Krypt3ia

(Greek: κρυπτεία / krupteía, from κρυπτός / kruptós, “hidden, secret things”)

Archive for the ‘Nukes’ Category

ASSESSMENT: PARASTOO/DarkPassenger

leave a comment »

Screenshot from 2014-01-28 14:33:15

PARASTOO پرستو :

I got a tweet today about some data sitting on cryptome.org that got me thinking about this “group” again so I did some more digging online on them (him) The name of the “group” is Parastoo (پرستو Farsi) which means Swallow or bird. In the last year this guy (yes I think it’s literally one deranged person) had been active on at least two .ir sites that dealt with security and hacking and then started his own domains to ostensibly carry out cyber war against Israel and attempt to leverage the IAEA and others. So far all of the alleged hacks and data dumps that I have seen have not impressed and the data itself seems to be from systems that they “think” are important but in reality they are not. Specifically of late there are threats concerning CIA plots and diatribes that read like Lulzsec on methamphetamine and Ketamine at the same time. This guy really has quite the beautiful and large tinfoil hat and he wants us all to know about it in no uncertain terms. It is interesting to read between the lines in a stylographic way how the writer here seems to be molding their communiques in the manner of Zodiac. with a third person approach that intones more than one person and that this is a group. By using “Parastoo is speaking” they come very close to the “This is Zodiac Speaking” which attempted to portray power and induce fear. It is also interesting to note the language used in the emails is of a nature that implies a good grasp of English as well as a flare for the overly dramatic which does not lend credence to the threats that they imply. In fact the reading I take away, and seemingly the press as well, is that of someone either trying too hard to be Anonymous or smacks of outright trolling.

Screenshot from 2014-01-28 16:43:37

zletter1

DarkPassenger:

Screenshot from 2014-01-28 15:35:21

In tracing the domains for parastoo.ir and hacker4hire.ir I came across a defunct site (RCE.ir) which was a PHBB site that is now offline live but is archived in a couple of places as well as Google caches. When searches for “Parastoo” were used a clear link to a user on the RCE.ir site came up and that user was “DarkPassenger” who posted often on the site not only about hacking tutorials, tools, and the like but also dropped many links to government sites in the US and talked about conspiratorial things in nearly every posting. The DarkPassenger’s favorite saying or ahorism in each posting was “de nobis ipsis silemus” which is taken from the Baconian epigraph to the first Critique and translates to “on ourselves we are silent” which is ironic for all the commentary that DarkPassenger is putting out there that speaks to his state of mind. The DarkPassenger is also a fan of TV and movies and can be tracked to other .ir sites but generally from the first searches, does not have a lot out there under this account name to go much further (at present writing) to say who he may be in real life. DarkPassenger though does seem to have quite a bit of time on his hands and some technical capabilities though. Much of the data however that he and Parastoo post though is really just OSINT that anyone capable could carry out. In fact in one post (DP) talks about OSINT while laying out informatics on a military organizations email addresses and contact list so he is in fact versed in the ways of OSINT collection. A key factor to the link I am making between the Parastoo and DP is that he uses the “EXPECT US” cutline in many of his posts as well and seems rather enamoured with the idea that he is in fact an Anon and that bent of conspiracy and overarching plots infuses the majority of his postings online.

Parasatoo.ir, hacker4hire.ir & RCE.ir:

Screenshot from 2014-01-28 15:32:45

Screenshot from 2014-01-28 17:16:02

Screenshot from 2014-01-28 17:16:45

Screenshot from 2014-01-28 17:17:07

Screenshot from 2014-01-28 17:25:27

The postings claiming hacks as well as those that rave on claim that DP had set up a couple domains for “attacks” on the outside world from the .ir domain. These domains are registered by what I assume is a cutout name of zohre sajadian which coincidentally was also used for the RCE.ir site. All sites are currently down and in fact I cannot locate any content for the hacker4hire.ir nor the parastoo.ir sites respectively. The only one that did have active content for a while was the RCE.ir address. This site was up for quite some time but was insecure and much of the content was not that interesting. It is of note though that the domain registrations all line up as well as there seems to be some overlap in email hosting between a .ru address and the chmail.ir site (that address is verified as being real)The information for the address as well as the name of the holder seems to be just made up. In fact the address cannot exist because there is no intersection for Felestin Street with Johmoori. A cursory look at the name used of Zohre Sajadian also comes up with some hits but they seem to be un-related at this time to the sites and their registration so mostly this is a dead end I think.

