Col. Kang Defects from North Korea, Manhunt Underway

Mr. Kang is likely under protection of the West and has offered key intelligence that has aided the United States, Japan and South Korea in the talks with the Kim regime.

One of North Korea’s most senior intelligence officials, who played a major role in building Pyongyang’s nuclear weapons program, has disappeared and is believed to have defected to France or Britain, according to sources. South Korean media identified the missing official as “Mr. Kang”, and said he is a colonel in North Korea’s State Security Department (SSD), also known as Ministry of State Security. Mr. Kang, who is in his mid-50s, enjoyed a life of privilege in North Korea, because he is related to Kang Pan-sok (1892-1932), a leading North Korean communist activist and mother to the country’s late founder, Kim Il-sung.

According to South Korean reports, Kang was in charge of North Korea’s counter-espionage operations in Russia and Southeast Asia, including China. He is also believed to have facilitated secret visits to Pyongyang by foreign nuclear scientists, who helped build North Korea’s nuclear weapons program. In recent years, Kang was reportedly based in Shenyang, the largest Chinese city near the North Korean border, which is home to a sizeable ethnic Korean population. According to reports, Kang led Unit 121, an elite North Korean hacker group based in Shenyang, with the aim of carrying out cyber-attacks without implicating North Korea. The South Korean-based DailyNK website said on Wednesday that Kang had been based at the Zhongpu International Hotel in Shenyang (until recently named Chilbosan Hotel), which has historically been operated through a joint Chinese-North Korean business venture and is known to host numerous North Korean government officials.

Chilbosan Hotel Shenyang (Shenyang) photo

But according to DailyNK, Kang disappeared from Shenyang in February and is now believed to have defected, possibly “to France or Great Britain”. The Seoul-based website said Kang took “a lot of foreign currency with him” as well as “a machine capable of printing American dollars”. Following Kang’s disappearance, the government in Pyongyang launched a worldwide manhunt for him, sending at least 10 agents to assassinate him before he is given political asylum in the West, said DailyNK. Pang’s family, including his wife and children, are believed to still be in Pyongyang.

***

While it is reported that North Korea has released 3 Americans from a labor camp to detention at a hotel from observation and deprogramming. There is no word on full release however, there is more going on with behind the scenes and that includes this defection along with the unit this Colonel worked for while living and stationed in China.

***

The North Korean hackers hit the systems of the Israeli energy company to attempt to penetrate the best electronic protection systems, South Korea’s newspaper Naver reported. According to the company’s experts, the North Korean cyber actors have real capabilities to damage the infrastructure of the United States, Japan and other countries.

Last year, experts warned that the North Korean cyber army could be far more dangerous to global security than its nuclear missiles. “North Korean cyberattacks and other malicious cyber activities pose a risk to critical infrastructure in countries around the world and to the global economy,” the statement said.

Since 2011, Pyongyang has been scaling up its cyber capacities. The North Korean regime is suspected to be exploiting its cyber weapons for political purposes to intimidate its opponents as well as to steal crypto-currency.

North Korean hackers are involved in major cyber offensives
In 2013, the three largest broadcasting companies and two banking institutions of South Korea suffered a massive attack against their systems. According to Shinhan Bank and Nonghyup Bank representatives, about 32,000 computers were infected while internet banking and ATMs stopped working. While Pyongyang still denies any involvement, cybersecurity experts pointed to North Korean group Lazarus.

In August 2014, North Korea hacked the Channel 4 to prevent the production of a drama depicting the fictional story of a nuclear scientist kidnapped in the country.

However one of the most advanced attacks was the intrusion into the network of Sony Corporation in September 2014. The malware destroyed 70% of information stored in the company’s computers. According to Jim Lewis, senior fellow at the Center for Strategic and International Studies, the attack turned out to be the worst of its type on a company on U.S. soil.

North Korean hackers raise funds for regime
International sanctions forced Kim Jong-un to look for alternative and illegal sources of financing. By late 2015, the North Korean hackers shifted their attention to the global financial system, according to researchers at BAE Systems, FireEye and Symantec.

In 2016, they were about to commit the most astonishing bank robbery in history. The cybercriminals were close to stealing a billion dollars from the Federal Reserve of New York and only a misprint in the word “foundation” kept them from it.

North Korean state-backed hackers have been also accused of the WannaCry ransomware attack that affected hundreds of thousands of computers worldwide in 2017. Taking into account large amounts of stolen money, it becomes clear that despite the growing political and economic pressure Pyongyang will be able to stay afloat for long.

