Bomb Threat Ground Planes in Chile, Peru, Greece and Argentina

Defense Secretary Mattis just happened to be in Chile.

Defense Secretary James N. Mattis highlights a joint agreement he signed on cooperation between the United States and Chile in cyber operations and protection of Chile’s cyber domain during a visit to Santiago, Chile, Aug. 16, 2018.

***

Reported on the 9th: Mattis embarks Sunday, Aug. 12 on his first trip to South America while leading the Department of Defense.

The White House declared 2018 the “Year of the Americas,” and the Secretary’s trip underscores the Department’s strong defense ties with Brazil, Argentina, Chile and Colombia. These relationships are critical to a collaborative, prosperous and secure Western hemisphere.

Secretary Mattis will begin his trip in Brazil, where he will meet with senior officials and defense leaders. He will also speak at the Escola Superior de Guerra, the country’s war college, and visit the national monument to Brazilian service members killed in World War II.

Secretary Mattis will then visit Argentina, where he will meet with senior defense officials to discuss defense issues of mutual interest.

His third stop is Chile to exchange strategic perspectives with senior officials.

Secretary Mattis concludes his trip in Colombia, where he will meet members of the newly elected administration.

***

LIMA (Reuters) – A LATAM Airlines passenger plane that departed Lima for Santiago, Chile, on Thursday was forced to land at an airport in southern Peru due to a bomb threat received by Chilean authorities, Peru’s Transportation Ministry said.

No one was injured on LATAM flight 2369 and a team for deactivating explosives has been notified, the ministry said. “Right now the situation is under control,” it added in a statement on Twitter.

***

On the island of Crete in Greece, a German Condor Airways passenger plane made an emergency landing at Chania airport over an alleged bomb threat on board, local media reported.

The aircraft with more than 270 passengers was en route from Egypt’s Hurghada to Duesseldorf, according to Skai broadcaster.

All passengers and 11 crew members safely left the plane after the landing. The reports of the bomb threat are being checked by the police.

Local military officials say the Boeing 757 jet was escorted to Chania airport by two Greek air force F-16 fighters scrambled after the pilot reported the threat, and landed without incident late Thursday.

The airport had been placed on a state of alert but that has since been lifted.

30,000 ISIS Fighters is Not Defeat

Army Col. Sean Ryan, the spokesman for Operation Inherent Resolve, spoke to Pentagon reporters about progress being made against the Islamic State of Iraq and Syria. He spoke via satellite from Baghdad.

After Losses in Syria and Iraq, ISIS Moves the Goal Posts ... photo

“In Iraq, operations continue to secure areas across the country, as Iraq security forces locate, identify and destroying ISIS remnants,” Ryan said. “Last week alone, … operations across Iraq have resulted in the arrest of more than 50 suspected terrorists and the removal of 500 pounds of improvised explosive devices.”

Progress in Iraq’s Anbar Province

Iraqi forces are moving in Anbar province, in the Hamrin Mountains and Samarra. Reconstruction efforts are ongoing with roads reopening in the north. Iraqi engineers “cleaned the main road between Salahuddin and Samarra of IEDs, making travel safer between the two cities,” he said.

In the Baghdad area, the ISF established central service coordination cells, a program designed to use military resources to enable local communities to restore basic infrastructure and services. “Initial efforts by the coordination cells include trash collection, road openings, maintenance of water facilities,” Ryan said.

Syrian Democratic Forces are preparing for the final assault on ISIS in the Middle Euphrates River Valley. The SDF is reinforcing checkpoints and refining blocking positions ahead of clearance operations in Hajin, Ryan said.

Military Operations, Reconstruction in Syria

In Syria, too, reconstruction efforts go hand in hand with military operations. “In Raqqa, the internal security forces have destroyed more than 30 caches containing 500 pounds of explosives discovered during the clearance operations in the past weeks,” the colonel said.

ISIS remains a concern in both countries, the colonel said. “Make no mistake: The coalition is not talking victory or taking our foot off the gas in working with our partners,” he said.

Defeating ISIS, he said, will require a long-term effort.

“We cannot emphasize enough that the threat of losing the gains we have made is real, especially if we are not able to give the people a viable alternative to the ISIS problem,” Ryan said. “We continue to call on the international community to step up and ensure that conditions that gave rise to ISIS no longer exist in both Syria and Iraq.”

