Oh, More Counterterrorism Bureaucracy/SPLC

As you read through this, understand that pesky Southern Poverty Law Center is part of the bureaucracy:

From the Justice Department website:

Wednesday, October 14, 2015
Remarks as prepared for delivery

Thank you, Lorenzo [Vidino], for that kind introduction.

It is an honor to be at this event, co-hosted by the George Washington University’s new Program on Extremism and the Southern Poverty Law Center.

The partnership between SPLC and GW serves as a reminder that violent extremism is neither a new phenomenon, nor one that is limited to any single population, region or ideology.

Since its creation in 1971, SPLC has been an important voice on the wide range of extremist groups throughout this country.  And over the past four decades, the existence of hate, violence and extremism has remained unfortunately all too constant.  Earlier this year, we honored and remembered the victims of the horrific Oklahoma City bombing on the 20th anniversary of that devastating attack.  Less than two months after the anniversary, we again saw unimaginable violence motivated by hate.  A young man killed nine African-American men and women attending a bible class in Charleston, South Carolina.  A senseless, racist act.  The list goes on, past and present.

But as we gather today, new and disturbing trends loom over the horizon – trends we must understand to defeat.

New initiatives, like GW’s program, which focus on empirical research and analysis, are critical to policymakers and the interested public alike.

So although the problem set is by no means new, it is changing, and we must take lessons learned in the past and couple them with trend analysis to understand these shifts.

Today’s event is a good start to that conversation.  We are here to talk about combating domestic terrorism, which the FBI has explained as “Americans attacking Americans based on U.S.-based extremist ideologies.”

Much attention has focused on those inspired by Al Qaeda and the Islamic State of Iraq and the Levant’s (ISIL) message of hate and violence spreading worldwide and reaching homes here in America through the group’s unprecedented social media recruitment efforts.  And rightly so.

But today is a good opportunity to focus the conversation broadly on violent extremism here in America.  The threat ranges from individuals motivated by anti-government animus, to eco-radicalism, to racism, as it has for decades. Many more details here.

DOJ announces new position to focus on domestic terror threat

FNC:

A new national security position is being created to help combat homegrown terror threats, the Department of Justice announced Wednesday.

John Carlin, head of the department’s national security division, announced the new Domestic Terrorism Counsel at a speech Wednesday at George Washington University, to work with DOJ assets on domestic threats.

“…in order to ensure that we are gaining the benefits of the information and input from those eyes on the ground from around the country, and in recognition of a growing number of potential domestic terrorism matters around the United Sates, we have created a new position to assist with our important work in combating domestic terrorism,” Carlin said, according to his prepared remarks.

Carlin emphasized what he called the growing risk from homegrown  terrorism and specifically white supremacy.

“We recognize that, over the past few years, more people have died in this country in attacks by domestic extremists than in attacks associated with international terrorist groups,” Carlin said

“Among domestic extremist movements active in the United States, white supremacists are the most violent. The Charleston shooter, who had a manifesto laying out a racist world-view, is just one example,” Carlin said, before also noting killings by white supremacists in Kansas and Wisconsin.

While he spoke about the threat posed by the Islamic State terror group, he emphasized that law enforcement is focused on racist and anti-government ideologies, and that such ideologies may pose a more serious threat than ISIS.

“More broadly, law enforcement agencies nationwide are concerned about the growth of the “sovereign citizen” movement.  According to one 2014 study, state, local and tribal law enforcement officials considered sovereign citizens to be the top concern of law enforcement, ranking above ISIL and Al Qaeda-inspired extremists,” he said.

Carlin said the new Domestic Terrorism Counsel will serve as the main point of contact for U.S. Attorney offices nationwide. The new official will work to identify trends that can be used to help shape a national strategy.

The Associated Press contributed to this report.

 

Iran to Obama and Kerry, in Your Faces Dudes

U.N. Security Council Resolution 1929 stipulates that Iran cannot engage in any activities related to ballistic missiles.

U.S. to refer Iran missile test to U.N. over possible violation

Washington (CNN) The State Department said Tuesday it would refer Iran’s firing of a new surface-to-surface ballistic missile to the United Nations Security Council for review to determine whether the test violated a U.N. resolution.

“It’s deeply concerning that this latest violation does appear to be a violation of U.N. Security Council resolution 1929, and we’ll obviously raise this at the [Security Council] as we have done with previous launches,” State Department deputy spokesman Mark Toner told reporters.

“We’ve seen for the past years that Iran has consistently ignored U.N. Security Council resolutions,” he added.

White House spokesman Josh Earnest told reporters Tuesday that while the launch was likely a violation of a Security Council resolution, it was distinct and separate from the nuclear accord reached with Iran earlier this year.

“In contrast to the repeated violations of the U.N. Security Council resolution that pertains to their ballistic missile activities, we’ve seen that Iran over the last couple of years has demonstrated a track record of abiding by the commitments that they made in the context of the nuclear talks,” he said.

Iran entered a final nuclear deal with the U.S. and five other world powers in July that is focused on restricting Iran’s path to a nuclear weapon.

