Listen and Read How Wrong Obama is on Iran

Even the Russians did not lie as badly as the Iranians have and Kerry at the behest of the White House is ignoring the historical lies.

Sen. Bob Corker (R-Tenn.) has sent a blistering letter to President Obama denouncing reported Iran concessions. It reads:

Dear Mr. President:

It is breathtaking to see how far from your original goals and statements the P5+1 have come during negotiations with Iran. Under your leadership, six of the world’s most important nations have allowed an isolated country with roguish policies to move from having its nuclear program dismantled to having its nuclear proliferation managed. Negotiators have moved from a 20-year agreement to what is in essence a 10-year agreement that allows Iran to simultaneously continue development of an advanced ballistic missile program and research and development of advanced centrifuges. This also will allow Iran’s economy to be restored with billions of dollars returned to its coffers, a development that administration officials concede will be used at some level to export terrorism in the region.

I am alarmed by recent reports that your team may be considering allowing the deal to erode even further. Only you and those at the table know whether there is any truth to these allegations, and I hope reports indicating potential concessions on inspections and on the full disclosure of Iran’s possible military dimensions (PMDs) are inaccurate.

Regarding inspections, surely your administration and those involved in the negotiations will adhere to an “anytime, anywhere” standard. No bureaucratic committees. No moving the ball. No sites off limits.

You have publicly acknowledged Iran’s long history of covert nuclear activity.  We all are aware of the importance of having a full understanding of Iran’s nuclear program, including PMDs of those activities as part of any agreement. Yet, recently I have heard of a potential cumbersome process where the International Atomic Energy Agency (IAEA), with no confirmation from Iran, will make PMD determinations about Iran’s nuclear program in order to protect Iran’s national pride, meaning Iran will not have to publicly admit to these activities. Today, the IAEA cannot get access to information Iran agreed to share pursuant to a 2013 agreement. By not requiring Iran to explicitly disclose their previous weaponization efforts on the front end of any final agreement, we will likely never know, in a timely fashion, the full extent of Iranian capabilities.

I understand the dynamics that can develop when a group believes they are close to a deal and how your aides may view this as a major legacy accomplishment. However, as you know, the stakes here are incredibly high and the security implications of these negotiations are difficult to overstate. As your team continues their work, if Iran tries to cross these few remaining red lines, I would urge you to please pause and consider rethinking the entire approach. Walking away from a bad deal at this point would take courage, but it would be the best thing for the United States, the region and the world.

One hopes that Corker’s colleagues are paying attention and that they are ready to prevent a catastrophic deal.

Russia China Pact with Snowden in the Middle

Going beyond the major hack by China into the Office of Personnel Management that cultivated at least 14 million personnel files of government, intelligence and military, China is building a database of individuals in America. Would they share it with Russia? The wake of destruction is yet to be known and future predictions are impossible to imagine.

Russia is turning to China and likewise China is delighted for the relationship as proven by the Silk Road Economic objectives.

Putin’s vision of a ‘greater Europe’ from Lisbon to Vladivostok, made up of the European Union and the Russian-led Eurasian Economic Union, is being replaced by a ‘greater Asia’ from Shanghai to St. Petersburg.

China's silk road

In part:

The rupture between Russia and the West stemming from the 2014 crisis over Ukraine has wide-ranging geopolitical implications. Russia has reverted to its traditional position as a Eurasian power sitting between the East and the West, and it is tilting toward China in the face of political and economic pressure from the United States and Europe. This does not presage a new Sino-Russian bloc, but the epoch of post-communist Russia’s integration with the West is over. In the new epoch, Russia will seek to expand and deepen its relations with non-Western nations, focusing on Asia. Western leaders need to take this shift seriously.


Russia’s Pivot to Asia
Russia’s pivot to Asia predates the Ukraine crisis, but it has become more pronounced since then. This is in part because China is the largest economy outside of the coalition that has imposed sanctions on Russia as a result of the crisis.

What was originally Moscow’s “marriage of convenience” with Beijing has turned into a much closer partnership that includes cooperation on energy trade, infrastructure development, and defense.

Putin’s vision of a “greater Europe” from Lisbon to Vladivostok, made up of the European Union and the Russian-led Eurasian Economic Union, is being replaced by a “greater Asia” from Shanghai to St. Petersburg.

Russia is now more likely to back China in the steadily growing competition between Beijing and Washington, which will strengthen China’s hand.
Takeaways for Western Leaders
Russia’s confrontation with the United States will help mitigate Sino-Russian rivalries, mostly to China’s advantage. But this doesn’t mean Russia will be dominated by China—Moscow is likely to find a way to craft a special relationship with its partner.

With China’s economic might and Russia’s great-power expertise, the BRICS group (of which Russia is a part, along with Brazil, India, China, and South Africa) will increasingly challenge the G7 as a parallel center of global governance.

