Selected Israeli Intelligence Items Revealed on Iran Talks

The deal is just too dangerous, even some Democrats are expressing that dynamic.
On Nov. 26, 2013, three days after the signing of the interim agreement (JPOA) between the powers and Iran, the Iranian delegation returned home to report to their government. According to information obtained by Israeli intelligence, there was a sense of great satisfaction in Tehran then over the agreement and confidence that ultimately Iran would be able to persuade the West to accede to a final deal favorable to Iran. That final deal, signed in Vienna last week, seems to justify that confidence. The intelligence—a swath of which I was given access to in the past month—reveals that the Iranian delegates told their superiors, including one from the office of the Supreme Leader Ayatollah Khamenei, that “our most significant achievement” in the negotiations was America’s consent to the continued enrichment of uranium on Iranian territory.

That makes sense. The West’s recognition of Iran’s right to perform the full nuclear fuel cycle—or enrichment of uranium—was a complete about-face from America’s declared position prior to and during the talks. Senior U.S. and European officials who visited Israel immediately after the negotiations with Iran began in mid 2013 declared, according to the protocols of these meetings, that because of Iran’s repeated violations of the Nuclear Non-Proliferation Treaty, “Our aim is that in the final agreement [with Iran] there will be no enrichment at all” on Iranian territory. Later on, in a speech at the Saban Forum in December 2013, President Barack Obama reiterated that in view of Iran’s behavior, the United States did not acknowledge that Iran had any right to enrich fissile material on its soil.

In February 2014, the first crumbling of this commitment was evident, when the head of the U.S. delegation to the talks with Iran, Wendy Sherman, told Israeli officials that while the United States would like Iran to stop enriching uranium altogether, this was “not a realistic” expectation. Iranian foreign ministry officials, during meetings the Tehran following the JPOA, reckoned that from the moment the principle of an Iranian right to enrich uranium was established, it would serve as the basis for the final agreement. And indeed, the final agreement, signed earlier this month, confirmed that assessment.

The sources who granted me access to the information collected by Israel about the Iran talks stressed that it was not obtained through espionage against the United States. It comes, they said, through Israeli spying on Iran, or routine contacts between Israeli officials and representatives of the P5+1 in the talks. The sources showed me only what they wanted me to see, and in these cases there’s always a danger of fraud and fabrication. This said, these sources have proved reliable in the past, and based on my experience with this type of material it appears to be quite credible. No less important, what emerges from the classified material obtained by Israel in the course of the negotiations is largely corroborated by details that have become public since.

In early 2013, the material indicates, Israel learned from its intelligence sources in Iran that the United States held a secret dialogue with senior Iranian representatives in Muscat, Oman. Only toward the end of these talks, in which the Americans persuaded Iran to enter into diplomatic negotiations regarding its nuclear program, did Israel receive an official report about them from the U.S. government. Shortly afterward, the CIA and NSA drastically curtailed its cooperation with Israel on operations aimed at disrupting the Iranian nuclear project, operations that had racked up significant successes over the past decade.

On Nov. 8, 2013, Secretary of State John Kerry visited Israel. Israeli Prime Minister Benjamin Netanyahu saw him off at Ben Gurion Airport and told him that Israel had received intelligence that indicated the United States was ready to sign “a very bad deal” and that the West’s representatives were gradually retreating from the same lines in the sand that they had drawn themselves.

Perusal of the material Netanyahu was basing himself on, and more that has come in since that angry exchange on the tarmac, makes two conclusions fairly clear: The Western delegates gave up on almost every one of the critical issues they had themselves resolved not to give in on, and also that they had distinctly promised Israel they would not do so.

One of the promises made to Israel was that Iran would not be permitted to stockpile uranium. Later it was said that only a small amount would be left in Iran and that anything in excess of that amount would be transferred to Russia for processing that would render it unusable for military purposes. In the final agreement, Iran was permitted to keep 300kgs of enriched uranium; the conversion process would take place in an Iranian plant (nicknamed “The Junk Factory” by Israel intelligence). Iran would also be responsible for processing or selling the huge amount of enriched uranium that is has stockpiled up until today, some 8 tons.

The case of the secret enrichment facility at Qom (known in Israel as the Fordo Facility) is another example of concessions to Iran. The facility was erected in blatant violation of the Non Proliferation Treaty, and P5+1 delegates solemnly promised Israel at a series of meetings in late 2013 that it was to be dismantled and its contents destroyed. In the final agreement, the Iranians were allowed to leave 1,044 centrifuges in place (there are 3,000 now) and to engage in research and in enrichment of radioisotopes.

