America’s Cyber Vulnerabilities

ISTOCK.COM/MONSITJ

 

Cyber is the newest branch of warfare. Even in its baby stages, it has the potential to cripple the United States.

On the afternoon of Dec. 23, 2015, Ukrainian engineers from a Prykarpattya Oblenergo power station stared at a computer screen while the cursor progressed on its own across the monitor. The mouse on the table had not moved. But the cursor hovered over the station’s breakers, each one controlling power to thousands of Ukrainian citizens. Then, with one mouse click at a time, the hackers now in control of the power station began shutting off power to hundreds of thousands of Ukrainians.

At the same time, Kyivoblenergo employees watched as dozens of substations shut down, one by one. In their case, there was no phantom mouse. A computer on their network that they could not locate was being used by someone to shut down the power—and there was nothing they could do. Continue reading

How Russia and others use cybercriminals as proxies

Employees watch electronic boards monitoring possible ransomware cyberattacks at the Korea Internet and Security Agency in Seoul. (Yun Dong-jin/Yonhap/AP)

 

US adversaries are offering cyber criminals a bargain: Use your talents for spy agencies, in exchange for legal immunity. One such cybercriminal was involved in the 2016 US election interference.

JUNE 28, 2017 It had taken American prosecutors a long time to hand down the indictment, but finally they had their man. In 2013, authorities had tracked down Alexsey Belan, a notorious Russia-linked cyber criminal, and were getting ready to extradite him to the United States.

But Mr. Belan, a Latvian-born hacker wanted by the FBI for launching assaults on US networks using thousands of hacked computers, slipped from the clutches of European law-enforcement agents. Continue reading

Killing C.I.A. Informants, China Crippled U.S. Spying Operations

An honor guard outside the Great Hall of the People in Beijing last month. The Chinese government killed or imprisoned 18 to 20 C.I.A sources from 2010 through 2012. Credit Wang Zhao/Agence France-Presse — Getty Images

 

WASHINGTON — The Chinese government systematically dismantled C.I.A. spying operations in the country starting in 2010, killing or imprisoning more than a dozen sources over two years and crippling intelligence gathering there for years afterward.

Current and former American officials described the intelligence breach as one of the worst in decades. It set off a scramble in Washington’s intelligence and law enforcement agencies to contain the fallout, but investigators were bitterly divided over the cause. Some were convinced that a mole within the C.I.A. had betrayed the United States. Others believed that the Chinese had hacked the covert system the C.I.A. used to communicate with its foreign sources. Years later, that debate remains unresolved.

But there was no disagreement about the damage. From the final weeks of 2010 through the end of 2012, according to former American officials, the Chinese killed at least a dozen of the C.I.A.’s sources. According to three of the officials, one was shot in front of his colleagues in the courtyard of a government building — a message to others who might have been working for the C.I.A. Continue reading

Chinese Supercomputers Threaten U.S. Security

One part of where this article goes wrong is the first opening sentence, as China has already eclipsed the United States in supercomputer technology.

However, at least Americans know who they can thank for giving China their threatening capability: Bill and Hillary Clinton through the U.S. Department of Commerce.

Another component of the problem is that the American security apparatus believes in the simple ‘patch and pray‘ fix due to high costs. In other words, they’re also reactive and not proactive… a grave difference.

 

Supercomputers play a vital role in the design, development and analysis of almost all modern weapons systems, said a report by the National Security Agency-Energy Department based on an assessment of China’s new supercomputer called the TaihuLight. Photo by: David Mercer

 

China is eclipsing the United States in developing high-speed supercomputers used to build advanced weapons, and the loss of American leadership in the field poses a threat to U.S. national security.

That’s the conclusion of a recent joint National Security Agency-Energy Department study, based on an assessment of China’s new supercomputer called the TaihuLight.

National security requires the best computing available, and loss of leadership in [high-performance computing] will severely compromise our national security,” the report warns. Continue reading

Obama is the Deep State’s Achilles Heel

Want to drain the swamp? Expose Barack Obama, who he really is and the damage he has done.

Let’s start with President Trump’s allegation that the Obama Administration wiretapped the Trump Tower in October of 2016.

In summary, here is what we know.

In June 2016, the Obama Administration, using flimsy evidence of Russian connections to the Trump campaign, made an initial request for electronic surveillance of Trump and his associates under the Foreign Intelligence Surveillance Act (FISA) and its approval body the FISA court. Continue reading

NSA and CIA is the enemy of the people

 

Astute students of history understand that government agencies often further their own interests and not the administration they are designated to serve. Seldom is the genuine national security advanced when bureaucrats pledge their loyalty to their respective fiefdoms of projecting influence and power. Absent in this supremacy struggle equation is the abstract notion that state legitimacy is founded upon the will and consent of the people. Such a quaint concept does not reflect a chapter in the training manual that breeds the spooks who operate as above the law and unaccountable super spies.

