Iran Deal Terms Revealed, They DID Lie

   Do you wonder what world leaders know that we don’t? Shall we start with the Iranian nuclear deal?

From the White House website January 2016:

On January 16, 2016, the International Atomic Energy Agency verified that Iran has completed the necessary steps under the Iran deal that will ensure Iran’s nuclear program is and remains exclusively peaceful.

Before this agreement, Iran’s breakout time — or the time it would have taken for Iran to gather enough fissile material to build a weapon — was only two to three months. Today, because of the Iran deal, it would take Iran 12 months or more. And with the unprecedented monitoring and access this deal puts in place, if Iran tries, we will know and sanctions will snap back into place.

Here’s how we got to this point. Since October, Iran has:

  • Shipped 25,000 pounds of enriched uranium out of the country
  • Dismantled and removed two-thirds of its centrifuges
  • Removed the calandria from its heavy water reactor and filled it with concrete
  • Provided unprecedented access to its nuclear facilities and supply chain

Because Iran has completed these steps, the U.S. and international community can begin the next phase under the JCPOA, which means the U.S. will begin lifting its nuclear-related sanctions on Iran. However, a number of U.S. sanctions authorities and designations will continue to remain in place. More here.

Sept, 2015: Democratic senators Tuesday blocked for the second time an attempt by frustrated Republicans to stop the Iran nuclear agreement from taking effect. Majority Leader Mitch McConnell, R-Ky., vowed to try again to derail the deal.

Senators voted 56-42 in favor of bringing to the floor a resolution of disapproval opposing the Iran deal — four votes shy of the 60 Republican leaders need to advance the resolution. It was the second time in less than a week that Democrats safeguarded the Iran agreement. The votes spare President Obama from having to veto a disapproval resolution since it will not come to his desk. The House rejected the vote, so what did the Obama White House do? They took it to the UN and bypassed Congress completely…Now we know more details as it is demonstrated that Obama, John Kerry and Ben Rhodes all lied. Consequence? None yet unless we demand them.

 

U.N. Agency Publishes Secret Iran Deal Docs On Exemptions Obama Admin Dismissed

Top Nuclear Expert: “You just have to ask the question of, what else is being hidden?”

TWS: Iran was given secret exemptions allowing the country to exceed restrictions set out by the landmark nuclear deal inked last year, some of which were made public this week by the United Nations nuclear watchdog and others that are likely still being withheld, according to diplomatic sources and a top nuclear expert who spoke to THE WEEKLY STANDARD.

The International Atomic Energy Agency (IAEA) on Friday posted documents revealing that Iran had been given exemptions in January that permit the country to stockpile uranium in excess of the 300 kilogram limit set by the nuclear deal, experts said. The agreements had been kept secret for almost a year, but recent reports indicated that the Trump administration intended to make them public.

TWS reported earlier in December that top Democratic senators also supported releasing the documents.

Some details of the exemptions had previously been leaked. The Institute for Science and International Security (ISIS) revealed in September that Iran had been allowed to exceed certain caps in the deal so that the country could come into compliance with the deal’s terms.

Administration officials dismissed the ISIS report at the time, and surrogates who White House officials have described as the administration’s “echo chamber” criticized the organization.

“The administration was really nasty after we released these documents,” David Albright, the founder and president of ISIS, told TWS on Friday. “It was very tough for us to get the information. … I think that if we hadn’t released, they had every intention to keep it secret. They may have given lip service to openness, but I think their intention was to keep it secret.”

Albright credited the release of the documents as a step towards greater transparency, despite administration attempts to conceal the agreements.

“You just have to ask the question of, what else is being hidden?” said Albright. “The administration did it to try to minimize the chance that people would know what was in these decisions, and certainly keep those people from talking to people like me in the technical community that can actually interpret what’s in those decisions.”

A source who works with Congress on the Iran issue and who had been briefed on some of the exemptions confirmed that assessment.

“The Obama team was just hoping to get through the next few weeks without revealing that they’ve been allowing Iran to go beyond the nuclear deal the whole time,” said the source. “That way the president and Secretary of State Kerry could keep declaring that Iran has been following the deal, and their echo chamber could keep saying the nuclear deal is working.”

“But now it’s public. The only reason that the nuclear deal is still in place is because the Obama team has been secretly rewriting to let Iran cheat. The only question is, what’s still not being told?”

The now-confirmed exemptions reported on by ISIS include allowing Iran to keep low-enriched uranium (LEU) in various forms beyond what’s allowed under the nuclear deal. The concession applies to forms that have been “deemed unrecoverable” for use in a nuclear weapon, and Iran has promised not to build a facility to try recover them.

That language is not in the nuclear deal, and Obama officials have struggled to defend it. At a State Department press briefing in September after the release of the ISIS report, journalists pressed spokesperson John Kirby on the decision.

“You’re using this term that’s not in the document. I’m just trying to figure out how we can actually check that or understand what it means,” said Associated Press reporter Bradley Klapper. “If you say some things are usable but some things aren’t, but I don’t know which are which, that’s not spelled out in the document. That seems to be a new idea here.”

Albright suggested to TWS that the uranium could actually be recoverable and used in a rush to a nuclear weapon. The State Department in September distorted the nature of the exemption, he said.

“If this whole thing rests on [Iran] promising not to build a facility that they’d probably only build in secret if they were going to actually break out, then this material probably should not be deemed non-recoverable,” he continued. “The State Department … deliberately distorted what was in these decisions to make this point that somehow ‘non-recoverable’ meant [the LEU] really would never be able to be recovered, regardless if they build a facility.”