“Winter is coming”
According to the commander of the US forces in South Korea, General Brooks, the North Korean military forces are currently capable of carrying out the most efficient and well-prepared cyber-attacks in the world.

Robert Hannigan, former director of the Center for Government Communication of Great Britain says that as of June 2017, North Korea had 1,700 state-sponsored hackers and more than 5,000 support staff personnel. They all operate under the Main Intelligence Department of North Korean Armed Forces, known as Unit 586. The so-called Bureau 121 is the main unit conducting cyberattacks abroad. The US Department of Homeland Security refers to this structure as Hidden Cobra, while private companies gave the common name Lazarus to all North Korean hackers. But no one exactly knows how many different subdivisions the North Korea’s cyber-army has.

Earlier this year, cybersecurity firm McAfee reported that hackers have targeted organizations involved in the 2018 Pyeongchang Winter Olympics, which are set to start this week.  The malicious actors attempted to obtain passwords and sensitive financial data. Speculations have risen that the North could be responsible amid anti-North Korean demonstrations in the Korean Republic and increasingly hostile rhetoric between Pyongyang and Washington.

Some analysts believe that the ongoing talks between Pyongyang and Seoul are Kim Jong-un ruse aimed to distract attention from the North Korea’s nuclear program and its malicious activities in cyberspace. But even if talks go smoothly, Pyongyang will never give up further development of its cyber weapons.

North Korea’s advanced cyber warfare capabilities could be truly scaring and risk escalating the crisis. As international bodies consider enforcing sanctions, Pyongyang continues its campaign of outright theft. Korean Olympic detente won’t last forever.

Next time when Kim Jong-Un feels trapped or insulted his cyber army will be ready to wreak havoc.

 

El Chapo Charged on his Drug Empire, but what About Murder?

Remember when Sean Penn decided he could befriend El Chapo Guzman and successfully plotted to interview him? Was Sean Penn ever debriefed by DEA or other law enforcement officials for more intelligence gathering on El Chapo? In fact this case is so dangerous that the jurors are to be sequestered and protected by U.S. marshals.

Related reading: 2009 Indictment from Illinois

Related reading: The case against Guzman in the Eastern District of New York does not have murder charges, only all offenses relating to the drug empire.

 

Moving ahead…         Mexico's El Chapo: From most wanted kingpin to extradited ... photo

Mexican drug lord Joaquin “El Chapo” Guzman may face murder charges after several former Mexican police officers accused him of killing six Americans and a DEA agent within a nine-week span in late 1984.

Three former Mexican police officers told the U.S. Attorney’s Office in Los Angeles they witnessed Guzman carry out the killing spree between late 1984 and early 1985. Jorge Godoy, one of the former cops who is now under witness protection, told WFAA that Guzman took pleasure in killing people.

“He likes to cut the people,” Godoy told the news site.

Four Americans who were Jehovah’s Witnesses — Benjamin Mascarenas, 29; his wife Pat Mascarenas, 27; Dennis Carlson, 32; and his wife Rose Carlson, 36 — were murdered during a missionary trip in Guadalajara, Mexico. Godoy said he was the bodyguard of drug kingpin Ernesto Fonseca at the time and the missionaries made the wrong decision of knocking on a drug lord’s door on Dec. 2, 1984.

He told WFAA he saw them rape the women and torture the Americans. He added that Guzman shot each person and watched their bodies fall into an open grave. Former DEA agent Hector Berrellez also said Guzman was involved in their deaths.

“He shot them with his Uzi 9mm and I have witnesses that were there that saw ‘El Chapo’ kill these four Americans after they had been severely tortured,” Berrellez told WFAA. “The women were even raped. We’re talking about an animal here.”

But the killings didn’t end there, according to Godoy. Two other Americans, John Walker, 35, and Albert Radelat, 33, were the crazed drug lord’s next targets in Jan. 30, 1985. Walker was a Vietnam veteran and two-time Purple Heart recipient in Guadalajara writing a novel at the time. He and Radelat went to La Langosta restaurant to have dinner — in what turned out to be a fatal mistake.

Drug lord Rafael Caro Quintero mistook the two for DEA agents and ordered them in the restaurant.

“[Walker and Radelat] passed by me and I said, ‘Oh my God,’” Godoy recalled.

