Trump set up? The CIA’s UMBRAGE group can stage RUSSIAN hacking

FISA warrant could have been obtained through staged hacking

(INTELLIHUB) — Among the startling revelations coming out through the Wikileaks “Vault 7” release is the shocking fact that the CIA has the ability to “misdirect attribution” of a hack, effectively making it look as if a country such as Russian was the culprit when in reality it was forces within the Central Intelligence Agency itself.

According to the Wikileaks documents, a group within the CIA’s Remote Devices Branch, code-named UMBRAGE, collects and maintains a massive library of attack techniques stolen from other countries, including the Russian Federation.

“With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from,” reads the Wikileaks release. “UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.” Continue reading

CIA used Frankfurt consulate to spy on Europeans

Protest against US dragnet surveillance tactics revealed by Edward Snowden (Photo: Valentina Pop)

 

The US intelligence agency, the CIA, has used the American consulate in Frankfurt as a covert base to carry out digital spy operations, Wikileaks revealed on Tuesday (7 March).

The Center for Cyber Intelligence Europe, based in the German city, was the base for CIA hackers covering Europe, the Middle East, and Africa, Wikileaks said. The information is based on documents from the agency’s internal discussion forum.

The leaked documents included a guide for CIA hackers on how to prepare for their trip to Germany. Continue reading

Files released by WikiLeaks show advanced CIA collection methods

As we all know by now:

 

Thousands of documents belonging to the United States Central Intelligence Agency, which were released on Tuesday by the international anti-secrecy website WikiLeaks, are almost certainly genuine. They reveal an entire universe of technical intelligence collection methods used by the CIA to extract information from digital applications and electronic devices, ranging from flash drives to smart screen televisions. WikiLeaks named the collection Vault 7, and said that it consists of nearly 8,000 web pages and 1,000 attachments. It also said that its editors redacted hundreds of pages of computer code, in order to prevent the public release of advanced cyberweapons that are allegedly used by the CIA to sabotage electronic devices and systems. Continue reading

How Israel Became a High-Tech Military Superpower

How did a country smaller than El Salvador with a population of eight million and few natural resources become a military superpower within a few decades?

In The Weapon Wizards:  How Israel Became a High-Tech Military Superpower (St. Martin’s Press, 2017), authors Yaakov Katz and Amir Bohbot explain this remarkable phenomenon.  Calling on their experience as Israel Defense Forces (IDF) veterans and seasoned national security analysts, they present an intriguing and engrossing account of Israel’s defense capabilities development.  From a country lacking bullets and aircraft, Israel transformed itself into one of the most effective militaries in the world and the sixth-largest arms exporter globally.  Today, Western powers, including the U.S., France, the UK, Russia and China, all come to Israel to learn and establish joint ventures. Continue reading

Russia Reveals Information Warfare Troops

Russian Defense Minister Sergei Shoigu / AP

 

Defense minister: New force ‘stronger’ than past counter propaganda efforts

Russia disclosed this week that it has strengthened its information warfare forces amid U.S. charges of influence operations aimed at swaying the outcome of the 2016 election.

Defense Minister Sergei Shoigu revealed information capabilities in an assessment of Russia’s military power provided to Russian officials on Wednesday in Moscow.

“Over this time, information operations forces have been formed, which are much more efficient and stronger than the counter propaganda department,” Shoigu said. He did not elaborate on what is regarded as one of the Russian military’s more secret capabilities. Continue reading

Iran Renews Destructive Cyber Attacks on Saudi Arabia

AP

Tehran strategy seeks takeover of oil-rich U.S. ally

After a four-year hiatus, Iran recently resumed destructive cyber attacks against Saudi Arabia in what U.S. officials say is part of a long-term strategy by Tehran to take over the oil-rich kingdom and regional U.S. ally.

Late last month, the Saudi government warned in a notice to telecommunications companies that an Iranian-origin malicious software called Shamoon had resurfaced in cyber attacks against some 15 Saudi organizations, including government networks. Continue reading

‘Missiles will fall on their HEADS’ Iran threatens Donald Trump in ‘showcase of POWER’

IRAN has performed a series of missile and radar tests in a bid to “showcase its power” to Donald Trump.

In a bullish retaliation to Trump’s decision to impose sanctions on the country yesterday, Iran’s Revolutionary Guards said the aim of the drill in the Semnan province was to “showcase the power of Iran’s revolution and to dismiss the sanctions”.

Iranian state media reported the drill would test tech military equipment including homemade missile systems, radars, command and control centres and cyber warfare systems. Continue reading

Trump aims for ‘unquestioned’ US military dominance

 

President Donald Trump will “rebuild” America’s vast military, boost its anti-missile capabilities and prioritize defeating the Islamic State group, according to the first policy statements published on the White House website Friday.

