Anti-abortion activist Randall Terry famously said, “Fool me once, shame on you. Fool me twice, shame on me.” But in discussing Iran’s nuclear weapons program, we need to ask what it says about subsequent American governments that they have been continually fooled by Tehran’s mullahs in their efforts to develop nuclear weapons.
Last week, we learned that the Iranians are fooling us again.
As an irresponsible media fails to educate Americans on a threat that not only will become a reality in our lifetime, but menace our children during theirs, the place to start for the most naïve among us is by asking: Should it really matter whether Tehran becomes the tenth member of the nuclear arms club? Continue reading
The next administration will face a number of important nuclear policy decisions. On May 13, I invited Franklin Miller, a Principal in the Scowcroft Group, and a former top White House defense official, to discuss these matters before an audience of Congressional staff, senior administration defense and security officials, top staff from defense and security public policy organizations, defense media, defense industry officials and a number of allied embassy colleagues. It was interestingly the 1400th seminar I have hosted on the Hill since 1983 on key defense and national security matters.
Franklin Miller in his prepared remarks extensively addressed the nature of the current debate on future nuclear modernization and whether the US force was obsolete, unaffordable, destabilizing or an obstacle to further arms control. Those remarks were posted recently by Family Security Matters. Continue reading
German counter-intelligence believes that at least 29 former soldiers from the country have left to join Islamic State in Syria and Iraq. An internal report also revealed that 65 active soldiers are being investigated for alleged jihadist sympathies.
The report was undertaken by the German military counter intelligence service (MAD), which was seen by the DPA news agency. The documents show that at least 29 former German soldiers have fled to the Middle East to join Islamic State (IS, formerly ISIS/ISIL).
Social Democratic Party (SPD) MP Hans-Peter Bartels, who is responsible for oversight of the army, said on Tuesday that “Islamism isn’t the main problem of the Bundeswehr (German Army), however, he did mention that “it represents a real danger that we have to take seriously.”
While the saying goes “good fences make good neighbors,” it appears the leadership of The EU is starting to get frustrated with the lack of acquiescence among some of the ‘union’s’ newer or more marginal members. In a somewhat stunning statement, following ongoing and contentious meetings to discuss solutions to the migrant ‘problem’, EU Commissioner Timmermanns appeared to warn disagreeable member states, “There is an alternative to everything. I believe in EU cooperation because of all other forms in history have been tried to help Europeans get on better, and with the exception of this one, all other forms have led to war – so let’s stick to this one.” Continue reading
Vladimir Putin is basking in Russia’s triumphant return to the world stage.
And then there’s Iran and its nascent nuclear program. Putin accused the US of illegitimately seeking to play nuclear police officer, a point on which he is unquestionably correct: The “hypothetical nuclear threat from Iran is a myth. The US was just trying to destroy the strategical balance, [and] not to just dominate, but be able to dictate its will to everyone – not only geopolitical opponents, but also allies.” Continue reading
Not only is the American defense system a sham, but the Sino-Soviet alliance is weaponizing space. The US abandonment of the Star Wars program was absolute suicide and a strategic deception on Russia’s part through it’s so-called ‘collapse’. Meanwhile, Russia has also claimed the ability to evade any missile defense with its latest ballistic missile technology.
If you think America is safe today and has nothing to worry about because it’s in tip-top shape, you either haven’t been paying attention at all or are willfully blind.
You can also take a look at the following, but not complete list of previous articles, to put into perspective the grave danger America is putting itself in:
Further information on America’s unpreparedness from Loren Thompson can be found on this PDF article:
The nicest thing that can be said about this approach to security is that it opened the way to reductions in nuclear arsenals on both sides. The arms reductions have been substantial, but in a way they don’t matter: Russia still has an assured capacity to obliterate America’s society and economy. That isn’t going to change, because Moscow doesn’t trust Washington and nuclear weapons are its sole remaining claim to superpower status. Continue reading
“Mutually assured destruction” was a doctrine that rose to prominence during the Cold War, when the US and the USSR faced each other with nuclear arsenals so populous that they ensured that any nuclear exchange between the two great military powers would quickly lead to mutual overkill in the most literal sense.Notwithstanding the newly dismal relations between the US and Russia, “mutually assured destruction” now best describes the uneasy stand-off between an increasingly indebted US government and an increasingly monetarily frustrated China, with several trillion dollars’ worth of foreign exchange reserves looking, it would now appear, for a more productive home than US Treasury bonds of questionable inherent value.
Until now, the Chinese have had little choice where to park their trillions, because only markets like the US Treasury market (and to a certain extent, gold) have been deep and liquid enough to accommodate their reserves. Continue reading
If Russia wanted to, they likely could’ve powered America off yesterday. The United States has done almost next to nothing to shield it self from such an attack with the exception of putting out news reports by officials who state they’re working on a plan or ‘taking measures’ to ensure networks and infrastructure remain secure. Conducting a search here under ‘SCADA‘ will reveal just how vulnerable America really is — and that’s just one attack method of many needing to be guarded against.
A destructive “Trojan Horse” malware program has penetrated the software that runs much of the nation’s critical infrastructure and is poised to cause an economic catastrophe, according to the Department of Homeland Security.
National Security sources told ABC News there is evidence that the malware was inserted by hackers believed to be sponsored by the Russian government, and is a very serious threat. Continue reading
Germany is planning to possibly resume counter-espionage measures against several Western allies, according to a report in the news magazine Spiegel. The report said British and US embassies could be targeted.
Germany is debating plans to expand its counter-espionage personnel and conduct “foundational monitoring” of the embassies of such nations as the United States and Britain, Spiegel said in its report on Sunday. Continue reading
What good is a nuclear deterrent when it’s compromised? The “MAD” concept has been effectively thrown out the window. What’s more is the American public is 99.9% unaware of the grave danger this puts them in, let alone it happened at all. Sadly, the only “football” most are concerned about is the one that gets tossed around on Monday nights.