He said Guzman cut Walker’s throat. He then wrapped them and buried the two people in a nearby park, according to the report.

The last killing involved DEA agent Enrique “Kiki” Camarena, who busted the cartel’s marijuana fields and torched 10,000 tons of marijuana that cost them about $5 billion. He and a pilot who took him to the fields were tortured, killed and their bodies dumped on the side of the road. “Absolutely, he [Guzman] tortured both of them,” Berrellez said. “[Guzman] was seen by two witnesses slap, kick and spit in Camarena’s face. He was involved in physically torturing Camarena.”

Camarena’s death sparked one of the biggest manhunts by the U.S. government.

The families of the six Americans told WFAA they want to see “El Chapo” charged with the murders. The drug lord had murder charges dropped before he was extradited to the U.S. The U.S. Attorney in Los Angeles did not comment on the possible charges to WFAA. A spokesman for the U.S. Attorney for the Eastern District of New York, where Guzman is awaiting trial, also declined to comment.

“El Chapo” pleaded not guilty to drug-related charges including money-laundering, use of firearms and murder conspiracy.

*** There is also the case of Rafael Caro Quintero : Despite being wanted in the U.S. for Camarena’s murder, Mexico’s Supreme Court in 2013 overturned the ruling that voided Caro Quintero’s conviction and led to his release. Once freed, Caro Quintero quickly disappeared and his current whereabouts are unknown.

The Drug Enforcement Administration is offering a reward of up to $5 million for information leading to his arrest and/or conviction.

“DEA and Treasury utilize every possible tool to attack and dismantle violent, deadly criminal organizations such as that of Rafael Caro Quintero, who is responsible for the 1985 murder of DEA Special Agent Enrique ‘Kiki’ Camarena,” DEA Deputy Administrator Jack Riley said. “Thanks to this Treasury action, Diana Espinoza Aguilar has been exposed as a key enabler and facilitator for Caro-Quintero and his vicious global drug trafficking and money laundering regime.”

A founder of the now-defunct Guadalajara cartel, Quintero spent 28 years in jail for the 1985 murder of DEA agent Kiki Camarena, but was unexpectedly released in 2013 – to the disgust of the US government – and promptly disappeared. Today the ageing narco is said to be hiding out somewhere in the golden triangle, intent on reimposing old school narco order in Sinaloa. “There is no logic to what is happening,” the record producer said. “The sense I get is of an atmosphere of pending war.” Luís agrees. He spent 10 years as one of El Chapo’s gunmen, loading drugs on to planes heading to the US as well as torturing and killing cartel members who stepped out of line. Luis has retired and complains of nightmare flashbacks to his days as a killer, but he still keeps in contact with the few members of his old crowd who are still alive. They tell him all is not well in the cartel. “Before all the cows went in one direction. Now there are too many cowboys,” he said, sipping a beer and fiddling with a joint. “There will always be drugs moving, for as long as it is not legal, but I see a lot of weakness, a lot of internal disputes and mistreatment of the local population and that creates problems too.” Luis said that while the police were as accommodating as ever, new tactics being used by the federal government were causing problems. Time was, he said, when soldiers would help cartel members load up drug shipments “for a beer and a woman”. Now, however, he said army units were rotated so often that deals with corrupt commanders had to be constantly renegotiated.

 

 

Approval Process for Cyberwarfare Challenged

Cyber is a real battlefield and yet it gets almost zero ink in the media. The reason is due in part to exposing vulnerabilities, forced ransoms and stolen data.

NotPetya could be the beginnings of a new kind of ... photo

Just a couple of years ago: Chet Nagle, a former CIA agent and current vice president of M-CAM, penned an article in the Daily Caller, stating, “At FBI headquarters in July, the head of FBI counterintelligence, Randall Coleman, said there has been a 53% increase in the theft of American trade secrets, thefts that have cost hundreds of billions of dollars in the past year. In an FBI survey of 165 private companies, half of them said they were victims of economic espionage or theft of trade secrets — 95% of those cases involved individuals associated with the Chinese government.”

The threats all appear to have a foreign genesis and the United States does not have a real cyber policy due in part to debates over whether cyber attacks are acts of war. Can the United States fight back with her own cyber weapons? Not really, kinda, maybe.