Alleged Hacks & Anonymous Rhetoric:

Screenshot from 2014-01-28 17:43:41

 

Screenshot from 2014-01-28 17:45:54

So far in my searching I have not found too much out there to support any large hacks of data or dumps thereof that show this “group” has done what they claim they have overall. Aside from news stories (few in fact) that claim Parastoo made off with “sensitive” information on nuclear systems and facilities. However the data that they claim to have taken and was admitted to by IHS Inc. is all of a nature that can be purchased from the web or has been published already in the past. The only real sensitive information that has been possibly breached was credit card information that may have resided on those servers that were compromised. So while the Parastoo makes grandiose claims of important hacks and data leaks, thus far, when really investigated they have yet to make a major hit on anything of real import. Since the sites have gone dormant or offline as well it has yet to be determined what else they may be working on or have compromised but if you look at the rhetoric from their pastebin posts as well as the alleged emails on Cryptome one becomes a bit jaundiced and must take everything they say with a large grain of salt. Another factor to remember that even with the drawings like the one at the top of this post are often available to anyone on the internet either by insecure or misconfigured servers or in fact the data is meant to be open to the public. This is a paradigm I have learned about recently in looking into the OSINT on nuclear facilities and systems. So these dumps of information are not what the attackers think they are because they are unacquainted with the data and it’s secrecy or lack thereof.

ANALYSIS:

The final analysis of the “Parastoo” group is that in reality it is at least one person (DarkPassenger) who wants to make a statement on Israel and nukes with a fixation on IAEA and DOE. While some pastes in the pastebin list seem to have actual data from systems that are externally facing to the internet (DOE for one) the majority of the data seems to be half understood misinformation being spewed to garner attention. As the Anonymous model has been let out of the bottle so to speak post Lulzsec, there are many who would aspire to their level of reputation and attention and these dumps are an attempt to attract it. Of course the problem with the Anonymous model of operation is that anyone can take on the mantle and claim to be an Anon or a group of them to effect whatever outcome they seek (mostly attention) so it is oftentimes hard to take groups like this seiously until such time as they dump hard data onto the internet for all to see. In the case of Parastoo none of this is evident and as such I categorize (him/them) as a non threat actor on the larger stage of geopolitics and information warfare at this time.

K

Written by Krypt3ia

2014/01/28 at 22:54

PLC Controlers, Stuxnet, and Kinetic Attacks: Blackhat 2011

with one comment

Since the advent of Stuxnet, the problem of SCADA (PLC) systems and their control vulnerabilities has become the focus of the world. In that this seems to be the new flavor of the day because someone (A nation state actor) decided to use those known vulnerabilities (at least 10 years worth of them) to exploit the Siemens systems at Natanz and Bushehr nuclear facilities in Iran we now have a new form of terrorist attack as Cofer Black pointed out in the keynote to Blackhat.

Dillon Beresford presented a talk on the Siemens 7 system vulnerabilities at Blackhat yesterday and did a great engineering job on the Siemens PLC system 7 attacks. However, in being so close to the subject, at least in the presentation, he seemed ill equipped to understand some of the ramifications of the exploit that was used against Iran and the amount of work that had to go into it to pull it off.

I say this because of the offhand comment that a single actor (hacker in a basement) could in fact have come up with the exploit code and he is technically right. He has singly come up with more exploit code and plugins to Metasploit to prove it, but, the attack on Iran was more complex than just exploit code for a Siemens 7 PLC. This too seemed to elude him in the statement that he did no understand the reasoning for the pivot point of the Windows machines that were infected with the worm that injected the code into the system 7.

