The Muslim Brotherhood, Then, Now and Hillary

Wonder if Hillary or Anne Patterson received and read the full Great Britain document on the investigation into the Muslim Brotherhood? The scrubbed UK investigation report is here.

Misguided diplomacy at the White House and the U.S. State department is mission objectives and investment over terror facts and names, of this there is no dispute.

 

Hillary Emails: State Discussed ‘Cooperating,’ ‘Increased Investment’ With Egypt’s Muslim Brotherhood Government

TEL AVIV – 1,500 pages of former Secretary of State Hillary Clinton’s emails provide insight into the level of support the U.S. was considering in 2012 for Egypt’s newly elected Muslim Brotherhood government.

Breitbart: On August 30, 2012, Robert D. Hormats, the under-secretary of state for economic affairs, wrote to Clinton’s then-Deputy Chief of Staff Jake Sullivan to update him on a meeting he held with .

Shater was later sentenced to life imprisonment and then to death for multiple alleged crimes, including inciting violence and financial improprieties.

The email reveals Hormats and other U.S. diplomats discussed  methods of cooperation with Shater, including an increase in American direct foreign investment.

Hormats wrote:

Anne Patterson, Bill Taylor, and I met with Muslim Brotherhood Deputy Supreme Guide Khairat al-Shater. He discussed broad principles of economic development based on 100 large infrastructure projects (over a billion dollars each) as part of Morsi’s Nadah (Renaissance Plan) Plan; ways of cooperating with the US to obtain support for these projects and for SMEs; and his hope for an IMF agreement and increased foreign direct investment from the US, the West, and the Arab world. He also noted that it was a priority for the GOE to build a true democratic system based on human rights and the rule of law.

Patterson, the U.S. Ambassador to Egypt at the time, was known for her repeated engagement with the Muslim Brotherhood. Taylor was the U.S. Special Coordinator for Middle East Transitions; that is, the U.S. envoy to the new leadership that emerged in the wake of the so-called Arab Spring.

Hormats’ meetings with the Muslim Brotherhood were not secret. But the emails reveal the scope of his discussions with the group about possible future investment.

In September 2012, the New York Timesreported that Hormats had led a delegation of businesses to Egypt to discuss possible private investment.

That same month, the State Department published a document that received little news media attention. It revealed that in August and September 2012, “Hormats visited Egypt to negotiate possible bilateral debt relief,”but the document did not provide further details.

After the toppling of Egypt’s longtime president Hosni Mubarak, the Muslim Brotherhood’s Muhammad Morsi served as president from June 30, 2012 to July 3, 2013, when he was removed from office amidst widespread protests and a military coup. After Mubarak was removed from office, the Obama administration pledged $1 billion in assistance to bolster Egypt’s transition to democracy.

Clinton and Secretary of Defense Leon Panetta each visited Cairo and met with Morsi during his tenure as president.

The meeting that Hormats describes in the email took place while the U.S. was negotiating an aid package to help relieve Egypt’s debt crisis amid concerns from U.S. lawmakers about funding the Muslim Brotherhood.

The email was sent a week and a half before protesters besieged the U.S. Embassy in Cairo on September 11, 2012, the same day the U.S. Special Mission in Benghazi came under attack.

Following the attacks, Obama stated of Morsi’s government, “I don’t think that we would consider them an ally, but we don’t consider them an enemy.”

***

Back in November of 2015, Senator Cruz was leading a charge in the Senate to list the Muslim Brotherhood as a terror organization. The Muslim Brotherhood is part of several proven terror organizations. Going back to 2014, Saudi Arabia joined the United Arab Emirates and Bahrain in withdrawing its ambassadors from Qatar, which it sees as an important supporter of the Muslim Brotherhood.

in 2014, Prime Minister David Cameron ordered an investigation into the Muslim Brotherhood as a terror organization and the results were conclusive they were, however due to internal pressure from Islamists all over Europe and especially the UK, Cameron pulled the report.

 

A Plane Titled Arsenal

Here’s what we know about the Pentagon’s new, secret warplane

BusinessInsider: There’s increasing chatter about a secret, potentially costly, Defense Department weapons program with an interesting moniker: the “Arsenal Plane.”

