Operation Foal Eagle/Key Resolve 2017, B52 Bombers Prepare

Foal Eagle 2017

Members of the Republic of Korea (ROK) Navy Underwater Dive Team examine an X-ray image of a possible mine in Jinhae, ROK, March 6, 2017, as part of exercise Foal Eagle 2017. Foal Eagle is an annual, bilateral training exercise designed to enhance the readiness of U.S. and ROK forces and their ability to work together during a crisis. (U.S. Navy Combat Camera photo by Mass Communication Specialist 3rd Class Alfred A. Coffield)

Key Resolve = RSOI, which stands for Reception, Staging, Onward Movement, Integration (and even earlier as Team Spirit). It is an annual command post exercise (CPX) held by United States Forces Korea, and conducted with the Republic of Korea Armed Forces.

Operation Foal Eagle is under way

Related reading: North Korea fires four ballistic missiles

***

January of 2016, days after North Korea claimed it tested a hydrogen bomb, the United States responded with a display of military might on the Korean Peninsula.

A B-52 bomber jet from Andersen Air Force Base in Guam flew over Osan, South Korea, on Sunday “in response to a recent nuclear test by North Korea,” United States Pacific Command said.
The B-52 was flanked by South Korean F-15 fighter jets and U.S. F-16 fighter jets.
“This was a demonstration of the ironclad U.S. commitment to our allies in South Korea, in Japan, and to the defense of the American homeland,” said PACOM Commander. More here from CNN.
***
A press report is telling us:
(KUNA) South Korea’s military said Thursday the joint annual exercise with the US will continue as planned, one day after China requested a halt according to Yonhap New Agency. The Chinese Foreign Minister Wany Yi proposed North Korea suspend its nuclear and missile activities in return for a halt to the war drills. This was rejected.
Image result for b52 nuclear bomber to south korea
Another press report from a source in the UK reports:

Donald Trump set to send B-52 NUCLEAR BOMBERS to South Korea after North fires missiles at Japan and US warns of ‘overwhelming’ response

Secretary of Defence James Mattis said the US “remains steadfast in its commitment” to the defence of its allies

Now US military chiefs are reportedly planning to fly in B-1 and B-52 bombers – built to carry nuclear bombs – to show America has had enough, according to the Korea Times.

South Korea and the US have also started their annual Foal Eagle military exercise sending a strong warning to North Korea over its actions.

A military official said 300,000 South Korean troops and 15,000 US personnel are taking part in the operation. Washington is also expected to deploy a series of strategic assets from the US as well as from military bases in Guam and Japan, reports the Korea Times.

The USS Carl Vinson, a Nimitz-class supercarrier, will join the Foal Eagle exercise after departing from San Diego.

The nuke-powered aircraft carrier will carry dozens of fighter jets, early warning aircraft and anti-sub craft.

It will be accompanied by the guided-missile cruiser USS Lake Champlain (CG-57) and two Arleigh Burke-class guided-missile destroyers.

From the US Marine Corps in Japan, F-35B stealth fighters will be deployed to the peninsula for the first time.

“An F-35B is capable of evading anti-aircraft radar and making preemptive strikes,” a military official said. More details here.

***

“The USS Carl Vinson is expected to arrive in Busan around March 15 to participate in the Foal Eagle exercise,” a USFK spokesman told reporters.

The South Korean and U.S. militaries on Wednesday kicked off the two-month field training exercise involving ground, air and naval forces. The U.S. supercarrier will make use of its air assets, as well as its escort ships in the maneuvers that aims to deter North Korean aggression.

Separately, the allies plan to start the Key Resolve computer-simulated command post exercise on March 13 for a two-week run. The U.S. is expected to deploy other strategic assets, such as the B-1B and B-52 bombers, with the tiltrotor V-22 Osprey to make an appearance, in a show of force against the North, which has stepped up its nuclear and missile threats. More here.

 

WikiLeaks Releases CIA Cyber Docs, Problem?

Primer: Steve Bannon works for President Trump in the White House.

Steve Bannon is a star – for Al-Qaeda, that featured him on the cover of their newspaper

steve-bannon-is-a-star---for-al-qaeda-that-featured-him-on-the-cover-of-their-paper

Then this headline….

