STILL ALIVE AND KICKING – DIE STASI SEILSCHAFTEN 2020

STILL ALIVE AND KICKING – DIE STASI SEILSCHAFTEN 2020

https://www.welt.de/debatte/kommentare/article134309778/Auf-die-SED-Seilschaften-ist-noch-immer-Verlass.html

Daran hat sich nichts geändert. Im Gegenteil: Die STASI-Connections zu Putin und auch nach China werden intensiver genutzt denn je:

  • für Subventionsbetrug
  • Energie-Pipelines
  • Gazprom Deutschland
  • Cybercrime
  • Zersetzung der deutschen und europäischen Politik, Justiz, Medien und Wirtschaft

Wie schon immer werden die STASI-Seilschaften aus Moskau dirigiert.

Denn auch Wladimir Putin ist einer von ihnen:

Quellbild anzeigen

 

TOP SECRET – GRU Close Access Cyber Operation Against OPCW

TOP SECRET – GRU Close Access Cyber Operation Against OPCW

The following presentation was released by the U.S. Department of Justice in relation to their indictment of seven Russian GRU officers on charges related to “International Hacking and Related Influence and Disinformation Operations.”

 

Page Count: 35 pages
Date: October 4, 2018
Restriction: None
Originating Organization: Dutch Ministry of Defence
File Type: pdf
File Size: 9,485,284 bytes
File Hash (SHA-256): D9055D137D16AF0D58F4F2EB5B9A9094CDAAF18013F13989BE5B3341FCCE099B

Download File

 

 

 

Video – THE KGB LIST REVEALED

You want to check whether a certain person was or is in the KGB ? You may look at on this website http://www.berndpulch.org in the KGB spies category for more information.

U.S. STATE DEPARTMENT REPORT ABOUT BELARUS REVEALED

Bildergebnis für LUKASCHENKO

The accompanying report is a piece of a progression of Social Media Landscape guides delivered by the U.S. Branch of State for its U.S.- European Media Hub which is depicted as interfacing “European crowds with U.S. policymakers and viewpoints.” The Media Hub, which is situated in Brussels, Belgium, is a piece of the International Media Engagement Office of the U.S. Branch of

State.

For USG Official Use Only

Web-based social networking Landscape: Belarus

I. Belarus initially

Web-based social networking appropriation is beginning and restricted to significant urban areas (particularly Minsk)

Broad communications control makes online networking an undeniably progressively believable wellspring of data

Utilization of web-based social networking in government is constrained to a great extent to resistance groups

Absence of framework and the predominant Russian language implies Belarusian online networking are subsumed inside the Russian Internet people group

II. Official Summary

The Internet and online networking are in beginning times of advancement in Belarus. The absence of foundation and the expense of access imply that the online network is described by well-to-do, instructed working classes from the metropolitan regions of the nation (particularly Minsk). Web in Belarus has not yet accomplished the infiltration important to be socially agent.

In spite of the availability challenges, online life are as yet demonstrating well known, especially among more youthful socioeconomics. Online data sources and particularly web based life, guarantee an unprejudiced nature that is frequently ailing in Belarusian broad communications channels, which many consider to be excessively impacted by the national government. From a political perspective, this hosts implied that restriction gatherings have been swifter to explore different avenues regarding on the web commitment to increase open help, despite the fact that their utilization of internet based life as vital instrument for battling is still moderately test.

A noteworthy test for online networking networks in Belarus will be in setting up their own character, separate to the Russian Internet space. The absence of committed Belarusian stages and framework implies that somewhat Belarus online culture is being subsumed by Russia. Online in any event, the limits are obscured.

III. Access

Web get to rates in Belarus are low contrasted with the remainder of Europe, with by far most of action moved in Minsk

The predominant online gathering is men, matured between 15-34, knowledgeable and living the capital

Charges imposed on Belarusian Internet spaces are a noteworthy factor in easing back the improvement of the nation’s online economy

Connection between Internet access and family profile

Connections:

Hitched: 44.69%

Not wedded: 42.84%

Unregistered wedded: 5.65%

Separated or bereaved: 6.8%

Family size:

Living alone: 6.56%

Living in a group of two: 17.04%

Living in a group of three: 35.84%

Living in a group of four: 31.09%

Living in a group of five +: 9.47%

Web access in Belarus is accessible to 32.5% of the populace, while cell phone entrance remains at 76%. Cell phone entrance rates are low thus most by far of individuals get to online substance through PCs or PCs. Web action is packed in the capital, Minsk, and the encompassing area, where 45.7% of the online populace are dynamic. The rest of individuals is circulated the nation over major urban focuses: 16% in the Brest district, 7.3% in the Vitebsk area, 12.8% in the Gomel locale, 9.9% in the Grodno district and 8.3% in the Mogilev area.

