Wednesday, May 19, 2021

'Very disappointed with Canada's response': Palestine-Israel turmoil exposes Canada's 'empty both sides approach,' expert says


Sakeina Syed
·Contributor
Tue., May 18, 2021

Thousands of people gathered in cities across Canada this past weekend for peaceful protests in support of the Palestinian solidarity movement, including rallies in 
EDMONTON,  Vancouver, Saint John, Ottawa and Toronto. As of today, at least 212 Palestinians, including 61 children, have been killed by the Israeli airstrikes on the Gaza Strip. In Israel, officials say 12 people, including two children have been killed since the fighting started over a week ago.

As the death toll escalates, activist groups and members of the public are expressing disappointment with the Canadian government’s lack of condemnation towards Israel.

This discontent is being echoed by some politicians, with federal NDP leader Jagmeet Singh calling for Trudeau to halt the sale of arms to Israel “until the end of the illegal occupation.”



According to the Government of Canada’s official policy guide, Canada “does not recognize permanent Israeli control over territories occupied in 1967,” including the Golan Heights, the West Bank, East Jerusalem and the Gaza Strip. The guide highlights that these settlements violate international law, namely the Fourth Geneva Convention.

But in spite of this official position, the government’s official statements have made little mention of the Israeli raids and airstrikes on these illegally occupied territories. Despite Palestinian deaths numbering in the hundreds and over 30,000 residents of Gaza displaced from their homes by the air raids, the statements only extend as far as condemning general violence in the region.

'Disappointment' over Canada's response to violent raids, evictions

Michael Bueckert is the Vice President of Canadians for Justice and Peace in the Middle East (CJPME), a non-profit and secular organization that aims to promote justice and development in the Middle East. He said that CJPME is “very disappointed with Canada's response to the protests over the Sheikh Jarrah evictions, the violent raids against Al Aqsa and the airstrikes in Gaza.”


“In general, all statements have taken an empty ‘both sides’ approach which fails to recognize the distinction between occupied and occupier,” said Bueckert, who holds a PhD from Carleton University specializing in political economy. He adds that the Canadian government’s statements “do not directly name—let alone condemn—Israel’s colonial actions.”

In Minister of Foreign Affairs Marc Garneau’s statement on May 12, he unequivocally condemns rocket attacks “fired by Hamas.” But when it comes to that week’s Israeli police raids on Al-Aqsa that left 350 Palestinians injured and 250 hospitalized, Garneau does not mention a perpetrator, instead referring broadly to “unacceptable violence” at the holy site.

More tellingly, in Garneau’s statement and Global Affairs Canada’s next statement on May 16, no mention at all is made of the Israeli airstrikes. The May 16 statement was posted at 11:55 p.m., but made no mention of the approximately 188 Palestinian deaths from 55 Israeli air raids that had taken place by that point.

The statement mentions violence against journalists and “humanitarian workers and facilities under fire,” but never specifies who perpetrated these acts or who the victims were.

Those reading the federal government’s official statements are presented with a picture devoid of any mention of Palestinian deaths at all, let alone direct condemnation of Israel’s airstrikes—or even the word ‘airstrike’ itself.

When asked for clarification on this, a Global Affairs Canada spokesperson provided a statement reiterating the same messaging, only adding that “the use of force has led to significant civilian loss of life” and that they “urge utmost restraint.”

Bueckert said it is worth noting that Garneau did mention the evictions in Sheikh Jarrah and Silwan in Parliament last week when asked a question. Bueckert says this suggests “the government is aware of Israel's unjustifiable actions in Jerusalem, and is experiencing pressure to respond—whether from diplomats or from within the Liberal Party.”


What is Canada's relationship with Israel?


In its most recent report in 2019, Canada sent $13.7 million in military exports to Israel, including $1.2 million for bombs, missiles, and other explosive devices, and $3.1 million for military aircraft.


The country generally votes against or abstains from the 16 UN resolutions on Israeli-Palestinian matters, including issues like sovereignty, human rights, and Israeli settlements. This pattern was set around 2006, when the Harper government was in power.


However, in November 2019 Canada voted “yes” on one of these resolutions, in support of Palestinian right to self-determination. The resolution criticized the Israeli barrier wall, and mentioned the urgency of reaching an end to the Israeli occupation that began in 1967. This singular vote was seen by some as a divergence from Canada’s traditional pattern of abstaining from UN votes on the issue, or siding with Israel.


Canadians demand action and equality, not empty words


For those attending this weekend’s Palestine solidarity protests, frustration with the Canadian government’s stance is a common theme.

Nada, a Canadian graduate student, attended the weekend’s protests in the hopes of seeing Canada cease its arms deal with Israel. “My tax money is being used to murder innocent children,” she said. “How can we, as a ‘democratic’ country, a country that claims it supports global human rights, be directly investing money in weapons to murder innocent people?”

Yusra, a Canadian university student, said she attended her first-ever protest at Toronto’s Nathan Phillips Square on Saturday not only because of the “ongoing ethnic cleansing” occurring in Palestine, but also because of the Canadian government’s response to it.

