Hacking the Department of Energy, the Threat to You

The USDOEnergy is a cabinet level department and while responsibility includes power, laboratories, it includes nuclear. The agency secretary is Earnest Moniz, most notable for being at the side of John Kerry during the Iran nuclear talks.

Hacking this agency is terrifying and added into this equation, in 1999 the FBI investigated how China obtained specific specifications for a particular nuclear device from Los Alamos National Laboratory.

Records: Energy Department struck by Cyber Attacks

USAToday: Attackers successfully compromised U.S. Department of Energy computer systems more than 150 times between 2010 and 2014, a review of federal records obtained by USA TODAY finds.

Cyber attackers successfully compromised the security of U.S. Department of Energy computer systems more than 150 times between 2010 and 2014, according to a review of federal records obtained by USA TODAY.

Incident reports submitted by federal officials and contractors since late 2010 to the Energy Department’s Joint Cybersecurity Coordination Center shows a near-consistent barrage of attempts to breach the security of critical information systems that contain sensitive data about the nation’s power grid, nuclear weapons stockpile and energy labs.

The records, obtained by USA TODAY through the Freedom of Information Act, show DOE components reported a total of 1,131 cyberattacks over a 48-month period ending in October 2014. Of those attempted cyber intrusions, 159 were successful.

“The potential for an adversary to disrupt, shut down (power systems), or worse … is real here,” said Scott White, Professor of Homeland Security and Security Management and Director of the Computing Security and Technology program at Drexel University. “It’s absolutely real.”

Energy Department officials would not say whether any sensitive data related to the operation and security of the nation’s power grid or nuclear weapons stockpile was accessed or stolen in any of the attacks, or whether foreign governments are believed to have been involved.

“DOE does not comment on ongoing investigations or possible attributions of malicious activity,” Energy Department spokesman Andrew Gumbiner said in a statement.

In all cases of malicious cybersecurity activity, Gumbiner said the Energy Department “seeks to identify indicators of compromise and other cybersecurity relevant information, which it then shares broadly amongst all DOE labs, plants, and sites as well as within the entire federal government.”

The National Nuclear Security Administration, a semi-autonomous agency within the Energy Department responsible for managing and securing the nation’s nuclear weapons stockpile, experienced 19 successful attacks during the four-year period, records show.

While information on the specific nature of the attacks was redacted from the records prior to being released, numerous Energy Department cybersecurity vulnerabilities have been identified in recent years by the department’s Office of Inspector General, an independent watchdog agency.

After a cyber attack in 2013 resulted in unauthorized access to personally identifying information for more than 104,000 Energy Department employees and contractors, auditors noted “unclear lines of responsibility” and “lack of awareness by responsible officials.” In an audit report released in October of last year, the Inspector General found 41 Energy Department servers and 14 workstations “were configured with default or easily guessed passwords.”

Felicia Jones, spokeswoman for the Energy Department Office of Inspector General, said while there have been some improvements, “threats continue and the Department cannot let down its guard.”

Records show 53 of the 159 successful intrusions from October 2010 to October 2014 were “root compromises,” meaning perpetrators gained administrative privileges to Energy Department computer systems.

Manimaran Govindarasu, a professor in the Department of Electrical and Computer Engineering at Iowa State University who studies cybersecurity issues involving the power grid, said the root compromises represent instances where intruders gained “super-user” privileges.

“That means you can do anything on the computer,” he said. “So that is definitely serious. Whether that computer was critical or just a simple office computer, we don’t know.”

Govindarasu said while there could be information in Energy Department computer systems concerning security plans or investments related to the nation’s power grid, the grid’s real-time control systems are operated by utilities and are not directly connected to the Energy Department’s computer systems.

The Energy Department federal laboratories, however, sometimes pull data on the operation of the grid from utilities for research and analysis.

Records show 90 of the 153 successful cyber intrusions over the four-year period were connected to the DOE’s Office of Science, which directs scientific research and is responsible for 10 of the nation’s federal energy laboratories.

