Russian Military Spy Software is on Hundreds of Thousands of Home Routers

https://cdn.defenseone.com/media/img/upload/2018/08/13/AP_18224544149695/defense-large.jpg

Russian President Vladimir Putin and presidential spokesman Dmitry Peskov, left, attend a meeting during the 5th Caspian summit in Aktau, the Caspian Sea port in Kazakhstan, Sunday, Aug. 12, 2018. [Alexei Nikolsky, Sputnik, Kremlin Pool Photo (Via AP)]

 

In May, the Justice Department told Americans to reboot their routers. But there’s more to do — and NSA says it’s up to device makers and the public.

LAS VEGASThe Russian military is inside hundreds of thousands of routers owned by Americans and others around the world, a top U.S. cybersecurity official said on Friday. The presence of Russian malware on the routers, first revealed in May, could enable the Kremlin to steal individuals’ data or enlist their devices in a massive attack intended to disrupt global economic activity or target institutions.

On May 27, Justice Department officials asked Americans to reboot their routers to stop the attack. Afterwards, the world largely forgot about it. That’s a mistake, said Rob Joyce, senior advisor to the director of the National Security Agency and the former White House cybersecurity coordinator.

“The Russian malware is still there,” said Joyce. Continue reading

Cyber Command moves closer to a major new weapon

https://www.armytimes.com/resizer/RLZgP9H16d0iMFk8r-77ilZ6Vw8=/1200x0/filters:quality(100)/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/J3PNNQCXKNAUXK6BW3KQNOUSAE.jpg

A proposal for the next generation cyber operations platform went out to industry recently, however, details are scarce. (J.M. Eddins Jr./Air Force)

 

The Air Force issued a formal proposal earlier this month for the Department of Defense’s long-awaited cyber weapon system, known as the Unified Platform, sources tell Fifth Domain.

DoD officials have said the Unified Platform is one of U.S. Cyber Command’s largest and most critical acquisition programs to date. Industry officials have said it is necessary to conduct cyber operations and is critical to national security. Continue reading

The NSA’s Hidden Spy Hubs in Eight U.S. Cities

A VERY long read that is worth your while.

It reminds you of how well you don’t know your city if you’re living in one of these eight.

 

https://theintercept.imgix.net/wp-uploads/sites/1/2018/06/building-8-1528304243.jpg

420 South Grand Avenue, Los Angeles

 

The secrets are hidden behind fortified walls in cities across the United States, inside towering, windowless skyscrapers and fortress-like concrete structures that were built to withstand earthquakes and even nuclear attack. Thousands of people pass by the buildings each day and rarely give them a second glance, because their function is not publicly known. They are an integral part of one of the world’s largest telecommunications networks – and they are also linked to a controversial National Security Agency surveillance program.

Atlanta, Chicago, Dallas, Los Angeles, New York City, San Francisco, Seattle, and Washington, D.C. In each of these cities, The Intercept has identified an AT&T facility containing networking equipment that transports large quantities of internet traffic across the United States and the world. A body of evidence – including classified NSA documents, public records, and interviews with several former AT&T employees – indicates that the buildings are central to an NSA spying initiative that has for years monitored billions of emails, phone calls, and online chats passing across U.S. territory.

The NSA considers AT&T to be one of its most trusted partners and has lauded the company’s “extreme willingness to help.” It is a collaboration that dates back decades. Little known, however, is that its scope is not restricted to AT&T’s customers. According to the NSA’s documents, it values AT&T not only because it “has access to information that transits the nation,” but also because it maintains unique relationships with other phone and internet providers. The NSA exploits these relationships for surveillance purposes, commandeering AT&T’s massive infrastructure and using it as a platform to covertly tap into communications processed by other companies. Continue reading

Military Set for Cyber Attacks on Foreign Infrastructure

Paul Nakasone

Paul Nakasone / Getty Images

 

Cybercom nominee: U.S. intrusions in foreign networks to deter China and Russia

American military cyber warriors are ready to shut critical infrastructures in China and Russia during a future conflict by conducting cyber intrusions into their networks, according to the general set to lead Cyber Command.

Both China and Russia have been detected conducting similar cyber battlefield reconnaissance against the U.S. networks used to control critical infrastructure in the United States, including electric grids, transportation, financial, and other critical systems. Continue reading

America’s Cyber Vulnerabilities

ISTOCK.COM/MONSITJ

 

Cyber is the newest branch of warfare. Even in its baby stages, it has the potential to cripple the United States.