Thanksgiving Day Terror. Black Swan Exercise

Related reading: Predicting Future Military Threats: Implications of the Black Swan

Donald Trump’s transition team is getting a helping hand from the Obama administration on national security matters.

The administration is giving the president-elect and a select few of his top advisers sensitive intelligence briefings.

And, in addition, Trump and his team will take part in two so-called ‘black swan’ exercises that simulate a domestic or national security emergency.

The exercises are intended to help an incoming administration learn how to manage a crisis in real time in case there is some kind of global or domestic emergency in the first days of a Trump presidency.

A black swan exercise would, for example, ensure that a fledgling Trump administration knows how to activate the proper federal agencies to maintain stability.

According to a briefing book from the nonpartisan Center for Presidential Transition, in 2008 the Bush administration hosted two black swan exercises for then president-elect Obama’s national security team. More here from ABC.

Black Swan operations and exercises have been practiced also in the United Kingdom.

**** What is on the horizon regarding terror?

Islamic State is urging its followers to carry out acts of terrorism in New York City during the upcoming, Macy’s Thanksgiving Day Parade.  Jamie Schram writes in this morning’s (Nov. 14, 2016) New York Post, that “ISIS is offering a detailed how-to on using trucks as weapons of mass destruction — noting that the Macy’s Thanksgiving Parade would be an ‘excellent target.”

Rumiyah2(1).jpg

MEMRI: On November 11, 2016, Al-Hayat, one of the media centers of the Islamic State (ISIS), released the third issue of its monthly magazine Rumiyah featuring an article calling on lone wolves in the U.S. and Europe to use trucks to target large outdoor conventions, crowded streets, outdoor markets, festivals, parades, and political rallies. The article also emphasized the importance of using trucks in terrorist attacks, and provided suggestions on “ideal vehicles” to use and tactical tips for the preparation and planning of attacks.

Rumiyah3.jpg

The article, titled “Just Terror Tactics,” features images of rental trucks from companies such as Hertz and U-Haul, as well as a picture showing the Macy’s Thanksgiving Day Parade in New York City. It begins by highlighting the “destructive capability” of motor vehicles and referring to the Bastille Day attack in Nice, France on July 14, 2016. While praising the Nice attacker, the article states: “This was superbly demonstrated in the attack launched by the brother Mohamed Lahouaiej-Bouhlel who, while traveling at the speed of approximately 90 kilometers per hour, plowed his 19-ton load-bearing truck into crowds celebrating Bastille Day in Nice, France, harvesting through his attack the slaughter of 86 Crusader citizens and injuring 434 more.”

Rumiyah4(1).jpg

The article stresses the importance of using a vehicle that can inflict maximum damage, and describes the “ideal” vehicles for lone wolf attacks as “load-bearing trucks, large in size, reasonably fast in speed or rate of acceleration, heavy in weight, double-wheeled, possessing a slightly raised chassis.” The article continued: “If accessible, [vehicles] with a metal outer frame which are usually found in older cars [should be used], as the stronger outer frame allows for more damage to be caused when the vehicle is slammed into crowds, contrary to newer cars that are usually made of plastics and other weaker materials.”

Providing suggestions on how to acquire the vehicle, the article noted that buying it is the “easiest” option; however, it also mentioned renting, borrowing from relatives and acquaintances, hotwiring, and carjacking as additional options. Under “applicable targets” the article listed: “Large outdoor conventions and celebrations, pedestrian-congested streets, outdoor markets, festivals, parades and political rallies.”

The article further emphasized that in order to inflict maximum damage, attackers should consider targeting “any outdoor attraction that draws large crowds,” stating that “it is not conditional to target gatherings restricted to government or military personnel only. All so-called ‘civilian’ (and low-security) parades and gatherings are fair game and more devastating to Crusader nations.”

As for “preparation and planning,” the article recommended “assessing vehicle for roadworthiness, filling vehicle with a sufficient amount of fuel, mapping out the route of the attack, surveying the route for obstacles, such as posts, signs, barriers, humps, bus stops, dumpsters, and if accessible, a secondary weapon should be attained.”

The article also provided ideas for attackers to use in order to declare their affiliation to ISIS to “have their motives acknowledged” such as writing “ISIS will remain” or “I am a soldier of the Islamic State” on pieces of papers and throwing them out of the vehicle’s window during the attack.

The article concludes by instructing attackers to stay inside their vehicles until they are no longer movable and then to start shooting pedestrians, first responders and security forces until they are killed.

****

Black Swan exercises are those that prepare for the unexpected and several events worldwide have been part of these operations.

1. Electromagnetic Pulse (EMP) or Solar Burst

As The Heritage Foundation highlighted in the documentary 33 Minutes,[3] an EMP attack could throw America back to the pre-Industrial Revolution era. A powerful solar burst would have the same impact. Should either event occur, people would have little time to react, and the damage would be incalculable.

If the U.S. were to lose power for any prolonged period of time, given the sheer number of people located in the interior of the country, mass starvation and death would become a reality. Most experts consider these events as highly unlikely ones, so little investment or planning is done related to them.

2. Pandemic Virus

Although the U.S. has prepared for a pandemic influenza outbreak, little preparation has gone into other potential viruses. More importantly, it is the unknown virus or “super virus” that represents a Black Swan for America. Recall that it was less than 30 years ago that AIDS first began embedding itself in North America. If a far more deadly and communicable virus hits America, the U.S. would quickly expend its existing resources.