Defense Secretary Ash Carter mentioned the project earlier this month while describing the work of the Strategic Capabilities Office (SCO), a clandestine workshop established within the Pentagon in 2012 to develop the next generation of bleeding-edge weapons, ostensibly to counter China and Russia.

The new warplane effort “takes one of our oldest aircraft platform and turns it into a flying launch pad for all sorts of different conventional payloads,” Carter said during a Feb. 2 speech previewing the department’s then-pending fiscal 2017 budget request.

“In practice, the arsenal plane will function as a very large airborne magazine, networked to fifth generation aircraft that act as forward sensor and targeting nodes, essentially combining different systems already in our inventory to create holy new capabilities,” he said, referring to the F-35 Joint Strike Fighter.

The Pentagon chief mentioned the project again on Thursday when he testified before the House Appropriations Defense subpanel and ticked off a handful of technologies SCO is working on, including the Air Force’s budget-busting Long Range Strike Bomber (LRSB) program and “swarming 3-D printed micro-drones.”

But what’s known about the Arsenal Plane beyond that? Defense leaders aren’t giving up any specifics.

The concept is being developed “in partnership with DARPA. We will be supporting, and the idea is to look for additional ways to arm a particular aircraft so that it might be able to do different types of missions. More munitions and different types of munitions,” Air Force Secretary Deborah Lee James said during a Feb. 12 Air Force Association event.

But when asked what kind of legacy aircraft might be retrofitted to essentially turn it into an airborne aircraft carrier, James punted: “I think all of this is still being discussed. It’s still a program in development. Those decisions haven’t been reached yet.”

Air Force

The concept was originally introduced in the 1980s, when the military considered turning one of its existing bombers, or a commercial plane like the Boeing 747, into a launcher capable of carrying anywhere from 50 to 70 missiles. The idea was scrapped due to the envisioned platform’s lack of connectivity and precision weapons and the large platform’s inherent vulnerability to enemy attack aircraft.

However, the idea is getting a second-look in the wake of China’s aggressive behavior in the Asia-Pacific region, especially in the South China Sea where Beijing is reclaiming land in the disputed Spratly Islands and turning them into manmade outposts for some of it most advanced military hardware.

The Arsenal Plane is also “a response to the limits of the F-35,” according to Richard Aboulafia, Vice President of Analysis at the Teal Group. For all its traits, the plane “doesn’t hold a whole lot of ordnance.”

Indeed, an F-35 maxes out at around 18,000 pounds of ordnance, and that when munitions are loaded on the plane’s wings – a move that would compromise its stealth technology (and therefore the whole point of the aircraft itself).

That limited amount of weaponry could prove deadly in a dogfight.

“Obviously, in Asia, you’ve got the problem with Chinese numbers,” Aboulafia said, referring to China’s years-long push to modernize and expand all aspects of its military.

Ideally, the new aircraft would be loaded for bear with precision guided missiles so that a squadron of F-35s that might encounter a number of hostile jets could rely on the larger plane for assistance, or cue in targeting information to help it fight or bug out

Aboulafia said the concept is “worth investigating” because one of China’s highest military priorities has been to develop long range, heavy combat fighters — along the lines of its J-20 jet — that are stealthy and capable of taking out tankers or AWACS, an airborne early warning aircraft, which packs little to no firepower.

He said modern technology has largely solved the connectivity and precision issue from the ‘80s, but the size and vulnerability problem remains.

“These things … become missile magnets in a time of war,” he said.

The Pentagon may be moving forward, regardless. Inside Defense, a trade publication, speculates that the department’s 2017 budget request for $198 million in funding for advanced component development for an “Alternative Strike” program is actually for the Arsenal Plane.

The spending request is under the SCO umbrella and states the “project will demonstrate the feasibility and utility of launching existing/modified weapons from existing launch platforms,” the publication notes.

Provided the Air Force’s LRSB effort — expected to start replacing the service’s aging B-52 and B-1 bomber fleets in the 2020s – comes online according to plan, the Pentagon would have no shortage of platforms it could retrofit into a flying fortress instead of shipping off to the boneyard.

The new effort will no doubt be swarmed with questions about affordability, especially after a think-tank report released earlier this month warned of a coming “bow wave” in bills to the Air Force budget in the 2020s as the service looks to modernize.

But Aboulafia noted those costs are driven mostly by the F-35, the LRSB and the service’s new tanker programs.