A USA TODAY Media Network report in March found a physical or cyber attack nearly once every four days on the nation’s power infrastructure, based on an analysis of reports to the U.S. Department of Energy through a separate reporting system which requires utility companies to notify the federal agency of incidents that affect power reliability.

Amid mounting concerns, the oversight and energy subcommittees of the House Committee on Science, Space and Technology will hold a joint hearing at 10 a.m. Thursday to examine vulnerabilities of the national electric grid and the severity of various threats.

The congressional committee’s charter for Thursday’s meeting, citing USA TODAY’s report in March, notes the growing vulnerability of the nation’s increasingly sophisticated bulk electric system.

“As the electric grid continues to be modernized and become more interconnected,” the charter states, “the threat of a potential cybersecurity breach significantly increases.”

Now Hiring, Clinton Email Handlers

This appears as though a payroll cost to hire these people could be in the range of $500,000. Send the bill to the Clinton Foundation.

(By the way, as you read below, Janice Jacobs was the woman who did the Lois Lerner, IRS emails)

Is it only me that wonders how come no one is talking about a search warrant or gathering the meta-data from Hillary’s Blackberry phone, her iPhone and her iPad? It is notable, all photos of Hillary communicating have been through portable devices and not on a laptop or desktop computer. Hello???

As the world turns in Washington DC, the State Department is spun out of control.

Exclusive: U.S. to shift 50 staff to boost office handling Clinton emails

The U.S. State Department plans to move about 50 workers into temporary jobs to bolster the office sifting through Hillary Clinton’s emails and grappling with a vast backlog of other requests for information to be declassified, officials said on Tuesday.

The move illustrates the huge administrative burden caused by Clinton’s decision to use a private email address for official communications as secretary of state and a judge’s ruling in a Freedom of Information Act (FOIA) lawsuit that they be released.

Clinton on Tuesday for the first time apologized for her use of private email, telling ABC News: “That was a mistake. I’m sorry about that.” The news channel reported the comment before broadcast of the full interview at 6:30 p.m. ET.

The extra staff will not work on the monthly, court-ordered release of Clinton emails, which are being handled by about 20 permanent, and 30 part-time, workers, officials said. The new staff will fill in for those workers and may also handle other Clinton FOIA requests.

The front-runner to be the Democratic presidential candidate in the 2016 election has been heavily criticized since it emerged in March that she used the private set-up rather than a government-issued email address.

In a notice to employees on Sept. 2, the State Department advertised for people with skills in coordinating and assessing FOIA requests and deciding if information may be declassified and released to the public.

The notice, a copy of which was obtained by Reuters, is entitled “Enhancing Transparency: Immediate Detail Opportunities At State” and calls for workers to apply for reassignment for 9 to 12 months. Applications are due on Thursday and the agency plans to make selections by Sept. 18.

In addition to filling in for workers pulled from their normal duties to handle the crush of work from the Clinton emails, officials said the extra staff would help the department grapple with a surge in FOIA requests more generally, related litigation and a huge backlog of information requests.

On Tuesday, Secretary of State John Kerry announced that he was naming Ambassador Janice Jacobs to serve as the State Department’s “transparency coordinator” to help the agency respond to FOIA and congressional requests more efficiently.

Embedded image permalink

The agency had an overall backlog of 10,045 FOIA requests at the end of fiscal year 2014 on Sept. 30, up about 15.8 percent from the previous year, according to its FOIA reports.

There is more of course…..

Lawsuit asks how Clinton lawyer got OK to store classified emails

A new lawsuit is demanding that the State Department explain how Hillary Clinton’s private attorney, David Kendall, got permission from the State Department to retain copies of Clinton’s emails after the agency determined some of them were classified.

The suit was filed Monday in U.S. District Court in Washington by freelance journalist David Brown, who sent State a Freedom of Information Act request last month asking for all records about the decision to allow Kendall to retain a thumb drive containing copies of about 30,000 emails Clinton turned over to State in December.

Kendall said in a letter to Congress recently that on July 8, the State Department provided him and his law partner Katherine Turner with a safe to hold the drive. He said both he and Turner have “TOP SECRET” clearances.