The Shanghai Cooperation Organization, due to include India and Pakistan this year, is on its way to becoming the principal development and security forum for continental Asia.

Through its enhanced relations with non-Western countries, Russia will actively promote a concept of world order that seeks to reduce U.S. global dominance and replace it with a broader great-power consensus. Much more detail here.

Enter Snowden

Confirmed: UK agents ‘moved over Snowden files’

Russia, China Decrypt Snowden Files

Russia and China have allegedly decrypted the top-secret cache of files stolen by whistleblower Edward Snowden, according to a report from The Sunday Times, to be published tomorrow.

The info has compelled British intelligence agency MI6 to withdraw some of its agents from active operations and other Western intelligence agencies are now actively involved in rescue operations. In a July 2013 email to a former U.S. Senator, Snowden stated that, “No intel­li­gence ser­vice—not even our own—has the capac­ity to com­pro­mise the secrets I con­tinue to pro­tect. While it has not been reported in the media, one of my spe­cial­iza­tions was to teach our peo­ple at DIA how to keep such infor­ma­tion from being com­pro­mised even in the high­est threat counter-intelligence envi­ron­ments (i.e. China).” Many in the intelligence agencies at the time greeted this claim with scepticism. Now, one senior British official said Snowden had “blood on his hands,” but another said there’s yet no evidence anyone was harmed. Snowden eventually fled to Russia via Hong Kong after downloading some 1.7 million documents from U.S. government computers and leaking them to journalists out of a desire to protect “privacy and basic liberties.” The revelations of mass spying outraged populations and governments around the world, at least temporarily damaged relations, and eventually led to changes in the mass surveillance policies of the NSA and British GCHQ.

 

 

Deep Panda, the Hacker of OPM Employee Files

Personnel records held at the Office of Personnel Management going back 35 years on people who worked for government as employees or contractors are for sale on the Darknet.

Government records stolen in a sweeping data breach that was reported last week are popping up for sale on the so-called “darknet,” according to a tech firm that monitors the private online network used by criminals and creeps throughout the world.

Credentials to log into the Office of Personnel Management are being offered just days after the announcement the agency’s records, including extremely personal information of 4.1 million federal government employees dating back to the 1980s, had been compromised, said Chris Roberts, founder and CTO of the Colorado-based OneWorldLabs (OWL), a search engine that checks the darknet daily for data that could compromise security for its corporate and government clients, including government IDs and passwords.

The FBI has identified the operation. The hackers likely used Chinese associates already inside government for access. In classified briefings to members of Congress in recent days, intelligence officials have described what appears to be a systematic Chinese effort to build databases that explain the inner workings of the United States government. The information includes friends and relatives, around the world, of diplomats, of White House officials and of officials from government agencies, like nuclear experts and trade negotiators. Read more here.

FBI Alert Reveals ‘Groups’ Behind OPM Hack

President says cyber attack threat ‘accelerating’

The FBI has disclosed that multiple hacker groups carried out the cyber attack that compromised the records of 4 million government workers in the networks of the Office of Personnel Management.

“The FBI has obtained information regarding cyber actors who have compromised and stolen sensitive business information and personally identifiable information (PII),” states a Flash alert dated June 5. “Information obtained from victims indicates that PII was a priority target.”

Security analysts familiar with the OPM breach, disclosed in a notice last week, said two groups of Chinese state-sponsored hackers appear to be behind the cyber attacks, including one linked to the Chinese military that has been dubbed “Deep Panda.”

Deep Panda is a highly sophisticated Chinese military hacker unit that has been gathering data on millions of Americans. The group was linked in the past to the hacking of the health care provider Anthem that compromised the personal data of some 80 million customers.

The FBI did not directly link its warning to the OPM hacking. But it said cyber investigators have “high confidence” about the threat posed by the cyber attackers based on its investigation into the data breach.

According to the alert, the stolen personal data “has been used in other instances to target or otherwise facilitate various malicious activities such as financial fraud though the FBI is not aware of such activity by these groups.”

The groups were not identified by name or by country.

However, the alert revealed that the software used by the hackers is called Sakula, which security analysts say was the Root Access Tool, or RAT, that was used by the Chinese in both the OPM and Anthem hacks.

Sakula software employs stolen, signed security certificates to gain unauthorized network access and analysts said the use of that technique requires cyber sophistication that is not known to be used outside of nation-state cyber forces.

The software allows remote users to gain computer network administrator access, which permits the theft of large amounts of data.

The FBI warned in the notice that any entity that discovers the Sakula malware and other signatures should seek cyber security assistance and notify the FBI.

“Any activity related to these groups detected on a network should be considered an indication of a compromise requiring extensive mitigation and contact with law enforcement,” the notice said.

