Report: The British Crown is Connected to Russian Money Laundering Network

https://image.zype.com/593087b25d3c19148e001735/5c7f044579922f125200e836/custom_thumbnail/1080.jpg

(Photo Credit: United Nations)

 

The report details how billions of dollars in cash have been funneled through offshore companies to disguise their original sources.

London’s The Guardian newspaper has published an expose detailing how a charity run by Prince Charles has received donations from an offshore company that funneled $4.6 billion in cash from Russia.

The report states that money flowing through the network is linked to “some of the most notorious frauds committed during Vladimir Putin’s presidency.” It notes that more than 1.3 million transactions have been identified by the Organized Crime and Corruption Reporting Project as the result of one of the largest bank record leaks in history. Continue reading

Inner circle staffer Katie Walsh named as White House leaker

According to GotNews Katie Walsh is one of the White House leakers, and President Trump has used her to expose the whole network.

(FRESNO, CA) White House Deputy Chief of Staff and #NeverTrump Republican Katie Walsh has been identified as the source behind a bunch of leaks from the Trump administration to The New York Times and other media outlets, according to multiple sources in the White House, media, donor community, and pro-Trump 501(c)4 political group.

“Everyone knows not to talk to her in the White House unless you want to see it in the press,” says a source close to the president. “The only question is whether or not she’s doing it at the behest of [White House Chief of Staff] Reince Priebus or if she’s doing it to advance herself in DC media circles.” Continue reading

Georgia’s secretary of state: DHS tried to breach our firewall

Georgia’s secretary of state has claimed the Department of Homeland Security tried to breach his office’s firewall and has issued a letter to Homeland Security Secretary Jeh Johnson asking for an explanation.

Brian Kemp issued a letter to Johnson on Thursday after the state’s third-party cybersecurity provider detected an IP address from the agency’s Southwest D.C. office trying to penetrate the state’s firewall. According to the letter, the attempt was unsuccessful.   Continue reading

SCADA malware discovered in European energy company

For more information on this vulnerability, please refer to the SCADA/SCADAs tags.

A new piece of industrial control malware has been discovered. Dubbed SFG, Sentinel One Labs discovered the piece on the information networks of a yet-unnamed European energy company.

It appears quite sophisticated. It not only collects information on the infected system but opens a backdoor through which a destructive payload could be launched, “to potentially shut down an energy grid”. Continue reading

China Plans to Launch Own International Payment System by 2016

China will continue to loosen restrictions on private capital access to the financial sector, Prime Minister Li Keqiang said.

DALIAN (Sputnik) — China plans to launch its own international payment system later this year, the country’s prime minister, Li Keqiang, said on Thursday. Continue reading

US spies voiced concerns about Fed database prior to massive hack

Until a few years ago, however, Scattered Castles, the database containing security clearance applications for the US Intelligence Community, was not connected to the OPM database. But in 2010, new legislation aiming to eliminate the growing backlog in processing security-clearance applications required that Scattered Castles be merged with the OPM database. The proposed move, which aimed to create a unified system for processing security clearances made sense in terms of eliminating bureaucratic overlap and reducing duplication within the federal apparatus. Continue reading

The biggest heist of secret US personnel data in cyber history is still ongoing

As was mentioned just the other day, all U.S. intelligence agencies have been compromised in addition to all other government entities that were attacked.

 

The White House has admitted that systems containing deeply personal information, submitted by current, former and prospective federal government employees for security clearances, had been “exfiltrated.” If the breach of the Office of Personnel Management (OPM) was conducted by hackers linked to China, as suspected, access to the Standard Form 86 submitted by an estimated 41 million federal employees provided them with what may be the world’s largest stolen data base of US intelligence and military personnel.

This is a “gold mine” of unencrypted data that leave US intelligence officers, for example, open to blackmail or coerced recruitment.

While officials speak of two hacks, debkafile’s cyber security and intelligence experts report that it was a single breach and is still ongoing. Known to experts as an “Advanced Persistent Threat,” it amounts to slow, continuous penetration by a computer virus, planted in an individual computer of a network which duplicates itself gradually and insidiously. Continue reading

The New German Arrogance (II)

Germany knows controlling the flow of information is key, therefore it is now capturing the cyber realm. This, plus taking steps towards an EU Army, forcing further integration of EU member states and turning them into vassal states (i.e. Cyprus) are all key actions/characteristics of a nation striving to be a world superpower. Germany is now directly competing against the United States. The Fourth Reich has (almost) landed.