“I can’t stand how they have said so many words that mean absolutely nothing, but still will not at all acknowledge Israel's crimes,” she said. “They say they want the violence to stop, and still will not place sanctions on the weaponry they give to Israel. They preach peace and a diverse country that is accepting, and yet the people of Toronto scream for them to do something, and they stay idle.”

Bueckert said that for those pushing for direct action from the government, the protests cannot be ignored.

“I don't think it will be possible for the government to miss the fact that Canadians are showing support for Palestinian human rights in massive numbers, in a way which feels unprecedented,” he said.
US writer, feminist Gloria Steinem 
wins major Spanish prize
© Provided by The Canadian Press

MADRID (AP) — A Spanish foundation on Wednesday awarded one of the country’s most prestigious awards to U.S. writer and activist Gloria Steinem.

The jury that decides the Princess of Asturias Awards announced that Steinem has won its annual prize for communication and humanities.

It praised 87-year-old Steinem’s long career in journalism, her bestselling books and her dedication to feminism since the 1960s, ensuring her place as “one of the most significant and iconic figures of the women’s rights movement” in the United States.

The citation singled out her contribution to the legalization of abortion, pay equality and equal rights, as well as her fight against the death penalty, female genital mutilation and child abuse.


The 50,000-euro award ($61,000) is one of eight prizes, including in the arts, social sciences and sports, handed out annually by a foundation named for Spanish Crown Princess Leonor.

The Associated Press

Thousands of migrants swim to Spanish territory from Morocco

By Jon Nazca and Mariano Valladolid
THE AGE.AU
May 19, 2021 — 

Ceuta, Spain: A sudden influx of migrants swimming into the Spanish enclave of Ceuta in northern Africa is a serious crisis for Europe, Prime Minister Pedro Sanchez said on Tuesday (Wednesday AEST).

Sanchez vowed to re-establish order promptly amid heightened diplomatic tensions between Spain and Morocco.


Spain’s PM vowed to restore order in the Spanish enclave.CREDIT:AP

Spain deployed troops to Ceuta to patrol the border with Morocco after around 8000 migrants, many from Sub-Saharan Africa and including 1500 minors, entered the enclave on Monday and Tuesday by swimming in or climbing over the fence.

Armoured vehicles were guarding Ceuta’s beach on Tuesday, and soldiers and police used batons to clear migrants from the beach and threw smoke bombs to discourage others from crossing.

On Tuesday, the number of arrivals by sea had slowed, and some migrants were voluntarily returning to Morocco. A few others could be seen being carried away by soldiers. Footage of the beach at around 8pm local time showed nearly all migrants had been cleared.

Spain said approximately 4000 migrants had already been sent back to Morocco, under a readmission deal.

The migrant surge has been a sore point between Spain and Morocco. Spanish soldier take positions as people from Morocco arrive by swimming to the Spanish territory.CREDIT:AP


The regional leader of Ceuta criticised what he described as Morocco’s passivity in the face of Monday’s surge, and some independent experts said Rabat had initially allowed it as a means of pressuring Madrid over its decision to admit a rebel leader from the Western Sahara to a Spanish hospital.

The Spanish government did not make that connection, with Sanchez calling the north African nation a friend of Spain and the interior ministry citing cooperation over the readmissions, although Foreign Minister Arancha Gonzalez Laya told Morocco’s ambassador Spain rejected and disapproved of the mass arrivals.
Advertisement

Rabat recalled its ambassador to Madrid for consultations, said a diplomatic source who declined to be named, adding that relations with Spain needed a moment of “contemplation”. Moroccan authorities did not respond to requests for comment.

Moroccan TV footage showed authorities setting up barriers on Tuesday afternoon to prevent people from crossing into Ceuta, but footage filmed from the Spanish side earlier showed a Moroccan soldier or policeman waving dozens of running migrants through a gate to no-man’s land without any checks.


The regional leader of Ceuta criticised what he described as Morocco’s passivity in the face of the migrant surge. CREDIT:AP

“This sudden arrival of irregular migrants is a serious crisis for Spain and Europe,” Sanchez said in a televised address before his arrival in Ceuta.

European Commission Vice-President Margaritis Schinas tweeted that the enclave’s frontier was a European border, expressing his “full solidarity with Spain”.


Ceuta, with a population of 80,000, is on the northern tip of Morocco across from Gibraltar. Along with another Spanish enclave, Melilla, it has long been a magnet for African migrants seeking a better life in Europe. Morocco has a claim on both.

Western Sahara dispute


The spike in arrivals took place after Rabat expressed its anger last month when Spain discreetly admitted Brahim Ghali, the leader of Western Sahara’s rebel Polisario Front to hospital. Madrid said it acted on purely humanitarian grounds.

Morocco’s Foreign Ministry criticised what it said was Spain’s decision to admit Ghali under a false identity without informing Morocco, warning of repercussions.

The Polisario Front wants the Western Sahara to be an independent state rather than part of Morocco. Algeria, Morocco’s regional rival, backs the Polisario Front.

The United States in December recognised Moroccan sovereignty over the Western Sahara territory.

Reuters
"Who is the Most Vulnerable during a Pandemic? The Social Model of Disability and the COVID-19 Crisis."

In Eubios Journal of Asian and International Bioethics, Volume 30, Number 4 (May 2020) : 158-161.