At the main enrichment facility at Natanz (or Kashan, the name used by the Mossad in its reports) the Iranians are to continue operating 5,060 centrifuges of the 19,000 there at present. Early in the negotiations, the Western representatives demanded that the remaining centrifuges be destroyed. Later on they retreated from this demand, and now the Iranians have had to commit only to mothball them. This way, they will be able to reinstall them at very short notice.

Israeli intelligence points to two plants in Iran’s military industry that are currently engaged in the development of two new types of centrifuge: the Teba and Tesa plants, which are working on the IR6 and the IR8 respectively. The new centrifuges will allow the Iranians to set up smaller enrichment facilities that are much more difficult to detect and that shorten the break-out time to a bomb if and when they decide to dump the agreement.

The Iranians see continued work on advanced centrifuges as very important. On the other hand they doubt their ability to do so covertly, without risking exposure and being accused of breaching the agreement. Thus, Iran’s delegates were instructed to insist on this point. President Obama said at the Saban Forum that Iran has no need for advanced centrifuges and his representatives promised Israel several times that further R&D on them would not be permitted. In the final agreement Iran is permitted to continue developing the advanced centrifuges, albeit with certain restrictions which experts of the Israeli Atomic Energy Committee believe to have only marginal efficacy.

As for the break-out time for the bomb, at the outset of the negotiations, the Western delegates decided that it would be “at least a number of years.” Under the final agreement this has been cut down to one year according to the Americans, and even less than that according to Israeli nuclear experts.

As the signing of the agreement drew nearer, sets of discussions took place in Iran, following which its delegates were instructed to insist on not revealing how far the country had advanced on the military aspects of its nuclear project. Over the past 15 years, a great deal of material has been amassed by the International Atomic Energy Agency—some filed by its own inspectors and some submitted by intelligence agencies—about Iran’s secret effort to develop the military aspects of its nuclear program (which the Iranians call by the codenames PHRC, AMAD, and SPND). The IAEA divides this activity into 12 different areas (metallurgy, timers, fuses, neutron source, hydrodynamic testing, warhead adaptation for the Shihab 3 missile, high explosives, and others) all of which deal with the R&D work that must be done in order to be able to convert enriched material into an actual atom bomb.

The IAEA demanded concrete answers to a number of questions regarding Iran’s activities in these spheres. The agency also asked Iran to allow it to interview 15 Iranian scientists, a list headed by Prof. Mohsen Fakhrizadeh, whom Mossad nicknamed “The Brain” behind the military nuclear program. This list has become shorter because six of the 15 have died as a result of assassinations that the Iranians attribute to Israel, but access to the other nine has not been given. Neither have the IAEA’s inspectors been allowed to visit the facilities where the suspected activities take place. The West originally insisted on these points, only to retreat and leave them unsolved in the agreement.

 

In mid-2015 a new idea was brought up in one of the discussions in Tehran: Iran would agree not to import missiles as long as its own development and production is not limited. This idea is reflected in the final agreement as well, in which Iran is allowed to develop and produce missiles, the means of delivery for nuclear weapons. The longer the negotiations went on, the longer the list of concession made by the United States to Iran kept growing, including the right to leave the heavy water reactor and the heavy water plant at Arak in place and accepting Iran’s refusal of access to the suspect site.

It is possible to argue about the manner in which Netanyahu chose to conduct the dispute about the nuclear agreement with Iran, by clashing head-on and bluntly with the American president. That said, the intelligence material that he was relying on gives rise to fairly unambiguous conclusions: that the Western delegates crossed all of the red lines that they drew themselves and conceded most of what was termed critical at the outset; and that the Iranians have achieved almost all of their goals.

 

IRGC’s Penetrator Bomb Evidence Killed Americans, Iran Hearing

Hoorah for Senator Tom Cotton vs. Secretary of State John Kerry at hearing dated July 29, 2015.

NYT ~ August 2007: Attacks on American-led forces using a lethal type of roadside bomb said to be supplied by Iran reached a new high in July, according to the American military.

The devices, known as explosively formed penetrators, were used to carry out 99 attacks last month and accounted for a third of the combat deaths suffered by the American-led forces, according to American military officials.

“July was an all-time high,” Lt. Gen. Raymond T. Odierno, the No. 2 commander in Iraq, said in an interview, referring to strikes with such devices.

