Clapper’s Briefing on Chemical Weapons, History

Mustard gas ‘used in Iraq’ in August

The Hague (AFP) – Mustard gas was used in two attacks in Iraq near the Kurdish capital of Arbil in August last year, sources close to the world’s chemical watchdog said on Monday.

 

“The results of some sampling have confirmed the use of mustard gas,” one source said, asking to remain anonymous.

The news comes amid an investigation by the Iraqi government into the 2015 attacks aided by the Organisation for the Prohibition of Chemical Weapons (OPCW), based in The Hague.

It is also only days after US officials said IS jihadist fighters had the capability to make small quantities of chlorine and mustard gas and had used it in war-torn Syria and Iraq.

Iraqi Kurd authorities last year said two attacks were carried out by Islamic State group fighters on August 11 on the frontline towns of Gweyr and Makhmur southwest of Arbil, during which around 50 mortar rounds were launched.

The peshmerga ministry said “37 of the rounds released a white dust and black liquid when they exploded. Thirty-five peshmerga fighters were exposed and some were taken for treatment”.

“The results of the tests on blood samples… reveal traces of mustard gas,” the ministry said at the time, but the origin of the suspected gas was unclear.

OPCW spokesman Malik Ellahi confirmed the watchdog had sent a team of experts to help Iraq in its investigation into possible chemical weapons.

“The team completed its mission and the OPCW has shared the results of its technical work with the government of Iraq,” Ellahi said in a statement.

“The complete findings and conclusions can be expected to be issued by the government of Iraq together with the OPCW inputs,” he said, declining to give further details.

Diplomatic sources told AFP the report was a survey conducted by Baghdad with the OPCW’s help.

“The report is still a work in progress,” the source told AFP, stressing it would be “logical” for the OPCW to publish it — but it may well also be released by Baghdad.

“It is not the OPCW’s role” to point fingers as to which side used the weapon, the source stressed.

US national intelligence director James Clapper last week told a congressional committee that the IS group have used toxic chemicals in Iraq and Syria, including sulphur mustard.

Clapper said it was the first time an extremist group had produced and used a chemical warfare agent in an attack since Japan’s Aum Supreme Truth cult carried out a deadly sarin attack during rush hour in the Tokyo subway in 1995.

– Deadly chemical weapon –

In January the OPCW announced the complete destruction of neighbouring Syria’s declared chemical weapons arsenal.

But the use of chemical weapons in the deadly nearly five-year conflict continues.

In November the OPCW confirmed with “utmost confidence” that mustard gas was used in Syria in August during fighting between rebels and jihadists and “likely” killed a child.

Mustard gas has been dubbed Yperite because it was first used near the Belgian city of Ypres in July 1917 by the German army.

An oily yellow almost liquid-like substance that smells like garlic or mustard, the gas causes the skin to break out in painful blisters, irritates eyes and causes eyelids to swell up, temporarily blinding its victims.

Classified as a Category 1 substance, which means it is seldom used outside of chemical warfare, mustard gas was banned by the UN in 1993.
 Translation in the text below the video.

It is believed however that the regime of former Iraqi dictator Saddam Hussein unleashed mustard gas against the Iraqi Kurds in Halabja attack in 1988.

IS fighters launched a lightning offensive in Iraq in 2014, allowing it to take control of swathes of territory north of Baghdad and in the Kurdistan region.

 

President’s Day, Was George Washington a Spy?

The Spymaster’s Toolkit

CIA: Long before General William Donovan recruited spies to advance the American war efforts during World War II as Director of the Office of Strategic Services (OSS), predecessor to the CIA, General George Washington mastered the art of intelligence as Commander of the Continental Army during the Revolutionary War.

Washington was a skilled manager of intelligence. He utilized agents behind enemy lines, recruited both Tory and Patriot sources, interrogated travelers for intelligence information, and launched scores of agents on both intelligence and counterintelligence missions. He was adept at deception operations and tradecraft and was a skilled propagandist. He also practiced sound operational security. Washington fully understood the value of accurate intelligence, employing many of the same techniques later used by the OSS and CIA.

