11/19/17

Linda Sarsour Comes Out of the Socialist Closet

By: Trevor Loudon | New Zeal

In my documentary “America Under Seige: Soviet Islam,” I made the case that many American Muslim leaders are also Marxists.

One among them is well known activist Linda Sarsour.

The Brooklyn radical recently formally joined this country’s largest crypto-communist organization, the 30,000 strong Democratic Socialists of America.

DSA and other Marxist groups have been actively recruiting Muslim activists all over the country. The Red/Green Axis, begun in pre-revolutionary Russia, is now very much a feature of political life in pre-revolutionary America.

11/19/17

A Wide Look at North Korea’s WMD Operations

By: Denise Simon | Founders Code

Primer:

South Korean surgeons operating on a North Korean defector who escaped across the Demilitarized Zone between the two countries under a hail of gunfire on Nov. 13 have found a parasite in the man’s stomach unlike any other they had seen.

The defector, who was shot five times, remained in critical condition after hours in two rounds of surgery, according to an article in the Korea Biomedical Review published on Nov. 15.

North Korean Cyber Operations: Weapons of Mass Disruption

Over the past 10 years, the escapades of various nation-state actors in the cyber realm have exploded onto the pages of top-tier media, and into prime time network news.Russian espionage against political targets during the 2016 US presidential election, wide reaching Chinese espionage against Western commercial targets, disruptive attacks against the US financial sector associated with Iran, and the destructive attacks against Sony Pictures Entertainment (SPE) are some of the premier examples of mainstream coverage of ‘cyber.’

Behind every single offensive cyber action conducted in the interest of the capable nation-states is a doctrine,[1] and North Korea, like many other nation-states, has incorporated cyber operations within their own broader military doctrine and has conducted numerous offensive operations in the furtherance of their national agenda. What is particularly alarming about DPRK operations is their willingness to initiate escalatory actions, such as their likely connections to the now infamous WannaCry ransomware, and their targeting of the global financial system.

North Korea’s disregard for the consequences of its actions sets them apart from other nation-states, and is particularly dangerous.

North Korean offensive cyber operations have been conducted to collect sensitive political and military intelligence information, to lash out at enemies who threaten their beliefs and interests, and most interestingly, to generate revenue.

This revenue generation aspect of North Korean operations was thrust into the international spotlight when, in early 2016, unauthorized transfers of funds from the Bangladesh Central Bank were issued using the Society for Worldwide Interbank Financial Telecommunication (SWIFT) network for global banking. The attempted transfers amounting to over $950 million USD sought to move funds to entities in locations such as Sri Lanka and the Philippines; ultimately $81 million USD in funds disappeared into the ether.

The subsequent investigation revealed that the perpetrators of the attack used tools to securely delete records from the SWIFT terminals that would alert Bangladesh Central Bank employees of the transfers. Commonly referred to as a “wiper,” this secure deletion tool contained code that was linked by many in the computer security industry to one used in attacks associated with North Korea, notably the attack on SPE through a US Computer Emergency Response Team (USCERT) alert. The revelation that a state would engage in such a flagrant violation of international norms came as a surprise to many in the information security arena. North Korea watchers were, of course, not surprised as the currency generation activities benefiting the Kim family and their isolated nation have been well understood for some time.

The 2016 SWIFT attacks associated with North Korea are part of the broader currency generation operations of DPRK cyber actors and intelligence organizations. Botnets associated with espionage activity targeting South Korea have been used to generate revenue through a variety of schemes for almost 10 years. Recent DPRK activity suggests an interest in obtaining cryptocurrency, such as bitcoin, through extortion and targeting of cryptocurrency exchanges.

In the third quarter of 2017, for instance, malicious emails containing weaponized documents were used to target international financial organizations, as well as bitcoin exchanges. The ultimate goal of these attacks, which were tracked by the information security community under names such as Stardust Chollima and BlueNoroff, is yet unknown, however theft and sabotage are likely.

