Author Topic: Cyberwar, Cyber Crime, and American Freedom  (Read 254873 times)

G M

  • Power User
  • ***
  • Posts: 26643
    • View Profile
Ishmael Jones: From Russia with doubt
« Reply #400 on: January 05, 2017, 07:59:23 PM »
http://www.powerlineblog.com/archives/2017/01/ishmael-jones-from-russia-with-doubt.php

 Posted on January 5, 2017 by Scott Johnson in Intelligence, Russia

Ishmael Jones: From Russia with doubt

The pseudonymous Ishmael Jones is a former CIA case officer and author of The Human Factor: Inside the CIA’s Dysfunctional Intelligence Culture. He writes with a timely comment on the current intelligence controversy that is reaching a fever pitch. Mr. Jones advises that his commentary has been reviewed and approved by the CIA’s publications review board. He writes:

CIA intelligence reporting stating that the Russian government hacked the presidential election in order to elect Donald Trump is false. It is merely a political attack against Donald Trump with the goal of delegitimizing his presidency.

The depth and quality of the CIA reporting are too good to be true. A December 16 NBC report states, for example: “Putin personally directed how hacked material from Democrats was leaked and otherwise used.” Everyone knows that a great deal of hacking comes out of Russia. But evidence of hacking does not lead to the conclusion that there was a Russian government conspiracy to get Mr. Trump elected.

Such a conclusion would require access to Putin’s inner circle and knowledge of Putin’s plans and intentions. Any spy that close to Putin would be one of the best intelligence sources of all time.

If such a source existed, he doesn’t exist any more. The leaked reporting would have put him in grave danger, and he would already have been imprisoned or executed.

The reporting instead reflects the political opinions and agendas of bureaucrats. CIA bureaucrats are a big blue voting machine with a long record of creating information harmful to Republican presidents. The danger to Mr. Trump is ratcheted up because the recent election influenced many people at the CIA to believe that Trump is the second coming of Hitler. And to stop Hitler, anything is ethical, even treason. CIA bureaucrats have chosen to attack Mr. Trump before he even takes office.

The CIA is meant to spy upon foreign countries. The secrets we seek are located in foreign countries. Yet the bloated CIA bureaucracy exists almost entirely within the United States. CIA bureaucrats appear to find foreign service disagreeable. They enjoy their lifestyle and will fight with aggressive passivity to keep it that way. More than 90% of CIA employees spend their careers living and working entirely within the United States.

James Bond would periodically come in from the field to report to the chief of British intelligence, “M.” On the way into M’s office he would joke around with M’s secretary, Miss Moneypenny.

When I reported to CIA Headquarters, there were thousands of these people – thousands of M’s and thousands of Miss Moneypennys. The CIA cafeteria looks like a great herd grazing peacefully upon the plains.

The incoming CIA chief, Mike Pompeo, will be astonished by how many of his senior leaders have not had an overseas assignment in decades. Brief junkets and TDY’s to foreign countries do not count. CIA boss John Brennan’s 40-plus years of CIA service have occurred almost entirely within the Headquarters building. During a 20-year career, the Left’s favorite spy, Valerie Plame, spent less than two and a half years in foreign operational assignments, mostly during an initial tour in Europe.

The CIA has a military origin, and in the military, huge staffs are required for planning and logistics. There are relatively few actual fighting infantrymen – at the point of the spear – because to send that infantryman to combat requires support from tanks, artillery, aircraft and so on, which need massive expenditure and meticulous planning. The CIA has the massive expenditure and the huge staffs, but the CIA’s equivalent of the infantryman is the case officer, and the best case officers require only a passport and an airline ticket to get half a world away and produce.

Michael Morell, author of the New York Times op-ed column “I Ran the CIA. Now I’m Endorsing Hillary Clinton” inhabited the Washington, D.C., area for nearly all of his 33 years in the CIA. In the article, he writes: “I will do everything I can to ensure she is elected.”

While at the CIA, Morell’s top goal was to promote greater inclusiveness and diversity. The CIA has come a long way since the days of the polygraph question, “Have you ever held another man’s penis in your hand?” Today we have more employees working in encouraging diversity and, as of recently, more transgender employees than we do case officers operating under cover in Russia, China, Libya, Syria, Yemen, Iran, and North Korea combined. We should try to do both. Let’s be dedicated to diversity and also spy on our enemies.

Mr. Pompeo’s staff may wish to contact the staff of former CIA chief Porter Goss. Goss was the last Republican appointee to attempt change at the CIA and his staff will be able to provide valuable insights, especially former staffer Patrick Murray

Gritty foreign countries with their strange ways and pungent smells are not the only reason for bureaucrats to live in the United States. CIA Headquarters is also the place to make deals. Fighting fraud will be a real challenge to Mr. Pompeo. Most bureaucrats retire and become contractors, wheedling contracts from their pals still at the CIA. I hear many tales from colleagues about waste, theft, and great riches accruing to phony contractors. The CIA paid $40 million to contractors to review documents to help prepare the Senate torture report, according to ABC News on December 10, 2014, for example. Had Hillary won, Michael Morell’s support may have put him on track to be a billionaire. Forty million here and forty million there really starts to add up.

It may be possible to make great progress in draining the swamp by firing or prosecuting just one leaker – just a single one. And by imprisoning just one phony contractor – just one. Word will spread that there’s a new sheriff in town and Mr. Pompeo may be pleasantly surprised to see that the swamp starts to drain itself.

« Last Edit: January 05, 2017, 08:02:46 PM by G M »

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile
Trump loses Woolsey
« Reply #401 on: January 05, 2017, 08:29:13 PM »
Trump is really looking bad on this Russian cyber thing , , , losing Woolsey is a big deal.

http://www.huffingtonpost.com/entry/james-woolsey-trump-adviser_us_586ede23e4b043ad97e2b932?2k4posi7ocf53766r

G M

  • Power User
  • ***
  • Posts: 26643
    • View Profile
Re: Cyberwar, Cyber Crime, and American Freedom
« Reply #402 on: January 05, 2017, 08:40:44 PM »
If someone, somewhere actually has something that actually resembles evidence, I'd sure like to see it.

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile
Re: Cyberwar, Cyber Crime, and American Freedom
« Reply #403 on: January 05, 2017, 09:33:27 PM »
See my Reply #397.

G M

  • Power User
  • ***
  • Posts: 26643
    • View Profile
Re: Cyberwar, Cyber Crime, and American Freedom
« Reply #404 on: January 06, 2017, 07:06:30 AM »
See my Reply #397.


Lots of conjecture, nothing resembling evidence.

ccp

  • Power User
  • ***
  • Posts: 18539
    • View Profile
Woosley on "resigning"
« Reply #405 on: January 06, 2017, 07:21:52 AM »

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile
Re: Cyberwar, Cyber Crime, and American Freedom
« Reply #406 on: January 06, 2017, 07:59:12 PM »
Fair enough.


Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile

ccp

  • Power User
  • ***
  • Posts: 18539
    • View Profile
no surprise coming from those employed under this administration
« Reply #409 on: January 09, 2017, 04:47:28 AM »
NR's Andrew McCarthy does it again - he picks apart the Obama's narrative.  The "intelligence" report leaves out one name.   Surely, nothing suspicious about that !   Except the name is Podesta.  The mafia guy must have cooked a home meal of pasta (while in his bath robe) for the "intelligence chiefs " to get them to leave his name out of the report.