The new scandal headlines for today is WikiLeaks, telling us they published the largest cache of secret CIA documents relating to the CIA’s ability to hack, break encryption and install malware. This is a problem? The problem is not the tools the CIA has, the problem is that someone inside the agency stole them and delivered them to WikiLeaks.

It is a good thing that the agency has these resources, why you ask?

Well….try this…The threat is real from Russians, Chinese, North Korea, Iran, Syria, Ukraine, al Qaeda and Islamic State…

Image result for stuxnet

Remember Stuxnet? This was a successful joint program under the Bush presidency with Israel to infect the Iranian nuclear program and it was to forces the centrifuges to spin out of control, which they did. Ultimately, it caused the progress of the Iranian infrastructure to be delayed substantially. It was in fact later uncovered by cyber scientists working for Siemens, the hardware and software platform used as the operating system. Good right? Yes.

Image result for u.s. cyber command

Well, there is more…

In recent years, Iran and North Korea have been sharing nuclear scientists and engineers, parts, testing and missile collaboration. So far, the missiles launched by North Korea for the most part have been unsuccessful, or at least did not achieve the ultimate objective and that is an official target strike. Why? Because of the United States. How so you ask?

Over the weekend, North Korea fired off 4 missiles in succession toward Japan. They did not reach the mainland but did reach the waterway that is part of the Japanese economic zone for maritime operations. We have American cyberwarriors that are doing effective work causing the missiles to fly off course or to technically fail. The objective is to use non-explosive weaponry to foul the North Korea and hence Iran’s missile program and while North Korea is not especially connected to the internet, some related systems are connected and then there is electronic warfare.

Image result for foreign hacking omb

We know that Islamic State is a terror operation that has militant cells in an estimated 30 countries. While they have depraved methods of murder, rape and terror, they too have a cyber operation.

The Will to Act

One question is whether ISIS will be consumed with the protection and continued expansion of its immediate fighting fronts, i.e., the “near enemy,” or whether its scope of vision includes America’s homeland. The Economist advances a strong case that desire for such expansion not only exists but will be exercised: “With its ideological ferocity, platoons of Western passport holders, hatred of America and determination to become the leader of global jihadism, ISIS will surely turn, sooner or later, to the ‘far enemy’ of America and Europe.”

And perhaps any doubt the militant’s sights are on America was removed by ISIS leader Abu Bakr al-Baghdadi’s Sept. 22 call for jihadists to not wait for the order but to rise, take up arms, and “kill Americans and other infidels” wherever they are. Clearly the group is showing no hesitancy in its desire to strike the U.S. heartland on a personal scale.

Cyber Operations Capability?

As to whether ISIS will have the capability to mount cyber operations against the U.S., David DeWalt, head of cybersecurity firm FireEye, believes that ISIS will follow in the footsteps of the Syrian Electronic Army and the Iran-based Ajax Security Team to target the United States and other Western nations.

“We’ve begun to see signs that rebel terrorist organizations are attempting to gain access to cyber weaponry,” DeWalt stated recently. He added that booming underground markets dealing in malicious software make offensive cyber weapons just an “Internet transaction” away for groups such as ISIS. More here.

Is there more to this that we should know? Yes…

There is the Middle East and we have a major vested interest in the region.

***

Cybersecurity in the Gulf: The Middle East’s Virtual Frontline

Cybersecurity is often discussed in relation to the major global powers: China’s economic espionage, Russian influence operations, and U.S. dragnet global surveillance to thwart terrorism.

However, as other countries move to digitize their economies, cybercriminals are zeroing in on these new and lucrative targets while regional players are quickly incorporating cyber capabilities into their own arsenals for achieving strategic ends.

The Middle East, particularly the Gulf states, are quickly recognizing the urgent need for better cybersecurity, while regional adversaries such as Iran have begun weaponizing code as an extension of broader strategic goals within the region. What, though, is the Gulf’s current cybersecurity atmosphere, and how does Iran’s emerging use of offensive cyber capabilities fit into its broader strategy in the Middle East?

Wajdi Al Quliti, the Director of Information Technology at the Organization of Islamic Cooperation, notes that “the region’s dramatic strides towards digitization—expected to add over $800 billion to GDP and over 4 million jobs by 2020—is making the Gulf a major target for fast evolving cyber threats.” Much like other regions, the Gulf is finding it difficult to sufficiently create criminal deterrence due to segmented laws and difficulties in attribution. Al Quliti argues “cross-border cooperation and common cybersecurity structures could prove to be a game-changing advantage in the fight against cybercrime.” However, “the elephant in the room,” according to Al Quliti, “is the issue of state-sponsored hacking, in which case harmonized laws are unlikely to make a difference.”