Most of Internet clients are male (53%) and underneath the age of 24 (15-multi year-olds represent 38% of the online populace). 25-multi year-olds structure 25% of the network, 35-multi year-olds 22% and those 45 and over are the minority bunch at 15%. This age profile joined with the segment dissemination make Internet get to the advantage of the more youthful instructed, set up white collar classes. Understudies, “experts” and center to top level chiefs are the biggest three gatherings dynamic on the web, while practically 50% of all Internet clients are hitched (44.7%). Just 9.5% of Internet clients live in groups of more than five individuals, another sign that as of now in Belarus the online populace is only characterized by rich, urban, taught and proficient classes.

Proficient dispersion of Internet clients

Understudies: 18.48%

Experts: 18.18%

Center and ranking directors: 11.27%

Architects/manual specialists: 11.04%

Business visionaries (SME): 4.93%

Regulatory specialists: 4.83%

Joblessness: 1.91%

Others: 17.42%.

In the mean time, from a foundation viewpoint, there are right now around 180 broadcast communications organizations associated with giving Internet get to, another sign that development and combination is yet to be accomplished in the Belarus advertise.

14.9% of Internet clients approach broadband (4.8% of the populace generally), a low figure contrasted with most of other European nations. The major broadband specialist organization is Beltelecom.

A critical factor easing back the improvement of the Internet economy in Belarus is the enrollment procedure important to verify a .by space.

Candidates must enlist their area by means of a privately owned business; “Otrkytyj kontakt”, and a devoted government body; The State Center for Security of Information. The expense of enrollment and backing is around USD50, contrasted with USD2.49 for a similar assistance to help a .ru (Russian) space. Especially in the non-business division, this extra expense is a huge boundary to advancement.

IV. Action

Livejournal is the most well known stage for online movement in Belarus and blogging as a rule is demonstrating a famous action

Russian stages are additionally exceptionally powerful, particularly the informal organization VKontakte. As far as online networking movement, the limits among Belarus and Russia are unmistakably obscured

In spite of the entrance issues, web based life are demonstrating mainstream since they offer an elective wellspring of data to the broad communications, saw by numerous individuals as ailing in believability because of state impact

Blogging is picking up fame in Belarus and the age scope of bloggers is expanding. In 2007, a universal web based life grants occasion named a Belarusian task, Fotografomanstvo (created by Livejournal client ak-bara http://ak-bara.livejournal.com), best blog. Belarusian bloggers are a dedicated network in general; while half keep up one blog, 46% compose a few sites and 4% at least four web journals.

The greater part of Belarusian bloggers are male (75%) and in their mid twenties (normal age 25). 46% are understudies or have accomplished a college degree and generally (79%) live in the Belarusian capital, Minsk. Just like the case in neighboring Russia, the most famous innovation stage for blogging is Livejournal, with WordPress additionally well-utilized.

Nearby blogging stages are additionally now rising. The first of these, blog.inf.by, propelled in 2005. It currently has around 2,200 web journals, including the well known “Library blog”, which centers around libraries and data in Belarus and past and has won a few Belarusian media grants. ByJournal is additionally demonstrating well known and now has organizing occasions to which prominent Belarusian bloggers are welcomed. Another well known, nearby stage is blog.tut.by, which positions itself as the goal for VIP and the stage online journals.

With regards to person to person communication, most of Belarusians utilize Russian stages. VKontakte.ru (a Russian Facebook clone), Livejournal, Liveinternet and Diary.ru are generally famous centers of action. Face.by, propelled as the principal Belarusian interpersonal organization, presently has a little more than 17,000 individuals. The other fundamental systems utilized in the nation are Belarusy.by (25,229 individuals) Vsevmeste.net and Parta.by (a system made explicitly to rejoin previous school cohorts, on which movement levels are generally low). As far as mixed media, a neighborhood photosharing stage, Photoclub.by, is additionally well known. For long range informal communication generally, in any case, enrollment volume and movement rates are low contrasted with those of the Russian-possessed systems.

Migrant gatherings have embraced online networking as a way to keep in touch inside the network. Belarusians who have moved to another country likewise utilize online life so as to connect with individual exiles. Livejournal people group are the most famous channel for such action. Especially noteworthy networks incorporate by_mf, by governmental issues, by_warszawa, belarus_france, by_maskva, by_praha, by_warszawa, catholic_by, great_litva, and ua_by.