3. Nuclear or Radiological Event

The U.S. has extensive knowledge of what would happen if a nuclear or radiological explosion occurred in a major American city. Theory, however, is a poor replacement for the reality of large numbers of deaths, burn victims, and physical debris. As former Vice President Dick Cheney wisely concluded, because of the sheer consequences, even a 1 percent chance of such an event occurring requires the nation to expend the necessary resources to prevent it.

4. Super-Volcanic Eruption

Seismic activity around the Yellowstone caldera is monitored, but tectonic shifts miles below the surface could result in the buildup of pressure and a super-volcanic eruption. The volcano beneath Yellowstone previously erupted, causing destruction as far away as California, Iowa, and Louisiana. An eruption, though unlikely given current readings, could have truly catastrophic consequences.

5. Nor’Easter/Hurricane

Hurricanes strike America with a fair degree of frequency. A Black Swan event would be a Nor’easter combined with a powerful hurricane that strikes New York City in the same manner as Hurricane Katrina struck New Orleans. Between the massive flooding and wind damage, New York City could sustain casualties and physical destruction well in excess of Katrina.

How Prepared Is the U.S.?

The honest and unfortunate answer to that question is unknown and, despite attempts to ascertain that answer, will not be known if existing policy remains in place. A Black Swan by definition becomes a Black Swan because it results in catastrophic outcomes. This “delicate” balance between preparing for events and not being able to prepare adequately for all events represents the ultimate risk-based decision making.

From 2003 to 2011, the U.S. Department of Homeland Security (DHS) distributed roughly $40 billion in funding to states and localities across America. Despite years of reporting requirements, DHS is fundamentally unable to state with any degree of certainty which capabilities exist, where those capabilities exist, the level of those capabilities, and the remaining capability needs. DHS knows it has funded the acquisition of many things, but specifics beyond that are unquantifiable.

Specifically, to gain a full accounting, Congress should:

  • Be fiscally responsible. Rather than continue to spread federal funds using an “inch thick and a mile wide” mentality, Congress should target federal funds at the highest-risk states, cities, and counties where the funds could meaningfully increase the security of Americans, including reducing the number of high-risk cities that are eligible for special funding.
  • Examine cooperative agreements. The need for equality downplays the need for the grant structure and invites another approach—such as the use of cooperative agreements, where the federal government and the states can sit down as true and equal partners and negotiate outcomes at the beginning and then direct funds to achieve those desired outcomes without the need for yearly applications.
  • Appoint a Black Swan commission. Rather than wait until after a catastrophic event has occurred, Congress should appoint an independent commission for the express purpose of analyzing the threats of a potential Black Swan, identifying existing capabilities, and making recommendations on how best to correct errors made thus far and accelerate closing the gap between where the nation stands today and where it needs to be tomorrow. The commission must have the independence and resources to quickly do its job after a full review of the status quo.

Expect the Unexpected

If the catastrophe in Japan has taught any lessons, it is that America must prepare for the unexpected with as much vigor as it prepares for the expected. Because a Black Swan can be so catastrophic, in many ways the ideal role for the federal government is to lead an effort surrounding those events. With the nation’s current fiscal challenges, conserving resources for catastrophic events is more vital than ever. More here from Heritage.

Cyber CIA: Brennan Rebuilt the Agency for Digital Future

    

NEW DIRECTION: John Brennan at a Senate Intelligence Committee hearing on his nomination to be the director of the CIA in 2013. Brennan has restructured the agency to REUTERS/Jason Reed

John Brennan’s attempt to lead America’s spies into the age of cyberwar

The CIA director has put the U.S. spy agency through a historic restructuring to cope with the era of digital warfare. Many in the agency are unhappy with the shake-up. In a series of interviews, Brennan outlines his strategy. “I think CIA really needs to up its game.”

ReutersInvestigates:WASHINGTON – When America goes to the polls on Nov. 8, according to current and former U.S. intelligence officials, it will likely experience the culmination of a new form of information war.

A months-long campaign backed by the Russian government to undermine the credibility of the U.S. presidential election – through hacking, cyber attacks and disinformation campaigns – is likely to peak on voting day, the officials said.

Russian officials deny any such effort. But current and former U.S. officials warn that hackers could post fictional evidence online of widespread voter fraud, slow the Internet to a crawl through cyber attacks and release a final tranche of hacked emails, including some that could be doctored.

“Don’t underestimate what they can do or will do. We have to be prepared,” said Leon Panetta, who served as CIA director and defense secretary in President Barack Obama’s first term. “In some ways, they are succeeding at disrupting our process. Until they pay a price, they will keep doing it.”

John Brennan, the current CIA director, declined to comment on the Russian efforts. But he said Russian intelligence operatives have a long history of marrying traditional espionage with advances in technology. More broadly, Brennan said, the digital age creates enormous opportunities for espionage. But it also creates vulnerabilities.

Citing an array of new cyber, conventional and terrorist threats, Brennan announced the most sweeping reforms of the CIA in its 69-year history 18 months ago.

Weakening the role of the Directorate of Operations, the agency’s long-dominant arm responsible for gathering intelligence and conducting covert operations, Brennan created 10 new “mission centers” where CIA spies, analysts and hackers work together in teams focused on specific regions and issues. He also created a new Directorate for Digital Innovation to maximize the agency’s use of technology, data analytics and online spying.

The information age “has totally transformed the way we are able to operate and need to operate,” Brennan told Reuters in a series of interviews. “Most human interactions take place in that digital domain. So the intelligence profession needs to flourish in that domain. It cannot avoid it.”

When a new American diplomat arrives for duty at the U.S. embassy in Moscow or Beijing, CIA official say, Russian and Chinese  intelligence operatives run data analytics programs that check the “digital dust” associated with his or her name. If the newcomer’s footprint in that dust – social media posts, cell phone calls, debit card payments – is too small, the “diplomat” is flagged as an undercover CIA officer.