A critical point in nation-state hacking in the Middle East begins with the Stuxnet worm. Discovered in 2010 burrowed deep in Iranian networks, the worm had slowly been sabotaging Iran’s nuclear ambitions. Then in 2011 CrySyS Lab discovered Duqu, a cyber espionage tool tailored to gather information from industrial control systems, and in 2012, Kaspersky Labs identified Flame, another espionage tool, targeting various organizations in the Middle East. Both Duqu and Flame are associated with Stuxnet and attributed back to the Equation Group, widely considered an arm of the National Security Agency.

In 2012, Iranian officials found a wiper virus erasing files in the network of the Oil Ministry headquarters in Tehran, leading the ministry to disconnect all oil terminals from the Internet to prevent the virus from spreading. It is uncertain who was behind the attacks, but a mere four months later, Saudi Arabia’s largest oil company, Saudi Aramco, was hit with a similar wiper virus known as Disttrack—possibly coopted from the previous attack on Iran’s oil industry.

The data-erasing malware sabotaged three-quarters, some 35,000 of the company’s computers while branding screens with an image of a burning American flag. A few months later, another wiper virus attacked Qatar’s RasGas.

Al Quliti identifies “the region’s heavy dependence on oil and gas—as well as the oil and gas-powered desalination plants that provide much of the region’s fresh water”—as “a source of cyber vulnerability,” adding that “any cyber attack on these installations could prove catastrophic and might result in a humanitarian disaster.”

The sabotage operations against the Gulf’s oil industry have been attributed by various cybersecurity firms—but not officially by any government—to a group called Shamoon, thought to be an arm of the Iranian government.

Michael Eisenstadt, the Director of the Military and Security Studies Program at the Washington Institute for Near East Policy, notes that “cyber allows Iran to strike at adversaries globally, instantaneously, and on a sustained basis, and to potentially achieve strategic effects in ways it cannot in the physical domain.” For example, in March 2016, the Justice Department indicted seven Iranian Revolutionary Guard members for distributed denial of service attacks against U.S. banks in 2012 in retaliation for Iran sanctions imposed the previous year, as well as for infiltrating the systems of a small New York dam in 2013—a possible testing ground for penetrating larger pieces of U.S. critical infrastructure. In 2014, the same year North Korea set its sights on Sony Pictures, Iran’s cyber capabilities again reached into the United States, using another wiper virus to sabotage the operations of the Las Vegas Sands casino, whose chief executive, a staunch supporter of Israel, had suggested detonating a nuclear bomb in the heart of Tehran.

Last November, right before a major OPEC meeting, a variation of the Disttrack wiper used against Saudi Aramco struck again, now fitted with a picture of Alan Kurdi, the drowned Syrian toddler who washed up in Turkey in 2015. The virus targeted six Saudi organizations, most notably the Saudi General Authority of Civil Aviation, delivering its payload at the close of business on a Thursday, the start of the Islamic weekend, for maximum impact. Some experts speculate the November attack could have also been a false-flag operation to derail the Iranian nuclear deal.

Interestingly, for both the 2012 and 2016 Shamoon attacks, the wiper came fitted with stolen login credentials that Symantec now believes could have been gleaned from a cyber espionage tool, known as Greenbug, found on one of the administrator computers of a Saudi organization targeted in November. The potential link between Greenbug and the Shamoon group opens up possible investigations into the group’s involvement in a host of other Greenbug attacks throughout the Middle East, including breaches in Saudi Arabia, Bahrain, Iraq, Qatar, Kuwait, Turkey, and even Iran—though likely for domestic surveillance on dissidents. Just last week, another wiper virus hit 15 Saudi organizations, including the Ministry of Labor, prompting the government to issue an urgent warning of pending Shamoon attacks.

Eisenstadt points out that “Iran’s cyber activities show that a third-tier cyber power can carry out significant nuisance and cost-imposing attacks,” and “its network reconnaissance activities seem to indicate that it is developing contingency plans to attack its enemies’ critical infrastructure.” According to Eisentadt, is now seems that “in the past decade, Iran’s cyber toolkit has evolved from a low-tech means of lashing out at its enemies by defacing websites and conducting DDoS attacks, to a central pillar of its national security concept.”