Tracking the theft is left to the FBI, while responding is left to the U.S. Cyber Command. Army Lt. Gen. Paul Nakasone is the head of Cyber Command facing strategic threats from Russia, China, North Korea and Iran. During his confirmation hearings, Nakasone was grilled on how he would position the agencies to confront mounting Russian aggression in cyberspace, whether through attempted interference in U.S. elections or targeting the electric grid and other critical industrial systems.

Members of the White House’s National Security Council are pushing to rescind Presidential Policy Directive 20, an important policy memorandum that currently guides the approval process for government-backed cyberattacks, three current U.S. officials familiar with the matter tell CyberScoop.

The effort is driven in part by a desire from some NSC staff to create a more streamlined channel for military leaders to get their offensive cyber operations greenlit, insiders familiar with the matter said. The sources spoke under the condition of anonymity to freely discuss sensitive national security matters.

The move comes as lawmakers openly question whether U.S. Cyber Command, the nation’s premier cyber warfare unit, is hamstrung from responding to Russian meddling due to bureaucratic red tape. CyberScoop previously reported that multiple congressional committees are considering policies that could empower the military’s cyber mission.

But the push for change faces resistance from the intelligence community and several other federal agencies involved in cybersecurity.

Senior U.S. intelligence officials have expressed concerns over what rescinding the directive will mean for their own active computer spying missions. These covert operations, which are typically pursued by intelligence agencies like the CIA or NSA, could be exposed by the launch of “louder” disruptive-style attacks from the military. The presence of multiple hacking teams simultaneously targeting a single network often makes it easier for them all to be discovered by the victim.

Prior reporting by CyberScoop has shown that a long-running turf war exists between different federal agencies regarding the proper use of hacking tools in order to protect the homeland.

Even before Trump came to office though, the framework in question was considered a source of frustration inside the Pentagon.

Signed by President Barack Obama in 2012, the directive’s critics say that it was written in a confusing manner that leaves open-ended questions. In addition, critics tell CyberScoop that too many federal agencies are allowed to weigh in on proposed cyber operations, causing “even reasonable” plans to be delayed or outright rejected.

Insiders who are resistant to eliminating the directive admit that PPD-20 is flawed, but fear change because they’ve not seen a replacement plan.

“Better the devil you know, or something like that,” a former U.S. official said. “This is such a crucial decision because whatever comes next will dictate how arguments are settled inside government … you have the military on one side and the IC on the other.”

The NSC, CIA and Office of the Director of National Intelligence declined to comment. The NSA referred CyberScoop to U.S. Cyber Command, who in turn did not respond to a request for comment.

Currently, PPD-20 requires U.S. government agencies to run approvals for offensive operations through a chain of command that stretches across the federal government. The process is largely focused on controlling those operations that go beyond the confines of everyday digital espionage, or computer exploitation, to simply collect information.

According to PPD-20, if an operation is considered “of significant consequence,” it requires the direct blessing of the president in addition to the interagency group. Hacking operations that, for example, shut down a power grid or cause equipment to explode would fit into such a description. But experts say it also includes less flashy tactics like deleting data or corrupting software in a destructive manner.

“This directive pertains to cyber operations, including those that support or enable kinetic, information, or other types of operations,” PPD-20 reads. “The United States has an abiding interest in developing and maintaining use of cyberspace as an integral part of U.S. national capabilities to collect intelligence and to deter, deny, or defeat any adversary.”

After coming under scrutiny last month, outgoing NSA Director Adm. Michael Rogers told lawmakers that there’s an “ongoing policy discussion” about redrawing the regulations looming over military cyber operations. Unlike conventional military activities, the internet makes it difficult for policymakers to draw clear cut boundaries. This challenges also runs up against longstanding laws that underpin, and therefore divide, the work of soldiers and spies.

Historically, intelligence agencies — empowered by Title 50 of the U.S. Code — have led the way on U.S.-backed hacking that occur in countries like Iran or China; where armed conflict is absent. Military operations fall under the purview of Title 10 of the U.S. Code.

It’s not clear whether giving military leaders more leeway to conduct hacking operations will ultimately make those units more effective at their missions. The details surrounding these activities are always classified, which inhibits the public from having a substantive policy debate.

Ultimately, the decision to eliminate PPD-20 falls solely to the executive branch. Sources tell CyberScoop no final decision has been made.

What makes PPD-20 difficult to analyze is the fact that it remains a classified document, despite it being leaked by NSA whistleblower Edward Snowden. The classification means current officials are barred from publicly commenting on it.