After a request from the FBI to return all copies of the emails, Clinton instructed Kendall to give up the thumb drive, which he did in early August.

Lawyers who represent clients in national security cases say it’s highly unusual for a private attorney to be given permission to hold classified records.

“If one of us tried to do this, we’d have our clearance yanked that very day and have a search warrant served on us and something different happened here,” said Brown’s attorney Kel McClanahan. “Not only agree did [State] allow him to maintain these records, but it’s unclear if they even pushed back. … We decided somebody needs to get to the bottom of what exactly happened here. What is it: favoritism or did David Kendall somehow satisify some requirement that others of us never even knew to aim for?”

Kendall and the Clinton campaign did not immediately respond to requests for comment on the case.

State agreed to “expedite” Brown’s FOIA request, but has not released any records about the agency’s decisionmaking on the issue, according to Brown’s complaint (posted here).

A State spokesman declined to comment, citing a policy of not commenting on ongoing litigation.

Brown’s work has appeared previously in the Atlantic and just Tuesday on the New York Times op-ed page. The former Army paratrooper is–under the pseudonym D.B. Grady–also the co-author with Marc Ambinder of a 2013 book on government secrecy, “Deep State.”

Read more: http://www.politico.com/blogs/under-the-radar/2015/09/lawsuit-asks-how-clinton-lawyer-got-ok-to-store-classified-info-213425#ixzz3lCnNCQ00

Read more: http://www.politico.com/blogs/under-the-radar/2015/09/lawsuit-asks-how-clinton-lawyer-got-ok-to-store-classified-info-213425#ixzz3lCnEF5oR

 

Example: Depths of Chinese Hacking the U.S.

Former Top FBI Lawyer and Counterintelligence Official Admits Chinese Hacked His Home Computer

September 8, 2015

China Allegedly Hacked Top Former FBI Lawyer 

Jeff Stein, Newsweek

Marion “Spike” Bowman, a top former FBI lawyer and U.S. counterintelligence official who heads an influential organization of retired American spies, says a hacker from China penetrated his home computer, beginning with an innocent-looking email last spring.

“It was an email supposedly from a woman in China, and I exchanged correspondence with her a couple of times,” says Bowman, who was deputy general counsel to three FBI directors between 1995 and 2006. “She sent me a document that a friend of hers had supposedly written, in English, and wanted my opinion on it,” he tells Newsweek. She also sent him her picture.

“I never got around to replying, so I never heard from her again,” says Bowman, who went on to become deputy director of the National Counterintelligence Executive, which is tasked with developing policies to thwart foreign spies and terrorists.

But then, a week ago, he says, he got another message from China via his email account at George Washington University, where he has lectured on national security law since 2003.

“It was apparently from a university in China asking me come to speak at a conference on the environment”—not even remotely one of his areas of expertise, Bowman says. He called the FBI.

After a forensic examination of his machine, the FBI told him “they had found a malware type that’s designed to find out what’s on my computer,” Bowman says. “It wasn’t anything to infect it.” Still, just being able to read the contents of a target’s computer can reveal lots of valuable information like emails and documents, contact files with phone numbers and other personal data, like home addresses.

“Somebody who really knows what they’re doing” can wreak havoc, he says.

The FBI didn’t tell him exactly who was behind the hack, he says, “but they think they identified the woman” in a picture she sent along with one of her emails last spring. “It was somebody that they knew,” Bowman says. “I didn’t inquire any further.”

Before joining the FBI, Bowman was a Navy lawyer assigned to advise SEAL teams on clandestine operations, among other sensitive matters. His portfolio at the FBI gave him intimate knowledge of the details of operations to counter threats from foreign spy agencies.

“I still carry lots of deep Cold War secrets in my head,” he says, although not on his computer. But he is still very active in national security circles as chairman of the board of directors of the Association of Former Intelligence Officers, an organization with several thousand members nationwide, about half of them former CIA personnel.

Bowman’s revelation follows several months of bad news about the vulnerability of government computers to foreign hackers, the latest being a report published Monday saying that Chinese and Russian intelligence agencies are “aggressively aggregating and cross-indexing hacked U.S. computer databases” to catch American spies working overseas. China-based hackers breached about 22 million files held by the federal Office of Personnel Management, officials say.

