staff for a three-day training that will cover the essentials of community organizing and developing strategies to build organizational power.

In the 1980s, MA was indirectly responsible for funding Barack Obama’s early organizing work, which began in June of 1985 in Chicago. At the time, Obama received key support from the Catholic Campaign for Human Development (CCHD) and the Woods Fund of Chicago. In both cases, Ken Rolling — who was a high official with the Midwest Academy, a Woods Fund board member, and a longtime member of CCHD’s national committee — likely played a major role in dispensing this money.

To this day, MA continues to indoctrinate its students in “us-versus-them” ideology, thereby producing an ever-growing cadre of radicalized activists. One prominent MA graduate is Service Employees International Union (SEIU) president Andrew Stern.

MA’s training sessions — titled “Organizing for Social Change” — are typically five days long. They teach techniques of “direct-action organizing,” whereby people are made “aware of their own power” to “take collective action on their own behalf” and address such societal issues as “rising inequalty in income and wealth.” MA’s openly confrontational modus operandi is reflected in a quote, attributed to Frederick Douglass, which appeared on the Academy website’s homepage as of January 2011: “Power concedes nothing without a demand. It never did and never will.” The chief objectives of MA’s tactics are interrelated: “electing our people to office” and “changing laws and regulations.”

MA training sessions cover such topics as “choosing problems and issues” on which to focus, “understanding preconditions for social change movements,” and obtaining “good media coverage.” Role-play techniques are used in order to help students determine what tactics work best in various situations: e.g., “stand or sit, shout or remain calm, make threats or try to reach consensus.”

An inviolable core principle undergirding all of MA’s tactics is that in every case, activists must “target” a “decision maker”; i.e., a “person or persons” who can be “forced” to “give you what you want.” Observing a central tenet of Saul Alinsky’s community-organizing doctrines, MA emphasizes: “The decision maker is always a person, never as institution.” (Alinsky taught that the people’s discontent must be directed, without exception, at an identifiable face — “a personification, not something general and abstract like a corporation or City Hall.”)

Toward this end, MA activists commonly employ a technique known as the “accountability session,” whereby they target a specific person — e.g., a government official or corporate CEO who possesses the authority necessary to make a decision vis a vis a matter of concern to MA. The activists arrange to meet with this person, telling him or her that they merely wish to have a certain existing policy or plan explained to them. At the meeting, however, the official is confronted by a large number of angry protesters; their activities are directed by an experienced organizer who has analyzed the official’s personal and family life, political connections, and career to find vulnerabilities where pressure can be applied.

To provide an overall structure for its training programs, MA has produced a 425-page manual titled Organizing for Social Change, co-authored by former MA trainer Kim Bobo, MA co-founder Steve Max, and current MA executive director Jackie Kendall. This publication is widely used by radicals and community organizations around the world as a textbook on how to conduct direct-action organizing. Such groups as the Children’s Defense Fund, NARAL, the Sierra Club, and the United States Student Organization have used the manual for training purposes. The AFL-CIO has incorporated the manual’s teachings into its “Union Summer” training camp for labor organizers. Former AFL-CIO president John Sweeney and the Rev. Jesse Jackson have highly encouraged their supporters to read it.

In December 2005, MA announced its establishment of an annual “Heather Award,” in honor of Heather Booth’s decades of work as an activist leader.
To view a list of this award’s past recipients, click here.

In 2008, MA executive director Jackie Kendall served on the team that developed the first volunteer-training program for “Camp Obama,” a two-to-four day intensive course — run in conjunction with Barack Obama’s presidential campaign — designed to cultivate political activists who could help the Illinois senator win the White House.

MA endorsed the October 2, 2010 “March on Washington” organized by One Nation Working Together, an event whose purpose was to inspire “an intensive voter-mobilization program for Election Day 2010.”
For a list of other notable endorsers, click here.

Image result for midwest academy chicago