Such bombs, which fire a semi-molten copper slug that can penetrate the armor on a Humvee and are among the deadliest weapons used against American forces, are used almost exclusively by Shiite militants. American intelligence officials have presented evidence that the weapons come from the Islamic Revolutionary Guard Corps in Iran, although Tehran has repeatedly denied providing lethal assistance to Iraqi groups.

Iran killed Americans yet waved off by the White House and the P5+1 for the sake of the Iran deal.

CTC: In June 2011, 14 U.S. soldiers were killed by hostile fire, representing the largest monthly toll for U.S. forces since June 2008. Twelve of those fatalities were attributed to three extremist Shi`a groups: Asaib Ahl al-Haq (AAH), Kataib Hizb Allah (KH), and the Promised Day Brigades (PDB). All three organizations are directly tied to the IRGC Qods Force, led under the direction of the enigmatic Brigadier General Qasem Soleimani. Their attacks and operations are “reflective of Iranian training,” said a U.S. military official under condition of anonymity. “Not amateurs, they’re professional.”

Rocket and mortar attacks on the International Zone and U.S. bases in central and southern Iraq are a frequent occurrence. This year, there were 162 attacks targeting U.S. forces in April, up from 128 in March, and 93 in February. Aside from the frequency of attacks, a concerning trend is that Shi`a militants trained by Iran have now learned how to effectively employ an improvised rocket-assisted mortar (IRAM), which has been responsible for many of the recent U.S. fatalities. “IRAMs are devastating,” said a U.S. military official. “They’re getting more sophisticated, more lethal, and more precise in targeting.”

 Travels 6000′ per second

Among the three Shi`a groups, KH has demonstrated to be the most advanced and sophisticated. “They’re much more experienced,” asserted the same military official. “It’s a learning process. They have better facilities, more money and backing, more experienced fighters, and better recruiting.”  On June 6, 2011, KH carried out multiple IRAM attacks on Camp Loyalty in eastern Baghdad that led to the deaths of five U.S. soldiers, the most in a single incident since April 2009.

Another major trend is the noticeable increase of attacks involving a roadside bomb known as an explosively-formed penetrator (EFP), a signature weapon used by Iranian-backed Shi`a insurgents. Of the types of roadside bombs used, EFPs represent a small fraction, but are one of the deadliest weapons in Iraq because of its ability to penetrate even the strongest armored vehicles used by the U.S. military.  Most recently, on July 7, 2011, two U.S. soldiers were killed by an EFP-attack just outside Camp Victory near Baghdad International Airport. In the past, one or two EFPs would be used in a single attack; some of the recent attacks, however, have involved as many as 14 EFPs.

The frequency and type of operations by Iranian-sponsored Shi`a insurgents has demonstrated their higher level of confidence and freedom of movement in Baghdad and southern Iraq. This is partially the result of the elevated political influence of the Sadrist Trend in key southern provinces since the March 2010 parliamentary elections. Occupying 40 seats out of the 325-seat Council of Representatives, the Shi`a cleric Moqtada al-Sadr holds more representation in parliament than any individual party in Iraq. His political weight is heavily considered by al-Maliki, as the latter retained the premiership after finally securing al-Sadr’s support during last year’s government formation crisis. The Sadrist Trend has continuously threatened to take drastic measures, including armed resistance against U.S. personnel, in an effort to deter Iraqi politicians from accepting an extended U.S. presence. They have utilized high-profile visits by senior U.S. officials to their advantage by intensifying Iraqi nationalism on the street.

The U.S. military asserts that members of the Iranian Qods Force are entering Iraq and working to re-arm their surrogate Shi`a groups. According to Major General Jeffrey Buchanan, the top U.S. military spokesman in Iraq, the volume of weapons crossing into Iraq from Iran is considered the highest in years.  In the last six months, the Iraqi Security Forces (ISF) have uncovered a higher quantity of weapons caches throughout the country, including EFP materiel, roadside bombs, and rockets, some with manufacturing dates as recent as 2010. One discovered stockpile contained 49 prepared EFPs.

A significant amount of the weapons and materiel is believed to be entering Iraq through legal “ports of entry,” including during religious pilgrimages. Others include decades-old smuggling routes that cross into Maysan Province, where the city of Amara serves as a distribution point. In late June 2011, after receiving pressure from the United States, the ISF carried out operations in southern Iraq to confront the Shi`a groups and disrupt their smuggling routes and networks.[17] The operation, however, was diluted in robustness and scope, and was largely superficial in results. Only low-profile Shi`a insurgents were arrested, while operations were suspended as Iraqi forces were diverted toward protecting Shi`a religious pilgrims traveling to Karbala.