On the afternoon of Dec. 23, 2015, Ukrainian engineers from a Prykarpattya Oblenergo power station stared at a computer screen while the cursor progressed on its own across the monitor. The mouse on the table had not moved. But the cursor hovered over the station’s breakers, each one controlling power to thousands of Ukrainian citizens. Then, with one mouse click at a time, the hackers now in control of the power station began shutting off power to hundreds of thousands of Ukrainians.

At the same time, Kyivoblenergo employees watched as dozens of substations shut down, one by one. In their case, there was no phantom mouse. A computer on their network that they could not locate was being used by someone to shut down the power—and there was nothing they could do. Continue reading

How Russia and others use cybercriminals as proxies

Employees watch electronic boards monitoring possible ransomware cyberattacks at the Korea Internet and Security Agency in Seoul. (Yun Dong-jin/Yonhap/AP)

 

US adversaries are offering cyber criminals a bargain: Use your talents for spy agencies, in exchange for legal immunity. One such cybercriminal was involved in the 2016 US election interference.

JUNE 28, 2017 It had taken American prosecutors a long time to hand down the indictment, but finally they had their man. In 2013, authorities had tracked down Alexsey Belan, a notorious Russia-linked cyber criminal, and were getting ready to extradite him to the United States.

But Mr. Belan, a Latvian-born hacker wanted by the FBI for launching assaults on US networks using thousands of hacked computers, slipped from the clutches of European law-enforcement agents. Continue reading

Killing C.I.A. Informants, China Crippled U.S. Spying Operations

An honor guard outside the Great Hall of the People in Beijing last month. The Chinese government killed or imprisoned 18 to 20 C.I.A sources from 2010 through 2012. Credit Wang Zhao/Agence France-Presse — Getty Images

 

WASHINGTON — The Chinese government systematically dismantled C.I.A. spying operations in the country starting in 2010, killing or imprisoning more than a dozen sources over two years and crippling intelligence gathering there for years afterward.

Current and former American officials described the intelligence breach as one of the worst in decades. It set off a scramble in Washington’s intelligence and law enforcement agencies to contain the fallout, but investigators were bitterly divided over the cause. Some were convinced that a mole within the C.I.A. had betrayed the United States. Others believed that the Chinese had hacked the covert system the C.I.A. used to communicate with its foreign sources. Years later, that debate remains unresolved.

But there was no disagreement about the damage. From the final weeks of 2010 through the end of 2012, according to former American officials, the Chinese killed at least a dozen of the C.I.A.’s sources. According to three of the officials, one was shot in front of his colleagues in the courtyard of a government building — a message to others who might have been working for the C.I.A. Continue reading

Chinese Supercomputers Threaten U.S. Security

One part of where this article goes wrong is the first opening sentence, as China has already eclipsed the United States in supercomputer technology.

However, at least Americans know who they can thank for giving China their threatening capability: Bill and Hillary Clinton through the U.S. Department of Commerce.

Another component of the problem is that the American security apparatus believes in the simple ‘patch and pray‘ fix due to high costs. In other words, they’re also reactive and not proactive… a grave difference.

 

Supercomputers play a vital role in the design, development and analysis of almost all modern weapons systems, said a report by the National Security Agency-Energy Department based on an assessment of China’s new supercomputer called the TaihuLight. Photo by: David Mercer

 

China is eclipsing the United States in developing high-speed supercomputers used to build advanced weapons, and the loss of American leadership in the field poses a threat to U.S. national security.

That’s the conclusion of a recent joint National Security Agency-Energy Department study, based on an assessment of China’s new supercomputer called the TaihuLight.

National security requires the best computing available, and loss of leadership in [high-performance computing] will severely compromise our national security,” the report warns. Continue reading

Obama is the Deep State’s Achilles Heel

Want to drain the swamp? Expose Barack Obama, who he really is and the damage he has done.

Let’s start with President Trump’s allegation that the Obama Administration wiretapped the Trump Tower in October of 2016.

In summary, here is what we know.

In June 2016, the Obama Administration, using flimsy evidence of Russian connections to the Trump campaign, made an initial request for electronic surveillance of Trump and his associates under the Foreign Intelligence Surveillance Act (FISA) and its approval body the FISA court. Continue reading

NSA and CIA is the enemy of the people

 

Astute students of history understand that government agencies often further their own interests and not the administration they are designated to serve. Seldom is the genuine national security advanced when bureaucrats pledge their loyalty to their respective fiefdoms of projecting influence and power. Absent in this supremacy struggle equation is the abstract notion that state legitimacy is founded upon the will and consent of the people. Such a quaint concept does not reflect a chapter in the training manual that breeds the spooks who operate as above the law and unaccountable super spies.