“What might make this more affordable is an off-the-shelf platform … its cash footprint might be smaller,” he predicted.

This story was originally published by  The Fiscal Times.

It’s Friday, TWO Hillary Dumps

Townhall: The department on Friday posted 1,589 pages of Clinton’s emails on its website, bringing to 48,535 the number of pages released as part of its ongoing release of the former secretary’s correspondence. The last batch of the roughly 55,000 work-related emails Clinton turned over to the department is scheduled to be released on Monday in accordance with a court order.

In the latest release, portions of 88 documents were deemed to be classified at the “confidential” level, the lowest classification category. The department said none of those emails was marked classified at the time they were sent. More here.

#1   

State Dept. Hands 1,600 Documents From Hillary Clinton’s Office To Benghazi Committee

Alex Plitsas/Opinion: The U.S. State Department Friday afternoon turned over 1,600 pages of never before seen documentation from the Office of former Secretary of State Hillary Clinton regarding the Benghazi terrorist attacks to the House Select Committee on Benghazi.

Benghazi CommitteeVerified account @HouseBenghazi 2h2 hours ago

: Today the State Dept turned over more than 1,600 pages of new documents related to former Secretary Clinton and Libya.

Sources from the Select Committee say it first asked for these records related to Benghazi and Libya nearly a year ago, and is the first to receive them now — four months after the hearing with former Secretary Clinton. In a court filing in response to a FOIA suit filed by the watch dog group “Judicial Watch”, dated January 8, 2016, the State Department claimed it only recently, “located additional sources of documents that originated within the Office of the Secretary that are reasonably likely to contain records responsive to Plaintiff’s request.”

The State Department defines the “Office of the Secretary” as being “comprised of the Secretary’s Chief of Staff, the Counselor of the Department, Deputy Chief of Staff, the Secretary’s secretary, the Executive Assistant, two special assistants, the Secretary’s scheduler, staff assistant, and two personal assistants. This staff handles all of the day-to-day matters of the Secretary, including meetings at the Department, functions in Washington and throughout the country, and travel around the world.”

This latest revelation once again proves that the investigation into the terrorist attacks against the U.S. state Department Complex in Benghazi, Libya is not over and that Democrats who claim that the event has already been investigated in its entirety are just plain wrong. It also speaks to the professional and meticulous manner in which Rep. Gowdy has conducted this investigation and should give confidence to the American people that he will get to the bottom of what actually happened before, during, and after the terrorist attack in Benghazi – to include what role Hillary Clinton played in the Administration’s failures.

According to the Select Committee, the State Department has still not turned over other records it has been requesting for more than year. The fact that the Obama Administration has withheld these records until this time, and is still withholding more, is suspect given the timing of the U.S. presidential election. What else is the Obama administration hiding from the committee and the American people?

#2 

Feds release more Clinton emails on eve of South Carolina primary

TheHill: The State Department on Friday released 881 new emails from Hillary Clinton’s personal server, a day before Democrats in South Carolina head to the polls.

The new release brings the total number of classified emails on the former secretary of State’s machine up to more than 1,800. The vast majority of those classified emails were listed at the lowest level, that of “confidential,” but nearly two dozen were classified as “secret” and another 22 were deemed “top secret” — the highest level of classification.

Those top secret emails were deemed too dangerous to release to the public, even in a redacted form.

None of the 88 classified emails in Friday’s dump were classified at the time they were sent, a State Department official said.

Friday’s release is the second-to-last from the State Department, which has been laboring to make Clinton’s emails public since last May.

Under the terms of a court order earlier this month, the department will need to publish the very last of the roughly 35,000 supposedly work-related emails on Monday.

Federal officials planned to work through the weekend to reach that goal, State Department spokesman Mark Toner said earlier in the day.

“We’re still reviewing them – a lot of them, frankly,” Toner told reporters at the State Department. “Going to be working hard through the weekend.”

On Saturday, Clinton’s presidential campaign is hoping to cement its front-runner status with a strong showing in South Carolina, where polls show her with a significant lead over rival Sen. Bernie Sanders.

Sanders has repeatedly refused to attack Clinton over her emails, but Republicans have been less kind. Critics of Clinton allege that her unconventional use of a personal email account on a private server throughout her time in office posed a major threat to national security and skirted federal recordkeeping laws.