The reasons for the attack vector pivot point is simply this;

The actors who created this exploit(s) wanted to be able to infect non connected systems at key hardened facilities that they did not have access to. Facilities that may have had regular network connections that might allow access to the worm and thus infect not only one site but many and not just the PLC systems themselves. This attack was multi purpose and needed to be persistent for a long time in order to carry out its mission goal.

And the goals seem pretty evident now:

Have the centrifuges eat themselves

Have the product from the centrifuges be compromised and thus put Iran’s nuclear program even further back.

The fact is, that the exploit code for the PLC’s was small in comparison to the amount of work and 0day that went into the worm itself. This is a key feature of the attack and something that Beresford seemed to miss. The worm was indeed the delivery system and it was likely carried into the Bushehr facility by a contractor (my thought is Russian as they were working on the Iranian program and had access) on a USB stick. Once inside, the malware had the ability to detect, spread, and inject the exploit code specific to the Siemens PLC systems at those facilities.

This brings me to a second point on all of this. The intelligence needed to know exactly what systems the Iranians had was something only a nation state actor could really have the resources to gather. This was in fact a nation state attack from all the signs of it. That it used exploits for SCADA systems that were known to be vulnerable for some time is the only twist. However, that twist had been used in the past and as long ago as the Reagan era.

An attack on a Russian pipeline was eventually disclosed by the CIA as a worm that attacked the systems of the pipeline (i.e. the PLC’s controlling the pressure of the gas) and caused a 3 kiloton explosion. This worm was likely created by the CIA and used to help dismantle the USSR.. Well at least cause some heavy damage to a pipeline that was in contention at the very least. So, this type of attack is NOT NEW. It was a quietly known vector of attack as far back (publically) as 2004 when it was revealed to the public at large, but much longer known about in intelligence circles.

The short and long, the exploits may be new in some cases, but, the type of attack is not at all.

The real difference today though is that we have the hacker community out there able to get their hands on code easily and even perhaps the PLC systems themselves to create even more exploits. Add to this that many SCADA systems have been connected to the Internet (as they should NEVER BE) ripe for attack and we have a big problem. However, the proof of concept now is out there, the exploit code is available and all it will take is an aggressor tenacious enough to write the malware to have another Stuxnet type attack on less hardened systems. An attack that could bring down the grid, cause the poop factory to explode and leak into our drinking water, or, like in Russia, have our pipelines explode in 3 kiloton explosions.

This Dillon is the key point and I know you get that. So, lets extrapolate further, how about in future conferences we have more of what Dillon did. He went to Siemens and gave them the exploit code and showed them the problems. They, unlike many companies, are taking up the challenge and not trying to hide the problems but instead are actively working on them to re-mediate. The next step is to go to EVERY PLC maker (wink wink Big O and the Administration.. Oh DHS maybe?) and bitch slap them into doing something about the problems? As Dillon pointed out, these systems are pretty open and inter-operable, so the code is likely to be just as bad everywhere.

If we don’t.. We are likley to wake up one day to a big explosion and it may just be an accident.. Or, it could be another targeted attack like Stuxnet.

K.

PS.. One small thing Dillon.. Please, attend Toastmasters. I think it would help you greatly. You speak too softly and did not enunciate.

//SIGINT FOR ANALYSIS: DD0S: CHINA/S.KOREA/WORDPRESS “So Ronery”

with one comment

THREE stories in the news recently have me pondering the tit for tat nature of what may be Kim Jong Il’s mostly impotent attacks against the outside world. It would seem that Mr. “ronery” may have been a little miffed of late because South Korea decided to float balloons laden with leaflets over into the Northern side after the Middle East began to protest against repressive regimes.

