New Evidence Of Chinese Spy Hardware Found By Ex-Mossad Investigators; Super Micro Shares Plunge

https://www.zerohedge.com/sites/default/files/inline-images/supermicro.jpg?itok=k6VWxORv

 

A major US telecommunications company found “manipulated” hardware from Super Micro Computer Inc. in its network in August – bolstering claims in a Bloomberg report last week alleging that China installed bugging devices on hardware bought by Apple, Amazon and a host of other companies.

According to a new report by Bloomberg, the unnamed telecom company hired former Israeli Intelligence Corps security expert Yossi Appleboum, now of Maryland-based Sepio Systems, who provided “documents, analysis and other evidence of the discovery” following last week’s report detailing how China’s intelligence agencies had ordered subcontractors to install malicious chips in Super Micro motherboards between 2013 and 2015.  Continue reading

The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies

Recognition of this urgent and grave matter is finally receiving recognition by the mainstream media. Chinese microchips have been planted within every facet of U.S. life, from the military to household PC components, as well as everyday appliances such as irons and microwaves.

Further information previously archived on Global Geopolitics can be found within the following previous posts:

The Secret Ways of Chinese Telecom Giant Huawei (2013)

Security backdoor found in China-made US military chip (2012)

 

Click for a larger animated version. (Illustrator: Scott Gelber for Bloomberg Businessweek)

 

The attack by Chinese spies reached almost 30 U.S. companies, including Amazon and Apple, by compromising America’s technology supply chain, according to extensive interviews with government and corporate sources.

In 2015, Amazon.com Inc. began quietly evaluating a startup called Elemental Technologies, a potential acquisition to help with a major expansion of its streaming video service, known today as Amazon Prime Video. Based in Portland, Ore., Elemental made software for compressing massive video files and formatting them for different devices. Its technology had helped stream the Olympic Games online, communicate with the International Space Station, and funnel drone footage to the Central Intelligence Agency. Elemental’s national security contracts weren’t the main reason for the proposed acquisition, but they fit nicely with Amazon’s government businesses, such as the highly secure cloud that Amazon Web Services (AWS) was building for the CIA. Continue reading

Russian Military Spy Software is on Hundreds of Thousands of Home Routers

https://cdn.defenseone.com/media/img/upload/2018/08/13/AP_18224544149695/defense-large.jpg

Russian President Vladimir Putin and presidential spokesman Dmitry Peskov, left, attend a meeting during the 5th Caspian summit in Aktau, the Caspian Sea port in Kazakhstan, Sunday, Aug. 12, 2018. [Alexei Nikolsky, Sputnik, Kremlin Pool Photo (Via AP)]

 

In May, the Justice Department told Americans to reboot their routers. But there’s more to do — and NSA says it’s up to device makers and the public.

LAS VEGASThe Russian military is inside hundreds of thousands of routers owned by Americans and others around the world, a top U.S. cybersecurity official said on Friday. The presence of Russian malware on the routers, first revealed in May, could enable the Kremlin to steal individuals’ data or enlist their devices in a massive attack intended to disrupt global economic activity or target institutions.

On May 27, Justice Department officials asked Americans to reboot their routers to stop the attack. Afterwards, the world largely forgot about it. That’s a mistake, said Rob Joyce, senior advisor to the director of the National Security Agency and the former White House cybersecurity coordinator.

“The Russian malware is still there,” said Joyce. Continue reading

Cyber Command moves closer to a major new weapon

https://www.armytimes.com/resizer/RLZgP9H16d0iMFk8r-77ilZ6Vw8=/1200x0/filters:quality(100)/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/J3PNNQCXKNAUXK6BW3KQNOUSAE.jpg

A proposal for the next generation cyber operations platform went out to industry recently, however, details are scarce. (J.M. Eddins Jr./Air Force)

 

The Air Force issued a formal proposal earlier this month for the Department of Defense’s long-awaited cyber weapon system, known as the Unified Platform, sources tell Fifth Domain.

DoD officials have said the Unified Platform is one of U.S. Cyber Command’s largest and most critical acquisition programs to date. Industry officials have said it is necessary to conduct cyber operations and is critical to national security. Continue reading

The NSA’s Hidden Spy Hubs in Eight U.S. Cities

A VERY long read that is worth your while.

It reminds you of how well you don’t know your city if you’re living in one of these eight.

 

https://theintercept.imgix.net/wp-uploads/sites/1/2018/06/building-8-1528304243.jpg

420 South Grand Avenue, Los Angeles

 

The secrets are hidden behind fortified walls in cities across the United States, inside towering, windowless skyscrapers and fortress-like concrete structures that were built to withstand earthquakes and even nuclear attack. Thousands of people pass by the buildings each day and rarely give them a second glance, because their function is not publicly known. They are an integral part of one of the world’s largest telecommunications networks – and they are also linked to a controversial National Security Agency surveillance program.