In spite of the fact that Internet entrance rates are moderately low in Belarus, among those with get to, online life is demonstrating famous and a chance to organize. Various grassroots occasions have occurred to join the Belarusian Internet people group, including BarCamp-style social affairs assembled ByCamp and conferences of the little however developing digital broadcast network (dynamic on the Russian podcasting stage rpod.ru at bel.rpod.ru and podminsk09.rpod.ru). Since 1999 various conventional meetings outfitted towards invigorating the Belarus Internet economy have additionally occurred. These incorporate the Belarusian Internet Forum (occurred yearly somewhere in the range of 1999 and 2005), local gatherings in Grodno, Vitebsk and Brest and, in 2006, the main meeting committed to online business. Generally, be that as it may, sorted out gathering movement is moderately sporadic.

Customary media investment in online networking

Some experimentation with internet based life is occurring among the news outlets, in spite of the fact that it is as of now restricted in scope. The paper Nasha niva (Наша ніва) has writes by well known editorialists including Alexander Klasnovsky, Lelik Ushkin, conventional clergyman Alexander Shamko, and picture takers Andrey Lenkevich and Yulia Doroshkevich. In any case, their substance and style of introduction contrasts nearly nothing.

AMERICAN OVERSIGHT DISCOVERS EVIDENCE OF OBSTRUCTION

Just before 12 PM on Tuesday night, the White House spending office discharged almost 200 pages of Ukraine-related records to American Oversight because of a FOIA claim. Those pages included already unreleased messages that demonstrated high ranking representatives in the Office of Management and Budget (OMB) were laying the basis to freeze military help to Ukraine even before President Trump’s scandalous July 25 call with Ukrainian president Volodymyr Zelensky.

These records had likewise never been given to Congress — either during the House reprimand hearings or the Senate preliminary. Truth be told, in the hours preceding the OMB records were discharged to American Oversight, the Senate opposed two separate endeavors to give subpoenas looking for huge numbers of these equivalent reports.

Under 18 hours after the fact, on Wednesday evening, the archives we had acquired from OMB were in plain view on the Senate floor. Delegate Jason Crow, one of the House’s indictment chiefs, held up a duplicate of an intensely redacted email that had been discharged to American Oversight and posted on our site.

Later that night, Representative Adam Schiff again highlighted the OMB messages we revealed.

As we have composed previously, the way that American Oversight has had the option to get Ukraine-related records through FOIA when those equivalent archives were retained from House examiners is away from of the Trump organization’s hindrance of Congress. Our work was refered to in the House Intelligence Committee’s denunciation report, and Obstruction of Congress is the second of the two articles of indictment at present pending before the Senate.

The Trump White House and Senate Majority Leader Mitch McConnell have been depending on a methodology of all out hindrance to forestall the Senate and the American individuals from getting the full truth about the Ukraine outrage. Yet, on account of FOIA prosecution from American Oversight, the New York Times, the Center for Public Integrity, and others, that technique is separating.

As of now we have gotten a few hundred pages of reports that — even regardless of overwhelming redactions — have revealed new insight into the planning and execution of the plan to retain military guide from Ukraine in return for political impedance in the up and coming political decision.

Also, more records are just around the corner. Next Tuesday, January 28, the Department of Energy has a cutoff time to start discharging responsive records identified with previous secretary Rick Perry’s job in an official assignment to President Zelensky’s introduction just as his interchanges with key people. Perry was one of the alleged “three amigos” who, alongside EU Ambassador Gordon Sondland and previous Ukraine agent Kurt Volker, were entrusted with executing President Trump’s motivation in Ukraine. He has since left the organization, however his records despite everything have a place with the American individuals, and we’re going to continue battling to make them open.

There are significantly greater archive generation cutoff times coming throughout the following half a month, and as we have done previously, we will cause the records we to acquire accessible to the general population here on the site.

Indeed, even as the reprimand preliminary has become the overwhelming focus, we’ve been proceeding with our work to research new improvements in the Ukraine adventure just as progressing defilement and offense over the Trump organization. This is what else our group has been dealing with this week:

Records of Giuliani’s DOJ Visits: While a significant number of the most recent disclosures in the reprimand procedures have rotated around OMB or the State Department, Trump legal counselor Rudy Giuliani stays a focal figure in the undertaking. A week ago, CNN detailed that Attorney General William Barr was at a Justice Department meeting where Giuliani was likewise present. We approached the DOJ for guest logs, safety faculty messages, and different records used to monitor guests that may reflect visits made by Rudy Giuliani and others.