U.N. Security Council Resolution 1929 stipulates that Iran cannot engage in any activities related to ballistic missiles.

A newer U.N. Security Council resolution, number 2231, implementing the deal and banning Iran from engaging in activities related to ballistic missiles designed to carry nuclear warheads is not yet in effect.

Over the weekend, state-run media reported that Iran successfully test-fired a new precision-guided, long-range missile.

The Emad (Pillar) surface-to-surface missile, designed and built by Iranian experts, is the country’s first long-range missile that can be precision-guided until it reaches its target, said Brig. Gen. Hossein Dehqan, Iran’s defense minister.

The Emad would be Tehran’s first precision-guided missile with the range to reach its enemy, Israel.

Israel is bitterly opposed to Iran’s nuclear program, and observers have speculated that it could be prepared to launch pre-emptive strikes on Iranian nuclear sites in an effort to derail their progress.

Dehqan said after the launch that the Emad would greatly increase Iran’s strategic deterrence capability, state media reported.

“To follow our defense programs, we don’t ask permission from anyone,” he said, according to state-run news agency IRNA. *** Due to regional fighter jet activity and testing missiles, commercial flights either get canceled or rerouted.

Hong Kong airline Cathay Pacific said Wednesday it has stopped flying over Iran and the Caspian Sea following an air safety agency warning about Russian missiles fired at Syria.

The airline’s decision to reroute flights comes after Russia stepped up its military campaign against Islamic State group fighters in Syria. It started firing cruise missiles from its military warships in the Caspian Sea on Sept. 30.

“In view of the situation in the region, Cathay Pacific suspended all flights over Iran and Caspian Sea since last Thursday until further notice,” the airline said in a statement. “We continue to monitor and review the situation on a daily basis.”

The European Aviation Safety Agency issued a safety bulletin to airlines last week about cruise missiles targeted at Syrian rebels fired by Russian warships in the Caspian Sea. It said the missiles must cross Iran and Iraq below flight routes used by commercial aircraft.

Cathay added that it has had a long-term policy of not overflying Iraq, Afghanistan, Ukraine and Syria.

The agency said it was not making specific recommendations with its bulletin, which was issued to inform airspace users about the potential hazard. Air France said earlier this week it was taking special measures regarding overflying Iran and the Caspian Sea following the agency’s warning.

Airlines are more cautious about flying over conflict zones since the downing of a Malaysia Airlines Boeing 777 last year amid a conflict between Russia-backed separatists and Ukrainian government forces. Two-thirds of the 298 people who died were Dutch and a Dutch Safety Board report released this week said the jet was destroyed by a Buk surface-to-air missile fired from an area controlled by Russia-backed separatist rebels.

Not finished yet, it gets worse:

JPost: Iran’s Revolutionary Guard on Wednesday revealed an underground bunker in which it stores long-range ballistic missiles, Iran’s semi-official Fars News Agency reported.

Footage of the underground missile bunker was aired on Iranian state television. According to Fars, a number of ballistic missiles were shown in the underground tunnel including a model with a range of 2,000 kilometers.

Fars quoted Amir Ali Hajizadeh, head of the Revolutionary Guard’s aerospace branch, as saying that the missiles represented the next generation of Iranian long-range missile technology.

The missile bunker shown is one of many that are buried as deep as “500 meters below the high mountains,” Fars reported.

Iran state television showed on Sunday what it said was a successful launch of the new Iranian missile, named Emad, which appears to be Tehran’s first precision-guided weapon with the range to strike its regional enemy Israel.

A total of 220 of Iran’s 290 lawmakers praised the missile test on Wednesday, announcing their full support of measures that “strengthen Iran’s defense capabilities.”

The US State Department said that the missile test was an apparent violation of a UN Security Council resolution and Washington will raise it at the United Nations.

“We’ll obviously raise this at the UNSC as we have done in previous launches,” State Department spokesman Mark Toner told reporters, noting the test appeared to be a violation of U.N. Security resolution 1929.

He and White House spokesman Josh Earnest both said the issue was separate from a deal Iran struck in July with six world powers, which seeks to curb Tehran’s atomic program in return for having sanctions against it eased.

Ballistic missile tests by Iran are banned under Security Council resolution 1929, which dates from 2010 and remains valid until the July 14 nuclear deal goes into effect.

Once the deal takes effect, Iran will still be “called upon” not to undertake any ballistic missiles work designed to deliver nuclear weapons for a period of up to eight years, according to a Security Council resolution adopted in July.

The resolution says that when the deal is in effect countries will be allowed to transfer missile technology and heavy weapons to Iran on a case-by-case basis with council approval.

However, at the time the resolution was drafted, a U.S. official called this provision meaningless and said the United States would veto any suggested transfer of missile technology to Iran.

Speaking on Tuesday, White House spokesman Earnest made clear countries could more to stop the flow of ballistic missile technology to Iran.

“That is work that requires international cooperation,” he said, adding that Washington was ready to work with Gulf allies to counter Iran’s ballistic missile program.