“At least one clandestine network of American engineers and scientists who provide technical assistance to U.S. undercover operatives and agents overseas has been compromised as a result” of the Russian and Chinese exploitation of the files, the Los Angeles Times reported, citing two U.S. officials.

The story, Bowman says, was “pretty much on target.”

*** It obviously is much worse than we know for the Obama administration to sign off on a sanction and or other consequence ahead of the Xi’s visit to the United States next week.

U.S. may punish Chinese hacking before Xi’s visit

Imposing sanctions before this month’s summit could derail other priorities.

Top government officials are floating the idea of retaliating within the next week to Chinese cyberattacks, possibly by imposing targeted sanctions on some officials and firms, people familiar with the discussions say. But outside experts say it would be wiser to wait until after this month’s White House summit with Chinese President Xi Jinping.

“I heard from one person that it could be as early as next week,” Jim Lewis, director of the Center for Strategic and International Studies’ Strategic Technologies Program, told POLITICO. He added, “I still think it would be best to wait for the summit.”

Calls for U.S. retalation to Chinese hacking have risen to a furor since the China-linked breach of highly sensitive security clearance forms from 21.5 million current and former federal employees, disclosed in June.

But imposing sanctions before the late-September summit would risk derailing a serious conversation on cyber issues along with myriad other topics, including China’s economic troubles, Chinese belligerence in the South China Sea and cooperation on climate change.

Some China watchers even suspect that the White House is trying to improve its bargaining position in advance of the summit by floating the possibility of sanctions in a serious way.

“My sense is that they’re floating the idea to try to create some kind of leverage in the meetings,” said Adam Segal, a China scholar and director of the Digital and Cyberspace Policy Program at the Council on Foreign Relations.

If the White House did impose sanctions before the meeting, it would be deeply embarrassing to the Chinese and to Xi personally and risk the Chinese doing something to downgrade the summit’s importance, Segal said. “I think if they’re going to do it before the summit, they’ve got to be prepared for the summit to really take a downward turn,” he said.

Business leaders are also dubious about imposing sanctions before Xi’s visit.

The White House should use the summit “as an opportunity to engage in effective dialogue on the cyber issue. If sanctions jeopardize that opportunity, we’d rather see them put it off,” the leader of a major industry organization said in an interview, speaking without attribution because he was speculating about government policy.

If the White House ultimately imposes targeted sanctions, the association leader added, the sanctions should be “based on transparent, credible evidence that’s legally sound.” They should also be designed with a clear path forward that, ultimately, leads to fewer China-linked cyberattacks, he said.

“Most business executives we’ve spoke with felt the indictments against Chinese PLA officers didn’t meet that test,” he added, referring to the May 2014 U.S. indictments of five hackers employed by China’s People’s Liberation Army. That was the Obama administration’s most significant diplomatic strike against Chinese hacking to date.

“[The indictments] didn’t seem to advance anything and they seemed to increase tension rather than reduce it around the issue,” the official said.

In the wake of the OPM hacks, some political leaders have called for much more belligerent responses to Chinese hacking. They include GOP White House contenders Mike Huckabee, who has urged the U.S. to hack back against the communist nation, and Wisconsin Gov. Scott Walker, who has suggested canceling the Obama-Xi summit entirely.

But even cyber hawks warned that aggressive action could backfire in advance of the summit.

“I think everything is going to basically be on hold until the Iran deal goes through and until after President Xi comes to meet with [President Obama],” said Rep. Dutch Ruppersberger (D-Md.), who was formerly ranking member on the House Intelligence Committee.

Ruppersberger added that “we have to eventually draw a line on cyberattacks,” and that the U.S. bargaining position relative to China may be improved now because of the tailspin in the Chinese stock market and other financial difficulties.

The White House has routinely declined to speak publicly about the possibility of sanctioning China for cyberattacks or any more forceful follow-up to the PLA indictments. Press secretary Josh Earnest has said several times that Obama plans to raise cyber concerns with Xi during their summit.