Christopher Ryan Maboloc

2020, May
Top 2%1,618 Views69 Pages
1 File ▾

COVID-19 PANDEMIC
Show more ▾
According to the World Health Organization, 15% of the global population lives with some form of disability, of whom 2% to 4% experience significant difficulties in functioning. Persons with impairment are the most neglected sector in society. This inquiry looks into the social and medical model in terms of analyzing the impact of the COVID-19 Pandemic to persons with developmental disorder. The paper argues that the medical model is insufficient to account for the needs of persons with disability. While the medical model requires that individuals with impairment should be given priority in terms of access to effective treatment, policy must have a full awareness of the social context of cognitive disability in the midst of a public emergency.


President Joe Biden takes Ford's new all-electric F-150 pick-up truck for a spin: 'This sucker's quick'

The President also made a speech stating that electric cars were the 'future of the auto industry' in the US



US President Joe Biden test drove the new all-electric F-150 Lightning pick-up truck by Ford on Tuesday, as he championed electric cars as the “future of the auto industry”.

Biden visited Ford Motor Company’s electric vehicle plant in Dearborn, Michigan, where he made a speech and got to check out the newest cars in development by the motoring company.

"We need automakers and other companies to keep investing here in America and not take the benefits of our public investments and expand electric vehicles and battery manufacturing abroad," Biden said.

"We're going to set a new pace for electric vehicles," he said, vowing to reverse what he called the Trump administration's "short-sighted" rollback of vehicle emissions standards.

As well as getting a first look at some of the coming vehicles, the President also made an unscheduled stop at a nearby race track to test out the new F-150 truck.



After a spin around the track, Biden pulled up to a waiting pool of reporters, before proclaiming: “This sucker’s quick.”

He then proved it, sticking his foot down for another spin around the track, as his security team raced parallel in another vehicle, struggling to keep up.

The President’s speed caused plenty of conversation on social media.






The Ford F-150 Lightning looks very similar to the conventional F-150, which is Ford's best-selling vehicle in the US, however, as Biden demonstrated, it has the potential to be quicker.

The vehicle is set for release on Wednesday, when Ford will be releasing full details of its specs.


Updated: May 19, 2021 03:48 PM
Details Of Heated Exchange Between Biden, Rep Rashida Tlaib At Detroit Airport Tarmac


Natalia Ningthoujam | May 18 2021

Joe Biden and Democratic Rep. Rashida Tlaib were on Tuesday spotted having a tense conversation on the airport tarmac in Detroit.

According to NPR, Tlaib's office said that she conveyed to Biden her dissatisfaction with the US' response to the conflict between Israel and Hamas that has been going on for a while now.

Tlaib, who is the first woman with Palestinian roots to serve in Congress, told Biden that Palestinians need to be protected, an aide for the Congresswoman's office said in a statement. "Palestinian human rights are not a bargaining chip and must be protected, not negotiated," the aide said Tlaib told Biden.

"The US cannot continue to give the right-wing [Israeli Prime Minister Benjamin] Netanyahu government billions each year to commit crimes against Palestinians. Atrocities like bombing schools cannot be tolerated, much less conducted with US-supplied weapons.

"Congresswoman Tlaib reiterated that the status quo is enabling more killing, that the current US approach of unconditional support for the Israeli government is not working, and that the White House must do far more to protect Palestinian lives, dignity, and human rights," the aide added.

After the confrontation, Biden complimented her during a speech in Dearborn, according to Fox News. "I want to say to you that I admire your intellect, I admire your passion, and I admire your concern for so many other people. And it's from my heart. I pray that your Grandma and family are well, I promise to do everything you see that they are in the West Bank.

"You're a fighter. And God, thank you for being a fighter," he added.

According to the Palestinian Health Ministry, the recent Israelis and Palestinians conflict resulted in deaths of at least 213 Palestinians, including 61 children. Meanwhile in Israel, about 12 people were killed, including a five-year old boy.

In a recent tweet addressed to Biden and Secretary of State Antony Blinken, Tlaib criticized the way the conflict between Hamas and Israel was handled. "If you support a cease-fire, then get out of the way of the U.N. Security Council and join other countries in demanding it," she said.

"Apartheid-in-chief Netanyahu will not listen to anyone asking nicely. He commits war crimes and openly violates international law," Tlaib added.

US President Joe Biden puts his arm around Rep. Debbie Dingell (D-MI) as he speaks to Rep. Rashida Tlaib (L) D-MI upon arrival at Detroit Metropolitan Wayne County Airport in Detroit, Michigan on May 18, 2021. Photo by NICHOLAS KAMM/AFP via Getty Images

CP Rail's largest shareholder urges CN Rail to abandon bid for Kansas City Southern

THEY ARE ALSO CN'S LARGEST SHAREHOLDER 


© Provided by The Canadian PressCP Rail's largest shareholder urges CN Rail to abandon bid for Kansas City Southern

TORONTO — Canadian Pacific Railway Ltd.'s largest shareholder has called on CN Rail to drop its bid for Kansas City Southern because of the sizable break fee CN Rail would be forced to pay if its voting trust is not approved by the U.S. railway regulator.

Britain's TCI Fund Management — which also owns a three per cent stake in CN Rail — made the appeal in a letter to CN's board after the U.S. Surface Transportation Board ruled Monday that its proposed US$33.6-billion deal with KCS must be based on stricter merger rules.