EPA Hires Thunderclap….Huh?

Armed EPA Agents? The Truth Is Way Out There

The EPA’s armed war on alien polluters.

AmericanSpectator: Fox Mulder and Dana Scully, the FBI agents on Fox’s The X-Files, have been known to draw weapons on aliens, poltergeists, and phantoms. But they have an excuse — they’re fictional characters in a network TV drama, coming back on-the-air soon after a long hiatus. Not so the Environmental Protection Agency’s (EPAs) own, real-life agents. They are packing pistols and even heavier firepower to catch the nation’s contributors to global warming and other, mythical phenomena. Truth is stranger than science fiction in today’s Washington, D.C., and the truth is way out there.

According to a report released last week by a watchdog group called Open the Books, the EPA has spent millions of dollars recently on guns, ammo, body armor, camouflage equipment, and even night-vision goggles to arm its agents in the war on polluters.

The Illinois-based investigative group examined thousands of checks totaling more than $93 billion from 2000 to 2014 by the EPA, and its auditors indicate that about $75 million is authorized each year for “criminal enforcement” of America’s clean air and water laws. This includes cash for a cadre of 200 “special agents” that engage in SWAT-style ops.

“We were shocked ourselves to find these kinds of pervasive expenditures at an agency that is supposed to be involved in clean air and clean water,” said Open the Books’ founder, Adam Andrzejewski, a former candidate for governor of Illinois. “Some of these weapons are for full-scale military operations.”

Some of these military operations have been reported in the media. Two years ago, the EPA was involved in an armed raid at a small town in Alaska where miners were accused of polluting local waters, as Fox News reported that EPA “armed agents in full body armor participated.”

The EPA’s own website describes the activities and mission of the criminal enforcement division as “investigating cases, collecting evidence, conducting forensic analyses and providing legal guidance to assist in the prosecution of criminal conduct that threatens people’s health and the environment.”

Don’t blame President Obama for this alone. The EPA was first given police powers in 1988 during the Reagan era. These days, EPA also conducts joint projects with the Department of Homeland Security as it engages in what a media report calls “environmental crime-fighting.”

“For more than 30 years,” according to the EPA website, “there has been broad, bipartisan agreement about the importance of an armed, fully-equipped team of EPA agents working with state and federal partners to uphold the law and protect Americans.”

But that’s not all that the Open the Books investigators found. Backing up these armed environmental crusaders are scores of highly paid lawyers and other professionals.

The report showed that seven of 10 EPA workers earn more than $100,000 a year, and EPA’s $8 billion budget also finances the salaries of 1,000 attorneys, making the agency one of the biggest law firms in the U.S.

The EPA is hardly going solo in this armed adventure against America, however. The agency has collaborated with the U.S. Department of Homeland Security, and a recent report by the U.S. Department of Justice indicates that more than 40 federal agencies, with 100,000 officers, carry guns and make arrests.

How far will EPA agents go to enforce the law as they interpret it? The Sixth Circuit Court of Appeals on Friday issued a temporary stay on the Environmental Protection Agency’s new Clean Water Rule that regulates “waters of the U.S.” The court decided the EPA’’s Rule that originally became effective on August 28, 2015 requires “further judicial analysis.” The new Clean Water Rule defined navigable waters to include tributaries and wetlands, and even puddles caused by rainstorms. The rule defines which waterways would be protected by the Clean Water Act of 1972. A total of 18 states are challenging the new rule. Perhaps the new water rules will be enforced at gunpoint by armed agents if President Obama and EPA Administrator Gina McCarthy decide that “environmental justice” requires it.

*** Gina likes Thunderclap, so she hired them for crowd-sourcing positive responses.

Join a Thunderclap for Clean Water 

EPA is planning to use a new social media application called Thunderclap to provide a way for people to show their support for clean water and the agency’s proposal to protect it. Here’s how it works: you agree to let Thunderclap post a one-time message on your social networks (Facebook, Twitter or Tumblr) on Monday, September 29 at 2:00 pm EDT.  The message will be posted on everyone’s walls and feeds at the same time.
Here’s the message: “Clean water is important to me. I want EPA to protect it for my health, my family, and my community. www.epa.gov/USwaters

 

Sign up to join the Thunderclap for Clean Water: http://thndr.it/1rUOiaB

 

Read about the Thunderclap.

EPA Publishes Final 2012 and Preliminary 2014 Effluent Guidelines Program Plans

Under Clean Water Act section 304(m), EPA develops biennial plans for issuing new regulations or revising existing regulations to control industrial wastewater discharges. While EPA’s final 2012 plan and preliminary 2014 plan do not propose any new effluent guidelines for industry, EPA is announcing initiation of detailed studies of the petroleum refining industry and centralized waste treatment facilities, and continuation of its preliminary review of the metal finishing industry. EPA will accept public comments on the preliminary 2014 plan through November 17, 2014. Learn more.