I laughed til I cried when I saw this on the news, poor Kim Jung! What’s even more hilarious is that I have also heard that the South Koreans also put KJI’s image on the pamphlets because it is a crime to destroy or defile any image of the “dear leader” So, the North Koreans must have fits and starts when these balloons start coming down! Net net though, the information makes it to some in the closed country, and one hopes that they are seeing what is happening outside in the real world… At least a little.

Post the balloon launches (Feb 25 2011) we are now seeing some interesting things happening on the internet that may in fact be KJI and North Korea acting out against everyone, especially the South Koreans. Both attacks on the face of it, may not be related, however with a closer look one may see that they could very well be related;

WordPress traces 2nd DDoS assault to China

Shock

By John Leyden

Posted in Enterprise Security7th March 2011 12:27 GMT

Free whitepaper – The Register Guide to Enterprise Virtualization

Blogging service WordPress suffered a further series of denial of service assaults on Friday, days after recovering from a particularly debilitating attack.

WordPress.com, which serves 18 million sites, traced the vast majority of the attack traffic of the latest assault back to China. Analysis pointed to a Chinese language site as one of the principal targets of the attack.

This as-yet-unnamed site is blocked by Chinese search engine Baidu, prompting speculation that the attack might be politically motivated. However, a closer inspection of events led WordPress to conclude that commercial motives were probably behind the attack, TechCrunch reports [1].

Separately the French finance ministry has admitted that it came under a sustained and targeted attack in December, targeting files related to the G20 summit that took place in Paris two months later. More than 150 computers at the ministry were affected, the BBC reports [2].

Paris Match magazine, which broke the story, quotes an anonymous official who told it: “We noted that a certain amount of the information was redirected to Chinese sites. But that [in itself] does not say very much.” ®

Original URL: http://www.theregister.co.uk/2011/03/07/wordpress_ddos_reloaded/

South Korea Probes Internet, GPS Disruptions

South Korea is investigating the latest high-technology assault against it. The attack targeted government computers and users of the GPS navigation system. It came as South Korea and the United States hold an annual military exercise that North Korea calls a prelude to an invasion.

Fifteen million South Koreans logging online Monday received an alert from the country’s Internet Security Agency. It instructed them to download a vaccine program to thwart a foreign online attack against Web sites of key government agencies and financial institutions.

Officials Monday said the government is trying to figure out who ordered the attack on the Internet sites last Friday and Saturday. Targets included the presidential Blue House, the Ministry of Foreign Affairs and Trade, the National Intelligence Service, South Korean military headquarters, the U.S. military forces in the country and several other agencies.

They were hit by what is known as a distributed denial of service attack. It was done by overloading targeted sites with Web page requests from about 80,000 personal computers infected with malicious software.

Suspicion as to who masterminded the attack falls on North Korea. But Park Kun-woo, a spokesman at Ahn Lab, a leading South Korean maker of security software, says there is no clear evidence Pyongyang orchestrated this one.

Park says nothing is certain at this point because malicious computer hackers tend to disguise themselves in various ways. It is clear, he says, however the attack did not originate in South Korea and was dispersed via a number of countries.

The National Police Agency says the attacks were routed through computer servers in numerous places, including Brazil, Hong Kong, India, Iran, Israel, Japan, Russia, Taiwan and Thailand.

Internet security companies say, as of Monday, more than 100 of the so-called zombie computers that were used to carry out the online attack have seen the contents of their hard drives erased by the malware that the computer owners unsuspectingly downloaded.

This incident did not last as long as a similar disruption over five days in July 2009, but it targeted more Web sites. Officials have said the 2009 attack was traced to an Internet protocol address in China used by North Korea’s Ministry of Posts and Telecommunications.

Other attacks also have been traced to China.

Experts say North Korea has an Internet warfare unit that targets South Korean and American military networks.

Also Monday, the South Korea Communications Commission confirmed that interference to Global Position System signals on Friday came from a location in North Korea that was pinpointed as the source of a similar disruption last August.

The incident reportedly affected GPS receivers in military equipment and mobile phones as far south as Seoul. It also took place, as was the case last August, while a military exercise with the United States was under way here.