***

(UNITED NATIONS) — The Islamic State extremist group has up to 30,000 members roughly equally distributed between Syria and Iraq and its global network poses a rising threat — as does al-Qaeda, which is much stronger in places, a United Nations report says.

The report by U.N. experts circulated Monday said that despite the defeat of IS in Iraq and most of Syria, it is likely that a reduced “covert version” of the militant group’s “core” will survive in both countries, with significant affiliated supporters in Afghanistan, Libya, Southeast Asia and West Africa.

The experts said al-Qaeda’s global network also “continues to show resilience,” with its affiliates and allies much stronger than IS in some spots, including Somalia, Yemen, South Asia and Africa’s Sahel region.

Al-Qaeda’s leaders in Iran “have grown more prominent” and have been working with the extremist group’s top leader, Ayman al-Zawahri, “projecting his authority more effectively than he could previously” including on events in Syria, the experts said.

The report to the Security Council by experts monitoring sanctions against IS and al-Qaeda said the estimate of the current total IS membership in Iraq and Syria came from governments it did not identify. The estimate of between 20,000 and 30,000 members includes “a significant component of the many thousands of active foreign terrorist fighters,” it said.

While many IS fighters, planners and commanders have been killed in fighting, and many other fighters and supporters have left the immediate conflict zone, the experts said many still remain in the two countries — some engaged militarily “and others hiding out in sympathetic communities and urban areas.”

IS fighters swept into Iraq in the summer of 2014, taking control of nearly a third of the country. At the height of the group’s power its self-proclaimed caliphate stretched from the edges of Aleppo in Syria to just north of the Iraqi capital, Baghdad.

With its physical caliphate largely destroyed, the Islamic State movement is transforming from a “proto-state” to a covert “terrorist” network, “a process that is most advanced in Iraq” because it still controls pockets in Syria, the report said.

The experts said the discipline imposed by IS remains intact and IS leader Abu Bakr al-Baghdadi “remains in authority” despite reports that he was injured.

“It is just more delegated than before, by necessity, to the wider network outside the conflict zone,” the experts said.

The flow of foreign fighters to IS in Syria and Iraq has come to a halt, they said, but “the reverse flow, although slower than expected, remains a serious challenge.”

While the rate of terrorist attacks has fallen in Europe, the experts said some governments “assess that the underlying drivers of terrorism are all present and perhaps more acute than ever before.” This suggests that any reduction in attacks is likely to be temporary until IS recovers and reorganizes and al-Qaeda “increases its international terrorist activity or other organizations emerge in the terrorist arena,” they said.

The experts looked at the threats posed by IS and al-Qaeda by region:

—ARABIAN PENINSULA: Al-Qaida’s leaders recognize Yemen “as a venue for guerrilla-style attacks and a hub for regional operations.” Yemen’s lack of a strong central government “has provided a fertile environment for al-Qaeda in the Arabian Peninsula.” Its strength inside Yemen is estimated at between 6,000 and 7,000, compared with only 250 to 500 IS members in the conflict-wracked country.

—NORTH AFRICA: Despite the loss to IS of the Libyan city of Sirte and continued airstrikes, the extremist group “still has the capacity to launch significant attacks within Libya and across the border, reverting to asymmetric tactics and improvised explosive devises.” Estimates of IS members vary between 3,000 and 4,000, dispersed across Libya. Up to 1,000 fighters in Egypt’s Sinai peninsula have pledged allegiance to IS leader al-Baghdadi. Al-Qaeda is also continuing a resurgence in Libya.

—WEST AFRICA: An al-Qaeda-affiliated coalition has increased attacks on French, U.S., U.N. and other international interests in the Sahel. Al-Qaida in the Islamic Maghreb has urged attacks on French private companies. The Islamic State in the Greater Sahara is active mostly at the Mali-Niger border and has less of a footprint. “Member states assess that terrorists are taking advantage of territorial control and ethnic conflicts to radicalize populations.”

—EAST AFRICA: The al-Shabab extremist group in Somalia, an al-Qaeda affiliate, “remains the dominant terrorist group” in that country, with improvised explosive devices “its weapon of choice.” Despite sustained military action against al-Shabab, “the group has enhanced its capabilities as it retains its influence and appeal.” Member states said IS in Somalia “is fragile and operationally weak,” but “it still presents a threat” because the country remains a focus for possible future operations.