Section 319 Success Story: Ionine Creek, Oklahoma

Ionine Creek in Grady County runs through an area of high cattle, wheat, and hog production. An assessment of the creek’s fish community in 2004 revealed a poor biological condition, prompting Oklahoma to add the creek to the state’s Clean Water Act section 303(d) list of impaired waters for biological impairment. Implementation of best management practices to reduce runoff from grazing land and cropland and to improve wildlife habitat decreased sediment and nutrient contributions to the creek and provided better in-stream habitat. As a result, Oklahoma removed Ionine Creek from Oklahoma’s list for fishes bioassessment. Ionine Creek now fully attains its fish and wildlife propagation designated use. The complete success story can be found here.

 

 

Arms Race, Cyber Defenses Fail

By: Damian Paletta, Danny Yadron and Jennifer Valentino-DeVries
Countries toiled for years and spent billions of dollars to build elaborate facilities that would allow them to join the exclusive club of nations that possessed nuclear weapons.
Getting into the cyberweapon club is easier, cheaper and available to almost anyone with cash and a computer.
A series of successful computer attacks carried out by the U.S. and others has kicked off a frantic and destabilizing digital arms race, with dozens of countries amassing stockpiles of malicious code. The programs range from the most elementary, such as typo-ridden emails asking for a password, to software that takes orders from a rotating list of Twitter handles.
The proliferation of these weapons has spread so widely that the U.S. and China-longtime cyber adversaries-brokered a limited agreement last month not to conduct certain types of cyberattacks against each other, such as intrusions that steal corporate information and then pass it along to domestic companies. Cyberattacks that steal government secrets, however, remain fair game.
This comes after other countries have begun to amass cyberweaponry on an unprecedented scale. Pakistan and India, two nuclear-armed rivals, regularly hack each other’s companies and governments, security researchers said. Estonia and Belarus are racing to build defensive shields to counter Russia. Denmark and the Netherlands have begun programs to develop offensive computer weapons, as have Argentina and France.
In total, at least 29 countries have formal military or intelligence units dedicated to offensive hacking efforts, according to a Wall Street Journal compilation of government records and interviews with U.S. and foreign officials. Some 50 countries have bought off-the-shelf hacking software that can be used for domestic and international surveillance. The U.S. has among the most-advanced operations.
In the nuclear arms race, “the acronym was MAD-mutually assured destruction-which kept everything nice and tidy,” said Matthijs Veenendaal, a researcher at the NATO Cooperative Cyber Defence Centre of Excellence, a research group in Estonia. “Here you have the same acronym, but it’s ‘mutually assured doubt,’ because you can never be sure what the attack will be.”
Governments have used computer attacks to mine and steal information, erase computers, disable bank networks and-in one extreme case-destroy nuclear centrifuges.
Nation states have also looked into using cyberweapons to knock out electrical grids, disable domestic airline networks, jam Internet connectivity, erase money from bank accounts and confuse radar systems, experts believe.
Large conventional militaries and nuclear forces are ill-suited to this new kind of warfare, which evens the playing field between big and small countries. Cyberattacks are hard to stop and sometimes impossible to trace. The West, as a result, has been forced to start reconfiguring its militaries to better meet the threat.
 
Access to cyberweapons, according to U.S. and foreign officials and security researchers, is far more widespread than access to nuclear weapons was at the height of the nuclear arms race, a result of inexpensive technology and the power of distributed computing.
More than two dozen countries have accumulated advanced cyberweapons in the past decade. Some Defense Department officials compare the current moment to the lull between the World Wars when militaries realized the potential of armed planes.
“It’s not like developing an air force,” in terms of cost and expertise, said Michael Schmitt, a professor at the U.S. Naval War College and part of an international group studying how international law relates to cyberwarfare. “You don’t need to have your own cyberforce to have a very robust and very scary offensive capability.”
For example, hackers aligned with the Syrian government have spied into the computers of rebel militias, stolen tactical information and then used the stolen intelligence in the ongoing and bloody battle, according to several researchers, including FireEye Inc.
Most cyberattacks linked to the U.S. and foreign governments in recent years involve cyberspying-breaking into a computer network and stealing data. More-aggressive covert weapons go further, either erasing computer records or destroying physical property.
“With some countries, we’re comfortable with knowing what their capabilities are, but with other countries we’re still lost,” said Andre McGregor, a former cyber special agent at the Federal Bureau of Investigation and now the director of security at Tanium Inc., a Silicon Valley cybersecurity startup. “We don’t have the visibility into their toolset.”
The Military Balance, a widely read annual assessment of global military powers published by the International Institute for Strategic Studies in London, tallies tanks, battalions and aircraft carriers. When it comes to national cyberforces it says “capabilities are not assessed quantitatively.”
In the U.S., the National Security Agency, Central Intelligence Agency, FBI and others all play roles in combing through intelligence.
U.S. officials say their biggest concerns are the cyberweapons held by the Chinese, Russians, Iranians and North Koreans, countries that have deployed advanced attacks that either dug inside U.S. government networks or targeted top U.S. companies. Even Israel, a U.S. ally, was linked to hacking tools found on the computers of European hotels used for America’s diplomatic talks with Iran, according to the analysis of the spyware by a top cybersecurity firm. Israeli officials have denied spying on the U.S.
Cyberarmies tend to be integrated with a country’s military, its intelligence services, or both, as is the case in China and the U.S.
In China, hackers are famous for the relatively low-tech tactic of “phishing”-sending a flood of disguised emails to trick corporate employees and government bureaucrats to letting them into their networks.
The U.S. suspects that is how they penetrated the Office of Personnel Management, using a phishing email to breach an OPM contractor and then crack the agency’s network. The records of more than 21 million people were exposed in the 2014 and 2015 data breach, disclosed this summer. China has said it wasn’t involved.
China’s army has divisions devoted to cyberattacks, and recent evidence shows links between the country’s military and hackers who appear to be pressing the country’s interests abroad.
“They used to be snap and grab-get in and dump everything they can,” said Tommy Stiansen, co-founder and chief technology officer at Norse Corp., a California cybersecurity firm that tracks nation-state activity. “Now they trickle out the information, stay hidden in the system. We’ve even seen Chinese actors patch and repair networks once they’ve broken in.”
China opposes the militarization of cyberspace or a cyberarms race, said Zhu Haiquan, a spokesman for the Chinese Embassy in Washington, adding China “firmly opposes and combats all forms of cyberattacks in accordance with law.”
Choosy in targets
 