As we celebrate the 284th birthday of the first American President, we highlight some of the tradecraft employed to secure our independence from the British and offer insights on its use today. Were it not for the use of secret writing, concealment devises, propaganda, and intercepted communications, there may have been a very different outcome to the War of Independence.

* * * * *

SECRET WRITING

Revolutionary War: American agents serving abroad composed their intelligence reports using invisible ink. George Washington believed this would “not only render his communications less exposed to detection, but relieve the fears of such persons as may be entrusted in its conveyance.”

Communicating via invisible ink required the use of several chemical compositions. One mixture was used to write with disappearing ink, the other mixture was applied to the report to make it legible. Despite their invisible communications, it is estimated that the British intercepted and decrypted over half of America’s secret correspondence during the war.

CIA: The CIA has declassified several documents that provided recipes for making invisible ink. One recipe instructs: “Take a weak solution of starch, tinged with a little tincture of iodine. This bluish writing will soon fade away.” A mixture for exposing secret writing included “iodate of potassium, 5 grams, with 100 grams of water, and 2 grams of tartaric acid added” but warned, “run a hot iron over the surface being careful not to scorch the paper.”

During the Cold War, a major advancement in secret writing technology was the shift from liquid invisible inks to dry systems. The KGB was one of the first foreign intelligence services to employ a dry method. The CIA’s Office of Technical Services in the Directorate of Science and Technology spent considerable time researching Soviet systems and finally succeeded not only in “breaking” them, but in anticipating where its KGB counterpart would go next in the never-ending search for more secure systems. By the end of the Cold War, a kind of tacit convergence had emerged as both sides applied new techniques that used very small, almost undetectable quantities of chemical in secret writing messages. In the words of one CIA chemist, it was like “uniformly spreading a spoonful of sugar over an acre of land.”

CONCEALMENT DEVISES

Revolutionary War: Agents used a variety of modified objects to conceal their secret messages.  One device was a wafer-thin lead container that would sink in water, or melt in fire, thus destroying its contents. The device was small enough that an agent could swallow it if no other means of discarding were available. This was done as a last resort as ingestion was typically followed by a severe bout of lead poisoning. The lead container was eventually replaced by a silver, bullet-shaped container that could be unscrewed to hold a message and which would not poison a courier who might be forced to swallow it.

CIA:  A concealment devise can be any object used to clandestinely hide things. They are typically ordinary, every-day objects that have been hollowed out. The best concealment devises are ones that blend in with their surroundings and call no attention to themselves. They can be used to hide messages, documents, or film. Some examples of concealment devises include hollowed out coins, dead-drop spikes, shaving brushes, and makeup compacts.

PROPAGANDA

Revolutionary War: During the American Revolution, the British had a shortage of soldiers so they hired almost 30,000 German Hessian auxiliary forces to fight against the Americans. The Continental Congress devised a propaganda campaign to encourage the Hessian mercenaries to defect to America. The campaign included offering land grants to those mercenaries fighting for the British on American soil. The offers were written in German on leaflets disguised as tobacco packets. A mock-defector ran through the mercenaries’ camps encouraging others to defect as well. As part of the campaign, Benjamin Franklin forged a letter to the commander of the Hessians, “signed” by a German prince. The letter instructed the commander to let the wounded mercenaries die. This dealt a blow to the morale of the Hessians. Between 5,000 and 6,000 Hessian mercenaries deserted from the British, in part because of American propaganda.

CIA: Propaganda campaigns use communication to alter a population’s beliefs and views thus influencing their behavior. There are three types of propaganda: white, black, and grey. White propaganda openly identifies the source and uses gentle persuasion and public relations techniques to achieve a desired outcome. For example, during the Persian Gulf War, the CIA airdropped leaflets before some Allied bombing runs to allow civilians time to evacuate and encourage military units to surrender. Black propaganda, on the other hand, is misinformation that identifies itself with one side of a conflict, but is truly produced by the opposing side – like Franklin sending the letter “from” a German prince. Grey propaganda is the most mysterious of all because the source of the propaganda is never identified.

INTERCEPTED COMMUNICATIONS

Revolutionary War: The Continental Congress regularly received quantities of intercepted British mail. General Washington proposed to “contrive a means of opening them without breaking the seals, take copies of the contents, and then let them go on. By these means we should become masters of the whole plot.”