TCI claims CN's board of directors would be "negligent and hugely irresponsible" to risk C$2 billion of shareholders' money based on STB's still-to-come decision on approving the voting trust for the CN-KCS transaction.


That figure includes a US$1 billion break fee if the STB fails to approve the trust and the US$700 million break fee on the CP deal that CN says it would cover.

TCI argues CN should abandon its pursuit of the U.S. railway unless its merger agreement is amended so that it is not conditional on a voting trust being approved.

Unlike CP Rail, whose proposed takeover of KCS received an exemption from strict merger rules enacted in 2001, the regulator says CN would face a tougher standard, adding that the “use of a voting trust is a privilege, not a right” and will be available only on “rare occasions.”

"The STB is sending a clear signal and the CN board has a duty to listen. The risk that the voting trust is not approved is too great to ignore," said the TCI letter to CN's board.

CN Railway didn't directly address TCI's comments in a news release Tuesday except to say it is confident of gaining approval for the voting trust and closing the deal with KCS.

"CN’s board believes its pro-competitive combination with Kansas City Southern is in the best interest of CN’s shareholders and other stakeholders."

The Montreal-based railway said the STB's other decision to defer consideration of a voting trust was only because the merger agreement had not yet been filed. CN says such an agreement has since been negotiated and was filed with the regulator on Tuesday.

TCI says CN's board can't have any confidence in how the new rules will be interpreted because they've never been used before.

"Making what is essentially a C$2 billion bet with company money on this one, unknowable, decision would be extremely reckless."

Even if the voting trust is approved, TCI says CN could face a C$18 billion liability if the transaction is not approved and the trust has to sell KCS under potentially distressed conditions.

"This would almost wipe out CN’s entire shareholders’ equity that it has taken over 100 years to accumulate. It could also seriously jeopardize the future of the company."

While the risk for CN exists, it likely wouldn't be a dire as has been portrayed, suggested Craig Jerusalim, portfolio manager at CIBC Asset Management.

"There's likely to still be bidders for the rail whether it's CP that comes back into the fold or private equity at that point," he said in an interview.

"So I think the risk to CN is not massive although I would agree totally that the risk that CN is denied is much higher than the risk that CP is denied."

Meanwhile, some railway unions have told the STB that they're concerned that a bidding war between Canada's two largest railways could be bad for shippers and workers.

"There is a likelihood that innocent bystanders — employees of CP, CN and KCS, and shippers which use those carriers — will pay a price for this exercise in one-upmanship," said several unions that together are referred to as the Allied Rail Unions.

"The successful bidder, having spent more than what was anticipated and what is reasonable would likely seek to recoup its excess expenditures by seeking so-called cost-cutting 'efficiencies' from railworkers; and it would likely seek to reduce other costs, which, in turn, would diminish service."

Jerusalim said the deals as they stand are strategically worth a lot to either CN or CP and shouldn't result in excessive cost-cutting. But he added the union has a fair argument that being forced to pay more, including by adding debt, does raise worries.

"The more the winning party is going to have to find ways of extracting that value for their own shareholders and that's either through higher pricing or cutting costs and you could see why unions would not be in favour of that."

This report by The Canadian Press was first published May 18, 2021.

Companies in this story: (TSX:CNR, TSX:CP)

Ross Marowits, The Canadian Press

FASCISTS MARCHE
French police protest daily violence, some boo interior minister

By Metro US
Posted on May 19, 2021

French police stage protest against violence in front of the National Assembly In Paris

PARIS (Reuters) -Thousands of French police officers protested near the National Assembly on Thursday to demand the government get tough on violence against the security forces, with some booing the interior minister who turned up in a show of solidarity.

The discontent within the police will trouble President Emmanuel Macron, who wants to show voters he is strong on law and order ahead of next year’s election, when the far-right leader Marine Le Pen is expected to mount the biggest challenge.


Police unions complain that the government is failing to protect officers from daily attacks that leave some afraid of doing their jobs in certain towns and cities.

“This can’t go on any longer. You really need to protect us. It’s getting worse,” one officer could be heard telling Interior Minister Gerald Darmanin.

The protest took place after a month-long period which saw a policeman killed during an anti-narcotics operation and a police force employee stabbed to death outside her commissariat.

However, human rights groups and ethnic minority associations have frequently levelled accusations of brutality and systemic racism against the police force itself.

One attack against a Black music producer in November had brought shame on France, Macron said at the time, demanding the police be exemplary in their own behaviour.


The unions are demanding a minimum prison sentence for anyone who attacks a police officer. One protest banner read: “Paid to serve, not to die.

“No-one listens to us,” lamented a second officer who identified himself as Stephane and said he had travelled from the Mediterranean city of Marseille.

An IPSOS opinion poll this month showed more than half of all police and military personnel would vote for Le Pen in a runoff vote against Macron next year.