Russian hackers have targeted diplomatic and political data, burrowing inside unclassified networks at the Pentagon, State Department and White House, also using emails laced with malware, according to security researchers and U.S. officials.
They have stolen President Barack Obama‘s daily schedule and diplomatic correspondence sent across the State Department’s unclassified network, according to people briefed on the investigation. A Russian government spokesman in April denied Russia’s involvement.
“Russia has never waged cyberwarfare against anyone,” Andrey Akulchev, a spokesman for the Russian Embassy in Washington, said in a written statement Friday. “Russia believes that the cybersphere should be used exclusively for peaceful purposes.”
Russia’s top hackers tend to be choosier in their targets, tailoring email attacks to those they believe might unwittingly open links or attachments.
“They are sitting there trying to think through ‘how do I really want to compromise this target?’ ” said Laura Galante, director of threat intelligence at FireEye, a Silicon Valley cybersecurity company that works closely with Washington. “The Chinese just want a foothold into the target. Russian theft is very personal.”
U.S. spies and security researchers say Russia is particularly skilled at developing hacking tools. Some malicious software linked to Russia by security researchers has a feature meant to help it target computers on classified government networks usually not connected to the Internet.
The virus does this by jumping onto USB thumb drives connected to targeted computers, in the hopes that the user-such as U.S. military personnel-will then plug that USB drive into a computer on the classified network.
Russian hackers also make efforts to hide stolen data in normal network traffic. In one example, a piece of malware hides its communications in consumer Web services to fool cybersecurity defenses. The code downloads its instructions from a set of Twitter accounts. It then exports data to commercial storage services. This tactic is effective because corporate cybersecurity systems often don’t block traffic to and from these sites.
Government investigators believe Iranian hackers implanted the Shamoon virus on computers at Saudi Arabia’s Saudi Aramco, the world’s largest energy firm, in 2012. The Aramco attack erased 75% of the company’s computers and replaced screen images with burning American flags. The attack didn’t affect oil production, but it rattled the company, and security officials, as it revealed the extent of Iran’s cybercapabilities. A spokesman for Aramco didn’t respond to a request for comment.
The move was at least partly in retaliation for the alleged U.S.-Israeli attack on Iran discovered in 2010 that deployed the Stuxnet computer worm to destroy Iranian nuclear centrifuges-considered to be the most successful and advanced cyberattack ever. The U.S. and Israel haven’t confirmed or denied involvement with Stuxnet.
Director of National Intelligence James R. Clapper has said that Iran used malware to destroy computers last year at Las Vegas Sands Corp., a casino company run by Sheldon Adelson, a major critic of the Iranian government. A Sands spokesman declined to comment.
Adm. Michael Rogers, center, director of the National Security Agency and commander of the U.S. Cyber Command, confers with Deputy Defense Secretary Robert Work ahead of testifying before the Senate Armed Services Committee in September. Photo: Win McNamee/Getty Images
Defense officials have also said Iranian hackers have temporarily overwhelmed the websites of numerous U.S. banks, in an annoying but relatively pedestrian technique known as a “denial of service” attack. The attack was allegedly in response to a YouTube video depicting the Prophet Muhammad. Some U.S. officials suspected it was retaliation for sanctions and the Stuxnet attack.
In 2012, Iran’s Supreme Leader Ayatollah Ali Khamenei publicly announced the creation of the Supreme Council of Cyberspace charged to oversee the defense of Iran’s computer networks and develop “new ways of infiltrating or attacking the computer networks of its enemies.”
National Security Agency Director Adm. Michael Rogers said Iranian cyberattacks have slowed since nuclear talks intensified last year, but that Tehran appears “fully committed” to using cyberattacks as part of its national strategy.
A spokesman for the Iranian government didn’t respond to request for comment.
Sony hack
 