The Russian-backed campaign to discredit the U.S. election is not isolated. Hackers believed to have links to Chinese intelligence began stealing the personal information of 22 million federal employees and job applicants in 2014, the worst known data breach in U.S. government history. Islamic State’s online propagandists continue to inspire lone wolf attacks in the United States even as the group loses territory.

A senior official from the Directorate of Operations, who backs the shake-up, said the agency is experiencing its greatest test in decades.

“The amount of threats and challenges that are facing this organization and this nation are greater than at any time in the last 30 years,” said the official, who declined to be named. “The days of a black passport, a fistful of dollars and a Browning pistol are over.”

INNER CIRCLE: President Barack Obama with Brennan and Chief of Staff Denis McDonough at the White House in 2013. The president and the CIA chief are criticized by some former agents for being overly cautious in Syria, Russia and elsewhere. Courtesy Pete Souza/The White House/Handout via REUTERS

“Most human interactions take place in that digital domain. So the intelligence profession needs to flourish in that domain. It cannot avoid it.”

John Brennan, CIA director

James Clapper, the Director of National Intelligence, praised Brennan and his efforts to retool the CIA for a new era in an interview. So did Lisa Monaco, Brennan’s successor as the President Obama’s Homeland Security and Counterterrorism adviser.

But some current and former officials question Brennan’s strategy, arguing his reforms are too digitally focused and will create a more cautious, top-heavy spy agency. At a time when the agency needs to refocus its efforts on human espionage, they say, the concentration of power in the new mission centers weakens the ability of the Directorate of Operations to produce a new generation of elite American spies.

The reforms have hurt morale, created confusion and consumed time and attention at a time of myriad threats, according to interviews with ten former officials.

Glenn Carle, a former CIA covert officer, supports Brennan and his reforms but said they have sparked a mixed reaction among directorate of operations officials who believe human intelligence is getting short shrift.

“The value the CIA can fundamentally add is to steal secrets, and the ultimate secret is intention,” the often inscrutable aims of foreign leaders, Carle said. “Obtaining that is a human endeavor.”

At the same time, Brennan has stirred a different sort of criticism – that he has defied Congressional oversight. Liberal Democrats and libertarian Republicans in Congress say the Brennan-Obama tenure has been tarnished by a lack of transparency with congressional oversight committees and the public regarding surveillance, drone strikes and the agency’s use of torture against terrorism suspects during the administration of George W. Bush.

“While I think John’s overall legacy will be as a reformer, that legacy will suffer from his refusal to come to grips with the CIA’s troubled torture program,” said Senator Dianne Feinstein, D-Calif, vice chair of the Senate’s intelligence committee. “I think the new president’s CIA director must prioritize a high level of trust between the CIA and Congress to insure proper oversight is conducted.”

It’s unclear how closely the country’s next president will hew to Brennan’s strategy.

The front-runner, Democrat Hillary Clinton, has an incentive to beef up American cyber-espionage: U.S. intelligence officials blame the continuing leak of emails from her campaign on Russian-backed hacking. Clinton also expressed support for covert action in a transcript of a 2013 speech she gave to Goldman Sachs that was recently released by Wikileaks.

Republican Donald Trump, meanwhile, pledged to make cybersecurity a top priority in his administration in an October 3 speech. “For non-state terror actors, the United States must develop the ability – no matter how difficult – to track down and incapacitate those responsible and do it rapidly,” Trump said. “We should turn cyber warfare into one of our greatest weapons against the terrorists.”

In interviews at agency headquarters in Langley, Virginia, Brennan declined to comment on either candidate or discuss operational details of the CIA. But he and eight other senior CIA officials gave the most detailed description yet of their rationale for the most radical revamp of the agency since its founding in 1947.

“I look out at the next 10, 20, 30 years, and I look at technology, I look at complexity, I look at the global environment,” Brennan said. “I think CIA really needs to up its game.”

JUST-WAR THEORIST

Brennan, a 61-year-old native of north New Jersey, looks like a linebacker but talks like a technocrat. He speaks excitedly about how the CIA and other government bureaucracies can be configured in “a way to ensure optimal outcomes.”

The son of devout-Catholic Irish immigrants, Brennan speaks reverently of CIA officers as public servants who risk their lives without public accolades. He joined the agency in 1980, at the age of 24, after receiving a Master’s Degree in government with a concentration in Middle Eastern studies from the University of Texas.

“The value the CIA can fundamentally add is to steal secrets, and the ultimate secret is intention. Obtaining that is a human endeavor.”

Glenn Carle, former CIA covert officer

Educated in various Catholic schools, including Fordham University, Brennan says he is an adherent of just war theory – a centuries-old Christian theological argument that war is justified when it is waged in self defense, as a last resort and minimizes civilian casualties. Those beliefs, he says, have guided him in one of the most controversial aspects of his tenure in the Obama administration.

As Obama’s White House counter-terrorism adviser and CIA director, Brennan played a central role in carrying out 473 U.S. airstrikes outside conventional war zones between 2009 and 2015, primarily by drone. U.S. officials estimate the attacks have killed 2,372 to 2,581 people, including 64 to 116 civilians. Human rights groups say the totals are vastly higher. Last year, for instance, a U.S. drone strike in Pakistan accidentally killed American aid worker Warren Weinstein and Italian aid worker Giovanni Lo Porto, who were both being held captive by al Qaeda.

Brennan declined to comment on specific strikes, but said, “I still can look myself in the mirror everyday and believe that I have tried to do what is morally right, what is necessary, and what is important to keep this country safe.” He also acknowledged mistakes.