The Iraqis had not met the expectations of the U.S. military, which desired simultaneous operations to occur in multiple provinces. “Without multiple locations, you lose a lot of surprise,” said a U.S. military official, “and the bad guys will walk across the border.”[18] The U.S. military cited a lack of both will and capability on the part of Baghdad to confront the Shi`a groups. According to a senior Iraqi military official, however, the decision to diminish the operation was political: “There are some targets, known targets. We have not been allowed to go after them.”

Other Terrifying Facts on Affects of Immigration

 

Guardian: A group of eight illegal immigrant sex offenders, including at least one pedophile, have been arrested in the Rio Grande Valley, border officers have said.

The men, who come from Mexico, El Salvador, and Honduras had all previously been convicted of crimes including sex abuse, indecent assault and two counts of lewd behaviour with a child.

In a separate incident, four suspected illegal immigrants were discovered being taken across the border inside a black pickup truck and trailer, with two men locked inside a water butt.

A dog unit alerted police to the men’s presence inside the Dodge truck on July 25, and a quick search revealed two men hiding behind the back seats, and another two inside the trailer.

The truck and trailer have now been seized by the border patrol, and the men have been referred to the Rio Grande Valley Sector Prosecutions Office, a police press release said.

On the same day, border agents from the McAllen, Rio Grande City, and Kingsville forces arrested the eight sex offenders.

Four were from Mexico, two from El Salvador and another two were from Hoduras, agents said.

All eight had convictions for sex offences, including lewd and lascivious acts with a child under 14, sexual assault, fondling a child, and sexual abuse in the first degree.

Acting chief patrol agent Raul L. Ortiz said: ‘Thanks to the efforts of our Border Patrol agents, these convicted sex offenders no longer pose a threat to local communities.’

On the same day, another 11 suspected illegal immigrants were also detained, including two men found locked inside a water butt in a trailer (pictured)

On the same day, another 11 suspected illegal immigrants were also detained, including two men found locked inside a water butt in a trailer (pictured)

Later on Saturday officers arrested another seven suspected illegal immigrants at a known stash house along a river near Escobares, Texas.

Officers set out at 6am, following a singposted trail to the house, where the men were discovered hiding inside, a press released said.

The immigrants, six Mexicans and one Salvadoran, were all taken into custody, while the owner of the property was also arrested and was found to be carrying drugs.

The arrests come during heightened tensions over the U.S. – Mexico border following inflammatory remarks by Republican presidential hopeful Donald Trump.

In a blistering speech launching his campaign, he attacked lax controls along the border, suggesting that Mexico was sending ‘rapists and killers’ into America.

Trump has since caused further controversy by retweeting a message accusing rival Jeb Bush of having a ‘soft spot’ for ‘Mexican illegals’ because of his wife. Bush’s wife Columba is a legal US citizen, but was born in Mexico. 

 

Inquisitor: An illegal immigrant charged with attempted murder in Ohio was set free earlier this month after the U.S. Border Patrol declined to take him into custody.

Authorities indicate that more felony charges against the man may be forthcoming.

Lake County sheriff’s deputies pulled over the suspect, who allegedly admitted to officers that he was in the U.S. illegally, on July 7, but upon being notified, federal immigration agents wouldn’t pick him up.

“The Lake County Sheriff’s deputies could not hold [the suspect] because he was not charged with any crime,” NewsNet5, the ABC News Cleveland affiliate, reported.

The man is now being held in connection with the ongoing investigation into the murder of a local woman and other crimes after being apprehended in a manhunt conducted by Lake County SWAT officers and other neighboring law enforcement agencies.

An irate judge (see footage of the initial court hearing embedded below) set bond at $10 million, and the suspect who entered a plea of not guilty is due back in court on August 3.

Multiple news outlets identify the suspect as Juan Emmanuel Razo, 35. As it emerge in the court hearing, he apparently has no driver’s license, passport, green card, or other documentation that would definitely establish his identity, however.

n illegal immigrant charged with attempted murder in Ohio was set free earlier this month after the U.S. Border Patrol declined to take him into custody.

Authorities indicate that more felony charges against the man may be forthcoming.