The groups involved were observed “across a variety of intrusions leveraging a diverse selection of tools and techniques to attempt to gain initial access to a victim including using credentials acquired during previous intrusions.”

President Obama was asked after the G-7 summit in Germany on Tuesday about the Chinese role in the OPM cyber attacks and declined to name Beijing as the perpetrator.

“We haven’t publicly unveiled who we think may have engaged in these cyber attacks,” Obama said. “But I can tell you that we have known for a long time that there are significant vulnerabilities and that these vulnerabilities are going to accelerate as time goes by, both in systems within government and within the private sector.”

Obama said part of the problem is “very old systems” used in government computer networks.

“And we discovered this new breach in OPM precisely because we’ve initiated this process of inventorying and upgrading these old systems to address existing vulnerabilities,” he said.

“[W]e’re going to have to keep on doing it, because both state and non-state actors are sending everything they’ve got at trying to breach these systems,” the president said.

“In some cases, it’s non-state actors who are engaging in criminal activity and potential theft,” Obama said. “In the case of state actors, they’re probing for intelligence or, in some cases, trying to bring down systems in pursuit of their various foreign policy objectives. In either case, we’re going to have to be much more aggressive, much more attentive than we have been.”

The problem of cyber attacks is “going to accelerate,” he said. “And that means that we have to be as nimble, as aggressive, and as well-resourced as those who are trying to break into these systems.”

The administration has rejected calls by senior U.S. security officials to engage in more aggressive, offensive cyber retaliation against states such as China as a way to develop cyber deterrence.

The president and his advisers are said to fear that offensive cyber attacks will lead to a major conflict. Supporters of taking more aggressive responses to hacking have said demonstrations of U.S. cyber retaliatory strikes will deter future attacks.

The administration has favored using law enforcement and diplomatic policies to deal with the problem.

One private sector cyber security specialist familiar with the OPM hack said that in addition to the government’s personnel database, other major cyber attacks believed to be carried out by Chinese hackers include clandestine intrusions into the networks of a major telecommunications company and a major aviation industry firm.

The hackers’ use of several domain names in the OPM hacking also are similar to domains used by Chinese cyber attackers in the past. The domains were identified as OPMsecurity.org and opm-learning.org.

Another signature linking the OPM hack to China was the hackers’ use of a program called Mimikatz that is used to gain high-level remote access to networks.

“Mimikatz is a classic of Deep Panda” in terms of tactics, techniques, and procedures, said a security analyst familiar with details of the attack. “This allows the actors to dump password hashes, perform pass the hash and ‘golden ticket’ attacks in the victim environment.”

The private security company CrowdStrike first identified Deep Panda and has called the group among the most sophisticated state-sponsored hackers.

China’s main military intelligence service that has been linked to cyber attacks is the Third Department of the General Staff, or 3PLA, which conducts cyber warfare.

Putin’s Plan for a Military Artic Region

Despite sanctions against Russia, the Artic is still at risk. The recent G-7 meeting brought more solidarity agreement of sanctions on Russia but only due to Putin’s hostilities against Ukraine and in violation on the Minsk Agreement. The full text of the agreement is here in English. No conversations have taken place with regard to Putin’s operations in the Artic.

Going back to 2103, Putin not only announced his aggressions for the Artic region, he is intensifying operations while there is no mission to stop his objectives. Two years later, he is succeeding.

Russia has been building new ships and preparing to deploy troops along its northern border as melting Arctic ice will make it possible for more commercial traffic to transit the so called Northern Sea route. There is also the potential for large mineral deposits in the region.

“There are plans to create a group of troops and forces to ensure military security and protection of the Russian Federation’s national interests in the Arctic in 2014,” Defense Minister Sergey Shoigu said at the same meeting.

Putin’s declaration highlights several military moves the Russians have made in relation to the Arctic in the last few years.

Nikolai Patrushev, the head of Russia’s Security Council, announced in mid-2012 it would create ten naval bases along its northern coast. In May, Russia announced it would be constructing up to four new ships for duty in the Arctic.

Putin’s remarks follow Canada’s plan to claim Arctic territories — including the North Pole — as sovereign Canadian territory, the country’s foreign minister announced on Monday.

“We are determined to ensure that all Canadians benefit from the tremendous resources that are to be found in Canada’s far north,” John Baird said, according to an Associated Press report.

Last week, Canada made preliminary claims to some Arctic regions and plans to make more.

Russia, of all the eight members of the Arctic Council, has the most naval assets to patrol the surface of the Arctic.

Russia has more than 37 government icebreakers compared to Canada’s six and America’s five, according to a July review from the U.S. Coast Guard.

However Canada is currently constructing a new surface naval force, complete with a collection of ships that would be designed to operate in cold climates.

Under the sea, the U.S. nuclear submarine force remains as the dominant power in the region.