“There’s no doubt that the president will certainly raise, as he has in every previous meeting with his Chinese counterpart, concerns about China’s behavior in cyberspace,” Earnest said during an Aug. 26 news conference.

White House officials have determined they must respond to China’s hacking of OPM, but have been debating for months what the appropriate response should be and when to impose it, Lewis said.

The option of targeted cyber sanctions, which Obama created by executive order in April, has long been on the table along with additional indictments or some form of diplomatic protest, he said.

White House officials have fingered China for the OPM hack anonymously but have not done so, thus far, on the record.

A forceful response to the OPM hack and to Chinese theft of U.S. companies’ intellectual property and trade secrets has also been delayed by more pressing diplomatic priorities, Lewis said, including securing Chinese cooperation for a deal to halt Iran’s nuclear weapons program

“This administration has done more than any other on cybersecurity, but, in a lot of cases, it ends up being No. 2 because of the need to get agreement on other things,” Lewis said. “Cyber always ends up coming in second place, particularly when it comes to China.”

 

 

 

 

 

Iran, al Qaeda, Obama and Death of Americans

How Many US Troops Were Killed By Iranian IEDs in Iraq?

DefenseOne: Explosively formed penetrators — a particularly deadly form of roadside bomb — killed 196 American soldiers in Iraq over a five-and-a-half-year period, according to recently declassified Pentagon documents.

That’s about half as many deaths as lawmakers have attributed to the bombs, which U.S. officials say were largely supplied by Iran’s elite Quds Force.

The carnage wrought by EFPs returned to the news over the summer, as opponents of the nuclear deal with Iran cited Tehran’s behind-the-scenes actions against U.S. troops during Operation Iraqi Freedom as a reason to scuttle the agreement. Sen. Ted Cruz, a Texas Republican who is also running for president, and others in Congress have said that EFPs had killed more than 500 troops.

“I understand that the Joint Personnel Recovery Agency has a classified list of roughly 500 American soldiers who were murdered by Iranian IEDs,” Cruz said at a July 29 Senate Armed Services Committee hearing.

But data from U.S. Central Command, which runs U.S. military operations in the Middle East, suggests the actual toll is far less. According to the first comprehensive accounting, between November 2005 and December 2011, 1,526 EFPs killed a total of 196 U.S. troops and injured 861.

Between October 2006 and September 2007, EFPs killed 97 U.S. troops and wounded more than 300 soldiers. EFP attacks peaked in March, April and May 2008, near the end of the American troop surge, when 200 of the bombs were detonated. The deadliest month was April 2008, when EFPs killed 15 U.S. soldiers.

The Pentagon attributes the presence of EFPs in Iraq to the Quds Force, the special forces arm of the Iranian Revolutionary Guard led by Qasem Suleimani. Various EFP “factories” were found throughout Iraq during Operation Iraqi Freedom. Still, the exact degree to which Iran bears culpability for arming Shia militias in Iraq with EFPs and related equipment is a matter of some dispute.

“We weren’t always able to attribute the casualties that we had to Iranian activity, although many times we suspected it was Iranian activity, even though we didn’t necessarily have the forensics to support that,” Gen. Joseph Dunford, the incoming chairman of the Joint Chiefs of Staff, said at his July 9 confirmation hearing. During the hearing, Dunford said the numbers of American soldiers killed by Iran “has been recently quoted as about 500.”

A few weeks later at the July 29 hearing, Gen. Martin Dempsey, the outgoing Joint Chiefs chairman, said “several hundred” American forces were killed by EFPs.

The arrival of EFPs on the Iraqi battlefield around 2005 came as a shock to U.S. planners. Along with more run-of-the-mill improvised explosive devices, the deadly bombs drove a crash effort to create and deploy vehicles with far better armor.

Whereas most roadside bombs send energy and shrapnel in all directions, EFPs work more like cannons. The force of the blast molds a concave metal disc, called a liner, into a “formed penetrator” which is propelled at up to 3,000 meters per second. The effect is incredibly destructive, even to up-armored Humvees.