Bitcoin provides attractive benefits to the isolated nation due to a lack of regulation and the ability to subvert international sanctions. In May 2017, ‘WannaCry’ exploded across the internet, encrypting sensitive material and holding the keys to decrypt the files for a ransom to be paid in bitcoin. This attack, too, had North Korean fingerprints embedded in the code used to execute the attack, as did the tools that were used to develop that code.

Attribution is a particularly sensitive subject in the cyber domain. Technical artifacts from the executable code that was used to conduct the WannaCry attack overlaps with code used in attacks against South Korean nuclear power plants and the SPE attack of 2014. While the technical artifacts can provide some measurable connections between the attacks, they require deep technical understanding to interpret. Other linkages, such as targeting and operational procedures, are the product of intelligence assessments and have been disputed by various parties muddying the water surrounding the assigning of attribution.

North Korea is an exception to the classical understanding of how most nations implement offensive cyber operations in that they incorporate espionage, disruptive/destructive attacks and financially motivated operations using the same computer code and infrastructure.

The value of cyber operations is likely recognized by North Korea’s most senior leadership through the State Affairs Commission (SAC), the General Staff of the Korean People’s Army, and Kim Jong Un himself. Subordinate units, notably the Reconnaissance General Bureau (RGB), Bureau 121, and the Command Automation Bureau (CAB), are likely responsible for executing the specific operations. The individual units may have a charter to self- finance their operations, or to contribute financial gains back to the regime, but it seems clear that various offensive operations are conducted by differing groups with their own approach and missions. For example, one group may have a primary focus on revenue generation, targeting South Korean banks and SWIFT and conducting extortive attacks, while another group might focus on intelligence collection, while a third conducts sabotage and destructive attacks.

Finally, the maturity of North Korean offensive cyber operations has been demonstrated through the integration of destructive attacks by cyber units during military exercises executed in the midst of escalating tension with South Korea. For instance, following the December 2012 launch of the Kwangmyongsong-3 satellite via the Unha-3 satellite launch vehicle, tensions on the Korean peninsula were high. That March, following the passing of UN Security Council Resolution (UNSCR 2087) and B-52 strategic bomber overflights in South Korea, North Korea responded with a particularly aggressive disruptive attack against South Korea.

This massive wiper attack targeted South Korea’s financial and media sectors and coincided with provocations by North Korean military and escalating political rhetoric. This pairing allowed for maximum psychological impact, while demonstrating North Korea’s ability to integrate offensive cyber activities into well-developed military doctrine. During these attacks, the Korea Broadcasting System (KBS), Munhwa Broadcasting Corporation (MBC), Yonhap Television News (YTN) and several Korean financial institutions reported disruptions. With the threat of military escalation on the table, many in South Korea would have depended on the media outlets for breaking news. Disruption of ATM networks and financial institutions would further add to the chaos as word of media disruptions began to spread.

As tensions are once again escalating between North Korea and the international community, more attacks perpetrated by DPRK cyber actors are likely. The recent increase in financial sector targeting associated with these actors may illustrate the potential for disruptive attacks to demonstrate both the capability of the North Korean actors, as well to achieve objectives in line with their broader military doctrine. While North Korea’s isolation may be detrimental to its economy and international relations, it is an effective shield from which to launch offensive cyber operations against a connected and delicate global system.


  1. [1]

    In order to establish some common definitions, we can look to the United States Department of Defense, who established Computer Network Operations (CNO) as a component of the broader Information Operations (Information Warfare) arena. CNO is further categorized into Computer Network Exploitation (CNE), Computer Network Attack (CNA), and Computer Network Defense (CND). Offensive cyber operations conducted by nation-states using this model would be considered CNE and CNA. The use of CNE can be roughly characterized as espionage, whereas CNA would be used to degrade, deny, disrupt, or destroy the network based systems of an adversary. This model can help provide a clear delineation of how various military, intelligence community, and law enforcement agencies with their authorities are able to conduct operations. China, Russia, Iran and virtually every nation-state in the world conduct CNE/CNA operations in accordance with their legal authorities and national interests.