“You question yourself. You beat yourself up. You try to learn from it,” Brennan said, in a rare display of emotions. “But you also recognize that if you’re not prepared to make the tough decisions in the jobs that have been entrusted to you, you shouldn’t be in those jobs.”

Today, Brennan says the United States faces the most complex array of threats he has seen since joining the agency 36 years ago. As a CIA analyst, operative and executive, he has lived through the Cold War espionage duels of the 1980s; the disintegration of nation-states after the 1989 fall of the Berlin Wall; the rise of non-state terrorist groups since 2001; and the current digital disruption. Now, he says, all four dynamics are converging at once.

BOLD AND INNOVATIVE RIVALS

CIA officials say their greatest state competitors are the Russian and Chinese intelligence services. While smaller countries or terrorist groups may want to strike at the United States, Russia and China are the only two adversaries with the combination of skills, resources and motivation needed to challenge Washington.

In recent years, Moscow’s Federal Security Service, or FSB, has become adept at waging “gray zone” conflicts in Ukraine, Crimea and Syria, the officials said. In all three countries, Russian intelligence operatives have deftly shrouded protagonists, objectives and war crimes in ambiguity.

GREAT RIVALS: U.S. President Barack Obama with his Chinese and Russian counterparts, Xi Jinping and Vladimir Putin, in Beijing in 2014. Washington has faced barrages of digital threats from Beijing and Moscow; CIA insiders say the two nations remain the biggest challenge for the United States. REUTERS/Pablo Martinez Monsivais

“You beat yourself up…. But you also recognize that if you’re not prepared to make the tough decisions in the jobs that have been entrusted to you, you shouldn’t be in those jobs.”

John Brennan, CIA director

One target is America’s increasingly politically polarized democracy. As Russian-backed hacking unfolded this summer, the Obama White House’s response fueled frustration among law enforcement and intelligence officials, according to current and former officials. The administration, they said, seemed to have no clear policy for how to respond to a new form of information warfare with no rules, norms or, it seemed, limits.

White House officials said the administration is still considering various methods of responding, but the responses won’t necessarily be made public.

China presents another challenge. Chinese businessmen and students continue trying to scoop up American state and economic secrets. In one bright spot, Beijing appears to be abiding by a 2015 pact signed by Obama and Chinese leader Xi Jinping that the two governments would not conduct economic espionage against one another. Chinese hacking appears to have slowed from the voracious rate of the past, which included hacking into the computers of the 2008 presidential campaigns of John McCain and Barack Obama but not releasing what was found.

“The question is whether or not it is due to greater care in terms of covering one’s tracks,” Brennan said of the apparent change. “Or whether or not they realize that they’re brand is being tarnished by this very rapacious appetite for vacuuming up things.”

Regional powers are also increasing their digital espionage efforts.

In 2014, the Obama administration blamed North Korea for the hacking of Sony Pictures’ computer system. This spring, U.S. prosecutors indicted seven Iranian hackers for allegedly trying to shut down a New York dam and conducting a cyber attack on dozens of U.S. banks. They also indicted three Syrian members of the “Syrian Electronic Army,” a pro-Syrian government group,  who hacked into the websites of U.S. government agencies, corporations and news organizations.

In a 2015 case that U.S. officials said marks a worrying new trend, federal prosecutors indicted a 20-year-old hacker from Kosovo. With the help of a criminal hacker, Ardit Ferizi stole the home addresses of 1,300 members of the U.S. military, providing the information to Islamic State and posting it online, and calling for attacks on the individuals. Ferizi was arrested in Malaysia, where he was studying computer science. In September, he pleaded guilty in a U.S. federal court and was sentenced to 20 years in prison.

“This blend of the criminal actor, the nation-state actor and the terrorist actor, that’s going to be the trend over the next five years,” said John Carlin, who recently stepped down as head of the Justice Department division that monitors foreign espionage in the United States.

But some active clandestine officers argue that the intelligence community has grown too reliant on technology, a trend they trace back four decades to the directorship of Stansfield Turner. Satellite photography, remote sensors and communications intercepts have become more sophisticated, but so have encryption techniques and anti-satellite weapons.

More important, they argue, is that technology is no substitute for “penetrations” – planting or recruiting human spies in foreign halls of power. The CIA missed India’s 1998 nuclear tests and misjudged Saddam Hussein’s arsenal in 2003 because it lacked spies in the right places.

Today, these current and former CIA officials contend, American policymakers have little insight into the thinking of Vladimir Putin’s inner circle. Presidents, kings and dictators often don’t share their true intentions electronically, putting this valuable information largely beyond the scope of digital spying. The best sources are still people, and these officials believe the agency is not mounting the kind of bold human spying operations it did in the past.

Brennan and other CIA officials flatly denied downplaying human intelligence. They said aggressive, high-risk human spying is under way but they cannot go into operational detail.

One of Brennan’s predecessors, Michael Hayden, former CIA chief under President George W. Bush, says the agency strayed from its core mission during the Bush years. After the Al Qaeda attacks of Sept. 11, 2001, Hayden said, the CIA had to shift to become a paramilitary organization that devoted its most talented officers to tracking and killing terrorists. It now needs to reverse that trend by focusing on espionage against rival nations, he said.

“The constant combat of the last 15 years has pushed the expertise of the case officer in the direction of the battlefield and in the direction of collecting intelligence to create physical effects,” said Hayden, using an intelligence euphemism for killing. “At the expense of what the old guys called long-range, country-on-country intelligence gathering.”