It certainly is suspicious of the political bent of the report his name , the owner of hacked emails that are part of the material that is the topic of the whole issue , is not mentioned once.

http://www.nationalreview.com/article/443655/intelligence-report-fbi-cia-nsa-russia-vladimir-putin-hillary-clinton-john-podesta-donald-trump

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile


DougMacG

  • Power User
  • ***
  • Posts: 18288
    • View Profile
Re: WaPo: Baraq, the Empress Dowager, Putin, and the Donald
« Reply #412 on: January 11, 2017, 08:23:17 AM »
https://www.washingtonpost.com/opinions/the-russia-hacking-report-is-an-indictment-of-obama-not-trump/2017/01/09/e544b0d2-d684-11e6-b8b2-cb5164beba6b_story.html?utm_term=.ccc02db1e70d

Right.  How did this story morph from our lack of security and embarrassing communication to spies spying.  These breaches happened under this President's watch, no matter the party or candidates hurt by it.  In hindsight, they should hired that guy that invented the internet away from his more profitable climate hoax work, Al Gore, first Secretary of CyberSecurity!

Meanwhile the same President unilaterally gave up the American lead on governing the internet - and received nothing in return. 

They can't figure out why Americans went out and hired a better negotiator in chief.

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile

ccp

  • Power User
  • ***
  • Posts: 18539
    • View Profile
Judge Napolitano
« Reply #414 on: January 19, 2017, 08:27:11 AM »
Another midnight move from the corrupt Obama DOJ under Lorreta Lynch , one of the most corrupt officials we have ever had hiding behind her grandmother looks:

"Now, because of the Lynch secret order, revealed by The New York Times late last week, the NSA may share any of its data with any other intelligence agency or law enforcement agency that has an intelligence arm based on -- you guessed it -- the non-standard of governmental need."

"All these statutes and unauthorized spying practices have brought us to where we were on Jan. 2 -- namely, with the NSA having a standard operating procedure of capturing every keystroke on every computer and mobile device, every telephone conversation on every landline and cellphone, and all domestic electronic traffic -- including medical, legal and banking records -- of every person in America 24/7, without knowing of or showing any wrongdoing on the part of those spied upon.

The NSA can use data from your cellphone to learn where you are, and it can utilize your cellphone as a listening device to hear your in-person conversations, even if you have turned it off -- that is, if you still have one of the older phones that can be turned off."




http://www.foxnews.com/opinion/2017/01/19/andrew-napolitano-attorney-general-loretta-lynch-and-parting-shot-at-personal-freedom.html

G M

  • Power User
  • ***
  • Posts: 26643
    • View Profile
Re: Judge Napolitano
« Reply #415 on: January 19, 2017, 09:50:52 AM »
Another midnight move from the corrupt Obama DOJ under Lorreta Lynch , one of the most corrupt officials we have ever had hiding behind her grandmother looks:

"Now, because of the Lynch secret order, revealed by The New York Times late last week, the NSA may share any of its data with any other intelligence agency or law enforcement agency that has an intelligence arm based on -- you guessed it -- the non-standard of governmental need."

"All these statutes and unauthorized spying practices have brought us to where we were on Jan. 2 -- namely, with the NSA having a standard operating procedure of capturing every keystroke on every computer and mobile device, every telephone conversation on every landline and cellphone, and all domestic electronic traffic -- including medical, legal and banking records -- of every person in America 24/7, without knowing of or showing any wrongdoing on the part of those spied upon.

The NSA can use data from your cellphone to learn where you are, and it can utilize your cellphone as a listening device to hear your in-person conversations, even if you have turned it off -- that is, if you still have one of the older phones that can be turned off."




http://www.foxnews.com/opinion/2017/01/19/andrew-napolitano-attorney-general-loretta-lynch-and-parting-shot-at-personal-freedom.html

They said if I voted for Romney, the US government would end all 4th amendment protections, and they were right!

ccp

  • Power User
  • ***
  • Posts: 18539
    • View Profile
VDH : intelligence official as politicized ; this is not new news
« Reply #416 on: January 19, 2017, 09:51:17 AM »
The Dems these days, "how dare you impugn:  a "career government official".  

As though some are not corrupt or self preserving and promoting people like from every group of people:

http://www.nationalreview.com/article/443978/donald-trump-intelligence-community-comments-recognize-agencies-politicization

G M

  • Power User
  • ***
  • Posts: 26643
    • View Profile
Good Analysis of Amer-Intel report on "Russian hack of election".
« Reply #417 on: February 05, 2017, 01:28:18 PM »
See my Reply #397.


Lots of conjecture, nothing resembling evidence.

Even a lefty from the NY Review of books sees how weak the report is.


http://www.nybooks.com/daily/2017/01/09/russia-trump-election-flawed-intelligence/


Russia, Trump & Flawed Intelligence
Masha Gessen   
US Defense Under Secretary for Intelligence Marcel Lettre, Director of National Intelligence James Clapper, and National Security Agency Director Michael Rogers testifying before the Senate, Washington, D.C., January 5, 2017
Jonathan Ernst/Reuters
US Defense Under Secretary for Intelligence Marcel Lettre, Director of National Intelligence James Clapper, and National Security Agency Director Michael Rogers testifying before the Senate, Washington, D.C., January 5, 2017

After months of anticipation, speculation, and hand-wringing by politicians and journalists, American intelligence agencies have finally released a declassified version of a report on the part they believe Russia played in the US presidential election. On Friday, when the report appeared, the major newspapers came out with virtually identical headlines highlighting the agencies’ finding that Russian president Vladimir Putin ordered an “influence campaign” to help Donald Trump win the presidency—a finding the agencies say they hold “with high confidence.”

A close reading of the report shows that it barely supports such a conclusion. Indeed, it barely supports any conclusion. There is not much to read: the declassified version is twenty-five pages, of which two are blank, four are decorative, one contains an explanation of terms, one a table of contents, and seven are a previously published unclassified report by the CIA’s Open Source division. There is even less to process: the report adds hardly anything to what we already knew. The strongest allegations—including about the nature of the DNC hacking—had already been spelled out in much greater detail in earlier media reports.

But the real problems come with the findings themselves. The report leads with three “key judgments”:
ADVERTISING

    “We assess Russian President Vladimir Putin ordered an influence campaign in 2016 aimed at the US presidential election”;
    “Moscow’s influence campaign followed a Russian messaging strategy that blends covert intelligence operations—such as cyber activity—with overt efforts by Russian Government agencies, state-funded media, third-party intermediaries, and paid social media users or ‘trolls’”;
    “We assess Moscow will apply lessons learned from its Putin-ordered campaign aimed at the US presidential election to future influence efforts worldwide, including against US allies and their election processes.”

It is the first of these judgments that made headlines, so let us look at the evidence the document provides for this assertion. This evidence takes up just over a page and contains nine points. The first four make the argument that Putin wanted Hillary Clinton to lose. I will paraphrase for the sake of brevity and clarity:

    Putin and the Russian government aimed to help Trump by making public statements discrediting Hillary Clinton;
    the Kremlin’s goal is to undermine “the US-led liberal democratic order”;
    Putin claimed that the Panama Papers leak and the Olympic doping scandal were “US-directed efforts to defame Russia,” and this suggests that he would use defamatory tactics against the United States;
    Putin personally dislikes Hillary Clinton and blames her for inspiring popular unrest in Russia in 2011-2012.

None of this is new or particularly illuminating—at least for anyone who has been following Russian media in any language; some of it seems irrelevant. (Though the report notes that the NSA has only “moderate confidence” in point number one, unlike the CIA and FBI, which have “high confidence” in it.) The next set of points aim to buttress the assertion that Putin “developed a clear preference for President-elect Trump over Secretary Clinton.” The following is an exact quote:

    Beginning in June, Putin’s public comments about the US presidential race avoided directly praising President-elect Trump, probably because Kremlin officials thought that any praise from Putin personally would backfire in the United States. Nonetheless, Putin publicly indicated a preference for President-elect Trump’s stated policy to work with Russia, and pro-Kremlin figures spoke highly about what they saw as his Russia-friendly positions on Syria and Ukraine.