Fox and Feds: The connection between Fox News and the Trump Administration is surely a particular one. President Trump consistently communicates his inclination for Fox News inclusion, once in a while by conceding more extensive access to Fox journalists. In the mean time, a spinning entryway has framed between the news source and the organization with over twelve previous Fox donors currently serving in government positions. We recorded a solicitation to the State Department for correspondences sent to Fox News from explicit organization authorities who used to work with the media organization, including State Spokesperson Morgan Ortagus and a few U.S. represetatives.

Boeing’s New Boardmember: Last Spring, previous U.S. Represetative to the United Nations Nikki Haley joined Boeing’s top managerial staff — a choice she made in the wake of depicting the private part as a “progression up” from open help. Haley presently directs the private aviation organization which likewise satisfies billions of dollars worth of government contracts, basically for the U.S. military. We documented solicitations to various offices to learn if Haley has reached high positioning government authorities since the start of her residency at Boeing, including pioneers at the Department of Defense, the Department of State, NASA, and the Department of Transportation. We additionally mentioned any interchanges among Haley and Boeing during her administration as UN Ambassador.

Delrahim’s Texting Practices: In December the New York Times revealed that Makan Delrahim, aide lawyer general of the DOJ’s antitrust division, worked with T-Mobile and Sprint, two of the biggest remote organizations, to close a merger worth $26 billion. Instant messages uncover that Delrahim assumed a bizarrely included job in supporting the organizations through the guideline procedure, showing that the DOJ might not have endorsed the notable merger without his assistance and bringing up issues about his messaging practices (and how he directs official office business). We’re approaching the DOJ for Delrahim’s resume and morals records, just as his instant messages and schedule passages beginning from when he expected office in September 2017.

Adapting the DOD’s Emergency Network: Rivada Networks, an interchanges innovation organization that professes to turn “remote systems into business sectors,” has campaigned the Trump organization with a foundation model that adapts the DOD’s regularly unused crisis arrange framework. The Rivada framework vows to bring better system administration to rustic networks by selling the system when it’s not being used. In any case, questions have been raised about the model’s common sense just as about claims that Rivada’s top official attempted to bypass the government contract grants forms with a past organization. We requested interchanges between certain FCC authorities and explicit outer people and gatherings to decide whether outside impacts are controlling government broadcast communications approach.

Records from the Commission on Unalienable Rights: On July 8, 2019, Secretary of State Mike Pompeo declared the arrangement of the Commission on Unalienable Rights, a board that will furnish the secretary with human rights guidance while attempting to additionally characterize the idea of ‘unalienable rights.’ The commission raised quick worry among scholastics and human rights gatherings. Kenneth Roth, official executive of the Human Rights Watch, affirmed that the commission’s hearings “have been laden with dangers to the exceptionally human rights that the commission indicates to fortify… . [and] the reason for this commission isn’t to maintain all rights yet to single out among them.” We documented a solicitation under the Federal Advisory Committee Act for commission meeting records that ought to have been made accessible to people in general.

EPA’s California Communications: When the EPA and DOT moved to move back national tailpipe contamination benchmarks, the province of California reacted by suing the Trump organization and marking a different arrangement with automakers. From that point forward, the Trump organization has made a progression of substantive objections against California, numerous through the EPA. We approached the EPA for correspondences between top organization authorities and the White House about California to get familiar with the EPA’s inspirations driving late activities.

Tennessee Valley Authority Travel Expenses: Last September, examiners assessed about $1.8 million dollars worth of movement costs of the governmentally claimed Tennessee Valley Authority (TVA). An auditor general’s report discovered occasions of unreasonable travel spending among TVA administrators infringing upon government guidelines, including expensive suppers, picking progressively costly vehicle benefits, and overpaying remittances. We documented a solicitation for records that can reveal insight into movement costs for TVA officials.

State Accountability Project: Over the previous year American Oversight has researched Texas authorities’ interchanges with “voter extortion” lobbyist gatherings, documented open data demands about surveying place terminations, just as Texas voter move support orders. Presently we’re asking numerous Texas elements, including the Texas Senate and Office of the Governor, for duplicates of their strategies with respect to records maintenance and email auto-cancellation. We additionally recorded a progression of solicitations about changes to surveying place areas in Clayton County, Georgia.

STATE DEPARTMENT RELEASES UKRAINE DOCUMENTS

On Friday evening, the State Department released nearly 100 pages of records in response to American Oversight’s lawsuit seeking a range of documents related to the Trump administration’s dealings with Ukraine.

Among other records, the production includes emails that confirm multiple contacts in March of 2019 between Secretary of State Mike Pompeo and Trump lawyer Rudy Giuliani, at least one of which was facilitated by President Trump’s assistant Madeleine Westerhout.