Lake County sheriff’s deputies pulled over the suspect, who allegedly admitted to officers that he was in the U.S. illegally, on July 7, but upon being notified, federal immigration agents wouldn’t pick him up.

“The Lake County Sheriff’s deputies could not hold [the suspect] because he was not charged with any crime,” NewsNet5, the ABC News Cleveland affiliate, reported.

The man is now being held in connection with the ongoing investigation into the murder of a local woman and other crimes after being apprehended in a manhunt conducted by Lake County SWAT officers and other neighboring law enforcement agencies.

An irate judge (see footage of the initial court hearing embedded below) set bond at $10 million, and the suspect who entered a plea of not guilty is due back in court on August 3.

Multiple news outlets identify the suspect as Juan Emmanuel Razo, 35. As it emerge in the court hearing, he apparently has no driver’s license, passport, green card, or other documentation that would definitely establish his identity, however.

Illegal Immigrants Outnumber Unemployed Americans

11.3 million illegal immigrants in U.S.
FreeBeacon:The number of illegal immigrants in the United States totaled 11.3 million in 2014, outnumbering the 9.6 million Americans who were unemployed in the same year, according to data from Pew Research Center and the Bureau of Labor Statistics (BLS).“An estimated 11.3 million unauthorized immigrants lived in the U.S. in 2014,” says a Pew report. “The new unauthorized immigrant total includes people who cross the border illegally as well as those who arrive with legal visas and remain in the U.S. after their visas expire.”Of those 11.3 illegal immigrants, 8.1 million are participating in the labor force. “Unauthorized immigrants make up 5.1% of the U.S. labor force,” Pew says. “In the U.S. labor force, there were 8.1 million unauthorized immigrants either working or looking for work in 2012.”

In 2014, there were 1.7 million more illegal immigrants living in the United States than there were unemployed Americans. According to the BLS, the average number of unemployed Americans in 2014 was 9.6 million. The BLS defines an unemployed individual as someone who did not have a job but actively sought one in the past four weeks.

The executive action on immigration President Obama put in place in November of 2014 is set to help more illegal aliens become active in the labor force.

“Last year, President Barack Obama took executive action to expand an existing program and establish a new one that would offer work permits and deportation relief to an estimated 5 million unauthorized immigrants,” according to Pew. “The actions—which are on hold because of a lawsuit by 26 states—would be open to unauthorized immigrants who were brought to the U.S. illegally as children, who are parents with a child who is a U.S. citizen or legal permanent resident, as long as they meet certain requirements.”

Obama Orders Financial Incentives

President Obama’s new immigrant amnesty provisions will incentivize businesses to hire illegal immigrants over native U.S. citizens – to the tune of $3000 per employee, congressional aides recently confirmed, according to The Washington Times.

Under the temporary amnesty, which will last for three years, five million illegal immigrants will be allowed to stay in the country legally for three years without threat of deportation. These immigrants will also be eligible for work permits, but will not be allowed certain public benefits such as access to Obamacare insurance.

This means that businesses who hire the undocumented immigrants will not be penalized for failing to provide health care coverage, reported The Washington Times. On the other hand, if the business hired a native-born worker and chose not to provide health coverage, the business could, by law, be fined a $3,000 penalty.

Businesses with more than 50 employees who refuse to provide insurance coverage to full-time workers are assessed a penalty for every employee who receives subsidies under Obamacare. But the five million undocumented immigrants are not allowed to sign up for Obamacare or receive subsidies, so businesses are not penalized, explains The Washington Times.

The loophole was criticized for seemingly placing illegal immigrants  ahead of American citizens in the job market.

“If it is true that the president’s actions give employers a $3,000 incentive to hire those who came here illegally, he has added insult to injury,” Republican Rep. Lamar Smith said. “The president’s actions would have just moved those who came here illegally to the front of the line, ahead of unemployed and underemployed Americans.”

Obama continues to maintain a positive outlook on his decision, saying Tuesday that “Immigrants are good for the economy.”

“We keep on hearing that they’re bad, but a report by my Council of Econmic Advisers put out last week shows how the actions we’re taking will grow our economy for everybody,” he said.

The China Hack of United Airlines, Electronic Insurgency

Warning corporations, industry and government entities is one thing, action and protection and or declaration of a cyber war is yet another.