After Ukraine, DHS Warns Domestic Utility Companies

Feds advise utilities to pull plug on Internet after Ukraine attack

WashingtonExaminer: The Department of Homeland Security advised electric utilities Thursday that they may need to stop using the Internet altogether, after the agency found that a cyberattack that brought down Ukraine’s power grid in December could have been far more devastating than reported.

The Dec. 23 cyberattack forced U.S. regulators to place utilities on alert after unknown attackers caused thousands of Ukrainian residents to lose power for hours by installing malicious software, or malware, on utility computers. But the Department of Homeland Security said Thursday that the attack may have been directed at more than just the country’s electricity sector, suggesting the attackers were looking to cause more harm than was reported.

In response, federal investigators are recommending that U.S. utilities and other industries “take defensive measures.” To start with, they need to best practices “to minimize the risk from similar malicious cyber activity,” according to an investigative report issued Thursday by Homeland Security’s Industrial Control Systems Cyber Emergency Response Team.

But the team is also recommending more drastic action, such as keep control-system computers away from the Internet.

“Organizations should isolate [industrial control system] networks from any untrusted networks, especially the Internet,” the report says. “All unused ports should be locked down and all unused services turned off. If a defined business requirement or control function exists, only allow real-time connectivity to external networks. If one-way communication can accomplish a task, use optical separation.”

The findings show that the power outages were caused by three attacks using cyberintrusion software to attack electric power distribution companies, affecting about 225,000 customers. It also reveals that once power was restored, the utilities continued “to run under constrained operations,” implying that the damage to grid control systems was profound.

The team also learned that “three other organizations, some from other critical infrastructure sectors, were also intruded upon but did not experience operational impacts.” That suggests the attackers were going after more than just the power grid, and may have been planning a much more economy-wide attack. The team does not disclose what other sectors of the country were targeted.

The team said the attack was well-planned, “probably following extensive reconnaissance of the victim networks,” the report says. “According to company personnel, the cyberattacks at each company occurred within 30 minutes of each other and impacted multiple central and regional facilities.”

The attackers were attempting to make the damage permanent. The report says the attackers installed “KillDisk” malware onto company computers that would erase data necessary to reboot operations after a cyberattack.

There is also a mystery to the attackers’ actions.

“Each company also reported that they had been infected with BlackEnergy malware; however, we do not know whether the malware played a role in the cyberattacks,” the report says. The malware was delivered using an email embedded hacking technique known as “spear phishing” that contained a number of malicious Microsoft Office attachments.

“It is suspected that BlackEnergy may have been used as an initial access vector to acquire legitimate credentials; however, this information is still being evaluated,” the team says.

The investigation was done with Ukraine authorities and involved the FBI, Department of Energy and the North American Electric Reliability Corporation.

*** 

New research is shining a light on the ongoing evolution of the BlackEnergy malware, which has been spotted recently targeting government institutions in the Ukraine.

Security researchers at ESET and F-Secure each have dived into the malware’s evolution. BlackEnergy was first identified several years ago. Originally a DDoS Trojan, it has since morphed into “a sophisticated piece of malware with a modular architecture, making it a suitable tool for sending spam and for online bank fraud,” blogged ESET’s Robert Lipovsky.

“The targeted attacks recently discovered are proof that the Trojan is still alive and kicking in 2014,” wrote Lipovsky, a malware researcher at ESET.

ESET has nicknamed the BlackEnergy modifications first spotted at the beginning of the year ‘BlackEnergyLite’ due to the lack of a kernel-mode driver component. It also featured less support for plug-ins and a lighter overall footprint.

“The omission of the kernel mode driver may appear as a step back in terms of malware complexity: however it is a growing trend in the malware landscape nowadays,” he blogged. “The threats that were among the highest-ranked malware in terms of technical sophistication (e.g., rootkits and bootkits, such as Rustock, Olmarik/TDL4, Rovnix, and others) a few years back are no longer as common.”

The malware variants ESET has tracked in 2014 – both of BlackEnergy and of BlackEnergy Lite – have been used in targeted attacks. This was underscored by the presence of plugins meant for network discovery, remote code execution and data collection, Lipovsky noted.