‘OPTIMIZING CAPABILITIES’

Brennan and the eight other senior CIA officials made the case that their modernization effort will address the needs and threats described by Hayden and others. Technological advances, they said, have leveled the intelligence playing field. The web’s low cost of entry, creativity and speed benefits governments, hackers and terrorists alike.

A veteran covert operative who runs a new CIA mission center compared Brennan’s reforms to the Goldwater-Nichols Act. The landmark 1986 legislation reorganized the U.S. military into a half dozen regional commands where the Army, Navy, Air Force and Marines work together. It was a response to inter-service rivalries that bedeviled the American military in Vietnam.

The CIA equivalent involves having the agency’s five main directorates – Operations (covert spies), Analysis (trends and prediction), Science and Technology (listening devices and other gadgetry) and Digital Innovation (online sleuthing) and Support (logistics) – provide the personnel needed by each regional mission center.

CORE MISSION: Former CIA Director Michael Hayden says the agency went deeply into anti-terrorist operations during the Bush years and needs to return to its traditional mission of spying. REUTERS/Brendan McDermid

Andrew Hallman, director of the new Directorate for Digital Innovation, said the CIA has embraced cloud computing as a way to better share intelligence. In a move that shocked insiders and outsiders, the CIA awarded an $600 million contract to Amazon in 2013 to build a secure cloud computing system where multiple CIA databases can be quickly accessed.

For decades, different directorates maintained their own separate databases as a security measure, said Hallman. Some of the applications the agency used were so old – up to 30 years – that the manufacturer was no longer in business.

Turning to Amazon was designed to immediately put private-sector computing advances at the fingertips of CIA operatives. It was also an admission that it was easier for the agency to buy innovation from the private sector than try to create it internally.

Several former CIA officials criticized the new team-focused system, saying it dilutes the cultures that made each agency directorate strong. The best analysts are deeply skeptical and need to be separated from covert operatives to avoid group-think, they said. And the best covert operatives are famously arrogant, a trait needed to carry out the extraordinarily difficult task of convincing foreigners to spy for America.

Richard Blee, a former CIA clandestine officer, said the agency needed reform but highlighted a separate problem created by technological change. Instant secure communications between CIA headquarters and officers in the field has centralized decision-making in Washington, Blee said. And regardless of administration, senior officials in Washington are less willing to take a risk than field officers – virtually all of whom complain about headquarters’ excessive caution.

“The mentality across the board in Washington is to take the lowest common denominator, the easiest option, the risk-free option,” Blee said. “The Chinese are taking tough decisions, the Russians are taking tough decisions and we are taking risk-averse decisions. And we are going to pay a price for that down the road.”

Brennan says his reforms will empower CIA officers: The integrated teams in each new mission center will improve speed, adaptability and effectiveness.

“To me, that’s going to be the secret of success in the future, not just for CIA but for other organizational structures,” Brennan said. “Taking full advantage of the tools, capabilities, people and expertise that you have.”

The old ways of spycraft, Brennan argues, are no longer tenable. Asked what worries him most, he gave a technocratic answer: Twentieth century American government management practices are being rendered obsolete in the digital age.

“U.S. decision making processes need to be streamlined and accelerated,” he said. “Because the problems are not going to wait for traditional discussions.”

THE LONG VIEW: CIA headquarters in Langley, Virginia. “I look out at the next 10, 20, 30 years, and I look at technology, I look at complexity, I look at the global environment,” Brennan says. “I think CIA really needs to up its game.” REUTERS/Jason Reed

—————

Digitizing the CIA

By David Rohde

Additional reporting by John Walcott and Jonathan Landay

Video: Zachary Goelman

Graphics: Christine Chan

Photo editing: Barbara Adhiya

Edited by Michael Williams

 

Rosoboronexport, Putin and Iran, N. Korea and Syria

On November 4, 2000, the Rosoboronexport Unitary enterprise was set up by Decree №1834 of the Russian President, Vladimir Putin, as the sole state intermediary agency for Russia’s military exports/imports.

In 2015: WASHINGTON (Reuters) – The United States has imposed sanctions on Russian and Chinese companies, including Russian state-owned arms exporter Rosoboronexport, for violating a U.S. law restricting weapons trade with Iran, North Korea and Syria.

The U.S. State Department published a notice of the sanctions in the Federal Register on Wednesday. They were later condemned by the Russian Foreign Ministry.

Moscow will take countermeasures in response to new U.S. sanctions, Interfax reported late on Wednesday, citing a commentary on the Russian Foreign Ministry’s website.

The State Department’s notice did not specify how each company had run afoul of the United States’ Iran, North Korea, and Syria Nonproliferation Act, but the act prohibits the trade with those three countries of goods, services, or technology used to make weapons of mass destruction or cruise or ballistic missiles.

Russia has supported Syrian President Bashar al-Assad in a 4 1/2-year-old civil war that has killed more than 200,000 people and displaced millions, including by supplying him with military gear.

Iran and North Korea are under United Nations arms embargoes.

The sanctions announced on Wednesday prohibit the U.S. government from procuring goods or services from the listed entities, as well as selling them defense-related goods and services. Additionally, no new licenses will be granted to export certain controlled goods to the listed entities, and any existing such licenses will be suspended.

Many of the entities targeted on Wednesday already faced multiple rounds of U.S. sanctions.

One of the individuals listed was Chinese businessman Li Fangwei, also known as Karl Lee. He has already been sanctioned for allegedly supplying Iran’s ballistic missile program in violation of an embargo. He denied the allegations in a 2013 interview with Reuters.