(Reporting by Elizabeth Pineau and Matthieu Protard; writing by Richard Lough; editing by Estelle Shirbon and Angus MacSwan)

French police stage protest against violence in front of the National Assembly In Paris
French police stage protest against violence in front of the National Assembly In Paris
French police stage protest against violence in front of the National Assembly In Paris
French police stage protest against violence in front of the National Assembly In Paris

U.S. intelligence chief visits DMZ on North Korean border – Yonhap

Intelligence Comittee Holds Threat Hearing in Washington

SEOUL (Reuters) – U.S. Director of National Intelligence Avril Haines visited the Demilitarised Zone (DMZ) along the border with North Korea as part of a visit to South Korea on Thursday, the Yonhap news agency reported.

Haines’ visit comes a week ahead of South Korean President Moon Jae-in’s first summit with new U.S. President Joe Biden in Washington.

Yonhap published photographs of Haines leaving her hotel in Seoul and a convoy of vehicles it said was carrying her and other members of the U.S. delegation arriving at the DMZ.

She was expected to take a brief tour of the Joint Security Area in the inter-Korean truce village of Panmunjom, where talks with North Korea have been held in the past, among other areas, Yonhap reported.

The U.S. Embassy did not immediately respond to a request for comment, and it was not clear if the American delegation had sought a meeting with North Korean officials during her trip.

South Korea’s National Intelligence Service declined to comment on the visit, citing security concerns.

Stalled denuclearisation talks with North Korea are expected to top the agenda of next week’s summit in Washington, with Moon expected to press Biden to engage with North Korea.

In March, the White House said North Korea had not responded to a behind-the-scenes diplomatic effort by the administration to engage in dialogue.

After completing a policy review last month, the Biden administration said it had settled on a new approach to pressing North Korea to give up nuclear weapons and ballistic missiles that will explore diplomacy but not seek a grand bargain with leader Kim Jong Un.

North Korean officials have publicly criticised Biden’s policies as more of the same Cold War-style hostilities of previous presidents, but they have not commented on the specifics of the review.

(Reporting by Josh Smith; Additional reporting by Hyonhee Shin)

US Sanctions by the Numbers

Spotlight on Cyber Sanctions



By Jason Bartlett and Megan Ophel

MAY 04, 2021

Cyberattacks pose a serious threat to U.S. national security and the integrity of the global commerce and financial system, especially when state-sponsored actors conduct and/or facilitate them. For over a decade, China, Russia, North Korea, and Iran have targeted U.S. government agencies and employees, financial institutions, business enterprises, and average citizens to exploit U.S. institutions and people. These cyberattacks include, but are not limited to: Chinese government-led cyber espionage attempts to obtain U.S. government secrets and sensitive information crucial to U.S. national security; Russia’s numerous disinformation campaigns to influence election decisions and public opinion; North Korean cyber agents and accomplices hacking cryptocurrency exchanges and distributing ransomware to demand payments for the country’s heavily sanctioned economy; and concerted efforts by Chinese, Russian, North Korean, and Iranian cybercriminals to steal COVID-19 vaccine research and data. Given the wide scope of cybercrime targets and logistical difficulty involved with attributing cyberattacks to specific individuals and entities located in various regions across the globe, the U.S. government has struggled to formulate a comprehensive cybersecurity strategy.


As illicit actors and hostile foreign governments continue to exploit global cyberspace and new financial technologies, President Joe Biden has elevated the status of cyber threats within U.S. national security considerations to an “urgent initiative,” suggesting an increased use of government measures to curtail this illicit activity. This edition of Sanctions by the Numbers will provide an overview of U.S. cyber-related sanctions authorities from the Obama administration to recent developments under the Biden administration, followed by trends in the deployment of cyber sanctions and snapshots of malicious North Korean and Russian cyber networks that cyber-related sanctions exposed. The objective is to highlight key developments in U.S. cyber sanctions policy, as well as the successes and limitations sanctions offer the U.S. government in identifying and targeting malicious cyber activity that threatens U.S. national security.

The Evolution of U.S. Cyber Sanctions

The U.S. government first incorporated sanctions policy into its cybersecurity strategy in 2012 when Barack Obama’s administration designated Iran’s Ministry of Intelligence under terrorism-related authorities for illicit hacking activities in coordination with Hezbollah. Since then, the Treasury Department has issued a total of 311 cyber-related sanctions with the largest number against Russia (141), Iran (112), and North Korea (18). The watershed moment for cyber sanctions came in November 2014 when the Lazarus Group, a North Korean–sponsored cybercrime organization, hacked Sony Pictures Entertainment. Following this cyberattack, the Obama administration created the first cyber-specific sanctions program in 2015. Pursuant to Executive Order 13694, this authority allows the U.S. government to designate individuals and entities solely on their participation in, and/or facilitation of, malicious cyber activities without needing connections to additional illicit activity covered under other sanctions programs, such as terrorism. However, the Treasury Department didn’t impose sanctions under the original cyber-specific framework until it was amended in 2016, demonstrating that the logistical difficulty of attributing cyberattacks to specific individuals or entities abroad remained a challenge for the U.S. government.

A possible explanation is that state-sponsored cybercriminals often conduct cyberattacks against the United States while located in either hostile foreign jurisdictions with low to non-existent U.S. law enforcement capabilities, such as Russia or China, or regions with poor sanctions compliance and legal framework, such as Southeast Asia. This significantly limits the United States’ ability to attribute and/or punish illicit actors engaging in cybercrime overseas. For example, the Treasury Department wasn’t able to sanction the Lazarus Group for its 2014 cyberattack against Sony Pictures until 2019.