The wording makes it sound as though before June 2016 Putin had been constantly praising Trump in his public statements. In fact, though, Putin had spoken of Trump exactly once—when asked a question about him as he was leaving the hall following his annual press conference in December 2015. At that time, he said,

    Well, he is a colorful person. Talented, without a doubt. But it’s none of our business, it’s up to the voters in the United States. But he is the absolute leader of the presidential race. He says he wants to shift to a different mode or relations, a deeper level of relations with Russia. How could we not welcome that? Of course we welcome it. As for the domestic politics of it, the turns of phrase he uses to increase his popularity, I’ll repeat, it’s not our business to evaluate his work.

Nothing in this statement is remarkable. At the time, Trump, who was polling well in the Republican primary race, was the only aspiring presidential candidate to have indicated a willingness to dial back US-Russian hostilities. The topic was clearly judged not important enough to be included in the main body of Putin’s more-than-four-hour press conference but deserving of a boilerplate “we hear you” message sent as Putin literally headed out the door.

The Russian word for “colorful”—yarkiy—can be translated as “bright,” as in a “bright color.” That must be how Trump came to think that Putin had called him “brilliant,” an assertion that the US media (and, it appears, US intelligence agencies) failed to fact-check. In June 2016, at the St. Petersburg Economic Forum, American journalist Fareed Zakaria, moderating a panel, asked Putin, “The American Republican presumptive nominee, Donald Trump—you called him ‘brilliant,’ ‘outstanding,’ ‘talented.’ These comments were reported around the world. I was wondering what in him led you to that judgment, and do you still hold that judgment?” Of the epithets listed by Zakaria, Putin had used only the word “talented,” and he had not specified what sort of talent he had seen in Trump. Putin reprimanded Zakaria for exaggerating. “Look at what I said,” he said. “I made an off-hand remark about Trump being a colorful person. Are you saying he is not colorful? He is colorful. I did not characterize him in any other way. But what I did note, and what I certainly welcome, and I see nothing wrong with this—Mr. Trump has stated that he is ready for the renewal of a full-fledged relationship between Russia and the United States. What is wrong with that? We all welcome it. Don’t you?” Zakaria looked mortified: he had been caught asking an ill-informed question. Putin, on the other hand, was telling the truth for once. As for the American intelligence agencies marshaling this exchange as evidence of a change of tone and more—evidence of Russian meddling in the election—that is plainly misleading.

The next two points purporting to prove that Putin had a preference for Trump are, incredibly, even weaker arguments:

    Putin thought that he and Trump would be able to create an international anti-ISIS coalition;
    Putin likes to work with political leaders “whose business interests made them more disposed to deal with Russia, such as former Italian Prime Minister Silvio Berlusconi and former German Chancellor Gerhard Schroeder.”

Number 6 is puzzling. Nominally, Russia and the United States have already been cooperating in the fight against ISIS. The reference is probably to Putin’s offer, made in September 2015 in a speech to the UN General Assembly, to form an international anti-terrorist coalition that, Putin seemed to suggest, would stop the criticism and sanctions imposed in response to Russia’s war against Ukraine. Obama snubbed the offer then. Then again, this is my conjecture: the report contains no elucidation of this ascertainment of Putin’s motives. As for Number 7, not only is it conjecture on the part of the report’s authors, it is also anachronistic: Schroeder was a career politician before becoming a businessman with interests in Russia, as his term in political office was drawing to a close.

The final two arguments in this section of the report focus on the fact that Russian officials and propagandists stopped criticizing the US election process after election day and Russian trolls dropped a planned #DemocracyRIP campaign, which they had planned in anticipation of Hillary Clinton’s victory. (Notably, according to the intelligence agencies, whatever influence the Russians were trying to exert, they themselves seem to have assumed that Clinton would win regardless—and this is in fact supported by outside evidence.) The logic of these arguments is as sound as saying, “You were so happy to see it rain yesterday that you must have caused the rain yourself.”

That is the entirety of the evidence the report offers to support its estimation of Putin’s motives for allegedly working to elect Trump: conjecture based on other politicians in other periods, on other continents—and also on misreported or mistranslated public statements.

The next two and a half pages of the report deal with the mechanics of Russia’s ostensible intervention in the election. It confirms, briefly, earlier reports that the intelligence agencies believe that the hacks of the Democratic National Committee were carried out by an individual connected to the General Staff Main Intelligence Directorate (GRU). It also notes, without elaboration, that “Russian intelligence accessed elements of multiple state or local electoral boards,” though, according to the Department of Homeland Security, not the type of systems that are involved in vote tallying. And then the report goes from vague to strange: it lists the elements of Russia’s “state-run propaganda machine” that ostensibly exemplify the Kremlin’s campaign for Trump and denigration of Clinton. These include RT, the Russian English-language propaganda channel (as well as Sputnik, a state-funded online news site); a Russian television personality; and a fringe Russian politician named Vladimir Zhirinovsky. According to the report:

    Pro-Kremlin proxy Vladimir Zhirinovsky, leader of the nationalist Liberal Democratic Party of Russia, proclaimed just before the election that if President-elect Trump won, Russia would “drink champagne” in anticipation of being able to advance its positions on Syria and Ukraine.

In the Russian political sphere, Zhirinovsky is far from the mainstream. A man who has advocated mobilizing the Russian military to shoot all migratory birds in order to prevent an epidemic of bird flu, he is a far-right comic sidekick to the Kremlin’s straight man. Dictators like to keep his kind around as reminders of the chaos and extremism that could threaten the world in their absence. In Hungary, for example, the extremist Jobbik party allows Prime Minister Viktor Orbán to look moderate in comparison. The particular statement about drinking champagne was made during a televised talk show in which several Russian personalities get together to beat up rhetorically on a former insurance executive named Michael Bohm, who has fashioned a career of playing an American pundit on Russian TV. Here is the exchange that preceded Zhirinovsky’s promise to drink champagne:

    They threaten to cut Russia off from international financial systems. They can do that! But then we won’t give America a single dollar back. That’s hundreds of billions of dollars! Hundreds of billions! If they cut us off, they cut off the repayment of all our debts. Hundreds of billions! They are not dumb, so they’ll never do it. Never. As for the arms race, sometimes we are ahead and sometimes they are. We’ve got parity. But there is another danger to America. They have a hundred nuclear power stations. And we can reach all of them. And the destruction of a single nuclear power station kills every living thing on a territory of five hundred thousand square kilometers. That’s fifty million square kilometers. But all of America is just ten million square kilometers. So a single explosion will destroy America five times over. Same thing with us. But our stations are on the fringes. Theirs are in densely populated areas. So blowing up their nuclear reactors will kill more people in America. Plus, we have lots of empty space. So they have weighed it: Russia’s survival rates will be higher than America’s. More of them will die in case of nuclear war.

    Host: Remember you also told us about magnetic weapons that will make us stick to our beds and incapable of getting up?

    Zhirinovsky: Yes, there is that, too.

    [A brief exchange about the arms race between two other participants]

    Zhirinovsky: I hope that Aleppo is free of guerrilla fighters before November 8!

    Sergei Stankevich [a largely forgotten Yeltsin-era politician]: But then we have to think about what happens November 9, if we’ve already liberated Aleppo.

    Zhirinovsky: We are going to be drinking champagne to celebrate a Trump victory! [to Bohm] And to the defeat of your friend Hillary Clinton!