CIA: Clandestinely opening, reading and resealing envelopes or packages without the recipient’s knowledge requires practice. ‘Flaps and seals’ opening kits were used in the 1960s. A beginner’s kit offered the basic tools for surreptitious opening of letters and packages. Once mastered, an advanced kit with additional tools was used. Many of the tools were handmade of ivory and housed in a travel roll.

* * * * *

Washington employed the use of many other intelligence gathering techniques still in use today to secure our independence and freedom from Great Britain. Not only is he The Father of His Country, but he is heralded as a great spymaster. Upon the conclusion of the Revolutionary War, a defeated British intelligence officer is quoted as saying, “Washington did not really outfight the British. He simply out-spied us.”

The Next Border Fence

Apparently, they do work and have some significant value, in Europe that is. With the constant flow of migrants, several major problems have literally cracked the security of countries.  Further, there are no signs that migrants flowing into Europe will wane or stop at all, so the true costs in 2016 or beyond. The immigration flood in Europe is a clarion call to the United States as the issues are virtually the same. Not only is the United States taking in Middle Eastern refugees, but we have been taking in Cubans, Mexicans, as well as Central and South Americans. For America is goes much further that a trifecta and costs and security.

Anti-migrant force builds in Europe, hurting Merkel’s quest

WARSAW, Poland (AP) — So where should the next impenetrable razor-wire border fence in Europe be built?

Hungary’s right-wing Prime Minister Viktor Orban thinks he knows the best place – on Macedonia’s and Bulgaria’s borders with Greece – smack along the main immigration route from the Middle East to Western Europe. He says it’s necessary because “Greece can’t defend Europe from the south” against the large numbers of Muslim refugees pouring in, mainly from Syria and Iraq.

The plan is especially controversial because it effectively means eliminating Greece from the Schengen zone, Europe’s 26-nation passport-free travel region that is considered one of the European Union’s most cherished achievements.

Orban’s plan will feature prominently Monday at a meeting in Prague of leaders from four nations in an informal gathering known as the Visegrad group: Hungary, Poland, the Czech Republic and Slovakia. The Visegrad group, formed 25 years ago to further the nations’ European integration, is marking that anniversary Monday. Still, it has only recently found a common purpose in its unified opposition to accepting any significant number of migrants.

This determination has emboldened the group, one of the new mini-blocs emerging lately in Europe due to the continent’s chaotic, inadequate response to its largest migration crisis since World War II. The Visegrad group is also becoming a force that threatens the plans of German Chancellor Angela Merkel, who wants to resettle newcomers across the continent while also slowing down the influx.

“The plan to build a new “European defense line” along the border of Bulgaria and Macedonia with Greece is a major foreign policy initiative for the Visegrad Four and an attempt to re-establish itself as a notable political force within the EU,” said Vit Dostal, an analyst with the Association for International Affairs, a Prague based think tank.

At Monday’s meeting, leaders from the four nations will be joined by Macedonian President Gjorge Ivanov and Bulgarian Prime Minister Boiko Borisov so they can push for the reinforcements along Greece’s northern border. Macedonia began putting up a first fence in November, and is now constructing a second, parallel, fence.

“If it were up only to us Central Europeans, that region would have been closed off long ago,” Orban said at a press conference recently with Poland’s prime minister. “Not for the first time in history we see that Europe is defenseless from the south … that is where we must ensure the safety of the continent.”

Poland has indicated a willingness to send dozens of police to Macedonia to secure the border, something to be decided at Monday’s meeting.

“If the EU is not active, the Visegrad Four have to be,” Slovak Prime Minister Robert Fico said recently. “We have to find effective ways of protecting the border.”

The leaders will try to hash out a unified position ahead of an important EU meeting Thursday and Friday in Brussels that will take up both migration and Britain’s efforts to renegotiate a looser union with the EU. The Visegrad countries have also recently united against British attempts to limit the welfare rights of European workers, something that would affect the hundreds of thousands of their citizens who now live and work in Britain.

The anti-migrant message resonates with the ex-communist EU member states, countries that have benefited greatly from EU subsidies and freedom of movement for their own citizens but which now balk at requests to accept even small numbers of refugees. The Visegrad nations maintain it is impossible to integrate Muslims into their societies, often describing them as security threats. So far the Poles, Czechs and Slovaks have only accepted small numbers, primarily Christians from Syria.

