Iran Announces No More Compliance to Nuclear Deal

Let’s begin with some side deals made that John Kerry, Barack Obama and Europe never admitted to shall we? Check the date of that tweet…I have been calling for President Trump to declassify documents related to all the years of negotiations since early 2017.

 

At least three media sources are reporting:

*Iran Says Will No Longer Comply With Nuclear Enrichment Limits Under 2015 Deal – Iran Media

*Iran Says Won’t Respect Nuclear Deal Commitments on Enrichment Uranium Stockpile, Purity, Research – Iran Media

*Iran Says Will Continue to Work with U.N. Atomic Agency Inspectors – Iran Media

There are written steps Iran must take to make changes to the JCPOA. There is no indication of what the steps are and when the steps will be taken. Iran is at the 5th and final step regarding non-compliance/commitment. Of particular note, since May, Iran has been reducing its nuclear commitments with a series of steps every 60 days already. Last November, Iran gave Britain, France and Germany yet another 60 day extension to salvage the deal or face further non-compliance. The deadline came and went.

The European Union has continued attempts for a diplomatic salvage, so far to no avail. Now, leaders are meeting in Brussels to discuss the nuclear deal and how to de-escalate tension since the strike to kill General Qasim Soleimani.

France is especially committed to the Iran nuclear deal and is urging Iran to stay with the landmark 2015 agreement.

Iran’s President Rouhani made a state television appearance stating it remains open to negotiations with European partners. Iran is desperate to sell its oil to Europe and to maintain trade with Europe as the Iranian economy is in a financial free-fall. Watch for epic smuggling directed by Iran….

The International Atomic Energy Agency has not yet responded regarding Iran’s assertion. Iranian officials are to meet in the coming days to discuss that final 5th step in separating from the nuclear deal. Iran has already previously broken limits of enrichment, stockpiles and centrifuges.

Meanwhile to further complicate tensions in the Middle East, Iran is pulling out the whole cultural protections law noted in the 1954 Hague Convention.

The 1954 Hague Convention, of which the U.S. is a party, bars any military from “direct hostilities against cultural property.” However, such sites can be targeted if they have been re-purposed and turned into a legitimate “military objective,” according to the International Committee of the Red Cross.

Iran, home to 24 UNESCO World Heritage sites, has in the past reportedly guarded the sprawling tomb complex of the Islamic Republic’s founder, Ayatollah Ruhollah Khomeini, with surface-to-air missiles.

This past November:

The head of Iran’s nuclear program said that Tehran was now operating double the amount of advanced centrifuges than was previously known in violation of its atomic deal with world powers.

The announcement came as Iranians marked the 40th anniversary of the 1979 U.S. Embassy takeover and start of the 444-day hostage crisis.

The decision to operate 60 IR-6 advanced centrifuges means that the country can produce enriched uranium 10 times as fast as the first-generation IR-1s allowed under the accord.

The nuclear deal limited Iran to using only 5,060 first-generation IR-1 centrifuges to enrich uranium by rapidly spinning uranium hexafluoride gas. Salehi also said Tehran was working on a prototype centrifuge that’s 50 times faster than those allowed under the deal.

By starting up these advanced centrifuges, Iran further cuts into the one-year time limit that experts estimate Tehran would need to have enough material to build a nuclear weapon, if it chose to pursue one.

DHS Website Hacked with Pro-Iranian Messages

Seems with the timing, that as I was publishing an article yesterday about Iran’s robust cyber operations, they or proxies were at work taking down our own Department of Homeland Security website. Another thought is a domestic Iranian sympathizer took down the site.

A website within the Department of Homeland Security was offline Sunday after a hacker uploaded photos onto the site that included an Iranian flag and an image depicting a bloodied President Donald Trump being punched in the face.

 

The images appeared on the Federal Depository Library Program program’s website late Saturday before the site was taken offline. The Cybersecurity and Infrastructure Security Agency, a division of the Department of Homeland Security, said it was monitoring the situation.

“We are aware the website of the Federal Depository Library Program was defaced with pro-Iranian, anti-US messaging,” the cybersecurity agency said in a statement. “At this time, there is no confirmation that this was the action of Iranian state-sponsored actors. The website was taken offline and is no longer accessible.”

The statement added that “in these times of increased threats” all organizations should increase cyber monitoring, back up IT systems, implement secure authentication and have an incident response plan ready should a hack take place.

DHS also issued a two-week National Terrorism System advisory noting the U.S. drone strike in Iraq last week that killed Iran commander Qassem Soleimani. That spurred Iran and several affiliated extremist organizations to state publicly they intend to retaliate against the U.S.