Remarkably, the report manages not only to offer a few words thrown out during this absurd exchange as evidence of a larger Russian strategy, but also to distort those words in the process: contrary to the report’s assertion, Zhironovsky made no mention of being able to advance Russia’s positions in Syria and Ukraine following a Trump victory. Of course, he could have—indeed, he could have said anything, given the tenor of the conversation. Whatever he said, it’s difficult to imagine how it could be connected to Russia’s ostensible influence on the American election.

Other evidence in this part of the report includes the statement, “Russian media hailed President-elect Trump’s victory as a vindication of Putin’s advocacy of global populist movements—the theme of Putin’s annual conference for Western academics in October 2016.” This statement is false. The theme of Putin’s annual conference, known as the Valdai Club, was “The Future Begins Today: Outlines of the World of Tomorrow.” The program reads like the program of the annual World Affairs Council conference in San Francisco—which last year, coincidentally, was called “Day One: The World That Awaits.” This is not to say that Putin has not supported populist movements around the world—he demonstrably has. But once again the particular evidence offered by the report on this point is both weak and false.

Finally, the bulk of the rest of the report is devoted to RT, the television network formerly known as Russia Today.

    RT’s coverage of Secretary Clinton throughout the US presidential campaign was consistently negative and focused on her leaked e-mails and accused her of corruption, poor physical and mental health, and ties to Islamic extremism. Some Russian officials echoed Russian lines for the influence campaign that Secretary Clinton’s election could lead to a war between the United States and Russia.

In other words, RT acted much like homegrown American media outlets such as Fox News and Breitbart. A seven-page annex to the report details RT activities, including hosting third-party candidate debates, broadcasting a documentary about the Occupy Wall Street movement and “anti-fracking programming, highlighting environmental issues and the impacts on public health”—perfectly appropriate journalistic activities, even if they do appear on what is certainly a propaganda outlet funded by an aggressive dictatorship. An entire page is devoted to RT’s social media footprint: the network appears to score more YouTube views than CNN (though far fewer Facebook likes). Even this part of the report is slightly misleading: RT’s tactics for inflating its viewership numbers in order to secure continued Kremlin funding has been the subject of some convincing scholarship. That is the entirety of the case the intelligence agencies have presented: Putin wanted Trump to win and used WikiLeaks and RT to ensure that outcome.

Despite its brevity, the report makes many repetitive statements remarkable for their misplaced modifiers, mangled assertions, and missing words. This is not just bad English: this is muddled thinking and vague or entirely absent argument. Take, for example, this phrase: “Moscow most likely chose WikiLeaks because of its self-proclaimed reputation for authenticity.” I think, though I cannot be sure, that the authors of the report are speculating that Moscow gave the products of its hacking operation to WikiLeaks because WikiLeaks is known as a reliable source. The next line, however, makes this speculation unnecessary: “Disclosures through WikiLeaks did not contain any evident forgeries.”

Or consider this: “Putin most likely wanted to discredit Secretary Clinton because he has publicly blamed her since 2011 for inciting mass protests against his regime in late 2011 and early 2012, and because he holds a grudge for comments he almost certainly saw as disparaging him.” Did Putin’s desire to discredit Clinton stem from his own public statements, or are the intelligence agencies basing their appraisal of Putin’s motives on his public statements? Logic suggests the latter, but grammar indicates the former. The fog is not coincidental: if the report’s vague assertions were clarified and its circular logic straightened out, nothing would be left.

It is conceivable that the classified version of the report, which includes additional “supporting information” and sourcing, adds up to a stronger case. But considering the arc of the argument contained in the report, and the principal findings (which are apparently “identical” to those in the classified version), this would be a charitable reading. An appropriate headline for a news story on this report might be something like, “Intel Report on Russia Reveals Few New Facts,” or, say, “Intelligence Agencies Claim Russian Propaganda TV Influenced Election.” Instead, however, the major newspapers and commentators spoke in unison, broadcasting the report’s assertion of Putin’s intent without examining the arguments.

The New York Times called it “a strong statement from three intelligence agencies,” and followed its uncritical coverage with a story mocking Trump supporters for asking, “What’s the big deal?”

“How is it possible, if these intelligence reports are true, to count the 2016 Presidential election as unsullied?” asked New Yorker editor David Remnick in a piece published Friday. But since when has “unsullied” been a criterion on which a democratic process is judged? Standard measures include transparency, fairness, openness, accessibility to all voters and to different candidates. Anything that compromises these standards, whether because of domestic or external causes, may throw a result into doubt. But Remnick’s rhetorical question seems to reach for an entirely different standard: that of a process that is demonstrably free of any outside influence. Last month Paul Krugman at The New York Times railed, similarly, that the election was “tainted.” Democracy is messy, as autocrats the world over will never tire of pointing out. They are the ones who usually traffic in ideas of order and purity—as well as in conspiracy theories based on sweeping arguments and scant, haphazard evidence.

The election of Donald Trump is anomalous, both because of the campaign he ran and the peculiar vote mathematics that brought him victory. His use of fake news, his serial lying, his conning his way into free air time, his instrumentalization of partisanship and naked aggression certainly violated the norms of American democracy. But the intelligence report does nothing to clarify the abnormalities of Trump’s campaign and election. Instead, it risks perpetuating the fallacy that Trump is some sort of a foreign agent rather than a home-grown demagogue, while doing further damage to our faith in the electoral system. It also suggests that the US intelligence agencies’ Russia expertise is weak and throws into question their ability to process and present information—all this, two weeks before a man with no government experience but with a short Twitter fuse takes the oath of office.
January 9, 2017, 10:17 pm
« Last Edit: February 07, 2017, 10:27:19 AM by Crafty_Dog »

bigdog

  • Power User
  • ***
  • Posts: 2321
    • View Profile
What Happened to Trump’s Secret Hacking Intel?
« Reply #418 on: February 07, 2017, 05:00:42 PM »
https://www.theatlantic.com/technology/archive/2017/02/what-happened-to-trumps-secret-hacking-intel/515889/?utm_source=polfb

“I know a lot about hacking,” Trump said to the reporters, according to The New York Times. “And hacking is a very hard thing to prove. So it could be somebody else.” He was referring to the intelligence community’s determination that Russia was behind the cyberattacks.

Then, a bombshell: “And I also know things that other people don’t know, and so they cannot be sure of the situation.” Asked what he was talking about, Trump replied, “You’ll find out on Tuesday or Wednesday.”

Tuesday and Wednesday came and went without any new information on the cyberattacks from the president-elect.

G M

  • Power User
  • ***
  • Posts: 26643
    • View Profile
Re: What Happened to Trump’s Secret Hacking Intel?
« Reply #419 on: February 07, 2017, 06:20:05 PM »
https://www.theatlantic.com/technology/archive/2017/02/what-happened-to-trumps-secret-hacking-intel/515889/?utm_source=polfb

“I know a lot about hacking,” Trump said to the reporters, according to The New York Times. “And hacking is a very hard thing to prove. So it could be somebody else.” He was referring to the intelligence community’s determination that Russia was behind the cyberattacks.

Then, a bombshell: “And I also know things that other people don’t know, and so they cannot be sure of the situation.” Asked what he was talking about, Trump replied, “You’ll find out on Tuesday or Wednesday.”

Tuesday and Wednesday came and went without any new information on the cyberattacks from the president-elect.

Still nothing from anyone resembling proof, showing who accessed the dem's emails.

DougMacG

  • Power User
  • ***
  • Posts: 18288
    • View Profile
Re: What Happened to Trump’s Secret Hacking Intel?
« Reply #420 on: February 08, 2017, 07:47:38 AM »
This story broken at about that time:
http://dailycaller.com/2017/02/04/exclusive-house-intelligence-it-staffers-fired-in-computer-security-probe/
Three brothers who managed office information technology for members of the House Permanent Select Committee on Intelligence and other lawmakers were abruptly relieved of their duties on suspicion that they accessed congressional computers without permission.