American Oversight is reviewing the production to assess whether the State Department has fully complied with the court’s order. Notes on what we’ve found are below.

You can download the documents here. They are also available below.

 

Statement from American Oversight Executive Director Austin Evers

“We can see why Mike Pompeo has refused to release this information to Congress. It reveals a clear paper trail from Rudy Giuliani to the Oval Office to Secretary Pompeo to facilitate Giuliani’s smear campaign against a U.S. ambassador.

“This is just the first round of disclosures. The evidence is only going to get worse for the administration as its stonewall strategy collapses in the face of court orders.

“That American Oversight could obtain these documents establishes that there is no legal basis for the administration to withhold them from Congress. That conclusively shows that the administration is engaged in obstruction of justice. The president and his allies should ask themselves if impeachment for obstruction is worth it if the strategy isn’t even going to be effective.

“This lawsuit is just one of several American Oversight is pursuing to bring transparency to the Ukraine investigation. The public should expect more disclosures, over the administration’s strong objection, for the foreseeable future.”

 

In the Documents

New: The documents show a March 26, 2019, call between Rudy Giuliani and Mike Pompeo. (Page 39 of document)

A March 28, 2019, email includes a list of scheduled calls for Pompeo. Calls include Rudy Giuliani on March 29, and Rep. Devin Nunes on April 1, 2019.

On March 27, 2019, Rudy Giuliani’s assistant contacted Madeleine Westerhout, who was serving as the president’s Oval Office gatekeeper at the time. She asked Westerhout for a “good number” for Pompeo, adding that she had “been trying and getting nowhere through regular channels.” Westerhout contacted someone at the State Department to ask for a number she could provide. (Page 55)

During his closed-door testimony, career diplomat David Hale mentioned two calls between Pompeo and Giuliani, one on March 28, 2019, and one on March 29. The documents include a March 28 email to Hale indicating that Pompeo had been the one to request a call with Giuliani. (Page 45)

The March 29 call appears on page 46, and the confirmation of its scheduling is on page 44.

Also in the documents: An April 5 letter to the State Department from six former U.S. ambassadors to Ukraine (including Bill Taylor), expressing their concern about the attacks on U.S. Ambassador to Ukraine Marie Yovanovitch. (Page 13)

On April 12, 2019, Reps. Steny Hoyer and Eliot Engel wrote to Pompeo, also expressing their concern (page 28). The State Department responded on June 11, saying “Yovanovitch was due to complete her three-year diplomatic assignment in Kyiv this summer.” (Page 34)

Note: The State Department did not produce a formal directive recalling Yovanovitch or a formal readout of Trump’s July 25 call with Zelensky. Both of these were covered by the court’s production order.

FBI Counterintelligence Note Warns About Chinese Talent Programs

FBI Counterintelligence Note Warns About Chinese Talent Programs

 

Chinese Talent Programs are a vital part of Chinese industry. Talent programs recruit experts to fill technical jobs that drive innovation and growth in China’s economy. National, provincial, and municipal talent recruitment programs provide opportunities for experts to work in industry and academic organizations supporting key areas deemed critical to China’s development. The talent programs recruit experts globally from businesses, industry, and universities with multiple incentives to work in China. Associating with these talent programs is legal and breaks no laws; however, individuals who agree to the Chinese terms must understand what is and is not legal under US law when sharing information. A simple download of intellectual property (IP) or proprietary information has the potential to become criminal activity.

(U//FOUO) The large number of foreign students, researchers, scientists, and professionals in the United States, combined with current technological capabilities, allows foreign governments to contact and recruit individuals with the hopes to acquire advanced technology without research costs. While the majority of the population are law abiding individuals, anyone has the capability to acquire information. The theft of information can come from current or former employees, business partners, consultants, contractors, temporary hires, foreign agents, suppliers, or even vendors who have access to proprietary information.

(U) Recruiting these individuals allows China to:

  • (U//FOUO) Gain access to research and expertise for cutting edge technology
  • (U//FOUO) Benefit from years of scientific research conducted in the United States supported by US Government grants and private funding
  • (U//FOUO) Severely impact the US economy.

(U) The goal of this SPIN is to provide an overview of the potential threats posed by the Chinese Talent Programs.

(U) THOUSAND TALENTS PROGRAM

(U//FOUO) China’s most prominent national talent recruitment program is the “Recruitment Program of Global Experts,” which is commonly known as the Thousand Talents Program. It focuses on identifying key national-level organizations and associ-ated personnel involved in implementation and management.

(U) Its goal is to recruit ethnic Chinese experts from Western universities, research cen-ters, and private companies to boost China’s national capabilities in the science and technology (S&T) fields and to move China forward as an innovative nation. The pro-gram also implemented sub-programs for both young and foreign (non-ethnic Chinese) experts.