The U.S. military command in the country is not confirming whether the GPS jamming disrupted the exercise. A spokesman says as a matter of policy, the command does not comment on intelligence matters.

The Yonhap news agency quotes a South Korean defense official saying the GPS disruption did have a slight effect on military artillery units.

Now, WordPress was attacked around the same time as the South Korea attacks. However, the linking factors for me are twofold:

1) Both have Chinese elements

2) Both are aimed at political targets (wordpress has said that there seemed to be a foreign political nature in the attacks)

While N. Korea does not have an infrastructure in house to set off attacks, they do indeed have connections with China and certain Chinese telco/internet backbone providers that they have worked with in the past on such occasions. While the attacks seem to be a bit more wide spread as attacking systems go, both would be timed in such a way that tips me to believe both are the work of North Korea. So far, no one has really made this connection that I have seen in the news as yet, but, it’s not such an outlandish idea.

Now, KJi has nukes, and he has all kinds of other weapons of war, but, he seems to be lacking in one area, “cyber” as the press might put it. Since his regime is SO repressive that they have no infrastructure, it is likely that any such programs would be run out of the south of China. North Korea likely has many programmers/military types working in the south China area at facilities that are Chinese run working on cyber war capabilities. Were N. Korea actually to get its own infrastructure I have no doubt they would be read to go. That they don’t at present is only a small stumbling block.

It is also well known that the Chinese and others will easily rent out bot-nets for the work as well as be paid for information/cyber operations of this nature. So, the attacks are really only cogently linked together here from their connections to pissing off N. Korea. Frankly, I am kinda surprised the attacks didn’t also have some Facebook DD0S as well…

All in all though, the DD0S did not do permanent damage anywhere and for me, just seem to be more a cry for attention on the part of Mr. Ronery…

Sad panda.

K

Nuclear Jihad: AKA, Is That A Dirty Bomb In Your Pocket? Or Are You Just Happy To See Me?

leave a comment »

Al-Qaida is on the verge of producing radioactive weapons after sourcing nuclear material and recruiting rogue scientists to build “dirty” bombs, according to leaked diplomatic documents.

A leading atomic regulator has privately warned that the world stands on the brink of a “nuclear 9/11”.

Security briefings suggest that jihadi groups are also close to producing “workable and efficient” biological and chemical weapons that could kill thousands if unleashed in attacks on the West.

Thousands of classified American cables obtained by the WikiLeaks website and passed to The Daily Telegraph detail the international struggle to stop the spread of weapons-grade nuclear, chemical and biological material around the globe.

Full article HERE

So, the Wikileaks strike again eh? This is news how exactly though? I mean, the state of nuclear affairs let alone biological has been such that since the break up of the Sov state, we have had a huge problem with missing materials. So, lets break it down shall we?

    • AQ’s stated goals have always included nuclear and biological ambitions
    • Since the collapse of the USSR nuclear and biological materials have been for sale
    • Our own methods of protecting high value targets other than actual U235 have been lackluster
    • Our BSL4 labs in some cases included weaknesses that would only require a rock through a window to release toxins
    • If you wanted to make a read dirty bomb in downtown Cambridge, you just have to get a bomb close enough to the reactor at MIT

There are more, but do I really need to go on? So, we have been lucky so far that the Jihadists have not been that serious so as to have already gotten the materials and used them. The moral of the story? Keep up with the interdictions. Keep setting up radiological detectors at the ports and the like. Just keep vigilant really. As for the biological materials, I would suggest that we protect them all with due care.

Krypt0s

Written by Krypt3ia

2011/02/02 at 00:30

In Iran, a Defector Disappears Again: Would This Be An Iranian “CURVEBALL” ?

leave a comment »

Iranian nuclear researcher Shahram Amiri arrived home Thursday, despite efforts by the Central Intelligence Agency to convince him to stay in the U.S., beginning another stage in a saga in which both countries suggest they came out on top.