    ***

    There are other weapons few discuss.

    Pyongyang has already achieved partial coverage of US territories. Last June, in a hearing before the US House Armed Services Committee, the head of the US Missile Defense Agency, Vice Admiral James Syring, said: “The advancement and demonstration of technology of ballistic missiles from North Korea in the last six months have caused great concern to me and others. It is incumbent on us to assume that North Korea today can range the US with an ICBM carrying a nuclear warhead.”

    This particular endeavor was likely assisted by Tehran. A February 2016 report by the Congressional Research Service concluded, “Iran has likely exceeded North Korea’s ability to develop, test, and build ballistic missiles.” Tehran might be, and probably is, helpful to Pyongyang with respect to technological aspects of the nuclear sphere as well.

    The nuclear component within the spectrum of North Korea’s weapons of mass destruction (WMDs) is evidently growing. The big question is whether the country’s despot, Kim Jong-un, will be the first person to use nuclear weapons since 1945.

    Quite recently, Kim elected to employ a highly lethal chemical weapon, the nerve agent VX, for a political assassination. This weapon was used last February by two female operatives, one Indonesian and the other Vietnamese, to murder Kim Jong-un’s estranged half-brother, Kim Jong-nam, in Malaysia. The victim died shortly after being assaulted by the two women, who wiped VX on his face as he prepared to board a flight to the Chinese territory of Macau. Traces of VX were revealed on swabs taken from his eyes and face.

    This deadly chemical agent was probably smuggled from North Korea to Malaysia, which in and of itself was an intriguing and risky move. Six of eight potential suspects were from Pyongyang’s Ministries of State Security and Foreign Affairs. The suspects flew from Kuala Lumpur on the day of the assassination, passing through Vladivostok on their way back to Pyongyang. South Korea’s request to detain four of the suspects was rejected by Russian officials on the grounds of lack of evidence.

    It can be assumed that Kim Jong-un was in on the plot from its inception. Symbolically, at least, this political assassination by VX can be regarded as an indication of Pyongyang’s chemical weapons (CW) capabilities. Whether the regime intended it to or not, the assassination signaled the readiness, usability, and deployability of North Korea’s VX, which can be used for guerrilla warfare, chemical terrorism, or wide-scale chemical attack.

    VX is also weaponized within warheads carried by ballistic missiles in Pyongyang’s  vast CW arsenal. The North Korean ballistic program constitutes the principal, though not the only, vehicle for all three WMD programs. The CW and biological weapons (BW) programs are fully matured and have marked operational offensive capabilities. Inadequate attention is being paid to Pyongyang’s large-scale offensive capacities in terms of CW and BW, but the VX political assassination incident was a wake-up call (if unintentional). More here.

11/19/17

Book Review: Harpoon: Inside the Covert War Against Terrorism’s Money Masters

By: Terresa Monroe-Hamilton

Purchase at Amazon.com

I had a very interesting book sent my way: HARPOON: Inside The Covert War Against Terrorism’s Money Masters by Nitsana Darshan-Leitner and Samuel M. Katz. I’m a military and counterterrorism wonk, so it peaked my interest. First off, this is a fascinating book and if you are analytical, it will really engross you. It comes at you from the stance of cutting off the money-flow to terrorists and that is definitely one of the primary tools we should be using in the war on terror. Plus, I just admire the heck out of the Mossad and Israel in general.

Think about it… terrorists have to have money to buy weapons to kill people. They get that money in many different ways… from the sale of drugs, to the sale of oil, investments, charities and foundations. We use our military might to keep ISIS and other enemies on the run, but to squash them, you have to strangle them financially. Israel is a master at this technique. For many years I have said we should emulate Israel in profiling and counterterrorism tactics, including border security. But I never really looked at how they cut off the lifeblood of terrorism… money. The US is now utilizing financial techniques like this to starve ISIS and it works. Europe should be using this weapon as well.