(U//FOUO) Originally, this program had a five-to-ten year goal of recruiting 2,000 profes-sionals worldwide who could lead innovation and pioneering work in key technologies, and promote the development of emerging industries. However, this program expanded its scope — recruiting far more than the initial goal of 2,000 individuals — and extended its life through at least 2020.

(U) In order to be eligible as a candidate for the Thousand Talents Program, an individual must be in a field of study the Chi-nese Academy of Science (CAS) deems critical or meet the following criteria:

  • (U) Expert or scholar with full professorship in a prestigious foreign university or research and development (R&D) insti-tute
  • (U) Technical managerial professional in a senior position at an internationally known company or financial institution
  • (U) Entrepreneur holding IP rights or key technologies and possesses overseas experience

(U) THREAT TO US BUSINESS AND UNIVERSITIES

(U//FOUO) Chinese Talent Programs pose a serious threat to US businesses and universities through economic espionage and theft of IP. The different programs focus on specific fields deemed critical to China, to boost China’s national capability in S&T fields. These subject mat-ter experts often are not required to sign non-disclosure agreements with US entities, which could result in lost of unprotected information that jeopardizes contracts or research funding. One of the greatest threats toward these experts is transferring or transporting proprietary, classified, or export-controlled information, or IP, which can lead to criminal charges.

(U//FOUO) The threat not only targets businesses or universities but potentially targets the researchers or scientists themselves. The technology researched or developed not only costs millions of dollars but costs years, if not decades to develop. Additionally, the theft of informa-tion or IP creates a risk that someone else could take credit for the researcher’s efforts. The information stolen can be recreated, resold or claimed by others, which in turn will cost the originator creditability and potential funding for future endeavors.

(U) Theft of intellectual property is an increasing threat to organizations and can go unnoticed for months or even years. In today’s society, technology affords easier access to every aspect of academia and business. Some of these tools have become effective for recruiting, such as social media. Social media websites often display large amounts of personal data, such as who an individual works for, phone numbers, known associates, previous jobs, and locations. Additionally, websites like LinkedIn have full resumes, detailing the history of an individual’s achievements and accomplishments.

(U) The FBI assesses each year the United States loses billions of dollars due to technology transfer. While it is important to conduct collaborative research, it is vital for the survival of US businesses and universities that they protect their information and mitigate lost or stolen in-formation.

TOP-SECRET – Iran Making Nuclear Weapons Report

TOP-SECRET – Iran Making Nuclear Weapons Report

1. This report of the Director General to the Board of Governors and, in parallel, to the Security Council, is on the implementation of the NPT Safeguards Agreement and relevant provisions of Security Council resolutions in the Islamic Republic of Iran (Iran).

G. Possible Military Dimensions

38. Previous reports by the Director General have identified outstanding issues related to possible military dimensions to Iran’s nuclear programme and actions required of Iran to resolve these. Since 2002, the Agency has become increasingly concerned about the possible existence in Iran of undisclosed nuclear related activities involving military related organizations, including activities related to the development of a nuclear payload for a missile, about which the Agency has regularly received new information.

39. The Board of Governors has called on Iran on a number of occasions to engage with the Agency on the resolution of all outstanding issues in order to exclude the existence of possible military dimensions to Iran’s nuclear programme. In resolution 1929 (2010), the Security Council reaffirmed Iran’s obligations to take the steps required by the Board of Governors in its resolutions GOV/2006/14 and GOV/2009/82, and to cooperate fully with the Agency on all outstanding issues, particularly those which give rise to concerns about the possible military dimensions to Iran’s nuclear programme, including by providing access without delay to all sites, equipment, persons and documents requested by the Agency. Since August 2008, Iran has not engaged with the Agency in any substantive way on this matter.

40. The Director General, in his opening remarks to the Board of Governors on 12 September 2011, stated that in the near future he hoped to set out in greater detail the basis for the Agency’s concerns so that all Member States would be kept fully informed. In line with that statement, the Annex to this report provides a detailed analysis of the information available to the Agency to date which has given rise to concerns about possible military dimensions to Iran’s nuclear programme.

41. The analysis itself is based on a structured and systematic approach to information analysis which the Agency uses in its evaluation of safeguards implementation in all States with comprehensive safeguards agreements in force. This approach involves, inter alia, the identification of indicators of the existence or development of the processes associated with nuclear-related activities, including weaponization.