Guarding signals traffic or capturing foreign communication is a logical task to protect national secrets, while gathering information on intentions and operations from adversaries. Once upon a time the National Security Agency directed the ECHELON project as a cold war network. Over the decades the functions of electronic surveillance broadened into collection on all forms of data, no matter the source or the national origin of the subject. Continue reading

Iran Renews Destructive Cyber Attacks on Saudi Arabia

AP

Tehran strategy seeks takeover of oil-rich U.S. ally

After a four-year hiatus, Iran recently resumed destructive cyber attacks against Saudi Arabia in what U.S. officials say is part of a long-term strategy by Tehran to take over the oil-rich kingdom and regional U.S. ally.

Late last month, the Saudi government warned in a notice to telecommunications companies that an Iranian-origin malicious software called Shamoon had resurfaced in cyber attacks against some 15 Saudi organizations, including government networks. Continue reading

Obama is the Source of the Coup

 

QUESTION: Do you think the leaks are a soft coup?

HF

ANSWER: The Obama administration intentionally set the stage knowing what they were doing was designed to undermine and cripple the Trump Administration. The sanctions on Putin were also intended to prevent Trump from reversing the tension created by Obama to create an international conflict. These leaks appear to be part of an intentional plot by Obama/Left to allow his supporters within the intelligence community to topple Trump if they can. Obama waited until he had just 17 days left in office to sign an executive order to expand the power of the National Security Agency (NSA) allowing it to share globally intercepted personal communications with the government’s 16 other intelligence agencies BEFORE any application of top secret or privacy protection would be attached. Obama never did this while he was in office. Whenever a politician does something like this, there is ALWAYS a hidden agenda. This Obama executive order changed everything with regard to national security that was put in place by an executive order dating back to Ronald Reagan. Obama opened the flood gates and this I personally believe was a treasonous act showing the Democrats adopted a strategy to undermine Trump from the outset and to create massive civil unrest. Continue reading

Surprise: At the End, Obama Administration Gave NSA Broad New Powers

(AP Photo/Patrick Semansky, File)

 

This story, from the Jan. 12, 2017, edition of the New York Times, was little-remarked upon at the time, but suddenly has taken on far greater significance in light of current events:

In its final days, the Obama administration has expanded the power of the National Security Agency to share globally intercepted personal communications with the government’s 16 other intelligence agencies before applying privacy protections.

The new rules significantly relax longstanding limits on what the N.S.A. may do with the information gathered by its most powerful surveillance operations, which are largely unregulated by American wiretapping laws. These include collecting satellite transmissions, phone calls and emails that cross network switches abroad, and messages between people abroad that cross domestic network switches.

The change means that far more officials will be searching through raw data. Essentially, the government is reducing the risk that the N.S.A. will fail to recognize that a piece of information would be valuable to another agency, but increasing the risk that officials will see private information about innocent people. Continue reading

The Real Russian Mole Inside NSA

https://nyoobserver.files.wordpress.com/2016/08/gettyimages-507340074.jpg?w=526&h=350

A helicopter view of the National Security Agency January 28, 2016 in Fort Meade, Maryland. (Photo: BRENDAN SMIALOWSKI/AFP/Getty Images)

 

The media has finally noticed that the National Security Agency has a problem with Kremlin penetration

Moles—that is, long-term penetration agents—are every intelligence service’s worst nightmare. Though rarer in reality than in spy movies and novels, moles exist and can do enormous damage to a country’s secrets and espionage capabilities. They’re what keep counterintelligence experts awake at night.

The recent appearance on the Internet of top secret hacking tools from the National Security Agency has shined yet another unwanted spotlight on that hard-luck agency, which has been reeling for three years from Edward Snowden’s defection to Moscow after stealing more than a million classified documents from NSA. As I explained, this latest debacle was not a “hack”—rather, it’s a clear sign that the agency has a mole.

Of course, I’ve been saying that for years. It’s not exactly a secret that NSA has one or more Russian moles in its ranks—not counting Snowden. Now the mainstream media has taken notice and we have the “another Snowden” meme upon us. Continue reading

EXCLUSIVE – NSA Whistleblower: Agency Has All of Clinton’s Deleted Emails

 

PHILADELPHIA – The National Security Agency (NSA) has “all” of Hillary Clinton’s deleted emails and the FBI could gain access to them if they so desired, William Binney, a former highly placed NSA official, declared in a radio interview broadcast on Sunday.

Speaking as an analyst, Binney raised the possibility that the hack of the Democratic National Committee’s server was done not by Russia but by a disgruntled U.S. intelligence worker concerned about Clinton’s compromise of national security secrets via her personal email use.

Binney was an architect of the NSA’s surveillance program. He became a famed whistleblower when he resigned on October 31, 2001, after spending more than 30 years with the agency. Continue reading