U.S. officials accused North Korea of destroying computer files and records at Sony Corp.’s Hollywood film unit in 2014, allegedly in retaliation for “The Interview,” a satirical movie about assassins of North Korean leader Kim Jong Un. The breach was considered one of the most successful nation-state attacks. North Korea successfully implanted malware on Sony computers, which allowed them to both steal and destroy company records, the FBI alleged.
South Korea has also accused North Korea of trying to hack a nuclear reactor, television networks and at least one bank.
“Cybercapability, especially offensive cybercapability, is a relatively inexpensive method that a country can exploit to ‘hit above its weight class,’ which North Korea is fully aware of and is attempting to leverage,” said Steve Sin, a former U.S. Army counterintelligence officer who now researches unconventional weapons and technology.
Defense contractor Northrop Grumman Corp., meanwhile, has advertised for a “cyber operations planner” to “facilitate” offensive computer attacks with the South Korean and U.S. governments, according to a job posting it listed online.
A Northrop spokesman said the customer determines the scope of work performed.
A spokesman for North Korea couldn’t be reached for comment. The country hasn’t commented publicly on cyberprograms.
Many cybersecurity experts, however, consider the U.S. government to have the most advanced operations. When Kaspersky Lab ZAO, a Russian cybersecurity company, this year released a report on a group it called the Equation Group-which U.S. officials confirmed was a thinly veiled reference to the NSA-it referred to the operatives as the “crown creator of cyberespionage.”
Former National Security Agency contractor Edward Snowden leaked documents that showed the NSA had implanted malware on tens of thousands of foreign computers. That allowed the U.S. government secret access to data and, potentially, the industrial control systems behind power plants and pipelines. The Pentagon’s U.S. Cyber Command didn’t respond to a request for comment.
In some instances, Kaspersky found, the NSA was able to burrow so deeply into computers that it infected the code that controls how a hard drive spins. So-called firmware isn’t scanned by computer defenses.
“We, too, practice cyberespionage, and, in a public forum, I’m not going to say how successful we are, but we’re not bad,” Mr. Clapper, the Director of National Intelligence, told a Senate panel in September.
U.S. Cyber Command now has nine “National Mission Teams” with plans to build four more. These each comprise 60 military personnel that will “conduct full-spectrum cyberspace operations to provide cyber options to senior policy makers in response to attacks against our nation,” a Pentagon spokesperson said.
The Navy, Army, and Air Force will each build four teams, with the Marines building a single unit. Each will have a “separate mission with a specific focus area,” though these have so far remained secret.
Air Force Chief of Staff Gen. Mark A. Welsh III told a group of reporters in April that he wanted to see the military develop “blunt force trauma” powers with their cyberweapons. He gave examples of computer codes that could “make an enemy air defense system go completely blank” or have an enemy’s “radar show a thousand false targets that all look real.” He didn’t say the military had finished designing such powers.
Defense Secretary Ash Carter has made the development of new cyberweapons a priority, although the policy seems in flux after questions were raised by the Pentagon’s inspector general.
This activity has prompted other countries to join the digital buildup.
In 2014, the Netherlands announced it would begin training its own Internet troops through a domestic cybersecurity company, called Fox-IT. The head of the Dutch armed forces, Major Gen. Tom Middendorp, said in a symposium the group should be prepared to carry out attacks, not just block them, according to a Dutch media report. The Netherlands’ military strategy, laid out in various documents, refers to hacking as a “force multiplier.” A Dutch military spokesman confirmed the efforts but declined to make Gen. Middendorp available for an interview.
In 2013, Denmark’s Defense Ministry began allocating about $10 million a year for “computer network operations,” which include “defensive and offensive military operations,” according to government budget documents. That amount is just 0.24% of the Danish defense budget, reflecting the tiny barrier of entry.
Countries unable to develop their own weapons can buy off-the-shelf systems from private parties. Earlier this year, an attack and document leak on the Italian firm Hacking Team revealed the company had sold its surveillance tools to dozens of countries, including Sudan, Egypt, Ethiopia and Azerbaijan.
Hacking Team touted its product as “the hacking suite for governmental interception,” and computer security researchers who studied its program said it took advantage of holes in popular software to get onto opponents’ computers and mobile devices. The FBI is among the groups listed as clients of Hacking Team. An FBI spokesman said it didn’t comment on specific tools or techniques.
Most of these countries use surveillance software on domestic enemies or insurgent groups, according to officials with numerous countries and researchers.
States aren’t the only players. About 30 Arabic-fluent hackers in the Palestinian territories, Egypt and Turkey are building their own tools to hit targets in Egypt, Israel and the U.S., according to researchers at Kaspersky Lab.
And in August, the U.S. used a drone to kill Islamic State hacker Junaid Hussain in Raqqa, Syria, showing the extent to which digital warfare has upset the balance of power on the modern battlefield.
The British citizen had used inexpensive tools to hack more than 1,000 U.S. military personnel and published personal and financial details online for others to exploit. He helped sharpen the terror group’s defense against Western surveillance and built hacking tools to penetrate computer systems, according to people familiar with the matter.
National-security and cyberweapon experts are watching the growing digital arms stockpile nervously, worried that one-off attacks could eventually turn messier, particularly given how little is known about what each country is capable of doing.
“What we can do, we can expect done back to us,” said Howard Schmidt, who was the White House’s cybersecurity coordinator until 2012. The U.S. is thinking, “Yeah, I don’t want to pull that trigger because it’s going to be more than a single shot that goes off.”

