In an Era of Russian Hacks, the U.S. is Still Installing Russian Software on Government Systems

rzoze19/Shutterstock.com

 

Congressional concern is climbing—not for the first time—about government agencies using an anti-virus tool made by the respected but Russia-based security firm Kaspersky Lab. The dustup is a case study in why securing government systems is devilishly complicated.

The fracas comes as congressional Democrats are squaring off against President Donald Trump over possible collusion between Russian intelligence agencies and members of his campaign. It also follows a presidential campaign upended by a Russian government influence operation and amid a deluge of leaks from U.S. intelligence agencies.

The competing priorities of security, intelligence, diplomacy and budget constraints play a role in the melee. So, too, do the rival power centers of a government that’s struggled for years, often unsuccessfully, to manage cybersecurity and technology buying in a unified way. Continue reading

Could Russian Hackers Cause Power Outages In The U.S.?

 

Hackers believed to be allied with the Russian government have devised a cyberweapon that has the potential to be highly disruptive against the world’s electrical systems, researchers have reported.

The malware, which researchers have dubbed CrashOverride or Industroyer, is known to have disrupted the electrical system in Ukraine in December, briefly shutting down one-fifth of Kyiv’s electric power. Continue reading

Gertz on New Book ‘iWar’: U.S. Is ‘Totally Unaware’ of Extent of Information War Threat

 

Washington Free Beacon senior editor Bill Gertz discussed his new book iWar: War and Peace in the Information Age during a radio interview with Ross Kaminsky on Tuesday. Continue reading

U.S. military satellites in crisis as foreign weapons advance and proliferate

(Associated Press/File)

(Associated Press/File)

 

The U.S. military’s satellite communications are facing a crisis, threatened by a growing array of foreign weapons, including cyberattack capabilities, lasers, electronic jammers and anti-satellite weapons, according to a Pentagon study.

An executive summary of the report by the Defense Science Board warns that military satellite communications used for global operations “will be contested by a myriad of effects ranging from reversible to destructive.”

“The estimated and projected electronic threats against satellite communication (satcom) have rapidly escalated in the last few years and will continue to increase in the foreseeable future,” the report says. Continue reading

Foreign States Preparing Cyber Attacks on Infrastructure in Future War

National Security Agency Director Mike Rogers

National Security Agency Director Mike Rogers / Getty Images

 

Rogers awaiting new Trump cyber policy

Foreign nations’ cyber intrusions into key infrastructure network are preparation for damaging attacks in a future conflict, the commander of Cyber Command told Congress Tuesday.

Adm. Mike Rogers, the commander who is also director of the National Security Agency, said one of his major concerns is cyber attacks on critical infrastructures used to run the electric grid, financial systems, communications networks, the transportation systems, and others. Continue reading

China tried to hack THAAD system: CNN

State-sponsored Chinese hackers tried to disrupt the operation of the controversial THAAD anti-missile system in South Korea, CNN reported, citing American cyber security experts.

The U.S. news network said the hacking had taken aim at an unidentified organization with connections to the THAAD system. Continue reading

Chinese Supercomputers Threaten U.S. Security

One part of where this article goes wrong is the first opening sentence, as China has already eclipsed the United States in supercomputer technology.

However, at least Americans know who they can thank for giving China their threatening capability: Bill and Hillary Clinton through the U.S. Department of Commerce.

Another component of the problem is that the American security apparatus believes in the simple ‘patch and pray‘ fix due to high costs. In other words, they’re also reactive and not proactive… a grave difference.

 

Supercomputers play a vital role in the design, development and analysis of almost all modern weapons systems, said a report by the National Security Agency-Energy Department based on an assessment of China’s new supercomputer called the TaihuLight. Photo by: David Mercer

 

China is eclipsing the United States in developing high-speed supercomputers used to build advanced weapons, and the loss of American leadership in the field poses a threat to U.S. national security.

That’s the conclusion of a recent joint National Security Agency-Energy Department study, based on an assessment of China’s new supercomputer called the TaihuLight.

National security requires the best computing available, and loss of leadership in [high-performance computing] will severely compromise our national security,” the report warns. Continue reading

America Is Losing the Cyber Information War

Getty Images

 

New strategies, tactics needed to fight influence, propaganda warfare threats, Senate told

The United States faces a growing threat of information warfare attacks and needs new strategies and organizations to counter it, national security experts told Congress this week.

John C. Inglis, former deputy director of the National Security Agency, said cyber attacks are only one form of influence, propaganda, and disinformation attacks being waged in the cyber war of ideas.