“Iran maintains a robust cyber program and can execute cyber attacks against the United States,” DHS warned. “Iran is capable, at a minimum, of carrying out attacks with temporary disruptive effects against critical infrastructure in the United States.”

The library program website essentially had been replaced with a page exclaiming “Iranian Hackers!” An image of Iran’s supreme leader Ayatollah Ali Khamenei also was posted, along with a message that “martyrdom was (Soleimani’s) reward for years of implacable efforts.

A graphic showed Trump being punched by a fist from Iran amid a flurry of missiles.

“With his departure and with God’s power, his work and path will not cease and severe revenge awaits those criminals who have tainted their filthy hands with his blood and blood of the other martyrs,” a message on the website read.

Another message claimed the hack was the work of an Iranian “security group,” adding that “this is only small part of Iran’s cyber ability!”

Iran has promised a military response to Soleimani’s killing. Trump has vowed that if Iran attacks an American base or any American, “which I would strongly advise them not to do, we will hit them harder than they have ever been hit before!”

I also received the following bulletin yesterday from the DHS email system.

Image

 

 

Locked Shields Versus Iran

Since the death of several Iranian warlords including Qassim Soleimani, the United States has dispatched more military personnel to the Middle East. The Patriot missile batteries scattered in the region including in Bahrain are now at the ready. When it comes to cyber operations inside Iran, little is being discussed as a means of retribution against the United States. Iran does have cyber warfare capabilities and does use them.

It has been mentioned in recent days that President Trump has been quite measured in responding to Iran’s various attacks including striking Saudi oil fields, hitting oil tankers and shooting down one of the drones operated by the United States. In fact, the United States did respond directly after the downing of our drone by inserting an effective cyber-attack against Iran’s weapons systems by targeting the controls of the missile systems.

APT33 phishing Read details from Security Affairs.

Iran has an estimated 100,000 volunteer cyber trained operatives that has been expanding for the last ten years led by the Basij, a paramilitary network. The cyber unit known for controlling the Iranian missile launchers is Sepehr 110 is a large target of the United States and Israel. Iran also mobilizes cyber criminals and proxy networks including another one known as OilRig.

In 2018, the United States charged 9 Iranians (Mabna Hackers) for conducting massive cyber theft, wire fraud and identity theft that affected hundreds of universities, companies and other proprietary entities.

Due to a more global cyber threat by Iran known to collaborate with North Korea, China and Russia, NATO has been quite aggressive in cyber defense operations via the Cooperative Cyber Defense Center of Excellence applying the Locked Shields Program.

Not too be lost in the cyber threat conditions, Iran also uses their cyber team to blast out propaganda using social media platforms. If this sounds quite familiar, it is. The Russian propaganda operations manual is also being used by Iran. The bots and trolls are at work in Europe to keep France, Britain and Germany connected to the Iranian nuclear deal and to maintain trade operations with Iran including diplomatic operations. There are fake Iranian and Russian accounts still today all over Twitter and Facebook for which Europe is slow to respond if at all.

Meet APT33, which the West calls the Iranian hacking crew(s), the other slang name is Elfin. APT33 is not only hacking, but it is performing cyber-espionage as well. There are many outside government organizations researching and decoding Iran’s cyber operations that cooperate with inside U.S. government cyber operations located across the globe that also cooperate with NATO.

Recorded Future is one such non-government pro-active cyber operation working on Iran. These include attributions of cyber attacks by Iran against Saudi Arabia as well as the West by decoding phishing campaigns, relationships, malware and webshells and security breeches.

Recent published results include in part:

Nasr Institute and Kavosh Redux

In our previous report, “Iran’s Hacker Hierarchy Exposed,” we concluded that the exposure of one APT33 contractor, the Nasr Institute, by FireEye in 2017, along with our intelligence on the composition and motivations of the Iranian hacker community, pointed to a tiered structure within Iran’s state-sponsored offensive cyber program. We assessed that many Iranian state-sponsored operations were directed by the Iranian Revolutionary Guard Corps (IRGC) or the Ministry of Intelligence and Security (MOIS).

According to a sensitive Insikt Group source who provided information for previous research, these organizations employed a mid-level tier of ideologically aligned task managers responsible for the compartmentalized tasking of over 50 contracting organizations, who conducted activities such as vulnerability research, exploit development, reconnaissance, and the conducting of network intrusions or attacks. Each of these discrete components, in developing an offensive cyber capability, were purposefully assigned to different contracting groups to protect the integrity of overarching operations and to ensure the IRGC and/or MOIS retained control of operations and mitigated the risk from rogue hackers. Read more here in detail from a published summary of 6 months ago.