Many officials in the West are frustrated with what they see as xenophobia and hypocrisy, given that huge numbers of Poles, Hungarians and other Eastern Europeans have received refuge and economic opportunity in the West for decades.

Indeed there are plenty of signs that the countries are squandering a lot of the good will that they once enjoyed in the West for their sacrifices in throwing off communism and establishing democracies.

Orban’s ambitions for Europe got a big boost with the rise to power last year in Poland of the right-wing Law and Justice party, which is deeply anti-migrant and sees greater regional cooperation as one of its foreign policy priorities. Polish Prime Minister Beata Szydlo’s government says it wants to do more to help Syrian refugees at camps in Turkey and elsewhere while blocking their entry into Europe.

Although Orban is alienating Greek authorities, who are staggering under the sheer numbers of asylum-seekers crossing the sea from Turkey in smugglers’ boars, he insists he must act as a counterweight to Western leaders, whom he accuses of creating the crisis with their welcoming attitude to refugees.

“The very serious phenomenon endangering the security of everyday life which we call migration did not break into Western Europe violently,” he said. “The doors were opened. And what is more, in certain periods, they deliberately invited and even transported these people into Western Europe without control, filtering or security screening.”

Dariusz Kalan, an analyst at the Polish Institute of International Affairs, said he doesn’t believe that the Visegrad group on its own can destroy European unity but says Orban’s vision is winning adherents across the continent in far-right movements and even among mainstream political parties.

“It’s hard to ignore Orban,” Kalan said. “People in Western Europe are starting to adopt the language of Orban. None are equally tough and yet the language is still quite similar.”

U.S. nor Saudi +20 Can Stop Putin’s Bombing

As Obama is in California playing golf, the White House says he took time to have a phone call with Putin on Syria and Ukraine. Not even Obama, heh…..seems to be able to convince Putin to stop bombing U.S. allies in Syria.

   Russian airstrikes in areas around Aleppo.

Turkey to Extend Strikes on Kurdish Fighters in Syria

VoA: Turkey says it will continue to target U.S.-allied Kurdish fighters on the Syrian frontier near its border, despite mounting international pressure on the Ankara government to stop the artillery bombardments.

Turkish Prime Minister Ahmet Davutoğlu, in telephone talks Sunday, told German Chancellor Angela Merkel that Turkish forces will “not permit” the Kurdish People’s Protection Units fighters (YPG), of the Democratic Union Party (PYD) “to carry out aggressive acts.”

Both France and the United States have called for an “immediate halt” to the Turkish bombardments.

According to Turkish official,s Davutoğlu spoke this weekend with U.S. Vice President Joe Biden concerning Turkish anger about YPG military encroachments in northern Syria, adding that Biden had said he would pass the Turkish Prime Minister’s remarks on to the “relevant parties.”

U.S. officials say there is little to be done to counter militarily the Russian-backed Assad offensive and they argue the vicious five-year-long Syrian civil war that has left upwards of 250,000 dead won’t be resolved by the clash of arms but through a negotiated political settlement. Full story here.

****

RIYADH: Troops from around 20 countries were gathering in northern Saudi Arabia Sunday for “the most important” military maneuver ever staged in the region, the official news agency SPA reported.

The “Thunder of the North” exercise involving ground, air, and naval forces sends a “clear message” that Saudi Arabia and its allies “stand united in confronting all challenges and preserving peace and stability in the region,” SPA said.

Saudi Arabia is currently leading a military campaign against Iran-backed rebels in its southern neighbor Yemen. Last December, it also formed a new 35-member coalition to fight “terrorism” in Islamic countries.

Sunday’s announcement also comes as the kingdom, a member of the US-led coalition targeting the jihadist Daesh group, said it has deployed warplanes to a Turkish air base in order to “intensify” its operations against Daesh in Syria.

SPA did not specify when the military exercise will begin or how long it will last.

However, the agency called it the “most important and largest in the region’s history” in terms of the number of nations taking part and the weaponry being used.

Twenty countries will be taking take part, SPA said.