Only Obama Adheres to Iran Deal, Others Pretend

Primer: 

 

SOURCE: Naharnet (Lebanon) 11 Oct.’15:”Fiery Scenes as Iran MPs Give Partial Nod to Nuclear Deal”, Agence France Press

SUBJECT: Iran’s ‘partial nod’ to nuclear deal  

FULL TEXT: Iran’s parliament gave a partial nod to a nuclear deal with world powers Sunday but only after fiery clashes and allegations from a top negotiator that a lawmaker had threatened to kill him.  

Ali Akbar Salehi, head of Iran’s Atomic Energy Agency, went on the attack for the government at the end of a boisterous debate where he and other officials were accused of having capitulated.  

Ultraconservative lawmakers repeatedly warned of holes in the text of the agreement and criticized President Hassan Rouhani for suggesting MPs were deliberately delaying the deal.  

Red with anger, Alireza Zakani, who headed a panel reviewing the accord, known as the Joint Comprehensive Plan of Action, for two months, demanded “fundamental changes” to the text.  

“This deal serves Wendy Sherman” and not Iran’s interests, Zakani said, referring to America’s senior negotiator in talks which resulted in the agreement in Vienna on July 14.  

Hardliners in Tehran often railed against two years of diplomacy that led to the deal. Iran’s government says the accord will protect the country’s nuclear program while seeing sanctions lifted.  

Despite Sunday’s[11 Oct] disagreements, the outlines of a motion titled “Iran’s Plan for Reciprocal and Proper Action in Implementing JCPOA” were approved by 139 of 253 lawmakers present.  

One-hundred lawmakers voted against and 12 abstained. Iran has 290 MPs in total. They stopped short of endorsing the nuclear accord on Sunday and said specific details of the text are to be discussed and voted on Tuesday. Members of the U.S. Congress failed in September to torpedo the White House’s historic deal with Iran.  

Salehi, an atomic scientist by training and a former foreign minister, hit out at what he said was the “immoral” behavior of some MPs in the way they had responded to talks and the deal.  

Having to raise his voice, Salehi said: “Truth might be bitter for some…  Listen. Listen. Hear me once and for all. Hear it from someone who is going be buried under cement.”  

The latter remark was in reference to a lawmaker who Salehi said took a vow to kill him because the government agreed to remove and disable the core of a reactor at Arak, one of Iran’s nuclear sites.  

“We negotiated within a framework and principles. Who set that framework?  Me? A minimum and maximum was set for us,” Salehi said.  

So-called red lines for the talks were also laid down by Iran’s supreme leader, Ayatollah Ali Khamenei, and the Supreme National Security Council that he oversees.  

Foreign Minister Mohammad Javad Zarif, who led Iran’s diplomacy with the six powers, attended Sunday’s parliament session but he did not speak publicly. State television broadcast only live audio of the session over stills of the parliament, citing “opposition from Majlis authorities.”  

However, pictures posted on social media sites showed the fierce exchanges.

Now to Obama:

Obama will be the only person sticking to Iran deal

NYP: Sometime this week, President Obama is scheduled to sign an executive order to meet the Oct. 15 “adoption day” he has set for the nuclear deal he says he has made with Iran. According to the president’s timetable the next step would be “the start day of implementation,” fixed for Dec. 15.

But as things now stand, Obama may end up being the only person in the world to sign his much-wanted deal, in effect making a treaty with himself.

The Iranians have signed nothing and have no plans for doing so. The so-called Joint Comprehensive Plan of Action (JCPOA) has not even been discussed at the Islamic Republic’s Council of Ministers. Nor has the Tehran government bothered to even provide an official Persian translation of the 159-page text.

The Islamic Majlis, the ersatz parliament, is examining an unofficial text and is due to express its views at an unspecified date in a document “running into more than 1,000 pages,” according to Mohsen Zakani, who heads the “examining committee.”

“The changes we seek would require substantial rewriting of the text,” he adds enigmatically.

Nor have Britain, China, Germany, France and Russia, who were involved in the so-called P5+1 talks that produced the JCPOA, deemed it necessary to provide the Obama “deal” with any legal basis of their own. Obama’s partners have simply decided that the deal he is promoting is really about lifting sanctions against Iran and nothing else.

So they have started doing just that without bothering about JCPOA’s other provisions. Britain has lifted the ban on 22 Iranian banks and companies blacklisted because of alleged involvement in deals linked to the nuclear issue.