Don’t Investigate Bidens Now, then When?

As the U.S. presidential race began roaring to life in 2016, authorities in the former Soviet republic of Latvia flagged a series of “ suspicious” financial transactions to Hunter Biden and other colleagues at a Ukrainian natural gas company and sought Kiev’s help investigating, according to documents and interviews.

The Feb. 18, 2016 alert to Ukraine came from the Latvian prosecutorial agency responsible for investigating money laundering, and it specifically questioned whether Vice President Joe Biden’s younger son and three other officials at Burisma Holdings were the potential beneficiaries of suspect funds.

“The Office for Prevention of Laundering of Proceeds Derived from Criminal Activity … is currently investigating suspicious activity of Burisma Holdings Limited,” the Latvian agency also known as the FIU wrote Ukraine’s financial authorities.

The memo was released to me by the Ukrainian General Prosecutor’s Office and confirmed by the Latvian embassy to the United States.

Latvian authorities said they did not get any incriminating information back from Ukraine to warrant further investigation and did not take additional action in 2016. But the memo adds to the mounting evidence that there was ongoing investigative activity surrounding Burisma Holdings and Hunter Biden’s compensation as a board member in the weeks just before Joe Biden forced the firing of the Ukraine prosecutor overseeing the Burisma investigation in spring 2016.

The Latvian law enforcement memo identified a series of loan payments totaling about $16.6 million that were routed from companies in Beliz and the United Kingdom to Burisma through Ukraine’s PrivatBank between 2012 and 2015.

The flagged funds were “partially transferred” to Hunter Biden, a board member at Burisma since May 2014, and three other officials working for the Ukrainian natural gas company, the Latvian memo said. More here from Solomon.

***

But hold on as the media knew much of this as did so many members of Congress and quite frankly our intelligence agencies including the U.S. Department of State.

Politico reported just recently: The Bidens took over Paradigm Global Advisors. In the late summer of 2006 Joe Biden’s son Hunter and Joe’s younger brother, James, purchased the firm. On their first day on the job, they showed up with Joe’s other son, Beau, and two large men and ordered the hedge fund’s chief of compliance to fire its president, according to a Paradigm executive who was present. At the time, the senator was just months away from both assuming the chairmanship of the Senate Foreign Relations Committee and launching his second presidential bid.

Image result for joe beau hunter james biden

According to the executive, James Biden made it clear he viewed the fund as a way to take money from rich foreigners who could not legally give money to his older brother or his campaign account. “We’ve got investors lined up in a line of 747s filled with cash ready to invest in this company,” the executive remembers James Biden saying.

 

PCM Merger Agreement by Anonymous Q1yQNGqtP on Scribd

The Biden family have consistently mixed business and politics over nearly half a century, moving from one business to the next as Joe’s stature in Washington grew. None of the ventures appear to have been runaway successes, and Biden’s relatives have not been accused of criminal wrongdoing in their dealings. But over the years, several of their partners and associates have ended up indicted or convicted. The dealings have brought Joe unwelcome scrutiny and threaten to distract from his presidential bid. Read the long and full story here.

But hold there is still more beyond Burisma and China. That is we need to go back even further.

A son of Democratic vice presidential candidate Joe Biden was paid an undisclosed amount of money as a consultant by MBNA, the largest employer in Delaware, during the years the senator supported legislation that was promoted by the credit card industry and opposed by consumer groups.

Barack Obama’s presidential campaign said Biden helped forge a bipartisan compromise on the measure, which is now law and makes it harder for consumers to obtain bankruptcy protection in the courts.

MBNA’s consulting payments to Hunter Biden, first reported by The New York Times, followed his departure in 2001 from the company, where he had been an executive.

At the time Hunter Biden was receiving consulting payments from MBNA, he also was a Washington lobbyist at a firm he had co-founded.

“He was not a lobbyist for MBNA, and his work had absolutely nothing to do with the bankruptcy bill. Zero. Nothing,” said Wade.

Resurrecting Biden’s role in the bankruptcy legislation could undercut one of the Obama campaign’s lines of attack: That his Republican opponent, John McCain, is insensitive to the financial woes of middle-class Americans.

Consumer and civil rights groups and unions, as well as Democratic opponents, had argued that the bankruptcy legislation was unfair to low-income working people, single mothers, minorities and the elderly, and would remove a safety net for those who have lost their jobs or face mounting medical bills. More here.

But are there other politicians we need to look at? Yes.

Robert Powell, the husband of Rep. Debbie Mucarsel-Powell, D-Fla., reportedly took $700,000 from a Ukrainian oligarch named Igor Kolomoisky. Mucarsel-Powell sits on the House Judiciary Committee, the committee that drafted two articles of impeachment against President Donald Trump for his alleged abuse of power with regards to Ukraine.