Russia is interested in the Arctic for a number of reasons, though natural resources and pure geopolitical imperatives are the major driving forces behind Moscow’s thinking. The Arctic contains an estimated 30 percent of the world’s undiscovered natural gas and 13 percent of its undiscovered oil reserves, regarded by Moscow as important sources of foreign investment that are critical to the country’s economic development. The Northern Sea Route from East Asia to Europe via the Arctic Ocean provides another economic opportunity for developing infrastructure in northern Russia.

Militarizing the Arctic will be a key imperative for the Russian military throughout 2015 and beyond — alongside modernization in general and bolstering forces in Crimea and the Kaliningrad exclave. According to the Russian Ministry of Defense, Soviet-era bases in the Arctic are being reactivated in response to NATO’s renewed interest in the region.

The airstrip on the archipelago of Novaya Zemlya is being renovated to accommodate modern and next generation fighter aircraft in addition to advanced S400 air defense systems. Part of the Northern Fleet will also be based on the island chain, which is ideally positioned for operations in the Arctic region. The Northern Fleet represents two-thirds of the entire Russian Navy, which is the only navy in the world to operate nuclear-powered icebreaker ships. Great detail can be read here.

CFR and Robina Foundation Behind Globalization

All foreign policy is coordinated between the U.S. State Department and the United Nations. We cannot know all the details and methods, yet below a summary of a major donor and power of influence is but one of many when it comes to the globalization of America and loss of sovereignty. All government agencies are subservient to the White House and the State Department.

“International Institutions and Global Governance Program

World Order in the 21st Century

A New Initiative of the Council on Foreign Relations

“The Council on Foreign Relations (CFR) has launched a comprehensive five-year program on international institutions and global governance. The purpose of this cross-cutting initiative is to explore the institutional requirements for world order in the twenty-first century. The undertaking recognizes that the architecture of global governance—largely reflecting the world as it existed in 1945—has not kept pace with fundamental changes in the international system, including but not limited to globalization. Existing multilateral arrangements thus provide an inadequate foundation for addressing today’s most pressing threats and opportunities and for advancing U.S. national and broader global interests. The program seeks to identify critical weaknesses in current frameworks for multilateral cooperation; propose specific reforms tailored to new global circumstances; and promote constructive U.S. leadership in building the capacities of existing organizations and in sponsoring new, more effective regional and global institutions and partnerships. This program is made possible by a generous grant from the Robina Foundation.”

The Board members of Robina are chilling. One such board member is SUSAN V. BERRESFORD, formerly of the Ford Foundation. Remember Stanley Ann Dunham, Obama’s mother worked at the Ford Foundation.

The mission of the Council of Foreign Relations in paid cooperation with the Robina Foundation, reads as such:

The International Institutions and Global Governance (IIGG) Program at the Council on Foreign Relations (CFR) is supported by a generous grant from the Robina Foundation. It aims to identify the institutional requirements for effective multilateral cooperation in the twenty-first century. The program is motivated by recognition that the architecture of global governance-largely reflecting the world as it existed in 1945-has not kept pace with fundamental changes in the international system. These shifts include the spread of transnational challenges, the rise of new powers, and the mounting influence of nonstate actors. Existing multilateral arrangements thus provide an inadequate foundation for addressing many of today’s most pressing threats and opportunities and for advancing U.S. national and broader global interests.

Given these trends, U.S. policymakers and other interested actors require rigorous, independent analysis of current structures of multilateral cooperation, and of the promises and pitfalls of alternative institutional arrangements. The IIGG program meets these needs by analyzing the strengths and weaknesses of existing multilateral institutions and proposing reforms tailored to new international circumstances.

Robina Foundation Awards CFR $10.3 Million Grant

to Expand Global Governance Program

January 20, 2012

The Robina Foundation has awarded the Council on Foreign Relations (CFR) a five-year, $10.3 million grant to expand its activities on international cooperation. This award is one of the largest operating grants in CFR’s history and will support its International Institutions and Global Governance (IIGG) Program.

The IIGG Program was founded in 2008 with a generous grant from Robina with the recognition that existing multilateral arrangements are inadequate to address the transnational challenges facing the United States. The program and its scholars’ work focuses on the institutional requirements needed for effective cooperation in the twenty-first century. “The Robina Foundation’s generous commitment to IIGG will allow CFR to deepen and strengthen its work examining multilateral institutions, and what they can do to enhance the world’s ability to contend with the most pressing global issues,” says CFR President Richard N. Haass.

In its first three years, the IIGG Program has tracked and mapped the landscape of international organizations through its multimedia interactive, the Global Governance Monitor. IIGG has also produced over twenty reports on priorities for institutional reform, and provided policymakers with concrete recommendations for more effective management of the world’s most pressing problems.

From Hillary Clinton herself, she reveals that the Council of Foreign Relations not only provides the government policy but CFR also controls most often media relating to foreign policy.