42. The information which serves as the basis for the Agency’s analysis and concerns, as identified in the Annex, is assessed by the Agency to be, overall, credible. The information comes from a wide variety of independent sources, including from a number of Member States, from the Agency’s own efforts and from information provided by Iran itself. It is consistent in terms of technical content, individuals and organizations involved, and time frames.

43. The information indicates that Iran has carried out the following activities that are relevant to the development of a nuclear explosive device:

• Efforts, some successful, to procure nuclear related and dual use equipment and materials by military related individuals and entities (Annex, Sections C.1 and C.2);
• Efforts to develop undeclared pathways for the production of nuclear material (Annex, Section C.3);
• The acquisition of nuclear weapons development information and documentation from a clandestine nuclear supply network (Annex, Section C.4); and
• Work on the development of an indigenous design of a nuclear weapon including the testing of components (Annex, Sections C.5–C.12).

44. While some of the activities identified in the Annex have civilian as well as military applications, others are specific to nuclear weapons.

45. The information indicates that prior to the end of 2003 the above activities took place under a structured programme. There are also indications that some activities relevant to the development of a nuclear explosive device continued after 2003, and that some may still be ongoing.

Escalating Tensions Between the United States and Iran Pose Potential Threats to the United States

Escalating Tensions Between the United States and Iran Pose Potential Threats to the United States

 

 

The Joint Intelligence Bulletin (JIB) is planned to help bureaucratic, state, nearby, innate, and regional counterterrorism, digital, and law implementation authorities, and private segment accomplices, to viably stop, forestall, appropriate, or react to episodes, deadly tasks, or fear based oppressor assaults in the United States that could be led by or for the benefit of the Government of Iran (GOI) if the GOI were to see activities of the United States Government (USG) as demonstrations of war or existential dangers to the Iranian system. The GOI could act straightforwardly or enroll the participation of intermediaries and accomplices, for example, Lebanese Hizballah. The FBI, DHS, and NCTC had evaluated any active retaliatory assault would initially happen abroad. In the occasion the GOI were to decide to direct a Homeland assault, potential targets and strategies for assault in the Homeland could run from digital activities, to focused deaths of people considered dangers to the Iranian system, to damage of open or private foundation, including US army installations, oil and gas offices, and open tourist spots. USG activities may likewise incite vicious radical supporters of the GOI to submit assaults in retaliation, with next to zero notice, against US-based Iranian protesters, Jewish, Israeli, and Saudi people and interests, and USG faculty.

(U//FOUO) Immediate Response in Homeland Could Take Form of Cyber Operations

(U//FOUO) The FBI, DHS, and NCTC survey a prompt GOI reaction in the Homeland could appear as endeavored digital activities against USG offices and systems, including US military frameworks, and basic private part works, given that such tasks could be endeavored by Iran-based digital entertainers without the need of building up a US nearness. The US Intelligence Community has evaluated that Iran keeps on getting ready for digital assaults against the United States and partners. It is fit for causing confined, impermanent problematic impacts during a digital assault on unfortunate casualty systems. Verifiably, Iran has demonstrated the capacity to complete troublesome and ruinous digital assaults against open and private business systems, for example, expanded dispersed forswearing of-administration (DDoS) battles and information erasure assaults.

(U//FOUO) Iran speaks to a digital secret activities and assault risk, utilizing progressively refined digital methods and endeavoring to convey digital abilities that would empower assaults against basic foundation in the United States. Tehran’s general hazard math for a digital reaction likely will change dependent on the US strike, which Iranian pioneers have vocally depicted as escalatory, and hostile digital activities are probably going to be considered as retaliatory alternatives. Malignant action and observation may not really happen from Iranian Internet Protocol (IP) space, as on-screen characters may utilize midpoint framework in different nations. All things considered, traffic from Iranian IP locations may not be demonstrative of malignant movement. The FBI, DHS, and NCTC stress great digital cleanliness, for example, fixing frameworks and instructing work force to make preparations for generally utilized digital entertainer procedures, for example, social building and lance phishing.

(U//FOUO) Potential for GOI-Directed Lethal Attacks in the Homeland

(U//FOUO) as of late, the USG has captured a few people following up in the interest of either the GOI or Lebanese Hizballah who have directed reconnaissance demonstrative of possibility making arrangements for deadly assaults in the United States against offices and people.

» (U//FOUO) A specialist of the GOI captured in 2018 had led observation of Hillel CenterUSPER and Rohr Chabad CenterUSPER, Jewish establishments situated in Chicago, including shooting the security highlights encompassing the Chabad Center.

» (U//FOUO) Three Lebanese Hizballah External Security Organization (ESO) agents captured somewhere in the range of 2017 and 2019 had directed reconnaissance of US military and law implementation offices, basic foundation, private segment scenes, and open tourist spots in New York City, Boston, and Washington, DC.