Nothing excuses the Russians, if they are guilty.  But aren't all rivals and enemies trying to hack at all times?  Security is part of governing competence.  Or incompetence in the choice of John Podesta and the person who hired him.

Hillary's nefarious activities were exposed by her own disclosures, those of the state department, the FBI, as well as wikileaks who say the source is not the Russians.

Does anyone think the 2017 election was wrongly swung by Russian interference?  IF they were guilty of hacking and releasing, didn't they release what Hillary herself already promised to release.  Don't we want to know that the media and the DNC were inappropriately helping Hillary over Bernie?  That deserves to be exposed, IMHO. I never saw private emails of the wedding and yoga classes revealed.  I only saw the kind of emails that gave us a more accurate look at her work product.

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile
WSJ: Assange & Wikileaks will help tech firms defend against CIA
« Reply #421 on: March 09, 2017, 01:31:19 PM »
Assange: WikiLeaks Will Help Tech Firms Defend Against CIA Hacking
CIA lashes out against WikiLeaks, saying founder Julian Assange is ‘not exactly a bastion of truth and integrity’
0:00 / 0:00
WikiLeaks founder Julian Assange on Thursday pledged to share with technology companies the technical details of the purported CIA hacking tools his organization described earlier this week. Photo: Zuma Press
By Robert McMillan
Updated March 9, 2017 1:56 p.m. ET
108 COMMENTS

WikiLeaks founder Julian Assange pledged Thursday to provide technology companies with the technical details needed to fix product flaws that were exposed when his organization published documents that apparently show how the Central Intelligence Agency hacks into phones and other devices.

The 8,761 documents that WikiLeaks posted on its website Tuesday described malware and other tools used to exploit a wide range of commercial products including smartphones, software and equipment from Apple Inc., Alphabet Inc.’s Google, Samsung Electronics Co., and Microsoft Corp.

The documents sent companies scrambling to uncover what specific security flaws the attacks might be exploiting. And Mr. Assange’s offer on Thursday created a fresh set of complications for the companies dealing with the leak.

White House press secretary Sean Spicer warned companies on Thursday that accepting classified material from WikiLeaks could be violating the law. They should check with the Justice Department in advance, he said.

When WikiLeaks released the information the antisecrecy organization said it obtained from the CIA files, the organization had put tech companies in the position of knowing they might have security vulnerabilities but not knowing how to address the flaws and protect their customers.

    FBI Probing How WikiLeaks Obtained CIA Spy Tools
    Tech Firms Rush to Assess Damage

Related Video
0:00 / 0:00
In light of WikiLeaks' release said to detail CIA hacking methods, WSJ's Nathan Olivarez-Giles outlines ways consumers can reinforce the protection of their devices and TVs against intrusion on Lunch Break with Tanya Rivero. Photo: Zuma Press

“After considering what we think is the best way to proceed and hearing the calls from some of the manufacturers, we have decided to work with them to give them some exclusive access to the additional technical details we have so that fixes can be developed and pushed out,” Mr. Assange said during a news conference broadcast online.

The CIA lashed out Thursday at Mr. Assange and WikiLeaks for disclosures that the group has said represents an overreach by U.S. intelligence officials. Neither the CIA nor the White House has commented on the authenticity of the documents.

“Julian Assange is not exactly a bastion of truth and integrity,” CIA spokesman Jonathan Liu said. “Despite the efforts of Assange and his ilk, [the] CIA continues to aggressively collect foreign intelligence overseas to protect America from terrorists, hostile nation states and other adversaries.”

The tech companies must now decide whether they’re willing to accept WikiLeaks’ offer. Having in hand the actual code used in the purported CIA hacking tools would enable the companies to understand the exact holes in their products. But the prospect of working with an organization that publishes stolen government secrets also raises delicate ethical, legal and public-relations issues.

Although it would be “unheard of” for the federal government to prosecute a company for using leaked classified information to improve its products, there “are some issues with the fact that the information is classified,” said Jennifer Granick, director of civil liberties at Stanford Law School’s Center for Internet and Society.

Given uncertainty about the views of the Justice Department, “I can see why legal counsel at big companies might hesitate to reach out to Julian Assange to negotiate access to classified information,” she said.

Apple and Samsung didn’t respond to requests for comment Thursday. Google declined to comment on whether it would work with WikiLeaks.

“We’ve seen Julian Assange’s statement and have not yet been contacted,” a Microsoft spokesman said Thursday.

The spokesman said that Microsoft’s initial review of the WikiLeaks documents showed that most of the issues are dated and likely have been addressed in its latest software.

Several other companies named in the documents, including Apple and Google, said Wednesday that their initial reviews indicated that existing software updates had already addressed many of the vulnerabilities described in the WikiLeaks document. Still, they said, the reviews were continuing.

In a blog post Wednesday, Cisco Systems Inc. said that its ability to address issues the documents raised was limited without more detail, but once the code was released the company would be able to analyze it and produce updates if necessary. Most of the companies whose products are mentioned in the WikiLeaks documents face the same situation, security experts said.

Cisco declined to comment Thursday on whether it is willing to work with WikiLeaks. The company said it has a protocol for investigating and fixing bugs if it receives a report of a vulnerability.

WikiLeaks plans to release more of the documents and files that the organization obtained.

“Once this material is effectively disarmed by us by removing critical components, we will publish additional details of what has been occurring,” Mr. Assange said.

Mr. Assange said that the need to fix these flaws is pressing, given that others might be in possession of the tools.

“It is impossible to keep effective control of cyberweapons,” he said. “If you build them, you will lose them.”

In a statement Wednesday, the CIA gave what appeared to be a justification for amassing an arsenal of high-tech hacking tools.

“It is the CIA’s job to be innovative, cutting-edge, and the first line of defense in protecting this country form enemies abroad,” the agency said. “America deserves nothing less.”

The agency also said it is legally prohibited from conducting electronic surveillance targeting Americans at home in the U.S. and doesn’t do so. The CIA said Americans should be troubled by any WikiLeaks disclosure designed to damage the U.S. intelligence community’s ability to protect America from adversaries.

“Such disclosures not only jeopardize U.S. personnel and operations, but also equip our adversaries with tools and information to do us harm,” the CIA said.

WikiLeaks said it had disclosed the information to inspire a debate about what limits should be placed on the CIA’s ability to hack computers and electronic devices.

—Shane Harris,
Rachael King, Paul Sonne, Jay Greene and Jack Nicas contributed to this article.


Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile
POTH: Russian Espionage Piggybacks on a Cybercriminal’s Hacking
« Reply #424 on: March 12, 2017, 10:23:19 AM »
second post
https://www.nytimes.com/2017/03/12/world/europe/russia-hacker-evgeniy-bogachev.html?emc=edit_ta_20170312&nl=top-stories&nlid=49641193&ref=cta&_r=0

To the F.B.I., Evgeniy M. Bogachev is the most wanted cybercriminal in the world. The bureau has announced a $3 million bounty for his capture, the most ever for computer crimes, and has been attempting to track his movements in hopes of grabbing him if he strays outside his home turf in Russia.

He has been indicted in the United States, accused of creating a sprawling network of virus-infected computers to siphon hundreds of millions of dollars from bank accounts around the world, targeting anyone with enough money worth stealing — from a pest control company in North Carolina to a police department in Massachusetts to a Native American tribe in Washington.