“Cyber warfare, in my view, is not a standalone entity,” Inglis told a Senate subcommittee hearing Thursday. “When you’re talking about information warfare, it’s at that top-most stack, and it does not necessarily comprise of an exchange of tools or an exchange of literal warfare. It is, in fact, a conflict of ideas.” Continue reading

Total Chaos: Cyber Attack Fears As MULTIPLE CITIES HIT With Simultaneous Power Grid Failures: Shockwave Of Delays In San Francisco, Los Angeles, New York

The U.S. power grid appears to have been hit with multiple power outages affecting San Francisco, New York and Los Angeles.

Officials report that business, traffic and day-to-day life has come to a standstill in San Francisco, reportedly the worst hit of the three major cities currently experiencing outages.

Power companies in all three regions have yet to elaborate on the cause, though a fire at a substation was the original reason given by San Francisco officials. Continue reading

New report details one of history’s “largest ever” cyber espionage operations

 

A new report authored by a consortium of government and private organizations in Britain has revealed the existence of a computer hacking operation, allegedly based in China, that is said to be “one of the largest ever” such campaigns globally. The operation is believed to have compromised sensitive information from an inestimable number of private companies in Southeast Asia, Europe and the United States. The report was produced by a consortium of public and private organizations, including BAE systems and the London-based National Cyber Security Centre, an office of the United Kingdom’s signals intelligence agency, the Government Communications Headquarters. It details the outcome of Operation CLOUD HOPPER, which was launched to uncover the cyber espionage activities. Continue reading

U.S. Ill-Prepared to Stop Widespread Russian Information Warfare

Was there Russian influence during the 2016 election process? Sure. However, not as people think.

Moscow is engaged in what’s called the “scissor strategy”. In America’s case, both sides of the scissor blades represent the right-wing and left-wing of America. When the blades meet (conflict), America (material being cut) is destroyed. You can plainly see this in today’s media where CNN/MSNBC/ABC et al represent the left-wing of society, whereas (although it’s a false right) Fox News represents the right-wing base.

It’s interesting to note that Fox is a false right in the sense that it may represent the second side of the same coin in an information warfare campaign against the American people. Some of the anchors, hosts and reporters may be genuine, but the owners of Fox News are not. They consistently undermined Trump, the outside and anti-establishment candidate and constantly favored the progressive-socialists (aka RINOs) in the Republican party.

This is where it gets complicated, but for those with discernment, they see right through it.

 

Clint Watts testifies before the Senate Intelligence Committee March 30 / Getty Images

 

Experts reveal methods, motivations behind Moscow’s cyber attacks

Russia is engaged in wide-ranging information warfare operations aimed at undermining the United States, and the federal government has few defenses against the attacks, information specialists told a Senate hearing last week.

Moscow’s large-scale operations include the covert attempt to sway the 2016 presidential election and dissemination of false news reports to sow confusion and weaken American democracy, according to testimony before the Senate Select Committee on Intelligence Thursday.

The committee hearing was called as part of an investigation into the Russian campaign to influence the 2016 election. Continue reading

Trump set up? The CIA’s UMBRAGE group can stage RUSSIAN hacking

FISA warrant could have been obtained through staged hacking

(INTELLIHUB) — Among the startling revelations coming out through the Wikileaks “Vault 7” release is the shocking fact that the CIA has the ability to “misdirect attribution” of a hack, effectively making it look as if a country such as Russian was the culprit when in reality it was forces within the Central Intelligence Agency itself.

According to the Wikileaks documents, a group within the CIA’s Remote Devices Branch, code-named UMBRAGE, collects and maintains a massive library of attack techniques stolen from other countries, including the Russian Federation.

“With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from,” reads the Wikileaks release. “UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.” Continue reading

CIA used Frankfurt consulate to spy on Europeans

Protest against US dragnet surveillance tactics revealed by Edward Snowden (Photo: Valentina Pop)

 

The US intelligence agency, the CIA, has used the American consulate in Frankfurt as a covert base to carry out digital spy operations, Wikileaks revealed on Tuesday (7 March).

The Center for Cyber Intelligence Europe, based in the German city, was the base for CIA hackers covering Europe, the Middle East, and Africa, Wikileaks said. The information is based on documents from the agency’s internal discussion forum.

The leaked documents included a guide for CIA hackers on how to prepare for their trip to Germany. Continue reading

Files released by WikiLeaks show advanced CIA collection methods

As we all know by now:

 

Thousands of documents belonging to the United States Central Intelligence Agency, which were released on Tuesday by the international anti-secrecy website WikiLeaks, are almost certainly genuine. They reveal an entire universe of technical intelligence collection methods used by the CIA to extract information from digital applications and electronic devices, ranging from flash drives to smart screen televisions. WikiLeaks named the collection Vault 7, and said that it consists of nearly 8,000 web pages and 1,000 attachments. It also said that its editors redacted hundreds of pages of computer code, in order to prevent the public release of advanced cyberweapons that are allegedly used by the CIA to sabotage electronic devices and systems. Continue reading