In the aftermath of Russian interference in the 2016 U.S. presidential election, Obama issued Executive Order 13757, which amended the cyber-specific sanctions program now known as CYBER2 to include cyber-enabled election interference as a sanctionable activity. This amendment resulted in the sanctioning of nine Russian individuals and entities involved in the 2016 hack of the Democratic National Committee. Even so, cyber-enabled election interference remains a significant threat to the democratic fabric of the United States. Cyber threats continued to evolve during the Trump administration, which led the U.S. government to expand cyber-related sanctions through the Countering America’s Adversaries Through Sanctions Act (CAATSA) and Executive Order 13848. The former targets Russian-sponsored cybercriminals and the latter expanded sanctions on election interference. In response to the growing cyber threat, the Biden administration has called for a national review of cybersecurity protocols and sanctions programs.

Cyber-related Designations, 2011–2021


During the Trump administration, cyber-related sanctions increased exponentially in response to growing cyber threats from North Korea, China, Iran, and Russia. (Source: Endnote 1)


Although both the Obama and Trump administrations faced rising cyber threats from abroad, their use of cyber-related sanctions varied significantly. Despite creating the first cyber-specific sanctions program, the Obama administration imposed relatively few cyber-related designations, averaging 10 per year between 2012 and 2017. In contrast, the Trump administration averaged 57 cyber-related sanctions per year from 2017 to 2020. This increase may be partly due to a concurrent increase in the frequency and scale of cyberattacks, as some of the major state-sponsored cyberattacks conducted during this timeframe include: the 2017 Equifax hack (China); the 2017 WannaCry 2.0 ransomware attack (North Korea); the 2017 NotPetya ransomware attack; and the 2020 SolarWinds breach (Russia). While the rate of sanctions designations per year has increased from 15 in 2012 to the highest level yet of 90 in 2020, illicit cyber actors continue to exploit weaknesses in the U.S. government’s ability to anticipate and prevent further cyberattacks. As previously mentioned, the logistical difficulty of attributing cyberattacks to specific actors often delays the rate at which the U.S. government can respond via sanctions, ultimately weakening the deterrence factor of cyber sanctions.


Most recently, the U.S. government discovered two major Chinese- and Russian-led cyberattacks that targeted federal agencies with the goal of obtaining sensitive government information: the Microsoft hack in March 2021 and the year-long SolarWinds breach in 2020. According to Microsoft, the Chinese hacking group Hafnium targeted program vulnerabilities in Microsoft Exchange Server, an email and calendar application, through leased virtual private networks (VPNs) in the United States. VPNs allow internet users to create a private network connection that obfuscates their original internet protocol (IP) address. They can be used to access region-restricted websites and entertainment materials, as well as shield one’s physical location when conducting cyberattacks against a target in a foreign country. Although government officials are still investigating the repercussions of this cybersecurity breach, the modified email software is believed to have infected tens of thousands of U.S. businesses, government agencies, and schools. The Russian-led cyberattack against U.S. software company SolarWinds involved a modified software update that granted Russian cybercriminals access to approximately 18,000 private and government computers across several federal agencies, including the Departments of the Treasury, State, and Defense.

These two major cyberattacks demonstrate both Beijing's and Moscow’s growing cyber aggression toward Washington, highlighting an urgent need for greater U.S. cybersecurity measures. In response, the Biden administration attributed the SolarWinds hack to the Russian Foreign Intelligence Service (SVR) in a new set of sanctions targeting Russia’s malign foreign activities, addressing both general malicious cyber activities and cyber-enabled election interference. This new executive order extends restrictions on U.S. banks’ dealings with Russian sovereign debt. It also permits the U.S. government to issue status-based sanctions on any Russian company operating in the technology sector, as opposed to conduct-based sanctions, which demonstrates U.S. efforts to stymie further fusion between the private sector and Moscow.

Trends in the Deployment of Cyber-related Sanctions


Although the CYBER2 sanctions program increased the global breadth of U.S. sanctions by authorizing designations solely for participation in, and/or facilitation of, illicit cyber activities, there is a continued use of other sanctions programs to impose cyber-related sanctions. For example, the Treasury has imposed only 19 percent of cyber-related designations targeting Iran under CYBER2. The rest relied primarily on country-specific sanctions programs dating back to the Obama administration, targeting individuals linked to the previously designated Iranian Ministry of Intelligence and Islamic Revolutionary Guard Corps. Similarly, all 18 sanctions on North Korean individuals and entities are pursuant to country-specific programs (DPRK2 and DPRK3), which target actors directly linked to the North Korean government. A possible explanation is that under the auspices of country-specific programs, the Treasury only needs to link individuals and entities to sanctioned government organizations, rather than to a specific cyber-attack—a much easier task given the challenges of attributing specific illicit cyber activities to specific actors. This method of leveraging country-specific sanctions programs to target specific illicit activity is a common practice also seen in human rights– and corruption-related designations. In April 2021, the Biden administration issued 35 new cyber-related sanctions on Russia, with almost all designations pursuant to CYBER2 and country-specific or election interference sanctions programs. Although most of the newly sanctioned entities are linked to previously sanctioned entities under CYBER2, such as the Internet Research Agency, the new country-specific executive order on Russia increases the administration’s ability to sanction companies in the Russian technology sector.