In December, the Obama administration announced sanctions against Mr. Bogachev and five others in response to intelligence agencies’ conclusions that Russia had meddled in the presidential election. Publicly, law enforcement officials said it was his criminal exploits that landed Mr. Bogachev on the sanctions list, not any specific role in the hacking of the Democratic National Committee.

But it is clear that for Russia, he is more than just a criminal. At one point, Mr. Bogachev had control over as many as a million computers in multiple countries, with possible access to everything from family vacation photographs and term papers to business proposals and highly confidential personal information. It is almost certain that computers belonging to government officials and contractors in a number of countries were among the infected devices. For Russia’s surveillance-obsessed intelligence community, Mr. Bogachev’s exploits may have created an irresistible opportunity for espionage.


While Mr. Bogachev was draining bank accounts, it appears that the Russian authorities were looking over his shoulder, searching the same computers for files and emails. In effect, they were grafting an intelligence operation onto a far-reaching cybercriminal scheme, sparing themselves the hard work of hacking into the computers themselves, officials said.

The Russians were particularly interested, it seems, in information from military and intelligence services regarding fighting in eastern Ukraine and the war in Syria, according to law enforcement officials and the cybersecurity firm Fox-IT. But there also appear to have been attempts to gain access to sensitive military and intelligence information on infected computers in the United States, often consisting of searching for documents containing the words “top secret” or “Department of Defense.”

The Russian government has plenty of its own cyberspace tools for gathering intelligence. But the piggybacking on Mr. Bogachev’s activities offers some clues to the breadth and creativity of Russia’s espionage efforts at a time when the United States and Europe are scrambling to counter increasingly sophisticated attacks capable of destroying critical infrastructure, disrupting bank operations, stealing government secrets and undermining democratic elections.

This relationship is illustrated by the improbable mix of characters targeted with the sanctions announced by the Obama administration. Four were senior officers with Russia’s powerful military intelligence agency, the G.R.U. Two were suspected cyberthieves on the F.B.I.’s most wanted list: an ethnic Russian from Latvia named Alexsey Belan with a red-tinted Justin Bieber haircut, and Mr. Bogachev, whose F.B.I. file includes a photograph of him holding his spotted Bengal cat while wearing a matching set of leopard-print pajamas.

His involvement with Russian intelligence may help explain why Mr. Bogachev, 33, is hardly a man on the run. F.B.I. officials say he lives openly in Anapa, a run-down resort town on the Black Sea in southern Russia. He has a large apartment near the shore and possibly another in Moscow, officials say, as well as a collection of luxury cars, though he seems to favor driving his Jeep Grand Cherokee. American investigators say he enjoys sailing and owns a yacht.

Running the criminal scheme was hard work. Mr. Bogachev often complained of being exhausted and “of having too little time for his family,” said Aleksandr Panin, a Russian hacker, now in a federal prison in Kentucky for bank fraud, who used to communicate with Mr. Bogachev online. “He mentioned a wife and two kids as far as I remember,” Mr. Panin wrote in an email.

Beyond that, little is known about Mr. Bogachev, who preferred to operate anonymously behind various screen names: slavik, lucky12345, pollingsoon. Even close business associates never met him in person or knew his real name. “He was very, very paranoid,” said J. Keith Mularski, an F.B.I. supervisor in Pittsburgh whose investigation of Mr. Bogachev led to an indictment in 2014. “He didn’t trust anybody.”

Russia does not have an extradition treaty with the United States, and Russian officials say that so long as Mr. Bogachev has not committed a crime on Russian territory, there are no grounds to arrest him.

Attempts to reach Mr. Bogachev for this article were unsuccessful. In response to questions, his lawyer in Anapa, Aleksei Stotskii, said, “The fact that he is wanted by the F.B.I. prevents me morally from saying anything.”

A line in Mr. Bogachev’s file with the Ukrainian Interior Ministry, which has helped the F.B.I. track his movements, describes him as “working under the supervision of a special unit of the F.S.B.,” referring to the Federal Security Service, Russia’s main intelligence agency. The F.S.B. did not respond to request for comment.

That Mr. Bogachev remains at large “is the most powerful argument” that he is an asset of the Russian government, said Austin Berglas, who was an assistant special agent in charge of cyberinvestigations out of the F.B.I.’s New York field office until 2015. Hackers like Mr. Bogachev are “moonlighters,” Mr. Berglas said, “doing the bidding of Russian intelligence services, whether economic espionage or straight-up espionage.”

Such an arrangement offers the Kremlin a convenient cover story and an easy opportunity to take a peek into the extensive networks of computers infected by Russian hackers, security experts say. Russian intelligence agencies also appear to occasionally employ malware tools developed for criminal purposes, including the popular BlackEnergy, to attack the computers of enemy governments. The recent revelations by WikiLeaks about C.I.A. spying tools suggest that the agency also kept a large reference library of hacking kits, some of which appear to have been produced by Russia.

It also hints at a struggle to recruit top talent. A job with the Russian intelligence agencies does not command the prestige it did in the Soviet era. The Russian state has to compete against the dream of six-figure salaries and stock options in Silicon Valley. A recruiting pitch from a few years ago for the Defense Ministry’s cyberwarfare brigade offered college graduates the rank of lieutenant and a bed in a room with four other people.

And so the Kremlin at times turns to the “dark web” or Russian-language forums devoted to cyberfraud and spam. Mr. Bogachev, according to court papers from his criminal case, used to sell malicious software on a site called Carding World, where thieves buy and sell stolen credit card numbers and hacking kits, according to the F.B.I. One recent posting offered to sell American credit card information with CVV security numbers for $5. A user named MrRaiX was selling a malware supposedly designed to pilfer passwords from programs like Google Chrome and Outlook Express.

Rather than shut down such sites, as the F.B.I. typically tries to do, Russian intelligence agents appear to have infiltrated them, security experts say.

Some of the forums state specifically that almost any type of criminality is allowed — bank fraud, counterfeiting documents, weapons sales. One of the few rules: no work in Russia or the former Soviet Union. In Carding World, and in many other forums, a violation results in a lifetime ban.


The F.B.I. has long been stymied in its efforts to get Russian cybercriminals. For a time, the bureau had high hopes that its agents and Russian investigators with the F.S.B. would work together to target Russian thieves who had made a specialty of stealing Americans’ credit card information and breaking into their bank accounts. “Here’s to great investigations,” F.B.I. and F.S.B. agents would toast each other at Manhattan steakhouses during periodic trust-building visits, Mr. Berglas said.

But help rarely seemed to materialize. After awhile, agents began to worry that the Russian authorities were recruiting the very suspects that the F.B.I. was pursuing. The joke among Justice Department officials was the Russians were more likely to pin a medal on a suspected criminal hacker than help the F.B.I. nab him.

“Almost all the hackers who have been announced by the U.S. government through indictments are immediately tracked by the Russian government,” said Arkady Bukh, a New York-based lawyer who often represents Russian hackers arrested in the United States. “All the time they’re asked to provide logistical and technical support.”

While it was a widely held suspicion, it is tough to prove the connection between cyberthieves and Russian intelligence. But in one case, Mr. Berglas said, F.B.I. agents monitoring an infected computer were surprised to see a hacker who was the target of their investigation share a copy of his passport with a person the F.B.I. believed to be a Russian intelligence agent — a likely signal that the suspect was being recruited or protected. “That was the closest we ever came,” he said.

Fishing for Top Secrets

Mr. Bogachev’s hacking career began well over a decade ago, leading to the creation of a malicious software program called GameOver ZeuS that he managed with the help of about a half-dozen close associates who called themselves the Business Club, according to the F.B.I. and security researchers. Working around the clock, his criminal gang infected an ever growing network of computers. They were able to bypass the most advanced banking security measures to quickly empty accounts and transfer the money abroad through a web of intermediaries called money mules. F.B.I. officials said it was the most sophisticated online larceny scheme they had encountered — and for years, it was impenetrable.