Hackers linked to China’s government broke into one of the U.S. government’s most sensitive computer networks, breaching a system used by the White House Military Office for nuclear commands, according to defense and intelligence officials familiar with the incident.
One official said the cyber breach was one of Beijing’s most brazen cyber attacks against the United States and highlights a failure of the Obama administration to press China on its persistent cyber attacks.
U.S. officials familiar with reports of the White House hacking incident said it took place earlier this month and involved unidentified hackers, believed to have used computer servers in China, who accessed the computer network used by the White House Military Office (WHMO), the president’s military office in charge of some of the government’s most sensitive communications, including strategic nuclear commands. The office also arranges presidential communications and travel, and inter-government teleconferences involving senior policy and intelligence officials.
“This is the most sensitive office in the U.S. government,” said a former senior U.S. intelligence official familiar with the work of the office. “A compromise there would cause grave strategic damage to the United States.”
Security officials are investigating the breach and have not yet determined the damage that may have been caused by the hacking incident, the officials said.
Despite the administration national security official’s assertion, one defense official said there is fairly solid intelligence linking the penetration of the WHMO network to China, and there are concerns that the attackers were able to breach the classified network.
Details of the cyber attack and the potential damage it may have caused remain closely held within the U.S. government.
However, because the military office handles strategic nuclear and presidential communications, officials said the attack was likely the work of Chinese military cyber warfare specialists under the direction of a unit called the 4th Department of General Staff of the People’s Liberation Army, or 4PLA.
It is not clear how such a high-security network could be penetrated. Such classified computer systems are protected by multiple levels of security and are among the most “hardened” systems against digital attack.
However, classified computer systems were compromised in the past using several methods. They include the insertion of malicious code through a contaminated compact flash drive; a breach by a trusted insider, as in the case of the thousands of classified documents leaked to the anti-secrecy web site Wikileaks; and through compromised security encryption used for remote access to secured networks, as occurred with the recent compromise involving the security firm RSA and several major defense contractors.
According to the former official, the secrets held within the WHMO include data on the so-called “nuclear football,” the nuclear command and control suitcase used by the president to be in constant communication with strategic nuclear forces commanders for launching nuclear missiles or bombers.
The office also is in charge of sensitive continuity-of-government operations in wartime or crises.
The former official said if China were to obtain details of this sensitive information, it could use it during a future conflict to intercept presidential communications, locate the president for targeting purposes, or disrupt strategic command and control by the president to U.S. forces in both the United States and abroad.
Former McAffee cyber threat researcher Dmitri Alperovitch said he was unaware of the incident, but noted: “I can tell you that the Chinese have an aggressive goal to infiltrate all levels of U.S. government and private sector networks.”
“The White House network would be the crown jewel of that campaign so it is hardly surprising that they would try their hardest to compromise it,” said Alperovictch, now with the firm Crowdstrike.
Last week the senior intelligence officer for the U.S. Cyber Command said Chinese cyber attacks and cyber-espionage against Pentagon computers are a constant security problem.
“Their level of effort against the Department of Defense is constant” and efforts to steal economic secrets are increasing, Rear Adm. Samuel Cox, Cyber Command director of intelligence, told Reuters after a security conference.
“It’s continuing apace,” Cox said of Chinese cyber-espionage. “In fact, I’d say it’s still accelerating.”
The office is also in charge of the White House Communications Agency, which handles all presidential telephone, radio, and digital communications, as well as airlift operations through both fixed-wing and helicopter aircraft.
It also operates the presidential retreat at Camp David and the White House Transportation Agency.
“To assure proper coordination and integration, the WHMO also includes support elements such as operations; policy, plans, and requirements; administration, information resource management; financial management and comptroller; WHMO counsel; and security,” the website states.
“Together, WHMO entities provide essential service to the president and help maintain the continuity of the presidency.”
A report by the defense contractor Northrop Grumman made public by the congressional U.S.-China Economic and Security Review Commission in March stated that China’s military has made targeting of U.S. command and control networks in cyber warfare a priority.
“Chinese capabilities in computer network operations have advanced sufficiently to pose genuine risk to U.S. military operations in the event of a conflict,” the report said.
“PLA analysts consistently identify logistics and C4ISR infrastructure as U.S. strategic centers of gravity suggesting that PLA commanders will almost certainly attempt to target these system with both electronic countermeasures weapons and network attack and exploitation tools, likely in advance of actual combat to delay U.S. entry or degrade capabilities in a conflict,” the report said.
C4ISR is military jargon for command, control, communications, computers, intelligence, surveillance, and reconnaissance.
Little is known within the U.S. intelligence community about Chinese strategic cyber warfare programs.
However, recent military writings have disclosed some aspects of the program, which is believed to be one of Beijing’s most closely guarded military secrets, along with satellite weapons, laser arms, and other high-technology military capabilities, such as the DF-21 ballistic missile modified to attack aircraft carriers at sea.
A Chinese military paper from March stated that China is seeking “cyber dominance” as part of its efforts to build up revolutionary military capabilities.
“In peacetime, the cyber combat elements may remain in a ‘dormant’ state; in wartime, they may be activated to harass and attack the network command, management, communications, and intelligence systems of the other countries’ armed forces,” wrote Liu Wangxin in the official newspaper of the Chinese military on March 6.
“While great importance is attached continuously to wartime actions, it is also necessary to pay special attention to non-wartime actions,” he said. “For example, demonstrate the presence of the cyber military power through cyber reconnaissance, cyber deployment, and cyber protection activities.”
Full article: White House Hack Attack (Washington Free Beacon)