Beginning to understand why the CIA and the other agencies are building cyber command war-rooms?

 

FBI to Pay Former Spy for Trump Intel

FBI Plan to Pay Ex-Spy for Trump Intel during Campaign Sparks Questions of Obama Admin’s Use of Federal Authorities for Political Gain

Mar 06, 2017
Author of unsubstantiated dossier was also researching Trump for Clinton campaign associates when FBI sought to hire him
WASHINGTON– Senate Judiciary Committee Chairman Chuck Grassley today is seeking details on the FBI’s reported plans to hire former British spy Christopher Steele to investigate Donald Trump during the presidential campaign, even though the FBI was aware that he was being paid by Democrat political operatives to conduct opposition research on Trump.  Steele is the author of the controversial dossier that includes unsubstantiated claims alleging ties between the Trump campaign and the Russian government.
In a letter today to FBI Director James Comey, Grassley is requesting a briefing on the agreement as well as the FBI use of the material in Steele’s memos.  Grassley also wants to know whether the FBI ever independently verified the memos’ claims.
“The idea that the FBI and associates of the Clinton campaign would pay Mr. Steele to investigate the Republican nominee for President in the run-up to the election raises further questions about the FBI’s independence from politics, as well as the Obama administration’s use of law enforcement and intelligence agencies for political ends.  It is additionally troubling that the FBI reportedly agreed to such an arrangement given that, in January of 2017, then-Director Clapper issued a statement stating that ‘the IC has not made any judgment that the information in this document is reliable, and we did not rely upon it in any way for our conclusions,’” Grassley said in the letter.
In the letter, Grassley is requesting records related to the reported agreement.  He is also seeking answers to a number of questions, including who was involved in decisions related to hiring Steele and using his memos, whether the FBI used materials in the memo as the basis for seeking warrants and other investigative tools, and if the FBI has been able to independently verify allegations made in the memos.
Full text of Grassley’s letter to Comey follows:
March 6, 2017
VIA ELECTRONIC TRANSMISSION
The Honorable James B. Comey, Jr.
Director
Federal Bureau of Investigation
935 Pennsylvania Avenue, N.W.
Washington, DC 20535
Dear Director Comey:
On February 28, 2017, the Washington Post reported that the FBI reached an agreement a few weeks before the Presidential election to pay the author of the unsubstantiated dossier alleging a conspiracy between President Trump and the Russians, Christopher Steele, to continue investigating Mr. Trump.[1]  The article claimed that the FBI was aware Mr. Steele was creating these memos as part of work for an opposition research firm connected to Hillary Clinton.  The idea that the FBI and associates of the Clinton campaign would pay Mr. Steele to investigate the Republican nominee for President in the run-up to the election raises further questions about the FBI’s independence from politics, as well as the Obama administration’s use of law enforcement and intelligence agencies for political ends.  It is additionally troubling that the FBI reportedly agreed to such an arrangement given that, in January of 2017, then-Director Clapper issued a statement stating that “the IC has not made any judgment that the information in this document is reliable, and we did not rely upon it in any way for our conclusions.”According to the Washington Post, the FBI’s arrangement with Mr. Steele fell through when the media published his dossier and revealed his identity.
The Committee requires additional information to evaluate this situation.  Please provide the following information and respond to these questions by March 20, 2017.  Please also schedule a briefing by that date by FBI personnel with knowledge of these issues.
  1. All FBI records relating to the agreement with Mr. Steele regarding his investigation of President Trump and his associates, including the agreement itself, all drafts, all internal FBI communications about the agreement, all FBI communications with Mr. Steele about the agreement, all FBI requests for authorization for the agreement, and all records documenting the approval of the agreement.
  1. All records, including 302s, of any FBI meetings or interviews with Mr. Steele.
  1. All FBI policies, procedures, and guidelines applicable when the FBI seeks to fund an investigator associated with a political opposition research firm connected to a political candidate, or with any outside entity.
  1. All FBI records relating to agreements and payments made to Mr. Steele in connection with any other investigations, including the reported agreements relating to his investigation of FIFA.
  1. Were any other government officials outside of the FBI involved in discussing or authorizing the agreement with Mr. Steele, including anyone from the Department of Justice or the Obama White House?  If so, please explain who was involved and provide all related records.
  1. How did the FBI first obtain Mr. Steele’s Trump investigation memos?  Has the FBI obtained additional memos from this same source that were not published by Buzzfeed?  If so, please provide copies.
  1. Has the FBI created, or contributed to the creation of, any documents based on or otherwise referencing these memos or the information in the memos?  If so, please provide copies of all such documents and, where necessary, clarify which portions are based on or related to the memos.
  1. Has the FBI verified or corroborated any of the allegations made in the memos?  Were any allegations or other information from the memo included in any documents created by the FBI, or which the FBI helped to create, without having been independently verified or corroborated by the FBI beforehand?  If so, why?
  1. Has the FBI relied on or otherwise referenced the memos or any information in the memos in seeking a FISA warrant, other search warrant, or any other judicial process?   Did the FBI rely on or otherwise reference the memos in relation to any National Security Letters?  If so, please include copies of all relevant applications and other documents.
  1. Who decided to include the memos in the briefings received by Presidents Obama and Trump? What was the basis for that decision?
  1. Did the agreement with Mr. Steele ever enter into force?  If so, for how long?  If it did not, why not?
  1. You have previously stated that you will not comment on pending investigations, including confirming or denying whether they exist.  You have also acknowledged that statements about closed investigations are a separate matter, sometimes warranting disclosures or public comment.  Given the inflammatory nature of the allegations in Mr. Steele’s dossier, if the FBI is undertaking or has undertaken any investigation of the claims, will you please inform the Committee at the conclusion of any such investigations as to what information the investigations discovered and what conclusions the FBI reached?  Simply put, when allegations like these are put into the public domain prior to any FBI assessment of their reliability, then if subsequent FBI investigation of the allegations finds them false, unsupported, or unreliable, the FBI should make those rebuttals public.
I anticipate that your responses to these questions may contain both classified and unclassified information.  Please send all unclassified material directly to the Committee.  In keeping with the requirements of Executive Order 13526, if any of the responsive documents do contain classified information, please segregate all unclassified material within the classified documents, provide all unclassified information directly to the Committee, and provide a classified addendum to the Office of Senate Security.  Although the Committee complies with all laws and regulations governing the handling of classified information, it is not bound, absent its prior agreement, by any handling restrictions or instructions on unclassified information unilaterally asserted by the Executive Branch.
Thank you for your prompt attention to this important matter.  If you have any questions, please contact Patrick Davis of my Committee staff at (202) 224-5225.
Sincerely,
Charles E. Grassley
Chairman
Committee on the Judiciary
cc:
The Honorable Dianne Feinstein
Ranking Member
Senate Committee on the Judiciary