—EUROPE: During the first six months of 2018, “the threat in Europe remained high” but “the tempo of attacks and disrupted plots was lower than during the same period in 2017.” Much activity involved individuals with no prior security records or deemed low risk. IS used the media to urge sympathizers in Europe to conduct attacks in their home countries. Member states expressed concern that returnees could disseminate knowledge and skills related to making drones, explosive devices and car bombs.

—CENTRAL AND SOUTH ASIA: According to an unidentified U.N. member state, IS poses an immediate threat in the region but al-Qaida is the “intellectually stronger group” and poses a longer-term threat. Some leaders of the al-Qaida “core,” including al-Zawahiri and Osama bin Laden’s son, Hamza, are reported to be in Afghanistan-Pakistan border areas. IS continues to relocate some key operatives to Afghanistan. One unidentified government reported newly arrived IS fighters from Algeria, France, Russia, Tunisia and central Asian states.

—SOUTHEAST ASIA: Despite last year’s heavy losses in the Philippines, IS affiliates in the country “are cash rich and growing in membership.” Intermediaries facilitated financial transfers from the IS “core” to Philippines affiliates and arranged bomb-making and firearms training for recruits from Indonesia at camps in the Philippines. Attacks in Indonesia by an IS-linked network using families as suicide bombers could become “a troubling precedent.”

So, What Really Goes in Space to Have a Space Force?

Primer: Did you know there is something called the OuterSpace Treaty? Yup, it covers arms control, verification and compliance. Sounds great right? Problem is it is dated 2002.

Then there is the NASA summary of the 1967 Space Treaty.

GPS is operated and maintained by the U.S. Air Force. GPS.gov is maintained by the National Coordination Office for Space-Based Positioning, Navigation, and Timing.

Like the Internet, GPS is an essential element of the global information infrastructure. The free, open, and dependable nature of GPS has led to the development of hundreds of applications affecting every aspect of modern life. GPS technology is now in everything from cell phones and wristwatches to bulldozers, shipping containers, and ATM’s.

GPS boosts productivity across a wide swath of the economy, to include farming, construction, mining, surveying, package delivery, and logistical supply chain management. Major communications networks, banking systems, financial markets, and power grids depend heavily on GPS for precise time synchronization. Some wireless services cannot operate without it.

GPS saves lives by preventing transportation accidents, aiding search and rescue efforts, and speeding the delivery of emergency services and disaster relief. GPS is vital to the Next Generation Air Transportation System (NextGen) that will enhance flight safety while increasing airspace capacity. GPS also advances scientific aims such as weather forecasting, earthquake monitoring, and environmental protection.

Finally, GPS remains critical to U.S. national security, and its applications are integrated into virtually every facet of U.S. military operations. Nearly all new military assets — from vehicles to munitions — come equipped with GPS.

***

There is a robust debate within Washington and the Pentagon if whether or not a new branch of Armed Services is really needed. Presently, the Air Force has most exclusive authority of all things space except for research and exploration which is performed by NASA.

There is even a debate within the Air Force which was raised last February.

US Air Force Chief of Staff General David L. Goldfein predicted it’ll only be a “matter of years” before American forces find themselves “fighting from space.” To prepare for this grim possibility, he said the Air Force needs new tools and a new approach to training leaders. Oh, and lots of money.

“[It’s] time for us as a service, regardless of specialty badge, to embrace space superiority with the same passion and sense of ownership as we apply to air superiority today,” he said.

These are some of the strongest words yet from the Air Force chief of staff to get the Pentagon thinking about space—and to recognize the U.S. Air Force as the service branch best suited for the job. “I believe we’re going to be fighting from space in a matter of years,” he said. “And we are the service that must lead joint war fighting in this new contested domain. This is what the nation demands.”

The USAF and other military officials have been saying this for years, but Goldfein’s comments had an added sense of urgency this time around. Rep. Mike Rogers, the Strategic Forces Subcommittee chairman, recently proposed the creation of a new “Space Corps,” one that would be modeled after the Marines. The proposed service branch, it was argued, would keep the United States ahead of rival nations like Russia and China. The idea was scrapped this past December—at least for now. Needless to say, Rogers’ proposal did not go over well with the USAF; the creation of the first new uniformed service branch in 70 years would see Pentagon funds siphoned away from the Air Force. Hence Goldfein’s speech on Friday, in which he argued that the USAF is the service branch best positioned to protect American interests in space.