Guarding signals traffic or capturing foreign communication is a logical task to protect national secrets, while gathering information on intentions and operations from adversaries. Once upon a time the National Security Agency directed the ECHELON project as a cold war network. Over the decades the functions of electronic surveillance broadened into collection on all forms of data, no matter the source or the national origin of the subject. Continue reading

Iran Renews Destructive Cyber Attacks on Saudi Arabia

AP

Tehran strategy seeks takeover of oil-rich U.S. ally

After a four-year hiatus, Iran recently resumed destructive cyber attacks against Saudi Arabia in what U.S. officials say is part of a long-term strategy by Tehran to take over the oil-rich kingdom and regional U.S. ally.

Late last month, the Saudi government warned in a notice to telecommunications companies that an Iranian-origin malicious software called Shamoon had resurfaced in cyber attacks against some 15 Saudi organizations, including government networks. Continue reading

Obama is the Source of the Coup

 

QUESTION: Do you think the leaks are a soft coup?

HF

ANSWER: The Obama administration intentionally set the stage knowing what they were doing was designed to undermine and cripple the Trump Administration. The sanctions on Putin were also intended to prevent Trump from reversing the tension created by Obama to create an international conflict. These leaks appear to be part of an intentional plot by Obama/Left to allow his supporters within the intelligence community to topple Trump if they can. Obama waited until he had just 17 days left in office to sign an executive order to expand the power of the National Security Agency (NSA) allowing it to share globally intercepted personal communications with the government’s 16 other intelligence agencies BEFORE any application of top secret or privacy protection would be attached. Obama never did this while he was in office. Whenever a politician does something like this, there is ALWAYS a hidden agenda. This Obama executive order changed everything with regard to national security that was put in place by an executive order dating back to Ronald Reagan. Obama opened the flood gates and this I personally believe was a treasonous act showing the Democrats adopted a strategy to undermine Trump from the outset and to create massive civil unrest. Continue reading

Surprise: At the End, Obama Administration Gave NSA Broad New Powers

(AP Photo/Patrick Semansky, File)

 

This story, from the Jan. 12, 2017, edition of the New York Times, was little-remarked upon at the time, but suddenly has taken on far greater significance in light of current events:

In its final days, the Obama administration has expanded the power of the National Security Agency to share globally intercepted personal communications with the government’s 16 other intelligence agencies before applying privacy protections.

The new rules significantly relax longstanding limits on what the N.S.A. may do with the information gathered by its most powerful surveillance operations, which are largely unregulated by American wiretapping laws. These include collecting satellite transmissions, phone calls and emails that cross network switches abroad, and messages between people abroad that cross domestic network switches.

The change means that far more officials will be searching through raw data. Essentially, the government is reducing the risk that the N.S.A. will fail to recognize that a piece of information would be valuable to another agency, but increasing the risk that officials will see private information about innocent people. Continue reading

The Real Russian Mole Inside NSA

https://nyoobserver.files.wordpress.com/2016/08/gettyimages-507340074.jpg?w=526&h=350

A helicopter view of the National Security Agency January 28, 2016 in Fort Meade, Maryland. (Photo: BRENDAN SMIALOWSKI/AFP/Getty Images)

 

The media has finally noticed that the National Security Agency has a problem with Kremlin penetration

Moles—that is, long-term penetration agents—are every intelligence service’s worst nightmare. Though rarer in reality than in spy movies and novels, moles exist and can do enormous damage to a country’s secrets and espionage capabilities. They’re what keep counterintelligence experts awake at night.

The recent appearance on the Internet of top secret hacking tools from the National Security Agency has shined yet another unwanted spotlight on that hard-luck agency, which has been reeling for three years from Edward Snowden’s defection to Moscow after stealing more than a million classified documents from NSA. As I explained, this latest debacle was not a “hack”—rather, it’s a clear sign that the agency has a mole.

Of course, I’ve been saying that for years. It’s not exactly a secret that NSA has one or more Russian moles in its ranks—not counting Snowden. Now the mainstream media has taken notice and we have the “another Snowden” meme upon us. Continue reading

EXCLUSIVE – NSA Whistleblower: Agency Has All of Clinton’s Deleted Emails

 

PHILADELPHIA – The National Security Agency (NSA) has “all” of Hillary Clinton’s deleted emails and the FBI could gain access to them if they so desired, William Binney, a former highly placed NSA official, declared in a radio interview broadcast on Sunday.