German trade with Iran has risen by 33 percent, making it the Islamic Republic’s third-largest partner after China.

China has signed preliminary accords to help Iran build five more nuclear reactors. Russia has started delivering S300 anti-aircraft missile systems and is engaged in talks to sell Sukhoi planes to the Islamic Republic.

France has sent its foreign minister and a 100-man delegation to negotiate big business deals, including projects to double Iran’s crude oil exports.

Other nations have also interpreted JCPOA as a green light for dropping sanctions. Indian trade with Iran has risen by 17 percent, and New Delhi is negotiating massive investment in a rail-and-sea hub in the Iranian port of Chah-Bahar on the Gulf of Oman. With help from Austrian, Turkish and United Arab Emirates banks, the many banking restrictions imposed on Iran because of its nuclear program have been pushed aside.

“The structures of sanctions built over decades is crumbling,” boasts Iranian President Hassan Rouhani.

Meanwhile, the nuclear project is and shall remain “fully intact,” says the head of Iran’s Atomic Energy Agency, Ali Akbar Salehi.

“We have started working on a process of nuclear fusion that will be cutting-edge technology for the next 50 years,” he adds.

Even before Obama’s “implementation day,” the mullahs are receiving an average of $400 million a month, no big sum, but enough to ease the regime’s cash-flow problems and increase pay for its repressive forces by around 21 percent.

Last month, Iran and the P5+1 created a joint commission to establish the modalities of implementation of an accord, a process they wish to complete by December 2017 when the first two-year review of JCPOA is scheduled to take place and when Obama will no longer be in the White House. (If things go awry Obama could always blame his successor or even George W Bush.)

Both Obama and his Secretary of State John Kerry have often claimed that, its obvious shortcomings notwithstanding, their nuke deal with the “moderate faction” in Tehran might encourage positive changes in Iran’s behavior.

That hasn’t happened.

The mullahs see the “deal” as a means with which Obama would oppose any suggestion of trying to curb Iran.

“Obama won’t do anything that might jeopardize the deal,” says Ziba Kalam, a Rouhani adviser. “This is his biggest, if not the only, foreign policy success.”

If there have been changes in Tehran’s behavior they have been for the worst. Iran has teamed up with Russia to keep Bashar al-Assad in power in Syria, mocking Obama’s “Assad must go” rhetoric. More importantly, Iran has built its direct military presence in Syria to 7,000 men. (One of Iran’s most senior generals was killed in Aleppo on Wednesday.)

Tehran has also pressured Iraqi Premier Haidar al-Abadi’s weak government to distance itself from Washington and join a dubious coalition with Iran, Russia and Syria.

Certain that Obama is paralyzed by his fear of undermining the non-existent “deal” the mullahs have intensified their backing for Houthi rebels in Yemen. Last week a delegation was in Tehran with a long shopping list for arms.

In Lebanon, the mullahs have toughened their stance on choosing the country’s next president. And in Bahrain, Tehran is working on a plan to “ensure an early victory” of the Shiite revolution in the archipelago.

Confident that Obama is determined to abandon traditional allies of the United States, Tehran has also heightened propaganda war against Saudi Arabia, now openly calling for the overthrow of the monarchy there.

The mullahs are also heightening contacts with Palestinian groups in the hope of unleashing a new “Intifada.”

“Palestine is thirsty for a third Intifada,” Supreme Guide Khamenei’s mouthpiece Kayhan said in an editorial last Thursday. “It is the duty of every Muslim to help start it as soon as possible.”

Obama’s hopes of engaging Iran on other issues were dashed last week when Khamenei declared “any dialogue with the American Great Satan” to be” forbidden.”

“We have no need of America” his adviser Ali-Akbar Velayati added later. “Iran is the region’s big power in its own right.”

Obama had hoped that by sucking up to the mullahs he would at least persuade them to moderate their “hate-America campaign.” Not a bit of that.

“Death to America” slogans, adoring official buildings in Tehran have been painted afresh along with US flags, painted at the entrance of offices so that they could be trampled underfoot. None of the US citizens still held hostages in Iran has been released, and one, Washington Post stringer Jason Rezai, is branded as “head of a spy ring “in Tehran. Paralyzed by his fear of undermining the non-existent deal, Obama doesn’t even call for their release.

Government-sponsored anti-American nationwide events are announced for November, anniversary of the seizure of the US Embassy in Tehran. The annual “End of America” week-long conference is planned for February and is to focus on “African-American victims of US police” and the possibility of “self-determination for blacks.”

According to official sources “families of Black American victims” and a number of “black American revolutionaries” have been invited.

Inside Iran, Obama’s “moderate partners” have doubled the number of executions and political prisoners. Last week they crushed marches by teachers calling for release of their leaders. Hundreds of trade unionists have been arrested and a new “anti-insurrection” brigade paraded in Tehran to terrorize possible protestors.

The Obama deal may end up as the biggest diplomatic scam in recent history.