July 2015:

Aspen Institute: Cyber warfare is one of the most potent security threats the United States faces, National Security Agency Director and Commander of the US Cyber Command General Keith Alexander told the crowd at the Aspen Security Forum in Aspen, discussing in conversation with NBC News Correspondent Pete Williams the nature of the threat and how his department is working to address it.
With the Stuxnet, Duqu, and Flame viruses in the fore of the public consciousness, Alexander took pains to point out that nation-states were not the only potential cyber actors. Citing power and water grids as his chief concerns, he said, “Somebody who finds vulnerability in our infrastructure could cause tremendous problems. They could erase the Input/output of a system so it can’t boot, and would have to be replaced. And these capabilities are not only nation-state-only capabilities.”

Alexander assessed the US’ readiness to confront such an attack as a three on a scale of ten, calling lack of adequately trained cyber defense forces the critical impediment to greater preparedness. “Our issue isn’t [having the tools] to address the threat,” he said. “It’s having the capacity, and building and training cyber forces. We have a big requirement, and a small force that is growing steadily.”

China-Tied Hackers That Hit U.S. Said to Breach United Airlines

Bloomberg:

The hackers who stole data on tens of millions of U.S. insurance holders and government employees in recent months breached another big target at around the same time — United Airlines.

United, the world’s second-largest airline, detected an incursion into its computer systems in May or early June, said several people familiar with the probe. According to three of these people, investigators working with the carrier have linked the attack to a group of China-backed hackers they say are behind several other large heists — including the theft of security-clearance records from the U.S. Office of Personnel Management and medical data from health insurer Anthem Inc.

The previously unreported United breach raises the possibility that the hackers now have data on the movements of millions of Americans, adding airlines to a growing list of strategic U.S. industries and institutions that have been compromised. Among the cache of data stolen from United are manifests — which include information on flights’ passengers, origins and destinations — according to one person familiar with the carrier’s investigation.

 

It’s increasingly clear, security experts say, that China’s intelligence apparatus is amassing a vast database. Files stolen from the federal personnel office by this one China-based group could allow the hackers to identify Americans who work in defense and intelligence, including those on the payrolls of contractors. U.S. officials believe the group has links to the Chinese government, people familiar with the matter have said.

That data could be cross-referenced with stolen medical and financial records, revealing possible avenues for blackmailing or recruiting people who have security clearances. In all, the China-backed team has hacked at least 10 companies and organizations, which include other travel providers and health insurers, says security firm FireEye Inc.

Tracking Travelers

The theft of airline records potentially offers another layer of information that would allow China to chart the travel patterns of specific government or military officials.

United is one of the biggest contractors with the U.S. government among the airlines, making it a rich depository of data on the travel of American officials, military personnel and contractors. The hackers could match international flights by Chinese officials or industrialists with trips taken by U.S. personnel to the same cities at the same time, said James Lewis, a senior fellow in cybersecurity at the Center for Strategic and International Studies in Washington.

“You’re suspicious of some guy; you happen to notice that he flew to Papua New Guinea on June 23 and now you can see that the Americans have flown there on June 22 or 23,” Lewis said. “If you’re China, you’re looking for those things that will give you a better picture of what the other side is up to.”

Computer Glitches

The timing of the United breach also raises questions about whether it’s linked to computer faults that stranded thousands of the airline’s passengers in two incidents over the past couple of months. Two additional people close to the probe, who like the others asked not to be identified when discussing the investigation, say the carrier has found no connection between the hack and a July 8 systems failure that halted flights for two hours. They didn’t rule out a possible, tangential connection to an outage on June 2.

Luke Punzenberger, a spokesman for Chicago-based United, a unit of United Continental Holdings Inc., declined to comment on the breach investigation.

Zhu Haiquan, a spokesman for the Chinese embassy in Washington, said in a statement: “The Chinese government and the personnel in its institutions never engage in any form of cyberattack. We firmly oppose and combat any forms of cyberattacks.”

Embedded Names

United may have gotten help identifying the breach from U.S. investigators working on the OPM hack. The China-backed hackers that cybersecurity experts have linked to that attack have embedded the name of targets in web domains, phishing e-mails and other attack infrastructure, according to one of the people familiar with the investigation.

In May, the OPM investigators began drawing up a list of possible victims in the private sector and provided the companies with digital signatures that would indicate their systems had been breached. United Airlines was on that list.

Safety Concerns

In contrast to the theft of health records or financial data, the breach of airlines raises concerns of schedule disruptions or transportation gridlock. Mistakes by hackers or defenders could bring down sensitive systems that control the movement of millions of passengers annually in the U.S. and internationally.