Published moments after Trump was inaugurated president, the statements say he will end limits on Pentagon spending agreed by Congress and the Obama administration, and will soon release a new budget proposal outlining his vision for the military. Continue reading

Gertz: U.S. Must Go on the ‘Offensive’ During the Information Age

 

Washington Free Beacon senior editor Bill Gertz discussed his new book, iWar: War and Peace in the Information Age, on Friday with Rush Limbaugh on his radio show.

“As somebody who knows about cyber wars and cyber security, how do you, Bill Gertz …? How do you process this stuff? How do you react to it?” Limbaugh asked. “Because you know whether some of this stuff is true, legitimate or not. So how do you deal with it yourself?”

Gertz responded by calling developments in the cyber domain an “amazing phenomenon” and discussed how cyber will dominate the current “information age” society, where people are under assault from all quarters. Continue reading

FBI dispute with DNC over hacked servers may fuel doubt on Russia role

Meanwhile, President Obama is pushing America closer to war with Russia based on faulty intelligence, or what’s likely worse: fabricated intelligence.

 

fbi headquarters at night

FBI Headquarters in Washington D.C. Credit: FBI

 

The FBI may have been forced into a misstep when investigating whether Russia hacked the Democratic National Committee — the agency never directly examined the DNC servers that were breached.

Instead, the FBI had to rely on forensic evidence provided by third-party cybersecurity firm CrowdStrike, which the DNC hired to mitigate the breach.

“The FBI repeatedly stressed to DNC officials the necessity of obtaining direct access to servers and data, only to be rebuffed,” the agency said on Thursday in a statement. Continue reading

PLA’s hacking hotel

American military intelligence has identified a hotel complex that is serving as an ersatz headquarters for a Chinese military hacking unit. China is basically hiding its operations cyberattack units in plain sight.

 

U.S. military intelligence has identified a headquarters for a Chinese military hacking unit — inside two Beijing hotels.

According to an open-source intelligence report produced by the Army’s Asian Studies Detachment, “the Headquarters/Jintang and Seasons Hotel appear to be located in the same or at least adjacent buildings, both of which are, according to available information, owned by or connected to the People’s Liberation Army 4th Department.”

The Fourth Department, known as 4PLA, until recently was part of the military’s General Staff Department and is also known as the Electronic Countermeasures and Radar Department. The unit was reorganized into a new PLA service called the Strategic Support Force. The roll of the department is to conduct offensive electronic warfare and information warfare, including offensive cyberattacks. Continue reading

Gertz: ‘America Is Extremely Vulnerable’ to Cyber Threats

 

Washington Free Beacon senior editor Bill Gertz said that the United States is “extremely vulnerable” to cyber attacks during a radio interview with Sean Hannity on Tuesday evening. Gertz appeared on Hannity’s radio show to discuss his newly released book, iWar: War and Peace in the Information Age.

To begin the interview, Hannity asked Gertz what he thought of WikiLeaks founder Julian Assange’s assertion that he did not receive hacked emails of the Democratic National Committee and Hillary Clinton’s campaign from Russian sources.

“We’re going to have to wait to see what the [Obama] administration’s investigation of the Russian influence operation is,” Gertz responded. Continue reading

Pentagon: China Threatened to Bankrupt Defense Contractor

Not only is espionage in the form of technology theft a serious issue, but the Chinese have also been manufacturing microchips Americans use [i.e. Huewei smartphones — founded by a PLA engineer on behest of the CCP (See also HERE)]… and it’s not limited to the average American consumer, but the U.S. military as well.

 

U.S. President Barack Obama walks past Chinese President Xi Jinping / AP

 

Incident involving jet fighter logistics highlights aggressive Chinese cyber espionage

A U.S. defense contractor was threatened with bankruptcy by Chinese hackers seeking jet fighter logistics secrets, according to the Pentagon’s Joint Staff.

A report earlier this month by the Joint Staff’s J-2 intelligence directorate revealed that the American contractor, a company involved in classified defense work, was threatened by Chinese hackers, according to Pentagon officials familiar with the report.

The Chinese demanded access to the company’s intellectual property, and said unless the company secrets were provided, China would steal the data, reverse engineer it, and then sell it internationally in a bid to force the company into bankruptcy. Continue reading

Before attacking Trump team’s Russia ties, top Democrats were currying favor in Moscow

Russian President Vladimir Putin and U.S. Secretary of State Hillary Clinton on Sept. 8, 2012. / Mikhail Metzel / AFP / Getty

 

Democratic Party leaders who are currently blasting Moscow’s alleged meddling in the 2016 elections and condemning President-elect Donald Trump’s supposed close ties to Vladimir Putin were not too long ago seeking “deepening ties” – and sometimes huge wads of cash – from the very same Russians.

Hillary Clinton as secretary of state in 2010 “was leading the way in urging U.S.-Russia business expansion, complete with an American high-tech delegation to Moscow and U.S. investments in Russian cyberskills,” Rowan Scarborough reported for The Washington Times on Dec. 18.

Now, Clinton and the Obama administration claim Putin ordered cyberattacks against the Democratic National Committee and Russia provided embarrassing stolen emails to WikiLeaks. Continue reading