[1] Tom Hamburger and Rosalind Helderman, FBI Once Planned to Pay Former British Spy Who Authored Controversial Trump Dossier, The Washington Post (Feb. 28, 2017).

Rule Violations Meeting with Foreign Agents

Members of Congress meet with foreign diplomats and agents all the time. These encounters happen in Washington DC in government buildings or at social events. This also goes for journalists. When members of government travel abroad, they coordinate the travel with the State Department before and after their meetings. This is a long standing rule. All members of government meeting with foreign personnel must have an additional personnel in these interactions for witness reasons, checks and balances and there are strict conditions that are applied to these confabs. It is not uncommon for security personnel, a CIA representative or liaison officer to be included officially or in a cover role.

All U.S. officials, members of academia, think tanks and heads of domestic corporations follow a set of rules related to their contact with foreign officials. There are strict rules and prohibitions against contact with officials from countries with which we do not have official relations. North Korea and Iran for instance. Syria, Sudan, Lebanon, Afghanistan and China along with Russia have a second set of rules surrounding contact. Any U.S. official or military personnel meeting say with Russia, they are required to include the office of security and counterintelligence. Documenting the encounters are mandatory and the FBI and CIA are to be consulted for reasons of action or intentions.

Further, there is countless training and retraining that occurs for all U.S. personnel where any interaction with foreign services is required. Diplomatic settings, protocol and responsibilities are unique to countries due to relationships, culture, current policy objectives and respective titles of foreign agents.

For a view of foreign protocol, click here.

This brings us to meetings mentioned recently with the Russian ambassador, Sergey Kislyak by Trump representatives and those Democrats as well. If the rules are followed, there are records of the encounters. It is unclear whether those records are easily obtainable or access requires a FOIA request.