Even if their main goal was data theft, state-sponsored hackers might seek to preserve access to airline computers for later use in more disruptive attacks, according to security experts. One of the chief tasks of the investigators in the United breach is ensuring that the hackers have no hidden backdoors that could be used to re-enter the carrier’s computer systems later, one of the people familiar with the probe said.

United spokesman Punzenberger said the company remains “vigilant in protecting against unauthorized access” and is focused on protecting its customers’ personal information.

There is evidence the hackers were in the carrier’s network for months. One web domain apparently set up for the attack — UNITED-AIRLINES.NET — was established in April 2014. The domain was registered by a James Rhodes, who provided an address in American Samoa.

James Rhodes is also the alias of the character War Machine in Marvel Comics’ Iron Man. Security companies tracking the OPM hackers say they often use Marvel comic book references as a way to “sign” their attack.

Targeting Pentagon

This isn’t the first time such an attack has been documented. Chinese military hackers have repeatedly targeted the U.S. Transportation Command, the Pentagon agency that coordinates defense logistics and travel.

A report last year from the Senate Armed Services Committee documented at least 50 successful hacks of the command’s contractors from June 2012 through May 2013. Hacks against the agency’s contractors have led to the theft of flight plans, shipping routes and other data from organizations working with the military, according to the report.

“The Chinese have been trying to get flight information from the government; now it looks as if they’re trying to do the same in the commercial sector,” said Tony Lawrence, a former Army sergeant and founder and chief executive officer of VOR Technology, a Columbia, Maryland-based cybersecurity firm.

It’s unclear whether United is considering notifying customers that data may have been compromised. Punzenberger said United “would abide by notification requirements if a situation warranted” it.

The airline is still trying to determine exactly which data was removed from the network, said two of the people familiar with the probe. That assessment took months in the OPM case, which was discovered in April and made public in June.

M&A Strategy

Besides passenger lists and other flight-related data, the hackers may also have taken information related to United’s mergers and acquisitions strategy, one of the people familiar with the investigation said.

Flight manifests usually contain the names and birthdates of passengers, but even if those files were taken, experts say that would be unlikely to trigger disclosure requirements in any of the 47 states with breach-notification laws.

Those disclosure laws are widely seen as outdated. The theft by hackers of corporate secrets usually goes unreported, while the stealing of customer records such as Social Security numbers and credit cards is required in most states.

“In most states, this is not going to trigger a notification,” said Srini Subramanian, state government leader for Deloitte cyber risk services.

Clinton Campaign Punting on Missing Benghazi Abedin Emails?

Check that Lincoln bedroom….no one knows anything, perhaps Sidney Blumenthal is still available or Sandy Berger hid them in some vault posthumously.

There is some inside the DC beltway conspiracy when it comes to official government business emails. They all seem to go missing.

The Missing Hillary Emails No One Can Explain

Daily Beast: There is a two-month gap in Hillary Clinton’s emails that coincides with violence in Libya and the employment status of a top Clinton aide, Huma Abedin.
Among the approximately 2,000 emails that former Secretary of State Hillary Clinton has released from her private account, there is a conspicuous two-month gap. There are no emails between Clinton and her State Department staff during May and June 2012, a period of escalating violence in Libya leading up to the September 11 attack on the U.S. consulate in Benghazi that left four Americans dead.

A State Department spokesman told The Daily Beast that for the year 2012, only those emails related to the security of the consulate or to the U.S. diplomatic presence in Libya were made public and turned over to a House committee investigating the fatal Benghazi assault. But if that’s true, then neither Clinton nor her staff communicated via email about the escalating dangers in Libya. There were three attacks during that two-month period, including one that targeted the consulate.

That two-month period also coincides with a senior Clinton aide obtaining a special exemption that allowed her to work both as a staff member to the secretary and in a private capacity for Clinton and her husband’s foundation. The Associated Press has sued to obtain emails from Clinton’s account about the aide, Huma Abedin.

The status of Clinton’s emails has become an explosive political issue ever since The New York Times revealed that the then-Secretary of State was using a private email server to handle her official correspondence. Cybersecurity experts believe the homebrew system opened Clinton and her colleagues to targeting from online spies. The State Department and Intelligence Community Inspector Generals have asked the Justice Department to look into possible disclosure of classified information.

Regarding the security situation in Libya, there was plenty for Clinton and her team to discuss via email. On May 22, 2012, the International Red Cross’s Benghazi office was hit by rocket-propelled grenades.