You can do as much or more damage with a 5-pound EFP, which is aimed, as with a 200-pound conventional IED,” a Pentagon analyst told Los Angeles Times writer Andrew Cockburn in 2007. The analyst speculated that the cost to construct such a device was about $30 or less. They’ve been around since at least World War II, when resistance elements in Europe used them against Germans, Cockburn wrote.

***Worse, in 2011, the Obama administration made an accusation and continued to deal in back channels for a nuclear deal.***

Obama Administration Accuses Iran of ‘Secret Deal’ With Al Qaeda

FNC: WASHINGTON — The Obama administration accused Iran on Thursday of entering into a “secret deal” with an Al Qaeda offshoot that provides money and recruits for attacks in Afghanistan and Pakistan. The Treasury Department designated six members of the unit as terrorists subject to U.S. sanctions.

The U.S. intelligence community has in the past disagreed about the extent of direct links between the Iranian government and Al Qaeda. Thursday’s allegations went further than what most analysts had previously said was a murky relationship with limited cooperation.

David S. Cohen, Treasury’s point man for terrorism and financial intelligence, said Iran entered a “secret deal with Al Qaeda allowing it to funnel funds and operatives through its territory.” He didn’t provide any details of that agreement, but said the sanctions seek to disrupt Al Qaeda’s work in Iraq and deny the terrorist group’s leadership much-needed support.

“Iran is the leading state sponsor of terrorism in the world today,” Cohen said in a statement. “We are illuminating yet another aspect of Iran’s unmatched support for terrorism.”

Treasury said the exposure of the clandestine agreement would disrupt Al Qaeda operations by shedding light on Iran’s role as a “critical transit point” for money and extremists reaching Pakistan and Afghanistan.

“This network serves as the core pipeline through which Al Qaeda moves money, facilitators and operatives from across the Middle East to South Asia,” it said..

Treasury said a branch headed by Ezedin Abdel Aziz Khalil was operating in Iran with the Tehran government’s blessing, funneling funds collected from across the Arab world to Al Qaeda’s senior leaders in Pakistan. Khalil, the department said, has operated within Iran’s borders for six years.

Also targeted by the sanctions is Atiyah Abd al-Rahman, appointed by Osama bin Laden as Al Qaeda’s envoy in Iran after serving as a commander in Pakistan’s tribal areas. As an emissary, al-Rahman is allowed to travel in and out of Iran with the permission of government officials, the statement claimed.

The sanctions block any assets the individuals might have held in the United States, and bans Americans from doing any business with them.

No Iranian officials were cited for complicity in terrorism. The others targeted were Umid Muhammadi, described as a key planner for Al Qaeda in Iraq’s attacks; Salim Hasan Khalifa Rashid al-Kuwari and Abdallah Ghanim Mafuz Muslim al-Khawar, Qatar-based financial supporters who’ve allegedly helped extremists travel across the region; and Ali Hassan Ali al-Ajmi, a Kuwait-based fundraiser for Al Qaeda and the Taliban.

The action comes a day after the top U.S. commander for special operations forces said Al Qaeda is bloodied and “nearing its end,” even as he warned that the next generation of militants could keep special operations fighting for a decade to come.

Navy SEAL Adm. Eric T. Olson said bin Laden’s killing on May 2 was a near-fatal blow for the organization created by bin Laden and led from his Pakistan hide out. He said the group already had lost steam because of the revolts of the Arab Spring, which proved the Muslim world did not need terrorism to bring down governments, from Tunisia to Egypt.

Treasury’s public allegations against Iran may reflect part of a strategy to expand the pressure on smaller, less well-established offshoots of Al Qaeda as the weakening of the group’s leadership threatens to make its activities more disparate. Washington already has re-focused much attention on Al Qaeda’s Yemen-based branch, which has attempted to bomb a U.S.-bound jetliner and cargo planes in recent years.

But the exact nature of Iran’s relationship with Al Qaeda remains disputed in Washington, with different branches of the intelligence community disagreeing about whether Iran is supporting Al Qaeda as a matter of policy, according to one U.S. official. The official spoke on condition of anonymity to discuss intelligence matters.