Speaking as an analyst, Binney raised the possibility that the hack of the Democratic National Committee’s server was done not by Russia but by a disgruntled U.S. intelligence worker concerned about Clinton’s compromise of national security secrets via her personal email use.

Binney was an architect of the NSA’s surveillance program. He became a famed whistleblower when he resigned on October 31, 2001, after spending more than 30 years with the agency. Continue reading

Edward Snowden is a Russian Agent

And now we know how Snowden ‘learned’ Russian so quickly.

The American people have been fooled for some time now, however, because of his track record it’s what we’ve known for a while here on Global Geopolitics. Because of him, what’s left of the intelligence community has been set back at least 20 years.

It’s clear to see he works for the other side:

Edward Snowden Is Acting Very Strange Inside Russia

Former KGB Agent Claims That Anna Chapman Tried to Seduce Edward Snowden

Edward Snowden was targeted by Russian spies 6 years BEFORE he exposed US secrets

Edward Snowden Seeking to Join KGB Veterans Group

Britain pulls spies as Moscow cracks Snowden files: reports

NSA Director: Snowden’s Leaks Helped Terrorists Avoid Tracking

DOD official: Snowden ‘stole everything — literally everything’

NSA Leaker “Outed” as Russian Agent

 

https://i1.wp.com/bilder.bild.de/fotos-skaliert/auf-verschiedenen-konferenzen-wie-hier-2014-wurde-snowden-aus-moskau-zugeschaltet-43256710-46237222/2,c=0,h=554.bild.jpg

Foto: AFP

 

Note: For documentation purposes, the entire article will remain here, in both English und auf Deutsch.

 

Three years after Edward Snowden, the American IT contractor turned global celebrity, made his media debut in Hong Kong, the truth of what really happened in this sensational affair remains elusive. The outline is clear. Snowden left his job in Hawaii with the National Security Agency in May 2013 and appeared at Hong Kong’s Mira Hotel on June 1, having made off with more than a million classified intelligence documents belonging to the American government. A few days later, Snowden appeared on camera to announce that he was lifting the top secret mask off NSA, America’s biggest and most secretive intelligence service.

Yet significant questions remain. Where was Snowden from 21 to 31 May 2013? His whereabouts in that period are unknown. Why did he choose to repeatedly visit the Russian consulate in Hong Kong, even celebrating his 30th birthday there? What did those visits have to do with his departure for Moscow on June 23rd? Last, why has Snowden never left Russia, three years after his arrival? Continue reading

Clinton Foundation Said to Be Breached by Russian Hackers

The Bill, Hillary and Chelsea Clinton Foundation was among the organizations breached by suspected Russian hackers in a dragnet of the U.S. political apparatus ahead of the November election, according to three people familiar with the matter.

The attacks on the foundation’s network, as well as those of the Democratic Party and Hillary Clinton’s presidential campaign, compound concerns about her digital security even as the FBI continues to investigate her use of a personal e-mail server while she was secretary of state.

Clinton Foundation officials said the organization hadn’t been notified of the breach and declined to comment further. The compromise of the foundation’s computers was first identified by government investigators as recently as last week, the people familiar with the matter said. Agents monitor servers used by hackers to communicate with their targets, giving them a back channel view of attacks, often even before the victims detect them. Continue reading

FBI Warns of Cyber Threat to Electric Grid

DHS intel report downplayed cyber threat to power grid

Three months after a Department of Homeland Security intelligence report downplayed the threat of a cyber attack against the U.S. electrical grid, DHS and the FBI began a nationwide program warning of the dangers faced by U.S. utilities from damaging cyber attacks like the recent hacking against Ukraine’s power grid.

The nationwide campaign by DHS and the FBI began March 31 and includes 12 briefings and online webinars for electrical power infrastructure companies and others involved in security, with sessions in eight U.S. cities, including a session next week in Washington. Continue reading

Cybercom sounds alarm on infrastructure attacks

The commander of the U.S. Cyber Command warned Congress this week that Russia and China now can launch crippling cyberattacks on the electric grid and other critical infrastructures.

“We remain vigilant in preparing for future threats, as cyberattacks could cause catastrophic damage to portions of our power grid, communications networks and vital services,” Adm. Mike Rogers, the Cyber Command chief, told a Senate hearing. “Damaging attacks have already occurred in Europe,” he stated, noting suspected Russian cyberattacks that temporarily turned out the lights in portions of Ukraine.

Adm. Rogers said that unlike other areas of military competition, Russia is equal to the United States in terms its cyberwarfare capabilities, with China a close second.

Continue reading