“The attack on the International Red Cross was another attack that also involved us and threats to the compound there in Benghazi,” testified Lieutenant Colonel Andrew Wood, a senior State Department security chief in Libya (PDF) before the House Oversight Committee in October 2012.

Then, on June 6, an improvised explosive device detonated outside of the U.S. consulate, ripping a 12-foot-wide hole in the compound’s wall and prompting officials to release a public warning on “the fluid security situation in Libya.”

Yet the State Department has not produced any emails to or from Clinton about the improvised bomb.

Republicans on the House committee investigating the Benghazi attack have called the absence of any email communication noting the explosive attack at the U.S. consulate “inexplicable.”

“There are gaps of months and months and months,” Republican Representative Trey Gowdy, chairman of the Select Committee on Benghazi, said in a March 8 interview.

“The State Department transferred 300 messages exclusively reviewed and released by her [Clinton’s] own lawyers,” Gowdy added in a May 22 statement noting gaps in the email records. “To assume a self-selected public record is complete, when no one with a duty or responsibility to the public had the ability to take part in the selection, requires a leap in logic no impartial reviewer should be required to make and strains credibility.”

Since then, the Benghazi committee has recovered one email, largely about business interests in Libya, from June 2012 after subpoenaing Clinton confidant Sidney Blumenthal. The email from Blumenthal does not mention threats to the U.S. consulate, and there is no response from Clinton. The State Department subsequently gave the committee its copy.

U.S. interests weren’t the only ones being targeted in Benghazi. Five days after the improvised bomb damaged the consulate, an RPG hit a convoy carrying the British ambassador in Benghazi, wounding two bodyguards.

The United Kingdom and the Red Cross closed their facilities in Benghazi by the end of June 2012.

From there, the violence directed at the U.S. escalated. In a cable dated July 9, 2012, U.S. Ambassador Chris Stevens asked that the State Department provide a minimum of 13 security personnel for the U.S. embassy in Tripoli and the consulate in Benghazi, noting a heightened security threat. The State Department did not fulfill Stevens’s request, a Senate Intelligence Committee report (PDF) later revealed.

A Clinton aide didn’t respond specifically to a request about the two-month email absence. But in a statement to reporters, Clinton spokesperson Nick Merrill noted, “More emails are slated to be released by the State Department next week, and we hope that release is as inclusive as possible.”

The two-month period wasn’t notable only for violence in Libya, and it has been the subject of questions about Clinton’s email and State Department records for a different reason.

On June 3, Abedin, a longtime Clinton aide and personal friend of the Clinton family, was given the status of a “special government employee,” which allowed her to stay on the State Department payroll while simultaneously working for the Clinton Foundation, Teneo, a consulting firm founded by Clinton confidant Doug Band, and as a private adviser to Clinton regarding her post-State Department transition.

Conflict-of-interest laws ordinarily would prohibit that arrangement, but the special designation exempted Abedin from some ethics rules.

In 2013, the AP filed a Freedom of Information Act request for State Department records on how Abedin obtained the special employee status. The news organization asked for emails about the matter.

Last week, a federal judge gave the State Department one week to respond to the AP’s two-year-old request. At midnight Tuesday, just before the judge’s deadline, the department’s lawyers submitted a declaration identifying about 68 pages of “potentially responsive” documents.

That marked the first time that the department acknowledged, in its two-year dispute with the AP, the existence of any agency documents related to Abedin’s arrangement.

Michael Smallberg, an investigator at the Project on Government Oversight, told The Daily Beast that while special government employees are not uncommon, the lack of information about Abedin may be keeping alive questions about potential conflict of interest in her work for the secretary and the foundation’s fundraising.

“Unless you come across any evidence to the contrary, there’s no reason to believe she was abusing the special government position,” Smallberg said. But, “the State Department has allowed those concerns to fester by withholding basic information,” Smallberg added. “Even if she did nothing wrong, secrecy breeds mistrust.”

State Department lawyers have argued that once all of Clinton’s emails are released on the agency’s website, following a vetting process that will take months, the AP’s request for information about Abedin will have been satisfied.

However, since some of the emails on Abedin that the AP wants likely fall within the June 2012 time frame, that might not be the case.

About 7 percent of Clinton’s emails have been released. All the emails are scheduled to be released on a rolling, monthly basis until the last set is released in January 2016, to comply with an order by a different federal judge. The next release is tentatively scheduled for this Friday.