AMIRI


Shahram Amiri, holding his son after landing in Tehran Thursday, said he was tortured in the U.S., and revealed nothing. The U.S. denied the claims.

U.S. officials say Mr. Amiri defected to the U.S. about a year ago and provided valuable information on the country’s nuclear program. In return, he was offered the opportunity to resettle and given a $5 million resettlement package to establish his new life in the United States, officials say. CIA officials warned Mr. Amiri that he could face execution if he returned to Iran.

Tehran has cast Mr. Amiri as a victim of U.S. thirst for information about the Iranian nuclear program, which the U.S. says is for weapons development and Tehran says is for peaceful uses. After his disappearance in Saudi Arabia in June 2009, Iran said he had been kidnapped by American agents, a charge the U.S. denied.

Full article Here:

Interesting story here albeit one that we have seen before back in the cold war days. There have been a few defectors from the old Sov bloc that actually went back to the Union either because they did not fit in here, feared for their loved ones, or… Were intending on doing so all along. The latter were known as agents of “disinformation” Just what the story is on Mr. Amiri remains to be seen really I think. Though, according to the CIA and this whole 5 Million dollar story, he went back out of fear for his loved ones.

I on the other hand tend to think that that is a weak story.

I would hazard a guess that there is much more going on here behind the scenes that we may never know about. However, if Mr. Amiri does not end up disappeared or suddenly has a massive heart attack, then he was a plant and the CIA may have indeed been led down a path of the SAVAK‘s choosing with regard to where Iran is on the whole Nuke thing. Since Iran has been so tight to get operatives into as well as cooperative assets inside and out, we (CIA) have been mostly blind for some time in this regard.

So, this guy evades his handlers and runs to the embassy where they welcome him with open arms.. An alleged traitor to their country… Hmmm this does not sound like the usual sentimentality out of the likes of Mahmoud and his merry band. Something smells… Meh, I guess time will tell. However, just who is going to be asking to see that Mr. Amiri is okie dokie come a year on in? CARE or the UN going to look in on him?

Nope

So its likely that he will just have a massive coronary.. Or maybe a nice little accident in the car perhaps? My vote is on coronary or some other hard to detect manner of homicide involving small pin pricks with needles in odd places..

Well played Iran.. Boys, take that 5 million of the tax payers money and put it back in the budget ok? Oh, and all that data you got from Amiri, well I would be putting that in the circular bin…

CoB

Written by Krypt3ia

2010/07/18 at 21:12

Former CIA analyst: Tehran wants nuclear weapons for two key objectives

with 3 comments

February 12, 2010

Trend News, 12 Feb 10: Interview with Clare Lopez (Vice President of the Intelligent Summit and CI Centre Professor, retired CIA case officer)

Trend News: Iranian president announced yesterday that the country has finished producing its first batch of 20-percent enriched uranium. Do you believe the nuclear program influences Iran’s domestic policy?

Lopez: Iran’s nuclear weapons program is considered by its clerical rulers to be indispensable for both domestic and foreign policy. Internally, the mullahs believe that acquisition of a deliverable nuclear weapon would encourage national pride, but also convince dissidents and internal opponents that if the entire world could not stop Iran from getting a bomb, then their quest for liberty is also a hopeless one. Externally, Tehran wants a nuclear weapons capability for two key objectives: geostrategic dominance, including adventuresome aggression, in the Persian Gulf and Middle East region, and to seize leadership of the international Jihad movement away from the Sunnis. The idea is ‘Shi’a Rising,’ Persian Empire reborn, and Shi’a at the forefront of the Islamic Jihad vs. the Western, non-Muslim world.

Q: Do you think that Iran has the necessary technology to use the enriched uranium that it supposedly has?