Image result for Debbie Mucarsel-Powell

In 2018, the Daily Beast reported that a number of businesses linked to Kolomoisky hired Powell as an attorney. One of those firms paid Powell at least $700,000 over two years, according to public records.

The Miami Herald reported Powell was working for companies tied to Kolomoisky for 10 years. Powell made most of his money in the two years leading up to his wife’s election in 2018.

Kolomoisky has been accused of contract killings and embezzlement in the past. Yet, in 2018 when Mucarsel-Powell was running for her seat, she did not see her husband’s work as relevant to her campaign. More here.

As President Trump works diligently to be the law and order president, it is no wonder AG Barr, John Dunham, Rudy Guiliani and so many others including conservative media are doing the real investigative work…draining the swamp.

So, while we have elections around the corner, we have much more to learn and consider at the ballot box. Could it be that the Democrats led by Speaker Pelosi are scrambling to cover up some other nasty events we are slowly learning about?

 

 

 

That Russian Spy Ship is Back to Lurking off our Coast

The speculation for this ship is:

There are new indications that the spying target this time also included SpaceX’s space launch capability.

On Monday, the private space launch company founded by tech entrepreneur Elon Musk conducted the 13th successful launch of its Falcon 9 booster from Cape Canaveral, Florida. The launcher placed a communications satellite into orbit and then returned to Earth by landing on a barge in the Atlantic eight minutes later.

Analysts speculate that the ship may have been observing the launch to gather data that could benefit reusable Russian space launchers.

U.S. Northern Command and the Coast Guard have been tracking a Russian spy ship equipped with electronic surveillance gear that has been lurking off the East Coast of the United States.

On Monday, the Coast Guard sent out a Maritime Safety Information Bulletin warning boaters of reports of the Viktor Leonov operating in an “unsafe manner” off the coast of South Carolina and Georgia.

On Tuesday, the Coast Guard said the Russian ship was operating in USCG’s Jacksonville, Florida, area of responsibility, which encompasses roughly 40,000 square miles of ocean and stretches nearly 190 miles of coast from Kings Bay, Georgia, to Port Malabar, Florida.

“This unsafe operation includes not energizing running lights while in reduced visibility conditions, not responding to hails by commercial vessels attempting to coordinate safe passage and other erratic movements,” the Coast Guard posted on its bulletin.

“Vessels transiting these waters should maintain a sharp lookout and use extreme caution when navigating in proximity to this vessel. Mariners should make reports of any unsafe situations to the United States Coast Guard,” the Coast Guard said in its safety message.

Adm. James Foggo III, the commander of U.S. Naval Forces Europe and U.S. Naval Forces Africa, told reporters Dec. 18 that the Russian spy ship was operating a “couple hundred” miles off the East Coast.

North American Aerospace Defense Command and U.S. Northern Command told Military Times that they were tracking the Russian ship.

“We are aware of Russia’s naval activities, including the deployment of these intelligence collection ships in the region,” Maj. Mark R. Lazane, a spokesman with NORTHCOM, told Military Times in an emailed statement.

Image result for Russian warship Viktor Leonov

It’s not the first time the Viktor Leonov has conducted intelligence operations off the East Coast off the U.S.

In 2017, the Pentagon announced the Leonov was being trailed by a Coast Guard vessel but was operating in international waters.

“They routinely deploy intelligence vessels worldwide to monitor the activities and particularly naval activities of other nations, but then again conducted lawfully in international waters and not unlike operations we conduct ourselves,” Davis said in 2017 about the Leonov operating near the East Coast of the U.S.

Foggo said that the Coast Guard reported that the Russian ship was not responding to signals or “bridge to bridge” radio communications and was running without lights on at sea.

Those actions, Foggo said Wednesday, are risky. More here.

This ship is part of Project 864. The Project 864, also known as the Vishnya and Meridian, is an electronic surveillance and intelligence gathering ship built by Stocznia Polnocna shipyard in Gdansk (Poland) for the Soviet Union’s Navy in the 1980s. The ship’s capabilities are built around the Communication Intelligence (COMINT) and Signals Intelligence (SIGINT) concepts. The Project 864 are equipped with two satellite communications antennas inside a radome. The propulsion system consists of two diesel engines developing 4,400-bhp and a top speed of 16 knots. The Project 864 weapon system is intended to counter airborne threats using two AK-630 30mm guns and two SA-N-8 surface-to-air missile systems. The Russian Navy operates seven Meridian-class vessels to be replaced by the Project 18280 intelligence ship by 2020.