Among them are Saudi Arabia’s five partners in the Gulf Cooperation Council, as well as Chad, Egypt, Jordan, Malaysia, Morocco, Pakistan, Senegal and Tunisia, it added.

A Saudi source said on Thursday that members of the new “anti-terrorism” coalition will gather in Saudi Arabia next month for its first publicly announced meeting.

Riyadh has said the alliance would share intelligence, combat violent ideology and deploy troops if necessary.

****

I24: Amid ongoing tension on Israel’s northern borders, a new threat has emerged for Israeli fighter pilots conducting spying missions in Lebanon, Walla reports.

Using radar technology it has acquired since Russia’s entry into the Syrian civil war, Hezbollah has started using sophisticated radars to “lock on” to Israeli spy jets on reconnaissance flights over its northern neighbor.

The new technology can identify all Israeli fighter jets, according to sources within Israel’s security establishment. By locking on to the jets as targets, Walla says, Hezbollah can then fire missiles at them.

Nonetheless, the sophistication of Israel’s fighter fleet means they are equipped to deal with such threats, which enables them to detect and follow radars that threaten to lock onto them ahead of launching missiles.

In such an event, pilots can change their plane’s route, especially when they are simply on an intelligence-gathering mission.

Israeli security officials believe Hezbollah has acquired the technology through its ties with Russia, forged as a result of their mutual fight against Islamic State in Syria, Walla reported.

“The connection between Hezbollah, Russia and Syria have greatly changed the rules of the game in the region,” a security official was quoted as saying in Walla.

“Hezbollah is indicating to Israel that it is ready for the next stage.”

During the last all-out war between Israel and Hezbollah in 2006, the Shi’ite militant group hit just one Israeli fighter jet using an anti-tank missile, but while the aircraft was grounded. In the wake of the war, Hezbollah began acquiring advanced anti-aircraft weapons from Iran and Syria, Walla says.

The Israel Air Force has on several occasions attacked weapons convoys making their way from Syria to Lebanon over the last few years, according to foreign media reports.

In January, The Daily Beast reported that the Russians are supplying Hezbollah with sophisticated weaponry, including precision ground-to-ground missiles,  long-range tactical missiles, laser guided rockets, and anti-tank weapons.

The Hezbollah militants who told The Daily Beast about the arms transfers said that the group, the Assad regime and Iran have a “relationship of complete coordination” and that Hezbollah is receiving the arms “with no strings attached.”

“We are strategic allies in the Middle East right now—the Russians are our allies and give us weapons,” one of the Hezbollah officers in charge of five units in Syria told The Daily Beast.

It was not a Hardware Issue, it was a Cyber Intrusion, IRS

IRS Confirms It Was a Victim of an Automated Attack

The attack, which occurred in January, targeted the electronic filing PIN application form on the IRS.gov Website. Experts said there are lessons to be learned.

eWeek: The U.S. Internal Revenue Service (IRS) is gearing up for another busy tax season, and it appears that hackers are getting ready, too. On Feb. 9, the IRS confirmed that it was the victim of an automated attack in January that targeted the electronic filing PIN application form on the IRS.gov Website.According to the IRS, attackers made use of personal information, including Social Security numbers, that was stolen from other non-IRS Websites. The attackers then used that information in an attempt to generate fraudulent E-File PIN numbers on IRS.gov. With a PIN number, an attacker could have potentially been able to file a tax return or gain access to other taxpayer information.The IRS investigation has found that 464,000 unique Social Security numbers (SSNs) were used in the attack, with 101,000 being successfully able to access the E-File PIN. The IRS is emphasizing that it has halted the attack and is contacting those who are affected.”No personal taxpayer data was compromised or disclosed by IRS systems,” the agency stated. “The IRS also is taking immediate steps to notify affected taxpayers by mail that their personal information was used in an attempt to access the IRS application.”

In May 2015, the IRS reported that its Get Transcript service was attacked. Get Transcript enables users to get information about their tax account transactions. As is the case with the new attack against the E-File PIN, the Get Transcript service attack involved user information that was stolen from third-party sites. The success rate for the Get Transcript attackers, however, was higher than it was for the E-File PIN attackers, where 100,000 out of 200,000 hack attempts were successful.