Total Cyber-related Designations under CYBER2 versus Non-CYBER2 2011–2021




Designations pursuant to CYBER2 dominated cyber-related sanctions until 2020, which showed an increase in the use of other sanctions authorities, such as country-specific programs, to target illicit cyber activity. (Source: Endnote 2)

Cyber-related designations are highly concentrated in a handful of countries, with the greatest in Russia (45 percent), Iran (36 percent), and North Korea (6 percent). The Treasury imposed nearly all remaining cyber-related sanctions on individuals and entities located in various other jurisdictions due to their connections to sanctioned Russian, Iranian, and/or North Korean actors. For example, all five designations on Chinese individuals and entities for cybercrimes were because of their involvement with activities conducted by sanctioned Russian or North Korean actors. This includes two Chinese nationals who were designated under the auspices of CYBER2 and DPRK3 for laundering over $100 million worth of stolen cryptocurrency on behalf of North Korea in March 2020. An exception to this pattern is Nigeria where the Treasury sanctioned six Nigerian individuals in 2020 who were involved in email scams and romance fraud against American individuals and businesses—though these were not state-sponsored.

Global Distribution of Cyber-related Sanctions, 2011–2021




To address growing cyber threats from abroad, the Treasury has issued a landslide of cyber-related sanctions, pursuant to both CYBER2 and country-specific programs, predominantly against Russia (141), Iran (112), and North Korea (18). (Source: Endnote 3)


Despite its low number of cyber-related sanctions relative to Russia, Iran, and North Korea, China remains a major cyber threat to the United States. While the Justice Department has indicted over 25 Chinese nationals, including officers in China’s People’s Liberation Army, for various cyber-enabled activities, such as the 2017 Equifax data breach, the Treasury has yet to sanction any Chinese national or entity for illicit cyber activities conducted on behalf of the Chinese government. This stems in part from a repeated high-level agreement between the United States and China to distinguish between cyber espionage conducted for commercial reasons, as opposed to that done for traditional national security reasons. The United States endeavors to prevent escalating tensions with China while keeping the possibility of imposing further costs on the table.









Spotlight on Malicious Cyber Networks: Russia and North Korea

While sanctions may have a limited material effect on individuals and entities, they play an important role in “naming and shaming” actors and the countries that sponsor them by providing information on the connections between governments and illicit actors. The following visualizations of Office of Foreign Assets Control (OFAC) designations and U.S. Department of Justice indictments provide a snapshot of the complex networks of Russian and North Korean government-sponsored organizations, businesses, and cybercriminals responsible for major cyberattacks around the world.

Russia’s Federal Security Service Technology Procurement Networks According to OFAC Designations



A significant number of individuals and businesses have been sanctioned for providing the Russian Federal Security Service (FSB) with technology and equipment used for malign activities. The new executive order on Russia increases the Treasury’s flexibility in imposing sanctions on private companies in the Russian technology sector. (Source: Endnote 4)


A cluster of cyber-related sanctions on Russia centers on the activities of the Russian Federal Security Service (FSB), the internal security agency of Russia. The Treasury first sanctioned the FSB in December 2016 for interfering in the 2016 U.S. election, and since then, both OFAC and the Department of Justice have designated or indicted more than 50 individuals and entities linked to the FSB. A major area of focus for Treasury sanctions has been the connections between the FSB and businesses providing technological support and surveillance technologies. In 2018 and 2020, the Treasury sanctioned two Russian companies under CYBER2, Divetechnoservices and Okeanos, for providing the FSB with underwater equipment and diving technology, which were allegedly used in efforts to monitor telecommunications data through undersea communications cables. Ultimately, these designations led to additional sanctions on many other Russian companies and individuals who facilitated sanctions evasion on behalf of the Russian government. Recognizing that advanced technologies and equipment can in fact contribute to improved and well-coordinated cyberattacks, the Biden administration included the Russian technology sector in its new executive order in response to Russian malign cyber activities. Under this new authority, the Treasury designated three technology companies connected to the Russian FSB in April 2021, as depicted in the flowchart above.

Russia’s Federal Security Service Connections to Cybercriminals According to OFAC Designations and Department of Justice Indictments


The Russian Federal Security Service (FSB) has close links with several infamous cybercriminals responsible for major malware programs and cyberattacks on American individuals and businesses. (Source: Endnote 5)


The FSB has also been involved both directly and indirectly in cyberattacks against major U.S. targets, indicating collaboration between Russian government officials and cybercriminals. In March 2017, the U.S. Department of Justice indicted two FSB officers for their involvement in the 2014 Yahoo hack, in which the officers paid Alexsey Belan, a previously indicted Latvian hacker, for illicit access to at least 500 million Yahoo accounts, some belonging to Russian journalists and U.S. government officials, in order to monitor their email content. Belan was sanctioned in December 2016, along with Evgeniy Bogachev, a notorious cybercriminal responsible for several major malicious software programs. Bogachev is a member of the Jabber Zeus Crew, a cybercrime organization that counted Maksim Yakubets among its members. Yakubets, indicted for his activities with the Jabber Zeus Crew, would go on to lead Evil Corp, the organization responsible for the Dridex malware, which stole banking credentials in order to drain bank accounts and was responsible for tens of millions of dollars in losses. In a Treasury press release accompanying his designation in 2019, Yakubets was accused of working directly for the FSB since 2017.