“We have observed over a hundred individual victims of these campaigns during our monitoring of the botnets,” he blogged. “Approximately half of these victims are situated in Ukraine and half in Poland, and include a number of state organizations, various businesses, as well as targets which we were unable to identify. The spreading campaigns that we have observed have used either technical infection methods through exploitation of software vulnerabilities, social engineering through spear-phishing emails and decoy documents, or a combination of both.”

In a whitepaper, researchers at F-Secure noted that in the summer of 2014, the firm saw samples of BlackEnergy targeting Ukrainian government organizations for the purposes of stealing information. These samples were nicknamed BlackEnergy 3 by F-Secure and identified as the work of a group the company refers to as “Quedagh.” According to F-Secure, the group is suspected to have been involved in cyber-attacks launched against Georgia during that country’s conflict with Russia in 2008.

“The Quedagh-related customizations to the BlackEnergy malware include support for proxy servers and use of techniques to bypass User Account Control and driver signing features in 64-bit Windows systems,” according to the F-Secure whitepaper. “While monitoring BlackEnergy samples, we also uncovered a new variant used by this group. We named this new variant BlackEnergy 3.”

Only Quedagh is believed to be using BlackEnergy 3, and it is not available for sale on the open market, noted Sean Sullivan, security advisor at F-Secure.

“The name [of the group] is based on a ship taken by Captain Kidd, an infamous privateer,” he said. “It is our working theory that the group has previous crimeware experience. Its goals appear to be political but they operate like a crimeware gang. There have been several cases this year of which BlackEnergy is the latest. The trend is one of off-the-shelf malware being used in an APT [advanced persistent threat] kind of way. The tech isn’t currently worthy of being called APT, but its evolving and scaling in that direction.”

Within a month of Windows 8.1’s release, the group added support for 64-bit systems. They also used a technique to bypass the driver-signing requirement on 64-bit Windows systems.

In the case of BlackEnergy 3, the malware will only attempt to infect a system if the current user is a member of the local administration group. If not, it will re-launch itself as Administrator on Vista. This will trigger a User Account Control (UAC) prompt. However, on Windows 7 and later, the malware will look to bypass the default UAC settings.  

“The use of BlackEnergy for a politically-oriented attack is an intriguing convergence of criminal activity and espionage,” F-Secure notes in the paper. “As the kit is being used by multiple groups, it provides a greater measure of plausible deniability than is afforded by a custom-made piece of code.”

In 2014 from the Department of Interior and DHS:

Summary: Investigation of NPS-GCNP SCADA SYSTEM

Report Date: August 7, 2014

OIG investigated allegations that the Supervisory Control and Data Acquisition (SCADA) system at Grand Canyon National Park (Park) may be obsolete and prone to failure. In addition, it was alleged only one Park employee controlled the system, increasing the potential for the system to fail or become unusable.

The SCADA system is a private utilities network that monitors and controls critical infrastructure elements at the Park. Failure of the system could pose a health and safety risk to millions of Park visitors. Due to potential risks that system failure posed, we consulted with the U.S. Department of Homeland Security Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) and asked that they assess the overall architecture and cybersecurity of the Park’s SCADA system.

ICS-CERT conducted an onsite review and issued a report outlining the weaknesses it found at the Park’s SCADA system, including obsolete hardware and software, inadequate system documentation and policies, insufficient logging and data retention. We provided a copy of ICS-CERT’s assessment report to the National Park Service for review and action.

 

 

Putin Dials the Hit Squad for This

Nemtsov March Organizer Severely Beaten

By RFE/RL’s Russian Service: An organizer of an upcoming march to commemorate slain Kremlin critic Boris Nemtsov has been severely beaten in Russia’s Urals city of Chelyabinsk.

A member of the opposition PARNAS party, Aleksei Tabalov, wrote on his blog that Vyacheslav Kislitsyn was attacked by unknown men in Chelyabinsk on February 26.

According to Tabalov, Kislitsyn was hospitalized with numerous wounds, a broken rib, and heart problems.

Tabalov quoted Kislitsyn as saying that city police officers were among the attackers.

Tabalov says the attack was connected to the planned march to commemorate Nemtsov on February 27.

Nemtsov, a former deputy prime minister and vocal critic of President Vladimir Putin, was shot dead near the Kremlin on February 27 last year.