Security experts contacted by eWEEK are not surprised that the IRS is once again reporting an attack against its systems. The fact that the IRS.gov site was attacked with SSNs stolen from other third-party sites is, however, somewhat ironic.”One of the most successful ways hackers steal citizens’ Social Security numbers is through fraudulent phishing emails or phone calls that appear to be from the IRS,” Darren Guccione, CEO and co-founder of Keeper Security, told eWEEK.

Hackers know the public is terrified of being identity-theft victims and exploit this fear well, often by telling someone they’ve been a victim already and asking for their Social Security number, Guccione noted.Lance James, chief scientist at Flashpoint, commented that one of the big concerns he sees with the latest IRS attack is the continued reliance on Social Security numbers. “We need to rethink what a Social Security number means these days when it comes to accessing data,” James told eWEEK. “It should not be the administrator password for a person’s life.”Andy Hayter, security evangelist at G DATA Software, also commented on the risks associated with SSN disclosure. Every bit of an individual’s personally identifiable information that is collected via a breach is one more piece of information that can, and someday will, be used against a person, he said.
“As long as information such as Social Security numbers is used as identification, we will have bad actors trying to collect as much information about individuals to do harm, either through theft or worse,” Hayter told eWEEK.Inga Goddijn, executive vice president at Risk Based Security, noted that taxpayers should be concerned that questionable security practices at organizations completely unrelated to the IRS have the potential of affecting their tax returns.

Though the IRS has stated that no personal taxpayer data was compromised or disclosed in the new attack, JP Bourget, CEO of Syncurity, noted that there is still a real risk.”While maybe the IRS can in the end prevent any bad outcomes for taxpayers, I can imagine a few scenarios where a bad guy attempts to file a tax return for a refund that then holds up a valid refund to someone who is owed a refund, and even depending on that refund,” Bourget told eWEEK. “There’s also the angle of now your account is flagged and the uncertainty of how that affects a taxpayer over time and what hidden costs may arise from that.”One potentially positive outcome that could result from the IRS attack is that lessons learned could help prevent the next attack. Goddijn said that it would be helpful if the IRS can share more detail as to how the agency detected the attack and ideas for preventing these types of enumeration attacks in the future. She added that the U.S. government has been pushing for more threat intelligence sharing and improved security practices for all organizations.”Why not take this opportunity to lead the charge and share more about the attack with the security community,” Goddijn said. “That may help stop the next, similar assault on a high-value target.”

In 2015:

USAToday: Criminals hacked into an Internal Revenue Service website and gained access to approximately 100,000 tax accounts, the agency said Tuesday. Another 100,000 attempts were made but were not successful.

The attack appears to have first begun in February, the agency said.

The hackers got in by taking information about taxpayers they’d acquired from other sources and using it to correctly answer several personal identity verification questions in the IRS’ “Get Transcript” application, the IRS said in a statement.

This allowed them to get information about tax accounts through the application. The information stolen included Social Security information, date of birth and street address.

The Get Transcript application allows users to view their tax account transactions, line-by-line tax return information or wage and income reported to the IRS for a specific tax year. It was used to securely retrieve approximately 23 million taxpayer transcripts last year, the IRS said.

The information the hackers used to get in was probably previously stolen by other hackers who then sold it on the open market, said Rob Roy, chief technology officer of HP Enterprise Security Products.

The hackers who bought it “appear to have hired an army of people to submit over 200,000 queries into the IRS site over a period of four months. Not exactly a quick and easy operation,” he said.

“The matter is under review by the Treasury Inspector General for Tax Administration as well as the IRS’ Criminal Investigation unit, and the ‘Get Transcript’ application has been shut down temporarily,” the IRS said.

The agency will provide free credit monitoring services for the approximately 100,000 taxpayers whose accounts were accessed.

The theft was discovered late last week when IRS staff noticed unusual activity on the application. Further investigation showed that attempts were made beginning in February.

The breach does not involve the main IRS computer system that handles tax filing submissions. “That system remains secure,” the IRS said.

“The IRS historically has been very security, it has to be by virtue of the data it collects. But it just goes to show that even the most secure system can be attacked,” said Larry Ponemon of the Ponemon Institute, a data security research group.