Thomas Rid, a professor of strategic studies at Johns Hopkins University, said that Snowden’s PPD-20 leak was notable because it revealed the U.S. government’s thought process behind “the rise of unwanted norms caused by escalatory cyberattacks.”

“Reading between the lines, the framework acknowledges the negative effect on global cyber norms that events like Stuxnet can cause because of escalation,” said Rid.

Rid also believes the directive was “naïvely constructed,” relying too much on the idea that cyberattacks only impact other machines, and not people.

“When you look at what’s happened in 2016, and really since then, it makes the people who wrote PPD-20 seem like they don’t understand the current threat environment where Russia, and to some degree Iran, are combining active measures with cyber to change public perception,” he told CyberScoop. “Russia is basically kicking the U.S.’ ass.”

7 States Suing Over DACA, Know the Details

There are countless lawsuits already and here comes another. Several DACA cases have been ruled against by liberal judges. Now Texas has joined other states.

 

TX v USA Re DACA Complaint 050118 by Kaitlyn on Scribd

Perhaps those judges have not read all the real details of DACA.

Renewal deadline approaching for DACA applicants photo

DACA is a request for consideration, it is NOT an automatic approval and it is temporary. See the stipulations here.

DACA banner with forms

Guidelines

You may request DACA if you:

  1. Were under the age of 31 as of June 15, 2012;
  2. Came to the United States before reaching your 16th birthday;
  3. Have continuously resided in the United States since June 15, 2007, up to the present time;
  4. Were physically present in the United States on June 15, 2012, and at the time of making your request for consideration of deferred action with USCIS;
  5. Had no lawful status on June 15, 2012;
  6. Are currently in school, have graduated or obtained a certificate of completion from high school, have obtained a general education development (GED) certificate, or are an honorably discharged veteran of the Coast Guard or Armed Forces of the United States; and
  7. Have not been convicted of a felony, significant misdemeanor,or three or more other misdemeanors, and do not otherwise pose a threat to national security or public safety.

***

The Obama administration chose to deploy DACA by Executive Branch memorandum—despite the fact that Congress affirmatively rejected such a program in the normal legislative process on multiple occasions. The constitutionality of this action has been widely questioned since its inception.

DACA’s criteria were overly broad, and not intended to apply only to children. Under the categorical criteria established in the June 15, 2012 memorandum, individuals could apply for deferred action if they had come to the U.S. before their 16th birthday; were under age 31; had continuously resided in the United States since June 15, 2007; and were in school, graduated or had obtained a certificate of completion from high school, obtained a General Educational Development (GED) certificate, or were an honorably discharged veteran of the Coast Guard or Armed Forces of the United States. Significantly, individuals were ineligible if they had been convicted of a felony or a significant misdemeanor, but were considered eligible even if they had been convicted of up to two other misdemeanors.

The Attorney General sent a letter to the Department on September 4, 2017, articulating his legal determination that DACA “was effectuated by the previous administration through executive action, without proper statutory authority and with no established end-date, after Congress’ repeated rejection of proposed legislation that would have accomplished a similar result. Such an open-ended circumvention of immigration laws was an unconstitutional exercise of authority by the Executive Branch.” The letter further stated that because DACA “has the same legal and constitutional defects that the courts recognized as to DAPA, it is likely that potentially imminent litigation would yield similar results with respect to DACA.”

Based on this analysis, the President was faced with a stark choice: do nothing and allow for the probability that the entire DACA program could be immediately enjoined by a court in a disruptive manner, or instead phase out the program in an orderly fashion. Today, Acting Secretary of Homeland Security Duke issued a memorandum (1) rescinding the June 2012 memo that established DACA, and (2) setting forward a plan for phasing out DACA. The result of this phased approach is that the Department of Homeland Security will provide a limited window in which it will adjudicate certain requests for DACA and associated applications for Employment Authorization Documents meeting parameters specified below.

  • Please see the USCIS website for the latest information about DACA.

 

How Israel Obtained the Iran Nuclear Documents

Note, Israel was told about the documents and the warehouse, likely by the MEK. The MEK and the Mossad often perform joint operations. For context on the MEK operations:

The MEK’s Role Was Critical in Preventing Iran From Obtaining a Nuclear Bomb

The MEK has been instrumental in exposing Iran’s nuclear weapons program. Relying on a vast network inside Iran, MEK revelations of the weapons program significantly contributed to the world peace and the national security of the United States.