 

BERLIN/WASHINGTON/VIENNA (Own report) – In cooperation with NSA, a US military intelligence service, the German Federal Intelligence Service (BND) has massively intercepted and stored emails from Austria, Luxembourg and the Czech Republic. This became evident through an internal email from an employee of the Deutsche Telekom AG, responsible for cooperation with the intelligence service and police. According to the email, published by the Austrian parliamentarian Peter Pilz, Telekom, already in early February 2005, had given a green light to the BND having access to a fiber optic cable for internet communication connecting Luxembourg to Austria and numerous other countries. At the time, Frank-Walter Steinmeier (SPD), as Head of the Federal Chancellery, bore the highest responsibility for the activities of the BND. According to reports, Austria’s domestic intelligence was also being tapped. Whoever is cognizant of this communication, knows “almost everything about the Republic’s political life,” summarized Pilz. The governments concerned have raised no serious protests, in the Germany-dominated EU. The German government is continuing the BND’s technological upgrading, aimed ultimately toward raising German espionage “to an equal footing” with the NSA – also in internet spying.

Continue reading

Iran Hackers Target Airlines, Energy, Defense Companies

BOSTON (Reuters) – Iranian hackers have infiltrated major airlines, energy companies, and defense firms around the globe over the past two years in a campaign that could eventually cause physical damage, according to U.S. cyber security firm Cylance.

The report comes as governments scramble to better understand the extent of Iran’s cyber capabilities, which researchers say have grown rapidly as Tehran seeks to retaliate for Western cyber attacks on its nuclear program.

“We believe that if the operation is left to continue unabated, it is only a matter of time before the team impacts the world’s physical safety,” Cylance said in an 87-page report on the hacking campaign released on Tuesday. Continue reading

This Is Not a Test: Emergency Broadcast Systems Proved Hackable

As was written in a book ahead of it’s time (1987), “Spetsnaz. The Story Behind the Soviet SAS”, has now come to fruition.

The following is a sample from the book:

I do not know how or when World War Three will start. I do not know exactly how the Soviet high command plans to make use of spetsnaz in that war: the first world war in which spetsnaz will be a major contributor. I do not wish to predict the future. In this chapter I shall describe how spetsnaz will be used at the beginning of that war as I imagine it. It is not my task to describe what will happen. But I can describe what might happen.

The last month of peace, as in other wars, has an almost palpable air of crisis about it. Incidents, accidents, small disasters add to the tension. Two trains collide on a railway bridge in Cologne because the signalling system is out of order. The bridge is seriously damaged and there can be no traffic over it for the next two months.

On 12 August, at 0558 local time, a van comes to a halt on the vast empty parking lot in front of a supermarket in Washington. Three men open the doors of the van, roll out the fuselage of a light aircraft and attach its wings. A minute later its motor bursts into life. The plane takes off and disappears into the sky. It has no pilot. It is controlled by radio with the aid of very simple instruments, only slightly more complicated than those used by model aircraft enthusiasts. The plane climbs to about 200 metres and immediately begins to descend in the direction of the White House. A minute later a mighty explosion shakes the capital of the United States. The screaming of sirens on police cars, fire engines and ambulances fills the city.

Three minutes later a second plane sweeps across the centre of the city and there is a second explosion in the place where the White House once stood. The second plane has taken off from a section of highway under construction, and has a quite different control system. Two cars with radio beacons in them have been left earlier in the middle of the city. The beacons have switched on automatically a few seconds before the plane’s take-off. The automatic pilot is guided by the two beacons and starts to descend according to a previously worked-out trajectory. The second plane has been sent off by a second group operating independently of the first one.

It was a simple plan: if the first plane did not destroy the White House the second would. If the first plane did destroy the White House then a few minutes later all the heads of the Washington police would be near where the explosion had taken place. The second plane would kill many of them.

At 0606 all radio and television channels interrupt their normal programmes and report the destruction of the White House and the possible death of the President of the United States.

At 0613 the programme known as Good Morning America is interrupted and the Vice-President of the USA appears. He announces a staggering piece of news: there has been an attempt to seize power in the country on the part of the leaders of the armed forces. The President of the United States has been killed. The Vice-President appeals to everyone in the armed forces to remain where they are and not to carry out any orders from senior officers for the next twenty-four hours, because the orders would be issued by traitors shortly to be removed from their posts and arrested.

Soon afterwards many television channels across the country cease transmitting….

Article:

Several models of Emergency Alert System decoders, used to break into TV and radio broadcasts to announce public safety warnings, have vulnerabilities that would allow hackers to hijack them and deliver fake messages to the public, according to an announcement by a security firm on Monday.

The vulnerabilities included a private root SSH key that was distributed in publicly available firmware images that would have allowed an attacker with SSH access to a device to log in with root privileges and issue fake alerts or disable the system. Continue reading

The Network for America’s Nuclear Arsenal Is Falling Apart And Making The Air Force Uncomfortable

The head of U.S. Strategic Command said that the command, control and communications component of the nation’s nuclear force is in need of improvement, as reported by the Air Force Times.

Air Force Gen. Robert Kehler told the Senate Armed Services Committee that he is uncomfortable with the network.

Updating the system has been problematic after the newest military communications satellite suffered a near-devastating malfunction.

Full article: The Network for America’s Nuclear Arsenal Is Falling Apart And Making The Air Force Uncomfortable (Business Insider)