Image result for flynn dinner putin

So regarding General Flynn:

The Pentagon hasn’t found any documents indicating that Mike Flynn received authorization to accept money from a foreign government before traveling to Moscow in 2015 for a paid Russian state TV event, according to a letter from the acting Secretary of the Army.

The Pentagon finding came after lawmakers raised questions about whether the former White House national security adviser and retired U.S. Army general violated Pentagon rules that require retired officers to report income from foreign states.

Mr. Flynn accepted an invitation to Moscow in late 2015 to give a paid, sit-down interview with Russian state television network RT and to attend the channel’s 10-year anniversary gala, where he sat beside President Vladimir Putin.

The Department of the Army conducted “a thorough records search, and has not found any documents,” Acting Secretary of the Army Robert Speer said in a Feb. 14 letter in response to Rep. Elijah Cummings, a ranking Democrat on the House Oversight Committee, who asked the Pentagon whether Mr. Flynn received approval.

Image result for pelosi russia dinner

Yet we also have Nancy Pelosi, Steny Hoyer, Clair McCaskill, Chuck Schumer in addition to Jeff Sessions having sessions with the Russian ambassador. Were all of these interactions reported and did they too follow the diplomatic protocol rules? This is unclear.

Image result for pelosi russia Business Insider

As for the Trump advisory team, JD Gordon, Carter Page and Jared Kushner all had either formal or information meetings with the Russian ambassador. Since Rex Tillerson assumed the position of Secretary of State, there have been no daily press briefings where media can ask further questions in regard to read-outs on meetings. It has been radio silence at Foggy Bottom since Tillerson took over the State Department, but that is to change in coming days. It is unclear whether the resuming briefings will be on camera or in closed settings.

Tillerson is making his presence felt behind the scenes. He “has had 32 separate phone conversations with representatives of various countries, 15 in-person meetings with foreign interlocutors here in the United States, as well as calls and meetings with U.S. government personnel, showing a deep commitment to coordinating with the White House and other federal agencies and obtaining a diversity of perspectives on issues of public concern,” a spokesman said. The department also issues the occasional comment under Tillerson’s name, including congratulations to other countries on their national days. More here.

Russian Ambo Kislyak also Met with WH’s John Holdren

Who is this Russian ambassador anyway? It is likely no coincidence that the Russian spy ship is presently off the coast of Florida as this post is about to be published either. We are watching this vessel as they are watching us. Moving on…

Ambassador Sergey Kislyak is a long time English speaking operative from the Kremlin who is called back to Moscow at any moment’s notice to confer with the Russian intelligentsia. Meanwhile, Ambassador Kislyak has been cultivating a network in Washington DC for many years and he makes the social government scene with regularity. In fact, Kislyak often made visits to the Obama White House where most recently he met with the former czar and still Obama advisor, John Holdren.

Image result for sergey kislyak on the sofa bu.edu

The logs include which White House official hosted Kislyak each time he was cleared to visit. The hosts included are: Gary Samore, who was the senior National Security Council official on weapons of mass destruction during Obama’s first term (four visits); Robert Malley, who was Obama’s senior adviser on defeating the Islamic State (three visits); Lawrence Summers, who was Obama’s economic adviser (one visit); Michael Froman, Obama’s trade representative; Holdren (two visits); and the visitor’s office (four visits).

Kislyak was also listed in the logs an additional 12 times, but that was when there were between 180 and 3,000 other visitors also listed, such as for an event like a “holiday open house” or the “diplomatic corps reception.” More here.

***

Kislyak is an expert on arms control negotiations with a degree from the Moscow Engineering Physics Institute, Mr. Kislyak first served in the Washington embassy from 1985 to 1989 during the late Soviet period. He became the first Russian representative to NATO and was ambassador to Belgium from 1998 to 2003. He returned to Moscow, where he spent five years as a deputy foreign minister. He has told associates that he will leave Washington soon, likely to be replaced by a hard-line general. His name recently surfaced at the United Nations as a candidate for a new post responsible for counterterrorism, diplomats there said. Vitaly I. Churkin, the Russian ambassador to the United Nations, died last month and that post remains vacant. More here.

While we are in somewhat of a scandal due to several within the Trump team and later his administration as having meetings with Russian officials, there is quite a lot of hypocrisy in the matter as noted by the countless democrats who too have been in the frequent company of the ambassador. But to several wrongs go right when the republicans do the same? Actually, there should be more vetting and control along with messaging for the republicans as they are in full power of government. Why you ask?