These revelations triggered the International Atomic Energy Agency (IAEA) inspections of the uranium enrichment facility in Natanz and Heavy Water Facility in Arak in 2002 for the first time, and since then, the majority of the visits by the IAEA inspection teams have been to the sites first exposed by the MEK.

Senior U.S. officials including President Bush, Vice President Dick Cheney, and Secretary of State Condoleezza Rice have repeatedly pointed to the role the MEK had played in getting the world attention on Iran’s nuclear weapons program.

In March 2005, President, George W. Bush, emphasized that the MEK’s revelation of Natanz prompted an international
campaign to stop the nuclear weapons program of Iran. “Iran has concealed its — a nuclear program. That became discovered, not because of their compliance with the IAEA or NPT, but because a dissident group pointed it out to the world.”

Many of the key front companies exposed by the MEK such as Mesbah Energy, Novin Energy, Kalaye Electric, Kavoshyar Company, and Farayand Technique were eventually sanctioned by the Treasury Department. In July 2011, the MEK exposed a new nuclear organization overseeing the entire nuclear program and run by the military, known as SPND. The U.S. Government designated that entity in 2014. In addition, many companies, key nuclear experts, and military institutions exposed by the MEK have been sanctioned by the United Nations Security Council resolutions 1737, 1747, and 1803.

If it were not for the MEK nuclear revelations, Tehran would have had the bomb by now. Congressman Brad Sherman (D-CA) told a House Foreign Affairs Committee Hearing “We all owe a debt of gratitude to the MEK for bringing this information to the world, and causing the United States and the world to focus on the problem.” More here.

Trump to Make Historic Visit to Western Wall in Jerusalem - NBC News photo

Israeli Prime minister Benjamin Netanyahu briefed President Trump two months ago on the capture of the Iranian “nuclear archive,” and decided to publicly expose the documents yesterday due to Trump’s May 12th deadline on possible U.S. withdrawal from the Iran nuclear deal.

Between the lines: An Israeli official tells me Israel wanted to publicly release the new intelligence after White House visits from French President Macron and German Chancellor Merkel, both of whom tried to convince Trump not to withdraw. “We are facing a major decision by President Trump regarding the nuclear deal. Last week was for the Europeans, and this week is our week,” the official said.

  • During a meeting at White House on March 5th, Netanyahu presented Trump and his senior cabinet members — Vice President Pence, Secretary of Defense Mattis, then-Secretary of State Tillerson and then-National Security Adviser McMaster — with an initial analysis of the “Nuclear archive,” a senior Israeli official tells me.
  • Netanyahu spoke to Trump over the phone last Saturday and told him he would publish the intelligence later in the week.
  • A day later he met in Tel-Aviv with Secretary of State Pompeo and gave him a similar update. An Israeli official said the timing of the publication was coordinated with the White House.

How the documents were seized

The Israeli Mossad discovered the existence of an Iranian “Nuclear archive” in February 2016, a short time after the nuclear deal started being implemented.

  • Israeli officials say the Mossad received intelligence that showed the Iranians were trying to hide all documents concerning the military dimensions of their nuclear program.
  • The official said that in a highly secret operation known to a handful of Iranian officials, the Iranians transferred tens of thousands of documents and CD’s from several different sites around the country to a civilian warehouse in Tehran. The Israeli official said the Iranians did all that because they were afraid IAEA inspectors would find the documents.
  • The Mossad put the warehouse under surveillance and started preparing for a possible operation to seize the documents. According to Israeli officials, more than 100 Mossad spies worked on this operation and, in January 2018, it was implemented.
  • A senior Israeli intelligence official said the Mossad managed to put its hands on most of the documents in the warehouse. “We didn’t take everything because it was too heavy”, he said.

Coordination with the U.S.

  • An Israeli official said the CIA and the White House knew about the Israeli efforts to capture the “Iranian nuclear archive,” and Israel briefed the U.S. immediately after the successful operation.
  • At the same time Netanyahu was briefing Trump and his top officials, the Mossad gave the CIA copies of all the 100,000 documents it obtained.
  • At the beginning of February, the Mossad started translating and analyzing the documents, most of were written in Persian. A special team with 50 analysts was formed in the Mossad and, according to an Israeli official, a separate team is working in the CIA. Both intelligence agencies still haven’t finished analyzing the documents.

The Israeli official said: “The documents will a very strong proof that there was a military nuclear program in Iran. Such proof that the Iranians will not be able to deny.”