Mr. Bogachev became extremely wealthy. At one point, he owned two villas in France and kept a fleet of cars parked around Europe so he would never have to rent a vehicle while on vacation, according to a Ukrainian law enforcement official with knowledge of the Bogachev case, who requested anonymity to discuss the continuing investigation. Officials say he had three Russian passports with different aliases allowing him to travel undercover.

At the height of his operations, Mr. Bogachev had between 500,000 and a million computers under his control, American officials said. And there is evidence that the Russian government took an interest in knowing what was on them.

Beginning around 2011, according to an analysis by Fox-IT, computers under Mr. Bogachev’s control started receiving requests for information — not about banking transactions, but for files relating to various geopolitical developments pulled from the headlines.

Around the time that former President Barack Obama publicly agreed to start sending small arms and ammunition to Syrian rebels, in 2013, Turkish computers infected by Mr. Bogachev’s network were hit with keyword searches that included the terms “weapon delivery” and “arms delivery.” There were also searches for “Russian mercenary” and “Caucasian mercenary,” suggesting concerns about Russian citizens fighting in the war.

Ahead of Russia’s military intervention in Ukraine in 2014, infected computers were searched for information about top-secret files from the country’s main intelligence directorate, the S.B.U. Some of the queries involved searches for personal information about government security officials, including emails from Georgia’s foreign intelligence service, the Turkish Foreign Ministry and others, said Michael Sandee, one of the researchers from Fox-IT.

And at some point between March 2013 and February 2014, there were searches for English-language documents, which seemed to be fishing for American military and intelligence documents. The queries were for terms including “top secret” and “Department of Defense,” said Brett Stone-Gross, a cybersecurity analyst involved in analyzing GameOver ZeuS. “These were in English,” he said. “That was different.”

Cybersecurity experts who studied the case say there is no way to know who ordered the queries. But they were so disconnected from the larceny and fraud that drove Mr. Bogachev’s operation that analysts say there can be no other motive but espionage.

Whether the searches turned up any classified document or sensitive government material is unknown, although the odds are likely that there were a number of federal government employees or defense contractors with infected personal computers. “They had such a large number of infections, I would say it’s highly likely they had computers belonging to U.S. government and foreign government employees,” Mr. Stone-Gross said.

In the summer of 2014, the F.B.I., together with law enforcement agencies in over half a dozen countries, carried out Operation Tovar, a coordinated attack on Mr. Bogachev’s criminal infrastructure that successfully shut down his network and liberated computers infected with GameOver ZeuS.

Prosecutors said they were in talks with the Russian government, trying to secure cooperation for the capture of Mr. Bogachev. But the only apparent legal trouble Mr. Bogachev has faced in Russia was a lawsuit filed against him by a real estate company in 2011 over payment of about $75,000 on his apartment in Anapa, according to court papers there. And even that he managed to beat.

These days, officials believe Mr. Bogachev is living under his own name in Anapa and occasionally takes boat trips to Crimea, the Ukrainian peninsula that Russia occupied in 2014. Mr. Mularski, the F.B.I. supervisor, said his agents were “still pursuing leads.”

ccp

  • Power User
  • ***
  • Posts: 18539
    • View Profile
« Last Edit: March 12, 2017, 01:08:03 PM by Crafty_Dog »

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile
Vault 7, the CIA, and the Truth
« Reply #428 on: March 14, 2017, 09:13:39 AM »
As best as I can tell, the man who recommended this article knows his stuff:

http://quietstorm.io/post/158377722775/vault-7-the-cia-and-the-truth

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile

G M

  • Power User
  • ***
  • Posts: 26643
    • View Profile
Re: Baraq used Brits to spy on candidate Trump?!?
« Reply #430 on: March 16, 2017, 06:28:17 PM »
https://twitter.com/foxandfriends/status/841619127999508480?ref_src=twsrc%5Etfw

This is not uncommon. The law enforcement or intelligence agencies of friendly countries can intercept communications then pass it back to US entities. No law in the UK that would prevent the GCHQ from listening in on anyone's calls. Intercepting foreign comms is what they do.

ccp

  • Power User
  • ***
  • Posts: 18539
    • View Profile
Stolen Secret Service laptop computer
« Reply #431 on: March 20, 2017, 06:45:17 AM »
The obvious question is why would anyone leave a laptop in their vehicle in driveway?  Even if it was for a few minutes.   I have had people get into my car trunk while I was in the post office of at a gas station with my back turned getting a cup of coffee:

http://www.tmz.com/2017/03/20/mystery-thief-secret-service-laptop/
« Last Edit: March 20, 2017, 12:48:03 PM by Crafty_Dog »


Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile
WSJ: Mike Rogers: America ill-prepared, worse on the way
« Reply #433 on: March 27, 2017, 10:03:55 PM »
America Is Ill-Prepared to Counter Russia’s Information Warfare
Propaganda is nothing new. But Moscow is frighteningly effective—and worse is on the way.
By Mike Rogers
March 27, 2017 6:59 p.m. ET
22 COMMENTS

When historians look back at the 2016 election, they will likely determine that it represented one of the most successful information operation campaigns ever conducted. A foreign power, through the targeted application of cyber tools to influence America’s electoral process, was able to cast doubt on the election’s legitimacy, engender doubts about the victor’s fitness for office, tarnish the outcome of the vote, and frustrate the president’s agenda.

Historians will also see a feckless Congress—both Democrats and Republicans—that focused on playing partisan “gotcha” and fundamentally failed in its duty to gather information, hold officials accountable, and ultimately serve the country’s interests.

Whether or not the Trump campaign or its staff were complicit in Moscow’s meddling is missing the broader point: Russia’s intervention has affected how Americans view the peaceful transition of power from one president to the next. About this we should not be surprised. Far from it.

Propaganda is perhaps the second- or third-oldest profession. Using information as a tool to affect outcomes is as old as politics. Propaganda was familiar to the ancient Greeks and Romans, the Byzantines, and the Han Dynasty. Each generation applies the technology of the day in trying to influence an adversary’s people.

What’s new today is the reach of social media, the anonymity of the internet, and the speed with which falsehoods and fabrications can propagate. Twitter averaged 319 million monthly active users in the fourth quarter of 2016. Instagram had 600 million accounts at the end of last year. Facebook’s monthly active users total 1.86 billion—a quarter of the global population. Yet even these staggering figures don’t fully capture the internet’s reach.

In February, Russia’s minister of defense, Sergei Shoigu, announced a realignment in its cyber and digital assets. “We have information troops who are much more effective and stronger than the former ‘counter-propaganda’ section,” Mr. Shoigu said, according to the BBC. Russia, more than any other country, recognizes the value of information as a weapon. Moscow deployed it with deadly effect in Estonia, in Georgia and most recently in Ukraine, introducing doubt into the minds of locals, spreading lies about their politicians, and obfuscating Russia’s true intentions.

A report last year by RAND Corp., “The Russian ‘Firehose of Falsehood’ Propaganda Model ,” noted that cyberpropaganda is practically a career path in Russia. A former paid troll told Radio Free Europe that teams were on duty around the clock in 12-hour shifts and he was required to post at least 135 comments of not fewer than 200 characters each.

In effect, Moscow has developed a high-volume, multichannel propaganda machine aimed at advancing its foreign and security policy. Along with the traditional propaganda tools—favoring friendly outlets and sponsoring ideological journals—this represents an incredibly powerful tool.

Now extrapolate one step further: Apply botnets, artificial intelligence and other next-generation technology. The result will be automated propaganda, rapid spamming and more. We shouldn’t be surprised to see any of this in the future.