Atlanta, Chicago, Dallas, Los Angeles, New York City, San Francisco, Seattle, and Washington, D.C. In each of these cities, The Intercept has identified an AT&T facility containing networking equipment that transports large quantities of internet traffic across the United States and the world. A body of evidence – including classified NSA documents, public records, and interviews with several former AT&T employees – indicates that the buildings are central to an NSA spying initiative that has for years monitored billions of emails, phone calls, and online chats passing across U.S. territory.

The NSA considers AT&T to be one of its most trusted partners and has lauded the company’s “extreme willingness to help.” It is a collaboration that dates back decades. Little known, however, is that its scope is not restricted to AT&T’s customers. According to the NSA’s documents, it values AT&T not only because it “has access to information that transits the nation,” but also because it maintains unique relationships with other phone and internet providers. The NSA exploits these relationships for surveillance purposes, commandeering AT&T’s massive infrastructure and using it as a platform to covertly tap into communications processed by other companies. Continue reading

Military Set for Cyber Attacks on Foreign Infrastructure

Paul Nakasone

Paul Nakasone / Getty Images

 

Cybercom nominee: U.S. intrusions in foreign networks to deter China and Russia

American military cyber warriors are ready to shut critical infrastructures in China and Russia during a future conflict by conducting cyber intrusions into their networks, according to the general set to lead Cyber Command.

Both China and Russia have been detected conducting similar cyber battlefield reconnaissance against the U.S. networks used to control critical infrastructure in the United States, including electric grids, transportation, financial, and other critical systems. Continue reading

America’s Cyber Vulnerabilities

ISTOCK.COM/MONSITJ

 

Cyber is the newest branch of warfare. Even in its baby stages, it has the potential to cripple the United States.

On the afternoon of Dec. 23, 2015, Ukrainian engineers from a Prykarpattya Oblenergo power station stared at a computer screen while the cursor progressed on its own across the monitor. The mouse on the table had not moved. But the cursor hovered over the station’s breakers, each one controlling power to thousands of Ukrainian citizens. Then, with one mouse click at a time, the hackers now in control of the power station began shutting off power to hundreds of thousands of Ukrainians.

At the same time, Kyivoblenergo employees watched as dozens of substations shut down, one by one. In their case, there was no phantom mouse. A computer on their network that they could not locate was being used by someone to shut down the power—and there was nothing they could do. Continue reading

How Russia and others use cybercriminals as proxies

Employees watch electronic boards monitoring possible ransomware cyberattacks at the Korea Internet and Security Agency in Seoul. (Yun Dong-jin/Yonhap/AP)

 

US adversaries are offering cyber criminals a bargain: Use your talents for spy agencies, in exchange for legal immunity. One such cybercriminal was involved in the 2016 US election interference.

JUNE 28, 2017 It had taken American prosecutors a long time to hand down the indictment, but finally they had their man. In 2013, authorities had tracked down Alexsey Belan, a notorious Russia-linked cyber criminal, and were getting ready to extradite him to the United States.

But Mr. Belan, a Latvian-born hacker wanted by the FBI for launching assaults on US networks using thousands of hacked computers, slipped from the clutches of European law-enforcement agents. Continue reading

Killing C.I.A. Informants, China Crippled U.S. Spying Operations

An honor guard outside the Great Hall of the People in Beijing last month. The Chinese government killed or imprisoned 18 to 20 C.I.A sources from 2010 through 2012. Credit Wang Zhao/Agence France-Presse — Getty Images

 

WASHINGTON — The Chinese government systematically dismantled C.I.A. spying operations in the country starting in 2010, killing or imprisoning more than a dozen sources over two years and crippling intelligence gathering there for years afterward.

Current and former American officials described the intelligence breach as one of the worst in decades. It set off a scramble in Washington’s intelligence and law enforcement agencies to contain the fallout, but investigators were bitterly divided over the cause. Some were convinced that a mole within the C.I.A. had betrayed the United States. Others believed that the Chinese had hacked the covert system the C.I.A. used to communicate with its foreign sources. Years later, that debate remains unresolved.

But there was no disagreement about the damage. From the final weeks of 2010 through the end of 2012, according to former American officials, the Chinese killed at least a dozen of the C.I.A.’s sources. According to three of the officials, one was shot in front of his colleagues in the courtyard of a government building — a message to others who might have been working for the C.I.A. Continue reading

Chinese Supercomputers Threaten U.S. Security

One part of where this article goes wrong is the first opening sentence, as China has already eclipsed the United States in supercomputer technology.