(U//FOUO) The GOI likewise has a background marked by directing deaths and death endeavors against people in the United States it regards a danger to the Iranian system. The GOI killed the US-based previous representative for the Shah of the Iran in 1980 and plotted to kill the Saudi Arabian envoy to the United States in 2011. In August 2018, the USG captured two people for going about as operators of the GOI by directing incognito reconnaissance of Iranian protesters in New York City and Washington, DC, and the previously mentioned security highlights of Jewish offices in Chicago.

 

Website Defacement Activity Indicators of Compromise and Techniques Used to Disseminate Pro-Iranian Messages

Website Defacement Activity Indicators of Compromise and Techniques Used to Disseminate Pro-Iranian Messages

Following a week ago’s US airstrikes against Iranian military initiative, the FBI watched expanded revealing of site ruination movement spreading Pro-Iranian messages. The FBI accepts a few of the site disfigurement were the consequence of digital on-screen characters misusing realized vulnerabilities in content administration frameworks (CMSs) to transfer ruination documents. The FBI exhorts associations and individuals worried about Iranian digital focusing on be acquainted with the markers, strategies, and procedures gave in this FLASH, just as strategies and methods gave in as of late spread Private Industry Notification “Notice on Iranian Cyber Tactics and Techniques” (20200109-001, 9 January 2020).

Specialized Details:

The FBI recognized malevolent on-screen characters utilizing known vulnerabilities in CMSs to transfer ruination pictures onto injured individual sites. The FBI trusts one on-screen character utilized realized vulnerabilities permitting remote execution by means of treat and remote establishment. The FBI likewise distinguished that one of the records utilized in a destruction was presented on a site where the server facilitating the undermined site was designed so outer clients could direct HTTP POSTs. The FBI watched the utilization of a HTTP PUT direction to transfer a destruction document to an injured individual server.

The FBI notes various on-screen characters directed site mutilation movement with genius Iranian messages. Accordingly, the IP locations and procedures utilized will change. The FBI distinguished the underneath groupings of destruction movement.

One lot of mutilation action utilized the beneath record:

Filename MD5

Default.aspx

87b3b80bb214c0f5cfa20771dd6625f2

The accompanying connections, contact data, and strings were remembered for a disfigurement record:

http://yon%5B.%5Dir/6YL2X

https://t%5B.%5Dme/ZetaTech_iR2

https://instagram%5B.%5Dcom/Mrb3hz4d

hackedbymrb3hz4d(at)gmail[.]com

The accompanying IP addresses are related with the on-screen character connected to the disfigurement action with the above referenced connections, contact data, and strings:

IP Address

83.123.83[.]61

196.64.50[.]13

A second arrangement of destruction movement was distinguished utilizing the underneath record:

Filename

hardrevenge11.html

The FBI takes note of the above mutilation picture was transferred by means of a HTTP PUT order. The accompanying IP address is related with the on-screen character connected to this arrangement of ruination action:

IP Address

2.182.188[.]39

A third arrangement of mutilation action was distinguished utilizing the underneath IP address:

IP Address

212.92.114[.]228

The FBI notes for this mutilation action, the on-screen character had the option to direct a HTTP POST of a document utilized in a destruction.

Best Practices for Network Security and Defense:

Utilize customary updates to applications and the host working framework to guarantee insurance against known vulnerabilities.

Set up, and reinforcement disconnected, a “known decent” adaptation of the pertinent server and an ordinary change-the board arrangement to empower checking for modifications to servable substance with a document honesty framework.

Utilize client input approval to confine nearby and remote record incorporation vulnerabilities.

Execute a least-benefits approach on the Webserver to:

o Reduce foes’ capacity to raise benefits or turn horizontally to different hosts.

o Control creation and execution of records specifically catalogs.

If not effectively present, consider sending a peaceful area (DMZ) between the Web-confronting frameworks and corporate system. Constraining the communication and logging traffic between the two gives a technique to recognize conceivable noxious movement.

Guarantee a protected arrangement of Webservers. Every single pointless assistance and ports ought to be incapacitated or blocked. Every essential assistance and ports ought to be confined where plausible. This can incorporate whitelisting or blocking outside access to organization boards and not utilizing default login qualifications.

Utilize a switch intermediary or elective support of limit available URL ways to known authentic ones.

Direct customary framework and application weakness sweeps to build up regions of hazard. While this strategy doesn’t secure against multi day assaults, it will feature potential zones of concern.

Convey a Web application firewall, and direct ordinary infection signature checks, application fluffing, code audits, and server arrange examination.