But in order to protect “contested environments,” the US Air Force will need to exercise competency in “multi-domain operations,” he said. This means the ability to collect battlefield intelligence from “all domains,” including air, ground, sea, cyber, and space. “I look forward to discussing how we can leverage new technology and new ways of networking multi-domain sensors and resilient communications to bring more lethality to the fight,” said Goldfein.

Indeed, the USAF has plenty of work to do make this happen, and to keep up with its rivals. China, for example, recently proposed far-fetched laser-armed satellite to remove space junk, while also demonstrating its ability to shoot down missiles in space. Should a major conflict break out in the near future, space will most certainly represent the first battlefield.

“When you think of how dependent the US military is on satellites for everything from its communication and navigation to command and surveillance, we are already fighting in space, even if it’s not like the movies depicted,” Peter W. Singer, fellow at New America and author of Ghost Fleet: A Novel of the Next World War, told Gizmodo. “If we were ever to fight another great power, like a China or Russia, it is likely the opening round of battle would be completely silent, as in space no one would hear the other side jamming or even destroying each other’s satellites.”

To prepare the United States for this possibility, Goldfein said the Air Force needs to invest in new technologies and train a new generation of leaders. On that last point, the CSAF ordered Lt. Gen. Steven Kwast, the commander of Air Education and Training Command, to develop a program to train officers and non-commissioned officers for space ops. “We need to build a joint, smart space force and a space-smart joint force,” Goldfein said.

As reported in SpaceNews, the USAF is asking for $8.5 billion for space programs in the 2019 budget, of which $5.9 billion would go to research and development, and the remaining for procurement of new satellite and launch services. Over next five years it hopes to spend $44.3 billion on development of new space systems, which is 18 percent more than it said it would need last year to cover the same period.

 

Trouble Ahead After DPRK’s FM Visit to Tehran

So, it appears there is more to the teaming up between Tehran and Pyongyang.

The Iranian President Rouhani told the North Korean Foreign Minister in a recent confab to NOT trust the United States.

Meanwhile, SecState, Mike Pompeo issued a proposal to North Korea calling for a timeline Pompeo that would mandate North Korea hand over 60 to 70 percent of its nuclear warheads to a third party within six to eight months, according to the report.

North Korea has reportedly rejected a formal timeline for its denuclearization proposed by Secretary of State Mike Pompeo.

Vox reported Wednesday that Pyongyang has rejected the timeline several times over the past two months amid continued negotiations over North Korea’s nuclear program.

The timeline Pompeo proposed would mandate North Korea hand over 60 to 70 percent of its nuclear warheads to a third party within six to eight months, according to the report.

However, it is unclear how many warheads North Korean leader Kim Jong Un has, making it difficult to verify that Pyongyang has actually turned over an agreed-upon percentage.

Trump administration officials in recent weeks have expressed frustration with North Korea’s efforts to denuclearize despite President Trump hailing his June summit with Kim in Singapore as a success.

“The ultimate timeline for denuclearization will be set by Chairman Kim, at least in part,” Pompeo told Channel NewsAsia in an interview last week.

“The decision is his. He made a commitment, and we’re very hopeful that over the coming weeks and months we can make substantial progress towards that and put the North Korean people on a trajectory towards a brighter future very quickly.”

White House national security adviser John Bolton told Fox News on Tuesday that “North Korea that has not taken the steps we feel are necessary to denuclearize.”

Iran fires attack on Trump as it tells North Korea: ‘US ... photo

Then we have yet another emerging hacking warning from CERT.

The Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) have identified a Trojan malware variant—referred to as KEYMARBLE—used by the North Korean government. The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA.

US-CERT encourages users and administrators to review Malware Analysis Report (MAR) MAR-10135536-17 and the US-CERT page on HIDDEN COBRA – North Korean Malicious Cyber Activity for more information.

Not to leave out Iran’s cyber attack warnings.

Iranian hackers have laid the groundwork to carry out extensive cyber attacks against private U.S. and European companies, U.S. officials warn, according to NBC News. Although experts don’t believe any such attack is imminent, the preparations could enable denial-of-service attacks on infrastructure including electric grids and water plants, plus health care and technology companies across the U.S., Europe, and Middle East, say U.S. officials at the 2018 Aspen Security Forum.