The companies sanctioned also included China’s BST Technology and Trade Co, which had previously been sanctioned by the United States in 2013, the Russian Aircraft Corp, and two North Korean firms. The Sudanese Armed Forces were also listed in the notice, as well as the overseas arm of Iran’s Islamic Revolutionary Guard Corps, called the Qods Force, and its commander, Qassem Soleimani.

Related reading: Rosoboronexport Naval Inventory

Related reading: Rosoboronexport Ground Force Inventory

**** It gets worse and U.S. voters need to take notice as to why any relationship with Moscow is sitting on the knife’s edge.

 

(Paris)– France should reconsider allowing Rosoboronexport, Russia’s state-owned arms trading company, to participate in Euronaval, a major international arms show being held outside of Paris from October 17 to 21, 2016, human rights groups EuroMed Rights and Human Rights Watch said today. The arms show is sponsored by the French Defense Ministry.

FRANCE SYRIA statement photo Russia Rosoboronexport 15 Oct 2016
The office building of Rosoboronexport company in Moscow, Russia, March 1, 2016.

Human rights organizations have called for the United Nations Security Council to impose an arms embargo on Syria, and for Rosoboronexport in particular to stop supplying arms to Syria in light of compelling evidence that the Syrian government is responsible for war crimes and crimes against humanity.

“France is leading the call on ending violations in Syria but at the same time allowing Russia, which is complicit in those violations, to promote its weapons and land new deals,” said Michel Tubiana, president of EuroMed Rights. “It’s not acceptable to do business as usual with a company arming a government engaged in systematic atrocities against its own people.”

More than 90 exhibitors from 70 countries are expected to attend the Euronaval arms show, including Rosoboronexport. Rosoboronexport said in October, 2015, that it is continuing to supply arms to the Syrian government despite its record of serious international human rights and humanitarian law violations.

Under international law, providing weapons to Syria while its forces are known to be committing war crimes and crimes against humanity may translate into aiding and abetting the commission of those crimes. Any arms supplier could bear potential criminal liability as an accessory to those crimes and could face prosecution. In addition to Rosoboronexport, all other suppliers of arms to Syria should be subject to scrutiny.

The Russian government began conducting military operations in Syria on September 30, 2015. Since then, Russian-Syrian airstrikes have hit civilian objects and caused civilian casualties, Syrian-Russian joint military operations have extensively used internationally banned cluster munitions, and there has been an increase in the use of incendiary weapons in Syria. Since September 19, 2016, Russian-Syrian forces have bombarded opposition-controlled parts of the city of Aleppo. The attacks included the use of indiscriminate barrel bombs, cluster munitions, and incendiary weapons, and damaged or partially destroyed at least five hospitals in six separate attacks.

In November 2015, the Rosoboronexport chief executive officer, Anatoly Isaikin, indicated that Russia’s military involvement in Syria was “good testimony for Russian armaments.” Media reports indicate that Russian airstrikes in Syria actually have contributed to buyer interest in weaponry from Rosoboronexport and could result in billions of dollars in new contracts.

Given its role in Syria, Rosoboronexport should not be allowed to promote itself and seek new contracts at Euronaval, the organizations said. Should Rosoboronexport be permitted to participate in the arms show, all arms show participants, including official delegations and private arms brokers, should decline to negotiate any new deals with Rosoboronexport.

**** Need more?

From UANI:

“Russia has offered Iran its latest Antey-2500 missiles, the head of Russian state defense conglomerate Rostec said on Monday according to media reports, after a deal to supply less powerful S-300 missiles was dropped under Western pressure. Sergei Chemezov said Tehran was now considering the offer, TASS news agency reported. Russia scrapped a contract to supply Iran with S-300 surface-to-air missiles under Western pressure in 2010, and Iran later filed a $4-billion international arbitration suit against Russia in Geneva, but the two countries remain allies.” (Reuters, “Russian offers Iran latest anti-aircraft missiles: TASS,”

2/23/15)

“Russia’s government-run weapons manufacturer is supplying equipment for Iran’s missile program, intelligence documents recently presented to the US Congress indicate. According to intelligence estimates, this does not represent official cooperation between Moscow and Tehran, but rather demonstrates the inability of the Russian government to prevent state firms from engaging in illegal trade with the Islamic Republic. The Russian firm in question is Rosoboronexport, which supplied Iran with defensive missile systems in 2006 and continues to maintain business ties with Iran in the missile sector.” (YnetNews, “Russian manufacturer selling missile equipment to Iran,” 6/11/12)

“For two years, the United States regarded Rosoboronexport, Russia’s official weapons exporter, as an international pariah for selling arms to Iran and Syria. Then, in 2010, the U.S. suddenly lifted sanctions against it. By June of this year, the reversal was complete: the Pentagon awarded the company a no-bid contract worth upwards of $1 billion… Rosoboronexport, whose annual revenues have grown to nearly $9 billion, had only recently been removed from the list of companies sanctioned by the U.S. State Department for violating U.S. laws prohibiting the sale of weapons to Iran and Syria. Among the suspected sales were surface-to-air missiles to Iran. But after sanctions were lifted, the Army went full steam ahead with plans to sole-source a $375 million contract to the Russian arms agency, now arguing that it was the only legitimate vendor of Russian armaments.” (Wired, “Russian Firm Got No-Bid Pentagon Contract After Selling Arms to Iran,” 8/31/11)

“Russia’s state arms export agency said Monday that it is supplying Iran with defensive weapons, including surface-to-air missiles, but did not say whether they include the sophisticated long-range S-300 missiles…Rosoboronexport said in a statement that ‘only weapons of a defensive nature are being supplied to Iran, including anti-aircraft weaponry.’ It added that, previously, Tor-M1 air-defense systems were supplied to Iran.” (AssociatedPress, “Russia giving Iran only defensive weapons,” 12/22/08)

“Rosoboronexport contracted with Iran late July to modernize 30 Su-24 front bombers which may bear tactic nuclear weapons. The contract is to be executed by Sukhoi.” (Kommersant, “Sanctions Imposed on Russian Companies Linked to Iran,” 08/05/2006)

In summary:

MOSCOW — The United States imposed sanctions against Russian state arms export agency Rosoboronexport and four Russian defense industry enterprises — including the MiG aircraft corporation — for alleged violations of a nonproliferation and missile technology control regime.