Imagine an American senator who vocally advocates a new strategic-forces treaty with European allies. Moscow, feeling threatened, launches a directed information campaign to undermine the senator. His emails are breached and published, disclosing personal details and family disputes, alongside draft policy papers without context. Social media is spammed with seemingly legitimate comments opposing the senator’s position. The senator’s phone lines are flooded with robocalls. Fake news articles are pushed out on Russian-controlled media suggesting that the senator has broken campaign-finance laws.

Can you imagine the disruption to American society? The confusion in the legislative process? The erosion of trust in democracy? Unfortunately, this is the reality the U.S. faces, and without a concerted effort it will get worse.

Congress is too focused on the trees to see the frightening forest. Rather than engaging in sharp-edged partisanship, lawmakers should be investigating Russian propaganda operations and information warfare. They should be figuring out how to reduce the influence of foreign trolls, and teaching Americans about Moscow’s capabilities. That would go a long way to save the republic.

Mr. Rogers was chairman of the House Permanent Select Committee on Intelligence, 2011-15.

Appeared in the Mar. 28, 2017, print edition.

ccp

  • Power User
  • ***
  • Posts: 18539
    • View Profile
Re: Cyberwar, Cyber Crime, and American Freedom
« Reply #434 on: March 28, 2017, 05:44:03 AM »
An alternative view from the one CD posted above.  The Russian narrative about how they influenced our election is a farce.  I subscribe to this view:

http://www.nationalreview.com/article/446148/russian-farce-trump-collusion-hysteria-diverts-attention-surveillance-scandal
« Last Edit: March 28, 2017, 06:17:55 AM by ccp »

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile
Re: Cyberwar, Cyber Crime, and American Freedom
« Reply #435 on: March 28, 2017, 04:35:30 PM »
BTW, IIRC Mike Rogers was the fg idiot that gave Dems major ammo when he chortled that the Benghazi Committee was a chance to get Hillary; that does not mean he is wrong here.  Headed out now, will read CCP's post when I get back.

ccp

  • Power User
  • ***
  • Posts: 18539
    • View Profile
On the other hand Cheney has opinion
« Reply #436 on: March 28, 2017, 05:26:55 PM »
I do trust him on security issues.  John Bolton also comments on this issue here and I respect his opinion and while Cheney is probably not a huge fan of Trump he and Bolton are not freakin Dems just trying to make hay and delegitimize Trump:

http://www.foxnews.com/world/2017/03/28/cheney-blasts-russia-alleged-interference-in-us-election.html

ccp

  • Power User
  • ***
  • Posts: 18539
    • View Profile
French the never Trump calling for Nunes to step down
« Reply #437 on: March 29, 2017, 05:55:48 AM »
Why is it only Repubs who do this to their own:

http://www.nationalreview.com/article/446179/devin-nunes-trump-surveillance-campaign-investigation-house-intel-committee-russia


McCarthy's rebuttel to French:

Nunes need not "recuse" himself and Dems calling for this are being totally political.  And yet some REpubs fall for the bait.  Perhaps Schiff should step down as he is totally political and doing everything he can to "get" the President:

http://www.nationalreview.com/article/446210/devin-nunes-investigation-chairman-house-intel-committee-michael-flynn
« Last Edit: March 29, 2017, 06:24:49 AM by ccp »

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile
Re: Cyberwar, Cyber Crime, and American Freedom
« Reply #438 on: March 29, 2017, 07:34:30 AM »
That belongs in some other thread-- Politics perhaps?

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile
The NGA
« Reply #440 on: March 31, 2017, 09:05:07 AM »

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile
WSJ: WannaCry
« Reply #441 on: May 16, 2017, 09:57:15 AM »

May 15, 2017 7:02 p.m. ET
40 COMMENTS

At least 150 countries are still working to contain a malicious computer worm that emerged on Friday. The unprecedented planet-wide attack is another harbinger of the world’s exposure to hackers and digital terrorists.

From London to Beijing to Moscow, hundreds of thousands of users were infected with a new variant of so-called ransomware, known as “WannaCry,” which encrypted their data and then solicited a blackmail payment to resume normal operations. This sophisticated, self-propagating malware was designed to spread to all other computers on the same network after infecting one machine. The culprits are unknown and could take years to track down, if ever.

WannaCry has renewed a debate about the obligations of defense departments to the private sector. The virus was developed by taking advantage of a software flaw in Microsoft ’s Windows operating system that the U.S. National Security Agency identified last August. The NSA develops libraries of such exploits, and an online group named Shadow Brokers infiltrated the database last year and published the material that led to WannaCry.

Microsoft blames the NSA for researching such hacking methods, but in this case the NSA followed the protocol known as the Vulnerabilities Equities Process that determines which flaws should be reserved for intelligence gathering and which should be disclosed to protect consumers. The NSA alerted Microsoft.

The company fixed the problem with a software patch in March, but users who failed to upgrade their OS remained vulnerable. Too many corporate and government information technology departments are behind the curve.

The episode underscores the folly of the U.S. law enforcement demand that tech companies install backdoors into their devices and services. Defrocked FBI Director James Comey ran a public pressure campaign against Apple in 2015 and 2016 when his agents couldn’t break the encryption of the iPhones of the San Bernardino killers, and asked Congress to mandate dedicated built-in decryption keys. WannaCry takes advantage of a coding error. An intentional outside entry point that leaked or fell into the wrong hands could lead to even larger havoc.

Witness the WannaCry meltdown at Britain’s National Health Service, where 45% of hospitals, doctors offices and ambulances were crippled. Even emergency room services had to be curtailed. The Russian Interior Ministry was also compromised. A successful cyber-attack on the banking system, the electric grid, traffic lights or electronic medical records could do far more economic and security damage.

The Pentagon stood up a cyber command in 2012, but the effort has been impaired by bureaucratic turf protection and blurred lines of accountability. Infamously in 2013, Defense, Homeland Security, the FBI and other agencies required 75 drafts of a single Power Point slide to define their respective division of responsibilities for cybersecurity.

Abuse and even acts of war are never far behind technological advance, and the damage will be worse next time if the U.S. can’t modernize its cyberdefenses.

Appeared in the May. 16, 2017, print edition.

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile
WannaCry and Lazarus Group
« Reply #442 on: May 17, 2017, 10:06:01 AM »
Hat tip to a geek friend for this-- for I certainly have not a clue in these things:

https://securelist.com/blog/research/78431/wannacry-and-lazarus-group-the-missing-link/

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile
Overview of US cyber adversaries
« Reply #443 on: May 31, 2017, 09:59:52 AM »
Hat tip to my geek friend:

https://www.sans.org/newsletters/newsbites/xix/43

Top of the news:
An Overview of US's Cyber Adversaries - https://www.sans.org/newsletters/newsbites/xix/43#200
UN North Korea Sanctions Investigation Panel Reports Cyber Attack https://www.sans.org/newsletters/newsbites/xix/43#202



ccp

  • Power User
  • ***
  • Posts: 18539
    • View Profile
Re: Cyberwar, Cyber Crime, and American Freedom
« Reply #446 on: July 09, 2017, 05:34:10 PM »
I can only think he thinks he can outsmart Putin with this suggestion/concept.

If he does he is "deluding" himself.

But it really  thinks we could somehow work as partners with this

then he is plain "delusional".




Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile
Re: Cyberwar, Cyber Crime, and American Freedom
« Reply #447 on: July 09, 2017, 06:23:17 PM »
Definitely leaves me ill at ease, though I suppose it could be a place for cyber-spooks to play their games , , ,

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile

G M

  • Power User
  • ***
  • Posts: 26643
    • View Profile