Some hardline militants backing Al Qaeda, members of Islam’s majority Sunnis, see the Shiite Islam dominant in Iran as heretical, and they view Tehran’s regional ambitions as a greater threat than the West. Sunni insurgents in Iraq have used car bombs and suicide attacks against Shiite targets, killing thousands since 2003, as well as targeting Shiite militias allied to Iran.

Since 2001, Iran has appeared a somewhat reluctant host for senior Al Qaeda operatives who fled there after the U.S. invasion of Afghanistan, keeping them under tight restrictions. After an initial period of cooperation with the West, Iran now seems to be a more comfortable haven even if it remains on the edge of Al Qaeda’s orbit.

Western officials point to the release earlier this year of an Iranian diplomat who was held for 15 months after being kidnapped by gunmen in Pakistan.

In negotiations for the diplomat’s freedom, they say Iran promised better conditions for dozens of people close to Osama bin Laden who were being held under tight security. These included some of the terror chief’s children and the network’s most senior military strategist, Saif al-Adel.

Still, the life of the Al Qaeda-linked exiles in Iran continues to be very much a blind spot for Western intelligence agencies. Few firm details have emerged, such as how much Iran limits their movements and contacts.

 

Obama and Kerry Have Vertigo Over this Iran Deal

Both Barack Obama and John Kerry are suffering from all the symptoms of vertigo, the spinning of lies, the dizziness of power and the imbalance of a lopsided deal with Iran over the nuclear program.

On September 8, 2015, Former Vice President Dick Cheney spoke at the American Enterprise Institute on the notable terror history and chilling consequences of an Iran deal.

Let us examine some facts with regard to Iran and how the negotiation table was a long flawed dialogue from the start.

During the uprising and war in Yemen last March, the Houthis, an Iranian terror proxy took at least 4 Americans hostage. The State Department chose to keep this a secret during the Iranian talks. It is rumored that 1 hostage has been released, while the conditions of the remaining hostages is unknown. Couple this basis with the 4 Americans jailed in Iran. Yet, no efforts have been forthcoming to ensure Iran releases any of them.

Jeddah, Sana’a and Riyadh, Asharq Al-Awsat—The Iranian embassy in Yemen’s capital Sana’a is offering financial, strategic, and military advisory support to the Houthi rebels in country, Yemen’s Foreign Minister Riyadh Yassin said on Sunday.  

Speaking to Asharq Al-Awsat, Yassin said Iran’s embassy in Sana’a had become a “Houthi operations room” and that Iranian intelligence and military experts at the embassy were helping the Houthis plan attacks against government loyalists and forces from the Saudi-led coalition targeting the group.  

He added that the embassy is “equipped with resources not even the Yemeni government is in possession of” and that it was also being used to distribute financial support to the Houthi militias currently stationed in different parts of the country.  

The Shi’ite Houthis, backed by Iran and Yemen’s ousted former president Ali Abdullah Saleh, occupied Sana’a in September 2014. They then launched a coup the following February deposing Yemen’s internationally recognized President Abd Rabbuh Mansur Hadi and his government.  

Yemeni government loyalist forces and a coalition of Arab counties led by Saudi Arabia are currently engaged in a ground and air offensive against the Houthis, seeking to reinstate Hadi and the government.  

On Sunday coalition warplanes bombed several targets in the capital, according to eyewitnesses speaking to Asharq Al-Awsat.  

They said over 15 individual strikes were carried out, including several targeting the headquarters of Yemen’s Special Security Forces, who are loyal to ex-president Saleh. The sources said most of the HQ’s compound has now been destroyed following the air raids.  

The coalition has announced a plan to retake Sana’a with the aid of government loyalists on the ground, known as the Popular Resistance, to follow gains made in the country’s south which have seen the southern port city of Aden and almost all southern provinces liberated from Houthi control.  

The coalition is now closing in on the Houthis in Sana’a and also in the group’s northern stronghold of Saada. The group last month declared a state of emergency in both areas.  