A: It is my conviction that Iran has already developed nuclear warheads and tested them in non-chain reaction, non-fission, trigger device testing, probably in deep underground sites. I don’t think there is any doubt whatsoever that Iran has mastered the full nuclear fuel cycle….moving to 20 percent enrichment is merely the latest challenge to the impotence of the international community. Once a nation has mastered enrichment even to 4-5 percent, moving additional steps beyond that is merely an exercise in the re-calibration of the centrifuges. The hardest technological challenge comes at the beginning, learning how to build and install and calibrate centrifuges and to link them into cascades. Once that is mastered, the rest is actually much easier – also a quicker process to reach Highly Enriched Uranium (HEU) at 90 percent or even Weapons Grade, which is 93 percent enriched. Finally, we are fools if we think that Natanz and Qom are Iran’s only two nuclear enrichment sites. We have no idea at what stage of enrichment the other clandestine sites are.

Q: Do you think that Iran’s nuclear program will stop under pressure of economic sanctions?

A: No, Iran’s nuclear weapons process will not stop for any reason whatsoever except actual credible threat to the survival of the regime itself. Sanctions are useless.

Q: On the whole, what is the possibility to stop Iran’s nuclear program with discounts? What is the role of the U.S.?

A: The only possibility to stop Iran from achieving a deliverable nuclear weapon in the very near future is forcible destruction of their known sites, and/or regime change. Regime change is possible by a number of conceivable methods: internal implosion (the founders of the revolution actually fighting among themselves); internal dissident movement, like the Green opposition, but this has a long, long way to go and is under severe repression; external attack by Israel, the U.S., and/or the international community. It seems highly unlikely that the U.S. will lift a finger to either support or assist the internal dissidents because the Obama administration wants to preserve what it naively thinks to be a possibility of negotiating a nuclear deal with the mullahs. This will never succeed. The international community, especially the IAEA, the U.N., and the Security Council are essentially impotent, in part because China and Russia do not see it in their national interest to stop Iran right now. Only Israel retains the ability and will to act. I believe Israel will strike eventually when it perceives that its final red lines have been crossed, or when Iran is about to acquire a game-changing air-defense missile system (like the S-300 from Russia), or when it decides is the best moment to achieve tactical surprise. For Israel, this is an existential question.

Got a little story for you…

Back in the early 90’s after the Sov state fell, there was a little operation designated “SAPPHIRE” that managed to move about half a ton of U235 out of  Kazakhstan and at least one box of Beryllium that was marked “Tehran” on it.

For those not in the know, this is an element that is used in the manufacture of nuclear weapons and either the Sov’s had intended selling it to Iran or, those in charge of it when the Sov’s pulled out decided to make a quick buck. Either way, this would have put the Iranian program much further ahead than they are today had this not been discovered and removed.

Fast forward to today, well a couple days ago, when Mahmoud announced that Iran is a Nuclear nation for having enriched some uranium. Of course their enrichment is not up to the level it would need to be for making a nuclear bomb, it is a step closer to their ambitions. It’s the thought that counts huh?

We are at a precipice in time with Iran’s Mullah controlled nation state and their most fervent desire to be a nuclear power. I fear that this administration has got some balls to grow and not spend so much energy on talking to Mahmoud and his handlers in Iran.

Talk will get us nowhere with them. Just as much as talk will get us nowhere with the AQAP and all of the other jihadist groups. This analyst is right. Natanz was just one facility of more than a few I would agree and the Israelis are the only ones who have the balls and are crazy enough to just nuke it from orbit…

“It’s the only way to be sure”

Last I checked too, we were in a bad way with regard to assets “in country” in Iran. So the intelligence gathering there is likely to be less than stellar too. Sound familiar? Kinda like a few other nation state *cough Muslim cough* situations we have?

So big O wants to talk and sanction them. Say, how long did Muammar go with sanctions and still stand tough against us? How about Saddam? Yeah, those examples don’t really bode well for this situation do they? The fact is sanctions will only allow the people to suffer and the repression of said people to increase. We have tried this and hoped in the past that the people would rise, but, that didn’t go well either did it.

I fear this will go badly.

Written by Krypt3ia

2010/02/16 at 01:41