****

Others on the Putin list? Likely….

Russian Oppositionist Leonid Gozman To Putin: ‘Mr. President, You Must Resign!’

MEMRI: On February 15, 2016, Russian oppositionist politician Leonid Gozman, president of the neoliberal movement Union of Right Forces, published an open letter[1] calling upon Russian President Vladimir Putin to resign, saying that this is the only way to save Russia. In his letter, Gozman blames Putin for the deterioration of Russia’s economic, political and security situation, and for the country’s isolation. He states further that, due to the regime’s repressive policies and the rise in corruption, old fears have resurfaced and Russians once again feel the need to hide their opinions. He reminds Putin that dictatorial regimes tend to fail and that Russia’s last Tsar, Nicolai II, was quite popular in his day but this did not keep him from being assassinated.

The following are excerpts from Gozman’s open letter

“You Turned Russia Into A Bogeyman In The Eyes Of The Entire World”

“Your Excellency, Mr. President, you have been the leader of our country for the past 16 years. Evidently, the balance of successes versus failures has recently been moving in a negative direction. No matter what your propaganda is trying to hide, people are beginning to sense what is really going on.

“The quality of life in Russia is going downhill, our situation in the social sphere is deteriorating, real incomes are plummeting. You have not freed the country from its dependence on oil and, judging by your own declarations, you have no master plan for getting Russia out of this crisis.

“You promised victory over the terrorists, yet terrorist acts continue to occur. Under your leadership, these [terrorist] acts have already claimed more than three thousand lives, and, in most cases, the masterminds behind them have not been apprehended. In the Northern Caucasus [i.e., Chechen Republic], a criminal enclave has been created, which effectively functions independently of Russia yet nevertheless uses our resources. In addition to all this, you began a fratricidal war in Ukraine and then launched a war in Syria.

“You have turned Russia into a bogeyman in the eyes of the entire world. Your highly-publicized turning to the East has yielded no results, we are at loggerheads with our neighbors and have run out of allies in general. Sanctions and counter-sanctions, and the arms race provoked by your policies, weigh heavy on our economy. Tens of millions of people are being forced to pay the price of your not always solidly-founded geopolitical declarations.

“Social morale has plummeted to unprecedented depths. During the years of your leadership, deception, unjust trials and corruption have blossomed. Many people are convinced that your closest friends and officials are corrupt and that you yourself are often guilty of corruption. Everyone is increasingly talking about high-ranking officials having connections with criminal elements.[2] Against this backdrop, hypocrisy has reemerged in our lives and an old fear has resurfaced: people are now afraid to express what they think…”

“You Have Exhausted Your Potential”

“One should not delude oneself with high [support] ratings; these ratings reflect a state of collapse and a lack of any real alternative. They were drummed up artificially and they will naturally drop once the resources that feed them dry up.

“[Tsar] Nicholas II’s popularity in August 1914 [at the start of World War I] was probably greater than yours is today. People would kneel in his presence and would kiss the hem of his jacket. However, two and a half years later, exactly 99 years ago, the monarchy was toppled. Less than a year later, the Tsar was assassinated and the country was plunged into chaos for decades.

“Mr. President, the system you created is not the first authoritarian regime in history to find itself in a situation of economic, moral and political crisis. Such regimes usually end in catastrophe. However, there are examples of authoritarian [regimes] that at least ended peacefully and without bloodshed. Unlike many of your opponents, I believe that you do care about the fate of Russia. You still have a chance – though it is diminishing with each passing day – to save Russia.

“Your Excellency, you must step down. You have exhausted your potential. The longer you remain in the Kremlin, the likelier it is that events will culminate in a dreadful scenario…

“Of course, after your departure, hard times may [still] await us… It’s not as if without you, everything will suddenly be rosy. But with you, things will only get worse (and neither you nor anyone else can change this).

“Your Excellency, Mr. President, you must resign! You must resign, and the sooner the better. This is the best thing you can do for Russia.”

Endnotes:

[1] The letter was published in Gozman’s blog on the website of the independent radio station Echo of Moscow (Echo.msk.ru, February 15, 2016).

[2] The author is referring to the Anti-Corruption Foundation’s investigation into links between Prosecutor General Yuri Chaika’s family and Russian criminal elements (Chaika.navalny.com, December 1, 2015).