However, at least Americans know who they can thank for giving China their threatening capability: Bill and Hillary Clinton through the U.S. Department of Commerce.

Another component of the problem is that the American security apparatus believes in the simple ‘patch and pray‘ fix due to high costs. In other words, they’re also reactive and not proactive… a grave difference.

 

Supercomputers play a vital role in the design, development and analysis of almost all modern weapons systems, said a report by the National Security Agency-Energy Department based on an assessment of China’s new supercomputer called the TaihuLight. Photo by: David Mercer

 

China is eclipsing the United States in developing high-speed supercomputers used to build advanced weapons, and the loss of American leadership in the field poses a threat to U.S. national security.

That’s the conclusion of a recent joint National Security Agency-Energy Department study, based on an assessment of China’s new supercomputer called the TaihuLight.

National security requires the best computing available, and loss of leadership in [high-performance computing] will severely compromise our national security,” the report warns. Continue reading

Obama is the Deep State’s Achilles Heel

Want to drain the swamp? Expose Barack Obama, who he really is and the damage he has done.

Let’s start with President Trump’s allegation that the Obama Administration wiretapped the Trump Tower in October of 2016.

In summary, here is what we know.

In June 2016, the Obama Administration, using flimsy evidence of Russian connections to the Trump campaign, made an initial request for electronic surveillance of Trump and his associates under the Foreign Intelligence Surveillance Act (FISA) and its approval body the FISA court. Continue reading

NSA and CIA is the enemy of the people

 

Astute students of history understand that government agencies often further their own interests and not the administration they are designated to serve. Seldom is the genuine national security advanced when bureaucrats pledge their loyalty to their respective fiefdoms of projecting influence and power. Absent in this supremacy struggle equation is the abstract notion that state legitimacy is founded upon the will and consent of the people. Such a quaint concept does not reflect a chapter in the training manual that breeds the spooks who operate as above the law and unaccountable super spies.

Guarding signals traffic or capturing foreign communication is a logical task to protect national secrets, while gathering information on intentions and operations from adversaries. Once upon a time the National Security Agency directed the ECHELON project as a cold war network. Over the decades the functions of electronic surveillance broadened into collection on all forms of data, no matter the source or the national origin of the subject. Continue reading

Iran Renews Destructive Cyber Attacks on Saudi Arabia

AP

Tehran strategy seeks takeover of oil-rich U.S. ally

After a four-year hiatus, Iran recently resumed destructive cyber attacks against Saudi Arabia in what U.S. officials say is part of a long-term strategy by Tehran to take over the oil-rich kingdom and regional U.S. ally.

Late last month, the Saudi government warned in a notice to telecommunications companies that an Iranian-origin malicious software called Shamoon had resurfaced in cyber attacks against some 15 Saudi organizations, including government networks. Continue reading

Obama is the Source of the Coup

 

QUESTION: Do you think the leaks are a soft coup?

HF

ANSWER: The Obama administration intentionally set the stage knowing what they were doing was designed to undermine and cripple the Trump Administration. The sanctions on Putin were also intended to prevent Trump from reversing the tension created by Obama to create an international conflict. These leaks appear to be part of an intentional plot by Obama/Left to allow his supporters within the intelligence community to topple Trump if they can. Obama waited until he had just 17 days left in office to sign an executive order to expand the power of the National Security Agency (NSA) allowing it to share globally intercepted personal communications with the government’s 16 other intelligence agencies BEFORE any application of top secret or privacy protection would be attached. Obama never did this while he was in office. Whenever a politician does something like this, there is ALWAYS a hidden agenda. This Obama executive order changed everything with regard to national security that was put in place by an executive order dating back to Ronald Reagan. Obama opened the flood gates and this I personally believe was a treasonous act showing the Democrats adopted a strategy to undermine Trump from the outset and to create massive civil unrest. Continue reading

Surprise: At the End, Obama Administration Gave NSA Broad New Powers

(AP Photo/Patrick Semansky, File)

 

This story, from the Jan. 12, 2017, edition of the New York Times, was little-remarked upon at the time, but suddenly has taken on far greater significance in light of current events:

In its final days, the Obama administration has expanded the power of the National Security Agency to share globally intercepted personal communications with the government’s 16 other intelligence agencies before applying privacy protections.

The new rules significantly relax longstanding limits on what the N.S.A. may do with the information gathered by its most powerful surveillance operations, which are largely unregulated by American wiretapping laws. These include collecting satellite transmissions, phone calls and emails that cross network switches abroad, and messages between people abroad that cross domestic network switches.

The change means that far more officials will be searching through raw data. Essentially, the government is reducing the risk that the N.S.A. will fail to recognize that a piece of information would be valuable to another agency, but increasing the risk that officials will see private information about innocent people. Continue reading