A spokesperson for the Iranian mission to the United Nations, Alireza Miryousefi, told NBC News that the U.S. is more aggressive in terms of cyber attacks, and Iran’s moves are merely defensive.

***

As sanctions reimposed in response to its nuclear program begin to bite, Iran seems poised to follow the trail North Korea blazed in cyberspace: state-directed hacking that aims at direct theft to redress economic pain. Accenture researchers have been tracking ransomware strains, many of them requiring payment in Bitcoin or other cryptocurrencies, and they’ve concluded that they represent an incipient Iranian campaign against targets of opportunity that offer the prospect of quick financial gain. Tehran’s state-directed hackers have a reputation as being relatively less sophisticated than those run by Russia and China (and indeed those run by major Western powers, the Five Eyes and their closest friends) but they also have a reputation as determined fast-learners.

CCN: As the US gets ready to impose sanctions on Iran, hackers in that country are working on ransomware to secure bitcoin, according to cybersecurity experts interviewed by The Wall Street Journal.

Accenture PLC’s cybersecurity intelligence group has followed five Iranian built ransomware variations in the last two years. The hackers are hoping to secure payments in cryptocurrencies, according to Jim Guinn, who oversees the industrial cybersecurity business at Accenture.

Several clues link the ransomware to Iran. Samples include messages in Farsi that are connected to Iran based computers.

A recent Accenture report noted the ransomware could be driven by Iranian government supported parties, criminals, or both.

Scourge Continues

Ransomware has plagued both businesses and governments for years, having disabled payment systems at the San Francisco Municipal Transportation Agency, U.K hospitals and cargo shipments. Government supported hackers in some instances have obtained cryptocurrency payments from victims.

One variant of ransomware that iDefense discovered has been linked to Iran’s government, according to CrowdStrike Inc., another cybersecurity firm. The software, called Tyrant, was developed to discourage Iranian citizens from downloading software designed to discourage government snooping, CrowdStrike noted.

Palo Alto Networks Inc. and Symantec Corp. issued reports last month that described a pair of data stealing operations connected to Iran.

Crypto Mining Linked To Iran

Crypto mining software, which robs computers of their processing power to mine cryptocurrencies, has also been linked to Iran.

Accenture cited crypto mining software installed on Middle Eastern customer networks equipped with digital clues to Iran.

Crypto mining software has created problems in gas and oil facilities in the Middle East, Guinn said. He estimated millions of dollars of compute cycles have been stolen in the last year.

Iran Denies Culpability

Iran has claimed it has not been involved in cyber attacks, and that it has been a hacking victim.

A cyber attack called Stuxnet initiated by the U.S. and Israel about a decade ago disabled uranium-enrichment centrifuges for Iran’s nuclear program. Iran has since focused on enhancing its own cyber capabilities, according to government officials and security researchers.

Keith Alexander, chief executive of IronNet Cybersecurity Inc. and former director of the U.S. Cyber Command and the National Security Agency said crypto mining and theft is a way for cash-strapped countries to make fast profits.

Guinn said hackers have also stolen intellectual property.

Putin/Trump Arms Control then Sanctions

Leaked Document Reveals Putin Lobbied Trump on Arms Control

Vladimir Putin presented President Donald Trump with a series of requests during their private meeting in Helsinki last month, including new talks on controlling nuclear arms and prohibiting weapons in space, according to a Russian document obtained by POLITICO.

A page of proposed topics for negotiation, not previously made public, offers new insights into the substance of the July 16 dialogue that even Trump’s top advisers have said they were not privy to at the time. Putin shared the contents of the document with Trump during their two-hour conversation, according to a U.S. government adviser who provided an English-language translation. Details in the single page agenda for the meeting shows Mr. Putin remains interested in maintaining continued cooperation with the US on nuclear weapons.

A source who did not wish to be identified after obtaining the page translated from Russian into English by Politico, said: “This is, ‘We want to get out of the dog house and engage with the US on a broad range of security issues.” The document fails to address questions raised about what the Russian government meant last month when it said “cooperation in Syria” would be discussed between the two presidents and what they agreed to as a result.

Further murkiness fanned the flames of suspicion after Dan Coats, US Director of National Intelligence, told reporters he was “not in a position to either understand fully or talk about what happened in Helsinki.” Politico

Primer saludo entre Donald Trump y Vladimir Putin en el G20 | El Imparcial photo

Treaty Structure: The Treaty between the United States of America and the Russian Federation on Measures for the Further Reduction and Limitation of Strategic Offensive Arms also known as the New START Treaty.