The State Department announced the sanctions in a notice posted on the Federal Register. Twenty-three firms across the world, including entities based in China, Turkey and the United Arab Emirates, had violated the Iran, North Korea and Syria Nonproliferation Act (INKSNA), it said.

“These entities were sanctioned based on credible information that they have been involved in the transfer or purchase to or from Iran, North Korea or Syria of goods, services or technology listed on multilateral export control lists, US national control lists, or other items that could make a material contribution to the development of weapons of mass destruction or missile proliferation,” said US Embassy Moscow spokesman Will Stevens.

The move prevents any US company or government agency from doing business with the sanctioned Russian defense entities, which include Russia’s state arms export agency Rosoboronexport.

Rosoboronexport is the doorway between Russia’s defense industry and foreign export customers. The agency claimed to have delivered $13.2 billion in military exports last year, and at the MAKS airshow last week said Russia’s export backlog amounts to $40 billion.

The famous MiG aircraft company was among those Russian companies singled out in the latest sanctions action — which closely coincided with the Department of Commerce announcing a new round of economic sanctions in response to the ongoing conflict in Ukraine.

The other three companies on today’s list were high-precision weapons maker Instrument Design Bureau (KBP) Tula; a rocket and missile design bureau near Moscow known as NPO Mishinostroyenia — the same bureau that designed the USSR’s SS-19 ICBM; and the Katod company in Novosibirsk.

Katod manufactures, among other things, night vision goggles that were sold in the US; the sanctions cut the company off from that market.

In comments carried by the TASS news agency on Wednesday, Katod CEO Vladimir Loktionov mocked the sanctions against his company as a sign that Russian night-vision technology intimidated US competitors.

“So, Russia doesn’t just pump oil, it can also do something that can compete with American companies,” Loktionov said, brushing off any impact the sanctions might have by claiming the majority of its customers are in the Moscow-led Eurasian Economic Union or one of the BRICS nations.

Russia’s Foreign Ministry was furious with the sanctions — both from the State and Commerce departments — responding in a statement later on Wednesday that the US is trying “to punish us for the rigorous pursuit of [our] national interests, and for the free choice of the inhabitants of Crimea and Sevastopol,” to join Russia last year.

 

 

Hey Yahoo Users…..a Big Problem was Finally Admitted, HACKED

Yahoo confirms 500 million accounts compromised in huge data breach

FNC: Yahoo has confirmed that hackers stole information from at least 500 million user accounts in what it describes as a “state-sponsored” attack.

In a statement released Thursday, Yahoo’s Chief Information Security Officer Bob Lord said that the information was stolen from the company’s network in late 2014. “The account information may have included names, email addresses, telephone numbers, dates of birth, hashed passwords (the vast majority with bcrypt) and, in some cases, encrypted or unencrypted security questions and answers,” he said.

However, an ongoing investigation into the hack suggests that stolen information did not include unprotected passwords, payment card data, or bank account information, according to Lord. Payment card data and bank account information are not stored in the affected system, he added.

The investigation has found that the attacker is no longer in Yahoo’s network. The internet giant said that it is working with law enforcement.

Yahoo is notifying potentially affected users and asking them to promptly change their passwords.

Early on Friday Recode reported that Yahoo was set to confirm a major data breach of its systems in 2012 that compromised the personal data of 200 million accounts.

**** 

PYMNTS: Yahoo did announce over the summer that is was investigating a possible data breach wherein hackers claimed to have accessed 200 million Yahoo user accounts that they were selling online.

“It’s as bad as that,” one source told re/code. “Worse, really.”

And a hack that is “bad” on its best description and “worse” than 200 million accounts going up for sale on the dark web may only be the beginning of Yahoo’s troubles this week, since the firm is also in the midst of trying to close a $4.8 billion sale of its core business — which is at the center this hack — to Verizon.

If the scale of liability is large enough, it could be a costly problem for Yahoo’s new owners — and the firm’s shareholders are likely to worry that it could lead to an adjustment in the price of the transaction. As of now the deal is moving forward as it goes through a variety of regulatory clearances. The deal must also pass final muster with Yahoo’s shareholders. Representatives of both firms have recently began meeting to review the Yahoo business and to make sure the transition runs smoothly. We’re sure those meeting will be delightfully fun this week.

If this is the same hack that was reported over the summer, the actor behind the mayhem is an infamous cybercriminal named “Peace.” Peace was, by his own admission, selling credentials of 200 million Yahoo users from 2012 on the dark web for just over $1,800. The data allegedly included user names, easily decrypted passwords, personal information like birth dates and other email addresses. At the time (in August 2016) Yahoo noted being “aware of the claim,” but did not confirm or deny it. However, at the time Yahoo did not issue a password reset recommendation.

If this hack is what it seems to be, it will be a depressing coda on CEO Marissa Mayer’s run at the head of Yahoo. Though brought in to turn the firm around, Mayer was unable to find traction for a reset, refocused Yahoo — which eventually precipitated the sale.