If the flow of money was cut off to ISIS and other terrorists, their Caliphate and networks would fall apart. This is why I was so furious when Obama gave millions to the Iranians, who are the biggest purveyor of terrorism on the planet. He knew what he was doing, he was funding a maniacal Islamic theocracy that will murder countless people with that money. Obama has blood all over his hands on that one.

Israel has learned the hard way, through blood and tears, that more than force is needed to take down her enemies. From 2000 to 2005, during the last Intifada, Palestinian suicide bombers relentlessly attacked Israel. The Israelis have one of the best fighting forces on the planet and they met the enemy head on. But no matter how hard they fought or how they won each encounter, the bombings continued. That was when Israeli leaders knew they needed a new game plan. So, they went after the money trail that financed everything from bomb-building factories to the cash bonuses issued to the families of suicide bombers.

Israel gave birth to a new multiagency task force codenamed Harpoon. It’s directive was to wage financial warfare against the enemies of the Jewish state. Harpoon tracked money to it source. That included charities in the US and multimillion-dollar transfers from Iran, the Gulf States and Saudi Arabia. In 2002, Harpoon expanded. It now focuses on not only intercepting the cash and the accounts, but taking them from their enemies and destroying them if necessary.

Nitsana’s book covers all of this and shows that counterterrorism is not just fought on the battlefield or through cloak and dagger, it is waged on the financial front out of necessity. Israel laser focused on this in every agency… and it worked. They even utilized lawfare in US courts and internationally to file lawsuits to stop state sponsors of terror in their tracks. The banks and the intermediaries that give life to these murderous demons are fair game and any method that can be employed to take them down is used by Israel. I applaud that wholeheartedly.

I vehemently disagree with those in the west and in the US that decry Israel’s tactics here. They raid banks etc. to stop terrorism before people die. That’s called survival. I have been less than thrilled with President George W. Bush lately. He criticized Israel’s actions as being “Wild West” in nature. Really? Because it looks to me like they work. Which is more than can be said for what the US was doing before President Trump took office. I’m not always thrilled with him either, but at least he’s kicking ISIS’ ass these days. The US has come around to Israel’s way of thinking. It’s about damn time.

From Nitsana at Fox News:

The Americans saluted Israeli spy chief Meir Dagan – the mastermind behind Harpoon – and his understanding that money was the oxygen that enabled the terror beast to live and thrive. Dagan was intent on suffocating this malignant creature through any and all means at his disposal.

In the wake of terrorist attacks in Britain, France, Spain Belgium, Germany and Sweden in recent years, Europeans will need to use the highly effective financial warfare template that Israel has already established if they hope to defeat ISIS and the terror armies that will follow.

The European intelligence services will have to cut through red tape and muster their resources to bankrupt ISIS, intercept its ability to move money from country to country, and stop it from funding fighters and operations throughout the continent.

Rendering a group like ISIS insolvent will yield victorious battlefield results.

As Nitsana put it (and I wish I had said this darn it), “A smart and successful war on terror requires James Bonds and General Pattons, as well as one or two Bernie Madoffs – and their services are needed immediately.” This woman truly gets it. Bankrupting the enemy destroys their supply lines and their killing machines. I admire this reasoning and I love this book.

From Amazon.com:

A revelatory account of the cloak-and-dagger Israeli campaign to target the finances fueling terror organizations–an effort that became the blueprint for U.S. efforts to combat threats like ISIS and drug cartels.

ISIS boasted $2.4 billion of revenue in 2015, yet for too long the global war on terror overlooked financial warfare as an offensive strategy. “Harpoon,” the creation of Mossad legend Meir Dagan, directed spies, soldiers, and attorneys to disrupt and destroy money pipelines and financial institutions that paid for the bloodshed perpetrated by Hamas, Hezbollah, and other groups. Written by an attorney who worked with Harpoon and a bestselling journalist, Harpoon offers a gripping story of the Israeli-led effort, now joined by the Americans, to choke off the terrorists’ oxygen supply, money, via unconventional warfare.