Local sources told Asharq Al-Awsat on Sunday the Houthis now have a plan in place in anticipation of the impending attack on the capital.  

They said the Houthis plan to “spread a wave of chaos” prior to the entry into the capital of coalition forces and those from the Popular Resistance, which will include assassinations of any figures they deem may cooperate with the latter against them—such as political activists and university professors.  

Meanwhile, on Sunday Saudi hospitals received 852 Yemenis injured as a result of the conflict, in a joint initiative between the King Salman Center for Relief and Humanitarian Works and the Ministry of Health.  

This comes as the King Salman Center on Saturday launched the second phase of a joint humanitarian relief project with the United Nations, delivering aid worth some 22 million US dollars to help Yemenis caught up in the conflict.  

In May Saudi Arabia’s King Salman Bin Abdulaziz increased Saudi Arabia’s aid commitment to Yemen to over half a billion dollars.

 

Meanwhile, ask any sailor deployed in the region about the daily confrontations with Iran.

Iranian warships confront U.S. Navy on ‘daily basis’

U.S. naval forces operating in and around the Strait of Hormuz, a critical shipping lane, are “routinely approached by Iranian warships and aircraft” on a “nearly daily basis,” according to a Pentagon official familiar with operations in the region.

During these interactions between U.S. and Iranian forces, American aircraft and ships are routinely photographed by the Iranians for intelligence purposes, according to the official, who said that most confrontations between the sides are “conducted in a safe and professional manner.”

The disclosure of these daily run-ins comes following the release of footage by the Iranian military purporting to show a reconnaissance mission over a U.S. aircraft carrier station in the Strait of Hormuz. More here from JihadWatch.

Then comes the Iranian Parchin nuclear plant which has been a historical military dimension location going back as far as the Nazi regime that used it for the production of chemical weapons. Today, Iran has declared this location will never be subject to any inspections. Related information on Parchin and images taken from space, click here.

Iran says its construction work at the Parchin military facility, southeast of Tehran, is normal and it will not allow any inspection of the “conventional” site, Press TV reports.  

“Parchin is a conventional military site. The construction there is normal and even it was indeed confirmed by some officials from the United States that Parchin site and the activities there are something normal and it doesn’t have any relevance to the IAEA work,” Iran’s Ambassador to IAEA Reza Najafi said.  

“Of course, this is a military site and Iran will not let any inspector go there,” he added.  

​Najafi’s remarks came after IAEA Director General Yukiya Amano repeated his claims about construction work at Iran’s Parchin military site whose inspection some world powers demand.  

“These activities could undermine the capability of the IAEA on verification but as we do not have inspectors there and by way of observing through satellite imagery, we do not have further insight of these recent activities,” the IAEA chief said.  

 

He added that “much work needs to be done” to finish the probe, but reiterated that the investigations will be complete by mid-December, as agreed in a roadmap between Iran and the IAEA.   

On July 14, Iran and the IAEA signed a roadmap for “the clarification of past and present issues” regarding Iran’s nuclear program in Vienna, Austria.  

Iran provided some additional information on Parchin by August 15, further proving that it was complying with the mutual agreement with the UN agency.  

On August 27, the US Department of State acknowledged that Iran’s Parchin site is a “conventional” military facility. “I think it’s important to remember that when you’re talking about a site like Parchin, you’re talking about a conventional military site, not a nuclear site,” US State Department spokesman John Kirby said.  

“So there wouldn’t be any IAEA or other restrictions on new construction at that site were they to occur,” he added.  

Kirby’s remarks mark a deviation from past claims in the US about Parchin. Iran has repeatedly denied Western allegations about nuclear activity at the site. The comments came after the IAEA voiced reservation about the construction of “a small extension to an existing building” at Parchin.  

“Since (our) previous report (in May), at a particular location at the Parchin site, the agency has continued to observe, through satellite imagery, the presence of vehicles, equipment, and probable construction materials. In addition, a small extension to an existing building appears to have been constructed,” the IAEA report said.  

Following the report, Tehran criticized the agency’s statement about Parchin, saying construction work on the site “does not concern” the nuclear agency.