North Korea’s Lazarus Group Cybercrime Web According to OFAC Designations



The Lazarus Group is a subunit of North Korea’s primary intelligence agency, the Reconnaissance General Bureau (RGB), tasked with leveraging its cyber capabilities to weaponize enemy network vulnerabilities and illicitly procure funds for the Kim Jong Un’s regime. (Source: Endnote 6)


Perhaps the most well-known North Korean–sponsored cybercrime organization is the Lazarus Group. This subunit of the Reconnaissance General Bureau, North Korea’s main intelligence agency, is responsible for myriad cyberattacks targeting foreign financial institutions, agencies, and online networks including, but not limited to: the Sony Pictures Entertainment hack (2014), the Bangladesh Bank cyber heist (2016), the WannaCry 2.0 ransomware attack (2017), and numerous spear-phishing and cryptojacking campaigns. However, Pyongyang doesn’t operate alone as it currently commands an estimated 6,000 cybercriminals across the globe, many reportedly operating overseas in China, Russia, India, Belarus, and Malaysia. The U.S. Department of Justice indicted North Korean hacker Park Jin Hyok twice for his involvement in the Sony Pictures hack, Bangladesh Bank cyber heist, and WannaCry ransomware attack through his association with the Lazarus Group. Park previously worked for over a decade at a North Korean government front company in China called the Chosun Expo Joint Venture which is known for its connections to the Reconnaissance General Bureau. North Korea has outsourced a certain degree of its cybercrime to China, including by recruiting two Chinese nationals, indicated in the flowchart above, for professional money laundering services. Although more research is needed to properly ascertain North Korea’s ability to fully monetize stolen crypto funds, its continued success in hacking large sums of cryptocurrencies will likely result in increased attacks against financial institutions and exchanges hosting and/or facilitating digital currency transactions.

Under increased economic sanctions during both the Obama and Trump years, North Korea began to rely heavily on cyber-enabled financial crime to steal and procure funds for its nuclear weapons development program. For example, the Department of Justice unsealed a new indictment in February 2021 that added two defendants, Jon Chang and Kim Il, along with Park in North Korea’s efforts to procure illicit funds through the Lazarus Group from 2014 to 2020. This indictment also detailed the wide range of malicious state-sponsored cyber-enabled financial crime ranging from cyberattacks, heists, and intrusions to spear-phishing campaigns, destructive malware attacks, exfiltration of data, and global money laundering schemes. Sanctions are commonly thought of as a useful tool to target state-sponsored cybercriminals, but the logistical difficulty of attributing cyberattacks to specific individuals or entities abroad remains a challenge for the U.S. government. For instance, the Treasury wasn’t able to sanction Park for his involvement in the Sony Pictures hack and other major cyberattacks until September 2018 due to the opaque nature of state-sponsored covert cyber operations conducted in jurisdictions with little to non-existent U.S. presence and/or law enforcement capabilities.

As seen in the recent hacking attacks against Microsoft and COVID-19 vaccine research and testing facilities, hostile nations continue to successfully conduct disruptive cyberattacks against U.S. government agencies, federal employees, average citizens, financial and commercial institutions, and medical facilities. In response, the Biden administration has indicated that it is planning to impose steeper costs on governments responsible for cyberattacks through clandestine actions, affirming that economic sanctions will continue to play an important role in curbing illicit cyber activity. Regardless of their material impact on malicious actors, economic sanctions will continue to serve a useful “naming and shaming” function for the U.S. government to publicize hostile actors and promote greater information sharing among allies through public indictments and statements. Similar to human rights and corruption-related sanctions, the Biden administration will likely continue the ongoing trend of utilizing country-specific sanctions programs to target specific illicit activity otherwise difficult to designate.


Methodology

Designations included in this edition were drawn from the following sanctions programs: CYBER2, TCO, CAATSA-RUSSIA, RUSSIA-EO14024, DPRK2, DPRK3, IRAN-TRA, HRIT-IR, HRIT-SY, IRAN-HR, and ELECTION-EO13848. For non-CYBER2 programs, only cyber-related designations listed in Treasury press releases were included.

ENDNOTES

Historical data from January 2011–April 2021 from the U.S. Department of the Treasury’s Office of Foreign Assets Control.
Historical data from January 2011–April 2021 from the U.S. Department of the Treasury’s Office of Foreign Assets Control.
Historical data from January 2011–April 2021 from the U.S. Department of the Treasury’s Office of Foreign Assets Control.
Organized historical data from January 2014–April 2021 from the U.S. Department of the Treasury’s Office of Foreign Assets Control on Lucidchart.
Organized historical data from January 2014–April 2021 from the U.S. Department of the Treasury’s Office of Foreign Assets Control and U.S. Department of Justice on Lucidchart.
Organized historical data from January 2014–April 2021 from the U.S. Department of the Treasury’s Office of Foreign Assets Control and the U.S. Department of Justice on Lucidchart.