“It’s a cliche after Watergate that the key investigation in most circumstances is to ‘follow the money’ (in the words of Deep Throat). This is the story of how Mossad led this movement and substantially effected investigations of terrorism and similarly important matters and how this influenced the CIA’s later work in the same field. Bravo Mossad! Thanks for leading the way” – R. James Woolsey, CIA director (1993-1995)

And here is the press release for the book, that gives an inside look:

The haunting images of the hijacked airliners crashing into the World Trade Center, the pools of blood on the streets of Paris, and the aftermath of the horrific massacres in a nightclub in Orlando and on the streets of Barcelona, have been seared into our collective conscious, leaving us all feeling frustrated, vulnerable and afraid. Tragically, the universal approach to combating this ruthless global threat has been focused on the conventional responses anchored in dilatory military actions that have produced foreseeable and pedestrian results. However, with groups like ISIS bringing in billions of dollars annually to finance their attacks, and the Islamic Republic of Iran bankrolling its proxies Hamas and Hezbollah with an endless flow of cash, a small and covert group of intelligence operatives spearheaded a dynamic new front to combat terrorist armies by depriving them of the oxygen they require to breath: the money needed to carry out attacks around the world. This is a story of a pioneering and innovative method of fighting terrorism – financial warfare waged against the extremist organizations, their leadership and the rogue regimes that support them. It all began in Israel, the small and embattled nation that has become fabled for its cutting edge hi-tech creativity and the prowess of its espionage services. This is the previously untold tale of perhaps the greatest and most disruptive Israeli start-up of them all and its joint-venture with the United States’ counterterrorism community.

In HARPOON: Inside The Covert War Against Terrorism’s Money Masters, Israeli activist attorney Nitsana Darshan-Leitner and New York Times bestselling author Samuel M. Katz bring to light the previously classified account of how one nation, facing a tsunami of unstoppable suicide terrorism, forged its intelligence, military, law enforcement, and political leaders into a powerful task force, code-named Harpoon, to combat terror financing around the world.

Traveling back to the 1990s, Darshan-Leitner and Katz introduce Meir Dagan, a legendary soldier and spymaster, who spent a lengthy military career serving the State of Israel in the up-close-and-personal world of deadly special operations ultimately becoming the director of the Mossad, the Jewish State’s famed espionage service. Dagan’s reputation was that of a warrior, a man who moved silently behind enemy lines with a dagger between his teeth. But as a commanding general frustrated with the limitations and inefficiencies of the conventional approach to warfare that failed to stem the waves of bus-bombings, drive-by shootings and suicide attacks in Israel, Dagan sought new and imaginative strategies. He pieced together an outside-the-box solution to target the source of the terrorists’ power, a complex underground economy of “blood money” that enlisted banks and charities to distribute funds to the diabolical masterminds behind the suicide attacks and catastrophic murders. Dagan assembled a dream team of specialists from the intelligence services, the Israel Defense Force, the National Police, and even Israel’s IRS, to fight the ever transforming terrorist groups and their money across the Middle East, South America, Africa, and around the globe. In the process, Harpoon fused an operational alliance with the highest reaches of the United States government to fight terror on a truly global front.

This is the untold and remarkable story of modern day “Untouchables.” This elite and covert force intercepted banking records, perpetrated financial con games, unleashed invasive and destructive computer malware attacks, called in missile strikes against bankers, and violently eliminated financiers and bag men in foreign capitals. This is also the story of the private lawyers who pioneered the use of American counterterrorism suits to bring terrorist groups, and the countries and financial institutions that provided them material support, to their knees.

I have several new heroes here. This is just my kind of book. These are the good guys, make no mistake about it. If you want a peak into the real war on terror, this book is it. Pick up a copy at Amazon.com. I’m passing mine on to friends in the counterterrorism fields here in the US. It’s an epic read.