Image result for sergey kislyak trump speech democrats

It is said that Sergey Kislyak is not just the ambassador of record, but he is also the top boss and manager of the Russian diplomatic architecture in the United States as well as the marshal of the intelligence wing and espionage operations across our homeland as well. It is questionable as to why he too was not expelled last December by Obama or perhaps that would have caused even more relational strain between the two countries. Kislyak was born in Ukraine and he declares he is not Ukrainian but rather a Russian. Could he have been quite busy with passing intelligence during the time Russia annexed Crimea and is presently continuing military aggressions against Ukraine? Yes. There is a war in Ukraine.

Image result for sergey kislyak

Most places in eastern Ukraine are still overwhelmed with Russian propaganda, which is as much of a threat to Ukraine’s overall war effort as the tanks and artillery. In some places, there is still not a single Ukrainian broadcast TV channel available—they’re all beamed in from Russia and the two separatist territories.

The diffuse Russian propaganda taps into attitudes leftover from the Soviet era, including deeply held, latent fears about fascism, and distrust for the central government in Kyiv. Conspiracy theories about the intentions of the U.S., NATO, and western Ukrainians are also pervasive. More here.

Some within the CIA say that Kislyak is both a diplomat and a spy. It is important to add the fact that diplomats have immunity and it is great cover when the FBI is tasked with tracking communications and movement. This is for sure the reason that Barack Obama did not expel him last December. Russia has issued a complete denial he is a spy. Uh huh…

He is in fact a hardliner but has any government official outside of CIA paid attention?

Kislyak: Why do we need to provide assurances to the U.S. Congress? We provide assurances to the Russian parliament. So if the United States is interested in working with us in nuclear energy cooperation, that is fine. It is for the United States to decide what it is that it wants. If it wants to cooperate with us, the doors [for cooperation] are open. If we are asked to make our actions, our policies, reportable to the [U.S.] Congress in order for the U.S. to make decisions on cooperating with us, we are not interested in that kind of scheme. We are fully in compliance with our obligations, with our commitments. We have not violated any agreement with the United States or anybody else. Our cooperation with Iran is limited in the nuclear field to Bushehr. By the way, your president has welcomed the way we cooperate on Bushehr because a scheme for the project that was developed with the Iranians that is very reliable and provides an alternative, a visible alternative, to the need to develop an indigenous enrichment capability. Because we build the reactor, we provide the fuel, and we take it back.[18] This is the best way to provide access to nuclear energy and electricity derived from nuclear energy. It was also supported by Europe.

When it comes to the defense supplies you seem to be referring to, there are no inconsistencies with our obligations or the resolutions of the Security Council, because we do show restraint, and whatever we do is purely defensive and for deterrence. It is our policy, and it is reportable the Russian parliament and Russian people and not anybody else. If the United States is interested in working with us [in the field of nuclear energy], we will be more than ready to work together, but it needs to be based on mutual respect and the mutual respect of interests. I think there are all sorts of reasons why we could and should cooperate in this field because both of us can do a lot in order to promote nuclear energy. That is something that most probably for the coming 20-30 years will be the alternative of choice to fossil fuel, and I do not know of any other [alternative] source of energy that can be employable in the foreseeable future but nuclear energy. All other renewable energies are either in scarce supply or the technology has yet to be developed to the point where it becomes competitive.

So we will see, all of us, significant development of nuclear energy in a lot of countries, in yours as well. We also embarked on an ambitious program to expand nuclear energy production. Currently we have, I think, 16 or 17 percent of electricity produced in my country from nuclear energy sources, and we will expand it to 25 [percent] within maybe 15 or more years. It is an ambitious program. We are going to make it. At the same time, we have a lot of things that are of interest to your industries.

You might be interested in [our]technologies, so we are very much mutually complementary. But unless we have a bigger [legal] framework for that, there can be no reliable interaction between our respective businesses. If the United States wants to work with us, we would be more than willing to do so.

There is another initiative by the two presidents, and that is to develop alternative sources of nuclear energy for the rest of the world that are less prone to proliferation. We are offering the multilateral enrichment center and your president has launched the idea of the GNEP [Global Nuclear Energy Partnership].[19]  

The full interview is here.