Strategic Offensive Reductions: The Treaty between the United States of America and the Russian Federation on Measures for the Further Reduction and Limitation of Strategic Offensive Arms, also known as the New START Treaty, entered into force on February 5, 2011. Under the Treaty, the United States and Russia must meet the Treaty’s central limits on strategic arms by February 5, 2018; seven years from the date the Treaty entered into force. Each Party has the flexibility to determine for itself the structure of its strategic forces within the aggregate limits of the Treaty. These limits are based on the rigorous analysis conducted by Department of Defense planners in support of the 2010 Nuclear Posture Review.

Aggregate limits:

  • 700 deployed intercontinental ballistic missiles (ICBMs), deployed submarine-launched ballistic missiles (SLBMs), and deployed heavy bombers equipped for nuclear armaments;
  • 1,550 nuclear warheads on deployed ICBMs, deployed SLBMs, and deployed heavy bombers equipped for nuclear armaments (each such heavy bomber is counted as one warhead toward this limit);
  • 800 deployed and non-deployed ICBM launchers, SLBM launchers, and heavy bombers equipped for nuclear armaments.

Verification and Transparency: The Treaty has a verification regime that combines appropriate elements of the 1991 START Treaty with new elements tailored to the limitations and structure of this Treaty. Verification measures under the Treaty include on-site inspections and exhibitions, data exchanges and notifications related to strategic offensive arms and facilities covered by the Treaty, and provisions to facilitate the use of national technical means for treaty monitoring. To increase confidence and transparency, the Treaty also provides for an annual exchange of telemetry on an agreed number of ICBM and SLBM launches.

Treaty Duration: The Treaty’s duration is ten years, unless superseded by a subsequent agreement. The Parties may agree to extend the Treaty for a period of no more than five years. The Treaty includes a withdrawal clause that is standard in arms control agreements. The 2002 Moscow Treaty terminated when the New START Treaty entered into force.

No Constraints on Missile Defense and Conventional Strike: The Treaty does not constrain testing, development, or deployment of current or planned U.S. missile defense programs or long-range conventional strike capabilities.

What is the difference between a “Type One” and a “Type Two” inspection?

The New START Treaty provides for 18 on-site inspections per year. There are two basic types of inspections. Type One inspections focus on sites with deployed and non-deployed strategic systems; Type Two inspections focus on sites with only non-deployed strategic systems. Permitted inspection activities include confirming the number of reentry vehicles on deployed ICBMs and deployed SLBMs, confirming numbers related to non-deployed launcher limits, counting nuclear weapons onboard or attached to deployed heavy bombers, confirming weapon system conversions or eliminations, and confirming facility eliminations. Each side is allowed to conduct ten Type One inspections and eight Type Two inspections annually.

Meanwhile, standing with lab results and in solidarity with Britain:

FNC: Russia used “chemical or biological weapons” to try to assassinate a former British spy, the U.S. said on Wednesday, adding that new sanctions would be imposed on the country for the attack.

“Following the use of a ‘Novichok’ nerve agent in an attempt to assassinate UK citizen Sergei Skripal and his daughter Yulia Skripal, the United States, on August 6, 2018, determined under the Chemical and Biological Weapons Control and Warfare Elimination Act of 1991 (CBW Act) that the Government of the Russian Federation has used chemical or biological weapons in violation of international law or has used lethal chemical or biological weapons against its own nationals,” the State Department said in a statement.

“Following a 15-day Congressional notification period, these sanctions will take effect upon publication of a notice in the Federal Register, expected on or around August 22, 2018,” the department continued.

Skripal and his daughter were poisoned by the military-grade nerve agent in the British town of Salisbury in March.

Britain earlier accused Russia of being behind the attack, which the Kremlin has vehemently denied.

On March 15, President Trump, French President Emmanuel Macron and German Chancellor Angela Merkel and British Prime Minister Theresa May said in a joint statement that they “abhorred” the attack against Skripal.

“It is an assault on U.K. sovereignty and any such use by a State party is a clear violation of the Chemical Weapons Convention and a breach of international law. It threatens the security of us all,” the statement read.

Skripal was discharged from a U.K. hospital in May, following his daughter’s April release.

Since the March attack, two other British nationals with no ties to Russia have been poisoned by the substance.